Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1 | X509 CRT information #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 3 | x509_cert_info:"data_files/server1.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 4 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 5 | X509 CRT information #1 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 6 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 7 | x509_cert_info:"data_files/server1.der":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
| 8 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 9 | X509 CRT information #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 10 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 11 | x509_cert_info:"data_files/server2.crt":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 12 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 13 | X509 CRT information #2 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 14 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 15 | x509_cert_info:"data_files/server2.der":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
| 16 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 17 | X509 CRT information #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 18 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 19 | x509_cert_info:"data_files/test-ca.crt":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2011-02-12 14\:44\:00\nexpires on \: 2021-02-12 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 20 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 21 | X509 CRT information #3 (DER) |
Hanno Becker | 462c3e5 | 2019-01-31 10:55:42 +0000 | [diff] [blame] | 22 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 23 | x509_cert_info:"data_files/test-ca.der":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2011-02-12 14\:44\:00\nexpires on \: 2021-02-12 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n" |
| 24 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 25 | X509 CRT information MD2 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 26 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD2_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 27 | x509_cert_info:"data_files/cert_md2.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD2\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 28 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 29 | X509 CRT information MD4 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 30 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD4_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 31 | x509_cert_info:"data_files/cert_md4.crt":"cert. version \: 3\nserial number \: 05\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD4\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 32 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 33 | X509 CRT information MD5 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 34 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD5_C |
Hanno Becker | 2e0f71f | 2019-06-03 14:14:04 +0100 | [diff] [blame] | 35 | x509_cert_info:"data_files/cert_md5.crt":"cert. version \: 3\nserial number \: 06\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD5\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 36 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 37 | X509 CRT information SHA1 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 38 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 39 | x509_cert_info:"data_files/cert_sha1.crt":"cert. version \: 3\nserial number \: 07\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA1\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 40 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 41 | X509 CRT information SHA224 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 42 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 43 | x509_cert_info:"data_files/cert_sha224.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA224\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 44 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 45 | X509 CRT information SHA256 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 46 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 47 | x509_cert_info:"data_files/cert_sha256.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA256\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 48 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 49 | X509 CRT information SHA384 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 50 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 51 | x509_cert_info:"data_files/cert_sha384.crt":"cert. version \: 3\nserial number \: 0A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA384\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 52 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 53 | X509 CRT information SHA512 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 54 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 55 | x509_cert_info:"data_files/cert_sha512.crt":"cert. version \: 3\nserial number \: 0B\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA512\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 56 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 57 | X509 CRT information RSA-PSS, SHA1 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 58 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 59 | x509_cert_info:"data_files/server9.crt":"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 60 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 61 | X509 CRT information RSA-PSS, SHA224 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 62 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 63 | x509_cert_info:"data_files/server9-sha224.crt":"cert. version \: 3\nserial number \: 17\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:36\nexpires on \: 2024-01-18 13\:57\:36\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 64 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 65 | X509 CRT information RSA-PSS, SHA256 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 66 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 67 | x509_cert_info:"data_files/server9-sha256.crt":"cert. version \: 3\nserial number \: 18\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:45\nexpires on \: 2024-01-18 13\:57\:45\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 68 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 69 | X509 CRT information RSA-PSS, SHA384 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 70 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 71 | x509_cert_info:"data_files/server9-sha384.crt":"cert. version \: 3\nserial number \: 19\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:58\nexpires on \: 2024-01-18 13\:57\:58\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 72 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 73 | X509 CRT information RSA-PSS, SHA512 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 74 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 78117d5 | 2014-05-31 17:08:16 +0200 | [diff] [blame] | 75 | x509_cert_info:"data_files/server9-sha512.crt":"cert. version \: 3\nserial number \: 1A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:58\:12\nexpires on \: 2024-01-18 13\:58\:12\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 59a75d5 | 2014-01-22 10:12:57 +0100 | [diff] [blame] | 76 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 77 | X509 CRT information EC, SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 78 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 79 | x509_cert_info:"data_files/server5-sha1.crt":"cert. version \: 3\nserial number \: 12\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 80 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 81 | X509 CRT information EC, SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 82 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 83 | x509_cert_info:"data_files/server5-sha224.crt":"cert. version \: 3\nserial number \: 13\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 84 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 85 | X509 CRT information EC, SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 86 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 87 | x509_cert_info:"data_files/server5.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 88 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 89 | X509 CRT information EC, SHA384 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 90 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 91 | x509_cert_info:"data_files/server5-sha384.crt":"cert. version \: 3\nserial number \: 14\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 92 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 93 | X509 CRT information EC, SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 94 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 95 | x509_cert_info:"data_files/server5-sha512.crt":"cert. version \: 3\nserial number \: 15\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 96 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 97 | X509 CRT information EC, SHA256 Digest, hardware module name SAN |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 98 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 99 | x509_cert_info:"data_files/server5-othername.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nissued on \: 2019-03-24 09\:06\:02\nexpires on \: 2029-03-21 09\:06\:02\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n" |
| 100 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 101 | X509 CRT information EC, SHA256 Digest, Wisun Fan device |
Ron Eldor | 3c4734a | 2019-03-25 14:05:23 +0200 | [diff] [blame] | 102 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 103 | x509_cert_info:"data_files/server5-fan.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nissued on \: 2019-03-25 09\:03\:46\nexpires on \: 2029-03-22 09\:03\:46\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\next key usage \: Wi-SUN Alliance Field Area Network (FAN)\n" |
| 104 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 105 | X509 CRT information, NS Cert Type |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 106 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 919f8f5 | 2014-04-01 13:01:11 +0200 | [diff] [blame] | 107 | x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\ncert. type \: SSL Server\n" |
| 108 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 109 | X509 CRT information, Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 110 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 7b30cfc | 2014-04-01 18:00:07 +0200 | [diff] [blame] | 111 | x509_cert_info:"data_files/server1.key_usage.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n" |
Manuel Pégourié-Gonnard | 65c2ddc | 2014-04-01 14:12:11 +0200 | [diff] [blame] | 112 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 113 | X509 CRT information, Key Usage with decipherOnly |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 114 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 9a70225 | 2015-06-23 10:14:36 +0200 | [diff] [blame] | 115 | x509_cert_info:"data_files/keyUsage.decipherOnly.crt":"cert. version \: 3\nserial number \: 9B\:13\:CE\:4C\:A5\:6F\:DE\:52\nissuer name \: C=GB, L=Cambridge, O=Default Company Ltd\nsubject name \: C=GB, L=Cambridge, O=Default Company Ltd\nissued on \: 2015-05-12 10\:36\:55\nexpires on \: 2018-05-11 10\:36\:55\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment, Decipher Only\n" |
| 116 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 117 | X509 CRT information, Subject Alt Name |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 118 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 119 | x509_cert_info:"data_files/cert_example_multi.crt":"cert. version \: 3\nserial number \: 11\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=www.example.com\nissued on \: 2012-05-10 13\:23\:41\nexpires on \: 2022-05-11 13\:23\:41\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: example.com\n dNSName \: example.net\n dNSName \: *.example.org\n" |
| 120 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 121 | X509 CRT information, Multiple different Subject Alt Name |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 122 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 123 | x509_cert_info:"data_files/multiple_san.crt":"cert. version \: 3\nserial number \: 04\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nissued on \: 2019-04-22 16\:10\:48\nexpires on \: 2029-04-19 16\:10\:48\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n dNSName \: example.com\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n dNSName \: example.net\n dNSName \: *.example.org\n" |
Manuel Pégourié-Gonnard | bce2b30 | 2014-04-01 13:43:28 +0200 | [diff] [blame] | 124 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 125 | X509 CRT information, Subject Alt Name + Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 126 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Janos Follath | 22f605f | 2019-05-10 10:37:17 +0100 | [diff] [blame] | 127 | x509_cert_info:"data_files/cert_example_multi_nocn.crt":"cert. version \: 3\nserial number \: F7\:C6\:7F\:F8\:E9\:A9\:63\:F9\nissuer name \: C=NL\nsubject name \: C=NL\nissued on \: 2014-01-22 10\:04\:33\nexpires on \: 2024-01-22 10\:04\:33\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: www.shotokan-braunschweig.de\n dNSName \: www.massimo-abate.eu\n <unsupported>\n <unsupported>\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n" |
Manuel Pégourié-Gonnard | 65c2ddc | 2014-04-01 14:12:11 +0200 | [diff] [blame] | 128 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 129 | X509 CRT information, RSA Certificate Policy any |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 130 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 131 | x509_cert_info:"data_files/test-ca-any_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-03-21 16\:40\:59\nexpires on \: 2029-03-21 16\:40\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 132 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 133 | X509 CRT information, ECDSA Certificate Policy any |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 134 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 135 | x509_cert_info:"data_files/test-ca-any_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-03-25 09\:02\:45\nexpires on \: 2029-03-25 09\:02\:45\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 136 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 137 | X509 CRT information, RSA Certificate Policy any with qualifier |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 138 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 139 | x509_cert_info:"data_files/test-ca-any_policy_with_qualifier.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:14\:31\nexpires on \: 2029-04-28 13\:14\:31\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 140 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 141 | X509 CRT information, ECDSA Certificate Policy any with qualifier |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 142 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 143 | x509_cert_info:"data_files/test-ca-any_policy_with_qualifier_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 10\:16\:05\nexpires on \: 2029-04-28 10\:16\:05\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n" |
| 144 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 145 | X509 CRT information, RSA Certificate multiple Policies |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 146 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 147 | x509_cert_info:"data_files/test-ca-multi_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 12\:59\:19\nexpires on \: 2029-04-28 12\:59\:19\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n" |
| 148 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 149 | X509 CRT information, ECDSA Certificate multiple Policies |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 150 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 151 | x509_cert_info:"data_files/test-ca-multi_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 12\:59\:51\nexpires on \: 2029-04-28 12\:59\:51\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n" |
| 152 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 153 | X509 CRT information, RSA Certificate unsupported policy |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 154 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 155 | x509_cert_info:"data_files/test-ca-unsupported_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:00\:13\nexpires on \: 2029-04-28 13\:00\:13\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n" |
| 156 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 157 | X509 CRT information, ECDSA Certificate unsupported policy |
Ron Eldor | 74d9acc | 2019-03-21 14:00:03 +0200 | [diff] [blame] | 158 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
| 159 | x509_cert_info:"data_files/test-ca-unsupported_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 13\:00\:19\nexpires on \: 2029-04-28 13\:00\:19\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n" |
| 160 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 161 | X509 CRT information, Key Usage + Extended Key Usage |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 162 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 7b30cfc | 2014-04-01 18:00:07 +0200 | [diff] [blame] | 163 | x509_cert_info:"data_files/server1.ext_ku.crt":"cert. version \: 3\nserial number \: 21\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2014-04-01 14\:44\:43\nexpires on \: 2024-03-29 14\:44\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\next key usage \: TLS Web Server Authentication\n" |
Manuel Pégourié-Gonnard | f6f4ab4 | 2014-04-01 17:32:44 +0200 | [diff] [blame] | 164 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 165 | X509 CRT information RSA signed by EC |
palaviv | f180df9 | 2016-08-07 11:56:02 +0300 | [diff] [blame] | 166 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 167 | x509_cert_info:"data_files/server4.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 168 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 169 | X509 CRT information EC signed by RSA |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 170 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | b28487d | 2014-04-01 12:19:09 +0200 | [diff] [blame] | 171 | x509_cert_info:"data_files/server3.crt":"cert. version \: 3\nserial number \: 0D\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-08-09 09\:17\:03\nexpires on \: 2023-08-07 09\:17\:03\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\nbasic constraints \: CA=false\n" |
Manuel Pégourié-Gonnard | 6d29ff2 | 2013-08-10 09:44:43 +0200 | [diff] [blame] | 172 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 173 | X509 CRT information Bitstring in subject name |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 174 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Janos Follath | 22f605f | 2019-05-10 10:37:17 +0100 | [diff] [blame] | 175 | x509_cert_info:"data_files/bitstring-in-dn.pem":"cert. version \: 3\nserial number \: 02\nissuer name \: CN=Test CA 01, ST=Ecnivorp, C=XX, emailAddress=tca@example.com, O=Test CA Authority\nsubject name \: C=XX, O=tca, ST=Ecnivorp, OU=TCA, CN=Client, emailAddress=client@example.com, serialNumber=7101012255, uniqueIdentifier=?7101012255\nissued on \: 2015-03-11 12\:06\:51\nexpires on \: 2025-03-08 12\:06\:51\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n <unsupported>\next key usage \: TLS Web Client Authentication\n" |
Manuel Pégourié-Gonnard | 39ead3e | 2015-03-27 13:09:21 +0100 | [diff] [blame] | 176 | |
Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 177 | X509 certificate v1 with extension |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 178 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_SHA1_C |
Ron Eldor | b2dc3fa | 2019-03-21 13:40:13 +0200 | [diff] [blame] | 179 | x509_cert_info:"data_files/cert_v1_with_ext.crt":"cert. version \: 1\nserial number \: BD\:ED\:44\:C7\:D2\:3E\:C2\:A4\nissuer name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nsubject name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nissued on \: 2013-07-04 16\:17\:02\nexpires on \: 2014-07-04 16\:17\:02\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nsubject alt name \:\n dNSName \: identity-check.org\n dNSName \: www.identity-check.org\n" |
| 180 | |
| 181 | X509 SAN parsing otherName |
| 182 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 183 | x509_parse_san:"data_files/server5-othername.crt":"type \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\n" |
| 184 | |
| 185 | X509 SAN parsing dNSName |
| 186 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 187 | x509_parse_san:"data_files/cert_example_multi.crt":"type \: 2\ndNSName \: example.com\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n" |
| 188 | |
| 189 | X509 SAN parsing Multiple different types |
| 190 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 191 | x509_parse_san:"data_files/multiple_san.crt":"type \: 2\ndNSName \: example.com\ntype \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n" |
| 192 | |
| 193 | X509 SAN parsing, no subject alt name |
| 194 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 195 | x509_parse_san:"data_files/server4.crt":"" |
| 196 | |
| 197 | X509 SAN parsing, unsupported otherName name |
| 198 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
| 199 | x509_parse_san:"data_files/server5-unsupported_othername.crt":"" |
Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 200 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 201 | X509 CRL information #1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 202 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 203 | mbedtls_x509_crl_info:"data_files/crl_expired.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-20 10\:24\:19\nnext update \: 2011-02-20 11\:24\:19\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 204 | |
| 205 | X509 CRL Information MD2 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 206 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD2_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 207 | mbedtls_x509_crl_info:"data_files/crl_md2.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2009-07-19 19\:56\:37\nnext update \: 2009-09-17 19\:56\:37\nRevoked certificates\:\nserial number\: 01 revocation date\: 2009-02-09 21\:12\:36\nserial number\: 03 revocation date\: 2009-02-09 21\:12\:36\nsigned using \: RSA with MD2\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 208 | |
| 209 | X509 CRL Information MD4 Digest |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 210 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 211 | mbedtls_x509_crl_info:"data_files/crl_md4.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD4\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 212 | |
| 213 | X509 CRL Information MD5 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 214 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 215 | mbedtls_x509_crl_info:"data_files/crl_md5.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD5\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 216 | |
| 217 | X509 CRL Information SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 218 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 219 | mbedtls_x509_crl_info:"data_files/crl_sha1.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 220 | |
| 221 | X509 CRL Information SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 222 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 223 | mbedtls_x509_crl_info:"data_files/crl_sha224.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 224 | |
| 225 | X509 CRL Information SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 226 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 227 | mbedtls_x509_crl_info:"data_files/crl_sha256.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 228 | |
| 229 | X509 CRL Information SHA384 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 230 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 231 | mbedtls_x509_crl_info:"data_files/crl_sha384.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\n" |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 232 | |
| 233 | X509 CRL Information SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 234 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 235 | mbedtls_x509_crl_info:"data_files/crl_sha512.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\n" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 236 | |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 237 | X509 CRL information RSA-PSS, SHA1 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 238 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
| 239 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:46\:35\nnext update \: 2024-01-18 13\:46\:35\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 240 | |
| 241 | X509 CRL information RSA-PSS, SHA224 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 242 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 243 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:06\nnext update \: 2024-01-18 13\:56\:06\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 244 | |
| 245 | X509 CRL information RSA-PSS, SHA256 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 246 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 247 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:16\nnext update \: 2024-01-18 13\:56\:16\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 248 | |
| 249 | X509 CRL information RSA-PSS, SHA384 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 250 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 251 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:28\nnext update \: 2024-01-18 13\:56\:28\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 252 | |
| 253 | X509 CRL information RSA-PSS, SHA512 Digest |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 254 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 255 | mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:38\nnext update \: 2024-01-18 13\:56\:38\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\n" |
Manuel Pégourié-Gonnard | 8e42ff6 | 2014-01-24 15:56:20 +0100 | [diff] [blame] | 256 | |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 257 | X509 CRL Information EC, SHA1 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 258 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 259 | mbedtls_x509_crl_info:"data_files/crl-ec-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA1\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 260 | |
| 261 | X509 CRL Information EC, SHA224 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 262 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 263 | mbedtls_x509_crl_info:"data_files/crl-ec-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA224\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 264 | |
| 265 | X509 CRL Information EC, SHA256 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 266 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 267 | mbedtls_x509_crl_info:"data_files/crl-ec-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA256\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 268 | |
| 269 | X509 CRL Information EC, SHA384 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 270 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 271 | mbedtls_x509_crl_info:"data_files/crl-ec-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA384\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 272 | |
| 273 | X509 CRL Information EC, SHA512 Digest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 274 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 275 | mbedtls_x509_crl_info:"data_files/crl-ec-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA512\n" |
Manuel Pégourié-Gonnard | 05b9dce | 2013-08-10 10:19:03 +0200 | [diff] [blame] | 276 | |
Andres AG | a39db39 | 2016-12-08 17:10:38 +0000 | [diff] [blame] | 277 | X509 CRL Malformed Input (trailing spaces at end of file) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 278 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C |
Andres AG | a39db39 | 2016-12-08 17:10:38 +0000 | [diff] [blame] | 279 | mbedtls_x509_crl_parse:"data_files/crl-malformed-trailing-spaces.pem":MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT |
| 280 | |
Manuel Pégourié-Gonnard | fd3e4fb | 2018-03-13 11:53:30 +0100 | [diff] [blame] | 281 | X509 CRL Unsupported critical extension (issuingDistributionPoint) |
| 282 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 283 | mbedtls_x509_crl_parse:"data_files/crl-idp.pem":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 284 | |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 285 | X509 CRL Unsupported non-critical extension (issuingDistributionPoint) |
| 286 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 287 | mbedtls_x509_crl_parse:"data_files/crl-idpnc.pem":0 |
| 288 | |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 289 | X509 CSR Information RSA with MD4 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 290 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 291 | mbedtls_x509_csr_info:"data_files/server1.req.md4":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 292 | |
| 293 | X509 CSR Information RSA with MD5 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 294 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 295 | mbedtls_x509_csr_info:"data_files/server1.req.md5":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 296 | |
| 297 | X509 CSR Information RSA with SHA1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 298 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 299 | mbedtls_x509_csr_info:"data_files/server1.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 300 | |
| 301 | X509 CSR Information RSA with SHA224 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 302 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 303 | mbedtls_x509_csr_info:"data_files/server1.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 304 | |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 305 | X509 CSR Information RSA with SHA-256 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 306 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 307 | mbedtls_x509_csr_info:"data_files/server1.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 308 | |
| 309 | X509 CSR Information RSA with SHA384 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 310 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 311 | mbedtls_x509_csr_info:"data_files/server1.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 312 | |
| 313 | X509 CSR Information RSA with SHA512 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 314 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 315 | mbedtls_x509_csr_info:"data_files/server1.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 316 | |
| 317 | X509 CSR Information EC with SHA1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 318 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 319 | mbedtls_x509_csr_info:"data_files/server5.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 320 | |
| 321 | X509 CSR Information EC with SHA224 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 322 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 323 | mbedtls_x509_csr_info:"data_files/server5.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 324 | |
| 325 | X509 CSR Information EC with SHA256 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 326 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 327 | mbedtls_x509_csr_info:"data_files/server5.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 328 | |
| 329 | X509 CSR Information EC with SHA384 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 330 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 331 | mbedtls_x509_csr_info:"data_files/server5.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 332 | |
| 333 | X509 CSR Information EC with SHA512 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 334 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 335 | mbedtls_x509_csr_info:"data_files/server5.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\n" |
Manuel Pégourié-Gonnard | 2a8d7fd | 2014-01-24 17:34:26 +0100 | [diff] [blame] | 336 | |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 337 | X509 CSR Information RSA-PSS with SHA1 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 338 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
| 339 | mbedtls_x509_csr_info:"data_files/server9.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0x6A)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 340 | |
| 341 | X509 CSR Information RSA-PSS with SHA224 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 342 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 343 | mbedtls_x509_csr_info:"data_files/server9.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0x62)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 344 | |
| 345 | X509 CSR Information RSA-PSS with SHA256 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 346 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C |
| 347 | mbedtls_x509_csr_info:"data_files/server9.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0x5E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 348 | |
| 349 | X509 CSR Information RSA-PSS with SHA384 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 350 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 351 | mbedtls_x509_csr_info:"data_files/server9.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0x4E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 352 | |
| 353 | X509 CSR Information RSA-PSS with SHA512 |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 354 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C |
| 355 | mbedtls_x509_csr_info:"data_files/server9.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0x3E)\nRSA key size \: 1024 bits\n" |
Manuel Pégourié-Gonnard | 39868ee | 2014-01-24 18:47:17 +0100 | [diff] [blame] | 356 | |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 357 | X509 CSR Information RSA with SHA-256 - Microsoft header |
Simon Butcher | 03de210 | 2018-10-06 16:24:13 +0100 | [diff] [blame] | 358 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
| 359 | mbedtls_x509_csr_info:"data_files/server1-ms.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n" |
| 360 | |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 361 | X509 Verify Information: empty |
| 362 | x509_verify_info:0:"":"" |
| 363 | |
| 364 | X509 Verify Information: one issue |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 365 | x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:"":"Certificate was missing\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 366 | |
| 367 | X509 Verify Information: two issues |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 368 | x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:"":"The certificate validity has expired\nThe CRL is expired\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 369 | |
| 370 | X509 Verify Information: two issues, one unknown |
Manuel Pégourié-Gonnard | 9505164 | 2015-06-15 10:39:46 +0200 | [diff] [blame] | 371 | x509_verify_info:MBEDTLS_X509_BADCERT_OTHER | 0x80000000:"":"Other reason (can be used by verify callback)\nUnknown reason (this should not happen)\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 372 | |
| 373 | X509 Verify Information: empty, with prefix |
| 374 | x509_verify_info:0:" ! ":"" |
| 375 | |
| 376 | X509 Verify Information: one issue, with prefix |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 377 | x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:" ! ":" ! Certificate was missing\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 378 | |
| 379 | X509 Verify Information: two issues, with prefix |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 380 | x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:" ! ":" ! The certificate validity has expired\n ! The CRL is expired\n" |
Manuel Pégourié-Gonnard | b5f48ad | 2015-04-20 10:38:13 +0100 | [diff] [blame] | 381 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 382 | X509 Get Distinguished Name #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 383 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 384 | mbedtls_x509_dn_gets:"data_files/server1.crt":"subject":"C=NL, O=PolarSSL, CN=PolarSSL Server 1" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 385 | |
| 386 | X509 Get Distinguished Name #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 387 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 388 | mbedtls_x509_dn_gets:"data_files/server1.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 389 | |
| 390 | X509 Get Distinguished Name #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 391 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 392 | mbedtls_x509_dn_gets:"data_files/server2.crt":"subject":"C=NL, O=PolarSSL, CN=localhost" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 393 | |
| 394 | X509 Get Distinguished Name #4 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 395 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 396 | mbedtls_x509_dn_gets:"data_files/server2.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 397 | |
| 398 | X509 Time Expired #1 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 399 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 400 | mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 401 | |
| 402 | X509 Time Expired #2 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 403 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 404 | mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 405 | |
| 406 | X509 Time Expired #3 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 407 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 408 | mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 409 | |
| 410 | X509 Time Expired #4 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 411 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 412 | mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 413 | |
| 414 | X509 Time Expired #5 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 415 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 416 | mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_from":1 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 417 | |
Manuel Pégourié-Gonnard | e7f64a8 | 2013-08-09 10:59:25 +0200 | [diff] [blame] | 418 | X509 Time Expired #6 |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 419 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 420 | mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_to":0 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 421 | |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 422 | X509 Time Future #1 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 423 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 424 | mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_from":0 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 425 | |
| 426 | X509 Time Future #2 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 427 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 428 | mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 429 | |
| 430 | X509 Time Future #3 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 431 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 432 | mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_from":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 433 | |
| 434 | X509 Time Future #4 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 435 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 436 | mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 437 | |
| 438 | X509 Time Future #5 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 439 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 440 | mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_from":0 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 441 | |
| 442 | X509 Time Future #6 |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 443 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | c730ed3 | 2015-06-02 10:38:50 +0100 | [diff] [blame] | 444 | mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_to":1 |
Manuel Pégourié-Gonnard | 6304f78 | 2014-03-10 12:26:11 +0100 | [diff] [blame] | 445 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 446 | X509 CRT verification #1 (Revoked Cert, Expired CRL, no CN) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 447 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 448 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 449 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 450 | X509 CRT verification #1a (Revoked Cert, Future CRL, no CN) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 451 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 452 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 453 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 454 | X509 CRT verification #2 (Revoked Cert, Expired CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 455 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 456 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 457 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 458 | X509 CRT verification #2a (Revoked Cert, Future CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 459 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 460 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"localhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 461 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 462 | X509 CRT verification #3 (Revoked Cert, Future CRL, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 463 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 464 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 465 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 466 | X509 CRT verification #3a (Revoked Cert, Expired CRL, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 467 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 468 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 469 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 470 | X509 CRT verification #4 (Valid Cert, Expired CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 471 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 472 | x509_verify:"data_files/server2.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 473 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 474 | X509 CRT verification #4a (Revoked Cert, Future CRL) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 475 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 476 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 477 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 478 | X509 CRT verification #5 (Revoked Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 479 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 480 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 481 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 482 | X509 CRT verification #5' (Revoked Cert, differing DN string formats #1) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 483 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 484 | x509_verify:"data_files/server1.crt":"data_files/test-ca_utf8.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 485 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 486 | X509 CRT verification #5'' (Revoked Cert, differing DN string formats #2) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 487 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 488 | x509_verify:"data_files/server1.crt":"data_files/test-ca_printable.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 489 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 490 | X509 CRT verification #5''' (Revoked Cert, differing upper and lower case) |
Hanno Becker | 52acdb5 | 2018-11-02 10:09:48 +0000 | [diff] [blame] | 491 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
| 492 | x509_verify:"data_files/server1.crt":"data_files/test-ca_uppercase.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
| 493 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 494 | X509 CRT verification #6 (Revoked Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 495 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 496 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 497 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 498 | X509 CRT verification #7 (Revoked Cert, CN Mismatch) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 499 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 500 | x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 501 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 502 | X509 CRT verification #8 (Valid Cert) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 503 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 504 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 505 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 506 | X509 CRT verification #8a (Expired Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 507 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 508 | x509_verify:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 509 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 510 | X509 CRT verification #8b (Future Cert) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 511 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 512 | x509_verify:"data_files/server5-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 513 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 514 | X509 CRT verification #8c (Expired Cert, longer chain) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 515 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | 29d60fb | 2017-06-05 10:20:32 +0200 | [diff] [blame] | 516 | x509_verify:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
| 517 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 518 | X509 CRT verification #8d (Future Cert, longer chain) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 519 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | 29d60fb | 2017-06-05 10:20:32 +0200 | [diff] [blame] | 520 | x509_verify:"data_files/server7-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
| 521 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 522 | X509 CRT verification #9 (Not trusted Cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 523 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 524 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 525 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 526 | X509 CRT verification #10 (Not trusted Cert, Expired CRL) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 527 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 528 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 529 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 530 | X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 forbidden) |
Hanno Becker | 7b8abee | 2019-06-03 14:25:18 +0100 | [diff] [blame] | 531 | depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 532 | x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
| 533 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 534 | X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 forbidden) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 535 | depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 536 | x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 537 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 538 | X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 forbidden) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 539 | depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 540 | x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 541 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 542 | X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 543 | depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 544 | x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 545 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 546 | X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 547 | depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 548 | x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 549 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 550 | X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 allowed) |
Hanno Becker | 20a4ade | 2019-06-03 14:27:03 +0100 | [diff] [blame] | 551 | depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
| 552 | x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL" |
| 553 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 554 | X509 CRT verification #14 (Valid Cert SHA1 Digest explicitly allowed in profile) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 555 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 556 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 557 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 558 | X509 CRT verification #14 (Valid Cert SHA1 Digest allowed in compile-time default profile) |
Gilles Peskine | 5d2511c | 2017-05-12 13:16:40 +0200 | [diff] [blame] | 559 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 560 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"":"NULL" |
Gilles Peskine | 4fa6bed | 2017-05-11 16:41:25 +0200 | [diff] [blame] | 561 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 562 | X509 CRT verification #14 (Valid Cert SHA1 Digest forbidden in default profile) |
Gilles Peskine | f11d33b | 2017-05-22 16:47:22 +0200 | [diff] [blame] | 563 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:!MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 564 | x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_BAD_MD | MBEDTLS_X509_BADCERT_BAD_MD:"":"NULL" |
Gilles Peskine | 2dc81a0 | 2017-05-05 19:00:39 +0200 | [diff] [blame] | 565 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 566 | X509 CRT verification #15 (Valid Cert SHA224 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 567 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 568 | x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 569 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 570 | X509 CRT verification #16 (Valid Cert SHA256 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 571 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 572 | x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 573 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 574 | X509 CRT verification #17 (Valid Cert SHA384 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 575 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 576 | x509_verify:"data_files/cert_sha384.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 577 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 578 | X509 CRT verification #18 (Valid Cert SHA512 Digest) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 579 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 580 | x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Paul Bakker | b63b0af | 2011-01-13 17:54:59 +0000 | [diff] [blame] | 581 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 582 | X509 CRT verification #19 (Valid Cert, denying callback) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 583 | depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 584 | x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_OTHER:"compat":"verify_none" |
Paul Bakker | b63b0af | 2011-01-13 17:54:59 +0000 | [diff] [blame] | 585 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 586 | X509 CRT verification #19 (Not trusted Cert, allowing callback) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 587 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 588 | x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":0:0:"compat":"verify_all" |
Paul Bakker | 4d6b31a | 2009-07-12 11:11:06 +0000 | [diff] [blame] | 589 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 590 | X509 CRT verification #21 (domain matching wildcard certificate, case insensitive) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 591 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 592 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.ExAmPlE.com":0:0:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 593 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 594 | X509 CRT verification #22 (domain not matching wildcard certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 595 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 596 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 597 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 598 | X509 CRT verification #23 (domain not matching wildcard certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 599 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 600 | x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 601 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 602 | X509 CRT verification #24 (domain matching CN of multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 603 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 604 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 605 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 606 | X509 CRT verification #25 (domain matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 607 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 608 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.net":0:0:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 609 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 610 | X509 CRT verification #26 (domain not matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 611 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 612 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 613 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 614 | X509 CRT verification #27 (domain not matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 615 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 616 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"xample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 617 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 618 | X509 CRT verification #27 (domain not matching multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 619 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 620 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"bexample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | a8cd239 | 2012-02-11 16:09:32 +0000 | [diff] [blame] | 621 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 622 | X509 CRT verification #28 (domain not matching wildcard in multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 623 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 624 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.org":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL" |
Paul Bakker | 57b1298 | 2012-02-11 17:38:38 +0000 | [diff] [blame] | 625 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 626 | X509 CRT verification #29 (domain matching wildcard in multi certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 627 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 628 | x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.org":0:0:"compat":"NULL" |
Paul Bakker | 57b1298 | 2012-02-11 17:38:38 +0000 | [diff] [blame] | 629 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 630 | X509 CRT verification #30 (domain matching multi certificate without CN) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 631 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 632 | x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.shotokan-braunschweig.de":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 9195662 | 2012-08-23 10:46:54 +0000 | [diff] [blame] | 633 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 634 | X509 CRT verification #31 (domain not matching multi certificate without CN) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 635 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 636 | x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH + MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Paul Bakker | 9195662 | 2012-08-23 10:46:54 +0000 | [diff] [blame] | 637 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 638 | X509 CRT verification #32 (Valid, EC cert, RSA CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 639 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 640 | x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 641 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 642 | X509 CRT verification #33 (Valid, RSA cert, EC CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 643 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 644 | x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 645 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 646 | X509 CRT verification #34 (Valid, EC cert, EC CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 647 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 648 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 649 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 650 | X509 CRT verification #35 (Revoked, EC CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 651 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 652 | x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 653 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 654 | X509 CRT verification #36 (Valid, EC CA, SHA1 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 655 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 656 | x509_verify:"data_files/server5-sha1.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 657 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 658 | X509 CRT verification #37 (Valid, EC CA, SHA224 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 659 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 660 | x509_verify:"data_files/server5-sha224.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 661 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 662 | X509 CRT verification #38 (Valid, EC CA, SHA384 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 663 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 664 | x509_verify:"data_files/server5-sha384.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 665 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 666 | X509 CRT verification #39 (Valid, EC CA, SHA512 Digest) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 667 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 668 | x509_verify:"data_files/server5-sha512.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 669 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 670 | X509 CRT verification #40 (Valid, depth 0, RSA, CA) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 671 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 672 | x509_verify:"data_files/test-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 673 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 674 | X509 CRT verification #41 (Valid, depth 0, EC, CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 675 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 676 | x509_verify:"data_files/test-ca2.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 677 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 678 | X509 CRT verification #42 (Depth 0, not CA, RSA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 679 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 680 | x509_verify:"data_files/server2.crt":"data_files/server2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 681 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 682 | X509 CRT verification #43 (Depth 0, not CA, EC) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 683 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 684 | x509_verify:"data_files/server5.crt":"data_files/server5.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 685 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 686 | X509 CRT verification #44 (Corrupted signature, EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 687 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 688 | x509_verify:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 689 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 690 | X509 CRT verification #45 (Corrupted signature, RSA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 691 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 692 | x509_verify:"data_files/server2-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 693 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 694 | X509 CRT verification #45b (Corrupted signature, intermediate CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 695 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 4dfc04a | 2017-06-05 11:12:13 +0200 | [diff] [blame] | 696 | x509_verify:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
| 697 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 698 | X509 CRT verification #46 (Valid, depth 2, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 699 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 700 | x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 701 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 702 | X509 CRT verification #47 (Untrusted, depth 2, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 703 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 704 | x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 705 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 706 | X509 CRT verification #48 (Missing intermediate CA, EC-RSA-EC) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 707 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 708 | x509_verify:"data_files/server7.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 709 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 710 | X509 CRT verification #49 (Valid, depth 2, RSA-EC-RSA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 711 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 712 | x509_verify:"data_files/server8_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 713 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 714 | X509 CRT verification #50 (Valid, multiple CAs) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 715 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 716 | x509_verify:"data_files/server2.crt":"data_files/test-ca_cat12.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | b4e9ca9 | 2013-08-10 10:52:01 +0200 | [diff] [blame] | 717 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 718 | X509 CRT verification #51 (Valid, multiple CAs, reverse order) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 719 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 720 | x509_verify:"data_files/server2.crt":"data_files/test-ca_cat21.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 6009c3a | 2013-08-09 11:27:14 +0200 | [diff] [blame] | 721 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 722 | X509 CRT verification #52 (CA keyUsage valid) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 723 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 724 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt_crl.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 725 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 726 | X509 CRT verification #53 (CA keyUsage missing cRLSign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 727 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 728 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 729 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 730 | X509 CRT verification #54 (CA keyUsage missing cRLSign, no CRL) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 731 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 732 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 733 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 734 | X509 CRT verification #55 (CA keyUsage missing keyCertSign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 735 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 736 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crl.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 737 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 738 | X509 CRT verification #56 (CA keyUsage plain wrong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 739 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 740 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-ds.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 99d4f19 | 2014-04-08 15:10:07 +0200 | [diff] [blame] | 741 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 742 | X509 CRT verification #57 (Valid, RSASSA-PSS, SHA-1) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 743 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 744 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 745 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 746 | X509 CRT verification #58 (Valid, RSASSA-PSS, SHA-224) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 747 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 748 | x509_verify:"data_files/server9-sha224.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha224.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 749 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 750 | X509 CRT verification #59 (Valid, RSASSA-PSS, SHA-256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 751 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 752 | x509_verify:"data_files/server9-sha256.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha256.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 753 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 754 | X509 CRT verification #60 (Valid, RSASSA-PSS, SHA-384) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 755 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 756 | x509_verify:"data_files/server9-sha384.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha384.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 757 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 758 | X509 CRT verification #61 (Valid, RSASSA-PSS, SHA-512) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 759 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 760 | x509_verify:"data_files/server9-sha512.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha512.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 761 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 762 | X509 CRT verification #62 (Revoked, RSASSA-PSS, SHA-1) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 763 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 764 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5388202 | 2014-06-05 17:53:52 +0200 | [diff] [blame] | 765 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 766 | X509 CRT verification #63 (Revoked, RSASSA-PSS, SHA-1, CRL badsign) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 767 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 768 | x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1-badsign.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5388202 | 2014-06-05 17:53:52 +0200 | [diff] [blame] | 769 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 770 | X509 CRT verification #64 (Valid, RSASSA-PSS, SHA-1, not top) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 771 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 772 | x509_verify:"data_files/server9-with-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 773 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 774 | X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 775 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 776 | x509_verify:"data_files/server9-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 777 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 778 | X509 CRT verification #66 (RSASSA-PSS, SHA1, no RSA CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 779 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 780 | x509_verify:"data_files/server9.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 920e1cd | 2014-06-02 18:11:07 +0200 | [diff] [blame] | 781 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 782 | X509 CRT verification #67 (Valid, RSASSA-PSS, all defaults) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 783 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 784 | x509_verify:"data_files/server9-defaults.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | eacccb7 | 2014-06-05 18:00:08 +0200 | [diff] [blame] | 785 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 786 | X509 CRT verification #68 (RSASSA-PSS, wrong salt_len) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 787 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 788 | x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5873b00 | 2014-06-06 18:04:09 +0200 | [diff] [blame] | 789 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 790 | X509 CRT verification #69 (RSASSA-PSS, wrong mgf_hash) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 791 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 792 | x509_verify:"data_files/server9-bad-mgfhash.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 5873b00 | 2014-06-06 18:04:09 +0200 | [diff] [blame] | 793 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 794 | X509 CRT verification #70 (v1 trusted CA) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 795 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 796 | x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 797 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 798 | X509 CRT verification #71 (v1 trusted CA, other) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 799 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 800 | x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 801 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 802 | X509 CRT verification #72 (v1 chain) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 803 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 804 | x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | c4eff16 | 2014-06-19 12:18:08 +0200 | [diff] [blame] | 805 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 806 | X509 CRT verification #73 (selfsigned trusted without CA bit) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 807 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 808 | x509_verify:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | d249b7a | 2014-06-24 11:49:16 +0200 | [diff] [blame] | 809 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 810 | X509 CRT verification #74 (signed by selfsigned trusted without CA bit) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 811 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 812 | x509_verify:"data_files/server6-ss-child.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL" |
Manuel Pégourié-Gonnard | d249b7a | 2014-06-24 11:49:16 +0200 | [diff] [blame] | 813 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 814 | X509 CRT verification #75 (encoding mismatch) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 815 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 816 | x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 9c911da | 2014-10-17 12:23:49 +0200 | [diff] [blame] | 817 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 818 | X509 CRT verification #76 (multiple CRLs, not revoked) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 819 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 820 | x509_verify:"data_files/server5.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 821 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 822 | X509 CRT verification #77 (multiple CRLs, revoked) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 823 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 824 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 825 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 826 | X509 CRT verification #78 (multiple CRLs, revoked by second) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 827 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 828 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_rsa-ec.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 829 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 830 | X509 CRT verification #79 (multiple CRLs, revoked by future) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 831 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 832 | x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED|MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 833 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 834 | X509 CRT verification #80 (multiple CRLs, first future, revoked by second) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 835 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 836 | x509_verify:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 837 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 838 | X509 CRT verification #81 (multiple CRLs, none relevant) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 839 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 840 | x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl_cat_rsa-ec.pem":"NULL":0:0:"compat":"NULL" |
Manuel Pégourié-Gonnard | 57a5d60 | 2014-11-19 14:04:09 +0100 | [diff] [blame] | 841 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 842 | X509 CRT verification #82 (Not yet valid CA and valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 843 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 844 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | 12c868c | 2016-02-18 17:28:04 +0000 | [diff] [blame] | 845 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 846 | X509 CRT verification #83 (valid CA and Not yet valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 847 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 848 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-future.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | 12c868c | 2016-02-18 17:28:04 +0000 | [diff] [blame] | 849 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 850 | X509 CRT verification #84 (valid CA and Not yet valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 851 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 852 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-past.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | df4bca2 | 2016-02-19 15:57:17 +0000 | [diff] [blame] | 853 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 854 | X509 CRT verification #85 (Not yet valid CA and valid CA) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 855 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 856 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
Janos Follath | df4bca2 | 2016-02-19 15:57:17 +0000 | [diff] [blame] | 857 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 858 | X509 CRT verification #86 (Not yet valid CA and invalid CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 859 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 860 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL" |
Andres AG | 9f430c1 | 2016-12-13 09:59:07 +0000 | [diff] [blame] | 861 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 862 | X509 CRT verification #87 (Expired CA and invalid CA) |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 863 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE |
Gilles Peskine | ef86ab2 | 2017-05-05 18:59:02 +0200 | [diff] [blame] | 864 | x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL" |
Andres AG | 9f430c1 | 2016-12-13 09:59:07 +0000 | [diff] [blame] | 865 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 866 | X509 CRT verification #88 (Spurious cert in the chain) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 867 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 868 | x509_verify:"data_files/server7_spurious_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
| 869 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 870 | X509 CRT verification #89 (Spurious cert later in the chain) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 871 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 872 | x509_verify:"data_files/server10_int3_spurious_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL" |
| 873 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 874 | X509 CRT verification #90 (EE with same name as trusted root) |
Manuel Pégourié-Gonnard | c10afdb | 2017-06-29 09:48:08 +0200 | [diff] [blame] | 875 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 876 | x509_verify:"data_files/server5-ss-forgeca.crt":"data_files/test-int-ca3.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"":"NULL" |
Manuel Pégourié-Gonnard | c10afdb | 2017-06-29 09:48:08 +0200 | [diff] [blame] | 877 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 878 | X509 CRT verification #91 (same CA with good then bad key) |
Manuel Pégourié-Gonnard | 2d825d4 | 2017-07-03 18:06:38 +0200 | [diff] [blame] | 879 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 880 | x509_verify:"data_files/server1.crt":"data_files/test-ca-good-alt.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
| 881 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 882 | X509 CRT verification #91 (same CA with bad then good key) |
Manuel Pégourié-Gonnard | 2d825d4 | 2017-07-03 18:06:38 +0200 | [diff] [blame] | 883 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C |
| 884 | x509_verify:"data_files/server1.crt":"data_files/test-ca-alt-good.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL" |
| 885 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 886 | X509 CRT verification #92 (bad name, allowing callback) |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 887 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | a54f6cc | 2017-08-09 10:41:42 +0200 | [diff] [blame] | 888 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"globalhost":0:0:"":"verify_all" |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 889 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 890 | X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA) |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 891 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECP_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
| 892 | x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK:"suite_b":"NULL" |
| 893 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 894 | X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA) |
Manuel Pégourié-Gonnard | 147b28e | 2018-03-12 15:26:59 +0100 | [diff] [blame] | 895 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 896 | x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_PK:"suite_b":"NULL" |
| 897 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 898 | X509 CRT verification #95 (Suite B Valid, EC cert, EC CA) |
Manuel Pégourié-Gonnard | 147b28e | 2018-03-12 15:26:59 +0100 | [diff] [blame] | 899 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 900 | x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"suite_b":"NULL" |
| 901 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 902 | X509 CRT verification #96 (next profile Invalid Cert SHA224 Digest) |
Manuel Pégourié-Gonnard | 88a8dcb | 2018-03-12 15:49:35 +0100 | [diff] [blame] | 903 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 904 | x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCRL_BAD_MD:"next":"NULL" |
| 905 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 906 | X509 CRT verification #97 (next profile Valid Cert SHA256 Digest) |
Manuel Pégourié-Gonnard | 88a8dcb | 2018-03-12 15:49:35 +0100 | [diff] [blame] | 907 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_SHA1_C |
Ron Eldor | c153998 | 2018-02-06 18:47:17 +0200 | [diff] [blame] | 908 | x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"next":"NULL" |
| 909 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 910 | X509 CRT verification with ca callback: failure |
Jarno Lamsa | 557426a | 2019-03-27 17:08:29 +0200 | [diff] [blame] | 911 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK |
Hanno Becker | cbb5903 | 2019-03-28 14:14:22 +0000 | [diff] [blame] | 912 | x509_verify_ca_cb_failure:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":MBEDTLS_ERR_X509_FATAL_ERROR |
Jarno Lamsa | 557426a | 2019-03-27 17:08:29 +0200 | [diff] [blame] | 913 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 914 | X509 CRT verification callback: bad name |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 915 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 916 | x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2.crt":"globalhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000004\n" |
Manuel Pégourié-Gonnard | a656825 | 2017-07-05 18:14:38 +0200 | [diff] [blame] | 917 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 918 | X509 CRT verification callback: trusted EE cert |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 919 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 920 | x509_verify_callback:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"NULL":0:"depth 0 - serial 53\:A2\:CB\:4B\:12\:4E\:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 921 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 922 | X509 CRT verification callback: trusted EE cert, expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 923 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 924 | x509_verify_callback:"data_files/server5-ss-expired.crt":"data_files/server5-ss-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial D8\:64\:61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 925 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 926 | X509 CRT verification callback: simple |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 927 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 928 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 929 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 930 | X509 CRT verification callback: simple, EE expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 931 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 932 | x509_verify_callback:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 933 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 934 | X509 CRT verification callback: simple, root expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 935 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 936 | x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 937 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 938 | X509 CRT verification callback: two trusted roots |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 939 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 940 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 941 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 942 | X509 CRT verification callback: two trusted roots, reversed order |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 943 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 944 | x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 945 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 946 | X509 CRT verification callback: root included |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 947 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 948 | x509_verify_callback:"data_files/server1_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 949 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 950 | X509 CRT verification callback: intermediate ca |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 951 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 952 | x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 953 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 954 | X509 CRT verification callback: intermediate ca, root included |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 955 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 956 | x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 957 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 958 | X509 CRT verification callback: intermediate ca trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 959 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 960 | x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-int-ca.crt":"NULL":0:"depth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 961 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 962 | X509 CRT verification callback: intermediate ca, EE expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 963 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 964 | x509_verify_callback:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 965 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 966 | X509 CRT verification callback: intermediate ca, int expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 967 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 968 | x509_verify_callback:"data_files/server7_int-ca-exp.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000001\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 969 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 970 | X509 CRT verification callback: intermediate ca, root expired |
Deomid Ryabkov | de420a4 | 2016-11-27 14:50:06 +0000 | [diff] [blame] | 971 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 972 | x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | bc31301 | 2017-06-27 12:51:52 +0200 | [diff] [blame] | 973 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 974 | X509 CRT verification callback: two intermediates |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 975 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 976 | x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 977 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 978 | X509 CRT verification callback: two intermediates, root included |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 979 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Hanno Becker | 381c77c | 2018-11-01 15:07:42 +0000 | [diff] [blame] | 980 | x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 981 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 982 | X509 CRT verification callback: two intermediates, top int trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 983 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 984 | x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":"NULL":0:"depth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 985 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 986 | X509 CRT verification callback: two intermediates, low int trusted |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 987 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 988 | x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-int-ca3.crt":"NULL":0:"depth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n" |
Manuel Pégourié-Gonnard | fdbdd72 | 2015-09-01 16:35:00 +0200 | [diff] [blame] | 989 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 990 | X509 CRT verification callback: no intermediate, bad signature |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 991 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 992 | x509_verify_callback:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n" |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 993 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 994 | X509 CRT verification callback: one intermediate, bad signature |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 995 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | be2f0b5 | 2017-08-21 11:00:22 +0200 | [diff] [blame] | 996 | x509_verify_callback:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n" |
Manuel Pégourié-Gonnard | 9bc860c | 2017-07-14 11:32:38 +0200 | [diff] [blame] | 997 | |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 998 | X509 Parse Selftest |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 999 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_CERTS_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Paul Bakker | 37940d9f | 2009-07-10 22:38:58 +0000 | [diff] [blame] | 1000 | x509_selftest: |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1001 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1002 | X509 CRT ASN1 (Empty Certificate) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1003 | x509parse_crt:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1004 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1005 | X509 CRT ASN1 (inv Certificate, bad tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1006 | x509parse_crt:"0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1007 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1008 | X509 CRT ASN1 (inv Certificate, no length) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1009 | x509parse_crt:"30":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1010 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1011 | X509 CRT ASN1 (inv Certificate, bad length encoding) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1012 | x509parse_crt:"3085":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | fae618f | 2011-10-12 11:53:52 +0000 | [diff] [blame] | 1013 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1014 | X509 CRT ASN1 (inv Certificate, length data incomplete) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1015 | x509parse_crt:"308200":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1016 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1017 | X509 CRT ASN1 (inv Certificate, length out of bounds) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1018 | x509parse_crt:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1019 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1020 | X509 CRT ASN1 (inv TBS, invalid tag) |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1021 | x509parse_crt:"30020500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1022 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1023 | X509 CRT ASN1 (inv TBS, length missing) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1024 | x509parse_crt:"300130":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1025 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1026 | X509 CRT ASN1 (inv TBS, invalid length encoding) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1027 | x509parse_crt:"30023085":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1028 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1029 | X509 CRT ASN1 (inv TBS, length data incomplete) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1030 | x509parse_crt:"300430839999":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1031 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1032 | X509 CRT ASN1 (inv TBS, length out of bounds) |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1033 | x509parse_crt:"30023003":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1034 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1035 | X509 CRT ASN1 (TBS empty) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1036 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a5c481e | 2019-06-04 15:19:09 +0100 | [diff] [blame] | 1037 | x509parse_crt:"30153000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1038 | |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1039 | X509 CRT ASN1 (TBS, invalid version tag, serial missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1040 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1041 | x509parse_crt:"301730020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1042 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1043 | X509 CRT ASN1 (TBS, valid outer version tag, no outer length) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1044 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1045 | x509parse_crt:"30163001a0300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1046 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1047 | X509 CRT ASN1 (TBS, inv inner version tag) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1048 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1049 | x509parse_crt:"30193004a0020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1050 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1051 | X509 CRT ASN1 (TBS, valid inner version tag, no inner length) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1052 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1053 | x509parse_crt:"30183003a00102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1054 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1055 | X509 CRT ASN1 (TBS, valid inner version tag, inv inner length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1056 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1057 | x509parse_crt:"30193004a0020285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1058 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1059 | X509 CRT ASN1 (TBS, valid inner version tag, inner length too large for int) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1060 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1061 | x509parse_crt:"30293014a012021000000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1062 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1063 | X509 CRT ASN1 (TBS, valid inner version tag, inner vs. outer length mismatch) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1064 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1065 | x509parse_crt:"301b3006a00402010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1066 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1067 | X509 CRT ASN1 (TBS, valid version tag, length exceeds TBS) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1068 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1069 | x509parse_crt:"30293014a012021100000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1070 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1071 | X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 3) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1072 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1073 | x509parse_crt:"308196308180a0030201038204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1074 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1075 | X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 4) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1076 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1077 | x509parse_crt:"308196308180a0030201048204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1078 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1079 | X509 CRT ASN1 (TBS, valid version tag + length, version number overflow) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1080 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1081 | x509parse_crt:"308199308183a00602047FFFFFFF8204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1082 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1083 | X509 CRT ASN1 (TBS, serial missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1084 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1085 | x509parse_crt:"301a3005a003020102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1086 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1087 | X509 CRT ASN1 (TBS, inv serial, tag wrong) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1088 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1089 | x509parse_crt:"301c3007a0030201020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1090 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1091 | X509 CRT ASN1 (TBS, inv serial, length missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1092 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1093 | x509parse_crt:"301b3006a00302010282300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1094 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1095 | X509 CRT ASN1 (TBS, inv serial, inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1096 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | e7d8f96 | 2019-06-04 15:25:00 +0100 | [diff] [blame] | 1097 | x509parse_crt:"301c3007a0030201028285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1098 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1099 | X509 CRT ASN1 (TBS, inv serial, length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1100 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | e7d8f96 | 2019-06-04 15:25:00 +0100 | [diff] [blame] | 1101 | x509parse_crt:"301c3007a0030201028201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1102 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1103 | X509 CRT ASN1 (TBS, AlgID missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1104 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | a9ef412 | 2019-06-04 15:24:18 +0100 | [diff] [blame] | 1105 | x509parse_crt:"3020300ba0030201028204deadbeef300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1106 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1107 | X509 CRT ASN1 (TBS, inv AlgID, tag wrong) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1108 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1109 | x509parse_crt:"3022300da0030201028204deadbeef0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1110 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1111 | X509 CRT ASN1 (TBS, inv AlgID, OID missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1112 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1113 | x509parse_crt:"307b3073a0030201008204deadbeef3000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff3000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1114 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1115 | X509 CRT ASN1 (TBS, inv AlgID, OID tag wrong) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1116 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1117 | x509parse_crt:"307f3075a0030201008204deadbeef30020500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1118 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1119 | X509 CRT ASN1 (TBS, inv AlgID, OID inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1120 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1121 | x509parse_crt:"307f3075a0030201008204deadbeef30020685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1122 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1123 | X509 CRT ASN1 (TBS, inv AlgID, OID length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1124 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1125 | x509parse_crt:"307f3075a0030201008204deadbeef30020601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1126 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1127 | X509 CRT ASN1 (TBS, inv AlgID, OID empty) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1128 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1129 | x509parse_crt:"307f3075a0030201008204deadbeef30020600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020600030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1130 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1131 | X509 CRT ASN1 (TBS, inv AlgID, OID unknown) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1132 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1133 | x509parse_crt:"3081873079a0030201008204deadbeef30060604deadbeef300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30060604deadbeef030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1134 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1135 | X509 CRT ASN1 (TBS, inv AlgID, param inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1136 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1137 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1138 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1139 | X509 CRT ASN1 (TBS, inv AlgID, param length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1140 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1141 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1142 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1143 | X509 CRT ASN1 (TBS, inv AlgID, param length mismatch) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1144 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1145 | x509parse_crt:"30819a308182a0030201008204deadbeef300f06092a864886f70d01010b06010000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300f06092a864886f70d01010b06010000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1146 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1147 | X509 CRT ASN1 (TBS, inv AlgID, params present but empty) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1148 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1149 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0600030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG |
Hanno Becker | a328fff | 2019-02-12 13:44:17 +0000 | [diff] [blame] | 1150 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1151 | X509 CRT ASN1 (TBS, inv AlgID, bad RSASSA-PSS params) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1152 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1153 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010a3100300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010a3100030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 1154 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1155 | X509 CRT ASN1 (TBS, Issuer missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1156 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1157 | x509parse_crt:"302f301aa0030201008204deadbeef300d06092a864886f70d01010b0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1158 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1159 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv tag) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1160 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1161 | x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1162 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1163 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length missing) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1164 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1165 | x509parse_crt:"3030301ba0030201008204deadbeef300d06092a864886f70d01010b050030300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1166 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1167 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv length encoding) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1168 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1169 | x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1170 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1171 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length out of bounds) |
Hanno Becker | 60dd6fc | 2019-02-15 11:51:32 +0000 | [diff] [blame] | 1172 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Hanno Becker | 764fbdf | 2019-06-04 16:04:36 +0100 | [diff] [blame] | 1173 | x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1174 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1175 | X509 CRT ASN1 (TBS, inv Issuer, RDNSequence empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1176 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1177 | x509parse_crt:"3081893074a0030201028204deadbeef300d06092a864886f70d01010b05003000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1178 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1179 | X509 CRT ASN1 (TBS, inv Issuer, RDN inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1180 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1181 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1182 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1183 | X509 CRT ASN1 (TBS, inv Issuer, RDN inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1184 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1185 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023185301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1186 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1187 | X509 CRT ASN1 (TBS, inv Issuer, RDN length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1188 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1189 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023101301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1190 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1191 | X509 CRT ASN1 (TBS, inv Issuer, RDN empty) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1192 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1193 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023100301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1194 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1195 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv tag) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1196 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1197 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1198 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1199 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv length encoding) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1200 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1201 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023085301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1202 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1203 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1204 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1205 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023001301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1206 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1207 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue empty) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1208 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1209 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1210 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1211 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv tag) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1212 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1213 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1214 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1215 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv no length data) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1216 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1217 | x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b050030053103300106301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1218 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1219 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv length encoding) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1220 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1221 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020685301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1222 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1223 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1224 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1225 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020601301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1226 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1227 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value missing) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1228 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1229 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020600301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1230 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1231 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv tag) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1232 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1233 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG; |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1234 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1235 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length missing) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1236 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1237 | x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b050030073105300306000c301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1238 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1239 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv length encoding) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1240 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1241 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000C85301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1242 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1243 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length out of bounds) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1244 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1245 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000c01301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1246 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1247 | X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length mismatch) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1248 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1249 | x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300a3108300606000c010000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1250 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1251 | X509 CRT ASN1 (TBS, inv Issuer, 2nd AttributeTypeValue empty) |
Hanno Becker | 5e2cf38 | 2019-02-12 15:49:08 +0000 | [diff] [blame] | 1252 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1253 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300e310c300806000c04546573743000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1254 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1255 | X509 CRT ASN1 (TBS, Validity missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1256 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1257 | x509parse_crt:"303d3028a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1258 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1259 | X509 CRT ASN1 (TBS, inv Validity, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1260 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1261 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1262 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1263 | X509 CRT ASN1 (TBS, inv Validity, length field missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1264 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1265 | x509parse_crt:"303e3029a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1266 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1267 | X509 CRT ASN1 (TBS, inv Validity, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1268 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1269 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1270 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1271 | X509 CRT ASN1 (TBS, inv Validity, length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1272 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1273 | x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1274 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1275 | X509 CRT ASN1 (TBS, inv Validity, notBefore missing) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1276 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1277 | x509parse_crt:"30793064a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1278 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1279 | X509 CRT ASN1 (TBS, inv Validity, notBefore inv tag) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1280 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1281 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430020500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1282 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1283 | X509 CRT ASN1 (TBS, inv Validity, notBefore no length) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1284 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1285 | x509parse_crt:"307a3065a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300117300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1286 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1287 | X509 CRT ASN1 (TBS, inv Validity, notBefore inv length encoding) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1288 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1289 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743002178f300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1290 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1291 | X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1292 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1293 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1294 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1295 | X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1296 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1297 | x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1298 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1299 | X509 CRT ASN1 (TBS, inv Validity, notBefore empty) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1300 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1301 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a3008060013045465737430101700170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1302 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1303 | X509 CRT ASN1 (TBS, inv Validity, notBefore invalid) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1304 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1305 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303000000000170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1306 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1307 | X509 CRT ASN1 (TBS, inv Validity, notAfter missing) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1308 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1309 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300e170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1310 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1311 | X509 CRT ASN1 (TBS, inv Validity, notAfter inv tag) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1312 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1313 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935390500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1314 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1315 | X509 CRT ASN1 (TBS, inv Validity, notAfter length missing) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1316 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1317 | x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300f170c30393132333132333539353917300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1318 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1319 | X509 CRT ASN1 (TBS, inv Validity, notAfter inv length encoding) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1320 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1321 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391785300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1322 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1323 | X509 CRT ASN1 (TBS, inv Validity, notAfter length out of bounds) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1324 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1325 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1326 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1327 | X509 CRT ASN1 (TBS, inv Validity, notAfter empty) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1328 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1329 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1330 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1331 | X509 CRT ASN1 (TBS, inv Validity, notAfter invalid) |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1332 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1333 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303931323331323335393539170c303930313031303000000000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE |
| 1334 | |
Hanno Becker | 7ca07e3 | 2019-03-13 10:14:00 +0000 | [diff] [blame] | 1335 | X509 CRT ASN1 (TBS, inv Validity, data remaining after 'notAfter') |
Hanno Becker | 18459d4 | 2019-02-13 11:22:23 +0000 | [diff] [blame] | 1336 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1337 | x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303930313031303030303030170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1338 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1339 | X509 CRT ASN1 (TBS, Subject missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1340 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1341 | x509parse_crt:"305b3046a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1342 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1343 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1344 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1345 | x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353900300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1346 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1347 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence length missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1348 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1349 | x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1350 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1351 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1352 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1353 | x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1354 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1355 | X509 CRT ASN1 (TBS, inv Subject, RDNSequence length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1356 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1357 | x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1358 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1359 | X509 CRT ASN1 (TBS, inv Subject, RDN inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1360 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1361 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1362 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1363 | X509 CRT ASN1 (TBS, inv Subject, RDN inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1364 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1365 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023185302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1366 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1367 | X509 CRT ASN1 (TBS, inv Subject, RDN length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1368 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1369 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023101302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1370 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1371 | X509 CRT ASN1 (TBS, inv Subject, RDN empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1372 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1373 | x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023100302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1374 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1375 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1376 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1377 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1378 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1379 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1380 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1381 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023085302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1382 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1383 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1384 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1385 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023001302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1386 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1387 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1388 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1389 | x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1390 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1391 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1392 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1393 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1394 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1395 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv no length data) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1396 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1397 | x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930053103300106302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1398 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1399 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1400 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1401 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020685302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1402 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1403 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type length out of bounds ) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1404 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1405 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020601302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1406 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1407 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1408 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1409 | x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020600302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1410 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1411 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv tag) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1412 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1413 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG; |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1414 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1415 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length missing) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1416 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1417 | x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930073105300306000c302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1418 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1419 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv length encoding) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1420 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1421 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000C85302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1422 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1423 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length out of bounds) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1424 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1425 | x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000c01302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1426 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1427 | X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length mismatch) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1428 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1429 | x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300a3108300606000c010000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1430 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1431 | X509 CRT ASN1 (TBS, inv Subject, 2nd AttributeTypeValue empty) |
Hanno Becker | 28ae6b1 | 2019-02-13 11:59:00 +0000 | [diff] [blame] | 1432 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1433 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300e310c300806000c04546573743000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1434 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1435 | X509 CRT ASN1 (TBS, SubPubKeyInfo missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1436 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1437 | x509parse_crt:"30693054a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1438 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1439 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1440 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1441 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1442 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1443 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1444 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1445 | x509parse_crt:"306a3055a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1446 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1447 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1448 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1449 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1450 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1451 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1452 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1453 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1454 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1455 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1456 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1457 | x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1458 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1459 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv algorithm tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1460 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1461 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1462 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1463 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1464 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1465 | x509parse_crt:"306c3057a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1466 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1467 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1468 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1469 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1470 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1471 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1472 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1473 | x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1474 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1475 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm empty) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1476 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1477 | x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301d300003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1478 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1479 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm unknown) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1480 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1481 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010100050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_UNKNOWN_PK_ALG |
| 1482 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1483 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring missing) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1484 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1485 | x509parse_crt:"307a3065a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300f300d06092A864886F70D0101010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1486 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1487 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv tag) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1488 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1489 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1490 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1491 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length missing) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1492 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1493 | x509parse_crt:"307b3066a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743010300d06092A864886F70D010101050003300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1494 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1495 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv length encoding) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1496 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1497 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1498 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1499 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length out of bounds) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1500 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1501 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1502 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1503 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, no bitstring data) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1504 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1505 | x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1506 | |
Hanno Becker | 19db19e | 2019-03-13 10:36:47 +0000 | [diff] [blame] | 1507 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv bitstring start) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1508 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1509 | x509parse_crt:"307d3068a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743012300d06092A864886F70D0101010500030101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1510 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1511 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring length) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1512 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1513 | x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1514 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1515 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring tag) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1516 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1517 | x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400310000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1518 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1519 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv RSA modulus) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1520 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1521 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0302ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1522 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1523 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, total length mismatch) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1524 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1525 | x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301e300d06092A864886F70D0101010500030b0030080202ffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1526 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1527 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1528 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1529 | x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY |
| 1530 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1531 | X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed, expanded length notation) |
Hanno Becker | bb955e5 | 2019-06-04 15:38:48 +0100 | [diff] [blame] | 1532 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1533 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210fffffffffffffffffffffffffffffffe0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1534 | |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1535 | # We don't expect MBEDTLS_ERR_ASN1_UNEXPECTED_TAG here because the IssuerID is optional; |
| 1536 | # the stack is expected to ignore it and will hence end up with a length mismatch. |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1537 | X509 CRT ASN1 (TBS, inv IssuerID, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1538 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1539 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1540 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1541 | X509 CRT ASN1 (TBS, inv IssuerID, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1542 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1543 | x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1544 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1545 | X509 CRT ASN1 (TBS, inv IssuerID, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1546 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1547 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1548 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1549 | X509 CRT ASN1 (TBS, inv IssuerID, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1550 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1551 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 345fb49 | 2009-07-20 21:26:07 +0000 | [diff] [blame] | 1552 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1553 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1554 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1555 | x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1556 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1557 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1558 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 9f06b50 | 2019-06-04 15:43:15 +0100 | [diff] [blame] | 1559 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1560 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1561 | X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1562 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1563 | x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1564 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1565 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1566 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1567 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1568 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1569 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, bool len missing) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1570 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1571 | x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30c300730050603551d2001010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Ron Eldor | 11818f2 | 2019-05-16 18:17:02 +0300 | [diff] [blame] | 1572 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1573 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data missing) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1574 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1575 | x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30b300930070603551d20040001010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Ron Eldor | 11818f2 | 2019-05-16 18:17:02 +0300 | [diff] [blame] | 1576 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1577 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data not oid) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1578 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1579 | x509parse_crt:"3081bc3081b9a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba32e302c30290603551d2004223020301ea01c06082b06010505070804a010300e06082b060104010901030402022201010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Ron Eldor | 8a59d6b | 2019-05-19 12:32:15 +0300 | [diff] [blame] | 1580 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1581 | X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, qualifier not complete) |
Hanno Becker | ba698da | 2019-06-03 09:54:07 +0100 | [diff] [blame] | 1582 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1583 | x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30c300a301f0603551d2004183020301f0603551d200418301630140604551d2000300c300a06082b0601050507020101010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Ron Eldor | 11818f2 | 2019-05-16 18:17:02 +0300 | [diff] [blame] | 1584 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1585 | X509 CRT ASN1 (TBSCertificate v3, ext SubjectAlternativeName malformed) |
Ron Eldor | 56f071f | 2019-05-22 17:21:08 +0300 | [diff] [blame] | 1586 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 1587 | x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1588 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1589 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1590 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1591 | x509parse_crt:"308199308183a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | c6ce838 | 2009-07-27 21:34:45 +0000 | [diff] [blame] | 1592 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1593 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1594 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1595 | x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | c6ce838 | 2009-07-27 21:34:45 +0000 | [diff] [blame] | 1596 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1597 | X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1598 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | be3850a | 2019-06-04 15:45:45 +0100 | [diff] [blame] | 1599 | x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1600 | |
Hanno Becker | d51d485 | 2019-03-13 15:18:57 +0000 | [diff] [blame^] | 1601 | X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT) |
| 1602 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1603 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1604 | |
| 1605 | X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT) |
| 1606 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1607 | x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa200a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1608 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1609 | X509 CRT ASN1 (TBS, inv v3Ext, inv tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1610 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1611 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1612 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1613 | X509 CRT ASN1 (TBS, inv v3Ext, outer length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1614 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1615 | x509parse_crt:"30819b308185a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1616 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1617 | X509 CRT ASN1 (TBS, inv v3Ext, outer length inv encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1618 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1619 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1620 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1621 | X509 CRT ASN1 (TBS, inv v3Ext, outer length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1622 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1623 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 0369a52 | 2014-11-11 22:17:26 +0100 | [diff] [blame] | 1624 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1625 | X509 CRT ASN1 (TBS, inv v3Ext, outer length 0) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1626 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1627 | x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | b134060 | 2014-11-11 23:11:16 +0100 | [diff] [blame] | 1628 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1629 | X509 CRT ASN1 (TBS, inv v3Ext, inner tag invalid) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1630 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1631 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8a5e3d4 | 2014-11-12 17:47:28 +0100 | [diff] [blame] | 1632 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1633 | X509 CRT ASN1 (TBS, inv v3Ext, inner length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1634 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1635 | x509parse_crt:"30819d308187a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1636 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1637 | X509 CRT ASN1 (TBS, inv v3Ext, inner length inv encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1638 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1639 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1640 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1641 | X509 CRT ASN1 (TBS, inv v3Ext, inner length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1642 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1643 | x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1644 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1645 | X509 CRT ASN1 (TBS, inv v3Ext, inner/outer length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1646 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1647 | x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1648 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1649 | X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1650 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1651 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1652 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1653 | X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1654 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1655 | x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1656 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1657 | X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1658 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1659 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1660 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1661 | X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1662 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1663 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1664 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1665 | X509 CRT ASN1 (TBS, inv v3Ext, first ext empty) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1666 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1667 | x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1668 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1669 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1670 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1671 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1672 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1673 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1674 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1675 | x509parse_crt:"3081a130818ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3053003300106300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1676 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1677 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1678 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1679 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020685300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1680 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1681 | X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1682 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1683 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020601300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1684 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1685 | X509 CRT ASN1 (TBS, inv v3Ext, no extnValue) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1686 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1687 | x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020600300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1688 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1689 | X509 CRT ASN1 (TBS, inv v3Ext, inv critical tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1690 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1691 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1692 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1693 | X509 CRT ASN1 (TBS, inv v3Ext, critical length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1694 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1695 | x509parse_crt:"3081a330818da0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30730053003060001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1696 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1697 | X509 CRT ASN1 (TBS, inv v3Ext, critical inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1698 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1699 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1700 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1701 | X509 CRT ASN1 (TBS, inv v3Ext, critical length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1702 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1703 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1704 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1705 | X509 CRT ASN1 (TBS, inv v3Ext, critical length 0) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1706 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1707 | x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000100300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1708 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1709 | X509 CRT ASN1 (TBS, inv v3Ext, critical length 2) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1710 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1711 | x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001020000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1712 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1713 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue inv tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1714 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1715 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1716 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1717 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length missing) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1718 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1719 | x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001010004300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1720 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1721 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length inv encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1722 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1723 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000485300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1724 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1725 | X509 CRT ASN1 (TBS, inv v3Ext, extnValue length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1726 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1727 | x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000401300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1728 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1729 | X509 CRT ASN1 (TBS, inv v3Ext, length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1730 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1731 | x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b3009060001010004000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1732 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1733 | X509 CRT ASN1 (TBS, inv extBasicConstraint, no pathlen length) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1734 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1735 | x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d130101010406300402010102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1736 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1737 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen inv length encoding) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1738 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1739 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1740 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1741 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length out of bounds) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1742 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1743 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1744 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1745 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen empty) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1746 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1747 | x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1748 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1749 | X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length mismatch) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1750 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1751 | x509parse_crt:"3081b430819ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a318301630140603551d13010101040a30080201010201010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1752 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1753 | X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage bad second tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1754 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1755 | x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d250416301406082b0601050507030107082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1756 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1757 | X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1758 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1759 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS |
| 1760 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1761 | X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage repeated) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1762 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1763 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d250416301406082b0601050507030106082b06010505070302301d0603551d250416301406082b0601050507030106082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS |
| 1764 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1765 | X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated outside Extensions) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1766 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1767 | x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1768 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1769 | X509 CRT ASN1 (TBS, valid SubjectID, valid IssuerID, inv v3Ext, SubjectAltName repeated outside Extensions, inv SubjectAltNames tag) |
Hanno Becker | 05987e3 | 2019-06-04 15:51:22 +0100 | [diff] [blame] | 1770 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
| 1771 | x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
| 1772 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1773 | X509 CRT ASN1 (SignatureAlgorithm missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1774 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1775 | x509parse_crt:"3081aa3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1776 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1777 | X509 CRT ASN1 (inv SignatureAlgorithm, bad tag) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1778 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1779 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573740500":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1780 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1781 | X509 CRT ASN1 (inv SignatureAlgorithm, length missing) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1782 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1783 | x509parse_crt:"3081ab3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e7465737430":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1784 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1785 | X509 CRT ASN1 (inv SignatureAlgorithm, inv length encoding) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1786 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1787 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743085":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1788 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1789 | X509 CRT ASN1 (inv SignatureAlgorithm, length out of bounds) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1790 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1791 | x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1792 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1793 | X509 CRT ASN1 (inv SignatureAlgorithm, not the same as SignatureAlgorithm in TBS) |
Hanno Becker | 5f88a77 | 2019-06-04 15:54:43 +0100 | [diff] [blame] | 1794 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1795 | x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010a0500030200ff":"":MBEDTLS_ERR_X509_SIG_MISMATCH |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1796 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1797 | X509 CRT ASN1 (Signature missing) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1798 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1799 | x509parse_crt:"3081b93081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1800 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1801 | X509 CRT ASN1 (inv Signature, bad tag) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1802 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 0f5acc1 | 2019-06-04 16:13:23 +0100 | [diff] [blame] | 1803 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1804 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1805 | X509 CRT ASN1 (inv Signature, length missing) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1806 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1807 | x509parse_crt:"3081ba3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b050003":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1808 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1809 | X509 CRT ASN1 (inv Signature, inv length encoding) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1810 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1811 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000385":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1812 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1813 | X509 CRT ASN1 (inv Signature, length out of bounds) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1814 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1815 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1816 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1817 | X509 CRT ASN1 (inv Signature, empty) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1818 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1819 | x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000300":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1820 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1821 | X509 CRT ASN1 (inv Signature, inv data) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1822 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1823 | x509parse_crt:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030100":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA |
| 1824 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1825 | X509 CRT ASN1 (inv Signature, length mismatch) |
Hanno Becker | 44199b6 | 2019-02-14 12:25:03 +0000 | [diff] [blame] | 1826 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
| 1827 | x509parse_crt:"3081be3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff00":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1828 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1829 | X509 CRT ASN1 (well-formed) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1830 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1831 | x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | b2c38f5 | 2009-07-19 19:36:15 +0000 | [diff] [blame] | 1832 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1833 | X509 CRT ASN1 (GeneralizedTime instead of UTCTime) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1834 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1835 | x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e180e3230313030313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2010-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | 9120018 | 2010-02-18 21:26:15 +0000 | [diff] [blame] | 1836 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1837 | X509 CRT ASN1 (Name with X520 CN) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1838 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1839 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550403130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: CN=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1840 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1841 | X509 CRT ASN1 (Name with X520 C) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1842 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1843 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550406130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: C=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1844 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1845 | X509 CRT ASN1 (Name with X520 L) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1846 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1847 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550407130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: L=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1848 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1849 | X509 CRT ASN1 (Name with X520 ST) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1850 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1851 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550408130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ST=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1852 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1853 | X509 CRT ASN1 (Name with X520 O) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1854 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1855 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040a130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: O=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1856 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1857 | X509 CRT ASN1 (Name with X520 OU) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1858 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1859 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040b130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: OU=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1860 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1861 | X509 CRT ASN1 (Name with unknown X520 part) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1862 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1863 | x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b06035504de130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1864 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1865 | X509 CRT ASN1 (Name with composite RDN) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1866 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 555fbf8 | 2015-02-04 17:11:55 +0000 | [diff] [blame] | 1867 | x509parse_crt:"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":"cert. version \: 3\nserial number \: 4C\:20\:E3\:BD\nissuer name \: C=US, ST=CA, O=Internet Widgits Pty Ltd, CN=Frankencert CA\nsubject name \: C=US, ST=Washington, ??=US, ??=Delaware, O=Authorize.Net LLC, ??=Private Organization, serialNumber=4369191 + CN=www.authorize.net, L=San Francisco\nissued on \: 2013-08-02 15\:14\:37\nexpires on \: 2015-08-17 05\:54\:31\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\n":0 |
| 1868 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1869 | X509 CRT ASN1 (Name with PKCS9 email) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1870 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1871 | x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d010901130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: emailAddress=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1872 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1873 | X509 CRT ASN1 (Name with unknown PKCS9 part) |
Hanno Becker | 01346c6 | 2019-02-12 13:32:06 +0000 | [diff] [blame] | 1874 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1875 | x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d0109ab130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0 |
Paul Bakker | c26a189 | 2009-07-19 20:30:14 +0000 | [diff] [blame] | 1876 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1877 | X509 CRT ASN1 (ECDSA signature, RSA key) |
palaviv | f180df9 | 2016-08-07 11:56:02 +0300 | [diff] [blame] | 1878 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1879 | x509parse_crt:"3081e630819e020103300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343631385a170d3233303730383039343631385a300f310d300b0603550403130454657374304c300d06092a864886f70d0101010500033b003038023100e8f546061d3b49bc2f6b7524b7ea4d73a8d5293ee8c64d9407b70b5d16baebc32b8205591eab4e1eb57e9241883701250203010001300906072a8648ce3d0401033800303502186e18209afbed14a0d9a796efcad68891e3ccd5f75815c833021900e92b4fd460b1994693243b9ffad54729de865381bda41d25":"cert. version \: 1\nserial number \: 03\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:46\:18\nexpires on \: 2023-07-08 09\:46\:18\nsigned using \: ECDSA with SHA1\nRSA key size \: 384 bits\n":0 |
Manuel Pégourié-Gonnard | 72ef0b7 | 2013-07-10 12:20:54 +0200 | [diff] [blame] | 1880 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1881 | X509 CRT ASN1 (ECDSA signature, EC key) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1882 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1883 | x509parse_crt:"3081eb3081a3020900f41534662ec7e912300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343031395a170d3233303730383039343031395a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d030101033200042137969fabd4e370624a0e1a33e379cab950cce00ef8c3c3e2adaeb7271c8f07659d65d3d777dcf21614363ae4b6e617300906072a8648ce3d04010338003035021858cc0f957946fe6a303d92885a456aa74c743c7b708cbd37021900fe293cac21af352d16b82eb8ea54e9410b3abaadd9f05dd6":"cert. version \: 1\nserial number \: F4\:15\:34\:66\:2E\:C7\:E9\:12\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:40\:19\nexpires on \: 2023-07-08 09\:40\:19\nsigned using \: ECDSA with SHA1\nEC key size \: 192 bits\n":0 |
Manuel Pégourié-Gonnard | a3c86c3 | 2013-07-10 16:54:29 +0200 | [diff] [blame] | 1884 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 1885 | X509 CRT ASN1 (RSA signature, EC key) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 1886 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1887 | x509parse_crt:"3081e430819f020104300d06092a864886f70d0101050500300f310d300b0603550403130454657374301e170d3133303731303135303233375a170d3233303730383135303233375a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d03010103320004e962551a325b21b50cf6b990e33d4318fd16677130726357a196e3efe7107bcb6bdc6d9db2a4df7c964acfe81798433d300d06092a864886f70d01010505000331001a6c18cd1e457474b2d3912743f44b571341a7859a0122774a8e19a671680878936949f904c9255bdd6fffdb33a7e6d8":"cert. version \: 1\nserial number \: 04\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 15\:02\:37\nexpires on \: 2023-07-08 15\:02\:37\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\n":0 |
Manuel Pégourié-Gonnard | a3c86c3 | 2013-07-10 16:54:29 +0200 | [diff] [blame] | 1888 | |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1889 | X509 CRL ASN1 (Incorrect first tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1890 | x509parse_crl:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1891 | |
| 1892 | X509 CRL ASN1 (Correct first tag, data length does not match) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1893 | x509parse_crl:"300000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1894 | |
| 1895 | X509 CRL ASN1 (TBSCertList, tag missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1896 | x509parse_crl:"3000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1897 | |
| 1898 | X509 CRL ASN1 (TBSCertList, version tag len missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1899 | x509parse_crl:"3003300102":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1900 | |
| 1901 | X509 CRL ASN1 (TBSCertList, version correct, alg missing) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1902 | x509parse_crl:"30053003020100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1903 | |
| 1904 | X509 CRL ASN1 (TBSCertList, alg correct, incorrect version) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1905 | x509parse_crl:"300b3009020102300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1906 | |
| 1907 | X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1908 | x509parse_crl:"300b3009020100300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1909 | |
| 1910 | X509 CRL ASN1 (TBSCertList, sig_oid1 id unknown) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1911 | x509parse_crl:"30143012020100300d06092a864886f70d01010f0500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1912 | |
| 1913 | X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1914 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1915 | x509parse_crl:"30143012020100300d06092a864886f70d01010e0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1916 | |
| 1917 | X509 CRL ASN1 (TBSCertList, issuer set missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1918 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1919 | x509parse_crl:"30163014020100300d06092a864886f70d01010e05003000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1920 | |
| 1921 | X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1922 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1923 | x509parse_crl:"30253023020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1924 | |
| 1925 | X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1926 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1927 | x509parse_crl:"30343032020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030":"":MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1928 | |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1929 | X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1930 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1931 | x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1932 | |
| 1933 | X509 CRL ASN1 (TBSCertList, entries present, date in entry invalid) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1934 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1935 | x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1936 | |
| 1937 | X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1938 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1939 | x509parse_crl:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010d0500":"":MBEDTLS_ERR_X509_SIG_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1940 | |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1941 | X509 CRL ASN1 (TBSCertList, sig present, len mismatch) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1942 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1943 | x509parse_crl:"305d3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e05000302000100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1944 | |
| 1945 | X509 CRL ASN1 (TBSCertList, sig present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1946 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 1947 | x509parse_crl:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nserial number\: AB\:CD revocation date\: 2008-12-31 23\:59\:59\nsigned using \: RSA with SHA-224\n":0 |
Paul Bakker | 6b0fa4f | 2009-07-20 20:35:41 +0000 | [diff] [blame] | 1948 | |
Paul Bakker | e4ff413 | 2009-07-27 20:22:10 +0000 | [diff] [blame] | 1949 | X509 CRL ASN1 (TBSCertList, no entries) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 1950 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 1951 | x509parse_crl:"30463031020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nsigned using \: RSA with SHA-224\n":0 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1952 | |
Andres AG | fff826c | 2017-03-07 11:11:12 +0000 | [diff] [blame] | 1953 | X509 CRL ASN1 (invalid version 2) |
| 1954 | x509parse_crl:"30463031020102300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
| 1955 | |
| 1956 | X509 CRL ASN1 (invalid version overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 1957 | x509parse_crl:"3049303102047fffffff300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Andres AG | fff826c | 2017-03-07 11:11:12 +0000 | [diff] [blame] | 1958 | |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1959 | X509 CRL ASN1 (extension seq too long, crl-idp.pem byte 121) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1960 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1961 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1962 | |
| 1963 | X509 CRL ASN1 (extension oid too long, crl-idp.pem byte 123) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1964 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1965 | x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290628551d1c0101ff041f301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1966 | |
| 1967 | X509 CRL ASN1 (extension critical invalid length, crl-idp.pem byte 128) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1968 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1969 | x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c0102ff041f301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH |
| 1970 | |
| 1971 | X509 CRL ASN1 (extension data too long, crl-idp.pem byte 131) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1972 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1973 | x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
| 1974 | |
| 1975 | X509 CRL ASN1 (extension data too short, crl-idp.pem byte 131) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1976 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | 0bdb050 | 2018-03-14 11:34:29 +0100 | [diff] [blame] | 1977 | x509parse_crl:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c0101ff041e301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
| 1978 | |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 1979 | X509 CRL ASN1 (extension not critical explicit, crl-idp.pem byte 129) |
Gilles Peskine | 1cfa2d0 | 2018-03-23 00:55:57 +0100 | [diff] [blame] | 1980 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Manuel Pégourié-Gonnard | a63305d | 2018-03-14 12:23:56 +0100 | [diff] [blame] | 1981 | x509parse_crl:"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":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2018-03-14 07\:31\:48\nnext update \: 2028-03-14 07\:31\:48\nRevoked certificates\:\nsigned using \: RSA with SHA-256\n":0 |
| 1982 | |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1983 | X509 CRT parse path #2 (one cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1984 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
| 1985 | mbedtls_x509_crt_parse_path:"data_files/dir1":0:1 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1986 | |
| 1987 | X509 CRT parse path #3 (two certs) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1988 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 1989 | mbedtls_x509_crt_parse_path:"data_files/dir2":0:2 |
Manuel Pégourié-Gonnard | fbae2a1 | 2013-11-26 16:43:39 +0100 | [diff] [blame] | 1990 | |
| 1991 | X509 CRT parse path #4 (two certs, one non-cert) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 1992 | depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 1993 | mbedtls_x509_crt_parse_path:"data_files/dir3":1:2 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 1994 | |
Manuel Pégourié-Gonnard | 1beb048 | 2017-06-05 13:49:44 +0200 | [diff] [blame] | 1995 | X509 CRT verify long chain (max intermediate CA, trusted) |
| 1996 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 1997 | mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA:0:0 |
| 1998 | |
| 1999 | X509 CRT verify long chain (max intermediate CA, untrusted) |
| 2000 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2001 | mbedtls_x509_crt_verify_max:"data_files/test-ca2.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA-1:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED |
| 2002 | |
| 2003 | X509 CRT verify long chain (max intermediate CA + 1) |
| 2004 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 31458a1 | 2017-06-26 10:11:49 +0200 | [diff] [blame] | 2005 | mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA+1:MBEDTLS_ERR_X509_FATAL_ERROR:-1 |
Manuel Pégourié-Gonnard | 1beb048 | 2017-06-05 13:49:44 +0200 | [diff] [blame] | 2006 | |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2007 | X509 CRT verify chain #1 (zero pathlen intermediate) |
Janos Follath | 822b2c3 | 2015-10-11 10:25:22 +0200 | [diff] [blame] | 2008 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2009 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert14.crt data_files/dir4/cert13.crt data_files/dir4/cert12.crt":"data_files/dir4/cert11.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | 822b2c3 | 2015-10-11 10:25:22 +0200 | [diff] [blame] | 2010 | |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2011 | X509 CRT verify chain #2 (zero pathlen root) |
| 2012 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2013 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert23.crt data_files/dir4/cert22.crt":"data_files/dir4/cert21.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2014 | |
| 2015 | X509 CRT verify chain #3 (nonzero pathlen root) |
| 2016 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2017 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert34.crt data_files/dir4/cert33.crt data_files/dir4/cert32.crt":"data_files/dir4/cert31.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2018 | |
| 2019 | X509 CRT verify chain #4 (nonzero pathlen intermediate) |
| 2020 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2021 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert45.crt data_files/dir4/cert44.crt data_files/dir4/cert43.crt data_files/dir4/cert42.crt":"data_files/dir4/cert41.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2022 | |
| 2023 | X509 CRT verify chain #5 (nonzero maxpathlen intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2024 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2025 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert54.crt data_files/dir4/cert53.crt data_files/dir4/cert52.crt":"data_files/dir4/cert51.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2026 | |
| 2027 | X509 CRT verify chain #6 (nonzero maxpathlen root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2028 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2029 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2030 | |
| 2031 | X509 CRT verify chain #7 (maxpathlen root, self signed in path) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2032 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2033 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert74.crt data_files/dir4/cert73.crt data_files/dir4/cert72.crt":"data_files/dir4/cert71.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2034 | |
| 2035 | X509 CRT verify chain #8 (self signed maxpathlen root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2036 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2037 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert61.crt data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0 |
Janos Follath | ef4f258 | 2015-10-11 16:17:27 +0200 | [diff] [blame] | 2038 | |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2039 | X509 CRT verify chain #9 (zero pathlen first intermediate, valid) |
Manuel Pégourié-Gonnard | a3aa43d | 2015-11-19 10:46:07 +0100 | [diff] [blame] | 2040 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2041 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert83.crt data_files/dir4/cert82.crt":"data_files/dir4/cert81.crt":0:0:"":0 |
Manuel Pégourié-Gonnard | a3aa43d | 2015-11-19 10:46:07 +0100 | [diff] [blame] | 2042 | |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2043 | X509 CRT verify chain #10 (zero pathlen root, valid) |
| 2044 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2045 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":0:0:"":0 |
Manuel Pégourié-Gonnard | 8b4331a | 2015-11-19 10:52:12 +0100 | [diff] [blame] | 2046 | |
Manuel Pégourié-Gonnard | 9832cea | 2017-05-23 10:13:40 +0200 | [diff] [blame] | 2047 | X509 CRT verify chain #11 (valid chain, missing profile) |
| 2048 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2049 | mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":-1:MBEDTLS_ERR_X509_BAD_INPUT_DATA:"nonesuch":0 |
Manuel Pégourié-Gonnard | 9832cea | 2017-05-23 10:13:40 +0200 | [diff] [blame] | 2050 | |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2051 | X509 CRT verify chain #12 (suiteb profile, RSA root) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2052 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2053 | mbedtls_x509_crt_verify_chain:"data_files/server3.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2054 | |
| 2055 | X509 CRT verify chain #13 (RSA only profile, EC root) |
| 2056 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2057 | mbedtls_x509_crt_verify_chain:"data_files/server4.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2058 | |
Manuel Pégourié-Gonnard | d092277 | 2017-06-27 13:26:43 +0200 | [diff] [blame] | 2059 | X509 CRT verify chain #13 (RSA only profile, EC trusted EE) |
| 2060 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2061 | mbedtls_x509_crt_verify_chain:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
| 2062 | |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2063 | X509 CRT verify chain #14 (RSA-3072 profile, root key too small) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2064 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2065 | mbedtls_x509_crt_verify_chain:"data_files/server1.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2066 | |
| 2067 | X509 CRT verify chain #15 (suiteb profile, rsa intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2068 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2069 | mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2070 | |
| 2071 | X509 CRT verify chain #16 (RSA-only profile, EC intermediate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2072 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2073 | mbedtls_x509_crt_verify_chain:"data_files/server8.crt data_files/test-int-ca2.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2074 | |
| 2075 | X509 CRT verify chain #17 (SHA-512 profile) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2076 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
Manuel Pégourié-Gonnard | 6b9d53f | 2017-05-23 12:26:58 +0200 | [diff] [blame] | 2077 | mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_MD:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"sha512":0 |
Manuel Pégourié-Gonnard | 6622fed | 2017-05-23 11:29:29 +0200 | [diff] [blame] | 2078 | |
Manuel Pégourié-Gonnard | 4185978 | 2017-05-23 12:58:53 +0200 | [diff] [blame] | 2079 | X509 CRT verify chain #18 (len=1, vrfy fatal on depth 1) |
| 2080 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C |
| 2081 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-2:"":2 |
| 2082 | |
| 2083 | X509 CRT verify chain #19 (len=0, vrfy fatal on depth 0) |
| 2084 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C |
| 2085 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-1:"":1 |
| 2086 | |
| 2087 | X509 CRT verify chain #20 (len=1, vrfy fatal on depth 0) |
| 2088 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C |
| 2089 | mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca.crt":-1:-1:"":1 |
| 2090 | |
| 2091 | X509 CRT verify chain #21 (len=3, vrfy fatal on depth 3) |
| 2092 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2093 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-4:"":8 |
| 2094 | |
| 2095 | X509 CRT verify chain #22 (len=3, vrfy fatal on depth 2) |
| 2096 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2097 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-3:"":4 |
| 2098 | |
| 2099 | X509 CRT verify chain #23 (len=3, vrfy fatal on depth 1) |
| 2100 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2101 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-2:"":2 |
| 2102 | |
| 2103 | X509 CRT verify chain #24 (len=3, vrfy fatal on depth 0) |
| 2104 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2105 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-1:"":1 |
| 2106 | |
| 2107 | X509 CRT verify chain #25 (len=3, vrfy fatal on depth 3, untrusted) |
| 2108 | depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2109 | mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca2.crt":-1:-4:"":8 |
| 2110 | |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2111 | X509 OID description #1 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2112 | x509_oid_desc:"2b06010505070301":"TLS Web Server Authentication" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2113 | |
| 2114 | X509 OID description #2 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2115 | x509_oid_desc:"2b0601050507030f":"notfound" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2116 | |
| 2117 | X509 OID description #3 |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2118 | x509_oid_desc:"2b0601050507030100":"notfound" |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2119 | |
| 2120 | X509 OID numstring #1 (wide buffer) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2121 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":20:17 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2122 | |
| 2123 | X509 OID numstring #2 (buffer just fits) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2124 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":18:17 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2125 | |
| 2126 | X509 OID numstring #3 (buffer too small) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2127 | x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":17:MBEDTLS_ERR_OID_BUF_TOO_SMALL |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2128 | |
| 2129 | X509 OID numstring #4 (larger number) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2130 | x509_oid_numstr:"2a864886f70d":"1.2.840.113549":15:14 |
Manuel Pégourié-Gonnard | 7afdb88 | 2014-03-28 16:06:35 +0100 | [diff] [blame] | 2131 | |
| 2132 | X509 OID numstring #5 (arithmetic overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2133 | x509_oid_numstr:"2a8648f9f8f7f6f5f4f3f2f1f001":"":100:MBEDTLS_ERR_OID_BUF_TOO_SMALL |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2134 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2135 | X509 CRT keyUsage #1 (no extension, expected KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2136 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2137 | x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2138 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2139 | X509 CRT keyUsage #2 (no extension, surprising KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2140 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2141 | x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2142 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2143 | X509 CRT keyUsage #3 (extension present, no KU) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2144 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2145 | x509_check_key_usage:"data_files/server1.key_usage.crt":0:0 |
| 2146 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2147 | X509 CRT keyUsage #4 (extension present, single KU present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2148 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2149 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2150 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2151 | X509 CRT keyUsage #5 (extension present, single KU absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2152 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2153 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2154 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2155 | X509 CRT keyUsage #6 (extension present, combined KU present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2156 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2157 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0 |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2158 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2159 | X509 CRT keyUsage #7 (extension present, combined KU both absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2160 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2161 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_KU_CRL_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2162 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2163 | X509 CRT keyUsage #8 (extension present, combined KU one absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2164 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 2165 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_KEY_AGREEMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 603116c | 2014-04-09 09:50:03 +0200 | [diff] [blame] | 2166 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2167 | X509 CRT keyUsage #9 (extension present, decOnly allowed absent) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2168 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2169 | x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0 |
| 2170 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2171 | X509 CRT keyUsage #10 (extension present, decOnly non-allowed present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2172 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2173 | x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA |
| 2174 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2175 | X509 CRT keyUsage #11 (extension present, decOnly allowed present) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2176 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Manuel Pégourié-Gonnard | 655a964 | 2015-06-23 10:48:44 +0200 | [diff] [blame] | 2177 | x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0 |
| 2178 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2179 | X509 CRT extendedKeyUsage #1 (no extension, serverAuth) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2180 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2181 | x509_check_extended_key_usage:"data_files/server5.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2182 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2183 | X509 CRT extendedKeyUsage #2 (single value, present) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2184 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2185 | x509_check_extended_key_usage:"data_files/server5.eku-srv.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2186 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2187 | X509 CRT extendedKeyUsage #3 (single value, absent) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2188 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2189 | x509_check_extended_key_usage:"data_files/server5.eku-cli.crt":"2b06010505070301":MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2190 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2191 | X509 CRT extendedKeyUsage #4 (two values, first) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2192 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2193 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070301":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2194 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2195 | X509 CRT extendedKeyUsage #5 (two values, second) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2196 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2197 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070302":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2198 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2199 | X509 CRT extendedKeyUsage #6 (two values, other) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2200 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2201 | x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070303":MBEDTLS_ERR_X509_BAD_INPUT_DATA |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2202 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2203 | X509 CRT extendedKeyUsage #7 (any, random) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2204 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2205 | x509_check_extended_key_usage:"data_files/server5.eku-cs_any.crt":"2b060105050703ff":0 |
Manuel Pégourié-Gonnard | 7afb8a0 | 2014-04-10 17:53:56 +0200 | [diff] [blame] | 2206 | |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2207 | X509 RSASSA-PSS parameters ASN1 (good, all defaults) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2208 | x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2209 | |
| 2210 | X509 RSASSA-PSS parameters ASN1 (wrong initial tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2211 | x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2212 | |
| 2213 | X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2214 | x509_parse_rsassa_pss_params:"a400":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2215 | |
| 2216 | X509 RSASSA-PSS parameters ASN1 (good, HashAlg SHA256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2217 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2218 | x509_parse_rsassa_pss_params:"a00d300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2219 | |
| 2220 | X509 RSASSA-PSS parameters ASN1 (good, explicit HashAlg = default) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2221 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2222 | x509_parse_rsassa_pss_params:"a009300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2223 | |
| 2224 | X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2225 | x509_parse_rsassa_pss_params:"a00a300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2226 | |
| 2227 | X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2228 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2229 | x509_parse_rsassa_pss_params:"a00a300706052b0e03021a00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2230 | |
| 2231 | X509 RSASSA-PSS parameters ASN1 (HashAlg with parameters) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2232 | x509_parse_rsassa_pss_params:"a00f300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2233 | |
Paul Bakker | 237a847 | 2014-06-25 14:45:24 +0200 | [diff] [blame] | 2234 | X509 RSASSA-PSS parameters ASN1 (HashAlg unknown OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2235 | x509_parse_rsassa_pss_params:"a00d300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2236 | |
| 2237 | X509 RSASSA-PSS parameters ASN1 (good, MGAlg = MGF1-SHA256) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2238 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2239 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2240 | |
| 2241 | X509 RSASSA-PSS parameters ASN1 (good, explicit MGAlg = default) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2242 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2243 | x509_parse_rsassa_pss_params:"a116301406092a864886f70d010108300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2244 | |
| 2245 | X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2246 | x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2247 | |
| 2248 | X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2249 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2250 | x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b060960864801650304020100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2251 | |
| 2252 | X509 RSASSA-PSS parameters ASN1 (MGAlg AlgId wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2253 | x509_parse_rsassa_pss_params:"a11a301906092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2254 | |
| 2255 | X509 RSASSA-PSS parameters ASN1 (MGAlg OID != MGF1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2256 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010109300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2257 | |
| 2258 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2259 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108310b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2260 | |
| 2261 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2262 | x509_parse_rsassa_pss_params:"a10f300d06092a864886f70d0101083000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2263 | |
| 2264 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2265 | x509_parse_rsassa_pss_params:"a11b301906092a864886f70d010108300c0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2266 | |
| 2267 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2268 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0709608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2269 | |
| 2270 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2271 | x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2272 | |
| 2273 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2274 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2275 | x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2276 | |
| 2277 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2278 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2279 | x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2280 | |
| 2281 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1c) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2282 | x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2283 | |
| 2284 | X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #2) |
palaviv | a07ecda | 2016-08-07 11:15:29 +0300 | [diff] [blame] | 2285 | depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2286 | x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e0609608648016503040201050000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2287 | |
| 2288 | X509 RSASSA-PSS parameters ASN1 (good, saltLen = 94) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2289 | x509_parse_rsassa_pss_params:"a20302015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2290 | |
| 2291 | X509 RSASSA-PSS parameters ASN1 (good, explicit saltLen = default) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2292 | x509_parse_rsassa_pss_params:"a203020114":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2293 | |
| 2294 | X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2295 | x509_parse_rsassa_pss_params:"a20402015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2296 | |
| 2297 | X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #2) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2298 | x509_parse_rsassa_pss_params:"a20402015e00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2299 | |
| 2300 | X509 RSASSA-PSS parameters ASN1 (saltLen not an int) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2301 | x509_parse_rsassa_pss_params:"a2023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2302 | |
| 2303 | X509 RSASSA-PSS parameters ASN1 (good, explicit trailerField = default) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2304 | x509_parse_rsassa_pss_params:"a303020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0 |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2305 | |
| 2306 | X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2307 | x509_parse_rsassa_pss_params:"a304020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2308 | |
| 2309 | X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #2) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2310 | x509_parse_rsassa_pss_params:"a30402010100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2311 | |
| 2312 | X509 RSASSA-PSS parameters ASN1 (trailerField not an int) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2313 | x509_parse_rsassa_pss_params:"a3023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2314 | |
| 2315 | X509 RSASSA-PSS parameters ASN1 (trailerField not 1) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2316 | x509_parse_rsassa_pss_params:"a303020102":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG |
Manuel Pégourié-Gonnard | 8540369 | 2014-06-06 14:48:38 +0200 | [diff] [blame] | 2317 | |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2318 | X509 CSR ASN.1 (OK) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2319 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2320 | mbedtls_x509_csr_parse:"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":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n":0 |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2321 | |
| 2322 | X509 CSR ASN.1 (bad first tag) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2323 | mbedtls_x509_csr_parse:"3100":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2324 | |
| 2325 | X509 CSR ASN.1 (bad sequence: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2326 | mbedtls_x509_csr_parse:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2327 | |
| 2328 | X509 CSR ASN.1 (total length mistmatch) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2329 | mbedtls_x509_csr_parse:"30010000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2330 | |
| 2331 | X509 CSR ASN.1 (bad CRI: not a sequence) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2332 | mbedtls_x509_csr_parse:"30023100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2333 | |
| 2334 | X509 CSR ASN.1 (bad CRI: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2335 | mbedtls_x509_csr_parse:"30023001":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2336 | |
| 2337 | X509 CSR ASN.1 (bad CRI.Version: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2338 | mbedtls_x509_csr_parse:"30053002020100":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2339 | |
| 2340 | X509 CSR ASN.1 (bad CRI.Version: not v1) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2341 | mbedtls_x509_csr_parse:"30053003020101":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2342 | |
| 2343 | X509 CSR ASN.1 (bad CRI.Name: not a sequence) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2344 | mbedtls_x509_csr_parse:"300730050201003100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2345 | |
| 2346 | X509 CSR ASN.1 (bad CRI.Name: overlong) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2347 | mbedtls_x509_csr_parse:"30083005020100300100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2348 | |
| 2349 | X509 CSR ASN.1 (bad CRI.Name payload: not a set) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2350 | mbedtls_x509_csr_parse:"3009300702010030023000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2351 | |
| 2352 | X509 CSR ASN.1 (bad CRI.Name payload: overlong) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2353 | mbedtls_x509_csr_parse:"300a30080201003002310100":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2354 | |
| 2355 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: missing) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2356 | mbedtls_x509_csr_parse:"30143012020100300d310b3009060355040613024e4c":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2357 | |
| 2358 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2359 | mbedtls_x509_csr_parse:"30163014020100300d310b3009060355040613024e4c3100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2360 | |
| 2361 | X509 CSR ASN.1 (bad SubjectPublicKeyInfo: overlong) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2362 | mbedtls_x509_csr_parse:"30173014020100300d310b3009060355040613024e4c300100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2363 | |
| 2364 | X509 CSR ASN.1 (bad attributes: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2365 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2366 | mbedtls_x509_csr_parse:"3081973081940201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2367 | |
| 2368 | X509 CSR ASN.1 (bad attributes: bad tag) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2369 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2370 | mbedtls_x509_csr_parse:"3081993081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2371 | |
| 2372 | X509 CSR ASN.1 (bad attributes: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2373 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2374 | mbedtls_x509_csr_parse:"30819a3081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa00100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2375 | |
| 2376 | X509 CSR ASN.1 (bad sigAlg: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2377 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2378 | mbedtls_x509_csr_parse:"3081c23081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2379 | |
| 2380 | X509 CSR ASN.1 (bad sigAlg: not a sequence) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2381 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2382 | mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2383 | |
| 2384 | X509 CSR ASN.1 (bad sigAlg: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2385 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2386 | mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2387 | |
| 2388 | X509 CSR ASN.1 (bad sigAlg: unknown) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2389 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2390 | mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2391 | |
| 2392 | X509 CSR ASN.1 (bad sig: missing) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2393 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2394 | mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d0401":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2395 | |
| 2396 | X509 CSR ASN.1 (bad sig: not a bit string) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2397 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2398 | mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010400":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2399 | |
| 2400 | X509 CSR ASN.1 (bad sig: overlong) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2401 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2402 | mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA |
Manuel Pégourié-Gonnard | d77cd5d | 2014-06-13 11:13:15 +0200 | [diff] [blame] | 2403 | |
| 2404 | X509 CSR ASN.1 (extra data after signature) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2405 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C |
Hanno Becker | d0d78d7 | 2019-02-12 10:20:42 +0000 | [diff] [blame] | 2406 | mbedtls_x509_csr_parse:"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":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2407 | |
Andres AG | f00baff | 2017-03-07 10:57:34 +0000 | [diff] [blame] | 2408 | X509 CSR ASN.1 (invalid version overflow) |
Hanno Becker | 32b48ea | 2019-06-03 09:48:09 +0100 | [diff] [blame] | 2409 | mbedtls_x509_csr_parse:"3008300602047fffffff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION |
Andres AG | f00baff | 2017-03-07 10:57:34 +0000 | [diff] [blame] | 2410 | |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2411 | X509 File parse (no issues) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2412 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2413 | x509parse_crt_file:"data_files/server7_int-ca.crt":0 |
| 2414 | |
| 2415 | X509 File parse (extra space in one certificate) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2416 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Paul Bakker | 5a5fa92 | 2014-09-26 14:53:04 +0200 | [diff] [blame] | 2417 | x509parse_crt_file:"data_files/server7_pem_space.crt":1 |
| 2418 | |
| 2419 | X509 File parse (all certificates fail) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2420 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 2421 | x509parse_crt_file:"data_files/server7_all_space.crt":MBEDTLS_ERR_PEM_INVALID_DATA + MBEDTLS_ERR_BASE64_INVALID_CHARACTER |
Manuel Pégourié-Gonnard | 052d10c | 2015-07-31 11:09:59 +0200 | [diff] [blame] | 2422 | |
| 2423 | X509 File parse (trailing spaces, OK) |
Manuel Pégourié-Gonnard | 43be6cd | 2017-06-20 09:53:42 +0200 | [diff] [blame] | 2424 | depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C |
Manuel Pégourié-Gonnard | 052d10c | 2015-07-31 11:09:59 +0200 | [diff] [blame] | 2425 | x509parse_crt_file:"data_files/server7_trailing_space.crt":0 |
Andres AG | 4b76aec | 2016-09-23 13:16:02 +0100 | [diff] [blame] | 2426 | |
| 2427 | X509 Get time (UTC no issues) |
| 2428 | depends_on:MBEDTLS_X509_USE_C |
| 2429 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"500101000000Z":0:1950:1:1:0:0:0 |
| 2430 | |
| 2431 | X509 Get time (Generalized Time no issues) |
| 2432 | depends_on:MBEDTLS_X509_USE_C |
| 2433 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"99991231235959Z":0:9999:12:31:23:59:59 |
| 2434 | |
| 2435 | X509 Get time (UTC year without leap day) |
| 2436 | depends_on:MBEDTLS_X509_USE_C |
| 2437 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"490229121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2438 | |
| 2439 | X509 Get time (UTC year with leap day) |
| 2440 | depends_on:MBEDTLS_X509_USE_C |
| 2441 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212Z":0:2000:2:29:12:12:12 |
| 2442 | |
| 2443 | X509 Get time (UTC invalid day of month #1) |
| 2444 | depends_on:MBEDTLS_X509_USE_C |
| 2445 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000132121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2446 | |
| 2447 | X509 Get time (UTC invalid day of month #2) |
| 2448 | depends_on:MBEDTLS_X509_USE_C |
| 2449 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001131121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2450 | |
| 2451 | X509 Get time (UTC invalid hour) |
| 2452 | depends_on:MBEDTLS_X509_USE_C |
| 2453 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130241212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2454 | |
| 2455 | X509 Get time (UTC invalid min) |
| 2456 | depends_on:MBEDTLS_X509_USE_C |
| 2457 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130236012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2458 | |
| 2459 | X509 Get time (UTC invalid sec) |
| 2460 | depends_on:MBEDTLS_X509_USE_C |
| 2461 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130235960Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
Janos Follath | ea7054a | 2017-02-08 14:13:02 +0000 | [diff] [blame] | 2462 | |
| 2463 | X509 Get time (UTC without time zone) |
| 2464 | depends_on:MBEDTLS_X509_USE_C |
| 2465 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212":0:2000:2:29:12:12:12 |
| 2466 | |
| 2467 | X509 Get time (UTC with invalid time zone #1) |
| 2468 | depends_on:MBEDTLS_X509_USE_C |
| 2469 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2470 | |
| 2471 | X509 Get time (UTC with invalid time zone #2) |
| 2472 | depends_on:MBEDTLS_X509_USE_C |
| 2473 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2474 | |
| 2475 | X509 Get time (Date with invalid tag) |
| 2476 | depends_on:MBEDTLS_X509_USE_C |
| 2477 | x509_get_time:MBEDTLS_ASN1_CONTEXT_SPECIFIC:"000229121212":MBEDTLS_ERR_X509_INVALID_DATE+MBEDTLS_ERR_ASN1_UNEXPECTED_TAG:0:0:0:0:0:0 |
| 2478 | |
| 2479 | X509 Get time (UTC, truncated) |
| 2480 | depends_on:MBEDTLS_X509_USE_C |
| 2481 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2482 | |
| 2483 | X509 Get time (Generalized Time, truncated) |
| 2484 | depends_on:MBEDTLS_X509_USE_C |
| 2485 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2486 | |
| 2487 | X509 Get time (UTC without seconds) |
| 2488 | depends_on:MBEDTLS_X509_USE_C |
| 2489 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212":MBEDTLS_ERR_X509_INVALID_DATE:2000:2:29:12:12:0 |
| 2490 | |
| 2491 | X509 Get time (UTC without seconds and with invalid time zone #1) |
| 2492 | depends_on:MBEDTLS_X509_USE_C |
| 2493 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2494 | |
| 2495 | X509 Get time (UTC without second and with invalid time zone #2) |
| 2496 | depends_on:MBEDTLS_X509_USE_C |
| 2497 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2498 | |
| 2499 | X509 Get time (UTC invalid character in year) |
| 2500 | depends_on:MBEDTLS_X509_USE_C |
| 2501 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0\1130231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2502 | |
| 2503 | X509 Get time (UTC invalid character in month) |
| 2504 | depends_on:MBEDTLS_X509_USE_C |
| 2505 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001%30231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2506 | |
| 2507 | X509 Get time (UTC invalid character in day) |
| 2508 | depends_on:MBEDTLS_X509_USE_C |
| 2509 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011`0231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2510 | |
| 2511 | X509 Get time (UTC invalid character in hour) |
| 2512 | depends_on:MBEDTLS_X509_USE_C |
| 2513 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302h1212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2514 | |
| 2515 | X509 Get time (UTC invalid character in min) |
| 2516 | depends_on:MBEDTLS_X509_USE_C |
| 2517 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"00113023u012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2518 | |
| 2519 | X509 Get time (UTC invalid character in sec) |
| 2520 | depends_on:MBEDTLS_X509_USE_C |
| 2521 | x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302359n0Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2522 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2523 | X509 Get time (Generalized Time, year multiple of 100 but not 400 is not a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2524 | depends_on:MBEDTLS_X509_USE_C |
| 2525 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19000229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
| 2526 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2527 | X509 Get time (Generalized Time, year multiple of 4 but not 100 is a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2528 | depends_on:MBEDTLS_X509_USE_C |
| 2529 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19920229000000Z":0:1992:2:29:0:0:0 |
| 2530 | |
Andres Amaya Garcia | 60100d0 | 2017-10-06 17:05:24 +0100 | [diff] [blame] | 2531 | X509 Get time (Generalized Time, year multiple of 400 is a leap year) |
Andres Amaya Garcia | 735b37e | 2016-11-21 15:38:02 +0000 | [diff] [blame] | 2532 | depends_on:MBEDTLS_X509_USE_C |
| 2533 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229000000Z":0:2000:2:29:0:0:0 |
| 2534 | |
| 2535 | X509 Get time (Generalized Time invalid leap year not multiple of 4, 100 or 400) |
| 2536 | depends_on:MBEDTLS_X509_USE_C |
| 2537 | x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19910229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0 |
Manuel Pégourié-Gonnard | da19f4c | 2018-06-12 12:40:54 +0200 | [diff] [blame] | 2538 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2539 | X509 CRT verify restart: trusted EE, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2540 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2541 | x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:0:0:0 |
| 2542 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2543 | X509 CRT verify restart: trusted EE, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2544 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 2545 | x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:1:0:0 |
| 2546 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2547 | X509 CRT verify restart: no intermediate, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2548 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2549 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:0:0:0 |
| 2550 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2551 | X509 CRT verify restart: no intermediate, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2552 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2553 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:1:100:10000 |
| 2554 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2555 | X509 CRT verify restart: no intermediate, max_ops=40000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2556 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2557 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:40000:0:0 |
| 2558 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2559 | X509 CRT verify restart: no intermediate, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2560 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2561 | x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:500:20:80 |
| 2562 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2563 | X509 CRT verify restart: no intermediate, badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2564 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2565 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
| 2566 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2567 | X509 CRT verify restart: no intermediate, badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2568 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2569 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2570 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2571 | X509 CRT verify restart: no intermediate, badsign, max_ops=40000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2572 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2573 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:40000:0:0 |
| 2574 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2575 | X509 CRT verify restart: no intermediate, badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2576 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED |
| 2577 | x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:20:80 |
| 2578 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2579 | X509 CRT verify restart: one int, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2580 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2581 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:0:0:0 |
| 2582 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2583 | X509 CRT verify restart: one int, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2584 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2585 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:1:100:10000 |
| 2586 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2587 | X509 CRT verify restart: one int, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2588 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2589 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:30000:0:0 |
| 2590 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2591 | X509 CRT verify restart: one int, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2592 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2593 | x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:500:25:100 |
| 2594 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2595 | X509 CRT verify restart: one int, EE badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2596 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2597 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
| 2598 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2599 | X509 CRT verify restart: one int, EE badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2600 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2601 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2602 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2603 | X509 CRT verify restart: one int, EE badsign, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2604 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2605 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0 |
| 2606 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2607 | X509 CRT verify restart: one int, EE badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2608 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2609 | x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100 |
| 2610 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2611 | X509 CRT verify restart: one int, int badsign, max_ops=0 (disabled) |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame] | 2612 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2613 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2614 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2615 | X509 CRT verify restart: one int, int badsign, max_ops=1 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2616 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2617 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000 |
| 2618 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2619 | X509 CRT verify restart: one int, int badsign, max_ops=30000 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2620 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2621 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0 |
| 2622 | |
Hanno Becker | 2389d16 | 2019-02-14 12:52:47 +0000 | [diff] [blame] | 2623 | X509 CRT verify restart: one int, int badsign, max_ops=500 |
Manuel Pégourié-Gonnard | 8b59049 | 2017-08-14 18:04:19 +0200 | [diff] [blame] | 2624 | depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C |
| 2625 | x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100 |