- Added test coverage for X509parse
 - Fixed segfault in rsa_check_privkey() and rsa_check_pubkey() and added test

diff --git a/tests/suites/test_suite_x509parse.function b/tests/suites/test_suite_x509parse.function
new file mode 100644
index 0000000..e9a0e19
--- /dev/null
+++ b/tests/suites/test_suite_x509parse.function
@@ -0,0 +1,126 @@
+BEGIN_HEADER
+#include <polarssl/x509.h>
+END_HEADER
+
+BEGIN_CASE
+x509_cert_info:crt_file:result_str
+{
+    x509_cert   crt;
+    char buf[2000];
+
+    memset( &crt, 0, sizeof( x509_cert ) );
+    memset( buf, 0, 2000 );
+
+    TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 );
+    int res = x509parse_cert_info( buf, 2000, "", &crt );
+
+    TEST_ASSERT( res != -1 );
+    TEST_ASSERT( res != -2 );
+
+    TEST_ASSERT( strcmp( buf, {result_str} ) == 0 );
+}
+END_CASE
+
+BEGIN_CASE
+x509_crl_info:crl_file:result_str
+{
+    x509_crl   crl;
+    char buf[2000];
+
+    memset( &crl, 0, sizeof( x509_crl ) );
+    memset( buf, 0, 2000 );
+
+    TEST_ASSERT( x509parse_crlfile( &crl, {crl_file} ) == 0 );
+    int res = x509parse_crl_info( buf, 2000, "", &crl );
+
+    TEST_ASSERT( res != -1 );
+    TEST_ASSERT( res != -2 );
+
+    TEST_ASSERT( strcmp( buf, {result_str} ) == 0 );
+}
+END_CASE
+
+BEGIN_CASE
+x509_verify:crt_file:ca_file:crl_file:cn_name:result
+{
+    x509_cert   crt;
+    x509_cert   ca;
+    x509_crl    crl;
+    int         flags = 0;
+
+    memset( &crt, 0, sizeof( x509_cert ) );
+    memset( &ca, 0, sizeof( x509_cert ) );
+    memset( &crl, 0, sizeof( x509_crl ) );
+
+    TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 );
+    TEST_ASSERT( x509parse_crtfile( &ca, {ca_file} ) == 0 );
+    TEST_ASSERT( x509parse_crlfile( &crl, {crl_file} ) == 0 );
+
+    int res = x509parse_verify( &crt, &ca, &crl, {cn_name}, &flags );
+
+    if( res == 0 )
+    {
+        TEST_ASSERT( res == ( {result} ) );
+    }
+    else
+    {
+        TEST_ASSERT( flags == ( {result} ) );
+    }
+}
+END_CASE
+
+BEGIN_CASE
+x509_dn_gets:crt_file:entity:result_str
+{
+    x509_cert   crt;
+    char buf[2000];
+
+    memset( &crt, 0, sizeof( x509_cert ) );
+    memset( buf, 0, 2000 );
+
+    TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 );
+    int res =  x509parse_dn_gets( buf, 2000, &crt.{entity} );
+
+    TEST_ASSERT( res != -1 );
+    TEST_ASSERT( res != -2 );
+
+    TEST_ASSERT( strcmp( buf, {result_str} ) == 0 );
+}
+END_CASE
+
+BEGIN_CASE
+x509_time_expired:crt_file:entity:result
+{
+    x509_cert   crt;
+
+    memset( &crt, 0, sizeof( x509_cert ) );
+
+    TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 );
+    TEST_ASSERT( x509parse_time_expired( &crt.{entity} ) == {result} );
+}
+END_CASE
+
+BEGIN_CASE
+x509parse_key:key_file:password:result
+{
+    rsa_context rsa;
+
+    memset( &rsa, 0, sizeof( rsa_context ) );
+
+    int res = x509parse_keyfile( &rsa, {key_file}, {password} );
+
+    TEST_ASSERT( res == {result} );
+
+    if( res == 0 )
+    {
+        TEST_ASSERT( rsa_check_privkey( &rsa ) == 0 );
+    }
+}
+END_CASE
+
+BEGIN_CASE
+x509_selftest:
+{
+    TEST_ASSERT( x509_self_test( 0 ) == 0 );
+}
+END_CASE