mbedtls/tests/data_files
Hanno Becker 2130163012 Add tests for relaxed CRL-CA name comparison
This commit introduces variants test-ca_utf8.crt,
test-ca_printablestring.crt and test-ca_uppercase.crt
of tests/data_files/test-ca.crt which differ from
test-ca.crt in their choice of string encoding and
upper and lower case letters in the DN field. These
changes should be immaterial to the recovation check,
and three tests are added that crl.pem, which applies
to test-ca.crt, is also considered as applying to
test-ca_*.crt.

The test files were generated using PR #1641 which
- adds a build instruction for test-ca.crt to
  tests/data_files/Makefile which allows easy
  change of the subject DN.
- changes the default string format from `PrintableString`
  to `UTF8String`.

Specifically:
- `test-ca_utf8.crt` was generated by running
      `rm test-ca.crt && make test-ca.crt`
   on PR #1641.
- `test-ca_uppercase.crt`, too, was generated by running
      `rm test-ca.crt && make test-ca.crt`
   on PR #1641, after modifying the subject DN line in the build
   instruction for `test-ca.crt` in `tests/data_files/Makefile`.
-  `test-ca_printable.crt` is a copy of `test-ca.crt`
   because at the time of this commit, `PrintableString` is
   still the default string format.
2018-11-06 13:17:07 +00:00
..
dir-maxpath
dir1
dir2
dir3
dir4
.gitignore
bitstring-in-dn.pem
cert_example_multi.crt
cert_example_multi_nocn.crt
cert_example_wildcard.crt
cert_md2.crt
cert_md4.crt
cert_md5.crt
cert_sha1.crt
cert_sha224.crt
cert_sha256.crt
cert_sha384.crt
cert_sha512.crt
cert_v1_with_ext.crt
cli-rsa-sha1.crt
cli-rsa-sha256.crt
cli-rsa.key
cli.opensslconf
cli2.crt
cli2.key
crl-ec-sha1.pem
crl-ec-sha224.pem
crl-ec-sha256.pem
crl-ec-sha384.pem
crl-ec-sha512.pem
crl-future.pem
crl-idp.pem
crl-idpnc.pem
crl-malformed-trailing-spaces.pem
crl-rsa-pss-sha1-badsign.pem
crl-rsa-pss-sha1.pem
crl-rsa-pss-sha224.pem
crl-rsa-pss-sha256.pem
crl-rsa-pss-sha384.pem
crl-rsa-pss-sha512.pem
crl.pem
crl_cat_ec-rsa.pem
crl_cat_ecfut-rsa.pem
crl_cat_rsa-ec.pem
crl_cat_rsabadpem-ec.pem
crl_expired.pem
crl_md2.pem
crl_md4.pem
crl_md5.pem
crl_sha1.pem
crl_sha224.pem
crl_sha256.pem
crl_sha384.pem
crl_sha512.pem
crt_cat_rsaexp-ec.pem
dh.1000.pem
dh.optlen.pem
dhparams.pem
ec_224_prv.pem
ec_224_pub.pem
ec_256_prv.pem
ec_256_pub.pem
ec_384_prv.pem
ec_384_pub.pem
ec_521_prv.pem
ec_521_pub.pem
ec_bp256_prv.pem
ec_bp256_pub.pem
ec_bp384_prv.pem
ec_bp384_pub.pem
ec_bp512_prv.pem
ec_bp512_pub.pem
ec_prv.pk8.der
ec_prv.pk8.pem
ec_prv.pk8.pw.der
ec_prv.pk8.pw.pem
ec_prv.pk8nopub.der
ec_prv.pk8nopub.pem
ec_prv.pk8nopubparam.der
ec_prv.pk8nopubparam.pem
ec_prv.pk8param.der
ec_prv.pk8param.pem
ec_prv.sec1.der
ec_prv.sec1.pem
ec_prv.sec1.pw.pem
ec_prv.specdom.der
ec_pub.der
ec_pub.pem
enco-ca-prstr.pem
enco-cert-utf8str.pem
format_gen.key
format_gen.pub
format_pkcs12.fmt
format_rsa.key
hash_file_1
hash_file_2
hash_file_3
hash_file_4
hash_file_5
keyUsage.decipherOnly.crt
Makefile
mpi_10
mpi_too_big
passwd.psk
print_c.pl
Readme-x509.txt
rsa512.key
rsa521.key
rsa522.key
rsa528.key
rsa4096_prv.pem
rsa4096_pub.pem
rsa_pkcs1_1024_3des.pem
rsa_pkcs1_1024_aes128.pem
rsa_pkcs1_1024_aes192.pem
rsa_pkcs1_1024_aes256.pem
rsa_pkcs1_1024_clear.pem
rsa_pkcs1_1024_des.pem
rsa_pkcs1_2048_3des.pem
rsa_pkcs1_2048_aes128.pem
rsa_pkcs1_2048_aes192.pem
rsa_pkcs1_2048_aes256.pem
rsa_pkcs1_2048_clear.pem
rsa_pkcs1_2048_des.pem
rsa_pkcs1_4096_3des.pem
rsa_pkcs1_4096_aes128.pem
rsa_pkcs1_4096_aes192.pem
rsa_pkcs1_4096_aes256.pem
rsa_pkcs1_4096_clear.pem
rsa_pkcs1_4096_des.pem
rsa_pkcs8_pbe_sha1_1024_2des.der
rsa_pkcs8_pbe_sha1_1024_2des.pem
rsa_pkcs8_pbe_sha1_1024_3des.der
rsa_pkcs8_pbe_sha1_1024_3des.pem
rsa_pkcs8_pbe_sha1_1024_rc4_128.der
rsa_pkcs8_pbe_sha1_1024_rc4_128.pem
rsa_pkcs8_pbe_sha1_2048_2des.der
rsa_pkcs8_pbe_sha1_2048_2des.pem
rsa_pkcs8_pbe_sha1_2048_3des.der
rsa_pkcs8_pbe_sha1_2048_3des.pem
rsa_pkcs8_pbe_sha1_2048_rc4_128.der
rsa_pkcs8_pbe_sha1_2048_rc4_128.pem
rsa_pkcs8_pbe_sha1_4096_2des.der
rsa_pkcs8_pbe_sha1_4096_2des.pem
rsa_pkcs8_pbe_sha1_4096_3des.der
rsa_pkcs8_pbe_sha1_4096_3des.pem
rsa_pkcs8_pbe_sha1_4096_rc4_128.der
rsa_pkcs8_pbe_sha1_4096_rc4_128.pem
rsa_pkcs8_pbes2_pbkdf2_1024_3des.der
rsa_pkcs8_pbes2_pbkdf2_1024_3des.pem
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha224.der
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha224.pem
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha256.der
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha256.pem
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha384.der
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha384.pem
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha512.der
rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha512.pem
rsa_pkcs8_pbes2_pbkdf2_1024_des.der
rsa_pkcs8_pbes2_pbkdf2_1024_des.pem
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha224.der
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha224.pem
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha256.der
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha256.pem
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha384.der
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha384.pem
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha512.der
rsa_pkcs8_pbes2_pbkdf2_1024_des_sha512.pem
rsa_pkcs8_pbes2_pbkdf2_2048_3des.der
rsa_pkcs8_pbes2_pbkdf2_2048_3des.pem
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha224.der
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha224.pem
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha256.der
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha256.pem
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha384.der
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha384.pem
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha512.der
rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha512.pem
rsa_pkcs8_pbes2_pbkdf2_2048_des.der
rsa_pkcs8_pbes2_pbkdf2_2048_des.pem
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha224.der
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha224.pem
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha256.der
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha256.pem
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha384.der
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha384.pem
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha512.der
rsa_pkcs8_pbes2_pbkdf2_2048_des_sha512.pem
rsa_pkcs8_pbes2_pbkdf2_4096_3des.der
rsa_pkcs8_pbes2_pbkdf2_4096_3des.pem
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha224.der
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha224.pem
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha256.der
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha256.pem
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha384.der
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha384.pem
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha512.der
rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha512.pem
rsa_pkcs8_pbes2_pbkdf2_4096_des.der
rsa_pkcs8_pbes2_pbkdf2_4096_des.pem
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha224.der
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha224.pem
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha256.der
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha256.pem
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha384.der
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha384.pem
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha512.der
rsa_pkcs8_pbes2_pbkdf2_4096_des_sha512.pem
server1-nospace.crt ssl-opt.sh: address some robustness issues 2014-03-26 14:21:34 +01:00
server1-v1.crt
server1.cert_type.crt
server1.cert_type.crt.openssl.v3_ext
server1.cert_type_noauthid.crt
server1.crt
server1.crt.openssl.v3_ext
server1.csr
server1.ext_ku.crt
server1.key
server1.key_usage.crt
server1.key_usage.crt.openssl.v3_ext
server1.key_usage_noauthid.crt
server1.noauthid.crt
server1.pubkey
server1.req.cert_type
server1.req.key_usage
server1.req.ku-ct
server1.req.md4
server1.req.md5
server1.req.sha1
server1.req.sha224
server1.req.sha256
server1.req.sha384
server1.req.sha512
server1.v1.crt
server1_ca.crt
server1_csr.opensslconf
server2-badsign.crt
server2-sha256.crt
server2-v1-chain.crt
server2-v1.crt
server2.crt
server2.key
server2.ku-ds.crt
server2.ku-ds_ke.crt
server2.ku-ka.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server2.ku-ke.crt
server3.crt
server3.key
server4.crt
server4.key
server5-badsign.crt
server5-der0.crt
server5-der1a.crt
server5-der1b.crt
server5-der2.crt
server5-der4.crt
server5-der8.crt
server5-der9.crt
server5-expired.crt
server5-future.crt
server5-selfsigned.crt
server5-sha1.crt
server5-sha224.crt
server5-sha384.crt
server5-sha512.crt
server5-ss-expired.crt
server5-ss-forgeca.crt
server5.crt
server5.eku-cli.crt
server5.eku-cs.crt
server5.eku-cs_any.crt
server5.eku-srv.crt
server5.eku-srv_cli.crt
server5.key
server5.ku-ds.crt
server5.ku-ka.crt
server5.ku-ke.crt
server5.req.ku.sha1
server5.req.sha1
server5.req.sha224
server5.req.sha256
server5.req.sha384
server5.req.sha512
server6-ss-child.crt
server6.crt
server6.key
server7-badsign.crt
server7-expired.crt
server7-future.crt
server7.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server7.key
server7_all_space.crt
server7_int-ca-exp.crt
server7_int-ca.crt
server7_int-ca_ca2.crt
server7_pem_space.crt
server7_spurious_int-ca.crt
server7_trailing_space.crt
server8.crt
server8.key
server8_int-ca2.crt
server9-bad-mgfhash.crt
server9-bad-saltlen.crt
server9-badsign.crt
server9-defaults.crt
server9-sha224.crt
server9-sha256.crt
server9-sha384.crt
server9-sha512.crt
server9-with-ca.crt
server9.crt
server9.key Basic parsing of certs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
server9.req.sha1
server9.req.sha224
server9.req.sha256
server9.req.sha384
server9.req.sha512
server10.key
server10_int3_int-ca2.crt
server10_int3_int-ca2_ca.crt
server10_int3_spurious_int-ca2.crt
test-ca-alt-good.crt
test-ca-alt.crt
test-ca-alt.csr
test-ca-alt.key
test-ca-good-alt.crt
test-ca-sha1.crt
test-ca-sha256.crt
test-ca-v1.crt
test-ca.crt
test-ca.key
test-ca.opensslconf
test-ca.server1.opensslconf
test-ca2-expired.crt
test-ca2.crt
test-ca2.key
test-ca2.ku-crl.crt
test-ca2.ku-crt.crt
test-ca2.ku-crt_crl.crt
test-ca2.ku-ds.crt
test-ca2_cat-future-invalid.crt
test-ca2_cat-future-present.crt
test-ca2_cat-past-invalid.crt
test-ca2_cat-past-present.crt
test-ca2_cat-present-future.crt
test-ca2_cat-present-past.crt
test-ca_cat12.crt
test-ca_cat21.crt
test-ca_printable.crt
test-ca_uppercase.crt
test-ca_utf8.crt
test-int-ca-exp.crt
test-int-ca.crt
test-int-ca.key
test-int-ca2.crt
test-int-ca2.key
test-int-ca3.crt
test-int-ca3.key Add tests for verify callback 2015-09-01 17:24:42 +02:00