Compare commits

...

75 Commits

Author SHA1 Message Date
Sean Parkinson
c6ecafced2 Merge pull request #9451 from kaleb-himes/ESV-DRBG-Decouple
Esv drbg decouple
2025-11-25 09:19:52 +10:00
Sean Parkinson
89f27ceb19 Merge pull request #9453 from holtrop/rust-wc-random-additions
Rust wrapper: add HAVE_HASHDRBG RNG functions
2025-11-25 09:18:12 +10:00
Sean Parkinson
eac5c29fdb Merge pull request #9455 from holtrop/rust-wc-init-cleanup
Rust wrapper: wrap wolfCrypt_Init() and wolfCrypt_Cleanup()
2025-11-25 09:17:23 +10:00
David Garske
4ccad17a39 Merge pull request #9465 from SparkiDev/aesgcm_small_armasm
AES-GCM small ARM asm: add back implementation
2025-11-24 15:06:49 -08:00
David Garske
0786aa2585 Merge pull request #9464 from SparkiDev/sp_384_sub_fix
SP Thumb2/ARM32: P-384 sub not needed for small builds
2025-11-24 15:05:43 -08:00
Sean Parkinson
d49c76945a Merge pull request #9468 from josepho0918/mmcau
Correct SHA256 final endianness on MMCAU platforms
2025-11-25 08:38:21 +10:00
Joseph Chen
7752df3340 Correct SHA256 final endianness on MMCAU platforms 2025-11-24 16:48:35 +08:00
Sean Parkinson
ba47f7f333 AES-GCM small ARM asm: add back implementation
Implementation of GCM mult with length for ARM asm and small GCM was
added to armv8-aes.c but got lost when code pulled back to aes.c.
2025-11-24 11:08:18 +10:00
Sean Parkinson
46c704f51f SP Thumb2/ARM32: P-384 sub not needed for small builds
Don't have an implementation of sp_384_sub when building for small code
size.
2025-11-24 10:45:36 +10:00
Josh Holtrop
09e223baf3 Rust wrapper: wrap wolfCrypt_Init() and wolfCrypt_Cleanup() 2025-11-21 08:48:22 -05:00
Josh Holtrop
15b55ef279 Rust wrapper: add HAVE_HASHDRBG RNG functions 2025-11-21 08:31:27 -05:00
David Garske
59f4fa5686 Merge pull request #9452 from JacobBarthelmeh/release
prepare for release 5.8.4
2025-11-20 13:05:19 -08:00
JacobBarthelmeh
91f3d90f82 Update version .rc files too 2025-11-20 13:10:38 -07:00
JacobBarthelmeh
ab98c150c6 prepare for release 5.8.4 2025-11-20 10:57:50 -07:00
kaleb-himes
176801a21b Include new header in the template file also 2025-11-20 09:40:18 -07:00
kaleb-himes
eeb2b09b23 Address linuxkm builds and the new header 2025-11-20 09:38:13 -07:00
kaleb-himes
4da42ffae9 Fix typo in header include (capital E) 2025-11-20 09:38:13 -07:00
kaleb-himes
301a4a554b Add header to make install set 2025-11-20 09:38:13 -07:00
kaleb-himes
dc6fa0ad4e De-couple ESV from DRBG 2025-11-20 09:38:13 -07:00
JacobBarthelmeh
b6adf12f83 Merge pull request #9438 from douzzer/20251113-linuxkm-aarch64-fips-tweaks
20251113-linuxkm-aarch64-fips-tweaks
2025-11-19 17:42:45 -07:00
Daniel Pouzzner
bea6bcbba9 Merge pull request #9450 from JacobBarthelmeh/xilinx
adjust test case to account for AES-GCM key size support with Xilinx …
2025-11-19 18:14:10 -06:00
Daniel Pouzzner
30487ad236 linuxkm/: fixes for ARMv7, and miscellaneous fixes for Makefile and FIPS logic. 2025-11-19 17:21:29 -06:00
Daniel Pouzzner
06d3d6d3df linuxkm/Kbuild and linuxkm/module_hooks.c: refactor wc_linuxkm_pie_reloc_tab to include ground truth segment tag from ELF metadata.
tweaks for ARM32: recognize R_ARM_* relocations, and add -fno-unwind-tables to PIE_FLAGS.

linuxkm/linuxkm_wc_port.h:
* __PIE__: don't declare static pmd_to_page() unless USE_SPLIT_PMD_PTLOCKS.
* add wc_lkm_refcount_to_int() helper with -Wnested-externs suppressed.

wolfcrypt/src/fe_operations.c: in fe_frombytes() and fe_sq2(), use explicit XMEMSET()s to initialize working vars, rather than implicit, to avoid implicit (unshimmable) memset() calls.

wolfcrypt/src/ge_operations.c: fix gate on _wc_curve25519_dummy() to require CURVED25519_ASM.
2025-11-19 17:21:29 -06:00
JacobBarthelmeh
23a6edcc89 adjust test case to account for AES-GCM key size support with Xilinx afalg 2025-11-19 23:00:13 +00:00
JacobBarthelmeh
96dde5b4a8 Merge pull request #9392 from philljj/bsdkm
bsdkm: initial wolfcrypt FreeBSD kernel module support.
2025-11-19 15:25:21 -07:00
JacobBarthelmeh
8d357de6d8 Merge pull request #9444 from dgarske/macros_explicit
Fix issue with poorly written macros
2025-11-18 17:28:12 -07:00
David Garske
658ea305d1 Fix issue with poorly written macros 2025-11-18 14:15:22 -08:00
JacobBarthelmeh
10c5baec1a Merge pull request #9442 from SparkiDev/lms_192_8bit_checksum
LMS - check sum fix for SHA-256-192
2025-11-18 14:57:21 -07:00
jordan
631a28fccc bsdkm: better with-bsd-export-syms description in configure.ac. 2025-11-18 12:59:51 -06:00
jordan
0458fba394 bsdkm: add atomic_fcmpset_ptr. 2025-11-18 10:12:28 -06:00
jordan
551f90414c bsdkm: review cleanup. 2025-11-18 09:02:45 -06:00
Sean Parkinson
da0e4f59ec LMS - check sum fix for SHA-256-192
Only 8 bits needed of checksum whem doing 192-bit hashes with Winternitz
of 1 (9 for 256-bit hashes).
Cleanup code around checksum.
2025-11-18 21:20:02 +10:00
jordan
28e4fe3b6c bsdkm: initial wolfcrypt FreeBSD kernel module support. 2025-11-18 01:28:08 -06:00
Daniel Pouzzner
46a7719e2d Merge pull request #9441 from gojimmypi/pr-arduino-examples
Update Arduino workflow with parameterized matrix
2025-11-17 17:58:13 -06:00
JacobBarthelmeh
8e38e3bb5e Merge pull request #9433 from holtrop/rust-conditional-compilation
Rust wrapper: enable conditional compilation based on C library build options
2025-11-17 15:03:17 -07:00
JacobBarthelmeh
35374a16fe Merge pull request #9436 from douzzer/20251114-WOLFSSL_BLIND_PRIVATE_KEY-thread-safety
20251114-WOLFSSL_BLIND_PRIVATE_KEY-thread-safety
2025-11-17 15:01:13 -07:00
JacobBarthelmeh
2be7482210 Merge pull request #9439 from SparkiDev/mlkem_derive_secret_fix
ML-KEM: derive secret fix
2025-11-17 10:29:56 -07:00
gojimmypi
d2c0901e80 Update Arduino workflow with parameterized matrix 2025-11-17 08:41:28 -08:00
Sean Parkinson
074a3dbcc1 ML-KEM: derive secret fix
Fixes for deriving secret for ML-KEM.
2025-11-17 10:01:19 +10:00
Daniel Pouzzner
c29abccc9f src/internal.c: peer review: refactor wolfssl_priv_der_unblind() and wolfssl_priv_der_unblind_free() to use AllocDer() and FreeDer(). 2025-11-14 18:13:44 -06:00
Daniel Pouzzner
dee0658e8a fix races around WOLFSSL_CTX.{privateKey,privateKeyMask,altPrivateKey,altPrivateKeyMask} in WOLFSSL_BLIND_PRIVATE_KEY code paths:
* rename wolfssl_priv_der_unblind() to wolfssl_priv_der_blind_toggle(),
* add wolfssl_priv_der_unblind() that allocates a temp copy,
* add wolfssl_priv_der_unblind_free(),
* in wolfssl_priv_der_blind_toggle(), make mask a const arg;

restore const attribute to ctx arg to wolfSSL_CTX_get0_privatekey(), and add explanatory comment.
2025-11-14 18:13:43 -06:00
David Garske
5c421a152d Merge pull request #9429 from JacobBarthelmeh/certs
renew example certificates
2025-11-14 16:02:55 -08:00
JacobBarthelmeh
a68da8d2d5 update pksc7 decode test for new ca-cert.pem size 2025-11-14 14:53:48 -07:00
JacobBarthelmeh
3f441ef1a5 update tests after certificate renewal 2025-11-14 14:45:37 -07:00
JacobBarthelmeh
6c74098be5 run renewcerts.sh, gencertbuf.pl, and create_ocsp_test_blobs.py 2025-11-14 14:45:37 -07:00
JacobBarthelmeh
d18b251f54 Merge pull request #9420 from wolfSSL/TLS13-cipher-suite-fix
Fix TLS 1.3 cipher suite when TLS 1.2 ciphers precede TLS 1.3 ciphers
2025-11-14 16:42:05 -05:00
David Garske
46a2234c61 Merge pull request #9425 from JacobBarthelmeh/pkcs7_stream
with decode enveloped data track total encrypted content size
2025-11-14 12:59:09 -08:00
JacobBarthelmeh
30baf0a2e0 Merge pull request #9435 from dgarske/hmac_zerolen
Improve wc_HmacUpdate to return early if input length == 0
2025-11-14 15:49:04 -05:00
David Garske
4e1b719236 Improve wc_HmacUpdate to return early if input length == 0. Fixes QAT issue with HKDF test. 2025-11-14 09:40:56 -08:00
Josh Holtrop
c61ac22e89 Rust wrapper: enable conditional compilation based on C library build options 2025-11-14 10:44:25 -05:00
Josh Holtrop
dd3b9260f9 Rust wrapper: merge wolfssl-sys crate into wolfssl crate 2025-11-14 10:44:06 -05:00
philljj
50c5028c5a Merge pull request #9432 from douzzer/20251114-atomic-default-c
20251114-atomic-default-c
2025-11-14 10:34:24 -05:00
Daniel Pouzzner
135bb66352 wolfssl/wolfcrypt/wc_port.h and wolfcrypt/src/wc_port.c: use stdatomic.h implementation as C default when available, as before, for proper type annotation in objects. 2025-11-14 07:54:14 -06:00
Sean Parkinson
10a60fc41b Merge pull request #9427 from douzzer/20251113-ZD20815
20251113-ZD20815
2025-11-14 11:50:16 +10:00
Daniel Pouzzner
7916db78e8 wolfcrypt/src/wc_port.c and wolfssl/wolfcrypt/wc_port.h: change precedence of atomic implementations, and don't use the stdatomic.h in C++ builds (not compatible);
fix the name of the wolfSSL_Atomic_Ptr_CompareExchange() implementation in the _MSC_VER code path.
2025-11-13 17:28:19 -06:00
Daniel Pouzzner
c430cc75ea src/ssl.c and wolfssl/ssl.h: fix signature on wolfSSL_CTX_get0_privatekey() -- ctx is not const;
wolfcrypt/src/wc_port.c and wolfssl/wolfcrypt/wc_port.h: tweak gates on atomic implementations to maximize availability within currently supported targets;

fix some whitespace.
2025-11-13 17:11:52 -06:00
Daniel Pouzzner
26ba6344f2 add wolfSSL_Atomic_Ptr_CompareExchange(); mitigate race on ctx->privateKeyPKey in wolfSSL_CTX_get0_privatekey(). 2025-11-13 16:25:49 -06:00
JacobBarthelmeh
c63ca04228 convert to type int for return value 2025-11-13 12:17:04 -07:00
JacobBarthelmeh
d06221c16e with decode enveloped data track total encrypted content size 2025-11-13 12:08:46 -07:00
David Garske
6ff57b8045 Merge pull request #9419 from rlm2002/coverity
Uninitialized variable fix
2025-11-13 08:58:00 -08:00
David Garske
4f3586fe58 Merge pull request #9421 from SparkiDev/mlkem_to_bytes_fix
ML-KEM to bytes C: not reducing all values
2025-11-13 08:57:31 -08:00
David Garske
082943649b Merge pull request #9422 from SparkiDev/ecc_sign_hash_inlen_check
ECC sign hash: only allow up to max digest size
2025-11-13 08:55:53 -08:00
Sean Parkinson
6c30186168 ECC sign hash: only allow up to max digest size
Validate that the hash passed in is of an appropriate length - not
greater than the maximum digest size.
2025-11-13 11:53:51 +10:00
Sean Parkinson
b272f784ec ML-KEM to bytes C: not reducing all values
Call to mlkem_csubq_c was only called on first array.
Fixed to do it for all.
2025-11-13 10:42:07 +10:00
David Garske
5a8411a1ad Merge pull request #9418 from SparkiDev/tls13_ks_dup_check_fix
TLS 1.3 duplicate KeyShare entry fix
2025-11-12 16:09:11 -08:00
David Garske
f53191bae2 Merge pull request #9416 from julek-wolfssl/priv-key-blinding
Fix errors when blinding private keys
2025-11-12 16:09:03 -08:00
Ruby Martin
b2336c57ce initialize ctype variable 2025-11-12 16:48:52 -07:00
Sean Parkinson
1ec18949bc TLS 1.3 duplicate KeyShare entry fix
Fix comparison to be greater than or equal in case count is incremented
after maxing out.
2025-11-13 08:23:19 +10:00
David Garske
e78752f3b2 Merge pull request #9407 from holtrop/rust-heap-devid-cleanup
Rust wrapper: support optional heap and dev_id parameters
2025-11-12 13:50:45 -08:00
Josh Holtrop
40c471e20d Rust wrapper: fix cmac documentation 2025-11-12 13:41:08 -05:00
Juliusz Sosinowicz
32911dc6b8 Add blinding to CI 2025-11-12 17:12:35 +01:00
Juliusz Sosinowicz
4b7c052ee9 test_wolfSSL_inject: don't call accept on completed handshake 2025-11-12 17:12:22 +01:00
Juliusz Sosinowicz
d1c321abdc Don't override errors when blinding the priv key 2025-11-12 17:12:22 +01:00
Josh Holtrop
df99227dc8 Rust wrapper: use _ex APIs for heap and dev_id variants 2025-11-12 09:50:20 -05:00
Josh Holtrop
4102f8272e Rust wrapper: support optional heap and dev_id parameters 2025-11-10 13:53:51 -05:00
364 changed files with 13363 additions and 9366 deletions

View File

@@ -16,3 +16,5 @@ rsource "Kconfig.tls-generic"
\pagenumbering{alph}
DES3_KEY_SIZE = 24, /* 3 des ede */
/* functions added to support above needed, removed TOOM and KARATSUBA */
#include <sys/systm.h>
* extern global version from /usr/src/sys/sys/systm.h */

View File

@@ -38,7 +38,7 @@ name: Arduino CI Build (1 of 4) wolfssl
#
# To test locally:
# cd [your WOLFSSL_ROOT], e.g. cd /mnt/c/workspace/wolfssl-$USER
# [optional checkout] e.g. git checkout tags/v5.8.2-stable
# [optional checkout] e.g. git checkout tags/v5.8.4-stable
# pushd ./IDE/ARDUINO
# export ARDUINO_ROOT="$HOME/Arduino/libraries"
# ./wolfssl-arduino.sh INSTALL
@@ -50,6 +50,7 @@ on:
push:
branches: [ '**', 'master', 'main', 'release/**' ]
paths:
# Specific to this Arduino CI Build (1 of 4)
- '.github/workflows/arduino.yml'
- 'IDE/ARDUINO/**'
- 'src/**'
@@ -66,16 +67,60 @@ on:
workflow_dispatch:
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
# Same branch push cancels other jobs. Other PR branches untouched
group: ${{ github.workflow }}-${{ github.ref_name }}
cancel-in-progress: true
# END OF COMMON SECTION
jobs:
build:
if: github.repository_owner == 'wolfssl'
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
fqbn:
# When editing this list, be sure to also edit file: board_list.txt
# The compile-all-examples.sh optionally takes a FQBN parameter to
# optionally compile all examples ONLY for the respective fully qualified board name.
# See https://github.com/wolfSSL/wolfssl-examples/blob/master/Arduino/sketches/board_list.txt
- arduino:avr:ethernet
- arduino:avr:leonardoeth
- arduino:avr:mega
- arduino:avr:nano
- arduino:avr:uno
- arduino:avr:yun
- arduino:samd:mkrwifi1010
- arduino:samd:mkr1000
- arduino:samd:mkrfox1200
- arduino:mbed_edge:edge_control
- arduino:mbed_nano:nanorp2040connect
- arduino:mbed_portenta:envie_m7
- arduino:mbed_portenta:portenta_x8
- arduino:renesas_uno:unor4wifi
- arduino:sam:arduino_due_x
- arduino:samd:arduino_zero_native
- arduino:samd:tian
- esp32:esp32:esp32
- esp32:esp32:esp32s2
- esp32:esp32:esp32s3
- esp32:esp32:esp32c3
- esp32:esp32:esp32c6
- esp32:esp32:esp32h2
- esp8266:esp8266:generic
- teensy:avr:teensy40
# Not yet supported, not in standard library
# - esp32:esp32:nano_nora
# End strategy matrix
env:
REPO_OWNER: ${{ github.repository_owner }}
steps:
- name: Checkout Repository
uses: actions/checkout@v4
@@ -84,7 +129,7 @@ jobs:
run: |
# Script to fetch and run install.sh from arduino/arduino-cli
# The install script will test to see if the recently installed apps in in the path
# The install script will test to see if the recently installed apps in the path
# So set it up in advance:
mkdir -p "${PWD}/bin"
echo "${PWD}/bin" >> $GITHUB_PATH
@@ -95,7 +140,7 @@ jobs:
# Ensures that BINDIR exists before the installer runs
mkdir -p "$ROOT_BIN"
# Save as a lobal environment variable
# Save as a global environment variable
echo "$ROOT_BIN" >> "$GITHUB_PATH"
# Download and run install script from Arduino:
@@ -126,34 +171,53 @@ jobs:
echo "Alternative install script not needed."
fi
- name: Confirm Arduino CLI install
- name: Confirm Arduino CLI Install
run: arduino-cli version
- name: Derive CORE_ID (vendor:arch from FQBN)
run: |
CORE_ID="$(echo '${{ matrix.fqbn }}' | cut -d: -f1-2)"
echo "CORE_ID=$CORE_ID" >> "$GITHUB_ENV"
- name: Setup Arduino CLI
run: |
arduino-cli config init
arduino-cli core update-index
# wait 10 minutes for big downloads (or use 0 for no limit)
arduino-cli config set network.connection_timeout 600s
arduino-cli config add board_manager.additional_urls https://www.pjrc.com/teensy/package_teensy_index.json
arduino-cli core update-index
arduino-cli config add board_manager.additional_urls https://arduino.esp8266.com/stable/package_esp8266com_index.json
arduino-cli core update-index
arduino-cli core install esp32:esp32 # ESP32
arduino-cli core install arduino:avr # Arduino Uno, Mega, Nano
arduino-cli core install arduino:sam # Arduino Due
arduino-cli core install arduino:samd # Arduino Zero
arduino-cli core install teensy:avr # PJRC Teensy
arduino-cli core install esp8266:esp8266 # ESP8266
arduino-cli core install arduino:mbed_nano # nanorp2040connect
arduino-cli core install arduino:mbed_portenta # portenta_h7_m7
arduino-cli core install arduino:mbed_edge
echo "CORE_ID: $CORE_ID"
arduino-cli core install "$CORE_ID"
# The above is instead of:
# arduino-cli core install esp32:esp32 # ESP32
# arduino-cli core install arduino:avr # Arduino Uno, Mega, Nano
# arduino-cli core install arduino:sam # Arduino Due
# arduino-cli core install arduino:samd # Arduino Zero
# arduino-cli core install teensy:avr # PJRC Teensy
# arduino-cli core install esp8266:esp8266 # ESP8266
# arduino-cli core install arduino:mbed_nano # nanorp2040connect
# arduino-cli core install arduino:mbed_portenta # portenta_h7_m7
# arduino-cli core install arduino:mbed_edge
# arduino-cli core install arduino:renesas_uno
# For reference:
# mbed nano not yet tested
# sudo "/home/$USER/.arduino15/packages/arduino/hardware/mbed_nano/4.2.4/post_install.sh"
arduino-cli core install arduino:renesas_uno
# Always install networking (not part of FQBN matrix)
# The first one also creates directory: /home/runner/Arduino/libraries
arduino-cli lib install "ArduinoJson" # Example dependency
arduino-cli lib install "WiFiNINA" # ARDUINO_SAMD_NANO_33_IOT
arduino-cli lib install "Ethernet" # Install Ethernet library
arduino-cli lib install "Bridge" # Pseudo-network for things like arduino:samd:tian
- name: Set job environment variables
- name: Set Job Environment Variables
run: |
# Script to assign some common environment variables after everything is installed
@@ -178,6 +242,26 @@ jobs:
# WOLFSSL_EXAMPLES_ROOT is the repo root, not example location
echo "WOLFSSL_EXAMPLES_ROOT = $WOLFSSL_EXAMPLES_ROOT"
- name: Cache Arduino Packages
uses: actions/cache@v4
with:
path: |
~/.arduino15
~/.cache/arduino
~/.arduino15/staging
# Arduino libraries
# Specific to Arduino CI Build (2 of 4) Arduinbo Release wolfSSL for Local Examples
# Include all libraries, as the latest Arduino-wolfSSL will only change upon release.
~/Arduino/libraries
# Ensure wolfssl is not cached, we're always using the latest. See separate cache.
!~/Arduino/libraries/wolfssl
key: arduino-${{ runner.os }}-${{ env.CORE_ID }}-${{ hashFiles('Arduino/sketches/board_list.txt') }}
restore-keys: |
arduino-${{ runner.os }}-${{ env.CORE_ID }}-
arduino-${{ runner.os }}-
- name: Get wolfssl-examples
run: |
# Fetch Arduino examples from the wolfssl-examples repo
@@ -211,6 +295,9 @@ jobs:
run: |
# Run the local wolfssl-arduino.sh install script to install wolfssl Arduino library.
echo "Installing wolfSSL Arduino library (no cache hit)."
rm -rf "$ARDUINO_ROOT/wolfssl"
# Methods of installing Arduino library:
# 1) arduino-cli lib install "wolfSSL"
# 2) manual copy of files (typical of the Arduino-wolfssl repo)
@@ -253,7 +340,8 @@ jobs:
# Fetch script and board list into WOLFSSL_EXAMPLES_DIRECTORY
echo "Fetching board_list.txt from REPO_OWNER=$REPO_OWNER"
curl -L "https://raw.githubusercontent.com/$REPO_OWNER/wolfssl-examples/master/Arduino/sketches/board_list.txt" -o "$WOLFSSL_EXAMPLES_DIRECTORY/$THIS_BOARD_LIST"
curl -L "https://raw.githubusercontent.com/$REPO_OWNER/wolfssl-examples/master/Arduino/sketches/board_list.txt" \
-o "$WOLFSSL_EXAMPLES_DIRECTORY/$THIS_BOARD_LIST"
# Check if the first line is "404: Not Found" - which would indicate the curl path above is bad.
FILE="$WOLFSSL_EXAMPLES_DIRECTORY/board_list.txt"
@@ -272,7 +360,8 @@ jobs:
# Fetch the compile script from repo: https://github.com/[$USER]/wolfssl-examples/
echo "Fetching compile-all-examples.sh from REPO_OWNER=$REPO_OWNER"
curl -L "https://raw.githubusercontent.com/$REPO_OWNER/wolfssl-examples/master/Arduino/sketches/compile-all-examples.sh" -o "$WOLFSSL_EXAMPLES_DIRECTORY/compile-all-examples.sh"
curl -L "https://raw.githubusercontent.com/$REPO_OWNER/wolfssl-examples/master/Arduino/sketches/compile-all-examples.sh" \
-o "$WOLFSSL_EXAMPLES_DIRECTORY/compile-all-examples.sh"
# Check if the first line is "404: Not Found" - which would indicate the curl path above is bad.
FILE="$WOLFSSL_EXAMPLES_DIRECTORY/compile-all-examples.sh"
@@ -318,8 +407,12 @@ jobs:
echo "Change directory to Arduino examples..."
pushd "$WOLFSSL_EXAMPLES_DIRECTORY"
chmod +x ./compile-all-examples.sh
# The script expects all the examples to be in the current directory.
# Along with ./board_list.txt from examples repo
echo "Current directory: $PWD"
echo "Calling ./compile-all-examples.sh"
bash ./compile-all-examples.sh
bash ./compile-all-examples.sh ./board_list.txt "${{ matrix.fqbn }}"
popd
# End Compile Arduino Sketches for Various Boards

View File

@@ -64,6 +64,7 @@ jobs:
'--enable-dtls --enable-dtls13 --enable-ocspstapling --enable-ocspstapling2
--enable-cert-setup-cb --enable-sessioncerts',
'--disable-sni --disable-ecc --disable-tls13 --disable-secure-renegotiation-info',
'CPPFLAGS=-DWOLFSSL_BLIND_PRIVATE_KEY',
]
name: make check
if: github.repository_owner == 'wolfssl'

6
.gitignore vendored
View File

@@ -249,6 +249,12 @@ linuxkm/linuxkm
linuxkm/src
linuxkm/patches/src
*.nds
bsdkm/export_syms
bsdkm/i386
bsdkm/libwolfssl.ko
bsdkm/machine
bsdkm/opt_global.h
bsdkm/x86
# autotools generated
scripts/unit.test

View File

@@ -35,6 +35,7 @@ BASE64_NO_TABLE
BLAKE2B_SELFTEST
BLAKE2S_SELFTEST
BLOCKING
BSDKM_EXPORT_SYMS
BSP_DEFAULT_IO_CHANNEL_DEFINED
BSP_LED_0
BSP_LED_1
@@ -305,6 +306,7 @@ INTIMEVER
IOTSAFE_NO_GETDATA
IOTSAFE_SIG_8BIT_LENGTH
KCAPI_USE_XMALLOC
KERNEL_ROOT
K_SERIES
LIBWOLFSSL_VERSION_GIT_BRANCH
LIBWOLFSSL_VERSION_GIT_HASH
@@ -969,6 +971,7 @@ __ARCH_STRSTR_NO_REDIRECT
__ARM_ARCH_7M__
__ARM_FEATURE_CRYPTO
__ASSEMBLER__
__ATOMIC_CONSUME
__ATOMIC_RELAXED
__AVR_ARCH__
__AVR__

View File

@@ -34,7 +34,7 @@ if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_BINARY_DIR}")
You must delete them, or cmake will refuse to work.")
endif()
project(wolfssl VERSION 5.8.2 LANGUAGES C ASM)
project(wolfssl VERSION 5.8.4 LANGUAGES C ASM)
# Set WOLFSSL_ROOT if not already defined
if ("${WOLFSSL_ROOT}" STREQUAL "")
@@ -58,7 +58,7 @@ set(WOLFSSL_LIBRARY_VERSION_SECOND 0)
# increment if source code has changed
# set to zero if WOLFSSL_LIBRARY_VERSION_FIRST is incremented or
# WOLFSSL_LIBRARY_VERSION_SECOND is incremented
set(WOLFSSL_LIBRARY_VERSION_THIRD 0)
set(WOLFSSL_LIBRARY_VERSION_THIRD 1)
set(LIBTOOL_FULL_VERSION ${WOLFSSL_LIBRARY_VERSION_FIRST}.${WOLFSSL_LIBRARY_VERSION_SECOND}.${WOLFSSL_LIBRARY_VERSION_THIRD})

View File

@@ -1,3 +1,76 @@
# wolfSSL Release 5.8.4 (Nov. 20, 2025)
Release 5.8.4 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * --enable-heapmath is deprecated
* MD5 is now disabled by default
PR stands for Pull Request, and PR <NUMBER> references a GitHub pull request number where the code change was added.
## Vulnerabilities
* [Low CVE-2025-12888] Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. Thanks to Adrian Cinal for the report. Fixed in PR 9275.
* [Med. CVE-2025-11936] Potential DoS vulnerability due to a memory leak through multiple KeyShareEntry with the same group in malicious TLS 1.3 ClientHello messages. This affects users who are running wolfSSL on the server side with TLS 1.3. Thanks to Jaehun Lee and Kyungmin Bae, Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9117.
* [Low CVE-2025-11935] PSK with PFS (Perfect Forward Secrecy) downgrades to PSK without PFS during TLS 1.3 handshake. If the client sends a ClientHello that has a key share extension and the server responds with a ServerHello that does not have a key share extension the connection would previously continue on without using PFS. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9112.
* [Low CVE-2025-11934] Signature Algorithm downgrade from ECDSA P521 to P256 during TLS 1.3 handshake. When a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9113.
* [Low CVE-2025-11933] DoS Vulnerability in wolfSSL TLS 1.3 CKS extension parsing. Previously duplicate CKS extensions were not rejected leading to a potential memory leak when processing a ClientHello. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9132.
* [Low CVE-2025-11931] Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application. Thanks to Luigino Camastra from Aisle Research for the report. Fixed in PR 9223.
* [Low CVE-2025-11932] Timing Side-Channel in PSK Binder Verification. The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder. Thanks to Luigino Camastra from Aisle Research for the report. Fixed in PR 9223.
* [Low CVE-2025-12889] With TLS 1.2 connections a client can use any digest, specifically a weaker digest, rather than those in the CertificateRequest. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9395
## New Features
* New ML-KEM / ML-DSA APIs and seed/import PKCS8 support; added _new/_delete APIs for ML-KEM/ML-DSA. (PR 9039, 9000, 9049)
* Initial wolfCrypt FreeBSD kernel module support (PR 9392)
* Expanded PKCS7/CMS capabilities: decode SymmetricKeyPackage / OneSymmetricKey, add wc_PKCS7_GetEnvelopedDataKariRid, and allow PKCS7 builds with AES keywrap unset. (PR 9018, 9029, 9032)
* Add custom AES key wrap/unwrap callbacks and crypto callback copy/free operations. (PR 9002, 9309)
* Add support for certificate_authorities extension in ClientHello and certificate manager CA-type selection/unloading. (PR 9209, 9046)
* Large expansion of Rust wrapper modules: random, aes, rsa, ecc, dh, sha, hmac, cmac, ed25519/ed448, pbkdf2/PKCS#12, kdf/prf, SRTP KDFs, and conditional compilation options. (PR 9191, 9212, 9273, 9306, 9320, 9328, 9368, 9389, 9357, 9433)
* Rust: support optional heap and dev_id parameters and enable conditional compilation based on C build options. (PR 9407, 9433)
* STM32 fixes (benchmarking and platform fixes) and PSoC6 hardware acceleration additions. (PR 9228, 9256, 9185)
* STM32U5 added support for SAES and DHUK. (PR 9087)
* Add --enable-curl=tiny option for a smaller build when used with cURL. (PR 9174)
## Improvements / Optimizations
* Regression test fixes and expansion: TLS 1.3/1.2 tests, ARDUINO examples, libssh2 tests, hostap workflows, and nightly test improvements. (PR 9096, 9141, 9091, 9122, 9388)
* Improved test ordering and CI test stability (random tests run order changes, FIPS test fixes). (PR 9204, 9257)
* Docs and readme fixes, docstring updates, AsconAEAD comment placement, and example certificate renewals. (PR 9131, 9293, 9262, 9429)
* Updated GPL exception lists (GPLv2 and GPLv3 exception updates: add Fetchmail and OpenVPN). (PR 9398, 9413)
* Introduced WOLFSSL_DEBUG_CERTS and additional debug/logging refinements. (PR 8902, 9055)
* Expanded crypto-callback support (SHA family, HKDF, SHA-224, sha512_family digest selection) and improved crypto-only build cases. (PR 9070, 9252, 9271, 9100, 9194)
* AES & HW offload improvements including AES-CTR support in PKCS11 driver and AES ECB offload sizing fix. (PR 9277, 9364)
* ESP32: PSRAM allocator support and SHA HW fixes for ESP-IDF v6/v5. (PR 8987, 9225, 9264)
* Renesas FSP / RA examples updated and security-module TLS context improvements. (PR 9047, 9010, 9158, 9150)
* Broad configure/CMake/Autotools workflow improvements (Apple options tracking, Watcom pinning, Debian packaging, ESP-IDF pinning). (PR 9037, 9167, 9161, 9264)
* New assembly introspection / performance helpers for RISC-V and PPC32; benchmarking enhancements (cycle counts). (PR 9101, 9317)
* Update to SGX build for using assembly optimizations. (PR 8463, 9138)
* Testing with Fil-C compiler version to 0.674 (PR 9396)
* Refactors and compressing of small stack code (PR 9153)
## Bug Fixes
* Removed the test feature using popen when defining the macro WOLFSSL_USE_POPEN_HOST and not having HAVE_GETADDRINFO defined, along with having the macro HAVE_HTTP_CLIENT set. There was the potential for vulnerable behavior with the use of popen when the API wolfSSL_BIO_new_connect() was called with this specific build. This exact build configuration is only intended for testing with QEMU and is not enabled with any autoconf/cmake flags. Thanks to linraymond2006 for the report. (PR 9038)
* Fix for C# wrapper Ed25519 potential crash and heap overwrite with raw public key import when using the API Ed25519ImportPublic.This was a broken API with the C# wrapper that would crash on use. Thanks to Luigino Camastra from Aisle Research for the bug report. (PR 9291)
* Coverity, cppcheck, MISRA, clang-tidy, ZeroPath and other static-analysis driven fixes across the codebase. (PR 9006, 9078, 9068, 9265, 9324)
* TLS 1.2/DTLS improvements: client message order checks, DTLS cookie/exchange and replay protections, better DTLS early-data handling. (PR 9387, 9253, 9205, 9367)
* Improved X.509 & cert handling: allow larger pathLen in Basic Constraints, restore inner server name for ECH, retrying cert candidate chains. (PR 8890, 9234, 8692)
* Sniffer robustness: fix infinite recursion, better handling of OOO appData and partial overlaps, and improved retransmission detection. (PR 9051, 9106, 9140, 9094)
* Numerous linuxkm (kernel-mode) fixes, relocation/PIE normalization, and FIPS-related build tweaks across many iterations. (PR 9025, 9035, 9067, 9111, 9121)
* ML-KEM/Kyber and ML-DSA fixes for out-of-bounds and seed-import correctness; multiple ML-related safety fixes. (PR 9142, 9105, 9439)
* Avoid uninitialized-variable and GCC warnings; several fixes for undefined-shift/overflow issues. (PR 9020, 9372, 9195)
* Memory & leak fixes in X509 verification and various struct sizing fixes for WOLFSSL_NO_MALLOC usage. (PR 9258, 9036)
* Fixed RSA / signing / verify-only warnings allowing WOLFSSL_NO_CT_OPS when WOLFSSL_RSA_VERIFY_ONLY is used and API cleanups for using const. (PR 9031, 9263)
# wolfSSL Release 5.8.2 (July 17, 2025)
Release 5.8.2 has been developed according to wolfSSL's development and QA

View File

@@ -51,8 +51,8 @@ END
//
VS_VERSION_INFO VERSIONINFO
FILEVERSION 5,8,2,0
PRODUCTVERSION 5,8,2,0
FILEVERSION 5,8,4,0
PRODUCTVERSION 5,8,4,0
FILEFLAGSMASK 0x3fL
#ifdef _DEBUG
FILEFLAGS 0x1L
@@ -69,12 +69,12 @@ BEGIN
BEGIN
VALUE "CompanyName", "wolfSSL Inc."
VALUE "FileDescription", "The wolfSSL FIPS embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set."
VALUE "FileVersion", "5.8.2.0"
VALUE "FileVersion", "5.8.4.0"
VALUE "InternalName", "wolfssl-fips"
VALUE "LegalCopyright", "Copyright (C) 2023"
VALUE "OriginalFilename", "wolfssl-fips.dll"
VALUE "ProductName", "wolfSSL FIPS"
VALUE "ProductVersion", "5.8.2.0"
VALUE "ProductVersion", "5.8.4.0"
END
END
BLOCK "VarFileInfo"

View File

@@ -51,8 +51,8 @@ END
//
VS_VERSION_INFO VERSIONINFO
FILEVERSION 5,8,2,0
PRODUCTVERSION 5,8,2,0
FILEVERSION 5,8,4,0
PRODUCTVERSION 5,8,4,0
FILEFLAGSMASK 0x3fL
#ifdef _DEBUG
FILEFLAGS 0x1L
@@ -69,12 +69,12 @@ BEGIN
BEGIN
VALUE "CompanyName", "wolfSSL Inc."
VALUE "FileDescription", "The wolfSSL FIPS embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set."
VALUE "FileVersion", "5.8.2.0"
VALUE "FileVersion", "5.8.4.0"
VALUE "InternalName", "wolfssl-fips"
VALUE "LegalCopyright", "Copyright (C) 2025"
VALUE "OriginalFilename", "wolfssl-fips.dll"
VALUE "ProductName", "wolfSSL FIPS"
VALUE "ProductVersion", "5.8.2.0"
VALUE "ProductVersion", "5.8.4.0"
END
END
BLOCK "VarFileInfo"

View File

@@ -179,6 +179,7 @@ include sslSniffer/sslSnifferTest/include.am
include debian/include.am
include rpm/include.am
include linuxkm/include.am
include bsdkm/include.am
include zephyr/include.am
include RTOS/nuttx/include.am
@@ -220,7 +221,7 @@ if BUILD_LINUXKM
CFLAGS_FPU_DISABLE CFLAGS_FPU_ENABLE CFLAGS_SIMD_DISABLE CFLAGS_SIMD_ENABLE \
CFLAGS_AUTO_VECTORIZE_DISABLE CFLAGS_AUTO_VECTORIZE_ENABLE \
ASFLAGS_FPU_DISABLE_SIMD_ENABLE ASFLAGS_FPU_ENABLE_SIMD_DISABLE \
ASFLAGS_FPUSIMD_DISABLE ASFLAGS_FPUSIMD_ENABLE ENABLED_LINUXKM_BENCHMARKS
ASFLAGS_FPUSIMD_DISABLE ASFLAGS_FPUSIMD_ENABLE ENABLED_KERNEL_BENCHMARKS
module:
+$(MAKE) -C linuxkm libwolfssl.ko
@@ -236,6 +237,20 @@ install_module modules_install:
endif
if BUILD_BSDKM
SUBDIRS_OPT += bsdkm
DIST_SUBDIRS_OPT += bsdkm
.MAKE.EXPORTED = build_triplet host_triplet CC AS LD \
KERNEL_ROOT BSDKM_EXPORT_SYMS KERNEL_EXTRA_CFLAGS \
EXTRA_CFLAGS EXTRA_CPPFLAGS EXTRA_CCASFLAGS EXTRA_LDFLAGS \
AM_CPPFLAGS CPPFLAGS AM_CFLAGS CFLAGS \
AM_CCASFLAGS CCASFLAGS \
src_libwolfssl_la_OBJECTS ENABLED_CRYPT_TESTS
endif
if USE_VALGRIND
TESTS_ENVIRONMENT=./valgrind-error.sh
endif

223
README
View File

@@ -75,206 +75,77 @@ should be used for the enum name.
*** end Notes ***
# wolfSSL Release 5.8.2 (July 17, 2025)
# wolfSSL Release 5.8.4 (Nov. 20, 2025)
Release 5.8.2 has been developed according to wolfSSL's development and QA
Release 5.8.4 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * wolfSSL is now GPLv3 instead of GPLv2
* --enable-heapmath is deprecated
NOTE: * --enable-heapmath is deprecated
* MD5 is now disabled by default
PR stands for Pull Request, and PR <NUMBER> references a GitHub pull request number where the code change was added.
## Vulnerabilities
* [Low] There is the potential for a fault injection attack on ECC and Ed25519 verify operations. In versions of wolfSSL 5.7.6 and later the --enable-faultharden option is available to help mitigate against potential fault injection attacks. The mitigation added in wolfSSL version 5.7.6 is to help harden applications relying on the results of the verify operations, such as when used with wolfBoot. If doing ECC or Ed25519 verify operations on a device at risk for fault injection attacks then --enable-faultharden could be used to help mitigate it. Thanks to Kevin from Fraunhofer AISEC for the report.
Hardening option added in PR https://github.com/wolfSSL/wolfssl/pull/8289
* [Low CVE-2025-12888] Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. Thanks to Adrian Cinal for the report. Fixed in PR 9275.
* [High CVE-2025-7395] When using WOLFSSL_SYS_CA_CERTS and WOLFSSL_APPLE_NATIVE_CERT_VALIDATION on an Apple platform, the native trust store verification routine overrides errors produced elsewhere in the wolfSSL certificate verification process including failures due to hostname matching/SNI, OCSP, CRL, etc. This allows any trusted cert chain to override other errors detected during chain verification that should have resulted in termination of the TLS connection. If building wolfSSL on versions after 5.7.6 and before 5.8.2 with use of the system CA support and the apple native cert validation feature enabled on Apple devices (on by default for non-macOS Apple targets when using autotools or CMake) we recommend updating to the latest version of wolfSSL. Thanks to Thomas Leong from ExpressVPN for the report.
* [Med. CVE-2025-11936] Potential DoS vulnerability due to a memory leak through multiple KeyShareEntry with the same group in malicious TLS 1.3 ClientHello messages. This affects users who are running wolfSSL on the server side with TLS 1.3. Thanks to Jaehun Lee and Kyungmin Bae, Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9117.
Fixed in PR https://github.com/wolfSSL/wolfssl/pull/8833
* [Low CVE-2025-11935] PSK with PFS (Perfect Forward Secrecy) downgrades to PSK without PFS during TLS 1.3 handshake. If the client sends a ClientHello that has a key share extension and the server responds with a ServerHello that does not have a key share extension the connection would previously continue on without using PFS. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9112.
* [Low CVE-2025-11934] Signature Algorithm downgrade from ECDSA P521 to P256 during TLS 1.3 handshake. When a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9113.
* [Med. CVE-2025-7394] In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.
Fixed in the following PRs
https://github.com/wolfSSL/wolfssl/pull/8849
https://github.com/wolfSSL/wolfssl/pull/8867
https://github.com/wolfSSL/wolfssl/pull/8898
* [Low CVE-2025-11933] DoS Vulnerability in wolfSSL TLS 1.3 CKS extension parsing. Previously duplicate CKS extensions were not rejected leading to a potential memory leak when processing a ClientHello. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9132.
* [Low CVE-2025-11931] Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application. Thanks to Luigino Camastra from Aisle Research for the report. Fixed in PR 9223.
* [Low CVE-2025-7396] In wolfSSL 5.8.0 the option of hardening the C implementation of Curve25519 private key operations was added with the addition of blinding support (https://www.wolfssl.com/curve25519-blinding-support-added-in-wolfssl-5-8-0/). In wolfSSL release 5.8.2 that blinding support is turned on by default in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel assembly builds, and the small Curve25519 feature. While the attack would be very difficult to execute in practice, enabling blinding provides an additional layer of protection for devices that may be more susceptible to physical access or side-channel observation. Thanks to Arnaud Varillon, Laurent Sauvage, and Allan Delautre from Telecom Paris for the report.
Blinding enabled by default in PR https://github.com/wolfSSL/wolfssl/pull/8736
* [Low CVE-2025-11932] Timing Side-Channel in PSK Binder Verification. The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder. Thanks to Luigino Camastra from Aisle Research for the report. Fixed in PR 9223.
* [Low CVE-2025-12889] With TLS 1.2 connections a client can use any digest, specifically a weaker digest, rather than those in the CertificateRequest. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9395
## New Features
* Multiple sessions are now supported in the sniffer due to the removal of a cached check. (PR #8723)
* New API ssl_RemoveSession() has been implemented for sniffer cleanup operations. (PR #8768)
* The new ASN X509 API, `wc_GetSubjectPubKeyInfoDerFromCert`, has been introduced for retrieving public key information from certificates. (PR #8758)
* `wc_PKCS12_create()` has been enhanced to support PBE_AES(256|128)_CBC key and certificate encryptions. (PR #8782, PR #8822, PR #8859)
* `wc_PKCS7_DecodeEncryptedKeyPackage()` has been added for decoding encrypted key packages. (PR #8976)
* All AES, SHA, and HMAC functionality has been implemented within the Linux Kernel Module. (PR #8998)
* Additions to the compatibility layer have been introduced for X.509 extensions and RSA PSS. Adding the API i2d_PrivateKey_bio, BN_ucmp and X509v3_get_ext_by_NID. (PR #8897)
* Added support for STM32N6. (PR #8914)
* Implemented SHA-256 for PPC 32 assembly. (PR #8894)
* New ML-KEM / ML-DSA APIs and seed/import PKCS8 support; added _new/_delete APIs for ML-KEM/ML-DSA. (PR 9039, 9000, 9049)
* Initial wolfCrypt FreeBSD kernel module support (PR 9392)
* Expanded PKCS7/CMS capabilities: decode SymmetricKeyPackage / OneSymmetricKey, add wc_PKCS7_GetEnvelopedDataKariRid, and allow PKCS7 builds with AES keywrap unset. (PR 9018, 9029, 9032)
* Add custom AES key wrap/unwrap callbacks and crypto callback copy/free operations. (PR 9002, 9309)
* Add support for certificate_authorities extension in ClientHello and certificate manager CA-type selection/unloading. (PR 9209, 9046)
* Large expansion of Rust wrapper modules: random, aes, rsa, ecc, dh, sha, hmac, cmac, ed25519/ed448, pbkdf2/PKCS#12, kdf/prf, SRTP KDFs, and conditional compilation options. (PR 9191, 9212, 9273, 9306, 9320, 9328, 9368, 9389, 9357, 9433)
* Rust: support optional heap and dev_id parameters and enable conditional compilation based on C build options. (PR 9407, 9433)
* STM32 fixes (benchmarking and platform fixes) and PSoC6 hardware acceleration additions. (PR 9228, 9256, 9185)
* STM32U5 added support for SAES and DHUK. (PR 9087)
* Add --enable-curl=tiny option for a smaller build when used with cURL. (PR 9174)
## Improvements / Optimizations
### Linux Kernel Module (LinuxKM) Enhancements
* Registered DH and FFDHE for the Linux Kernel Module. (PR #8707)
* Implemented fixes for standard RNG in the Linux Kernel Module. (PR #8718)
* Added an ECDSA workaround for the Linux Kernel Module. (PR #8727)
* Added more PKCS1 pad SHA variants for RSA in the Linux Kernel Module. (PR #8730)
* Set default priority to 100000 for LKCAPI in the Linux Kernel Module. (PR #8740)
* Ensured ECDH never has FIPS enabled in the Linux Kernel Module. (PR #8751)
* Implemented further Linux Kernel Module and SP tweaks. (PR #8773)
* Added sig_alg support for Linux 6.13 RSA in the Linux Kernel Module. (PR #8796)
* Optimized wc_linuxkm_fpu_state_assoc. (PR #8828)
* Ensured DRBG is multithread-round-1 in the Linux Kernel Module. (PR #8840)
* Prevented toggling of fips_enabled in the Linux Kernel Module. (PR #8873)
* Refactored drbg_ctx clear in the Linux Kernel Module. (PR #8876)
* Set sig_alg max_size and digest_size callbacks for RSA in the Linux Kernel Module. (PR #8915)
* Added get_random_bytes for the Linux Kernel Module. (PR #8943)
* Implemented distro fix for the Linux Kernel Module. (PR #8994)
* Fixed page-flags-h in the Linux Kernel Module. (PR #9001)
* Added MODULE_LICENSE for the Linux Kernel Module. (PR #9005)
### Post-Quantum Cryptography (PQC) & Asymmetric Algorithms
* Kyber has been updated to the MLKEM ARM file for Zephyr (PR #8781)
* Backward compatibility has been implemented for ML_KEM IDs (PR #8827)
* ASN.1 is now ensured to be enabled when only building PQ algorithms (PR #8884)
* Building LMS with verify-only has been fixed (PR #8913)
* Parameters for LMS SHA-256_192 have been corrected (PR #8912)
* State can now be saved with the private key for LMS (PR #8836)
* Support for OpenSSL format has been added for ML-DSA/Dilithium (PR #8947)
* `dilithium_coeff_eta2[]` has been explicitly declared as signed (PR #8955)
### Build System & Portability
* Prepared for the inclusion of v5.8.0 in the Ada Alire index. (PR #8714)
* Introduced a new build option to allow reuse of the Windows crypt provider handle. (PR #8706)
* Introduced general fixes for various build configurations. (PR #8763)
* Made improvements for portability using older GCC 4.8.2. (PR #8753)
* Macro guards updated to allow tests to build with opensslall and no server. (PR #8776)
* Added a check for STDC_NO_ATOMICS macro before use of atomics. (PR #8885)
* Introduced CMakePresets.json and CMakeSettings.json. (PR #8905)
* Added an option to not use constant time code with min/max. (PR #8830)
* Implemented proper MacOS dispatch for conditional signal/wait. (PR #8928)
* Disabled MD5 by default for both general and CMake builds. (PR #8895, PR #8948)
* Improved to allow building OPENSSL_EXTRA without KEEP_PEER_CERT. (PR #8926)
* Added introspection for Intel and ARM assembly speedups. (PR #8954)
* Fixed cURL config to set HAVE_EX_DATA and HAVE_ALPN. (PR #8973)
* Moved FREESCALE forced algorithm HAVE_ECC to IDE/MQX/user_settings.h. (PR #8977)
### Testing & Debugging
* Fixed the exit status for testwolfcrypt. (PR #8762)
* Added WOLFSSL_DEBUG_PRINTF and WOLFSSL_DEBUG_CERTIFICATE_LOADS for improved debugging output. (PR #8769, PR #8770)
* Guarded some benchmark tests with NO_SW_BENCH. (PR #8760)
* Added an additional unit test for wolfcrypt PKCS12 file to improve code coverage. (PR #8831)
* Added an additional unit test for increased DH code coverage. (PR #8837)
* Adjusted for warnings with NO_TLS build and added GitHub actions test. (PR #8851)
* Added additional compatibility layer RAND tests. (PR #8852)
* Added an API unit test for checking domain name. (PR #8863)
* Added bind v9.18.33 testing. (PR #8888)
* Fixed issue with benchmark help options and descriptions not lining up. (PR #8957)
### Certificates & ASN.1
* Changed the algorithm for sum in ASN.1 OIDs. (PR #8655)
* Updated PKCS7 to use X509 STORE for internal verification. (PR #8748)
* Improved handling of temporary buffer size for X509 extension printing. (PR #8710)
* Marked IP address as WOLFSSL_V_ASN1_OCTET_STRING for ALT_NAMES_OID. (PR #8842)
* Fixed printing empty names in certificates. (PR #8880)
* Allowed CA:FALSE on wolftpm. (PR #8925)
* Fixed several inconsistent function prototype parameter names in wc/asn. (PR #8949)
* Accounted for custom extensions when creating a Cert from a WOLFSSL_X509. (PR #8960)
### TLS/DTLS & Handshake
* Checked group correctness outside of TLS 1.3 too for TLSX_UseSupportedCurve. (PR #8785)
* Dropped records that span datagrams in DTLS. (PR #8642)
* Implemented WC_NID_netscape_cert_type. (PR #8800)
* Refactored GetHandshakeHeader/GetHandShakeHeader into one function. (PR #8787)
* Correctly set the current peer in dtlsProcessPendingPeer. (PR #8848)
* Fixed set_groups for TLS. (PR #8824)
* Allowed trusted_ca_keys with TLSv1.3. (PR #8860)
* Moved Dtls13NewEpoch into DeriveTls13Keys. (PR #8858)
* Cleared tls1_3 on downgrade. (PR #8861)
* Always sent ACKs on detected retransmission for DTLS1.3. (PR #8882)
* Removed DTLS from echo examples. (PR #8889)
* Recalculated suites at SSL initialization. (PR #8757)
* No longer using BIO for ALPN. (PR #8969)
* Fixed wolfSSL_BIO_new_connect's handling of IPV6 addresses. (PR #8815)
* Memory Management & Optimizations
* Performed small stack refactors, improved stack size with mlkem and dilithium, and added additional tests. (PR #8779)
* Implemented FREE_MP_INT_SIZE in heap math. (PR #8881)
* Detected correct MAX_ENCODED_SIG_SZ based on max support in math lib. (PR #8931)
* Fixed improper access of sp_int_minimal using sp_int. (PR #8985)
### Cryptography & Hash Functions
* Implemented WC_SIPHASH_NO_ASM for not using assembly optimizations with siphash. (PR #8789, PR #8791)
* Added missing DH_MAX_SIZE define for FIPS and corrected wolfssl.rc FILETYPE to VFT_DLL. (PR #8794)
* Implemented WC_SHA3_NO_ASM for not using assembly with SHA3. (PR #8817)
* Improved Aarch64 XFENCE. (PR #8832)
* Omitted frame pointer for ARM32/Thumb2/RISC-V 64 assembly. (PR #8893)
* Fixed branch instruction in ARMv7a ASM. (PR #8933)
* Enabled EVP HMAC to work with WOLFSSL_HMAC_COPY_HASH. (PR #8944)
* Platform-Specific & Hardware Integration
* Added HAVE_HKDF for wolfssl_test and explicit support for ESP32P4. (PR #8742)
* Corrected Espressif default time setting. (PR #8829)
* Made wc_tsip_* APIs public. (PR #8717)
* Improved PlatformIO Certificate Bundle Support. (PR #8847)
* Fixed the TSIP TLS example program. (PR #8857)
* Added crypto callback functions for TROPIC01 secure element. (PR #8812)
* Added Renesas RX TSIP AES CTR support. (PR #8854)
* Fixed TSIP port using crypto callback. (PR #8937)
### General Improvements & Refactoring
* Attempted wolfssl_read_bio_file in read_bio even when XFSEEK is available. (PR #8703)
* Refactored GetHandshakeHeader/GetHandShakeHeader into one function. (PR #8787)
* Updated libspdm from 3.3.0 to 3.7.0. (PR #8906)
* Fixed missing dashes on the end of header and footer for Falcon PEM key. (PR #8904)
* Fixed minor code typos for macos signal and types.h max block size. (PR #8934)
* Make the API wolfSSL_X509_STORE_CTX_get_error accessible to more build configurations for ease of getting the "store" error code and depth with certificate failure callback implementations. (PR #8903)
* Regression test fixes and expansion: TLS 1.3/1.2 tests, ARDUINO examples, libssh2 tests, hostap workflows, and nightly test improvements. (PR 9096, 9141, 9091, 9122, 9388)
* Improved test ordering and CI test stability (random tests run order changes, FIPS test fixes). (PR 9204, 9257)
* Docs and readme fixes, docstring updates, AsconAEAD comment placement, and example certificate renewals. (PR 9131, 9293, 9262, 9429)
* Updated GPL exception lists (GPLv2 and GPLv3 exception updates: add Fetchmail and OpenVPN). (PR 9398, 9413)
* Introduced WOLFSSL_DEBUG_CERTS and additional debug/logging refinements. (PR 8902, 9055)
* Expanded crypto-callback support (SHA family, HKDF, SHA-224, sha512_family digest selection) and improved crypto-only build cases. (PR 9070, 9252, 9271, 9100, 9194)
* AES & HW offload improvements including AES-CTR support in PKCS11 driver and AES ECB offload sizing fix. (PR 9277, 9364)
* ESP32: PSRAM allocator support and SHA HW fixes for ESP-IDF v6/v5. (PR 8987, 9225, 9264)
* Renesas FSP / RA examples updated and security-module TLS context improvements. (PR 9047, 9010, 9158, 9150)
* Broad configure/CMake/Autotools workflow improvements (Apple options tracking, Watcom pinning, Debian packaging, ESP-IDF pinning). (PR 9037, 9167, 9161, 9264)
* New assembly introspection / performance helpers for RISC-V and PPC32; benchmarking enhancements (cycle counts). (PR 9101, 9317)
* Update to SGX build for using assembly optimizations. (PR 8463, 9138)
* Testing with Fil-C compiler version to 0.674 (PR 9396)
* Refactors and compressing of small stack code (PR 9153)
## Bug Fixes
* Fixed issues to support _WIN32_WCE (VS 2008 with WinCE 6.0/7.0). (PR #8709)
* Fixed STM32 Hash with IRQ enabled. (PR #8705)
* Fixed raw hash when using crypto instructions on RISC-V 64-bit. (PR #8733)
* Fixed ECDH decode secret in the Linux Kernel Module. (PR #8729)
* Passed in the correct hash type to wolfSSL_RSA_verify_ex. (PR #8726)
* Fixed issues for Intel QuickAssist latest driver (4.28). (PR #8728)
* Speculative fix for CodeSonar overflow issue in ssl_certman.c. (PR #8715)
* Fixed Arduino progmem print and AVR WOLFSSL_USER_IO. (PR #8668)
* Correctly advanced the index in wc_HKDF_Expand_ex. (PR #8737)
* Fixed STM32 hash status check logic, including NO_AES_192 and NO_AES_256. (PR #8732)
* Added missing call to wolfSSL_RefFree in FreeCRL to prevent memory leaks. (PR #8750)
* Fixed sanity check on --group with unit test app and null sanity check with des decrypt. (PR #8711)
* Fixed Curve25519 and static ephemeral issue with blinding. (PR #8766)
* Fixed edge case issue with STM32 AES GCM auth padding. (PR #8745)
* Removed redefinition of MlKemKey and fixed build issue in benchmark. (PR #8755)
* Used proper heap hint when freeing CRL in error case. (PR #8713)
* Added support for no malloc with wc_CheckCertSigPubKey. (PR #8725)
* Fixed C# wrapper Release build. (PR #8802)
* Handled malformed CCS and CCS before CH in TLS1.3. (PR #8788)
* Fixed ML-DSA with WOLFSSL_DILITHIUM_NO_SIGN. (PR #8798)
* Fixed AesGcmCrypt_1 no-stream in the Linux Kernel Module. (PR #8814)
* Fixed return value usage for crypto_sig_sign in the Linux Kernel Module. (PR #8816)
* Fixed issue with CSharp and Windows CE with conversion of ASCII and Unicode. (PR #8799)
* Fixed Renesas SCE on RA6M4. (PR #8838)
* Fixed tests for different configs for ML-DSA. (PR #8865)
* Fixed bug in ParseCRL_Extensions around the size of a CRL number handled and CRL number OID. (PR #8587)
* Fixed uninitialized wc_FreeRng in prime_test. (PR #8886)
* Fixed ECC configuration issues with ECC verify only and no RNG. (PR #8901)
* Fixed issues with max size, openssl.test netcat, and clang-tidy. (PR #8909)
* Fixed for casting down and uninit issues in Dilithium/ML-DSA. (PR #8868)
* Fixed memory allocation failure testing and related unit test cases. (PR #8945, PR #8952)
* Fixed build issue with ML-DSA 44 only. (PR #8981)
* Fixed possible memory leak with X509 reference counter when using x509small. (PR #8982)
* Removed the test feature using popen when defining the macro WOLFSSL_USE_POPEN_HOST and not having HAVE_GETADDRINFO defined, along with having the macro HAVE_HTTP_CLIENT set. There was the potential for vulnerable behavior with the use of popen when the API wolfSSL_BIO_new_connect() was called with this specific build. This exact build configuration is only intended for testing with QEMU and is not enabled with any autoconf/cmake flags. Thanks to linraymond2006 for the report. (PR 9038)
* Fix for C# wrapper Ed25519 potential crash and heap overwrite with raw public key import when using the API Ed25519ImportPublic.This was a broken API with the C# wrapper that would crash on use. Thanks to Luigino Camastra from Aisle Research for the bug report. (PR 9291)
* Coverity, cppcheck, MISRA, clang-tidy, ZeroPath and other static-analysis driven fixes across the codebase. (PR 9006, 9078, 9068, 9265, 9324)
* TLS 1.2/DTLS improvements: client message order checks, DTLS cookie/exchange and replay protections, better DTLS early-data handling. (PR 9387, 9253, 9205, 9367)
* Improved X.509 & cert handling: allow larger pathLen in Basic Constraints, restore inner server name for ECH, retrying cert candidate chains. (PR 8890, 9234, 8692)
* Sniffer robustness: fix infinite recursion, better handling of OOO appData and partial overlaps, and improved retransmission detection. (PR 9051, 9106, 9140, 9094)
* Numerous linuxkm (kernel-mode) fixes, relocation/PIE normalization, and FIPS-related build tweaks across many iterations. (PR 9025, 9035, 9067, 9111, 9121)
* ML-KEM/Kyber and ML-DSA fixes for out-of-bounds and seed-import correctness; multiple ML-related safety fixes. (PR 9142, 9105, 9439)
* Avoid uninitialized-variable and GCC warnings; several fixes for undefined-shift/overflow issues. (PR 9020, 9372, 9195)
* Memory & leak fixes in X509 verification and various struct sizing fixes for WOLFSSL_NO_MALLOC usage. (PR 9258, 9036)
* Fixed RSA / signing / verify-only warnings allowing WOLFSSL_NO_CT_OPS when WOLFSSL_RSA_VERIFY_ONLY is used and API cleanups for using const. (PR 9031, 9263)
For additional vulnerability information visit the vulnerability page at:
https://www.wolfssl.com/docs/security-vulnerabilities/

225
README.md
View File

@@ -80,206 +80,77 @@ single call hash function. Instead the name `WC_SHA`, `WC_SHA256`, `WC_SHA384` a
`WC_SHA512` should be used for the enum name.
# wolfSSL Release 5.8.2 (July 17, 2025)
# wolfSSL Release 5.8.4 (Nov. 20, 2025)
Release 5.8.2 has been developed according to wolfSSL's development and QA
Release 5.8.4 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * wolfSSL is now GPLv3 instead of GPLv2
* --enable-heapmath is deprecated
NOTE: * --enable-heapmath is deprecated
* MD5 is now disabled by default
PR stands for Pull Request, and PR (NUMBER) references a GitHub pull request number where the code change was added.
PR stands for Pull Request, and PR <NUMBER> references a GitHub pull request number where the code change was added.
## Vulnerabilities
* [Low] There is the potential for a fault injection attack on ECC and Ed25519 verify operations. In versions of wolfSSL 5.7.6 and later the --enable-faultharden option is available to help mitigate against potential fault injection attacks. The mitigation added in wolfSSL version 5.7.6 is to help harden applications relying on the results of the verify operations, such as when used with wolfBoot. If doing ECC or Ed25519 verify operations on a device at risk for fault injection attacks then --enable-faultharden could be used to help mitigate it. Thanks to Kevin from Fraunhofer AISEC for the report.
Hardening option added in PR https://github.com/wolfSSL/wolfssl/pull/8289
* [Low CVE-2025-12888] Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. Thanks to Adrian Cinal for the report. Fixed in PR 9275.
* [High CVE-2025-7395] When using WOLFSSL_SYS_CA_CERTS and WOLFSSL_APPLE_NATIVE_CERT_VALIDATION on an Apple platform, the native trust store verification routine overrides errors produced elsewhere in the wolfSSL certificate verification process including failures due to hostname matching/SNI, OCSP, CRL, etc. This allows any trusted cert chain to override other errors detected during chain verification that should have resulted in termination of the TLS connection. If building wolfSSL on versions after 5.7.6 and before 5.8.2 with use of the system CA support and the apple native cert validation feature enabled on Apple devices (on by default for non-macOS Apple targets when using autotools or CMake) we recommend updating to the latest version of wolfSSL. Thanks to Thomas Leong from ExpressVPN for the report.
* [Med. CVE-2025-11936] Potential DoS vulnerability due to a memory leak through multiple KeyShareEntry with the same group in malicious TLS 1.3 ClientHello messages. This affects users who are running wolfSSL on the server side with TLS 1.3. Thanks to Jaehun Lee and Kyungmin Bae, Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9117.
Fixed in PR https://github.com/wolfSSL/wolfssl/pull/8833
* [Low CVE-2025-11935] PSK with PFS (Perfect Forward Secrecy) downgrades to PSK without PFS during TLS 1.3 handshake. If the client sends a ClientHello that has a key share extension and the server responds with a ServerHello that does not have a key share extension the connection would previously continue on without using PFS. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9112.
* [Low CVE-2025-11934] Signature Algorithm downgrade from ECDSA P521 to P256 during TLS 1.3 handshake. When a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9113.
* [Med. CVE-2025-7394] In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.
Fixed in the following PRs
https://github.com/wolfSSL/wolfssl/pull/8849
https://github.com/wolfSSL/wolfssl/pull/8867
https://github.com/wolfSSL/wolfssl/pull/8898
* [Low CVE-2025-11933] DoS Vulnerability in wolfSSL TLS 1.3 CKS extension parsing. Previously duplicate CKS extensions were not rejected leading to a potential memory leak when processing a ClientHello. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9132.
* [Low CVE-2025-11931] Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application. Thanks to Luigino Camastra from Aisle Research for the report. Fixed in PR 9223.
* [Low CVE-2025-7396] In wolfSSL 5.8.0 the option of hardening the C implementation of Curve25519 private key operations was added with the addition of blinding support (https://www.wolfssl.com/curve25519-blinding-support-added-in-wolfssl-5-8-0/). In wolfSSL release 5.8.2 that blinding support is turned on by default in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel assembly builds, and the small Curve25519 feature. While the attack would be very difficult to execute in practice, enabling blinding provides an additional layer of protection for devices that may be more susceptible to physical access or side-channel observation. Thanks to Arnaud Varillon, Laurent Sauvage, and Allan Delautre from Telecom Paris for the report.
Blinding enabled by default in PR https://github.com/wolfSSL/wolfssl/pull/8736
* [Low CVE-2025-11932] Timing Side-Channel in PSK Binder Verification. The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder. Thanks to Luigino Camastra from Aisle Research for the report. Fixed in PR 9223.
* [Low CVE-2025-12889] With TLS 1.2 connections a client can use any digest, specifically a weaker digest, rather than those in the CertificateRequest. Thanks to Jaehun Lee from Pohang University of Science and Technology (POSTECH) for the report. Fixed in PR 9395
## New Features
* Multiple sessions are now supported in the sniffer due to the removal of a cached check. (PR #8723)
* New API ssl_RemoveSession() has been implemented for sniffer cleanup operations. (PR #8768)
* The new ASN X509 API, `wc_GetSubjectPubKeyInfoDerFromCert`, has been introduced for retrieving public key information from certificates. (PR #8758)
* `wc_PKCS12_create()` has been enhanced to support PBE_AES(256|128)_CBC key and certificate encryptions. (PR #8782, PR #8822, PR #8859)
* `wc_PKCS7_DecodeEncryptedKeyPackage()` has been added for decoding encrypted key packages. (PR #8976)
* All AES, SHA, and HMAC functionality has been implemented within the Linux Kernel Module. (PR #8998)
* Additions to the compatibility layer have been introduced for X.509 extensions and RSA PSS. Adding the API i2d_PrivateKey_bio, BN_ucmp and X509v3_get_ext_by_NID. (PR #8897)
* Added support for STM32N6. (PR #8914)
* Implemented SHA-256 for PPC 32 assembly. (PR #8894)
* New ML-KEM / ML-DSA APIs and seed/import PKCS8 support; added _new/_delete APIs for ML-KEM/ML-DSA. (PR 9039, 9000, 9049)
* Initial wolfCrypt FreeBSD kernel module support (PR 9392)
* Expanded PKCS7/CMS capabilities: decode SymmetricKeyPackage / OneSymmetricKey, add wc_PKCS7_GetEnvelopedDataKariRid, and allow PKCS7 builds with AES keywrap unset. (PR 9018, 9029, 9032)
* Add custom AES key wrap/unwrap callbacks and crypto callback copy/free operations. (PR 9002, 9309)
* Add support for certificate_authorities extension in ClientHello and certificate manager CA-type selection/unloading. (PR 9209, 9046)
* Large expansion of Rust wrapper modules: random, aes, rsa, ecc, dh, sha, hmac, cmac, ed25519/ed448, pbkdf2/PKCS#12, kdf/prf, SRTP KDFs, and conditional compilation options. (PR 9191, 9212, 9273, 9306, 9320, 9328, 9368, 9389, 9357, 9433)
* Rust: support optional heap and dev_id parameters and enable conditional compilation based on C build options. (PR 9407, 9433)
* STM32 fixes (benchmarking and platform fixes) and PSoC6 hardware acceleration additions. (PR 9228, 9256, 9185)
* STM32U5 added support for SAES and DHUK. (PR 9087)
* Add --enable-curl=tiny option for a smaller build when used with cURL. (PR 9174)
## Improvements / Optimizations
### Linux Kernel Module (LinuxKM) Enhancements
* Registered DH and FFDHE for the Linux Kernel Module. (PR #8707)
* Implemented fixes for standard RNG in the Linux Kernel Module. (PR #8718)
* Added an ECDSA workaround for the Linux Kernel Module. (PR #8727)
* Added more PKCS1 pad SHA variants for RSA in the Linux Kernel Module. (PR #8730)
* Set default priority to 100000 for LKCAPI in the Linux Kernel Module. (PR #8740)
* Ensured ECDH never has FIPS enabled in the Linux Kernel Module. (PR #8751)
* Implemented further Linux Kernel Module and SP tweaks. (PR #8773)
* Added sig_alg support for Linux 6.13 RSA in the Linux Kernel Module. (PR #8796)
* Optimized wc_linuxkm_fpu_state_assoc. (PR #8828)
* Ensured DRBG is multithread-round-1 in the Linux Kernel Module. (PR #8840)
* Prevented toggling of fips_enabled in the Linux Kernel Module. (PR #8873)
* Refactored drbg_ctx clear in the Linux Kernel Module. (PR #8876)
* Set sig_alg max_size and digest_size callbacks for RSA in the Linux Kernel Module. (PR #8915)
* Added get_random_bytes for the Linux Kernel Module. (PR #8943)
* Implemented distro fix for the Linux Kernel Module. (PR #8994)
* Fixed page-flags-h in the Linux Kernel Module. (PR #9001)
* Added MODULE_LICENSE for the Linux Kernel Module. (PR #9005)
### Post-Quantum Cryptography (PQC) & Asymmetric Algorithms
* Kyber has been updated to the MLKEM ARM file for Zephyr (PR #8781)
* Backward compatibility has been implemented for ML_KEM IDs (PR #8827)
* ASN.1 is now ensured to be enabled when only building PQ algorithms (PR #8884)
* Building LMS with verify-only has been fixed (PR #8913)
* Parameters for LMS SHA-256_192 have been corrected (PR #8912)
* State can now be saved with the private key for LMS (PR #8836)
* Support for OpenSSL format has been added for ML-DSA/Dilithium (PR #8947)
* `dilithium_coeff_eta2[]` has been explicitly declared as signed (PR #8955)
### Build System & Portability
* Prepared for the inclusion of v5.8.0 in the Ada Alire index. (PR #8714)
* Introduced a new build option to allow reuse of the Windows crypt provider handle. (PR #8706)
* Introduced general fixes for various build configurations. (PR #8763)
* Made improvements for portability using older GCC 4.8.2. (PR #8753)
* Macro guards updated to allow tests to build with opensslall and no server. (PR #8776)
* Added a check for STDC_NO_ATOMICS macro before use of atomics. (PR #8885)
* Introduced CMakePresets.json and CMakeSettings.json. (PR #8905)
* Added an option to not use constant time code with min/max. (PR #8830)
* Implemented proper MacOS dispatch for conditional signal/wait. (PR #8928)
* Disabled MD5 by default for both general and CMake builds. (PR #8895, PR #8948)
* Improved to allow building OPENSSL_EXTRA without KEEP_PEER_CERT. (PR #8926)
* Added introspection for Intel and ARM assembly speedups. (PR #8954)
* Fixed cURL config to set HAVE_EX_DATA and HAVE_ALPN. (PR #8973)
* Moved FREESCALE forced algorithm HAVE_ECC to IDE/MQX/user_settings.h. (PR #8977)
### Testing & Debugging
* Fixed the exit status for testwolfcrypt. (PR #8762)
* Added WOLFSSL_DEBUG_PRINTF and WOLFSSL_DEBUG_CERTIFICATE_LOADS for improved debugging output. (PR #8769, PR #8770)
* Guarded some benchmark tests with NO_SW_BENCH. (PR #8760)
* Added an additional unit test for wolfcrypt PKCS12 file to improve code coverage. (PR #8831)
* Added an additional unit test for increased DH code coverage. (PR #8837)
* Adjusted for warnings with NO_TLS build and added GitHub actions test. (PR #8851)
* Added additional compatibility layer RAND tests. (PR #8852)
* Added an API unit test for checking domain name. (PR #8863)
* Added bind v9.18.33 testing. (PR #8888)
* Fixed issue with benchmark help options and descriptions not lining up. (PR #8957)
### Certificates & ASN.1
* Changed the algorithm for sum in ASN.1 OIDs. (PR #8655)
* Updated PKCS7 to use X509 STORE for internal verification. (PR #8748)
* Improved handling of temporary buffer size for X509 extension printing. (PR #8710)
* Marked IP address as WOLFSSL_V_ASN1_OCTET_STRING for ALT_NAMES_OID. (PR #8842)
* Fixed printing empty names in certificates. (PR #8880)
* Allowed CA:FALSE on wolftpm. (PR #8925)
* Fixed several inconsistent function prototype parameter names in wc/asn. (PR #8949)
* Accounted for custom extensions when creating a Cert from a WOLFSSL_X509. (PR #8960)
### TLS/DTLS & Handshake
* Checked group correctness outside of TLS 1.3 too for TLSX_UseSupportedCurve. (PR #8785)
* Dropped records that span datagrams in DTLS. (PR #8642)
* Implemented WC_NID_netscape_cert_type. (PR #8800)
* Refactored GetHandshakeHeader/GetHandShakeHeader into one function. (PR #8787)
* Correctly set the current peer in dtlsProcessPendingPeer. (PR #8848)
* Fixed set_groups for TLS. (PR #8824)
* Allowed trusted_ca_keys with TLSv1.3. (PR #8860)
* Moved Dtls13NewEpoch into DeriveTls13Keys. (PR #8858)
* Cleared tls1_3 on downgrade. (PR #8861)
* Always sent ACKs on detected retransmission for DTLS1.3. (PR #8882)
* Removed DTLS from echo examples. (PR #8889)
* Recalculated suites at SSL initialization. (PR #8757)
* No longer using BIO for ALPN. (PR #8969)
* Fixed wolfSSL_BIO_new_connect's handling of IPV6 addresses. (PR #8815)
* Memory Management & Optimizations
* Performed small stack refactors, improved stack size with mlkem and dilithium, and added additional tests. (PR #8779)
* Implemented FREE_MP_INT_SIZE in heap math. (PR #8881)
* Detected correct MAX_ENCODED_SIG_SZ based on max support in math lib. (PR #8931)
* Fixed improper access of sp_int_minimal using sp_int. (PR #8985)
### Cryptography & Hash Functions
* Implemented WC_SIPHASH_NO_ASM for not using assembly optimizations with siphash. (PR #8789, PR #8791)
* Added missing DH_MAX_SIZE define for FIPS and corrected wolfssl.rc FILETYPE to VFT_DLL. (PR #8794)
* Implemented WC_SHA3_NO_ASM for not using assembly with SHA3. (PR #8817)
* Improved Aarch64 XFENCE. (PR #8832)
* Omitted frame pointer for ARM32/Thumb2/RISC-V 64 assembly. (PR #8893)
* Fixed branch instruction in ARMv7a ASM. (PR #8933)
* Enabled EVP HMAC to work with WOLFSSL_HMAC_COPY_HASH. (PR #8944)
* Platform-Specific & Hardware Integration
* Added HAVE_HKDF for wolfssl_test and explicit support for ESP32P4. (PR #8742)
* Corrected Espressif default time setting. (PR #8829)
* Made wc_tsip_* APIs public. (PR #8717)
* Improved PlatformIO Certificate Bundle Support. (PR #8847)
* Fixed the TSIP TLS example program. (PR #8857)
* Added crypto callback functions for TROPIC01 secure element. (PR #8812)
* Added Renesas RX TSIP AES CTR support. (PR #8854)
* Fixed TSIP port using crypto callback. (PR #8937)
### General Improvements & Refactoring
* Attempted wolfssl_read_bio_file in read_bio even when XFSEEK is available. (PR #8703)
* Refactored GetHandshakeHeader/GetHandShakeHeader into one function. (PR #8787)
* Updated libspdm from 3.3.0 to 3.7.0. (PR #8906)
* Fixed missing dashes on the end of header and footer for Falcon PEM key. (PR #8904)
* Fixed minor code typos for macos signal and types.h max block size. (PR #8934)
* Make the API wolfSSL_X509_STORE_CTX_get_error accessible to more build configurations for ease of getting the "store" error code and depth with certificate failure callback implementations. (PR #8903)
* Regression test fixes and expansion: TLS 1.3/1.2 tests, ARDUINO examples, libssh2 tests, hostap workflows, and nightly test improvements. (PR 9096, 9141, 9091, 9122, 9388)
* Improved test ordering and CI test stability (random tests run order changes, FIPS test fixes). (PR 9204, 9257)
* Docs and readme fixes, docstring updates, AsconAEAD comment placement, and example certificate renewals. (PR 9131, 9293, 9262, 9429)
* Updated GPL exception lists (GPLv2 and GPLv3 exception updates: add Fetchmail and OpenVPN). (PR 9398, 9413)
* Introduced WOLFSSL_DEBUG_CERTS and additional debug/logging refinements. (PR 8902, 9055)
* Expanded crypto-callback support (SHA family, HKDF, SHA-224, sha512_family digest selection) and improved crypto-only build cases. (PR 9070, 9252, 9271, 9100, 9194)
* AES & HW offload improvements including AES-CTR support in PKCS11 driver and AES ECB offload sizing fix. (PR 9277, 9364)
* ESP32: PSRAM allocator support and SHA HW fixes for ESP-IDF v6/v5. (PR 8987, 9225, 9264)
* Renesas FSP / RA examples updated and security-module TLS context improvements. (PR 9047, 9010, 9158, 9150)
* Broad configure/CMake/Autotools workflow improvements (Apple options tracking, Watcom pinning, Debian packaging, ESP-IDF pinning). (PR 9037, 9167, 9161, 9264)
* New assembly introspection / performance helpers for RISC-V and PPC32; benchmarking enhancements (cycle counts). (PR 9101, 9317)
* Update to SGX build for using assembly optimizations. (PR 8463, 9138)
* Testing with Fil-C compiler version to 0.674 (PR 9396)
* Refactors and compressing of small stack code (PR 9153)
## Bug Fixes
* Fixed issues to support _WIN32_WCE (VS 2008 with WinCE 6.0/7.0). (PR #8709)
* Fixed STM32 Hash with IRQ enabled. (PR #8705)
* Fixed raw hash when using crypto instructions on RISC-V 64-bit. (PR #8733)
* Fixed ECDH decode secret in the Linux Kernel Module. (PR #8729)
* Passed in the correct hash type to wolfSSL_RSA_verify_ex. (PR #8726)
* Fixed issues for Intel QuickAssist latest driver (4.28). (PR #8728)
* Speculative fix for CodeSonar overflow issue in ssl_certman.c. (PR #8715)
* Fixed Arduino progmem print and AVR WOLFSSL_USER_IO. (PR #8668)
* Correctly advanced the index in wc_HKDF_Expand_ex. (PR #8737)
* Fixed STM32 hash status check logic, including NO_AES_192 and NO_AES_256. (PR #8732)
* Added missing call to wolfSSL_RefFree in FreeCRL to prevent memory leaks. (PR #8750)
* Fixed sanity check on --group with unit test app and null sanity check with des decrypt. (PR #8711)
* Fixed Curve25519 and static ephemeral issue with blinding. (PR #8766)
* Fixed edge case issue with STM32 AES GCM auth padding. (PR #8745)
* Removed redefinition of MlKemKey and fixed build issue in benchmark. (PR #8755)
* Used proper heap hint when freeing CRL in error case. (PR #8713)
* Added support for no malloc with wc_CheckCertSigPubKey. (PR #8725)
* Fixed C# wrapper Release build. (PR #8802)
* Handled malformed CCS and CCS before CH in TLS1.3. (PR #8788)
* Fixed ML-DSA with WOLFSSL_DILITHIUM_NO_SIGN. (PR #8798)
* Fixed AesGcmCrypt_1 no-stream in the Linux Kernel Module. (PR #8814)
* Fixed return value usage for crypto_sig_sign in the Linux Kernel Module. (PR #8816)
* Fixed issue with CSharp and Windows CE with conversion of ASCII and Unicode. (PR #8799)
* Fixed Renesas SCE on RA6M4. (PR #8838)
* Fixed tests for different configs for ML-DSA. (PR #8865)
* Fixed bug in ParseCRL_Extensions around the size of a CRL number handled and CRL number OID. (PR #8587)
* Fixed uninitialized wc_FreeRng in prime_test. (PR #8886)
* Fixed ECC configuration issues with ECC verify only and no RNG. (PR #8901)
* Fixed issues with max size, openssl.test netcat, and clang-tidy. (PR #8909)
* Fixed for casting down and uninit issues in Dilithium/ML-DSA. (PR #8868)
* Fixed memory allocation failure testing and related unit test cases. (PR #8945, PR #8952)
* Fixed build issue with ML-DSA 44 only. (PR #8981)
* Fixed possible memory leak with X509 reference counter when using x509small. (PR #8982)
* Removed the test feature using popen when defining the macro WOLFSSL_USE_POPEN_HOST and not having HAVE_GETADDRINFO defined, along with having the macro HAVE_HTTP_CLIENT set. There was the potential for vulnerable behavior with the use of popen when the API wolfSSL_BIO_new_connect() was called with this specific build. This exact build configuration is only intended for testing with QEMU and is not enabled with any autoconf/cmake flags. Thanks to linraymond2006 for the report. (PR 9038)
* Fix for C# wrapper Ed25519 potential crash and heap overwrite with raw public key import when using the API Ed25519ImportPublic.This was a broken API with the C# wrapper that would crash on use. Thanks to Luigino Camastra from Aisle Research for the bug report. (PR 9291)
* Coverity, cppcheck, MISRA, clang-tidy, ZeroPath and other static-analysis driven fixes across the codebase. (PR 9006, 9078, 9068, 9265, 9324)
* TLS 1.2/DTLS improvements: client message order checks, DTLS cookie/exchange and replay protections, better DTLS early-data handling. (PR 9387, 9253, 9205, 9367)
* Improved X.509 & cert handling: allow larger pathLen in Basic Constraints, restore inner server name for ECH, retrying cert candidate chains. (PR 8890, 9234, 8692)
* Sniffer robustness: fix infinite recursion, better handling of OOO appData and partial overlaps, and improved retransmission detection. (PR 9051, 9106, 9140, 9094)
* Numerous linuxkm (kernel-mode) fixes, relocation/PIE normalization, and FIPS-related build tweaks across many iterations. (PR 9025, 9035, 9067, 9111, 9121)
* ML-KEM/Kyber and ML-DSA fixes for out-of-bounds and seed-import correctness; multiple ML-related safety fixes. (PR 9142, 9105, 9439)
* Avoid uninitialized-variable and GCC warnings; several fixes for undefined-shift/overflow issues. (PR 9020, 9372, 9195)
* Memory & leak fixes in X509 verification and various struct sizing fixes for WOLFSSL_NO_MALLOC usage. (PR 9258, 9036)
* Fixed RSA / signing / verify-only warnings allowing WOLFSSL_NO_CT_OPS when WOLFSSL_RSA_VERIFY_ONLY is used and API cleanups for using const. (PR 9031, 9263)
For additional vulnerability information visit the vulnerability page at:
https://www.wolfssl.com/docs/security-vulnerabilities/

50
bsdkm/Makefile Normal file
View File

@@ -0,0 +1,50 @@
# wolfssl kernel module name and source, and root dir.
KMOD=libwolfssl
SRCS=wolfkmod.c
WOLFSSL_DIR=../
CFLAGS+=-I${WOLFSSL_DIR}
CFLAGS+=-DWOLFSSL_IGNORE_FILE_WARN -DHAVE_CONFIG_H -DNO_MAIN_DRIVER
# debug printing
# CFLAGS+=-DWOLFSSL_BSDKM_VERBOSE_DEBUG
CFLAGS+=$(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS)
# FreeBSD make does not support GNU make's patsubst and related. Filter
# through sed instead.
WOLFSSL_OBJS != echo ${src_libwolfssl_la_OBJECTS} | \
sed 's|src_libwolfssl_la-||g' | sed 's|\.lo|.o|g' | \
sed 's|wolfcrypt/src/|${WOLFSSL_DIR}/wolfcrypt/src/|g'
.if ${ENABLED_CRYPT_TESTS} == "yes"
WOLFSSL_OBJS += ${WOLFSSL_DIR}/wolfcrypt/test/test.o
.else
CFLAGS+=-DNO_CRYPT_TEST
.endif
OBJS += ${WOLFSSL_OBJS}
# Export no public symbols by default.
.if !defined(BSDKM_EXPORT_SYMS)
EXPORT_SYMS=NO
.else
EXPORT_SYMS=${BSDKM_EXPORT_SYMS}
.endif
# Default to live kernel src tree makefile at
# /usr/src/sys/conf/kmod.mk
.if !defined(KERNEL_ROOT)
SYSDIR?= /usr/src/sys
.else
SYSDIR?= ${KERNEL_ROOT}
.endif
.include "${SYSDIR}/conf/kmod.mk"
# Smooth out a few inconsistencies between FreeBSD default compiler flags
# in /usr/src/sys/conf/kern.mk, vs wolfssl harden flags in
# m4/ax_harden_compiler_flags.m4. E.g. some FreeBSD header files shorten
# 64 to 32 bit, and some wolfcrypt functions cast away const.
CFLAGS+= -Wno-unused-function
CFLAGS+= -Wno-cast-qual
CFLAGS+= -Wno-error=cast-qual
CFLAGS+= -Wno-shorten-64-to-32
CFLAGS+= -DLIBWOLFSSL_GLOBAL_EXTRA_CFLAGS="\" $(KERNEL_EXTRA_CFLAGS)\""

118
bsdkm/bsdkm_wc_port.h Normal file
View File

@@ -0,0 +1,118 @@
/* bsdkm_wc_port.h
*
* Copyright (C) 2006-2025 wolfSSL Inc.
*
* This file is part of wolfSSL.
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
*/
/* included by wolfssl/wolfcrypt/wc_port.h */
#ifndef BSDKM_WC_PORT_H
#define BSDKM_WC_PORT_H
#ifdef WOLFSSL_BSDKM
#include <sys/ctype.h>
#include <sys/types.h>
#include <sys/malloc.h>
#include <sys/systm.h>
#if !defined(SINGLE_THREADED)
#include <sys/mutex.h>
#endif /* !SINGLE_THREADED */
#ifndef CHAR_BIT
#include <sys/limits.h>
#endif /* !CHAR_BIT*/
/* needed to prevent wolfcrypt/src/asn.c version shadowing
* extern global version from /usr/src/sys/sys/systm.h */
#define version wc_version
#define wc_km_printf printf
/* str and char utility functions */
#define XATOI(s) ({ \
char * endptr = NULL; \
long _xatoi_ret = strtol(s, &endptr, 10); \
if ((s) == endptr || *endptr != '\0') { \
_xatoi_ret = 0; \
} \
(int)_xatoi_ret; \
})
#if !defined(XMALLOC_OVERRIDE)
#error bsdkm requires XMALLOC_OVERRIDE
#endif /* !XMALLOC_OVERRIDE */
/* use malloc and free from /usr/include/sys/malloc.h */
extern struct malloc_type M_WOLFSSL[1];
#define XMALLOC(s, h, t) \
({(void)(h); (void)(t); malloc(s, M_WOLFSSL, M_WAITOK | M_ZERO);})
#ifdef WOLFSSL_XFREE_NO_NULLNESS_CHECK
#define XFREE(p, h, t) \
({(void)(h); (void)(t); free(p, M_WOLFSSL);})
#else
#define XFREE(p, h, t) \
({void* _xp; (void)(h); (void)(t); _xp = (p); \
if(_xp) free(_xp, M_WOLFSSL);})
#endif
#if !defined(SINGLE_THREADED)
#define WC_MUTEX_OPS_INLINE
typedef struct wolfSSL_Mutex {
struct mtx lock;
} wolfSSL_Mutex;
static __always_inline int wc_InitMutex(wolfSSL_Mutex * m)
{
mtx_init(&m->lock, "wolfssl spinlock", NULL, MTX_SPIN);
return 0;
}
static __always_inline int wc_FreeMutex(wolfSSL_Mutex * m)
{
mtx_destroy(&m->lock);
return 0;
}
static __always_inline int wc_LockMutex(wolfSSL_Mutex *m)
{
mtx_lock_spin(&m->lock);
return 0;
}
static __always_inline int wc_UnLockMutex(wolfSSL_Mutex* m)
{
mtx_unlock_spin(&m->lock);
return 0;
}
#endif /* !SINGLE_THREADED */
#if defined(WOLFSSL_HAVE_ATOMIC_H) && !defined(WOLFSSL_NO_ATOMICS)
#include <machine/atomic.h>
typedef volatile int wolfSSL_Atomic_Int;
typedef volatile unsigned int wolfSSL_Atomic_Uint;
#define WOLFSSL_ATOMIC_INITIALIZER(x) (x)
#define WOLFSSL_ATOMIC_LOAD(x) (int)atomic_load_acq_int(&(x))
#define WOLFSSL_ATOMIC_STORE(x, v) atomic_store_rel_int(&(x), (v))
#define WOLFSSL_ATOMIC_OPS
#endif /* WOLFSSL_HAVE_ATOMIC_H && !WOLFSSL_NO_ATOMICS */
#endif /* WOLFSSL_BSDKM */
#endif /* BSDKM_WC_PORT_H */

8
bsdkm/include.am Normal file
View File

@@ -0,0 +1,8 @@
# vim:ft=automake
# included from Top Level Makefile.am
# All paths should be given relative to the root
EXTRA_DIST += m4/ax_bsdkm.m4 \
bsdkm/Makefile \
bsdkm/wolfkmod.c \
bsdkm/bsdkm_wc_port.h

186
bsdkm/wolfkmod.c Normal file
View File

@@ -0,0 +1,186 @@
/* wolfkmod.c -- wolfssl FreeBSD kernel module.
*
* Copyright (C) 2006-2025 wolfSSL Inc.
*
* This file is part of wolfSSL.
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
*/
#ifdef WOLFSSL_BSDKM
/* freebsd system includes */
#include <sys/param.h>
#include <sys/module.h>
#include <sys/kernel.h>
/* wolf includes */
#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
#ifdef WOLFCRYPT_ONLY
#include <wolfssl/version.h>
#else
#include <wolfssl/ssl.h>
#endif
#if !defined(NO_CRYPT_TEST)
#include <wolfcrypt/test/test.h>
#endif
MALLOC_DEFINE(M_WOLFSSL, "libwolfssl", "wolfSSL kernel memory");
static int wolfkmod_init(void);
static int wolfkmod_cleanup(void);
static int wolfkmod_load(void);
static int wolfkmod_unload(void);
static int wolfkmod_init(void)
{
int ret = 0;
#ifdef WOLFCRYPT_ONLY
ret = wolfCrypt_Init();
if (ret != 0) {
printf("error: wolfCrypt_Init failed: %s\n", wc_GetErrorString(ret));
return -ECANCELED;
}
#else
ret = wolfSSL_Init();
if (ret != WOLFSSL_SUCCESS) {
printf("error: wolfSSL_Init failed: %s\n", wc_GetErrorString(ret));
return -ECANCELED;
}
#endif
return ret;
}
static int wolfkmod_cleanup(void)
{
int ret = 0;
#ifdef WOLFCRYPT_ONLY
ret = wolfCrypt_Cleanup();
if (ret != 0) {
printf("error: wolfCrypt_Cleanup failed: %s\n", wc_GetErrorString(ret));
}
else {
#if defined(WOLFSSL_BSDKM_VERBOSE_DEBUG)
printf("info: wolfCrypt " LIBWOLFSSL_VERSION_STRING " cleanup complete.\n");
#endif /* WOLFSSL_BSDKM_VERBOSE_DEBUG */
}
#else
ret = wolfSSL_Cleanup();
if (ret != WOLFSSL_SUCCESS) {
printf("error: wolfSSL_Cleanup failed: %s\n", wc_GetErrorString(ret));
}
else {
#if defined(WOLFSSL_BSDKM_VERBOSE_DEBUG)
printf("info: wolfSSL " LIBWOLFSSL_VERSION_STRING " cleanup complete.\n");
#endif /* WOLFSSL_BSDKM_VERBOSE_DEBUG */
}
#endif
return ret;
}
static int wolfkmod_load(void)
{
int ret = 0;
ret = wolfkmod_init();
if (ret != 0) {
return -ECANCELED;
}
#ifndef NO_CRYPT_TEST
ret = wolfcrypt_test(NULL);
if (ret != 0) {
printf("error: wolfcrypt test failed with return code: %d\n", ret);
(void)wolfkmod_cleanup();
return -ECANCELED;
}
else {
#if defined(WOLFSSL_BSDKM_VERBOSE_DEBUG)
printf("wolfCrypt self-test passed.\n");
#endif /* WOLFSSL_BSDKM_VERBOSE_DEBUG */
}
#endif /* NO_CRYPT_TEST */
/**
* todo: register wolfcrypt algs here with crypto_get_driverid
* and related.
* */
if (ret == 0) {
printf("info: libwolfssl loaded\n");
}
return ret;
}
static int wolfkmod_unload(void)
{
int ret = 0;
ret = wolfkmod_cleanup();
/**
* todo: unregister wolfcrypt algs here with crypto_unregister_all
* and related.
* */
if (ret == 0) {
printf("info: libwolfssl unloaded\n");
}
return ret;
}
/* see /usr/include/sys/module.h for more info. */
static int
wolfkmod_event(struct module * m, int what, void * arg)
{
int ret = 0;
switch (what) {
case MOD_LOAD:
ret = wolfkmod_load();
break;
case MOD_UNLOAD:
ret = wolfkmod_unload();
break;
case MOD_SHUTDOWN:
case MOD_QUIESCE:
default:
#if defined(WOLFSSL_BSDKM_VERBOSE_DEBUG)
printf("info: not implemented: %d\n", what);
#endif /* WOLFSSL_BSDKM_VERBOSE_DEBUG */
ret = EOPNOTSUPP;
}
(void)m;
(void)arg;
return ret;
}
static moduledata_t libwolfmod = {
"libwolfssl", /* module name */
wolfkmod_event, /* module event handler */
NULL /* extra data, unused */
};
MODULE_VERSION(libwolfssl, 1);
DECLARE_MODULE(libwolfssl, libwolfmod, SI_SUB_DRIVERS, SI_ORDER_MIDDLE);
#endif /* WOLFSSL_BSDKM */

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
59:52:6b:92:1a:25:8f:1b:ee:4c:51:9c:47:2f:ff:ff:9d:43:29:47
08:d0:2b:7a:1b:56:df:8d:65:af:8d:4a:a6:ed:f4:75:93:0b:fe:02
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:12 2025 GMT
Not After : Aug 9 20:41:12 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
@@ -29,7 +29,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:59:52:6B:92:1A:25:8F:1B:EE:4C:51:9C:47:2F:FF:FF:9D:43:29:47
serial:08:D0:2B:7A:1B:56:DF:8D:65:AF:8D:4A:A6:ED:F4:75:93:0B:FE:02
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -38,20 +38,20 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
09:c6:da:fe:2a:45:83:9e:8b:66:cf:63:1f:11:cb:d9:b4:eb:
b0:97:3d:33:d4:b9:27:56:46:14:3c:fe:2b:b2:36:6e:38:7f:
08:f5:37:3c:f2:a2:6a:8a:c7:a0:be:0f:ac:dd:f4:f0:97:b3:
03:a6:70:48:44:fc:ef:ef:7a:c6:1a:8d:3f:19:f6:71:92:7e:
3a:00:95:f2:b6:57:40:77:c2:80:4e:61:f2:71:56:22:a0:1e:
a9:dd:5c:54:80:ad:e4:27:f2:17:20:9b:5b:89:30:6e:6a:31:
2a:4e:43:52:f8:8a:51:b7:ed:3a:aa:78:41:90:95:e8:40:2e:
66:fc
87:59:f3:a3:10:39:da:48:d6:31:4b:d8:eb:77:33:da:d9:a9:
67:34:04:e8:fe:e3:10:c6:d7:c6:58:80:d3:5c:b7:15:ad:7e:
18:8e:ff:2e:7e:f6:05:da:cf:7f:6a:58:d5:c2:88:84:6c:44:
51:0f:0a:6f:0a:bd:7e:87:6c:0d:4c:40:b5:d5:28:f3:09:c6:
43:7e:69:3b:c7:04:8a:f5:5f:90:a8:ed:e6:10:34:6c:fb:76:
32:23:fe:d1:db:c5:36:17:88:de:19:06:d2:7f:5e:56:b2:7c:
e2:54:48:01:ee:c1:c1:c1:92:05:34:1c:7d:9c:af:0c:ec:70:
39:75
-----BEGIN CERTIFICATE-----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@@ -63,10 +63,10 @@ Io8oLOAF7tPtw3E9ybI2Oh2/qDCB2QYDVR0jBIHRMIHOgBTTIo8oLOAF7tPtw3E9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HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADgYEAh1nz
oxA52kjWMUvY63cz2tmpZzQE6P7jEMbXxliA01y3Fa1+GI7/Ln72BdrPf2pY1cKI
hGxEUQ8Kbwq9fodsDUxAtdUo8wnGQ35pO8cEivVfkKjt5hA0bPt2MiP+0dvFNheI
3hkG0n9eVrJ84lRIAe7BwcGSBTQcfZyvDOxwOXU=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
09:1d:03:41:8b:92:bd:2a:2a:1c:77:e0:13:a8:3d:f0:33:da:7f:72
4e:1e:9d:76:46:6d:c3:f9:57:88:c7:f4:98:6f:3d:ca:63:50:4f:65
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_1024, OU = Programming-1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_1024, OU=Programming-1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_1024, OU = Programming-1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:10 2025 GMT
Not After : Aug 9 20:41:10 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_1024, OU=Programming-1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
@@ -29,7 +29,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:81:69:0F:F8:DF:DD:CF:34:29:D5:67:75:71:85:C7:75:10:69:59:EC
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_1024/OU=Programming-1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:09:1D:03:41:8B:92:BD:2A:2A:1C:77:E0:13:A8:3D:F0:33:DA:7F:72
serial:4E:1E:9D:76:46:6D:C3:F9:57:88:C7:F4:98:6F:3D:CA:63:50:4F:65
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -38,21 +38,21 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
9a:1c:8f:c4:bd:54:da:63:a7:f8:ba:39:b6:64:60:9d:ba:a5:
fc:43:f5:57:28:31:43:09:4c:03:4c:b8:c3:49:2b:4e:bf:f2:
9b:13:4e:37:1e:a1:57:c6:0c:7b:2c:25:19:37:9f:06:53:ef:
8d:d1:ba:c0:73:6e:7f:c2:0b:46:5f:9b:56:bb:59:19:5c:c9:
ee:ea:02:da:03:2c:fb:29:b6:07:dd:55:b7:e9:ce:60:47:e0:
6b:44:5a:61:74:5c:96:f6:30:d8:1b:a4:15:5e:06:c5:73:4b:
8a:4d:94:23:13:1b:3f:db:67:ca:a7:a6:41:c5:28:0f:fd:2e:
0e:f0
53:e1:86:58:08:ad:05:42:39:e9:47:0e:1c:47:3b:f9:33:dc:
ef:2c:bc:99:7b:ef:f8:42:4e:6b:47:4a:17:3b:d7:72:e0:c0:
02:fc:35:60:c2:73:78:c3:50:81:9d:91:61:4b:a3:db:ce:54:
25:1f:ed:b4:b7:42:33:23:4e:03:25:b6:c1:7b:ba:6e:03:fb:
7d:66:6e:95:05:e5:57:0c:85:1d:66:57:48:5d:96:02:0c:b5:
f9:b2:f0:51:08:51:02:55:e5:ab:39:b3:ed:92:65:fd:ee:36:
2d:4b:6b:74:8d:88:49:59:eb:86:5e:ff:df:90:19:7f:f2:e4:
af:ca
-----BEGIN CERTIFICATE-----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@@ -63,10 +63,10 @@ BgNVHQ4EFgQUgWkP+N/dzzQp1Wd1cYXHdRBpWewwgd4GA1UdIwSB1jCB04AUgWkP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hvcNAQELBQADgYEAU+GGWAitBUI56UcOHEc7+TPc7yy8mXvv+EJOa0dKFzvXcuDA
Avw1YMJzeMNQgZ2RYUuj285UJR/ttLdCMyNOAyW2wXu6bgP7fWZulQXlVwyFHWZX
SF2WAgy1+bLwUQhRAlXlqzmz7ZJl/e42LUtrdI2ISVnrhl7/35AZf/Lkr8o=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -3,11 +3,11 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL, OU = Support_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:14 2025 GMT
Not After : Aug 9 20:41:14 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL, OU=Support_1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
@@ -28,7 +28,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:59:52:6B:92:1A:25:8F:1B:EE:4C:51:9C:47:2F:FF:FF:9D:43:29:47
serial:08:D0:2B:7A:1B:56:DF:8D:65:AF:8D:4A:A6:ED:F4:75:93:0B:FE:02
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -37,20 +37,20 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
94:67:03:63:2a:3e:e4:56:a5:9f:84:89:68:8c:ed:ef:a4:fe:
1f:dc:03:04:1e:d0:87:90:14:7c:82:3f:36:a8:7c:14:64:ab:
88:d4:9d:81:e8:f6:a7:ec:12:51:ea:25:fd:a4:d1:9c:9b:71:
3d:c8:d0:b3:d2:6d:eb:56:11:66:05:4e:92:27:0a:76:8c:3a:
8b:bd:e2:46:f5:7b:8e:ff:03:f3:89:92:dc:9b:46:79:f4:b8:
95:7d:b6:29:79:f3:55:c8:70:de:f7:9f:59:e1:e2:8d:a7:73:
1f:97:1c:52:64:48:77:cf:6d:a0:27:ad:c0:16:56:55:46:b2:
bf:f1
78:ef:fd:98:4f:9e:cc:8b:12:36:6d:b2:9d:0d:65:3c:17:26:
81:ef:6b:c2:7b:6f:2b:d4:fe:a4:5f:af:e4:72:88:2c:3b:ab:
3c:63:ae:e3:0d:d2:92:d6:d2:33:65:0a:fc:da:82:42:8d:14:
dd:f1:22:f8:3d:ce:90:ef:3a:5a:c3:e9:5f:0d:0c:d3:90:40:
94:e5:de:85:85:c1:e8:73:08:9d:3e:e5:47:35:31:95:67:37:
08:fb:ca:e6:54:3e:c4:64:b8:4f:df:96:c9:53:96:4f:33:c4:
92:fd:84:2b:7e:cf:2b:6c:92:fe:cc:fa:35:fe:0a:b5:c0:cd:
f1:6d
-----BEGIN CERTIFICATE-----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@@ -62,24 +62,24 @@ A1UdIwSB0TCBzoAU0yKPKCzgBe7T7cNxPcmyNjodv6ihgZ+kgZwwgZkxCzAJBgNV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BwMCMA0GCSqGSIb3DQEBCwUAA4GBAHjv/ZhPnsyLEjZtsp0NZTwXJoHva8J7byvU
/qRfr+RyiCw7qzxjruMN0pLW0jNlCvzagkKNFN3xIvg9zpDvOlrD6V8NDNOQQJTl
3oWFwehzCJ0+5Uc1MZVnNwj7yuZUPsRkuE/flslTlk8zxJL9hCt+zytskv7M+jX+
CrXAzfFt
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
59:52:6b:92:1a:25:8f:1b:ee:4c:51:9c:47:2f:ff:ff:9d:43:29:47
08:d0:2b:7a:1b:56:df:8d:65:af:8d:4a:a6:ed:f4:75:93:0b:fe:02
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:12 2025 GMT
Not After : Aug 9 20:41:12 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
@@ -100,7 +100,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:59:52:6B:92:1A:25:8F:1B:EE:4C:51:9C:47:2F:FF:FF:9D:43:29:47
serial:08:D0:2B:7A:1B:56:DF:8D:65:AF:8D:4A:A6:ED:F4:75:93:0B:FE:02
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -109,20 +109,20 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
09:c6:da:fe:2a:45:83:9e:8b:66:cf:63:1f:11:cb:d9:b4:eb:
b0:97:3d:33:d4:b9:27:56:46:14:3c:fe:2b:b2:36:6e:38:7f:
08:f5:37:3c:f2:a2:6a:8a:c7:a0:be:0f:ac:dd:f4:f0:97:b3:
03:a6:70:48:44:fc:ef:ef:7a:c6:1a:8d:3f:19:f6:71:92:7e:
3a:00:95:f2:b6:57:40:77:c2:80:4e:61:f2:71:56:22:a0:1e:
a9:dd:5c:54:80:ad:e4:27:f2:17:20:9b:5b:89:30:6e:6a:31:
2a:4e:43:52:f8:8a:51:b7:ed:3a:aa:78:41:90:95:e8:40:2e:
66:fc
87:59:f3:a3:10:39:da:48:d6:31:4b:d8:eb:77:33:da:d9:a9:
67:34:04:e8:fe:e3:10:c6:d7:c6:58:80:d3:5c:b7:15:ad:7e:
18:8e:ff:2e:7e:f6:05:da:cf:7f:6a:58:d5:c2:88:84:6c:44:
51:0f:0a:6f:0a:bd:7e:87:6c:0d:4c:40:b5:d5:28:f3:09:c6:
43:7e:69:3b:c7:04:8a:f5:5f:90:a8:ed:e6:10:34:6c:fb:76:
32:23:fe:d1:db:c5:36:17:88:de:19:06:d2:7f:5e:56:b2:7c:
e2:54:48:01:ee:c1:c1:c1:92:05:34:1c:7d:9c:af:0c:ec:70:
39:75
-----BEGIN CERTIFICATE-----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@@ -134,10 +134,10 @@ Io8oLOAF7tPtw3E9ybI2Oh2/qDCB2QYDVR0jBIHRMIHOgBTTIo8oLOAF7tPtw3E9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HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADgYEAh1nz
oxA52kjWMUvY63cz2tmpZzQE6P7jEMbXxliA01y3Fa1+GI7/Ln72BdrPf2pY1cKI
hGxEUQ8Kbwq9fodsDUxAtdUo8wnGQ35pO8cEivVfkKjt5hA0bPt2MiP+0dvFNheI
3hkG0n9eVrJ84lRIAe7BwcGSBTQcfZyvDOxwOXU=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:d5:b7:66:40:3a:e9:9b:dd:58:e4:e4:9a:c0:da:1e:d7:b9:5a:1f
3f:e2:ac:14:db:a0:27:6d:92:d8:e9:2a:23:c6:60:c0:1f:b9:a2:47
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_3072, OU = Programming-3072, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_3072, OU=Programming-3072, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_3072, OU = Programming-3072, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:10 2025 GMT
Not After : Aug 9 20:41:10 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_3072, OU=Programming-3072, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (3072 bit)
@@ -46,7 +46,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:3D:D1:84:C2:AF:B0:20:49:BC:74:87:41:38:AB:BA:D2:D4:0C:A3:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_3072/OU=Programming-3072/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:1E:D5:B7:66:40:3A:E9:9B:DD:58:E4:E4:9A:C0:DA:1E:D7:B9:5A:1F
serial:3F:E2:AC:14:DB:A0:27:6D:92:D8:E9:2A:23:C6:60:C0:1F:B9:A2:47
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -55,35 +55,35 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
5e:b0:ed:38:36:b8:f7:e4:0c:b0:c3:6a:bb:7a:b9:61:05:9d:
b9:82:12:2d:9c:9e:91:7b:ec:d0:9b:81:ca:51:e8:d4:55:2d:
1a:ff:88:5a:c3:e1:d8:82:17:c5:4a:7a:d4:17:c8:a2:1c:97:
61:a7:cf:de:12:f9:5a:d8:b0:63:63:84:d4:7b:b9:81:37:a0:
49:f3:68:30:0c:84:f8:6c:18:54:34:6f:8d:a3:22:d3:d2:3b:
42:bc:3b:28:0f:95:35:f4:9f:dc:18:9d:4f:c5:5f:0d:d2:bd:
88:b8:a7:88:82:d3:74:5b:a6:ad:b0:2b:70:33:c9:08:7e:5f:
9b:99:3c:61:f0:1b:3c:1c:4a:2a:05:84:f1:47:17:a2:ea:06:
3a:dc:f6:b3:83:30:9c:12:b1:4c:e9:be:40:86:3e:72:58:4e:
44:b8:99:59:c3:58:0f:d7:cf:02:60:77:ad:6f:9c:41:58:ef:
78:63:c0:f7:7d:a7:ed:67:c2:49:ae:06:fc:46:f7:70:53:88:
eb:53:2f:25:8d:7a:ac:ab:c4:b5:b0:27:90:57:d0:31:79:2f:
ad:da:20:c1:6a:00:cc:d9:b4:36:5a:90:99:3d:e3:e2:f4:b6:
e7:85:16:77:3d:69:bb:42:6c:a5:83:45:9f:53:c4:43:78:17:
43:bd:27:c0:6e:4b:40:0f:64:0b:ac:38:1e:09:6d:62:5a:54:
8a:2c:96:99:23:db:f5:4b:4a:aa:69:be:6e:8a:9a:3e:d5:e6:
a3:a9:a9:e9:e8:a9:28:28:3b:f9:9d:d9:5f:e3:cb:2b:2b:38:
ba:f1:bc:45:d8:4a:5a:b1:b3:8a:48:64:78:33:21:55:cd:04:
14:e7:7b:73:c2:b6:f2:de:81:01:d8:8d:c6:cf:f2:85:0f:32:
72:0f:6c:60:be:f5:31:75:39:4b:e3:ae:ed:0c:1e:15:83:ac:
f9:4c:86:cf:df:54:b0:7c:6f:f5:de:26:66:c0:ba:85:38:d0:
25:fe:b9:bf:12:98
65:e1:4d:a2:13:4f:6e:c3:68:9b:02:2b:af:1e:cb:b9:1c:47:
e3:d5:6d:1c:b7:ea:6f:58:6b:68:59:f9:ec:87:55:6a:c3:2c:
ef:1c:d5:1c:a8:4b:73:4f:2b:a9:29:ad:c1:d9:b5:fa:b8:3a:
2c:a8:b3:6c:50:21:47:3b:f5:98:ea:bd:a3:c5:74:86:15:1a:
6e:37:60:62:06:17:11:b3:ff:0f:2d:f0:9a:21:bf:74:74:f1:
dd:ef:9f:b0:8e:9a:4a:28:09:54:f8:f6:83:61:21:40:c6:d1:
72:14:61:2c:ad:b0:38:7a:0c:54:c4:fc:6e:18:1a:1c:31:a3:
70:22:a8:18:fb:f0:6a:84:69:cb:fc:40:1a:64:d9:8e:8c:54:
a0:23:c1:dc:7c:9a:b6:82:ea:ed:a3:79:64:50:df:3b:b9:76:
23:48:06:3a:2d:47:04:25:56:e6:7e:b6:c8:ad:1f:87:69:42:
e3:fa:ab:18:22:40:20:88:57:4e:9f:e5:30:bd:99:71:0d:d4:
1c:95:22:49:7b:85:38:62:ef:d4:7e:d7:87:a5:59:79:c6:4b:
51:e8:b5:9e:32:3e:4c:03:b7:b5:ae:8e:6f:c6:0b:52:dd:66:
24:48:01:aa:8d:1a:26:f6:19:04:54:98:27:05:47:00:49:b8:
7a:30:8e:27:a1:e6:31:fb:8b:21:eb:cd:c3:4d:4d:09:a6:6e:
24:42:9b:de:4a:f2:37:73:69:9a:36:e2:37:fc:2e:86:d6:47:
7d:9a:0d:37:a2:b4:f0:44:ad:d0:7b:c2:f0:e3:5f:bb:76:62:
93:0f:b2:11:f3:10:88:0b:f1:4a:d9:9b:d9:cc:71:46:81:55:
e9:79:02:27:c5:36:42:b7:10:bf:f1:04:1c:18:ac:d7:03:8b:
f3:35:f4:12:18:10:58:f3:6b:59:50:6a:0e:c6:df:7c:61:c0:
fd:38:a7:0c:f1:a7:fe:59:75:7c:20:75:ec:76:ce:cb:ff:9f:
9f:aa:a5:97:bb:d4
-----BEGIN CERTIFICATE-----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@@ -100,15 +100,15 @@ qDCB3gYDVR0jBIHWMIHTgBQ90YTCr7AgSbx0h0E4q7rS1AyjqKGBpKSBoTCBnjEL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BwMBBggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAYEAZeFNohNPbsNomwIrrx7L
uRxH49VtHLfqb1hraFn57IdVasMs7xzVHKhLc08rqSmtwdm1+rg6LKizbFAhRzv1
mOq9o8V0hhUabjdgYgYXEbP/Dy3wmiG/dHTx3e+fsI6aSigJVPj2g2EhQMbRchRh
LK2wOHoMVMT8bhgaHDGjcCKoGPvwaoRpy/xAGmTZjoxUoCPB3HyatoLq7aN5ZFDf
O7l2I0gGOi1HBCVW5n62yK0fh2lC4/qrGCJAIIhXTp/lML2ZcQ3UHJUiSXuFOGLv
1H7Xh6VZecZLUei1njI+TAO3ta6Ob8YLUt1mJEgBqo0aJvYZBFSYJwVHAEm4ejCO
J6HmMfuLIevNw01NCaZuJEKb3kryN3NpmjbiN/wuhtZHfZoNN6K08ESt0HvC8ONf
u3Zikw+yEfMQiAvxStmb2cxxRoFV6XkCJ8U2QrcQv/EEHBis1wOL8zX0EhgQWPNr
WVBqDsbffGHA/TinDPGn/ll1fCB17HbOy/+fn6qll7vU
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
12:66:c3:a2:08:5c:f7:d0:6e:e9:a8:82:a2:ab:9c:0f:76:9e:96:f4
35:c5:93:ad:74:24:8d:c5:87:a1:1d:2f:14:4c:de:20:76:84:ec:99
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_4096, OU = Programming-4096, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_4096, OU=Programming-4096, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_4096, OU = Programming-4096, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:11 2025 GMT
Not After : Aug 9 20:41:11 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_4096, OU=Programming-4096, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (4096 bit)
@@ -55,7 +55,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:FA:54:89:67:E5:5F:B7:31:40:EA:FD:E7:F6:A3:C6:5A:56:16:A5:6E
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_4096/OU=Programming-4096/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:12:66:C3:A2:08:5C:F7:D0:6E:E9:A8:82:A2:AB:9C:0F:76:9E:96:F4
serial:35:C5:93:AD:74:24:8D:C5:87:A1:1D:2F:14:4C:DE:20:76:84:EC:99
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -64,42 +64,42 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
b0:00:28:7b:c8:3f:ae:93:f5:16:87:30:d6:07:2b:71:16:34:
1e:5c:48:0f:4a:e7:50:07:9d:f4:75:5b:90:53:72:87:2a:bb:
ef:04:bc:52:d2:bf:ff:27:58:2f:5c:af:be:f3:f6:00:a2:37:
8b:ec:2c:d7:b7:e7:bb:3b:ca:6f:9d:42:b7:00:b8:c2:a2:8e:
8e:e4:57:fd:83:4b:b8:47:aa:a1:28:ac:bd:c1:59:04:90:17:
40:40:35:04:c6:40:a9:21:d3:79:45:0e:22:c8:6f:ec:ae:58:
a5:c2:d8:1b:11:49:94:58:c2:11:7d:f8:0a:bb:47:fd:ac:cf:
f7:23:05:3f:ab:1d:0e:30:c5:98:29:13:1a:90:6f:f9:3f:f2:
d6:df:03:cc:f1:48:e7:71:e6:c4:ce:f3:f9:bf:07:c9:cf:dd:
63:0e:fe:bc:93:1c:9a:52:7d:63:f9:6d:a5:50:f3:ef:54:d7:
da:42:74:85:b1:b4:7c:d5:03:cc:b8:c3:ba:1f:b8:4f:5a:f9:
05:ba:4b:0d:57:8d:05:cf:4f:b7:c4:64:2e:2c:10:f3:fa:79:
0c:8c:1f:cc:84:33:88:fb:77:b5:6e:45:35:15:cc:28:80:2b:
2d:6b:3f:d0:a3:10:d1:53:c0:bb:70:43:79:2f:ff:3f:63:26:
c5:60:9b:87:e9:a2:5b:40:13:41:25:d2:9c:3e:42:79:00:e1:
12:0e:aa:06:e0:65:59:a1:fa:db:c4:c2:97:a8:87:35:96:1c:
8e:ff:eb:91:e0:8b:e3:3e:c8:b2:8c:d3:84:5e:76:80:d7:29:
0a:59:cc:71:d5:e5:65:3c:30:38:6e:f5:3f:7e:28:0f:3d:15:
10:86:30:39:56:23:13:30:b4:70:f7:7b:c3:0d:51:ad:18:b1:
87:b3:3f:1c:69:f5:d4:1e:72:66:5e:44:b9:53:ba:9e:f0:b8:
4a:b1:34:50:98:d8:f2:b9:b2:c5:ed:73:c9:ee:dd:33:8c:cf:
72:35:e0:3d:0f:45:2a:89:f9:a3:76:40:07:0f:f6:48:6c:f1:
8c:30:3a:c2:51:06:c2:51:5e:75:98:06:e0:1e:29:f7:12:9a:
56:a4:38:83:b1:8b:86:b6:ab:87:aa:3c:39:9d:4d:0c:e8:78:
9f:52:47:66:69:c8:66:0c:fe:d9:74:1d:78:0b:51:e4:d9:c8:
35:97:95:c7:31:97:13:49:ed:aa:9e:9c:fd:66:04:79:d2:24:
4d:64:8d:3f:cd:94:b0:05:0a:30:3b:1c:96:e7:79:00:03:47:
55:34:51:1f:46:3a:24:47:e6:dd:78:89:18:29:32:c5:ad:fb:
9c:f7:26:ac:56:3e:f7:73
e4:f5:b3:bc:7e:51:7f:58:08:a9:23:38:4c:0e:3c:7e:79:29:
de:d5:49:39:d5:53:57:e1:f5:20:55:a4:b0:a5:d2:01:a7:5d:
31:11:74:13:44:ae:75:95:59:b9:46:20:41:82:fb:63:30:b2:
0b:45:06:c1:e3:69:61:36:b0:d6:7c:20:2b:48:b7:28:5a:60:
7c:67:e2:81:33:03:7c:67:24:08:1d:b5:80:a6:5e:5d:86:0f:
eb:c5:7d:06:0c:be:c4:4c:dc:9c:ae:59:7d:aa:8e:88:bc:87:
71:9c:e0:8d:78:5b:3e:05:29:f6:c7:3b:b3:da:0f:e0:95:09:
57:96:4a:0a:b2:3e:df:67:be:e5:25:78:70:d2:c3:bc:22:11:
76:6d:f2:ce:9d:84:ea:76:4e:ae:c0:72:a6:8b:1b:cd:59:fc:
9e:97:e0:ee:46:1e:f8:de:db:86:6a:46:da:af:b8:b9:1c:a0:
09:ba:31:92:95:d4:8b:ba:bf:17:4b:82:c6:0f:5d:15:4f:5b:
67:5a:1e:e1:cc:9f:e5:94:80:8e:e9:39:6d:40:a8:1f:63:4e:
f5:06:4e:66:e7:46:7c:38:c0:c9:73:5e:ea:ae:e1:c4:77:c7:
14:45:28:79:98:8e:db:a2:16:ec:3d:a1:09:13:4c:37:10:46:
f4:f5:84:e8:c7:57:c6:ee:50:35:ba:d6:41:74:a6:3e:d3:0d:
c3:82:d5:33:45:24:be:70:4c:f3:95:dc:77:eb:4c:4d:bd:20:
6f:ac:c8:2f:6b:6a:24:8e:c4:3e:81:e3:4f:0e:e7:7e:9a:ac:
5d:8a:42:56:7a:a2:03:cd:5c:6e:e5:0e:45:47:c2:2e:90:4e:
2d:6c:9f:f7:ce:81:1a:9e:2f:c7:0a:a4:1e:30:7d:d5:04:1f:
5c:98:4f:91:ed:a0:6d:63:7d:a8:e8:ee:4a:e1:62:7b:f9:89:
ce:f2:40:06:a7:3a:97:07:d7:68:f0:01:58:70:a1:8b:01:f4:
29:29:d6:0c:62:b4:15:84:b1:ae:ec:c7:68:6f:75:9b:d6:6b:
de:59:6c:cb:67:f8:d4:fe:0c:c7:9d:b2:3a:a4:4d:d1:46:20:
4c:3d:3d:61:c6:f8:93:ac:b0:3b:da:50:2c:05:00:55:3d:8d:
bd:ca:4d:32:83:31:13:36:fa:6c:41:b1:e4:30:56:f9:9b:70:
b3:d1:8b:68:11:5e:c0:e5:8b:35:38:c7:d1:c7:35:8f:36:15:
73:f2:bc:82:a0:a8:46:2e:21:95:9a:4a:41:3c:3d:8b:53:bd:
d2:77:c8:68:a8:8c:c9:84:77:f6:bc:af:0c:5f:70:df:95:a4:
c8:72:85:b7:42:82:68:24
-----BEGIN CERTIFICATE-----
MIIHHTCCBQWgAwIBAgIUEmbDoghc99Bu6aiCoqucD3aelvQwDQYJKoZIhvcNAQEL
MIIHHTCCBQWgAwIBAgIUNcWTrXQkjcWHoR0vFEzeIHaE7JkwDQYJKoZIhvcNAQEL
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzQwOTYxGTAXBgNVBAsMEFByb2dyYW1t
aW5nLTQwOTYxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yNDEyMTgyMTI1MjlaFw0yNzA5MTQyMTI1
MjlaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yNTExMTMyMDQxMTFaFw0yODA4MDkyMDQx
MTFaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF80MDk2MRkwFwYDVQQLDBBQcm9ncmFt
bWluZy00MDk2MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
CQEWEGluZm9Ad29sZnNzbC5jb20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
@@ -118,19 +118,19 @@ AUswHQYDVR0OBBYEFPpUiWflX7cxQOr95/ajxlpWFqVuMIHeBgNVHSMEgdYwgdOA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CSqGSIb3DQEBCwUAA4ICAQDk9bO8flF/WAipIzhMDjx+eSne1Uk51VNX4fUgVaSw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-----END CERTIFICATE-----

Binary file not shown.

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6b:9b:70:c6:f1:a3:94:65:19:a1:08:58:ef:a7:8d:2b:7a:83:c1:da
3f:29:11:20:57:71:e7:8e:f9:18:0d:ca:70:4d:5b:15:2a:43:d6:24
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:11 2025 GMT
Not After : Aug 9 20:41:11 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -38,7 +38,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:6B:9B:70:C6:F1:A3:94:65:19:A1:08:58:EF:A7:8D:2B:7A:83:C1:DA
serial:3F:29:11:20:57:71:E7:8E:F9:18:0D:CA:70:4D:5B:15:2A:43:D6:24
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -47,27 +47,27 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
77:3b:3d:66:74:bc:97:fe:40:16:e6:ba:a5:d5:d1:84:08:89:
69:4f:88:0d:57:a9:ef:8c:c3:97:52:c8:bd:8b:a2:49:3b:b7:
f7:5d:1e:d6:14:7f:b2:80:33:da:a0:8a:d3:e1:2f:d5:bc:33:
9f:ea:5a:72:24:e5:f8:b8:4b:b3:df:62:90:3b:a8:21:ef:27:
42:75:bc:60:02:8e:37:35:99:eb:a3:28:f2:65:4c:ff:7a:f8:
8e:cc:23:6d:e5:6a:fe:22:5a:d9:b2:4f:47:c7:e0:ae:98:ef:
94:ac:b6:4f:61:81:29:8e:e1:79:2c:46:fc:e9:1a:c3:96:1f:
19:93:64:2e:9f:37:72:c5:e4:93:4e:61:5f:38:8e:ae:e8:39:
19:e6:97:a8:91:d4:23:7e:1e:d2:d0:53:ec:cc:ac:a0:1d:d0:
b7:dd:b1:b7:01:2e:96:cd:85:27:e0:e7:47:e2:c1:c1:00:f6:
94:df:77:e7:fa:c6:ef:8a:c0:7c:67:bc:ff:a0:7c:94:3b:7d:
86:42:af:3d:83:31:ee:2a:3b:7b:f0:2c:9e:6f:e9:c4:07:81:
24:da:05:70:4d:dd:09:ae:9e:72:b8:21:0e:8c:b2:ab:aa:4c:
49:10:f7:76:f9:b5:0d:6c:20:d3:df:7a:06:32:8d:29:1f:28:
1d:8d:26:33
0f:ae:89:d5:68:e4:41:f8:9b:e0:c5:61:06:57:ff:a0:92:0f:
b2:ed:d3:99:5b:99:5e:32:7e:97:c7:af:6c:fe:8c:a6:ae:32:
a1:0d:ca:cd:fc:18:e5:d1:f8:20:5b:5a:38:81:46:5b:48:87:
a5:3f:3b:7b:c7:ea:f5:35:29:31:15:39:38:5d:48:e6:01:81:
5c:5e:7c:10:f5:16:e3:59:af:44:c8:b5:8d:c1:32:23:b3:b8:
12:6e:5c:8d:e6:c2:d2:41:03:eb:17:42:e2:7f:bc:00:5d:a5:
31:ef:c6:48:ee:db:cc:e0:f1:56:f5:d4:ca:45:a1:59:b5:e4:
d7:60:9c:57:e0:a7:5a:f2:35:1e:a0:22:db:5e:1c:0c:61:bd:
a1:c5:7b:9f:69:f2:d5:95:e2:bc:52:b9:1d:9c:2c:da:b6:73:
75:4a:84:e5:94:b8:19:4d:dd:70:bd:7f:4c:b9:17:6a:58:16:
89:22:44:37:57:55:26:42:e3:b7:e5:c7:2b:40:0c:e9:e4:7f:
52:75:df:06:c9:fb:01:44:34:ac:20:3c:b4:be:2b:3e:ef:85:
38:96:5b:9b:1e:25:86:18:4c:a4:06:70:06:6a:c8:4b:6f:5f:
c4:05:1f:03:62:30:11:61:bc:c1:40:31:66:dc:64:f0:4f:6b:
b9:ec:c8:29
-----BEGIN CERTIFICATE-----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@@ -82,12 +82,12 @@ BgNVHSMEgcwwgcmAFCeOZxF0wyYdP+0zY7Ok2B0w5ejVoYGapIGXMIGUMQswCQYD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DQYJKoZIhvcNAQELBQADggEBAA+uidVo5EH4m+DFYQZX/6CSD7Lt05lbmV4yfpfH
r2z+jKauMqENys38GOXR+CBbWjiBRltIh6U/O3vH6vU1KTEVOThdSOYBgVxefBD1
FuNZr0TItY3BMiOzuBJuXI3mwtJBA+sXQuJ/vABdpTHvxkju28zg8Vb11MpFoVm1
5NdgnFfgp1ryNR6gItteHAxhvaHFe59p8tWV4rxSuR2cLNq2c3VKhOWUuBlN3XC9
f0y5F2pYFokiRDdXVSZC47flxytADOnkf1J13wbJ+wFENKwgPLS+Kz7vhTiWW5se
JYYYTKQGcAZqyEtvX8QFHwNiMBFhvMFAMWbcZPBPa7nsyCk=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
30:b9:30:50:f8:1a:0d:ff:ad:68:d1:6d:e8:a3:6b:58:23:33:7a:84
29:66:97:2b:07:5d:f1:5b:37:1e:e8:5f:10:1c:c4:e9:aa:99:b7:73
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:12 2025 GMT
Not After : Aug 9 20:41:12 2028 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
@@ -31,16 +31,16 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:45:02:21:00:88:cc:7f:00:f5:a9:4e:c0:69:6e:36:39:24:
8f:83:45:4d:fa:d0:39:14:b8:c8:7f:95:51:f2:c5:98:c0:b7:
e2:02:20:2a:93:61:b0:06:de:eb:da:fd:af:6b:39:bf:88:17:
f1:ba:2a:7d:59:a8:de:e7:0a:11:83:4f:92:77:8d:92:3b
30:44:02:20:40:55:70:46:7a:a1:eb:b5:c8:53:a7:78:b3:f3:
b7:16:92:c5:9b:34:90:d5:44:68:a7:03:9b:9f:db:78:f0:51:
02:20:61:a8:3a:c9:ff:ff:e9:63:c7:a7:14:d4:19:d2:9e:77:
55:47:93:d1:7a:68:50:86:48:8f:3b:97:87:50:f5:42
-----BEGIN CERTIFICATE-----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@@ -48,6 +48,6 @@ Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEAtPZbtYBjkXIuZAx5cBM456t
KTiYuhDW6QkqgKkuFyq5ir8zg0bjlQvkd0C1O0NFMw9hU3w3RMHL/IDK6EPqp6Nj
MGEwHQYDVR0OBBYEFFaOmsPwQt4YuUVVbvmTz+rD86UhMB8GA1UdIwQYMBaAFFaO
msPwQt4YuUVVbvmTz+rD86UhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD
AgGGMAoGCCqGSM49BAMCA0gAMEUCIQCIzH8A9alOwGluNjkkj4NFTfrQORS4yH+V
UfLFmMC34gIgKpNhsAbe69r9r2s5v4gX8boqfVmo3ucKEYNPkneNkjs=
AgGGMAoGCCqGSM49BAMCA0cAMEQCIEBVcEZ6oeu1yFOneLPztxaSxZs0kNVEaKcD
m5/bePBRAiBhqDrJ///pY8enFNQZ0p53VUeT0XpoUIZIjzuXh1D1Qg==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:08:67:9d:29:61:47:3e:2a:23:82:cd:cf:cb:53:2a:b8:02:22:57
5f:b1:4e:91:98:c0:60:33:b2:ae:31:e4:61:c7:80:1a:f5:be:40:b7
Signature Algorithm: ecdsa-with-SHA384
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:12 2025 GMT
Not After : Aug 9 20:41:12 2028 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
@@ -33,18 +33,18 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:1d:3f:92:02:b2:46:54:ee:9e:0d:90:03:73:6a:
ab:04:5a:41:fe:f4:1b:fd:d6:99:cc:7a:6c:fd:52:da:2e:4e:
78:fe:ef:79:74:12:5e:04:9d:2c:e4:e7:1a:4d:d3:1e:02:31:
00:b7:34:e8:4c:69:70:db:fd:1a:48:c5:dc:8e:ef:15:ca:13:
ee:f8:4f:27:5f:d2:3a:6a:06:7d:f3:32:a7:75:97:27:6d:60:
ed:a2:9f:9f:7e:66:43:f9:15:1d:65:5d:49
30:65:02:31:00:a8:5a:b8:bb:38:90:e1:3e:39:e0:28:66:19:
69:39:3b:ac:94:a8:5d:d8:03:60:76:29:88:f9:23:3e:22:31:
19:df:0d:c4:c0:11:ec:89:38:a1:a5:01:96:87:e5:29:66:02:
30:42:c8:cc:cf:fe:c1:33:f3:a4:79:f2:6a:df:6a:69:d9:bd:
18:f0:13:ae:f8:0d:d4:8f:02:e7:b1:43:89:ae:2a:f8:cb:30:
0e:96:7d:06:22:83:06:75:8c:4d:ff:c4:59
-----BEGIN CERTIFICATE-----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@@ -53,7 +53,7 @@ fr3YWqW58I6ipdrOhztaq0QWnPWfYt32IM2cdjxAsT+XF99Z9s3ezUY1wO1eLki2
ZpFxdLcMP7mat4O9kz9fUC1wP941JeGQO4bgo2MwYTAdBgNVHQ4EFgQUq+DDJkwY
1HK70oSMnAoFkoASU1IwHwYDVR0jBBgwFoAUq+DDJkwY1HK70oSMnAoFkoASU1Iw
DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMDaAAw
ZQIwHT+SArJGVO6eDZADc2qrBFpB/vQb/daZzHps/VLaLk54/u95dBJeBJ0s5Oca
TdMeAjEAtzToTGlw2/0aSMXcju8VyhPu+E8nX9I6agZ98zKndZcnbWDtop+ffmZD
+RUdZV1J
ZQIxAKhauLs4kOE+OeAoZhlpOTuslKhd2ANgdimI+SM+IjEZ3w3EwBHsiTihpQGW
h+UpZgIwQsjMz/7BM/OkefJq32pp2b0Y8BOu+A3UjwLnsUOJrir4yzAOln0GIoMG
dYxN/8RZ
-----END CERTIFICATE-----

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:4b:a3:8d:2d:2b:10:08:9c:05:89:89:3b:c1:6d:f4:fa:ab:6c:75
6c:a2:3d:0d:73:b8:06:f0:8b:1c:16:b4:38:8a:e8:62:86:51:fe:83
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = ABSOLUTE_URN, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=ABSOLUTE_URN, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = ABSOLUTE_URN, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:09 2025 GMT
Not After : Aug 9 20:41:09 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=ABSOLUTE_URN, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -38,34 +38,34 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=ABSOLUTE_URN/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:4E:4B:A3:8D:2D:2B:10:08:9C:05:89:89:3B:C1:6D:F4:FA:AB:6C:75
serial:6C:A2:3D:0D:73:B8:06:F0:8B:1C:16:B4:38:8A:E8:62:86:51:FE:83
X509v3 Basic Constraints:
CA:FALSE
X509v3 Subject Alternative Name:
URI:urn:example:test
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
56:e2:74:63:d9:98:fd:a9:49:a4:60:86:60:cd:2e:37:c3:b5:
ad:bf:b4:5f:36:14:3d:16:00:f5:5e:cc:50:41:9d:5d:7e:e2:
91:3d:a0:cf:37:56:dc:e1:3c:93:fb:c8:3f:46:db:5a:b6:f0:
71:43:f3:9e:09:b3:6f:a6:c3:43:97:43:27:96:ec:37:4a:56:
dd:99:49:16:ef:1f:5d:c2:37:b0:6e:3f:f6:21:94:ca:df:eb:
6b:1f:e0:81:95:4d:a7:c1:07:8a:65:d6:f9:e4:d4:42:72:49:
46:32:c2:29:90:98:f1:90:1f:99:b9:4a:57:18:5c:99:54:ee:
43:a9:48:52:39:d5:54:91:40:45:2a:f2:8e:58:8e:d6:06:ba:
f9:04:55:f7:51:84:e4:2a:59:a9:41:ad:40:f3:32:51:21:8d:
8e:bd:83:0d:9e:3c:2f:b8:24:d0:dd:81:11:99:95:1c:eb:cf:
ee:1a:ac:85:16:ca:4b:fb:45:47:d0:01:d9:41:da:3a:58:a5:
df:bd:e3:aa:36:f9:60:d6:20:ac:2c:f5:cd:41:5d:f5:cd:15:
c4:4a:b5:90:c3:08:ac:12:38:af:7b:bb:d6:1b:b6:4b:0a:38:
50:af:86:9e:5f:fc:bd:cf:58:68:4b:ce:7c:30:48:ef:da:5a:
8f:2f:f8:4a
45:bf:6c:dc:bd:54:c0:7c:5d:e4:ce:db:c8:59:1c:cd:ad:d1:
79:5f:9e:21:f0:f5:1f:b0:8e:38:1d:89:a1:e9:b7:33:0f:26:
67:97:fd:db:f9:2f:6f:b7:8d:21:54:cd:e8:03:e8:f5:a2:81:
10:60:09:5c:f2:32:39:8f:19:94:49:90:62:c4:48:f1:b0:00:
9d:eb:90:66:c6:32:10:69:68:62:4f:f3:ea:28:f6:2d:62:f4:
e7:23:c0:0b:c6:53:ce:08:05:ec:04:fb:b5:fa:11:d8:63:88:
23:27:a8:38:9a:23:69:8b:1b:fc:e2:fc:b4:a2:0e:88:60:d1:
3d:9f:32:a4:db:3e:7b:67:4b:9e:f8:b1:26:cf:ab:09:10:78:
7a:21:0e:85:1f:f2:b5:82:2e:a9:62:92:8c:62:e3:61:29:d1:
2f:11:dd:ed:c0:b0:52:a7:7d:b2:ae:7b:a7:63:6e:65:d8:c4:
22:18:87:af:52:67:47:4d:d0:c5:4e:bd:47:66:02:fe:25:58:
f6:aa:59:a1:55:85:7a:78:d0:76:72:74:ce:52:86:83:56:30:
98:9f:bd:58:d6:0a:dd:1b:b0:f9:52:be:cb:2a:e0:c6:90:85:
6d:21:19:1a:3f:29:19:a3:3e:af:38:e2:3e:1c:22:22:67:1e:
04:f9:f6:36
-----BEGIN CERTIFICATE-----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@@ -80,12 +80,12 @@ cCeRxybXhWXAMIHaBgNVHSMEgdIwgc+AFDPYRWbXaIcYflQNcCeRxybXhWXAoYGg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AQBFv2zcvVTAfF3kztvIWRzNrdF5X54h8PUfsI44HYmh6bczDyZnl/3b+S9vt40h
VM3oA+j1ooEQYAlc8jI5jxmUSZBixEjxsACd65BmxjIQaWhiT/PqKPYtYvTnI8AL
xlPOCAXsBPu1+hHYY4gjJ6g4miNpixv84vy0og6IYNE9nzKk2z57Z0ue+LEmz6sJ
EHh6IQ6FH/K1gi6pYpKMYuNhKdEvEd3twLBSp32yrnunY25l2MQiGIevUmdHTdDF
Tr1HZgL+JVj2qlmhVYV6eNB2cnTOUoaDVjCYn71Y1grdG7D5Ur7LKuDGkIVtIRka
PykZoz6vOOI+HCIiZx4E+fY2
-----END CERTIFICATE-----

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4f:0d:8c:c5:fa:ee:a2:9b:b7:35:9e:e9:4a:17:99:f0:cc:23:f2:ec
6b:61:49:45:ff:4a:d1:54:16:b4:35:37:c4:98:5d:a9:f6:67:60:91
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:10 2025 GMT
Not After : Aug 9 20:41:10 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -38,7 +38,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:4F:0D:8C:C5:FA:EE:A2:9B:B7:35:9E:E9:4A:17:99:F0:CC:23:F2:EC
serial:6B:61:49:45:FF:4A:D1:54:16:B4:35:37:C4:98:5D:A9:F6:67:60:91
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -47,28 +47,28 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
46:ab:e4:6d:ae:49:5b:6a:0b:a9:87:e1:95:32:a6:d7:ae:de:
28:dc:c7:99:68:e2:5f:c9:5a:4c:64:b8:f5:28:42:5a:e8:5c:
59:32:fe:d0:1f:0b:55:89:db:67:e7:78:f3:70:cf:18:51:57:
8b:f3:2b:a4:66:0b:f6:03:6e:11:ac:83:52:16:7e:a2:7c:36:
77:f6:bb:13:19:40:2c:b8:8c:ca:d6:7e:79:7d:f4:14:8d:b5:
a4:09:f6:2d:4c:e7:f9:b8:25:41:15:78:f4:ca:80:41:ea:3a:
05:08:f6:b5:5b:a1:3b:5b:48:a8:4b:8c:19:8d:6c:87:31:76:
74:02:16:8b:dd:7f:d1:11:62:27:42:39:e0:9a:63:26:31:19:
ce:3d:41:d5:24:47:32:0f:76:d6:41:37:44:ad:73:f1:b8:ec:
2b:6e:9c:4f:84:c4:4e:d7:92:10:7e:23:32:a0:75:6a:e7:fe:
55:95:9f:0a:ad:df:f9:2a:a2:1a:59:d5:82:63:d6:5d:7d:79:
f4:a7:2d:dc:8c:04:cd:98:b0:42:0e:84:fa:86:50:10:61:ac:
73:cd:79:45:30:e8:42:a1:6a:f6:77:55:ec:07:db:52:29:ca:
7a:c8:a2:da:e9:f5:98:33:6a:e8:bc:89:ed:01:e2:fe:44:86:
86:80:39:ec
85:8e:aa:c0:bd:0a:a7:a9:d2:33:ec:39:42:e8:3a:ca:ca:c0:
32:37:50:5f:ee:5c:5b:16:01:35:3e:e6:ad:53:46:f5:5e:1c:
ff:ce:5f:03:89:08:14:ee:c7:d9:1e:4b:85:42:0a:0d:c1:96:
61:4b:66:11:e1:a1:fd:6b:80:ee:cf:cd:02:96:d4:61:9f:54:
79:0e:07:4e:c5:5f:e2:64:dc:8f:fd:53:3a:4b:05:0d:9c:cb:
f8:02:c8:82:12:65:c8:62:f0:e7:27:cd:58:38:87:19:3a:cf:
a8:5e:f3:27:1b:e7:83:68:ad:36:71:42:20:70:bd:7e:84:a7:
56:d8:49:9f:8f:1e:3a:ad:86:0d:da:fb:f5:0c:0f:01:18:27:
6e:fb:6b:be:6b:78:f5:a0:c0:6d:5f:0a:56:d5:13:49:a4:4e:
6a:c3:0a:6e:89:f2:29:3a:30:49:be:99:84:a4:85:33:5f:8e:
41:f4:c3:4b:eb:d5:01:2e:f8:0e:f3:01:49:d4:45:08:f3:fd:
25:6a:1d:65:ac:9c:c8:46:2a:b9:1c:c6:a7:7b:82:60:31:bb:
0f:3d:87:8e:12:3d:c3:47:0b:bd:2d:97:22:b5:83:ec:9a:0f:
f3:29:ea:c9:ea:59:1d:75:2d:81:48:0f:e2:a6:69:e3:9c:03:
92:a2:0f:2d
-----BEGIN CERTIFICATE-----
MIIFHTCCBAWgAwIBAgIUTw2Mxfruopu3NZ7pSheZ8Mwj8uwwDQYJKoZIhvcNAQEL
MIIFHTCCBAWgAwIBAgIUa2FJRf9K0VQWtDU3xJhdqfZnYJEwDQYJKoZIhvcNAQEL
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxGTAXBgNVBAsMEFByb2dyYW1t
aW5nLTIwNDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yNDEyMTgyMTI1MjlaFw0yNzA5MTQyMTI1
MjlaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yNTExMTMyMDQxMTBaFw0yODA4MDkyMDQx
MTBaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFt
bWluZy0yMDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
CQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
@@ -82,27 +82,27 @@ Ztdohxh+VA1wJ5HHJteFZcAwgd4GA1UdIwSB1jCB04AUM9hFZtdohxh+VA1wJ5HH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AIWOqsC9Cqep0jPsOULoOsrKwDI3UF/uXFsWATU+5q1TRvVeHP/OXwOJCBTux9ke
S4VCCg3BlmFLZhHhof1rgO7PzQKW1GGfVHkOB07FX+Jk3I/9UzpLBQ2cy/gCyIIS
Zchi8OcnzVg4hxk6z6he8ycb54NorTZxQiBwvX6Ep1bYSZ+PHjqthg3a+/UMDwEY
J277a75rePWgwG1fClbVE0mkTmrDCm6J8ik6MEm+mYSkhTNfjkH0w0vr1QEu+A7z
AUnURQjz/SVqHWWsnMhGKrkcxqd7gmAxuw89h44SPcNHC70tlyK1g+yaD/Mp6snq
WR11LYFID+KmaeOcA5KiDy0=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
75:99:db:38:ed:32:b1:c2:d1:2c:5e:6f:6f:9d:47:17:58:dd:ee:26
02:f4:19:c0:e7:0a:07:8d:10:b6:e1:74:6f:e7:ce:da:e6:35:56:06
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:15 2025 GMT
Not After : Aug 9 20:41:15 2028 GMT
Subject: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
@@ -120,7 +120,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2
DirName:/C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:75:99:DB:38:ED:32:B1:C2:D1:2C:5E:6F:6F:9D:47:17:58:DD:EE:26
serial:02:F4:19:C0:E7:0A:07:8D:10:B6:E1:74:6F:E7:CE:DA:E6:35:56:06
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -129,16 +129,16 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:45:02:20:03:69:31:45:6f:01:88:6b:63:c6:1c:eb:39:e4:
9a:a8:e2:e0:34:ac:ac:e6:a1:d6:fe:ce:85:98:1e:b0:0d:a9:
02:21:00:a3:dd:84:5d:08:28:4b:8b:58:fb:0d:33:db:02:ea:
c8:0c:da:34:0b:4e:83:a2:10:67:99:19:1c:93:91:c8:c7
30:44:02:20:13:c9:89:7e:31:21:9a:7b:1e:6c:cd:69:35:d1:
99:9e:65:a4:9c:07:35:b0:fb:56:e9:3c:17:e6:4b:a3:76:d9:
02:20:4a:e1:3e:e3:02:4c:f0:da:dd:c2:ac:7a:d1:41:0c:ef:
e6:aa:a3:88:7b:cb:0b:13:df:fd:b5:7f:ff:5a:90:41
-----BEGIN CERTIFICATE-----
MIIDXjCCAwSgAwIBAgIUdZnbOO0yscLRLF5vb51HF1jd7iYwCgYIKoZIzj0EAwIw
MIIDXTCCAwSgAwIBAgIUAvQZwOcKB40QtuF0b+fO2uY1VgYwCgYIKoZIzj0EAwIw
gY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAMBgNVBAcMBVNhbGVt
MRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYDVQQLDARGYXN0MRgwFgYDVQQDDA93
d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20w
HhcNMjQxMjE4MjEyNTMwWhcNMjcwOTE0MjEyNTMwWjCBjTELMAkGA1UEBhMCVVMx
HhcNMjUxMTEzMjA0MTE1WhcNMjgwODA5MjA0MTE1WjCBjTELMAkGA1UEBhMCVVMx
DzANBgNVBAgMBk9yZWdvbjEOMAwGA1UEBwwFU2FsZW0xEzARBgNVBAoMCkNsaWVu
dCBFQ0MxDTALBgNVBAsMBEZhc3QxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEf
MB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTBZMBMGByqGSM49AgEGCCqG
@@ -148,9 +148,9 @@ WWuVYT9RV7YETYlBiERcq/Iwgc0GA1UdIwSBxTCBwoAU69RLWWuVYT9RV7YETYlB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AwEGCCsGAQUFBwMCMAoGCCqGSM49BAMCA0cAMEQCIBPJiX4xIZp7HmzNaTXRmZ5l
pJwHNbD7Vuk8F+ZLo3bZAiBK4T7jAkzw2t3CrHrRQQzv5qqjiHvLCxPf/bV//1qQ
QQ==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
21:e5:09:ec:95:19:31:a3:cb:58:ee:53:ea:d8:7c:a3:a2:7a:1f:f5
3c:27:16:70:2f:e7:c3:f3:d2:34:b5:d2:6a:9b:98:84:43:91:a8:06
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:09 2025 GMT
Not After : Aug 9 20:41:09 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -38,7 +38,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:21:E5:09:EC:95:19:31:A3:CB:58:EE:53:EA:D8:7C:A3:A2:7A:1F:F5
serial:3C:27:16:70:2F:E7:C3:F3:D2:34:B5:D2:6A:9B:98:84:43:91:A8:06
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -47,28 +47,28 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
9b:85:16:e2:26:24:59:e5:de:18:33:d0:49:ec:33:cc:5c:85:
fb:9d:a8:bc:e1:aa:9c:3a:0f:68:27:47:82:87:20:63:04:54:
22:a1:3c:09:fe:ad:3c:d5:1b:93:86:73:b3:6e:9a:3e:91:70:
a2:11:b8:49:a6:58:ec:6d:da:28:7b:6d:fe:d4:77:75:8d:82:
ff:f1:3a:1d:8b:e6:b6:e3:0f:89:5a:fd:fa:7d:b4:a2:af:e5:
a7:a0:1b:27:67:0d:36:6f:8a:ac:14:31:46:fe:71:7f:cd:ec:
32:03:3f:86:f0:24:35:7c:63:7b:52:b1:44:7d:65:53:9e:e5:
77:ad:bf:c7:dd:74:e1:0a:8e:66:06:0b:c9:d0:f4:5e:ab:34:
a7:15:eb:91:1f:79:aa:0a:c2:72:df:b5:d8:ed:60:e9:ef:9e:
d2:41:b0:7e:6e:09:ab:dc:b6:c0:c1:e5:e3:d3:a1:7f:ba:ce:
6f:6d:6f:bb:ba:9f:ab:68:37:53:07:e4:9c:37:54:11:0d:a1:
91:99:e2:11:9d:85:7c:fb:e2:4f:ce:73:21:4a:b6:55:4c:e2:
30:2d:34:3e:7a:60:2c:d7:a4:dc:0b:65:0f:06:2d:00:e5:d5:
38:99:05:ba:d1:80:42:6e:0d:6b:c9:ed:bb:fc:0e:2b:49:0e:
b5:a3:c5:43
9a:42:07:65:59:43:8a:96:fa:90:ba:1b:6d:c8:6c:98:dd:05:
c8:89:24:0a:9e:fd:cb:19:c5:f0:31:2e:5d:7b:e4:86:f0:7d:
d9:28:26:0e:be:90:fd:08:ed:d4:96:6b:99:01:ae:10:67:f5:
8f:2b:0b:21:47:46:a0:f5:32:51:a9:41:d1:f4:07:b3:dd:a9:
e8:09:7d:aa:98:04:0f:75:62:fb:96:af:fa:6e:1c:5c:91:90:
0d:fc:15:dc:26:0c:66:5b:00:d1:db:1c:2e:56:14:29:01:59:
1a:08:86:11:01:dd:17:01:54:a3:f6:08:c8:b4:77:ac:56:1c:
f6:da:26:7c:98:f1:e5:8e:56:ee:3e:69:a8:65:82:8e:a4:3e:
8e:5d:9f:33:9b:e8:e0:a9:85:ae:3e:43:6b:ac:42:e9:8f:59:
1f:67:e6:9f:23:90:6f:78:4a:8e:0c:7b:5b:63:3d:e2:9c:bc:
4d:90:bb:b9:c2:db:3d:46:5e:67:bf:7b:53:dd:cc:72:8f:ce:
a7:5f:0f:c1:04:1e:8e:13:c9:03:d3:a5:f4:20:8f:57:eb:84:
4a:6d:41:fd:f9:90:f4:7d:f9:dd:9f:da:bf:53:f0:3a:62:f5:
16:f6:a0:de:e9:d6:cf:df:17:29:9b:6e:34:b5:27:b9:21:75:
53:de:6c:99
-----BEGIN CERTIFICATE-----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@@ -82,12 +82,12 @@ Ztdohxh+VA1wJ5HHJteFZcAwgd4GA1UdIwSB1jCB04AUM9hFZtdohxh+VA1wJ5HH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CSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIUPCcWcC/nw/PSNLXSapuYhEOR
qAYwDAYDVR0TBAUwAwEB/zAWBgNVHREEDzANggtleGFtcGxlLmNvbTAOBgNVHQ8B
Af8EBAMCAYYwDQYJKoZIhvcNAQELBQADggEBAJpCB2VZQ4qW+pC6G23IbJjdBciJ
JAqe/csZxfAxLl175IbwfdkoJg6+kP0I7dSWa5kBrhBn9Y8rCyFHRqD1MlGpQdH0
B7PdqegJfaqYBA91YvuWr/puHFyRkA38FdwmDGZbANHbHC5WFCkBWRoIhhEB3RcB
VKP2CMi0d6xWHPbaJnyY8eWOVu4+aahlgo6kPo5dnzOb6OCpha4+Q2usQumPWR9n
5p8jkG94So4Me1tjPeKcvE2Qu7nC2z1GXme/e1PdzHKPzqdfD8EEHo4TyQPTpfQg
j1frhEptQf35kPR9+d2f2r9T8Dpi9Rb2oN7p1s/fFymbbjS1J7khdVPebJk=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4f:0d:8c:c5:fa:ee:a2:9b:b7:35:9e:e9:4a:17:99:f0:cc:23:f2:ec
6b:61:49:45:ff:4a:d1:54:16:b4:35:37:c4:98:5d:a9:f6:67:60:91
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:10 2025 GMT
Not After : Aug 9 20:41:10 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -38,7 +38,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:4F:0D:8C:C5:FA:EE:A2:9B:B7:35:9E:E9:4A:17:99:F0:CC:23:F2:EC
serial:6B:61:49:45:FF:4A:D1:54:16:B4:35:37:C4:98:5D:A9:F6:67:60:91
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -47,28 +47,28 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
46:ab:e4:6d:ae:49:5b:6a:0b:a9:87:e1:95:32:a6:d7:ae:de:
28:dc:c7:99:68:e2:5f:c9:5a:4c:64:b8:f5:28:42:5a:e8:5c:
59:32:fe:d0:1f:0b:55:89:db:67:e7:78:f3:70:cf:18:51:57:
8b:f3:2b:a4:66:0b:f6:03:6e:11:ac:83:52:16:7e:a2:7c:36:
77:f6:bb:13:19:40:2c:b8:8c:ca:d6:7e:79:7d:f4:14:8d:b5:
a4:09:f6:2d:4c:e7:f9:b8:25:41:15:78:f4:ca:80:41:ea:3a:
05:08:f6:b5:5b:a1:3b:5b:48:a8:4b:8c:19:8d:6c:87:31:76:
74:02:16:8b:dd:7f:d1:11:62:27:42:39:e0:9a:63:26:31:19:
ce:3d:41:d5:24:47:32:0f:76:d6:41:37:44:ad:73:f1:b8:ec:
2b:6e:9c:4f:84:c4:4e:d7:92:10:7e:23:32:a0:75:6a:e7:fe:
55:95:9f:0a:ad:df:f9:2a:a2:1a:59:d5:82:63:d6:5d:7d:79:
f4:a7:2d:dc:8c:04:cd:98:b0:42:0e:84:fa:86:50:10:61:ac:
73:cd:79:45:30:e8:42:a1:6a:f6:77:55:ec:07:db:52:29:ca:
7a:c8:a2:da:e9:f5:98:33:6a:e8:bc:89:ed:01:e2:fe:44:86:
86:80:39:ec
85:8e:aa:c0:bd:0a:a7:a9:d2:33:ec:39:42:e8:3a:ca:ca:c0:
32:37:50:5f:ee:5c:5b:16:01:35:3e:e6:ad:53:46:f5:5e:1c:
ff:ce:5f:03:89:08:14:ee:c7:d9:1e:4b:85:42:0a:0d:c1:96:
61:4b:66:11:e1:a1:fd:6b:80:ee:cf:cd:02:96:d4:61:9f:54:
79:0e:07:4e:c5:5f:e2:64:dc:8f:fd:53:3a:4b:05:0d:9c:cb:
f8:02:c8:82:12:65:c8:62:f0:e7:27:cd:58:38:87:19:3a:cf:
a8:5e:f3:27:1b:e7:83:68:ad:36:71:42:20:70:bd:7e:84:a7:
56:d8:49:9f:8f:1e:3a:ad:86:0d:da:fb:f5:0c:0f:01:18:27:
6e:fb:6b:be:6b:78:f5:a0:c0:6d:5f:0a:56:d5:13:49:a4:4e:
6a:c3:0a:6e:89:f2:29:3a:30:49:be:99:84:a4:85:33:5f:8e:
41:f4:c3:4b:eb:d5:01:2e:f8:0e:f3:01:49:d4:45:08:f3:fd:
25:6a:1d:65:ac:9c:c8:46:2a:b9:1c:c6:a7:7b:82:60:31:bb:
0f:3d:87:8e:12:3d:c3:47:0b:bd:2d:97:22:b5:83:ec:9a:0f:
f3:29:ea:c9:ea:59:1d:75:2d:81:48:0f:e2:a6:69:e3:9c:03:
92:a2:0f:2d
-----BEGIN CERTIFICATE-----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@@ -82,13 +82,13 @@ Ztdohxh+VA1wJ5HHJteFZcAwgd4GA1UdIwSB1jCB04AUM9hFZtdohxh+VA1wJ5HH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AIWOqsC9Cqep0jPsOULoOsrKwDI3UF/uXFsWATU+5q1TRvVeHP/OXwOJCBTux9ke
S4VCCg3BlmFLZhHhof1rgO7PzQKW1GGfVHkOB07FX+Jk3I/9UzpLBQ2cy/gCyIIS
Zchi8OcnzVg4hxk6z6he8ycb54NorTZxQiBwvX6Ep1bYSZ+PHjqthg3a+/UMDwEY
J277a75rePWgwG1fClbVE0mkTmrDCm6J8ik6MEm+mYSkhTNfjkH0w0vr1QEu+A7z
AUnURQjz/SVqHWWsnMhGKrkcxqd7gmAxuw89h44SPcNHC70tlyK1g+yaD/Mp6snq
WR11LYFID+KmaeOcA5KiDy0=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7f:64:06:76:ee:6f:ef:d3:b9:c7:d9:89:4a:04:ed:42:de:d1:58:26
3a:28:4d:83:0d:77:0e:21:3b:e9:1c:4d:09:a4:d7:65:69:d1:aa:f7
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = CRL_DIST, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=CRL_DIST, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = CRL_DIST, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:10 2025 GMT
Not After : Aug 9 20:41:10 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=CRL_DIST, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -36,31 +36,32 @@ Certificate:
X509v3 CRL Distribution Points:
Full Name:
URI:http://www.wolfssl.com/crl.pem
X509v3 Subject Key Identifier:
33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
65:5f:bb:09:c9:22:21:e3:38:99:5b:c7:ad:97:a3:32:17:53:
fc:1c:ea:35:e1:74:95:e2:aa:2f:62:11:af:a5:a6:c9:92:ae:
50:25:77:6d:4d:67:16:f8:4b:0d:ca:a7:dc:c7:c5:67:2b:5d:
e2:f8:65:8d:e7:5b:48:40:8b:9e:d5:6e:1d:02:0e:95:19:76:
29:e6:28:8f:a3:7a:00:98:fb:57:d5:7f:bf:34:09:46:9b:15:
ae:52:30:04:bc:85:c8:4d:b3:da:79:65:d3:5e:64:fd:e0:ee:
8c:ad:9e:a5:b5:12:d4:00:0f:b7:e3:de:27:59:18:92:5e:7c:
09:45:90:50:35:4a:a4:c5:2b:be:3a:d9:2e:74:2c:2c:75:50:
16:34:cc:fe:c4:b4:f8:d2:ad:cc:2d:70:09:33:61:40:ef:07:
6f:a8:7b:d9:7a:9f:61:20:49:1b:ab:ef:32:65:32:5d:b9:77:
cc:39:6f:c1:13:ff:d5:a4:77:c9:c7:03:a2:12:0c:eb:7e:bd:
15:17:66:bc:f5:65:48:5e:6f:05:9e:a1:6a:42:05:fc:90:cb:
4a:71:96:ce:a8:20:27:fc:d5:ae:83:1d:0b:c1:90:a4:f9:71:
9c:f2:20:e4:cd:4e:62:40:74:81:a6:5c:8e:45:f3:8e:5b:64:
46:e3:aa:e2
b5:1a:d6:5e:65:2c:8b:23:94:fc:2c:a2:19:35:bf:83:e2:33:
66:49:fc:a0:3a:79:91:26:2e:4a:52:ec:90:69:90:6a:96:96:
39:f3:1a:8d:14:a9:15:8d:68:38:63:4d:71:ab:06:cc:2d:7f:
15:b8:35:48:23:ad:20:03:e5:1d:d7:87:27:5d:69:5a:86:43:
b6:83:98:87:05:23:ae:70:0f:23:ed:7b:a8:6a:70:35:e5:a4:
cd:84:ab:b5:0f:a0:0f:7b:81:e6:01:a7:dc:1c:75:d5:ac:21:
b2:f7:1a:bb:d0:47:21:4e:b2:1c:75:6c:c5:4c:5e:44:c9:b1:
90:18:5d:ac:de:2d:40:82:cc:b3:cb:a8:dc:e4:0f:82:6d:2e:
b9:e8:1d:fc:57:8f:c0:21:73:51:b4:c9:be:0d:1b:6a:60:82:
67:6a:d9:fc:e3:96:78:ee:f2:0e:32:30:22:5b:c3:d0:d8:33:
b9:5f:9f:e4:77:43:69:ef:12:48:5b:f4:ac:6a:a5:d4:bf:8a:
18:dc:60:66:18:a0:af:92:77:8e:09:a0:32:ec:79:bf:18:50:
54:d4:f3:72:12:5d:cc:81:16:67:bc:88:99:36:e7:af:c9:78:
10:05:66:44:1a:56:26:69:03:68:49:98:ac:c2:15:6d:11:f0:
83:42:b9:82
-----BEGIN CERTIFICATE-----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@@ -72,10 +73,10 @@ b42GwohAmTaDuh5AciIX11JlJHOwzu8Zza7/eGx7wBID1E5yDVBtO6M7o5lencjZ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BgkqhkiG9w0BAQsFAAOCAQEAtRrWXmUsiyOU/CyiGTW/g+IzZkn8oDp5kSYuSlLs
kGmQapaWOfMajRSpFY1oOGNNcasGzC1/Fbg1SCOtIAPlHdeHJ11pWoZDtoOYhwUj
rnAPI+17qGpwNeWkzYSrtQ+gD3uB5gGn3Bx11awhsvcau9BHIU6yHHVsxUxeRMmx
kBhdrN4tQILMs8uo3OQPgm0uuegd/FePwCFzUbTJvg0bamCCZ2rZ/OOWeO7yDjIw
IlvD0NgzuV+f5HdDae8SSFv0rGql1L+KGNxgZhigr5J3jgmgMux5vxhQVNTzchJd
zIEWZ7yImTbnr8l4EAVmRBpWJmkDaEmYrMIVbRHwg0K5gg==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
75:99:db:38:ed:32:b1:c2:d1:2c:5e:6f:6f:9d:47:17:58:dd:ee:26
02:f4:19:c0:e7:0a:07:8d:10:b6:e1:74:6f:e7:ce:da:e6:35:56:06
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:15 2025 GMT
Not After : Aug 9 20:41:15 2028 GMT
Subject: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
@@ -26,7 +26,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2
DirName:/C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:75:99:DB:38:ED:32:B1:C2:D1:2C:5E:6F:6F:9D:47:17:58:DD:EE:26
serial:02:F4:19:C0:E7:0A:07:8D:10:B6:E1:74:6F:E7:CE:DA:E6:35:56:06
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -35,16 +35,16 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:45:02:20:03:69:31:45:6f:01:88:6b:63:c6:1c:eb:39:e4:
9a:a8:e2:e0:34:ac:ac:e6:a1:d6:fe:ce:85:98:1e:b0:0d:a9:
02:21:00:a3:dd:84:5d:08:28:4b:8b:58:fb:0d:33:db:02:ea:
c8:0c:da:34:0b:4e:83:a2:10:67:99:19:1c:93:91:c8:c7
30:44:02:20:13:c9:89:7e:31:21:9a:7b:1e:6c:cd:69:35:d1:
99:9e:65:a4:9c:07:35:b0:fb:56:e9:3c:17:e6:4b:a3:76:d9:
02:20:4a:e1:3e:e3:02:4c:f0:da:dd:c2:ac:7a:d1:41:0c:ef:
e6:aa:a3:88:7b:cb:0b:13:df:fd:b5:7f:ff:5a:90:41
-----BEGIN CERTIFICATE-----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@@ -54,9 +54,9 @@ WWuVYT9RV7YETYlBiERcq/Iwgc0GA1UdIwSBxTCBwoAU69RLWWuVYT9RV7YETYlB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AwEGCCsGAQUFBwMCMAoGCCqGSM49BAMCA0cAMEQCIBPJiX4xIZp7HmzNaTXRmZ5l
pJwHNbD7Vuk8F+ZLo3bZAiBK4T7jAkzw2t3CrHrRQQzv5qqjiHvLCxPf/bV//1qQ
QQ==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,9 +1,9 @@
-----BEGIN CERTIFICATE-----
MIIC8TCCAnagAwIBAgICEAIwCgYIKoZIzj0EAwMwgZcxCzAJBgNVBAYTAlVTMRMw
MIIC8DCCAnagAwIBAgICEAIwCgYIKoZIzj0EAwMwgZcxCzAJBgNVBAYTAlVTMRMw
EQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRAwDgYDVQQKDAd3
b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9wbWVudDEYMBYGA1UEAwwPd3d3LndvbGZz
c2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMCAXDTI0MTIx
ODIxMjUyOVoYDzIwNTQxMjExMjEyNTI5WjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
c2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMCAXDTI1MTEx
MzIwNDEwN1oYDzIwNTUxMTA2MjA0MTA3WjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxETAPBgNVBAoMCEVsbGlw
dGljMRMwEQYDVQQLDApFQ0MzODRDbGl0MRgwFgYDVQQDDA93d3cud29sZnNzbC5j
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wdjAQBgcqhkjOPQIB
@@ -12,7 +12,7 @@ BgUrgQQAIgNiAARmxAg9ZqehFdRTCiOzrQvOj8j0mB2m2LJuIhH6ue+ZwPopPkgA
pWKvlYHL4yQ264WjgZAwgY0wCQYDVR0TBAIwADARBglghkgBhvhCAQEEBAMCBaAw
HQYDVR0OBBYEFB7y0Bv4/KXLP9yK9ZcqQlOwQvnUMB8GA1UdIwQYMBaAFKvgwyZM
GNRyu9KEjJwKBZKAElNSMA4GA1UdDwEB/wQEAwIF4DAdBgNVHSUEFjAUBggrBgEF
BQcDAgYIKwYBBQUHAwQwCgYIKoZIzj0EAwMDaQAwZgIxALBRR759EKgUfrAiwtYO
UAET+NU+KgE/zTcG3jVi7BjucDG/fga41EwetUyrIkBEGwIxANTyDZDXknmolulu
coK9Ii08nzY6xyUwmf3YVWx/5BvZmz1lQsPfUJd4fQrHa6CTLA==
BQcDAgYIKwYBBQUHAwQwCgYIKoZIzj0EAwMDaAAwZQIwNYNL+eFhS245CekwHZcO
hqtr/n3pV6UvAoVIEWGd8FNcvh+LoH3xIqX75i3P7eDKAjEA/CKA7PyQ3hGgHPA6
PsMjXhW+VTShvuH8iJ5qJBSSRAiIwkakqLN0+Yl5Ev6bkNYf
-----END CERTIFICATE-----

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1b:aa:70:3c:26:6d:64:c7:da:2b:f7:2c:90:f0:38:e7:11:7c:15:a7
3f:22:48:98:11:ed:42:2a:57:f7:d2:7a:bf:df:4d:ec:21:56:46:16
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = RELATIVE_URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=RELATIVE_URI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = RELATIVE_URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:09 2025 GMT
Not After : Aug 9 20:41:09 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=RELATIVE_URI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -38,34 +38,34 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=RELATIVE_URI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:1B:AA:70:3C:26:6D:64:C7:DA:2B:F7:2C:90:F0:38:E7:11:7C:15:A7
serial:3F:22:48:98:11:ED:42:2A:57:F7:D2:7A:BF:DF:4D:EC:21:56:46:16
X509v3 Basic Constraints:
CA:FALSE
X509v3 Subject Alternative Name:
URI:../relative/page.html
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
03:7e:2f:52:a6:93:a3:75:d4:e3:af:a9:c4:0a:44:11:23:8c:
d6:3f:74:d3:f7:ab:d2:cf:b8:2c:56:38:ed:61:a5:8e:88:f1:
5c:fc:51:30:9a:32:4d:41:c7:09:8f:96:ae:89:76:df:f5:4f:
a3:a3:a9:46:a5:39:ed:79:fc:4e:ed:44:22:c2:13:b7:8c:d1:
63:ad:7d:c9:be:3a:38:0e:0c:5b:75:0a:b0:60:f9:f7:3c:35:
81:67:d6:1a:13:32:00:60:96:b9:35:b4:f6:84:01:dc:c6:46:
81:b1:bd:de:a9:dc:6d:ff:6b:ef:d1:77:13:f2:05:26:80:12:
fa:a0:82:25:4c:ae:4f:48:b1:15:46:08:79:9f:60:24:7c:40:
e5:65:96:f7:1e:69:90:de:1a:ad:53:7a:a6:d1:97:e5:7d:89:
e3:33:7c:0f:6d:37:82:04:05:5f:e2:46:e8:62:da:03:67:93:
28:ff:fd:80:2b:7f:42:e4:ce:7f:90:bd:c9:2e:74:4d:d8:75:
99:23:07:5c:15:d7:07:65:56:a3:ee:13:29:3c:a2:55:e0:9e:
0e:3b:b1:e3:78:c3:0f:ff:8e:bc:d9:db:87:e6:f8:ad:41:f8:
db:a8:4f:12:ed:ac:64:12:45:c6:95:50:ee:48:6c:28:1c:65:
de:18:04:69
37:b3:bb:45:35:21:fa:f4:26:06:f4:87:44:c1:86:e5:25:e1:
69:0d:41:32:fb:a0:f6:ea:21:cd:3e:24:d8:5f:fe:28:89:62:
93:4c:30:04:7a:00:f1:7d:3e:d7:1f:21:d2:fd:c7:26:9d:00:
b4:5a:2f:24:a7:ea:5c:96:6d:07:0f:99:19:08:8e:ea:d5:33:
c1:9d:48:91:1f:48:d4:a1:76:f5:a6:c8:76:a1:d9:5c:cc:20:
97:2e:0b:a2:e1:28:2b:8f:1f:7b:d0:95:f2:7b:77:97:7d:64:
77:48:72:86:93:f1:11:da:aa:6c:67:16:b5:40:17:14:40:33:
df:36:f9:82:c1:41:22:5b:5c:e6:5c:65:b9:a2:b3:0a:eb:3f:
aa:ed:08:f9:ac:1e:35:e6:58:59:d3:fa:fa:8a:b4:f5:dc:c9:
8b:da:56:93:dc:3a:c1:f0:60:fd:55:b9:42:cf:8c:f0:cd:20:
88:80:3e:95:87:99:94:98:54:bc:7a:d4:4c:ca:6e:0f:6e:44:
79:cf:3f:eb:f6:fc:e5:96:f1:24:b5:58:c9:2c:c3:e1:ea:36:
08:da:33:f0:a0:9e:df:4a:68:57:ab:25:63:32:e7:87:ff:fa:
4e:9c:74:f3:cc:6d:b2:f4:54:50:9b:85:1c:3b:ef:b0:17:97:
6f:81:73:d9
-----BEGIN CERTIFICATE-----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@@ -80,12 +80,12 @@ cCeRxybXhWXAMIHaBgNVHSMEgdIwgc+AFDPYRWbXaIcYflQNcCeRxybXhWXAoYGg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BQADggEBADezu0U1Ifr0Jgb0h0TBhuUl4WkNQTL7oPbqIc0+JNhf/iiJYpNMMAR6
APF9PtcfIdL9xyadALRaLySn6lyWbQcPmRkIjurVM8GdSJEfSNShdvWmyHah2VzM
IJcuC6LhKCuPH3vQlfJ7d5d9ZHdIcoaT8RHaqmxnFrVAFxRAM982+YLBQSJbXOZc
ZbmiswrrP6rtCPmsHjXmWFnT+vqKtPXcyYvaVpPcOsHwYP1VuULPjPDNIIiAPpWH
mZSYVLx61EzKbg9uRHnPP+v2/OWW8SS1WMksw+HqNgjaM/Cgnt9KaFerJWMy54f/
+k6cdPPMbbL0VFCbhRw777AXl2+Bc9k=
-----END CERTIFICATE-----

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:ed:f5:29:ba:b9:06:b1:25:8b:d5:ab:05:6f:66:d8:74:09:da:43
2d:0c:20:1f:34:e5:10:0f:f6:16:3b:74:50:7e:f1:fd:ae:1e:e0:c0
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=URI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Sep 14 21:25:29 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:08 2025 GMT
Not After : Aug 9 20:41:08 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=URI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
@@ -38,34 +38,34 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=URI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:1E:ED:F5:29:BA:B9:06:B1:25:8B:D5:AB:05:6F:66:D8:74:09:DA:43
serial:2D:0C:20:1F:34:E5:10:0F:F6:16:3B:74:50:7E:F1:FD:AE:1E:E0:C0
X509v3 Basic Constraints:
CA:FALSE
X509v3 Subject Alternative Name:
URI:https://www.wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
4a:f0:dc:9b:15:c3:a1:a6:ea:20:5f:3e:07:c6:6b:dc:35:46:
96:0b:0d:92:60:84:a4:e4:1f:ca:36:54:31:62:2e:3c:b2:b0:
c8:99:e8:e7:13:a7:5b:bb:15:81:a9:6c:ed:67:ef:1c:9a:c9:
e8:92:4d:16:36:40:0e:88:88:86:17:ba:c9:27:d9:ff:fc:df:
80:db:8f:96:6b:ac:b2:f9:ed:51:69:5a:66:e7:2f:83:19:38:
b8:a4:69:12:66:b5:9e:83:55:c9:9a:cc:85:b0:21:a2:08:e4:
00:00:eb:c5:d1:de:a2:28:53:08:f1:7a:9e:4c:52:b8:04:26:
1a:92:63:40:82:92:80:8d:f2:3f:a0:6e:8f:19:2e:b9:cf:cf:
40:21:8e:a4:74:2c:21:97:c2:b2:5d:f7:48:ac:d7:93:c1:d5:
ae:29:bc:b9:0a:d3:cb:2d:f8:60:e3:ef:f0:24:fc:d1:6f:4d:
8f:65:64:2c:8b:ec:6e:14:d1:c5:f6:e6:d1:7b:cc:57:37:2d:
8c:1e:02:e9:91:ca:38:06:3c:7f:9d:ad:8e:ef:d8:91:74:5c:
22:9f:e0:ce:69:ee:8b:f2:e1:ac:34:59:64:c4:b2:74:1d:09:
71:22:e6:5f:a2:39:82:8f:d2:bc:b1:fa:28:bc:b7:02:7c:db:
8c:18:31:2c
18:af:95:3b:87:75:f3:93:09:3f:81:03:4c:9b:48:89:9a:4c:
bf:cd:ce:79:b6:c8:42:d4:d5:ae:aa:7d:1a:e2:c2:28:24:c7:
7e:3c:20:7f:49:cb:ae:83:4e:b0:d2:c3:2c:65:99:0e:59:8f:
75:0d:af:95:23:54:68:76:2d:bd:59:92:91:36:26:76:73:5c:
c0:b5:61:56:e0:a1:5c:78:5e:7a:fe:92:8d:4d:a3:5b:6e:c2:
61:56:1f:2b:bb:a7:d8:d9:5e:1b:e7:64:ec:04:43:c7:72:fe:
26:a2:f3:c8:a3:25:36:c3:7b:f7:c5:03:23:bd:6e:f8:92:b1:
b0:5f:10:28:58:7e:a3:d8:31:b3:c6:39:cb:89:ac:d6:9e:85:
c0:a8:48:3a:dd:85:e1:8a:a6:13:ef:4f:ab:83:07:9c:2e:23:
37:82:e0:da:8f:7e:fc:51:f8:b1:d3:fc:4b:59:90:42:94:19:
14:a0:a6:1f:5e:ad:97:ca:2f:e7:c5:41:e4:9c:8e:c5:c3:be:
2a:47:66:ed:78:7f:3b:57:43:b8:ff:82:91:d3:00:de:70:db:
46:30:36:f9:c9:ec:36:69:1e:d3:f7:d4:25:70:d1:70:50:70:
e0:a2:7e:2b:3e:c6:38:a2:f1:02:96:9a:f5:ad:ad:f8:d7:02:
bc:5d:3a:a8
-----BEGIN CERTIFICATE-----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@@ -79,12 +79,12 @@ o4IBJjCCASIwHQYDVR0OBBYEFDPYRWbXaIcYflQNcCeRxybXhWXAMIHRBgNVHSME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==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==
-----END CERTIFICATE-----

View File

@@ -2,9 +2,9 @@
MIIBcDCB+AIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
Cldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZTU0wx
FDASBgNVBAsMC0RldmVsb3BtZW50MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI0MTIxODIxMjUzNFoX
DTI3MDkxNDIxMjUzNFqgLzAtMB8GA1UdIwQYMBaAFKvgwyZMGNRyu9KEjJwKBZKA
ElNSMAoGA1UdFAQDAgEMMAoGCCqGSM49BAMCA2cAMGQCMDKae7ZvYiojInLxbTzT
4BmRACiOHKaJ2sqHOg2LGjK9wi7NWVHHj5RSTl3IhNbRGQIwMYDsSgoSxgrHosJw
VyT9SlosPUE09Ae08eSNNJ+G1/oEjr0bMsPLWKSped6EB2T+
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI1MTExMzIwNDE1MVoX
DTI4MDgwOTIwNDE1MVqgLzAtMB8GA1UdIwQYMBaAFKvgwyZMGNRyu9KEjJwKBZKA
ElNSMAoGA1UdFAQDAgEMMAoGCCqGSM49BAMCA2cAMGQCMDT7gWtayCSms4N0rWtC
YxYnTYBs3+H4IAiR2I0nF1EUVEcRjIf5bHgisR6uknej/wIwORnHUav42X34KkO0
K/HAv+e4dGk8blLUz+e4uQ8ksVhcJ9eKYzeBlE9QagQZqXhY
-----END X509 CRL-----

View File

@@ -2,9 +2,9 @@
MIIBUTCB+AIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
Cldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZTU0wx
FDASBgNVBAsMC0RldmVsb3BtZW50MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI0MTIxODIxMjUzNFoX
DTI3MDkxNDIxMjUzNFqgLzAtMB8GA1UdIwQYMBaAFFaOmsPwQt4YuUVVbvmTz+rD
86UhMAoGA1UdFAQDAgELMAoGCCqGSM49BAMCA0gAMEUCIFylKTKFoYK0b3BzLuZH
ogE/cU49ZhXq2mFAPXs36KMtAiEAl8PNBnDpVgUCaET+OUlrVCy+7oO+uixBGspf
aRus9TQ=
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI1MTExMzIwNDE1MVoX
DTI4MDgwOTIwNDE1MVqgLzAtMB8GA1UdIwQYMBaAFFaOmsPwQt4YuUVVbvmTz+rD
86UhMAoGA1UdFAQDAgELMAoGCCqGSM49BAMCA0gAMEUCID9hDH1owyS09AfRGvQb
j97uxYGqop6eJZUlmpBDW56bAiEA7cPS8mVJnub6AZmIz/kelnhVYHea7ie7yAdK
UHrEvrE=
-----END X509 CRL-----

View File

@@ -1,43 +1,43 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:50 2025 GMT
Next Update: Aug 9 20:41:50 2028 GMT
CRL extensions:
X509v3 CRL Number:
8
Revoked Certificates:
Serial Number: 02
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:50 2025 GMT
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
36:42:de:cb:20:dd:0a:c7:3b:1c:a0:b6:18:48:3a:30:25:40:
5c:42:50:2f:d9:0e:ed:df:66:1f:9d:da:5b:fc:04:0c:46:b5:
68:0b:17:df:42:32:1b:57:2d:d2:ca:07:67:54:97:28:fc:b6:
cd:e6:12:1b:29:0b:2c:03:eb:3f:05:d2:ce:a2:08:f8:eb:17:
0f:64:20:5d:2a:e8:16:5a:72:45:bb:a5:d1:f9:fb:50:c6:b7:
97:4a:1c:25:a1:cc:8d:4c:df:a9:1f:c0:a2:f5:86:9d:c1:04:
40:1a:b1:75:63:05:f1:62:63:38:d4:5c:90:ef:9a:fa:76:12:
b3:14:80:ea:0f:67:0b:6c:22:39:0b:55:59:cd:34:b1:b3:62:
c5:1b:89:a1:a3:bb:77:28:43:ca:9e:47:a2:84:0c:4f:87:f1:
62:57:4c:e7:89:12:6a:bd:69:d6:e3:07:12:03:13:73:70:8d:
3c:97:89:68:4a:95:f5:33:92:f4:de:e6:55:9f:00:22:91:70:
7f:f1:99:24:09:84:83:65:17:4a:a8:ef:2c:fb:4a:ca:93:df:
a3:23:4e:5e:d6:56:30:f7:80:98:09:c6:2f:d6:46:65:df:a2:
0d:bc:ed:44:9e:53:de:9d:e1:84:0e:88:0e:61:3c:a4:4d:e5:
7d:4f:1e:9c
7c:65:7b:3e:6a:80:89:e4:6e:ca:c4:cb:4c:ef:cb:be:79:3d:
f5:66:b1:dc:c2:75:05:c4:e1:54:45:cb:c9:9d:2b:05:06:1b:
6f:33:c7:8a:f9:57:e4:62:b8:53:1c:f2:4e:cc:b4:17:85:ed:
77:fb:47:76:28:32:fd:00:0a:e1:fd:b7:fc:c6:a3:3d:58:38:
cb:a9:c2:15:d2:97:da:e2:87:46:00:a1:c2:7b:f1:da:56:32:
6e:9e:2e:43:88:28:88:34:99:32:8e:fe:36:5f:06:cf:76:68:
6a:ad:11:1f:26:4a:d2:96:36:eb:78:f2:bf:43:c1:7a:9f:2c:
a2:45:ce:bb:6b:ee:cf:19:29:f1:3c:86:f2:0e:39:a2:dd:85:
7e:ac:b6:3d:17:46:6d:f0:d9:42:89:8b:e6:0e:ae:2d:a9:a7:
81:d0:df:59:c5:ad:de:ac:4e:e6:66:6f:f8:fb:00:79:2b:94:
f5:90:fa:b3:d3:22:8e:ba:48:00:2a:a9:29:55:f9:e9:a0:38:
15:b3:6f:e7:ad:f9:90:9d:10:aa:92:15:69:0c:35:93:ef:f1:
e2:2b:60:b4:8b:a2:90:c5:18:ff:76:a7:90:c7:02:26:8d:29:
df:b7:40:82:d1:f9:a1:4a:a8:ae:22:a2:8e:c5:76:fe:32:c5:
e7:57:b9:d2
-----BEGIN X509 CRL-----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bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yNTEx
MTMyMDQxNTBaFw0yODA4MDkyMDQxNTBaMBQwEgIBAhcNMjUxMTEzMjA0MTUwWqAO
MAwwCgYDVR0UBAMCAQgwDQYJKoZIhvcNAQELBQADggEBAHxlez5qgInkbsrEy0zv
y755PfVmsdzCdQXE4VRFy8mdKwUGG28zx4r5V+RiuFMc8k7MtBeF7Xf7R3YoMv0A
CuH9t/zGoz1YOMupwhXSl9rih0YAocJ78dpWMm6eLkOIKIg0mTKO/jZfBs92aGqt
ER8mStKWNut48r9DwXqfLKJFzrtr7s8ZKfE8hvIOOaLdhX6stj0XRm3w2UKJi+YO
ri2pp4HQ31nFrd6sTuZmb/j7AHkrlPWQ+rPTIo66SAAqqSlV+emgOBWzb+et+ZCd
EKqSFWkMNZPv8eIrYLSLopDFGP92p5DHAiaNKd+3QILR+aFKqK4ioo7Fdv4yxedX
udI=
-----END X509 CRL-----

Binary file not shown.

View File

@@ -1,42 +1,42 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:50 2025 GMT
Next Update: Aug 9 20:41:50 2028 GMT
CRL extensions:
X509v3 CRL Number:
2
Revoked Certificates:
Serial Number: 02
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:50 2025 GMT
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
12:0f:c8:40:72:63:f9:e2:60:6d:d2:b2:90:57:a0:c2:dc:fa:
44:0d:ac:c2:f6:68:30:04:42:1a:8d:5a:0b:12:b6:78:1d:30:
81:09:db:71:26:4d:5c:7b:32:58:79:5a:fa:ec:4f:32:db:68:
45:5e:e9:7f:52:82:fc:4a:04:37:18:34:b3:da:f4:e3:39:93:
97:60:bb:ea:9a:2a:75:5c:60:57:d5:8b:da:8f:06:d2:21:cd:
a3:e3:dc:dc:5e:81:bd:8f:a8:da:07:1a:02:31:1b:95:5b:2e:
47:5d:74:01:e7:d7:fe:c4:4c:ef:28:ca:7f:9b:c5:ea:42:2f:
49:d7:e8:f3:44:0d:55:85:76:77:02:9f:c8:00:d5:73:5a:55:
71:5b:8e:d7:31:25:8d:a8:14:4f:34:90:34:e4:4f:30:8e:ae:
a3:98:85:df:57:e6:a0:ef:99:7b:82:31:5e:db:8c:61:1d:a7:
71:88:c6:06:27:71:98:00:94:81:d4:a2:97:de:5a:c6:32:e7:
51:2a:b6:36:4c:56:d0:fc:b8:19:fa:8b:d5:b4:e6:17:a9:a3:
64:2b:65:7f:3a:89:b7:f6:0b:40:5f:f8:c2:9c:77:1c:01:20:
6b:1c:04:a5:19:7e:7c:d4:c5:3c:9d:3e:c9:1d:39:b8:e7:5a:
38:47:05:67
b7:0d:1c:78:99:1c:e8:0b:d9:33:a2:95:01:ad:cf:35:e9:86:
28:7f:49:6b:93:76:c1:70:08:61:aa:77:57:34:af:45:82:78:
5d:3b:7b:67:ca:b4:fb:d1:68:13:be:34:94:84:2d:65:ad:97:
52:69:1d:67:ea:8e:a7:ff:21:0f:21:6c:8c:75:7f:c7:50:c5:
6b:a5:fd:cd:3f:91:64:7b:5e:0f:4a:9c:c8:cd:39:a0:30:ad:
80:27:50:e0:a7:bf:19:68:cf:6b:26:75:51:14:77:5a:62:6d:
bc:66:1a:90:f7:00:09:34:c7:d0:9d:81:f3:b5:9f:90:40:02:
8d:3f:68:7f:0d:1d:c5:00:32:e5:cf:42:35:1c:b6:eb:02:a8:
d7:2a:a7:f3:f1:10:e2:d5:9e:41:de:2f:78:7d:7f:ad:68:06:
a0:6d:40:96:dd:35:59:4d:a0:d3:bd:2e:ba:b6:75:f8:1c:43:
b9:c0:b7:75:c4:38:59:46:00:71:ab:5a:df:f5:62:e9:ac:2b:
76:11:4f:1b:42:2c:dd:b2:38:6e:57:cf:c5:75:67:4c:3e:27:
bb:4c:d5:09:2c:4a:13:3d:8b:9c:89:76:b7:bd:73:1b:64:50:
ea:d5:13:0e:51:48:d8:43:08:93:00:85:8f:2f:08:ad:0d:aa:
d6:6c:f8:3d
-----BEGIN X509 CRL-----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HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI1MTExMzIwNDE1MFoX
DTI4MDgwOTIwNDE1MFowFDASAgECFw0yNTExMTMyMDQxNTBaoA4wDDAKBgNVHRQE
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAtw0ceJkc6AvZM6KVAa3PNemGKH9Ja5N2
wXAIYap3VzSvRYJ4XTt7Z8q0+9FoE740lIQtZa2XUmkdZ+qOp/8hDyFsjHV/x1DF
a6X9zT+RZHteD0qcyM05oDCtgCdQ4Ke/GWjPayZ1URR3WmJtvGYakPcACTTH0J2B
87WfkEACjT9ofw0dxQAy5c9CNRy26wKo1yqn8/EQ4tWeQd4veH1/rWgGoG1Alt01
WU2g070uurZ1+BxDucC3dcQ4WUYAcata3/Vi6awrdhFPG0Is3bI4blfPxXVnTD4n
u0zVCSxKEz2LnIl2t71zG2RQ6tUTDlFI2EMIkwCFjy8IrQ2q1mz4PQ==
-----END X509 CRL-----

View File

@@ -1,45 +1,45 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:50 2025 GMT
Next Update: Aug 9 20:41:50 2028 GMT
CRL extensions:
X509v3 CRL Number:
3
Revoked Certificates:
Serial Number: 01
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:50 2025 GMT
Serial Number: 02
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:50 2025 GMT
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
8b:62:fa:68:b7:84:a7:0d:ac:47:bb:92:e7:e2:9a:a5:e3:2b:
ba:7a:af:06:8e:b2:3d:7d:42:48:66:78:e0:e4:f3:f4:0a:b1:
75:50:fe:02:30:ce:60:2d:ce:7d:2b:0d:31:02:02:a1:f3:be:
7b:08:75:c4:bb:2d:a3:d1:23:21:22:c7:72:0e:b7:7e:17:f6:
21:5d:aa:fd:cf:b0:b6:56:6d:80:8d:72:a5:25:82:5a:5b:5d:
b5:90:06:47:1a:d7:15:9a:64:10:96:24:b0:06:40:bc:fe:26:
ec:05:be:99:32:2e:ba:87:b2:a8:0e:7f:5e:3e:23:14:19:c5:
e7:16:b7:b8:79:f0:6b:be:20:64:b9:89:4e:69:0f:51:54:5f:
55:82:75:cc:e1:61:00:e9:7f:19:35:16:80:d1:80:39:0c:2b:
59:12:c6:27:de:68:1c:40:5f:e8:7d:68:ea:9c:30:75:5b:47:
4e:2e:78:4a:1d:37:ec:7f:b8:34:ba:cb:57:f8:ae:5e:cc:fa:
ba:66:be:13:5a:08:2b:37:e6:ac:ce:bf:22:82:9c:73:11:5b:
84:80:07:a7:2c:43:54:bf:1c:6a:55:d1:d2:02:28:35:4f:40:
8e:0e:c4:8c:dd:2d:01:40:e1:f9:f1:c3:ed:f3:82:9f:4c:ed:
30:aa:48:10
1f:0f:e1:f9:29:b2:eb:fc:02:55:29:aa:b1:be:21:3d:78:42:
ef:ce:fc:4f:69:22:94:1f:10:d7:cd:8f:1f:0b:0c:44:69:de:
7b:af:10:a0:37:a8:2b:8a:c2:7b:d6:6b:75:1f:ab:46:4f:8a:
e4:e8:42:f4:83:a0:1b:ad:96:9f:e9:35:8e:6b:7c:bc:57:48:
43:2a:54:60:22:1a:59:87:68:d6:d4:ff:a8:cb:d2:36:79:dc:
05:4e:ca:57:56:5b:af:d5:6c:ac:e2:47:e6:55:3d:5d:70:b2:
bd:14:0b:e8:97:54:e5:96:9c:5a:45:f6:eb:b9:6c:24:99:99:
83:51:7c:0c:11:66:0e:3f:ee:cd:4b:70:ab:ec:48:1b:06:58:
f6:bb:ee:6d:17:48:aa:38:6f:56:84:ff:33:81:64:7c:70:be:
70:1f:b5:a6:6c:89:b1:fc:63:47:29:e4:1d:bc:eb:76:01:a6:
52:4a:68:6c:26:ba:76:2a:8b:cf:fa:88:06:89:f2:3f:89:04:
29:07:91:32:94:89:bc:f9:59:35:d5:24:8c:55:27:a0:6f:9a:
ab:04:3a:2f:76:f2:e5:dc:c9:74:7f:1d:97:dc:25:b3:5d:35:
40:f2:f2:c0:dd:e1:35:60:c3:5f:77:98:b4:c6:ec:11:5f:0c:
d9:8b:60:36
-----BEGIN X509 CRL-----
MIICGTCCAQECAQEwDQYJKoZIhvcNAQELBQAwgZQxCzAJBgNVBAYTAlVTMRAwDgYD
VQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYDVQQKDAhTYXd0b290
aDETMBEGA1UECwwKQ29uc3VsdGluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t
MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yNDEyMTgyMTI1MzRa
Fw0yNzA5MTQyMTI1MzRaMCgwEgIBARcNMjQxMjE4MjEyNTM0WjASAgECFw0yNDEy
MTgyMTI1MzRaoA4wDDAKBgNVHRQEAwIBAzANBgkqhkiG9w0BAQsFAAOCAQEAi2L6
aLeEpw2sR7uS5+KapeMrunqvBo6yPX1CSGZ44OTz9AqxdVD+AjDOYC3OfSsNMQIC
ofO+ewh1xLsto9EjISLHcg63fhf2IV2q/c+wtlZtgI1ypSWCWltdtZAGRxrXFZpk
EJYksAZAvP4m7AW+mTIuuoeyqA5/Xj4jFBnF5xa3uHnwa74gZLmJTmkPUVRfVYJ1
zOFhAOl/GTUWgNGAOQwrWRLGJ95oHEBf6H1o6pwwdVtHTi54Sh037H+4NLrLV/iu
Xsz6uma+E1oIKzfmrM6/IoKccxFbhIAHpyxDVL8calXR0gIoNU9Ajg7EjN0tAUDh
+fHD7fOCn0ztMKpIEA==
MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yNTExMTMyMDQxNTBa
Fw0yODA4MDkyMDQxNTBaMCgwEgIBARcNMjUxMTEzMjA0MTUwWjASAgECFw0yNTEx
MTMyMDQxNTBaoA4wDDAKBgNVHRQEAwIBAzANBgkqhkiG9w0BAQsFAAOCAQEAHw/h
+Smy6/wCVSmqsb4hPXhC7878T2kilB8Q182PHwsMRGnee68QoDeoK4rCe9ZrdR+r
Rk+K5OhC9IOgG62Wn+k1jmt8vFdIQypUYCIaWYdo1tT/qMvSNnncBU7KV1Zbr9Vs
rOJH5lU9XXCyvRQL6JdU5ZacWkX267lsJJmZg1F8DBFmDj/uzUtwq+xIGwZY9rvu
bRdIqjhvVoT/M4FkfHC+cB+1pmyJsfxjRynkHbzrdgGmUkpobCa6diqLz/qIBony
P4kEKQeRMpSJvPlZNdUkjFUnoG+aqwQ6L3by5dzJdH8dl9wls101QPLywN3hNWDD
X3eYtMbsEV8M2YtgNg==
-----END X509 CRL-----

Binary file not shown.

View File

@@ -1,82 +1,82 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:50 2025 GMT
Next Update: Aug 9 20:41:50 2028 GMT
CRL extensions:
X509v3 CRL Number:
2
Revoked Certificates:
Serial Number: 02
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:50 2025 GMT
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
12:0f:c8:40:72:63:f9:e2:60:6d:d2:b2:90:57:a0:c2:dc:fa:
44:0d:ac:c2:f6:68:30:04:42:1a:8d:5a:0b:12:b6:78:1d:30:
81:09:db:71:26:4d:5c:7b:32:58:79:5a:fa:ec:4f:32:db:68:
45:5e:e9:7f:52:82:fc:4a:04:37:18:34:b3:da:f4:e3:39:93:
97:60:bb:ea:9a:2a:75:5c:60:57:d5:8b:da:8f:06:d2:21:cd:
a3:e3:dc:dc:5e:81:bd:8f:a8:da:07:1a:02:31:1b:95:5b:2e:
47:5d:74:01:e7:d7:fe:c4:4c:ef:28:ca:7f:9b:c5:ea:42:2f:
49:d7:e8:f3:44:0d:55:85:76:77:02:9f:c8:00:d5:73:5a:55:
71:5b:8e:d7:31:25:8d:a8:14:4f:34:90:34:e4:4f:30:8e:ae:
a3:98:85:df:57:e6:a0:ef:99:7b:82:31:5e:db:8c:61:1d:a7:
71:88:c6:06:27:71:98:00:94:81:d4:a2:97:de:5a:c6:32:e7:
51:2a:b6:36:4c:56:d0:fc:b8:19:fa:8b:d5:b4:e6:17:a9:a3:
64:2b:65:7f:3a:89:b7:f6:0b:40:5f:f8:c2:9c:77:1c:01:20:
6b:1c:04:a5:19:7e:7c:d4:c5:3c:9d:3e:c9:1d:39:b8:e7:5a:
38:47:05:67
b7:0d:1c:78:99:1c:e8:0b:d9:33:a2:95:01:ad:cf:35:e9:86:
28:7f:49:6b:93:76:c1:70:08:61:aa:77:57:34:af:45:82:78:
5d:3b:7b:67:ca:b4:fb:d1:68:13:be:34:94:84:2d:65:ad:97:
52:69:1d:67:ea:8e:a7:ff:21:0f:21:6c:8c:75:7f:c7:50:c5:
6b:a5:fd:cd:3f:91:64:7b:5e:0f:4a:9c:c8:cd:39:a0:30:ad:
80:27:50:e0:a7:bf:19:68:cf:6b:26:75:51:14:77:5a:62:6d:
bc:66:1a:90:f7:00:09:34:c7:d0:9d:81:f3:b5:9f:90:40:02:
8d:3f:68:7f:0d:1d:c5:00:32:e5:cf:42:35:1c:b6:eb:02:a8:
d7:2a:a7:f3:f1:10:e2:d5:9e:41:de:2f:78:7d:7f:ad:68:06:
a0:6d:40:96:dd:35:59:4d:a0:d3:bd:2e:ba:b6:75:f8:1c:43:
b9:c0:b7:75:c4:38:59:46:00:71:ab:5a:df:f5:62:e9:ac:2b:
76:11:4f:1b:42:2c:dd:b2:38:6e:57:cf:c5:75:67:4c:3e:27:
bb:4c:d5:09:2c:4a:13:3d:8b:9c:89:76:b7:bd:73:1b:64:50:
ea:d5:13:0e:51:48:d8:43:08:93:00:85:8f:2f:08:ad:0d:aa:
d6:6c:f8:3d
-----BEGIN X509 CRL-----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HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI1MTExMzIwNDE1MFoX
DTI4MDgwOTIwNDE1MFowFDASAgECFw0yNTExMTMyMDQxNTBaoA4wDDAKBgNVHRQE
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAtw0ceJkc6AvZM6KVAa3PNemGKH9Ja5N2
wXAIYap3VzSvRYJ4XTt7Z8q0+9FoE740lIQtZa2XUmkdZ+qOp/8hDyFsjHV/x1DF
a6X9zT+RZHteD0qcyM05oDCtgCdQ4Ke/GWjPayZ1URR3WmJtvGYakPcACTTH0J2B
87WfkEACjT9ofw0dxQAy5c9CNRy26wKo1yqn8/EQ4tWeQd4veH1/rWgGoG1Alt01
WU2g070uurZ1+BxDucC3dcQ4WUYAcata3/Vi6awrdhFPG0Is3bI4blfPxXVnTD4n
u0zVCSxKEz2LnIl2t71zG2RQ6tUTDlFI2EMIkwCFjy8IrQ2q1mz4PQ==
-----END X509 CRL-----
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:50 2025 GMT
Next Update: Aug 9 20:41:50 2028 GMT
CRL extensions:
X509v3 CRL Number:
1
No Revoked Certificates.
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
a2:61:f8:3b:d8:53:33:4c:c2:36:fa:65:d9:70:7f:ce:b8:b2:
ff:ba:06:ab:f3:ce:aa:48:b9:11:20:3a:9d:48:14:4c:e6:95:
12:4e:c0:cf:2a:da:d1:bc:72:05:e7:32:1f:2a:f3:14:be:df:
59:28:b5:cd:b8:6c:81:73:46:20:a4:8b:43:d9:75:1e:e9:e7:
17:79:44:da:7b:b7:1a:dc:c8:c3:d8:05:5f:dc:d8:6f:f0:db:
c8:40:ae:50:57:54:e1:26:69:75:b3:61:0f:2c:9c:f5:7c:b4:
d1:df:6d:3c:eb:c4:04:96:dd:78:09:fa:41:23:dc:86:29:a3:
79:8a:56:bd:9b:66:34:3e:36:22:3a:9d:84:aa:0b:09:0b:36:
dc:a2:62:59:76:83:2e:0f:61:28:9b:f9:c5:53:74:61:3d:78:
b8:f8:36:de:ec:7c:f2:e1:d5:86:cb:db:bb:f2:c1:a6:83:f9:
c1:16:f7:8b:ad:35:47:e2:d1:ca:6d:21:8a:c6:8c:6e:10:69:
e6:56:22:5d:fc:82:65:8a:a3:9c:4d:d0:91:c8:2a:fa:87:60:
c6:e3:12:30:da:2a:77:02:4d:f1:46:02:85:e9:a2:3d:d2:8e:
f5:3a:6d:5c:6a:86:b5:6d:55:ac:db:fd:a1:44:82:fe:2c:64:
4c:ba:1b:91
b2:d2:46:d2:6c:b8:a7:15:7b:ea:7e:9b:5d:f4:a4:e0:54:3a:
80:e6:de:67:86:b7:fd:5c:ba:95:aa:5a:69:fe:de:f1:44:09:
fa:c4:8a:77:1d:50:4f:5a:88:1c:bd:a3:00:c7:5e:a2:59:57:
fa:8f:29:f2:f9:02:9a:33:d1:4a:2a:a6:7b:f8:31:da:18:19:
00:34:4e:e6:53:11:fc:fe:ab:43:ab:12:a8:fc:2a:45:7b:78:
4e:7a:df:9d:84:26:3b:8d:f6:07:28:fd:56:31:d8:60:63:a4:
37:a1:d4:a0:30:b6:6c:aa:18:87:76:b5:c1:9c:4d:0f:1f:38:
74:6a:4b:ca:6c:0e:92:b5:6c:ee:94:62:b2:c9:22:b4:d2:9d:
0d:1a:fe:c5:19:6a:92:d0:05:0f:63:fe:31:72:2a:75:b2:e2:
f7:dc:97:c6:3c:48:83:21:25:5a:79:5f:50:9b:92:67:a1:1c:
39:b8:c3:6c:cb:66:8b:56:5d:1f:8e:de:cb:35:d6:f7:61:98:
35:ce:f6:b7:7d:e3:66:19:44:1a:5e:8f:aa:95:f9:bb:56:91:
ac:9b:65:03:13:8d:ee:3d:9c:aa:ce:b3:95:1d:c9:37:be:93:
08:c7:67:9f:93:c2:ae:60:95:26:17:f4:7e:a5:b8:a0:7a:cf:
56:89:0c:32
-----BEGIN X509 CRL-----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bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yNTEx
MTMyMDQxNTBaFw0yODA4MDkyMDQxNTBaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG
9w0BAQsFAAOCAQEAstJG0my4pxV76n6bXfSk4FQ6gObeZ4a3/Vy6lapaaf7e8UQJ
+sSKdx1QT1qIHL2jAMdeollX+o8p8vkCmjPRSiqme/gx2hgZADRO5lMR/P6rQ6sS
qPwqRXt4TnrfnYQmO432Byj9VjHYYGOkN6HUoDC2bKoYh3a1wZxNDx84dGpLymwO
krVs7pRisskitNKdDRr+xRlqktAFD2P+MXIqdbLi99yXxjxIgyElWnlfUJuSZ6Ec
ObjDbMtmi1ZdH47eyzXW92GYNc72t33jZhlEGl6PqpX5u1aRrJtlAxON7j2cqs6z
lR3JN76TCMdnn5PCrmCVJhf0fqW4oHrPVokMMg==
-----END X509 CRL-----

View File

@@ -5,49 +5,49 @@ Certificate Revocation List (CRL):
Mask Algorithm: mgf1 with sha256
Salt Length: 0x20
Trailer Field: 0x01 (default)
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_RSAPSS, OU = CA-RSAPSS, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_RSAPSS, OU=CA-RSAPSS, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Last Update: Nov 13 20:41:51 2025 GMT
Next Update: Aug 9 20:41:51 2028 GMT
CRL extensions:
X509v3 CRL Number:
13
Revoked Certificates:
Serial Number: 01
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:51 2025 GMT
Signature Algorithm: rsassaPss
Signature Value:
Hash Algorithm: sha256
Mask Algorithm: mgf1 with sha256
Salt Length: 0x20
Trailer Field: 0x01 (default)
06:13:7c:70:5f:2b:3b:4f:8f:50:ab:05:97:6b:65:df:1d:95:
f3:e7:e3:1e:36:84:e7:19:ae:6d:3c:5c:10:f9:a5:c8:bd:14:
a6:ea:0b:0f:34:6d:69:78:c8:df:db:73:4a:c9:cf:c8:ad:f3:
58:8e:ac:f4:8f:46:ae:83:93:6a:6c:cd:7a:a2:40:24:51:74:
55:6f:23:a9:2d:75:d6:54:55:ab:dc:91:56:d5:f7:1f:33:47:
18:ac:cb:13:f6:15:9b:93:f0:16:10:79:9f:42:32:b9:44:93:
04:5a:45:18:6c:79:16:34:0d:00:dc:61:42:50:3b:ec:86:de:
6c:60:73:99:37:17:79:52:b4:67:72:21:3e:e7:06:1b:49:20:
e1:53:23:db:2b:0a:42:54:44:62:4f:87:11:2d:cf:26:3f:60:
0d:5f:6b:d7:89:45:60:0d:71:1a:fb:b5:13:55:53:27:90:f0:
b8:cc:ce:99:50:69:bd:fa:3b:1d:7f:11:be:7b:cf:4f:09:de:
9b:a7:f9:05:34:2e:f1:59:dc:ea:e9:6b:c4:98:d7:8f:eb:81:
f7:ab:73:01:6e:6f:7c:00:dc:b9:55:4b:14:c0:74:28:32:3a:
b3:ee:0f:d9:8d:ca:dd:3a:fb:1e:72:19:f1:7c:94:cb:ff:00:
49:2d:ab:d0
59:d5:bd:12:fa:49:bf:91:c4:c9:9a:31:57:35:58:6f:6d:df:
c3:cc:b5:68:ab:3d:09:41:f2:43:46:7e:bc:06:d6:fb:79:76:
1e:3a:dd:f2:c0:4c:3e:39:67:c5:3b:02:d1:b4:e9:69:e2:3f:
6d:32:0b:4a:2f:b3:47:ce:dd:00:b3:bf:53:5d:fc:a4:0d:5b:
d1:3a:e3:09:db:60:7f:11:44:bc:f7:f9:c7:70:23:dc:d3:2d:
0e:8b:99:ca:0d:ed:1e:76:54:6c:b5:af:f7:c3:ca:ec:03:fb:
54:dd:f0:1b:d3:67:b5:47:1f:f6:ad:fd:83:9b:9a:84:2b:44:
e4:21:44:84:ab:da:98:2b:ab:3b:db:e8:21:d4:96:e4:69:96:
14:1f:b1:63:ec:f1:b0:b5:6a:31:45:b2:34:12:8a:12:64:65:
c1:9f:0e:e3:82:ea:90:2b:6a:c2:38:d6:28:d9:d5:8c:29:07:
24:76:e2:44:0c:71:04:7c:79:fb:26:43:36:ae:8e:29:53:31:
19:76:47:09:8d:a5:45:ed:0a:68:5d:5c:a9:18:13:a7:36:e1:
d1:7d:82:44:79:5f:bc:ee:8a:35:d2:ed:2f:46:38:35:82:e8:
7a:f6:21:35:4c:9f:95:8f:d0:e8:92:98:75:36:c4:22:58:d8:
84:1a:26:8a
-----BEGIN X509 CRL-----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BAIBBQCiAwIBIAOCAQEAWdW9EvpJv5HEyZoxVzVYb23fw8y1aKs9CUHyQ0Z+vAbW
+3l2Hjrd8sBMPjlnxTsC0bTpaeI/bTILSi+zR87dALO/U138pA1b0TrjCdtgfxFE
vPf5x3Aj3NMtDouZyg3tHnZUbLWv98PK7AP7VN3wG9NntUcf9q39g5uahCtE5CFE
hKvamCurO9voIdSW5GmWFB+xY+zxsLVqMUWyNBKKEmRlwZ8O44LqkCtqwjjWKNnV
jCkHJHbiRAxxBHx5+yZDNq6OKVMxGXZHCY2lRe0KaF1cqRgTpzbh0X2CRHlfvO6K
NdLtL0Y4NYLoevYhNUyflY/Q6JKYdTbEIljYhBomig==
-----END X509 CRL-----

View File

@@ -1,27 +1,27 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:50 2025 GMT
Next Update: Aug 9 20:41:50 2028 GMT
CRL extensions:
X509v3 CRL Number:
9
Revoked Certificates:
Serial Number: 02
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:50 2025 GMT
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:46:02:21:00:83:c3:c9:fb:7c:ba:38:4a:fd:2b:60:80:d1:
3a:6d:5f:52:c7:b9:f4:53:a9:7c:1e:c7:5c:fe:66:39:f6:3b:
79:02:21:00:bf:83:70:99:74:15:ac:92:d8:39:df:3b:c8:bc:
2b:78:65:9d:ba:d8:2c:e4:22:17:2b:10:b8:b3:5b:d7:40:58
30:44:02:20:1c:89:ed:ae:61:cd:76:a8:00:e2:0b:bf:db:43:
c3:f4:54:f1:e7:66:10:25:ba:ca:12:5e:ff:d7:4a:d9:d6:ff:
02:20:51:00:51:23:f9:d1:ab:e8:4d:b9:ee:aa:45:0e:8b:cf:
f1:39:71:45:0e:8c:48:52:3b:91:b4:31:73:9a:86:64
-----BEGIN X509 CRL-----
MIIBPTCB4wIBATAKBggqhkjOPQQDAjCBjTELMAkGA1UEBhMCVVMxDzANBgNVBAgM
MIIBOzCB4wIBATAKBggqhkjOPQQDAjCBjTELMAkGA1UEBhMCVVMxDzANBgNVBAgM
Bk9yZWdvbjEOMAwGA1UEBwwFU2FsZW0xEzARBgNVBAoMCkNsaWVudCBFQ0MxDTAL
BgNVBAsMBEZhc3QxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3
DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjQxMjE4MjEyNTM0WhcNMjcwOTE0MjEy
NTM0WjAUMBICAQIXDTI0MTIxODIxMjUzNFqgDjAMMAoGA1UdFAQDAgEJMAoGCCqG
SM49BAMCA0kAMEYCIQCDw8n7fLo4Sv0rYIDROm1fUse59FOpfB7HXP5mOfY7eQIh
AL+DcJl0FayS2DnfO8i8K3hlnbrYLOQiFysQuLNb10BY
DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjUxMTEzMjA0MTUwWhcNMjgwODA5MjA0
MTUwWjAUMBICAQIXDTI1MTExMzIwNDE1MFqgDjAMMAoGA1UdFAQDAgEJMAoGCCqG
SM49BAMCA0cAMEQCIByJ7a5hzXaoAOILv9tDw/RU8edmECW6yhJe/9dK2db/AiBR
AFEj+dGr6E257qpFDovP8TlxRQ6MSFI7kbQxc5qGZA==
-----END X509 CRL-----

View File

@@ -1,27 +1,27 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:34 2024 GMT
Next Update: Sep 14 21:25:34 2027 GMT
Issuer: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:51 2025 GMT
Next Update: Aug 9 20:41:51 2028 GMT
CRL extensions:
X509v3 CRL Number:
10
Revoked Certificates:
Serial Number: 02
Revocation Date: Dec 18 21:25:34 2024 GMT
Revocation Date: Nov 13 20:41:50 2025 GMT
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:46:02:21:00:f9:6b:fd:14:b6:22:16:76:a1:1a:b8:7f:d8:
2d:5c:f6:0b:b9:1e:50:3e:ab:69:94:a0:d2:cc:f3:b6:eb:50:
0d:02:21:00:9f:8f:c1:0d:2e:4a:49:cf:ca:9c:d9:d4:54:37:
c1:49:df:38:c7:26:06:a8:f5:61:cb:e3:24:dc:d9:86:36:b3
30:46:02:21:00:b0:aa:9d:0b:ee:27:57:c1:d8:c6:e5:70:92:
65:7a:be:59:25:6c:f6:6b:e9:f6:0e:23:85:74:9a:40:95:66:
89:02:21:00:a1:a8:33:bd:21:e4:d8:58:db:1f:19:9b:7f:89:
72:d5:2c:8f:f0:0b:f7:cb:c4:9a:d3:c3:d9:76:d1:48:71:89
-----BEGIN X509 CRL-----
MIIBQDCB5gIBATAKBggqhkjOPQQDAjCBkDELMAkGA1UEBhMCVVMxEzARBgNVBAgM
Cldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxETAPBgNVBAoMCEVsbGlwdGlj
MQwwCgYDVQQLDANFQ0MxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqG
SIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjQxMjE4MjEyNTM0WhcNMjcwOTE0
MjEyNTM0WjAUMBICAQIXDTI0MTIxODIxMjUzNFqgDjAMMAoGA1UdFAQDAgEKMAoG
CCqGSM49BAMCA0kAMEYCIQD5a/0UtiIWdqEauH/YLVz2C7keUD6raZSg0szztutQ
DQIhAJ+PwQ0uSknPypzZ1FQ3wUnfOMcmBqj1YcvjJNzZhjaz
SIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjUxMTEzMjA0MTUxWhcNMjgwODA5
MjA0MTUxWjAUMBICAQIXDTI1MTExMzIwNDE1MFqgDjAMMAoGA1UdFAQDAgEKMAoG
CCqGSM49BAMCA0kAMEYCIQCwqp0L7idXwdjG5XCSZXq+WSVs9mvp9g4jhXSaQJVm
iQIhAKGoM70h5NhY2x8Zm3+JctUsj/AL98vEmtPD2XbRSHGJ
-----END X509 CRL-----

View File

@@ -2,12 +2,12 @@
MIICBTCB7gIBATANBgkqhkiG9w0BAQsFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV
BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3Ro
MRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI0MTIxODIxMjUzNFoX
DTI3MDkxNDIxMjUzNFowFTATAgIQABcNMjQxMjE4MjEyNTM0WqAOMAwwCgYDVR0U
BAMCAQUwDQYJKoZIhvcNAQELBQADggEBAIhhLr6vLcfpBh7jB6SfToKS0yPJON6j
qBBhPH6xI/bbQOMjOqMeh7olBf7NuPU3ak6FkiiYqlsSO0WMQgALVRffJHKXIpzw
9x2wClDh/93QQoeKHoyf3BSWCU1b9wG3X3j2NzCUjGZb1n18HrZmdHuKFi5JR5b2
ovKbJaoKrQurtlbPp98D4v36GR78RGuNOAbXPB5TQSsCRrFg6MKTkqeAwtZYaDAq
V4jcjtpEm5HSoC2UlpNudXLi+mJ63dX2/vd3Zo12I8tVsSVYvD50suSRlVrynnkp
NbQ1lFxbtBBjHQwJXn+hmh/RlCAjfebwH3qPKzHSftrcD1MfFXUvl7E=
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI1MTExMzIwNDE1MFoX
DTI4MDgwOTIwNDE1MFowFTATAgIQABcNMjUxMTEzMjA0MTUwWqAOMAwwCgYDVR0U
BAMCAQUwDQYJKoZIhvcNAQELBQADggEBAG+S1RZ67feVznVN776wOwo5FQQg+GAU
88Wsz7WcxJmYuFBnoqTNSn7z6zLdaCyIZdUr0sKOc4WZd4D030am1CUZ5209B07m
MGtmzQR6z7jKiQPaeILcV//SUfrp0efZFWGlVfz65YUfeTtAcD/JxQ24E0eN+moO
L3Z18uBBe/bK7Z+wCP9s9ieRepsGSQxD/Td0CLhPLs2WXNnMf5KUf5TdaxpWA2pH
jI+nApi6Rgau2dRolL2isZxvvLrjm7fjbb0NKQFm2Fq1oKJQru9neZYFEXmDPhjy
zjhD/lqeTEb6TUNTid/sPALl6Dd4zWlZ928Q6Cu17dvx0tDHs3Bl/Dw=
-----END X509 CRL-----

View File

@@ -2,12 +2,12 @@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HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTI1MTExMzIwNDE1MFoX
DTI4MDgwOTIwNDE1MFowFDASAgEBFw0yNTExMTMyMDQxNTBaoA4wDDAKBgNVHRQE
AwIBBDANBgkqhkiG9w0BAQsFAAOCAQEAdctnTPxzeLWYShhpXp2jbDSm0wehs6Hg
8Ra6jY2EVfWDjR4/hwjZ4KW2rcNW8TxFrETatqitYbaGVH0HOWTVWlI9XdtTsxkV
3bAvB1DlB7+PiUQbkPTwpN0EGUBdgJuXVJEowiEHe9vgLC/7L9X1TWwNKymYff2C
0zkBcy9wDs1/qx8+6xHQeOl6MakyymMstCRrwOTrI+njMnmXlGyyqipamMSyHDY7
wxwDKWSBN/AJsUMzjvHDI1YlyNWiC/++m3isucRcgXiQumnPwHNLBqq93NBKemQy
fF+ZtjbBiPbaSLPNRiz7jIlMgTvfjFszNZ+NbA1OjF3VpGSxMicKhA==
-----END X509 CRL-----

View File

@@ -1,39 +1,39 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, OU = Engineering, CN = www.nomatch.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:31 2024 GMT
Next Update: Sep 14 21:25:31 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, OU=Engineering, CN=www.nomatch.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:28 2025 GMT
Next Update: Aug 9 20:41:28 2028 GMT
CRL extensions:
X509v3 CRL Number:
1
No Revoked Certificates.
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
5f:bb:9e:e9:f1:4e:f7:5b:07:24:60:bd:b5:3a:7b:88:04:fa:
a7:6c:15:17:b8:f9:dd:12:a5:df:59:ec:0f:00:a1:a6:24:46:
d7:a4:c5:2d:30:71:b7:6c:7b:f2:a8:09:02:9d:f9:96:e0:49:
94:d0:a5:bf:b0:df:65:5f:7a:82:7a:5d:14:0b:67:c8:d3:12:
fb:12:48:ac:a0:4d:7a:b1:0e:07:25:e7:e4:69:75:a2:a9:d0:
a7:f0:09:d1:ba:a8:be:40:8a:e1:ad:1b:c6:a3:46:b3:2b:44:
81:d2:bd:66:b8:ba:d0:d5:6d:0e:da:ee:b3:40:d2:7d:40:59:
25:12:f3:e9:98:07:00:96:e6:72:97:d5:dc:a0:a4:ea:4f:36:
c9:07:cf:ae:08:ab:f0:90:fe:93:d4:b6:50:73:c1:a5:d5:5b:
04:ce:9b:11:5a:b2:1c:11:75:39:f5:97:4b:4e:dd:be:47:ae:
c9:c3:1e:a4:6a:1b:ca:ec:40:09:3c:3f:34:9b:e6:00:83:d6:
fa:84:1f:85:48:64:61:2b:4c:50:d6:be:29:67:f7:37:62:95:
0a:ff:ee:ab:02:1e:79:d3:1c:60:50:a9:3e:0e:da:5f:38:14:
b7:0b:d3:02:f8:1d:9f:ea:e9:9c:81:86:87:02:9e:6d:0d:5a:
85:57:ba:23
56:83:87:1f:7c:bc:93:2b:81:bf:73:ae:49:fe:75:20:4a:82:
87:14:20:0d:b6:af:83:e8:dc:86:12:01:31:69:44:e2:61:3d:
ac:7e:05:9e:ec:ac:f1:5a:2f:c1:85:e1:a9:b6:75:e3:45:40:
4b:55:59:1c:c5:cc:ea:b7:a6:db:51:cc:41:5f:54:62:76:6c:
ff:ac:90:85:cc:09:51:28:a2:6d:ed:a4:1e:ce:0b:20:9d:4b:
df:c9:40:b8:7a:09:8f:91:f8:4f:8d:cb:f1:25:77:cd:b4:79:
2b:d8:f5:ed:13:5c:bc:9c:5b:71:69:dd:28:a8:e6:00:7f:72:
7a:e2:32:75:b2:14:22:f4:e2:65:f3:d6:30:5f:e2:12:85:13:
ca:12:63:47:e2:7d:c1:8e:f3:60:bd:8c:c6:42:db:51:09:50:
1d:89:ce:f5:2e:e2:8c:bd:22:6a:6b:ae:47:a4:7c:ef:e9:b6:
4c:e9:3f:22:1f:8f:dd:07:75:9c:f9:05:54:cf:7f:33:96:ef:
47:ad:9a:cc:3f:99:bc:d8:1a:0a:8e:f7:2d:a0:1d:50:94:a1:
24:df:10:84:76:61:28:97:2a:c6:98:09:29:b5:4b:46:37:19:
f6:cf:1f:5b:4f:57:b0:a9:70:2f:58:38:1c:d3:57:91:80:42:
23:ec:cc:ce
-----BEGIN X509 CRL-----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-----END X509 CRL-----

View File

@@ -1,39 +1,39 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, OU = Engineering, CN = www.nomatch.com, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:31 2024 GMT
Next Update: Sep 14 21:25:31 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, OU=Engineering, CN=www.nomatch.com, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:29 2025 GMT
Next Update: Aug 9 20:41:29 2028 GMT
CRL extensions:
X509v3 CRL Number:
1
No Revoked Certificates.
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
5f:bb:9e:e9:f1:4e:f7:5b:07:24:60:bd:b5:3a:7b:88:04:fa:
a7:6c:15:17:b8:f9:dd:12:a5:df:59:ec:0f:00:a1:a6:24:46:
d7:a4:c5:2d:30:71:b7:6c:7b:f2:a8:09:02:9d:f9:96:e0:49:
94:d0:a5:bf:b0:df:65:5f:7a:82:7a:5d:14:0b:67:c8:d3:12:
fb:12:48:ac:a0:4d:7a:b1:0e:07:25:e7:e4:69:75:a2:a9:d0:
a7:f0:09:d1:ba:a8:be:40:8a:e1:ad:1b:c6:a3:46:b3:2b:44:
81:d2:bd:66:b8:ba:d0:d5:6d:0e:da:ee:b3:40:d2:7d:40:59:
25:12:f3:e9:98:07:00:96:e6:72:97:d5:dc:a0:a4:ea:4f:36:
c9:07:cf:ae:08:ab:f0:90:fe:93:d4:b6:50:73:c1:a5:d5:5b:
04:ce:9b:11:5a:b2:1c:11:75:39:f5:97:4b:4e:dd:be:47:ae:
c9:c3:1e:a4:6a:1b:ca:ec:40:09:3c:3f:34:9b:e6:00:83:d6:
fa:84:1f:85:48:64:61:2b:4c:50:d6:be:29:67:f7:37:62:95:
0a:ff:ee:ab:02:1e:79:d3:1c:60:50:a9:3e:0e:da:5f:38:14:
b7:0b:d3:02:f8:1d:9f:ea:e9:9c:81:86:87:02:9e:6d:0d:5a:
85:57:ba:23
48:fd:d5:61:a6:d8:30:38:fe:84:99:62:04:ac:0c:5b:3a:37:
19:be:64:63:b2:a0:b6:d7:bb:f0:12:69:77:ed:51:d6:a9:f9:
68:5c:33:f1:ad:3c:d3:37:0e:b8:57:af:6f:3a:28:71:5c:b8:
50:51:70:fe:f6:9f:f0:24:46:5f:e0:ee:c0:96:7b:9e:4f:5f:
62:e3:4e:e2:7a:a8:2e:15:de:58:50:03:fd:92:22:4e:7d:b2:
be:6c:f6:4b:a5:a9:5e:e5:d6:5d:80:7c:67:ba:c3:9e:ad:2e:
c6:1b:fe:b9:ee:bc:04:64:69:d7:9a:64:52:33:81:28:df:36:
cd:d5:da:ca:58:8c:86:c0:67:b0:52:42:8c:66:38:49:0a:d4:
6d:61:1e:b5:5d:fa:18:db:8b:4b:f1:88:b6:70:d3:5b:e4:88:
a0:11:5a:6f:3a:a1:85:e5:41:b7:64:7e:af:5c:92:c4:2f:93:
60:6b:80:4d:91:c1:01:f7:86:a7:13:a7:54:df:63:28:29:64:
16:de:75:c5:53:96:4f:18:87:81:4f:b6:13:44:3e:4b:a1:af:
69:9a:bb:25:c3:32:ab:96:32:e6:c2:5c:e9:4f:7e:6d:86:d7:
78:11:4d:d5:b7:1b:7c:3d:9a:8d:4d:50:72:ea:0f:fe:28:60:
0e:b7:e0:bb
-----BEGIN X509 CRL-----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-----END X509 CRL-----

View File

@@ -1,39 +1,39 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, OU = Engineering, CN = localhost, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:31 2024 GMT
Next Update: Sep 14 21:25:31 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, OU=Engineering, CN=localhost, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:27 2025 GMT
Next Update: Aug 9 20:41:27 2028 GMT
CRL extensions:
X509v3 CRL Number:
1
No Revoked Certificates.
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
2f:28:e7:b2:46:58:01:03:b8:47:87:4d:75:63:04:40:cd:c2:
dd:23:17:82:81:03:88:b9:99:20:91:50:70:84:dd:38:b1:51:
7e:fb:67:09:d1:73:54:e2:58:2a:1b:b4:35:3b:b9:32:70:d0:
03:e2:ec:7c:90:d4:18:63:bf:35:c0:93:80:bf:fa:2b:57:88:
e1:24:c2:59:87:9b:9f:c3:04:2f:ed:53:ae:22:c7:5d:b5:41:
18:b9:96:37:e6:50:96:d2:c0:4c:ba:a6:ac:13:af:86:7d:58:
01:e0:ad:23:bb:76:bd:36:ff:d7:3f:4e:4d:0e:20:e0:97:29:
e7:a7:26:a1:3a:56:e8:d2:86:24:58:06:2d:0b:26:3e:f9:fc:
0d:fc:75:e3:1b:72:28:ff:5d:07:cd:da:4b:46:be:62:f7:6a:
bc:d3:4d:18:b2:53:59:04:ab:3f:de:30:63:b3:42:ae:0d:00:
b9:f8:f6:bc:7a:b6:fd:4f:f4:72:89:3b:84:d0:7e:12:70:7b:
17:26:0c:9d:ba:a5:aa:b3:0d:e0:4b:07:09:52:87:7a:28:b5:
77:0b:68:57:37:ab:c4:36:6b:1c:08:8d:34:9d:b6:3a:39:20:
be:3d:77:2a:85:2f:38:26:1a:01:60:34:9f:7e:bc:c4:7a:a6:
d5:13:1d:9c
a5:26:31:1b:cd:45:5f:05:55:70:e8:80:75:ca:65:16:79:aa:
8e:1b:f5:2a:50:6b:1c:fc:f3:43:f9:c3:51:20:fa:48:cb:8c:
ea:56:ae:44:e3:06:09:28:46:58:d0:a8:48:e4:a7:c7:46:48:
26:97:b1:d3:10:ad:ce:e4:74:10:9c:0a:dc:d1:ef:e2:ac:27:
3a:c0:5c:3b:20:1b:49:90:1b:ad:d7:bd:cf:59:91:5b:82:b3:
a2:80:6d:50:fa:90:e6:c3:2f:a4:f3:4d:dd:20:42:de:67:4b:
10:1c:2f:ee:92:c2:b0:a3:b2:40:bc:50:34:e2:16:d9:6d:af:
75:3a:cd:13:80:1d:33:41:49:51:d6:b2:67:e4:1b:10:dd:71:
d8:f9:f8:fc:e0:8f:3e:6e:aa:67:2c:ba:67:2d:f6:55:83:06:
fa:96:95:10:86:dc:21:f8:13:bd:29:0f:d9:20:5e:4b:8c:e9:
be:0f:71:14:98:3a:ee:d6:5d:a7:b6:30:34:46:74:21:57:03:
aa:bf:e8:4e:e3:14:d7:a2:fe:0e:0f:88:5d:5c:3b:81:26:c9:
39:47:70:59:6e:84:25:95:81:44:5e:38:89:2d:6f:f2:fc:cd:
c2:ec:4c:0b:96:f3:ef:5d:c9:01:67:0b:6e:18:4a:40:aa:63:
1b:7a:20:92
-----BEGIN X509 CRL-----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c3NsLmNvbRcNMjUxMTEzMjA0MTI3WhcNMjgwODA5MjA0MTI3WqAOMAwwCgYDVR0U
BAMCAQEwDQYJKoZIhvcNAQELBQADggEBAKUmMRvNRV8FVXDogHXKZRZ5qo4b9SpQ
axz880P5w1Eg+kjLjOpWrkTjBgkoRljQqEjkp8dGSCaXsdMQrc7kdBCcCtzR7+Ks
JzrAXDsgG0mQG63Xvc9ZkVuCs6KAbVD6kObDL6TzTd0gQt5nSxAcL+6SwrCjskC8
UDTiFtltr3U6zROAHTNBSVHWsmfkGxDdcdj5+Pzgjz5uqmcsumct9lWDBvqWlRCG
3CH4E70pD9kgXkuM6b4PcRSYOu7WXae2MDRGdCFXA6q/6E7jFNei/g4PiF1cO4Em
yTlHcFluhCWVgUReOIktb/L8zcLsTAuW8+9dyQFnC24YSkCqYxt6IJI=
-----END X509 CRL-----

View File

@@ -1,39 +1,39 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, OU = Engineering, CN = *localhost, emailAddress = info@wolfssl.com
Last Update: Dec 18 21:25:31 2024 GMT
Next Update: Sep 14 21:25:31 2027 GMT
Issuer: C=US, ST=Montana, L=Bozeman, OU=Engineering, CN=*localhost, emailAddress=info@wolfssl.com
Last Update: Nov 13 20:41:29 2025 GMT
Next Update: Aug 9 20:41:29 2028 GMT
CRL extensions:
X509v3 CRL Number:
1
No Revoked Certificates.
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
9a:06:6f:af:9a:2b:7d:ff:7c:4f:e5:be:e5:a7:68:8b:43:d3:
46:c7:7c:2c:c6:38:5e:a5:81:15:57:73:26:2d:ad:63:12:8b:
66:54:c6:b9:18:7e:63:12:4e:9e:dc:d7:38:6b:dd:c1:b8:c2:
58:a4:5d:ea:72:66:da:b4:95:9e:e8:b5:02:48:c3:b0:7a:84:
ab:89:ff:4f:e2:6a:1d:d2:1e:7b:10:5f:30:55:a5:88:72:45:
e4:c7:2e:43:6f:d5:22:48:11:c1:c0:d2:a5:01:bd:d7:81:3d:
8f:48:d2:0d:29:88:0e:33:b5:bb:32:33:bd:c7:4b:9b:ee:5f:
bd:f5:e0:69:9b:f8:fb:b1:03:7d:b7:17:66:5d:b8:41:c3:96:
80:87:4d:d2:dc:cc:f8:9a:61:89:68:0f:e4:b0:96:c1:41:fd:
ed:4d:36:17:9b:58:ea:ba:32:05:29:4c:cf:f3:41:38:89:6a:
db:ad:73:10:d3:8e:70:d7:bc:a3:f0:f0:1d:94:86:03:2f:43:
00:5c:a7:69:97:a2:47:75:f6:00:32:f3:46:a0:9d:14:73:52:
db:aa:12:83:d1:ed:49:b6:85:36:ff:17:00:b2:0a:b1:f5:dd:
2d:c3:b0:ba:2d:b0:da:65:d7:b2:df:19:dd:45:fe:9c:c0:7f:
4b:27:9b:e1
8c:36:4c:ec:52:c1:b5:4f:41:df:45:ed:bb:2f:22:29:d6:3b:
41:81:89:98:59:7f:b0:a8:2d:fc:15:a8:08:f1:b4:e1:03:89:
7e:2a:9f:1e:49:eb:b0:d7:9d:c6:e1:8a:07:7a:6d:be:48:d6:
58:53:e2:da:66:42:b2:5f:01:54:1c:20:bf:9d:95:61:81:57:
df:ff:94:ad:42:43:6d:81:0f:7a:8f:8c:35:3b:fb:fe:f6:aa:
b8:7c:ae:3e:52:f4:5b:12:1f:61:b2:5e:e8:26:41:99:3a:bf:
0e:d6:cd:59:e5:d6:a1:46:58:d6:f7:4e:59:68:9b:18:8a:16:
19:44:9d:1b:7f:53:c9:0b:f1:13:38:56:7a:64:c0:28:94:07:
70:aa:e8:94:8f:a7:05:01:e8:55:2c:b6:44:d9:53:7d:0e:14:
bd:02:29:24:b2:6a:03:a6:19:5d:47:9d:91:ee:19:20:e2:b9:
bc:f1:55:0b:d1:c6:6a:52:41:57:59:0e:52:b3:cf:d3:67:1f:
5a:11:54:09:d4:8c:28:b1:75:67:f7:f0:c5:83:45:ea:5c:73:
a0:d3:8b:1e:c3:65:22:e5:6f:07:c2:92:dd:24:07:ef:e6:0f:
37:e9:0c:95:15:10:76:7f:5d:cb:a1:94:89:c5:ef:39:17:b1:
fc:ee:b8:43
-----BEGIN X509 CRL-----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ZnNzbC5jb20XDTI1MTExMzIwNDEyOVoXDTI4MDgwOTIwNDEyOVqgDjAMMAoGA1Ud
FAQDAgEBMA0GCSqGSIb3DQEBCwUAA4IBAQCMNkzsUsG1T0HfRe27LyIp1jtBgYmY
WX+wqC38FagI8bThA4l+Kp8eSeuw153G4YoHem2+SNZYU+LaZkKyXwFUHCC/nZVh
gVff/5StQkNtgQ96j4w1O/v+9qq4fK4+UvRbEh9hsl7oJkGZOr8O1s1Z5dahRljW
905ZaJsYihYZRJ0bf1PJC/ETOFZ6ZMAolAdwquiUj6cFAehVLLZE2VN9DhS9Aikk
smoDphldR52R7hkg4rm88VUL0cZqUkFXWQ5Ss8/TZx9aEVQJ1IwosXVn9/DFg0Xq
XHOg04sew2Ui5W8HwpLdJAfv5g836QyVFRB2f13LoZSJxe85F7H87rhD
-----END X509 CRL-----

View File

@@ -1,9 +1,10 @@
-----BEGIN CERTIFICATE-----
MIIBLzCB1QIUflZfgRCpcQQ/nbPmIrNb7M8Qq4kwCgYIKoZIzj0EAwIwGjELMAkG
A1UECgwCV1IxCzAJBgNVBAMMAkRFMB4XDTI0MTIxODIxMjUzMFoXDTI3MDkxNDIx
MjUzMFowGjELMAkGA1UECgwCV1IxCzAJBgNVBAMMAkRFMFkwEwYHKoZIzj0CAQYI
KoZIzj0DAQcDQgAEJcD9Frgr8rgKHt2szmJSfFgKYH1Xddq9EcHVKupUa3bmPTb3
3VGXa6gm/numvZZVhVCdmn5pAdhDRYnZ/korJjAKBggqhkjOPQQDAgNJADBGAiEA
jEY07WKQpUx/PvL0GMEwS5MG8RL5xk5zxwWuQKWPMX8CIQD1j+MOwSFAIxFBr71C
rDRk4RCkUkPpu8HHHiBm5y7TOA==
MIIBVzCB/aADAgECAhQ4ukTJqclv2S12DIvPILd3l7T3MTAKBggqhkjOPQQDAjAa
MQswCQYDVQQKDAJXUjELMAkGA1UEAwwCREUwHhcNMjUxMTEzMjA0MTE2WhcNMjgw
ODA5MjA0MTE2WjAaMQswCQYDVQQKDAJXUjELMAkGA1UEAwwCREUwWTATBgcqhkjO
PQIBBggqhkjOPQMBBwNCAAQlwP0WuCvyuAoe3azOYlJ8WApgfVd12r0RwdUq6lRr
duY9NvfdUZdrqCb+e6a9llWFUJ2afmkB2ENFidn+SismoyEwHzAdBgNVHQ4EFgQU
srENBaxqDKGtkgp+x+FoVjVAGeowCgYIKoZIzj0EAwIDSQAwRgIhAPNFDJz5zhDc
7PP+zNWwsMqLKF7CX0YjKL8f9aCOAqZTAiEA374DH7CDzDXOdsQsaucqCLDYCtA8
S8qvfyNKHeqoHgU=
-----END CERTIFICATE-----

Binary file not shown.

Binary file not shown.

View File

@@ -1,5 +1,5 @@
-----BEGIN EC PRIVATE KEY-----
MHgCAQEEIF2qrSdYpLpQ0NkBKDgW/Q6vu2gPSy3J8TZCeFptUgSjoAsGCSskAwMC
CAEBB6FEA0IABICLLVevnQD2z+Xd+x9aacfTHtEWIBbgU9ozcCLi7u7zidKk5ndq
IqCy1OLVFQlf8b3NmT1R465dloWSv1scK2Y=
MHgCAQEEIAvaMSpipk/9e8nruCIhvi8L7dS5EG/wi2zAH8S9UnNXoAsGCSskAwMC
CAEBB6FEA0IABCWUF3m3hgKHsR5U1+zp/+fsCPAp9DH8Wxu1gupWJ/YRV3LKSDlS
+90S0nuaHPJ50RQBse6monUNa3rdIdJfueI=
-----END EC PRIVATE KEY-----

View File

@@ -1,16 +1,16 @@
-----BEGIN CERTIFICATE-----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bTBWMBAGByqGSM49AgEGBSuBBAAKA0IABDzE1Ugz4ldZF+1g2KyXTds0gv4TX55U
hge7E9vqnKQo+tA7QwCEBqOIYQCB7y3k1ltU+xVWZOJ8K/sRwlOSgxKjYzBhMB0G
A1UdDgQWBBRA4gDb8Pj3BiNQTfmJHSlyc2V2OzAfBgNVHSMEGDAWgBRA4gDb8Pj3
BiNQTfmJHSlyc2V2OzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAK
BggqhkjOPQQDAgNHADBEAiBPqCHRhmpYWzzh71qRgbtJAs7Rs5SHjrh8BelEBWzJ
qgIgboaq0k3TeFy8rGqqvK3fMuNoEDpTEGaSAZy6wj7yl/Y=
-----END CERTIFICATE-----

View File

@@ -1,5 +1,5 @@
-----BEGIN PRIVATE KEY-----
MIGEAgEAMBAGByqGSM49AgEGBSuBBAAKBG0wawIBAQQgc4nCj5LtUEfOKSe3/NPh
7CNEkOwsTGVKROo2KEaIjW6hRANCAATROF7U4afB4a0Rb0vnnFaOcmv7vVfsyQcO
WHO2l5dYko7gKMgj1bBkNEkO6jL/gPZaVcILv+M8lF8dc5QbHqXR
MIGEAgEAMBAGByqGSM49AgEGBSuBBAAKBG0wawIBAQQgCSmKA4lv33bupp09DPrE
6+qEjhXr9Isyw6ocjhyvvDGhRANCAAQ8xNVIM+JXWRftYNisl03bNIL+E1+eVIYH
uxPb6pykKPrQO0MAhAajiGEAge8t5NZbVPsVVmTifCv7EcJTkoMS
-----END PRIVATE KEY-----

Binary file not shown.

View File

@@ -2,22 +2,22 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4a:c0:0d:f1:78:b2:ad:ae:34:4d:9c:17:d2:3e:14:40:53:e1:86:3e
4b:ae:8f:e1:8f:ac:3f:f9:1a:69:18:80:b9:84:87:6e:2a:87:c2:43
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256BPR1-CLI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256BPR1-CLI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Dec 16 21:25:29 2034 GMT
Subject: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256BPR1-CLI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:08 2025 GMT
Not After : Nov 11 20:41:08 2035 GMT
Subject: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256BPR1-CLI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:80:8b:2d:57:af:9d:00:f6:cf:e5:dd:fb:1f:5a:
69:c7:d3:1e:d1:16:20:16:e0:53:da:33:70:22:e2:
ee:ee:f3:89:d2:a4:e6:77:6a:22:a0:b2:d4:e2:d5:
15:09:5f:f1:bd:cd:99:3d:51:e3:ae:5d:96:85:92:
bf:5b:1c:2b:66
04:25:94:17:79:b7:86:02:87:b1:1e:54:d7:ec:e9:
ff:e7:ec:08:f0:29:f4:31:fc:5b:1b:b5:82:ea:56:
27:f6:11:57:72:ca:48:39:52:fb:dd:12:d2:7b:9a:
1c:f2:79:d1:14:01:b1:ee:a6:a2:75:0d:6b:7a:dd:
21:d2:5f:b9:e2
ASN1 OID: brainpoolP256r1
X509v3 extensions:
X509v3 Basic Constraints:
@@ -25,38 +25,31 @@ Certificate:
Netscape Cert Type:
SSL Client, S/MIME
X509v3 Subject Key Identifier:
BF:13:B7:26:16:A8:18:A2:A9:CC:FC:5E:9E:9E:5B:39:CB:08:CE:68
X509v3 Authority Key Identifier:
DirName:/C=US/ST=Washington/L=Seattle/O=Elliptic/OU=ECC256BPR1-CLI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:4A:C0:0D:F1:78:B2:AD:AE:34:4D:9C:17:D2:3E:14:40:53:E1:86:3E
3B:51:FD:4B:70:B2:7C:29:5D:02:1A:AE:A4:76:EF:47:8A:A9:52:30
X509v3 Key Usage: critical
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Client Authentication, E-mail Protection
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:45:02:20:71:25:fb:20:e7:40:f5:a4:51:ac:e6:f4:33:51:
02:09:36:c7:01:00:ab:fa:50:72:4b:76:9b:5a:2e:07:67:a3:
02:21:00:9a:a0:c7:dc:94:d0:27:4c:bf:2c:1d:4f:22:48:3d:
ef:00:18:a9:d7:57:11:2d:72:fd:e3:62:c0:ef:2d:a6:7b
30:45:02:21:00:8c:18:d5:91:df:cf:63:8a:4c:39:82:8b:78:
57:43:af:59:c1:7d:0a:ed:c2:b1:1e:f9:30:68:37:b1:b4:9f:
6f:02:20:0c:bf:2a:1b:85:2d:34:9c:f5:65:0b:83:9d:ee:3c:
32:76:54:4f:2b:7e:50:c5:2d:92:17:71:e6:67:c0:46:36
-----BEGIN CERTIFICATE-----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d29sZnNzbC5jb20wWjAUBgcqhkjOPQIBBgkrJAMDAggBAQcDQgAEJZQXebeGAoex
HlTX7On/5+wI8Cn0MfxbG7WC6lYn9hFXcspIOVL73RLSe5oc8nnRFAGx7qaidQ1r
et0h0l+54qNuMGwwCQYDVR0TBAIwADARBglghkgBhvhCAQEEBAMCBaAwHQYDVR0O
BBYEFDtR/UtwsnwpXQIarqR270eKqVIwMA4GA1UdDwEB/wQEAwIF4DAdBgNVHSUE
FjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwCgYIKoZIzj0EAwIDSAAwRQIhAIwY1ZHf
z2OKTDmCi3hXQ69ZwX0K7cKxHvkwaDextJ9vAiAMvyobhS00nPVlC4Od7jwydlRP
K35QxS2SF3HmZ8BGNg==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,22 +2,22 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
32:a0:cb:5f:26:62:a9:d9:14:ec:13:0e:78:b4:a2:0b:86:14:59:ce
3f:2c:a7:4b:53:b2:91:42:1a:a9:d0:04:e1:e6:16:99:c6:09:9f:dc
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256K1-CLI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256K1-CLI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Dec 16 21:25:29 2034 GMT
Subject: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256K1-CLI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:07 2025 GMT
Not After : Nov 11 20:41:07 2035 GMT
Subject: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256K1-CLI, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:02:55:2f:25:90:9d:54:d3:6e:23:b5:95:9e:67:
a3:f8:c2:46:3a:ed:67:56:6d:23:87:43:db:6f:38:
e6:5b:72:07:8d:1d:f8:5b:ea:b7:47:49:a9:8e:c7:
2d:23:99:9e:2e:8c:be:72:de:0b:d3:f0:b4:49:2d:
94:ec:6d:c2:3f
04:ff:f7:c5:db:b9:84:b0:4e:9c:93:8e:73:14:3d:
49:bb:60:36:cb:79:c0:6d:11:b6:b6:9d:5a:1a:9d:
e9:c5:ab:c4:f0:21:5a:d1:f9:15:0b:17:62:3c:fb:
a1:54:df:8f:05:c2:ae:10:b8:20:68:66:3a:ba:50:
1d:f2:e4:fb:6e
ASN1 OID: secp256k1
X509v3 extensions:
X509v3 Basic Constraints:
@@ -25,38 +25,31 @@ Certificate:
Netscape Cert Type:
SSL Client, S/MIME
X509v3 Subject Key Identifier:
96:C4:7F:31:A2:90:B8:68:F1:9C:DD:75:16:52:DB:AC:04:B6:89:85
X509v3 Authority Key Identifier:
DirName:/C=US/ST=Washington/L=Seattle/O=Elliptic/OU=ECC256K1-CLI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:32:A0:CB:5F:26:62:A9:D9:14:EC:13:0E:78:B4:A2:0B:86:14:59:CE
CA:89:C1:BC:2A:60:74:7F:A0:01:8D:0F:9C:7F:A7:C0:65:FE:2E:16
X509v3 Key Usage: critical
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Client Authentication, E-mail Protection
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:44:02:20:6b:33:e9:a6:35:fa:9c:26:06:2a:e8:2d:35:ed:
72:e3:90:b5:eb:c1:9b:7f:51:bc:ad:66:4a:de:37:c2:92:0c:
02:20:69:9a:6a:e8:84:8f:2c:51:00:71:37:d9:a3:66:ba:11:
d2:aa:e7:86:82:99:f5:4b:61:c7:0c:6d:c1:a3:2d:71
30:45:02:20:23:ee:ff:ab:e8:12:ab:b7:9b:eb:f6:25:8a:48:
7c:93:49:9b:8c:ff:2a:ce:1b:3d:3a:33:36:e4:5a:88:aa:0e:
02:21:00:e1:78:77:ef:05:f4:53:a4:9b:2a:18:a2:5c:13:e6:
f4:5d:88:1b:8e:bc:70:c6:eb:a8:1d:b9:bc:c0:5d:9e:6f
-----BEGIN CERTIFICATE-----
MIIDajCCAxGgAwIBAgIUMqDLXyZiqdkU7BMOeLSiC4YUWc4wCgYIKoZIzj0EAwIw
MIICoTCCAkegAwIBAgIUPyynS1OykUIaqdAE4eYWmcYJn9wwCgYIKoZIzj0EAwIw
gZkxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdT
ZWF0dGxlMREwDwYDVQQKDAhFbGxpcHRpYzEVMBMGA1UECwwMRUNDMjU2SzEtQ0xJ
MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9A
d29sZnNzbC5jb20wHhcNMjQxMjE4MjEyNTI5WhcNMzQxMjE2MjEyNTI5WjCBmTEL
d29sZnNzbC5jb20wHhcNMjUxMTEzMjA0MTA3WhcNMzUxMTExMjA0MTA3WjCBmTEL
MAkGA1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0
bGUxETAPBgNVBAoMCEVsbGlwdGljMRUwEwYDVQQLDAxFQ0MyNTZLMS1DTEkxGDAW
BgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xm
c3NsLmNvbTBWMBAGByqGSM49AgEGBSuBBAAKA0IABAJVLyWQnVTTbiO1lZ5no/jC
RjrtZ1ZtI4dD22845ltyB40d+Fvqt0dJqY7HLSOZni6MvnLeC9PwtEktlOxtwj+j
ggE2MIIBMjAJBgNVHRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIFoDAdBgNVHQ4EFgQU
lsR/MaKQuGjxnN11FlLbrAS2iYUwgcMGA1UdIwSBuzCBuKGBn6SBnDCBmTELMAkG
A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
ETAPBgNVBAoMCEVsbGlwdGljMRUwEwYDVQQLDAxFQ0MyNTZLMS1DTEkxGDAWBgNV
BAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3Ns
LmNvbYIUMqDLXyZiqdkU7BMOeLSiC4YUWc4wDgYDVR0PAQH/BAQDAgXgMB0GA1Ud
JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDBDAKBggqhkjOPQQDAgNHADBEAiBrM+mm
NfqcJgYq6C017XLjkLXrwZt/UbytZkreN8KSDAIgaZpq6ISPLFEAcTfZo2a6EdKq
54aCmfVLYccMbcGjLXE=
c3NsLmNvbTBWMBAGByqGSM49AgEGBSuBBAAKA0IABP/3xdu5hLBOnJOOcxQ9Sbtg
Nst5wG0RtradWhqd6cWrxPAhWtH5FQsXYjz7oVTfjwXCrhC4IGhmOrpQHfLk+26j
bjBsMAkGA1UdEwQCMAAwEQYJYIZIAYb4QgEBBAQDAgWgMB0GA1UdDgQWBBTKicG8
KmB0f6ABjQ+cf6fAZf4uFjAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYIKwYB
BQUHAwIGCCsGAQUFBwMEMAoGCCqGSM49BAMCA0gAMEUCICPu/6voEqu3m+v2JYpI
fJNJm4z/Ks4bPTozNuRaiKoOAiEA4Xh37wX0U6SbKhiiXBPm9F2IG468cMbrqB25
vMBdnm8=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,5 +1,5 @@
-----BEGIN EC PRIVATE KEY-----
MHQCAQEEIENIEXXZ7INNmsEwYBs9wnbYqf1pM7NaX2OHwtgCxUkFoAcGBSuBBAAK
oUQDQgAEAlUvJZCdVNNuI7WVnmej+MJGOu1nVm0jh0PbbzjmW3IHjR34W+q3R0mp
jsctI5meLoy+ct4L0/C0SS2U7G3CPw==
MHQCAQEEICq79KoTdNQsjNFlGucr8mBM8iZpqh37pcYesOouUo5FoAcGBSuBBAAK
oUQDQgAE//fF27mEsE6ck45zFD1Ju2A2y3nAbRG2tp1aGp3pxavE8CFa0fkVCxdi
PPuhVN+PBcKuELggaGY6ulAd8uT7bg==
-----END EC PRIVATE KEY-----

Binary file not shown.

View File

@@ -2,22 +2,22 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:f4:6e:6b:ab:9b:33:2b:43:38:96:b8:da:52:a8:be:be:01:87:d9
3d:7f:18:ec:d5:2b:42:ac:d1:46:a0:dc:1b:ea:72:97:58:c4:b4:24
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256BPR1-SRV, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256BPR1-SRV, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Dec 16 21:25:29 2034 GMT
Subject: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256BPR1-SRV, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:07 2025 GMT
Not After : Nov 11 20:41:07 2035 GMT
Subject: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256BPR1-SRV, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:80:8b:2d:57:af:9d:00:f6:cf:e5:dd:fb:1f:5a:
69:c7:d3:1e:d1:16:20:16:e0:53:da:33:70:22:e2:
ee:ee:f3:89:d2:a4:e6:77:6a:22:a0:b2:d4:e2:d5:
15:09:5f:f1:bd:cd:99:3d:51:e3:ae:5d:96:85:92:
bf:5b:1c:2b:66
04:25:94:17:79:b7:86:02:87:b1:1e:54:d7:ec:e9:
ff:e7:ec:08:f0:29:f4:31:fc:5b:1b:b5:82:ea:56:
27:f6:11:57:72:ca:48:39:52:fb:dd:12:d2:7b:9a:
1c:f2:79:d1:14:01:b1:ee:a6:a2:75:0d:6b:7a:dd:
21:d2:5f:b9:e2
ASN1 OID: brainpoolP256r1
X509v3 extensions:
X509v3 Basic Constraints:
@@ -25,38 +25,38 @@ Certificate:
Netscape Cert Type:
SSL Server
X509v3 Subject Key Identifier:
BF:13:B7:26:16:A8:18:A2:A9:CC:FC:5E:9E:9E:5B:39:CB:08:CE:68
3B:51:FD:4B:70:B2:7C:29:5D:02:1A:AE:A4:76:EF:47:8A:A9:52:30
X509v3 Authority Key Identifier:
DirName:/C=US/ST=Washington/L=Seattle/O=Elliptic/OU=ECC256BPR1-SRV/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:1E:F4:6E:6B:AB:9B:33:2B:43:38:96:B8:DA:52:A8:BE:BE:01:87:D9
serial:3D:7F:18:EC:D5:2B:42:AC:D1:46:A0:DC:1B:EA:72:97:58:C4:B4:24
X509v3 Key Usage: critical
Digital Signature, Key Encipherment, Key Agreement
X509v3 Extended Key Usage:
TLS Web Server Authentication
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:44:02:20:50:28:2b:f6:4a:d1:8d:3c:e8:c7:78:ea:84:47:
b7:5a:01:2b:64:5b:3a:a1:c0:1d:58:d0:d2:5b:7d:2c:28:ad:
02:20:23:1a:d7:b1:8a:a8:dd:02:00:b6:ba:e6:16:2b:c8:7d:
bc:86:ad:30:fe:a6:cf:de:7f:90:90:75:51:25:15:42
30:44:02:20:54:12:76:29:9a:88:25:a4:d9:6e:53:6a:59:86:
7b:3b:b1:0b:ac:9c:48:e4:f4:f2:c2:5d:c6:d6:b4:39:c4:36:
02:20:6c:61:78:1a:8d:a2:32:d7:d2:a0:e1:25:5f:2b:ed:0a:
b8:62:f5:f7:ff:ba:c9:bf:6d:29:b4:0f:06:ff:c2:82
-----BEGIN CERTIFICATE-----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Zm9Ad29sZnNzbC5jb22CFD1/GOzVK0Ks0Uag3BvqcpdYxLQkMA4GA1UdDwEB/wQE
AwIDqDATBgNVHSUEDDAKBggrBgEFBQcDATAKBggqhkjOPQQDAgNHADBEAiBUEnYp
moglpNluU2pZhns7sQusnEjk9PLCXcbWtDnENgIgbGF4Go2iMtfSoOElXyvtCrhi
9ff/usm/bSm0Dwb/woI=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,22 +2,22 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:c0:65:74:8e:a6:d5:04:7c:9a:d9:85:cc:ce:58:c5:a0:2f:56:62
5e:94:ed:44:ba:a5:6e:cb:83:c1:b4:84:73:b2:2a:59:55:b4:dd:ea
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256K1-SRV, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256K1-SRV, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Dec 16 21:25:29 2034 GMT
Subject: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = ECC256K1-SRV, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:07 2025 GMT
Not After : Nov 11 20:41:07 2035 GMT
Subject: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=ECC256K1-SRV, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:02:55:2f:25:90:9d:54:d3:6e:23:b5:95:9e:67:
a3:f8:c2:46:3a:ed:67:56:6d:23:87:43:db:6f:38:
e6:5b:72:07:8d:1d:f8:5b:ea:b7:47:49:a9:8e:c7:
2d:23:99:9e:2e:8c:be:72:de:0b:d3:f0:b4:49:2d:
94:ec:6d:c2:3f
04:ff:f7:c5:db:b9:84:b0:4e:9c:93:8e:73:14:3d:
49:bb:60:36:cb:79:c0:6d:11:b6:b6:9d:5a:1a:9d:
e9:c5:ab:c4:f0:21:5a:d1:f9:15:0b:17:62:3c:fb:
a1:54:df:8f:05:c2:ae:10:b8:20:68:66:3a:ba:50:
1d:f2:e4:fb:6e
ASN1 OID: secp256k1
X509v3 extensions:
X509v3 Basic Constraints:
@@ -25,38 +25,38 @@ Certificate:
Netscape Cert Type:
SSL Server
X509v3 Subject Key Identifier:
96:C4:7F:31:A2:90:B8:68:F1:9C:DD:75:16:52:DB:AC:04:B6:89:85
CA:89:C1:BC:2A:60:74:7F:A0:01:8D:0F:9C:7F:A7:C0:65:FE:2E:16
X509v3 Authority Key Identifier:
DirName:/C=US/ST=Washington/L=Seattle/O=Elliptic/OU=ECC256K1-SRV/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:77:C0:65:74:8E:A6:D5:04:7C:9A:D9:85:CC:CE:58:C5:A0:2F:56:62
serial:5E:94:ED:44:BA:A5:6E:CB:83:C1:B4:84:73:B2:2A:59:55:B4:DD:EA
X509v3 Key Usage: critical
Digital Signature, Key Encipherment, Key Agreement
X509v3 Extended Key Usage:
TLS Web Server Authentication
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:44:02:20:4d:6a:2a:ca:e3:0b:08:8b:8d:70:d9:0c:e2:83:
4e:7e:83:e4:07:f6:3b:68:4e:00:aa:cd:65:c2:12:09:44:af:
02:20:4a:03:b6:5d:6e:51:2a:42:a0:54:57:a1:07:05:db:c8:
2a:bf:5b:6c:7c:c6:0f:64:b2:2d:64:9d:25:3b:a3:7a
30:45:02:20:24:19:ac:2a:63:39:0b:73:a1:29:71:9c:fd:a9:
e1:6a:0b:28:f5:ef:a6:9d:f6:3b:95:ef:e8:b7:d3:e1:da:96:
02:21:00:cc:cc:5c:e7:41:11:40:de:5e:7c:75:47:ab:53:16:
c4:1a:54:54:66:3e:72:a1:29:82:2a:7f:7c:b9:56:fe:c8
-----BEGIN CERTIFICATE-----
MIIDYDCCAwegAwIBAgIUd8BldI6m1QR8mtmFzM5YxaAvVmIwCgYIKoZIzj0EAwIw
MIIDYTCCAwegAwIBAgIUXpTtRLqlbsuDwbSEc7IqWVW03eowCgYIKoZIzj0EAwIw
gZkxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdT
ZWF0dGxlMREwDwYDVQQKDAhFbGxpcHRpYzEVMBMGA1UECwwMRUNDMjU2SzEtU1JW
MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9A
d29sZnNzbC5jb20wHhcNMjQxMjE4MjEyNTI5WhcNMzQxMjE2MjEyNTI5WjCBmTEL
d29sZnNzbC5jb20wHhcNMjUxMTEzMjA0MTA3WhcNMzUxMTExMjA0MTA3WjCBmTEL
MAkGA1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0
bGUxETAPBgNVBAoMCEVsbGlwdGljMRUwEwYDVQQLDAxFQ0MyNTZLMS1TUlYxGDAW
BgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xm
c3NsLmNvbTBWMBAGByqGSM49AgEGBSuBBAAKA0IABAJVLyWQnVTTbiO1lZ5no/jC
RjrtZ1ZtI4dD22845ltyB40d+Fvqt0dJqY7HLSOZni6MvnLeC9PwtEktlOxtwj+j
c3NsLmNvbTBWMBAGByqGSM49AgEGBSuBBAAKA0IABP/3xdu5hLBOnJOOcxQ9Sbtg
Nst5wG0RtradWhqd6cWrxPAhWtH5FQsXYjz7oVTfjwXCrhC4IGhmOrpQHfLk+26j
ggEsMIIBKDAJBgNVHRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIGQDAdBgNVHQ4EFgQU
lsR/MaKQuGjxnN11FlLbrAS2iYUwgcMGA1UdIwSBuzCBuKGBn6SBnDCBmTELMAkG
yonBvCpgdH+gAY0PnH+nwGX+LhYwgcMGA1UdIwSBuzCBuKGBn6SBnDCBmTELMAkG
A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
ETAPBgNVBAoMCEVsbGlwdGljMRUwEwYDVQQLDAxFQ0MyNTZLMS1TUlYxGDAWBgNV
BAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3Ns
LmNvbYIUd8BldI6m1QR8mtmFzM5YxaAvVmIwDgYDVR0PAQH/BAQDAgOoMBMGA1Ud
JQQMMAoGCCsGAQUFBwMBMAoGCCqGSM49BAMCA0cAMEQCIE1qKsrjCwiLjXDZDOKD
Tn6D5Af2O2hOAKrNZcISCUSvAiBKA7ZdblEqQqBUV6EHBdvIKr9bbHzGD2SyLWSd
JTujeg==
LmNvbYIUXpTtRLqlbsuDwbSEc7IqWVW03eowDgYDVR0PAQH/BAQDAgOoMBMGA1Ud
JQQMMAoGCCsGAQUFBwMBMAoGCCqGSM49BAMCA0gAMEUCICQZrCpjOQtzoSlxnP2p
4WoLKPXvpp32O5Xv6LfT4dqWAiEAzMxc50ERQN5efHVHq1MWxBpUVGY+cqEpgip/
fLlW/sg=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
53:b3:3c:3a:8b:78:70:b3:e6:c0:05:5d:7c:3e:55:48:a7:5e:4e:eb
6c:c7:a1:38:09:ec:f3:18:37:d4:bc:c6:14:0e:d8:6e:94:ab:9a:07
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = SECP256K1, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=SECP256K1, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:29 2024 GMT
Not After : Dec 16 21:25:29 2034 GMT
Subject: C = US, ST = Washington, L = Seattle, O = Elliptic, OU = SECP256K1-SVR, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:08 2025 GMT
Not After : Nov 11 20:41:08 2035 GMT
Subject: C=US, ST=Washington, L=Seattle, O=Elliptic, OU=SECP256K1-SVR, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
@@ -27,37 +27,37 @@ Certificate:
X509v3 Subject Key Identifier:
F4:A3:FD:34:57:E6:51:1F:0A:96:2F:F0:87:A9:7C:C7:EB:6B:34:8F
X509v3 Authority Key Identifier:
keyid:7E:69:FB:C0:51:CF:2D:4C:30:CB:D8:D9:58:73:8E:CB:64:34:09:9D
keyid:40:E2:00:DB:F0:F8:F7:06:23:50:4D:F9:89:1D:29:72:73:65:76:3B
DirName:/C=US/ST=Washington/L=Seattle/O=Elliptic/OU=SECP256K1/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:51:CF:51:A4:FE:AF:D5:61:0E:CD:98:C4:B6:BE:07:73:97:9A:44:96
serial:3E:32:66:BB:6A:91:90:98:9F:D6:7B:80:61:B5:A7:5F:86:84:83:17
X509v3 Key Usage: critical
Digital Signature, Key Encipherment, Key Agreement
X509v3 Extended Key Usage:
TLS Web Server Authentication
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:45:02:21:00:b5:91:fd:1b:d2:bf:2c:c4:5c:a7:8b:48:5b:
88:b3:43:ed:8a:68:48:16:03:51:a2:01:67:42:5f:ad:5b:9c:
cc:02:20:4f:7a:e1:38:57:5c:c1:83:19:14:57:ad:40:34:70:
8d:20:ac:e3:eb:f3:d7:b8:57:d1:d1:17:a0:c2:02:bf:49
30:44:02:20:77:c4:6e:97:5a:c7:de:1d:fd:89:fe:13:56:14:
b5:e2:67:f7:e6:4d:f4:d0:4f:ae:9b:83:d4:83:30:88:0c:85:
02:20:79:27:45:ed:df:0b:e2:e5:36:2c:83:b1:1b:61:61:23:
02:08:07:46:aa:84:61:65:ad:92:6f:79:56:f7:80:b3
-----BEGIN CERTIFICATE-----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AQkBFhBpbmZvQHdvbGZzc2wuY29tghQ+Mma7apGQmJ/We4BhtadfhoSDFzAOBgNV
HQ8BAf8EBAMCA6gwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCgYIKoZIzj0EAwIDRwAw
RAIgd8Rul1rH3h39if4TVhS14mf35k300E+um4PUgzCIDIUCIHknRe3fC+LlNiyD
sRthYSMCCAdGqoRhZa2Sb3lW94Cz
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -3,11 +3,11 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED25519
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed25519, OU = Root-Ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed25519, OU=Root-Ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = CA-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:21 2025 GMT
Not After : Aug 9 20:41:21 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=CA-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED25519
ED25519 Public-Key:
@@ -26,22 +26,22 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ED25519
Signature Value:
44:eb:38:c6:27:d4:70:42:3f:9b:a0:d7:90:96:d6:6e:42:38:
5b:38:38:9f:21:ca:b0:fa:5e:7c:17:b4:32:5c:b3:08:a2:65:
50:d7:65:6b:f8:a9:ef:0d:d1:54:2d:4d:b6:0f:42:9e:51:f7:
db:a7:bf:16:23:c4:bd:7d:c9:03
1e:61:1f:86:1b:c4:12:f4:30:8a:58:c0:ea:34:f3:8a:62:16:
95:0b:9f:9d:a3:da:74:97:f4:d0:f6:c6:20:0a:5d:a9:22:37:
d1:a6:2c:e1:fb:36:c6:d5:91:21:bc:84:47:5f:e2:f1:f1:1e:
39:57:90:53:f1:0b:34:95:ce:06
-----BEGIN CERTIFICATE-----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DgYDVR0PAQH/BAQDAgGGMAUGAytlcANBAB5hH4YbxBL0MIpYwOo084piFpULn52j
2nSX9ND2xiAKXakiN9GmLOH7NsbVkSG8hEdf4vHxHjlXkFPxCzSVzgY=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
33:8b:57:d5:8e:84:67:6a:e1:ed:f2:b9:11:16:5e:12:e5:0c:78:8a
2f:d3:07:63:92:9a:cc:e9:6a:f8:70:f9:49:58:e5:dc:cc:29:d0:c0
Signature Algorithm: ED25519
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = Client-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=Client-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = Client-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:21 2025 GMT
Not After : Aug 9 20:41:21 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=Client-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED25519
ED25519 Public-Key:
@@ -22,7 +22,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:FE:41:5E:3E:81:E2:2E:46:B3:3E:47:89:90:D4:C2:B4:8E:11:D6:8A
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_ed25519/OU=Client-ed25519/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/UID=wolfSSL
serial:33:8B:57:D5:8E:84:67:6A:E1:ED:F2:B9:11:16:5E:12:E5:0C:78:8A
serial:2F:D3:07:63:92:9A:CC:E9:6A:F8:70:F9:49:58:E5:DC:CC:29:D0:C0
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -31,17 +31,17 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: ED25519
Signature Value:
aa:c7:bd:8e:56:40:ab:7d:9c:55:f0:4d:1d:97:e9:03:62:11:
ca:51:ad:80:cf:1a:2c:2c:5b:2d:71:fe:db:1d:4b:cd:4b:8b:
2d:12:f7:01:ee:fb:7d:2e:21:fc:81:de:84:59:c8:a5:1e:92:
e3:21:58:d1:3e:8a:71:91:2d:0e
70:a6:6f:42:d3:08:af:7f:29:25:9c:e2:70:a0:ae:1c:07:05:
bc:47:5f:9a:14:e0:c5:fa:10:2a:86:45:36:e2:0f:55:fa:d0:
ea:92:cd:44:be:8c:df:95:fe:5c:34:32:a9:da:d3:92:0d:24:
28:b4:3a:c5:eb:1a:c3:42:43:00
-----BEGIN CERTIFICATE-----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@@ -51,9 +51,9 @@ EdaKMIH4BgNVHSMEgfAwge2AFP5BXj6B4i5Gsz5HiZDUwrSOEdaKoYG+pIG7MIG4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A0EAcKZvQtMIr38pJZzicKCuHAcFvEdfmhTgxfoQKoZFNuIPVfrQ6pLNRL6M35X+
XDQyqdrTkg0kKLQ6xesaw0JDAA==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
24:49:82:ee:d6:ad:c6:2d:77:b7:10:9e:f9:64:56:16:d3:04:0f:16
77:4a:83:05:a3:0d:1c:97:29:60:a1:93:d1:8d:ee:70:22:92:af:a0
Signature Algorithm: ED25519
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed25519, OU = Root-Ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed25519, OU=Root-Ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed25519, OU = Root-Ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:20 2025 GMT
Not After : Aug 9 20:41:20 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed25519, OU=Root-Ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: ED25519
ED25519 Public-Key:
@@ -27,22 +27,22 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ED25519
Signature Value:
99:de:96:76:e3:07:21:03:11:a3:e6:98:77:3d:cc:e6:db:a2:
96:67:26:f0:2b:26:eb:54:d5:11:e3:9e:a7:e6:aa:73:1e:c5:
58:92:72:7d:ac:1b:e0:99:2a:46:ea:a2:55:d5:4f:92:a2:32:
1d:fc:fc:5c:07:3c:0c:0d:79:0a
91:6c:ff:30:71:76:08:48:9f:8b:1f:98:66:d9:fa:47:3e:d0:
65:65:ac:7c:ff:41:97:38:b5:09:f6:f9:81:19:57:51:15:df:
da:d5:65:c5:2d:91:7c:32:da:ee:ef:5f:f8:9c:cf:f5:b1:34:
b5:bd:ef:f7:8b:74:26:f4:e8:0f
-----BEGIN CERTIFICATE-----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HQ8BAf8EBAMCAYYwBQYDK2VwA0EAkWz/MHF2CEifix+YZtn6Rz7QZWWsfP9Blzi1
Cfb5gRlXURXf2tVlxS2RfDLa7u9f+JzP9bE0tb3v94t0JvToDw==
-----END CERTIFICATE-----

View File

@@ -3,11 +3,11 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED25519
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = CA-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=CA-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = Server-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:21 2025 GMT
Not After : Aug 9 20:41:21 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=Server-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED25519
ED25519 Public-Key:
@@ -30,16 +30,16 @@ Certificate:
SSL Server
Signature Algorithm: ED25519
Signature Value:
04:19:32:e4:24:e5:df:5a:a4:19:c4:31:15:81:05:4c:45:0a:
40:4a:5d:6a:8b:0a:77:02:fe:48:82:d2:83:8d:de:42:b8:cf:
02:dc:64:2c:bd:8c:9d:22:16:d8:7a:23:65:5d:b0:25:92:ac:
a8:6c:de:df:1d:eb:64:e4:8a:06
c6:bb:af:0b:c5:89:95:38:65:e8:f0:53:17:15:32:3c:54:80:
1a:97:8f:23:5b:9f:7c:20:23:d1:ed:4d:8f:f6:c5:fa:e6:20:
f1:84:a9:93:3f:fd:84:8c:e1:70:83:cf:fc:d0:c4:e2:3e:50:
53:21:03:f2:8c:5c:a2:1e:3d:08
-----BEGIN CERTIFICATE-----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@@ -47,7 +47,7 @@ aW5mb0B3b2xmc3NsLmNvbTEXMBUGCgmSJomT8ixkAQEMB3dvbGZTU0wwKjAFBgMr
ZXADIQAjqk1gUOAT0zrtq/apzEr+100v0lsaEAXvWkElzhtTeKOBiTCBhjAdBgNV
HQ4EFgQUoymB55BvuWD4r8wVeq7XofS0hrowHwYDVR0jBBgwFoAUdNU4GV6DuQP4
AYo1NbuJTEm0I+kwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCA6gwEwYDVR0l
BAwwCgYIKwYBBQUHAwEwEQYJYIZIAYb4QgEBBAQDAgZAMAUGAytlcANBAAQZMuQk
5d9apBnEMRWBBUxFCkBKXWqLCncC/kiC0oON3kK4zwLcZCy9jJ0iFth6I2VdsCWS
rKhs3t8d62TkigY=
BAwwCgYIKwYBBQUHAwEwEQYJYIZIAYb4QgEBBAQDAgZAMAUGAytlcANBAMa7rwvF
iZU4ZejwUxcVMjxUgBqXjyNbn3wgI9HtTY/2xfrmIPGEqZM//YSM4XCDz/zQxOI+
UFMhA/KMXKIePQg=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -3,11 +3,11 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED25519
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = CA-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=CA-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = Server-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:21 2025 GMT
Not After : Aug 9 20:41:21 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=Server-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED25519
ED25519 Public-Key:
@@ -30,16 +30,16 @@ Certificate:
SSL Server
Signature Algorithm: ED25519
Signature Value:
04:19:32:e4:24:e5:df:5a:a4:19:c4:31:15:81:05:4c:45:0a:
40:4a:5d:6a:8b:0a:77:02:fe:48:82:d2:83:8d:de:42:b8:cf:
02:dc:64:2c:bd:8c:9d:22:16:d8:7a:23:65:5d:b0:25:92:ac:
a8:6c:de:df:1d:eb:64:e4:8a:06
c6:bb:af:0b:c5:89:95:38:65:e8:f0:53:17:15:32:3c:54:80:
1a:97:8f:23:5b:9f:7c:20:23:d1:ed:4d:8f:f6:c5:fa:e6:20:
f1:84:a9:93:3f:fd:84:8c:e1:70:83:cf:fc:d0:c4:e2:3e:50:
53:21:03:f2:8c:5c:a2:1e:3d:08
-----BEGIN CERTIFICATE-----
MIICpzCCAlmgAwIBAgIBATAFBgMrZXAwgbQxCzAJBgNVBAYTAlVTMRAwDgYDVQQI
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRgwFgYDVQQKDA93b2xmU1NMX2Vk
MjU1MTkxEzARBgNVBAsMCkNBLWVkMjU1MTkxGDAWBgNVBAMMD3d3dy53b2xmc3Ns
LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTEXMBUGCgmSJomT
8ixkAQEMB3dvbGZTU0wwHhcNMjQxMjE4MjEyNTMwWhcNMjcwOTE0MjEyNTMwWjCB
8ixkAQEMB3dvbGZTU0wwHhcNMjUxMTEzMjA0MTIxWhcNMjgwODA5MjA0MTIxWjCB
uDELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVt
YW4xGDAWBgNVBAoMD3dvbGZTU0xfZWQyNTUxOTEXMBUGA1UECwwOU2VydmVyLWVk
MjU1MTkxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQ
@@ -47,20 +47,20 @@ aW5mb0B3b2xmc3NsLmNvbTEXMBUGCgmSJomT8ixkAQEMB3dvbGZTU0wwKjAFBgMr
ZXADIQAjqk1gUOAT0zrtq/apzEr+100v0lsaEAXvWkElzhtTeKOBiTCBhjAdBgNV
HQ4EFgQUoymB55BvuWD4r8wVeq7XofS0hrowHwYDVR0jBBgwFoAUdNU4GV6DuQP4
AYo1NbuJTEm0I+kwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCA6gwEwYDVR0l
BAwwCgYIKwYBBQUHAwEwEQYJYIZIAYb4QgEBBAQDAgZAMAUGAytlcANBAAQZMuQk
5d9apBnEMRWBBUxFCkBKXWqLCncC/kiC0oON3kK4zwLcZCy9jJ0iFth6I2VdsCWS
rKhs3t8d62TkigY=
BAwwCgYIKwYBBQUHAwEwEQYJYIZIAYb4QgEBBAQDAgZAMAUGAytlcANBAMa7rwvF
iZU4ZejwUxcVMjxUgBqXjyNbn3wgI9HtTY/2xfrmIPGEqZM//YSM4XCDz/zQxOI+
UFMhA/KMXKIePQg=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED25519
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed25519, OU = Root-Ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed25519, OU=Root-Ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed25519, OU = CA-ed25519, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:21 2025 GMT
Not After : Aug 9 20:41:21 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed25519, OU=CA-ed25519, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED25519
ED25519 Public-Key:
@@ -79,22 +79,22 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ED25519
Signature Value:
44:eb:38:c6:27:d4:70:42:3f:9b:a0:d7:90:96:d6:6e:42:38:
5b:38:38:9f:21:ca:b0:fa:5e:7c:17:b4:32:5c:b3:08:a2:65:
50:d7:65:6b:f8:a9:ef:0d:d1:54:2d:4d:b6:0f:42:9e:51:f7:
db:a7:bf:16:23:c4:bd:7d:c9:03
1e:61:1f:86:1b:c4:12:f4:30:8a:58:c0:ea:34:f3:8a:62:16:
95:0b:9f:9d:a3:da:74:97:f4:d0:f6:c6:20:0a:5d:a9:22:37:
d1:a6:2c:e1:fb:36:c6:d5:91:21:bc:84:47:5f:e2:f1:f1:1e:
39:57:90:53:f1:0b:34:95:ce:06
-----BEGIN CERTIFICATE-----
MIICZTCCAhegAwIBAgIBATAFBgMrZXAwgZ0xCzAJBgNVBAYTAlVTMRAwDgYDVQQI
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRgwFgYDVQQKDA93b2xmU1NMX0Vk
MjU1MTkxFTATBgNVBAsMDFJvb3QtRWQyNTUxOTEYMBYGA1UEAwwPd3d3LndvbGZz
c2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMB4XDTI0MTIx
ODIxMjUzMFoXDTI3MDkxNDIxMjUzMFowgbQxCzAJBgNVBAYTAlVTMRAwDgYDVQQI
c2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMB4XDTI1MTEx
MzIwNDEyMVoXDTI4MDgwOTIwNDEyMVowgbQxCzAJBgNVBAYTAlVTMRAwDgYDVQQI
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRgwFgYDVQQKDA93b2xmU1NMX2Vk
MjU1MTkxEzARBgNVBAsMCkNBLWVkMjU1MTkxGDAWBgNVBAMMD3d3dy53b2xmc3Ns
LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTEXMBUGCgmSJomT
8ixkAQEMB3dvbGZTU0wwKjAFBgMrZXADIQBCO3r5gs/53xnd8/AyKW36/XZPaMLC
4GxHrsJVaKwNTaNjMGEwHQYDVR0OBBYEFHTVOBleg7kD+AGKNTW7iUxJtCPpMB8G
A1UdIwQYMBaAFPq6W3Yd8R0dTXRI2Jg7Vu+zFPPeMA8GA1UdEwEB/wQFMAMBAf8w
DgYDVR0PAQH/BAQDAgGGMAUGAytlcANBAETrOMYn1HBCP5ug15CW1m5COFs4OJ8h
yrD6XnwXtDJcswiiZVDXZWv4qe8N0VQtTbYPQp5R99unvxYjxL19yQM=
DgYDVR0PAQH/BAQDAgGGMAUGAytlcANBAB5hH4YbxBL0MIpYwOo084piFpULn52j
2nSX9ND2xiAKXakiN9GmLOH7NsbVkSG8hEdf4vHxHjlXkFPxCzSVzgY=
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -3,11 +3,11 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED448
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed448, OU = Root-Ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed448, OU=Root-Ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = CA-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:22 2025 GMT
Not After : Aug 9 20:41:22 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=CA-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED448
ED448 Public-Key:
@@ -27,27 +27,27 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ED448
Signature Value:
cd:f6:7e:99:b5:a0:0c:c3:38:25:38:54:42:51:57:19:5b:a2:
89:c5:f2:71:e2:3b:62:93:e9:08:54:ae:e0:89:c0:e8:d8:2f:
9c:dc:38:f7:80:dc:ca:f3:2f:55:63:70:7a:fe:e8:b2:90:62:
03:22:00:34:1a:9e:0f:f0:43:14:a2:f3:b6:98:19:0a:fd:83:
86:18:bb:87:2d:08:a3:93:d1:df:c8:15:7f:59:4b:8b:5e:23:
eb:f6:61:d4:b8:1f:91:7d:10:4b:68:02:d9:05:1d:6f:23:87:
d1:68:1b:71:19:00
71:3f:d1:28:33:07:d1:3b:83:b9:23:62:64:ea:6d:d6:c1:cc:
fc:3f:4c:76:95:b0:d2:16:1c:31:b9:71:14:a5:9d:62:71:f9:
3c:40:c7:dc:65:ff:85:65:82:fa:9d:1b:39:ea:d4:c6:3f:09:
2b:dc:80:ad:a4:0c:61:b2:85:fe:e5:b2:f3:c3:07:a4:a8:db:
9a:f0:c5:d5:a3:9d:8d:9f:60:5a:37:27:4e:07:52:33:1a:53:
84:84:96:44:4f:4e:b0:0b:13:c1:85:95:58:c7:10:f1:a4:1d:
09:07:a2:b7:0a:00
-----BEGIN CERTIFICATE-----
MIICqDCCAiigAwIBAgIBATAFBgMrZXEwgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQI
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRYwFAYDVQQKDA13b2xmU1NMX0Vk
NDQ4MRMwEQYDVQQLDApSb290LUVkNDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5j
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjQxMjE4MjEy
NTMwWhcNMjcwOTE0MjEyNTMwWjCBsDELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01v
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjUxMTEzMjA0
MTIyWhcNMjgwODA5MjA0MTIyWjCBsDELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01v
bnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFjAUBgNVBAoMDXdvbGZTU0xfZWQ0NDgx
ETAPBgNVBAsMCENBLWVkNDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAd
BgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20xFzAVBgoJkiaJk/IsZAEBDAd3
b2xmU1NMMEMwBQYDK2VxAzoADuK0duXSzMJLe7ApvpL7w69ppZS6cCToo+/IY5rd
pq9YQzgEJPAQkb6nAZFU889phUy5l4ykN6oAo2MwYTAdBgNVHQ4EFgQUOFlF6N1E
LLV9pSXWC8w58HLAlGMwHwYDVR0jBBgwFoAU2mmYySZKdftZXlOaY0sMuIgLDx4w
DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwBQYDK2VxA3MAzfZ+mbWg
DMM4JThUQlFXGVuiicXyceI7YpPpCFSu4InA6NgvnNw494DcyvMvVWNwev7ospBi
AyIANBqeD/BDFKLztpgZCv2Dhhi7hy0Io5PR38gVf1lLi14j6/Zh1LgfkX0QS2gC
2QUdbyOH0WgbcRkA
DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwBQYDK2VxA3MAcT/RKDMH
0TuDuSNiZOpt1sHM/D9MdpWw0hYcMblxFKWdYnH5PEDH3GX/hWWC+p0bOerUxj8J
K9yAraQMYbKF/uWy88MHpKjbmvDF1aOdjZ9gWjcnTgdSMxpThISWRE9OsAsTwYWV
WMcQ8aQdCQeitwoA
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
73:8f:b3:50:d4:5c:05:36:fc:af:03:ad:08:30:9a:a6:be:3e:b3:02
26:2c:dc:83:c8:d9:9a:ea:83:7a:08:3c:55:f1:73:ac:6f:02:57:4b
Signature Algorithm: ED448
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = Client-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=Client-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = Client-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:23 2025 GMT
Not After : Aug 9 20:41:23 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=Client-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED448
ED448 Public-Key:
@@ -23,7 +23,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:F3:C7:66:93:0D:CB:0E:1B:80:08:00:CF:E3:4E:11:4D:58:2B:4B:D4
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_ed448/OU=Client-ed448/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/UID=wolfSSL
serial:73:8F:B3:50:D4:5C:05:36:FC:AF:03:AD:08:30:9A:A6:BE:3E:B3:02
serial:26:2C:DC:83:C8:D9:9A:EA:83:7A:08:3C:55:F1:73:AC:6F:02:57:4B
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
@@ -32,20 +32,20 @@ Certificate:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: ED448
Signature Value:
02:3d:3e:a4:b8:6d:d3:ba:4c:d2:e4:07:44:92:c6:94:94:ea:
b5:d7:6a:40:e8:d5:6f:f7:67:51:e9:50:b1:66:96:36:3b:5d:
3a:6c:99:3c:8f:24:1c:d1:c4:e5:0a:50:98:7b:41:be:d5:8b:
a3:28:00:95:87:a2:a8:d8:85:50:0d:3c:5b:9c:fb:96:62:60:
ab:c0:a8:23:c3:5f:6b:e6:c5:27:e7:e4:ad:fa:3d:d9:ee:3a:
d1:f5:09:28:19:2e:85:57:b1:01:32:e3:61:3f:bc:2f:00:3a:
d8:bf:77:d9:03:00
d2:25:1a:34:d8:5a:5b:f8:c9:6b:37:82:e7:3b:e9:1b:3c:5a:
df:42:7b:0d:03:a3:98:3d:9c:09:80:c0:ae:8e:92:00:c7:6d:
95:1e:4f:57:bd:66:8a:a4:e1:ef:4f:99:db:6f:3e:6c:9f:d2:
97:5b:00:e3:cd:63:34:19:68:c5:b7:26:a0:fd:86:f8:91:67:
3d:33:af:24:cd:37:1a:bf:38:06:2c:23:90:59:5b:08:0b:c0:
e4:94:f9:fe:8b:b4:b4:86:75:a9:8e:36:5b:79:cd:c1:ec:d0:
5f:5c:d5:86:3c:00
-----BEGIN CERTIFICATE-----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@@ -56,9 +56,9 @@ VzXIdrOzMI+HeOYmWifYDDieezwTL8ykKWyA74CjggFlMIIBYTAdBgNVHQ4EFgQU
MRAwDgYDVQQHDAdCb3plbWFuMRYwFAYDVQQKDA13b2xmU1NMX2VkNDQ4MRUwEwYD
VQQLDAxDbGllbnQtZWQ0NDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0G
CSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTEXMBUGCgmSJomT8ixkAQEMB3dv
bGZTU0yCFHOPs1DUXAU2/K8DrQgwmqa+PrMCMAwGA1UdEwQFMAMBAf8wHAYDVR0R
bGZTU0yCFCYs3IPI2Zrqg3oIPFXxc6xvAldLMAwGA1UdEwQFMAMBAf8wHAYDVR0R
BBUwE4ILZXhhbXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsG
AQUFBwMCMAUGAytlcQNzAAI9PqS4bdO6TNLkB0SSxpSU6rXXakDo1W/3Z1HpULFm
ljY7XTpsmTyPJBzRxOUKUJh7Qb7Vi6MoAJWHoqjYhVANPFuc+5ZiYKvAqCPDX2vm
xSfn5K36PdnuOtH1CSgZLoVXsQEy42E/vC8AOti/d9kDAA==
AQUFBwMCMAUGAytlcQNzANIlGjTYWlv4yWs3guc76Rs8Wt9Cew0Do5g9nAmAwK6O
kgDHbZUeT1e9Zoqk4e9PmdtvPmyf0pdbAOPNYzQZaMW3JqD9hviRZz0zryTNNxq/
OAYsI5BZWwgLwOSU+f6LtLSGdamONlt5zcHs0F9c1YY8AA==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,13 +2,13 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number:
63:2c:f3:73:35:61:fa:12:27:9f:85:1e:85:15:27:a8:e7:3a:d4:7a
12:9b:09:d8:ee:4e:ca:7d:44:09:45:97:27:26:cc:d7:0a:28:71:b3
Signature Algorithm: ED448
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed448, OU = Root-Ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed448, OU=Root-Ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed448, OU = Root-Ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Nov 13 20:41:22 2025 GMT
Not After : Aug 9 20:41:22 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed448, OU=Root-Ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: ED448
ED448 Public-Key:
@@ -28,27 +28,27 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ED448
Signature Value:
c8:58:17:45:94:49:83:23:2e:49:ab:ed:84:6c:c2:8a:6c:62:
84:c0:ea:ea:af:4e:ae:c4:16:48:6b:c7:34:0f:37:5a:08:5a:
f1:7b:91:00:0f:94:7d:32:d3:c5:32:b8:fc:c4:5f:92:e7:5a:
43:5c:80:b0:66:dc:b9:7e:2c:1b:de:54:34:60:9f:90:8c:80:
31:a5:e0:ba:6b:19:89:c2:74:c6:8c:e5:16:ec:df:93:68:a4:
04:a4:48:de:8d:21:52:da:fb:6a:a1:a3:8d:24:b3:a6:be:4d:
fc:c9:27:f1:05:00
e2:10:9b:d6:03:2e:1f:13:2d:99:c2:cf:66:20:8d:2a:06:70:
a3:3d:8f:1e:97:d6:9b:32:03:0e:bb:b3:3c:4a:87:67:74:42:
0f:68:62:63:8b:4e:b5:0b:46:1b:c6:96:00:95:d4:53:0b:0b:
7f:00:00:dd:b6:66:b2:f0:86:91:b6:42:42:82:35:83:29:4d:
ec:cb:84:de:82:23:3a:95:c0:ff:f2:eb:f0:d7:39:59:34:0f:
4e:22:97:97:25:33:83:94:51:ac:50:23:05:69:8d:fe:41:e9:
38:5b:af:93:22:00
-----BEGIN CERTIFICATE-----
MIICpDCCAiSgAwIBAgIUYyzzczVh+hInn4UehRUnqOc61HowBQYDK2VxMIGZMQsw
MIICpDCCAiSgAwIBAgIUEpsJ2O5Oyn1ECUWXJybM1woocbMwBQYDK2VxMIGZMQsw
CQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEW
MBQGA1UECgwNd29sZlNTTF9FZDQ0ODETMBEGA1UECwwKUm9vdC1FZDQ0ODEYMBYG
A1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZz
c2wuY29tMB4XDTI0MTIxODIxMjUzMFoXDTI3MDkxNDIxMjUzMFowgZkxCzAJBgNV
c2wuY29tMB4XDTI1MTExMzIwNDEyMloXDTI4MDgwOTIwNDEyMlowgZkxCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRYwFAYD
VQQKDA13b2xmU1NMX0VkNDQ4MRMwEQYDVQQLDApSb290LUVkNDQ4MRgwFgYDVQQD
DA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
b20wQzAFBgMrZXEDOgALZCYoz7VGm+4/6jv1Znoy1P59+IBfWFds13nuZqI9VI+N
CK/LuEOUUF3lU2JpyHWCpl5EyktbCwCjYzBhMB0GA1UdDgQWBBTaaZjJJkp1+1le
U5pjSwy4iAsPHjAfBgNVHSMEGDAWgBTaaZjJJkp1+1leU5pjSwy4iAsPHjAPBgNV
HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAFBgMrZXEDcwDIWBdFlEmDIy5J
q+2EbMKKbGKEwOrqr06uxBZIa8c0DzdaCFrxe5EAD5R9MtPFMrj8xF+S51pDXICw
Zty5fiwb3lQ0YJ+QjIAxpeC6axmJwnTGjOUW7N+TaKQEpEjejSFS2vtqoaONJLOm
vk38ySfxBQA=
HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAFBgMrZXEDcwDiEJvWAy4fEy2Z
ws9mII0qBnCjPY8el9abMgMOu7M8SodndEIPaGJji061C0YbxpYAldRTCwt/AADd
tmay8IaRtkJCgjWDKU3sy4TegiM6lcD/8uvw1zlZNA9OIpeXJTODlFGsUCMFaY3+
Qek4W6+TIgA=
-----END CERTIFICATE-----

View File

@@ -3,11 +3,11 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED448
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = CA-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=CA-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = Server-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:23 2025 GMT
Not After : Aug 9 20:41:23 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=Server-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED448
ED448 Public-Key:
@@ -31,19 +31,19 @@ Certificate:
SSL Server
Signature Algorithm: ED448
Signature Value:
7b:57:bb:6e:a6:57:a9:d2:0a:85:f0:ae:63:17:ef:cf:e7:5a:
70:92:41:14:c2:b1:17:52:07:93:95:14:c8:b6:9c:80:2a:6f:
09:90:15:1c:3f:a9:59:50:c6:c4:e7:72:65:35:db:97:28:35:
94:e0:80:cf:71:c2:1e:db:c6:8c:e4:ea:b8:96:a3:e3:c8:22:
93:e9:66:78:bd:97:fb:8b:a3:40:41:42:46:3e:37:35:58:f0:
c1:52:58:4e:f6:ce:2d:4c:7e:d3:6d:1f:a7:ff:27:f2:d0:62:
27:eb:2d:8b:05:00
4e:28:34:60:2a:76:3a:61:88:04:99:7f:a1:c3:d5:c7:a2:1c:
3e:57:2f:5a:83:24:cb:0c:32:11:c9:02:d2:a7:14:bb:cc:00:
68:6e:80:a3:e0:1e:93:41:af:76:86:8b:ae:e9:9c:f4:d2:9c:
3c:6e:80:ee:45:64:83:b6:20:f4:35:83:87:81:07:c7:b8:84:
ea:d8:5e:0a:bb:63:84:a3:2b:d0:5e:7c:cd:a8:34:0e:c2:17:
32:7f:fb:24:60:df:ef:44:fc:62:fb:ca:5d:4b:72:92:7f:41:
71:b3:ac:ce:2b:00
-----BEGIN CERTIFICATE-----
MIIC6jCCAmqgAwIBAgIBATAFBgMrZXEwgbAxCzAJBgNVBAYTAlVTMRAwDgYDVQQI
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRYwFAYDVQQKDA13b2xmU1NMX2Vk
NDQ4MREwDwYDVQQLDAhDQS1lZDQ0ODEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t
MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMRcwFQYKCZImiZPyLGQB
AQwHd29sZlNTTDAeFw0yNDEyMTgyMTI1MzBaFw0yNzA5MTQyMTI1MzBaMIG0MQsw
AQwHd29sZlNTTDAeFw0yNTExMTMyMDQxMjNaFw0yODA4MDkyMDQxMjNaMIG0MQsw
CQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEW
MBQGA1UECgwNd29sZlNTTF9lZDQ0ODEVMBMGA1UECwwMU2VydmVyLWVkNDQ4MRgw
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
@@ -52,7 +52,7 @@ Aes32akHzQG8nXAWwiwrdVtj2+46LUSSRrR7BwNPoq6GhtyLSyx/6GsUjVjdbedv
OgWVqO8Ao4GJMIGGMB0GA1UdDgQWBBR8q1wSqWjYGBAofZLFSrhMTHYO2zAfBgNV
HSMEGDAWgBQ4WUXo3UQstX2lJdYLzDnwcsCUYzAMBgNVHRMBAf8EAjAAMA4GA1Ud
DwEB/wQEAwIDqDATBgNVHSUEDDAKBggrBgEFBQcDATARBglghkgBhvhCAQEEBAMC
BkAwBQYDK2VxA3MAe1e7bqZXqdIKhfCuYxfvz+dacJJBFMKxF1IHk5UUyLacgCpv
CZAVHD+pWVDGxOdyZTXblyg1lOCAz3HCHtvGjOTquJaj48gik+lmeL2X+4ujQEFC
Rj43NVjwwVJYTvbOLUx+020fp/8n8tBiJ+stiwUA
BkAwBQYDK2VxA3MATig0YCp2OmGIBJl/ocPVx6IcPlcvWoMkywwyEckC0qcUu8wA
aG6Ao+Aek0GvdoaLrumc9NKcPG6A7kVkg7Yg9DWDh4EHx7iE6theCrtjhKMr0F58
zag0DsIXMn/7JGDf70T8YvvKXUtykn9BcbOszisA
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -3,11 +3,11 @@ Certificate:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED448
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = CA-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=CA-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = Server-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:23 2025 GMT
Not After : Aug 9 20:41:23 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=Server-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED448
ED448 Public-Key:
@@ -31,19 +31,19 @@ Certificate:
SSL Server
Signature Algorithm: ED448
Signature Value:
7b:57:bb:6e:a6:57:a9:d2:0a:85:f0:ae:63:17:ef:cf:e7:5a:
70:92:41:14:c2:b1:17:52:07:93:95:14:c8:b6:9c:80:2a:6f:
09:90:15:1c:3f:a9:59:50:c6:c4:e7:72:65:35:db:97:28:35:
94:e0:80:cf:71:c2:1e:db:c6:8c:e4:ea:b8:96:a3:e3:c8:22:
93:e9:66:78:bd:97:fb:8b:a3:40:41:42:46:3e:37:35:58:f0:
c1:52:58:4e:f6:ce:2d:4c:7e:d3:6d:1f:a7:ff:27:f2:d0:62:
27:eb:2d:8b:05:00
4e:28:34:60:2a:76:3a:61:88:04:99:7f:a1:c3:d5:c7:a2:1c:
3e:57:2f:5a:83:24:cb:0c:32:11:c9:02:d2:a7:14:bb:cc:00:
68:6e:80:a3:e0:1e:93:41:af:76:86:8b:ae:e9:9c:f4:d2:9c:
3c:6e:80:ee:45:64:83:b6:20:f4:35:83:87:81:07:c7:b8:84:
ea:d8:5e:0a:bb:63:84:a3:2b:d0:5e:7c:cd:a8:34:0e:c2:17:
32:7f:fb:24:60:df:ef:44:fc:62:fb:ca:5d:4b:72:92:7f:41:
71:b3:ac:ce:2b:00
-----BEGIN CERTIFICATE-----
MIIC6jCCAmqgAwIBAgIBATAFBgMrZXEwgbAxCzAJBgNVBAYTAlVTMRAwDgYDVQQI
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRYwFAYDVQQKDA13b2xmU1NMX2Vk
NDQ4MREwDwYDVQQLDAhDQS1lZDQ0ODEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t
MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMRcwFQYKCZImiZPyLGQB
AQwHd29sZlNTTDAeFw0yNDEyMTgyMTI1MzBaFw0yNzA5MTQyMTI1MzBaMIG0MQsw
AQwHd29sZlNTTDAeFw0yNTExMTMyMDQxMjNaFw0yODA4MDkyMDQxMjNaMIG0MQsw
CQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEW
MBQGA1UECgwNd29sZlNTTF9lZDQ0ODEVMBMGA1UECwwMU2VydmVyLWVkNDQ4MRgw
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
@@ -52,20 +52,20 @@ Aes32akHzQG8nXAWwiwrdVtj2+46LUSSRrR7BwNPoq6GhtyLSyx/6GsUjVjdbedv
OgWVqO8Ao4GJMIGGMB0GA1UdDgQWBBR8q1wSqWjYGBAofZLFSrhMTHYO2zAfBgNV
HSMEGDAWgBQ4WUXo3UQstX2lJdYLzDnwcsCUYzAMBgNVHRMBAf8EAjAAMA4GA1Ud
DwEB/wQEAwIDqDATBgNVHSUEDDAKBggrBgEFBQcDATARBglghkgBhvhCAQEEBAMC
BkAwBQYDK2VxA3MAe1e7bqZXqdIKhfCuYxfvz+dacJJBFMKxF1IHk5UUyLacgCpv
CZAVHD+pWVDGxOdyZTXblyg1lOCAz3HCHtvGjOTquJaj48gik+lmeL2X+4ujQEFC
Rj43NVjwwVJYTvbOLUx+020fp/8n8tBiJ+stiwUA
BkAwBQYDK2VxA3MATig0YCp2OmGIBJl/ocPVx6IcPlcvWoMkywwyEckC0qcUu8wA
aG6Ao+Aek0GvdoaLrumc9NKcPG6A7kVkg7Yg9DWDh4EHx7iE6theCrtjhKMr0F58
zag0DsIXMn/7JGDf70T8YvvKXUtykn9BcbOszisA
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ED448
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_Ed448, OU = Root-Ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_Ed448, OU=Root-Ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com
Validity
Not Before: Dec 18 21:25:30 2024 GMT
Not After : Sep 14 21:25:30 2027 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_ed448, OU = CA-ed448, CN = www.wolfssl.com, emailAddress = info@wolfssl.com, UID = wolfSSL
Not Before: Nov 13 20:41:22 2025 GMT
Not After : Aug 9 20:41:22 2028 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_ed448, OU=CA-ed448, CN=www.wolfssl.com, emailAddress=info@wolfssl.com, UID=wolfSSL
Subject Public Key Info:
Public Key Algorithm: ED448
ED448 Public-Key:
@@ -85,27 +85,27 @@ Certificate:
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ED448
Signature Value:
cd:f6:7e:99:b5:a0:0c:c3:38:25:38:54:42:51:57:19:5b:a2:
89:c5:f2:71:e2:3b:62:93:e9:08:54:ae:e0:89:c0:e8:d8:2f:
9c:dc:38:f7:80:dc:ca:f3:2f:55:63:70:7a:fe:e8:b2:90:62:
03:22:00:34:1a:9e:0f:f0:43:14:a2:f3:b6:98:19:0a:fd:83:
86:18:bb:87:2d:08:a3:93:d1:df:c8:15:7f:59:4b:8b:5e:23:
eb:f6:61:d4:b8:1f:91:7d:10:4b:68:02:d9:05:1d:6f:23:87:
d1:68:1b:71:19:00
71:3f:d1:28:33:07:d1:3b:83:b9:23:62:64:ea:6d:d6:c1:cc:
fc:3f:4c:76:95:b0:d2:16:1c:31:b9:71:14:a5:9d:62:71:f9:
3c:40:c7:dc:65:ff:85:65:82:fa:9d:1b:39:ea:d4:c6:3f:09:
2b:dc:80:ad:a4:0c:61:b2:85:fe:e5:b2:f3:c3:07:a4:a8:db:
9a:f0:c5:d5:a3:9d:8d:9f:60:5a:37:27:4e:07:52:33:1a:53:
84:84:96:44:4f:4e:b0:0b:13:c1:85:95:58:c7:10:f1:a4:1d:
09:07:a2:b7:0a:00
-----BEGIN CERTIFICATE-----
MIICqDCCAiigAwIBAgIBATAFBgMrZXEwgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQI
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRYwFAYDVQQKDA13b2xmU1NMX0Vk
NDQ4MRMwEQYDVQQLDApSb290LUVkNDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5j
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjQxMjE4MjEy
NTMwWhcNMjcwOTE0MjEyNTMwWjCBsDELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01v
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjUxMTEzMjA0
MTIyWhcNMjgwODA5MjA0MTIyWjCBsDELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01v
bnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFjAUBgNVBAoMDXdvbGZTU0xfZWQ0NDgx
ETAPBgNVBAsMCENBLWVkNDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAd
BgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20xFzAVBgoJkiaJk/IsZAEBDAd3
b2xmU1NMMEMwBQYDK2VxAzoADuK0duXSzMJLe7ApvpL7w69ppZS6cCToo+/IY5rd
pq9YQzgEJPAQkb6nAZFU889phUy5l4ykN6oAo2MwYTAdBgNVHQ4EFgQUOFlF6N1E
LLV9pSXWC8w58HLAlGMwHwYDVR0jBBgwFoAU2mmYySZKdftZXlOaY0sMuIgLDx4w
DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwBQYDK2VxA3MAzfZ+mbWg
DMM4JThUQlFXGVuiicXyceI7YpPpCFSu4InA6NgvnNw494DcyvMvVWNwev7ospBi
AyIANBqeD/BDFKLztpgZCv2Dhhi7hy0Io5PR38gVf1lLi14j6/Zh1LgfkX0QS2gC
2QUdbyOH0WgbcRkA
DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwBQYDK2VxA3MAcT/RKDMH
0TuDuSNiZOpt1sHM/D9MdpWw0hYcMblxFKWdYnH5PEDH3GX/hWWC+p0bOerUxj8J
K9yAraQMYbKF/uWy88MHpKjbmvDF1aOdjZ9gWjcnTgdSMxpThISWRE9OsAsTwYWV
WMcQ8aQdCQeitwoA
-----END CERTIFICATE-----

Some files were not shown because too many files have changed in this diff Show More