summaryrefslogtreecommitdiff
path: root/tests/certs/Server-localhost0h-sv.der
Commit message (Collapse)AuthorAgeFilesLines
* certs: generate tests certs with sha256 digest algorithmDaniel Stenberg2018-09-201-0/+0
| | | | | | | | As OpenSSL 1.1.1 starts to complain and fail on sha1 CAs: "SSL certificate problem: CA signature digest algorithm too weak" Closes #3014
* tests/certs: rebuild certs with 2048-bit RSA keysYiming Jing2018-09-121-0/+0
| | | | | | | | | | | The previous test certificates contained RSA keys of only 1024 bits. However, RSA claims that 1024-bit RSA keys are likely to become crackable some time before 2010. The NIST recommends at least 2048-bit keys for RSA for now. Better use full 2048 also for testing. Closes #2973
* tests/certs: rebuild certificates with modified key usage bitsDan Fandrich2015-03-211-0/+0
| | | | | | | | The certificates were missing the digitalSignature and keyAgreement usage types, of which at least digitalSignature was checked by CyaSSL. This caused the test server in test 310 (among others) to fail the startup verification and therefore run (see http://curl.haxx.se/mail/lib-2014-07/0303.html).
* tests/certs: re-generated because of lost pass-phraseKamil Dudka2010-05-271-0/+0
|
* - Peter Sylvester made the HTTPS test server use specific certificates forDaniel Stenberg2009-08-111-0/+0
each test, so that the test suite can now be used to actually test the verification of cert names etc. This made an error show up in the OpenSSL- specific code where it would attempt to match the CN field even if a subjectAltName exists that doesn't match. This is now fixed and verified in test 311.