From 29be69b92b5097405b2df2e10bd99cdd224fe2e0 Mon Sep 17 00:00:00 2001 From: lchristina26 Date: Fri, 30 Jan 2015 09:11:42 -0700 Subject: [PATCH 01/11] change CYASSL_DEBUG to DEBUG_CYASSL for compatibility --- cyassl/ctaocrypt/logging.h | 2 +- cyassl/ssl.h | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cyassl/ctaocrypt/logging.h b/cyassl/ctaocrypt/logging.h index 688154c8e..faa85d449 100644 --- a/cyassl/ctaocrypt/logging.h +++ b/cyassl/ctaocrypt/logging.h @@ -32,7 +32,7 @@ #define CYASSL_ENTER WOLFSSL_ENTER #define CYASSL_MSG WOLFSSL_MSG /* check old macros possibly declared */ -#if defined(CYASSL_DEBUG) && !defined(DEBUG_WOLFSSL) +#if defined(DEBUG_CYASSL) && !defined(DEBUG_WOLFSSL) #define DEBUG_WOLFSSL #endif diff --git a/cyassl/ssl.h b/cyassl/ssl.h index 75b7ab2bd..d97bbc1e1 100644 --- a/cyassl/ssl.h +++ b/cyassl/ssl.h @@ -48,7 +48,7 @@ #endif #define CYASSL WOLFSSL -#define CYASSL_DEBUG WOLFSSL_DEBUG +#define DEBUG_CYASSL DEBUG_WOLFSSL #define CYASSL_CTX WOLFSSL_CTX #define CYASSL_METHOD WOLFSSL_METHOD #define CYASSL_SESSION WOLFSSL_SESSION From f75329aa2e086cc80ca28981c6677db3b687bb46 Mon Sep 17 00:00:00 2001 From: John Safranek Date: Fri, 30 Jan 2015 09:03:44 -0800 Subject: [PATCH 02/11] 1. Changed a memset to 0 of some mp_ints with mp_inits() 2. For alt-ecc, implemented the function fp_init_copy() 3. Added an fp_init() for the temp fp_int in fp_sub_d() --- wolfcrypt/src/ecc.c | 4 ++-- wolfcrypt/src/tfm.c | 9 +++++++++ wolfssl/wolfcrypt/tfm.h | 3 ++- 3 files changed, 13 insertions(+), 3 deletions(-) diff --git a/wolfcrypt/src/ecc.c b/wolfcrypt/src/ecc.c index ed23adb63..185922854 100644 --- a/wolfcrypt/src/ecc.c +++ b/wolfcrypt/src/ecc.c @@ -2088,8 +2088,8 @@ int wc_ecc_verify_hash(const byte* sig, word32 siglen, const byte* hash, * If either of those don't allocate correctly, none of * the rest of this function will execute, and everything * gets cleaned up at the end. */ - XMEMSET(&r, 0, sizeof(r)); - XMEMSET(&s, 0, sizeof(s)); + mp_init(&r); + mp_init(&s); if (err == MP_OKAY) err = DecodeECC_DSA_Sig(sig, siglen, &r, &s); diff --git a/wolfcrypt/src/tfm.c b/wolfcrypt/src/tfm.c index 983ff98e7..8ac48323a 100644 --- a/wolfcrypt/src/tfm.c +++ b/wolfcrypt/src/tfm.c @@ -1829,6 +1829,7 @@ void fp_reverse (unsigned char *s, int len) void fp_sub_d(fp_int *a, fp_digit b, fp_int *c) { fp_int tmp; + fp_init(&tmp); fp_set(&tmp, b); fp_sub(a, &tmp, c); } @@ -1983,6 +1984,14 @@ void fp_copy(fp_int *a, fp_int* b) XMEMCPY(b->dp, a->dp, a->used * sizeof(fp_digit)); } } + +void fp_init_copy(fp_int *a, fp_int* b) +{ + if (a != b) { + fp_init(a); + fp_copy(b, a); + } +} #endif /* fast math conversion */ diff --git a/wolfssl/wolfcrypt/tfm.h b/wolfssl/wolfcrypt/tfm.h index ee59c8162..a928a2ac6 100644 --- a/wolfssl/wolfcrypt/tfm.h +++ b/wolfssl/wolfcrypt/tfm.h @@ -375,10 +375,11 @@ void fp_set(fp_int *a, fp_digit b); /* copy from a to b */ #ifndef ALT_ECC_SIZE #define fp_copy(a, b) (void)(((a) != (b)) ? ((void)XMEMCPY((b), (a), sizeof(fp_int))) : (void)0) + #define fp_init_copy(a, b) fp_copy(b, a) #else void fp_copy(fp_int *a, fp_int *b); + void fp_init_copy(fp_int *a, fp_int *b); #endif -#define fp_init_copy(a, b) fp_copy(b, a) /* clamp digits */ #define fp_clamp(a) { while ((a)->used && (a)->dp[(a)->used-1] == 0) --((a)->used); (a)->sign = (a)->used ? (a)->sign : FP_ZPOS; } From 7cff22c4b0a14d26028302c1fc1c0e3e2f0cfee2 Mon Sep 17 00:00:00 2001 From: John Safranek Date: Fri, 30 Jan 2015 10:43:31 -0800 Subject: [PATCH 03/11] moved the buffers, key, and iv around in the file so lean-psk would still build --- wolfcrypt/benchmark/benchmark.c | 66 +++++++++++++++++---------------- 1 file changed, 35 insertions(+), 31 deletions(-) diff --git a/wolfcrypt/benchmark/benchmark.c b/wolfcrypt/benchmark/benchmark.c index 171cbfad0..9350f168a 100644 --- a/wolfcrypt/benchmark/benchmark.c +++ b/wolfcrypt/benchmark/benchmark.c @@ -173,6 +173,36 @@ static int OpenNitroxDevice(int dma_mode,int dev_id) static RNG rng; #endif +/* use kB instead of mB for embedded benchmarking */ +#ifdef BENCH_EMBEDDED + static byte plain [1024]; +#else + static byte plain [1024*1024]; +#endif + + +/* use kB instead of mB for embedded benchmarking */ +#ifdef BENCH_EMBEDDED + static byte cipher[1024]; +#else + static byte cipher[1024*1024]; +#endif + + +static const byte key[] = +{ + 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, + 0xfe,0xde,0xba,0x98,0x76,0x54,0x32,0x10, + 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67 +}; + +static const byte iv[] = +{ + 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef, + 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01, + 0x11,0x21,0x31,0x41,0x51,0x61,0x71,0x81 +}; + /* so embedded projects can pull in tests on their own */ #if !defined(NO_MAIN_DRIVER) @@ -191,6 +221,11 @@ int benchmark_test(void *args) wolfSSL_Debugging_ON(); #endif + (void)plain; + (void)cipher; + (void)key; + (void)iv; + #ifdef HAVE_CAVIUM int ret = OpenNitroxDevice(CAVIUM_DIRECT, CAVIUM_DEV_ID); if (ret != 0) { @@ -327,37 +362,6 @@ static const char blockType[] = "megs"; /* used in printf output */ #endif -/* use kB instead of mB for embedded benchmarking */ -#ifdef BENCH_EMBEDDED -static byte plain [1024]; -#else -static byte plain [1024*1024]; -#endif - - -static const byte key[] = -{ - 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, - 0xfe,0xde,0xba,0x98,0x76,0x54,0x32,0x10, - 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67 -}; - -static const byte iv[] = -{ - 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef, - 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01, - 0x11,0x21,0x31,0x41,0x51,0x61,0x71,0x81 - -}; - -/* use kB instead of mB for embedded benchmarking */ -#ifdef BENCH_EMBEDDED -static byte cipher[1024]; -#else -static byte cipher[1024*1024]; -#endif - - #ifndef NO_AES void bench_aes(int show) From 55d30ca277bd24016d24cba09c396e2c3aca5a61 Mon Sep 17 00:00:00 2001 From: kaleb-himes Date: Mon, 2 Feb 2015 09:10:07 -0700 Subject: [PATCH 04/11] new client-ecc-cert.pem/renewcerts updates/certs relavent name changes --- certs/client-ecc-cert.pem | 60 +++++----- certs/renewcerts.sh | 35 +++++- cyassl/certs_test.h | 7 ++ cyassl/ctaocrypt/settings_comp.h | 3 + gencertbuf.pl | 6 +- wolfcrypt/src/asn.c | 2 +- wolfcrypt/test/test.c | 4 +- wolfssl/certs_test.h | 198 +++++++++++++++---------------- 8 files changed, 179 insertions(+), 136 deletions(-) diff --git a/certs/client-ecc-cert.pem b/certs/client-ecc-cert.pem index 4d0448fc4..c6e222e09 100644 --- a/certs/client-ecc-cert.pem +++ b/certs/client-ecc-cert.pem @@ -1,17 +1,16 @@ Certificate: Data: Version: 3 (0x2) - Serial Number: - bf:cc:cb:7a:0a:07:42:82 - Signature Algorithm: ecdsa-with-SHA1 - Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.yassl.com/emailAddress=info@yassl.com + Serial Number: 10761354931173564369 (0x9558034b367f9fd1) + Signature Algorithm: ecdsa-with-SHA1 + Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL, OU=Programming, CN=www.wolfssl.com/emailAddress=info@wolfssl.com Validity - Not Before: May 1 23:51:33 2012 GMT - Not After : Jan 26 23:51:33 2015 GMT - Subject: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.yassl.com/emailAddress=info@yassl.com + Not Before: Feb 2 15:59:46 2015 GMT + Not After : Oct 29 15:59:46 2017 GMT + Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL, OU=Programming, CN=www.wolfssl.com/emailAddress=info@wolfssl.com Subject Public Key Info: Public Key Algorithm: id-ecPublicKey - EC Public Key: + Public-Key: (256 bit) pub: 04:55:bf:f4:0f:44:50:9a:3d:ce:9b:b7:f0:c5:4d: f5:70:7b:d4:ec:24:8e:19:80:ec:5a:4c:a2:24:03: @@ -24,31 +23,32 @@ Certificate: EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2 X509v3 Authority Key Identifier: keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2 - DirName:/C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.yassl.com/emailAddress=info@yassl.com - serial:BF:CC:CB:7A:0A:07:42:82 + DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Programming/CN=www.wolfssl.com/emailAddress=info@wolfssl.com + serial:95:58:03:4B:36:7F:9F:D1 X509v3 Basic Constraints: CA:TRUE Signature Algorithm: ecdsa-with-SHA1 - 30:44:02:20:26:08:44:95:35:2e:fa:9d:20:01:a6:79:60:ed: - 35:a7:0a:dd:7a:0e:75:c5:80:d2:0b:9f:6a:90:d6:31:76:75: - 02:20:2d:87:a2:bb:d5:e2:42:61:35:19:59:40:1d:fd:71:4f: - 28:65:96:99:e6:85:1b:09:ad:d4:58:71:56:63:0b:c7 + 30:45:02:21:00:a5:ad:1f:db:11:32:91:8d:4e:a9:25:6d:a1: + af:e5:0e:f6:47:0a:f2:6a:f5:b3:27:3e:93:3b:d6:b2:a9:3f: + 2a:02:20:55:13:2a:1c:77:57:3c:ce:c3:a8:43:cd:78:cb:89: + 30:11:83:98:e6:2a:47:67:39:38:0f:52:95:61:39:aa:5d -----BEGIN CERTIFICATE----- -MIIC+jCCAqKgAwIBAgIJAL/My3oKB0KCMAkGByqGSM49BAEwgYkxCzAJBgNVBAYT -AlVTMQ8wDQYDVQQIEwZPcmVnb24xDjAMBgNVBAcTBVNhbGVtMRMwEQYDVQQKEwpD -bGllbnQgRUNDMQ0wCwYDVQQLEwRGYXN0MRYwFAYDVQQDEw13d3cueWFzc2wuY29t -MR0wGwYJKoZIhvcNAQkBFg5pbmZvQHlhc3NsLmNvbTAeFw0xMjA1MDEyMzUxMzNa -Fw0xNTAxMjYyMzUxMzNaMIGJMQswCQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29u -MQ4wDAYDVQQHEwVTYWxlbTETMBEGA1UEChMKQ2xpZW50IEVDQzENMAsGA1UECxME -RmFzdDEWMBQGA1UEAxMNd3d3Lnlhc3NsLmNvbTEdMBsGCSqGSIb3DQEJARYOaW5m -b0B5YXNzbC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAARVv/QPRFCaPc6b -t/DFTfVwe9TsJI4ZgOxaTKIkA2Ism9rvojUSQ4R2FsZWlQbMAam99nUaQve9qbI2 -Il/HXX+0o4HxMIHuMB0GA1UdDgQWBBTr1EtZa5VhP1FXtgRNiUGIRFyr8jCBvgYD -VR0jBIG2MIGzgBTr1EtZa5VhP1FXtgRNiUGIRFyr8qGBj6SBjDCBiTELMAkGA1UE -BhMCVVMxDzANBgNVBAgTBk9yZWdvbjEOMAwGA1UEBxMFU2FsZW0xEzARBgNVBAoT -CkNsaWVudCBFQ0MxDTALBgNVBAsTBEZhc3QxFjAUBgNVBAMTDXd3dy55YXNzbC5j -b20xHTAbBgkqhkiG9w0BCQEWDmluZm9AeWFzc2wuY29tggkAv8zLegoHQoIwDAYD -VR0TBAUwAwEB/zAJBgcqhkjOPQQBA0cAMEQCICYIRJU1LvqdIAGmeWDtNacK3XoO -dcWA0gufapDWMXZ1AiAth6K71eJCYTUZWUAd/XFPKGWWmeaFGwmt1FhxVmMLxw== +MIIDHDCCAsOgAwIBAgIJAJVYA0s2f5/RMAkGByqGSM49BAEwgZQxCzAJBgNVBAYT +AlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRAwDgYDVQQK +DAd3b2xmU1NMMRQwEgYDVQQLDAtQcm9ncmFtbWluZzEYMBYGA1UEAwwPd3d3Lndv +bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMB4XDTE1 +MDIwMjE1NTk0NloXDTE3MTAyOTE1NTk0NlowgZQxCzAJBgNVBAYTAlVTMRAwDgYD +VQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRAwDgYDVQQKDAd3b2xmU1NM +MRQwEgYDVQQLDAtQcm9ncmFtbWluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t +MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEVb/0D0RQmj3Om7fwxU31cHvU7CSOGYDsWkyiJANiLJva76I1 +EkOEdhbGVpUGzAGpvfZ1GkL3vamyNiJfx11/tKOB/DCB+TAdBgNVHQ4EFgQU69RL +WWuVYT9RV7YETYlBiERcq/IwgckGA1UdIwSBwTCBvoAU69RLWWuVYT9RV7YETYlB +iERcq/KhgZqkgZcwgZQxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAw +DgYDVQQHDAdCb3plbWFuMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtQcm9n +cmFtbWluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkB +FhBpbmZvQHdvbGZzc2wuY29tggkAlVgDSzZ/n9EwDAYDVR0TBAUwAwEB/zAJBgcq +hkjOPQQBA0gAMEUCIQClrR/bETKRjU6pJW2hr+UO9kcK8mr1syc+kzvWsqk/KgIg +VRMqHHdXPM7DqEPNeMuJMBGDmOYqR2c5OA9SlWE5ql0= -----END CERTIFICATE----- diff --git a/certs/renewcerts.sh b/certs/renewcerts.sh index 1c213f39f..1332e35d0 100755 --- a/certs/renewcerts.sh +++ b/certs/renewcerts.sh @@ -1,4 +1,23 @@ #!/bin/bash +# renewcerts.sh +# +# renews the following: +# client-cert.pem +# client-cert.der +# client-ecc-cert.pem +# ca-cert.pem +# ca-cert.der +# server-cert.pem +# server-cert.der +# server-ecc-rsa.pem +# crl/cliCrl.pem +# crl/crl.pem +# crl/crl.revoked +# crl/eccCliCRL.pem +# crl/eccSrvCRL.pem +# if HAVE_NTRU +# ntru-cert.pem +# ntru-key.raw ############################################################################### ######################## FUNCTIONS SECTION #################################### ############################################################################### @@ -70,6 +89,20 @@ function run_renewcerts(){ openssl x509 -in server-ecc-rsa.pem -text > tmp.pem mv tmp.pem server-ecc-rsa.pem + ############################################################ + ####### update the self-signed client-ecc-cert.pem ######### + ############################################################ + echo "Updating client-ecc-cert.pem" + echo "" + #pipe the following arguments to openssl req... + echo -e "US\nMontana\nBozeman\nwolfSSL\nProgramming\nwww.wolfssl.com\ninfo@wolfssl.com\n.\n.\n" | openssl req -new -key ecc-client-key.pem -nodes -out client-ecc-cert.csr + + + openssl x509 -req -in client-ecc-cert.csr -days 1000 -extfile wolfssl.cnf -extensions wolfssl_opts -signkey ecc-client-key.pem -out client-ecc-cert.pem + rm client-ecc-cert.csr + + openssl x509 -in client-ecc-cert.pem -text > tmp.pem + mv tmp.pem client-ecc-cert.pem ############################################################ ########## make .der files from .pem files ################# @@ -225,7 +258,7 @@ else echo "" move_ntru - + echo "ntru-certs, and ntru-key.raw have been updated" echo "" diff --git a/cyassl/certs_test.h b/cyassl/certs_test.h index ce3fb53a4..c8465ac85 100644 --- a/cyassl/certs_test.h +++ b/cyassl/certs_test.h @@ -1,3 +1,10 @@ /* certs_test.h */ #include + +#ifndef CYASSL_CERTS_TEST_H + #define CYASSL_CERTS_TEST_H WOLFSSL_CERTS_TEST_H +#else + #undef CYASSL_CERTS_TEST_H + #define CYASSL_CERTS_TEST_H WOLFSSL_CERTS_TEST_H +#endif diff --git a/cyassl/ctaocrypt/settings_comp.h b/cyassl/ctaocrypt/settings_comp.h index 041c6594f..89278a2db 100644 --- a/cyassl/ctaocrypt/settings_comp.h +++ b/cyassl/ctaocrypt/settings_comp.h @@ -35,6 +35,9 @@ #endif /* have rsa and HAVE_FIPS */ /* Macro redefinitions for compatibility */ +#ifdef HAVE_NTRU + #define MakeNtruCert wc_MakeNtruCert +#endif #if defined(WOLFSSL_SHA512) && !defined(CYASSL_SHA512) #define CYASSL_SHA512 #endif diff --git a/gencertbuf.pl b/gencertbuf.pl index 01ef9c70f..257b17b0b 100755 --- a/gencertbuf.pl +++ b/gencertbuf.pl @@ -13,7 +13,7 @@ use warnings; # ---- SCRIPT SETTINGS ------------------------------------------------------- # output C header file to write cert/key buffers to -my $outputFile = "./cyassl/certs_test.h"; +my $outputFile = "./wolfssl/certs_test.h"; # 1024-bit certs/keys to be converted # Used with USE_CERT_BUFFERS_1024 define. @@ -49,8 +49,8 @@ my $num_2048 = @fileList_2048; open OUT_FILE, "+>", $outputFile or die $!; print OUT_FILE "/* certs_test.h */\n\n"; -print OUT_FILE "#ifndef CYASSL_CERTS_TEST_H\n"; -print OUT_FILE "#define CYASSL_CERTS_TEST_H\n\n"; +print OUT_FILE "#ifndef WOLFSSL_CERTS_TEST_H\n"; +print OUT_FILE "#define WOLFSSL_CERTS_TEST_H\n\n"; # convert and print 1024-bit cert/keys print OUT_FILE "#ifdef USE_CERT_BUFFERS_1024\n\n"; diff --git a/wolfcrypt/src/asn.c b/wolfcrypt/src/asn.c index 37387dbb8..13cfb6c25 100644 --- a/wolfcrypt/src/asn.c +++ b/wolfcrypt/src/asn.c @@ -5827,7 +5827,7 @@ int wc_MakeCert(Cert* cert, byte* derBuffer, word32 derSz, RsaKey* rsaKey, #ifdef HAVE_NTRU -int MakeNtruCert(Cert* cert, byte* derBuffer, word32 derSz, +int wc_MakeNtruCert(Cert* cert, byte* derBuffer, word32 derSz, const byte* ntruKey, word16 keySz, RNG* rng) { return MakeAnyCert(cert, derBuffer, derSz, NULL, NULL, rng, ntruKey, keySz); diff --git a/wolfcrypt/test/test.c b/wolfcrypt/test/test.c index 7b3e2c5a2..3d1a7a881 100644 --- a/wolfcrypt/test/test.c +++ b/wolfcrypt/test/test.c @@ -3793,7 +3793,7 @@ int rsa_test(void) free(pem); return -453; } - ret = RsaPrivateKeyDecode(tmp, &idx3, &caKey, (word32)bytes); + ret = wc_RsaPrivateKeyDecode(tmp, &idx3, &caKey, (word32)bytes); if (ret != 0) { free(derCert); free(pem); @@ -3818,7 +3818,7 @@ int rsa_test(void) return -455; } - certSz = MakeNtruCert(&myCert, derCert, FOURK_BUF, public_key, + certSz = wc_MakeNtruCert(&myCert, derCert, FOURK_BUF, public_key, public_key_len, &rng); if (certSz < 0) { free(derCert); diff --git a/wolfssl/certs_test.h b/wolfssl/certs_test.h index 665ff75d1..95bec9356 100644 --- a/wolfssl/certs_test.h +++ b/wolfssl/certs_test.h @@ -424,8 +424,8 @@ const int sizeof_client_key_der_2048 = sizeof(client_key_der_2048); const unsigned char client_cert_der_2048[] = { 0x30, 0x82, 0x04, 0xAA, 0x30, 0x82, 0x03, 0x92, 0xA0, 0x03, - 0x02, 0x01, 0x02, 0x02, 0x09, 0x00, 0xB6, 0x63, 0xAF, 0x8F, - 0x5D, 0x62, 0x57, 0xA0, 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, + 0x02, 0x01, 0x02, 0x02, 0x09, 0x00, 0xCE, 0xF3, 0x95, 0x66, + 0x10, 0xDB, 0xD0, 0xFF, 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, 0x05, 0x00, 0x30, 0x81, 0x94, 0x31, 0x0B, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x55, 0x53, 0x31, 0x10, 0x30, 0x0E, 0x06, @@ -442,10 +442,10 @@ const unsigned char client_cert_der_2048[] = 0x1D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, 0x16, 0x10, 0x69, 0x6E, 0x66, 0x6F, 0x40, 0x77, 0x6F, 0x6C, 0x66, 0x73, 0x73, 0x6C, 0x2E, 0x63, 0x6F, 0x6D, - 0x30, 0x1E, 0x17, 0x0D, 0x31, 0x34, 0x30, 0x37, 0x31, 0x31, - 0x31, 0x37, 0x33, 0x39, 0x34, 0x34, 0x5A, 0x17, 0x0D, 0x31, - 0x37, 0x30, 0x34, 0x30, 0x36, 0x31, 0x37, 0x33, 0x39, 0x34, - 0x34, 0x5A, 0x30, 0x81, 0x94, 0x31, 0x0B, 0x30, 0x09, 0x06, + 0x30, 0x1E, 0x17, 0x0D, 0x31, 0x35, 0x30, 0x32, 0x30, 0x32, + 0x31, 0x35, 0x35, 0x39, 0x34, 0x36, 0x5A, 0x17, 0x0D, 0x31, + 0x37, 0x31, 0x30, 0x32, 0x39, 0x31, 0x35, 0x35, 0x39, 0x34, + 0x36, 0x5A, 0x30, 0x81, 0x94, 0x31, 0x0B, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x55, 0x53, 0x31, 0x10, 0x30, 0x0E, 0x06, 0x03, 0x55, 0x04, 0x08, 0x0C, 0x07, 0x4D, 0x6F, 0x6E, 0x74, 0x61, 0x6E, 0x61, 0x31, 0x10, 0x30, 0x0E, @@ -513,36 +513,36 @@ const unsigned char client_cert_der_2048[] = 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, 0x16, 0x10, 0x69, 0x6E, 0x66, 0x6F, 0x40, 0x77, 0x6F, 0x6C, 0x66, 0x73, 0x73, 0x6C, 0x2E, 0x63, 0x6F, 0x6D, 0x82, 0x09, 0x00, - 0xB6, 0x63, 0xAF, 0x8F, 0x5D, 0x62, 0x57, 0xA0, 0x30, 0x0C, + 0xCE, 0xF3, 0x95, 0x66, 0x10, 0xDB, 0xD0, 0xFF, 0x30, 0x0C, 0x06, 0x03, 0x55, 0x1D, 0x13, 0x04, 0x05, 0x30, 0x03, 0x01, 0x01, 0xFF, 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, 0x05, 0x00, 0x03, 0x82, 0x01, - 0x01, 0x00, 0x85, 0x10, 0x90, 0xC5, 0x5D, 0xDE, 0x25, 0x8C, - 0xF2, 0x57, 0x7B, 0x2D, 0x14, 0x1C, 0x05, 0xF9, 0x71, 0x63, - 0x40, 0xB0, 0xE3, 0xC1, 0xC1, 0x2E, 0x13, 0x2A, 0x7A, 0xB7, - 0xD6, 0x24, 0x58, 0x87, 0xEB, 0x03, 0xFB, 0x0D, 0xAF, 0xE0, - 0xF4, 0xD0, 0xC8, 0xBC, 0x51, 0x36, 0x10, 0x4F, 0x79, 0xCC, - 0x4F, 0x66, 0x7D, 0xAF, 0x99, 0xCB, 0x7B, 0xCE, 0x68, 0x94, - 0xC6, 0x36, 0xAA, 0x42, 0x6E, 0x8C, 0x78, 0x5B, 0xB2, 0x85, - 0xCA, 0xD1, 0xE1, 0xA8, 0x31, 0xD1, 0x81, 0xD9, 0xF9, 0xC1, - 0xA3, 0x9E, 0x34, 0x43, 0xEF, 0x0A, 0x79, 0x7D, 0x3E, 0x83, - 0x61, 0xFC, 0x14, 0x5C, 0xD1, 0xDD, 0xBC, 0x0E, 0xD7, 0x51, - 0xB7, 0x71, 0x6E, 0x41, 0x7E, 0x8B, 0x2C, 0x5A, 0x9A, 0xCB, - 0x77, 0x4B, 0x6A, 0xF5, 0x06, 0xFF, 0x02, 0xAF, 0x1E, 0xE6, - 0x63, 0x4F, 0xBC, 0x44, 0xD9, 0x3F, 0x56, 0x9E, 0x09, 0x9C, - 0x43, 0xF9, 0x55, 0x21, 0x32, 0x46, 0x82, 0x09, 0x86, 0xA9, - 0x7B, 0x74, 0x1C, 0x9E, 0x5A, 0x2A, 0xBF, 0x03, 0x79, 0x91, - 0xCB, 0xF2, 0x29, 0x7F, 0xC9, 0x15, 0x82, 0x89, 0xB9, 0x53, - 0xCD, 0x7E, 0x07, 0x90, 0xA9, 0x5D, 0x76, 0xE1, 0x19, 0x5E, - 0x0D, 0x58, 0xB8, 0x59, 0xD5, 0x0D, 0xDF, 0x23, 0xAB, 0x6B, - 0x63, 0x76, 0x19, 0x9E, 0x9C, 0xDF, 0xB0, 0x57, 0x49, 0x6C, - 0xD0, 0x86, 0x97, 0xC3, 0x6C, 0x3C, 0xFA, 0xE0, 0x56, 0xC2, - 0x1B, 0xE3, 0xA1, 0x42, 0x1A, 0x58, 0x62, 0x85, 0x9D, 0x74, - 0x19, 0x83, 0x08, 0xAF, 0x59, 0x90, 0xF8, 0x99, 0xBD, 0x67, - 0xD3, 0x4A, 0xEA, 0x0E, 0xC9, 0xCA, 0x61, 0x8A, 0x0D, 0x8A, - 0x42, 0xCC, 0x90, 0xE9, 0x2E, 0xC2, 0x54, 0x73, 0x7F, 0x5E, - 0xAF, 0x8D, 0xE2, 0x32, 0xCB, 0x45, 0x20, 0xD6, 0x19, 0x4D, - 0x5B, 0x77, 0x31, 0xCC, 0x0F, 0x2D, 0xC0, 0x7E + 0x01, 0x00, 0xB1, 0x24, 0x1B, 0xB1, 0xE1, 0x92, 0xB9, 0xB8, + 0x7E, 0xA6, 0x79, 0x69, 0x12, 0x45, 0xF3, 0x53, 0xA9, 0xFE, + 0x3C, 0xF8, 0x39, 0x55, 0xC5, 0xB6, 0x34, 0xA3, 0xC0, 0x67, + 0x73, 0xAE, 0xDB, 0xB7, 0xD4, 0xE0, 0x70, 0x1A, 0xEE, 0xA2, + 0x2A, 0x72, 0xAD, 0x70, 0x8F, 0x49, 0xFE, 0x35, 0x5C, 0x7F, + 0x1C, 0xE7, 0x86, 0x96, 0x9E, 0xF3, 0x32, 0xC4, 0x34, 0x72, + 0xF5, 0xF3, 0x61, 0xE9, 0xA3, 0x34, 0xBF, 0xC3, 0x71, 0x31, + 0x83, 0x48, 0x28, 0x41, 0xB4, 0x3A, 0xA0, 0x3E, 0x03, 0x0F, + 0xD2, 0xF0, 0x3B, 0xD6, 0xBD, 0xF0, 0x2D, 0x9F, 0xE4, 0xFA, + 0xEF, 0xFA, 0x2A, 0x3A, 0x15, 0xE8, 0x50, 0x70, 0x50, 0xAA, + 0x55, 0xF8, 0xD1, 0x62, 0xA5, 0x99, 0xD3, 0x21, 0x82, 0x23, + 0xD6, 0xE5, 0x74, 0x6A, 0xE3, 0xC7, 0x00, 0x57, 0xE2, 0x1F, + 0xCB, 0xD6, 0x9B, 0xB1, 0xA0, 0x11, 0x8E, 0x9B, 0xF7, 0x58, + 0x4F, 0xEF, 0x91, 0x5B, 0x4D, 0x48, 0x26, 0x7F, 0xC2, 0xCF, + 0x7A, 0x3E, 0x41, 0x6E, 0x4B, 0x24, 0xFC, 0x38, 0x4F, 0x97, + 0x0E, 0xD6, 0x73, 0xEB, 0xBB, 0x9B, 0x31, 0x97, 0xE8, 0x54, + 0x62, 0x66, 0xC4, 0xEA, 0x93, 0x5A, 0x71, 0x36, 0x3C, 0xA5, + 0x4D, 0x9B, 0xB8, 0x31, 0xA6, 0x66, 0x7F, 0xEF, 0xD2, 0xA8, + 0x52, 0x6F, 0xE7, 0x29, 0xAD, 0xB7, 0x3D, 0x4F, 0x35, 0x40, + 0xF0, 0x14, 0xC7, 0xC7, 0xE5, 0xF3, 0x07, 0xEE, 0x77, 0x37, + 0x04, 0xBF, 0xCC, 0xDE, 0x74, 0x68, 0x2F, 0xAE, 0x4E, 0x76, + 0x6A, 0x89, 0xFD, 0x82, 0xEA, 0x35, 0xBF, 0x74, 0xD6, 0x6C, + 0xD8, 0xB3, 0x93, 0xA6, 0xFE, 0xC8, 0xAF, 0x3C, 0x6F, 0x8D, + 0xDC, 0xCC, 0xF9, 0x55, 0xF9, 0x3B, 0x1C, 0xF9, 0x22, 0xBB, + 0xBA, 0xEE, 0x55, 0x82, 0x17, 0xD7, 0x54, 0x87, 0x9C, 0x33, + 0x11, 0x34, 0x1A, 0xC8, 0x40, 0x06, 0x25, 0x79 }; const int sizeof_client_cert_der_2048 = sizeof(client_cert_der_2048); @@ -799,8 +799,8 @@ const int sizeof_rsa_key_der_2048 = sizeof(rsa_key_der_2048); const unsigned char ca_cert_der_2048[] = { 0x30, 0x82, 0x04, 0xAA, 0x30, 0x82, 0x03, 0x92, 0xA0, 0x03, - 0x02, 0x01, 0x02, 0x02, 0x09, 0x00, 0x9A, 0x41, 0x47, 0xCD, - 0xA1, 0x14, 0x62, 0x8C, 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, + 0x02, 0x01, 0x02, 0x02, 0x09, 0x00, 0xB0, 0x09, 0x88, 0x5C, + 0x39, 0x56, 0xA5, 0x81, 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, 0x05, 0x00, 0x30, 0x81, 0x94, 0x31, 0x0B, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x55, 0x53, 0x31, 0x10, 0x30, 0x0E, 0x06, @@ -817,10 +817,10 @@ const unsigned char ca_cert_der_2048[] = 0x1D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, 0x16, 0x10, 0x69, 0x6E, 0x66, 0x6F, 0x40, 0x77, 0x6F, 0x6C, 0x66, 0x73, 0x73, 0x6C, 0x2E, 0x63, 0x6F, 0x6D, - 0x30, 0x1E, 0x17, 0x0D, 0x31, 0x34, 0x30, 0x37, 0x31, 0x31, - 0x30, 0x33, 0x32, 0x30, 0x30, 0x38, 0x5A, 0x17, 0x0D, 0x31, - 0x37, 0x30, 0x34, 0x30, 0x36, 0x30, 0x33, 0x32, 0x30, 0x30, - 0x38, 0x5A, 0x30, 0x81, 0x94, 0x31, 0x0B, 0x30, 0x09, 0x06, + 0x30, 0x1E, 0x17, 0x0D, 0x31, 0x35, 0x30, 0x32, 0x30, 0x32, + 0x31, 0x35, 0x35, 0x39, 0x34, 0x36, 0x5A, 0x17, 0x0D, 0x31, + 0x37, 0x31, 0x30, 0x32, 0x39, 0x31, 0x35, 0x35, 0x39, 0x34, + 0x36, 0x5A, 0x30, 0x81, 0x94, 0x31, 0x0B, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x55, 0x53, 0x31, 0x10, 0x30, 0x0E, 0x06, 0x03, 0x55, 0x04, 0x08, 0x0C, 0x07, 0x4D, 0x6F, 0x6E, 0x74, 0x61, 0x6E, 0x61, 0x31, 0x10, 0x30, 0x0E, @@ -888,36 +888,36 @@ const unsigned char ca_cert_der_2048[] = 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, 0x16, 0x10, 0x69, 0x6E, 0x66, 0x6F, 0x40, 0x77, 0x6F, 0x6C, 0x66, 0x73, 0x73, 0x6C, 0x2E, 0x63, 0x6F, 0x6D, 0x82, 0x09, 0x00, - 0x9A, 0x41, 0x47, 0xCD, 0xA1, 0x14, 0x62, 0x8C, 0x30, 0x0C, + 0xB0, 0x09, 0x88, 0x5C, 0x39, 0x56, 0xA5, 0x81, 0x30, 0x0C, 0x06, 0x03, 0x55, 0x1D, 0x13, 0x04, 0x05, 0x30, 0x03, 0x01, 0x01, 0xFF, 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, 0x05, 0x00, 0x03, 0x82, 0x01, - 0x01, 0x00, 0x79, 0x78, 0x0C, 0x6D, 0x79, 0x88, 0x91, 0xFC, - 0x3A, 0x15, 0x9C, 0xF9, 0x27, 0x62, 0x16, 0xF0, 0x21, 0x1F, - 0xFA, 0x7D, 0x3F, 0xA2, 0xA8, 0x32, 0x1E, 0xF7, 0xF2, 0x11, - 0xA9, 0x74, 0x16, 0x74, 0x5E, 0xDC, 0x18, 0xCA, 0xF0, 0x00, - 0x2A, 0xD5, 0x03, 0x06, 0x26, 0x30, 0xF1, 0x47, 0x83, 0xFD, - 0x32, 0x6E, 0xFC, 0xED, 0xAA, 0x4F, 0x7D, 0x0C, 0x63, 0x60, - 0x31, 0x2F, 0x7C, 0x0C, 0xBF, 0x99, 0x66, 0x87, 0xED, 0x27, - 0x08, 0x86, 0x2D, 0xC4, 0x33, 0xE8, 0x98, 0x23, 0x1C, 0xFE, - 0xA3, 0xDB, 0x9A, 0x49, 0x4E, 0xFC, 0x5A, 0x42, 0xEF, 0x71, - 0xC3, 0x3F, 0xAD, 0xDC, 0x4A, 0xA8, 0xD2, 0xA3, 0x1D, 0x09, - 0xAC, 0x33, 0x04, 0x7B, 0x86, 0xF3, 0x6D, 0x00, 0x59, 0xA3, - 0xC8, 0xDB, 0xD1, 0x3C, 0x73, 0xF6, 0x0E, 0x90, 0xD6, 0x5E, - 0x49, 0xE0, 0xBF, 0x36, 0x63, 0x08, 0x7B, 0xA5, 0xB0, 0x8F, - 0x35, 0x3B, 0x56, 0x8C, 0x11, 0x35, 0x49, 0x04, 0x1C, 0xD0, - 0xE7, 0xBA, 0x56, 0xC5, 0x0D, 0x0A, 0x91, 0x8D, 0xD6, 0xB7, - 0x62, 0x19, 0x34, 0x12, 0x52, 0x4C, 0xD2, 0x6D, 0x7C, 0xC5, - 0x3D, 0x0F, 0x18, 0x81, 0x54, 0xCB, 0xF6, 0x3C, 0xE5, 0x84, - 0xD2, 0xD6, 0x71, 0x15, 0xEC, 0x1A, 0x34, 0x0B, 0xF0, 0xA0, - 0x21, 0x74, 0x43, 0xC8, 0xA3, 0xB0, 0xDF, 0xD9, 0x67, 0xDA, - 0xE2, 0xAD, 0x93, 0x48, 0xF8, 0xA0, 0x87, 0xBD, 0x79, 0x14, - 0xE0, 0x62, 0x0A, 0xDF, 0xF7, 0x31, 0x2E, 0x31, 0x7B, 0xD1, - 0x32, 0x2A, 0x0A, 0xFE, 0x5D, 0x14, 0xEF, 0xD9, 0x64, 0x50, - 0xE4, 0x83, 0x91, 0xBC, 0x70, 0x0D, 0xD7, 0x88, 0x8D, 0xD9, - 0xBC, 0x84, 0x0E, 0xC5, 0x1A, 0xB3, 0xBF, 0x64, 0x02, 0x4E, - 0x51, 0x91, 0xA4, 0xA2, 0x85, 0x15, 0x83, 0xAF, 0xF0, 0x5B, - 0x9B, 0x28, 0x49, 0x5F, 0xB2, 0xB3, 0x03, 0xD8 + 0x01, 0x00, 0x06, 0x13, 0x32, 0x71, 0x02, 0x38, 0xFD, 0x6E, + 0x38, 0xCA, 0x3E, 0x8C, 0x4D, 0x1D, 0xD3, 0xF2, 0xB2, 0x37, + 0x6A, 0x70, 0x0A, 0xAB, 0xAC, 0xFA, 0xC0, 0xCB, 0x69, 0xDF, + 0xD9, 0x66, 0xA3, 0x67, 0x54, 0x2B, 0x00, 0x31, 0xCA, 0xD3, + 0x88, 0x88, 0x4D, 0xCE, 0xC0, 0xCC, 0xA4, 0xD3, 0x5B, 0x4C, + 0x6A, 0x30, 0x3F, 0x88, 0xF6, 0x49, 0x3B, 0x91, 0x83, 0x06, + 0x38, 0x4C, 0xB4, 0xE3, 0x80, 0xE9, 0x20, 0x26, 0x03, 0x4D, + 0x10, 0x4B, 0xA7, 0xB0, 0x46, 0x15, 0x9A, 0xDA, 0xEC, 0x08, + 0xE9, 0x13, 0x00, 0x26, 0x2B, 0xFE, 0x5C, 0x57, 0xAF, 0x8E, + 0x4D, 0xE4, 0x47, 0xE6, 0xB9, 0xA9, 0x20, 0x44, 0xBA, 0x21, + 0x4B, 0x0B, 0xCB, 0x3E, 0x7D, 0x0D, 0x65, 0x76, 0x2C, 0x51, + 0xA2, 0xF4, 0xB8, 0x6E, 0xA0, 0x3D, 0x69, 0x9F, 0x97, 0xAB, + 0xAE, 0xCC, 0x3A, 0xE5, 0x53, 0x54, 0xD8, 0xC6, 0xDD, 0x05, + 0x30, 0xBE, 0xA9, 0x30, 0xD0, 0xB3, 0x8B, 0x49, 0xB6, 0xD0, + 0xD0, 0xC5, 0x09, 0x47, 0x0C, 0x9E, 0x79, 0xA3, 0x2C, 0x28, + 0xB3, 0x0A, 0x64, 0xFC, 0x17, 0x89, 0x32, 0x35, 0x18, 0xBA, + 0xCF, 0x92, 0x3A, 0x8B, 0x12, 0x7A, 0xF2, 0xA9, 0x38, 0xF8, + 0x8C, 0x1A, 0x26, 0x83, 0x9B, 0x42, 0xD8, 0xA5, 0x5A, 0x7E, + 0x91, 0xEA, 0x12, 0x35, 0xF5, 0xB1, 0xCB, 0x8F, 0x73, 0x6F, + 0x4C, 0x1A, 0xFF, 0x3F, 0xFC, 0xFB, 0x08, 0x9B, 0xC3, 0x61, + 0x74, 0x0F, 0x8B, 0x39, 0x75, 0x5B, 0x0D, 0x2D, 0x71, 0xF9, + 0xA5, 0xA6, 0xC3, 0xE8, 0xCE, 0x46, 0x33, 0x0E, 0x47, 0xA4, + 0x50, 0x54, 0xE4, 0x87, 0xFA, 0xE4, 0x7E, 0xAE, 0xB1, 0x5C, + 0x3B, 0x64, 0xD6, 0x68, 0xB8, 0x30, 0x15, 0xFC, 0xD3, 0xD4, + 0xF2, 0x1B, 0xCC, 0x33, 0x66, 0x3B, 0x03, 0x4C, 0x68, 0x1C, + 0xCA, 0x1A, 0xBA, 0x1D, 0x30, 0x7F, 0x68, 0xF3 }; const int sizeof_ca_cert_der_2048 = sizeof(ca_cert_der_2048); @@ -1068,10 +1068,10 @@ const unsigned char server_cert_der_2048[] = 0x1F, 0x30, 0x1D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, 0x16, 0x10, 0x69, 0x6E, 0x66, 0x6F, 0x40, 0x77, 0x6F, 0x6C, 0x66, 0x73, 0x73, 0x6C, 0x2E, 0x63, - 0x6F, 0x6D, 0x30, 0x1E, 0x17, 0x0D, 0x31, 0x34, 0x30, 0x37, - 0x31, 0x31, 0x31, 0x37, 0x32, 0x30, 0x31, 0x34, 0x5A, 0x17, - 0x0D, 0x31, 0x37, 0x30, 0x34, 0x30, 0x36, 0x31, 0x37, 0x32, - 0x30, 0x31, 0x34, 0x5A, 0x30, 0x81, 0x90, 0x31, 0x0B, 0x30, + 0x6F, 0x6D, 0x30, 0x1E, 0x17, 0x0D, 0x31, 0x35, 0x30, 0x32, + 0x30, 0x32, 0x31, 0x35, 0x35, 0x39, 0x34, 0x36, 0x5A, 0x17, + 0x0D, 0x31, 0x37, 0x31, 0x30, 0x32, 0x39, 0x31, 0x35, 0x35, + 0x39, 0x34, 0x36, 0x5A, 0x30, 0x81, 0x90, 0x31, 0x0B, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x55, 0x53, 0x31, 0x10, 0x30, 0x0E, 0x06, 0x03, 0x55, 0x04, 0x08, 0x0C, 0x07, 0x4D, 0x6F, 0x6E, 0x74, 0x61, 0x6E, 0x61, 0x31, 0x10, @@ -1138,41 +1138,41 @@ const unsigned char server_cert_der_2048[] = 0x6F, 0x6D, 0x31, 0x1F, 0x30, 0x1D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, 0x16, 0x10, 0x69, 0x6E, 0x66, 0x6F, 0x40, 0x77, 0x6F, 0x6C, 0x66, 0x73, 0x73, - 0x6C, 0x2E, 0x63, 0x6F, 0x6D, 0x82, 0x09, 0x00, 0x9A, 0x41, - 0x47, 0xCD, 0xA1, 0x14, 0x62, 0x8C, 0x30, 0x0C, 0x06, 0x03, + 0x6C, 0x2E, 0x63, 0x6F, 0x6D, 0x82, 0x09, 0x00, 0xB0, 0x09, + 0x88, 0x5C, 0x39, 0x56, 0xA5, 0x81, 0x30, 0x0C, 0x06, 0x03, 0x55, 0x1D, 0x13, 0x04, 0x05, 0x30, 0x03, 0x01, 0x01, 0xFF, 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, 0x05, 0x00, 0x03, 0x82, 0x01, 0x01, 0x00, - 0x3D, 0x8C, 0x70, 0x05, 0x5B, 0x62, 0x4B, 0xBF, 0x6C, 0xB6, - 0x48, 0x61, 0x01, 0x10, 0x1D, 0x5E, 0x05, 0xBA, 0x55, 0x94, - 0x2C, 0xAE, 0x59, 0x6F, 0x97, 0x80, 0x5D, 0x6C, 0x86, 0xEC, - 0x9A, 0xEB, 0x15, 0x45, 0x44, 0xE4, 0x56, 0xF8, 0x75, 0xCA, - 0x8A, 0x45, 0x32, 0xF4, 0xC7, 0xE1, 0xFA, 0xF2, 0x98, 0x1C, - 0x91, 0xD3, 0x3F, 0xE8, 0x0E, 0xC9, 0x1B, 0xFA, 0xE1, 0x79, - 0x99, 0x67, 0x0E, 0x0D, 0x6B, 0x8A, 0xEC, 0x1A, 0x2C, 0x59, - 0xC4, 0x34, 0x04, 0x8D, 0x39, 0x77, 0xCD, 0xB5, 0xE9, 0x60, - 0x5B, 0x82, 0xBF, 0x34, 0xCE, 0xED, 0xC6, 0x4F, 0x3F, 0xB4, - 0x5C, 0x4D, 0x8A, 0xB4, 0xF4, 0x0A, 0x04, 0x12, 0xA0, 0x56, - 0xC1, 0xE1, 0x33, 0x37, 0xA1, 0x54, 0x87, 0x48, 0xE9, 0x81, - 0xC2, 0x0F, 0x8F, 0x6F, 0xD3, 0x52, 0x4C, 0x4C, 0x32, 0x4C, - 0x6B, 0x9F, 0x3A, 0x04, 0x8F, 0x77, 0x5D, 0xAD, 0xDC, 0x3D, - 0x2B, 0xF2, 0xC9, 0xDF, 0x3C, 0x60, 0x5D, 0xD8, 0xFC, 0x86, - 0x72, 0x7C, 0x3D, 0xD0, 0x84, 0x4B, 0x8C, 0xDF, 0x26, 0x43, - 0xFE, 0xC0, 0xCC, 0x5B, 0xE1, 0x36, 0xB3, 0x3D, 0x32, 0x28, - 0xA3, 0xEF, 0x0C, 0x20, 0xD6, 0xB1, 0x50, 0x39, 0xD6, 0x67, - 0xA9, 0x8B, 0x84, 0xBC, 0x92, 0x34, 0xEB, 0x19, 0x23, 0xE8, - 0x10, 0x8F, 0xEA, 0xBD, 0x18, 0x8C, 0x93, 0x27, 0x3C, 0x74, - 0x75, 0x8E, 0x58, 0x04, 0xFA, 0x2A, 0x74, 0x44, 0x7D, 0xFC, - 0x4D, 0x39, 0xDF, 0x54, 0x17, 0xBA, 0x78, 0xE1, 0x5D, 0x6A, - 0x70, 0xD3, 0x7C, 0xA2, 0x80, 0x81, 0xE6, 0x19, 0x51, 0x91, - 0xC3, 0x44, 0x51, 0xEC, 0xBB, 0x88, 0xA9, 0x53, 0xE1, 0xD7, - 0xA9, 0x8C, 0x28, 0xF4, 0x21, 0x1C, 0x42, 0x51, 0x09, 0xB4, - 0x12, 0x6D, 0xA0, 0xD6, 0x25, 0x09, 0x85, 0xC6, 0x2A, 0x0C, - 0xAF, 0xA7, 0x58, 0xE6, 0x52, 0x8B + 0x2E, 0xB6, 0x14, 0x23, 0x9F, 0xD2, 0xB6, 0x42, 0xB9, 0x5A, + 0x4B, 0x54, 0x09, 0xD9, 0x44, 0xE6, 0x29, 0x5D, 0x94, 0xE3, + 0xE4, 0xC5, 0xCE, 0x06, 0x41, 0x02, 0xFB, 0x03, 0x6B, 0x44, + 0xA6, 0xA4, 0x85, 0xF3, 0x33, 0x00, 0xC4, 0x29, 0xD8, 0x10, + 0x23, 0xE2, 0xCB, 0x73, 0xDB, 0x02, 0x16, 0x23, 0x23, 0x9B, + 0xF3, 0x2F, 0x7C, 0x02, 0x6B, 0xF3, 0x74, 0x41, 0xD8, 0x96, + 0xD4, 0x27, 0x54, 0xB5, 0x46, 0x25, 0xFE, 0xD3, 0x78, 0xBD, + 0x5E, 0xC8, 0x1F, 0xE2, 0xE1, 0xF3, 0xD1, 0x65, 0xE9, 0x0A, + 0x58, 0xD7, 0xD2, 0x9D, 0xB3, 0x05, 0x2B, 0xF0, 0x29, 0x5C, + 0xB3, 0x0B, 0xF5, 0xBE, 0x02, 0xC0, 0x1A, 0x82, 0xD1, 0x4E, + 0x6B, 0xF6, 0x9B, 0x6B, 0x43, 0xD1, 0xA9, 0x79, 0x3F, 0xF3, + 0x5A, 0xA7, 0x93, 0x4B, 0xA0, 0x0D, 0xE5, 0x75, 0x47, 0xC8, + 0x19, 0x12, 0x58, 0xED, 0x90, 0x59, 0x8B, 0x42, 0x24, 0x4B, + 0x16, 0x66, 0x20, 0x8F, 0x4A, 0xB8, 0xCA, 0x8D, 0x97, 0x97, + 0x12, 0xA7, 0x30, 0x1B, 0x8F, 0x05, 0xAF, 0x0C, 0x18, 0xDD, + 0xBE, 0x3C, 0x03, 0xC2, 0xA3, 0x14, 0x1D, 0x17, 0xDB, 0xFB, + 0xB2, 0x70, 0xB0, 0x21, 0xDB, 0x16, 0x41, 0xEC, 0x45, 0xA3, + 0x4C, 0x42, 0x4F, 0x07, 0xB4, 0x11, 0x9F, 0x9D, 0xBA, 0xD2, + 0xCE, 0x5C, 0xAE, 0xDB, 0x0B, 0xA4, 0xC0, 0x12, 0x94, 0x86, + 0x24, 0xCC, 0x69, 0x8C, 0x53, 0xE6, 0xB0, 0x8A, 0xAC, 0x3D, + 0xC4, 0xEB, 0xEE, 0xDF, 0xE8, 0x46, 0x58, 0xB5, 0xAF, 0x1E, + 0xD5, 0x21, 0x51, 0x27, 0xEF, 0x02, 0x7B, 0xF4, 0x07, 0x05, + 0x10, 0x82, 0x4F, 0xA9, 0x12, 0xCB, 0xD1, 0x5C, 0x5A, 0xB5, + 0x33, 0xBC, 0xEE, 0x72, 0xE0, 0x90, 0x7A, 0xBD, 0x53, 0x3E, + 0xF1, 0x63, 0xEE, 0x0F, 0xA3, 0x54, 0x8C, 0x4A, 0x1E, 0xC4, + 0xF5, 0x6A, 0x2E, 0x07, 0xD1, 0x62 }; const int sizeof_server_cert_der_2048 = sizeof(server_cert_der_2048); #endif /* USE_CERT_BUFFERS_1024 */ -#endif /* WOLFSSL_CERTS_TEST_H */ +#endif /* CYASSL_CERTS_TEST_H */ From c840c0ba3e6a09f2d9a7aec953f809746600de29 Mon Sep 17 00:00:00 2001 From: kaleb-himes Date: Mon, 2 Feb 2015 09:19:00 -0700 Subject: [PATCH 05/11] endif comment update --- wolfssl/certs_test.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/wolfssl/certs_test.h b/wolfssl/certs_test.h index 95bec9356..382605fa2 100644 --- a/wolfssl/certs_test.h +++ b/wolfssl/certs_test.h @@ -1174,5 +1174,5 @@ const int sizeof_server_cert_der_2048 = sizeof(server_cert_der_2048); #endif /* USE_CERT_BUFFERS_1024 */ -#endif /* CYASSL_CERTS_TEST_H */ +#endif /* WOLFSSL_CERTS_TEST_H */ From 9261aa1d6d1920ba60bdd85c0db6756a39cc27e2 Mon Sep 17 00:00:00 2001 From: kaleb-himes Date: Mon, 2 Feb 2015 11:24:30 -0700 Subject: [PATCH 06/11] crls updated --- certs/crl/cliCrl.pem | 52 +++++++++++++++++++++---------------------- certs/crl/crl.pem | 50 ++++++++++++++++++++--------------------- certs/crl/crl.revoked | 46 ++++++++++++++++++++++++++++++-------- certs/crl/gencrls.sh | 10 ++++----- 4 files changed, 93 insertions(+), 65 deletions(-) diff --git a/certs/crl/cliCrl.pem b/certs/crl/cliCrl.pem index 8915758bb..0d285037e 100644 --- a/certs/crl/cliCrl.pem +++ b/certs/crl/cliCrl.pem @@ -2,38 +2,38 @@ Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: sha1WithRSAEncryption Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Programming/CN=www.wolfssl.com/emailAddress=info@wolfssl.com - Last Update: Jul 11 20:39:48 2014 GMT - Next Update: Jul 11 20:39:48 2015 GMT + Last Update: Feb 2 18:17:42 2015 GMT + Next Update: Oct 29 18:17:42 2017 GMT CRL extensions: X509v3 CRL Number: - 2 + 3 No Revoked Certificates. Signature Algorithm: sha1WithRSAEncryption - 35:c1:34:91:04:d9:88:99:83:40:ef:09:ee:04:28:91:be:7a: - b1:84:48:f4:f8:c5:9d:50:6c:67:56:4c:ee:b2:3a:32:5c:1d: - 1c:49:ef:58:72:a7:69:71:9a:d8:a6:68:0c:3e:ff:48:15:c7: - 44:28:67:6b:34:9d:c0:dc:c5:1b:d1:2f:e6:90:0f:45:7c:aa: - 0c:f9:3c:19:dd:55:a0:92:8a:a0:fe:93:1d:1f:42:ae:5f:7c: - 48:a5:de:61:89:94:bf:43:d3:c1:2d:e8:8b:f9:c5:6e:b9:8a: - 40:0e:6e:32:5e:39:83:cb:9b:76:6b:de:6e:6c:da:4e:1e:5c: - 69:d6:8c:08:0e:9f:de:4e:77:9d:f5:e9:97:29:b3:4c:e0:cb: - ed:46:68:ed:e1:89:ac:d7:b9:11:ca:5a:ed:fe:e3:73:20:6e: - 01:e6:77:a8:48:c7:01:83:40:25:a5:ee:d7:ef:2f:af:b8:e2: - 2d:85:37:2a:80:8f:7f:6a:a7:32:29:86:42:66:40:d7:eb:87: - 44:66:54:5f:04:5f:7b:22:14:6c:4c:5d:f0:57:ac:33:e0:da: - 53:d6:13:52:ea:85:b2:89:de:41:e6:a6:f5:0d:34:47:37:75: - 26:b8:c4:f3:e0:1b:c6:32:3f:3b:65:0a:20:08:8e:c7:7e:6d: - 61:f1:aa:eb + 3d:4b:e6:b5:04:8a:9c:26:d1:cb:c2:ce:12:bd:63:8e:23:91: + 23:48:51:b8:70:48:02:32:a4:6a:b7:83:6d:3d:83:76:c4:3d: + a5:80:42:d7:72:94:3b:0d:e9:b2:9a:5f:47:56:2a:fa:b9:7f: + 46:0e:34:8f:e1:b5:47:1b:21:ca:ed:9a:eb:09:8a:d7:23:e8: + f7:58:61:19:82:79:ac:21:7e:56:15:fa:f4:a4:ec:a8:54:ae: + d7:33:e0:65:96:ff:d7:a9:f5:ad:a6:d4:83:ca:03:dd:92:f2: + 0a:e3:61:e2:7e:8e:3f:7f:67:80:4c:41:28:54:2c:c4:75:90: + dd:88:fe:3b:a8:c0:e5:55:a3:7b:83:ab:82:b7:7e:63:6e:78: + 5e:bd:ee:08:e1:5f:41:b6:d3:89:c9:6c:26:55:c7:e0:dd:8a: + e0:7f:cc:8c:7d:61:37:ab:32:0c:e2:0f:e0:64:80:a6:47:7b: + 31:db:8d:8d:fe:85:5c:bb:84:3d:66:10:ce:eb:f7:99:dd:7c: + c9:e1:5c:ef:8e:17:6b:a5:c3:5c:55:bb:f3:b1:d6:74:47:94: + 1f:d6:bd:27:88:80:94:70:16:58:d0:ce:cf:ea:91:ef:f2:77: + 46:f2:5a:38:48:5c:d7:ba:fb:50:26:3f:2d:8e:b6:1a:92:09: + e6:11:5e:71 -----BEGIN X509 CRL----- MIIB7jCB1wIBATANBgkqhkiG9w0BAQUFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xEDAOBgNVBAoMB3dvbGZTU0wx FDASBgNVBAsMC1Byb2dyYW1taW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x -HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE0MDcxMTIwMzk0OFoX -DTE1MDcxMTIwMzk0OFqgDjAMMAoGA1UdFAQDAgECMA0GCSqGSIb3DQEBBQUAA4IB -AQA1wTSRBNmImYNA7wnuBCiRvnqxhEj0+MWdUGxnVkzusjoyXB0cSe9YcqdpcZrY -pmgMPv9IFcdEKGdrNJ3A3MUb0S/mkA9FfKoM+TwZ3VWgkoqg/pMdH0KuX3xIpd5h -iZS/Q9PBLeiL+cVuuYpADm4yXjmDy5t2a95ubNpOHlxp1owIDp/eTned9emXKbNM -4MvtRmjt4Yms17kRylrt/uNzIG4B5neoSMcBg0Alpe7X7y+vuOIthTcqgI9/aqcy -KYZCZkDX64dEZlRfBF97IhRsTF3wV6wz4NpT1hNS6oWyid5B5qb1DTRHN3UmuMTz -4BvGMj87ZQogCI7Hfm1h8arr +HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwMjE4MTc0MloX +DTE3MTAyOTE4MTc0MlqgDjAMMAoGA1UdFAQDAgEDMA0GCSqGSIb3DQEBBQUAA4IB +AQA9S+a1BIqcJtHLws4SvWOOI5EjSFG4cEgCMqRqt4NtPYN2xD2lgELXcpQ7Demy +ml9HVir6uX9GDjSP4bVHGyHK7ZrrCYrXI+j3WGEZgnmsIX5WFfr0pOyoVK7XM+Bl +lv/XqfWtptSDygPdkvIK42Hifo4/f2eATEEoVCzEdZDdiP47qMDlVaN7g6uCt35j +bnheve4I4V9BttOJyWwmVcfg3Yrgf8yMfWE3qzIM4g/gZICmR3sx242N/oVcu4Q9 +ZhDO6/eZ3XzJ4VzvjhdrpcNcVbvzsdZ0R5Qf1r0niICUcBZY0M7P6pHv8ndG8lo4 +SFzXuvtQJj8tjrYakgnmEV5x -----END X509 CRL----- diff --git a/certs/crl/crl.pem b/certs/crl/crl.pem index f4e18434e..83666b80c 100644 --- a/certs/crl/crl.pem +++ b/certs/crl/crl.pem @@ -2,38 +2,38 @@ Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: sha1WithRSAEncryption Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com - Last Update: Jul 11 20:36:35 2014 GMT - Next Update: Jul 11 20:36:35 2015 GMT + Last Update: Feb 2 18:17:42 2015 GMT + Next Update: Oct 29 18:17:42 2017 GMT CRL extensions: X509v3 CRL Number: 1 No Revoked Certificates. Signature Algorithm: sha1WithRSAEncryption - b4:54:84:e9:f8:c3:5c:e4:c4:a1:9a:71:eb:bc:46:96:09:bd: - 84:9d:4c:ac:29:a8:23:12:9d:80:8e:18:30:85:92:94:72:04: - 6d:74:05:31:e0:1b:20:b1:ef:6f:44:98:e8:d4:20:74:b1:ec: - 9f:fe:ad:74:14:66:ad:6f:5b:7a:45:02:b5:6f:a8:d3:bd:dc: - 88:94:d1:e2:78:e1:11:44:95:57:7d:d9:8c:7e:09:dc:aa:4f: - 07:e0:59:f2:09:30:d5:7c:a0:6c:54:88:d0:76:88:33:11:61: - 20:9d:3d:89:49:3b:85:be:e7:c0:38:f1:08:be:44:7a:1d:4c: - e4:84:7a:40:23:6f:85:bd:67:7b:77:7e:00:78:d2:3c:e2:a8: - 47:ba:5c:21:c4:78:15:81:a2:9e:a6:9c:c4:47:4c:ee:97:81: - 18:91:5e:18:2b:92:e8:06:1f:dc:f2:51:e1:b3:14:bf:c3:c5: - 9c:78:ce:41:2e:61:0b:71:ad:ea:9e:2d:bb:2e:e4:98:a9:14: - 47:3f:00:65:4e:09:17:82:ee:be:ea:48:1e:2e:a5:92:64:ce: - e9:b1:ee:ce:01:5b:e8:e3:fe:ba:dd:8c:eb:ad:34:32:15:00: - 56:4d:fe:9d:60:bf:a1:cd:9e:1b:61:94:21:0a:b1:98:4f:ec: - c1:af:b3:dc + 78:4e:6d:3d:25:58:cf:eb:b5:7c:c3:3b:79:af:45:b8:8c:84: + 36:61:0e:b0:66:63:3b:7e:0f:f0:2a:09:6d:70:1b:5f:c6:ae: + 9d:42:c7:1f:d5:86:5c:7e:c5:63:e5:11:99:4b:42:a3:8e:40: + 07:93:27:83:01:ec:5e:a8:1a:88:d3:4d:41:9d:f4:10:e6:57: + 33:b9:6c:7b:ba:01:cc:17:6a:4b:2f:4f:20:39:2a:21:b9:15: + b4:a5:60:ca:f0:92:af:0b:bc:a1:df:06:b0:7a:49:d4:2c:0a: + 46:a5:0c:20:a6:00:7e:58:4a:5c:2a:44:c3:f0:31:9e:d0:e3: + ec:be:41:69:dc:32:f3:b3:a5:52:25:ed:5e:ad:3e:f9:38:65: + 55:72:65:61:7a:0c:2d:11:84:f7:b4:b4:36:f4:ba:fa:5f:b3: + a0:8a:09:6f:06:44:74:ac:40:f2:60:9e:37:96:68:49:fc:d1: + 2c:1d:98:1f:e1:d3:48:22:85:64:49:b2:05:2a:cf:47:b4:15: + 3d:e6:ae:d8:83:6e:e7:34:d3:fe:9b:89:b0:3d:cf:7e:3e:bf: + 75:7f:27:0d:cb:7b:63:a7:69:d1:31:8f:7f:99:b2:34:f8:09: + 60:37:2d:db:1c:65:5f:77:e5:e6:0d:a8:0c:ee:57:a6:65:df: + 98:3b:07:b8 -----BEGIN X509 CRL----- MIIB7jCB1wIBATANBgkqhkiG9w0BAQUFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3Ro MRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x -HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE0MDcxMTIwMzYzNVoX -DTE1MDcxMTIwMzYzNVqgDjAMMAoGA1UdFAQDAgEBMA0GCSqGSIb3DQEBBQUAA4IB -AQC0VITp+MNc5MShmnHrvEaWCb2EnUysKagjEp2AjhgwhZKUcgRtdAUx4Bsgse9v -RJjo1CB0seyf/q10FGatb1t6RQK1b6jTvdyIlNHieOERRJVXfdmMfgncqk8H4Fny -CTDVfKBsVIjQdogzEWEgnT2JSTuFvufAOPEIvkR6HUzkhHpAI2+FvWd7d34AeNI8 -4qhHulwhxHgVgaKeppzER0zul4EYkV4YK5LoBh/c8lHhsxS/w8WceM5BLmELca3q -ni27LuSYqRRHPwBlTgkXgu6+6kgeLqWSZM7pse7OAVvo4/663YzrrTQyFQBWTf6d -YL+hzZ4bYZQhCrGYT+zBr7Pc +HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwMjE4MTc0MloX +DTE3MTAyOTE4MTc0MlqgDjAMMAoGA1UdFAQDAgEBMA0GCSqGSIb3DQEBBQUAA4IB +AQB4Tm09JVjP67V8wzt5r0W4jIQ2YQ6wZmM7fg/wKgltcBtfxq6dQscf1YZcfsVj +5RGZS0KjjkAHkyeDAexeqBqI001BnfQQ5lczuWx7ugHMF2pLL08gOSohuRW0pWDK +8JKvC7yh3waweknULApGpQwgpgB+WEpcKkTD8DGe0OPsvkFp3DLzs6VSJe1erT75 +OGVVcmVhegwtEYT3tLQ29Lr6X7OgiglvBkR0rEDyYJ43lmhJ/NEsHZgf4dNIIoVk +SbIFKs9HtBU95q7Yg27nNNP+m4mwPc9+Pr91fycNy3tjp2nRMY9/mbI0+AlgNy3b +HGVfd+XmDagM7lemZd+YOwe4 -----END X509 CRL----- diff --git a/certs/crl/crl.revoked b/certs/crl/crl.revoked index 205acfe88..b60b06e41 100644 --- a/certs/crl/crl.revoked +++ b/certs/crl/crl.revoked @@ -1,13 +1,41 @@ +Certificate Revocation List (CRL): + Version 2 (0x1) + Signature Algorithm: sha1WithRSAEncryption + Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com + Last Update: Feb 2 18:17:42 2015 GMT + Next Update: Oct 29 18:17:42 2017 GMT + CRL extensions: + X509v3 CRL Number: + 2 +Revoked Certificates: + Serial Number: 01 + Revocation Date: Feb 2 18:17:42 2015 GMT + Signature Algorithm: sha1WithRSAEncryption + 05:a6:8a:d0:04:f9:2b:f8:43:7e:49:91:1a:9d:8b:7a:77:a0: + 10:fa:ee:32:84:2b:bc:38:f8:f4:29:93:70:2f:fe:c1:11:a8: + aa:d2:44:55:6e:39:65:e3:c7:6d:93:c3:cf:91:9f:30:13:62: + 12:d0:db:c0:1c:97:18:c7:7b:9a:47:2a:cc:3b:21:fe:5c:fa: + 73:71:d4:c8:f3:e1:08:7b:03:42:16:0d:46:c9:cc:dd:31:0a: + 78:8e:96:db:fa:5f:f6:f4:d9:08:f5:33:0b:c5:9e:cc:c9:0f: + dc:df:21:1c:01:3e:ee:d9:40:63:3b:fd:a4:01:f6:b8:b6:e5: + f1:af:9b:71:9d:01:15:84:92:f7:2b:63:ba:ac:ce:c8:1f:16: + cc:11:75:89:da:6e:b4:b7:3e:a6:cd:eb:2a:0f:16:bb:dd:8c: + d5:ee:8d:74:66:10:6e:73:d9:17:6a:bf:64:68:70:56:19:34: + e3:93:c9:8a:13:23:5c:50:ef:e1:3e:32:84:7f:f7:c5:bf:80: + 06:b8:d1:1b:bd:ca:cb:c1:f7:58:d6:ca:86:ed:c2:34:4a:72: + c2:9a:93:ff:62:4f:72:ad:92:ae:de:6f:8e:25:91:7c:7a:76: + dc:f5:56:f3:df:8c:d3:fb:6e:4a:df:e3:58:4f:29:bf:d7:4b: + 2d:4e:69:51 -----BEGIN X509 CRL----- -MIICBDCB7QIBATANBgkqhkiG9w0BAQsFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV +MIICBDCB7QIBATANBgkqhkiG9w0BAQUFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3Ro MRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x -HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE0MDcxMTEyMzUyN1oX -DTE1MDcxMTEyMzUyN1owFDASAgEBFw0xNDA3MTExMjM1MjdaoA4wDDAKBgNVHRQE -AwIBOzANBgkqhkiG9w0BAQsFAAOCAQEAB+ao48FzCAbRKKPkFJX8Ho5SZl44YhNW -Uy/JxMkonyjyaMwp7GSwd2hNpv3geC6tHO7YLSRcyvyKu1BQVbeoa6FpultQSv5+ -twk6mmeSenzhzNhfJmzSEhJicXOgBoLAh4aBXkixQis9dAVg16/nNSS2DAJwEKMW -kXcJpuBLt6XLL0aM71+NDqB8HAUUPyuNWLiYEb4NlScIWNh7lI6ZWmsv8vb1PMmn -2hn4CVJIkHkfEHYnikek55iE31QMUyobCXzro+cR9jGR1iPZSQu9dxstRHF5bXai -eBYWZIblBVCSJ896a5TJ5uaA1RKk6ZZbAG43oQTB/hupaEPjTTXysw== +HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwMjE4MTc0MloX +DTE3MTAyOTE4MTc0MlowFDASAgEBFw0xNTAyMDIxODE3NDJaoA4wDDAKBgNVHRQE +AwIBAjANBgkqhkiG9w0BAQUFAAOCAQEABaaK0AT5K/hDfkmRGp2LenegEPruMoQr +vDj49CmTcC/+wRGoqtJEVW45ZePHbZPDz5GfMBNiEtDbwByXGMd7mkcqzDsh/lz6 +c3HUyPPhCHsDQhYNRsnM3TEKeI6W2/pf9vTZCPUzC8WezMkP3N8hHAE+7tlAYzv9 +pAH2uLbl8a+bcZ0BFYSS9ytjuqzOyB8WzBF1idputLc+ps3rKg8Wu92M1e6NdGYQ +bnPZF2q/ZGhwVhk045PJihMjXFDv4T4yhH/3xb+ABrjRG73Ky8H3WNbKhu3CNEpy +wpqT/2JPcq2Srt5vjiWRfHp23PVW89+M0/tuSt/jWE8pv9dLLU5pUQ== -----END X509 CRL----- diff --git a/certs/crl/gencrls.sh b/certs/crl/gencrls.sh index 2afbecfe1..a18ecf3f7 100755 --- a/certs/crl/gencrls.sh +++ b/certs/crl/gencrls.sh @@ -5,7 +5,7 @@ # caCrl -openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 365 -out crl.pem -keyfile ../ca-key.pem -cert ../ca-cert.pem +openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 1000 -out crl.pem -keyfile ../ca-key.pem -cert ../ca-cert.pem # metadata openssl crl -in crl.pem -text > tmp @@ -17,7 +17,7 @@ mv tmp crl.pem openssl ca -config ../renewcerts/wolfssl.cnf -revoke ../server-cert.pem -keyfile ../ca-key.pem -cert ../ca-cert.pem # caCrl server revoked generation -openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 365 -out crl.revoked -keyfile ../ca-key.pem -cert ../ca-cert.pem +openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 1000 -out crl.revoked -keyfile ../ca-key.pem -cert ../ca-cert.pem # metadata openssl crl -in crl.revoked -text > tmp @@ -29,7 +29,7 @@ mv tmp crl.revoked cp blank.index.txt demoCA/index.txt # cliCrl -openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 365 -out cliCrl.pem -keyfile ../client-key.pem -cert ../client-cert.pem +openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 1000 -out cliCrl.pem -keyfile ../client-key.pem -cert ../client-cert.pem # metadata openssl crl -in cliCrl.pem -text > tmp @@ -38,7 +38,7 @@ mv tmp cliCrl.pem #cp cliCrl.pem ~/wolfssl/certs/crl/cliCrl.pem # eccCliCRL -openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 365 -out eccCliCRL.pem -keyfile ../ecc-client-key.pem -cert ../client-ecc-cert.pem +openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 1000 -out eccCliCRL.pem -keyfile ../ecc-client-key.pem -cert ../client-ecc-cert.pem # metadata openssl crl -in eccCliCRL.pem -text > tmp @@ -47,7 +47,7 @@ mv tmp eccCliCRL.pem #cp eccCliCRL.pem ~/wolfssl/certs/crl/eccCliCRL.pem # eccSrvCRL -openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 365 -out eccSrvCRL.pem -keyfile ../ecc-key.pem -cert ../server-ecc.pem +openssl ca -config ../renewcerts/wolfssl.cnf -gencrl -crldays 1000 -out eccSrvCRL.pem -keyfile ../ecc-key.pem -cert ../server-ecc.pem # metadata openssl crl -in eccSrvCRL.pem -text > tmp From 4bc2743b55ca1262a2859d73e4ba36d9ebc33bc2 Mon Sep 17 00:00:00 2001 From: John Safranek Date: Tue, 3 Feb 2015 14:21:20 -0800 Subject: [PATCH 07/11] changed port.c to wc_port.c in Xcode iOS project --- wolfssl-ios.xcodeproj/project.pbxproj | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/wolfssl-ios.xcodeproj/project.pbxproj b/wolfssl-ios.xcodeproj/project.pbxproj index 47c0b3bd6..50ba7cc4b 100644 --- a/wolfssl-ios.xcodeproj/project.pbxproj +++ b/wolfssl-ios.xcodeproj/project.pbxproj @@ -7,7 +7,6 @@ objects = { /* Begin PBXBuildFile section */ - 52397C5D17E0E63200517C9A /* port.c in Sources */ = {isa = PBXBuildFile; fileRef = 52397C5C17E0E63200517C9A /* port.c */; }; 52B1348216F3CCC400C07B32 /* tls.c in Sources */ = {isa = PBXBuildFile; fileRef = 52B1347B16F3CCC400C07B32 /* tls.c */; }; 52B1348316F3CCC400C07B32 /* ssl.c in Sources */ = {isa = PBXBuildFile; fileRef = 52B1347C16F3CCC400C07B32 /* ssl.c */; }; 52B1348416F3CCC400C07B32 /* ocsp.c in Sources */ = {isa = PBXBuildFile; fileRef = 52B1347D16F3CCC400C07B32 /* ocsp.c */; }; @@ -41,6 +40,7 @@ 52B134BA16F3CDF300C07B32 /* asn.c in Sources */ = {isa = PBXBuildFile; fileRef = 52B134A016F3CDF300C07B32 /* asn.c */; }; 52B134BB16F3CDF300C07B32 /* arc4.c in Sources */ = {isa = PBXBuildFile; fileRef = 52B134A116F3CDF300C07B32 /* arc4.c */; }; 52B134BC16F3CDF300C07B32 /* aes.c in Sources */ = {isa = PBXBuildFile; fileRef = 52B134A216F3CDF300C07B32 /* aes.c */; }; + 52F8CACA1A813C990085CA8C /* wc_port.c in Sources */ = {isa = PBXBuildFile; fileRef = 52F8CAC91A813C990085CA8C /* wc_port.c */; }; /* End PBXBuildFile section */ /* Begin PBXCopyFilesBuildPhase section */ @@ -56,7 +56,6 @@ /* End PBXCopyFilesBuildPhase section */ /* Begin PBXFileReference section */ - 52397C5C17E0E63200517C9A /* port.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; name = port.c; path = wolfcrypt/src/port.c; sourceTree = SOURCE_ROOT; }; 52B1344D16F3C9E800C07B32 /* libwolfssl-ios.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libwolfssl-ios.a"; sourceTree = BUILT_PRODUCTS_DIR; }; 52B1347B16F3CCC400C07B32 /* tls.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; name = tls.c; path = src/tls.c; sourceTree = SOURCE_ROOT; }; 52B1347C16F3CCC400C07B32 /* ssl.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; name = ssl.c; path = src/ssl.c; sourceTree = SOURCE_ROOT; }; @@ -91,6 +90,7 @@ 52B134A016F3CDF300C07B32 /* asn.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; name = asn.c; path = wolfcrypt/src/asn.c; sourceTree = SOURCE_ROOT; }; 52B134A116F3CDF300C07B32 /* arc4.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; name = arc4.c; path = wolfcrypt/src/arc4.c; sourceTree = SOURCE_ROOT; }; 52B134A216F3CDF300C07B32 /* aes.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; name = aes.c; path = wolfcrypt/src/aes.c; sourceTree = SOURCE_ROOT; }; + 52F8CAC91A813C990085CA8C /* wc_port.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; name = wc_port.c; path = wolfcrypt/src/wc_port.c; sourceTree = SOURCE_ROOT; }; /* End PBXFileReference section */ /* Begin PBXFrameworksBuildPhase section */ @@ -147,7 +147,7 @@ 52B1347A16F3CC9A00C07B32 /* wolfCrypt */ = { isa = PBXGroup; children = ( - 52397C5C17E0E63200517C9A /* port.c */, + 52F8CAC91A813C990085CA8C /* wc_port.c */, 52B1348916F3CDF300C07B32 /* tfm.c */, 52B1348A16F3CDF300C07B32 /* sha256.c */, 52B1348B16F3CDF300C07B32 /* sha.c */, @@ -262,7 +262,7 @@ 52B134BA16F3CDF300C07B32 /* asn.c in Sources */, 52B134BB16F3CDF300C07B32 /* arc4.c in Sources */, 52B134BC16F3CDF300C07B32 /* aes.c in Sources */, - 52397C5D17E0E63200517C9A /* port.c in Sources */, + 52F8CACA1A813C990085CA8C /* wc_port.c in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; From b7ba4959247f510c1a3d97e7035e4fef43297120 Mon Sep 17 00:00:00 2001 From: kaleb-himes Date: Wed, 4 Feb 2015 23:29:56 -0700 Subject: [PATCH 08/11] all certs in renewcerts.sh -> 1000 days --- certs/renewcerts.sh | 91 +++++++++++++++++++++++++++++++++++---------- 1 file changed, 72 insertions(+), 19 deletions(-) diff --git a/certs/renewcerts.sh b/certs/renewcerts.sh index 1332e35d0..33fcfcb2e 100755 --- a/certs/renewcerts.sh +++ b/certs/renewcerts.sh @@ -1,23 +1,31 @@ #!/bin/bash # renewcerts.sh # -# renews the following: -# client-cert.pem -# client-cert.der -# client-ecc-cert.pem -# ca-cert.pem -# ca-cert.der -# server-cert.pem -# server-cert.der -# server-ecc-rsa.pem -# crl/cliCrl.pem -# crl/crl.pem -# crl/crl.revoked -# crl/eccCliCRL.pem -# crl/eccSrvCRL.pem +# renews the following certs: +# client-cert.pem +# client-cert.der +# client-ecc-cert.pem +# client-ecc-cert.der +# ca-cert.pem +# ca-cert.der +# server-cert.pem +# server-cert.der +# server-ecc-rsa.pem +# server-ecc.pem +# 1024/client-cert.der +# 1024/client-cert.pem +# +# Needs to be added: +# server-ecc-comp.pem +# updates the following crls: +# crl/cliCrl.pem +# crl/crl.pem +# crl/crl.revoked +# crl/eccCliCRL.pem +# crl/eccSrvCRL.pem # if HAVE_NTRU -# ntru-cert.pem -# ntru-key.raw +# ntru-cert.pem +# ntru-key.raw ############################################################################### ######################## FUNCTIONS SECTION #################################### ############################################################################### @@ -33,9 +41,9 @@ function run_renewcerts(){ # That is all lines beginning with: "openssl req" ############################################################ - ########## update the self-signed client-cert.pem ########## + #### update the self-signed (2048-bit) client-cert.pem ##### ############################################################ - echo "Updating client-cert.pem" + echo "Updating 2048-bit client-cert.pem" echo "" #pipe the following arguments to openssl req... echo -e "US\nMontana\nBozeman\nwolfSSL\nProgramming\nwww.wolfssl.com\ninfo@wolfssl.com\n.\n.\n" | openssl req -new -key client-key.pem -nodes -out client-cert.csr @@ -47,6 +55,20 @@ function run_renewcerts(){ openssl x509 -in client-cert.pem -text > tmp.pem mv tmp.pem client-cert.pem ############################################################ + #### update the self-signed (1024-bit) client-cert.pem ##### + ############################################################ + echo "Updating 1024-bit client-cert.pem" + echo "" + #pipe the following arguments to openssl req... + echo -e "US\nMontana\nBozeman\nwolfSSL\nProgramming\nwww.wolfssl.com\ninfo@wolfssl.com\n.\n.\n" | openssl req -new -key \1024/client-key.pem -nodes -out \1024/client-cert.csr + + + openssl x509 -req -in \1024/client-cert.csr -days 1000 -extfile wolfssl.cnf -extensions wolfssl_opts -signkey \1024/client-key.pem -out \1024/client-cert.pem + rm \1024/client-cert.csr + + openssl x509 -in \1024/client-cert.pem -text > \1024/tmp.pem + mv \1024/tmp.pem \1024/client-cert.pem + ############################################################ ########## update the self-signed ca-cert.pem ############## ############################################################ echo "Updating ca-cert.pem" @@ -60,7 +82,7 @@ function run_renewcerts(){ openssl x509 -in ca-cert.pem -text > tmp.pem mv tmp.pem ca-cert.pem ########################################################### - ########## update and sign server-cert.ptm ################ + ########## update and sign server-cert.pem ################ ########################################################### echo "Updating server-cert.pem" echo "" @@ -104,14 +126,45 @@ function run_renewcerts(){ openssl x509 -in client-ecc-cert.pem -text > tmp.pem mv tmp.pem client-ecc-cert.pem + ############################################################ + ########## update the self-signed server-ecc.pem ########### + ############################################################ + echo "Updating server-ecc.pem" + echo "" + #pipe the following arguments to openssl req... + echo -e "US\nMontana\nBozeman\nwolfSSL\nProgramming\nwww.wolfssl.com\ninfo@wolfssl.com\n.\n.\n" | openssl req -new -key ecc-key.pem -nodes -out server-ecc.csr + + + openssl x509 -req -in server-ecc.csr -days 1000 -extfile wolfssl.cnf -extensions wolfssl_opts -signkey ecc-key.pem -out server-ecc.pem + rm server-ecc.csr + + openssl x509 -in server-ecc.pem -text > tmp.pem + mv tmp.pem server-ecc.pem + ############################################################ + ###### update the self-signed server-ecc-comp.pem ########## + ############################################################ + echo "Updating server-ecc-comp.pem" + echo "" + #pipe the following arguments to openssl req... + echo -e "US\nMontana\nBozeman\nwolfSSL\nProgramming\nwww.wolfssl.com\ninfo@wolfssl.com\n.\n.\n" | openssl req -new -key ecc-key-comp.pem -nodes -out server-ecc-comp.csr + + + openssl x509 -req -in server-ecc-comp.csr -days 1000 -extfile wolfssl.cnf -extensions wolfssl_opts -signkey ecc-key-comp.pem -out server-ecc-comp.pem + rm server-ecc-comp.csr + + openssl x509 -in server-ecc-comp.pem -text > tmp.pem + mv tmp.pem server-ecc-comp.pem + ############################################################ ########## make .der files from .pem files ################# ############################################################ + openssl x509 -inform PEM -in \1024/client-cert.pem -outform DER -out \1024/client-cert.der echo "Generating new ca-cert.der, client-cert.der, server-cert.der..." echo "" openssl x509 -inform PEM -in ca-cert.pem -outform DER -out ca-cert.der openssl x509 -inform PEM -in client-cert.pem -outform DER -out client-cert.der openssl x509 -inform PEM -in server-cert.pem -outform DER -out server-cert.der + openssl x509 -inform PEM -in client-ecc-cert.pem -outform DER -out client-ecc-cert.der echo "Changing directory to wolfssl root..." echo "" cd ../ From c539393ca454dbbe7dcb513fe8c2bf53f727109c Mon Sep 17 00:00:00 2001 From: kaleb-himes Date: Wed, 4 Feb 2015 23:34:04 -0700 Subject: [PATCH 09/11] updated all certs --- certs/1024/client-cert.der | Bin 752 -> 937 bytes certs/1024/client-cert.pem | 64 ++++--- certs/ca-cert.der | Bin 1198 -> 1198 bytes certs/ca-cert.pem | 93 +++++----- certs/client-cert.der | Bin 1198 -> 1198 bytes certs/client-cert.pem | 57 +++--- certs/client-ecc-cert.der | Bin 0 -> 800 bytes certs/client-ecc-cert.pem | 26 +-- certs/crl/cliCrl.pem | 50 ++--- certs/crl/crl.pem | 50 ++--- certs/crl/crl.revoked | 52 +++--- certs/crl/eccCliCRL.pem | 32 ++-- certs/crl/eccSrvCRL.pem | 32 ++-- certs/ntru-cert.pem | 40 ++-- certs/ntru-key.raw | Bin 607 -> 607 bytes certs/server-cert.der | Bin 1186 -> 1186 bytes certs/server-cert.pem | 111 ++++++------ certs/server-ecc-comp.pem | 62 +++++-- certs/server-ecc-rsa.pem | 76 ++++---- certs/server-ecc.pem | 61 +++---- wolfssl/certs_test.h | 362 +++++++++++++++++++------------------ 21 files changed, 610 insertions(+), 558 deletions(-) create mode 100644 certs/client-ecc-cert.der diff --git a/certs/1024/client-cert.der b/certs/1024/client-cert.der index 6b796b6388254e6f5ff20f1f81425410acda814b..d7bf4ed87bd135f346bc1fba664e3cf9b2cdcc6c 100644 GIT binary patch literal 937 zcmXqLVqR*{#LTyVnTe5!iId^Q|C8)HzIy~2@Un4gwRyCC=VfGMWo0mEoMOmrz{$oO z%EBhh6dG(OV893BaPYAE=I50p<|V>J*m>BU@~cvF6Z2pqTs-XM`8jF9!9Io}20|cR z+&tU?MfvGPiMhF%dFh4{24WylW*+|X@^U?p+T!9Iz2y8{LwN&PxHC8z#RM|*(()aU z6d1^f^BS5O7#Wxvm>C-z8$^lo8k!p#8W=*kgVouM^O3`sk(GhDv6sQ1v6HE>kzr3U z-wMyqC5u+Rmsol$bf)6Z6K^)>dOS5XEiE^Hb1`v3yxq+wSMN_bb#Uc%$y;qFU-%wL zG;8{|dTm{~>h4~_rF)XBR#=>|T*Q*L<@@)~t8V!+@$HW5&Gfiaeo})^>1Fm3wOu|h z4*vDZ*Oq_ZweH)5q^BuzueEK`Pux*w_%<;kbtMxsBLm~&#y8yD(yb|PL#ki z%a&OSb(zm>7JF%=Hra%;Vto zm5GxT8KvsQ3`9Tz%sjm1<>h*niN(b^ddc~@hO!3IaN9T;#rQJw(()bP(gt$kyoSaG zhK3eKh9*WPmQmuohNgxFhNe(1(QcE#=Qw>59XC0TaTRlbf!}0VCItm~Hs(-SWflno zu?CUGO#UDD@18f&yqaEG*m}HFAT#pKWDaJ<`l2-ctc9&p*`Bpaz16<;wq-)+GDF{l zPu0mhcV@fzTuX9PDKRMUV;5i*iWAv<_k4u<Y3t=3bkjD7eJ&0k8KGi+VktYYle{uAi5bcGiEsd1lF+EsU8P56_KF{T8@tU12{H#}~DGP_0!Kubs^Kp>LEOFa*0bgZBi`k~%CDxeil~}jrk&%Av5=Wms jt2(yNa}}BN^2NJ9vKn6_|K8hcTYPuRe7*7mOr?$hTa=S^ delta 335 zcmZ3-xsFr9powLbK@;<&1FBu#{Zd@kkI9JS?_Xbd_1&E{##rE7(vZ=_7PKP*rz zaXztl!~L7-w;rvX?D1nk``${C2T5G_zZ>cqR$nyI;`$dW^8RK@z?0^QdkT23cl6%e i)53RDYV-aSCcnUmOBS_?Hn0B>JzK*we$!?q<{JQW?vfk; diff --git a/certs/ca-cert.pem b/certs/ca-cert.pem index 7e64eb479..d98a51a5b 100644 --- a/certs/ca-cert.pem +++ b/certs/ca-cert.pem @@ -1,40 +1,12 @@ ------BEGIN CERTIFICATE----- -MIIEqjCCA5KgAwIBAgIJAJpBR82hFGKMMA0GCSqGSIb3DQEBBQUAMIGUMQswCQYD -VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8G -A1UECgwIU2F3dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3 -dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAe -Fw0xNDA3MTEwMzIwMDhaFw0xNzA0MDYwMzIwMDhaMIGUMQswCQYDVQQGEwJVUzEQ -MA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8GA1UECgwIU2F3 -dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3dy53b2xmc3Ns -LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBAL8Myi0Ush6EQlvNOB9K8k11EPG2NZ/fyn0D -mNOs3gNm7irx2LB9bgdUCxCYIU2AyxIg58xP3kV9yXJ3MurKkLtpUhADL6jzlcXx -i2JWG+9nb6QQQZWtCpvjpcCw0nB2UDBbqOgILHztp6J6jTgpHKzH7fJ8lbCVgn1J -XDjNdyXvvYB1U5Q8PcpjW58VtdMdEy8Z0TzbdjrMuH3J5cLX2kBv2CHccxtCLVOc -/hr8fat6Nj+Y3oR8BWfOahQ4h6nxjLVoy2h/cSAr9aBj9VYvoybSt2+xWhfXOJkI -/pNYb/7DE0kIFgunTWcAUjFnI06Y7VFFHbkE2Qvs2CizS73tNnkCAwEAAaOB/DCB -+TAdBgNVHQ4EFgQUJ45nEXTDJh0/7TNjs6TYHTDl6NUwgckGA1UdIwSBwTCBvoAU -J45nEXTDJh0/7TNjs6TYHTDl6NWhgZqkgZcwgZQxCzAJBgNVBAYTAlVTMRAwDgYD -VQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYDVQQKDAhTYXd0b290 -aDETMBEGA1UECwwKQ29uc3VsdGluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t -MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tggkAmkFHzaEUYowwDAYD -VR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAeXgMbXmIkfw6FZz5J2IW8CEf -+n0/oqgyHvfyEal0FnRe3BjK8AAq1QMGJjDxR4P9Mm787apPfQxjYDEvfAy/mWaH -7ScIhi3EM+iYIxz+o9uaSU78WkLvccM/rdxKqNKjHQmsMwR7hvNtAFmjyNvRPHP2 -DpDWXkngvzZjCHulsI81O1aMETVJBBzQ57pWxQ0KkY3Wt2IZNBJSTNJtfMU9DxiB -VMv2POWE0tZxFewaNAvwoCF0Q8ijsN/ZZ9rirZNI+KCHvXkU4GIK3/cxLjF70TIq -Cv5dFO/ZZFDkg5G8cA3XiI3ZvIQOxRqzv2QCTlGRpKKFFYOv8FubKElfsrMD2A== ------END CERTIFICATE----- Certificate: Data: Version: 3 (0x2) - Serial Number: - 9a:41:47:cd:a1:14:62:8c + Serial Number: 18049645117592769049 (0xfa7d389a73fb1219) Signature Algorithm: sha1WithRSAEncryption Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com/emailAddress=info@wolfssl.com Validity - Not Before: Jul 11 03:20:08 2014 GMT - Not After : Apr 6 03:20:08 2017 GMT + Not Before: Feb 5 06:33:30 2015 GMT + Not After : Nov 1 06:33:30 2017 GMT Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com/emailAddress=info@wolfssl.com Subject Public Key Info: Public Key Algorithm: rsaEncryption @@ -65,23 +37,50 @@ Certificate: X509v3 Authority Key Identifier: keyid:27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5 DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com - serial:9A:41:47:CD:A1:14:62:8C + serial:FA:7D:38:9A:73:FB:12:19 X509v3 Basic Constraints: CA:TRUE Signature Algorithm: sha1WithRSAEncryption - 79:78:0c:6d:79:88:91:fc:3a:15:9c:f9:27:62:16:f0:21:1f: - fa:7d:3f:a2:a8:32:1e:f7:f2:11:a9:74:16:74:5e:dc:18:ca: - f0:00:2a:d5:03:06:26:30:f1:47:83:fd:32:6e:fc:ed:aa:4f: - 7d:0c:63:60:31:2f:7c:0c:bf:99:66:87:ed:27:08:86:2d:c4: - 33:e8:98:23:1c:fe:a3:db:9a:49:4e:fc:5a:42:ef:71:c3:3f: - ad:dc:4a:a8:d2:a3:1d:09:ac:33:04:7b:86:f3:6d:00:59:a3: - c8:db:d1:3c:73:f6:0e:90:d6:5e:49:e0:bf:36:63:08:7b:a5: - b0:8f:35:3b:56:8c:11:35:49:04:1c:d0:e7:ba:56:c5:0d:0a: - 91:8d:d6:b7:62:19:34:12:52:4c:d2:6d:7c:c5:3d:0f:18:81: - 54:cb:f6:3c:e5:84:d2:d6:71:15:ec:1a:34:0b:f0:a0:21:74: - 43:c8:a3:b0:df:d9:67:da:e2:ad:93:48:f8:a0:87:bd:79:14: - e0:62:0a:df:f7:31:2e:31:7b:d1:32:2a:0a:fe:5d:14:ef:d9: - 64:50:e4:83:91:bc:70:0d:d7:88:8d:d9:bc:84:0e:c5:1a:b3: - bf:64:02:4e:51:91:a4:a2:85:15:83:af:f0:5b:9b:28:49:5f: - b2:b3:03:d8 + 2c:02:0c:de:b2:46:a1:d8:59:0f:08:69:ad:d2:52:2e:ee:55: + 78:bd:bb:71:d2:d7:b7:fe:7b:0f:8a:bc:6a:25:fd:d4:6d:1d: + ab:00:e2:9d:d6:98:21:11:a4:41:e0:0d:4b:a4:38:7f:2e:0c: + d6:80:dc:30:d7:cf:19:1b:43:2f:e7:b3:99:74:9c:b4:01:69: + b1:c3:9b:9f:4a:89:2f:60:38:cb:7c:a1:78:93:38:5c:a8:ca: + 46:0d:23:2d:99:a3:cf:0a:49:38:eb:07:06:57:cd:4a:55:35: + 04:08:36:30:ca:75:69:4b:9a:84:08:c9:23:78:a9:f0:80:ce: + 8a:25:bb:31:07:0e:11:e6:4a:95:8c:53:df:85:d9:48:45:cb: + 5a:ef:de:92:c2:88:0e:da:ff:31:6b:4e:52:53:5f:f3:a8:3a: + 42:f8:e1:0d:0a:c0:84:af:ec:21:b3:a7:98:b0:c8:6b:77:04: + ef:f5:06:a5:51:3b:20:6f:bf:55:80:8c:cf:d4:78:ee:a2:d9: + e3:52:34:9a:17:3d:87:10:4d:23:21:38:9b:35:f7:18:ac:34: + bd:18:ae:a4:e2:32:2f:5d:a4:41:4c:bc:aa:88:b7:9e:45:14: + 92:e9:e8:ee:fc:1d:28:f5:59:fd:de:bd:3d:73:dd:b4:9f:2e: + 77:c0:75:41 +-----BEGIN CERTIFICATE----- +MIIEqjCCA5KgAwIBAgIJAPp9OJpz+xIZMA0GCSqGSIb3DQEBBQUAMIGUMQswCQYD +VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8G +A1UECgwIU2F3dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3 +dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAe +Fw0xNTAyMDUwNjMzMzBaFw0xNzExMDEwNjMzMzBaMIGUMQswCQYDVQQGEwJVUzEQ +MA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8GA1UECgwIU2F3 +dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3dy53b2xmc3Ns +LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAL8Myi0Ush6EQlvNOB9K8k11EPG2NZ/fyn0D +mNOs3gNm7irx2LB9bgdUCxCYIU2AyxIg58xP3kV9yXJ3MurKkLtpUhADL6jzlcXx +i2JWG+9nb6QQQZWtCpvjpcCw0nB2UDBbqOgILHztp6J6jTgpHKzH7fJ8lbCVgn1J +XDjNdyXvvYB1U5Q8PcpjW58VtdMdEy8Z0TzbdjrMuH3J5cLX2kBv2CHccxtCLVOc +/hr8fat6Nj+Y3oR8BWfOahQ4h6nxjLVoy2h/cSAr9aBj9VYvoybSt2+xWhfXOJkI +/pNYb/7DE0kIFgunTWcAUjFnI06Y7VFFHbkE2Qvs2CizS73tNnkCAwEAAaOB/DCB ++TAdBgNVHQ4EFgQUJ45nEXTDJh0/7TNjs6TYHTDl6NUwgckGA1UdIwSBwTCBvoAU +J45nEXTDJh0/7TNjs6TYHTDl6NWhgZqkgZcwgZQxCzAJBgNVBAYTAlVTMRAwDgYD +VQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYDVQQKDAhTYXd0b290 +aDETMBEGA1UECwwKQ29uc3VsdGluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t +MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tggkA+n04mnP7EhkwDAYD +VR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEALAIM3rJGodhZDwhprdJSLu5V +eL27cdLXt/57D4q8aiX91G0dqwDindaYIRGkQeANS6Q4fy4M1oDcMNfPGRtDL+ez +mXSctAFpscObn0qJL2A4y3yheJM4XKjKRg0jLZmjzwpJOOsHBlfNSlU1BAg2MMp1 +aUuahAjJI3ip8IDOiiW7MQcOEeZKlYxT34XZSEXLWu/eksKIDtr/MWtOUlNf86g6 +QvjhDQrAhK/sIbOnmLDIa3cE7/UGpVE7IG+/VYCMz9R47qLZ41I0mhc9hxBNIyE4 +mzX3GKw0vRiupOIyL12kQUy8qoi3nkUUkuno7vwdKPVZ/d69PXPdtJ8ud8B1QQ== +-----END CERTIFICATE----- diff --git a/certs/client-cert.der b/certs/client-cert.der index 293985adb974f6aefe00cbcd63701ea735fbcfa6..ea1f65e4012c856d88d69fc032b32a99c4b8f09b 100644 GIT binary patch delta 335 zcmZ3-xsFr9powLbK@;<&1U15QR2LY z=7xp_h7j(?yUUq4U`i+VFe}y9Ii?n$m59>!UHvc0#yq*nR&MyCc#M<3h zTEMYhz4U)sx-7@OX z_ebCEWtA~W)QMfVaGA4blEtD^bt`tB;qdtoxk}Y^=jBy00y1~FuO|MP^Kt6ObMEzj z!xq>a^gR`FhC$!1v`^eY#FKIN(%(T``*(9HURh=wq4Cc6&c7dJN51s!PS2PgeXL5k z^=?*Q4->2GyGOQL=Il<+GmMSy-D@L$>!j5JOZj_UXXI*&RIS7Qckf;wwLC@V$ATlD k3c^2}xA3URS(NoC^vn5`irej+9^McPf9mitjcMwA0Ca$$hyVZp delta 335 zcmZ3-xsFr9powLbK@;<&1*by$`|okNX&*L^vwn{A z&rn4pw=RbTmOYe=7u{cw)WuLog=q#rMIl8Q)bom(Q=%&|Ul!jGAI(=U6y;yZaNv5U9M i>CA+edWS-a>*LnVdr6Y%CAbzP0WLdaPhF0=jWsa2m2U`7zlxMar1Bo z6y>KECFbU4=A|1-7>I#HnR)oj%ggmZYKx0=^pf*)4do4F**LY@JlekVGIBDC31sG_ zDG&eLfFobdktFt2wgrPyp#K^`04r69Uc4j9A zmeBoQ_+0{K*`Axd{lih;uLadt-l+6RHoS@QS){_8q%-^0`$eWg&MjqP$HJzvonc(L z_gkry)AzkAH<>BLACIlyvbgb&LE}#YSvKZSSw0pq7LnIiyd$%xCfWyvZ)5T8bnI}6 zS^deN@gzuInWgcdLF2v#tZEiE&RWtqeUJuV6H+4O0eMB3h1GzWk?}uLl4bT_FmPp3 z2!8)b#M$I*!`>ICs&#LD>*-MT^|^Um%vRp1^whT3Uptr-8Lk(966xcVYuJ0xS@7=i X*udr94|z58EgYk*9^P}YYS9M(M;PwG literal 0 HcmV?d00001 diff --git a/certs/client-ecc-cert.pem b/certs/client-ecc-cert.pem index c6e222e09..cca49cfd7 100644 --- a/certs/client-ecc-cert.pem +++ b/certs/client-ecc-cert.pem @@ -1,12 +1,12 @@ Certificate: Data: Version: 3 (0x2) - Serial Number: 10761354931173564369 (0x9558034b367f9fd1) + Serial Number: 16416369391847057450 (0xe3d2a8fbf6a3a82a) Signature Algorithm: ecdsa-with-SHA1 Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL, OU=Programming, CN=www.wolfssl.com/emailAddress=info@wolfssl.com Validity - Not Before: Feb 2 15:59:46 2015 GMT - Not After : Oct 29 15:59:46 2017 GMT + Not Before: Feb 5 06:33:30 2015 GMT + Not After : Nov 1 06:33:30 2017 GMT Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL, OU=Programming, CN=www.wolfssl.com/emailAddress=info@wolfssl.com Subject Public Key Info: Public Key Algorithm: id-ecPublicKey @@ -24,21 +24,21 @@ Certificate: X509v3 Authority Key Identifier: keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2 DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Programming/CN=www.wolfssl.com/emailAddress=info@wolfssl.com - serial:95:58:03:4B:36:7F:9F:D1 + serial:E3:D2:A8:FB:F6:A3:A8:2A X509v3 Basic Constraints: CA:TRUE Signature Algorithm: ecdsa-with-SHA1 - 30:45:02:21:00:a5:ad:1f:db:11:32:91:8d:4e:a9:25:6d:a1: - af:e5:0e:f6:47:0a:f2:6a:f5:b3:27:3e:93:3b:d6:b2:a9:3f: - 2a:02:20:55:13:2a:1c:77:57:3c:ce:c3:a8:43:cd:78:cb:89: - 30:11:83:98:e6:2a:47:67:39:38:0f:52:95:61:39:aa:5d + 30:45:02:20:53:ef:f2:14:43:34:cd:80:bd:e8:ca:7b:2d:da: + f6:8c:88:23:4d:4c:d9:c7:16:3d:1f:42:75:ca:b6:eb:f5:88: + 02:21:00:d7:73:f2:14:8e:09:1e:80:bd:c1:43:11:dd:a7:5d: + 51:a7:4b:e1:0d:28:2f:38:41:5b:3a:e1:de:44:3a:84:2f -----BEGIN CERTIFICATE----- -MIIDHDCCAsOgAwIBAgIJAJVYA0s2f5/RMAkGByqGSM49BAEwgZQxCzAJBgNVBAYT +MIIDHDCCAsOgAwIBAgIJAOPSqPv2o6gqMAkGByqGSM49BAEwgZQxCzAJBgNVBAYT AlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRAwDgYDVQQK DAd3b2xmU1NMMRQwEgYDVQQLDAtQcm9ncmFtbWluZzEYMBYGA1UEAwwPd3d3Lndv bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMB4XDTE1 -MDIwMjE1NTk0NloXDTE3MTAyOTE1NTk0NlowgZQxCzAJBgNVBAYTAlVTMRAwDgYD +MDIwNTA2MzMzMFoXDTE3MTEwMTA2MzMzMFowgZQxCzAJBgNVBAYTAlVTMRAwDgYD VQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRAwDgYDVQQKDAd3b2xmU1NM MRQwEgYDVQQLDAtQcm9ncmFtbWluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMFkwEwYHKoZIzj0CAQYI @@ -48,7 +48,7 @@ WWuVYT9RV7YETYlBiERcq/IwgckGA1UdIwSBwTCBvoAU69RLWWuVYT9RV7YETYlB iERcq/KhgZqkgZcwgZQxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAw DgYDVQQHDAdCb3plbWFuMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtQcm9n cmFtbWluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkB -FhBpbmZvQHdvbGZzc2wuY29tggkAlVgDSzZ/n9EwDAYDVR0TBAUwAwEB/zAJBgcq -hkjOPQQBA0gAMEUCIQClrR/bETKRjU6pJW2hr+UO9kcK8mr1syc+kzvWsqk/KgIg -VRMqHHdXPM7DqEPNeMuJMBGDmOYqR2c5OA9SlWE5ql0= +FhBpbmZvQHdvbGZzc2wuY29tggkA49Ko+/ajqCowDAYDVR0TBAUwAwEB/zAJBgcq +hkjOPQQBA0gAMEUCIFPv8hRDNM2AvejKey3a9oyII01M2ccWPR9Cdcq26/WIAiEA +13PyFI4JHoC9wUMR3addUadL4Q0oLzhBWzrh3kQ6hC8= -----END CERTIFICATE----- diff --git a/certs/crl/cliCrl.pem b/certs/crl/cliCrl.pem index 0d285037e..91d67ca73 100644 --- a/certs/crl/cliCrl.pem +++ b/certs/crl/cliCrl.pem @@ -2,38 +2,38 @@ Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: sha1WithRSAEncryption Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Programming/CN=www.wolfssl.com/emailAddress=info@wolfssl.com - Last Update: Feb 2 18:17:42 2015 GMT - Next Update: Oct 29 18:17:42 2017 GMT + Last Update: Feb 5 06:33:30 2015 GMT + Next Update: Nov 1 06:33:30 2017 GMT CRL extensions: X509v3 CRL Number: 3 No Revoked Certificates. Signature Algorithm: sha1WithRSAEncryption - 3d:4b:e6:b5:04:8a:9c:26:d1:cb:c2:ce:12:bd:63:8e:23:91: - 23:48:51:b8:70:48:02:32:a4:6a:b7:83:6d:3d:83:76:c4:3d: - a5:80:42:d7:72:94:3b:0d:e9:b2:9a:5f:47:56:2a:fa:b9:7f: - 46:0e:34:8f:e1:b5:47:1b:21:ca:ed:9a:eb:09:8a:d7:23:e8: - f7:58:61:19:82:79:ac:21:7e:56:15:fa:f4:a4:ec:a8:54:ae: - d7:33:e0:65:96:ff:d7:a9:f5:ad:a6:d4:83:ca:03:dd:92:f2: - 0a:e3:61:e2:7e:8e:3f:7f:67:80:4c:41:28:54:2c:c4:75:90: - dd:88:fe:3b:a8:c0:e5:55:a3:7b:83:ab:82:b7:7e:63:6e:78: - 5e:bd:ee:08:e1:5f:41:b6:d3:89:c9:6c:26:55:c7:e0:dd:8a: - e0:7f:cc:8c:7d:61:37:ab:32:0c:e2:0f:e0:64:80:a6:47:7b: - 31:db:8d:8d:fe:85:5c:bb:84:3d:66:10:ce:eb:f7:99:dd:7c: - c9:e1:5c:ef:8e:17:6b:a5:c3:5c:55:bb:f3:b1:d6:74:47:94: - 1f:d6:bd:27:88:80:94:70:16:58:d0:ce:cf:ea:91:ef:f2:77: - 46:f2:5a:38:48:5c:d7:ba:fb:50:26:3f:2d:8e:b6:1a:92:09: - e6:11:5e:71 + 26:e3:36:93:9d:42:98:41:89:d5:9d:d7:e9:9f:e9:36:f7:93: + f9:c8:52:ab:d7:9d:a7:61:e6:81:63:d3:6f:d1:40:de:aa:ee: + 71:13:da:32:a8:2f:a2:f4:54:7e:27:1e:19:11:03:82:91:f6: + 73:e8:82:6c:89:b3:d4:41:39:84:dd:71:2d:45:a5:b9:1f:7e: + 3d:82:1f:f6:a9:1a:7f:98:2d:1b:86:62:1c:46:20:9c:4b:e3: + 79:ef:d9:65:50:47:51:ad:40:89:1c:2b:a9:1e:5d:57:04:ec: + 4d:82:2a:bd:e1:10:fd:26:f2:48:5d:b5:95:ab:d1:65:a2:3a: + 12:60:2c:d0:4e:2f:08:83:1d:8e:c2:c1:05:5e:6c:fb:b5:7b: + 5b:6c:f2:14:4d:2e:fd:a4:e8:3d:9f:15:bf:b0:d4:00:31:49: + 3e:ce:1d:1f:f7:7e:66:09:c5:a5:d4:13:a1:a1:2b:2d:b2:fa: + 62:16:11:8f:5c:eb:ec:6f:5a:ad:55:bb:bd:65:75:0c:ea:5c: + a5:3c:8c:8a:61:ae:94:68:11:53:d8:36:f1:96:aa:7e:b9:b3: + 90:b2:5b:50:d1:18:55:59:5a:89:7e:2e:3d:47:0f:67:08:f3: + be:14:72:24:6f:a9:ef:4b:a1:0a:bb:89:7b:14:11:8d:1a:f2: + 91:46:8f:b5 -----BEGIN X509 CRL----- MIIB7jCB1wIBATANBgkqhkiG9w0BAQUFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xEDAOBgNVBAoMB3dvbGZTU0wx FDASBgNVBAsMC1Byb2dyYW1taW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x -HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwMjE4MTc0MloX -DTE3MTAyOTE4MTc0MlqgDjAMMAoGA1UdFAQDAgEDMA0GCSqGSIb3DQEBBQUAA4IB -AQA9S+a1BIqcJtHLws4SvWOOI5EjSFG4cEgCMqRqt4NtPYN2xD2lgELXcpQ7Demy -ml9HVir6uX9GDjSP4bVHGyHK7ZrrCYrXI+j3WGEZgnmsIX5WFfr0pOyoVK7XM+Bl -lv/XqfWtptSDygPdkvIK42Hifo4/f2eATEEoVCzEdZDdiP47qMDlVaN7g6uCt35j -bnheve4I4V9BttOJyWwmVcfg3Yrgf8yMfWE3qzIM4g/gZICmR3sx242N/oVcu4Q9 -ZhDO6/eZ3XzJ4VzvjhdrpcNcVbvzsdZ0R5Qf1r0niICUcBZY0M7P6pHv8ndG8lo4 -SFzXuvtQJj8tjrYakgnmEV5x +HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwNTA2MzMzMFoX +DTE3MTEwMTA2MzMzMFqgDjAMMAoGA1UdFAQDAgEDMA0GCSqGSIb3DQEBBQUAA4IB +AQAm4zaTnUKYQYnVndfpn+k295P5yFKr152nYeaBY9Nv0UDequ5xE9oyqC+i9FR+ +Jx4ZEQOCkfZz6IJsibPUQTmE3XEtRaW5H349gh/2qRp/mC0bhmIcRiCcS+N579ll +UEdRrUCJHCupHl1XBOxNgiq94RD9JvJIXbWVq9FlojoSYCzQTi8Igx2OwsEFXmz7 +tXtbbPIUTS79pOg9nxW/sNQAMUk+zh0f935mCcWl1BOhoSstsvpiFhGPXOvsb1qt +Vbu9ZXUM6lylPIyKYa6UaBFT2Dbxlqp+ubOQsltQ0RhVWVqJfi49Rw9nCPO+FHIk +b6nvS6EKu4l7FBGNGvKRRo+1 -----END X509 CRL----- diff --git a/certs/crl/crl.pem b/certs/crl/crl.pem index 83666b80c..9924f6609 100644 --- a/certs/crl/crl.pem +++ b/certs/crl/crl.pem @@ -2,38 +2,38 @@ Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: sha1WithRSAEncryption Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com - Last Update: Feb 2 18:17:42 2015 GMT - Next Update: Oct 29 18:17:42 2017 GMT + Last Update: Feb 5 06:33:30 2015 GMT + Next Update: Nov 1 06:33:30 2017 GMT CRL extensions: X509v3 CRL Number: 1 No Revoked Certificates. Signature Algorithm: sha1WithRSAEncryption - 78:4e:6d:3d:25:58:cf:eb:b5:7c:c3:3b:79:af:45:b8:8c:84: - 36:61:0e:b0:66:63:3b:7e:0f:f0:2a:09:6d:70:1b:5f:c6:ae: - 9d:42:c7:1f:d5:86:5c:7e:c5:63:e5:11:99:4b:42:a3:8e:40: - 07:93:27:83:01:ec:5e:a8:1a:88:d3:4d:41:9d:f4:10:e6:57: - 33:b9:6c:7b:ba:01:cc:17:6a:4b:2f:4f:20:39:2a:21:b9:15: - b4:a5:60:ca:f0:92:af:0b:bc:a1:df:06:b0:7a:49:d4:2c:0a: - 46:a5:0c:20:a6:00:7e:58:4a:5c:2a:44:c3:f0:31:9e:d0:e3: - ec:be:41:69:dc:32:f3:b3:a5:52:25:ed:5e:ad:3e:f9:38:65: - 55:72:65:61:7a:0c:2d:11:84:f7:b4:b4:36:f4:ba:fa:5f:b3: - a0:8a:09:6f:06:44:74:ac:40:f2:60:9e:37:96:68:49:fc:d1: - 2c:1d:98:1f:e1:d3:48:22:85:64:49:b2:05:2a:cf:47:b4:15: - 3d:e6:ae:d8:83:6e:e7:34:d3:fe:9b:89:b0:3d:cf:7e:3e:bf: - 75:7f:27:0d:cb:7b:63:a7:69:d1:31:8f:7f:99:b2:34:f8:09: - 60:37:2d:db:1c:65:5f:77:e5:e6:0d:a8:0c:ee:57:a6:65:df: - 98:3b:07:b8 + 1e:a6:74:ca:6e:14:eb:4f:e7:94:fb:0f:36:4c:55:39:e1:29: + af:33:f1:83:fa:8c:64:ef:4d:8a:f4:90:a1:dd:8d:c4:c7:13: + 35:7e:a9:1c:ea:29:ef:5e:89:4a:38:b1:22:b4:c3:13:8a:41: + ed:a1:16:08:2f:17:69:b2:88:ca:21:c6:20:a3:d2:e1:33:b9: + 68:4a:11:7f:50:58:53:18:7b:90:86:dc:2d:9a:36:5b:d2:0d: + 28:dc:8e:8f:82:a1:6d:c9:e2:e4:a3:bb:f4:8d:12:c3:15:72: + d9:bd:74:98:4b:82:00:ed:96:9c:85:b1:36:45:28:48:e7:c2: + d0:9e:31:27:51:8b:ae:96:f3:bf:3f:4d:6c:31:6c:4b:7d:a2: + 63:47:d7:29:80:c0:17:1d:3e:48:3e:62:ad:a0:dc:50:e7:07: + f1:85:b4:b4:f9:85:77:d4:60:50:9a:7c:89:8b:c2:02:1f:ec: + 6a:ea:83:46:7d:66:c1:6d:aa:bc:a2:f9:6b:8e:74:2a:9d:96: + 16:3a:a3:66:d6:11:7e:83:2a:99:90:9c:54:a7:d6:b4:79:57: + 87:60:bc:6c:12:09:58:4e:89:1f:0a:82:52:67:aa:5e:f8:10: + 0f:37:d0:75:19:10:b5:5a:36:9d:89:ce:8d:ba:c2:b7:13:b0: + df:43:32:97 -----BEGIN X509 CRL----- MIIB7jCB1wIBATANBgkqhkiG9w0BAQUFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3Ro MRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x -HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwMjE4MTc0MloX -DTE3MTAyOTE4MTc0MlqgDjAMMAoGA1UdFAQDAgEBMA0GCSqGSIb3DQEBBQUAA4IB -AQB4Tm09JVjP67V8wzt5r0W4jIQ2YQ6wZmM7fg/wKgltcBtfxq6dQscf1YZcfsVj -5RGZS0KjjkAHkyeDAexeqBqI001BnfQQ5lczuWx7ugHMF2pLL08gOSohuRW0pWDK -8JKvC7yh3waweknULApGpQwgpgB+WEpcKkTD8DGe0OPsvkFp3DLzs6VSJe1erT75 -OGVVcmVhegwtEYT3tLQ29Lr6X7OgiglvBkR0rEDyYJ43lmhJ/NEsHZgf4dNIIoVk -SbIFKs9HtBU95q7Yg27nNNP+m4mwPc9+Pr91fycNy3tjp2nRMY9/mbI0+AlgNy3b -HGVfd+XmDagM7lemZd+YOwe4 +HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwNTA2MzMzMFoX +DTE3MTEwMTA2MzMzMFqgDjAMMAoGA1UdFAQDAgEBMA0GCSqGSIb3DQEBBQUAA4IB +AQAepnTKbhTrT+eU+w82TFU54SmvM/GD+oxk702K9JCh3Y3ExxM1fqkc6invXolK +OLEitMMTikHtoRYILxdpsojKIcYgo9LhM7loShF/UFhTGHuQhtwtmjZb0g0o3I6P +gqFtyeLko7v0jRLDFXLZvXSYS4IA7ZachbE2RShI58LQnjEnUYuulvO/P01sMWxL +faJjR9cpgMAXHT5IPmKtoNxQ5wfxhbS0+YV31GBQmnyJi8ICH+xq6oNGfWbBbaq8 +ovlrjnQqnZYWOqNm1hF+gyqZkJxUp9a0eVeHYLxsEglYTokfCoJSZ6pe+BAPN9B1 +GRC1Wjadic6NusK3E7DfQzKX -----END X509 CRL----- diff --git a/certs/crl/crl.revoked b/certs/crl/crl.revoked index b60b06e41..a6d3dedb8 100644 --- a/certs/crl/crl.revoked +++ b/certs/crl/crl.revoked @@ -2,40 +2,40 @@ Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: sha1WithRSAEncryption Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com - Last Update: Feb 2 18:17:42 2015 GMT - Next Update: Oct 29 18:17:42 2017 GMT + Last Update: Feb 5 06:33:30 2015 GMT + Next Update: Nov 1 06:33:30 2017 GMT CRL extensions: X509v3 CRL Number: 2 Revoked Certificates: Serial Number: 01 - Revocation Date: Feb 2 18:17:42 2015 GMT + Revocation Date: Feb 5 06:33:30 2015 GMT Signature Algorithm: sha1WithRSAEncryption - 05:a6:8a:d0:04:f9:2b:f8:43:7e:49:91:1a:9d:8b:7a:77:a0: - 10:fa:ee:32:84:2b:bc:38:f8:f4:29:93:70:2f:fe:c1:11:a8: - aa:d2:44:55:6e:39:65:e3:c7:6d:93:c3:cf:91:9f:30:13:62: - 12:d0:db:c0:1c:97:18:c7:7b:9a:47:2a:cc:3b:21:fe:5c:fa: - 73:71:d4:c8:f3:e1:08:7b:03:42:16:0d:46:c9:cc:dd:31:0a: - 78:8e:96:db:fa:5f:f6:f4:d9:08:f5:33:0b:c5:9e:cc:c9:0f: - dc:df:21:1c:01:3e:ee:d9:40:63:3b:fd:a4:01:f6:b8:b6:e5: - f1:af:9b:71:9d:01:15:84:92:f7:2b:63:ba:ac:ce:c8:1f:16: - cc:11:75:89:da:6e:b4:b7:3e:a6:cd:eb:2a:0f:16:bb:dd:8c: - d5:ee:8d:74:66:10:6e:73:d9:17:6a:bf:64:68:70:56:19:34: - e3:93:c9:8a:13:23:5c:50:ef:e1:3e:32:84:7f:f7:c5:bf:80: - 06:b8:d1:1b:bd:ca:cb:c1:f7:58:d6:ca:86:ed:c2:34:4a:72: - c2:9a:93:ff:62:4f:72:ad:92:ae:de:6f:8e:25:91:7c:7a:76: - dc:f5:56:f3:df:8c:d3:fb:6e:4a:df:e3:58:4f:29:bf:d7:4b: - 2d:4e:69:51 + ae:3b:8e:88:bb:a6:9b:93:1a:41:91:73:b9:97:1c:f8:f4:a0: + a6:1c:58:24:52:15:d9:b5:14:35:8d:b6:e9:be:1c:01:e0:24: + ff:ec:2c:71:cc:a4:78:60:a6:eb:e2:5d:41:67:e1:21:d4:e8: + a8:f5:26:c6:69:25:38:c7:87:3f:6a:78:b5:16:14:d2:3f:17: + f1:aa:8d:41:5b:ba:8e:f5:49:e9:e9:d8:93:6f:0a:d2:fe:f6: + 7e:20:f4:76:8c:db:54:ef:42:16:91:75:27:2a:2d:0b:5e:aa: + f7:97:6c:6a:7d:37:e5:c8:31:aa:6b:bf:77:45:2a:01:67:91: + 73:e0:7a:d8:b4:a1:e6:08:e0:2c:4a:8d:a6:b3:eb:c6:24:2a: + 1f:d2:e2:1b:03:d4:0a:19:07:c0:dc:e3:c3:13:a7:48:66:fc: + da:09:ea:40:29:11:9e:e1:48:46:46:2f:05:87:d2:cb:ac:8d: + a5:43:1a:ef:2d:56:de:da:1e:34:9a:09:13:79:f7:95:ec:5b: + aa:28:ad:1e:b1:0e:e7:71:d9:12:45:a3:2c:df:17:52:37:34: + 5d:0b:c0:d5:df:2c:40:d6:e4:4f:a7:07:bd:a4:9c:f9:a7:f8: + bb:1e:bb:93:57:fc:20:57:0c:cc:99:5a:75:8c:83:3f:ba:97: + 96:1c:0e:67 -----BEGIN X509 CRL----- MIICBDCB7QIBATANBgkqhkiG9w0BAQUFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3Ro MRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x -HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwMjE4MTc0MloX -DTE3MTAyOTE4MTc0MlowFDASAgEBFw0xNTAyMDIxODE3NDJaoA4wDDAKBgNVHRQE -AwIBAjANBgkqhkiG9w0BAQUFAAOCAQEABaaK0AT5K/hDfkmRGp2LenegEPruMoQr -vDj49CmTcC/+wRGoqtJEVW45ZePHbZPDz5GfMBNiEtDbwByXGMd7mkcqzDsh/lz6 -c3HUyPPhCHsDQhYNRsnM3TEKeI6W2/pf9vTZCPUzC8WezMkP3N8hHAE+7tlAYzv9 -pAH2uLbl8a+bcZ0BFYSS9ytjuqzOyB8WzBF1idputLc+ps3rKg8Wu92M1e6NdGYQ -bnPZF2q/ZGhwVhk045PJihMjXFDv4T4yhH/3xb+ABrjRG73Ky8H3WNbKhu3CNEpy -wpqT/2JPcq2Srt5vjiWRfHp23PVW89+M0/tuSt/jWE8pv9dLLU5pUQ== +HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTE1MDIwNTA2MzMzMFoX +DTE3MTEwMTA2MzMzMFowFDASAgEBFw0xNTAyMDUwNjMzMzBaoA4wDDAKBgNVHRQE +AwIBAjANBgkqhkiG9w0BAQUFAAOCAQEArjuOiLumm5MaQZFzuZcc+PSgphxYJFIV +2bUUNY226b4cAeAk/+wsccykeGCm6+JdQWfhIdToqPUmxmklOMeHP2p4tRYU0j8X +8aqNQVu6jvVJ6enYk28K0v72fiD0dozbVO9CFpF1JyotC16q95dsan035cgxqmu/ +d0UqAWeRc+B62LSh5gjgLEqNprPrxiQqH9LiGwPUChkHwNzjwxOnSGb82gnqQCkR +nuFIRkYvBYfSy6yNpUMa7y1W3toeNJoJE3n3lexbqiitHrEO53HZEkWjLN8XUjc0 +XQvA1d8sQNbkT6cHvaSc+af4ux67k1f8IFcMzJladYyDP7qXlhwOZw== -----END X509 CRL----- diff --git a/certs/crl/eccCliCRL.pem b/certs/crl/eccCliCRL.pem index 5cfe2d566..5f8c3ef08 100644 --- a/certs/crl/eccCliCRL.pem +++ b/certs/crl/eccCliCRL.pem @@ -1,26 +1,24 @@ Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: ecdsa-with-SHA1 - Issuer: /C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.yassl.com/emailAddress=info@yassl.com - Last Update: Feb 7 20:14:06 2014 GMT - Next Update: Feb 7 20:14:06 2015 GMT + Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Programming/CN=www.wolfssl.com/emailAddress=info@wolfssl.com + Last Update: Feb 5 06:33:30 2015 GMT + Next Update: Nov 1 06:33:30 2017 GMT CRL extensions: X509v3 CRL Number: 4 -Revoked Certificates: - Serial Number: 02 - Revocation Date: Feb 7 20:14:06 2014 GMT +No Revoked Certificates. Signature Algorithm: ecdsa-with-SHA1 - 30:44:02:20:10:95:f9:c8:20:bc:7d:ce:79:6d:35:23:4c:82: - 8c:f5:8b:d1:4f:69:a9:5e:70:97:dd:bb:c2:67:13:46:b0:47: - 02:20:4f:1f:43:c2:cc:63:1c:6e:26:89:2d:e7:ce:69:45:6d: - fb:8f:53:cd:1f:84:0f:93:fe:83:91:69:f2:91:c6:f9 + 30:45:02:20:4d:27:ef:a6:92:28:ad:20:13:b2:ad:67:78:bc: + 04:b2:e6:35:0e:a5:33:64:14:a6:09:6d:06:4c:35:6c:96:a5: + 02:21:00:c5:d1:ab:c2:d2:2d:be:26:24:9f:c4:66:67:ca:00: + 68:3c:33:31:52:77:ee:36:d9:82:90:e5:2c:8d:e7:b0:e1 -----BEGIN X509 CRL----- -MIIBNTCB3gIBATAJBgcqhkjOPQQBMIGJMQswCQYDVQQGEwJVUzEPMA0GA1UECBMG -T3JlZ29uMQ4wDAYDVQQHEwVTYWxlbTETMBEGA1UEChMKQ2xpZW50IEVDQzENMAsG -A1UECxMERmFzdDEWMBQGA1UEAxMNd3d3Lnlhc3NsLmNvbTEdMBsGCSqGSIb3DQEJ -ARYOaW5mb0B5YXNzbC5jb20XDTE0MDIwNzIwMTQwNloXDTE1MDIwNzIwMTQwNlow -FDASAgECFw0xNDAyMDcyMDE0MDZaoA4wDDAKBgNVHRQEAwIBBDAJBgcqhkjOPQQB -A0cAMEQCIBCV+cggvH3OeW01I0yCjPWL0U9pqV5wl927wmcTRrBHAiBPH0PCzGMc -biaJLefOaUVt+49TzR+ED5P+g5Fp8pHG+Q== +MIIBKzCB0wIBATAJBgcqhkjOPQQBMIGUMQswCQYDVQQGEwJVUzEQMA4GA1UECAwH +TW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEQMA4GA1UECgwHd29sZlNTTDEUMBIG +A1UECwwLUHJvZ3JhbW1pbmcxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0G +CSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMTUwMjA1MDYzMzMwWhcNMTcx +MTAxMDYzMzMwWqAOMAwwCgYDVR0UBAMCAQQwCQYHKoZIzj0EAQNIADBFAiBNJ++m +kiitIBOyrWd4vASy5jUOpTNkFKYJbQZMNWyWpQIhAMXRq8LSLb4mJJ/EZmfKAGg8 +MzFSd+422YKQ5SyN57Dh -----END X509 CRL----- diff --git a/certs/crl/eccSrvCRL.pem b/certs/crl/eccSrvCRL.pem index 48fae36f3..f573d35a3 100644 --- a/certs/crl/eccSrvCRL.pem +++ b/certs/crl/eccSrvCRL.pem @@ -1,26 +1,24 @@ Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: ecdsa-with-SHA1 - Issuer: /C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC/CN=www.yassl.com/emailAddress=info@yassl.com - Last Update: Feb 7 20:14:06 2014 GMT - Next Update: Feb 7 20:14:06 2015 GMT + Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Programming/CN=www.wolfssl.com/emailAddress=info@wolfssl.com + Last Update: Feb 5 06:33:30 2015 GMT + Next Update: Nov 1 06:33:30 2017 GMT CRL extensions: X509v3 CRL Number: 5 -Revoked Certificates: - Serial Number: 02 - Revocation Date: Feb 7 20:14:06 2014 GMT +No Revoked Certificates. Signature Algorithm: ecdsa-with-SHA1 - 30:44:02:20:2a:2a:2c:ff:8a:0f:6a:74:57:b8:41:a8:5a:5c: - 8c:7d:c1:7d:b1:76:a3:db:ff:22:1a:69:cd:80:8d:d5:e4:2a: - 02:20:2d:51:3e:01:5b:79:6c:f4:89:89:63:46:0b:65:44:46: - 59:2d:42:3e:ba:a8:6d:08:4a:20:1f:9a:06:cc:a9:65 + 30:44:02:20:01:00:6d:c3:b8:f8:2c:bb:84:4e:76:22:4e:af: + 51:d5:b3:21:6f:0f:d1:df:a7:6a:ee:7d:6d:f2:9c:23:ef:7f: + 02:20:13:79:14:7f:e3:c2:49:55:83:66:61:25:83:35:3a:a4: + 05:92:26:be:6d:81:29:3a:54:63:60:f0:82:2d:36:e7 -----BEGIN X509 CRL----- -MIIBNzCB4AIBATAJBgcqhkjOPQQBMIGLMQswCQYDVQQGEwJVUzETMBEGA1UECBMK -V2FzaGluZ3RvbjEQMA4GA1UEBxMHU2VhdHRsZTEQMA4GA1UEChMHRWxpcHRpYzEM -MAoGA1UECxMDRUNDMRYwFAYDVQQDEw13d3cueWFzc2wuY29tMR0wGwYJKoZIhvcN -AQkBFg5pbmZvQHlhc3NsLmNvbRcNMTQwMjA3MjAxNDA2WhcNMTUwMjA3MjAxNDA2 -WjAUMBICAQIXDTE0MDIwNzIwMTQwNlqgDjAMMAoGA1UdFAQDAgEFMAkGByqGSM49 -BAEDRwAwRAIgKios/4oPanRXuEGoWlyMfcF9sXaj2/8iGmnNgI3V5CoCIC1RPgFb -eWz0iYljRgtlREZZLUI+uqhtCEogH5oGzKll +MIIBKjCB0wIBATAJBgcqhkjOPQQBMIGUMQswCQYDVQQGEwJVUzEQMA4GA1UECAwH +TW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEQMA4GA1UECgwHd29sZlNTTDEUMBIG +A1UECwwLUHJvZ3JhbW1pbmcxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0G +CSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMTUwMjA1MDYzMzMwWhcNMTcx +MTAxMDYzMzMwWqAOMAwwCgYDVR0UBAMCAQUwCQYHKoZIzj0EAQNHADBEAiABAG3D +uPgsu4ROdiJOr1HVsyFvD9Hfp2rufW3ynCPvfwIgE3kUf+PCSVWDZmElgzU6pAWS +Jr5tgSk6VGNg8IItNuc= -----END X509 CRL----- diff --git a/certs/ntru-cert.pem b/certs/ntru-cert.pem index e002ee3aa..4e8aa3e6b 100644 --- a/certs/ntru-cert.pem +++ b/certs/ntru-cert.pem @@ -1,28 +1,28 @@ -----BEGIN CERTIFICATE----- -MIIEzzCCA7egAwIBAgIIAXf7v+vECVkwDQYJKoZIhvcNAQEFBQAwgZQxCzAJBgNV +MIIEzzCCA7egAwIBAgIIAazu2er3DUMwDQYJKoZIhvcNAQEFBQAwgZQxCzAJBgNV BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYD VQQKDAhTYXd0b290aDETMBEGA1UECwwKQ29uc3VsdGluZzEYMBYGA1UEAwwPd3d3 LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMCIY -DzIwMTQwNzEwMjMyMDM5WhgPMjAxNTExMjMyMjIwMzlaMIGKMQswCQYDVQQGEwJV +DzIwMTUwMjA0MDYzMzI5WhgPMjAxNjA2MTkwNzMzMjlaMIGKMQswCQYDVQQGEwJV UzELMAkGA1UECAwCT1IxETAPBgNVBAcMCFBvcnRsYW5kMQ4wDAYDVQQKDAV5YVNT TDEUMBIGA1UECwwLRGV2ZWxvcG1lbnQxFjAUBgNVBAMMDXd3dy55YXNzbC5jb20x HTAbBgkqhkiG9w0BCQEWDmluZm9AeWFzc2wuY29tMIICTTAaBgsrBgEEAcEWAQEB -AQYLKwYBBAHBFgEBAi4DggItAASCAijYe+JeNLXR6gSUtCr6lgMmeCQqvDRCb8wp -bzUt/kqyRU7K0eMTSMv40ThD6jriU3p8uQQ92OkfbNwtWfB3VyScTpyr4INIvS3D -gB6Y4uH+kDlWVQutqiPNvNSn0AxBnTEBOsBqqyDqzAXujcoSOxTbU9GLv5jk08iU -Q9H4EkGMQgUr0VsPSBjrxK0VrQY9StpyObUM2z6LfRNjI5SGDvR6FBRdKUBdmUWw -EMvUhB39MbFebvXHNkyFeFaTbc6hgCRgzLNHpb2xzq7YCb+F5CsLFD8WuWKLn/Fn -61MSLvP99mIUM5MBBqacfrJSFzBWL8LX/NpEAO4SRbnKUJRr3e8cjfALU9oZnCgr -2TY91lnlJcfPTeHLckkYVacz+l0E8zJpge7PViYGK2Zdune7EJZ2QZ/EnhV7mrjc -GVwK6PZQ/l0UpzSz0yYyAzsb9OW7AlGOnH6u6lCP0sYwMDRdr1fPvq5Cu0ZkVzy+ -sfVD5kOyy35WEJQVmyuTu8ifos0QcmbqCNF5IrZtfZL7m/4Msg+GePL6x20A1TMF -rZ//+1gNbcxaeZZVG7Jw7RfW461SMbTuypt3Qp2eNHox6OrF+6A96t5vfOwqYa8W -GMMobFVQR8lH4qsBt/km0iQVjkvIjoSaPSSBcIgBxzXJwU2XCzVsj8tFW9IXP1SG -4ouMty6qbFb73k9EwliEQkLBjXfINp5/wlR1nv4dAA66rZNtysktWah8t8jXtSAw -DQYJKoZIhvcNAQEFBQADggEBAGCcqiwYrVUdQ7t4CvuPkuD7NFIAlVFNdwKaiJSp -moCCNL3sBWW1UjGKTLLRvn08oPAmrOQ8OkK1rusw+G7hxWjicEypp/WcaVCQv4or -M+BtWOUZ+fgIn6gHt4JRLMqt/R/t70AvONhIESL/XEjgQCP+GDuz+UDiwIxhzdcn -pSFU7APxKbeKIrFxiMaH8fB8fwPY60IH/LRTX7jA5ixXQWOm6r3u5ocmMW4naHd4 -qAWB5wGmU/rmvrSw+v0mHjwvI66DiCeZl9Y9i4mOKk+7eOTdOsKR1VifBtEg/+Qj -UHiltbupX9fkm5ncvaRS/stAYywBheGYbEMYMaatndvMuzw= +AQYLKwYBBAHBFgEBAi4DggItAASCAiifDYOsBu8WQqIuom5HpD+jF7bvqvyO7LN4 +p7dOUfyBBX2zFc7fbhVoLcLw62Ye0i54UXMI/rglgOxEisVXPo0//Cs2rl3zwjho +fnEvEMpDU4mvqYTV8+N7FYoaUSEhMWTS0GMCJdK9aTvAz8l7F8gKP6MtgIv7Ght/ +r6JclP7fh12KMy9hiM/Tv3wqr+KhR8xFRfpL+paEIroidfpExFWbFB+xxA6KxGk4 +OEs/nus4rQl4w+6z5uf1cYfxKVRMFWLScEDQ3TdPcHz0+7fl/L7LYyCbK9z9LYVZ +5qZR1V27Iwx4H3d2w2D/3GGZpML/Uv8eBBHtODBbJC54U+bVh1ned28N1Y8I/bm8 +xRRCppfCJ3o+WxlsqHtyjIo/hi75SgUHknnbZ4hEuye1XhBBhUVhN2zybADMi1bv +S1RL/HAWsOO8qzBx5vkbVlDShsF+EccNUaNQyM98VE3FrUBbk4JxnyHBK5pA7aQ5 +7LOm83WkX2uR+ucR5en2TZIGVL+cJiTly+W7W8J83KEf5HJIUqnxFlgsre/0pMfe +7RqGer5Q4itWE+XWaPsDCUZnHy8a/CGdWlmdiGuw/0UvDqKQ4NRerbMgpo2Fl182 +fIQxfohhnm7iM0dAroIglkNBLM89A30d+73ZnUKgg4mRaqC5C29Me6LqpXjEUCiT +/s3g24IooqTj+8i8osRY5Zp4MQTmb3NrWVAWoOTtbFxDkhkwgqALupC8opUSIwAw +DQYJKoZIhvcNAQEFBQADggEBAHPi6MLfKV3ILr4wVgktXWNrPVgbqzUfoHhZhuhU +OgoT1KjiGQTpMrszGXyNKWTV+TpL2RmsBsXwI+lCl9nQMk5nkHAELShwXmgBpR+r +2dQTUy6C5xze8ZqPhsIjUjHyaagX8QY42SlSGOCChOEYshqO+QouPL2XOf2Hp4nJ +fgx4Mo2APTxGJ8TLYBCu4QzglCkKl7g1JRKBVA8Q4bkb1NWOnTgRQfIVv3N9DMn0 +ELw4uHkS2bXlzzbKRpwIMms0MIdWrVKFycQIp9Z2/7RsrIidZdGgsDeJLpItMZB8 +UM5Fz1UyZTy54Keoto4nBsU9ZJxzsTihT+Oq+/n1WaMEn+I= -----END CERTIFICATE----- diff --git a/certs/ntru-key.raw b/certs/ntru-key.raw index e482d5980d9a3d6b09084297e1ec008e0ab611a8..740bd340eb074e5921b2acba8427cb2132bd4e6d 100644 GIT binary patch literal 607 zcmZQ#W?&MS&)d9)?Y)@OBE3aQCRB%@xbH`vv}KWUbvSdhULnXol{g z53keYF6mVS7IXaDq1y1qrR!+8U9bHgZL@W;pAT7N)D`LroN^BCT)(pA>gUJRqFqvf zii(CQmo6kTsb1QfX?@`Q$!hTvT=t7~8@hi>N!PDm6f@=D{r1={WBtUA^OyJ6Xsv&= z(EW_7>o4zL(^`~vDV6?mITAWsM1JEDzOEyg78c(2^Ilu5<*YdTZu7I}UklqmYKHiT zCS59UxNz6pzo6#J@9j_j>^q&TFkAc1U)|QoXUhVw#_m?;sgN%(JDl+UPU6fZhyDls zmtzrpYhe(rqE`|8>}q@Dz4CnCtNk2*ckVeV;)iu#P=Ti>DneMRn-XY$93dA-%-m}`E@Yzr4uz*W#2kQin^9C*s zIB~uv#P{f0hv>;oh4U2;YR__byTtO%=4GEtm&9jJ{PkS$>C11vlh{J`&rwr(div?^ z=tDJk7Ro;<@(5b_Q7l4d?fWlFj^BGL)mF7H;E{Hi@Y8Dbat75o@iY_uNoNM%6F8hOQp&moCP- VOwzJ2JQgCkxlmwL)UiUb0{|K`Dv1C9 literal 607 zcmZQ#W?&MyQT-^+Wb4IOEK{~<{hG$CR-vM`$HXcBjAp*6?mw?hu70O3J{I;k{o|sA z^DC=I!BsUoS!{2-l+U@N8~LF;TxE{moYfDSJ@)DzZjhVt=;6N!mSLgXYgZ|s-E(F6 z1s=z_hKyDRvQ{g+I>Y*|_mq&e$nD^Z-TP-exqM=Z^Ti)Rjy+DS+83kwJtSTqSu47h z&DQHyk>ysN+jiZx!pX{0+W5XyiHO8%I>gR&-5_xKN{j4Y!;NuyUyqylv{r;o&ONuV zK_%hLX7{CgH=bK}gL8lD6K!r0d$FBK-Sa=DzYZ4C`~3G?l8EtSMz&>h>NW+58-(c} zy8h>u3&T4h*PW*VrexoJFVp*hJNTC591ZQ8X13QNpQ;`|@B8p{k*7rHa^qjIET4@s z8{eG|Q)AOki``YeTVPt5QV4zpdiauj9E4SB+WM&j0^Af;aa}ROPf#=}iT1#jibH8)UfU-Kp8- zPIKp(R2jZ_b@cZF+gJDUYu;!jt{0OytdSEM;C|Bm(Q3x+Kh-X&i1vA(=xdo}tI}A| z!Fb&CD?Dsu?mqQUPPEH4V%TJiit3MP{I`5w> z1K+N-lXFj<)QwzGv;D;NtqPNFK75(3Q1;B#);eHD%WS3@Z+czCnpeMGD_Z1sE#G^A Wb!m3sE-zoROV$E~eyzGn!36*XX(wI) diff --git a/certs/server-cert.der b/certs/server-cert.der index 43669c42c7c2a8ff422efcc030c468d2c591e0b4..6d18c29b87099f0674ba555d4fd26e281989d72b 100644 GIT binary patch delta 318 zcmZ3)xrlSZZaGr}BLh(;4t%iHZm+1}MEb@XlM__Je6rse)qo~fmb6I#31 zb9_9vMsKZwNkc^WyFI&SmmHciaqHwqAB~%LaM$rf@as*y@H_ZR#&t85);HIbqx#z$z3%WC991s_e{rQ)Je0+?2vgcc|^q0rhuf1cd{psX=n}paKf7*&_ zY%jEU_uN-={&(O^^h2}FwniF@-}5M3+ZbSZEq!Ho%brOluO*dV2=u?&E73Dq-KM0p zFM{QlR*6gPA79J+A>z9#9>!)BT&`Kv(D+O;aN=Q?z&E=)Rt7)3zOqN-i=vEEAm Date: Thu, 5 Feb 2015 10:17:29 -0800 Subject: [PATCH 10/11] fix ecc compressed with alt size --- wolfcrypt/src/ecc.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/wolfcrypt/src/ecc.c b/wolfcrypt/src/ecc.c index 185922854..b15d04c69 100644 --- a/wolfcrypt/src/ecc.c +++ b/wolfcrypt/src/ecc.c @@ -2401,10 +2401,10 @@ int wc_ecc_import_x963(const byte* in, word32 inLen, ecc_key* key) if (err == MP_OKAY) { if ((mp_isodd(&t2) && in[0] == 0x03) || (!mp_isodd(&t2) && in[0] == 0x02)) { - err = mp_mod(&t2, &prime, &key->pubkey.y); + err = mp_mod(&t2, &prime, key->pubkey.y); } else { - err = mp_submod(&prime, &t2, &prime, &key->pubkey.y); + err = mp_submod(&prime, &t2, &prime, key->pubkey.y); } } From c8b9c841789944a85fa6f1efc84732f84fbfddbb Mon Sep 17 00:00:00 2001 From: toddouska Date: Thu, 5 Feb 2015 17:23:53 -0800 Subject: [PATCH 11/11] fix c++ build --- wolfcrypt/src/aes.c | 6 ------ wolfssl/wolfcrypt/memory.h | 9 +++++++++ 2 files changed, 9 insertions(+), 6 deletions(-) diff --git a/wolfcrypt/src/aes.c b/wolfcrypt/src/aes.c index 2c506b575..2e6504e61 100644 --- a/wolfcrypt/src/aes.c +++ b/wolfcrypt/src/aes.c @@ -3887,10 +3887,4 @@ static int AesCaviumCbcDecrypt(Aes* aes, byte* out, const byte* in, #endif /* HAVE_FIPS */ -#ifdef __cplusplus - } /* extern "C" */ -#endif - - #endif /* NO_AES */ - diff --git a/wolfssl/wolfcrypt/memory.h b/wolfssl/wolfcrypt/memory.h index 81250160d..3968b3527 100644 --- a/wolfssl/wolfcrypt/memory.h +++ b/wolfssl/wolfcrypt/memory.h @@ -28,6 +28,10 @@ #include #include +#ifdef __cplusplus + extern "C" { +#endif + typedef void *(*wolfSSL_Malloc_cb)(size_t size); typedef void (*wolfSSL_Free_cb)(void *ptr); typedef void *(*wolfSSL_Realloc_cb)(void *ptr, size_t size); @@ -43,5 +47,10 @@ WOLFSSL_API void* wolfSSL_Malloc(size_t size); WOLFSSL_API void wolfSSL_Free(void *ptr); WOLFSSL_API void* wolfSSL_Realloc(void *ptr, size_t size); + +#ifdef __cplusplus + } /* extern "C" */ +#endif + #endif /* WOLFSSL_MEMORY_H */