Finish parsing RSASSA-PSS parameters
This commit is contained in:
parent
d9fd87be33
commit
3c1e8b539c
10 changed files with 199 additions and 19 deletions
|
@ -93,9 +93,13 @@
|
||||||
/** Returns the size of the binary string, without the trailing \\0 */
|
/** Returns the size of the binary string, without the trailing \\0 */
|
||||||
#define OID_SIZE(x) (sizeof(x) - 1)
|
#define OID_SIZE(x) (sizeof(x) - 1)
|
||||||
|
|
||||||
/** Compares two asn1_buf structures for the same OID. Only works for
|
/**
|
||||||
* 'defined' oid_str values (OID_HMAC_SHA1), you cannot use a 'unsigned
|
* Compares an asn1_buf structure to a reference OID.
|
||||||
* char *oid' here!
|
*
|
||||||
|
* Only works for 'defined' oid_str values (OID_HMAC_SHA1), you cannot use a
|
||||||
|
* 'unsigned char *oid' here!
|
||||||
|
*
|
||||||
|
* Warning: returns true when the OIDs are equal (unlike memcmp)!
|
||||||
*/
|
*/
|
||||||
#define OID_CMP(oid_str, oid_buf) \
|
#define OID_CMP(oid_str, oid_buf) \
|
||||||
( ( OID_SIZE(oid_str) == (oid_buf)->len ) && \
|
( ( OID_SIZE(oid_str) == (oid_buf)->len ) && \
|
||||||
|
|
|
@ -195,6 +195,7 @@
|
||||||
|
|
||||||
/* RFC 4055 */
|
/* RFC 4055 */
|
||||||
#define OID_RSASSA_PSS OID_PKCS1 "\x0a" /**< id-RSASSA-PSS ::= { pkcs-1 10 } */
|
#define OID_RSASSA_PSS OID_PKCS1 "\x0a" /**< id-RSASSA-PSS ::= { pkcs-1 10 } */
|
||||||
|
#define OID_MGF1 OID_PKCS1 "\x08" /**< id-mgf1 ::= { pkcs-1 8 } */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Digest algorithms
|
* Digest algorithms
|
||||||
|
|
|
@ -256,7 +256,8 @@ int x509_get_alg_null( unsigned char **p, const unsigned char *end,
|
||||||
x509_buf *alg );
|
x509_buf *alg );
|
||||||
int x509_get_alg( unsigned char **p, const unsigned char *end,
|
int x509_get_alg( unsigned char **p, const unsigned char *end,
|
||||||
x509_buf *alg, x509_buf *params );
|
x509_buf *alg, x509_buf *params );
|
||||||
int x509_get_rsassa_pss_params( const x509_buf *params, md_type_t *md_alg,
|
int x509_get_rsassa_pss_params( const x509_buf *params,
|
||||||
|
md_type_t *md_alg, md_type_t *mgf_md,
|
||||||
int *salt_len, int *trailer_field );
|
int *salt_len, int *trailer_field );
|
||||||
int x509_get_sig( unsigned char **p, const unsigned char *end, x509_buf *sig );
|
int x509_get_sig( unsigned char **p, const unsigned char *end, x509_buf *sig );
|
||||||
int x509_get_sig_alg( const x509_buf *sig_oid, md_type_t *md_alg,
|
int x509_get_sig_alg( const x509_buf *sig_oid, md_type_t *md_alg,
|
||||||
|
|
|
@ -132,6 +132,62 @@ int x509_get_alg( unsigned char **p, const unsigned char *end,
|
||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* HashAlgorithm ::= AlgorithmIdentifier
|
||||||
|
*
|
||||||
|
* AlgorithmIdentifier ::= SEQUENCE {
|
||||||
|
* algorithm OBJECT IDENTIFIER,
|
||||||
|
* parameters ANY DEFINED BY algorithm OPTIONAL }
|
||||||
|
*
|
||||||
|
* For HashAlgorithm, parameters MUST be NULL or absent.
|
||||||
|
*/
|
||||||
|
static int x509_get_hash_alg( const x509_buf *alg, md_type_t *md_alg )
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
unsigned char *p;
|
||||||
|
const unsigned char *end;
|
||||||
|
x509_buf md_oid;
|
||||||
|
size_t len;
|
||||||
|
|
||||||
|
/* Make sure we got a SEQUENCE and setup bounds */
|
||||||
|
if( alg->tag != ( ASN1_CONSTRUCTED | ASN1_SEQUENCE ) )
|
||||||
|
return( POLARSSL_ERR_X509_INVALID_ALG +
|
||||||
|
POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
|
||||||
|
|
||||||
|
p = (unsigned char *) alg->p;
|
||||||
|
end = p + alg->len;
|
||||||
|
|
||||||
|
if( p >= end )
|
||||||
|
return( POLARSSL_ERR_X509_INVALID_ALG +
|
||||||
|
POLARSSL_ERR_ASN1_OUT_OF_DATA );
|
||||||
|
|
||||||
|
/* Parse md_oid */
|
||||||
|
md_oid.tag = *p;
|
||||||
|
|
||||||
|
if( ( ret = asn1_get_tag( &p, end, &md_oid.len, ASN1_OID ) ) != 0 )
|
||||||
|
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
||||||
|
|
||||||
|
md_oid.p = p;
|
||||||
|
p += md_oid.len;
|
||||||
|
|
||||||
|
/* Get md_alg from md_oid */
|
||||||
|
if( ( ret = oid_get_md_alg( &md_oid, md_alg ) ) != 0 )
|
||||||
|
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
||||||
|
|
||||||
|
/* Make sure params is absent of NULL */
|
||||||
|
if( p == end )
|
||||||
|
return( 0 );
|
||||||
|
|
||||||
|
if( ( ret = asn1_get_tag( &p, end, &len, ASN1_NULL ) ) != 0 )
|
||||||
|
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
||||||
|
|
||||||
|
if( p != end )
|
||||||
|
return( POLARSSL_ERR_X509_INVALID_ALG +
|
||||||
|
POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
|
||||||
|
|
||||||
|
return( 0 );
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* RSASSA-PSS-params ::= SEQUENCE {
|
* RSASSA-PSS-params ::= SEQUENCE {
|
||||||
* hashAlgorithm [0] HashAlgorithm DEFAULT sha1Identifier,
|
* hashAlgorithm [0] HashAlgorithm DEFAULT sha1Identifier,
|
||||||
|
@ -141,18 +197,18 @@ int x509_get_alg( unsigned char **p, const unsigned char *end,
|
||||||
* -- Note that the tags in this Sequence are explicit.
|
* -- Note that the tags in this Sequence are explicit.
|
||||||
*/
|
*/
|
||||||
int x509_get_rsassa_pss_params( const x509_buf *params,
|
int x509_get_rsassa_pss_params( const x509_buf *params,
|
||||||
md_type_t *md_alg,
|
md_type_t *md_alg, md_type_t *mgf_md,
|
||||||
int *salt_len,
|
int *salt_len, int *trailer_field )
|
||||||
int *trailer_field )
|
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
const unsigned char *end;
|
const unsigned char *end;
|
||||||
size_t len;
|
size_t len;
|
||||||
x509_buf alg_id;
|
x509_buf alg_id, alg_params;
|
||||||
|
|
||||||
/* First set everything to defaults */
|
/* First set everything to defaults */
|
||||||
*md_alg = POLARSSL_MD_SHA1;
|
*md_alg = POLARSSL_MD_SHA1;
|
||||||
|
*mgf_md = POLARSSL_MD_SHA1;
|
||||||
*salt_len = 20;
|
*salt_len = 20;
|
||||||
*trailer_field = 1;
|
*trailer_field = 1;
|
||||||
|
|
||||||
|
@ -170,8 +226,12 @@ int x509_get_rsassa_pss_params( const x509_buf *params,
|
||||||
if( ( ret = asn1_get_tag( &p, end, &len,
|
if( ( ret = asn1_get_tag( &p, end, &len,
|
||||||
ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 0 ) ) == 0 )
|
ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 0 ) ) == 0 )
|
||||||
{
|
{
|
||||||
/* HashAlgorithm ::= AlgorithmIdentifier (without parameters) */
|
/* HashAlgorithm ::= AlgorithmIdentifier (without parameters) */
|
||||||
// TODO: WIP
|
if( ( ret = x509_get_alg_null( &p, p + len, &alg_id ) ) != 0 )
|
||||||
|
return( ret );
|
||||||
|
|
||||||
|
if( ( ret = oid_get_md_alg( &alg_id, md_alg ) ) != 0 )
|
||||||
|
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
||||||
}
|
}
|
||||||
else if( ret != POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
|
else if( ret != POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
|
||||||
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
||||||
|
@ -179,8 +239,18 @@ int x509_get_rsassa_pss_params( const x509_buf *params,
|
||||||
if( ( ret = asn1_get_tag( &p, end, &len,
|
if( ( ret = asn1_get_tag( &p, end, &len,
|
||||||
ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 1 ) ) == 0 )
|
ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 1 ) ) == 0 )
|
||||||
{
|
{
|
||||||
/* MaskGenAlgorithm ::= AlgorithmIdentifier */
|
/* MaskGenAlgorithm ::= AlgorithmIdentifier (params = HashAlgorithm) */
|
||||||
// TODO: WIP
|
if( ( ret = x509_get_alg( &p, p + len, &alg_id, &alg_params ) ) != 0 )
|
||||||
|
return( ret );
|
||||||
|
|
||||||
|
/* Only MFG1 is recognised for now */
|
||||||
|
if( ! OID_CMP( OID_MGF1, &alg_id ) )
|
||||||
|
return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE +
|
||||||
|
POLARSSL_ERR_OID_NOT_FOUND );
|
||||||
|
|
||||||
|
/* Parse HashAlgorithm */
|
||||||
|
if( ( ret = x509_get_hash_alg( &alg_params, mgf_md ) ) != 0 )
|
||||||
|
return( ret );
|
||||||
}
|
}
|
||||||
else if( ret != POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
|
else if( ret != POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
|
||||||
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
return( POLARSSL_ERR_X509_INVALID_ALG + ret );
|
||||||
|
|
|
@ -620,9 +620,12 @@ static int x509_crt_parse_der_core( x509_crt *crt, const unsigned char *buf,
|
||||||
if( crt->sig_pk == POLARSSL_PK_RSASSA_PSS )
|
if( crt->sig_pk == POLARSSL_PK_RSASSA_PSS )
|
||||||
{
|
{
|
||||||
int salt_len, trailer_field;
|
int salt_len, trailer_field;
|
||||||
|
md_type_t mgf_md;
|
||||||
|
|
||||||
if( ( ret = x509_get_rsassa_pss_params( &crt->sig_params,
|
/* Make sure params are valid */
|
||||||
&crt->sig_md, &salt_len, &trailer_field ) ) != 0 )
|
ret = x509_get_rsassa_pss_params( &crt->sig_params,
|
||||||
|
&crt->sig_md, &mgf_md, &salt_len, &trailer_field );
|
||||||
|
if( ret != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
|
@ -1184,15 +1187,20 @@ int x509_crt_info( char *buf, size_t size, const char *prefix,
|
||||||
|
|
||||||
if( crt->sig_pk == POLARSSL_PK_RSASSA_PSS )
|
if( crt->sig_pk == POLARSSL_PK_RSASSA_PSS )
|
||||||
{
|
{
|
||||||
md_type_t md_alg;
|
md_type_t md_alg, mgf_md;
|
||||||
|
const md_info_t *md_info, *mgf_md_info;
|
||||||
int salt_len, trailer_field;
|
int salt_len, trailer_field;
|
||||||
|
|
||||||
if( ( ret = x509_get_rsassa_pss_params( &crt->sig_params,
|
if( ( ret = x509_get_rsassa_pss_params( &crt->sig_params,
|
||||||
&md_alg, &salt_len, &trailer_field ) ) != 0 )
|
&md_alg, &mgf_md, &salt_len, &trailer_field ) ) != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
|
|
||||||
// TODO: SHA1 harcoded twice (WIP)
|
md_info = md_info_from_type( md_alg );
|
||||||
ret = snprintf( p, n, " (SHA1, MGF1-SHA1, %d, %d)",
|
mgf_md_info = md_info_from_type( mgf_md );
|
||||||
|
|
||||||
|
ret = snprintf( p, n, " (%s, MGF1-%s, 0x%02X, %d)",
|
||||||
|
md_info ? md_info->name : "???",
|
||||||
|
mgf_md_info ? mgf_md_info->name : "???",
|
||||||
salt_len, trailer_field );
|
salt_len, trailer_field );
|
||||||
SAFE_SNPRINTF();
|
SAFE_SNPRINTF();
|
||||||
}
|
}
|
||||||
|
|
20
tests/data_files/server9-sha224.crt
Normal file
20
tests/data_files/server9-sha224.crt
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDWzCCAhKgAwIBAgIBFzA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCBKEa
|
||||||
|
MBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgSiBAICAOIwOzELMAkGA1UEBhMCTkwx
|
||||||
|
ETAPBgNVBAoTCFBvbGFyU1NMMRkwFwYDVQQDExBQb2xhclNTTCBUZXN0IENBMB4X
|
||||||
|
DTE0MDEyMDEzNTczNloXDTI0MDExODEzNTczNlowNDELMAkGA1UEBhMCTkwxETAP
|
||||||
|
BgNVBAoTCFBvbGFyU1NMMRIwEAYDVQQDEwlsb2NhbGhvc3QwgZ8wDQYJKoZIhvcN
|
||||||
|
AQEBBQADgY0AMIGJAoGBAN0Rip+ZurBoyirqO2ptWZftTslU5A3uzqB9oB6q6A7C
|
||||||
|
uxNA24oSjokTJKXF9frY9ZDXyMrLxf6THa/aEiNzUnlGGrqgVyt2FjGzqK/nOJsI
|
||||||
|
i2OZOgol7kXSGFi6uZMa7dRYmmMbN/z3FAifhWVJ81kybdHg6G3eUu1mtKkL2kCV
|
||||||
|
AgMBAAGjgZIwgY8wCQYDVR0TBAIwADAdBgNVHQ4EFgQU7vPH9R8VpU1HicHTImOy
|
||||||
|
36fOvVEwYwYDVR0jBFwwWoAUtFrkpbPe0lL2udWmlQ/rPrzH/f+hP6Q9MDsxCzAJ
|
||||||
|
BgNVBAYTAk5MMREwDwYDVQQKEwhQb2xhclNTTDEZMBcGA1UEAxMQUG9sYXJTU0wg
|
||||||
|
VGVzdCBDQYIBADA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCBKEaMBgGCSqG
|
||||||
|
SIb3DQEBCDALBglghkgBZQMEAgSiBAICAOIDggEBADJExjfWWvL28lgj+GGgviqo
|
||||||
|
PHZLxI0pLQUnFJQ9Kpu6jxfICseBF00Z6BJE/RcYDpIie5GDt/8u/i6xB6Li29Pm
|
||||||
|
g5nANgd/Y3fFnW7d0ydVjiSnetlPuf/jTlWQl6mQTH2xqYu8J8d3JRxQdRiDYbVm
|
||||||
|
uywW2d6rksiqm6dPD5l4A5DcemcYo8f/1Ifj5WNDCV8/OHex+AnW2ccDvWAnVgSR
|
||||||
|
B2VpOXJzVFuBsuf4tGVm/2TUMSB6NcvFc6TeJk1kzbZxii4QjKXtH1SfrVP59iEe
|
||||||
|
l17NYAEWARjBpQWBiutRG+QM2et0sNiUBuWxTkvd0eSgencNysVAOsZqrqaX3CY=
|
||||||
|
-----END CERTIFICATE-----
|
20
tests/data_files/server9-sha256.crt
Normal file
20
tests/data_files/server9-sha256.crt
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDWzCCAhKgAwIBAgIBGDA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCAaEa
|
||||||
|
MBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgGiBAICAN4wOzELMAkGA1UEBhMCTkwx
|
||||||
|
ETAPBgNVBAoTCFBvbGFyU1NMMRkwFwYDVQQDExBQb2xhclNTTCBUZXN0IENBMB4X
|
||||||
|
DTE0MDEyMDEzNTc0NVoXDTI0MDExODEzNTc0NVowNDELMAkGA1UEBhMCTkwxETAP
|
||||||
|
BgNVBAoTCFBvbGFyU1NMMRIwEAYDVQQDEwlsb2NhbGhvc3QwgZ8wDQYJKoZIhvcN
|
||||||
|
AQEBBQADgY0AMIGJAoGBAN0Rip+ZurBoyirqO2ptWZftTslU5A3uzqB9oB6q6A7C
|
||||||
|
uxNA24oSjokTJKXF9frY9ZDXyMrLxf6THa/aEiNzUnlGGrqgVyt2FjGzqK/nOJsI
|
||||||
|
i2OZOgol7kXSGFi6uZMa7dRYmmMbN/z3FAifhWVJ81kybdHg6G3eUu1mtKkL2kCV
|
||||||
|
AgMBAAGjgZIwgY8wCQYDVR0TBAIwADAdBgNVHQ4EFgQU7vPH9R8VpU1HicHTImOy
|
||||||
|
36fOvVEwYwYDVR0jBFwwWoAUtFrkpbPe0lL2udWmlQ/rPrzH/f+hP6Q9MDsxCzAJ
|
||||||
|
BgNVBAYTAk5MMREwDwYDVQQKEwhQb2xhclNTTDEZMBcGA1UEAxMQUG9sYXJTU0wg
|
||||||
|
VGVzdCBDQYIBADA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCAaEaMBgGCSqG
|
||||||
|
SIb3DQEBCDALBglghkgBZQMEAgGiBAICAN4DggEBAH0+knqkcLaxeDkenBQgd4Qg
|
||||||
|
3ZyAhtpiLU689mw+3cXB/uzFrCIxEL5aGh1eSj+DszB+FtsZ06ux7JVQqVOA2Wm9
|
||||||
|
yLxC6wF8OOYj0nBa91BWLhRAHLhmIdWsVk7Hl9KojZd4TwV2N+ZEV/BLxyoRvK4H
|
||||||
|
V4xCpzgDSiTPe8Etk4r+0akbr6bsOUBayPb7MGLHubZKq8NsFAmmynp+fPmHd3SE
|
||||||
|
0ooJdiZ1MmKPKLE5Og/hXCI8qeiXQUR6oQ7b2XONsrI2HIj2SA9dA5qmHwE5PbMu
|
||||||
|
zqxQ3R83boqLXbkFORn+UiYLmffqdoWuNy00BHMCrxRA9DUv+WyN4npLMF8rOJw=
|
||||||
|
-----END CERTIFICATE-----
|
20
tests/data_files/server9-sha384.crt
Normal file
20
tests/data_files/server9-sha384.crt
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDWzCCAhKgAwIBAgIBGTA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCAqEa
|
||||||
|
MBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgKiBAICAM4wOzELMAkGA1UEBhMCTkwx
|
||||||
|
ETAPBgNVBAoTCFBvbGFyU1NMMRkwFwYDVQQDExBQb2xhclNTTCBUZXN0IENBMB4X
|
||||||
|
DTE0MDEyMDEzNTc1OFoXDTI0MDExODEzNTc1OFowNDELMAkGA1UEBhMCTkwxETAP
|
||||||
|
BgNVBAoTCFBvbGFyU1NMMRIwEAYDVQQDEwlsb2NhbGhvc3QwgZ8wDQYJKoZIhvcN
|
||||||
|
AQEBBQADgY0AMIGJAoGBAN0Rip+ZurBoyirqO2ptWZftTslU5A3uzqB9oB6q6A7C
|
||||||
|
uxNA24oSjokTJKXF9frY9ZDXyMrLxf6THa/aEiNzUnlGGrqgVyt2FjGzqK/nOJsI
|
||||||
|
i2OZOgol7kXSGFi6uZMa7dRYmmMbN/z3FAifhWVJ81kybdHg6G3eUu1mtKkL2kCV
|
||||||
|
AgMBAAGjgZIwgY8wCQYDVR0TBAIwADAdBgNVHQ4EFgQU7vPH9R8VpU1HicHTImOy
|
||||||
|
36fOvVEwYwYDVR0jBFwwWoAUtFrkpbPe0lL2udWmlQ/rPrzH/f+hP6Q9MDsxCzAJ
|
||||||
|
BgNVBAYTAk5MMREwDwYDVQQKEwhQb2xhclNTTDEZMBcGA1UEAxMQUG9sYXJTU0wg
|
||||||
|
VGVzdCBDQYIBADA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCAqEaMBgGCSqG
|
||||||
|
SIb3DQEBCDALBglghkgBZQMEAgKiBAICAM4DggEBABf8Gyq2VYuN1EBW1nOapDQp
|
||||||
|
B/KuafNW2GEJ7FmQKNyA7MIj1Yqo2MtJ6/OQojRQ3F5rnO4yjmvIPsXeQaMxJBiI
|
||||||
|
aaoAlLpH++F+oXMq/0aS0WSZrSLrsh2Fpay9cBDGwek2rDOX9kM+ZcPzGitVwWKX
|
||||||
|
TnOW22hpcl7u95CpZH+JZTcto5nL3tTyV9pIy+tSKQQfjPB+G0TAZCsOkbCGPLug
|
||||||
|
qdjvqFQwOf15VxQMj7NRiXjlqJvsx+I7B2AIhrs4DzQMEyiWq9S/PzpQuFU5v/Kg
|
||||||
|
s2iMLJ5ygv5aN3PYqGlE1ZmvgyRp5h/LaTGI2L6lzRTnecOhtPv30N2tyaDAEfo=
|
||||||
|
-----END CERTIFICATE-----
|
20
tests/data_files/server9-sha512.crt
Normal file
20
tests/data_files/server9-sha512.crt
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDWzCCAhKgAwIBAgIBGjA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCA6Ea
|
||||||
|
MBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgOiBAICAL4wOzELMAkGA1UEBhMCTkwx
|
||||||
|
ETAPBgNVBAoTCFBvbGFyU1NMMRkwFwYDVQQDExBQb2xhclNTTCBUZXN0IENBMB4X
|
||||||
|
DTE0MDEyMDEzNTgxMloXDTI0MDExODEzNTgxMlowNDELMAkGA1UEBhMCTkwxETAP
|
||||||
|
BgNVBAoTCFBvbGFyU1NMMRIwEAYDVQQDEwlsb2NhbGhvc3QwgZ8wDQYJKoZIhvcN
|
||||||
|
AQEBBQADgY0AMIGJAoGBAN0Rip+ZurBoyirqO2ptWZftTslU5A3uzqB9oB6q6A7C
|
||||||
|
uxNA24oSjokTJKXF9frY9ZDXyMrLxf6THa/aEiNzUnlGGrqgVyt2FjGzqK/nOJsI
|
||||||
|
i2OZOgol7kXSGFi6uZMa7dRYmmMbN/z3FAifhWVJ81kybdHg6G3eUu1mtKkL2kCV
|
||||||
|
AgMBAAGjgZIwgY8wCQYDVR0TBAIwADAdBgNVHQ4EFgQU7vPH9R8VpU1HicHTImOy
|
||||||
|
36fOvVEwYwYDVR0jBFwwWoAUtFrkpbPe0lL2udWmlQ/rPrzH/f+hP6Q9MDsxCzAJ
|
||||||
|
BgNVBAYTAk5MMREwDwYDVQQKEwhQb2xhclNTTDEZMBcGA1UEAxMQUG9sYXJTU0wg
|
||||||
|
VGVzdCBDQYIBADA+BgkqhkiG9w0BAQowMaANMAsGCWCGSAFlAwQCA6EaMBgGCSqG
|
||||||
|
SIb3DQEBCDALBglghkgBZQMEAgOiBAICAL4DggEBACdVozFq6rUiXo+ib5Y2oPsR
|
||||||
|
6xxl4Ydn3LpUoYrPpTOrhcXJWW/tOLHGuCF/mSRfUzKaMIfL418cZHYnvumvuttu
|
||||||
|
6z3tp5E1VsiZCU2MWJnzjKSxFBOss43AmpJHHoapGFZu2pxObBPqegAKHYkKWOLk
|
||||||
|
tJDj47PurWgEek9j1nL7Pc1tVf59fm/ySp4fWkXLLvQiKid1516VioLyacUvK3zU
|
||||||
|
6Egz8jMt7D5c9KpaExLRTANVsThqO5/dmR36bOwm3Hpbde7DNdgxru41tiLMqJs/
|
||||||
|
5pX3ceaJ1XQ/l0idj5/9ipvqHHUguyk7H22HwQHQdSD9oIha8kEM3P6CjpfE7yY=
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -44,7 +44,23 @@ x509_cert_info:"data_files/cert_sha512.crt":"cert. version \: 3\nserial number \
|
||||||
|
|
||||||
X509 Certificate information RSA-PSS, SHA1 Digest
|
X509 Certificate information RSA-PSS, SHA1 Digest
|
||||||
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_RSA_C
|
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_RSA_C
|
||||||
x509_cert_info:"data_files/server9.crt":"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 234, 1)\nRSA key size \: 1024 bits\n"
|
x509_cert_info:"data_files/server9.crt":"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA, 1)\nRSA key size \: 1024 bits\n"
|
||||||
|
|
||||||
|
X509 Certificate information RSA-PSS, SHA224 Digest
|
||||||
|
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_RSA_C
|
||||||
|
x509_cert_info:"data_files/server9-sha224.crt":"cert. version \: 3\nserial number \: 17\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:36\nexpires on \: 2024-01-18 13\:57\:36\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2, 1)\nRSA key size \: 1024 bits\n"
|
||||||
|
|
||||||
|
X509 Certificate information RSA-PSS, SHA256 Digest
|
||||||
|
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_RSA_C
|
||||||
|
x509_cert_info:"data_files/server9-sha256.crt":"cert. version \: 3\nserial number \: 18\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:45\nexpires on \: 2024-01-18 13\:57\:45\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE, 1)\nRSA key size \: 1024 bits\n"
|
||||||
|
|
||||||
|
X509 Certificate information RSA-PSS, SHA384 Digest
|
||||||
|
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_RSA_C
|
||||||
|
x509_cert_info:"data_files/server9-sha384.crt":"cert. version \: 3\nserial number \: 19\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:58\nexpires on \: 2024-01-18 13\:57\:58\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE, 1)\nRSA key size \: 1024 bits\n"
|
||||||
|
|
||||||
|
X509 Certificate information RSA-PSS, SHA512 Digest
|
||||||
|
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_RSA_C
|
||||||
|
x509_cert_info:"data_files/server9-sha512.crt":"cert. version \: 3\nserial number \: 1A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:58\:12\nexpires on \: 2024-01-18 13\:58\:12\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE, 1)\nRSA key size \: 1024 bits\n"
|
||||||
|
|
||||||
X509 Certificate information EC, SHA1 Digest
|
X509 Certificate information EC, SHA1 Digest
|
||||||
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_ECP_C
|
depends_on:POLARSSL_PEM_PARSE_C:POLARSSL_ECP_C
|
||||||
|
|
Loading…
Reference in a new issue