-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Test 2.2 - subject change is not reflected in resulting request #3
Comments
It is true that the subject is not changed, the subject used during authentication, is used again in the CSR instead of proposing the new one. But actually, the new subject is proposed using the In this execution you have activated the RFC 7030 STRICT MODE (parameter When a client is authenticating using a shared secret, the RFC 7030 says that the client is free to ask for any subject name during the enrollment: it only has to set the requested subject name in the Subject attribute in the CSR passed to the EST server. But things get a bit more complicated when authentication is based on client certificates. In section 4.2.2 of the RFC 7030 (https://tools.ietf.org/html/rfc7030#section-4.2.2) we can read the following requirement/nightmare:
Maybe we are wrong, but we have interpreted the RFC in this way: if a EST client wants to request a new and different subject name,
You can observe that the ASN.1 dump found in the debug output above is the
In this strict (and painful) mode, note that the invocation to the pest tool is performed in this way:
In the non-strict mode (request subject is inserted directly in the Subject Name attribute in the CSR), invocation is done in this way:
In both cases/invocations, the returned X.509 certificate should have the subject I will not close this issue because in spite of not seeming a bug. I am really interested on your feedback about our interpretation of the RFC. It is a pretty dark point on the RFC and we are not completely confident of our implementation. PD: The extended attribute |
Hi, I think that "the new (requested) operational subject name must be inserted in a ChangeSubjectName attribute attached as an x509v3 extension in the CSR." is not correct.
When inserted as an extension request, it is added inside an pkcs_9_at_extensionRequest sequence in the attribute sequence, but it should be directly in the attribute sequence. Here is an example CSR where we put the ChangeSubjectName as an Attribute in the CSR.
It seems that Crypt::OpenSSL::PKCS10 does not have a method to add a raw attribute perhaps? |
Hi @primetomas , just a small typo, it is RFC 6402, not RFC 6408. |
Hi @primetomas Can you share an example on how you wrote your OpenSSL config file to generate that CSR? (particularly the sections related to ChangeSubjectName attribute)
I was expecting to see the SAN or the subject under And yes, agreed, it should be attached to |
@primetomas I agree, after reading that it is clear that the PD: sorry for the nearly 3 year delay. I forgot to handle this notification, and now I am in sync again with 2021 xD @Simkiw I suppose that you are getting this results because |
I didn't use OpenSSL to generate the CSR, but did it in Java using Bouncy Castle. Something like this (not runnable code):
|
Oh, that's another way of doing things :) |
DEVL_VM (@192.168.1.172/24) ~/pest/prebuild/pest-0.0.3/test $> ./test run 2.2
./test:DBG: Action 'run'
./test:OUT[test/2.2]: Running test 'Void whitelist, no enrollments' repeating it from a previous failure state (Once normalized, they still do not match (RSN '/CN=fail.testca/O=testca/C=ES', ESN '/CN=SN00000001/O=Electric/C=ES')).
./test:MSG: Running step '0'
./test:MSG: Running step/enroll '0/1'
./test:MSG: Command: ../pest -C /usr/share/ca-certificates/local/xxx.local.crt -l https://xxx.local:8443xxx -O -v -D -o out/rfc/test-2.2/step-0/in-1 -b 2048 -u xxx:xxx -c certs/dec001.pem -k certs/dec001.key -s /CN=SN00000001/O=Electric/C=ES -S /CN=fail.testca/O=testca/C=ES simpleenroll
../pest:MSG: Parameters:
../pest:MSG: - ca_file = </usr/share/ca-certificates/local/xxx.local.crt>
../pest:MSG: - client_key = <certs/dec001.key>
../pest:MSG: - client_pem = <certs/dec001.pem>
../pest:MSG: - creds = xxx:xxx
../pest:MSG: - est_url = https://xxx.local:8443xxx
../pest:MSG: - est_proto =
../pest:MSG: - est_host = <xxx.local>
../pest:MSG: - est_port = <8443>
../pest:MSG: - est_path =
../pest:MSG: - http_basic_username =
../pest:MSG: - http_basic_password =
../pest:MSG: - rsa_bits = <2048>
../pest:MSG: - subject = </CN=SN00000001/O=Electric/C=ES>
../pest:MSG: - subject_alt = not defined
../pest:MSG: - change_subject = </CN=fail.testca/O=testca/C=ES>
../pest:MSG: - change_subject_alt = not defined
../pest:MSG: - output_directory = <out/rfc/test-2.2/step-0/in-1>
../pest:MSG: - timestamp_prefix = not defined
../pest:MSG: - overwrite = <1>
../pest:DBG: Action 'simpleenroll'
../pest:MSG: Building a RSA key (2048 bits)
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/public.key' (application/pkcs8)
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/private.key' (application/pkcs8)
../pest:MSG: Building certificate signing request
../pest:MSG: - Requiring subject change '/CN=fail.testca/O=testca/C=ES'
../pest:DBG: ChangeSubject ASN.1 dump:
../pest:DBG: 0000 54: SEQUENCE {
../pest:DBG: 0002 52: SEQUENCE {
../pest:DBG: 0004 20: SET {
../pest:DBG: 0006 18: SEQUENCE {
../pest:DBG: 0008 3: OBJECT ID = 2.5.4.3
../pest:DBG: 000D 11: [UNIVERSAL 12]
../pest:DBG: 000F : 66 61 69 6C 2E 74 65 73 74 63 61 __ __ __ __ __ fail.testca
../pest:DBG: 001A : }
../pest:DBG: 001A : }
../pest:DBG: 001A 15: SET {
../pest:DBG: 001C 13: SEQUENCE {
../pest:DBG: 001E 3: OBJECT ID = 2.5.4.10
../pest:DBG: 0023 6: [UNIVERSAL 12]
../pest:DBG: 0025 : 74 65 73 74 63 61 __ __ __ __ __ __ __ __ __ __ testca
../pest:DBG: 002B : }
../pest:DBG: 002B : }
../pest:DBG: 002B 11: SET {
../pest:DBG: 002D 9: SEQUENCE {
../pest:DBG: 002F 3: OBJECT ID = 2.5.4.6
../pest:DBG: 0034 2: [UNIVERSAL 19]
../pest:DBG: 0036 : 45 53 __ __ __ __ __ __ __ __ __ __ __ __ __ __ ES
../pest:DBG: 0038 : }
../pest:DBG: 0038 : }
../pest:DBG: 0038 : }
../pest:DBG: 0038 : }
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/request.csr' (application/pkcs10)
../pest:DBG: Certificate Signing Request dump:
../pest:DBG: Certificate Request:
../pest:DBG: Data:
../pest:DBG: Version: 1 (0x0)
../pest:DBG: Subject: CN = SN00000001, O = Electric, C = ES
../pest:DBG: Subject Public Key Info:
../pest:DBG: Public Key Algorithm: rsaEncryption
../pest:DBG: RSA Public-Key: (2048 bit)
../pest:DBG: Modulus:
../pest:DBG: 00:b7:12:70:b0:c8:42:b9:10:91:08:86:d3:6f:e1:
../pest:DBG: 51:0a:d2:75:7f:5b:52:a6:b5:41:6f:f5:a4:6f:42:
../pest:DBG: 5f:f9:dc:98:9e:90:4c:af:ef:89:e0:0f:97:5e:d2:
../pest:DBG: 0c:3c:98:76:7b:92:68:39:3e:a6:38:e9:ce:62:5b:
../pest:DBG: 95:a5:fd:88:e4:55:21:64:62:ce:c2:f5:5c:8b:bc:
../pest:DBG: 50:a6:21:1a:d6:cc:63:9a:b6:15:75:40:ad:0a:b5:
../pest:DBG: c3:85:44:40:29:0c:f0:87:29:6a:7b:73:48:29:4c:
../pest:DBG: fc:52:cc:0b:94:d3:e6:59:9a:ea:c1:9b:e1:3d:d5:
../pest:DBG: 39:4b:28:d0:43:1c:c2:bc:85:7b:bb:27:8d:12:82:
../pest:DBG: 9a:1b:10:52:3e:42:c4:c3:78:c2:63:4a:03:71:0c:
../pest:DBG: 6d:72:d7:df:e5:4d:1c:1e:67:61:3f:82:4d:d6:ef:
../pest:DBG: ae:05:1b:24:b0:79:5d:c2:b9:c4:be:9d:bd:83:cc:
../pest:DBG: 2e:c4:a1:25:d7:12:9f:ce:1b:d4:d3:37:b7:4d:2f:
../pest:DBG: f6:86:ce:3d:64:1a:df:10:d5:16:a9:fe:54:f3:57:
../pest:DBG: c7:6c:4d:03:4f:f4:bf:64:95:c0:93:8a:c0:33:54:
../pest:DBG: e2:66:f3:87:99:93:27:08:20:ff:c8:2e:12:32:9d:
../pest:DBG: 94:cc:2e:08:bc:dd:63:e0:2d:bc:61:81:b1:3b:3e:
../pest:DBG: 47:85
../pest:DBG: Exponent: 65537 (0x10001)
../pest:DBG: Attributes:
../pest:DBG: Requested Extensions:
../pest:DBG: 1.3.6.1.5.5.7.7.36:
..U.est:DBG: 06041.0...U....fail.testca1.0
../pest:DBG: ..testca1.0...U....ES
../pest:DBG: Signature Algorithm: sha256WithRSAEncryption
../pest:DBG: 4f:5d:c1:d7:da:9e:0d:60:58:ea:2b:07:25:e4:cd:04:2b:09:
../pest:DBG: 28:6a:46:6e:ae:dd:0b:23:6d:f3:f3:d3:18:6a:2f:4d:75:ca:
../pest:DBG: 88:ac:cd:c5:3b:3c:88:ce:a9:bf:e3:dd:f1:1e:9d:70:81:47:
../pest:DBG: 6c:39:0d:95:91:3d:ae:34:22:2e:cf:df:5c:2d:9e:a1:cc:de:
../pest:DBG: fb:26:ec:48:fb:c1:d0:2d:ba:a9:dc:2c:33:84:d4:06:66:cf:
../pest:DBG: ba:65:6a:18:a8:fd:c8:c0:0e:e1:f8:eb:f9:25:a0:3c:99:38:
../pest:DBG: 41:2a:6c:d0:48:44:a7:6d:a6:8f:e9:c2:85:45:e5:96:89:f4:
../pest:DBG: 60:22:f6:28:b8:db:ef:f0:95:c9:cf:4a:14:d9:92:9c:47:33:
../pest:DBG: 1d:5c:71:c8:44:0c:71:d3:58:86:b1:71:e6:ec:50:1b:5c:39:
../pest:DBG: 76:de:50:9a:e5:71:86:42:a2:ac:60:bd:3f:20:8a:f8:b3:a2:
../pest:DBG: 73:20:1c:48:8d:1a:ad:36:d3:06:4d:14:1b:2e:61:c5:d6:35:
../pest:DBG: 74:ed:7a:85:d7:88:e7:2d:40:fd:55:91:08:c7:4e:85:e9:15:
../pest:DBG: 1f:a4:fd:3c:61:56:c4:39:05:c2:e1:86:38:70:d0:de:49:d0:
../pest:DBG: 16:6e:a5:4e:d4:41:6e:d8:d2:58:d5:d2:ef:82:5b:3a:61:a8:
../pest:DBG: 73:41:65:91
../pest:DBG: -----BEGIN CERTIFICATE REQUEST-----
../pest:DBG: MIIC0TCCAbkCAQAwNTETMBEGA1UEAwwKU04wMDAwMDAwMTERMA8GA1UECgwIRWxl
../pest:DBG: Y3RyaWMxCzAJBgNVBAYTAkVTMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
../pest:DBG: AQEAtxJwsMhCuRCRCIbTb+FRCtJ1f1tSprVBb/Wkb0Jf+dyYnpBMr++J4A+XXtIM
../pest:DBG: PJh2e5JoOT6mOOnOYluVpf2I5FUhZGLOwvVci7xQpiEa1sxjmrYVdUCtCrXDhURA
../pest:DBG: KQzwhylqe3NIKUz8UswLlNPmWZrqwZvhPdU5SyjQQxzCvIV7uyeNEoKaGxBSPkLE
../pest:DBG: w3jCY0oDcQxtctff5U0cHmdhP4JN1u+uBRsksHldwrnEvp29g8wuxKEl1xKfzhvU
../pest:DBG: 0ze3TS/2hs49ZBrfENUWqf5U81fHbE0DT/S/ZJXAk4rAM1TiZvOHmZMnCCD/yC4S
../pest:DBG: Mp2UzC4IvN1j4C28YYGxOz5HhQIDAQABoFcwVQYJKoZIhvcNAQkOMUgwRjBEBggr
../pest:DBG: BgEFBQcHJAQ4MDYwNDEUMBIGA1UEAwwLZmFpbC50ZXN0Y2ExDzANBgNVBAoMBnRl
../pest:DBG: c3RjYTELMAkGA1UEBhMCRVMwDQYJKoZIhvcNAQELBQADggEBAE9dwdfang1gWOor
../pest:DBG: ByXkzQQrCShqRm6u3QsjbfPz0xhqL011yoiszcU7PIjOqb/j3fEenXCBR2w5DZWR
../pest:DBG: Pa40Ii7P31wtnqHM3vsm7Ej7wdAtuqncLDOE1AZmz7plahio/cjADuH46/kloDyZ
../pest:DBG: OEEqbNBIRKdtpo/pwoVF5ZaJ9GAi9ii42+/wlcnPShTZkpxHMx1ccchEDHHTWIax
../pest:DBG: cebsUBtcOXbeUJrlcYZCoqxgvT8givizonMgHEiNGq020wZNFBsuYcXWNXTteoXX
../pest:DBG: iOctQP1VkQjHToXpFR+k/TxhVsQ5BcLhhjhw0N5J0BZupU7UQW7Y0ljV0u+CWzph
../pest:DBG: qHNBZZE=
../pest:DBG: -----END CERTIFICATE REQUEST-----
../pest:MSG: Pushing HTTP BASIC credentials
../pest:MSG: Performing EST request
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/http-request.raw' (unknown type)
../pest:DBG: === HTTP REQUEST ====
../pest:DBG: POST https://xxx.local:8443xxx/simpleenroll
../pest:DBG: Authorization: Basic bmV4dXM6bmV4dXM=
../pest:DBG: User-Agent: libwww-perl/6.49
../pest:DBG: Content-Length: 1054
../pest:DBG: Content-Type: application/pkcs10
../pest:DBG:
../pest:DBG: -----BEGIN CERTIFICATE REQUEST-----
../pest:DBG: MIIC0TCCAbkCAQAwNTETMBEGA1UEAwwKU04wMDAwMDAwMTERMA8GA1UECgwIRWxl
../pest:DBG: Y3RyaWMxCzAJBgNVBAYTAkVTMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
../pest:DBG: AQEAtxJwsMhCuRCRCIbTb+FRCtJ1f1tSprVBb/Wkb0Jf+dyYnpBMr++J4A+XXtIM
../pest:DBG: PJh2e5JoOT6mOOnOYluVpf2I5FUhZGLOwvVci7xQpiEa1sxjmrYVdUCtCrXDhURA
../pest:DBG: KQzwhylqe3NIKUz8UswLlNPmWZrqwZvhPdU5SyjQQxzCvIV7uyeNEoKaGxBSPkLE
../pest:DBG: w3jCY0oDcQxtctff5U0cHmdhP4JN1u+uBRsksHldwrnEvp29g8wuxKEl1xKfzhvU
../pest:DBG: 0ze3TS/2hs49ZBrfENUWqf5U81fHbE0DT/S/ZJXAk4rAM1TiZvOHmZMnCCD/yC4S
../pest:DBG: Mp2UzC4IvN1j4C28YYGxOz5HhQIDAQABoFcwVQYJKoZIhvcNAQkOMUgwRjBEBggr
../pest:DBG: BgEFBQcHJAQ4MDYwNDEUMBIGA1UEAwwLZmFpbC50ZXN0Y2ExDzANBgNVBAoMBnRl
../pest:DBG: c3RjYTELMAkGA1UEBhMCRVMwDQYJKoZIhvcNAQELBQADggEBAE9dwdfang1gWOor
../pest:DBG: ByXkzQQrCShqRm6u3QsjbfPz0xhqL011yoiszcU7PIjOqb/j3fEenXCBR2w5DZWR
../pest:DBG: Pa40Ii7P31wtnqHM3vsm7Ej7wdAtuqncLDOE1AZmz7plahio/cjADuH46/kloDyZ
../pest:DBG: OEEqbNBIRKdtpo/pwoVF5ZaJ9GAi9ii42+/wlcnPShTZkpxHMx1ccchEDHHTWIax
../pest:DBG: cebsUBtcOXbeUJrlcYZCoqxgvT8givizonMgHEiNGq020wZNFBsuYcXWNXTteoXX
../pest:DBG: iOctQP1VkQjHToXpFR+k/TxhVsQ5BcLhhjhw0N5J0BZupU7UQW7Y0ljV0u+CWzph
../pest:DBG: qHNBZZE=
../pest:DBG: -----END CERTIFICATE REQUEST-----
DEBUG: .../IO/Socket/SSL.pm:3010: new ctx 140736416768464
DEBUG: .../IO/Socket/SSL.pm:762: socket not yet connected
DEBUG: .../IO/Socket/SSL.pm:1177: global error: Undefined SSL object
DEBUG: .../IO/Socket/SSL.pm:1177: global error: Undefined SSL object
DEBUG: .../IO/Socket/SSL.pm:764: socket connected
DEBUG: .../IO/Socket/SSL.pm:787: ssl handshake not started
DEBUG: .../IO/Socket/SSL.pm:829: using SNI with hostname xxx.local
DEBUG: .../IO/Socket/SSL.pm:864: request OCSP stapling
DEBUG: .../IO/Socket/SSL.pm:880: set socket to non-blocking to enforce timeout=180
DEBUG: .../IO/Socket/SSL.pm:894: call Net::SSLeay::connect
DEBUG: .../IO/Socket/SSL.pm:897: done Net::SSLeay::connect -> -1
DEBUG: .../IO/Socket/SSL.pm:907: ssl handshake in progress
DEBUG: .../IO/Socket/SSL.pm:917: waiting for fd to become ready: SSL wants a read first
DEBUG: .../IO/Socket/SSL.pm:937: socket ready, retrying connect
DEBUG: .../IO/Socket/SSL.pm:894: call Net::SSLeay::connect
DEBUG: .../IO/Socket/SSL.pm:897: done Net::SSLeay::connect -> -1
DEBUG: .../IO/Socket/SSL.pm:907: ssl handshake in progress
DEBUG: .../IO/Socket/SSL.pm:917: waiting for fd to become ready: SSL wants a read first
DEBUG: .../IO/Socket/SSL.pm:937: socket ready, retrying connect
DEBUG: .../IO/Socket/SSL.pm:894: call Net::SSLeay::connect
DEBUG: .../IO/Socket/SSL.pm:2864: ok=1 [1] /C=DE/O=xxx Technology GmbH/OU=Sales/CN=Standalone CA/C=DE/O=xxx Technology GmbH/OU=Sales/CN=Standalone CA
DEBUG: .../IO/Socket/SSL.pm:2864: ok=1 [0] /C=DE/O=xxx Technology GmbH/OU=Sales/CN=Standalone CA/C=DE/O=xxx Technology GmbH/OU=Sales/CN=xxx.local/L=Berlin/ST=Berlin
DEBUG: .../IO/Socket/SSL.pm:1840: scheme=www cert=140736415374432
DEBUG: .../IO/Socket/SSL.pm:1850: identity=xxx.local cn=xxx.local alt=2 xxx.local
DEBUG: .../IO/Socket/SSL.pm:2911: did not get stapled OCSP response
DEBUG: .../IO/Socket/SSL.pm:897: done Net::SSLeay::connect -> 1
DEBUG: .../IO/Socket/SSL.pm:952: ssl handshake done
DEBUG: .../IO/Socket/SSL.pm:3059: free ctx 140736416768464 open=140736416768464
DEBUG: .../IO/Socket/SSL.pm:3063: free ctx 140736416768464 callback
DEBUG: .../IO/Socket/SSL.pm:3070: OK free ctx 140736416768464
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/http-response.raw' (unknown type)
../pest:DBG: === HTTP RESPONSE ====
../pest:DBG: HTTP/1.1 200 OK
../pest:DBG: Connection: close
../pest:DBG: Date: Thu, 12 Nov 2020 14:19:57 GMT
../pest:DBG: Content-Length: 4466
../pest:DBG: Content-Type: application/pkcs7-mime; smime-type=certs-only
../pest:DBG: Client-Date: Thu, 12 Nov 2020 14:19:41 GMT
../pest:DBG: Client-Peer: 192.168.56.201:8443
../pest:DBG: Client-Response-Num: 1
../pest:DBG: Client-SSL-Cert-Issuer: /C=DE/O=xxx Technology GmbH/OU=Sales/CN=Standalone CA
../pest:DBG: Client-SSL-Cert-Subject: /C=DE/O=xxx Technology GmbH/OU=Sales/CN=xxx.local/L=Berlin/ST=Berlin
../pest:DBG: Client-SSL-Cipher: TLS_AES_256_GCM_SHA384
../pest:DBG: Client-SSL-Socket-Class: IO::Socket::SSL
../pest:DBG: Client-SSL-Version: TLSv1_3
../pest:DBG: Content-Transfer-Encoding: base64
../pest:DBG:
../pest:DBG: MIIMugYJKoZIhvcNAQcCoIIMqzCCDKcCAQExADALBgkqhkiG9w0BBwGgggyPMIIDcjCCAxigAwIB
../pest:DBG: AgIQVknYzLrWf/Tjc4uNb4mtyjAKBggqhkjOPQQDAjBaMQswCQYDVQQGEwJERTEeMBwGA1UEChMV
../pest:DBG: TmV4dXMgVGVjaG5vbG9neSBHbWJIMQ4wDAYDVQQLEwVTYWxlczEbMBkGA1UEAxMSTmV4dXMgSXNz
../pest:DBG: dWluZyBDQSAxMB4XDTIwMTExMjE0MTk1NloXDTIwMTExMzE0MTk1NlowNTELMAkGA1UEBhMCRVMx
../pest:DBG: ETAPBgNVBAoTCEVsZWN0cmljMRMwEQYDVQQDEwpTTjAwMDAwMDAxMIIBIjANBgkqhkiG9w0BAQEF
../pest:DBG: AAOCAQ8AMIIBCgKCAQEAtxJwsMhCuRCRCIbTb+FRCtJ1f1tSprVBb/Wkb0Jf+dyYnpBMr++J4A+X
../pest:DBG: XtIMPJh2e5JoOT6mOOnOYluVpf2I5FUhZGLOwvVci7xQpiEa1sxjmrYVdUCtCrXDhURAKQzwhylq
../pest:DBG: e3NIKUz8UswLlNPmWZrqwZvhPdU5SyjQQxzCvIV7uyeNEoKaGxBSPkLEw3jCY0oDcQxtctff5U0c
../pest:DBG: HmdhP4JN1u+uBRsksHldwrnEvp29g8wuxKEl1xKfzhvU0ze3TS/2hs49ZBrfENUWqf5U81fHbE0D
../pest:DBG: T/S/ZJXAk4rAM1TiZvOHmZMnCCD/yC4SMp2UzC4IvN1j4C28YYGxOz5HhQIDAQABo4IBGDCCARQw
../pest:DBG: EwYDVR0lBAwwCgYIKwYBBQUHAwEwFQYDVR0RBA4wDIIKU04wMDAwMDAwMTBEBggrBgEFBQcHJAQ4
../pest:DBG: MDYwNDEUMBIGA1UEAwwLZmFpbC50ZXN0Y2ExDzANBgNVBAoMBnRlc3RjYTELMAkGA1UEBhMCRVMw
../pest:DBG: EwYDVR0jBAwwCoAIS/1sQvmzUQYwCwYDVR0PBAQDAgWgMH4GA1UdHwR3MHUwc6BxoG+GbWxkYXA6
../pest:DBG: Ly9jbTgubG9jYWwvQ049TmV4dXMlMjBJc3N1aW5nJTIwQ0ElMjAxLGNuPWNybCxjbj1wa2ksZGM9
../pest:DBG: bmV4dXMsZGM9bG9jYWw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdDtiaW5hcnkwCgYIKoZIzj0E
../pest:DBG: AwIDSAAwRQIhAPdybEZckXU/7BggEQAJy/XcA5Nj3B/go95nw5VemKG2AiBD5uHzJKNX2cyPDK4S
../pest:DBG: 8B3VZbmyDgYZAr+pJeLGwc3RFzCCAt0wggI+oAMCAQICEFQNV13RSFiTPaVFQds7xYcwCgYIKoZI
../pest:DBG: zj0EAwIwVTELMAkGA1UEBhMCREUxHjAcBgNVBAoTFU5leHVzIFRlY2hub2xvZ3kgR21iSDEOMAwG
../pest:DBG: A1UECxMFU2FsZXMxFjAUBgNVBAMTDU5leHVzIFJvb3QgQ0EwIBcNMjAwMjE5MTYxNDE5WhgPMjA1
../pest:DBG: NTAyMTkxNjE0MTlaMFUxCzAJBgNVBAYTAkRFMR4wHAYDVQQKExVOZXh1cyBUZWNobm9sb2d5IEdt
../pest:DBG: YkgxDjAMBgNVBAsTBVNhbGVzMRYwFAYDVQQDEw1OZXh1cyBSb290IENBMIGbMBAGByqGSM49AgEG
../pest:DBG: BSuBBAAjA4GGAAQB5Sgi4IJljaowqukcvhqDmx7iCF0zcHmUEWhoh0HTq1py0eilHYkLga60p2+l
../pest:DBG: PbM6m6F6kTxBVI19wuSAQZyRGXoA97EMpWKCOiQLiRqwk932r1z9i3P0m2y0J218gmmoZTf8WEgx
../pest:DBG: 3xFoTPPMhSn9kQhEpG0Re7PwlH4w6nYkvrsbFdujgaowgacwDwYDVR0TAQH/BAUwAwEB/zARBgNV
../pest:DBG: HQ4ECgQIQ7jcWO02k9cwcQYDVR0gBGowaDA2Bg4rBgEEAe9DAQEBAgEEATAkMCIGCCsGAQUFBwIB
../pest:DBG: FhZodHRwOi8vZXhhbXBsZS5jb20vY3BzMC4GDisGAQQB70MBAQECAQQBMBwwGgYIKwYBBQUHAgIw
../pest:DBG: DgwMRXhhbXBsZSB0ZXh0MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAgOBjAAwgYgCQgHys2af
../pest:DBG: VNAUuOPfyyY977iXBdf4LQhsEoPd+1LmJ/V2My6XiZ2fVx3GRk6rZtN2w19c8CKXLwFUjFKiixeJ
../pest:DBG: lojcdAJCAdWX/hMQkjxP8mhuNW1HxbpGLyyNxjkSZJOJKPUgGhEl17MXSYjtDAjeGApoanuKCuO0
../pest:DBG: GUMmAhlM9STCR1NclmmtMIIDMTCCApOgAwIBAgIQeeph2+kYQApRbfjcuZatazAKBggqhkjOPQQD
../pest:DBG: AjBVMQswCQYDVQQGEwJERTEeMBwGA1UEChMVTmV4dXMgVGVjaG5vbG9neSBHbWJIMQ4wDAYDVQQL
../pest:DBG: EwVTYWxlczEWMBQGA1UEAxMNTmV4dXMgUm9vdCBDQTAeFw0yMDAyMTkxNzAyNDJaFw0zNzAyMTkx
../pest:DBG: NzAyNDJaMF8xCzAJBgNVBAYTAkRFMR4wHAYDVQQKExVOZXh1cyBUZWNobm9sb2d5IEdtYkgxDjAM
../pest:DBG: BgNVBAsTBVNhbGVzMSAwHgYDVQQDExdOZXh1cyBJbnRlcm1lZGlhdGUgQ0EgMTBZMBMGByqGSM49
../pest:DBG: AgEGCCqGSM49AwEHA0IABFvGDviflkuGjRLyJ27z0BhZM3d8SpTbPWt7a+ukn39Xm4cUCIL5SUh6
../pest:DBG: P81FrtGYEnDFZltdIlLn+hMgQmwSFuGjggE5MIIBNTAPBgNVHRMBAf8EBTADAQH/MBEGA1UdDgQK
../pest:DBG: BAhCi8y2YNf5pjBxBgNVHSAEajBoMDYGDisGAQQB70MBAQECAQQBMCQwIgYIKwYBBQUHAgEWFmh0
../pest:DBG: dHA6Ly9leGFtcGxlLmNvbS9jcHMwLgYOKwYBBAHvQwEBAQIBBAEwHDAaBggrBgEFBQcCAjAODAxF
../pest:DBG: eGFtcGxlIHRleHQwEwYDVR0jBAwwCoAIQ7jcWO02k9cwDgYDVR0PAQH/BAQDAgEGMHcGA1UdHwRw
../pest:DBG: MG4wbKBqoGiGZmxkYXA6Ly9jbTgubG9jYWwvQ049TmV4dXMlMjBSb290JTIwQ0EsY249Y3JsLGNu
../pest:DBG: PXBraSxkYz1uZXh1cyxkYz1sb2NhbD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0O2JpbmFyeTAK
../pest:DBG: BggqhkjOPQQDAgOBiwAwgYcCQTsy3zO7kz5PPM7u6tCZW8RuiPi1q3IisINw2xmIgt8E5ypAhBmG
../pest:DBG: FkHV7vBEC56CHa9OSTdCqDlve/GSYMt7d+4bAkIAuurnLhUVX6q1XSrwX8zj36cjFCr0yA+AQPmd
../pest:DBG: mqeQuMetloMFaLkCXZEzisr4ktN5glVTd6FFOaVdtqHXEnVgL5UwggL/MIICpaADAgECAhBynFjK
../pest:DBG: m8Qx+JkamZADzHbdMAoGCCqGSM49BAMCMF8xCzAJBgNVBAYTAkRFMR4wHAYDVQQKExVOZXh1cyBU
../pest:DBG: ZWNobm9sb2d5IEdtYkgxDjAMBgNVBAsTBVNhbGVzMSAwHgYDVQQDExdOZXh1cyBJbnRlcm1lZGlh
../pest:DBG: dGUgQ0EgMTAeFw0yMDAyMTkyMTA5MzBaFw0yODAyMTkyMTA5MzBaMFoxCzAJBgNVBAYTAkRFMR4w
../pest:DBG: HAYDVQQKExVOZXh1cyBUZWNobm9sb2d5IEdtYkgxDjAMBgNVBAsTBVNhbGVzMRswGQYDVQQDExJO
../pest:DBG: ZXh1cyBJc3N1aW5nIENBIDEwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAARLuXDNiYCcYQttFDPc
../pest:DBG: n01tFuGE4DM2qj1nbKYLQBhwrF7tL1wck2Sar25Fb5CWVc4wSH+D2Q0H2RVXyXNZ2btIo4IBRjCC
../pest:DBG: AUIwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQIS/1sQvmzUQYwcQYDVR0gBGowaDA2Bg4rBgEE
../pest:DBG: Ae9DAQEBAgEEATAkMCIGCCsGAQUFBwIBFhZodHRwOi8vZXhhbXBsZS5jb20vY3BzMC4GDisGAQQB
../pest:DBG: 70MBAQECAQQBMBwwGgYIKwYBBQUHAgIwDgwMRXhhbXBsZSB0ZXh0MBMGA1UdIwQMMAqACEKLzLZg
../pest:DBG: 1/mmMA4GA1UdDwEB/wQEAwIBBjCBgwYDVR0fBHwwejB4oHagdIZybGRhcDovL2NtOC5sb2NhbC9D
../pest:DBG: Tj1OZXh1cyUyMEludGVybWVkaWF0ZSUyMENBJTIwMSxjbj1jcmwsY249cGtpLGRjPW5leHVzLGRj
../pest:DBG: PWxvY2FsP2NlcnRpZmljYXRlUmV2b2NhdGlvbkxpc3Q7YmluYXJ5MAoGCCqGSM49BAMCA0gAMEUC
../pest:DBG: IQDCwE5VPyDnKm4RrQC+2DZlen/ENLsMGlNb0w7zqfaWCQIgC5rgbPOxr1gGynEKKV19lcqVwYqu
../pest:DBG: TuFmTUvPtw+W3hMxAA==
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/response.pk7' (unknown type)
../pest:DBG: Got certificate!
../pest:DBG: Certificate:
../pest:DBG: Data:
../pest:DBG: Version: 3 (0x2)
../pest:DBG: Serial Number:
../pest:DBG: 56:49:d8:cc:ba:d6:7f:f4:e3:73:8b:8d:6f:89:ad:ca
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: Issuer: C = DE, O = xxx Technology GmbH, OU = Sales, CN = xxx Issuing CA 1
../pest:DBG: Validity
../pest:DBG: Not Before: Nov 12 14:19:56 2020 GMT
../pest:DBG: Not After : Nov 13 14:19:56 2020 GMT
../pest:DBG: Subject: C = ES, O = Electric, CN = SN00000001
../pest:DBG: Subject Public Key Info:
../pest:DBG: Public Key Algorithm: rsaEncryption
../pest:DBG: RSA Public-Key: (2048 bit)
../pest:DBG: Modulus:
../pest:DBG: 00:b7:12:70:b0:c8:42:b9:10:91:08:86:d3:6f:e1:
../pest:DBG: 51:0a:d2:75:7f:5b:52:a6:b5:41:6f:f5:a4:6f:42:
../pest:DBG: 5f:f9:dc:98:9e:90:4c:af:ef:89:e0:0f:97:5e:d2:
../pest:DBG: 0c:3c:98:76:7b:92:68:39:3e:a6:38:e9:ce:62:5b:
../pest:DBG: 95:a5:fd:88:e4:55:21:64:62:ce:c2:f5:5c:8b:bc:
../pest:DBG: 50:a6:21:1a:d6:cc:63:9a:b6:15:75:40:ad:0a:b5:
../pest:DBG: c3:85:44:40:29:0c:f0:87:29:6a:7b:73:48:29:4c:
../pest:DBG: fc:52:cc:0b:94:d3:e6:59:9a:ea:c1:9b:e1:3d:d5:
../pest:DBG: 39:4b:28:d0:43:1c:c2:bc:85:7b:bb:27:8d:12:82:
../pest:DBG: 9a:1b:10:52:3e:42:c4:c3:78:c2:63:4a:03:71:0c:
../pest:DBG: 6d:72:d7:df:e5:4d:1c:1e:67:61:3f:82:4d:d6:ef:
../pest:DBG: ae:05:1b:24:b0:79:5d:c2:b9:c4:be:9d:bd:83:cc:
../pest:DBG: 2e:c4:a1:25:d7:12:9f:ce:1b:d4:d3:37:b7:4d:2f:
../pest:DBG: f6:86:ce:3d:64:1a:df:10:d5:16:a9:fe:54:f3:57:
../pest:DBG: c7:6c:4d:03:4f:f4:bf:64:95:c0:93:8a:c0:33:54:
../pest:DBG: e2:66:f3:87:99:93:27:08:20:ff:c8:2e:12:32:9d:
../pest:DBG: 94:cc:2e:08:bc:dd:63:e0:2d:bc:61:81:b1:3b:3e:
../pest:DBG: 47:85
../pest:DBG: Exponent: 65537 (0x10001)
../pest:DBG: X509v3 extensions:
../pest:DBG: X509v3 Extended Key Usage:
../pest:DBG: TLS Web Server Authentication
../pest:DBG: X509v3 Subject Alternative Name:
../pest:DBG: DNS:SN00000001
../pest:DBG: 1.3.6.1.5.5.7.7.36:
..U.est:DBG: 06041.0...U....fail.testca1.0
../pest:DBG: ..testca1.0...U....ES
../pest:DBG: X509v3 Authority Key Identifier:
../pest:DBG: keyid:4B:FD:6C:42:F9:B3:51:06
../pest:DBG:
../pest:DBG: X509v3 Key Usage:
../pest:DBG: Digital Signature, Key Encipherment
../pest:DBG: X509v3 CRL Distribution Points:
../pest:DBG:
../pest:DBG: Full Name:
../pest:DBG: URI:ldap://xxx.local/CN=xxx%20Issuing%20CA%201,cn=crl,cn=pki,dc=xxx,dc=local?certificateRevocationList;binary
../pest:DBG:
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: 30:45:02:21:00:f7:72:6c:46:5c:91:75:3f:ec:18:20:11:00:
../pest:DBG: 09:cb:f5:dc:03:93:63:dc:1f:e0:a3:de:67:c3:95:5e:98:a1:
../pest:DBG: b6:02:20:43:e6:e1:f3:24:a3:57:d9:cc:8f:0c:ae:12:f0:1d:
../pest:DBG: d5:65:b9:b2:0e:06:19:02:bf:a9:25:e2:c6:c1:cd:d1:17
../pest:DBG: -----BEGIN CERTIFICATE-----
../pest:DBG: MIIDcjCCAxigAwIBAgIQVknYzLrWf/Tjc4uNb4mtyjAKBggqhkjOPQQDAjBaMQsw
../pest:DBG: CQYDVQQGEwJERTEeMBwGA1UEChMVTmV4dXMgVGVjaG5vbG9neSBHbWJIMQ4wDAYD
../pest:DBG: VQQLEwVTYWxlczEbMBkGA1UEAxMSTmV4dXMgSXNzdWluZyBDQSAxMB4XDTIwMTEx
../pest:DBG: MjE0MTk1NloXDTIwMTExMzE0MTk1NlowNTELMAkGA1UEBhMCRVMxETAPBgNVBAoT
../pest:DBG: CEVsZWN0cmljMRMwEQYDVQQDEwpTTjAwMDAwMDAxMIIBIjANBgkqhkiG9w0BAQEF
../pest:DBG: AAOCAQ8AMIIBCgKCAQEAtxJwsMhCuRCRCIbTb+FRCtJ1f1tSprVBb/Wkb0Jf+dyY
../pest:DBG: npBMr++J4A+XXtIMPJh2e5JoOT6mOOnOYluVpf2I5FUhZGLOwvVci7xQpiEa1sxj
../pest:DBG: mrYVdUCtCrXDhURAKQzwhylqe3NIKUz8UswLlNPmWZrqwZvhPdU5SyjQQxzCvIV7
../pest:DBG: uyeNEoKaGxBSPkLEw3jCY0oDcQxtctff5U0cHmdhP4JN1u+uBRsksHldwrnEvp29
../pest:DBG: g8wuxKEl1xKfzhvU0ze3TS/2hs49ZBrfENUWqf5U81fHbE0DT/S/ZJXAk4rAM1Ti
../pest:DBG: ZvOHmZMnCCD/yC4SMp2UzC4IvN1j4C28YYGxOz5HhQIDAQABo4IBGDCCARQwEwYD
../pest:DBG: VR0lBAwwCgYIKwYBBQUHAwEwFQYDVR0RBA4wDIIKU04wMDAwMDAwMTBEBggrBgEF
../pest:DBG: BQcHJAQ4MDYwNDEUMBIGA1UEAwwLZmFpbC50ZXN0Y2ExDzANBgNVBAoMBnRlc3Rj
../pest:DBG: YTELMAkGA1UEBhMCRVMwEwYDVR0jBAwwCoAIS/1sQvmzUQYwCwYDVR0PBAQDAgWg
../pest:DBG: MH4GA1UdHwR3MHUwc6BxoG+GbWxkYXA6Ly9jbTgubG9jYWwvQ049TmV4dXMlMjBJ
../pest:DBG: c3N1aW5nJTIwQ0ElMjAxLGNuPWNybCxjbj1wa2ksZGM9bmV4dXMsZGM9bG9jYWw/
../pest:DBG: Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdDtiaW5hcnkwCgYIKoZIzj0EAwIDSAAw
../pest:DBG: RQIhAPdybEZckXU/7BggEQAJy/XcA5Nj3B/go95nw5VemKG2AiBD5uHzJKNX2cyP
../pest:DBG: DK4S8B3VZbmyDgYZAr+pJeLGwc3RFw==
../pest:DBG: -----END CERTIFICATE-----
../pest:DBG: Got certificate!
../pest:DBG: Certificate:
../pest:DBG: Data:
../pest:DBG: Version: 3 (0x2)
../pest:DBG: Serial Number:
../pest:DBG: 56:49:d8:cc:ba:d6:7f:f4:e3:73:8b:8d:6f:89:ad:ca
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: Issuer: C = DE, O = xxx Technology GmbH, OU = Sales, CN = xxx Issuing CA 1
../pest:DBG: Validity
../pest:DBG: Not Before: Nov 12 14:19:56 2020 GMT
../pest:DBG: Not After : Nov 13 14:19:56 2020 GMT
../pest:DBG: Subject: C = ES, O = Electric, CN = SN00000001
../pest:DBG: Subject Public Key Info:
../pest:DBG: Public Key Algorithm: rsaEncryption
../pest:DBG: RSA Public-Key: (2048 bit)
../pest:DBG: Modulus:
../pest:DBG: 00:b7:12:70:b0:c8:42:b9:10:91:08:86:d3:6f:e1:
../pest:DBG: 51:0a:d2:75:7f:5b:52:a6:b5:41:6f:f5:a4:6f:42:
../pest:DBG: 5f:f9:dc:98:9e:90:4c:af:ef:89:e0:0f:97:5e:d2:
../pest:DBG: 0c:3c:98:76:7b:92:68:39:3e:a6:38:e9:ce:62:5b:
../pest:DBG: 95:a5:fd:88:e4:55:21:64:62:ce:c2:f5:5c:8b:bc:
../pest:DBG: 50:a6:21:1a:d6:cc:63:9a:b6:15:75:40:ad:0a:b5:
../pest:DBG: c3:85:44:40:29:0c:f0:87:29:6a:7b:73:48:29:4c:
../pest:DBG: fc:52:cc:0b:94:d3:e6:59:9a:ea:c1:9b:e1:3d:d5:
../pest:DBG: 39:4b:28:d0:43:1c:c2:bc:85:7b:bb:27:8d:12:82:
../pest:DBG: 9a:1b:10:52:3e:42:c4:c3:78:c2:63:4a:03:71:0c:
../pest:DBG: 6d:72:d7:df:e5:4d:1c:1e:67:61:3f:82:4d:d6:ef:
../pest:DBG: ae:05:1b:24:b0:79:5d:c2:b9:c4:be:9d:bd:83:cc:
../pest:DBG: 2e:c4:a1:25:d7:12:9f:ce:1b:d4:d3:37:b7:4d:2f:
../pest:DBG: f6:86:ce:3d:64:1a:df:10:d5:16:a9:fe:54:f3:57:
../pest:DBG: c7:6c:4d:03:4f:f4:bf:64:95:c0:93:8a:c0:33:54:
../pest:DBG: e2:66:f3:87:99:93:27:08:20:ff:c8:2e:12:32:9d:
../pest:DBG: 94:cc:2e:08:bc:dd:63:e0:2d:bc:61:81:b1:3b:3e:
../pest:DBG: 47:85
../pest:DBG: Exponent: 65537 (0x10001)
../pest:DBG: X509v3 extensions:
../pest:DBG: X509v3 Extended Key Usage:
../pest:DBG: TLS Web Server Authentication
../pest:DBG: X509v3 Subject Alternative Name:
../pest:DBG: DNS:SN00000001
../pest:DBG: 1.3.6.1.5.5.7.7.36:
..U.est:DBG: 06041.0...U....fail.testca1.0
../pest:DBG: ..testca1.0...U....ES
../pest:DBG: X509v3 Authority Key Identifier:
../pest:DBG: keyid:4B:FD:6C:42:F9:B3:51:06
../pest:DBG:
../pest:DBG: X509v3 Key Usage:
../pest:DBG: Digital Signature, Key Encipherment
../pest:DBG: X509v3 CRL Distribution Points:
../pest:DBG:
../pest:DBG: Full Name:
../pest:DBG: URI:ldap://xxx.local/CN=xxx%20Issuing%20CA%201,cn=crl,cn=pki,dc=xxx,dc=local?certificateRevocationList;binary
../pest:DBG:
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: 30:45:02:21:00:f7:72:6c:46:5c:91:75:3f:ec:18:20:11:00:
../pest:DBG: 09:cb:f5:dc:03:93:63:dc:1f:e0:a3:de:67:c3:95:5e:98:a1:
../pest:DBG: b6:02:20:43:e6:e1:f3:24:a3:57:d9:cc:8f:0c:ae:12:f0:1d:
../pest:DBG: d5:65:b9:b2:0e:06:19:02:bf:a9:25:e2:c6:c1:cd:d1:17
../pest:DBG: -----BEGIN CERTIFICATE-----
../pest:DBG: MIIDcjCCAxigAwIBAgIQVknYzLrWf/Tjc4uNb4mtyjAKBggqhkjOPQQDAjBaMQsw
../pest:DBG: CQYDVQQGEwJERTEeMBwGA1UEChMVTmV4dXMgVGVjaG5vbG9neSBHbWJIMQ4wDAYD
../pest:DBG: VQQLEwVTYWxlczEbMBkGA1UEAxMSTmV4dXMgSXNzdWluZyBDQSAxMB4XDTIwMTEx
../pest:DBG: MjE0MTk1NloXDTIwMTExMzE0MTk1NlowNTELMAkGA1UEBhMCRVMxETAPBgNVBAoT
../pest:DBG: CEVsZWN0cmljMRMwEQYDVQQDEwpTTjAwMDAwMDAxMIIBIjANBgkqhkiG9w0BAQEF
../pest:DBG: AAOCAQ8AMIIBCgKCAQEAtxJwsMhCuRCRCIbTb+FRCtJ1f1tSprVBb/Wkb0Jf+dyY
../pest:DBG: npBMr++J4A+XXtIMPJh2e5JoOT6mOOnOYluVpf2I5FUhZGLOwvVci7xQpiEa1sxj
../pest:DBG: mrYVdUCtCrXDhURAKQzwhylqe3NIKUz8UswLlNPmWZrqwZvhPdU5SyjQQxzCvIV7
../pest:DBG: uyeNEoKaGxBSPkLEw3jCY0oDcQxtctff5U0cHmdhP4JN1u+uBRsksHldwrnEvp29
../pest:DBG: g8wuxKEl1xKfzhvU0ze3TS/2hs49ZBrfENUWqf5U81fHbE0DT/S/ZJXAk4rAM1Ti
../pest:DBG: ZvOHmZMnCCD/yC4SMp2UzC4IvN1j4C28YYGxOz5HhQIDAQABo4IBGDCCARQwEwYD
../pest:DBG: VR0lBAwwCgYIKwYBBQUHAwEwFQYDVR0RBA4wDIIKU04wMDAwMDAwMTBEBggrBgEF
../pest:DBG: BQcHJAQ4MDYwNDEUMBIGA1UEAwwLZmFpbC50ZXN0Y2ExDzANBgNVBAoMBnRlc3Rj
../pest:DBG: YTELMAkGA1UEBhMCRVMwEwYDVR0jBAwwCoAIS/1sQvmzUQYwCwYDVR0PBAQDAgWg
../pest:DBG: MH4GA1UdHwR3MHUwc6BxoG+GbWxkYXA6Ly9jbTgubG9jYWwvQ049TmV4dXMlMjBJ
../pest:DBG: c3N1aW5nJTIwQ0ElMjAxLGNuPWNybCxjbj1wa2ksZGM9bmV4dXMsZGM9bG9jYWw/
../pest:DBG: Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdDtiaW5hcnkwCgYIKoZIzj0EAwIDSAAw
../pest:DBG: RQIhAPdybEZckXU/7BggEQAJy/XcA5Nj3B/go95nw5VemKG2AiBD5uHzJKNX2cyP
../pest:DBG: DK4S8B3VZbmyDgYZAr+pJeLGwc3RFw==
../pest:DBG: -----END CERTIFICATE-----
../pest:DBG: Got certificate!
../pest:DBG: Certificate:
../pest:DBG: Data:
../pest:DBG: Version: 3 (0x2)
../pest:DBG: Serial Number:
../pest:DBG: 56:49:d8:cc:ba:d6:7f:f4:e3:73:8b:8d:6f:89:ad:ca
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: Issuer: C = DE, O = xxx Technology GmbH, OU = Sales, CN = xxx Issuing CA 1
../pest:DBG: Validity
../pest:DBG: Not Before: Nov 12 14:19:56 2020 GMT
../pest:DBG: Not After : Nov 13 14:19:56 2020 GMT
../pest:DBG: Subject: C = ES, O = Electric, CN = SN00000001
../pest:DBG: Subject Public Key Info:
../pest:DBG: Public Key Algorithm: rsaEncryption
../pest:DBG: RSA Public-Key: (2048 bit)
../pest:DBG: Modulus:
../pest:DBG: 00:b7:12:70:b0:c8:42:b9:10:91:08:86:d3:6f:e1:
../pest:DBG: 51:0a:d2:75:7f:5b:52:a6:b5:41:6f:f5:a4:6f:42:
../pest:DBG: 5f:f9:dc:98:9e:90:4c:af:ef:89:e0:0f:97:5e:d2:
../pest:DBG: 0c:3c:98:76:7b:92:68:39:3e:a6:38:e9:ce:62:5b:
../pest:DBG: 95:a5:fd:88:e4:55:21:64:62:ce:c2:f5:5c:8b:bc:
../pest:DBG: 50:a6:21:1a:d6:cc:63:9a:b6:15:75:40:ad:0a:b5:
../pest:DBG: c3:85:44:40:29:0c:f0:87:29:6a:7b:73:48:29:4c:
../pest:DBG: fc:52:cc:0b:94:d3:e6:59:9a:ea:c1:9b:e1:3d:d5:
../pest:DBG: 39:4b:28:d0:43:1c:c2:bc:85:7b:bb:27:8d:12:82:
../pest:DBG: 9a:1b:10:52:3e:42:c4:c3:78:c2:63:4a:03:71:0c:
../pest:DBG: 6d:72:d7:df:e5:4d:1c:1e:67:61:3f:82:4d:d6:ef:
../pest:DBG: ae:05:1b:24:b0:79:5d:c2:b9:c4:be:9d:bd:83:cc:
../pest:DBG: 2e:c4:a1:25:d7:12:9f:ce:1b:d4:d3:37:b7:4d:2f:
../pest:DBG: f6:86:ce:3d:64:1a:df:10:d5:16:a9:fe:54:f3:57:
../pest:DBG: c7:6c:4d:03:4f:f4:bf:64:95:c0:93:8a:c0:33:54:
../pest:DBG: e2:66:f3:87:99:93:27:08:20:ff:c8:2e:12:32:9d:
../pest:DBG: 94:cc:2e:08:bc:dd:63:e0:2d:bc:61:81:b1:3b:3e:
../pest:DBG: 47:85
../pest:DBG: Exponent: 65537 (0x10001)
../pest:DBG: X509v3 extensions:
../pest:DBG: X509v3 Extended Key Usage:
../pest:DBG: TLS Web Server Authentication
../pest:DBG: X509v3 Subject Alternative Name:
../pest:DBG: DNS:SN00000001
../pest:DBG: 1.3.6.1.5.5.7.7.36:
..U.est:DBG: 06041.0...U....fail.testca1.0
../pest:DBG: ..testca1.0...U....ES
../pest:DBG: X509v3 Authority Key Identifier:
../pest:DBG: keyid:4B:FD:6C:42:F9:B3:51:06
../pest:DBG:
../pest:DBG: X509v3 Key Usage:
../pest:DBG: Digital Signature, Key Encipherment
../pest:DBG: X509v3 CRL Distribution Points:
../pest:DBG:
../pest:DBG: Full Name:
../pest:DBG: URI:ldap://xxx.local/CN=xxx%20Issuing%20CA%201,cn=crl,cn=pki,dc=xxx,dc=local?certificateRevocationList;binary
../pest:DBG:
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: 30:45:02:21:00:f7:72:6c:46:5c:91:75:3f:ec:18:20:11:00:
../pest:DBG: 09:cb:f5:dc:03:93:63:dc:1f:e0:a3:de:67:c3:95:5e:98:a1:
../pest:DBG: b6:02:20:43:e6:e1:f3:24:a3:57:d9:cc:8f:0c:ae:12:f0:1d:
../pest:DBG: d5:65:b9:b2:0e:06:19:02:bf:a9:25:e2:c6:c1:cd:d1:17
../pest:DBG: -----BEGIN CERTIFICATE-----
../pest:DBG: MIIDcjCCAxigAwIBAgIQVknYzLrWf/Tjc4uNb4mtyjAKBggqhkjOPQQDAjBaMQsw
../pest:DBG: CQYDVQQGEwJERTEeMBwGA1UEChMVTmV4dXMgVGVjaG5vbG9neSBHbWJIMQ4wDAYD
../pest:DBG: VQQLEwVTYWxlczEbMBkGA1UEAxMSTmV4dXMgSXNzdWluZyBDQSAxMB4XDTIwMTEx
../pest:DBG: MjE0MTk1NloXDTIwMTExMzE0MTk1NlowNTELMAkGA1UEBhMCRVMxETAPBgNVBAoT
../pest:DBG: CEVsZWN0cmljMRMwEQYDVQQDEwpTTjAwMDAwMDAxMIIBIjANBgkqhkiG9w0BAQEF
../pest:DBG: AAOCAQ8AMIIBCgKCAQEAtxJwsMhCuRCRCIbTb+FRCtJ1f1tSprVBb/Wkb0Jf+dyY
../pest:DBG: npBMr++J4A+XXtIMPJh2e5JoOT6mOOnOYluVpf2I5FUhZGLOwvVci7xQpiEa1sxj
../pest:DBG: mrYVdUCtCrXDhURAKQzwhylqe3NIKUz8UswLlNPmWZrqwZvhPdU5SyjQQxzCvIV7
../pest:DBG: uyeNEoKaGxBSPkLEw3jCY0oDcQxtctff5U0cHmdhP4JN1u+uBRsksHldwrnEvp29
../pest:DBG: g8wuxKEl1xKfzhvU0ze3TS/2hs49ZBrfENUWqf5U81fHbE0DT/S/ZJXAk4rAM1Ti
../pest:DBG: ZvOHmZMnCCD/yC4SMp2UzC4IvN1j4C28YYGxOz5HhQIDAQABo4IBGDCCARQwEwYD
../pest:DBG: VR0lBAwwCgYIKwYBBQUHAwEwFQYDVR0RBA4wDIIKU04wMDAwMDAwMTBEBggrBgEF
../pest:DBG: BQcHJAQ4MDYwNDEUMBIGA1UEAwwLZmFpbC50ZXN0Y2ExDzANBgNVBAoMBnRlc3Rj
../pest:DBG: YTELMAkGA1UEBhMCRVMwEwYDVR0jBAwwCoAIS/1sQvmzUQYwCwYDVR0PBAQDAgWg
../pest:DBG: MH4GA1UdHwR3MHUwc6BxoG+GbWxkYXA6Ly9jbTgubG9jYWwvQ049TmV4dXMlMjBJ
../pest:DBG: c3N1aW5nJTIwQ0ElMjAxLGNuPWNybCxjbj1wa2ksZGM9bmV4dXMsZGM9bG9jYWw/
../pest:DBG: Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdDtiaW5hcnkwCgYIKoZIzj0EAwIDSAAw
../pest:DBG: RQIhAPdybEZckXU/7BggEQAJy/XcA5Nj3B/go95nw5VemKG2AiBD5uHzJKNX2cyP
../pest:DBG: DK4S8B3VZbmyDgYZAr+pJeLGwc3RFw==
../pest:DBG: -----END CERTIFICATE-----
../pest:DBG: Got certificate!
../pest:DBG: Certificate:
../pest:DBG: Data:
../pest:DBG: Version: 3 (0x2)
../pest:DBG: Serial Number:
../pest:DBG: 56:49:d8:cc:ba:d6:7f:f4:e3:73:8b:8d:6f:89:ad:ca
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: Issuer: C = DE, O = xxx Technology GmbH, OU = Sales, CN = xxx Issuing CA 1
../pest:DBG: Validity
../pest:DBG: Not Before: Nov 12 14:19:56 2020 GMT
../pest:DBG: Not After : Nov 13 14:19:56 2020 GMT
../pest:DBG: Subject: C = ES, O = Electric, CN = SN00000001
../pest:DBG: Subject Public Key Info:
../pest:DBG: Public Key Algorithm: rsaEncryption
../pest:DBG: RSA Public-Key: (2048 bit)
../pest:DBG: Modulus:
../pest:DBG: 00:b7:12:70:b0:c8:42:b9:10:91:08:86:d3:6f:e1:
../pest:DBG: 51:0a:d2:75:7f:5b:52:a6:b5:41:6f:f5:a4:6f:42:
../pest:DBG: 5f:f9:dc:98:9e:90:4c:af:ef:89:e0:0f:97:5e:d2:
../pest:DBG: 0c:3c:98:76:7b:92:68:39:3e:a6:38:e9:ce:62:5b:
../pest:DBG: 95:a5:fd:88:e4:55:21:64:62:ce:c2:f5:5c:8b:bc:
../pest:DBG: 50:a6:21:1a:d6:cc:63:9a:b6:15:75:40:ad:0a:b5:
../pest:DBG: c3:85:44:40:29:0c:f0:87:29:6a:7b:73:48:29:4c:
../pest:DBG: fc:52:cc:0b:94:d3:e6:59:9a:ea:c1:9b:e1:3d:d5:
../pest:DBG: 39:4b:28:d0:43:1c:c2:bc:85:7b:bb:27:8d:12:82:
../pest:DBG: 9a:1b:10:52:3e:42:c4:c3:78:c2:63:4a:03:71:0c:
../pest:DBG: 6d:72:d7:df:e5:4d:1c:1e:67:61:3f:82:4d:d6:ef:
../pest:DBG: ae:05:1b:24:b0:79:5d:c2:b9:c4:be:9d:bd:83:cc:
../pest:DBG: 2e:c4:a1:25:d7:12:9f:ce:1b:d4:d3:37:b7:4d:2f:
../pest:DBG: f6:86:ce:3d:64:1a:df:10:d5:16:a9:fe:54:f3:57:
../pest:DBG: c7:6c:4d:03:4f:f4:bf:64:95:c0:93:8a:c0:33:54:
../pest:DBG: e2:66:f3:87:99:93:27:08:20:ff:c8:2e:12:32:9d:
../pest:DBG: 94:cc:2e:08:bc:dd:63:e0:2d:bc:61:81:b1:3b:3e:
../pest:DBG: 47:85
../pest:DBG: Exponent: 65537 (0x10001)
../pest:DBG: X509v3 extensions:
../pest:DBG: X509v3 Extended Key Usage:
../pest:DBG: TLS Web Server Authentication
../pest:DBG: X509v3 Subject Alternative Name:
../pest:DBG: DNS:SN00000001
../pest:DBG: 1.3.6.1.5.5.7.7.36:
..U.est:DBG: 06041.0...U....fail.testca1.0
../pest:DBG: ..testca1.0...U....ES
../pest:DBG: X509v3 Authority Key Identifier:
../pest:DBG: keyid:4B:FD:6C:42:F9:B3:51:06
../pest:DBG:
../pest:DBG: X509v3 Key Usage:
../pest:DBG: Digital Signature, Key Encipherment
../pest:DBG: X509v3 CRL Distribution Points:
../pest:DBG:
../pest:DBG: Full Name:
../pest:DBG: URI:ldap://xxx.local/CN=xxx%20Issuing%20CA%201,cn=crl,cn=pki,dc=xxx,dc=local?certificateRevocationList;binary
../pest:DBG:
../pest:DBG: Signature Algorithm: ecdsa-with-SHA256
../pest:DBG: 30:45:02:21:00:f7:72:6c:46:5c:91:75:3f:ec:18:20:11:00:
../pest:DBG: 09:cb:f5:dc:03:93:63:dc:1f:e0:a3:de:67:c3:95:5e:98:a1:
../pest:DBG: b6:02:20:43:e6:e1:f3:24:a3:57:d9:cc:8f:0c:ae:12:f0:1d:
../pest:DBG: d5:65:b9:b2:0e:06:19:02:bf:a9:25:e2:c6:c1:cd:d1:17
../pest:DBG: -----BEGIN CERTIFICATE-----
../pest:DBG: MIIDcjCCAxigAwIBAgIQVknYzLrWf/Tjc4uNb4mtyjAKBggqhkjOPQQDAjBaMQsw
../pest:DBG: CQYDVQQGEwJERTEeMBwGA1UEChMVTmV4dXMgVGVjaG5vbG9neSBHbWJIMQ4wDAYD
../pest:DBG: VQQLEwVTYWxlczEbMBkGA1UEAxMSTmV4dXMgSXNzdWluZyBDQSAxMB4XDTIwMTEx
../pest:DBG: MjE0MTk1NloXDTIwMTExMzE0MTk1NlowNTELMAkGA1UEBhMCRVMxETAPBgNVBAoT
../pest:DBG: CEVsZWN0cmljMRMwEQYDVQQDEwpTTjAwMDAwMDAxMIIBIjANBgkqhkiG9w0BAQEF
../pest:DBG: AAOCAQ8AMIIBCgKCAQEAtxJwsMhCuRCRCIbTb+FRCtJ1f1tSprVBb/Wkb0Jf+dyY
../pest:DBG: npBMr++J4A+XXtIMPJh2e5JoOT6mOOnOYluVpf2I5FUhZGLOwvVci7xQpiEa1sxj
../pest:DBG: mrYVdUCtCrXDhURAKQzwhylqe3NIKUz8UswLlNPmWZrqwZvhPdU5SyjQQxzCvIV7
../pest:DBG: uyeNEoKaGxBSPkLEw3jCY0oDcQxtctff5U0cHmdhP4JN1u+uBRsksHldwrnEvp29
../pest:DBG: g8wuxKEl1xKfzhvU0ze3TS/2hs49ZBrfENUWqf5U81fHbE0DT/S/ZJXAk4rAM1Ti
../pest:DBG: ZvOHmZMnCCD/yC4SMp2UzC4IvN1j4C28YYGxOz5HhQIDAQABo4IBGDCCARQwEwYD
../pest:DBG: VR0lBAwwCgYIKwYBBQUHAwEwFQYDVR0RBA4wDIIKU04wMDAwMDAwMTBEBggrBgEF
../pest:DBG: BQcHJAQ4MDYwNDEUMBIGA1UEAwwLZmFpbC50ZXN0Y2ExDzANBgNVBAoMBnRlc3Rj
../pest:DBG: YTELMAkGA1UEBhMCRVMwEwYDVR0jBAwwCoAIS/1sQvmzUQYwCwYDVR0PBAQDAgWg
../pest:DBG: MH4GA1UdHwR3MHUwc6BxoG+GbWxkYXA6Ly9jbTgubG9jYWwvQ049TmV4dXMlMjBJ
../pest:DBG: c3N1aW5nJTIwQ0ElMjAxLGNuPWNybCxjbj1wa2ksZGM9bmV4dXMsZGM9bG9jYWw/
../pest:DBG: Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdDtiaW5hcnkwCgYIKoZIzj0EAwIDSAAw
../pest:DBG: RQIhAPdybEZckXU/7BggEQAJy/XcA5Nj3B/go95nw5VemKG2AiBD5uHzJKNX2cyP
../pest:DBG: DK4S8B3VZbmyDgYZAr+pJeLGwc3RFw==
../pest:DBG: -----END CERTIFICATE-----
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/enroll-001.pem' (application/pkix-cert)
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/enroll-002.pem' (application/pkix-cert)
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/enroll-003.pem' (application/pkix-cert)
../pest:MSG: Writing file 'out/rfc/test-2.2/step-0/in-1/enroll-004.pem' (application/pkix-cert)
./test:WRN: Requested SN '/CN=fail.testca/O=testca/C=ES' and obtained SN '/C=ES/O=Electric/CN=SN00000001' are not exactly equal.
./test:OUT[test/2.2]: WRITING STATUS: failed(Once normalized, they still do not match (RSN '/CN=fail.testca/O=testca/C=ES', ESN '/CN=SN00000001/O=Electric/C=ES'))
./test:MSG: Creating file 'out/rfc/test-2.2/status'
./test:DBG: Writing in out/rfc/test-2.2/status:
./test:DBG: >>failed Once normalized, they still do not match (RSN '/CN=fail.testca/O=testca/C=ES', ESN '/CN=SN00000001/O=Electric/C=ES')
./test:OUT[test/2.2]: TEST FAILED.
What we do see is that the subject is NOT changed. Can you please check?
The text was updated successfully, but these errors were encountered: