Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1 | X509 CRT information #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 3 | x509_cert_info:"data_files/server1.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 4 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 5 | X509 CRT information #1 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 6 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 7 | x509_cert_info:"data_files/server1.der":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
| 8 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 9 | X509 CRT information #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 10 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 11 | x509_cert_info:"data_files/server2.crt":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 12 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 13 | X509 CRT information #2 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 14 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 15 | x509_cert_info:"data_files/server2.der":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
| 16 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 17 | X509 CRT information #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 18 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 19 | x509_cert_info:"data_files/test-ca.crt":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2011-02-12 14\:44\:00\nexpires on \: 2021-02-12 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 20 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 21 | X509 CRT information #3 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 22 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 23 | x509_cert_info:"data_files/test-ca.der":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2011-02-12 14\:44\:00\nexpires on \: 2021-02-12 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n" |
| 24 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 25 | X509 CRT information MD2 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 26 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD2_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 27 | x509_cert_info:"data_files/cert_md2.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD2\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 28 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 29 | X509 CRT information MD4 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 30 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD4_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 31 | x509_cert_info:"data_files/cert_md4.crt":"cert. version \: 3\nserial number \: 05\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD4\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 32 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 33 | X509 CRT information MD5 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 34 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD5_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 35 | x509_cert_info:"data_files/cert_md5.crt":"cert. version \: 3\nserial number \: 06\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD5\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 36 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 37 | X509 CRT information SHA1 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 38 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 39 | x509_cert_info:"data_files/cert_sha1.crt":"cert. version \: 3\nserial number \: 07\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA1\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 40 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 41 | X509 CRT information SHA224 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 42 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 43 | x509_cert_info:"data_files/cert_sha224.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA224\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 44 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 45 | X509 CRT information SHA256 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 46 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 47 | x509_cert_info:"data_files/cert_sha256.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA256\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 48 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 49 | X509 CRT information SHA384 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 50 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 51 | x509_cert_info:"data_files/cert_sha384.crt":"cert. version \: 3\nserial number \: 0A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA384\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 52 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 53 | X509 CRT information SHA512 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 54 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 55 | x509_cert_info:"data_files/cert_sha512.crt":"cert. version \: 3\nserial number \: 0B\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA512\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 56 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 57 | X509 CRT information RSA-PSS, SHA1 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 58 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 59 | x509_cert_info:"data_files/server9.crt":"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 60 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 61 | X509 CRT information RSA-PSS, SHA224 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 62 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 63 | x509_cert_info:"data_files/server9-sha224.crt":"cert. version \: 3\nserial number \: 17\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:36\nexpires on \: 2024-01-18 13\:57\:36\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 64 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 65 | X509 CRT information RSA-PSS, SHA256 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 66 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 67 | x509_cert_info:"data_files/server9-sha256.crt":"cert. version \: 3\nserial number \: 18\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:45\nexpires on \: 2024-01-18 13\:57\:45\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 68 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 69 | X509 CRT information RSA-PSS, SHA384 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 70 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 71 | x509_cert_info:"data_files/server9-sha384.crt":"cert. version \: 3\nserial number \: 19\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:58\nexpires on \: 2024-01-18 13\:57\:58\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 72 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 73 | X509 CRT information RSA-PSS, SHA512 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 74 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 75 | x509_cert_info:"data_files/server9-sha512.crt":"cert. version \: 3\nserial number \: 1A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:58\:12\nexpires on \: 2024-01-18 13\:58\:12\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 59a75d5 | 2014-01-22 10:12:57 +0100 | [diff] [blame] | 76 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 77 | X509 CRT information EC, SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 78 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 79 | x509_cert_info:"data_files/server5-sha1.crt":"cert. version \: 3\nserial number \: 12\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 80 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 81 | X509 CRT information EC, SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 82 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 83 | x509_cert_info:"data_files/server5-sha224.crt":"cert. version \: 3\nserial number \: 13\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 84 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 85 | X509 CRT information EC, SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 86 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 87 | x509_cert_info:"data_files/server5.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 88 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 89 | X509 CRT information EC, SHA384 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 90 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 91 | x509_cert_info:"data_files/server5-sha384.crt":"cert. version \: 3\nserial number \: 14\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 92 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 93 | X509 CRT information EC, SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 94 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 95 | x509_cert_info:"data_files/server5-sha512.crt":"cert. version \: 3\nserial number \: 15\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 96 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 97 | X509 CRT information EC, SHA256 Digest, hardware module name SAN |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 98 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 99 | x509_cert_info:"data_files/server5-othername.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nissued on \: 2019-03-24 09\:06\:02\nexpires on \: 2029-03-21 09\:06\:02\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n" |
| 100 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 101 | X509 CRT information EC, SHA256 Digest, Wisun Fan device |
Ron Eldor | 3c4734a | 2019-03-25 14:05:23 +0200 | [diff] [blame] | 102 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 103 | x509_cert_info:"data_files/server5-fan.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nissued on \: 2019-03-25 09\:03\:46\nexpires on \: 2029-03-22 09\:03\:46\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\next key usage \: Wi-SUN Alliance Field Area Network (FAN)\n" |
| 104 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 105 | X509 CRT information, NS Cert Type |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 106 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 919f8f5 | 2014-04-01 13:01:11 +0200 | [diff] [blame] | 107 | x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\ncert. type \: SSL Server\n" |
| 108 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 109 | X509 CRT information, Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 110 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 7b30cfc | 2014-04-01 18:00:07 +0200 | [diff] [blame] | 111 | x509_cert_info:"data_files/server1.key_usage.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n" |
Manuel Pégourié-Gonnard | 65c2ddc | 2014-04-01 14:12:11 +0200 | [diff] [blame] | 112 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 113 | X509 CRT information, Key Usage with decipherOnly |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 114 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 9a70225 | 2015-06-23 10:14:36 +0200 | [diff] [blame] | 115 | x509_cert_info:"data_files/keyUsage.decipherOnly.crt":"cert. version \: 3\nserial number \: 9B\:13\:CE\:4C\:A5\:6F\:DE\:52\nissuer name \: C=GB, L=Cambridge, O=Default Company Ltd\nsubject name \: C=GB, L=Cambridge, O=Default Company Ltd\nissued on \: 2015-05-12 10\:36\:55\nexpires on \: 2018-05-11 10\:36\:55\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment, Decipher Only\n" |
| 116 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 117 | X509 CRT information, Subject Alt Name |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 118 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 119 | x509_cert_info:"data_files/cert_example_multi.crt":"cert. version \: 3\nserial number \: 11\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=www.example.com\nissued on \: 2012-05-10 13\:23\:41\nexpires on \: 2022-05-11 13\:23\:41\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: example.com\n dNSName \: example.net\n dNSName \: *.example.org\n" |
| 120 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 121 | X509 CRT information, Multiple different Subject Alt Name |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 122 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 123 | x509_cert_info:"data_files/multiple_san.crt":"cert. version \: 3\nserial number \: 04\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nissued on \: 2019-04-22 16\:10\:48\nexpires on \: 2029-04-19 16\:10\:48\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n dNSName \: example.com\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n dNSName \: example.net\n dNSName \: *.example.org\n" |
Manuel Pégourié-Gonnard | bce2b30 | 2014-04-01 13:43:28 +0200 | [diff] [blame] | 124 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 125 | X509 CRT information, Subject Alt Name + Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 126 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Janos Follath | 22f605f | 2019-05-10 10:37:17 +0100 | [diff] [blame] | 127 | x509_cert_info:"data_files/cert_example_multi_nocn.crt":"cert. version \: 3\nserial number \: F7\:C6\:7F\:F8\:E9\:A9\:63\:F9\nissuer name \: C=NL\nsubject name \: C=NL\nissued on \: 2014-01-22 10\:04\:33\nexpires on \: 2024-01-22 10\:04\:33\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: www.shotokan-braunschweig.de\n dNSName \: www.massimo-abate.eu\n <unsupported>\n <unsupported>\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n" |
Manuel Pégourié-Gonnard | 65c2ddc | 2014-04-01 14:12:11 +0200 | [diff] [blame] | 128 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 129 | X509 CRT information, RSA Certificate Policy any |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 130 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 131 | x509_cert_info:"data_files/test-ca-any_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-03-21 16\:40\:59\nexpires on \: 2029-03-21 16\:40\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 132 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 133 | X509 CRT information, ECDSA Certificate Policy any |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 134 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 135 | x509_cert_info:"data_files/test-ca-any_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-03-25 09\:02\:45\nexpires on \: 2029-03-25 09\:02\:45\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 136 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 137 | X509 CRT information, RSA Certificate Policy any with qualifier |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 138 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 139 | x509_cert_info:"data_files/test-ca-any_policy_with_qualifier.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:14\:31\nexpires on \: 2029-04-28 13\:14\:31\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 140 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 141 | X509 CRT information, ECDSA Certificate Policy any with qualifier |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 142 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 143 | x509_cert_info:"data_files/test-ca-any_policy_with_qualifier_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 10\:16\:05\nexpires on \: 2029-04-28 10\:16\:05\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 144 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 145 | X509 CRT information, RSA Certificate multiple Policies |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 146 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 147 | x509_cert_info:"data_files/test-ca-multi_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 12\:59\:19\nexpires on \: 2029-04-28 12\:59\:19\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n" |
| 148 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 149 | X509 CRT information, ECDSA Certificate multiple Policies |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 150 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 151 | x509_cert_info:"data_files/test-ca-multi_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 12\:59\:51\nexpires on \: 2029-04-28 12\:59\:51\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n" |
| 152 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 153 | X509 CRT information, RSA Certificate unsupported policy |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 154 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 155 | x509_cert_info:"data_files/test-ca-unsupported_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:00\:13\nexpires on \: 2029-04-28 13\:00\:13\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n" |
| 156 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 157 | X509 CRT information, ECDSA Certificate unsupported policy |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 158 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 159 | x509_cert_info:"data_files/test-ca-unsupported_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 13\:00\:19\nexpires on \: 2029-04-28 13\:00\:19\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n" |
| 160 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 161 | X509 CRT information, Key Usage + Extended Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 162 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 7b30cfc | 2014-04-01 18:00:07 +0200 | [diff] [blame] | 163 | x509_cert_info:"data_files/server1.ext_ku.crt":"cert. version \: 3\nserial number \: 21\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2014-04-01 14\:44\:43\nexpires on \: 2024-03-29 14\:44\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\next key usage \: TLS Web Server Authentication\n" |
Manuel Pégourié-Gonnard | f6f4ab4 | 2014-04-01 17:32:44 +0200 | [diff] [blame] | 164 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 165 | X509 CRT information RSA signed by EC |
palaviv | f180df9 | 2016-08-07 11:56:02 +0300 | [diff] [blame] | 166 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 167 | x509_cert_info:"data_files/server4.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 168 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 169 | X509 CRT information EC signed by RSA |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 170 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 171 | x509_cert_info:"data_files/server3.crt":"cert. version \: 3\nserial number \: 0D\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-08-09 09\:17\:03\nexpires on \: 2023-08-07 09\:17\:03\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 172 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 173 | X509 CRT information Bitstring in subject name |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 174 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Janos Follath | 22f605f | 2019-05-10 10:37:17 +0100 | [diff] [blame] | 175 | x509_cert_info:"data_files/bitstring-in-dn.pem":"cert. version \: 3\nserial number \: 02\nissuer name \: CN=Test CA 01, ST=Ecnivorp, C=XX, emailAddress=tca@example.com, O=Test CA Authority\nsubject name \: C=XX, O=tca, ST=Ecnivorp, OU=TCA, CN=Client, emailAddress=client@example.com, serialNumber=7101012255, uniqueIdentifier=?7101012255\nissued on \: 2015-03-11 12\:06\:51\nexpires on \: 2025-03-08 12\:06\:51\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n <unsupported>\next key usage \: TLS Web Client Authentication\n" |
Manuel Pégourié-Gonnard | 39ead3e | 2015-03-27 13:09:21 +0100 | [diff] [blame] | 176 | |
Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 177 | X509 certificate v1 with extension |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 178 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_SHA1_C |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 179 | x509_cert_info:"data_files/cert_v1_with_ext.crt":"cert. version \: 1\nserial number \: BD\:ED\:44\:C7\:D2\:3E\:C2\:A4\nissuer name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nsubject name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nissued on \: 2013-07-04 16\:17\:02\nexpires on \: 2014-07-04 16\:17\:02\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nsubject alt name \:\n dNSName \: identity-check.org\n dNSName \: www.identity-check.org\n" |
| 180 | |
| 181 | X509 SAN parsing otherName |
| 182 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 183 | x509_parse_san:"data_files/server5-othername.crt":"type \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\n" |
| 184 | |
| 185 | X509 SAN parsing dNSName |
| 186 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 187 | x509_parse_san:"data_files/cert_example_multi.crt":"type \: 2\ndNSName \: example.com\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n" |
| 188 | |
| 189 | X509 SAN parsing Multiple different types |
| 190 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 191 | x509_parse_san:"data_files/multiple_san.crt":"type \: 2\ndNSName \: example.com\ntype \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n" |
| 192 | |
| 193 | X509 SAN parsing, no subject alt name |
| 194 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 195 | x509_parse_san:"data_files/server4.crt":"" |
| 196 | |
| 197 | X509 SAN parsing, unsupported otherName name |
| 198 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 199 | x509_parse_san:"data_files/server5-unsupported_othername.crt":"" |
Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 200 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 201 | X509 CRL information #1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 202 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 203 | mbedtls_x509_crl_info:"data_files/crl_expired.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-20 10\:24\:19\nnext update \: 2011-02-20 11\:24\:19\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 204 | |
| 205 | X509 CRL Information MD2 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 206 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD2_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 207 | mbedtls_x509_crl_info:"data_files/crl_md2.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2009-07-19 19\:56\:37\nnext update \: 2009-09-17 19\:56\:37\nRevoked certificates\:\nserial number\: 01 revocation date\: 2009-02-09 21\:12\:36\nserial number\: 03 revocation date\: 2009-02-09 21\:12\:36\nsigned using \: RSA with MD2\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 208 | |
| 209 | X509 CRL Information MD4 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 210 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 211 | mbedtls_x509_crl_info:"data_files/crl_md4.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD4\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 212 | |
| 213 | X509 CRL Information MD5 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 214 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 215 | mbedtls_x509_crl_info:"data_files/crl_md5.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD5\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 216 | |
| 217 | X509 CRL Information SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 218 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 219 | mbedtls_x509_crl_info:"data_files/crl_sha1.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 220 | |
| 221 | X509 CRL Information SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 222 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 223 | mbedtls_x509_crl_info:"data_files/crl_sha224.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 224 | |
| 225 | X509 CRL Information SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 226 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 227 | mbedtls_x509_crl_info:"data_files/crl_sha256.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 228 | |
| 229 | X509 CRL Information SHA384 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 230 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 231 | mbedtls_x509_crl_info:"data_files/crl_sha384.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 232 | |
| 233 | X509 CRL Information SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 234 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 235 | mbedtls_x509_crl_info:"data_files/crl_sha512.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 236 | |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 237 | X509 CRL information RSA-PSS, SHA1 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 238 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
| 239 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:46\:35\nnext update \: 2024-01-18 13\:46\:35\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 240 | |
| 241 | X509 CRL information RSA-PSS, SHA224 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 242 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 243 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:06\nnext update \: 2024-01-18 13\:56\:06\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 244 | |
| 245 | X509 CRL information RSA-PSS, SHA256 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 246 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 247 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:16\nnext update \: 2024-01-18 13\:56\:16\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 248 | |
| 249 | X509 CRL information RSA-PSS, SHA384 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 250 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 251 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:28\nnext update \: 2024-01-18 13\:56\:28\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 252 | |
| 253 | X509 CRL information RSA-PSS, SHA512 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 254 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 255 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:38\nnext update \: 2024-01-18 13\:56\:38\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 256 | |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 257 | X509 CRL Information EC, SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 258 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 259 | mbedtls_x509_crl_info:"data_files/crl-ec-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA1\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 260 | |
| 261 | X509 CRL Information EC, SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 262 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 263 | mbedtls_x509_crl_info:"data_files/crl-ec-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA224\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 264 | |
| 265 | X509 CRL Information EC, SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 266 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 267 | mbedtls_x509_crl_info:"data_files/crl-ec-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA256\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 268 | |
| 269 | X509 CRL Information EC, SHA384 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 270 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 271 | mbedtls_x509_crl_info:"data_files/crl-ec-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA384\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 272 | |
| 273 | X509 CRL Information EC, SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 274 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 275 | mbedtls_x509_crl_info:"data_files/crl-ec-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA512\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 276 | |
Andres AG | a39db39 | 2016-12-08 17:10:38 +0000 | [diff] [blame] | 277 | X509 CRL Malformed Input (trailing spaces at end of file) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 278 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Andres AG | a39db39 | 2016-12-08 17:10:38 +0000 | [diff] [blame] | 279 | mbedtls_x509_crl_parse:"data_files/crl-malformed-trailing-spaces.pem":MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT |
| 280 | |
Manuel Pégourié-Gonnard | fd3e4fb | 2018-03-13 11:53:30 +0100 | [diff] [blame] | 281 | X509 CRL Unsupported critical extension (issuingDistributionPoint) |
| 282 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 283 | mbedtls_x509_crl_parse:"data_files/crl-idp.pem":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 284 | |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 285 | X509 CRL Unsupported non-critical extension (issuingDistributionPoint) |
| 286 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 287 | mbedtls_x509_crl_parse:"data_files/crl-idpnc.pem":0 |
| 288 | |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 289 | X509 CSR Information RSA with MD4 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 290 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 291 | mbedtls_x509_csr_info:"data_files/server1.req.md4":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 292 | |
| 293 | X509 CSR Information RSA with MD5 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 294 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 295 | mbedtls_x509_csr_info:"data_files/server1.req.md5":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 296 | |
| 297 | X509 CSR Information RSA with SHA1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 298 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 299 | mbedtls_x509_csr_info:"data_files/server1.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 300 | |
| 301 | X509 CSR Information RSA with SHA224 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 302 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 303 | mbedtls_x509_csr_info:"data_files/server1.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 304 | |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 305 | X509 CSR Information RSA with SHA-256 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 306 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 307 | mbedtls_x509_csr_info:"data_files/server1.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 308 | |
| 309 | X509 CSR Information RSA with SHA384 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 310 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 311 | mbedtls_x509_csr_info:"data_files/server1.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 312 | |
| 313 | X509 CSR Information RSA with SHA512 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 314 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 315 | mbedtls_x509_csr_info:"data_files/server1.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 316 | |
| 317 | X509 CSR Information EC with SHA1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 318 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 319 | mbedtls_x509_csr_info:"data_files/server5.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 320 | |
| 321 | X509 CSR Information EC with SHA224 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 322 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 323 | mbedtls_x509_csr_info:"data_files/server5.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 324 | |
| 325 | X509 CSR Information EC with SHA256 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 326 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 327 | mbedtls_x509_csr_info:"data_files/server5.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 328 | |
| 329 | X509 CSR Information EC with SHA384 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 330 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 331 | mbedtls_x509_csr_info:"data_files/server5.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 332 | |
| 333 | X509 CSR Information EC with SHA512 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 334 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 335 | mbedtls_x509_csr_info:"data_files/server5.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 336 | |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 337 | X509 CSR Information RSA-PSS with SHA1 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 338 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
| 339 | mbedtls_x509_csr_info:"data_files/server9.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0x6A)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 340 | |
| 341 | X509 CSR Information RSA-PSS with SHA224 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 342 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 343 | mbedtls_x509_csr_info:"data_files/server9.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0x62)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 344 | |
| 345 | X509 CSR Information RSA-PSS with SHA256 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 346 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 347 | mbedtls_x509_csr_info:"data_files/server9.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0x5E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 348 | |
| 349 | X509 CSR Information RSA-PSS with SHA384 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 350 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 351 | mbedtls_x509_csr_info:"data_files/server9.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0x4E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 352 | |
| 353 | X509 CSR Information RSA-PSS with SHA512 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 354 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 355 | mbedtls_x509_csr_info:"data_files/server9.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0x3E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 356 | |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 357 | X509 CSR Information RSA with SHA-256 - Microsoft header |
Simon Butcher | 03de210 | 2018-10-06 16:24:13 +0100 | [diff] [blame] | 358 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
| 359 | mbedtls_x509_csr_info:"data_files/server1-ms.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n" |
| 360 | |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 361 | X509 Verify Information: empty |
| 362 | x509_verify_info:0:"":"" |
| 363 | |
| 364 | X509 Verify Information: one issue |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 365 | x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:"":"Certificate was missing\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 366 | |
| 367 | X509 Verify Information: two issues |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 368 | x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:"":"The certificate validity has expired\nThe CRL is expired\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 369 | |
| 370 | X509 Verify Information: two issues, one unknown |
Manuel Pégourié-Gonnard | 9505164 | 2015-06-15 10:39:46 +0200 | [diff] [blame] | 371 | x509_verify_info:MBEDTLS_X509_BADCERT_OTHER | 0x80000000:"":"Other reason (can be used by verify callback)\nUnknown reason (this should not happen)\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 372 | |
| 373 | X509 Verify Information: empty, with prefix |
| 374 | x509_verify_info:0:" ! ":"" |
| 375 | |
| 376 | X509 Verify Information: one issue, with prefix |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 377 | x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:" ! ":" ! Certificate was missing\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 378 | |
| 379 | X509 Verify Information: two issues, with prefix |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 380 | x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:" ! ":" ! The certificate validity has expired\n ! The CRL is expired\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 381 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 382 | X509 Get Distinguished Name #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 383 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 384 | mbedtls_x509_dn_gets:"data_files/server1.crt":"subject":"C=NL, O=PolarSSL, CN=PolarSSL Server 1" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 385 | |
| 386 | X509 Get Distinguished Name #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 387 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 388 | mbedtls_x509_dn_gets:"data_files/server1.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 389 | |
| 390 | X509 Get Distinguished Name #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 391 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 392 | mbedtls_x509_dn_gets:"data_files/server2.crt":"subject":"C=NL, O=PolarSSL, CN=localhost" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 393 | |
| 394 | X509 Get Distinguished Name #4 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 395 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 396 | mbedtls_x509_dn_gets:"data_files/server2.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 397 | |
| 398 | X509 Time Expired #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 399 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 400 | mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 401 | |
| 402 | X509 Time Expired #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 403 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 404 | mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 405 | |
| 406 | X509 Time Expired #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 407 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 408 | mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 409 | |
| 410 | X509 Time Expired #4 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 411 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 412 | mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 413 | |
| 414 | X509 Time Expired #5 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 415 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 416 | mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 417 | |
Manuel Pégourié-Gonnard | e7f64a8 | 2013-08-09 10:59:25 +0200 | [diff] [blame] | 418 | X509 Time Expired #6 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 419 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 420 | mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 421 | |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 422 | X509 Time Future #1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 423 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 424 | mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_from":0 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 425 | |
| 426 | X509 Time Future #2 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 427 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 428 | mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 429 | |
| 430 | X509 Time Future #3 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 431 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 432 | mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_from":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 433 | |
| 434 | X509 Time Future #4 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 435 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 436 | mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 437 | |
| 438 | X509 Time Future #5 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 439 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 440 | mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_from":0 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 441 | |
| 442 | X509 Time Future #6 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 443 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 444 | mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 445 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 446 | X509 CRT verification #1 (Revoked Cert, Expired CRL, no CN) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 447 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 448 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 449 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 450 | X509 CRT verification #1a (Revoked Cert, Future CRL, no CN) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 451 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 452 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 453 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 454 | X509 CRT verification #2 (Revoked Cert, Expired CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 455 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 456 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 457 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 458 | X509 CRT verification #2a (Revoked Cert, Future CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 459 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 460 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"localhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 461 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 462 | X509 CRT verification #3 (Revoked Cert, Future CRL, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 463 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 464 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 465 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 466 | X509 CRT verification #3a (Revoked Cert, Expired CRL, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 467 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 468 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 469 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 470 | X509 CRT verification #4 (Valid Cert, Expired CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 471 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 472 | x509_verify:"data_files/server2.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 473 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 474 | X509 CRT verification #4a (Revoked Cert, Future CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 475 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 476 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 477 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 478 | X509 CRT verification #5 (Revoked Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 479 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 480 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 481 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 482 | X509 CRT verification #5' (Revoked Cert, differing DN string formats #1) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 483 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 484 | x509_verify:"data_files/server1.crt":"data_files/test-ca_utf8.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 485 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 486 | X509 CRT verification #5'' (Revoked Cert, differing DN string formats #2) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 487 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 488 | x509_verify:"data_files/server1.crt":"data_files/test-ca_printable.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 489 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 490 | X509 CRT verification #5''' (Revoked Cert, differing upper and lower case) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 491 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 492 | x509_verify:"data_files/server1.crt":"data_files/test-ca_uppercase.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 493 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 494 | X509 CRT verification #6 (Revoked Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 495 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 496 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 497 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 498 | X509 CRT verification #7 (Revoked Cert, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 499 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 500 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 501 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 502 | X509 CRT verification #8 (Valid Cert) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 503 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 504 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 505 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 506 | X509 CRT verification #8a (Expired Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 507 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 508 | x509_verify:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 509 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 510 | X509 CRT verification #8b (Future Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 511 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 512 | x509_verify:"data_files/server5-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 513 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 514 | X509 CRT verification #8c (Expired Cert, longer chain) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 515 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | 29d60fb | 2017-06-05 10:20:32 +0200 | [diff] [blame] | 516 | x509_verify:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
| 517 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 518 | X509 CRT verification #8d (Future Cert, longer chain) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 519 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | 29d60fb | 2017-06-05 10:20:32 +0200 | [diff] [blame] | 520 | x509_verify:"data_files/server7-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
| 521 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 522 | X509 CRT verification #9 (Not trusted Cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 523 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 524 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 525 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 526 | X509 CRT verification #10 (Not trusted Cert, Expired CRL) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 527 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 528 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 529 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 530 | X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 forbidden) |
Hanno Becker | 7b8abee | 2019-06-03 14:25:18 +0100 | [diff] [blame] | 531 | depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 532 | x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
| 533 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 534 | X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 forbidden) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 535 | depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 536 | x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 537 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 538 | X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 forbidden) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 539 | depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 540 | x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 541 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 542 | X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 543 | depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 544 | x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 545 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 546 | X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 547 | depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 548 | x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 549 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 550 | X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 551 | depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 552 | x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 553 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 554 | X509 CRT verification #14 (Valid Cert SHA1 Digest explicitly allowed in profile) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 555 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 556 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 557 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 558 | X509 CRT verification #14 (Valid Cert SHA1 Digest allowed in compile-time default profile) |
Gilles Peskine | 5d2511c | 2017-05-12 13:16:40 +0200 | [diff] [blame] | 559 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 560 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"":"NULL" |
Gilles Peskine | 4fa6bed | 2017-05-11 16:41:25 +0200 | [diff] [blame] | 561 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 562 | X509 CRT verification #14 (Valid Cert SHA1 Digest forbidden in default profile) |
Gilles Peskine | f11d33b | 2017-05-22 16:47:22 +0200 | [diff] [blame] | 563 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:!MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 564 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_BAD_MD | MBEDTLS_X509_BADCERT_BAD_MD:"":"NULL" |
Gilles Peskine | 2dc81a0 | 2017-05-05 19:00:39 +0200 | [diff] [blame] | 565 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 566 | X509 CRT verification #15 (Valid Cert SHA224 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 567 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 568 | x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 569 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 570 | X509 CRT verification #16 (Valid Cert SHA256 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 571 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 572 | x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 573 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 574 | X509 CRT verification #17 (Valid Cert SHA384 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 575 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 576 | x509_verify:"data_files/cert_sha384.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 577 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 578 | X509 CRT verification #18 (Valid Cert SHA512 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 579 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 580 | x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | b63b0af | 2011-01-13 17:54:59 +0000 | [diff] [blame] | 581 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 582 | X509 CRT verification #19 (Valid Cert, denying callback) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 583 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 584 | x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_OTHER:"compat":"verify_none" |
Paul Bakker | b63b0af | 2011-01-13 17:54:59 +0000 | [diff] [blame] | 585 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 586 | X509 CRT verification #19 (Not trusted Cert, allowing callback) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 587 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 588 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":0:0:"compat":"verify_all" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 589 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 590 | X509 CRT verification #21 (domain matching wildcard certificate, case insensitive) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 591 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 592 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.ExAmPlE.com":0:0:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 593 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 594 | X509 CRT verification #22 (domain not matching wildcard certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 595 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 596 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 597 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 598 | X509 CRT verification #23 (domain not matching wildcard certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 599 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 600 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 601 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 602 | X509 CRT verification #24 (domain matching CN of multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 603 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 604 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 605 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 606 | X509 CRT verification #25 (domain matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 607 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 608 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.net":0:0:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 609 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 610 | X509 CRT verification #26 (domain not matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 611 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 612 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 613 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 614 | X509 CRT verification #27 (domain not matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 615 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 616 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"xample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 617 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 618 | X509 CRT verification #27 (domain not matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 619 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 620 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"bexample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 621 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 622 | X509 CRT verification #28 (domain not matching wildcard in multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 623 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 624 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.org":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 57b1298 | 2012-02-11 17:38:38 +0000 | [diff] [blame] | 625 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 626 | X509 CRT verification #29 (domain matching wildcard in multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 627 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 628 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.org":0:0:"compat":"NULL" |
Paul Bakker | 57b1298 | 2012-02-11 17:38:38 +0000 | [diff] [blame] | 629 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 630 | X509 CRT verification #30 (domain matching multi certificate without CN) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 631 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 632 | x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.shotokan-braunschweig.de":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 9195662 | 2012-08-23 10:46:54 +0000 | [diff] [blame] | 633 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 634 | X509 CRT verification #31 (domain not matching multi certificate without CN) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 635 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 636 | x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH + MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 9195662 | 2012-08-23 10:46:54 +0000 | [diff] [blame] | 637 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 638 | X509 CRT verification #32 (Valid, EC cert, RSA CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 639 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 640 | x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 641 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 642 | X509 CRT verification #33 (Valid, RSA cert, EC CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 643 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 644 | x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 645 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 646 | X509 CRT verification #34 (Valid, EC cert, EC CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 647 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 648 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 649 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 650 | X509 CRT verification #35 (Revoked, EC CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 651 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 652 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 653 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 654 | X509 CRT verification #36 (Valid, EC CA, SHA1 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 655 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 656 | x509_verify:"data_files/server5-sha1.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 657 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 658 | X509 CRT verification #37 (Valid, EC CA, SHA224 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 659 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 660 | x509_verify:"data_files/server5-sha224.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 661 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 662 | X509 CRT verification #38 (Valid, EC CA, SHA384 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 663 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 664 | x509_verify:"data_files/server5-sha384.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 665 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 666 | X509 CRT verification #39 (Valid, EC CA, SHA512 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 667 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 668 | x509_verify:"data_files/server5-sha512.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 669 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 670 | X509 CRT verification #40 (Valid, depth 0, RSA, CA) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 671 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 672 | x509_verify:"data_files/test-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 673 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 674 | X509 CRT verification #41 (Valid, depth 0, EC, CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 675 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 676 | x509_verify:"data_files/test-ca2.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 677 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 678 | X509 CRT verification #42 (Depth 0, not CA, RSA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 679 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 680 | x509_verify:"data_files/server2.crt":"data_files/server2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 681 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 682 | X509 CRT verification #43 (Depth 0, not CA, EC) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 683 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 684 | x509_verify:"data_files/server5.crt":"data_files/server5.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 685 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 686 | X509 CRT verification #44 (Corrupted signature, EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 687 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 688 | x509_verify:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 689 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 690 | X509 CRT verification #45 (Corrupted signature, RSA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 691 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 692 | x509_verify:"data_files/server2-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 693 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 694 | X509 CRT verification #45b (Corrupted signature, intermediate CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 695 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 4dfc04a | 2017-06-05 11:12:13 +0200 | [diff] [blame] | 696 | x509_verify:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
| 697 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 698 | X509 CRT verification #46 (Valid, depth 2, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 699 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 700 | x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 701 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 702 | X509 CRT verification #47 (Untrusted, depth 2, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 703 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 704 | x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 705 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 706 | X509 CRT verification #48 (Missing intermediate CA, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 707 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 708 | x509_verify:"data_files/server7.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 709 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 710 | X509 CRT verification #49 (Valid, depth 2, RSA-EC-RSA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 711 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 712 | x509_verify:"data_files/server8_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 713 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 714 | X509 CRT verification #50 (Valid, multiple CAs) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 715 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 716 | x509_verify:"data_files/server2.crt":"data_files/test-ca_cat12.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 717 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 718 | X509 CRT verification #51 (Valid, multiple CAs, reverse order) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 719 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 720 | x509_verify:"data_files/server2.crt":"data_files/test-ca_cat21.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 721 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 722 | X509 CRT verification #52 (CA keyUsage valid) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 723 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 724 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt_crl.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 725 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 726 | X509 CRT verification #53 (CA keyUsage missing cRLSign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 727 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 728 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 729 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 730 | X509 CRT verification #54 (CA keyUsage missing cRLSign, no CRL) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 731 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 732 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 733 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 734 | X509 CRT verification #55 (CA keyUsage missing keyCertSign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 735 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 736 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crl.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 737 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 738 | X509 CRT verification #56 (CA keyUsage plain wrong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 739 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 740 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-ds.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 741 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 742 | X509 CRT verification #57 (Valid, RSASSA-PSS, SHA-1) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 743 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 744 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 745 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 746 | X509 CRT verification #58 (Valid, RSASSA-PSS, SHA-224) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 747 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 748 | x509_verify:"data_files/server9-sha224.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha224.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 749 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 750 | X509 CRT verification #59 (Valid, RSASSA-PSS, SHA-256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 751 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 752 | x509_verify:"data_files/server9-sha256.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 753 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 754 | X509 CRT verification #60 (Valid, RSASSA-PSS, SHA-384) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 755 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 756 | x509_verify:"data_files/server9-sha384.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha384.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 757 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 758 | X509 CRT verification #61 (Valid, RSASSA-PSS, SHA-512) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 759 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 760 | x509_verify:"data_files/server9-sha512.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha512.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 761 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 762 | X509 CRT verification #62 (Revoked, RSASSA-PSS, SHA-1) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 763 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 764 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5388202 | 2014-06-05 17:53:52 +0200 | [diff] [blame] | 765 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 766 | X509 CRT verification #63 (Revoked, RSASSA-PSS, SHA-1, CRL badsign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 767 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 768 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1-badsign.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5388202 | 2014-06-05 17:53:52 +0200 | [diff] [blame] | 769 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 770 | X509 CRT verification #64 (Valid, RSASSA-PSS, SHA-1, not top) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 771 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 772 | x509_verify:"data_files/server9-with-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 773 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 774 | X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 775 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 776 | x509_verify:"data_files/server9-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 777 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 778 | X509 CRT verification #66 (RSASSA-PSS, SHA1, no RSA CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 779 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 780 | x509_verify:"data_files/server9.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 781 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 782 | X509 CRT verification #67 (Valid, RSASSA-PSS, all defaults) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 783 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 784 | x509_verify:"data_files/server9-defaults.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | eacccb7 | 2014-06-05 18:00:08 +0200 | [diff] [blame] | 785 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 786 | X509 CRT verification #68 (RSASSA-PSS, wrong salt_len) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 787 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 788 | x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5873b00 | 2014-06-06 18:04:09 +0200 | [diff] [blame] | 789 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 790 | X509 CRT verification #69 (RSASSA-PSS, wrong mgf_hash) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 791 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 792 | x509_verify:"data_files/server9-bad-mgfhash.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5873b00 | 2014-06-06 18:04:09 +0200 | [diff] [blame] | 793 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 794 | X509 CRT verification #70 (v1 trusted CA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 795 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 796 | x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 797 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 798 | X509 CRT verification #71 (v1 trusted CA, other) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 799 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 800 | x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 801 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 802 | X509 CRT verification #72 (v1 chain) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 803 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 804 | x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 805 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 806 | X509 CRT verification #73 (selfsigned trusted without CA bit) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 807 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 808 | x509_verify:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | d249b7a | 2014-06-24 11:49:16 +0200 | [diff] [blame] | 809 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 810 | X509 CRT verification #74 (signed by selfsigned trusted without CA bit) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 811 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 812 | x509_verify:"data_files/server6-ss-child.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | d249b7a | 2014-06-24 11:49:16 +0200 | [diff] [blame] | 813 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 814 | X509 CRT verification #75 (encoding mismatch) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 815 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 816 | x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9c911da | 2014-10-17 12:23:49 +0200 | [diff] [blame] | 817 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 818 | X509 CRT verification #76 (multiple CRLs, not revoked) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 819 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 820 | x509_verify:"data_files/server5.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 821 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 822 | X509 CRT verification #77 (multiple CRLs, revoked) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 823 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 824 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 825 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 826 | X509 CRT verification #78 (multiple CRLs, revoked by second) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 827 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 828 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_rsa-ec.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 829 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 830 | X509 CRT verification #79 (multiple CRLs, revoked by future) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 831 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 832 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED|MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 833 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 834 | X509 CRT verification #80 (multiple CRLs, first future, revoked by second) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 835 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 836 | x509_verify:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 837 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 838 | X509 CRT verification #81 (multiple CRLs, none relevant) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 839 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 840 | x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl_cat_rsa-ec.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 841 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 842 | X509 CRT verification #82 (Not yet valid CA and valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 843 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 844 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | 12c868c | 2016-02-18 17:28:04 +0000 | [diff] [blame] | 845 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 846 | X509 CRT verification #83 (valid CA and Not yet valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 847 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 848 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-future.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | 12c868c | 2016-02-18 17:28:04 +0000 | [diff] [blame] | 849 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 850 | X509 CRT verification #84 (valid CA and Not yet valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 851 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 852 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-past.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | df4bca2 | 2016-02-19 15:57:17 +0000 | [diff] [blame] | 853 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 854 | X509 CRT verification #85 (Not yet valid CA and valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 855 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 856 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | df4bca2 | 2016-02-19 15:57:17 +0000 | [diff] [blame] | 857 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 858 | X509 CRT verification #86 (Not yet valid CA and invalid CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 859 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 860 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
Andres AG | 9f430c1 | 2016-12-13 09:59:07 +0000 | [diff] [blame] | 861 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 862 | X509 CRT verification #87 (Expired CA and invalid CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 863 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 864 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
Andres AG | 9f430c1 | 2016-12-13 09:59:07 +0000 | [diff] [blame] | 865 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 866 | X509 CRT verification #88 (Spurious cert in the chain) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 867 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 868 | x509_verify:"data_files/server7_spurious_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
| 869 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 870 | X509 CRT verification #89 (Spurious cert later in the chain) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 871 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 872 | x509_verify:"data_files/server10_int3_spurious_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
| 873 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 874 | X509 CRT verification #90 (EE with same name as trusted root) |
Manuel Pégourié-Gonnard | c10afdb | 2017-06-29 09:48:08 +0200 | [diff] [blame] | 875 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 876 | x509_verify:"data_files/server5-ss-forgeca.crt":"data_files/test-int-ca3.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"":"NULL" |
Manuel Pégourié-Gonnard | c10afdb | 2017-06-29 09:48:08 +0200 | [diff] [blame] | 877 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 878 | X509 CRT verification #91 (same CA with good then bad key) |
Manuel Pégourié-Gonnard | 2d825d4 | 2017-07-03 18:06:38 +0200 | [diff] [blame] | 879 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 880 | x509_verify:"data_files/server1.crt":"data_files/test-ca-good-alt.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
| 881 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 882 | X509 CRT verification #91 (same CA with bad then good key) |
Manuel Pégourié-Gonnard | 2d825d4 | 2017-07-03 18:06:38 +0200 | [diff] [blame] | 883 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 884 | x509_verify:"data_files/server1.crt":"data_files/test-ca-alt-good.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
| 885 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 886 | X509 CRT verification #92 (bad name, allowing callback) |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 887 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 888 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"globalhost":0:0:"":"verify_all" |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 889 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 890 | X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA) |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 891 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECP_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
| 892 | x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK:"suite_b":"NULL" |
| 893 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 894 | X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA) |
Manuel Pégourié-Gonnard | 147b28e | 2018-03-12 15:26:59 +0100 | [diff] [blame] | 895 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 896 | x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_PK:"suite_b":"NULL" |
| 897 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 898 | X509 CRT verification #95 (Suite B Valid, EC cert, EC CA) |
Manuel Pégourié-Gonnard | 147b28e | 2018-03-12 15:26:59 +0100 | [diff] [blame] | 899 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 900 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"suite_b":"NULL" |
| 901 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 902 | X509 CRT verification #96 (next profile Invalid Cert SHA224 Digest) |
Manuel Pégourié-Gonnard | 88a8dcb | 2018-03-12 15:49:35 +0100 | [diff] [blame] | 903 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 904 | x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCRL_BAD_MD:"next":"NULL" |
| 905 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 906 | X509 CRT verification #97 (next profile Valid Cert SHA256 Digest) |
Manuel Pégourié-Gonnard | 88a8dcb | 2018-03-12 15:49:35 +0100 | [diff] [blame] | 907 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_SHA1_C |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 908 | x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"next":"NULL" |
| 909 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 910 | X509 CRT verification with ca callback: failure |
Jarno Lamsa | 557426a | 2019-03-27 17:08:29 +0200 | [diff] [blame] | 911 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK |
Hanno Becker | cbb5903 | 2019-03-28 14:14:22 +0000 | [diff] [blame] | 912 | x509_verify_ca_cb_failure:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":MBEDTLS_ERR_X509_FATAL_ERROR |
Jarno Lamsa | 557426a | 2019-03-27 17:08:29 +0200 | [diff] [blame] | 913 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 914 | X509 CRT verification callback: bad name |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 915 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 916 | x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2.crt":"globalhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000004\n" |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 917 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 918 | X509 CRT verification callback: trusted EE cert |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 919 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 920 | x509_verify_callback:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"NULL":0:"depth 0 - serial 53\:A2\:CB\:4B\:12\:4E\:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 921 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 922 | X509 CRT verification callback: trusted EE cert, expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 923 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 924 | x509_verify_callback:"data_files/server5-ss-expired.crt":"data_files/server5-ss-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial D8\:64\:61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 925 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 926 | X509 CRT verification callback: simple |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 927 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 928 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 929 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 930 | X509 CRT verification callback: simple, EE expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 931 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 932 | x509_verify_callback:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 933 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 934 | X509 CRT verification callback: simple, root expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 935 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 936 | x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 937 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 938 | X509 CRT verification callback: two trusted roots |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 939 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 940 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 941 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 942 | X509 CRT verification callback: two trusted roots, reversed order |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 943 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 944 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 945 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 946 | X509 CRT verification callback: root included |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 947 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 948 | x509_verify_callback:"data_files/server1_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 949 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 950 | X509 CRT verification callback: intermediate ca |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 951 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 952 | x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 953 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 954 | X509 CRT verification callback: intermediate ca, root included |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 955 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 956 | x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 957 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 958 | X509 CRT verification callback: intermediate ca trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 959 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 960 | x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-int-ca.crt":"NULL":0:"depth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 961 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 962 | X509 CRT verification callback: intermediate ca, EE expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 963 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 964 | x509_verify_callback:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 965 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 966 | X509 CRT verification callback: intermediate ca, int expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 967 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 968 | x509_verify_callback:"data_files/server7_int-ca-exp.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000001\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 969 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 970 | X509 CRT verification callback: intermediate ca, root expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 971 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 972 | x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 973 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 974 | X509 CRT verification callback: two intermediates |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 975 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 976 | x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 977 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 978 | X509 CRT verification callback: two intermediates, root included |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 979 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 980 | x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 981 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 982 | X509 CRT verification callback: two intermediates, top int trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 983 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 984 | x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":"NULL":0:"depth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 985 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 986 | X509 CRT verification callback: two intermediates, low int trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 987 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 988 | x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-int-ca3.crt":"NULL":0:"depth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 989 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 990 | X509 CRT verification callback: no intermediate, bad signature |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 991 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 992 | x509_verify_callback:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n" |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 993 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 994 | X509 CRT verification callback: one intermediate, bad signature |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 995 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 996 | x509_verify_callback:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n" |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 997 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 998 | X509 Parse Selftest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 999 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_CERTS_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1000 | x509_selftest: |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1001 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1002 | X509 CRT ASN1 (Empty Certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1003 | x509parse_crt:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1004 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1005 | X509 CRT ASN1 (inv Certificate, bad tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1006 | x509parse_crt:"0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1007 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1008 | X509 CRT ASN1 (inv Certificate, no length) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1009 | x509parse_crt:"30":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1010 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1011 | X509 CRT ASN1 (inv Certificate, bad length encoding) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1012 | x509parse_crt:"3085":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | fae618f | 2011-10-12 11:53:52 +0000 | [diff] [blame] | 1013 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1014 | X509 CRT ASN1 (inv Certificate, length data incomplete) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1015 | x509parse_crt:"308200":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1016 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1017 | X509 CRT ASN1 (inv Certificate, length out of bounds) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1018 | x509parse_crt:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1019 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1020 | X509 CRT ASN1 (inv TBS, invalid tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1021 | x509parse_crt:"30020500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1022 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1023 | X509 CRT ASN1 (inv TBS, length missing) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1024 | x509parse_crt:"300130":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1025 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1026 | X509 CRT ASN1 (inv TBS, invalid length encoding) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1027 | x509parse_crt:"30023085":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1028 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1029 | X509 CRT ASN1 (inv TBS, length data incomplete) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1030 | x509parse_crt:"300430839999":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1031 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1032 | X509 CRT ASN1 (inv TBS, length out of bounds) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1033 | x509parse_crt:"30023003":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1034 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1035 | X509 CRT ASN1 (TBS empty) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1036 | x509parse_crt:"30153000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1037 | |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1038 | X509 CRT ASN1 (TBS, invalid version tag, serial missing) |
| 1039 | x509parse_crt:"301730020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1040 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1041 | X509 CRT ASN1 (TBS, valid outer version tag, no outer length) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1042 | x509parse_crt:"30163001a0300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1043 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1044 | X509 CRT ASN1 (TBS, inv inner version tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1045 | x509parse_crt:"30193004a0020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1046 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1047 | X509 CRT ASN1 (TBS, valid inner version tag, no inner length) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1048 | x509parse_crt:"30183003a00102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1049 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1050 | X509 CRT ASN1 (TBS, valid inner version tag, inv inner length encoding) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1051 | x509parse_crt:"30193004a0020285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1052 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1053 | X509 CRT ASN1 (TBS, valid inner version tag, inner length too large for int) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1054 | x509parse_crt:"30293014a012021000000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1055 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1056 | X509 CRT ASN1 (TBS, valid inner version tag, inner vs. outer length mismatch) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1057 | x509parse_crt:"301b3006a00402010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1058 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1059 | X509 CRT ASN1 (TBS, valid version tag, length exceeds TBS) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1060 | x509parse_crt:"30293014a012021100000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1061 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1062 | X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 3) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1063 | x509parse_crt:"308196308180a0030201038204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1064 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1065 | X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 4) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1066 | x509parse_crt:"308196308180a0030201048204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1067 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1068 | X509 CRT ASN1 (TBS, valid version tag + length, version number overflow) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1069 | x509parse_crt:"308199308183a00602047FFFFFFF8204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1070 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1071 | X509 CRT ASN1 (TBS, serial missing) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1072 | x509parse_crt:"301a3005a003020102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1073 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1074 | X509 CRT ASN1 (TBS, inv serial, tag wrong) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1075 | x509parse_crt:"301c3007a0030201020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1076 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1077 | X509 CRT ASN1 (TBS, inv serial, length missing) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1078 | x509parse_crt:"301b3006a00302010282300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1079 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1080 | X509 CRT ASN1 (TBS, inv serial, inv length encoding) |
Hanno Becker | e7d8f96 | 2019-06-04 15:25:00 +0100 | [diff] [blame] | 1081 | x509parse_crt:"301c3007a0030201028285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1082 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1083 | X509 CRT ASN1 (TBS, inv serial, length out of bounds) |
Hanno Becker | e7d8f96 | 2019-06-04 15:25:00 +0100 | [diff] [blame] | 1084 | x509parse_crt:"301c3007a0030201028201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1085 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1086 | X509 CRT ASN1 (TBS, AlgID missing) |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1087 | x509parse_crt:"3020300ba0030201028204deadbeef300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1088 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1089 | X509 CRT ASN1 (TBS, inv AlgID, tag wrong) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1090 | x509parse_crt:"3022300da0030201028204deadbeef0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1091 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1092 | X509 CRT ASN1 (TBS, inv AlgID, OID missing) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1093 | x509parse_crt:"308189308173a0030201008204deadbeef3000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1094 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1095 | X509 CRT ASN1 (TBS, inv AlgID, OID tag wrong) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1096 | x509parse_crt:"30818b308175a0030201008204deadbeef30020500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1097 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1098 | X509 CRT ASN1 (TBS, inv AlgID, OID inv length encoding) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1099 | x509parse_crt:"30818b308175a0030201008204deadbeef30020685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1100 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1101 | X509 CRT ASN1 (TBS, inv AlgID, OID length out of bounds) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1102 | x509parse_crt:"30818b308175a0030201008204deadbeef30020601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1103 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1104 | X509 CRT ASN1 (TBS, inv AlgID, OID empty) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1105 | x509parse_crt:"30818b308175a0030201008204deadbeef30020600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1106 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1107 | X509 CRT ASN1 (TBS, inv AlgID, OID unknown) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1108 | x509parse_crt:"30818f308179a0030201008204deadbeef30060604deadbeef300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1109 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1110 | X509 CRT ASN1 (TBS, inv AlgID, param inv length encoding) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1111 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1112 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1113 | X509 CRT ASN1 (TBS, inv AlgID, param length out of bounds) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1114 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1115 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1116 | X509 CRT ASN1 (TBS, inv AlgID, param length mismatch) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1117 | x509parse_crt:"308198308182a0030201008204deadbeef300f06092a864886f70d01010b06010000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1118 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1119 | X509 CRT ASN1 (TBS, inv AlgID, params present but empty) |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1120 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG |
| 1121 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1122 | X509 CRT ASN1 (TBS, inv AlgID, bad RSASSA-PSS params) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1123 | depends_on:MBEDTLS_X509_RSASSA_PSS_SUPPORT |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1124 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010a3100300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 1125 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1126 | X509 CRT ASN1 (TBS, Issuer missing) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1127 | x509parse_crt:"302d3018a0030201008204deadbeef300b06092a864886f70d01010b300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1128 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1129 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1130 | x509parse_crt:"302f301aa0030201008204deadbeef300b06092a864886f70d01010b0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1131 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1132 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length missing) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1133 | x509parse_crt:"302e3019a0030201008204deadbeef300b06092a864886f70d01010b30300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1134 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1135 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv length encoding) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1136 | x509parse_crt:"302f301aa0030201008204deadbeef300b06092a864886f70d01010b3085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1137 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1138 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1139 | x509parse_crt:"302f301aa0030201008204deadbeef300b06092a864886f70d01010b3001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1140 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1141 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1142 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1143 | x509parse_crt:"3081893074a0030201028204deadbeef300d06092a864886f70d01010b05003000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1144 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1145 | X509 CRT ASN1 (TBS, inv Issuer, RDN inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1146 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1147 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1148 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1149 | X509 CRT ASN1 (TBS, inv Issuer, RDN inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1150 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1151 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023185301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1152 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1153 | X509 CRT ASN1 (TBS, inv Issuer, RDN length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1154 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1155 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023101301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1156 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1157 | X509 CRT ASN1 (TBS, inv Issuer, RDN empty) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1158 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1159 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023100301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1160 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1161 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv tag) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1162 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1163 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1164 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1165 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv length encoding) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1166 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1167 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023085301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1168 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1169 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1170 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1171 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023001301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1172 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1173 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue empty) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1174 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1175 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1176 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1177 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv tag) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1178 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1179 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1180 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1181 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv no length data) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1182 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1183 | x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b050030053103300106301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1184 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1185 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv length encoding) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1186 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1187 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020685301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1188 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1189 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1190 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1191 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020601301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1192 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1193 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value missing) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1194 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1195 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020600301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1196 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1197 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv tag) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1198 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1199 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG; |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1200 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1201 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length missing) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1202 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1203 | x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b050030073105300306000c301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1204 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1205 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv length encoding) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1206 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1207 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000C85301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1208 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1209 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1210 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1211 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000c01301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1212 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1213 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length mismatch) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1214 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1215 | x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300a3108300606000c010000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1216 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1217 | X509 CRT ASN1 (TBS, inv Issuer, 2nd AttributeTypeValue empty) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1218 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1219 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300e310c300806000c04546573743000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1220 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1221 | X509 CRT ASN1 (TBS, Validity missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1222 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1223 | x509parse_crt:"303d3028a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1224 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1225 | X509 CRT ASN1 (TBS, inv Validity, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1226 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1227 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1228 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1229 | X509 CRT ASN1 (TBS, inv Validity, length field missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1230 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1231 | x509parse_crt:"303e3029a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1232 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1233 | X509 CRT ASN1 (TBS, inv Validity, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1234 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1235 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1236 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1237 | X509 CRT ASN1 (TBS, inv Validity, length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1238 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1239 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1240 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1241 | X509 CRT ASN1 (TBS, inv Validity, notBefore missing) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1242 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1243 | x509parse_crt:"30793064a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1244 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1245 | X509 CRT ASN1 (TBS, inv Validity, notBefore inv tag) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1246 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1247 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430020500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1248 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1249 | X509 CRT ASN1 (TBS, inv Validity, notBefore no length) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1250 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1251 | x509parse_crt:"307a3065a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300117300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1252 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1253 | X509 CRT ASN1 (TBS, inv Validity, notBefore inv length encoding) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1254 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1255 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743002178f300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1256 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1257 | X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1258 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1259 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1260 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1261 | X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1262 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1263 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1264 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1265 | X509 CRT ASN1 (TBS, inv Validity, notBefore empty) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1266 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1267 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a3008060013045465737430101700170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1268 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1269 | X509 CRT ASN1 (TBS, inv Validity, notBefore invalid) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1270 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1271 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303000000000170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1272 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1273 | X509 CRT ASN1 (TBS, inv Validity, notAfter missing) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1274 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1275 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300e170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1276 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1277 | X509 CRT ASN1 (TBS, inv Validity, notAfter inv tag) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1278 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1279 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935390500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1280 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1281 | X509 CRT ASN1 (TBS, inv Validity, notAfter length missing) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1282 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1283 | x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300f170c30393132333132333539353917300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1284 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1285 | X509 CRT ASN1 (TBS, inv Validity, notAfter inv length encoding) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1286 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1287 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391785300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1288 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1289 | X509 CRT ASN1 (TBS, inv Validity, notAfter length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1290 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1291 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1292 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1293 | X509 CRT ASN1 (TBS, inv Validity, notAfter empty) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1294 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1295 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1296 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1297 | X509 CRT ASN1 (TBS, inv Validity, notAfter invalid) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1298 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1299 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303931323331323335393539170c303930313031303000000000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1300 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1301 | X509 CRT ASN1 (TBS, inv Validity, notAfter data remaining) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1302 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1303 | x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303930313031303030303030170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1304 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1305 | X509 CRT ASN1 (TBS, Subject missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1306 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1307 | x509parse_crt:"305b3046a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1308 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1309 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1310 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1311 | x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353900300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1312 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1313 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence length missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1314 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1315 | x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1316 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1317 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1318 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1319 | x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1320 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1321 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1322 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1323 | x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1324 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1325 | X509 CRT ASN1 (TBS, inv Subject, RDN inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1326 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1327 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1328 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1329 | X509 CRT ASN1 (TBS, inv Subject, RDN inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1330 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1331 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023185302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1332 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1333 | X509 CRT ASN1 (TBS, inv Subject, RDN length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1334 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1335 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023101302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1336 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1337 | X509 CRT ASN1 (TBS, inv Subject, RDN empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1338 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1339 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023100302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1340 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1341 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1342 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1343 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1344 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1345 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1346 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1347 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023085302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1348 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1349 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1350 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1351 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023001302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1352 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1353 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1354 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1355 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1356 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1357 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1358 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1359 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1360 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1361 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv no length data) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1362 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1363 | x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930053103300106302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1364 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1365 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1366 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1367 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020685302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1368 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1369 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type length out of bounds ) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1370 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1371 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020601302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1372 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1373 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1374 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1375 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020600302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1376 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1377 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1378 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1379 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG; |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1380 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1381 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1382 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1383 | x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930073105300306000c302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1384 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1385 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1386 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1387 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000C85302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1388 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1389 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1390 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1391 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000c01302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1392 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1393 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length mismatch) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1394 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1395 | x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300a3108300606000c010000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1396 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1397 | X509 CRT ASN1 (TBS, inv Subject, 2nd AttributeTypeValue empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1398 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1399 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300e310c300806000c04546573743000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1400 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1401 | X509 CRT ASN1 (TBS, SubPubKeyInfo missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1402 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1403 | x509parse_crt:"30693054a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1404 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1405 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1406 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1407 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1408 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1409 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1410 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1411 | x509parse_crt:"306a3055a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1412 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1413 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1414 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1415 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1416 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1417 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1418 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1419 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1420 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1421 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1422 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1423 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1424 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1425 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv algorithm tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1426 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1427 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1428 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1429 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1430 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1431 | x509parse_crt:"306c3057a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1432 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1433 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1434 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1435 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1436 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1437 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1438 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1439 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1440 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1441 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1442 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1443 | x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301d300003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1444 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1445 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm unknown) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1446 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1447 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010100050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_UNKNOWN_PK_ALG |
| 1448 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1449 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring missing) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1450 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1451 | x509parse_crt:"307a3065a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300f300d06092A864886F70D0101010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1452 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1453 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv tag) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1454 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1455 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1456 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1457 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length missing) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1458 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1459 | x509parse_crt:"307b3066a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743010300d06092A864886F70D010101050003300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1460 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1461 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv length encoding) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1462 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1463 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1464 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1465 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length out of bounds) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1466 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1467 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1468 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1469 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, no bitstring data) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1470 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1471 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1472 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame^] | 1473 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv bitstring start) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1474 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1475 | x509parse_crt:"307d3068a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743012300d06092A864886F70D0101010500030101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1476 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1477 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring length) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1478 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1479 | x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1480 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1481 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring tag) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1482 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1483 | x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400310000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1484 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1485 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv RSA modulus) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1486 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1487 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0302ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1488 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1489 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, total length mismatch) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1490 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1491 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301e300d06092A864886F70D0101010500030b0030080202ffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1492 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1493 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1494 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1495 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY |
| 1496 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1497 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed, expanded length notation) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1498 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1499 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210fffffffffffffffffffffffffffffffe0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1500 | |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1501 | # We don't expect MBEDTLS_ERR_ASN1_UNEXPECTED_TAG here because the IssuerID is optional; |
| 1502 | # the stack is expected to ignore it and will hence end up with a length mismatch. |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1503 | X509 CRT ASN1 (TBS, inv IssuerID, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1504 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1505 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1506 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1507 | X509 CRT ASN1 (TBS, inv IssuerID, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1508 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1509 | x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1510 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1511 | X509 CRT ASN1 (TBS, inv IssuerID, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1512 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1513 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1514 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1515 | X509 CRT ASN1 (TBS, inv IssuerID, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1516 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1517 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1518 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1519 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1520 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1521 | x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1522 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1523 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1524 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1525 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1526 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1527 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1528 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1529 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1530 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1531 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1532 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1533 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1534 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1535 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, bool len missing) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1536 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1537 | x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30c300730050603551d2001010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Ron Eldor | 11818f2 | 2019-05-16 18:17:02 +0300 | [diff] [blame] | 1538 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1539 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data missing) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1540 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1541 | x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30b300930070603551d20040001010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Ron Eldor | 11818f2 | 2019-05-16 18:17:02 +0300 | [diff] [blame] | 1542 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1543 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data not oid) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1544 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1545 | x509parse_crt:"3081bc3081b9a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba32e302c30290603551d2004223020301ea01c06082b06010505070804a010300e06082b060104010901030402022201010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Ron Eldor | 8a59d6b | 2019-05-19 12:32:15 +0300 | [diff] [blame] | 1546 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1547 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, qualifier not complete) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1548 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1549 | x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30c300a301f0603551d2004183020301f0603551d200418301630140604551d2000300c300a06082b0601050507020101010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Ron Eldor | 11818f2 | 2019-05-16 18:17:02 +0300 | [diff] [blame] | 1550 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1551 | X509 CRT ASN1 (TBSCertificate v3, ext SubjectAlternativeName malformed) |
Ron Eldor | 56f071f | 2019-05-22 17:21:08 +0300 | [diff] [blame] | 1552 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 1553 | x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1554 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1555 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1556 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1557 | x509parse_crt:"308199308183a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | c6ce838 | 2009-07-27 21:34:45 +0000 | [diff] [blame] | 1558 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1559 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1560 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1561 | x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | c6ce838 | 2009-07-27 21:34:45 +0000 | [diff] [blame] | 1562 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1563 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1564 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1565 | x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1566 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1567 | X509 CRT ASN1 (TBS, inv v3Ext, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1568 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1569 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1570 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1571 | X509 CRT ASN1 (TBS, inv v3Ext, outer length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1572 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1573 | x509parse_crt:"30819b308185a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1574 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1575 | X509 CRT ASN1 (TBS, inv v3Ext, outer length inv encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1576 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1577 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1578 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1579 | X509 CRT ASN1 (TBS, inv v3Ext, outer length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1580 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1581 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 0369a52 | 2014-11-11 22:17:26 +0100 | [diff] [blame] | 1582 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1583 | X509 CRT ASN1 (TBS, inv v3Ext, outer length 0) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1584 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1585 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | b134060 | 2014-11-11 23:11:16 +0100 | [diff] [blame] | 1586 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1587 | X509 CRT ASN1 (TBS, inv v3Ext, inner tag invalid) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1588 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1589 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8a5e3d4 | 2014-11-12 17:47:28 +0100 | [diff] [blame] | 1590 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1591 | X509 CRT ASN1 (TBS, inv v3Ext, inner length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1592 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1593 | x509parse_crt:"30819d308187a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1594 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1595 | X509 CRT ASN1 (TBS, inv v3Ext, inner length inv encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1596 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1597 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1598 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1599 | X509 CRT ASN1 (TBS, inv v3Ext, inner length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1600 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1601 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1602 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1603 | X509 CRT ASN1 (TBS, inv v3Ext, inner/outer length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1604 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1605 | x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1606 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1607 | X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1608 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1609 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1610 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1611 | X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1612 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1613 | x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1614 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1615 | X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1616 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1617 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1618 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1619 | X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1620 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1621 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1622 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1623 | X509 CRT ASN1 (TBS, inv v3Ext, first ext empty) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1624 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1625 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1626 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1627 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1628 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1629 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1630 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1631 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1632 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1633 | x509parse_crt:"3081a130818ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3053003300106300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1634 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1635 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1636 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1637 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020685300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1638 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1639 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1640 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1641 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020601300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1642 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1643 | X509 CRT ASN1 (TBS, inv v3Ext, no extnValue) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1644 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1645 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020600300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1646 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1647 | X509 CRT ASN1 (TBS, inv v3Ext, inv critical tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1648 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1649 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1650 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1651 | X509 CRT ASN1 (TBS, inv v3Ext, critical length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1652 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1653 | x509parse_crt:"3081a330818da0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30730053003060001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1654 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1655 | X509 CRT ASN1 (TBS, inv v3Ext, critical inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1656 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1657 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1658 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1659 | X509 CRT ASN1 (TBS, inv v3Ext, critical length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1660 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1661 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1662 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1663 | X509 CRT ASN1 (TBS, inv v3Ext, critical length 0) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1664 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1665 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000100300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1666 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1667 | X509 CRT ASN1 (TBS, inv v3Ext, critical length 2) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1668 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1669 | x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001020000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1670 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1671 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1672 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1673 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1674 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1675 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1676 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1677 | x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001010004300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1678 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1679 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length inv encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1680 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1681 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000485300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1682 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1683 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1684 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1685 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000401300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1686 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1687 | X509 CRT ASN1 (TBS, inv v3Ext, length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1688 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1689 | x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b3009060001010004000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1690 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1691 | X509 CRT ASN1 (TBS, inv extBasicConstraint, no pathlen length) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1692 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1693 | x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d130101010406300402010102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1694 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1695 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1696 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1697 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1698 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1699 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1700 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1701 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1702 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1703 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen empty) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1704 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1705 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1706 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1707 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1708 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1709 | x509parse_crt:"3081b430819ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a318301630140603551d13010101040a30080201010201010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1710 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1711 | X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage bad second tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1712 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1713 | x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d250416301406082b0601050507030107082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1714 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1715 | X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1716 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1717 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS |
| 1718 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1719 | X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage repeated) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1720 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1721 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d250416301406082b0601050507030106082b06010505070302301d0603551d250416301406082b0601050507030106082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS |
| 1722 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1723 | X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated outside Extensions) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1724 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1725 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1726 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1727 | X509 CRT ASN1 (TBS, valid SubjectID, valid IssuerID, inv v3Ext, SubjectAltName repeated outside Extensions, inv SubjectAltNames tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1728 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 1729 | x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1730 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1731 | X509 CRT ASN1 (SignatureAlgorithm missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1732 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1733 | x509parse_crt:"3081aa3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1734 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1735 | X509 CRT ASN1 (inv SignatureAlgorithm, bad tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1736 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1737 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573740500":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1738 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1739 | X509 CRT ASN1 (inv SignatureAlgorithm, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1740 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1741 | x509parse_crt:"3081ab3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e7465737430":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1742 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1743 | X509 CRT ASN1 (inv SignatureAlgorithm, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1744 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1745 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743085":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1746 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1747 | X509 CRT ASN1 (inv SignatureAlgorithm, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1748 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1749 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1750 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1751 | X509 CRT ASN1 (inv SignatureAlgorithm, not the same as SignatureAlgorithm in TBS) |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1752 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1753 | x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010a0500030200ff":"":MBEDTLS_ERR_X509_SIG_MISMATCH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1754 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1755 | X509 CRT ASN1 (Signature missing) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1756 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1757 | x509parse_crt:"3081b93081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1758 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1759 | X509 CRT ASN1 (inv Signature, bad tag) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1760 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1761 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1762 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1763 | X509 CRT ASN1 (inv Signature, length missing) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1764 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1765 | x509parse_crt:"3081ba3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b050003":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1766 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1767 | X509 CRT ASN1 (inv Signature, inv length encoding) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1768 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1769 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000385":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1770 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1771 | X509 CRT ASN1 (inv Signature, length out of bounds) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1772 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1773 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1774 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1775 | X509 CRT ASN1 (inv Signature, empty) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1776 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1777 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000300":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1778 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1779 | X509 CRT ASN1 (inv Signature, inv data) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1780 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1781 | x509parse_crt:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030100":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1782 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1783 | X509 CRT ASN1 (inv Signature, length mismatch) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1784 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1785 | x509parse_crt:"3081be3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff00":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1786 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1787 | X509 CRT ASN1 (well-formed) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1788 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1789 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1790 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1791 | X509 CRT ASN1 (GeneralizedTime instead of UTCTime) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1792 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1793 | x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e180e3230313030313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2010-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | 9120018 | 2010-02-18 21:26:15 +0000 | [diff] [blame] | 1794 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1795 | X509 CRT ASN1 (Name with X520 CN) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1796 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1797 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550403130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: CN=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1798 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1799 | X509 CRT ASN1 (Name with X520 C) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1800 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1801 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550406130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: C=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1802 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1803 | X509 CRT ASN1 (Name with X520 L) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1804 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1805 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550407130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: L=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1806 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1807 | X509 CRT ASN1 (Name with X520 ST) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1808 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1809 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550408130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ST=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1810 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1811 | X509 CRT ASN1 (Name with X520 O) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1812 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1813 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040a130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: O=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1814 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1815 | X509 CRT ASN1 (Name with X520 OU) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1816 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1817 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040b130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: OU=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1818 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1819 | X509 CRT ASN1 (Name with unknown X520 part) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1820 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1821 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b06035504de130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1822 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1823 | X509 CRT ASN1 (Name with composite RDN) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1824 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 555fbf8 | 2015-02-04 17:11:55 +0000 | [diff] [blame] | 1825 | x509parse_crt:"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":"cert. version \: 3\nserial number \: 4C\:20\:E3\:BD\nissuer name \: C=US, ST=CA, O=Internet Widgits Pty Ltd, CN=Frankencert CA\nsubject name \: C=US, ST=Washington, ??=US, ??=Delaware, O=Authorize.Net LLC, ??=Private Organization, serialNumber=4369191 + CN=www.authorize.net, L=San Francisco\nissued on \: 2013-08-02 15\:14\:37\nexpires on \: 2015-08-17 05\:54\:31\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\n":0 |
| 1826 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1827 | X509 CRT ASN1 (Name with PKCS9 email) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1828 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1829 | x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d010901130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: emailAddress=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1830 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1831 | X509 CRT ASN1 (Name with unknown PKCS9 part) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1832 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1833 | x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d0109ab130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1834 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1835 | X509 CRT ASN1 (ECDSA signature, RSA key) |
palaviv | f180df9 | 2016-08-07 11:56:02 +0300 | [diff] [blame] | 1836 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1837 | x509parse_crt:"3081e630819e020103300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343631385a170d3233303730383039343631385a300f310d300b0603550403130454657374304c300d06092a864886f70d0101010500033b003038023100e8f546061d3b49bc2f6b7524b7ea4d73a8d5293ee8c64d9407b70b5d16baebc32b8205591eab4e1eb57e9241883701250203010001300906072a8648ce3d0401033800303502186e18209afbed14a0d9a796efcad68891e3ccd5f75815c833021900e92b4fd460b1994693243b9ffad54729de865381bda41d25":"cert. version \: 1\nserial number \: 03\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:46\:18\nexpires on \: 2023-07-08 09\:46\:18\nsigned using \: ECDSA with SHA1\nRSA key size \: 384 bits\n":0 |
Manuel Pégourié-Gonnard | 72ef0b7 | 2013-07-10 12:20:54 +0200 | [diff] [blame] | 1838 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1839 | X509 CRT ASN1 (ECDSA signature, EC key) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1840 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1841 | x509parse_crt:"3081eb3081a3020900f41534662ec7e912300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343031395a170d3233303730383039343031395a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d030101033200042137969fabd4e370624a0e1a33e379cab950cce00ef8c3c3e2adaeb7271c8f07659d65d3d777dcf21614363ae4b6e617300906072a8648ce3d04010338003035021858cc0f957946fe6a303d92885a456aa74c743c7b708cbd37021900fe293cac21af352d16b82eb8ea54e9410b3abaadd9f05dd6":"cert. version \: 1\nserial number \: F4\:15\:34\:66\:2E\:C7\:E9\:12\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:40\:19\nexpires on \: 2023-07-08 09\:40\:19\nsigned using \: ECDSA with SHA1\nEC key size \: 192 bits\n":0 |
Manuel Pégourié-Gonnard | a3c86c3 | 2013-07-10 16:54:29 +0200 | [diff] [blame] | 1842 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1843 | X509 CRT ASN1 (RSA signature, EC key) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1844 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1845 | x509parse_crt:"3081e430819f020104300d06092a864886f70d0101050500300f310d300b0603550403130454657374301e170d3133303731303135303233375a170d3233303730383135303233375a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d03010103320004e962551a325b21b50cf6b990e33d4318fd16677130726357a196e3efe7107bcb6bdc6d9db2a4df7c964acfe81798433d300d06092a864886f70d01010505000331001a6c18cd1e457474b2d3912743f44b571341a7859a0122774a8e19a671680878936949f904c9255bdd6fffdb33a7e6d8":"cert. version \: 1\nserial number \: 04\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 15\:02\:37\nexpires on \: 2023-07-08 15\:02\:37\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\n":0 |
Manuel Pégourié-Gonnard | a3c86c3 | 2013-07-10 16:54:29 +0200 | [diff] [blame] | 1846 | |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1847 | X509 CRL ASN1 (Incorrect first tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1848 | x509parse_crl:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1849 | |
| 1850 | X509 CRL ASN1 (Correct first tag, data length does not match) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1851 | x509parse_crl:"300000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1852 | |
| 1853 | X509 CRL ASN1 (TBSCertList, tag missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1854 | x509parse_crl:"3000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1855 | |
| 1856 | X509 CRL ASN1 (TBSCertList, version tag len missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1857 | x509parse_crl:"3003300102":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1858 | |
| 1859 | X509 CRL ASN1 (TBSCertList, version correct, alg missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1860 | x509parse_crl:"30053003020100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1861 | |
| 1862 | X509 CRL ASN1 (TBSCertList, alg correct, incorrect version) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1863 | x509parse_crl:"300b3009020102300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1864 | |
| 1865 | X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1866 | x509parse_crl:"300b3009020100300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1867 | |
| 1868 | X509 CRL ASN1 (TBSCertList, sig_oid1 id unknown) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1869 | x509parse_crl:"30143012020100300d06092a864886f70d01010f0500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1870 | |
| 1871 | X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1872 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1873 | x509parse_crl:"30143012020100300d06092a864886f70d01010e0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1874 | |
| 1875 | X509 CRL ASN1 (TBSCertList, issuer set missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1876 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1877 | x509parse_crl:"30163014020100300d06092a864886f70d01010e05003000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1878 | |
| 1879 | X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1880 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1881 | x509parse_crl:"30253023020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1882 | |
| 1883 | X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1884 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1885 | x509parse_crl:"30343032020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030":"":MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1886 | |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1887 | X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1888 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1889 | x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1890 | |
| 1891 | X509 CRL ASN1 (TBSCertList, entries present, date in entry invalid) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1892 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1893 | x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1894 | |
| 1895 | X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1896 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1897 | x509parse_crl:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010d0500":"":MBEDTLS_ERR_X509_SIG_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1898 | |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1899 | X509 CRL ASN1 (TBSCertList, sig present, len mismatch) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1900 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1901 | x509parse_crl:"305d3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e05000302000100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1902 | |
| 1903 | X509 CRL ASN1 (TBSCertList, sig present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1904 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 1905 | x509parse_crl:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nserial number\: AB\:CD revocation date\: 2008-12-31 23\:59\:59\nsigned using \: RSA with SHA-224\n":0 |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1906 | |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1907 | X509 CRL ASN1 (TBSCertList, no entries) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1908 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 1909 | x509parse_crl:"30463031020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nsigned using \: RSA with SHA-224\n":0 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1910 | |
Andres AG | fff826c | 2017-03-07 11:11:12 +0000 | [diff] [blame] | 1911 | X509 CRL ASN1 (invalid version 2) |
| 1912 | x509parse_crl:"30463031020102300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1913 | |
| 1914 | X509 CRL ASN1 (invalid version overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1915 | x509parse_crl:"3049303102047fffffff300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Andres AG | fff826c | 2017-03-07 11:11:12 +0000 | [diff] [blame] | 1916 | |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1917 | X509 CRL ASN1 (extension seq too long, crl-idp.pem byte 121) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1918 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1919 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1920 | |
| 1921 | X509 CRL ASN1 (extension oid too long, crl-idp.pem byte 123) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1922 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1923 | x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290628551d1c0101ff041f301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1924 | |
| 1925 | X509 CRL ASN1 (extension critical invalid length, crl-idp.pem byte 128) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1926 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1927 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1928 | |
| 1929 | X509 CRL ASN1 (extension data too long, crl-idp.pem byte 131) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1930 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1931 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1932 | |
| 1933 | X509 CRL ASN1 (extension data too short, crl-idp.pem byte 131) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1934 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1935 | x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c0101ff041e301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1936 | |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 1937 | X509 CRL ASN1 (extension not critical explicit, crl-idp.pem byte 129) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1938 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 1939 | x509parse_crl:"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":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2018-03-14 07\:31\:48\nnext update \: 2028-03-14 07\:31\:48\nRevoked certificates\:\nsigned using \: RSA with SHA-256\n":0 |
| 1940 | |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1941 | X509 CRT parse path #2 (one cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1942 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
| 1943 | mbedtls_x509_crt_parse_path:"data_files/dir1":0:1 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1944 | |
| 1945 | X509 CRT parse path #3 (two certs) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1946 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 1947 | mbedtls_x509_crt_parse_path:"data_files/dir2":0:2 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1948 | |
| 1949 | X509 CRT parse path #4 (two certs, one non-cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1950 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 1951 | mbedtls_x509_crt_parse_path:"data_files/dir3":1:2 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 1952 | |
Manuel Pégourié-Gonnard | 1beb048 | 2017-06-05 13:49:44 +0200 | [diff] [blame] | 1953 | X509 CRT verify long chain (max intermediate CA, trusted) |
| 1954 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 1955 | mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA:0:0 |
| 1956 | |
| 1957 | X509 CRT verify long chain (max intermediate CA, untrusted) |
| 1958 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 1959 | mbedtls_x509_crt_verify_max:"data_files/test-ca2.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA-1:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED |
| 1960 | |
| 1961 | X509 CRT verify long chain (max intermediate CA + 1) |
| 1962 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 31458a1 | 2017-06-26 10:11:49 +0200 | [diff] [blame] | 1963 | mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA+1:MBEDTLS_ERR_X509_FATAL_ERROR:-1 |
Manuel Pégourié-Gonnard | 1beb048 | 2017-06-05 13:49:44 +0200 | [diff] [blame] | 1964 | |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1965 | X509 CRT verify chain #1 (zero pathlen intermediate) |
Janos Follath | 822b2c3 | 2015-10-11 10:25:22 +0200 | [diff] [blame] | 1966 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1967 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert14.crt data_files/dir4/cert13.crt data_files/dir4/cert12.crt":"data_files/dir4/cert11.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | 822b2c3 | 2015-10-11 10:25:22 +0200 | [diff] [blame] | 1968 | |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1969 | X509 CRT verify chain #2 (zero pathlen root) |
| 1970 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1971 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert23.crt data_files/dir4/cert22.crt":"data_files/dir4/cert21.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1972 | |
| 1973 | X509 CRT verify chain #3 (nonzero pathlen root) |
| 1974 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1975 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert34.crt data_files/dir4/cert33.crt data_files/dir4/cert32.crt":"data_files/dir4/cert31.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1976 | |
| 1977 | X509 CRT verify chain #4 (nonzero pathlen intermediate) |
| 1978 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1979 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert45.crt data_files/dir4/cert44.crt data_files/dir4/cert43.crt data_files/dir4/cert42.crt":"data_files/dir4/cert41.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1980 | |
| 1981 | X509 CRT verify chain #5 (nonzero maxpathlen intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1982 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1983 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert54.crt data_files/dir4/cert53.crt data_files/dir4/cert52.crt":"data_files/dir4/cert51.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1984 | |
| 1985 | X509 CRT verify chain #6 (nonzero maxpathlen root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1986 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1987 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1988 | |
| 1989 | X509 CRT verify chain #7 (maxpathlen root, self signed in path) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1990 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1991 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert74.crt data_files/dir4/cert73.crt data_files/dir4/cert72.crt":"data_files/dir4/cert71.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1992 | |
| 1993 | X509 CRT verify chain #8 (self signed maxpathlen root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1994 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1995 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert61.crt data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 1996 | |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 1997 | X509 CRT verify chain #9 (zero pathlen first intermediate, valid) |
Manuel Pégourié-Gonnard | a3aa43d | 2015-11-19 10:46:07 +0100 | [diff] [blame] | 1998 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 1999 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert83.crt data_files/dir4/cert82.crt":"data_files/dir4/cert81.crt":0:0:"":0 |
Manuel Pégourié-Gonnard | a3aa43d | 2015-11-19 10:46:07 +0100 | [diff] [blame] | 2000 | |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2001 | X509 CRT verify chain #10 (zero pathlen root, valid) |
| 2002 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2003 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":0:0:"":0 |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2004 | |
Manuel Pégourié-Gonnard | 9832cea | 2017-05-23 10:13:40 +0200 | [diff] [blame] | 2005 | X509 CRT verify chain #11 (valid chain, missing profile) |
| 2006 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2007 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":-1:MBEDTLS_ERR_X509_BAD_INPUT_DATA:"nonesuch":0 |
Manuel Pégourié-Gonnard | 9832cea | 2017-05-23 10:13:40 +0200 | [diff] [blame] | 2008 | |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2009 | X509 CRT verify chain #12 (suiteb profile, RSA root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2010 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2011 | mbedtls_x509_crt_verify_chain:"data_files/server3.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2012 | |
| 2013 | X509 CRT verify chain #13 (RSA only profile, EC root) |
| 2014 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2015 | mbedtls_x509_crt_verify_chain:"data_files/server4.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2016 | |
Manuel Pégourié-Gonnard | d092277 | 2017-06-27 13:26:43 +0200 | [diff] [blame] | 2017 | X509 CRT verify chain #13 (RSA only profile, EC trusted EE) |
| 2018 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2019 | mbedtls_x509_crt_verify_chain:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
| 2020 | |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2021 | X509 CRT verify chain #14 (RSA-3072 profile, root key too small) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2022 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2023 | mbedtls_x509_crt_verify_chain:"data_files/server1.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2024 | |
| 2025 | X509 CRT verify chain #15 (suiteb profile, rsa intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2026 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2027 | mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2028 | |
| 2029 | X509 CRT verify chain #16 (RSA-only profile, EC intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2030 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2031 | mbedtls_x509_crt_verify_chain:"data_files/server8.crt data_files/test-int-ca2.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2032 | |
| 2033 | X509 CRT verify chain #17 (SHA-512 profile) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2034 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2035 | mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_MD:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"sha512":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2036 | |
Manuel Pégourié-Gonnard | 4185978 | 2017-05-23 12:58:53 +0200 | [diff] [blame] | 2037 | X509 CRT verify chain #18 (len=1, vrfy fatal on depth 1) |
| 2038 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C |
| 2039 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-2:"":2 |
| 2040 | |
| 2041 | X509 CRT verify chain #19 (len=0, vrfy fatal on depth 0) |
| 2042 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C |
| 2043 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-1:"":1 |
| 2044 | |
| 2045 | X509 CRT verify chain #20 (len=1, vrfy fatal on depth 0) |
| 2046 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
| 2047 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca.crt":-1:-1:"":1 |
| 2048 | |
| 2049 | X509 CRT verify chain #21 (len=3, vrfy fatal on depth 3) |
| 2050 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2051 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-4:"":8 |
| 2052 | |
| 2053 | X509 CRT verify chain #22 (len=3, vrfy fatal on depth 2) |
| 2054 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2055 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-3:"":4 |
| 2056 | |
| 2057 | X509 CRT verify chain #23 (len=3, vrfy fatal on depth 1) |
| 2058 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2059 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-2:"":2 |
| 2060 | |
| 2061 | X509 CRT verify chain #24 (len=3, vrfy fatal on depth 0) |
| 2062 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2063 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-1:"":1 |
| 2064 | |
| 2065 | X509 CRT verify chain #25 (len=3, vrfy fatal on depth 3, untrusted) |
| 2066 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2067 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca2.crt":-1:-4:"":8 |
| 2068 | |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2069 | X509 OID description #1 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2070 | x509_oid_desc:"2b06010505070301":"TLS Web Server Authentication" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2071 | |
| 2072 | X509 OID description #2 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2073 | x509_oid_desc:"2b0601050507030f":"notfound" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2074 | |
| 2075 | X509 OID description #3 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2076 | x509_oid_desc:"2b0601050507030100":"notfound" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2077 | |
| 2078 | X509 OID numstring #1 (wide buffer) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2079 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":20:17 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2080 | |
| 2081 | X509 OID numstring #2 (buffer just fits) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2082 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":18:17 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2083 | |
| 2084 | X509 OID numstring #3 (buffer too small) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2085 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":17:MBEDTLS_ERR_OID_BUF_TOO_SMALL |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2086 | |
| 2087 | X509 OID numstring #4 (larger number) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2088 | x509_oid_numstr:"2a864886f70d":"1.2.840.113549":15:14 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2089 | |
| 2090 | X509 OID numstring #5 (arithmetic overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2091 | x509_oid_numstr:"2a8648f9f8f7f6f5f4f3f2f1f001":"":100:MBEDTLS_ERR_OID_BUF_TOO_SMALL |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2092 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2093 | X509 CRT keyUsage #1 (no extension, expected KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2094 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2095 | x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2096 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2097 | X509 CRT keyUsage #2 (no extension, surprising KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2098 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2099 | x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2100 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2101 | X509 CRT keyUsage #3 (extension present, no KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2102 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2103 | x509_check_key_usage:"data_files/server1.key_usage.crt":0:0 |
| 2104 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2105 | X509 CRT keyUsage #4 (extension present, single KU present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2106 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2107 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2108 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2109 | X509 CRT keyUsage #5 (extension present, single KU absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2110 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2111 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2112 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2113 | X509 CRT keyUsage #6 (extension present, combined KU present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2114 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2115 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2116 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2117 | X509 CRT keyUsage #7 (extension present, combined KU both absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2118 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2119 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_KU_CRL_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2120 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2121 | X509 CRT keyUsage #8 (extension present, combined KU one absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2122 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2123 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_KEY_AGREEMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2124 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2125 | X509 CRT keyUsage #9 (extension present, decOnly allowed absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2126 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2127 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0 |
| 2128 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2129 | X509 CRT keyUsage #10 (extension present, decOnly non-allowed present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2130 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2131 | x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
| 2132 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2133 | X509 CRT keyUsage #11 (extension present, decOnly allowed present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2134 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2135 | x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0 |
| 2136 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2137 | X509 CRT extendedKeyUsage #1 (no extension, serverAuth) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2138 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2139 | x509_check_extended_key_usage:"data_files/server5.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2140 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2141 | X509 CRT extendedKeyUsage #2 (single value, present) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2142 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2143 | x509_check_extended_key_usage:"data_files/server5.eku-srv.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2144 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2145 | X509 CRT extendedKeyUsage #3 (single value, absent) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2146 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2147 | x509_check_extended_key_usage:"data_files/server5.eku-cli.crt":"2b06010505070301":MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2148 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2149 | X509 CRT extendedKeyUsage #4 (two values, first) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2150 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2151 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2152 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2153 | X509 CRT extendedKeyUsage #5 (two values, second) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2154 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2155 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070302":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2156 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2157 | X509 CRT extendedKeyUsage #6 (two values, other) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2158 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2159 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070303":MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2160 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2161 | X509 CRT extendedKeyUsage #7 (any, random) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2162 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2163 | x509_check_extended_key_usage:"data_files/server5.eku-cs_any.crt":"2b060105050703ff":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2164 | |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2165 | X509 RSASSA-PSS parameters ASN1 (good, all defaults) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2166 | x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2167 | |
| 2168 | X509 RSASSA-PSS parameters ASN1 (wrong initial tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2169 | x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2170 | |
| 2171 | X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2172 | x509_parse_rsassa_pss_params:"a400":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2173 | |
| 2174 | X509 RSASSA-PSS parameters ASN1 (good, HashAlg SHA256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2175 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2176 | x509_parse_rsassa_pss_params:"a00d300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2177 | |
| 2178 | X509 RSASSA-PSS parameters ASN1 (good, explicit HashAlg = default) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2179 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2180 | x509_parse_rsassa_pss_params:"a009300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2181 | |
| 2182 | X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2183 | x509_parse_rsassa_pss_params:"a00a300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2184 | |
| 2185 | X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2186 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2187 | x509_parse_rsassa_pss_params:"a00a300706052b0e03021a00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2188 | |
| 2189 | X509 RSASSA-PSS parameters ASN1 (HashAlg with parameters) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2190 | x509_parse_rsassa_pss_params:"a00f300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2191 | |
Paul Bakker | 237a847 | 2014-06-25 14:45:24 +0200 | [diff] [blame] | 2192 | X509 RSASSA-PSS parameters ASN1 (HashAlg unknown OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2193 | x509_parse_rsassa_pss_params:"a00d300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2194 | |
| 2195 | X509 RSASSA-PSS parameters ASN1 (good, MGAlg = MGF1-SHA256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2196 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2197 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2198 | |
| 2199 | X509 RSASSA-PSS parameters ASN1 (good, explicit MGAlg = default) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2200 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2201 | x509_parse_rsassa_pss_params:"a116301406092a864886f70d010108300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2202 | |
| 2203 | X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2204 | x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2205 | |
| 2206 | X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2207 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2208 | x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b060960864801650304020100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2209 | |
| 2210 | X509 RSASSA-PSS parameters ASN1 (MGAlg AlgId wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2211 | x509_parse_rsassa_pss_params:"a11a301906092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2212 | |
| 2213 | X509 RSASSA-PSS parameters ASN1 (MGAlg OID != MGF1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2214 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010109300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2215 | |
| 2216 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2217 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108310b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2218 | |
| 2219 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2220 | x509_parse_rsassa_pss_params:"a10f300d06092a864886f70d0101083000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2221 | |
| 2222 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2223 | x509_parse_rsassa_pss_params:"a11b301906092a864886f70d010108300c0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2224 | |
| 2225 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2226 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0709608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2227 | |
| 2228 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2229 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2230 | |
| 2231 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2232 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2233 | x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2234 | |
| 2235 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2236 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2237 | x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2238 | |
| 2239 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1c) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2240 | x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2241 | |
| 2242 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2243 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2244 | x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e0609608648016503040201050000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2245 | |
| 2246 | X509 RSASSA-PSS parameters ASN1 (good, saltLen = 94) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2247 | x509_parse_rsassa_pss_params:"a20302015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2248 | |
| 2249 | X509 RSASSA-PSS parameters ASN1 (good, explicit saltLen = default) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2250 | x509_parse_rsassa_pss_params:"a203020114":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2251 | |
| 2252 | X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2253 | x509_parse_rsassa_pss_params:"a20402015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2254 | |
| 2255 | X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #2) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2256 | x509_parse_rsassa_pss_params:"a20402015e00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2257 | |
| 2258 | X509 RSASSA-PSS parameters ASN1 (saltLen not an int) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2259 | x509_parse_rsassa_pss_params:"a2023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2260 | |
| 2261 | X509 RSASSA-PSS parameters ASN1 (good, explicit trailerField = default) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2262 | x509_parse_rsassa_pss_params:"a303020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2263 | |
| 2264 | X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2265 | x509_parse_rsassa_pss_params:"a304020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2266 | |
| 2267 | X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #2) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2268 | x509_parse_rsassa_pss_params:"a30402010100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2269 | |
| 2270 | X509 RSASSA-PSS parameters ASN1 (trailerField not an int) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2271 | x509_parse_rsassa_pss_params:"a3023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2272 | |
| 2273 | X509 RSASSA-PSS parameters ASN1 (trailerField not 1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2274 | x509_parse_rsassa_pss_params:"a303020102":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2275 | |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2276 | X509 CSR ASN.1 (OK) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2277 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2278 | mbedtls_x509_csr_parse:"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":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n":0 |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2279 | |
| 2280 | X509 CSR ASN.1 (bad first tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2281 | mbedtls_x509_csr_parse:"3100":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2282 | |
| 2283 | X509 CSR ASN.1 (bad sequence: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2284 | mbedtls_x509_csr_parse:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2285 | |
| 2286 | X509 CSR ASN.1 (total length mistmatch) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2287 | mbedtls_x509_csr_parse:"30010000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2288 | |
| 2289 | X509 CSR ASN.1 (bad CRI: not a sequence) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2290 | mbedtls_x509_csr_parse:"30023100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2291 | |
| 2292 | X509 CSR ASN.1 (bad CRI: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2293 | mbedtls_x509_csr_parse:"30023001":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2294 | |
| 2295 | X509 CSR ASN.1 (bad CRI.Version: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2296 | mbedtls_x509_csr_parse:"30053002020100":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2297 | |
| 2298 | X509 CSR ASN.1 (bad CRI.Version: not v1) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2299 | mbedtls_x509_csr_parse:"30053003020101":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2300 | |
| 2301 | X509 CSR ASN.1 (bad CRI.Name: not a sequence) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2302 | mbedtls_x509_csr_parse:"300730050201003100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2303 | |
| 2304 | X509 CSR ASN.1 (bad CRI.Name: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2305 | mbedtls_x509_csr_parse:"30083005020100300100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2306 | |
| 2307 | X509 CSR ASN.1 (bad CRI.Name payload: not a set) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2308 | mbedtls_x509_csr_parse:"3009300702010030023000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2309 | |
| 2310 | X509 CSR ASN.1 (bad CRI.Name payload: overlong) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2311 | mbedtls_x509_csr_parse:"300a30080201003002310100":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2312 | |
| 2313 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: missing) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2314 | mbedtls_x509_csr_parse:"30143012020100300d310b3009060355040613024e4c":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2315 | |
| 2316 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2317 | mbedtls_x509_csr_parse:"30163014020100300d310b3009060355040613024e4c3100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2318 | |
| 2319 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: overlong) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2320 | mbedtls_x509_csr_parse:"30173014020100300d310b3009060355040613024e4c300100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2321 | |
| 2322 | X509 CSR ASN.1 (bad attributes: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2323 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2324 | mbedtls_x509_csr_parse:"3081973081940201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2325 | |
| 2326 | X509 CSR ASN.1 (bad attributes: bad tag) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2327 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2328 | mbedtls_x509_csr_parse:"3081993081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2329 | |
| 2330 | X509 CSR ASN.1 (bad attributes: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2331 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2332 | mbedtls_x509_csr_parse:"30819a3081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa00100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2333 | |
| 2334 | X509 CSR ASN.1 (bad sigAlg: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2335 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2336 | mbedtls_x509_csr_parse:"3081c23081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2337 | |
| 2338 | X509 CSR ASN.1 (bad sigAlg: not a sequence) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2339 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2340 | mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2341 | |
| 2342 | X509 CSR ASN.1 (bad sigAlg: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2343 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2344 | mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2345 | |
| 2346 | X509 CSR ASN.1 (bad sigAlg: unknown) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2347 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2348 | mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2349 | |
| 2350 | X509 CSR ASN.1 (bad sig: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2351 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2352 | mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d0401":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2353 | |
| 2354 | X509 CSR ASN.1 (bad sig: not a bit string) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2355 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2356 | mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010400":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2357 | |
| 2358 | X509 CSR ASN.1 (bad sig: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2359 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2360 | mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2361 | |
| 2362 | X509 CSR ASN.1 (extra data after signature) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2363 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2364 | mbedtls_x509_csr_parse:"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":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2365 | |
Andres AG | f00baff | 2017-03-07 10:57:34 +0000 | [diff] [blame] | 2366 | X509 CSR ASN.1 (invalid version overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2367 | mbedtls_x509_csr_parse:"3008300602047fffffff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Andres AG | f00baff | 2017-03-07 10:57:34 +0000 | [diff] [blame] | 2368 | |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2369 | X509 File parse (no issues) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2370 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2371 | x509parse_crt_file:"data_files/server7_int-ca.crt":0 |
| 2372 | |
| 2373 | X509 File parse (extra space in one certificate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2374 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2375 | x509parse_crt_file:"data_files/server7_pem_space.crt":1 |
| 2376 | |
| 2377 | X509 File parse (all certificates fail) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2378 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2379 | x509parse_crt_file:"data_files/server7_all_space.crt":MBEDTLS_ERR_PEM_INVALID_DATA + MBEDTLS_ERR_BASE64_INVALID_CHARACTER |
Manuel Pégourié-Gonnard | 052d10c | 2015-07-31 11:09:59 +0200 | [diff] [blame] | 2380 | |
| 2381 | X509 File parse (trailing spaces, OK) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2382 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 052d10c | 2015-07-31 11:09:59 +0200 | [diff] [blame] | 2383 | x509parse_crt_file:"data_files/server7_trailing_space.crt":0 |
Andres AG | 4b76aec | 2016-09-23 13:16:02 +0100 | [diff] [blame] | 2384 | |
| 2385 | X509 Get time (UTC no issues) |
| 2386 | depends_on:MBEDTLS_X509_USE_C |
| 2387 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"500101000000Z":0:1950:1:1:0:0:0 |
| 2388 | |
| 2389 | X509 Get time (Generalized Time no issues) |
| 2390 | depends_on:MBEDTLS_X509_USE_C |
| 2391 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"99991231235959Z":0:9999:12:31:23:59:59 |
| 2392 | |
| 2393 | X509 Get time (UTC year without leap day) |
| 2394 | depends_on:MBEDTLS_X509_USE_C |
| 2395 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"490229121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2396 | |
| 2397 | X509 Get time (UTC year with leap day) |
| 2398 | depends_on:MBEDTLS_X509_USE_C |
| 2399 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212Z":0:2000:2:29:12:12:12 |
| 2400 | |
| 2401 | X509 Get time (UTC invalid day of month #1) |
| 2402 | depends_on:MBEDTLS_X509_USE_C |
| 2403 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000132121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2404 | |
| 2405 | X509 Get time (UTC invalid day of month #2) |
| 2406 | depends_on:MBEDTLS_X509_USE_C |
| 2407 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001131121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2408 | |
| 2409 | X509 Get time (UTC invalid hour) |
| 2410 | depends_on:MBEDTLS_X509_USE_C |
| 2411 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130241212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2412 | |
| 2413 | X509 Get time (UTC invalid min) |
| 2414 | depends_on:MBEDTLS_X509_USE_C |
| 2415 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130236012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2416 | |
| 2417 | X509 Get time (UTC invalid sec) |
| 2418 | depends_on:MBEDTLS_X509_USE_C |
| 2419 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130235960Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
Janos Follath | ea7054a | 2017-02-08 14:13:02 +0000 | [diff] [blame] | 2420 | |
| 2421 | X509 Get time (UTC without time zone) |
| 2422 | depends_on:MBEDTLS_X509_USE_C |
| 2423 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212":0:2000:2:29:12:12:12 |
| 2424 | |
| 2425 | X509 Get time (UTC with invalid time zone #1) |
| 2426 | depends_on:MBEDTLS_X509_USE_C |
| 2427 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2428 | |
| 2429 | X509 Get time (UTC with invalid time zone #2) |
| 2430 | depends_on:MBEDTLS_X509_USE_C |
| 2431 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2432 | |
| 2433 | X509 Get time (Date with invalid tag) |
| 2434 | depends_on:MBEDTLS_X509_USE_C |
| 2435 | x509_get_time:MBEDTLS_ASN1_CONTEXT_SPECIFIC:"000229121212":MBEDTLS_ERR_X509_INVALID_DATE+MBEDTLS_ERR_ASN1_UNEXPECTED_TAG:0:0:0:0:0:0 |
| 2436 | |
| 2437 | X509 Get time (UTC, truncated) |
| 2438 | depends_on:MBEDTLS_X509_USE_C |
| 2439 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2440 | |
| 2441 | X509 Get time (Generalized Time, truncated) |
| 2442 | depends_on:MBEDTLS_X509_USE_C |
| 2443 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2444 | |
| 2445 | X509 Get time (UTC without seconds) |
| 2446 | depends_on:MBEDTLS_X509_USE_C |
| 2447 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212":MBEDTLS_ERR_X509_INVALID_DATE:2000:2:29:12:12:0 |
| 2448 | |
| 2449 | X509 Get time (UTC without seconds and with invalid time zone #1) |
| 2450 | depends_on:MBEDTLS_X509_USE_C |
| 2451 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2452 | |
| 2453 | X509 Get time (UTC without second and with invalid time zone #2) |
| 2454 | depends_on:MBEDTLS_X509_USE_C |
| 2455 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2456 | |
| 2457 | X509 Get time (UTC invalid character in year) |
| 2458 | depends_on:MBEDTLS_X509_USE_C |
| 2459 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0\1130231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2460 | |
| 2461 | X509 Get time (UTC invalid character in month) |
| 2462 | depends_on:MBEDTLS_X509_USE_C |
| 2463 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001%30231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2464 | |
| 2465 | X509 Get time (UTC invalid character in day) |
| 2466 | depends_on:MBEDTLS_X509_USE_C |
| 2467 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011`0231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2468 | |
| 2469 | X509 Get time (UTC invalid character in hour) |
| 2470 | depends_on:MBEDTLS_X509_USE_C |
| 2471 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302h1212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2472 | |
| 2473 | X509 Get time (UTC invalid character in min) |
| 2474 | depends_on:MBEDTLS_X509_USE_C |
| 2475 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"00113023u012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2476 | |
| 2477 | X509 Get time (UTC invalid character in sec) |
| 2478 | depends_on:MBEDTLS_X509_USE_C |
| 2479 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302359n0Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2480 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2481 | X509 Get time (Generalized Time, year multiple of 100 but not 400 is not a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2482 | depends_on:MBEDTLS_X509_USE_C |
| 2483 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19000229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2484 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2485 | X509 Get time (Generalized Time, year multiple of 4 but not 100 is a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2486 | depends_on:MBEDTLS_X509_USE_C |
| 2487 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19920229000000Z":0:1992:2:29:0:0:0 |
| 2488 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2489 | X509 Get time (Generalized Time, year multiple of 400 is a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2490 | depends_on:MBEDTLS_X509_USE_C |
| 2491 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229000000Z":0:2000:2:29:0:0:0 |
| 2492 | |
| 2493 | X509 Get time (Generalized Time invalid leap year not multiple of 4, 100 or 400) |
| 2494 | depends_on:MBEDTLS_X509_USE_C |
| 2495 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19910229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
Manuel Pégourié-Gonnard | da19f4c | 2018-06-12 12:40:54 +0200 | [diff] [blame] | 2496 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2497 | X509 CRT verify restart: trusted EE, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2498 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2499 | x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:0:0:0 |
| 2500 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2501 | X509 CRT verify restart: trusted EE, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2502 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2503 | x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:1:0:0 |
| 2504 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2505 | X509 CRT verify restart: no intermediate, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2506 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2507 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:0:0:0 |
| 2508 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2509 | X509 CRT verify restart: no intermediate, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2510 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2511 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:1:100:10000 |
| 2512 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2513 | X509 CRT verify restart: no intermediate, max_ops=40000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2514 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2515 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:40000:0:0 |
| 2516 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2517 | X509 CRT verify restart: no intermediate, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2518 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2519 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:500:20:80 |
| 2520 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2521 | X509 CRT verify restart: no intermediate, badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2522 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2523 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
| 2524 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2525 | X509 CRT verify restart: no intermediate, badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2526 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2527 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2528 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2529 | X509 CRT verify restart: no intermediate, badsign, max_ops=40000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2530 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2531 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:40000:0:0 |
| 2532 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2533 | X509 CRT verify restart: no intermediate, badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2534 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2535 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:20:80 |
| 2536 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2537 | X509 CRT verify restart: one int, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2538 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2539 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:0:0:0 |
| 2540 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2541 | X509 CRT verify restart: one int, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2542 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2543 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:1:100:10000 |
| 2544 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2545 | X509 CRT verify restart: one int, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2546 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2547 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:30000:0:0 |
| 2548 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2549 | X509 CRT verify restart: one int, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2550 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2551 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:500:25:100 |
| 2552 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2553 | X509 CRT verify restart: one int, EE badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2554 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2555 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
| 2556 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2557 | X509 CRT verify restart: one int, EE badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2558 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2559 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2560 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2561 | X509 CRT verify restart: one int, EE badsign, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2562 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2563 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0 |
| 2564 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2565 | X509 CRT verify restart: one int, EE badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2566 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2567 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100 |
| 2568 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2569 | X509 CRT verify restart: one int, int badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2570 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2571 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2572 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2573 | X509 CRT verify restart: one int, int badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2574 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2575 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2576 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2577 | X509 CRT verify restart: one int, int badsign, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2578 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2579 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0 |
| 2580 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2581 | X509 CRT verify restart: one int, int badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2582 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2583 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100 |