What is the Certificate Profile Conformance Tool (CPCT)?
167 |
168 |
CPCT instantly analyzes certificates for conformance to a specific profile document and certificate profile. Results show pass or fail status for the certificate content and a brief explanation for failures. You can also download the test report as an .xls or .pdf.
If you need to analyze Federal PKI certificates for conformance to certificate profiles, then CPCT can help you. The following organizations will find CPCT especially useful:
182 |
183 |
Agencies and organizations that submit FPKI Annual Review PackagesTest your certificates and take corrective actions before submitting certificate samples.
184 |
Certificate IssuersUse CPCT to analyze certificates as part of a Quality Assurance process.
185 |
186 |
187 |
188 |
How Does This Work?
189 |
190 |
In-depth experience with Federal PKI certificates and certificate profiles is recommended.
191 |
192 |
The key steps are:
193 |
194 |
195 |
You select the Profile Document, Document Version, and Certificate Profile related to a certificate and then upload the certificate.
196 |
197 |
You receive the certificate's test results.
198 |
199 |
You can choose to download a test report in Microsoft Excel or Adobe PDF formats.
200 |
201 |
202 |
203 |
Usage Details
204 |
205 |
1. Certificate Profile Selection
206 | Specify the certificate profile you want to test using the drop-list selections.
207 |
208 |
Document Version - The most recent version available is automatically selected when you select the Profile Document.
212 |
Certificate Profile - Select the type of certificate you will test. For example, PIV Authentication.
213 |
214 |
215 |
2. Upload a Certificate
216 |
217 |
218 |
Upload a certificate (.crt, .pem, .cer, or .der) using either of these options:
219 |
220 |
Drag-and-drop your certificate to anywhere on the CPCT main screen. The Test Results display for the uploaded certificate.
221 |
Click the Upload Certificate button and browse to the certificate. Click it, and then click Open. The Test Results display for the uploaded certificate.
222 |
223 |
224 |
3. Review Certificate Test Results
225 |
226 |
227 |
The status banner will be green (certificate conforms) or red (doesn't conform) and will give a test summary:
228 |
229 |
230 |
Tested [n] fields: No Problems detected
231 |
Tested [n] fields: [m] problems detected
232 |
233 |
234 |
The Test Results columns provide the following:
235 |
236 |
Field - Types of fields and extensions in the certificate.
237 |
Content - Field and extension content.
238 |
Analysis - Displays a checkmark for "PASS" or state "FAIL" (with explanation) for each field and extension.
239 |
240 |
241 |
4. Download a Test Report
242 |
243 |
244 |
To download a Test Report, click the XLS or PDF button below the status banner.
245 |
246 |
247 |
248 |
Troubleshooting
249 |
250 |
Certificate Failures
251 |
252 |
253 |
Please check to ensure that the right Profile Document, Document Version, and Certificate Profile have been selected.
254 |
If you have questions about why a certificate failed, or you believe the analysis could be an error please contact us.
255 |
256 |
257 |
258 |
Application Error Messages
259 |
260 |
261 |
You can't upload files of this type. The permitted file extensions are: .crt, .cer, .pem, and .der.
262 |
263 |
264 |
What If I Can't Resolve an Issue?
265 |
266 |
267 |
GitHub - Create an issue in the CPCT Repository and attach the certificate. (You will need a GitHub account to do this: Join GitHub.)
268 |
Email us - fpki@gsa.gov and attach your certificate. (Please rename your certificate with .txt file extension.)
269 |
270 |
271 |
272 |
Feature Request
273 |
274 |
275 |
If you would like to suggest a new CPCT feature, create a GitHub issue in the CPCT Repository.
276 |
277 |
278 |
279 |
280 |
1. X.509 Certificate and Certificate Revocation List (CRL) Extensions Profile for the Shared Service Providers (SSP) Program Policy.
281 |
2. Federal Public Key Infrastructure (PKI) X.509 Certificate and CRL Extensions Profile.
282 |
3. X.509 Certificate and Certificate Revocation List (CRL) Extensions Profile for Personal Identity Verification Interoperable (PIV-I) Cards.
The GSA IDManagement.gov website automatically collects some basic system information to help measure site performance and volume of visitors. This information is also used to help GSA develop the site, analyze patterns of usage, address problem areas, and make the site more useful for you.
The GSA IDManagement.gov website automatically collects some basic system information to help measure site performance and volume of visitors. This information is also used to help GSA develop the site, analyze patterns of usage, address problem areas, and make the site more useful for you.
What is the Certificate Profile Conformance Tool (CPCT)?
10 |
11 |
CPCT is a friendly tool that instantly analyzes certificates for conformance to a specific profile document and certificate profile. It not only displays a certificate's test results but also the reason(s) for any nonconformance. What's more, you can download a Test Report (.xls or .pdf) to submit as part of a Federal PKI Annual Review package or retain for your organization's needs.
If you need to analyze Federal PKI certificates for conformance to certificate profiles, then CPCT can help you. The following organizations will find CPCT especially useful:
25 |
26 |
Agencies and organizations that submit FPKI Annual Review Packages - Use CPCT to analyze certificates and download Test Reports.
27 |
PIV or SSL/TLS Certificate Issuers - Use CPCT to analyze certificates as part of a Quality Assurance process.
28 |
Subscribers - Use CPCT to analyze certificates to determine who should correct certificate failures.
29 |
30 |
31 |
Operating System Requirements
32 |
33 |
34 |
Windows and macOS
35 |
iOS - Not recommended for CPCT
36 |
Android - Not recommended for CPCT
37 |
38 |
39 |
How Does This Work?
40 |
41 |
Note: In-depth experience with Federal PKI certificates and certificate profiles is recommended.
42 |
43 |
The key steps are:
44 |
45 |
46 |
You select the Profile Document, Document Version, and Certificate Profile related to a certificate and then upload the certificate.
47 |
48 |
You receive the certificate's test results.
49 |
50 |
You can choose to download a formatted Test Report (.xls or .pdf) to submit as part of a Federal PKI Annual Review package or to retain for your organization's needs.
Profile Document - This list contains short names for the FPKI Profile Documents: Common Policy SSP Program1; Federal PKI/Federal Bridge2; and PIV Interoperable (PIV-I).3
64 |
Document Version - The most recent Version is automatically set when you select the Profile Document.
65 |
Certificate Profile - For example, PIV Authentication.
66 |
67 |
68 |
2. Upload a Certificate
69 |
70 |
71 |
Upload a certificate (.ctr, .pem, .cer, or .der file) using either of these options:
72 |
73 |
Drag-and-drop your certificate to anywhere on the CPCT main screen. The Test Results display for the uploaded certificate.
74 |
Click the Upload Certificate button and browse to the certificate. Click it, and then click Open. The Test Results display for the uploaded certificate.
75 |
76 |
77 |
3. Review Certificate Test Results
78 |
Note: The Test Results screen includes the CPCT drop-downs so you can easily upload more certificates.
79 |
80 |
The status banner will be green (certificate conforms) or red (doesn't conform) and will give a test summary:
81 |
82 |
83 |
Tested [n] fields: No Problems detected
84 |
Tested [n] fields: [n] problems detected
85 |
86 |
87 |
The Test Results columns provide the following:
88 |
89 |
Field - Lists fields AND extensions.
90 |
Content - Lists field and extension details.
91 |
Analysis - Displays a checkmark for "PASS" or state "FAIL" (with explanation) for each field and extension.
92 |
93 |
94 |
4. Download a Test Report
95 |
96 |
97 |
To download a Test Report, click the XLS or PDF button below the status banner.
98 |
99 |
100 |
Troubleshooting
101 |
102 |
Certificate Failures
103 |
104 |
105 |
Please check to ensure that the right Profile Document, Document Version, and Certificate Profile have been selected.
106 |
If you have questions about why a certificate failed, or you believe the failure could be a "false positive"/"false negative," please contact us.
107 |
108 |
109 |
110 |
Application Error Messages
111 |
112 |
113 |
You can't upload files of this type. The allowable file types are: .crt, .cer, .pem, and .der.
114 |
115 |
116 |
What If I Can't Resolve an Issue?
117 |
118 |
119 |
GitHub - Create an issue in the CPCT Repository and attach the certificate. (Note: You will need a GitHub account to do this: Join GitHub.)
120 |
Email us - fpki@gsa.gov and attach your certificate. (Note: Please rename your certificate with .txt file extension.)
121 |
122 |
123 |
We will respond as soon as possible.
124 |
125 |
Feature Request
126 |
127 |
128 |
If you would like to suggest a new CPCT feature, create a GitHub issue in the CPCT Repository.
129 |
130 |
131 |
____________
132 |
1. X.509 Certificate and Certificate Revocation List (CRL) Extensions Profile for the Shared Service Providers (SSP) Program Policy.
133 | 2. Federal Public Key Infrastructure (PKI) X.509 Certificate and CRL Extensions Profile.
134 | 3. X.509 Certificate and Certificate Revocation List (CRL) Extensions Profile for Personal Identity Verification Interoperable (PIV-I) Cards.
What is the Certificate Profile Conformance Tool (CPCT)?
10 |
11 |
CPCT is a friendly tool that instantly analyzes certificates for conformance to a specific profile document and certificate profile. It not only displays a certificate's test results but also the reason(s) for any nonconformance. What's more, you can download a Test Report (.xls or .pdf) to submit as part of a Federal PKI Annual Review package or retain for your organization's needs.
If you need to analyze Federal PKI certificates for conformance to certificate profiles, then CPCT can help you. The following organizations will find CPCT especially useful:
25 |
26 |
Agencies and organizations that submit FPKI Annual Review Packages - Use CPCT to analyze certificates and download Test Reports.
27 |
PIV or SSL/TLS Certificate Issuers - Use CPCT to analyze certificates as part of a Quality Assurance process.
28 |
Subscribers - Use CPCT to analyze certificates to determine who should correct certificate failures.
29 |
30 |
31 |
Operating System Requirements
32 |
33 |
34 |
Windows and macOS
35 |
iOS - Not recommended for CPCT
36 |
Android - Not recommended for CPCT
37 |
38 |
39 |
How Does This Work?
40 |
41 |
Note: In-depth experience with Federal PKI certificates and certificate profiles is recommended.
42 |
43 |
The key steps are:
44 |
45 |
46 |
You select the Profile Document, Document Version, and Certificate Profile related to a certificate and then upload the certificate.
47 |
48 |
You receive the certificate's test results.
49 |
50 |
You can choose to download a formatted Test Report (.xls or .pdf) to submit as part of a Federal PKI Annual Review package or to retain for your organization's needs.
Profile Document - This list contains short names for the FPKI Profile Documents: Common Policy SSP Program1; Federal PKI/Federal Bridge2; and PIV Interoperable (PIV-I).3
64 |
Document Version - The most recent Version is automatically set when you select the Profile Document.
65 |
Certificate Profile - For example, PIV Authentication.
66 |
67 |
68 |
2. Upload a Certificate
69 |
70 |
71 |
Upload a certificate (.ctr, .pem, .cer, or .der file) using either of these options:
72 |
73 |
Drag-and-drop your certificate to anywhere on the CPCT main screen. The Test Results display for the uploaded certificate.
74 |
Click the Upload Certificate button and browse to the certificate. Click it, and then click Open. The Test Results display for the uploaded certificate.
75 |
76 |
77 |
3. Review Certificate Test Results
78 |
Note: The Test Results screen includes the CPCT drop-downs so you can easily upload more certificates.
79 |
80 |
The status banner will be green (certificate conforms) or red (doesn't conform) and will give a test summary:
81 |
82 |
83 |
Tested [n] fields: No Problems detected
84 |
Tested [n] fields: [n] problems detected
85 |
86 |
87 |
The Test Results columns provide the following:
88 |
89 |
Field - Lists fields AND extensions.
90 |
Content - Lists field and extension details.
91 |
Analysis - Displays a checkmark for "PASS" or state "FAIL" (with explanation) for each field and extension.
92 |
93 |
94 |
4. Download a Test Report
95 |
96 |
97 |
To download a Test Report, click the XLS or PDF button below the status banner.
98 |
99 |
100 |
Troubleshooting
101 |
102 |
Certificate Failures
103 |
104 |
105 |
Please check to ensure that the right Profile Document, Document Version, and Certificate Profile have been selected.
106 |
If you have questions about why a certificate failed, or you believe the failure could be a "false positive"/"false negative," please contact us.
107 |
108 |
109 |
110 |
Application Error Messages
111 |
112 |
113 |
You can't upload files of this type. The allowable file types are: .crt, .cer, .pem, and .der.
114 |
115 |
116 |
What If I Can't Resolve an Issue?
117 |
118 |
119 |
GitHub - Create an issue in the CPCT Repository and attach the certificate. (Note: You will need a GitHub account to do this: Join GitHub.)
120 |
Email us - fpki@gsa.gov and attach your certificate. (Note: Please rename your certificate with .txt file extension.)
121 |
122 |
123 |
We will respond as soon as possible.
124 |
125 |
Feature Request
126 |
127 |
128 |
If you would like to suggest a new CPCT feature, create a GitHub issue in the CPCT Repository.
129 |
130 |
131 |
____________
132 |
1. X.509 Certificate and Certificate Revocation List (CRL) Extensions Profile for the Shared Service Providers (SSP) Program Policy.
133 | 2. Federal Public Key Infrastructure (PKI) X.509 Certificate and CRL Extensions Profile.
134 | 3. X.509 Certificate and Certificate Revocation List (CRL) Extensions Profile for Personal Identity Verification Interoperable (PIV-I) Cards.
135 |
136 |
137 |
138 |
--------------------------------------------------------------------------------
/docs/profile-config.xlsx:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/GSA/fpkilint/f380bc1c902b4dcd2a134eadabdd2ecc5a38e211/docs/profile-config.xlsx
--------------------------------------------------------------------------------
/docs/sample.md:
--------------------------------------------------------------------------------
1 | ### Below is actual tool output reformatted for this page
2 |
3 | | **Field** | **Content** | **Analysis** |
4 | | :-------- | :------------------------------- | :------------------------------------------------------ |
5 | | Version | v3 | PASS |
6 | | Serial Number | 5B 25 58 A5 (4 octets) | PASS |
7 | | Signature Algorithm | sha256-rsa (1.2.840.113549.1.1.11) | PASS |
8 | | Issuer DN | OU (2.5.4.11) = (Printable) Entrust Managed Services SSP CA, OU (2.5.4.11) = (Printable) Certification Authorities, O (2.5.4.10) = (Printable) Entrust, C (2.5.4.6) = (Printable) US | PASS |
9 | | Validity Period | Not Before: 2018-11-06 15:42:17+00:00 [utc_time] 181106154217Z
Not After: 2021-11-04 16:09:59+00:00 [utc_time] 211104160959Z
Validity period of 1094 days, 0:27:42 Expires in 994 days, 0:43:14 | PASS |
10 | | Subject DN | User ID (0.9.2342.19200300.100.1.1) = (Printable) 47001003572881, CN (2.5.4.3) = (Printable) JOHN RYAN (Affiliate), OU (2.5.4.11) = (Printable) General Services Administration, O (2.5.4.10) = (Printable) U.S. Government, C (2.5.4.6) = (Printable) US | PASS |
11 | | Subject Public Key | RSA-2048 (1.2.840.113549.1.1.1)
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| PASS |
12 | | Key Usage | Critical = TRUE digitalSignature (0) | PASS |
13 | | Extended Key Usage | Client Authentication (1.3.6.1.5.5.7.3.2) Microsoft Smart Card Logon (1.3.6.1.4.1.311.20.2.2) Any Extended Key Usage (2.5.29.37.0) | PASS |
14 | | Subject Key Identifier | Key ID: 6FC5CBBE574013F7C60596AC59C54F79BC0F3E55 | PASS |
15 | | Authority Key Identifier | Key ID: 55B46C333FE3601AA7FFC3EDB4F7E404DA29D063 | PASS |
16 | | Subject Alternate Name | Other Name: UPN: 0000000000@GSA.GOV Other Name: FASCN: D1 38 10 D8 21 09 2D CC D4 53 45 A1 68 5A 01 0E 6B C4 4C 59 81 38 10 D7 FA URI: (UUID) urn:uuid:7b878890-1001-014a-a8a3-53b5e15d43d1 | PASS |
17 | | CRL Distribution Points | [1] Distribution Point Full Name URI: http://sspweb.managed.entrust.com/CRLs/EMSSSPCA2.crl URI: ldap://sspdir.managed.entrust.com/cn=WinCombined2,ou=Entrust Managed Services SSP CA,ou=Certification Authorities,o=Entrust,c=US?certificateRevocationList;binary [2] Distribution Point Full Name Directory Name: CN = CRL13296, OU = Entrust Managed Services SSP CA, OU = Certification Authorities, O = Entrust, C = US | PASS |
18 | | Authority Information Access | [1] Certification Authority Issuers: URI: http://sspweb.managed.entrust.com/AIA/CertsIssuedToEMSSSPCA.p7c [2] Certification Authority Issuers: URI: ldap://sspdir.managed.entrust.com/ou=Entrust Managed Services SSP CA,ou=Certification Authorities,o=Entrust,c=US?cACertificate;binary,crossCertificatePair;binary [3] On-line Certificate Status Protocol: URI: http://ocsp.managed.entrust.com/OCSP/EMSSSPCAResponder | PASS |
19 | | Certificate Policies | [1] 2.16.840.1.101.3.2.1.3.13 (id-fpki-common-authentication) | PASS |
20 | | PIV NACI | BOOLEAN { FALSE } | PASS |
21 |
--------------------------------------------------------------------------------
/testdata/README.md:
--------------------------------------------------------------------------------
1 | Test data
2 |
--------------------------------------------------------------------------------
/testdata/certs/README.md:
--------------------------------------------------------------------------------
1 | ## Test Certificates
2 |
3 | This directory contains certificates used for testing. Although some certificates found here are legitimate, others are not. No certificates found in this repository should be used for any purpose other than testing.
4 |
--------------------------------------------------------------------------------
/testdata/certs/parse_cert_base64.cer:
--------------------------------------------------------------------------------
1 | MIIGkjCCBXqgAwIBAgIUKHPqnR7PYcYFowAuxEkWfNsuHHwwDQYJKoZIhvcNAQEL
2 | BQAwVzELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVudDENMAsG
3 | A1UECxMERlBLSTEfMB0GA1UEAxMWRmVkZXJhbCBCcmlkZ2UgQ0EgMjAxNjAeFw0x
4 | NjEyMTUxNjI4NDdaFw0xOTEyMTUxNTUxMjJaMGwxCzAJBgNVBAYTAlVTMRYwFAYD
5 | VQQKEw1DZXJ0aVBhdGggTExDMSIwIAYDVQQLExlDZXJ0aWZpY2F0aW9uIEF1dGhv
6 | cml0aWVzMSEwHwYDVQQDExhDZXJ0aVBhdGggQnJpZGdlIENBIC0gRzIwggEiMA0G
7 | CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDS1uJF4kar8AYSXzfbs9dhQPj9g9+D
8 | D8Tre0xl5Y5tqZSdgi872h/P8prDHUlnSQUtTPBZsLzS9cNwOmbs5LCYz4pALvJG
9 | N3XKd5q5JPXgjzkQwMBrX7F8GcrC4rhGg1qWw3Rzmh5yOqllNDejiPoTV+fBIw6S
10 | BgtVkHYaNbRzkz3OR3+f4TqTP9vb/8K+5Mko7Gfu57L5JuazYbiTcz7C7IM1Wief
11 | wVcjqZWctuBSjPGONzI0eKLGZvmtntM54qsOv673I3BmGm2Gs52X0BtRl6Mn9lXm
12 | vggoKYFIZVWn4JMBLPIs5fKyKbwc14hQIBULhiLbqMvdjyWw7ON9HwP3AgMBAAGj
13 | ggM/MIIDOzAPBgNVHRMBAf8EBTADAQH/MIGIBgNVHSAEgYAwfjAMBgpghkgBZQMC
14 | AQMDMAwGCmCGSAFlAwIBAwwwDAYKYIZIAWUDAgEDDjAMBgpghkgBZQMCAQMPMAwG
15 | CmCGSAFlAwIBAyUwDAYKYIZIAWUDAgEDJjAMBgpghkgBZQMCAQMSMAwGCmCGSAFl
16 | AwIBAxMwDAYKYIZIAWUDAgEDFDBTBggrBgEFBQcBAQRHMEUwQwYIKwYBBQUHMAKG
17 | N2h0dHA6Ly9odHRwLmZwa2kuZ292L2JyaWRnZS9jYUNlcnRzSXNzdWVkVG9mYmNh
18 | MjAxNi5wN2MwggFBBgNVHSEEggE4MIIBNDAaBgpghkgBZQMCAQMSBgwrBgEEAYG7
19 | UwEBAQcwGgYKYIZIAWUDAgEDEwYMKwYBBAGBu1MBAQEIMBoGCmCGSAFlAwIBAxQG
20 | DCsGAQQBgbtTAQEBCTAaBgpghkgBZQMCAQMlBgwrBgEEAYG7UwEBARcwGgYKYIZI
21 | AWUDAgEDDAYMKwYBBAGBu1MBAQEDMBoGCmCGSAFlAwIBAwwGDCsGAQQBgbtTAQEB
22 | AjAaBgpghkgBZQMCAQMDBgwrBgEEAYG7UwEBAQEwGgYKYIZIAWUDAgEDDwYMKwYB
23 | BAGBu1MBAQEGMBoGCmCGSAFlAwIBAw8GDCsGAQQBgbtTAQEBBTAaBgpghkgBZQMC
24 | AQMOBgwrBgEEAYG7UwEBAQQwGgYKYIZIAWUDAgEDJgYMKwYBBAGBu1MBAQEYMF4G
25 | CCsGAQUFBwELBFIwUDBOBggrBgEFBQcwBYZCaHR0cDovL2NlcnRpcGF0aC1zaWEu
26 | c3ltYXV0aC5jb20vSXNzdWVkQnktQ2VydGlQYXRoQnJpZGdlQ0EtRzIucDdjMAwG
27 | A1UdJAQFMAOBAQEwCgYDVR02BAMCAQAwDgYDVR0PAQH/BAQDAgEGMB8GA1UdIwQY
28 | MBaAFCOws30WVNQCVnbrOr6pay9DeygWMDkGA1UdHwQyMDAwLqAsoCqGKGh0dHA6
29 | Ly9odHRwLmZwa2kuZ292L2JyaWRnZS9mYmNhMjAxNi5jcmwwHQYDVR0OBBYEFNDC
30 | jBM3M3ZKkag84ei3/aKc0d0UMA0GCSqGSIb3DQEBCwUAA4IBAQCnC71Bbx1XnKpj
31 | nV6IjhexQKvAcwpzUAKa+Ypa9UcD2hscKrIXSwCzSaUf2u+DwD2ts9rLNsFWMdvX
32 | l+L22f+eXNHJ/wiXbnJ5+jqb5wbSH+fHPg9mtLUBhX3nYK3CsB8CECgwr1Tzuxkx
33 | l0I85UNw5qFUk52HDqZY/YmV7w/iSVy+KWbt+V2xYu26nDorj1VpkGt60PJlXfix
34 | 1A0rqIsd5RhISGtBMsuTGVNHwJvclmkqnv3mN6zKE+osD9I9B2NfDLj7VuyQmJeh
35 | BOGT0YqaM9sthOOZaMN1AcubkqEAG8rGSw7CRLJGNhTsgkL4wj2O2Q+mXhxOSgQk
36 | KCyEU0C/
37 |
--------------------------------------------------------------------------------
/testdata/certs/parse_cert_binary.cer:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/GSA/fpkilint/f380bc1c902b4dcd2a134eadabdd2ecc5a38e211/testdata/certs/parse_cert_binary.cer
--------------------------------------------------------------------------------
/testdata/certs/parse_cert_not_cert.p7b:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/GSA/fpkilint/f380bc1c902b4dcd2a134eadabdd2ecc5a38e211/testdata/certs/parse_cert_not_cert.p7b
--------------------------------------------------------------------------------
/testdata/certs/parse_cert_not_cert.pem:
--------------------------------------------------------------------------------
1 | -----BEGIN RSA PRIVATE KEY-----
2 | MIIEowIBAAKCAQEA0CtNmDWo9S7UgwzS4i5EGbo0CXY7s+f1ts5DYbnM521C4egc
3 | AzEUhxhJiozhdyW/cfNiWRVyQZSypS/cIu4k7G143sR18PjIREpH3So8OJi2PuE2
4 | MEXcwgjt4RQ7GYqBkjfOoT68VgO66B5l7JFiA4hbQ+GkvJsotoHAVtyWol8Z/6qt
5 | IOVfEcfVisogVLzdoZOegaiFQ4Q0H0HkJWsHFttezqu9C5zZAI/0PqSyPJmp34Zc
6 | TWdwYfo2+KX+a+OtIQAgi7eu+JVG3G0cmqX3mj9RTd4PGvW6gXkmNNRu5YJepDl5
7 | ehb77uF8aHGHT8gkHjJb5Sszz0lMxxe5KrMo4QIDAQABAoIBAAKz/T7zu2zrncDR
8 | 4s8jEKlQ3KoeyemtImisRv223u1GYu7yB6MW+RBEBXhyGd9lMxY0tds4RxKI7sTs
9 | WSxu8TXMuhwSawGlCVyxpjs9+Cg3+23XmM+JqLMwUH5yt82+Ga6fYOSBHwry43Nu
10 | KZ6nyKEJHT5FaNE2JpIwHyJBnQcgtQKoDkxddUnmwcq6f9vcWo/BzrZZBH3KOvi2
11 | A0ialSmKVkGiLht4xx5kieJ00K8h8OG9N7+8+KLgG3RW6Yz0VOzzG9hAHyT3j50e
12 | P+sBC+Ut/0UEi3EbqcENbYpA9F/eQxBsQ48r3SGhBaoleMFnk0pdz22UMFr6MhjH
13 | R+nXp30CgYEA8HThxobrcKoEGtyoN1alnUVHV4cDGKIw/t1tRw93WfM8BAm44qOi
14 | 8uJh3u5dLEOfRjOR1pYVilownAGU+1xLjln4v4Y3ul/ywr3nMsOVy+YOUMnA/iqc
15 | +4XcxO/QLyp4wERhDxBgrabMqYSoBjkiPZBP4k5PeYMfti4qMdStzLsCgYEA3aAf
16 | jSFrcg61FMfqYdCaSHMMqZop1azXCkHV0YtQGWX0P2dC8y2msbk06zMwnlrbs3xl
17 | Lxeq1FP5CTuLLdFb/ec03XQ2b5shSdsuD/fdD6jK41TwtP3aJCUR0saFtujfOReM
18 | nR77GmRP/1xgPvHZIdVzO4C2cgzS7df8qZe69RMCgYACJmlmZwpv5XVH8DUo2YN9
19 | loL+y1xBuiGKBdzWR9MfYMdmmdenXyMz3MZXQfZfUPN5ozhonMrwg8Hvgywb20Vp
20 | rnBE9iRFbFo1V5FbqNgMDLCQFF2/aA4jSZ0hvas04MJXpcTgZ5sVsmoeEeuWsqgV
21 | uNaeBWk8gumjrWH/NBGhxQKBgQCiPjt6zNFkkSG9UdDixJx9l0PY0VP46ewOxT1r
22 | hkogHcQdulGHxo62onf8CuB3vNoDXniQbgoQIF06hg2QgCiRCnZn/FBxiaZn8/2X
23 | kQOTGCVXIPKJ/SB5v2152P1AduAbYoL87xYyLudlcNHAororC6CtGb/2ZC7yEWEV
24 | Ik+qYwKBgF/ms+4D7fj1wG+6zKqMMGkEAQ3wz+l12o5609B12MvpuQkYWxUgQyWI
25 | c+LLkoirW0Ri5uebWeX23md8qOXG/bENpM9EVjHvRvzdReMU8oIomQBoRbbt1kFY
26 | JqWeRNaICDnhn2q9BHxAifSzhwdg/Dd/pClZzLM0M3XzavqiuzFe
27 | -----END RSA PRIVATE KEY-----
28 |
--------------------------------------------------------------------------------
/testdata/certs/parse_cert_pem.cer:
--------------------------------------------------------------------------------
1 | -----BEGIN CERTIFICATE-----
2 | MIIGkjCCBXqgAwIBAgIUKHPqnR7PYcYFowAuxEkWfNsuHHwwDQYJKoZIhvcNAQEL
3 | BQAwVzELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVudDENMAsG
4 | A1UECxMERlBLSTEfMB0GA1UEAxMWRmVkZXJhbCBCcmlkZ2UgQ0EgMjAxNjAeFw0x
5 | NjEyMTUxNjI4NDdaFw0xOTEyMTUxNTUxMjJaMGwxCzAJBgNVBAYTAlVTMRYwFAYD
6 | VQQKEw1DZXJ0aVBhdGggTExDMSIwIAYDVQQLExlDZXJ0aWZpY2F0aW9uIEF1dGhv
7 | cml0aWVzMSEwHwYDVQQDExhDZXJ0aVBhdGggQnJpZGdlIENBIC0gRzIwggEiMA0G
8 | CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDS1uJF4kar8AYSXzfbs9dhQPj9g9+D
9 | D8Tre0xl5Y5tqZSdgi872h/P8prDHUlnSQUtTPBZsLzS9cNwOmbs5LCYz4pALvJG
10 | N3XKd5q5JPXgjzkQwMBrX7F8GcrC4rhGg1qWw3Rzmh5yOqllNDejiPoTV+fBIw6S
11 | BgtVkHYaNbRzkz3OR3+f4TqTP9vb/8K+5Mko7Gfu57L5JuazYbiTcz7C7IM1Wief
12 | wVcjqZWctuBSjPGONzI0eKLGZvmtntM54qsOv673I3BmGm2Gs52X0BtRl6Mn9lXm
13 | vggoKYFIZVWn4JMBLPIs5fKyKbwc14hQIBULhiLbqMvdjyWw7ON9HwP3AgMBAAGj
14 | ggM/MIIDOzAPBgNVHRMBAf8EBTADAQH/MIGIBgNVHSAEgYAwfjAMBgpghkgBZQMC
15 | AQMDMAwGCmCGSAFlAwIBAwwwDAYKYIZIAWUDAgEDDjAMBgpghkgBZQMCAQMPMAwG
16 | CmCGSAFlAwIBAyUwDAYKYIZIAWUDAgEDJjAMBgpghkgBZQMCAQMSMAwGCmCGSAFl
17 | AwIBAxMwDAYKYIZIAWUDAgEDFDBTBggrBgEFBQcBAQRHMEUwQwYIKwYBBQUHMAKG
18 | N2h0dHA6Ly9odHRwLmZwa2kuZ292L2JyaWRnZS9jYUNlcnRzSXNzdWVkVG9mYmNh
19 | MjAxNi5wN2MwggFBBgNVHSEEggE4MIIBNDAaBgpghkgBZQMCAQMSBgwrBgEEAYG7
20 | UwEBAQcwGgYKYIZIAWUDAgEDEwYMKwYBBAGBu1MBAQEIMBoGCmCGSAFlAwIBAxQG
21 | DCsGAQQBgbtTAQEBCTAaBgpghkgBZQMCAQMlBgwrBgEEAYG7UwEBARcwGgYKYIZI
22 | AWUDAgEDDAYMKwYBBAGBu1MBAQEDMBoGCmCGSAFlAwIBAwwGDCsGAQQBgbtTAQEB
23 | AjAaBgpghkgBZQMCAQMDBgwrBgEEAYG7UwEBAQEwGgYKYIZIAWUDAgEDDwYMKwYB
24 | BAGBu1MBAQEGMBoGCmCGSAFlAwIBAw8GDCsGAQQBgbtTAQEBBTAaBgpghkgBZQMC
25 | AQMOBgwrBgEEAYG7UwEBAQQwGgYKYIZIAWUDAgEDJgYMKwYBBAGBu1MBAQEYMF4G
26 | CCsGAQUFBwELBFIwUDBOBggrBgEFBQcwBYZCaHR0cDovL2NlcnRpcGF0aC1zaWEu
27 | c3ltYXV0aC5jb20vSXNzdWVkQnktQ2VydGlQYXRoQnJpZGdlQ0EtRzIucDdjMAwG
28 | A1UdJAQFMAOBAQEwCgYDVR02BAMCAQAwDgYDVR0PAQH/BAQDAgEGMB8GA1UdIwQY
29 | MBaAFCOws30WVNQCVnbrOr6pay9DeygWMDkGA1UdHwQyMDAwLqAsoCqGKGh0dHA6
30 | Ly9odHRwLmZwa2kuZ292L2JyaWRnZS9mYmNhMjAxNi5jcmwwHQYDVR0OBBYEFNDC
31 | jBM3M3ZKkag84ei3/aKc0d0UMA0GCSqGSIb3DQEBCwUAA4IBAQCnC71Bbx1XnKpj
32 | nV6IjhexQKvAcwpzUAKa+Ypa9UcD2hscKrIXSwCzSaUf2u+DwD2ts9rLNsFWMdvX
33 | l+L22f+eXNHJ/wiXbnJ5+jqb5wbSH+fHPg9mtLUBhX3nYK3CsB8CECgwr1Tzuxkx
34 | l0I85UNw5qFUk52HDqZY/YmV7w/iSVy+KWbt+V2xYu26nDorj1VpkGt60PJlXfix
35 | 1A0rqIsd5RhISGtBMsuTGVNHwJvclmkqnv3mN6zKE+osD9I9B2NfDLj7VuyQmJeh
36 | BOGT0YqaM9sthOOZaMN1AcubkqEAG8rGSw7CRLJGNhTsgkL4wj2O2Q+mXhxOSgQk
37 | KCyEU0C/
38 | -----END CERTIFICATE-----
39 |
--------------------------------------------------------------------------------
/testdata/profiles/README.md:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------