blob: 0cbad4bceea359e73f86acbdc12a6a82dbf85738 [file] [log] [blame]
Paul Bakker6d620502012-02-16 14:09:13 +00001Certificate Request check Server1 SHA1
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +01002depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +01003x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.sha1":MBEDTLS_MD_SHA1:0:0:0:0:0
Paul Bakker6d620502012-02-16 14:09:13 +00004
5Certificate Request check Server1 SHA224
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +01006depends_on:MBEDTLS_MD_CAN_SHA224:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +01007x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.sha224":MBEDTLS_MD_SHA224:0:0:0:0:0
Paul Bakker6d620502012-02-16 14:09:13 +00008
9Certificate Request check Server1 SHA256
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010010depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010011x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.sha256":MBEDTLS_MD_SHA256:0:0:0:0:0
Paul Bakker6d620502012-02-16 14:09:13 +000012
13Certificate Request check Server1 SHA384
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010014depends_on:MBEDTLS_MD_CAN_SHA384:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010015x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.sha384":MBEDTLS_MD_SHA384:0:0:0:0:0
Paul Bakker6d620502012-02-16 14:09:13 +000016
17Certificate Request check Server1 SHA512
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010018depends_on:MBEDTLS_MD_CAN_SHA512:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010019x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.sha512":MBEDTLS_MD_SHA512:0:0:0:0:0
Paul Bakker6d620502012-02-16 14:09:13 +000020
Paul Bakker6d620502012-02-16 14:09:13 +000021Certificate Request check Server1 MD5
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010022depends_on:MBEDTLS_MD_CAN_MD5:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010023x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.md5":MBEDTLS_MD_MD5:0:0:0:0:0
Manuel Pégourié-Gonnardc5ce83a2014-03-28 12:46:44 +010024
25Certificate Request check Server1 key_usage
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010026depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010027x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.key_usage":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:0:0:0
Andres Amaya Garcia7067f812018-09-26 10:51:16 +010028
Neil Armstrong9fb92032022-03-16 17:16:46 +010029Certificate Request check opaque Server1 key_usage
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010030depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010031x509_csr_check_opaque:"../framework/data_files/server1.key":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION:0
Neil Armstrong9fb92032022-03-16 17:16:46 +010032
Andres Amaya Garcia7067f812018-09-26 10:51:16 +010033Certificate Request check Server1 key_usage empty
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010034depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010035x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.key_usage_empty":MBEDTLS_MD_SHA1:0:1:0:0:0
Manuel Pégourié-Gonnardc5ce83a2014-03-28 12:46:44 +010036
37Certificate Request check Server1 ns_cert_type
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010038depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010039x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:0
Andres Amaya Garcia7067f812018-09-26 10:51:16 +010040
41Certificate Request check Server1 ns_cert_type empty
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010042depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010043x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.cert_type_empty":MBEDTLS_MD_SHA1:0:0:0:1:0
Manuel Pégourié-Gonnardc5ce83a2014-03-28 12:46:44 +010044
45Certificate Request check Server1 key_usage + ns_cert_type
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010046depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010047x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.ku-ct":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:0
Manuel Pégourié-Gonnardc5ce83a2014-03-28 12:46:44 +010048
49Certificate Request check Server5 ECDSA, key_usage
Valerio Settidb6b4db2023-09-01 09:20:51 +020050depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_ECP_HAVE_SECP256R1
David Horstmann9c4dd4e2024-06-11 17:44:00 +010051x509_csr_check:"../framework/data_files/server5.key":"../framework/data_files/server5.req.ku.sha1":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION:1:0:0:0
Valerio Setti48e8fc72022-10-19 15:14:29 +020052
53Certificate Request check Server1, set_extension
Manuel Pégourié-Gonnarda9464892023-03-17 12:08:50 +010054depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
David Horstmann9c4dd4e2024-06-11 17:44:00 +010055x509_csr_check:"../framework/data_files/server1.key":"../framework/data_files/server1.req.sha256.ext":MBEDTLS_MD_SHA256:0:0:0:0:1
Paul Bakker2397cf32013-09-08 15:58:15 +020056
Andrzej Kurek5f7bad32018-11-19 10:12:37 -050057Certificate Request check opaque Server5 ECDSA, key_usage
Valerio Settidb6b4db2023-09-01 09:20:51 +020058depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
David Horstmann9c4dd4e2024-06-11 17:44:00 +010059x509_csr_check_opaque:"../framework/data_files/server5.key":MBEDTLS_MD_SHA256:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION:0
Andrzej Kurek5f7bad32018-11-19 10:12:37 -050060
Paul Bakker2397cf32013-09-08 15:58:15 +020061Certificate write check Server1 SHA1
Pengyu Lv2151ba52023-10-31 18:12:04 +080062depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010063x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.crt":0:0:"../framework/data_files/test-ca.crt":0
Manuel Pégourié-Gonnard6c1a73e2014-03-28 14:03:22 +010064
Werner Lewisacd01e52022-05-10 12:23:13 +010065Certificate write check Server1 SHA1, not before 1970
Pengyu Lv2151ba52023-10-31 18:12:04 +080066depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010067x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"../framework/data_files/test-ca.crt":0
Werner Lewisacd01e52022-05-10 12:23:13 +010068
69Certificate write check Server1 SHA1, not after 2050
Pengyu Lv2151ba52023-10-31 18:12:04 +080070depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010071x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20500210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"../framework/data_files/test-ca.crt":0
Werner Lewisacd01e52022-05-10 12:23:13 +010072
73Certificate write check Server1 SHA1, not before 1970, not after 2050
Pengyu Lv2151ba52023-10-31 18:12:04 +080074depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010075x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20500210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"../framework/data_files/test-ca.crt":0
Werner Lewisacd01e52022-05-10 12:23:13 +010076
77Certificate write check Server1 SHA1, not before 2050, not after 2059
Pengyu Lv2151ba52023-10-31 18:12:04 +080078depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010079x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20500210144406":"20590210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"../framework/data_files/test-ca.crt":0
Werner Lewisacd01e52022-05-10 12:23:13 +010080
Manuel Pégourié-Gonnard6c1a73e2014-03-28 14:03:22 +010081Certificate write check Server1 SHA1, key_usage
Pengyu Lv2151ba52023-10-31 18:12:04 +080082depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010083x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:1:-1:"../framework/data_files/server1.key_usage.crt":0:0:"../framework/data_files/test-ca.crt":0
Nicholas Wilsonca841d32015-11-13 14:22:36 +000084
85Certificate write check Server1 SHA1, one ext_key_usage
Pengyu Lv2151ba52023-10-31 18:12:04 +080086depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010087x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406":MBEDTLS_MD_SHA1:0:0:"serverAuth":0:0:1:-1:"../framework/data_files/server1.key_ext_usage.crt":0:0:"../framework/data_files/test-ca.crt":0
Nicholas Wilsonca841d32015-11-13 14:22:36 +000088
89Certificate write check Server1 SHA1, two ext_key_usages
Pengyu Lv2151ba52023-10-31 18:12:04 +080090depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010091x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406":MBEDTLS_MD_SHA1:0:0:"codeSigning,timeStamping":0:0:1:-1:"../framework/data_files/server1.key_ext_usages.crt":0:0:"../framework/data_files/test-ca.crt":0
Manuel Pégourié-Gonnard6c1a73e2014-03-28 14:03:22 +010092
93Certificate write check Server1 SHA1, ns_cert_type
Pengyu Lv2151ba52023-10-31 18:12:04 +080094depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010095x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"../framework/data_files/server1.cert_type.crt":0:0:"../framework/data_files/test-ca.crt":0
Manuel Pégourié-Gonnard6c1a73e2014-03-28 14:03:22 +010096
97Certificate write check Server1 SHA1, version 1
Pengyu Lv2151ba52023-10-31 18:12:04 +080098depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +010099x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:MBEDTLS_X509_CRT_VERSION_1:"../framework/data_files/server1.v1.crt":0:0:"../framework/data_files/test-ca.crt":0
Darren Krahne560be32020-09-21 17:40:50 -0700100
101Certificate write check Server1 SHA1, CA
Pengyu Lv2151ba52023-10-31 18:12:04 +0800102depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100103x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.ca.crt":0:1:"../framework/data_files/test-ca.crt":0
Hanno Becker418a6222017-09-14 07:51:28 +0100104
105Certificate write check Server1 SHA1, RSA_ALT
Pengyu Lv2151ba52023-10-31 18:12:04 +0800106depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100107x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:0:-1:"../framework/data_files/server1.noauthid.crt":1:0:"../framework/data_files/test-ca.crt":0
Hanno Becker418a6222017-09-14 07:51:28 +0100108
109Certificate write check Server1 SHA1, RSA_ALT, key_usage
Pengyu Lv2151ba52023-10-31 18:12:04 +0800110depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100111x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:0:-1:"../framework/data_files/server1.key_usage_noauthid.crt":1:0:"../framework/data_files/test-ca.crt":0
Hanno Becker418a6222017-09-14 07:51:28 +0100112
113Certificate write check Server1 SHA1, RSA_ALT, ns_cert_type
Pengyu Lv2151ba52023-10-31 18:12:04 +0800114depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100115x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:0:-1:"../framework/data_files/server1.cert_type_noauthid.crt":1:0:"../framework/data_files/test-ca.crt":0
Hanno Becker418a6222017-09-14 07:51:28 +0100116
117Certificate write check Server1 SHA1, RSA_ALT, version 1
Pengyu Lv2151ba52023-10-31 18:12:04 +0800118depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100119x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:0:MBEDTLS_X509_CRT_VERSION_1:"../framework/data_files/server1.v1.crt":1:0:"../framework/data_files/test-ca.crt":0
Darren Krahne560be32020-09-21 17:40:50 -0700120
121Certificate write check Server1 SHA1, RSA_ALT, CA
Pengyu Lv2151ba52023-10-31 18:12:04 +0800122depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100123x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:0:-1:"../framework/data_files/server1.ca_noauthid.crt":1:1:"../framework/data_files/test-ca.crt":0
Ron Eldor9eeb8612019-02-12 15:03:42 +0200124
Neil Armstrong98f899c2022-03-16 17:42:42 +0100125Certificate write check Server1 SHA1, Opaque
Pengyu Lv2151ba52023-10-31 18:12:04 +0800126depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100127x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.crt":2:0:"../framework/data_files/test-ca.crt":0
Neil Armstrong98f899c2022-03-16 17:42:42 +0100128
129Certificate write check Server1 SHA1, Opaque, key_usage
Pengyu Lv2151ba52023-10-31 18:12:04 +0800130depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100131x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:1:-1:"../framework/data_files/server1.key_usage.crt":2:0:"../framework/data_files/test-ca.crt":0
Neil Armstrong98f899c2022-03-16 17:42:42 +0100132
133Certificate write check Server1 SHA1, Opaque, ns_cert_type
Pengyu Lv2151ba52023-10-31 18:12:04 +0800134depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100135x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"../framework/data_files/server1.cert_type.crt":2:0:"../framework/data_files/test-ca.crt":0
Neil Armstrong98f899c2022-03-16 17:42:42 +0100136
137Certificate write check Server1 SHA1, Opaque, version 1
Pengyu Lv2151ba52023-10-31 18:12:04 +0800138depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100139x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:MBEDTLS_X509_CRT_VERSION_1:"../framework/data_files/server1.v1.crt":2:0:"../framework/data_files/test-ca.crt":0
Neil Armstrong98f899c2022-03-16 17:42:42 +0100140
141Certificate write check Server1 SHA1, Opaque, CA
Pengyu Lv2151ba52023-10-31 18:12:04 +0800142depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100143x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.ca.crt":2:1:"../framework/data_files/test-ca.crt":0
Neil Armstrong6ce6dd92022-03-17 09:38:50 +0100144
Valerio Setti856cec42023-01-12 14:56:54 +0100145Certificate write check Server1 SHA1, Full length serial
Pengyu Lv2151ba52023-10-31 18:12:04 +0800146depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100147x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"112233445566778899aabbccddeeff0011223344":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.long_serial.crt":0:0:"../framework/data_files/test-ca.crt":0
Valerio Setti856cec42023-01-12 14:56:54 +0100148
149Certificate write check Server1 SHA1, Serial starting with 0x80
Pengyu Lv2151ba52023-10-31 18:12:04 +0800150depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100151x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"8011223344":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.80serial.crt":0:0:"../framework/data_files/test-ca.crt":0
Valerio Setti856cec42023-01-12 14:56:54 +0100152
Valerio Setti18b9b032023-01-27 11:47:57 +0100153Certificate write check Server1 SHA1, All 0xFF full length serial
Pengyu Lv2151ba52023-10-31 18:12:04 +0800154depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100155x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"ffffffffffffffffffffffffffffffff":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.long_serial_FF.crt":0:0:"../framework/data_files/test-ca.crt":0
Valerio Setti18b9b032023-01-27 11:47:57 +0100156
Neil Armstrong6ce6dd92022-03-17 09:38:50 +0100157Certificate write check Server5 ECDSA
Valerio Settidb6b4db2023-09-01 09:20:51 +0200158depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_ECP_HAVE_SECP256R1
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100159x509_crt_check:"../framework/data_files/server5.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca2.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=Polarssl Test EC CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA256:0:0:"NULL":0:0:1:-1:"../framework/data_files/server5.crt":0:0:"../framework/data_files/test-ca2.crt":0
Neil Armstrong6ce6dd92022-03-17 09:38:50 +0100160
161Certificate write check Server5 ECDSA, Opaque
Valerio Settidb6b4db2023-09-01 09:20:51 +0200162depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_USE_PSA_CRYPTO
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100163x509_crt_check:"../framework/data_files/server5.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca2.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=Polarssl Test EC CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA256:0:0:"NULL":0:0:1:-1:"":2:0:"../framework/data_files/test-ca2.crt":0
Andrzej Kurek76c96622023-04-04 06:57:08 -0400164
Andrzej Kureka1949042023-04-05 09:59:02 -0400165Certificate write check Server1 SHA1, SubjectAltNames
Pengyu Lv2151ba52023-10-31 18:12:04 +0800166depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_MD5
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100167x509_crt_check:"../framework/data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"../framework/data_files/test-ca_unenc.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.allSubjectAltNames.crt":0:0:"../framework/data_files/test-ca.crt":1
Paul Bakker8dcb2d72014-08-08 12:22:30 +0200168
169X509 String to Names #1
Gilles Peskinec94500b2023-09-21 18:01:05 +0200170mbedtls_x509_string_to_names:"C=NL,O=Offspark\\, Inc., OU=PolarSSL":"C=NL, O=Offspark\\, Inc., OU=PolarSSL":0:0
Paul Bakker8dcb2d72014-08-08 12:22:30 +0200171
172X509 String to Names #2
Gilles Peskinec94500b2023-09-21 18:01:05 +0200173mbedtls_x509_string_to_names:"C=NL, O=Offspark, Inc., OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Paul Bakker8dcb2d72014-08-08 12:22:30 +0200174
175X509 String to Names #3 (Name precisely 255 bytes)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200176mbedtls_x509_string_to_names:"C=NL, O=123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345,OU=PolarSSL":"C=NL, O=123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345, OU=PolarSSL":0:0
Paul Bakker8dcb2d72014-08-08 12:22:30 +0200177
178X509 String to Names #4 (Name larger than 255 bytes)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200179mbedtls_x509_string_to_names:"C=NL, O=1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Paul Bakker8dcb2d72014-08-08 12:22:30 +0200180
181X509 String to Names #5 (Escape non-allowed characters)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200182mbedtls_x509_string_to_names:"C=NL, O=Offspark\\a Inc., OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Paul Bakker8dcb2d72014-08-08 12:22:30 +0200183
184X509 String to Names #6 (Escape at end)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200185mbedtls_x509_string_to_names:"C=NL, O=Offspark\\":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Valerio Settiaad8dbd2023-01-09 17:20:25 +0100186
Agathiyan Bragadeesh48513b82023-07-20 16:19:05 +0100187X509 String to Names #7 (Invalid, no '=' or ',')
Gilles Peskinec94500b2023-09-21 18:01:05 +0200188mbedtls_x509_string_to_names:"ABC123":"":MBEDTLS_ERR_X509_INVALID_NAME:0
David Horstmannb50ae1f2023-06-27 15:29:46 +0100189
Agathiyan Bragadeeshcab79182023-08-14 10:59:36 +0100190X509 String to Names #8 (Escaped valid characters)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200191mbedtls_x509_string_to_names:"C=NL, O=Offspark\\+ \\> \\=, OU=PolarSSL":"C=NL, O=Offspark\\+ \\> \\=, OU=PolarSSL":0:0
Agathiyan Bragadeesh48513b82023-07-20 16:19:05 +0100192
Agathiyan Bragadeeshcab79182023-08-14 10:59:36 +0100193X509 String to Names #9 (Escaped ascii hexpairs uppercase encoded)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200194mbedtls_x509_string_to_names:"C=NL, O=\\4F\\66\\66\\73\\70\\61\\72\\6B, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0:0
Agathiyan Bragadeeshef2decb2023-07-21 15:47:47 +0100195
Agathiyan Bragadeeshcab79182023-08-14 10:59:36 +0100196X509 String to Names #10 (Escaped ascii hexpairs lowercase encoded)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200197mbedtls_x509_string_to_names:"C=NL, O=\\4f\\66\\66\\73\\70\\61\\72\\6b, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0:0
Agathiyan Bragadeesh404b4bb2023-07-24 16:56:10 +0100198
Agathiyan Bragadeeshcab79182023-08-14 10:59:36 +0100199X509 String to Names #11 (Invalid hexpair escape at end of string)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200200mbedtls_x509_string_to_names:"C=NL, O=\\4f\\66\\66\\73\\70\\61\\72\\6, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeeshef299d62023-07-26 14:53:04 +0100201
Agathiyan Bragadeeshcab79182023-08-14 10:59:36 +0100202X509 String to Names #12 (Reject escaped null hexpair)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200203mbedtls_x509_string_to_names:"C=NL, O=Of\\00spark, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeeshe59dedb2023-08-11 12:07:55 +0100204
Agathiyan Bragadeeshcab79182023-08-14 10:59:36 +0100205X509 String to Names #13 (Invalid hexpairs)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200206mbedtls_x509_string_to_names:"C=NL, O=Of\\flspark, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeeshef2decb2023-07-21 15:47:47 +0100207
Agathiyan Bragadeeshcab79182023-08-14 10:59:36 +0100208X509 String to Names #14 (Accept numercoid/hexstring)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200209mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C084F6666737061726B, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0:0
Agathiyan Bragadeeshef299d62023-07-26 14:53:04 +0100210
Gilles Peskine70a93402023-09-21 14:02:53 +0200211# TODO: Should the trailing garbage be ignored?
212X509 String to Names (hexstring: trailing garbage after DER is ignored)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200213mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C084F6666737061726Baa, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0:0
Gilles Peskine70a93402023-09-21 14:02:53 +0200214
Gilles Peskine26dd7642023-09-21 18:10:23 +0200215X509 String to Names: long hexstring (payload=256 bytes)
Gilles Peskine7f420fa2023-09-21 18:13:17 +0200216mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C82010041414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141, OU=PolarSSL":"C=NL, O=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA, OU=PolarSSL":0:MAY_FAIL_DN_GETS
Gilles Peskine26dd7642023-09-21 18:10:23 +0200217
218X509 String to Names: long hexstring (payload=257 bytes)
219mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C820101aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeeshef299d62023-07-26 14:53:04 +0100220
Agathiyan Bragadeesh01e93922023-08-14 15:29:49 +0100221X509 String to Names #15 (Odd length DER hexstring)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200222mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C084F6666737061726, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeeshafdb1872023-08-11 12:41:33 +0100223
Gilles Peskine70a93402023-09-21 14:02:53 +0200224X509 String to Names (empty DER hexstring)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200225mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeesh01e93922023-08-14 15:29:49 +0100226
Gilles Peskine70a93402023-09-21 14:02:53 +0200227X509 String to Names (empty DER hexstring at end)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200228mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Gilles Peskine70a93402023-09-21 14:02:53 +0200229
230X509 String to Names (1-byte DER hexstring)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200231mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Gilles Peskine70a93402023-09-21 14:02:53 +0200232
233X509 String to Names (1-byte DER hexstring at end)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200234mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Gilles Peskine70a93402023-09-21 14:02:53 +0200235
236X509 String to Names #16 (hexstring: DER length exceeds available data)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200237mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C0B4F6666737061726B, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeesh01e93922023-08-14 15:29:49 +0100238
Gilles Peskine70a93402023-09-21 14:02:53 +0200239X509 String to Names #17 (hexstring: Invalid OID)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200240mbedtls_x509_string_to_names:"C=NL, 10.5.4.10=#0C084F6666737061726B, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeesh957ca052023-08-11 14:58:14 +0100241
Agathiyan Bragadeesh01e93922023-08-14 15:29:49 +0100242X509 String to Names #18 (short name and hexstring)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200243mbedtls_x509_string_to_names:"C=NL, O=#0C084F6666737061726B, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0:0
Agathiyan Bragadeeshafdb1872023-08-11 12:41:33 +0100244
Gilles Peskine26dd7642023-09-21 18:10:23 +0200245X509 String to Names (null byte in hexstring with string type)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200246mbedtls_x509_string_to_names:"C=NL, O=#0C0100, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":MBEDTLS_ERR_X509_INVALID_NAME:0
Gilles Peskine70a93402023-09-21 14:02:53 +0200247
Gilles Peskine26dd7642023-09-21 18:10:23 +0200248X509 String to Names (null byte in hexstring with non-string type)
249mbedtls_x509_string_to_names:"C=NL, O=#040100, OU=PolarSSL":"C=NL, O=\\x00, OU=PolarSSL":0:MAY_FAIL_GET_NAME
Agathiyan Bragadeeshafdb1872023-08-11 12:41:33 +0100250
Agathiyan Bragadeeshea3e83f2023-08-14 15:44:47 +0100251X509 String to Names #19 (Accept non-ascii hexpairs)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200252mbedtls_x509_string_to_names:"C=NL, O=Of\\CCspark, OU=PolarSSL":"C=NL, O=Of\\CCspark, OU=PolarSSL":0:0
Agathiyan Bragadeeshafdb1872023-08-11 12:41:33 +0100253
Agathiyan Bragadeeshde84f9d2023-08-23 11:44:04 +0100254X509 String to Names #20 (Reject empty AttributeValue)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200255mbedtls_x509_string_to_names:"C=NL, O=, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME:0
Agathiyan Bragadeeshde84f9d2023-08-23 11:44:04 +0100256
Agathiyan Bragadeesh4ce9ac82023-09-04 16:18:26 +0100257X509 Round trip test (Escaped characters)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200258mbedtls_x509_string_to_names:"CN=Lu\\C4\\8Di\\C4\\87, O=Offspark, OU=PolarSSL":"CN=Lu\\C4\\8Di\\C4\\87, O=Offspark, OU=PolarSSL":0:0
Agathiyan Bragadeesh4ce9ac82023-09-04 16:18:26 +0100259
260X509 Round trip test (hexstring output for non string input)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200261mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#03084F6666737061726B, OU=PolarSSL":"C=NL, O=#03084F6666737061726B, OU=PolarSSL":0:0
Agathiyan Bragadeesh4ce9ac82023-09-04 16:18:26 +0100262
263X509 Round trip test (numercoid hexstring output for unknown OID)
Gilles Peskinec94500b2023-09-21 18:01:05 +0200264mbedtls_x509_string_to_names:"C=NL, 2.5.4.10.234.532=#0C084F6666737061726B, OU=PolarSSL":"C=NL, 2.5.4.10.234.532=#0C084F6666737061726B, OU=PolarSSL":0:0
Agathiyan Bragadeesh4ce9ac82023-09-04 16:18:26 +0100265
Valerio Settiaad8dbd2023-01-09 17:20:25 +0100266Check max serial length
Valerio Settiea19d2d2023-01-09 17:21:17 +0100267x509_set_serial_check:
Jonathan Winzig2bd2b782024-01-09 15:19:42 +0100268
Jonathan Winzig6c9779f2024-01-09 17:47:10 +0100269Check max extension length
270x509_set_extension_length_check: