Skip to content

Commit ecc5893

Browse files
committed
Remove unused test data files
1 parent 9fc4937 commit ecc5893

File tree

321 files changed

+0
-11264
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

321 files changed

+0
-11264
lines changed

scripts/data_files/rename-1.3-2.0.txt

Lines changed: 0 additions & 2174 deletions
This file was deleted.

tests/data_files/Makefile

Lines changed: 0 additions & 216 deletions
Original file line numberDiff line numberDiff line change
@@ -55,52 +55,7 @@ test-ca-sha256.crt: $(test_ca_key_file_rsa) test-ca.req.sha256
5555
$(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20110212144400 not_after=20210212144400 md=SHA256 version=3 output_file=$@
5656
all_final += test-ca-sha256.crt
5757

58-
test_ca_key_file_rsa_alt = test-ca-alt.key
59-
60-
$(test_ca_key_file_rsa_alt):
61-
$(OPENSSL) genrsa -out $@ 2048
62-
test-ca-alt.csr: $(test_ca_key_file_rsa_alt) $(test_ca_config_file)
63-
$(OPENSSL) req -new -config $(test_ca_config_file) -key $(test_ca_key_file_rsa_alt) -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@
64-
all_intermediate += test-ca-alt.csr
65-
test-ca-alt.crt: $(test_ca_key_file_rsa_alt) $(test_ca_config_file) test-ca-alt.csr
66-
$(OPENSSL) req -x509 -config $(test_ca_config_file) -key $(test_ca_key_file_rsa_alt) -set_serial 0 -days 3653 -sha256 -in test-ca-alt.csr -out $@
67-
all_final += test-ca-alt.crt
68-
test-ca-alt-good.crt: test-ca-alt.crt test-ca-sha256.crt
69-
cat test-ca-alt.crt test-ca-sha256.crt > $@
70-
all_final += test-ca-alt-good.crt
71-
test-ca-good-alt.crt: test-ca-alt.crt test-ca-sha256.crt
72-
cat test-ca-sha256.crt test-ca-alt.crt > $@
73-
all_final += test-ca-good-alt.crt
74-
75-
test_ca_crt_file_ec = test-ca2.crt
76-
test_ca_key_file_ec = test-ca2.key
77-
78-
test_ca_crt_cat12 = test-ca_cat12.crt
79-
$(test_ca_crt_cat12): $(test_ca_crt) $(test_ca_crt_file_ec)
80-
cat $(test_ca_crt) $(test_ca_crt_file_ec) > $@
81-
all_final += $(test_ca_crt_cat12)
82-
83-
test_ca_crt_cat21 = test-ca_cat21.crt
84-
$(test_ca_crt_cat21): $(test_ca_crt) $(test_ca_crt_file_ec)
85-
cat $(test_ca_crt_file_ec) $(test_ca_crt) > $@
86-
all_final += $(test_ca_crt_cat21)
87-
88-
test-int-ca.csr: test-int-ca.key $(test_ca_config_file)
89-
$(OPENSSL) req -new -config $(test_ca_config_file) -key test-int-ca.key -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test Intermediate CA" -out $@
90-
all_intermediate += test-int-ca.csr
91-
test-int-ca-exp.crt: $(test_ca_crt_file_ec) $(test_ca_key_file_ec) $(test_ca_config_file) test-int-ca.csr
92-
$(FAKETIME) -f -3653d $(OPENSSL) x509 -req -extfile $(test_ca_config_file) -extensions v3_ca -CA $(test_ca_crt_file_ec) -CAkey $(test_ca_key_file_ec) -set_serial 14 -days 3653 -sha256 -in test-int-ca.csr -out $@
93-
all_final += test-int-ca-exp.crt
94-
95-
crl-idp.pem: $(test_ca_crt) $(test_ca_key_file_rsa) $(test_ca_config_file)
96-
$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_pwd_rsa) -config $(test_ca_config_file) -name test_ca -md sha256 -crldays 3653 -crlexts crl_ext_idp -out $@
97-
all_final += crl-idp.pem
98-
crl-idpnc.pem: $(test_ca_crt) $(test_ca_key_file_rsa) $(test_ca_config_file)
99-
$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_pwd_rsa) -config $(test_ca_config_file) -name test_ca -md sha256 -crldays 3653 -crlexts crl_ext_idp_nc -out $@
100-
all_final += crl-idpnc.pem
101-
10258
cli_crt_key_file_rsa = cli-rsa.key
103-
cli_crt_extensions_file = cli.opensslconf
10459

10560
cli-rsa.csr: $(cli_crt_key_file_rsa)
10661
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Client 2" md=SHA1
@@ -115,56 +70,10 @@ all_final += cli-rsa-sha256.crt
11570

11671
test_ca_int_rsa1 = test-int-ca.crt
11772

118-
server7.csr: server7.key
119-
$(OPENSSL) req -new -key server7.key -subj "/C=NL/O=PolarSSL/CN=localhost" -out $@
120-
all_intermediate += server7.csr
121-
server7-expired.crt: server7.csr $(test_ca_int_rsa1)
122-
$(FAKETIME) -f -3653d $(OPENSSL) x509 -req -extfile $(cli_crt_extensions_file) -extensions cli-rsa -CA $(test_ca_int_rsa1) -CAkey test-int-ca.key -set_serial 16 -days 3653 -sha256 -in server7.csr | cat - $(test_ca_int_rsa1) > $@
123-
all_final += server7-expired.crt
124-
server7-future.crt: server7.csr $(test_ca_int_rsa1)
125-
$(FAKETIME) -f +3653d $(OPENSSL) x509 -req -extfile $(cli_crt_extensions_file) -extensions cli-rsa -CA $(test_ca_int_rsa1) -CAkey test-int-ca.key -set_serial 16 -days 3653 -sha256 -in server7.csr | cat - $(test_ca_int_rsa1) > $@
126-
all_final += server7-future.crt
127-
server7-badsign.crt: server7.crt $(test_ca_int_rsa1)
128-
{ head -n-2 $<; tail -n-2 $< | sed -e '1s/0\(=*\)$$/_\1/' -e '1s/[^_=]\(=*\)$$/0\1/' -e '1s/_/1/'; cat $(test_ca_int_rsa1); } > $@
129-
all_final += server7-badsign.crt
130-
server7_int-ca-exp.crt: server7.crt test-int-ca-exp.crt
131-
cat server7.crt test-int-ca-exp.crt > $@
132-
all_final += server7_int-ca-exp.crt
133-
134-
server5-ss-expired.crt: server5.key
135-
$(FAKETIME) -f -3653d $(OPENSSL) req -x509 -new -subj "/C=UK/O=mbed TLS/OU=testsuite/CN=localhost" -days 3653 -sha256 -key $< -out $@
136-
all_final += server5-ss-expired.crt
137-
138-
# try to forge a copy of test-int-ca3 with different key
139-
server5-ss-forgeca.crt: server5.key
140-
$(FAKETIME) '2015-09-01 14:08:43' $(OPENSSL) req -x509 -new -subj "/C=UK/O=mbed TLS/CN=mbed TLS Test intermediate CA 3" -set_serial 77 -config $(test_ca_config_file) -extensions noext_ca -days 3650 -sha256 -key $< -out $@
141-
all_final += server5-ss-forgeca.crt
142-
143-
server10-badsign.crt: server10.crt
144-
{ head -n-2 $<; tail -n-2 $< | sed -e '1s/0\(=*\)$$/_\1/' -e '1s/[^_=]\(=*\)$$/0\1/' -e '1s/_/1/'; } > $@
145-
all_final += server10-badsign.crt
146-
server10-bs_int3.pem: server10-badsign.crt test-int-ca3.crt
147-
cat server10-badsign.crt test-int-ca3.crt > $@
148-
all_final += server10-bs_int3.pem
149-
test-int-ca3-badsign.crt: test-int-ca3.crt
150-
{ head -n-2 $<; tail -n-2 $< | sed -e '1s/0\(=*\)$$/_\1/' -e '1s/[^_=]\(=*\)$$/0\1/' -e '1s/_/1/'; } > $@
151-
all_final += test-int-ca3-badsign.crt
152-
server10_int3-bs.pem: server10.crt test-int-ca3-badsign.crt
153-
cat server10.crt test-int-ca3-badsign.crt > $@
154-
all_final += server10-bs_int3-bs.pem
155-
156-
rsa_pkcs1_2048_public.pem: server8.key
157-
$(OPENSSL) rsa -in $< -outform PEM -RSAPublicKey_out -out $@
158-
all_final += rsa_pkcs1_2048_public.pem
159-
16073
rsa_pkcs1_2048_public.der: rsa_pkcs1_2048_public.pem
16174
$(OPENSSL) rsa -RSAPublicKey_in -in $< -outform DER -RSAPublicKey_out -out $@
16275
all_final += rsa_pkcs1_2048_public.der
16376

164-
rsa_pkcs8_2048_public.pem: server8.key
165-
$(OPENSSL) rsa -in $< -outform PEM -pubout -out $@
166-
all_final += rsa_pkcs8_2048_public.pem
167-
16877
rsa_pkcs8_2048_public.der: rsa_pkcs8_2048_public.pem
16978
$(OPENSSL) rsa -pubin -in $< -outform DER -pubout -out $@
17079
all_final += rsa_pkcs8_2048_public.der
@@ -743,140 +652,16 @@ all_final += ec_prv.pk8param.pem
743652
### Generate CSRs for X.509 write test suite
744653
################################################################
745654

746-
server1.req.sha1: server1.key
747-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA1
748-
all_final += server1.req.sha1
749-
750-
server1.req.md4: server1.key
751-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=MD4
752-
all_final += server1.req.md4
753-
754-
server1.req.md5: server1.key
755-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=MD5
756-
all_final += server1.req.md5
757-
758-
server1.req.sha224: server1.key
759-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA224
760-
all_final += server1.req.sha224
761-
762-
server1.req.sha256: server1.key
763-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA256
764-
all_final += server1.req.sha256
765-
766-
server1.req.sha384: server1.key
767-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA384
768-
all_final += server1.req.sha384
769-
770-
server1.req.sha512: server1.key
771-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA512
772-
all_final += server1.req.sha512
773-
774-
server1.req.cert_type: server1.key
775-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< ns_cert_type=ssl_server subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA1
776-
all_final += server1.req.cert_type
777-
778-
server1.req.key_usage: server1.key
779-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< key_usage=digital_signature,non_repudiation,key_encipherment subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA1
780-
all_final += server1.req.key_usage
781-
782-
server1.req.ku-ct: server1.key
783-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< key_usage=digital_signature,non_repudiation,key_encipherment ns_cert_type=ssl_server subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA1
784-
all_final += server1.req.ku-ct
785-
786-
server1.req.key_usage_empty: server1.key
787-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA1 force_key_usage=1
788-
all_final += server1.req.key_usage_empty
789-
790-
server1.req.cert_type_empty: server1.key
791-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA1 force_ns_cert_type=1
792-
all_final += server1.req.cert_type_empty
793-
794655
# server2*
795656

796657
server2.req.sha256: server2.key
797658
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=localhost" md=SHA256
798659
all_intermediate += server2.req.sha256
799660

800-
# server5*
801-
802-
# The use of 'Server 1' in the DN is intentional here, as the DN is hardcoded in the x509_write test suite.'
803-
server5.req.ku.sha1: server5.key
804-
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< key_usage=digital_signature,non_repudiation subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA1
805-
all_final += server5.req.ku.sha1
806-
807661
################################################################
808662
### Generate certificates for CRT write check tests
809663
################################################################
810664

811-
### The test files use the Mbed TLS generated certificates server1*.crt,
812-
### but for comparison with OpenSSL also rules for OpenSSL-generated
813-
### certificates server1*.crt.openssl are offered.
814-
###
815-
### Known differences:
816-
### * OpenSSL encodes trailing zero-bits in bit-strings occurring in X.509 extension
817-
### as unused bits, while Mbed TLS doesn't.
818-
819-
test_ca_server1_db = test-ca.server1.db
820-
test_ca_server1_serial = test-ca.server1.serial
821-
test_ca_server1_config_file = test-ca.server1.opensslconf
822-
823-
# server1*
824-
825-
server1.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa)
826-
$(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) version=1 not_before=20110212144406 not_after=20210212144406 md=SHA1 version=3 output_file=$@
827-
server1.noauthid.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa)
828-
$(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20110212144406 not_after=20210212144406 md=SHA1 authority_identifier=0 version=3 output_file=$@
829-
server1.der: server1.crt
830-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
831-
all_final += server1.crt server1.noauthid.crt server1.der
832-
833-
server1.key_usage.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa)
834-
$(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) version=1 not_before=20110212144406 not_after=20210212144406 md=SHA1 key_usage=digital_signature,non_repudiation,key_encipherment version=3 output_file=$@
835-
server1.key_usage_noauthid.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa)
836-
$(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) version=1 not_before=20110212144406 not_after=20210212144406 md=SHA1 key_usage=digital_signature,non_repudiation,key_encipherment authority_identifier=0 version=3 output_file=$@
837-
server1.key_usage.der: server1.key_usage.crt
838-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
839-
all_final += server1.key_usage.crt server1.key_usage_noauthid.crt server1.key_usage.der
840-
841-
server1.cert_type.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa)
842-
$(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) version=1 not_before=20110212144406 not_after=20210212144406 md=SHA1 ns_cert_type=ssl_server version=3 output_file=$@
843-
server1.cert_type_noauthid.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa)
844-
$(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) version=1 not_before=20110212144406 not_after=20210212144406 md=SHA1 ns_cert_type=ssl_server authority_identifier=0 version=3 output_file=$@
845-
server1.cert_type.der: server1.cert_type.crt
846-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
847-
all_final += server1.cert_type.crt server1.cert_type_noauthid.crt server1.cert_type.der
848-
849-
server1.v1.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa)
850-
$(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) version=1 not_before=20110212144406 not_after=20210212144406 md=SHA1 version=1 output_file=$@
851-
server1.v1.der: server1.v1.crt
852-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
853-
all_final += server1.v1.crt server1.v1.der
854-
855-
# OpenSSL-generated certificates for comparison
856-
# Also provide certificates in DER format to allow
857-
# direct binary comparison using e.g. dumpasn1
858-
server1.crt.openssl server1.key_usage.crt.openssl server1.cert_type.crt.openssl: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa) $(test_ca_server1_config_file)
859-
echo "01" > $(test_ca_server1_serial)
860-
rm -f $(test_ca_server1_db)
861-
touch $(test_ca_server1_db)
862-
$(OPENSSL) ca -batch -passin "pass:$(test_ca_pwd_rsa)" -config $(test_ca_server1_config_file) -in server1.req.sha256 -extensions v3_ext -extfile $@.v3_ext -out $@
863-
server1.der.openssl: server1.crt.openssl
864-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
865-
server1.key_usage.der.openssl: server1.key_usage.crt.openssl
866-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
867-
server1.cert_type.der.openssl: server1.cert_type.crt.openssl
868-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
869-
870-
server1.v1.crt.openssl: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa) $(test_ca_server1_config_file)
871-
echo "01" > $(test_ca_server1_serial)
872-
rm -f $(test_ca_server1_db)
873-
touch $(test_ca_server1_db)
874-
$(OPENSSL) ca -batch -passin "pass:$(test_ca_pwd_rsa)" -config $(test_ca_server1_config_file) -in server1.req.sha256 -out $@
875-
server1.v1.der.openssl: server1.v1.crt.openssl
876-
$(OPENSSL) x509 -inform PEM -in $< -outform DER -out $@
877-
878-
server1_all: server1.crt server1.noauthid.crt server1.crt.openssl server1.v1.crt server1.v1.crt.openssl server1.key_usage.crt server1.key_usage_noauthid.crt server1.key_usage.crt.openssl server1.cert_type.crt server1.cert_type_noauthid.crt server1.cert_type.crt.openssl server1.der server1.der.openssl server1.v1.der server1.v1.der.openssl server1.key_usage.der server1.key_usage.der.openssl server1.cert_type.der server1.cert_type.der.openssl
879-
880665
# server2*
881666

882667
server2.crt: server2.req.sha256
@@ -906,7 +691,6 @@ all: $(all_intermediate) $(all_final)
906691
.PHONY: keys_rsa_enc_pkcs8_v1_1024 keys_rsa_enc_pkcs8_v2_1024
907692
.PHONY: keys_rsa_enc_pkcs8_v1_2048 keys_rsa_enc_pkcs8_v2_2048
908693
.PHONY: keys_rsa_enc_pkcs8_v1_4096 keys_rsa_enc_pkcs8_v2_4096
909-
.PHONY: server1_all
910694

911695
# These files should not be committed to the repository.
912696
list_intermediate:

0 commit comments

Comments
 (0)