blob: 738026bb97674b2f899a57b0940417546f6ab66c [file] [log] [blame]
Hanno Becker2389d162019-02-14 12:52:47 +00001X509 CRT information #1
palaviva07ecda2016-08-07 11:15:29 +03002depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +02003x509_cert_info:"data_files/server1.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +00004
Hanno Becker2389d162019-02-14 12:52:47 +00005X509 CRT information #1 (DER)
Hanno Becker462c3e52019-01-31 10:55:42 +00006depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +02007x509_cert_info:"data_files/server1.crt.der":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Hanno Becker462c3e52019-01-31 10:55:42 +00008
Hanno Becker2389d162019-02-14 12:52:47 +00009X509 CRT information #2
palaviva07ecda2016-08-07 11:15:29 +030010depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020011x509_cert_info:"data_files/server2.crt":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +000012
Hanno Becker2389d162019-02-14 12:52:47 +000013X509 CRT information #2 (DER)
Hanno Becker462c3e52019-01-31 10:55:42 +000014depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020015x509_cert_info:"data_files/server2.crt.der":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Hanno Becker462c3e52019-01-31 10:55:42 +000016
Hanno Becker2389d162019-02-14 12:52:47 +000017X509 CRT information #3
palaviva07ecda2016-08-07 11:15:29 +030018depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020019x509_cert_info:"data_files/test-ca.crt":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-02-10 14\:44\:00\nexpires on \: 2029-02-10 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +000020
Hanno Becker2389d162019-02-14 12:52:47 +000021X509 CRT information #3 (DER)
Hanno Becker462c3e52019-01-31 10:55:42 +000022depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020023x509_cert_info:"data_files/test-ca.crt.der":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-02-10 14\:44\:00\nexpires on \: 2029-02-10 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n"
Hanno Becker462c3e52019-01-31 10:55:42 +000024
Hanno Becker2389d162019-02-14 12:52:47 +000025X509 CRT information MD2 Digest
palaviva07ecda2016-08-07 11:15:29 +030026depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD2_C
Hanno Becker2e0f71f2019-06-03 14:14:04 +010027x509_cert_info:"data_files/cert_md2.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD2\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000028
Hanno Becker2389d162019-02-14 12:52:47 +000029X509 CRT information MD4 Digest
palaviva07ecda2016-08-07 11:15:29 +030030depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD4_C
Hanno Becker2e0f71f2019-06-03 14:14:04 +010031x509_cert_info:"data_files/cert_md4.crt":"cert. version \: 3\nserial number \: 05\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD4\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000032
Hanno Becker2389d162019-02-14 12:52:47 +000033X509 CRT information MD5 Digest
palaviva07ecda2016-08-07 11:15:29 +030034depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD5_C
Hanno Becker2e0f71f2019-06-03 14:14:04 +010035x509_cert_info:"data_files/cert_md5.crt":"cert. version \: 3\nserial number \: 06\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD5\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000036
Hanno Becker2389d162019-02-14 12:52:47 +000037X509 CRT information SHA1 Digest
palaviva07ecda2016-08-07 11:15:29 +030038depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020039x509_cert_info:"data_files/cert_sha1.crt":"cert. version \: 3\nserial number \: 07\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000040
Hanno Becker2389d162019-02-14 12:52:47 +000041X509 CRT information SHA224 Digest
palaviva07ecda2016-08-07 11:15:29 +030042depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020043x509_cert_info:"data_files/cert_sha224.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA224\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000044
Hanno Becker2389d162019-02-14 12:52:47 +000045X509 CRT information SHA256 Digest
palaviva07ecda2016-08-07 11:15:29 +030046depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020047x509_cert_info:"data_files/cert_sha256.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA256\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000048
Hanno Becker2389d162019-02-14 12:52:47 +000049X509 CRT information SHA384 Digest
palaviva07ecda2016-08-07 11:15:29 +030050depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020051x509_cert_info:"data_files/cert_sha384.crt":"cert. version \: 3\nserial number \: 0A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA384\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000052
Hanno Becker2389d162019-02-14 12:52:47 +000053X509 CRT information SHA512 Digest
palaviva07ecda2016-08-07 11:15:29 +030054depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C
Ron Eldor9eeb8612019-02-12 15:03:42 +020055x509_cert_info:"data_files/cert_sha512.crt":"cert. version \: 3\nserial number \: 0B\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA512\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000056
Hanno Becker2389d162019-02-14 12:52:47 +000057X509 CRT information RSA-PSS, SHA1 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020059x509_cert_info:"data_files/server9.crt":"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010060
Hanno Becker2389d162019-02-14 12:52:47 +000061X509 CRT information RSA-PSS, SHA224 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020062depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020063x509_cert_info:"data_files/server9-sha224.crt":"cert. version \: 3\nserial number \: 17\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:36\nexpires on \: 2024-01-18 13\:57\:36\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010064
Hanno Becker2389d162019-02-14 12:52:47 +000065X509 CRT information RSA-PSS, SHA256 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020067x509_cert_info:"data_files/server9-sha256.crt":"cert. version \: 3\nserial number \: 18\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:45\nexpires on \: 2024-01-18 13\:57\:45\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010068
Hanno Becker2389d162019-02-14 12:52:47 +000069X509 CRT information RSA-PSS, SHA384 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020070depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020071x509_cert_info:"data_files/server9-sha384.crt":"cert. version \: 3\nserial number \: 19\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:58\nexpires on \: 2024-01-18 13\:57\:58\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010072
Hanno Becker2389d162019-02-14 12:52:47 +000073X509 CRT information RSA-PSS, SHA512 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020075x509_cert_info:"data_files/server9-sha512.crt":"cert. version \: 3\nserial number \: 1A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:58\:12\nexpires on \: 2024-01-18 13\:58\:12\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard59a75d52014-01-22 10:12:57 +010076
Hanno Becker2389d162019-02-14 12:52:47 +000077X509 CRT information EC, SHA1 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020078depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020079x509_cert_info:"data_files/server5-sha1.crt":"cert. version \: 3\nserial number \: 12\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020080
Hanno Becker2389d162019-02-14 12:52:47 +000081X509 CRT information EC, SHA224 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020082depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020083x509_cert_info:"data_files/server5-sha224.crt":"cert. version \: 3\nserial number \: 13\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020084
Hanno Becker2389d162019-02-14 12:52:47 +000085X509 CRT information EC, SHA256 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020086depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020087x509_cert_info:"data_files/server5.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020088
Hanno Becker2389d162019-02-14 12:52:47 +000089X509 CRT information EC, SHA384 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020090depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020091x509_cert_info:"data_files/server5-sha384.crt":"cert. version \: 3\nserial number \: 14\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020092
Hanno Becker2389d162019-02-14 12:52:47 +000093X509 CRT information EC, SHA512 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020094depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020095x509_cert_info:"data_files/server5-sha512.crt":"cert. version \: 3\nserial number \: 15\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020096
Hanno Becker2389d162019-02-14 12:52:47 +000097X509 CRT information EC, SHA256 Digest, hardware module name SAN
Ron Eldorb2dc3fa2019-03-21 13:40:13 +020098depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
99x509_cert_info:"data_files/server5-othername.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nissued on \: 2019-03-24 09\:06\:02\nexpires on \: 2029-03-21 09\:06\:02\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n"
100
Hanno Becker2389d162019-02-14 12:52:47 +0000101X509 CRT information EC, SHA256 Digest, Wisun Fan device
Ron Eldor3c4734a2019-03-25 14:05:23 +0200102depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
103x509_cert_info:"data_files/server5-fan.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nissued on \: 2019-03-25 09\:03\:46\nexpires on \: 2029-03-22 09\:03\:46\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\next key usage \: Wi-SUN Alliance Field Area Network (FAN)\n"
104
Hanno Becker2389d162019-02-14 12:52:47 +0000105X509 CRT information, NS Cert Type
palaviva07ecda2016-08-07 11:15:29 +0300106depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +0200107x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\ncert. type \: SSL Server\n"
Manuel Pégourié-Gonnard919f8f52014-04-01 13:01:11 +0200108
Hanno Becker2389d162019-02-14 12:52:47 +0000109X509 CRT information, Key Usage
palaviva07ecda2016-08-07 11:15:29 +0300110depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldor9eeb8612019-02-12 15:03:42 +0200111x509_cert_info:"data_files/server1.key_usage.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n"
Manuel Pégourié-Gonnard65c2ddc2014-04-01 14:12:11 +0200112
Hanno Becker2389d162019-02-14 12:52:47 +0000113X509 CRT information, Key Usage with decipherOnly
palaviva07ecda2016-08-07 11:15:29 +0300114depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard9a702252015-06-23 10:14:36 +0200115x509_cert_info:"data_files/keyUsage.decipherOnly.crt":"cert. version \: 3\nserial number \: 9B\:13\:CE\:4C\:A5\:6F\:DE\:52\nissuer name \: C=GB, L=Cambridge, O=Default Company Ltd\nsubject name \: C=GB, L=Cambridge, O=Default Company Ltd\nissued on \: 2015-05-12 10\:36\:55\nexpires on \: 2018-05-11 10\:36\:55\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment, Decipher Only\n"
116
Hanno Becker2389d162019-02-14 12:52:47 +0000117X509 CRT information, Subject Alt Name
Ron Eldor9eeb8612019-02-12 15:03:42 +0200118depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
119x509_cert_info:"data_files/cert_example_multi.crt":"cert. version \: 3\nserial number \: 11\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=www.example.com\nissued on \: 2019-07-10 11\:27\:52\nexpires on \: 2029-07-10 11\:27\:52\nsigned using \: RSA with SHA-256\nRSA key size \: 1024 bits\nsubject alt name \:\n dNSName \: example.com\n dNSName \: example.net\n dNSName \: *.example.org\n"
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200120
Hanno Becker2389d162019-02-14 12:52:47 +0000121X509 CRT information, Multiple different Subject Alt Name
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200122depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
123x509_cert_info:"data_files/multiple_san.crt":"cert. version \: 3\nserial number \: 04\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nissued on \: 2019-04-22 16\:10\:48\nexpires on \: 2029-04-19 16\:10\:48\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n dNSName \: example.com\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n dNSName \: example.net\n dNSName \: *.example.org\n"
Manuel Pégourié-Gonnardbce2b302014-04-01 13:43:28 +0200124
Hanno Becker2389d162019-02-14 12:52:47 +0000125X509 CRT information, Subject Alt Name + Key Usage
palaviva07ecda2016-08-07 11:15:29 +0300126depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Janos Follath22f605f2019-05-10 10:37:17 +0100127x509_cert_info:"data_files/cert_example_multi_nocn.crt":"cert. version \: 3\nserial number \: F7\:C6\:7F\:F8\:E9\:A9\:63\:F9\nissuer name \: C=NL\nsubject name \: C=NL\nissued on \: 2014-01-22 10\:04\:33\nexpires on \: 2024-01-22 10\:04\:33\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: www.shotokan-braunschweig.de\n dNSName \: www.massimo-abate.eu\n <unsupported>\n <unsupported>\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n"
Manuel Pégourié-Gonnard65c2ddc2014-04-01 14:12:11 +0200128
Hanno Becker2389d162019-02-14 12:52:47 +0000129X509 CRT information, RSA Certificate Policy any
Ron Eldor74d9acc2019-03-21 14:00:03 +0200130depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
131x509_cert_info:"data_files/test-ca-any_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-03-21 16\:40\:59\nexpires on \: 2029-03-21 16\:40\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
132
Hanno Becker2389d162019-02-14 12:52:47 +0000133X509 CRT information, ECDSA Certificate Policy any
Ron Eldor74d9acc2019-03-21 14:00:03 +0200134depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
135x509_cert_info:"data_files/test-ca-any_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-03-25 09\:02\:45\nexpires on \: 2029-03-25 09\:02\:45\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
136
Hanno Becker2389d162019-02-14 12:52:47 +0000137X509 CRT information, RSA Certificate Policy any with qualifier
Ron Eldor74d9acc2019-03-21 14:00:03 +0200138depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
139x509_cert_info:"data_files/test-ca-any_policy_with_qualifier.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:14\:31\nexpires on \: 2029-04-28 13\:14\:31\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
140
Hanno Becker2389d162019-02-14 12:52:47 +0000141X509 CRT information, ECDSA Certificate Policy any with qualifier
Ron Eldor74d9acc2019-03-21 14:00:03 +0200142depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
143x509_cert_info:"data_files/test-ca-any_policy_with_qualifier_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 10\:16\:05\nexpires on \: 2029-04-28 10\:16\:05\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
144
Hanno Becker2389d162019-02-14 12:52:47 +0000145X509 CRT information, RSA Certificate multiple Policies
Ron Eldor74d9acc2019-03-21 14:00:03 +0200146depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
147x509_cert_info:"data_files/test-ca-multi_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 12\:59\:19\nexpires on \: 2029-04-28 12\:59\:19\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n"
148
Hanno Becker2389d162019-02-14 12:52:47 +0000149X509 CRT information, ECDSA Certificate multiple Policies
Ron Eldor74d9acc2019-03-21 14:00:03 +0200150depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
151x509_cert_info:"data_files/test-ca-multi_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 12\:59\:51\nexpires on \: 2029-04-28 12\:59\:51\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n"
152
Hanno Becker2389d162019-02-14 12:52:47 +0000153X509 CRT information, RSA Certificate unsupported policy
Ron Eldor74d9acc2019-03-21 14:00:03 +0200154depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
155x509_cert_info:"data_files/test-ca-unsupported_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:00\:13\nexpires on \: 2029-04-28 13\:00\:13\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n"
156
Hanno Becker2389d162019-02-14 12:52:47 +0000157X509 CRT information, ECDSA Certificate unsupported policy
Ron Eldor74d9acc2019-03-21 14:00:03 +0200158depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
159x509_cert_info:"data_files/test-ca-unsupported_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 13\:00\:19\nexpires on \: 2029-04-28 13\:00\:19\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n"
160
Hanno Becker2389d162019-02-14 12:52:47 +0000161X509 CRT information, Key Usage + Extended Key Usage
palaviva07ecda2016-08-07 11:15:29 +0300162depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard7b30cfc2014-04-01 18:00:07 +0200163x509_cert_info:"data_files/server1.ext_ku.crt":"cert. version \: 3\nserial number \: 21\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2014-04-01 14\:44\:43\nexpires on \: 2024-03-29 14\:44\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\next key usage \: TLS Web Server Authentication\n"
Manuel Pégourié-Gonnardf6f4ab42014-04-01 17:32:44 +0200164
Hanno Becker2389d162019-02-14 12:52:47 +0000165X509 CRT information RSA signed by EC
palavivf180df92016-08-07 11:56:02 +0300166depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +0200167x509_cert_info:"data_files/server4.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +0200168
Hanno Becker2389d162019-02-14 12:52:47 +0000169X509 CRT information EC signed by RSA
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200170depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +0200171x509_cert_info:"data_files/server3.crt":"cert. version \: 3\nserial number \: 0D\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-08-09 09\:17\:03\nexpires on \: 2023-08-07 09\:17\:03\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +0200172
Hanno Becker2389d162019-02-14 12:52:47 +0000173X509 CRT information Bitstring in subject name
palaviva07ecda2016-08-07 11:15:29 +0300174depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Janos Follath22f605f2019-05-10 10:37:17 +0100175x509_cert_info:"data_files/bitstring-in-dn.pem":"cert. version \: 3\nserial number \: 02\nissuer name \: CN=Test CA 01, ST=Ecnivorp, C=XX, emailAddress=tca@example.com, O=Test CA Authority\nsubject name \: C=XX, O=tca, ST=Ecnivorp, OU=TCA, CN=Client, emailAddress=client@example.com, serialNumber=7101012255, uniqueIdentifier=?7101012255\nissued on \: 2015-03-11 12\:06\:51\nexpires on \: 2025-03-08 12\:06\:51\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n <unsupported>\next key usage \: TLS Web Client Authentication\n"
Manuel Pégourié-Gonnard39ead3e2015-03-27 13:09:21 +0100176
Paul Bakkerc27c4e22013-09-23 15:01:36 +0200177X509 certificate v1 with extension
palaviva07ecda2016-08-07 11:15:29 +0300178depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_SHA1_C
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200179x509_cert_info:"data_files/cert_v1_with_ext.crt":"cert. version \: 1\nserial number \: BD\:ED\:44\:C7\:D2\:3E\:C2\:A4\nissuer name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nsubject name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nissued on \: 2013-07-04 16\:17\:02\nexpires on \: 2014-07-04 16\:17\:02\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nsubject alt name \:\n dNSName \: identity-check.org\n dNSName \: www.identity-check.org\n"
180
181X509 SAN parsing otherName
182depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
183x509_parse_san:"data_files/server5-othername.crt":"type \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\n"
184
185X509 SAN parsing dNSName
Ron Eldor9eeb8612019-02-12 15:03:42 +0200186depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200187x509_parse_san:"data_files/cert_example_multi.crt":"type \: 2\ndNSName \: example.com\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n"
188
189X509 SAN parsing Multiple different types
190depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
191x509_parse_san:"data_files/multiple_san.crt":"type \: 2\ndNSName \: example.com\ntype \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n"
192
193X509 SAN parsing, no subject alt name
194depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
195x509_parse_san:"data_files/server4.crt":""
196
197X509 SAN parsing, unsupported otherName name
198depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
199x509_parse_san:"data_files/server5-unsupported_othername.crt":""
Paul Bakkerc27c4e22013-09-23 15:01:36 +0200200
Paul Bakker37940d9f2009-07-10 22:38:58 +0000201X509 CRL information #1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200202depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200203mbedtls_x509_crl_info:"data_files/crl_expired.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-20 10\:24\:19\nnext update \: 2011-02-20 11\:24\:19\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000204
205X509 CRL Information MD2 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200206depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD2_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200207mbedtls_x509_crl_info:"data_files/crl_md2.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2009-07-19 19\:56\:37\nnext update \: 2009-09-17 19\:56\:37\nRevoked certificates\:\nserial number\: 01 revocation date\: 2009-02-09 21\:12\:36\nserial number\: 03 revocation date\: 2009-02-09 21\:12\:36\nsigned using \: RSA with MD2\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000208
209X509 CRL Information MD4 Digest
palaviva07ecda2016-08-07 11:15:29 +0300210depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200211mbedtls_x509_crl_info:"data_files/crl_md4.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD4\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000212
213X509 CRL Information MD5 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200214depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200215mbedtls_x509_crl_info:"data_files/crl_md5.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD5\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000216
217X509 CRL Information SHA1 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200218depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219mbedtls_x509_crl_info:"data_files/crl_sha1.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000220
221X509 CRL Information SHA224 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200222depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200223mbedtls_x509_crl_info:"data_files/crl_sha224.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000224
225X509 CRL Information SHA256 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200226depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200227mbedtls_x509_crl_info:"data_files/crl_sha256.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000228
229X509 CRL Information SHA384 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200230depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200231mbedtls_x509_crl_info:"data_files/crl_sha384.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000232
233X509 CRL Information SHA512 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200234depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200235mbedtls_x509_crl_info:"data_files/crl_sha512.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000236
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100237X509 CRL information RSA-PSS, SHA1 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200238depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
239mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:46\:35\nnext update \: 2024-01-18 13\:46\:35\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100240
241X509 CRL information RSA-PSS, SHA224 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200242depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
243mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:06\nnext update \: 2024-01-18 13\:56\:06\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100244
245X509 CRL information RSA-PSS, SHA256 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200246depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
247mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:16\nnext update \: 2024-01-18 13\:56\:16\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100248
249X509 CRL information RSA-PSS, SHA384 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200250depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
251mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:28\nnext update \: 2024-01-18 13\:56\:28\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100252
253X509 CRL information RSA-PSS, SHA512 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200254depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
255mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:38\nnext update \: 2024-01-18 13\:56\:38\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100256
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200257X509 CRL Information EC, SHA1 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200258depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200259mbedtls_x509_crl_info:"data_files/crl-ec-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA1\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200260
261X509 CRL Information EC, SHA224 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200262depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200263mbedtls_x509_crl_info:"data_files/crl-ec-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA224\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200264
265X509 CRL Information EC, SHA256 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200266depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200267mbedtls_x509_crl_info:"data_files/crl-ec-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA256\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200268
269X509 CRL Information EC, SHA384 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200270depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200271mbedtls_x509_crl_info:"data_files/crl-ec-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA384\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200272
273X509 CRL Information EC, SHA512 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200274depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275mbedtls_x509_crl_info:"data_files/crl-ec-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA512\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200276
Andres AGa39db392016-12-08 17:10:38 +0000277X509 CRL Malformed Input (trailing spaces at end of file)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200278depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C
Andres AGa39db392016-12-08 17:10:38 +0000279mbedtls_x509_crl_parse:"data_files/crl-malformed-trailing-spaces.pem":MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT
280
Manuel Pégourié-Gonnardfd3e4fb2018-03-13 11:53:30 +0100281X509 CRL Unsupported critical extension (issuingDistributionPoint)
282depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
283mbedtls_x509_crl_parse:"data_files/crl-idp.pem":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
284
Manuel Pégourié-Gonnarda63305d2018-03-14 12:23:56 +0100285X509 CRL Unsupported non-critical extension (issuingDistributionPoint)
286depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
287mbedtls_x509_crl_parse:"data_files/crl-idpnc.pem":0
288
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100289X509 CSR Information RSA with MD4
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200290depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291mbedtls_x509_csr_info:"data_files/server1.req.md4":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100292
293X509 CSR Information RSA with MD5
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200294depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295mbedtls_x509_csr_info:"data_files/server1.req.md5":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100296
297X509 CSR Information RSA with SHA1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200298depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200299mbedtls_x509_csr_info:"data_files/server1.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100300
301X509 CSR Information RSA with SHA224
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200302depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200303mbedtls_x509_csr_info:"data_files/server1.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100304
Hanno Becker01346c62019-02-12 13:32:06 +0000305X509 CSR Information RSA with SHA-256
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200306depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200307mbedtls_x509_csr_info:"data_files/server1.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100308
309X509 CSR Information RSA with SHA384
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200310depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200311mbedtls_x509_csr_info:"data_files/server1.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100312
313X509 CSR Information RSA with SHA512
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200314depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200315mbedtls_x509_csr_info:"data_files/server1.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100316
317X509 CSR Information EC with SHA1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200318depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200319mbedtls_x509_csr_info:"data_files/server5.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100320
321X509 CSR Information EC with SHA224
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200322depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200323mbedtls_x509_csr_info:"data_files/server5.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100324
325X509 CSR Information EC with SHA256
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200326depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200327mbedtls_x509_csr_info:"data_files/server5.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100328
329X509 CSR Information EC with SHA384
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200330depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200331mbedtls_x509_csr_info:"data_files/server5.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100332
333X509 CSR Information EC with SHA512
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200334depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200335mbedtls_x509_csr_info:"data_files/server5.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100336
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100337X509 CSR Information RSA-PSS with SHA1
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200338depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
339mbedtls_x509_csr_info:"data_files/server9.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0x6A)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100340
341X509 CSR Information RSA-PSS with SHA224
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200342depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
343mbedtls_x509_csr_info:"data_files/server9.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0x62)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100344
345X509 CSR Information RSA-PSS with SHA256
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200346depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
347mbedtls_x509_csr_info:"data_files/server9.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0x5E)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100348
349X509 CSR Information RSA-PSS with SHA384
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200350depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
351mbedtls_x509_csr_info:"data_files/server9.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0x4E)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100352
353X509 CSR Information RSA-PSS with SHA512
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200354depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
355mbedtls_x509_csr_info:"data_files/server9.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0x3E)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100356
Hanno Becker01346c62019-02-12 13:32:06 +0000357X509 CSR Information RSA with SHA-256 - Microsoft header
Simon Butcher03de2102018-10-06 16:24:13 +0100358depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
359mbedtls_x509_csr_info:"data_files/server1-ms.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n"
360
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100361X509 Verify Information: empty
362x509_verify_info:0:"":""
363
364X509 Verify Information: one issue
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100365x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:"":"Certificate was missing\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100366
367X509 Verify Information: two issues
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100368x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:"":"The certificate validity has expired\nThe CRL is expired\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100369
370X509 Verify Information: two issues, one unknown
Manuel Pégourié-Gonnard95051642015-06-15 10:39:46 +0200371x509_verify_info:MBEDTLS_X509_BADCERT_OTHER | 0x80000000:"":"Other reason (can be used by verify callback)\nUnknown reason (this should not happen)\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100372
373X509 Verify Information: empty, with prefix
374x509_verify_info:0:" ! ":""
375
376X509 Verify Information: one issue, with prefix
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100377x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:" ! ":" ! Certificate was missing\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100378
379X509 Verify Information: two issues, with prefix
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100380x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:" ! ":" ! The certificate validity has expired\n ! The CRL is expired\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100381
Paul Bakker37940d9f2009-07-10 22:38:58 +0000382X509 Get Distinguished Name #1
palaviva07ecda2016-08-07 11:15:29 +0300383depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200384mbedtls_x509_dn_gets:"data_files/server1.crt":"subject":"C=NL, O=PolarSSL, CN=PolarSSL Server 1"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000385
386X509 Get Distinguished Name #2
palaviva07ecda2016-08-07 11:15:29 +0300387depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200388mbedtls_x509_dn_gets:"data_files/server1.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000389
390X509 Get Distinguished Name #3
palaviva07ecda2016-08-07 11:15:29 +0300391depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200392mbedtls_x509_dn_gets:"data_files/server2.crt":"subject":"C=NL, O=PolarSSL, CN=localhost"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000393
394X509 Get Distinguished Name #4
palaviva07ecda2016-08-07 11:15:29 +0300395depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200396mbedtls_x509_dn_gets:"data_files/server2.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000397
398X509 Time Expired #1
palaviva07ecda2016-08-07 11:15:29 +0300399depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100400mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_from":1
Paul Bakker37940d9f2009-07-10 22:38:58 +0000401
402X509 Time Expired #2
palaviva07ecda2016-08-07 11:15:29 +0300403depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100404mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_to":0
Paul Bakker37940d9f2009-07-10 22:38:58 +0000405
406X509 Time Expired #3
palaviva07ecda2016-08-07 11:15:29 +0300407depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100408mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_from":1
Paul Bakker37940d9f2009-07-10 22:38:58 +0000409
410X509 Time Expired #4
palaviva07ecda2016-08-07 11:15:29 +0300411depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100412mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_to":0
Paul Bakker37940d9f2009-07-10 22:38:58 +0000413
414X509 Time Expired #5
palaviva07ecda2016-08-07 11:15:29 +0300415depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100416mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_from":1
Paul Bakker37940d9f2009-07-10 22:38:58 +0000417
Manuel Pégourié-Gonnarde7f64a82013-08-09 10:59:25 +0200418X509 Time Expired #6
palaviva07ecda2016-08-07 11:15:29 +0300419depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100420mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_to":0
Paul Bakker37940d9f2009-07-10 22:38:58 +0000421
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100422X509 Time Future #1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200423depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100424mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_from":0
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100425
426X509 Time Future #2
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200427depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100428mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_to":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100429
430X509 Time Future #3
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200431depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100432mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_from":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100433
434X509 Time Future #4
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200435depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100436mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_to":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100437
438X509 Time Future #5
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200439depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100440mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_from":0
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100441
442X509 Time Future #6
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200443depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100444mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_to":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100445
Hanno Becker2389d162019-02-14 12:52:47 +0000446X509 CRT verification #1 (Revoked Cert, Expired CRL, no CN)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000447depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200448x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000449
Hanno Becker2389d162019-02-14 12:52:47 +0000450X509 CRT verification #1a (Revoked Cert, Future CRL, no CN)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000451depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200452x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100453
Hanno Becker2389d162019-02-14 12:52:47 +0000454X509 CRT verification #2 (Revoked Cert, Expired CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000455depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200456x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000457
Hanno Becker2389d162019-02-14 12:52:47 +0000458X509 CRT verification #2a (Revoked Cert, Future CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000459depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200460x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"localhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100461
Hanno Becker2389d162019-02-14 12:52:47 +0000462X509 CRT verification #3 (Revoked Cert, Future CRL, CN Mismatch)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000463depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200464x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000465
Hanno Becker2389d162019-02-14 12:52:47 +0000466X509 CRT verification #3a (Revoked Cert, Expired CRL, CN Mismatch)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000467depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200468x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100469
Hanno Becker2389d162019-02-14 12:52:47 +0000470X509 CRT verification #4 (Valid Cert, Expired CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000471depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200472x509_verify:"data_files/server2.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000473
Hanno Becker2389d162019-02-14 12:52:47 +0000474X509 CRT verification #4a (Revoked Cert, Future CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000475depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200476x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100477
Hanno Becker2389d162019-02-14 12:52:47 +0000478X509 CRT verification #5 (Revoked Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000479depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200480x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000481
Hanno Becker2389d162019-02-14 12:52:47 +0000482X509 CRT verification #5' (Revoked Cert, differing DN string formats #1)
Hanno Becker52acdb52018-11-02 10:09:48 +0000483depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
484x509_verify:"data_files/server1.crt":"data_files/test-ca_utf8.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
485
Hanno Becker2389d162019-02-14 12:52:47 +0000486X509 CRT verification #5'' (Revoked Cert, differing DN string formats #2)
Hanno Becker52acdb52018-11-02 10:09:48 +0000487depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
488x509_verify:"data_files/server1.crt":"data_files/test-ca_printable.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
489
Hanno Becker2389d162019-02-14 12:52:47 +0000490X509 CRT verification #5''' (Revoked Cert, differing upper and lower case)
Hanno Becker52acdb52018-11-02 10:09:48 +0000491depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
492x509_verify:"data_files/server1.crt":"data_files/test-ca_uppercase.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
493
Hanno Becker2389d162019-02-14 12:52:47 +0000494X509 CRT verification #6 (Revoked Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000495depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200496x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000497
Hanno Becker2389d162019-02-14 12:52:47 +0000498X509 CRT verification #7 (Revoked Cert, CN Mismatch)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000499depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200500x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000501
Hanno Becker2389d162019-02-14 12:52:47 +0000502X509 CRT verification #8 (Valid Cert)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200503depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200504x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100505
Hanno Becker2389d162019-02-14 12:52:47 +0000506X509 CRT verification #8a (Expired Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000507depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200508x509_verify:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100509
Hanno Becker2389d162019-02-14 12:52:47 +0000510X509 CRT verification #8b (Future Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000511depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200512x509_verify:"data_files/server5-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000513
Hanno Becker2389d162019-02-14 12:52:47 +0000514X509 CRT verification #8c (Expired Cert, longer chain)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000515depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnard29d60fb2017-06-05 10:20:32 +0200516x509_verify:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL"
517
Hanno Becker2389d162019-02-14 12:52:47 +0000518X509 CRT verification #8d (Future Cert, longer chain)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000519depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnard29d60fb2017-06-05 10:20:32 +0200520x509_verify:"data_files/server7-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL"
521
Hanno Becker2389d162019-02-14 12:52:47 +0000522X509 CRT verification #9 (Not trusted Cert)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200523depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200524x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000525
Hanno Becker2389d162019-02-14 12:52:47 +0000526X509 CRT verification #10 (Not trusted Cert, Expired CRL)
palaviva07ecda2016-08-07 11:15:29 +0300527depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200528x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000529
Hanno Becker2389d162019-02-14 12:52:47 +0000530X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 forbidden)
Hanno Becker7b8abee2019-06-03 14:25:18 +0100531depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
532x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL"
533
Hanno Becker2389d162019-02-14 12:52:47 +0000534X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 forbidden)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200535depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200536x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000537
Hanno Becker2389d162019-02-14 12:52:47 +0000538X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 forbidden)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200539depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200540x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000541
Hanno Becker2389d162019-02-14 12:52:47 +0000542X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 allowed)
Hanno Becker20a4ade2019-06-03 14:27:03 +0100543depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
544x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL"
545
Hanno Becker2389d162019-02-14 12:52:47 +0000546X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 allowed)
Hanno Becker20a4ade2019-06-03 14:27:03 +0100547depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
548x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL"
549
Hanno Becker2389d162019-02-14 12:52:47 +0000550X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 allowed)
Hanno Becker20a4ade2019-06-03 14:27:03 +0100551depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
552x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL"
553
Hanno Becker2389d162019-02-14 12:52:47 +0000554X509 CRT verification #14 (Valid Cert SHA1 Digest explicitly allowed in profile)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200555depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200556x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000557
Hanno Becker2389d162019-02-14 12:52:47 +0000558X509 CRT verification #14 (Valid Cert SHA1 Digest allowed in compile-time default profile)
Gilles Peskine5d2511c2017-05-12 13:16:40 +0200559depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200560x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"":"NULL"
Gilles Peskine4fa6bed2017-05-11 16:41:25 +0200561
Hanno Becker2389d162019-02-14 12:52:47 +0000562X509 CRT verification #14 (Valid Cert SHA1 Digest forbidden in default profile)
Gilles Peskinef11d33b2017-05-22 16:47:22 +0200563depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:!MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200564x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_BAD_MD | MBEDTLS_X509_BADCERT_BAD_MD:"":"NULL"
Gilles Peskine2dc81a02017-05-05 19:00:39 +0200565
Hanno Becker2389d162019-02-14 12:52:47 +0000566X509 CRT verification #15 (Valid Cert SHA224 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200567depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200568x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000569
Hanno Becker2389d162019-02-14 12:52:47 +0000570X509 CRT verification #16 (Valid Cert SHA256 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200571depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200572x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000573
Hanno Becker2389d162019-02-14 12:52:47 +0000574X509 CRT verification #17 (Valid Cert SHA384 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200575depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200576x509_verify:"data_files/cert_sha384.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000577
Hanno Becker2389d162019-02-14 12:52:47 +0000578X509 CRT verification #18 (Valid Cert SHA512 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200579depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200580x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakkerb63b0af2011-01-13 17:54:59 +0000581
Hanno Becker2389d162019-02-14 12:52:47 +0000582X509 CRT verification #19 (Valid Cert, denying callback)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200583depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200584x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_OTHER:"compat":"verify_none"
Paul Bakkerb63b0af2011-01-13 17:54:59 +0000585
Hanno Becker2389d162019-02-14 12:52:47 +0000586X509 CRT verification #19 (Not trusted Cert, allowing callback)
palaviva07ecda2016-08-07 11:15:29 +0300587depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200588x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":0:0:"compat":"verify_all"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000589
Hanno Becker2389d162019-02-14 12:52:47 +0000590X509 CRT verification #21 (domain matching wildcard certificate, case insensitive)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200591depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200592x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.ExAmPlE.com":0:0:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000593
Hanno Becker2389d162019-02-14 12:52:47 +0000594X509 CRT verification #22 (domain not matching wildcard certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200595depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200596x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000597
Hanno Becker2389d162019-02-14 12:52:47 +0000598X509 CRT verification #23 (domain not matching wildcard certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200599depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200600x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000601
Hanno Becker2389d162019-02-14 12:52:47 +0000602X509 CRT verification #24 (domain matching CN of multi certificate)
Ron Eldor9eeb8612019-02-12 15:03:42 +0200603depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200604x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000605
Hanno Becker2389d162019-02-14 12:52:47 +0000606X509 CRT verification #25 (domain matching multi certificate)
Ron Eldor9eeb8612019-02-12 15:03:42 +0200607depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200608x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.net":0:0:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000609
Hanno Becker2389d162019-02-14 12:52:47 +0000610X509 CRT verification #26 (domain not matching multi certificate)
Ron Eldor9eeb8612019-02-12 15:03:42 +0200611depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200612x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000613
Hanno Becker2389d162019-02-14 12:52:47 +0000614X509 CRT verification #27 (domain not matching multi certificate)
Ron Eldor9eeb8612019-02-12 15:03:42 +0200615depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200616x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"xample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000617
Hanno Becker2389d162019-02-14 12:52:47 +0000618X509 CRT verification #27 (domain not matching multi certificate)
Ron Eldor9eeb8612019-02-12 15:03:42 +0200619depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200620x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"bexample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000621
Hanno Becker2389d162019-02-14 12:52:47 +0000622X509 CRT verification #28 (domain not matching wildcard in multi certificate)
Ron Eldor9eeb8612019-02-12 15:03:42 +0200623depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200624x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.org":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakker57b12982012-02-11 17:38:38 +0000625
Hanno Becker2389d162019-02-14 12:52:47 +0000626X509 CRT verification #29 (domain matching wildcard in multi certificate)
Ron Eldor9eeb8612019-02-12 15:03:42 +0200627depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200628x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.org":0:0:"compat":"NULL"
Paul Bakker57b12982012-02-11 17:38:38 +0000629
Hanno Becker2389d162019-02-14 12:52:47 +0000630X509 CRT verification #30 (domain matching multi certificate without CN)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200631depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200632x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.shotokan-braunschweig.de":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker91956622012-08-23 10:46:54 +0000633
Hanno Becker2389d162019-02-14 12:52:47 +0000634X509 CRT verification #31 (domain not matching multi certificate without CN)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200635depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200636x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH + MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker91956622012-08-23 10:46:54 +0000637
Hanno Becker2389d162019-02-14 12:52:47 +0000638X509 CRT verification #32 (Valid, EC cert, RSA CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200639depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200640x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200641
Hanno Becker2389d162019-02-14 12:52:47 +0000642X509 CRT verification #33 (Valid, RSA cert, EC CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200643depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200644x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200645
Hanno Becker2389d162019-02-14 12:52:47 +0000646X509 CRT verification #34 (Valid, EC cert, EC CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200647depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200648x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200649
Hanno Becker2389d162019-02-14 12:52:47 +0000650X509 CRT verification #35 (Revoked, EC CA)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000651depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200652x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200653
Hanno Becker2389d162019-02-14 12:52:47 +0000654X509 CRT verification #36 (Valid, EC CA, SHA1 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200655depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200656x509_verify:"data_files/server5-sha1.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200657
Hanno Becker2389d162019-02-14 12:52:47 +0000658X509 CRT verification #37 (Valid, EC CA, SHA224 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200659depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200660x509_verify:"data_files/server5-sha224.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200661
Hanno Becker2389d162019-02-14 12:52:47 +0000662X509 CRT verification #38 (Valid, EC CA, SHA384 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200663depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200664x509_verify:"data_files/server5-sha384.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200665
Hanno Becker2389d162019-02-14 12:52:47 +0000666X509 CRT verification #39 (Valid, EC CA, SHA512 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200667depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200668x509_verify:"data_files/server5-sha512.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200669
Hanno Becker2389d162019-02-14 12:52:47 +0000670X509 CRT verification #40 (Valid, depth 0, RSA, CA)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200671depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200672x509_verify:"data_files/test-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200673
Hanno Becker2389d162019-02-14 12:52:47 +0000674X509 CRT verification #41 (Valid, depth 0, EC, CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200675depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200676x509_verify:"data_files/test-ca2.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200677
Hanno Becker2389d162019-02-14 12:52:47 +0000678X509 CRT verification #42 (Depth 0, not CA, RSA)
palaviva07ecda2016-08-07 11:15:29 +0300679depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200680x509_verify:"data_files/server2.crt":"data_files/server2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200681
Hanno Becker2389d162019-02-14 12:52:47 +0000682X509 CRT verification #43 (Depth 0, not CA, EC)
palaviva07ecda2016-08-07 11:15:29 +0300683depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200684x509_verify:"data_files/server5.crt":"data_files/server5.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200685
Hanno Becker2389d162019-02-14 12:52:47 +0000686X509 CRT verification #44 (Corrupted signature, EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200687depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200688x509_verify:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200689
Hanno Becker2389d162019-02-14 12:52:47 +0000690X509 CRT verification #45 (Corrupted signature, RSA)
palaviva07ecda2016-08-07 11:15:29 +0300691depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200692x509_verify:"data_files/server2-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200693
Hanno Becker2389d162019-02-14 12:52:47 +0000694X509 CRT verification #45b (Corrupted signature, intermediate CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200695depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard4dfc04a2017-06-05 11:12:13 +0200696x509_verify:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
697
Hanno Becker2389d162019-02-14 12:52:47 +0000698X509 CRT verification #46 (Valid, depth 2, EC-RSA-EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200699depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200700x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200701
Hanno Becker2389d162019-02-14 12:52:47 +0000702X509 CRT verification #47 (Untrusted, depth 2, EC-RSA-EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200703depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200704x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200705
Hanno Becker2389d162019-02-14 12:52:47 +0000706X509 CRT verification #48 (Missing intermediate CA, EC-RSA-EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200707depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200708x509_verify:"data_files/server7.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200709
Hanno Becker2389d162019-02-14 12:52:47 +0000710X509 CRT verification #49 (Valid, depth 2, RSA-EC-RSA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200711depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200712x509_verify:"data_files/server8_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200713
Hanno Becker2389d162019-02-14 12:52:47 +0000714X509 CRT verification #50 (Valid, multiple CAs)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200715depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200716x509_verify:"data_files/server2.crt":"data_files/test-ca_cat12.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200717
Hanno Becker2389d162019-02-14 12:52:47 +0000718X509 CRT verification #51 (Valid, multiple CAs, reverse order)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200719depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200720x509_verify:"data_files/server2.crt":"data_files/test-ca_cat21.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200721
Hanno Becker2389d162019-02-14 12:52:47 +0000722X509 CRT verification #52 (CA keyUsage valid)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200723depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200724x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt_crl.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200725
Hanno Becker2389d162019-02-14 12:52:47 +0000726X509 CRT verification #53 (CA keyUsage missing cRLSign)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200727depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200728x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200729
Hanno Becker2389d162019-02-14 12:52:47 +0000730X509 CRT verification #54 (CA keyUsage missing cRLSign, no CRL)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200731depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200732x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200733
Hanno Becker2389d162019-02-14 12:52:47 +0000734X509 CRT verification #55 (CA keyUsage missing keyCertSign)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200735depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200736x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crl.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200737
Hanno Becker2389d162019-02-14 12:52:47 +0000738X509 CRT verification #56 (CA keyUsage plain wrong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200739depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200740x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-ds.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200741
Hanno Becker2389d162019-02-14 12:52:47 +0000742X509 CRT verification #57 (Valid, RSASSA-PSS, SHA-1)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200743depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200744x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200745
Hanno Becker2389d162019-02-14 12:52:47 +0000746X509 CRT verification #58 (Valid, RSASSA-PSS, SHA-224)
palaviva07ecda2016-08-07 11:15:29 +0300747depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200748x509_verify:"data_files/server9-sha224.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha224.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200749
Hanno Becker2389d162019-02-14 12:52:47 +0000750X509 CRT verification #59 (Valid, RSASSA-PSS, SHA-256)
palaviva07ecda2016-08-07 11:15:29 +0300751depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200752x509_verify:"data_files/server9-sha256.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200753
Hanno Becker2389d162019-02-14 12:52:47 +0000754X509 CRT verification #60 (Valid, RSASSA-PSS, SHA-384)
palaviva07ecda2016-08-07 11:15:29 +0300755depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200756x509_verify:"data_files/server9-sha384.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha384.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200757
Hanno Becker2389d162019-02-14 12:52:47 +0000758X509 CRT verification #61 (Valid, RSASSA-PSS, SHA-512)
palaviva07ecda2016-08-07 11:15:29 +0300759depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200760x509_verify:"data_files/server9-sha512.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha512.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200761
Hanno Becker2389d162019-02-14 12:52:47 +0000762X509 CRT verification #62 (Revoked, RSASSA-PSS, SHA-1)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000763depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200764x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard53882022014-06-05 17:53:52 +0200765
Hanno Becker2389d162019-02-14 12:52:47 +0000766X509 CRT verification #63 (Revoked, RSASSA-PSS, SHA-1, CRL badsign)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200767depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200768x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1-badsign.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard53882022014-06-05 17:53:52 +0200769
Hanno Becker2389d162019-02-14 12:52:47 +0000770X509 CRT verification #64 (Valid, RSASSA-PSS, SHA-1, not top)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200771depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200772x509_verify:"data_files/server9-with-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200773
Hanno Becker2389d162019-02-14 12:52:47 +0000774X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200775depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200776x509_verify:"data_files/server9-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200777
Hanno Becker2389d162019-02-14 12:52:47 +0000778X509 CRT verification #66 (RSASSA-PSS, SHA1, no RSA CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200779depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200780x509_verify:"data_files/server9.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200781
Hanno Becker2389d162019-02-14 12:52:47 +0000782X509 CRT verification #67 (Valid, RSASSA-PSS, all defaults)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200783depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200784x509_verify:"data_files/server9-defaults.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardeacccb72014-06-05 18:00:08 +0200785
Hanno Becker2389d162019-02-14 12:52:47 +0000786X509 CRT verification #68 (RSASSA-PSS, wrong salt_len)
palaviva07ecda2016-08-07 11:15:29 +0300787depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200788x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard5873b002014-06-06 18:04:09 +0200789
Hanno Becker2389d162019-02-14 12:52:47 +0000790X509 CRT verification #69 (RSASSA-PSS, wrong mgf_hash)
palaviva07ecda2016-08-07 11:15:29 +0300791depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200792x509_verify:"data_files/server9-bad-mgfhash.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard5873b002014-06-06 18:04:09 +0200793
Hanno Becker2389d162019-02-14 12:52:47 +0000794X509 CRT verification #70 (v1 trusted CA)
palaviva07ecda2016-08-07 11:15:29 +0300795depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200796x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardc4eff162014-06-19 12:18:08 +0200797
Hanno Becker2389d162019-02-14 12:52:47 +0000798X509 CRT verification #71 (v1 trusted CA, other)
palaviva07ecda2016-08-07 11:15:29 +0300799depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200800x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardc4eff162014-06-19 12:18:08 +0200801
Hanno Becker2389d162019-02-14 12:52:47 +0000802X509 CRT verification #72 (v1 chain)
palaviva07ecda2016-08-07 11:15:29 +0300803depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200804x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardc4eff162014-06-19 12:18:08 +0200805
Hanno Becker2389d162019-02-14 12:52:47 +0000806X509 CRT verification #73 (selfsigned trusted without CA bit)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200807depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200808x509_verify:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardd249b7a2014-06-24 11:49:16 +0200809
Hanno Becker2389d162019-02-14 12:52:47 +0000810X509 CRT verification #74 (signed by selfsigned trusted without CA bit)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200811depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200812x509_verify:"data_files/server6-ss-child.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardd249b7a2014-06-24 11:49:16 +0200813
Hanno Becker2389d162019-02-14 12:52:47 +0000814X509 CRT verification #75 (encoding mismatch)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200815depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200816x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard9c911da2014-10-17 12:23:49 +0200817
Hanno Becker2389d162019-02-14 12:52:47 +0000818X509 CRT verification #76 (multiple CRLs, not revoked)
palaviva07ecda2016-08-07 11:15:29 +0300819depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200820x509_verify:"data_files/server5.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100821
Hanno Becker2389d162019-02-14 12:52:47 +0000822X509 CRT verification #77 (multiple CRLs, revoked)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000823depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200824x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100825
Hanno Becker2389d162019-02-14 12:52:47 +0000826X509 CRT verification #78 (multiple CRLs, revoked by second)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000827depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200828x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_rsa-ec.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100829
Hanno Becker2389d162019-02-14 12:52:47 +0000830X509 CRT verification #79 (multiple CRLs, revoked by future)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000831depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200832x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED|MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100833
Hanno Becker2389d162019-02-14 12:52:47 +0000834X509 CRT verification #80 (multiple CRLs, first future, revoked by second)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000835depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200836x509_verify:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100837
Hanno Becker2389d162019-02-14 12:52:47 +0000838X509 CRT verification #81 (multiple CRLs, none relevant)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200839depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200840x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl_cat_rsa-ec.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100841
Hanno Becker2389d162019-02-14 12:52:47 +0000842X509 CRT verification #82 (Not yet valid CA and valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200843depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200844x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follath12c868c2016-02-18 17:28:04 +0000845
Hanno Becker2389d162019-02-14 12:52:47 +0000846X509 CRT verification #83 (valid CA and Not yet valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200847depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200848x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-future.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follath12c868c2016-02-18 17:28:04 +0000849
Hanno Becker2389d162019-02-14 12:52:47 +0000850X509 CRT verification #84 (valid CA and Not yet valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200851depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200852x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-past.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follathdf4bca22016-02-19 15:57:17 +0000853
Hanno Becker2389d162019-02-14 12:52:47 +0000854X509 CRT verification #85 (Not yet valid CA and valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200855depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200856x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follathdf4bca22016-02-19 15:57:17 +0000857
Hanno Becker2389d162019-02-14 12:52:47 +0000858X509 CRT verification #86 (Not yet valid CA and invalid CA)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000859depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200860x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL"
Andres AG9f430c12016-12-13 09:59:07 +0000861
Hanno Becker2389d162019-02-14 12:52:47 +0000862X509 CRT verification #87 (Expired CA and invalid CA)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000863depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200864x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL"
Andres AG9f430c12016-12-13 09:59:07 +0000865
Hanno Becker2389d162019-02-14 12:52:47 +0000866X509 CRT verification #88 (Spurious cert in the chain)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200867depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnardb341dd52017-06-06 10:25:43 +0200868x509_verify:"data_files/server7_spurious_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
869
Hanno Becker2389d162019-02-14 12:52:47 +0000870X509 CRT verification #89 (Spurious cert later in the chain)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200871depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnardb341dd52017-06-06 10:25:43 +0200872x509_verify:"data_files/server10_int3_spurious_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
873
Hanno Becker2389d162019-02-14 12:52:47 +0000874X509 CRT verification #90 (EE with same name as trusted root)
Manuel Pégourié-Gonnardc10afdb2017-06-29 09:48:08 +0200875depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200876x509_verify:"data_files/server5-ss-forgeca.crt":"data_files/test-int-ca3.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"":"NULL"
Manuel Pégourié-Gonnardc10afdb2017-06-29 09:48:08 +0200877
Hanno Becker2389d162019-02-14 12:52:47 +0000878X509 CRT verification #91 (same CA with good then bad key)
Manuel Pégourié-Gonnard2d825d42017-07-03 18:06:38 +0200879depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
880x509_verify:"data_files/server1.crt":"data_files/test-ca-good-alt.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
881
Hanno Becker2389d162019-02-14 12:52:47 +0000882X509 CRT verification #91 (same CA with bad then good key)
Manuel Pégourié-Gonnard2d825d42017-07-03 18:06:38 +0200883depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
884x509_verify:"data_files/server1.crt":"data_files/test-ca-alt-good.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
885
Hanno Becker2389d162019-02-14 12:52:47 +0000886X509 CRT verification #92 (bad name, allowing callback)
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200887depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200888x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"globalhost":0:0:"":"verify_all"
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200889
Hanno Becker2389d162019-02-14 12:52:47 +0000890X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA)
Ron Eldorc1539982018-02-06 18:47:17 +0200891depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECP_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
892x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK:"suite_b":"NULL"
893
Hanno Becker2389d162019-02-14 12:52:47 +0000894X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA)
Manuel Pégourié-Gonnard147b28e2018-03-12 15:26:59 +0100895depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Ron Eldorc1539982018-02-06 18:47:17 +0200896x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_PK:"suite_b":"NULL"
897
Hanno Becker2389d162019-02-14 12:52:47 +0000898X509 CRT verification #95 (Suite B Valid, EC cert, EC CA)
Manuel Pégourié-Gonnard147b28e2018-03-12 15:26:59 +0100899depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Ron Eldorc1539982018-02-06 18:47:17 +0200900x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"suite_b":"NULL"
901
Hanno Becker2389d162019-02-14 12:52:47 +0000902X509 CRT verification #96 (next profile Invalid Cert SHA224 Digest)
Manuel Pégourié-Gonnard88a8dcb2018-03-12 15:49:35 +0100903depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Ron Eldorc1539982018-02-06 18:47:17 +0200904x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCRL_BAD_MD:"next":"NULL"
905
Hanno Becker2389d162019-02-14 12:52:47 +0000906X509 CRT verification #97 (next profile Valid Cert SHA256 Digest)
Manuel Pégourié-Gonnard88a8dcb2018-03-12 15:49:35 +0100907depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_SHA1_C
Ron Eldorc1539982018-02-06 18:47:17 +0200908x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"next":"NULL"
909
Hanno Becker2389d162019-02-14 12:52:47 +0000910X509 CRT verification with ca callback: failure
Jarno Lamsa557426a2019-03-27 17:08:29 +0200911depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK
Hanno Beckercbb59032019-03-28 14:14:22 +0000912x509_verify_ca_cb_failure:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":MBEDTLS_ERR_X509_FATAL_ERROR
Jarno Lamsa557426a2019-03-27 17:08:29 +0200913
Hanno Becker2389d162019-02-14 12:52:47 +0000914X509 CRT verification callback: bad name
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200915depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200916x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2.crt":"globalhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000004\n"
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200917
Hanno Becker2389d162019-02-14 12:52:47 +0000918X509 CRT verification callback: trusted EE cert
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200919depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200920x509_verify_callback:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"NULL":0:"depth 0 - serial 53\:A2\:CB\:4B\:12\:4E\:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200921
Hanno Becker2389d162019-02-14 12:52:47 +0000922X509 CRT verification callback: trusted EE cert, expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000923depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200924x509_verify_callback:"data_files/server5-ss-expired.crt":"data_files/server5-ss-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial D8\:64\:61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200925
Hanno Becker2389d162019-02-14 12:52:47 +0000926X509 CRT verification callback: simple
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200927depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Hanno Becker381c77c2018-11-01 15:07:42 +0000928x509_verify_callback:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200929
Hanno Becker2389d162019-02-14 12:52:47 +0000930X509 CRT verification callback: simple, EE expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000931depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200932x509_verify_callback:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200933
Hanno Becker2389d162019-02-14 12:52:47 +0000934X509 CRT verification callback: simple, root expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000935depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200936x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200937
Hanno Becker2389d162019-02-14 12:52:47 +0000938X509 CRT verification callback: two trusted roots
palaviva07ecda2016-08-07 11:15:29 +0300939depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000940x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200941
Hanno Becker2389d162019-02-14 12:52:47 +0000942X509 CRT verification callback: two trusted roots, reversed order
palaviva07ecda2016-08-07 11:15:29 +0300943depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000944x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200945
Hanno Becker2389d162019-02-14 12:52:47 +0000946X509 CRT verification callback: root included
palaviva07ecda2016-08-07 11:15:29 +0300947depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000948x509_verify_callback:"data_files/server1_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200949
Hanno Becker2389d162019-02-14 12:52:47 +0000950X509 CRT verification callback: intermediate ca
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200951depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200952x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200953
Hanno Becker2389d162019-02-14 12:52:47 +0000954X509 CRT verification callback: intermediate ca, root included
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200955depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200956x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200957
Hanno Becker2389d162019-02-14 12:52:47 +0000958X509 CRT verification callback: intermediate ca trusted
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200959depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200960x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-int-ca.crt":"NULL":0:"depth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardfdbdd722015-09-01 16:35:00 +0200961
Hanno Becker2389d162019-02-14 12:52:47 +0000962X509 CRT verification callback: intermediate ca, EE expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000963depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200964x509_verify_callback:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200965
Hanno Becker2389d162019-02-14 12:52:47 +0000966X509 CRT verification callback: intermediate ca, int expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000967depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200968x509_verify_callback:"data_files/server7_int-ca-exp.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000001\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200969
Hanno Becker2389d162019-02-14 12:52:47 +0000970X509 CRT verification callback: intermediate ca, root expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000971depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200972x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200973
Hanno Becker2389d162019-02-14 12:52:47 +0000974X509 CRT verification callback: two intermediates
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200975depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000976x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200977
Hanno Becker2389d162019-02-14 12:52:47 +0000978X509 CRT verification callback: two intermediates, root included
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200979depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000980x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200981
Hanno Becker2389d162019-02-14 12:52:47 +0000982X509 CRT verification callback: two intermediates, top int trusted
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200983depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200984x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":"NULL":0:"depth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardfdbdd722015-09-01 16:35:00 +0200985
Hanno Becker2389d162019-02-14 12:52:47 +0000986X509 CRT verification callback: two intermediates, low int trusted
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200987depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200988x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-int-ca3.crt":"NULL":0:"depth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardfdbdd722015-09-01 16:35:00 +0200989
Hanno Becker2389d162019-02-14 12:52:47 +0000990X509 CRT verification callback: no intermediate, bad signature
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200991depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200992x509_verify_callback:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n"
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200993
Hanno Becker2389d162019-02-14 12:52:47 +0000994X509 CRT verification callback: one intermediate, bad signature
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200995depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200996x509_verify_callback:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n"
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200997
Paul Bakker37940d9f2009-07-10 22:38:58 +0000998X509 Parse Selftest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200999depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_CERTS_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Paul Bakker37940d9f2009-07-10 22:38:58 +00001000x509_selftest:
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001001
Hanno Becker2389d162019-02-14 12:52:47 +00001002X509 CRT ASN1 (Empty Certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001003x509parse_crt:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001004
Hanno Becker2389d162019-02-14 12:52:47 +00001005X509 CRT ASN1 (inv Certificate, bad tag)
Hanno Becker0f5acc12019-06-04 16:13:23 +01001006x509parse_crt:"0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001007
Hanno Becker2389d162019-02-14 12:52:47 +00001008X509 CRT ASN1 (inv Certificate, no length)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001009x509parse_crt:"30":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001010
Hanno Becker2389d162019-02-14 12:52:47 +00001011X509 CRT ASN1 (inv Certificate, bad length encoding)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001012x509parse_crt:"3085":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerfae618f2011-10-12 11:53:52 +00001013
Hanno Becker2389d162019-02-14 12:52:47 +00001014X509 CRT ASN1 (inv Certificate, length data incomplete)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001015x509parse_crt:"308200":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerc26a1892009-07-19 20:30:14 +00001016
Hanno Becker2389d162019-02-14 12:52:47 +00001017X509 CRT ASN1 (inv Certificate, length out of bounds)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001018x509parse_crt:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerc26a1892009-07-19 20:30:14 +00001019
Hanno Becker2389d162019-02-14 12:52:47 +00001020X509 CRT ASN1 (inv TBS, invalid tag)
Hanno Becker0f5acc12019-06-04 16:13:23 +01001021x509parse_crt:"30020500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001022
Hanno Becker2389d162019-02-14 12:52:47 +00001023X509 CRT ASN1 (inv TBS, length missing)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001024x509parse_crt:"300130":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1025
Hanno Becker2389d162019-02-14 12:52:47 +00001026X509 CRT ASN1 (inv TBS, invalid length encoding)
Paul Bakker37940d9f2009-07-10 22:38:58 +00001027x509parse_crt:"30023085":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001028
Hanno Becker2389d162019-02-14 12:52:47 +00001029X509 CRT ASN1 (inv TBS, length data incomplete)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001030x509parse_crt:"300430839999":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001031
Hanno Becker2389d162019-02-14 12:52:47 +00001032X509 CRT ASN1 (inv TBS, length out of bounds)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001033x509parse_crt:"30023003":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001034
Hanno Becker2389d162019-02-14 12:52:47 +00001035X509 CRT ASN1 (TBS empty)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001036depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera5c481e2019-06-04 15:19:09 +01001037x509parse_crt:"30153000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001038
Hanno Becker0f5acc12019-06-04 16:13:23 +01001039X509 CRT ASN1 (TBS, invalid version tag, serial missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001040depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001041x509parse_crt:"301730020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001042
Hanno Becker2389d162019-02-14 12:52:47 +00001043X509 CRT ASN1 (TBS, valid outer version tag, no outer length)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001044depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001045x509parse_crt:"30163001a0300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001046
Hanno Becker2389d162019-02-14 12:52:47 +00001047X509 CRT ASN1 (TBS, inv inner version tag)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001048depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001049x509parse_crt:"30193004a0020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001050
Hanno Becker2389d162019-02-14 12:52:47 +00001051X509 CRT ASN1 (TBS, valid inner version tag, no inner length)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001052depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001053x509parse_crt:"30183003a00102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001054
Hanno Becker2389d162019-02-14 12:52:47 +00001055X509 CRT ASN1 (TBS, valid inner version tag, inv inner length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001056depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001057x509parse_crt:"30193004a0020285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001058
Hanno Becker2389d162019-02-14 12:52:47 +00001059X509 CRT ASN1 (TBS, valid inner version tag, inner length too large for int)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001060depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001061x509parse_crt:"30293014a012021000000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001062
Hanno Becker2389d162019-02-14 12:52:47 +00001063X509 CRT ASN1 (TBS, valid inner version tag, inner vs. outer length mismatch)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001064depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001065x509parse_crt:"301b3006a00402010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001066
Hanno Becker2389d162019-02-14 12:52:47 +00001067X509 CRT ASN1 (TBS, valid version tag, length exceeds TBS)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001068depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001069x509parse_crt:"30293014a012021100000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001070
Hanno Becker2389d162019-02-14 12:52:47 +00001071X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 3)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001072depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001073x509parse_crt:"308196308180a0030201038204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001074
Hanno Becker2389d162019-02-14 12:52:47 +00001075X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 4)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001076depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001077x509parse_crt:"308196308180a0030201048204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001078
Hanno Becker2389d162019-02-14 12:52:47 +00001079X509 CRT ASN1 (TBS, valid version tag + length, version number overflow)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001080depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001081x509parse_crt:"308199308183a00602047FFFFFFF8204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001082
Hanno Becker2389d162019-02-14 12:52:47 +00001083X509 CRT ASN1 (TBS, serial missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001084depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001085x509parse_crt:"301a3005a003020102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001086
Hanno Becker2389d162019-02-14 12:52:47 +00001087X509 CRT ASN1 (TBS, inv serial, tag wrong)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001088depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001089x509parse_crt:"301c3007a0030201020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001090
Hanno Becker2389d162019-02-14 12:52:47 +00001091X509 CRT ASN1 (TBS, inv serial, length missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001092depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001093x509parse_crt:"301b3006a00302010282300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001094
Hanno Becker2389d162019-02-14 12:52:47 +00001095X509 CRT ASN1 (TBS, inv serial, inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001096depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckere7d8f962019-06-04 15:25:00 +01001097x509parse_crt:"301c3007a0030201028285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001098
Hanno Becker2389d162019-02-14 12:52:47 +00001099X509 CRT ASN1 (TBS, inv serial, length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001100depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckere7d8f962019-06-04 15:25:00 +01001101x509parse_crt:"301c3007a0030201028201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001102
Hanno Becker2389d162019-02-14 12:52:47 +00001103X509 CRT ASN1 (TBS, AlgID missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001104depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001105x509parse_crt:"3020300ba0030201028204deadbeef300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001106
Hanno Becker2389d162019-02-14 12:52:47 +00001107X509 CRT ASN1 (TBS, inv AlgID, tag wrong)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001108depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001109x509parse_crt:"3022300da0030201028204deadbeef0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001110
Hanno Becker2389d162019-02-14 12:52:47 +00001111X509 CRT ASN1 (TBS, inv AlgID, OID missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001112depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001113x509parse_crt:"307b3073a0030201008204deadbeef3000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff3000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001114
Hanno Becker2389d162019-02-14 12:52:47 +00001115X509 CRT ASN1 (TBS, inv AlgID, OID tag wrong)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001116depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001117x509parse_crt:"307f3075a0030201008204deadbeef30020500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001118
Hanno Becker2389d162019-02-14 12:52:47 +00001119X509 CRT ASN1 (TBS, inv AlgID, OID inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001120depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001121x509parse_crt:"307f3075a0030201008204deadbeef30020685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001122
Hanno Becker2389d162019-02-14 12:52:47 +00001123X509 CRT ASN1 (TBS, inv AlgID, OID length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001124depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001125x509parse_crt:"307f3075a0030201008204deadbeef30020601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001126
Hanno Becker2389d162019-02-14 12:52:47 +00001127X509 CRT ASN1 (TBS, inv AlgID, OID empty)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001128depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001129x509parse_crt:"307f3075a0030201008204deadbeef30020600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020600030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001130
Hanno Becker2389d162019-02-14 12:52:47 +00001131X509 CRT ASN1 (TBS, inv AlgID, OID unknown)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001132depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001133x509parse_crt:"3081873079a0030201008204deadbeef30060604deadbeef300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30060604deadbeef030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001134
Hanno Becker2389d162019-02-14 12:52:47 +00001135X509 CRT ASN1 (TBS, inv AlgID, param inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001136depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001137x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001138
Hanno Becker2389d162019-02-14 12:52:47 +00001139X509 CRT ASN1 (TBS, inv AlgID, param length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001140depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001141x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001142
Hanno Becker2389d162019-02-14 12:52:47 +00001143X509 CRT ASN1 (TBS, inv AlgID, param length mismatch)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001144depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001145x509parse_crt:"30819a308182a0030201008204deadbeef300f06092a864886f70d01010b06010000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300f06092a864886f70d01010b06010000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Hanno Beckera328fff2019-02-12 13:44:17 +00001146
Hanno Becker2389d162019-02-14 12:52:47 +00001147X509 CRT ASN1 (TBS, inv AlgID, params present but empty)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001148depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001149x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0600030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG
Hanno Beckera328fff2019-02-12 13:44:17 +00001150
Hanno Becker2389d162019-02-14 12:52:47 +00001151X509 CRT ASN1 (TBS, inv AlgID, bad RSASSA-PSS params)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001152depends_on:MBEDTLS_SHA256_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT
Hanno Becker764fbdf2019-06-04 16:04:36 +01001153x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010a3100300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010a3100030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02001154
Hanno Becker2389d162019-02-14 12:52:47 +00001155X509 CRT ASN1 (TBS, Issuer missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001156depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001157x509parse_crt:"302f301aa0030201008204deadbeef300d06092a864886f70d01010b0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001158
Hanno Becker2389d162019-02-14 12:52:47 +00001159X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv tag)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001160depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001161x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001162
Hanno Becker2389d162019-02-14 12:52:47 +00001163X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001164depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001165x509parse_crt:"3030301ba0030201008204deadbeef300d06092a864886f70d01010b050030300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001166
Hanno Becker2389d162019-02-14 12:52:47 +00001167X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001168depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001169x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001170
Hanno Becker2389d162019-02-14 12:52:47 +00001171X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001172depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001173x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001174
Hanno Becker2389d162019-02-14 12:52:47 +00001175X509 CRT ASN1 (TBS, inv Issuer, RDNSequence empty)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001176depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001177x509parse_crt:"3081893074a0030201028204deadbeef300d06092a864886f70d01010b05003000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001178
Hanno Becker2389d162019-02-14 12:52:47 +00001179X509 CRT ASN1 (TBS, inv Issuer, RDN inv tag)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001180depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001181x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001182
Hanno Becker2389d162019-02-14 12:52:47 +00001183X509 CRT ASN1 (TBS, inv Issuer, RDN inv length encoding)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001184depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001185x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023185301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001186
Hanno Becker2389d162019-02-14 12:52:47 +00001187X509 CRT ASN1 (TBS, inv Issuer, RDN length out of bounds)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001188depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001189x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023101301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001190
Hanno Becker2389d162019-02-14 12:52:47 +00001191X509 CRT ASN1 (TBS, inv Issuer, RDN empty)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001192depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001193x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023100301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001194
Hanno Becker2389d162019-02-14 12:52:47 +00001195X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv tag)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001196depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001197x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001198
Hanno Becker2389d162019-02-14 12:52:47 +00001199X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001200depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001201x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023085301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001202
Hanno Becker2389d162019-02-14 12:52:47 +00001203X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001204depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001205x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023001301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001206
Hanno Becker2389d162019-02-14 12:52:47 +00001207X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue empty)
Hanno Becker01346c62019-02-12 13:32:06 +00001208depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001209x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001210
Hanno Becker2389d162019-02-14 12:52:47 +00001211X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001212depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001213x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001214
Hanno Becker2389d162019-02-14 12:52:47 +00001215X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv no length data)
Hanno Becker01346c62019-02-12 13:32:06 +00001216depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001217x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b050030053103300106301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001218
Hanno Becker2389d162019-02-14 12:52:47 +00001219X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001220depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001221x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020685301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakker345fb492009-07-20 21:26:07 +00001222
Hanno Becker19db19e2019-03-13 10:36:47 +00001223X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001224depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001225x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020601301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001226
Hanno Becker2389d162019-02-14 12:52:47 +00001227X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001228depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001229x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020600301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001230
Hanno Becker2389d162019-02-14 12:52:47 +00001231X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001232depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001233x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001234
Hanno Becker2389d162019-02-14 12:52:47 +00001235X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001236depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001237x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b050030073105300306000c301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001238
Hanno Becker2389d162019-02-14 12:52:47 +00001239X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001240depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001241x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000C85301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001242
Hanno Becker2389d162019-02-14 12:52:47 +00001243X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001244depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001245x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000c01301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001246
Hanno Becker2389d162019-02-14 12:52:47 +00001247X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length mismatch)
Hanno Becker01346c62019-02-12 13:32:06 +00001248depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001249x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300a3108300606000c010000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001250
Hanno Becker2389d162019-02-14 12:52:47 +00001251X509 CRT ASN1 (TBS, inv Issuer, 2nd AttributeTypeValue empty)
Hanno Becker01346c62019-02-12 13:32:06 +00001252depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001253x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300e310c300806000c04546573743000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001254
Hanno Becker2389d162019-02-14 12:52:47 +00001255X509 CRT ASN1 (TBS, Validity missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001256depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001257x509parse_crt:"303d3028a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001258
Hanno Becker2389d162019-02-14 12:52:47 +00001259X509 CRT ASN1 (TBS, inv Validity, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001260depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001261x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker345fb492009-07-20 21:26:07 +00001262
Hanno Becker2389d162019-02-14 12:52:47 +00001263X509 CRT ASN1 (TBS, inv Validity, length field missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001264depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001265x509parse_crt:"303e3029a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001266
Hanno Becker2389d162019-02-14 12:52:47 +00001267X509 CRT ASN1 (TBS, inv Validity, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001268depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001269x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakker345fb492009-07-20 21:26:07 +00001270
Hanno Becker2389d162019-02-14 12:52:47 +00001271X509 CRT ASN1 (TBS, inv Validity, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001272depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001273x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001274
Hanno Becker2389d162019-02-14 12:52:47 +00001275X509 CRT ASN1 (TBS, inv Validity, notBefore missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001276depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001277x509parse_crt:"30793064a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001278
Hanno Becker2389d162019-02-14 12:52:47 +00001279X509 CRT ASN1 (TBS, inv Validity, notBefore inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001280depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001281x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430020500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001282
Hanno Becker2389d162019-02-14 12:52:47 +00001283X509 CRT ASN1 (TBS, inv Validity, notBefore no length)
Hanno Becker01346c62019-02-12 13:32:06 +00001284depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001285x509parse_crt:"307a3065a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300117300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001286
Hanno Becker2389d162019-02-14 12:52:47 +00001287X509 CRT ASN1 (TBS, inv Validity, notBefore inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001288depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001289x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743002178f300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001290
Hanno Becker2389d162019-02-14 12:52:47 +00001291X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001292depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001293x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001294
Hanno Becker2389d162019-02-14 12:52:47 +00001295X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001296depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001297x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001298
Hanno Becker2389d162019-02-14 12:52:47 +00001299X509 CRT ASN1 (TBS, inv Validity, notBefore empty)
Hanno Becker01346c62019-02-12 13:32:06 +00001300depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001301x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a3008060013045465737430101700170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001302
Hanno Becker2389d162019-02-14 12:52:47 +00001303X509 CRT ASN1 (TBS, inv Validity, notBefore invalid)
Hanno Becker01346c62019-02-12 13:32:06 +00001304depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001305x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303000000000170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001306
Hanno Becker2389d162019-02-14 12:52:47 +00001307X509 CRT ASN1 (TBS, inv Validity, notAfter missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001308depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001309x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300e170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkere4ff4132009-07-27 20:22:10 +00001310
Hanno Becker2389d162019-02-14 12:52:47 +00001311X509 CRT ASN1 (TBS, inv Validity, notAfter inv tag)
Hanno Becker18459d42019-02-13 11:22:23 +00001312depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001313x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935390500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker18459d42019-02-13 11:22:23 +00001314
Hanno Becker2389d162019-02-14 12:52:47 +00001315X509 CRT ASN1 (TBS, inv Validity, notAfter length missing)
Hanno Becker18459d42019-02-13 11:22:23 +00001316depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1317x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300f170c30393132333132333539353917300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1318
Hanno Becker2389d162019-02-14 12:52:47 +00001319X509 CRT ASN1 (TBS, inv Validity, notAfter inv length encoding)
Hanno Becker18459d42019-02-13 11:22:23 +00001320depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1321x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391785300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1322
Hanno Becker2389d162019-02-14 12:52:47 +00001323X509 CRT ASN1 (TBS, inv Validity, notAfter length out of bounds)
Hanno Becker18459d42019-02-13 11:22:23 +00001324depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1325x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1326
Hanno Becker2389d162019-02-14 12:52:47 +00001327X509 CRT ASN1 (TBS, inv Validity, notAfter empty)
Hanno Becker18459d42019-02-13 11:22:23 +00001328depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1329x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
1330
Hanno Becker2389d162019-02-14 12:52:47 +00001331X509 CRT ASN1 (TBS, inv Validity, notAfter invalid)
Hanno Becker18459d42019-02-13 11:22:23 +00001332depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1333x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303931323331323335393539170c303930313031303000000000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
1334
Hanno Becker7ca07e32019-03-13 10:14:00 +00001335X509 CRT ASN1 (TBS, inv Validity, data remaining after 'notAfter')
Hanno Becker18459d42019-02-13 11:22:23 +00001336depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1337x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303930313031303030303030170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001338
Hanno Becker2389d162019-02-14 12:52:47 +00001339X509 CRT ASN1 (TBS, Subject missing)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001340depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker28ae6b12019-02-13 11:59:00 +00001341x509parse_crt:"305b3046a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1342
Hanno Becker2389d162019-02-14 12:52:47 +00001343X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001344depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1345x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353900300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1346
Hanno Becker2389d162019-02-14 12:52:47 +00001347X509 CRT ASN1 (TBS, inv Subject, RDNSequence length missing)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001348depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1349x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1350
Hanno Becker2389d162019-02-14 12:52:47 +00001351X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001352depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1353x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1354
Hanno Becker2389d162019-02-14 12:52:47 +00001355X509 CRT ASN1 (TBS, inv Subject, RDNSequence length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001356depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1357x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1358
Hanno Becker2389d162019-02-14 12:52:47 +00001359X509 CRT ASN1 (TBS, inv Subject, RDN inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001360depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001361x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker28ae6b12019-02-13 11:59:00 +00001362
Hanno Becker2389d162019-02-14 12:52:47 +00001363X509 CRT ASN1 (TBS, inv Subject, RDN inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001364depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1365x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023185302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1366
Hanno Becker2389d162019-02-14 12:52:47 +00001367X509 CRT ASN1 (TBS, inv Subject, RDN length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001368depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1369x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023101302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1370
Hanno Becker2389d162019-02-14 12:52:47 +00001371X509 CRT ASN1 (TBS, inv Subject, RDN empty)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001372depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1373x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023100302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1374
Hanno Becker2389d162019-02-14 12:52:47 +00001375X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001376depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001377x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker28ae6b12019-02-13 11:59:00 +00001378
Hanno Becker2389d162019-02-14 12:52:47 +00001379X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001380depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1381x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023085302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1382
Hanno Becker2389d162019-02-14 12:52:47 +00001383X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001384depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1385x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023001302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1386
Hanno Becker2389d162019-02-14 12:52:47 +00001387X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue empty)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001388depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1389x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1390
Hanno Becker2389d162019-02-14 12:52:47 +00001391X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001392depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001393x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker28ae6b12019-02-13 11:59:00 +00001394
Hanno Becker2389d162019-02-14 12:52:47 +00001395X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv no length data)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001396depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1397x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930053103300106302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1398
Hanno Becker2389d162019-02-14 12:52:47 +00001399X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001400depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1401x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020685302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1402
Hanno Becker2389d162019-02-14 12:52:47 +00001403X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type length out of bounds )
Hanno Becker28ae6b12019-02-13 11:59:00 +00001404depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1405x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020601302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1406
Hanno Becker2389d162019-02-14 12:52:47 +00001407X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value missing)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001408depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1409x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020600302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1410
Hanno Becker2389d162019-02-14 12:52:47 +00001411X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001412depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001413x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
Hanno Becker28ae6b12019-02-13 11:59:00 +00001414
Hanno Becker2389d162019-02-14 12:52:47 +00001415X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length missing)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001416depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1417x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930073105300306000c302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1418
Hanno Becker2389d162019-02-14 12:52:47 +00001419X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001420depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1421x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000C85302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1422
Hanno Becker2389d162019-02-14 12:52:47 +00001423X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001424depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1425x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000c01302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1426
Hanno Becker2389d162019-02-14 12:52:47 +00001427X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length mismatch)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001428depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1429x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300a3108300606000c010000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1430
Hanno Becker2389d162019-02-14 12:52:47 +00001431X509 CRT ASN1 (TBS, inv Subject, 2nd AttributeTypeValue empty)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001432depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1433x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300e310c300806000c04546573743000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001434
Hanno Becker2389d162019-02-14 12:52:47 +00001435X509 CRT ASN1 (TBS, SubPubKeyInfo missing)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001436depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001437x509parse_crt:"30693054a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001438
Hanno Becker19db19e2019-03-13 10:36:47 +00001439X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv tag)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001440depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001441x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001442
Hanno Becker19db19e2019-03-13 10:36:47 +00001443X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length missing)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001444depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001445x509parse_crt:"306a3055a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001446
Hanno Becker19db19e2019-03-13 10:36:47 +00001447X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv length encoding)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001448depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001449x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001450
Hanno Becker19db19e2019-03-13 10:36:47 +00001451X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length out of bounds)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001452depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001453x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001454
Hanno Becker19db19e2019-03-13 10:36:47 +00001455X509 CRT ASN1 (TBS, inv SubPubKeyInfo, empty)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001456depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001457x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001458
Hanno Becker19db19e2019-03-13 10:36:47 +00001459X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv algorithm tag)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001460depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001461x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001462
Hanno Becker19db19e2019-03-13 10:36:47 +00001463X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length missing)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001464depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001465x509parse_crt:"306c3057a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001466
Hanno Becker19db19e2019-03-13 10:36:47 +00001467X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm inv length encoding)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001468depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001469x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001470
Hanno Becker19db19e2019-03-13 10:36:47 +00001471X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length out of bounds)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001472depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001473x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001474
Hanno Becker19db19e2019-03-13 10:36:47 +00001475X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm empty)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001476depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001477x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301d300003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001478
Hanno Becker19db19e2019-03-13 10:36:47 +00001479X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm unknown)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001480depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001481x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010100050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_UNKNOWN_PK_ALG
1482
Hanno Becker19db19e2019-03-13 10:36:47 +00001483X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring missing)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001484depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1485x509parse_crt:"307a3065a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300f300d06092A864886F70D0101010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1486
Hanno Becker19db19e2019-03-13 10:36:47 +00001487X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv tag)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001488depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001489x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Beckerbb955e52019-06-04 15:38:48 +01001490
Hanno Becker19db19e2019-03-13 10:36:47 +00001491X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length missing)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001492depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1493x509parse_crt:"307b3066a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743010300d06092A864886F70D010101050003300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1494
Hanno Becker19db19e2019-03-13 10:36:47 +00001495X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv length encoding)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001496depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1497x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1498
Hanno Becker19db19e2019-03-13 10:36:47 +00001499X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length out of bounds)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001500depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1501x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1502
Hanno Becker19db19e2019-03-13 10:36:47 +00001503X509 CRT ASN1 (TBS, inv SubPubKeyInfo, no bitstring data)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001504depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1505x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA
1506
Hanno Becker19db19e2019-03-13 10:36:47 +00001507X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv bitstring start)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001508depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1509x509parse_crt:"307d3068a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743012300d06092A864886F70D0101010500030101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA
1510
Hanno Becker2389d162019-02-14 12:52:47 +00001511X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring length)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001512depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1513x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1514
Hanno Becker2389d162019-02-14 12:52:47 +00001515X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring tag)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001516depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1517x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400310000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1518
Hanno Becker2389d162019-02-14 12:52:47 +00001519X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv RSA modulus)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001520depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1521x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0302ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1522
Hanno Becker2389d162019-02-14 12:52:47 +00001523X509 CRT ASN1 (TBS, inv SubPubKeyInfo, total length mismatch)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001524depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1525x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301e300d06092A864886F70D0101010500030b0030080202ffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1526
Hanno Becker2389d162019-02-14 12:52:47 +00001527X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001528depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1529x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY
1530
Hanno Becker2389d162019-02-14 12:52:47 +00001531X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed, expanded length notation)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001532depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1533x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210fffffffffffffffffffffffffffffffe0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001534
Hanno Becker61cf9e32019-06-13 13:32:44 +01001535# We expect an extension parsing error here because the IssuerID is optional.
1536# Hence, if we find an ASN.1 tag doesn't match the IssuerID, we assume the
1537# IssuerID is skipped and that the tag should hence belong to the next field,
1538# namely the v3 extensions. However, the tag the test exercises is a NULL tag,
1539# and hence we obtain an INVALID_TAG error during extension parsing.
Hanno Becker2389d162019-02-14 12:52:47 +00001540X509 CRT ASN1 (TBS, inv IssuerID, inv tag)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001541depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001542x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001543
Hanno Becker2389d162019-02-14 12:52:47 +00001544X509 CRT ASN1 (TBS, inv IssuerID, length missing)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001545depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001546x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001547
Hanno Becker2389d162019-02-14 12:52:47 +00001548X509 CRT ASN1 (TBS, inv IssuerID, inv length encoding)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001549depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001550x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001551
Hanno Becker2389d162019-02-14 12:52:47 +00001552X509 CRT ASN1 (TBS, inv IssuerID, length out of bounds)
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001553depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001554x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerc26a1892009-07-19 20:30:14 +00001555
Hanno Becker2389d162019-02-14 12:52:47 +00001556X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length missing)
Paul Bakkerc26a1892009-07-19 20:30:14 +00001557depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001558x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerc26a1892009-07-19 20:30:14 +00001559
Hanno Becker2389d162019-02-14 12:52:47 +00001560X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, inv length encoding)
Paul Bakker37940d9f2009-07-10 22:38:58 +00001561depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001562x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakker37940d9f2009-07-10 22:38:58 +00001563
Hanno Becker2389d162019-02-14 12:52:47 +00001564X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length out of bounds)
Paul Bakker37940d9f2009-07-10 22:38:58 +00001565depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001566x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker37940d9f2009-07-10 22:38:58 +00001567
Hanno Becker2389d162019-02-14 12:52:47 +00001568X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001569depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001570x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakkere4ff4132009-07-27 20:22:10 +00001571
Hanno Becker2389d162019-02-14 12:52:47 +00001572X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data missing)
Hanno Beckerba698da2019-06-03 09:54:07 +01001573depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1574x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30b300930070603551d20040001010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Ron Eldor11818f22019-05-16 18:17:02 +03001575
Hanno Becker2389d162019-02-14 12:52:47 +00001576X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data not oid)
Hanno Beckerba698da2019-06-03 09:54:07 +01001577depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1578x509parse_crt:"3081bc3081b9a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba32e302c30290603551d2004223020301ea01c06082b06010505070804a010300e06082b060104010901030402022201010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Ron Eldor8a59d6b2019-05-19 12:32:15 +03001579
Hanno Becker2389d162019-02-14 12:52:47 +00001580X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, qualifier not complete)
Hanno Beckerba698da2019-06-03 09:54:07 +01001581depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1582x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30c300a301f0603551d2004183020301f0603551d200418301630140604551d2000300c300a06082b0601050507020101010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Ron Eldor11818f22019-05-16 18:17:02 +03001583
Hanno Becker2389d162019-02-14 12:52:47 +00001584X509 CRT ASN1 (TBSCertificate v3, ext SubjectAlternativeName malformed)
Ron Eldor56f071f2019-05-22 17:21:08 +03001585depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
1586x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1587
Hanno Becker2389d162019-02-14 12:52:47 +00001588X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001589depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001590x509parse_crt:"308199308183a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerc6ce8382009-07-27 21:34:45 +00001591
Hanno Becker2389d162019-02-14 12:52:47 +00001592X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001593depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001594x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerc6ce8382009-07-27 21:34:45 +00001595
Hanno Becker2389d162019-02-14 12:52:47 +00001596X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001597depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001598x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkere4ff4132009-07-27 20:22:10 +00001599
Hanno Beckerd51d4852019-03-13 15:18:57 +00001600X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT)
Hanno Becker01346c62019-02-12 13:32:06 +00001601depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerd51d4852019-03-13 15:18:57 +00001602x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakkere4ff4132009-07-27 20:22:10 +00001603
Hanno Beckerd51d4852019-03-13 15:18:57 +00001604X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT)
Hanno Becker01346c62019-02-12 13:32:06 +00001605depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerd51d4852019-03-13 15:18:57 +00001606x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa200a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakkere4ff4132009-07-27 20:22:10 +00001607
Hanno Becker2389d162019-02-14 12:52:47 +00001608X509 CRT ASN1 (TBS, inv v3Ext, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001609depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001610x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkere4ff4132009-07-27 20:22:10 +00001611
Hanno Becker2389d162019-02-14 12:52:47 +00001612X509 CRT ASN1 (TBS, inv v3Ext, outer length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001613depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker05987e32019-06-04 15:51:22 +01001614x509parse_crt:"30819b308185a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker37940d9f2009-07-10 22:38:58 +00001615
Hanno Becker2389d162019-02-14 12:52:47 +00001616X509 CRT ASN1 (TBS, inv v3Ext, outer length inv encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001617depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker05987e32019-06-04 15:51:22 +01001618x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakker37940d9f2009-07-10 22:38:58 +00001619
Hanno Becker2389d162019-02-14 12:52:47 +00001620X509 CRT ASN1 (TBS, inv v3Ext, outer length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001621depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker05987e32019-06-04 15:51:22 +01001622x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker37940d9f2009-07-10 22:38:58 +00001623
Hanno Becker2389d162019-02-14 12:52:47 +00001624X509 CRT ASN1 (TBS, inv v3Ext, outer length 0)
Hanno Becker01346c62019-02-12 13:32:06 +00001625depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker05987e32019-06-04 15:51:22 +01001626x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker37940d9f2009-07-10 22:38:58 +00001627
Hanno Becker2389d162019-02-14 12:52:47 +00001628X509 CRT ASN1 (TBS, inv v3Ext, inner tag invalid)
Hanno Becker01346c62019-02-12 13:32:06 +00001629depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001630x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker37940d9f2009-07-10 22:38:58 +00001631
Hanno Becker2389d162019-02-14 12:52:47 +00001632X509 CRT ASN1 (TBS, inv v3Ext, inner length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001633depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1634x509parse_crt:"30819d308187a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1635
Hanno Becker2389d162019-02-14 12:52:47 +00001636X509 CRT ASN1 (TBS, inv v3Ext, inner length inv encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001637depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1638x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1639
Hanno Becker2389d162019-02-14 12:52:47 +00001640X509 CRT ASN1 (TBS, inv v3Ext, inner length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001641depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1642x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1643
Hanno Becker2389d162019-02-14 12:52:47 +00001644X509 CRT ASN1 (TBS, inv v3Ext, inner/outer length mismatch)
Hanno Becker05987e32019-06-04 15:51:22 +01001645depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1646x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1647
Hanno Becker2389d162019-02-14 12:52:47 +00001648X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001649depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001650x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001651
Hanno Becker2389d162019-02-14 12:52:47 +00001652X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001653depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1654x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1655
Hanno Becker2389d162019-02-14 12:52:47 +00001656X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001657depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1658x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1659
Hanno Becker2389d162019-02-14 12:52:47 +00001660X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001661depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1662x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1663
Hanno Becker2389d162019-02-14 12:52:47 +00001664X509 CRT ASN1 (TBS, inv v3Ext, first ext empty)
Hanno Becker05987e32019-06-04 15:51:22 +01001665depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1666x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1667
Hanno Becker2389d162019-02-14 12:52:47 +00001668X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001669depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001670x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001671
Hanno Becker2389d162019-02-14 12:52:47 +00001672X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001673depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1674x509parse_crt:"3081a130818ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3053003300106300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1675
Hanno Becker2389d162019-02-14 12:52:47 +00001676X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001677depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1678x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020685300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1679
Hanno Becker2389d162019-02-14 12:52:47 +00001680X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001681depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1682x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020601300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1683
Hanno Becker2389d162019-02-14 12:52:47 +00001684X509 CRT ASN1 (TBS, inv v3Ext, no extnValue)
Hanno Becker05987e32019-06-04 15:51:22 +01001685depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1686x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020600300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1687
Hanno Becker2389d162019-02-14 12:52:47 +00001688X509 CRT ASN1 (TBS, inv v3Ext, inv critical tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001689depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001690x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001691
Hanno Becker2389d162019-02-14 12:52:47 +00001692X509 CRT ASN1 (TBS, inv v3Ext, critical length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001693depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1694x509parse_crt:"3081a330818da0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30730053003060001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1695
Hanno Becker2389d162019-02-14 12:52:47 +00001696X509 CRT ASN1 (TBS, inv v3Ext, critical inv length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001697depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1698x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1699
Hanno Becker2389d162019-02-14 12:52:47 +00001700X509 CRT ASN1 (TBS, inv v3Ext, critical length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001701depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1702x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1703
Hanno Becker2389d162019-02-14 12:52:47 +00001704X509 CRT ASN1 (TBS, inv v3Ext, critical length 0)
Hanno Becker05987e32019-06-04 15:51:22 +01001705depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1706x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000100300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1707
Hanno Becker2389d162019-02-14 12:52:47 +00001708X509 CRT ASN1 (TBS, inv v3Ext, critical length 2)
Hanno Becker05987e32019-06-04 15:51:22 +01001709depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1710x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001020000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1711
Hanno Becker2389d162019-02-14 12:52:47 +00001712X509 CRT ASN1 (TBS, inv v3Ext, extnValue inv tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001713depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001714x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001715
Hanno Becker2389d162019-02-14 12:52:47 +00001716X509 CRT ASN1 (TBS, inv v3Ext, extnValue length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001717depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1718x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001010004300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1719
Hanno Becker2389d162019-02-14 12:52:47 +00001720X509 CRT ASN1 (TBS, inv v3Ext, extnValue length inv encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001721depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1722x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000485300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1723
Hanno Becker2389d162019-02-14 12:52:47 +00001724X509 CRT ASN1 (TBS, inv v3Ext, extnValue length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001725depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1726x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000401300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1727
Hanno Becker8671e812019-03-14 08:22:51 +00001728X509 CRT ASN1 (TBS, inv v3Ext, data remaining after extnValue)
Hanno Becker05987e32019-06-04 15:51:22 +01001729depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1730x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b3009060001010004000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1731
Hanno Becker2389d162019-02-14 12:52:47 +00001732X509 CRT ASN1 (TBS, inv extBasicConstraint, no pathlen length)
Hanno Becker05987e32019-06-04 15:51:22 +01001733depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1734x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d130101010406300402010102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1735
Hanno Becker2389d162019-02-14 12:52:47 +00001736X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen inv length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001737depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1738x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1739
Hanno Becker2389d162019-02-14 12:52:47 +00001740X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001741depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1742x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1743
Hanno Becker2389d162019-02-14 12:52:47 +00001744X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen empty)
Hanno Becker05987e32019-06-04 15:51:22 +01001745depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1746x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1747
Hanno Becker2389d162019-02-14 12:52:47 +00001748X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length mismatch)
Hanno Becker05987e32019-06-04 15:51:22 +01001749depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1750x509parse_crt:"3081b430819ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a318301630140603551d13010101040a30080201010201010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1751
Hanno Becker2389d162019-02-14 12:52:47 +00001752X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage bad second tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001753depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1754x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d250416301406082b0601050507030107082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1755
Hanno Becker2389d162019-02-14 12:52:47 +00001756X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated)
Hanno Becker05987e32019-06-04 15:51:22 +01001757depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1758x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS
1759
Hanno Becker2389d162019-02-14 12:52:47 +00001760X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage repeated)
Hanno Becker05987e32019-06-04 15:51:22 +01001761depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1762x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d250416301406082b0601050507030106082b06010505070302301d0603551d250416301406082b0601050507030106082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS
1763
Hanno Becker2389d162019-02-14 12:52:47 +00001764X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated outside Extensions)
Hanno Becker05987e32019-06-04 15:51:22 +01001765depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1766x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1767
Hanno Becker04b10c02019-03-13 15:19:28 +00001768X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT)
1769depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1770x509parse_crt:"3081b93081a3a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1771
1772X509 CRT ASN1 (TBS, valid v3Ext in v2 CRT)
1773depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1774x509parse_crt:"3081b93081a3a0030201018204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1775
Hanno Becker2389d162019-02-14 12:52:47 +00001776X509 CRT ASN1 (TBS, valid SubjectID, valid IssuerID, inv v3Ext, SubjectAltName repeated outside Extensions, inv SubjectAltNames tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001777depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
1778x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1779
Hanno Becker2389d162019-02-14 12:52:47 +00001780X509 CRT ASN1 (SignatureAlgorithm missing)
Paul Bakker37940d9f2009-07-10 22:38:58 +00001781depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001782x509parse_crt:"3081aa3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker37940d9f2009-07-10 22:38:58 +00001783
Hanno Becker2389d162019-02-14 12:52:47 +00001784X509 CRT ASN1 (inv SignatureAlgorithm, bad tag)
Paul Bakker37940d9f2009-07-10 22:38:58 +00001785depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001786x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573740500":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker37940d9f2009-07-10 22:38:58 +00001787
Hanno Becker2389d162019-02-14 12:52:47 +00001788X509 CRT ASN1 (inv SignatureAlgorithm, length missing)
Paul Bakker37940d9f2009-07-10 22:38:58 +00001789depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001790x509parse_crt:"3081ab3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e7465737430":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker37940d9f2009-07-10 22:38:58 +00001791
Hanno Becker2389d162019-02-14 12:52:47 +00001792X509 CRT ASN1 (inv SignatureAlgorithm, inv length encoding)
Paul Bakker37940d9f2009-07-10 22:38:58 +00001793depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001794x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743085":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakker37940d9f2009-07-10 22:38:58 +00001795
Hanno Becker2389d162019-02-14 12:52:47 +00001796X509 CRT ASN1 (inv SignatureAlgorithm, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001797depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001798x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1799
Hanno Becker2389d162019-02-14 12:52:47 +00001800X509 CRT ASN1 (inv SignatureAlgorithm, not the same as SignatureAlgorithm in TBS)
Hanno Becker5f88a772019-06-04 15:54:43 +01001801depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1802x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010a0500030200ff":"":MBEDTLS_ERR_X509_SIG_MISMATCH
Paul Bakker37940d9f2009-07-10 22:38:58 +00001803
Hanno Becker2389d162019-02-14 12:52:47 +00001804X509 CRT ASN1 (Signature missing)
Hanno Becker44199b62019-02-14 12:25:03 +00001805depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1806x509parse_crt:"3081b93081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1807
Hanno Becker2389d162019-02-14 12:52:47 +00001808X509 CRT ASN1 (inv Signature, bad tag)
Hanno Becker44199b62019-02-14 12:25:03 +00001809depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001810x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker44199b62019-02-14 12:25:03 +00001811
Hanno Becker2389d162019-02-14 12:52:47 +00001812X509 CRT ASN1 (inv Signature, length missing)
Hanno Becker44199b62019-02-14 12:25:03 +00001813depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1814x509parse_crt:"3081ba3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b050003":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1815
Hanno Becker2389d162019-02-14 12:52:47 +00001816X509 CRT ASN1 (inv Signature, inv length encoding)
Hanno Becker44199b62019-02-14 12:25:03 +00001817depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1818x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000385":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1819
Hanno Becker2389d162019-02-14 12:52:47 +00001820X509 CRT ASN1 (inv Signature, length out of bounds)
Hanno Becker44199b62019-02-14 12:25:03 +00001821depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1822x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1823
Hanno Becker2389d162019-02-14 12:52:47 +00001824X509 CRT ASN1 (inv Signature, empty)
Hanno Becker44199b62019-02-14 12:25:03 +00001825depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1826x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000300":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA
1827
Hanno Becker2389d162019-02-14 12:52:47 +00001828X509 CRT ASN1 (inv Signature, inv data)
Hanno Becker44199b62019-02-14 12:25:03 +00001829depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1830x509parse_crt:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030100":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA
1831
Hanno Becker2389d162019-02-14 12:52:47 +00001832X509 CRT ASN1 (inv Signature, length mismatch)
Hanno Becker44199b62019-02-14 12:25:03 +00001833depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1834x509parse_crt:"3081be3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff00":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1835
Hanno Becker2389d162019-02-14 12:52:47 +00001836X509 CRT ASN1 (well-formed)
Hanno Becker01346c62019-02-12 13:32:06 +00001837depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001838x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakker37940d9f2009-07-10 22:38:58 +00001839
Hanno Becker8671e812019-03-14 08:22:51 +00001840X509 CRT ASN1 (GeneralizedTime in notBefore, UTCTime in notAfter)
Hanno Becker01346c62019-02-12 13:32:06 +00001841depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001842x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e180e3230313030313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2010-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakker91200182010-02-18 21:26:15 +00001843
Hanno Becker7717c412019-03-14 08:28:42 +00001844X509 CRT ASN1 (UTCTime in notBefore, GeneralizedTime in notAfter)
1845depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1846x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303931323331323335393539180e3230313030313031303030303030300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-12-31 23\:59\:59\nexpires on \: 2010-01-01 00\:00\:00\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
1847
Hanno Becker2389d162019-02-14 12:52:47 +00001848X509 CRT ASN1 (Name with X520 CN)
Hanno Becker01346c62019-02-12 13:32:06 +00001849depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001850x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550403130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: CN=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001851
Hanno Becker2389d162019-02-14 12:52:47 +00001852X509 CRT ASN1 (Name with X520 C)
Hanno Becker01346c62019-02-12 13:32:06 +00001853depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001854x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550406130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: C=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001855
Hanno Becker2389d162019-02-14 12:52:47 +00001856X509 CRT ASN1 (Name with X520 L)
Hanno Becker01346c62019-02-12 13:32:06 +00001857depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001858x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550407130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: L=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001859
Hanno Becker2389d162019-02-14 12:52:47 +00001860X509 CRT ASN1 (Name with X520 ST)
Hanno Becker01346c62019-02-12 13:32:06 +00001861depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001862x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550408130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ST=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001863
Hanno Becker2389d162019-02-14 12:52:47 +00001864X509 CRT ASN1 (Name with X520 O)
Hanno Becker01346c62019-02-12 13:32:06 +00001865depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001866x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040a130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: O=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001867
Hanno Becker2389d162019-02-14 12:52:47 +00001868X509 CRT ASN1 (Name with X520 OU)
Hanno Becker01346c62019-02-12 13:32:06 +00001869depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001870x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040b130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: OU=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001871
Hanno Becker2389d162019-02-14 12:52:47 +00001872X509 CRT ASN1 (Name with unknown X520 part)
Hanno Becker01346c62019-02-12 13:32:06 +00001873depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001874x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b06035504de130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001875
Hanno Becker2389d162019-02-14 12:52:47 +00001876X509 CRT ASN1 (Name with composite RDN)
palaviva07ecda2016-08-07 11:15:29 +03001877depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard555fbf82015-02-04 17:11:55 +00001878x509parse_crt:"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":"cert. version \: 3\nserial number \: 4C\:20\:E3\:BD\nissuer name \: C=US, ST=CA, O=Internet Widgits Pty Ltd, CN=Frankencert CA\nsubject name \: C=US, ST=Washington, ??=US, ??=Delaware, O=Authorize.Net LLC, ??=Private Organization, serialNumber=4369191 + CN=www.authorize.net, L=San Francisco\nissued on \: 2013-08-02 15\:14\:37\nexpires on \: 2015-08-17 05\:54\:31\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\n":0
1879
Hanno Becker2389d162019-02-14 12:52:47 +00001880X509 CRT ASN1 (Name with PKCS9 email)
Hanno Becker01346c62019-02-12 13:32:06 +00001881depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001882x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d010901130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: emailAddress=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001883
Hanno Becker2389d162019-02-14 12:52:47 +00001884X509 CRT ASN1 (Name with unknown PKCS9 part)
Hanno Becker01346c62019-02-12 13:32:06 +00001885depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001886x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d0109ab130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001887
Hanno Becker2389d162019-02-14 12:52:47 +00001888X509 CRT ASN1 (ECDSA signature, RSA key)
palavivf180df92016-08-07 11:56:02 +03001889depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001890x509parse_crt:"3081e630819e020103300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343631385a170d3233303730383039343631385a300f310d300b0603550403130454657374304c300d06092a864886f70d0101010500033b003038023100e8f546061d3b49bc2f6b7524b7ea4d73a8d5293ee8c64d9407b70b5d16baebc32b8205591eab4e1eb57e9241883701250203010001300906072a8648ce3d0401033800303502186e18209afbed14a0d9a796efcad68891e3ccd5f75815c833021900e92b4fd460b1994693243b9ffad54729de865381bda41d25":"cert. version \: 1\nserial number \: 03\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:46\:18\nexpires on \: 2023-07-08 09\:46\:18\nsigned using \: ECDSA with SHA1\nRSA key size \: 384 bits\n":0
Manuel Pégourié-Gonnard72ef0b72013-07-10 12:20:54 +02001891
Hanno Becker2389d162019-02-14 12:52:47 +00001892X509 CRT ASN1 (ECDSA signature, EC key)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02001893depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001894x509parse_crt:"3081eb3081a3020900f41534662ec7e912300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343031395a170d3233303730383039343031395a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d030101033200042137969fabd4e370624a0e1a33e379cab950cce00ef8c3c3e2adaeb7271c8f07659d65d3d777dcf21614363ae4b6e617300906072a8648ce3d04010338003035021858cc0f957946fe6a303d92885a456aa74c743c7b708cbd37021900fe293cac21af352d16b82eb8ea54e9410b3abaadd9f05dd6":"cert. version \: 1\nserial number \: F4\:15\:34\:66\:2E\:C7\:E9\:12\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:40\:19\nexpires on \: 2023-07-08 09\:40\:19\nsigned using \: ECDSA with SHA1\nEC key size \: 192 bits\n":0
Manuel Pégourié-Gonnarda3c86c32013-07-10 16:54:29 +02001895
Hanno Becker2389d162019-02-14 12:52:47 +00001896X509 CRT ASN1 (RSA signature, EC key)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02001897depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001898x509parse_crt:"3081e430819f020104300d06092a864886f70d0101050500300f310d300b0603550403130454657374301e170d3133303731303135303233375a170d3233303730383135303233375a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d03010103320004e962551a325b21b50cf6b990e33d4318fd16677130726357a196e3efe7107bcb6bdc6d9db2a4df7c964acfe81798433d300d06092a864886f70d01010505000331001a6c18cd1e457474b2d3912743f44b571341a7859a0122774a8e19a671680878936949f904c9255bdd6fffdb33a7e6d8":"cert. version \: 1\nserial number \: 04\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 15\:02\:37\nexpires on \: 2023-07-08 15\:02\:37\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\n":0
Manuel Pégourié-Gonnarda3c86c32013-07-10 16:54:29 +02001899
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001900X509 CRL ASN1 (Incorrect first tag)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001901x509parse_crl:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001902
1903X509 CRL ASN1 (Correct first tag, data length does not match)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001904x509parse_crl:"300000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001905
1906X509 CRL ASN1 (TBSCertList, tag missing)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001907x509parse_crl:"3000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001908
1909X509 CRL ASN1 (TBSCertList, version tag len missing)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001910x509parse_crl:"3003300102":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001911
1912X509 CRL ASN1 (TBSCertList, version correct, alg missing)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001913x509parse_crl:"30053003020100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001914
1915X509 CRL ASN1 (TBSCertList, alg correct, incorrect version)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001916x509parse_crl:"300b3009020102300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001917
1918X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001919x509parse_crl:"300b3009020100300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001920
1921X509 CRL ASN1 (TBSCertList, sig_oid1 id unknown)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001922x509parse_crl:"30143012020100300d06092a864886f70d01010f0500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001923
1924X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing)
palaviva07ecda2016-08-07 11:15:29 +03001925depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001926x509parse_crl:"30143012020100300d06092a864886f70d01010e0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001927
1928X509 CRL ASN1 (TBSCertList, issuer set missing)
palaviva07ecda2016-08-07 11:15:29 +03001929depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001930x509parse_crl:"30163014020100300d06092a864886f70d01010e05003000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001931
1932X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing)
palaviva07ecda2016-08-07 11:15:29 +03001933depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001934x509parse_crl:"30253023020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001935
1936X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing)
palaviva07ecda2016-08-07 11:15:29 +03001937depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001938x509parse_crl:"30343032020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030":"":MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkere4ff4132009-07-27 20:22:10 +00001939
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001940X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg)
palaviva07ecda2016-08-07 11:15:29 +03001941depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001942x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001943
1944X509 CRL ASN1 (TBSCertList, entries present, date in entry invalid)
palaviva07ecda2016-08-07 11:15:29 +03001945depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001946x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001947
1948X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match)
palaviva07ecda2016-08-07 11:15:29 +03001949depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001950x509parse_crl:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010d0500":"":MBEDTLS_ERR_X509_SIG_MISMATCH
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001951
Paul Bakkere4ff4132009-07-27 20:22:10 +00001952X509 CRL ASN1 (TBSCertList, sig present, len mismatch)
palaviva07ecda2016-08-07 11:15:29 +03001953depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001954x509parse_crl:"305d3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e05000302000100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001955
1956X509 CRL ASN1 (TBSCertList, sig present)
palaviva07ecda2016-08-07 11:15:29 +03001957depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Paul Bakkerc70b9822013-04-07 22:00:46 +02001958x509parse_crl:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nserial number\: AB\:CD revocation date\: 2008-12-31 23\:59\:59\nsigned using \: RSA with SHA-224\n":0
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001959
Paul Bakkere4ff4132009-07-27 20:22:10 +00001960X509 CRL ASN1 (TBSCertList, no entries)
palaviva07ecda2016-08-07 11:15:29 +03001961depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Paul Bakkerc70b9822013-04-07 22:00:46 +02001962x509parse_crl:"30463031020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nsigned using \: RSA with SHA-224\n":0
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01001963
Andres AGfff826c2017-03-07 11:11:12 +00001964X509 CRL ASN1 (invalid version 2)
1965x509parse_crl:"30463031020102300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
1966
1967X509 CRL ASN1 (invalid version overflow)
Hanno Becker32b48ea2019-06-03 09:48:09 +01001968x509parse_crl:"3049303102047fffffff300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Andres AGfff826c2017-03-07 11:11:12 +00001969
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001970X509 CRL ASN1 (extension seq too long, crl-idp.pem byte 121)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001971depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001972x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1973
1974X509 CRL ASN1 (extension oid too long, crl-idp.pem byte 123)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001975depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001976x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290628551d1c0101ff041f301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1977
1978X509 CRL ASN1 (extension critical invalid length, crl-idp.pem byte 128)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001979depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001980x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1981
1982X509 CRL ASN1 (extension data too long, crl-idp.pem byte 131)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001983depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001984x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c0101ff0420301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1985
1986X509 CRL ASN1 (extension data too short, crl-idp.pem byte 131)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001987depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001988x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c0101ff041e301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1989
Manuel Pégourié-Gonnarda63305d2018-03-14 12:23:56 +01001990X509 CRL ASN1 (extension not critical explicit, crl-idp.pem byte 129)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001991depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnarda63305d2018-03-14 12:23:56 +01001992x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c010100041f301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2018-03-14 07\:31\:48\nnext update \: 2028-03-14 07\:31\:48\nRevoked certificates\:\nsigned using \: RSA with SHA-256\n":0
1993
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01001994X509 CRT parse path #2 (one cert)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001995depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
1996mbedtls_x509_crt_parse_path:"data_files/dir1":0:1
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01001997
1998X509 CRT parse path #3 (two certs)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001999depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2000mbedtls_x509_crt_parse_path:"data_files/dir2":0:2
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01002001
2002X509 CRT parse path #4 (two certs, one non-cert)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002003depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2004mbedtls_x509_crt_parse_path:"data_files/dir3":1:2
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002005
Manuel Pégourié-Gonnard1beb0482017-06-05 13:49:44 +02002006X509 CRT verify long chain (max intermediate CA, trusted)
2007depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
2008mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA:0:0
2009
2010X509 CRT verify long chain (max intermediate CA, untrusted)
2011depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2012mbedtls_x509_crt_verify_max:"data_files/test-ca2.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA-1:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED
2013
2014X509 CRT verify long chain (max intermediate CA + 1)
2015depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard31458a12017-06-26 10:11:49 +02002016mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA+1:MBEDTLS_ERR_X509_FATAL_ERROR:-1
Manuel Pégourié-Gonnard1beb0482017-06-05 13:49:44 +02002017
Janos Follathef4f2582015-10-11 16:17:27 +02002018X509 CRT verify chain #1 (zero pathlen intermediate)
Janos Follath822b2c32015-10-11 10:25:22 +02002019depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002020mbedtls_x509_crt_verify_chain:"data_files/dir4/cert14.crt data_files/dir4/cert13.crt data_files/dir4/cert12.crt":"data_files/dir4/cert11.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follath822b2c32015-10-11 10:25:22 +02002021
Janos Follathef4f2582015-10-11 16:17:27 +02002022X509 CRT verify chain #2 (zero pathlen root)
2023depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002024mbedtls_x509_crt_verify_chain:"data_files/dir4/cert23.crt data_files/dir4/cert22.crt":"data_files/dir4/cert21.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002025
2026X509 CRT verify chain #3 (nonzero pathlen root)
2027depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002028mbedtls_x509_crt_verify_chain:"data_files/dir4/cert34.crt data_files/dir4/cert33.crt data_files/dir4/cert32.crt":"data_files/dir4/cert31.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002029
2030X509 CRT verify chain #4 (nonzero pathlen intermediate)
2031depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002032mbedtls_x509_crt_verify_chain:"data_files/dir4/cert45.crt data_files/dir4/cert44.crt data_files/dir4/cert43.crt data_files/dir4/cert42.crt":"data_files/dir4/cert41.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002033
2034X509 CRT verify chain #5 (nonzero maxpathlen intermediate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002035depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002036mbedtls_x509_crt_verify_chain:"data_files/dir4/cert54.crt data_files/dir4/cert53.crt data_files/dir4/cert52.crt":"data_files/dir4/cert51.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002037
2038X509 CRT verify chain #6 (nonzero maxpathlen root)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002039depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002040mbedtls_x509_crt_verify_chain:"data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002041
2042X509 CRT verify chain #7 (maxpathlen root, self signed in path)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002043depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002044mbedtls_x509_crt_verify_chain:"data_files/dir4/cert74.crt data_files/dir4/cert73.crt data_files/dir4/cert72.crt":"data_files/dir4/cert71.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002045
2046X509 CRT verify chain #8 (self signed maxpathlen root)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002047depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002048mbedtls_x509_crt_verify_chain:"data_files/dir4/cert61.crt data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002049
Manuel Pégourié-Gonnard8b4331a2015-11-19 10:52:12 +01002050X509 CRT verify chain #9 (zero pathlen first intermediate, valid)
Manuel Pégourié-Gonnarda3aa43d2015-11-19 10:46:07 +01002051depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002052mbedtls_x509_crt_verify_chain:"data_files/dir4/cert83.crt data_files/dir4/cert82.crt":"data_files/dir4/cert81.crt":0:0:"":0
Manuel Pégourié-Gonnarda3aa43d2015-11-19 10:46:07 +01002053
Manuel Pégourié-Gonnard8b4331a2015-11-19 10:52:12 +01002054X509 CRT verify chain #10 (zero pathlen root, valid)
2055depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002056mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":0:0:"":0
Manuel Pégourié-Gonnard8b4331a2015-11-19 10:52:12 +01002057
Manuel Pégourié-Gonnard9832cea2017-05-23 10:13:40 +02002058X509 CRT verify chain #11 (valid chain, missing profile)
2059depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002060mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":-1:MBEDTLS_ERR_X509_BAD_INPUT_DATA:"nonesuch":0
Manuel Pégourié-Gonnard9832cea2017-05-23 10:13:40 +02002061
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002062X509 CRT verify chain #12 (suiteb profile, RSA root)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002063depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002064mbedtls_x509_crt_verify_chain:"data_files/server3.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002065
2066X509 CRT verify chain #13 (RSA only profile, EC root)
2067depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002068mbedtls_x509_crt_verify_chain:"data_files/server4.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002069
Manuel Pégourié-Gonnardd0922772017-06-27 13:26:43 +02002070X509 CRT verify chain #13 (RSA only profile, EC trusted EE)
2071depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
2072mbedtls_x509_crt_verify_chain:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
2073
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002074X509 CRT verify chain #14 (RSA-3072 profile, root key too small)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002075depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002076mbedtls_x509_crt_verify_chain:"data_files/server1.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002077
2078X509 CRT verify chain #15 (suiteb profile, rsa intermediate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002079depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002080mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002081
2082X509 CRT verify chain #16 (RSA-only profile, EC intermediate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002083depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002084mbedtls_x509_crt_verify_chain:"data_files/server8.crt data_files/test-int-ca2.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002085
2086X509 CRT verify chain #17 (SHA-512 profile)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002087depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002088mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_MD:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"sha512":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002089
Manuel Pégourié-Gonnard41859782017-05-23 12:58:53 +02002090X509 CRT verify chain #18 (len=1, vrfy fatal on depth 1)
2091depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C
2092mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-2:"":2
2093
2094X509 CRT verify chain #19 (len=0, vrfy fatal on depth 0)
2095depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C
2096mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-1:"":1
2097
2098X509 CRT verify chain #20 (len=1, vrfy fatal on depth 0)
2099depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
2100mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca.crt":-1:-1:"":1
2101
2102X509 CRT verify chain #21 (len=3, vrfy fatal on depth 3)
2103depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2104mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-4:"":8
2105
2106X509 CRT verify chain #22 (len=3, vrfy fatal on depth 2)
2107depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2108mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-3:"":4
2109
2110X509 CRT verify chain #23 (len=3, vrfy fatal on depth 1)
2111depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2112mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-2:"":2
2113
2114X509 CRT verify chain #24 (len=3, vrfy fatal on depth 0)
2115depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2116mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-1:"":1
2117
2118X509 CRT verify chain #25 (len=3, vrfy fatal on depth 3, untrusted)
2119depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2120mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca2.crt":-1:-4:"":8
2121
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002122X509 OID description #1
Hanno Becker32b48ea2019-06-03 09:48:09 +01002123x509_oid_desc:"2b06010505070301":"TLS Web Server Authentication"
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002124
2125X509 OID description #2
Hanno Becker32b48ea2019-06-03 09:48:09 +01002126x509_oid_desc:"2b0601050507030f":"notfound"
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002127
2128X509 OID description #3
Hanno Becker32b48ea2019-06-03 09:48:09 +01002129x509_oid_desc:"2b0601050507030100":"notfound"
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002130
2131X509 OID numstring #1 (wide buffer)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002132x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":20:17
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002133
2134X509 OID numstring #2 (buffer just fits)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002135x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":18:17
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002136
2137X509 OID numstring #3 (buffer too small)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002138x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":17:MBEDTLS_ERR_OID_BUF_TOO_SMALL
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002139
2140X509 OID numstring #4 (larger number)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002141x509_oid_numstr:"2a864886f70d":"1.2.840.113549":15:14
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002142
2143X509 OID numstring #5 (arithmetic overflow)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002144x509_oid_numstr:"2a8648f9f8f7f6f5f4f3f2f1f001":"":100:MBEDTLS_ERR_OID_BUF_TOO_SMALL
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002145
Hanno Becker2389d162019-02-14 12:52:47 +00002146X509 CRT keyUsage #1 (no extension, expected KU)
palaviva07ecda2016-08-07 11:15:29 +03002147depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +01002148x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002149
Hanno Becker2389d162019-02-14 12:52:47 +00002150X509 CRT keyUsage #2 (no extension, surprising KU)
palaviva07ecda2016-08-07 11:15:29 +03002151depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002152x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002153
Hanno Becker2389d162019-02-14 12:52:47 +00002154X509 CRT keyUsage #3 (extension present, no KU)
palaviva07ecda2016-08-07 11:15:29 +03002155depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002156x509_check_key_usage:"data_files/server1.key_usage.crt":0:0
2157
Hanno Becker2389d162019-02-14 12:52:47 +00002158X509 CRT keyUsage #4 (extension present, single KU present)
palaviva07ecda2016-08-07 11:15:29 +03002159depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002160x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002161
Hanno Becker2389d162019-02-14 12:52:47 +00002162X509 CRT keyUsage #5 (extension present, single KU absent)
palaviva07ecda2016-08-07 11:15:29 +03002163depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002164x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002165
Hanno Becker2389d162019-02-14 12:52:47 +00002166X509 CRT keyUsage #6 (extension present, combined KU present)
palaviva07ecda2016-08-07 11:15:29 +03002167depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +01002168x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002169
Hanno Becker2389d162019-02-14 12:52:47 +00002170X509 CRT keyUsage #7 (extension present, combined KU both absent)
palaviva07ecda2016-08-07 11:15:29 +03002171depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002172x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_KU_CRL_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002173
Hanno Becker2389d162019-02-14 12:52:47 +00002174X509 CRT keyUsage #8 (extension present, combined KU one absent)
palaviva07ecda2016-08-07 11:15:29 +03002175depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +01002176x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_KEY_AGREEMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002177
Hanno Becker2389d162019-02-14 12:52:47 +00002178X509 CRT keyUsage #9 (extension present, decOnly allowed absent)
palaviva07ecda2016-08-07 11:15:29 +03002179depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard655a9642015-06-23 10:48:44 +02002180x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0
2181
Hanno Becker2389d162019-02-14 12:52:47 +00002182X509 CRT keyUsage #10 (extension present, decOnly non-allowed present)
palaviva07ecda2016-08-07 11:15:29 +03002183depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard655a9642015-06-23 10:48:44 +02002184x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA
2185
Hanno Becker2389d162019-02-14 12:52:47 +00002186X509 CRT keyUsage #11 (extension present, decOnly allowed present)
palaviva07ecda2016-08-07 11:15:29 +03002187depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard655a9642015-06-23 10:48:44 +02002188x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0
2189
Hanno Becker2389d162019-02-14 12:52:47 +00002190X509 CRT extendedKeyUsage #1 (no extension, serverAuth)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002191depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002192x509_check_extended_key_usage:"data_files/server5.crt":"2b06010505070301":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002193
Hanno Becker2389d162019-02-14 12:52:47 +00002194X509 CRT extendedKeyUsage #2 (single value, present)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002195depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002196x509_check_extended_key_usage:"data_files/server5.eku-srv.crt":"2b06010505070301":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002197
Hanno Becker2389d162019-02-14 12:52:47 +00002198X509 CRT extendedKeyUsage #3 (single value, absent)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002199depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002200x509_check_extended_key_usage:"data_files/server5.eku-cli.crt":"2b06010505070301":MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002201
Hanno Becker2389d162019-02-14 12:52:47 +00002202X509 CRT extendedKeyUsage #4 (two values, first)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002203depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002204x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070301":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002205
Hanno Becker2389d162019-02-14 12:52:47 +00002206X509 CRT extendedKeyUsage #5 (two values, second)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002207depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002208x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070302":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002209
Hanno Becker2389d162019-02-14 12:52:47 +00002210X509 CRT extendedKeyUsage #6 (two values, other)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002211depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002212x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070303":MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002213
Hanno Becker2389d162019-02-14 12:52:47 +00002214X509 CRT extendedKeyUsage #7 (any, random)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002215depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002216x509_check_extended_key_usage:"data_files/server5.eku-cs_any.crt":"2b060105050703ff":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002217
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002218X509 RSASSA-PSS parameters ASN1 (good, all defaults)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002219x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002220
2221X509 RSASSA-PSS parameters ASN1 (wrong initial tag)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002222x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002223
2224X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002225x509_parse_rsassa_pss_params:"a400":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002226
2227X509 RSASSA-PSS parameters ASN1 (good, HashAlg SHA256)
palaviva07ecda2016-08-07 11:15:29 +03002228depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002229x509_parse_rsassa_pss_params:"a00d300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002230
2231X509 RSASSA-PSS parameters ASN1 (good, explicit HashAlg = default)
palaviva07ecda2016-08-07 11:15:29 +03002232depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002233x509_parse_rsassa_pss_params:"a009300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002234
2235X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002236x509_parse_rsassa_pss_params:"a00a300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002237
2238X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #2)
palaviva07ecda2016-08-07 11:15:29 +03002239depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002240x509_parse_rsassa_pss_params:"a00a300706052b0e03021a00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002241
2242X509 RSASSA-PSS parameters ASN1 (HashAlg with parameters)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002243x509_parse_rsassa_pss_params:"a00f300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002244
Paul Bakker237a8472014-06-25 14:45:24 +02002245X509 RSASSA-PSS parameters ASN1 (HashAlg unknown OID)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002246x509_parse_rsassa_pss_params:"a00d300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002247
2248X509 RSASSA-PSS parameters ASN1 (good, MGAlg = MGF1-SHA256)
palaviva07ecda2016-08-07 11:15:29 +03002249depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002250x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002251
2252X509 RSASSA-PSS parameters ASN1 (good, explicit MGAlg = default)
palaviva07ecda2016-08-07 11:15:29 +03002253depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002254x509_parse_rsassa_pss_params:"a116301406092a864886f70d010108300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002255
2256X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002257x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002258
2259X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #2)
palaviva07ecda2016-08-07 11:15:29 +03002260depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002261x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b060960864801650304020100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002262
2263X509 RSASSA-PSS parameters ASN1 (MGAlg AlgId wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002264x509_parse_rsassa_pss_params:"a11a301906092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002265
2266X509 RSASSA-PSS parameters ASN1 (MGAlg OID != MGF1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002267x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010109300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE + MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002268
2269X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002270x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108310b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002271
2272X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002273x509_parse_rsassa_pss_params:"a10f300d06092a864886f70d0101083000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002274
2275X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002276x509_parse_rsassa_pss_params:"a11b301906092a864886f70d010108300c0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002277
2278X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002279x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0709608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002280
2281X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002282x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002283
2284X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL)
palaviva07ecda2016-08-07 11:15:29 +03002285depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002286x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002287
2288X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag)
palaviva07ecda2016-08-07 11:15:29 +03002289depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002290x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002291
2292X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1c)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002293x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002294
2295X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #2)
palaviva07ecda2016-08-07 11:15:29 +03002296depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002297x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e0609608648016503040201050000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002298
2299X509 RSASSA-PSS parameters ASN1 (good, saltLen = 94)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002300x509_parse_rsassa_pss_params:"a20302015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002301
2302X509 RSASSA-PSS parameters ASN1 (good, explicit saltLen = default)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002303x509_parse_rsassa_pss_params:"a203020114":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002304
2305X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002306x509_parse_rsassa_pss_params:"a20402015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002307
2308X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #2)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002309x509_parse_rsassa_pss_params:"a20402015e00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002310
2311X509 RSASSA-PSS parameters ASN1 (saltLen not an int)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002312x509_parse_rsassa_pss_params:"a2023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002313
2314X509 RSASSA-PSS parameters ASN1 (good, explicit trailerField = default)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002315x509_parse_rsassa_pss_params:"a303020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002316
2317X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002318x509_parse_rsassa_pss_params:"a304020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002319
2320X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #2)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002321x509_parse_rsassa_pss_params:"a30402010100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002322
2323X509 RSASSA-PSS parameters ASN1 (trailerField not an int)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002324x509_parse_rsassa_pss_params:"a3023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002325
2326X509 RSASSA-PSS parameters ASN1 (trailerField not 1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002327x509_parse_rsassa_pss_params:"a303020102":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002328
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002329X509 CSR ASN.1 (OK)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002330depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002331mbedtls_x509_csr_parse:"308201183081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010349003046022100b49fd8c8f77abfa871908dfbe684a08a793d0f490a43d86fcf2086e4f24bb0c2022100f829d5ccd3742369299e6294394717c4b723a0f68b44e831b6e6c3bcabf97243":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n":0
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002332
2333X509 CSR ASN.1 (bad first tag)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002334mbedtls_x509_csr_parse:"3100":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002335
2336X509 CSR ASN.1 (bad sequence: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002337mbedtls_x509_csr_parse:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002338
2339X509 CSR ASN.1 (total length mistmatch)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002340mbedtls_x509_csr_parse:"30010000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002341
2342X509 CSR ASN.1 (bad CRI: not a sequence)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002343mbedtls_x509_csr_parse:"30023100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002344
2345X509 CSR ASN.1 (bad CRI: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002346mbedtls_x509_csr_parse:"30023001":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002347
2348X509 CSR ASN.1 (bad CRI.Version: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002349mbedtls_x509_csr_parse:"30053002020100":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002350
2351X509 CSR ASN.1 (bad CRI.Version: not v1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002352mbedtls_x509_csr_parse:"30053003020101":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002353
2354X509 CSR ASN.1 (bad CRI.Name: not a sequence)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002355mbedtls_x509_csr_parse:"300730050201003100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002356
2357X509 CSR ASN.1 (bad CRI.Name: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002358mbedtls_x509_csr_parse:"30083005020100300100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002359
2360X509 CSR ASN.1 (bad CRI.Name payload: not a set)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002361mbedtls_x509_csr_parse:"3009300702010030023000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002362
2363X509 CSR ASN.1 (bad CRI.Name payload: overlong)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002364mbedtls_x509_csr_parse:"300a30080201003002310100":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002365
2366X509 CSR ASN.1 (bad SubjectPublicKeyInfo: missing)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002367mbedtls_x509_csr_parse:"30143012020100300d310b3009060355040613024e4c":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002368
2369X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002370mbedtls_x509_csr_parse:"30163014020100300d310b3009060355040613024e4c3100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002371
2372X509 CSR ASN.1 (bad SubjectPublicKeyInfo: overlong)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002373mbedtls_x509_csr_parse:"30173014020100300d310b3009060355040613024e4c300100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002374
2375X509 CSR ASN.1 (bad attributes: missing)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002376depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002377mbedtls_x509_csr_parse:"3081973081940201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002378
2379X509 CSR ASN.1 (bad attributes: bad tag)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002380depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002381mbedtls_x509_csr_parse:"3081993081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002382
2383X509 CSR ASN.1 (bad attributes: overlong)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002384depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002385mbedtls_x509_csr_parse:"30819a3081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa00100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002386
2387X509 CSR ASN.1 (bad sigAlg: missing)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002388depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002389mbedtls_x509_csr_parse:"3081c23081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002390
2391X509 CSR ASN.1 (bad sigAlg: not a sequence)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002392depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002393mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002394
2395X509 CSR ASN.1 (bad sigAlg: overlong)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002396depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002397mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002398
2399X509 CSR ASN.1 (bad sigAlg: unknown)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002400depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002401mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002402
2403X509 CSR ASN.1 (bad sig: missing)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002404depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002405mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d0401":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002406
2407X509 CSR ASN.1 (bad sig: not a bit string)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002408depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002409mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010400":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002410
2411X509 CSR ASN.1 (bad sig: overlong)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002412depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002413mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002414
2415X509 CSR ASN.1 (extra data after signature)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002416depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002417mbedtls_x509_csr_parse:"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":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakker5a5fa922014-09-26 14:53:04 +02002418
Andres AGf00baff2017-03-07 10:57:34 +00002419X509 CSR ASN.1 (invalid version overflow)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002420mbedtls_x509_csr_parse:"3008300602047fffffff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Andres AGf00baff2017-03-07 10:57:34 +00002421
Paul Bakker5a5fa922014-09-26 14:53:04 +02002422X509 File parse (no issues)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002423depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Paul Bakker5a5fa922014-09-26 14:53:04 +02002424x509parse_crt_file:"data_files/server7_int-ca.crt":0
2425
2426X509 File parse (extra space in one certificate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002427depends_on:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Paul Bakker5a5fa922014-09-26 14:53:04 +02002428x509parse_crt_file:"data_files/server7_pem_space.crt":1
2429
2430X509 File parse (all certificates fail)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002431depends_on:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002432x509parse_crt_file:"data_files/server7_all_space.crt":MBEDTLS_ERR_PEM_INVALID_DATA + MBEDTLS_ERR_BASE64_INVALID_CHARACTER
Manuel Pégourié-Gonnard052d10c2015-07-31 11:09:59 +02002433
2434X509 File parse (trailing spaces, OK)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002435depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard052d10c2015-07-31 11:09:59 +02002436x509parse_crt_file:"data_files/server7_trailing_space.crt":0
Andres AG4b76aec2016-09-23 13:16:02 +01002437
2438X509 Get time (UTC no issues)
2439depends_on:MBEDTLS_X509_USE_C
2440x509_get_time:MBEDTLS_ASN1_UTC_TIME:"500101000000Z":0:1950:1:1:0:0:0
2441
2442X509 Get time (Generalized Time no issues)
2443depends_on:MBEDTLS_X509_USE_C
2444x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"99991231235959Z":0:9999:12:31:23:59:59
2445
2446X509 Get time (UTC year without leap day)
2447depends_on:MBEDTLS_X509_USE_C
2448x509_get_time:MBEDTLS_ASN1_UTC_TIME:"490229121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2449
2450X509 Get time (UTC year with leap day)
2451depends_on:MBEDTLS_X509_USE_C
2452x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212Z":0:2000:2:29:12:12:12
2453
2454X509 Get time (UTC invalid day of month #1)
2455depends_on:MBEDTLS_X509_USE_C
2456x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000132121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2457
2458X509 Get time (UTC invalid day of month #2)
2459depends_on:MBEDTLS_X509_USE_C
2460x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001131121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2461
2462X509 Get time (UTC invalid hour)
2463depends_on:MBEDTLS_X509_USE_C
2464x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130241212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2465
2466X509 Get time (UTC invalid min)
2467depends_on:MBEDTLS_X509_USE_C
2468x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130236012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2469
2470X509 Get time (UTC invalid sec)
2471depends_on:MBEDTLS_X509_USE_C
2472x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130235960Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
Janos Follathea7054a2017-02-08 14:13:02 +00002473
2474X509 Get time (UTC without time zone)
2475depends_on:MBEDTLS_X509_USE_C
2476x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212":0:2000:2:29:12:12:12
2477
2478X509 Get time (UTC with invalid time zone #1)
2479depends_on:MBEDTLS_X509_USE_C
2480x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2481
2482X509 Get time (UTC with invalid time zone #2)
2483depends_on:MBEDTLS_X509_USE_C
2484x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2485
2486X509 Get time (Date with invalid tag)
2487depends_on:MBEDTLS_X509_USE_C
2488x509_get_time:MBEDTLS_ASN1_CONTEXT_SPECIFIC:"000229121212":MBEDTLS_ERR_X509_INVALID_DATE+MBEDTLS_ERR_ASN1_UNEXPECTED_TAG:0:0:0:0:0:0
2489
2490X509 Get time (UTC, truncated)
2491depends_on:MBEDTLS_X509_USE_C
2492x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2493
2494X509 Get time (Generalized Time, truncated)
2495depends_on:MBEDTLS_X509_USE_C
2496x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2497
2498X509 Get time (UTC without seconds)
2499depends_on:MBEDTLS_X509_USE_C
2500x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212":MBEDTLS_ERR_X509_INVALID_DATE:2000:2:29:12:12:0
2501
2502X509 Get time (UTC without seconds and with invalid time zone #1)
2503depends_on:MBEDTLS_X509_USE_C
2504x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2505
2506X509 Get time (UTC without second and with invalid time zone #2)
2507depends_on:MBEDTLS_X509_USE_C
2508x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2509
2510X509 Get time (UTC invalid character in year)
2511depends_on:MBEDTLS_X509_USE_C
2512x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0\1130231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2513
2514X509 Get time (UTC invalid character in month)
2515depends_on:MBEDTLS_X509_USE_C
2516x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001%30231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2517
2518X509 Get time (UTC invalid character in day)
2519depends_on:MBEDTLS_X509_USE_C
2520x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011`0231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2521
2522X509 Get time (UTC invalid character in hour)
2523depends_on:MBEDTLS_X509_USE_C
2524x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302h1212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2525
2526X509 Get time (UTC invalid character in min)
2527depends_on:MBEDTLS_X509_USE_C
2528x509_get_time:MBEDTLS_ASN1_UTC_TIME:"00113023u012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2529
2530X509 Get time (UTC invalid character in sec)
2531depends_on:MBEDTLS_X509_USE_C
2532x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302359n0Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2533
Andres Amaya Garcia60100d02017-10-06 17:05:24 +01002534X509 Get time (Generalized Time, year multiple of 100 but not 400 is not a leap year)
Andres Amaya Garcia735b37e2016-11-21 15:38:02 +00002535depends_on:MBEDTLS_X509_USE_C
2536x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19000229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2537
Andres Amaya Garcia60100d02017-10-06 17:05:24 +01002538X509 Get time (Generalized Time, year multiple of 4 but not 100 is a leap year)
Andres Amaya Garcia735b37e2016-11-21 15:38:02 +00002539depends_on:MBEDTLS_X509_USE_C
2540x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19920229000000Z":0:1992:2:29:0:0:0
2541
Andres Amaya Garcia60100d02017-10-06 17:05:24 +01002542X509 Get time (Generalized Time, year multiple of 400 is a leap year)
Andres Amaya Garcia735b37e2016-11-21 15:38:02 +00002543depends_on:MBEDTLS_X509_USE_C
2544x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229000000Z":0:2000:2:29:0:0:0
2545
2546X509 Get time (Generalized Time invalid leap year not multiple of 4, 100 or 400)
2547depends_on:MBEDTLS_X509_USE_C
2548x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19910229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
Manuel Pégourié-Gonnardda19f4c2018-06-12 12:40:54 +02002549
Hanno Becker2389d162019-02-14 12:52:47 +00002550X509 CRT verify restart: trusted EE, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002551depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
2552x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:0:0:0
2553
Hanno Becker2389d162019-02-14 12:52:47 +00002554X509 CRT verify restart: trusted EE, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002555depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
2556x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:1:0:0
2557
Hanno Becker2389d162019-02-14 12:52:47 +00002558X509 CRT verify restart: no intermediate, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002559depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2560x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:0:0:0
2561
Hanno Becker2389d162019-02-14 12:52:47 +00002562X509 CRT verify restart: no intermediate, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002563depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2564x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:1:100:10000
2565
Hanno Becker2389d162019-02-14 12:52:47 +00002566X509 CRT verify restart: no intermediate, max_ops=40000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002567depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2568x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:40000:0:0
2569
Hanno Becker2389d162019-02-14 12:52:47 +00002570X509 CRT verify restart: no intermediate, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002571depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2572x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:500:20:80
2573
Hanno Becker2389d162019-02-14 12:52:47 +00002574X509 CRT verify restart: no intermediate, badsign, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002575depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2576x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0
2577
Hanno Becker2389d162019-02-14 12:52:47 +00002578X509 CRT verify restart: no intermediate, badsign, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002579depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2580x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000
2581
Hanno Becker2389d162019-02-14 12:52:47 +00002582X509 CRT verify restart: no intermediate, badsign, max_ops=40000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002583depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2584x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:40000:0:0
2585
Hanno Becker2389d162019-02-14 12:52:47 +00002586X509 CRT verify restart: no intermediate, badsign, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002587depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2588x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:20:80
2589
Hanno Becker2389d162019-02-14 12:52:47 +00002590X509 CRT verify restart: one int, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002591depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2592x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:0:0:0
2593
Hanno Becker2389d162019-02-14 12:52:47 +00002594X509 CRT verify restart: one int, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002595depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2596x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:1:100:10000
2597
Hanno Becker2389d162019-02-14 12:52:47 +00002598X509 CRT verify restart: one int, max_ops=30000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002599depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2600x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:30000:0:0
2601
Hanno Becker2389d162019-02-14 12:52:47 +00002602X509 CRT verify restart: one int, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002603depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2604x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:500:25:100
2605
Hanno Becker2389d162019-02-14 12:52:47 +00002606X509 CRT verify restart: one int, EE badsign, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002607depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2608x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0
2609
Hanno Becker2389d162019-02-14 12:52:47 +00002610X509 CRT verify restart: one int, EE badsign, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002611depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2612x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000
2613
Hanno Becker2389d162019-02-14 12:52:47 +00002614X509 CRT verify restart: one int, EE badsign, max_ops=30000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002615depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2616x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0
2617
Hanno Becker2389d162019-02-14 12:52:47 +00002618X509 CRT verify restart: one int, EE badsign, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002619depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2620x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100
2621
Hanno Becker2389d162019-02-14 12:52:47 +00002622X509 CRT verify restart: one int, int badsign, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002623depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2624x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002625
Hanno Becker2389d162019-02-14 12:52:47 +00002626X509 CRT verify restart: one int, int badsign, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002627depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2628x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000
2629
Hanno Becker2389d162019-02-14 12:52:47 +00002630X509 CRT verify restart: one int, int badsign, max_ops=30000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002631depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2632x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0
2633
Hanno Becker2389d162019-02-14 12:52:47 +00002634X509 CRT verify restart: one int, int badsign, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002635depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2636x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100