Paul Bakker | 6d62050 | 2012-02-16 14:09:13 +0000 | [diff] [blame] | 1 | Certificate Request check Server1 SHA1 |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 2 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 3 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha1":MBEDTLS_MD_SHA1:0:0:0:0:0 |
Paul Bakker | 6d62050 | 2012-02-16 14:09:13 +0000 | [diff] [blame] | 4 | |
| 5 | Certificate Request check Server1 SHA224 |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 6 | depends_on:MBEDTLS_MD_CAN_SHA224:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 7 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha224":MBEDTLS_MD_SHA224:0:0:0:0:0 |
Paul Bakker | 6d62050 | 2012-02-16 14:09:13 +0000 | [diff] [blame] | 8 | |
| 9 | Certificate Request check Server1 SHA256 |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 10 | depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 11 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256":MBEDTLS_MD_SHA256:0:0:0:0:0 |
Paul Bakker | 6d62050 | 2012-02-16 14:09:13 +0000 | [diff] [blame] | 12 | |
| 13 | Certificate Request check Server1 SHA384 |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 14 | depends_on:MBEDTLS_MD_CAN_SHA384:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 15 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha384":MBEDTLS_MD_SHA384:0:0:0:0:0 |
Paul Bakker | 6d62050 | 2012-02-16 14:09:13 +0000 | [diff] [blame] | 16 | |
| 17 | Certificate Request check Server1 SHA512 |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 18 | depends_on:MBEDTLS_MD_CAN_SHA512:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 19 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha512":MBEDTLS_MD_SHA512:0:0:0:0:0 |
Paul Bakker | 6d62050 | 2012-02-16 14:09:13 +0000 | [diff] [blame] | 20 | |
Paul Bakker | 6d62050 | 2012-02-16 14:09:13 +0000 | [diff] [blame] | 21 | Certificate Request check Server1 MD5 |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 22 | depends_on:MBEDTLS_MD_CAN_MD5:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 23 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.md5":MBEDTLS_MD_MD5:0:0:0:0:0 |
Manuel Pégourié-Gonnard | c5ce83a | 2014-03-28 12:46:44 +0100 | [diff] [blame] | 24 | |
| 25 | Certificate Request check Server1 key_usage |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 26 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 27 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:0:0:0 |
Andres Amaya Garcia | 7067f81 | 2018-09-26 10:51:16 +0100 | [diff] [blame] | 28 | |
Neil Armstrong | 9fb9203 | 2022-03-16 17:16:46 +0100 | [diff] [blame] | 29 | Certificate Request check opaque Server1 key_usage |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 30 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Neil Armstrong | 9fb9203 | 2022-03-16 17:16:46 +0100 | [diff] [blame] | 31 | x509_csr_check_opaque:"data_files/server1.key":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION:0 |
| 32 | |
Andres Amaya Garcia | 7067f81 | 2018-09-26 10:51:16 +0100 | [diff] [blame] | 33 | Certificate Request check Server1 key_usage empty |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 34 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 35 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage_empty":MBEDTLS_MD_SHA1:0:1:0:0:0 |
Manuel Pégourié-Gonnard | c5ce83a | 2014-03-28 12:46:44 +0100 | [diff] [blame] | 36 | |
| 37 | Certificate Request check Server1 ns_cert_type |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 38 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 39 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:0 |
Andres Amaya Garcia | 7067f81 | 2018-09-26 10:51:16 +0100 | [diff] [blame] | 40 | |
| 41 | Certificate Request check Server1 ns_cert_type empty |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 42 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 43 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type_empty":MBEDTLS_MD_SHA1:0:0:0:1:0 |
Manuel Pégourié-Gonnard | c5ce83a | 2014-03-28 12:46:44 +0100 | [diff] [blame] | 44 | |
| 45 | Certificate Request check Server1 key_usage + ns_cert_type |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 46 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 47 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.ku-ct":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:0 |
Manuel Pégourié-Gonnard | c5ce83a | 2014-03-28 12:46:44 +0100 | [diff] [blame] | 48 | |
| 49 | Certificate Request check Server5 ECDSA, key_usage |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 50 | depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 51 | x509_csr_check:"data_files/server5.key":"data_files/server5.req.ku.sha1":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION:1:0:0:0 |
| 52 | |
| 53 | Certificate Request check Server1, set_extension |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 54 | depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15 |
Valerio Setti | 48e8fc7 | 2022-10-19 15:14:29 +0200 | [diff] [blame] | 55 | x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256.ext":MBEDTLS_MD_SHA256:0:0:0:0:1 |
Paul Bakker | 2397cf3 | 2013-09-08 15:58:15 +0200 | [diff] [blame] | 56 | |
Andrzej Kurek | 5f7bad3 | 2018-11-19 10:12:37 -0500 | [diff] [blame] | 57 | Certificate Request check opaque Server5 ECDSA, key_usage |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 58 | depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Andrzej Kurek | 5f7bad3 | 2018-11-19 10:12:37 -0500 | [diff] [blame] | 59 | x509_csr_check_opaque:"data_files/server5.key":MBEDTLS_MD_SHA256:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION:0 |
| 60 | |
Paul Bakker | 2397cf3 | 2013-09-08 15:58:15 +0200 | [diff] [blame] | 61 | Certificate write check Server1 SHA1 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 62 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 63 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.crt":0:0:"data_files/test-ca.crt":0 |
Manuel Pégourié-Gonnard | 6c1a73e | 2014-03-28 14:03:22 +0100 | [diff] [blame] | 64 | |
Werner Lewis | acd01e5 | 2022-05-10 12:23:13 +0100 | [diff] [blame] | 65 | Certificate write check Server1 SHA1, not before 1970 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 66 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 67 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"data_files/test-ca.crt":0 |
Werner Lewis | acd01e5 | 2022-05-10 12:23:13 +0100 | [diff] [blame] | 68 | |
| 69 | Certificate write check Server1 SHA1, not after 2050 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 70 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 71 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20500210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"data_files/test-ca.crt":0 |
Werner Lewis | acd01e5 | 2022-05-10 12:23:13 +0100 | [diff] [blame] | 72 | |
| 73 | Certificate write check Server1 SHA1, not before 1970, not after 2050 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 74 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 75 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20500210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"data_files/test-ca.crt":0 |
Werner Lewis | acd01e5 | 2022-05-10 12:23:13 +0100 | [diff] [blame] | 76 | |
| 77 | Certificate write check Server1 SHA1, not before 2050, not after 2059 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 78 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 79 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20500210144406":"20590210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"":0:0:"data_files/test-ca.crt":0 |
Werner Lewis | acd01e5 | 2022-05-10 12:23:13 +0100 | [diff] [blame] | 80 | |
Manuel Pégourié-Gonnard | 6c1a73e | 2014-03-28 14:03:22 +0100 | [diff] [blame] | 81 | Certificate write check Server1 SHA1, key_usage |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 82 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 83 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:1:-1:"data_files/server1.key_usage.crt":0:0:"data_files/test-ca.crt":0 |
Nicholas Wilson | ca841d3 | 2015-11-13 14:22:36 +0000 | [diff] [blame] | 84 | |
| 85 | Certificate write check Server1 SHA1, one ext_key_usage |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 86 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 87 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406":MBEDTLS_MD_SHA1:0:0:"serverAuth":0:0:1:-1:"data_files/server1.key_ext_usage.crt":0:0:"data_files/test-ca.crt":0 |
Nicholas Wilson | ca841d3 | 2015-11-13 14:22:36 +0000 | [diff] [blame] | 88 | |
| 89 | Certificate write check Server1 SHA1, two ext_key_usages |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 90 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 91 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406":MBEDTLS_MD_SHA1:0:0:"codeSigning,timeStamping":0:0:1:-1:"data_files/server1.key_ext_usages.crt":0:0:"data_files/test-ca.crt":0 |
Manuel Pégourié-Gonnard | 6c1a73e | 2014-03-28 14:03:22 +0100 | [diff] [blame] | 92 | |
| 93 | Certificate write check Server1 SHA1, ns_cert_type |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 94 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 95 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"data_files/server1.cert_type.crt":0:0:"data_files/test-ca.crt":0 |
Manuel Pégourié-Gonnard | 6c1a73e | 2014-03-28 14:03:22 +0100 | [diff] [blame] | 96 | |
| 97 | Certificate write check Server1 SHA1, version 1 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 98 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 99 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt":0:0:"data_files/test-ca.crt":0 |
Darren Krahn | e560be3 | 2020-09-21 17:40:50 -0700 | [diff] [blame] | 100 | |
| 101 | Certificate write check Server1 SHA1, CA |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 102 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 103 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.ca.crt":0:1:"data_files/test-ca.crt":0 |
Hanno Becker | 418a622 | 2017-09-14 07:51:28 +0100 | [diff] [blame] | 104 | |
| 105 | Certificate write check Server1 SHA1, RSA_ALT |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 106 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 107 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:0:-1:"data_files/server1.noauthid.crt":1:0:"data_files/test-ca.crt":0 |
Hanno Becker | 418a622 | 2017-09-14 07:51:28 +0100 | [diff] [blame] | 108 | |
| 109 | Certificate write check Server1 SHA1, RSA_ALT, key_usage |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 110 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 111 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:0:-1:"data_files/server1.key_usage_noauthid.crt":1:0:"data_files/test-ca.crt":0 |
Hanno Becker | 418a622 | 2017-09-14 07:51:28 +0100 | [diff] [blame] | 112 | |
| 113 | Certificate write check Server1 SHA1, RSA_ALT, ns_cert_type |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 114 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 115 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:0:-1:"data_files/server1.cert_type_noauthid.crt":1:0:"data_files/test-ca.crt":0 |
Hanno Becker | 418a622 | 2017-09-14 07:51:28 +0100 | [diff] [blame] | 116 | |
| 117 | Certificate write check Server1 SHA1, RSA_ALT, version 1 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 118 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 119 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:0:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt":1:0:"data_files/test-ca.crt":0 |
Darren Krahn | e560be3 | 2020-09-21 17:40:50 -0700 | [diff] [blame] | 120 | |
| 121 | Certificate write check Server1 SHA1, RSA_ALT, CA |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 122 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 123 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:0:-1:"data_files/server1.ca_noauthid.crt":1:1:"data_files/test-ca.crt":0 |
Ron Eldor | 9eeb861 | 2019-02-12 15:03:42 +0200 | [diff] [blame] | 124 | |
Neil Armstrong | 98f899c | 2022-03-16 17:42:42 +0100 | [diff] [blame] | 125 | Certificate write check Server1 SHA1, Opaque |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 126 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 127 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.crt":2:0:"data_files/test-ca.crt":0 |
Neil Armstrong | 98f899c | 2022-03-16 17:42:42 +0100 | [diff] [blame] | 128 | |
| 129 | Certificate write check Server1 SHA1, Opaque, key_usage |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 130 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 131 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_NON_REPUDIATION | MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:1:-1:"data_files/server1.key_usage.crt":2:0:"data_files/test-ca.crt":0 |
Neil Armstrong | 98f899c | 2022-03-16 17:42:42 +0100 | [diff] [blame] | 132 | |
| 133 | Certificate write check Server1 SHA1, Opaque, ns_cert_type |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 134 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 135 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"data_files/server1.cert_type.crt":2:0:"data_files/test-ca.crt":0 |
Neil Armstrong | 98f899c | 2022-03-16 17:42:42 +0100 | [diff] [blame] | 136 | |
| 137 | Certificate write check Server1 SHA1, Opaque, version 1 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 138 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 139 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt":2:0:"data_files/test-ca.crt":0 |
Neil Armstrong | 98f899c | 2022-03-16 17:42:42 +0100 | [diff] [blame] | 140 | |
| 141 | Certificate write check Server1 SHA1, Opaque, CA |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 142 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5:MBEDTLS_USE_PSA_CRYPTO |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 143 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.ca.crt":2:1:"data_files/test-ca.crt":0 |
Neil Armstrong | 6ce6dd9 | 2022-03-17 09:38:50 +0100 | [diff] [blame] | 144 | |
Valerio Setti | 856cec4 | 2023-01-12 14:56:54 +0100 | [diff] [blame] | 145 | Certificate write check Server1 SHA1, Full length serial |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 146 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 147 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"112233445566778899aabbccddeeff0011223344":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.long_serial.crt":0:0:"data_files/test-ca.crt":0 |
Valerio Setti | 856cec4 | 2023-01-12 14:56:54 +0100 | [diff] [blame] | 148 | |
| 149 | Certificate write check Server1 SHA1, Serial starting with 0x80 |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 150 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 151 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"8011223344":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.80serial.crt":0:0:"data_files/test-ca.crt":0 |
Valerio Setti | 856cec4 | 2023-01-12 14:56:54 +0100 | [diff] [blame] | 152 | |
Valerio Setti | 18b9b03 | 2023-01-27 11:47:57 +0100 | [diff] [blame] | 153 | Certificate write check Server1 SHA1, All 0xFF full length serial |
Mukesh Bharsakle | 1a4cc5e | 2023-04-08 15:38:30 +0100 | [diff] [blame] | 154 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5 |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 155 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"ffffffffffffffffffffffffffffffff":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.long_serial_FF.crt":0:0:"data_files/test-ca.crt":0 |
Valerio Setti | 18b9b03 | 2023-01-27 11:47:57 +0100 | [diff] [blame] | 156 | |
Neil Armstrong | 6ce6dd9 | 2022-03-17 09:38:50 +0100 | [diff] [blame] | 157 | Certificate write check Server5 ECDSA |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 158 | depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 159 | x509_crt_check:"data_files/server5.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca2.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=Polarssl Test EC CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA256:0:0:"NULL":0:0:1:-1:"data_files/server5.crt":0:0:"data_files/test-ca2.crt":0 |
Neil Armstrong | 6ce6dd9 | 2022-03-17 09:38:50 +0100 | [diff] [blame] | 160 | |
| 161 | Certificate write check Server5 ECDSA, Opaque |
Manuel Pégourié-Gonnard | a946489 | 2023-03-17 12:08:50 +0100 | [diff] [blame] | 162 | depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_USE_PSA_CRYPTO |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 163 | x509_crt_check:"data_files/server5.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca2.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=Polarssl Test EC CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA256:0:0:"NULL":0:0:1:-1:"":2:0:"data_files/test-ca2.crt":0 |
| 164 | |
Andrzej Kurek | a194904 | 2023-04-05 09:59:02 -0400 | [diff] [blame] | 165 | Certificate write check Server1 SHA1, SubjectAltNames |
Andrzej Kurek | 51cef9c | 2023-05-22 15:20:21 -0400 | [diff] [blame] | 166 | depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_DES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_MD_CAN_MD5:MBEDTLS_AES_C |
Andrzej Kurek | 76c9662 | 2023-04-04 06:57:08 -0400 | [diff] [blame] | 167 | x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"data_files/server1.allSubjectAltNames.crt":0:0:"data_files/test-ca.crt":1 |
Paul Bakker | 8dcb2d7 | 2014-08-08 12:22:30 +0200 | [diff] [blame] | 168 | |
| 169 | X509 String to Names #1 |
Gilles Peskine | 1a24895 | 2022-12-03 23:48:25 +0100 | [diff] [blame] | 170 | mbedtls_x509_string_to_names:"C=NL,O=Offspark\\, Inc., OU=PolarSSL":"C=NL, O=Offspark\\, Inc., OU=PolarSSL":0 |
Paul Bakker | 8dcb2d7 | 2014-08-08 12:22:30 +0200 | [diff] [blame] | 171 | |
| 172 | X509 String to Names #2 |
Agathiyan Bragadeesh | afdb187 | 2023-08-11 12:41:33 +0100 | [diff] [blame] | 173 | mbedtls_x509_string_to_names:"C=NL, O=Offspark, Inc., OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
Paul Bakker | 8dcb2d7 | 2014-08-08 12:22:30 +0200 | [diff] [blame] | 174 | |
| 175 | X509 String to Names #3 (Name precisely 255 bytes) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 176 | mbedtls_x509_string_to_names:"C=NL, O=123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345,OU=PolarSSL":"C=NL, O=123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345, OU=PolarSSL":0 |
Paul Bakker | 8dcb2d7 | 2014-08-08 12:22:30 +0200 | [diff] [blame] | 177 | |
| 178 | X509 String to Names #4 (Name larger than 255 bytes) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 179 | mbedtls_x509_string_to_names:"C=NL, O=1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
Paul Bakker | 8dcb2d7 | 2014-08-08 12:22:30 +0200 | [diff] [blame] | 180 | |
| 181 | X509 String to Names #5 (Escape non-allowed characters) |
Gilles Peskine | 1a24895 | 2022-12-03 23:48:25 +0100 | [diff] [blame] | 182 | mbedtls_x509_string_to_names:"C=NL, O=Offspark\\a Inc., OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
Paul Bakker | 8dcb2d7 | 2014-08-08 12:22:30 +0200 | [diff] [blame] | 183 | |
| 184 | X509 String to Names #6 (Escape at end) |
Gilles Peskine | 1a24895 | 2022-12-03 23:48:25 +0100 | [diff] [blame] | 185 | mbedtls_x509_string_to_names:"C=NL, O=Offspark\\":"":MBEDTLS_ERR_X509_INVALID_NAME |
Valerio Setti | aad8dbd | 2023-01-09 17:20:25 +0100 | [diff] [blame] | 186 | |
Agathiyan Bragadeesh | 48513b8 | 2023-07-20 16:19:05 +0100 | [diff] [blame] | 187 | X509 String to Names #7 (Invalid, no '=' or ',') |
David Horstmann | b50ae1f | 2023-06-27 15:29:46 +0100 | [diff] [blame] | 188 | mbedtls_x509_string_to_names:"ABC123":"":MBEDTLS_ERR_X509_INVALID_NAME |
| 189 | |
Agathiyan Bragadeesh | cab7918 | 2023-08-14 10:59:36 +0100 | [diff] [blame] | 190 | X509 String to Names #8 (Escaped valid characters) |
Agathiyan Bragadeesh | 48513b8 | 2023-07-20 16:19:05 +0100 | [diff] [blame] | 191 | mbedtls_x509_string_to_names:"C=NL, O=Offspark\\+ \\> \\=, OU=PolarSSL":"C=NL, O=Offspark\\+ \\> \\=, OU=PolarSSL":0 |
| 192 | |
Agathiyan Bragadeesh | cab7918 | 2023-08-14 10:59:36 +0100 | [diff] [blame] | 193 | X509 String to Names #9 (Escaped ascii hexpairs uppercase encoded) |
Agathiyan Bragadeesh | 404b4bb | 2023-07-24 16:56:10 +0100 | [diff] [blame] | 194 | mbedtls_x509_string_to_names:"C=NL, O=\\4F\\66\\66\\73\\70\\61\\72\\6B, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0 |
Agathiyan Bragadeesh | ef2decb | 2023-07-21 15:47:47 +0100 | [diff] [blame] | 195 | |
Agathiyan Bragadeesh | cab7918 | 2023-08-14 10:59:36 +0100 | [diff] [blame] | 196 | X509 String to Names #10 (Escaped ascii hexpairs lowercase encoded) |
Agathiyan Bragadeesh | 404b4bb | 2023-07-24 16:56:10 +0100 | [diff] [blame] | 197 | mbedtls_x509_string_to_names:"C=NL, O=\\4f\\66\\66\\73\\70\\61\\72\\6b, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0 |
| 198 | |
Agathiyan Bragadeesh | cab7918 | 2023-08-14 10:59:36 +0100 | [diff] [blame] | 199 | X509 String to Names #11 (Invalid hexpair escape at end of string) |
Agathiyan Bragadeesh | ef299d6 | 2023-07-26 14:53:04 +0100 | [diff] [blame] | 200 | mbedtls_x509_string_to_names:"C=NL, O=\\4f\\66\\66\\73\\70\\61\\72\\6, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
| 201 | |
Agathiyan Bragadeesh | cab7918 | 2023-08-14 10:59:36 +0100 | [diff] [blame] | 202 | X509 String to Names #12 (Reject escaped null hexpair) |
Agathiyan Bragadeesh | e59dedb | 2023-08-11 12:07:55 +0100 | [diff] [blame] | 203 | mbedtls_x509_string_to_names:"C=NL, O=Of\\00spark, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
| 204 | |
Agathiyan Bragadeesh | cab7918 | 2023-08-14 10:59:36 +0100 | [diff] [blame] | 205 | X509 String to Names #13 (Invalid hexpairs) |
Agathiyan Bragadeesh | ef2decb | 2023-07-21 15:47:47 +0100 | [diff] [blame] | 206 | mbedtls_x509_string_to_names:"C=NL, O=Of\\flspark, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
| 207 | |
Agathiyan Bragadeesh | cab7918 | 2023-08-14 10:59:36 +0100 | [diff] [blame] | 208 | X509 String to Names #14 (Accept numercoid/hexstring) |
Agathiyan Bragadeesh | ef299d6 | 2023-07-26 14:53:04 +0100 | [diff] [blame] | 209 | mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C084F6666737061726B, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0 |
| 210 | |
Agathiyan Bragadeesh | 01e9392 | 2023-08-14 15:29:49 +0100 | [diff] [blame] | 211 | X509 String to Names #15 (Odd length DER hexstring) |
Agathiyan Bragadeesh | afdb187 | 2023-08-11 12:41:33 +0100 | [diff] [blame] | 212 | mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C084F6666737061726, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
| 213 | |
Agathiyan Bragadeesh | 01e9392 | 2023-08-14 15:29:49 +0100 | [diff] [blame] | 214 | X509 String to Names #16 (Length mismatch DER hexstring) |
| 215 | mbedtls_x509_string_to_names:"C=NL, 2.5.4.10=#0C0B4F6666737061726B, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
| 216 | |
| 217 | X509 String to Names #17 (Invalid OID) |
Agathiyan Bragadeesh | 957ca05 | 2023-08-11 14:58:14 +0100 | [diff] [blame] | 218 | mbedtls_x509_string_to_names:"C=NL, 10.5.4.10=#0C084F6666737061726B, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
| 219 | |
Agathiyan Bragadeesh | 01e9392 | 2023-08-14 15:29:49 +0100 | [diff] [blame] | 220 | X509 String to Names #18 (short name and hexstring) |
Agathiyan Bragadeesh | 957ca05 | 2023-08-11 14:58:14 +0100 | [diff] [blame] | 221 | mbedtls_x509_string_to_names:"C=NL, O=#0C084F6666737061726B, OU=PolarSSL":"C=NL, O=Offspark, OU=PolarSSL":0 |
Agathiyan Bragadeesh | afdb187 | 2023-08-11 12:41:33 +0100 | [diff] [blame] | 222 | |
Agathiyan Bragadeesh | ea3e83f | 2023-08-14 15:44:47 +0100 | [diff] [blame] | 223 | X509 String to Names #19 (Accept non-ascii hexpairs) |
| 224 | mbedtls_x509_string_to_names:"C=NL, O=Of\\CCspark, OU=PolarSSL":"C=NL, O=Of\\CCspark, OU=PolarSSL":0 |
Agathiyan Bragadeesh | afdb187 | 2023-08-11 12:41:33 +0100 | [diff] [blame] | 225 | |
Agathiyan Bragadeesh | de84f9d | 2023-08-23 11:44:04 +0100 | [diff] [blame] | 226 | X509 String to Names #20 (Reject empty AttributeValue) |
Agathiyan Bragadeesh | 733766b | 2023-08-23 15:43:07 +0100 | [diff] [blame^] | 227 | mbedtls_x509_string_to_names:"C=NL, O=, OU=PolarSSL":"":MBEDTLS_ERR_X509_INVALID_NAME |
Agathiyan Bragadeesh | de84f9d | 2023-08-23 11:44:04 +0100 | [diff] [blame] | 228 | |
Valerio Setti | aad8dbd | 2023-01-09 17:20:25 +0100 | [diff] [blame] | 229 | Check max serial length |
Valerio Setti | ea19d2d | 2023-01-09 17:21:17 +0100 | [diff] [blame] | 230 | x509_set_serial_check: |