Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1 | X509 CRT information #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 3 | x509_cert_info:"data_files/server1.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 4 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 5 | X509 CRT information #1 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 6 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 7 | x509_cert_info:"data_files/server1.crt.der":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 8 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 9 | X509 CRT information #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 10 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 11 | x509_cert_info:"data_files/server2.crt":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 12 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 13 | X509 CRT information #2 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 14 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 15 | x509_cert_info:"data_files/server2.crt.der":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 16 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 17 | X509 CRT information #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 18 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 19 | x509_cert_info:"data_files/test-ca.crt":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-02-10 14\:44\:00\nexpires on \: 2029-02-10 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 20 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 21 | X509 CRT information #3 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 22 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 23 | x509_cert_info:"data_files/test-ca.crt.der":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-02-10 14\:44\:00\nexpires on \: 2029-02-10 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n" |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 24 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 25 | X509 CRT information MD2 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 26 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD2_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 27 | x509_cert_info:"data_files/cert_md2.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD2\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 28 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 29 | X509 CRT information MD4 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 30 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD4_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 31 | x509_cert_info:"data_files/cert_md4.crt":"cert. version \: 3\nserial number \: 05\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD4\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 32 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 33 | X509 CRT information MD5 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 34 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD5_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 35 | x509_cert_info:"data_files/cert_md5.crt":"cert. version \: 3\nserial number \: 06\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD5\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 36 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 37 | X509 CRT information SHA1 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 38 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 39 | x509_cert_info:"data_files/cert_sha1.crt":"cert. version \: 3\nserial number \: 07\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 40 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 41 | X509 CRT information SHA224 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 42 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 43 | x509_cert_info:"data_files/cert_sha224.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA224\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 44 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 45 | X509 CRT information SHA256 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 46 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 47 | x509_cert_info:"data_files/cert_sha256.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA256\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 48 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 49 | X509 CRT information SHA384 Digest |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 50 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA384_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 51 | x509_cert_info:"data_files/cert_sha384.crt":"cert. version \: 3\nserial number \: 0A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA384\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 52 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 53 | X509 CRT information SHA512 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 54 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 55 | x509_cert_info:"data_files/cert_sha512.crt":"cert. version \: 3\nserial number \: 0B\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA512\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 56 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 57 | X509 CRT information RSA-PSS, SHA1 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 58 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 59 | x509_cert_info:"data_files/server9.crt":"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 60 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 61 | X509 CRT information RSA-PSS, SHA224 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 62 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 63 | x509_cert_info:"data_files/server9-sha224.crt":"cert. version \: 3\nserial number \: 17\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:36\nexpires on \: 2024-01-18 13\:57\:36\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 64 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 65 | X509 CRT information RSA-PSS, SHA256 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 66 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 67 | x509_cert_info:"data_files/server9-sha256.crt":"cert. version \: 3\nserial number \: 18\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:45\nexpires on \: 2024-01-18 13\:57\:45\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 68 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 69 | X509 CRT information RSA-PSS, SHA384 Digest |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 70 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA384_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 71 | x509_cert_info:"data_files/server9-sha384.crt":"cert. version \: 3\nserial number \: 19\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:58\nexpires on \: 2024-01-18 13\:57\:58\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 72 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 73 | X509 CRT information RSA-PSS, SHA512 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 74 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 75 | x509_cert_info:"data_files/server9-sha512.crt":"cert. version \: 3\nserial number \: 1A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:58\:12\nexpires on \: 2024-01-18 13\:58\:12\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 59a75d5 | 2014-01-22 10:12:57 +0100 | [diff] [blame] | 76 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 77 | X509 CRT information EC, SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 78 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 79 | x509_cert_info:"data_files/server5-sha1.crt":"cert. version \: 3\nserial number \: 12\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 80 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 81 | X509 CRT information EC, SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 82 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 83 | x509_cert_info:"data_files/server5-sha224.crt":"cert. version \: 3\nserial number \: 13\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 84 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 85 | X509 CRT information EC, SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 86 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 87 | x509_cert_info:"data_files/server5.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 88 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 89 | X509 CRT information EC, SHA384 Digest |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 90 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA384_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 91 | x509_cert_info:"data_files/server5-sha384.crt":"cert. version \: 3\nserial number \: 14\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 92 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 93 | X509 CRT information EC, SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 94 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 95 | x509_cert_info:"data_files/server5-sha512.crt":"cert. version \: 3\nserial number \: 15\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 96 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 97 | X509 CRT information EC, SHA256 Digest, hardware module name SAN |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 98 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 99 | x509_cert_info:"data_files/server5-othername.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nissued on \: 2019-03-24 09\:06\:02\nexpires on \: 2029-03-21 09\:06\:02\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n" |
| 100 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 101 | X509 CRT information EC, SHA256 Digest, Wisun Fan device |
Ron Eldor | 3c4734a | 2019-03-25 14:05:23 +0200 | [diff] [blame] | 102 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 103 | x509_cert_info:"data_files/server5-fan.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nissued on \: 2019-03-25 09\:03\:46\nexpires on \: 2029-03-22 09\:03\:46\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\next key usage \: Wi-SUN Alliance Field Area Network (FAN)\n" |
| 104 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 105 | X509 CRT information, NS Cert Type |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 106 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 107 | x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\ncert. type \: SSL Server\n" |
Manuel Pégourié-Gonnard | 919f8f5 | 2014-04-01 13:01:11 +0200 | [diff] [blame] | 108 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 109 | X509 CRT information, Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 110 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 111 | x509_cert_info:"data_files/server1.key_usage.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n" |
Manuel Pégourié-Gonnard | 65c2ddc | 2014-04-01 14:12:11 +0200 | [diff] [blame] | 112 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 113 | X509 CRT information, Key Usage with decipherOnly |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 114 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 9a70225 | 2015-06-23 10:14:36 +0200 | [diff] [blame] | 115 | x509_cert_info:"data_files/keyUsage.decipherOnly.crt":"cert. version \: 3\nserial number \: 9B\:13\:CE\:4C\:A5\:6F\:DE\:52\nissuer name \: C=GB, L=Cambridge, O=Default Company Ltd\nsubject name \: C=GB, L=Cambridge, O=Default Company Ltd\nissued on \: 2015-05-12 10\:36\:55\nexpires on \: 2018-05-11 10\:36\:55\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment, Decipher Only\n" |
| 116 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 117 | X509 CRT information, Subject Alt Name |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 118 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 119 | x509_cert_info:"data_files/cert_example_multi.crt":"cert. version \: 3\nserial number \: 11\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=www.example.com\nissued on \: 2019-07-10 11\:27\:52\nexpires on \: 2029-07-10 11\:27\:52\nsigned using \: RSA with SHA-256\nRSA key size \: 1024 bits\nsubject alt name \:\n dNSName \: example.com\n dNSName \: example.net\n dNSName \: *.example.org\n" |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 120 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 121 | X509 CRT information, Multiple different Subject Alt Name |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 122 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 123 | x509_cert_info:"data_files/multiple_san.crt":"cert. version \: 3\nserial number \: 04\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nissued on \: 2019-04-22 16\:10\:48\nexpires on \: 2029-04-19 16\:10\:48\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n dNSName \: example.com\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n dNSName \: example.net\n dNSName \: *.example.org\n" |
Manuel Pégourié-Gonnard | bce2b30 | 2014-04-01 13:43:28 +0200 | [diff] [blame] | 124 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 125 | X509 CRT information, Subject Alt Name + Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 126 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Janos Follath | 22f605f | 2019-05-10 10:37:17 +0100 | [diff] [blame] | 127 | x509_cert_info:"data_files/cert_example_multi_nocn.crt":"cert. version \: 3\nserial number \: F7\:C6\:7F\:F8\:E9\:A9\:63\:F9\nissuer name \: C=NL\nsubject name \: C=NL\nissued on \: 2014-01-22 10\:04\:33\nexpires on \: 2024-01-22 10\:04\:33\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: www.shotokan-braunschweig.de\n dNSName \: www.massimo-abate.eu\n <unsupported>\n <unsupported>\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n" |
Manuel Pégourié-Gonnard | 65c2ddc | 2014-04-01 14:12:11 +0200 | [diff] [blame] | 128 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 129 | X509 CRT information, RSA Certificate Policy any |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 130 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 131 | x509_cert_info:"data_files/test-ca-any_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-03-21 16\:40\:59\nexpires on \: 2029-03-21 16\:40\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 132 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 133 | X509 CRT information, ECDSA Certificate Policy any |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 134 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 135 | x509_cert_info:"data_files/test-ca-any_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-03-25 09\:02\:45\nexpires on \: 2029-03-25 09\:02\:45\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 136 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 137 | X509 CRT information, RSA Certificate Policy any with qualifier |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 138 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 139 | x509_cert_info:"data_files/test-ca-any_policy_with_qualifier.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:14\:31\nexpires on \: 2029-04-28 13\:14\:31\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 140 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 141 | X509 CRT information, ECDSA Certificate Policy any with qualifier |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 142 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 143 | x509_cert_info:"data_files/test-ca-any_policy_with_qualifier_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 10\:16\:05\nexpires on \: 2029-04-28 10\:16\:05\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 144 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 145 | X509 CRT information, RSA Certificate multiple Policies |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 146 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 147 | x509_cert_info:"data_files/test-ca-multi_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 12\:59\:19\nexpires on \: 2029-04-28 12\:59\:19\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n" |
| 148 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 149 | X509 CRT information, ECDSA Certificate multiple Policies |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 150 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 151 | x509_cert_info:"data_files/test-ca-multi_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 12\:59\:51\nexpires on \: 2029-04-28 12\:59\:51\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n" |
| 152 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 153 | X509 CRT information, RSA Certificate unsupported policy |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 154 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 155 | x509_cert_info:"data_files/test-ca-unsupported_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:00\:13\nexpires on \: 2029-04-28 13\:00\:13\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n" |
| 156 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 157 | X509 CRT information, ECDSA Certificate unsupported policy |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 158 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 159 | x509_cert_info:"data_files/test-ca-unsupported_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 13\:00\:19\nexpires on \: 2029-04-28 13\:00\:19\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n" |
| 160 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 161 | X509 CRT information, Key Usage + Extended Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 162 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 7b30cfc | 2014-04-01 18:00:07 +0200 | [diff] [blame] | 163 | x509_cert_info:"data_files/server1.ext_ku.crt":"cert. version \: 3\nserial number \: 21\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2014-04-01 14\:44\:43\nexpires on \: 2024-03-29 14\:44\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\next key usage \: TLS Web Server Authentication\n" |
Manuel Pégourié-Gonnard | f6f4ab4 | 2014-04-01 17:32:44 +0200 | [diff] [blame] | 164 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 165 | X509 CRT information RSA signed by EC |
palaviv | f180df9 | 2016-08-07 11:56:02 +0300 | [diff] [blame] | 166 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 167 | x509_cert_info:"data_files/server4.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 168 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 169 | X509 CRT information EC signed by RSA |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 170 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 171 | x509_cert_info:"data_files/server3.crt":"cert. version \: 3\nserial number \: 0D\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-08-09 09\:17\:03\nexpires on \: 2023-08-07 09\:17\:03\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 172 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 173 | X509 CRT information Bitstring in subject name |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 174 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Janos Follath | 22f605f | 2019-05-10 10:37:17 +0100 | [diff] [blame] | 175 | x509_cert_info:"data_files/bitstring-in-dn.pem":"cert. version \: 3\nserial number \: 02\nissuer name \: CN=Test CA 01, ST=Ecnivorp, C=XX, emailAddress=tca@example.com, O=Test CA Authority\nsubject name \: C=XX, O=tca, ST=Ecnivorp, OU=TCA, CN=Client, emailAddress=client@example.com, serialNumber=7101012255, uniqueIdentifier=?7101012255\nissued on \: 2015-03-11 12\:06\:51\nexpires on \: 2025-03-08 12\:06\:51\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n <unsupported>\next key usage \: TLS Web Client Authentication\n" |
Manuel Pégourié-Gonnard | 39ead3e | 2015-03-27 13:09:21 +0100 | [diff] [blame] | 176 | |
Koh M. Nakagawa | 46b8782 | 2020-05-16 10:08:09 +0900 | [diff] [blame] | 177 | X509 CRT information Non-ASCII string in issuer name and subject name |
| 178 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 179 | x509_cert_info:"data_files/non-ascii-string-in-issuer.crt":"cert. version \: 3\nserial number \: 05\:E6\:53\:E7\:1B\:74\:F0\:B5\:D3\:84\:6D\:0C\:6D\:DC\:FA\:3F\:A4\:5A\:2B\:E0\nissuer name \: C=JP, ST=Tokyo, O=?????????????????? Ltd, CN=?????????????????? CA\nsubject name \: C=JP, ST=Tokyo, O=?????????????????? Ltd, CN=?????????????????? CA\nissued on \: 2020-05-20 16\:17\:23\nexpires on \: 2020-06-19 16\:17\:23\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n" |
| 180 | |
Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 181 | X509 certificate v1 with extension |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 182 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_SHA1_C |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 183 | x509_cert_info:"data_files/cert_v1_with_ext.crt":"cert. version \: 1\nserial number \: BD\:ED\:44\:C7\:D2\:3E\:C2\:A4\nissuer name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nsubject name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nissued on \: 2013-07-04 16\:17\:02\nexpires on \: 2014-07-04 16\:17\:02\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nsubject alt name \:\n dNSName \: identity-check.org\n dNSName \: www.identity-check.org\n <unsupported>\n" |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 184 | |
| 185 | X509 SAN parsing otherName |
| 186 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 187 | x509_parse_san:"data_files/server5-othername.crt":"type \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\n" |
| 188 | |
| 189 | X509 SAN parsing dNSName |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 190 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 191 | x509_parse_san:"data_files/cert_example_multi.crt":"type \: 2\ndNSName \: example.com\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n" |
| 192 | |
| 193 | X509 SAN parsing Multiple different types |
| 194 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 195 | x509_parse_san:"data_files/multiple_san.crt":"type \: 2\ndNSName \: example.com\ntype \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n" |
| 196 | |
| 197 | X509 SAN parsing, no subject alt name |
| 198 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 199 | x509_parse_san:"data_files/server4.crt":"" |
| 200 | |
| 201 | X509 SAN parsing, unsupported otherName name |
| 202 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 203 | x509_parse_san:"data_files/server5-unsupported_othername.crt":"" |
Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 204 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 205 | X509 CRL information #1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 206 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 207 | mbedtls_x509_crl_info:"data_files/crl_expired.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-20 10\:24\:19\nnext update \: 2011-02-20 11\:24\:19\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 208 | |
| 209 | X509 CRL Information MD2 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 210 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD2_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 211 | mbedtls_x509_crl_info:"data_files/crl_md2.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2009-07-19 19\:56\:37\nnext update \: 2009-09-17 19\:56\:37\nRevoked certificates\:\nserial number\: 01 revocation date\: 2009-02-09 21\:12\:36\nserial number\: 03 revocation date\: 2009-02-09 21\:12\:36\nsigned using \: RSA with MD2\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 212 | |
| 213 | X509 CRL Information MD4 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 214 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 215 | mbedtls_x509_crl_info:"data_files/crl_md4.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD4\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 216 | |
| 217 | X509 CRL Information MD5 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 218 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 219 | mbedtls_x509_crl_info:"data_files/crl_md5.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD5\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 220 | |
| 221 | X509 CRL Information SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 222 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 223 | mbedtls_x509_crl_info:"data_files/crl_sha1.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 224 | |
| 225 | X509 CRL Information SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 226 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 227 | mbedtls_x509_crl_info:"data_files/crl_sha224.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 228 | |
| 229 | X509 CRL Information SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 230 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 231 | mbedtls_x509_crl_info:"data_files/crl_sha256.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 232 | |
| 233 | X509 CRL Information SHA384 Digest |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 234 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA384_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 235 | mbedtls_x509_crl_info:"data_files/crl_sha384.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 236 | |
| 237 | X509 CRL Information SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 238 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 239 | mbedtls_x509_crl_info:"data_files/crl_sha512.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 240 | |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 241 | X509 CRL information RSA-PSS, SHA1 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 242 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
| 243 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:46\:35\nnext update \: 2024-01-18 13\:46\:35\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 244 | |
| 245 | X509 CRL information RSA-PSS, SHA224 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 246 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 247 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:06\nnext update \: 2024-01-18 13\:56\:06\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 248 | |
| 249 | X509 CRL information RSA-PSS, SHA256 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 250 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 251 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:16\nnext update \: 2024-01-18 13\:56\:16\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 252 | |
| 253 | X509 CRL information RSA-PSS, SHA384 Digest |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 254 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA384_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 255 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:28\nnext update \: 2024-01-18 13\:56\:28\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 256 | |
| 257 | X509 CRL information RSA-PSS, SHA512 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 258 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 259 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:38\nnext update \: 2024-01-18 13\:56\:38\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 260 | |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 261 | X509 CRL Information EC, SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 262 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 263 | mbedtls_x509_crl_info:"data_files/crl-ec-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA1\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 264 | |
| 265 | X509 CRL Information EC, SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 266 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 267 | mbedtls_x509_crl_info:"data_files/crl-ec-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA224\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 268 | |
| 269 | X509 CRL Information EC, SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 270 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 271 | mbedtls_x509_crl_info:"data_files/crl-ec-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA256\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 272 | |
| 273 | X509 CRL Information EC, SHA384 Digest |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 274 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA384_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 275 | mbedtls_x509_crl_info:"data_files/crl-ec-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA384\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 276 | |
| 277 | X509 CRL Information EC, SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 278 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 279 | mbedtls_x509_crl_info:"data_files/crl-ec-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA512\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 280 | |
Andres AG | a39db39 | 2016-12-08 17:10:38 +0000 | [diff] [blame] | 281 | X509 CRL Malformed Input (trailing spaces at end of file) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 282 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Andres AG | a39db39 | 2016-12-08 17:10:38 +0000 | [diff] [blame] | 283 | mbedtls_x509_crl_parse:"data_files/crl-malformed-trailing-spaces.pem":MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT |
| 284 | |
Manuel Pégourié-Gonnard | fd3e4fb | 2018-03-13 11:53:30 +0100 | [diff] [blame] | 285 | X509 CRL Unsupported critical extension (issuingDistributionPoint) |
| 286 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 287 | mbedtls_x509_crl_parse:"data_files/crl-idp.pem":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 288 | |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 289 | X509 CRL Unsupported non-critical extension (issuingDistributionPoint) |
| 290 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 291 | mbedtls_x509_crl_parse:"data_files/crl-idpnc.pem":0 |
| 292 | |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 293 | X509 CSR Information RSA with MD4 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 294 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 295 | mbedtls_x509_csr_info:"data_files/server1.req.md4":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 296 | |
| 297 | X509 CSR Information RSA with MD5 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 298 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 299 | mbedtls_x509_csr_info:"data_files/server1.req.md5":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 300 | |
| 301 | X509 CSR Information RSA with SHA1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 302 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 303 | mbedtls_x509_csr_info:"data_files/server1.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 304 | |
| 305 | X509 CSR Information RSA with SHA224 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 306 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 307 | mbedtls_x509_csr_info:"data_files/server1.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 308 | |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 309 | X509 CSR Information RSA with SHA-256 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 310 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 311 | mbedtls_x509_csr_info:"data_files/server1.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 312 | |
| 313 | X509 CSR Information RSA with SHA384 |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 314 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA384_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 315 | mbedtls_x509_csr_info:"data_files/server1.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 316 | |
| 317 | X509 CSR Information RSA with SHA512 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 318 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 319 | mbedtls_x509_csr_info:"data_files/server1.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 320 | |
| 321 | X509 CSR Information EC with SHA1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 322 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 323 | mbedtls_x509_csr_info:"data_files/server5.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 324 | |
| 325 | X509 CSR Information EC with SHA224 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 326 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 327 | mbedtls_x509_csr_info:"data_files/server5.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 328 | |
| 329 | X509 CSR Information EC with SHA256 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 330 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 331 | mbedtls_x509_csr_info:"data_files/server5.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 332 | |
| 333 | X509 CSR Information EC with SHA384 |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 334 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA384_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 335 | mbedtls_x509_csr_info:"data_files/server5.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 336 | |
| 337 | X509 CSR Information EC with SHA512 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 338 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 339 | mbedtls_x509_csr_info:"data_files/server5.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 340 | |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 341 | X509 CSR Information RSA-PSS with SHA1 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 342 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
| 343 | mbedtls_x509_csr_info:"data_files/server9.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0x6A)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 344 | |
| 345 | X509 CSR Information RSA-PSS with SHA224 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 346 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 347 | mbedtls_x509_csr_info:"data_files/server9.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0x62)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 348 | |
| 349 | X509 CSR Information RSA-PSS with SHA256 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 350 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 351 | mbedtls_x509_csr_info:"data_files/server9.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0x5E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 352 | |
| 353 | X509 CSR Information RSA-PSS with SHA384 |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 354 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA384_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 355 | mbedtls_x509_csr_info:"data_files/server9.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0x4E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 356 | |
| 357 | X509 CSR Information RSA-PSS with SHA512 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 358 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 359 | mbedtls_x509_csr_info:"data_files/server9.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0x3E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 360 | |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 361 | X509 CSR Information RSA with SHA-256 - Microsoft header |
Simon Butcher | 03de210 | 2018-10-06 16:24:13 +0100 | [diff] [blame] | 362 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
| 363 | mbedtls_x509_csr_info:"data_files/server1-ms.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n" |
| 364 | |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 365 | X509 Verify Information: empty |
| 366 | x509_verify_info:0:"":"" |
| 367 | |
| 368 | X509 Verify Information: one issue |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 369 | x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:"":"Certificate was missing\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 370 | |
| 371 | X509 Verify Information: two issues |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 372 | x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:"":"The certificate validity has expired\nThe CRL is expired\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 373 | |
| 374 | X509 Verify Information: two issues, one unknown |
Manuel Pégourié-Gonnard | 9505164 | 2015-06-15 10:39:46 +0200 | [diff] [blame] | 375 | x509_verify_info:MBEDTLS_X509_BADCERT_OTHER | 0x80000000:"":"Other reason (can be used by verify callback)\nUnknown reason (this should not happen)\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 376 | |
| 377 | X509 Verify Information: empty, with prefix |
| 378 | x509_verify_info:0:" ! ":"" |
| 379 | |
| 380 | X509 Verify Information: one issue, with prefix |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 381 | x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:" ! ":" ! Certificate was missing\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 382 | |
| 383 | X509 Verify Information: two issues, with prefix |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 384 | x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:" ! ":" ! The certificate validity has expired\n ! The CRL is expired\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 385 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 386 | X509 Get Distinguished Name #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 387 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 388 | mbedtls_x509_dn_gets:"data_files/server1.crt":"subject":"C=NL, O=PolarSSL, CN=PolarSSL Server 1" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 389 | |
| 390 | X509 Get Distinguished Name #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 391 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 392 | mbedtls_x509_dn_gets:"data_files/server1.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 393 | |
| 394 | X509 Get Distinguished Name #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 395 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 396 | mbedtls_x509_dn_gets:"data_files/server2.crt":"subject":"C=NL, O=PolarSSL, CN=localhost" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 397 | |
| 398 | X509 Get Distinguished Name #4 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 399 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 400 | mbedtls_x509_dn_gets:"data_files/server2.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 401 | |
| 402 | X509 Time Expired #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 403 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 404 | mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 405 | |
| 406 | X509 Time Expired #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 407 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 408 | mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 409 | |
| 410 | X509 Time Expired #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 411 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 412 | mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 413 | |
| 414 | X509 Time Expired #4 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 415 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 416 | mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 417 | |
| 418 | X509 Time Expired #5 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 419 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 420 | mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 421 | |
Manuel Pégourié-Gonnard | e7f64a8 | 2013-08-09 10:59:25 +0200 | [diff] [blame] | 422 | X509 Time Expired #6 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 423 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 424 | mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 425 | |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 426 | X509 Time Future #1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 427 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 428 | mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_from":0 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 429 | |
| 430 | X509 Time Future #2 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 431 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 432 | mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 433 | |
| 434 | X509 Time Future #3 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 435 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 436 | mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_from":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 437 | |
| 438 | X509 Time Future #4 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 439 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 440 | mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 441 | |
| 442 | X509 Time Future #5 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 443 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 444 | mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_from":0 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 445 | |
| 446 | X509 Time Future #6 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 447 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 448 | mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 449 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 450 | X509 CRT verification #1 (Revoked Cert, Expired CRL, no CN) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 451 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 452 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 453 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 454 | X509 CRT verification #1a (Revoked Cert, Future CRL, no CN) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 455 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 456 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 457 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 458 | X509 CRT verification #2 (Revoked Cert, Expired CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 459 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 460 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 461 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 462 | X509 CRT verification #2a (Revoked Cert, Future CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 463 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 464 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"localhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 465 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 466 | X509 CRT verification #3 (Revoked Cert, Future CRL, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 467 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 468 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 469 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 470 | X509 CRT verification #3a (Revoked Cert, Expired CRL, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 471 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 472 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 473 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 474 | X509 CRT verification #4 (Valid Cert, Expired CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 475 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 476 | x509_verify:"data_files/server2.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 477 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 478 | X509 CRT verification #4a (Revoked Cert, Future CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 479 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 480 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 481 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 482 | X509 CRT verification #5 (Revoked Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 483 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 484 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 485 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 486 | X509 CRT verification #5' (Revoked Cert, differing DN string formats #1) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 487 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 488 | x509_verify:"data_files/server1.crt":"data_files/test-ca_utf8.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 489 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 490 | X509 CRT verification #5'' (Revoked Cert, differing DN string formats #2) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 491 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 492 | x509_verify:"data_files/server1.crt":"data_files/test-ca_printable.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 493 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 494 | X509 CRT verification #5''' (Revoked Cert, differing upper and lower case) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 495 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 496 | x509_verify:"data_files/server1.crt":"data_files/test-ca_uppercase.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 497 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 498 | X509 CRT verification #6 (Revoked Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 499 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 500 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 501 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 502 | X509 CRT verification #7 (Revoked Cert, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 503 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 504 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 505 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 506 | X509 CRT verification #8 (Valid Cert) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 507 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 508 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 509 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 510 | X509 CRT verification #8a (Expired Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 511 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 512 | x509_verify:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 513 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 514 | X509 CRT verification #8b (Future Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 515 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 516 | x509_verify:"data_files/server5-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 517 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 518 | X509 CRT verification #8c (Expired Cert, longer chain) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 519 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | 29d60fb | 2017-06-05 10:20:32 +0200 | [diff] [blame] | 520 | x509_verify:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
| 521 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 522 | X509 CRT verification #8d (Future Cert, longer chain) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 523 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | 29d60fb | 2017-06-05 10:20:32 +0200 | [diff] [blame] | 524 | x509_verify:"data_files/server7-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
| 525 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 526 | X509 CRT verification #9 (Not trusted Cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 527 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 528 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 529 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 530 | X509 CRT verification #10 (Not trusted Cert, Expired CRL) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 531 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 532 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 533 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 534 | X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 forbidden) |
Hanno Becker | 7b8abee | 2019-06-03 14:25:18 +0100 | [diff] [blame] | 535 | depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 536 | x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
| 537 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 538 | X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 forbidden) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 539 | depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 540 | x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 541 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 542 | X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 forbidden) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 543 | depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 544 | x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 545 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 546 | X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 547 | depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 548 | x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 549 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 550 | X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 551 | depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 552 | x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 553 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 554 | X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 555 | depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 556 | x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 557 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 558 | X509 CRT verification #14 (Valid Cert SHA1 Digest explicitly allowed in profile) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 559 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 560 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 561 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 562 | X509 CRT verification #14 (Valid Cert SHA1 Digest forbidden in default profile) |
Mateusz Starzyk | a58625f | 2021-03-29 17:46:57 +0200 | [diff] [blame] | 563 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 564 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_BAD_MD | MBEDTLS_X509_BADCERT_BAD_MD:"":"NULL" |
Gilles Peskine | 2dc81a0 | 2017-05-05 19:00:39 +0200 | [diff] [blame] | 565 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 566 | X509 CRT verification #15 (Valid Cert SHA224 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 567 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 568 | x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 569 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 570 | X509 CRT verification #16 (Valid Cert SHA256 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 571 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 572 | x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 573 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 574 | X509 CRT verification #17 (Valid Cert SHA384 Digest) |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 575 | depends_on:MBEDTLS_SHA384_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 576 | x509_verify:"data_files/cert_sha384.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 577 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 578 | X509 CRT verification #18 (Valid Cert SHA512 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 579 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 580 | x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | b63b0af | 2011-01-13 17:54:59 +0000 | [diff] [blame] | 581 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 582 | X509 CRT verification #19 (Valid Cert, denying callback) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 583 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 584 | x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_OTHER:"compat":"verify_none" |
Paul Bakker | b63b0af | 2011-01-13 17:54:59 +0000 | [diff] [blame] | 585 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 586 | X509 CRT verification #19 (Not trusted Cert, allowing callback) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 587 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 588 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":0:0:"compat":"verify_all" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 589 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 590 | X509 CRT verification #21 (domain matching wildcard certificate, case insensitive) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 591 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 592 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.ExAmPlE.com":0:0:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 593 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 594 | X509 CRT verification #22 (domain not matching wildcard certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 595 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 596 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 597 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 598 | X509 CRT verification #23 (domain not matching wildcard certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 599 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 600 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 601 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 602 | X509 CRT verification #24 (domain matching CN of multi certificate) |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 603 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 604 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 605 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 606 | X509 CRT verification #25 (domain matching multi certificate) |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 607 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 608 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.net":0:0:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 609 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 610 | X509 CRT verification #26 (domain not matching multi certificate) |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 611 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 612 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 613 | |
Gilles Peskine | 7a020f3 | 2019-09-16 19:54:10 +0200 | [diff] [blame] | 614 | X509 CRT verification #27.1 (domain not matching multi certificate: suffix) |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 615 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 616 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"xample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 617 | |
Gilles Peskine | 7a020f3 | 2019-09-16 19:54:10 +0200 | [diff] [blame] | 618 | X509 CRT verification #27.2 (domain not matching multi certificate: head junk) |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 619 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 620 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"bexample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 621 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 622 | X509 CRT verification #28 (domain not matching wildcard in multi certificate) |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 623 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 624 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.org":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 57b1298 | 2012-02-11 17:38:38 +0000 | [diff] [blame] | 625 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 626 | X509 CRT verification #29 (domain matching wildcard in multi certificate) |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 627 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 628 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.org":0:0:"compat":"NULL" |
Paul Bakker | 57b1298 | 2012-02-11 17:38:38 +0000 | [diff] [blame] | 629 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 630 | X509 CRT verification #30 (domain matching multi certificate without CN) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 631 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 632 | x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.shotokan-braunschweig.de":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 9195662 | 2012-08-23 10:46:54 +0000 | [diff] [blame] | 633 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 634 | X509 CRT verification #31 (domain not matching multi certificate without CN) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 635 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 636 | x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH + MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 9195662 | 2012-08-23 10:46:54 +0000 | [diff] [blame] | 637 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 638 | X509 CRT verification #32 (Valid, EC cert, RSA CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 639 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 640 | x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 641 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 642 | X509 CRT verification #33 (Valid, RSA cert, EC CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 643 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 644 | x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 645 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 646 | X509 CRT verification #34 (Valid, EC cert, EC CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 647 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 648 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 649 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 650 | X509 CRT verification #35 (Revoked, EC CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 651 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 652 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 653 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 654 | X509 CRT verification #36 (Valid, EC CA, SHA1 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 655 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 656 | x509_verify:"data_files/server5-sha1.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 657 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 658 | X509 CRT verification #37 (Valid, EC CA, SHA224 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 659 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 660 | x509_verify:"data_files/server5-sha224.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 661 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 662 | X509 CRT verification #38 (Valid, EC CA, SHA384 Digest) |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 663 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA384_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 664 | x509_verify:"data_files/server5-sha384.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 665 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 666 | X509 CRT verification #39 (Valid, EC CA, SHA512 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 667 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 668 | x509_verify:"data_files/server5-sha512.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 669 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 670 | X509 CRT verification #40 (Valid, depth 0, RSA, CA) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 671 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 672 | x509_verify:"data_files/test-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 673 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 674 | X509 CRT verification #41 (Valid, depth 0, EC, CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 675 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 676 | x509_verify:"data_files/test-ca2.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 677 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 678 | X509 CRT verification #42 (Depth 0, not CA, RSA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 679 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 680 | x509_verify:"data_files/server2.crt":"data_files/server2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 681 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 682 | X509 CRT verification #43 (Depth 0, not CA, EC) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 683 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 684 | x509_verify:"data_files/server5.crt":"data_files/server5.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 685 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 686 | X509 CRT verification #44 (Corrupted signature, EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 687 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 688 | x509_verify:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 689 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 690 | X509 CRT verification #45 (Corrupted signature, RSA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 691 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 692 | x509_verify:"data_files/server2-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 693 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 694 | X509 CRT verification #45b (Corrupted signature, intermediate CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 695 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 4dfc04a | 2017-06-05 11:12:13 +0200 | [diff] [blame] | 696 | x509_verify:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
| 697 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 698 | X509 CRT verification #46 (Valid, depth 2, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 699 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 700 | x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 701 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 702 | X509 CRT verification #47 (Untrusted, depth 2, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 703 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 704 | x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 705 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 706 | X509 CRT verification #48 (Missing intermediate CA, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 707 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 708 | x509_verify:"data_files/server7.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 709 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 710 | X509 CRT verification #49 (Valid, depth 2, RSA-EC-RSA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 711 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 712 | x509_verify:"data_files/server8_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 713 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 714 | X509 CRT verification #50 (Valid, multiple CAs) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 715 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 716 | x509_verify:"data_files/server2.crt":"data_files/test-ca_cat12.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 717 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 718 | X509 CRT verification #51 (Valid, multiple CAs, reverse order) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 719 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 720 | x509_verify:"data_files/server2.crt":"data_files/test-ca_cat21.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 721 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 722 | X509 CRT verification #52 (CA keyUsage valid) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 723 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 724 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt_crl.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 725 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 726 | X509 CRT verification #53 (CA keyUsage missing cRLSign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 727 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 728 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 729 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 730 | X509 CRT verification #54 (CA keyUsage missing cRLSign, no CRL) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 731 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 732 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 733 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 734 | X509 CRT verification #55 (CA keyUsage missing keyCertSign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 735 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 736 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crl.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 737 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 738 | X509 CRT verification #56 (CA keyUsage plain wrong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 739 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 740 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-ds.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 741 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 742 | X509 CRT verification #57 (Valid, RSASSA-PSS, SHA-1) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 743 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 744 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 745 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 746 | X509 CRT verification #58 (Valid, RSASSA-PSS, SHA-224) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 747 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 748 | x509_verify:"data_files/server9-sha224.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha224.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 749 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 750 | X509 CRT verification #59 (Valid, RSASSA-PSS, SHA-256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 751 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 752 | x509_verify:"data_files/server9-sha256.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 753 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 754 | X509 CRT verification #60 (Valid, RSASSA-PSS, SHA-384) |
Mateusz Starzyk | 3352a53 | 2021-04-06 14:28:22 +0200 | [diff] [blame^] | 755 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA384_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 756 | x509_verify:"data_files/server9-sha384.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha384.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 757 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 758 | X509 CRT verification #61 (Valid, RSASSA-PSS, SHA-512) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 759 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 760 | x509_verify:"data_files/server9-sha512.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha512.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 761 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 762 | X509 CRT verification #62 (Revoked, RSASSA-PSS, SHA-1) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 763 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 764 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5388202 | 2014-06-05 17:53:52 +0200 | [diff] [blame] | 765 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 766 | X509 CRT verification #63 (Revoked, RSASSA-PSS, SHA-1, CRL badsign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 767 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 768 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1-badsign.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5388202 | 2014-06-05 17:53:52 +0200 | [diff] [blame] | 769 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 770 | X509 CRT verification #64 (Valid, RSASSA-PSS, SHA-1, not top) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 771 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 772 | x509_verify:"data_files/server9-with-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 773 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 774 | X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 775 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 776 | x509_verify:"data_files/server9-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 777 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 778 | X509 CRT verification #66 (RSASSA-PSS, SHA1, no RSA CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 779 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 780 | x509_verify:"data_files/server9.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 781 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 782 | X509 CRT verification #67 (Valid, RSASSA-PSS, all defaults) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 783 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 784 | x509_verify:"data_files/server9-defaults.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | eacccb7 | 2014-06-05 18:00:08 +0200 | [diff] [blame] | 785 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 786 | X509 CRT verification #68 (RSASSA-PSS, wrong salt_len) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 787 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 788 | x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5873b00 | 2014-06-06 18:04:09 +0200 | [diff] [blame] | 789 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 790 | X509 CRT verification #69 (RSASSA-PSS, wrong mgf_hash) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 791 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 792 | x509_verify:"data_files/server9-bad-mgfhash.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5873b00 | 2014-06-06 18:04:09 +0200 | [diff] [blame] | 793 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 794 | X509 CRT verification #70 (v1 trusted CA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 795 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 796 | x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 797 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 798 | X509 CRT verification #71 (v1 trusted CA, other) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 799 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 800 | x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 801 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 802 | X509 CRT verification #72 (v1 chain) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 803 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 804 | x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 805 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 806 | X509 CRT verification #73 (selfsigned trusted without CA bit) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 807 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 808 | x509_verify:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | d249b7a | 2014-06-24 11:49:16 +0200 | [diff] [blame] | 809 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 810 | X509 CRT verification #74 (signed by selfsigned trusted without CA bit) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 811 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 812 | x509_verify:"data_files/server6-ss-child.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | d249b7a | 2014-06-24 11:49:16 +0200 | [diff] [blame] | 813 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 814 | X509 CRT verification #75 (encoding mismatch) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 815 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 816 | x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9c911da | 2014-10-17 12:23:49 +0200 | [diff] [blame] | 817 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 818 | X509 CRT verification #76 (multiple CRLs, not revoked) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 819 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 820 | x509_verify:"data_files/server5.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 821 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 822 | X509 CRT verification #77 (multiple CRLs, revoked) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 823 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 824 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 825 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 826 | X509 CRT verification #78 (multiple CRLs, revoked by second) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 827 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 828 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_rsa-ec.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 829 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 830 | X509 CRT verification #79 (multiple CRLs, revoked by future) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 831 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 832 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED|MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 833 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 834 | X509 CRT verification #80 (multiple CRLs, first future, revoked by second) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 835 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 836 | x509_verify:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 837 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 838 | X509 CRT verification #81 (multiple CRLs, none relevant) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 839 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 840 | x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl_cat_rsa-ec.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 841 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 842 | X509 CRT verification #82 (Not yet valid CA and valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 843 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 844 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | 12c868c | 2016-02-18 17:28:04 +0000 | [diff] [blame] | 845 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 846 | X509 CRT verification #83 (valid CA and Not yet valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 847 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 848 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-future.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | 12c868c | 2016-02-18 17:28:04 +0000 | [diff] [blame] | 849 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 850 | X509 CRT verification #84 (valid CA and Not yet valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 851 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 852 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-past.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | df4bca2 | 2016-02-19 15:57:17 +0000 | [diff] [blame] | 853 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 854 | X509 CRT verification #85 (Not yet valid CA and valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 855 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 856 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | df4bca2 | 2016-02-19 15:57:17 +0000 | [diff] [blame] | 857 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 858 | X509 CRT verification #86 (Not yet valid CA and invalid CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 859 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 860 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
Andres AG | 9f430c1 | 2016-12-13 09:59:07 +0000 | [diff] [blame] | 861 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 862 | X509 CRT verification #87 (Expired CA and invalid CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 863 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 864 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
Andres AG | 9f430c1 | 2016-12-13 09:59:07 +0000 | [diff] [blame] | 865 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 866 | X509 CRT verification #88 (Spurious cert in the chain) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 867 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 868 | x509_verify:"data_files/server7_spurious_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
| 869 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 870 | X509 CRT verification #89 (Spurious cert later in the chain) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 871 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 872 | x509_verify:"data_files/server10_int3_spurious_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
| 873 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 874 | X509 CRT verification #90 (EE with same name as trusted root) |
Manuel Pégourié-Gonnard | c10afdb | 2017-06-29 09:48:08 +0200 | [diff] [blame] | 875 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 876 | x509_verify:"data_files/server5-ss-forgeca.crt":"data_files/test-int-ca3.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"":"NULL" |
Manuel Pégourié-Gonnard | c10afdb | 2017-06-29 09:48:08 +0200 | [diff] [blame] | 877 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 878 | X509 CRT verification #91 (same CA with good then bad key) |
Manuel Pégourié-Gonnard | 2d825d4 | 2017-07-03 18:06:38 +0200 | [diff] [blame] | 879 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 880 | x509_verify:"data_files/server1.crt":"data_files/test-ca-good-alt.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
| 881 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 882 | X509 CRT verification #91 (same CA with bad then good key) |
Manuel Pégourié-Gonnard | 2d825d4 | 2017-07-03 18:06:38 +0200 | [diff] [blame] | 883 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 884 | x509_verify:"data_files/server1.crt":"data_files/test-ca-alt-good.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
| 885 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 886 | X509 CRT verification #92 (bad name, allowing callback) |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 887 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 888 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"globalhost":0:0:"":"verify_all" |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 889 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 890 | X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA) |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 891 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECP_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
| 892 | x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK:"suite_b":"NULL" |
| 893 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 894 | X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA) |
Manuel Pégourié-Gonnard | 147b28e | 2018-03-12 15:26:59 +0100 | [diff] [blame] | 895 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 896 | x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_PK:"suite_b":"NULL" |
| 897 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 898 | X509 CRT verification #95 (Suite B Valid, EC cert, EC CA) |
Manuel Pégourié-Gonnard | 147b28e | 2018-03-12 15:26:59 +0100 | [diff] [blame] | 899 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 900 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"suite_b":"NULL" |
| 901 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 902 | X509 CRT verification #96 (next profile Invalid Cert SHA224 Digest) |
Manuel Pégourié-Gonnard | 88a8dcb | 2018-03-12 15:49:35 +0100 | [diff] [blame] | 903 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 904 | x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCRL_BAD_MD:"next":"NULL" |
| 905 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 906 | X509 CRT verification #97 (next profile Valid Cert SHA256 Digest) |
Manuel Pégourié-Gonnard | 88a8dcb | 2018-03-12 15:49:35 +0100 | [diff] [blame] | 907 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_SHA1_C |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 908 | x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"next":"NULL" |
| 909 | |
Raoul Strackx | a4e8614 | 2020-06-15 17:03:13 +0200 | [diff] [blame] | 910 | X509 CRT verification #98 (Revoked Cert, revocation date in the future, _with_ MBEDTLS_HAVE_TIME_DATE) |
| 911 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 912 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl-futureRevocationDate.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED|MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
| 913 | |
| 914 | X509 CRT verification #99 (Revoked Cert, revocation date in the future, _without_ MBEDTLS_HAVE_TIME_DATE) |
| 915 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:!MBEDTLS_HAVE_TIME_DATE |
| 916 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl-futureRevocationDate.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 917 | |
Manuel Pégourié-Gonnard | 7d2a4d8 | 2020-07-23 12:39:53 +0200 | [diff] [blame] | 918 | X509 CRT verification: domain identical to IPv4 in SubjectAltName |
| 919 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C |
| 920 | x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"abcd":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"":"NULL" |
| 921 | |
| 922 | X509 CRT verification: domain identical to IPv6 in SubjectAltName |
| 923 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C |
| 924 | x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"abcd.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"":"NULL" |
| 925 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 926 | X509 CRT verification with ca callback: failure |
Jarno Lamsa | 557426a | 2019-03-27 17:08:29 +0200 | [diff] [blame] | 927 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK |
Hanno Becker | cbb5903 | 2019-03-28 14:14:22 +0000 | [diff] [blame] | 928 | x509_verify_ca_cb_failure:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":MBEDTLS_ERR_X509_FATAL_ERROR |
Jarno Lamsa | 557426a | 2019-03-27 17:08:29 +0200 | [diff] [blame] | 929 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 930 | X509 CRT verification callback: bad name |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 931 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 932 | x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2.crt":"globalhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000004\n" |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 933 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 934 | X509 CRT verification callback: trusted EE cert |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 935 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 936 | x509_verify_callback:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"NULL":0:"depth 0 - serial 53\:A2\:CB\:4B\:12\:4E\:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 937 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 938 | X509 CRT verification callback: trusted EE cert, expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 939 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 940 | x509_verify_callback:"data_files/server5-ss-expired.crt":"data_files/server5-ss-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial D8\:64\:61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 941 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 942 | X509 CRT verification callback: simple |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 943 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 944 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 945 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 946 | X509 CRT verification callback: simple, EE expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 947 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 948 | x509_verify_callback:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 949 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 950 | X509 CRT verification callback: simple, root expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 951 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 952 | x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 953 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 954 | X509 CRT verification callback: two trusted roots |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 955 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 956 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 957 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 958 | X509 CRT verification callback: two trusted roots, reversed order |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 959 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 960 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 961 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 962 | X509 CRT verification callback: root included |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 963 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 964 | x509_verify_callback:"data_files/server1_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 965 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 966 | X509 CRT verification callback: intermediate ca |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 967 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 968 | x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 969 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 970 | X509 CRT verification callback: intermediate ca, root included |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 971 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 972 | x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 973 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 974 | X509 CRT verification callback: intermediate ca trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 975 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 976 | x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-int-ca.crt":"NULL":0:"depth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 977 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 978 | X509 CRT verification callback: intermediate ca, EE expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 979 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 980 | x509_verify_callback:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 981 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 982 | X509 CRT verification callback: intermediate ca, int expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 983 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 984 | x509_verify_callback:"data_files/server7_int-ca-exp.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000001\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 985 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 986 | X509 CRT verification callback: intermediate ca, root expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 987 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 988 | x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 989 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 990 | X509 CRT verification callback: two intermediates |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 991 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 992 | x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 993 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 994 | X509 CRT verification callback: two intermediates, root included |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 995 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 996 | x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 997 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 998 | X509 CRT verification callback: two intermediates, top int trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 999 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 1000 | x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":"NULL":0:"depth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 1001 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1002 | X509 CRT verification callback: two intermediates, low int trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1003 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 1004 | x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-int-ca3.crt":"NULL":0:"depth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 1005 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1006 | X509 CRT verification callback: no intermediate, bad signature |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 1007 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 1008 | x509_verify_callback:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n" |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 1009 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1010 | X509 CRT verification callback: one intermediate, bad signature |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 1011 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 1012 | x509_verify_callback:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n" |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 1013 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1014 | X509 CRT ASN1 (Empty Certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1015 | x509parse_crt:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1016 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1017 | X509 CRT ASN1 (inv Certificate, bad tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1018 | x509parse_crt:"0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1019 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1020 | X509 CRT ASN1 (inv Certificate, no length) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1021 | x509parse_crt:"30":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1022 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1023 | X509 CRT ASN1 (inv Certificate, bad length encoding) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1024 | x509parse_crt:"3085":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | fae618f | 2011-10-12 11:53:52 +0000 | [diff] [blame] | 1025 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1026 | X509 CRT ASN1 (inv Certificate, length data incomplete) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1027 | x509parse_crt:"308200":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1028 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1029 | X509 CRT ASN1 (inv Certificate, length out of bounds) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1030 | x509parse_crt:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1031 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1032 | X509 CRT ASN1 (inv TBS, invalid tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1033 | x509parse_crt:"30020500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1034 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1035 | X509 CRT ASN1 (inv TBS, length missing) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1036 | x509parse_crt:"300130":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1037 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1038 | X509 CRT ASN1 (inv TBS, invalid length encoding) |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1039 | x509parse_crt:"30023085":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1040 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1041 | X509 CRT ASN1 (inv TBS, length data incomplete) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1042 | x509parse_crt:"300430839999":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1043 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1044 | X509 CRT ASN1 (inv TBS, length out of bounds) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1045 | x509parse_crt:"30023003":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1046 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1047 | X509 CRT ASN1 (TBS empty) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1048 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1049 | x509parse_crt:"30153000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1050 | |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1051 | X509 CRT ASN1 (TBS, invalid version tag, serial missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1052 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1053 | x509parse_crt:"301730020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1054 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1055 | X509 CRT ASN1 (TBS, valid outer version tag, no outer length) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1056 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1057 | x509parse_crt:"30163001a0300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1058 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1059 | X509 CRT ASN1 (TBS, inv inner version tag) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1060 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1061 | x509parse_crt:"30193004a0020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1062 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1063 | X509 CRT ASN1 (TBS, valid inner version tag, no inner length) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1064 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1065 | x509parse_crt:"30183003a00102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1066 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1067 | X509 CRT ASN1 (TBS, valid inner version tag, inv inner length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1068 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1069 | x509parse_crt:"30193004a0020285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1070 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1071 | X509 CRT ASN1 (TBS, valid inner version tag, inner length too large for int) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1072 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Gilles Peskine | 2dedcc5 | 2019-09-11 17:23:07 +0200 | [diff] [blame] | 1073 | # tbsCertificate.version = 0x01000000000000000000000000000000 rejected by mbedtls_asn1_get_int |
| 1074 | x509parse_crt:"30293014a012021001000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1075 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1076 | X509 CRT ASN1 (TBS, valid inner version tag, inner vs. outer length mismatch) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1077 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1078 | x509parse_crt:"301b3006a00402010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1079 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1080 | X509 CRT ASN1 (TBS, valid version tag, length exceeds TBS) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1081 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1082 | x509parse_crt:"30293014a012021100000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1083 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1084 | X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 3) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1085 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1086 | x509parse_crt:"308196308180a0030201038204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1087 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1088 | X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 4) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1089 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1090 | x509parse_crt:"308196308180a0030201048204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1091 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1092 | X509 CRT ASN1 (TBS, valid version tag + length, version number overflow) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1093 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1094 | x509parse_crt:"308199308183a00602047FFFFFFF8204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1095 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1096 | X509 CRT ASN1 (TBS, serial missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1097 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1098 | x509parse_crt:"301a3005a003020102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1099 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1100 | X509 CRT ASN1 (TBS, inv serial, tag wrong) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1101 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1102 | x509parse_crt:"301c3007a0030201020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1103 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1104 | X509 CRT ASN1 (TBS, inv serial, length missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1105 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1106 | x509parse_crt:"301b3006a00302010282300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1107 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1108 | X509 CRT ASN1 (TBS, inv serial, inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1109 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | e7d8f96 | 2019-06-04 15:25:00 +0100 | [diff] [blame] | 1110 | x509parse_crt:"301c3007a0030201028285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1111 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1112 | X509 CRT ASN1 (TBS, inv serial, length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1113 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | e7d8f96 | 2019-06-04 15:25:00 +0100 | [diff] [blame] | 1114 | x509parse_crt:"301c3007a0030201028201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1115 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1116 | X509 CRT ASN1 (TBS, AlgID missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1117 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1118 | x509parse_crt:"3020300ba0030201028204deadbeef300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1119 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1120 | X509 CRT ASN1 (TBS, inv AlgID, tag wrong) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1121 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1122 | x509parse_crt:"3022300da0030201028204deadbeef0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1123 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1124 | X509 CRT ASN1 (TBS, inv AlgID, OID missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1125 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1126 | x509parse_crt:"307b3073a0030201008204deadbeef3000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff3000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1127 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1128 | X509 CRT ASN1 (TBS, inv AlgID, OID tag wrong) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1129 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1130 | x509parse_crt:"307f3075a0030201008204deadbeef30020500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1131 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1132 | X509 CRT ASN1 (TBS, inv AlgID, OID inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1133 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1134 | x509parse_crt:"307f3075a0030201008204deadbeef30020685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1135 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1136 | X509 CRT ASN1 (TBS, inv AlgID, OID length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1137 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1138 | x509parse_crt:"307f3075a0030201008204deadbeef30020601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1139 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1140 | X509 CRT ASN1 (TBS, inv AlgID, OID empty) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1141 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1142 | x509parse_crt:"307f3075a0030201008204deadbeef30020600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020600030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1143 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1144 | X509 CRT ASN1 (TBS, inv AlgID, OID unknown) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1145 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1146 | x509parse_crt:"3081873079a0030201008204deadbeef30060604deadbeef300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30060604deadbeef030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1147 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1148 | X509 CRT ASN1 (TBS, inv AlgID, param inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1149 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1150 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1151 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1152 | X509 CRT ASN1 (TBS, inv AlgID, param length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1153 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1154 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1155 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1156 | X509 CRT ASN1 (TBS, inv AlgID, param length mismatch) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1157 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1158 | x509parse_crt:"30819a308182a0030201008204deadbeef300f06092a864886f70d01010b06010000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300f06092a864886f70d01010b06010000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1159 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1160 | X509 CRT ASN1 (TBS, inv AlgID, params present but empty) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1161 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1162 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0600030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1163 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1164 | X509 CRT ASN1 (TBS, inv AlgID, bad RSASSA-PSS params) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1165 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1166 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010a3100300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010a3100030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 1167 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1168 | X509 CRT ASN1 (TBS, Issuer missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1169 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1170 | x509parse_crt:"302f301aa0030201008204deadbeef300d06092a864886f70d01010b0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1171 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1172 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv tag) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1173 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1174 | x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1175 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1176 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1177 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1178 | x509parse_crt:"3030301ba0030201008204deadbeef300d06092a864886f70d01010b050030300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1179 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1180 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1181 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1182 | x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1183 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1184 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1185 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1186 | x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1187 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1188 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence empty) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1189 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1190 | x509parse_crt:"3081893074a0030201028204deadbeef300d06092a864886f70d01010b05003000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1191 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1192 | X509 CRT ASN1 (TBS, inv Issuer, RDN inv tag) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1193 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1194 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1195 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1196 | X509 CRT ASN1 (TBS, inv Issuer, RDN inv length encoding) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1197 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1198 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023185301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1199 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1200 | X509 CRT ASN1 (TBS, inv Issuer, RDN length out of bounds) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1201 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1202 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023101301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1203 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1204 | X509 CRT ASN1 (TBS, inv Issuer, RDN empty) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1205 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1206 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023100301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1207 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1208 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv tag) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1209 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1210 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1211 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1212 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1213 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1214 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023085301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1215 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1216 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1217 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1218 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023001301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1219 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1220 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1221 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1222 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1223 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1224 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1225 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1226 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1227 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1228 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv no length data) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1229 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1230 | x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b050030053103300106301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1231 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1232 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1233 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1234 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020685301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1235 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1236 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1237 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1238 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020601301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1239 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1240 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1241 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1242 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020600301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1243 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1244 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1245 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1246 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG; |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1247 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1248 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1249 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1250 | x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b050030073105300306000c301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1251 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1252 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1253 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1254 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000C85301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1255 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1256 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1257 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1258 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000c01301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1259 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1260 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length mismatch) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1261 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1262 | x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300a3108300606000c010000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1263 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1264 | X509 CRT ASN1 (TBS, inv Issuer, 2nd AttributeTypeValue empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1265 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1266 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300e310c300806000c04546573743000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1267 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1268 | X509 CRT ASN1 (TBS, Validity missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1269 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1270 | x509parse_crt:"303d3028a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1271 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1272 | X509 CRT ASN1 (TBS, inv Validity, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1273 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1274 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1275 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1276 | X509 CRT ASN1 (TBS, inv Validity, length field missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1277 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1278 | x509parse_crt:"303e3029a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1279 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1280 | X509 CRT ASN1 (TBS, inv Validity, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1281 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1282 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1283 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1284 | X509 CRT ASN1 (TBS, inv Validity, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1285 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1286 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1287 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1288 | X509 CRT ASN1 (TBS, inv Validity, notBefore missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1289 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1290 | x509parse_crt:"30793064a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1291 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1292 | X509 CRT ASN1 (TBS, inv Validity, notBefore inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1293 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1294 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430020500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1295 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1296 | X509 CRT ASN1 (TBS, inv Validity, notBefore no length) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1297 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1298 | x509parse_crt:"307a3065a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300117300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1299 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1300 | X509 CRT ASN1 (TBS, inv Validity, notBefore inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1301 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1302 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743002178f300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1303 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1304 | X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1305 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1306 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1307 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1308 | X509 CRT ASN1 (TBS, inv Validity, notBefore empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1309 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1310 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a3008060013045465737430101700170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1311 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1312 | X509 CRT ASN1 (TBS, inv Validity, notBefore invalid) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1313 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1314 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303000000000170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1315 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1316 | X509 CRT ASN1 (TBS, inv Validity, notAfter missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1317 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1318 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300e170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1319 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1320 | X509 CRT ASN1 (TBS, inv Validity, notAfter inv tag) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1321 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1322 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935390500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1323 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1324 | X509 CRT ASN1 (TBS, inv Validity, notAfter length missing) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1325 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1326 | x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300f170c30393132333132333539353917300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1327 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1328 | X509 CRT ASN1 (TBS, inv Validity, notAfter inv length encoding) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1329 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1330 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391785300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1331 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1332 | X509 CRT ASN1 (TBS, inv Validity, notAfter length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1333 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1334 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1335 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1336 | X509 CRT ASN1 (TBS, inv Validity, notAfter empty) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1337 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1338 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1339 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1340 | X509 CRT ASN1 (TBS, inv Validity, notAfter invalid) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1341 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1342 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303931323331323335393539170c303930313031303000000000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1343 | |
Hanno Becker | 7ca07e3 | 2019-03-13 10:14:00 +0000 | [diff] [blame] | 1344 | X509 CRT ASN1 (TBS, inv Validity, data remaining after 'notAfter') |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1345 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1346 | x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303930313031303030303030170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1347 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1348 | X509 CRT ASN1 (TBS, Subject missing) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1349 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1350 | x509parse_crt:"305b3046a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1351 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1352 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1353 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1354 | x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353900300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1355 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1356 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence length missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1357 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1358 | x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1359 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1360 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1361 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1362 | x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1363 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1364 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1365 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1366 | x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1367 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1368 | X509 CRT ASN1 (TBS, inv Subject, RDN inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1369 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1370 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1371 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1372 | X509 CRT ASN1 (TBS, inv Subject, RDN inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1373 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1374 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023185302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1375 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1376 | X509 CRT ASN1 (TBS, inv Subject, RDN length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1377 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1378 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023101302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1379 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1380 | X509 CRT ASN1 (TBS, inv Subject, RDN empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1381 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1382 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023100302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1383 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1384 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1385 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1386 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1387 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1388 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1389 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1390 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023085302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1391 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1392 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1393 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1394 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023001302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1395 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1396 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1397 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1398 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1399 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1400 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1401 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1402 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1403 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1404 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv no length data) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1405 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1406 | x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930053103300106302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1407 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1408 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1409 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1410 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020685302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1411 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1412 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type length out of bounds ) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1413 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1414 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020601302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1415 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1416 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1417 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1418 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020600302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1419 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1420 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1421 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1422 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG; |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1423 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1424 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1425 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1426 | x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930073105300306000c302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1427 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1428 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1429 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1430 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000C85302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1431 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1432 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1433 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1434 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000c01302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1435 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1436 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length mismatch) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1437 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1438 | x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300a3108300606000c010000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1439 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1440 | X509 CRT ASN1 (TBS, inv Subject, 2nd AttributeTypeValue empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1441 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1442 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300e310c300806000c04546573743000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1443 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1444 | X509 CRT ASN1 (TBS, SubPubKeyInfo missing) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1445 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1446 | x509parse_crt:"30693054a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1447 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1448 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv tag) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1449 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1450 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1451 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1452 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length missing) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1453 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1454 | x509parse_crt:"306a3055a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1455 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1456 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv length encoding) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1457 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1458 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1459 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1460 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length out of bounds) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1461 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1462 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1463 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1464 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, empty) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1465 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1466 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1467 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1468 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv algorithm tag) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1469 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1470 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1471 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1472 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length missing) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1473 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1474 | x509parse_crt:"306c3057a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1475 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1476 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm inv length encoding) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1477 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1478 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1479 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1480 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length out of bounds) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1481 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1482 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1483 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1484 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm empty) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1485 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1486 | x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301d300003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1487 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1488 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm unknown) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1489 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1490 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010100050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_UNKNOWN_PK_ALG |
| 1491 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1492 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring missing) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1493 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1494 | x509parse_crt:"307a3065a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300f300d06092A864886F70D0101010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1495 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1496 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv tag) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1497 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1498 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1499 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1500 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length missing) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1501 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1502 | x509parse_crt:"307b3066a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743010300d06092A864886F70D010101050003300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1503 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1504 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv length encoding) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1505 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1506 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1507 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1508 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length out of bounds) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1509 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1510 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1511 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1512 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, no bitstring data) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1513 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1514 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1515 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1516 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv bitstring start) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1517 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1518 | x509parse_crt:"307d3068a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743012300d06092A864886F70D0101010500030101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1519 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1520 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring length) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1521 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1522 | x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1523 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1524 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring tag) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1525 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1526 | x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400310000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1527 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1528 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv RSA modulus) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1529 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1530 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0302ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1531 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1532 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, total length mismatch) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1533 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1534 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301e300d06092A864886F70D0101010500030b0030080202ffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1535 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1536 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1537 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1538 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY |
| 1539 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1540 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed, expanded length notation) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1541 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1542 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210fffffffffffffffffffffffffffffffe0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1543 | |
Hanno Becker | 61cf9e3 | 2019-06-13 13:32:44 +0100 | [diff] [blame] | 1544 | # We expect an extension parsing error here because the IssuerID is optional. |
| 1545 | # Hence, if we find an ASN.1 tag doesn't match the IssuerID, we assume the |
| 1546 | # IssuerID is skipped and that the tag should hence belong to the next field, |
| 1547 | # namely the v3 extensions. However, the tag the test exercises is a NULL tag, |
| 1548 | # and hence we obtain an INVALID_TAG error during extension parsing. |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1549 | X509 CRT ASN1 (TBS, inv IssuerID, inv tag) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1550 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1551 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1552 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1553 | X509 CRT ASN1 (TBS, inv IssuerID, length missing) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1554 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1555 | x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1556 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1557 | X509 CRT ASN1 (TBS, inv IssuerID, inv length encoding) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1558 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1559 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1560 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1561 | X509 CRT ASN1 (TBS, inv IssuerID, length out of bounds) |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1562 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1563 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1564 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1565 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length missing) |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1566 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1567 | x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1568 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1569 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, inv length encoding) |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1570 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1571 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1572 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1573 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length out of bounds) |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1574 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1575 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1576 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1577 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv tag) |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1578 | depends_on:!MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1579 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1580 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1581 | X509 CRT ASN1 (TBSCertificate v3, ext SubjectAlternativeName malformed) |
Ron Eldor | 56f071f | 2019-05-22 17:21:08 +0300 | [diff] [blame] | 1582 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 1583 | x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1584 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1585 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1586 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1587 | x509parse_crt:"308199308183a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | c6ce838 | 2009-07-27 21:34:45 +0000 | [diff] [blame] | 1588 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1589 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1590 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1591 | x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | c6ce838 | 2009-07-27 21:34:45 +0000 | [diff] [blame] | 1592 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1593 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1594 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1595 | x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1596 | |
Hanno Becker | d51d485 | 2019-03-13 15:18:57 +0000 | [diff] [blame] | 1597 | X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT) |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1598 | depends_on:!MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | d51d485 | 2019-03-13 15:18:57 +0000 | [diff] [blame] | 1599 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1600 | |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1601 | X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT, ALLOW_EXTENSIONS_NON_V3) |
| 1602 | depends_on:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1603 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1604 | |
Hanno Becker | d51d485 | 2019-03-13 15:18:57 +0000 | [diff] [blame] | 1605 | X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT) |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1606 | depends_on:!MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | d51d485 | 2019-03-13 15:18:57 +0000 | [diff] [blame] | 1607 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa200a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1608 | |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1609 | X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT, ALLOW_EXTENSIONS_NON_V3) |
| 1610 | depends_on:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1611 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa200a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1612 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1613 | X509 CRT ASN1 (TBS, inv v3Ext, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1614 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1615 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1616 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1617 | X509 CRT ASN1 (TBS, inv v3Ext, outer length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1618 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1619 | x509parse_crt:"30819b308185a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1620 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1621 | X509 CRT ASN1 (TBS, inv v3Ext, outer length inv encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1622 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1623 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1624 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1625 | X509 CRT ASN1 (TBS, inv v3Ext, outer length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1626 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1627 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1628 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1629 | X509 CRT ASN1 (TBS, inv v3Ext, outer length 0) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1630 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1631 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1632 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1633 | X509 CRT ASN1 (TBS, inv v3Ext, inner tag invalid) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1634 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1635 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1636 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1637 | X509 CRT ASN1 (TBS, inv v3Ext, inner length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1638 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1639 | x509parse_crt:"30819d308187a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1640 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1641 | X509 CRT ASN1 (TBS, inv v3Ext, inner length inv encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1642 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1643 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1644 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1645 | X509 CRT ASN1 (TBS, inv v3Ext, inner length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1646 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1647 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1648 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1649 | X509 CRT ASN1 (TBS, inv v3Ext, inner/outer length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1650 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1651 | x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1652 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1653 | X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1654 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1655 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1656 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1657 | X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1658 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1659 | x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1660 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1661 | X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1662 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1663 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1664 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1665 | X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1666 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1667 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1668 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1669 | X509 CRT ASN1 (TBS, inv v3Ext, first ext empty) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1670 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1671 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1672 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1673 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1674 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1675 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1676 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1677 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1678 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1679 | x509parse_crt:"3081a130818ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3053003300106300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1680 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1681 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1682 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1683 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020685300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1684 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1685 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1686 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1687 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020601300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1688 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1689 | X509 CRT ASN1 (TBS, inv v3Ext, no extnValue) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1690 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1691 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020600300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1692 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1693 | X509 CRT ASN1 (TBS, inv v3Ext, inv critical tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1694 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1695 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1696 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1697 | X509 CRT ASN1 (TBS, inv v3Ext, critical length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1698 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1699 | x509parse_crt:"3081a330818da0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30730053003060001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1700 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1701 | X509 CRT ASN1 (TBS, inv v3Ext, critical inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1702 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1703 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1704 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1705 | X509 CRT ASN1 (TBS, inv v3Ext, critical length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1706 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1707 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1708 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1709 | X509 CRT ASN1 (TBS, inv v3Ext, critical length 0) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1710 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1711 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000100300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1712 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1713 | X509 CRT ASN1 (TBS, inv v3Ext, critical length 2) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1714 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1715 | x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001020000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1716 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1717 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1718 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1719 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1720 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1721 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1722 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1723 | x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001010004300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1724 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1725 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length inv encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1726 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1727 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000485300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1728 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1729 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1730 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1731 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000401300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1732 | |
Hanno Becker | 8671e81 | 2019-03-14 08:22:51 +0000 | [diff] [blame] | 1733 | X509 CRT ASN1 (TBS, inv v3Ext, data remaining after extnValue) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1734 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1735 | x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b3009060001010004000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1736 | |
Hanno Becker | 7b8330a | 2019-09-12 14:06:33 +0100 | [diff] [blame] | 1737 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, data missing) |
| 1738 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | c15ff98 | 2019-09-12 14:21:57 +0100 | [diff] [blame] | 1739 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b300930070603551d200400300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Hanno Becker | 7b8330a | 2019-09-12 14:06:33 +0100 | [diff] [blame] | 1740 | |
Hanno Becker | 6dfa665 | 2019-09-12 16:03:08 +0100 | [diff] [blame] | 1741 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, invalid outer tag) |
Hanno Becker | 7b8330a | 2019-09-12 14:06:33 +0100 | [diff] [blame] | 1742 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 6dfa665 | 2019-09-12 16:03:08 +0100 | [diff] [blame] | 1743 | x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 7b8330a | 2019-09-12 14:06:33 +0100 | [diff] [blame] | 1744 | |
Hanno Becker | 6dfa665 | 2019-09-12 16:03:08 +0100 | [diff] [blame] | 1745 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, outer length missing) |
Hanno Becker | 7b8330a | 2019-09-12 14:06:33 +0100 | [diff] [blame] | 1746 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 6dfa665 | 2019-09-12 16:03:08 +0100 | [diff] [blame] | 1747 | x509parse_crt:"3081a8308192a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30c300a30080603551d20040130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1748 | |
| 1749 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, outer length inv encoding) |
| 1750 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1751 | x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1752 | |
| 1753 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, outer length out of bounds) |
| 1754 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1755 | x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1756 | |
| 1757 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, no policies) |
| 1758 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1759 | x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004023000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1760 | |
| 1761 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy invalid tag) |
| 1762 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1763 | x509parse_crt:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1764 | |
| 1765 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy length missing) |
| 1766 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1767 | x509parse_crt:"3081aa308194a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30e300c300a0603551d200403300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1768 | |
| 1769 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy length inv encoding) |
| 1770 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1771 | x509parse_crt:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1772 | |
| 1773 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy length out of bounds) |
| 1774 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1775 | x509parse_crt:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1776 | |
| 1777 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, empty policy) |
| 1778 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1779 | x509parse_crt:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430023000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1780 | |
| 1781 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy invalid OID tag) |
| 1782 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1783 | x509parse_crt:"3081ad308197a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a311300f300d0603551d200406300430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1784 | |
| 1785 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy no OID length) |
| 1786 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1787 | x509parse_crt:"3081ac308196a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a310300e300c0603551d2004053003300106300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1788 | |
| 1789 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy OID length inv encoding) |
| 1790 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1791 | x509parse_crt:"3081ad308197a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a311300f300d0603551d200406300430020685300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1792 | |
| 1793 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy OID length out of bounds) |
| 1794 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1795 | x509parse_crt:"3081ad308197a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a311300f300d0603551d200406300430020601300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1796 | |
| 1797 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, unknown critical policy) |
| 1798 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:!MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION |
| 1799 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010101040730053003060100300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE |
| 1800 | |
| 1801 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier invalid tag) |
| 1802 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1803 | x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d200409300730050601000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1804 | |
| 1805 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier no length) |
| 1806 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1807 | x509parse_crt:"3081af308199a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3133011300f0603551d2004083006300406010030300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1808 | |
| 1809 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier inv length encoding) |
| 1810 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1811 | x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d200409300730050601003085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1812 | |
| 1813 | X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier length out of bounds) |
| 1814 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1815 | x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d200409300730050601003001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Hanno Becker | 7b8330a | 2019-09-12 14:06:33 +0100 | [diff] [blame] | 1816 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1817 | X509 CRT ASN1 (TBS, inv extBasicConstraint, no pathlen length) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1818 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1819 | x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d130101010406300402010102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1820 | |
Andrzej Kurek | 1605074 | 2020-04-14 09:49:52 -0400 | [diff] [blame] | 1821 | X509 CRT ASN1 (inv extBasicConstraint, pathlen is INT_MAX) |
| 1822 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
| 1823 | x509parse_crt_file:"data_files/server1_pathlen_int_max.crt":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1824 | |
| 1825 | X509 CRT ASN1 (pathlen is INT_MAX-1) |
| 1826 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
| 1827 | x509parse_crt_file:"data_files/server1_pathlen_int_max-1.crt":0 |
| 1828 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1829 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1830 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1831 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1832 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1833 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1834 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1835 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1836 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1837 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen empty) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1838 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1839 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1840 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1841 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1842 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1843 | x509parse_crt:"3081b430819ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a318301630140603551d13010101040a30080201010201010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1844 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1845 | X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage bad second tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1846 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1847 | x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d250416301406082b0601050507030107082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1848 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1849 | X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1850 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1851 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS |
| 1852 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1853 | X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage repeated) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1854 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1855 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d250416301406082b0601050507030106082b06010505070302301d0603551d250416301406082b0601050507030106082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS |
| 1856 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1857 | X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated outside Extensions) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1858 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1859 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1860 | |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1861 | X509 CRT (TBS, valid v3Ext in v1 CRT, ALLOW_EXTENSIONS_NON_V3) |
| 1862 | depends_on:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1863 | x509parse_crt:"3081b93081a3a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":0 |
| 1864 | |
| 1865 | X509 CRT (TBS, valid v3Ext in v2 CRT, ALLOW_EXTENSIONS_NON_V3) |
| 1866 | depends_on:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1867 | x509parse_crt:"3081b93081a3a0030201018204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"cert. version \: 2\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":0 |
| 1868 | |
| 1869 | X509 CRT (TBS, valid v3Ext in v3 CRT) |
Hanno Becker | 04b10c0 | 2019-03-13 15:19:28 +0000 | [diff] [blame] | 1870 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1871 | x509parse_crt:"3081b93081a3a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":0 |
| 1872 | |
| 1873 | X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT) |
| 1874 | depends_on:!MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 04b10c0 | 2019-03-13 15:19:28 +0000 | [diff] [blame] | 1875 | x509parse_crt:"3081b93081a3a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1876 | |
| 1877 | X509 CRT ASN1 (TBS, valid v3Ext in v2 CRT) |
Gilles Peskine | 6710e15 | 2020-04-12 14:21:30 +0200 | [diff] [blame] | 1878 | depends_on:!MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 04b10c0 | 2019-03-13 15:19:28 +0000 | [diff] [blame] | 1879 | x509parse_crt:"3081b93081a3a0030201018204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1880 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1881 | X509 CRT ASN1 (TBS, valid SubjectID, valid IssuerID, inv v3Ext, SubjectAltName repeated outside Extensions, inv SubjectAltNames tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1882 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 1883 | x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1884 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1885 | X509 CRT ASN1 (SignatureAlgorithm missing) |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1886 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1887 | x509parse_crt:"3081aa3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1888 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1889 | X509 CRT ASN1 (inv SignatureAlgorithm, bad tag) |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1890 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1891 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573740500":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1892 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1893 | X509 CRT ASN1 (inv SignatureAlgorithm, length missing) |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1894 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1895 | x509parse_crt:"3081ab3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e7465737430":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1896 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1897 | X509 CRT ASN1 (inv SignatureAlgorithm, inv length encoding) |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1898 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1899 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743085":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1900 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1901 | X509 CRT ASN1 (inv SignatureAlgorithm, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1902 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1903 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1904 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1905 | X509 CRT ASN1 (inv SignatureAlgorithm, not the same as SignatureAlgorithm in TBS) |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1906 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1907 | x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010a0500030200ff":"":MBEDTLS_ERR_X509_SIG_MISMATCH |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1908 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1909 | X509 CRT ASN1 (Signature missing) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1910 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1911 | x509parse_crt:"3081b93081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1912 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1913 | X509 CRT ASN1 (inv Signature, bad tag) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1914 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1915 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1916 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1917 | X509 CRT ASN1 (inv Signature, length missing) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1918 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1919 | x509parse_crt:"3081ba3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b050003":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1920 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1921 | X509 CRT ASN1 (inv Signature, inv length encoding) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1922 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1923 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000385":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1924 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1925 | X509 CRT ASN1 (inv Signature, length out of bounds) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1926 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1927 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1928 | |
Gilles Peskine | 2dedcc5 | 2019-09-11 17:23:07 +0200 | [diff] [blame] | 1929 | X509 CRT ASN1 (inv Signature, inv data #1) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1930 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Gilles Peskine | 2dedcc5 | 2019-09-11 17:23:07 +0200 | [diff] [blame] | 1931 | # signature = bit string with invalid encoding (missing number of unused bits) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1932 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000300":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1933 | |
Gilles Peskine | 2dedcc5 | 2019-09-11 17:23:07 +0200 | [diff] [blame] | 1934 | X509 CRT ASN1 (inv Signature, inv data #2) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1935 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Gilles Peskine | 2dedcc5 | 2019-09-11 17:23:07 +0200 | [diff] [blame] | 1936 | # signature = bit string with invalid encoding (number of unused bits too large) |
| 1937 | x509parse_crt:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030108":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1938 | |
Gilles Peskine | f70d3eb | 2019-10-04 19:24:06 +0200 | [diff] [blame] | 1939 | X509 CRT ASN1 (empty Signature) |
| 1940 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1941 | # signature = empty bit string in DER encoding |
| 1942 | x509parse_crt:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030100":"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":0 |
Gilles Peskine | 2dedcc5 | 2019-09-11 17:23:07 +0200 | [diff] [blame] | 1943 | |
| 1944 | X509 CRT ASN1 (dummy 24-bit Signature) |
| 1945 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1946 | # signature = bit string "011001100110111101101111" |
| 1947 | x509parse_crt:"3081bf3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030400666f6f":"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":0 |
| 1948 | |
| 1949 | # The ASN.1 module rejects non-octet-aligned bit strings. |
| 1950 | X509 CRT ASN1 (inv Signature: not octet-aligned) |
| 1951 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1952 | # signature = bit string "01100110011011110110111" |
| 1953 | x509parse_crt:"3081bf3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030401666f6e":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1954 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1955 | X509 CRT ASN1 (inv Signature, length mismatch) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1956 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1957 | x509parse_crt:"3081be3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff00":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1958 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1959 | X509 CRT ASN1 (well-formed) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1960 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1961 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1962 | |
Hanno Becker | 8671e81 | 2019-03-14 08:22:51 +0000 | [diff] [blame] | 1963 | X509 CRT ASN1 (GeneralizedTime in notBefore, UTCTime in notAfter) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1964 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1965 | x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e180e3230313030313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2010-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | 9120018 | 2010-02-18 21:26:15 +0000 | [diff] [blame] | 1966 | |
Hanno Becker | 7717c41 | 2019-03-14 08:28:42 +0000 | [diff] [blame] | 1967 | X509 CRT ASN1 (UTCTime in notBefore, GeneralizedTime in notAfter) |
| 1968 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1969 | x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303931323331323335393539180e3230313030313031303030303030300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-12-31 23\:59\:59\nexpires on \: 2010-01-01 00\:00\:00\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
| 1970 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1971 | X509 CRT ASN1 (Name with X520 CN) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1972 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1973 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550403130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: CN=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1974 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1975 | X509 CRT ASN1 (Name with X520 C) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1976 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1977 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550406130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: C=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1978 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1979 | X509 CRT ASN1 (Name with X520 L) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1980 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1981 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550407130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: L=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1982 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1983 | X509 CRT ASN1 (Name with X520 ST) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1984 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1985 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550408130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ST=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1986 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1987 | X509 CRT ASN1 (Name with X520 O) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1988 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1989 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040a130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: O=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1990 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1991 | X509 CRT ASN1 (Name with X520 OU) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1992 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1993 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040b130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: OU=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1994 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1995 | X509 CRT ASN1 (Name with unknown X520 part) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1996 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1997 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b06035504de130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1998 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1999 | X509 CRT ASN1 (Name with composite RDN) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2000 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 555fbf8 | 2015-02-04 17:11:55 +0000 | [diff] [blame] | 2001 | x509parse_crt:"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":"cert. version \: 3\nserial number \: 4C\:20\:E3\:BD\nissuer name \: C=US, ST=CA, O=Internet Widgits Pty Ltd, CN=Frankencert CA\nsubject name \: C=US, ST=Washington, ??=US, ??=Delaware, O=Authorize.Net LLC, ??=Private Organization, serialNumber=4369191 + CN=www.authorize.net, L=San Francisco\nissued on \: 2013-08-02 15\:14\:37\nexpires on \: 2015-08-17 05\:54\:31\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\n":0 |
| 2002 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2003 | X509 CRT ASN1 (Name with PKCS9 email) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 2004 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2005 | x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d010901130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: emailAddress=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 2006 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2007 | X509 CRT ASN1 (Name with unknown PKCS9 part) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 2008 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2009 | x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d0109ab130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 2010 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2011 | X509 CRT ASN1 (ECDSA signature, RSA key) |
palaviv | f180df9 | 2016-08-07 11:56:02 +0300 | [diff] [blame] | 2012 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2013 | x509parse_crt:"3081e630819e020103300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343631385a170d3233303730383039343631385a300f310d300b0603550403130454657374304c300d06092a864886f70d0101010500033b003038023100e8f546061d3b49bc2f6b7524b7ea4d73a8d5293ee8c64d9407b70b5d16baebc32b8205591eab4e1eb57e9241883701250203010001300906072a8648ce3d0401033800303502186e18209afbed14a0d9a796efcad68891e3ccd5f75815c833021900e92b4fd460b1994693243b9ffad54729de865381bda41d25":"cert. version \: 1\nserial number \: 03\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:46\:18\nexpires on \: 2023-07-08 09\:46\:18\nsigned using \: ECDSA with SHA1\nRSA key size \: 384 bits\n":0 |
Manuel Pégourié-Gonnard | 72ef0b7 | 2013-07-10 12:20:54 +0200 | [diff] [blame] | 2014 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2015 | X509 CRT ASN1 (ECDSA signature, EC key) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2016 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2017 | x509parse_crt:"3081eb3081a3020900f41534662ec7e912300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343031395a170d3233303730383039343031395a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d030101033200042137969fabd4e370624a0e1a33e379cab950cce00ef8c3c3e2adaeb7271c8f07659d65d3d777dcf21614363ae4b6e617300906072a8648ce3d04010338003035021858cc0f957946fe6a303d92885a456aa74c743c7b708cbd37021900fe293cac21af352d16b82eb8ea54e9410b3abaadd9f05dd6":"cert. version \: 1\nserial number \: F4\:15\:34\:66\:2E\:C7\:E9\:12\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:40\:19\nexpires on \: 2023-07-08 09\:40\:19\nsigned using \: ECDSA with SHA1\nEC key size \: 192 bits\n":0 |
Manuel Pégourié-Gonnard | a3c86c3 | 2013-07-10 16:54:29 +0200 | [diff] [blame] | 2018 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2019 | X509 CRT ASN1 (RSA signature, EC key) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2020 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2021 | x509parse_crt:"3081e430819f020104300d06092a864886f70d0101050500300f310d300b0603550403130454657374301e170d3133303731303135303233375a170d3233303730383135303233375a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d03010103320004e962551a325b21b50cf6b990e33d4318fd16677130726357a196e3efe7107bcb6bdc6d9db2a4df7c964acfe81798433d300d06092a864886f70d01010505000331001a6c18cd1e457474b2d3912743f44b571341a7859a0122774a8e19a671680878936949f904c9255bdd6fffdb33a7e6d8":"cert. version \: 1\nserial number \: 04\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 15\:02\:37\nexpires on \: 2023-07-08 15\:02\:37\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\n":0 |
Manuel Pégourié-Gonnard | a3c86c3 | 2013-07-10 16:54:29 +0200 | [diff] [blame] | 2022 | |
Nicola Di Lieto | 17bb60c | 2020-05-28 23:04:15 +0200 | [diff] [blame] | 2023 | X509 CRT ASN1 (Unsupported critical extension) |
| 2024 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:!MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION |
| 2025 | x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 2026 | |
Nicola Di Lieto | e58b463 | 2020-05-29 22:58:25 +0200 | [diff] [blame] | 2027 | X509 CRT ASN1 (Unsupported critical extension recognized by callback) |
Nicola Di Lieto | 17bb60c | 2020-05-28 23:04:15 +0200 | [diff] [blame] | 2028 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2029 | x509parse_crt_cb:"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":"cert. version \: 3\nserial number \: 4D\:3E\:BB\:B8\:A8\:70\:F9\:C7\:8C\:55\:A8\:A7\:E1\:2F\:D5\:16\nissuer name \: CN=dummy\nsubject name \: CN=dummy\nissued on \: 2020-04-28 17\:42\:43\nexpires on \: 2020-06-27 17\:42\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\nsubject alt name \:\n dNSName \: dummy\nkey usage \: Digital Signature, Key Cert Sign\n":0 |
| 2030 | |
Nicola Di Lieto | e58b463 | 2020-05-29 22:58:25 +0200 | [diff] [blame] | 2031 | X509 CRT ASN1 (Unsupported critical extension not recognized by callback) |
| 2032 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2033 | x509parse_crt_cb:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 2034 | |
| 2035 | X509 CRT ASN1 (Unsupported non critical extension recognized by callback) |
| 2036 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2037 | x509parse_crt_cb:"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":"cert. version \: 3\nserial number \: 4D\:3E\:BB\:B8\:A8\:70\:F9\:C7\:8C\:55\:A8\:A7\:E1\:2F\:D5\:16\nissuer name \: CN=dummy\nsubject name \: CN=dummy\nissued on \: 2020-04-28 17\:42\:43\nexpires on \: 2020-06-27 17\:42\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\nsubject alt name \:\n dNSName \: dummy\nkey usage \: Digital Signature, Key Cert Sign\n":0 |
| 2038 | |
| 2039 | X509 CRT ASN1 (Unsupported non critical extension not recognized by callback) |
| 2040 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2041 | x509parse_crt_cb:"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":"cert. version \: 3\nserial number \: 4D\:3E\:BB\:B8\:A8\:70\:F9\:C7\:8C\:55\:A8\:A7\:E1\:2F\:D5\:16\nissuer name \: CN=dummy\nsubject name \: CN=dummy\nissued on \: 2020-04-28 17\:42\:43\nexpires on \: 2020-06-27 17\:42\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\nsubject alt name \:\n dNSName \: dummy\nkey usage \: Digital Signature, Key Cert Sign\n":0 |
| 2042 | |
Nicola Di Lieto | c84b1e6 | 2020-06-13 11:08:16 +0200 | [diff] [blame] | 2043 | X509 CRT ASN1 (Unsupported critical policy recognized by callback) |
| 2044 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2045 | x509parse_crt_cb:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010101040730053003060101300d06092a864886f70d01010b0500030200ff":"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\ncertificate policies \: ???\n":0 |
| 2046 | |
| 2047 | X509 CRT ASN1 (Unsupported critical policy not recognized by callback) |
| 2048 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2049 | x509parse_crt_cb:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010101040730053003060100300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE |
| 2050 | |
| 2051 | X509 CRT ASN1 (Unsupported non critical policy recognized by callback) |
| 2052 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2053 | x509parse_crt_cb:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010100040730053003060101300d06092a864886f70d01010b0500030200ff":"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\ncertificate policies \: ???\n":0 |
| 2054 | |
| 2055 | X509 CRT ASN1 (Unsupported non critical policy not recognized by callback) |
| 2056 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2057 | x509parse_crt_cb:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010100040730053003060100300d06092a864886f70d01010b0500030200ff":"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\ncertificate policies \: ???\n":0 |
| 2058 | |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2059 | X509 CRL ASN1 (Incorrect first tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2060 | x509parse_crl:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2061 | |
| 2062 | X509 CRL ASN1 (Correct first tag, data length does not match) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2063 | x509parse_crl:"300000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2064 | |
| 2065 | X509 CRL ASN1 (TBSCertList, tag missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2066 | x509parse_crl:"3000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2067 | |
| 2068 | X509 CRL ASN1 (TBSCertList, version tag len missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2069 | x509parse_crl:"3003300102":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2070 | |
| 2071 | X509 CRL ASN1 (TBSCertList, version correct, alg missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2072 | x509parse_crl:"30053003020100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2073 | |
| 2074 | X509 CRL ASN1 (TBSCertList, alg correct, incorrect version) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2075 | x509parse_crl:"300b3009020102300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2076 | |
| 2077 | X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2078 | x509parse_crl:"300b3009020100300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2079 | |
| 2080 | X509 CRL ASN1 (TBSCertList, sig_oid1 id unknown) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2081 | x509parse_crl:"30143012020100300d06092a864886f70d01010f0500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2082 | |
| 2083 | X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2084 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2085 | x509parse_crl:"30143012020100300d06092a864886f70d01010e0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2086 | |
| 2087 | X509 CRL ASN1 (TBSCertList, issuer set missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2088 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2089 | x509parse_crl:"30163014020100300d06092a864886f70d01010e05003000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2090 | |
| 2091 | X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2092 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2093 | x509parse_crl:"30253023020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2094 | |
| 2095 | X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2096 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2097 | x509parse_crl:"30343032020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030":"":MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 2098 | |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2099 | X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2100 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2101 | x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2102 | |
| 2103 | X509 CRL ASN1 (TBSCertList, entries present, date in entry invalid) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2104 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2105 | x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2106 | |
| 2107 | X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2108 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2109 | x509parse_crl:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010d0500":"":MBEDTLS_ERR_X509_SIG_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2110 | |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 2111 | X509 CRL ASN1 (TBSCertList, sig present, len mismatch) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2112 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2113 | x509parse_crl:"305d3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e05000302000100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2114 | |
Gilles Peskine | 210bea3 | 2020-08-06 16:05:35 +0200 | [diff] [blame] | 2115 | # 305c |
| 2116 | # 3047 tbsCertList TBSCertList |
| 2117 | # 020100 version INTEGER OPTIONAL |
| 2118 | # 300d signatureAlgorithm AlgorithmIdentifi |
| 2119 | # 06092a864886f70d01010e |
| 2120 | # 0500 |
| 2121 | # 300f issuer Name |
| 2122 | # 310d300b0603550403130441424344 |
| 2123 | # 170c303930313031303030303030 thisUpdate Time |
| 2124 | # 3014 revokedCertificates |
| 2125 | # 3012 entry 1 |
| 2126 | # 8202abcd userCertificate CertificateSerialNum |
| 2127 | # 170c303831323331323335393539 revocationDate Time |
| 2128 | # 300d signatureAlgorithm AlgorithmIdentifi |
| 2129 | # 06092a864886f70d01010e |
| 2130 | # 0500 |
| 2131 | # 03020001 signatureValue BIT STRING |
| 2132 | # The subsequent TBSCertList negative tests remove or modify some elements. |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2133 | X509 CRL ASN1 (TBSCertList, sig present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2134 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 2135 | x509parse_crl:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nserial number\: AB\:CD revocation date\: 2008-12-31 23\:59\:59\nsigned using \: RSA with SHA-224\n":0 |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 2136 | |
Gilles Peskine | b2281e1 | 2020-07-16 18:18:22 +0200 | [diff] [blame] | 2137 | X509 CRL ASN1 (TBSCertList, signatureValue missing) |
| 2138 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2139 | x509parse_crl:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e0500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2140 | |
| 2141 | X509 CRL ASN1 (TBSCertList, signatureAlgorithm missing) |
| 2142 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2143 | x509parse_crl:"30493047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2144 | |
| 2145 | X509 CRL ASN1 (TBSCertList, single empty entry at end) |
| 2146 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2147 | x509parse_crl:"30373035020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030023000":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2148 | |
| 2149 | X509 CRL ASN1 (TBSCertList, good entry then empty entry at end) |
| 2150 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2151 | x509parse_crl:"304b3049020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301630128202abcd170c3038313233313233353935393000":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2152 | |
| 2153 | X509 CRL ASN1 (TBSCertList, missing time in entry) |
| 2154 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2155 | x509parse_crl:"304e3039020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300630048202abcd300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2156 | |
| 2157 | X509 CRL ASN1 (TBSCertList, missing time in entry at end) |
| 2158 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2159 | x509parse_crl:"303b3039020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300630048202abcd":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2160 | |
| 2161 | X509 CRL ASN1 (TBSCertList, invalid tag for time in entry) |
| 2162 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2163 | x509parse_crl:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c303831323331323335393539300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 2164 | |
| 2165 | X509 CRL ASN1 (TBSCertList, invalid tag for serial) |
| 2166 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 2167 | x509parse_crl:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128402abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 2168 | |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 2169 | X509 CRL ASN1 (TBSCertList, no entries) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2170 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 2171 | x509parse_crl:"30463031020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nsigned using \: RSA with SHA-224\n":0 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 2172 | |
Andres AG | fff826c | 2017-03-07 11:11:12 +0000 | [diff] [blame] | 2173 | X509 CRL ASN1 (invalid version 2) |
| 2174 | x509parse_crl:"30463031020102300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 2175 | |
| 2176 | X509 CRL ASN1 (invalid version overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2177 | x509parse_crl:"3049303102047fffffff300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Andres AG | fff826c | 2017-03-07 11:11:12 +0000 | [diff] [blame] | 2178 | |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 2179 | X509 CRL ASN1 (extension seq too long, crl-idp.pem byte 121) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 2180 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 2181 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2182 | |
| 2183 | X509 CRL ASN1 (extension oid too long, crl-idp.pem byte 123) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 2184 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 2185 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2186 | |
| 2187 | X509 CRL ASN1 (extension critical invalid length, crl-idp.pem byte 128) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 2188 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 2189 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 2190 | |
| 2191 | X509 CRL ASN1 (extension data too long, crl-idp.pem byte 131) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 2192 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 2193 | x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c0101ff0420301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 2194 | |
| 2195 | X509 CRL ASN1 (extension data too short, crl-idp.pem byte 131) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 2196 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 2197 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 2198 | |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 2199 | X509 CRL ASN1 (extension not critical explicit, crl-idp.pem byte 129) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 2200 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 2201 | x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c010100041f301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2018-03-14 07\:31\:48\nnext update \: 2028-03-14 07\:31\:48\nRevoked certificates\:\nsigned using \: RSA with SHA-256\n":0 |
| 2202 | |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 2203 | X509 CRT parse path #2 (one cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2204 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
| 2205 | mbedtls_x509_crt_parse_path:"data_files/dir1":0:1 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 2206 | |
| 2207 | X509 CRT parse path #3 (two certs) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2208 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2209 | mbedtls_x509_crt_parse_path:"data_files/dir2":0:2 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 2210 | |
| 2211 | X509 CRT parse path #4 (two certs, one non-cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2212 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2213 | mbedtls_x509_crt_parse_path:"data_files/dir3":1:2 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2214 | |
Manuel Pégourié-Gonnard | 1beb048 | 2017-06-05 13:49:44 +0200 | [diff] [blame] | 2215 | X509 CRT verify long chain (max intermediate CA, trusted) |
| 2216 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2217 | mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA:0:0 |
| 2218 | |
| 2219 | X509 CRT verify long chain (max intermediate CA, untrusted) |
| 2220 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2221 | mbedtls_x509_crt_verify_max:"data_files/test-ca2.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA-1:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED |
| 2222 | |
| 2223 | X509 CRT verify long chain (max intermediate CA + 1) |
| 2224 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 31458a1 | 2017-06-26 10:11:49 +0200 | [diff] [blame] | 2225 | mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA+1:MBEDTLS_ERR_X509_FATAL_ERROR:-1 |
Manuel Pégourié-Gonnard | 1beb048 | 2017-06-05 13:49:44 +0200 | [diff] [blame] | 2226 | |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2227 | X509 CRT verify chain #1 (zero pathlen intermediate) |
Janos Follath | 822b2c3 | 2015-10-11 10:25:22 +0200 | [diff] [blame] | 2228 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2229 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert14.crt data_files/dir4/cert13.crt data_files/dir4/cert12.crt":"data_files/dir4/cert11.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | 822b2c3 | 2015-10-11 10:25:22 +0200 | [diff] [blame] | 2230 | |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2231 | X509 CRT verify chain #2 (zero pathlen root) |
| 2232 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2233 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert23.crt data_files/dir4/cert22.crt":"data_files/dir4/cert21.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2234 | |
| 2235 | X509 CRT verify chain #3 (nonzero pathlen root) |
| 2236 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2237 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert34.crt data_files/dir4/cert33.crt data_files/dir4/cert32.crt":"data_files/dir4/cert31.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2238 | |
| 2239 | X509 CRT verify chain #4 (nonzero pathlen intermediate) |
| 2240 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2241 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert45.crt data_files/dir4/cert44.crt data_files/dir4/cert43.crt data_files/dir4/cert42.crt":"data_files/dir4/cert41.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2242 | |
| 2243 | X509 CRT verify chain #5 (nonzero maxpathlen intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2244 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2245 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert54.crt data_files/dir4/cert53.crt data_files/dir4/cert52.crt":"data_files/dir4/cert51.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2246 | |
| 2247 | X509 CRT verify chain #6 (nonzero maxpathlen root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2248 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2249 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2250 | |
| 2251 | X509 CRT verify chain #7 (maxpathlen root, self signed in path) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2252 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2253 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert74.crt data_files/dir4/cert73.crt data_files/dir4/cert72.crt":"data_files/dir4/cert71.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2254 | |
| 2255 | X509 CRT verify chain #8 (self signed maxpathlen root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2256 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2257 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert61.crt data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2258 | |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2259 | X509 CRT verify chain #9 (zero pathlen first intermediate, valid) |
Manuel Pégourié-Gonnard | a3aa43d | 2015-11-19 10:46:07 +0100 | [diff] [blame] | 2260 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2261 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert83.crt data_files/dir4/cert82.crt":"data_files/dir4/cert81.crt":0:0:"":0 |
Manuel Pégourié-Gonnard | a3aa43d | 2015-11-19 10:46:07 +0100 | [diff] [blame] | 2262 | |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2263 | X509 CRT verify chain #10 (zero pathlen root, valid) |
| 2264 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2265 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":0:0:"":0 |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2266 | |
Manuel Pégourié-Gonnard | 9832cea | 2017-05-23 10:13:40 +0200 | [diff] [blame] | 2267 | X509 CRT verify chain #11 (valid chain, missing profile) |
| 2268 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2269 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":-1:MBEDTLS_ERR_X509_BAD_INPUT_DATA:"nonesuch":0 |
Manuel Pégourié-Gonnard | 9832cea | 2017-05-23 10:13:40 +0200 | [diff] [blame] | 2270 | |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2271 | X509 CRT verify chain #12 (suiteb profile, RSA root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2272 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2273 | mbedtls_x509_crt_verify_chain:"data_files/server3.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2274 | |
| 2275 | X509 CRT verify chain #13 (RSA only profile, EC root) |
| 2276 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2277 | mbedtls_x509_crt_verify_chain:"data_files/server4.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2278 | |
Manuel Pégourié-Gonnard | d092277 | 2017-06-27 13:26:43 +0200 | [diff] [blame] | 2279 | X509 CRT verify chain #13 (RSA only profile, EC trusted EE) |
| 2280 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2281 | mbedtls_x509_crt_verify_chain:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
| 2282 | |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2283 | X509 CRT verify chain #14 (RSA-3072 profile, root key too small) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2284 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2285 | mbedtls_x509_crt_verify_chain:"data_files/server1.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2286 | |
| 2287 | X509 CRT verify chain #15 (suiteb profile, rsa intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2288 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2289 | mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2290 | |
| 2291 | X509 CRT verify chain #16 (RSA-only profile, EC intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2292 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2293 | mbedtls_x509_crt_verify_chain:"data_files/server8.crt data_files/test-int-ca2.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2294 | |
| 2295 | X509 CRT verify chain #17 (SHA-512 profile) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2296 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2297 | mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_MD:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"sha512":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2298 | |
Manuel Pégourié-Gonnard | 4185978 | 2017-05-23 12:58:53 +0200 | [diff] [blame] | 2299 | X509 CRT verify chain #18 (len=1, vrfy fatal on depth 1) |
| 2300 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C |
| 2301 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-2:"":2 |
| 2302 | |
| 2303 | X509 CRT verify chain #19 (len=0, vrfy fatal on depth 0) |
| 2304 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C |
| 2305 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-1:"":1 |
| 2306 | |
| 2307 | X509 CRT verify chain #20 (len=1, vrfy fatal on depth 0) |
| 2308 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
| 2309 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca.crt":-1:-1:"":1 |
| 2310 | |
| 2311 | X509 CRT verify chain #21 (len=3, vrfy fatal on depth 3) |
| 2312 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2313 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-4:"":8 |
| 2314 | |
| 2315 | X509 CRT verify chain #22 (len=3, vrfy fatal on depth 2) |
| 2316 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2317 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-3:"":4 |
| 2318 | |
| 2319 | X509 CRT verify chain #23 (len=3, vrfy fatal on depth 1) |
| 2320 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2321 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-2:"":2 |
| 2322 | |
| 2323 | X509 CRT verify chain #24 (len=3, vrfy fatal on depth 0) |
| 2324 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2325 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-1:"":1 |
| 2326 | |
| 2327 | X509 CRT verify chain #25 (len=3, vrfy fatal on depth 3, untrusted) |
| 2328 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2329 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca2.crt":-1:-4:"":8 |
| 2330 | |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2331 | X509 OID description #1 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2332 | x509_oid_desc:"2b06010505070301":"TLS Web Server Authentication" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2333 | |
| 2334 | X509 OID description #2 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2335 | x509_oid_desc:"2b0601050507030f":"notfound" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2336 | |
| 2337 | X509 OID description #3 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2338 | x509_oid_desc:"2b0601050507030100":"notfound" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2339 | |
| 2340 | X509 OID numstring #1 (wide buffer) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2341 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":20:17 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2342 | |
| 2343 | X509 OID numstring #2 (buffer just fits) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2344 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":18:17 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2345 | |
| 2346 | X509 OID numstring #3 (buffer too small) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2347 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":17:MBEDTLS_ERR_OID_BUF_TOO_SMALL |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2348 | |
| 2349 | X509 OID numstring #4 (larger number) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2350 | x509_oid_numstr:"2a864886f70d":"1.2.840.113549":15:14 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2351 | |
| 2352 | X509 OID numstring #5 (arithmetic overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2353 | x509_oid_numstr:"2a8648f9f8f7f6f5f4f3f2f1f001":"":100:MBEDTLS_ERR_OID_BUF_TOO_SMALL |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2354 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2355 | X509 CRT keyUsage #1 (no extension, expected KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2356 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2357 | x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2358 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2359 | X509 CRT keyUsage #2 (no extension, surprising KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2360 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2361 | x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2362 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2363 | X509 CRT keyUsage #3 (extension present, no KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2364 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2365 | x509_check_key_usage:"data_files/server1.key_usage.crt":0:0 |
| 2366 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2367 | X509 CRT keyUsage #4 (extension present, single KU present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2368 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2369 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2370 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2371 | X509 CRT keyUsage #5 (extension present, single KU absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2372 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2373 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2374 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2375 | X509 CRT keyUsage #6 (extension present, combined KU present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2376 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2377 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2378 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2379 | X509 CRT keyUsage #7 (extension present, combined KU both absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2380 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2381 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_KU_CRL_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2382 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2383 | X509 CRT keyUsage #8 (extension present, combined KU one absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2384 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2385 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_KEY_AGREEMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2386 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2387 | X509 CRT keyUsage #9 (extension present, decOnly allowed absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2388 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2389 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0 |
| 2390 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2391 | X509 CRT keyUsage #10 (extension present, decOnly non-allowed present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2392 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2393 | x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
| 2394 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2395 | X509 CRT keyUsage #11 (extension present, decOnly allowed present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2396 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2397 | x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0 |
| 2398 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2399 | X509 CRT extendedKeyUsage #1 (no extension, serverAuth) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2400 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2401 | x509_check_extended_key_usage:"data_files/server5.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2402 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2403 | X509 CRT extendedKeyUsage #2 (single value, present) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2404 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2405 | x509_check_extended_key_usage:"data_files/server5.eku-srv.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2406 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2407 | X509 CRT extendedKeyUsage #3 (single value, absent) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2408 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2409 | x509_check_extended_key_usage:"data_files/server5.eku-cli.crt":"2b06010505070301":MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2410 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2411 | X509 CRT extendedKeyUsage #4 (two values, first) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2412 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2413 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2414 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2415 | X509 CRT extendedKeyUsage #5 (two values, second) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2416 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2417 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070302":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2418 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2419 | X509 CRT extendedKeyUsage #6 (two values, other) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2420 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2421 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070303":MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2422 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2423 | X509 CRT extendedKeyUsage #7 (any, random) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2424 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2425 | x509_check_extended_key_usage:"data_files/server5.eku-cs_any.crt":"2b060105050703ff":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2426 | |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2427 | X509 RSASSA-PSS parameters ASN1 (good, all defaults) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2428 | x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2429 | |
| 2430 | X509 RSASSA-PSS parameters ASN1 (wrong initial tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2431 | x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2432 | |
| 2433 | X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2434 | x509_parse_rsassa_pss_params:"a400":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2435 | |
| 2436 | X509 RSASSA-PSS parameters ASN1 (good, HashAlg SHA256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2437 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2438 | x509_parse_rsassa_pss_params:"a00d300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2439 | |
| 2440 | X509 RSASSA-PSS parameters ASN1 (good, explicit HashAlg = default) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2441 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2442 | x509_parse_rsassa_pss_params:"a009300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2443 | |
| 2444 | X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2445 | x509_parse_rsassa_pss_params:"a00a300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2446 | |
| 2447 | X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2448 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2449 | x509_parse_rsassa_pss_params:"a00a300706052b0e03021a00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2450 | |
| 2451 | X509 RSASSA-PSS parameters ASN1 (HashAlg with parameters) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2452 | x509_parse_rsassa_pss_params:"a00f300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2453 | |
Paul Bakker | 237a847 | 2014-06-25 14:45:24 +0200 | [diff] [blame] | 2454 | X509 RSASSA-PSS parameters ASN1 (HashAlg unknown OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2455 | x509_parse_rsassa_pss_params:"a00d300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2456 | |
| 2457 | X509 RSASSA-PSS parameters ASN1 (good, MGAlg = MGF1-SHA256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2458 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2459 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2460 | |
| 2461 | X509 RSASSA-PSS parameters ASN1 (good, explicit MGAlg = default) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2462 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2463 | x509_parse_rsassa_pss_params:"a116301406092a864886f70d010108300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2464 | |
| 2465 | X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2466 | x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2467 | |
| 2468 | X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2469 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2470 | x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b060960864801650304020100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2471 | |
| 2472 | X509 RSASSA-PSS parameters ASN1 (MGAlg AlgId wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2473 | x509_parse_rsassa_pss_params:"a11a301906092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2474 | |
| 2475 | X509 RSASSA-PSS parameters ASN1 (MGAlg OID != MGF1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2476 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010109300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2477 | |
| 2478 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2479 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108310b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2480 | |
| 2481 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2482 | x509_parse_rsassa_pss_params:"a10f300d06092a864886f70d0101083000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2483 | |
| 2484 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2485 | x509_parse_rsassa_pss_params:"a11b301906092a864886f70d010108300c0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2486 | |
| 2487 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2488 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0709608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2489 | |
| 2490 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2491 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2492 | |
| 2493 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2494 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2495 | x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2496 | |
| 2497 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2498 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2499 | x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2500 | |
| 2501 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1c) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2502 | x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2503 | |
| 2504 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2505 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2506 | x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e0609608648016503040201050000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2507 | |
| 2508 | X509 RSASSA-PSS parameters ASN1 (good, saltLen = 94) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2509 | x509_parse_rsassa_pss_params:"a20302015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2510 | |
| 2511 | X509 RSASSA-PSS parameters ASN1 (good, explicit saltLen = default) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2512 | x509_parse_rsassa_pss_params:"a203020114":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2513 | |
| 2514 | X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2515 | x509_parse_rsassa_pss_params:"a20402015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2516 | |
| 2517 | X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #2) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2518 | x509_parse_rsassa_pss_params:"a20402015e00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2519 | |
| 2520 | X509 RSASSA-PSS parameters ASN1 (saltLen not an int) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2521 | x509_parse_rsassa_pss_params:"a2023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2522 | |
| 2523 | X509 RSASSA-PSS parameters ASN1 (good, explicit trailerField = default) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2524 | x509_parse_rsassa_pss_params:"a303020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2525 | |
| 2526 | X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2527 | x509_parse_rsassa_pss_params:"a304020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2528 | |
| 2529 | X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #2) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2530 | x509_parse_rsassa_pss_params:"a30402010100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2531 | |
| 2532 | X509 RSASSA-PSS parameters ASN1 (trailerField not an int) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2533 | x509_parse_rsassa_pss_params:"a3023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2534 | |
| 2535 | X509 RSASSA-PSS parameters ASN1 (trailerField not 1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2536 | x509_parse_rsassa_pss_params:"a303020102":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2537 | |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2538 | X509 CSR ASN.1 (OK) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2539 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2540 | mbedtls_x509_csr_parse:"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":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n":0 |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2541 | |
| 2542 | X509 CSR ASN.1 (bad first tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2543 | mbedtls_x509_csr_parse:"3100":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2544 | |
| 2545 | X509 CSR ASN.1 (bad sequence: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2546 | mbedtls_x509_csr_parse:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2547 | |
| 2548 | X509 CSR ASN.1 (total length mistmatch) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2549 | mbedtls_x509_csr_parse:"30010000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2550 | |
| 2551 | X509 CSR ASN.1 (bad CRI: not a sequence) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2552 | mbedtls_x509_csr_parse:"30023100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2553 | |
| 2554 | X509 CSR ASN.1 (bad CRI: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2555 | mbedtls_x509_csr_parse:"30023001":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2556 | |
| 2557 | X509 CSR ASN.1 (bad CRI.Version: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2558 | mbedtls_x509_csr_parse:"30053002020100":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2559 | |
| 2560 | X509 CSR ASN.1 (bad CRI.Version: not v1) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2561 | mbedtls_x509_csr_parse:"30053003020101":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2562 | |
| 2563 | X509 CSR ASN.1 (bad CRI.Name: not a sequence) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2564 | mbedtls_x509_csr_parse:"300730050201003100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2565 | |
| 2566 | X509 CSR ASN.1 (bad CRI.Name: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2567 | mbedtls_x509_csr_parse:"30083005020100300100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2568 | |
| 2569 | X509 CSR ASN.1 (bad CRI.Name payload: not a set) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2570 | mbedtls_x509_csr_parse:"3009300702010030023000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2571 | |
| 2572 | X509 CSR ASN.1 (bad CRI.Name payload: overlong) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2573 | mbedtls_x509_csr_parse:"300a30080201003002310100":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2574 | |
| 2575 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: missing) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2576 | mbedtls_x509_csr_parse:"30143012020100300d310b3009060355040613024e4c":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2577 | |
| 2578 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2579 | mbedtls_x509_csr_parse:"30163014020100300d310b3009060355040613024e4c3100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2580 | |
| 2581 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: overlong) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2582 | mbedtls_x509_csr_parse:"30173014020100300d310b3009060355040613024e4c300100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2583 | |
| 2584 | X509 CSR ASN.1 (bad attributes: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2585 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2586 | mbedtls_x509_csr_parse:"3081973081940201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2587 | |
| 2588 | X509 CSR ASN.1 (bad attributes: bad tag) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2589 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2590 | mbedtls_x509_csr_parse:"3081993081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2591 | |
| 2592 | X509 CSR ASN.1 (bad attributes: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2593 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2594 | mbedtls_x509_csr_parse:"30819a3081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa00100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2595 | |
| 2596 | X509 CSR ASN.1 (bad sigAlg: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2597 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2598 | mbedtls_x509_csr_parse:"3081c23081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2599 | |
| 2600 | X509 CSR ASN.1 (bad sigAlg: not a sequence) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2601 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2602 | mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2603 | |
| 2604 | X509 CSR ASN.1 (bad sigAlg: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2605 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2606 | mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2607 | |
| 2608 | X509 CSR ASN.1 (bad sigAlg: unknown) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2609 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2610 | mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2611 | |
| 2612 | X509 CSR ASN.1 (bad sig: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2613 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2614 | mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d0401":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2615 | |
| 2616 | X509 CSR ASN.1 (bad sig: not a bit string) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2617 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2618 | mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010400":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2619 | |
| 2620 | X509 CSR ASN.1 (bad sig: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2621 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2622 | mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2623 | |
| 2624 | X509 CSR ASN.1 (extra data after signature) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2625 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2626 | mbedtls_x509_csr_parse:"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":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2627 | |
Andres AG | f00baff | 2017-03-07 10:57:34 +0000 | [diff] [blame] | 2628 | X509 CSR ASN.1 (invalid version overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2629 | mbedtls_x509_csr_parse:"3008300602047fffffff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Andres AG | f00baff | 2017-03-07 10:57:34 +0000 | [diff] [blame] | 2630 | |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2631 | X509 File parse (no issues) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2632 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2633 | x509parse_crt_file:"data_files/server7_int-ca.crt":0 |
| 2634 | |
| 2635 | X509 File parse (extra space in one certificate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2636 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2637 | x509parse_crt_file:"data_files/server7_pem_space.crt":1 |
| 2638 | |
| 2639 | X509 File parse (all certificates fail) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2640 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2641 | x509parse_crt_file:"data_files/server7_all_space.crt":MBEDTLS_ERR_PEM_INVALID_DATA + MBEDTLS_ERR_BASE64_INVALID_CHARACTER |
Manuel Pégourié-Gonnard | 052d10c | 2015-07-31 11:09:59 +0200 | [diff] [blame] | 2642 | |
| 2643 | X509 File parse (trailing spaces, OK) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2644 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 052d10c | 2015-07-31 11:09:59 +0200 | [diff] [blame] | 2645 | x509parse_crt_file:"data_files/server7_trailing_space.crt":0 |
Andres AG | 4b76aec | 2016-09-23 13:16:02 +0100 | [diff] [blame] | 2646 | |
Paul Elliott | ca17ebf | 2020-11-24 17:30:18 +0000 | [diff] [blame] | 2647 | X509 File parse (Algorithm Params Tag mismatch) |
| 2648 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
| 2649 | x509parse_crt_file:"data_files/cli-rsa-sha256-badalg.crt.der":MBEDTLS_ERR_X509_SIG_MISMATCH |
| 2650 | |
Andres AG | 4b76aec | 2016-09-23 13:16:02 +0100 | [diff] [blame] | 2651 | X509 Get time (UTC no issues) |
| 2652 | depends_on:MBEDTLS_X509_USE_C |
| 2653 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"500101000000Z":0:1950:1:1:0:0:0 |
| 2654 | |
| 2655 | X509 Get time (Generalized Time no issues) |
| 2656 | depends_on:MBEDTLS_X509_USE_C |
| 2657 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"99991231235959Z":0:9999:12:31:23:59:59 |
| 2658 | |
| 2659 | X509 Get time (UTC year without leap day) |
| 2660 | depends_on:MBEDTLS_X509_USE_C |
| 2661 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"490229121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2662 | |
| 2663 | X509 Get time (UTC year with leap day) |
| 2664 | depends_on:MBEDTLS_X509_USE_C |
| 2665 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212Z":0:2000:2:29:12:12:12 |
| 2666 | |
| 2667 | X509 Get time (UTC invalid day of month #1) |
| 2668 | depends_on:MBEDTLS_X509_USE_C |
| 2669 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000132121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2670 | |
| 2671 | X509 Get time (UTC invalid day of month #2) |
| 2672 | depends_on:MBEDTLS_X509_USE_C |
| 2673 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001131121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2674 | |
| 2675 | X509 Get time (UTC invalid hour) |
| 2676 | depends_on:MBEDTLS_X509_USE_C |
| 2677 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130241212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2678 | |
| 2679 | X509 Get time (UTC invalid min) |
| 2680 | depends_on:MBEDTLS_X509_USE_C |
| 2681 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130236012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2682 | |
| 2683 | X509 Get time (UTC invalid sec) |
| 2684 | depends_on:MBEDTLS_X509_USE_C |
| 2685 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130235960Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
Janos Follath | ea7054a | 2017-02-08 14:13:02 +0000 | [diff] [blame] | 2686 | |
| 2687 | X509 Get time (UTC without time zone) |
| 2688 | depends_on:MBEDTLS_X509_USE_C |
| 2689 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212":0:2000:2:29:12:12:12 |
| 2690 | |
| 2691 | X509 Get time (UTC with invalid time zone #1) |
| 2692 | depends_on:MBEDTLS_X509_USE_C |
| 2693 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2694 | |
| 2695 | X509 Get time (UTC with invalid time zone #2) |
| 2696 | depends_on:MBEDTLS_X509_USE_C |
| 2697 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2698 | |
| 2699 | X509 Get time (Date with invalid tag) |
| 2700 | depends_on:MBEDTLS_X509_USE_C |
| 2701 | x509_get_time:MBEDTLS_ASN1_CONTEXT_SPECIFIC:"000229121212":MBEDTLS_ERR_X509_INVALID_DATE+MBEDTLS_ERR_ASN1_UNEXPECTED_TAG:0:0:0:0:0:0 |
| 2702 | |
| 2703 | X509 Get time (UTC, truncated) |
| 2704 | depends_on:MBEDTLS_X509_USE_C |
| 2705 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2706 | |
| 2707 | X509 Get time (Generalized Time, truncated) |
| 2708 | depends_on:MBEDTLS_X509_USE_C |
| 2709 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2710 | |
| 2711 | X509 Get time (UTC without seconds) |
| 2712 | depends_on:MBEDTLS_X509_USE_C |
| 2713 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212":MBEDTLS_ERR_X509_INVALID_DATE:2000:2:29:12:12:0 |
| 2714 | |
| 2715 | X509 Get time (UTC without seconds and with invalid time zone #1) |
| 2716 | depends_on:MBEDTLS_X509_USE_C |
| 2717 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2718 | |
| 2719 | X509 Get time (UTC without second and with invalid time zone #2) |
| 2720 | depends_on:MBEDTLS_X509_USE_C |
| 2721 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2722 | |
| 2723 | X509 Get time (UTC invalid character in year) |
| 2724 | depends_on:MBEDTLS_X509_USE_C |
| 2725 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0\1130231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2726 | |
| 2727 | X509 Get time (UTC invalid character in month) |
| 2728 | depends_on:MBEDTLS_X509_USE_C |
| 2729 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001%30231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2730 | |
| 2731 | X509 Get time (UTC invalid character in day) |
| 2732 | depends_on:MBEDTLS_X509_USE_C |
| 2733 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011`0231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2734 | |
| 2735 | X509 Get time (UTC invalid character in hour) |
| 2736 | depends_on:MBEDTLS_X509_USE_C |
| 2737 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302h1212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2738 | |
| 2739 | X509 Get time (UTC invalid character in min) |
| 2740 | depends_on:MBEDTLS_X509_USE_C |
| 2741 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"00113023u012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2742 | |
| 2743 | X509 Get time (UTC invalid character in sec) |
| 2744 | depends_on:MBEDTLS_X509_USE_C |
| 2745 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302359n0Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2746 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2747 | X509 Get time (Generalized Time, year multiple of 100 but not 400 is not a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2748 | depends_on:MBEDTLS_X509_USE_C |
| 2749 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19000229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2750 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2751 | X509 Get time (Generalized Time, year multiple of 4 but not 100 is a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2752 | depends_on:MBEDTLS_X509_USE_C |
| 2753 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19920229000000Z":0:1992:2:29:0:0:0 |
| 2754 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2755 | X509 Get time (Generalized Time, year multiple of 400 is a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2756 | depends_on:MBEDTLS_X509_USE_C |
| 2757 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229000000Z":0:2000:2:29:0:0:0 |
| 2758 | |
| 2759 | X509 Get time (Generalized Time invalid leap year not multiple of 4, 100 or 400) |
| 2760 | depends_on:MBEDTLS_X509_USE_C |
| 2761 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19910229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
Manuel Pégourié-Gonnard | da19f4c | 2018-06-12 12:40:54 +0200 | [diff] [blame] | 2762 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2763 | X509 CRT verify restart: trusted EE, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2764 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2765 | x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:0:0:0 |
| 2766 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2767 | X509 CRT verify restart: trusted EE, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2768 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2769 | x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:1:0:0 |
| 2770 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2771 | X509 CRT verify restart: no intermediate, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2772 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2773 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:0:0:0 |
| 2774 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2775 | X509 CRT verify restart: no intermediate, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2776 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2777 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:1:100:10000 |
| 2778 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2779 | X509 CRT verify restart: no intermediate, max_ops=40000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2780 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2781 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:40000:0:0 |
| 2782 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2783 | X509 CRT verify restart: no intermediate, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2784 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2785 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:500:20:80 |
| 2786 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2787 | X509 CRT verify restart: no intermediate, badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2788 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2789 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
| 2790 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2791 | X509 CRT verify restart: no intermediate, badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2792 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2793 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2794 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2795 | X509 CRT verify restart: no intermediate, badsign, max_ops=40000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2796 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2797 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:40000:0:0 |
| 2798 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2799 | X509 CRT verify restart: no intermediate, badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2800 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2801 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:20:80 |
| 2802 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2803 | X509 CRT verify restart: one int, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2804 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2805 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:0:0:0 |
| 2806 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2807 | X509 CRT verify restart: one int, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2808 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2809 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:1:100:10000 |
| 2810 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2811 | X509 CRT verify restart: one int, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2812 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2813 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:30000:0:0 |
| 2814 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2815 | X509 CRT verify restart: one int, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2816 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2817 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:500:25:100 |
| 2818 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2819 | X509 CRT verify restart: one int, EE badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2820 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2821 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
| 2822 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2823 | X509 CRT verify restart: one int, EE badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2824 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2825 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2826 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2827 | X509 CRT verify restart: one int, EE badsign, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2828 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2829 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0 |
| 2830 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2831 | X509 CRT verify restart: one int, EE badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2832 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2833 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100 |
| 2834 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2835 | X509 CRT verify restart: one int, int badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2836 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2837 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2838 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2839 | X509 CRT verify restart: one int, int badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2840 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2841 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2842 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2843 | X509 CRT verify restart: one int, int badsign, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2844 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2845 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0 |
| 2846 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2847 | X509 CRT verify restart: one int, int badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2848 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2849 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100 |