mirror of
https://github.com/dart-lang/sdk
synced 2024-11-02 08:07:11 +00:00
Reland migrate most of the tests in standalone to be strong mode clean and move them to standalone_2 directory.
Bug: Change-Id: I4ca50f315361422db1d4356055862463bfe1d6f3 Reviewed-on: https://dart-review.googlesource.com/12240 Reviewed-by: Siva Annamalai <asiva@google.com> Reviewed-by: Ben Konyi <bkonyi@google.com> Commit-Queue: Siva Annamalai <asiva@google.com>
This commit is contained in:
parent
96265d7ae2
commit
bd2a8e1d60
394 changed files with 2087 additions and 1348 deletions
|
@ -1,703 +0,0 @@
|
|||
// Copyright (c) 2013, the Dart project authors. Please see the AUTHORS file
|
||||
// for details. All rights reserved. Use of this source code is governed by a
|
||||
// BSD-style license that can be found in the LICENSE file.
|
||||
|
||||
import 'dart:async';
|
||||
import 'dart:convert';
|
||||
import 'dart:io';
|
||||
|
||||
import "package:async_helper/async_helper.dart";
|
||||
import "package:expect/expect.dart";
|
||||
|
||||
void testZLibInflate_regress10026() {
|
||||
test(data, expect) {
|
||||
asyncStart();
|
||||
var controller = new StreamController(sync: true);
|
||||
controller.stream
|
||||
.transform(ZLIB.decoder)
|
||||
.transform(UTF8.decoder)
|
||||
.fold(new StringBuffer(), (buffer, s) {
|
||||
buffer.write(s);
|
||||
return buffer;
|
||||
}).then((out) {
|
||||
Expect.equals(out.toString(), expect);
|
||||
asyncEnd();
|
||||
});
|
||||
controller.add(data);
|
||||
controller.close();
|
||||
}
|
||||
|
||||
// Generated by using 'gzip -c | od -v -tu1 -An -w12' and adding commas.
|
||||
test(
|
||||
[
|
||||
31,
|
||||
139,
|
||||
8,
|
||||
8,
|
||||
238,
|
||||
42,
|
||||
167,
|
||||
81,
|
||||
0,
|
||||
3,
|
||||
116,
|
||||
101,
|
||||
120,
|
||||
116,
|
||||
46,
|
||||
116,
|
||||
120,
|
||||
116,
|
||||
0,
|
||||
125,
|
||||
84,
|
||||
79,
|
||||
175,
|
||||
147,
|
||||
64,
|
||||
16,
|
||||
63,
|
||||
183,
|
||||
159,
|
||||
98,
|
||||
196,
|
||||
139,
|
||||
38,
|
||||
165,
|
||||
244,
|
||||
249,
|
||||
212,
|
||||
52,
|
||||
20,
|
||||
136,
|
||||
70,
|
||||
77,
|
||||
188,
|
||||
168,
|
||||
7,
|
||||
189,
|
||||
120,
|
||||
156,
|
||||
178,
|
||||
67,
|
||||
153,
|
||||
20,
|
||||
118,
|
||||
113,
|
||||
119,
|
||||
161,
|
||||
109,
|
||||
140,
|
||||
223,
|
||||
221,
|
||||
97,
|
||||
105,
|
||||
251,
|
||||
170,
|
||||
47,
|
||||
154,
|
||||
54,
|
||||
41,
|
||||
51,
|
||||
195,
|
||||
254,
|
||||
254,
|
||||
49,
|
||||
52,
|
||||
123,
|
||||
162,
|
||||
76,
|
||||
233,
|
||||
79,
|
||||
29,
|
||||
65,
|
||||
237,
|
||||
219,
|
||||
166,
|
||||
152,
|
||||
103,
|
||||
151,
|
||||
31,
|
||||
66,
|
||||
85,
|
||||
204,
|
||||
103,
|
||||
153,
|
||||
103,
|
||||
223,
|
||||
80,
|
||||
241,
|
||||
225,
|
||||
136,
|
||||
109,
|
||||
215,
|
||||
16,
|
||||
188,
|
||||
55,
|
||||
45,
|
||||
178,
|
||||
206,
|
||||
146,
|
||||
169,
|
||||
59,
|
||||
151,
|
||||
121,
|
||||
75,
|
||||
30,
|
||||
161,
|
||||
172,
|
||||
209,
|
||||
58,
|
||||
242,
|
||||
121,
|
||||
212,
|
||||
251,
|
||||
42,
|
||||
94,
|
||||
71,
|
||||
144,
|
||||
20,
|
||||
151,
|
||||
73,
|
||||
237,
|
||||
125,
|
||||
23,
|
||||
211,
|
||||
143,
|
||||
158,
|
||||
135,
|
||||
60,
|
||||
122,
|
||||
103,
|
||||
180,
|
||||
39,
|
||||
237,
|
||||
227,
|
||||
145,
|
||||
45,
|
||||
130,
|
||||
114,
|
||||
170,
|
||||
242,
|
||||
200,
|
||||
211,
|
||||
209,
|
||||
39,
|
||||
35,
|
||||
235,
|
||||
230,
|
||||
138,
|
||||
243,
|
||||
8,
|
||||
70,
|
||||
99,
|
||||
75,
|
||||
121,
|
||||
52,
|
||||
48,
|
||||
29,
|
||||
58,
|
||||
99,
|
||||
253,
|
||||
205,
|
||||
225,
|
||||
3,
|
||||
43,
|
||||
95,
|
||||
231,
|
||||
138,
|
||||
6,
|
||||
46,
|
||||
41,
|
||||
14,
|
||||
197,
|
||||
2,
|
||||
88,
|
||||
179,
|
||||
103,
|
||||
108,
|
||||
98,
|
||||
87,
|
||||
98,
|
||||
67,
|
||||
249,
|
||||
221,
|
||||
25,
|
||||
199,
|
||||
249,
|
||||
147,
|
||||
24,
|
||||
24,
|
||||
185,
|
||||
207,
|
||||
148,
|
||||
165,
|
||||
115,
|
||||
145,
|
||||
12,
|
||||
182,
|
||||
70,
|
||||
157,
|
||||
224,
|
||||
231,
|
||||
124,
|
||||
54,
|
||||
219,
|
||||
98,
|
||||
185,
|
||||
223,
|
||||
89,
|
||||
211,
|
||||
107,
|
||||
21,
|
||||
151,
|
||||
166,
|
||||
49,
|
||||
54,
|
||||
133,
|
||||
167,
|
||||
213,
|
||||
74,
|
||||
62,
|
||||
47,
|
||||
54,
|
||||
50,
|
||||
108,
|
||||
209,
|
||||
238,
|
||||
88,
|
||||
167,
|
||||
176,
|
||||
26,
|
||||
139,
|
||||
14,
|
||||
149,
|
||||
98,
|
||||
189,
|
||||
59,
|
||||
87,
|
||||
149,
|
||||
104,
|
||||
137,
|
||||
43,
|
||||
108,
|
||||
185,
|
||||
57,
|
||||
165,
|
||||
16,
|
||||
125,
|
||||
233,
|
||||
72,
|
||||
195,
|
||||
87,
|
||||
212,
|
||||
46,
|
||||
90,
|
||||
64,
|
||||
244,
|
||||
145,
|
||||
154,
|
||||
129,
|
||||
60,
|
||||
151,
|
||||
8,
|
||||
159,
|
||||
169,
|
||||
39,
|
||||
233,
|
||||
92,
|
||||
27,
|
||||
11,
|
||||
120,
|
||||
107,
|
||||
69,
|
||||
227,
|
||||
2,
|
||||
156,
|
||||
220,
|
||||
26,
|
||||
59,
|
||||
178,
|
||||
92,
|
||||
109,
|
||||
36,
|
||||
206,
|
||||
95,
|
||||
243,
|
||||
153,
|
||||
226,
|
||||
33,
|
||||
200,
|
||||
9,
|
||||
102,
|
||||
82,
|
||||
120,
|
||||
189,
|
||||
90,
|
||||
117,
|
||||
199,
|
||||
91,
|
||||
5,
|
||||
175,
|
||||
168,
|
||||
5,
|
||||
236,
|
||||
189,
|
||||
249,
|
||||
67,
|
||||
200,
|
||||
61,
|
||||
181,
|
||||
155,
|
||||
127,
|
||||
88,
|
||||
168,
|
||||
170,
|
||||
48,
|
||||
49,
|
||||
86,
|
||||
145,
|
||||
141,
|
||||
45,
|
||||
42,
|
||||
238,
|
||||
93,
|
||||
10,
|
||||
119,
|
||||
225,
|
||||
126,
|
||||
97,
|
||||
195,
|
||||
180,
|
||||
97,
|
||||
189,
|
||||
95,
|
||||
0,
|
||||
166,
|
||||
3,
|
||||
59,
|
||||
246,
|
||||
164,
|
||||
2,
|
||||
247,
|
||||
229,
|
||||
240,
|
||||
253,
|
||||
250,
|
||||
229,
|
||||
122,
|
||||
29,
|
||||
206,
|
||||
143,
|
||||
137,
|
||||
197,
|
||||
138,
|
||||
74,
|
||||
99,
|
||||
209,
|
||||
179,
|
||||
17,
|
||||
25,
|
||||
218,
|
||||
104,
|
||||
154,
|
||||
32,
|
||||
222,
|
||||
180,
|
||||
164,
|
||||
24,
|
||||
225,
|
||||
89,
|
||||
139,
|
||||
199,
|
||||
248,
|
||||
86,
|
||||
244,
|
||||
243,
|
||||
41,
|
||||
213,
|
||||
75,
|
||||
188,
|
||||
255,
|
||||
17,
|
||||
39,
|
||||
32,
|
||||
87,
|
||||
219,
|
||||
23,
|
||||
223,
|
||||
23,
|
||||
139,
|
||||
15,
|
||||
201,
|
||||
63,
|
||||
180,
|
||||
254,
|
||||
50,
|
||||
19,
|
||||
158,
|
||||
194,
|
||||
67,
|
||||
22,
|
||||
147,
|
||||
183,
|
||||
17,
|
||||
84,
|
||||
190,
|
||||
89,
|
||||
18,
|
||||
158,
|
||||
187,
|
||||
44,
|
||||
116,
|
||||
50,
|
||||
109,
|
||||
244,
|
||||
60,
|
||||
27,
|
||||
21,
|
||||
73,
|
||||
45,
|
||||
132,
|
||||
227,
|
||||
90,
|
||||
212,
|
||||
119,
|
||||
143,
|
||||
150,
|
||||
91,
|
||||
90,
|
||||
50,
|
||||
232,
|
||||
138,
|
||||
111,
|
||||
53,
|
||||
59,
|
||||
80,
|
||||
161,
|
||||
9,
|
||||
114,
|
||||
69,
|
||||
206,
|
||||
227,
|
||||
182,
|
||||
97,
|
||||
87,
|
||||
75,
|
||||
72,
|
||||
222,
|
||||
192,
|
||||
150,
|
||||
160,
|
||||
119,
|
||||
114,
|
||||
89,
|
||||
25,
|
||||
11,
|
||||
220,
|
||||
52,
|
||||
189,
|
||||
243,
|
||||
99,
|
||||
52,
|
||||
3,
|
||||
1,
|
||||
77,
|
||||
112,
|
||||
78,
|
||||
246,
|
||||
80,
|
||||
78,
|
||||
151,
|
||||
125,
|
||||
43,
|
||||
139,
|
||||
234,
|
||||
150,
|
||||
240,
|
||||
221,
|
||||
244,
|
||||
82,
|
||||
74,
|
||||
110,
|
||||
30,
|
||||
52,
|
||||
5,
|
||||
136,
|
||||
16,
|
||||
180,
|
||||
88,
|
||||
97,
|
||||
141,
|
||||
158,
|
||||
64,
|
||||
96,
|
||||
208,
|
||||
237,
|
||||
3,
|
||||
92,
|
||||
71,
|
||||
182,
|
||||
101,
|
||||
231,
|
||||
36,
|
||||
231,
|
||||
145,
|
||||
72,
|
||||
88,
|
||||
192,
|
||||
223,
|
||||
74,
|
||||
209,
|
||||
87,
|
||||
10,
|
||||
121,
|
||||
110,
|
||||
90,
|
||||
1,
|
||||
251,
|
||||
81,
|
||||
222,
|
||||
8,
|
||||
140,
|
||||
3,
|
||||
114,
|
||||
35,
|
||||
34,
|
||||
105,
|
||||
132,
|
||||
17,
|
||||
120,
|
||||
75,
|
||||
59,
|
||||
158,
|
||||
116,
|
||||
25,
|
||||
189,
|
||||
204,
|
||||
146,
|
||||
110,
|
||||
242,
|
||||
149,
|
||||
201,
|
||||
107,
|
||||
105,
|
||||
169,
|
||||
202,
|
||||
163,
|
||||
241,
|
||||
229,
|
||||
76,
|
||||
147,
|
||||
228,
|
||||
112,
|
||||
56,
|
||||
44,
|
||||
25,
|
||||
53,
|
||||
46,
|
||||
141,
|
||||
221,
|
||||
37,
|
||||
19,
|
||||
137,
|
||||
75,
|
||||
92,
|
||||
71,
|
||||
165,
|
||||
44,
|
||||
104,
|
||||
84,
|
||||
124,
|
||||
50,
|
||||
150,
|
||||
132,
|
||||
83,
|
||||
0,
|
||||
219,
|
||||
9,
|
||||
103,
|
||||
41,
|
||||
72,
|
||||
88,
|
||||
4,
|
||||
180,
|
||||
44,
|
||||
9,
|
||||
41,
|
||||
102,
|
||||
201,
|
||||
57,
|
||||
211,
|
||||
100,
|
||||
250,
|
||||
243,
|
||||
248,
|
||||
13,
|
||||
215,
|
||||
32,
|
||||
235,
|
||||
247,
|
||||
84,
|
||||
4,
|
||||
0,
|
||||
0
|
||||
],
|
||||
'''
|
||||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<title>Example Domain</title>
|
||||
|
||||
<meta charset="utf-8" />
|
||||
<meta http-equiv="Content-type" content="text/html; charset=utf-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1" />
|
||||
<style type="text/css">
|
||||
body {
|
||||
background-color: #f0f0f2;
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
font-family: "Open Sans", "Helvetica Neue", Helvetica, Arial, sans-serif;
|
||||
|
||||
}
|
||||
div {
|
||||
width: 600px;
|
||||
margin: 5em auto;
|
||||
padding: 3em;
|
||||
background-color: #fff;
|
||||
border-radius: 1em;
|
||||
}
|
||||
a:link, a:visited {
|
||||
color: #38488f;
|
||||
text-decoration: none;
|
||||
}
|
||||
@media (max-width: 600px) {
|
||||
body {
|
||||
background-color: #fff;
|
||||
}
|
||||
div {
|
||||
width: auto;
|
||||
margin: 0 auto;
|
||||
border-radius: 0;
|
||||
padding: 1em;
|
||||
}
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div>
|
||||
<h1>Example Domain</h1>
|
||||
<p>This domain is established to be used for illustrative examples in documents. You do not need to
|
||||
coordinate or ask for permission to use this domain in examples, and it is not available for
|
||||
registration.</p>
|
||||
<p><a href="http://www.iana.org/domains/special">More information...</a></p>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
''');
|
||||
}
|
||||
|
||||
void main() {
|
||||
testZLibInflate_regress10026();
|
||||
}
|
|
@ -7,33 +7,23 @@
|
|||
# listed in tests/lib/analyzer/analyze_tests.status without the "standalone"
|
||||
# prefix.
|
||||
|
||||
io/raw_socket_test: Pass, RuntimeError # Issue 28288
|
||||
io/http_close_test: Pass, RuntimeError # Issue 28380
|
||||
packages_file_test: Skip # Issue 26715
|
||||
packages_file_test/none: Skip # contains no tests.
|
||||
[ $compiler == dart2js || $compiler == dartdevc ]
|
||||
*: SkipByDesign
|
||||
|
||||
package/invalid_uri_test: Fail, OK # CompileTimeErrors intentionally
|
||||
package/scenarios/packages_file_strange_formatting/empty_package_dir_test: Fail, OK # CompileTimeErrors intentionally
|
||||
package/scenarios/empty_packages_file/empty_packages_file_discovery_test: Fail, OK # CompileTimeErrors intentionally
|
||||
package/scenarios/empty_packages_file/empty_packages_file_option_test: Fail, OK # CompileTimeErrors intentionally
|
||||
package/scenarios/invalid/invalid_package_name_test: RuntimeError, CompileTimeError # Errors intentionally
|
||||
package/scenarios/invalid/same_package_twice_test.dart: RuntimeError, CompileTimeError # Errors intentionally
|
||||
|
||||
issue14236_test: Pass # Do not remove this line. It serves as a marker for Issue 14516 comment #4.
|
||||
[ $compiler == dart2analyzer && $builder_tag == strong ]
|
||||
*: Skip # Issue 28649
|
||||
|
||||
[$runtime == vm && $compiler == none && $system == fuchsia]
|
||||
*: Skip # Not yet triaged.
|
||||
|
||||
[ ($runtime != vm && $runtime != dart_precompiled) && ($compiler != none) ]
|
||||
no_assert_test: Fail, OK # This is testing a vm flag.
|
||||
env_test: Skip # This is testing a vm command line parsing scenario.
|
||||
|
||||
[ $runtime == vm || $runtime == dart_precompiled || $runtime == flutter ]
|
||||
package/package_isolate_test: Fail # Issue 12474
|
||||
package/scenarios/invalid/same_package_twice_test: Pass # Issue 24119
|
||||
# This test checks that the test runner correctly detects and reports non-utf8
|
||||
# output from a test.
|
||||
io/non_utf8_output_test: NonUtf8Output, OK
|
||||
[ $runtime != vm || $compiler != none ]
|
||||
script_snapshot_not_executed_test: SkipByDesign # Only makes sense running from source.
|
||||
|
||||
[ $system == macos && $builder_tag == swarming ]
|
||||
io/*: Skip # Issue 30618
|
||||
|
||||
[ ($runtime == vm || $runtime == flutter || $runtime == dart_precompiled) && $checked ]
|
||||
# These tests have type errors on purpose.
|
||||
|
@ -43,440 +33,58 @@ io/file_invalid_arguments_test: Fail, OK
|
|||
io/internet_address_invalid_arguments_test: Fail, OK
|
||||
io/socket_invalid_arguments_test: Fail, OK
|
||||
io/stdout_bad_argument_test: Fail, OK
|
||||
|
||||
# These test have type errors on purpose and take very long to run in
|
||||
# checked mode with no benefit. Skip.
|
||||
io/file_fuzz_test: Skip
|
||||
io/directory_fuzz_test: Skip
|
||||
|
||||
[ ($runtime == vm || $runtime == dart_precompiled) && $system == macos ]
|
||||
# This test fails with "Too many open files" on the Mac OS buildbot.
|
||||
# This is expected as MacOS by default runs with a very low number
|
||||
# of allowed open files ('ulimit -n' says something like 256).
|
||||
io/socket_many_connections_test: Skip
|
||||
# Re-enable once the bots have been updated. Issue #26057
|
||||
io/secure_server_client_certificate_test: Skip
|
||||
io/socket_test: Pass, Timeout # Issue 27453
|
||||
|
||||
# This test sometimes hangs on Mac.
|
||||
io/raw_server_socket_cancel_test: Skip # Issue 28182
|
||||
io/raw_secure_server_socket_test: Pass, Crash # Issue 29524
|
||||
|
||||
[ ($runtime == vm || $runtime == flutter) && $system == linux ]
|
||||
# These tests have started timing out and issue 25649 has been filed to
|
||||
# investigate, skipping these tests temporarily to get the bots to be
|
||||
# green again.
|
||||
io/http_proxy_test: Skip
|
||||
io/secure_builtin_roots_test: Skip
|
||||
|
||||
# These tests might be slow on an opt counter threshold bot.
|
||||
# They also time out on the bot occasionally => flaky test issue 28046
|
||||
io/http_basic_test: Pass, Slow, Timeout # Issue 28046
|
||||
io/http_launch_test: Pass, Slow, Timeout # Issue 28046
|
||||
|
||||
[ $compiler == dart2analyzer ]
|
||||
issue14236_test: Skip # Analyzer can't handle Script snapshots.
|
||||
|
||||
# test issue https://code.google.com/p/dart/issues/detail?id=11518
|
||||
io/file_constructor_test: fail
|
||||
|
||||
# This is runtime test.
|
||||
io/process_exit_negative_test: Skip
|
||||
|
||||
io/http_parser_test: Pass, StaticWarning, CompileTimeError # Issue 28843
|
||||
io/http_headers_test: Pass, StaticWarning, CompileTimeError # Issue 28843
|
||||
io/http_cookie_date_test: Pass, StaticWarning, CompileTimeError # Issue 28843
|
||||
io/web_socket_protocol_processor_test: Pass, StaticWarning, CompileTimeError # Issue 28843
|
||||
|
||||
[ $compiler == dart2analyzer && $builder_tag == strong ]
|
||||
*: Skip # Issue 28649
|
||||
|
||||
[ $compiler == dart2js ]
|
||||
*: SkipByDesign
|
||||
|
||||
[ $runtime == vm && ($arch == arm || $arch == arm64) ]
|
||||
io/file_stream_test: Skip # Issue 26109
|
||||
io/file_typed_data_test: Skip # Issue 26109
|
||||
io/file_input_stream_test: Skip # Issue 26109
|
||||
|
||||
[ $runtime != vm || $arch == arm || $arch == arm64 || ($system == windows && $mode == debug) ]
|
||||
fragmentation_test: Skip # VM test uses too much memory for small systems.
|
||||
|
||||
[ $runtime != vm || $compiler != none ]
|
||||
script_snapshot_not_executed_test: SkipByDesign # Only makes sense running from source.
|
||||
|
||||
[ $hot_reload || $hot_reload_rollback ]
|
||||
script_snapshot_not_executed_test: SkipByDesign # False positive because child process doesn't execute Dart.
|
||||
|
||||
[ $arch == simarm || $arch == simarmv6 || $arch == simarmv5te ]
|
||||
out_of_memory_test: Skip # passes on Mac, crashes on Linux
|
||||
oom_error_stacktrace_test: Skip # Fails on Linux
|
||||
|
||||
[ ($arch == simarm || $arch == simdbc || $arch == simdbc64) && $mode == debug && $checked ]
|
||||
io/web_socket_test: Pass, Fail # Issue 26814
|
||||
|
||||
[ $compiler == dart2analyzer ]
|
||||
io/directory_invalid_arguments_test: StaticWarning
|
||||
io/process_invalid_arguments_test: StaticWarning
|
||||
io/raw_secure_server_socket_argument_test: StaticWarning
|
||||
io/secure_socket_argument_test: StaticWarning
|
||||
io/stdout_bad_argument_test: StaticWarning
|
||||
package/package1_test: StaticWarning
|
||||
package/package_test: StaticWarning
|
||||
package/scenarios/packages_dir_only/packages_dir_only_test: StaticWarning
|
||||
package/scenarios/packages_file_only/packages_file_only_test: StaticWarning
|
||||
package/scenarios/both_dir_and_file/prefers_packages_file_test: StaticWarning
|
||||
package/scenarios/packages_file_in_parent/sub/packages_file_in_parent_test: StaticWarning
|
||||
typed_data_test: StaticWarning
|
||||
typed_data_view_test: StaticWarning
|
||||
deferred_transitive_import_error_test: Skip # Contains intentional errors.
|
||||
|
||||
[ $compiler == dart2analyzer ]
|
||||
package/package1_test: CompileTimeError
|
||||
package/package_test: CompileTimeError
|
||||
package/package_isolate_test: CompileTimeError
|
||||
package/scenarios/packages_dir_only/packages_dir_only_test: CompileTimeError
|
||||
package/scenarios/packages_file_only/packages_file_only_test: CompileTimeError
|
||||
package/scenarios/both_dir_and_file/prefers_packages_file_test: CompileTimeError
|
||||
package/scenarios/packages_file_in_parent/sub/packages_file_in_parent_test: CompileTimeError
|
||||
package/scenarios/invalid/non_existent_packages_file_test: Crash, OK # Analyzer exits on invalid package config
|
||||
package/scenarios/invalid/invalid_utf8_test: Crash, OK # Analyzer exits on invalid package config
|
||||
package/scenarios/invalid/invalid_package_name_test: Crash, OK # Analyzer exits on invalid package config
|
||||
package/scenarios/invalid/same_package_twice_test: Crash, OK # Analyzer exits on invalid package config
|
||||
io/process_invalid_arguments_test: StaticWarning
|
||||
io/directory_invalid_arguments_test: StaticWarning
|
||||
|
||||
[ $system == windows ]
|
||||
verbose_gc_to_bmu_test: Skip
|
||||
io/process_sync_test: Pass, Timeout # Issue 24596
|
||||
io/sleep_test: Pass, Fail # Issue 25757
|
||||
io/http_server_early_client_close2_test: Pass, Crash # Issue 28197
|
||||
io/process_stdin_transform_unsubscribe_test: Pass, Timeout # Issue #28558
|
||||
|
||||
[ $system == windows && $compiler != dart2analyzer ]
|
||||
io/platform_resolved_executable_test/06: RuntimeError # Issue 23641
|
||||
io/skipping_dart2js_compilations_test: Fail # Issue 19551.
|
||||
io/socket_info_ipv6_test: RuntimeError # Issue 27876
|
||||
|
||||
[ $system == windows && $compiler == dart2analyzer ]
|
||||
package/package_isolate_test: Crash # Issue 28645
|
||||
package/scenarios/empty_packages_file/empty_packages_file_noimports_test: Crash # Issue 28645
|
||||
package/scenarios/empty_packages_file/empty_packages_file_option_test: Crash, Pass # Issue 28645
|
||||
package/scenarios/packages_file_strange_formatting/empty_lines_test: Crash # Issue 28645
|
||||
package/scenarios/packages_file_strange_formatting/empty_package_dir_test: Crash # Issue 28645
|
||||
package/scenarios/packages_file_strange_formatting/mixed_line_ends_test: Crash # Issue 28645
|
||||
package/scenarios/packages_option_only/packages_option_only_noimports_test: Crash # Issue 28645
|
||||
package/scenarios/packages_option_only/packages_option_only_test: Crash, CompileTimeError # Issue 28645
|
||||
|
||||
[ $compiler == dartk && $mode == debug ]
|
||||
io/file_lock_test: Slow, Pass
|
||||
|
||||
[ ($runtime == vm || $runtime == dart_precompiled) && $mode == debug && $builder_tag == asan ]
|
||||
io/file_lock_test: Skip # Timeout.
|
||||
io/test_runner_test: Skip # Timeout.
|
||||
io/http_client_stays_alive_test: Skip # Timeout.
|
||||
|
||||
[ $runtime == vm || $runtime == dart_precompiled || $runtime == flutter ]
|
||||
# Failures in secure networking while NSS is replaced with BoringSSL
|
||||
io/https_client_certificate_test: RuntimeError # Issue 24070
|
||||
io/secure_socket_renegotiate_test: RuntimeError
|
||||
io/secure_socket_bad_data_test: RuntimeError # An error in a secure connection just puts a READ_CLOSED on the stream, rather than signaling an error on the stream.
|
||||
|
||||
[ $arch == ia32 ]
|
||||
no_allow_absolute_addresses_test: SkipByDesign # Not supported.
|
||||
link_natives_lazily_test: SkipByDesign # Not supported.
|
||||
|
||||
[ $compiler == precompiler ]
|
||||
map_insert_remove_oom_test: Skip # Heap limit too low. Increasing iteration count to make a higher limit a meaningful test makes it too slow for simarm[64] bots.
|
||||
io/web_socket_test: Pass, RuntimeError # Issue 24674
|
||||
|
||||
[ $compiler == precompiler || $compiler == app_jit ]
|
||||
io/compile_all_test: Skip # Incompatible flag --compile_all
|
||||
|
||||
[ $compiler == app_jit ]
|
||||
io/stdout_bad_argument_test: Skip # Test exits and so can't generate snapshot.
|
||||
io/directory_list_sync_test: Skip # Snapshot path differs from script path.
|
||||
io/test_extension_test: Skip # Snapshot path differs from script path.
|
||||
io/test_extension_fail_test: Skip # Snapshot path differs from script path.
|
||||
io/platform_test: Skip # Snapshot path differs from script path.
|
||||
|
||||
[ $runtime == dart_precompiled ]
|
||||
# These tests attempt to spawn another script using the precompiled runtime.
|
||||
http_launch_test: Skip
|
||||
io/addlatexhash_test: Skip
|
||||
io/dart_std_io_pipe_test: Skip
|
||||
io/dart_std_io_pipe_test: Skip
|
||||
io/file_blocking_lock_test: Skip
|
||||
io/file_lock_test: Skip
|
||||
io/file_read_special_device_test: Skip
|
||||
io/http_client_stays_alive_test: Skip
|
||||
io/http_response_deadline_test: Skip
|
||||
io/http_server_close_response_after_error_test: Skip
|
||||
io/https_unauthorized_test: Skip
|
||||
io/named_pipe_script_test: Skip
|
||||
io/platform_resolved_executable_test: Skip
|
||||
io/print_sync_test: Skip
|
||||
io/process_check_arguments_test: Skip
|
||||
io/process_detached_test: Skip
|
||||
io/process_environment_test: Skip
|
||||
io/process_non_ascii_test: Skip
|
||||
io/process_run_output_test: Skip
|
||||
io/process_set_exit_code_test: Skip
|
||||
io/process_shell_test: Skip
|
||||
io/process_stderr_test: Skip
|
||||
io/process_stdin_transform_unsubscribe_test: Skip
|
||||
io/process_stdout_test: Skip
|
||||
io/process_sync_test: Skip
|
||||
io/raw_datagram_socket_test: Skip
|
||||
io/regress_7191_test: Skip
|
||||
io/regress_7679_test: Skip
|
||||
io/secure_unauthorized_test: Skip
|
||||
io/signals_test: Skip
|
||||
io/stdin_sync_test: Skip
|
||||
io/stdio_implicit_close_test: Skip
|
||||
io/stdio_nonblocking_test: Skip
|
||||
io/test_extension_fail_test: Skip
|
||||
io/test_extension_test: Skip
|
||||
io/windows_environment_test: Skip
|
||||
verbose_gc_to_bmu_test: Skip
|
||||
|
||||
io/platform_test: RuntimeError # Expects to be running from 'dart' instead of 'dart_precompiled_runtime'
|
||||
io/directory_list_sync_test: Timeout, Skip # Expects to find the test directory relative to the script.
|
||||
|
||||
[ $runtime == vm && $system == windows && $mode == release ]
|
||||
io/http_server_close_response_after_error_test: Pass, Timeout # Issue 28370: timeout.
|
||||
io/regress_7191_test: Pass, Timeout # Issue 28374: timeout.
|
||||
|
||||
[ $runtime == vm && $system == macos && $mode == release ]
|
||||
io/named_pipe_script_test: Pass, RuntimeError # Issue 28737
|
||||
|
||||
[ $system == macos && $builder_tag == swarming ]
|
||||
io/*: Skip # Issue 30618
|
||||
|
||||
[ $runtime == vm && $system == linux && $mode == release && $arch == ia32 && $builder_tag == asan ]
|
||||
io/socket_close_test: Pass, Timeout # Issue 28502: timeout.
|
||||
|
||||
[ $runtime == dart_precompiled ]
|
||||
io/skipping_dart2js_compilations_test: RuntimeError # Issue 30008
|
||||
|
||||
[ $compiler == app_jit ]
|
||||
assert_test: RuntimeError # Script name change?
|
||||
|
||||
[ $runtime == dart_precompiled || $mode == product ]
|
||||
assert_test: SkipByDesign # Requires checked mode.
|
||||
no_assert_test: SkipByDesign # Requires checked mode.
|
||||
io/code_collection_test: Skip # Incompatible flags
|
||||
|
||||
# Overriding these flags are not supported in product mode.
|
||||
[ $mode == product ]
|
||||
no_profiler_test: SkipByDesign
|
||||
no_support_coverage_test: SkipByDesign
|
||||
no_support_debugger_test: SkipByDesign
|
||||
no_support_disassembler_test: SkipByDesign
|
||||
no_support_il_printer_test: SkipByDesign
|
||||
no_support_service_test: SkipByDesign
|
||||
no_support_timeline_test: SkipByDesign
|
||||
io/stdio_implicit_close_test: Skip # SkipByDesign
|
||||
dart_developer_env_test: SkipByDesign
|
||||
verbose_gc_to_bmu_test: SkipByDesign # No verbose_gc in product mode
|
||||
|
||||
# Following tests are skipped on dart_app as package mapping is not supported.
|
||||
[ $runtime == dart_precompiled || $compiler == app_jit ]
|
||||
package/scenarios/packages_file_strange_formatting/mixed_line_ends_test: Skip
|
||||
package/scenarios/packages_file_strange_formatting/empty_lines_test: Skip
|
||||
package/scenarios/invalid/invalid_utf8_test: Skip
|
||||
package/scenarios/invalid/same_package_twice_test: Skip
|
||||
package/scenarios/invalid/non_existent_packages_file_test: Skip
|
||||
package/scenarios/empty_packages_file/empty_packages_file_noimports_test: Skip
|
||||
package/scenarios/packages_option_only/packages_option_only_noimports_test: Skip
|
||||
package/scenarios/packages_option_only/packages_option_only_test: Skip
|
||||
|
||||
[ $runtime == dart_precompiled && $mode == product ]
|
||||
dwarf_stack_trace_test: Pass, RuntimeError # Results will flake due to identical code folding
|
||||
|
||||
[ $arch == simdbc || $arch == simdbc64 ]
|
||||
# SIMDBC interpreter doesn't support lazy linking of natives.
|
||||
link_natives_lazily_test: SkipByDesign
|
||||
|
||||
# SIMDBC interpreter doesn't support --no_lazy_dispatchers
|
||||
no_lazy_dispatchers_test: SkipByDesign
|
||||
|
||||
io/secure_unauthorized_test: Pass, RuntimeError # Issue 28719
|
||||
|
||||
[ $system == android ]
|
||||
io/process_exit_test: RuntimeError # Issue 29578
|
||||
io/process_path_test: RuntimeError # Issue 26376
|
||||
io/file_test: RuntimeError # Issue 26376
|
||||
io/process_path_environment_test: RuntimeError # Issue 26376
|
||||
io/file_system_watcher_test: RuntimeError # Issue 26376
|
||||
io/resolve_symbolic_links_test: RuntimeError # Issue 26376
|
||||
io/file_stat_test: RuntimeError # Issue 26376
|
||||
io/raw_datagram_socket_test: RuntimeError # Issue 27638
|
||||
io/http_proxy_advanced_test: RuntimeError # Issue 27638
|
||||
io/regress_21160_test: RuntimeError # Issue 27638
|
||||
io/secure_multiple_client_server_test: RuntimeError # Issue 27638
|
||||
io/http_proxy_test: RuntimeError # Issue 27638
|
||||
io/secure_session_resume_test: RuntimeError # Issue 27638
|
||||
io/raw_secure_server_socket_test: RuntimeError # Issue 27638
|
||||
io/raw_secure_server_closing_test: RuntimeError # Issue 27638
|
||||
io/raw_secure_socket_pause_test: RuntimeError # Issue 27638
|
||||
io/https_server_test: RuntimeError # Issue 27638
|
||||
io/secure_server_client_certificate_test: RuntimeError # Issue 27638
|
||||
io/secure_socket_alpn_test: RuntimeError # Issue 27638
|
||||
io/secure_bad_certificate_test: RuntimeError # Issue 27638
|
||||
io/secure_server_socket_test: RuntimeError # Issue 27638
|
||||
io/secure_client_server_test: RuntimeError # Issue 27638
|
||||
io/socket_upgrade_to_secure_test: RuntimeError # Issue 27638
|
||||
io/secure_client_raw_server_test: RuntimeError # Issue 27638
|
||||
io/secure_socket_test: RuntimeError # Issue 27638
|
||||
io/raw_secure_socket_test: RuntimeError # Issue 27638
|
||||
io/https_bad_certificate_test: RuntimeError # Issue 27638
|
||||
io/secure_server_closing_test: RuntimeError # Issue 27638
|
||||
io/non_utf8_output_test: Skip # The Android command runner doesn't correctly handle non-UTF8 formatted output. https://github.com/dart-lang/sdk/issues/28872
|
||||
|
||||
[ $system == android && $runtime == dart_precompiled && $mode == release && $arch == arm]
|
||||
io/stdout_stderr_non_blocking_test: Pass, Timeout # Issue 28426
|
||||
|
||||
[ $runtime == vm || $runtime == dart_precompiled || $runtime == flutter ]
|
||||
deferred_transitive_import_error_test: Skip # Contains intentional errors.
|
||||
|
||||
[ $hot_reload || $hot_reload_rollback ]
|
||||
deferred_transitive_import_error_test: Crash # Uses deferred imports.
|
||||
package/*: SkipByDesign # Launches VMs in interesting ways.
|
||||
io/raw_datagram_read_all_test: Pass, Fail # Timing dependent.
|
||||
io/test_runner_test: Pass, Slow # Slow.
|
||||
io/skipping_dart2js_compilations_test: Pass, Slow # Slow.
|
||||
|
||||
[ $builder_tag == no_ipv6 ]
|
||||
io/raw_datagram_socket_test: SkipByDesign
|
||||
io/socket_source_address_test: SkipByDesign
|
||||
io/socket_bind_test: SkipByDesign
|
||||
io/http_loopback_test: SkipByDesign
|
||||
io/http_proxy_advanced_test: SkipByDesign
|
||||
io/http_ipv6_test: SkipByDesign
|
||||
io/socket_ipv6_test: SkipByDesign
|
||||
io/socket_info_ipv6_test: SkipByDesign
|
||||
|
||||
[ $builder_tag == asan ]
|
||||
io/process_detached_test: Pass, Slow
|
||||
io/named_pipe_script_test: RuntimeError
|
||||
|
||||
[ $compiler == dartk || $compiler == dartkp ]
|
||||
io/http_client_connect_test: Skip # Flaky.
|
||||
io/http_content_length_test: Skip # Flaky.
|
||||
io/http_proxy_test: Skip # Flaky.
|
||||
io/http_response_deadline_test: Skip # Flaky.
|
||||
io/http_reuse_server_port_test: Skip # Flaky.
|
||||
io/http_server_close_response_after_error_test: Skip # Flaky.
|
||||
io/http_shutdown_test: Skip # Flaky.
|
||||
io/raw_datagram_socket_test: Skip # Flaky.
|
||||
io/raw_secure_server_closing_test: Skip # Flaky
|
||||
io/raw_secure_server_closing_test: Skip # Flaky.
|
||||
io/secure_multiple_client_server_test: Skip # Flaky.
|
||||
io/secure_server_closing_test: Skip # Flaky.
|
||||
io/secure_server_socket_test: Skip # Flaky.
|
||||
io/web_socket_error_test: Skip # Flaky
|
||||
io/web_socket_ping_test: Skip # Flaky.
|
||||
io/web_socket_test: Skip # Flaky.
|
||||
no_support_debugger_test: Skip # kernel-service snapshot not compatible with flag disabled
|
||||
|
||||
regress_29350_test: MissingCompileTimeError
|
||||
assert_test: RuntimeError
|
||||
io/compile_all_test: Crash
|
||||
map_insert_remove_oom_test: Crash
|
||||
package/package1_test: CompileTimeError
|
||||
package/package_test: CompileTimeError
|
||||
package/scenarios/invalid/invalid_utf8_test: CompileTimeError
|
||||
package/scenarios/invalid/non_existent_packages_file_test: CompileTimeError
|
||||
package/scenarios/invalid/same_package_twice_test: CompileTimeError
|
||||
|
||||
[ $compiler == dartkp ]
|
||||
causal_async_stack_test: Fail
|
||||
dwarf_stack_trace_test: RuntimeError
|
||||
|
||||
[ $runtime == flutter ]
|
||||
io/raw_datagram_socket_test: Crash # Flutter Issue 9115
|
||||
verbose_gc_to_bmu_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_check_arguments_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_working_directory_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_run_output_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_run_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_sync_test: RuntimeError # Flutter Issue 9115
|
||||
io/test_extension_test: RuntimeError # Flutter Issue 9115
|
||||
io/test_extension_fail_test: RuntimeError # Flutter Issue 9115
|
||||
oom_error_stacktrace_test: RuntimeError # Flutter Issue 9115
|
||||
io/raw_socket_cross_process_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_exit_test: RuntimeError # Flutter Issue 9115
|
||||
io/uri_platform_test: RuntimeError # Flutter Issue 9115
|
||||
io/dart_std_io_pipe_test: RuntimeError # Flutter Issue 9115
|
||||
io/platform_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_stderr_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_segfault_test: RuntimeError # Flutter Issue 9115
|
||||
io/addlatexhash_test: RuntimeError # Flutter Issue 9115
|
||||
io/http_server_response_test: Skip # Flaky # Flutter Issue 9115
|
||||
io/process_stdout_test: RuntimeError # Flutter Issue 9115
|
||||
io/http_cross_process_test: RuntimeError # Flutter Issue 9115
|
||||
io/process_set_exit_code_test: RuntimeError # Flutter Issue 9115
|
||||
io/stdin_sync_test: RuntimeError # Flutter Issue 9115
|
||||
io/raw_server_socket_cancel_test: RuntimeError # Flutter Issue 9115
|
||||
io/socket_cross_process_test: RuntimeError # Flutter Issue 9115
|
||||
io/arguments_test: RuntimeError # Flutter Issue 9115
|
||||
io/code_collection_test: RuntimeError # Flutter Issue 9115
|
||||
io/http_client_stays_alive_test: RuntimeError # Flutter Issue 9115
|
||||
io/locale_name_test: RuntimeError # Flutter Issue 9115
|
||||
out_of_memory_test: RuntimeError # Flutter Issue 9115
|
||||
|
||||
io/process_pid_test: Skip # Timeout Flutter Issue 9115
|
||||
io/socket_info_ipv4_test: Skip # Timeout Flutter Issue 9115
|
||||
io/file_test: Skip # Timeout Flutter Issue 9115
|
||||
io/named_pipe_script_test: Skip # Timeout Flutter Issue 9115
|
||||
io/print_sync_test: Skip # Timeout Flutter Issue 9115
|
||||
io/file_uri_test: Skip # Timeout Flutter Issue 9115
|
||||
io/file_lock_test: Skip # Timeout Flutter Issue 9115
|
||||
io/socket_info_ipv6_test: Skip # Timeout Flutter Issue 9115
|
||||
io/stdio_implicit_close_test: Skip # Timeout Flutter Issue 9115
|
||||
io/process_environment_test: Skip # Timeout Flutter Issue 9115
|
||||
io/secure_socket_renegotiate_test: Skip # Timeout Flutter Issue 9115
|
||||
io/process_kill_test: Skip # Timeout Flutter Issue 9115
|
||||
io/directory_uri_test: Skip # Timeout Flutter Issue 9115
|
||||
io/raw_socket_test: Skip # Timeout Flutter Issue 9115
|
||||
io/http_connection_close_test: Skip # Timeout Flutter Issue 9115
|
||||
io/https_unauthorized_test: Skip # Timeout Flutter Issue 9115
|
||||
io/file_system_watcher_test: Skip # Timeout Flutter Issue 9115
|
||||
io/secure_unauthorized_test: Skip # Timeout Flutter Issue 9115
|
||||
io/secure_socket_bad_data_test: Skip # Timeout Flutter Issue 9115
|
||||
io/link_uri_test: Skip # Timeout Flutter Issue 9115
|
||||
io/file_stream_test: Skip # Timeout Flutter Issue 9115
|
||||
io/regress_7191_test: Skip # Timeout Flutter Issue 9115
|
||||
io/http_server_close_response_after_error_test: Skip # Flutter Issue 9115Timeout
|
||||
io/signals_test: Skip # Timeout Flutter Issue 9115
|
||||
io/process_non_ascii_test: Skip # Timeout Flutter Issue 9115
|
||||
io/https_client_certificate_test: Skip # Timeout Flutter Issue 9115
|
||||
io/socket_finalizer_test: Skip # Timeout Flutter Issue 9115
|
||||
io/process_shell_test: Skip # Timeout Flutter Issue 9115
|
||||
io/file_blocking_lock_test: Skip # Timeout Flutter Issue 9115
|
||||
io/socket_invalid_arguments_test: Skip # Timeout Flutter Issue 9115
|
||||
io/process_detached_test: Skip # Timeout Flutter Issue 9115
|
||||
io/platform_resolved_executable_test/00: Skip # Timeout Flutter Issue 9115
|
||||
io/platform_resolved_executable_test/01: Skip # Timeout Flutter Issue 9115
|
||||
io/platform_resolved_executable_test/02: Skip # Timeout Flutter Issue 9115
|
||||
io/platform_resolved_executable_test/03: Skip # Timeout Flutter Issue 9115
|
||||
io/platform_resolved_executable_test/04: Skip # Timeout Flutter Issue 9115
|
||||
io/platform_resolved_executable_test/05: Skip # Timeout Flutter Issue 9115
|
||||
http_launch_test: Skip # Timeout Flutter Issue 9115
|
||||
dart_developer_disabled_env_test: RuntimeError # Flutter Issue 9115
|
||||
|
||||
|
||||
package/scenarios/packages_file_in_parent/sub/packages_file_in_parent_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/package1_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/scenarios/packages_option_only/packages_option_only_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/scenarios/invalid/invalid_package_name_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/scenarios/invalid/same_package_twice_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/scenarios/packages_file_only/packages_file_only_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/scenarios/packages_dir_only/packages_dir_only_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/scenarios/both_dir_and_file/prefers_packages_file_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
package/package_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
#unboxed_int_converter_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
io/process_run_output_test: Fail # Unable to parse package files Flutter Issue 9115
|
||||
|
||||
io/dependency_graph_test: CompileTimeError # Imports dart:mirrors
|
||||
io/skipping_dart2js_compilations_test: CompileTimeError # Uses mirrors
|
||||
io/test_harness_analyzer_test: CompileTimeError # Uses mirrors
|
||||
io/test_runner_test: CompileTimeError # Uses mirrors
|
||||
|
|
70
tests/standalone_2/io/certificates/README
Normal file
70
tests/standalone_2/io/certificates/README
Normal file
|
@ -0,0 +1,70 @@
|
|||
This directory, tests/standalone/io/certificates, contains the
|
||||
X509 TLS certificates and private keys needed to run tests of Dart's
|
||||
secure networking code. The SecureSocket and SecureServer classes
|
||||
are tested by making TLS (formerly called SSL) connections, secured
|
||||
by certificates from a self-signed test root authority.
|
||||
|
||||
The certificates are created by running ../create_sample_certificates.sh
|
||||
in a bash or sh shell, with the openssl tools installed. Run the script
|
||||
twice to create the untrusted_* files.
|
||||
|
||||
PEM files:
|
||||
|
||||
server_chain.pem:
|
||||
Contains the chain of certificates, from the self-signed
|
||||
test certificate authority, through the intermediate CA, to the server
|
||||
certificate, used on the server side of a test connection.
|
||||
|
||||
server_key.pem:
|
||||
Contains the private key for the server certificate
|
||||
|
||||
trusted_certs.pem:
|
||||
Contains the self-signed certificate of the test certificate authority.
|
||||
This certificate is set as "trusted" by the client side of the connection
|
||||
in its SecurityContext object, so that a verified TLS connection to the
|
||||
server can be made.
|
||||
|
||||
untrusted_server_chain.pem:
|
||||
Contains a chain of certificates, from a different self-signed
|
||||
test certificate authority, through an intermediate CA, to a server
|
||||
certificate, used on the server side of a test connection that is intended
|
||||
to fail because the client does not accept this certificate authority
|
||||
|
||||
untrusted_server_key.pem:
|
||||
Contains the private key for the untrusted server certificate
|
||||
in untrusted_server_chain.pem
|
||||
|
||||
*_malformed.pem:
|
||||
Truncated PEM formatted certificates used to test error handling.
|
||||
|
||||
PKCS12 files:
|
||||
|
||||
server_key.12:
|
||||
Created with:
|
||||
$ openssl pkcs12 -export -inkey server_key.pem -out server_key.p12 -nocerts
|
||||
with password 'dartdart'
|
||||
|
||||
server_chain.p12:
|
||||
Created with:
|
||||
$ openssl pkcs12 -export -in server_chain.pem -out server_chain.p12 -nokeys
|
||||
with password 'dartdart'
|
||||
|
||||
client1_key.p12:
|
||||
Created with:
|
||||
$ openssl pkcs12 -export -inkey client1_key.pem -out client1_key.p12 -nocerts
|
||||
with password 'dartdart'
|
||||
|
||||
client1.p12:
|
||||
Created with:
|
||||
$ openssl pkcs12 -export -in client1.pem -out client1.p12 -nokeys
|
||||
with password 'dartdart'
|
||||
|
||||
trusted_certs.p12:
|
||||
Created with:
|
||||
$ openssl pkcs12 -export -in trusted_certs.pem -out trusted_certs.p12 -nokeys
|
||||
with password 'dartdart'
|
||||
|
||||
client_authority.p12:
|
||||
Created with:
|
||||
$ openssl pkcs12 -export -in client_authority.pem -out client_authority.p12 -nokeys
|
||||
with password 'dartdart'
|
BIN
tests/standalone_2/io/certificates/client1.p12
Normal file
BIN
tests/standalone_2/io/certificates/client1.p12
Normal file
Binary file not shown.
19
tests/standalone_2/io/certificates/client1.pem
Normal file
19
tests/standalone_2/io/certificates/client1.pem
Normal file
|
@ -0,0 +1,19 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDBzCCAe+gAwIBAgIBAjANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDEw9jbGll
|
||||
bnRhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1WjAQMQ4w
|
||||
DAYDVQQDDAV1c2VyMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALlg
|
||||
zRZlohMtAg44+kPk04G/gIkdeyh7toUA3nR/2sS11j8EutHewezvMV8YyxBxQn8f
|
||||
8x8FkDbrE/6GYg2Dsu6TxrXIFre9Lt5jLlJi/6qEaVtXNTdP3vKO87FJ7YVLCeYe
|
||||
MxuTCdHloeUICP5x3GJz3AVdcg/S9qRWrpm8LdRdFk66l8vD+aDf+Oqe+mLVtAr6
|
||||
kqkdq1nUJOkRBp+zFMmB3Zfm28aYew6BmFQSscxemZyJxiv4dB+EDr821kEjgGBY
|
||||
IQGpdADrfh3j9JAzEr30o6sjfr6QWKHG6ZD7xhSl7rIxmx1yoKoJh8vLpcQfdv79
|
||||
7VZZT5N7xjz0xkjqTA0CAwEAAaNiMGAwCQYDVR0TBAIwADAdBgNVHQ4EFgQUMpcX
|
||||
0o3lu3BTmaKwCfIJMO5aMs4wHwYDVR0jBBgwFoAUtyLBueMoMi7TborRvM7CnwOi
|
||||
SQ4wEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAAB1rNFg
|
||||
wdK79r7WO0OvE90uvtFf8sO2kqwW/7JIP/kcnIwIIkNiffUEfLfVr7aecK0rPer4
|
||||
DDZFAciuaOcts7dTxXRU+la1ZEPaEyx1mHaC6HJbgFYC9cG30L6GJGkZkIGOCTn+
|
||||
/yPxTM//dSc7YACc90GNTeUFVnAw6vskH91Ph4VYbdYxt7L1d1pzvBeun6Qi0eJq
|
||||
rkWQ2DOO9h9E6Rnt8Jea3w7WzX5P8pBjm74bv38YBKefawPeiiXck2Q/lUehLePV
|
||||
U1MRdy1QWC924+p6cXbR1GEhg0FZyvS/9WdpLMGIat/j/98juN6qyAbw7XXhlB1g
|
||||
fBHlfXbx+KMZAuY=
|
||||
-----END CERTIFICATE-----
|
BIN
tests/standalone_2/io/certificates/client1_key.p12
Normal file
BIN
tests/standalone_2/io/certificates/client1_key.p12
Normal file
Binary file not shown.
29
tests/standalone_2/io/certificates/client1_key.pem
Normal file
29
tests/standalone_2/io/certificates/client1_key.pem
Normal file
|
@ -0,0 +1,29 @@
|
|||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIE4jAcBgoqhkiG9w0BDAEBMA4ECF4ZB27y60SWAgIIAASCBMCEL3ZCzfC0q+m+
|
||||
B8gM9jQe1JFRD5reAuwK6+3speBS4KE+wjbcyQq09/5UoQu3Dci1WG1nKLB1u0Bk
|
||||
w9NuRahWCpvVLzz/GQ6Psesixq3V69zD3N6iMl/XQKymQBwGK51xIkeJO+6Skh2d
|
||||
+qoyBHINTlKY9+548Zgqu+Z3mI3pGmdhd7hCiamiffDwCLEqRxbXdZdLpC9GpAP5
|
||||
HOqXHzN2aZbAGHb1GkHVxskSNzAwlEEZhh4Ibe6o7U65hoL9borewT+gj6sQohI5
|
||||
/LHL0P2bVvtRZiwBVPUX8HZWuVYIFb6GEGTTqOofNhNHvHaKUlD8Uxi5/h/Xi8fq
|
||||
xpdkjIn7VXj9e+I3TkfiphDtk0+Q+f+UkuPyuzU1PafinPfRK1J6gk+ZqAQHW/sp
|
||||
g6GVr2r4PkOrBPsA6jmCnQhs2C4MlZyR2p65qjVutdkKU5NgftW+giK9shgglcza
|
||||
38RF8i01THOnD3j+2teM/t/Ziqb2PGWv/bmvhcYqt1aG186Pe3bBCxhh/L7bqNKD
|
||||
q7sxDmaDE2pTkfyvh07udarmBQc5gvfXYqwghbqP/n7wizqjeEJgAwwHyi8LLsFV
|
||||
XreBQ/8Z2gQwXurrh5WD+7KSgvgopW/oVC8a3++8Hmf5Nkj27lACzoDWTG2/Swah
|
||||
O1MmdtPyy/KCbf5ujt2BlXM9D206Rsr6hoO9UZ1s1ohRdJReVGc4NZ4XrVWc4TKT
|
||||
gUAFTaHIKgFe/DgLaQn8L8Pqb8B/JfoSgQ74r69S434Kc+EDKui8wnkgso5bqrr1
|
||||
M07H9Xo+OtG1D6rma2EUlpoU06CAIcyqNx5fHJ3xfk9GHScQi4U6vEDCAQTNTS65
|
||||
I5AOHthZ2kZzfXvP6TF39S5D37NrV7/WJu7ZFaJx3bUGwnS2HYTwjFPABHpVLMwJ
|
||||
nBylVJs+h7bCZdBNCWgTytcn1mYMCvXVmrW8VTwBRjUQsy4rgE2wjpZuIM9rx+gZ
|
||||
HtNvy5t2RlOSqVKapyvV0ll7qbT1lwGIePxjttiWmNbgbwRBQzjv6FZ1Yo331Fl4
|
||||
qgXGcvZWgsgQFPXviKmDx+9KJ2oL35cLnDcMCRN7lLPdAhk8J/XrUq/iIYXNxud6
|
||||
f9mfVOsd0LT030je/N25IdEoPimTnps/INGGNug+FuJ3dCeIQGwB7uQB5ozoHL5h
|
||||
hzdQYq5+FWksuHPCOL1YLRJux9sH6OYxlXy2oigLtA05EHhq83Wwb2oTW6boo+rs
|
||||
gKqzc7OtFgYDsV8R1raoqlzAv3GNgkzyuHTSUakDdnJYmfcoOuK+Ch+MjVeZW5bS
|
||||
Ir7uqugUqqI/AiO/eHkvoGpQs0c67ao0qPR7ZQna/1FBj1O8J/dI4JBUtPvDa0tW
|
||||
7U+Ja/twJWri+Nn6/iEEWEuM/xx/xFmxrTb4WYza1ysrCls5l6POjQu2n6dT52+o
|
||||
cobwltkJmSNoIT2SYRuvEfgGlwyzY5p5B8U24HIAkNJIkO7hc9oD1mbq+K526HNl
|
||||
h6TG7RGUOffXIYuykrMmCTRRnv3bXmjTgsvWhVFujpCSQf9PqkQpv+KQPeFmy12h
|
||||
TA1QNtdVOZlh2GLEUgZuJVytyEz4m+3BfvBql5K9rlAUSQqsLJDKVxsmBDl132o3
|
||||
yy9JR7iC
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
17
tests/standalone_2/io/certificates/client1_key_malformed.pem
Normal file
17
tests/standalone_2/io/certificates/client1_key_malformed.pem
Normal file
|
@ -0,0 +1,17 @@
|
|||
MIIE4jAcBgoqhkiG9w0BDAEBMA4ECF4ZB27y60SWAgIIAASCBMCEL3ZCzfC0q+m+
|
||||
B8gM9jQe1JFRD5reAuwK6+3speBS4KE+wjbcyQq09/5UoQu3Dci1WG1nKLB1u0Bk
|
||||
w9NuRahWCpvVLzz/GQ6Psesixq3V69zD3N6iMl/XQKymQBwGK51xIkeJO+6Skh2d
|
||||
+qoyBHINTlKY9+548Zgqu+Z3mI3pGmdhd7hCiamiffDwCLEqRxbXdZdLpC9GpAP5
|
||||
HOqXHzN2aZbAGHb1GkHVxskSNzAwlEEZhh4Ibe6o7U65hoL9borewT+gj6sQohI5
|
||||
/LHL0P2bVvtRZiwBVPUX8HZWuVYIFb6GEGTTqOofNhNHvHaKUlD8Uxi5/h/Xi8fq
|
||||
xpdkjIn7VXj9e+I3TkfiphDtk0+Q+f+UkuPyuzU1PafinPfRK1J6gk+ZqAQHW/sp
|
||||
g6GVr2r4PkOrBPsA6jmCnQhs2C4MlZyR2p65qjVutdkKU5NgftW+giK9shgglcza
|
||||
38RF8i01THOnD3j+2teM/t/Ziqb2PGWv/bmvhcYqt1aG186Pe3bBCxhh/L7bqNKD
|
||||
q7sxDmaDE2pTkfyvh07udarmBQc5gvfXYqwghbqP/n7wizqjeEJgAwwHyi8LLsFV
|
||||
XreBQ/8Z2gQwXurrh5WD+7KSgvgopW/oVC8a3++8Hmf5Nkj27lACzoDWTG2/Swah
|
||||
O1MmdtPyy/KCbf5ujt2BlXM9D206Rsr6hoO9UZ1s1ohRdJReVGc4NZ4XrVWc4TKT
|
||||
gUAFTaHIKgFe/DgLaQn8L8Pqb8B/JfoSgQ74r69S434Kc+EDKui8wnkgso5bqrr1
|
||||
M07H9Xo+OtG1D6rma2EUlpoU06CAIcyqNx5fHJ3xfk9GHScQi4U6vEDCAQTNTS65
|
||||
I5AOHthZ2kZzfXvP6TF39S5D37NrV7/WJu7ZFaJx3bUGwnS2HYTwjFPABHpVLMwJ
|
||||
nBylVJs+h7bCZdBNCWgTytcn1mYMCvXVmrW8VTwBRjUQsy4rgE2wjpZuIM9rx+gZ
|
||||
HtNvy5t2RlOSqVKapyvV0ll7qbT1lwGIePxjttiWmNbgbwRBQzjv6FZ1Yo331Fl4
|
19
tests/standalone_2/io/certificates/client2.pem
Normal file
19
tests/standalone_2/io/certificates/client2.pem
Normal file
|
@ -0,0 +1,19 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDBzCCAe+gAwIBAgIBAzANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDEw9jbGll
|
||||
bnRhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1WjAQMQ4w
|
||||
DAYDVQQDDAV1c2VyMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMay
|
||||
a0BYpNJHlwcNz6TyX+D6dKnqxUfdHQDgW9/5Hl4RiHDKAH+2iVYEsedksOmxNDlV
|
||||
HqZg4fBsyPVRzeGqia7nCsN3KlMbaqZgNI3ynvvMFIJkb3e/ZJtodg+cYzqnOu2F
|
||||
G3LijzRJG363aavTnjLdFumLnsOtSDdYnjRM43eeE3X2ajAiKkE9r6b6/wt8Ki5T
|
||||
GVIm9kG674iCloawK6dgCBA1dDPsKmzhcFoAl5UMpQSvd1OuW034qryE+RzQ0RCe
|
||||
G5u2leVgiuoq2rpmPL6fA0BHsyJ3wP1Gs74i+NhZdhiBhv+E89sfKaJOPpmDBW7b
|
||||
3jCpEmgRSm5h5SDm8KsCAwEAAaNiMGAwCQYDVR0TBAIwADAdBgNVHQ4EFgQUj0t8
|
||||
BdHrTqd7aKIV4+OLWvT6WX4wHwYDVR0jBBgwFoAUtyLBueMoMi7TborRvM7CnwOi
|
||||
SQ4wEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBABQ4PKRG
|
||||
VJYhWtktqpilP+C8CXsMArsqkEdMwHgQi8Xv3WVvXZpiLZHvO0To9J3+dgD2sOys
|
||||
MphZBXMJuOfX/+3IGerxsBxVj7Pnx37nn83g6PfCvGgVQQw7cGUjn5/Dw6apH2HH
|
||||
eO3yG+fgYeMNXyKt1KVWYeIToZfXUFvm+oMbWxxdpcctsKLRgCRvf1+r5EK9xE8+
|
||||
jYYk3S3pXvsk3qwWJz3pjg6zR3IbakkEuhE1Gl0Wrf4zZ9DOB8rd00/xirAuuYwm
|
||||
aIZ3KcFCTgVdGtB41q03D31xWNZPODCxAEADiICNE+3cuUMCi3wwBeCrybXSLhj/
|
||||
6St8K4NBvg+xL/w=
|
||||
-----END CERTIFICATE-----
|
29
tests/standalone_2/io/certificates/client2_key.pem
Normal file
29
tests/standalone_2/io/certificates/client2_key.pem
Normal file
|
@ -0,0 +1,29 @@
|
|||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIE5DAcBgoqhkiG9w0BDAEBMA4ECC/vc3ONj4KfAgIIAASCBMI1liT+B00kYYj+
|
||||
VRcEHQVrWsvD648OCd6BNQ9gKTYL5767lHUN0iG2JAdTHTKJy7XeEVVdPweU58jb
|
||||
HnS1yWbs0IuUFkCGy9wH3Lb6SkZtEScoAmzsNRdSY3WwmNhUG/yHrLITKM1SGkg3
|
||||
nf3ywIJYwO3YH22InVK0puVT/y943F1GXZSvklG/TGawR0uIyNuZOl0rg+5bsCaf
|
||||
1VSCWvt/Czgqm9Pc+Iz2PAKwyyjmvqRMBCtKvJTGNEPB63eDyHWQTtvQe0un06AF
|
||||
lvB7JYWaTXiwccSww2BuqTdJdBYKWxzPbdBfcqUT5Q9/LE0JhwvfZY/oDeJFP0HC
|
||||
HVBajuESZPJgb06xcsiX1qmk/iqAjZVZQ/CQ9K08qXem7YRFxJCy90wjLu3abjzQ
|
||||
Nvq0VsI8a8vlODQlr/Z5iXSYEKMYvUwh5Y9e8fc0BOOc1QzOYV2vxy28OVHmigOn
|
||||
tVHdj/FXK6N97QgtFzVUTjisO3YFygI2wybrz1BEys/vwqfCBiT+/hu+ur/lCrkn
|
||||
E2S6I967TyTvaxn+WCo9EW2Rb66XdI7tL09AkV2VZqJN4PTyis9YYgkr2uKjj4qX
|
||||
ySAQp/XHGEF1mmvjeptKTb2CMut0vcP+nl1bsUUXpSiKYGQ2BBcqgTcEFUEd75ms
|
||||
kcPMOuHdioaYh72nCRVzsRoDTDGF08NMTndW5PC8RpFsNS0vx8dq/A3VHAvJa2Rc
|
||||
9lP939FAU/Ck9b3NxH6hUgfDEFHQ61oW2Inpu4s3eRoClkgyf+aQEZZI7GTiNICm
|
||||
xqHosZ+hLe2mYoGk6xl1AruMk7kGeebRaPxzvS0UKfftOQDahFcDp8iEtLAcM1nx
|
||||
8Pdu4csyWFk+eBsTT6sPur2ZkD2LO0gLjR+N2nZNTqEJYy7n1jyV7M/JZBfh0fGi
|
||||
VX+sb+urTBAlDszX6b1LV7M78MDs6QwziDsrytjuClOWN47wzYbYYnSZZnDtTR+B
|
||||
CDHyK5wa8gNs4A+643HvD6sJz6zALOu2UI/9SrvuyYPltCwCUmWJ3A2XxoBmdJ/e
|
||||
yHEj/VdsNi6TtQ5qpBWqm43LpF0WAKNgksGnbFjOc/0QsUVk0txB9D6/oC9HyCd8
|
||||
u9nR8vLUC7l1dtYL0CwpocqU67qzVoRxrkkyCE4iblusKjr1ZlfstHDS0tPELodo
|
||||
8RroSs4vKXV9dzhzLQyqp6PzzdB7y/5Bpn0grxXrwln6/shoSR462h2CB4z9chGA
|
||||
Vdsp+KE8LDogIwZDT6iVVrpaBQDLoSxmX+E2IKRCUcj/l+gepEPyHbhOAn8/NxGX
|
||||
h16v89aDMtnyWqUcc/Gm2/Qep3o7goRfodyoyWvwy8nq9Lgf/wJIfEGn0lEeR0I/
|
||||
/Om/UAiId1o47C3LsGMm+qO+FcWesLA67eMQnp1WYoWpnanb3q4t8PWATzAlW05n
|
||||
cA59dYjutUmKJEjrh595AptMLXn6RM1GzA7x53+uAKvXaI+aR8wrtujiJLg9DwY2
|
||||
+f4ehwfwNptBxzZX97a7/3lGZ5U7BgDeJhNo9T02VQTvXxB29H6J/v6XYyPCKpuM
|
||||
upPhiHzrs9UyMvINfDnd/fJ58qr6TvEuBi0QxMMmOCfccYlj6Q5Bfqp+iuST0igg
|
||||
SLmBml+LkIM=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
BIN
tests/standalone_2/io/certificates/client_authority.p12
Normal file
BIN
tests/standalone_2/io/certificates/client_authority.p12
Normal file
Binary file not shown.
19
tests/standalone_2/io/certificates/client_authority.pem
Normal file
19
tests/standalone_2/io/certificates/client_authority.pem
Normal file
|
@ -0,0 +1,19 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDKjCCAhKgAwIBAgIBATANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDEw9jbGll
|
||||
bnRhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1WjAaMRgw
|
||||
FgYDVQQDEw9jbGllbnRhdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQCi6wJAs6nppNmTZ3e/wE9l0pAmkMtDONwB9o115XXTG3rmSKfZOxa8
|
||||
TFjSn818Pr1OYb9fPdI1Y6x4WY9PELUtQyEBlNcKjwg96vhrP4p2DhqbWsI5nASH
|
||||
DSjJsM75bQ7D7qHYzriuAl0Fk1C4LcodRj+5wmErMtvGJG0x06qFbxCCMAJ2kC+h
|
||||
SneTN955/YHSXADgxjFlt3s1T0QPnqrr+G7Ro6PrVKLPBulglq7wAeTwrGkPRUt0
|
||||
3lDGOSi6i97NbpiXwrGp5XiLUtVCiID6Ro0xKWH4sjJ4JnVjIUG8CQWERc6sFDJM
|
||||
4adgFQJagkTUoxWtDGL58+WcbcJa73XJAgMBAAGjezB5MBIGA1UdEwEB/wQIMAYB
|
||||
Af8CAQAwHQYDVR0OBBYEFLciwbnjKDIu026K0bzOwp8DokkOMB8GA1UdIwQYMBaA
|
||||
FLciwbnjKDIu026K0bzOwp8DokkOMA4GA1UdDwEB/wQEAwICBDATBgNVHSUEDDAK
|
||||
BggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAh8rryWFoGjFdm0i4FLRktF8B
|
||||
aUqVCCpFVHIYlFcsQstznIb01X2Zq5nfSfrFxbr5STVGzGJ0HGDuFpicT8+qMnJX
|
||||
dou5AuaqubIDWeKL+oAgvI71Nt1gsesixqzFQAoCTRgUjrSGpY2fL7rElV0Ndy9b
|
||||
YepVouktP1/GULc8XbIG9ZLx70Id7YTyrITDgbH3hSnbjmmZSr9RKyKas4MXN0s8
|
||||
oKGHEgAx7KyNQRppjydz3bDeH/jVbM4W98vwL6rjKUJlOlo0Ru+3+oioFHqLMSvN
|
||||
w4f5rQEiuF260h7y8KKxRxQ8rw188gsBapZr4Rcp+y8gdQvlzJONtv3d1dap5A==
|
||||
-----END CERTIFICATE-----
|
|
@ -0,0 +1,8 @@
|
|||
MIIDKjCCAhKgAwIBAgIBATANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDEw9jbGll
|
||||
bnRhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1WjAaMRgw
|
||||
FgYDVQQDEw9jbGllbnRhdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQCi6wJAs6nppNmTZ3e/wE9l0pAmkMtDONwB9o115XXTG3rmSKfZOxa8
|
||||
TFjSn818Pr1OYb9fPdI1Y6x4WY9PELUtQyEBlNcKjwg96vhrP4p2DhqbWsI5nASH
|
||||
DSjJsM75bQ7D7qHYzriuAl0Fk1C4LcodRj+5wmErMtvGJG0x06qFbxCCMAJ2kC+h
|
||||
SneTN955/YHSXADgxjFlt3s1T0QPnqrr+G7Ro6PrVKLPBulglq7wAeTwrGkPRUt0
|
||||
3lDGOSi6i97NbpiXwrGp5XiLUtVCiID6Ro0xKWH4sjJ4JnVjIUG8CQWERc6sFDJM
|
BIN
tests/standalone_2/io/certificates/server_chain.p12
Normal file
BIN
tests/standalone_2/io/certificates/server_chain.p12
Normal file
Binary file not shown.
59
tests/standalone_2/io/certificates/server_chain.pem
Normal file
59
tests/standalone_2/io/certificates/server_chain.pem
Normal file
|
@ -0,0 +1,59 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDZDCCAkygAwIBAgIBATANBgkqhkiG9w0BAQsFADAgMR4wHAYDVQQDDBVpbnRl
|
||||
cm1lZGlhdGVhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1
|
||||
WjAUMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQCkg/Qr8RQeLTOSgCkyiEX2ztgkgscX8hKGHEHdvlkmVK3JVEIIwkvu
|
||||
/Y9LtHZUia3nPAgqEEbexzTENZjSCcC0V6I2XW/e5tIE3rO0KLZyhtZhN/2SfJ6p
|
||||
KbOh0HLr1VtkKJGp1tzUmHW/aZI32pK60ZJ/N917NLPCJpCaL8+wHo3+w3oNqln6
|
||||
oJsfgxy9SUM8Bsc9WMYKMUdqLO1QKs1A5YwqZuO7Mwj+4LY2QDixC7Ua7V9YAPo2
|
||||
1SBeLvMCHbYxSPCuxcZ/kDkgax/DF9u7aZnGhMImkwBka0OQFvpfjKtTIuoobTpe
|
||||
PAG7MQYXk4RjnjdyEX/9XAQzvNo1CDObAgMBAAGjgbQwgbEwPAYDVR0RBDUwM4IJ
|
||||
bG9jYWxob3N0ggkxMjcuMC4wLjGCAzo6MYcEfwAAAYcQAAAAAAAAAAAAAAAAAAAA
|
||||
ATAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSvhJo6taTggJQBukEvMo/PDk8tKTAf
|
||||
BgNVHSMEGDAWgBS98L4T5RaIToE3DkBRsoeWPil0eDAOBgNVHQ8BAf8EBAMCA6gw
|
||||
EwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBAHLOt0mL2S4A
|
||||
B7vN7KsfQeGlVgZUVlEjem6kqBh4fIzl4CsQuOO8oJ0FlO1z5JAIo98hZinymJx1
|
||||
phBVpyGIKakT/etMH0op5evLe9dD36VA3IM/FEv5ibk35iGnPokiJXIAcdHd1zam
|
||||
YaTHRAnZET5S03+7BgRTKoRuszhbvuFz/vKXaIAnVNOF4Gf2NUJ/Ax7ssJtRkN+5
|
||||
UVxe8TZVxzgiRv1uF6NTr+J8PDepkHCbJ6zEQNudcFKAuC56DN1vUe06gRDrNbVq
|
||||
2JHEh4pRfMpdsPCrS5YHBjVq/XHtFHgwDR6g0WTwSUJvDeM4OPQY5f61FB0JbFza
|
||||
PkLkXmoIod8=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDLjCCAhagAwIBAgIBAjANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAyNzEwMjYzNVoXDTI1MTAyNDEwMjYzNVowIDEeMBwG
|
||||
A1UEAwwVaW50ZXJtZWRpYXRlYXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
||||
AQ8AMIIBCgKCAQEA6GndRFiXk+2q+Ig7ZOWKKGta+is8137qyXz+eVFs5sA0ajMN
|
||||
ZBAMWS0TIXw/Yks+y6fEcV/tfv91k1eUN4YXPcoxTdDF97d2hO9wxumeYOMnQeDy
|
||||
VZVDKQBZ+jFMeI+VkNpMEdmsLErpZDGob/1dC8tLEuR6RuRR8X6IDGMPOCMw1jLK
|
||||
V1bQjPtzqKadTscfjLuKxuLgspJdTrzsu6hdcl1mm8K6CjTY2HNXWxs1yYmwfuQ2
|
||||
Z4/8sOMNqFqLjN+ChD7pksTMq7IosqGiJzi2bpd5f44ek/k822Y0ATncJHk4h1Z+
|
||||
kZBnW6kgcLna1gDri9heRwSZ+M8T8nlHgIMZIQIDAQABo3sweTASBgNVHRMBAf8E
|
||||
CDAGAQH/AgEAMB0GA1UdDgQWBBS98L4T5RaIToE3DkBRsoeWPil0eDAfBgNVHSME
|
||||
GDAWgBRxD5DQHTmtpDFKDOiMf5FAi6vfbzAOBgNVHQ8BAf8EBAMCAgQwEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBAD+4KpUeV5mUPw5IG/7w
|
||||
eOXnUpeS96XFGuS1JuFo/TbgntPWSPyo+rD4GrPIkUXyoHaMCDd2UBEjyGbBIKlB
|
||||
NZA3RJOAEp7DTkLNK4RFn/OEcLwG0J5brL7kaLRO4vwvItVIdZ2XIqzypRQTc0MG
|
||||
MmF08zycnSlaN01ryM67AsMhwdHqVa+uXQPo8R8sdFGnZ33yywTYD73FeImXilQ2
|
||||
rDnFUVqmrW1fjl0Fi4rV5XI0EQiPrzKvRtmF8ZqjGATPOsRd64cwQX6V+P5hNeIR
|
||||
9pba6td7AbNGausHfacRYMyoGJWWWkFPd+7jWOCPqW7Fk1tmBgdB8GzXa3inWIRM
|
||||
RUE=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIC+zCCAeOgAwIBAgIBATANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAyNzEwMjYzNFoXDTI1MTAyNDEwMjYzNFowGDEWMBQG
|
||||
A1UEAwwNcm9vdGF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
|
||||
ggEBAMl+dcraUM/E7E6zl7+7hK9oUJYXJLnfiMtP/TRFVbH4+2aEN8vXzPbzKdR3
|
||||
FfaHczXQTwnTCaYA4u4uSDvSOsFFEfxEwYORsdKmQEM8nGpVX2NVvKsMcGIhh8kh
|
||||
ZwJfkMIOcAxmGIHGdMhF8VghonJ8uGiuqktxdfpARq0g3fqIjDHsF9/LpfshUfk9
|
||||
wsRyTF0yr90U/dsfnE+u8l7GvVl8j2Zegp0sagAGtLaNv7tP17AibqEGg2yDBrBN
|
||||
9r9ihe4CqMjx+Q2kQ2S9Gz2V2ReO/n6vm2VQxsPRB/lV/9jh7cUcS0/9mggLYrDy
|
||||
cq1v7rLLQrWuxMz1E3gOhyCYJ38CAwEAAaNQME4wHQYDVR0OBBYEFHEPkNAdOa2k
|
||||
MUoM6Ix/kUCLq99vMB8GA1UdIwQYMBaAFHEPkNAdOa2kMUoM6Ix/kUCLq99vMAwG
|
||||
A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBABrhjnWC6b+z9Kw73C/niOwo
|
||||
9sPdufjS6tb0sCwDjt3mjvE4NdNWt+/+ZOugW6dqtvqhtqZM1q0u9pJkNwIrqgFD
|
||||
ZHcfNaf31G6Z2YE+Io7woTVw6fFobg/EFo+a/qwbvWL26McmiRL5yiSBjVjpX4a5
|
||||
kdZ+aPQUCBaLrTWwlCDqzSVIULWUQvveRWbToMFKPNID58NtEpymAx3Pgir7YjV9
|
||||
UnlU2l5vZrh1PTCqZxvC/IdRESUfW80LdHaeyizRUP+6vKxGgSz2MRuYINjbd6GO
|
||||
hGiCpWlwziW2xLV1l2qSRLko2kIafLZP18N0ThM9zKbU5ps9NgFOf//wqSGtLaE=
|
||||
-----END CERTIFICATE-----
|
|
@ -0,0 +1,6 @@
|
|||
MIIDZDCCAkygAwIBAgIBATANBgkqhkiG9w0BAQsFADAgMR4wHAYDVQQDDBVpbnRl
|
||||
cm1lZGlhdGVhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1
|
||||
WjAUMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQCkg/Qr8RQeLTOSgCkyiEX2ztgkgscX8hKGHEHdvlkmVK3JVEIIwkvu
|
||||
/Y9LtHZUia3nPAgqEEbexzTENZjSCcC0V6I2XW/e5tIE3rO0KLZyhtZhN/2SfJ6p
|
||||
KbOh0HLr1VtkKJGp1tzUmHW/aZI32pK60ZJ/N917NLPCJpCaL8+wHo3+w3oNqln6
|
|
@ -0,0 +1,41 @@
|
|||
MIIDZDCCAkygAwIBAgIBATANBgkqhkiG9w0BAQsFADAgMR4wHAYDVQQDDBVpbnRl
|
||||
cm1lZGlhdGVhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1
|
||||
WjAUMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQCkg/Qr8RQeLTOSgCkyiEX2ztgkgscX8hKGHEHdvlkmVK3JVEIIwkvu
|
||||
/Y9LtHZUia3nPAgqEEbexzTENZjSCcC0V6I2XW/e5tIE3rO0KLZyhtZhN/2SfJ6p
|
||||
KbOh0HLr1VtkKJGp1tzUmHW/aZI32pK60ZJ/N917NLPCJpCaL8+wHo3+w3oNqln6
|
||||
oJsfgxy9SUM8Bsc9WMYKMUdqLO1QKs1A5YwqZuO7Mwj+4LY2QDixC7Ua7V9YAPo2
|
||||
1SBeLvMCHbYxSPCuxcZ/kDkgax/DF9u7aZnGhMImkwBka0OQFvpfjKtTIuoobTpe
|
||||
PAG7MQYXk4RjnjdyEX/9XAQzvNo1CDObAgMBAAGjgbQwgbEwPAYDVR0RBDUwM4IJ
|
||||
bG9jYWxob3N0ggkxMjcuMC4wLjGCAzo6MYcEfwAAAYcQAAAAAAAAAAAAAAAAAAAA
|
||||
ATAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSvhJo6taTggJQBukEvMo/PDk8tKTAf
|
||||
BgNVHSMEGDAWgBS98L4T5RaIToE3DkBRsoeWPil0eDAOBgNVHQ8BAf8EBAMCA6gw
|
||||
EwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBAHLOt0mL2S4A
|
||||
B7vN7KsfQeGlVgZUVlEjem6kqBh4fIzl4CsQuOO8oJ0FlO1z5JAIo98hZinymJx1
|
||||
phBVpyGIKakT/etMH0op5evLe9dD36VA3IM/FEv5ibk35iGnPokiJXIAcdHd1zam
|
||||
YaTHRAnZET5S03+7BgRTKoRuszhbvuFz/vKXaIAnVNOF4Gf2NUJ/Ax7ssJtRkN+5
|
||||
UVxe8TZVxzgiRv1uF6NTr+J8PDepkHCbJ6zEQNudcFKAuC56DN1vUe06gRDrNbVq
|
||||
2JHEh4pRfMpdsPCrS5YHBjVq/XHtFHgwDR6g0WTwSUJvDeM4OPQY5f61FB0JbFza
|
||||
PkLkXmoIod8=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDLjCCAhagAwIBAgIBAjANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAyNzEwMjYzNVoXDTI1MTAyNDEwMjYzNVowIDEeMBwG
|
||||
A1UEAwwVaW50ZXJtZWRpYXRlYXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
||||
AQ8AMIIBCgKCAQEA6GndRFiXk+2q+Ig7ZOWKKGta+is8137qyXz+eVFs5sA0ajMN
|
||||
ZBAMWS0TIXw/Yks+y6fEcV/tfv91k1eUN4YXPcoxTdDF97d2hO9wxumeYOMnQeDy
|
||||
VZVDKQBZ+jFMeI+VkNpMEdmsLErpZDGob/1dC8tLEuR6RuRR8X6IDGMPOCMw1jLK
|
||||
V1bQjPtzqKadTscfjLuKxuLgspJdTrzsu6hdcl1mm8K6CjTY2HNXWxs1yYmwfuQ2
|
||||
Z4/8sOMNqFqLjN+ChD7pksTMq7IosqGiJzi2bpd5f44ek/k822Y0ATncJHk4h1Z+
|
||||
kZBnW6kgcLna1gDri9heRwSZ+M8T8nlHgIMZIQIDAQABo3sweTASBgNVHRMBAf8E
|
||||
CDAGAQH/AgEAMB0GA1UdDgQWBBS98L4T5RaIToE3DkBRsoeWPil0eDAfBgNVHSME
|
||||
GDAWgBRxD5DQHTmtpDFKDOiMf5FAi6vfbzAOBgNVHQ8BAf8EBAMCAgQwEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBAD+4KpUeV5mUPw5IG/7w
|
||||
eOXnUpeS96XFGuS1JuFo/TbgntPWSPyo+rD4GrPIkUXyoHaMCDd2UBEjyGbBIKlB
|
||||
NZA3RJOAEp7DTkLNK4RFn/OEcLwG0J5brL7kaLRO4vwvItVIdZ2XIqzypRQTc0MG
|
||||
MmF08zycnSlaN01ryM67AsMhwdHqVa+uXQPo8R8sdFGnZ33yywTYD73FeImXilQ2
|
||||
rDnFUVqmrW1fjl0Fi4rV5XI0EQiPrzKvRtmF8ZqjGATPOsRd64cwQX6V+P5hNeIR
|
||||
9pba6td7AbNGausHfacRYMyoGJWWWkFPd+7jWOCPqW7Fk1tmBgdB8GzXa3inWIRM
|
||||
RUE=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
BIN
tests/standalone_2/io/certificates/server_key.p12
Normal file
BIN
tests/standalone_2/io/certificates/server_key.p12
Normal file
Binary file not shown.
29
tests/standalone_2/io/certificates/server_key.pem
Normal file
29
tests/standalone_2/io/certificates/server_key.pem
Normal file
|
@ -0,0 +1,29 @@
|
|||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIE4zAcBgoqhkiG9w0BDAEBMA4ECBMCjlg8JYZ4AgIIAASCBMFd9cBoZ5xcTock
|
||||
AVQcg/HzYJtMceKn1gtMDdC7mmXuyN0shoxhG4BpQInHkFARL+nenesXFxEm4X5e
|
||||
L603Pcgw72/ratxVpTW7hPMjiLTEBqza0GjQm7Sarbdy+Vzdp/6XFrAcPfFl1juY
|
||||
oyYzbozPsvFHz3Re44y1KmI4HAzU/qkjJUbNTTiPPVI2cDP6iYN2XXxBb1wwp8jR
|
||||
iqdZqFG7lU/wvPEbD7BVPpmJBHWNG681zb4ea5Zn4hW8UaxpiIBiaH0/IWc2SVZd
|
||||
RliAFo3NEsGxCcsnBo/n00oudGbOJxdOp7FbH5hJpeqX2WhCyJRxIeHOWmeuMAet
|
||||
03HFriiEmJ99m2nEJN1x0A3QUUM7ji6vZAb4qb1dyq7LlX4M2aaqixRnaTcQkapf
|
||||
DOxX35DEBXSKrDpyWp6Rx4wNpUyi1TKyhaVnYgD3Gn0VfC/2w86gSFlrf9PMYGM0
|
||||
PvFxTDzTyjOuPBRa728gZOGXgDOL7qvdInU/opVew7kFeRQHXxHzFCLK5dD+Vrig
|
||||
5fS3m0++f55ODkxqHXB8gbXbd3GMmsW6MrGpU7VsCNtbVPdSMW0FalovEB0M+2lj
|
||||
1VfuvL+0F5huTe+BgZAt6xgET/CIcZXdNMRPVhraqUjqWtI9Rdk4STPCpU1rDkjG
|
||||
YDl/fo4W2T6qQWFUpiC9IvVVGkVxaqfZZ4Qu+V5xPUi6vk95QiTNkN1t+m+sCCgS
|
||||
Llkea8Um0aHMy33Lj3NsfL0LMrnpniqcAks8BvcgIZwk1VRqcj7BQVCygJSYrmAR
|
||||
DBhMpjWlXuSggnyVPuduZDtnTN+8lCHLOKL3a3bDb6ySaKX49Km6GutDLfpDtEA0
|
||||
3mQvmEG4XVm7zy+AlN72qFbtSLDRi/D/uQh2q/ZrFQLOBQBQB56TvEbKouLimUDM
|
||||
ascQA3aUyhOE7e+d02NOFIFTozwc/C//CIFeA+ZEwxyfha/3Bor6Jez7PC/eHNxZ
|
||||
w7YMXzPW9NhcCcerhYGebuCJxLwzqJ+IGdukjKsGV2ytWDoB2xZiJNu096j4RKcq
|
||||
YSJoen0R7IH8N4eDujXR8m9kAl724Uqs1OoAs4VNICvzTutbsgVZ6Z+NMOcfnPw9
|
||||
jZkFhot16w8znD+OmhBR7/bzOLpaeUhk7EhNq5M6U0NNWx3WwkDlvU/jx+6/EQe3
|
||||
iLEHptH2HYBF1xscaKGbtKNtuQsfdzgWpOX0qK2YbK3yCKvL/xIm1DQmDZDKkWdW
|
||||
VNh8oGV1H96CivWlvxhAgXKz9F/83CjMw8YXRk7RJvWR4vtNvXFAvGkFIYCN9Jv9
|
||||
p+1ukaYoxSLGBik907I6gWSHqumJiCprUyAX/bVfZfNiYh4hzeA3lhwxZSax3JG4
|
||||
7QFPvyepOmF/3AAzS/Pusx6jOZnuCMCkfQi6Wpem1o3s4x+fP7kz00Xuj01ErucM
|
||||
S10ixfIh84kXBN3dTRDtDdeCyoMsBKO0W5jDBBlWL02YfdF6Opo1Q4cPh2DYgXMh
|
||||
XEszNZSK5LB0y+f3A6Kdx/hkZzHVvMONA70OyrkoZzGyWENhcB0c7ntTJyPPD2qM
|
||||
s0HRA2VwF/0ypU3OKERM1Ua5NSkTgvnnVTlV9GO90Tkn5v4fxdl8NzIuJLyGguTP
|
||||
Xc0tRM34Lg==
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
57
tests/standalone_2/io/certificates/server_trusted.pem
Normal file
57
tests/standalone_2/io/certificates/server_trusted.pem
Normal file
|
@ -0,0 +1,57 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDLjCCAhagAwIBAgIBAjANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAyNzEwMjYzNVoXDTI1MTAyNDEwMjYzNVowIDEeMBwG
|
||||
A1UEAwwVaW50ZXJtZWRpYXRlYXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
||||
AQ8AMIIBCgKCAQEA6GndRFiXk+2q+Ig7ZOWKKGta+is8137qyXz+eVFs5sA0ajMN
|
||||
ZBAMWS0TIXw/Yks+y6fEcV/tfv91k1eUN4YXPcoxTdDF97d2hO9wxumeYOMnQeDy
|
||||
VZVDKQBZ+jFMeI+VkNpMEdmsLErpZDGob/1dC8tLEuR6RuRR8X6IDGMPOCMw1jLK
|
||||
V1bQjPtzqKadTscfjLuKxuLgspJdTrzsu6hdcl1mm8K6CjTY2HNXWxs1yYmwfuQ2
|
||||
Z4/8sOMNqFqLjN+ChD7pksTMq7IosqGiJzi2bpd5f44ek/k822Y0ATncJHk4h1Z+
|
||||
kZBnW6kgcLna1gDri9heRwSZ+M8T8nlHgIMZIQIDAQABo3sweTASBgNVHRMBAf8E
|
||||
CDAGAQH/AgEAMB0GA1UdDgQWBBS98L4T5RaIToE3DkBRsoeWPil0eDAfBgNVHSME
|
||||
GDAWgBRxD5DQHTmtpDFKDOiMf5FAi6vfbzAOBgNVHQ8BAf8EBAMCAgQwEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBAD+4KpUeV5mUPw5IG/7w
|
||||
eOXnUpeS96XFGuS1JuFo/TbgntPWSPyo+rD4GrPIkUXyoHaMCDd2UBEjyGbBIKlB
|
||||
NZA3RJOAEp7DTkLNK4RFn/OEcLwG0J5brL7kaLRO4vwvItVIdZ2XIqzypRQTc0MG
|
||||
MmF08zycnSlaN01ryM67AsMhwdHqVa+uXQPo8R8sdFGnZ33yywTYD73FeImXilQ2
|
||||
rDnFUVqmrW1fjl0Fi4rV5XI0EQiPrzKvRtmF8ZqjGATPOsRd64cwQX6V+P5hNeIR
|
||||
9pba6td7AbNGausHfacRYMyoGJWWWkFPd+7jWOCPqW7Fk1tmBgdB8GzXa3inWIRM
|
||||
RUE=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIC+zCCAeOgAwIBAgIBATANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAyNzEwMjYzNFoXDTI1MTAyNDEwMjYzNFowGDEWMBQG
|
||||
A1UEAwwNcm9vdGF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
|
||||
ggEBAMl+dcraUM/E7E6zl7+7hK9oUJYXJLnfiMtP/TRFVbH4+2aEN8vXzPbzKdR3
|
||||
FfaHczXQTwnTCaYA4u4uSDvSOsFFEfxEwYORsdKmQEM8nGpVX2NVvKsMcGIhh8kh
|
||||
ZwJfkMIOcAxmGIHGdMhF8VghonJ8uGiuqktxdfpARq0g3fqIjDHsF9/LpfshUfk9
|
||||
wsRyTF0yr90U/dsfnE+u8l7GvVl8j2Zegp0sagAGtLaNv7tP17AibqEGg2yDBrBN
|
||||
9r9ihe4CqMjx+Q2kQ2S9Gz2V2ReO/n6vm2VQxsPRB/lV/9jh7cUcS0/9mggLYrDy
|
||||
cq1v7rLLQrWuxMz1E3gOhyCYJ38CAwEAAaNQME4wHQYDVR0OBBYEFHEPkNAdOa2k
|
||||
MUoM6Ix/kUCLq99vMB8GA1UdIwQYMBaAFHEPkNAdOa2kMUoM6Ix/kUCLq99vMAwG
|
||||
A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBABrhjnWC6b+z9Kw73C/niOwo
|
||||
9sPdufjS6tb0sCwDjt3mjvE4NdNWt+/+ZOugW6dqtvqhtqZM1q0u9pJkNwIrqgFD
|
||||
ZHcfNaf31G6Z2YE+Io7woTVw6fFobg/EFo+a/qwbvWL26McmiRL5yiSBjVjpX4a5
|
||||
kdZ+aPQUCBaLrTWwlCDqzSVIULWUQvveRWbToMFKPNID58NtEpymAx3Pgir7YjV9
|
||||
UnlU2l5vZrh1PTCqZxvC/IdRESUfW80LdHaeyizRUP+6vKxGgSz2MRuYINjbd6GO
|
||||
hGiCpWlwziW2xLV1l2qSRLko2kIafLZP18N0ThM9zKbU5ps9NgFOf//wqSGtLaE=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDKjCCAhKgAwIBAgIBATANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDEw9jbGll
|
||||
bnRhdXRob3JpdHkwHhcNMTUxMDI3MTAyNjM1WhcNMjUxMDI0MTAyNjM1WjAaMRgw
|
||||
FgYDVQQDEw9jbGllbnRhdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQCi6wJAs6nppNmTZ3e/wE9l0pAmkMtDONwB9o115XXTG3rmSKfZOxa8
|
||||
TFjSn818Pr1OYb9fPdI1Y6x4WY9PELUtQyEBlNcKjwg96vhrP4p2DhqbWsI5nASH
|
||||
DSjJsM75bQ7D7qHYzriuAl0Fk1C4LcodRj+5wmErMtvGJG0x06qFbxCCMAJ2kC+h
|
||||
SneTN955/YHSXADgxjFlt3s1T0QPnqrr+G7Ro6PrVKLPBulglq7wAeTwrGkPRUt0
|
||||
3lDGOSi6i97NbpiXwrGp5XiLUtVCiID6Ro0xKWH4sjJ4JnVjIUG8CQWERc6sFDJM
|
||||
4adgFQJagkTUoxWtDGL58+WcbcJa73XJAgMBAAGjezB5MBIGA1UdEwEB/wQIMAYB
|
||||
Af8CAQAwHQYDVR0OBBYEFLciwbnjKDIu026K0bzOwp8DokkOMB8GA1UdIwQYMBaA
|
||||
FLciwbnjKDIu026K0bzOwp8DokkOMA4GA1UdDwEB/wQEAwICBDATBgNVHSUEDDAK
|
||||
BggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAh8rryWFoGjFdm0i4FLRktF8B
|
||||
aUqVCCpFVHIYlFcsQstznIb01X2Zq5nfSfrFxbr5STVGzGJ0HGDuFpicT8+qMnJX
|
||||
dou5AuaqubIDWeKL+oAgvI71Nt1gsesixqzFQAoCTRgUjrSGpY2fL7rElV0Ndy9b
|
||||
YepVouktP1/GULc8XbIG9ZLx70Id7YTyrITDgbH3hSnbjmmZSr9RKyKas4MXN0s8
|
||||
oKGHEgAx7KyNQRppjydz3bDeH/jVbM4W98vwL6rjKUJlOlo0Ru+3+oioFHqLMSvN
|
||||
w4f5rQEiuF260h7y8KKxRxQ8rw188gsBapZr4Rcp+y8gdQvlzJONtv3d1dap5A==
|
||||
-----END CERTIFICATE-----
|
BIN
tests/standalone_2/io/certificates/trusted_certs.p12
Normal file
BIN
tests/standalone_2/io/certificates/trusted_certs.p12
Normal file
Binary file not shown.
18
tests/standalone_2/io/certificates/trusted_certs.pem
Normal file
18
tests/standalone_2/io/certificates/trusted_certs.pem
Normal file
|
@ -0,0 +1,18 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIC+zCCAeOgAwIBAgIBATANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAyNzEwMjYzNFoXDTI1MTAyNDEwMjYzNFowGDEWMBQG
|
||||
A1UEAwwNcm9vdGF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
|
||||
ggEBAMl+dcraUM/E7E6zl7+7hK9oUJYXJLnfiMtP/TRFVbH4+2aEN8vXzPbzKdR3
|
||||
FfaHczXQTwnTCaYA4u4uSDvSOsFFEfxEwYORsdKmQEM8nGpVX2NVvKsMcGIhh8kh
|
||||
ZwJfkMIOcAxmGIHGdMhF8VghonJ8uGiuqktxdfpARq0g3fqIjDHsF9/LpfshUfk9
|
||||
wsRyTF0yr90U/dsfnE+u8l7GvVl8j2Zegp0sagAGtLaNv7tP17AibqEGg2yDBrBN
|
||||
9r9ihe4CqMjx+Q2kQ2S9Gz2V2ReO/n6vm2VQxsPRB/lV/9jh7cUcS0/9mggLYrDy
|
||||
cq1v7rLLQrWuxMz1E3gOhyCYJ38CAwEAAaNQME4wHQYDVR0OBBYEFHEPkNAdOa2k
|
||||
MUoM6Ix/kUCLq99vMB8GA1UdIwQYMBaAFHEPkNAdOa2kMUoM6Ix/kUCLq99vMAwG
|
||||
A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBABrhjnWC6b+z9Kw73C/niOwo
|
||||
9sPdufjS6tb0sCwDjt3mjvE4NdNWt+/+ZOugW6dqtvqhtqZM1q0u9pJkNwIrqgFD
|
||||
ZHcfNaf31G6Z2YE+Io7woTVw6fFobg/EFo+a/qwbvWL26McmiRL5yiSBjVjpX4a5
|
||||
kdZ+aPQUCBaLrTWwlCDqzSVIULWUQvveRWbToMFKPNID58NtEpymAx3Pgir7YjV9
|
||||
UnlU2l5vZrh1PTCqZxvC/IdRESUfW80LdHaeyizRUP+6vKxGgSz2MRuYINjbd6GO
|
||||
hGiCpWlwziW2xLV1l2qSRLko2kIafLZP18N0ThM9zKbU5ps9NgFOf//wqSGtLaE=
|
||||
-----END CERTIFICATE-----
|
|
@ -0,0 +1,8 @@
|
|||
MIIC+zCCAeOgAwIBAgIBATANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAyNzEwMjYzNFoXDTI1MTAyNDEwMjYzNFowGDEWMBQG
|
||||
A1UEAwwNcm9vdGF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
|
||||
ggEBAMl+dcraUM/E7E6zl7+7hK9oUJYXJLnfiMtP/TRFVbH4+2aEN8vXzPbzKdR3
|
||||
FfaHczXQTwnTCaYA4u4uSDvSOsFFEfxEwYORsdKmQEM8nGpVX2NVvKsMcGIhh8kh
|
||||
ZwJfkMIOcAxmGIHGdMhF8VghonJ8uGiuqktxdfpARq0g3fqIjDHsF9/LpfshUfk9
|
||||
wsRyTF0yr90U/dsfnE+u8l7GvVl8j2Zegp0sagAGtLaNv7tP17AibqEGg2yDBrBN
|
||||
a
|
|
@ -0,0 +1,59 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDZDCCAkygAwIBAgIBATANBgkqhkiG9w0BAQsFADAgMR4wHAYDVQQDDBVpbnRl
|
||||
cm1lZGlhdGVhdXRob3JpdHkwHhcNMTUxMDE5MTE1NTEyWhcNMjUxMDE2MTE1NTEy
|
||||
WjAUMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQDca2l3VIWhnlTqazrA07hiHjgXACUYS/nVox+a2Jar383kBz2kzN6B
|
||||
u4K7IwD2msym2IOBp1YT9OKPh9/KkSGvpPelu7ToCoehala32W+0ozh53CR8IpzQ
|
||||
tmh7J9oHtN2PcbLgEzHfAWyrY3xp9RpWUONjxoG8xXPedNsZL0Rj65Z3fKAjOypl
|
||||
+XJsgrqrNNAi3x0OMdhextMmLrYl+YQjgdND8UpykTSc8Q0vwngDZuLH/Nhx0cAA
|
||||
Ade0ZfXS6snwWVxrWke+zGF6yANoiV00gsBhq+WZZ50SmE2mz5LT9uj4t5WpcOI/
|
||||
2TlbV9HSjdOEAFD8cJIrK5FkEmz383E1AgMBAAGjgbQwgbEwPAYDVR0RBDUwM4IJ
|
||||
bG9jYWxob3N0ggkxMjcuMC4wLjGCAzo6MYcEfwAAAYcQAAAAAAAAAAAAAAAAAAAA
|
||||
ATAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQO+6Atr6tkTBmPasN4oTDUlbxQ1zAf
|
||||
BgNVHSMEGDAWgBRrkK4hOni2neySWQNmMfb9imn/+DAOBgNVHQ8BAf8EBAMCA6gw
|
||||
EwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBACdVUzrhfXoW
|
||||
wG0zI9aT6CxD7T0i0WK4fC6Yrx0Pqz53xnuiwBfvuAJ/PRXKYsJMxa2LuHGJKU/A
|
||||
nImCXGJHoUwL6x4Eor6fg7L9nPNqtIrQ6tzubxNtVPpLj4tK6Ps3IM+FICYUSX0b
|
||||
FLSfnv74afUp/2+0OHsoUVsL1rCTO2WgEkEShLERdJvdcvUSTWHfC5IQORS9vfzG
|
||||
+cZGOOPebfm8TY2DJxMYj/t7CHs1Sk550x590sKb/prwtJAYtQxGe7v0m9rihiM3
|
||||
dFKZiNh99yXbQ1ELYyhkFP8WAdK8ZTnynGqgAYJmV89Dg8k2uU8z+dahlE3foORD
|
||||
Y/Gn0CZE1NY=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDLjCCAhagAwIBAgIBATANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAxOTExNTUxMloXDTI1MTAxNjExNTUxMlowIDEeMBwG
|
||||
A1UEAwwVaW50ZXJtZWRpYXRlYXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
||||
AQ8AMIIBCgKCAQEA1OV9iea75DPQ18NppXxEFW26J7IfjUvp4wVnj9m7pOhsByqd
|
||||
wwS6hpjlkpEwCyugKD/t7u/VGwp2BB+BeaX7FPj6rnYY82bOJQlyB/vvDmOZfAe2
|
||||
84ug9O7QcsQHSQ7YQFuvYKaeYCKdrGjzQPVYkoVdv2js2dYTDG3QSIxpbi305Vef
|
||||
ia6Zfs5CAW/SfL36+ETo2pXNlD1ZBGRL8H3z+mMnIEj1Tbaipf+1Npr2l3xqIs1k
|
||||
RWsM3X+9xMkWGyvsDdbLIGiTTVxM9kOF0aNLdQIKb2tZsg4jRrFIgiO+5TXwp0FW
|
||||
4ldc5/GhtaoPDcsIALyIQc7CJ/PpPm9hnxIy7QIDAQABo3sweTASBgNVHRMBAf8E
|
||||
CDAGAQH/AgEAMB0GA1UdDgQWBBRrkK4hOni2neySWQNmMfb9imn/+DAfBgNVHSME
|
||||
GDAWgBRpz+jRK9iGqijrL/4WCsGsIjxoETAOBgNVHQ8BAf8EBAMCAgQwEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBACcwiLJUPzYGIeGIYGlo
|
||||
XlP4++adiPlXvsyTxLdGVSFWJMBV5EhtiXQXaUsOs2PyC7SWxiiUdAgE8Y2tMsF3
|
||||
Bh5LY/kKxZQXZuFa+RN1kPlhlYJWdiPyqcBziSPFBtqwudWLDUVSaVAQDhYYVB3K
|
||||
5+pFaeQKfhYmPvJKR9U2nTvukOhN1fZM8GUBnm2uaiA3giQ0wxXyQIuqC9S52qbh
|
||||
x4D4ZdbshQAgThPkHBoZVmd/NF1TNzitZZy7uaU7GpGrS1dcevN7pEUwm3+KIkIT
|
||||
AOSLB2FbFOwPUg6a/lWkFPotT3gl0tdyCaqkfneGCHzVciT0JTS/AqpdYEtuxEMe
|
||||
PJk=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIC+zCCAeOgAwIBAgIBATANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1yb290
|
||||
YXV0aG9yaXR5MB4XDTE1MTAxOTExNTUxMloXDTI1MTAxNjExNTUxMlowGDEWMBQG
|
||||
A1UEAwwNcm9vdGF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
|
||||
ggEBAMDzkcftGzdNJz5vXEAZSCAO2J6bCPz896pK3qtaViR/aF8I2vHZQm0IEoJc
|
||||
Y1NUMF3F50d6fMYCkEoORAkC0d7iAwTprhBdIg35+TxwGObcStrohDtEgwFmFRzg
|
||||
LtYeXiU0t0dBWOOQ9k2f9VGqbzKwZ2dbhOHSTXMTFoEcMStbeFc++oiOLY+QSq/J
|
||||
Xd/BXqvwVM3Mt+OwLvyUu45Kw18ENo77qubIPJUwoyaf+N2nFRqcc7bmNy0Wvk2Q
|
||||
StvQXy6DpN3KOoZx/sR7Ff8hYuHXcxbSsJ1hOO+tIJyOZyEJvU2BBOYVlKr4E4JU
|
||||
mkex0CM1IfIFqfcEkbvjwLjaojsCAwEAAaNQME4wHQYDVR0OBBYEFGnP6NEr2Iaq
|
||||
KOsv/hYKwawiPGgRMB8GA1UdIwQYMBaAFGnP6NEr2IaqKOsv/hYKwawiPGgRMAwG
|
||||
A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAJKl4RCEaXwtosNeurZlS3b9
|
||||
owXdsXDRdnfEawcc//AbRkrS4bHCQyOJNp/3DibEKkeAXCJrJ5cvXRjE5gb3Q+rl
|
||||
0AqziLY15xuMAxUK3zv0e8Zir21PQzQ9x8zbmlucEoT/jn7KvMSSqfEoer77cXev
|
||||
BpmQDQzE3FNgKohmHIzIDoTPiU3ahv6x8IhJ1e47UmRsSPFgtqglHcdCYIEclXpY
|
||||
bHvctT6+pFZuJfIs9+BATMXPJWSX7NhlMcnyP+xdDxDKuF/nwVFy6xA+njuWnnZT
|
||||
TyiGCnx+u/VpKzOrwMfzv2DW8Db80UERoox5n6QNQLnXNWPMddUL92/p9lMzWJY=
|
||||
-----END CERTIFICATE-----
|
29
tests/standalone_2/io/certificates/untrusted_server_key.pem
Normal file
29
tests/standalone_2/io/certificates/untrusted_server_key.pem
Normal file
|
@ -0,0 +1,29 @@
|
|||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIE5TAcBgoqhkiG9w0BDAEBMA4ECKAry4fwmB/TAgIIAASCBMNsKbVVvIs/l6/N
|
||||
/1J9WXSiA1gnRTd2n58GJUV6mkiaRUMiWu3fK+V7iHpIi7KeLeD+JGsDeqxw0bB5
|
||||
lmS/RJy0wNBP0PL0oiI8VUe3wxTUU2b5wW9fomeOTGWOIUL5VZXHkTCf5KMcFWMY
|
||||
GMnDpIN/f/m9zvz/3FogxIZlIAxG7gKKrfEcKExIShAJ5wYDbDSFZWfNcjMODGPn
|
||||
xz3W04aRsJGf3KlOQvSuNtcBpsuwXuAXezzuFETM20xrWW3iJIsO5UmqJ1OJcdet
|
||||
A+k5k0K+1/WwLkceWJYSd19O+7LNULsZhKUJ515ZSO1TJGgfd5DznkgRXYUx5ucS
|
||||
tvJLYvShGbaYulsVKn8q2nkIxnQCov3my1hIRk/qCKb+uOvRD9dIkjSlNubqaRb6
|
||||
geEOfTh1g5PCeKPlSTkVueLQqWxKMye4eWYqUxExkUNuGJ0d2ndBGJRo6bulnc7I
|
||||
kt44DzEufV5OLvyTufimpohqRm3Yzq87DWSSThCKOGkhfGutn8B7cJR8ZPrG2euT
|
||||
J7Bv4EuFjhpKDieqDi8yoXgIkWSgyzFNMsewV4lxFNP/wbvoKPFrKsU4ny6jRfzy
|
||||
WTjMN1UOTBvsyZbVvjLII79cBKLqlowHAZQ7YwuxtbjeB9FRH+ZwkzYeyn4GNHdf
|
||||
QoVwOMKAiOMjzAK9qdW7isVXy/7v9EXaZplRmwMRhCZevC9zeY2Rueahq8qpHpH1
|
||||
GPjrew5elPkBRQhxX6IiL7kI7upE65UI5hnnTnrdrZkRmMYOFEZLyLbTU4wMCxui
|
||||
4BmEiGp6qCWe3UND1b8YhG+gsRYzHK5oEJV+Ck7m+e9iU3/axggUfAhZeBmdlgqd
|
||||
bUajlzcgbtfaSgZ08XXU1YPw0aLlmJGzb+oWMFwBJHAUYpOV2uqDHiXZZt4SoAF9
|
||||
gJQaXvqMGzY8JyP5ZQauljVtPGcopA+jbix3Rbwf97lLqJHSpWoHpcCa6FrfaMqG
|
||||
dx8oQsO67WN0gm5DIN3kB2jHOj9Nf7kr3HGjyC5tPq8s1+aT6baZcHWzVfyVr10c
|
||||
9X13Pz5XzEa1oiaO7JDPkzb9T7aPJZwskATNB8h6tWfqdGyUY5eURtsCnVrtG/1p
|
||||
pAXyY/0vAksfDPjMChKLKxZ7rBbscoNzr2f7Vw4CTnIpaxA4eLEx6UdpG4/5RzYJ
|
||||
0YuR+SzCkuNti7uZGi9DCGkZkYl6VndatW+Pk/+JVBexdKt6MsER6aVsS8ev9UbW
|
||||
JG+2C8bjMlfKy21644KwYOtZbVcE9jwlsz8w+e6YbOzBvbwiPmoCi0xcMxRJPa2y
|
||||
cKMrs2hSKmhUP6uIH0b0qNcHEPA32mVzGC0MToC5R+yb6OdyvoEsisqS7tEAMfTJ
|
||||
0yowcZr2lPehaMr4efSB8JY6DuofitfgI6X6bmiIPQ9v//djxhkxkRAbpTRGmFZx
|
||||
1YIKDa72S8jUxHWlVvmoqTWI8T+jltF2pYBctS6IMKEot/CcBCHb5l1zfMyo5a0x
|
||||
73ooh5tq+vRWJGaLRMj66VVSWGQoJmfAGwWpjBpTLa0UQoHO0/J1IbfjFOj5HV3J
|
||||
bscmoGWhVwuJM5ActB0MOvXGQe9mf2X4p/1Rp+yBuipH1SJzFEzbOZ3kE50Z6aXH
|
||||
CoJJOKkcuf43
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
|
@ -5,6 +5,10 @@
|
|||
import 'dart:convert';
|
||||
import 'dart:io';
|
||||
|
||||
// This test ensures that the VM will support string literals that have non
|
||||
// ascii characters. An unhandeld exception will be thrown if the VM fails
|
||||
// to support non ascii characters.
|
||||
|
||||
main() {
|
||||
String canary = "Canary";
|
||||
String spades = "These are three black spades: ♠♠♠";
|
|
@ -23,7 +23,7 @@ void checkFileEmpty(String fileName) {
|
|||
void checkFileContent(String fileName, String content) {
|
||||
RandomAccessFile pipeOut = new File(fileName).openSync();
|
||||
int length = pipeOut.lengthSync();
|
||||
List data = new List<int>(length);
|
||||
var data = new List<int>(length);
|
||||
pipeOut.readIntoSync(data, 0, length);
|
||||
Expect.equals(content, new String.fromCharCodes(data));
|
||||
pipeOut.closeSync();
|
||||
|
@ -105,15 +105,16 @@ main() {
|
|||
|
||||
// Get the shell script for testing the Standalone Dart VM with
|
||||
// piping and redirections of stdio.
|
||||
var shellScript = new File("tests/standalone/io/dart_std_io_pipe_test.sh");
|
||||
var shellScript = new File("tests/standalone_2/io/dart_std_io_pipe_test.sh");
|
||||
if (!shellScript.existsSync()) {
|
||||
shellScript = new File("../tests/standalone/io/dart_std_io_pipe_test.sh");
|
||||
shellScript = new File("../tests/standalone_2/io/dart_std_io_pipe_test.sh");
|
||||
}
|
||||
// Get the Dart script file which echoes stdin to stdout or stderr or both.
|
||||
var scriptFile = new File("tests/standalone/io/dart_std_io_pipe_script.dart");
|
||||
var scriptFile =
|
||||
new File("tests/standalone_2/io/dart_std_io_pipe_script.dart");
|
||||
if (!scriptFile.existsSync()) {
|
||||
scriptFile =
|
||||
new File("../tests/standalone/io/dart_std_io_pipe_script.dart");
|
||||
new File("../tests/standalone_2/io/dart_std_io_pipe_script.dart");
|
||||
}
|
||||
|
||||
// Run the shell script.
|
17
tests/standalone_2/io/dart_std_io_pipe_test.sh
Executable file
17
tests/standalone_2/io/dart_std_io_pipe_test.sh
Executable file
|
@ -0,0 +1,17 @@
|
|||
#! /bin/bash
|
||||
|
||||
# This script expects the following arguments
|
||||
# $1: Path to dart executable
|
||||
# $2: Path to dart echoing script
|
||||
# $3: Argument to dart echoing script (0, 1 or 2)
|
||||
# $4: File for output from piping stdout and stderr
|
||||
# $5: File prefix for output from redirecting stdout and stderr to a file.
|
||||
# $6: Stdio type of stdin
|
||||
|
||||
# Test piping and stdio file redirection.
|
||||
echo "Hello" | $1 $2 $3 pipe pipe pipe 2>&1 | cat - > $4
|
||||
$1 $2 $3 $6 file file < $4 > $5.stdout 2> $5.stderr
|
||||
$1 $2 $3 $6 file file < $4 >> $5.stdout 2>> $5.stderr
|
||||
$1 $2 $3 $6 terminal terminal < $4 > /dev/null 2> /dev/null
|
||||
$1 $2 $3 $6 terminal pipe < $4 2>&1 > /dev/null
|
||||
$1 $2 $3 $6 terminal terminal < $4 > /dev/null 2>&1
|
|
@ -16,39 +16,40 @@ import 'fuzz_support.dart';
|
|||
fuzzSyncMethods() {
|
||||
typeMapping.forEach((k, v) {
|
||||
doItSync(() {
|
||||
doItSync(() {
|
||||
Directory.systemTemp.createTempSync(v).deleteSync();
|
||||
});
|
||||
var d = new Directory(v);
|
||||
doItSync(d.existsSync);
|
||||
doItSync(d.createSync);
|
||||
doItSync(d.deleteSync);
|
||||
doItSync(d.listSync);
|
||||
doItSync(() {
|
||||
d.createTempSync('tempdir').deleteSync();
|
||||
});
|
||||
doItSync(() {
|
||||
// Let's be a little careful. If the directory exists we don't
|
||||
// want to delete it and all its contents.
|
||||
if (!d.existsSync()) d.deleteSync(recursive: true);
|
||||
});
|
||||
typeMapping.forEach((k2, v2) {
|
||||
doItSync(() => d.renameSync(v2));
|
||||
doItSync(() => d.listSync(recursive: v2));
|
||||
});
|
||||
Directory.systemTemp.createTempSync(v).deleteSync();
|
||||
});
|
||||
Directory d;
|
||||
doItSync(() => d = new Directory(v));
|
||||
if (d == null) return;
|
||||
doItSync(d.existsSync);
|
||||
doItSync(d.createSync);
|
||||
doItSync(d.deleteSync);
|
||||
doItSync(d.listSync);
|
||||
doItSync(() {
|
||||
d.createTempSync('tempdir').deleteSync();
|
||||
});
|
||||
doItSync(() {
|
||||
// Let's be a little careful. If the directory exists we don't
|
||||
// want to delete it and all its contents.
|
||||
if (!d.existsSync()) d.deleteSync(recursive: true);
|
||||
});
|
||||
typeMapping.forEach((k2, v2) {
|
||||
doItSync(() => d.renameSync(v2));
|
||||
doItSync(() => d.listSync(recursive: v2));
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
fuzzAsyncMethods() {
|
||||
asyncStart();
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
typeMapping.forEach((k, v) {
|
||||
futures.add(doItAsync(() {
|
||||
Directory.systemTemp.createTempSync(v).deleteSync();
|
||||
}));
|
||||
if (v is! String) {
|
||||
Expect.throws(() => new Directory(v), (e) => e is ArgumentError);
|
||||
Expect.throws(() => new Directory(v),
|
||||
(e) => e is ArgumentError || e is TypeError);
|
||||
return;
|
||||
}
|
||||
var d = new Directory(v);
|
0
tests/standalone_2/io/empty_file
Normal file
0
tests/standalone_2/io/empty_file
Normal file
|
@ -48,7 +48,6 @@ testWindows() {
|
|||
|
||||
testPosix() {
|
||||
String current = Directory.current.path;
|
||||
print(Directory.current.path);
|
||||
for (String relative in ['abd', '..', '.', 'efg/hij', 'abc/']) {
|
||||
if (current.endsWith('/')) {
|
||||
Expect.equals(new File(relative).absolute.path, '$current$relative');
|
27
tests/standalone_2/io/file_constructor_test.dart
Normal file
27
tests/standalone_2/io/file_constructor_test.dart
Normal file
|
@ -0,0 +1,27 @@
|
|||
// Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file
|
||||
// for details. All rights reserved. Use of this source code is governed by a
|
||||
// BSD-style license that can be found in the LICENSE file.
|
||||
|
||||
import "package:expect/expect.dart";
|
||||
import 'dart:io';
|
||||
|
||||
void main() {
|
||||
bool developerMode = false;
|
||||
assert(developerMode = true);
|
||||
new File('blåbærgrød');
|
||||
new File('foo.txt');
|
||||
try {
|
||||
new File(null);
|
||||
Expect.fail('ArgumentError expected.');
|
||||
} on ArgumentError catch (e) {
|
||||
// Expected.
|
||||
}
|
||||
try {
|
||||
new File(1);
|
||||
Expect.fail('Error expected.');
|
||||
} on ArgumentError catch (e) {
|
||||
if (developerMode) rethrow;
|
||||
} on TypeError catch (e) {
|
||||
if (!developerMode) rethrow;
|
||||
}
|
||||
}
|
|
@ -14,49 +14,49 @@ import "package:async_helper/async_helper.dart";
|
|||
|
||||
fuzzSyncMethods() {
|
||||
typeMapping.forEach((k, v) {
|
||||
doItSync(() {
|
||||
var f = new File(v);
|
||||
doItSync(f.existsSync);
|
||||
doItSync(f.createSync);
|
||||
doItSync(f.deleteSync);
|
||||
doItSync(f.lengthSync);
|
||||
doItSync(f.modifiedSync);
|
||||
doItSync(f.fullPathSync);
|
||||
doItSync(() => f.openRead().listen((_) {}, onError: (e) {}));
|
||||
doItSync(f.readAsBytesSync);
|
||||
doItSync(f.readAsStringSync);
|
||||
doItSync(f.readAsLinesSync);
|
||||
typeMapping.forEach((k2, v2) {
|
||||
doItSync(() => f.openSync(mode: v2));
|
||||
doItSync(() => f.openWrite(mode: v2));
|
||||
doItSync(() => f.readAsStringSync(encoding: v2));
|
||||
doItSync(() => f.readAsLinesSync(encoding: v2));
|
||||
});
|
||||
File f;
|
||||
doItSync(() => f = new File(v));
|
||||
if (f == null) return;
|
||||
doItSync(f.existsSync);
|
||||
doItSync(f.createSync);
|
||||
doItSync(f.deleteSync);
|
||||
doItSync(f.lengthSync);
|
||||
doItSync(f.lastModifiedSync);
|
||||
doItSync(() => f.path);
|
||||
doItSync(() => f.openRead().listen((_) {}, onError: (e) {}));
|
||||
doItSync(f.readAsBytesSync);
|
||||
doItSync(f.readAsStringSync);
|
||||
doItSync(f.readAsLinesSync);
|
||||
typeMapping.forEach((k2, v2) {
|
||||
doItSync(() => f.openSync(mode: v2));
|
||||
doItSync(() => f.openWrite(mode: v2));
|
||||
doItSync(() => f.readAsStringSync(encoding: v2));
|
||||
doItSync(() => f.readAsLinesSync(encoding: v2));
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
fuzzAsyncMethods() {
|
||||
asyncStart();
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
typeMapping.forEach((k, v) {
|
||||
doItSync(() {
|
||||
var f = new File(v);
|
||||
futures.add(doItAsync(f.exists));
|
||||
futures.add(doItAsync(f.delete));
|
||||
futures.add(doItAsync(f.parent));
|
||||
futures.add(doItAsync(f.length));
|
||||
futures.add(doItAsync(f.modified));
|
||||
futures.add(doItAsync(f.open));
|
||||
futures.add(doItAsync(f.fullPath));
|
||||
futures.add(doItAsync(f.readAsBytes));
|
||||
futures.add(doItAsync(f.readAsLines));
|
||||
futures.add(doItAsync(f.readAsString));
|
||||
typeMapping.forEach((k2, v2) {
|
||||
futures.add(doItAsync(() => f.open(mode: v2)));
|
||||
futures.add(doItAsync(() => f.readAsString(encoding: v2)));
|
||||
futures.add(doItAsync(() => f.readAsLines(encoding: v2)));
|
||||
});
|
||||
File f;
|
||||
doItSync(() => f = new File(v));
|
||||
if (f == null) return;
|
||||
futures.add(doItAsync(f.exists));
|
||||
futures.add(doItAsync(f.delete));
|
||||
futures.add(doItAsync(() => f.parent));
|
||||
futures.add(doItAsync(f.length));
|
||||
futures.add(doItAsync(f.lastModified));
|
||||
futures.add(doItAsync(f.open));
|
||||
futures.add(doItAsync(() => f.path));
|
||||
futures.add(doItAsync(f.readAsBytes));
|
||||
futures.add(doItAsync(f.readAsLines));
|
||||
futures.add(doItAsync(f.readAsString));
|
||||
typeMapping.forEach((k2, v2) {
|
||||
futures.add(doItAsync(() => f.open(mode: v2)));
|
||||
futures.add(doItAsync(() => f.readAsString(encoding: v2)));
|
||||
futures.add(doItAsync(() => f.readAsLines(encoding: v2)));
|
||||
});
|
||||
});
|
||||
Future.wait(futures).then((_) => asyncEnd());
|
||||
|
@ -91,7 +91,7 @@ fuzzAsyncRandomAccessMethods() {
|
|||
var file = new File('${temp.path}/x');
|
||||
file.createSync();
|
||||
var modes = [FileMode.READ, FileMode.WRITE, FileMode.APPEND];
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
var openedFiles = [];
|
||||
for (var m in modes) {
|
||||
var opened = file.openSync(mode: m);
|
|
@ -213,7 +213,6 @@ Future testDirectoryListingBrokenLink() {
|
|||
sawLink = true;
|
||||
Expect.isTrue(entity.path.endsWith(link));
|
||||
}
|
||||
return true;
|
||||
}))
|
||||
.then((_) => temp.delete(recursive: true));
|
||||
});
|
|
@ -2,8 +2,8 @@
|
|||
// for details. All rights reserved. Use of this source code is governed by a
|
||||
// BSD-style license that can be found in the LICENSE file.
|
||||
|
||||
import "package:expect/expect.dart";
|
||||
import "dart:io";
|
||||
import "package:expect/expect.dart";
|
||||
|
||||
testFile(String input) {
|
||||
if (Platform.isWindows) {
|
63
tests/standalone_2/io/file_test.txt
Normal file
63
tests/standalone_2/io/file_test.txt
Normal file
|
@ -0,0 +1,63 @@
|
|||
// Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file
|
||||
// for details. All rights reserved. Use of this source code is governed by a
|
||||
// BSD-style license that can be found in the LICENSE file.
|
||||
|
||||
#include "bin/file.h"
|
||||
#include "platform/assert.h"
|
||||
#include "platform/globals.h"
|
||||
#include "vm/unit_test.h"
|
||||
|
||||
namespace dart {
|
||||
namespace bin {
|
||||
|
||||
// Helper method to be able to run the test from the runtime
|
||||
// directory, or the top directory.
|
||||
static const char* GetFileName(const char* name) {
|
||||
if (File::Exists(name)) {
|
||||
return name;
|
||||
} else {
|
||||
static const int kRuntimeLength = strlen("runtime/");
|
||||
return name + kRuntimeLength;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
TEST_CASE(Read) {
|
||||
const char* kFilename = GetFileName("runtime/bin/file_test.cc");
|
||||
File* file = File::Open(kFilename, File::kRead);
|
||||
EXPECT(file != NULL);
|
||||
char buffer[16];
|
||||
buffer[0] = '\0';
|
||||
EXPECT(file->ReadFully(buffer, 13)); // ReadFully returns true.
|
||||
buffer[13] = '\0';
|
||||
EXPECT_STREQ("// Copyright ", buffer);
|
||||
EXPECT(!file->WriteByte(1)); // Cannot write to a read-only file.
|
||||
file->Release();
|
||||
}
|
||||
|
||||
|
||||
TEST_CASE(FileLength) {
|
||||
const char* kFilename =
|
||||
GetFileName("runtime/tests/vm/data/fixed_length_file");
|
||||
File* file = File::Open(kFilename, File::kRead);
|
||||
EXPECT(file != NULL);
|
||||
EXPECT_EQ(42, file->Length());
|
||||
file->Release();
|
||||
}
|
||||
|
||||
|
||||
TEST_CASE(FilePosition) {
|
||||
char buf[42];
|
||||
const char* kFilename =
|
||||
GetFileName("runtime/tests/vm/data/fixed_length_file");
|
||||
File* file = File::Open(kFilename, File::kRead);
|
||||
EXPECT(file != NULL);
|
||||
EXPECT(file->ReadFully(buf, 12));
|
||||
EXPECT_EQ(12, file->Position());
|
||||
EXPECT(file->ReadFully(buf, 6));
|
||||
EXPECT_EQ(18, file->Position());
|
||||
file->Release();
|
||||
}
|
||||
|
||||
} // namespace bin
|
||||
} // namespace dart
|
1
tests/standalone_2/io/fixed_length_file
Normal file
1
tests/standalone_2/io/fixed_length_file
Normal file
|
@ -0,0 +1 @@
|
|||
This file should contain exactly 42 bytes.
|
0
tests/standalone_2/io/fixed_length_file_out
Normal file
0
tests/standalone_2/io/fixed_length_file_out
Normal file
|
@ -50,7 +50,7 @@ doItSync(Function f) {
|
|||
// Perform async operation and transform the future for the operation
|
||||
// into a future that never fails by treating errors as normal
|
||||
// completion.
|
||||
Future doItAsync(void f()) {
|
||||
Future doItAsync(FutureOr f()) {
|
||||
// Ignore value and errors.
|
||||
return new Future.delayed(Duration.ZERO, f)
|
||||
.catchError((_) {})
|
|
@ -7,10 +7,10 @@
|
|||
// VMOptions=--short_socket_write
|
||||
// VMOptions=--short_socket_read --short_socket_write
|
||||
|
||||
import "package:expect/expect.dart";
|
||||
import "dart:async";
|
||||
import "dart:isolate";
|
||||
import "dart:io";
|
||||
import "package:expect/expect.dart";
|
||||
|
||||
// Client makes a HTTP 1.0 request without connection keep alive. The
|
||||
// server sets a content length but still needs to close the
|
|
@ -107,7 +107,7 @@ class TestServer {
|
|||
var response = request.response;
|
||||
response.statusCode = HttpStatus.NOT_FOUND;
|
||||
response.headers.set("Content-Type", "text/html; charset=UTF-8");
|
||||
response.outputStream.writeString("Page not found");
|
||||
response.write("Page not found");
|
||||
response.close();
|
||||
}
|
||||
|
|
@ -157,7 +157,7 @@ void testNoCredentials(String algorithm, String qop) {
|
|||
});
|
||||
}
|
||||
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
for (int i = 0; i < 5; i++) {
|
||||
futures.add(
|
||||
makeRequest(Uri.parse("http://127.0.0.1:${server.port}/digest")));
|
||||
|
@ -187,7 +187,7 @@ void testCredentials(String algorithm, String qop) {
|
|||
client.addCredentials(Uri.parse("http://127.0.0.1:${server.port}/digest"),
|
||||
"test", new HttpClientDigestCredentials("dart", "password"));
|
||||
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
for (int i = 0; i < 2; i++) {
|
||||
String uriBase = "http://127.0.0.1:${server.port}/digest";
|
||||
futures.add(makeRequest(Uri.parse(uriBase)));
|
||||
|
@ -230,7 +230,7 @@ void testAuthenticateCallback(String algorithm, String qop) {
|
|||
});
|
||||
}
|
||||
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
for (int i = 0; i < 5; i++) {
|
||||
futures.add(
|
||||
makeRequest(Uri.parse("http://127.0.0.1:${server.port}/digest")));
|
|
@ -102,7 +102,7 @@ void testBasicNoCredentials() {
|
|||
});
|
||||
}
|
||||
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
for (int i = 0; i < 5; i++) {
|
||||
futures.add(
|
||||
makeRequest(Uri.parse("http://127.0.0.1:${server.port}/test$i")));
|
||||
|
@ -135,7 +135,7 @@ void testBasicCredentials() {
|
|||
"realm", new HttpClientBasicCredentials("test$i", "test$i"));
|
||||
}
|
||||
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
for (int i = 0; i < 5; i++) {
|
||||
futures.add(
|
||||
makeRequest(Uri.parse("http://127.0.0.1:${server.port}/test$i")));
|
||||
|
@ -180,7 +180,7 @@ void testBasicAuthenticateCallback() {
|
|||
}
|
||||
|
||||
List<Future> makeRequests() {
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
for (int i = 0; i < 5; i++) {
|
||||
futures.add(
|
||||
makeRequest(Uri.parse("http://127.0.0.1:${server.port}/test$i")));
|
|
@ -66,7 +66,7 @@ void main() {
|
|||
if (ok) {
|
||||
addresses.add('::1');
|
||||
}
|
||||
var futures = [];
|
||||
var futures = <Future>[];
|
||||
for (var host in addresses) {
|
||||
futures.add(testBindShared(host, false));
|
||||
futures.add(testBindShared(host, true));
|
|
@ -147,6 +147,7 @@ void testGetDataServerForceClose() {
|
|||
});
|
||||
}
|
||||
|
||||
typedef Future<HttpClientRequest> Callback1(String a1, int a2, String a3);
|
||||
void testOpenEmptyRequest() {
|
||||
var client = new HttpClient();
|
||||
var methods = [
|
||||
|
@ -165,7 +166,8 @@ void testOpenEmptyRequest() {
|
|||
request.pipe(request.response);
|
||||
});
|
||||
|
||||
method[0]("127.0.0.1", server.port, "/")
|
||||
Callback1 cb = method[0] as Callback1;
|
||||
cb("127.0.0.1", server.port, "/")
|
||||
.then((request) => request.close())
|
||||
.then((response) {
|
||||
response.listen((data) {}, onDone: server.close);
|
||||
|
@ -174,6 +176,7 @@ void testOpenEmptyRequest() {
|
|||
}
|
||||
}
|
||||
|
||||
typedef Future<HttpClientRequest> Callback2(Uri a1);
|
||||
void testOpenUrlEmptyRequest() {
|
||||
var client = new HttpClient();
|
||||
var methods = [
|
||||
|
@ -192,7 +195,8 @@ void testOpenUrlEmptyRequest() {
|
|||
request.pipe(request.response);
|
||||
});
|
||||
|
||||
method[0](Uri.parse("http://127.0.0.1:${server.port}/"))
|
||||
Callback2 cb = method[0] as Callback2;
|
||||
cb(Uri.parse("http://127.0.0.1:${server.port}/"))
|
||||
.then((request) => request.close())
|
||||
.then((response) {
|
||||
response.listen((data) {}, onDone: server.close);
|
|
@ -37,7 +37,7 @@ void runServerProcess() {
|
|||
server.idleTimeout = const Duration(hours: 1);
|
||||
|
||||
var subscription = server.listen((HttpRequest request) {
|
||||
return request.response
|
||||
request.response
|
||||
..write('hello world')
|
||||
..close();
|
||||
});
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue