blob: c230516796c1f6c9858d7e6961137d2aaaf14868 [file] [log] [blame]
Hanno Becker2389d162019-02-14 12:52:47 +00001X509 CRT information #1
palaviva07ecda2016-08-07 11:15:29 +03002depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +02003x509_cert_info:"data_files/server1.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +00004
Hanno Becker2389d162019-02-14 12:52:47 +00005X509 CRT information #1 (DER)
Hanno Becker462c3e52019-01-31 10:55:42 +00006depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
7x509_cert_info:"data_files/server1.der":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
8
Hanno Becker2389d162019-02-14 12:52:47 +00009X509 CRT information #2
palaviva07ecda2016-08-07 11:15:29 +030010depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020011x509_cert_info:"data_files/server2.crt":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +000012
Hanno Becker2389d162019-02-14 12:52:47 +000013X509 CRT information #2 (DER)
Hanno Becker462c3e52019-01-31 10:55:42 +000014depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
15x509_cert_info:"data_files/server2.der":"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
16
Hanno Becker2389d162019-02-14 12:52:47 +000017X509 CRT information #3
palaviva07ecda2016-08-07 11:15:29 +030018depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Hanno Becker381c77c2018-11-01 15:07:42 +000019x509_cert_info:"data_files/test-ca.crt":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2011-02-12 14\:44\:00\nexpires on \: 2021-02-12 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +000020
Hanno Becker2389d162019-02-14 12:52:47 +000021X509 CRT information #3 (DER)
Hanno Becker462c3e52019-01-31 10:55:42 +000022depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
23x509_cert_info:"data_files/test-ca.der":"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2011-02-12 14\:44\:00\nexpires on \: 2021-02-12 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n"
24
Hanno Becker2389d162019-02-14 12:52:47 +000025X509 CRT information MD2 Digest
palaviva07ecda2016-08-07 11:15:29 +030026depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD2_C
Hanno Becker2e0f71f2019-06-03 14:14:04 +010027x509_cert_info:"data_files/cert_md2.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD2\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000028
Hanno Becker2389d162019-02-14 12:52:47 +000029X509 CRT information MD4 Digest
palaviva07ecda2016-08-07 11:15:29 +030030depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD4_C
Hanno Becker2e0f71f2019-06-03 14:14:04 +010031x509_cert_info:"data_files/cert_md4.crt":"cert. version \: 3\nserial number \: 05\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD4\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000032
Hanno Becker2389d162019-02-14 12:52:47 +000033X509 CRT information MD5 Digest
palaviva07ecda2016-08-07 11:15:29 +030034depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_MD5_C
Hanno Becker2e0f71f2019-06-03 14:14:04 +010035x509_cert_info:"data_files/cert_md5.crt":"cert. version \: 3\nserial number \: 06\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD5\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000036
Hanno Becker2389d162019-02-14 12:52:47 +000037X509 CRT information SHA1 Digest
palaviva07ecda2016-08-07 11:15:29 +030038depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020039x509_cert_info:"data_files/cert_sha1.crt":"cert. version \: 3\nserial number \: 07\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA1\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000040
Hanno Becker2389d162019-02-14 12:52:47 +000041X509 CRT information SHA224 Digest
palaviva07ecda2016-08-07 11:15:29 +030042depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020043x509_cert_info:"data_files/cert_sha224.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA224\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000044
Hanno Becker2389d162019-02-14 12:52:47 +000045X509 CRT information SHA256 Digest
palaviva07ecda2016-08-07 11:15:29 +030046depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020047x509_cert_info:"data_files/cert_sha256.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA256\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000048
Hanno Becker2389d162019-02-14 12:52:47 +000049X509 CRT information SHA384 Digest
palaviva07ecda2016-08-07 11:15:29 +030050depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020051x509_cert_info:"data_files/cert_sha384.crt":"cert. version \: 3\nserial number \: 0A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA384\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000052
Hanno Becker2389d162019-02-14 12:52:47 +000053X509 CRT information SHA512 Digest
palaviva07ecda2016-08-07 11:15:29 +030054depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020055x509_cert_info:"data_files/cert_sha512.crt":"cert. version \: 3\nserial number \: 0B\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA512\nissued on \: 2011-02-12 14\:44\:07\nexpires on \: 2021-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +000056
Hanno Becker2389d162019-02-14 12:52:47 +000057X509 CRT information RSA-PSS, SHA1 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020059x509_cert_info:"data_files/server9.crt":"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010060
Hanno Becker2389d162019-02-14 12:52:47 +000061X509 CRT information RSA-PSS, SHA224 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020062depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020063x509_cert_info:"data_files/server9-sha224.crt":"cert. version \: 3\nserial number \: 17\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:36\nexpires on \: 2024-01-18 13\:57\:36\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010064
Hanno Becker2389d162019-02-14 12:52:47 +000065X509 CRT information RSA-PSS, SHA256 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020067x509_cert_info:"data_files/server9-sha256.crt":"cert. version \: 3\nserial number \: 18\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:45\nexpires on \: 2024-01-18 13\:57\:45\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010068
Hanno Becker2389d162019-02-14 12:52:47 +000069X509 CRT information RSA-PSS, SHA384 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020070depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020071x509_cert_info:"data_files/server9-sha384.crt":"cert. version \: 3\nserial number \: 19\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:58\nexpires on \: 2024-01-18 13\:57\:58\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +010072
Hanno Becker2389d162019-02-14 12:52:47 +000073X509 CRT information RSA-PSS, SHA512 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard78117d52014-05-31 17:08:16 +020075x509_cert_info:"data_files/server9-sha512.crt":"cert. version \: 3\nserial number \: 1A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:58\:12\nexpires on \: 2024-01-18 13\:58\:12\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard59a75d52014-01-22 10:12:57 +010076
Hanno Becker2389d162019-02-14 12:52:47 +000077X509 CRT information EC, SHA1 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020078depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020079x509_cert_info:"data_files/server5-sha1.crt":"cert. version \: 3\nserial number \: 12\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020080
Hanno Becker2389d162019-02-14 12:52:47 +000081X509 CRT information EC, SHA224 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020082depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020083x509_cert_info:"data_files/server5-sha224.crt":"cert. version \: 3\nserial number \: 13\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020084
Hanno Becker2389d162019-02-14 12:52:47 +000085X509 CRT information EC, SHA256 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020086depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020087x509_cert_info:"data_files/server5.crt":"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020088
Hanno Becker2389d162019-02-14 12:52:47 +000089X509 CRT information EC, SHA384 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020090depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020091x509_cert_info:"data_files/server5-sha384.crt":"cert. version \: 3\nserial number \: 14\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020092
Hanno Becker2389d162019-02-14 12:52:47 +000093X509 CRT information EC, SHA512 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +020094depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +020095x509_cert_info:"data_files/server5-sha512.crt":"cert. version \: 3\nserial number \: 15\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +020096
Hanno Becker2389d162019-02-14 12:52:47 +000097X509 CRT information EC, SHA256 Digest, hardware module name SAN
Ron Eldorb2dc3fa2019-03-21 13:40:13 +020098depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
99x509_cert_info:"data_files/server5-othername.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nissued on \: 2019-03-24 09\:06\:02\nexpires on \: 2029-03-21 09\:06\:02\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n"
100
Hanno Becker2389d162019-02-14 12:52:47 +0000101X509 CRT information EC, SHA256 Digest, Wisun Fan device
Ron Eldor3c4734a2019-03-25 14:05:23 +0200102depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
103x509_cert_info:"data_files/server5-fan.crt":"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS FAN\nissued on \: 2019-03-25 09\:03\:46\nexpires on \: 2029-03-22 09\:03\:46\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\next key usage \: Wi-SUN Alliance Field Area Network (FAN)\n"
104
Hanno Becker2389d162019-02-14 12:52:47 +0000105X509 CRT information, NS Cert Type
palaviva07ecda2016-08-07 11:15:29 +0300106depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard919f8f52014-04-01 13:01:11 +0200107x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\ncert. type \: SSL Server\n"
108
Hanno Becker2389d162019-02-14 12:52:47 +0000109X509 CRT information, Key Usage
palaviva07ecda2016-08-07 11:15:29 +0300110depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard7b30cfc2014-04-01 18:00:07 +0200111x509_cert_info:"data_files/server1.key_usage.crt":"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2011-02-12 14\:44\:06\nexpires on \: 2021-02-12 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n"
Manuel Pégourié-Gonnard65c2ddc2014-04-01 14:12:11 +0200112
Hanno Becker2389d162019-02-14 12:52:47 +0000113X509 CRT information, Key Usage with decipherOnly
palaviva07ecda2016-08-07 11:15:29 +0300114depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard9a702252015-06-23 10:14:36 +0200115x509_cert_info:"data_files/keyUsage.decipherOnly.crt":"cert. version \: 3\nserial number \: 9B\:13\:CE\:4C\:A5\:6F\:DE\:52\nissuer name \: C=GB, L=Cambridge, O=Default Company Ltd\nsubject name \: C=GB, L=Cambridge, O=Default Company Ltd\nissued on \: 2015-05-12 10\:36\:55\nexpires on \: 2018-05-11 10\:36\:55\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment, Decipher Only\n"
116
Hanno Becker2389d162019-02-14 12:52:47 +0000117X509 CRT information, Subject Alt Name
palaviva07ecda2016-08-07 11:15:29 +0300118depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200119x509_cert_info:"data_files/cert_example_multi.crt":"cert. version \: 3\nserial number \: 11\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=www.example.com\nissued on \: 2012-05-10 13\:23\:41\nexpires on \: 2022-05-11 13\:23\:41\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: example.com\n dNSName \: example.net\n dNSName \: *.example.org\n"
120
Hanno Becker2389d162019-02-14 12:52:47 +0000121X509 CRT information, Multiple different Subject Alt Name
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200122depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
123x509_cert_info:"data_files/multiple_san.crt":"cert. version \: 3\nserial number \: 04\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nissued on \: 2019-04-22 16\:10\:48\nexpires on \: 2029-04-19 16\:10\:48\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n dNSName \: example.com\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n dNSName \: example.net\n dNSName \: *.example.org\n"
Manuel Pégourié-Gonnardbce2b302014-04-01 13:43:28 +0200124
Hanno Becker2389d162019-02-14 12:52:47 +0000125X509 CRT information, Subject Alt Name + Key Usage
palaviva07ecda2016-08-07 11:15:29 +0300126depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Janos Follath22f605f2019-05-10 10:37:17 +0100127x509_cert_info:"data_files/cert_example_multi_nocn.crt":"cert. version \: 3\nserial number \: F7\:C6\:7F\:F8\:E9\:A9\:63\:F9\nissuer name \: C=NL\nsubject name \: C=NL\nissued on \: 2014-01-22 10\:04\:33\nexpires on \: 2024-01-22 10\:04\:33\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: www.shotokan-braunschweig.de\n dNSName \: www.massimo-abate.eu\n <unsupported>\n <unsupported>\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n"
Manuel Pégourié-Gonnard65c2ddc2014-04-01 14:12:11 +0200128
Hanno Becker2389d162019-02-14 12:52:47 +0000129X509 CRT information, RSA Certificate Policy any
Ron Eldor74d9acc2019-03-21 14:00:03 +0200130depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
131x509_cert_info:"data_files/test-ca-any_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-03-21 16\:40\:59\nexpires on \: 2029-03-21 16\:40\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
132
Hanno Becker2389d162019-02-14 12:52:47 +0000133X509 CRT information, ECDSA Certificate Policy any
Ron Eldor74d9acc2019-03-21 14:00:03 +0200134depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
135x509_cert_info:"data_files/test-ca-any_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-03-25 09\:02\:45\nexpires on \: 2029-03-25 09\:02\:45\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
136
Hanno Becker2389d162019-02-14 12:52:47 +0000137X509 CRT information, RSA Certificate Policy any with qualifier
Ron Eldor74d9acc2019-03-21 14:00:03 +0200138depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
139x509_cert_info:"data_files/test-ca-any_policy_with_qualifier.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:14\:31\nexpires on \: 2029-04-28 13\:14\:31\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
140
Hanno Becker2389d162019-02-14 12:52:47 +0000141X509 CRT information, ECDSA Certificate Policy any with qualifier
Ron Eldor74d9acc2019-03-21 14:00:03 +0200142depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
143x509_cert_info:"data_files/test-ca-any_policy_with_qualifier_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 10\:16\:05\nexpires on \: 2029-04-28 10\:16\:05\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: Any Policy\n"
144
Hanno Becker2389d162019-02-14 12:52:47 +0000145X509 CRT information, RSA Certificate multiple Policies
Ron Eldor74d9acc2019-03-21 14:00:03 +0200146depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
147x509_cert_info:"data_files/test-ca-multi_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 12\:59\:19\nexpires on \: 2029-04-28 12\:59\:19\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n"
148
Hanno Becker2389d162019-02-14 12:52:47 +0000149X509 CRT information, ECDSA Certificate multiple Policies
Ron Eldor74d9acc2019-03-21 14:00:03 +0200150depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
151x509_cert_info:"data_files/test-ca-multi_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 12\:59\:51\nexpires on \: 2029-04-28 12\:59\:51\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???, Any Policy\n"
152
Hanno Becker2389d162019-02-14 12:52:47 +0000153X509 CRT information, RSA Certificate unsupported policy
Ron Eldor74d9acc2019-03-21 14:00:03 +0200154depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
155x509_cert_info:"data_files/test-ca-unsupported_policy.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:00\:13\nexpires on \: 2029-04-28 13\:00\:13\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n"
156
Hanno Becker2389d162019-02-14 12:52:47 +0000157X509 CRT information, ECDSA Certificate unsupported policy
Ron Eldor74d9acc2019-03-21 14:00:03 +0200158depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
159x509_cert_info:"data_files/test-ca-unsupported_policy_ec.crt":"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 13\:00\:19\nexpires on \: 2029-04-28 13\:00\:19\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncertificate policies \: ???\n"
160
Hanno Becker2389d162019-02-14 12:52:47 +0000161X509 CRT information, Key Usage + Extended Key Usage
palaviva07ecda2016-08-07 11:15:29 +0300162depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard7b30cfc2014-04-01 18:00:07 +0200163x509_cert_info:"data_files/server1.ext_ku.crt":"cert. version \: 3\nserial number \: 21\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2014-04-01 14\:44\:43\nexpires on \: 2024-03-29 14\:44\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\next key usage \: TLS Web Server Authentication\n"
Manuel Pégourié-Gonnardf6f4ab42014-04-01 17:32:44 +0200164
Hanno Becker2389d162019-02-14 12:52:47 +0000165X509 CRT information RSA signed by EC
palavivf180df92016-08-07 11:56:02 +0300166depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +0200167x509_cert_info:"data_files/server4.crt":"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +0200168
Hanno Becker2389d162019-02-14 12:52:47 +0000169X509 CRT information EC signed by RSA
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200170depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnardb28487d2014-04-01 12:19:09 +0200171x509_cert_info:"data_files/server3.crt":"cert. version \: 3\nserial number \: 0D\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-08-09 09\:17\:03\nexpires on \: 2023-08-07 09\:17\:03\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\nbasic constraints \: CA=false\n"
Manuel Pégourié-Gonnard6d29ff22013-08-10 09:44:43 +0200172
Hanno Becker2389d162019-02-14 12:52:47 +0000173X509 CRT information Bitstring in subject name
palaviva07ecda2016-08-07 11:15:29 +0300174depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Janos Follath22f605f2019-05-10 10:37:17 +0100175x509_cert_info:"data_files/bitstring-in-dn.pem":"cert. version \: 3\nserial number \: 02\nissuer name \: CN=Test CA 01, ST=Ecnivorp, C=XX, emailAddress=tca@example.com, O=Test CA Authority\nsubject name \: C=XX, O=tca, ST=Ecnivorp, OU=TCA, CN=Client, emailAddress=client@example.com, serialNumber=7101012255, uniqueIdentifier=?7101012255\nissued on \: 2015-03-11 12\:06\:51\nexpires on \: 2025-03-08 12\:06\:51\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n <unsupported>\next key usage \: TLS Web Client Authentication\n"
Manuel Pégourié-Gonnard39ead3e2015-03-27 13:09:21 +0100176
Paul Bakkerc27c4e22013-09-23 15:01:36 +0200177X509 certificate v1 with extension
palaviva07ecda2016-08-07 11:15:29 +0300178depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3:MBEDTLS_SHA1_C
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200179x509_cert_info:"data_files/cert_v1_with_ext.crt":"cert. version \: 1\nserial number \: BD\:ED\:44\:C7\:D2\:3E\:C2\:A4\nissuer name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nsubject name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, emailAddress=admin@identity-check.org, CN=identity-check.org\nissued on \: 2013-07-04 16\:17\:02\nexpires on \: 2014-07-04 16\:17\:02\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nsubject alt name \:\n dNSName \: identity-check.org\n dNSName \: www.identity-check.org\n"
180
181X509 SAN parsing otherName
182depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
183x509_parse_san:"data_files/server5-othername.crt":"type \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\n"
184
185X509 SAN parsing dNSName
186depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
187x509_parse_san:"data_files/cert_example_multi.crt":"type \: 2\ndNSName \: example.com\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n"
188
189X509 SAN parsing Multiple different types
190depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
191x509_parse_san:"data_files/multiple_san.crt":"type \: 2\ndNSName \: example.com\ntype \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n"
192
193X509 SAN parsing, no subject alt name
194depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
195x509_parse_san:"data_files/server4.crt":""
196
197X509 SAN parsing, unsupported otherName name
198depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
199x509_parse_san:"data_files/server5-unsupported_othername.crt":""
Paul Bakkerc27c4e22013-09-23 15:01:36 +0200200
Paul Bakker37940d9f2009-07-10 22:38:58 +0000201X509 CRL information #1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200202depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200203mbedtls_x509_crl_info:"data_files/crl_expired.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-20 10\:24\:19\nnext update \: 2011-02-20 11\:24\:19\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000204
205X509 CRL Information MD2 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200206depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD2_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200207mbedtls_x509_crl_info:"data_files/crl_md2.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2009-07-19 19\:56\:37\nnext update \: 2009-09-17 19\:56\:37\nRevoked certificates\:\nserial number\: 01 revocation date\: 2009-02-09 21\:12\:36\nserial number\: 03 revocation date\: 2009-02-09 21\:12\:36\nsigned using \: RSA with MD2\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000208
209X509 CRL Information MD4 Digest
palaviva07ecda2016-08-07 11:15:29 +0300210depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200211mbedtls_x509_crl_info:"data_files/crl_md4.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD4\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000212
213X509 CRL Information MD5 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200214depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200215mbedtls_x509_crl_info:"data_files/crl_md5.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD5\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000216
217X509 CRL Information SHA1 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200218depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219mbedtls_x509_crl_info:"data_files/crl_sha1.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000220
221X509 CRL Information SHA224 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200222depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200223mbedtls_x509_crl_info:"data_files/crl_sha224.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000224
225X509 CRL Information SHA256 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200226depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200227mbedtls_x509_crl_info:"data_files/crl_sha256.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000228
229X509 CRL Information SHA384 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200230depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200231mbedtls_x509_crl_info:"data_files/crl_sha384.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\n"
Paul Bakkerc26a1892009-07-19 20:30:14 +0000232
233X509 CRL Information SHA512 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200234depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200235mbedtls_x509_crl_info:"data_files/crl_sha512.pem":"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\n"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000236
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100237X509 CRL information RSA-PSS, SHA1 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200238depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
239mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:46\:35\nnext update \: 2024-01-18 13\:46\:35\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100240
241X509 CRL information RSA-PSS, SHA224 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200242depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
243mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:06\nnext update \: 2024-01-18 13\:56\:06\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100244
245X509 CRL information RSA-PSS, SHA256 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200246depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
247mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:16\nnext update \: 2024-01-18 13\:56\:16\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100248
249X509 CRL information RSA-PSS, SHA384 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200250depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
251mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:28\nnext update \: 2024-01-18 13\:56\:28\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100252
253X509 CRL information RSA-PSS, SHA512 Digest
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200254depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
255mbedtls_x509_crl_info:"data_files/crl-rsa-pss-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:38\nnext update \: 2024-01-18 13\:56\:38\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\n"
Manuel Pégourié-Gonnard8e42ff62014-01-24 15:56:20 +0100256
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200257X509 CRL Information EC, SHA1 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200258depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200259mbedtls_x509_crl_info:"data_files/crl-ec-sha1.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA1\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200260
261X509 CRL Information EC, SHA224 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200262depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200263mbedtls_x509_crl_info:"data_files/crl-ec-sha224.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA224\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200264
265X509 CRL Information EC, SHA256 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200266depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200267mbedtls_x509_crl_info:"data_files/crl-ec-sha256.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA256\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200268
269X509 CRL Information EC, SHA384 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200270depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200271mbedtls_x509_crl_info:"data_files/crl-ec-sha384.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA384\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200272
273X509 CRL Information EC, SHA512 Digest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200274depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275mbedtls_x509_crl_info:"data_files/crl-ec-sha512.pem":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA512\n"
Manuel Pégourié-Gonnard05b9dce2013-08-10 10:19:03 +0200276
Andres AGa39db392016-12-08 17:10:38 +0000277X509 CRL Malformed Input (trailing spaces at end of file)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200278depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_SHA512_C:MBEDTLS_ECDSA_C
Andres AGa39db392016-12-08 17:10:38 +0000279mbedtls_x509_crl_parse:"data_files/crl-malformed-trailing-spaces.pem":MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT
280
Manuel Pégourié-Gonnardfd3e4fb2018-03-13 11:53:30 +0100281X509 CRL Unsupported critical extension (issuingDistributionPoint)
282depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
283mbedtls_x509_crl_parse:"data_files/crl-idp.pem":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
284
Manuel Pégourié-Gonnarda63305d2018-03-14 12:23:56 +0100285X509 CRL Unsupported non-critical extension (issuingDistributionPoint)
286depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
287mbedtls_x509_crl_parse:"data_files/crl-idpnc.pem":0
288
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100289X509 CSR Information RSA with MD4
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200290depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD4_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291mbedtls_x509_csr_info:"data_files/server1.req.md4":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100292
293X509 CSR Information RSA with MD5
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200294depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD5_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295mbedtls_x509_csr_info:"data_files/server1.req.md5":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100296
297X509 CSR Information RSA with SHA1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200298depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200299mbedtls_x509_csr_info:"data_files/server1.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100300
301X509 CSR Information RSA with SHA224
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200302depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200303mbedtls_x509_csr_info:"data_files/server1.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100304
Hanno Becker01346c62019-02-12 13:32:06 +0000305X509 CSR Information RSA with SHA-256
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200306depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200307mbedtls_x509_csr_info:"data_files/server1.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100308
309X509 CSR Information RSA with SHA384
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200310depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200311mbedtls_x509_csr_info:"data_files/server1.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100312
313X509 CSR Information RSA with SHA512
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200314depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA512_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200315mbedtls_x509_csr_info:"data_files/server1.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100316
317X509 CSR Information EC with SHA1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200318depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200319mbedtls_x509_csr_info:"data_files/server5.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100320
321X509 CSR Information EC with SHA224
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200322depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200323mbedtls_x509_csr_info:"data_files/server5.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100324
325X509 CSR Information EC with SHA256
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200326depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200327mbedtls_x509_csr_info:"data_files/server5.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100328
329X509 CSR Information EC with SHA384
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200330depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200331mbedtls_x509_csr_info:"data_files/server5.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100332
333X509 CSR Information EC with SHA512
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200334depends_on:MBEDTLS_ECDSA_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA512_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200335mbedtls_x509_csr_info:"data_files/server5.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\n"
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100336
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100337X509 CSR Information RSA-PSS with SHA1
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200338depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
339mbedtls_x509_csr_info:"data_files/server9.req.sha1":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0x6A)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100340
341X509 CSR Information RSA-PSS with SHA224
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200342depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
343mbedtls_x509_csr_info:"data_files/server9.req.sha224":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0x62)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100344
345X509 CSR Information RSA-PSS with SHA256
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200346depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C
347mbedtls_x509_csr_info:"data_files/server9.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0x5E)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100348
349X509 CSR Information RSA-PSS with SHA384
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200350depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
351mbedtls_x509_csr_info:"data_files/server9.req.sha384":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0x4E)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100352
353X509 CSR Information RSA-PSS with SHA512
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200354depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C
355mbedtls_x509_csr_info:"data_files/server9.req.sha512":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0x3E)\nRSA key size \: 1024 bits\n"
Manuel Pégourié-Gonnard39868ee2014-01-24 18:47:17 +0100356
Hanno Becker01346c62019-02-12 13:32:06 +0000357X509 CSR Information RSA with SHA-256 - Microsoft header
Simon Butcher03de2102018-10-06 16:24:13 +0100358depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
359mbedtls_x509_csr_info:"data_files/server1-ms.req.sha256":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n"
360
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100361X509 Verify Information: empty
362x509_verify_info:0:"":""
363
364X509 Verify Information: one issue
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100365x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:"":"Certificate was missing\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100366
367X509 Verify Information: two issues
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100368x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:"":"The certificate validity has expired\nThe CRL is expired\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100369
370X509 Verify Information: two issues, one unknown
Manuel Pégourié-Gonnard95051642015-06-15 10:39:46 +0200371x509_verify_info:MBEDTLS_X509_BADCERT_OTHER | 0x80000000:"":"Other reason (can be used by verify callback)\nUnknown reason (this should not happen)\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100372
373X509 Verify Information: empty, with prefix
374x509_verify_info:0:" ! ":""
375
376X509 Verify Information: one issue, with prefix
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100377x509_verify_info:MBEDTLS_X509_BADCERT_MISSING:" ! ":" ! Certificate was missing\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100378
379X509 Verify Information: two issues, with prefix
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +0100380x509_verify_info:MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED:" ! ":" ! The certificate validity has expired\n ! The CRL is expired\n"
Manuel Pégourié-Gonnardb5f48ad2015-04-20 10:38:13 +0100381
Paul Bakker37940d9f2009-07-10 22:38:58 +0000382X509 Get Distinguished Name #1
palaviva07ecda2016-08-07 11:15:29 +0300383depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200384mbedtls_x509_dn_gets:"data_files/server1.crt":"subject":"C=NL, O=PolarSSL, CN=PolarSSL Server 1"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000385
386X509 Get Distinguished Name #2
palaviva07ecda2016-08-07 11:15:29 +0300387depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200388mbedtls_x509_dn_gets:"data_files/server1.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000389
390X509 Get Distinguished Name #3
palaviva07ecda2016-08-07 11:15:29 +0300391depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200392mbedtls_x509_dn_gets:"data_files/server2.crt":"subject":"C=NL, O=PolarSSL, CN=localhost"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000393
394X509 Get Distinguished Name #4
palaviva07ecda2016-08-07 11:15:29 +0300395depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200396mbedtls_x509_dn_gets:"data_files/server2.crt":"issuer":"C=NL, O=PolarSSL, CN=PolarSSL Test CA"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000397
398X509 Time Expired #1
palaviva07ecda2016-08-07 11:15:29 +0300399depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100400mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_from":1
Paul Bakker37940d9f2009-07-10 22:38:58 +0000401
402X509 Time Expired #2
palaviva07ecda2016-08-07 11:15:29 +0300403depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100404mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_to":0
Paul Bakker37940d9f2009-07-10 22:38:58 +0000405
406X509 Time Expired #3
palaviva07ecda2016-08-07 11:15:29 +0300407depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100408mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_from":1
Paul Bakker37940d9f2009-07-10 22:38:58 +0000409
410X509 Time Expired #4
palaviva07ecda2016-08-07 11:15:29 +0300411depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100412mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_to":0
Paul Bakker37940d9f2009-07-10 22:38:58 +0000413
414X509 Time Expired #5
palaviva07ecda2016-08-07 11:15:29 +0300415depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100416mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_from":1
Paul Bakker37940d9f2009-07-10 22:38:58 +0000417
Manuel Pégourié-Gonnarde7f64a82013-08-09 10:59:25 +0200418X509 Time Expired #6
palaviva07ecda2016-08-07 11:15:29 +0300419depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100420mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_to":0
Paul Bakker37940d9f2009-07-10 22:38:58 +0000421
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100422X509 Time Future #1
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200423depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100424mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_from":0
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100425
426X509 Time Future #2
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200427depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100428mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_to":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100429
430X509 Time Future #3
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200431depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100432mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_from":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100433
434X509 Time Future #4
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200435depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100436mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_to":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100437
438X509 Time Future #5
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200439depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100440mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_from":0
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100441
442X509 Time Future #6
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200443depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardc730ed32015-06-02 10:38:50 +0100444mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_to":1
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100445
Hanno Becker2389d162019-02-14 12:52:47 +0000446X509 CRT verification #1 (Revoked Cert, Expired CRL, no CN)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000447depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200448x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000449
Hanno Becker2389d162019-02-14 12:52:47 +0000450X509 CRT verification #1a (Revoked Cert, Future CRL, no CN)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000451depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200452x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100453
Hanno Becker2389d162019-02-14 12:52:47 +0000454X509 CRT verification #2 (Revoked Cert, Expired CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000455depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200456x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000457
Hanno Becker2389d162019-02-14 12:52:47 +0000458X509 CRT verification #2a (Revoked Cert, Future CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000459depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200460x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"localhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100461
Hanno Becker2389d162019-02-14 12:52:47 +0000462X509 CRT verification #3 (Revoked Cert, Future CRL, CN Mismatch)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000463depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200464x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000465
Hanno Becker2389d162019-02-14 12:52:47 +0000466X509 CRT verification #3a (Revoked Cert, Expired CRL, CN Mismatch)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000467depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200468x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100469
Hanno Becker2389d162019-02-14 12:52:47 +0000470X509 CRT verification #4 (Valid Cert, Expired CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000471depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200472x509_verify:"data_files/server2.crt":"data_files/test-ca.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_EXPIRED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000473
Hanno Becker2389d162019-02-14 12:52:47 +0000474X509 CRT verification #4a (Revoked Cert, Future CRL)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000475depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200476x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-future.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100477
Hanno Becker2389d162019-02-14 12:52:47 +0000478X509 CRT verification #5 (Revoked Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000479depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200480x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000481
Hanno Becker2389d162019-02-14 12:52:47 +0000482X509 CRT verification #5' (Revoked Cert, differing DN string formats #1)
Hanno Becker52acdb52018-11-02 10:09:48 +0000483depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
484x509_verify:"data_files/server1.crt":"data_files/test-ca_utf8.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
485
Hanno Becker2389d162019-02-14 12:52:47 +0000486X509 CRT verification #5'' (Revoked Cert, differing DN string formats #2)
Hanno Becker52acdb52018-11-02 10:09:48 +0000487depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
488x509_verify:"data_files/server1.crt":"data_files/test-ca_printable.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
489
Hanno Becker2389d162019-02-14 12:52:47 +0000490X509 CRT verification #5''' (Revoked Cert, differing upper and lower case)
Hanno Becker52acdb52018-11-02 10:09:48 +0000491depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
492x509_verify:"data_files/server1.crt":"data_files/test-ca_uppercase.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
493
Hanno Becker2389d162019-02-14 12:52:47 +0000494X509 CRT verification #6 (Revoked Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000495depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200496x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Server 1":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000497
Hanno Becker2389d162019-02-14 12:52:47 +0000498X509 CRT verification #7 (Revoked Cert, CN Mismatch)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000499depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200500x509_verify:"data_files/server1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"PolarSSL Wrong CN":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000501
Hanno Becker2389d162019-02-14 12:52:47 +0000502X509 CRT verification #8 (Valid Cert)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200503depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200504x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100505
Hanno Becker2389d162019-02-14 12:52:47 +0000506X509 CRT verification #8a (Expired Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000507depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200508x509_verify:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL"
Manuel Pégourié-Gonnard95337652014-03-10 13:15:18 +0100509
Hanno Becker2389d162019-02-14 12:52:47 +0000510X509 CRT verification #8b (Future Cert)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000511depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200512x509_verify:"data_files/server5-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000513
Hanno Becker2389d162019-02-14 12:52:47 +0000514X509 CRT verification #8c (Expired Cert, longer chain)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000515depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnard29d60fb2017-06-05 10:20:32 +0200516x509_verify:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL"
517
Hanno Becker2389d162019-02-14 12:52:47 +0000518X509 CRT verification #8d (Future Cert, longer chain)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000519depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnard29d60fb2017-06-05 10:20:32 +0200520x509_verify:"data_files/server7-future.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL"
521
Hanno Becker2389d162019-02-14 12:52:47 +0000522X509 CRT verification #9 (Not trusted Cert)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200523depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200524x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000525
Hanno Becker2389d162019-02-14 12:52:47 +0000526X509 CRT verification #10 (Not trusted Cert, Expired CRL)
palaviva07ecda2016-08-07 11:15:29 +0300527depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200528x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker37940d9f2009-07-10 22:38:58 +0000529
Hanno Becker2389d162019-02-14 12:52:47 +0000530X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 forbidden)
Hanno Becker7b8abee2019-06-03 14:25:18 +0100531depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
532x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL"
533
Hanno Becker2389d162019-02-14 12:52:47 +0000534X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 forbidden)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200535depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200536x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000537
Hanno Becker2389d162019-02-14 12:52:47 +0000538X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 forbidden)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200539depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200540x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000541
Hanno Becker2389d162019-02-14 12:52:47 +0000542X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 allowed)
Hanno Becker20a4ade2019-06-03 14:27:03 +0100543depends_on:MBEDTLS_MD2_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
544x509_verify:"data_files/cert_md2.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL"
545
Hanno Becker2389d162019-02-14 12:52:47 +0000546X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 allowed)
Hanno Becker20a4ade2019-06-03 14:27:03 +0100547depends_on:MBEDTLS_MD4_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
548x509_verify:"data_files/cert_md4.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL"
549
Hanno Becker2389d162019-02-14 12:52:47 +0000550X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 allowed)
Hanno Becker20a4ade2019-06-03 14:27:03 +0100551depends_on:MBEDTLS_MD5_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
552x509_verify:"data_files/cert_md5.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"all":"NULL"
553
Hanno Becker2389d162019-02-14 12:52:47 +0000554X509 CRT verification #14 (Valid Cert SHA1 Digest explicitly allowed in profile)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200555depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200556x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000557
Hanno Becker2389d162019-02-14 12:52:47 +0000558X509 CRT verification #14 (Valid Cert SHA1 Digest allowed in compile-time default profile)
Gilles Peskine5d2511c2017-05-12 13:16:40 +0200559depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200560x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"":"NULL"
Gilles Peskine4fa6bed2017-05-11 16:41:25 +0200561
Hanno Becker2389d162019-02-14 12:52:47 +0000562X509 CRT verification #14 (Valid Cert SHA1 Digest forbidden in default profile)
Gilles Peskinef11d33b2017-05-22 16:47:22 +0200563depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:!MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200564x509_verify:"data_files/cert_sha1.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_BAD_MD | MBEDTLS_X509_BADCERT_BAD_MD:"":"NULL"
Gilles Peskine2dc81a02017-05-05 19:00:39 +0200565
Hanno Becker2389d162019-02-14 12:52:47 +0000566X509 CRT verification #15 (Valid Cert SHA224 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200567depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200568x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000569
Hanno Becker2389d162019-02-14 12:52:47 +0000570X509 CRT verification #16 (Valid Cert SHA256 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200571depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200572x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000573
Hanno Becker2389d162019-02-14 12:52:47 +0000574X509 CRT verification #17 (Valid Cert SHA384 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200575depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200576x509_verify:"data_files/cert_sha384.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000577
Hanno Becker2389d162019-02-14 12:52:47 +0000578X509 CRT verification #18 (Valid Cert SHA512 Digest)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200579depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200580x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Paul Bakkerb63b0af2011-01-13 17:54:59 +0000581
Hanno Becker2389d162019-02-14 12:52:47 +0000582X509 CRT verification #19 (Valid Cert, denying callback)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200583depends_on:MBEDTLS_SHA512_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200584x509_verify:"data_files/cert_sha512.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_OTHER:"compat":"verify_none"
Paul Bakkerb63b0af2011-01-13 17:54:59 +0000585
Hanno Becker2389d162019-02-14 12:52:47 +0000586X509 CRT verification #19 (Not trusted Cert, allowing callback)
palaviva07ecda2016-08-07 11:15:29 +0300587depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200588x509_verify:"data_files/server2.crt":"data_files/server1.crt":"data_files/crl_expired.pem":"NULL":0:0:"compat":"verify_all"
Paul Bakker4d6b31a2009-07-12 11:11:06 +0000589
Hanno Becker2389d162019-02-14 12:52:47 +0000590X509 CRT verification #21 (domain matching wildcard certificate, case insensitive)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200591depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200592x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.ExAmPlE.com":0:0:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000593
Hanno Becker2389d162019-02-14 12:52:47 +0000594X509 CRT verification #22 (domain not matching wildcard certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200595depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200596x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000597
Hanno Becker2389d162019-02-14 12:52:47 +0000598X509 CRT verification #23 (domain not matching wildcard certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200599depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200600x509_verify:"data_files/cert_example_wildcard.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000601
Hanno Becker2389d162019-02-14 12:52:47 +0000602X509 CRT verification #24 (domain matching CN of multi certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200603depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200604x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000605
Hanno Becker2389d162019-02-14 12:52:47 +0000606X509 CRT verification #25 (domain matching multi certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200607depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200608x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.net":0:0:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000609
Hanno Becker2389d162019-02-14 12:52:47 +0000610X509 CRT verification #26 (domain not matching multi certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200611depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200612x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000613
Hanno Becker2389d162019-02-14 12:52:47 +0000614X509 CRT verification #27 (domain not matching multi certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200615depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200616x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"xample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000617
Hanno Becker2389d162019-02-14 12:52:47 +0000618X509 CRT verification #27 (domain not matching multi certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200619depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200620x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"bexample.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakkera8cd2392012-02-11 16:09:32 +0000621
Hanno Becker2389d162019-02-14 12:52:47 +0000622X509 CRT verification #28 (domain not matching wildcard in multi certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200623depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200624x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"example.org":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"compat":"NULL"
Paul Bakker57b12982012-02-11 17:38:38 +0000625
Hanno Becker2389d162019-02-14 12:52:47 +0000626X509 CRT verification #29 (domain matching wildcard in multi certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200627depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200628x509_verify:"data_files/cert_example_multi.crt":"data_files/test-ca.crt":"data_files/crl.pem":"mail.example.org":0:0:"compat":"NULL"
Paul Bakker57b12982012-02-11 17:38:38 +0000629
Hanno Becker2389d162019-02-14 12:52:47 +0000630X509 CRT verification #30 (domain matching multi certificate without CN)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200631depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200632x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.shotokan-braunschweig.de":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker91956622012-08-23 10:46:54 +0000633
Hanno Becker2389d162019-02-14 12:52:47 +0000634X509 CRT verification #31 (domain not matching multi certificate without CN)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200635depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200636x509_verify:"data_files/cert_example_multi_nocn.crt":"data_files/test-ca.crt":"data_files/crl.pem":"www.example.net":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH + MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Paul Bakker91956622012-08-23 10:46:54 +0000637
Hanno Becker2389d162019-02-14 12:52:47 +0000638X509 CRT verification #32 (Valid, EC cert, RSA CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200639depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200640x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200641
Hanno Becker2389d162019-02-14 12:52:47 +0000642X509 CRT verification #33 (Valid, RSA cert, EC CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200643depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200644x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200645
Hanno Becker2389d162019-02-14 12:52:47 +0000646X509 CRT verification #34 (Valid, EC cert, EC CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200647depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200648x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200649
Hanno Becker2389d162019-02-14 12:52:47 +0000650X509 CRT verification #35 (Revoked, EC CA)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000651depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200652x509_verify:"data_files/server6.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200653
Hanno Becker2389d162019-02-14 12:52:47 +0000654X509 CRT verification #36 (Valid, EC CA, SHA1 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200655depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200656x509_verify:"data_files/server5-sha1.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200657
Hanno Becker2389d162019-02-14 12:52:47 +0000658X509 CRT verification #37 (Valid, EC CA, SHA224 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200659depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200660x509_verify:"data_files/server5-sha224.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200661
Hanno Becker2389d162019-02-14 12:52:47 +0000662X509 CRT verification #38 (Valid, EC CA, SHA384 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200663depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200664x509_verify:"data_files/server5-sha384.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200665
Hanno Becker2389d162019-02-14 12:52:47 +0000666X509 CRT verification #39 (Valid, EC CA, SHA512 Digest)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200667depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_SHA512_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200668x509_verify:"data_files/server5-sha512.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200669
Hanno Becker2389d162019-02-14 12:52:47 +0000670X509 CRT verification #40 (Valid, depth 0, RSA, CA)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200671depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200672x509_verify:"data_files/test-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200673
Hanno Becker2389d162019-02-14 12:52:47 +0000674X509 CRT verification #41 (Valid, depth 0, EC, CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200675depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200676x509_verify:"data_files/test-ca2.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200677
Hanno Becker2389d162019-02-14 12:52:47 +0000678X509 CRT verification #42 (Depth 0, not CA, RSA)
palaviva07ecda2016-08-07 11:15:29 +0300679depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200680x509_verify:"data_files/server2.crt":"data_files/server2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200681
Hanno Becker2389d162019-02-14 12:52:47 +0000682X509 CRT verification #43 (Depth 0, not CA, EC)
palaviva07ecda2016-08-07 11:15:29 +0300683depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200684x509_verify:"data_files/server5.crt":"data_files/server5.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200685
Hanno Becker2389d162019-02-14 12:52:47 +0000686X509 CRT verification #44 (Corrupted signature, EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200687depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200688x509_verify:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200689
Hanno Becker2389d162019-02-14 12:52:47 +0000690X509 CRT verification #45 (Corrupted signature, RSA)
palaviva07ecda2016-08-07 11:15:29 +0300691depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200692x509_verify:"data_files/server2-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200693
Hanno Becker2389d162019-02-14 12:52:47 +0000694X509 CRT verification #45b (Corrupted signature, intermediate CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200695depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard4dfc04a2017-06-05 11:12:13 +0200696x509_verify:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
697
Hanno Becker2389d162019-02-14 12:52:47 +0000698X509 CRT verification #46 (Valid, depth 2, EC-RSA-EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200699depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200700x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200701
Hanno Becker2389d162019-02-14 12:52:47 +0000702X509 CRT verification #47 (Untrusted, depth 2, EC-RSA-EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200703depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200704x509_verify:"data_files/server7_int-ca.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200705
Hanno Becker2389d162019-02-14 12:52:47 +0000706X509 CRT verification #48 (Missing intermediate CA, EC-RSA-EC)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200707depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200708x509_verify:"data_files/server7.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200709
Hanno Becker2389d162019-02-14 12:52:47 +0000710X509 CRT verification #49 (Valid, depth 2, RSA-EC-RSA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200711depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200712x509_verify:"data_files/server8_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200713
Hanno Becker2389d162019-02-14 12:52:47 +0000714X509 CRT verification #50 (Valid, multiple CAs)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200715depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200716x509_verify:"data_files/server2.crt":"data_files/test-ca_cat12.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardb4e9ca92013-08-10 10:52:01 +0200717
Hanno Becker2389d162019-02-14 12:52:47 +0000718X509 CRT verification #51 (Valid, multiple CAs, reverse order)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200719depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200720x509_verify:"data_files/server2.crt":"data_files/test-ca_cat21.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard6009c3a2013-08-09 11:27:14 +0200721
Hanno Becker2389d162019-02-14 12:52:47 +0000722X509 CRT verification #52 (CA keyUsage valid)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200723depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200724x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt_crl.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200725
Hanno Becker2389d162019-02-14 12:52:47 +0000726X509 CRT verification #53 (CA keyUsage missing cRLSign)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200727depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200728x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200729
Hanno Becker2389d162019-02-14 12:52:47 +0000730X509 CRT verification #54 (CA keyUsage missing cRLSign, no CRL)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200731depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200732x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crt.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200733
Hanno Becker2389d162019-02-14 12:52:47 +0000734X509 CRT verification #55 (CA keyUsage missing keyCertSign)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200735depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200736x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-crl.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200737
Hanno Becker2389d162019-02-14 12:52:47 +0000738X509 CRT verification #56 (CA keyUsage plain wrong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200739depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_X509_CHECK_KEY_USAGE:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Gilles Peskineef86ab22017-05-05 18:59:02 +0200740x509_verify:"data_files/server5.crt":"data_files/test-ca2.ku-ds.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard99d4f192014-04-08 15:10:07 +0200741
Hanno Becker2389d162019-02-14 12:52:47 +0000742X509 CRT verification #57 (Valid, RSASSA-PSS, SHA-1)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200743depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200744x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200745
Hanno Becker2389d162019-02-14 12:52:47 +0000746X509 CRT verification #58 (Valid, RSASSA-PSS, SHA-224)
palaviva07ecda2016-08-07 11:15:29 +0300747depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200748x509_verify:"data_files/server9-sha224.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha224.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200749
Hanno Becker2389d162019-02-14 12:52:47 +0000750X509 CRT verification #59 (Valid, RSASSA-PSS, SHA-256)
palaviva07ecda2016-08-07 11:15:29 +0300751depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200752x509_verify:"data_files/server9-sha256.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha256.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200753
Hanno Becker2389d162019-02-14 12:52:47 +0000754X509 CRT verification #60 (Valid, RSASSA-PSS, SHA-384)
palaviva07ecda2016-08-07 11:15:29 +0300755depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200756x509_verify:"data_files/server9-sha384.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha384.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200757
Hanno Becker2389d162019-02-14 12:52:47 +0000758X509 CRT verification #61 (Valid, RSASSA-PSS, SHA-512)
palaviva07ecda2016-08-07 11:15:29 +0300759depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200760x509_verify:"data_files/server9-sha512.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha512.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200761
Hanno Becker2389d162019-02-14 12:52:47 +0000762X509 CRT verification #62 (Revoked, RSASSA-PSS, SHA-1)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000763depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200764x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard53882022014-06-05 17:53:52 +0200765
Hanno Becker2389d162019-02-14 12:52:47 +0000766X509 CRT verification #63 (Revoked, RSASSA-PSS, SHA-1, CRL badsign)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200767depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200768x509_verify:"data_files/server9.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1-badsign.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCRL_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard53882022014-06-05 17:53:52 +0200769
Hanno Becker2389d162019-02-14 12:52:47 +0000770X509 CRT verification #64 (Valid, RSASSA-PSS, SHA-1, not top)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200771depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200772x509_verify:"data_files/server9-with-ca.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200773
Hanno Becker2389d162019-02-14 12:52:47 +0000774X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200775depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200776x509_verify:"data_files/server9-badsign.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200777
Hanno Becker2389d162019-02-14 12:52:47 +0000778X509 CRT verification #66 (RSASSA-PSS, SHA1, no RSA CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200779depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200780x509_verify:"data_files/server9.crt":"data_files/test-ca2.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard920e1cd2014-06-02 18:11:07 +0200781
Hanno Becker2389d162019-02-14 12:52:47 +0000782X509 CRT verification #67 (Valid, RSASSA-PSS, all defaults)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200783depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200784x509_verify:"data_files/server9-defaults.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-sha1.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardeacccb72014-06-05 18:00:08 +0200785
Hanno Becker2389d162019-02-14 12:52:47 +0000786X509 CRT verification #68 (RSASSA-PSS, wrong salt_len)
palaviva07ecda2016-08-07 11:15:29 +0300787depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200788x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard5873b002014-06-06 18:04:09 +0200789
Hanno Becker2389d162019-02-14 12:52:47 +0000790X509 CRT verification #69 (RSASSA-PSS, wrong mgf_hash)
palaviva07ecda2016-08-07 11:15:29 +0300791depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200792x509_verify:"data_files/server9-bad-mgfhash.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnard5873b002014-06-06 18:04:09 +0200793
Hanno Becker2389d162019-02-14 12:52:47 +0000794X509 CRT verification #70 (v1 trusted CA)
palaviva07ecda2016-08-07 11:15:29 +0300795depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200796x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardc4eff162014-06-19 12:18:08 +0200797
Hanno Becker2389d162019-02-14 12:52:47 +0000798X509 CRT verification #71 (v1 trusted CA, other)
palaviva07ecda2016-08-07 11:15:29 +0300799depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200800x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardc4eff162014-06-19 12:18:08 +0200801
Hanno Becker2389d162019-02-14 12:52:47 +0000802X509 CRT verification #72 (v1 chain)
palaviva07ecda2016-08-07 11:15:29 +0300803depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200804x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardc4eff162014-06-19 12:18:08 +0200805
Hanno Becker2389d162019-02-14 12:52:47 +0000806X509 CRT verification #73 (selfsigned trusted without CA bit)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200807depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200808x509_verify:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnardd249b7a2014-06-24 11:49:16 +0200809
Hanno Becker2389d162019-02-14 12:52:47 +0000810X509 CRT verification #74 (signed by selfsigned trusted without CA bit)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200811depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200812x509_verify:"data_files/server6-ss-child.crt":"data_files/server5-selfsigned.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"compat":"NULL"
Manuel Pégourié-Gonnardd249b7a2014-06-24 11:49:16 +0200813
Hanno Becker2389d162019-02-14 12:52:47 +0000814X509 CRT verification #75 (encoding mismatch)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200815depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskineef86ab22017-05-05 18:59:02 +0200816x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard9c911da2014-10-17 12:23:49 +0200817
Hanno Becker2389d162019-02-14 12:52:47 +0000818X509 CRT verification #76 (multiple CRLs, not revoked)
palaviva07ecda2016-08-07 11:15:29 +0300819depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200820x509_verify:"data_files/server5.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100821
Hanno Becker2389d162019-02-14 12:52:47 +0000822X509 CRT verification #77 (multiple CRLs, revoked)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000823depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200824x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ec-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100825
Hanno Becker2389d162019-02-14 12:52:47 +0000826X509 CRT verification #78 (multiple CRLs, revoked by second)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000827depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200828x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_rsa-ec.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100829
Hanno Becker2389d162019-02-14 12:52:47 +0000830X509 CRT verification #79 (multiple CRLs, revoked by future)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000831depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200832x509_verify:"data_files/server6.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED|MBEDTLS_X509_BADCRL_FUTURE:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100833
Hanno Becker2389d162019-02-14 12:52:47 +0000834X509 CRT verification #80 (multiple CRLs, first future, revoked by second)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000835depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200836x509_verify:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"data_files/crl_cat_ecfut-rsa.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_REVOKED:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100837
Hanno Becker2389d162019-02-14 12:52:47 +0000838X509 CRT verification #81 (multiple CRLs, none relevant)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200839depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200840x509_verify:"data_files/enco-cert-utf8str.pem":"data_files/enco-ca-prstr.pem":"data_files/crl_cat_rsa-ec.pem":"NULL":0:0:"compat":"NULL"
Manuel Pégourié-Gonnard57a5d602014-11-19 14:04:09 +0100841
Hanno Becker2389d162019-02-14 12:52:47 +0000842X509 CRT verification #82 (Not yet valid CA and valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200843depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200844x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follath12c868c2016-02-18 17:28:04 +0000845
Hanno Becker2389d162019-02-14 12:52:47 +0000846X509 CRT verification #83 (valid CA and Not yet valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200847depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200848x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-future.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follath12c868c2016-02-18 17:28:04 +0000849
Hanno Becker2389d162019-02-14 12:52:47 +0000850X509 CRT verification #84 (valid CA and Not yet valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200851depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200852x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-present-past.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follathdf4bca22016-02-19 15:57:17 +0000853
Hanno Becker2389d162019-02-14 12:52:47 +0000854X509 CRT verification #85 (Not yet valid CA and valid CA)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200855depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C
Gilles Peskineef86ab22017-05-05 18:59:02 +0200856x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-present.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
Janos Follathdf4bca22016-02-19 15:57:17 +0000857
Hanno Becker2389d162019-02-14 12:52:47 +0000858X509 CRT verification #86 (Not yet valid CA and invalid CA)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000859depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200860x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_FUTURE:"compat":"NULL"
Andres AG9f430c12016-12-13 09:59:07 +0000861
Hanno Becker2389d162019-02-14 12:52:47 +0000862X509 CRT verification #87 (Expired CA and invalid CA)
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000863depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_HAVE_TIME_DATE
Gilles Peskineef86ab22017-05-05 18:59:02 +0200864x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-invalid.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_EXPIRED:"compat":"NULL"
Andres AG9f430c12016-12-13 09:59:07 +0000865
Hanno Becker2389d162019-02-14 12:52:47 +0000866X509 CRT verification #88 (Spurious cert in the chain)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200867depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnardb341dd52017-06-06 10:25:43 +0200868x509_verify:"data_files/server7_spurious_int-ca.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
869
Hanno Becker2389d162019-02-14 12:52:47 +0000870X509 CRT verification #89 (Spurious cert later in the chain)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200871depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnardb341dd52017-06-06 10:25:43 +0200872x509_verify:"data_files/server10_int3_spurious_int-ca2.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha1.pem":"NULL":0:0:"compat":"NULL"
873
Hanno Becker2389d162019-02-14 12:52:47 +0000874X509 CRT verification #90 (EE with same name as trusted root)
Manuel Pégourié-Gonnardc10afdb2017-06-29 09:48:08 +0200875depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200876x509_verify:"data_files/server5-ss-forgeca.crt":"data_files/test-int-ca3.crt":"data_files/crl-ec-sha1.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:"":"NULL"
Manuel Pégourié-Gonnardc10afdb2017-06-29 09:48:08 +0200877
Hanno Becker2389d162019-02-14 12:52:47 +0000878X509 CRT verification #91 (same CA with good then bad key)
Manuel Pégourié-Gonnard2d825d42017-07-03 18:06:38 +0200879depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
880x509_verify:"data_files/server1.crt":"data_files/test-ca-good-alt.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
881
Hanno Becker2389d162019-02-14 12:52:47 +0000882X509 CRT verification #91 (same CA with bad then good key)
Manuel Pégourié-Gonnard2d825d42017-07-03 18:06:38 +0200883depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C
884x509_verify:"data_files/server1.crt":"data_files/test-ca-alt-good.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"compat":"NULL"
885
Hanno Becker2389d162019-02-14 12:52:47 +0000886X509 CRT verification #92 (bad name, allowing callback)
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200887depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnarda54f6cc2017-08-09 10:41:42 +0200888x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"globalhost":0:0:"":"verify_all"
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200889
Hanno Becker2389d162019-02-14 12:52:47 +0000890X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA)
Ron Eldorc1539982018-02-06 18:47:17 +0200891depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECP_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
892x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK:"suite_b":"NULL"
893
Hanno Becker2389d162019-02-14 12:52:47 +0000894X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA)
Manuel Pégourié-Gonnard147b28e2018-03-12 15:26:59 +0100895depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Ron Eldorc1539982018-02-06 18:47:17 +0200896x509_verify:"data_files/server4.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_PK:"suite_b":"NULL"
897
Hanno Becker2389d162019-02-14 12:52:47 +0000898X509 CRT verification #95 (Suite B Valid, EC cert, EC CA)
Manuel Pégourié-Gonnard147b28e2018-03-12 15:26:59 +0100899depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Ron Eldorc1539982018-02-06 18:47:17 +0200900x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"suite_b":"NULL"
901
Hanno Becker2389d162019-02-14 12:52:47 +0000902X509 CRT verification #96 (next profile Invalid Cert SHA224 Digest)
Manuel Pégourié-Gonnard88a8dcb2018-03-12 15:49:35 +0100903depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Ron Eldorc1539982018-02-06 18:47:17 +0200904x509_verify:"data_files/cert_sha224.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCRL_BAD_MD:"next":"NULL"
905
Hanno Becker2389d162019-02-14 12:52:47 +0000906X509 CRT verification #97 (next profile Valid Cert SHA256 Digest)
Manuel Pégourié-Gonnard88a8dcb2018-03-12 15:49:35 +0100907depends_on:MBEDTLS_SHA256_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_SHA1_C
Ron Eldorc1539982018-02-06 18:47:17 +0200908x509_verify:"data_files/cert_sha256.crt":"data_files/test-ca.crt":"data_files/crl-ec-sha256.pem":"NULL":0:0:"next":"NULL"
909
Hanno Becker2389d162019-02-14 12:52:47 +0000910X509 CRT verification with ca callback: failure
Jarno Lamsa557426a2019-03-27 17:08:29 +0200911depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK
Hanno Beckercbb59032019-03-28 14:14:22 +0000912x509_verify_ca_cb_failure:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":MBEDTLS_ERR_X509_FATAL_ERROR
Jarno Lamsa557426a2019-03-27 17:08:29 +0200913
Hanno Becker2389d162019-02-14 12:52:47 +0000914X509 CRT verification callback: bad name
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200915depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200916x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2.crt":"globalhost":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000004\n"
Manuel Pégourié-Gonnarda6568252017-07-05 18:14:38 +0200917
Hanno Becker2389d162019-02-14 12:52:47 +0000918X509 CRT verification callback: trusted EE cert
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200919depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200920x509_verify_callback:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":"NULL":0:"depth 0 - serial 53\:A2\:CB\:4B\:12\:4E\:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200921
Hanno Becker2389d162019-02-14 12:52:47 +0000922X509 CRT verification callback: trusted EE cert, expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000923depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200924x509_verify_callback:"data_files/server5-ss-expired.crt":"data_files/server5-ss-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial D8\:64\:61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200925
Hanno Becker2389d162019-02-14 12:52:47 +0000926X509 CRT verification callback: simple
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200927depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Hanno Becker381c77c2018-11-01 15:07:42 +0000928x509_verify_callback:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200929
Hanno Becker2389d162019-02-14 12:52:47 +0000930X509 CRT verification callback: simple, EE expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000931depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200932x509_verify_callback:"data_files/server5-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200933
Hanno Becker2389d162019-02-14 12:52:47 +0000934X509 CRT verification callback: simple, root expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000935depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200936x509_verify_callback:"data_files/server5.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 1 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200937
Hanno Becker2389d162019-02-14 12:52:47 +0000938X509 CRT verification callback: two trusted roots
palaviva07ecda2016-08-07 11:15:29 +0300939depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000940x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200941
Hanno Becker2389d162019-02-14 12:52:47 +0000942X509 CRT verification callback: two trusted roots, reversed order
palaviva07ecda2016-08-07 11:15:29 +0300943depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000944x509_verify_callback:"data_files/server1.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200945
Hanno Becker2389d162019-02-14 12:52:47 +0000946X509 CRT verification callback: root included
palaviva07ecda2016-08-07 11:15:29 +0300947depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000948x509_verify_callback:"data_files/server1_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200949
Hanno Becker2389d162019-02-14 12:52:47 +0000950X509 CRT verification callback: intermediate ca
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200951depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200952x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200953
Hanno Becker2389d162019-02-14 12:52:47 +0000954X509 CRT verification callback: intermediate ca, root included
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200955depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200956x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-ca_cat12.crt":"NULL":0:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200957
Hanno Becker2389d162019-02-14 12:52:47 +0000958X509 CRT verification callback: intermediate ca trusted
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200959depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200960x509_verify_callback:"data_files/server7_int-ca_ca2.crt":"data_files/test-int-ca.crt":"NULL":0:"depth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardfdbdd722015-09-01 16:35:00 +0200961
Hanno Becker2389d162019-02-14 12:52:47 +0000962X509 CRT verification callback: intermediate ca, EE expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000963depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200964x509_verify_callback:"data_files/server7-expired.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200965
Hanno Becker2389d162019-02-14 12:52:47 +0000966X509 CRT verification callback: intermediate ca, int expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000967depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200968x509_verify_callback:"data_files/server7_int-ca-exp.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000001\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200969
Hanno Becker2389d162019-02-14 12:52:47 +0000970X509 CRT verification callback: intermediate ca, root expired
Deomid Ryabkovde420a42016-11-27 14:50:06 +0000971depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C:MBEDTLS_HAVE_TIME_DATE
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200972x509_verify_callback:"data_files/server7_int-ca.crt":"data_files/test-ca2-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardbc313012017-06-27 12:51:52 +0200973
Hanno Becker2389d162019-02-14 12:52:47 +0000974X509 CRT verification callback: two intermediates
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200975depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000976x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200977
Hanno Becker2389d162019-02-14 12:52:47 +0000978X509 CRT verification callback: two intermediates, root included
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200979depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Hanno Becker381c77c2018-11-01 15:07:42 +0000980x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca_cat21.crt":"NULL":0:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnard560fea32015-09-01 11:59:24 +0200981
Hanno Becker2389d162019-02-14 12:52:47 +0000982X509 CRT verification callback: two intermediates, top int trusted
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200983depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200984x509_verify_callback:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":"NULL":0:"depth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardfdbdd722015-09-01 16:35:00 +0200985
Hanno Becker2389d162019-02-14 12:52:47 +0000986X509 CRT verification callback: two intermediates, low int trusted
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200987depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA256_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200988x509_verify_callback:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-int-ca3.crt":"NULL":0:"depth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
Manuel Pégourié-Gonnardfdbdd722015-09-01 16:35:00 +0200989
Hanno Becker2389d162019-02-14 12:52:47 +0000990X509 CRT verification callback: no intermediate, bad signature
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200991depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200992x509_verify_callback:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n"
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200993
Hanno Becker2389d162019-02-14 12:52:47 +0000994X509 CRT verification callback: one intermediate, bad signature
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200995depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnardbe2f0b52017-08-21 11:00:22 +0200996x509_verify_callback:"data_files/server7-badsign.crt":"data_files/test-ca2.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n"
Manuel Pégourié-Gonnard9bc860c2017-07-14 11:32:38 +0200997
Paul Bakker37940d9f2009-07-10 22:38:58 +0000998X509 Parse Selftest
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +0200999depends_on:MBEDTLS_SHA1_C:MBEDTLS_PEM_PARSE_C:MBEDTLS_CERTS_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Paul Bakker37940d9f2009-07-10 22:38:58 +00001000x509_selftest:
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001001
Hanno Becker2389d162019-02-14 12:52:47 +00001002X509 CRT ASN1 (Empty Certificate)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001003x509parse_crt:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001004
Hanno Becker2389d162019-02-14 12:52:47 +00001005X509 CRT ASN1 (inv Certificate, bad tag)
Hanno Becker0f5acc12019-06-04 16:13:23 +01001006x509parse_crt:"0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001007
Hanno Becker2389d162019-02-14 12:52:47 +00001008X509 CRT ASN1 (inv Certificate, no length)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001009x509parse_crt:"30":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001010
Hanno Becker2389d162019-02-14 12:52:47 +00001011X509 CRT ASN1 (inv Certificate, bad length encoding)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001012x509parse_crt:"3085":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerfae618f2011-10-12 11:53:52 +00001013
Hanno Becker2389d162019-02-14 12:52:47 +00001014X509 CRT ASN1 (inv Certificate, length data incomplete)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001015x509parse_crt:"308200":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerc26a1892009-07-19 20:30:14 +00001016
Hanno Becker2389d162019-02-14 12:52:47 +00001017X509 CRT ASN1 (inv Certificate, length out of bounds)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001018x509parse_crt:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakkerc26a1892009-07-19 20:30:14 +00001019
Hanno Becker2389d162019-02-14 12:52:47 +00001020X509 CRT ASN1 (inv TBS, invalid tag)
Hanno Becker0f5acc12019-06-04 16:13:23 +01001021x509parse_crt:"30020500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001022
Hanno Becker2389d162019-02-14 12:52:47 +00001023X509 CRT ASN1 (inv TBS, length missing)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001024x509parse_crt:"300130":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1025
Hanno Becker2389d162019-02-14 12:52:47 +00001026X509 CRT ASN1 (inv TBS, invalid length encoding)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001027x509parse_crt:"30023085":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1028
Hanno Becker2389d162019-02-14 12:52:47 +00001029X509 CRT ASN1 (inv TBS, length data incomplete)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001030x509parse_crt:"300430839999":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1031
Hanno Becker2389d162019-02-14 12:52:47 +00001032X509 CRT ASN1 (inv TBS, length out of bounds)
Hanno Beckera5c481e2019-06-04 15:19:09 +01001033x509parse_crt:"30023003":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1034
Hanno Becker2389d162019-02-14 12:52:47 +00001035X509 CRT ASN1 (TBS empty)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001036depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera5c481e2019-06-04 15:19:09 +01001037x509parse_crt:"30153000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1038
Hanno Becker0f5acc12019-06-04 16:13:23 +01001039X509 CRT ASN1 (TBS, invalid version tag, serial missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001040depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001041x509parse_crt:"301730020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001042
Hanno Becker2389d162019-02-14 12:52:47 +00001043X509 CRT ASN1 (TBS, valid outer version tag, no outer length)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001044depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001045x509parse_crt:"30163001a0300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001046
Hanno Becker2389d162019-02-14 12:52:47 +00001047X509 CRT ASN1 (TBS, inv inner version tag)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001048depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001049x509parse_crt:"30193004a0020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001050
Hanno Becker2389d162019-02-14 12:52:47 +00001051X509 CRT ASN1 (TBS, valid inner version tag, no inner length)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001052depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001053x509parse_crt:"30183003a00102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001054
Hanno Becker2389d162019-02-14 12:52:47 +00001055X509 CRT ASN1 (TBS, valid inner version tag, inv inner length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001056depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001057x509parse_crt:"30193004a0020285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001058
Hanno Becker2389d162019-02-14 12:52:47 +00001059X509 CRT ASN1 (TBS, valid inner version tag, inner length too large for int)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001060depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001061x509parse_crt:"30293014a012021000000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1062
Hanno Becker2389d162019-02-14 12:52:47 +00001063X509 CRT ASN1 (TBS, valid inner version tag, inner vs. outer length mismatch)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001064depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001065x509parse_crt:"301b3006a00402010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1066
Hanno Becker2389d162019-02-14 12:52:47 +00001067X509 CRT ASN1 (TBS, valid version tag, length exceeds TBS)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001068depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001069x509parse_crt:"30293014a012021100000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1070
Hanno Becker2389d162019-02-14 12:52:47 +00001071X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 3)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001072depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001073x509parse_crt:"308196308180a0030201038204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
1074
Hanno Becker2389d162019-02-14 12:52:47 +00001075X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 4)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001076depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001077x509parse_crt:"308196308180a0030201048204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
1078
Hanno Becker2389d162019-02-14 12:52:47 +00001079X509 CRT ASN1 (TBS, valid version tag + length, version number overflow)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001080depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001081x509parse_crt:"308199308183a00602047FFFFFFF8204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
1082
Hanno Becker2389d162019-02-14 12:52:47 +00001083X509 CRT ASN1 (TBS, serial missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001084depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001085x509parse_crt:"301a3005a003020102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001086
Hanno Becker2389d162019-02-14 12:52:47 +00001087X509 CRT ASN1 (TBS, inv serial, tag wrong)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001088depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001089x509parse_crt:"301c3007a0030201020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001090
Hanno Becker2389d162019-02-14 12:52:47 +00001091X509 CRT ASN1 (TBS, inv serial, length missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001092depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001093x509parse_crt:"301b3006a00302010282300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001094
Hanno Becker2389d162019-02-14 12:52:47 +00001095X509 CRT ASN1 (TBS, inv serial, inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001096depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckere7d8f962019-06-04 15:25:00 +01001097x509parse_crt:"301c3007a0030201028285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1098
Hanno Becker2389d162019-02-14 12:52:47 +00001099X509 CRT ASN1 (TBS, inv serial, length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001100depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckere7d8f962019-06-04 15:25:00 +01001101x509parse_crt:"301c3007a0030201028201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1102
Hanno Becker2389d162019-02-14 12:52:47 +00001103X509 CRT ASN1 (TBS, AlgID missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001104depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Beckera9ef4122019-06-04 15:24:18 +01001105x509parse_crt:"3020300ba0030201028204deadbeef300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001106
Hanno Becker2389d162019-02-14 12:52:47 +00001107X509 CRT ASN1 (TBS, inv AlgID, tag wrong)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001108depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001109x509parse_crt:"3022300da0030201028204deadbeef0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001110
Hanno Becker2389d162019-02-14 12:52:47 +00001111X509 CRT ASN1 (TBS, inv AlgID, OID missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001112depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001113x509parse_crt:"307b3073a0030201008204deadbeef3000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff3000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001114
Hanno Becker2389d162019-02-14 12:52:47 +00001115X509 CRT ASN1 (TBS, inv AlgID, OID tag wrong)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001116depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001117x509parse_crt:"307f3075a0030201008204deadbeef30020500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020500030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001118
Hanno Becker2389d162019-02-14 12:52:47 +00001119X509 CRT ASN1 (TBS, inv AlgID, OID inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001120depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001121x509parse_crt:"307f3075a0030201008204deadbeef30020685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakker345fb492009-07-20 21:26:07 +00001122
Hanno Becker2389d162019-02-14 12:52:47 +00001123X509 CRT ASN1 (TBS, inv AlgID, OID length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001124depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001125x509parse_crt:"307f3075a0030201008204deadbeef30020601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001126
Hanno Becker2389d162019-02-14 12:52:47 +00001127X509 CRT ASN1 (TBS, inv AlgID, OID empty)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001128depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001129x509parse_crt:"307f3075a0030201008204deadbeef30020600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020600030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakker345fb492009-07-20 21:26:07 +00001130
Hanno Becker2389d162019-02-14 12:52:47 +00001131X509 CRT ASN1 (TBS, inv AlgID, OID unknown)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001132depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001133x509parse_crt:"3081873079a0030201008204deadbeef30060604deadbeef300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30060604deadbeef030200ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001134
Hanno Becker2389d162019-02-14 12:52:47 +00001135X509 CRT ASN1 (TBS, inv AlgID, param inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001136depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001137x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0685030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001138
Hanno Becker2389d162019-02-14 12:52:47 +00001139X509 CRT ASN1 (TBS, inv AlgID, param length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001140depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001141x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0601030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001142
Hanno Becker2389d162019-02-14 12:52:47 +00001143X509 CRT ASN1 (TBS, inv AlgID, param length mismatch)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001144depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001145x509parse_crt:"30819a308182a0030201008204deadbeef300f06092a864886f70d01010b06010000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300f06092a864886f70d01010b06010000030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Hanno Beckera328fff2019-02-12 13:44:17 +00001146
Hanno Becker2389d162019-02-14 12:52:47 +00001147X509 CRT ASN1 (TBS, inv AlgID, params present but empty)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001148depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001149x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0600030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG
Hanno Beckera328fff2019-02-12 13:44:17 +00001150
Hanno Becker2389d162019-02-14 12:52:47 +00001151X509 CRT ASN1 (TBS, inv AlgID, bad RSASSA-PSS params)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001152depends_on:MBEDTLS_SHA256_C:MBEDTLS_X509_RSASSA_PSS_SUPPORT
Hanno Becker764fbdf2019-06-04 16:04:36 +01001153x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010a3100300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010a3100030200ff":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02001154
Hanno Becker2389d162019-02-14 12:52:47 +00001155X509 CRT ASN1 (TBS, Issuer missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001156depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001157x509parse_crt:"302f301aa0030201008204deadbeef300d06092a864886f70d01010b0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001158
Hanno Becker2389d162019-02-14 12:52:47 +00001159X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv tag)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001160depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001161x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001162
Hanno Becker2389d162019-02-14 12:52:47 +00001163X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length missing)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001164depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001165x509parse_crt:"3030301ba0030201008204deadbeef300d06092a864886f70d01010b050030300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001166
Hanno Becker2389d162019-02-14 12:52:47 +00001167X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv length encoding)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001168depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001169x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001170
Hanno Becker2389d162019-02-14 12:52:47 +00001171X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length out of bounds)
Hanno Becker60dd6fc2019-02-15 11:51:32 +00001172depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Hanno Becker764fbdf2019-06-04 16:04:36 +01001173x509parse_crt:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001174
Hanno Becker2389d162019-02-14 12:52:47 +00001175X509 CRT ASN1 (TBS, inv Issuer, RDNSequence empty)
Hanno Becker01346c62019-02-12 13:32:06 +00001176depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001177x509parse_crt:"3081893074a0030201028204deadbeef300d06092a864886f70d01010b05003000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001178
Hanno Becker2389d162019-02-14 12:52:47 +00001179X509 CRT ASN1 (TBS, inv Issuer, RDN inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001180depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001181x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker345fb492009-07-20 21:26:07 +00001182
Hanno Becker2389d162019-02-14 12:52:47 +00001183X509 CRT ASN1 (TBS, inv Issuer, RDN inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001184depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5e2cf382019-02-12 15:49:08 +00001185x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023185301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1186
Hanno Becker2389d162019-02-14 12:52:47 +00001187X509 CRT ASN1 (TBS, inv Issuer, RDN length out of bounds)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001188depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1189x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023101301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1190
Hanno Becker2389d162019-02-14 12:52:47 +00001191X509 CRT ASN1 (TBS, inv Issuer, RDN empty)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001192depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1193x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023100301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1194
Hanno Becker2389d162019-02-14 12:52:47 +00001195X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv tag)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001196depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001197x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker5e2cf382019-02-12 15:49:08 +00001198
Hanno Becker2389d162019-02-14 12:52:47 +00001199X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv length encoding)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001200depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1201x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023085301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1202
Hanno Becker2389d162019-02-14 12:52:47 +00001203X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue length out of bounds)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001204depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1205x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023001301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1206
Hanno Becker2389d162019-02-14 12:52:47 +00001207X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue empty)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001208depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1209x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1210
Hanno Becker2389d162019-02-14 12:52:47 +00001211X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv tag)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001212depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001213x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker5e2cf382019-02-12 15:49:08 +00001214
Hanno Becker2389d162019-02-14 12:52:47 +00001215X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv no length data)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001216depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1217x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b050030053103300106301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1218
Hanno Becker2389d162019-02-14 12:52:47 +00001219X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv length encoding)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001220depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1221x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020685301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1222
Hanno Becker19db19e2019-03-13 10:36:47 +00001223X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type length out of bounds)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001224depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1225x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020601301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1226
Hanno Becker2389d162019-02-14 12:52:47 +00001227X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value missing)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001228depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1229x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020600301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1230
Hanno Becker2389d162019-02-14 12:52:47 +00001231X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv tag)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001232depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001233x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
Hanno Becker5e2cf382019-02-12 15:49:08 +00001234
Hanno Becker2389d162019-02-14 12:52:47 +00001235X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length missing)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001236depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1237x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b050030073105300306000c301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1238
Hanno Becker2389d162019-02-14 12:52:47 +00001239X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv length encoding)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001240depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1241x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000C85301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1242
Hanno Becker2389d162019-02-14 12:52:47 +00001243X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length out of bounds)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001244depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1245x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000c01301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1246
Hanno Becker2389d162019-02-14 12:52:47 +00001247X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length mismatch)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001248depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1249x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300a3108300606000c010000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1250
Hanno Becker2389d162019-02-14 12:52:47 +00001251X509 CRT ASN1 (TBS, inv Issuer, 2nd AttributeTypeValue empty)
Hanno Becker5e2cf382019-02-12 15:49:08 +00001252depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1253x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300e310c300806000c04546573743000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001254
Hanno Becker2389d162019-02-14 12:52:47 +00001255X509 CRT ASN1 (TBS, Validity missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001256depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001257x509parse_crt:"303d3028a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001258
Hanno Becker2389d162019-02-14 12:52:47 +00001259X509 CRT ASN1 (TBS, inv Validity, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001260depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001261x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001262
Hanno Becker2389d162019-02-14 12:52:47 +00001263X509 CRT ASN1 (TBS, inv Validity, length field missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001264depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001265x509parse_crt:"303e3029a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001266
Hanno Becker2389d162019-02-14 12:52:47 +00001267X509 CRT ASN1 (TBS, inv Validity, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001268depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker18459d42019-02-13 11:22:23 +00001269x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1270
Hanno Becker2389d162019-02-14 12:52:47 +00001271X509 CRT ASN1 (TBS, inv Validity, length out of bounds)
Hanno Becker18459d42019-02-13 11:22:23 +00001272depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1273x509parse_crt:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1274
Hanno Becker2389d162019-02-14 12:52:47 +00001275X509 CRT ASN1 (TBS, inv Validity, notBefore missing)
Hanno Becker18459d42019-02-13 11:22:23 +00001276depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1277x509parse_crt:"30793064a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1278
Hanno Becker2389d162019-02-14 12:52:47 +00001279X509 CRT ASN1 (TBS, inv Validity, notBefore inv tag)
Hanno Becker18459d42019-02-13 11:22:23 +00001280depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001281x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430020500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker18459d42019-02-13 11:22:23 +00001282
Hanno Becker2389d162019-02-14 12:52:47 +00001283X509 CRT ASN1 (TBS, inv Validity, notBefore no length)
Hanno Becker18459d42019-02-13 11:22:23 +00001284depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1285x509parse_crt:"307a3065a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300117300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1286
Hanno Becker2389d162019-02-14 12:52:47 +00001287X509 CRT ASN1 (TBS, inv Validity, notBefore inv length encoding)
Hanno Becker18459d42019-02-13 11:22:23 +00001288depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1289x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743002178f300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1290
Hanno Becker2389d162019-02-14 12:52:47 +00001291X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds)
Hanno Becker18459d42019-02-13 11:22:23 +00001292depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1293x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1294
Hanno Becker2389d162019-02-14 12:52:47 +00001295X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds)
Hanno Becker18459d42019-02-13 11:22:23 +00001296depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1297x509parse_crt:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1298
Hanno Becker2389d162019-02-14 12:52:47 +00001299X509 CRT ASN1 (TBS, inv Validity, notBefore empty)
Hanno Becker18459d42019-02-13 11:22:23 +00001300depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1301x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a3008060013045465737430101700170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
1302
Hanno Becker2389d162019-02-14 12:52:47 +00001303X509 CRT ASN1 (TBS, inv Validity, notBefore invalid)
Hanno Becker18459d42019-02-13 11:22:23 +00001304depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1305x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303000000000170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
1306
Hanno Becker2389d162019-02-14 12:52:47 +00001307X509 CRT ASN1 (TBS, inv Validity, notAfter missing)
Hanno Becker18459d42019-02-13 11:22:23 +00001308depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1309x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300e170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1310
Hanno Becker2389d162019-02-14 12:52:47 +00001311X509 CRT ASN1 (TBS, inv Validity, notAfter inv tag)
Hanno Becker18459d42019-02-13 11:22:23 +00001312depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001313x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935390500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker18459d42019-02-13 11:22:23 +00001314
Hanno Becker2389d162019-02-14 12:52:47 +00001315X509 CRT ASN1 (TBS, inv Validity, notAfter length missing)
Hanno Becker18459d42019-02-13 11:22:23 +00001316depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1317x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300f170c30393132333132333539353917300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1318
Hanno Becker2389d162019-02-14 12:52:47 +00001319X509 CRT ASN1 (TBS, inv Validity, notAfter inv length encoding)
Hanno Becker18459d42019-02-13 11:22:23 +00001320depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1321x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391785300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1322
Hanno Becker2389d162019-02-14 12:52:47 +00001323X509 CRT ASN1 (TBS, inv Validity, notAfter length out of bounds)
Hanno Becker18459d42019-02-13 11:22:23 +00001324depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1325x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1326
Hanno Becker2389d162019-02-14 12:52:47 +00001327X509 CRT ASN1 (TBS, inv Validity, notAfter empty)
Hanno Becker18459d42019-02-13 11:22:23 +00001328depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1329x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
1330
Hanno Becker2389d162019-02-14 12:52:47 +00001331X509 CRT ASN1 (TBS, inv Validity, notAfter invalid)
Hanno Becker18459d42019-02-13 11:22:23 +00001332depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1333x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303931323331323335393539170c303930313031303000000000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE
1334
Hanno Becker7ca07e32019-03-13 10:14:00 +00001335X509 CRT ASN1 (TBS, inv Validity, data remaining after 'notAfter')
Hanno Becker18459d42019-02-13 11:22:23 +00001336depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1337x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303930313031303030303030170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakker345fb492009-07-20 21:26:07 +00001338
Hanno Becker2389d162019-02-14 12:52:47 +00001339X509 CRT ASN1 (TBS, Subject missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001340depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker28ae6b12019-02-13 11:59:00 +00001341x509parse_crt:"305b3046a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1342
Hanno Becker2389d162019-02-14 12:52:47 +00001343X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001344depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1345x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353900300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1346
Hanno Becker2389d162019-02-14 12:52:47 +00001347X509 CRT ASN1 (TBS, inv Subject, RDNSequence length missing)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001348depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1349x509parse_crt:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1350
Hanno Becker2389d162019-02-14 12:52:47 +00001351X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001352depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1353x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1354
Hanno Becker2389d162019-02-14 12:52:47 +00001355X509 CRT ASN1 (TBS, inv Subject, RDNSequence length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001356depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1357x509parse_crt:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1358
Hanno Becker2389d162019-02-14 12:52:47 +00001359X509 CRT ASN1 (TBS, inv Subject, RDN inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001360depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001361x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker28ae6b12019-02-13 11:59:00 +00001362
Hanno Becker2389d162019-02-14 12:52:47 +00001363X509 CRT ASN1 (TBS, inv Subject, RDN inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001364depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1365x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023185302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1366
Hanno Becker2389d162019-02-14 12:52:47 +00001367X509 CRT ASN1 (TBS, inv Subject, RDN length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001368depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1369x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023101302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1370
Hanno Becker2389d162019-02-14 12:52:47 +00001371X509 CRT ASN1 (TBS, inv Subject, RDN empty)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001372depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1373x509parse_crt:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023100302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1374
Hanno Becker2389d162019-02-14 12:52:47 +00001375X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001376depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001377x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker28ae6b12019-02-13 11:59:00 +00001378
Hanno Becker2389d162019-02-14 12:52:47 +00001379X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001380depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1381x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023085302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1382
Hanno Becker2389d162019-02-14 12:52:47 +00001383X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001384depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1385x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023001302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1386
Hanno Becker2389d162019-02-14 12:52:47 +00001387X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue empty)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001388depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1389x509parse_crt:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1390
Hanno Becker2389d162019-02-14 12:52:47 +00001391X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001392depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001393x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker28ae6b12019-02-13 11:59:00 +00001394
Hanno Becker2389d162019-02-14 12:52:47 +00001395X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv no length data)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001396depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1397x509parse_crt:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930053103300106302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1398
Hanno Becker2389d162019-02-14 12:52:47 +00001399X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001400depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1401x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020685302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1402
Hanno Becker2389d162019-02-14 12:52:47 +00001403X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type length out of bounds )
Hanno Becker28ae6b12019-02-13 11:59:00 +00001404depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1405x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020601302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1406
Hanno Becker2389d162019-02-14 12:52:47 +00001407X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value missing)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001408depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1409x509parse_crt:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020600302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1410
Hanno Becker2389d162019-02-14 12:52:47 +00001411X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv tag)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001412depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001413x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
Hanno Becker28ae6b12019-02-13 11:59:00 +00001414
Hanno Becker2389d162019-02-14 12:52:47 +00001415X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length missing)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001416depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1417x509parse_crt:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930073105300306000c302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1418
Hanno Becker2389d162019-02-14 12:52:47 +00001419X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv length encoding)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001420depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1421x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000C85302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1422
Hanno Becker2389d162019-02-14 12:52:47 +00001423X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length out of bounds)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001424depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1425x509parse_crt:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000c01302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1426
Hanno Becker2389d162019-02-14 12:52:47 +00001427X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length mismatch)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001428depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1429x509parse_crt:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300a3108300606000c010000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1430
Hanno Becker2389d162019-02-14 12:52:47 +00001431X509 CRT ASN1 (TBS, inv Subject, 2nd AttributeTypeValue empty)
Hanno Becker28ae6b12019-02-13 11:59:00 +00001432depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1433x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300e310c300806000c04546573743000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001434
Hanno Becker2389d162019-02-14 12:52:47 +00001435X509 CRT ASN1 (TBS, SubPubKeyInfo missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001436depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001437x509parse_crt:"30693054a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001438
Hanno Becker19db19e2019-03-13 10:36:47 +00001439X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001440depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001441x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573740500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker345fb492009-07-20 21:26:07 +00001442
Hanno Becker19db19e2019-03-13 10:36:47 +00001443X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001444depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001445x509parse_crt:"306a3055a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001446
Hanno Becker19db19e2019-03-13 10:36:47 +00001447X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001448depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001449x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001450
Hanno Becker19db19e2019-03-13 10:36:47 +00001451X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001452depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001453x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001454
Hanno Becker19db19e2019-03-13 10:36:47 +00001455X509 CRT ASN1 (TBS, inv SubPubKeyInfo, empty)
Hanno Becker01346c62019-02-12 13:32:06 +00001456depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001457x509parse_crt:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001458
Hanno Becker19db19e2019-03-13 10:36:47 +00001459X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv algorithm tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001460depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001461x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001462
Hanno Becker19db19e2019-03-13 10:36:47 +00001463X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001464depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001465x509parse_crt:"306c3057a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001466
Hanno Becker19db19e2019-03-13 10:36:47 +00001467X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001468depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001469x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001470
Hanno Becker19db19e2019-03-13 10:36:47 +00001471X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001472depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001473x509parse_crt:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001474
Hanno Becker19db19e2019-03-13 10:36:47 +00001475X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm empty)
Hanno Becker01346c62019-02-12 13:32:06 +00001476depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001477x509parse_crt:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301d300003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001478
Hanno Becker19db19e2019-03-13 10:36:47 +00001479X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm unknown)
Hanno Becker01346c62019-02-12 13:32:06 +00001480depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbb955e52019-06-04 15:38:48 +01001481x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010100050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_UNKNOWN_PK_ALG
1482
Hanno Becker19db19e2019-03-13 10:36:47 +00001483X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring missing)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001484depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1485x509parse_crt:"307a3065a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300f300d06092A864886F70D0101010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1486
Hanno Becker19db19e2019-03-13 10:36:47 +00001487X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv tag)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001488depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001489x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Beckerbb955e52019-06-04 15:38:48 +01001490
Hanno Becker19db19e2019-03-13 10:36:47 +00001491X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length missing)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001492depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1493x509parse_crt:"307b3066a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743010300d06092A864886F70D010101050003300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1494
Hanno Becker19db19e2019-03-13 10:36:47 +00001495X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv length encoding)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001496depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1497x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1498
Hanno Becker19db19e2019-03-13 10:36:47 +00001499X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length out of bounds)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001500depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1501x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1502
Hanno Becker19db19e2019-03-13 10:36:47 +00001503X509 CRT ASN1 (TBS, inv SubPubKeyInfo, no bitstring data)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001504depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1505x509parse_crt:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA
1506
Hanno Becker19db19e2019-03-13 10:36:47 +00001507X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv bitstring start)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001508depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1509x509parse_crt:"307d3068a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743012300d06092A864886F70D0101010500030101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA
1510
Hanno Becker2389d162019-02-14 12:52:47 +00001511X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring length)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001512depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1513x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1514
Hanno Becker2389d162019-02-14 12:52:47 +00001515X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring tag)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001516depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1517x509parse_crt:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400310000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1518
Hanno Becker2389d162019-02-14 12:52:47 +00001519X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv RSA modulus)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001520depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1521x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0302ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1522
Hanno Becker2389d162019-02-14 12:52:47 +00001523X509 CRT ASN1 (TBS, inv SubPubKeyInfo, total length mismatch)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001524depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1525x509parse_crt:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301e300d06092A864886F70D0101010500030b0030080202ffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1526
Hanno Becker2389d162019-02-14 12:52:47 +00001527X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001528depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1529x509parse_crt:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY
1530
Hanno Becker2389d162019-02-14 12:52:47 +00001531X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed, expanded length notation)
Hanno Beckerbb955e52019-06-04 15:38:48 +01001532depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1533x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210fffffffffffffffffffffffffffffffe0202ffff300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_PK_INVALID_PUBKEY
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001534
Hanno Becker9f06b502019-06-04 15:43:15 +01001535# We don't expect MBEDTLS_ERR_ASN1_UNEXPECTED_TAG here because the IssuerID is optional;
1536# the stack is expected to ignore it and will hence end up with a length mismatch.
Hanno Becker2389d162019-02-14 12:52:47 +00001537X509 CRT ASN1 (TBS, inv IssuerID, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001538depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001539x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff0500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001540
Hanno Becker2389d162019-02-14 12:52:47 +00001541X509 CRT ASN1 (TBS, inv IssuerID, length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001542depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001543x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001544
Hanno Becker2389d162019-02-14 12:52:47 +00001545X509 CRT ASN1 (TBS, inv IssuerID, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001546depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001547x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001548
Hanno Becker2389d162019-02-14 12:52:47 +00001549X509 CRT ASN1 (TBS, inv IssuerID, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001550depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001551x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker345fb492009-07-20 21:26:07 +00001552
Hanno Becker2389d162019-02-14 12:52:47 +00001553X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001554depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001555x509parse_crt:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001556
Hanno Becker2389d162019-02-14 12:52:47 +00001557X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001558depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker9f06b502019-06-04 15:43:15 +01001559x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001560
Hanno Becker2389d162019-02-14 12:52:47 +00001561X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001562depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001563x509parse_crt:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001564
Hanno Becker2389d162019-02-14 12:52:47 +00001565X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001566depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001567x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakkere4ff4132009-07-27 20:22:10 +00001568
Hanno Becker2389d162019-02-14 12:52:47 +00001569X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, bool len missing)
Hanno Beckerba698da2019-06-03 09:54:07 +01001570depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1571x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30c300730050603551d2001010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Ron Eldor11818f22019-05-16 18:17:02 +03001572
Hanno Becker2389d162019-02-14 12:52:47 +00001573X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data missing)
Hanno Beckerba698da2019-06-03 09:54:07 +01001574depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1575x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30b300930070603551d20040001010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Ron Eldor11818f22019-05-16 18:17:02 +03001576
Hanno Becker2389d162019-02-14 12:52:47 +00001577X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, data not oid)
Hanno Beckerba698da2019-06-03 09:54:07 +01001578depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1579x509parse_crt:"3081bc3081b9a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba32e302c30290603551d2004223020301ea01c06082b06010505070804a010300e06082b060104010901030402022201010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Ron Eldor8a59d6b2019-05-19 12:32:15 +03001580
Hanno Becker2389d162019-02-14 12:52:47 +00001581X509 CRT ASN1 (TBSCertificate v3, ext CertificatePolicies tag, qualifier not complete)
Hanno Beckerba698da2019-06-03 09:54:07 +01001582depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1583x509parse_crt:"308198308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101aaa201bba30c300a301f0603551d2004183020301f0603551d200418301630140604551d2000300c300a06082b0601050507020101010100":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Ron Eldor11818f22019-05-16 18:17:02 +03001584
Hanno Becker2389d162019-02-14 12:52:47 +00001585X509 CRT ASN1 (TBSCertificate v3, ext SubjectAlternativeName malformed)
Ron Eldor56f071f2019-05-22 17:21:08 +03001586depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
1587x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1588
Hanno Becker2389d162019-02-14 12:52:47 +00001589X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001590depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001591x509parse_crt:"308199308183a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerc6ce8382009-07-27 21:34:45 +00001592
Hanno Becker2389d162019-02-14 12:52:47 +00001593X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001594depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001595x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerc6ce8382009-07-27 21:34:45 +00001596
Hanno Becker2389d162019-02-14 12:52:47 +00001597X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001598depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Beckerbe3850a2019-06-04 15:45:45 +01001599x509parse_crt:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkere4ff4132009-07-27 20:22:10 +00001600
Hanno Beckerd51d4852019-03-13 15:18:57 +00001601X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT)
1602depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1603x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1604
1605X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT)
1606depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1607x509parse_crt:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa200a201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1608
Hanno Becker2389d162019-02-14 12:52:47 +00001609X509 CRT ASN1 (TBS, inv v3Ext, inv tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001610depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001611x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkere4ff4132009-07-27 20:22:10 +00001612
Hanno Becker2389d162019-02-14 12:52:47 +00001613X509 CRT ASN1 (TBS, inv v3Ext, outer length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001614depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker05987e32019-06-04 15:51:22 +01001615x509parse_crt:"30819b308185a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkere4ff4132009-07-27 20:22:10 +00001616
Hanno Becker2389d162019-02-14 12:52:47 +00001617X509 CRT ASN1 (TBS, inv v3Ext, outer length inv encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001618depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker05987e32019-06-04 15:51:22 +01001619x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a385300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkere4ff4132009-07-27 20:22:10 +00001620
Hanno Becker2389d162019-02-14 12:52:47 +00001621X509 CRT ASN1 (TBS, inv v3Ext, outer length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001622depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1623x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a301300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard0369a522014-11-11 22:17:26 +01001624
Hanno Becker2389d162019-02-14 12:52:47 +00001625X509 CRT ASN1 (TBS, inv v3Ext, outer length 0)
Hanno Becker05987e32019-06-04 15:51:22 +01001626depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1627x509parse_crt:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a300300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardb1340602014-11-11 23:11:16 +01001628
Hanno Becker2389d162019-02-14 12:52:47 +00001629X509 CRT ASN1 (TBS, inv v3Ext, inner tag invalid)
Hanno Becker05987e32019-06-04 15:51:22 +01001630depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001631x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard8a5e3d42014-11-12 17:47:28 +01001632
Hanno Becker2389d162019-02-14 12:52:47 +00001633X509 CRT ASN1 (TBS, inv v3Ext, inner length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001634depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1635x509parse_crt:"30819d308187a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1636
Hanno Becker2389d162019-02-14 12:52:47 +00001637X509 CRT ASN1 (TBS, inv v3Ext, inner length inv encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001638depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1639x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1640
Hanno Becker2389d162019-02-14 12:52:47 +00001641X509 CRT ASN1 (TBS, inv v3Ext, inner length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001642depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1643x509parse_crt:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1644
Hanno Becker2389d162019-02-14 12:52:47 +00001645X509 CRT ASN1 (TBS, inv v3Ext, inner/outer length mismatch)
Hanno Becker05987e32019-06-04 15:51:22 +01001646depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1647x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1648
Hanno Becker2389d162019-02-14 12:52:47 +00001649X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001650depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001651x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001652
Hanno Becker2389d162019-02-14 12:52:47 +00001653X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001654depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1655x509parse_crt:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300130300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1656
Hanno Becker2389d162019-02-14 12:52:47 +00001657X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001658depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1659x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023085300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1660
Hanno Becker2389d162019-02-14 12:52:47 +00001661X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001662depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1663x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1664
Hanno Becker2389d162019-02-14 12:52:47 +00001665X509 CRT ASN1 (TBS, inv v3Ext, first ext empty)
Hanno Becker05987e32019-06-04 15:51:22 +01001666depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1667x509parse_crt:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1668
Hanno Becker2389d162019-02-14 12:52:47 +00001669X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001670depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001671x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001672
Hanno Becker2389d162019-02-14 12:52:47 +00001673X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001674depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1675x509parse_crt:"3081a130818ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3053003300106300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1676
Hanno Becker2389d162019-02-14 12:52:47 +00001677X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001678depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1679x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020685300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1680
Hanno Becker2389d162019-02-14 12:52:47 +00001681X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001682depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1683x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020601300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1684
Hanno Becker2389d162019-02-14 12:52:47 +00001685X509 CRT ASN1 (TBS, inv v3Ext, no extnValue)
Hanno Becker05987e32019-06-04 15:51:22 +01001686depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1687x509parse_crt:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020600300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1688
Hanno Becker2389d162019-02-14 12:52:47 +00001689X509 CRT ASN1 (TBS, inv v3Ext, inv critical tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001690depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001691x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001692
Hanno Becker2389d162019-02-14 12:52:47 +00001693X509 CRT ASN1 (TBS, inv v3Ext, critical length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001694depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1695x509parse_crt:"3081a330818da0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30730053003060001300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1696
Hanno Becker2389d162019-02-14 12:52:47 +00001697X509 CRT ASN1 (TBS, inv v3Ext, critical inv length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001698depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1699x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000185300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1700
Hanno Becker2389d162019-02-14 12:52:47 +00001701X509 CRT ASN1 (TBS, inv v3Ext, critical length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001702depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1703x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000101300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1704
Hanno Becker2389d162019-02-14 12:52:47 +00001705X509 CRT ASN1 (TBS, inv v3Ext, critical length 0)
Hanno Becker05987e32019-06-04 15:51:22 +01001706depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1707x509parse_crt:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000100300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1708
Hanno Becker2389d162019-02-14 12:52:47 +00001709X509 CRT ASN1 (TBS, inv v3Ext, critical length 2)
Hanno Becker05987e32019-06-04 15:51:22 +01001710depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1711x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001020000300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1712
Hanno Becker2389d162019-02-14 12:52:47 +00001713X509 CRT ASN1 (TBS, inv v3Ext, extnValue inv tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001714depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001715x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker05987e32019-06-04 15:51:22 +01001716
Hanno Becker2389d162019-02-14 12:52:47 +00001717X509 CRT ASN1 (TBS, inv v3Ext, extnValue length missing)
Hanno Becker05987e32019-06-04 15:51:22 +01001718depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1719x509parse_crt:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001010004300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1720
Hanno Becker2389d162019-02-14 12:52:47 +00001721X509 CRT ASN1 (TBS, inv v3Ext, extnValue length inv encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001722depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1723x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000485300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1724
Hanno Becker2389d162019-02-14 12:52:47 +00001725X509 CRT ASN1 (TBS, inv v3Ext, extnValue length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001726depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1727x509parse_crt:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000401300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1728
Hanno Becker2389d162019-02-14 12:52:47 +00001729X509 CRT ASN1 (TBS, inv v3Ext, length mismatch)
Hanno Becker05987e32019-06-04 15:51:22 +01001730depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1731x509parse_crt:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b3009060001010004000500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1732
Hanno Becker2389d162019-02-14 12:52:47 +00001733X509 CRT ASN1 (TBS, inv extBasicConstraint, no pathlen length)
Hanno Becker05987e32019-06-04 15:51:22 +01001734depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1735x509parse_crt:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d130101010406300402010102300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1736
Hanno Becker2389d162019-02-14 12:52:47 +00001737X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen inv length encoding)
Hanno Becker05987e32019-06-04 15:51:22 +01001738depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1739x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010285300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1740
Hanno Becker2389d162019-02-14 12:52:47 +00001741X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length out of bounds)
Hanno Becker05987e32019-06-04 15:51:22 +01001742depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1743x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010201300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1744
Hanno Becker2389d162019-02-14 12:52:47 +00001745X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen empty)
Hanno Becker05987e32019-06-04 15:51:22 +01001746depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1747x509parse_crt:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010200300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1748
Hanno Becker2389d162019-02-14 12:52:47 +00001749X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length mismatch)
Hanno Becker05987e32019-06-04 15:51:22 +01001750depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1751x509parse_crt:"3081b430819ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a318301630140603551d13010101040a30080201010201010500300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1752
Hanno Becker2389d162019-02-14 12:52:47 +00001753X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage bad second tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001754depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1755x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d250416301406082b0601050507030107082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1756
Hanno Becker2389d162019-02-14 12:52:47 +00001757X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated)
Hanno Becker05987e32019-06-04 15:51:22 +01001758depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1759x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS
1760
Hanno Becker2389d162019-02-14 12:52:47 +00001761X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage repeated)
Hanno Becker05987e32019-06-04 15:51:22 +01001762depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1763x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d250416301406082b0601050507030106082b06010505070302301d0603551d250416301406082b0601050507030106082b06010505070302300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS
1764
Hanno Becker2389d162019-02-14 12:52:47 +00001765X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated outside Extensions)
Hanno Becker05987e32019-06-04 15:51:22 +01001766depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1767x509parse_crt:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1768
Hanno Becker2389d162019-02-14 12:52:47 +00001769X509 CRT ASN1 (TBS, valid SubjectID, valid IssuerID, inv v3Ext, SubjectAltName repeated outside Extensions, inv SubjectAltNames tag)
Hanno Becker05987e32019-06-04 15:51:22 +01001770depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
1771x509parse_crt:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
1772
Hanno Becker2389d162019-02-14 12:52:47 +00001773X509 CRT ASN1 (SignatureAlgorithm missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001774depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001775x509parse_crt:"3081aa3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001776
Hanno Becker2389d162019-02-14 12:52:47 +00001777X509 CRT ASN1 (inv SignatureAlgorithm, bad tag)
Hanno Becker01346c62019-02-12 13:32:06 +00001778depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001779x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573740500":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001780
Hanno Becker2389d162019-02-14 12:52:47 +00001781X509 CRT ASN1 (inv SignatureAlgorithm, length missing)
Hanno Becker01346c62019-02-12 13:32:06 +00001782depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001783x509parse_crt:"3081ab3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e7465737430":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001784
Hanno Becker2389d162019-02-14 12:52:47 +00001785X509 CRT ASN1 (inv SignatureAlgorithm, inv length encoding)
Hanno Becker01346c62019-02-12 13:32:06 +00001786depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001787x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743085":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001788
Hanno Becker2389d162019-02-14 12:52:47 +00001789X509 CRT ASN1 (inv SignatureAlgorithm, length out of bounds)
Hanno Becker01346c62019-02-12 13:32:06 +00001790depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker5f88a772019-06-04 15:54:43 +01001791x509parse_crt:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1792
Hanno Becker2389d162019-02-14 12:52:47 +00001793X509 CRT ASN1 (inv SignatureAlgorithm, not the same as SignatureAlgorithm in TBS)
Hanno Becker5f88a772019-06-04 15:54:43 +01001794depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1795x509parse_crt:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010a0500030200ff":"":MBEDTLS_ERR_X509_SIG_MISMATCH
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001796
Hanno Becker2389d162019-02-14 12:52:47 +00001797X509 CRT ASN1 (Signature missing)
Hanno Becker44199b62019-02-14 12:25:03 +00001798depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1799x509parse_crt:"3081b93081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1800
Hanno Becker2389d162019-02-14 12:52:47 +00001801X509 CRT ASN1 (inv Signature, bad tag)
Hanno Becker44199b62019-02-14 12:25:03 +00001802depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker0f5acc12019-06-04 16:13:23 +01001803x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000500":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Hanno Becker44199b62019-02-14 12:25:03 +00001804
Hanno Becker2389d162019-02-14 12:52:47 +00001805X509 CRT ASN1 (inv Signature, length missing)
Hanno Becker44199b62019-02-14 12:25:03 +00001806depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1807x509parse_crt:"3081ba3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b050003":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1808
Hanno Becker2389d162019-02-14 12:52:47 +00001809X509 CRT ASN1 (inv Signature, inv length encoding)
Hanno Becker44199b62019-02-14 12:25:03 +00001810depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1811x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000385":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1812
Hanno Becker2389d162019-02-14 12:52:47 +00001813X509 CRT ASN1 (inv Signature, length out of bounds)
Hanno Becker44199b62019-02-14 12:25:03 +00001814depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1815x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1816
Hanno Becker2389d162019-02-14 12:52:47 +00001817X509 CRT ASN1 (inv Signature, empty)
Hanno Becker44199b62019-02-14 12:25:03 +00001818depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1819x509parse_crt:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000300":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA
1820
Hanno Becker2389d162019-02-14 12:52:47 +00001821X509 CRT ASN1 (inv Signature, inv data)
Hanno Becker44199b62019-02-14 12:25:03 +00001822depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1823x509parse_crt:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030100":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA
1824
Hanno Becker2389d162019-02-14 12:52:47 +00001825X509 CRT ASN1 (inv Signature, length mismatch)
Hanno Becker44199b62019-02-14 12:25:03 +00001826depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
1827x509parse_crt:"3081be3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff00":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1828
Hanno Becker2389d162019-02-14 12:52:47 +00001829X509 CRT ASN1 (well-formed)
Hanno Becker01346c62019-02-12 13:32:06 +00001830depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001831x509parse_crt:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerb2c38f52009-07-19 19:36:15 +00001832
Hanno Becker2389d162019-02-14 12:52:47 +00001833X509 CRT ASN1 (GeneralizedTime instead of UTCTime)
Hanno Becker01346c62019-02-12 13:32:06 +00001834depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001835x509parse_crt:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e180e3230313030313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2010-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakker91200182010-02-18 21:26:15 +00001836
Hanno Becker2389d162019-02-14 12:52:47 +00001837X509 CRT ASN1 (Name with X520 CN)
Hanno Becker01346c62019-02-12 13:32:06 +00001838depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001839x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550403130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: CN=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001840
Hanno Becker2389d162019-02-14 12:52:47 +00001841X509 CRT ASN1 (Name with X520 C)
Hanno Becker01346c62019-02-12 13:32:06 +00001842depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001843x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550406130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: C=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001844
Hanno Becker2389d162019-02-14 12:52:47 +00001845X509 CRT ASN1 (Name with X520 L)
Hanno Becker01346c62019-02-12 13:32:06 +00001846depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001847x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550407130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: L=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001848
Hanno Becker2389d162019-02-14 12:52:47 +00001849X509 CRT ASN1 (Name with X520 ST)
Hanno Becker01346c62019-02-12 13:32:06 +00001850depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001851x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550408130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ST=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001852
Hanno Becker2389d162019-02-14 12:52:47 +00001853X509 CRT ASN1 (Name with X520 O)
Hanno Becker01346c62019-02-12 13:32:06 +00001854depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001855x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040a130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: O=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001856
Hanno Becker2389d162019-02-14 12:52:47 +00001857X509 CRT ASN1 (Name with X520 OU)
Hanno Becker01346c62019-02-12 13:32:06 +00001858depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001859x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040b130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: OU=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001860
Hanno Becker2389d162019-02-14 12:52:47 +00001861X509 CRT ASN1 (Name with unknown X520 part)
Hanno Becker01346c62019-02-12 13:32:06 +00001862depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001863x509parse_crt:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b06035504de130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001864
Hanno Becker2389d162019-02-14 12:52:47 +00001865X509 CRT ASN1 (Name with composite RDN)
palaviva07ecda2016-08-07 11:15:29 +03001866depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard555fbf82015-02-04 17:11:55 +00001867x509parse_crt:"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":"cert. version \: 3\nserial number \: 4C\:20\:E3\:BD\nissuer name \: C=US, ST=CA, O=Internet Widgits Pty Ltd, CN=Frankencert CA\nsubject name \: C=US, ST=Washington, ??=US, ??=Delaware, O=Authorize.Net LLC, ??=Private Organization, serialNumber=4369191 + CN=www.authorize.net, L=San Francisco\nissued on \: 2013-08-02 15\:14\:37\nexpires on \: 2015-08-17 05\:54\:31\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\n":0
1868
Hanno Becker2389d162019-02-14 12:52:47 +00001869X509 CRT ASN1 (Name with PKCS9 email)
Hanno Becker01346c62019-02-12 13:32:06 +00001870depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001871x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d010901130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: emailAddress=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001872
Hanno Becker2389d162019-02-14 12:52:47 +00001873X509 CRT ASN1 (Name with unknown PKCS9 part)
Hanno Becker01346c62019-02-12 13:32:06 +00001874depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001875x509parse_crt:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d0109ab130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":0
Paul Bakkerc26a1892009-07-19 20:30:14 +00001876
Hanno Becker2389d162019-02-14 12:52:47 +00001877X509 CRT ASN1 (ECDSA signature, RSA key)
palavivf180df92016-08-07 11:56:02 +03001878depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECDSA_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001879x509parse_crt:"3081e630819e020103300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343631385a170d3233303730383039343631385a300f310d300b0603550403130454657374304c300d06092a864886f70d0101010500033b003038023100e8f546061d3b49bc2f6b7524b7ea4d73a8d5293ee8c64d9407b70b5d16baebc32b8205591eab4e1eb57e9241883701250203010001300906072a8648ce3d0401033800303502186e18209afbed14a0d9a796efcad68891e3ccd5f75815c833021900e92b4fd460b1994693243b9ffad54729de865381bda41d25":"cert. version \: 1\nserial number \: 03\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:46\:18\nexpires on \: 2023-07-08 09\:46\:18\nsigned using \: ECDSA with SHA1\nRSA key size \: 384 bits\n":0
Manuel Pégourié-Gonnard72ef0b72013-07-10 12:20:54 +02001880
Hanno Becker2389d162019-02-14 12:52:47 +00001881X509 CRT ASN1 (ECDSA signature, EC key)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02001882depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001883x509parse_crt:"3081eb3081a3020900f41534662ec7e912300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343031395a170d3233303730383039343031395a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d030101033200042137969fabd4e370624a0e1a33e379cab950cce00ef8c3c3e2adaeb7271c8f07659d65d3d777dcf21614363ae4b6e617300906072a8648ce3d04010338003035021858cc0f957946fe6a303d92885a456aa74c743c7b708cbd37021900fe293cac21af352d16b82eb8ea54e9410b3abaadd9f05dd6":"cert. version \: 1\nserial number \: F4\:15\:34\:66\:2E\:C7\:E9\:12\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:40\:19\nexpires on \: 2023-07-08 09\:40\:19\nsigned using \: ECDSA with SHA1\nEC key size \: 192 bits\n":0
Manuel Pégourié-Gonnarda3c86c32013-07-10 16:54:29 +02001884
Hanno Becker2389d162019-02-14 12:52:47 +00001885X509 CRT ASN1 (RSA signature, EC key)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02001886depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01001887x509parse_crt:"3081e430819f020104300d06092a864886f70d0101050500300f310d300b0603550403130454657374301e170d3133303731303135303233375a170d3233303730383135303233375a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d03010103320004e962551a325b21b50cf6b990e33d4318fd16677130726357a196e3efe7107bcb6bdc6d9db2a4df7c964acfe81798433d300d06092a864886f70d01010505000331001a6c18cd1e457474b2d3912743f44b571341a7859a0122774a8e19a671680878936949f904c9255bdd6fffdb33a7e6d8":"cert. version \: 1\nserial number \: 04\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 15\:02\:37\nexpires on \: 2023-07-08 15\:02\:37\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\n":0
Manuel Pégourié-Gonnarda3c86c32013-07-10 16:54:29 +02001888
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001889X509 CRL ASN1 (Incorrect first tag)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001890x509parse_crl:"":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001891
1892X509 CRL ASN1 (Correct first tag, data length does not match)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001893x509parse_crl:"300000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001894
1895X509 CRL ASN1 (TBSCertList, tag missing)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001896x509parse_crl:"3000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001897
1898X509 CRL ASN1 (TBSCertList, version tag len missing)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001899x509parse_crl:"3003300102":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001900
1901X509 CRL ASN1 (TBSCertList, version correct, alg missing)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001902x509parse_crl:"30053003020100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001903
1904X509 CRL ASN1 (TBSCertList, alg correct, incorrect version)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001905x509parse_crl:"300b3009020102300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001906
1907X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001908x509parse_crl:"300b3009020100300406000500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001909
1910X509 CRL ASN1 (TBSCertList, sig_oid1 id unknown)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001911x509parse_crl:"30143012020100300d06092a864886f70d01010f0500":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001912
1913X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing)
palaviva07ecda2016-08-07 11:15:29 +03001914depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001915x509parse_crl:"30143012020100300d06092a864886f70d01010e0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001916
1917X509 CRL ASN1 (TBSCertList, issuer set missing)
palaviva07ecda2016-08-07 11:15:29 +03001918depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001919x509parse_crl:"30163014020100300d06092a864886f70d01010e05003000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001920
1921X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing)
palaviva07ecda2016-08-07 11:15:29 +03001922depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001923x509parse_crl:"30253023020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001924
1925X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing)
palaviva07ecda2016-08-07 11:15:29 +03001926depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001927x509parse_crl:"30343032020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030":"":MBEDTLS_ERR_ASN1_OUT_OF_DATA
Paul Bakkere4ff4132009-07-27 20:22:10 +00001928
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001929X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg)
palaviva07ecda2016-08-07 11:15:29 +03001930depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001931x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001932
1933X509 CRL ASN1 (TBSCertList, entries present, date in entry invalid)
palaviva07ecda2016-08-07 11:15:29 +03001934depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001935x509parse_crl:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c30383132333132333539353900":"":MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001936
1937X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match)
palaviva07ecda2016-08-07 11:15:29 +03001938depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001939x509parse_crl:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010d0500":"":MBEDTLS_ERR_X509_SIG_MISMATCH
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001940
Paul Bakkere4ff4132009-07-27 20:22:10 +00001941X509 CRL ASN1 (TBSCertList, sig present, len mismatch)
palaviva07ecda2016-08-07 11:15:29 +03001942depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001943x509parse_crl:"305d3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e05000302000100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001944
1945X509 CRL ASN1 (TBSCertList, sig present)
palaviva07ecda2016-08-07 11:15:29 +03001946depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Paul Bakkerc70b9822013-04-07 22:00:46 +02001947x509parse_crl:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nserial number\: AB\:CD revocation date\: 2008-12-31 23\:59\:59\nsigned using \: RSA with SHA-224\n":0
Paul Bakker6b0fa4f2009-07-20 20:35:41 +00001948
Paul Bakkere4ff4132009-07-27 20:22:10 +00001949X509 CRL ASN1 (TBSCertList, no entries)
palaviva07ecda2016-08-07 11:15:29 +03001950depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Paul Bakkerc70b9822013-04-07 22:00:46 +02001951x509parse_crl:"30463031020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nsigned using \: RSA with SHA-224\n":0
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01001952
Andres AGfff826c2017-03-07 11:11:12 +00001953X509 CRL ASN1 (invalid version 2)
1954x509parse_crl:"30463031020102300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
1955
1956X509 CRL ASN1 (invalid version overflow)
Hanno Becker32b48ea2019-06-03 09:48:09 +01001957x509parse_crl:"3049303102047fffffff300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Andres AGfff826c2017-03-07 11:11:12 +00001958
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001959X509 CRL ASN1 (extension seq too long, crl-idp.pem byte 121)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001960depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001961x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1962
1963X509 CRL ASN1 (extension oid too long, crl-idp.pem byte 123)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001964depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001965x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1966
1967X509 CRL ASN1 (extension critical invalid length, crl-idp.pem byte 128)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001968depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001969x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH
1970
1971X509 CRL ASN1 (extension data too long, crl-idp.pem byte 131)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001972depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001973x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA
1974
1975X509 CRL ASN1 (extension data too short, crl-idp.pem byte 131)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001976depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnard0bdb0502018-03-14 11:34:29 +01001977x509parse_crl:"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":"":MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
1978
Manuel Pégourié-Gonnarda63305d2018-03-14 12:23:56 +01001979X509 CRL ASN1 (extension not critical explicit, crl-idp.pem byte 129)
Gilles Peskine1cfa2d02018-03-23 00:55:57 +01001980depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Manuel Pégourié-Gonnarda63305d2018-03-14 12:23:56 +01001981x509parse_crl:"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":"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2018-03-14 07\:31\:48\nnext update \: 2028-03-14 07\:31\:48\nRevoked certificates\:\nsigned using \: RSA with SHA-256\n":0
1982
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01001983X509 CRT parse path #2 (one cert)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001984depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
1985mbedtls_x509_crt_parse_path:"data_files/dir1":0:1
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01001986
1987X509 CRT parse path #3 (two certs)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001988depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
1989mbedtls_x509_crt_parse_path:"data_files/dir2":0:2
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +01001990
1991X509 CRT parse path #4 (two certs, one non-cert)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001992depends_on:MBEDTLS_SHA1_C:MBEDTLS_RSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
1993mbedtls_x509_crt_parse_path:"data_files/dir3":1:2
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01001994
Manuel Pégourié-Gonnard1beb0482017-06-05 13:49:44 +02001995X509 CRT verify long chain (max intermediate CA, trusted)
1996depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
1997mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA:0:0
1998
1999X509 CRT verify long chain (max intermediate CA, untrusted)
2000depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2001mbedtls_x509_crt_verify_max:"data_files/test-ca2.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA-1:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED
2002
2003X509 CRT verify long chain (max intermediate CA + 1)
2004depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard31458a12017-06-26 10:11:49 +02002005mbedtls_x509_crt_verify_max:"data_files/dir-maxpath/00.crt":"data_files/dir-maxpath":MBEDTLS_X509_MAX_INTERMEDIATE_CA+1:MBEDTLS_ERR_X509_FATAL_ERROR:-1
Manuel Pégourié-Gonnard1beb0482017-06-05 13:49:44 +02002006
Janos Follathef4f2582015-10-11 16:17:27 +02002007X509 CRT verify chain #1 (zero pathlen intermediate)
Janos Follath822b2c32015-10-11 10:25:22 +02002008depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002009mbedtls_x509_crt_verify_chain:"data_files/dir4/cert14.crt data_files/dir4/cert13.crt data_files/dir4/cert12.crt":"data_files/dir4/cert11.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follath822b2c32015-10-11 10:25:22 +02002010
Janos Follathef4f2582015-10-11 16:17:27 +02002011X509 CRT verify chain #2 (zero pathlen root)
2012depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002013mbedtls_x509_crt_verify_chain:"data_files/dir4/cert23.crt data_files/dir4/cert22.crt":"data_files/dir4/cert21.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002014
2015X509 CRT verify chain #3 (nonzero pathlen root)
2016depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002017mbedtls_x509_crt_verify_chain:"data_files/dir4/cert34.crt data_files/dir4/cert33.crt data_files/dir4/cert32.crt":"data_files/dir4/cert31.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002018
2019X509 CRT verify chain #4 (nonzero pathlen intermediate)
2020depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002021mbedtls_x509_crt_verify_chain:"data_files/dir4/cert45.crt data_files/dir4/cert44.crt data_files/dir4/cert43.crt data_files/dir4/cert42.crt":"data_files/dir4/cert41.crt":MBEDTLS_X509_BADCERT_NOT_TRUSTED:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002022
2023X509 CRT verify chain #5 (nonzero maxpathlen intermediate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002024depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002025mbedtls_x509_crt_verify_chain:"data_files/dir4/cert54.crt data_files/dir4/cert53.crt data_files/dir4/cert52.crt":"data_files/dir4/cert51.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002026
2027X509 CRT verify chain #6 (nonzero maxpathlen root)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002028depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002029mbedtls_x509_crt_verify_chain:"data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002030
2031X509 CRT verify chain #7 (maxpathlen root, self signed in path)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002032depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002033mbedtls_x509_crt_verify_chain:"data_files/dir4/cert74.crt data_files/dir4/cert73.crt data_files/dir4/cert72.crt":"data_files/dir4/cert71.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002034
2035X509 CRT verify chain #8 (self signed maxpathlen root)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002036depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002037mbedtls_x509_crt_verify_chain:"data_files/dir4/cert61.crt data_files/dir4/cert63.crt data_files/dir4/cert62.crt":"data_files/dir4/cert61.crt":0:0:"":0
Janos Follathef4f2582015-10-11 16:17:27 +02002038
Manuel Pégourié-Gonnard8b4331a2015-11-19 10:52:12 +01002039X509 CRT verify chain #9 (zero pathlen first intermediate, valid)
Manuel Pégourié-Gonnarda3aa43d2015-11-19 10:46:07 +01002040depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002041mbedtls_x509_crt_verify_chain:"data_files/dir4/cert83.crt data_files/dir4/cert82.crt":"data_files/dir4/cert81.crt":0:0:"":0
Manuel Pégourié-Gonnarda3aa43d2015-11-19 10:46:07 +01002042
Manuel Pégourié-Gonnard8b4331a2015-11-19 10:52:12 +01002043X509 CRT verify chain #10 (zero pathlen root, valid)
2044depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002045mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":0:0:"":0
Manuel Pégourié-Gonnard8b4331a2015-11-19 10:52:12 +01002046
Manuel Pégourié-Gonnard9832cea2017-05-23 10:13:40 +02002047X509 CRT verify chain #11 (valid chain, missing profile)
2048depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002049mbedtls_x509_crt_verify_chain:"data_files/dir4/cert92.crt":"data_files/dir4/cert91.crt":-1:MBEDTLS_ERR_X509_BAD_INPUT_DATA:"nonesuch":0
Manuel Pégourié-Gonnard9832cea2017-05-23 10:13:40 +02002050
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002051X509 CRT verify chain #12 (suiteb profile, RSA root)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002052depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002053mbedtls_x509_crt_verify_chain:"data_files/server3.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002054
2055X509 CRT verify chain #13 (RSA only profile, EC root)
2056depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002057mbedtls_x509_crt_verify_chain:"data_files/server4.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002058
Manuel Pégourié-Gonnardd0922772017-06-27 13:26:43 +02002059X509 CRT verify chain #13 (RSA only profile, EC trusted EE)
2060depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
2061mbedtls_x509_crt_verify_chain:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
2062
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002063X509 CRT verify chain #14 (RSA-3072 profile, root key too small)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002064depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002065mbedtls_x509_crt_verify_chain:"data_files/server1.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002066
2067X509 CRT verify chain #15 (suiteb profile, rsa intermediate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002068depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002069mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_PK:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"suiteb":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002070
2071X509 CRT verify chain #16 (RSA-only profile, EC intermediate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002072depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002073mbedtls_x509_crt_verify_chain:"data_files/server8.crt data_files/test-int-ca2.crt":"data_files/test-ca.crt":MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"rsa3072":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002074
2075X509 CRT verify chain #17 (SHA-512 profile)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002076depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
Manuel Pégourié-Gonnard6b9d53f2017-05-23 12:26:58 +02002077mbedtls_x509_crt_verify_chain:"data_files/server7.crt data_files/test-int-ca.crt":"data_files/test-ca2.crt":MBEDTLS_X509_BADCERT_BAD_MD:MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"sha512":0
Manuel Pégourié-Gonnard6622fed2017-05-23 11:29:29 +02002078
Manuel Pégourié-Gonnard41859782017-05-23 12:58:53 +02002079X509 CRT verify chain #18 (len=1, vrfy fatal on depth 1)
2080depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C
2081mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-2:"":2
2082
2083X509 CRT verify chain #19 (len=0, vrfy fatal on depth 0)
2084depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C
2085mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca2.crt":-1:-1:"":1
2086
2087X509 CRT verify chain #20 (len=1, vrfy fatal on depth 0)
2088depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SHA512_C:MBEDTLS_SHA1_C:MBEDTLS_RSA_C
2089mbedtls_x509_crt_verify_chain:"data_files/server5.crt":"data_files/test-ca.crt":-1:-1:"":1
2090
2091X509 CRT verify chain #21 (len=3, vrfy fatal on depth 3)
2092depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2093mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-4:"":8
2094
2095X509 CRT verify chain #22 (len=3, vrfy fatal on depth 2)
2096depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2097mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-3:"":4
2098
2099X509 CRT verify chain #23 (len=3, vrfy fatal on depth 1)
2100depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2101mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-2:"":2
2102
2103X509 CRT verify chain #24 (len=3, vrfy fatal on depth 0)
2104depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2105mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca.crt":-1:-1:"":1
2106
2107X509 CRT verify chain #25 (len=3, vrfy fatal on depth 3, untrusted)
2108depends_on:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C:MBEDTLS_SHA1_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2109mbedtls_x509_crt_verify_chain:"data_files/server10_int3_int-ca2_ca.crt":"data_files/test-ca2.crt":-1:-4:"":8
2110
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002111X509 OID description #1
Hanno Becker32b48ea2019-06-03 09:48:09 +01002112x509_oid_desc:"2b06010505070301":"TLS Web Server Authentication"
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002113
2114X509 OID description #2
Hanno Becker32b48ea2019-06-03 09:48:09 +01002115x509_oid_desc:"2b0601050507030f":"notfound"
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002116
2117X509 OID description #3
Hanno Becker32b48ea2019-06-03 09:48:09 +01002118x509_oid_desc:"2b0601050507030100":"notfound"
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002119
2120X509 OID numstring #1 (wide buffer)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002121x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":20:17
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002122
2123X509 OID numstring #2 (buffer just fits)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002124x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":18:17
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002125
2126X509 OID numstring #3 (buffer too small)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002127x509_oid_numstr:"2b06010505070301":"1.3.6.1.5.5.7.3.1":17:MBEDTLS_ERR_OID_BUF_TOO_SMALL
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002128
2129X509 OID numstring #4 (larger number)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002130x509_oid_numstr:"2a864886f70d":"1.2.840.113549":15:14
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +01002131
2132X509 OID numstring #5 (arithmetic overflow)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002133x509_oid_numstr:"2a8648f9f8f7f6f5f4f3f2f1f001":"":100:MBEDTLS_ERR_OID_BUF_TOO_SMALL
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002134
Hanno Becker2389d162019-02-14 12:52:47 +00002135X509 CRT keyUsage #1 (no extension, expected KU)
palaviva07ecda2016-08-07 11:15:29 +03002136depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +01002137x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002138
Hanno Becker2389d162019-02-14 12:52:47 +00002139X509 CRT keyUsage #2 (no extension, surprising KU)
palaviva07ecda2016-08-07 11:15:29 +03002140depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002141x509_check_key_usage:"data_files/server1.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002142
Hanno Becker2389d162019-02-14 12:52:47 +00002143X509 CRT keyUsage #3 (extension present, no KU)
palaviva07ecda2016-08-07 11:15:29 +03002144depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002145x509_check_key_usage:"data_files/server1.key_usage.crt":0:0
2146
Hanno Becker2389d162019-02-14 12:52:47 +00002147X509 CRT keyUsage #4 (extension present, single KU present)
palaviva07ecda2016-08-07 11:15:29 +03002148depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002149x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002150
Hanno Becker2389d162019-02-14 12:52:47 +00002151X509 CRT keyUsage #5 (extension present, single KU absent)
palaviva07ecda2016-08-07 11:15:29 +03002152depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002153x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002154
Hanno Becker2389d162019-02-14 12:52:47 +00002155X509 CRT keyUsage #6 (extension present, combined KU present)
palaviva07ecda2016-08-07 11:15:29 +03002156depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +01002157x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:0
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002158
Hanno Becker2389d162019-02-14 12:52:47 +00002159X509 CRT keyUsage #7 (extension present, combined KU both absent)
palaviva07ecda2016-08-07 11:15:29 +03002160depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002161x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_KU_CRL_SIGN:MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002162
Hanno Becker2389d162019-02-14 12:52:47 +00002163X509 CRT keyUsage #8 (extension present, combined KU one absent)
palaviva07ecda2016-08-07 11:15:29 +03002164depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnarde6028c92015-04-20 12:19:02 +01002165x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_KEY_AGREEMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +02002166
Hanno Becker2389d162019-02-14 12:52:47 +00002167X509 CRT keyUsage #9 (extension present, decOnly allowed absent)
palaviva07ecda2016-08-07 11:15:29 +03002168depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard655a9642015-06-23 10:48:44 +02002169x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0
2170
Hanno Becker2389d162019-02-14 12:52:47 +00002171X509 CRT keyUsage #10 (extension present, decOnly non-allowed present)
palaviva07ecda2016-08-07 11:15:29 +03002172depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard655a9642015-06-23 10:48:44 +02002173x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT:MBEDTLS_ERR_X509_BAD_INPUT_DATA
2174
Hanno Becker2389d162019-02-14 12:52:47 +00002175X509 CRT keyUsage #11 (extension present, decOnly allowed present)
palaviva07ecda2016-08-07 11:15:29 +03002176depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Manuel Pégourié-Gonnard655a9642015-06-23 10:48:44 +02002177x509_check_key_usage:"data_files/keyUsage.decipherOnly.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY:0
2178
Hanno Becker2389d162019-02-14 12:52:47 +00002179X509 CRT extendedKeyUsage #1 (no extension, serverAuth)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002180depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002181x509_check_extended_key_usage:"data_files/server5.crt":"2b06010505070301":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002182
Hanno Becker2389d162019-02-14 12:52:47 +00002183X509 CRT extendedKeyUsage #2 (single value, present)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002184depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002185x509_check_extended_key_usage:"data_files/server5.eku-srv.crt":"2b06010505070301":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002186
Hanno Becker2389d162019-02-14 12:52:47 +00002187X509 CRT extendedKeyUsage #3 (single value, absent)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002188depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002189x509_check_extended_key_usage:"data_files/server5.eku-cli.crt":"2b06010505070301":MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002190
Hanno Becker2389d162019-02-14 12:52:47 +00002191X509 CRT extendedKeyUsage #4 (two values, first)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002192depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002193x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070301":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002194
Hanno Becker2389d162019-02-14 12:52:47 +00002195X509 CRT extendedKeyUsage #5 (two values, second)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002196depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002197x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070302":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002198
Hanno Becker2389d162019-02-14 12:52:47 +00002199X509 CRT extendedKeyUsage #6 (two values, other)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002200depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002201x509_check_extended_key_usage:"data_files/server5.eku-srv_cli.crt":"2b06010505070303":MBEDTLS_ERR_X509_BAD_INPUT_DATA
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002202
Hanno Becker2389d162019-02-14 12:52:47 +00002203X509 CRT extendedKeyUsage #7 (any, random)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002204depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002205x509_check_extended_key_usage:"data_files/server5.eku-cs_any.crt":"2b060105050703ff":0
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +02002206
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002207X509 RSASSA-PSS parameters ASN1 (good, all defaults)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002208x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002209
2210X509 RSASSA-PSS parameters ASN1 (wrong initial tag)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002211x509_parse_rsassa_pss_params:"":MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002212
2213X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002214x509_parse_rsassa_pss_params:"a400":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002215
2216X509 RSASSA-PSS parameters ASN1 (good, HashAlg SHA256)
palaviva07ecda2016-08-07 11:15:29 +03002217depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002218x509_parse_rsassa_pss_params:"a00d300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002219
2220X509 RSASSA-PSS parameters ASN1 (good, explicit HashAlg = default)
palaviva07ecda2016-08-07 11:15:29 +03002221depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002222x509_parse_rsassa_pss_params:"a009300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002223
2224X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002225x509_parse_rsassa_pss_params:"a00a300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002226
2227X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #2)
palaviva07ecda2016-08-07 11:15:29 +03002228depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002229x509_parse_rsassa_pss_params:"a00a300706052b0e03021a00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002230
2231X509 RSASSA-PSS parameters ASN1 (HashAlg with parameters)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002232x509_parse_rsassa_pss_params:"a00f300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002233
Paul Bakker237a8472014-06-25 14:45:24 +02002234X509 RSASSA-PSS parameters ASN1 (HashAlg unknown OID)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002235x509_parse_rsassa_pss_params:"a00d300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA256:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002236
2237X509 RSASSA-PSS parameters ASN1 (good, MGAlg = MGF1-SHA256)
palaviva07ecda2016-08-07 11:15:29 +03002238depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002239x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002240
2241X509 RSASSA-PSS parameters ASN1 (good, explicit MGAlg = default)
palaviva07ecda2016-08-07 11:15:29 +03002242depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA1_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002243x509_parse_rsassa_pss_params:"a116301406092a864886f70d010108300706052b0e03021a":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002244
2245X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002246x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002247
2248X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #2)
palaviva07ecda2016-08-07 11:15:29 +03002249depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002250x509_parse_rsassa_pss_params:"a11b301806092a864886f70d010108300b060960864801650304020100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002251
2252X509 RSASSA-PSS parameters ASN1 (MGAlg AlgId wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002253x509_parse_rsassa_pss_params:"a11a301906092a864886f70d010108300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002254
2255X509 RSASSA-PSS parameters ASN1 (MGAlg OID != MGF1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002256x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010109300b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE + MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002257
2258X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002259x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108310b0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002260
2261X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002262x509_parse_rsassa_pss_params:"a10f300d06092a864886f70d0101083000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002263
2264X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002265x509_parse_rsassa_pss_params:"a11b301906092a864886f70d010108300c0609608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002266
2267X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002268x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b0709608648016503040201":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002269
2270X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002271x509_parse_rsassa_pss_params:"a11a301806092a864886f70d010108300b06096086480165030402ff":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002272
2273X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL)
palaviva07ecda2016-08-07 11:15:29 +03002274depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002275x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002276
2277X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag)
palaviva07ecda2016-08-07 11:15:29 +03002278depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002279x509_parse_rsassa_pss_params:"a11c301a06092a864886f70d010108300d06096086480165030402013000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002280
2281X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1c)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002282x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e06096086480165030402010500":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002283
2284X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #2)
palaviva07ecda2016-08-07 11:15:29 +03002285depends_on:MBEDTLS_RSA_C:MBEDTLS_SHA256_C
Hanno Becker32b48ea2019-06-03 09:48:09 +01002286x509_parse_rsassa_pss_params:"a11d301b06092a864886f70d010108300e0609608648016503040201050000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA256:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002287
2288X509 RSASSA-PSS parameters ASN1 (good, saltLen = 94)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002289x509_parse_rsassa_pss_params:"a20302015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002290
2291X509 RSASSA-PSS parameters ASN1 (good, explicit saltLen = default)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002292x509_parse_rsassa_pss_params:"a203020114":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002293
2294X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002295x509_parse_rsassa_pss_params:"a20402015e":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002296
2297X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #2)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002298x509_parse_rsassa_pss_params:"a20402015e00":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002299
2300X509 RSASSA-PSS parameters ASN1 (saltLen not an int)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002301x509_parse_rsassa_pss_params:"a2023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:94:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002302
2303X509 RSASSA-PSS parameters ASN1 (good, explicit trailerField = default)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002304x509_parse_rsassa_pss_params:"a303020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:0
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002305
2306X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002307x509_parse_rsassa_pss_params:"a304020101":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002308
2309X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #2)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002310x509_parse_rsassa_pss_params:"a30402010100":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002311
2312X509 RSASSA-PSS parameters ASN1 (trailerField not an int)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002313x509_parse_rsassa_pss_params:"a3023000":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002314
2315X509 RSASSA-PSS parameters ASN1 (trailerField not 1)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002316x509_parse_rsassa_pss_params:"a303020102":MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE:MBEDTLS_MD_SHA1:MBEDTLS_MD_SHA1:20:MBEDTLS_ERR_X509_INVALID_ALG
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +02002317
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002318X509 CSR ASN.1 (OK)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002319depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002320mbedtls_x509_csr_parse:"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":"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n":0
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002321
2322X509 CSR ASN.1 (bad first tag)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002323mbedtls_x509_csr_parse:"3100":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002324
2325X509 CSR ASN.1 (bad sequence: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002326mbedtls_x509_csr_parse:"3001":"":MBEDTLS_ERR_X509_INVALID_FORMAT
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002327
2328X509 CSR ASN.1 (total length mistmatch)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002329mbedtls_x509_csr_parse:"30010000":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002330
2331X509 CSR ASN.1 (bad CRI: not a sequence)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002332mbedtls_x509_csr_parse:"30023100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002333
2334X509 CSR ASN.1 (bad CRI: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002335mbedtls_x509_csr_parse:"30023001":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002336
2337X509 CSR ASN.1 (bad CRI.Version: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002338mbedtls_x509_csr_parse:"30053002020100":"":MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002339
2340X509 CSR ASN.1 (bad CRI.Version: not v1)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002341mbedtls_x509_csr_parse:"30053003020101":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002342
2343X509 CSR ASN.1 (bad CRI.Name: not a sequence)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002344mbedtls_x509_csr_parse:"300730050201003100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002345
2346X509 CSR ASN.1 (bad CRI.Name: overlong)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002347mbedtls_x509_csr_parse:"30083005020100300100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002348
2349X509 CSR ASN.1 (bad CRI.Name payload: not a set)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002350mbedtls_x509_csr_parse:"3009300702010030023000":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002351
2352X509 CSR ASN.1 (bad CRI.Name payload: overlong)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002353mbedtls_x509_csr_parse:"300a30080201003002310100":"":MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002354
2355X509 CSR ASN.1 (bad SubjectPublicKeyInfo: missing)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002356mbedtls_x509_csr_parse:"30143012020100300d310b3009060355040613024e4c":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002357
2358X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002359mbedtls_x509_csr_parse:"30163014020100300d310b3009060355040613024e4c3100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002360
2361X509 CSR ASN.1 (bad SubjectPublicKeyInfo: overlong)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002362mbedtls_x509_csr_parse:"30173014020100300d310b3009060355040613024e4c300100":"":MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002363
2364X509 CSR ASN.1 (bad attributes: missing)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002365depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002366mbedtls_x509_csr_parse:"3081973081940201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002367
2368X509 CSR ASN.1 (bad attributes: bad tag)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002369depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002370mbedtls_x509_csr_parse:"3081993081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff0500":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002371
2372X509 CSR ASN.1 (bad attributes: overlong)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002373depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002374mbedtls_x509_csr_parse:"30819a3081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa00100":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002375
2376X509 CSR ASN.1 (bad sigAlg: missing)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002377depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002378mbedtls_x509_csr_parse:"3081c23081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002379
2380X509 CSR ASN.1 (bad sigAlg: not a sequence)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002381depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002382mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03100":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002383
2384X509 CSR ASN.1 (bad sigAlg: overlong)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002385depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002386mbedtls_x509_csr_parse:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03001":"":MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002387
2388X509 CSR ASN.1 (bad sigAlg: unknown)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002389depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002390mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04ff":"":MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002391
2392X509 CSR ASN.1 (bad sig: missing)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002393depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002394mbedtls_x509_csr_parse:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d0401":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002395
2396X509 CSR ASN.1 (bad sig: not a bit string)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002397depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002398mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010400":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002399
2400X509 CSR ASN.1 (bad sig: overlong)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002401depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002402mbedtls_x509_csr_parse:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010301":"":MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +02002403
2404X509 CSR ASN.1 (extra data after signature)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002405depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA1_C
Hanno Beckerd0d78d72019-02-12 10:20:42 +00002406mbedtls_x509_csr_parse:"308201193081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010349003046022100b49fd8c8f77abfa871908dfbe684a08a793d0f490a43d86fcf2086e4f24bb0c2022100f829d5ccd3742369299e6294394717c4b723a0f68b44e831b6e6c3bcabf9724300":"":MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Paul Bakker5a5fa922014-09-26 14:53:04 +02002407
Andres AGf00baff2017-03-07 10:57:34 +00002408X509 CSR ASN.1 (invalid version overflow)
Hanno Becker32b48ea2019-06-03 09:48:09 +01002409mbedtls_x509_csr_parse:"3008300602047fffffff":"":MBEDTLS_ERR_X509_UNKNOWN_VERSION
Andres AGf00baff2017-03-07 10:57:34 +00002410
Paul Bakker5a5fa922014-09-26 14:53:04 +02002411X509 File parse (no issues)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002412depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Paul Bakker5a5fa922014-09-26 14:53:04 +02002413x509parse_crt_file:"data_files/server7_int-ca.crt":0
2414
2415X509 File parse (extra space in one certificate)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002416depends_on:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Paul Bakker5a5fa922014-09-26 14:53:04 +02002417x509parse_crt_file:"data_files/server7_pem_space.crt":1
2418
2419X509 File parse (all certificates fail)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002420depends_on:MBEDTLS_ECDSA_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02002421x509parse_crt_file:"data_files/server7_all_space.crt":MBEDTLS_ERR_PEM_INVALID_DATA + MBEDTLS_ERR_BASE64_INVALID_CHARACTER
Manuel Pégourié-Gonnard052d10c2015-07-31 11:09:59 +02002422
2423X509 File parse (trailing spaces, OK)
Manuel Pégourié-Gonnard43be6cd2017-06-20 09:53:42 +02002424depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C:MBEDTLS_RSA_C
Manuel Pégourié-Gonnard052d10c2015-07-31 11:09:59 +02002425x509parse_crt_file:"data_files/server7_trailing_space.crt":0
Andres AG4b76aec2016-09-23 13:16:02 +01002426
2427X509 Get time (UTC no issues)
2428depends_on:MBEDTLS_X509_USE_C
2429x509_get_time:MBEDTLS_ASN1_UTC_TIME:"500101000000Z":0:1950:1:1:0:0:0
2430
2431X509 Get time (Generalized Time no issues)
2432depends_on:MBEDTLS_X509_USE_C
2433x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"99991231235959Z":0:9999:12:31:23:59:59
2434
2435X509 Get time (UTC year without leap day)
2436depends_on:MBEDTLS_X509_USE_C
2437x509_get_time:MBEDTLS_ASN1_UTC_TIME:"490229121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2438
2439X509 Get time (UTC year with leap day)
2440depends_on:MBEDTLS_X509_USE_C
2441x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212Z":0:2000:2:29:12:12:12
2442
2443X509 Get time (UTC invalid day of month #1)
2444depends_on:MBEDTLS_X509_USE_C
2445x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000132121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2446
2447X509 Get time (UTC invalid day of month #2)
2448depends_on:MBEDTLS_X509_USE_C
2449x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001131121212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2450
2451X509 Get time (UTC invalid hour)
2452depends_on:MBEDTLS_X509_USE_C
2453x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130241212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2454
2455X509 Get time (UTC invalid min)
2456depends_on:MBEDTLS_X509_USE_C
2457x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130236012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2458
2459X509 Get time (UTC invalid sec)
2460depends_on:MBEDTLS_X509_USE_C
2461x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001130235960Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
Janos Follathea7054a2017-02-08 14:13:02 +00002462
2463X509 Get time (UTC without time zone)
2464depends_on:MBEDTLS_X509_USE_C
2465x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212":0:2000:2:29:12:12:12
2466
2467X509 Get time (UTC with invalid time zone #1)
2468depends_on:MBEDTLS_X509_USE_C
2469x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2470
2471X509 Get time (UTC with invalid time zone #2)
2472depends_on:MBEDTLS_X509_USE_C
2473x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2474
2475X509 Get time (Date with invalid tag)
2476depends_on:MBEDTLS_X509_USE_C
2477x509_get_time:MBEDTLS_ASN1_CONTEXT_SPECIFIC:"000229121212":MBEDTLS_ERR_X509_INVALID_DATE+MBEDTLS_ERR_ASN1_UNEXPECTED_TAG:0:0:0:0:0:0
2478
2479X509 Get time (UTC, truncated)
2480depends_on:MBEDTLS_X509_USE_C
2481x509_get_time:MBEDTLS_ASN1_UTC_TIME:"000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2482
2483X509 Get time (Generalized Time, truncated)
2484depends_on:MBEDTLS_X509_USE_C
2485x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229121":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2486
2487X509 Get time (UTC without seconds)
2488depends_on:MBEDTLS_X509_USE_C
2489x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212":MBEDTLS_ERR_X509_INVALID_DATE:2000:2:29:12:12:0
2490
2491X509 Get time (UTC without seconds and with invalid time zone #1)
2492depends_on:MBEDTLS_X509_USE_C
2493x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212J":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2494
2495X509 Get time (UTC without second and with invalid time zone #2)
2496depends_on:MBEDTLS_X509_USE_C
2497x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0002291212+0300":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2498
2499X509 Get time (UTC invalid character in year)
2500depends_on:MBEDTLS_X509_USE_C
2501x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0\1130231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2502
2503X509 Get time (UTC invalid character in month)
2504depends_on:MBEDTLS_X509_USE_C
2505x509_get_time:MBEDTLS_ASN1_UTC_TIME:"001%30231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2506
2507X509 Get time (UTC invalid character in day)
2508depends_on:MBEDTLS_X509_USE_C
2509x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011`0231212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2510
2511X509 Get time (UTC invalid character in hour)
2512depends_on:MBEDTLS_X509_USE_C
2513x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302h1212Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2514
2515X509 Get time (UTC invalid character in min)
2516depends_on:MBEDTLS_X509_USE_C
2517x509_get_time:MBEDTLS_ASN1_UTC_TIME:"00113023u012Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2518
2519X509 Get time (UTC invalid character in sec)
2520depends_on:MBEDTLS_X509_USE_C
2521x509_get_time:MBEDTLS_ASN1_UTC_TIME:"0011302359n0Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2522
Andres Amaya Garcia60100d02017-10-06 17:05:24 +01002523X509 Get time (Generalized Time, year multiple of 100 but not 400 is not a leap year)
Andres Amaya Garcia735b37e2016-11-21 15:38:02 +00002524depends_on:MBEDTLS_X509_USE_C
2525x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19000229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
2526
Andres Amaya Garcia60100d02017-10-06 17:05:24 +01002527X509 Get time (Generalized Time, year multiple of 4 but not 100 is a leap year)
Andres Amaya Garcia735b37e2016-11-21 15:38:02 +00002528depends_on:MBEDTLS_X509_USE_C
2529x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19920229000000Z":0:1992:2:29:0:0:0
2530
Andres Amaya Garcia60100d02017-10-06 17:05:24 +01002531X509 Get time (Generalized Time, year multiple of 400 is a leap year)
Andres Amaya Garcia735b37e2016-11-21 15:38:02 +00002532depends_on:MBEDTLS_X509_USE_C
2533x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"20000229000000Z":0:2000:2:29:0:0:0
2534
2535X509 Get time (Generalized Time invalid leap year not multiple of 4, 100 or 400)
2536depends_on:MBEDTLS_X509_USE_C
2537x509_get_time:MBEDTLS_ASN1_GENERALIZED_TIME:"19910229000000Z":MBEDTLS_ERR_X509_INVALID_DATE:0:0:0:0:0:0
Manuel Pégourié-Gonnardda19f4c2018-06-12 12:40:54 +02002538
Hanno Becker2389d162019-02-14 12:52:47 +00002539X509 CRT verify restart: trusted EE, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002540depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
2541x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:0:0:0
2542
Hanno Becker2389d162019-02-14 12:52:47 +00002543X509 CRT verify restart: trusted EE, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002544depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
2545x509_verify_restart:"data_files/server5-selfsigned.crt":"data_files/server5-selfsigned.crt":0:0:1:0:0
2546
Hanno Becker2389d162019-02-14 12:52:47 +00002547X509 CRT verify restart: no intermediate, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002548depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2549x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:0:0:0
2550
Hanno Becker2389d162019-02-14 12:52:47 +00002551X509 CRT verify restart: no intermediate, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002552depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2553x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:1:100:10000
2554
Hanno Becker2389d162019-02-14 12:52:47 +00002555X509 CRT verify restart: no intermediate, max_ops=40000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002556depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2557x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:40000:0:0
2558
Hanno Becker2389d162019-02-14 12:52:47 +00002559X509 CRT verify restart: no intermediate, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002560depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2561x509_verify_restart:"data_files/server5.crt":"data_files/test-ca2.crt":0:0:500:20:80
2562
Hanno Becker2389d162019-02-14 12:52:47 +00002563X509 CRT verify restart: no intermediate, badsign, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002564depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2565x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0
2566
Hanno Becker2389d162019-02-14 12:52:47 +00002567X509 CRT verify restart: no intermediate, badsign, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002568depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2569x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000
2570
Hanno Becker2389d162019-02-14 12:52:47 +00002571X509 CRT verify restart: no intermediate, badsign, max_ops=40000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002572depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2573x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:40000:0:0
2574
Hanno Becker2389d162019-02-14 12:52:47 +00002575X509 CRT verify restart: no intermediate, badsign, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002576depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED
2577x509_verify_restart:"data_files/server5-badsign.crt":"data_files/test-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:20:80
2578
Hanno Becker2389d162019-02-14 12:52:47 +00002579X509 CRT verify restart: one int, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002580depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2581x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:0:0:0
2582
Hanno Becker2389d162019-02-14 12:52:47 +00002583X509 CRT verify restart: one int, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002584depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2585x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:1:100:10000
2586
Hanno Becker2389d162019-02-14 12:52:47 +00002587X509 CRT verify restart: one int, max_ops=30000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002588depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2589x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:30000:0:0
2590
Hanno Becker2389d162019-02-14 12:52:47 +00002591X509 CRT verify restart: one int, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002592depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2593x509_verify_restart:"data_files/server10_int3_int-ca2.crt":"data_files/test-int-ca2.crt":0:0:500:25:100
2594
Hanno Becker2389d162019-02-14 12:52:47 +00002595X509 CRT verify restart: one int, EE badsign, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002596depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2597x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0
2598
Hanno Becker2389d162019-02-14 12:52:47 +00002599X509 CRT verify restart: one int, EE badsign, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002600depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2601x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000
2602
Hanno Becker2389d162019-02-14 12:52:47 +00002603X509 CRT verify restart: one int, EE badsign, max_ops=30000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002604depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2605x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0
2606
Hanno Becker2389d162019-02-14 12:52:47 +00002607X509 CRT verify restart: one int, EE badsign, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002608depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2609x509_verify_restart:"data_files/server10-bs_int3.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100
2610
Hanno Becker2389d162019-02-14 12:52:47 +00002611X509 CRT verify restart: one int, int badsign, max_ops=0 (disabled)
Manuel Pégourié-Gonnardd19a41d2017-07-14 11:05:59 +02002612depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2613x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:0:0:0
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002614
Hanno Becker2389d162019-02-14 12:52:47 +00002615X509 CRT verify restart: one int, int badsign, max_ops=1
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002616depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2617x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:1:100:10000
2618
Hanno Becker2389d162019-02-14 12:52:47 +00002619X509 CRT verify restart: one int, int badsign, max_ops=30000
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002620depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2621x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:30000:0:0
2622
Hanno Becker2389d162019-02-14 12:52:47 +00002623X509 CRT verify restart: one int, int badsign, max_ops=500
Manuel Pégourié-Gonnard8b590492017-08-14 18:04:19 +02002624depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_ECDSA_C:MBEDTLS_SHA256_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_RSA_C
2625x509_verify_restart:"data_files/server10_int3-bs.pem":"data_files/test-int-ca2.crt":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_NOT_TRUSTED:500:25:100