mbedtls/tests/data_files
2015-10-28 18:20:43 +01:00
..
dir1 Add tests for x509_crt_parse_path() 2013-11-28 18:07:39 +01:00
dir2 Add tests for x509_crt_parse_path() 2013-11-28 18:07:39 +01:00
dir3 Add tests for x509_crt_parse_path() 2013-11-28 18:07:39 +01:00
dir4 Additional corner cases for testing pathlen constrains. Just in case. 2015-10-28 18:20:43 +01:00
bitstring-in-dn.pem Add test certificate for bitstring in DN 2015-03-27 13:11:33 +01:00
cert_example_multi_nocn.crt Replace expired test certificate 2014-01-22 13:03:42 +01:00
cert_example_multi.crt
cert_example_wildcard.crt
cert_md2.crt
cert_md4.crt
cert_md5.crt
cert_sha1.crt - Corrected parsing of UTCTime dates before 1990 and after 1950 2011-02-20 10:40:16 +00:00
cert_sha224.crt
cert_sha256.crt
cert_sha384.crt
cert_sha512.crt
cert_v1_with_ext.crt Support faulty X509 v1 certificates with extensions 2013-09-23 15:01:36 +02:00
cli2.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
cli2.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
crl_cat_ec-rsa.pem Add tests for concatenated CRLs 2014-11-19 16:08:34 +01:00
crl_cat_ecfut-rsa.pem Add tests for concatenated CRLs 2014-11-19 16:08:34 +01:00
crl_cat_rsa-ec.pem Add tests for concatenated CRLs 2014-11-19 16:08:34 +01:00
crl_cat_rsabadpem-ec.pem Add tests for concatenated CRLs 2014-11-19 16:08:34 +01:00
crl_expired.pem
crl_md2.pem
crl_md4.pem
crl_md5.pem
crl_sha1.pem
crl_sha224.pem
crl_sha256.pem
crl_sha384.pem
crl_sha512.pem
crl-ec-sha1.pem Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
crl-ec-sha224.pem Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
crl-ec-sha256.pem Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
crl-ec-sha384.pem Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
crl-ec-sha512.pem Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
crl-future.pem Add x509_time_future() 2014-03-13 19:25:06 +01:00
crl-rsa-pss-sha1-badsign.pem Also verify CRLs signed with RSASSA-PSS 2014-06-05 17:59:55 +02:00
crl-rsa-pss-sha1.pem Parse CRLs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
crl-rsa-pss-sha224.pem Parse CRLs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
crl-rsa-pss-sha256.pem Parse CRLs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
crl-rsa-pss-sha384.pem Parse CRLs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
crl-rsa-pss-sha512.pem Parse CRLs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
crl.pem
crt_cat_rsaexp-ec.pem Add tests for concatenated CRLs 2014-11-19 16:08:34 +01:00
dh.optlen.pem Add test case for dh params with privateValueLength 2015-04-15 13:50:29 +02:00
dhparams.pem Add test for dhm_parse_dhmfile 2014-04-04 16:42:44 +02:00
ec_224_prv.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_224_pub.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_256_prv.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_256_pub.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_384_prv.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_384_pub.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_521_prv.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_521_pub.pem Add test for EC keys with all curves. 2013-08-16 14:00:52 +02:00
ec_bp256_prv.pem Add OIDs for brainpool curves 2013-10-10 15:11:33 +02:00
ec_bp256_pub.pem Add OIDs for brainpool curves 2013-10-10 15:11:33 +02:00
ec_bp384_prv.pem Add OIDs for brainpool curves 2013-10-10 15:11:33 +02:00
ec_bp384_pub.pem Add OIDs for brainpool curves 2013-10-10 15:11:33 +02:00
ec_bp512_prv.pem Add OIDs for brainpool curves 2013-10-10 15:11:33 +02:00
ec_bp512_pub.pem Add OIDs for brainpool curves 2013-10-10 15:11:33 +02:00
ec_prv.noopt.der Fix bug in pk_parse_key() 2015-04-15 11:21:24 +02:00
ec_prv.pk8.der Add tests for x509parse_key_ec() 2013-07-08 17:32:26 +02:00
ec_prv.pk8.pem Add tests for x509parse_key_ec() 2013-07-08 17:32:26 +02:00
ec_prv.pk8.pw.der Adapt test files to supported PKCS#8 modes 2013-07-08 17:32:26 +02:00
ec_prv.pk8.pw.pem Adapt test files to supported PKCS#8 modes 2013-07-08 17:32:26 +02:00
ec_prv.sec1.der Add tests for x509parse_key_ec() 2013-07-08 17:32:26 +02:00
ec_prv.sec1.pem Add tests for x509parse_key_ec() 2013-07-08 17:32:26 +02:00
ec_prv.sec1.pw.pem Add tests for x509parse_key_ec() 2013-07-08 17:32:26 +02:00
ec_prv.specdom.der Add test for SpecifiedECDomain 2014-03-19 16:50:59 +01:00
ec_pub.der Complete x509parse_public_key_ec() 2013-07-08 17:32:26 +02:00
ec_pub.pem Complete x509parse_public_key_ec() 2013-07-08 17:32:26 +02:00
enco-ca-prstr.pem Add tests for X.509 name encoding mismatch 2014-10-17 12:42:31 +02:00
enco-cert-utf8str.pem Add tests for X.509 name encoding mismatch 2014-10-17 12:42:31 +02:00
format_gen.key
format_gen.pub
format_pkcs12.fmt
format_rsa.key
hash_file_1
hash_file_2
hash_file_3
hash_file_4
hash_file_5 Add RIPEMD-160 to the generic MD layer 2014-01-17 20:41:32 +01:00
keyfile
keyfile.3des
keyfile.aes128
keyfile.aes192
keyfile.aes256
keyfile.des
mpi_10 Increase MPI_MAX_BYTES to allow RSA 8192 2014-10-15 22:06:46 +02:00
mpi_too_big Increase MPI_MAX_BYTES to allow RSA 8192 2014-10-15 22:06:46 +02:00
passwd.psk GnuTLS in compat.sh: server-side 2014-03-14 08:41:02 +01:00
pkcs8_pbe_sha1_2des.key
pkcs8_pbe_sha1_3des.der
pkcs8_pbe_sha1_3des.key
pkcs8_pbe_sha1_rc4_128.key
pkcs8_pbes2_pbkdf2_3des.der PKCS#5 v2 PBES2 support and use in PKCS#8 encrypted certificates 2013-06-25 15:06:52 +02:00
pkcs8_pbes2_pbkdf2_3des.key PKCS#5 v2 PBES2 support and use in PKCS#8 encrypted certificates 2013-06-25 15:06:52 +02:00
pkcs8_pbes2_pbkdf2_des.key PKCS#5 v2 PBES2 support and use in PKCS#8 encrypted certificates 2013-06-25 15:06:52 +02:00
Readme-x509.txt Add tests for verify callback 2015-09-01 18:29:59 +02:00
rsa4096_prv.pem Fix buffer size in pk_write_*_pem() 2014-08-14 11:34:35 +02:00
rsa4096_pub.pem Fix buffer size in pk_write_*_pem() 2014-08-14 11:34:35 +02:00
server1_ca.crt Add tests for verify callback 2015-09-01 18:29:59 +02:00
server1-nospace.crt ssl-opt.sh: address some robustness issues 2014-03-26 14:21:34 +01:00
server1-v1.crt Restore ability to use v1 CA if trusted locally 2014-06-25 11:26:12 +02:00
server1.cert_type.crt Add previously forgotten test files... oops! 2014-04-04 16:23:29 +02:00
server1.crt Move *_pemify() function to PEM module 2013-09-15 20:03:26 +02:00
server1.ext_ku.crt Print extended key usage in x509_crt_info() 2014-04-04 14:01:39 +02:00
server1.key
server1.key_usage.crt Test certificate "Server1 SHA1, key_usage" reissued. 2015-10-27 15:12:39 +01:00
server1.pubkey Add test for x509write_pubkey_pem() 2013-09-12 11:57:01 +02:00
server1.req.cert_type Improve x509xrite_csr testing: extensions, ECDSA 2014-04-04 16:33:01 +02:00
server1.req.key_usage Improve x509xrite_csr testing: extensions, ECDSA 2014-04-04 16:33:01 +02:00
server1.req.ku-ct Improve x509xrite_csr testing: extensions, ECDSA 2014-04-04 16:33:01 +02:00
server1.req.md4
server1.req.md5
server1.req.sha1
server1.req.sha224
server1.req.sha256
server1.req.sha384
server1.req.sha512
server1.v1.crt Improve x509xrite_csr testing: extensions, version 2014-04-04 16:33:01 +02:00
server2-badsign.crt Add some more x509_verify tests 2013-08-20 20:46:03 +02:00
server2-v1-chain.crt Restore ability to use v1 CA if trusted locally 2014-06-25 11:26:12 +02:00
server2-v1.crt Restore ability to use v1 CA if trusted locally 2014-06-25 11:26:12 +02:00
server2.crt
server2.key
server2.ku-ds_ke.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server2.ku-ds.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server2.ku-ka.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server2.ku-ke.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server3.crt Add test files for EC cert & crl validation 2013-08-20 20:21:02 +02:00
server3.key Add some more x509_verify tests 2013-08-20 20:46:03 +02:00
server4.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server4.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5-badsign.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5-expired.crt Reject certs and CRLs from the future 2014-03-13 19:25:06 +01:00
server5-future.crt Add x509_time_future() 2014-03-13 19:25:06 +01:00
server5-selfsigned.crt Restore ability to trust non-CA selfsigned EE cert 2014-06-25 11:26:13 +02:00
server5-sha1.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5-sha224.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5-sha384.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5-sha512.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5.eku-cli.crt Add x509_crt_check_extended_key_usage() 2014-04-11 11:09:00 +02:00
server5.eku-cs_any.crt Add x509_crt_check_extended_key_usage() 2014-04-11 11:09:00 +02:00
server5.eku-cs.crt Add x509_crt_check_extended_key_usage() 2014-04-11 11:09:00 +02:00
server5.eku-srv_cli.crt Add x509_crt_check_extended_key_usage() 2014-04-11 11:09:00 +02:00
server5.eku-srv.crt Add x509_crt_check_extended_key_usage() 2014-04-11 11:09:00 +02:00
server5.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server5.ku-ds.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server5.ku-ka.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server5.ku-ke.crt Check keyUsage in SSL client and server 2014-04-09 15:50:57 +02:00
server5.req.ku.sha1 Improve x509xrite_csr testing: extensions, ECDSA 2014-04-04 16:33:01 +02:00
server5.req.sha1 Add tests for parsing CSRs 2014-06-02 16:10:29 +02:00
server5.req.sha224 Add tests for parsing CSRs 2014-06-02 16:10:29 +02:00
server5.req.sha256 Add tests for parsing CSRs 2014-06-02 16:10:29 +02:00
server5.req.sha384 Add tests for parsing CSRs 2014-06-02 16:10:29 +02:00
server5.req.sha512 Add tests for parsing CSRs 2014-06-02 16:10:29 +02:00
server6-ss-child.crt Restore ability to trust non-CA selfsigned EE cert 2014-06-25 11:26:13 +02:00
server6.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server6.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server7_all_space.crt Accept spaces at end of line/buffer in base64 2014-10-15 23:53:33 +02:00
server7_int-ca_ca2.crt Add tests for verify callback 2015-09-01 18:29:59 +02:00
server7_int-ca.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server7_pem_space.crt Accept spaces at end of line/buffer in base64 2014-10-15 23:53:33 +02:00
server7_trailing_space.crt Accept a trailing space at end of PEM lines 2015-08-10 12:01:50 +02:00
server7.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server7.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server8_int-ca2.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server8.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server8.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
server9-bad-mgfhash.crt Add pathological RSASSA-PSS test certificates 2014-06-07 11:21:52 +02:00
server9-bad-saltlen.crt Add pathological RSASSA-PSS test certificates 2014-06-07 11:21:52 +02:00
server9-badsign.crt Add basic PSS cert verification 2014-06-04 12:09:08 +02:00
server9-defaults.crt Add RSASSA-PSS certificate with all defaults 2014-06-05 18:00:08 +02:00
server9-sha224.crt Finish parsing RSASSA-PSS parameters 2014-06-02 16:10:29 +02:00
server9-sha256.crt Finish parsing RSASSA-PSS parameters 2014-06-02 16:10:29 +02:00
server9-sha384.crt Finish parsing RSASSA-PSS parameters 2014-06-02 16:10:29 +02:00
server9-sha512.crt Finish parsing RSASSA-PSS parameters 2014-06-02 16:10:29 +02:00
server9-with-ca.crt Add basic PSS cert verification 2014-06-04 12:09:08 +02:00
server9.crt Basic parsing of certs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
server9.key Basic parsing of certs signed with RSASSA-PSS 2014-06-02 16:10:29 +02:00
server9.req.sha1 Parse CSRs signed with RSASSA-PSS 2014-06-02 16:10:30 +02:00
server9.req.sha224 Parse CSRs signed with RSASSA-PSS 2014-06-02 16:10:30 +02:00
server9.req.sha256 Parse CSRs signed with RSASSA-PSS 2014-06-02 16:10:30 +02:00
server9.req.sha384 Parse CSRs signed with RSASSA-PSS 2014-06-02 16:10:30 +02:00
server9.req.sha512 Parse CSRs signed with RSASSA-PSS 2014-06-02 16:10:30 +02:00
server10_int3_int-ca2_ca.crt Add tests for verify callback 2015-09-01 18:29:59 +02:00
server10_int3_int-ca2.crt Add tests for verify callback 2015-09-01 18:29:59 +02:00
server10.key Add tests for verify callback 2015-09-01 18:29:59 +02:00
test-ca2.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
test-ca2.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
test-ca2.ku-crl.crt Add keyUsage checking for CAs 2014-04-09 15:50:58 +02:00
test-ca2.ku-crt_crl.crt Add keyUsage checking for CAs 2014-04-09 15:50:58 +02:00
test-ca2.ku-crt.crt Add keyUsage checking for CAs 2014-04-09 15:50:58 +02:00
test-ca2.ku-ds.crt Add keyUsage checking for CAs 2014-04-09 15:50:58 +02:00
test-ca_cat12.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
test-ca_cat21.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
test-ca-v1.crt Restore ability to use v1 CA if trusted locally 2014-06-25 11:26:12 +02:00
test-ca.crt
test-ca.key
test-int-ca2.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
test-int-ca2.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
test-int-ca3.crt Add tests for verify callback 2015-09-01 18:29:59 +02:00
test-int-ca3.key Add tests for verify callback 2015-09-01 18:29:59 +02:00
test-int-ca.crt Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00
test-int-ca.key Update EC certs to use NIST-256 and NIST-384 2013-09-24 21:25:54 +02:00