max_stars_count
int64
301
224k
text
stringlengths
6
1.05M
token_count
int64
3
727k
1,056
<gh_stars>1000+ /* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.netbeans.modules.selenium2.webclient.api; import java.io.File; import java.util.ArrayList; import java.util.logging.Logger; import java.util.regex.Matcher; import java.util.regex.Pattern; import org.netbeans.api.annotations.common.NullAllowed; import org.netbeans.api.project.Project; import org.netbeans.api.project.ProjectUtils; import org.netbeans.modules.gsf.testrunner.api.Status; import org.netbeans.modules.gsf.testrunner.api.TestSession; import org.netbeans.modules.gsf.testrunner.api.TestSuite; import org.netbeans.modules.gsf.testrunner.api.Testcase; import org.netbeans.modules.gsf.testrunner.api.Trouble; import org.netbeans.modules.gsf.testrunner.ui.api.Manager; import org.netbeans.modules.selenium2.webclient.spi.JumpToCallStackCallback; import org.netbeans.modules.web.clientproject.api.util.StringUtilities; import org.openide.filesystems.FileObject; import org.openide.filesystems.FileUtil; import org.openide.util.NbBundle; import org.openide.util.Pair; /** * * @author <NAME> */ @NbBundle.Messages("TestRunner.noName=<no name>") public final class TestRunnerReporter { private static final Logger LOGGER = Logger.getLogger(TestRunnerReporter.class.getName()); private final String NB_LINE; static final Pattern MULTI_CAPABILITIES = Pattern.compile("\\[launcher\\] Running (?<MULTICAPABILITIES>[\\d]+) instances of WebDriver"); // NOI18N static final String CAPABILITY = "(\\[(?<BROWSER>.*) #(?<CAPABILITY>[\\d]+)\\] )?"; // NOI18N static final Pattern OK_PATTERN = Pattern.compile("^" + CAPABILITY + "([^(not )]*)ok (?<INDEX>[\\d]+) (?<FULLTITLE>.*), suite=(?<SUITE>.*), testcase=(?<TESTCASE>.*), duration=(?<DURATION>[\\d]+)"); // NOI18N static final Pattern OK_SKIP_PATTERN = Pattern.compile("^" + CAPABILITY + "([^(not )]*)ok (?<INDEX>[\\d]+) (?<FULLTITLE>.*) # SKIP -, suite=(?<SUITE>.*), testcase=(?<TESTCASE>.*)"); // NOI18N static final Pattern NOT_OK_PATTERN = Pattern.compile("^" + CAPABILITY + "(.*)not ok (?<INDEX>[\\d]+) (?<FULLTITLE>.*), suite=(?<SUITE>.*), testcase=(?<TESTCASE>.*), duration=(?<DURATION>[\\d]+)"); // NOI18N static final Pattern SESSION_START_PATTERN = Pattern.compile("^" + CAPABILITY + "1\\.\\.(?<TOTAL>[\\d]+)"); // NOI18N static final Pattern SESSION_END_PATTERN = Pattern.compile("^" + CAPABILITY + "(.*)tests (?<TOTAL>[\\d]+), pass (?<PASS>[\\d]+), fail (?<FAIL>[\\d]+), skip (?<SKIP>[\\d]+)"); // NOI18N static final String SKIP = " # SKIP -"; // NOI18N static final Pattern DONE_PATTERN = Pattern.compile("^(.*)Done."); // NOI18N private final RunInfo runInfo; private TestSession testSession; private TestSuite testSuite; private long testSuiteRuntime = 0; private boolean hasTests = false; private int testIndex = 0; private Trouble trouble; private final ArrayList<String> stackTrace = new ArrayList<>(); private String runningSuite; private String testcase; private long duration; private final boolean showOutput; private int multiCapabilities = 0; private String browser; private boolean normalSessionEnd = false; public TestRunnerReporter(RunInfo runInfo, String reporterSuffix) { assert runInfo != null; this.runInfo = runInfo; this.showOutput = runInfo.isShowOutput(); this.NB_LINE = reporterSuffix; } /** * * @return {@code null} if logMessage should not be shown in the output window */ public String processLine(String logMessage) { int index = logMessage.indexOf(NB_LINE); String line = removeEscapeCharachters(logMessage).replace(NB_LINE, ""); Matcher matcher; matcher = MULTI_CAPABILITIES.matcher(line); if(matcher.find()) { multiCapabilities = Integer.parseInt(matcher.group("MULTICAPABILITIES")); return logMessage; } matcher = DONE_PATTERN.matcher(line); if (matcher.find()) { if (!normalSessionEnd) { // something unexpected has happened sessionFinishedAbnormally(line); } return logMessage; } if(index == -1) { if (trouble != null) { // stacktrace from javascript/selenium mocha runner stackTrace.add(getStacktrace(line)); return showOutput ? line : null; } return logMessage; } matcher = SESSION_START_PATTERN.matcher(line); if (matcher.find()) { // in "multi capability" mode session is started only once if (multiCapabilities == 0 || // capabilities is used (multiCapabilities > 0 && matcher.group("CAPABILITY") == null) || // multiCapabilities is used with only one browser (multiCapabilities > 0 && Integer.parseInt(matcher.group("CAPABILITY")) == 1)) { // multiCapabilities is used with more than one browser sessionStarted(line); normalSessionEnd = false; } return showOutput ? line : null; } matcher = SESSION_END_PATTERN.matcher(line); if (matcher.find()) { handleTrouble(); // in "multi capability" mode session is finished only once if (multiCapabilities == 0 || // capabilities is used (multiCapabilities > 0 && matcher.group("CAPABILITY") == null) || // multiCapabilities is used with only one browser (multiCapabilities > 0 && Integer.parseInt(matcher.group("CAPABILITY")) == multiCapabilities)) { // multiCapabilities is used with more than one browser sessionFinished(line); normalSessionEnd = true; } return showOutput ? "" : null; } matcher = OK_PATTERN.matcher(line); if (matcher.find()) { String output2display = parseTestResult(matcher); addTestCase(testcase, Status.PASSED, duration); if(!showOutput) { return null; } getManager().displayOutput(testSession, output2display, false); return output2display; } matcher = OK_SKIP_PATTERN.matcher(line); if (matcher.find()) { String output2display = parseTestResult(matcher).concat(SKIP); addTestCase(testcase, Status.SKIPPED, duration); if(!showOutput) { return null; } getManager().displayOutput(testSession, output2display, false); return output2display; } matcher = NOT_OK_PATTERN.matcher(line); if (matcher.find()) { String output2display = parseTestResult(matcher); if(!showOutput) { return null; } getManager().displayOutput(testSession, output2display, false); return output2display; } if(trouble != null) { // stacktrace from selenium jasmine runner stackTrace.add(getStacktrace(line)); } return showOutput ? line : null; } private String getStacktrace(String line) { if (multiCapabilities > 0) { // remove browser info from stacktrace return line.replaceFirst(CAPABILITY, ""); } return line; } private String getSuiteName(String suite) { if(browser == null) { return suite; } return "[" + browser + "] " + suite; } private String parseTestResult(Matcher matcher) { handleTrouble(); testIndex = Integer.parseInt(matcher.group("INDEX")); browser = matcher.group("BROWSER"); String suite = getSuiteName(matcher.group("SUITE")); testcase = matcher.group("TESTCASE"); if (matcher.pattern().pattern().equals(NOT_OK_PATTERN.pattern())) { trouble = new Trouble(false); } if(matcher.pattern().pattern().equals(OK_SKIP_PATTERN.pattern())) { duration = 0; } else { duration = Long.parseLong(matcher.group("DURATION")); } if (runningSuite == null) { runningSuite = suite; suiteStarted(runningSuite); } else { if (!runningSuite.equals(suite)) { suiteFinished(runningSuite); runningSuite = suite; suiteStarted(runningSuite); } } return (matcher.pattern().pattern().equals(NOT_OK_PATTERN.pattern()) ? "not ok " : "ok ") + testIndex + " " + runningSuite + " " + testcase; } private void handleTrouble() { if (trouble != null) { trouble.setStackTrace(stackTrace.toArray(new String[stackTrace.size()])); addTestCase(testcase, Status.FAILED, duration, trouble); stackTrace.clear(); trouble = null; } } static String removeEscapeCharachters(String line) { return line.replace("[?25l", "").replace("[2K", "").replaceAll("\u001B", "").replaceAll("\\[[;\\d]*m", "").trim(); } private Manager getManager() { return Manager.getInstance(); } @NbBundle.Messages({ "# {0} - project name", "TestRunner.selenium.runner.title={0} (Selenium)", "# {0} - project name", "TestRunner.unit.runner.title={0} (Unit)", }) private String getOutputTitle() { StringBuilder sb = new StringBuilder(30); sb.append(ProjectUtils.getInformation(runInfo.getProject()).getDisplayName()); if (!runInfo.isTestingProject()) { String testFile = runInfo.getTestFile(); if (testFile != null) { sb.append(":"); // NOI18N sb.append(new File(testFile).getName()); } } return runInfo.isSelenium() ? Bundle.TestRunner_selenium_runner_title(sb.toString()) : Bundle.TestRunner_unit_runner_title(sb.toString()); } private void sessionStarted(String line) { assert testSession == null; getManager().setNodeFactory(Utilities.getTestRunnerNodeFactory(new CallStackCallback(runInfo.getProject()))); testSession = new TestSession(getOutputTitle(), runInfo.getProject(), TestSession.SessionType.TEST); testSession.setRerunHandler(runInfo.getRerunHandler()); getManager().testStarted(testSession); if(showOutput) { getManager().displayOutput(testSession, line, false); } } @NbBundle.Messages({ "TestRunner.tests.none.1=No tests executed - perhaps an error occured?", "TestRunner.tests.none.2=\nFull output can be verified in Output window.", "TestRunner.output.full=\nFull output can be found in Output window.", }) private void sessionFinished(String line) { assert testSession != null; if (testSuite != null) { // can happen for qunit suiteFinished(null); } if (!hasTests) { getManager().displayOutput(testSession, Bundle.TestRunner_tests_none_1(), true); getManager().displayOutput(testSession, Bundle.TestRunner_tests_none_2(), true); } else { getManager().displayOutput(testSession, Bundle.TestRunner_output_full(), false); } getManager().sessionFinished(testSession); testSession = null; runningSuite = null; hasTests = false; } @NbBundle.Messages({ "TestRunner.session.finished.abnormally=Test session terminated abnormally - perhaps an error occured?" }) private void sessionFinishedAbnormally(String line) { getManager().displayOutput(testSession, Bundle.TestRunner_session_finished_abnormally(), false); getManager().sessionFinished(testSession); testSession = null; runningSuite = null; hasTests = false; } @NbBundle.Messages({ "# {0} - suite name", "TestRunner.suite.name={0}", }) private void suiteStarted(String line) { assert testSession != null; if (testSuite != null) { // can happen for more browsers and last browser suite suiteFinished(null); } assert testSuite == null; assert testSuiteRuntime == 0; String name = Bundle.TestRunner_suite_name(line); if (!StringUtilities.hasText(name)) { name = Bundle.TestRunner_noName(); } testSuite = new TestSuite(name); testSession.addSuite(testSuite); getManager().displaySuiteRunning(testSession, testSuite.getName()); } private void suiteFinished(@NullAllowed String line) { assert testSession != null; if (testSuite == null) { // current suite already finished return; } getManager().displayReport(testSession, testSession.getReport(testSuiteRuntime), true); testSuite = null; testSuiteRuntime = 0; } private void addTestCase(String name, Status status) { addTestCase(name, status, 0L); } private void addTestCase(String name, Status status, long runtime) { addTestCase(name, status, runtime, null); } private void addTestCase(String name, Status status, long runtime, Trouble trouble) { hasTests = true; Testcase testCase = new Testcase(name, "Selenium", testSession); // NOI18N testCase.setStatus(status); testSuiteRuntime += runtime; testCase.setTimeMillis(runtime); if (trouble != null) { testCase.setTrouble(trouble); } testSession.addTestCase(testCase); } // ~ Inner classes public static final class CallStackCallback implements JumpToCallStackCallback { // at /Users/fanis/selenium2_work/NodeJsApplication/node_modules/selenium-webdriver/lib/webdriver/promise.js:1425:29 // at notify (/Users/fanis/selenium2_work/NodeJsApplication/node_modules/selenium-webdriver/lib/webdriver/promise.js:465:12) // at C:\Users\toikonom\AppData\Local\Temp\AngularJSPhoneCat\node_modules\protractor\lib\protractor.js:1041:17 // at [object Object].webdriver.promise.ControlFlow.runInNewFrame_ (C:\Users\toikonom\AppData\Local\Temp\AngularJSPhoneCat\node_modules\protractor\node_modules\selenium-webdriver\lib\webdriver\promise.js:1539:20) // at Context.<anonymous> (test/test.js:8:24) static final Pattern FILE_LINE_PATTERN_UNIX = Pattern.compile("^" + CAPABILITY + "(.*)at ([^/(]*)(?<FILE>[^:]+):(?<LINE>\\d+):(?<COLUMN>\\d+)"); // NOI18N static final Pattern FILE_LINE_PATTERN_WINDOWS = Pattern.compile("^" + CAPABILITY + "(.*)at (.*)(?<DRIVE>[a-zA-Z]:)(?<FILE>[^:]+):(?<LINE>\\d+):(?<COLUMN>\\d+)"); // NOI18N final Project project; public CallStackCallback(Project project) { assert project != null; this.project = project; } @Override public Pair<File, int[]> parseLocation(String callStack, boolean underTestRoot) { Matcher matcher = FILE_LINE_PATTERN_WINDOWS.matcher(callStack.trim()); boolean matchFound = matcher.find(); String drive = null; if(matchFound) { drive = matcher.group("DRIVE"); // NOI18N } else { matcher = FILE_LINE_PATTERN_UNIX.matcher(callStack.trim()); matchFound = matcher.find(); } if (matchFound) { String pathname = drive == null ? matcher.group("FILE") : drive.concat(matcher.group("FILE")); // NOI18N // mocha changed the way it might report failures' stack traces after 2.2.3 // This might result in pathname being '(...', so we need to ommit the starting '(' File path = new File(pathname.replace("(", "")); File file; FileObject projectDir = project.getProjectDirectory(); if (path.isAbsolute()) { file = path; } else { file = new File(FileUtil.toFile(projectDir), path.getPath()); if (!file.isFile()) { return null; } } FileObject parent = underTestRoot ? Utilities.getTestsSeleniumFolder(project, false) : projectDir; FileObject fo = FileUtil.toFileObject(file); if(fo == null || (underTestRoot && !FileUtil.isParentOf(parent, fo))) { return null; } return Pair.of(file, new int[] {Integer.parseInt(matcher.group("LINE")), Integer.parseInt(matcher.group("COLUMN"))}); // NOI18N } return null; } } }
7,489
2,151
<reponame>rhencke/engine<filename>src/ios_tools/chrome/browser/ui/fade_truncated_label.h // Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef IOS_CHROME_BROWSER_UI_FADE_TRUNCATED_LABEL_H_ #define IOS_CHROME_BROWSER_UI_FADE_TRUNCATED_LABEL_H_ #import <UIKit/UIKit.h> // A label class that applies a gradient fade to the end of a label whose bounds // are too small to draw the entire string. This class uses a CAGradientLayer // as a mask instead of clipping the drawing context of the label. @interface FadeTruncatedLabel : UILabel // Returns a CAGadientLayer to use as a label's masking layer that will apply // a fade truncation if |text| takes up more space than |bounds| when drawn // with |attributes|. + (CAGradientLayer*)maskLayerForText:(NSString*)text withAttributes:(NSDictionary*)attributes inBounds:(CGRect)bounds; // Adds animations from |beginFrame| to |endFrame| using the provided |duration| // and |timingFunction|. - (void)animateFromBeginFrame:(CGRect)beginFrame toEndFrame:(CGRect)endFrame duration:(CFTimeInterval)duration timingFunction:(CAMediaTimingFunction*)timingFunction; // Reverses animations added by // |-animateFromBeginFrame:toEndFrame:duration:timingFunction:|. - (void)reverseAnimations; // Removes animations added by // |-animateFromBeginFrame:toEndFrame:duration:timingFunction:|. - (void)cleanUpAnimations; @end #endif // IOS_CHROME_BROWSER_UI_FADE_TRUNCATED_LABEL_H_
603
322
package com.imooc.imooc_voice.model.newapi.dj; public class DjTopListBean { private int code; private String msg; private Data data; public void setCode(int code) { this.code = code; } public int getCode() { return code; } public void setMsg(String msg) { this.msg = msg; } public String getMsg() { return msg; } public void setData(Data data) { this.data = data; } public Data getData() { return data; } public class Data { private int total; private long updateTime; private java.util.List<List> list; public void setTotal(int total) { this.total = total; } public int getTotal() { return total; } public void setUpdateTime(long updateTime) { this.updateTime = updateTime; } public long getUpdateTime() { return updateTime; } public void setList(java.util.List<List> list) { this.list = list; } public java.util.List<List> getList() { return list; } } public class List { private long id; private int rank; private int lastRank; private long score; private String nickName; private String avatarUrl; private int userType; public void setId(long id) { this.id = id; } public String getId() { return String.valueOf(id); } public void setRank(int rank) { this.rank = rank; } public int getRank() { return rank; } public void setLastRank(int lastRank) { this.lastRank = lastRank; } public int getLastRank() { return lastRank; } public void setScore(long score) { this.score = score; } public long getScore() { return score; } public void setNickName(String nickName) { this.nickName = nickName; } public String getNickName() { return nickName; } public void setAvatarUrl(String avatarUrl) { this.avatarUrl = avatarUrl; } public String getAvatarUrl() { return avatarUrl; } public void setUserType(int userType) { this.userType = userType; } public int getUserType() { return userType; } } }
781
333
package com.alipay.api.domain; import com.alipay.api.AlipayObject; import com.alipay.api.internal.mapping.ApiField; /** * 服务记录类目请求 * * @author auto create * @since 1.0, 2020-12-10 16:49:01 */ public class ServiceRecordCatRequest extends AlipayObject { private static final long serialVersionUID = 3529355723468924649L; /** * 类目名称(需要每一级用;分隔封装) */ @ApiField("cat_name") private String catName; /** * 一级类目编码 */ @ApiField("first_cat") private String firstCat; /** * 四级类目编码 */ @ApiField("fourth_cat") private String fourthCat; /** * 类目树编码 */ @ApiField("instence_code") private String instenceCode; /** * 二级类目编码 */ @ApiField("second_cat") private String secondCat; /** * 三级类目编码 */ @ApiField("third_cat") private String thirdCat; public String getCatName() { return this.catName; } public void setCatName(String catName) { this.catName = catName; } public String getFirstCat() { return this.firstCat; } public void setFirstCat(String firstCat) { this.firstCat = firstCat; } public String getFourthCat() { return this.fourthCat; } public void setFourthCat(String fourthCat) { this.fourthCat = fourthCat; } public String getInstenceCode() { return this.instenceCode; } public void setInstenceCode(String instenceCode) { this.instenceCode = instenceCode; } public String getSecondCat() { return this.secondCat; } public void setSecondCat(String secondCat) { this.secondCat = secondCat; } public String getThirdCat() { return this.thirdCat; } public void setThirdCat(String thirdCat) { this.thirdCat = thirdCat; } }
813
2,177
<filename>Sources/Workflows/Alfredlytics/update.json { "version": 1.0, "remote_json": "https://raw.github.com/markokaestner/alfredlytics/master/package/Alfredlytics.json" }
72
3,451
<reponame>niits/BentoML<filename>tests/yatai/test_delete.py # pylint: disable=redefined-outer-name import pytest from click.testing import CliRunner from bentoml import BentoService from bentoml.cli import create_bentoml_cli from bentoml.yatai.client import get_yatai_client from bentoml.exceptions import BentoMLException @pytest.fixture() def yatai_client(): yc = get_yatai_client() yc.repository.delete(prune=True) assert len(yc.repository.list()) == 0 yield yc yc.repository.delete(prune=True) def test_delete_bento_by_tag(bento_service, yatai_client): bento_service.save() yatai_client.repository.get(bento_service.tag) yatai_client.repository.delete( bento_name=bento_service.name, bento_version=bento_service.version, ) with pytest.raises(BentoMLException) as excinfo: yatai_client.repository.get(bento_service.tag) assert f"{bento_service.tag} not found" in str(excinfo.value) def test_delete_bentos_by_labels(example_bento_service_class, yatai_client): svc1 = example_bento_service_class() svc1.save(labels={'cohort': '100'}) svc2 = example_bento_service_class() svc2.save(labels={'cohort': '110'}) svc3 = example_bento_service_class() svc3.save(labels={'cohort': '120'}) bentos = yatai_client.repository.list(labels='cohort') assert len(bentos) == 3 yatai_client.repository.delete(labels='cohort in (100, 110)') bentos = yatai_client.repository.list(labels='cohort') assert len(bentos) == 1 yatai_client.repository.delete(labels='cohort') bentos = yatai_client.repository.list(labels='cohort') assert len(bentos) == 0 def test_delete_bento_by_name(yatai_client): class DeleteBentoByNameTest(BentoService): pass svc = DeleteBentoByNameTest() svc.save() assert yatai_client.repository.get(svc.tag).version == svc.version assert len(yatai_client.repository.list(bento_name=svc.name)) == 1 yatai_client.repository.delete(bento_name=svc.name) with pytest.raises(BentoMLException) as excinfo: yatai_client.repository.get(svc.tag) assert f"{svc.tag} not found" in str(excinfo.value) assert len(yatai_client.repository.list(bento_name=svc.name)) == 0 def test_delete_bentos_by_name_and_labels(example_bento_service_class, yatai_client): svc1 = example_bento_service_class() svc1.save(labels={'dataset': '20201212'}) svc2 = example_bento_service_class() svc2.save(labels={'dataset': '20201212'}) svc3 = example_bento_service_class() svc3.save(labels={'dataset': '20210101'}) class ThisShouldNotBeDeleted(BentoService): pass svc2 = ThisShouldNotBeDeleted() svc2.save() yatai_client.repository.delete( bento_name=example_bento_service_class.name, labels='dataset=20201212' ) assert ( len(yatai_client.repository.list(bento_name=example_bento_service_class.name)) == 1 ) # other services should not be deleted assert yatai_client.repository.get(svc2.tag).version == svc2.version yatai_client.repository.delete(svc2.tag) assert len(yatai_client.repository.list(bento_name=svc2.name)) == 0 def test_delete_all_bentos(example_bento_service_class, yatai_client): svc1 = example_bento_service_class() svc1.save() svc2 = example_bento_service_class() svc2.save() svc3 = example_bento_service_class() svc3.save() assert len(yatai_client.repository.list()) == 3 yatai_client.repository.delete(prune=True) assert len(yatai_client.repository.list()) == 0 def test_delete_all_bentos_from_cli(example_bento_service_class, yatai_client): svc1 = example_bento_service_class() svc1.save() svc2 = example_bento_service_class() svc2.save() svc3 = example_bento_service_class() svc3.save() assert len(yatai_client.repository.list()) == 3 runner = CliRunner() cli = create_bentoml_cli() result = runner.invoke(cli.commands['delete'], ['--all', '-y'],) assert result.exit_code == 0 assert len(yatai_client.repository.list()) == 0 def test_delete_multiple_bentos_by_tag_from_cli( example_bento_service_class, yatai_client ): svc1 = example_bento_service_class() svc1.save() svc2 = example_bento_service_class() svc2.save() svc3 = example_bento_service_class() svc3.save() runner = CliRunner() cli = create_bentoml_cli() result = runner.invoke(cli.commands['delete'], [svc1.tag, '-y'],) assert result.exit_code == 0 assert ( len(yatai_client.repository.list(bento_name=example_bento_service_class.name)) == 2 ) result = runner.invoke(cli.commands['delete'], [f'{svc2.tag},{svc3.tag}', '-y']) assert result.exit_code == 0 assert ( len(yatai_client.repository.list(bento_name=example_bento_service_class.name)) == 0 )
2,128
392
package jetbrick.template.exec.value; import jetbrick.template.exec.AbstractJetxTest; import org.junit.Assert; import org.junit.Test; public class ValueTest extends AbstractJetxTest { @Test public void testValue() { Assert.assertEquals("<>", eval("${'<>'}")); } @Test public void testValueEscape() { Assert.assertEquals("&lt;&gt;", eval("$!{'<>'}")); } }
167
2,206
/* * ****************************************************************************** * * * * * * This program and the accompanying materials are made available under the * * terms of the Apache License, Version 2.0 which is available at * * https://www.apache.org/licenses/LICENSE-2.0. * * * * See the NOTICE file distributed with this work for additional * * information regarding copyright ownership. * * Unless required by applicable law or agreed to in writing, software * * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * * License for the specific language governing permissions and limitations * * under the License. * * * * SPDX-License-Identifier: Apache-2.0 * ***************************************************************************** */ package org.nd4j.linalg.util; import lombok.AllArgsConstructor; import lombok.Data; import org.apache.commons.io.FileUtils; import org.nd4j.common.base.Preconditions; import org.nd4j.linalg.api.ndarray.INDArray; import org.nd4j.linalg.factory.Nd4j; import org.nd4j.common.function.BiFunction; import org.nd4j.common.primitives.Triple; import java.io.File; import java.net.URI; import java.util.*; public class ND4JTestUtils { private ND4JTestUtils(){ } @AllArgsConstructor @Data public static class ComparisonResult { List<Triple<File,File,Boolean>> allResults; List<Triple<File,File,Boolean>> passed; List<Triple<File,File,Boolean>> failed; List<File> skippedDir1; List<File> skippedDir2; } /** * A function for use with {@link #validateSerializedArrays(File, File, boolean, BiFunction)} using {@link INDArray#equals(Object)} */ public static class EqualsFn implements BiFunction<INDArray,INDArray,Boolean> { @Override public Boolean apply(INDArray i1, INDArray i2) { return i1.equals(i2); } } /** * A function for use with {@link #validateSerializedArrays(File, File, boolean, BiFunction)} using {@link INDArray#equalsWithEps(Object, double)} */ @AllArgsConstructor public static class EqualsWithEpsFn implements BiFunction<INDArray,INDArray,Boolean> { private final double eps; @Override public Boolean apply(INDArray i1, INDArray i2) { return i1.equalsWithEps(i2, eps); } } /** * Scan the specified directories for matching files (i.e., same path relative to their respective root directories) * and compare the contents using INDArray.equals (via {@link EqualsFn} * Assumes the saved files represent INDArrays saved with {@link Nd4j#saveBinary(INDArray, File)} * @param dir1 First directory * @param dir2 Second directory * @param recursive Whether to search recursively (i.e., include files in subdirectories * @return Comparison results */ public static ComparisonResult validateSerializedArrays(File dir1, File dir2, boolean recursive) throws Exception { return validateSerializedArrays(dir1, dir2, recursive, new EqualsFn()); } /** * Scan the specified directories for matching files (i.e., same path relative to their respective root directories) * and compare the contents using a provided function.<br> * Assumes the saved files represent INDArrays saved with {@link Nd4j#saveBinary(INDArray, File)} * @param dir1 First directory * @param dir2 Second directory * @param recursive Whether to search recursively (i.e., include files in subdirectories * @return Comparison results */ public static ComparisonResult validateSerializedArrays(File dir1, File dir2, boolean recursive, BiFunction<INDArray,INDArray,Boolean> evalFn) throws Exception { File[] f1 = FileUtils.listFiles(dir1, null, recursive).toArray(new File[0]); File[] f2 = FileUtils.listFiles(dir2, null, recursive).toArray(new File[0]); Preconditions.checkState(f1.length > 0, "No files found for directory 1: %s", dir1.getAbsolutePath() ); Preconditions.checkState(f2.length > 0, "No files found for directory 2: %s", dir2.getAbsolutePath() ); Map<String,File> relativized1 = new HashMap<>(); Map<String,File> relativized2 = new HashMap<>(); URI u = dir1.toURI(); for(File f : f1){ if(!f.isFile()) continue; String relative = u.relativize(f.toURI()).getPath(); relativized1.put(relative, f); } u = dir2.toURI(); for(File f : f2){ if(!f.isFile()) continue; String relative = u.relativize(f.toURI()).getPath(); relativized2.put(relative, f); } List<File> skipped1 = new ArrayList<>(); for(String s : relativized1.keySet()){ if(!relativized2.containsKey(s)){ skipped1.add(relativized1.get(s)); } } List<File> skipped2 = new ArrayList<>(); for(String s : relativized2.keySet()){ if(!relativized1.containsKey(s)){ skipped2.add(relativized1.get(s)); } } List<Triple<File,File,Boolean>> allResults = new ArrayList<>(); List<Triple<File,File,Boolean>> passed = new ArrayList<>(); List<Triple<File,File,Boolean>> failed = new ArrayList<>(); for(Map.Entry<String,File> e : relativized1.entrySet()){ File file1 = e.getValue(); File file2 = relativized2.get(e.getKey()); if(file2 == null) continue; INDArray i1 = Nd4j.readBinary(file1); INDArray i2 = Nd4j.readBinary(file2); boolean b = evalFn.apply(i1, i2); Triple<File,File,Boolean> t = new Triple<>(file1, file2, b); allResults.add(t); if(b){ passed.add(t); } else { failed.add(t); } } Comparator<Triple<File,File,Boolean>> c = new Comparator<Triple<File, File, Boolean>>() { @Override public int compare(Triple<File, File, Boolean> o1, Triple<File, File, Boolean> o2) { return o1.getFirst().compareTo(o2.getFirst()); } }; Collections.sort(allResults, c); Collections.sort(passed, c); Collections.sort(failed, c); Collections.sort(skipped1); Collections.sort(skipped2); return new ComparisonResult(allResults, passed, failed, skipped1, skipped2); } }
2,710
679
<reponame>Grosskopf/openoffice /************************************************************** * * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. * *************************************************************/ #include "mysqlc_resultsetmetadata.hxx" #include "mysqlc_general.hxx" #include "cppconn/exception.h" #include <rtl/ustrbuf.hxx> using namespace connectivity::mysqlc; using namespace com::sun::star::uno; using namespace com::sun::star::lang; using namespace com::sun::star::sdbc; using ::rtl::OUString; // ------------------------------------------------------------------------- OResultSetMetaData::~OResultSetMetaData() { } /* }}} */ /* {{{ OResultSetMetaData::getColumnDisplaySize() -I- */ sal_Int32 SAL_CALL OResultSetMetaData::getColumnDisplaySize(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getColumnDisplaySize"); try { meta->getColumnDisplaySize(column); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getColumnDisplaySize", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return 0; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getColumnType() -I- */ sal_Int32 SAL_CALL OResultSetMetaData::getColumnType(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getColumnType"); checkColumnIndex(column); try { return mysqlc_sdbc_driver::mysqlToOOOType(meta->getColumnType(column)); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return 0; // fool compiler } /* }}} */ /* XXX: This method doesn't throw exceptions at all. Should it declare that it throws ?? What if throw() is removed? Does it change the API, the open-close principle? */ /* {{{ OResultSetMetaData::getColumnCount() -I- */ sal_Int32 SAL_CALL OResultSetMetaData::getColumnCount() throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getColumnCount"); try { return meta->getColumnCount(); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return 0; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isCaseSensitive() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isCaseSensitive(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isCaseSensitive"); checkColumnIndex(column); try { return meta->isCaseSensitive(column); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getSchemaName() -I- */ OUString SAL_CALL OResultSetMetaData::getSchemaName(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getSchemaName"); checkColumnIndex(column); try { return convert(meta->getSchemaName(column)); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return OUString(); // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getColumnName() -I- */ OUString SAL_CALL OResultSetMetaData::getColumnName(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getColumnName"); checkColumnIndex(column); try { return convert( meta->getColumnName( column ) ); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return OUString(); // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getTableName() -I- */ OUString SAL_CALL OResultSetMetaData::getTableName(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getTableName"); checkColumnIndex(column); try { return convert(meta->getTableName(column)); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return OUString(); // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getCatalogName() -I- */ OUString SAL_CALL OResultSetMetaData::getCatalogName(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getCatalogName"); checkColumnIndex(column); try { return convert(meta->getCatalogName(column)); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return OUString(); // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getColumnTypeName() -I- */ OUString SAL_CALL OResultSetMetaData::getColumnTypeName(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getColumnTypeName"); checkColumnIndex(column); try { return convert(meta->getColumnTypeName(column)); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return OUString(); // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getColumnLabel() -I- */ OUString SAL_CALL OResultSetMetaData::getColumnLabel(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getColumnLabel"); checkColumnIndex(column); try { return convert(meta->getColumnLabel(column)); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return OUString(); // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getColumnServiceName() -I- */ OUString SAL_CALL OResultSetMetaData::getColumnServiceName(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getColumnServiceName"); checkColumnIndex(column); OUString aRet = OUString(); return aRet; } /* }}} */ /* {{{ OResultSetMetaData::isCurrency() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isCurrency(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isCurrency"); checkColumnIndex(column); try { return meta->isCurrency(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isAutoIncrement() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isAutoIncrement(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isAutoIncrement"); checkColumnIndex(column); try { return meta->isAutoIncrement(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isSigned() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isSigned(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isSigned"); checkColumnIndex(column); try { return meta->isSigned(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getPrecision() -I- */ sal_Int32 SAL_CALL OResultSetMetaData::getPrecision(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::getPrecision"); checkColumnIndex(column); try { return meta->getPrecision(column); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getPrecision", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return 0; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::getScale() -I- */ sal_Int32 SAL_CALL OResultSetMetaData::getScale(sal_Int32 column) throw(::com::sun::star::sdbc::SQLException, ::com::sun::star::uno::RuntimeException) { OSL_TRACE("OResultSetMetaData::getScale"); checkColumnIndex(column); try { return meta->getScale(column); } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getScale", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return 0; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isNullable() -I- */ sal_Int32 SAL_CALL OResultSetMetaData::isNullable(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isNullable"); checkColumnIndex(column); try { return meta->isNullable(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isSearchable() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isSearchable(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isSearchable"); checkColumnIndex(column); try { return meta->isSearchable(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isReadOnly() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isReadOnly(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isReadOnly"); checkColumnIndex(column); try { return meta->isReadOnly(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isDefinitelyWritable() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isDefinitelyWritable(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isDefinitelyWritable"); checkColumnIndex(column); try { return meta->isDefinitelyWritable(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::isWritable() -I- */ sal_Bool SAL_CALL OResultSetMetaData::isWritable(sal_Int32 column) throw(SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::isWritable"); checkColumnIndex(column); try { return meta->isWritable(column)? sal_True:sal_False; } catch (sql::MethodNotImplementedException) { mysqlc_sdbc_driver::throwFeatureNotImplementedException("OResultSetMetaData::getMetaData", *this); } catch (sql::SQLException &e) { mysqlc_sdbc_driver::translateAndThrow(e, *this, m_encoding); } return sal_False; // fool compiler } /* }}} */ /* {{{ OResultSetMetaData::checkColumnIndex() -I- */ void OResultSetMetaData::checkColumnIndex(sal_Int32 columnIndex) throw (SQLException, RuntimeException) { OSL_TRACE("OResultSetMetaData::checkColumnIndex"); if (columnIndex < 1 || columnIndex > (sal_Int32) meta->getColumnCount()) { ::rtl::OUStringBuffer buf; buf.appendAscii( "Column index out of range (expected 1 to " ); buf.append( sal_Int32( meta->getColumnCount() ) ); buf.appendAscii( ", got " ); buf.append( sal_Int32( columnIndex ) ); buf.append( sal_Unicode( '.' ) ); throw SQLException( buf.makeStringAndClear(), *this, OUString(), 1, Any() ); } } /* }}} */ /* * Local variables: * tab-width: 4 * c-basic-offset: 4 * End: * vim600: noet sw=4 ts=4 fdm=marker * vim<600: noet sw=4 ts=4 */
5,335
386
<reponame>ccoderJava/bus<gh_stars>100-1000 /********************************************************************************* * * * The MIT License (MIT) * * * * Copyright (c) 2015-2021 aoju.org and other contributors. * * * * Permission is hereby granted, free of charge, to any person obtaining a copy * * of this software and associated documentation files (the "Software"), to deal * * in the Software without restriction, including without limitation the rights * * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * * copies of the Software, and to permit persons to whom the Software is * * furnished to do so, subject to the following conditions: * * * * The above copyright notice and this permission notice shall be included in * * all copies or substantial portions of the Software. * * * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * * THE SOFTWARE. * * * ********************************************************************************/ package org.aoju.bus.image; import lombok.Data; import org.aoju.bus.image.metric.Connection; import org.aoju.bus.image.metric.internal.pdu.ExtendedNegotiate; import java.util.EnumSet; /** * 服务请求选项 * * @author <NAME> * @version 6.3.2 * @since JDK 1.8+ */ @Data public class Option { // 密码套件 public static final String[] TLS = {"SSL_RSA_WITH_NULL_SHA", "TLS_RSA_WITH_AES_128_CBC_SHA", "SSL_RSA_WITH_3DES_EDE_CBC_SHA"}; public static final String[] TLS_NULL = {"SSL_RSA_WITH_NULL_SHA"}; public static final String[] TLS_3DES = {"SSL_RSA_WITH_3DES_EDE_CBC_SHA"}; public static final String[] TLS_AES = {"TLS_RSA_WITH_AES_128_CBC_SHA", "SSL_RSA_WITH_3DES_EDE_CBC_SHA"}; // TLS协议 public static final String[] defaultProtocols = {"TLSv1", "SSLv3"}; public static final String[] tls1 = {"TLSv1"}; public static final String[] tls11 = {"TLSv1.1"}; public static final String[] tls12 = {"TLSv1.2"}; public static final String[] ssl3 = {"SSLv3"}; public static final String[] ssl2Hello = {"SSLv2Hello", "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2"}; /* 此AE可以异步执行的最大操作数,无限制为0,而非异步为1 */ private int maxOpsInvoked = Connection.SYNCHRONOUS_MODE; private int maxOpsPerformed = Connection.SYNCHRONOUS_MODE; private int maxPdulenRcv = Connection.DEF_MAX_PDU_LENGTH; private int maxPdulenSnd = Connection.DEF_MAX_PDU_LENGTH; private boolean packPDV = true; private int backlog = Connection.DEF_BACKLOG; private int connectTimeout = Connection.NO_TIMEOUT; private int requestTimeout = Connection.NO_TIMEOUT; private int acceptTimeout = Connection.NO_TIMEOUT; private int releaseTimeout = Connection.NO_TIMEOUT; private int responseTimeout = Connection.NO_TIMEOUT; private int retrieveTimeout = Connection.NO_TIMEOUT; private int idleTimeout = Connection.NO_TIMEOUT; private int socloseDelay = Connection.DEF_SOCKETDELAY; private int sosndBuffer = Connection.DEF_BUFFERSIZE; private int sorcvBuffer = Connection.DEF_BUFFERSIZE; private boolean tcpNoDelay = true; private String[] cipherSuites; private String[] tlsProtocols; private boolean tlsNeedClientAuth; private String keystoreURL; private String keystoreType; private String keystorePass; private String keyPass; private String truststoreURL; private String truststoreType; private String truststorePass; public Option() { } public Option(boolean tlsNeedClientAuth, String keystoreURL, String keystoreType, String keystorePass, String keyPass, String truststoreURL, String truststoreType, String truststorePass) { this( TLS, defaultProtocols, tlsNeedClientAuth, keystoreURL, keystoreType, keystorePass, keyPass, truststoreURL, truststoreType, truststorePass ); } public Option(String[] cipherSuites, String[] tlsProtocols, boolean tlsNeedClientAuth, String keystoreURL, String keystoreType, String keystorePass, String keyPass, String truststoreURL, String truststoreType, String truststorePass) { if (null == cipherSuites) { throw new IllegalArgumentException("cipherSuites cannot be null"); } this.cipherSuites = cipherSuites; this.tlsProtocols = tlsProtocols; this.tlsNeedClientAuth = tlsNeedClientAuth; this.keystoreURL = keystoreURL; this.keystoreType = keystoreType; this.keystorePass = <PASSWORD>Pass; this.keyPass = keyPass; this.truststoreURL = truststoreURL; this.truststoreType = truststoreType; this.truststorePass = truststorePass; } public enum Type { RELATIONAL, DATETIME, FUZZY, TIMEZONE; public static byte[] toExtendedNegotiationInformation(EnumSet<Type> opts) { byte[] info = new byte[opts.contains(TIMEZONE) ? 4 : opts.contains(FUZZY) || opts.contains(DATETIME) ? 3 : 1]; for (Type query : opts) info[query.ordinal()] = 1; return info; } public static EnumSet<Type> toOptions(ExtendedNegotiate extNeg) { EnumSet<Type> opts = EnumSet.noneOf(Type.class); if (null != extNeg) { toOption(extNeg, Type.RELATIONAL, opts); toOption(extNeg, Type.DATETIME, opts); toOption(extNeg, Type.FUZZY, opts); toOption(extNeg, Type.TIMEZONE, opts); } return opts; } private static void toOption(ExtendedNegotiate extNeg, Type opt, EnumSet<Type> opts) { if (extNeg.getField(opt.ordinal(), (byte) 0) == 1) opts.add(opt); } } }
3,592
348
<reponame>chamberone/Leaflet.PixiOverlay {"nom":"<NAME>","circ":"3ème circonscription","dpt":"Drôme","inscrits":29,"abs":5,"votants":24,"blancs":7,"nuls":0,"exp":17,"res":[{"nuance":"REM","nom":"<NAME>","voix":10},{"nuance":"LR","nom":"<NAME>","voix":7}]}
108
12,940
{ "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#", "type": "QuickStart", "itemDisplayName": "Create Recovery Services Vault with backup policies", "description": "This template creates a Recovery Services Vault with backup policies and configure optional features such system identity, backup storage type, cross region restore and diagnostics logs and a delete lock.", "summary": "This template creates a Recovery Services Vault with backup policies configured", "githubUsername": "tw3lveparsecs", "dateUpdated": "2021-09-05" }
144
1,444
<reponame>GabrielSturtevant/mage package mage.cards.r; import java.util.UUID; import mage.MageInt; import mage.abilities.common.LimitedTimesPerTurnActivatedAbility; import mage.abilities.costs.mana.ManaCostsImpl; import mage.abilities.effects.common.continuous.BoostSourceEffect; import mage.cards.CardImpl; import mage.cards.CardSetInfo; import mage.constants.CardType; import mage.constants.SubType; import mage.constants.Duration; import mage.constants.Zone; /** * * @author Loki */ public final class Rootwalla extends CardImpl { public Rootwalla(UUID ownerId, CardSetInfo setInfo) { super(ownerId,setInfo,new CardType[]{CardType.CREATURE},"{2}{G}"); this.subtype.add(SubType.LIZARD); this.power = new MageInt(2); this.toughness = new MageInt(2); this.addAbility(new LimitedTimesPerTurnActivatedAbility(Zone.BATTLEFIELD, new BoostSourceEffect(2, 2, Duration.EndOfTurn), new ManaCostsImpl("{1}{G}"))); } private Rootwalla(final Rootwalla card) { super(card); } @Override public Rootwalla copy() { return new Rootwalla(this); } }
420
852
<gh_stars>100-1000 import FWCore.ParameterSet.Config as cms process = cms.Process("SKIMb") process.load("FWCore.MessageLogger.MessageLogger_cfi") process.load("CondCore.DBCommon.CondDBSetup_cfi") process.source = cms.Source("PoolSource", fileNames = cms.untracked.vstring( # '/store/data/Commissioning09/Cosmics/RAW/v1/000/079/153/025F7681-391A-DE11-9556-0016177CA7A0.root' '/store/data/Commissioning08/Cosmics/RAW-RECO/CRAFT_ALL_V9_SuperPointing_225-v3/0005/B8FB3273-5DFF-DD11-BEAB-00304875A7B5.root', '/store/data/Commissioning08/Cosmics/RAW-RECO/CRAFT_ALL_V9_SuperPointing_225-v3/0005/C0E4F880-5CFF-DD11-B561-0030487624FD.root', '/store/data/Commissioning08/Cosmics/RAW-RECO/CRAFT_ALL_V9_SuperPointing_225-v3/0005/EAA9AE47-5FFF-DD11-A966-001A92810ADE.root' ) ) process.maxEvents = cms.untracked.PSet( input = cms.untracked.int32(-1) ) process.load("Configuration.EventContent.EventContentCosmics_cff") #-------------------------------------------------- # Pick a range of events # (includes the first and last ones specified) #-------------------------------------------------- process.pickEvents = cms.EDFilter( "PickEvents", # the original format to input run/event -based selection is described in : # DPGAnalysis/Skims/data/listrunev # and kept as default, for historical reasons RunEventList = cms.untracked.string("DPGAnalysis/Skims/data/listrunev"), # run/lumiSection @json -based input of selection can be toggled (but not used in THIS example) IsRunLsBased = cms.bool(False), # json is not used in this example -> list of LS left empty LuminositySectionsBlockRange = cms.untracked.VLuminosityBlockRange( () ) ) process.PickEventsPath = cms.Path( process.pickEvents ) process.out = cms.OutputModule("PoolOutputModule", outputCommands = cms.untracked.vstring('keep *','drop *_MEtoEDMConverter_*_*'), SelectEvents = cms.untracked.PSet( SelectEvents = cms.vstring('PickEventsPath') ), dataset = cms.untracked.PSet( dataTier = cms.untracked.string('RAW-RECO'), filterName = cms.untracked.string('PickEvents')), fileName = cms.untracked.string("PickEvents.root"), ) process.this_is_the_end = cms.EndPath(process.out)
1,009
477
<gh_stars>100-1000 import os __THIS = os.path.dirname(__file__) def join(*args): return os.path.abspath(os.path.join(*args)) KNOWN_TEXT_EXTENSIONS = ( ".fasta", ".fq", ".fastq", ".sam", ".bed", ".gff", ".fa", ".r", ".gtf", ".gb", ".tsv", ".csv", ".rep", ".sh", ".md", ".txt" ) # Stop words used in search STOPWORDS = ( 'a,able,about,across,after,all,almost,also,am,among,an,' 'and,any,are,as,at,be,because,been,but,by,can,cannot,' 'could,dear,did,do,does,either,else,ever,every,for,from,' 'get,got,had,has,have,he,her,hers,him,his,how,however,i,' 'if,in,into,is,it,its,just,least,let,like,likely,may,me,' 'might,most,must,my,neither,no,nor,not,of,off,often,on,' 'only,or,other,our,own,rather,said,say,says,she,should,' 'since,so,some,than,that,the,their,them,then,there,' 'these,they,this,tis,to,too,twas,us,wants,was,we,were,' 'what,when,where,which,while,who,whom,why,will,with,' 'would,yet,you,your').split(',') REDIRECT_FIELD_NAME = 'next' COPIED_DATA = "data" COPIED_RESULTS = "results" COPIED_RECIPES = "recipes" COPIED_FILES = "files" CLONED_RECIPES = "clone" CLIPBOARD_CONTENTS = [COPIED_DATA, COPIED_RESULTS, COPIED_RECIPES, COPIED_FILES, CLONED_RECIPES] # Paste as data objects DATA_PASTE_TARGETS = ','.join([COPIED_DATA, COPIED_RESULTS, COPIED_FILES]) # Paste as recipe objects RECIPE_PASTE_TARGETS = ','.join([COPIED_RECIPES, CLONED_RECIPES]) KNOWN_TEXT_EXTENSIONS = set(KNOWN_TEXT_EXTENSIONS) # The maximum length in characters for a typical name and text field. MAX_NAME_LEN = 256 MAX_FIELD_LEN = 1024 MAX_TEXT_LEN = 10000 MAX_LOG_LEN = 20 * MAX_TEXT_LEN # Map a file extension to a biostar-engine datatype. EXT_TO_TYPE = dict( fa='FASTA', fasta='FASTA', txt='TXT', fq='FQ', gtf='GTF', gb='GB', tsv='TSV', csv='CSV', rep='REP', md='MD', sam='SAM', bed='BED', gff='GFF', r='R', fastq='FASTQ' ) RADIO = "RADIO" DROPDOWN = "DROPDOWN" INTEGER = "INTEGER" UPLOAD = "UPLOAD" FLOAT = "FLOAT" CHECKBOX = "CHECKBOX" TEXTBOX = "TEXTBOX" SQL = "SQL"
993
526
/* SPDX-License-Identifier: Apache-2.0 */ /* Copyright Contributors to the ODPi Egeria project. */ package org.odpi.openmetadata.opentypes; import org.odpi.openmetadata.repositoryservices.archiveutilities.OMRSArchiveBuilder; import org.odpi.openmetadata.repositoryservices.archiveutilities.OMRSArchiveHelper; import org.odpi.openmetadata.repositoryservices.connectors.stores.archivestore.properties.OpenMetadataArchive; import org.odpi.openmetadata.repositoryservices.connectors.stores.archivestore.properties.OpenMetadataArchiveType; import org.odpi.openmetadata.repositoryservices.connectors.stores.metadatacollectionstore.properties.typedefs.*; import org.odpi.openmetadata.repositoryservices.ffdc.OMRSErrorCode; import org.odpi.openmetadata.repositoryservices.ffdc.exception.OMRSLogicErrorException; import java.util.ArrayList; import java.util.Date; import java.util.List; /** * OpenMetadataTypesArchive builds an open metadata archive containing all of the standard open metadata types. * These types have hardcoded dates and guids so that however many times this archive is rebuilt, it will * produce the same content. * <p> * Details of the open metadata types are documented on the wiki: * <a href="https://egeria.odpi.org/open-metadata-publication/website/open-metadata-types/">The Open Metadata Type System</a> * </p> * <p> * There are 8 areas, each covering a different topic area of metadata. The module breaks down the process of creating * the models into the areas and then the individual models to simplify the maintenance of this class * </p> */ public class OpenMetadataTypesArchive1_6 { /* * This is the header information for the archive. */ private static final String archiveGUID = "bce3b0a0-662a-4f87-b8dc-844078a11a6e"; private static final String archiveName = "Open Metadata Types"; private static final String archiveDescription = "Standard types for open metadata repositories."; private static final OpenMetadataArchiveType archiveType = OpenMetadataArchiveType.CONTENT_PACK; private static final String archiveVersion = "1.6"; private static final String originatorName = "<NAME>"; private static final String originatorLicense = "Apache 2.0"; private static final Date creationDate = new Date(1516313040008L); /* * Specific values for initializing TypeDefs */ private static final long versionNumber = 1L; private static final String versionName = "1.0"; private OMRSArchiveBuilder archiveBuilder; private OMRSArchiveHelper archiveHelper; /** * Default constructor sets up the archive builder. This in turn sets up the header for the archive. */ public OpenMetadataTypesArchive1_6() { this.archiveBuilder = new OMRSArchiveBuilder(archiveGUID, archiveName, archiveDescription, archiveType, archiveVersion, originatorName, originatorLicense, creationDate, null); this.archiveHelper = new OMRSArchiveHelper(archiveBuilder, archiveGUID, originatorName, creationDate, versionNumber, versionName); } /** * Chained constructor sets up the archive builder. This in turn sets up the header for the archive. * * @param archiveBuilder accumulator for types */ public OpenMetadataTypesArchive1_6(OMRSArchiveBuilder archiveBuilder) { this.archiveBuilder = archiveBuilder; this.archiveHelper = new OMRSArchiveHelper(archiveBuilder, archiveGUID, originatorName, creationDate, versionNumber, versionName); } /** * Return the unique identifier for this archive. * * @return String guid */ public String getArchiveGUID() { return archiveGUID; } /** * Returns the open metadata type archive containing all of the standard open metadata types. * * @return populated open metadata archive object */ public OpenMetadataArchive getOpenMetadataArchive() { final String methodName = "getOpenMetadataArchive"; if (this.archiveBuilder != null) { /* * Build the archive */ this.getOriginalTypes(); /* * The completed archive is ready to be packaged up and returned */ return this.archiveBuilder.getOpenMetadataArchive(); } else { /* * This is a logic error since it means the creation of the archive builder threw an exception * in the constructor and so this object should not be used. */ throw new OMRSLogicErrorException(OMRSErrorCode.ARCHIVE_UNAVAILABLE.getMessageDefinition(), this.getClass().getName(), methodName); } } /** * Add the types from this archive to the archive builder supplied in the * constructor. */ public void getOriginalTypes() { OpenMetadataTypesArchive1_5 previousTypes = new OpenMetadataTypesArchive1_5(archiveBuilder); /* * Pull the types from previous releases. */ previousTypes.getOriginalTypes(); /* * Calls for new types go here */ update0501SchemaElements(); update0505SchemaAttributes(); update0512DerivedSchemaAttributes(); } private void update0501SchemaElements() { this.archiveBuilder.addTypeDefPatch(updateSchemaElementEntity()); } /** * 0501 - SchemaElement entity is changed to allow a schema element to be marked as deprecated. */ private TypeDefPatch updateSchemaElementEntity() { /* * Create the Patch */ final String typeName = "SchemaElement"; TypeDefPatch typeDefPatch = archiveBuilder.getPatchForType(typeName); typeDefPatch.setUpdatedBy(originatorName); typeDefPatch.setUpdateTime(creationDate); /* * Build the attributes */ List<TypeDefAttribute> properties = new ArrayList<>(); TypeDefAttribute property; final String attribute1Name = "isDeprecated"; final String attribute1Description = "This element may still be used but is flagged that it will be removed at some point in the future."; final String attribute1DescriptionGUID = null; property = archiveHelper.getBooleanTypeDefAttribute(attribute1Name, attribute1Description, attribute1DescriptionGUID); properties.add(property); typeDefPatch.setPropertyDefinitions(properties); return typeDefPatch; } private void update0505SchemaAttributes() { this.archiveBuilder.addTypeDefPatch(updateSchemaAttributeEntity()); this.archiveBuilder.addTypeDefPatch(updateTypeEmbeddedAttributeClassification()); } /** * 0505 - SchemaAttribute entity is changed to show deprecated properties */ private TypeDefPatch updateSchemaAttributeEntity() { /* * Create the Patch */ final String typeName = "SchemaAttribute"; TypeDefPatch typeDefPatch = archiveBuilder.getPatchForType(typeName); typeDefPatch.setUpdatedBy(originatorName); typeDefPatch.setUpdateTime(creationDate); /* * Build the attributes */ List<TypeDefAttribute> properties = new ArrayList<>(); TypeDefAttribute property; final String attribute1Name = "minimumLength"; final String attribute1Description = "Minimum length of the data value (zero means unlimited)."; final String attribute1DescriptionGUID = null; final String attribute2Name = "length"; final String attribute2Description = "Length of the data field (zero means unlimited)."; final String attribute2DescriptionGUID = null; final String attribute3Name = "significantDigits"; final String attribute3Description = "Number of significant digits before the decimal point (zero means it is an integer)."; final String attribute3DescriptionGUID = null; final String attribute4Name = "isNullable"; final String attribute4Description = "Accepts null values or not."; final String attribute4DescriptionGUID = null; final String attribute6Name = "cardinality"; final String attribute6Description = "Number of occurrences of this attribute allowed (deprecated)."; final String attribute6DescriptionGUID = null; final String attribute6ReplacedBy = "maxCardinality"; final String attribute7Name = "name"; final String attribute7Description = "Name of schema attribute (deprecated)."; final String attribute7DescriptionGUID = null; final String attribute7ReplacedBy = "displayName"; property = archiveHelper.getIntTypeDefAttribute(attribute1Name, attribute1Description, attribute1DescriptionGUID); properties.add(property); property = archiveHelper.getIntTypeDefAttribute(attribute2Name, attribute2Description, attribute2DescriptionGUID); properties.add(property); property = archiveHelper.getIntTypeDefAttribute(attribute3Name, attribute3Description, attribute3DescriptionGUID); properties.add(property); property = archiveHelper.getBooleanTypeDefAttribute(attribute4Name, attribute4Description, attribute4DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute6Name, attribute6Description, attribute6DescriptionGUID); property.setReplacedByAttribute(attribute6ReplacedBy); property.setAttributeStatus(TypeDefAttributeStatus.DEPRECATED_ATTRIBUTE); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute7Name, attribute7Description, attribute7DescriptionGUID); property.setReplacedByAttribute(attribute7ReplacedBy); property.setAttributeStatus(TypeDefAttributeStatus.DEPRECATED_ATTRIBUTE); properties.add(property); typeDefPatch.setPropertyDefinitions(properties); return typeDefPatch; } /** * 0505 - TypeEmbeddedAttribute classification is changed to include more values of schema type */ private TypeDefPatch updateTypeEmbeddedAttributeClassification() { /* * Create the Patch */ final String typeName = "TypeEmbeddedAttribute"; TypeDefPatch typeDefPatch = archiveBuilder.getPatchForType(typeName); typeDefPatch.setUpdatedBy(originatorName); typeDefPatch.setUpdateTime(creationDate); /* * Build the attributes */ List<TypeDefAttribute> properties = new ArrayList<>(); TypeDefAttribute property; final String attribute1Name = "schemaTypeName"; final String attribute1Description = "Type name for the schema type."; final String attribute1DescriptionGUID = null; final String attribute2Name = "qualifiedName"; final String attribute2Description = "Unique name for the schema type."; final String attribute2DescriptionGUID = null; final String attribute3Name = "displayName"; final String attribute3Description = "Display name for the schema type."; final String attribute3DescriptionGUID = null; final String attribute4Name = "description"; final String attribute4Description = "Description of the schema type."; final String attribute4DescriptionGUID = null; final String attribute5Name = "versionNumber"; final String attribute5Description = "Version of the schema type."; final String attribute5DescriptionGUID = null; final String attribute6Name = "author"; final String attribute6Description = "User name of the person or process that created the schema type."; final String attribute6DescriptionGUID = null; final String attribute7Name = "usage"; final String attribute7Description = "Guidance on how the schema should be used."; final String attribute7DescriptionGUID = null; final String attribute8Name = "defaultValue"; final String attribute8Description = "Initial value for data stored in this schema type (primitive and enum types)."; final String attribute8DescriptionGUID = null; final String attribute9Name = "fixedValue"; final String attribute9Description = "Fixed value for data stored in this schema type (literal schema type)."; final String attribute9DescriptionGUID = null; final String attribute10Name = "additionalProperties"; final String attribute10Description = "Additional properties for the schema type."; final String attribute10DescriptionGUID = null; final String attribute11Name = "isDeprecated"; final String attribute11Description = "This element may still be used but is flagged that it will be removed at some point in the " + "future."; final String attribute11DescriptionGUID = null; property = archiveHelper.getStringTypeDefAttribute(attribute1Name, attribute1Description, attribute1DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute2Name, attribute2Description, attribute2DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute3Name, attribute3Description, attribute3DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute4Name, attribute4Description, attribute4DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute5Name, attribute5Description, attribute5DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute6Name, attribute6Description, attribute6DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute7Name, attribute7Description, attribute7DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute8Name, attribute8Description, attribute8DescriptionGUID); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute9Name, attribute9Description, attribute9DescriptionGUID); properties.add(property); property = archiveHelper.getMapStringStringTypeDefAttribute(attribute10Name, attribute10Description, attribute10DescriptionGUID); properties.add(property); property = archiveHelper.getBooleanTypeDefAttribute(attribute11Name, attribute11Description, attribute11DescriptionGUID); properties.add(property); typeDefPatch.setPropertyDefinitions(properties); return typeDefPatch; } /** * 0512 - DerivedSchemaAttributes */ private void update0512DerivedSchemaAttributes() { this.archiveBuilder.addTypeDefPatch(updateDerivedSchemaAttributeEntity()); } /** * 0512 - SchemaAttribute entity is changed to show deprecated properties */ private TypeDefPatch updateDerivedSchemaAttributeEntity() { /* * Create the Patch */ final String typeName = "DerivedSchemaAttribute"; TypeDefPatch typeDefPatch = archiveBuilder.getPatchForType(typeName); typeDefPatch.setUpdatedBy(originatorName); typeDefPatch.setUpdateTime(creationDate); /* * Build the attributes */ List<TypeDefAttribute> properties = new ArrayList<>(); TypeDefAttribute property; final String attribute1Name = "comment"; final String attribute1Description = "Comment from source system (deprecated)."; final String attribute1DescriptionGUID = null; final String attribute2Name = "id"; final String attribute2Description = "Id of derived schema attribute (deprecated)."; final String attribute2DescriptionGUID = null; final String attribute3Name = "aggregatingFunction"; final String attribute3Description = "Aggregating function of derived schema attribute (deprecated)."; final String attribute3DescriptionGUID = null; property = archiveHelper.getStringTypeDefAttribute(attribute1Name, attribute1Description, attribute1DescriptionGUID); property.setAttributeStatus(TypeDefAttributeStatus.DEPRECATED_ATTRIBUTE); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute2Name, attribute2Description, attribute2DescriptionGUID); property.setAttributeStatus(TypeDefAttributeStatus.DEPRECATED_ATTRIBUTE); properties.add(property); property = archiveHelper.getStringTypeDefAttribute(attribute3Name, attribute3Description, attribute3DescriptionGUID); property.setAttributeStatus(TypeDefAttributeStatus.DEPRECATED_ATTRIBUTE); properties.add(property); typeDefPatch.setPropertyDefinitions(properties); return typeDefPatch; } }
9,710
14,668
// Copyright 2017 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef CHROME_BROWSER_EXTENSIONS_API_SETTINGS_PRIVATE_CHROMEOS_RESOLVE_TIME_ZONE_BY_GEOLOCATION_METHOD_SHORT_H_ #define CHROME_BROWSER_EXTENSIONS_API_SETTINGS_PRIVATE_CHROMEOS_RESOLVE_TIME_ZONE_BY_GEOLOCATION_METHOD_SHORT_H_ #include <memory> class Profile; namespace extensions { namespace settings_private { class GeneratedPref; // Time zone detection method (e.g. using general location vs. accurate // location). extern const char kResolveTimezoneByGeolocationMethodShort[]; // Constructor for kResolveTimezoneByGeolocationMethodShort preference. std::unique_ptr<GeneratedPref> CreateGeneratedResolveTimezoneByGeolocationMethodShort(Profile* profile); } // namespace settings_private } // namespace extensions #endif // CHROME_BROWSER_EXTENSIONS_API_SETTINGS_PRIVATE_CHROMEOS_RESOLVE_TIME_ZONE_BY_GEOLOCATION_METHOD_SHORT_H_
336
12,278
<reponame>rajeev02101987/arangodb<gh_stars>1000+ // Copyright 2018 the V8 project authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef V8_OBJECTS_INSTANCE_TYPE_H_ #define V8_OBJECTS_INSTANCE_TYPE_H_ #include "src/objects/elements-kind.h" #include "src/objects/objects-definitions.h" // Has to be the last include (doesn't have include guards): #include "src/objects/object-macros.h" #include "torque-generated/instance-types-tq.h" namespace v8 { namespace internal { // We use the full 16 bits of the instance_type field to encode heap object // instance types. All the high-order bits (bits 6-15) are cleared if the object // is a string, and contain set bits if it is not a string. const uint32_t kIsNotStringMask = ~((1 << 6) - 1); const uint32_t kStringTag = 0x0; // For strings, bits 0-2 indicate the representation of the string. In // particular, bit 0 indicates whether the string is direct or indirect. const uint32_t kStringRepresentationMask = (1 << 3) - 1; enum StringRepresentationTag { kSeqStringTag = 0x0, kConsStringTag = 0x1, kExternalStringTag = 0x2, kSlicedStringTag = 0x3, kThinStringTag = 0x5 }; const uint32_t kIsIndirectStringMask = 1 << 0; const uint32_t kIsIndirectStringTag = 1 << 0; // NOLINTNEXTLINE(runtime/references) (false positive) STATIC_ASSERT((kSeqStringTag & kIsIndirectStringMask) == 0); // NOLINTNEXTLINE(runtime/references) (false positive) STATIC_ASSERT((kExternalStringTag & kIsIndirectStringMask) == 0); // NOLINTNEXTLINE(runtime/references) (false positive) STATIC_ASSERT((kConsStringTag & kIsIndirectStringMask) == kIsIndirectStringTag); // NOLINTNEXTLINE(runtime/references) (false positive) STATIC_ASSERT((kSlicedStringTag & kIsIndirectStringMask) == kIsIndirectStringTag); // NOLINTNEXTLINE(runtime/references) (false positive) STATIC_ASSERT((kThinStringTag & kIsIndirectStringMask) == kIsIndirectStringTag); // For strings, bit 3 indicates whether the string consists of two-byte // characters or one-byte characters. const uint32_t kStringEncodingMask = 1 << 3; const uint32_t kTwoByteStringTag = 0; const uint32_t kOneByteStringTag = 1 << 3; // For strings, bit 4 indicates whether the data pointer of an external string // is cached. Note that the string representation is expected to be // kExternalStringTag. const uint32_t kUncachedExternalStringMask = 1 << 4; const uint32_t kUncachedExternalStringTag = 1 << 4; // For strings, bit 5 indicates that the string is internalized (if not set) or // isn't (if set). const uint32_t kIsNotInternalizedMask = 1 << 5; const uint32_t kNotInternalizedTag = 1 << 5; const uint32_t kInternalizedTag = 0; // A ConsString with an empty string as the right side is a candidate // for being shortcut by the garbage collector. We don't allocate any // non-flat internalized strings, so we do not shortcut them thereby // avoiding turning internalized strings into strings. The bit-masks // below contain the internalized bit as additional safety. // See heap.cc, mark-compact.cc and objects-visiting.cc. const uint32_t kShortcutTypeMask = kIsNotStringMask | kIsNotInternalizedMask | kStringRepresentationMask; const uint32_t kShortcutTypeTag = kConsStringTag | kNotInternalizedTag; static inline bool IsShortcutCandidate(int type) { return ((type & kShortcutTypeMask) == kShortcutTypeTag); } enum InstanceType : uint16_t { // String types. INTERNALIZED_STRING_TYPE = kTwoByteStringTag | kSeqStringTag | kInternalizedTag, ONE_BYTE_INTERNALIZED_STRING_TYPE = kOneByteStringTag | kSeqStringTag | kInternalizedTag, EXTERNAL_INTERNALIZED_STRING_TYPE = kTwoByteStringTag | kExternalStringTag | kInternalizedTag, EXTERNAL_ONE_BYTE_INTERNALIZED_STRING_TYPE = kOneByteStringTag | kExternalStringTag | kInternalizedTag, UNCACHED_EXTERNAL_INTERNALIZED_STRING_TYPE = EXTERNAL_INTERNALIZED_STRING_TYPE | kUncachedExternalStringTag | kInternalizedTag, UNCACHED_EXTERNAL_ONE_BYTE_INTERNALIZED_STRING_TYPE = EXTERNAL_ONE_BYTE_INTERNALIZED_STRING_TYPE | kUncachedExternalStringTag | kInternalizedTag, STRING_TYPE = INTERNALIZED_STRING_TYPE | kNotInternalizedTag, ONE_BYTE_STRING_TYPE = ONE_BYTE_INTERNALIZED_STRING_TYPE | kNotInternalizedTag, CONS_STRING_TYPE = kTwoByteStringTag | kConsStringTag | kNotInternalizedTag, CONS_ONE_BYTE_STRING_TYPE = kOneByteStringTag | kConsStringTag | kNotInternalizedTag, SLICED_STRING_TYPE = kTwoByteStringTag | kSlicedStringTag | kNotInternalizedTag, SLICED_ONE_BYTE_STRING_TYPE = kOneByteStringTag | kSlicedStringTag | kNotInternalizedTag, EXTERNAL_STRING_TYPE = EXTERNAL_INTERNALIZED_STRING_TYPE | kNotInternalizedTag, EXTERNAL_ONE_BYTE_STRING_TYPE = EXTERNAL_ONE_BYTE_INTERNALIZED_STRING_TYPE | kNotInternalizedTag, UNCACHED_EXTERNAL_STRING_TYPE = UNCACHED_EXTERNAL_INTERNALIZED_STRING_TYPE | kNotInternalizedTag, UNCACHED_EXTERNAL_ONE_BYTE_STRING_TYPE = UNCACHED_EXTERNAL_ONE_BYTE_INTERNALIZED_STRING_TYPE | kNotInternalizedTag, THIN_STRING_TYPE = kTwoByteStringTag | kThinStringTag | kNotInternalizedTag, THIN_ONE_BYTE_STRING_TYPE = kOneByteStringTag | kThinStringTag | kNotInternalizedTag, // Most instance types are defined in Torque, with the exception of the string // types above. They are ordered by inheritance hierarchy so that we can easily // use range checks to determine whether an object is an instance of a subclass // of any type. There are a few more constraints specified in the Torque type // definitions: // - Some instance types are exposed in v8.h, so they are locked to specific // values to not unnecessarily change the ABI. // - JSSpecialObject and JSCustomElementsObject are aligned with the beginning // of the JSObject range, so that we can use a larger range check from // FIRST_JS_RECEIVER_TYPE to the end of those ranges and include JSProxy too. // - JSFunction is last, meaning we can use a single inequality check to // determine whether an instance type is within the range for any class in the // inheritance hierarchy of JSFunction. This includes commonly-checked classes // JSObject and JSReceiver. #define MAKE_TORQUE_INSTANCE_TYPE(TYPE, value) TYPE = value, TORQUE_ASSIGNED_INSTANCE_TYPES(MAKE_TORQUE_INSTANCE_TYPE) #undef MAKE_TORQUE_INSTANCE_TYPE // Pseudo-types FIRST_UNIQUE_NAME_TYPE = INTERNALIZED_STRING_TYPE, LAST_UNIQUE_NAME_TYPE = SYMBOL_TYPE, FIRST_NONSTRING_TYPE = SYMBOL_TYPE, // Boundary for testing JSReceivers that need special property lookup handling LAST_SPECIAL_RECEIVER_TYPE = LAST_JS_SPECIAL_OBJECT_TYPE, // Boundary case for testing JSReceivers that may have elements while having // an empty fixed array as elements backing store. This is true for string // wrappers. LAST_CUSTOM_ELEMENTS_RECEIVER = LAST_JS_CUSTOM_ELEMENTS_OBJECT_TYPE, // Convenient names for things where the generated name is awkward: FIRST_TYPE = FIRST_HEAP_OBJECT_TYPE, LAST_TYPE = LAST_HEAP_OBJECT_TYPE, FIRST_FUNCTION_TYPE = FIRST_JS_FUNCTION_OR_BOUND_FUNCTION_TYPE, LAST_FUNCTION_TYPE = LAST_JS_FUNCTION_OR_BOUND_FUNCTION_TYPE, BIGINT_TYPE = BIG_INT_BASE_TYPE, }; // This constant is defined outside of the InstanceType enum because the // string instance types are sparce and there's no such a string instance type. // But it's still useful for range checks to have such a value. constexpr InstanceType LAST_STRING_TYPE = static_cast<InstanceType>(FIRST_NONSTRING_TYPE - 1); // NOLINTNEXTLINE(runtime/references) (false positive) STATIC_ASSERT((FIRST_NONSTRING_TYPE & kIsNotStringMask) != kStringTag); STATIC_ASSERT(JS_OBJECT_TYPE == Internals::kJSObjectType); STATIC_ASSERT(JS_API_OBJECT_TYPE == Internals::kJSApiObjectType); STATIC_ASSERT(JS_SPECIAL_API_OBJECT_TYPE == Internals::kJSSpecialApiObjectType); STATIC_ASSERT(FIRST_NONSTRING_TYPE == Internals::kFirstNonstringType); STATIC_ASSERT(ODDBALL_TYPE == Internals::kOddballType); STATIC_ASSERT(FOREIGN_TYPE == Internals::kForeignType); // Verify that string types are all less than other types. #define CHECK_STRING_RANGE(TYPE, ...) \ STATIC_ASSERT(TYPE < FIRST_NONSTRING_TYPE); STRING_TYPE_LIST(CHECK_STRING_RANGE) #undef CHECK_STRING_RANGE #define CHECK_NONSTRING_RANGE(TYPE) STATIC_ASSERT(TYPE >= FIRST_NONSTRING_TYPE); TORQUE_ASSIGNED_INSTANCE_TYPE_LIST(CHECK_NONSTRING_RANGE) #undef CHECK_NONSTRING_RANGE // Two ranges don't cleanly follow the inheritance hierarchy. Here we ensure // that only expected types fall within these ranges. // - From FIRST_JS_RECEIVER_TYPE to LAST_SPECIAL_RECEIVER_TYPE should correspond // to the union type JSProxy | JSSpecialObject. // - From FIRST_JS_RECEIVER_TYPE to LAST_CUSTOM_ELEMENTS_RECEIVER should // correspond to the union type JSProxy | JSCustomElementsObject. // Note in particular that these ranges include all subclasses of JSReceiver // that are not also subclasses of JSObject (currently only JSProxy). #define CHECK_INSTANCE_TYPE(TYPE) \ STATIC_ASSERT((TYPE >= FIRST_JS_RECEIVER_TYPE && \ TYPE <= LAST_SPECIAL_RECEIVER_TYPE) == \ (TYPE == JS_PROXY_TYPE || TYPE == JS_GLOBAL_OBJECT_TYPE || \ TYPE == JS_GLOBAL_PROXY_TYPE || \ TYPE == JS_MODULE_NAMESPACE_TYPE || \ TYPE == JS_SPECIAL_API_OBJECT_TYPE)); \ STATIC_ASSERT((TYPE >= FIRST_JS_RECEIVER_TYPE && \ TYPE <= LAST_CUSTOM_ELEMENTS_RECEIVER) == \ (TYPE == JS_PROXY_TYPE || TYPE == JS_GLOBAL_OBJECT_TYPE || \ TYPE == JS_GLOBAL_PROXY_TYPE || \ TYPE == JS_MODULE_NAMESPACE_TYPE || \ TYPE == JS_SPECIAL_API_OBJECT_TYPE || \ TYPE == JS_PRIMITIVE_WRAPPER_TYPE)); TORQUE_ASSIGNED_INSTANCE_TYPE_LIST(CHECK_INSTANCE_TYPE) #undef CHECK_INSTANCE_TYPE // Make sure it doesn't matter whether we sign-extend or zero-extend these // values, because Torque treats InstanceType as signed. STATIC_ASSERT(LAST_TYPE < 1 << 15); V8_EXPORT_PRIVATE std::ostream& operator<<(std::ostream& os, InstanceType instance_type); // List of object types that have a single unique instance type. #define INSTANCE_TYPE_CHECKERS_SINGLE_BASE(V) \ V(AllocationSite, ALLOCATION_SITE_TYPE) \ V(BigInt, BIGINT_TYPE) \ V(ObjectBoilerplateDescription, OBJECT_BOILERPLATE_DESCRIPTION_TYPE) \ V(BreakPoint, TUPLE2_TYPE) \ V(BreakPointInfo, TUPLE2_TYPE) \ V(ByteArray, BYTE_ARRAY_TYPE) \ V(BytecodeArray, BYTECODE_ARRAY_TYPE) \ V(CallHandlerInfo, CALL_HANDLER_INFO_TYPE) \ V(Cell, CELL_TYPE) \ V(Code, CODE_TYPE) \ V(CachedTemplateObject, TUPLE3_TYPE) \ V(CodeDataContainer, CODE_DATA_CONTAINER_TYPE) \ V(CoverageInfo, FIXED_ARRAY_TYPE) \ V(ClosureFeedbackCellArray, CLOSURE_FEEDBACK_CELL_ARRAY_TYPE) \ V(DescriptorArray, DESCRIPTOR_ARRAY_TYPE) \ V(EmbedderDataArray, EMBEDDER_DATA_ARRAY_TYPE) \ V(EphemeronHashTable, EPHEMERON_HASH_TABLE_TYPE) \ V(FeedbackCell, FEEDBACK_CELL_TYPE) \ V(FeedbackMetadata, FEEDBACK_METADATA_TYPE) \ V(FeedbackVector, FEEDBACK_VECTOR_TYPE) \ V(FixedArrayExact, FIXED_ARRAY_TYPE) \ V(FixedDoubleArray, FIXED_DOUBLE_ARRAY_TYPE) \ V(Foreign, FOREIGN_TYPE) \ V(FreeSpace, FREE_SPACE_TYPE) \ V(GlobalDictionary, GLOBAL_DICTIONARY_TYPE) \ V(HeapNumber, HEAP_NUMBER_TYPE) \ V(JSArgumentsObject, JS_ARGUMENTS_OBJECT_TYPE) \ V(JSArgumentsObjectWithLength, JS_ARGUMENTS_OBJECT_TYPE) \ V(JSArray, JS_ARRAY_TYPE) \ V(JSArrayBuffer, JS_ARRAY_BUFFER_TYPE) \ V(JSArrayIterator, JS_ARRAY_ITERATOR_TYPE) \ V(JSAsyncFromSyncIterator, JS_ASYNC_FROM_SYNC_ITERATOR_TYPE) \ V(JSAsyncFunctionObject, JS_ASYNC_FUNCTION_OBJECT_TYPE) \ V(JSAsyncGeneratorObject, JS_ASYNC_GENERATOR_OBJECT_TYPE) \ V(JSBoundFunction, JS_BOUND_FUNCTION_TYPE) \ V(JSContextExtensionObject, JS_CONTEXT_EXTENSION_OBJECT_TYPE) \ V(JSDataView, JS_DATA_VIEW_TYPE) \ V(JSDate, JS_DATE_TYPE) \ V(JSError, JS_ERROR_TYPE) \ V(JSFinalizationGroup, JS_FINALIZATION_GROUP_TYPE) \ V(JSFinalizationGroupCleanupIterator, \ JS_FINALIZATION_GROUP_CLEANUP_ITERATOR_TYPE) \ V(JSFunction, JS_FUNCTION_TYPE) \ V(JSGlobalObject, JS_GLOBAL_OBJECT_TYPE) \ V(JSGlobalProxy, JS_GLOBAL_PROXY_TYPE) \ V(JSMap, JS_MAP_TYPE) \ V(JSMessageObject, JS_MESSAGE_OBJECT_TYPE) \ V(JSModuleNamespace, JS_MODULE_NAMESPACE_TYPE) \ V(JSPrimitiveWrapper, JS_PRIMITIVE_WRAPPER_TYPE) \ V(JSPromise, JS_PROMISE_TYPE) \ V(JSProxy, JS_PROXY_TYPE) \ V(JSRegExp, JS_REG_EXP_TYPE) \ V(JSRegExpResult, JS_ARRAY_TYPE) \ V(JSRegExpResultIndices, JS_ARRAY_TYPE) \ V(JSRegExpStringIterator, JS_REG_EXP_STRING_ITERATOR_TYPE) \ V(JSSet, JS_SET_TYPE) \ V(JSStringIterator, JS_STRING_ITERATOR_TYPE) \ V(JSTypedArray, JS_TYPED_ARRAY_TYPE) \ V(JSWeakMap, JS_WEAK_MAP_TYPE) \ V(JSWeakRef, JS_WEAK_REF_TYPE) \ V(JSWeakSet, JS_WEAK_SET_TYPE) \ V(LoadHandler, LOAD_HANDLER_TYPE) \ V(Map, MAP_TYPE) \ V(NameDictionary, NAME_DICTIONARY_TYPE) \ V(NativeContext, NATIVE_CONTEXT_TYPE) \ V(NumberDictionary, NUMBER_DICTIONARY_TYPE) \ V(Oddball, ODDBALL_TYPE) \ V(OrderedHashMap, ORDERED_HASH_MAP_TYPE) \ V(OrderedHashSet, ORDERED_HASH_SET_TYPE) \ V(OrderedNameDictionary, ORDERED_NAME_DICTIONARY_TYPE) \ V(PreparseData, PREPARSE_DATA_TYPE) \ V(PropertyArray, PROPERTY_ARRAY_TYPE) \ V(PropertyCell, PROPERTY_CELL_TYPE) \ V(PropertyDescriptorObject, FIXED_ARRAY_TYPE) \ V(ScopeInfo, SCOPE_INFO_TYPE) \ V(ScriptContextTable, SCRIPT_CONTEXT_TABLE_TYPE) \ V(SharedFunctionInfo, SHARED_FUNCTION_INFO_TYPE) \ V(SimpleNumberDictionary, SIMPLE_NUMBER_DICTIONARY_TYPE) \ V(SmallOrderedHashMap, SMALL_ORDERED_HASH_MAP_TYPE) \ V(SmallOrderedHashSet, SMALL_ORDERED_HASH_SET_TYPE) \ V(SmallOrderedNameDictionary, SMALL_ORDERED_NAME_DICTIONARY_TYPE) \ V(SourceTextModule, SOURCE_TEXT_MODULE_TYPE) \ V(StoreHandler, STORE_HANDLER_TYPE) \ V(StringTable, STRING_TABLE_TYPE) \ V(Symbol, SYMBOL_TYPE) \ V(SyntheticModule, SYNTHETIC_MODULE_TYPE) \ V(TransitionArray, TRANSITION_ARRAY_TYPE) \ V(UncompiledDataWithoutPreparseData, \ UNCOMPILED_DATA_WITHOUT_PREPARSE_DATA_TYPE) \ V(UncompiledDataWithPreparseData, UNCOMPILED_DATA_WITH_PREPARSE_DATA_TYPE) \ V(WasmExceptionObject, WASM_EXCEPTION_OBJECT_TYPE) \ V(WasmGlobalObject, WASM_GLOBAL_OBJECT_TYPE) \ V(WasmInstanceObject, WASM_INSTANCE_OBJECT_TYPE) \ V(WasmMemoryObject, WASM_MEMORY_OBJECT_TYPE) \ V(WasmModuleObject, WASM_MODULE_OBJECT_TYPE) \ V(WasmTableObject, WASM_TABLE_OBJECT_TYPE) \ V(WeakArrayList, WEAK_ARRAY_LIST_TYPE) \ V(WeakCell, WEAK_CELL_TYPE) #ifdef V8_INTL_SUPPORT #define INSTANCE_TYPE_CHECKERS_SINGLE(V) \ INSTANCE_TYPE_CHECKERS_SINGLE_BASE(V) \ V(JSV8BreakIterator, JS_V8_BREAK_ITERATOR_TYPE) \ V(JSCollator, JS_COLLATOR_TYPE) \ V(JSDateTimeFormat, JS_DATE_TIME_FORMAT_TYPE) \ V(JSListFormat, JS_LIST_FORMAT_TYPE) \ V(JSLocale, JS_LOCALE_TYPE) \ V(JSNumberFormat, JS_NUMBER_FORMAT_TYPE) \ V(JSPluralRules, JS_PLURAL_RULES_TYPE) \ V(JSRelativeTimeFormat, JS_RELATIVE_TIME_FORMAT_TYPE) \ V(JSSegmentIterator, JS_SEGMENT_ITERATOR_TYPE) \ V(JSSegmenter, JS_SEGMENTER_TYPE) #else #define INSTANCE_TYPE_CHECKERS_SINGLE(V) INSTANCE_TYPE_CHECKERS_SINGLE_BASE(V) #endif // V8_INTL_SUPPORT #define INSTANCE_TYPE_CHECKERS_RANGE(V) \ V(Context, FIRST_CONTEXT_TYPE, LAST_CONTEXT_TYPE) \ V(FixedArray, FIRST_FIXED_ARRAY_TYPE, LAST_FIXED_ARRAY_TYPE) \ V(HashTable, FIRST_HASH_TABLE_TYPE, LAST_HASH_TABLE_TYPE) \ V(JSCustomElementsObject, FIRST_JS_CUSTOM_ELEMENTS_OBJECT_TYPE, \ LAST_JS_CUSTOM_ELEMENTS_OBJECT_TYPE) \ V(JSFunctionOrBoundFunction, FIRST_FUNCTION_TYPE, LAST_FUNCTION_TYPE) \ V(JSMapIterator, FIRST_JS_MAP_ITERATOR_TYPE, LAST_JS_MAP_ITERATOR_TYPE) \ V(JSSetIterator, FIRST_JS_SET_ITERATOR_TYPE, LAST_JS_SET_ITERATOR_TYPE) \ V(JSSpecialObject, FIRST_JS_SPECIAL_OBJECT_TYPE, \ LAST_JS_SPECIAL_OBJECT_TYPE) \ V(Microtask, FIRST_MICROTASK_TYPE, LAST_MICROTASK_TYPE) \ V(Module, FIRST_MODULE_TYPE, LAST_MODULE_TYPE) \ V(Name, FIRST_NAME_TYPE, LAST_NAME_TYPE) \ V(PrimitiveHeapObject, FIRST_PRIMITIVE_HEAP_OBJECT_TYPE, \ LAST_PRIMITIVE_HEAP_OBJECT_TYPE) \ V(String, FIRST_STRING_TYPE, LAST_STRING_TYPE) \ V(WeakFixedArray, FIRST_WEAK_FIXED_ARRAY_TYPE, LAST_WEAK_FIXED_ARRAY_TYPE) #define INSTANCE_TYPE_CHECKERS_CUSTOM(V) \ V(FixedArrayBase) \ V(InternalizedString) \ V(JSObject) \ V(JSReceiver) #define INSTANCE_TYPE_CHECKERS(V) \ INSTANCE_TYPE_CHECKERS_SINGLE(V) \ INSTANCE_TYPE_CHECKERS_RANGE(V) \ INSTANCE_TYPE_CHECKERS_CUSTOM(V) namespace InstanceTypeChecker { #define IS_TYPE_FUNCTION_DECL(Type, ...) \ V8_INLINE bool Is##Type(InstanceType instance_type); INSTANCE_TYPE_CHECKERS(IS_TYPE_FUNCTION_DECL) #define TYPED_ARRAY_IS_TYPE_FUNCTION_DECL(Type, ...) \ IS_TYPE_FUNCTION_DECL(Fixed##Type##Array) TYPED_ARRAYS(TYPED_ARRAY_IS_TYPE_FUNCTION_DECL) #undef TYPED_ARRAY_IS_TYPE_FUNCTION_DECL #define STRUCT_IS_TYPE_FUNCTION_DECL(NAME, Name, name) \ IS_TYPE_FUNCTION_DECL(Name) STRUCT_LIST(STRUCT_IS_TYPE_FUNCTION_DECL) #undef STRUCT_IS_TYPE_FUNCTION_DECL #undef IS_TYPE_FUNCTION_DECL } // namespace InstanceTypeChecker } // namespace internal } // namespace v8 #include "src/objects/object-macros-undef.h" #endif // V8_OBJECTS_INSTANCE_TYPE_H_
10,919
14,668
// Copyright 2021 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/browser/ash/account_manager/account_apps_availability.h" #include "ash/constants/ash_features.h" #include "base/bind.h" #include "base/containers/flat_set.h" #include "base/feature_list.h" #include "base/logging.h" #include "components/account_manager_core/account.h" #include "components/account_manager_core/account_manager_facade.h" #include "components/account_manager_core/pref_names.h" #include "components/prefs/pref_registry_simple.h" #include "components/prefs/pref_service.h" #include "components/prefs/scoped_user_pref_update.h" #include "components/user_manager/user_manager.h" #include "third_party/abseil-cpp/absl/types/optional.h" // Structure of `account_manager::prefs::kAccountAppsAvailability`. // `kAccountAppsAvailability` is a dictionary of dictionaries of the following // format: // { // "gaia_id_1": { "is_available_in_arc": <bool> }, // "gaia_id_2": { "is_available_in_arc": <bool> }, // } // Regular users will always have an entry for the primary account in the // `kAccountAppsAvailability` pref (so it will never be empty). Active Directory // users may have no Gaia accounts in-session and therefore may have an empty // `kAccountAppsAvailability` pref. namespace ash { namespace { bool IsPrimaryGaiaAccount(const std::string& gaia_id) { const user_manager::User* user = user_manager::UserManager::Get()->GetPrimaryUser(); DCHECK(user); return user->GetAccountId().GetAccountType() == AccountType::GOOGLE && user->GetAccountId().GetGaiaId() == gaia_id; } bool IsActiveDirectoryUser() { const user_manager::User* user = user_manager::UserManager::Get()->GetPrimaryUser(); DCHECK(user); return user->GetType() == user_manager::USER_TYPE_ACTIVE_DIRECTORY; } bool IsPrefInitialized(PrefService* prefs) { const base::Value* accounts = prefs->GetDictionary(account_manager::prefs::kAccountAppsAvailability); return accounts && (accounts->DictSize() > 0 || IsActiveDirectoryUser()); } void CompleteFindAccountByGaiaId( const std::string& gaia_id, base::OnceCallback<void(const absl::optional<account_manager::Account>&)> callback, const std::vector<account_manager::Account>& accounts) { for (const auto& account : accounts) { if (account.key.account_type() == account_manager::AccountType::kGaia && account.key.id() == gaia_id) { std::move(callback).Run(account); return; } } LOG(ERROR) << "Couldn't find account by gaia id in AccountManager"; std::move(callback).Run(absl::nullopt); } void CompleteGetAccountsAvailableInArc( const base::flat_set<std::string>& gaia_ids_in_arc, base::OnceCallback<void(const base::flat_set<account_manager::Account>&)> callback, const std::vector<account_manager::Account>& all_accounts) { base::flat_set<account_manager::Account> result; for (const auto& account : all_accounts) { if (account.key.account_type() != account_manager::AccountType::kGaia) continue; if (gaia_ids_in_arc.contains(account.key.id())) result.insert(account); } DCHECK_EQ(result.size(), gaia_ids_in_arc.size()); if (result.size() != gaia_ids_in_arc.size()) { LOG(ERROR) << "Expected " << gaia_ids_in_arc.size() << " accounts, but " << result.size() << " accounts were found in Account Manager."; // TODO(crbug.com/1277453): Repair prefs if this happens. } std::move(callback).Run(result); } base::flat_set<std::string> GetGaiaIdsAvailableInArc(PrefService* prefs) { base::flat_set<std::string> result; const base::Value* accounts = prefs->GetDictionary(account_manager::prefs::kAccountAppsAvailability); if (!accounts) { LOG(ERROR) << "Couldn't find " << account_manager::prefs::kAccountAppsAvailability << " dict in prefs"; return result; } // See structure of `accounts` at the top of the file. for (const auto dict : accounts->DictItems()) { absl::optional<bool> is_available = dict.second.FindBoolKey(account_manager::prefs::kIsAvailableInArcKey); if (!is_available.has_value() || !is_available.value()) continue; result.insert(dict.first); } return result; } // Return `true` if account with `gaia_id` should be available in ARC. // Return `false` if account with `gaia_id` should not be available in ARC. // Return `nullopt` if account with `gaia_id` is not in prefs (it can happen if // `SetIsAccountAvailableInArc` wasn't called for this account yet). absl::optional<bool> IsAccountAvailableInArc(PrefService* prefs, const std::string& gaia_id) { const base::Value* accounts = prefs->GetDictionary(account_manager::prefs::kAccountAppsAvailability); if (!accounts) { LOG(ERROR) << "Couldn't find " << account_manager::prefs::kAccountAppsAvailability << " dict in prefs"; return absl::nullopt; } // See structure of `accounts` at the top of the file. const base::Value* account_entry = accounts->FindDictKey(gaia_id); if (!account_entry) return absl::nullopt; DCHECK(account_entry->is_dict()); absl::optional<bool> is_available_in_arc = account_entry->FindBoolKey(account_manager::prefs::kIsAvailableInArcKey); DCHECK(is_available_in_arc); // If there is no `is_available_in_arc` key, assume that account is available // in ARC. // TODO(crbug.com/1277453): Repair prefs if it happens. return is_available_in_arc.value_or(true); } void RemoveAccountFromPrefs(PrefService* prefs, const std::string& gaia_id) { DCHECK(!IsPrimaryGaiaAccount(gaia_id)); DictionaryPrefUpdate update(prefs, account_manager::prefs::kAccountAppsAvailability); const bool success = update->RemoveKey(gaia_id); DCHECK(success); } void AddAccountToPrefs(PrefService* prefs, const std::string& gaia_id, bool is_available_in_arc) { // Account shouldn't already exist. DCHECK(!IsAccountAvailableInArc(prefs, gaia_id).has_value()); base::Value account_entry(base::Value::Type::DICTIONARY); account_entry.SetKey(account_manager::prefs::kIsAvailableInArcKey, base::Value(is_available_in_arc)); DictionaryPrefUpdate update(prefs, account_manager::prefs::kAccountAppsAvailability); update->SetKey(gaia_id, std::move(account_entry)); } void UpdateAccountInPrefs(PrefService* prefs, const std::string& gaia_id, bool is_available_in_arc) { DictionaryPrefUpdate update(prefs, account_manager::prefs::kAccountAppsAvailability); base::Value* account_entry = update->FindDictKey(gaia_id); DCHECK(account_entry); account_entry->SetKey(account_manager::prefs::kIsAvailableInArcKey, base::Value(is_available_in_arc)); } } // namespace AccountAppsAvailability::AccountAppsAvailability( account_manager::AccountManagerFacade* account_manager_facade, signin::IdentityManager* identity_manager, PrefService* prefs) : account_manager_facade_(account_manager_facade), identity_manager_(identity_manager), prefs_(prefs) { DCHECK(account_manager_facade_); DCHECK(identity_manager_); DCHECK(prefs_); account_manager_facade_observation_.Observe(account_manager_facade_); identity_manager_observation_.Observe(identity_manager_); if (IsPrefInitialized(prefs_)) { is_initialized_ = true; return; } account_manager_facade_->GetAccounts( base::BindOnce(&AccountAppsAvailability::InitAccountsAvailableInArcPref, weak_factory_.GetWeakPtr())); } AccountAppsAvailability::~AccountAppsAvailability() = default; // static bool AccountAppsAvailability::IsArcAccountRestrictionsEnabled() { return base::FeatureList::IsEnabled( chromeos::features::kArcAccountRestrictions) && base::FeatureList::IsEnabled(chromeos::features::kLacrosSupport); } // static void AccountAppsAvailability::RegisterPrefs(PrefRegistrySimple* registry) { registry->RegisterDictionaryPref( account_manager::prefs::kAccountAppsAvailability); } void AccountAppsAvailability::AddObserver(Observer* observer) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); observer_list_.AddObserver(observer); } void AccountAppsAvailability::RemoveObserver(Observer* observer) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); observer_list_.RemoveObserver(observer); } void AccountAppsAvailability::SetIsAccountAvailableInArc( const account_manager::Account& account, bool is_available) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); DCHECK_EQ(account.key.account_type(), account_manager::AccountType::kGaia); if (!IsInitialized()) { // Using base::Unretained(this) is fine because `initialization_callbacks_` // is owned by this. initialization_callbacks_.push_back( base::BindOnce(&AccountAppsAvailability::SetIsAccountAvailableInArc, base::Unretained(this), account, is_available)); return; } absl::optional<bool> current_status = IsAccountAvailableInArc(prefs_, account.key.id()); if (!current_status.has_value()) { // Account is not in prefs yet - add a new entry. AddAccountToPrefs(prefs_, account.key.id(), is_available); // Notify observers only if account should be available. if (is_available) NotifyObservers(account, is_available); return; } if (current_status.value() == is_available) return; UpdateAccountInPrefs(prefs_, account.key.id(), is_available); NotifyObservers(account, is_available); } void AccountAppsAvailability::GetAccountsAvailableInArc( base::OnceCallback<void(const base::flat_set<account_manager::Account>&)> callback) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); if (!IsInitialized()) { // Using base::Unretained(this) is fine because `initialization_callbacks_` // is owned by this. initialization_callbacks_.push_back( base::BindOnce(&AccountAppsAvailability::GetAccountsAvailableInArc, base::Unretained(this), std::move(callback))); return; } account_manager_facade_->GetAccounts( base::BindOnce(&CompleteGetAccountsAvailableInArc, GetGaiaIdsAvailableInArc(prefs_), std::move(callback))); } void AccountAppsAvailability::Shutdown() { identity_manager_observation_.Reset(); account_manager_facade_observation_.Reset(); } void AccountAppsAvailability::OnRefreshTokenUpdatedForAccount( const CoreAccountInfo& account_info) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); if (!IsInitialized()) { // Using base::Unretained(this) is fine because `initialization_callbacks_` // is owned by this. initialization_callbacks_.push_back(base::BindOnce( &AccountAppsAvailability::OnRefreshTokenUpdatedForAccount, base::Unretained(this), account_info)); return; } absl::optional<bool> current_status = IsAccountAvailableInArc(prefs_, account_info.gaia); // - If `current_status.has_value()` is `false` - this account is not in prefs // yet. This happens when account is just added and // `SetIsAccountAvailableInArc()` wasn't called yet. // - If `current_status.value()` is `false` - this account is not available in // ARC. In this case we don't want to notify the observers. if (!current_status.has_value() || !current_status.value()) return; FindAccountByGaiaId( account_info.gaia, base::BindOnce(&AccountAppsAvailability::MaybeNotifyObservers, weak_factory_.GetWeakPtr(), /*is_available_in_arc=*/true)); } void AccountAppsAvailability::OnAccountUpserted( const account_manager::Account& account) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); if (IsInitialized()) return; // Initialize the prefs list: account_manager_facade_->GetAccounts( base::BindOnce(&AccountAppsAvailability::InitAccountsAvailableInArcPref, weak_factory_.GetWeakPtr())); } void AccountAppsAvailability::OnAccountRemoved( const account_manager::Account& account) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); if (account.key.account_type() != account_manager::AccountType::kGaia) return; if (!IsInitialized()) { // Using base::Unretained(this) is fine because `initialization_callbacks_` // is owned by this. initialization_callbacks_.push_back( base::BindOnce(&AccountAppsAvailability::OnAccountRemoved, base::Unretained(this), account)); return; } absl::optional<bool> current_status = IsAccountAvailableInArc(prefs_, account.key.id()); RemoveAccountFromPrefs(prefs_, account.key.id()); if (!current_status.has_value() || !current_status.value()) return; NotifyObservers(account, /*is_available_in_arc=*/false); } bool AccountAppsAvailability::IsInitialized() const { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); return is_initialized_; } void AccountAppsAvailability::InitAccountsAvailableInArcPref( const std::vector<account_manager::Account>& accounts) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); if (IsInitialized()) return; // If there are no accounts in Account Manager at the moment, // `OnAccountUpserted` will be called when the primary account is added. if (accounts.size() == 0) return; prefs_->Set(account_manager::prefs::kAccountAppsAvailability, base::Value(base::Value::Type::DICTIONARY)); DictionaryPrefUpdate update(prefs_, account_manager::prefs::kAccountAppsAvailability); DCHECK(update->DictEmpty()); // See structure of `update` dictionary at the top of the file. for (const auto& account : accounts) { if (account.key.account_type() != account_manager::AccountType::kGaia) continue; base::Value account_entry(base::Value::Type::DICTIONARY); account_entry.SetKey(account_manager::prefs::kIsAvailableInArcKey, base::Value(true)); // Key: `account.key.id()` = Gaia ID // Value: { "is_available_in_arc": true } update->SetKey(account.key.id(), std::move(account_entry)); } if (!IsActiveDirectoryUser()) { // If user type is not active directory, we expect to have at least primary // account in the list. DCHECK(!update->DictEmpty()); } is_initialized_ = true; for (auto& callback : initialization_callbacks_) std::move(callback).Run(); initialization_callbacks_.clear(); } void AccountAppsAvailability::FindAccountByGaiaId( const std::string& gaia_id, base::OnceCallback<void(const absl::optional<account_manager::Account>&)> callback) { account_manager_facade_->GetAccounts(base::BindOnce( &CompleteFindAccountByGaiaId, gaia_id, std::move(callback))); } void AccountAppsAvailability::MaybeNotifyObservers( bool is_available_in_arc, const absl::optional<account_manager::Account>& account) { if (!account) return; NotifyObservers(account.value(), is_available_in_arc); } void AccountAppsAvailability::NotifyObservers( const account_manager::Account& account, bool is_available_in_arc) { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); if (is_available_in_arc) { for (auto& observer : observer_list_) { observer.OnAccountAvailableInArc(account); } return; } for (auto& observer : observer_list_) { observer.OnAccountUnavailableInArc(account); } } } // namespace ash
5,767
501
#!/usr/bin/env python import pyscf from pyscf.tools.mo_mapping import mo_comps from benchmarking_utils import setup_logger, get_cpu_timings log = setup_logger() for bas in ('3-21g', '6-31g**', 'cc-pVTZ', 'ANO-Roos-TZ'): mol = pyscf.M(atom = ''' c 1.217739890298750 -0.703062453466927 0.000000000000000 h 2.172991468538160 -1.254577209307266 0.000000000000000 c 1.217739890298750 0.703062453466927 0.000000000000000 h 2.172991468538160 1.254577209307266 0.000000000000000 c 0.000000000000000 1.406124906933854 0.000000000000000 h 0.000000000000000 2.509154418614532 0.000000000000000 c -1.217739890298750 0.703062453466927 0.000000000000000 h -2.172991468538160 1.254577209307266 0.000000000000000 c -1.217739890298750 -0.703062453466927 0.000000000000000 h -2.172991468538160 -1.254577209307266 0.000000000000000 c 0.000000000000000 -1.406124906933854 0.000000000000000 h 0.000000000000000 -2.509154418614532 0.000000000000000 ''', basis = bas) cpu0 = get_cpu_timings() mf = mol.RHF().run() cpu0 = log.timer('C6H6 %s RHF'%bas, *cpu0) mymp2 = mf.MP2().run() cpu0 = log.timer('C6H6 %s MP2'%bas, *cpu0) mymc = mf.CASSCF(6, 6) idx_2pz = mo_comps('2pz', mol, mf.mo_coeff).argsort()[-6:] mo = mymc.sort_mo(idx_2pz, base=0) mymc.kernel(mo) cpu0 = log.timer('C6H6 %s CASSCF'%bas, *cpu0) mycc = mf.CCSD().run() cpu0 = log.timer('C6H6 %s CCSD'%bas, *cpu0) mf = mol.RKS().run(xc='b3lyp') cpu0 = log.timer('C6H6 %s B3LYP'%bas, *cpu0) mf = mf.density_fit().run() cpu0 = log.timer('C6H6 %s density-fit RHF'%bas, *cpu0)
793
549
{ "generated": [ ".gitignore", ".repo-metadata.json", ".rubocop.yml", ".yardopts", "AUTHENTICATION.md", "CHANGELOG.md", "Gemfile", "LICENSE.md", "README.md", "Rakefile", "gapic_metadata.json", "google-cloud-eventarc-publishing-v1.gemspec", "lib/google-cloud-eventarc-publishing-v1.rb", "lib/google/cloud/eventarc/publishing/v1.rb", "lib/google/cloud/eventarc/publishing/v1/publisher.rb", "lib/google/cloud/eventarc/publishing/v1/publisher/client.rb", "lib/google/cloud/eventarc/publishing/v1/publisher/credentials.rb", "lib/google/cloud/eventarc/publishing/v1/publisher_pb.rb", "lib/google/cloud/eventarc/publishing/v1/publisher_services_pb.rb", "lib/google/cloud/eventarc/publishing/v1/version.rb", "proto_docs/README.md", "proto_docs/google/api/resource.rb", "proto_docs/google/cloud/eventarc/publishing/v1/publisher.rb", "proto_docs/google/protobuf/any.rb", "snippets/Gemfile", "snippets/publisher/publish_channel_connection_events.rb", "snippets/publisher/publish_events.rb", "snippets/snippet_metadata_google.cloud.eventarc.publishing.v1.json", "test/google/cloud/eventarc/publishing/v1/publisher_test.rb", "test/helper.rb" ], "static": [ ".OwlBot.yaml" ] }
582
17,242
// Copyright 2020 The MediaPipe Authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #ifndef MEDIAPIPE_FRAMEWORK_FORMATS_TENSOR_H_ #define MEDIAPIPE_FRAMEWORK_FORMATS_TENSOR_H_ #include <algorithm> #include <initializer_list> #include <tuple> #include <type_traits> #include <utility> #include <vector> #include "absl/memory/memory.h" #include "absl/synchronization/mutex.h" #include "mediapipe/framework/port.h" #if MEDIAPIPE_METAL_ENABLED #import <Metal/Metal.h> #endif // MEDIAPIPE_METAL_ENABLED #if MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_30 #include "mediapipe/gpu/gl_base.h" #include "mediapipe/gpu/gl_context.h" #endif // MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_30 namespace mediapipe { // Tensor is a container of multi-dimensional data that supports sharing the // content across different backends and APIs, currently: CPU / Metal / OpenGL. // Texture2DView is limited to 4 dimensions. // The content is accessible through requesting device specific views. // Acquiring a view guarantees that the content is not changed by another thread // until the view is released. // // Tensor::MtlBufferView view = tensor.GetMtlBufferWriteView(mtl_device); // mtl_device is used to create MTLBuffer // id<MTLBuffer> buffer = view.buffer(); // For OpenGL the code below must be called by a thread with valid OpenGL ES // context bound: // GLuint buffer = view.buffer(); // Then the buffer can be bound to the GPU command buffer. // ...binding the buffer to the command buffer... // ...commiting command buffer and releasing the view... // // The following request for the CPU view will be blocked until the GPU view is // released and the GPU task is finished. // // auto view = tensor.GetCpuReadView(); // float* pointer = view.buffer<float>(); // ...reading the cpu memory... class Tensor { class View { public: // Non-copyable. View(const View&) = delete; View& operator=(const View&) = delete; View(View&& src) = default; protected: View(std::unique_ptr<absl::MutexLock>&& lock) : lock_(std::move(lock)) {} std::unique_ptr<absl::MutexLock> lock_; }; public: // No resources are allocated here. enum class ElementType { kNone, kFloat16, kFloat32 }; struct Shape { Shape() = default; Shape(std::initializer_list<int> dimensions) : dims(dimensions) {} Shape(const std::vector<int>& dimensions) : dims(dimensions) {} int num_elements() const { int res = dims.empty() ? 0 : 1; std::for_each(dims.begin(), dims.end(), [&res](int i) { res *= i; }); return res; } std::vector<int> dims; }; Tensor(ElementType element_type, const Shape& shape); // Non-copyable. Tensor(const Tensor&) = delete; Tensor& operator=(const Tensor&) = delete; // Move-only. Tensor(Tensor&& src) { Move(&src); } Tensor& operator=(Tensor&&); ~Tensor() { Invalidate(); } template <typename T> class CpuView : public View { public: template <typename P> auto buffer() const { // const and non-const return type selection. return static_cast<typename std::tuple_element< std::is_const<T>::value, std::tuple<P*, const P*> >::type>(buffer_); } CpuView(CpuView&& src) : View(std::move(src)), buffer_(src.buffer_) { src.buffer_ = nullptr; } protected: friend class Tensor; CpuView(T* buffer, std::unique_ptr<absl::MutexLock>&& lock) : View(std::move(lock)), buffer_(buffer) {} T* buffer_; }; using CpuReadView = CpuView<const void>; CpuReadView GetCpuReadView() const; using CpuWriteView = CpuView<void>; CpuWriteView GetCpuWriteView() const; #if MEDIAPIPE_METAL_ENABLED // TODO: id<MTLBuffer> vs. MtlBufferView. class MtlBufferView : public View { public: id<MTLBuffer> buffer() const { return buffer_; } MtlBufferView(MtlBufferView&& src) : View(std::move(src)), buffer_(src.buffer_) { src.buffer_ = nil; } protected: friend class Tensor; MtlBufferView(id<MTLBuffer> buffer, std::unique_ptr<absl::MutexLock>&& lock) : View(std::move(lock)), buffer_(buffer) {} id<MTLBuffer> buffer_; }; // The command buffer status is checked for completeness if GPU-to-CPU // synchronization is required. // TODO: Design const and non-const view acquiring. MtlBufferView GetMtlBufferReadView(id<MTLCommandBuffer> command_buffer) const; MtlBufferView GetMtlBufferWriteView( id<MTLCommandBuffer> command_buffer) const; // Allocate new buffer. // TODO: GPU-to-CPU design considerations. MtlBufferView GetMtlBufferWriteView(id<MTLDevice> device) const; #endif // MEDIAPIPE_METAL_ENABLED #if MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_30 // TODO: Use GlTextureView instead. // Only float32 textures are supported with 1/2/3/4 depths. // OpenGlTexture2dView currently only supports BHWC memory layout. class OpenGlTexture2dView : public View { public: GLuint name() const { return name_; } OpenGlTexture2dView(OpenGlTexture2dView&& src) : View(std::move(src)), name_(src.name_) { src.name_ = GL_INVALID_INDEX; } // To fit a tensor into a texture two layouts are used: // 1. Aligned. Width of the texture = tensor_width * num_slices, where slice // is a group of 4 depth values. Tensor depth is padded to 4. // 2. Linearized. If texture width or height with the layout 1. is greater // than the GPU supports then all tensor values are packed into a texture // with fixed width calculated by this method. // Must be called with the valid GL context bound to the current thread. enum class Layout { kAligned, kLinearized }; static Layout GetLayoutDimensions(const Tensor::Shape& shape, int* width, int* height); protected: friend class Tensor; OpenGlTexture2dView(GLuint name, std::unique_ptr<absl::MutexLock>&& lock) : View(std::move(lock)), name_(name) {} GLuint name_; }; // A valid OpenGL context must be bound to the calling thread due to possible // GPU resource allocation. OpenGlTexture2dView GetOpenGlTexture2dReadView() const; OpenGlTexture2dView GetOpenGlTexture2dWriteView() const; #endif // MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_30 #if MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_31 class OpenGlBufferView : public View { public: GLuint name() const { return name_; } OpenGlBufferView(OpenGlBufferView&& src) : View(std::move(src)), name_(src.name_) { src.name_ = GL_INVALID_INDEX; } protected: friend class Tensor; OpenGlBufferView(GLuint name, std::unique_ptr<absl::MutexLock>&& lock) : View(std::move(lock)), name_(name) {} GLuint name_; }; // A valid OpenGL context must be bound to the calling thread due to possible // GPU resource allocation. OpenGlBufferView GetOpenGlBufferReadView() const; OpenGlBufferView GetOpenGlBufferWriteView() const; #endif // MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_31 const Shape& shape() const { return shape_; } ElementType element_type() const { return element_type_; } int element_size() const { switch (element_type_) { case ElementType::kNone: return 0; case ElementType::kFloat16: return 2; case ElementType::kFloat32: return sizeof(float); } } int bytes() const { return shape_.num_elements() * element_size(); } bool ready_on_cpu() const { return valid_ & kValidCpu; } bool ready_on_gpu() const { return valid_ & (kValidMetalBuffer | kValidOpenGlBuffer | kValidOpenGlTexture2d); } bool ready_as_metal_buffer() const { return valid_ & kValidMetalBuffer; } bool ready_as_opengl_buffer() const { return valid_ & kValidOpenGlBuffer; } bool ready_as_opengl_texture_2d() const { return valid_ & kValidOpenGlTexture2d; } private: void Move(Tensor*); void Invalidate(); ElementType element_type_; Shape shape_; // The flags describe the current source of truth resource type. enum { kValidNone = 0, kValidCpu = 1 << 0, kValidMetalBuffer = 1 << 1, kValidOpenGlBuffer = 1 << 2, kValidOpenGlTexture2d = 1 << 3, }; // A list of resource which are currently allocated and synchronized between // each-other: valid_ = kValidCpu | kValidMetalBuffer; mutable int valid_ = 0; // The mutex is locked by Get*View and is kept by all Views. mutable absl::Mutex view_mutex_; mutable void* cpu_buffer_ = nullptr; void AllocateCpuBuffer() const; #if MEDIAPIPE_METAL_ENABLED mutable id<MTLCommandBuffer> command_buffer_; mutable id<MTLDevice> device_; mutable id<MTLBuffer> metal_buffer_; void AllocateMtlBuffer(id<MTLDevice> device) const; #endif // MEDIAPIPE_METAL_ENABLED #if MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_30 mutable std::shared_ptr<mediapipe::GlContext> gl_context_; mutable GLuint opengl_texture2d_ = GL_INVALID_INDEX; mutable GLuint frame_buffer_ = GL_INVALID_INDEX; mutable int texture_width_; mutable int texture_height_; #ifdef __EMSCRIPTEN__ mutable bool texture_is_half_float_ = false; #endif // __EMSCRIPTEN__ void AllocateOpenGlTexture2d() const; #if MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_31 mutable GLuint opengl_buffer_ = GL_INVALID_INDEX; void AllocateOpenGlBuffer() const; #endif // MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_31 bool NeedsHalfFloatRenderTarget() const; #endif // MEDIAPIPE_OPENGL_ES_VERSION >= MEDIAPIPE_OPENGL_ES_30 }; } // namespace mediapipe #endif // MEDIAPIPE_FRAMEWORK_FORMATS_TENSOR_H_
3,668
310
{ "name": "NIKKOR 20mm f/4", "description": "A camera lens.", "url": "https://www.kenrockwell.com/nikon/20f4.htm" }
53
541
// Copyright 2017, 2019 ETH Zürich, <NAME> // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, // this list of conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, // this list of conditions and the following disclaimer in the documentation // and/or other materials provided with the distribution. // // 3. Neither the name of the copyright holder nor the names of its contributors // may be used to endorse or promote products derived from this software // without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" // AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE // ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE // LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR // CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF // SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN // CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) // ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE // POSSIBILITY OF SUCH DAMAGE. #include "libvis/image.h" #include "libvis/image_display.h" #include "libvis/image_io.h" namespace vis { #ifndef WIN32 ImageIOLibPngRegistrator image_io_libpng_registrator_; ImageIONetPBMRegistrator image_io_netpbm_registrator_; #ifdef LIBVIS_HAVE_QT ImageIOQtRegistrator image_io_qt_registrator_; #endif #endif // template<> // shared_ptr<ImageDisplay> Image<u8>::DebugDisplay(const string& title) const { // #ifdef LIBVIS_HAVE_QT // shared_ptr<ImageDisplay> display(new ImageDisplay()); // display->Update(*this, title); // return display; // #else // (void) title; // LOG(ERROR) << "Not compiled with debug display support."; // return shared_ptr<ImageDisplay>(); // #endif // } // // template<> // shared_ptr<ImageDisplay> Image<Vec3u8>::DebugDisplay(const string& title) const { // #ifdef LIBVIS_HAVE_QT // shared_ptr<ImageDisplay> display(new ImageDisplay()); // display->Update(*this, title); // return display; // #else // (void) title; // LOG(ERROR) << "Not compiled with debug display support."; // return shared_ptr<ImageDisplay>(); // #endif // } #ifndef WIN32 #include "libvis/image_template_specializations.h" #endif }
862
552
<gh_stars>100-1000 // Copyright (c) 2016 <NAME> <EMAIL> // This software is provided 'as-is' under the zlib License, see the LICENSE.txt file. // This notice and the license may not be removed or altered from any source distribution. #include <toyui/Config.h> #include <toyui/Types.h> #include <toyui/Button/Dropdown.h> namespace toy { Dropdown::Dropdown(const Params& params) : WrapButton({ params, &cls<Dropdown>() }, [this](Widget&) { this->dropdown(true); }) , m_header({ this, &styles().head }, {}, nullptr) , m_toggle({ this, &styles().toggle }, "", [this](Widget&) { this->dropdown(true); }) , m_list({ this, &styles().list }, nullptr, false) {} MultiButton& Dropdown::addChoice(const StringVector& elements, const Callback& trigger) { Callback callback = [this, trigger](Widget& widget) { this->selected(as<MultiButton>(widget)); if(trigger) trigger(widget); }; return m_list.emplace_style<MultiButton>(styles().choice , elements, callback); } void Dropdown::dropup() { m_list.close(); } void Dropdown::dropdown(bool modal) { m_list.open(modal); } void Dropdown::selected(MultiButton& selected) { UNUSED(selected); this->dropup(); } DropdownInput::DropdownInput(const Params& params, StringVector choices, const Callback& onSelected) : Dropdown({ params, &cls<DropdownInput>() }) , m_onSelected(onSelected) , m_selected(nullptr) { for(string& choice : choices) this->addChoice({ choice }); } MultiButton& DropdownInput::addChoice(const StringVector& elements, const Callback& trigger) { MultiButton& choice = Dropdown::addChoice(elements, trigger); if(m_selected == nullptr) this->select(choice); return choice; } void DropdownInput::select(MultiButton& choice) { if(m_selected) m_selected->disableState(SELECTED); m_selected = &choice; m_selected->enableState(SELECTED); m_header.reset(m_selected->m_elements); } void DropdownInput::selected(MultiButton& choice) { this->dropup(); this->select(choice); if(m_onSelected) m_onSelected(*m_selected); } }
744
1,047
#include "uTensor/core/operatorBase.hpp" #include "uTensor/core/context.hpp" namespace uTensor { // EVENTS AND ERRORS DEFINE_ERROR(OperatorIOSizeMismatchError); // OperatorBase::OperatorBase(TensorMapInterface* inputs, TensorMapInterface* // outputs) : inputs(inputs), outputs(outputs) { // Context* ctx = Context::get_default_context(); // // ctx.push_op_tensors(*this, inputs); // // ctx.push_op_tensors(*this, outputs); //} // The preferred interface OperatorBase::OperatorBase(TensorMapInterface* inputs) : _p_inputs(inputs) { // Context* ctx = Context::get_default_context(); // ctx.push_op_tensors(*this, inputs); } OperatorBase::OperatorBase() {} OperatorBase::OperatorBase(uTensor::string op_name) : op_name(op_name) {} void OperatorBase::set_inputs(TensorMapInterface* inputs) { this->_p_inputs = inputs; // Context* ctx = Context::get_default_context(); // ctx.push_op_tensors(*this, inputs); } void OperatorBase::set_outputs(TensorMapInterface* outputs) { this->_p_outputs = outputs; // Context* ctx = Context::get_default_context(); // ctx.push_op_tensors(*this, outputs); } void OperatorBase::eval() { compute(); } OperatorBase::~OperatorBase() { // Context* ctx = Context::get_default_context(); // ctx.pop_op_tensors(*this, inputs); // Inputs are no longer needed } void OperatorBase::set_name(uTensor::string _name) { op_name = _name; } size_t FastOperator::get_readable_block(const Tensor& t, const void*& buffer, uint16_t num_elems, int linear_index) { return t->get_readable_block(buffer, num_elems, linear_index); } size_t FastOperator::get_writeable_block(Tensor& t, void*& buffer, uint16_t num_elems, int linear_index) { return t->get_writeable_block(buffer, num_elems, linear_index); } } // namespace uTensor
730
369
<gh_stars>100-1000 // Copyright (c) 2017-2021, Mudita <NAME>.o. All rights reserved. // For licensing, see https://github.com/mudita/MuditaOS/LICENSE.md #include "Endpoint.hpp" #include <algorithm> #include <vector> #include <cassert> // assert using audio::AbstractStream; using audio::Endpoint; using audio::Sink; using audio::Source; using audio::StreamConnection; void Endpoint::connectStream(AbstractStream &stream) { assert(_stream == nullptr); _stream = &stream; } void Endpoint::disconnectStream() { assert(_stream != nullptr); _stream = nullptr; } bool Endpoint::isConnected() const noexcept { return _stream != nullptr; } auto Endpoint::isFormatSupported(const AudioFormat &format) -> bool { const auto &formats = getSupportedFormats(); return std::find(std::begin(formats), std::end(formats), format) != std::end(formats); } StreamConnection::StreamConnection(Source *source, Sink *sink, AbstractStream *stream) : _sink(sink), _source(source), _stream(stream) { assert(_sink != nullptr); assert(_source != nullptr); assert(_stream != nullptr); _sink->connectStream(*_stream); _source->connectStream(*_stream); } StreamConnection::~StreamConnection() { destroy(); } void StreamConnection::destroy() { disable(); _sink->disconnectStream(); _source->disconnectStream(); } void StreamConnection::enable() { if (enabled) { return; } _stream->reset(); _sink->enableOutput(); _source->enableInput(); enabled = true; } void StreamConnection::disable() { if (!enabled) { return; } _source->disableInput(); _sink->disableOutput(); _stream->reset(); enabled = false; } bool StreamConnection::isEnabled() const noexcept { return enabled; } Source *StreamConnection::getSource() const noexcept { return _source; } Sink *StreamConnection::getSink() const noexcept { return _sink; } AbstractStream *StreamConnection::getStream() const noexcept { return _stream; }
718
1,056
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.netbeans.modules.maven.apisupport; import java.util.ArrayList; import java.util.Arrays; import java.util.HashSet; import java.util.List; import org.netbeans.modules.maven.api.classpath.ProjectSourcesClassPathProvider; import org.netbeans.modules.maven.api.output.OutputProcessor; import org.netbeans.modules.maven.api.output.OutputUtils; import org.netbeans.modules.maven.api.output.OutputVisitor; import org.netbeans.api.java.classpath.ClassPath; import org.netbeans.api.project.Project; import org.netbeans.spi.java.classpath.support.ClassPathSupport; import org.netbeans.spi.project.SubprojectProvider; import org.openide.windows.OutputListener; /** * exec plugin output processing, just handle stacktraces. * @author <NAME> */ public class IDEOutputListenerProvider implements OutputProcessor { private static final String[] EXECGOALS = new String[] { "mojo-execute#nbm:run-ide", //NOI18N "mojo-execute#nbm:run-platform" //NOI18N }; private final Project project; private ClassPath classpath; /** Creates a new instance of TestOutputListenerProvider */ public IDEOutputListenerProvider(Project proj) { project = proj; } private ClassPath createCP(Project prj, HashSet<Project> parents) { parents.add(prj); List<ClassPath> list = new ArrayList<ClassPath>(); ProjectSourcesClassPathProvider cpp = prj.getLookup().lookup(ProjectSourcesClassPathProvider.class); ClassPath[] cp = cpp.getProjectClassPaths(ClassPath.EXECUTE); list.addAll(Arrays.asList(cp)); //for pom packaging projects subprojects/modules matter //TODO for application project it's DependencyProjectProvider, for pom project (run-ide?) it's containerprojectprovider SubprojectProvider spp = prj.getLookup().lookup(SubprojectProvider.class); if (spp != null) { for (Project sub : spp.getSubprojects()) { if (parents.contains(sub)) { continue; } ClassPath c = createCP(sub, parents); if (c != null) { list.add(c); } } } if (list.size() > 0) { return ClassPathSupport.createProxyClassPath(list.toArray(new ClassPath[list.size()])); } return null; } @Override public void processLine(String line, OutputVisitor visitor) { if (classpath == null) { return; } OutputListener list = OutputUtils.matchStackTraceLine(line, classpath); if (list != null) { visitor.setOutputListener(list); } } @Override public String[] getRegisteredOutputSequences() { return EXECGOALS; } @Override public void sequenceStart(String sequenceId, OutputVisitor visitor) { OutputVisitor.Context context = visitor.getContext(); Project prj = project; if (context != null && context.getCurrentProject() != null) { prj = context.getCurrentProject(); } classpath = createCP(prj, new HashSet<Project>()); } @Override public void sequenceEnd(String sequenceId, OutputVisitor visitor) { classpath = null; } @Override public void sequenceFail(String sequenceId, OutputVisitor visitor) { classpath = null; } }
1,574
8,935
import argparse import os import subprocess from collections import namedtuple import contextlib import wordcloud as wc from wordcloud import wordcloud_cli as cli from mock import patch import pytest import matplotlib matplotlib.use('Agg') class PassFile(object): pass ArgOption = namedtuple('ArgOption', ['cli_name', 'init_name', 'pass_value', 'fail_value']) ARGUMENT_SPEC_TYPED = [ ArgOption(cli_name='width', init_name='width', pass_value=13, fail_value=1.), ArgOption(cli_name='height', init_name='height', pass_value=15, fail_value=1.), ArgOption(cli_name='margin', init_name='margin', pass_value=17, fail_value=1.), ArgOption(cli_name='relative_scaling', init_name='relative_scaling', pass_value=1, fail_value='c'), ] ARGUMENT_SPEC_UNARY = [ ArgOption(cli_name='no_collocations', init_name='collocations', pass_value=True, fail_value=1), ArgOption(cli_name='include_numbers', init_name='include_numbers', pass_value=True, fail_value=2), ArgOption(cli_name='no_normalize_plurals', init_name='normalize_plurals', pass_value=True, fail_value=3), ArgOption(cli_name='repeat', init_name='repeat', pass_value=True, fail_value=4), ] ARGUMENT_SPEC_REMAINING = [ ArgOption(cli_name='stopwords', init_name='stopwords', pass_value=PassFile(), fail_value=None), ArgOption(cli_name='regexp', init_name='regexp', pass_value=r'\w{2,}', fail_value=r'12('), ArgOption(cli_name='mask', init_name='mask', pass_value=PassFile(), fail_value=None), ArgOption(cli_name='fontfile', init_name='font_path', pass_value=PassFile(), fail_value=None), ArgOption(cli_name='color', init_name='color_func', pass_value='red', fail_value=None), ArgOption(cli_name='background', init_name='background_color', pass_value='grey', fail_value=None), ArgOption(cli_name='contour_color', init_name='contour_color', pass_value='grey', fail_value=None), ArgOption(cli_name='contour_width', init_name='contour_width', pass_value=0.5, fail_value='blue'), ArgOption(cli_name='min_word_length', init_name='min_word_length', pass_value=5, fail_value='blue'), ArgOption(cli_name='prefer_horizontal', init_name='prefer_horizontal', pass_value=.1, fail_value='blue'), ArgOption(cli_name='scale', init_name='scale', pass_value=1., fail_value='blue'), ArgOption(cli_name='colormap', init_name='colormap', pass_value='Greens', fail_value=1), ArgOption(cli_name='mode', init_name='mode', pass_value='RGBA', fail_value=2), ArgOption(cli_name='max_words', init_name='max_words', pass_value=10, fail_value='blue'), ArgOption(cli_name='min_font_size', init_name='min_font_size', pass_value=10, fail_value='blue'), ArgOption(cli_name='max_font_size', init_name='max_font_size', pass_value=10, fail_value='blue'), ArgOption(cli_name='font_step', init_name='font_step', pass_value=10, fail_value='blue'), ArgOption(cli_name='random_state', init_name='random_state', pass_value=100, fail_value='blue'), ] ARGUMENT_CLI_NAMES_UNARY = [arg_opt.cli_name for arg_opt in ARGUMENT_SPEC_UNARY] def all_arguments(): arguments = [] arguments.extend(ARGUMENT_SPEC_TYPED) arguments.extend(ARGUMENT_SPEC_UNARY) arguments.extend(ARGUMENT_SPEC_REMAINING) return arguments def test_main_passes_arguments_through(tmpdir): image_filepath = str(tmpdir.join('word_cloud.png')) args = argparse.Namespace() for option in all_arguments(): setattr(args, option.init_name, option.pass_value) text = 'some long text' image_file = open(image_filepath, 'w') with patch('wordcloud.wordcloud_cli.wc.WordCloud', autospec=True) as mock_word_cloud: cli.main(vars(args), text, image_file) posargs, kwargs = mock_word_cloud.call_args for option in all_arguments(): assert option.init_name in kwargs def check_argument(text_filepath, name, result_name, value): args, text, image_file = cli.parse_args(['--text', text_filepath, '--' + name, str(value)]) assert result_name in args def check_argument_unary(text_filepath, name, result_name): args, text, image_file = cli.parse_args(['--text', text_filepath, '--' + name]) assert result_name in args def check_argument_type(text_filepath, name, value): with pytest.raises((SystemExit, ValueError),): args, text, image_file = cli.parse_args(['--text', text_filepath, '--' + name, str(value)]) @pytest.mark.parametrize("option", all_arguments()) def test_parse_args_are_passed_along(option, tmpdir, tmp_text_file): if option.cli_name in ARGUMENT_CLI_NAMES_UNARY: check_argument_unary(str(tmp_text_file), option.cli_name, option.init_name) elif option.cli_name != 'mask': pass_value = option.pass_value if isinstance(option.pass_value, PassFile): input_file = tmpdir.join("%s_file" % option.cli_name) input_file.write(b"") pass_value = str(input_file) check_argument(str(tmp_text_file), option.cli_name, option.init_name, pass_value) @pytest.mark.parametrize("option", ARGUMENT_SPEC_TYPED) def test_parse_arg_types(option, tmp_text_file): check_argument_type(str(tmp_text_file), option.cli_name, option.fail_value) def test_check_duplicate_color_error(tmpdir, tmp_text_file): color_mask_file = tmpdir.join("input_color_mask.png") color_mask_file.write(b"") with pytest.raises(ValueError, match=r'.*specify either.*'): cli.parse_args(['--color', 'red', '--colormask', str(color_mask_file), '--text', str(tmp_text_file)]) def test_parse_args_defaults_to_random_color(tmp_text_file): args, text, image_file = cli.parse_args(['--text', str(tmp_text_file)]) assert args['color_func'] == wc.random_color_func def test_unicode_text_file(): unicode_file = os.path.join(os.path.dirname(__file__), "unicode_text.txt") args, text, image_file = cli.parse_args(['--text', unicode_file]) assert len(text) == 16 def test_unicode_with_stopwords(): unicode_file = os.path.join(os.path.dirname(__file__), "unicode_text.txt") stopwords_file = os.path.join(os.path.dirname(__file__), "unicode_stopwords.txt") args, text, image_file = cli.parse_args(['--text', unicode_file, '--stopwords', stopwords_file]) # expect the unicode character from stopwords file was correctly read in assert u'\u304D' in args['stopwords'] def test_cli_writes_to_imagefile(tmpdir, tmp_text_file): # ensure writing works with all python versions tmp_image_file = tmpdir.join("word_cloud.png") tmp_text_file.write(b'some text') args, text, image_file = cli.parse_args(['--text', str(tmp_text_file), '--imagefile', str(tmp_image_file)]) cli.main(args, text, image_file) # expecting image to be written to imagefile assert tmp_image_file.size() > 0 # capsysbinary should be used here, but it's not supported in python 2. def test_cli_writes_to_stdout(tmpdir, tmp_text_file): # ensure writing works with all python versions tmp_image_file = tmpdir.join("word_cloud.png") tmp_text_file.write(b'some text') with contextlib.redirect_stdout(tmp_image_file.open('w+')): args, text, image_file = cli.parse_args(['--text', str(tmp_text_file)]) cli.main(args, text, image_file) # expecting image to be written to stdout assert tmp_image_file.size() > 0 def test_cli_regexp(tmp_text_file): cli.parse_args(['--regexp', r"\w[\w']+", '--text', str(tmp_text_file)]) def test_cli_regexp_invalid(tmp_text_file, capsys): with pytest.raises(SystemExit): cli.parse_args(['--regexp', r"invalid[", '--text', str(tmp_text_file)]) _, err = capsys.readouterr() assert "Invalid regular expression" in err @pytest.mark.parametrize("command,expected_output, expected_exit_code", [ ("wordcloud_cli --help", "usage: wordcloud_cli", 0), ("python -m wordcloud --help", "usage: __main__", 0), ("python %s/../wordcloud/wordcloud_cli.py --help" % os.path.dirname(__file__), "To execute the CLI", 1), ]) def test_cli_as_executable(command, expected_output, expected_exit_code, tmpdir, capfd, no_cover_compat): ret_code = 0 try: subprocess.check_call( command, shell=True, cwd=str(tmpdir) ) except subprocess.CalledProcessError as excinfo: ret_code = excinfo.returncode out, err = capfd.readouterr() assert expected_output in out if ret_code == 0 else err assert ret_code == expected_exit_code
3,287
7,049
<filename>packages/purgecss-from-html/package-lock.json { "name": "purgecss-from-html", "version": "4.0.3", "lockfileVersion": 2, "requires": true, "packages": { "": { "version": "4.0.3", "license": "ISC", "dependencies": { "parse5": "^6.0.0", "parse5-htmlparser2-tree-adapter": "^6.0.0" }, "devDependencies": { "@types/parse5": "^6.0.0", "@types/parse5-htmlparser2-tree-adapter": "^6.0.0" } }, "node_modules/@types/parse5": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/@types/parse5/-/parse5-6.0.1.tgz", "integrity": "<KEY> "dev": true }, "node_modules/@types/parse5-htmlparser2-tree-adapter": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/@types/parse5-htmlparser2-tree-adapter/-/parse5-htmlparser2-tree-adapter-6.0.1.tgz", "integrity": "<KEY> "dev": true, "dependencies": { "@types/parse5": "*" } }, "node_modules/parse5": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/parse5/-/parse5-6.0.1.tgz", "integrity": "<KEY> }, "node_modules/parse5-htmlparser2-tree-adapter": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/parse5-htmlparser2-tree-adapter/-/parse5-htmlparser2-tree-adapter-6.0.1.tgz", "integrity": "<KEY> "dependencies": { "parse5": "^6.0.1" } } }, "dependencies": { "@types/parse5": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/@types/parse5/-/parse5-6.0.1.tgz", "integrity": "<KEY> "dev": true }, "@types/parse5-htmlparser2-tree-adapter": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/@types/parse5-htmlparser2-tree-adapter/-/parse5-htmlparser2-tree-adapter-6.0.1.tgz", "integrity": "sha512-4/HRViCNVy+0oGXiyJ0jb6+PUXcP5WDM+Todg/UCYb5gPjLnppBflan4QH+TizZMlVX3smOvRp2qHA5pOqf+Gw==", "dev": true, "requires": { "@types/parse5": "*" } }, "parse5": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/parse5/-/parse5-6.0.1.tgz", "integrity": "<KEY> }, "parse5-htmlparser2-tree-adapter": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/parse5-htmlparser2-tree-adapter/-/parse5-htmlparser2-tree-adapter-6.0.1.tgz", "integrity": "<KEY> "requires": { "parse5": "^6.0.1" } } } }
1,199
1,016
<filename>vertx-web-api-contract/src/main/java/io/vertx/ext/web/api/validation/impl/OneOfTypeValidator.java package io.vertx.ext.web.api.validation.impl; import io.vertx.ext.web.api.RequestParameter; import io.vertx.ext.web.api.validation.ParameterTypeValidator; import io.vertx.ext.web.api.validation.ValidationException; import java.util.List; /** * @author <NAME> @slinkydeveloper */ public class OneOfTypeValidator implements ParameterTypeValidator { List<ParameterTypeValidator> validators; public OneOfTypeValidator(List<ParameterTypeValidator> validators) { this.validators = validators; } @Override public RequestParameter isValid(String value) throws ValidationException { RequestParameter resultParam = null; for (ParameterTypeValidator validator : validators) { try { RequestParameter validatedParam = validator.isValid(value); if (validatedParam != null) { if (resultParam == null) resultParam = validatedParam; else throw ValidationException.ValidationExceptionFactory.generateNotMatchValidationException(value + " match " + "" + "multiple schemas inside oneOf field"); } } catch (ValidationException e) { } } if (resultParam != null) return resultParam; else throw ValidationException.ValidationExceptionFactory.generateNotMatchValidationException(value + " doesn't " + "match any of oneOf schemas"); } }
504
1,093
/* * Copyright 2002-2019 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.springframework.integration.xml.config; import java.io.ByteArrayInputStream; import java.io.IOException; import java.io.InputStream; import org.springframework.context.support.AbstractXmlApplicationContext; import org.springframework.core.io.AbstractResource; import org.springframework.core.io.Resource; public class TestXmlApplicationContext extends AbstractXmlApplicationContext { private final Resource[] resources; public TestXmlApplicationContext(String... xmlStrings) { resources = new Resource[xmlStrings.length]; for (int i = 0; i < xmlStrings.length; i++) { resources[i] = new TestResource(xmlStrings[i]); } refresh(); } @Override protected Resource[] getConfigResources() { return resources; } private static class TestResource extends AbstractResource { String xmlString; TestResource(String xmlString) { this.xmlString = xmlString; } @Override public String getDescription() { return "test"; } @Override public InputStream getInputStream() throws IOException { return new ByteArrayInputStream(xmlString.getBytes("UTF-8")); } } }
501
1,200
package com.xiaojukeji.chronos.metrics; public enum MetricMsgType { UNKNOWN("unknown"), DELAY("delay"), LOOP_DELAY("loop_delay"), LOOP_EXPONENT_DELAY("loop_exponent_delay"); private String value; MetricMsgType(String value) { this.value = value; } public String getValue() { return value; } }
146
348
{"nom":"Lauris","circ":"2ème circonscription","dpt":"Vaucluse","inscrits":3073,"abs":1508,"votants":1565,"blancs":13,"nuls":2,"exp":1550,"res":[{"nuance":"REM","nom":"Mme <NAME>","voix":485},{"nuance":"FN","nom":"<NAME>","voix":327},{"nuance":"LR","nom":"<NAME>","voix":292},{"nuance":"FI","nom":"<NAME>","voix":234},{"nuance":"SOC","nom":"M. <NAME>","voix":84},{"nuance":"ECO","nom":"Mme <NAME>","voix":51},{"nuance":"ECO","nom":"M. <NAME>","voix":37},{"nuance":"DLF","nom":"M. <NAME>","voix":23},{"nuance":"EXG","nom":"Mme <NAME>","voix":9},{"nuance":"DIV","nom":"Mme <NAME>","voix":8}]}
241
3,459
<reponame>ianclawson/Provenance /* Mednafen - Multi-system Emulator * * Portions of this file Copyright (C) 2004 Ki * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ /* TODO: Allow HuC6280 code to execute properly in the Street Fighter 2 mapper's bankswitched region. */ #include "pce.h" #include "pcecd.h" #include <mednafen/hw_misc/arcade_card/arcade_card.h> #include <mednafen/hash/md5.h> #include <mednafen/file.h> #include <mednafen/cdrom/CDInterface.h> #include <mednafen/mempatcher.h> #include <mednafen/compress/GZFileStream.h> #include "huc.h" namespace MDFN_IEN_PCE_FAST { static const uint8 BRAM_Init_String[8] = { 'H', 'U', 'B', 'M', 0x00, 0x88, 0x10, 0x80 }; //"HUBM\x00\x88\x10\x80"; ArcadeCard *arcade_card = NULL; static uint8 *HuCROM = NULL; static bool IsPopulous; bool PCE_IsCD; static uint8 SaveRAM[2048]; static DECLFW(ACPhysWrite) { arcade_card->PhysWrite(A, V); } static DECLFR(ACPhysRead) { return(arcade_card->PhysRead(A)); } static DECLFR(SaveRAMRead) { if((!PCE_IsCD || PCECD_IsBRAMEnabled()) && (A & 8191) < 2048) return(SaveRAM[A & 2047]); else return(0xFF); } static DECLFW(SaveRAMWrite) { if((!PCE_IsCD || PCECD_IsBRAMEnabled()) && (A & 8191) < 2048) SaveRAM[A & 2047] = V; } static DECLFR(HuCRead) { return ROMSpace[A]; } static DECLFW(HuCRAMWrite) { ROMSpace[A] = V; } static DECLFW(HuCRAMWriteCDSpecial) // Hyper Dyne Special hack { BaseRAM[0x2000 | (A & 0x1FFF)] = V; ROMSpace[A] = V; } static uint8 HuCSF2Latch = 0; static DECLFR(HuCSF2Read) { return(HuCROM[(A & 0x7FFFF) + 0x80000 + HuCSF2Latch * 0x80000 ]); // | (HuCSF2Latch << 19) ]); } static DECLFW(HuCSF2Write) { if((A & 0x1FFC) == 0x1FF0) { HuCSF2Latch = (A & 0x3); } } static void Cleanup(void) MDFN_COLD; static void Cleanup(void) { if(arcade_card) { delete arcade_card; arcade_card = NULL; } if(PCE_IsCD) { PCECD_Close(); } if(HuCROM) { delete[] HuCROM; HuCROM = NULL; } } static void LoadSaveMemory(const std::string& path, uint8* const data, const uint64 len) { try { GZFileStream fp(path, GZFileStream::MODE::READ); const uint64 fp_size_tmp = fp.size(); if(fp_size_tmp != len) throw MDFN_Error(0, _("Save game memory file \"%s\" is an incorrect size(%llu bytes). The correct size is %llu bytes."), path.c_str(), (unsigned long long)fp_size_tmp, (unsigned long long)len); fp.read(data, len); } catch(MDFN_Error &e) { if(e.GetErrno() != ENOENT) throw; } } uint32 HuC_Load(Stream* fp) { uint32 crc = 0; try { uint32 sf2_threshold = 2048 * 1024; uint32 sf2_required_size = 2048 * 1024 + 512 * 1024; uint64 len = fp->size(); if(len & 512) // Skip copier header. { len &= ~512; fp->seek(512, SEEK_SET); } uint64 m_len = (len + 8191)&~8191; bool sf2_mapper = false; if(m_len >= sf2_threshold) { sf2_mapper = true; if(m_len != sf2_required_size) m_len = sf2_required_size; } IsPopulous = 0; PCE_IsCD = 0; HuCROM = new uint8[m_len]; memset(HuCROM, 0xFF, m_len); fp->read(HuCROM, std::min<uint64>(m_len, len)); md5_context md5; md5.starts(); md5.update(HuCROM, std::min<uint64>(m_len, len)); md5.finish(MDFNGameInfo->MD5); crc = crc32(0, HuCROM, std::min<uint64>(m_len, len)); MDFN_printf(_("ROM: %lluKiB\n"), (unsigned long long)(std::min<uint64>(m_len, len) / 1024)); MDFN_printf(_("ROM CRC32: 0x%04x\n"), crc); MDFN_printf(_("ROM MD5: 0x%s\n"), md5_context::asciistr(MDFNGameInfo->MD5, 0).c_str()); memset(ROMSpace, 0xFF, 0x88 * 8192 + 8192); if(m_len == 0x60000) { memcpy(ROMSpace + 0x00 * 8192, HuCROM, 0x20 * 8192); memcpy(ROMSpace + 0x20 * 8192, HuCROM, 0x20 * 8192); memcpy(ROMSpace + 0x40 * 8192, HuCROM + 0x20 * 8192, 0x10 * 8192); memcpy(ROMSpace + 0x50 * 8192, HuCROM + 0x20 * 8192, 0x10 * 8192); memcpy(ROMSpace + 0x60 * 8192, HuCROM + 0x20 * 8192, 0x10 * 8192); memcpy(ROMSpace + 0x70 * 8192, HuCROM + 0x20 * 8192, 0x10 * 8192); } else if(m_len == 0x80000) { memcpy(ROMSpace + 0x00 * 8192, HuCROM, 0x40 * 8192); memcpy(ROMSpace + 0x40 * 8192, HuCROM + 0x20 * 8192, 0x20 * 8192); memcpy(ROMSpace + 0x60 * 8192, HuCROM + 0x20 * 8192, 0x20 * 8192); } else { memcpy(ROMSpace + 0x00 * 8192, HuCROM, (m_len < 1024 * 1024) ? m_len : 1024 * 1024); } for(int x = 0x00; x < 0x80; x++) { HuCPU.FastMap[x] = &ROMSpace[x * 8192]; HuCPU.PCERead[x] = HuCRead; } if(!memcmp(HuCROM + 0x1F26, "POPULOUS", strlen("POPULOUS"))) { uint8 *PopRAM = ROMSpace + 0x40 * 8192; memset(PopRAM, 0xFF, 32768); LoadSaveMemory(MDFN_MakeFName(MDFNMKF_SAV, 0, "sav"), PopRAM, 32768); IsPopulous = 1; MDFN_printf("Populous\n"); for(int x = 0x40; x < 0x44; x++) { HuCPU.FastMap[x] = &PopRAM[(x & 3) * 8192]; HuCPU.PCERead[x] = HuCRead; HuCPU.PCEWrite[x] = HuCRAMWrite; } MDFNMP_AddRAM(32768, 0x40 * 8192, PopRAM); } else { memset(SaveRAM, 0x00, 2048); memcpy(SaveRAM, BRAM_Init_String, 8); // So users don't have to manually intialize the file cabinet // in the CD BIOS screen. LoadSaveMemory(MDFN_MakeFName(MDFNMKF_SAV, 0, "sav"), SaveRAM, 2048); HuCPU.PCEWrite[0xF7] = SaveRAMWrite; HuCPU.PCERead[0xF7] = SaveRAMRead; MDFNMP_AddRAM(2048, 0xF7 * 8192, SaveRAM); } // 0x1A558 //if(len >= 0x20000 && !memcmp(HuCROM + 0x1A558, "STREET FIGHTER#", strlen("STREET FIGHTER#"))) if(sf2_mapper) { for(int x = 0x40; x < 0x80; x++) { HuCPU.PCERead[x] = HuCSF2Read; } HuCPU.PCEWrite[0] = HuCSF2Write; MDFN_printf("Street Fighter 2 Mapper\n"); HuCSF2Latch = 0; } } catch(...) { Cleanup(); throw; } return crc; } bool IsBRAMUsed(void) { if(memcmp(SaveRAM, BRAM_Init_String, 8)) // HUBM string is modified/missing return(1); for(int x = 8; x < 2048; x++) if(SaveRAM[x]) return(1); return(0); } void HuC_LoadCD(const std::string& bios_path) { static const std::vector<FileExtensionSpecStruct> KnownBIOSExtensions = { { ".pce", 0, gettext_noop("PC Engine ROM Image") }, { ".bin", -10, gettext_noop("PC Engine ROM Image") }, { ".bios", 0, gettext_noop("BIOS Image") }, }; try { MDFNFILE fp(&NVFS, bios_path.c_str(), KnownBIOSExtensions, _("CD BIOS")); memset(ROMSpace, 0xFF, 262144); if(fp.size() & 512) fp.seek(512, SEEK_SET); fp.read(ROMSpace, 262144); fp.Close(); PCE_IsCD = 1; PCE_InitCD(); MDFN_printf(_("Arcade Card Emulation: %s\n"), PCE_ACEnabled ? _("Enabled") : _("Disabled")); for(int x = 0; x < 0x40; x++) { HuCPU.FastMap[x] = &ROMSpace[x * 8192]; HuCPU.PCERead[x] = HuCRead; } for(int x = 0x68; x < 0x88; x++) { HuCPU.FastMap[x] = &ROMSpace[x * 8192]; HuCPU.PCERead[x] = HuCRead; HuCPU.PCEWrite[x] = HuCRAMWrite; } HuCPU.PCEWrite[0x80] = HuCRAMWriteCDSpecial; // Hyper Dyne Special hack MDFNMP_AddRAM(262144, 0x68 * 8192, ROMSpace + 0x68 * 8192); if(PCE_ACEnabled) { arcade_card = new ArcadeCard(); for(int x = 0x40; x < 0x44; x++) { HuCPU.PCERead[x] = ACPhysRead; HuCPU.PCEWrite[x] = ACPhysWrite; } } memset(SaveRAM, 0x00, 2048); memcpy(SaveRAM, BRAM_Init_String, 8); // So users don't have to manually intialize the file cabinet // in the CD BIOS screen. LoadSaveMemory(MDFN_MakeFName(MDFNMKF_SAV, 0, "sav"), SaveRAM, 2048); HuCPU.PCEWrite[0xF7] = SaveRAMWrite; HuCPU.PCERead[0xF7] = SaveRAMRead; MDFNMP_AddRAM(2048, 0xF7 * 8192, SaveRAM); } catch(...) { Cleanup(); throw; } } void HuC_StateAction(StateMem *sm, int load, int data_only) { SFORMAT StateRegs[] = { SFPTR8(ROMSpace + 0x40 * 8192, IsPopulous ? 32768 : 0), SFPTR8(SaveRAM, IsPopulous ? 0 : 2048), SFPTR8(ROMSpace + 0x68 * 8192, PCE_IsCD ? 262144 : 0), SFVAR(HuCSF2Latch), SFEND }; MDFNSS_StateAction(sm, load, data_only, StateRegs, "HuC"); if(load) HuCSF2Latch &= 0x3; if(PCE_IsCD) { PCECD_StateAction(sm, load, data_only); if(arcade_card) arcade_card->StateAction(sm, load, data_only); } } // // HuC_Kill() may be called before HuC_Load*() is called or even after it errors out, so we have a separate HuC_SaveNV() // to prevent save game file corruption in case of error. void HuC_Kill(void) { Cleanup(); } void HuC_SaveNV(void) { if(IsPopulous) { MDFN_DumpToFile(MDFN_MakeFName(MDFNMKF_SAV, 0, "sav"), ROMSpace + 0x40 * 8192, 32768); } else if(IsBRAMUsed()) { MDFN_DumpToFile(MDFN_MakeFName(MDFNMKF_SAV, 0, "sav"), SaveRAM, 2048); } } void HuC_Power(void) { if(PCE_IsCD) memset(ROMSpace + 0x68 * 8192, 0x00, 262144); if(arcade_card) arcade_card->Power(); } };
4,135
14,668
// Copyright 2021 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. package org.chromium.chrome.browser.contextualsearch; import static org.hamcrest.CoreMatchers.containsString; import static org.hamcrest.CoreMatchers.equalTo; import static org.hamcrest.CoreMatchers.is; import static org.junit.Assert.assertNull; import static org.junit.Assert.assertThat; import static org.junit.Assert.assertTrue; import android.net.Uri; import org.junit.Test; import org.junit.runner.RunWith; import org.chromium.base.test.BaseRobolectricTestRunner; import org.chromium.base.test.util.Feature; /** * Tests parts of the {@link RelatedSearchesList} class. */ @RunWith(BaseRobolectricTestRunner.class) public class RelatedSearchesListTest { private static final String QUERY_PARAM_NAME = "q"; private static final String SAMPLE_STAMP = "1RcldCu"; private static final String USER_POSITION_CODE = "Up"; private static final String URL_1 = "https://www.google.com/search?q=1st+query&ctxsl_rs=" + SAMPLE_STAMP; private static final String URL_2_NO_STAMP = "https://www.google.com/search?q=2nd+query"; private static final String URL_3 = "https://www.google.com/search?q=3rd+query&ctxsl_rs=" + SAMPLE_STAMP; private static final String SAMPLE_JSON = "{\"content\":[{\"searchUrl\":\"" + URL_1 + "\",\"title\":\"1st query\"}," + "{\"searchUrl\":\"" + URL_2_NO_STAMP + "\",\"title\":\"2nd query\"}]," + "\"selection\":[{\"searchUrl\":\"" + URL_3 + "\",\"title\":\"3rd query\"}]}"; private static final String BAD_JSON = "Bad JSON!"; // TODO(donnd): Consider adding more tests for In Bar suggestions. private static final boolean USE_IN_BAR_SUGGESTIONS = true; private static final boolean DONT_USE_IN_BAR_SUGGESTIONS = false; // TODO(donnd): Add failure messages to the asserts in all these tests. @Test @Feature({"RelatedSearches", "RelatedSearchesList"}) public void testGetQueries() { RelatedSearchesList relatedSearchesList = new RelatedSearchesList(SAMPLE_JSON); assertThat(relatedSearchesList.getQueries(DONT_USE_IN_BAR_SUGGESTIONS).get(0), equalTo("1st query")); assertThat(relatedSearchesList.getQueries(DONT_USE_IN_BAR_SUGGESTIONS).get(1), equalTo("2nd query")); assertThat(relatedSearchesList.getQueries(USE_IN_BAR_SUGGESTIONS).get(0), equalTo("3rd query")); } @Test @Feature({"RelatedSearches", "RelatedSearchesList"}) public void testGetQueriesBadJson() { RelatedSearchesList relatedSearchesList = new RelatedSearchesList(BAD_JSON); assertThat(relatedSearchesList.getQueries(DONT_USE_IN_BAR_SUGGESTIONS).size(), is(0)); } /** Asserts that the given URI has an updated stamp. */ private void assertUdpatedStamp(Uri uriWithStamp) { String updatedStamp = uriWithStamp.getQueryParameter(RelatedSearchesStamp.STAMP_PARAMETER); assertTrue(updatedStamp.startsWith(SAMPLE_STAMP)); assertTrue(updatedStamp.length() > SAMPLE_STAMP.length()); assertTrue(updatedStamp.endsWith(USER_POSITION_CODE + 0)); } @Test @Feature({"RelatedSearches", "RelatedSearchesList"}) public void testGetSearchUri() { RelatedSearchesList relatedSearchesList = new RelatedSearchesList(SAMPLE_JSON); assertThat(relatedSearchesList.getSearchUri(0, DONT_USE_IN_BAR_SUGGESTIONS) .getQueryParameter(QUERY_PARAM_NAME), containsString("1st query")); assertThat(relatedSearchesList.getSearchUri(1, DONT_USE_IN_BAR_SUGGESTIONS) .getQueryParameter(QUERY_PARAM_NAME), containsString("2nd query")); assertThat(relatedSearchesList.getSearchUri(0, USE_IN_BAR_SUGGESTIONS) .getQueryParameter(QUERY_PARAM_NAME), containsString("3rd query")); // The first URL had a stamp, so check that it's now updated. Uri uriWithStamp = relatedSearchesList.getSearchUri(0, DONT_USE_IN_BAR_SUGGESTIONS); assertUdpatedStamp(uriWithStamp); // The second URL had no stamp, so check that there still is none. assertNull(relatedSearchesList.getSearchUri(1, DONT_USE_IN_BAR_SUGGESTIONS) .getQueryParameter(RelatedSearchesStamp.STAMP_PARAMETER)); // The third URL had a stamp, so check that it's now updated. Uri inBarUriWithStamp = relatedSearchesList.getSearchUri(0, USE_IN_BAR_SUGGESTIONS); assertUdpatedStamp(inBarUriWithStamp); // Now index too far. We should just get a warning. assertNull(relatedSearchesList.getSearchUri(2, DONT_USE_IN_BAR_SUGGESTIONS)); } }
1,998
1,604
package org.bouncycastle.jce.provider.test; import java.io.ByteArrayInputStream; import java.security.GeneralSecurityException; import java.security.Security; import java.security.cert.CertPathBuilder; import java.security.cert.CertPathBuilderResult; import java.security.cert.CertStore; import java.security.cert.CertificateFactory; import java.security.cert.CollectionCertStoreParameters; import java.security.cert.PKIXBuilderParameters; import java.security.cert.TrustAnchor; import java.security.cert.X509CRL; import java.security.cert.X509CertSelector; import java.security.cert.X509Certificate; import java.util.HashSet; import java.util.Set; import java.util.Vector; import org.bouncycastle.asn1.ASN1InputStream; import org.bouncycastle.asn1.ASN1OctetString; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.encoders.Base64; import org.bouncycastle.util.test.SimpleTest; /* * These tests are taken from the NIST X.509 Validation Test Suite * available at: https://csrc.nist.gov/pki/testing/x509paths.html * * Only the relevant certificate and crl data has been kept, in order * to keep the class size to a minimum. * */ public class NISTCertPathTest extends SimpleTest { private static final String TEST_POLICY_1 = "2.16.840.172.16.17.32.48.1"; private static final String TEST_POLICY_2 = "2.16.840.172.16.17.32.48.2"; private static final String TEST_POLICY_3 = "2.16.840.172.16.17.32.48.3"; private static final String TEST_POLICY_4 = "2.16.840.172.16.17.32.48.4"; private static final String TEST_POLICY_5 = "2.16.840.1.101.3.1.48.5"; private static Set ANY; private static Set TP1; private static Set TP2; private static Set TP3; private static Set TP4; private static Set TP1_TP2; static { ANY = new HashSet(); TP1 = new HashSet(); TP1.add(TEST_POLICY_1); TP2 = new HashSet(); TP2.add(TEST_POLICY_2); TP3 = new HashSet(); TP3.add(TEST_POLICY_3); TP4 = new HashSet(); TP4.add(TEST_POLICY_4); TP1_TP2 = new HashSet(); TP1_TP2.add(TEST_POLICY_1); TP1_TP2.add(TEST_POLICY_2); } /* * * FIELDS * */ private CertificateFactory fact; private X509Certificate trustedCert; private X509CRL trustedCRL; private Set trustedSet; private int testCount; private Vector testFail; private StringBuffer resultBuf; public String getName() { return "NISTCertPathTest"; } public void performTest() { init(); test(" 1", TEST_1_DATA , true , false); test(" 2", TEST_2_DATA , false, false); test(" 3", TEST_3_DATA , false, false); test(" 4", TEST_4_DATA , true , false); test(" 5", TEST_5_DATA , false, false); test(" 6", TEST_6_DATA , false, false); test(" 7", TEST_7_DATA , true , false); test(" 8", TEST_8_DATA , false, false); test(" 9", TEST_9_DATA , false, false); test("10", TEST_10_DATA, false, false); test("11", TEST_11_DATA, false, false); test("12", TEST_12_DATA, true , false); test("13", TEST_13_DATA, false, false); test("14", TEST_14_DATA, false, false); test("15", TEST_15_DATA, true , false); test("16", TEST_16_DATA, true , false); test("17", TEST_17_DATA, true , false); test("18", TEST_18_DATA, true , false); test("19", TEST_19_DATA, false, false); test("20", TEST_20_DATA, false, false); test("21", TEST_21_DATA, false, false); test("22", TEST_22_DATA, false, false); test("23", TEST_23_DATA, false, false); test("24", TEST_24_DATA, true , false); test("25", TEST_25_DATA, false, false); test("26", TEST_26_DATA, true , false); test("27", TEST_27_DATA, true , false); test("28", TEST_28_DATA, false, false); test("29", TEST_29_DATA, false, false); test("30", TEST_30_DATA, true , false); test("31", TEST_31_DATA, false, false); test("32", TEST_32_DATA, false, false); test("33", TEST_33_DATA, true , false); test("34a", TEST_34_DATA, ANY , true , true , false); test("34b", TEST_34_DATA, ANY , false, true , false); test("34c", TEST_34_DATA, TP1 , true , true , false); test("34d", TEST_34_DATA, TP1 , false, true , false); test("34e", TEST_34_DATA, TP2 , true , false, false); test("34f", TEST_34_DATA, TP2 , false, true , false); test("35a", TEST_35_DATA, false, true , false); test("35b", TEST_35_DATA, true , false, false); test("36a", TEST_36_DATA, false, true , false); test("36b", TEST_36_DATA, true , false, false); test("37a", TEST_37_DATA, false, true , false); test("37b", TEST_37_DATA, true , false, false); test("38a", TEST_38_DATA, false, true , false); test("38b", TEST_38_DATA, true , false, false); test("39a", TEST_39_DATA, ANY , true , true , false); test("39b", TEST_39_DATA, ANY , false, true , false); test("39c", TEST_39_DATA, TP1 , true , true , false); test("39d", TEST_39_DATA, TP1 , false, true , false); test("39e", TEST_39_DATA, TP2 , true , false, false); test("39f", TEST_39_DATA, TP2 , false, true , false); test("40a", TEST_40_DATA, false, true , false); test("40b", TEST_40_DATA, true , false, false); test("41a", TEST_41_DATA, false, true , false); test("41b", TEST_41_DATA, true , false, false); test("42a", TEST_42_DATA, false, true , false); test("42b", TEST_42_DATA, true , false, false); test("43a", TEST_43_DATA, false, true , false); test("43b", TEST_43_DATA, true , false, false); test("44a", TEST_44_DATA, false, true , false); test("44b", TEST_44_DATA, true , false, false); test("45a", TEST_45_DATA, false, false, false); test("45b", TEST_45_DATA, true , false, false); test("46a", TEST_46_DATA, ANY , false, true , false); test("46b", TEST_46_DATA, ANY , true , true , false); test("46c", TEST_46_DATA, TP1 , true , true , false); test("46d", TEST_46_DATA, TP1 , false, true , false); test("46e", TEST_46_DATA, TP2 , true , false, false); test("46f", TEST_46_DATA, TP2 , false, false, false); test("47a", TEST_47_DATA, false, false, false); test("47b", TEST_47_DATA, true , false, false); test("48a", TEST_48_DATA, TP1 , false, true , false); test("48b", TEST_48_DATA, TP1 , true , true , false); test("48c", TEST_48_DATA, ANY , false, true , false); test("48d", TEST_48_DATA, ANY , true , true , false); test("48e", TEST_48_DATA, TP2 , false, true , false); test("48f", TEST_48_DATA, TP2 , true , false, false); test("49a", TEST_49_DATA, TP1 , false, true , false); test("49b", TEST_49_DATA, TP1 , true , true , false); test("49c", TEST_49_DATA, TP3 , false, true , false); test("49d", TEST_49_DATA, TP3 , true , false, false); test("49e", TEST_49_DATA, ANY , false, true , false); test("49f", TEST_49_DATA, ANY , true , true , false); test("50a", TEST_50_DATA, TP1 , false, true , false); test("50b", TEST_50_DATA, TP1 , true , true , false); test("50c", TEST_50_DATA, TP1_TP2 , false, true , false); test("50d", TEST_50_DATA, TP1_TP2 , true , true , false); test("50e", TEST_50_DATA, ANY , false, true , false); test("50f", TEST_50_DATA, ANY , true , true , false); test("51a", TEST_51_DATA, false, true , false); test("51b", TEST_51_DATA, true , false, false); test("52a", TEST_52_DATA, TP1 , false, true , false); test("52b", TEST_52_DATA, TP1 , true , false, false); test("52c", TEST_52_DATA, TP1_TP2 , false, true , false); test("52d", TEST_52_DATA, TP1_TP2 , true , false, false); test("52e", TEST_52_DATA, ANY , false, true , false); test("52f", TEST_52_DATA, ANY , true , true , false); test("53a", TEST_53_DATA, TP1 , false, true , false); test("53b", TEST_53_DATA, TP1 , true , true , false); test("53c", TEST_53_DATA, TP1_TP2 , false, true , false); test("53d", TEST_53_DATA, TP1_TP2 , true , true , false); test("53e", TEST_53_DATA, TP4 , false, true , false); test("53f", TEST_53_DATA, TP4 , true , false, false); test("53g", TEST_53_DATA, ANY , false, true , false); test("53h", TEST_53_DATA, ANY , true , true , false); test("54", TEST_54_DATA, false, false); test("55", TEST_55_DATA, false, false); test("56", TEST_56_DATA, true , false); test("57", TEST_57_DATA, true , false); test("58", TEST_58_DATA, false, false); test("59", TEST_59_DATA, false, false); test("60", TEST_60_DATA, false, false); test("61", TEST_61_DATA, false, false); test("62", TEST_62_DATA, true , false); test("63", TEST_63_DATA, true , false); test("64", TEST_64_DATA, false, false); test("65", TEST_65_DATA, false, false); test("66", TEST_66_DATA, false, false); test("67", TEST_67_DATA, true , false); test("68", TEST_68_DATA, false, false); test("69", TEST_69_DATA, false, false); test("70", TEST_70_DATA, false, false); test("71", TEST_71_DATA, false, false); test("72", TEST_72_DATA, false, false); test("73", TEST_73_DATA, false, false); test("74", TEST_74_DATA, true , false); test("75", TEST_75_DATA, false, false); test("76", TEST_76_DATA, false, false); resultBuf.append("NISTCertPathTest -- Failed: ").append(testFail.size()).append('/').append(testCount).append('\n'); if (!testFail.isEmpty()) { fail(resultBuf.toString()); } } private void init() { try { fact = CertificateFactory.getInstance("X.509", "BC"); trustedCert = (X509Certificate)fact .generateCertificate(new ByteArrayInputStream(Base64 .decode(Trust_Anchor_CP_01_01_crt))); trustedCRL = (X509CRL)fact.generateCRL(new ByteArrayInputStream( Base64.decode(Trust_Anchor_CRL_CP_01_01_crl))); trustedSet = new HashSet(); byte[] _ncBytes = null; byte[] _octBytes = trustedCert.getExtensionValue("192.168.127.12"); if (_octBytes != null) { ASN1InputStream _ais = new ASN1InputStream( new ByteArrayInputStream(_octBytes)); ASN1OctetString _oct = ASN1OctetString.getInstance(_ais .readObject()); _ais.close(); _ncBytes = _oct.getOctets(); } trustedSet.add(new TrustAnchor(trustedCert, _ncBytes)); testCount = 0; testFail = new Vector(); resultBuf = new StringBuffer(); } catch (Exception ex) { throw new RuntimeException(ex.getMessage()); } } private X509Certificate decodeCertificate(String _str) throws GeneralSecurityException { return (X509Certificate)fact .generateCertificate(new ByteArrayInputStream(Base64 .decode(_str))); } private X509CRL decodeCRL(String _str) throws GeneralSecurityException { return (X509CRL)fact.generateCRL(new ByteArrayInputStream(Base64 .decode(_str))); } private CertStore makeCertStore(String[] _strs) throws GeneralSecurityException { Vector _vec = new Vector(); _vec.addElement(trustedCRL); for (int i = 0; i < _strs.length; i++) { if (_strs[i].startsWith("MIIC")) { _vec.addElement(fact .generateCertificate(new ByteArrayInputStream(Base64 .decode(_strs[i])))); } else if (_strs[i].startsWith("MIIB")) { _vec.addElement(fact.generateCRL(new ByteArrayInputStream( Base64.decode(_strs[i])))); } else { throw new IllegalArgumentException("Invalid certificate or crl"); } } // Insert elements backwards to muck up forward ordering dependency Vector _vec2 = new Vector(); for (int i = _vec.size() - 1; i >= 0; i--) { _vec2.add(_vec.elementAt(i)); } return CertStore.getInstance("Collection", new CollectionCertStoreParameters(_vec2), "BC"); } private void test(String _name, String[] _data, boolean _accept, boolean _debug) { test(_name, _data, null, false, _accept, _debug); } private void test(String _name, String[] _data, boolean _explicit, boolean _accept, boolean _debug) { test(_name, _data, null, _explicit, _accept, _debug); } private void test(String _name, String[] _data, Set _ipolset, boolean _explicit, boolean _accept, boolean _debug) { testCount++; boolean _pass = true; try { CertPathBuilder _cpb = CertPathBuilder.getInstance("PKIX", "BC"); X509Certificate _ee = decodeCertificate(_data[_data.length - 1]); X509CertSelector _select = new X509CertSelector(); _select.setSubject(_ee.getSubjectX500Principal().getEncoded()); PKIXBuilderParameters _param = new PKIXBuilderParameters( trustedSet, _select); _param.setExplicitPolicyRequired(_explicit); _param.addCertStore(makeCertStore(_data)); _param.setRevocationEnabled(true); if (_ipolset != null) { _param.setInitialPolicies(_ipolset); } CertPathBuilderResult _result = _cpb.build(_param); if (!_accept) { System.out.println("Accept when it should reject"); _pass = false; testFail.addElement(_name); } } catch (Exception ex) { if (_accept) { System.out.println("Reject when it should accept"); _pass = false; testFail.addElement(_name); } } resultBuf.append("NISTCertPathTest -- ").append(_name).append(": ") .append(_pass ? "\n" : "Failed.\n"); } public static void main( String[] args) { Security.addProvider(new BouncyCastleProvider()); runTest(new NISTCertPathTest()); } /* * Trust Anchor * */ public static final String Trust_Anchor_CP_01_01_crt = "<KEY>T<KEY>" + "YDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsTA0RvRDEQMA4GA1UECxMHVGVzdGlu" + "ZzEVMBMGA1UEAxMMVHJ1c3QgQW5jaG9yMB4XDTk5MDEwMTEyMDEwMFoXDTQ4MDEwMTEyMD" + "<KEY>ZXJ<KEY>" + "<KEY>" + "<KEY>/ZBHVyceZ2q0pUQt4TO2qPlWAw+" + "TotWvz6qIS1QE/7zGS56yxHP89O4X1efnZeArx2VVxLfNNS9865N53ymINQETtpjYT49Ko" + "03z8U8yfn68DlIBHi9sN31JEYzoUafF58Eu883lAwTQ6qQrJF4HbrzGIQqgitHAgMBAAGj" + "ODA2MBEGA1UdDgQKBAirmuv5wudUjzAMBgNVHRMEBTADAQH/MBMGA1UdIwQMMAqACKua6/" + "nC51SPMA0GCSqGSIb3DQEBBQUAA4GBABZWD2Gsh4tP62QSG8OFWUpo4TulIcFZLpGsaP4T" + "/2Nt7lXUoIJMN7wWjqkmYf5/Rvo4HxNcimq3EkeYcrm1VoDueJUYGvRjcCY5mxkghI27Yl" + "/fLKE9/BvQOrvYzBs2EqKrrT7m4VK0dRMR7CeVpmPP08z0Tti6uK2tzBplp1pF"; public static final String Trust_Anchor_CRL_CP_01_01_crl = "<KEY>" + "<KEY>" + "BAMTDFRydXN0IEFuY2hvchcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjAiMCACAS" + "cXDTk5MDEwMTEyMDAwMFowDDAKBgNVHRUEAwoBAaAjMCEwCgYDVR0UBAMCAQEwEwYDVR0j" + "BAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcNAQEFBQADgYEAC7lqZwejJRW7QvzH11/7cYcL3r" + "acgMxH3PSU/ufvyLk7ahR++RtHary/WeCvRdyznLiIOA8ZBiguWtVPqsNysNn7WLofQIVa" + "+/TD3T+lece4e1NwGQvj5Q+e2wRtGXg+gCuTjTKUFfKRnWz7O7RyiJKKim0jtAF4RkCpLe" + "bNChY="; /* * test1 * */ public static final String End_Certificate_CP_01_01_crt = "MIIChjCCAe+gAwIBAgIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDEuMDEwgZ8wDQ" + "<KEY>oGBAMY07G8M4FkOvF+6LpO7BKcDuXCK<KEY>j" + "2GCza8uIiMfYSH5k+fYb43lGQeRh9yVHcfNQlE7yfGo3tgxGv5yWpeKvDMqL8Iy6Q0oIjm" + "qH80ZOz21dUkermcckzTEOfe/R2fNpJPv8M24pq29SdYAqu+CpLDHFtws9O+q1AgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIrNv88bwFLtIwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcNAQEFBQADgYEAK4hP" + "goWtZbHf6qWfRfmrPrz9hDH1644NrJop2Y7MXzuTtpo1zp4NCG4+ii0CSOfvhugc8yOmq3" + "I6olgE0V16VtC5br2892UHYZ55Q4oQ9BWouVVlOyY9rogOB160BnsqBELFhT0Wf6mnbsdD" + "G+BB5fFyeK61aYDWV84kS7cSX5w="; public static final String[] TEST_1_DATA = new String[] { End_Certificate_CP_01_01_crt, }; /* * test2 * */ public static final String Intermediate_Certificate_CP_01_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>T" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjAxLjAyMIGfMA0GCS" + "<KEY>EBAQUAA4GNADCBiQKBgQDWO<KEY>l+<KEY>" + "j9Co77rPPPtVA7mDKU4OiYT74mIWH52HQBZr+PRmOFh0Z9S1oTpLbxNLCDc6OmQKBo6iex" + "SIt/jOatFFmzmTZ78Kq9s3nfrOVA83ggmPDTPkuG5GwcxPgFq0vRmAJ0CESQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQI5o5Am09NlOYwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEA3C7Ye5/Te14LIwo/LK2fnpobbQA3dhOn5UgqZ8lKbQ/HV1D8/eU9dK" + "2v5gW43XvFq4whK0WKLBvBFchKtp9T1QX3CI2WCqdJRyqla6TkQsS36T17/ww2nzy1853Y" + "hfDYNsge5XW8YZNfNjjVxcR3RnyFxPax1YIlISiGdI0dnag="; public static final String Intermediate_CRL_CP_01_02_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1DUC4wMS4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI5o5Am09NlOYwDQYJKoZIhvcNAQEFBQADgYEAl26W" + "g1Gqq3R93XPjghABVocfeIi8zcSJ0YAKqbifh5V3JCC8Piy19GzZdL244GqBDls44IAhKj" + "YuXN2mSohdqwULbye4agAgfl37XhhwsBDTYwaJiv3njFQ6Ml7KJ3STmoIpmlLvrXibDuHX" + "ocuNGo72ckhOdBpXd+PhgGuoTis="; public static final String End_Certificate_CP_01_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>oGBALwJrZT6bJXQnZzc3socZ/mNsEag4BTdym99ZCP2" + "3PGsTCfV2z7+p4DehIFrn/N/a1d1nvyqRqpQGPU86tl1CWgFtXS+zCctDR71P76bjd6yef" + "<KEY>C+<KEY>MBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIf5mSjuNhs/gwEwYDVR0jBAwwCoAI5o5Am09NlOYwDQYJKoZIhvcNAQEFBQADgYEAK7wd" + "MyLlIZ/Qsqj3/A3Gat0d5BORtFTZH0VdlVVOWN1JCZxrnjeIFB92NNzUROemxgBxzneuWN" + "SlYlcpTk25pAbs6RMdbT8dovKQkQkF2TXeQ+4qktFaLQntVT8UsEzHR4Diw0/gH8tseGqF" + "F7FyiW8ni6zInSO+embUKiibj9I="; public static final String[] TEST_2_DATA = new String[] { Intermediate_Certificate_CP_01_02_crt, Intermediate_CRL_CP_01_02_crl, End_Certificate_CP_01_02_crt }; /* * test3 * */ public static final String Intermediate_Certificate_CP_01_03_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjAxLjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC4RZ0R82sA+BfyynFeoIDG7c5IlZ8HorEv+O4Ij3Oy" + "7FR1MB4no8hDEBPBf5fCrAR/8PVxCZjVj2HOwnSAqUQgxo6WPcmkabux12k8kK6yeKq3b7" + "u5fL6tb7eKElQzsz8Je4z4rCDkI10vV+X0VZ5Ip/Es428dw2KoN8eyGmw3+QIDAQABo2Mw" + "<KEY>" + "FlAwEwATARBgNVHQ4ECgQIz08WhMpG2JswEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAQ+iqlFvbvDejO/m+RCHh2UuUau1FuABObkPOu2Tv9yTWvTSWDRygdO" + "LQRiOLsjgrdXPdbDutVGjllBoTN8cdz3SWjCpampg5TBikArxmNEYMDQvL6n2lkUcetRJR" + "gQ7TYLvFj9+SycKXfM5CUXAyCfcU/QwDghhZgc99AuDZtJc="; public static final String Intermediate_CRL_CP_01_03_crl = "<KEY>IBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1DUC4wMS4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIz08WhMpG2JswDQYJKoZIhvcNAQEFBQADgYEAoyO/" + "xcpJ0Obj4rTXhHFd7XMzslt79njkEgdwnon9BaYB3xSmkEXCMwLMurrjVYKaB6SWAiPeUv" + "G7ScDHJE6UFVJwIt4vP/M7gTOJ7uak33aWi9e5DeIuLqE6pFqTGu+uoBkkd82SHg2GhJhZ" + "VXDtJ3UcO/3JQPbslc02s9HiRBg="; public static final String End_Certificate_CP_01_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1DUC4wMS4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDEuMDMwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBANAD1vQj//4BGEXW1Q7HX/AUyFJFyHoYcvg5y4u/" + "8Sj6okriXj3knnBKDiJLpKfcsO5p5MQS5QzAc+lxErXD+duiw8lm61hj0StsRzhDFsaC1g" + "akjzU70R2Tmz/djUnqO3aa2wICc4NVAXnIMMsH/b6XXFZpC0/C32TPTv9aa9mrAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIPw2wltiRqz4wEwYDVR0jBAwwCoAIz08WhMpG2JswDQYJKoZIhvcNAQEFBQADgYEAln42" + "iR3eHyazF8CRjS9Jnas/26MaBtjUyDtcSjTVDWFlccwrQ7TgtzjkNm9fCmgSyvryDnUYGM" + "DoEjwYNLIgtCAkVIEBTmJvlqiPHH+tV5oJvIav+Fn8okHpuuK44umDcdKiFWlOyxrShxzV" + "3Bez/eHklaPTw/VsVhyh+Uru5zM="; public static final String[] TEST_3_DATA = new String[] { Intermediate_Certificate_CP_01_03_crt, Intermediate_CRL_CP_01_03_crl, End_Certificate_CP_01_03_crt }; /* * test4 * */ public static final String Intermediate_Certificate_1_CP_02_01_crt = "<KEY>CQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05OTAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjAyLjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC/lQLtWKzklgYuzhjMiK2CzFmzODsEY/JIVNdn9T8M" + "W4ufpGwnfIV62EUHCFeMYydKBm8Hyjbjrz1otINJmrGL5WSAX1/UPtHy1chgXOsFYD6nAH" + "jZAJJGw74nUbKw5+L1wUHU8qXABaaTrRpS1UdKSq4TCZ18NCjC4Oxcf/yDdQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQINsJcxaBqdugwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAOQP3iUX7FtJlL9nvu4F+8o/N5vr+OB28OsbYtW+Q1FzEfjkUGtT9Ri" + "teradpN/xUnS/oj3BfqFtNANkYKrBeqRtm2VeOC3kdCVFnWFME2aoRAQZbWvOwCFc3yLA7" + "JBdENtDNI54yYHMHPA4/2CuNQq1Iu1ektAS95DIe7ddxL18="; public static final String Intermediate_Certificate_2_CP_02_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "uGoYiEbAc/ZN7R8OHI7dnv9pBfsvyEl7m2DVoLZnP0eXJTHjdZxb1TwPHoSIysi9u3xWlP" + "Rg+v+GGfKLB9pL0m8SZh97SngerZI14w7vQy0kkXziGatSpBoXtWNmsHJNuQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIoI0mSmDmzZUwEwYDVR0jBAwwCoAINsJcxaBqdugwDQYJKoZI" + "hvcNAQEFBQADgYEAcfs1pH12Qwdhv4NOJO2xxgMZZo8+A9Zl9c7RxsvuoZOOyCxoE9wT/l" + "PdUpGoGxtIPoWQs1qXEXnAlXJCXjLCJUHIG1/E6gQUXW0Ty6Ztpc5Dz06pPTN2gt+41B3J" + "sL/Klqc4iyCaWr8sYgEPQ8nColWRmIwk9gAasPNkNhyxA3Y="; public static final String Intermediate_CRL_1_CP_02_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAINsJcxaBqdugwDQYJKoZIhvcNAQEFBQADgYEAlBaV" + "VfrZqvyRhGXNYFik169nBHiNfKpw8k1YgFAQeNYdmfScq1KHmKzDhsx9kQteczBL7ltviK" + "TN3CKlZW82c16mfd4yYx0l5tkU80lwKCHSUzx92+qrvYjSMup+bqSsi8JhqByBf6b0JbKf" + "yx53Vpw1OCzjxrVHcfHPx8Q/vR4="; public static final String Intermediate_CRL_2_CP_02_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>wEwYDVR0jBAwwCoAIoI0mSmDmzZUwDQYJKoZIhvcNAQEFBQADgYEAhAHP" + "<KEY>eOwoMXuQUoHMvezEpM0BYOVLzI3KbRXWa9iWZINr99cRQvonMtOGkhIH3iS" + "wSNbsjmF9HX5UvNzrofOWataVP+macpCuNlK0NS3xxJjKRWOB9C1Ib7tiSSrQqIPcchlF6" + "vofy2ALEL6Usa1UTVYMhzGYnVZU="; public static final String End_Certificate_CP_02_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMi1DUC4wMi4wMTAeFw05OTAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDIuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOzYq2murB5ZjQd4wReI51Lc1F5VwK90OMGRfi71" + "YvwdRjgCudeDXZGW5ayid82y+eTDKFSzo1Li/BPTUXMpeqHHMCmLeefqxAWmz3aDoilF8I" + "Q53PlejnXJdntsal44w6WdP6ssiXlwzcZDnobAfuDTPgsnWWfzAkr1/LqEw/QZAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIP5tVdEyxotcwEwYDVR0jBAwwCoAIoI0mSmDmzZUwDQYJKoZIhvcNAQEFBQADgYEAkVx9" + "S/20Hir8qMnfMpMGTgMKoVeWoljxim83IkNs1Xqe1oLGHdyDUA66uF8wPkoTqGrfDYvgBa" + "5Mi0iJREnMWoiWvCe467+L1b2gtvRBMl9bcRj40bvelk0Wn4lBl3VuKXarP5M0PKT5OWvN" + "2cPLNeXHvV6ZIrC4rmK2ISpIXX4="; public static final String[] TEST_4_DATA = new String[] { Intermediate_Certificate_1_CP_02_01_crt, Intermediate_Certificate_2_CP_02_01_crt, Intermediate_CRL_1_CP_02_01_crl, Intermediate_CRL_2_CP_02_01_crl, End_Certificate_CP_02_01_crt }; /* * test5 * */ public static final String Intermediate_Certificate_CP_02_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "Q5sGLoztd2XtEgtZEPwvzd9KLKGP3XmgTrc4BGohqoFoG9Qb+w2ZGFwVC22GpeSoXc+J2u" + "2t3uRKYgboHpB0Jk42XLy+2wSEtS+/er7cFu2ufdPsvT4J1AqiuZSco96vtQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIBvoP1E6PGiMwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAmOyFq2vZrUNDVWRcyzYvZhs1uQ4zgXtfqnPE0V19RgaYffCrSCI86z" + "5kyDUyZwbGABMxBaVxEw536MesyDTdZdEVw6lN5RRtxr8/WEiSH6oI6t0xNxuNOkSNpz4d" + "28HA4UfUvtXK8RK2YZnPAd6UXsRUPBPXKEpzy4v/9RyihSg="; public static final String Intermediate_CRL_CP_02_02_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1DUC4wMi4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIBvoP1E6PGiMwDQYJKoZIhvcNAQEFBQADgYEAALlA" + "f3IDWexcdkMQHWTdGeFe+bG5dBvVPL5ZyQUw9DWbLwrjw/Jm4v9t+HLjETLSymsFT4bW21" + "OwnEiAAdaKT96k5t+sTyU5QQ6HL/jRXLHLGdCQgMFCglm5iNqaCLIFoMAVCaFkYtFUE3m/" + "iVt+319JOh5UyshMuWrAEW0IGGQ="; public static final String End_Certificate_CP_02_02_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1DUC4wMi4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAL/Src6e8qXwL+KJs5+v+JsakZdSDqMAFJUMfA2O" + "OO2TIqcvDFHzqesX+G+28MUwy6++ux07CD3FCaapgzBN4zO4RfKcamxFReKMKcEvNVVCOO" + "wO4Lvku1Sad14oYyGLOMzZwZFjRp8paaz5g87k70EOPBLeDlFMcch36czw53sLAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIPoHc2Sfk6XUwEwYDVR0jBAwwCoAIBvoP1E6PGiMwDQYJKoZIhvcNAQEFBQADgYEAFHhm" + "o6QRFdO1x1wp7Jb1QQAlChFfP8MrGVNK04Ur8f+wfkwIypTDifJ0AoFpjcM3Ohu9Ixvb9q" + "3kCSIWKDnWtDWw1/dN8mPL5If5gGqPA0+wRbUKVKvduOg7hKr4mWjKw7oYiaJuIIoN9RRZ" + "ejzltd0NEaODNPW/JaKeQUVgZbY="; public static final String[] TEST_5_DATA = new String[] { Intermediate_Certificate_CP_02_02_crt, Intermediate_CRL_CP_02_02_crl, End_Certificate_CP_02_02_crt }; /* * test6 * */ public static final String Intermediate_Certificate_CP_02_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjAyLjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCaJ7NcOvb22F6HjMF1R/AORa4+pKFfFfd9teXPpVWC" + "9InTq+alY11QaSj27Qg0znOIItmf2W/8Dub9sjnbg+SgAkoV5+CAkplodRNC8AbD4x8rh/" + "fioQ8lb0Qb4Dn9I0n2wjOgitmMRdE2uW4uwVpH52vsMyenbDVxVI7jA4NS/wIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIC2T+/BkG93AwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEApr6kDXVY5jYt23wC9n3LmhoxDoWh8cBQxcWmr1wpVxIrCbaP0/y00a" + "29wbewKfucUoh/W2OfjNcohjpKRrnVmOpi5vN7SmbZIHaxbKLzyQ7JwF17aznyCSZVrGpF" + "A/S49T5rlCm8KDBcc2ym7gRJzwUApbC0Wws4Pg46czrpQlg="; public static final String Intermediate_CRL_CP_02_03_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1DUC4wMi4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIC2T+/BkG93AwDQYJKoZIhvcNAQEFBQADgYEAlBFY" + "vPxhFYsjFOIfQkd7MwKIi7vgPgoWTP5f+QlI0ison5n4N3rYJv31hTZRRRP99JZce1hY6J" + "Qiv1OtkpG7VfQIhr0FAGxTNaJD6F6rLbGjG8cap4+VibFQf5gZv0XQcyW4akYiRqSXImYn" + "NVlNyaxiJja+5GA9XVqvWOjjz4o="; public static final String End_Certificate_CP_02_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1DUC4wMi4wMzAeFw00NzAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDIuMDMwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMlW6FOLwhRsKZM6p0ww4QEWjQzjpjYhKnz3BnLw" + "SdGZqMe4wzZnDWc/0eyDOMCSYXIWQhlDMqQn2zCVPbDKzMRkdEeRSvE6ghhYP/hn3ipjSw" + "D8QwaqofCp0sFkbDPke+xD2tMhLdUyNKynPjpSQmYtfoA98PD7so3cSAtrYuSDAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIc/X6kp7teCQwEwYDVR0jBAwwCoAIC2T+/BkG93AwDQYJKoZIhvcNAQEFBQADgYEAStub" + "g3DzhJgzYO+ZmRc0acldZGwZFm6F1Ckc1JzQDgVHU0bnCANgBcJj49UV2MwbNKPQdVzdwo" + "c91rfwrSY/PrvVQ9tUonZ28y/esFRBAdJTLf4u++p/gI3vfCvEXa5xVTIz1Hc+iKzAGKrI" + "cveDHy3ZZluQ3J6tbHs2BhnQFXM="; public static final String[] TEST_6_DATA = new String[] { Intermediate_Certificate_CP_02_03_crt, Intermediate_CRL_CP_02_03_crl, End_Certificate_CP_02_03_crt }; /* * test7 * */ public static final String Intermediate_Certificate_CP_02_04_crt = "<KEY>" + "<KEY>TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjAyLjA0MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDgZy2Xs5pIoJrT7GuagmKLrn8F9rj8p8w2wELorGhM" + "1HJMVOurH+o+y6RXd0oMGJkKNrhjEnbHKm3PBYiLgpCjVEcFNhQF1OOxJ7RdahvA9ifsuw" + "jV1TxTGq35jeaJYASRXb2TiNfzuPWSVm0MWr5zz+YB6NNuvjxwEBgZvNiV8QIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIWAOnkHkwSVkwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAMiHozz92EOhSXU/krwQVs0GNEWoAUH3LHt70Zr01dFzEF6QhA/wUa4" + "+V4XwbMob+q4zGnTHj+tL9ChGWi3NDGELQ4cN64OMPsToGKkepLy+sDwdm9LaUP1bDvPxd" + "v2hjlskJ7TEu4+6ltXSG/k36Jk8C0/I/ayNGbYcEcLyes3s="; public static final String Intermediate_CRL_CP_02_04_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1DUC4wMi4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIWAOnkHkwSVkwDQYJKoZIhvcNAQEFBQADgYEAVtCi" + "IocktnWOwWiaOc7tTUJvvH5+IYVyB/XhmMhF7cDbL292gyrnuh1+3+lHwZQBPoF9kzF0vt" + "WaweG7mDvYKxENQODdph/VcnypgUiFTWRTIPB1ZXfCTMWYf2QSalpHRDR4vVsqF748QbcG" + "E9mbzvLUz6NDA+Vf8wEwZehqSDM="; public static final String End_Certificate_CP_02_04_crt = "<KEY>" + "<KEY>x" + "FTATBgNVBAMTDENBMS1DUC4wMi4wNDAeFw01MDAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDIuMDQwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBALBX5GIQtvwswWwMDDPnphIk1rJSbcq7iClXLM2E" + "kgvBu+hbOzb0v9mtl0KJB71TWJCfwceVQiXc3Gk+YduujAbZRVTkROf9UOWD9bfrI7g+52" + "g4ms2n7evCO33b+kGEf4I014xl8dJDWtHK9Bhr+569RW9TzO06IeVeTD7whxMXAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIuKXv5WkUTWAwEwYDVR0jBAwwCoAIWAOnkHkwSVkwDQYJKoZIhvcNAQEFBQADgYEAiu0B" + "yR5Ru8qVsgRqkOpCvrJnkqBAImbbR6+BUYH0juRxxKzKnbFOjU6a9WvkKpEBB8Q2xLynPN" + "68ecLpnOynx3xj2sWWSVbsRKPy0iOesQblKrq3yHAm4lhzoWA8t1Xz29Ko1WxylDhyxGpR" + "QAWsyGVCfJFlsZE0ibw3erlWTnA="; public static final String[] TEST_7_DATA = new String[] { Intermediate_Certificate_CP_02_04_crt, Intermediate_CRL_CP_02_04_crl, End_Certificate_CP_02_04_crt }; /* * test8 * */ public static final String Intermediate_Certificate_CP_02_05_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "<KEY>" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC2d80bD1RounqjKizkZJYPFUuVWZQ8W2nZDkEp8qR9" + "<KEY>" + "5AWSRXqjJKJEih4VmPjA3vjQaSZSZJnu0DSnO82qWfu1ZUDlvIG6dfKJWRQQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQI3uNhI+QuI4owEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAG/+Rpk8dYrSFdaEO8Ch5tuvvKTOMi7W/DRA4B4xR7WyRJmosPB+37c" + "teGKVzqFND22Xc8xQH/b/nxYW08sCSLAfN0cRusoSWwWSRtPO2f9fyC/BqCy2B2kQLFNPM" + "Bk22jNFwLqPUeZn1UHN05RFAqVx325kpl2m1V7tw/mrXATI="; public static final String Intermediate_CRL_CP_02_05_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "2VGY4pak0kICONP/CKvamYFs5txJfR69AC5tEJ+Fy3PmSeHkLUZf/oc9d8EEyr0MsIjRHj" + "N4X4MquMlk4FflZcc8GblQK8LdXBK4Dy1SiXHA5GB3U1AmgzAzEQGwGRZnzWP5+rJ65upX" + "vksAYyPQmruRM0O5sElctPn6B+Y="; public static final String End_Certificate_CP_02_05_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1DUC4wMi4wNTAgGA8yMDUwMDEwMTEyMDEwMFoXDTQ4MDEwMTEyMD" + "<KEY>" + "<KEY>" + "<KEY>" + "Ndv2ma0Ugqm5xXq8c0orbnezwSp+tnzZZhG5KDNZr5+z3krCkqOGGzuUvVLqeJxPOLu7Js" + "<KEY>fZrXUI+Vg9F4qF+Ye81ivDrYVAEmalCpCyHOAKdvwkwQjRucifu90CAwEA" + "AaNSMFAwDgYDVR0PAQH/BAQDAgXgMBYGA1UdIAQPMA0wCwYJYIZIAWUDATABMBEGA1UdDg" + "QKBAjgph7BA5L7dzATBgNVHSMEDDAKgAje42Ej5C4jijANBgkqhkiG9w0BAQUFAAOBgQBr" + "MDMv9NWCTIQ3blMEqPiEyjiBhSJl88Cu797P4lIn+gc6E+0vZp61X7B2k5CHgsnxyVLK5e" + "bwl0bYAPKwRI9yzHLrj71RNw8HA7PCRPn1GNrtBBbIpLE0/sqLo51UPu/377+CnzYhIycL" + "tvS0KDLUTDSY/OowDcplF6Xwnt8cUQ=="; public static final String[] TEST_8_DATA = new String[] { Intermediate_Certificate_CP_02_05_crt, Intermediate_CRL_CP_02_05_crl, End_Certificate_CP_02_05_crt }; /* * test9 * */ public static final String Intermediate_Certificate_CP_03_01_crt = "<KEY>" + "<KEY>" + "<KEY>BAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw0wMDAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDV<KEY>lMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "<KEY>4GA1UECxMHVGVzdGluZzEV<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCuF8mub5cgUYZytrRjJ5Rhc2fgazGxWIj6EIKzeSpo" + "FwScItRX9KxnTIXEBTguBk7eQUsbN8yu49/Mlq45EAnemyZRBWzLFLYLPCco7pyTsWm7Ps" + "2FAGJ3vE9pC9xaZC+KrwF3Ho+DZNDwhj5InXTP8pChAIPfB8/7V/2mk0lN0wIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQI4mI6Ojs0onswEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAMVGzU6f4YOHpHla+YuGCjHOUZYrA9J25G3UFFoPr2JZEG+Fb5hRQUh" + "4S1qUQKXn6dpVua+qTJDk3Tg2N8OdIHG/gy0hvYHsxhLCSDQBsfPN7p3FClM7r/VHOqgAN" + "vzT+KYvxx6gwn6O+n7ERkrBIfkyrGFhnmjx3+VOCc9P4SDE="; public static final String Intermediate_CRL_CP_03_01_crl = "MI<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1DUC4wMy4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI4mI6Ojs0onswDQYJKoZIhvcNAQEFBQADgYEAfwYf" + "4kAG4srB2VxWimJs1HwXTaPDooellQclZ5hP/EluT7oe03+ReFef6uXbHt/xRdeaoQhJGy" + "SP8dWf6UIbL82oaSYqChIvAZD6zTMavEgSET0PlUsK1aEMTpMEtKPvedFSOTNBaMNvMzSW" + "t5xwurn63qyXTOxHf4m2L4w8+i0="; public static final String End_Certificate_CP_03_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1DUC4wMy4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDMuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ/ALaZ+MdNxKDH49+7jUm+17DII5QQEfjk8IaEU" + "syApOhsByOG06HPItiBEnnfDDxU5kjsZDtw/9LlouBocNXAJt+ZmL3QYyOgeH4SQ4f21rw" + "7j8fw57gUkP5oWhEc0loXr/hB92hoKbsBoRpv8F1zPZcPNLUnyUzqLH5+CeIibAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QI822isg/wPCowEwYDVR0jBAwwCoAI4mI6Ojs0onswDQYJKoZIhvcNAQEFBQADgYEAilIn" + "OD0iQrLrHRkO4zr9S9VXAJXJV3l9wfbLBweXM3q/zt4HGKBw4Wq1Yn+AfDxXrBtJA5hP5e" + "d7CDd4eM93yeKozdZCLNZfUM8sJ2/MRh07tvwJ19e2STklED8b/ndmr5my8H8jjJDaaYww" + "qTSnXqpcqsUsj+kV4Mk0DvVWT3w="; public static final String[] TEST_9_DATA = new String[] { Intermediate_Certificate_CP_03_01_crt, Intermediate_CRL_CP_03_01_crl, End_Certificate_CP_03_01_crt }; /* * test10 * */ public static final String Intermediate_Certificate_CP_03_02_crt = "<KEY>" + "<KEY>TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjAzLjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC4AbP8gDUUcIa8w4pEsGgbYH2sz08QMUXd4xwx691i" + "9QCcyWSovQO4Jozeb9JwtyN2+f3T+JqZL/gwUHuLO2IEXpzE2C8FzQg6Ma+TiSrlvGJfec" + "TlSooFmEtD3Xh6I6N5PM1fpyyY2sOOhARN5S6qR9BOuxkBAqrAT0fgqD2TswIDAQABo2Mw" + "<KEY>8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQI97nJCqq6+kIwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAWwpfh9oOOvj9xHS0zcczaUIHTkpjgk09I+pERlu0Z0+rHvpZGge4Ov" + "NDFtMc4TgthGcydbIwiKogjtGBM2/sNHIO2jcpNeOtNKLxrzD4Y0Ve164kXBu9Mmsxx4sG" + "7XUXZWgiOPfu/HmyPVdzbIReJdQO515SNx7JdgVyUkyhBxM="; public static final String Intermediate_CRL_CP_03_02_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1DUC4wMy4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI97nJCqq6+kIwDQYJKoZIhvcNAQEFBQADgYEAC9Hv" + "NevV6/Oz3wcgEbDgZYRKJRdr4OW4Es7R4ahjz3sH6GXZ1HiEjx2+frmp8LMshQ4D+hpjRk" + "drSPko1M4a/fQCYxbonZ0xjpYw067dwLmr56+GPJAxkzcSmFKXx+ejyQpG+9+qCR+zm98V" + "lop6besAaGUjZKnYShIQOfNzDZk="; public static final String End_Certificate_CP_03_02_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1DUC4wMy4wMjAeFw05ODAxMDExMjAxMDBaFw0wMDAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDMuMDIwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMJMiW+G4bgoRaYz2OUu/+PQ/yp4JgFOB3Vegf5/" + "vIrF4gsnoQxOCCsO5JTLrbS5fi3COjvM5w9/SZpNHtSfyWb9afmx4DdrT1bNjma7I6PCid" + "yxMzX4iTLeaMRnqBk4A+/0Wf2+4VzCqr8aViIiQ7u2JfZiTQ4dZxDoUW6G8lrbAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIEjny2GzFXGQwEwYDVR0jBAwwCoAI97nJCqq6+kIwDQYJKoZIhvcNAQEFBQADgYEAJw3T" + "3aL3pYbZhswgshOvJ9Y1qv65R6rClSxB5lqBw6+Qki4ZpW57NK8LwaGS03XzDUPaDi4/9R" + "hGCHpP24fIskS4n4jNZgKpGtt6VEVorUH7cOLNCw2cuwMlKbkyZnNdx2JqTMMlHzNJ3cmy" + "aX3F70IY0OZbwCKdUo/uMVC6hss="; public static final String[] TEST_10_DATA = new String[] { Intermediate_Certificate_CP_03_02_crt, Intermediate_CRL_CP_03_02_crl, End_Certificate_CP_03_02_crt }; /* * test11 * */ public static final String Intermediate_Certificate_CP_03_03_crt = "MIIClTCCAf6gAwIBAgIBFTANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjAzLjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCjLYKGKEMJgC/r0NH7vubQZ5qPEFEEN6QdLUWWqf/O" + "Yqo9hboQq6S8dFHp3DVR5x/4NOdNRjsTABbXsnz8U+L7+4CorhDhXj29weGMYIIfJ3XSIb" + "T7sE/GOPmXeGhrTv2zucI1j80sN5nTEoiGFm10LQqAgoyV46BxDltf3/D7wwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIhCIOyzfScpAwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAA18kQijoJebmTQS7n/q/fQx2iblOJaJAWQLHeGCCGqKxCjUpOxuD+y" + "xMspmTKdQqEkqQ5vpHdFYQ5MYuecqAdp6woWUNQGVd4HHPmHsAW3Oppwb0yLggYs8IVHjm" + "dNO1pYb+YYciCKBtX8D1OnedIRcrQmDMJUjbfmAEv/4b0EM="; public static final String Intermediate_CRL_CP_03_03_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>jBAwwCoAIhCIOyzfScpAwDQYJKoZIhvcNAQEFBQADgYEAk34j" + "SxMr8p1h1qJWlfoh4er9pu1AkkHujovan6Ctx89VwFdOS5Kw82OCvD+nmJAHrFuncNlClf" + "51G8FCEAFLhMNwic4WAxrBX15hcUTaWk8Wj00dfUFwjG8/Kv3QUCDBN8f3KC8/oBeORRX9" + "dHW5ei2IUKuD1ITCeIoyRDBxQIg="; public static final String End_Certificate_CP_03_03_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1DUC4wMy4wMzAeFw05ODAxMDExMjAxMDBaFw01MDA3MDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDMuMDMwgZ8wDQ" + "<KEY>y" + "<KEY>" + "0FbOPqpSaR+8pxZ6lweB45tkzLU3OZeAZSpGOY1UvT/htn6Ae8JQAVajSvYyfNAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIF014kOHikvcwEwYDVR0jBAwwCoAIhCIOyzfScpAwDQYJKoZIhvcNAQEFBQADgYEAdLMM" + "zGPPvBLgPbhn2tba/7HiaZaayHIxTXmpW0KAhP+8hwapOitrtLGPwqVtxQ3GoSMZJPMDCV" + "WsrT3OZm27G6ytqqNZ2ZO49UC7WwQ49TVlN79Ui9RZIBnRzlMIDNKsyuohfSRhFZTkWdoH" + "/y8ulY8k4xBThV8e8IRgtYj3nhc="; public static final String[] TEST_11_DATA = new String[] { Intermediate_Certificate_CP_03_03_crt, Intermediate_CRL_CP_03_03_crl, End_Certificate_CP_03_03_crt }; /* * test12 * */ public static final String Intermediate_Certificate_CP_03_04_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDbUii3czeUQ2zNlxvrhnJ0LcBGxCDHFr3xx+plDg3f" + "uasDKCY/VjCLEfQ5a2oqcovvGKsd2CPXbCFJtimW1R7Dvt+a0y95fppsdseorYDikiBlOj" + "ja6LR3Cz3bslYc133C+W/MKHMJ0tdvtTk+SJrq7lqs+iv/b/xHC3k/gDjIswIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIFNw3o1kc4XkwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAn/pr7/noYyjXSKEe/eLk3l4Rb6PEhNAnzySmxGkjIjWKAgh5IVYSGV" + "KFO/FaNOiYkRFHwXZFNj71q7gbM+HwALurN0Mr/MUA1TSpPy7YhFL0SWq3C3XsC/dVJ50b" + "HmTW+dGcxboX0h9HeKFxp3VyOY/dUut2oc+s/TnmqQII1CU="; public static final String Intermediate_CRL_CP_03_04_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1DUC4wMy4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIFNw3o1kc4XkwDQYJKoZIhvcNAQEFBQADgYEAMoJ5" + "jGE1AxxfluixG8Sk7H4W2rqSEkQyNHfnlKSMbh9KZA3evI8HGKGGfkbBNoe4/HauZ4NVFw" + "FXgllCp+TI8Qd+HafFoDv6ff1K7T86p6r7tE3AEM1XmbnfohP3/ivpIzustv/f2rqjxILK" + "Ldvrth2/OlNygwY+D54lcWH1DX8="; public static final String End_Certificate_CP_03_04_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "ANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuSL9tB1JW6JPUO2Xw6TMYkPX41lru3EPyYko" + "YgXy4giy6LGoqbgtskHehD22v3rfWjqOd9iV2PBio/vYE4zEz0H0n84dpnBvog6A1AlE19" + "PkQ1txjzIA52FQIRwRfZ38LaulQEfJ0a+fiRHQiM960O3YvHXV+GEbNcw4jo8b0sUCAwEA" + "AaNSMFAwDgYDVR0PAQH/BAQDAgXgMBYGA1UdIAQPMA0wCwYJYIZIAWUDATABMBEGA1UdDg" + "QKBAh9/WgM+UT6bTATBgNVHSMEDDAKgAgU3DejWRzheTANBgkqhkiG9w0BAQUFAAOBgQDR" + "I6PKUGg876/fSljtqxXCR4CoGAAurNFOcM4EWeoc6ZvuDOi3P7rNYiYAXXlmp7epOAgvZP" + "EV4vS16ODaJO6qIMR1YsaGEPo0ecT2pEStvP37X6pb5TdyjyKYF3586IN6TJdFMFsW/Lqg" + "tucl9bGlWmfTVwxTexq6+D8diK48KQ=="; public static final String[] TEST_12_DATA = new String[] { Intermediate_Certificate_CP_03_04_crt, Intermediate_CRL_CP_03_04_crl, End_Certificate_CP_03_04_crt }; /* * test13 * */ public static final String Intermediate_Certificate_CP_04_01_crt = "<KEY>" + "<KEY>0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjA0LjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC5UJ+KMj8tAmzr3OGYL2gSFcNTf8ik+ZVxlaPVGHyS" + "KjYQBAEbefhfg5Ps2aIuqBwYkbtFXuHif5GEhgObA4InCyESeRjYLGcVMqwSZzAOFAR0dP" + "1LzgzQs3ZgG9JX5MO5wEZ8IMnVN4Otu4XIlWSgIpUNS2vyet8Zi7t9fX+JewIDAQABo2Mw" + "<KEY>" + "FlAwEwATARBgNVHQ4ECgQIOZvfph4Uu9YwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAXMyscmGpKSLG3hQltMQLegy0+g5wzgOrbFOWxZmiVNR+zSsHDD3UAH" + "H4SyTozlooC0jAY4yAhZ5RX6SSJKx9fHsOZD9ldCmst14qLk3pkI+M0QiPBZkVTx5/7dR2" + "wGkuNKSVWH6woOq7BbEzpO7xMlrUr6tgHt4Dc6Evt1pVZls="; public static final String Intermediate_CRL_CP_04_01_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1DUC4wNC4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIOZvfph4Uu9YwDQYJKoZIhvcNAQEFBQADgYEAe79z" + "iEUgP/mvouJ9ufit1y4SjnHQWik75W65eGn/XGArRrBqJ8jZVJE4/rpDBbzm2V0hQoWU8z" + "zchZFlesUyqQZ9KUlT0YGR0YPcNw/V+58RonWWfmU3M2DvWDrXgCOXPm61+AYq4+kTowsG" + "0stmeML6NxjDzWpfAgI/MpXqe80="; public static final String End_Certificate_CP_04_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1DUC45OS45OTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDQuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAPiAZKXPjK8jvaNj34VynyKPK7dQtFysBPKFW5Y1" + "Bc+OMsyd2pPpQoJYcQTMMomlAqoBvSXUJCMNly/BxVuvn7l6I9crtx6PjBBUlEzdcsscaa" + "EaHuCCVl+Msnr66cSV3GqVGAhujun81+lyurcTEog3ftsohwbQnfA76qNU/N3/AgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIJZPDbf2xNv8wEwYDVR0jBAwwCoAIOZvfph4Uu9YwDQYJKoZIhvcNAQEFBQADgYEAZf4L" + "1RDHDXwwA2CgcIhM4CAfZ72CR2zOan0at38VVFB3u9vs4VLwFcrOQCIjDbdLijc0XWLima" + "4vCD1qrsv6Hk5+6113HfFNmD8mp6X5jAwoNPa/I4kmFOA8iIm4TTk7M75vQyCQTPG0VzbU" + "Nu3uwTbXKm5ME9C5MFMf7z347CM="; public static final String[] TEST_13_DATA = new String[] { Intermediate_Certificate_CP_04_01_crt, Intermediate_CRL_CP_04_01_crl, End_Certificate_CP_04_01_crt }; /* * test14 * */ public static final String Intermediate_Certificate_CP_04_02_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjA0LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCteErspc5ekSOel/wmjn/XQ0HUy4XzxB5Zj0nGn9FD" + "PbjF2LERCHOn5aBnIMHYhyr7PDynwbvSx2egzGC6wGe9Zrri1MteirQ9Ppw7062IIleloy" + "UAiuwvD+s0npKsvboarQsCMfOB1hOB1tGG1bjXP6B5B187SZXuR3KawggyJwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIUjnGp96itUMwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAR6fmN+9p5AWy/asEAiVBnbY9q7EQXyB8WuZK9FtFmupe3hlfcTq84E" + "A+TGvXOlNr05/1iLRv82GsWXDif7DlGVPN8CS1+0kb5Ve8Pmv2ziiWVREqWx916ioPjDRp" + "wvdGcCNC26+fyvv5TrP8uzojurl1ZlVRRqi2sIbopVX5r8w="; public static final String Intermediate_CRL_CP_04_02_crl = "<KEY>" + "<KEY>" + "<KEY>TIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIUjnGp96itUMwDQYJKoZIhvcNAQEFBQADgYEAZkXJ" + "aJG4QDE02wFURwaxWuv2VyD7m+N/2B0/9KR+6UKVpsMd2XHq+G3SlFOa6dA/fHUdhtUs2D" + "gpx3SfQYbcgKFrryZHqJDK230eP3F41S9g5XJTRaNR5iZvxvh4bmSf4l6a5MXsKEoBoJoT" + "j8cU4qg6j7Xk4NpIR1JbWiSIYQc="; public static final String End_Certificate_CP_04_02_crt = "<KEY>" + "<KEY>LEwNEb0Qx" + "FTATBgNVBAMTDENBMS1DUC4wNC4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDQuMDIwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBALM7mfq+hpLfvQdqZUJfIx/2gFcgHS2AsgZn0An+" + "Yn61WtG8K2+lt/a8aypa/q+J93RVkRYKWKFQcJHiRgx7DMlXElVnfQbSFuLX46ng4hqmQL" + "sSOKmXDld2BlyMZ41B3rfdhJT8P12RMR6uAwvc9CH3b0UTcsc498Kj+JeaRbzxAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIo7S64S6t5nswEwYDVR0jBAwwCoAIUjnGp96itUMwDQYJKoZIhvcNAQEFBQADgYEApNT5" + "Y+9Jc28m5Qwjm+/8SKk83iCPnIW3BsAvQUB9Wmd1+kMZvqLySQjm1tBBbcGYuSERMJ2Et5" + "eoTdL9B6EG2CZYnPqu1vk0TVugRxs7IJm4h5z4MCInf2g1KTt0AMEasQW6ZTj7DIkkU48Z" + "EKLPoBGXfD9t9Y9cmdj1e1RQbog="; public static final String[] TEST_14_DATA = new String[] { Intermediate_Certificate_CP_04_02_crt, Intermediate_CRL_CP_04_02_crl, End_Certificate_CP_04_02_crt }; /* * test15 * */ public static final String Intermediate_Certificate_CP_04_03_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>0SMEFsFKtE1C+9O7ODtOUCJA/6ECeXbyj20SbG1E2oQrZe" + "gkcn7IQDUgnuedzdFj4kTevok6ao9hycg+qeZrL6oeBD2XQCd9nqMmzhihNu/QOSnp5wID" + "AQABo2M<KEY>MBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMA" + "sGCWCGSAFlAwEwATARBgNVHQ4ECgQInx+ELo31rJMwEwYDVR0jBAwwCoAIq5rr+cLnVI8w" + "DQYJKoZIhvcNAQEFBQADgYEAriYMoRDpSPI4HWrxN1rjqWIzggz8p1wpbEFgK5o/Fi2KT3" + "jCd6bfCcIFDpoXNqlsc+dvzc4XB1Eg/Qbcror8HP8LSxrbFw/y7VhC+wCaDCmhcqQn3rp/" + "WaOWnR7/H7HlKM9m1u7MBtwlxHINnLKwPHIA1XwmAnItAXIL2yHRJhU="; public static final String Intermediate_CRL_CP_04_03_crl = "<KEY>" + "<KEY>" + "BAMTEiAgQ0ExIC0gICBDUC4wNC4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWq" + "AjMCEwCgYDVR0UBAMCAQEwEwYDVR0jBAwwCoAInx+ELo31rJMwDQYJKoZIhvcNAQEFBQAD" + "gYEAvJgOX6tewnRbC9Ch+Fe4KjkB9IAhe5anQKGfnDHuLfga6JEjOzyfhonWZeppJwvYpl" + "1rZbsKICNphMDkd/eaWnn8Q9w02ah4kzIb0LuzrNBrxpFv9AAidfGU2VeF0gRi02jtAZsh" + "gUNbrdC+ovA8mAsBigy+HMzCi61+wrumwvo="; public static final String End_Certificate_CP_04_03_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "/xa6Ihf4OmkgKjpHNTWOIFXeRJ4sVgWuH6cqQ+6GL+0fa1sed1crsEgTTAGYNhFi6ebwID" + "AQABo1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR" + "0OBAoECBNwCFdDgPCqMBMGA1UdIwQMMAqACJ8fhC6N9ayTMA0GCSqGSIb3DQEBBQUAA4GB" + "ABAjSPg794yiVz9RqdNxic8TGnApNrZui/vwr1U8ZkETZfx8W1fWgQ0z7KjryML5IOmvps" + "zycM7by6jb2kMmxI1SQCwjiNQ1fb1osrNAj2bRfpp2YgjjbHx1XkddommtVc0V8kvyQBcb" + "7NdxfbwKr8AtpiWTWIajc2uqUlELsLzr"; public static final String[] TEST_15_DATA = new String[] { Intermediate_Certificate_CP_04_03_crt, Intermediate_CRL_CP_04_03_crl, End_Certificate_CP_04_03_crt }; /* * test16 * */ public static final String Intermediate_Certificate_CP_04_04_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOQ0ExIC0gQ1AuMDQuMDQwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOFf5hr4R8IqTp53qQSiBEjOFQ3Q3ICcafl+FLzm" + "K3xIFqERjyXARsTM4gDQ9yntFeNp2TiIi98xBrz7D8TlrbTAmxO/PUfAQ68tXpz9Id/XrU" + "WeAKxMZULPL9nPFcGQoh0qq3JKpFRSb3Iobryfysblm7cCDDCJOI7uK14XZtTFAgMBAAGj" + "YzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMBYGA1UdIAQPMA0wCwYJYI" + "ZIAWUDATABMBEGA1UdDgQKBAjior7qCuLBljATBgNVHSMEDDAKgAirmuv5wudUjzANBgkq" + "hkiG9w0BAQUFAAOBgQBhh55gTy5htqjxW1Ch2hRrRikhBH7LJz1PmDuzwiIOtnWL+EiQOY" + "T6h3NV1j8Kn5S4KhUOrhnvrPXRi22HdqRzEPl7y/wXm6G0XcgYlyy2ofZKdYVWCVStKAMW" + "5SwV2wC5RPK2KphdhnlEqss6QVRUsliDDjnf9Saiey9nzJAfNw=="; public static final String Intermediate_CRL_CP_04_04_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNV" + "BAMTDkNBMSAtIENQLjA0LjA0Fw05OTAxMDExMjAxMDBaFw00ODAxMDExMjAxMDBaoCMwIT" + "AKBgNVHRQEAwIBATATBgNVHSMEDDAKgAjior7qCuLBljANBgkqhkiG9w0BAQUFAAOBgQBI" + "VlXD5FnIiO8tavLJ8qo/qRhbBNgUbFBdAgAY6yVnFNP6YN4qPineYPN6NV1XdqNDrZh2Nz" + "GHzX3YDo1Uv9yABVR0NvXCaMIW5/raqZp/on6bPuQLgJe9UisOPKunzehTm/NmO1RW9dwU" + "37UzC0XnVHyVipDVh07DrTKBUtQJQw=="; public static final String End_Certificate_CP_04_04_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "A0MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCegy6qOnM14CS7+enBElgh2DLtF5bn" + "ah0yfA18/hbqnmUaWOWJQllyXa8QFawnvdXOOEXJm1ErIm3rDYihkbUTP+ybOBH9dprWtl" + "1cSGL9CkoxwzkJRLQTu5xG72EhET3S3kwqZsmYbgy4MduGKv9VGFbv75Wr17Vo9K4Lz6QK" + "vQIDAQABo1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQ" + "YDVR0OBAoECEc4b3BP059HMBMGA1UdIwQMMAqACOKivuoK4sGWMA0GCSqGSIb3DQEBBQUA" + "A4GBADj73jXpPLev5crwZIoXCJd/nXXp1fJzEEbByWggsR9cFHN4wnp7N6gpIxQbLQwjmo" + "cLPC1pHQ3A5VHVrCbxAk6nifmSvnKFWHTBftZGpfTGkrXbURFF64T/CB4O+JXr1eBUGheN" + "Q0T8L17UNgi3oBENKjASWnpjxvD2QrOnH0rb"; public static final String[] TEST_16_DATA = new String[] { Intermediate_Certificate_CP_04_04_crt, Intermediate_CRL_CP_04_04_crl, End_Certificate_CP_04_04_crt }; /* * test17 * */ public static final String Intermediate_Certificate_CP_04_05_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOICBDQTEtQ1AuMDQuMDUwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMBsWmrcKH0J9bkI3zHthZ0S3904f3fMUSasY5qp" + "7CSQ0sbXTwP947sfAPK4Dso6Bpwl0WExRCdFHd6qfY9wR+NtfuI/DkFEY8WveoqM4Vskpi" + "cutWghCx14PiPY5YGFn8VvXu7wbuHp4TnHtUCMEUt3EfYO5oqm+/I8y0eTKMNHAgMBAAGj" + "YzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMBYGA1UdIAQPMA0wCwYJYI" + "ZIAWUDATABMBEGA1UdDgQKBAjOoKlp+BfGqTATBgNVHSMEDDAKgAirmuv5wudUjzANBgkq" + "hkiG9w0BAQUFAAOBgQDLhQ/RJFqMDNRonAHZ30DYyphf8do4q6ARikhhXSSa6G2G/PzbpS" + "x3T+3G8ot+NnFhtf9ZWo7KfwmFEbUA/B/X2vJaJbNImkMDT1aTY5sPXtA69B3QKQVz7HST" + "f5XH6DjuoV0/m1M153A4vf1Z783dOPw1MzOq19t+6tYFeELEHQ=="; public static final String Intermediate_CRL_CP_04_05_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNV" + "BAMTDiAgQ0ExLUNQLjA0LjA1Fw05OTAxMDExMjAxMDBaFw00ODAxMDExMjAxMDBaoCMwIT" + "<KEY>" + "6gLCdPQw7Hisnr1i3QbD7GybqfD6b1s10GQ3c/j59RYDe1Fk47Srs9ol/baleasWjcdt8M" + "SlTc66KvK9YPFAqIdYoOW4FidpJBF/1cvSc2hGYwVsxLnXKr9CJ5Py5vBCCjovIRiLdzoL" + "ZoteOKFIEHkV7V8V2OTFawxpW9hkiA=="; public static final String End_Certificate_CP_04_05_crt = "<KEY>" + "<KEY>" + "FzAVBgNVBAMTDkNBMS1DUC4wNC4wNSAgMB4XDTk4MDEwMTEyMDEwMFoXDTQ4MDEwMTEyMD" + "EwMFowYDELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UE" + "CxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5nMRcwFQYDVQQDEw5Vc2VyMS1DUC4wNC4wNTCBnz" + "ANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwZsiUhXiFHN9dfJb0Yyy+rYtV8gx+d0+8WkW" + "5C68nQgSqqk2uSTpvZbx0bpHF+s+LKppj2M2tt/AfZgVQHTsp5rO0IftZE2iLwqejj0rYU" + "Poprq1PE3vVhs818ZlDS0PTUP97YxLysQjq2jS/d/9lF5pS3sMlP4Usp24gXX0vG0CAwEA" + "<KEY>QH/BAQDAgXgMBYGA1UdIAQPMA0wCwYJYIZIAWUDATABMBEGA1UdDg" + "QKBAjpC0ZvCXrvBTATBgNVHSMEDDAKgAjOoKlp+BfGqTANBgkqhkiG9w0BAQUFAAOBgQB7" + "YwJWcx+PU1sUZUOVleoB5amHFu0GT+Hy7cRa82UJMHFkz0bmnyEV8CBNcnn0xa5iVfwe2y" + "5ZKwy61DLR3MPTar9eKITL67uZag9w+1tnIf594XRbEiUzn20uxuDFX3oPoZCemtWdVanj" + "2T+9TVQKfrp15+qzOCObNNRHZw29EA=="; public static final String[] TEST_17_DATA = new String[] { Intermediate_Certificate_CP_04_05_crt, Intermediate_CRL_CP_04_05_crl, End_Certificate_CP_04_05_crt }; /* * test18 * */ public static final String Intermediate_Certificate_CP_04_06_crt = "MIIClTCCAf6gAwIBAgIBIzANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "<KEY>BAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQD0t0dfe82Su58bJdn4dh7E3OCam1AUPTzPnt7DwT2w" + "1XwD76OCUYP7SBBjsLYDDfUCb2ek96pSK4jpzyE6/4IOtfObe7OW+iBT9YAB5WeW+SmvEO" + "TIX+xo13sbz6rG6j9svcOxtth98yv7mxzV/ZwTNBSO72CcfDXIIq20TVunlwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQI0AufZEn1f9AwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAbfhxuNBYizxfMZNcyiN61j+7LXZZo3SmMU21UmOhPBTmdTbIkuVCI+" + "F1jSWdu3eGShVNJ3jmkidDvojMm+E8ZZ1YGHYfgeG16dDQudaGUjGmOfYzzlkFmsaf0paG" + "4y4sBerPsZCmhN7BanGh3qYPFvadSmp3OapGfEmDtS+BbVQ="; public static final String Intermediate_CRL_CP_04_06_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1DUC4wNC4wNhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "<KEY>CA<KEY>" + "W6K69twJZnHx6CoIMs5+P9DrJ2yKHptmntlOCTSJirC/xdj0Zv2k5FW84VrTtdCSZDT1Ce" + "4Dh69fT2sUUexJb/4IcDtzloiuASSJzKWCeVIj9A8e6+coNUJVKtRKRX8bHJ5Un7xpFrY6" + "t1hdxt8gUecAAdXEFGuZ3QEHHN0="; public static final String End_Certificate_CP_04_06_crt = "<KEY>" + "UEChMPdS5zLiBHT1ZFUk5NRU5UMQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1RFU1RJTkcx" + "FTATBgNVBAMTDGNhMS1DUC4wNC4wNjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "<KEY>" + "<KEY>" + "W0cmlhp9xRy5a3HWiJATD8yCKY1psBgnrOpv37sdtUX4P2kf668HrYOaGo365fKPeT5Wjm" + "gp0pL3sXKNNsCuJPd3wKAXGHAi1R9arZFYPsKJlfQl1774dwAvzxSOMr5+pbnzAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QI33MEYdo5YX4wEwYDVR0jBAwwCoAI0AufZEn1f9AwDQYJKoZIhvcNAQEFBQADgYEAo8Ge" + "ADBoJFEIRzdO37uasuyIBhClTUgyFhEKemMBN6aelYeiJMX6FZIL3DgZOce4dg7Zg3Ak/w" + "B5m8XlGQLW9xIbpEzY/Iq9kr+qK6k9YmvtcOiHFbnudCFNZngTQZpxjiDaj4eA48uqKIxs" + "51taC5gOv9LYWPnugN8TsUUFZ1s="; public static final String[] TEST_18_DATA = new String[] { Intermediate_Certificate_CP_04_06_crt, Intermediate_CRL_CP_04_06_crl, End_Certificate_CP_04_06_crt }; /* * test19 * */ public static final String Intermediate_Certificate_CP_05_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjA1LjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCshocJtyGsxeEd2ouVTVKp+HuhDjnDk9eXtaLQIKaB" + "7aTODHYbq1mC+1LO5DmRV5PBVd8NuuCA+1DmzFrfYl+nMCjjgOkC0//Gf9O85Hi/n21q0T" + "F+oVa1j9fc7nAgLIziexaXrflYSbaeNWkwHHftGUninKPuNGM2re0krEeurQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIaUi/P20o4LcwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAWBLeJl4qlAPKxmBM5QZ2JYsbCV3VBeYGAKQ+4L7ehS63VQMCwIjBCI" + "LaHGIFfCqecDNd6cpYIArdx4tY7X2/Zxm3j5ocngpI1Tv8zydQcFeraILglsHf2UZUuK/N" + "6jKGjwL68C8YwmA+u6ZhcQFD2Xg4wSMC/xxzAs9zEAQGBPo="; public static final String End_Certificate_CP_05_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1DUC4wNS4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDUuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAO9ODA12Fky/Md5AELkaOvOwB31UlfZq3SHAOvs0" + "Y4NYoA7Q5KDIwW8RNzMSKD30z51VlgOAaBVR6HLo6rkcWB4wGiV7EPelewdSOdk72IrnYR" + "npJEm2KEuLkHB+gejgk+paw8CejxMsrvT6loN8Pz0btBKxWaCfknTIyXVyQsolAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QI5LtSKs/inGMwEwYDVR0jBAwwCoAIaUi/P20o4LcwDQYJKoZIhvcNAQEFBQADgYEAOMrC" + "38uzHckKMkiawXhPUHtDQfyR7bLweS2qro7GyndfxPpeMJwjzVxqvQBtMuHON+al8jyXpy" + "BsEryV6qvdFC1vczLzJHAJZmLe5np27zQIXOObsyYcOG+aPq727/pKoD90DAlBvrxNW0ox" + "x7citflEYpmOEv9Do5xiO3MuCFw="; public static final String[] TEST_19_DATA = new String[] { Intermediate_Certificate_CP_05_01_crt, End_Certificate_CP_05_01_crt }; /* * test20 * */ public static final String Intermediate_Certificate_CP_06_01_crt = "<KEY>GE<KEY>1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "<KEY>" + "<KEY>//<KEY>" + "Pbvpb5mkhLhqDZBSX3KQL0YiJ8p81tmdvRQH/LbFzX/3OKBTUfV5imYy979A2NEb4otFp6" + "EDSskZhttY3d2IzUICoCWUXhObnmkHJ2jEc81bggFkK5Lir1m/tKq2IOPFJQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQICIAmlz6+Cc0wEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEA0ZvIG2cnk32p6uxqGw8Bu40NrfHu9gNkJL5MhDHJXA6OxU5BX5bWZp" + "LnKXLoHiqSdtEdmy5cLZw3kggxndxjsnRFMyCawaYupJBhlgquFbuvBtA8rMtkc5H4zudP" + "ZcOcvXu7Xw58K+1caSGURL+A6uXFPnMUBd1+k+ejbtO8Pto="; public static final String Intermediate_CRL_CP_06_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "hM7bm+SoN7KzXKufQ7C2ONoAwvoPZgnoidg7RVECxUByD6AJu04yd2wCLYRpCfS2tDtXLh" + "HEDpe+ELwv35pbkCMlCO2u7J+Tc="; public static final String End_Certificate_CP_06_01_crt = "<KEY>DVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1DUC4wNi4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtQ1AuMDYuMDEwgZ8wDQ" + "<KEY>oGBAOh7lUwMRet7t/ABI6mo27CsnRzQ64Xx7f1dqxrJ" + "NuuSRslVShaWnwiGHjc+5/TS7Urfj9VO0dseBCzPsyYFoIX1q7Q5zlArwy24qpXTGMmlpE" + "GByzi7jkXO8w5+wqh3+8RFrQQzr71zLtAVV/qPUyleuF8M8jzkwfPvawunmwdLAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIayC0PPU9zyswEwYDVR0jBAwwCoAICIAmlz6+Cc0wDQYJKoZIhvcNAQEFBQADgYEAPz7b" + "UvaEV7Myjhe8LJO/soj84X71rvVPtBPrhYjWTJ6p69GCfJRyho3vAUIt8RFal1GFb72c45" + "DQGkcVzLLJw8cDP3ajtWac5HZ9dNPJkW+Kh12l9gqjn061XAjQ4XnbbwQDYCuXhguPE9v3" + "kzDbimwVwIEOB/4SARX37y7TUWk="; public static final String[] TEST_20_DATA = new String[] { Intermediate_Certificate_CP_06_01_crt, Intermediate_CRL_CP_06_01_crl, End_Certificate_CP_06_01_crt }; /* * test21 * */ public static final String Intermediate_Certificate_CP_06_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>T" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUNQLjA2LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC/IejV3DmeaLW8OwMfAGyr5+8NOxM1C+UBYslbOfWj" + "KUGdhlX6TxFc5AOJVJBpS/QjeA+RWoUCxnxKb9QSlOrBmADrcnGz8zV0/c0JDLaU3oSgsV" + "EWZE0SexBVWrKcl1j7wN0RuxMeAp342/YoyvBwea3VeqJkmSCc7Y2TjruWEQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIaHxWOdHsLbUwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAuzeq/lqp0qs62krK6EA81Silhy42l/KmynE3mVu9GPBgQS0BUDi7+r" + "QQ+m0UxYElzj2SNO4J5aBYeC98lVJFCHX7QE8yVOoPBQd5rA+rrz4HD9QoP7glxTqLU6Tc" + "9VFd+iaFpqsVtSh2bxH2BtUB2ARgebTklaNl5VPbu0+yc2I="; public static final String Intermediate_CRL_CP_06_02_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1DUC4wNi4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjAiMCACAS" + "oXDTk5MDEwMTEyMDAwMFowDDAKBgNVHRUEAwoBAaAjMCEwCgYDVR0UBAMCAQEwEwYDVR0j" + "BAwwCoAIaHxWOdHsLbUwDQYJKoZIhvcNAQEFBQADgYEAYGaAzVoUdlSZ3uGKiRPfHAFIoK" + "T79hNOvtOxaGA0aIek9OypDrDqYAh/s2jsXSheL0pr/v9WRIHvtCt7ytXDxVyn4Nxjpfv7" + "BkAMMiccdUx1OH1VElTRkmmtMe7ROzUeHUGzXJNPex1Bc9BvSChH18bWYckyOZdYJBjctC" + "KJFgw="; public static final String End_Certificate_CP_06_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAK4D9H8JxeIrFuOmx0cSkIYNS0p7cDSBlcc57Na3" + "+1k7lJD7mE9ZP6/47YsDVK2bwe4aTKCTXtPk/kGQ6bsLswJXbyW4k4+f5LeAYoXgbmZXjA" + "WF+BKIl8uKetsqC3HkCeqhBaY1AGUqef4oOAkakEP+1jYFumNYtMaB+9x/0ncBAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIC9MiJNI71RMwEwYDVR0jBAwwCoAIaHxWOdHsLbUwDQYJKoZIhvcNAQEFBQADgYEAo/ib" + "mIxteityjZlszjCc/s7yM/0snL78pYpMOZ3P2TPKkYh2Th4+Bw8JqX10+M/zwFBj5Bw7Im" + "zCIRfS3GFuKmcVcyHB4OZLMcQZtXWA8GOZ94YvWq5TBINlVtThQtusQj15KBq2TJNNFUyD" + "pBdvyo05AnEsRY0HbIQu6ZhNQ40="; public static final String[] TEST_21_DATA = new String[] { Intermediate_Certificate_CP_06_02_crt, Intermediate_CRL_CP_06_02_crl, End_Certificate_CP_06_02_crt }; /* * test22 * */ public static final String Intermediate_Certificate_IC_01_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjAxLjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDDOu1J/VIzbB4VcS2Dwf2fsHOmIj3iatM8y61V7CrN" + "RCxCWTJ1Os8e/mFWOi/zN+0afizA0UzJDTe8L++/RlP68IFg5Ju2OhXqQC3HbUZmQ7ve9g" + "QdWTfur3oEJV6/XoVE4WG0Ic7D1p7BENb3LUT+8MJdSboTvAggA1CiOI6zRQIDAQABo1Iw" + "UDAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBAoECP" + "RyRiSV+4XrMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqGSIb3DQEBBQUAA4GBAJlmJ9EW" + "9ujUosqHZyZkniu2vX8VOL52OnxtLxw3LqxLyuxivjyYCaMAaJNr7/xfm3C2ozh9mQyZTQ" + "6TpBapLFUH8QsEKUhy57MDUgIvZsyOvvjJh3AXfSkXDaMZ3ncLg6x0wwjN/Hxu9i+IhX1W" + "1E7/5foGx7AEVfwY7Fo9S82d"; public static final String Intermediate_CRL_IC_01_01_crl = "MI<KEY>IBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wMS4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI9HJGJJX7heswDQYJKoZIhvcNAQEFBQADgYEAV4DM" + "F5gU8MZ6E/mnjAWS+dIRKUBJV1GZJ+hOysdbmK1hD0mj5Pd5qTzlcvLjuatIoIsB5DCpYd" + "AcNRLVvF5EJFhVjqsPzRlfUZth0Xqa+U/DeHjVxHxYsLEOSt+v2bLkbGh88SmOAk6F8xj1" + "l7YIfPX5cIkUBTVZlsUt51slMXc="; public static final String End_Certificate_IC_01_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1JQy4wMS4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDEuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAPrk1fosBu0hemIKgTDCeV/RoFbbsm02X4LfZonX" + "KeGRGYZXz4tpWgbNpjKBq1e/2bOO1DCn9I8I2kjvZdOkabk4MLeuRDo/sqlNndu4Ar5502" + "pAo4A2V0QLR4IDHAJoDpxtSFrqELOiiyCx9O9V19ywe5pcBFrxVEWDqTnBUeDJAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIbI6BhABrmQ8wEwYDVR0jBAwwCoAI9HJGJJX7heswDQYJKoZIhvcNAQEFBQADgYEAYzYy" + "M0wbzNhZftAWz7TfFi64uA9WmTmd4MeK9vga4ChswT4H1zlaV1Sr+3hqpGmOoP5AUd9XIq" + "O/ui+/gFaeuOLI+ATmK+V2KHGAneMwzcw9qbXRc+xZqGGjbXMb3Bowe3qrj3mhyowfa1n7" + "x5xB7XEOqO6sfWxLdDjLVo4sn88="; public static final String[] TEST_22_DATA = new String[] { Intermediate_Certificate_IC_01_01_crt, Intermediate_CRL_IC_01_01_crl, End_Certificate_IC_01_01_crt }; /* * test23 * */ public static final String Intermediate_Certificate_IC_02_01_crt = "MIICkjCCAfugAwIBAgIBLTANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjAyLjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDemJgZnOzXOwNGqRA3Xq9aMrAWQU4oFuhSELsEYfLZ" + "<KEY>qCn+rs3FjR9N94cu63TduOAgqlXqrNbvyO1+SF9m35JXreqn/OS6KrK6c8W2I" + "pDAWJcr89nGyyCXMoJeaOOtj8m2NjZblmCZvtAl5UMOew73GE7Z5fE+jtA2wIDAQABo2Aw" + "XjAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSAFlAw" + "EwATARBgNVHQ4ECgQIhT9GjaaHj68wEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcN" + "AQEFBQADgYEAWhKJUujLapxpz/DoD/w48HMzkL6UQCxQPOAjwwHicX8wFcKmcrWLVBdVC3" + "0+ywrzMraWhaq+QCOqsgtxCwTZrfUxbCNqhKS0lZijCMgNN4Jht+PAZ22tzEsw7nCwiMM2" + "n1jeKF/3btoDEUvZn9SuzhkIyxy7Q8l2tbNOsANqpxE="; public static final String Intermediate_CRL_IC_02_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "oS3F1KMpcVBOC1Z6P5N20TYLCCHG6KETlBA3Rjf8ehNxJKJW0lGd7qHpVHp4BGvkSfaOAa" + "OrC0G59wjDEY+Ci4QS46OYzBcHXMFX5HF2xMq+y5SfQnyV6MQUVVkxJRjgsTLrYwP2JaYm" + "BK/zExhqQgPfgcR+56swBPXqogo="; public static final String End_Certificate_IC_02_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1JQy4wMi4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDIuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBANbTVeAxOibAO3KGqxxY3VqKXDr9tKJN+igpKb4w" + "goR0ZnWGDusSVm4pvneZ9qfmi8A0sM0E91+B2hAwsU6Y9RoA7nPsTkFYi5F+hHGIF46Op6" + "8blGrZraGf9bsWXCZFoLoxcgltwjGPQqyZ5mnnm8cxUbtaWmgo28MK1yBH/sS5AgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QI3gkBNo/SISMwEwYDVR0jBAwwCoAIhT9GjaaHj68wDQYJKoZIhvcNAQEFBQADgYEAQGl1" + "7uT2xxYDks6HolrQIpesIoPqEiZ8TkizEBuLG3sUKsC7klHwy2iyVvA6nRUDwf/XzDLpGW" + "/Gn0KTW6ZYIX6snOC1+7HX5OJglQx8tDpDvcAgyocK8PvCrHfu9o33J49aSeLAVpoCHwne" + "tTtJxVfTMmjYWKeDbHHHi8a2YTI="; public static final String[] TEST_23_DATA = new String[] { Intermediate_Certificate_IC_02_01_crt, Intermediate_CRL_IC_02_01_crl, End_Certificate_IC_02_01_crt }; /* * test24 * */ public static final String Intermediate_Certificate_IC_02_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "ccVuIzGxzOneYsO/<KEY>" + "JEjnlHw+RvubdGkonWzUNJFbY1GA24J3no2GZHiLPgWmGb1jsA8Ag32MUrCQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIKx4Ybzu2PaYwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAotGeNFzmktvcxpCRcpuARHkv1lW+LegvbDBnSPvGnr1+Cn9rZcuLup" + "u8ex6VJ7KWtgWBtzdOelerO6ytfWQ67uNpTOuc0SDdk/f3tCagdx44LBVQywuq/Kj57ZuN" + "jpe4J8UPZSBFFK+P3gTX3S/lIKsDi6xjRnqFLSQYGX2XiIE="; public static final String Intermediate_CRL_IC_02_02_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wMi4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIKx4Ybzu2PaYwDQYJKoZIhvcNAQEFBQADgYEAOfuX" + "wRv4skbPZAbOH/LVXdc/cA7vCSTAnWecN3ZKm/eCsxbyRxqn7fcDyHmqg5H3Ac5UOlMHR4" + "FMe0Dp+Yu4Xg8xg3zRvE/3M/5jyRILGGi7olh4ikkOMD+UlreysvYvUX2MVP1iM9qAkXh8" + "E8n/LZIlABN2GGkFEMRMJA6KTXg="; public static final String End_Certificate_IC_02_02_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1JQy4wMi4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKogqWGx9EpJ/<KEY>" + "<KEY>" + "VcZMyF5mebm5/GZekMOjbs8P/zbLdrlu1D9CZWZMXONYitdluSg2moMGbewS2NAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIP8N7OmNGshEwEwYDVR0jBAwwCoAIKx4Ybzu2PaYwDQYJKoZIhvcNAQEFBQADgYEAwkpF" + "j6Kv+OcKrUtOgnH9QddB0Ej0oU6B5/5Hhhf3liAPKtllDHnhUj6nqfh4APNq/iqYFOkKMR" + "RUZoaj6kakJNSOlgvRIiQfuFIgv3CqLZnhr85YFRnKgoluZE1pq3TvunoiKyJbCjbmyCos" + "Rd32gVcJq024xvY2eVBTl6tfn5A="; public static final String[] TEST_24_DATA = new String[] { Intermediate_Certificate_IC_02_02_crt, Intermediate_CRL_IC_02_02_crl, End_Certificate_IC_02_02_crt }; /* * test25 * */ public static final String Intermediate_Certificate_IC_02_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ<KEY>CS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC7LFt+yGItQFqSEPi03ICIr5ydWnFPQHZdEMNu2tRU" + "3XiOpfam1wl0xgAPGBkQK768OfidpP/i1hgYOU/isOB5dyALscvIQ9XJG1OWQXBBLgKuCb" + "MS5fuDhBNa4KiFuGMbJ3/UjluRsD9qaXwGUavc436JwbRHvW8FomaBYYY1hQIDAQABo10w" + "WzAJBgNVHRMEAjAAMA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSAFlAwEwAT" + "ARBgNVHQ4ECgQIPsBg9tMABhAwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcNAQEF" + "BQADgYEANZcayTTX+FGhtRUJ+XuYA7jR14CJL6qTHPvdSMgHNw9mGXI/7sO5I4v1vayOCI" + "YQ9luBvrTYlMPmuej8+bhM8YTYpiiOjVFANwvSKArI9U2CAGBcoBMXydykkm8qYw4gtYQT" + "neiOz7VqI9plLWA111IRMgayD3CAt4Ntpzd1VSE="; public static final String Intermediate_CRL_IC_02_03_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wMi4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIPsBg9tMABhAwDQYJKoZIhvcNAQEFBQADgYEAVeQi" + "tT1FRUaJlhfpkfjZr6VHmvGnqYapdo4DRT/pm8tsp1LbZZXpYW638ztwgZNgeBRPFlcb+x" + "8naQjEkoaYzLbCYfdY+PPVDv7ym15PE48Kve8ImvANY0YnTGS8pcKdK1dpNKBnYYMOG9JN" + "+H5K/4cSm/WMCKIuKdsiAWFYauE="; public static final String End_Certificate_IC_02_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1JQy4wMi4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>lMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDIuMDMwgZ8wDQ" + "<KEY>BBQADgY0AMIGJAoGBALGbo9yEujZ9RFU+Vmxb5+Rx1VdIG/3E/5hXV/xI" + "OFu4mEfYh2tBhP2qIMH2KbrR1tiW5t4DvTCBM3NKKqp75wpiuu7E3q6imt1pLbGW13NVL+" + "81gYWXnCnzHpxYjMTIqqCkPIAeOG+SBJ1MgERbL+NBl+AK3WG4TeQ8vw7r2CGrAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIS/HbII+ki/kwEwYDVR0jBAwwCoAIPsBg9tMABhAwDQYJKoZIhvcNAQEFBQADgYEAWHy4" + "sHrTkqY1XjDBY5XpNEyhP6htcnjYD9bos4wjxPlJUyxdIWACWrLDE+R5iRCOYsh/nDAJEt" + "CUcVASukvP6VLJaFjyxUOaCp6JCVV+txk7Fh0S/Ur3Zyysfp5LllP1plOA3N/k1Hliljp0" + "+bnSiDhA1+3hJh0gDMjWUdRq9yM="; public static final String[] TEST_25_DATA = new String[] { Intermediate_Certificate_IC_02_03_crt, Intermediate_CRL_IC_02_03_crl, End_Certificate_IC_02_03_crt }; /* * test26 * */ public static final String Intermediate_Certificate_IC_02_04_crt = "<KEY>" + "<KEY>5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjAyLjA0MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDf5u5ouGQlQmdNfc4ell3RXKWmtq+ar9VKMme3kp8D" + "cbDbUaVwlvhWTkOKxb9I208wfGG2nQiArezIwutlASf7sWo16EPapmGdCF+rp1dpjAPBUu" + "fruEyCZ8nu2ITD52wuPY9OAcKHQE2/bBpCJWkw97fYX6Q9PPW5uobWoUJtOwIDAQABo2Aw" + "XjAMBgNVHRMEBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSAFlAw" + "EwATARBgNVHQ4ECgQIjDm8K5YcGakwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcN" + "AQEFBQADgYEAEQIJeZj/HE3HvjjJV7PdU+2Ze8OeCYeeWDocxrA647xpeOksVXBXKmq2OV" + "NqoFk7YNtlSUqiS2TlqjGqLtKYetk7a17qS/8EIQct+H5KWdvkLkYMkfIAAMJvJZHPGxEv" + "j+oVPAi9FITRbFdN8Jvdo9MAuU2q8d2x8MF236RmEds="; public static final String Intermediate_CRL_IC_02_04_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wMi4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIjDm8K5YcGakwDQYJKoZIhvcNAQEFBQADgYEAV5bX" + "7WsT8sWeA0iQ7V/+ZQESDzvyHA7Ziju0iRsvTL7qOVF/Nl5v+zND+ZNPhdJDKEM/Q0lEaA" + "ybe0E73NMmM1qRX1daAwE++jHukF9TMeNl750HJaS667H6jcjeRrHUJDD0+AgqrZY52dL6" + "CPM3V4QSvdfc1/xtKmNIZWSSoqY="; public static final String End_Certificate_IC_02_04_crt = "<KEY>" + "<KEY>x" + "FTATBgNVBAMTDENBMS1JQy4wMi4wNDAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDIuMDQwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMW45d5dPrzUJbuRIDeQ5gIJRYxi80PxPvxSmJe8" + "ScG1A+l75SAtgLGWAxBqxPSzL+teBBUsnmf2Xsc8/qQHHev74uat0lxq9YrZ3npLW2YNo2" + "CfxLK0M7F1/bhkHK2f9ttIvOrrKI67BeEjfACULdJEhl431uWINWV0pY+fHq+pAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QII61NnUvgvjYwEwYDVR0jBAwwCoAIjDm8K5YcGakwDQYJKoZIhvcNAQEFBQADgYEAjwgL" + "6qMnnqUvNspsDaYpPQzTCqXkqshZhsy5G/nLk621H/YbNGlnZ6asHGljYVYMzjmcny16y6" + "ntiv9QPB7YorAx27WT7pQPFla96s+nM/rfwWHPWI6QGDsquPriwJm/MwQC+1oDXEFKvdIL" + "0urejfd5hgiXYbRRwMI7km97iHg="; public static final String[] TEST_26_DATA = new String[] { Intermediate_Certificate_IC_02_04_crt, Intermediate_CRL_IC_02_04_crl, End_Certificate_IC_02_04_crt }; /* * test27 * */ public static final String Intermediate_Certificate_IC_04_01_crt = "MIICjzCCAfigAwIBAgIBNTANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjA0LjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDBtNwpr9LZBF2LRtAp9Tb1FZnfM3b/Jv2sdO5zc/Bk" + "sO4ByUgY+Mux9dEvFrkVWBK110TvXn+dj+85TuboILv4MDKlu+tI/rtuadXGwwDIg8TQnz" + "uyC7LWhxM5JZs1/Is+sPKUY4PTCHs3+EHPBWf2tFiP3l6ZftkySEiL6+2LSQIDAQABo10w" + "WzAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSAFlAwEwAT" + "ARBgNVHQ4ECgQIbMuZ73onuZswEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcNAQEF" + "BQADgYEAhaTSc2xafdP/QceMm9YJ/rZJ5gTgBR/SlmKQwd2BclHabG+Fozdg4delDjtRXS" + "FKY3sFWBFZHVeprh4T93Oj6IVA5X4DIuUeBpprtS+psCnWZxdtcUWmbyYQwZNCifG5C5D0" + "lRwxlMlv40xT2oCM1zPZpfmqemBDUPJ2OhkCjvo="; public static final String Intermediate_CRL_IC_04_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "Rztz1AyFnFr1KAlbjLLwxtQplf2eIc//zUkDFVUHtX5TrEC/ijUaItjdkOoPGQfpnL0w8x" + "wyqWndMh593QPCqIJTtv/iACoiJNZ90ZJS0adcdZ+AEmQpa0Zv0e1JOqRrPoAfTq4HrOfR" + "vhBwhvKQNtTExupW/EBudznKC6Q="; public static final String End_Certificate_IC_04_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1JQy4wNC4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDQuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM2dGkraKGdIi6EXxAu6/ekMqDloX5YSVBGh4Hp2" + "faujr1u4j8Lp8afqjngRxFUpTqGbqH0ETgm4cVPXmc9rUvUzYTMdxTUmIZ+iW+ULZEvzNB" + "712kxRPCD2kDFN2fH2ai8miXr434w+weLm8VQN4jJGo4nswhSs2w1gsUmWyn/ZAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QITsLx/sO1edwwEwYDVR0jBAwwCoAIbMuZ73onuZswDQYJKoZIhvcNAQEFBQADgYEAeKft" + "0RM8/b3zQodaKrTdWiFyLg5fzoOsTecSfdFPXoqz9J5ejLVkvJevSmfXJrIUhKXySzsQi+" + "GazuTh/hvWjwUTIvmupi+EiFudnMpXCro8bgi48+NkepNjXvjsSmOfzlrK3SxtpH5dqonL" + "6LHjGyg+Xp0Nor1m5g1rLHyrcEk="; public static final String[] TEST_27_DATA = new String[] { Intermediate_Certificate_IC_04_01_crt, Intermediate_CRL_IC_04_01_crl, End_Certificate_IC_04_01_crt }; /* * test28 * */ public static final String Intermediate_Certificate_IC_05_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>aBg6lnWjpFQ9ufeTOia3+lIUqn+Ypf" + "<KEY>" + "csBV7Ze9D+sVw8w/LtT3ZPcvM3Vju4d+c14Ip/8pC15jlgQPhwVQSf0x3V2QIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBAjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIJ2DFtxoQnXkwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEASvdcfBOh2d1dC10pGLZLI3T+oSPCup/U9riynIR3RxZsIaS/+Q2s81" + "oeg++WQV6pyYvCLneZIp0efvqh5DThNV9lhBcJjlYwm/T8Hi2IaRGsSMwIvzrFN7zxA/zu" + "tW98wigAKM2myk/nlYxmholgbQkQ7ZxYM3lD1TDRl69N66Q="; public static final String Intermediate_CRL_IC_05_01_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1JQy4wNS4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIJ2DFtxoQnXkwDQYJKoZIhvcNAQEFBQADgYEAK7Ym" + "Y9PjX5CpVewe2E9PNxj3dLYElghaQyapYoVtNq3jDqLMWspdmHdNdeaQoXsjlSJe0Zy8xH" + "ZvpimwifnFZ5hq4yByzHjzNMpcA2yFtg2MtPWGEia+BmaZYZi3X0lR+OShKpNLFc4CfVM/" + "aWG6W2BulHjIAThZhTg3uRekDzs="; public static final String End_Certificate_IC_05_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1JQy4wNS4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>8CzRZnMsUtt+bRGqCKMEJLUIIstWwGg4SskXWk2m+nDKm5Ai6Kyx4nldpgtgQ" + "xZSEwNcwRhpy7T<KEY>dZ7aWw4bXVHPK/lnOMtOaJbFDq0sL<KEY>" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIiXgrRBVcDf0wEwYDVR0jBAwwCoAIJ2DFtxoQnXkwDQYJKoZIhvcNAQEFBQADgYEAhyO6" + "SP6brWDDKZwdQGULno4Om5+DuilJKamyEcvSqE666z1KhvOCdLicqwVa6tQiAL6akrt5Kv" + "R+TT0xqHR4JGosGLGolvK4DLrMeD+PRK7m1a+nJl44luo5Mn48HrKI7jn7n8Lp9bNdCHvr" + "NHaQksCIR/Q8xoucPa+8sCTVSj4="; public static final String[] TEST_28_DATA = new String[] { Intermediate_Certificate_IC_05_01_crt, Intermediate_CRL_IC_05_01_crl, End_Certificate_IC_05_01_crt }; /* * test29 * */ public static final String Intermediate_Certificate_IC_05_02_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjA1LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCrtIYqo2Is8Cd6Ld+fyWC755oA6hQiiruooaR/6O4z" + "ikyhOUztnHkOGMF5H4CKWafwwVrfFtqe7iop3N6AToEIpNlJLVy3cj14A/IASVYSSNFeHd" + "O44Id1NWhPiKx3paPTWslMEdKQV9BlXb7gu8pQpvqTa/38hNQ9vdil/4QZbQIDAQABo2Aw" + "XjAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBAjAWBgNVHSAEDzANMAsGCWCGSAFlAw" + "EwATARBgNVHQ4ECgQI9P78RavuWW8wEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcN" + "AQEFBQADgYEA0sAEmWBYSazUav6RtuNFtZgNrlQ2i5i138VzRHoF/kq/CxeR/lINQqgJhC" + "ZlUnlslUuM86g8OQGlR8SS0Wsi0MdCQCtPCKA2hStlTx9MMux2IZAGoyHy6P95UE9qINHE" + "fYZUYjO9rh96fzNyJ5Oy2kJdJWdhFXtSh3BSOe0ZD+Y="; public static final String Intermediate_CRL_IC_05_02_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wNS4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI9P78RavuWW8wDQYJKoZIhvcNAQEFBQADgYEAlPLh" + "+CMqRcbLgUKEAL2UlSY5tjsF8At0hf000kec93TnBf7f1NKYVJ5eyeoh/WK4s+k4paAA5E" + "/P2C8JMlGXNTrqKZXMy2zIlufE1ymXAZCKLOLC5ezXRSpwIsBWxko2nfw8Bz/mZO/bCSCT" + "nDwkH8BJIbFV51vJFlyyOmZnCz4="; public static final String End_Certificate_IC_05_02_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1JQy4wNS4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDUuMDIwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMPsWBfT8HqaiLnoUCPAFniq502odL4uVqzOOxkx" + "evZtjh7NaFlRjuYjTofdkj/IAgg7lkkBEW3auK47Td3TvqnHO401PqvOFNTlbhr5wDLmXS" + "WWcR6XrvgYL3Z3wx15/z6eojcSgu07kdvKqzuLzcDs+noG8lbcruokX0A186pVAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QImgomUTkzwbEwEwYDVR0jBAwwCoAI9P78RavuWW8wDQYJKoZIhvcNAQEFBQADgYEATAEq" + "YVV0iYdYomPqxbTapSCJFAMQO/WZhN9brCXP88+jRfk6cAHzTodQOYTOAVe8YXa904505e" + "RA11NNTViP3s/AseGWuqbWjsom9mbR+tVkvufGqPQtm1JhfLgR/68e29AI7tj7zIJyFVYD" + "nLRXGwMGnosqSHDle+WYyfok6a8="; public static final String[] TEST_29_DATA = new String[] { Intermediate_Certificate_IC_05_02_crt, Intermediate_CRL_IC_05_02_crl, End_Certificate_IC_05_02_crt }; /* * test30 * */ public static final String Intermediate_Certificate_IC_05_03_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjA1LjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCajRjoRNL9HFTytLLx7C8WYouW0uONGsrtGS5tKMiW" + "oLlQUkohqB2a2PhA1InNGQqnbDtNdqKbR1k6EzD6MyegvXK1sXs0ZE8gt0LZYio7Xp3k+Q" + "7i4Rk5iTruAUrV8bFMYmeIXHXL/9rl5LQV8YRp/Ut3Bg3VECzfhQG4EavMlwIDAQABo2Aw" + "XjAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSAFlAw" + "EwATARBgNVHQ4ECgQI9041oiwvHsgwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcN" + "AQEFBQADgYEAYwGYwLsA/kxYZG/RM+kvoH+mUebrBVZRBxjovYsYzNznD26fssjBFfiTmg" + "zwZJfG7MZRsgDSRsS+bxuTlXMVeGRKH8fVj7PNq05sS18QZQOF0CCKzg9DLkCzkzkEWBxc" + "5ersciPrL90UarOIPIJWUxQ/5sdMS/wZtYTU34rNNWE="; public static final String Intermediate_CRL_IC_05_03_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wNS4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI9041oiwvHsgwDQYJKoZIhvcNAQEFBQADgYEAJHTp" + "k+RRsD0dUv59J1GQMWjQTjVz39Xaonx2sk38WHcrHBB78L0W6Skjvt082PwZg32sb7FQBt" + "boAQ3PIKpXMnFnkjnkyaFihrnMdfa0abCPtQhFl3yra+w+1a2RDjQBZOOdq3xlFcLi9unT" + "YYome7eS93wchIvNWFpgwF5A5XY="; public static final String End_Certificate_IC_05_03_crt = "<KEY>" + "<KEY>x" + "FTATBgNVBAMTDENBMS1JQy4wNS4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDUuMDMwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYxdSZq7qRBdPOz6H+l0GGAtymAWTshfZZCubHK" + "lQjbVq98qudORfhCOZgOy83j/mo2KAecBhxaxB9YA5ggWNAgaKtFvknvjFemtBCZwt6cVK" + "8LCyUGKzStwAV1+HSDlHxdWo7pRwP0beXFvFECrX418osGt6E/v7Cz++ZtvaDhAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIgTuCLfTVa+QwEwYDVR0jBAwwCoAI9041oiwvHsgwDQYJKoZIhvcNAQEFBQADgYEAQRuC" + "rAx9zzu9QwOq9weNit9PNgFHBpo3Gh9jPVYGJjOQxeSqqou503xi82H3W30FT/3ESCO7IF" + "hfpr/uQZVEmUQnvDsVwbKvED1QF9qkTp6ILk38ITJJgfb+sdSL3bsUeNqVXd0C9wzVoErc" + "OuoCulwkZzfoIOlO2YAjAnR1nUc="; public static final String[] TEST_30_DATA = new String[] { Intermediate_Certificate_IC_05_03_crt, Intermediate_CRL_IC_05_03_crl, End_Certificate_IC_05_03_crt }; /* * test31 * */ public static final String Intermediate_Certificate_IC_06_01_crt = "<KEY>" + "<KEY>3Zlcm5tZW50MQwwC<KEY>wNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "<KEY>AMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDmutL9PY/BLXvXMEDQLQnWE7dCOsrLNvJiuSjDdznF" + "vBz6WS/RqUr9zsDFknpOWB3Epo2syV4ZFto+v4VWNo61uaClIEsw5x1y0saG<KEY>Q" + "wkpvLeRZySdCydKdE1rptYR/JbHvPo5TU4mxOo6L7JeEwAvjSI4tK4rwJ4MwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwICBDAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQI1BB9j6Jyny4wEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAajWMbY8zL8jS2VUjCPBMuIjUvBfy55+92EXg5pZnyNNwN1diZfJFiB" + "rrPWEg3Fa4NMLgaDKWZsYkOcDDo8I+Qb9FsU9LphCzQ1ubIEuxu6KPX9X29BscFOxUnZCz" + "yuzVfadACxi5Y7Bz5pN5LfC/jEb2iXjkdN5Rm8AqT81syIo="; public static final String Intermediate_CRL_IC_06_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY> + "mgACT847PyufmF1nob9TSqBj+cM5ye2bgv83gTVd3B1Gopr75Tnu4iP10d0PpSXjySWCjB" + "0HPJ7BdxzkKxSrcM5vcb/jLdk9PqMUS30ohexsx1xK+E38pDJdLX4kbJ3E62AgyXm9WQlD" + "9xsDk7TMXwuxHT4fX070HL6lWGI="; public static final String End_Certificate_IC_06_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1JQy4wNi4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>KVhpmhABNXcOI5tiRNkeDlV2zKCBXKC" + "wFi5qkhrE8FUCP0hL8YzbybOrYZYSVEP8GgIgMSQcTvhN/Tor0o1jdJvRLmevXAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIFJA9XGd9UZUwEwYDVR0jBAwwCoAI1BB9j6Jyny4wDQYJKoZIhvcNAQEFBQADgYEApRQC" + "OTU9cp16BHM2n0TdZThgj9kSAQ4wHk/dKNOjYNEWu6n/GQ0alxy1dyRzpsr058FOvft23Z" + "Kp0YhdKG/7F1hkcoNvC2yN+Re44n7S+F/jcEPTWnOX6h1Nkw8OS7Uz2fZ8t61iHjqjX4sv" + "M/cKP+AkC8g7p2tfdkP1fQ6ww5E="; public static final String[] TEST_31_DATA = new String[] { Intermediate_Certificate_IC_06_01_crt, Intermediate_CRL_IC_06_01_crl, End_Certificate_IC_06_01_crt }; /* * test32 * */ public static final String Intermediate_Certificate_IC_06_02_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjA2LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC0JoTnPaI/HT2eAqCW1204nRNjcA8EQSp87tvHLpWy" + "5aafmxeJxvk5V9Ba7Ye8eY8yX9losbNUpHJFNdE46fD5qp/oS7Cn3NXA0dwIDQEn1X9vaz" + "nqtZtMjt1S/yGv2xDOb2LKT9zRrqSvxGszCHFUBcJ4HDFJMAdhXPUZiLyXVQIDAQABo2Aw" + "XjAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwICBDAWBgNVHSAEDzANMAsGCWCGSAFlAw" + "EwATARBgNVHQ4ECgQI7j2LO1CcsE4wEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcN" + "AQEFBQADgYEAfXIh0oYlM2pagAWzTuYqTl0NavtfqibPgolvhgIG/XmmjswHOg/JVCLb7O" + "jIYtEG2MAD0xQXwu0mc9Deufed2embP/wc0qVG7rj7lxUq6p0aMQJNndBw4m9KlSnjdzyG" + "lwE9pNd2BgEeD516J2k7dspCZHDw3qLer4i2JYoCo2Y="; public static final String Intermediate_CRL_IC_06_02_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wNi4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI7j2LO1CcsE4wDQYJKoZIhvcNAQEFBQADgYEAJej7" + "23qVtwkcvCTPb6afTosYMnVppPXWbtvqn0N5mAFHQfE27x1YPOXOQHBrpQuTyiUdUmPXiH" + "xMKbuR5o2lfdQgew9hbYVk6GegSu+DBC1JKv2YSTgzgRAlJfyByDZ7mbJwZWHVHys08oGk" + "adG6zstavg5EkEeRuAp47T+7cZc="; public static final String End_Certificate_IC_06_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMkIzl9+NRTZf/xaA8noiHRt65Zo6Zp57YvCKUe+" + "YfoC8koMq12MBgrc0IyIfJoqEDEMfD1WbitZdGZMQZ7D9BP2Bk09NXLEAAuj+waFhYk0bW" + "vHBH90O7HpMGmxwHmzOjDV3JHYsU8hq77/5gRFDNRkSCJe2A1Maj8Gcqi6tYf5AgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIYDfThEjNL28wEwYDVR0jBAwwCoAI7j2LO1CcsE4wDQYJKoZIhvcNAQEFBQADgYEAJiHT" + "CjLGZK5Lyw+7ICDHs3eS1OGJH/wfsLcBP5sLER41qJfrXGTl2XdKvBMIpriUmJYzjkjof4" + "bvS/VPDNlhI9AJadicW8LM4L3qpy7/YV4Dd/C/BJphJ6cZcT+hjaRKeC7gQVjMeC/npu/p" + "jLgIgzf7HC4WYnaS3h9oYl0cMJk="; public static final String[] TEST_32_DATA = new String[] { Intermediate_Certificate_IC_06_02_crt, Intermediate_CRL_IC_06_02_crl, End_Certificate_IC_06_02_crt }; /* * test33 * */ public static final String Intermediate_Certificate_IC_06_03_crt = "<KEY>" + "<KEY>TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLUlDLjA2LjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCuUtIYFbVjg8VLLUqIEQ6r7hjTaqYVs8DJnJPHUWPA" + "JW9HEIV+d6hj/so76Bff4KJRX7MgoXbvq4ivmn8656N7YSGk9GPuJ25SXK7RJyoqzG/x2R" + "AVUCx/wG99VXVDZhd5ZAVBG2JCkHImsWAei6/Tz8UgXmmLBM8rZNJ/hNtTBwIDAQABo2Aw" + "<KEY>8EBTADAQH/MAsGA1UdDwQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSAFlAw" + "EwATARBgNVHQ4ECgQIpwUlwG1W+sMwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcN" + "AQEFBQADgYEAqJhUfgar10fl5qG+oH34s/JS3ku0dRm4cTQvqUNOWA9ALnBhSkmOpoMMzH" + "sE9FXXcZ072a8/ecpviP04X5mt5QSLreh3hPVvgWv1LiZ9YkS4Z2kcr+3Gx7zj4gQgT5vG" + "QPpbIBAtBRH5xNHIYQsk6kOe2+t7b0Q82Wnj8UoznmQ="; public static final String Intermediate_CRL_IC_06_03_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1JQy4wNi4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIpwUlwG1W+sMwDQYJKoZIhvcNAQEFBQADgYEAKCp7" + "ViY1cajXpbjCIqe8yo/98SQRIxoTNgp7EUaaV17FeHZ59nJhRtsF1XnLP4cK0lPBkKFhHK" + "2XyDEWx2hK3X7Z3lSAtn12WFJHOP5T5i0DmYfMJYAFbuPD0JQEWCM3aYsgbXKbbFH1BURh" + "L/uy3arVBP4FaJB8gH678K4J1p4="; public static final String End_Certificate_IC_06_03_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwC<KEY>AOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1JQy4wNi4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtSUMuMDYuMDMwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBALZw+GpvdleGlmdqZ/zEO2DUGhwgrsselBUNnEzR" + "bcuzr5O1WwiG6aLjrPxIXeL1wLS1/u9AD9p3CQU0XFhi+bEI9+LLnt2y3707O+AQxy1PnQ" + "6qmYE4jMwqDGHn8WVanN2joFT3isLH5wJD0Jh74eoG0tqCHUyOiXaZNo78qgB3AgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIJOeyCnvfJtAwEwYDVR0jBAwwCoAIpwUlwG1W+sMwDQYJKoZIhvcNAQEFBQADgYEAJbz1" + "RipbW6uu7B+f2Ol1iq4AVOUuET2S9vi9ojReyAIka3q1XUceZCm5Et0KqpOoOLiu8IRuNB" + "bvKwRcZ4hcVEXv5bRMqaPEK2B0VrRAV/Llj5A+RGn6yc1ZdkJeBRhoSsaHn5whfICaiJX6" + "j3lMpo/CiMRViL+gZLU3SdKqvdY="; public static final String[] TEST_33_DATA = new String[] { Intermediate_Certificate_IC_06_03_crt, Intermediate_CRL_IC_06_03_crl, End_Certificate_IC_06_03_crt }; /* * test34 * */ public static final String Intermediate_Certificate_PP_01_01_crt = "<KEY>" + "<KEY>5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "<KEY>" + "7TlvVpxOGqLd6lGdbelbSyAzut1i8lyYn9NSDR0PcyehCSS+MsKS2uNKsTEuH3mlMK/7C5" + "B1qggKqE8f7opyl9+U+Qyi1WQj01gY6XYXaCxksCB0Oqx2737d7QWMvl15dQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIO1U69B4DBHQwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAcHWV4Q4z7C+IC4bWgIf1+BzkszCN+LSb4JquR7GgICESbwF2JzR+xL" + "7yoKvB/NBcCqtMY4Hi1DHACbIGJwRe68vVHzz4CmYEK50UUCbAtiAiy9Od6wwrTyFyacBd" + "CBjiO6mkFEp6jOsoIgXRfxK4kDNcMkGUUwMbSR/wZKFuImc="; public static final String Intermediate_CRL_PP_01_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "3eascdtI6iyWFtBO3r6tihtkkSbxocN2Rz7OlR4rW9VwuUirxP0145nMd5CEL03/CNABP5" + "zUo1bNgswHW3z/RaH6h0j0yTkbo="; public static final String End_Certificate_PP_01_01_crt = "<KEY>ADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wMS4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDEuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBALQaTS1wvv551g3BP9JYBMM+KXXLzxtOwPlO5NR4" + "LwuJJB2WuO4vmbn8AG35in/0JqwjZeroLQvbCPxZseXsyA0+7cMO0qcjRJ5l5WdFsahT6g" + "z1YW8pYYY5i2eDUkIRsM7roHMiNjt3zpkuUGX0xZQfAxhuWnRIvlGg5J4r7UOdAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIeyLSANVaTpQwEwYDVR0jBAwwCoAIO1U69B4DBHQwDQYJKoZIhvcNAQEFBQADgYEAvZ4a" + "SQMNl+Q++D9yVaGr+37XJyxs4yow5e5YM9LXn1qBASQ+GNfqPWoe2cPCPYKj32yulxyFEu" + "RHrbhpEQe+nrKWJgO9W1bmfwgQDin29ne/JCQPlznhd3EPFvCkmPLnTyJmSLR6B2VxvndM" + "GO8JEbj3KCf51uf3VnC/Qj11mX8="; public static final String[] TEST_34_DATA = new String[] { Intermediate_Certificate_PP_01_01_crt, Intermediate_CRL_PP_01_01_crl, End_Certificate_PP_01_01_crt }; /* * test35 * */ public static final String Intermediate_Certificate_PP_01_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>BAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjAxLjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCkQQXRO+dnU2v7EbaqQNmfPD8v0s5Wa50hl9M1Gfr5" + "5nuVUZs/RI//1VksTNrW10MVh11nsxpA/XRPntEIbHiH1OoECd4dnZBiA/2xEueM02fTjj" + "fb/t7g+pr9dSU/TzCVZDVWFBcPn4VNz7BBqIrTAOXaJkyBZ8hh7vyiE1Y2VQIDAQABo0sw" + "STAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjARBgNVHQ4ECgQIoTKVlZ8YCR" + "AwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcNAQEFBQADgYEADhtnd6ifr6kyfC5D" + "UWuAXLtoccMj8Jaur/1YT1DgnH1XbBsEeZwm9Jkzr1a3cXPIHgaHYgXvBeGUtZ3XhbCSGp" + "8U6clJz3lm3qKPKkb5rdDrpdTaPnEJJjS3C4ZK1L7UZtQga2Enlelm5vIkhjsF3Sexe1kY" + "mzqiLZZ8yLxJ/Tg="; public static final String Intermediate_CRL_PP_01_02_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QUC4wMS4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIoTKVlZ8YCRAwDQYJKoZIhvcNAQEFBQADgYEAn94u" + "sT8ZYNzfHIdnx0+fV0jglL0Kn1duz+ehKHow+RGqH+J9opMYuXVD+rVQnLdZl5LbFBcv+5" + "TSP9WR9QtyoXar4/jmY2FFdBjfgO9w7p7OHD4WxblJmfPVOvrzFm/slZE39Oe5Qn4KlS03" + "9tttEFTKDH3qREQbT6g4k4ExxYM="; public static final String End_Certificate_PP_01_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "eXxI9W15eXm/aqrKiXhULB+oF9/qNeUi2fAtrURZ7hgHbTaswr8CZ3Uwc6Rbkyj2GGiM6Z" + "8sKFztYZfFyGBiNEwfTT0yaUUQ6etIFqPuL/6qLvqXmvNPxFb9gjTH/azs/MdNAgMBAAGj" + "OjA4MA4GA1UdDwEB/wQEAwIF4DARBgNVHQ4ECgQIW1/BRCbe3c0wEwYDVR0jBAwwCoAIoT" + "KVlZ8YCRAwDQYJKoZIhvcNAQEFBQADgYEAPJg24q7wCU8CVlxFLchoe7txhkzApkVMIJ9G" + "+QTnraHDn0CZS6undCsJw8mrTNBQPHFn2Ixa5lrPfJvwW4Med1bcJKbwR4TveL1WeYYq6+" + "9k1kS/7KmqyKAKC/s504jAc7qgMd4b08oLxbGVfFVjWG/ZMbO770FrsyRHHs2rTOU="; public static final String[] TEST_35_DATA = new String[] { Intermediate_Certificate_PP_01_02_crt, Intermediate_CRL_PP_01_02_crl, End_Certificate_PP_01_02_crt }; /* * test36 * */ public static final String Intermediate_Certificate_1_PP_01_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjAxLjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDL/XgMvoeszcAzZqMYnv1At5u83Gb/CEX3fv6O1jL4" + "W3XbdvBNIZpuTwQhTH4Iofk9rIuQdkR7xOmbk4AqZINuas3Y1CPdzss7teraK0CNralNl1" + "jPYK+ClDBHt32Iw3bAl7RqWX73hl3YH6/7cvG4XCo1HqeeFFHUGa7HXGXq9QIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwAjARBgNVHQ4ECgQITMu5Qbn1Cm4wEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAuCnzXbHg87PIYYRbCCiXKDKA3MOcEKuxpNaSbtm12DQWpnvzmaK5nB" + "D/Ebko97CS7u9Tpwa7TmTyi39bYzY0dmVaotCDzfSTpzw6qHZl/w8riS+cKr0mimnjW1cq" + "kGPyHf0zBBqh0liGbd7EOLIBln0ASrn8V+G4Tj0Q6aQVcko="; public static final String Intermediate_Certificate_2_PP_01_03_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wMS4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjAxLjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCu1Fq+gBJsBf5EjKKtNIxgdtgPMObby7tKH7fTJxYE" + "5LPyPi/IiWQ5Mi/8BCG3zmQhu9ZdBbpal350qCGVTbaMlnpi98D4WwXSw7e8oHIJIK689p" + "Q6Z5cf8hgwPnwDpYLeEaqxwhd4bu0x1lG1fUISA0ZZIQaEeNSJfdh15IkAswIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQILRhQwULcyPYwEwYDVR0jBAwwCoAITMu5Qbn1Cm4wDQYJKoZI" + "hvcNAQEFBQADgYEAlEVOqXcdeTU7wT0l+/BJhlG5iaAcanAsOaJFZsXPjLMSjhldQe11/z" + "BsrrqjcpdctcmBarKO4MnwqVU9DN2RZ/v5Gps6OcPxj3T8wlrCGe4l6s9d1FncBMJ0RAUe" + "QEn2JLkQW5JWRBQ00+RXJYFuIM6Ger2MipWj1oOciv9MMoc="; public static final String Intermediate_CRL_1_PP_01_03_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wMS4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAITMu5Qbn1Cm4wDQYJKoZIhvcNAQEFBQADgYEAycux" + "rzvy2IiYfFkTw7QgGuBhxIQPbSIbfudqyUumuviHJkIMZpPwYj2wltjyiRaozrDAWq8mlc" + "PsFYNr2lUYN5Cj4BhNQCNZlyBw7LLdzRgza55zVjmYkHWedyZm3kPWe7Y0w8xc/XIvi3iC" + "qlwV+X85cgHNJarx3GEYdb7Yos4="; public static final String Intermediate_CRL_2_PP_01_03_crl = "<KEY>" + "<KEY>" + "BAMTDENBMi1QUC4wMS4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAILRhQwULcyPYwDQYJKoZIhvcNAQEFBQADgYEAbcjU" + "+8l6pSik8PcuIzWndAg/w8uRfAgR5W9hPSXZChlx7uM+48wK98DGEXuTkJcbeclZia+Mpi" + "J5u3qG1zhoL1aHr+RqyJrjiWKC4/rDBuiUk/ftU54mrYn0qev3aSjf/GLtpcC8kC3gpqD+" + "20bvxLjBG3Vc9ZrxDvzfj8cD9K4="; public static final String End_Certificate_PP_01_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMi1QUC4wMS4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDEuMDMwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMO0l0+X6jfT8cY4DumtseTryyIJ7h+nraogXmYo" + "uhFGvMUWEAZVGD4x9QTTVEL/UCqNfzpI//Pp/uZpDudSgOX0ZdAbykObqCAEO85msK+eie" + "8baS1cW1XGjCuWDqNZko3Uo3c5lLPlRMbZ3hjvA1zmYh3prYnOh032GZAArVcVAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIMh2aWvtm0mgwEwYDVR0jBAwwCoAILRhQwULcyPYwDQYJKoZIhvcNAQEFBQADgYEAigVE" + "FlCgbgKLR9FWIiwnz1bZ0MKsfhytllCI+jGx0Q3o3CxCGXs9PvL6BPDdMOxNIT/oU2uG64" + "EhZEjcZCnUknGx9OkkSSVq44P/pGuUx1g4Kx4i8gsJ/UPrPpYv/3heuMcKWCr92l33cxPT" + "IU+kmAtqy0MBvBKL4p635+MSIVA="; public static final String[] TEST_36_DATA = new String[] { Intermediate_Certificate_1_PP_01_03_crt, Intermediate_Certificate_2_PP_01_03_crt, Intermediate_CRL_1_PP_01_03_crl, Intermediate_CRL_2_PP_01_03_crl, End_Certificate_PP_01_03_crt }; /* * test37 * */ public static final String Intermediate_Certificate_1_PP_01_04_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjAxLjA0MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC9gxMP8j4L+ISffY9wkislQ/V5sO9LzZOncYK93lZf" + "HXJG1MPSQzFPNzDLSc2zsilA03v6q+zr4NRrRWwWGmB34NGM4aqkoxox/7ngTn0MIq5gZ2" + "eOx0FbjA9W9DHEceVDS6kgs9lFcN2W+muCG2/fGqQUED9Fzl9JSM/tE8XAKwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIgdUt9H4i6kwwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAxPe0vM0BvormJLF5HxkyFcTtoombfDGANoLoyj+PTWRD6z1/AcAx5K" + "rn/0J1sZo13M2ezaZUABbbpNH9X0OS225IJF4mXNpfkYhsz/+jNPGjRpN2p0K+DhMSawUw" + "QfGv2x6f31k6WCdy/769i1mwKP6Rpph2nkRyYW8MwO0N5HU="; public static final String Intermediate_Certificate_2_PP_01_04_crt = "MIIClTCCAf6gAwIBAgIBSzANBgkqhkiG9w0BAQUFAD<KEY>GEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wMS4wNDAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC7YCtN67S/ItOzaSGqTvfEE483HoQGiQZ0ob3+0beK" + "kmbSGADBQVBKe/sLJEKddyV2Gl8S4x+cKaKBWUI8lMZViJwWqVnyAFd8ZiAB/BpXaKKgP5" + "pFsg10Yo/EtsxGlLSTLurst0azNnFv7ca5Hb8te3T91eaI6y59IjbsRgilSQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIGazrt+QRNCkwEwYDVR0jBAwwCoAIgdUt9H4i6kwwDQYJKoZI" + "hvcNAQEFBQADgYEAUIz/MSc6K5eaIAg8skaAgm6rSPvcU/711b9G0qsIs6YqvEz4zhGi5X" + "nalYYXfaSQzomuRuABNvuR1Ydaw/B9OdPMro0DhX8VpY6NzCL5Qj60/I4is5a+Hzgk82ck" + "eAC3okPHbVMd7R9kdFsWNE3Capnv7rriqXO3vwFw8b9vXD4="; public static final String Intermediate_CRL_1_PP_01_04_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QUC4wMS4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT<KEY>" + "<KEY>" + "ebKfvEhDA0C7sawukQbv/q8mjSS3CrhA/oqeb8bML1IlW8rjHSXuRU/n3oeyAZuxLCAQMU" + "TPG6Vq4dOu8XC1RY74xIm8ps4mE0xB8/nI5kadHUSDPtUZhNzc8tv+z7fUGRaVGL7CBEpq" + "ICyQKYytCwxyf4xu2Ip71Uy2tuo="; public static final String Intermediate_CRL_2_PP_01_04_crl = "<KEY>tQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1QUC4wMS4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIGazrt+QRNCkwDQYJKoZIhvcNAQEFBQADgYEAjpUo" + "XSj0HX7Wm4w1FiRBBazInGOhSQX9VP2GcGb5lfr3GKt75Y+C+C9qd5X25DVkA4M1gPBK+u" + "XjSMQoHAmFJychQG23rcGcuDJlzRMyfvPCF9dOGLFdmkuHSo5hQUyYsxnXV8cWLIkR1AUz" + "PtUbTJL9g98R/OJFsCBiPi+By6w="; public static final String End_Certificate_PP_01_04_crt = "<KEY>" + "<KEY>wNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMi1QUC4wMS4wNDAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDEuMDQwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOtf65MaydWM3bmMT8tAGCX8gZkx1JlgQyBlJT67" + "2APIkfmKRFK/dBtSwwCVGHZG4JYBrrwMpzUPrkGKYI6ZVIvvPnPfadZns9i5SM5LZFS+a5" + "JfbRnSJd8dXhZsKHxqkxIWwG6+VgnRKXE/Uc4m8TePQJZEOra5ezna5yhvqUwPAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwAjARBgNVHQ4ECg" + "QI4iNoMjKiXMkwEwYDVR0jBAwwCoAIGazrt+QRNCkwDQYJKoZIhvcNAQEFBQADgYEAmOjp" + "2EupE1AmgjGfiGK1fk9kf39yQXK1EDsyO6KLdWL/bmWeYi/G7ZE57/+yVVADJuHI8xVIDZ" + "LAC0u5p35OLgbcmmA5bs52KWJJfa0nbgGpVaUSMg9SkEGS997OsgExWMvYhdFIKXlq4Rwc" + "ca89Hg1GlXdrpfD2OCDNBvcWB5Y="; public static final String[] TEST_37_DATA = new String[] { Intermediate_Certificate_1_PP_01_04_crt, Intermediate_Certificate_2_PP_01_04_crt, Intermediate_CRL_1_PP_01_04_crl, Intermediate_CRL_2_PP_01_04_crl, End_Certificate_PP_01_04_crt }; /* * test38 * */ public static final String Intermediate_Certificate_1_PP_01_05_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDFzEEzV/yUEORIOufyqpZzKpYz5aPyBbcDf8AMMCM5" + "tEz7j39cf1f227cbrTcAaUfYFwkrb07RU4bTS2X+U2Ak7Q5OROz5rrZBbsfwF3yHhwHxCg" + "KLjbwz7D+OJdNfv7x2HRckwfMUkmP4cEuJIIPwj1ieBbsnUi9dkWZePwl80QIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIjsCjmszYCHMwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAWMUBdOdHMB/SV5kPUk+zut9g/1v/GyxyB60mq9jGqjrIsk4a9JRqa5" + "MWju+6kVfSLelAOCR24EQsXnZM/5Qqg3Wb/SFJXWDcBnfWQWgh8UmJfmPhD7jViG5QVIxn" + "iALNCYtz373L+IDECLMO6S3wcTPsHdYv14jl6BKtabwIpE4="; public static final String Intermediate_Certificate_2_PP_01_05_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1QUC4wMS4wNTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjAxLjA1MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCZzdj+ixWCuxJGMjcoHUwSNqI9Wt9gYwXUTl+dWg/E" + "lg2SPJP7lrBOibAhSmaTorhunUSEf2adhdxhuGrd5Ucp6G0oZAa6ZDWaID4rKYWsI7d5kv" + "mrUhDEEdzk2s4PCoPiQm4dKwRg2rIvA5Dv+W1ldqSVSG376zVrQ5xdjDUX5QIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwAjARBgNVHQ4ECgQIUASviIKBmJgwEwYDVR0jBAwwCoAIjsCjmszYCHMwDQYJKoZI" + "hvcNAQEFBQADgYEAa3c+0Drcq7iWP7K+gE6Mz/0ATQoiG87irXWfWBUGWtYnsh6K+1THMl" + "ibmZjYhsztK1P5rm6qL6HAyw0PhrRE9imqZ16cgiMomh65BWQImOeiXx9YWIPvjXWsE6iV" + "E31XShr9b9OZBA2+Zpydc3ID/SQzy9PiTAfL5yJiW/JZvFw="; public static final String Intermediate_CRL_1_PP_01_05_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wMS4wNRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIjsCjmszYCHMwDQYJKoZIhvcNAQEFBQADgYEAZIzN" + "pXT89MplQgcXcA/K7YKlf62QCbw3rE+bUQiumJMlNGiVdaNJ8T66ObyoOWE+s+KN/Oetlu" + "HglQ7r6RG68gHYtZZiO6kmxq+wor65dFGQyRggpD+D47yioEgR12wUUksL/8oBW1pfGW2B" + "dR4sNWjzV5k5EWbLYu7wxj2/ubo="; public static final String Intermediate_CRL_2_PP_01_05_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YD<KEY>KBmJgwDQY<KEY>QEFBQADgYEAlZ06" + "h2L/89GvCtU1K1VtbHPMN/LAUYJrWFID1Eo+Cf/5wKEGBr8hxRtvshTK436zqVQRQN/XTq" + "7u0SLxvIixNRErlmUlGByi5vumN2OA77SxOyqYLCnBXTd5tWbFGz/udjaNk1MxOK0MQxPV" + "9R+HHUUVojRnAIQvlcqx/sMzU5o="; public static final String End_Certificate_PP_01_05_crt = "MIIChjCCAe+gAwIBAgIBTzANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMi1QUC4wMS4wNTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDEuMDUwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBALyBn2GKvoKNHcu3AEJRCbWOyUpCc/onvRoQgWRr" + "wE7vMI7vjqnoR8mXdWDW5u9DFu9V5pb/yHBWn1zpgFGNnLrqn8irwR9i6Q+qlu4lXL5WSr" + "DqBqEKxrOBDPgkVz8Ldjt/Hy57qEukBarvpAwTc4XEJPAmxNrboMeGCEn2UShbAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIaV3Cd/83r08wEwYDVR0jBAwwCoAIUASviIKBmJgwDQYJKoZIhvcNAQEFBQADgYEAVJXz" + "gooT1qd6rdehnLxJMf1HZ6JuqpyoQjzWF1jA3SkJmBDMXvAkMmIcQ7r5CZHaVF0iMQl5JW" + "fxPtM9Bws6jZhVL0TkwJHmbnSvbzUkJYeXPCP7ags4bu5I32co1nFVF6wf3aQDZeLFj/TU" + "1GCQ4rh80T5oknuazD4xXAYx9sE="; public static final String[] TEST_38_DATA = new String[] { Intermediate_Certificate_1_PP_01_05_crt, Intermediate_Certificate_2_PP_01_05_crt, Intermediate_CRL_1_PP_01_05_crl, Intermediate_CRL_2_PP_01_05_crl, End_Certificate_PP_01_05_crt }; /* * test39 * */ public static final String Intermediate_Certificate_1_PP_01_06_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjAxLjA2MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCjeJAwaZ0cw6O76hu15XadwJiTsIJcXZxGAETq8H9p" + "VJs7kJh57oLpO/lG8zG89QS9g1ozxaaGDWsSyXsDzv1eqDVZg3ISQu6XcKdDu8EwgQDY3S" + "EGkJ2AidFue3l0kEwR9+rtsuVKd/P+ULF1hWcoyLB/sQD5z8GvIiDKyRBiFwIDAQABo4GL" + "MIGIMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMD0GA1UdIAQ2MDQwCwYJYI" + "ZIAWUDATABMAsGCWCGSAFlAwEwAjALBglghkgBZQMBMA<KEY>UDATAEMBEGA1Ud" + "<KEY>" + "B/Gxsb5lxSTN21CrjBp2aE+U1oTP2MpIFWUD1q8KWhZZF1iCQ7orcDVITqJPdPxDu1YwKk" + "zOegc4YBSJzHZqF/W4Kw4wisMfnWLTsUAeP/Ucz4vXk5rsf7IRssFG6PLxVmtRZizoxl9a" + "DO9abTM/jV8Mgi1IB6LdWgmtosBGBzbQ=="; public static final String Intermediate_Certificate_2_PP_01_06_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wMS4wNjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjAxLjA2MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC8DbqYUf437toWlRkOQA5PloqYQjWYpiR67yGSjQHp" + "j/HlduTYFS4qfUbLCjH4qsNUH8yQDvogImQw5M1IQOsUAqO6mYFxjqUWccuOaHT6XfUaOs" + "DDHr/tQUvhz3LJryaILiPlNcQF8QiYpujM1utVRyFpmUrMAlOvWUB93c/xUQIDAQABo30w" + "ezAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAwBgNVHSAEKTAnMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwCwYJYIZIAWUDATADMBEGA1UdDgQKBAgQxGVMTJml1TAT" + "BgNVHSMEDDAKgAh9i6tKUsPTgTANBgkqhkiG9w0BAQUFAAOBgQALJtPqY5uROJ+2QYTekn" + "fSUc0gC7j3/cngIvxGT385xDLTrd6TjYSi+12+vU7RNd3MIZoz1o7RpWQV6C751WtOFuZi" + "iXeQ758aLqfhjYSVW/NHkO8vjrAMUzUbgjqb03k7q5JgtT6udB+9ySmou2/RxYW5p/IT17" + "euMVGmQb/RFg=="; public static final String Intermediate_Certificate_3_PP_01_06_crt = "<KEY>" + "<KEY>TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2Q<KEY>1Rlc3Rpbmcx" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>j" + "yMtnfnwRbclkFCNBdalZYofuTWP0reqvqGqsBj+RS3uazvDBqVmn0J0AGRiLILummgEFRJ" + "ow8IB1hduDYJpDMrHRpfXpbG2H3fzN1XeX/B0hUZgdQ86GyK2qrmyIcyqZXwIDAQABo3Aw" + "bjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAjBgNVHSAEHDAaMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwEQYDVR0OBAoECNKJMmEWCA+jMBMGA1UdIwQMMAqACBDE" + "ZUxMmaXVMA0GCSqGSIb3DQEBBQUAA4GBAKv9F3+Y4N8RX4bRZ4fFTKri2rrB4BsVrBFpOr" + "SLzKnuyO1O5gg45d70pSHUAVBn3pz0f/6WwWLECq9tB7/Fphi0TyqeFmkRnysygZGlvLgs" + "L19bpIgVPkjFFziMGuzdAFIGy8vnV19yJ2euMygEHr20yiGBUaHHnKyuOGbDg4i7"; public static final String Intermediate_CRL_1_PP_01_06_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QUC4wMS4wNhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "<KEY>FBQADgYEARL4u" + "DZvfcQDYanTfwU/hWAJDdDO7m7oQZLy3o0PTqXkk2Jd2v3+M2U8UN2PcuqZXT1lwS/piiW" + "Sc1x1YndD0qUtV4bOZ9SESPhCeOc1lQTk5mMf/zqFxQqYv8rfDB5O3QY4bjS7QQzSsvmal" + "TGCnoHmUJ4skmZJrQAzYnXyD9G4="; public static final String Intermediate_CRL_2_PP_01_06_crl = "<KEY>VS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1QUC4wMS4wNhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIEMRlTEyZpdUwDQYJKoZIhvcNAQEFBQADgYEAcEyr" + "sgLhVq0L6N5fww/U6TW4lqaVAEtjqxluWRyZnL3AJLEHfwh1lllCG5dNM5fahGDOW/53fV" + "+gW5l92bsi2D/lAkDfNUdQdi5ZpQG9y2zhTArUlx9z1+KXklCi2Gg1X22gi+cYbK2hfzk6" + "kNGP1v42bjrkF/ECczpy3e41rEg="; public static final String Intermediate_CRL_3_PP_01_06_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QUC4wMS4wNhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI0okyYRYID6MwDQYJKoZIhvcNAQEFBQADgYEAp3uQ" + "Tn2HC65TFmSjzvjuStIJwJcVahNcTWiGdtfTalZrMtuC9vUgQq0K1QIa7QNC9C3hQlzb5e" + "bO7JhJDs+5GZnnsqHN3pvdKEoueRfWBjUGpPnSGFD61ysf9aDFY2j9Amf3zcBFsXZs4+DM" + "dIENndbjkwqCV4zRTajAqCsIy20="; public static final String End_Certificate_PP_01_06_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMy1QUC4wMS4wNjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>BAYT<KEY>DV<KEY>lMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0E0LVBQLjAxLjA2MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC+IxiNJMOQG2gx1xd9ELNuzs9LrVJVRLvgP0lpWrx2" + "2HTEXPDB6YmrEg/YgyptmQ5Z4K6CEgJz3EdDOarCSGcL7DmcSEwEw46MV3piS5DrHwQ4GH" + "a2/ENSh3lF+6dliBwbQR2necmQ5g8ekqkWNb65pLl6RCNGkntJpdu8w5GWbwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIMf/eRyakKwgwEwYDVR0jBAwwCoAI0okyYRYID6MwDQYJKoZI" + "hvcNAQEFBQADgYEADgpHRDgyPuK4dc+m2p0IELHUAK3qsdTZzBXsaA0rkkk1aRjI6DQ2qg" + "b4crRU3spQgYwBC7KQYd/hp8Lk17iX6fdV/9wol0DxTGhamOJA0uRl768awRArf4cEUElF" + "uWPN8D3wJEfL6BWgReUJWg8V9HEtdvXZZgzFN/CgHRkQ2RM="; public static final String[] TEST_39_DATA = new String[] { Intermediate_Certificate_1_PP_01_06_crt, Intermediate_Certificate_2_PP_01_06_crt, Intermediate_Certificate_3_PP_01_06_crt, Intermediate_CRL_1_PP_01_06_crl, Intermediate_CRL_2_PP_01_06_crl, Intermediate_CRL_3_PP_01_06_crl, End_Certificate_PP_01_06_crt }; /* * test40 * */ public static final String Intermediate_Certificate_1_PP_01_07_crt = "MIICrzCCAhigAwIBAgIBVDANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjAxLjA3MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDs3Z/FfgJOyKp+Ds8xiQBM053cWylYbD+g+zuWDz3d" + "nD0eF77TLPITL7hwI058Pn3tXHlveuKMFqbvzWUgFXaBoHmmRohIj1eqfJQhlmKLjlSYyC" + "N4xhLVi7vg71ZjFdRk1k8ME1HDfpb2WXqXh9LyRYY8b/aqL+NHe1PUDbT6FQIDAQABo30w" + "ezAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAwBgNVHSAEKTAnMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwCwYJYIZIAWUDATADMBEGA1UdDgQKBAgvehPxsTfSBDAT" + "BgNVHSMEDDAKgAirmuv5wudUjzANBgkqhkiG9w0BAQUFAAOBgQBpdMBEONGcpFitMN1ihf" + "W441E4HVTQwtF+h56aagVFndUF1gQsVEdDNmvvN/jdlzXotcfdEj1lOahmcwWbPOlNx3PB" + "LUPAcaNM9SCrXWi1gKJK3gXC2OAxj0mT5XhfPlAdfhZXTBZLqMqebmk6kVwa+VyPPZFHGy" + "BW0fV2ClJ69Q=="; public static final String Intermediate_Certificate_2_PP_01_07_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCrO/98w96Bg5YTTmtdc9sL8AOABGcYx5J8E1Y7/GhU" + "2sInc/j0dtBbE0Tj4KFIKpVLD0m2mTyHVCUA0/QGiS1Tq6DzmZW/V36Clya3CoX9rDTJyU" + "cKHpgntV19fFAK58aksyKCdP9jjLpbSspzOlIc+mVW+hkjgw3NcuY6fAOQvQIDAQABo3Aw" + "bjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAjBgNVHSAEHDAaMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwEQYDVR0OBAoECEmeATXRkM5EMBMGA1UdIwQMMAqACC96" + "E/GxN9IEMA0GCSqGSIb3DQEBBQUAA4GBAG/Qv60jyImedUXtCYl0QpQ1Ne2ZLxvUHRLms8" + "B1nXC/Rze7zfz5cwiyQn+6XN2rhuYFdTMDEFZDIjeeCLNllfan4GUAdRGtoJnfoLOGLlQf" + "RW1ONc80cxd1NTxHqxOtqpWdoJQEn8070WLqQPACEs88XYKBZ00sF9ZdSg5vhHUu"; public static final String Intermediate_Certificate_3_PP_01_07_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMi1QUC4wMS4wNzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EzLVBQLjAxLjA3MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC+5b7o4iWl80ntDMKGcnquLQDTGlf6Gy/8y34Vw08/" + "8ij+nuHMiKpo6UCF0OpDcnkJ2ovvMsY5dAb5ErhH64UbnMlKbghnGv0sVidtipoC8u7ey1" + "YUIzDCdmbNvTfho6IXKzH8ev//K+FJd3qBuKHl9u2Kk5+igsyb+bPSid7d/QIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIUDKu7h5EQ70wEwYDVR0jBAwwCoAISZ4BNdGQzkQwDQYJKoZI" + "hvcNAQEFBQADgYEAnKhR3OvdgtVtmio7ikCvjxlSoKVbUleazxONOxHUAKdXEv0/mSOTwp" + "hPPIoE2xAqPOOHvXPmzmJpPADjrfhU6afJ7ThDRFTMk4ZLOkT1SvRlymK7uWhj5bhUgi6S" + "UQ2LUmrY2hIN4cTrrzZvDw2Q/6UIuqpmySXEOHDL5T5MXEo="; public static final String Intermediate_CRL_1_PP_01_07_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "B<KEY>wMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIL3oT8bE30gQwDQYJKoZIhvcNAQEFBQADgYEA4gZR" + "71wRXNdxWe7kaQPAw44UUw+cN1bDBU0RV7nwYAFDYxDIaDGOfjhUVTMBq4rb51S7uqIqYS" + "F6j7BdLXl9WVRJobfkRH0t0cBnuSeQRz3ckrZrCuvyxb3PEL3pbf0UH1i/BfoG+EHJAY7R" + "OVOL/dyoXeX6ehH6ImGhucDixS0="; public static final String Intermediate_CRL_2_PP_01_07_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAISZ4BNdGQzkQwDQYJKoZIhvcNAQEFBQADgYEAfzKw" + "NHrl10PJDHa3olBYXYzXi94zxDsEQSIb+W4pPXUfDZijPqL1NzapLqc/uL1Sl28GmLDrbm" + "nCrlMn1Kt/gI6XndOnSyC9Sg6WDxAI3HTHxlG5MHLBn9Lb36CHobnwep1BMo8zl2clh0Kz" + "PIxQSGXM1BDpHkwF5eoFAolDih4="; public static final String Intermediate_CRL_3_PP_01_07_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QUC4wMS4wNxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIUDKu7h5EQ70wDQYJKoZIhvcNAQEFBQADgYEAj7+M" + "EeIe1GmJpbRUFqbNrDvT5tHjKQMNdbe5Y8F920U5t0ig1Up60kc7hs7LH57i6R/quPOpym" + "a9Eo9Bql+P2Bg9FELih5/a4B021TZBmmdSI5fwQZ6Q5PjgG58Zl2cJitNYvGi7tVUBojA5" + "CSN7KBMyipia9ivxm9a/llJPrQY="; public static final String End_Certificate_PP_01_07_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMy1QUC4wMS4wNzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0E0LVBQLjAxLjA3MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC/RmUcYHxgQRHCUh5cMug/J2o8DzYbT+2pIehJkNCr" + "zfqemV3qshLdMct5GV73oEkG5b6n7tj3/hI1TLh/A3LQpKROAGZybdo9fk4Pa0+6V6ql/U" + "NnSpcAKct/f3IvchGo9nBGdi9aE+j+xKhMM6E8xj1+Jc7Z0xz7zE4+qRbeZQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwAjARBgNVHQ4ECgQI/y572lfRyH4wEwYDVR0jBAwwCoAIUDKu7h5EQ70wDQYJKoZI" + "hvcNAQEFBQADgYEANl9zdMKbaq14OP45PeK9D4ftOSuliW2di1qAX38FQoWPYLLoaDU0Q1" + "9I54PDY/UYRR9jKDl1WPhV6cD+65eadtiOZVr/h1CaW/HxTloouzN4z1zCXMC7AxZKo+EI" + "XLN8f4w7hKLFYgf6gP9+iVi+T2gKfH5Ch2zjRhlmGFRgsBQ="; public static final String[] TEST_40_DATA = new String[] { Intermediate_Certificate_1_PP_01_07_crt, Intermediate_Certificate_2_PP_01_07_crt, Intermediate_Certificate_3_PP_01_07_crt, Intermediate_CRL_1_PP_01_07_crl, Intermediate_CRL_2_PP_01_07_crl, Intermediate_CRL_3_PP_01_07_crl, End_Certificate_PP_01_07_crt }; /* * test41 * */ public static final String Intermediate_Certificate_1_PP_01_08_crt = "<KEY>" + "<KEY>" + "<KEY>AMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjAxLjA4MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQD<KEY> + "ArKLJDnXx8zmTHSHQCpw3G7xhGsxA1btm0cSC5P/1bw/kFWsSLRe2NFF6oKU+7c+cgIUMB" + "kzyXk+kpWAQRb7hcb50iKdKFtO8gMNGMAxlHRI05/1tThyAs9suI4TrxTS9QIDAQABo3Aw" + "bjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAjBgNVHSAEHDAaMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwEQYDVR0OBAoECFxr9vgF31fKMBMGA1UdIwQMMAqACKua" + "6/nC51SPMA0GCSqGSIb3DQEBBQUAA4GBABaX7TYfmSyVmzGCVbTFweUuPilo4wzy7z/w0x" + "y4uSaM/YMtixUdDPpTHOJNYDdeV85v+w9oezdL2ZYAaGn7tldC6k8ouq/6hOGGST+ziHJS" + "gTOD8UVBQPRPvWEwgmDIprnzrVRz8rG6uqslXNiBDnO9BMGpRo4dy8YpOmV6BPCD"; public static final String Intermediate_Certificate_2_PP_01_08_crt = "<KEY>" + "<KEY>5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wMS4wODAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjAxLjA4MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC8nLZcMLHYKxVqbhwJiqQbAYhf7S6ck2O9AhNor935" + "Bfm7/8qVZbBAotQy1PoCjSW0UYdknDolWvi8aAtO0f9XVrAv6BZVVW9j3osIGN/XUThaN+" + "9dZ83kGpyjeoitpGK4wbFNDteuBFYp+8gFNupnX7JQwUK3aGwBUucbe7puRQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIL0xyFYBk4OcwEwYDVR0jBAwwCoAIXGv2+AXfV8owDQYJKoZI" + "hvcNAQEFBQADgYEAPk+Lys0Ueoyhp544EH9Hqy9+gY+l/+N99v7KvBlZWKuhkwZDE+qAYT" + "P/SOPsWe8ADZE2iQ4pOlpK8jSqtJSdK69RgGL9omLnR04L9c/zKLArBE+VmoV7mohcQp8x" + "aB4q/g3QnAqwfFYDjIWW3H6gRAeQ5MOtKdz/4042fJxc5L8="; public static final String Intermediate_Certificate_3_PP_01_08_crt = "MIIClTCCAf6gAwIBAgIBWjANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMi1QUC4wMS4wODAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EzLVBQLjAxLjA4MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCvy6bNOyVaP8JTwiySFa3Sj+rdSqzkalK5gA7DLk4q" + "AyvnAK64HgbCsb8dpnSi94WBDsocrQ4C1Ltoahc/AZyRVLA/REsAh1r3/0FALZgYiIxvSF" + "m3ihKb3P9URBbotzhl1ahRZPSrcxKwNXEmxB0gjixGW7GZTARq3Il5ressRwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwAjARBgNVHQ4ECgQIwFtfZBe/KqUwEwYDVR0jBAwwCoAIL0xyFYBk4OcwDQYJKoZI" + "hvcNAQEFBQADgYEAeZhpIDEYyV/LkOtUf1TryemJExQ1jdfirJ3AUtoFIoWz1p9aqnV6Po" + "GAMozjtdyotfSA2O8c065DwD+CvUXPmdD+2vWpX/2hJPj+x++UvvntAokD2UE9HCeEvBHK" + "rr59hvKKd6GChyhAjLris202eTLIiMEoyZy9X/Wt1nXF8/g="; public static final String Intermediate_CRL_1_PP_01_08_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>dTK1sy5o5" + "boPHG0pge0B4/2JvuDVS539+9HAPansUNsrMXzOblg1acjdKtuk4oS8PIYkM/lbA6yJl6F" + "QMbdIthWqa2gjaWKll3R8fVUjxI="; public static final String Intermediate_CRL_2_PP_01_08_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1QUC4wMS4wOBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIL0xyFYBk4OcwDQYJKoZIhvcNAQEFBQADgYEAN6BQ" + "sEQT5YCvs9vlUSdG4gjTgNkyQTCdmSIcufpK4MG/AoW/Fn5zJXxiMyHmvT/dkk/UOf82/s" + "41YI/Inz4qRmGF4IL7jo+l7V+OI1n+Vf4ClgZU6ocb9d1dFoBkJu3xI9dcWK6ExpzaBUXw" + "rPJilV4M5luGbszdDCs9cLjmiRA="; public static final String Intermediate_CRL_3_PP_01_08_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QUC4wMS4wOBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIwFtfZBe/KqUwDQYJKoZIhvcNAQEFBQADgYEAkmDx" + "t+r59llppKmm9mSTof9/BX2rNyG9LfIH7wweoDi9be2vYOLy0NU1kJ8f3/muEw2v7hWDri" + "k9ROLDFnb/S8MYVT0l4rymRhpshPF1uMTOZmfJUCfTX9jIaShztSScqcGSP0a3EUfDD14R" + "1yMu2pdlMM35llE0lV3uf/eUNr0="; public static final String End_Certificate_PP_01_08_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "NO6aU1o4Hnk1wfmTPZPErc00/MfizMSumTYYRl21hEZWhjNO5uQIHrF9V/4OToo2iOfsPd" + "gxwpSokwxcl7CJyadwUxhRDYCLhSORXoCK1CPQZjwb+uQz799O5ozb0WVNYQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwAjARBgNVHQ4ECgQIO1TNJtWwaiIwEwYDVR0jBAwwCoAIwFtfZBe/KqUwDQYJKoZI" + "hvcNAQEFBQADgYEANmP9hyFnYvi8gdtRe8ERoEG90NwoyPTsB8sXd40f+Sm1QxKqMPzKPL" + "7bOtY12JGwZ55a6HFVgpw4PnU+0iOcCMHS5OQQLtyirxX2HfioiXEmcmRJT6FvLHrGIHGv" + "KNcfc3rUiksdOb6+j2k8x4IwQ6pBEHQwY8U4Y4DgqALlqM0="; public static final String[] TEST_41_DATA = new String[] { Intermediate_Certificate_1_PP_01_08_crt, Intermediate_Certificate_2_PP_01_08_crt, Intermediate_Certificate_3_PP_01_08_crt, Intermediate_CRL_1_PP_01_08_crl, Intermediate_CRL_2_PP_01_08_crl, Intermediate_CRL_3_PP_01_08_crl, End_Certificate_PP_01_08_crt }; /* * test42 * */ public static final String Intermediate_Certificate_1_PP_01_09_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjAxLjA5MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDJqSSqGjgI3JUJfA/XkloAOg2QtZeAGp2nCq1Oiply" + "MTjJpMpEOSRYrEIgKMGnBPq33seP7X/obCT2jgexmbFT2TmPirM+h1aqbGQ7QAqsx80BdE" + "ofdcfiNosLbbzli9qFrbarO7fJfBhzraBFGDJj3N8nLi2YtP9IieFYJ/MhKwIDAQABo30w" + "ezAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAwBgNVHSAEKTAnMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwCwYJYIZIAWUDATADMBEGA1UdDgQKBAiVRMrZuHQ7VjAT" + "BgNVHSMEDDAKgAirmuv5wudUjzANBgkqhkiG9w0BAQUFAAOBgQCetZy9JMzUVveSPE2fQY" + "4fRVChyvIc9nCE4wbzhnRl3zduBGmAwTFr7dRWSFTnEq1c2b6B5nJtCzmt4Ovapf69sIlM" + "s3iV16eBB1WTNCY8YlAsnmZ7q/AR0t0vX+hh6QV6zN5xqulOM4Y8csZEx3RWJzV/LjE5w7" + "mKvofBEUoqQA=="; public static final String Intermediate_Certificate_2_PP_01_09_crt = "MIICojCCAgugAwIBAgIBXTANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wMS4wOTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDWUTlTieoi7aLGUYOAgqUC2J/6JarOWfv4vobpwjAA" + "DjvQGqg/GCZP7FgD/72Z4YefZKJEFZTDnYfmy2qh6iBYxcvLsJ+PJGzPCObNSmyq8gpeXy" + "KKEeCZtEev1tSywTT6E5Dhee4dX0QHE4ydZEliMMXGRW/8ffT6x54CPwVylQIDAQABo3Aw" + "bjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAjBgNVHSAEHDAaMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwEQYDVR0OBAoECAMhmGN8+qXoMBMGA1UdIwQMMAqACJVE" + "ytm4dDtWMA0GCSqGSIb3DQEBBQUAA4GBALNjokGrTnWsPn5KrlO+g3R8tAGM90JQDjfrap" + "xWM+nN+dUVVdGU6w2pAOAq2UhfySiP42qiFChnPK9oOqPF2Or7/kcmXZzBfZkE/FnJGNUA" + "gs9je1nZvTPQYsF094OqE7QdJi2k3seA1tqejA1kihMHpwQNmIp8bFpqn4dPO6ys"; public static final String Intermediate_Certificate_3_PP_01_09_crt = "<KEY>" + "<KEY>" + "<KEY>BAMTDENBMi1QUC4wMS4wOTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EzLVBQLjAxLjA5MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDHUpHhF4ANNLOywnvpqyD<KEY>3ZxgLBBRYk6TE" + "jMgTVKmRasVRTA9uatGG4b2f70YWs9cOd4ylQDqPEDdKNZ47bqZdX6RAU3j1dO9LBwWDbp" + "NvZ3zuDBRDoCZClIcBESDYweaZ9nUgKl/WxTeCnMwqkfSJGYBBcHIonRPnGwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwAjARBgNVHQ4ECgQIyppef22OmjEwEwYDVR0jBAwwCoAIAyGYY3z6pegwDQYJKoZI" + "hvcNAQEFBQADgYEAOySUCY+PZxomhWgTRSKRodOIe/QSfCMSC+0iw24a2TuJzFLjN9pSm9" + "0C2PqWbfwD1uDjrteO1NK+1yhtIDySiptR9GmR/fhL7NJ+z7M4fEJBjjeeI9/aEIuHuBFT" + "TVHfwsJxnZtjujtOdl56B825LsKW8Otumd2A43N9wIgSyBg="; public static final String Intermediate_Certificate_4_PP_01_09_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMy1QUC4wMS4wOTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0E0LVBQLjAxLjA5MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDR8/c35YqAswoRMgQswlTbKB9oYEzrFSC0G4dt8ydP" + "O4PyQs+J8wUVrRVMiVDTLO9rUnzR1T3iA0dqM+SvWMIA8pMWKyNV58f73ZPJIejhxMmOZa" + "sSLHceMmmMRy1zyk38i3ZJP3YhvxffTjWyTZ9k2xSDX+6KNnkiKkJSKpl6nwIDAQABo2Mw" + "<KEY>/MA4GA1UdDwEB/<KEY>" + "FlAwEwATARBgNVHQ4ECgQIpcWcVIIu63kwEwYDVR0jBAwwCoAIyppef22OmjEwDQYJKoZI" + "hvcNAQEFBQADgYEAckgV11ND/D1vfPEMUbDGUvtmsziHiSuEoDLJqSAhOmcX+evKWOfoVo" + "f7og+0ajuul7yuB+7YX1AakOw+33k++Rsgg4o+ImZq3+VScpgnIQ037OOhgH3umwFRC0r3" + "NpWqhmQuz+mHnKiK3X+IDsQOFkhnpNs06CQSZzmrzbYlQU0="; public static final String Intermediate_CRL_1_PP_01_09_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wMS4wORcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIlUTK2bh0O1YwDQYJKoZIhvcNAQEFBQADgYEAkEc6" + "qHGOWZXYTQ5fsWyJgEtuJyl8uJ+gMcikcMut5SIJTTtOz+q3wclYDevT8z1MM25kNdgwyg" + "b1bwHNAG8I72eIDtGfLrChFwU3qpvVMTG9gPYJb05Q8On56nsBu/PnnzJervzxjViaeOuv" + "kjwwfmWqGkyiK433WxzgPqE48eA="; public static final String Intermediate_CRL_2_PP_01_09_crl = "<KEY>" + "<KEY>" + "BAMTDENBMi1QUC4wMS4wORcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIAyGYY3z6pegwDQYJKoZIhvcNAQEFBQADgYEAV9Md" + "8PaNoIlT7WIwnelqrbwsR66vAaT8w3gu8XDYXu+MOYThfyERUvtH6AUrHWfiRvWEzKljHH" + "3BQB0Zsa9Zz3U5cLzJcqtqDc1lH53aIA8MflrfMVrYSF684s28FikcukmA5Fw3+7S3TJ18" + "Hq7plHwTCidVD6yG35hsPwcjTrE="; public static final String Intermediate_CRL_3_PP_01_09_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "V/TFQtDLxQFIBCbfqhlgpOfvJBatjNuvB0TuD2rsGS1eaLNfTfyVKlOLpxoKwKYMu36kIO" + "l/+KEPDq+ofy7uDZ6GLK3KZ/WiJyriqBQjFCvlhNTW1cjA7Ejk2lOM/A46mrUS9xC+aITh" + "d+/UYGt6O/e256cOwQCUaF2z328="; public static final String Intermediate_CRL_4_PP_01_09_crl = "<KEY>" + "<KEY>NEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBNC1QUC4wMS4wORcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIpcWcVIIu63kwDQYJKoZIhvcNAQEFBQADgYEApZ1l" + "w5SJoU8zeKwX5jpVWiFFFomDgKsNlkkX5mF88l0B6MiYbGqJIowJRfeIlxvPOf20imN7Z8" + "l38DRXFacDQP4y5kxM420dp+ljQL5q9RsrC1+OS7I7TGgGwPoZTO4mHVk8nx9MyT+kW1OU" + "x9qRYWN0CLmP22kutYBndny222Y="; public static final String End_Certificate_PP_01_09_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBNC1QUC4wMS4wOTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDEuMDkwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBALiOjwwwUk1HNwf2rdzPL2okKTgL+lMdzhC7cbq3" + "6A409EY7iipPCcsDsheo9EaTNOHV9xjWDqOhqjA38h4hGNkRUVOlTW2r8SoHISn3gDXfrh" + "aHbU3owscAmt1nuA7rzo7L1eBPsisIIxAY16uAmVN5RdiAAaP8VUdshcNI4/1jAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIGZIY3nffEXowEwYDVR0jBAwwCoAIpcWcVIIu63kwDQYJKoZIhvcNAQEFBQADgYEA0Svm" + "aqjaeQx/lnF223xlCTsU7XzOxbHetRWfeCTw0QrWQaTrKjWTS/TNyzLhGuPBFg+NTTvWML" + "gzteo/WWdF8+d2rOis9FVRCe/Euok6ZCL/xgzaE86ZSQg0jj6458TpuC2cszSaifRSlhL5" + "ogy4ADWgJxdVcBrgADo6QZXkXXw="; public static final String[] TEST_42_DATA = new String[] { Intermediate_Certificate_1_PP_01_09_crt, Intermediate_Certificate_2_PP_01_09_crt, Intermediate_Certificate_3_PP_01_09_crt, Intermediate_Certificate_4_PP_01_09_crt, Intermediate_CRL_1_PP_01_09_crl, Intermediate_CRL_2_PP_01_09_crl, Intermediate_CRL_3_PP_01_09_crl, Intermediate_CRL_4_PP_01_09_crl, End_Certificate_PP_01_09_crt }; /* * test43 * */ public static final String Intermediate_Certificate_1_PP_06_01_crt = "<KEY>" + "<KEY>3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC4mu1oBHB9BeorCFJIuSw5tszmmYBD4bjTklsAfjrz" + "OknQsYxEoHfifpdgivh1fMUk+mK5YWUz0G8/edquKbJhPBTTWp8opsGzTATsTLSEzkKbVM" + "DQ84ttxrhJWlrVRlouZTnD5HoLUvujY4EdydmKsjj6UBt/tGL5EKodymcEtwIDAQABo3Ew" + "bzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATAMBgNVHSQEBTADgAEKMBEGA1UdDgQKBAiGRi8YRte8PzATBgNVHSMEDDAKgAir" + "muv5wudUjzANBgkqhkiG9w0BAQUFAAOBgQDHOaIki9TogVJn54FRPl+7FyzBJ2DnR4RTM/" + "q1K3COWRdtvmGqtBBtAccxWziQJ5TnAQn1XA0cFPoCgymGPRcUz+0+C+3VhJ/m9LggVP3/" + "pjJEG0fsmJtUYPyphUlXeUzf4qSj34SlJws3DIHTR8ozAR75HZmlMRnxyZBLl+jAng=="; public static final String Intermediate_Certificate_2_PP_06_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1QUC4wNi4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>MA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjA2LjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC2rptuREzhGfEJ3U8ILPBq+z0s+aafMvBRHpqkipDq" + "bC7v9zpwg1K18F4MYiATpPAEfdEeprKs0mWfdusF93BoMBVm1y0zRgDRUNdyB5GFO8g8+2" + "yNEO6L37c1PwrMLnvJakaqwbbnwlcMcKtLHoX19fyveQQg5DNj8WcKZj397wIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIJPt6qKdFeYEwEwYDVR0jBAwwCoAIhkYvGEbXvD8wDQYJKoZI" + "hvcNAQEFBQADgYEAkFJGNze9/6YX7Rv8FR9obFGACIJ7Om4YQQRW9WM9pEDgKls7g9b9El" + "dJxLKOlWoRoYZIrbEam19traE2O3dxqRevPoYvfAqkR089BkxH/cFYyfqw64IpjDG84dsY" + "XieajI/Ov/HjgF0VQKF3+Y1ZiDjb2OHNgMkqs9VmUHaE+94="; public static final String Intermediate_Certificate_3_PP_06_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMi1QUC4wNi4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EzLVBQLjA2LjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCzxfyi52gw/5tt6/9aNAXdY3wZYH1GifzGoN4cg8Mt" + "++5xmTdrc2A9/5biaTUVC0x/Ml6mm940NA9mM/EoEu4SdnP2crNCIFHWNlYz3cJtYJ68rE" + "rEU+S0gnYaYRiwNGhVpAjV+FPDr0Ghgp5rYQ61evAhmRuNAFwYocUw80G6JQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIZ9yMlboxCIEwEwYDVR0jBAwwCoAIJPt6qKdFeYEwDQYJKoZI" + "hvcNAQEFBQADgYEATNnRMQmvTxRcSMUL4pa5bejuX2Ixy/OfZIAlJWt9AfLW2tHmdAaGpD" + "GhTHKfyQQ+HrIMQ+lXau8Yu6nzWXAY8pKpKD1Hbd355VE4dYZ7aPvcAulZHeV0F2EFn09x" + "qQ1frHDRoCOc11B5qV5hnwgDE/ByZh1+OWUcR4tBQKyEF4g="; public static final String Intermediate_Certificate_4_PP_06_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMy1QUC4wNi4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0E0LVBQLjA2LjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDB66hLZx1WGcCqmOxHK/rotXOpccJQOB2L3kpWP1M2" + "ZiWufUguLw45XShdqu31OgmGw0/w9ugwy96aRL+Tiluj4xjIAxJCav5cXF8Dt2Ex7hjIHm" + "XV0rHbJUiduHEh3fQphgtzlR4QxG6i/i4SbcsoJzsws8x3qOqRPaWDtyWs0QIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIyZsLNvyyIZEwEwYDVR0jBAwwCoAIZ9yMlboxCIEwDQYJKoZI" + "hvcNAQEFBQADgYEAc7G4BAUsQeqNp/Kv8TKJckfxWygz54PrkBICNw/eGuGamVJMRkYCP3" + "yJ8NW4jY/rfxzKKyjVB09XuNBLDwYdR5Z5UHSg6Ijes3j8tehZ+9DwEQrR+WQf/adHIsxn" + "/347MHrSQF7CJzE9tAu6AOu53lKxLeH6C/5YI611or2Ql1I="; public static final String Intermediate_CRL_1_PP_06_01_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QUC4wNi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIhkYvGEbXvD8wDQYJKoZIhvcNAQEFBQADgYEAC7ev" + "Pqe0veUX+zF51d/NiG6VwgEwOP1HlzD/saDn/FYXStTQDwoIyFjmZ9z0yLGIaVI1O9BWVD" + "CTU3bCU1dBg61Blo3rI3TlNqmGrYRUSJ857QM9c/G+/+V0XJ/HgId39Pufd9Tob150XNMs" + "9h0PvqjhYjG1bARMRa8JB4KTBU4="; public static final String Intermediate_CRL_2_PP_06_01_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1QUC4wNi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIJPt6qKdFeYEwDQYJKoZIhvcNAQEFBQADgYEAiUbi" + "qQ3X/hTgjhpQGDZi/7EnZcqSgiAFMreV30/mav2NtXDITE9DqZzCS9x1vHBp4BBsQwYVvp" + "XvLVSgns4pFwR+0Whc+tPo2j9ScePq3sICsqleWTN1DvuoP9rBe8w7pDN4guA59Kbeku75" + "5CMA5YjiTUomK4UaqI3htwkBlWo="; public static final String Intermediate_CRL_3_PP_06_01_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QUC4wNi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIZ9yMlboxCIEwDQYJKoZIhvcNAQEFBQADgYEANowv" + "f/scWT6FFT393XEpWcTnA18hBT5Nkddw6mHjKBq7ndtBQkydMO8Wym1IeQ2qYbAqu3ifNZ" + "SKF3PfgJjYPBKImzJdHTKfcclMC5H8Y9JDN0voeyONr9NiXcoj+p24YNYjb+PFI6avRYo7" + "Xyrqvwnvng/IY9zLtc7SYYUIODk="; public static final String Intermediate_CRL_4_PP_06_01_crl = "<KEY>" + "<KEY>" + "BAMTDENBNC1QUC4wNi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIyZsLNvyyIZEwDQYJKoZIhvcNAQEFBQADgYEAsnA9" + "ERwsi2mK540oPL45mLdOjGnet7+HhNk14q0hvALTYGB1vEjijc+Yvf6mHJGRbiG207BpJ1" + "DWeWBY8TLe4YJXlSrWwx1jD46rCt7gdqXAdLpMo+i35yfQ19ZqeWcRLkspmczoUJLJaJza" + "eLRrnjv62GLJ09KVKpZBGhV3SUM="; public static final String End_Certificate_PP_06_01_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBNC1QUC4wNi4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDYuMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKrLB7XA0PKY0qtSC5lMBvvIvbyjBM8XmANrN9Wx" + "66QxEuloRAz0D5uAu7TnJBv6qNuIPGFl74yusKCSkjEkBMdVpBCfDvpG1/Tz3sALSlxmnz" + "xbK2ytOncbYuYrzvXttx6wkhLrBLlnfuwpZwGZOr/Pt6WwQJWjXxgTNJ6dcgXbAgMBAAGj" + "OjA4MA4GA1UdDwEB/wQEAwIF4DARBgNVHQ4ECgQIv0gg7LxDM+swEwYDVR0jBAwwCoAIyZ" + "sLNvyyIZEwDQYJKoZIhvcNAQEFBQADgYEAgzlxBGGOBvHw20eOzSswMqrHopNMcvwuEO+Z" + "Mr0h8U2/HIiRqKWQaxMyM8A0oULGJny3B/0WtkfVQ2EIibZGiKIjC1RPAB3QmL0vgSyUmF" + "s/LZbzugpJW6jvfov7N4O+u0J5rYniRxa4bgrXa89TY9kwDMbr6/z4oiI8bq3gEsw="; public static final String[] TEST_43_DATA = new String[] { Intermediate_Certificate_1_PP_06_01_crt, Intermediate_Certificate_2_PP_06_01_crt, Intermediate_Certificate_3_PP_06_01_crt, Intermediate_Certificate_4_PP_06_01_crt, Intermediate_CRL_1_PP_06_01_crl, Intermediate_CRL_2_PP_06_01_crl, Intermediate_CRL_3_PP_06_01_crl, Intermediate_CRL_4_PP_06_01_crl, End_Certificate_PP_06_01_crt }; /* * test44 * */ public static final String Intermediate_Certificate_1_PP_06_02_crt = "<KEY>" + "<KEY>" + "<KEY>ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjA2LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDjg5+XWZwW1gLAOldsRshbCXmUCmt1Vs+oZsvyH+6d" + "2PwKs8ydrz+oD0/D8V7cRXucj7q7cJSLhEY1wJoTTgrWeRg1hQioAXzPW3ZkaZuzhpi+cC" + "qeZzN5nPvqK18GWvpffNbUUVfOuaHzzHmhmhgQyZaNG7JHwpWM10UMzMawOwIDAQABo3Ew" + "bzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATAMBgNVHSQEBTADgAEFMBEGA1UdDgQKBAh5am+tkndt5zATBgNVHSMEDDAKgAir" + "muv5wudUjzANBgkqhkiG9w0BAQUFAAOBgQAF0h1iaxxZUp43AjP5gSvbW6JfFRW/ugH9SU" + "n3e1B29LMH3F/ML0joVhPx5CIVpX4nfaYzdeje9+E2/bHMBGSCFeHz9S/KoBLLiI0GNhzh" + "I6MytvPMPRx7hkuROouQ69TnslJiGCcoo+MD0fA2YwO1bCtyLdeVHYhJZWQ2Sg8PHQ=="; public static final String Intermediate_Certificate_2_PP_06_02_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wNi4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjA2LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDF4KSKxo8HvQ59E77LcuLpZ7ujNDjb30KB+EbIuRmy" + "khXAkhq2Rp2Iqd3OhC0AXmhSF+enJq3h0dqyxNWP08SIuK5ia3OIeatl1UgEyukuAnrLuI" + "A7PFUQAGZmDG4OuHv28zza4n/SwfCaKfi8qatIwpwF/29ycB8wYBrHThQD0wIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIKFZV4vjfOOQwEwYDVR0jBAwwCoAIeWpvrZJ3becwDQYJKoZI" + "hvcNAQEFBQADgYEAuj8P5ga8Xv9eFjk4AdRMx/Fj/doRAOLZfs+OnrduRXPLe7CFKDxhFx" + "xYOma8In08cgXVVnRR+2nZ54h5qjCYpskGNx+yZRY8+HW3XXE3KpS7QgTnc/1XshUy9VGm" + "2qX0k661f2d3KnSKiKVKtM/y/j/nNyxPugDz1Yy50NtzQOE="; public static final String Intermediate_Certificate_3_PP_06_02_crt = "<KEY>JVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMi1QUC4wNi4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EzLVBQLjA2LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCitrzXkbO4hAQpBRQE880MFBPq84umX9pyKbV3iMqK" + "Z7HBYwZOvEwGQxG+TX1PIj0Jz27oyvoqpLeMkbn9L3K0BuS0AZKlWIOGPPHWpYTDoQCCs9" + "Mba1evVT/1CMxESsv2kgf49YHMs/6TtxQX0qj5TQzXrkM6CMBc5zyPBDWORQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIxLES0WIVZQYwEwYDVR0jBAwwCoAIKFZV4vjfOOQwDQYJKoZI" + "hvcNAQEFBQADgYEAdQeDAOFys//2xUFwBilhqr32/jh4gT/ijxRjG0msKTYXmWcCQv9Tms" + "smtIMtiwwnByhjTdQAtOmEyDm/CFW0/NBnxlRvqZKt+PRtscpExVy7xnnm2MBITTa+9xkC" + "A361jSDPnRPEOZoKdMRRzNnW4f59m0huibeFNRYJ7y8BnHs="; public static final String Intermediate_Certificate_4_PP_06_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCg0yQG7oewLD2eFfPuj2DPBgT47iEri2IVeS/r5hUD" + "nZhxzT2/+UsQfiS+ufdC2Xq+QAcXFcAifPbvRs9xo2q0uLz26mwSq1TH8ilHLKatKwJ/Yf" + "hcRAfEWDwhLJGRhZ7YrKu8xczZgyxwaeu5m38lEaLIRyaVfVSrw8WhN4z4ewIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQI/dKmuI1u6I0wEwYDVR0jBAwwCoAIxLES0WIVZQYwDQYJKoZI" + "hvcNAQEFBQADgYEAOEcMpdSAVKUzQ1A7LJnWOh5Tul6yXw6qMsdZNGOZ3vYBXH3vHnSHvp" + "MqJQ1JIX/4XSiKF8En5dVI/ooNabgyORpPnLGDvrshvO/09iaDlQXxWRsoGAFhcIe7Ibp+" + "3g6hnBO5U+0pbInioKVYf/1VyZSUK1QQMutshMIye/8gyZw="; public static final String Intermediate_CRL_1_PP_06_02_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QUC4wNi4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIeWpvrZJ3becwDQYJKoZIhvcNAQEFBQADgYEAEJ28" + "g5iyw3ZOqs5ly7O2X0YWtgKK3BnPztxygCUWO1xVy/QbMM5ybAU/UPbJC2pUnkOZMX+h30" + "RYp/kV9w2o15V1hxj2M0tR8fQ0WXudwi20pZO56uHb+WSaETOmPVoNH5efeXsTvtbHQR5w" + "95L2vNeEzJEy1l7S/sasUUoQvqY="; public static final String Intermediate_CRL_2_PP_06_02_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIKFZV4vjfOOQwDQYJKoZIhvcNAQEFBQADgYEApLIK" + "X/YJYhSfn7yLTAlKjnhpH1QDlFeaE6/+uj6j7ZgpK6HBjHOvfwbrjurl+L3ZTLrY1FCL4/" + "SUgXrJxbAyMANlg4Z8u6o73F9cur2gi3sgv5d6FjJ8VwuKYWY2dwZNeXwlWE/W0h01Vd9H" + "QVuctFxzQaJQdQBadw/XqzvLlyw="; public static final String Intermediate_CRL_3_PP_06_02_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QUC4wNi4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIxLES0WIVZQYwDQYJKoZIhvcNAQEFBQADgYEAE5J9" + "wJKAb3veF4GhHeoIgy6JvMsrjv7d7dhT+ZIKq+wPNk1909X/Zo1GXxJSjMaMgkLlXa0QN6" + "LtSJxbyMRCKSJfqTKOezFXirZ7MEQ04FT0z6Hp0m+E2Q7dGs52ZOV3YZBhQUlH+aQ8WNu2" + "6clf4VqBiUYgGhkE95PhN5AAnOU="; public static final String Intermediate_CRL_4_PP_06_02_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI/dKmuI1u6I0wDQYJKoZIhvcNAQEFBQADgYEAKgk1" + "HJ7OW203z9H7jNGxoLCN9bGDKOFcWlWuruzXWOAn+AomjSZpqZkZU1qyKrFaKM320sfn8C" + "ZJPnVWaVMLBLNddDRWUjJrUHtNdnnZEuYPYlRVb0MmwaxHHR0ZBUIaniqoLuvtQIB9N++T" + "bu4cjx33mN6MX0oWr4Bbq7ovPnE="; public static final String End_Certificate_PP_06_02_crt = "<KEY>" + "<KEY>5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "<KEY>BAMTDENBNC1QUC4wNi4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "<KEY>oGBANAr4hFku3Y6jI+vD6JTRFc7ZLL9tIxT7Mq+QcDd" + "rRHgSEXhPL3MM//3ZFXca3w4rXOUVQyANQncywNM3uwl7T9jC0MD2kJ9PsNGQL2bQcSajX" + "jrxT403PVFsa6ZrLMU0hwomSO4nJBLCJj3i1rlX9esYbRNCqzep2OMWgAWRUsrAgMBAAGj" + "OjA4MA4GA1UdDwEB/wQEAwIF4DARBgNVHQ4ECgQIMBvQP4Q8w2UwEwYDVR0jBAwwCoAI/d" + "KmuI1u6I0wDQYJKoZIhvcNAQEFBQADgYEAnmNf+3jJp4mo4YDznASTMnrBBdXuskhnRXSQ" + "Gj5dNq6PxEXM+CmBhaNlnFYcr7UCtcD8XwampfyO52tvAZW5kWQKsxyowVtsxtwkAtj6/f" + "trIeulIM0B1xjyXJshmVST5u6gZ3OegsAyuqyAbo9B1IvkNFOldt624aEG43jq7ho="; public static final String[] TEST_44_DATA = new String[] { Intermediate_Certificate_1_PP_06_02_crt, Intermediate_Certificate_2_PP_06_02_crt, Intermediate_Certificate_3_PP_06_02_crt, Intermediate_Certificate_4_PP_06_02_crt, Intermediate_CRL_1_PP_06_02_crl, Intermediate_CRL_2_PP_06_02_crl, Intermediate_CRL_3_PP_06_02_crl, Intermediate_CRL_4_PP_06_02_crl, End_Certificate_PP_06_02_crt }; /* * test45 * */ public static final String Intermediate_Certificate_1_PP_06_03_crt = "<KEY>" + "<KEY>5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjA2LjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCrUMqMxZ4sSrH6sKv2y6nYKagLvUHaforCnf4z/5O1" + "PeldaW4ANtNPA8SkVBES/zoKgvrLJUmqRi4b+BGhCVqLU77PvWyiPOS40tpJfw7m9pPK53" + "aeaLC9M6rarjdOvF8MkdtytCMU/Ef1NsuJULwEP+XB90k4lHr9EzbgKhXvoQIDAQABo3Ew" + "bzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATAMBgNVHSQEBTADgAEEMBEGA1UdDgQKBAhF0iXZmlIKsTATBgNVHSMEDDAKgAir" + "muv5wudUjzANBgkqhkiG9w0BAQUFAAOBgQCmab7noekyx5TzxAqWoQiC9S/aZJtvLkuH1p" + "KiZnclMpRvIL1CVOukkzLTZXY0EcCHnXuVGjw+9vmiQWGGw8t6TGCXo/CtCo934HGBxOfQ" + "MVysEjst7L7TDQsqxk4j9O8cU/TFWsghW9Ihu7SVIn8RJmknKMB2xkIhcDe8S8dmxw=="; public static final String Intermediate_Certificate_2_PP_06_03_crt = "MIIClTCCAf6gAwIBAgIBbDANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wNi4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjA2LjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCmT7wL9WwWBr1oY9bHIq4IrJOkbOARK3zOeyZSbBBB" + "zxcky5kjC9pamMpyZjga+q0CGd2rq9eUjQ2FXZsBSgf/X9B0/g9trNMebYgGnYmHHX2JK+" + "doyAX+h3afDbZzZ696S0Hw7yRx00+teQe/Gx4h4qKPwbJIW5Bep9SBysikJQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQInXHgY/+onu4wEwYDVR0jBAwwCoAIRdIl2ZpSCrEwDQYJKoZI" + "hvcNAQEFBQADgYEAhlboR5gzYWluWIaFM5R1Ko0/rprrv5BHONRiXjLfAPkzZmd7FLDE2j" + "BlU7s7IenICeST4c7HG5zqBigK1814GG75nq5htCGUnM6pn8/gvc58+ckKeWgbJxC5I/0u" + "olCCs8ORbWIEGWmghGg1USxeI1RQwXGgE8XwtabVibJOVBk="; public static final String Intermediate_Certificate_3_PP_06_03_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "FV1UV0a5lb5BGPW4RGUEbFwsgGCHsfLiY7WmUpC1e6332PZPnrnoJbf28paeiZ8KqcAKZE" + "pGPWKCmFBwBW23q1w/v/CxcXJoBx5OC1yxG3fGH7CZSzc+4Z/+PxLk9yoASwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIc24GzUM6/LswEwYDVR0jBAwwCoAInXHgY/+onu4wDQYJKoZI" + "hvcNAQEFBQADgYEANLxcLvJqjyu94HN+X6tTxGcN1s43kQh8yRGotW2ptuA2jmGlAhI8QQ" + "sXHO0o0bFLBC/Uv0L0YlEJhK1w0ct7Awwn4UYgqupxug2f84yamcvFa1es3osIMJoi0GPz" + "1WDBM711efRtbzvK6t/4fJ01nG2BlMeEbctVqrehuAip4p4="; public static final String Intermediate_Certificate_4_PP_06_03_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMy1QUC4wNi4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0E0LVBQLjA2LjAzMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDNuzSN3BiT84M3Dy6KeTQkMqWNuYGTENWPP8WvQ0Ot" + "ggue/lemC+IqYBtIEYtk3A30eKKnF28WIbPlB3oSykrPVV5dMhYGF9ysOtp4wyETHtzdv0" + "7HyqlMHOCPiFplbwjUSo0uEIRVgS3luBJi9onTpcn97/i0S7VsM2nooooaowIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIDjpr8w0dRq0wEwYDVR0jBAwwCoAIc24GzUM6/LswDQYJKoZI" + "hvcNAQEFBQADgYEArE6qUMnjXiB5eKiAFc9Elw1dYsQArtnDQAfFGtShDulxYKq9+pxory" + "4kTMUZZCJc7awEC11tdJp7xJGcpjCJl4I2wBcHiCcVcnwQijqM719PqoQKydXB9MSrXqmU" + "2CyakSzBpb82VooVNx0IZ3h0nXQSE3V0qSXXCaImJcOIGMo="; public static final String Intermediate_CRL_1_PP_06_03_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wNi4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIRdIl2ZpSCrEwDQYJKoZIhvcNAQEFBQADgYEAQrHK" + "VV2MJPJLNdPoEuqFXRTEclSmYhUWC5lthK0JnKUbCUj2cMAku2UdN5sRgVG0475dXV2nvn" + "huxy+IQVt5OJ+PNZ9MYZlC2CfYsBiW9DEYMA603XhVvX/bxx80MwxNby18oyo/V9ycSyJw" + "XzUmzYRUtohHk39r3eUSAt5H7zM="; public static final String Intermediate_CRL_2_PP_06_03_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAInXHgY/+onu4wDQYJKoZIhvcNAQEFBQADgYEADOEh" + "jV8V8y17mFstkVwigOAKURbi7sD24RkLd1QG0Bn21JiwpkGY8Z4vetQps+VX586xKzz6v6" + "Sj+TJk3jfHCiEAk6a7PLxRcVCCi6y70mzEBCwn6fS5NDfxzxYYLgq+dlUiVwqXsHksEvUz" + "2Z5dpuLhbUGxHiqazNE9iq9pEEE="; public static final String Intermediate_CRL_3_PP_06_03_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMy1QUC4wNi4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIc24GzUM6/LswDQYJKoZIhvcNAQEFBQADgYEAK/zi" + "r7ASgtWA0xGQVrqhHsXH9bdaj+FceW6ivoXo3z6xCFLvzu2uenEu5g849+YI0KMomHsDAY" + "tX8qO3XEaLGchbhIfywgRVDlSF8ytMKhJTS05R/vZSZAl+eoT3mC92Grihsd3wublyNZ7a" + "d925Py/oFp3J+geUkKJQK+RVu4M="; public static final String Intermediate_CRL_4_PP_06_03_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDA<KEY>1Rlc3RpbmcxFTATBgNV" + "BAMTDENBNC1QUC4wNi4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIDjpr8w0dRq0wDQYJKoZIhvcNAQEFBQADgYEAcBag" + "81RFYMBAf8aRP5VXPcfu0OxgJvVE25ZHGLCkLD4TPKAXMjZMHWrf34+5FW7aigDO1YhGA+" + "2zVtVj8k71DichiCCGXQvH50AqFgeNXNQwn9WcpQ8rRkfmyhlccfeM+MzHI1giRw/RjvCN" + "0dfJL9g3c7peW+VCKn85REZ1ne4="; public static final String End_Certificate_PP_06_03_crt = "<KEY>" + "<KEY>" + "<KEY>AMTDEN<KEY>wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDYuMDMwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKBSOacrUg5H5yuISkqmJuQcK2ao+Ib0FmIKCuek" + "8mm2HEiux+K5/yIAYsQnz9eDKzKWaS73exPniKOXABHaL6dxsptbdBqWB6II2kIl0BFz9P" + "82qjz6DMwpUhj5Pwfy5q0Bz8grTe31ZYP19y8AHgcWna+eiY4fNVXVkIEJOJ6tAgMBAAGj" + "OjA4MA4GA1UdDwEB/wQEAwIF4DARBgNVHQ4ECgQIaZQ3Q55so58wEwYDVR0jBAwwCoAIDj" + "pr8w0dRq0wDQYJKoZIhvcNAQEFBQADgYEAnNYKc2pSFZ9PtR4gQyVI3j+gQ97tcWu6Alxm" + "4T48fSb2KtFGuozJyCv0aYjtuZ9ava9r4v04lyFPoAjWYbALHC9F+vz7JLNr4VstuMdy5O" + "ax+PvJjKGACSXD7QjXJ48qvm+v8OnMbkzf8+rY3LoTJ2KhXo9Ey4+UmU/YuZ0PXuY="; public static final String[] TEST_45_DATA = new String[] { Intermediate_Certificate_1_PP_06_03_crt, Intermediate_Certificate_2_PP_06_03_crt, Intermediate_Certificate_3_PP_06_03_crt, Intermediate_Certificate_4_PP_06_03_crt, Intermediate_CRL_1_PP_06_03_crl, Intermediate_CRL_2_PP_06_03_crl, Intermediate_CRL_3_PP_06_03_crl, Intermediate_CRL_4_PP_06_03_crl, End_Certificate_PP_06_03_crt }; /* * test46 * */ public static final String Intermediate_Certificate_1_PP_06_04_crt = "MIICozCCAgygAwIBAgIBcDANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjA2LjA0MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDFoR/YTJlGYenu2IRsTiT6jwIA7yOnFbM9JXcqYIP5" + "jSgtn/wVztPHgVWP+582foXJ+oEcThQVZ+RBXYt6VU5o7eVCsGJjqMd0DbRzTO+poelVoY" + "1UEJMrKG0xSEex0T6XLQ+jPU9o5tlXoLYsXvpvbIrCJ0o8kuk4MWTzenDKJwIDAQABo3Ew" + "bzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATAMBgNVHSQEBTADgAEAMBEGA1UdDgQKBAgVwXynYDSYEDATBgNVHSMEDDAKgAir" + "muv5wudUjzANBgkqhkiG9w0BAQUFAAOBgQC6MnYM9cY3CNb7/KKZvoaSwF/Se5iZYnbdPn" + "WCnKydnN1AhlDN3kEw0gjTmZo/MkvPqku2aPzg5EiZ0eyeJaR6a4aiICU9z/Hiet19mBF6" + "BtAUdt0fJ7aL5WPAc4BKXUbONd6vkQNv8uLcBmsqZ4wXDj7ZVBMGKcuDq7uClb0xYw=="; public static final String Intermediate_Certificate_2_PP_06_04_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>sBKju5d791Psly1Xyyda8KQ0BKPgGed6jNKb89JzuEtPBov0VMzskqwR" + "irjaDCwYKtibiDe+T/kEN9Sq5pbexHcaTbAIeQrAIoSUmGdQ/Up6PYplb0jwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQISKcQDqdBecUwEwYDVR0jBAwwCoAIFcF8p2A0mBAwDQYJKoZI" + "hvcNAQEFBQADgYEAkAQaOoZYAZOCk881Ro+SIclAj2lp+arAkWPP/gwN4/0lpH62eWqlmY" + "okWRBjk6+iwCgRxQ56uUjJhE08p5juZ5V32ie3RW+S1ZBPtL/T/+Tqp9HNQQ3GjW1yc/yI" + "sWQxrd7QKzTER37HBiOr5WjEjn+dzuWlJtClcQetqMLtMgM="; public static final String Intermediate_Certificate_3_PP_06_04_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMi1QUC4wNi4wNDAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EzLVBQLjA2LjA0MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC2tnVj8KHGCm8XBPvDYWZMp3yOKQxuORze6a764qIC" + "hkdO7hQbgJ9YiuAF/y62W17FnbhKPX6ninaZG0N77bznKvivSC3+T1jIVhw+kpxRh9MRya" + "L2p+zHJEyO/9JaKWzJZiVi4kebW+hwNgSZc7FSYsAbW7lr4ujDei/yn/AJEwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIaAEiWf4JpfQwEwYDVR0jBAwwCoAISKcQDqdBecUwDQYJKoZI" + "hvcNAQEFBQADgYEAHNsZDCWtOqt741IJNA9OwpymTA4ES1BRJquEvGj5+4RH2pxi67bYd1" + "kWTPF1qFC2R1sugSNhbU0wOBMdKUJtKWNacPsK0HbD7CPqt4THOcMXFO36b/2gqHqy9rc/" + "slWuIwbtT/tEC+Mk67GEATWNPifoPT7TjWHM3RhsDnagZXw="; public static final String Intermediate_Certificate_4_PP_06_04_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMy1QUC4wNi4wNDAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0E0LVBQLjA2LjA0MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDgdk/smDJ5yZYJDH4SG7pIDCzGNZeLO9RI3ybOx4/B" + "M3YQu3DDFSOv8kq6PgL8ThC8Dk6t1jSbT8QVzaGgx0KMV3p6pIMdaVNkOjVjUb+L0nXVfr" + "XYpFLON6tZLgh8oIbiz4KznKmsxo6VdYwyUeHmkpGcL5y+8qLspCNdRJnDGwIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIgSY376EamQowEwYDVR0jBAwwCoAIaAEiWf4JpfQwDQYJKoZI" + "hvcNAQEFBQADgYEAEztvmGSVnDGGeNlIoR+wfRM8ndJogvUxLBZm4N96mDZ9Y+Nr99Dqvw" + "+mMI3BU0miA5kDO9aFrKIgow3cpruoedhnBUsxTfhrNaFEwp+ORUb3tWn7sSxLfnTim4Vq" + "y6j/EfUK2CS4ZAy7J5BADWSqDezPnrb5UaY1JFKMuLyGRac="; public static final String Intermediate_CRL_1_PP_06_04_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wNi4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIFcF8p2A0mBAwDQYJKoZIhvcNAQEFBQADgYEAPlIW" + "SxwW2LE8qxeD+M+HypNwai7j9XxUA2MhBbGVnsrhH+DKX5VeyP/nyZn2hBoGWhs05IpG2P" + "S0odnyhbgGSXSj+IOfkZkVT0BmuEJmqv75R15LBzeyONks+eSEhoOIGAaIN4WgJ5mzjSrI" + "ddDu3c4s6QO/OFVrNF1F6e4laSU="; public static final String Intermediate_CRL_2_PP_06_04_crl = "<KEY>" + "<KEY>" + "BAMTDENBMi1QUC4wNi4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAISKcQDqdBecUwDQYJKoZIhvcNAQEFBQADgYEAE5wt" + "y3+jVnr8de/Yi0LV70v3JDHimwG2pQcuDRhR1NLPr4oC+2uxMqwxVzdHITDb3yI2ZT9pVh" + "PV3UvX85avMdA0/JyaMWSKNpbSah1eNfMwMBY2vzh1Q7f5n+7HYYM+I2kz7HARPvwsLP9d" + "j4mY7Kq7uiOFdnQzJ6LWjm8qEMs="; public static final String Intermediate_CRL_3_PP_06_04_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QUC4wNi4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIaAEiWf4JpfQwDQYJKoZIhvcNAQEFBQADgYEAOm2f" + "m3IdcDnIS915tEZzDmIbTFPBkIn0wjUreZKb9uNxE2a8Jixq+UP2uiyYWiWmXnRdVB1Gsb" + "ofc5f8ctNgSPVTSYB0U5apIauXjV0y7WMUrLNrDFa5m9lxLRhF9kvXVL8zPhVfMpujnXre" + "A8WS4UjDMuveyQL6yASGoZvB+Ps="; public static final String Intermediate_CRL_4_PP_06_04_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBNC1QUC4wNi4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIgSY376EamQowDQYJKoZIhvcNAQEFBQADgYEAznK9" + "ekskl4uWU+2Xqp3Pj14wvXuzfPAqFlHR0jl5By7T82JRiRa6LGX6T953vcwwJBsYG1hMqH" + "pgbnUGB8APQ6YNXN+7ZkudaG6fMVX6bCr8zT+nVSj7PHIK2VFsC1Jpm5SoQMHH6DFit/oH" + "tm4tdV8+nupMBQn1ZtxQHgUUF14="; public static final String End_Certificate_PP_06_04_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwC<KEY>wNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBNC1QUC4wNi4wNDAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDYuMDQwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOCVJmtrW8Z2WGGRNjEgyp2NJn1xaIVDwlxL4C0n" + "UAPpo1WM/rarQTYejT2Yo8H39TdRfiAlggF0Qsce0W//atey8WewGsFlUem6a4OFwg1X2h" + "CN/COL0eC4a6lwkdOKmqgxSyWNWeKxXRTM8+EYQIem78uY7A8XuzVUmOpzYWoLAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QION6UOZ2Eky4wEwYDVR0jBAwwCoAIgSY376EamQowDQYJKoZIhvcNAQEFBQADgYEAXota" + "1N1UrMxj2a/vdII92Wi8uEetcHo9vmiJVYxwPFkp+qo1q93Ww8Qnfp7xzaZwLgVoUOAF8U" + "TRUVnzqoSwmRrfyEMfrgej3eiBjcU+zS9mNlx9mUUSLmlY+xMeejyVDCntRn6YJWWLesVq" + "eFOjyNux97/XnGT3T1w0J+wShu4="; public static final String[] TEST_46_DATA = new String[] { Intermediate_Certificate_1_PP_06_04_crt, Intermediate_Certificate_2_PP_06_04_crt, Intermediate_Certificate_3_PP_06_04_crt, Intermediate_Certificate_4_PP_06_04_crt, Intermediate_CRL_1_PP_06_04_crl, Intermediate_CRL_2_PP_06_04_crl, Intermediate_CRL_3_PP_06_04_crl, Intermediate_CRL_4_PP_06_04_crl, End_Certificate_PP_06_04_crt }; /* * test47 * */ public static final String Intermediate_Certificate_1_PP_06_05_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "Hg3XE1439qutBdmWvGUlRF0hQrd9Q/Ubr+PjEzP3a0EUmXo7LYuQKMcFsC4wIDAQABo3Ew" + "bzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATAMBgNVHSQEBTADgAEHMBEGA1UdDgQKBAgha8GqGbO1nDATBgNVHSMEDDAKgAir" + "muv5wudUjzANBgkqhkiG9w0BAQUFAAOBgQAEG5C3P1A/MYpNJ0qvi26v04GGUWDQWRW1q9" + "1392XpAxDdv7kODf1FUMpfBpcUblagxrX7Npthv6/6W8poBTjvJuq5BfnnOMQrCwnsNfRy" + "Y7b1mAZIvcOBhWe+bFVqRLUqZ+JseWkw0YgZIGtX41Znwl0VcFQKJ4lNkuaBgXXdGw=="; public static final String Intermediate_Certificate_2_PP_06_05_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1QUC4wNi4wNTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EyLVBQLjA2LjA1MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQC36j0YkXZZSw3qQaxD0g2BfrKYperkGjVAfLwOtOxB" + "0A3Ufx2ECl/MqNOvi/QWlTkKwnrqw0aEnD25iS1DFM4jMZBmdfJg80oa+y6TJoZcIb+3bv" + "SK5o3ArCFWkhTHHggIIY3H9dQOgAeYQF57Vb0iu59GPfnYJO8y8ZpxGIYcjQIDAQABo3Ew" + "bzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "<KEY>hU<KEY>" + "<KEY>" + "MgtBSwPnXqMTUAZpDETyeYvcgM+L2tasB26MSy6IttSKsaJpHPCP+BIs0jji5xosuCX6Cs" + "wI2gE/LjF85rjZnldrlDShw01DlcmWlWwudit/ieO71Xc8i0F4EhSaTUJX12po5Xkg=="; public static final String Intermediate_Certificate_3_PP_06_05_crt = "<KEY>" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMi1QUC4wNi4wNTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0EzLVBQLjA2LjA1MIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDFWhChPQNFYQpLBmVmXSGF2py1wcfhZgZurv0E5AgE" + "BZwBo2bxSeC36lBQyR3OABGI4nQoEegSQWwuS2Pk3+emG2MZ8R5QINAkMlAKTp5Gj7KTlm" + "3VVJRx7/VduoFx8sZPjkpvF1bSL+KOH4UZny1xqqTj4bJ+oGu58INeSNVa+wIDAQABo3Ew" + "bzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATAMBgNVHSQEBTADgAEEMBEGA1UdDgQKBAjN4PvsHY9+YzATBgNVHSMEDDAKgAhU" + "poGZzfV7EjANBgkqhkiG9w0BAQUFAAOBgQA8KmWbAQOnM59zry9TNtLbA2P5y8R/sO771S" + "yQYcu6undt9t7UEiOepDp/z3CGsITm9RdtXAobZ5ZqhW+3Ll+UnML1itiCytOPbfC7iiUO" + "S5jviQnpgJncZD2Lp65yNAB7lMmMleFO<KEY>; public static final String Intermediate_Certificate_4_PP_06_05_crt = "<KEY>" + "<KEY>5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMy1QUC4wNi4wNTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDV<KEY>lMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "<KEY>" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQDxx57R4j64xdbjpTl7reLby/T2ym4rESC90aBkC2/E" + "/YUSjsuGG9GiHEVgoGzoQGQNQV0v9ZMIvuoI6q7Fd6VZhIVGE0MGzTFNA9QEEDGPc10ZxC" + "Gyh9mZYp77PMuhQ12Iv3aDW9KNTr09+HyhK7d3Se7toXLwjE5pKt+A4ZvBFQIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIwmq0fugIX0kwEwYDVR0jBAwwCoAIzeD77B2PfmMwDQYJKoZI" + "hvcNAQEFBQADgYEAbAbRorTyh6zfAmdg0lfeZyCyW9k4NWfhUs46iSOl6lkZH8c1eoAF5/" + "q0pOF+CtI3F9VMhfUXChEbVj7QENctU7kDiFe8300OWD5h1VUi+WTK4CG7B36/BjkrVOuG" + "Os76P9l1WaC+/WRZdcqgFMfPjpn3R179dImBDwZiCMMbVqc="; public static final String Intermediate_CRL_1_PP_06_05_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "wxpN+p8N2HqmhFw8w9LCeoR3Xa/uaqgqh4i/VkDuAC4Bi7VbIO6rcxDO2uAdZgNhb/hnRq" + "cvKLcy0vrovCa2EPHcFo7dJl7si2q09EeuHT4+lZt/Ek/VOkwHhvh2o6yEvKOGXCnF9hZr" + "8YbOIknboEz+tRfxoJArRBwpJkE="; public static final String Intermediate_CRL_2_PP_06_05_crl = "<KEY>" + "<KEY>" + "BAMTDENBMi1QUC4wNi4wNRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "<KEY>" + "dfU4yAHFLH5BgeZkYh0l2lZ95af+E/67MSCjQSF7RWWWTffbDMc4HmiRlZLvQdltyGCKmi" + "kuzcPP8vyYOBQmoIKQ6c2LItBjXVavLdpe91yCOhCWXVVlnMFq5ztrvBEpfO0GVUOnPWfG" + "1Ugit3SEd4DbhYFTBYHbbOKRWsU="; public static final String Intermediate_CRL_3_PP_06_05_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QUC4wNi4wNRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQE<KEY>7B2PfmMwDQYJKoZIhvcNAQEFBQADgYEAkiW6" + "h9a8v+IITd+p0jxukj2FYfmED59ZXAlYhQdQAGlPE71rOXn6ZPURYoGf7qlmBwQffpksOb" + "Byb+PX+CBTUNXzhgTzD7ifM9xOhCEKVKai9acQfvokU56OHwfq5AnkRykLZ7IdvdYCP57k" + "ynrNNV35dsMZXg23/PpreumlOkE="; public static final String Intermediate_CRL_4_PP_06_05_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIwmq0fugIX0kwDQY<KEY>" + "MBWyoPaslaLpAMmJ+D6kmmKAdRYurA0okU/QP+0W+YNPV4DducAQUDy8Cg3RkpRK2ze0ad" + "l6TUW8g83hj9TXSBp+XZuVvzerMCjOeBqhskZN4Ly8101ZZmMmdYdSc3PEhqkme6iZzjwB" + "ZooAN2dIYjuBj1c1/t5qH80CMAI="; public static final String End_Certificate_PP_06_05_crt = "MIICbjCCAdegAwIBAgIBeTANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBNC1QUC4wNi4wNTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDYuMDUwgZ8wDQ" + "<KEY>" + "wJ/6dXy3HK2UETkRBK7UVSOYq005EbO9s/3oR3zt7QTFifvRTsIjl1L4TCLC2a8ApBr3BH" + "xmBWcJDf427Pk1fm5qDdEmZnpyIlpKaKIiBcdtwZfjr0lROL8RNcvgtJPdu/ndAgMBAAGj" + "OjA4MA4GA1UdDwEB/wQEAwIF4DARBgNVHQ4ECgQISjAUfyAwSA0wEwYDVR0jBAwwCoAIwm" + "q0fugIX0kwDQYJKoZIhvcNAQEFBQADgYEAC6Af3cJUh/IQgWdbC2Vmk96sYjDlAsbA2keY" + "J0bgBcNaIVoJ/W0B3rSawqSU+Vv64p7kcuAl6cbvIXPB++19V23jj6HUs1JxtPJZ9IWkS/" + "FRakv6lD7+j1OdzJvDR8AMZWmPFHJdQnJwQ+I1YOU/O/ShawOnGCmihpIULUINFhk="; public static final String[] TEST_47_DATA = new String[] { Intermediate_Certificate_1_PP_06_05_crt, Intermediate_Certificate_2_PP_06_05_crt, Intermediate_Certificate_3_PP_06_05_crt, Intermediate_Certificate_4_PP_06_05_crt, Intermediate_CRL_1_PP_06_05_crl, Intermediate_CRL_2_PP_06_05_crl, Intermediate_CRL_3_PP_06_05_crl, Intermediate_CRL_4_PP_06_05_crl, End_Certificate_PP_06_05_crt }; /* * test48 * */ public static final String Intermediate_Certificate_PP_08_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYT<KEY>DV<KEY>T" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjA4LjAxMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCp2vHVX08nyKe+S8NPkNJOZ9Xng22TbYXhUHtXw9yv" + "ZmPkRhwDrZfBLXZcdZFixidkky3kCzv8Q3aPyPByM2ozH+AHJzEMbwifhyvUbANcS+Jts3" + "lsZHarN7VyiXO+8J2OtYqX9qzmrAOHGleB2cJopEcmAMdrzgt1JIo98SUs4wIDAQABo2Mw" + "YTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNVHSAEDzANMAsGCWCGSA" + "FlAwEwATARBgNVHQ4ECgQIoRYqHNcbLacwEwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZI" + "hvcNAQEFBQADgYEAXchRFC94Pl25d3Kl4wBcueQLyWPRuH9zS0ZPLAqKLcWVdcg3fYMuJ5" + "SypMMpxLaVjN7xq0KjML1gLiPQPk18iA2TOAUMblvjUl1uFzDdD6SqQidEZh2h3wxFtbLP" + "U7qBBki7i1+Xn072Bpn2paw/vlh4K+ut0tFQ2BAhqVnQGJ8="; public static final String Intermediate_CRL_PP_08_01_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wOC4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIoRYqHNcbLacwDQYJKoZIhvcNAQEFBQADgYEARyX9" + "2+LoXD2fIAACBMPDgds6m3Equ+Aawlr0kuppPO4ydCU4kiEgtVGK+kY5GzP6fUpAKjC8mh" + "BrozojhAbkJekDoN0BIJ42Iab70VmdWXRQhPsUDhQwEt+9eSgy+HfiFfpcL1VJx8uY4XMh" + "VB3hmapIe99P/T2QkZ+Pl8j0MgY="; public static final String End_Certificate_PP_08_01_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1QUC4wOC4wMTAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDguMDEwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBANYtrtpgxNl+9jF3TN1B9bSEGQci+cQOKpFsmrtF" + "AyiGBxKONgGSgSFFuFIhyBKZF5ROaKX1P8lsQkrpnuybUi+Z9ADdyoaLUDD/z/kp5sebAZ" + "ujmF8HVlqHYj5Ls2smS9EdSN1zgPTXIOTeZd/lv1iFppRZv6cBqlaoapQJsb1JAgMBAAGj" + "UjBQMA4GA1UdDwEB/wQEAwIF4DAWBgNVHSAEDzANMAsGCWCGSAFlAwEwATARBgNVHQ4ECg" + "QIZjcOdw0ZTCYwEwYDVR0jBAwwCoAIoRYqHNcbLacwDQYJKoZIhvcNAQEFBQADgYEAarsn" + "13/g0vOKxy0okOp2JXEsPdsP7aWnCfR8N4+7gFD6dVnkgCIyc5Kbs7MbhB9gtIxYhHOV9W" + "MaW9QAcBH+eXciFDfQBfaMBkL34ssE/TsZ92r/bhBwKRcH54f96G0QWUnoNMt4U/1j2mKn" + "faFirltqEPUu9mv4FiQ0pNT9yH0="; public static final String[] TEST_48_DATA = new String[] { Intermediate_Certificate_PP_08_01_crt, Intermediate_CRL_PP_08_01_crl, End_Certificate_PP_08_01_crt }; /* * test49 * */ public static final String Intermediate_Certificate_PP_08_02_crt = "<KEY>" + "<KEY>TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb0QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMF4xCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvZDEQMA4GA1UECxMHVGVzdGluZzEVMBMGA1UEAxMMQ0ExLVBQLjA4LjAyMIGfMA0GCS" + "qGSIb3DQEBAQUAA4GNADCBiQKBgQCmAgNA68ABUEppM9Oo3guiGvguvtrWQzsQIJfMBrE4" + "/Scwc4SPK4PiJD+kVwtXinXpVclBMQge10uZ48lSJTihfZscJw3RSHt70H4CpPQm44QS7P" + "7fQqpcZKZvMWmY6A8jju3Phbuq2WgJCIxxVw886GNIAXW8C4ZFmXCjwiGGHwIDAQABo3Aw" + "bjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAjBgNVHSAEHDAaMAsGCWCGSA" + "FlAwEwATALBglghkgBZQMBMAIwEQYDVR0OBAoECOhZ4RAlqGGcMBMGA1UdIwQMMAqACKua" + "6/nC51SPMA0GCSqGSIb3DQEBBQUAA4GBAGEVSOcNaUu50f6AgGBtz1MDdRiHe08W/nzCNn" + "0K1/UqrIXVJ7IYgbOLkL3cdHy4PdngCyEblzl5Cwp9chh2zL0PTUbV1uJIBW32ks1HuAVQ" + "FTZqx0iuopY5AqRCJVDJt4HB5PKObwnmLPNWicI4Juap13j/Tcnw1EP7E7n6OejC"; public static final String Intermediate_CRL_PP_08_02_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>jBAwwCoAI6FnhECWoYZwwDQYJKoZIhvcNAQEFBQADgYEACLHw" + "iDARFoF4GauIHnoZlfj6nlOHAFfNSXq06Vvl713bsoAiOSV+2goZjRG62uxhampE+gCdXx" + "1nwhKQ5R5jOGGOxgLtBFNZwKmD0KiDOSvfIVJ0kYCcaB4mSm0a/7pcCPrrE5ofvkmTW6Wx" + "k/YIuBZdDoqZC91v4tnu0fSch9Q="; public static final String End_Certificate_PP_08_02_crt = "<KEY>" + "<KEY>" + "FTATBgNVBAMTDENBMS1QUC4wOC4wMjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDguMDIwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOJsz8ys71e8UB+VDTBAocVQvADiqh0LjdML3pET" + "B6VvikiHgbB1PJufxDses+v0WD74ChZEa/octNcMFqMgBlhVBEfvbyGTjiN97LzdZ7SPyd" + "DsDulqwBG9sACryUGHqwHYnUbjOqsThOXFB8Sg/CGGawpZAosm2AuH2gqNvNuJAgMBAAGj" + "XzBdMA4GA1UdDwEB/wQEAwIF4DAjBgNVHSAEHDAaMAsGCWCGSAFlAwEwATALBglghkgBZQ" + "MBMAIwEQYDVR0OBAoECOiMLE2l5u16MBMGA1UdIwQMMAqACOhZ4RAlqGGcMA0GCSqGSIb3" + "DQEBBQUAA4GBAFf4BCbNtduwn5InkfdtFbQOqhPLAn/5eIhxhVhUu7TekWT7ktdaVQFzGF" + "G2h1+gXgFP+YKjJy7kGzEVQjlWtuC0l74EwybNHnYAoDg4itKe+0OSNNXdyOmn+i0tE0nx" + "sWN19VvhLGFC8p38gd0oDr1ziYdg0z2Mx4IlMDxl7QhT"; public static final String[] TEST_49_DATA = new String[] { Intermediate_Certificate_PP_08_02_crt, Intermediate_CRL_PP_08_02_crl, End_Certificate_PP_08_02_crt }; /* * test50 * */ public static final String Intermediate_Certificate_PP_08_03_crt = "<KEY>" + "<KEY>x" + "FTATBgNVBAMTDFRydXN0IEFuY2hvcjAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "<KEY>" + "<KEY>" + "<KEY>iQKBgQDKZDgBum5Ud5i8HWlCKInJ1x9goZ7TQJ+LdfA9iGU1" + "47xJL5eFcERWy4dr5wM5GNRW/DHXlnA/qsRVE29EuRh6qAVgcPGAfmJxz7s5yhmErfmiQ3" + "0rh6+pma/EhcjntXqwIqnk1qt6mEk7x9UKO3ksFCVsDEA67/dvownjcZB59wIDAQABo14w" + "XDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjARBgNVHSAECjAIMAYGBFUdIA" + "AwEQYDVR0OBAoECGtTrZIwYYHbMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqGSIb3DQEB" + "BQUAA4GBAM3t13xJJraRiJDAwZFxhTNR570wMdSRiF3yWSRtOjEv8NTVFj/T1oJJ8h9Gqh" + "hMpTTHU7uGCyVB9S1HCelmS+1zteKr0B+WVzBl9yuhvku3farz6zgIVK3v5hQ6xC4H4Lac" + "NDhTTKBkRfDf9KskFoxJ/AGxPdZtIEC92DFSblQB"; public static final String Intermediate_CRL_PP_08_03_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QUC4wOC4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIa1OtkjBhgdswDQYJKoZIhvcNAQEFBQADgYEAcUHo" + "D00X/pd3D5KGa5C6dY18RsnUovkjUkegGTpbhQfmYZIdBatj7Kv75FeUJ9UpqCUjxHgdiE" + "EVy60NLVGP2VRuJ1m8vfDz8hu5PaiVjneQoRw2M9ieBnz3PjSETDdBGJLWHyCBZbp/W2+0" + "iqcZK7Fm9O5EL4PUO6QIwuH76q0="; public static final String End_Certificate_PP_08_03_crt = "<KEY>IBAgIBfzANBgkqhkiG<KEY>ADBeMQswCQYDVQQGEwJVUzEYMBYGA1" + "UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3Rpbmcx" + "FTATBgNVBAMTDENBMS1QUC4wOC4wMzAeFw05ODAxMDExMjAxMDBaFw00ODAxMDExMjAxMD" + "BaMGAxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9VLlMuIEdvdmVybm1lbnQxDDAKBgNVBAsT" + "A0RvRDEQMA4GA1UECxMHVGVzdGluZzEXMBUGA1UEAxMOVXNlcjEtUFAuMDguMDMwgZ8wDQ" + "YJKoZIhvcNAQEBBQADgY0AMIGJAoGBALsXEPrCg91CObTl5OrHIB5GshIDXgqBmjzxfWPK" + "ih4STWeBe2eIFO9pONXcM5lstEu2XLBPP6QBMUMWOrphJejrJ3eDQHs404bBnt95O/x17i" + "665CZtg1jUqoO1kOBOComx2AJGZ46RdBExbfd0tTtdHWtRhMsnQchI+WtEyotdAgMBAAGj" + "TTBLMA4GA1UdDwEB/wQEAwIF4DARBgNVHSAECjAIMAYGBFUdIAAwEQYDVR0OBAoECEWZkJ" + "TYQ3z5MBMGA1UdIwQMMAqACGtTrZIwYYHbMA0GCSqGSIb3DQEBBQUAA4GBAHki/TrpHiKW" + "gvERhguQ/uOqHHZNXsog+fgGVFFMOWwJ9bq4aHKd1fDZpyZF4vBxW7llbhuSt+ob2TNlkR" + "wkqzfGL+3xOTKNRgzDwJcil8akC1N5uBftrQk+eL7rM1PezWRM7fIbpmv5ZieIVswtTPF5" + "1Rl3G+JXUBy9E95espls"; public static final String[] TEST_50_DATA = new String[] { Intermediate_Certificate_PP_08_03_crt, Intermediate_CRL_PP_08_03_crl, End_Certificate_PP_08_03_crt }; /* * test51 * */ public static final String Intermediate_Certificate_PP_08_04_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QUC4wOC4wNDCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsrM3A06j1zDz6VuZh+O2UrAPcKtwSA6KxTShUpgr" + "t9UB5iIAEvxcDTwDlubEv/cJjDcFj9N57otzW4ppnuT2ztE4ROmkNb0xL6u00deS1yGjXB" + "wy1G9g8bYDdAXOJlv0tjHOBqXlyKoMny82BOBL2vsCstiqxl14Q3/wBD1w29MCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAMwEQYDVR0OBAoECJiAkexK6/c7MBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "<KEY>AA4GBAL4xwcpXZQPTTPYIQ8CMoVla/5P1x6BPmPqSkvh1D/o4ds9Ll9kHBz" + <KEY>" + "MRP9keY/DURRf9KitO4glOawtRtYMq2BeeJk1xusY0KqEnQr"; public static final String Intermediate_CRL_PP_08_04_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wOC4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAImICR7Err9zswDQYJKoZIhvcNAQEFBQADgYEAcN3a" + "jIEcXsQatb0fvVcFnO7d7lzNtgbqL3MtaqJ/PjkRJ/rO7JAXQRwdajUZF4ECHylZKE2HUG" + "Dk+vidV98T8mNmb0TEuuLV+J1G0q8ezMXRJtDt/2m3y1VBireXlEMd1DdgpsDdCQ4va+XJ" + "qv0TvVhfxWry+LrVb6Bf5ItexXg="; public static final String End_Certificate_PP_08_04_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>E<KEY>" + "NPQZ/j44UT2C6rl1wZwugCY0sR6mXR/P/NR7czZvg4Tt6lwcNtc8PeafFMUeu0u0Kg9uWn" + "fzQQKeIgRVcEzGTGMPGWXS0ed6X/1+Dj8A+T/tqXKUtM3Jpe0pCmm9CIrYCXLPRQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAQwEQYDVR0OBA" + "oECKm9IOyOM1h+MBMGA1UdIwQMMAqACJiAkexK6/c7MA0GCSqGSIb3DQEBBQUAA4GBAEXy" + "dlTkkZaYK6sUJCiPeCPxfj5cdo/G4RGBImMJbTeDyVTvXSH9G2yWUMqBGnYLrwdJJeXjF3" + "89miJgnJ+1r/r3r2/NeAUuJDsOHRMFh0KXFmgubyw/kGsZBe3279hDnND8ZjfQBmKQD17f" + "PycWTTAC5p6GM8tGERiDSnMc5rmm"; public static final String[] TEST_51_DATA = new String[] { Intermediate_Certificate_PP_08_04_crt, Intermediate_CRL_PP_08_04_crl, End_Certificate_PP_08_04_crt }; /* * test52 * */ public static final String Intermediate_Certificate_PP_08_05_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QUC4wOC4wNTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwH2d+D0pH8y4QJAPpE0s2oWucV1jlE4pBMGNNPJ5" + "FIRmyRCt90IpzmK/EuqT6iSZYd9hIB9wa180ByN67PK1z4loLFMUL2RmbWeAFlGy5eEFOy" + "4d479qfy6JCOzt0TKhYzhukLUqGLa4DDTzvnnUx0o86aLvGq0K5s6DRlNyc08CAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAMwEQYDVR0OBAoECDSeuxr4EVgaMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAKoGi6qlODB8Lc86PtGXfBhW769jB8xzgmENE59sqNBEvYa/oK9Xxm" + "1JX1OGEQMq/mqwZXg6hSczpexCIO4tUH8QKTU68yvqcZoZCDV8FLM8aEUPtUoPIpluhAtN" + "scGfb3uXoV9fg7q1Pi5YlKMnNrDIq1tH1CAGKMDRrjW63Q8C"; public static final String Intermediate_CRL_PP_08_05_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QUC4wOC4wNRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAINJ67GvgRWBowDQYJKoZIhvcNAQEFBQADgYEAv5Hs" + "nYPZO1fGC/Z2lIbbUKjIv0+BrR9HbG+b76wXeJTVxfXMlZe0cpOR/KD29DyxI3G4IedHRy" + "zL8iCDWYbA86arJzl5GZJ1MC2A586vNn/6wiiT6nP3iMj2z/nyvan8L30KNBm9IDXQExOu" + "PNE/wOWYBxxCjg551fpXfJKqDIo="; public static final String End_Certificate_PP_08_05_crt = "<KEY>" + "<KEY>2ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUFAuMDguMDUwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVBQLjA4LjA1MIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4BZFTwOqI+71v8CdiYbe7x0qYveN524h6+iLh" + "oEqvzuVKVqvQgVSaSLPcMhoCGDv3nqyP57Znl/3I09vLU6F4HKLtjO9E0PZu8EXOKLjeWP" + "XmJQkdHfODj/TrrWSsrdorl7s7gdWEUFlbiWvUVUtkqLNbGLJZ5Q1xZvBRLS7loQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAMwEQYDVR0OBA" + "oECBDaTXbN11BBMBMGA1UdIwQMMAqACDSeuxr4EVgaMA0GCSqGSIb3DQEBBQUAA4GBAGVa" + "QNtd4LgoVZQ+Uy1lSr6sog4fsGaoQJCZcvrMJwGpMF0FJsGtOb0R2mfwHi1YXqPF5qZY2I" + "7cVbwVtRQzbXunk1z12k0iIesMtYUncxb/SBstC7VNS8HNZm9ese+YM6Ac8mGT+IUZsPcP" + "gI9fQ1L/2u+/3L4fweca1R45xm5M"; public static final String[] TEST_52_DATA = new String[] { Intermediate_Certificate_PP_08_05_crt, Intermediate_CRL_PP_08_05_crl, End_Certificate_PP_08_05_crt }; /* * test53 * */ public static final String Intermediate_Certificate_PP_08_06_crt = "<KEY>" + "<KEY>DVQQLEwdUZXN0aW5n" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>FAAOBjQAwgYkCgYEAlSIH/+6DEL1P9tkgbsI2PcW0w9dmqMTLP3jKYPsr" + "<KEY>" + "9UCufTtMPFvnEuVBx5e8A13AQ4OyHqaJgWRVoRJd6vwTa5jzfYCCMJZHHKpcUCAwEAAaN9" + "MHswDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwMAYDVR0gBCkwJzALBglghk" + "gBZQMBMAEwCwYJYIZIAWUDATACMAsGCWCGSAFlAwEwAzARBgNVHQ4ECgQI8837JGF7vMAw" + "EwYDVR0jBAwwCoAIq5rr+cLnVI8wDQYJKoZIhvcNAQEFBQADgYEAKmgbxzWI6V2twYDp65" + "Gu8zn883CnI08s2FEVupvrKduxYmg+ZDkTBE3ZJFxcOuxJf58MRfDWy8C4jJhLnT3JSSSg" + "sY3n93jzc0s2h5y2wd1bUTDLqhqWCshisDG/88rpv938O8luiUEwltolzKTa+ScA6nXSQt" + "LT4I6O3vbTx2g="; public static final String Intermediate_CRL_PP_08_06_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QUC4wOC4wNhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI8837JGF7vMAwDQYJKoZIhvcNAQEFBQADgYEAHua+" + "lC3wP4G6796jjr6wuu7xEQqY1azsLVsGtL7YL8fm42rl7hgU40SuFIc7Kc+A7oEEkKgvmu" + "SLMIv7q5O8J26fQOuduGWQAncPYB8w7sNWjCZbdjVbjp1XIApcAL3djCbLZ8/NYsCoOuwx" + "hRQKX1hIn+rNDi1DMD4H99QdDGE="; public static final String End_Certificate_PP_08_06_crt = "<KEY>IBAgICAIUwDQYJKoZIhvcNAQEFBQAwXjELMAkGA1UEBhMCVVMxGDAWBg" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUFAuMDguMDYwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "<KEY>" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDnaYU/lu+u+LmLQwyACSsRyxQEEvgriE7ApmHj" + "sNBcd3lovFQMfw9MyOOMsInOgQZU8p/invnhx11/pwi77ViQQ780unhHt5H/tteaYwcsDR" + "cUxR/8jK0DBnbVWvm8S/NGb8BxfbRmDHBTWGZ70hDSCJypWRfHQj0I/SAqAW/VuwIDAQAB" + "o2wwajAOBgNVHQ8BAf8EBAMCBeAwMAYDVR0gBCkwJzALBglghkgBZQMBMAEwCwYJYIZIAW" + "UDATACMAsGCWCGSAFlAwEwAzARBgNVHQ4ECgQIhh/KikcKA7EwEwYDVR0jBAwwCoAI8837" + "JGF7vMAwDQYJKoZIhvcNAQEFBQADgYEAbHK3lkqbGy61lu9d22uO2H3hzwvjmlccZo8pro" + "ord45d2nRIxw2ag4dS1YRFrefVdxZtKeR9+5o+tQtvmTcDOer4u6NZ/sVVElTb1d6axtL0" + "i4cmqv6bGWYECEwtwmPGqAavp9pPZjNRbkBGy9qhVNTXfDQYpA8yzXWO/xUrwNU="; public static final String[] TEST_53_DATA = new String[] { Intermediate_Certificate_PP_08_06_crt, Intermediate_CRL_PP_08_06_crl, End_Certificate_PP_08_06_crt }; /* * test54 * */ public static final String Intermediate_Certificate_1_PL_01_01_crt = "<KEY>" + "<KEY>ZXJ<KEY>ZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QTC4wMS4wMTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxDV2d7qXbpCvOzBimskBLsgexpEYaHv0s7gOaqhC" + "4A3K8sxdjyW6QdGZhKX8tCMqnlPp9CNbpY4tQQ5oTSk5pj6HwAsTfGcDwXJnjKWx1FJ7rD" + "meZZ8c2K7a8voBl6FoPGn8CMhO0WmM9Eyb/vDUPdCZzScb+z/BxTcV1BPFdq0CAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECBpj0+Gcq32oMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBAB/9veHrkLeu8jkwXggJtwqPTmkrIBcX+pz85BTSETYeLOzF46" + "onk+qt+IHptlrm3D7ny2Y5M0dQQ6tPzhGZxCEg9RoDibZGtsx+qeAh1ZjeEpEcQyp/idWY" + "asH+EIuEIOZA9c1ySxI/3v3ZfzaSGS8jsgSDkLB4JumrE9ZkLNd1"; public static final String Intermediate_Certificate_2_PL_01_01_crt = "<KEY>" + "<KEY>MMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUEwuMDEuMDEwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1QTC4wMS4wMTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA3B3UKG3tEL6FQz6dL6iqSvzgGsm1Fg5uzK8npkEq" + "g2caUM7huYFfXeur1mu6iKiROcGX8ZYxrPi9Orh39YVrSu2EUWvqQui4QScf4dIlzAOunv" + "0gAa/lIVTHgZhIomKND6/tZLU251dJiFhoV6bXx2tor83vWFVPx2oVd5LL5S0CAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECJmK3jFTIl6lMBMGA1UdIwQMMAqACBpj0+Gcq32oMA0GCSqG" + "SIb3DQEBBQUAA4GBADkYLTg4RncTpAFmpUy7WGOMvoFV15nDoi91OMxhxVkbGSE0DJFxi3" + "hPKcfUNvzy0bEUUTaqOXdbIkoLTG77NTckJxurSRyam0jA0+6SUYZ6F9fVotwMul2EiVl9" + "XP5oCt7LkgqVgMASuwfzMnQozB6Oi/YP2OdSPXLipI6rl2dx"; public static final String Intermediate_CRL_1_PL_01_01_crl = "<KEY>" + "<KEY>NV" + "BAMTDENBMS1QTC4wMS4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIGmPT4ZyrfagwDQYJKoZIhvcNAQEFBQADgYEAd8YZ" + "8jibr8yjcGYSDicJuyUvHBZntTVQ1sP5XVmtCZcYcQCVjbC0auYTEP5snXbGPW5qeEaaXB" + "MhekMr776hP4Kl3g4AjguFl3XQGcURlgNd8LsTpMMdNWC7XwooOF2FzFjD1ru0BSEWabzW" + "NNaVeuMMbu2N0lc6NDJvRC8LkhA="; public static final String Intermediate_CRL_2_PL_01_01_crl = "<KEY>" + "<KEY>" + "BAMTDENBMi1QTC4wMS4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAImYreMVMiXqUwDQYJKoZIhvcNAQEFBQADgYEAZFec" + "GtjOfp8pT0n1dMF/x9n8y5tM+G3LLnZvDJspLc/sqP3E3B/sHBiis81caEkQQAOTBU5goJ" + "0KOFAUOfEq+IX5uvNhuPuinx0OsSak+2Annvi12zodMQKPNm1uMVt2bMHHHZVEVTqcv36g" + "xgdbp0YKTmuvSy6s8NtGFpkNmnU="; public static final String End_Certificate_PL_01_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>E<KEY>" + "K5bARFrDOOxjV8nmr5hoUYr4jwdi2Rl+60TQK/F08gdcGxdyc9p/yiU5HyAP6i+4iqmvaW" + "9b2egNyZ5tOmpl/Q9FSFWa9d/PYBKM5Sj/r73RtA+/chc4uq3uyLekSRQGh1MieQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECAiL3A4CkaFyMBMGA1UdIwQMMAqACJmK3jFTIl6lMA0GCSqGSIb3DQEBBQUAA4GBAJtH" + "mNNvCt/0uFbHdvUvCuBeZ9cggfpTyUS4X8zgcLDPFbw6VvX65umOZpceZI6hwcre+LZahi" + "gUEPvXppncEObkeVTcYdOTSDoxh5tZyee1P4sbD9H+suGWeewqUDvFs2ymHtxlkpOttitR" + "xQc2U6VlCuZ4XU8SwucyhW0z51e4"; public static final String[] TEST_54_DATA = new String[] { Intermediate_Certificate_1_PL_01_01_crt, Intermediate_Certificate_2_PL_01_01_crt, Intermediate_CRL_1_PL_01_01_crl, Intermediate_CRL_2_PL_01_01_crl, End_Certificate_PL_01_01_crt }; /* * test55 * */ public static final String Intermediate_Certificate_1_PL_01_02_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QTC4wMS4wMjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4QmGXEeVKCn1aQx27r+EBuQqfi8fP7gyV5JLkaSu" + "DOUrqXg8dQxHsBNCf3XilGIvjNFZjVUPdS8FNqC+if9D164VyGQlv/JUor/GlvwVfyotUO" + "U1PqSzFrAALYTmfm/ZqhMvGYloStSDxlzjDmyKadskzOxZZDNSe5s8dvUpYn0CAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECGk7qDbbBgRbMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBAD+eI+jg4jmeC3pJRGEF/hbPPYvL6aocjqqbZyNKN5FWItccQo" + "PWg/GK1GpusDZadesZBDo6fLIUJzL+OumrIYJLB3HxQsmyOXB1gRg1hcva71RWFJYzx01U" + "eB8lCbk8Zu24HzLzqjfVuwKOFFELWDEq7bd6Re/aKSHtNnDbsgSE"; public static final String Intermediate_Certificate_2_PL_01_02_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUEwuMDEuMDIwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAl/HiHoos7eHaDIFhMmvIPk63UT33Z+0iiCIuKLW7" + "tgkT8ia1Yg++np1pC3oqYVeKkXqMcjgonPGQhcek12vLt3/+2PYyYirOTVZaiO9pKQ5An8" + "ZMWXIJmCEAMHabPO1RnetvRv5JZFxZY9jIUnD2fUADzzUh/eHN6Pur0DDrI6sCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECPk0C10KQLZuMBMGA1UdIwQMMAqACGk7qDbbBgRbMA0GCSqG" + "SIb3DQEBBQUAA4GBAMJ4+BZQxpxWhNbo8bpGkbbcKT3kfKYrHjHsZADC+/gAJSVL854b1W" + "VKsGr1YcCX10V1Gcqb6Jgziy+AzRLhcJngszcz0A7LxrMH+FIyWEPgZnOyQCa8B/9bnsh9" + "bC1gEmXGOVtWboIFOEdGghEbm/ENnQyj+HbIk3jhF3QYbXhw"; public static final String Intermediate_CRL_1_PL_01_02_crl = "<KEY>" + "<KEY>" + "<KEY>wMTAwWqAjMCEwCg" + "<KEY>CAQEwEwYDVR0jBAwwCoAIaTuoNtsGBFswDQYJKoZIhvcNAQEFBQADgYEAZEt+" + "FjRuXgnOZg70geqS4hVsF1VWWawlAVGmjPsbRH7rADXPUE2bYL54wLdwt/6QYwHqy2KwCf" + "d4OkWkwn9xwGS4j+XBCw9Y4nbWI+wrsZ9W7vgbeIaVUUUZu6hoin1GxrGDcfbM+bhYzQAA" + "gNmKIWdlJ4tKD2KNgg0KmZPoj/k="; public static final String Intermediate_CRL_2_PL_01_02_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1QTC4wMS4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI+TQLXQpAtm4wDQYJKoZIhvcNAQEFBQADgYEAXwZO" + "wr9mrO6yUOoopNjcIcDssCUksYco1PFgWx9O/hGq9ktdoGoGcECGhdkHTLe2ab3WFl9jzW" + "<KEY>3VjbnbRB3dPQlrSfiv7cYBLnfKvyF/CxQg/wCtWo46GJJQgOx/<KEY>m" + "tQuJEtl7RgoByUSvLtmvKjQWEnc="; public static final String End_Certificate_PL_01_02_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTItUEwuMDEuMDIwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMy1QTC4wMS4wMjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0/rXOZwUebRaHcPPFeKTB2OWIzIAgavqb5HerPAe" + "c3sJCdNOSLc0OX0dFblso97WR8uueF9I7QeGg3ayQjzDVqm5Tu77ZaCuyb6UU8+fY2eqwD" + "5lCVuLfJr9U2JD5b2TcdvAD9RqfhefclVjDj9rObLjvzLg3AefO3drsfBtAIMCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAeYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECDBWCFTOp3evMBMGA1UdIwQMMAqACPk0C10KQLZuMA0GCSqG" + "SIb3DQEBBQUAA4GBAI/JpU3gHo8Izsbjlx6bkQo/e/hD634N5lSMtVHIGnoVLu99dvroRu" + "2DO8Fhnv6VZpMvYoAc5oEgUqx9hw3bfS/XN9GXaeMssjwN/qM6lzCsvMG7DA9sf59xjf4Y" + "2+u4KTye4PdpmWaseDDJ1wAihTHEaofnQdaoUffxQgw5UcAf"; public static final String[] TEST_55_DATA = new String[] { Intermediate_Certificate_1_PL_01_02_crt, Intermediate_Certificate_2_PL_01_02_crt, Intermediate_CRL_1_PL_01_02_crl, Intermediate_CRL_2_PL_01_02_crl, End_Certificate_PL_01_02_crt }; /* * test56 * */ public static final String Intermediate_Certificate_PL_01_03_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA60y6V2WkNCB34dcGfu+Jo3YHQZXzgp76+HgnyFmP" + "DLj9DjZHqifD3gW8Zk7L+yK4PfLDSHjbrXM9GY1ser6XwhaJQDPUBBYW5X3XTOmDWmV63J" + "YeRF5r7cfF2h3eEZ460GRLK5tt0Zr8V+hA9oOvwqynrIhDYC/tCzE28ciqA+sCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECPE2FCetVerZMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBABUOUWwyfyrRIw7dRIVfLlWyp5R1I+Kmq5e8st0AEMVpPAmLoy" + "0s+46Xf+THXZy5em1P3bSVTSUhTs+XD6tbFFUcTrX0mQJlshR7yD/A0siMDUNzzt9LJQvP" + "dwNjQSA2keOrV9q/2CAGce4daL4Wz54jfh33YVqJ8sHT4E8CxQb7"; public static final String Intermediate_CRL_PL_01_03_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QTC4wMS4wMxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI8TYUJ61V6tkwDQYJKoZIhvcNAQEFBQADgYEA6FnB" + "LXWt4B/3oP0PXERYh7ZV39yu/tm9DHBQGcGDF8JIspU7F+mH/+37U/lT6BQxpKOpgOgGeP" + "nTQeQzN9sRsXxFO22SkHbdPCao84qvv485epgzqFcVsCRBwBBLcnNLMg891q0EYsTW9vSw" + "Dx7V4CawyYAYGz1MqYuY6SSs6Q0="; public static final String End_Certificate_PL_01_03_crt = "<KEY>" + "<KEY>DVQQLEwdUZXN0aW5n" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>nAzgSuSvoHE80VKGKjSkrzIX9OFfeilW5rNZAXoZrjtkaJd1Q8l5AtjFn" + "0tlLytDzIMYo5Tiq/n3IiTdbEzGYzEOCcSyVaQdB7K1WgYI/z/UAaWV/GbqCX1zQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECMQHLiufEm0IMBMGA1UdIwQMMAqACPE2FCetVerZMA0GCSqGSIb3DQEBBQUAA4GBAD5/" + "vGn/rpoHvny/mfh6n2zVNNQLTEBiddfAdCWpeBFcwxS5lpxfm4dAWgHhprZTMirF9yS+wO" + "wWQ4G9/wiqfAtoaNN1qkHMlUMOAPsOSff6ClgP+1uzKVqQa9NTd5HAeMdYfYjMa/fcF/37" + "plCs5ZsJjb9lhEjNd/tq4/aALQmt"; public static final String[] TEST_56_DATA = new String[] { Intermediate_Certificate_PL_01_03_crt, Intermediate_CRL_PL_01_03_crl, End_Certificate_PL_01_03_crt }; /* * test57 * */ public static final String Intermediate_Certificate_PL_01_04_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENB<KEY>wN<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA06yd2NQEAgpv0kQQEOzhHHU4YqHgtvJgkdLYxb2W" + "Zordrm4b/43UDnLmsI0790V76y9Aa+Y8SIMBBRBJgnlppFJrFsPaOMO98M3/mXkQotVbY1" + "59P/AjWMxpzP9h8Bs8KuoPqnl5jN0UZAF4kRoNXHzyS445VBp4DtWz/jcCPm8CAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECHxLORDZ1KKNMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "<KEY>0Hr2cmfuQvdyGDF7/RlvTUJ7cvGypCa724SwAZGZk" + "Tf5GwxgjVcLHY5RlX2kDm9vjneDzP88U3587qA2ZRwxhheK0RGp1kudNQ5y2gAGKZ7YSc0" + "SENMDxUAa6HUkn9Rfo4rf5ULuGNJZXQZ3DtP+lZSwzkUeCVjKhyQ"; public static final String Intermediate_CRL_PL_01_04_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QTC4wMS4wNBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIfEs5ENnUoo0wDQYJKoZIhvcNAQEFBQADgYEAb8lX" + "19SlVNRkc9SKNpRLZQom67djZfMSIPIDkBALfMepdevbquzgO7AufTuiDn5Zqe6J6odTv6" + "RrQReo64XB4+Lx2pXOe8bZEbzZk0HvzLl9DjN7zxyNglNK+Hd2xS4yT4ps4fBdvXvWAXEx" + "6DfvWHbGFDoH2auomCKJtCVXxCI="; public static final String End_Certificate_PL_01_04_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1QTC4wMS4wNDCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA14bXc39XiWvb4r1jzbADzrpfbg2Y9sGBkefSQHsM" + "QZ1SRLR7uexWD7MuDYh4ZYBL+WPhaJJr3a1jnAIp54h68m8mwS13DgrxBF2/hrVKEm9IRG" + "s13hoM4Mjjogn/Lvc1xLvB5lctHjZrNRZjyrt+PqDDmqZqgCOmcD61PhrfAoECAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAeYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECB9hXgJfzBvTMBMGA1UdIwQMMAqACHxLORDZ1KKNMA0GCSqG" + "SIb3DQEBBQUAA4GBAB0HgiURRd/REVfc5DenIPhMu8riVcwVgTUwatsCWragUhXpCtvJmf" + "z4vGo1rKYai2dltVX6am+NDvN5tROcM0bvC8lOCc/iPfI5eWTy9SJ2nxvs1+q809Rj0rno" + "zS77TIE8rD7Q8ZUd3qNUiBwdjBoc9misgyN7zUulg4Ueebvv"; public static final String[] TEST_57_DATA = new String[] { Intermediate_Certificate_PL_01_04_crt, Intermediate_CRL_PL_01_04_crl, End_Certificate_PL_01_04_crt }; /* * test58 * */ public static final String Intermediate_Certificate_1_PL_01_05_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QTC4wMS4wNTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA/rVBEGZ4jibDhREeRGV3jPnv05esRL8/En1Bu35y" + "QrAHi32+kBu42vwwDbeuiTZd/B90bn5srJZoW83rxXxNnpxqbnjN3GgIcRiUVyaVRTp9/U" + "IT8B9h09b9yT8gpQ5qR0+JDcOHCfJwpogAsyJJa6AM5p/q3TeF39ugfVOWt/cCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBBjAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECJ7/mkuLuEIGMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBADC0A2KMMSSmGI9p85WG7XZVMBX/xdDYOHO0e3ORTRFS3kj9rK" + "a0yUjc1X+p22AA8kUyOLpYIulfDjPrLKN2E/hWSf3+XWMiC7JfX01F+BBl/avEZoymaZB4" + "dkH1Hym4IMJoSaEOgf5HFKBnFEA6aUcr+oDYGUP+Sc1dmJMjBW72"; public static final String Intermediate_Certificate_2_PL_01_05_crt = "MIICmTCCAgKgAwIBAgICAJEwDQYJKoZIhvcNAQEFBQAwXjELMAkGA1UEBhMCVVMxGDAWBg" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUEwuMDEuMDUwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1QTC4wMS4wNTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEArir4GaS6r0Tv9PMbaOXYdPKADNpVbJe79G5t/F6x" + "7Tz1rwUR+m10E+Jq9RsV+fU/nUzzjJXHbPLZnfodUVVmrXgzvQ8+B2N4jJtdNLG66j2PZG" + "+P8GQzVK9drDh54VHXdvxAYCXs7GaIprWmCQsxZOKjhFU3YDiRRK8qJGpBG/cCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECMmrFr30fUzZMBMGA1UdIwQMMAqACJ7/mkuLuEIGMA0G" + "CSqGSIb3DQEBBQUAA4GBAI4qJF6STCi+elUbpZIP7YmcaQsS0PE4G3+LJoMg1LT3rSeobK" + "Aj/yUetmA7y0B5i0svKjRChLOpfClNPVPCx/+mc75+LG+dh1eVG/qk2UH/lrqLN0XLl8tA" + "IwZeoPaegBQAIp9oEjhDN1fWtKIkOe6A6wYdH2VPvsqC8g02VcwD"; public static final String Intermediate_Certificate_3_PL_01_05_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxDQTItUEwuMDEuMDUwHhcNOTgwMTAxMTIwMTAwWhcNND<KEY>MT" + "<KEY>" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMy1QTC4wMS4wNTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAtRC2/PDG3kx8LpzfWC0yJph5h3LXZJZW0W2voss1" + "HYPP1/MBoQY067dfbALilVRh9asCNL4F45uu0lT24qS9vjW8SzBOLA18GsVYRmWO7EP+Cd" + "9f3mgPIMJ5n+UjW+yhBwh0Z2pzVElkX9CxECrs1Mt2ulyuwWA1lR8nRMaTUeMCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECAlV3mzXYPyuMBMGA1UdIwQMMAqACMmrFr30fUzZMA0G" + "CSqGSIb3DQEBBQUAA4GBAG28iHdlA+nTs/b9pi+m9eMy7niELjIWL9fMgn1r4iXQ0TsPYi" + "tgpoip+BB4G/jz7MPx/N4nwyAPV+C9wN8cAHALf/ka2MxAORYFVFI+5PDgXzm78ILqj91f" + "vOFN4jemizTES4/dHxfmdctnsTRpU9ALQgfJLhxEQISOPwuemKB0"; public static final String Intermediate_CRL_1_PL_01_05_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QTC4wMS4wNRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAInv+aS4u4QgYwDQYJKoZIhvcNAQEFBQADgYEA5i45" + "gETFAw6l9Awex9IAVIqYTA1dnbDyrUYDRdzd0x6OxSPODvNfQCwqwlTJXrHidCPO8jRhMS" + "Zcdn/MTlIeHa6OERFcjOiwOpeTgtchvpTdDchs5ve8Ik+myue+cfgpEVKOE+ZQ2T2tcyz/" + "+DbeMptECfJ0lVfCKIY7ZOzBPaQ="; public static final String Intermediate_CRL_2_PL_01_05_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YD<KEY>DQYJKoZIhvcNAQEFBQADgYEAdsNe" + "ugM8sd8bmIDkYXce2WmS5Zx6QUQ0yT6Ij4OR5/F4CG4Vl+k3JkNPuAiNSs2Z9HeML+F/W8" + "3yEPe/mdLV4nLw4B/b1/8DmgZN4r1ojaWuHAg+KrA3Zz3Rc/hwQfvBy49mf4NGtY4ArbeB" + "DYKz5sVlrwR+gOCR5jm4IC7WEDs="; public static final String Intermediate_CRL_3_PL_01_05_crl = "<KEY>MQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMy1QTC4wMS4wNRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAICVXebNdg/K4wDQYJKoZIhvcNAQEFBQADgYEAqYex" + "FaIykZo17O2URpofe8x04L/VsfA9jV28zUgNFruAGld/kUh4rYvgwrdbNZ8NmEFDp9J9aL" + "93af3bzoNvWCik2VrQLd5nccCFiC04B+LUH9Y2p+7vV2ojrtBks5SMW0q4HaNyPSQu8Fst" + "4mYVf+QIYZC3iVAF4rsKnaxwzIU="; public static final String End_Certificate_PL_01_05_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTMtUEwuMDEuMDUwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVBMLjAxLjA1MIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCXJjzKGcLyONTyOa6sQHvIKZIAh0pWdteUiXf" + "b7yjCn6Z52SCHxB9GZERHwR7fbJpoE3oDcYUY+8pH65bIVm1p3zr5deo4v85DEZQ50cU9a" + "WEUAO/5X57P7pYb9/47abu0cdsLIWeE+O94HpZS8vz8mxRQKLj27gPY1KzzTbrZQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECG8ILlM9oqZwMBMGA1UdIwQMMAqACAlV3mzXYPyuMA0GCSqGSIb3DQEBBQUAA4GBAF6S" + "x3aunfgnDmo42aPOzDh536WSkTTbX9bmUNyg3IQHl/3xhVqjS76bMqreYhx5nh4VNx/Z3N" + "LD0W75XmASCk0wtW9S1MoxzJMFIozRruaE3oykrbyMMOt0Br5CV12ofUd0WybDkXfNAIze" + "IRgps3nORHWjV1GwXe8uNoUn6/z7"; public static final String[] TEST_58_DATA = new String[] { Intermediate_Certificate_1_PL_01_05_crt, Intermediate_Certificate_2_PL_01_05_crt, Intermediate_Certificate_3_PL_01_05_crt, Intermediate_CRL_1_PL_01_05_crl, Intermediate_CRL_2_PL_01_05_crl, Intermediate_CRL_3_PL_01_05_crl, End_Certificate_PL_01_05_crt }; /* * test59 * */ public static final String Intermediate_Certificate_1_PL_01_06_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAweCAiEGMLycmodjrUMIWEEFshkvhX2r90wGl+/pU" + "Ia9NSdT23zYzE4Uo8Is1ywyV+YfvgR22j/RXF6j8OK+XZ8jlgfjVTAhjCnTWY9LDR7qAyk" + "8zuuITxJrYpiPoxqZs9BXLfGkDbye5VpVJXvQdbJNxgKO0hkBBDfe+T9+qw6ECAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBBjAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECG1DiuoAwV6aMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBAMFvtFiMDMP6n3CrqQLSzhpK5Qu0uxa56ARXIKSIqi0OUZAu9v" + "sCXxMvaG/R5bElwi7ybYZ5KUSN+PnDmlUxWWL5Ib5RZdXgj7L83oyLTQmbDMvka6rSWHgw" + "Jq8qHVslhh+l+YNOb4fzs8x9ctCrs/BgjX8wkORpQbigU0BUJ9sX"; public static final String Intermediate_Certificate_2_PL_01_06_crt = "<KEY>" + "<KEY>" + "MR<KEY>DQTEtUEwuMDEuMD<KEY>MTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1QTC4wMS4wNjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwf6Nf0+r7JvE6BO4MbDbS1T1SCzn78haBAmqGZLS" + "Ac4xQTydvmzr9PwiWlU0xjFfKItqRMt7rfzTTPfvvnwxsAfQNPtxKzi30yCNq/VotMA7j5" + "iQYaVe2OWVHu13agbXLEZ0pL/ZkmQ3Gvo6UhF4dRmCnjFbd5cMTxQVHUrwgyECAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECE3tS4AYmwZDMBMGA1UdIwQMMAqACG1DiuoAwV6aMA0G" + "CSqGSIb3DQEBBQUAA4GBADcBTKbhx8PCunjRVJkcLBCcVGHs9HfkChDafwBO51fe5uhHE2" + "QBpW3J8ZsevuFQiEZvuy2RVFktE6ZoKD8wxwBFhs+OIxe2mergQPy6jHuxoSUiPzr3CVXZ" + "UsNxe7j3IcJLqbJ15UqGFH5yph7Sa4Ym6x747miF6W9knNkjcx3K"; public static final String Intermediate_Certificate_3_PL_01_06_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTItUEwuMDEuMDYwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMy1QTC4wMS4wNjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwq2YlDLHX4KktKnzLCYjnk079IDgXENrkRBuZHTB" + "IQyZoiBH4ZWHreZKs3LvznP8uSd8eEL8keNw4PwZ6aT1LF/Jr/UlrFQNnpLzQVXwGGAuzh" + "tFJYRlOfI5cCZYAcpjnyUV4GW+MuwBdoqDycMjmqIv/8A8vupjahffcmBAassCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/<KEY>" + "lghkgBZQMBMAEwEQYDVR0OBAoECB+qYFJjEkJ5MBMGA1UdIwQMMAqACE3tS4AYmwZDMA0G" + "CSqGSIb3DQEBBQUAA4GBADiXredACtRQTV2TKgu5SDdPlczj7cZZUARJiJKiRfjmxHCc1q" + "m/Oh7sHkqRvlHqjoX8qp4iSchoZWdOAE5O/q4Ef6rViejDFVyN2ZmlhP6KIiRxznrvYfF1" + "n08K7CHgHWvDaumm4pNmWeF03nuasHrY0W9h1uk5poVuzaWDpx3A"; public static final String Intermediate_CRL_1_PL_01_06_crl = "MIIBSzCBtQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW<KEY>LE<KEY>AOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QTC4wMS4wNhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIbUOK6gDBXpowDQYJKoZIhvcNAQEFBQADgYEAiHM1" + "xFuYt6tDscqzwj0mLHPHULnR44/vNyPUg0KnV03Dd4XbFHz0FtwDKgVTBZ8x7ybp83ubJH" + "tE/p8nPW5kN25WQOlYkZoAcMpEXjTzlo9evU0W3nyzJjmlT8YEI7vnmWFz/ahzy6WFwPue" + "h862EKh2zVO4hoqZYEuDQI33fOc="; public static final String Intermediate_CRL_2_PL_01_06_crl = "<KEY>" + "<KEY>" + "<KEY>" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAITe1LgBibBkMwDQYJKoZIhvcNAQEFBQADgYEAuDSF" + "W1KOc4x41HGvdRaw/NtipD2y6zSh3mtRoo7Q6J2BvJvunymZNEziozBOiUgT8zMgbdbm4a" + "PEwlHRaoJP8+yxJIlKaHa9Hc7Yz4SOwSrLicf7EnBSct3Mze0b48UYqbn1q+lf/zKaUGrP" + "M6oqtE8Fam06T+WUfutU53zTtSs="; public static final String Intermediate_CRL_3_PL_01_06_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + <KEY>" + "/31ofyXlZ/fQJOoTZt0CI7SOPQE5ZkUsR3BDuUqf1+sWwBYyBHkrC95JhJkM4LfGS5K19p" + "fp0j0bguzNCXSBRTfjSZhy80tcs="; public static final String End_Certificate_PL_01_06_crt = "<KEY>MAkGA1UEBhMCVVMxGDAWBg" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTMtUEwuMDEuMDYwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBNC1QTC4wMS4wNjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA3asAqJcjXngEuyM/W3+TAE+Qr4JtNUdwBtmrpGlo" + "fAvJdmXHARyiN/Zn6Si8bGI8Wz8J4Y+Ll7zLdaMU4MCZo6hwZiaQwkh9a+ZecCpLpjs4mz" + "MSf5zHSwTYiXKMazlmnGEITVyKLmAiLSyGeeJvOJVqVo/NZXRGVlmnPxZFfgsCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAeYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECLZuS770NcDsMBMGA1UdIwQMMAqACB+qYFJjEkJ5MA0GCSqG" + "SIb3DQEBBQUAA4GBAGM18aR2i8vSywsWhcLrRN1Xckl/HiBPNphobfKoER4NG29cFjUPQX" + "zukjQcJl2clAXNCVtcsKCoYRP3YUyAB6At+yskuuJXtES7FIzM3rt/UpDS5ktVC3gh+jgE" + "pPhMILYIXFzYY1hifkpagfO+mkcr7RqHU3tHAr6LCWjqrB9g"; public static final String[] TEST_59_DATA = new String[] { Intermediate_Certificate_1_PL_01_06_crt, Intermediate_Certificate_2_PL_01_06_crt, Intermediate_Certificate_3_PL_01_06_crt, Intermediate_CRL_1_PL_01_06_crl, Intermediate_CRL_2_PL_01_06_crl, Intermediate_CRL_3_PL_01_06_crl, End_Certificate_PL_01_06_crt }; /* * test60 * */ public static final String Intermediate_Certificate_1_PL_01_07_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QTC4wMS4wNzCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA5HkS45NLuqq9ZwF79+pTGtQnGWO7DFdetYeQTbeD" + "sisjZMsK0sCCR5xAKYQsJSS4v/8LQUdxlQR30LMV0SQUKFMJyFsMiSsO8subb6sVINWn8A" + "tL4zcQK0WiASUZOEkybAFJtP31PahzI5wfD1cikE1M4BlDij5WeaIjt/RTHKUCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBBjAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECLSUEn5d8YywMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBANLO+kEiswkGzEh4ZcF5LtfnPZlnG4gTPSNugeWJc+Xedqmttp" + "jZ35fr1hiRe2Q1UcyTd4ThkPknawwZednbsZVPqw8u1mo7kuAeL9KrCk199vL4bV8Ag/kj" + "HJ8TAy40UDB6hMm7l4j8mEKwV03THVrz1Vvz59CQXj+iseH6yUNO"; public static final String Intermediate_Certificate_2_PL_01_07_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUEwuMDEuMDcwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1QTC4wMS4wNzCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAu78gmT5HwmBHEe+K8fLLgGaPpcv13ZjrgL4twTBS" + "OkZn5LL9GcfkPuA5WIAZkVYfCWSDPqcAGoOWUIDADfBfdcyLteUH+xI01rHKiLDVexMvU9" + "vqCmcBKhxK3S6wraW5YhOO0bx4oPrZXVIjyG8fh4e5WTEykzvUWJ8ZbzSJ9JsCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECCT+fDEaN7GaMBMGA1UdIwQMMAqACLSUEn5d8YywMA0G" + "CSqGSIb3DQEBBQUAA4GBANpKr98PiXAdcXlbgSgif0213H+tg3WwUNKZTw8MpqPyrN2/DZ" + "HBi6e2KWXLTxttV9AZBRvcKwsveS6oc31eulMe8nHxRNRfadvF6dL3Tsig6HAQkartcJMI" + "yfW4V3EhXbCdziQkre7XcR9WK5bpQoX04HWeew6YTxjG/cL9MIJR"; public static final String Intermediate_Certificate_3_PL_01_07_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTItUEwuMDEuMDcwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECKw8JlHMvVfuMBMGA1UdIwQMMAqACCT+fDEaN7GaMA0G" + "CSqGSIb3DQEBBQUAA4GBAA5JEDEDyqfZzTGzOoMV+8RVke+a4qgOo7rnOEdletgGFEwz8A" + "tiMHBxR+UMxuHS82Hz3+F8XlyYIwlrG9wWVcB/tOyzgVyA28Yux9Q/meU7T6dco/AnmOdr" + "2XL6Xm5iLnARG+PkUPHOsxuweyB/sSUSA8ZJPowNRWTik57ul/bO"; public static final String Intermediate_Certificate_4_PL_01_07_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "uRsiXGUhIB0K4WVbnz6tr7Hch3yltK4H1Y12Lf8cXEETR2sE9lCY2A3r8/VM5OUbou5Y8k" + "wIf03VhP7cGKonaFtlj/WD77fidDePVp1Nk28gV0T2F/l4pM5TEJrq5C9PSUcCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECJBEcZsMRq6CMBMGA1UdIwQMMAqACKw8JlHMvVfuMA0GCSqG" + "SIb3DQEBBQUAA4GBACfbHKpuRJnZ5UU0sih8RuywhUo6Getwl/p6fsi87wYI61pvYru+hm" + "4R4eAMZvg7MrAarS3Iu3zKBU1HKeq1i+hpwTIXrngR8eL2fU/X6GPzdte3+3tjhah38bqF" + "zDon+N6ap4MKWRk033SsFYo1K88Mena2tGuFForJlV9DOF1l"; public static final String Intermediate_CRL_1_PL_01_07_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QTC4wMS4wNxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAItJQSfl3xjLAwDQYJKoZIhvcNAQEFBQADgYEAJtaE" + "I1+PCNL1/bgEVKWUIwvh58ugnWhxzbFW6hNJwNEz9/yt+FLZfNrT/Ezort4VVQFLQg7+Gj" + "KrkIujqfRJG4LXrXAV8ZsvSPuwyQ+hM1GdHGDPhj9x6DkjFusxJYUEs5BzlX7ovpnaIPSW" + "RPsatheSzu48pMOCmyTKE3MpuZg="; public static final String Intermediate_CRL_2_PL_01_07_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY> + "<KEY>" + "cFLcW8taau1J7iQOmGY/7qIT0eFx2OlgNmxqirmwx4OM5VSH5mEpnp9NOr1rfut1GDRzw0" + "tZ+nhD/PGDXYPu+QPX6jii0vdHo="; public static final String Intermediate_CRL_3_PL_01_07_crl = "<KEY>" + "<KEY>LEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMy1QTC4wMS4wNxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIrDwmUcy9V+4wDQYJKoZIhvcNAQEFBQADgYEASY47" + "p94jEh9FZ1TrPS82nWC3Z6ZKdaD9pUbaJpRnAId59QdBaD2Cxq+SfM3HTlz8grCAPKwulv" + "jDDhXhp4H/m63Q/pJbyl3bbMxnphMOoDwB9wwKIUQPM5wagMovF/UYtC8MoC++m2kuZ1eb" + "fR/OIJuQr+k/kD5Axhw/xolKPdE="; public static final String Intermediate_CRL_4_PL_01_07_crl = "<KEY>" + "<KEY>" + "BAMTDENBNC1QTC4wMS4wNxcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIkERxmwxGroIwDQYJKoZIhvcNAQEFBQADgYEAMhIQ" + "lE+BdCO6NBz+YgcH+tjP0n4OCdQ+7uxUxUYmPtPbsLwbDDEEZUjykgwiA6P47Cqh5fXB6G" + "tfInh1cmQi3y2IEHK+bRSx321qczOh34Yx2hw5vp+JFttbQAEl/BHixklrFBrXjN0UsWGC" + "ibXcZy0YjerWTp/yceoABz9p94U="; public static final String End_Certificate_PL_01_07_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "9ucDwGx1HOJwhwk2AmvhN7pYuDc+BFzuNtgHojqZSDpRMA3rVsGlgOkZ3sOQzvxB73w+/X" + "<KEY>aOYm0Zm4OxqWhNu9+Do7nrJczDLi8k/qh8/+Rfdtvt4kwIDAQAB" + "o1IwUDAOB<KEY>VR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECEmVurZ+7UXFMBMGA1UdIwQMMAqACJBEcZsMRq6CMA0GCSqGSIb3DQEBBQUAA4GBAANe" + "AbvpAHwBu9+FlI4DOb65Z+h5f2Ok59FVbVqAj3zkMRkawppngK3CMY/1BQlGXOlHvE+CGz" + "x/7DsiV0O3rxOUjutt00PNxCyIM2pcOZeGUaAu5DJWn0SRwzTMJa4M5K+7wh/4sSPWyxKi" + "ueDq2VXvIgAfEVC8Lv44sxcOduSZ"; public static final String[] TEST_60_DATA = new String[] { Intermediate_Certificate_1_PL_01_07_crt, Intermediate_Certificate_2_PL_01_07_crt, Intermediate_Certificate_3_PL_01_07_crt, Intermediate_Certificate_4_PL_01_07_crt, Intermediate_CRL_1_PL_01_07_crl, Intermediate_CRL_2_PL_01_07_crl, Intermediate_CRL_3_PL_01_07_crl, Intermediate_CRL_4_PL_01_07_crl, End_Certificate_PL_01_07_crt }; /* * test61 * */ public static final String Intermediate_Certificate_1_PL_01_08_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QTC4wMS4wODCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsr+i9HxgO6LnOa6xOHfe9BeLVTo4iZd8rp6UTc02" + "C0MmsSjvIgn3UiayU7aoHcTH8tAXSV5bn0CIH4B46qLym//<KEY>" + "<KEY>" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBBjAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECPMW3WMPtaowMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBAH2N6S9ggfmRJkzhs82uOPXaHF62YEg1pbNxaCyJJbSt2iIIyy" + "NPSlE1OufPPH3pO7p5xcYi90LCI//0tlUL8y7aULFNygbshFY3B8MSgCz3KPA3UKdtIZYe" + "7lqP9/ob5wmkjtL<KEY>"; public static final String Intermediate_Certificate_2_PL_01_08_crt = "<KEY>" + "<KEY>2ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUEwuMDEuMDgwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "<KEY>" + "<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAqZZolrig33i1rEwdP1pin8a5PgzSk7fT+qhrJRCg" + "UTOW5WyPtakrLTUipDcR07t8tIe0NsjRoph7+fAwbjWBfbJdydndHHGx5BqWg8Xi4zFhFd" + "6Mc5O6KO7Yqxs8lmthv/RAdL4Eiir9d9hqskKOtQKbLWz+Bz3+9NwfLGzwzPcCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECFjxM3RkbbhNMBMGA1UdIwQMMAqACPMW3WMPtaowMA0G" + "CSqGSIb3DQEBBQUAA4GBAJOJKBubTS/kLnfXN5YbQfggxbO2c7DTxx2LhrnPiyVDEow+Xf" + "lMv4YK5olH6UUm02D8cv6Wxg4NeTtBBnwKQG/GV4Ssgc/rrpEzM7jFRQcUzPu0jfya2fX8" + "ZNBnSDjovlN6vmZHtiksjh66h3a0aVusEuOQXD29ogMR8qAGYQaZ"; public static final String Intermediate_Certificate_3_PL_01_08_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMy1QTC4wMS4wODCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAogLtEcWxzzkkIYe+KrwKhaQjjGQqy2KDsW00U5lx" + "+XJoT8eKd5pxFdCa0SPn/jkNILVeh07mIHec1WF8SOeveVT4Ewd3nG/6ZGoVVq6l0j+3RM" + "jpJbp26BPR69nFn6rmFUMoSNq0VG8Zl+UBqnjq83G3umJCJMMRekUTULSFEGUCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECGAFYeJIhrRzMBMGA1UdIwQMMAqACFjxM3RkbbhNMA0G" + "CSqGSIb3DQEBBQUAA4GBABHamiW7sPLQ83nXt3LZemcAp4QaDB8X94EuJGBwshEcKLoOHb" + "/3cZkPRbOiRQUh/YdpfyApndGFSi0DtwM2Z7yup+MzdrR0wzQoNS95A51nHE7XdCuVFemc" + "LTJ5rdd2BLK3OB5lQagVLzAY9Bs1vaeXKT2Cy+gSUkTIekWcsH3K"; public static final String Intermediate_Certificate_4_PL_01_08_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTMtUEwuMDEuMDgwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBNC1QTC4wMS4wODCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxVjjKlLlZzeZhamPO2NDnRtWM1oWZ3/kdwdBRn50" + "o1NRXb60Ir2HjniK1dRdbijAvR5uItLe9tmj4nusBiaPUGM0HNlEdQWSzble8rvUsP0apw" + "uJusV7zLvzwwbgLbMYT+8lMhxWXM34xszP+dgjWASQOVao1Uqs/MLLibOuueUCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/<KEY>k" + "gBZQMBMAEwEQYDVR0OBAoECFMFrvh2hQ18MBMGA1UdIwQMMAqACGAFYeJIhrRzMA0GCSqG" + "SIb3DQEBBQUAA4GBAFsCOJ4DzuMOKti5PvF71ZKOtcTHSv123ZNdPIbK6OatT9YhVuUOYB" + "AjMavggywrb+QOXOFfJMctQlS3y/JE9YyoNNt/4UTdx1jQ3I2ablonmzjt8eN5GJ9jUXth" + "fHjxnmGUeWlAvwMjEdzdigkyuWCi9LJfjyHtTjSf9n7w2rU+"; public static final String Intermediate_CRL_1_PL_01_08_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1QTC4wMS4wOBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI8xbdYw+1qjAwDQYJKoZIhvcNAQEFBQADgYEAG2Aq" + "R1oelnrTgh56m6Mm+Lsm0Sf+Ot1W7LzZmMDwoZgmGLcTduVktx+XrtiDDWsf58hmneT1q0" + "5wl4yNH8y/VCAA3SM/gOq4ddOEiS8GbuEYo5P/julH/U3g6M0vfPUZ5y+7V0s35jIbTkjX" + "76n3Rhf88nvTscYvMdqrYyUhAmg="; public static final String Intermediate_CRL_2_PL_01_08_crl = "<KEY>" + "<KEY>" + "BAMTDENBMi1QTC4wMS4wOBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIWPEzdGRtuE0wDQYJKoZIhvcNAQEFBQADgYEAX/+I" + "DkAx7PLTi2x6aYbLacPRaUSjMne84MDaEkYiA64Vo3eL6FbKe14z2mBsM2W7x8xDnxjZ0N" + "RbhcFZ2E6A1ct6HMunuKxjoROIsdWhrYMqJfKKMTWMviz1UjtupsGUWS0dVQCquAr6DJmr" + "W88P8wgiVH2VZsc+edDmCGDunrI="; public static final String Intermediate_CRL_3_PL_01_08_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY> + "<KEY>" + "HEuqWJhIdcsHMA7TYf0iSXK597Bljjg4F/1Rgz0wqLjgMuA59eFbKjJ6zP1E6Sv2Ck0Ea9" + "HJsv5zFA1ljVnNWoQwoHsuLk/wk="; public static final String Intermediate_CRL_4_PL_01_08_crl = "<KEY>" + "<KEY>wNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBNC1QTC4wMS4wOBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIUwWu+HaFDXwwDQYJKoZIhvcNAQEFBQADgYEAHHKd" + "U1SccTsK99BUDrvF930ejNRAvHQM9xv80wcUAy18x+TLwBH8vDTmP210/C5Zk9pQs+rLDd" + "doQQbWJrQkznyB1OSK0T41KZ9L0UE+YmFGJjz0PEzYHV0Kc57j5uc7Fsi8Xu20Y8JeTaJs" + "FUXVsvnCuoSxYmwY1futFWHJG7Q="; public static final String End_Certificate_PL_01_08_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxDQTQtUEwuMDEuMDgwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBNS1QTC4wMS4wODCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwgNkhQrcqmjhkES6DNAW3uQLKILcFlrFvOlWfDPo" + "ngXzCKeed85npqL+Enxo4sLarEiywuDLrDgPf0gKnZXQWBmzWViZhvTsiAemH7iNsNS68s" + "hhb0vnLzlPpDUJDv7KVKW8VbM7nvplKptlEE6g5kmj3iEmM4l2u8Z/pmQoTsMCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAeYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECLfApJ09y/ZNMBMGA1UdIwQMMAqACFMFrvh2hQ18MA0GCSqG" + "SIb3DQEBBQUAA4GBAG2ANLc/ib9ayz0B0L6/XQf/xuwETEq8kb5vWml/PbcFD1b/uwRHI8" + "vTvM559nZgtzkhS5ZAvNBTh1CB9Ox/nugHc4srbH6/Wcd94pMQx/sfCB/C6zZ5Tbm7Y4jp" + "hkjnxwGUYTvgNzxmaAPLyCfqY7KwhCSzns2M+yuncEKqlzuT"; public static final String[] TEST_61_DATA = new String[] { Intermediate_Certificate_1_PL_01_08_crt, Intermediate_Certificate_2_PL_01_08_crt, Intermediate_Certificate_3_PL_01_08_crt, Intermediate_Certificate_4_PL_01_08_crt, Intermediate_CRL_1_PL_01_08_crl, Intermediate_CRL_2_PL_01_08_crl, Intermediate_CRL_3_PL_01_08_crl, Intermediate_CRL_4_PL_01_08_crl, End_Certificate_PL_01_08_crt }; /* * test62 * */ public static final String Intermediate_Certificate_1_PL_01_09_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>QEFAAOBjQAwgYkCgYEA4slldx8rhfz5l2i0rwib2McrCyQkadTjJRoEGQCV" + "xT0dmw7GhDa6wJg2ozXLLk5y7ZCwlmBOTEoNbigHvcKSnJT8R/S+F4KqBz5d5dbRMNEKYz" + "jdbD7Sm7id+eyfq1s5cpmta2lBJ5gTaC9YPSOY2mucGcJ1muYzdOc6h+PCCNMCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBBjAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECO7tq4dJC8OgMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBAHbth0HjAygIoWVrz59ZBPntOn5nzgUGpH60aSDOS6i9ZOKSoC" + "7wCOEt6IpKO7M7SNznxaX2uhFTYotneyq3qENvqZVXKhE6wQRsdK4kG10cxSB5AXPHJRgk" + "W9+p+Nb0iYVKwHdDCW8KHYIroGhSkKxuflwxhK6DcwQuA7y5q7r7"; public static final String Intermediate_Certificate_2_PL_01_09_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxDQTEtUEwuMDEuMDkwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1QTC4wMS4wOTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA70v7BFxmToZHF5M29JK6N0Ha6n729cv1U912mH9O" + "NTz9tafa+jv4W7njScv21CJbNlUO5rlAFcTlXY0U9vbqHEufhtwRQqi7+pkfa+Ig8bwl26" + "4U8L5rgmSvZJpEiiKfkmF2Rz9+zPPhHjk58ZcKoAcyhOdZ60KqmaaU/TVtEq8CAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECKOwR13+P/BlMBMGA1UdIwQMMAqACO7tq4dJC8OgMA0G" + "CSqGSIb3DQEBBQUAA4GBAN71oLHr0+uf6zCOC5L7oeCOGMUwvZyROu8eTztZrPYGjaamSm" + "Z0ZmUPOJP3g5nO6tHf34Tb9CTkwPdPicEaXuxflkSbJBV3mUFQ1BUDlyYTuaL8uT2N61dg" + "xt5RgYTIGsW3/2XrRvXsH91gSiEkccoUyjKnQcX3oZmEeITb6H8m"; public static final String Intermediate_Certificate_3_PL_01_09_crt = "<KEY>" + "<KEY>ZXJ<KEY>DV<KEY>" + "MRUwEwYDVQQDEwxDQTItUEwuMDEuMDkwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMy1QTC4wMS4wOTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwMLmDs63ai7i4xC/1ufMFWeigJAlbKWMti/PeEKi" + "7LBfNJDRaO+1kde6QIo1vhkhKtokNu9ue3Rfo1+xGuZVohjRbHnmamEm5G3jihegPQgGCR" + "fDZoJDI9HMbwBa0RWw1Nes5igIVjdSHQKO/XTul1yyF2Dt03K2qeLwes+2FyECAwEAAaNm" + "<KEY>" + "<KEY>YDVR0OBAoECPEAjG80q0FoMBMGA1UdIwQMMAqACKOwR13+P/BlMA0G" + "CSqGSIb3DQEBBQUAA4GBAN9eiZXma2n0XgzdvYrlV/IEqBIhpcZ7gycjDumVBVITZJD2sJ" + "bkBi+N8dg7uovgxGxWGsyxqgAboLhMgbpbFzGh+HyIhQu/CeAx93PWYc5rP2l2Y8d7KJvk" + "p1GZEcG/nTakpjxTQ5MQYFsOHVsnDDOyaZYvqPuMrwGYsfoUa1wq"; public static final String Intermediate_Certificate_4_PL_01_09_crt = "MIICljCCAf+gAwIBAgICAKUwDQYJKoZIhvcNAQEFBQAwXjELMAkGA1UEBhMCVVMxGDAWBg" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTMtUEwuMDEuMDkwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBNC1QTC4wMS4wOTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAo4L9QEqzq2VXzkZI3cvUWR5v6vreKKQPfJPfEwNH" + "nMS0cgDjC4Fnw9ySI7Eb4A/OJGLIyg84mzTl6JX3kGoYr9/bJ8jOD7pN6CljXuHpwwmd7L" + "6Nf5Hy0ltjAIr5s67e33OWdPi4gApS4FN6nPSDkZotY73d1xqJYQQZWuNEsGUCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECLfU7BuxzXeCMBMGA1UdIwQMMAqACPEAjG80q0FoMA0GCSqG" + "SIb3DQEBBQUAA4GBABmQZOvwRpVsTD8uazfQpLJUZkuTap4OOPHie5xJsvOhGend2k+LiP" + "7btGoFrqmkyVV/+dNA8+45SRsnoOtgctiF2ubeqIvd7xf/J5C9Cmo+T89Mt7WEBEuDmEZm" + "JPXvOvyh6lRcYVSBnvVW5ZSstNAQKa/8xuyN0OrE1hJWbucn"; public static final String Intermediate_CRL_1_PL_01_09_crl = "<KEY>" + "<KEY>" + "<KEY>cNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI7u2rh0kLw6AwDQYJKoZIhvcNAQEFBQADgYEAbXc1" + "QgR2TAvOPqJmRFFrDQkPVIVyEEDTwZy5aNnoAKK+AmJ5FZkBtbPJ8qt9UeYRh8lbX8+EIk" + "tyrAKw/1Kc3h7RDqAQ/p8t8kFwVQh2l4KTIukV8hYcj5sMKlt5f49ZwzWPyoOaLDomiUfI" + "OY/jaDMw293AjQXxGCDtnaTvh0o="; public static final String Intermediate_CRL_2_PL_01_09_crl = "<KEY>VS" + "<KEY>AOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1QTC4wMS4wORcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIo7BHXf4/8GUwDQYJKoZIhvcNAQEFBQADgYEAq6en" + "XtvIdh/DifGzWn11hqJIZxLQDGJZPoMmwSOLyB6OzsPrIg1xkOWZYEOELTR8+qP6emmx+D" + "<KEY>fGnV8MJgMv5BdzsGAGQbLSSY9FxtqeCPfZ6olHC" + "iUIopdZJZP8ZvGKQ6QGaMnLpJ78="; public static final String Intermediate_CRL_3_PL_01_09_crl = "<KEY>" + "<KEY>" + "BAMTDENBMy1QTC4wMS4wORcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAI8QCMbzSrQWgwDQYJKoZIhvcNAQEFBQADgYEAraCx" + "ruxopFbKvxOx/CIF4niG27ABB2ZwU6n4NBGYHo1Y9NjuytjjMZvQjMHyoayqpnF5TA1vXL" + "jXjI3VgQcK7A4ah/0FNLFGtczyY8kXXrpbmdg8+xdNJEG3/e5rDW5VSf7OY1XqU85ySUJQ" + "ZR5uiy8LxlDdaIT4WT7X5ezs3wk="; public static final String Intermediate_CRL_4_PL_01_09_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY> + "sxQdJALAbb4sYGEyXj/Exh9BYHvgoVahH4NWuhm6LIN8RTcMDAtGoGYFNGXGuT8XRBUJZ/" + "tH9re3gpWaE1rjWeB/2ZBR5ONcM="; public static final String End_Certificate_PL_01_09_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTQtUEwuMDEuMDkwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVBMLjAxLjA5MIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC+g1Puqjn+/Of35mqVVUricIV5x+bpZRCAgBDh" + "VYcmZFXLB/XnRd/mYTu0RR4ISEerC1km5tjGeCN2k3NGdZwz/wEh9kEL8WikSqpxUSUD/N" + "vQbliz4f3YECLcpNXKzkCvszeB5ZGHa0sLYDg3r62wy+1y2rtcrHzFEoMFgnnruwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECANGcL2klYf7MBMGA1UdIwQMMAqACLfU7BuxzXeCMA0GCSqGSIb3DQEBBQUAA4GBAHm+" + "/vQ7VxDry3VqiqKnNoOhAHTTIUphNWF4jddRqVc32IsjVaeTbcGwCIRflRm/lUplRvXXxb" + "JEbW9mP3nfTCREUdm49hjmo/szsPjgosFoEmuEKXThC81/y2vQkb4/jqRoOHEknU++38EU" + "Juv6Y6psZNa37x8Yn3i7S+b3TM2q"; public static final String[] TEST_62_DATA = new String[] { Intermediate_Certificate_1_PL_01_09_crt, Intermediate_Certificate_2_PL_01_09_crt, Intermediate_Certificate_3_PL_01_09_crt, Intermediate_Certificate_4_PL_01_09_crt, Intermediate_CRL_1_PL_01_09_crl, Intermediate_CRL_2_PL_01_09_crl, Intermediate_CRL_3_PL_01_09_crl, Intermediate_CRL_4_PL_01_09_crl, End_Certificate_PL_01_09_crt }; /* * test63 * */ public static final String Intermediate_Certificate_1_PL_01_10_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1QTC4wMS4xMDCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAr4LmuvhSms70CnuAHIHwz45csKvBPVtcDjA1tWNb" + "NIvvNHBzyt6G8U4CTVKmsFAZOzrWJem3b/ZywM1WlDarGJAAa/SRIYZ/jQwaOIoPW4OUfK" + "ZQI6MO7uAPcIQ4ugtPth10viVqZYLZn/6O26Q905YsFltuPFl64KrJVJJBlLECAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBBjAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECGRn9ckrcsEdMBMGA1UdIwQMMAqACKua6/nC51SPMA0G" + "CSqGSIb3DQEBBQUAA4GBANK+1qalm7Nl+PJHT9nQLVJ3ruQNAoMlH9fN52Q9BZCr30iWCd" + "+GhQIPRjxZ4GWojMnqbWzYQsxIR2PLdFc6SwjQrq+i2ES/LePDtaLQddS44/+GP/+qDpM9" + "Mqp3/Nbe1MfOKRBT57qgrxa8eUVieysoKeYX6yQpa8bab3qDwOTH"; public static final String Intermediate_Certificate_2_PL_01_10_crt = "<KEY>" + "<KEY>ZXJubWVudDEMMAoGA1UECxMDR<KEY>DVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUEwuMDEuMTAwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1QTC4wMS4xMDCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAx5tMLJ3LRxi9jAzCSNkj8zyrSO0cImNGf6ZCIzEU" + "V8LrmXjgiZboPTh9LWQ3msWDLpzaxVxDLBXG3eMO8ys46TfJKciyeoiB8wfuNGMKAccm8u" + "<KEY>" + "<KEY>" + "<KEY>MBMAEwEQYDVR0OBAoECDE3dDXkS7TxMBMGA1UdIwQMMAqACGRn9ckrcsEdMA0G" + "CSqGSIb3DQEBBQUAA4GBAE+8cyOUQ7y4atc4BlZNZvGNRZ63dbGDCM2AItTEAf4ETM9v7j" + "biUWTirJyoWsGxm2eIUk1V+EKxcuO3FotFUe7lS6thmVd6OYOSW+02RXMNklmptzK9I3AK" + "DZNh82ugLNyrrd06BSiED+0MoGVVI4gi3wdFtRiai+MgQVeWIB4i"; public static final String Intermediate_Certificate_3_PL_01_10_crt = "MIICmTCCAgKgAwIBAgICAKkwDQYJKoZIhvcNAQEFBQAwXjELMAkGA1UEBhMCVVMxGDAWBg" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTItUEwuMDEuMTAwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "<KEY>" + "<KEY>" + "K6k5S4ZObxVHKhYDJyp3CcVT2+nENjzIfQQQaA11UK7Uf/jmVs0IC8e2scWzq0W2BeOLef" + "jVgNgXGsXyfLi9T4KJPPyGsKlIU2R2xKxgHmAOt/tw6OYX/OaEfM1jiQza5lkCAwEAAaNm" + "MGQwEgYDVR0TAQH/BAgwBgEB/wIBATAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBg" + "lghkgBZQMBMAEwEQYDVR0OBAoECHYI07i4owpIMBMGA1UdIwQMMAqACDE3dDXkS7TxMA0G" + "CSqGSIb3DQEBBQUAA4GBAK23Kx99Y9HtFBVnHWW/NfvNro7I5Wx/ZCko6ulHm84FPAjhnL" + "tvc4jmfAZd0wYPKQKWwUKUDWNEwIU1qkxyJYACckue35GLzj8aLY/z+h037vGonFmNutMM" + "rcRdiV7gVD17dYLVTt0RgxsDVDtut+twqHgIaKtKyJnl9dSgFFv1"; public static final String Intermediate_Certificate_4_PL_01_10_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEArgBnLCnqI6Sa7gXkZOvIKH4EL5i3CoG6eGG2R8aA" + "<KEY>" + "9LdS2TeuvFv47eiXoEBjMEAquCuSyHvW3lNrA+ESTnK3s7V4lBoO+o5mZD6dsCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECLTgYziQC9zmMBMGA1UdIwQMMAqACHYI07i4owpIMA0GCSqG" + "SIb3DQEBBQUAA4GBAEx8wgBjBglU98rocddKAEKXkt4MNzrpUMq75C9HtnuOtFgM2oY/OC" + "x67aZSTEph9ag6Hc+MyxWB5rzGD9j0y7OLsasE9AX8vjplUq50wq1xAFkGi1GnqRK/Oe7D" + "S6R66+UFHW/3KAeNe96aaJuMcx0TRbfkGbW1ASSi/ixMd9Gi"; public static final String Intermediate_CRL_1_PL_01_10_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1QTC4wMS4xMBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIZGf1yStywR0wDQYJKoZIhvcNAQEFBQADgYEAjkY5" + "nXjLst8CMz0fyEM7Ft2d9TOOJXV4TMAfSAP9QCnit8qzrdVdJ6TJIsJNZYBz9Ryr5K/iSw" + "KbYk0g6y/pskcMoHG3vJwNAxBbkf+fV7Eyve+90Z6oWDXHKLGCQQpdZ0a0wAqYeiScok8+" + "YHypEVLfbjWARR9fsci2Ps3tdvA="; public static final String Intermediate_CRL_2_PL_01_10_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>fRXHDPtnf2RB4bHDx77kDEib6nH6DGoJdx8WnRTZsTjly3MG" + "62LfVmjp/bJyKHUQqBDrilv21EWsaI9JOr673Nk5iTZa/645GdgyLzSmxvcVDN40BAH0py" + "/2gvBQTPNzp2W1IR2mebuLdHwTI="; public static final String Intermediate_CRL_3_PL_01_10_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMy1QTC4wMS4xMBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIdgjTuLijCkgwDQYJKoZIhvcNAQEFBQADgYEATVf2" + "cEEGphsIe0AsqNJ5rENLe8DeDAV8R4XCKdeP5qmHmLMm9Z4pX8bIfU7bCoXiNIwGvIU6ag" + "FmHPNHEj70cQFVqCX/ZESc02hit+Os9g7pcl7s9QgwVUCMZdCiF/+pSEp3eCL5tFoKmAZe" + "nxkL0KOSuKmBzuqRtZufbhDvmbw="; public static final String Intermediate_CRL_4_PL_01_10_crl = "<KEY>" + "<KEY>" + "BAMTDENBNC1QTC4wMS4xMBcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAItOBjOJAL3OYwDQYJKoZIhvcNAQEFBQADgYEAbG2B" + "BhvRQ1pY/8VFeiCRFD8mBzq5iW5hWv2P7Zdp9zEbQo0fI4Kbis3OGemEttCxvAc/UPfogr" + "UudImf3s8sLV9BS59xQUGQlxZ5XBNlripY8EjHNWrwgy7/x4hzlZ9yYBbqoNOqnHLy/gbM" + "XZWoCbIK0co70lh1soOQ6eqLDKM="; public static final String End_Certificate_PL_01_10_crt = "<KEY>" + "<KEY>" + "MRUwEwYDV<KEY>TIwMT" + "<KEY>" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBNS1QTC4wMS4xMDCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA3bx0qx8s4Zse6Ri6NqkLEKUPLIOhTFj/9Dh7sxvE" + "HpemBlTjbp2in08WTxEb9n8iAIWuGs3Vqm82ttBQmayjIaWD5oE/BE0oV/e91NAv/aRLsl" + "f7VtOb6vi8Ef6muOAjI2dUaUD6QONkqkJhnZ353uR3LZnsAEAW+InePGFNEGkCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAeYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECIokB8m8Vi4QMBMGA1UdIwQMMAqACLTgYziQC9zmMA0GCSqG" + "SIb3DQEBBQUAA4GBAKBGQwZQLQFXb+/kjP5xAtq+1rRtrblytjpv3ujJrKH1v2VB2+9boB" + "0YYYGJTy2Wuj0ZBEMeTzMO8Hol4Mq9pnYv5DCmfnZN3FuDidgnRsCjM3ZL7NcXXG9YwlKF" + "G2SXj0YfkSwN9gnyN11W8i+F/OSjlm+TDKHB3ePMcY8EnnXy"; public static final String[] TEST_63_DATA = new String[] { Intermediate_Certificate_1_PL_01_10_crt, Intermediate_Certificate_2_PL_01_10_crt, Intermediate_Certificate_3_PL_01_10_crt, Intermediate_Certificate_4_PL_01_10_crt, Intermediate_CRL_1_PL_01_10_crl, Intermediate_CRL_2_PL_01_10_crl, Intermediate_CRL_3_PL_01_10_crl, Intermediate_CRL_4_PL_01_10_crl, End_Certificate_PL_01_10_crt }; /* * test64 * */ public static final String Intermediate_Certificate_RL_02_01_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wMi4wMTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA3AN+Y3Hl/9V0nKXHQotb/cA2VfZc5vrRu+ZjwKgK" + "6KasGegAorKSTybYX/fTbnaPwykDPfSscAnzAW5WdF9+wTLmvYc+6pkcx1ryKkGmofFMXi" + "bZ5LUO/oK0iuNjBKfLdWoi+hpciKyPb9Bs8SO/svKSNqTEbn9ts3q6tpbngoECAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECGXQ07qiAqv2MBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBADKtN3OOaRdte0X4xLC6nTGaK/u7IEKQ0DjduDHwJR5w27zefrx48Z" + "dlq8t5lAfQJqWmfk7iCIW1QJPLcZOouWDP2S9Cb0YooGQRIEkMjpBn3Xufx0XUphtCDs3W" + "9LAMVXqfuce1tpZ6Dvrh6/H2X8rJMU29Czsz949bh6tcsHJi"; public static final String Intermediate_CRL_RL_02_01_crl = "<KEY>tQIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wMi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIZdDTuqICq/YwDQYJKoZIhvcNAQEFBQADgYEAxrDH" + "zKno1mkJqPTub0c9To6jC3CGTilV1E12oD0kFjkXqL40+W251qQ2wMC+G7ZrzBIc5dRuJ9" + "3feHZ7cc03/s3TziXDvSyfNOYpHzkPwT48HuSgBYgJ3uswwk+tDiA64NzbOJqssxxhFRok" + "9OpwC8eQkzgpA3a6816v2I3XL9s="; public static final String End_Certificate_RL_02_01_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUkwuMDIuMDEwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjAyLjAxMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCykRGcIKuxia47yRmJT8XpNNi2LTTbUUTteIBp" + "DZBfz2ExeWLruO9Rn1/oB/EP+4apx4r9rQ2tGsvr/7qQYeQK8W7eJzZgvxFadY57IMfUNq" + "1nEnj0ZvuWrOSf+K9v6FWX5Y2uyZS5Uvb1VVQv0Ev890+yXTtthPTjepk3JkkouwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECFIkVrx7NRAdMBMGA1UdIwQMMAqACGXQ07qiAqv2MA0GCSqGSIb3DQEBBQUAA4GBAI+B" + "T6bFZruoeFHXsYVjkQ42jSdYB9JuQkG7JLKte5gGlhyR+jMlJBzxBgNIfvlmYSnbRFPbE8" + "eqsGm90hJJoUuVMkm0i03H13uddlS494O6HhTGpaKcYwp3hbLhVcaY3wFTqTCuZk1T7Oxq" + "ggTrCDYvNH+/ZpQuy6nB/FH3SAHS"; public static final String[] TEST_64_DATA = new String[] { Intermediate_Certificate_RL_02_01_crt, Intermediate_CRL_RL_02_01_crl, End_Certificate_RL_02_01_crt }; /* * test65 * */ public static final String Intermediate_Certificate_1_RL_03_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wMy4wMT<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsZG8wsV3Kuo+jtnKxLYGBuAqQwUh6Cs7ioDTNUFI" + "UDDJ0lOP1HVTMBA7DEcyTCGvnQ02dEVVuCddBTQvG5RvW7G7cCEW37cS56/3yPsU1bD/cp" + "3C1pPJpoun04va91Sxtgcmx7jnz69QPVrucu6aI1sZyeOlvzb8K7DceaAfR98CAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECMNzJ3SpyOLxMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBABo7oKmQilgji3w1tGz1cMrWxZxqGJqOAKcHywli+oxFo2oxSfEuFS" + "tN2aEd2Ja5HU5a0ySztvByXF1TTNurGez7ARxmcS2kpoQtQXTloywza4A5N7iQwk0yyo/E" + "J4lrXUfVRwZHr7FwA7qMODtFb0+Zivv9JLaq19GhnRhzZyWp"; public static final String Intermediate_Certificate_2_RL_03_01_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1STC4wMy4wMTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAt7yNq1QZsV3p7OR8rgPuY7x7Bvs+nPhcLR7zFOgR" + "+plQUwpWQ2PhuzReVV4jNasKtNK9MIWoeV+eV3pEiso5obb9+Byvha1F6gkYNZMPs9Iv86" + "cJSMtownNJVGVAL9FEpof1QKLp7kfn08EjkoGmGy85xy9uFytd2S8n5TlrBqcCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECAVwoCPFqMtqMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAL9GufFieduzBJaMtsXtKHMf64O/KAGLSh1YDXS+a7Ku+EFw+WteKU" + "Ob6+c1m7VH9P711eATQoACotCdKusPECqeYDEmT9keqA4f7cP4VcvGwhvSVQJsPuB3LL3S" + "LIILE4zhT+O9G+5v+mkG/pEDirRYk6ZkdM91bsUuzsX40uyn"; public static final String Intermediate_CRL_RL_03_01_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1STC4wMy4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQE<KEY>jBAwwCoAIBXCgI8Woy2owDQYJKoZIhvcNAQEFBQADgYEAkwyA" + "I1rrz6tOmEpBHDzuJfqY2nbXCIXFN6dVuaKNZWHJ4ZNIc4/t29Wa5GgXYrVXyXRcXP/u5k" + "NEhOX2/NwCm6vL8+tclYP5qPLrh/Dk4v3nvcTFLKCvclAbf4Il0zfMQx+RRnO5PPqPDu5i" + "1tHHwOtA8Q+oO71lZEwPE+pX1Sc="; public static final String End_Certificate_RL_03_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "RpL1h8i+CVYKoX37yYwNXf+HkHhj1OXJSNrm7853ctmDf2h1fv3f1+qJLg4VRVzlEgErNq" + "74OR7XLXV77kGOmhip2g5BF5VKeqAdj0pCo1E5ZFHpRPFq/0DDmSda6GKJ6Dl8hwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECOHM3uWxFmcrMBMGA1UdIwQMMAqACMNzJ3SpyOLxMA0GCSqGSIb3DQEBBQUAA4GBAFBu" + "doX0TZK/yoUcrSkP8AtFiv5c7QvyEtigFZTT+lbW/g4RX/oJGNZCu78yAxCczl+Z6ft+0V" + "wInwahjyyAgw4QXxtw3b9CfqvT7HH7hcQ6r9ZA/NA9XpzNtxKfmXjzCZWdfmLJrd8KCnU/" + "utKRAObRBKiaTGa178SEWvtkoIXd"; public static final String[] TEST_65_DATA = new String[] { Intermediate_Certificate_1_RL_03_01_crt, Intermediate_Certificate_2_RL_03_01_crt, Intermediate_CRL_RL_03_01_crl, End_Certificate_RL_03_01_crt }; /* * test66 * */ public static final String Intermediate_Certificate_RL_03_02_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wMy4wMjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAvoTuc2LYBOhziBe02f6F8l9MwX74O1lknBcJjGvq" + "JcirQx/6hQgBQT4hz4RRXNy7DSBr3swEw4eDNSeyd6kvG0h9oI3+SVmVyPPVi5eKDL1roI" + "OBzmfx1+Nn/CnwOf8VroKDutBBQ0gJ24IEjwp6er/8hEAVN/yIjIi/MTFeoRkCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECKtCUOlmMPu6MBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAI9x8O/JgJuZV/s4OBUy3AvcW9QP3HWWBQSdxUdjSosT2schjn7wrR" + "gttL7vWjT1djsbATAHa5C3inG+VjGIq/NqWaPoHAucRNMs4oZX2ACZFuBLOb/qhywsKh5+" + "bjv4QgtqkUedzEratY6yQiJSiMSJVJSMzHosTVMX7oOp+cll"; public static final String Intermediate_CRL_RL_03_02_crl = "MIIBcDCB2gIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wMi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjAjMCECAg" + "CyFw05OTAxMDExMjAwMDBaMAwwCgYDVR0VBAMKAQGgIzAhMAoGA1UdFAQDAgEBMBMGA1Ud" + "IwQMMAqACKtCUOlmMPu6MA0GCSqGSIb3DQEBBQUAA4GBAAEZ0Hg6sKiVXIeK6zbQrKtMMz" + "Vz2K68+SqN1LAjlNW6u+HSTlAvhRIFO1Hv5Zj7qbO226rLxas/X2XWXpMlm84NHN8T4dZU" + "4Yo5rhhpCHckRxNYn3AFcfcV4ra1rrTtdx8e7e7/m0Ghog9Ny52ZuQThasL9caF0JxUx6d" + "zbBHPm"; public static final String End_Certificate_RL_03_02_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUkwuMDMuMDIwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjAzLjAyMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDNb6HGPRDulLMCCyCq6w2X8rHPtm1gN68JXFkX" + "j/BZsHhu29Z9hXj76hO//7O775EPVMSLyRy8t15yzYpXfZRHFaGB5bs8U2R5ClvsD2FR0H" + "t0JVfU6Ggn1lhO+jOiguJtXVRjofsfvHuiOe75ctaJ9lBpgwiV8tk4VRKz2e5xVwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECI3Gy0TgXMrwMBMGA1UdIwQMMAqACKtCUOlmMPu6MA0GCSqGSIb3DQEBBQUAA4GBAISQ" + "Qh9+7D6nk3FL5YQOzyZ0BSHQYjpbIVykJ+Lr4jBPKyGgCqW6jqWNg7X4waB77J2z/OkavY" + "A6qtpsk8r2wmG9thi8JyZZNhYMxAszHzFbBmSoxGRMvI0XarxgIu8Ky6V7jKVDLz12C3o9" + "H0yd+nZXilCD+p9BTjjg5bGUogJS"; public static final String[] TEST_66_DATA = new String[] { Intermediate_Certificate_RL_03_02_crt, Intermediate_CRL_RL_03_02_crl, End_Certificate_RL_03_02_crt }; /* * test67 * */ public static final String Intermediate_Certificate_RL_03_03_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "tLm29tLwfBh/8l5OC0y6Xeh5lx+NLdelsiZGRNaaWmWHj9Ji5V6rclr8sXRDUjxe12zLeh" + "0G+a0TfpL380cx9RItqQyA1ZRiUNymmJHnm13hwrf7LPirR9BMrtyTT2EI3cMCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECHYt39LYdEn0MBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAIoSGa7MxnOuHoWM/BoJKsCeBmBHYCYDKmQ19JfsDHW8z8oAFiikFb" + "Gtw1Qpc0GFfJgN0cppaXfe5lDS6BWL2dPorhu3URfXKu84ATLwGmNhqLDY7zh/zPvLtG2m" + "izaMLC6ZwZL5KELpYpcP15EHPDquyP1xpV3fT17GjpG9IH8k"; public static final String Intermediate_CRL_1_RL_03_03_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wMi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjAjMCECAg" + "C0Fw05OTAxMDExMjAwMDBaMAwwCgYDVR0VBAMKAQGgIzAhMAoGA1UdFAQDAgEBMBMGA1Ud" + "IwQMMAqACHYt39LYdEn0MA0GCSqGSIb3DQEBBQUAA4GBAI3HsXanos/N6uO3QVUaBZzmCt" + "w1HCHMrLVG614YlUQiEedQ/oEc7dwCeD1rUbGNVkFPIRvMkmUQo1klhKAlEUmrtW+aH+If" + "6oqumifqxvaycWidacbgNLIAMQtlQmniPF6Pq0dv8sNeKq4CE0gjRHOPJ2zIqy3kJ3tZYB" + "pTguwO"; public static final String Intermediate_CRL_2_RL_03_03_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "ySsD7U6ETy9ZRmiKUCJMUV9CIhCY0mEihHjW0DhFTyV1Hr01yN5zUr/IFVuP/Xcx36IX4l" + "dVv6/MgR1GeM/BUGZhm4z6YwfAosZ1N3zayIy/pP3fa1rVRl8cgCxc/8qxg9nH9p6yPpxM" + "AOOu6TLYquk/dA7wJPEW7MPixXY="; public static final String End_Certificate_RL_03_03_crt = "<KEY>" + "<KEY>ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUkwuMDMuMDMwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjAzLjAzMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKB<KEY>fCX0ryIEMg0mgeT" + "/z8Iw7xisht57koK4PTXY863aunfNNh+8oFTHZnoLB5dbkROj1nFRgcWPezzv1wNkZEpxn" + "NINtTPBogW22NPznoZ/rSk9JRFe0sCOVazkW9tZbY2ARqyJsYU1ez5tQIkDS47kQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECMWddsi+qmxKMBMGA1UdIwQMMAqACHYt39LYdEn0MA0GCSqGSIb3DQEBBQUAA4GBAAv8" + "nrJaqEycAyIKdPBYTUqaxjkv4SmonDDJG9OqvD78/o9hUKKteoMkNUp8eexTkWk0L72L4N" + "/eXB30+m65E841V+Dy8L4bXh15n4qz4cyMt8Kvm7nbCqcgpiyBJmBxzfaXDLSthlmhcJ4X" + "zDFnav1LEw5fZklt7cnMl4YvLD8d"; public static final String[] TEST_67_DATA = new String[] { Intermediate_Certificate_RL_03_03_crt, Intermediate_CRL_1_RL_03_03_crl, Intermediate_CRL_2_RL_03_03_crl, End_Certificate_RL_03_03_crt }; /* * test68 * */ public static final String Intermediate_Certificate_1_RL_05_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>BAQEFAAOBjQAwgYkCgYEA59vHTe5A9AcT237mW7HdSfh8Pu4P2wJNLT7RXczN" + "<KEY>" + "Lqw7NL+w9i3Un2G7JM2oWwugozQn/1hzr2Cii2TIB6K0RWKoPBJvaWUURS/G8CAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECP55Cc4eBca8MBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBALX594y5uF4Rt7CoRHeKZ5h8QiG7mc+kQDMjaSU4KJwNVVL0mJatQG" + "w90yFfhvprlgDt9UIAvpF6z5gysbrjHXJaEhVlXeg9D5mcxsL4THEc8f6oU1GjfT/SOD9l" + "QrT/keX3D9lcFEaTOgi0HIZ7aFIJgoWjXF/9kNNMEAs8sJNI"; public static final String Intermediate_Certificate_2_RL_05_01_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxDQTEtUkwuMDUuMDEwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMi1STC4wNS4wMTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAtl4hX6HlF0M+lSBTG8jHiB06hOy87LL81yAE2JQt" + "/6F+LZjuOBTCIc2yO2bVM3XzUnjyYDBYGnBFp/7XpRoiADuPJSfmkzmezpyJc+hm96UR1g" + "Bpo+pPKbRTWuM+FYy+vPtaDk5wKOrmyNx440PwbzxTN3JeWz17xeYE98bXMc0CAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECJOjtwEYV9VSMBMGA1UdIwQMMAqACP55Cc4eBca8MA0GCSqG" + "SIb3DQEBBQUAA4GBAFbkOffoIjWSfxEuKszoK7Fj27Hf5jlV92xqXtBLURjNGi9jCLUIUd" + "QLnONZLJYo70Z6XaGjpAK1EtZKVWsz11JDq5egE1zNES//9Tz8xDtJ7Lcq0mwneVFxmBuL" + "gxkw4GKbBFKz10FoSP7VJWaeW080WwKnp96Me5GtZRe260N1"; public static final String Intermediate_CRL_1_RL_05_01_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wNS4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjA4MDYCAg" + "C2Fw05OTAxMDExMjAwMDBaMCEwCgYDVR0VBAMKAQEwEwYJYIZIAWUCAQwCAQH/BAMCAQCg" + "IzAhMAoGA1UdFAQDAgEBMBMGA1UdIwQMMAqACP55Cc4eBca8MA0GCSqGSIb3DQEBBQUAA4" + "GBAIdOaBfpAEKWLrSvepVjk3UTfEfsSP6y+kFMl33YXy18xUvVpLarGu6YjQIpXiL+ulkP" + "eF8TAc9AarUjvDf0kcslIOt3NhdMxR4/F614Ds/rPEXs4c7n4kCkvAlFg/19iIFeCaynx3" + "X0s/v1SwzgAUHi3P+OwAGDApDTyKbnmzvt"; public static final String Intermediate_CRL_2_RL_05_01_crl = "MIIBSzCBtQIB<KEY>0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMi1STC4wNS4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIk6O3ARhX1VIwDQYJKoZIhvcNAQEFBQADgYEAfOOd" + "JiLUCFSurAafQEBfxE9KVrgFC+W9m64cmERicO1QL9aDVIDGJAIY1pdvWVdhLBIKwSugwB" + "ZH3ToptY+VizvFN1gkKGL2OuvDsXPHn1+QgmqvxYFPmvwDcwuxZ/3zD1VeHgEIKo9ugRnW" + "F8G2Ph6SWUxJCjJQpB7WIbydowI="; public static final String End_Certificate_RL_05_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>d/Cob+OVrS" + "lYytMjK4htO3MavavMZNTLAYFCXWhZ+Uo/uiAF0ddE4HaFI418eKJMSSbQyed0TG5Udw/t" + "3dhYeLzLEmVc0r00q5v+CLINsCNQAKaPV71UvoHrE092zZjmtacuAetBS1Q2ufpwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECGNPOXdCLpZ3MBMGA1UdIwQMMAqACJOjtwEYV9VSMA0GCSqGSIb3DQEBBQUAA4GBALTo" + "hfBEPdzZ6A9QNStakOhmhHYox70xOPuWqzSbIugZv4chKXNQGiUAoOGImTw1mcun/uPNtd" + "0bT+O+a9yX5gzW55CSmR/teHkTkND1mJhOMuYOmaCaBHnqgIIe1iEhMZQgag70+/tSmmQm" + "UpWGpxeK2c02tBK6gEmnqk75bKRT"; public static final String[] TEST_68_DATA = new String[] { Intermediate_Certificate_1_RL_05_01_crt, Intermediate_Certificate_2_RL_05_01_crt, Intermediate_CRL_1_RL_05_01_crl, Intermediate_CRL_2_RL_05_01_crl, End_Certificate_RL_05_01_crt }; /* * test69 * */ public static final String Intermediate_Certificate_RL_05_02_crt = "<KEY>" + "<KEY>ZXJubWVudDEMMAoGA1UECxMDR<KEY>DVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wNS4wMjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAouNcO1wHvKHPR15L7Fohr/QbTkPWGr9QYp2MXEDy" + "BRGHt63Ob+yNvsP/C74GJA+PzvcRELSnJxmBVbdRN5y/u4S6Zt4yTTcrvp4vl//luoGLOX" + "NHhCXbrGavyoP/iKpbfP7fy948AN34i95HuZENoGPjG5stX0uk12P087S2tPcCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECFi86MGPmMsXMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAFVZVMZEsaVuL0qX5Ls94+x8gBklxPfxgfG5LeBR2/YcqW+7BhsVA1" + "GQhjBtwqCU9SOL16oTrqgw2+YeWBjaYuNYVlxfdifd0pQydpE1iDQWxmoKLzSDmtWgRYhz" + "v0TB6j8q+0x5Q0OOrHX0jdIiBnHrLmReCK8dY1x6fb6I0tTH"; public static final String Intermediate_CRL_RL_05_02_crl = "MIIBhTCB7wIBATANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wNS4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjA4MDYCAg" + "C5Fw05OTAxMDExMjAwMDBaMCEwCgYDVR0VBAMKAQEwEwYJYIZIAWUCAQwCAQH/BAMCAQCg" + "IzAhMAoGA1UdFAQD<KEY>mMsXMA0GCSqGSIb3DQEBBQUAA4" + "GBAFMN6PWjz2bA1RRySYNXde2rKiYkZYghbtT4ig2yDJBKOiPnjdx+jriFJxGYpt7BvcNx" + "cDfijmDZ1clzprIvz0lFO6IwsQiWtLxOz4Doj6K2AD+7IxuGLceaXmubvi4e6VVC3xXGsu" + "OYsNgFzsdUXIazi74+eOcj4dqrHAepbhXT"; public static final String End_Certificate_RL_05_02_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxDQTEtUkwuMDUuMDIwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjA1LjAyMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCuWE1aFx3Zjk6gM0Wy6ijcUegbiGvhjBgqIGwv" + "YissT0v3KGAKoh5wGeKC+rePQNbZ91j4XDLvUNUdNw8HVNdNG/igIwsuaJ9teKSbqrAw9X" + "aD2YjJz/I6X6WXFd/eQ+g9lY3eidOXJkglYSwWMxUV62RUZbGyqjR1so+XpmYxCQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECLLbuNyVkkK9MBMGA1UdIwQMMAqACFi86MGPmMsXMA0GCSqGSIb3DQEBBQUAA4GBACKt" + "GgxIRXYHZGZgwYHjNzquM1pUJTbxxm3qYA4U6r44oAo1UzQTDpHOalflreGFvG05l1BCnQ" + "olQ8rcXU25v/CDfyww7cl8l7IxjYz7PNht7R97vjfMVqqButbn+BmU6D5kR9YXDCDPzaQ5" + "DrKNk+3tIjJNj6YhxhqC2tPG9RIN"; public static final String[] TEST_69_DATA = new String[] { Intermediate_Certificate_RL_05_02_crt, Intermediate_CRL_RL_05_02_crl, End_Certificate_RL_05_02_crt }; /* * test70 * */ public static final String Intermediate_Certificate_1_RL_06_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAmhxr4ckU5C3E57odZjgcxl46ZF2QVy+K86YoLOGT" + "mq34NSHTFxP93mrNqMYdFKFedUTNI68HkecFVvVKoXsDNBnhyyCTQ3xXhBcMUXFByB+55k" + "W5LeQ8l1G2ugsyZ7Z+P8uylrpeGJt4RjOTilhcI2mnfZ7S+arFGe4KYgnsaFUCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECOS4X3XqhyJYMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBALCPtNwXGxVSUNGErkBHSYCHyqlA55jKQQvZ4P0PznWEQ/gBJx34hq" + "LxiBO2G+iDomzHszeM77TXkQBpNxCUw26Jxv2HuvyBXuSprgjw5F1tvLqwsBAnD5vsb0uD" + "NrkKIzJSIBFQ1SRhuCObaXnamfPJHBmkP25t4QqEvoXMtVHB"; public static final String Intermediate_Certificate_2_RL_06_01_crt = "<KEY>" + "<KEY>" + "<KEY>MTIwMT" + "<KEY>" + "<KEY>" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA2IKrW6HDZJVFw3e4cC7v/jPGXAexI4B88707NhAc" + "qxSVfGTPJBdfWo5pkptZKN5/L5n6+rixLItHnei/uwBCHvhwzeEIGo1yVCgz6R2MoNB966" + "Q5CHWfT43BUjp0rZLJkK4hVKNyXB78NVv2Fly+XWBDEnzQvgVPWbGOvzE3zh0CAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECK/1z9Xbu2jGMBMGA1UdIwQMMAqACOS4X3XqhyJYMA0GCSqG" + "SIb3DQEBBQUAA4GBAAa/MVC+8ozm9py40a4o/kHbkkmFNQr4s9yi3KXXuVxsNvquFMXm4a" + "gC8GPoNjvV+RPRmU8wOM6I2/PPl2JEQRb7NDM8LkY/m/Au4GHVeln6FKlldiRm0A+YIr19" + "ip2RHOldikAjUUYv7JT3SP34sjtq2e8bsXfWEPG5BA/wxtm7"; public static final String Intermediate_CRL_1_RL_06_01_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wNi4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjAjMCECAg" + "C7Fw05OTAxMDExMjAwMDBaMAwwCgYDVR0VBAMKAQGgODA2MAoGA1UdFAQDAgEBMBMGCWCG" + "SAFlAgEMAgEB/wQDAgEAMBMGA1UdIwQMMAqACOS4X3XqhyJYMA0GCSqGSIb3DQEBBQUAA4" + "GBAJSexboWDaqLVY6iiWt8ZX5GwuNwDBN1R2TgM95H7JqjMgoWML887dKk24p4eKACFMWI" + "Ji9nwsqdZ/h1FtPhYpSoJ8l8vo4imMKr+tTnMngDNpMMZPQyRY1AK1jSrLhEtUdjiEtrTY" + "rG56RNt4YyUtNxxfkEymvwJxmO/4YcAz/l"; public static final String Intermediate_CRL_2_RL_06_01_crl = "<KEY>" + "<KEY>" + "<KEY>cNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIr/XP1du7aMYwDQYJKoZIhvcNAQEFBQADgYEAImRg" + "n9A7px9exOJL4Se9jsSHzZ3sAd3y16LdAb+HLtYLl1swNB4KPE+OebtzEoYiSzVVwezdlm" + "5WseZjfbd0q01srZI4FeACZe99iBSpKymdKxw2gRvfYZ8ZMwFpK2mQq9cmygFn53iOwP7j" + "3KE+lllielu7sYyEnkliF9wsaG0="; public static final String End_Certificate_RL_06_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "/<KEY>" + "unxLX+ciM3T7rUQm/LueQTEC2Ww19T6QOg2i8rEadYT0OoW6OcvyuomemspxgClQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECK5pHDrhL7xjMBMGA1UdIwQMMAqACK/1z9Xbu2jGMA0GCSqGSIb3DQEBBQUAA4GBAF3J" + "Kskjs4jp+BBoei9YWYtmOupn9w3oGyhknNh2jz7api5Gtgk2SyKfYFvN6EhWZJEab0hPFe" + "WuYwO7zNCLGHw0cFXT/R48ogd6JkH6xDwj4afZDkWVTu8oaVD4h1rTYS6WPRzizAozOzhi" + "tmIo+MV/lCG8+jdVtFgeKycI8aX7"; public static final String[] TEST_70_DATA = new String[] { Intermediate_Certificate_1_RL_06_01_crt, Intermediate_Certificate_2_RL_06_01_crt, Intermediate_CRL_1_RL_06_01_crl, Intermediate_CRL_2_RL_06_01_crl, End_Certificate_RL_06_01_crt }; /* * test71 * */ public static final String Intermediate_Certificate_RL_06_02_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wNi4wMjCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxMlJ0vbkMRGzuEDTDGuPmwDzU1xn3dFDZ1Tx6ONP" + "fwNN5gk6r9kYl5TZ8f5TbkQSnOzyhDSqX8dGumCSgukETXtYBU2+KiIAtliu5NJRbXe3La" + "vn102HxaHDLGsR0FFLiFM9GVhOOXryJoXoGZqUwvqbWyaQQEzrV4RWmuOv7xMCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECFNaMo88Vb5MMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAJsjJG4/U1OWCJPB1u7UD3TPKRgOR9hT5l3LzFw5s0CEGt2Beg25LP" + "GEGcr0sEdosVQI5m5CuPolpmlQv0FkZv5M1W+uXX+F/6edtMDEquDpdR97ihQSLZjFFqjE" + "ytuaD4gqtL/BKBbz3e93mOmR9Wi+kWlXOYl0j8wpU9ePSjDV"; public static final String Intermediate_CRL_RL_06_02_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wNi4wMhcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWjAjMCECAg" + "C+Fw05OTAxMDExMjAwMDBaMAwwCgYDVR0VBAMKAQGgODA2MAoGA1UdFAQDAgEBMBMGCWCG" + "SAFlAgEMAgEB/wQDAgEAMBMGA1UdIwQMMAqACFNaMo88Vb5MMA0GCSqGSIb3DQEBBQUAA4" + "GBAAKNj5xmtE7wzO1p5igiAmCDV6KuYsiPAQPHPEBlmo85vzvWv2hpEtmk4nDhehogl0QX" + "rhvRRqR+cPE5vBLB8mAStW+ZR6FXQPnmU5qGHqCQ4Wh6TWZesd7oyftoS7bJD5Xdf5ErA9" + "qijWoz8FgxZHVnAFmjA0rUINkdQ5JfE5oj"; public static final String End_Certificate_RL_06_02_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxDQTEtUkwuMDYuMDIwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjA2LjAyMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQD3UzwrnwKRlP00Pn49iI35S0wLn7c1I3rsmzdm" + "YFicetxHNeOKXLg1CN1bqkbAJ+N39fKjrkusqb2T+R3zhAV5LeLT4fzbHYdU7f4r6xgW2/" + "b2WLv+QVR+ldTsVxgPp/ZUgYi4/vAow4Q/6IT+zWtlawMBob/nLjVl+jQ9N4coFwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECPhq75noL+9WMBMGA1UdIwQMMAqACFNaMo88Vb5MMA0GCSqGSIb3DQEBBQUAA4GBAIU2" + "5bLX/NyDC8dKUxRwVn8oc3YPQjK0zXGdUr15Ib+cLdRyFVCuAyxVdpTf/csuga6tDhGuTL" + "B18mTE/fAjhUOiKiOLD6m4P77Nj67l2NTi86RimsI/Z6r5+bU31ahrls/7kr788+f4oEIY" + "TyOJecojsJUOG3qzK9J50iszclxg"; public static final String[] TEST_71_DATA = new String[] { Intermediate_Certificate_RL_06_02_crt, Intermediate_CRL_RL_06_02_crl, End_Certificate_RL_06_02_crt }; /* * test72 * */ public static final String Intermediate_Certificate_RL_07_01_crt = "MIICljCCAf+gAwIBAgICAL8wDQYJKoZIhvcNAQEFBQAwXjELMAkGA1UEBhMCVVMxGDAWBg" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wNy4wMTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxjHxSRwJjEkLG9Al5uSQ22QI8N/hJ8hhkhh9qlaJ" + "mHusM8sWpAp2vnuumlThTA2zZbptXZ8Krb7i/Kpym4wo3ZkEThwi/ijsM5QCunQJmESRGD" + "yPZJjfhWjoC+lCjbmzsOGLMETpgSEMy+EyoXkRCnKmXcmCMS8HjLrqdnwiWBUCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECHPEkeIs8GuwMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBABCmgEnb8dfnG9lWQKT5BmQm459WqRQAiqdfqf9w0qRMuVrdfLMwqx" + "oq4uh10A3d+auHohgT2fT9RzNaWnRoNaH9K6qLQsdCUZdqjbEGdyiIFzvWP9MkV9nhDlo2" + "GgiU68HfnpKO/WA9EaRHyEzwT9o4SA7hAbz+3L12hB2WLSOg"; public static final String Intermediate_CRL_RL_07_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "f1tRnuzoq7dgQo+eOYhb5JyRyrNaSwNnRy82wOP+/G3NH8V3NGonDFOOcd9SoLTbeW4o71" + "vdOrKZgom5H2MZK5M4wTdfPAfXB1wBxOMzW5jXzsRtaha4l6EPI+GVL0eXN+aW3k/pscdA" + "ToI+OxTmRRnCYS6yW3qL9RoTIXQ="; public static final String End_Certificate_RL_07_01_crt = "<KEY>" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUkwuMDcuMDEwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjA3LjAxMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCrm/Zem9Tt2UJFUKdAhTNwvhLo03uOax74ZgbV" + "YNTCpKeEWkV5d5d7DRC4mCTX1yjIlg6K4l7T+sRGI4XAcDRgYLuoyG1X958XCXSdIPTdbK" + "Hxs/tFv4mrCwi1kU+zjyzDoqgjT6kUxgM39rfcvDMH6qSzHQKgTFp7Tj/DHiELqwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECGFR8c6rRbhcMBMGA1UdIwQMMAqACHPEkeIs8GuwMA0GCSqGSIb3DQEBBQUAA4GBAANZ" + "TVR288mKpDDzm9XZMZ9+K1kPZ+eQYX+vUul11luVw27AIJGR8Fb4PIGl4+ALvqU3NQP/6v" + "d+zvS7IfiR6q7aLS3w111BUCgDhTJAp3oSo12qfcp+2DB1M9QfjrM9nKgmh5bBJigdJwJM" + "W8HHKStUMLdxg+qkZJgZpnyowCFM"; public static final String[] TEST_72_DATA = new String[] { Intermediate_Certificate_RL_07_01_crt, Intermediate_CRL_RL_07_01_crl, End_Certificate_RL_07_01_crt }; /* * test73 * */ public static final String Intermediate_Certificate_RL_07_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>BAQEFA<KEY>0CvEneaAPtxZOTqlh/TXBM6V0bQgKbO58yEyURcO" + "<KEY>sW4MMzZ13UCc0aGa+eE8XRULBe5cgaGxJKwVnEqz3W8z" + "v1MjOk7Anb8TkxMSlWlptC6V3eRA85p5Id9gXbIrP3E3NuSfyx6246oLjNnbECAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECIb5Ia6wKcHtMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAAYEHQY+Z4qv4bYLmd+sz4aNGwZF7FT6ZIQ43OSeb+t+ibL7rZ0X0y" + "4SCTMs1mAB44IA6RFurmeCFk0ladRCn3A1xaVI1HlHen13ovzDA9ogL4CWbYXvCUv/znQY" + "yVSQCTKwT8iVam8xS1MsNCe408iVjhRfR6u9Hi31M+Pf+AUe"; public static final String Intermediate_CRL_RL_07_02_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1STC4wNy4wMhcNNTAwMTAxMDYwMTAwWhcNNTAwMTAxMTIwMTAwWqAjMCEwCg" + "YDVR0UBAMCAQEwEwYDVR0jBAwwCoAIhvkhrrApwe0wDQYJKoZIhvcNAQEFBQADgYEALVUq" + "3Wq/Opvp9ifmQ4VXz4dgLNR+5Nz3muJ4RZt5R5b4R3RYllhgXNYw2EbEVCFjnfm97z73Ke" + "wzVV+fo/u5GbqJHN2cAVEHarOpasLxySktNA1Cwq5OTzUF0dYISqYbyBvVcaOQBvU/Lwj7" + "MQJJVVq96iDKnAJYBX03EHKbBeg="; public static final String End_Certificate_RL_07_02_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>HFPWN36CYDJzTscNpbGrD3G2MPkg4GqoTo0rU28NYVzj4SwqYoSLIbXB+r" + "SVgWcxNgbJ+4x9bK3YccNLR1PWEFxz1NckhCLBmb5pI4E34MCxQ6PvFO02I19FwQIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECIutV9ItCIbZMBMGA1UdIwQMMAqACIb5Ia6wKcHtMA0GCSqGSIb3DQEBBQUAA4GBALQE" + "cBr31h3jKUHcuf3yztr9NWUkGMDM0NCXHOpQl7JbV3P5BjvaiRYWlUrN7+92G8EaUFORto" + "zp8GG+d/MvFooVQOvpOzyhautYWyqq3AWpZLppnxNk1mRAdjUAvJaONtv37eLsma0bhtLM" + "j62sQQ6CdoKbMtIEGuJgpwWqHYwY"; public static final String[] TEST_73_DATA = new String[] { Intermediate_Certificate_RL_07_02_crt, Intermediate_CRL_RL_07_02_crl, End_Certificate_RL_07_02_crt }; /* * test74 * */ public static final String Intermediate_Certificate_RL_07_03_crt = "<KEY>" + "<KEY>ZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wNy4wMzCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEA8QzGjV0NVTNrOgkeqTkQFCOvl7M0qmjmYJjuw4R3" + "YfQIXDN0m9HR2JKp5WKTSUedmWviGS7NbGSzLR7+6OkLwSoxN9PkA/fMko7O0KWBfduhvn" + "jymlDMb2GPb1hBjScbq8fVJHwzqUm+BtEO2MXwXKYY2hZr+OEyEGhSEThp90MCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECFwl2XphEZRSMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAAb5GERgYVGuOb62gVZAAnhuk5K7CCkWZucOv6iI7pAgI6S7pvool/" + "dXHC0tzgQ+/MkuWcr+22k/ya7f+iSfiYokjnQkgoYFYk3PkjyOXA3mzs5qhF0nOP6Gvmz4" + "asONA+qZSqa4pjxF9Kn8L64f9yeyEXnckmbzdmbjAFCveQIP"; public static final String Intermediate_CRL_RL_07_03_crl = "<KEY>" + "5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNV" + "BAMTDENBMS1STC4wNy4wMxcNOTkwMTAxMDYwMTAwWhgPMjA1MDAxMDExMjAxMDBaoCMwIT" + "AKBgNVHRQEAwIBATATBgNVHSMEDDAKgAhcJdl6YRGUUjANBgkqhkiG9w0BAQUFAAOBgQAz" + "DMl8P16hylNkUEw4z9//PJFObNPZCYdmzBfp0K3tNRrOAouUVegyX0gDHi8O+bmmJNgcnC" + "tMRXx+D4qP7bx5fDS2MVQhSsncf6u4UZ8pxbRc0JmwR5oGZLPQabrctgmEmg8ZKGApKtsf" + "pGyvvTwaAzM+GaWXD68bBEN3VfVdeQ=="; public static final String End_Certificate_RL_07_03_crt = "<KEY>" + "<KEY>" + "MRUwEwYDVQQDEwxDQTEtUkwuMDcuMDMwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjA3LjAzMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDU6mec24uBaVip7fFWHas+o/lpZBOfj/IPHXQ9" + "QaRZwmJZBB81AX3BJ60DD12o/+RXdHl7B2Eh9kYv/QEXOKmyhJFSPa0Lv7MQ/hCIcL4m1U" + "FDGtJ3SUixZMqVBP0xjwXoNS88zzaCBL+co2TxhBrYMzeNQOX1eEkXMT4pvULmAwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECBBgFdYLuvk9MBMGA1UdIwQMMAqACFwl2XphEZRSMA0GCSqGSIb3DQEBBQUAA4GBAAof" + "dPOGa4ZxRPcLw6zWM/NLzF3XYDqXAsZBsC75r0GRrogqEYn07tVUDNaQczDtjRLBRNmxWE" + "+qCkJwc+wOBJqOFUxcuhK9oag6OE94+UIHdh3Td9i2ELZXj9RSNchnjyFohj5gk1dJSO41" + "86Ls3mCT9JcssR0dSxxkF0ENfZCG"; public static final String[] TEST_74_DATA = new String[] { Intermediate_Certificate_RL_07_03_crt, Intermediate_CRL_RL_07_03_crl, End_Certificate_RL_07_03_crt }; /* * test75 * */ public static final String Intermediate_Certificate_RL_08_01_crt = "MIICljCCAf+gAwIBAgICAMUwDQYJKoZIhvcNAQEFBQAwXjELMAkGA1UEBhMCVVMxGDAWBg" + "NVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UECxMDRG9EMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxUcnVzdCBBbmNob3IwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBeMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb2QxEDAOBgNVBAsTB1Rlc3RpbmcxFTATBgNVBAMTDENBMS1STC4wOC4wMTCBnzANBg" + "kqhkiG9w0BAQEFAAOBjQAwgYkCgYEAs2YRTEl3C1TmmneJ6K110nSACn+KXxSOTGAGN5xv" + "XW751StpE2iEQIbRVPQdMzmcQX0bcg/WpdrewPQld9NRjFj7it+9YNQh7vMKhZwoAPoDmv" + "TnTdTEuV0c1FLVDVhiaAD9KMBa4fBLRfTKVzgzAr+oNqLhm3YBd2JWRHg+fA8CAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECB4we8+hIrkKMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBABTQI82uCMwQ4bgUWr9lawSI5DyWg3KY13F45rAlmKyckgne9SHbCH" + "+Lvm3XkkIqKmeHfJ3QTf7bpz6eErn3CxRrGm5JWblcYbVT+smjboJ9A0BXifqINYLy3qGc" + "AnNRkPq8OUREj2sU1qWKagUIgA/Vk2WyZhcUiApJPHI4fwv9"; public static final String Intermediate_CRL_RL_08_01_crl = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>YD<KEY>" + "<KEY>EAkjF0oERt5XW2i70gyspkEYIHyGCHnqngky5yuwQSRrlW7t0vGdKV7W" + "50evTeSVV41uhi1MBcccpx1MdRcB5vsatFSSKcKx4NF3PuHXxXCm2HkfXQy4K5zftE3jOZ" + "5s+yTHiw3s/QSErtHRca+TQcEZwamI+p402TEa6e82l6xHI="; public static final String End_Certificate_RL_08_01_crt = "<KEY>" + "<KEY>ZXJ<KEY>oGA1UECxMDRG9kMRAwDgYDVQQLEwdUZXN0aW5n" + "MRUwEwYDVQQDEwxDQTEtUkwuMDguMDEwHhcNOTgwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMT" + "AwWjBgMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQL" + "EwNEb0QxEDAOBgNVBAsTB1Rlc3RpbmcxFzAVBgNVBAMTDlVzZXIxLVJMLjA4LjAxMIGfMA" + "0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDfEMqWMqk3Rre5m4ILtQIz45JImvU379Al/S6t" + "2y/TzimJc4nhIKQp80VaZA/gwu/DcvMgJPM+FFz5U5rRkDaYASsc34tZUESF5LC6ZbtGqf" + "J96IKdajvkGLsHyI7dseuwaQ0FlOwcmKMSR898MGNNbKxaQNLEXsIFypRDsN6JhwIDAQAB" + "o1IwUDAOBgNVHQ8BAf8EBAMCBeAwFgYDVR0gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECMT22ARjB1ABMBMGA1UdIwQMMAqACB4we8+hIrkKMA0GCSqGSIb3DQEBBQUAA4GBAIaP" + "EqI7oHl/+h3MszG4VB1Va9NTN0kaysTyjQSVBi9jhOlPkzuXc2wI1bymBhatHEn6OrgP13" + "vsOiH2BiyudYcYjKpwI4FUiyKLIc0CXzM0VYFoMzb91QtsK1EnvAPDKNYVVFXrL7ABVIK4" + "hU6HfMMUbnpKWBxT5274iHScX8tL"; public static final String[] TEST_75_DATA = new String[] { Intermediate_Certificate_RL_08_01_crt, Intermediate_CRL_RL_08_01_crl, End_Certificate_RL_08_01_crt }; /* * test76 * */ public static final String Intermediate_Certificate_RL_09_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>FAAOBjQAwgYkCgYEAsvkvLv5fMFYvohaXO8a7GgU4rDHe9iL7LP1VeNUg" + "GIdJGqPEnuggQ/<KEY>" + "kf2z9dWoAij15RXPliywZz+S6bTtcEQAREyBQ6M8/HJ83wRXp/uCpdPOSxVPkCAwEAAaNj" + "MGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwFgYDVR0gBA8wDTALBglghk" + "gBZQMBMAEwEQYDVR0OBAoECISY4bvGMEBTMBMGA1UdIwQMMAqACKua6/nC51SPMA0GCSqG" + "SIb3DQEBBQUAA4GBAAd7g+dWso4V/Vr+QIoNLueCBAYWdOF+Yz3VeomcsDAs2V8E+xcZaq" + "jo2LrMygYCeMxVfXx/ZdhLPOaZ+ahNAbk+nWRwj35JdTNAAbMMWFdZUgR6N+uzx1v7i86p" + "AWUpRJ9IYPgUoQ5pmjdf3Ru1nrLfRt4yp+kNHWp6IL/+MwcM"; public static final String Intermediate_CRL_RL_09_01_crl = "<KEY>" + "<KEY>" + "BAMTDENBMS1STC4wOS4wMRcNOTkwMTAxMTIwMTAwWhcNNDgwMTAxMTIwMTAwWqA0MDIwCg" + "YDVR0UBAMCAQEwDwYDVR0cAQH/BAUwA4IB/zATBgNVHSMEDDAKgAiEmOG7xjBAUzANBgkq" + "hkiG9w0BAQUFAAOBgQAKTXYgqlP+upFIwOSpdaVKDT8aqFzY9nSIsxHg5Wdl43U7p44LvQ" + "lW8XKhw74oQl1ExU5s7mDaEqB0JIozGzmoNyKsErgWKNW+lpKSxR5+1EHOB6Oo2KijpTsv" + "GFrHFCnF09f9JaTaMRIXOljx3rMO1UZsftKy/L9z3aUz8hQRnQ=="; public static final String End_Certificate_RL_09_01_crt = "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>" + "<KEY>fGvWXhXmSSCUfzg5xBqdUXrqcyxOME3vdgF1uOFZ4q2K6+Zuxmm+GCOCIpe+Gl" + "Jzqz4WKXG0iaXXQOYa56itNc/6Z6D/aAjNJavI19w0lmb9l6U2WBfn3LywxHp4dwIDAQAB" + "o1IwUDAOB<KEY>gBA8wDTALBglghkgBZQMBMAEwEQYDVR0OBA" + "oECOri1JgnJfLjMBMGA1UdIwQMMAqACISY4bvGMEBTMA0GCSqGSIb3DQEBBQUAA4GBADmV" + "Ee0xy25Z0HtmWwprKPjJDr/p7TgzbmNC58pUPkgtxnJFP4yrzNB9FQBWSfnjZpzQkLSU7i" + "7O6cf5HkqjQqoPErDnJLWgGzjbF80v2IIyZk7rEpAAM4MwjIk7hFvJK8QkTht9F4N1zj2X" + "0TQkmlbo9Z4SFj/3fsbl9h2GdKuU"; public static final String[] TEST_76_DATA = new String[] { Intermediate_Certificate_RL_09_01_crt, Intermediate_CRL_RL_09_01_crl, End_Certificate_RL_09_01_crt }; }
197,205
396
<filename>test/py/ganeti.ssconf_unittest.py #!/usr/bin/python3 # # Copyright (C) 2012 Google Inc. # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are # met: # # 1. Redistributions of source code must retain the above copyright notice, # this list of conditions and the following disclaimer. # # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS # IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, # EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, # PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR # PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF # LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING # NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. """Script for testing ganeti.ssconf""" import os import unittest import tempfile import shutil import errno from ganeti import utils from ganeti import constants from ganeti import errors from ganeti import ssconf import testutils import mock class TestReadSsconfFile(unittest.TestCase): def setUp(self): self.tmpdir = tempfile.mkdtemp() def tearDown(self): shutil.rmtree(self.tmpdir) def testReadDirectory(self): self.assertRaises(EnvironmentError, ssconf.ReadSsconfFile, self.tmpdir) def testNonExistantFile(self): testfile = utils.PathJoin(self.tmpdir, "does.not.exist") self.assertFalse(os.path.exists(testfile)) try: ssconf.ReadSsconfFile(testfile) except EnvironmentError as err: self.assertEqual(err.errno, errno.ENOENT) else: self.fail("Exception was not raised") def testEmptyFile(self): testfile = utils.PathJoin(self.tmpdir, "empty") utils.WriteFile(testfile, data="") self.assertEqual(ssconf.ReadSsconfFile(testfile), "") def testSingleLine(self): testfile = utils.PathJoin(self.tmpdir, "data") for nl in range(0, 10): utils.WriteFile(testfile, data="Hello World" + ("\n" * nl)) self.assertEqual(ssconf.ReadSsconfFile(testfile), "Hello World") def testExactlyMaxSize(self): testfile = utils.PathJoin(self.tmpdir, "data") data = "A" * ssconf._MAX_SIZE utils.WriteFile(testfile, data=data) self.assertEqual(os.path.getsize(testfile), ssconf._MAX_SIZE) self.assertEqual(ssconf.ReadSsconfFile(testfile), data) def testLargeFile(self): testfile = utils.PathJoin(self.tmpdir, "data") for size in [ssconf._MAX_SIZE + 1, ssconf._MAX_SIZE * 2]: utils.WriteFile(testfile, data="A" * size) self.assertTrue(os.path.getsize(testfile) > ssconf._MAX_SIZE) self.assertRaises(RuntimeError, ssconf.ReadSsconfFile, testfile) class TestSimpleStore(unittest.TestCase): def setUp(self): self._tmpdir = tempfile.mkdtemp() self.ssdir = utils.PathJoin(self._tmpdir, "files") lockfile = utils.PathJoin(self._tmpdir, "lock") os.mkdir(self.ssdir) self.sstore = ssconf.SimpleStore(cfg_location=self.ssdir, _lockfile=lockfile) def tearDown(self): shutil.rmtree(self._tmpdir) def _ReadSsFile(self, filename): return utils.ReadFile(utils.PathJoin(self.ssdir, "ssconf_%s" % filename)) def testInvalidKey(self): self.assertRaises(errors.ProgrammerError, self.sstore.KeyToFilename, "not a valid key") self.assertRaises(errors.ProgrammerError, self.sstore._ReadFile, "not a valid key") def testKeyToFilename(self): for key in ssconf._VALID_KEYS: result = self.sstore.KeyToFilename(key) self.assertTrue(utils.IsBelowDir(self.ssdir, result)) self.assertTrue(os.path.basename(result).startswith("ssconf_")) def testReadFileNonExistingFile(self): filename = self.sstore.KeyToFilename(constants.SS_CLUSTER_NAME) self.assertFalse(os.path.exists(filename)) try: self.sstore._ReadFile(constants.SS_CLUSTER_NAME) except errors.ConfigurationError as err: self.assertTrue(str(err).startswith("Can't read ssconf file")) else: self.fail("Exception was not raised") for default in ["", "Hello World", 0, 100]: self.assertFalse(os.path.exists(filename)) result = self.sstore._ReadFile(constants.SS_CLUSTER_NAME, default=default) self.assertEqual(result, default) def testReadFile(self): utils.WriteFile(self.sstore.KeyToFilename(constants.SS_CLUSTER_NAME), data="cluster.example.com") self.assertEqual(self.sstore._ReadFile(constants.SS_CLUSTER_NAME), "cluster.example.com") self.assertEqual(self.sstore._ReadFile(constants.SS_CLUSTER_NAME, default="something.example.com"), "cluster.example.com") def testReadAllNoFiles(self): self.assertEqual(self.sstore.ReadAll(), {}) def testReadAllSingleFile(self): utils.WriteFile(self.sstore.KeyToFilename(constants.SS_CLUSTER_NAME), data="cluster.example.com") self.assertEqual(self.sstore.ReadAll(), { constants.SS_CLUSTER_NAME: "cluster.example.com", }) def testWriteFiles(self): values = { constants.SS_CLUSTER_NAME: "cluster.example.com", constants.SS_CLUSTER_TAGS: "value\nwith\nnewlines\n", constants.SS_INSTANCE_LIST: "", } self.sstore.WriteFiles(values) self.assertEqual(sorted(os.listdir(self.ssdir)), sorted([ "ssconf_cluster_name", "ssconf_cluster_tags", "ssconf_instance_list", ])) self.assertEqual(self._ReadSsFile(constants.SS_CLUSTER_NAME), "cluster.example.com\n") self.assertEqual(self._ReadSsFile(constants.SS_CLUSTER_TAGS), "value\nwith\nnewlines\n") self.assertEqual(self._ReadSsFile(constants.SS_INSTANCE_LIST), "") def testWriteFilesUnknownKey(self): values = { "unknown key": "value", } self.assertRaises(errors.ProgrammerError, self.sstore.WriteFiles, values, dry_run=True) self.assertEqual(os.listdir(self.ssdir), []) def testWriteFilesDryRun(self): values = { constants.SS_CLUSTER_NAME: "cluster.example.com", } self.sstore.WriteFiles(values, dry_run=True) self.assertEqual(os.listdir(self.ssdir), []) def testWriteFilesNoValues(self): for dry_run in [False, True]: self.sstore.WriteFiles({}, dry_run=dry_run) self.assertEqual(os.listdir(self.ssdir), []) def testWriteFilesTooLong(self): values = { constants.SS_INSTANCE_LIST: "A" * ssconf._MAX_SIZE, } for dry_run in [False, True]: try: self.sstore.WriteFiles(values, dry_run=dry_run) except errors.ConfigurationError as err: self.assertTrue(str(err).startswith("Value 'instance_list' has")) else: self.fail("Exception was not raised") self.assertEqual(os.listdir(self.ssdir), []) def testEnabledUserShutdown(self): self.sstore._ReadFile = mock.Mock(return_value="True") result = self.sstore.GetEnabledUserShutdown() self.assertTrue(isinstance(result, bool)) self.assertEqual(result, True) self.sstore._ReadFile = mock.Mock(return_value="False") result = self.sstore.GetEnabledUserShutdown() self.assertTrue(isinstance(result, bool)) self.assertEqual(result, False) def testGetNodesVmCapable(self): def _ToBool(x): return x == "True" vm_capable = [("node1.example.com", "True"), ("node2.example.com", "False")] ssconf_file_content = '\n'.join("%s=%s" % (key, value) for (key, value) in vm_capable) self.sstore._ReadFile = mock.Mock(return_value=ssconf_file_content) result = self.sstore.GetNodesVmCapable() for (key, value) in vm_capable: self.assertTrue(isinstance(key, str)) self.assertTrue(key in result) self.assertTrue(isinstance(result[key], bool)) self.assertEqual(_ToBool(value), result[key]) def testGetHvparamsForHypervisor(self): hvparams = [("a", "A"), ("b", "B"), ("c", "C")] ssconf_file_content = '\n'.join("%s=%s" % (key, value) for (key, value) in hvparams) self.sstore._ReadFile = mock.Mock(return_value=ssconf_file_content) result = self.sstore.GetHvparamsForHypervisor("foo") for (key, value) in hvparams: self.assertTrue(key in result) self.assertEqual(value, result[key]) class TestVerifyClusterName(unittest.TestCase): def setUp(self): self.tmpdir = tempfile.mkdtemp() def tearDown(self): shutil.rmtree(self.tmpdir) def testMissingFile(self): tmploc = utils.PathJoin(self.tmpdir, "does-not-exist") ssconf.VerifyClusterName(NotImplemented, _cfg_location=tmploc) def testMatchingName(self): tmpfile = utils.PathJoin(self.tmpdir, "ssconf_cluster_name") for content in ["cluster.example.com", "cluster.example.com\n\n"]: utils.WriteFile(tmpfile, data=content) ssconf.VerifyClusterName("cluster.example.com", _cfg_location=self.tmpdir) def testNameMismatch(self): tmpfile = utils.PathJoin(self.tmpdir, "ssconf_cluster_name") for content in ["something.example.com", "foobar\n\ncluster.example.com"]: utils.WriteFile(tmpfile, data=content) self.assertRaises(errors.GenericError, ssconf.VerifyClusterName, "cluster.example.com", _cfg_location=self.tmpdir) class TestVerifyKeys(unittest.TestCase): def testNoKeys(self): ssconf.VerifyKeys({}) def testValidKeys(self): ssconf.VerifyKeys(ssconf._VALID_KEYS) for key in ssconf._VALID_KEYS: ssconf.VerifyKeys([key]) def testInvalidKeys(self): for key in ["", ".", " ", "foo", "bar", "HelloWorld"]: self.assertRaises(errors.GenericError, ssconf.VerifyKeys, [key]) if __name__ == "__main__": testutils.GanetiTestProgram()
4,312
521
#pragma once #include <utility> #include <elle/Printable.hh> #include <elle/attribute.hh> #include <elle/log.hh> namespace elle { namespace das { template <typename O, typename S, typename P = typename S::template method_signature<O>> struct BoundMethod; template <typename O, typename S, typename R, typename ... Args> struct BoundMethod<O, S, R (Args...)> : public Printable::as<BoundMethod<O, S, R (Args...)>> { BoundMethod(O& o) : _object(o) {} ELLE_LOG_COMPONENT("elle.das.BoundMethod"); auto operator ()(Args ... args) const { ELLE_TRACE_SCOPE( "call %s%s", this, std::tuple<Args const&...>(args...)); return S::method_call(this->_object, std::forward<Args>(args)...); } void print(std::ostream& o) const { elle::fprintf(o, "%s.%s", this->_object, S::name()); } ELLE_ATTRIBUTE_R(O&, object); }; template <typename S, typename O> BoundMethod<O, S> bind_method(O& o) { return {o}; } template <typename O, typename S> BoundMethod<O, S> bind_method(O& o, S const&) { return {o}; } template <typename O, typename R, typename ... Args> std::function<R (Args...)> bind_method(O const& o, R (O::*m)(Args ... args) const) { return [&o, m] (Args ... args) { return (o.*m)(std::forward<Args>(args)...); }; } template <typename O, typename R, typename ... Args> std::function<R (Args...)> bind_method(O& o, R (O::*m)(Args ... args)) { return [&o, m] (Args ... args) { return (o.*m)(std::forward<Args>(args)...); }; } } }
822
348
<filename>docs/data/leg-t2/02A/02A02181.json {"nom":"Ocana","circ":"2ème circonscription","dpt":"Corse-du-Sud","inscrits":394,"abs":225,"votants":169,"blancs":12,"nuls":4,"exp":153,"res":[{"nuance":"REG","nom":"<NAME>","voix":119},{"nuance":"LR","nom":"<NAME>","voix":34}]}
115
1,531
/* * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.ngrinder.infra.init; import org.ngrinder.infra.spring.SpringContext; import org.springframework.context.annotation.Profile; import org.springframework.stereotype.Component; /** * Convenient class to determine spring context. It's mocked version which will be used in unit test * * @since 3.0 */ @Profile("unit-test") @Component public class MockSpringContext extends SpringContext { /** * Determine if this context is on unit test. * * @see SpringContext * @return always true. */ @Override public boolean isUnitTestContext() { return true; } }
326
3,631
<gh_stars>1000+ /* * Copyright 2020 Red Hat, Inc. and/or its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.kie.pmml.api.utils; import java.util.HashMap; import java.util.Map; import org.junit.Test; import org.kie.pmml.api.exceptions.KiePMMLException; import static org.junit.Assert.assertEquals; import static org.junit.Assert.fail; public class ConverterTypeUtilTest { private static Map<String, Object> CONVERTIBLE_FROM_STRING; private static Map<String, Object> UNCONVERTIBLE_FROM_STRING; private static Map<Object, String> CONVERTIBLE_TO_STRING; private static Map<Double, Number> CONVERTIBLE_FROM_DOUBLE; private static Map<Double, Object> UNCONVERTIBLE_FROM_DOUBLE; private static Map<Integer, Number> CONVERTIBLE_FROM_INTEGER; private static Map<Integer, Object> UNCONVERTIBLE_FROM_INTEGER; static { CONVERTIBLE_FROM_STRING = new HashMap<>(); CONVERTIBLE_FROM_STRING.put("true", true); CONVERTIBLE_FROM_STRING.put("false", false); CONVERTIBLE_FROM_STRING.put("23423", 23423); CONVERTIBLE_FROM_STRING.put("3476345444745745746", 3476345444745745746L); CONVERTIBLE_FROM_STRING.put("234.23", 234.23); CONVERTIBLE_FROM_STRING.put("234234.23", 234234.23F); CONVERTIBLE_FROM_STRING.put("A", 'A'); CONVERTIBLE_FROM_STRING.put("2", (byte) 2); CONVERTIBLE_FROM_STRING.put("234", (short) 234); // UNCONVERTIBLE_FROM_STRING = new HashMap<>(); UNCONVERTIBLE_FROM_STRING.put("true", 23423); UNCONVERTIBLE_FROM_STRING.put("false", 3476345444745745746L); UNCONVERTIBLE_FROM_STRING.put("23423", true); UNCONVERTIBLE_FROM_STRING.put("3476345444745745746", (byte) 2); UNCONVERTIBLE_FROM_STRING.put("234.23", 3476345444745745746L); UNCONVERTIBLE_FROM_STRING.put("234234.23", (short) 234); UNCONVERTIBLE_FROM_STRING.put("A", (byte) 2); UNCONVERTIBLE_FROM_STRING.put("Arwtrwetwe", 'A'); // CONVERTIBLE_TO_STRING = new HashMap<>(); CONVERTIBLE_TO_STRING.put(true, "true"); CONVERTIBLE_TO_STRING.put(false, "false"); CONVERTIBLE_TO_STRING.put(23423, "23423"); CONVERTIBLE_TO_STRING.put(3476345444745745746L, "3476345444745745746"); CONVERTIBLE_TO_STRING.put(234.23, "234.23"); CONVERTIBLE_TO_STRING.put(234234.23F, "234234.23"); CONVERTIBLE_TO_STRING.put('A', "A"); CONVERTIBLE_TO_STRING.put((byte) 2, "2"); CONVERTIBLE_TO_STRING.put((short) 234, "234"); // CONVERTIBLE_FROM_DOUBLE = new HashMap<>(); CONVERTIBLE_FROM_DOUBLE.put(23422.65, 23423); CONVERTIBLE_FROM_DOUBLE.put(347634544474.49, 347634544474L); CONVERTIBLE_FROM_DOUBLE.put(234234.23, 234234.23F); CONVERTIBLE_FROM_DOUBLE.put(2.345, (byte) 2); CONVERTIBLE_FROM_DOUBLE.put(233.789, (short) 234); // UNCONVERTIBLE_FROM_DOUBLE = new HashMap<>(); UNCONVERTIBLE_FROM_DOUBLE.put(3476345444745745746.49, true); UNCONVERTIBLE_FROM_DOUBLE.put(234234.23, 'A'); // CONVERTIBLE_FROM_INTEGER = new HashMap<>(); CONVERTIBLE_FROM_INTEGER.put(23423, 23423.00); CONVERTIBLE_FROM_INTEGER.put(347634544, 347634544L); CONVERTIBLE_FROM_INTEGER.put(234234, 234234.00F); CONVERTIBLE_FROM_INTEGER.put(2, (byte) 2); CONVERTIBLE_FROM_INTEGER.put(233, (short) 233); // UNCONVERTIBLE_FROM_INTEGER = new HashMap<>(); UNCONVERTIBLE_FROM_INTEGER.put(347634544, true); UNCONVERTIBLE_FROM_INTEGER.put(234234, 'A'); } @Test public void convertConvertibleToString() { CONVERTIBLE_TO_STRING.forEach((s, o) -> { Class<?> expectedClass = o.getClass(); Object retrieved = ConverterTypeUtil.convert(expectedClass, s); assertEquals(retrieved, o); }); } @Test public void convertConvertibleFromString() { CONVERTIBLE_FROM_STRING.forEach((s, expected) -> { Class<?> expectedClass = expected.getClass(); Object retrieved = ConverterTypeUtil.convert(expectedClass, s); assertEquals(expected, retrieved); }); } @Test public void convertUnconvertibleFromString() { UNCONVERTIBLE_FROM_STRING.forEach((s, o) -> { Class<?> expectedClass = o.getClass(); try { ConverterTypeUtil.convert(expectedClass, s); fail(String.format("Expecting KiePMMLException for %s %s", s, o)); } catch (Exception e) { assertEquals(KiePMMLException.class, e.getClass()); } }); } @Test public void convertConvertibleFromInteger() { CONVERTIBLE_FROM_INTEGER.forEach((s, expected) -> { Class<?> expectedClass = expected.getClass(); Object retrieved = ConverterTypeUtil.convert(expectedClass, s); assertEquals(expected, retrieved); }); } @Test public void convertUnconvertibleFromInteger() { UNCONVERTIBLE_FROM_INTEGER.forEach((s, o) -> { Class<?> expectedClass = o.getClass(); try { ConverterTypeUtil.convert(expectedClass, s); fail(String.format("Expecting KiePMMLException for %s %s", s, o)); } catch (Exception e) { assertEquals(KiePMMLException.class, e.getClass()); } }); } @Test public void convertConvertibleFromDouble() { CONVERTIBLE_FROM_DOUBLE.forEach((s, expected) -> { Class<?> expectedClass = expected.getClass(); Object retrieved = ConverterTypeUtil.convert(expectedClass, s); assertEquals(expected, retrieved); }); } @Test public void convertUnconvertibleFromDouble() { UNCONVERTIBLE_FROM_DOUBLE.forEach((s, o) -> { Class<?> expectedClass = o.getClass(); try { ConverterTypeUtil.convert(expectedClass, s); fail(String.format("Expecting KiePMMLException for %s %s", s, o)); } catch (Exception e) { assertEquals(KiePMMLException.class, e.getClass()); } }); } }
3,095
382
<gh_stars>100-1000 import os, glob import subprocess from subprocess import DEVNULL, STDOUT abspath = os.path.abspath(__file__) dir_ = os.path.dirname(abspath) files = glob.glob(dir_ + "/_progress_board_tests/_test_progress_board_*.py") for file_path in files: file_name = str(file_path.rsplit("/", maxsplit=1)[1]) try: print("\033[0;33;40m Testing", file_name, end="...\r") subprocess.check_call(["pytest", file_path], stdout=DEVNULL, stderr=STDOUT) except subprocess.CalledProcessError: print("\033[0;31;40m Error in", file_name) else: print("\033[0;32;40m", file_name, "is correct")
272
4,074
/** * Illustrates joining two csv files */ package com.oreilly.learningsparkexamples.java; import java.io.StringReader; import java.util.Arrays; import java.util.List; import scala.Tuple2; import au.com.bytecode.opencsv.CSVReader; import org.apache.commons.lang.StringUtils; import org.apache.spark.api.java.JavaRDD; import org.apache.spark.api.java.JavaPairRDD; import org.apache.spark.api.java.JavaSparkContext; import org.apache.spark.api.java.function.PairFunction; public class BasicJoinCsv { public static class ParseLine implements PairFunction<String, Integer, String[]> { public Tuple2<Integer, String[]> call(String line) throws Exception { CSVReader reader = new CSVReader(new StringReader(line)); String[] elements = reader.readNext(); Integer key = Integer.parseInt(elements[0]); return new Tuple2(key, elements); } } public static void main(String[] args) throws Exception { if (args.length != 3) { throw new Exception("Usage BasicJoinCsv sparkMaster csv1 csv2"); } String master = args[0]; String csv1 = args[1]; String csv2 = args[2]; BasicJoinCsv jsv = new BasicJoinCsv(); jsv.run(master, csv1, csv2); } public void run(String master, String csv1, String csv2) throws Exception { JavaSparkContext sc = new JavaSparkContext( master, "basicjoincsv", System.getenv("SPARK_HOME"), System.getenv("JARS")); JavaRDD<String> csvFile1 = sc.textFile(csv1); JavaRDD<String> csvFile2 = sc.textFile(csv2); JavaPairRDD<Integer, String[]> keyedRDD1 = csvFile1.mapToPair(new ParseLine()); JavaPairRDD<Integer, String[]> keyedRDD2 = csvFile1.mapToPair(new ParseLine()); JavaPairRDD<Integer, Tuple2<String[], String[]>> result = keyedRDD1.join(keyedRDD2); List<Tuple2<Integer, Tuple2<String[], String[]>>> resultCollection = result.collect(); } }
690
680
/* Copyright 2015 The TensorFlow Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ==============================================================================*/ #include "tensorflow/stream_executor/kernel_spec.h" namespace perftools { namespace gputools { KernelLoaderSpec::KernelLoaderSpec(port::StringPiece kernelname) : kernelname_(kernelname.ToString()) {} OnDiskKernelLoaderSpec::OnDiskKernelLoaderSpec(port::StringPiece filename, port::StringPiece kernelname) : KernelLoaderSpec(kernelname), filename_(filename.ToString()) {} CudaPtxOnDisk::CudaPtxOnDisk(port::StringPiece filename, port::StringPiece kernelname) : OnDiskKernelLoaderSpec(filename, kernelname) {} CudaCubinOnDisk::CudaCubinOnDisk(port::StringPiece filename, port::StringPiece kernelname) : OnDiskKernelLoaderSpec(filename, kernelname) {} CudaCubinInMemory::CudaCubinInMemory(const char *bytes, port::StringPiece kernelname) : KernelLoaderSpec(kernelname), bytes_(bytes) {} bool CompareComputeCapability(const std::tuple<int, int> &lhs, const std::tuple<int, int> &rhs) { return std::get<0>(lhs) < std::get<0>(rhs) || (std::get<0>(lhs) == std::get<0>(rhs) && std::get<1>(lhs) < std::get<1>(rhs)); } const std::tuple<int, int> CudaPtxInMemory::kMinimumCapability{1, 0}; CudaPtxInMemory::CudaPtxInMemory(port::StringPiece ptx, port::StringPiece kernel_name, bool ptx_compressed) : KernelLoaderSpec(kernel_name), ptx_by_compute_capability_(CompareComputeCapability) { if (ptx_compressed) { // Lazy decompression. Put an empty string in decompressed_ptx_ showing that // the original ptx is compressed. decompressed_ptx_[ptx.data()] = ""; } ptx_by_compute_capability_[kMinimumCapability] = ptx.data(); } CudaPtxInMemory::CudaPtxInMemory( const std::initializer_list<CudaPtxInMemory::PtxSpec> &spec_list, port::StringPiece kernel_name, bool ptx_compressed) : KernelLoaderSpec(kernel_name), ptx_by_compute_capability_(CompareComputeCapability) { for (const auto &spec : spec_list) { int major, minor; port::StringPiece ptx; std::tie(major, minor, ptx) = spec; if (ptx_compressed) { // Lazy decompression. Put an empty string in decompressed_ptx_ showing // that the original ptx is compressed. decompressed_ptx_[ptx.data()] = ""; } ptx_by_compute_capability_[std::tuple<int, int>{major, minor}] = ptx.data(); } } string CudaPtxInMemory::DecompressPtx(const char *ptx) { // Get the length of the PTX string from the beginning of the buffer. uint64 ptx_length = *reinterpret_cast<const uint64 *>(ptx); // Get the PTX string from the buffer with offset and length. string compressed_ptx(ptx + sizeof(uint64), ptx + sizeof(uint64) + ptx_length); string decompressed_ptx; // Decompress the PTX string with bzip2. LOG(FATAL) << "bzip2 decompression is not supported yet."; return decompressed_ptx; } const char *CudaPtxInMemory::default_text() const { if (ptx_by_compute_capability_.empty()) { return nullptr; } mutex_lock lock{mu_}; auto ptx = ptx_by_compute_capability_.begin()->second; // Check if there is an entry in decompressed ptx table. auto decompressed_ptx_iter = decompressed_ptx_.find(ptx); if (decompressed_ptx_iter != decompressed_ptx_.end()) { // If the decompressed string is empty, which means the ptx hasn't been // decompressed, decompress it here. if (decompressed_ptx_iter->second.size() == 0) { decompressed_ptx_iter->second = DecompressPtx(ptx); } return decompressed_ptx_iter->second.c_str(); } return ptx; } const char *CudaPtxInMemory::original_default_text() const { if (ptx_by_compute_capability_.empty()) { return nullptr; } return ptx_by_compute_capability_.begin()->second; } const char *CudaPtxInMemory::text(int compute_capability_major, int compute_capability_minor) const { std::tuple<int, int> capability{compute_capability_major, compute_capability_minor}; auto ptx_iter = ptx_by_compute_capability_.find(capability); if (ptx_iter == ptx_by_compute_capability_.end()) { return nullptr; } mutex_lock lock{mu_}; // Check if there is an entry in decompressed ptx table. auto decompressed_ptx_iter = decompressed_ptx_.find(ptx_iter->second); if (decompressed_ptx_iter != decompressed_ptx_.end()) { // If the decompressed string is empty, which means the ptx hasn't been // decompressed, decompress it here. if (decompressed_ptx_iter->second.size() == 0) { decompressed_ptx_iter->second = DecompressPtx(ptx_iter->second); } return decompressed_ptx_iter->second.c_str(); } return ptx_iter->second; } const char *CudaPtxInMemory::original_text(int compute_capability_major, int compute_capability_minor) const { std::tuple<int, int> capability{compute_capability_major, compute_capability_minor}; auto ptx_iter = ptx_by_compute_capability_.find(capability); if (ptx_iter == ptx_by_compute_capability_.end()) { return nullptr; } return ptx_iter->second; } OpenCLTextOnDisk::OpenCLTextOnDisk(port::StringPiece filename, port::StringPiece kernelname) : OnDiskKernelLoaderSpec(filename, kernelname) {} OpenCLTextInMemory::OpenCLTextInMemory(port::StringPiece text, port::StringPiece kernelname) : KernelLoaderSpec(kernelname), text_(text.ToString()) {} OpenCLBinaryOnDisk::OpenCLBinaryOnDisk(port::StringPiece filename, port::StringPiece kernelname) : OnDiskKernelLoaderSpec(filename, kernelname) {} MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddOpenCLTextOnDisk( port::StringPiece filename, port::StringPiece kernelname) { CHECK(ocl_text_on_disk_ == nullptr); ocl_text_on_disk_.reset(new OpenCLTextOnDisk{filename, kernelname}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddOpenCLBinaryOnDisk( port::StringPiece filename, port::StringPiece kernelname) { CHECK(ocl_binary_on_disk_ == nullptr); ocl_binary_on_disk_.reset(new OpenCLBinaryOnDisk{filename, kernelname}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddOpenCLTextInMemory( port::StringPiece filename, port::StringPiece kernelname) { CHECK(ocl_text_in_memory_ == nullptr); ocl_text_in_memory_.reset(new OpenCLTextInMemory{filename, kernelname}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddCudaPtxOnDisk( port::StringPiece filename, port::StringPiece kernelname) { CHECK(cuda_ptx_on_disk_ == nullptr); cuda_ptx_on_disk_.reset(new CudaPtxOnDisk{filename, kernelname}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddCudaCubinInMemory( const char *bytes, port::StringPiece kernelname) { CHECK(cuda_cubin_in_memory_ == nullptr); cuda_cubin_in_memory_.reset(new CudaCubinInMemory{bytes, kernelname}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddCudaCubinOnDisk( port::StringPiece filename, port::StringPiece kernelname) { CHECK(cuda_cubin_on_disk_ == nullptr); cuda_cubin_on_disk_.reset(new CudaCubinOnDisk{filename, kernelname}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddCudaPtxInMemory( port::StringPiece ptx, port::StringPiece kernelname) { CHECK(cuda_ptx_in_memory_ == nullptr); cuda_ptx_in_memory_.reset( new CudaPtxInMemory{ptx, kernelname, false /* ptx_compressed */}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddCudaCompressedPtxInMemory( port::StringPiece ptx, port::StringPiece kernelname) { CHECK(cuda_ptx_in_memory_ == nullptr); cuda_ptx_in_memory_.reset( new CudaPtxInMemory{ptx, kernelname, true /* ptx_compressed */}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddCudaPtxInMemory( std::initializer_list<CudaPtxInMemory::PtxSpec> spec_list, port::StringPiece kernelname) { CHECK(cuda_ptx_in_memory_ == nullptr); cuda_ptx_in_memory_.reset( new CudaPtxInMemory{spec_list, kernelname, false /* ptx_compressed */}); return this; } MultiKernelLoaderSpec *MultiKernelLoaderSpec::AddCudaCompressedPtxInMemory( std::initializer_list<CudaPtxInMemory::PtxSpec> spec_list, port::StringPiece kernelname) { CHECK(cuda_ptx_in_memory_ == nullptr); cuda_ptx_in_memory_.reset( new CudaPtxInMemory{spec_list, kernelname, true /* ptx_compressed */}); return this; } MultiKernelLoaderSpec::MultiKernelLoaderSpec(size_t arity) : arity_(arity) {} } // namespace gputools } // namespace perftools
3,724
1,080
<reponame>congnt95/neutron<filename>neutron/tests/functional/services/logapi/test_logging.py # Copyright (c) 2017 Fujitsu Limited # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import re from unittest import mock from neutron_lib import constants from neutron_lib import context as neutron_context from oslo_config import cfg from oslo_log import log as logging import testscenarios from neutron.objects.logapi import logging_resource as log_object from neutron.plugins.ml2.drivers.openvswitch.agent import ( ovs_agent_extension_api as ovs_ext_api) from neutron.plugins.ml2.drivers.openvswitch.agent.common import ( constants as ovs_consts) from neutron.services.logapi.drivers.openvswitch import ( ovs_firewall_log as ovs_fw_log) from neutron.tests.functional.agent import test_firewall LOG = logging.getLogger(__name__) load_tests = testscenarios.load_tests_apply_scenarios FAKE_LOG_ID = 'a2d72369-4246-4f19-bd3c-af51ec8d70cd' FAKE_PROJECT_ID = 'fake_project' log_object_dict = { 'id': FAKE_LOG_ID, 'resource_type': 'security_group', 'project_id': FAKE_PROJECT_ID, 'event': 'ALL' } FAKE_LOG_OBJECT = log_object.Log(**log_object_dict) class LoggingExtensionTestFramework(test_firewall.BaseFirewallTestCase): def setUp(self): super(LoggingExtensionTestFramework, self).setUp() cfg.CONF.set_override('extensions', ['log'], group='agent') self.context = neutron_context.get_admin_context_without_session() self._set_resource_rpc_mock() if self.firewall_name != 'openvswitch': self.skipTest("Logging extension doesn't support firewall driver" " %s at that time " % self.firewall_name) self.log_driver = self.initialize_ovs_fw_log() def initialize_ovs_fw_log(self): self.int_br = ovs_ext_api.OVSCookieBridge( self.of_helper.br_int_cls(self.tester.bridge.br_name)) self.tun_br = self.of_helper.br_tun_cls('br-tun') agent_api = ovs_ext_api.OVSAgentExtensionAPI( self.int_br, self.tun_br, {'physnet1': self.of_helper.br_phys_cls('br-physnet1')}) log_driver = ovs_fw_log.OVSFirewallLoggingDriver(agent_api) log_driver.initialize(self.resource_rpc) return log_driver def _set_resource_rpc_mock(self): self.log_info = [] def _get_sg_info_mock(context, **kwargs): return self.log_info self.resource_rpc = mock.patch( 'neutron.services.logapi.rpc.agent.LoggingApiStub').start() self.resource_rpc.get_sg_log_info_for_log_resources.side_effect = ( _get_sg_info_mock) def _set_ports_log(self, sg_rules): fake_sg_log_info = [ { 'id': FAKE_LOG_ID, 'ports_log': [ {'port_id': self.src_port_desc['device'], 'security_group_rules': sg_rules}], 'event': 'ALL', 'project_id': FAKE_PROJECT_ID }] self.log_info = fake_sg_log_info class TestLoggingExtension(LoggingExtensionTestFramework): ip_cidr = '192.168.0.1/24' def _is_log_flow_set(self, table, actions): flows = self.log_driver.int_br.br.dump_flows_for_table(table) pattern = re.compile( r"^.* table=%s.* actions=%s" % (table, actions) ) for flow in flows.splitlines(): if pattern.match(flow.strip()): return True return False def _assert_logging_flows_set(self): self.assertTrue(self._is_log_flow_set( table=ovs_consts.ACCEPTED_EGRESS_TRAFFIC_TABLE, actions=r"resubmit\(,%d\),CONTROLLER:65535" % ( ovs_consts.ACCEPTED_EGRESS_TRAFFIC_NORMAL_TABLE))) self.assertTrue(self._is_log_flow_set( table=ovs_consts.ACCEPTED_INGRESS_TRAFFIC_TABLE, actions="CONTROLLER:65535")) self.assertTrue(self._is_log_flow_set( table=ovs_consts.DROPPED_TRAFFIC_TABLE, actions="CONTROLLER:65535")) def _assert_logging_flows_not_set(self): self.assertFalse(self._is_log_flow_set( table=ovs_consts.ACCEPTED_EGRESS_TRAFFIC_TABLE, actions=r"resubmit\(,%d\),CONTROLLER:65535" % ( ovs_consts.ACCEPTED_EGRESS_TRAFFIC_NORMAL_TABLE))) self.assertFalse(self._is_log_flow_set( table=ovs_consts.ACCEPTED_INGRESS_TRAFFIC_TABLE, actions="CONTROLLER:65535")) self.assertFalse(self._is_log_flow_set( table=ovs_consts.DROPPED_TRAFFIC_TABLE, actions="CONTROLLER:65535")) def test_log_lifecycle(self): sg_rules = [{'ethertype': constants.IPv4, 'direction': constants.INGRESS_DIRECTION, 'protocol': constants.PROTO_NAME_ICMP, 'security_group_id': self.FAKE_SECURITY_GROUP_ID}, {'ethertype': constants.IPv4, 'direction': constants.EGRESS_DIRECTION, 'security_group_id': self.FAKE_SECURITY_GROUP_ID}, {'ethertype': constants.IPv6, 'protocol': constants.PROTO_NAME_TCP, 'port_range_min': 22, 'port_range_max': 22, 'remote_group_id': 2, 'direction': constants.EGRESS_DIRECTION, 'security_group_id': self.FAKE_SECURITY_GROUP_ID}, ] self.firewall.update_security_group_rules( self.FAKE_SECURITY_GROUP_ID, sg_rules) self.firewall.update_port_filter(self.src_port_desc) self._set_ports_log(sg_rules) # start log self.log_driver.start_logging( self.context, log_resources=[FAKE_LOG_OBJECT]) self._assert_logging_flows_set() # stop log self.log_driver.stop_logging( self.context, log_resources=[FAKE_LOG_OBJECT]) self._assert_logging_flows_not_set()
3,132
593
<reponame>RUB-NDS/TLS-Attacker /** * TLS-Attacker - A Modular Penetration Testing Framework for TLS * * Copyright 2014-2022 Ruhr University Bochum, Paderborn University, Hackmanit GmbH * * Licensed under Apache License, Version 2.0 * http://www.apache.org/licenses/LICENSE-2.0.txt */ package de.rub.nds.tlsattacker.core.protocol.handler; import de.rub.nds.tlsattacker.core.constants.ProtocolVersion; import de.rub.nds.tlsattacker.core.constants.Tls13KeySetType; import de.rub.nds.tlsattacker.core.exceptions.CryptoException; import de.rub.nds.tlsattacker.core.protocol.message.ChangeCipherSpecMessage; import de.rub.nds.tlsattacker.core.protocol.parser.ChangeCipherSpecParser; import de.rub.nds.tlsattacker.core.protocol.preparator.ChangeCipherSpecPreparator; import de.rub.nds.tlsattacker.core.protocol.serializer.ChangeCipherSpecSerializer; import de.rub.nds.tlsattacker.core.record.cipher.RecordCipher; import de.rub.nds.tlsattacker.core.record.cipher.RecordCipherFactory; import de.rub.nds.tlsattacker.core.record.cipher.cryptohelper.KeySet; import de.rub.nds.tlsattacker.core.record.cipher.cryptohelper.KeySetGenerator; import de.rub.nds.tlsattacker.core.state.TlsContext; import java.security.NoSuchAlgorithmException; import java.util.logging.Level; import org.apache.logging.log4j.LogManager; import org.apache.logging.log4j.Logger; public class ChangeCipherSpecHandler extends TlsMessageHandler<ChangeCipherSpecMessage> { private static final Logger LOGGER = LogManager.getLogger(); public ChangeCipherSpecHandler(TlsContext tlsContext) { super(tlsContext); } @Override public ChangeCipherSpecParser getParser(byte[] message, int pointer) { return new ChangeCipherSpecParser(pointer, message, tlsContext.getChooser().getSelectedProtocolVersion(), tlsContext.getConfig()); } @Override public ChangeCipherSpecPreparator getPreparator(ChangeCipherSpecMessage message) { return new ChangeCipherSpecPreparator(tlsContext.getChooser(), message); } @Override public ChangeCipherSpecSerializer getSerializer(ChangeCipherSpecMessage message) { return new ChangeCipherSpecSerializer(message, tlsContext.getChooser().getSelectedProtocolVersion()); } @Override public void adjustTLSContext(ChangeCipherSpecMessage message) { if (tlsContext.getTalkingConnectionEndType() != tlsContext.getChooser().getConnectionEndType() && tlsContext.getChooser().getSelectedProtocolVersion() != ProtocolVersion.TLS13) { LOGGER.debug("Adjusting decrypting cipher for " + tlsContext.getTalkingConnectionEndType()); tlsContext.getRecordLayer().updateDecryptionCipher(getRecordCipher()); tlsContext.getRecordLayer().updateDecompressor(); } } @Override public void adjustTlsContextAfterSerialize(ChangeCipherSpecMessage message) { if (!tlsContext.getChooser().getSelectedProtocolVersion().isTLS13()) { LOGGER.debug("Adjusting encrypting cipher for " + tlsContext.getTalkingConnectionEndType()); tlsContext.getRecordLayer().updateEncryptionCipher(getRecordCipher()); tlsContext.getRecordLayer().updateCompressor(); } } private RecordCipher getRecordCipher() { try { KeySet keySet = KeySetGenerator.generateKeySet(tlsContext, tlsContext.getChooser().getSelectedProtocolVersion(), Tls13KeySetType.NONE); return RecordCipherFactory.getRecordCipher(tlsContext, keySet); } catch (NoSuchAlgorithmException | CryptoException ex) { throw new UnsupportedOperationException("The specified Algorithm is not supported", ex); } } }
1,351
190,993
# Copyright 2017 The TensorFlow Authors. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ============================================================================== """Tests for Momentum.""" import numpy as np from tensorflow.compiler.tests import xla_test from tensorflow.python.framework import constant_op from tensorflow.python.framework import dtypes from tensorflow.python.ops import array_ops from tensorflow.python.ops import resource_variable_ops from tensorflow.python.ops import variables from tensorflow.python.platform import test from tensorflow.python.training import momentum as momentum_lib class MomentumOptimizerTest(xla_test.XLATestCase): def _update_nesterov_momentum_numpy(self, var, accum, g, lr, momentum): var += accum * lr * momentum accum = accum * momentum + g var -= lr * accum var -= accum * lr * momentum return var, accum def testBasic(self): for dtype in self.float_types: with self.session(), self.test_scope(): var0 = resource_variable_ops.ResourceVariable([1.0, 2.0], dtype=dtype) var1 = resource_variable_ops.ResourceVariable([3.0, 4.0], dtype=dtype) grads0 = constant_op.constant([0.1, 0.1], dtype=dtype) grads1 = constant_op.constant([0.01, 0.01], dtype=dtype) mom_opt = momentum_lib.MomentumOptimizer( learning_rate=2.0, momentum=0.9) mom_update = mom_opt.apply_gradients( zip([grads0, grads1], [var0, var1])) self.evaluate(variables.global_variables_initializer()) # Check we have slots self.assertEqual(["momentum"], mom_opt.get_slot_names()) slot0 = mom_opt.get_slot(var0, "momentum") self.assertEqual(slot0.get_shape(), var0.get_shape()) self.assertFalse(slot0 in variables.trainable_variables()) slot1 = mom_opt.get_slot(var1, "momentum") self.assertEqual(slot1.get_shape(), var1.get_shape()) self.assertFalse(slot1 in variables.trainable_variables()) # Fetch params to validate initial values self.assertAllClose([1.0, 2.0], self.evaluate(var0)) self.assertAllClose([3.0, 4.0], self.evaluate(var1)) # Step 1: the momentum accumulators where 0. So we should see a normal # update: v -= grad * learning_rate mom_update.run() # Check that the momentum accumulators have been updated. self.assertAllCloseAccordingToType( np.array([0.1, 0.1]), self.evaluate(slot0)) self.assertAllCloseAccordingToType( np.array([0.01, 0.01]), self.evaluate(slot1)) # Check that the parameters have been updated. self.assertAllCloseAccordingToType( np.array([1.0 - (0.1 * 2.0), 2.0 - (0.1 * 2.0)]), self.evaluate(var0)) self.assertAllCloseAccordingToType( np.array([3.0 - (0.01 * 2.0), 4.0 - (0.01 * 2.0)]), self.evaluate(var1)) # Step 2: the momentum accumulators contain the previous update. mom_update.run() # Check that the momentum accumulators have been updated. self.assertAllCloseAccordingToType( np.array([(0.9 * 0.1 + 0.1), (0.9 * 0.1 + 0.1)]), self.evaluate(slot0)) self.assertAllCloseAccordingToType( np.array([(0.9 * 0.01 + 0.01), (0.9 * 0.01 + 0.01)]), self.evaluate(slot1)) # Check that the parameters have been updated. self.assertAllCloseAccordingToType( np.array([ 1.0 - (0.1 * 2.0) - ((0.9 * 0.1 + 0.1) * 2.0), 2.0 - (0.1 * 2.0) - ((0.9 * 0.1 + 0.1) * 2.0) ]), self.evaluate(var0)) self.assertAllCloseAccordingToType( np.array([ 2.98 - ((0.9 * 0.01 + 0.01) * 2.0), 3.98 - ((0.9 * 0.01 + 0.01) * 2.0) ]), self.evaluate(var1)) def testNesterovMomentum(self): for dtype in self.float_types: with self.session(), self.test_scope(): var0 = resource_variable_ops.ResourceVariable([0.1, 0.2], dtype=dtype) var1 = resource_variable_ops.ResourceVariable([0.3, 0.4], dtype=dtype) var0_np = np.array([0.1, 0.2], dtype=dtype) var1_np = np.array([0.3, 0.4], dtype=dtype) accum0_np = np.array([0.0, 0.0], dtype=dtype) accum1_np = np.array([0.0, 0.0], dtype=dtype) cost = 0.4 * var0 * var0 + 0.9 * var1 global_step = resource_variable_ops.ResourceVariable( array_ops.zeros([], dtypes.int32), name="global_step") mom_op = momentum_lib.MomentumOptimizer( learning_rate=0.1, momentum=0.9, use_nesterov=True) opt_op = mom_op.minimize(cost, global_step, [var0, var1]) self.evaluate(variables.global_variables_initializer()) for _ in range(1, 5): opt_op.run() var0_np, accum0_np = self._update_nesterov_momentum_numpy( var0_np, accum0_np, var0_np * 0.8, 0.1, 0.9) var1_np, accum1_np = self._update_nesterov_momentum_numpy( var1_np, accum1_np, 0.9, 0.1, 0.9) self.assertAllCloseAccordingToType(var0_np, self.evaluate(var0)) self.assertAllCloseAccordingToType(var1_np, self.evaluate(var1)) def testTensorLearningRateAndMomentum(self): for dtype in self.float_types: with self.session(), self.test_scope(): var0 = resource_variable_ops.ResourceVariable([1.0, 2.0], dtype=dtype) var1 = resource_variable_ops.ResourceVariable([3.0, 4.0], dtype=dtype) grads0 = constant_op.constant([0.1, 0.1], dtype=dtype) grads1 = constant_op.constant([0.01, 0.01], dtype=dtype) mom_opt = momentum_lib.MomentumOptimizer( learning_rate=constant_op.constant(2.0), momentum=constant_op.constant(0.9)) mom_update = mom_opt.apply_gradients( zip([grads0, grads1], [var0, var1])) self.evaluate(variables.global_variables_initializer()) # Check we have slots self.assertEqual(["momentum"], mom_opt.get_slot_names()) slot0 = mom_opt.get_slot(var0, "momentum") self.assertEqual(slot0.get_shape(), var0.get_shape()) self.assertFalse(slot0 in variables.trainable_variables()) slot1 = mom_opt.get_slot(var1, "momentum") self.assertEqual(slot1.get_shape(), var1.get_shape()) self.assertFalse(slot1 in variables.trainable_variables()) # Fetch params to validate initial values self.assertAllClose([1.0, 2.0], self.evaluate(var0)) self.assertAllClose([3.0, 4.0], self.evaluate(var1)) # Step 1: the momentum accumulators where 0. So we should see a normal # update: v -= grad * learning_rate mom_update.run() # Check that the momentum accumulators have been updated. self.assertAllCloseAccordingToType( np.array([0.1, 0.1]), self.evaluate(slot0)) self.assertAllCloseAccordingToType( np.array([0.01, 0.01]), self.evaluate(slot1)) # Check that the parameters have been updated. self.assertAllCloseAccordingToType( np.array([1.0 - (0.1 * 2.0), 2.0 - (0.1 * 2.0)]), self.evaluate(var0)) self.assertAllCloseAccordingToType( np.array([3.0 - (0.01 * 2.0), 4.0 - (0.01 * 2.0)]), self.evaluate(var1)) # Step 2: the momentum accumulators contain the previous update. mom_update.run() # Check that the momentum accumulators have been updated. self.assertAllCloseAccordingToType( np.array([(0.9 * 0.1 + 0.1), (0.9 * 0.1 + 0.1)]), self.evaluate(slot0)) self.assertAllCloseAccordingToType( np.array([(0.9 * 0.01 + 0.01), (0.9 * 0.01 + 0.01)]), self.evaluate(slot1)) # Check that the parameters have been updated. self.assertAllCloseAccordingToType( np.array([ 1.0 - (0.1 * 2.0) - ((0.9 * 0.1 + 0.1) * 2.0), 2.0 - (0.1 * 2.0) - ((0.9 * 0.1 + 0.1) * 2.0) ]), self.evaluate(var0)) self.assertAllCloseAccordingToType( np.array([ 2.98 - ((0.9 * 0.01 + 0.01) * 2.0), 3.98 - ((0.9 * 0.01 + 0.01) * 2.0) ]), self.evaluate(var1)) if __name__ == "__main__": test.main()
3,960
318
<reponame>GameTechDev/XeGTAO<filename>Source/Rendering/vaSceneRenderViews.cpp /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // Copyright (C) 2016-2021, Intel Corporation // // SPDX-License-Identifier: MIT /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // // Author(s): <NAME> (<EMAIL>) // /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// #include "vaSceneRenderViews.h" #include "vaSceneRenderer.h" #include "vaRenderMesh.h" #include "vaRenderMaterial.h" #include "Rendering/vaRenderGlobals.h" #include "Rendering/Effects/vaSkybox.h" #include "Rendering/Effects/vaASSAOLite.h" #include "Rendering/Effects/vaGTAO.h" #include "Rendering/Effects/vaDepthOfField.h" #include "Rendering/Effects/vaPostProcess.h" #include "Rendering/Effects/vaPostProcessTonemap.h" #include "Rendering/Effects/vaCMAA2.h" #include "Rendering/Effects/vaTAA.h" #include "Rendering/vaSceneLighting.h" #include "Scene/vaScene.h" #include "Scene/vaSceneSystems.h" #include "Core/vaInput.h" #include "Rendering/vaPathTracer.h" #include <future> // #ifdef VA_TASKFLOW_INTEGRATION_ENABLED // #include "IntegratedExternals/vaTaskflowIntegration.h" // #endif #include "IntegratedExternals/vaImguiIntegration.h" using namespace Vanilla; void vaSceneRenderViewBase::ProcessInstanceBatchCommon( entt::registry & registry, vaSceneRenderInstanceProcessor::SceneItem * items, uint32 itemCount, vaRenderInstanceList * opaqueList, vaRenderInstanceList * transparentList, const vaRenderInstanceList::FilterSettings & filter, const vaSceneSelectionFilterType & customFilter, uint32 baseInstanceIndex ) { baseInstanceIndex; if( itemCount == 0 ) return; const auto & cregistry = std::as_const( registry ); const vaPlane* frustumPlanes = filter.FrustumPlanes.data( ); const int frustumPlaneCount = (int)filter.FrustumPlanes.size( ); for( uint32 i = 0; i < itemCount; i++ ) { entt::entity entity = items[i].Entity; if( !cregistry.valid(entity) || !cregistry.any_of<Scene::WorldBounds>(entity) ) { assert( false ); // abort( ); continue; } const Scene::WorldBounds & worldBounds = cregistry.get<Scene::WorldBounds>( entity ); vaFramePtr<vaRenderMesh> & renderMesh = items[i].Mesh; vaFramePtr<vaRenderMaterial> & renderMaterial = items[i].Material; // todo - do this: http://bitsquid.blogspot.com/2016/10/the-implementation-of-frustum-culling.html // if it doesn't pass the frustum test, cull it here //if( worldBounds.AABB.IntersectFrustum( frustumPlanes, frustumPlaneCount ) == vaIntersectType::Outside ) if( worldBounds.BS.IntersectFrustum( frustumPlanes, frustumPlaneCount ) == vaIntersectType::Outside ) continue; const Scene::TransformWorld & worldTransform = cregistry.get<Scene::TransformWorld>( entity ); int baseShadingRate = 0; bool doSelect = ( customFilter != nullptr ) ? ( customFilter( entity, worldTransform, worldBounds, *renderMesh, *renderMaterial, baseShadingRate ) ) : ( true ); if( doSelect ) { vaShadingRate finalShadingRate = renderMaterial->ComputeShadingRate( baseShadingRate ); if( renderMaterial->IsTransparent( ) ) { if( transparentList != nullptr ) { transparentList->Insert( baseInstanceIndex+i, finalShadingRate ); items[i].IsUsed = true; } } else { if( opaqueList != nullptr ) { opaqueList->Insert( baseInstanceIndex+i, finalShadingRate ); items[i].IsUsed = true; } } } } } vaSceneRenderViewBase::vaSceneRenderViewBase( const shared_ptr<vaSceneRenderer> & parentRenderer ) : m_parentRenderer( parentRenderer ), m_renderDevice( parentRenderer->GetRenderDevice() ) { } void vaSceneRenderViewBase::UIDisplayStats( ) { ImGui::Text( "ItemsDrawn: %d", m_basicStats.ItemsDrawn ); ImGui::Text( "TrianglesDrawn: %.3fk", (float)(m_basicStats.TrianglesDrawn/1000.0f) ); ImGui::Text( "DrawErrors: %s", vaDrawResultFlagsUIName( m_basicStats.DrawResultFlags ).c_str() ); } //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// vaPointShadowRV::vaPointShadowRV( const shared_ptr<vaSceneRenderer> & parentRenderer ) : vaSceneRenderViewBase( parentRenderer ) { } void vaPointShadowRV::PreRenderTick( float deltaTime ) { vaSceneRenderViewBase::PreRenderTick( deltaTime ); if( m_shadowmap == nullptr ) return; m_basicStats.DrawResultFlags = vaDrawResultFlags::None; m_lastPreRenderDrawResults = vaDrawResultFlags::None; shared_ptr<vaSceneRenderer> sceneRenderer = m_parentRenderer.lock(); assert( sceneRenderer != nullptr && sceneRenderer->GetScene( ) != nullptr ); VA_TRACE_CPU_SCOPE( PointShadowPreRender ); m_selectionOpaque.StartCollecting( sceneRenderer->GetInstanceStorage() ); // after this, ProcessInstanceBatch will get called and then, after all is processed, PreRenderTickParallelFinished gets called } // this gets called from worker threads to provide chunks for processing! void vaPointShadowRV::ProcessInstanceBatch( vaScene& scene, vaSceneRenderInstanceProcessor::SceneItem* items, uint32 itemCount, uint32 baseInstanceIndex ) { if( m_shadowmap == nullptr ) return; vaSceneRenderViewBase::ProcessInstanceBatchCommon( scene.Registry( ), items, itemCount, &m_selectionOpaque, nullptr, vaRenderInstanceList::FilterSettings::ShadowmapCull( *m_shadowmap ), m_selectionFilter, baseInstanceIndex ); } vaDrawResultFlags vaPointShadowRV::PreRenderTickParallelFinished( ) { if( m_shadowmap == nullptr ) return vaDrawResultFlags::None; m_selectionOpaque.StopCollecting( ); m_basicStats.DrawResultFlags |= m_selectionOpaque.ResultFlags( ); m_lastPreRenderDrawResults = m_basicStats.DrawResultFlags; return m_lastPreRenderDrawResults; } void vaPointShadowRV::RenderTick( float deltaTime, vaRenderDeviceContext & renderContext, vaDrawResultFlags & currentDrawResults ) { deltaTime; renderContext; vaDrawResultFlags drawResults = vaDrawResultFlags::None; shared_ptr<vaSceneRenderer> sceneRenderer = m_parentRenderer.lock( ); assert( sceneRenderer != nullptr ); if( m_shadowmap == nullptr ) return; // skip rendering of shadows if things are not currently completely loaded or whatnot if( currentDrawResults != vaDrawResultFlags::None ) { currentDrawResults |= m_selectionOpaque.ResultFlags( ); m_basicStats.DrawResultFlags |= currentDrawResults; m_shadowmap = nullptr; m_selectionOpaque.Reset( ); return; } VA_TRACE_CPU_SCOPE( PointShadowRender ); // TODO: move all this shadow map code here - let the shadowmaps be responsible only for storage drawResults |= m_shadowmap->Draw( renderContext, m_selectionOpaque ); m_basicStats.ItemsDrawn += (int)m_selectionOpaque.Count( ); m_shadowmap = nullptr; m_selectionOpaque.Reset( ); drawResults |= m_selectionOpaque.ResultFlags( ); m_basicStats.DrawResultFlags |= drawResults; currentDrawResults |= drawResults; } //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// vaLightProbeRV::vaLightProbeRV( const shared_ptr<vaSceneRenderer> & parentRenderer ) : vaSceneRenderViewBase( parentRenderer ) { } void vaLightProbeRV::PreRenderTick( float deltaTime ) { vaSceneRenderViewBase::PreRenderTick( deltaTime ); if( m_probe == nullptr || !m_probeData.Enabled ) // all good, nothing to do return; m_basicStats.DrawResultFlags = vaDrawResultFlags::None; m_lastPreRenderDrawResults = vaDrawResultFlags::None; shared_ptr<vaSceneRenderer> sceneRenderer = m_parentRenderer.lock( ); assert( sceneRenderer != nullptr ); assert( sceneRenderer->GetScene( ) != nullptr ); m_sortDepthPrepass = vaRenderInstanceList::EmptySortHandle; m_sortOpaque = vaRenderInstanceList::EmptySortHandle; m_sortTransparent = vaRenderInstanceList::EmptySortHandle; if( m_probeData.ImportFilePath == "" ) { vaVector3 probePos = m_probe->GetContentsData( ).Position; // This is where we would start the async sorts if we had that implemented - or actually at some point below if( sceneRenderer->GeneralSettings( ).DepthPrepass && sceneRenderer->GeneralSettings( ).SortDepthPrepass ) m_sortDepthPrepass = m_selectionOpaque.ScheduleSort( vaRenderInstanceList::SortSettings::Standard( probePos, true/*, false*/ ) ); //if( sceneRenderer->GeneralSettings( ).SortOpaque ) <- we now always sort opaque due to decals, sorry m_sortOpaque = m_selectionOpaque.ScheduleSort( vaRenderInstanceList::SortSettings::Standard( probePos, false/*, true*/ ) ); m_sortTransparent = m_selectionTransparent.ScheduleSort( vaRenderInstanceList::SortSettings::Standard( probePos, false/*, false*/ ) ); m_selectionOpaque.StartCollecting( sceneRenderer->GetInstanceStorage() ); m_selectionTransparent.StartCollecting( sceneRenderer->GetInstanceStorage() ); m_selectionFilter = [ &registry = sceneRenderer->GetScene()->Registry() ] ( const entt::entity entity, const vaMatrix4x4 & worldTransform, const Scene::WorldBounds & , const vaRenderMesh & mesh, const vaRenderMaterial & material, int & outBaseShadingRate ) -> bool { worldTransform; worldTransform; mesh; material; outBaseShadingRate; const auto & cregistry = std::as_const( registry ); return !cregistry.any_of<Scene::IgnoreByIBLTag>( entity ); }; // after this, ProcessInstanceBatch will get called and then, after all is processed, PreRenderTickParallelFinished gets called } } // this gets called from worker threads to provide chunks for processing! void vaLightProbeRV::ProcessInstanceBatch( vaScene & scene, vaSceneRenderInstanceProcessor::SceneItem * items, uint32 itemCount, uint32 baseInstanceIndex ) { if( m_probe == nullptr || !m_probeData.Enabled ) // all good, nothing to do return; if( m_probeData.ImportFilePath == "" ) { vaSceneRenderViewBase::ProcessInstanceBatchCommon( scene.Registry( ), items, itemCount, &m_selectionOpaque, &m_selectionTransparent, vaRenderInstanceList::FilterSettings::EnvironmentProbeCull( m_probeData ), m_selectionFilter, baseInstanceIndex ); } } vaDrawResultFlags vaLightProbeRV::PreRenderTickParallelFinished( ) { if( m_probe == nullptr || !m_probeData.Enabled ) // all good, nothing to do return vaDrawResultFlags::None; if( m_probeData.ImportFilePath == "" ) { m_selectionOpaque.StopCollecting( ); m_selectionTransparent.StopCollecting( ); } m_basicStats.DrawResultFlags |= m_selectionOpaque.ResultFlags( ); m_basicStats.DrawResultFlags |= m_selectionTransparent.ResultFlags( ); m_lastPreRenderDrawResults = m_basicStats.DrawResultFlags; return m_lastPreRenderDrawResults; } void vaLightProbeRV::RenderTick( float deltaTime, vaRenderDeviceContext & renderContext, vaDrawResultFlags & currentDrawResults ) { deltaTime; renderContext; if( m_probe == nullptr || !m_probeData.Enabled ) // all good, nothing to do return; vaDrawResultFlags drawResults = vaDrawResultFlags::None; shared_ptr<vaSceneRenderer> sceneRenderer = m_parentRenderer.lock( ); assert( sceneRenderer != nullptr ); assert( sceneRenderer->GetScene( ) != nullptr ); // skip rendering of shadows if things are not currently completely loaded or whatnot if( currentDrawResults != vaDrawResultFlags::None ) { currentDrawResults |= m_selectionOpaque.ResultFlags( ); currentDrawResults |= m_selectionTransparent.ResultFlags( ); m_basicStats.DrawResultFlags |= currentDrawResults; m_probe->Reset(); m_probe = nullptr; m_selectionOpaque.Reset(); m_selectionTransparent.Reset(); return; } if( m_probeData.ImportFilePath != "" ) { bool success = m_probe->Import( renderContext, m_probeData ); //assert( success ); success; // this isn't actually handled correctly - it will attempt importing again } else { CubeFaceCaptureCallback faceCapture = [ & ] ( vaRenderDeviceContext& renderContext, const vaCameraBase& faceCamera, const shared_ptr<vaTexture>& faceDepth, const shared_ptr<vaTexture>& faceColor ) { vaDrawAttributes::GlobalSettings globalSettings; globalSettings.SpecialEmissiveScale = 0.1f; globalSettings.DisableGI = true; // clear the main render target / depth faceDepth->ClearDSV( renderContext, true, faceCamera.GetUseReversedZ( ) ? ( 0.0f ) : ( 1.0f ), false, 0 ); faceColor->ClearRTV( renderContext, { 0,0,0,0 } ); // Depth pre-pass drawResults |= sceneRenderer->DrawDepthOnly( renderContext, vaRenderOutputs::FromRTDepth( nullptr, faceDepth ), m_selectionOpaque, m_sortDepthPrepass, faceCamera, globalSettings ); // this clear is not actually needed! // // clear light accumulation (radiance) RT // gbufferOutput.GetRadiance( )->ClearRTV( mainContext, vaVector4( 0.0f, 0.0f, 0.0f, 0.0f ) ); // Opaque stuff drawResults |= sceneRenderer->DrawOpaque( renderContext, vaRenderOutputs::FromRTDepth( faceColor, faceDepth ), m_selectionOpaque, m_sortOpaque, faceCamera, globalSettings, nullptr, true ); m_basicStats.ItemsDrawn += (int)m_selectionOpaque.Count( ); // Transparent stuff m_selectionTransparent; // <- not really doing it for now, a bit more complexity return drawResults; }; if( m_probe->Capture( renderContext, m_probeData, faceCapture ) == vaDrawResultFlags::None ) { assert( m_probe->GetContentsData( ) == m_probeData ); } } m_probe = nullptr; m_probeData = Scene::IBLProbe(); drawResults |= m_selectionOpaque.ResultFlags(); drawResults |= m_selectionTransparent.ResultFlags(); m_basicStats.DrawResultFlags |= drawResults; currentDrawResults |= drawResults; m_selectionOpaque.Reset( ); m_selectionTransparent.Reset( ); }
5,436
1,338
<reponame>Yn0ga/haiku<gh_stars>1000+ /* * Copyright 2005-2012, Haiku Inc. * Distributed under the terms of the MIT License. */ #ifndef _ARCH_X86_64_DEBUGGER_H #define _ARCH_X86_64_DEBUGGER_H #include <posix/arch/x86_64/signal.h> struct x86_64_debug_cpu_state { struct savefpu extended_registers; uint64 gs; uint64 fs; uint64 es; uint64 ds; uint64 r15; uint64 r14; uint64 r13; uint64 r12; uint64 r11; uint64 r10; uint64 r9; uint64 r8; uint64 rbp; uint64 rsi; uint64 rdi; uint64 rdx; uint64 rcx; uint64 rbx; uint64 rax; uint64 vector; uint64 error_code; uint64 rip; uint64 cs; uint64 rflags; uint64 rsp; uint64 ss; } __attribute__((aligned(16))); #endif // _ARCH_X86_64_DEBUGGER_H
355
4,126
<reponame>nickc01/cuberite<filename>src/OSSupport/SleepResolutionBooster.h<gh_stars>1000+ // SleepResolutionBooster.h // Increases the accuracy of Sleep on Windows (GH #5140). // This file MUST NOT be included from anywhere other than main.cpp. #ifdef _WIN32 #include <timeapi.h> static TIMECAPS g_Resolution; namespace SleepResolutionBooster { static void Register() { // Default sleep resolution on Windows isn't accurate enough (GH #5140) so try to boost it: if ( (timeGetDevCaps(&g_Resolution, sizeof(g_Resolution)) == MMSYSERR_NOERROR) && (timeBeginPeriod(g_Resolution.wPeriodMin) == MMSYSERR_NOERROR) ) { return; } // Max < Min sentinel for failure, to prevent bogus timeEndPeriod calls: g_Resolution.wPeriodMax = 0; g_Resolution.wPeriodMin = 1; } static void Unregister() { if (g_Resolution.wPeriodMax >= g_Resolution.wPeriodMin) { timeEndPeriod(g_Resolution.wPeriodMin); } } }; #else namespace SleepResolutionBooster { static void Register() { } static void Unregister() { } }; #endif
412
1,056
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.netbeans.core.network.utils.hname.unix; import com.sun.jna.Native; import org.netbeans.core.network.utils.NativeException; /** * Host name utilities for "general" Unix. */ public class HostnameUtilsUnix { /** * Max length of a Unix hostname including * null terminator. */ private static final int MAXHOSTNAMELEN = 256; /** * Returns the result of {@code gethostname()} function * from the standard Unix/Linux C Library. * * @return host name * @throws NativeException if there was an error executing the * system call. */ public static String cLibGetHostname() throws NativeException { byte[] buf = new byte[MAXHOSTNAMELEN]; int retCode = CLib.INSTANCE.gethostname(buf, buf.length); if (retCode == 0) { return Native.toString(buf); } throw new NativeException(retCode, "error calling 'gethostname()' function"); } }
596
2,542
// ------------------------------------------------------------ // Copyright (c) Microsoft Corporation. All rights reserved. // Licensed under the MIT License (MIT). See License.txt in the repo root for license information. // ------------------------------------------------------------ #include "stdafx.h" using namespace Common; using namespace std; using namespace TestHooks; GlobalWString EnvironmentVariables::FabricTest_EnableTStore = make_global<wstring>(L"_FabricTest_EnableTStore"); GlobalWString EnvironmentVariables::FabricTest_EnableHashSharedLogId = make_global<wstring>(L"_FabricTest_EnableHashSharedLogId"); GlobalWString EnvironmentVariables::FabricTest_EnableSparseSharedLogs = make_global<wstring>(L"_FabricTest_EnableSparseSharedLogs"); GlobalWString EnvironmentVariables::FabricTest_SharedLogSize = make_global<wstring>(L"_FabricTest_SharedLogSize"); GlobalWString EnvironmentVariables::FabricTest_SharedLogMaximumRecordSize = make_global<wstring>(L"_FabricTest_SharedLogMaximumRecordSize");
268
1,143
<reponame>zhouyijiaren/commons package com.twitter.common.stats; /** * Helper class containing only static methods */ public final class Histograms { private Histograms() { /* Disable */ } /** * Helper method that return an array of quantiles * @param h the histogram to query * @param quantiles an array of double representing the quantiles * @return the array of computed quantiles */ public static long[] extractQuantiles(Histogram h, double[] quantiles) { long[] results = new long[quantiles.length]; for (int i = 0; i < results.length; i++) { double q = quantiles[i]; results[i] = h.getQuantile(q); } return results; } }
228
577
<gh_stars>100-1000 { "name": "viewer-elm", "version": "0.1.0", "description": "Animation preview ui for reanimate", "main": "", "scripts": { "build": "elm make src/Main.elm --optimize --output dist/elm.js", "dev-server": "elm-live --open --dir=dist --start-page=index.html src/Main.elm -- --output dist/elm.js", "format": "elm-format --yes .", "minify": "uglifyjs dist/elm.js --compress \"pure_funcs='F2,F3,F4,F5,F6,F7,F8,F9,A2,A3,A4,A5,A6,A7,A8,A9',pure_getters,keep_fargs=false,unsafe_comps,unsafe\" | uglifyjs --mangle --output=dist/elm.js" }, "author": "", "license": "Unlicense", "dependencies": { "elm": "^0.19.1-3" }, "devDependencies": { "elm-format": "^0.8.2", "elm-live": "^4.0.1", "uglify-js": "^3.7.2", "minimist": ">=1.2.2" } }
400
488
<filename>projects/simulator/syscall_tests/syscall_tst.76.1.c /* * * Copyright (c) Wipro Technologies, 2002. All Rights Reserved. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ /**************************************************************************** * * TEST IDENTIFIER : getrlimit01 * * TEST TITLE : test for checking functionality of getrlimit(2) * $ * EXECUTED BY : anyone * * TEST CASE TOTAL : 11 * * AUTHOR : <NAME>. <<EMAIL>> * * SIGNALS * Uses SIGUSR1 to pause before test if option set. * (See the parse_opts(3) man page). * * DESCRIPTION * Verify that, * getrlimit(2) call will be successful for all possible resource types. * * Setup: * Setup signal handling. * Pause for SIGUSR1 if option specified. * * Test: * Loop if the proper options are given. * Execute system call * Check return code, if system call failed * Issue sys call failed to get resource limits. * Otherwise, * Issue sys call is successful and got resource limits. * * Cleanup: * Print errno log and/or timing stats if options given * * USAGE: <for command-line> * getrlimit01 [-c n] [-e] [-i n] [-I x] [-P x] [-p] [-t] [-h] * where, -c n : Run n copies concurrently. * -e : Turn on errno logging. * -i n : Execute test n times. * -I x : Execute test for x seconds. * -P x : Pause for x seconds between iterations. * -p : Pause for SIGUSR1 before starting. * -t : Turn on syscall timing. * -h : Display usage information. * ***************************************************************************/ #include <stdio.h> #include <errno.h> #include <sys/time.h> #include <sys/resource.h> #include "test.h" #include "usctest.h" extern int Tst_count; static void cleanup(void); static void setup(void); char *TCID = "getrlimit01"; static struct rlimit rlim; static struct test_t { int res; char *res_str; } testcases[] = { { RLIMIT_CPU, "RLIMIT_CPU"}, { RLIMIT_FSIZE, "RLIMIT_FSIZE"}, { RLIMIT_DATA, "RLIMIT_DATA"}, { RLIMIT_STACK, "RLIMIT_STACK"}, { RLIMIT_CORE, "RLIMIT_CORE"}, { RLIMIT_RSS, "RLIMIT_RSS"}, { RLIMIT_NPROC, "RLIMIT_NPROC"}, { RLIMIT_NOFILE, "RLIMIT_NOFILE"}, { RLIMIT_MEMLOCK, "RLIMIT_MEMLOCK"}, { RLIMIT_AS, "RLIMIT_AS"}, { RLIMIT_LOCKS, "RLIMIT_LOCKS"} }; int TST_TOTAL = sizeof(testcases) / sizeof(*testcases); int main(int ac, char **av) { int i; int lc; /* loop counter */ char *msg; /* parse_opts() return message */ /* Parse standard options */ if ((msg = parse_opts(ac, av, (option_t *) NULL, NULL)) != (char *)NULL) { tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg); tst_exit(); } /* Do initial setup */ setup(); /* check for looping state if -i option is given */ for (lc = 0; TEST_LOOPING(lc); lc++) { Tst_count = 0; for (i = 0; i < TST_TOTAL; ++i) { /* * Test the system call with different resoruce types * with codes 0 to 10 */ TEST(getrlimit(testcases[i].res, &rlim)); if (TEST_RETURN == -1) { tst_resm(TFAIL, "getrlimit() failed to get %s " "values. errno is %d", testcases[i].res_str, TEST_ERRNO); exit(1); } else { tst_resm(TPASS, "getrlimit() returned %d; " "got %s values ", TEST_ERRNO, testcases[i].res_str); } } } /* do cleanup and exit */ cleanup(); return 0; } /* * setup() - performs all one time setup for this test. */ void setup() { /* capture the signals */ tst_sig(NOFORK, DEF_HANDLER, cleanup); /* Pause if the option was specified */ TEST_PAUSE; } /* * cleanup() - performs all one time cleanup for this test * completion or premature exit. */ void cleanup() { /* * print timing stats if that option was specified. * print errno log if that option was specified. */ TEST_CLEANUP; /* exit with return code appropriate for results */ tst_exit(); }
1,728
892
<reponame>github/advisory-database { "schema_version": "1.2.0", "id": "GHSA-7gvm-32f4-3mv5", "modified": "2022-05-13T01:08:16Z", "published": "2022-05-13T01:08:16Z", "aliases": [ "CVE-2019-8345" ], "details": "The Help feature in the ES File Explorer File Manager application 4.1.9.7.4 for Android allows session hijacking by a Man-in-the-middle attacker on the local network because HTTPS is not used, and an attacker's web site is displayed in a WebView with no information about the URL.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "affected": [ ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-8345" }, { "type": "WEB", "url": "https://www.youtube.com/watch?v=BtLUO-ujJ7I" } ], "database_specific": { "cwe_ids": [ "CWE-319" ], "severity": "MODERATE", "github_reviewed": false } }
463
392
<filename>Source/GenericGraphEditor/Public/AssetTypeActions_GenericGraph.h<gh_stars>100-1000 #pragma once #include "CoreMinimal.h" #include "AssetTypeActions_Base.h" class GENERICGRAPHEDITOR_API FAssetTypeActions_GenericGraph : public FAssetTypeActions_Base { public: FAssetTypeActions_GenericGraph(EAssetTypeCategories::Type InAssetCategory); virtual FText GetName() const override; virtual FColor GetTypeColor() const override; virtual UClass* GetSupportedClass() const override; virtual void OpenAssetEditor(const TArray<UObject*>& InObjects, TSharedPtr<class IToolkitHost> EditWithinLevelEditor = TSharedPtr<IToolkitHost>()) override; virtual uint32 GetCategories() override; private: EAssetTypeCategories::Type MyAssetCategory; };
231
345
<gh_stars>100-1000 # -*- coding: utf-8 -*- from __future__ import unicode_literals from django.db import models, migrations from django.utils.translation import ugettext_noop as _ def install(apps, schema_editor): Group = apps.get_model('core.Group') Permission = apps.get_model('core.Permission') Region = apps.get_model('pluggets.Region') Plugget = apps.get_model('pluggets.Plugget') users_group, is_new = Group.objects.get_or_create(name="users") add_plugget, is_new = Permission.objects.get_or_create_by_natural_key("add_plugget", "pluggets", "plugget") # Regions. footer_region, is_new = Region.objects.get_or_create( slug="footer", title=_("Footer") ) sidebar_region, is_new = Region.objects.get_or_create( slug="sidebar", title=_("Sidebar") ) # Pluggets. main_menu_plugget, is_new = Plugget.objects.get_or_create( title=_("Main menu"), source="djangoerp.pluggets.pluggets.menu", template="pluggets/menu.html", context='{"name": "main"}', region_id=sidebar_region.pk ) powered_by_plugget, is_new = Plugget.objects.get_or_create( title=_("Powered by"), description=_('Shows a classic "Powered by XYZ" claim.'), source="djangoerp.pluggets.pluggets.text", template="pluggets/powered-by.html", context='{"name": "django ERP", "url": "https://github.com/djangoERPTeam/django-erp"}', region_id=footer_region.pk ) # Permissions. users_group.permissions.add(add_plugget) class Migration(migrations.Migration): dependencies = [ ('pluggets', '0001_initial'), ('core', '0002_initial_fixture'), ] operations = [ migrations.RunPython(install), ]
776
778
<gh_stars>100-1000 import KratosMultiphysics as Kratos from KratosMultiphysics.StatisticsApplication.method_utilities import GetNormTypeContainer from KratosMultiphysics.StatisticsApplication.method_utilities import GetMethod from KratosMultiphysics.StatisticsApplication.temporal_utilities import GetItemContainer def Factory(settings, model): if (not isinstance(model, Kratos.Model)): raise Exception( "expected input shall be a Model object, encapsulating a json string" ) if (not isinstance(settings, Kratos.Parameters)): raise Exception( "expected input shall be a Parameters object, encapsulating a json string" ) return TemporalStatisticsProcess(model, settings["Parameters"]) class TemporalStatisticsProcess(Kratos.Process): """A process to use temporal statistics for Kratos containers This process calculates temporal statistics for given input variables in given container, and outputs to chosen variables and chosen container. This is compatible in OpenMP and MPI with restart Note: When this process is used with restarting, please don't use restarting start timestep and "statistics_start_point_control_value" time step same. This will have an error in averaging, once simulation is restarted. Args: model (Kratos.Model): Model used in problem settings (Kratos.Parameters): Kratos parameter settings for process """ def __init__(self, model, settings): Kratos.Process.__init__(self) default_parameters = Kratos.Parameters(""" { "model_part_name" : "PLEASE_SPECIFY_MODEL_PART_NAME", "input_variable_settings" : [ { "method_name" : "sum", "norm_type" : "none", "container" : "nodal_historical_non_historical", "echo_level" : 0, "method_settings" : {} } ], "echo_level" : 0, "statistics_start_point_control_variable_name" : "TIME", "statistics_start_point_control_value" : 0.0 } """) self.model = model self.settings = settings self.settings.ValidateAndAssignDefaults(default_parameters) self.echo_level = self.settings["echo_level"].GetInt() self.variables_settings_list = self.settings["input_variable_settings"] for variable_settings in self.variables_settings_list: variable_settings.ValidateAndAssignDefaults(default_parameters["input_variable_settings"][0]) container_name = variable_settings["container"].GetString() norm_type = variable_settings["norm_type"].GetString() item_container = GetItemContainer(container_name) _ = GetNormTypeContainer(item_container, norm_type) self.model_part_name = self.settings["model_part_name"].GetString() statistics_control_variable_name = self.settings["statistics_start_point_control_variable_name"].GetString() if (not Kratos.KratosGlobals.HasVariable(statistics_control_variable_name)): raise Exception("Unknown statistics control variable. [ \"statistics_control_variable_name\" = \"" + statistics_control_variable_name + "\" ]") ## this is required to support restarting capabilities. If STEP is used, there need to be a way to retrieve ## initial starting time for integration in the case of restarting. if (statistics_control_variable_name != "TIME"): raise Exception("Only \"TIME\" is supported as statistics_start_point_control_variable_name.") self.statistics_control_variable = Kratos.KratosGlobals.GetVariable(statistics_control_variable_name) statistics_control_variable_type = Kratos.KratosGlobals.GetVariableType(statistics_control_variable_name) if (statistics_control_variable_type == "Integer"): self.statistics_control_value = self.settings["statistics_start_point_control_value"].GetInt() elif (statistics_control_variable_type == "Double"): self.statistics_control_value = self.settings["statistics_start_point_control_value"].GetDouble() else: raise Exception("Unsupported statistics control variable type. Only supports Integer, and Double.") if (self.echo_level > 0): Kratos.Logger.PrintInfo("TemporalStatisticsProcess", "Initialized statistics process.") def Check(self): if (not self.model.HasModelPart(self.model_part_name)): raise Exception(self.model_part_name + " not found.") def ExecuteInitialize(self): self.method_list = [] for variable_settings in self.variables_settings_list: container_name = variable_settings["container"].GetString() norm_type = variable_settings["norm_type"].GetString() method_name = variable_settings["method_name"].GetString() echo_level = variable_settings["echo_level"].GetInt() item_container = GetItemContainer(container_name) method = GetMethod(item_container, method_name) method_objects = method(self.__get_model_part(), norm_type, echo_level, variable_settings["method_settings"]) self.method_list.extend(method_objects) for method in self.method_list: method.InitializeStatisticsMethod(self.statistics_control_value) def ExecuteFinalizeSolutionStep(self): current_value = self.model_part.ProcessInfo[self.statistics_control_variable] if (current_value >= self.statistics_control_value): for method in self.method_list: method.CalculateStatistics() def __get_model_part(self): if (not hasattr(self, "model_part")): self.model_part = self.model[self.model_part_name] return self.model_part
2,272
1,104
# cfg80211 P2P Device # Copyright (c) 2013-2015, <NAME> <<EMAIL>> # # This software may be distributed under the terms of the BSD license. # See README for more details. import logging logger = logging.getLogger() import time from wpasupplicant import WpaSupplicant from p2p_utils import * from test_nfc_p2p import set_ip_addr_info, check_ip_addr, grpform_events from hwsim import HWSimRadio from utils import HwsimSkip import hostapd import hwsim_utils def test_p2p_device_grpform(dev, apdev): """P2P group formation with driver using cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, r_dev=wpas, r_intent=0) check_grpform_results(i_res, r_res) wpas.dump_monitor() remove_group(dev[0], wpas) wpas.dump_monitor() if not r_res['ifname'].startswith('p2p-' + iface): raise Exception("Unexpected group ifname: " + r_res['ifname']) res = wpas.global_request("IFNAME=p2p-dev-" + iface + " STATUS-DRIVER") lines = res.splitlines() found = False for l in lines: try: [name, value] = l.split('=', 1) if name == "wdev_id": found = True break except ValueError: pass if not found: raise Exception("wdev_id not found") def test_p2p_device_grpform2(dev, apdev): """P2P group formation with driver using cfg80211 P2P Device (reverse)""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) [i_res, r_res] = go_neg_pin_authorized(i_dev=wpas, i_intent=15, r_dev=dev[0], r_intent=0) check_grpform_results(i_res, r_res) wpas.dump_monitor() remove_group(wpas, dev[0]) wpas.dump_monitor() if not i_res['ifname'].startswith('p2p-' + iface): raise Exception("Unexpected group ifname: " + i_res['ifname']) def test_p2p_device_grpform_no_group_iface(dev, apdev): """P2P group formation with driver using cfg80211 P2P Device but no separate group interface""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, r_dev=wpas, r_intent=0) check_grpform_results(i_res, r_res) wpas.dump_monitor() remove_group(dev[0], wpas) wpas.dump_monitor() if r_res['ifname'] != iface: raise Exception("Unexpected group ifname: " + r_res['ifname']) def test_p2p_device_grpform_no_group_iface2(dev, apdev): """P2P group formation with driver using cfg80211 P2P Device but no separate group interface (reverse)""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") [i_res, r_res] = go_neg_pin_authorized(i_dev=wpas, i_intent=15, r_dev=dev[0], r_intent=0) check_grpform_results(i_res, r_res) wpas.dump_monitor() remove_group(dev[0], wpas) wpas.dump_monitor() if i_res['ifname'] != iface: raise Exception("Unexpected group ifname: " + i_res['ifname']) def test_p2p_device_group_remove(dev, apdev): """P2P group removal via the P2P ctrl interface with driver using cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, r_dev=wpas, r_intent=0) check_grpform_results(i_res, r_res) # Issue the remove request on the interface which will be removed p2p_iface_wpas = WpaSupplicant(ifname=r_res['ifname']) res = p2p_iface_wpas.request("P2P_GROUP_REMOVE *") if "OK" not in res: raise Exception("Failed to remove P2P group") ev = wpas.wait_global_event(["P2P-GROUP-REMOVED"], timeout=10) if ev is None: raise Exception("Group removal event not received") if not wpas.global_ping(): raise Exception("Could not ping global ctrl_iface after group removal") def test_p2p_device_concurrent_scan(dev, apdev): """Concurrent P2P and station mode scans with driver using cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.p2p_find() time.sleep(0.1) wpas.request("SCAN") ev = wpas.wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=15) if ev is None: raise Exception("Station mode scan did not start") def test_p2p_device_nfc_invite(dev, apdev): """P2P NFC invitation with driver using cfg80211 P2P Device""" run_p2p_device_nfc_invite(dev, apdev, 0) def test_p2p_device_nfc_invite_no_group_iface(dev, apdev): """P2P NFC invitation with driver using cfg80211 P2P Device (no separate group interface)""" run_p2p_device_nfc_invite(dev, apdev, 1) def run_p2p_device_nfc_invite(dev, apdev, no_group_iface): with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface %d" % no_group_iface) set_ip_addr_info(dev[0]) logger.info("Start autonomous GO") dev[0].p2p_start_go() logger.info("Write NFC Tag on the P2P Client") res = wpas.global_request("P2P_LISTEN") if "FAIL" in res: raise Exception("Failed to start Listen mode") wpas.dump_monitor() pw = wpas.global_request("WPS_NFC_TOKEN NDEF").rstrip() if "FAIL" in pw: raise Exception("Failed to generate password token") res = wpas.global_request("P2P_SET nfc_tag 1").rstrip() if "FAIL" in res: raise Exception("Failed to enable NFC Tag for P2P static handover") sel = wpas.global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR-TAG").rstrip() if "FAIL" in sel: raise Exception("Failed to generate NFC connection handover select") wpas.dump_monitor() logger.info("Read NFC Tag on the GO to trigger invitation") res = dev[0].global_request("WPS_NFC_TAG_READ " + sel) if "FAIL" in res: raise Exception("Failed to provide NFC tag contents to wpa_supplicant") ev = wpas.wait_global_event(grpform_events, timeout=20) if ev is None: raise Exception("Joining the group timed out") res = wpas.group_form_result(ev) wpas.dump_monitor() hwsim_utils.test_connectivity_p2p(dev[0], wpas) check_ip_addr(res) wpas.dump_monitor() def test_p2p_device_misuses(dev, apdev): """cfg80211 P2P Device misuses""" hapd = hostapd.add_ap(apdev[0], {"ssid": "open"}) with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) # Add a normal network profile to the P2P Device management only # interface to verify that it does not get used. id = int(wpas.global_request('IFNAME=p2p-dev-%s ADD_NETWORK' % iface).strip()) wpas.global_request('IFNAME=p2p-dev-%s SET_NETWORK %d ssid "open"' % (iface, id)) wpas.global_request('IFNAME=p2p-dev-%s SET_NETWORK %d key_mgmt NONE' % (iface, id)) wpas.global_request('IFNAME=p2p-dev-%s ENABLE_NETWORK %d' % (iface, id)) # Scan requests get ignored on p2p-dev wpas.global_request('IFNAME=p2p-dev-%s SCAN' % iface) dev[0].p2p_start_go(freq=2412) addr = dev[0].p2p_interface_addr() wpas.scan_for_bss(addr, freq=2412) wpas.connect("open", key_mgmt="NONE", scan_freq="2412") hwsim_utils.test_connectivity(wpas, hapd) pin = wpas.wps_read_pin() dev[0].p2p_go_authorize_client(pin) res = wpas.p2p_connect_group(dev[0].p2p_dev_addr(), pin, timeout=60, social=True, freq=2412) hwsim_utils.test_connectivity_p2p(dev[0], wpas) # Optimize scan-after-disconnect wpas.group_request("SET_NETWORK 0 scan_freq 2412") dev[0].group_request("DISASSOCIATE " + wpas.p2p_interface_addr()) ev = wpas.wait_group_event(["CTRL-EVENT-DISCONNECT"]) if ev is None: raise Exception("Did not see disconnect event on P2P group interface") dev[0].remove_group() ev = wpas.wait_group_event(["CTRL-EVENT-SCAN-STARTED"], timeout=5) if ev is None: raise Exception("Scan not started") ev = wpas.wait_group_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=15) if ev is None: raise Exception("Scan not completed") time.sleep(1) hwsim_utils.test_connectivity(wpas, hapd) ev = hapd.wait_event(["AP-STA-DISCONNECTED"], timeout=0.1) if ev is not None: raise Exception("Unexpected disconnection event received from hostapd") ev = wpas.wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=0.1) if ev is not None: raise Exception("Unexpected disconnection event received from wpa_supplicant") wpas.request("DISCONNECT") wpas.wait_disconnected() def test_p2p_device_incorrect_command_interface(dev, apdev): """cfg80211 P2P Device and P2P_* command on incorrect interface""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) dev[0].p2p_listen() wpas.request('P2P_FIND type=social') ev = wpas.wait_global_event(["P2P-DEVICE-FOUND"], timeout=10) if ev is None: raise Exception("Peer not found") ev = wpas.wait_event(["P2P-DEVICE-FOUND"], timeout=0.1) if ev is not None: raise Exception("Unexpected P2P-DEVICE-FOUND event on station interface") wpas.dump_monitor() pin = wpas.wps_read_pin() dev[0].p2p_go_neg_auth(wpas.p2p_dev_addr(), pin, "enter", go_intent=14, freq=2412) wpas.request('P2P_STOP_FIND') wpas.dump_monitor() if "OK" not in wpas.request('P2P_CONNECT ' + dev[0].p2p_dev_addr() + ' ' + pin + ' display go_intent=1'): raise Exception("P2P_CONNECT failed") ev = wpas.wait_global_event(["P2P-GROUP-STARTED"], timeout=15) if ev is None: raise Exception("Group formation timed out") wpas.group_form_result(ev) wpas.dump_monitor() ev = dev[0].wait_global_event(["P2P-GROUP-STARTED"], timeout=15) if ev is None: raise Exception("Group formation timed out(2)") dev[0].group_form_result(ev) dev[0].remove_group() wpas.wait_go_ending_session() wpas.dump_monitor() def test_p2p_device_incorrect_command_interface2(dev, apdev): """cfg80211 P2P Device and P2P_GROUP_ADD command on incorrect interface""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) if "OK" not in wpas.request('P2P_GROUP_ADD'): raise Exception("P2P_GROUP_ADD failed") ev = wpas.wait_global_event(["P2P-GROUP-STARTED"], timeout=15) if ev is None: raise Exception("Group formation timed out") res = wpas.group_form_result(ev) wpas.dump_monitor() logger.info("Group results: " + str(res)) wpas.remove_group() if not res['ifname'].startswith('p2p-' + iface + '-'): raise Exception("Unexpected group ifname: " + res['ifname']) wpas.dump_monitor() def test_p2p_device_grpform_timeout_client(dev, apdev): """P2P group formation timeout on client with cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) addr0 = dev[0].p2p_dev_addr() addr5 = wpas.p2p_dev_addr() wpas.p2p_listen() dev[0].discover_peer(addr5) dev[0].p2p_listen() wpas.discover_peer(addr0) wpas.p2p_ext_listen(100, 150) dev[0].global_request("P2P_CONNECT " + addr5 + " 12345670 enter go_intent=15 auth") wpas.global_request("P2P_CONNECT " + addr0 + " 12345670 display go_intent=0") ev = dev[0].wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=5) if ev is None: raise Exception("GO Negotiation did not succeed") ev = dev[0].wait_global_event(["WPS-SUCCESS"], timeout=10) if ev is None: raise Exception("WPS did not succeed (GO)") if "OK" not in dev[0].global_request("P2P_CANCEL"): wpas.global_request("P2P_CANCEL") del wpas raise HwsimSkip("Did not manage to cancel group formation") dev[0].dump_monitor() ev = wpas.wait_global_event(["WPS-SUCCESS"], timeout=10) if ev is None: raise Exception("WPS did not succeed (Client)") dev[0].dump_monitor() ev = wpas.wait_global_event(["P2P-GROUP-FORMATION-FAILURE"], timeout=20) if ev is None: raise Exception("Group formation timeout not seen on client") ev = wpas.wait_global_event(["P2P-GROUP-REMOVED"], timeout=5) if ev is None: raise Exception("Group removal not seen on client") wpas.p2p_cancel_ext_listen() time.sleep(0.1) ifaces = wpas.global_request("INTERFACES") logger.info("Remaining interfaces: " + ifaces) del wpas if "p2p-" + iface + "-" in ifaces: raise Exception("Group interface still present after failure") def test_p2p_device_grpform_timeout_go(dev, apdev): """P2P group formation timeout on GO with cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) addr0 = dev[0].p2p_dev_addr() addr5 = wpas.p2p_dev_addr() wpas.p2p_listen() dev[0].discover_peer(addr5) dev[0].p2p_listen() wpas.discover_peer(addr0) wpas.p2p_ext_listen(100, 150) dev[0].global_request("P2P_CONNECT " + addr5 + " 12345670 enter go_intent=0 auth") wpas.global_request("P2P_CONNECT " + addr0 + " 12345670 display go_intent=15") ev = dev[0].wait_global_event(["P2P-GO-NEG-SUCCESS"], timeout=5) if ev is None: raise Exception("GO Negotiation did not succeed") ev = dev[0].wait_global_event(["WPS-SUCCESS"], timeout=10) if ev is None: raise Exception("WPS did not succeed (Client)") if "OK" not in dev[0].global_request("P2P_CANCEL"): if "OK" not in dev[0].global_request("P2P_GROUP_REMOVE *"): wpas.global_request("P2P_CANCEL") del wpas raise HwsimSkip("Did not manage to cancel group formation") dev[0].dump_monitor() ev = wpas.wait_global_event(["WPS-SUCCESS"], timeout=10) if ev is None: raise Exception("WPS did not succeed (GO)") dev[0].dump_monitor() ev = wpas.wait_global_event(["P2P-GROUP-FORMATION-FAILURE"], timeout=20) if ev is None: raise Exception("Group formation timeout not seen on GO") ev = wpas.wait_global_event(["P2P-GROUP-REMOVED"], timeout=5) if ev is None: raise Exception("Group removal not seen on GO") wpas.p2p_cancel_ext_listen() time.sleep(0.1) ifaces = wpas.global_request("INTERFACES") logger.info("Remaining interfaces: " + ifaces) del wpas if "p2p-" + iface + "-" in ifaces: raise Exception("Group interface still present after failure") def test_p2p_device_autogo(dev, apdev): """P2P autogo using cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) res = wpas.p2p_start_go() if not res['ifname'].startswith('p2p-' + iface): raise Exception("Unexpected group ifname: " + res['ifname']) bssid = wpas.get_group_status_field('bssid') dev[0].scan_for_bss(bssid, res['freq']) connect_cli(wpas, dev[0], freq=res['freq']) terminate_group(wpas, dev[0]) def test_p2p_device_autogo_no_group_iface(dev, apdev): """P2P autogo using cfg80211 P2P Device (no separate group interface)""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") res = wpas.p2p_start_go() if res['ifname'] != iface: raise Exception("Unexpected group ifname: " + res['ifname']) bssid = wpas.get_group_status_field('bssid') dev[0].scan_for_bss(bssid, res['freq']) connect_cli(wpas, dev[0], freq=res['freq']) terminate_group(wpas, dev[0]) def test_p2p_device_join(dev, apdev): """P2P join-group using cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) res = dev[0].p2p_start_go() bssid = dev[0].get_group_status_field('bssid') wpas.scan_for_bss(bssid, res['freq']) res2 = connect_cli(dev[0], wpas, freq=res['freq']) if not res2['ifname'].startswith('p2p-' + iface): raise Exception("Unexpected group ifname: " + res2['ifname']) terminate_group(dev[0], wpas) def test_p2p_device_join_no_group_iface(dev, apdev): """P2P join-group using cfg80211 P2P Device (no separate group interface)""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") res = dev[0].p2p_start_go() bssid = dev[0].get_group_status_field('bssid') wpas.scan_for_bss(bssid, res['freq']) res2 = connect_cli(dev[0], wpas, freq=res['freq']) if res2['ifname'] != iface: raise Exception("Unexpected group ifname: " + res2['ifname']) terminate_group(dev[0], wpas) def test_p2p_device_join_no_group_iface_cancel(dev, apdev): """P2P cancel join-group using cfg80211 P2P Device (no separate group interface)""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") res = dev[0].p2p_start_go() bssid = dev[0].get_group_status_field('bssid') wpas.scan_for_bss(bssid, res['freq']) pin = wpas.wps_read_pin() dev[0].p2p_go_authorize_client(pin) cmd = "P2P_CONNECT %s %s join freq=%s" % (dev[0].p2p_dev_addr(), pin, res['freq']) if "OK" not in wpas.request(cmd): raise Exception("P2P_CONNECT(join) failed") ev = wpas.wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=1) if "OK" not in wpas.request("P2P_CANCEL"): raise Exception("P2P_CANCEL failed") dev[0].remove_group() def test_p2p_device_persistent_group(dev): """P2P persistent group formation and re-invocation with cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 0") form(dev[0], wpas) invite_from_cli(dev[0], wpas) invite_from_go(dev[0], wpas) def test_p2p_device_persistent_group_no_group_iface(dev): """P2P persistent group formation and re-invocation with cfg80211 P2P Device (no separate group interface)""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") form(dev[0], wpas) invite_from_cli(dev[0], wpas) invite_from_go(dev[0], wpas) def test_p2p_device_persistent_group2(dev): """P2P persistent group formation and re-invocation (reverse) with cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 0") form(wpas, dev[0]) invite_from_cli(wpas, dev[0]) invite_from_go(wpas, dev[0]) def test_p2p_device_persistent_group2_no_group_iface(dev): """P2P persistent group formation and re-invocation (reverse) with cfg80211 P2P Device (no separate group interface)""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") form(wpas, dev[0]) invite_from_cli(wpas, dev[0]) invite_from_go(wpas, dev[0]) def p2p_device_group_conf(dev1, dev2): dev1.global_request("SET p2p_group_idle 12") dev1.global_request("SET p2p_go_freq_change_policy 2") dev1.global_request("SET p2p_go_ctwindow 7") [i_res, r_res] = go_neg_pin_authorized(i_dev=dev1, i_intent=15, r_dev=dev2, r_intent=0) check_grpform_results(i_res, r_res) if (dev1.group_request("GET p2p_group_idle") != "12" or dev1.group_request("GET p2p_go_freq_change_policy") != "2" or dev1.group_request("GET p2p_go_ctwindow") != "7"): raise Exception("Unexpected configuration value") remove_group(dev1, dev2) dev1.global_request("P2P_FLUSH") dev2.global_request("P2P_FLUSH") def test_p2p_device_conf(dev, apdev): """P2P configuration with cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") p2p_device_group_conf(wpas, dev[0]) wpas.global_request("SET p2p_no_group_iface 0") p2p_device_group_conf(wpas, dev[0]) def test_p2p_device_autogo_chan_switch(dev): """P2P autonomous GO switching channels with cfg80211 P2P Device""" with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) wpas.global_request("SET p2p_no_group_iface 1") autogo(wpas, freq=2417) connect_cli(wpas, dev[1]) res = wpas.group_request("CHAN_SWITCH 5 2422") if "FAIL" in res: # for now, skip test since mac80211_hwsim support is not yet widely # deployed raise HwsimSkip("Assume mac80211_hwsim did not support channel switching") ev = wpas.wait_group_event(["AP-CSA-FINISHED"], timeout=10) if ev is None: raise Exception("CSA finished event timed out") if "freq=2422" not in ev: raise Exception("Unexpected cahnnel in CSA finished event") wpas.dump_monitor() dev[1].dump_monitor() time.sleep(0.1) hwsim_utils.test_connectivity_p2p(wpas, dev[1])
11,674
852
#include <string> #include <iostream> #include <fstream> #include <algorithm> #include <iterator> #include <boost/regex.hpp> #include <boost/tokenizer.hpp> int main(){ std::string input("TK_HV_ON&N/A&N/A%PIX_HV_ON&N/A&N/A%LHC_RAMPING&false&false%PHYSICS_DECLARED&false&false%"); std::string nameinput("CMS.LVL0:RUNSECTION_DELIMITER_DCSLHCFLAGS_5"); //const boost::regex e("TK_HV_ON&N/A&N/A%PIX_HV_ON&N/A&N/A%LHC_RAMPING&false&false%PHYSICS_DECLARED&(true|false|N/A)&(true|false|N/A)%$"); const boost::regex e("%PHYSICS_DECLARED&(true|false|N/A)&(true|false|N/A)%"); const boost::regex ename("^CMS.LVL0:RUNSECTION_DELIMITER_DCSLHCFLAGS_([0-9]+)"); boost::match_results<std::string::const_iterator> what; boost::regex_search(input,what,e,boost::match_default); if(what[0].matched){ std::cout<<"matched"<<std::endl; std::cout<<std::string(what[1].first,what[1].second)<<std::endl; std::cout<<std::string(what[2].first,what[2].second)<<std::endl; } boost::regex_match(nameinput,what,ename,boost::match_default); if(what[0].matched){ std::cout<<"named matched"<<std::endl; std::cout<<std::string(what[1].first,what[1].second)<<std::endl; } std::string fname("fillsummary.dat"); std::ifstream ins(fname.c_str()); if (!ins.is_open()) { std::cout<<"cannot open file "<<fname<<std::endl; return 0; } typedef boost::tokenizer< boost::escaped_list_separator<char> > Tokenizer; std::vector< std::string > result; std::string line; while(std::getline(ins,line)){ Tokenizer tok(line); result.assign(tok.begin(),tok.end()); if (result.size()<3) continue; std::cout<<"fill num "<<result[0]<<" , fill scheme "<<result[1]<<", ncolliding bunches "<<result[2]<<std::endl; //std::copy(result.begin(),result.end(),std::ostream_iterator<std::string>(std::cout,",")); } }
810
480
/* * Copyright [2013-2021], Alibaba Group Holding Limited * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.alibaba.polardbx.optimizer.core.planner.rule.mpp; import com.alibaba.polardbx.optimizer.core.DrdsConvention; import com.alibaba.polardbx.optimizer.core.MppConvention; import com.alibaba.polardbx.optimizer.core.rel.PhysicalFilter; import org.apache.calcite.plan.Convention; import org.apache.calcite.plan.RelOptUtil; import org.apache.calcite.rel.RelNode; import org.apache.calcite.rel.convert.ConverterRule; import org.apache.calcite.rel.core.RelFactories; import org.apache.calcite.rel.logical.LogicalFilter; /** * @author dylan */ public class MppFilterConvertRule extends ConverterRule { public static final MppFilterConvertRule INSTANCE = new MppFilterConvertRule(); MppFilterConvertRule() { super(PhysicalFilter.class, RelOptUtil.FILTER_PREDICATE, DrdsConvention.INSTANCE, MppConvention.INSTANCE, RelFactories.LOGICAL_BUILDER, "MppFilterConvertRule"); } @Override public Convention getOutConvention() { return MppConvention.INSTANCE; } @Override public RelNode convert(RelNode rel) { final PhysicalFilter filter = (PhysicalFilter) rel; return filter.copy(filter.getTraitSet().replace(MppConvention.INSTANCE), convert(filter.getInput(), filter.getInput().getTraitSet() .replace(MppConvention.INSTANCE)), filter.getCondition()); } }
686
12,278
/////////////////////////////////////////////////////////////////////////////// // action.hpp // // Copyright 2008 <NAME>. Distributed under the Boost // Software License, Version 1.0. (See accompanying file // LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) #ifndef BOOST_XPRESSIVE_DETAIL_CORE_ACTION_HPP_EAN_10_04_2005 #define BOOST_XPRESSIVE_DETAIL_CORE_ACTION_HPP_EAN_10_04_2005 // MS compatible compilers support #pragma once #if defined(_MSC_VER) # pragma once #endif #include <boost/xpressive/detail/detail_fwd.hpp> #include <boost/xpressive/match_results.hpp> // for type_info_less namespace boost { namespace xpressive { namespace detail { /////////////////////////////////////////////////////////////////////////////// // actionable // struct actionable { virtual ~actionable() {} virtual void execute(action_args_type *) const {} actionable() : next(0) {} actionable const *next; }; }}} // namespace boost::xpressive::detail #endif
364
625
package java.lang.annotation; @Documented @Retention(RetentionPolicy.RUNTIME) @Target(ElementType.ANNOTATION_TYPE) public @interface Repeatable { Class<? extends Annotation> value(); }
59
746
package org.protege.editor.owl.model.annotation; import org.semanticweb.owlapi.model.IRI; import javax.inject.Inject; import javax.inject.Provider; /** * <NAME> * Stanford Center for Biomedical Informatics Research * 27/01/16 */ public class DefaultUserNameAnnotationPropertyIriProvider implements Provider<IRI> { private final EntityCreationMetadataPreferencesManager preferencesManager; @Inject public DefaultUserNameAnnotationPropertyIriProvider(EntityCreationMetadataPreferencesManager preferencesManager) { this.preferencesManager = preferencesManager; } @Override public IRI get() { return preferencesManager.getCreatedByAnnotationPropertyIRI(); } }
223
798
<reponame>thomas-watchmaker/picard package picard.arrays.illumina; import htsjdk.tribble.annotation.Strand; import htsjdk.variant.variantcontext.Allele; import org.testng.Assert; import org.testng.annotations.DataProvider; import org.testng.annotations.Test; import java.io.File; import java.io.IOException; import java.util.Iterator; public class Build37ExtendedIlluminaManifestTest { private static final File TEST_DATA_DIR = new File("testdata/picard/arrays/illumina"); private static final String TEST_EXOME_EXT_MANIFEST_FILENAME = "HumanExome-12v1-1_A.2.0.extended.csv"; @DataProvider(name = "testBuild37ExtendedIlluminaManifestDataProvider") public Object[][] testBuild37ExtendedIlluminaManifestDataProvider() { return new Object[][]{ { TEST_EXOME_EXT_MANIFEST_FILENAME, "HumanExome-12v1-1_A.bpm", "4/23/2012", "Infinium HD Ultra", 8, "2.0", 7 }, { "HumanExome-12v1-1_A.1.3.extended.csv", "HumanExome-12v1-1_A.bpm", "4/23/2012", "Infinium HD Ultra", 4, "1.3", 4 }, { "MEG_AllofUs_20002558X351448_A2.1.4.extended.csv", "MEG_AllofUs_20002558X351448_A2.bpm", "2/13/2019", "Infinium LCG", 5, "1.4", 1 }, { "GDA-8v1-0_A5.2.0.extended.csv", "GDA-8v1-0_A5.bpm", "8/28/2020", "Infinium LCG", 6, "2.0", 6 } }; } @Test(dataProvider = "testBuild37ExtendedIlluminaManifestDataProvider") public void testBuild37ExtendedIlluminaManifest(final String extendedManifestFilename, final String expectedDescriptorFilename, final String expectedDateManufactured, final String expectedAssayFormat, final int expectedLociCount, final String expectedExtendedManifestVersion, final int expectedNumPass) throws IOException { final Build37ExtendedIlluminaManifest manifest = new Build37ExtendedIlluminaManifest(new File(TEST_DATA_DIR, extendedManifestFilename)); Assert.assertEquals(manifest.getDescriptorFileName(), expectedDescriptorFilename); Assert.assertEquals(manifest.getDateManufactured(), expectedDateManufactured); Assert.assertEquals(manifest.getAssayFormat(), expectedAssayFormat); Assert.assertEquals(manifest.getLociCount(), expectedLociCount); Assert.assertEquals(manifest.getExtendedManifestVersion(), expectedExtendedManifestVersion); final Iterator<Build37ExtendedIlluminaManifestRecord> iterator = manifest.extendedIterator(); int count = 0; int goodCount = 0; while (iterator.hasNext()) { count++; final Build37ExtendedIlluminaManifestRecord record = iterator.next(); Assert.assertNotNull(record.getName()); Assert.assertNotNull(record.getIlmnId()); Assert.assertNotNull(record.getSnp()); if (!record.isFail()) { Assert.assertNotNull(record.getB37Chr()); Assert.assertNotNull(record.getB37Pos()); Assert.assertNotNull(record.getAlleleA()); Assert.assertNotNull(record.getAlleleB()); Assert.assertNotNull(record.getRefAllele()); goodCount++; } } Assert.assertEquals(count, expectedLociCount); Assert.assertEquals(goodCount, expectedNumPass); } @Test public void testBuild37ExtendedIlluminaManifestContent() throws IOException { final Build37ExtendedIlluminaManifest manifest = new Build37ExtendedIlluminaManifest(new File(TEST_DATA_DIR, TEST_EXOME_EXT_MANIFEST_FILENAME)); final Iterator<Build37ExtendedIlluminaManifestRecord> iterator = manifest.extendedIterator(); int count = 0; int goodCount = 0; while (iterator.hasNext()) { count++; final Build37ExtendedIlluminaManifestRecord record = iterator.next(); Assert.assertNotNull(record.getName()); Assert.assertNotNull(record.getIlmnId()); Assert.assertNotNull(record.getSnp()); if (!record.isFail()) { Assert.assertNotNull(record.getB37Chr()); Assert.assertNotNull(record.getB37Pos()); Assert.assertNotNull(record.getAlleleA()); Assert.assertNotNull(record.getAlleleB()); Assert.assertNotNull(record.getRefAllele()); goodCount++; } if (count == 1) { Assert.assertEquals(record.getIlmnId(), "exm-rs1000026-131_T_F_1990486741"); Assert.assertEquals(record.getName(), "exm-rs1000026"); Assert.assertEquals(record.getIlmnStrand(), IlluminaManifestRecord.IlluminaStrand.TOP); Assert.assertEquals(record.getSnp(), "[A/G]"); Assert.assertTrue(record.isSnp()); Assert.assertFalse(record.isIndel()); Assert.assertFalse(record.isAmbiguous()); Assert.assertEquals(record.getAddressAId(), "81790917"); Assert.assertEquals(record.getAlleleAProbeSeq(), "TAAGTCAAAGGAAAACAAGTCAATAAATCCACTATCTATGGCTCCAAGGA"); Assert.assertNull(record.getAddressBId()); Assert.assertNull(record.getAlleleBProbeSeq()); Assert.assertEquals(record.getGenomeBuild(), "37.1"); Assert.assertEquals(record.getMajorGenomeBuild(), "37"); Assert.assertEquals(record.getChr(), "21"); Assert.assertEquals(record.getPosition(), 38934599); Assert.assertEquals(record.getPloidy(), "diploid"); Assert.assertEquals(record.getSpecies(), "Homo sapiens"); Assert.assertEquals(record.getSource(), "dbSNP"); Assert.assertEquals(record.getSourceVersion(), "131"); Assert.assertEquals(record.getSourceStrand(), IlluminaManifestRecord.IlluminaStrand.TOP); Assert.assertEquals(record.getSourceSeq(), "GAAAGAGCCATAAGTCAAAGGAAAACAAGTCAATAAATCCACTATCTATGGCTCCAAGGA[A/G]TAGAGGAAGCACCCAAAGTGATATTATTGTGAAACATTATTATTAATATGGGAAAGCCGC"); Assert.assertEquals(record.getTopGenomicSeq(), "GAAAGAGCCATAAGTCAAAGGAAAACAAGTCAATAAATCCACTATCTATGGCTCCAAGGA[A/G]TAGAGGAAGCACCCAAAGTGATATTATTGTGAAACATTATTATTAATATGGGAAAGCCGC"); Assert.assertEquals(record.getBeadSetId(), 662); Assert.assertEquals(record.getExpClusters(), "3"); Assert.assertEquals(record.getRefStrand(), Strand.NEGATIVE); Assert.assertFalse(record.getIntensityOnly()); Assert.assertEquals(record.getB37Chr(), "21"); Assert.assertEquals(record.getB37Pos().intValue(), 38934599); Assert.assertEquals(record.getSnpRefAllele(), "C"); Assert.assertEquals(record.getRefAllele(), Allele.REF_C); Assert.assertEquals(record.getSnpAlleleA(), "T"); Assert.assertEquals(record.getAlleleA(), Allele.ALT_T); Assert.assertEquals(record.getSnpAlleleB(), "C"); Assert.assertEquals(record.getAlleleB(), Allele.REF_C); Assert.assertEquals(record.getRsId(), "rs1000026"); Assert.assertFalse(record.isFail()); Assert.assertFalse(record.isDupe()); } } Assert.assertEquals(count, 8); Assert.assertEquals(goodCount, 7); } }
3,518
1,441
#include <bits/stdc++.h> using namespace std; typedef pair<int, int> ii; typedef vector<ii> vii; typedef vector<int> vi; enum { UNVISITED = -1, VISITED = -2 }; // basic flags // these variables have to be global to be easily accessible by our recursion (other ways exist) vector<vii> AL; vi dfs_num; vi ts; void toposort(int u) { dfs_num[u] = VISITED; for (auto &[v, w] : AL[u]) if (dfs_num[v] == UNVISITED) toposort(v); ts.push_back(u); // this is the only change } int main() { /* // Example of a Directed Acyclic Graph in Figure 4.4 (for toposort) 8 2 1 0 2 0 2 2 0 3 0 2 3 0 5 0 1 4 0 0 0 0 1 6 0 */ freopen("toposort_in.txt", "r", stdin); int V; scanf("%d", &V); AL.assign(V, vii()); for (int u = 0; u < V; ++u) { int k; scanf("%d", &k); while (k--) { int v, w; scanf("%d %d", &v, &w); AL[u].emplace_back(v, w); } } // make sure that the given graph is DAG printf("Topological Sort (the input graph must be DAG)\n"); dfs_num.assign(V, UNVISITED); // global variable ts.clear(); // global variable for (int u = 0; u < V; ++u) // same as finding CCs if (dfs_num[u] == UNVISITED) toposort(u); reverse(ts.begin(), ts.end()); // reverse ts or for (auto &u : ts) // simply read the content printf(" %d", u); // of ts backwards printf("\n"); return 0; }
781
1,264
from .multiprocessing import Parallel_Reference from .base import y_count from ..base import * from ..linalg import * class QuadraticDiscriminantAnalysis(BaseEstimator, ClassifierMixin): def __init__(self, reg_param = 0.001, store_covariance = False, n_jobs = 1): assert type(reg_param) in FloatInt assert type(store_covariance) is bool assert type(n_jobs) is int self.reg_param = reg_param self.store_covariance = store_covariance self.n_jobs = n_jobs self.scalings_, self.rotations_, self.means_ = [], [], [] self.log_scalings_, self.covariance_, self.scaled_rotations_ = [], [], [] @n2t def fit(self, X, y): r_1 = 1-self.reg_param Y = row_np(y) self.classes_, self.priors_ = y_count(Y) self.priors_ /= X.shape[0] self.scalings_, self.log_scalings_, self.rotations_, \ self.means_, self.covariance_, self.scaled_rotations_ = \ \ Parallel_Reference(QuadraticDiscriminantAnalysis_partial_fit, n_jobs = self.n_jobs, reference = 2)( X, Y, self.classes_, self.reg_param, r_1, \ self.store_covariance) if not self.store_covariance: self.covariance_ = [] self.log_scalings_ = stack(self.log_scalings_) return self @n2t def decision_function(self, X): distances = [] for VS, means in zip(self.scaled_rotations_, self.means_): partial_X = (X - means).matmul( VS ) distances.append( squareSum(partial_X) ) #distances.append( (partial_X**2).sum(1) ) distances = T( stack(distances) ) decision = -0.5 * (distances + self.log_scalings_) + self.priors_ return decision def predict_proba(self, X): decision = self.decision_function(X) likelihood = (decision - T(decision.max(1)[0])).exp() sum_softmax = T( rowSum(likelihood) ) #sum_softmax = T(likelihood.sum(1)) softmax = likelihood / sum_softmax return softmax.numpy() def predict_log_proba(self, X): probas_ = self.predict_proba(X) return np_log(probas_) def predict(self, X): decision = self.decision_function(X).argmax(1) y_hat = self.classes_.take(decision) return y_hat def QuadraticDiscriminantAnalysis_partial_fit( X, Y, x, reg_param, r_1, store_covariance): partial_X = X[toTensor(Y == x)] partial_mean = partial_X.mean(0) partial_X -= partial_mean S, VT = _svd(partial_X, U = False) V = T(VT) scale = (S**2) / (len(partial_X) -1) scale = reg_param + (r_1 * scale) partial_cov = None if store_covariance: partial_cov = (V * scale).matmul(VT) scalings_ = scale log_scalings_ = scale.log().sum() #rotations_ = V means_ = partial_mean scaled_rotations_ = V / scale**0.5 return scalings_, log_scalings_, None, means_, partial_cov, scaled_rotations_
1,134
2,793
#include "ruby.h" VALUE rb_current_receiver(void); static VALUE bug_proc_call_receiver(RB_BLOCK_CALL_FUNC_ARGLIST(yieldarg, procarg)) { return rb_current_receiver(); } static VALUE bug_proc_make_call_receiver(VALUE self, VALUE procarg) { return rb_proc_new(bug_proc_call_receiver, procarg); } void Init_receiver(VALUE klass) { rb_define_singleton_method(klass, "make_call_receiver", bug_proc_make_call_receiver, 1); }
183
14,668
// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "components/crx_file/id_util.h" #include <stdint.h> #include "base/files/file_path.h" #include "base/hash/sha1.h" #include "base/strings/string_number_conversions.h" #include "base/strings/string_util.h" #include "build/build_config.h" #include "crypto/sha2.h" namespace { // Converts a normal hexadecimal string into the alphabet used by extensions. // We use the characters 'a'-'p' instead of '0'-'f' to avoid ever having a // completely numeric host, since some software interprets that as an IP // address. static void ConvertHexadecimalToIDAlphabet(std::string* id) { for (auto& ch : *id) { int val; if (base::HexStringToInt(base::StringPiece(&ch, 1), &val)) { ch = 'a' + val; } else { ch = 'a'; } } } } // namespace namespace crx_file { namespace id_util { // First 16 bytes of SHA256 hashed public key. const size_t kIdSize = 16; std::string GenerateId(base::StringPiece input) { uint8_t hash[kIdSize]; crypto::SHA256HashString(input, hash, sizeof(hash)); return GenerateIdFromHash(hash, sizeof(hash)); } std::string GenerateIdFromHash(const uint8_t* hash, size_t hash_size) { CHECK_GE(hash_size, kIdSize); std::string result = base::HexEncode(hash, kIdSize); ConvertHexadecimalToIDAlphabet(&result); return result; } std::string GenerateIdFromHex(const std::string& input) { std::string output = input; ConvertHexadecimalToIDAlphabet(&output); return output; } std::string GenerateIdForPath(const base::FilePath& path) { base::FilePath new_path = MaybeNormalizePath(path); const base::StringPiece path_bytes( reinterpret_cast<const char*>(new_path.value().data()), new_path.value().size() * sizeof(base::FilePath::CharType)); return GenerateId(path_bytes); } std::string HashedIdInHex(const std::string& id) { const std::string id_hash = base::SHA1HashString(id); DCHECK_EQ(base::kSHA1Length, id_hash.length()); return base::HexEncode(id_hash.c_str(), id_hash.length()); } base::FilePath MaybeNormalizePath(const base::FilePath& path) { #if defined(OS_WIN) // Normalize any drive letter to upper-case. We do this for consistency with // net_utils::FilePathToFileURL(), which does the same thing, to make string // comparisons simpler. base::FilePath::StringType path_str = path.value(); if (path_str.size() >= 2 && path_str[0] >= L'a' && path_str[0] <= L'z' && path_str[1] == L':') path_str[0] = towupper(path_str[0]); return base::FilePath(path_str); #else return path; #endif } bool IdIsValid(const std::string& id) { // Verify that the id is legal. if (id.size() != (crx_file::id_util::kIdSize * 2)) return false; for (size_t i = 0; i < id.size(); i++) { const char ch = base::ToLowerASCII(id[i]); if (ch < 'a' || ch > 'p') return false; } return true; } } // namespace id_util } // namespace crx_file
1,114
1,228
<filename>nuitka/plugins/standard/EventletPlugin.py # Copyright 2021, <NAME>, mailto:<<EMAIL>> # # Part of "Nuitka", an optimizing Python compiler that is compatible and # integrates with CPython, but also works on its own. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # """ Details see below in class definition. """ from nuitka.plugins.PluginBase import NuitkaPluginBase class NuitkaPluginEventlet(NuitkaPluginBase): """This class represents the main logic of the plugin.""" plugin_name = "eventlet" plugin_desc = "Support for including 'eventlet' dependencies and its need for 'dns' package monkey patching" @staticmethod def isAlwaysEnabled(): return True def getImplicitImports(self, module): full_name = module.getFullName() if full_name == "eventlet": yield self.locateModules("dns") yield "eventlet.hubs" elif full_name == "eventlet.hubs": yield "eventlet.hubs.epolls" yield "eventlet.hubs.hub" yield "eventlet.hubs.kqueue" yield "eventlet.hubs.poll" yield "eventlet.hubs.pyevent" yield "eventlet.hubs.selects" yield "eventlet.hubs.timer" def decideCompilation(self, module_name): if module_name.hasNamespace("dns"): return "bytecode"
710
631
<reponame>bluebird88/HIS package com.neu.his.cloud.zuul.controller.bms; import com.netflix.hystrix.contrib.javanica.annotation.HystrixCommand; import com.neu.his.cloud.zuul.common.CommonPage; import com.neu.his.cloud.zuul.common.CommonResult; import com.neu.his.cloud.zuul.distribution.api.pc.bms.ApiPcBmsFeeDistributionService; import com.neu.his.cloud.zuul.dto.bms.*; import io.swagger.annotations.Api; import io.swagger.annotations.ApiOperation; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.format.annotation.DateTimeFormat; import org.springframework.web.bind.annotation.*; import java.util.Date; import java.util.List; @RestController @Api(tags = "BmsFeeDistributionController", description = "收退费管理") @RequestMapping("/fee") @CrossOrigin(allowCredentials = "true") public class BmsFeeDistributionController { @Autowired ApiPcBmsFeeDistributionService apiPcBmsFeeDistributionService; @HystrixCommand(fallbackMethod = "listRegisteredPatientFallbackInfo") @ApiOperation(value = "查询挂号人") @RequestMapping(value = "/listRegisteredPatient", method = RequestMethod.GET) @ResponseBody public CommonResult<CommonPage<BmsRegistrationPatientResult>> listRegisteredPatient(@RequestParam(required=false,name = "medicalRecordNo") String medicalRecordNo, @RequestParam(required=false,name="queryDate")@DateTimeFormat(pattern = "yyyy-MM-dd") Date queryDate, @RequestParam(value = "pageSize", defaultValue = "5") Integer pageSize, @RequestParam(value = "pageNum", defaultValue = "1") Integer pageNum){ return apiPcBmsFeeDistributionService.listRegisteredPatient(medicalRecordNo,queryDate,pageSize,pageNum); } private CommonResult<CommonPage<BmsRegistrationPatientResult>> listRegisteredPatientFallbackInfo(String medicalRecordNo, Date queryDate,Integer pageSize, Integer pageNum){ return CommonResult.success(null,"请检查您的网络") ; } @HystrixCommand(fallbackMethod = "chargeFallbackInfo") @ApiOperation(value = "收费") @RequestMapping(value = "/charge", method = RequestMethod.POST) @ResponseBody public CommonResult charge(@RequestBody List<BmsChargeParam> bmsChargeParamList){ return apiPcBmsFeeDistributionService.charge(bmsChargeParamList); } private CommonResult chargeFallbackInfo(List<BmsChargeParam> bmsChargeParamList){ return CommonResult.success(null,"请检查您的网络") ; } @HystrixCommand(fallbackMethod = "listRefundByRegistrationIdFallbackInfo") @ApiOperation(value = "根据挂号id查询未缴费项目") @RequestMapping(value = "/listRefundByRegistrationId", method = RequestMethod.GET) @ResponseBody public CommonResult<List<BmsRefundChargeResult>> listRefundByRegistrationId(@RequestParam("registrationId") Long registrationId){ return apiPcBmsFeeDistributionService.listRefundByRegistrationId(registrationId); } private CommonResult<List<BmsRefundChargeResult>> listRefundByRegistrationIdFallbackInfo(Long registrationId){ return CommonResult.success(null,"请检查您的网络") ; } @HystrixCommand(fallbackMethod = "refundChargeFallbackInfo") @ApiOperation(value = "非药品、药品退费") @RequestMapping(value = "/refundCharge", method = RequestMethod.POST) @ResponseBody public CommonResult refundCharge(@RequestBody List<BmsRefundChargeParam> bmsRefundChargeParamList){ return apiPcBmsFeeDistributionService.refundCharge(bmsRefundChargeParamList); } private CommonResult refundChargeFallbackInfo(List<BmsRefundChargeParam> bmsRefundChargeParamList){ return CommonResult.success(null,"请检查您的网络") ; } @HystrixCommand(fallbackMethod = "refundRegistrationChargeFallbackInfo") @ApiOperation(value = "挂号退费") @RequestMapping(value = "/refundRegistrationCharge", method = RequestMethod.POST) @ResponseBody public CommonResult refundRegistrationCharge(@RequestBody BmsRefundRegChargeParam bmsRefundRegChargeParam){ return apiPcBmsFeeDistributionService.refundRegistrationCharge(bmsRefundRegChargeParam); } private CommonResult refundRegistrationChargeFallbackInfo(BmsRefundRegChargeParam bmsRefundRegChargeParam){ return CommonResult.success(null,"请检查您的网络") ; } @HystrixCommand(fallbackMethod = "listChargeByRegistrationIdFallbackInfo") @ApiOperation(value = "根据挂号Id查询所有未交费项目") @RequestMapping(value = "/listChargeByRegistrationId", method = RequestMethod.GET) @ResponseBody public CommonResult<List<BmsChargeResult>> listChargeByRegistrationId(@RequestParam("registrationId") Long registrationId){ return apiPcBmsFeeDistributionService.listChargeByRegistrationId(registrationId); } private CommonResult<List<BmsChargeResult>> listChargeByRegistrationIdFallbackInfo( Long registrationId){ return CommonResult.success(null,"请检查您的网络") ; } }
2,051
1,144
<gh_stars>1000+ package de.metas.invoicecandidate.facet.impl; /* * #%L * de.metas.swat.base * %% * Copyright (C) 2015 metas GmbH * %% * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as * published by the Free Software Foundation, either version 2 of the * License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public * License along with this program. If not, see * <http://www.gnu.org/licenses/gpl-2.0.html>. * #L% */ import java.util.ArrayList; import java.util.List; import java.util.Map; import org.adempiere.ad.dao.IQueryBuilder; import org.adempiere.ad.dao.impl.TypedSqlQueryFilter; import org.adempiere.facet.IFacet; import org.adempiere.facet.IFacetCategory; import org.adempiere.facet.impl.Facet; import org.adempiere.facet.impl.FacetCategory; import org.adempiere.facet.impl.SingleFacetCategoryCollectorTemplate; import org.compiere.model.I_C_BPartner; import de.metas.invoicecandidate.api.IInvoiceCandDAO; import de.metas.invoicecandidate.model.I_C_Invoice_Candidate; import de.metas.util.Services; /** * Collects Bill BPartner facets from {@link I_C_Invoice_Candidate}s. * * @author tsa * @task http://dewiki908/mediawiki/index.php/08602_Rechnungsdispo_UI_%28106621797084%29 */ public class C_Invoice_Candidate_BillBPartner_FacetCollector extends SingleFacetCategoryCollectorTemplate<I_C_Invoice_Candidate> { public C_Invoice_Candidate_BillBPartner_FacetCollector() { super(FacetCategory.builder() .setDisplayNameAndTranslate(I_C_Invoice_Candidate.COLUMNNAME_Bill_BPartner_ID) .setCollapsed(true) // 08755: default collapsed .build()); } @Override protected List<IFacet<I_C_Invoice_Candidate>> collectFacets(final IQueryBuilder<I_C_Invoice_Candidate> queryBuilder) { // FRESH-560: Add default filter final IQueryBuilder<I_C_Invoice_Candidate> queryBuilderWithDefaultFilters = Services.get(IInvoiceCandDAO.class).applyDefaultFilter(queryBuilder); final List<Map<String, Object>> bpartners = queryBuilderWithDefaultFilters .andCollect(I_C_Invoice_Candidate.COLUMNNAME_Bill_BPartner_ID, I_C_BPartner.class) .create() .listDistinct(I_C_BPartner.COLUMNNAME_C_BPartner_ID, I_C_BPartner.COLUMNNAME_Name, I_C_BPartner.COLUMNNAME_Value); final List<IFacet<I_C_Invoice_Candidate>> facets = new ArrayList<>(bpartners.size()); for (final Map<String, Object> row : bpartners) { final IFacet<I_C_Invoice_Candidate> facet = createFacet(row); facets.add(facet); } return facets; } private IFacet<I_C_Invoice_Candidate> createFacet(final Map<String, Object> row) { final IFacetCategory facetCategoryBPartners = getFacetCategory(); final int bpartnerId = (int)row.get(I_C_BPartner.COLUMNNAME_C_BPartner_ID); final String bpartnerName = new StringBuilder() .append(row.get(I_C_BPartner.COLUMNNAME_Value)) .append(" - ") .append(row.get(I_C_BPartner.COLUMNNAME_Name)) .toString(); final Facet<I_C_Invoice_Candidate> facet = Facet.<I_C_Invoice_Candidate> builder() .setFacetCategory(facetCategoryBPartners) .setDisplayName(bpartnerName) .setFilter(TypedSqlQueryFilter.of(I_C_Invoice_Candidate.COLUMNNAME_Bill_BPartner_ID + "=" + bpartnerId)) .build(); return facet; } }
1,333
372
/* * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except * in compliance with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed under the License * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express * or implied. See the License for the specific language governing permissions and limitations under * the License. */ /* * This code was generated by https://github.com/googleapis/google-api-java-client-services/ * Modify at your own risk. */ package com.google.api.services.bigtableadmin.v1.model; /** * The metadata for the Operation returned by CreateCluster. * * <p> This is the Java data model class that specifies how to parse/serialize into the JSON that is * transmitted over HTTP when working with the Cloud Bigtable Admin API. For a detailed explanation * see: * <a href="https://developers.google.com/api-client-library/java/google-http-java-client/json">https://developers.google.com/api-client-library/java/google-http-java-client/json</a> * </p> * * @author Google, Inc. */ @SuppressWarnings("javadoc") public final class CreateClusterMetadata extends com.google.api.client.json.GenericJson { /** * The time at which the operation failed or was completed successfully. * The value may be {@code null}. */ @com.google.api.client.util.Key private String finishTime; /** * The request that prompted the initiation of this CreateCluster operation. * The value may be {@code null}. */ @com.google.api.client.util.Key private CreateClusterRequest originalRequest; /** * The time at which the original request was received. * The value may be {@code null}. */ @com.google.api.client.util.Key private String requestTime; /** * Keys: the full `name` of each table that existed in the instance when CreateCluster was first * called, i.e. `projects//instances//tables/`. Any table added to the instance by a later API * call will be created in the new cluster by that API call, not this one. Values: information on * how much of a table's data has been copied to the newly-created cluster so far. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.util.Map<String, TableProgress> tables; /** * The time at which the operation failed or was completed successfully. * @return value or {@code null} for none */ public String getFinishTime() { return finishTime; } /** * The time at which the operation failed or was completed successfully. * @param finishTime finishTime or {@code null} for none */ public CreateClusterMetadata setFinishTime(String finishTime) { this.finishTime = finishTime; return this; } /** * The request that prompted the initiation of this CreateCluster operation. * @return value or {@code null} for none */ public CreateClusterRequest getOriginalRequest() { return originalRequest; } /** * The request that prompted the initiation of this CreateCluster operation. * @param originalRequest originalRequest or {@code null} for none */ public CreateClusterMetadata setOriginalRequest(CreateClusterRequest originalRequest) { this.originalRequest = originalRequest; return this; } /** * The time at which the original request was received. * @return value or {@code null} for none */ public String getRequestTime() { return requestTime; } /** * The time at which the original request was received. * @param requestTime requestTime or {@code null} for none */ public CreateClusterMetadata setRequestTime(String requestTime) { this.requestTime = requestTime; return this; } /** * Keys: the full `name` of each table that existed in the instance when CreateCluster was first * called, i.e. `projects//instances//tables/`. Any table added to the instance by a later API * call will be created in the new cluster by that API call, not this one. Values: information on * how much of a table's data has been copied to the newly-created cluster so far. * @return value or {@code null} for none */ public java.util.Map<String, TableProgress> getTables() { return tables; } /** * Keys: the full `name` of each table that existed in the instance when CreateCluster was first * called, i.e. `projects//instances//tables/`. Any table added to the instance by a later API * call will be created in the new cluster by that API call, not this one. Values: information on * how much of a table's data has been copied to the newly-created cluster so far. * @param tables tables or {@code null} for none */ public CreateClusterMetadata setTables(java.util.Map<String, TableProgress> tables) { this.tables = tables; return this; } @Override public CreateClusterMetadata set(String fieldName, Object value) { return (CreateClusterMetadata) super.set(fieldName, value); } @Override public CreateClusterMetadata clone() { return (CreateClusterMetadata) super.clone(); } }
1,533
1,755
<gh_stars>1000+ #ifndef F77_SINGLE_UNDERSCORE #define F77_SINGLE_UNDERSCORE #endif #ifndef F77_NO_CAPS #define F77_NO_CAPS #endif
68
1,179
// // TestAppDelegate.h // TestApplication // // Created by <NAME> on 2013-08-08. // Copyright (c) 2013 GitHub. All rights reserved. // #import <Cocoa/Cocoa.h> @interface TestAppDelegate : NSObject <NSApplicationDelegate> @property (assign) IBOutlet NSWindow *window; @end
102
1,127
<reponame>kurylo/openvino<gh_stars>1000+ // Copyright (C) 2022 Intel Corporation // SPDX-License-Identifier: Apache-2.0 // #include "common_test_utils/common_utils.hpp" #include "snippets/three_inputs_eltwise.hpp" #include "subgraph_simple.hpp" namespace ov { namespace test { namespace snippets { std::string ThreeInputsEltwise::getTestCaseName(testing::TestParamInfo<ov::test::snippets::ThreeInputsEltwiseParams> obj) { ov::Shape inputShapes0, inputShapes1, inputShapes2; std::string targetDevice; size_t num_nodes, num_subgraphs; std::tie(inputShapes0, inputShapes1, inputShapes2, num_nodes, num_subgraphs, targetDevice) = obj.param; std::ostringstream result; result << "IS[0]=" << CommonTestUtils::vec2str(inputShapes0) << "_"; result << "IS[1]=" << CommonTestUtils::vec2str(inputShapes1) << "_"; result << "IS[2]=" << CommonTestUtils::vec2str(inputShapes2) << "_"; result << "#N=" << num_nodes << "_"; result << "#S=" << num_subgraphs << "_"; result << "targetDevice=" << targetDevice; return result.str(); } void ThreeInputsEltwise::SetUp() { ov::Shape inputShape0, inputShape1, inputShape2; std::tie(inputShape0, inputShape1, inputShape2, ref_num_nodes, ref_num_subgraphs, targetDevice) = this->GetParam(); init_input_shapes({{{}, {inputShape0, }}, {{}, {inputShape1, }}, {{}, {inputShape2, }}}); auto f = ov::test::snippets::EltwiseThreeInputsFunction({inputShape0, inputShape1, inputShape2}); function = f.getOriginal(); } void ThreeInputsEltwiseSinh::SetUp() { ov::Shape inputShape0, inputShape1, inputShape2; std::tie(inputShape0, inputShape1, inputShape2, ref_num_nodes, ref_num_subgraphs, targetDevice) = this->GetParam(); init_input_shapes({{{}, {inputShape0, }}, {{}, {inputShape1, }}, {{}, {inputShape2, }}}); auto f = ov::test::snippets::EltwiseThreeInputsSinhFunction({inputShape0, inputShape1, inputShape2}); function = f.getOriginal(); } TEST_P(ThreeInputsEltwise, CompareWithRefImpl) { run(); validateNumSubgraphs(); } TEST_P(ThreeInputsEltwiseSinh, CompareWithRefImpl) { run(); validateNumSubgraphs(); } } // namespace snippets } // namespace test } // namespace ov
987
5,616
/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ package org.apache.skywalking.oap.server.storage.plugin.banyandb; import com.google.common.collect.ImmutableSet; import org.apache.skywalking.banyandb.v1.client.DataPoint; import org.apache.skywalking.banyandb.v1.client.MeasureQuery; import org.apache.skywalking.banyandb.v1.client.MeasureQueryResponse; import org.apache.skywalking.banyandb.v1.client.TimestampRange; import org.apache.skywalking.oap.server.core.analysis.metrics.Metrics; import org.apache.skywalking.oap.server.core.query.enumeration.Order; import org.apache.skywalking.oap.server.core.query.input.Duration; import org.apache.skywalking.oap.server.core.query.input.TopNCondition; import org.apache.skywalking.oap.server.core.query.type.KeyValue; import org.apache.skywalking.oap.server.core.query.type.SelectedRecord; import org.apache.skywalking.oap.server.core.storage.query.IAggregationQueryDAO; import org.apache.skywalking.oap.server.library.util.CollectionUtils; import org.apache.skywalking.oap.server.storage.plugin.banyandb.stream.AbstractBanyanDBDAO; import org.apache.skywalking.oap.server.storage.plugin.banyandb.util.ByteUtil; import java.io.IOException; import java.util.ArrayList; import java.util.Collections; import java.util.List; import java.util.Set; public class BanyanDBAggregationQueryDAO extends AbstractBanyanDBDAO implements IAggregationQueryDAO { private static final Set<String> TAGS = ImmutableSet.of(Metrics.ENTITY_ID, Metrics.TIME_BUCKET); public BanyanDBAggregationQueryDAO(BanyanDBStorageClient client) { super(client); } @Override public List<SelectedRecord> sortMetrics(TopNCondition condition, String valueColumnName, Duration duration, List<KeyValue> additionalConditions) throws IOException { final String modelName = condition.getName(); final TimestampRange timestampRange = new TimestampRange(duration.getStartTimestamp(), duration.getEndTimestamp()); MeasureQueryResponse resp = query(modelName, TAGS, Collections.singleton(valueColumnName), timestampRange, new QueryBuilder<MeasureQuery>() { @Override protected void apply(MeasureQuery query) { query.meanBy(valueColumnName, ImmutableSet.of(Metrics.ENTITY_ID)); query.and(lte(Metrics.TIME_BUCKET, duration.getEndTimeBucket())); query.and(gte(Metrics.TIME_BUCKET, duration.getStartTimeBucket())); if (condition.getOrder() == Order.DES) { query.topN(condition.getTopN(), valueColumnName); } else { query.bottomN(condition.getTopN(), valueColumnName); } if (CollectionUtils.isNotEmpty(additionalConditions)) { additionalConditions.forEach(additionalCondition -> query .and(eq( additionalCondition.getKey(), additionalCondition.getValue() ))); } } }); if (resp.size() == 0) { return Collections.emptyList(); } MetadataRegistry.Schema schema = MetadataRegistry.INSTANCE.findMetadata(modelName); if (schema == null) { throw new IOException("schema is not registered"); } MetadataRegistry.ColumnSpec spec = schema.getSpec(valueColumnName); if (spec == null) { throw new IOException("field spec is not registered"); } final List<SelectedRecord> topNList = new ArrayList<>(); for (DataPoint dataPoint : resp.getDataPoints()) { SelectedRecord record = new SelectedRecord(); record.setId(dataPoint.getTagValue(Metrics.ENTITY_ID)); record.setValue(extractFieldValueAsString(spec, valueColumnName, dataPoint)); topNList.add(record); } return topNList; } private String extractFieldValueAsString(MetadataRegistry.ColumnSpec spec, String fieldName, DataPoint dataPoint) throws IOException { if (double.class.equals(spec.getColumnClass())) { return String.valueOf(ByteUtil.bytes2Double(dataPoint.getFieldValue(fieldName)).longValue()); } else if (String.class.equals(spec.getColumnClass())) { return dataPoint.getFieldValue(fieldName); } else { return String.valueOf(((Number) dataPoint.getFieldValue(fieldName)).longValue()); } } }
2,166
537
package io.mockk.it; class PackagePrivateCls { }
20
10,225
package io.quarkus.it.validator; import java.util.HashSet; import java.util.Set; import javax.persistence.CascadeType; import javax.persistence.Entity; import javax.persistence.FetchType; import javax.persistence.Id; import javax.persistence.OneToMany; import javax.persistence.Table; import javax.validation.Valid; import javax.validation.constraints.NotEmpty; import com.sun.istack.NotNull; @Entity @Table(name = "Human") public class Human { @Id private int id; @NotEmpty private String name; @NotNull @Valid @OneToMany(fetch = FetchType.LAZY, cascade = CascadeType.ALL, orphanRemoval = true, mappedBy = "greetedHuman") private Set<Hello> greetings = new HashSet<>(); public int getId() { return id; } public void setId(final int id) { this.id = id; } public String getName() { return name; } public void setName(final String name) { this.name = name; } public Set<Hello> getGreetings() { return greetings; } public void setGreetings(final Set<Hello> greetings) { this.greetings = greetings; } }
455
348
<filename>docs/data/leg-t2/008/00803103.json {"nom":"Charbogne","circ":"3ème circonscription","dpt":"Ardennes","inscrits":164,"abs":83,"votants":81,"blancs":1,"nuls":3,"exp":77,"res":[{"nuance":"LR","nom":"<NAME>","voix":59},{"nuance":"FN","nom":"<NAME>","voix":18}]}
110
412
<filename>regression/cbmc-library/memcpy-04/main.c #include <stdlib.h> #include <string.h> typedef struct { size_t len; char *name; } info_t; void publish(info_t *info) { size_t size; __CPROVER_assume(size >= info->len); unsigned char *buffer = malloc(size); memcpy(buffer, info->name, info->len); if(info->len > 42) { __CPROVER_assert(buffer[42] == 42, "should pass"); __CPROVER_assert(buffer[41] == 42, "should fail"); } } void main() { info_t info; size_t name_len; info.name = malloc(name_len); info.len = name_len; if(name_len > 42) info.name[42] = 42; publish(&info); }
269
6,989
<filename>contrib/python/filelock/py2/filelock/_windows.py import os from errno import ENOENT from ._api import BaseFileLock from ._util import raise_on_exist_ro_file try: import msvcrt except ImportError: msvcrt = None class WindowsFileLock(BaseFileLock): """Uses the :func:`msvcrt.locking` function to hard lock the lock file on windows systems.""" def _acquire(self): raise_on_exist_ro_file(self._lock_file) mode = ( os.O_RDWR # open for read and write | os.O_CREAT # create file if not exists | os.O_TRUNC # truncate file if not empty ) try: fd = os.open(self._lock_file, mode) except OSError as exception: if exception.errno == ENOENT: # No such file or directory raise else: try: msvcrt.locking(fd, msvcrt.LK_NBLCK, 1) except (OSError, IOError): # noqa: B014 # IOError is not OSError on python 2 os.close(fd) else: self._lock_file_fd = fd def _release(self): fd = self._lock_file_fd self._lock_file_fd = None msvcrt.locking(fd, msvcrt.LK_UNLCK, 1) os.close(fd) try: os.remove(self._lock_file) # Probably another instance of the application hat acquired the file lock. except OSError: pass __all__ = [ "WindowsFileLock", ]
711
2,023
<reponame>tdiprima/code def all_members(aClass): members = {} bases = list(aClass.__bases__) bases.reverse() for base in bases: members.update(all_members(base)) members.update(vars(aClass)) return members class Eggs: eggs = 'eggs' spam = None class Spam: spam = 'spam' class Breakfast(Spam, Eggs): eggs = 'scrambled' print all_members(Eggs) print all_members(Spam) print all_members(Breakfast) # Output: # {'spam': None, '__doc__': None, 'eggs': 'eggs', '__module__': '__main__'} # {'spam': 'spam', '__doc__': None, '__module__': '__main__'} # {'__doc__': None, 'eggs': 'scrambled', 'spam': 'spam', '__module__': '__main__'}
294
593
"""Views for django-annoying's tests""" from __future__ import absolute_import import datetime from django.http import HttpResponse from annoying.decorators import ajax_request, render_to @ajax_request def ajax_request_view(request): return { 'bool': True, 'int': 1, 'list': [2, 3, 4], 'dict': { 'foo': 'bar', 'bar': 'bob', }, 'string': 'barry', 'date': datetime.datetime(2013, 12, 25, 15, 16), } @ajax_request def ajax_request_httpresponse_view(request): return HttpResponse("Data") @render_to('test.txt', content_type='text/plain') def render_to_content_type_kwarg(request): return {} @render_to('test.txt', 'text/plain') def render_to_content_type_positional(request): return {}
341
4,054
<reponame>Anlon-Burke/vespa // Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root. package com.yahoo.prelude.semantics.test; import org.junit.Test; public class ExpansionTestCase extends RuleBaseAbstractTestCase { public ExpansionTestCase() { super("expansion.sr"); } @Test public void testOrExpansion() { assertSemantics("OR or1 or2 or3", "or1"); } @Test public void testEquivExpansion1() { assertSemantics("EQUIV equiv1 equiv2 equiv3", "equiv1"); } @Test public void testEquivExpansion2() { assertSemantics("EQUIV testfield:e1 testfield:e2 testfield:e3", "testfield:foo"); } @Test public void testEquivExpansion3() { assertSemantics("AND testfield:e1 testfield:e2 testfield:e3 testfield:e1 testfield:e2 testfield:e3", "testfield:foo testfield:bar"); } }
378
892
<filename>advisories/unreviewed/2022/05/GHSA-gvvg-f28q-44wc/GHSA-gvvg-f28q-44wc.json { "schema_version": "1.2.0", "id": "GHSA-gvvg-f28q-44wc", "modified": "2022-05-01T01:50:14Z", "published": "2022-05-01T01:50:14Z", "aliases": [ "CVE-2005-0545" ], "details": "Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.", "severity": [ ], "affected": [ ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0545" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=110935549821930&w=2" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/391332" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/12641" } ], "database_specific": { "cwe_ids": [ ], "severity": "HIGH", "github_reviewed": false } }
509
356
package com.indeed.proctor.pipet.core.var; /** * Thrown when a converter has some error during conversion that is unrecoverable. */ public class ValueConversionException extends Exception { public ValueConversionException(final String message) { super(message); } public ValueConversionException(final String s, final Throwable throwable) { super(s, throwable); } }
126
1,443
<filename>users/albertofdzm.json<gh_stars>1000+ { "copyright": "<NAME>, http://onlythepixel.com", "url": "http://onlythepixel.com", "email": "<EMAIL>", "gravatar": true, "theme": "black-beauty" }
85
16,989
// Copyright 2020 The Bazel Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package com.google.devtools.build.lib.bugreport; import com.google.common.base.MoreObjects; import com.google.common.collect.ImmutableList; import com.google.devtools.build.lib.events.EventHandler; import com.google.devtools.build.lib.events.EventKind; import java.util.List; import javax.annotation.Nullable; /** Context describing when a {@link Crash} occurred and how it should be handled. */ public final class CrashContext { /** * Creates a {@link CrashContext} that instructs {@link BugReporter} to halt the JVM when handling * a crash. * * <p>This should only be used when it is not feasible to conduct an orderly shutdown, for example * a crash in an async thread. */ public static CrashContext halt() { return new CrashContext(/*haltJvm=*/ true); } /** * Creates a {@link CrashContext} that instructs {@link BugReporter} <em>not</em> to halt the JVM * when handling a crash. * * <p>The caller is responsible for terminating the server with an appropriate exit code. */ public static CrashContext keepAlive() { return new CrashContext(/*haltJvm=*/ false); } private final boolean haltJvm; private ImmutableList<String> args = ImmutableList.of(); private boolean sendBugReport = true; private String extraOomInfo = ""; @Nullable private String heapDumpPath = null; private EventHandler eventHandler = event -> System.err.println(event.getKind() + ": " + event.getMessage()); private CrashContext(boolean haltJvm) { this.haltJvm = haltJvm; } /** Sets the arguments that {@link BugReporter} should include with the bug report. */ public CrashContext withArgs(String... args) { this.args = ImmutableList.copyOf(args); return this; } /** Sets the arguments that {@link BugReporter} should include with the bug report. */ public CrashContext withArgs(List<String> args) { this.args = ImmutableList.copyOf(args); return this; } /** Disables bug reporting. */ public CrashContext withoutBugReport() { sendBugReport = false; return this; } /** * Sets a custom additional message that should be including when handling an {@link * OutOfMemoryError}. */ public CrashContext withExtraOomInfo(String extraOomInfo) { this.extraOomInfo = extraOomInfo; return this; } /** * Sets the path at which to write a heap dump when handling {@link OutOfMemoryError}. * * <p>The path <em>must</em> end in {@code .hprof} for the heap dump to succeed. * * <p>If not called, there will be no heap dump. */ public void setHeapDumpPath(String heapDumpPath) { this.heapDumpPath = heapDumpPath; } /** * Sets the {@link EventHandler} that should be notified about the {@link EventKind#FATAL} crash * event. * * <p>If this method is not called, the event is printed to {@link System#err}. */ public CrashContext reportingTo(EventHandler eventHandler) { this.eventHandler = eventHandler; return this; } boolean shouldHaltJvm() { return haltJvm; } ImmutableList<String> getArgs() { return args; } boolean shouldSendBugReport() { return sendBugReport; } String getExtraOomInfo() { return extraOomInfo; } @Nullable String getHeapDumpPath() { return heapDumpPath; } EventHandler getEventHandler() { return eventHandler; } @Override public String toString() { return MoreObjects.toStringHelper(this) .add("haltJvm", haltJvm) .add("args", args) .add("sendBugReport", sendBugReport) .add("extraOomInfo", extraOomInfo) .add("eventHandler", eventHandler) .toString(); } }
1,386
311
package datadog.trace.bootstrap.instrumentation.api; import datadog.trace.context.TraceScope; /** * Allows custom scope managers. See OTScopeManager, CustomScopeManager, and ContextualScopeManager */ public interface AgentScopeManager { AgentScope activate(AgentSpan span, ScopeSource source); AgentScope activate(AgentSpan span, ScopeSource source, boolean isAsyncPropagating); TraceScope active(); AgentSpan activeSpan(); TraceScope.Continuation captureSpan(AgentSpan span, ScopeSource source); }
139
1,140
from matplotlib import pyplot as plt from matplotlib import rcParams rcParams['axes.linewidth'] = 1 plt.plot([1,2,3]) plt.yticks([]) plt.savefig("pixels_snapped.png", dpi=72) plt.clf() rcParams['path.snap'] = False plt.plot([1,2,3]) plt.yticks([]) plt.savefig("pixels_unsnapped.png", dpi=72) plt.clf() rcParams['path.snap'] = True rcParams['axes.linewidth'] = 0 fig = plt.figure(figsize=(4, 2)) for i, filename in enumerate(['pixels_unsnapped.png', 'pixels_snapped.png']): ax = fig.add_subplot(1, 2, i+1) im = plt.imread(filename) ax.imshow(im, interpolation='nearest') ax.set_xlim(70, 76) ax.set_ylim(46, 41) ax.set_xticks([]) ax.set_yticks([]) fig.savefig("pixel_snapping.pdf", bbox_inches="tight")
344
21,684
<filename>src/rdb_protocol/terms/pred.cc // Copyright 2010-2015 RethinkDB, all rights reserved. #include "rdb_protocol/terms/terms.hpp" #include "rdb_protocol/op.hpp" namespace ql { // Anonymous namespace to avoid linker conflicts with datum_lt / datum_gt from shards.cc namespace { bool datum_eq(const datum_t &lhs, const datum_t &rhs) { // Behavior of cmp with respect to datum equality didn't change between versions. return lhs == rhs; } bool datum_lt(const datum_t &lhs, const datum_t &rhs) { return lhs.cmp(rhs) < 0; } bool datum_le(const datum_t &lhs, const datum_t &rhs) { return lhs.cmp(rhs) <= 0; } bool datum_gt(const datum_t &lhs, const datum_t &rhs) { return lhs.cmp(rhs) > 0; } bool datum_ge(const datum_t &lhs, const datum_t &rhs) { return lhs.cmp(rhs) >= 0; } class predicate_term_t : public op_term_t { public: predicate_term_t(compile_env_t *env, const raw_term_t &term) : op_term_t(env, term, argspec_t(2, -1)), namestr(0), invert(false), pred(0) { switch (static_cast<int>(term.type())) { case Term::EQ: namestr = "EQ"; pred = &datum_eq; break; case Term::NE: namestr = "NE"; pred = &datum_eq; invert = true; // we invert the == operator so (!= 1 2 3) makes sense break; case Term::LT: namestr = "LT"; pred = &datum_lt; break; case Term::LE: namestr = "LE"; pred = &datum_le; break; case Term::GT: namestr = "GT"; pred = &datum_gt; break; case Term::GE: namestr = "GE"; pred = &datum_ge; break; default: unreachable(); } guarantee(namestr && pred); } private: virtual scoped_ptr_t<val_t> eval_impl( scope_env_t *env, args_t *args, eval_flags_t) const { datum_t lhs = args->arg(env, 0)->as_datum(); for (size_t i = 1; i < args->num_args(); ++i) { datum_t rhs = args->arg(env, i)->as_datum(); if (!(pred)(lhs, rhs)) { return new_val_bool(static_cast<bool>(false ^ invert)); } lhs = rhs; } return new_val_bool(static_cast<bool>(true ^ invert)); } const char *namestr; virtual const char *name() const { return namestr; } bool invert; bool (*pred)(const datum_t &lhs, const datum_t &rhs); }; class not_term_t : public op_term_t { public: not_term_t(compile_env_t *env, const raw_term_t &term) : op_term_t(env, term, argspec_t(1)) { } private: virtual scoped_ptr_t<val_t> eval_impl(scope_env_t *env, args_t *args, eval_flags_t) const { return new_val_bool(!args->arg(env, 0)->as_bool()); } virtual const char *name() const { return "not"; } }; } // Anonymous namespace counted_t<term_t> make_predicate_term( compile_env_t *env, const raw_term_t &term) { return make_counted<predicate_term_t>(env, term); } counted_t<term_t> make_not_term( compile_env_t *env, const raw_term_t &term) { return make_counted<not_term_t>(env, term); } } // namespace ql
1,601
466
import torch from torch import nn from torch.nn.utils import clip_grad_norm_ import torch.distributed as dist import logging from openchem.utils.utils import check_params import time from tqdm import tqdm from openchem.utils import comm from torch.utils.tensorboard import SummaryWriter from openchem.utils.utils import time_since, calculate_metrics from openchem.optimizer.openchem_optimizer import OpenChemOptimizer from openchem.optimizer.openchem_lr_scheduler import OpenChemLRScheduler import numpy as np class OpenChemModel(nn.Module): """Base class for all OpenChem models. Function :func:'forward' and :func:'cast' inputs must be overridden for every class, that inherits from OpenChemModel. """ def __init__(self, params): super(OpenChemModel, self).__init__() check_params(params, self.get_required_params(), self.get_optional_params()) if 'lr_scheduler' not in params.keys(): params['lr_scheduler'] = None params['lr_scheduler_params'] = None self.params = params self.use_cuda = self.params['use_cuda'] self.batch_size = self.params['batch_size'] self.eval_metrics = self.params['eval_metrics'] self.task = self.params['task'] self.logdir = self.params['logdir'] self.num_epochs = self.params['num_epochs'] if 'use_clip_grad' in self.params.keys(): self.use_clip_grad = self.params['use_clip_grad'] else: self.use_clip_grad = False if self.use_clip_grad: self.max_grad_norm = self.params['max_grad_norm'] else: self.max_grad_norm = None self.random_seed = self.params['random_seed'] self.print_every = self.params['print_every'] self.save_every = self.params['save_every'] @staticmethod def get_required_params(): return { 'task': str, 'batch_size': int, 'num_epochs': int, 'train_data_layer': None, 'val_data_layer': None, } @staticmethod def get_optional_params(): return { 'use_cuda': bool, 'use_clip_grad': bool, 'max_grad_norm': float, 'random_seed': int, 'print_every': int, 'save_every': int, 'lr_scheduler': None, 'lr_scheduler_params': dict, 'eval_metrics': None, 'logdir': str } def forward(self, inp, eval=False): raise NotImplementedError @staticmethod def cast_inputs(sample, task, use_cuda): raise NotImplementedError def load_model(self, path): weights = torch.load(path) self.load_state_dict(weights) def save_model(self, path): torch.save(self.state_dict(), path) def build_training(model, params): optimizer = OpenChemOptimizer([params['optimizer'], params['optimizer_params']], model.parameters()) lr_scheduler = OpenChemLRScheduler([params['lr_scheduler'], params['lr_scheduler_params']], optimizer.optimizer) use_cuda = params['use_cuda'] criterion = params['criterion'] if use_cuda: criterion = criterion.cuda() return criterion, optimizer, lr_scheduler def train_step(model, optimizer, criterion, inp, target): with torch.autograd.set_detect_anomaly(True): optimizer.zero_grad() output = model(inp, eval=False) loss = criterion(output, target) loss.backward() optimizer.step() has_module = False if hasattr(model, 'module'): has_module = True if has_module: use_clip_grad = model.module.use_clip_grad max_grad_norm = model.module.max_grad_norm else: use_clip_grad = model.use_clip_grad max_grad_norm = model.max_grad_norm if use_clip_grad: clip_grad_norm_(model.parameters(), max_grad_norm) return loss def fit(model, scheduler, train_loader, optimizer, criterion, params, eval=False, val_loader=None, cur_epoch=0): textlogger = logging.getLogger("openchem.fit") logdir = params['logdir'] print_every = params['print_every'] save_every = params['save_every'] n_epochs = params['num_epochs'] writer = SummaryWriter() start = time.time() loss_total = 0 n_batches = 0 schedule_by_iter = scheduler.by_iteration scheduler = scheduler.scheduler all_losses = [] val_losses = [] has_module = False if hasattr(model, 'module'): has_module = True world_size = comm.get_world_size() for epoch in tqdm(range(cur_epoch, n_epochs + cur_epoch)): model.train() for i_batch, sample_batched in enumerate(tqdm(train_loader)): if has_module: task = model.module.task use_cuda = model.module.use_cuda batch_input, batch_target = model.module.cast_inputs(sample_batched, task, use_cuda) else: task = model.task use_cuda = model.use_cuda batch_input, batch_target = model.cast_inputs(sample_batched, task, use_cuda) loss = train_step(model, optimizer, criterion, batch_input, batch_target) if schedule_by_iter: # steps are in iters scheduler.step() if world_size > 1: reduced_loss = reduce_tensor(loss, world_size).item() else: reduced_loss = loss.item() loss_total += reduced_loss n_batches += 1 cur_loss = loss_total / n_batches all_losses.append(cur_loss) if epoch % print_every == 0: if comm.is_main_process(): textlogger.info('TRAINING: [Time: %s, Epoch: %d, Progress: %d%%, ' 'Loss: %.4f]' % (time_since(start), epoch, epoch / n_epochs * 100, cur_loss)) if eval: assert val_loader is not None val_loss, metrics = evaluate(model, val_loader, criterion, epoch=epoch) val_losses.append(val_loss) info = { 'Train loss': cur_loss, 'Validation loss': val_loss, 'Validation metrics': metrics, 'LR': optimizer.param_groups[0]['lr'] } else: info = {'Train loss': cur_loss, 'LR': optimizer.param_groups[0]['lr']} if comm.is_main_process(): for tag, value in info.items(): writer.add_scalar(tag, value, epoch + 1) for tag, value in model.named_parameters(): tag = tag.replace('.', '/') if torch.std(value).item() < 1e-3 or \ torch.isnan(torch.std(value)).item(): textlogger.warning("Warning: {} has zero variance ".format(tag) + "(i.e. constant vector)") else: log_value = value.detach().cpu().numpy() writer.add_histogram(tag, log_value, epoch + 1) #logger.histo_summary( # tag, log_value, epoch + 1) if value.grad is None: print("Warning: {} grad is undefined".format(tag)) else: log_value_grad = value.grad.detach().cpu().numpy() writer.add_histogram(tag + "/grad", log_value_grad, epoch + 1) if epoch % save_every == 0 and comm.is_main_process(): torch.save(model.state_dict(), logdir + '/checkpoint/epoch_' + str(epoch)) loss_total = 0 n_batches = 0 if scheduler is not None: if not schedule_by_iter: # steps are in epochs scheduler.step() return all_losses, val_losses def evaluate(model, data_loader, criterion=None, epoch=None): textlogger = logging.getLogger("openchem.evaluate") model.eval() loss_total = 0 n_batches = 0 start = time.time() prediction = [] ground_truth = [] has_module = False if hasattr(model, 'module'): has_module = True if has_module: task = model.module.task eval_metrics = model.module.eval_metrics logdir = model.module.logdir else: task = model.task eval_metrics = model.eval_metrics logdir = model.logdir for i_batch, sample_batched in enumerate(data_loader): if has_module: task = model.module.task use_cuda = model.module.use_cuda batch_input, batch_target = model.module.cast_inputs(sample_batched, task, use_cuda) else: task = model.task use_cuda = model.use_cuda batch_input, batch_target = model.cast_inputs(sample_batched, task, use_cuda) predicted = model(batch_input, eval=True) try: loss = criterion(predicted, batch_target) except TypeError: loss = 0.0 if hasattr(predicted, 'detach'): predicted = predicted.detach().cpu().numpy() if hasattr(batch_target, 'cpu'): batch_target = batch_target.cpu().numpy() if hasattr(loss, 'item'): loss = loss.item() if isinstance(loss, list): loss = 0.0 prediction += list(predicted) ground_truth += list(batch_target) loss_total += loss n_batches += 1 cur_loss = loss_total / n_batches if task == 'classification': prediction = np.argmax(prediction, axis=1) metrics = calculate_metrics(prediction, ground_truth, eval_metrics) metrics = np.mean(metrics) if task == "graph_generation": f = open(logdir + "/debug_smiles_epoch_" + str(epoch) + ".smi", "w") if isinstance(metrics, list) and len(metrics) == len(prediction): for i in range(len(prediction)): f.writelines(str(prediction[i]) + "," + str(metrics[i]) + "\n") else: for i in range(len(prediction)): f.writelines(str(prediction[i]) + "\n") f.close() if comm.is_main_process(): textlogger.info('EVALUATION: [Time: %s, Loss: %.4f, Metrics: %.4f]' % (time_since(start), cur_loss, metrics)) return cur_loss, metrics def predict(model, data_loader, eval=True): textlogger = logging.getLogger("openchem.predict") model.eval() start = time.time() prediction = [] samples = [] has_module = False if hasattr(model, 'module'): has_module = True if has_module: task = model.module.task logdir = model.module.logdir else: task = model.task logdir = model.logdir for i_batch, sample_batched in enumerate(data_loader): if has_module: task = model.module.task use_cuda = model.module.use_cuda batch_input, batch_object = model.module.cast_inputs(sample_batched, task, use_cuda, for_prediction=True) else: task = model.task use_cuda = model.use_cuda batch_input, batch_object = model.cast_inputs(sample_batched, task, use_cuda, for_predction=True) predicted = model(batch_input, eval=True) if hasattr(predicted, 'detach'): predicted = predicted.detach().cpu().numpy() prediction += list(predicted) samples += list(batch_object) if task == 'classification': prediction = np.argmax(prediction, axis=1) f = open(logdir + "/predictions.txt", "w") assert len(prediction) == len(samples) if comm.is_main_process(): for i in range(len(prediction)): tmp = [chr(c) for c in samples[i]] tmp = ''.join(tmp) if " " in tmp: tmp = tmp[:tmp.index(" ")] to_write = [str(pred) for pred in prediction[i]] to_write = ",".join(to_write) f.writelines(tmp + "," + to_write + "\n") f.close() if comm.is_main_process(): textlogger.info('Predictions saved to ' + logdir + "/predictions.txt") textlogger.info( 'PREDICTION: [Time: %s, Number of samples: %d]' % (time_since(start), len(prediction)) ) def reduce_tensor(tensor, world_size): r""" Reduces input ''tensor'' across all processes in such a way that everyone gets the sum of ''tensor'' from all of the processes. Args: tensor (Tensor): data to be reduced. world_size (int): number of processes. """ rt = tensor.clone() dist.all_reduce(rt, op=dist.ReduceOp.SUM) rt /= world_size return rt
6,535
319
<gh_stars>100-1000 /** * Copyright (c) 2011, The University of Southampton and the individual contributors. * All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * * * Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * * Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * * Neither the name of the University of Southampton nor the names of its * contributors may be used to endorse or promote products derived from this * software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ package org.openimaj.hadoop.tools.twitter; import java.io.IOException; import java.io.StringReader; import java.util.Arrays; import java.util.List; import org.apache.commons.lang.ArrayUtils; import org.apache.hadoop.util.ToolRunner; import org.kohsuke.args4j.CmdLineException; import org.kohsuke.args4j.CmdLineParser; import org.kohsuke.args4j.Option; import org.kohsuke.args4j.ProxyOptionHandler; import org.kohsuke.args4j.util.ArgsUtil; import org.openimaj.hadoop.sequencefile.SequenceFileUtility; import org.openimaj.hadoop.tools.HadoopToolsUtil; import org.openimaj.hadoop.tools.twitter.token.mode.TwitterTokenMode; import org.openimaj.hadoop.tools.twitter.token.mode.TwitterTokenModeOption; import org.openimaj.hadoop.tools.twitter.token.outputmode.TwitterTokenOutputMode; import org.openimaj.hadoop.tools.twitter.token.outputmode.TwitterTokenOutputModeOption; import org.openimaj.io.IOUtils; import org.openimaj.tools.InOutToolOptions; import org.openimaj.tools.twitter.options.StatusType; import org.openimaj.twitter.GeneralJSONTwitter; import org.openimaj.twitter.USMFStatus; import com.jayway.jsonpath.JsonPath; /** * Hadoop specific options for twitter preprocessing * * @author <NAME> (<EMAIL>) * */ public class HadoopTwitterTokenToolOptions extends InOutToolOptions { @Option( name = "--mode", aliases = "-m", required = false, usage = "How should the tweet tokens should be counted and processed.", handler = ProxyOptionHandler.class, multiValued = true) TwitterTokenModeOption modeOptions = TwitterTokenModeOption.JUST_OUTPUT; TwitterTokenMode modeOptionsOp = TwitterTokenModeOption.JUST_OUTPUT.getOptions(); @Option( name = "--output-mode", aliases = "-om", required = false, usage = "How should tokens be outputted.", handler = ProxyOptionHandler.class) private TwitterTokenOutputModeOption outputModeOptions = TwitterTokenOutputModeOption.NONE; TwitterTokenOutputMode outputModeOptionsOp = TwitterTokenOutputModeOption.NONE.getOptions(); @Option( name = "--json-path", aliases = "-j", required = false, usage = "A JSONPath query defining the field to find tokens to count", metaVar = "STRING") String tokensJSONPath = "analysis.stemmed"; @Option( name = "--json-path-filter", aliases = "-jf", required = false, usage = "Add jsonpath filters, if a given entry passes the filters it is used", multiValued = true) List<String> jsonPathFilters; private JsonPathFilterSet filters; @Option( name = "--preprocessing-tool", aliases = "-pp", required = false, usage = "Launch an initial stage where the preprocessing tool is used. The input and output values may be ignored", metaVar = "STRING") private String preprocessingOptions = null; @Option( name = "--status-input-type", aliases = "-sit", required = false, usage = "The type of social media message being consumed") StatusType statusType = StatusType.TWITTER; private String[] args; private boolean beforeMaps; private String[] originalArgs; private JsonPath jsonPath; /** * The key in which command line arguments are held for each mapper to read * the options instance */ public static final String ARGS_KEY = "TOKEN_ARGS"; /** * Initialise the options * * @param args * the arguments after going through the hadoop tool (i.e. minus * the -D hadoop arguments) * @param originalArgs * the original arguments as typed into the command line (useful * for subhadoop tasks launched) * @param beforeMaps * whether this job is occuring before the maps * @throws CmdLineException */ public HadoopTwitterTokenToolOptions(String[] args, String[] originalArgs, boolean beforeMaps) throws CmdLineException { this.args = args; this.originalArgs = originalArgs; this.beforeMaps = beforeMaps; if (this.beforeMaps) this.prepareCL(); else this.prepare(); } /** * @param args * Just the arguments (hadoop arguments assumed to be the same) * @throws CmdLineException */ public HadoopTwitterTokenToolOptions(String[] args) throws CmdLineException { this(args, args, false); } /** * prepare the tool for running (command line version) */ public void prepareCL() { final CmdLineParser parser = new CmdLineParser(this); try { parser.parseArgument(args); // prepareMultivaluedArgument(modeOptions,TwitterTokenModeOption.JUST_OUTPUT); // prepareMultivaluedArgument(modeOptionsOp,TwitterTokenModeOption.JUST_OUTPUT.getOptions()); this.validate(); } catch (final CmdLineException e) { System.err.println(e.getMessage()); System.err.println("Usage: java -jar JClusterQuantiser.jar [options...] [files...]"); parser.printUsage(System.err); System.exit(1); } } /** * @throws CmdLineException */ public void prepare() throws CmdLineException { final CmdLineParser parser = new CmdLineParser(this); parser.parseArgument(args); // prepareMultivaluedArgument(modeOptions,TwitterTokenModeOption.JUST_OUTPUT); // prepareMultivaluedArgument(modeOptionsOp,TwitterTokenModeOption.JUST_OUTPUT.getOptions()); // System.out.println(Arrays.toString(args)); // System.out.println("Number of mode options: " + modeOptions.size()); this.validate(); } private void validate() throws CmdLineException { if (this.beforeMaps) { HadoopToolsUtil.validateInput(this); if (!noOutput()) HadoopToolsUtil.validateOutput(this); } jsonPath = JsonPath.compile(getJsonPath()); } /** * @return is there any actual output this phase */ public boolean noOutput() { return (this.modeOptions == TwitterTokenModeOption.JUST_OUTPUT); } // /** // * @return the delta between time windows in minutes // */ // public long getTimeDelta() { // return this.timeDelta; // } /** * @return the JSONPath query used to extract tokens */ public String getJsonPath() { return this.tokensJSONPath; } /** * @return the original arguments including the hadoop arguments */ public String[] getArgs() { return this.originalArgs; } /** * @return the arguments minus the hadoop arguments */ public String[] getNonHadoopArgs() { // return this.args; try { return ArgsUtil.extractArguments(this); } catch (final Exception e) { e.printStackTrace(); return new String[0]; } } /** * @param mode * output a completed token mode * @throws Exception */ public void output(TwitterTokenMode mode) throws Exception { this.outputModeOptionsOp.write(this, mode); } /** * If there were any preprocessing arguments, perform the preprocessing and * use the preprocessing output as the input to the rest of the process. * * @throws Exception */ public void performPreprocessing() throws Exception { if (noOutput()) return; if (this.preprocessingOptions == null) return; final String output = this.getOutput() + "/preprocessing"; final boolean outExists = HadoopToolsUtil.fileExists(output); if (!outExists || // if the file doesn't exist SequenceFileUtility.getFilePaths(output, "part").length == 0 // or // no // part // file // was // found ) { // if the file exists, the part file was not found, remove the file! if (outExists) { HadoopToolsUtil.removeFile(output); } String inputPart = ""; if (this.getInputFile() != null) { inputPart = "-if " + this.getInputFile(); } else { inputPart = "-i " + this.getInput(); } this.preprocessingOptions = inputPart + " -o " + output + " " + preprocessingOptions; final String[] hadoopArgs = Arrays.copyOf(this.originalArgs, this.originalArgs.length - this.args.length); if (this.isForce()) this.preprocessingOptions += " -rm"; String[] preprocessingArgs = this.preprocessingOptions.split(" "); preprocessingArgs = (String[]) ArrayUtils.addAll(hadoopArgs, preprocessingArgs); ToolRunner.run(new HadoopTwitterPreprocessingTool(), preprocessingArgs); } else { System.out.println("Preprocessing exists, using..."); } this.setInput(output); this.statusType = StatusType.USMF; return; } public JsonPathFilterSet getFilters() { if (this.filters == null) { this.filters = new JsonPathFilterSet(jsonPathFilters); } return this.filters; } public USMFStatus readStatus(String svalue) throws IOException { final USMFStatus status = IOUtils.read(new StringReader(svalue), new USMFStatus(GeneralJSONTwitter.class)); // TwitterStatus status = TwitterStatus.fromString(svalue); if (status.isInvalid()) throw new IOException("Invalid tweet"); return status; } /** * Read json from text and try to extract the part to the type required * * @param <T> * @param svalue * @return a part of type T * @throws IOException */ @SuppressWarnings("unchecked") public <T> T readStatusPart(String svalue) throws IOException { if (this.filters != null && !this.filters.filter(svalue)) return null; final Object tokens = this.jsonPath.read(svalue); if (tokens == null) { return null; } try { return (T) tokens; } catch (final Throwable e) { throw new IOException("Couldn't cast to type"); } } public StatusType getStatusType() { return this.statusType; } }
3,756
23,901
<filename>fair_submodular_maximization_2020/fair_algorithm.cc // Copyright 2020 The Authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "fair_algorithm.h" void FairAlgorithm::Insert(std::pair<int, int> element, bool non_monotone) { elements_.push_back(element); universe_.push_back(element); if (Algorithm::Feasible(elements_)) { solution_value_ = sub_func_f_->ObjectiveAndIncreaseOracleCall(elements_); return; } elements_.pop_back(); int min_index = -1; double best_value = solution_value_; for (int i = 0; i < elements_.size(); i++) { bool feasible = (elements_[i].second == element.second); if (!feasible) { auto temp_name = elements_[i]; elements_[i] = element; feasible = Algorithm::Feasible(elements_); elements_[i] = temp_name; } if (feasible) { int temp_name = elements_[i].first; elements_[i].first = element.first; double value = sub_func_f_->ObjectiveAndIncreaseOracleCall(elements_); if (value > best_value) { best_value = value; min_index = i; } elements_[i].first = temp_name; } } if (min_index != -1) { solution_value_ = best_value; elements_[min_index] = element; } } void FairAlgorithm::Init(SubmodularFunction& sub_func_f, std::vector<std::pair<int, int>> bounds, int cardinality_k) { Algorithm::Init(sub_func_f, bounds, cardinality_k); bounds_ = bounds; sub_func_f_ = sub_func_f.Clone(); sub_func_f_->Reset(); solution_value_ = 0; elements_.clear(); universe_.clear(); } double FairAlgorithm::GetSolutionValue() { std::vector<int> colors(bounds_.size(), 0); for (auto& element : elements_) colors[element.second]++; RandomHandler::Shuffle(universe_); for (auto& element : universe_) if (colors[element.second] < bounds_[element.second].first) { elements_.push_back(element); colors[element.second]++; } return sub_func_f_->ObjectiveAndIncreaseOracleCall(elements_); } std::vector<std::pair<int, int>> FairAlgorithm::GetSolutionVector() { return elements_; } std::string FairAlgorithm::GetAlgorithmName() const { return "Fair Algorithm"; }
997
1,338
/* * Copyright 2006-2010, <NAME>, <EMAIL>. * Distributed under the terms of the MIT License. */ #include "MimeTypeListView.h" #include "TypeListWindow.h" #include <Button.h> #include <Catalog.h> #include <ControlLook.h> #include <LayoutBuilder.h> #include <Locale.h> #include <ScrollView.h> #include <string.h> #undef B_TRANSLATION_CONTEXT #define B_TRANSLATION_CONTEXT "Type List Window" const uint32 kMsgTypeSelected = 'tpsl'; const uint32 kMsgSelected = 'seld'; TypeListWindow::TypeListWindow(const char* currentType, uint32 what, BWindow* target) : BWindow(BRect(100, 100, 360, 440), B_TRANSLATE("Choose type"), B_MODAL_WINDOW, B_NOT_ZOOMABLE | B_ASYNCHRONOUS_CONTROLS | B_AUTO_UPDATE_SIZE_LIMITS), fTarget(target), fWhat(what) { float padding = be_control_look->DefaultItemSpacing(); fSelectButton = new BButton("select", B_TRANSLATE("Done"), new BMessage(kMsgSelected)); fSelectButton->SetEnabled(false); BButton* button = new BButton("cancel", B_TRANSLATE("Cancel"), new BMessage(B_CANCEL)); fSelectButton->MakeDefault(true); fListView = new MimeTypeListView("typeview", NULL, true, false); fListView->SetSelectionMessage(new BMessage(kMsgTypeSelected)); fListView->SetInvocationMessage(new BMessage(kMsgSelected)); BScrollView* scrollView = new BScrollView("scrollview", fListView, B_FRAME_EVENTS | B_WILL_DRAW, false, true); BLayoutBuilder::Group<>(this, B_VERTICAL, padding) .SetInsets(padding) .Add(scrollView) .AddGroup(B_HORIZONTAL, padding) .AddGlue() .Add(button) .Add(fSelectButton); BAlignment buttonAlignment = BAlignment(B_ALIGN_USE_FULL_WIDTH, B_ALIGN_VERTICAL_CENTER); button->SetExplicitAlignment(buttonAlignment); fSelectButton->SetExplicitAlignment(buttonAlignment); MoveTo(target->Frame().LeftTop() + BPoint(15.0f, 15.0f)); } TypeListWindow::~TypeListWindow() { } void TypeListWindow::MessageReceived(BMessage* message) { switch (message->what) { case kMsgTypeSelected: fSelectButton->SetEnabled(fListView->CurrentSelection() >= 0); break; case kMsgSelected: { MimeTypeItem* item = dynamic_cast<MimeTypeItem*>(fListView->ItemAt( fListView->CurrentSelection())); if (item != NULL) { BMessage select(fWhat); select.AddString("type", item->Type()); fTarget.SendMessage(&select); } // supposed to fall through } case B_CANCEL: PostMessage(B_QUIT_REQUESTED); break; default: BWindow::MessageReceived(message); break; } }
962
5,169
<reponame>Gantios/Specs<filename>Specs/7/5/d/Hyperconnectivity/1.1.0/Hyperconnectivity.podspec.json { "name": "Hyperconnectivity", "version": "1.1.0", "swift_versions": "5.0", "summary": "Modern replacement for Apple's Reachability written in Swift and made elegant using Combine", "description": "Hyperconnectivity provides Internet connectivity and captive portal detection in Swift using Combine.", "homepage": "https://github.com/rwbutler/Hyperconnectivity", "license": { "type": "MIT", "file": "LICENSE" }, "authors": { "<NAME>": "<EMAIL>" }, "source": { "git": "https://github.com/rwbutler/Hyperconnectivity.git", "tag": "1.1.0" }, "social_media_url": "https://twitter.com/ross_w_butler", "platforms": { "ios": "13.0" }, "frameworks": [ "Combine", "Network" ], "source_files": "Hyperconnectivity/Classes/**/*", "swift_version": "5.0" }
344
1,056
<filename>ide/db.metadata.model/src/org/netbeans/modules/db/metadata/model/api/MetadataModel.java /* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.netbeans.modules.db.metadata.model.api; import javax.swing.SwingUtilities; import org.netbeans.modules.db.metadata.model.MetadataModelImplementation; import org.openide.util.Parameters; /** * This class encapsulates a metadata model and provides a way to access * the metadata in the model. * * @author <NAME> */ public class MetadataModel { final MetadataModelImplementation impl; MetadataModel(MetadataModelImplementation impl) { this.impl = impl; } /** * Provides access to the metadata in the model. * * <p>To access the model, an implementation of {@link Action} is * passed to this method. The {@link Action#run} method will be called, * and the root {@link Metadata} instance will be passed as the parameter * of this method.</p> * * <p>Any instance reachable from the {@link Metadata} instance * is only meaningful inside the action's {@code run()} method. It is not guaranteed * that a in subsequent access to the model the same instances will be available.</p> * * <p><b>No instance reachable from the {@code Metadata} instance, including * the {code Metadata} instance itself, is allowed to escape the action's {@code run()} * method!</p> * * @param action the action to be run. * @throws MetadataModelException if an exception occurs during the read access. * For example, an error could occur while retrieving the metadata. * Also, runtime exception thrown by the action's {@code run()} are * rethrown as {@code MetadataModelException}. * @throws IllegalStateException if this method is called on the AWT event * dispatching thread. */ public void runReadAction(Action<Metadata> action) throws MetadataModelException { Parameters.notNull("action", action); if (SwingUtilities.isEventDispatchThread()) { throw new IllegalStateException(); } impl.runReadAction(action); } }
922