You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@qpid.apache.org by kg...@apache.org on 2012/12/14 20:18:32 UTC

svn commit: r1422049 - in /qpid/proton/trunk: proton-j/proton/src/main/scripts/ tests/proton_tests/ tests/proton_tests/ssl_db/

Author: kgiusti
Date: Fri Dec 14 19:18:25 2012
New Revision: 1422049

URL: http://svn.apache.org/viewvc?rev=1422049&view=rev
Log:
PROTON-161: add testcases

Added:
    qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-certificate.pem
    qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-private-key.pem
Removed:
    qpid/proton/trunk/tests/proton_tests/ssl_db/ca-private-key.pem
Modified:
    qpid/proton/trunk/proton-j/proton/src/main/scripts/proton.py
    qpid/proton/trunk/tests/proton_tests/ssl.py
    qpid/proton/trunk/tests/proton_tests/ssl_db/README.txt
    qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-certificate.pem
    qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-private-key.pem
    qpid/proton/trunk/tests/proton_tests/ssl_db/ca-certificate.pem
    qpid/proton/trunk/tests/proton_tests/ssl_db/client-certificate.pem
    qpid/proton/trunk/tests/proton_tests/ssl_db/client-private-key.pem
    qpid/proton/trunk/tests/proton_tests/ssl_db/server-certificate.pem
    qpid/proton/trunk/tests/proton_tests/ssl_db/server-private-key.pem

Modified: qpid/proton/trunk/proton-j/proton/src/main/scripts/proton.py
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/proton-j/proton/src/main/scripts/proton.py?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/proton-j/proton/src/main/scripts/proton.py (original)
+++ qpid/proton/trunk/proton-j/proton/src/main/scripts/proton.py Fri Dec 14 19:18:25 2012
@@ -833,6 +833,7 @@ class SSL(object):
   MODE_CLIENT = Ssl.Mode.CLIENT
   VERIFY_PEER = Ssl.VerifyMode.VERIFY_PEER
   ANONYMOUS_PEER = Ssl.VerifyMode.ANONYMOUS_PEER
+  VERIFY_PEER_NAME = None  # TBD
 
   def __init__(self,transport):
     self._ssl = transport.impl.ssl()
@@ -860,6 +861,12 @@ class SSL(object):
   def allow_unsecured_client(self):
      self._ssl.allowUnsecuredClient(True)
 
+  def _set_peer_hostname(self, hostname):
+    raise Skipped()
+  def _get_peer_hostname(self):
+    raise Skipped()
+  peer_hostname = property(_get_peer_hostname, _set_peer_hostname)
+
 __all__ = ["Messenger", "Message", "ProtonException", "MessengerException",
            "MessageException", "Timeout", "Condition", "Data", "Endpoint",
            "Connection", "Session", "Link", "Terminus", "Sender", "Receiver",

Modified: qpid/proton/trunk/tests/proton_tests/ssl.py
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl.py?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl.py (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl.py Fri Dec 14 19:18:25 2012
@@ -40,7 +40,9 @@ class SslTest(common.Test):
             raise Skipped(e)
 
     def teardown(self):
+        self.client = None
         self.t_client = None
+        self.server = None
         self.t_server = None
 
     def _pump(self):
@@ -57,6 +59,23 @@ class SslTest(common.Test):
         return os.path.join(os.path.dirname(__file__),
                             "ssl_db/%s" % file)
 
+    def _do_handshake(self):
+        """ Attempt to connect client to server. Will throw a TransportException if the SSL
+        handshake fails.
+        """
+        client_conn = Connection()
+        self.t_client.bind(client_conn)
+        server_conn = Connection()
+        self.t_server.bind(server_conn)
+        client_conn.open()
+        server_conn.open()
+        self._pump()
+        assert self.client.protocol_name() is not None
+        client_conn.close()
+        server_conn.close()
+        self._pump()
+
+
     def test_defaults(self):
         """ By default, both the server and the client support anonymous
         ciphers - they should connect without need for a certificate.
@@ -278,52 +297,114 @@ class SslTest(common.Test):
             assert True
 
     def test_server_hostname_authentication(self):
-        """ Simple SSL connection with authentication of the server and check
-        of its hostname.
+        """ Test authentication of the names held in the server's certificate
+        against various configured hostnames.
         """
+
+        # Check the CommonName matches (case insensitive).
+        # Assumes certificate contains "CN=A1.Good.Server.domain.com"
         self.server.set_credentials(self._testpath("server-certificate.pem"),
                                     self._testpath("server-private-key.pem"),
                                     "server-password")
-
-        #self.t_client.trace( Transport.TRACE_DRV )
         self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
         self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
         self.client.peer_hostname = "a1.good.server.domain.com"
         assert self.client.peer_hostname == "a1.good.server.domain.com"
+        self._do_handshake()
+        self.teardown()
 
-        client_conn = Connection()
-        self.t_client.bind(client_conn)
-        server_conn = Connection()
-        self.t_server.bind(server_conn)
-        client_conn.open()
-        server_conn.open()
-        self._pump()
-        assert self.client.protocol_name() is not None
-        client_conn.close()
-        server_conn.close()
-        self._pump()
-
-
-    def test_server_hostname_authentication_fail(self):
-        """ Should fail due to mismatched peer hostname
-        """
+        # Should fail on CN name mismatch:
+        self.setup()
         self.server.set_credentials(self._testpath("server-certificate.pem"),
                                     self._testpath("server-private-key.pem"),
                                     "server-password")
+        self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
+        self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
+        self.client.peer_hostname = "A1.Good.Server.domain.comX"
+        try:
+            self._do_handshake()
+            assert False, "Expected connection to fail due to hostname mismatch"
+        except TransportException:
+            pass
+        self.teardown()
 
-        #self.t_client.trace( Transport.TRACE_DRV )
+        # Wildcarded Certificate
+        # Assumes:
+        #   1) certificate contains Server Alternate Names:
+        #        "alternate.name.one.com" and "another.name.com"
+        #   2) certificate has wildcarded CommonName "*.prefix*.domain.com"
+        #
+
+        # Pass: match an alternate
+        self.setup()
+        self.server.set_credentials(self._testpath("server-wc-certificate.pem"),
+                                    self._testpath("server-wc-private-key.pem"),
+                                    "server-password")
+        self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
+        self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
+        self.client.peer_hostname = "alternate.Name.one.com"
+        self._do_handshake()
+        self.teardown()
+
+        # Pass: match an alternate
+        self.setup()
+        self.server.set_credentials(self._testpath("server-wc-certificate.pem"),
+                                    self._testpath("server-wc-private-key.pem"),
+                                    "server-password")
         self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
         self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
-        self.client.peer_hostname = "A1.Good.Server.domain.comx"
+        self.client.peer_hostname = "ANOTHER.NAME.COM"
+        self._do_handshake()
+        self.teardown()
+
+        # Pass: match the pattern
+        self.setup()
+        self.server.set_credentials(self._testpath("server-wc-certificate.pem"),
+                                    self._testpath("server-wc-private-key.pem"),
+                                    "server-password")
+        self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
+        self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
+        self.client.peer_hostname = "SOME.PREfix.domain.COM"
+        self._do_handshake()
+        self.teardown()
+
+        # Pass: match the pattern
+        self.setup()
+        self.server.set_credentials(self._testpath("server-wc-certificate.pem"),
+                                    self._testpath("server-wc-private-key.pem"),
+                                    "server-password")
+        self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
+        self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
+        self.client.peer_hostname = "FOO.PREfixZZZ.domain.com"
+        self._do_handshake()
+        self.teardown()
+
+        # Fail: must match prefix on wildcard
+        self.setup()
+        self.server.set_credentials(self._testpath("server-wc-certificate.pem"),
+                                    self._testpath("server-wc-private-key.pem"),
+                                    "server-password")
+        self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
+        self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
+        self.client.peer_hostname = "FOO.PREfi.domain.com"
+        try:
+            self._do_handshake()
+            assert False, "Expected connection to fail due to hostname mismatch"
+        except TransportException:
+            pass
+        self.teardown()
 
-        client_conn = Connection()
-        self.t_client.bind(client_conn)
-        server_conn = Connection()
-        self.t_server.bind(server_conn)
-        client_conn.open()
-        server_conn.open()
+        # Fail: leading wildcards are not optional
+        self.setup()
+        self.server.set_credentials(self._testpath("server-wc-certificate.pem"),
+                                    self._testpath("server-wc-private-key.pem"),
+                                    "server-password")
+        self.client.set_trusted_ca_db(self._testpath("ca-certificate.pem"))
+        self.client.set_peer_authentication( SSL.VERIFY_PEER_NAME )
+        self.client.peer_hostname = "PREfix.domain.COM"
         try:
-            self._pump()
+            self._do_handshake()
             assert False, "Expected connection to fail due to hostname mismatch"
         except TransportException:
             pass
+        self.teardown()

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/README.txt
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/README.txt?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/README.txt (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/README.txt Fri Dec 14 19:18:25 2012
@@ -4,9 +4,6 @@ ca-certificate.pem - contains the public
 Authority.  This certificate is used to sign the certificates that identify the SSL
 servers and clients run by the tests.
 
-ca-private-key.pem - encrypted key used to sign certificate requests.  Password is
-"ca-password"
-
 client-certificate.pem - the public certificate used to identify the client.  Signed by
 the CA.
 
@@ -21,28 +18,45 @@ server-private-key.pem - encrypted key u
 
 bad-server-certificate.pem, bad-server-private-key.pem - a certificate/key that is not trusted by the client, for negative test.
 
+server-wc-certificate.pem and server-wc-private-key.pem - similar to
+server-certificate.pem and server-private-key.pem, but contains Subject Alternate Name
+entries, and a wildcard CommonName.  Used for certificate name checking tests.
+
 These certificates have been created using the OpenSSL tool.
 
-The following commands were used to create these certificates (requires keytool from Java 1.7):
+The following bash script can be used to create these certificates (requires keytool from Java 1.7, and openssl):
+
+--8<--
+#!/bin/bash
+#set -x
+
+rm -f *.pem *.pkcs12
 
 # Create a self-signed certificate for the CA, and a private key to sign certificate requests:
- keytool -storetype pkcs12 -keystore ca.pkcs12 -storepass ca-password -alias ca -keypass ca-password -genkey -dname "O=Trust Me Inc.,CN=127.0.0.1"
- openssl pkcs12 -nokeys -passin pass:ca-password -in ca.pkcs12 -passout pass:ca-password -out ca-certificate.pem
+keytool -storetype pkcs12 -keystore ca.pkcs12 -storepass ca-password -alias ca -keypass ca-password -genkey -dname "O=Trust Me Inc.,CN=Trusted.CA.com"
+openssl pkcs12 -nokeys -passin pass:ca-password -in ca.pkcs12 -passout pass:ca-password -out ca-certificate.pem
 
 # Create a certificate request for the server certificate.  Use the CA's certificate to sign it:
- keytool -storetype pkcs12 -keystore server.pkcs12 -storepass server-password -alias server-certificate -keypass server-password -genkey  -dname "O=Server,CN=127.0.0.1"
- keytool -storetype pkcs12 -keystore server.pkcs12 -storepass server-password -alias server-certificate -keypass server-password -certreq -file server-request.pem
- keytool -storetype pkcs12 -keystore ca.pkcs12 -storepass ca-password -alias ca -keypass ca-password -gencert -rfc -validity 99999 -infile server-request.pem -outfile server-certificate.pem
- openssl pkcs12 -nocerts -passin pass:server-password -in server.pkcs12 -passout pass:server-password -out server-private-key.pem
+keytool -storetype pkcs12 -keystore server.pkcs12 -storepass server-password -alias server-certificate -keypass server-password -genkey  -dname "O=Server,CN=A1.Good.Server.domain.com"
+keytool -storetype pkcs12 -keystore server.pkcs12 -storepass server-password -alias server-certificate -keypass server-password -certreq -file server-request.pem
+keytool -storetype pkcs12 -keystore ca.pkcs12 -storepass ca-password -alias ca -keypass ca-password -gencert -rfc -validity 99999 -infile server-request.pem -outfile server-certificate.pem
+openssl pkcs12 -nocerts -passin pass:server-password -in server.pkcs12 -passout pass:server-password -out server-private-key.pem
 
 # Create a certificate request for the client certificate.  Use the CA's certificate to sign it:
- keytool -storetype pkcs12 -keystore client.pkcs12 -storepass client-password -alias client-certificate -keypass client-password -genkey  -dname "O=Client,CN=127.0.0.1"
- keytool -storetype pkcs12 -keystore client.pkcs12 -storepass client-password -alias client-certificate -keypass client-password -certreq -file client-request.pem
- keytool -storetype pkcs12 -keystore ca.pkcs12 -storepass ca-password -alias ca -keypass ca-password -gencert -rfc -validity 99999 -infile client-request.pem -outfile client-certificate.pem
- openssl pkcs12 -nocerts -passin pass:client-password -in client.pkcs12 -passout pass:client-password -out client-private-key.pem
+keytool -storetype pkcs12 -keystore client.pkcs12 -storepass client-password -alias client-certificate -keypass client-password -genkey  -dname "O=Client,CN=127.0.0.1"
+keytool -storetype pkcs12 -keystore client.pkcs12 -storepass client-password -alias client-certificate -keypass client-password -certreq -file client-request.pem
+keytool -storetype pkcs12 -keystore ca.pkcs12 -storepass ca-password -alias ca -keypass ca-password -gencert -rfc -validity 99999 -infile client-request.pem -outfile client-certificate.pem
+openssl pkcs12 -nocerts -passin pass:client-password -in client.pkcs12 -passout pass:client-password -out client-private-key.pem
 
 # Create a "bad" certificate - not signed by a trusted authority
- keytool -storetype pkcs12 -keystore bad-server.pkcs12 -storepass server-password -alias bad-server -keypass server-password -genkey -dname "O=Not Trusted Inc,CN=127.0.0.1"
- openssl pkcs12 -nocerts -passin pass:server-password -in bad-server.pkcs12 -passout pass:server-password -out bad-server-private-key.pem
- openssl pkcs12 -nokeys  -passin pass:server-password -in bad-server.pkcs12 -passout pass:server-password -out bad-server-certificate.pem
+keytool -storetype pkcs12 -keystore bad-server.pkcs12 -storepass server-password -alias bad-server -keypass server-password -genkey -dname "O=Not Trusted Inc,CN=127.0.0.1"
+openssl pkcs12 -nocerts -passin pass:server-password -in bad-server.pkcs12 -passout pass:server-password -out bad-server-private-key.pem
+openssl pkcs12 -nokeys  -passin pass:server-password -in bad-server.pkcs12 -passout pass:server-password -out bad-server-certificate.pem
+
+# Create a server certificate with several alternate names, including a wildcarded common name:
+keytool -ext san=dns:alternate.name.one.com,dns:another.name.com -storetype pkcs12 -keystore server.pkcs12 -storepass server-password -alias server-wc-certificate -keypass server-password -genkeypair -dname "O=Server,CN=*.prefix*.domain.com"
+keytool -ext san=dns:alternate.name.one.com,dns:another.name.com -storetype pkcs12 -keystore server.pkcs12 -storepass server-password -alias server-wc-certificate -keypass server-password -certreq -file server-wc-request.pem
+keytool -ext san=dns:alternate.name.one.com,dns:another.name.com  -storetype pkcs12 -keystore ca.pkcs12 -storepass ca-password -alias ca -keypass ca-password -gencert -rfc -validity 99999 -infile server-wc-request.pem -outfile server-wc-certificate.pem
+openssl pkcs12 -nocerts -passin pass:server-password -in server.pkcs12 -passout pass:server-password -out server-wc-private-key.pem
+
 

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-certificate.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-certificate.pem?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-certificate.pem (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-certificate.pem Fri Dec 14 19:18:25 2012
@@ -1,22 +1,22 @@
 Bag Attributes
     friendlyName: bad-server
-    localKeyID: 54 69 6D 65 20 31 33 35 35 33 32 36 32 38 35 30 39 32 
+    localKeyID: 54 69 6D 65 20 31 33 35 35 35 30 39 38 33 31 36 34 31 
 subject=/CN=127.0.0.1/O=Not Trusted Inc
 issuer=/CN=127.0.0.1/O=Not Trusted Inc
 -----BEGIN CERTIFICATE-----
-MIICuTCCAnegAwIBAgIEeU69HjALBgcqhkjOOAQDBQAwLjESMBAGA1UEAxMJMTI3
-LjAuMC4xMRgwFgYDVQQKEw9Ob3QgVHJ1c3RlZCBJbmMwHhcNMTIxMjEyMTUzMTI1
-WhcNMTMwMzEyMTUzMTI1WjAuMRIwEAYDVQQDEwkxMjcuMC4wLjExGDAWBgNVBAoT
-D05vdCBUcnVzdGVkIEluYzCCAbgwggEsBgcqhkjOOAQBMIIBHwKBgQD9f1OBHXUS
+MIICuDCCAnagAwIBAgIETm+CCTALBgcqhkjOOAQDBQAwLjESMBAGA1UEAxMJMTI3
+LjAuMC4xMRgwFgYDVQQKEw9Ob3QgVHJ1c3RlZCBJbmMwHhcNMTIxMjE0MTgzMDMx
+WhcNMTMwMzE0MTgzMDMxWjAuMRIwEAYDVQQDEwkxMjcuMC4wLjExGDAWBgNVBAoT
+D05vdCBUcnVzdGVkIEluYzCCAbcwggEsBgcqhkjOOAQBMIIBHwKBgQD9f1OBHXUS
 KVLfSpwu7OTn9hG3UjzvRADDHj+AtlEmaUVdQCJR+1k9jVj6v8X1ujD2y5tVbNeB
 O4AdNG/yZmC3a5lQpaSfn+gEexAiwk+7qdf+t8Yb+DtX58aophUPBPuD9tPFHsMC
 NVQTWhaRMvZ1864rYdcq7/IiAxmd0UgBxwIVAJdgUI8VIwvMspK5gqLrhAvwWBz1
 AoGBAPfhoIXWmz3ey7yrXDa4V7l5lK+7+jrqgvlXTAs9B4JnUVlXjrrUWU/mcQcQ
 gYC0SRZxI+hMKBYTt88JMozIpuE8FnqLVHyNKOCjrh4rs6Z1kW6jfwv6ITVi8fti
-egEkO8yk8b6oUZCJqIPf4VrlnwaSi2ZegHtVJWQBTDv+z0kqA4GFAAKBgQDpppdU
-Wq4YsLgxwn1Y/GOwRQKelKv1re1566JItjqaKFE57krDOlpRwV3Y9LEF0J0p5h2y
-X3gETvCNrBthBS+nV9gSrWVdK3nrsi/17zPy8/Ch7RSB+mEFQF43Sc9t+mXvpbO9
-XUgwJR6Gw5+eo+pbHUOmu8oqdsP9zSXNtsh2rqMhMB8wHQYDVR0OBBYEFKBEMWQg
-Bviv+D205goQfGv7eM7NMAsGByqGSM44BAMFAAMvADAsAhR8GOuh8i+1O4cghVmR
-d4c/avo4ZAIUYSavrVjnDG6KOoswFp6H8+NqeRg=
+egEkO8yk8b6oUZCJqIPf4VrlnwaSi2ZegHtVJWQBTDv+z0kqA4GEAAKBgCx4d0Gq
+Z2m1mW4aeJZj8Z8xd0B1G8qY+1y3IAsgw/Q9z9URlylKn5g3UByw3iMnyK92JrFT
+KZapaV4oV35fhyAxoQmf+zq4MAgInt7+EW0kyh+AHWZveug1p2IX6RvGyaF8XVSG
+bc/duJfwqO6wCNUH4qZyIysEp7mVVzXM2XAAoyEwHzAdBgNVHQ4EFgQU4wq0i2wk
+utbmipTzFEZXYVkMeIcwCwYHKoZIzjgEAwUAAy8AMCwCFCvnJdeLlBZetlIxfCwD
+TvjyDfnVAhRvMrXeaY8U5IJysB/DDKqB26tzqA==
 -----END CERTIFICATE-----

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-private-key.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-private-key.pem?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-private-key.pem (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/bad-server-private-key.pem Fri Dec 14 19:18:25 2012
@@ -1,19 +1,15 @@
 Bag Attributes
     friendlyName: bad-server
-    localKeyID: 54 69 6D 65 20 31 33 35 35 33 32 36 32 38 35 30 39 32 
+    localKeyID: 54 69 6D 65 20 31 33 35 35 35 30 39 38 33 31 36 34 31 
 Key Attributes: <No Attributes>
------BEGIN DSA PRIVATE KEY-----
-Proc-Type: 4,ENCRYPTED
-DEK-Info: DES-EDE3-CBC,4FB2679B26611FB3
-
-3+GwfXJh094Uqsbacd+sPCgngQZctyhn9w87Muu0YT4MN27pDMuGy1059nhd5rkL
-Maf7Cfhn78kEvaPHisgWrQbpsoLQUmlKJPdmucmW9I/JNKTHNs8ePDL3h13gorWA
-COh9vrPWAJaLtGwUgdz9WbUipHLJkk4nsxlihlkkAuDAu136sEsvT5XiCguBOieK
-dJP76w6NC6ODbEAJAGFLy8pS3DfXxwkgCtDr/qh+ZhibQ7KtV24gMylnhrUvRHT9
-X2X/sqxRu3wXsgI8ty6KQfaOWTExNmXsfCQGHJeV7QbnknpAfEIJdSqsRwERqZbK
-09ATFPfhbBcz+vHLRVC7l5cxDhyxn/HQGoGZaqrZRL/QltVBpE47SuGUTib5HEMR
-2ERwnu+DmvbxHMbdrFY23NSm6708fBEAl5Z+7s9a65P0+PtnMkZmVnhz8z5DRoKF
-E7n9WtatcqqCE9+DkNvZbRxsk3H/4odrgGNTLfdXWJMSBvyeWsz2XRE2rBHUvX5M
-yWgl3g56lNzbGA+wAne27svjLwWdBU78i2eAEML1JiN0LS/w18mD3YFb98BfGuFU
-HWQGHqRpm/hBT4gMZlWYbMwNgfKUcf5N
------END DSA PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/ca-certificate.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/ca-certificate.pem?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/ca-certificate.pem (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/ca-certificate.pem Fri Dec 14 19:18:25 2012
@@ -1,22 +1,22 @@
 Bag Attributes
     friendlyName: ca
-    localKeyID: 54 69 6D 65 20 31 33 35 35 33 32 36 32 34 38 31 32 33 
-subject=/CN=127.0.0.1/O=Trust Me Inc.
-issuer=/CN=127.0.0.1/O=Trust Me Inc.
+    localKeyID: 54 69 6D 65 20 31 33 35 35 35 30 39 38 32 39 39 31 30 
+subject=/CN=Trusted.CA.com/O=Trust Me Inc.
+issuer=/CN=Trusted.CA.com/O=Trust Me Inc.
 -----BEGIN CERTIFICATE-----
-MIICtTCCAnOgAwIBAgIEYZXvpzALBgcqhkjOOAQDBQAwLDESMBAGA1UEAxMJMTI3
-LjAuMC4xMRYwFAYDVQQKEw1UcnVzdCBNZSBJbmMuMB4XDTEyMTIxMjE1MzA0OFoX
-DTEzMDMxMjE1MzA0OFowLDESMBAGA1UEAxMJMTI3LjAuMC4xMRYwFAYDVQQKEw1U
-cnVzdCBNZSBJbmMuMIIBuDCCASwGByqGSM44BAEwggEfAoGBAP1/U4EddRIpUt9K
-nC7s5Of2EbdSPO9EAMMeP4C2USZpRV1AIlH7WT2NWPq/xfW6MPbLm1Vs14E7gB00
-b/JmYLdrmVClpJ+f6AR7ECLCT7up1/63xhv4O1fnxqimFQ8E+4P208UewwI1VBNa
-FpEy9nXzrith1yrv8iIDGZ3RSAHHAhUAl2BQjxUjC8yykrmCouuEC/BYHPUCgYEA
-9+GghdabPd7LvKtcNrhXuXmUr7v6OuqC+VdMCz0HgmdRWVeOutRZT+ZxBxCBgLRJ
-FnEj6EwoFhO3zwkyjMim4TwWeotUfI0o4KOuHiuzpnWRbqN/C/ohNWLx+2J6ASQ7
-zKTxvqhRkImog9/hWuWfBpKLZl6Ae1UlZAFMO/7PSSoDgYUAAoGBAMafPpxSpjLs
-441KGPTicfIM6heKFCjhrd02MAU4P4zoa35L9qwmGKrKD+8/BijN1+zyY3OaidKE
-4XnUL/ikFEDqVfZvCsfEqh73dRcmElpc+iJHGEpzsWKwYFM2fBwv0XzElvpFoNQ0
-u/mo8DS2B3nQz8dlbR44TFqxBybTQl2koyEwHzAdBgNVHQ4EFgQUqS2SZxrR+SWw
-xTd0nhFsoqq6L5YwCwYHKoZIzjgEAwUAAy8AMCwCFC5QCvyhIjtEjoXYmEDiMuqc
-h0LqAhRaWpZkPSZChZMGPU/PbAq2cad0wQ==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 -----END CERTIFICATE-----

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/client-certificate.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/client-certificate.pem?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/client-certificate.pem (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/client-certificate.pem Fri Dec 14 19:18:25 2012
@@ -1,15 +1,15 @@
 -----BEGIN CERTIFICATE-----
-MIIC0DCCAo6gAwIBAgIEDd7FGzALBgcqhkjOOAQDBQAwLDESMBAGA1UEAxMJMTI3LjAuMC4xMRYw
-FAYDVQQKEw1UcnVzdCBNZSBJbmMuMCAXDTEyMTIxMjE1MzExNVoYDzIyODYwOTI2MTUzMTE1WjAl
-MRIwEAYDVQQDEwkxMjcuMC4wLjExDzANBgNVBAoTBkNsaWVudDCCAbcwggEsBgcqhkjOOAQBMIIB
-HwKBgQD9f1OBHXUSKVLfSpwu7OTn9hG3UjzvRADDHj+AtlEmaUVdQCJR+1k9jVj6v8X1ujD2y5tV
-bNeBO4AdNG/yZmC3a5lQpaSfn+gEexAiwk+7qdf+t8Yb+DtX58aophUPBPuD9tPFHsMCNVQTWhaR
-MvZ1864rYdcq7/IiAxmd0UgBxwIVAJdgUI8VIwvMspK5gqLrhAvwWBz1AoGBAPfhoIXWmz3ey7yr
-XDa4V7l5lK+7+jrqgvlXTAs9B4JnUVlXjrrUWU/mcQcQgYC0SRZxI+hMKBYTt88JMozIpuE8FnqL
-VHyNKOCjrh4rs6Z1kW6jfwv6ITVi8ftiegEkO8yk8b6oUZCJqIPf4VrlnwaSi2ZegHtVJWQBTDv+
-z0kqA4GEAAKBgBGma9Ll2T0CVSCr5KXMJmnAB9hFpsm9TI0ekt0yZyIKHQ6h42WIGKDczUgTOfcW
-Edg90zwyPJ0EzBLoU6smSerR9aZ5A3WX9859x9caO0aiL3zPX3LhkeAlH9wNRiYH3e6aZ6EjKPBE
-n/CxTHLbZt2N7EeAuUUjmJQgbBmAJzcLo0IwQDAdBgNVHQ4EFgQUTMpJvyWT4FPRIW8KoYG3ADnI
-j1owHwYDVR0jBBgwFoAUqS2SZxrR+SWwxTd0nhFsoqq6L5YwCwYHKoZIzjgEAwUAAy8AMCwCFCV4
-pLLLcr7NmWg1bzmQtyy1tMcuAhQeIEwJxFMCQegRyi/Rahsat/n0Ag==
+MIIC1jCCApSgAwIBAgIEEmfqOTALBgcqhkjOOAQDBQAwMTEXMBUGA1UEAxMOVHJ1c3RlZC5DQS5j
+b20xFjAUBgNVBAoTDVRydXN0IE1lIEluYy4wIBcNMTIxMjE0MTgzMDMxWhgPMjI4NjA5MjgxODMw
+MzFaMCUxEjAQBgNVBAMTCTEyNy4wLjAuMTEPMA0GA1UEChMGQ2xpZW50MIIBuDCCASwGByqGSM44
+BAEwggEfAoGBAP1/U4EddRIpUt9KnC7s5Of2EbdSPO9EAMMeP4C2USZpRV1AIlH7WT2NWPq/xfW6
+MPbLm1Vs14E7gB00b/JmYLdrmVClpJ+f6AR7ECLCT7up1/63xhv4O1fnxqimFQ8E+4P208UewwI1
+VBNaFpEy9nXzrith1yrv8iIDGZ3RSAHHAhUAl2BQjxUjC8yykrmCouuEC/BYHPUCgYEA9+Gghdab
+Pd7LvKtcNrhXuXmUr7v6OuqC+VdMCz0HgmdRWVeOutRZT+ZxBxCBgLRJFnEj6EwoFhO3zwkyjMim
+4TwWeotUfI0o4KOuHiuzpnWRbqN/C/ohNWLx+2J6ASQ7zKTxvqhRkImog9/hWuWfBpKLZl6Ae1Ul
+ZAFMO/7PSSoDgYUAAoGBAKmWqPj8fyDY7UpeqE+SsyqL9KEsCTFOyKvEK6F7vrcQCJslKOX/6jqO
+LR+wuwQ4TlZq55cJIxUHf2UeSdFMj1TF6ZSJnR6qLV7lWBFOam9DeSEB7KQXs23+X0sjAgJeFS7c
+pnXcweWA1+jZRSxBfHNPBMQFPtaMYxbgor5I1Z9Fo0IwQDAfBgNVHSMEGDAWgBTg3v95YW6gpkrK
+BmQJAYf8NKyBezAdBgNVHQ4EFgQUEZ8sHGI8iyTRLMQcdVzaqoP5u5EwCwYHKoZIzjgEAwUAAy8A
+MCwCFHlEDwQ4OzlUO38AiIixMtWfPMLIAhRSHwM/rfKMYOwoIgVMRvJLsX1P8g==
 -----END CERTIFICATE-----

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/client-private-key.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/client-private-key.pem?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/client-private-key.pem (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/client-private-key.pem Fri Dec 14 19:18:25 2012
@@ -1,19 +1,15 @@
 Bag Attributes
     friendlyName: client-certificate
-    localKeyID: 54 69 6D 65 20 31 33 35 35 33 32 36 32 36 37 33 39 33 
+    localKeyID: 54 69 6D 65 20 31 33 35 35 35 30 39 38 33 30 39 31 35 
 Key Attributes: <No Attributes>
------BEGIN DSA PRIVATE KEY-----
-Proc-Type: 4,ENCRYPTED
-DEK-Info: DES-EDE3-CBC,F00D220B53CEB289
-
-lovokbURPZUlwh8N/Ka+E4EaO2whFviCyqGjz6bZ4I1oEJlorXnDTB4C/NDZxBX0
-Y6mozpXWEzfkOqJ/+lTXlXA8ZZCCHbAcoFJy6GuPiUFLk4XO/BcFBEP0cVVJOg5g
-vkT9Angjd4fYE3lKcZtHnPYNHrLCd7LrzKvkVs3yYdkbAac9eRlMG1MHxv8hwRK1
-RVOxPe/YwDGPn1GCv0CpqkjtesWhDTKitbl7ODgSxf/YMInYgahWXoxK2xmz0/gL
-4p3kRyGyOShLHMN53xb2yeKA9WTRqKfYItKps1IYr7mO+ck5+jJODJdejXI2pif4
-ywHDLWvxpeqDyhK86m7XzlOXXD0KlZlj4nYuDxE6yuG3+28H2cB6ZKT1PmtvEgZ9
-sBnIE48o9gsyTPyP0ext96hPzPgXlocmbp4pi6gr34MPCtw+gZz1rKNGvqtSwHB1
-+I7QXHaL7BE9RmQvW7AwIlKEK9Lhl91kEChPjKTMdCr1K5Vr4F9psGEA98oHX1LU
-mKfCfn46kDu86bFLf9coRvgkd5ExE0iKbrQ7PjEaaYfI25QpMdcRJ1VChzc58Ryt
-SmOSh22iQVcWSG4vy074sw==
------END DSA PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----
+MIIBljBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIGqMibZiD/nsCAggA
+MBQGCCqGSIb3DQMHBAjK20z/4hSEXgSCAVChO1JkU0N80EzbiV00W2a00Bhh60Yz
+jPCrNaNUtuIwTgbd7yie9To6KZM0E7XLt6TbNWhn72PlVzeWCAq445Mk+ne4oM0e
+iYouKkLB30n1pmzj8ifhoJbFuW+p2mMUFoA8VP7E9OQ4ISEuzl7F2dO8piuL/+jx
+NI9idS3NFHj68VyNLLd0n5O5M4nP4FO93iC7xHAanh85Ya25iYTWqOD9uZKBRZ0X
+4DiVSewzWB+w4PUqDiZVWO0J4JNIFw+o0m5Ia34RgTT6Hpl3cXUlZv75pX4vqU6I
+3IhBS6EjppQ/DkpSixyBn67p9kUfLBhqFjwKZW1fIARMfzNCxIT6hXEl/W7SOO/M
+c3bTfewAgPkldGwBQ58jMThe7HKnHWks9/PEgCcZ3fA0fkd6oqANyOQJeed6UI4r
+guaGl6wcjkL76cLwEPl1Zha4ESdmL76+EmM=
+-----END ENCRYPTED PRIVATE KEY-----

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/server-certificate.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/server-certificate.pem?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/server-certificate.pem (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/server-certificate.pem Fri Dec 14 19:18:25 2012
@@ -1,15 +1,16 @@
 -----BEGIN CERTIFICATE-----
-MIIC0DCCAo6gAwIBAgIEFhpfqjALBgcqhkjOOAQDBQAwLDESMBAGA1UEAxMJMTI3LjAuMC4xMRYw
-FAYDVQQKEw1UcnVzdCBNZSBJbmMuMCAXDTEyMTIxMjE1MzA1OVoYDzIyODYwOTI2MTUzMDU5WjAl
-MRIwEAYDVQQDEwkxMjcuMC4wLjExDzANBgNVBAoTBlNlcnZlcjCCAbcwggEsBgcqhkjOOAQBMIIB
-HwKBgQD9f1OBHXUSKVLfSpwu7OTn9hG3UjzvRADDHj+AtlEmaUVdQCJR+1k9jVj6v8X1ujD2y5tV
-bNeBO4AdNG/yZmC3a5lQpaSfn+gEexAiwk+7qdf+t8Yb+DtX58aophUPBPuD9tPFHsMCNVQTWhaR
-MvZ1864rYdcq7/IiAxmd0UgBxwIVAJdgUI8VIwvMspK5gqLrhAvwWBz1AoGBAPfhoIXWmz3ey7yr
-XDa4V7l5lK+7+jrqgvlXTAs9B4JnUVlXjrrUWU/mcQcQgYC0SRZxI+hMKBYTt88JMozIpuE8FnqL
-VHyNKOCjrh4rs6Z1kW6jfwv6ITVi8ftiegEkO8yk8b6oUZCJqIPf4VrlnwaSi2ZegHtVJWQBTDv+
-z0kqA4GEAAKBgH/zx9IP1YEsWCz7UFx5hYmYRb2B045j9t754RdxD70/rnwILUVW/i+tks5BGi8E
-ZRtKf5g3XUJ9BLRW9t8lHWShpcy2ghILCVbd2W6AUFqr463rgQnRLAAcKgxBSkL3aO5zLsX3H1QN
-2MMhP0wdkdBLKzsZjlGqs5I9sVQRg3BBo0IwQDAdBgNVHQ4EFgQUyA04U2qpjuEvfvmHzZe98pjR
-9P4wHwYDVR0jBBgwFoAUqS2SZxrR+SWwxTd0nhFsoqq6L5YwCwYHKoZIzjgEAwUAAy8AMCwCFE4g
-rvQ0GgkfSdofbDXmQ07goYQwAhQFL+CsI9gA0wWb+F80lCUDBLiuAQ==
+MIIC5zCCAqSgAwIBAgIEChbq9jALBgcqhkjOOAQDBQAwMTEXMBUGA1UEAxMOVHJ1c3RlZC5DQS5j
+b20xFjAUBgNVBAoTDVRydXN0IE1lIEluYy4wIBcNMTIxMjE0MTgzMDMwWhgPMjI4NjA5MjgxODMw
+MzBaMDUxIjAgBgNVBAMTGUExLkdvb2QuU2VydmVyLmRvbWFpbi5jb20xDzANBgNVBAoTBlNlcnZl
+cjCCAbgwggEsBgcqhkjOOAQBMIIBHwKBgQD9f1OBHXUSKVLfSpwu7OTn9hG3UjzvRADDHj+AtlEm
+aUVdQCJR+1k9jVj6v8X1ujD2y5tVbNeBO4AdNG/yZmC3a5lQpaSfn+gEexAiwk+7qdf+t8Yb+DtX
+58aophUPBPuD9tPFHsMCNVQTWhaRMvZ1864rYdcq7/IiAxmd0UgBxwIVAJdgUI8VIwvMspK5gqLr
+hAvwWBz1AoGBAPfhoIXWmz3ey7yrXDa4V7l5lK+7+jrqgvlXTAs9B4JnUVlXjrrUWU/mcQcQgYC0
+SRZxI+hMKBYTt88JMozIpuE8FnqLVHyNKOCjrh4rs6Z1kW6jfwv6ITVi8ftiegEkO8yk8b6oUZCJ
+qIPf4VrlnwaSi2ZegHtVJWQBTDv+z0kqA4GFAAKBgQC42lt3e6UruZ3l3wjRExBX/B2OcAWtYmDQ
+3GM9OJ8PJFVb0DowFyvfRpA+jI8F5z34a/OFPKL7kMvYnwLMy5QZijTGu5dyvilWx2jwAOo+9iEb
+4dfBFP16ng6adl72IWKhHAAg0oXV7jmt6JjkS9xr/jpfW8BK3zRYzVdiV9rIO6NCMEAwHwYDVR0j
+BBgwFoAU4N7/eWFuoKZKygZkCQGH/DSsgXswHQYDVR0OBBYEFFTyL0z/UtEqloTYQWJfZqVOb95M
+MAsGByqGSM44BAMFAAMwADAtAhQKc5pwFuHVCWqjXWLqVBIF3XrM6wIVAJHWA2TIXenOzhSep1M3
+puFxe9aO
 -----END CERTIFICATE-----

Modified: qpid/proton/trunk/tests/proton_tests/ssl_db/server-private-key.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/server-private-key.pem?rev=1422049&r1=1422048&r2=1422049&view=diff
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/server-private-key.pem (original)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/server-private-key.pem Fri Dec 14 19:18:25 2012
@@ -1,19 +1,15 @@
 Bag Attributes
     friendlyName: server-certificate
-    localKeyID: 54 69 6D 65 20 31 33 35 35 33 32 36 32 35 33 38 30 37 
+    localKeyID: 54 69 6D 65 20 31 33 35 35 35 30 39 38 33 30 31 36 38 
 Key Attributes: <No Attributes>
------BEGIN DSA PRIVATE KEY-----
-Proc-Type: 4,ENCRYPTED
-DEK-Info: DES-EDE3-CBC,15C105C16ABDE413
-
-dEvTquT/pX9XLrdC2NdORIrj3tM7dWL4jNV7xnZO21DIIeTVIAQSCHS+hFL7a70E
-nfdMJoNfAuW8fx5EzC+//c6QaU88QGtKu2ZNICCh329wbwxwBOD9ZEd9gmaT5Kdy
-ruPDguk//JKKfMttgfOLdkBWo5o3MpKkHuzbhhpJfvXQ6HBclPnjp5psHHF+pW29
-sspbGtWs/B+mICQCaNIBKhMivjsJwKTWkvRXbPVwwYxli2uWwxL8wFfJkIg2AEX9
-F0b0MmxAaPk9dOLga1MCoCA6OvQXew+NdMLAgqKRalgx903qVtF6eSpBuY/MUpZq
-bQ347k2gJtRkgz47/KfJ58XE91KfiS2XGwqt3JPqN/R5ib53WBEzrz6oymbhKxEv
-fijKLm2wcXuJYvr2AB89FQBS1R1SsKawYat2U/1xtMNbstdzQsVbnENEYsc2nIfc
-WkOqWvBPEjquK3/F/Wo6aJ2AXiVZS7hg9/tj683xP6FcODQVQ95HfICjxFg6YwnP
-co8hKQqt2XobnGwRger2bcfu33KskbYFmwUzvEa8OQDv7xSt7IKBiLkR7uhK0355
-vg9qdEQjNOAMIJ3DIPv8Sg==
------END DSA PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----
+MIIBljBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIKcv83Z0zrVgCAggA
+MBQGCCqGSIb3DQMHBAiW9IJwgC3eiASCAVCj2emw+l9GfkrDMBCGBko5O5U7ax5g
+tawh5B1I0F4ybheZTEOADVm6ZsPKzxwcKccCIrxLHd80YgVSsZ3/yNXpRZzA4lOJ
+kNuTDcvp/3NY6IPVBs5w4oFIo2TH+L0r6Z1hiebRjVqZxsRE+pDby0veTTgwHOc+
+/G+3zfZ0zzkUaSsZLQY5anJbf1/A/oj7s/t68yf4/9VrXQwrkOucTMn9l+EgbYVU
+yBjCrTD5Qbuo5ceu3BMpruypxG6xeDHFGko7GbTgcav++p+vJW/KQSUZyYa1st/x
+ByRuUCzWEpM3b2YwMTZ68DwaqMEe8GeJ3d9Hr1miDyK64Qy63EPx5fItj1HJsPUA
+EBLBXLxZOkRCVvWDWkNcagbwdV/BEH8XrbHpouvr8dhA8n0eBha1Pk7+ageFtxr9
+KDYeg0Kb2MW9bKuQttfVAREXBJPMjDnDIOw=
+-----END ENCRYPTED PRIVATE KEY-----

Added: qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-certificate.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-certificate.pem?rev=1422049&view=auto
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-certificate.pem (added)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-certificate.pem Fri Dec 14 19:18:25 2012
@@ -0,0 +1,16 @@
+-----BEGIN CERTIFICATE-----
+MIIDFjCCAtSgAwIBAgIETVqSbTALBgcqhkjOOAQDBQAwMTEXMBUGA1UEAxMOVHJ1c3RlZC5DQS5j
+b20xFjAUBgNVBAoTDVRydXN0IE1lIEluYy4wIBcNMTIxMjE0MTgzMDMyWhgPMjI4NjA5MjgxODMw
+MzJaMDAxHTAbBgNVBAMMFCoucHJlZml4Ki5kb21haW4uY29tMQ8wDQYDVQQKEwZTZXJ2ZXIwggG4
+MIIBLAYHKoZIzjgEATCCAR8CgYEA/X9TgR11EilS30qcLuzk5/YRt1I870QAwx4/gLZRJmlFXUAi
+UftZPY1Y+r/F9bow9subVWzXgTuAHTRv8mZgt2uZUKWkn5/oBHsQIsJPu6nX/rfGG/g7V+fGqKYV
+DwT7g/bTxR7DAjVUE1oWkTL2dfOuK2HXKu/yIgMZndFIAccCFQCXYFCPFSMLzLKSuYKi64QL8Fgc
+9QKBgQD34aCF1ps93su8q1w2uFe5eZSvu/o66oL5V0wLPQeCZ1FZV4661FlP5nEHEIGAtEkWcSPo
+TCgWE7fPCTKMyKbhPBZ6i1R8jSjgo64eK7OmdZFuo38L+iE1YvH7YnoBJDvMpPG+qFGQiaiD3+Fa
+5Z8GkotmXoB7VSVkAUw7/s9JKgOBhQACgYEAtTrCQxV2e0FuTfvzW8IG9QHDEICOrC4DlOhbMf65
+TjVcZaNnAZ7TwVyEehb+RaV3/Duv2LvUldXpYIh3hlKf3ecm5kbenXnEJez831gEad0zyuzrvCrR
+wVuifTuNJvM7PabZufU1X0fIjCMX0fIT0H5DTXArHe+JOCN2/QFj+M6jdzB1MB8GA1UdIwQYMBaA
+FODe/3lhbqCmSsoGZAkBh/w0rIF7MDMGA1UdEQQsMCqCFmFsdGVybmF0ZS5uYW1lLm9uZS5jb22C
+EGFub3RoZXIubmFtZS5jb20wHQYDVR0OBBYEFPp5YaFvxNP+n7J2ZuThEGVd/pH8MAsGByqGSM44
+BAMFAAMvADAsAhRxAzK+dIQ+yh7hGg8hf32ysjdiVwIUY8PirevonQtkeXurYGatWL/eM64=
+-----END CERTIFICATE-----

Added: qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-private-key.pem
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-private-key.pem?rev=1422049&view=auto
==============================================================================
--- qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-private-key.pem (added)
+++ qpid/proton/trunk/tests/proton_tests/ssl_db/server-wc-private-key.pem Fri Dec 14 19:18:25 2012
@@ -0,0 +1,30 @@
+Bag Attributes
+    friendlyName: server-wc-certificate
+    localKeyID: 54 69 6D 65 20 31 33 35 35 35 30 39 38 33 31 39 34 33 
+Key Attributes: <No Attributes>
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----
+Bag Attributes
+    friendlyName: server-certificate
+    localKeyID: 54 69 6D 65 20 31 33 35 35 35 30 39 38 33 30 31 36 38 
+Key Attributes: <No Attributes>
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----



---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@qpid.apache.org
For additional commands, e-mail: commits-help@qpid.apache.org