Compare commits
359 Commits
v4.6.0-sta
...
v4.7.0-sta
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
830de9a9fb | ||
|
|
30462fcf95 | ||
|
|
917205442b | ||
|
|
888fab501b | ||
|
|
742731a65f | ||
|
|
847938f4d6 | ||
|
|
f4519018eb | ||
|
|
0b0f370384 | ||
|
|
ba1c67843a | ||
|
|
c5190d1294 | ||
|
|
e4f8545e36 | ||
|
|
e187a74b1c | ||
|
|
4b1c89ab38 | ||
|
|
505514415d | ||
|
|
98b5900266 | ||
|
|
fc005f941c | ||
|
|
bde1a2209a | ||
|
|
f311c9a038 | ||
|
|
1c852f60ab | ||
|
|
7e72fafd44 | ||
|
|
a49c867b38 | ||
|
|
0938a0055d | ||
|
|
3926ccd39b | ||
|
|
2ac826c37e | ||
|
|
ae073b7ce2 | ||
|
|
81dcf0d28b | ||
|
|
1283a4d9f0 | ||
|
|
d40ea03621 | ||
|
|
f0ce6ada0f | ||
|
|
3eeeb39fb7 | ||
|
|
80b9949052 | ||
|
|
e87e818c6e | ||
|
|
39cb84de25 | ||
|
|
f006479645 | ||
|
|
90140fc5a4 | ||
|
|
d05dc921a7 | ||
|
|
d64315a951 | ||
|
|
b330196c28 | ||
|
|
acdc267104 | ||
|
|
032cc1645c | ||
|
|
389a5e0301 | ||
|
|
6983aa9331 | ||
|
|
67b1280bbf | ||
|
|
0403f5f18d | ||
|
|
5151e1f749 | ||
|
|
7efaf14fce | ||
|
|
d67934f6b8 | ||
|
|
ac96e58928 | ||
|
|
41e5e547c4 | ||
|
|
223ba43c2c | ||
|
|
9e6ab4ab70 | ||
|
|
c9c4a7ee68 | ||
|
|
0c75099111 | ||
|
|
4c171524dd | ||
|
|
9b6f382b2c | ||
|
|
3c0563908f | ||
|
|
7e428f90f2 | ||
|
|
15f9902e94 | ||
|
|
64bc4b663d | ||
|
|
794cb5c7a9 | ||
|
|
89b97a0fbf | ||
|
|
b704c3b3f8 | ||
|
|
75d0496f77 | ||
|
|
157ad65a6e | ||
|
|
47b2e8342b | ||
|
|
32424f715c | ||
|
|
27475291b1 | ||
|
|
ae3706d5e5 | ||
|
|
2f47934184 | ||
|
|
fc30f379ee | ||
|
|
cfadc7e25a | ||
|
|
3472191af5 | ||
|
|
f63f0ccb94 | ||
|
|
ca3c5bf6c4 | ||
|
|
33bfee0f1a | ||
|
|
9792e062c3 | ||
|
|
9a7aba265a | ||
|
|
73d7709724 | ||
|
|
6d23728a56 | ||
|
|
250b59f8fd | ||
|
|
012841bba3 | ||
|
|
47d5f6f624 | ||
|
|
71b495c422 | ||
|
|
5818923762 | ||
|
|
bdd4ceb445 | ||
|
|
4d70d3a3c4 | ||
|
|
539ef512fc | ||
|
|
a4e819c60a | ||
|
|
763f388471 | ||
|
|
0d499a28e5 | ||
|
|
3217c7afae | ||
|
|
f14f1f37d2 | ||
|
|
58f9b6ec01 | ||
|
|
7a583d5b4b | ||
|
|
b8a019dedd | ||
|
|
dda4c3b3c4 | ||
|
|
12eddee104 | ||
|
|
6cff3f8488 | ||
|
|
47b9c5b054 | ||
|
|
de47b9d88a | ||
|
|
812b44d58e | ||
|
|
36d124ed2f | ||
|
|
c3cc36c55f | ||
|
|
7986b37aa5 | ||
|
|
f13186827a | ||
|
|
aefddaf2b8 | ||
|
|
cced2038b8 | ||
|
|
358dbd5090 | ||
|
|
2933db8915 | ||
|
|
ea4b3110e8 | ||
|
|
bc707d67c3 | ||
|
|
3fd2647383 | ||
|
|
644636e0f8 | ||
|
|
e26f1529c0 | ||
|
|
c17597a4fb | ||
|
|
70b382e6cf | ||
|
|
c2be5dbe2b | ||
|
|
93ea355217 | ||
|
|
e4d79bf49e | ||
|
|
c4afce76f7 | ||
|
|
4ade6eb802 | ||
|
|
776964f7c7 | ||
|
|
431e1c8ffe | ||
|
|
714aa97490 | ||
|
|
72a8a1069a | ||
|
|
04e7fa3657 | ||
|
|
7eb71b1bb1 | ||
|
|
f833d96ba3 | ||
|
|
30c1c4a4f8 | ||
|
|
542e0d79ec | ||
|
|
8a669615f8 | ||
|
|
921fd34876 | ||
|
|
69dca4fd08 | ||
|
|
46821196ab | ||
|
|
ff43d39015 | ||
|
|
f5cf24dbdc | ||
|
|
5d5d2e1f02 | ||
|
|
c18701ebe7 | ||
|
|
fdde2337a4 | ||
|
|
6ed45a23d9 | ||
|
|
294e46e21a | ||
|
|
3494218d98 | ||
|
|
5577a2215f | ||
|
|
ab5f9831ab | ||
|
|
a7066a9be2 | ||
|
|
fd01f79f86 | ||
|
|
d14f4f8451 | ||
|
|
f5f19fda42 | ||
|
|
d0b20f90d5 | ||
|
|
8c0100e60e | ||
|
|
a332cf36b5 | ||
|
|
eae4124908 | ||
|
|
2033970369 | ||
|
|
0f6ae330da | ||
|
|
91299c5abd | ||
|
|
4f6deb8ae9 | ||
|
|
fc845da9f0 | ||
|
|
3da6b8364e | ||
|
|
2bd63d27bf | ||
|
|
311a0d25dd | ||
|
|
590597a0e2 | ||
|
|
0ccb0d5fce | ||
|
|
bbcb98a8f7 | ||
|
|
7486cad291 | ||
|
|
c739b4d474 | ||
|
|
a1e083b5b1 | ||
|
|
d0e2566ad8 | ||
|
|
3d4f836c00 | ||
|
|
4da9ade290 | ||
|
|
a89087ed2d | ||
|
|
6e0e507dad | ||
|
|
f91dcb950c | ||
|
|
27ef5b9a3d | ||
|
|
f35f57c378 | ||
|
|
d201820e3a | ||
|
|
cf9e4f0caf | ||
|
|
234bf0c209 | ||
|
|
a2917ae29c | ||
|
|
05e1ee1694 | ||
|
|
29f7eebef7 | ||
|
|
f7408560c6 | ||
|
|
4f0ed55232 | ||
|
|
fb9836ed28 | ||
|
|
d29518ecac | ||
|
|
21ac86adb3 | ||
|
|
13468d34e3 | ||
|
|
46aee19de3 | ||
|
|
920c443864 | ||
|
|
cd4dae8f09 | ||
|
|
b918fb9efe | ||
|
|
6fa1556daf | ||
|
|
905f0b1f5a | ||
|
|
a84f1c813a | ||
|
|
9c34ecc130 | ||
|
|
fad1e67677 | ||
|
|
9012317f5b | ||
|
|
1ee40ad7bd | ||
|
|
6f21995ec5 | ||
|
|
4b47bf7b4e | ||
|
|
2017de1b0f | ||
|
|
07f459b8d7 | ||
|
|
830b3cb676 | ||
|
|
aa64a8e835 | ||
|
|
95d83c9856 | ||
|
|
1acd6dfab2 | ||
|
|
a8cfc23683 | ||
|
|
5837d5e8de | ||
|
|
85f08466f9 | ||
|
|
e9e96dff6a | ||
|
|
7b12dddf75 | ||
|
|
22e6d52b7b | ||
|
|
b825e51d23 | ||
|
|
848ae3e514 | ||
|
|
344ad2a3f8 | ||
|
|
fe7be3e15f | ||
|
|
7112a6dd78 | ||
|
|
fbe5fe1945 | ||
|
|
af3d842663 | ||
|
|
3e4c3d13fe | ||
|
|
fd8527c15e | ||
|
|
b418936f72 | ||
|
|
177f4aecb6 | ||
|
|
e3fa462d72 | ||
|
|
fe37137f12 | ||
|
|
d8a01c6f8b | ||
|
|
969de38764 | ||
|
|
774fdc9fd6 | ||
|
|
17f101ef13 | ||
|
|
02114e7739 | ||
|
|
a3cbcf255f | ||
|
|
57b06f700d | ||
|
|
12abb5191d | ||
|
|
55be60a63e | ||
|
|
e3182ff06e | ||
|
|
7ec8d70eee | ||
|
|
9044f709c1 | ||
|
|
ea5af87de3 | ||
|
|
9ea5041d9d | ||
|
|
eaa1bc1ace | ||
|
|
59305e9346 | ||
|
|
8d1d616b39 | ||
|
|
219cbd47eb | ||
|
|
523119289b | ||
|
|
209c4c08e1 | ||
|
|
7d869a43b4 | ||
|
|
949af909bf | ||
|
|
6a5e802cc4 | ||
|
|
a13e9bde29 | ||
|
|
5b7e6ccc14 | ||
|
|
279c3f4c1b | ||
|
|
78d2b3b440 | ||
|
|
267b00e0a2 | ||
|
|
85faf974aa | ||
|
|
87a0ee5ef4 | ||
|
|
4b5d7d0595 | ||
|
|
8ae609d078 | ||
|
|
1e9394d5a8 | ||
|
|
50843b22cd | ||
|
|
563e3c6b60 | ||
|
|
cd78a5dfb2 | ||
|
|
d514cc31b3 | ||
|
|
5a7e79cbfd | ||
|
|
3bae6e2dc2 | ||
|
|
fff3c77568 | ||
|
|
b1c8825e74 | ||
|
|
67d4f7c37b | ||
|
|
ac76ef8ee7 | ||
|
|
eda1b52ee2 | ||
|
|
878f797a2b | ||
|
|
0ac43bb095 | ||
|
|
d72f0a50f4 | ||
|
|
e21fddf553 | ||
|
|
5a4dfc1a29 | ||
|
|
22ce25afba | ||
|
|
1e49bc2e82 | ||
|
|
d7aa8e1795 | ||
|
|
382deb1f86 | ||
|
|
f8013580df | ||
|
|
fb82114866 | ||
|
|
aaec9832e4 | ||
|
|
129f3fd13f | ||
|
|
8fec1de07c | ||
|
|
3b07f5d8e3 | ||
|
|
a6535528f3 | ||
|
|
0cccf58fec | ||
|
|
88faef9bd9 | ||
|
|
e2b411805d | ||
|
|
a3cc4110b0 | ||
|
|
798d9ed0d5 | ||
|
|
a745947498 | ||
|
|
23a4d64caf | ||
|
|
cd4affddac | ||
|
|
0fe3efb8b4 | ||
|
|
c57fee136a | ||
|
|
f955c92008 | ||
|
|
209ad82df2 | ||
|
|
931dc5b29f | ||
|
|
d4e13796c2 | ||
|
|
fa86c1aa91 | ||
|
|
cd0670cbd7 | ||
|
|
5accd57c21 | ||
|
|
10722fba14 | ||
|
|
b8997d0b47 | ||
|
|
99d4a7417a | ||
|
|
a6b69b6864 | ||
|
|
f196c60c66 | ||
|
|
1b94309a6c | ||
|
|
2a2b194d71 | ||
|
|
46e260dd61 | ||
|
|
54f072fd8d | ||
|
|
96ece3ac7d | ||
|
|
b5403fe6b9 | ||
|
|
413bde9146 | ||
|
|
faf7d307b4 | ||
|
|
01c27068c1 | ||
|
|
68c2e36ad5 | ||
|
|
40ab08be45 | ||
|
|
ef56bc09f1 | ||
|
|
fbb3e9fca3 | ||
|
|
c9ac64d77d | ||
|
|
9dc8721032 | ||
|
|
a2dec7ce9c | ||
|
|
9598c03716 | ||
|
|
3d88676ff1 | ||
|
|
060ebd1ca2 | ||
|
|
7fb2c0f63f | ||
|
|
1b6a988dc0 | ||
|
|
81f70fba5f | ||
|
|
d366ca74af | ||
|
|
c482d16029 | ||
|
|
da007ecd7b | ||
|
|
c6abb59343 | ||
|
|
837e9856f5 | ||
|
|
dc21d56545 | ||
|
|
2bd0d4c467 | ||
|
|
fbcfc6adbf | ||
|
|
b0ca598d59 | ||
|
|
cedec3ae28 | ||
|
|
764b3cf09d | ||
|
|
8c07aafc43 | ||
|
|
54479359f3 | ||
|
|
8b517975d1 | ||
|
|
4280861af0 | ||
|
|
5c4011b3b4 | ||
|
|
b2155e6e26 | ||
|
|
d5dd35c739 | ||
|
|
daa6833f37 | ||
|
|
e0f36baebe | ||
|
|
542ad0a81b | ||
|
|
e6c71a1465 | ||
|
|
c47b98bca1 | ||
|
|
eb6473b00f | ||
|
|
801aa18b9e | ||
|
|
203b7739c9 | ||
|
|
d3aacf4934 | ||
|
|
6154f29a31 | ||
|
|
1d2eb44bfb | ||
|
|
22816b53de | ||
|
|
24e10bf4ab |
4
.gitignore
vendored
4
.gitignore
vendored
@@ -242,6 +242,10 @@ linuxkm/libwolfssl.mod.c
|
||||
linuxkm/module_exports.c
|
||||
linuxkm/linuxkm/get_thread_size
|
||||
|
||||
# autotools generated
|
||||
scripts/unit.test
|
||||
wolfcrypt/test/test_paths.h
|
||||
|
||||
# MPLAB Generated Files (OS X)
|
||||
mcapi/wolfcrypt_mcapi.X/nbproject/Makefile-*
|
||||
mcapi/wolfcrypt_mcapi.X/nbproject/Package-default.bash
|
||||
|
||||
@@ -28,16 +28,16 @@ if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_BINARY_DIR}")
|
||||
You must delete them, or cmake will refuse to work.")
|
||||
endif()
|
||||
|
||||
project(wolfssl VERSION 4.5.0 LANGUAGES C)
|
||||
project(wolfssl VERSION 4.7.0 LANGUAGES C)
|
||||
|
||||
# shared library versioning
|
||||
# increment if interfaces have been added, removed or changed
|
||||
set(LIBTOOL_CURRENT 26)
|
||||
set(LIBTOOL_CURRENT 27)
|
||||
# increment if source code has changed set to zero if current is incremented
|
||||
set(LIBTOOL_REVISION 0)
|
||||
# increment if interfaces have been added set to zero if interfaces have been
|
||||
# removed or changed
|
||||
set(LIBTOOL_AGE 2)
|
||||
set(LIBTOOL_AGE 3)
|
||||
|
||||
math(EXPR LIBTOOL_SO_VERSION "${LIBTOOL_CURRENT} - ${LIBTOOL_AGE}")
|
||||
set(LIBTOOL_FULL_VERSION ${LIBTOOL_SO_VERSION}.${LIBTOOL_AGE}.${LIBTOOL_REVISION})
|
||||
@@ -1203,30 +1203,37 @@ else()
|
||||
endif()
|
||||
endif()
|
||||
|
||||
# TODO: - User settings
|
||||
set(WOLFSSL_USER_SETTINGS_HELP_STRING "Use your own user_settings.h and do not add Makefile CFLAGS (default: disabled)")
|
||||
option(WOLFSSL_USER_SETTINGS ${WOLFSSL_USER_SETTINGS_HELP_STRING} "no")
|
||||
|
||||
set(WOLFSSL_OPTFLAGS_HELP_STRING "Enable default optimization CFLAGS for the compiler (default: enabled)")
|
||||
option(WOLFSSL_OPTFLAGS ${WOLFSSL_OPTFLAGS_HELP_STRING} "yes")
|
||||
|
||||
# Generates the BUILD_* flags. These control what source files
|
||||
# are included in the library. A series of AM_CONDITIONALs
|
||||
# handle this in configure.ac.
|
||||
# Generates the BUILD_* flags. These control what source files are included in
|
||||
# the library. A series of AM_CONDITIONALs handle this in configure.ac.
|
||||
generate_build_flags()
|
||||
|
||||
# TODO: - Bit of logic after optimization flags option (above)
|
||||
# - Check for build-type conflicts section
|
||||
# - Update CFLAGS based on options section
|
||||
# - User settings section
|
||||
# - BUILD_* flags and the logic they implement to control
|
||||
# what gets built
|
||||
|
||||
# USER SETTINGS
|
||||
if(WOLFSSL_USER_SETTINGS)
|
||||
# Replace all options and just use WOLFSSL_USER_SETTINGS
|
||||
set(WOLFSSL_DEFINITIONS "-DWOLFSSL_USER_SETTINGS")
|
||||
endif()
|
||||
|
||||
# TODO: Applying definitions to everything like this, rather than
|
||||
# individual targets, is discouraged in CMake.
|
||||
add_definitions(${WOLFSSL_DEFINITIONS})
|
||||
add_definitions("-DHAVE_CONFIG_H")
|
||||
configure_file("${CMAKE_CURRENT_SOURCE_DIR}/cmake/config.in"
|
||||
"${CMAKE_CURRENT_BINARY_DIR}/config.h" )
|
||||
|
||||
set(WOLFSSL_CONFIG_H_HELP_STRING "Enable generation of config.h and define HAVE_CONFIG_H (default: enabled)")
|
||||
option(WOLFSSL_CONFIG_H ${WOLFSSL_CONFIG_H_HELP_STRING} "yes")
|
||||
|
||||
if(WOLFSSL_CONFIG_H)
|
||||
add_definitions("-DHAVE_CONFIG_H")
|
||||
configure_file("${CMAKE_CURRENT_SOURCE_DIR}/cmake/config.in"
|
||||
"${CMAKE_CURRENT_BINARY_DIR}/config.h" )
|
||||
endif()
|
||||
|
||||
# Suppress some warnings about separate compilation, inlining
|
||||
add_definitions("-DWOLFSSL_IGNORE_FILE_WARN")
|
||||
@@ -1292,11 +1299,6 @@ file(APPEND ${CYASSL_OPTION_FILE} " */\n")
|
||||
file(READ ${OPTION_FILE} OPTION_FILE_CONTENTS)
|
||||
file(APPEND ${CYASSL_OPTION_FILE} ${OPTION_FILE_CONTENTS})
|
||||
|
||||
add_definitions(${WOLFSSL_DEFINITIONS})
|
||||
|
||||
configure_file("${CMAKE_SOURCE_DIR}/cmake/config.in"
|
||||
"${CMAKE_BINARY_DIR}/config.h" )
|
||||
|
||||
####################################################
|
||||
# Library Target
|
||||
####################################################
|
||||
|
||||
50
ChangeLog.md
50
ChangeLog.md
@@ -1,3 +1,53 @@
|
||||
# wolfSSL Release 4.7.0 (February 16, 2021)
|
||||
Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
||||
### New Feature Additions
|
||||
* Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API, X509_STORE_CTX API added
|
||||
* WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
|
||||
* Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session tickets with TLS 1.2 while keeping TLS 1.3 session tickets available
|
||||
* Implement RFC 5705: Keying Material Exporters for TLS
|
||||
* Added --enable-reproducible-build flag for making more deterministic library outputs to assist debugging
|
||||
|
||||
### Fixes
|
||||
* Fix to free mutex when cert manager is free’d
|
||||
* Compatibility layer EVP function to return the correct block size and type
|
||||
* DTLS secure renegotiation fixes including resetting timeout and retransmit on duplicate HelloRequest
|
||||
* Fix for edge case with shrink buffer and secure renegotiation
|
||||
* Compile fix for type used with curve448 and PPC64
|
||||
* Fixes for SP math all with PPC64 and other embedded compilers
|
||||
* SP math all fix when performing montgomery reduction on one word modulus
|
||||
* Fixes to SP math all to better support digit size of 8-bit
|
||||
* Fix for results of edge case with SP integer square operation
|
||||
* Stop non-ct mod inv from using register x29 with SP ARM64 build
|
||||
* Fix edge case when generating z value of ECC with SP code
|
||||
* Fixes for PKCS7 with crypto callback (devId) with RSA and RNG
|
||||
* Fix for compiling builds with RSA verify and public only
|
||||
* Fix for PKCS11 not properly exporting the public key due to a missing key type field
|
||||
* Call certificate callback with certificate depth issues
|
||||
* Fix for out-of-bounds read in TLSX_CSR_Parse()
|
||||
* Fix incorrect AES-GCM tag generation in the EVP layer
|
||||
* Fix for out of bounds write with SP math all enabled and an edge case of calling sp_tohex on the result of sp_mont_norm
|
||||
* Fix for parameter check in sp_rand_prime to handle 0 length values
|
||||
* Fix for edge case of failing malloc resulting in an out of bounds write with SHA256/SHA512 when small stack is enabled
|
||||
|
||||
|
||||
### Improvements/Optimizations
|
||||
* Added --enable-wolftpm option for easily building wolfSSL to be used with wolfTPM
|
||||
* DTLS macro WOLFSSL_DTLS_RESEND_ONLY_TIMEOUT added for resending flight only after a timeout
|
||||
* Update linux kernel module to use kvmalloc and kvfree
|
||||
* Add user settings option to cmake build
|
||||
* Added support for AES GCM session ticket encryption
|
||||
* Thread protection for global RNG used by wolfSSL_RAND_bytes function calls
|
||||
* Sanity check on FIPs configure flag used against the version of FIPs bundle
|
||||
* --enable-aesgcm=table now is compatible with --enable-linuxkm
|
||||
* Increase output buffer size that wolfSSL_RAND_bytes can handle
|
||||
* Out of directory builds resolved, wolfSSL can now be built in a separate directory than the root wolfssl directory
|
||||
|
||||
### Vulnerabilities
|
||||
* [HIGH] CVE-2021-3336: In earlier versions of wolfSSL there exists a potential man in the middle attack on TLS 1.3 clients. Malicious attackers with a privileged network position can impersonate TLS 1.3 servers and bypass authentication. Users that have applications with client side code and have TLS 1.3 turned on, should update to the latest version of wolfSSL. Users that do not have TLS 1.3 turned on, or that are server side only, are NOT affected by this report. For the code change see https://github.com/wolfSSL/wolfssl/pull/3676.
|
||||
* [LOW] In the case of using custom ECC curves there is the potential for a crafted compressed ECC key that has a custom prime value to cause a hang when imported. This only affects applications that are loading in ECC keys with wolfSSL builds that have compressed ECC keys and custom ECC curves enabled.
|
||||
* [LOW] With TLS 1.3 authenticated-only ciphers a section of the server hello could contain 16 bytes of uninitialized data when sent to the connected peer. This affects only a specific build of wolfSSL with TLS 1.3 early data enabled and using authenticated-only ciphers with TLS 1.3.
|
||||
|
||||
# wolfSSL Release 4.6.0 (December 22, 2020)
|
||||
Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -DNO_MAIN_DRIVER -DWOLFSSL_USER_SETTINGS")
|
||||
|
||||
set(COMPONENT_SRCDIRS ".")
|
||||
set(COMPONENT_SRCS "test_wolfssl.c" "../wolfcrypt/test/test.c")
|
||||
set(COMPONENT_ADD_INCLUDEDIRS ".")
|
||||
|
||||
set(COMPONENT_REQUIRES unity test_utils wolfssl)
|
||||
|
||||
@@ -3,9 +3,8 @@
|
||||
The test contains of wolfSSL unit-test app on Unity.
|
||||
|
||||
When you want to run the app
|
||||
1. Copy *test.c* file at /path/to/esp-idf/components/wolfssl/wolfcrypt/test/ folder to the wolfssl/test folder
|
||||
2. Go to /esp-idf/tools/unit-test-app/ folder
|
||||
3. "idf.py menuconfig" to configure unit test app.
|
||||
4. "idf.py -T wolfssl build" to build wolfssl unit test app.
|
||||
1. Go to /esp-idf/tools/unit-test-app/ folder
|
||||
2. "idf.py menuconfig" to configure unit test app.
|
||||
3. "idf.py -T wolfssl build" to build wolfssl unit test app.
|
||||
|
||||
See [https://docs.espressif.com/projects/esp-idf/en/latest/api-guides/unit-tests.html] for more information about unit test app.
|
||||
|
||||
153
IDE/MQX/Makefile
Normal file
153
IDE/MQX/Makefile
Normal file
@@ -0,0 +1,153 @@
|
||||
WOLF_ROOT = ../..
|
||||
MQX_ROOT = $(WOLF_ROOT)/../../../Freescale/Freescale_MQX_4_1/
|
||||
CC = arm-none-eabi-gcc
|
||||
AR = arm-none-eabi-ar
|
||||
|
||||
WOLFLIB = ./libwolfssl.a
|
||||
MQXLIB =
|
||||
|
||||
OPTIMIZE = -O2
|
||||
|
||||
WORNING = \
|
||||
-Wno-int-to-pointer-cast\
|
||||
-Wno-incompatible-pointer-types\
|
||||
-Wno-discarded-qualifiers\
|
||||
-Wno-int-conversion\
|
||||
-Wno-implicit-function-declaration\
|
||||
-Wno-pointer-to-int-cast
|
||||
|
||||
USER_SETTINGS_H = -I./ -DWOLFSSL_USER_SETTINGS
|
||||
CFLAGS = $(OPTIMIZE) -I$(WOLF_ROOT)/. $(USER_SETTINGS_H) $(MQX_INCLUDE) $(WORNING)
|
||||
|
||||
MQX_INCLUDE = -I$(MQX_ROOT)/mqx/source/include\
|
||||
-I$(MQX_ROOT)/mqx/source/psp/cortex_m\
|
||||
-I$(MQX_ROOT)/mqx/source/psp/cortex_a/compiler/gcc_arm\
|
||||
-I$(MQX_ROOT)/mqx/source/psp/cortex_m/cpu\
|
||||
-I$(MQX_ROOT)/mfs/source/include\
|
||||
-I$(MQX_ROOT)/mqx/source/bsp/twrk70f120m\
|
||||
-I$(MQX_ROOT)/mqx/source/io/cm\
|
||||
-I$(MQX_ROOT)/mqx/source/io/lpm\
|
||||
-I$(MQX_ROOT)/mqx/source/io/serial\
|
||||
-I$(MQX_ROOT)/mqx/source/io/dma\
|
||||
-I$(MQX_ROOT)/mqx/source/io/spi\
|
||||
-I$(MQX_ROOT)/mqx/source/io/i2c\
|
||||
-I$(MQX_ROOT)/mqx/source/io/io_mem\
|
||||
-I$(MQX_ROOT)/mqx/source/io/io_null\
|
||||
-I$(MQX_ROOT)/mqx/source/io/enet\
|
||||
-I$(MQX_ROOT)/mqx/source/io/enet/macnet\
|
||||
-I$(MQX_ROOT)/mqx/source/io/lwgpio\
|
||||
-I$(MQX_ROOT)/mqx/source/io/gpio\
|
||||
-I$(MQX_ROOT)/mqx/source/io/gpio/kgpio\
|
||||
-I$(MQX_ROOT)/mqx/source/io/esdhc\
|
||||
-I$(MQX_ROOT)/mqx/source/io/sdcard\
|
||||
-I$(MQX_ROOT)/mqx/source/io/sdcard/sdcard_spi\
|
||||
-I$(MQX_ROOT)/mqx/source/io/sdcard/sdcard_esdhc\
|
||||
-I$(MQX_ROOT)/mqx/source/io/pccard\
|
||||
-I$(MQX_ROOT)/mqx/source/io/pcflash\
|
||||
-I$(MQX_ROOT)/mqx/source/io/adc/kadc\
|
||||
-I$(MQX_ROOT)/mqx/source/io/adc\
|
||||
-I$(MQX_ROOT)/mqx/source/io/lwadc\
|
||||
-I$(MQX_ROOT)/mqx/source/io/flashx\
|
||||
-I$(MQX_ROOT)/mqx/source/io/flashx/freescale\
|
||||
-I$(MQX_ROOT)/mqx/source/io/hwtimer\
|
||||
-I$(MQX_ROOT)/mqx/source/io/rtc\
|
||||
-I$(MQX_ROOT)/mqx/source/io/debug\
|
||||
-I$(MQX_ROOT)/mqx/source/io/tchres\
|
||||
-I$(MQX_ROOT)/mqx/source/io/nandflash\
|
||||
-I$(MQX_ROOT)/mqx/source/io/timer\
|
||||
-I$(MQX_ROOT)/mqx/source/io/usb\
|
||||
-I$(MQX_ROOT)/mqx/source/io/hmi\
|
||||
-I$(MQX_ROOT)/mqx/source/io/sai\
|
||||
-I$(MQX_ROOT)/mqx/source/io/rtcs\
|
||||
-I$(MQX_ROOT)/rtcs/source/include
|
||||
|
||||
OBJ =\
|
||||
$(WOLF_ROOT)/src/crl.o\
|
||||
$(WOLF_ROOT)/src/internal.o\
|
||||
$(WOLF_ROOT)/src/keys.o\
|
||||
$(WOLF_ROOT)/src/ocsp.o\
|
||||
$(WOLF_ROOT)/src/sniffer.o\
|
||||
$(WOLF_ROOT)/src/ssl.o\
|
||||
$(WOLF_ROOT)/src/tls13.o\
|
||||
$(WOLF_ROOT)/src/tls.o\
|
||||
$(WOLF_ROOT)/src/wolfio.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/aes.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/arc4.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/asm.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/asn.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/blake2b.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/blake2s.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/camellia.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/chacha20_poly1305.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/chacha.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/cmac.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/coding.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/compress.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/cpuid.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/cryptocb.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/curve25519.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/des3.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/dh.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/dsa.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/ecc.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/ecc_fp.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/ed25519.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/error.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/fe_low_mem.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/fe_operations.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/ge_low_mem.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/ge_operations.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/hash.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/hc128.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/hmac.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/idea.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/integer.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/logging.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/md2.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/md4.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/md5.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/memory.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/pkcs12.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/pkcs7.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/poly1305.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/pwdbased.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/rabbit.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/random.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/ripemd.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/rsa.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sha256.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sha3.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sha512.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sha.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/signature.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_arm32.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_arm64.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_armthumb.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_c32.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_c64.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_cortexm.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_int.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/sp_x86_64.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/srp.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/tfm.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/wc_encrypt.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/wc_pkcs11.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/wc_port.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/wolfevent.o\
|
||||
$(WOLF_ROOT)/wolfcrypt/src/wolfmath.o
|
||||
|
||||
|
||||
all : wolfssllib client server test benchmark
|
||||
|
||||
wolfssllib : $(OBJ)
|
||||
$(AR) r $(WOLFLIB) $(OBJ)
|
||||
test : wolfssllib ./user_settings.h
|
||||
$(CC) -o test $(CFLAGS) $(WOLF_ROOT)/wolfcrypt/test/test.c $(WOLFLIB) $(MQXLIB)
|
||||
benchmark : wolfssllib ./user_settings.h
|
||||
$(CC) -o benchmark $(CFLAGS) $(WOLF_ROOT)/wolfcrypt/benchmark/benchmark.c $(WOLFLIB) $(WOLFLIB) $(MQXLIB)
|
||||
server : wolfssllib ./user_settings.h
|
||||
$(CC) -o server $(CFLAGS) $(WOLF_ROOT)/IDE/MQX/server-tls.c $(WOLFLIB) $(MQXLIB)
|
||||
client : wolfssllib ./user_settings.h
|
||||
$(CC) -o client $(CFLAGS) $(WOLF_ROOT)/IDE/MQX/client-tls.c $(WOLFLIB) $(MQXLIB)
|
||||
clean :
|
||||
rm $(OBJ) $(WOLFLIB)
|
||||
29
IDE/MQX/README-jp.md
Normal file
29
IDE/MQX/README-jp.md
Normal file
@@ -0,0 +1,29 @@
|
||||
# MQX向けビルド方法
|
||||
## 概要
|
||||
このMakefileはwolfSSLライブラリーとサンプルプログラムをMQX向けにビルドするためのものです。
|
||||
以下のターゲットを含んでいます。
|
||||
- wolfssllib: wolfSSL静的ライブラリー
|
||||
- test: 暗号アルゴリズムのテスト
|
||||
- benchmark: 暗号アルゴリズムのベンチマーク
|
||||
- client: TLS クライアントサンプルプログラム
|
||||
- server: TLS サーバサンプルプログラム
|
||||
|
||||
|
||||
## 準備
|
||||
- 事前にGCCをインストールしておいてください。
|
||||
GNU Arm Embedded Toolchain, https://developer.arm.com
|
||||
- 事前にMQXをインストールしておいてください。
|
||||
Freescale MQX RTOS 4.1以降, https://www.nxp.com/
|
||||
Freescale_MQX_4_1/doc/MQX_Getting_Started.pdfをご参照ください。
|
||||
|
||||
## 設定
|
||||
- wolfSSL コンフィグレーションオプション
|
||||
<wolfSSL-root>/IDE/MQX/user_settings.hファイルに必要なオプションを追加または削除してください。
|
||||
|
||||
- Makefileの設定
|
||||
MQX_ROOT: MQX のインストールパス
|
||||
MQXLIB: リンクするMQX ライブラリのパス
|
||||
CC: コンパイラコマンド
|
||||
AR: ARコマンド
|
||||
WOLF_ROOT: Makefileの格納位置を変える場合はこの定義を変更してください
|
||||
|
||||
27
IDE/MQX/README.md
Normal file
27
IDE/MQX/README.md
Normal file
@@ -0,0 +1,27 @@
|
||||
#How to build with MQX
|
||||
## Overview
|
||||
This Makefile is for building wolfSSL library and sample programs running with MQX.
|
||||
It has following targets.
|
||||
- wolfssllib: wolfSSL static library (libwolfssl.a)
|
||||
- test: crypt test
|
||||
- benchmark: cypher benchmark
|
||||
- client: TLS client example
|
||||
- server: TLS server example
|
||||
|
||||
## Prerequisites
|
||||
- Installed GCC
|
||||
Download from GNU Arm Embedded Toolchain at https://developer.arm.com/
|
||||
- Installed MQX
|
||||
Download Freescale MQX RTOS 4.1 or later at https://www.nxp.com/
|
||||
Follow Freescale_MQX_4_1/doc/MQX_Getting_Started.pdf
|
||||
|
||||
## Setup
|
||||
- wolfSSL configuration parameters
|
||||
You can add or remove configuration options in <wolfSSL-root>/IDE/MQX/user_settings.h.
|
||||
|
||||
- Setup Makefile
|
||||
MQX_ROOT: MQX source code installed path
|
||||
MQXLIB: MQX library path to like with
|
||||
CC: compiler
|
||||
AR: archiver
|
||||
WOLF_ROOT: change this if you move this Makefile location
|
||||
163
IDE/MQX/client-tls.c
Normal file
163
IDE/MQX/client-tls.c
Normal file
@@ -0,0 +1,163 @@
|
||||
/* client-tls.c
|
||||
*
|
||||
* Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL. (formerly known as CyaSSL)
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
||||
*/
|
||||
|
||||
|
||||
/* wolfSSL */
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include <wolfssl/ssl.h>
|
||||
|
||||
#define DEFAULT_PORT 11111
|
||||
|
||||
#define CERT_FILE "../certs/ca-cert.pem"
|
||||
|
||||
|
||||
|
||||
int main(int argc, char** argv)
|
||||
{
|
||||
int sockfd;
|
||||
struct sockaddr_in servAddr;
|
||||
char buff[256];
|
||||
size_t len;
|
||||
int ret;
|
||||
|
||||
/* declare wolfSSL objects */
|
||||
WOLFSSL_CTX* ctx;
|
||||
WOLFSSL* ssl;
|
||||
|
||||
|
||||
|
||||
/* Check for proper calling convention */
|
||||
if (argc != 2) {
|
||||
printf("usage: %s <IPv4 address>\n", argv[0]);
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Create a socket that uses an internet IPv4 address,
|
||||
* Sets the socket to be stream based (TCP),
|
||||
* 0 means choose the default protocol. */
|
||||
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
|
||||
fprintf(stderr, "ERROR: failed to create the socket\n");
|
||||
ret = -1;
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* Initialize the server address struct with zeros */
|
||||
memset(&servAddr, 0, sizeof(servAddr));
|
||||
|
||||
/* Fill in the server address */
|
||||
servAddr.sin_family = AF_INET; /* using IPv4 */
|
||||
servAddr.sin_port = htons(DEFAULT_PORT); /* on DEFAULT_PORT */
|
||||
|
||||
/* Get the server IPv4 address from the command line call */
|
||||
if (inet_pton(AF_INET, argv[1], &servAddr.sin_addr, sizeof(servAddr.sin_addr)) != 1) {
|
||||
fprintf(stderr, "ERROR: invalid address\n");
|
||||
ret = -1;
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* Connect to the server */
|
||||
if ((ret = connect(sockfd, (struct sockaddr*) &servAddr, sizeof(servAddr)))
|
||||
== -1) {
|
||||
fprintf(stderr, "ERROR: failed to connect\n");
|
||||
goto end;
|
||||
}
|
||||
|
||||
/*---------------------------------*/
|
||||
/* Start of security */
|
||||
/*---------------------------------*/
|
||||
/* Initialize wolfSSL */
|
||||
if ((ret = wolfSSL_Init()) != WOLFSSL_SUCCESS) {
|
||||
fprintf(stderr, "ERROR: Failed to initialize the library\n");
|
||||
goto socket_cleanup;
|
||||
}
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_client_method())) == NULL) {
|
||||
fprintf(stderr, "ERROR: failed to create WOLFSSL_CTX\n");
|
||||
ret = -1;
|
||||
goto socket_cleanup;
|
||||
}
|
||||
|
||||
/* Load client certificates into WOLFSSL_CTX */
|
||||
if ((ret = wolfSSL_CTX_load_verify_locations(ctx, CERT_FILE, NULL))
|
||||
!= SSL_SUCCESS) {
|
||||
fprintf(stderr, "ERROR: failed to load %s, please check the file.\n",
|
||||
CERT_FILE);
|
||||
goto ctx_cleanup;
|
||||
}
|
||||
|
||||
/* Create a WOLFSSL object */
|
||||
if ((ssl = wolfSSL_new(ctx)) == NULL) {
|
||||
fprintf(stderr, "ERROR: failed to create WOLFSSL object\n");
|
||||
ret = -1;
|
||||
goto ctx_cleanup;
|
||||
}
|
||||
|
||||
/* Attach wolfSSL to the socket */
|
||||
if ((ret = wolfSSL_set_fd(ssl, sockfd)) != WOLFSSL_SUCCESS) {
|
||||
fprintf(stderr, "ERROR: Failed to set the file descriptor\n");
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
/* Connect to wolfSSL on the server side */
|
||||
if ((ret = wolfSSL_connect(ssl)) != SSL_SUCCESS) {
|
||||
fprintf(stderr, "ERROR: failed to connect to wolfSSL\n");
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
/* Get a message for the server from stdin */
|
||||
printf("Message for server: ");
|
||||
memset(buff, 0, sizeof(buff));
|
||||
if (fgets(buff, sizeof(buff), stdin) == NULL) {
|
||||
fprintf(stderr, "ERROR: failed to get message for server\n");
|
||||
ret = -1;
|
||||
goto cleanup;
|
||||
}
|
||||
len = strnlen(buff, sizeof(buff));
|
||||
|
||||
/* Send the message to the server */
|
||||
if ((ret = wolfSSL_write(ssl, buff, len)) != len) {
|
||||
fprintf(stderr, "ERROR: failed to write entire message\n");
|
||||
fprintf(stderr, "%d bytes of %d bytes were sent", ret, (int) len);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
/* Read the server data into our buff array */
|
||||
memset(buff, 0, sizeof(buff));
|
||||
if ((ret = wolfSSL_read(ssl, buff, sizeof(buff)-1)) == -1) {
|
||||
fprintf(stderr, "ERROR: failed to read\n");
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
/* Print to stdout any data the server sends */
|
||||
printf("Server: %s\n", buff);
|
||||
|
||||
/* Cleanup and return */
|
||||
cleanup:
|
||||
wolfSSL_free(ssl); /* Free the wolfSSL object */
|
||||
ctx_cleanup:
|
||||
wolfSSL_CTX_free(ctx); /* Free the wolfSSL context object */
|
||||
wolfSSL_Cleanup(); /* Cleanup the wolfSSL environment */
|
||||
socket_cleanup:
|
||||
close(sockfd); /* Close the connection to the server */
|
||||
end:
|
||||
return ret; /* Return reporting a success */
|
||||
}
|
||||
11
IDE/MQX/include.am
Normal file
11
IDE/MQX/include.am
Normal file
@@ -0,0 +1,11 @@
|
||||
# vim:ft=automake
|
||||
# included from Top Level Makefile.am
|
||||
# All paths should be given relative to the root
|
||||
|
||||
EXTRA_DIST+= IDE/MQX/client-tls.c
|
||||
EXTRA_DIST+= IDE/MQX/Makefile
|
||||
EXTRA_DIST+= IDE/MQX/README-jp.md
|
||||
EXTRA_DIST+= IDE/MQX/README.md
|
||||
EXTRA_DIST+= IDE/MQX/server-tls.c
|
||||
EXTRA_DIST+= IDE/MQX/user_config.h
|
||||
EXTRA_DIST+= IDE/MQX/user_settings.h
|
||||
194
IDE/MQX/server-tls.c
Normal file
194
IDE/MQX/server-tls.c
Normal file
@@ -0,0 +1,194 @@
|
||||
/* server-tls.c
|
||||
*
|
||||
* Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL. (formerly known as CyaSSL)
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
||||
*/
|
||||
|
||||
/* wolfSSL */
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include <wolfssl/ssl.h>
|
||||
#include <addrinfo.h>
|
||||
|
||||
#define DEFAULT_PORT 11111
|
||||
|
||||
#define CERT_FILE "../certs/server-cert.pem"
|
||||
#define KEY_FILE "../certs/server-key.pem"
|
||||
|
||||
|
||||
|
||||
int main()
|
||||
{
|
||||
int sockfd;
|
||||
int connd;
|
||||
struct sockaddr_in servAddr;
|
||||
struct sockaddr_in clientAddr;
|
||||
socklen_t size = sizeof(clientAddr);
|
||||
char buff[256];
|
||||
size_t len;
|
||||
int shutdown = 0;
|
||||
int ret;
|
||||
const char* reply = "I hear ya fa shizzle!\n";
|
||||
|
||||
/* declare wolfSSL objects */
|
||||
WOLFSSL_CTX* ctx;
|
||||
WOLFSSL* ssl;
|
||||
|
||||
|
||||
|
||||
/* Initialize wolfSSL */
|
||||
wolfSSL_Init();
|
||||
|
||||
|
||||
|
||||
/* Create a socket that uses an internet IPv4 address,
|
||||
* Sets the socket to be stream based (TCP),
|
||||
* 0 means choose the default protocol. */
|
||||
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
|
||||
fprintf(stderr, "ERROR: failed to create the socket\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_server_method())) == NULL) {
|
||||
fprintf(stderr, "ERROR: failed to create WOLFSSL_CTX\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Load server certificates into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_use_certificate_file(ctx, CERT_FILE, SSL_FILETYPE_PEM)
|
||||
!= SSL_SUCCESS) {
|
||||
fprintf(stderr, "ERROR: failed to load %s, please check the file.\n",
|
||||
CERT_FILE);
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Load server key into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_use_PrivateKey_file(ctx, KEY_FILE, SSL_FILETYPE_PEM)
|
||||
!= SSL_SUCCESS) {
|
||||
fprintf(stderr, "ERROR: failed to load %s, please check the file.\n",
|
||||
KEY_FILE);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Initialize the server address struct with zeros */
|
||||
memset(&servAddr, 0, sizeof(servAddr));
|
||||
|
||||
/* Fill in the server address */
|
||||
servAddr.sin_family = AF_INET; /* using IPv4 */
|
||||
servAddr.sin_port = htons(DEFAULT_PORT); /* on DEFAULT_PORT */
|
||||
servAddr.sin_addr.s_addr = INADDR_ANY; /* from anywhere */
|
||||
|
||||
|
||||
|
||||
/* Bind the server socket to our port */
|
||||
if (bind(sockfd, (struct sockaddr*)&servAddr, sizeof(servAddr)) == -1) {
|
||||
fprintf(stderr, "ERROR: failed to bind\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Listen for a new connection, allow 5 pending connections */
|
||||
if (listen(sockfd, 5) == -1) {
|
||||
fprintf(stderr, "ERROR: failed to listen\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Continue to accept clients until shutdown is issued */
|
||||
while (!shutdown) {
|
||||
printf("Waiting for a connection...\n");
|
||||
|
||||
/* Accept client connections */
|
||||
if ((connd = accept(sockfd, (struct sockaddr*)&clientAddr, &size))
|
||||
== -1) {
|
||||
fprintf(stderr, "ERROR: failed to accept the connection\n\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Create a WOLFSSL object */
|
||||
if ((ssl = wolfSSL_new(ctx)) == NULL) {
|
||||
fprintf(stderr, "ERROR: failed to create WOLFSSL object\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Attach wolfSSL to the socket */
|
||||
wolfSSL_set_fd(ssl, connd);
|
||||
|
||||
/* Establish TLS connection */
|
||||
ret = wolfSSL_accept(ssl);
|
||||
if (ret != SSL_SUCCESS) {
|
||||
fprintf(stderr, "wolfSSL_accept error = %d\n",
|
||||
wolfSSL_get_error(ssl, ret));
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
printf("Client connected successfully\n");
|
||||
|
||||
|
||||
|
||||
/* Read the client data into our buff array */
|
||||
memset(buff, 0, sizeof(buff));
|
||||
if (wolfSSL_read(ssl, buff, sizeof(buff)-1) == -1) {
|
||||
fprintf(stderr, "ERROR: failed to read\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Print to stdout any data the client sends */
|
||||
printf("Client: %s\n", buff);
|
||||
|
||||
/* Check for server shutdown command */
|
||||
if (strncmp(buff, "shutdown", 8) == 0) {
|
||||
printf("Shutdown command issued!\n");
|
||||
shutdown = 1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Write our reply into buff */
|
||||
memset(buff, 0, sizeof(buff));
|
||||
memcpy(buff, reply, strlen(reply));
|
||||
len = strnlen(buff, sizeof(buff));
|
||||
|
||||
/* Reply back to the client */
|
||||
if (wolfSSL_write(ssl, buff, len) != len) {
|
||||
fprintf(stderr, "ERROR: failed to write\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Cleanup after this connection */
|
||||
wolfSSL_free(ssl); /* Free the wolfSSL object */
|
||||
close(connd); /* Close the connection to the client */
|
||||
}
|
||||
|
||||
printf("Shutdown complete\n");
|
||||
|
||||
|
||||
|
||||
/* Cleanup and return */
|
||||
wolfSSL_CTX_free(ctx); /* Free the wolfSSL context object */
|
||||
wolfSSL_Cleanup(); /* Cleanup the wolfSSL environment */
|
||||
close(sockfd); /* Close the socket listening for clients */
|
||||
return 0; /* Return reporting a success */
|
||||
}
|
||||
1
IDE/MQX/user_config.h
Normal file
1
IDE/MQX/user_config.h
Normal file
@@ -0,0 +1 @@
|
||||
#define MQX_CPU PSP_CPU_MK60DN512Z
|
||||
63
IDE/MQX/user_settings.h
Normal file
63
IDE/MQX/user_settings.h
Normal file
@@ -0,0 +1,63 @@
|
||||
|
||||
/* wolfSSH */
|
||||
#define WOLFSSL_PUBLIC_MP
|
||||
|
||||
/* TLS1.3 */
|
||||
#define WOLFSSL_TLS13
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_FFDHE_2048
|
||||
#define HAVE_THREAD_LS
|
||||
|
||||
/* SP optimization */
|
||||
#define WOLFSSL_HAVE_SP_RSA
|
||||
#define WOLFSSL_HAVE_SP_DH
|
||||
#define WOLFSSL_SP_4096
|
||||
#define WOLFSSL_HAVE_SP_ECC
|
||||
#define HAVE_ECC384
|
||||
#define WOLFSSL_SP_384
|
||||
|
||||
/* Hardening */
|
||||
#define TFM_TIMING_RESISTANT
|
||||
#define ECC_TIMING_RESISTANT
|
||||
#define WC_RSA_BLINDING
|
||||
|
||||
/* Default Cyphers */
|
||||
#define HAVE_AESGCM
|
||||
#define WOLFSSL_SHA512
|
||||
#define WOLFSSL_SHA384
|
||||
#define HAVE_HKDF
|
||||
#define NO_DSA
|
||||
#define HAVE_ECC
|
||||
#define TFM_ECC256
|
||||
#define ECC_SHAMIR
|
||||
#define WC_RSA_PSS
|
||||
#define WOLFSSL_BASE64_ENCODE
|
||||
#define NO_RC4
|
||||
#define NO_HC128
|
||||
#define NO_RABBIT
|
||||
#define WOLFSSL_SHA224
|
||||
#define WOLFSSL_SHA3
|
||||
#define WOLFSSL_SHAKE256
|
||||
#define HAVE_POLY1305
|
||||
#define HAVE_ONE_TIME_AUTH
|
||||
#define HAVE_CHACHA
|
||||
#define HAVE_HASHDRBG
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_EXTENDED_MASTER
|
||||
#define NO_RC4
|
||||
#define HAVE_ENCRYPT_THEN_MAC
|
||||
#define NO_PSK
|
||||
#define NO_MD4
|
||||
#define NO_PWDBASED
|
||||
#define USE_FAST_MATH
|
||||
#define WC_NO_ASYNC_THREADING
|
||||
#define HAVE_DH_DEFAULT_PARAMS
|
||||
#define NO_DES
|
||||
#define WOLFSSL_DH_CONST
|
||||
|
||||
/* MQX */
|
||||
#define FREESCALE_MQX
|
||||
#define FREESCALE_NO_RNG
|
||||
|
||||
@@ -14,7 +14,7 @@ These examples use the Cube HAL for STM32.
|
||||
|
||||
## Configuration
|
||||
|
||||
The settings for the wolfSSL CubeMX pack are in the generated `wolfSSL.wolfSSL_conf.h` file. An example of this is located in `IDE/STM32Cube/wolfSSL_conf.h` (renamed to avoid possible conflicts with generated file).
|
||||
The settings for the wolfSSL CubeMX pack are in the generated `wolfSSL.I-CUBE-wolfSSL_conf.h` file. An example of this is located in `IDE/STM32Cube/wolfSSL_conf.h` (renamed to avoid possible conflicts with generated file).
|
||||
|
||||
The template used for generation is `IDE/STM32Cube/default_conf.ftl` which can be updated at `STM32Cube/Repository/Packs/wolfSSL/wolfSSL/[Version]/CubeMX/templates/default_conf.ftl`.
|
||||
|
||||
@@ -42,6 +42,37 @@ To enable the latest Cube HAL support please define `STM32_HAL_V2`.
|
||||
|
||||
If you'd like to use the older Standard Peripheral library undefine `WOLFSSL_STM32_CUBEMX`.
|
||||
|
||||
With STM32 Cube HAL v2 some AES GCM hardware has a limitation for the AAD header, which must be a multiple of 4 bytes.
|
||||
|
||||
If using `STM32_AESGCM_PARTIAL` with the following patch it will enable use for all AAD header sizes. The `STM32Cube_FW_F7_V1.16.0` patch is:
|
||||
|
||||
```
|
||||
diff --git a/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h b/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h
|
||||
--- a/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h
|
||||
+++ b/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h
|
||||
@@ -63,6 +63,7 @@ typedef struct
|
||||
GCM : also known as Additional Authentication Data
|
||||
CCM : named B1 composed of the associated data length and Associated Data. */
|
||||
uint32_t HeaderSize; /*!< The size of header buffer in word */
|
||||
+ uint32_t HeaderPadSize; /*!< <PATCH> The size of padding in bytes added to actual header data to pad it to a multiple of 32 bits </PATCH> */
|
||||
uint32_t *B0; /*!< B0 is first authentication block used only in AES CCM mode */
|
||||
uint32_t DataWidthUnit; /*!< Data With Unit, this parameter can be value of @ref CRYP_Data_Width_Unit*/
|
||||
uint32_t KeyIVConfigSkip; /*!< CRYP peripheral Key and IV configuration skip, to config Key and Initialization
|
||||
|
||||
diff --git a/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c b/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c
|
||||
--- a/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c
|
||||
+++ b/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c
|
||||
@@ -132,6 +132,8 @@ HAL_StatusTypeDef HAL_CRYPEx_AESGCM_GenerateAuthTAG(CRYP_HandleTypeDef *hcryp, u
|
||||
uint64_t inputlength = (uint64_t)hcryp->SizesSum * 8U; /* input length in bits */
|
||||
uint32_t tagaddr = (uint32_t)AuthTag;
|
||||
|
||||
+ headerlength -= ((uint64_t)(hcryp->Init.HeaderPadSize) * 8U); /* <PATCH> Decrement the header size removing the pad size </PATCH> */
|
||||
+
|
||||
if (hcryp->State == HAL_CRYP_STATE_READY)
|
||||
{
|
||||
/* Process locked */
|
||||
```
|
||||
|
||||
If you are using FreeRTOS make sure your `FreeRTOSConfig.h` has its `configTOTAL_HEAP_SIZE` increased.
|
||||
|
||||
The TLS client/server benchmark example requires about 76 KB for allocated tasks (with stack) and peak heap. This uses both a TLS client and server to test a TLS connection locally for each enabled TLS cipher suite.
|
||||
|
||||
@@ -11,6 +11,7 @@
|
||||
[#assign s = name]
|
||||
[#assign toto = s?replace(".","_")]
|
||||
[#assign toto = toto?replace("/","")]
|
||||
[#assign toto = toto?replace("-","_")]
|
||||
[#assign inclusion_protection = toto?upper_case]
|
||||
/* Define to prevent recursive inclusion -------------------------------------*/
|
||||
#ifndef __${inclusion_protection}__
|
||||
@@ -85,6 +86,7 @@ extern ${variable.value} ${variable.name};
|
||||
#undef NO_STM32_CRYPTO
|
||||
#define STM32_HAL_V2
|
||||
#define HAL_CONSOLE_UART huart2
|
||||
#define STM32_AESGCM_PARTIAL /* allow partial blocks and add auth info (header) */
|
||||
#elif defined(STM32H753xx)
|
||||
#define WOLFSSL_STM32H7
|
||||
#undef NO_STM32_HASH
|
||||
@@ -128,7 +130,9 @@ extern ${variable.value} ${variable.name};
|
||||
WOLFSSL_STM32F7, WOLFSSL_STM32H7, WOLFSSL_STM32L4 and WOLFSSL_STM32L5 */
|
||||
#define WOLFSSL_STM32F4
|
||||
|
||||
/* Debug UART */
|
||||
/* Debug UART used for printf */
|
||||
/* The UART interface number varies for each board/CPU */
|
||||
/* Typically this is the UART attached to the ST-Link USB CDC UART port */
|
||||
#define HAL_CONSOLE_UART huart4
|
||||
|
||||
/* Hardware Crypto - uncomment as available on hardware */
|
||||
@@ -526,7 +530,7 @@ extern ${variable.value} ${variable.name};
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
#endif /*__ ${inclusion_protection}_H */
|
||||
#endif /* ${inclusion_protection}_H */
|
||||
|
||||
/**
|
||||
* @}
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
/* wolfSSL_conf.h (example of generated wolfSSL.wolfSSL_conf.h)
|
||||
/* wolfSSL_conf.h (example of generated wolfSSL.I-CUBE-wolfSSL_conf.h)
|
||||
*
|
||||
* Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
*
|
||||
@@ -26,94 +26,95 @@
|
||||
* (and not WOLFSSL_USER_SETTINGS or HAVE_CONF_H).
|
||||
*/
|
||||
|
||||
#ifndef __WOLFSSL_WOLFSSL_CONF_H__
|
||||
#define __WOLFSSL_WOLFSSL_CONF_H__
|
||||
#ifndef __WOLFSSL_I_CUBE_WOLFSSL_CONF_H__
|
||||
#define __WOLFSSL_I_CUBE_WOLFSSL_CONF_H__
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
/**
|
||||
MiddleWare name : wolfSSL.I-CUBE-wolfSSL.4.6.0
|
||||
MiddleWare fileName : ./wolfSSL.I-CUBE-wolfSSL_conf.h
|
||||
MiddleWare version :
|
||||
*/
|
||||
|
||||
/*---------- Debug Support -----------*/
|
||||
#define WOLF_CONF_DEBUG 0
|
||||
|
||||
/*---------- wolfCrypt Only -----------*/
|
||||
#define WOLF_CONF_WOLFCRYPT_ONLY 0
|
||||
|
||||
/*---------- TLS v1.3 -----------*/
|
||||
#define WOLF_CONF_TLS13 1
|
||||
|
||||
/*---------- TLS v1.2 -----------*/
|
||||
#define WOLF_CONF_TLS12 1
|
||||
|
||||
/*---------- DTLS Support -----------*/
|
||||
#define WOLF_CONF_DTLS 0
|
||||
|
||||
/*---------- Math Configuration -----------*/
|
||||
#define WOLF_CONF_MATH 4
|
||||
|
||||
/*---------- RTOS -----------*/
|
||||
#define WOLF_CONF_RTOS 2
|
||||
|
||||
/*---------- RSA Support -----------*/
|
||||
#define WOLF_CONF_RSA 1
|
||||
|
||||
/*---------- ECC Support -----------*/
|
||||
#define WOLF_CONF_ECC 1
|
||||
|
||||
/*---------- DH (Diffie–Hellman) Support -----------*/
|
||||
#define WOLF_CONF_DH 1
|
||||
|
||||
/*---------- AES GCM Support -----------*/
|
||||
#define WOLF_CONF_AESGCM 1
|
||||
|
||||
/*---------- AES CBC Support -----------*/
|
||||
#define WOLF_CONF_AESCBC 0
|
||||
|
||||
/*---------- ChaCha20 / Poly1305 Support -----------*/
|
||||
#define WOLF_CONF_CHAPOLY 1
|
||||
|
||||
/*---------- Ed25519 / Curve25519 Support -----------*/
|
||||
#define WOLF_CONF_EDCURVE25519 0
|
||||
|
||||
/*---------- MD5 Support -----------*/
|
||||
#define WOLF_CONF_MD5 0
|
||||
|
||||
/*---------- SHA1 Support -----------*/
|
||||
#define WOLF_CONF_SHA1 0
|
||||
|
||||
/*---------- SHA2-224 Support -----------*/
|
||||
#define WOLF_CONF_SHA2_224 0
|
||||
|
||||
/*---------- SHA2-256 Support -----------*/
|
||||
#define WOLF_CONF_SHA2_256 1
|
||||
|
||||
/*---------- SHA2-384 Support -----------*/
|
||||
#define WOLF_CONF_SHA2_384 0
|
||||
|
||||
/*---------- SHA2-512 Support -----------*/
|
||||
#define WOLF_CONF_SHA2_512 0
|
||||
|
||||
/*---------- SHA3 Support -----------*/
|
||||
#define WOLF_CONF_SHA3 0
|
||||
|
||||
/*---------- Pre-Shared-Key Support -----------*/
|
||||
#define WOLF_CONF_PSK 0
|
||||
|
||||
/*---------- Pwd Based Key Derivation Support -----------*/
|
||||
#define WOLF_CONF_PWDBASED 0
|
||||
|
||||
/*---------- Keep Peer Cert Support -----------*/
|
||||
#define WOLF_CONF_KEEP_PEER_CERT 0
|
||||
|
||||
/*---------- Base64 Encode Support -----------*/
|
||||
#define WOLF_CONF_BASE64_ENCODE 0
|
||||
|
||||
/*---------- OpenSSL Extra Support -----------*/
|
||||
#define WOLF_CONF_OPENSSL_EXTRA 0
|
||||
|
||||
/*---------- wolfCrypt test/benchmark -----------*/
|
||||
#define WOLF_CONF_TEST 1
|
||||
|
||||
/*---------- WOLF_CONF_DEBUG -----------*/
|
||||
#define WOLF_CONF_DEBUG 0
|
||||
|
||||
/*---------- WOLF_CONF_WOLFCRYPT_ONLY -----------*/
|
||||
#define WOLF_CONF_WOLFCRYPT_ONLY 0
|
||||
|
||||
/*---------- WOLF_CONF_TLS13 -----------*/
|
||||
#define WOLF_CONF_TLS13 1
|
||||
|
||||
/*---------- WOLF_CONF_TLS12 -----------*/
|
||||
#define WOLF_CONF_TLS12 1
|
||||
|
||||
/*---------- WOLF_CONF_DTLS -----------*/
|
||||
#define WOLF_CONF_DTLS 0
|
||||
|
||||
/*---------- WOLF_CONF_MATH -----------*/
|
||||
#define WOLF_CONF_MATH 4
|
||||
|
||||
/*---------- WOLF_CONF_RTOS -----------*/
|
||||
#define WOLF_CONF_RTOS 2
|
||||
|
||||
/*---------- WOLF_CONF_RSA -----------*/
|
||||
#define WOLF_CONF_RSA 1
|
||||
|
||||
/*---------- WOLF_CONF_ECC -----------*/
|
||||
#define WOLF_CONF_ECC 1
|
||||
|
||||
/*---------- WOLF_CONF_DH -----------*/
|
||||
#define WOLF_CONF_DH 1
|
||||
|
||||
/*---------- WOLF_CONF_AESGCM -----------*/
|
||||
#define WOLF_CONF_AESGCM 1
|
||||
|
||||
/*---------- WOLF_CONF_AESCBC -----------*/
|
||||
#define WOLF_CONF_AESCBC 0
|
||||
|
||||
/*---------- WOLF_CONF_CHAPOLY -----------*/
|
||||
#define WOLF_CONF_CHAPOLY 1
|
||||
|
||||
/*---------- WOLF_CONF_EDCURVE25519 -----------*/
|
||||
#define WOLF_CONF_EDCURVE25519 0
|
||||
|
||||
/*---------- WOLF_CONF_MD5 -----------*/
|
||||
#define WOLF_CONF_MD5 0
|
||||
|
||||
/*---------- WOLF_CONF_SHA1 -----------*/
|
||||
#define WOLF_CONF_SHA1 0
|
||||
|
||||
/*---------- WOLF_CONF_SHA2_224 -----------*/
|
||||
#define WOLF_CONF_SHA2_224 0
|
||||
|
||||
/*---------- WOLF_CONF_SHA2_256 -----------*/
|
||||
#define WOLF_CONF_SHA2_256 1
|
||||
|
||||
/*---------- WOLF_CONF_SHA2_384 -----------*/
|
||||
#define WOLF_CONF_SHA2_384 0
|
||||
|
||||
/*---------- WOLF_CONF_SHA2_512 -----------*/
|
||||
#define WOLF_CONF_SHA2_512 0
|
||||
|
||||
/*---------- WOLF_CONF_SHA3 -----------*/
|
||||
#define WOLF_CONF_SHA3 0
|
||||
|
||||
/*---------- WOLF_CONF_PSK -----------*/
|
||||
#define WOLF_CONF_PSK 0
|
||||
|
||||
/*---------- WOLF_CONF_PWDBASED -----------*/
|
||||
#define WOLF_CONF_PWDBASED 0
|
||||
|
||||
/*---------- WOLF_CONF_KEEP_PEER_CERT -----------*/
|
||||
#define WOLF_CONF_KEEP_PEER_CERT 0
|
||||
|
||||
/*---------- WOLF_CONF_BASE64_ENCODE -----------*/
|
||||
#define WOLF_CONF_BASE64_ENCODE 0
|
||||
|
||||
/*---------- WOLF_CONF_OPENSSL_EXTRA -----------*/
|
||||
#define WOLF_CONF_OPENSSL_EXTRA 0
|
||||
|
||||
/*---------- WOLF_CONF_TEST -----------*/
|
||||
#define WOLF_CONF_TEST 1
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Hardware platform */
|
||||
@@ -177,9 +178,25 @@ extern "C" {
|
||||
#define NO_STM32_RNG
|
||||
#define WOLFSSL_GENSEED_FORTEST
|
||||
#else
|
||||
#warning Please define a hardware platform!
|
||||
#define WOLFSSL_STM32F4 /* default */
|
||||
#warning Please define a hardware platform!
|
||||
/* This means there is not a pre-defined platform for your board/CPU */
|
||||
/* You need to define a CPU type, HW crypto and debug UART */
|
||||
/* CPU Type: WOLFSSL_STM32F1, WOLFSSL_STM32F2, WOLFSSL_STM32F4,
|
||||
WOLFSSL_STM32F7, WOLFSSL_STM32H7, WOLFSSL_STM32L4 and WOLFSSL_STM32L5 */
|
||||
#define WOLFSSL_STM32F4
|
||||
|
||||
/* Debug UART used for printf */
|
||||
/* The UART interface number varies for each board/CPU */
|
||||
/* Typically this is the UART attached to the ST-Link USB CDC UART port */
|
||||
#define HAL_CONSOLE_UART huart4
|
||||
|
||||
/* Hardware Crypto - uncomment as available on hardware */
|
||||
//#define WOLFSSL_STM32_PKA
|
||||
//#define NO_STM32_RNG
|
||||
//#undef NO_STM32_HASH
|
||||
//#undef NO_STM32_CRYPTO
|
||||
//#define WOLFSSL_GENSEED_FORTEST
|
||||
//#define STM32_HAL_V2
|
||||
#endif
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
@@ -257,7 +274,7 @@ extern "C" {
|
||||
#if defined(WOLF_CONF_PWDBASED) && WOLF_CONF_PWDBASED == 0
|
||||
#define NO_PWDBASED
|
||||
#endif
|
||||
#if defined(WOLF_CONF_KEEPPEERCERT) && WOLF_CONF_KEEPPEERCERT == 1
|
||||
#if defined(WOLF_CONF_KEEP_PEER_CERT) && WOLF_CONF_KEEP_PEER_CERT == 1
|
||||
#define KEEP_PEER_CERT
|
||||
#endif
|
||||
#if defined(WOLF_CONF_BASE64_ENCODE) && WOLF_CONF_BASE64_ENCODE == 1
|
||||
@@ -380,7 +397,7 @@ extern "C" {
|
||||
#define HAVE_AES_DECRYPT
|
||||
#endif
|
||||
|
||||
/* Other possible AES modes */
|
||||
/* Other possible AES modes */
|
||||
//#define WOLFSSL_AES_COUNTER
|
||||
//#define HAVE_AESCCM
|
||||
//#define WOLFSSL_AES_XTS
|
||||
@@ -558,4 +575,4 @@ extern "C" {
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif /*__WOLFSSL_WOLFSSL_CONF_H__ */
|
||||
#endif /* __WOLFSSL_I_CUBE_WOLFSSL_CONF_H__ */
|
||||
|
||||
6
IDE/VisualDSP/include.am
Normal file
6
IDE/VisualDSP/include.am
Normal file
@@ -0,0 +1,6 @@
|
||||
# vim:ft=automake
|
||||
# included from Top Level Makefile.am
|
||||
# All paths should be given relative to the root
|
||||
|
||||
EXTRA_DIST+= IDE/VisualDSP/user_settings.h
|
||||
EXTRA_DIST+= IDE/VisualDSP/wolf_tasks.c
|
||||
752
IDE/VisualDSP/user_settings.h
Normal file
752
IDE/VisualDSP/user_settings.h
Normal file
@@ -0,0 +1,752 @@
|
||||
/* user_settings.h
|
||||
*
|
||||
* Copyright (C) 2006-2021 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
/* Custom wolfSSL user settings for FIPS VALIDATION START */
|
||||
|
||||
#ifndef WOLFSSL_USER_SETTINGS_H
|
||||
#define WOLFSSL_USER_SETTINGS_H
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#include "fusioncfg.h"
|
||||
|
||||
/* Previously was included in ssl.c but for the sake of portability and existing
|
||||
* projects, moved to IDE specific user_settings.h (stdarg.h include)
|
||||
*/
|
||||
#include <stdarg.h>
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Platform */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
#undef WOLFSSL_GENERAL_ALIGNMENT
|
||||
#define WOLFSSL_GENERAL_ALIGNMENT 4
|
||||
|
||||
#undef SINGLE_THREADED
|
||||
#define SINGLE_THREADED
|
||||
|
||||
#undef WOLFSSL_SMALL_STACK
|
||||
//#define WOLFSSL_SMALL_STACK
|
||||
|
||||
#undef WOLFSSL_USER_IO
|
||||
// #define WOLFSSL_USER_IO
|
||||
|
||||
#define HAVE_PKCS8
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Math Configuration */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
#undef SIZEOF_LONG_LONG
|
||||
#define SIZEOF_LONG_LONG 8
|
||||
|
||||
#undef USE_FAST_MATH
|
||||
#if 1
|
||||
#define USE_FAST_MATH
|
||||
|
||||
#undef TFM_TIMING_RESISTANT
|
||||
#define TFM_TIMING_RESISTANT
|
||||
|
||||
/* Optimizations */
|
||||
//#define TFM_ARM
|
||||
#endif
|
||||
|
||||
/* Wolf Single Precision Math */
|
||||
#undef WOLFSSL_SP
|
||||
#if 0
|
||||
#define WOLFSSL_SP
|
||||
//#define WOLFSSL_SP_SMALL /* use smaller version of code */
|
||||
#define WOLFSSL_HAVE_SP_RSA
|
||||
#define WOLFSSL_HAVE_SP_DH
|
||||
#define WOLFSSL_HAVE_SP_ECC
|
||||
#define WOLFSSL_SP_CACHE_RESISTANT
|
||||
//#define WOLFSSL_SP_MATH /* only SP math - eliminates fast math code */
|
||||
|
||||
/* 64 or 32 bit version */
|
||||
//#define WOLFSSL_SP_ASM /* required if using the ASM versions */
|
||||
//#define WOLFSSL_SP_ARM32_ASM
|
||||
//#define WOLFSSL_SP_ARM64_ASM
|
||||
#endif
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* FIPS - Requires eval or license from wolfSSL */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
#undef HAVE_FIPS
|
||||
#if 1
|
||||
#define HAVE_FIPS
|
||||
|
||||
#undef HAVE_FIPS_VERSION
|
||||
#define HAVE_FIPS_VERSION 2
|
||||
|
||||
#ifdef SINGLE_THREADED
|
||||
#undef NO_THREAD_LS
|
||||
#define NO_THREAD_LS
|
||||
#endif
|
||||
|
||||
#define NO_ATTRIBUTE_CONSTRUCTOR /* Required on ADSP BLACKFIN where memory
|
||||
* is zeroized after
|
||||
* __attribute__((constructor)) and before
|
||||
* main();
|
||||
*/
|
||||
#endif
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Crypto */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* RSA */
|
||||
#undef NO_RSA
|
||||
#if 1
|
||||
#ifdef USE_FAST_MATH
|
||||
/* Maximum math bits (Max RSA key bits * 2) */
|
||||
#undef FP_MAX_BITS
|
||||
#define FP_MAX_BITS 8192
|
||||
#endif
|
||||
|
||||
/* half as much memory but twice as slow */
|
||||
#undef RSA_LOW_MEM
|
||||
//#define RSA_LOW_MEM
|
||||
|
||||
/* Enables blinding mode, to prevent timing attacks */
|
||||
#if 1
|
||||
#undef WC_RSA_BLINDING
|
||||
#define WC_RSA_BLINDING
|
||||
#else
|
||||
#undef WC_NO_HARDEN
|
||||
#define WC_NO_HARDEN
|
||||
#endif
|
||||
|
||||
/* RSA PSS Support */
|
||||
#if 1
|
||||
#define WC_RSA_PSS
|
||||
#endif
|
||||
|
||||
#if 1
|
||||
#define WC_RSA_NO_PADDING
|
||||
#endif
|
||||
#else
|
||||
#define NO_RSA
|
||||
#endif
|
||||
|
||||
/* ECC */
|
||||
#undef HAVE_ECC
|
||||
#if 1
|
||||
#define HAVE_ECC
|
||||
|
||||
/* Manually define enabled curves */
|
||||
#undef ECC_USER_CURVES
|
||||
//#define ECC_USER_CURVES
|
||||
|
||||
#ifdef ECC_USER_CURVES
|
||||
/* Manual Curve Selection */
|
||||
//#define HAVE_ECC192
|
||||
//#define HAVE_ECC224
|
||||
#undef NO_ECC256
|
||||
//#define HAVE_ECC384
|
||||
//#define HAVE_ECC521
|
||||
#endif
|
||||
|
||||
/* Fixed point cache (speeds repeated operations against same private key) */
|
||||
#undef FP_ECC
|
||||
//#define FP_ECC
|
||||
#ifdef FP_ECC
|
||||
/* Bits / Entries */
|
||||
#undef FP_ENTRIES
|
||||
#define FP_ENTRIES 2
|
||||
#undef FP_LUT
|
||||
#define FP_LUT 4
|
||||
#endif
|
||||
|
||||
/* Optional ECC calculation method */
|
||||
/* Note: doubles heap usage, but slightly faster */
|
||||
#undef ECC_SHAMIR
|
||||
#define ECC_SHAMIR
|
||||
|
||||
/* Reduces heap usage, but slower */
|
||||
#undef ECC_TIMING_RESISTANT
|
||||
#define ECC_TIMING_RESISTANT
|
||||
|
||||
/* Enable cofactor support */
|
||||
#ifdef HAVE_FIPS
|
||||
#undef HAVE_ECC_CDH
|
||||
#define HAVE_ECC_CDH
|
||||
|
||||
#define NO_STRICT_ECDSA_LEN
|
||||
#endif
|
||||
|
||||
/* Validate import */
|
||||
#ifdef HAVE_FIPS
|
||||
#undef WOLFSSL_VALIDATE_ECC_IMPORT
|
||||
#define WOLFSSL_VALIDATE_ECC_IMPORT
|
||||
#endif
|
||||
|
||||
/* Compressed Key Support */
|
||||
#undef HAVE_COMP_KEY
|
||||
//#define HAVE_COMP_KEY
|
||||
|
||||
/* Use alternate ECC size for ECC math */
|
||||
#ifdef USE_FAST_MATH
|
||||
#ifdef NO_RSA
|
||||
/* Custom fastmath size if not using RSA */
|
||||
/* MAX = ROUND32(ECC BITS 256) + SIZE_OF_MP_DIGIT(32) */
|
||||
#undef FP_MAX_BITS
|
||||
#define FP_MAX_BITS (256 + 32)
|
||||
#else
|
||||
#undef ALT_ECC_SIZE
|
||||
#define ALT_ECC_SIZE
|
||||
#endif
|
||||
|
||||
/* Speedups specific to curve */
|
||||
#ifndef NO_ECC256
|
||||
#undef TFM_ECC256
|
||||
#define TFM_ECC256
|
||||
#endif
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* DH */
|
||||
#undef NO_DH
|
||||
#if 1
|
||||
/* Use table for DH instead of -lm (math) lib dependency */
|
||||
#if 0
|
||||
#define WOLFSSL_DH_CONST
|
||||
#define HAVE_FFDHE_2048
|
||||
#define HAVE_FFDHE_4096
|
||||
#define HAVE_DH_DEFAULT_PARAMS
|
||||
//#define HAVE_FFDHE_6144
|
||||
//#define HAVE_FFDHE_8192
|
||||
#endif
|
||||
|
||||
#ifdef HAVE_FIPS
|
||||
#define WOLFSSL_VALIDATE_FFC_IMPORT
|
||||
#define HAVE_FFDHE_Q
|
||||
#endif
|
||||
#else
|
||||
#define NO_DH
|
||||
#endif
|
||||
|
||||
|
||||
/* AES */
|
||||
#undef NO_AES
|
||||
#if 1
|
||||
#undef HAVE_AES_CBC
|
||||
#define HAVE_AES_CBC
|
||||
|
||||
#undef HAVE_AESGCM
|
||||
#define HAVE_AESGCM
|
||||
|
||||
/* GCM Method: GCM_SMALL, GCM_WORD32 or GCM_TABLE */
|
||||
#define GCM_SMALL
|
||||
|
||||
#undef WOLFSSL_AES_DIRECT
|
||||
#define WOLFSSL_AES_DIRECT
|
||||
|
||||
#undef HAVE_AES_ECB
|
||||
#define HAVE_AES_ECB
|
||||
|
||||
#undef WOLFSSL_AES_COUNTER
|
||||
#define WOLFSSL_AES_COUNTER
|
||||
|
||||
#undef HAVE_AESCCM
|
||||
#define HAVE_AESCCM
|
||||
#else
|
||||
#define NO_AES
|
||||
#endif
|
||||
|
||||
|
||||
/* DES3 */
|
||||
#undef NO_DES3
|
||||
#if 1
|
||||
#else
|
||||
#define NO_DES3
|
||||
#endif
|
||||
|
||||
/* ChaCha20 / Poly1305 */
|
||||
#undef HAVE_CHACHA
|
||||
#undef HAVE_POLY1305
|
||||
#if 0
|
||||
#define HAVE_CHACHA
|
||||
#define HAVE_POLY1305
|
||||
|
||||
/* Needed for Poly1305 */
|
||||
#undef HAVE_ONE_TIME_AUTH
|
||||
#define HAVE_ONE_TIME_AUTH
|
||||
#endif
|
||||
|
||||
/* Ed25519 / Curve25519 */
|
||||
#undef HAVE_CURVE25519
|
||||
#undef HAVE_ED25519
|
||||
#if 0
|
||||
#define HAVE_CURVE25519
|
||||
#define HAVE_ED25519 /* ED25519 Requires SHA512 */
|
||||
|
||||
/* Optionally use small math (less flash usage, but much slower) */
|
||||
#if 1
|
||||
#define CURVED25519_SMALL
|
||||
#endif
|
||||
#endif
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Hashing */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Sha */
|
||||
#undef NO_SHA
|
||||
#if 1
|
||||
/* 1k smaller, but 25% slower */
|
||||
//#define USE_SLOW_SHA
|
||||
#else
|
||||
#define NO_SHA
|
||||
#endif
|
||||
|
||||
/* Sha256 */
|
||||
#undef NO_SHA256
|
||||
#if 1
|
||||
/* not unrolled - ~2k smaller and ~25% slower */
|
||||
//#define USE_SLOW_SHA256
|
||||
|
||||
/* Sha224 */
|
||||
#if 1
|
||||
#define WOLFSSL_SHA224
|
||||
#endif
|
||||
#else
|
||||
#define NO_SHA256
|
||||
#endif
|
||||
|
||||
/* Sha512 */
|
||||
#undef WOLFSSL_SHA512
|
||||
#if 1
|
||||
#define WOLFSSL_SHA512
|
||||
|
||||
/* Sha384 */
|
||||
#undef WOLFSSL_SHA384
|
||||
#if 1
|
||||
#define WOLFSSL_SHA384
|
||||
#endif
|
||||
|
||||
/* over twice as small, but 50% slower */
|
||||
//#define USE_SLOW_SHA512
|
||||
#endif
|
||||
|
||||
/* Sha3 */
|
||||
#undef WOLFSSL_SHA3
|
||||
#if 1
|
||||
#define WOLFSSL_SHA3
|
||||
#ifdef HAVE_FIPS
|
||||
#define WOLFSSL_NO_SHAKE256
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* MD5 */
|
||||
#undef NO_MD5
|
||||
#if 1
|
||||
|
||||
#else
|
||||
#define NO_MD5
|
||||
#endif
|
||||
|
||||
/* HKDF */
|
||||
#undef HAVE_HKDF
|
||||
#if 1
|
||||
#define HAVE_HKDF
|
||||
#endif
|
||||
|
||||
/* CMAC */
|
||||
#undef WOLFSSL_CMAC
|
||||
#if 1
|
||||
#define WOLFSSL_CMAC
|
||||
#endif
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Benchmark / Test */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Use reduced benchmark / test sizes */
|
||||
#undef BENCH_EMBEDDED
|
||||
#define BENCH_EMBEDDED
|
||||
|
||||
#undef USE_CERT_BUFFERS_2048
|
||||
//#define USE_CERT_BUFFERS_2048
|
||||
|
||||
//#undef USE_CERT_BUFFERS_1024
|
||||
//#define USE_CERT_BUFFERS_1024
|
||||
|
||||
#undef USE_CERT_BUFFERS_256
|
||||
//#define USE_CERT_BUFFERS_256
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Debugging */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
|
||||
#undef DEBUG_WOLFSSL
|
||||
#undef NO_ERROR_STRINGS
|
||||
#if 1 //for debug wolfssl_init.
|
||||
#define DEBUG_WOLFSSL
|
||||
#else
|
||||
#if 0
|
||||
#define NO_ERROR_STRINGS
|
||||
#endif
|
||||
#endif
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Memory */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
|
||||
/* Override Memory API's */
|
||||
#if 1
|
||||
#undef XMALLOC_OVERRIDE
|
||||
#define XMALLOC_OVERRIDE
|
||||
|
||||
#include <fclstdlib.h>
|
||||
|
||||
#define XMALLOC(n, h, t) FCL_MALLOC(n)
|
||||
#define XFREE(p, h, t) FCL_FREE(p)
|
||||
#define XREALLOC(p, n, h, t) FCL_REALLOC(p, n)
|
||||
|
||||
#define XATOI(s) FCL_ATOI(s)
|
||||
#endif
|
||||
|
||||
#if 0
|
||||
/* Static memory requires fast math */
|
||||
#define WOLFSSL_STATIC_MEMORY
|
||||
|
||||
/* Disable fallback malloc/free */
|
||||
#define WOLFSSL_NO_MALLOC
|
||||
#if 0
|
||||
#define WOLFSSL_MALLOC_CHECK /* trap malloc failure */
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* Memory callbacks */
|
||||
#if 0
|
||||
#undef USE_WOLFSSL_MEMORY
|
||||
#define USE_WOLFSSL_MEMORY
|
||||
|
||||
/* Use this to measure / print heap usage */
|
||||
#if 0
|
||||
#undef WOLFSSL_TRACK_MEMORY
|
||||
#define WOLFSSL_TRACK_MEMORY
|
||||
|
||||
#undef WOLFSSL_DEBUG_MEMORY
|
||||
#define WOLFSSL_DEBUG_MEMORY
|
||||
#endif
|
||||
#else
|
||||
#ifndef WOLFSSL_STATIC_MEMORY
|
||||
#define NO_WOLFSSL_MEMORY
|
||||
/* Otherwise we will use stdlib malloc, free and realloc */
|
||||
#endif
|
||||
#endif
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Port */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
|
||||
/* Override Current Time */
|
||||
/* Allows custom "custom_time()" function to be used for benchmark */
|
||||
//#define WOLFSSL_USER_CURRTIME
|
||||
//#define WOLFSSL_GMTIME
|
||||
//#define USER_TICKS
|
||||
//extern unsigned long my_time(unsigned long* timer);
|
||||
//#define XTIME my_time
|
||||
#if 1
|
||||
#include "fcltime.h"
|
||||
#define time_t fclTime_t
|
||||
#define USER_TIME
|
||||
time_t fclTime( time_t* tod );
|
||||
#define XTIME fclTime
|
||||
#define XCTIME fclCtime
|
||||
#define HAVE_TIME_T_TYPE
|
||||
#endif
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* RNG */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
|
||||
/* Seed Source */
|
||||
/* Size of returned HW RNG value */
|
||||
#if 0
|
||||
#define CUSTOM_RAND_TYPE unsigned int
|
||||
extern unsigned int my_rng_seed_gen(void);
|
||||
#undef CUSTOM_RAND_GENERATE
|
||||
#define CUSTOM_RAND_GENERATE my_rng_seed_gen
|
||||
#endif
|
||||
|
||||
/* Choose RNG method */
|
||||
#if 1
|
||||
/* Use built-in P-RNG (SHA256 based) with HW RNG */
|
||||
/* P-RNG + HW RNG (P-RNG is ~8K) */
|
||||
#undef HAVE_HASHDRBG
|
||||
#define HAVE_HASHDRBG
|
||||
#else
|
||||
#undef WC_NO_HASHDRBG
|
||||
#define WC_NO_HASHDRBG
|
||||
/* Bypass P-RNG and use only HW RNG */
|
||||
extern int my_rng_gen_block(unsigned char* output, unsigned int sz);
|
||||
#undef CUSTOM_RAND_GENERATE_BLOCK
|
||||
#define CUSTOM_RAND_GENERATE_BLOCK my_rng_gen_block
|
||||
#endif
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Custom Standard Lib */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Allows override of all standard library functions */
|
||||
#undef STRING_USER
|
||||
#if 1
|
||||
#define STRING_USER
|
||||
|
||||
#include <fclstring.h>
|
||||
|
||||
#undef USE_WOLF_STRSEP
|
||||
#define USE_WOLF_STRSEP
|
||||
#define XSTRSEP(s1,d) wc_strsep((s1),(d))
|
||||
|
||||
#undef USE_WOLF_STRTOK
|
||||
#define USE_WOLF_STRTOK
|
||||
#define XSTRTOK(s1,d,ptr) wc_strtok((s1),(d),(ptr))
|
||||
|
||||
#define XSTRNSTR(s1,s2,n) FCL_STRSTR((s1),(s2))
|
||||
|
||||
#define XMEMCPY(d,s,l) FCL_MEMCPY((d),(s),(l))
|
||||
#define XMEMSET(b,c,l) FCL_MEMSET((b),(c),(l))
|
||||
#define XMEMCMP(s1,s2,n) FCL_MEMCMP((s1),(s2),(n))
|
||||
#define XMEMMOVE(d,s,l) FCL_MEMMOVE((d),(s),(l))
|
||||
|
||||
#define XSTRLEN(s1) FCL_STRLEN((s1))
|
||||
#define XSTRNCPY(s1,s2,n) FCL_STRNCPY((s1),(s2),(n))
|
||||
#define XSTRSTR(s1,s2) FCL_STRSTR((s1),(s2))
|
||||
|
||||
#define XSTRNCMP(s1,s2,n) FCL_STRNCMP((s1),(s2),(n))
|
||||
#define XSTRNCAT(s1,s2,n) FCL_STRNCAT((s1),(s2),(n))
|
||||
#define XSTRNCASECMP(s1,s2,n) FCL_STRNCASECMP((s1),(s2),(n))
|
||||
|
||||
#define XSNPRINTF FCL_SNPRINTF
|
||||
#endif
|
||||
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Enable Features */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
#undef WOLFSSL_TLS13
|
||||
#if 0
|
||||
#define WOLFSSL_TLS13
|
||||
#endif
|
||||
|
||||
#undef WOLFSSL_KEY_GEN
|
||||
#if 1
|
||||
#define WOLFSSL_KEY_GEN
|
||||
#endif
|
||||
|
||||
#if defined(HAVE_FIPS) && !defined(WOLFSSL_KEY_GEN)
|
||||
#define WOLFSSL_OLD_PRIME_CHECK
|
||||
#endif
|
||||
|
||||
#undef KEEP_PEER_CERT
|
||||
//#define KEEP_PEER_CERT
|
||||
|
||||
#undef HAVE_COMP_KEY
|
||||
//#define HAVE_COMP_KEY
|
||||
|
||||
#undef HAVE_TLS_EXTENSIONS
|
||||
//#define HAVE_TLS_EXTENSIONS
|
||||
|
||||
#undef HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
|
||||
#undef WOLFSSL_BASE64_ENCODE
|
||||
#define WOLFSSL_BASE64_ENCODE
|
||||
|
||||
/* TLS Session Cache */
|
||||
#if 0
|
||||
#define SMALL_SESSION_CACHE
|
||||
#else
|
||||
// #define NO_SESSION_CACHE
|
||||
#endif
|
||||
|
||||
|
||||
#undef WOLFSSL_ALLOW_SSLV3
|
||||
#define WOLFSSL_ALLOW_SSLV3
|
||||
|
||||
#undef WOLFSSL_ALLOW_TLSV10
|
||||
#define WOLFSSL_ALLOW_TLSV10
|
||||
|
||||
|
||||
/* ------------------------------------------------------------------------- */
|
||||
/* Disable Features */
|
||||
/* ------------------------------------------------------------------------- */
|
||||
#undef NO_WOLFSSL_SERVER
|
||||
//#define NO_WOLFSSL_SERVER
|
||||
|
||||
#undef NO_WOLFSSL_CLIENT
|
||||
//#define NO_WOLFSSL_CLIENT
|
||||
|
||||
#undef NO_CRYPT_TEST
|
||||
//#define NO_CRYPT_TEST
|
||||
|
||||
#undef NO_CRYPT_BENCHMARK
|
||||
//#define NO_CRYPT_BENCHMARK
|
||||
|
||||
#undef WOLFCRYPT_ONLY
|
||||
//#define WOLFCRYPT_ONLY
|
||||
|
||||
/* In-lining of misc.c functions */
|
||||
/* If defined, must include wolfcrypt/src/misc.c in build */
|
||||
/* Slower, but about 1k smaller */
|
||||
#undef NO_INLINE
|
||||
//#define NO_INLINE
|
||||
|
||||
#undef NO_FILESYSTEM
|
||||
//#define NO_FILESYSTEM
|
||||
|
||||
#undef NO_WRITEV
|
||||
#define NO_WRITEV
|
||||
|
||||
#undef NO_MAIN_DRIVER
|
||||
#define NO_MAIN_DRIVER
|
||||
|
||||
#undef NO_DEV_RANDOM
|
||||
//#define NO_DEV_RANDOM
|
||||
|
||||
#undef NO_DSA
|
||||
//#define NO_DSA
|
||||
|
||||
#undef NO_RC4
|
||||
#define NO_RC4
|
||||
|
||||
#undef NO_OLD_TLS
|
||||
//#define NO_OLD_TLS
|
||||
|
||||
#undef NO_HC128
|
||||
#define NO_HC128
|
||||
|
||||
#undef NO_RABBIT
|
||||
#define NO_RABBIT
|
||||
|
||||
#undef NO_PSK
|
||||
#define NO_PSK
|
||||
|
||||
#undef NO_MD4
|
||||
#define NO_MD4
|
||||
|
||||
#undef NO_PWDBASED
|
||||
//#define NO_PWDBASED
|
||||
|
||||
#undef NO_CODING
|
||||
//#define NO_CODING
|
||||
|
||||
#undef NO_ASN_TIME
|
||||
//#define NO_ASN_TIME
|
||||
|
||||
#undef NO_CERTS
|
||||
//#define NO_CERTS
|
||||
|
||||
#undef NO_SIG_WRAPPER
|
||||
//#define NO_SIG_WRAPPER
|
||||
|
||||
#undef NO_MAIN_DRIVER
|
||||
#define NO_MAIN_DRIVER
|
||||
|
||||
#undef BLACKFIN_BUILD
|
||||
#define BLACKFIN_BUILD
|
||||
|
||||
#ifdef BLACKFIN_BUILD
|
||||
|
||||
#include <builtins.h>
|
||||
|
||||
#undef WOLFSSL_HAVE_MAX
|
||||
#define WOLFSSL_HAVE_MAX
|
||||
|
||||
#undef WOLFSSL_HAVE_MIN
|
||||
#define WOLFSSL_HAVE_MIN
|
||||
|
||||
#include <fss_telnet_shell.h>
|
||||
|
||||
#define XMALLOC_OVERRIDE /* Need to use FCL stdlib instead of stdlib.h */
|
||||
|
||||
extern void * fclMalloc (unsigned int size);
|
||||
extern void fclFree (void * memoryPointer);
|
||||
extern void * fclRealloc (void * memoryPointer, unsigned int size);
|
||||
#define XMALLOC(a, b, c) fclMalloc(a)
|
||||
#define XFREE(a, b, c) fclFree(a)
|
||||
#define XREALLOC(a, b, c, d) fclRealloc(a, b)
|
||||
|
||||
/*************************************************************
|
||||
* wolfSSL testing
|
||||
*/
|
||||
|
||||
typedef struct wolfArgs {
|
||||
int argc;
|
||||
char** argv;
|
||||
int return_code;
|
||||
struct fssShellInfo* info;
|
||||
} wolfArgs;
|
||||
|
||||
#define printf FCL_PRINTF
|
||||
|
||||
#define WOLFSSL_BASE16
|
||||
|
||||
extern int aes_test_for_fips_hash(void);
|
||||
int wolfcrypt_test_taskEnter(void *args);
|
||||
int wolfcrypt_harness_taskEnter(void *args);
|
||||
int wolf_task_start(void* voidinfo, char* argline);
|
||||
int wolf_task_results(void* voidinfo, char* argline);
|
||||
void wolfFIPS_Module_start(void);
|
||||
|
||||
/* For op testing */
|
||||
#define USE_CERT_BUFFERS_2048
|
||||
#define USE_CERT_BUFFERS_256
|
||||
//#define NO_FILESYSTEM
|
||||
|
||||
#define OPENSSL_EXTRA
|
||||
#define OPENSSL_ALL
|
||||
#define HAVE_EX_DATA
|
||||
#define WOLFSSL_EVP_DECRYPT_LEGACY
|
||||
|
||||
|
||||
/* TLS 1.3 support */
|
||||
#define WOLFSSL_TLS13
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_ECC
|
||||
#define HAVE_HKDF
|
||||
#define HAVE_FFDHE_4096
|
||||
#define WC_RSA_PSS
|
||||
|
||||
/* for static ciphers */
|
||||
#define WOLFSSL_STATIC_RSA
|
||||
#define WOLFSSL_STATIC_PSK
|
||||
#define WOLFSSL_STATIC_EPHEMERAL
|
||||
#define WOLFSSL_SNIFFER
|
||||
|
||||
/* TEMPORARY */
|
||||
#define USING_JTAG
|
||||
#endif /* BLACKFIN_BUILD */
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif /* WOLFSSL_USER_SETTINGS_H */
|
||||
|
||||
117
IDE/VisualDSP/wolf_tasks.c
Normal file
117
IDE/VisualDSP/wolf_tasks.c
Normal file
@@ -0,0 +1,117 @@
|
||||
/* wolf-tasks.c
|
||||
*
|
||||
* Copyright (C) 2006-2021 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include <wolfcrypt/test/test.h>
|
||||
#include <wolfssl/wolfcrypt/error-crypt.h>
|
||||
#include <wolfssl/wolfcrypt/fips_test.h>
|
||||
#ifdef FUSION_RTOS
|
||||
#include <fcl_os.h>
|
||||
|
||||
#define RESULT_BUF_SIZE 1024
|
||||
|
||||
typedef struct {
|
||||
int isRunning;
|
||||
u8 buf[RESULT_BUF_SIZE];
|
||||
int len;
|
||||
} wolf_result_t;
|
||||
|
||||
static wolf_result_t _result = {0};
|
||||
|
||||
static void myFipsCb(int ok, int err, const char* hash);
|
||||
|
||||
static void myFipsCb(int ok, int err, const char* hash)
|
||||
{
|
||||
|
||||
FCL_PRINTF("in my Fips callback, ok = %d, err = %d\n", ok, err);
|
||||
FCL_PRINTF("message = %s\n", wc_GetErrorString(err));
|
||||
FCL_PRINTF("hash = %s\n", hash);
|
||||
|
||||
if (err == IN_CORE_FIPS_E) {
|
||||
FCL_PRINTF("In core integrity hash check failure, copy above hash\n");
|
||||
FCL_PRINTF("into verifyCore[] in fips_test.c and rebuild\n");
|
||||
}
|
||||
}
|
||||
|
||||
static fclThreadHandle _task = NULL;
|
||||
#define WOLF_TASK_STACK_SIZE (1024 * 100)
|
||||
fclThreadPriority WOLF_TASK_PRIORITY = (fclThreadPriority) (FCL_THREAD_PRIORITY_TIME_CRITICAL+1);
|
||||
|
||||
int wolfcrypt_test_taskEnter(void *args)
|
||||
{
|
||||
int ret;
|
||||
|
||||
wolfCrypt_SetCb_fips(myFipsCb);
|
||||
|
||||
ret = wolfcrypt_test(args);
|
||||
|
||||
printf("Result of test was %d\n", ret);
|
||||
|
||||
_result.isRunning = 0;
|
||||
fosTaskDelete(_task);
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Was only needed for CAVP testing purposes, not required for release.
|
||||
int wolfcrypt_harness_taskEnter(void *args)
|
||||
{
|
||||
wolfCrypt_SetCb_fips(myFipsCb);
|
||||
wolfcrypt_harness(args);
|
||||
_result.isRunning = 0;
|
||||
fosTaskDelete(_task);
|
||||
return 0;
|
||||
}
|
||||
*/
|
||||
|
||||
int wolf_task_start(void* voidinfo, char* argline)
|
||||
{
|
||||
char optionA[] = "wolfcrypt_test";
|
||||
fssShellInfo *info = (fssShellInfo*)voidinfo;
|
||||
struct wolfArgs args;
|
||||
|
||||
if (_result.isRunning) {
|
||||
fssShellPuts(info, "previous task still running\r\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
_result.isRunning = 1;
|
||||
|
||||
if (FCL_STRNCMP(argline, optionA, FCL_STRLEN(optionA)) == 0) {
|
||||
_task = fclThreadCreate(wolfcrypt_test_taskEnter,
|
||||
&args,
|
||||
WOLF_TASK_STACK_SIZE,
|
||||
WOLF_TASK_PRIORITY);
|
||||
} else if (FCL_STRNCMP(argline, optionB, FCL_STRLEN(optionB)) == 0) {
|
||||
_task = fclThreadCreate(wolfcrypt_harness_taskEnter,
|
||||
&args,
|
||||
WOLF_TASK_STACK_SIZE,
|
||||
WOLF_TASK_PRIORITY);
|
||||
} else {
|
||||
printf("Invalid input: %s\n", argline);
|
||||
printf("Please try with either wolfcrypt_test or wolfcrypt_harness\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
FCL_ASSERT(_task != FCL_THREAD_HANDLE_INVALID);
|
||||
|
||||
return 0;
|
||||
}
|
||||
#endif /* FUSION_RTOS */
|
||||
@@ -20,6 +20,7 @@ include IDE/CSBENCH/include.am
|
||||
include IDE/ECLIPSE/DEOS/include.am
|
||||
include IDE/ECLIPSE/MICRIUM/include.am
|
||||
include IDE/ECLIPSE/SIFIVE/include.am
|
||||
include IDE/MQX/include.am
|
||||
include IDE/ECLIPSE/RTTHREAD/include.am
|
||||
include IDE/mynewt/include.am
|
||||
include IDE/Renesas/e2studio/DK-S7G2/include.am
|
||||
@@ -34,6 +35,7 @@ include IDE/M68K/include.am
|
||||
include IDE/HEXAGON/include.am
|
||||
include IDE/RISCV/include.am
|
||||
include IDE/XilinxSDK/include.am
|
||||
include IDE/VisualDSP/include.am
|
||||
|
||||
EXTRA_DIST+= IDE/IAR-EWARM IDE/MDK-ARM IDE/MDK5-ARM IDE/MYSQL IDE/LPCXPRESSO IDE/HEXIWEAR IDE/Espressif IDE/zephyr
|
||||
EXTRA_DIST+= IDE/OPENSTM32/README.md
|
||||
|
||||
@@ -27,7 +27,9 @@ DIST_SUBDIRS_OPT =
|
||||
@INC_AMINCLUDE@
|
||||
DISTCLEANFILES+= aminclude.am
|
||||
|
||||
CLEANFILES+= cert.der \
|
||||
CLEANFILES+= ecc-key.der \
|
||||
ecc-public-key.der \
|
||||
cert.der \
|
||||
cert.pem \
|
||||
certecc.der \
|
||||
certecc.pem \
|
||||
|
||||
181
README
181
README
@@ -73,155 +73,56 @@ should be used for the enum name.
|
||||
*** end Notes ***
|
||||
|
||||
|
||||
# wolfSSL Release 4.6.0 (December 22, 2020)
|
||||
Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
# wolfSSL Release 4.7.0 (February 16, 2021)
|
||||
Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
||||
### New Feature Additions
|
||||
###### New Build Options
|
||||
* wolfSSL now enables linux kernel module support. Big news for Linux kernel module developers with crypto requirements! wolfCrypt and wolfSSL are now loadable as modules in the Linux kernel, providing the entire libwolfssl API natively to other kernel modules. For the first time on Linux, the entire TLS protocol stack can be loaded as a module, allowing fully kernel-resident TLS/DTLS endpoints with in-kernel handshaking. (--enable-linuxkm, --enable-linuxkm-defaults, --with-linux-source) (https://www.wolfssl.com/loading-wolfssl-into-the-linux-kernel/)
|
||||
* Build tests and updated instructions for use with Apple’s A12Z chipset (https://www.wolfssl.com/preliminary-cryptographic-benchmarks-on-new-apple-a12z-bionic-platform/)
|
||||
* Expansion of wolfSSL SP math implementation and addition of --enable-sp-math-all build option
|
||||
* Apache httpd w/TLS 1.3 support added
|
||||
* Sniffer support for TLS 1.3 and AES CCM
|
||||
* Support small memory footprint build with only TLS 1.3 and PSK without code for (EC)DHE and certificates
|
||||
|
||||
###### New Hardware Acceleration
|
||||
* Added support for NXP DCP (i.MX RT1060/1062) crypto co-processor
|
||||
* Add Silicon Labs hardware acceleration using [SL SE Manager](https://docs.silabs.com/gecko-platform/latest/service/api/group-sl-se-manager)
|
||||
|
||||
###### New Algorithms
|
||||
* RC2 ECB/CBC added for use with PKCS#12 bundles
|
||||
* XChaCha and the XChaCha20-Poly1305 AEAD algorithm support added
|
||||
|
||||
###### Misc
|
||||
* Added support for 802.11Q VLAN frames to sniffer
|
||||
* Added OCSP function wolfSSL_get_ocsp_producedDate
|
||||
* Added API to set CPU ID flags cpuid_select_flags, cpuid_set_flag, cpuid_clear_flag
|
||||
* New DTLS/TLS non-blocking Secure Renegotiation example added to server.c and client.c
|
||||
* Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API, X509_STORE_CTX API added
|
||||
* WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
|
||||
* Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session tickets with TLS 1.2 while keeping TLS 1.3 session tickets available
|
||||
* Implement RFC 5705: Keying Material Exporters for TLS
|
||||
* Added --enable-reproducible-build flag for making more deterministic library outputs to assist debugging
|
||||
|
||||
### Fixes
|
||||
###### Math Library
|
||||
* Fix mp_to_unsigned_bin_len out of bounds read with buffers longer than maximum MP
|
||||
* Fix for fp_read_radix_16 out of bounds read
|
||||
* Fix to add wrapper for new timing resistant wc_ecc_mulmod_ex2 function version in HW ECC acceleration
|
||||
* Handle an edge case with RSA-PSS encoding message to hash
|
||||
* Fix to free mutex when cert manager is free’d
|
||||
* Compatibility layer EVP function to return the correct block size and type
|
||||
* DTLS secure renegotiation fixes including resetting timeout and retransmit on duplicate HelloRequest
|
||||
* Fix for edge case with shrink buffer and secure renegotiation
|
||||
* Compile fix for type used with curve448 and PPC64
|
||||
* Fixes for SP math all with PPC64 and other embedded compilers
|
||||
* SP math all fix when performing montgomery reduction on one word modulus
|
||||
* Fixes to SP math all to better support digit size of 8-bit
|
||||
* Fix for results of edge case with SP integer square operation
|
||||
* Stop non-ct mod inv from using register x29 with SP ARM64 build
|
||||
* Fix edge case when generating z value of ECC with SP code
|
||||
* Fixes for PKCS7 with crypto callback (devId) with RSA and RNG
|
||||
* Fix for compiling builds with RSA verify and public only
|
||||
* Fix for PKCS11 not properly exporting the public key due to a missing key type field
|
||||
* Call certificate callback with certificate depth issues
|
||||
* Fix for out-of-bounds read in TLSX_CSR_Parse()
|
||||
* Fix incorrect AES-GCM tag generation in the EVP layer
|
||||
* Fix for out of bounds write with SP math all enabled and an edge case of calling sp_tohex on the result of sp_mont_norm
|
||||
* Fix for parameter check in sp_rand_prime to handle 0 length values
|
||||
* Fix for edge case of failing malloc resulting in an out of bounds write with SHA256/SHA512 when small stack is enabled
|
||||
|
||||
###### Compatibility Layer Fixes
|
||||
* Fix for setting serial number wolfSSL_X509_set_serialNumber
|
||||
* Fix for setting ASN1 time not before / not after with WOLFSSL_X509
|
||||
* Fix for order of components in issuer name when using X509_sign
|
||||
* Fix for compatibility layer API DH_compute_key
|
||||
* EVP fix incorrect block size for GCM and buffer up AAD for encryption/decryption
|
||||
* EVP fix for AES-XTS key length return value and fix for string compare calls
|
||||
* Fix for mutex freeing during RNG failure case with EVP_KEY creation
|
||||
* Non blocking use with compatibility layer BIOs in TLS connections
|
||||
|
||||
###### Build Configuration
|
||||
* Fix for custom build with WOLFSSL_USER_MALLOC defined
|
||||
* ED448 compiler warning on Intel 32bit systems
|
||||
* CURVE448_SMALL build fix for 32bit systems with Curve448
|
||||
* Fix to build SP math with IAR
|
||||
* CMake fix to only set ranlib arguments for Mac, and for stray typo of , -> ;
|
||||
* Build with --enable-wpas=small fix
|
||||
* Fix for building fips ready using openssl extra
|
||||
* Fixes for building with Microchip (min/max and undef SHA_BLOCK_SIZE)
|
||||
* FIx for NO_FILESYSTEM build on Windows
|
||||
* Fixed SHA256 support for IMX-RT1060
|
||||
* Fix for ECC key gen with NO_TFM_64BIT
|
||||
|
||||
###### Sniffer
|
||||
* Fixes for sniffer when using static ECC keys. Adds back TLS v1.2 static ECC key fallback detection and fixes new ECC RNG requirement for timing resistance
|
||||
* Fix for sniffer with SNI enabled to properly handle WOLFSSL_SUCCESS error code in ProcessClientHello
|
||||
* Fix for sniffer using HAVE_MAX_FRAGMENT in "certificate" type message
|
||||
* Fix build error with unused "ret" when building with WOLFSSL_SNIFFER_WATCH.
|
||||
* Fix to not treat cert/key not found as error in myWatchCb and WOLFSSL_SNIFFER_WATCH.
|
||||
* Sniffer fixes for handling TCP `out-of-range sequence number`
|
||||
* Fixes SSLv3 use of ECDH in sniffer
|
||||
|
||||
###### PKCS
|
||||
* PKCS#11 fix to generate ECC key for decrypt/sign or derive
|
||||
* Fix for resetting internal variables when parsing a malformed PKCS#7 bundle with PKCS7_VerifySignedData()
|
||||
* Verify the extracted public key in wc_PKCS7_InitWithCert
|
||||
* Fix for internal buffer size when using decompression with PKCS#7
|
||||
|
||||
###### Misc
|
||||
* Pin the C# verify callback function to keep from garbage collection
|
||||
* DH fixes for when public key is owned and free’d after a handshake
|
||||
* Fix for TLS 1.3 early data packets
|
||||
* Fix for STM32 issue with some Cube HAL versions and STM32 example timeout
|
||||
* Fix mmCAU and LTC hardware mutex locking to prevent double lock
|
||||
* Fix potential race condition with CRL monitor
|
||||
* Fix for possible malformed encrypted key with 3DES causing negative length
|
||||
* AES-CTR performance fixed with AES-NI
|
||||
|
||||
### Improvements/Optimizations
|
||||
##### SP and Math
|
||||
* mp_radix_size adjustment for leading 0
|
||||
* Resolve implicit cast warnings with SP build
|
||||
* Change mp_sqr to return an error if the result won't fit into the fixed length dp
|
||||
* ARM64 assembly with clang improvements, clang doesn't always handle use of x29 (FP or Frame Pointer) in inline assembly code correctly - reworked sp_2048_sqr_8 to not use x29
|
||||
* SP mod exp changed to support exponents of different lengths
|
||||
* TFM div: fix initial value of size in q so clamping doesn't OOB read
|
||||
* Numerous stack depth improvements with --enable-smallstack
|
||||
* Improve cache resistance with Base64 operations
|
||||
* Added --enable-wolftpm option for easily building wolfSSL to be used with wolfTPM
|
||||
* DTLS macro WOLFSSL_DTLS_RESEND_ONLY_TIMEOUT added for resending flight only after a timeout
|
||||
* Update linux kernel module to use kvmalloc and kvfree
|
||||
* Add user settings option to cmake build
|
||||
* Added support for AES GCM session ticket encryption
|
||||
* Thread protection for global RNG used by wolfSSL_RAND_bytes function calls
|
||||
* Sanity check on FIPs configure flag used against the version of FIPs bundle
|
||||
* --enable-aesgcm=table now is compatible with --enable-linuxkm
|
||||
* Increase output buffer size that wolfSSL_RAND_bytes can handle
|
||||
* Out of directory builds resolved, wolfSSL can now be built in a separate directory than the root wolfssl directory
|
||||
|
||||
###### TLS 1.3
|
||||
* TLS 1.3 wolfSSL_peek want read return addition
|
||||
* TLS 1.3: Fix P-521 algorithm matching
|
||||
### Vulnerabilities
|
||||
* [HIGH] CVE-2021-3336: In earlier versions of wolfSSL there exists a potential man in the middle attack on TLS 1.3 clients. Malicious attackers with a privileged network position can impersonate TLS 1.3 servers and bypass authentication. Users that have applications with client side code and have TLS 1.3 turned on, should update to the latest version of wolfSSL. Users that do not have TLS 1.3 turned on, or that are server side only, are NOT affected by this report. For the code change see https://github.com/wolfSSL/wolfssl/pull/3676.
|
||||
* [LOW] In the case of using custom ECC curves there is the potential for a crafted compressed ECC key that has a custom prime value to cause a hang when imported. This only affects applications that are loading in ECC keys with wolfSSL builds that have compressed ECC keys and custom ECC curves enabled.
|
||||
* [LOW] With TLS 1.3 authenticated-only ciphers a section of the server hello could contain 16 bytes of uninitialized data when sent to the connected peer. This affects only a specific build of wolfSSL with TLS 1.3 early data enabled and using authenticated-only ciphers with TLS 1.3.
|
||||
|
||||
###### PKCS
|
||||
* Improvements and refactoring to PKCS#11 key look up
|
||||
* PKCS #11 changes for signing and loading RSA public key from private
|
||||
* check PKCS#7 SignedData private key is valid before using it
|
||||
* check PKCS#7 VerifySignedData content length against total bundle size to avoid large malloc
|
||||
|
||||
###### Compatibility Layer
|
||||
* EVP add block size for more ciphers in wolfSSL_EVP_CIPHER_block_size()
|
||||
* Return long names instead of short names in wolfSSL_OBJ_obj2txt()
|
||||
* Add additional OpenSSL compatibility functions to update the version of Apache httpd supported
|
||||
* add "CCM8" variants to cipher_names "CCM-8" ciphers, for OpenSSL compat
|
||||
|
||||
###### Builds
|
||||
* Cortex-M SP ASM support for IAR 6.70
|
||||
* STM Cube pack support (IDE/STM32Cube)
|
||||
* Build option --enable-aesgcm=4bit added for AES-GCM GMULT using 4 bit table
|
||||
* Xilinx IDE updates to allow XTIME override for Xilinx, spelling fixes in Xilinx README.md, and add Xilinx SDK printf support
|
||||
* Added ED448 to the "all" options and ED448 check key null argument sanity check
|
||||
* Added ARC4, 3DES, nullcipher, BLAKE2, BLAKE2s, XChaCha, MD2, and MD4 to the “all” options
|
||||
* Added an --enable-all-crypto option, to enable only the wolfCrypt features of --enable-all, combinable with --enable-cryptonly
|
||||
* Added the ability to selectively remove features from --enable-all and --enable-all-crypto using specific --disable-<feature> options
|
||||
* Use Intel intrinsics with Windows for RDSEED and RDRAND (thanks to dr-m from MariaDB)
|
||||
* Add option to build with WOLFSSL_NO_CLIENT_AUTH
|
||||
* Updated build requirements for wolfSSH use to be less restrictive
|
||||
* lighttpd support update for v1.4.56
|
||||
* Added batch file to copy files to ESP-IDF folders and resolved warnings when using v4.0 ESP-IDF
|
||||
* Added --enable-stacksize=verbose, showing at a glance the stack high water mark for each subtest in testwolfcrypt
|
||||
|
||||
###### ECC
|
||||
* Performance increase for ECC verify only, using non constant time SP modinv
|
||||
* During ECC verify add validation of r and s before any use
|
||||
* Always use safe add and dbl with ECC
|
||||
* Timing resistant scalar multiplication updated with use of Joye double-add ladder
|
||||
* Update mp_jacobi function to reduce stack and increase performance for base ECC build
|
||||
* Reduce heap memory use with wc_EccPrivateKeyDecode, Improvement to ECC wc_ecc_sig_to_rs and wc_ecc_rs_raw_to_sig to reduce memory use (avoid the mp_int)
|
||||
* Improve StoreECC_DSA_Sig bounds checking
|
||||
|
||||
###### OCSP
|
||||
* OCSP improvement to handle extensions in singleResponse
|
||||
* support for OCSP request/response for multiple certificates
|
||||
* OCSP Must Staple option added to require OCSP stapling response
|
||||
* Add support for id-pkix-ocsp-nocheck extension
|
||||
|
||||
###### Misc
|
||||
* Additional code coverage added for ECC and RSA, PKCS#7, 3DES, EVP and Blake2b operations
|
||||
* DTLS MTU: check MTU on write
|
||||
* Refactor hash sig selection and add the macros WOLFSSL_STRONGEST_HASH_SIG (picks the strongest hash) and WOLFSSL_ECDSA_MATCH_HASH (will pick the hash to match the ECC curve)
|
||||
* Strict certificate version allowed from client, TLS 1.2 / 1.3 can not accept client certificates lower than version 3
|
||||
* wolfSSL_get_ciphers_compat(), skip the fake indicator ciphers like the renegotiation indication and the quantum-safe hybrid
|
||||
* When parsing session ticket, check TLS version to see whether they are version compatible
|
||||
* Additional sanity check for invalid ASN1 padding on integer type
|
||||
* Adding in ChaCha20 streaming feature with Mac and Intel assembly build
|
||||
* Sniffer build with --enable-oldtls option on
|
||||
|
||||
For additional vulnerability information visit the vulnerability page at
|
||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||
|
||||
287
README.md
287
README.md
@@ -1,227 +1,130 @@
|
||||
*** Description ***
|
||||
<a href="https://repology.org/project/wolfssl/versions">
|
||||
<img src="https://repology.org/badge/vertical-allrepos/wolfssl.svg" alt="Packaging status" align="right">
|
||||
</a>
|
||||
|
||||
The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS
|
||||
library written in ANSI C and targeted for embedded, RTOS, and
|
||||
resource-constrained environments - primarily because of its small size, speed,
|
||||
and feature set. It is commonly used in standard operating environments as well
|
||||
because of its royalty-free pricing and excellent cross platform support.
|
||||
wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.2
|
||||
levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers
|
||||
such as ChaCha20, Curve25519, NTRU, and Blake2b. User benchmarking and feedback
|
||||
reports dramatically better performance when using wolfSSL over OpenSSL.
|
||||
# wolfSSL Embedded SSL/TLS Library
|
||||
|
||||
wolfSSL is powered by the wolfCrypt library. Two versions of the wolfCrypt
|
||||
cryptography library have been FIPS 140-2 validated (Certificate #2425 and
|
||||
certificate #3389). For additional information, visit the wolfCrypt FIPS FAQ
|
||||
(https://www.wolfssl.com/license/fips/) or contact fips@wolfssl.com
|
||||
The [wolfSSL embedded SSL library](https://www.wolfssl.com/products/wolfssl/)
|
||||
(formerly CyaSSL) is a lightweight SSL/TLS library written in ANSI C and
|
||||
targeted for embedded, RTOS, and resource-constrained environments - primarily
|
||||
because of its small size, speed, and feature set. It is commonly used in
|
||||
standard operating environments as well because of its royalty-free pricing
|
||||
and excellent cross platform support. wolfSSL supports industry standards up
|
||||
to the current [TLS 1.3](https://www.wolfssl.com/tls13) and DTLS 1.2, is up to
|
||||
20 times smaller than OpenSSL, and offers progressive ciphers such as ChaCha20,
|
||||
Curve25519, NTRU, and Blake2b. User benchmarking and feedback reports
|
||||
dramatically better performance when using wolfSSL over OpenSSL.
|
||||
|
||||
*** Why choose wolfSSL? ***
|
||||
wolfSSL is powered by the wolfCrypt cryptography library. Two versions of
|
||||
wolfCrypt have been FIPS 140-2 validated (Certificate #2425 and
|
||||
certificate #3389). FIPS 140-3 validation is in progress. For additional
|
||||
information, visit the [wolfCrypt FIPS FAQ](https://www.wolfssl.com/license/fips/)
|
||||
or contact fips@wolfssl.com.
|
||||
|
||||
There are many reasons to choose wolfSSL as your embedded SSL solution. Some of
|
||||
the top reasons include size (typical footprint sizes range from 20-100 kB),
|
||||
support for the newest standards (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3,
|
||||
DTLS 1.0, and DTLS 1.2), current and progressive cipher support (including
|
||||
stream ciphers), multi-platform, royalty free, and an OpenSSL compatibility API
|
||||
to ease porting into existing applications which have previously used the
|
||||
OpenSSL package. For a complete feature list, see chapter 4 of the wolfSSL
|
||||
manual. (https://www.wolfssl.com/docs/wolfssl-manual/ch4/)
|
||||
## Why Choose wolfSSL?
|
||||
|
||||
*** Notes, Please read ***
|
||||
There are many reasons to choose wolfSSL as your embedded, desktop, mobile, or
|
||||
enterprise SSL/TLS solution. Some of the top reasons include size (typical
|
||||
footprint sizes range from 20-100 kB), support for the newest standards
|
||||
(SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3, DTLS 1.0, and DTLS 1.2), current
|
||||
and progressive cipher support (including stream ciphers), multi-platform,
|
||||
royalty free, and an OpenSSL compatibility API to ease porting into existing
|
||||
applications which have previously used the OpenSSL package. For a complete
|
||||
feature list, see [Chapter 4](https://www.wolfssl.com/docs/wolfssl-manual/ch4/)
|
||||
of the wolfSSL manual.
|
||||
|
||||
Note 1)
|
||||
## Notes, Please Read
|
||||
|
||||
**Note 1)**
|
||||
wolfSSL as of 3.6.6 no longer enables SSLv3 by default. wolfSSL also no longer
|
||||
supports static key cipher suites with PSK, RSA, or ECDH. This means if you
|
||||
plan to use TLS cipher suites you must enable DH (DH is on by default), or
|
||||
enable ECC (ECC is on by default), or you must enable static key cipher suites
|
||||
with
|
||||
with one or more of the following defines:
|
||||
|
||||
WOLFSSL_STATIC_DH
|
||||
WOLFSSL_STATIC_RSA
|
||||
or
|
||||
WOLFSSL_STATIC_PSK
|
||||
|
||||
though static key cipher suites are deprecated and will be removed from future
|
||||
Though static key cipher suites are deprecated and will be removed from future
|
||||
versions of TLS. They also lower your security by removing PFS. Since current
|
||||
NTRU suites available do not use ephemeral keys, WOLFSSL_STATIC_RSA needs to be
|
||||
used in order to build with NTRU suites.
|
||||
NTRU suites available do not use ephemeral keys, ```WOLFSSL_STATIC_RSA``` needs
|
||||
to be used in order to build with NTRU suites.
|
||||
|
||||
When compiling ssl.c, wolfSSL will now issue a compiler error if no cipher
|
||||
suites are available. You can remove this error by defining
|
||||
WOLFSSL_ALLOW_NO_SUITES in the event that you desire that, i.e., you're not
|
||||
using TLS cipher suites.
|
||||
```WOLFSSL_ALLOW_NO_SUITES``` in the event that you desire that, i.e., you're
|
||||
not using TLS cipher suites.
|
||||
|
||||
Note 2)
|
||||
**Note 2)**
|
||||
wolfSSL takes a different approach to certificate verification than OpenSSL
|
||||
does. The default policy for the client is to verify the server, this means
|
||||
that if you don't load CAs to verify the server you'll get a connect error,
|
||||
no signer error to confirm failure (-188).
|
||||
|
||||
If you want to mimic OpenSSL behavior of having SSL_connect succeed even if
|
||||
If you want to mimic OpenSSL behavior of having SSL\_connect succeed even if
|
||||
verifying the server fails and reducing security you can do this by calling:
|
||||
|
||||
wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
|
||||
|
||||
before calling wolfSSL_new();. Though it's not recommended.
|
||||
before calling wolfSSL\_new();. Though it's not recommended.
|
||||
|
||||
Note 3)
|
||||
**Note 3)**
|
||||
The enum values SHA, SHA256, SHA384, SHA512 are no longer available when
|
||||
wolfSSL is built with --enable-opensslextra (OPENSSL_EXTRA) or with the macro
|
||||
NO_OLD_SHA_NAMES. These names get mapped to the OpenSSL API for a single call
|
||||
hash function. Instead the name WC_SHA, WC_SHA256, WC_SHA384 and WC_SHA512
|
||||
should be used for the enum name.
|
||||
wolfSSL is built with --enable-opensslextra (```OPENSSL_EXTRA```) or with the
|
||||
macro ```NO_OLD_SHA_NAMES```. These names get mapped to the OpenSSL API for a
|
||||
single call hash function. Instead the name WC_SHA, WC_SHA256, WC_SHA384 and
|
||||
WC_SHA512 should be used for the enum name.
|
||||
|
||||
*** end Notes ***
|
||||
|
||||
|
||||
# wolfSSL Release 4.6.0 (December 22, 2020)
|
||||
Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
# wolfSSL Release 4.7.0 (February 16, 2021)
|
||||
Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
||||
### New Feature Additions
|
||||
###### New Build Options
|
||||
* wolfSSL now enables linux kernel module support. Big news for Linux kernel module developers with crypto requirements! wolfCrypt and wolfSSL are now loadable as modules in the Linux kernel, providing the entire libwolfssl API natively to other kernel modules. For the first time on Linux, the entire TLS protocol stack can be loaded as a module, allowing fully kernel-resident TLS/DTLS endpoints with in-kernel handshaking. (--enable-linuxkm, --enable-linuxkm-defaults, --with-linux-source) (https://www.wolfssl.com/loading-wolfssl-into-the-linux-kernel/)
|
||||
* Build tests and updated instructions for use with Apple’s A12Z chipset (https://www.wolfssl.com/preliminary-cryptographic-benchmarks-on-new-apple-a12z-bionic-platform/)
|
||||
* Expansion of wolfSSL SP math implementation and addition of --enable-sp-math-all build option
|
||||
* Apache httpd w/TLS 1.3 support added
|
||||
* Sniffer support for TLS 1.3 and AES CCM
|
||||
* Support small memory footprint build with only TLS 1.3 and PSK without code for (EC)DHE and certificates
|
||||
|
||||
###### New Hardware Acceleration
|
||||
* Added support for NXP DCP (i.MX RT1060/1062) crypto co-processor
|
||||
* Add Silicon Labs hardware acceleration using [SL SE Manager](https://docs.silabs.com/gecko-platform/latest/service/api/group-sl-se-manager)
|
||||
|
||||
###### New Algorithms
|
||||
* RC2 ECB/CBC added for use with PKCS#12 bundles
|
||||
* XChaCha and the XChaCha20-Poly1305 AEAD algorithm support added
|
||||
|
||||
###### Misc
|
||||
* Added support for 802.11Q VLAN frames to sniffer
|
||||
* Added OCSP function wolfSSL_get_ocsp_producedDate
|
||||
* Added API to set CPU ID flags cpuid_select_flags, cpuid_set_flag, cpuid_clear_flag
|
||||
* New DTLS/TLS non-blocking Secure Renegotiation example added to server.c and client.c
|
||||
* Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API, X509_STORE_CTX API added
|
||||
* WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
|
||||
* Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session tickets with TLS 1.2 while keeping TLS 1.3 session tickets available
|
||||
* Implement RFC 5705: Keying Material Exporters for TLS
|
||||
* Added --enable-reproducible-build flag for making more deterministic library outputs to assist debugging
|
||||
|
||||
### Fixes
|
||||
###### Math Library
|
||||
* Fix mp_to_unsigned_bin_len out of bounds read with buffers longer than maximum MP
|
||||
* Fix for fp_read_radix_16 out of bounds read
|
||||
* Fix to add wrapper for new timing resistant wc_ecc_mulmod_ex2 function version in HW ECC acceleration
|
||||
* Handle an edge case with RSA-PSS encoding message to hash
|
||||
* Fix to free mutex when cert manager is free’d
|
||||
* Compatibility layer EVP function to return the correct block size and type
|
||||
* DTLS secure renegotiation fixes including resetting timeout and retransmit on duplicate HelloRequest
|
||||
* Fix for edge case with shrink buffer and secure renegotiation
|
||||
* Compile fix for type used with curve448 and PPC64
|
||||
* Fixes for SP math all with PPC64 and other embedded compilers
|
||||
* SP math all fix when performing montgomery reduction on one word modulus
|
||||
* Fixes to SP math all to better support digit size of 8-bit
|
||||
* Fix for results of edge case with SP integer square operation
|
||||
* Stop non-ct mod inv from using register x29 with SP ARM64 build
|
||||
* Fix edge case when generating z value of ECC with SP code
|
||||
* Fixes for PKCS7 with crypto callback (devId) with RSA and RNG
|
||||
* Fix for compiling builds with RSA verify and public only
|
||||
* Fix for PKCS11 not properly exporting the public key due to a missing key type field
|
||||
* Call certificate callback with certificate depth issues
|
||||
* Fix for out-of-bounds read in TLSX_CSR_Parse()
|
||||
* Fix incorrect AES-GCM tag generation in the EVP layer
|
||||
* Fix for out of bounds write with SP math all enabled and an edge case of calling sp_tohex on the result of sp_mont_norm
|
||||
* Fix for parameter check in sp_rand_prime to handle 0 length values
|
||||
* Fix for edge case of failing malloc resulting in an out of bounds write with SHA256/SHA512 when small stack is enabled
|
||||
|
||||
###### Compatibility Layer Fixes
|
||||
* Fix for setting serial number wolfSSL_X509_set_serialNumber
|
||||
* Fix for setting ASN1 time not before / not after with WOLFSSL_X509
|
||||
* Fix for order of components in issuer name when using X509_sign
|
||||
* Fix for compatibility layer API DH_compute_key
|
||||
* EVP fix incorrect block size for GCM and buffer up AAD for encryption/decryption
|
||||
* EVP fix for AES-XTS key length return value and fix for string compare calls
|
||||
* Fix for mutex freeing during RNG failure case with EVP_KEY creation
|
||||
* Non blocking use with compatibility layer BIOs in TLS connections
|
||||
|
||||
###### Build Configuration
|
||||
* Fix for custom build with WOLFSSL_USER_MALLOC defined
|
||||
* ED448 compiler warning on Intel 32bit systems
|
||||
* CURVE448_SMALL build fix for 32bit systems with Curve448
|
||||
* Fix to build SP math with IAR
|
||||
* CMake fix to only set ranlib arguments for Mac, and for stray typo of , -> ;
|
||||
* Build with --enable-wpas=small fix
|
||||
* Fix for building fips ready using openssl extra
|
||||
* Fixes for building with Microchip (min/max and undef SHA_BLOCK_SIZE)
|
||||
* FIx for NO_FILESYSTEM build on Windows
|
||||
* Fixed SHA256 support for IMX-RT1060
|
||||
* Fix for ECC key gen with NO_TFM_64BIT
|
||||
|
||||
###### Sniffer
|
||||
* Fixes for sniffer when using static ECC keys. Adds back TLS v1.2 static ECC key fallback detection and fixes new ECC RNG requirement for timing resistance
|
||||
* Fix for sniffer with SNI enabled to properly handle WOLFSSL_SUCCESS error code in ProcessClientHello
|
||||
* Fix for sniffer using HAVE_MAX_FRAGMENT in "certificate" type message
|
||||
* Fix build error with unused "ret" when building with WOLFSSL_SNIFFER_WATCH.
|
||||
* Fix to not treat cert/key not found as error in myWatchCb and WOLFSSL_SNIFFER_WATCH.
|
||||
* Sniffer fixes for handling TCP `out-of-range sequence number`
|
||||
* Fixes SSLv3 use of ECDH in sniffer
|
||||
|
||||
###### PKCS
|
||||
* PKCS#11 fix to generate ECC key for decrypt/sign or derive
|
||||
* Fix for resetting internal variables when parsing a malformed PKCS#7 bundle with PKCS7_VerifySignedData()
|
||||
* Verify the extracted public key in wc_PKCS7_InitWithCert
|
||||
* Fix for internal buffer size when using decompression with PKCS#7
|
||||
|
||||
###### Misc
|
||||
* Pin the C# verify callback function to keep from garbage collection
|
||||
* DH fixes for when public key is owned and free’d after a handshake
|
||||
* Fix for TLS 1.3 early data packets
|
||||
* Fix for STM32 issue with some Cube HAL versions and STM32 example timeout
|
||||
* Fix mmCAU and LTC hardware mutex locking to prevent double lock
|
||||
* Fix potential race condition with CRL monitor
|
||||
* Fix for possible malformed encrypted key with 3DES causing negative length
|
||||
* AES-CTR performance fixed with AES-NI
|
||||
|
||||
### Improvements/Optimizations
|
||||
##### SP and Math
|
||||
* mp_radix_size adjustment for leading 0
|
||||
* Resolve implicit cast warnings with SP build
|
||||
* Change mp_sqr to return an error if the result won't fit into the fixed length dp
|
||||
* ARM64 assembly with clang improvements, clang doesn't always handle use of x29 (FP or Frame Pointer) in inline assembly code correctly - reworked sp_2048_sqr_8 to not use x29
|
||||
* SP mod exp changed to support exponents of different lengths
|
||||
* TFM div: fix initial value of size in q so clamping doesn't OOB read
|
||||
* Numerous stack depth improvements with --enable-smallstack
|
||||
* Improve cache resistance with Base64 operations
|
||||
* Added --enable-wolftpm option for easily building wolfSSL to be used with wolfTPM
|
||||
* DTLS macro WOLFSSL_DTLS_RESEND_ONLY_TIMEOUT added for resending flight only after a timeout
|
||||
* Update linux kernel module to use kvmalloc and kvfree
|
||||
* Add user settings option to cmake build
|
||||
* Added support for AES GCM session ticket encryption
|
||||
* Thread protection for global RNG used by wolfSSL_RAND_bytes function calls
|
||||
* Sanity check on FIPs configure flag used against the version of FIPs bundle
|
||||
* --enable-aesgcm=table now is compatible with --enable-linuxkm
|
||||
* Increase output buffer size that wolfSSL_RAND_bytes can handle
|
||||
* Out of directory builds resolved, wolfSSL can now be built in a separate directory than the root wolfssl directory
|
||||
|
||||
###### TLS 1.3
|
||||
* TLS 1.3 wolfSSL_peek want read return addition
|
||||
* TLS 1.3: Fix P-521 algorithm matching
|
||||
|
||||
###### PKCS
|
||||
* Improvements and refactoring to PKCS#11 key look up
|
||||
* PKCS #11 changes for signing and loading RSA public key from private
|
||||
* check PKCS#7 SignedData private key is valid before using it
|
||||
* check PKCS#7 VerifySignedData content length against total bundle size to avoid large malloc
|
||||
|
||||
###### Compatibility Layer
|
||||
* EVP add block size for more ciphers in wolfSSL_EVP_CIPHER_block_size()
|
||||
* Return long names instead of short names in wolfSSL_OBJ_obj2txt()
|
||||
* Add additional OpenSSL compatibility functions to update the version of Apache httpd supported
|
||||
* add "CCM8" variants to cipher_names "CCM-8" ciphers, for OpenSSL compat
|
||||
|
||||
###### Builds
|
||||
* Cortex-M SP ASM support for IAR 6.70
|
||||
* STM Cube pack support (IDE/STM32Cube)
|
||||
* Build option --enable-aesgcm=4bit added for AES-GCM GMULT using 4 bit table
|
||||
* Xilinx IDE updates to allow XTIME override for Xilinx, spelling fixes in Xilinx README.md, and add Xilinx SDK printf support
|
||||
* Added ED448 to the "all" options and ED448 check key null argument sanity check
|
||||
* Added ARC4, 3DES, nullcipher, BLAKE2, BLAKE2s, XChaCha, MD2, and MD4 to the “all” options
|
||||
* Added an --enable-all-crypto option, to enable only the wolfCrypt features of --enable-all, combinable with --enable-cryptonly
|
||||
* Added the ability to selectively remove features from --enable-all and --enable-all-crypto using specific --disable-<feature> options
|
||||
* Use Intel intrinsics with Windows for RDSEED and RDRAND (thanks to dr-m from MariaDB)
|
||||
* Add option to build with WOLFSSL_NO_CLIENT_AUTH
|
||||
* Updated build requirements for wolfSSH use to be less restrictive
|
||||
* lighttpd support update for v1.4.56
|
||||
* Added batch file to copy files to ESP-IDF folders and resolved warnings when using v4.0 ESP-IDF
|
||||
* Added --enable-stacksize=verbose, showing at a glance the stack high water mark for each subtest in testwolfcrypt
|
||||
|
||||
###### ECC
|
||||
* Performance increase for ECC verify only, using non constant time SP modinv
|
||||
* During ECC verify add validation of r and s before any use
|
||||
* Always use safe add and dbl with ECC
|
||||
* Timing resistant scalar multiplication updated with use of Joye double-add ladder
|
||||
* Update mp_jacobi function to reduce stack and increase performance for base ECC build
|
||||
* Reduce heap memory use with wc_EccPrivateKeyDecode, Improvement to ECC wc_ecc_sig_to_rs and wc_ecc_rs_raw_to_sig to reduce memory use (avoid the mp_int)
|
||||
* Improve StoreECC_DSA_Sig bounds checking
|
||||
|
||||
###### OCSP
|
||||
* OCSP improvement to handle extensions in singleResponse
|
||||
* support for OCSP request/response for multiple certificates
|
||||
* OCSP Must Staple option added to require OCSP stapling response
|
||||
* Add support for id-pkix-ocsp-nocheck extension
|
||||
|
||||
###### Misc
|
||||
* Additional code coverage added for ECC and RSA, PKCS#7, 3DES, EVP and Blake2b operations
|
||||
* DTLS MTU: check MTU on write
|
||||
* Refactor hash sig selection and add the macros WOLFSSL_STRONGEST_HASH_SIG (picks the strongest hash) and WOLFSSL_ECDSA_MATCH_HASH (will pick the hash to match the ECC curve)
|
||||
* Strict certificate version allowed from client, TLS 1.2 / 1.3 can not accept client certificates lower than version 3
|
||||
* wolfSSL_get_ciphers_compat(), skip the fake indicator ciphers like the renegotiation indication and the quantum-safe hybrid
|
||||
* When parsing session ticket, check TLS version to see whether they are version compatible
|
||||
* Additional sanity check for invalid ASN1 padding on integer type
|
||||
* Adding in ChaCha20 streaming feature with Mac and Intel assembly build
|
||||
* Sniffer build with --enable-oldtls option on
|
||||
### Vulnerabilities
|
||||
* [HIGH] CVE-2021-3336: In earlier versions of wolfSSL there exists a potential man in the middle attack on TLS 1.3 clients. Malicious attackers with a privileged network position can impersonate TLS 1.3 servers and bypass authentication. Users that have applications with client side code and have TLS 1.3 turned on, should update to the latest version of wolfSSL. Users that do not have TLS 1.3 turned on, or that are server side only, are NOT affected by this report. For the code change see https://github.com/wolfSSL/wolfssl/pull/3676.
|
||||
* [LOW] In the case of using custom ECC curves there is the potential for a crafted compressed ECC key that has a custom prime value to cause a hang when imported. This only affects applications that are loading in ECC keys with wolfSSL builds that have compressed ECC keys and custom ECC curves enabled.
|
||||
* [LOW] With TLS 1.3 authenticated-only ciphers a section of the server hello could contain 16 bytes of uninitialized data when sent to the connected peer. This affects only a specific build of wolfSSL with TLS 1.3 early data enabled and using authenticated-only ciphers with TLS 1.3.
|
||||
|
||||
|
||||
For additional vulnerability information visit the vulnerability page at
|
||||
@@ -232,26 +135,22 @@ More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html
|
||||
|
||||
|
||||
|
||||
*** Resources ***
|
||||
|
||||
# Resources
|
||||
|
||||
[wolfSSL Website](https://www.wolfssl.com/)
|
||||
|
||||
[wolfSSL Wiki](https://github.com/wolfSSL/wolfssl/wiki)
|
||||
|
||||
[FIPS FAQ](https://wolfssl.com/license/fips)
|
||||
[FIPS 140-2/140-3 FAQ](https://wolfssl.com/license/fips)
|
||||
|
||||
[wolfSSL Documents](https://wolfssl.com/wolfSSL/Docs.html)
|
||||
[wolfSSL Documentation](https://wolfssl.com/wolfSSL/Docs.html)
|
||||
|
||||
[wolfSSL Manual](https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-toc.html)
|
||||
|
||||
[wolfSSL API Reference]
|
||||
(https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-17-wolfssl-api-reference.html)
|
||||
[wolfSSL API Reference](https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-17-wolfssl-api-reference.html)
|
||||
|
||||
[wolfCrypt API Reference]
|
||||
(https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-18-wolfcrypt-api-reference.html)
|
||||
[wolfCrypt API Reference](https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-18-wolfcrypt-api-reference.html)
|
||||
|
||||
[TLS 1.3](https://www.wolfssl.com/docs/tls13/)
|
||||
|
||||
[wolfSSL Vulnerabilities]
|
||||
(https://www.wolfssl.com/docs/security-vulnerabilities/)
|
||||
[wolfSSL Vulnerabilities](https://www.wolfssl.com/docs/security-vulnerabilities/)
|
||||
|
||||
Binary file not shown.
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
31:42:b4:2b:87:ef:4b:66:93:af:44:de:45:80:d8:8e:7e:e3:b5:07
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 10888915626055724693 (0x971d3311e8406e95)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (1024 bit)
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:cd:ac:dd:47:ec:be:b7:24:c3:63:1b:54:98:79:
|
||||
e1:c7:31:16:59:d6:9d:77:9d:8d:e2:8b:ed:04:17:
|
||||
@@ -29,7 +28,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:31:42:B4:2B:87:EF:4B:66:93:AF:44:DE:45:80:D8:8E:7E:E3:B5:07
|
||||
serial:97:1D:33:11:E8:40:6E:95
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -38,35 +37,35 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
32:ed:94:35:3d:4a:76:d7:6e:a9:75:e9:f5:7a:7f:64:31:50:
|
||||
6a:28:d5:92:21:d5:88:d2:51:82:c5:bb:1a:f9:26:fa:d8:4b:
|
||||
83:b6:09:d4:62:19:e0:55:84:97:55:ba:5d:21:48:27:10:f0:
|
||||
f3:5c:33:b8:38:9b:fb:57:4c:d8:1c:5b:ab:d3:1c:21:ee:3e:
|
||||
2e:b8:c6:3a:92:5c:38:3c:25:40:2f:05:c6:c9:85:ff:27:f3:
|
||||
ee:fa:10:58:db:5c:a6:8e:e0:d9:70:93:cd:be:7e:68:33:08:
|
||||
c2:28:d6:5c:b3:15:19:af:0c:f7:ba:f0:bc:a1:cf:30:4e:38:
|
||||
e6:4d
|
||||
4e:b1:39:6a:23:a3:65:17:14:b6:52:2e:86:46:d5:4f:7c:d5:
|
||||
6c:bb:fa:66:b1:71:54:a1:ad:0e:a2:b7:ba:59:65:8b:d5:87:
|
||||
5d:51:d0:65:de:74:04:80:7c:da:3a:52:57:7a:1d:5d:46:7a:
|
||||
06:79:75:e5:31:dd:1d:f6:54:77:fc:40:13:a1:5b:fd:9e:7d:
|
||||
1c:fd:04:4f:7c:ee:92:a2:80:55:3c:3f:2a:1c:bd:3a:37:12:
|
||||
0e:fd:52:60:66:19:d5:4b:f6:35:50:a3:59:d3:7f:6d:95:d7:
|
||||
56:10:c6:86:28:f4:6e:6d:da:4e:1c:b4:e9:0b:4c:ed:62:0f:
|
||||
64:06
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIECTCCA3KgAwIBAgIUMUK0K4fvS2aTr0TeRYDYjn7jtQcwDQYJKoZIhvcNAQEL
|
||||
BQAwgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
MIID8zCCA1ygAwIBAgIJAJcdMxHoQG6VMA0GCSqGSIb3DQEBCwUAMIGZMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8G
|
||||
A1UECgwIU2F3dG9vdGgxGDAWBgNVBAsMD0NvbnN1bHRpbmdfMTAyNDEYMBYGA1UE
|
||||
AwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMB4XDTIxMDIxMDE5NDk1M1oXDTIzMTEwNzE5NDk1M1owgZkxCzAJBgNVBAYT
|
||||
AlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYDVQQK
|
||||
DAhTYXd0b290aDEYMBYGA1UECwwPQ29uc3VsdGluZ18xMDI0MRgwFgYDVQQDDA93
|
||||
d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20w
|
||||
gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM2s3Ufsvrckw2MbVJh54ccxFlnW
|
||||
nXedjeKL7QQXssbr5JuRvjFQYpdYtX8p3rNxJAu/lwl/Jtwt7KgusmQreis1GS2i
|
||||
gMuZ/ZRxGyONVNsuYo2BCC30JHInbPnJjttMdbqbAfg/GPTmf/tXlJLMiMS0AMKq
|
||||
1OWIGLMRL3PA1ikJAgMBAAGjggE/MIIBOzAdBgNVHQ4EFgQU0yKPKCzgBe7T7cNx
|
||||
PcmyNjodv6gwgc4GA1UdIwSBxjCBw4AU0yKPKCzgBe7T7cNxPcmyNjodv6ihgZ+k
|
||||
gZwwgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMREwDwYDVQQKDAhTYXd0b290aDEYMBYGA1UECwwPQ29uc3VsdGluZ18x
|
||||
MDI0MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGlu
|
||||
Zm9Ad29sZnNzbC5jb20wHhcNMjAwNjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCB
|
||||
mTELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVt
|
||||
YW4xETAPBgNVBAoMCFNhd3Rvb3RoMRgwFgYDVQQLDA9Db25zdWx0aW5nXzEwMjQx
|
||||
GDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
|
||||
b2xmc3NsLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAzazdR+y+tyTD
|
||||
YxtUmHnhxzEWWdadd52N4ovtBBeyxuvkm5G+MVBil1i1fynes3EkC7+XCX8m3C3s
|
||||
qC6yZCt6KzUZLaKAy5n9lHEbI41U2y5ijYEILfQkcids+cmO20x1upsB+D8Y9OZ/
|
||||
+1eUksyIxLQAwqrU5YgYsxEvc8DWKQkCAwEAAaOCAUowggFGMB0GA1UdDgQWBBTT
|
||||
Io8oLOAF7tPtw3E9ybI2Oh2/qDCB2QYDVR0jBIHRMIHOgBTTIo8oLOAF7tPtw3E9
|
||||
ybI2Oh2/qKGBn6SBnDCBmTELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmEx
|
||||
EDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3RoMRgwFgYDVQQLDA9D
|
||||
b25zdWx0aW5nXzEwMjQxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqG
|
||||
SIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIUMUK0K4fvS2aTr0TeRYDYjn7jtQcw
|
||||
DAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNvbYcEfwAAATAdBgNV
|
||||
HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADgYEAMu2U
|
||||
NT1KdtduqXXp9Xp/ZDFQaijVkiHViNJRgsW7Gvkm+thLg7YJ1GIZ4FWEl1W6XSFI
|
||||
JxDw81wzuDib+1dM2Bxbq9McIe4+LrjGOpJcODwlQC8FxsmF/yfz7voQWNtcpo7g
|
||||
2XCTzb5+aDMIwijWXLMVGa8M97rwvKHPME445k0=
|
||||
Zm9Ad29sZnNzbC5jb22CCQCXHTMR6EBulTAMBgNVHRMEBTADAQH/MBwGA1UdEQQV
|
||||
MBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
|
||||
BQcDAjANBgkqhkiG9w0BAQsFAAOBgQBOsTlqI6NlFxS2Ui6GRtVPfNVsu/pmsXFU
|
||||
oa0Oore6WWWL1YddUdBl3nQEgHzaOlJXeh1dRnoGeXXlMd0d9lR3/EAToVv9nn0c
|
||||
/QRPfO6SooBVPD8qHL06NxIO/VJgZhnVS/Y1UKNZ039tlddWEMaGKPRubdpOHLTp
|
||||
C0ztYg9kBg==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
77:1a:0f:b4:d6:66:91:f9:eb:d6:69:e9:5e:55:74:f3:4b:d7:74:8a
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_1024, OU = Programming-1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 14202541924425994169 (0xc51990a1c9010fb9)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_1024, OU=Programming-1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_1024, OU = Programming-1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_1024, OU=Programming-1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (1024 bit)
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:bc:73:0e:a8:49:f3:74:a2:a9:ef:18:a5:da:55:
|
||||
99:21:f9:c8:ec:b3:6d:48:e5:35:35:75:77:37:ec:
|
||||
@@ -29,7 +28,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:81:69:0F:F8:DF:DD:CF:34:29:D5:67:75:71:85:C7:75:10:69:59:EC
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_1024/OU=Programming-1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:77:1A:0F:B4:D6:66:91:F9:EB:D6:69:E9:5E:55:74:F3:4B:D7:74:8A
|
||||
serial:C5:19:90:A1:C9:01:0F:B9
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -38,35 +37,35 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a8:13:2c:fc:43:e9:db:59:c7:7e:32:8b:32:ba:a3:5c:2f:60:
|
||||
ab:a1:ef:9a:64:36:4e:ce:05:6d:bc:63:b0:8f:91:f7:76:bb:
|
||||
92:b4:b6:78:db:2e:7f:7f:9c:e7:58:4b:73:89:0f:d1:13:61:
|
||||
a4:2a:2f:6e:c7:b1:19:bb:14:00:d7:0e:dd:7e:2f:66:e7:5f:
|
||||
f9:0f:39:90:f6:6b:d3:84:1e:d0:09:23:22:27:f5:c9:96:ed:
|
||||
45:d7:78:3c:eb:a7:d5:8a:f5:f4:dd:99:27:d2:4c:86:6e:63:
|
||||
7d:a8:93:62:71:c1:cb:93:f4:81:3e:95:b3:a8:e5:a6:23:51:
|
||||
4a:b5
|
||||
30:ce:46:43:6d:70:e1:6d:bb:8f:4a:05:64:f7:2c:8d:0e:d6:
|
||||
f9:1e:b6:2a:8e:ed:52:e1:7c:44:bf:59:54:da:2d:31:4d:e6:
|
||||
79:d2:d0:d8:b4:cf:5b:16:0a:16:a1:be:62:9f:6c:24:46:7b:
|
||||
b8:dd:b8:8d:7f:fe:f1:ac:62:94:e0:34:ce:4c:59:3a:c5:5a:
|
||||
e6:40:d5:60:7e:20:5d:ed:43:92:d3:f3:ea:e0:d1:57:c8:ce:
|
||||
41:79:db:81:41:c6:f0:0e:35:d4:6f:92:58:2d:d6:b2:ec:f1:
|
||||
88:ff:6d:ca:63:d6:4a:8d:10:a6:23:06:77:9a:d5:ab:9d:64:
|
||||
46:02
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEGDCCA4GgAwIBAgIUdxoPtNZmkfnr1mnpXlV080vXdIowDQYJKoZIhvcNAQEL
|
||||
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzEwMjQxGTAXBgNVBAsMEFByb2dyYW1t
|
||||
aW5nLTEwMjQxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
|
||||
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yMDA2MTkxMzIzNDFaFw0yMzAzMTYxMzIz
|
||||
NDFaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
|
||||
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8xMDI0MRkwFwYDVQQLDBBQcm9ncmFt
|
||||
bWluZy0xMDI0MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
|
||||
CQEWEGluZm9Ad29sZnNzbC5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB
|
||||
ALxzDqhJ83Siqe8YpdpVmSH5yOyzbUjlNTV1dzfs0WGQXz7Z5NXflMrBqdcZ2obJ
|
||||
6E3EYTaC/qutfnclu40RpbxiOqg4zDmiBGa09/fzqtpNAg67Xo1pSNx3ySgOIulr
|
||||
pCa6TOjB/UpvKx/viq72kGLlZB7rKzxnyNwnAPaRaGWpAgMBAAGjggFPMIIBSzAd
|
||||
BgNVHQ4EFgQUgWkP+N/dzzQp1Wd1cYXHdRBpWewwgd4GA1UdIwSB1jCB04AUgWkP
|
||||
+N/dzzQp1Wd1cYXHdRBpWeyhgaSkgaEwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQI
|
||||
DAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzEw
|
||||
MjQxGTAXBgNVBAsMEFByb2dyYW1taW5nLTEwMjQxGDAWBgNVBAMMD3d3dy53b2xm
|
||||
c3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIUdxoPtNZm
|
||||
kfnr1mnpXlV080vXdIowDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxl
|
||||
LmNvbYcEfwAAATAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZI
|
||||
hvcNAQELBQADgYEAqBMs/EPp21nHfjKLMrqjXC9gq6HvmmQ2Ts4FbbxjsI+R93a7
|
||||
krS2eNsuf3+c51hLc4kP0RNhpCovbsexGbsUANcO3X4vZudf+Q85kPZr04Qe0Akj
|
||||
Iif1yZbtRdd4POun1Yr19N2ZJ9JMhm5jfaiTYnHBy5P0gT6Vs6jlpiNRSrU=
|
||||
MIIEAjCCA2ugAwIBAgIJAMUZkKHJAQ+5MA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
|
||||
A1UECgwMd29sZlNTTF8xMDI0MRkwFwYDVQQLDBBQcm9ncmFtbWluZy0xMDI0MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wHhcNMjEwMjEwMTk0OTUyWhcNMjMxMTA3MTk0OTUyWjCBnjELMAkG
|
||||
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
|
||||
BgNVBAoMDHdvbGZTU0xfMTAyNDEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMTAyNDEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8cw6oSfN0oqnv
|
||||
GKXaVZkh+cjss21I5TU1dXc37NFhkF8+2eTV35TKwanXGdqGyehNxGE2gv6rrX53
|
||||
JbuNEaW8YjqoOMw5ogRmtPf386raTQIOu16NaUjcd8koDiLpa6Qmukzowf1Kbysf
|
||||
74qu9pBi5WQe6ys8Z8jcJwD2kWhlqQIDAQABo4IBRDCCAUAwHQYDVR0OBBYEFIFp
|
||||
D/jf3c80KdVndXGFx3UQaVnsMIHTBgNVHSMEgcswgciAFIFpD/jf3c80KdVndXGF
|
||||
x3UQaVnsoYGkpIGhMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQ
|
||||
MA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8xMDI0MRkwFwYDVQQL
|
||||
DBBQcm9ncmFtbWluZy0xMDI0MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAd
|
||||
BgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb22CCQDFGZChyQEPuTAMBgNVHRME
|
||||
BTADAQH/MBwGA1UdEQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQG
|
||||
CCsGAQUFBwMBBggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOBgQAwzkZDbXDhbbuP
|
||||
SgVk9yyNDtb5HrYqju1S4XxEv1lU2i0xTeZ50tDYtM9bFgoWob5in2wkRnu43biN
|
||||
f/7xrGKU4DTOTFk6xVrmQNVgfiBd7UOS0/Pq4NFXyM5BeduBQcbwDjXUb5JYLday
|
||||
7PGI/23KY9ZKjRCmIwZ3mtWrnWRGAg==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL, OU = Support_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL, OU=Support_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (1024 bit)
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:aa:3e:a5:9c:d3:17:49:65:43:de:d0:f3:4b:1c:
|
||||
db:49:0c:fc:7a:65:05:6d:de:6a:c4:e4:73:2c:8a:
|
||||
@@ -28,7 +28,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:31:42:B4:2B:87:EF:4B:66:93:AF:44:DE:45:80:D8:8E:7E:E3:B5:07
|
||||
serial:97:1D:33:11:E8:40:6E:95
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -37,52 +37,50 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
56:14:19:1a:4f:09:91:cd:f5:a7:c5:69:e4:ea:1a:fd:56:c3:
|
||||
55:fe:c8:cc:ed:56:a8:5f:86:fb:ab:9f:76:8a:db:b3:cc:68:
|
||||
ce:99:fb:a4:5e:70:a8:3c:a8:b6:85:7c:cb:31:fe:4b:01:0c:
|
||||
ac:f0:19:04:98:d0:e7:a5:a2:51:e2:52:a3:f7:42:d4:e2:2d:
|
||||
f2:72:b5:e7:95:d0:b4:e3:d3:c1:34:a4:2f:7c:3c:ef:f0:45:
|
||||
14:32:2f:c8:bf:9f:da:97:6a:da:cb:3f:ef:1f:ca:dc:7a:13:
|
||||
1b:5a:45:41:f8:f0:34:49:9d:58:23:85:3d:99:ab:34:de:51:
|
||||
32:76
|
||||
27:0a:4e:08:8c:ba:73:d0:05:f2:ea:f9:51:8c:7e:29:14:23:
|
||||
8e:9e:9a:fc:46:6f:10:68:59:d9:a0:ea:53:19:bd:28:89:e1:
|
||||
97:1e:4c:b8:1e:be:0f:4d:9d:1d:76:57:17:31:95:c2:80:be:
|
||||
04:d0:c2:e9:5c:e0:f4:81:3f:c4:b0:c5:86:ae:58:68:b9:ae:
|
||||
0f:88:e8:63:6f:b9:08:f1:1b:56:90:fb:1f:2e:cc:e5:69:1f:
|
||||
7c:02:4f:ed:b0:45:7c:2d:a8:59:11:a5:95:51:c7:50:d8:89:
|
||||
c2:90:63:68:a8:41:6f:d0:37:26:6f:c8:0e:b5:a0:15:9d:a5:
|
||||
e6:d2
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIID8jCCA1ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBmTELMAkGA1UEBhMCVVMx
|
||||
MIID5zCCA1CgAwIBAgIBATANBgkqhkiG9w0BAQsFADCBmTELMAkGA1UEBhMCVVMx
|
||||
EDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNh
|
||||
d3Rvb3RoMRgwFgYDVQQLDA9Db25zdWx0aW5nXzEwMjQxGDAWBgNVBAMMD3d3dy53
|
||||
b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0y
|
||||
MDA2MTkxMzIzNDFaFw0yMzAzMTYxMzIzNDFaMIGVMQswCQYDVQQGEwJVUzEQMA4G
|
||||
MTAyMTAxOTQ5NTNaFw0yMzExMDcxOTQ5NTNaMIGVMQswCQYDVQQGEwJVUzEQMA4G
|
||||
A1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEQMA4GA1UECgwHd29sZlNT
|
||||
TDEVMBMGA1UECwwMU3VwcG9ydF8xMDI0MRgwFgYDVQQDDA93d3cud29sZnNzbC5j
|
||||
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wgZ8wDQYJKoZIhvcN
|
||||
AQEBBQADgY0AMIGJAoGBAKo+pZzTF0llQ97Q80sc20kM/HplBW3easTkcyyKloKP
|
||||
I6UGcRwGPi+SjQspNEVZ6am8YdckN121xDeNumey7wMn+sG0zWsAZrTWc3AfCDrM
|
||||
d63p+TTU86AtqedYqcBhhLbsPQqt/VyGc6prR9iLLlhLaRKCJlXmFL9VcIj++XXh
|
||||
AgMBAAGjggFKMIIBRjAdBgNVHQ4EFgQU2Tw16nQOI76c/PopkAnB54QWn3wwgdkG
|
||||
A1UdIwSB0TCBzoAU0yKPKCzgBe7T7cNxPcmyNjodv6ihgZ+kgZwwgZkxCzAJBgNV
|
||||
AgMBAAGjggE/MIIBOzAdBgNVHQ4EFgQU2Tw16nQOI76c/PopkAnB54QWn3wwgc4G
|
||||
A1UdIwSBxjCBw4AU0yKPKCzgBe7T7cNxPcmyNjodv6ihgZ+kgZwwgZkxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYD
|
||||
VQQKDAhTYXd0b290aDEYMBYGA1UECwwPQ29uc3VsdGluZ18xMDI0MRgwFgYDVQQD
|
||||
DA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CFDFCtCuH70tmk69E3kWA2I5+47UHMAwGA1UdEwQFMAMBAf8wHAYDVR0RBBUw
|
||||
E4ILZXhhbXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF
|
||||
BwMCMA0GCSqGSIb3DQEBCwUAA4GBAFYUGRpPCZHN9afFaeTqGv1Ww1X+yMztVqhf
|
||||
hvurn3aK27PMaM6Z+6RecKg8qLaFfMsx/ksBDKzwGQSY0OelolHiUqP3QtTiLfJy
|
||||
teeV0LTj08E0pC98PO/wRRQyL8i/n9qXatrLP+8fytx6ExtaRUH48DRJnVgjhT2Z
|
||||
qzTeUTJ2
|
||||
b22CCQCXHTMR6EBulTAMBgNVHRMEBTADAQH/MBwGA1UdEQQVMBOCC2V4YW1wbGUu
|
||||
Y29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjANBgkqhkiG
|
||||
9w0BAQsFAAOBgQAnCk4IjLpz0AXy6vlRjH4pFCOOnpr8Rm8QaFnZoOpTGb0oieGX
|
||||
Hky4Hr4PTZ0ddlcXMZXCgL4E0MLpXOD0gT/EsMWGrlhoua4PiOhjb7kI8RtWkPsf
|
||||
LszlaR98Ak/tsEV8LahZEaWVUcdQ2InCkGNoqEFv0Dcmb8gOtaAVnaXm0g==
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
31:42:b4:2b:87:ef:4b:66:93:af:44:de:45:80:d8:8e:7e:e3:b5:07
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 10888915626055724693 (0x971d3311e8406e95)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (1024 bit)
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:cd:ac:dd:47:ec:be:b7:24:c3:63:1b:54:98:79:
|
||||
e1:c7:31:16:59:d6:9d:77:9d:8d:e2:8b:ed:04:17:
|
||||
@@ -100,7 +98,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:31:42:B4:2B:87:EF:4B:66:93:AF:44:DE:45:80:D8:8E:7E:E3:B5:07
|
||||
serial:97:1D:33:11:E8:40:6E:95
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -109,35 +107,35 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
32:ed:94:35:3d:4a:76:d7:6e:a9:75:e9:f5:7a:7f:64:31:50:
|
||||
6a:28:d5:92:21:d5:88:d2:51:82:c5:bb:1a:f9:26:fa:d8:4b:
|
||||
83:b6:09:d4:62:19:e0:55:84:97:55:ba:5d:21:48:27:10:f0:
|
||||
f3:5c:33:b8:38:9b:fb:57:4c:d8:1c:5b:ab:d3:1c:21:ee:3e:
|
||||
2e:b8:c6:3a:92:5c:38:3c:25:40:2f:05:c6:c9:85:ff:27:f3:
|
||||
ee:fa:10:58:db:5c:a6:8e:e0:d9:70:93:cd:be:7e:68:33:08:
|
||||
c2:28:d6:5c:b3:15:19:af:0c:f7:ba:f0:bc:a1:cf:30:4e:38:
|
||||
e6:4d
|
||||
4e:b1:39:6a:23:a3:65:17:14:b6:52:2e:86:46:d5:4f:7c:d5:
|
||||
6c:bb:fa:66:b1:71:54:a1:ad:0e:a2:b7:ba:59:65:8b:d5:87:
|
||||
5d:51:d0:65:de:74:04:80:7c:da:3a:52:57:7a:1d:5d:46:7a:
|
||||
06:79:75:e5:31:dd:1d:f6:54:77:fc:40:13:a1:5b:fd:9e:7d:
|
||||
1c:fd:04:4f:7c:ee:92:a2:80:55:3c:3f:2a:1c:bd:3a:37:12:
|
||||
0e:fd:52:60:66:19:d5:4b:f6:35:50:a3:59:d3:7f:6d:95:d7:
|
||||
56:10:c6:86:28:f4:6e:6d:da:4e:1c:b4:e9:0b:4c:ed:62:0f:
|
||||
64:06
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIECTCCA3KgAwIBAgIUMUK0K4fvS2aTr0TeRYDYjn7jtQcwDQYJKoZIhvcNAQEL
|
||||
BQAwgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
MIID8zCCA1ygAwIBAgIJAJcdMxHoQG6VMA0GCSqGSIb3DQEBCwUAMIGZMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8G
|
||||
A1UECgwIU2F3dG9vdGgxGDAWBgNVBAsMD0NvbnN1bHRpbmdfMTAyNDEYMBYGA1UE
|
||||
AwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMB4XDTIxMDIxMDE5NDk1M1oXDTIzMTEwNzE5NDk1M1owgZkxCzAJBgNVBAYT
|
||||
AlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYDVQQK
|
||||
DAhTYXd0b290aDEYMBYGA1UECwwPQ29uc3VsdGluZ18xMDI0MRgwFgYDVQQDDA93
|
||||
d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20w
|
||||
gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM2s3Ufsvrckw2MbVJh54ccxFlnW
|
||||
nXedjeKL7QQXssbr5JuRvjFQYpdYtX8p3rNxJAu/lwl/Jtwt7KgusmQreis1GS2i
|
||||
gMuZ/ZRxGyONVNsuYo2BCC30JHInbPnJjttMdbqbAfg/GPTmf/tXlJLMiMS0AMKq
|
||||
1OWIGLMRL3PA1ikJAgMBAAGjggE/MIIBOzAdBgNVHQ4EFgQU0yKPKCzgBe7T7cNx
|
||||
PcmyNjodv6gwgc4GA1UdIwSBxjCBw4AU0yKPKCzgBe7T7cNxPcmyNjodv6ihgZ+k
|
||||
gZwwgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMREwDwYDVQQKDAhTYXd0b290aDEYMBYGA1UECwwPQ29uc3VsdGluZ18x
|
||||
MDI0MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGlu
|
||||
Zm9Ad29sZnNzbC5jb20wHhcNMjAwNjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCB
|
||||
mTELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVt
|
||||
YW4xETAPBgNVBAoMCFNhd3Rvb3RoMRgwFgYDVQQLDA9Db25zdWx0aW5nXzEwMjQx
|
||||
GDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
|
||||
b2xmc3NsLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAzazdR+y+tyTD
|
||||
YxtUmHnhxzEWWdadd52N4ovtBBeyxuvkm5G+MVBil1i1fynes3EkC7+XCX8m3C3s
|
||||
qC6yZCt6KzUZLaKAy5n9lHEbI41U2y5ijYEILfQkcids+cmO20x1upsB+D8Y9OZ/
|
||||
+1eUksyIxLQAwqrU5YgYsxEvc8DWKQkCAwEAAaOCAUowggFGMB0GA1UdDgQWBBTT
|
||||
Io8oLOAF7tPtw3E9ybI2Oh2/qDCB2QYDVR0jBIHRMIHOgBTTIo8oLOAF7tPtw3E9
|
||||
ybI2Oh2/qKGBn6SBnDCBmTELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmEx
|
||||
EDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3RoMRgwFgYDVQQLDA9D
|
||||
b25zdWx0aW5nXzEwMjQxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqG
|
||||
SIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIUMUK0K4fvS2aTr0TeRYDYjn7jtQcw
|
||||
DAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNvbYcEfwAAATAdBgNV
|
||||
HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADgYEAMu2U
|
||||
NT1KdtduqXXp9Xp/ZDFQaijVkiHViNJRgsW7Gvkm+thLg7YJ1GIZ4FWEl1W6XSFI
|
||||
JxDw81wzuDib+1dM2Bxbq9McIe4+LrjGOpJcODwlQC8FxsmF/yfz7voQWNtcpo7g
|
||||
2XCTzb5+aDMIwijWXLMVGa8M97rwvKHPME445k0=
|
||||
Zm9Ad29sZnNzbC5jb22CCQCXHTMR6EBulTAMBgNVHRMEBTADAQH/MBwGA1UdEQQV
|
||||
MBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
|
||||
BQcDAjANBgkqhkiG9w0BAQsFAAOBgQBOsTlqI6NlFxS2Ui6GRtVPfNVsu/pmsXFU
|
||||
oa0Oore6WWWL1YddUdBl3nQEgHzaOlJXeh1dRnoGeXXlMd0d9lR3/EAToVv9nn0c
|
||||
/QRPfO6SooBVPD8qHL06NxIO/VJgZhnVS/Y1UKNZ039tlddWEMaGKPRubdpOHLTp
|
||||
C0ztYg9kBg==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
53:82:30:49:e8:be:64:59:2e:35:41:ac:31:0d:4d:25:21:54:90:a4
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_3072, OU = Programming-3072, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 11880683778350266762 (0xa4e0aaf32950398a)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_3072, OU=Programming-3072, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_3072, OU = Programming-3072, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_3072, OU=Programming-3072, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (3072 bit)
|
||||
Public-Key: (3072 bit)
|
||||
Modulus:
|
||||
00:ac:39:50:68:8f:78:f8:10:9b:68:96:d3:e1:9c:
|
||||
56:68:5a:41:62:e3:b3:41:b0:55:80:17:b0:88:16:
|
||||
@@ -46,7 +45,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:3D:D1:84:C2:AF:B0:20:49:BC:74:87:41:38:AB:BA:D2:D4:0C:A3:A8
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_3072/OU=Programming-3072/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:53:82:30:49:E8:BE:64:59:2E:35:41:AC:31:0D:4D:25:21:54:90:A4
|
||||
serial:A4:E0:AA:F3:29:50:39:8A
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -55,60 +54,60 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
9e:c9:99:b8:8c:c1:a2:db:cb:78:73:5a:8a:8d:3b:f3:0a:2a:
|
||||
2f:ef:30:09:18:49:e1:f7:9f:8a:a2:33:ce:7c:ec:88:a3:3d:
|
||||
81:50:76:4b:2c:20:82:bc:99:30:82:7f:0e:33:9c:c8:02:9b:
|
||||
3c:de:3e:65:78:2d:6e:27:39:4f:c4:18:d3:96:23:a3:2d:91:
|
||||
57:90:52:bd:7d:12:3d:bf:7d:b1:35:2e:a6:be:26:95:3c:04:
|
||||
5c:20:6c:d8:e5:36:b2:e1:7b:0f:a1:2c:1f:28:3c:19:cb:c4:
|
||||
69:bb:59:b4:99:13:f2:e5:f5:6c:23:d3:69:3b:01:b7:5a:a1:
|
||||
be:f6:70:00:6c:9c:2e:2f:22:ea:4c:7c:72:e3:99:21:a9:dd:
|
||||
ba:8d:16:5c:88:f7:c0:99:c2:8e:83:10:3d:ea:c8:11:77:6a:
|
||||
e5:78:47:92:33:ec:aa:35:8c:13:f0:4c:9d:dd:35:56:42:35:
|
||||
36:ce:d8:46:d8:d7:d4:84:a1:17:bc:57:09:cb:da:56:d2:76:
|
||||
ac:6a:c0:b3:71:a3:1c:d3:2c:ea:f6:4c:9a:4d:dd:3a:ce:10:
|
||||
33:f0:82:34:70:71:5d:6f:77:8f:ec:a2:77:7d:1c:9e:7f:55:
|
||||
6b:e5:d3:29:49:3d:77:fd:5f:bb:ca:7a:b9:80:b5:81:69:a3:
|
||||
38:a3:c6:96:d2:21:1d:85:08:47:59:a9:d4:92:8e:94:3f:5a:
|
||||
a1:36:d7:92:b7:2f:ce:f0:a8:40:50:ae:3f:d0:20:39:86:a6:
|
||||
a1:7c:4f:23:5c:9c:5f:da:93:75:d6:93:b1:5f:30:25:76:6c:
|
||||
77:8f:f8:8e:15:ae:66:5b:7d:ee:d3:49:ae:c6:1c:b0:90:96:
|
||||
5d:36:9e:12:4c:98:4a:f1:d1:6b:a4:7f:76:cb:51:f9:f2:52:
|
||||
07:e4:60:6f:67:6f:e3:a3:84:c0:43:0d:fd:f6:25:9e:3c:d3:
|
||||
41:e9:44:c5:f7:b9:11:3b:0f:dc:9c:e3:dd:f2:ac:06:b3:20:
|
||||
14:2d:6c:db:8e:78
|
||||
57:21:c0:ad:6e:16:74:d5:b1:8b:19:55:49:7a:a4:5e:d6:18:
|
||||
f9:03:80:4b:c2:71:d1:04:47:9c:b3:73:9c:4f:62:4a:3a:9a:
|
||||
d4:48:e4:81:db:8d:15:df:5d:0f:08:13:28:28:d7:05:44:c1:
|
||||
b9:6d:f1:75:60:74:d0:44:ae:91:0f:3a:7c:f4:ee:ea:6f:06:
|
||||
3a:41:ae:6b:5c:8a:0d:85:6b:b3:fb:b1:5f:70:f7:9b:32:57:
|
||||
fb:c4:6b:ce:90:86:0c:96:8a:41:4e:61:f3:a1:3f:55:e8:94:
|
||||
56:12:6d:9e:46:2c:31:bd:3f:8a:70:c8:20:a4:fb:fa:c6:53:
|
||||
58:bb:05:28:ba:89:0c:b1:5f:21:ac:1e:f1:35:fd:6b:14:c1:
|
||||
69:08:e9:37:14:d8:76:50:2a:fc:aa:94:7f:39:52:3a:a7:3c:
|
||||
0a:53:5e:e0:13:1a:00:ca:ac:aa:7e:f7:09:68:78:60:11:73:
|
||||
ab:7d:58:fe:03:9f:e6:84:ea:51:58:40:82:a5:ff:a7:2c:ea:
|
||||
42:a5:4c:b6:3b:5c:6b:ab:cf:56:8a:8c:ec:3c:f0:ae:d3:ca:
|
||||
0e:09:71:cf:79:96:72:63:4b:24:7a:f3:79:ca:69:75:c9:b2:
|
||||
a4:54:b8:84:40:2b:8f:24:27:6a:ed:8f:53:e0:55:9b:35:91:
|
||||
18:11:cf:b0:3b:b8:65:3c:c6:ef:b0:78:7c:43:26:f1:12:84:
|
||||
6b:2b:f0:7d:3c:7f:dc:67:a4:17:89:75:00:86:1a:ea:cd:1a:
|
||||
cf:da:11:64:cc:bd:10:26:ef:6b:1b:93:b3:37:14:7f:12:80:
|
||||
81:b6:fd:8a:8a:d8:95:5f:f9:1e:a5:1e:65:5f:75:8d:90:2a:
|
||||
0d:b1:ab:26:16:31:b2:06:64:6f:2b:7e:4a:f4:de:e9:7a:ec:
|
||||
67:35:f3:40:71:75:37:b3:e1:1d:ef:7d:e2:92:ec:d5:e5:bb:
|
||||
99:79:50:11:b2:8a:57:1b:30:2e:b7:16:4c:c8:a6:99:b1:01:
|
||||
34:08:9d:d8:df:af
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIGHTCCBIWgAwIBAgIUU4IwSei+ZFkuNUGsMQ1NJSFUkKQwDQYJKoZIhvcNAQEL
|
||||
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzMwNzIxGTAXBgNVBAsMEFByb2dyYW1t
|
||||
aW5nLTMwNzIxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
|
||||
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yMDA2MTkxMzIzNDFaFw0yMzAzMTYxMzIz
|
||||
NDFaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
|
||||
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8zMDcyMRkwFwYDVQQLDBBQcm9ncmFt
|
||||
bWluZy0zMDcyMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
|
||||
CQEWEGluZm9Ad29sZnNzbC5jb20wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGK
|
||||
AoIBgQCsOVBoj3j4EJtoltPhnFZoWkFi47NBsFWAF7CIFpvgl3RfQnlzQt+T86qd
|
||||
7i1vqrwnkITAXcfsSepcZh1wnFNcuqGzWMk+jptyPW4CAgCcZVaCoyK0CF8q79+a
|
||||
0OcxWSZbCxxjYf/VaTIZBn4PQDx6Hsj8WGxkrhA9qCP/jhrKaoLi+QFkLJegGomg
|
||||
dNO2BRHyYgZIKvdmzsGF4dIn6soSpZGXPvyUBllRwOcTtod7X9LAVi9eHQLDESzf
|
||||
9wHavYVUNTJfxcj5ep+J9wMOfnldBII1EP5tm7+47uJihyZeL1AveAzoc0+IatYm
|
||||
pMn8+h6KsPQyz1fNoViKSQ+7qR2Gq7mPjVcZslp+pOrMt5Z6OzjN3uBh/MkGj5Na
|
||||
zq0q4y0+OV1BgwEfD+F/dsco2lbvv9wmNUC+rcc4raQGrMroUevA+GgCLJuhFLz4
|
||||
YYbXVtdz9Ku7aiHTiCK0529/keUOxghJ3uoTWHKgqjr5NgNFV16H0nNlxIyj7snW
|
||||
c3yWQZMCAwEAAaOCAU8wggFLMB0GA1UdDgQWBBQ90YTCr7AgSbx0h0E4q7rS1Ayj
|
||||
qDCB3gYDVR0jBIHWMIHTgBQ90YTCr7AgSbx0h0E4q7rS1AyjqKGBpKSBoTCBnjEL
|
||||
MAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4x
|
||||
FTATBgNVBAoMDHdvbGZTU0xfMzA3MjEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMzA3
|
||||
MjEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tghRTgjBJ6L5kWS41QawxDU0lIVSQpDAMBgNVHRMEBTADAQH/
|
||||
MBwGA1UdEQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUF
|
||||
BwMBBggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAYEAnsmZuIzBotvLeHNaio07
|
||||
8woqL+8wCRhJ4fefiqIzznzsiKM9gVB2SywggryZMIJ/DjOcyAKbPN4+ZXgtbic5
|
||||
T8QY05Yjoy2RV5BSvX0SPb99sTUupr4mlTwEXCBs2OU2suF7D6EsHyg8GcvEabtZ
|
||||
tJkT8uX1bCPTaTsBt1qhvvZwAGycLi8i6kx8cuOZIanduo0WXIj3wJnCjoMQPerI
|
||||
EXdq5XhHkjPsqjWME/BMnd01VkI1Ns7YRtjX1IShF7xXCcvaVtJ2rGrAs3GjHNMs
|
||||
6vZMmk3dOs4QM/CCNHBxXW93j+yid30cnn9Va+XTKUk9d/1fu8p6uYC1gWmjOKPG
|
||||
ltIhHYUIR1mp1JKOlD9aoTbXkrcvzvCoQFCuP9AgOYamoXxPI1ycX9qTddaTsV8w
|
||||
JXZsd4/4jhWuZlt97tNJrsYcsJCWXTaeEkyYSvHRa6R/dstR+fJSB+Rgb2dv46OE
|
||||
wEMN/fYlnjzTQelExfe5ETsP3Jzj3fKsBrMgFC1s2454
|
||||
MIIGBzCCBG+gAwIBAgIJAKTgqvMpUDmKMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
|
||||
A1UECgwMd29sZlNTTF8zMDcyMRkwFwYDVQQLDBBQcm9ncmFtbWluZy0zMDcyMRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wHhcNMjEwMjEwMTk0OTUyWhcNMjMxMTA3MTk0OTUyWjCBnjELMAkG
|
||||
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
|
||||
BgNVBAoMDHdvbGZTU0xfMzA3MjEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMzA3MjEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEArDlQaI94
|
||||
+BCbaJbT4ZxWaFpBYuOzQbBVgBewiBab4Jd0X0J5c0Lfk/Oqne4tb6q8J5CEwF3H
|
||||
7EnqXGYdcJxTXLqhs1jJPo6bcj1uAgIAnGVWgqMitAhfKu/fmtDnMVkmWwscY2H/
|
||||
1WkyGQZ+D0A8eh7I/FhsZK4QPagj/44aymqC4vkBZCyXoBqJoHTTtgUR8mIGSCr3
|
||||
Zs7BheHSJ+rKEqWRlz78lAZZUcDnE7aHe1/SwFYvXh0CwxEs3/cB2r2FVDUyX8XI
|
||||
+XqfifcDDn55XQSCNRD+bZu/uO7iYocmXi9QL3gM6HNPiGrWJqTJ/PoeirD0Ms9X
|
||||
zaFYikkPu6kdhqu5j41XGbJafqTqzLeWejs4zd7gYfzJBo+TWs6tKuMtPjldQYMB
|
||||
Hw/hf3bHKNpW77/cJjVAvq3HOK2kBqzK6FHrwPhoAiyboRS8+GGG11bXc/Sru2oh
|
||||
04gitOdvf5HlDsYISd7qE1hyoKo6+TYDRVdeh9JzZcSMo+7J1nN8lkGTAgMBAAGj
|
||||
ggFEMIIBQDAdBgNVHQ4EFgQUPdGEwq+wIEm8dIdBOKu60tQMo6gwgdMGA1UdIwSB
|
||||
yzCByIAUPdGEwq+wIEm8dIdBOKu60tQMo6ihgaSkgaEwgZ4xCzAJBgNVBAYTAlVT
|
||||
MRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRUwEwYDVQQKDAx3
|
||||
b2xmU1NMXzMwNzIxGTAXBgNVBAsMEFByb2dyYW1taW5nLTMwNzIxGDAWBgNVBAMM
|
||||
D3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNv
|
||||
bYIJAKTgqvMpUDmKMAwGA1UdEwQFMAMBAf8wHAYDVR0RBBUwE4ILZXhhbXBsZS5j
|
||||
b22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0GCSqGSIb3
|
||||
DQEBCwUAA4IBgQBXIcCtbhZ01bGLGVVJeqRe1hj5A4BLwnHRBEecs3OcT2JKOprU
|
||||
SOSB240V310PCBMoKNcFRMG5bfF1YHTQRK6RDzp89O7qbwY6Qa5rXIoNhWuz+7Ff
|
||||
cPebMlf7xGvOkIYMlopBTmHzoT9V6JRWEm2eRiwxvT+KcMggpPv6xlNYuwUouokM
|
||||
sV8hrB7xNf1rFMFpCOk3FNh2UCr8qpR/OVI6pzwKU17gExoAyqyqfvcJaHhgEXOr
|
||||
fVj+A5/mhOpRWECCpf+nLOpCpUy2O1xrq89WiozsPPCu08oOCXHPeZZyY0skevN5
|
||||
yml1ybKkVLiEQCuPJCdq7Y9T4FWbNZEYEc+wO7hlPMbvsHh8QybxEoRrK/B9PH/c
|
||||
Z6QXiXUAhhrqzRrP2hFkzL0QJu9rG5OzNxR/EoCBtv2KitiVX/kepR5lX3WNkCoN
|
||||
sasmFjGyBmRvK35K9N7peuxnNfNAcXU3s+Ed733ikuzV5buZeVARsopXGzAutxZM
|
||||
yKaZsQE0CJ3Y368=
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
36:8a:a6:8a:3d:0a:72:ff:dd:e4:4f:56:bd:89:24:23:3c:0b:b6:40
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_4096, OU = Programming-4096, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 11546908179272725132 (0xa03edbcf979a728c)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_4096, OU=Programming-4096, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_4096, OU = Programming-4096, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_4096, OU=Programming-4096, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:f5:d0:31:e4:71:59:58:b3:07:50:dd:16:79:fc:
|
||||
c6:95:50:fc:46:0e:57:12:86:71:8d:e3:9b:4a:33:
|
||||
@@ -55,7 +54,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:FA:54:89:67:E5:5F:B7:31:40:EA:FD:E7:F6:A3:C6:5A:56:16:A5:6E
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_4096/OU=Programming-4096/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:36:8A:A6:8A:3D:0A:72:FF:DD:E4:4F:56:BD:89:24:23:3C:0B:B6:40
|
||||
serial:A0:3E:DB:CF:97:9A:72:8C
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -64,73 +63,72 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
64:d8:59:19:c0:b5:79:9e:58:63:ae:8b:28:64:81:d9:d2:cd:
|
||||
e8:26:1f:04:09:7b:52:0a:7a:16:70:ee:37:8a:6d:7c:74:67:
|
||||
51:2f:cf:97:a1:d6:54:a2:a3:93:dd:2b:63:5e:9f:13:56:7f:
|
||||
8c:e5:9b:49:19:78:db:3d:75:fe:b7:b8:57:92:58:ff:84:8b:
|
||||
d1:2f:f4:b0:22:d2:f9:bb:00:dd:3b:d2:7a:b9:d9:50:e5:90:
|
||||
70:2d:77:f2:74:c2:40:2f:39:25:5d:8e:de:11:e1:cf:a7:8f:
|
||||
8e:bd:2a:aa:2e:a1:14:3d:06:70:c7:c9:58:86:9e:4c:86:65:
|
||||
9e:69:62:3e:30:22:eb:d5:00:d1:1e:8c:ba:f2:7b:a3:39:77:
|
||||
fe:90:42:b7:a4:98:28:d7:82:4a:54:1b:27:c9:cf:09:b5:60:
|
||||
b6:09:37:40:e9:a5:cd:3e:80:84:c4:c4:b6:63:06:ea:5c:63:
|
||||
f2:2b:ee:00:31:52:d8:6c:cd:6a:d2:57:a0:6b:d5:a7:6e:4c:
|
||||
ce:3b:ff:44:7d:99:a5:e3:fb:23:91:99:8c:19:ce:1f:c1:a1:
|
||||
89:e3:bc:e8:74:2c:3d:80:bc:0c:6c:6a:39:a6:50:4c:d1:25:
|
||||
1e:a6:96:f4:54:fd:2a:ce:3c:59:aa:1c:05:df:df:10:9a:2b:
|
||||
52:9c:f1:a8:19:ac:56:03:56:1f:c9:a5:e4:aa:bc:e2:90:c1:
|
||||
c9:ad:f5:94:1b:72:a7:c9:9e:90:26:2e:70:48:41:b5:2f:6c:
|
||||
35:ca:30:e3:ca:71:5b:97:96:15:6f:b5:4d:43:d1:5a:02:d0:
|
||||
21:48:ee:2b:c7:8d:e1:60:92:86:8c:5e:8d:9c:a1:6a:99:c0:
|
||||
d0:3d:3a:8c:7e:c3:87:b2:81:8b:e9:bd:b0:d3:f3:6f:f2:89:
|
||||
40:b9:d1:5c:d0:1c:9d:bf:80:fc:75:0a:66:c6:5a:d1:41:15:
|
||||
31:07:55:f8:00:96:77:b4:a7:dc:d7:62:15:ed:75:7a:3e:cd:
|
||||
b9:e0:56:7d:38:4c:2e:ec:ef:00:70:93:12:0d:25:5a:e7:f8:
|
||||
02:37:e8:dd:bb:7e:61:9f:b2:a8:70:da:7f:94:7b:29:e0:a4:
|
||||
58:01:8d:43:f1:25:16:59:fe:d5:21:42:ee:ab:a8:03:3e:ee:
|
||||
1f:74:1c:43:2d:37:0f:05:14:29:0d:ac:e8:c7:72:0e:10:b5:
|
||||
9e:f8:80:41:d0:a2:aa:6c:94:26:49:91:c7:2c:30:04:2a:91:
|
||||
f0:e6:7f:76:71:80:09:07:00:98:b7:f1:1f:3c:0c:db:98:0a:
|
||||
22:cc:af:6f:e5:c7:0d:26:a1:65:b3:5d:37:04:de:f4:61:91:
|
||||
06:06:a4:9a:65:51:8b:3e
|
||||
17:ab:22:61:05:6d:3a:c0:0d:6b:d9:15:82:11:cf:e7:f8:65:
|
||||
da:c7:ef:da:0f:50:75:bd:55:cf:3d:50:dd:d4:0d:2c:04:48:
|
||||
a8:25:3a:b9:c4:ce:48:7e:b8:63:cd:cd:ce:bc:50:26:dc:6d:
|
||||
c2:1e:d1:71:3a:2f:db:e5:03:6b:73:55:23:70:76:1e:08:2a:
|
||||
92:7b:d6:6a:ef:17:a0:f3:8c:ea:eb:c4:2e:cb:d4:d9:d5:ab:
|
||||
f7:e6:8d:ec:d9:97:a1:56:a7:0b:5d:e5:3f:1f:5e:6a:7a:a4:
|
||||
64:d7:b2:42:1a:1e:49:37:93:bc:be:13:a8:fb:b1:93:7b:a8:
|
||||
2b:49:90:43:84:24:60:44:fc:32:74:85:0e:1b:f8:3a:92:3d:
|
||||
aa:25:1b:9f:97:31:95:97:c5:3d:51:dd:b6:d5:4a:7e:41:b3:
|
||||
90:83:7c:98:fa:cb:22:33:a5:f4:32:74:bd:3e:b1:3b:34:f9:
|
||||
c3:3f:be:db:0e:d9:2f:1a:f9:d2:4f:14:53:63:f2:21:a3:e9:
|
||||
c3:ad:04:6e:e7:ad:1f:6b:ce:4e:35:4a:61:84:b9:61:65:1d:
|
||||
a2:d7:a1:e6:74:08:15:38:75:b0:23:70:22:15:59:2c:48:f0:
|
||||
da:9a:99:d4:2b:83:df:9a:93:78:45:b9:84:5c:7e:71:90:da:
|
||||
56:1c:9f:57:ed:76:f7:17:e5:d2:01:90:99:5f:4c:07:49:07:
|
||||
82:75:92:44:7a:fe:9b:a7:4d:ec:c8:dc:46:67:28:04:8b:08:
|
||||
17:94:13:e9:a0:d2:b2:26:56:27:60:94:5a:50:5c:cf:34:4d:
|
||||
3f:35:e7:12:5d:c5:32:00:2f:e0:1d:09:e5:36:8d:77:93:f6:
|
||||
e5:62:b4:a3:9b:c6:7c:e6:3d:d5:38:33:5f:23:5b:81:2e:24:
|
||||
26:9e:98:a8:af:04:3d:65:3f:71:88:48:44:5c:1a:11:0e:1b:
|
||||
e1:81:b1:b6:66:e6:3c:13:67:d6:6b:a3:f3:b7:f6:9f:14:a6:
|
||||
87:7f:2b:14:31:22:7a:f5:0d:44:e6:a3:1a:d6:d2:dc:88:71:
|
||||
37:28:11:6c:ef:95:ab:1d:c5:c3:9a:ef:1a:54:11:92:8e:89:
|
||||
43:03:26:d0:e9:63:33:fe:79:4c:a6:6f:c4:58:58:2e:b6:ab:
|
||||
57:a0:39:4d:ff:88:c0:23:2c:3b:e3:9a:df:48:d3:17:45:5d:
|
||||
36:4e:00:58:72:c3:ef:e7:76:0b:f8:19:a8:5f:f6:53:98:49:
|
||||
2b:52:b5:8e:a5:d8:73:6e:3c:23:23:06:86:25:6b:0d:3b:f2:
|
||||
9a:17:33:a4:4e:f5:6b:de:b3:64:20:58:c6:6d:22:a9:ae:f4:
|
||||
09:9d:0d:6e:9f:96:2a:9e
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIHHTCCBQWgAwIBAgIUNoqmij0Kcv/d5E9WvYkkIzwLtkAwDQYJKoZIhvcNAQEL
|
||||
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzQwOTYxGTAXBgNVBAsMEFByb2dyYW1t
|
||||
aW5nLTQwOTYxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
|
||||
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yMDA2MTkxMzIzNDFaFw0yMzAzMTYxMzIz
|
||||
NDFaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
|
||||
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF80MDk2MRkwFwYDVQQLDBBQcm9ncmFt
|
||||
bWluZy00MDk2MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
|
||||
CQEWEGluZm9Ad29sZnNzbC5jb20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
|
||||
AoICAQD10DHkcVlYswdQ3RZ5/MaVUPxGDlcShnGN45tKM+pP2RcTbUhp31kRCAKd
|
||||
ryvHML4M3IfUWhIJI13hdlpiN0Z07wMFux5tKXVsLp2HDY+HyxSVm74Xa1HRTNrX
|
||||
kWbFNuvgBxp2TbD7wfVeBdu6yyXZmRMcwDXcQOk2zcTVekFwDzbrpU4XBdV1G2Ri
|
||||
ej8NKEhq46ycqI/p7ffNJKCxoAOs4wP1P9GW/yp+CLHT4BgU7GU3UEPCaoz0W/7E
|
||||
y40/gQL3wt3kwY6ADAQlLYBaLg8iNUr0he1R2Kttj6I7JABugeIedtasMRLb844H
|
||||
od6JSjlgd8Wq8VHmBvGVVirhjpIwn/5YRKxG8v2a/KgdodNVN0qL/Jwz+KdhSEF8
|
||||
nHc/9YAjfUO01YgKyXXXRBlNd2wLCkmqHC/WWkSmR03lNpZAmSxWJrHykjFZ1yzU
|
||||
tCHWZRMLPvv/BOu5hbnY2ChPXBeWo1G+/n0LG0hAJXaU3EH7v3N22uuzYufByFRq
|
||||
k+GNMeg+Pt+8hwIwIlfE4Bh6067kApuqvU5JR3LpjRMtVJsAp5FhccnMSE/u314b
|
||||
Gt9n0yDmREWYfucOYxaDySZdkMHlKlxFVBOygRgGIC4uZlq1e27WDE6JAVZwu67e
|
||||
6Zle0bk6t2wXtgOpCN2c9BTJyVk5ctR+AjcxzQ6nPfjyz2sVqwIDAQABo4IBTzCC
|
||||
AUswHQYDVR0OBBYEFPpUiWflX7cxQOr95/ajxlpWFqVuMIHeBgNVHSMEgdYwgdOA
|
||||
FPpUiWflX7cxQOr95/ajxlpWFqVuoYGkpIGhMIGeMQswCQYDVQQGEwJVUzEQMA4G
|
||||
A1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UECgwMd29sZlNT
|
||||
TF80MDk2MRkwFwYDVQQLDBBQcm9ncmFtbWluZy00MDk2MRgwFgYDVQQDDA93d3cu
|
||||
d29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb22CFDaK
|
||||
poo9CnL/3eRPVr2JJCM8C7ZAMAwGA1UdEwQFMAMBAf8wHAYDVR0RBBUwE4ILZXhh
|
||||
bXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0G
|
||||
CSqGSIb3DQEBCwUAA4ICAQBk2FkZwLV5nlhjrosoZIHZ0s3oJh8ECXtSCnoWcO43
|
||||
im18dGdRL8+XodZUoqOT3StjXp8TVn+M5ZtJGXjbPXX+t7hXklj/hIvRL/SwItL5
|
||||
uwDdO9J6udlQ5ZBwLXfydMJALzklXY7eEeHPp4+OvSqqLqEUPQZwx8lYhp5MhmWe
|
||||
aWI+MCLr1QDRHoy68nujOXf+kEK3pJgo14JKVBsnyc8JtWC2CTdA6aXNPoCExMS2
|
||||
YwbqXGPyK+4AMVLYbM1q0lega9WnbkzOO/9EfZml4/sjkZmMGc4fwaGJ47zodCw9
|
||||
gLwMbGo5plBM0SUeppb0VP0qzjxZqhwF398QmitSnPGoGaxWA1YfyaXkqrzikMHJ
|
||||
rfWUG3KnyZ6QJi5wSEG1L2w1yjDjynFbl5YVb7VNQ9FaAtAhSO4rx43hYJKGjF6N
|
||||
nKFqmcDQPTqMfsOHsoGL6b2w0/Nv8olAudFc0Bydv4D8dQpmxlrRQRUxB1X4AJZ3
|
||||
tKfc12IV7XV6Ps254FZ9OEwu7O8AcJMSDSVa5/gCN+jdu35hn7KocNp/lHsp4KRY
|
||||
AY1D8SUWWf7VIULuq6gDPu4fdBxDLTcPBRQpDazox3IOELWe+IBB0KKqbJQmSZHH
|
||||
LDAEKpHw5n92cYAJBwCYt/EfPAzbmAoizK9v5ccNJqFls103BN70YZEGBqSaZVGL
|
||||
Pg==
|
||||
MIIHBzCCBO+gAwIBAgIJAKA+28+XmnKMMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
|
||||
A1UECgwMd29sZlNTTF80MDk2MRkwFwYDVQQLDBBQcm9ncmFtbWluZy00MDk2MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wHhcNMjEwMjEwMTk0OTUyWhcNMjMxMTA3MTk0OTUyWjCBnjELMAkG
|
||||
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
|
||||
BgNVBAoMDHdvbGZTU0xfNDA5NjEZMBcGA1UECwwQUHJvZ3JhbW1pbmctNDA5NjEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA9dAx5HFZ
|
||||
WLMHUN0WefzGlVD8Rg5XEoZxjeObSjPqT9kXE21Iad9ZEQgCna8rxzC+DNyH1FoS
|
||||
CSNd4XZaYjdGdO8DBbsebSl1bC6dhw2Ph8sUlZu+F2tR0Uza15FmxTbr4Acadk2w
|
||||
+8H1XgXbussl2ZkTHMA13EDpNs3E1XpBcA8266VOFwXVdRtkYno/DShIauOsnKiP
|
||||
6e33zSSgsaADrOMD9T/Rlv8qfgix0+AYFOxlN1BDwmqM9Fv+xMuNP4EC98Ld5MGO
|
||||
gAwEJS2AWi4PIjVK9IXtUdirbY+iOyQAboHiHnbWrDES2/OOB6HeiUo5YHfFqvFR
|
||||
5gbxlVYq4Y6SMJ/+WESsRvL9mvyoHaHTVTdKi/ycM/inYUhBfJx3P/WAI31DtNWI
|
||||
Csl110QZTXdsCwpJqhwv1lpEpkdN5TaWQJksViax8pIxWdcs1LQh1mUTCz77/wTr
|
||||
uYW52NgoT1wXlqNRvv59CxtIQCV2lNxB+79zdtrrs2LnwchUapPhjTHoPj7fvIcC
|
||||
MCJXxOAYetOu5AKbqr1OSUdy6Y0TLVSbAKeRYXHJzEhP7t9eGxrfZ9Mg5kRFmH7n
|
||||
DmMWg8kmXZDB5SpcRVQTsoEYBiAuLmZatXtu1gxOiQFWcLuu3umZXtG5OrdsF7YD
|
||||
qQjdnPQUyclZOXLUfgI3Mc0Opz348s9rFasCAwEAAaOCAUQwggFAMB0GA1UdDgQW
|
||||
BBT6VIln5V+3MUDq/ef2o8ZaVhalbjCB0wYDVR0jBIHLMIHIgBT6VIln5V+3MUDq
|
||||
/ef2o8ZaVhalbqGBpKSBoTCBnjELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRh
|
||||
bmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZTU0xfNDA5NjEZMBcG
|
||||
A1UECwwQUHJvZ3JhbW1pbmctNDA5NjEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t
|
||||
MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tggkAoD7bz5eacowwDAYD
|
||||
VR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNvbYcEfwAAATAdBgNVHSUE
|
||||
FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggIBABerImEF
|
||||
bTrADWvZFYIRz+f4ZdrH79oPUHW9Vc89UN3UDSwESKglOrnEzkh+uGPNzc68UCbc
|
||||
bcIe0XE6L9vlA2tzVSNwdh4IKpJ71mrvF6DzjOrrxC7L1NnVq/fmjezZl6FWpwtd
|
||||
5T8fXmp6pGTXskIaHkk3k7y+E6j7sZN7qCtJkEOEJGBE/DJ0hQ4b+DqSPaolG5+X
|
||||
MZWXxT1R3bbVSn5Bs5CDfJj6yyIzpfQydL0+sTs0+cM/vtsO2S8a+dJPFFNj8iGj
|
||||
6cOtBG7nrR9rzk41SmGEuWFlHaLXoeZ0CBU4dbAjcCIVWSxI8NqamdQrg9+ak3hF
|
||||
uYRcfnGQ2lYcn1ftdvcX5dIBkJlfTAdJB4J1kkR6/punTezI3EZnKASLCBeUE+mg
|
||||
0rImVidglFpQXM80TT815xJdxTIAL+AdCeU2jXeT9uVitKObxnzmPdU4M18jW4Eu
|
||||
JCaemKivBD1lP3GISERcGhEOG+GBsbZm5jwTZ9Zro/O39p8Upod/KxQxInr1DUTm
|
||||
oxrW0tyIcTcoEWzvlasdxcOa7xpUEZKOiUMDJtDpYzP+eUymb8RYWC62q1egOU3/
|
||||
iMAjLDvjmt9I0xdFXTZOAFhyw+/ndgv4Gahf9lOYSStStY6l2HNuPCMjBoYlaw07
|
||||
8poXM6RO9Wves2QgWMZtIqmu9AmdDW6fliqe
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
Binary file not shown.
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
5e:ba:a4:f4:b1:f7:48:25:e3:5f:9b:da:a1:13:ed:d5:2b:03:67:15
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 12309252214903945037 (0xaad33fac180a374d)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:bf:0c:ca:2d:14:b2:1e:84:42:5b:cd:38:1f:4a:
|
||||
f2:4d:75:10:f1:b6:35:9f:df:ca:7d:03:98:d3:ac:
|
||||
@@ -38,7 +37,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:5E:BA:A4:F4:B1:F7:48:25:E3:5F:9B:DA:A1:13:ED:D5:2B:03:67:15
|
||||
serial:AA:D3:3F:AC:18:0A:37:4D
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -47,47 +46,47 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b9:ed:94:3e:00:73:2d:a5:d1:04:b3:fb:dc:f0:b7:0d:3d:ad:
|
||||
96:74:4c:92:67:ad:6d:7c:e2:99:6a:33:ca:b2:0f:04:5a:a5:
|
||||
67:f8:e3:0b:3d:f5:d0:5b:1e:20:52:12:92:28:ea:31:a3:51:
|
||||
9e:8b:d2:39:e4:25:ea:61:61:41:16:2d:54:50:d3:fb:d0:34:
|
||||
00:10:f1:7b:bc:f0:08:a7:f5:27:5e:7e:40:9d:99:b0:d3:31:
|
||||
11:c3:9d:a9:51:a0:17:cf:83:2c:55:84:e0:d5:92:a0:05:3a:
|
||||
9f:b8:75:f8:1b:e5:f7:a4:6c:e9:aa:25:8b:19:93:46:1f:3f:
|
||||
33:af:47:29:cf:7b:8b:59:27:eb:d7:4f:cb:33:19:fa:5f:ee:
|
||||
d8:13:e9:0c:07:ad:3b:c0:7f:10:d7:e4:ed:e8:db:16:e1:1f:
|
||||
a4:7f:16:3c:bd:d7:11:f2:d4:3a:a9:9b:95:e1:39:51:99:eb:
|
||||
5b:65:46:ef:63:84:73:95:23:b8:bf:b5:f6:4d:12:71:f7:ff:
|
||||
33:aa:4a:8c:65:73:73:89:69:df:a6:dc:a4:91:ff:ae:c7:28:
|
||||
93:b5:1a:de:a9:8f:2b:30:85:83:8b:99:82:ca:b3:7c:11:10:
|
||||
88:9d:8e:6c:2c:f3:05:6f:cb:80:85:16:b7:ed:e4:68:fb:b6:
|
||||
b6:31:8a:7d
|
||||
62:98:c8:58:cf:56:03:86:5b:1b:71:49:7d:05:03:5d:e0:08:
|
||||
86:ad:db:4a:de:ab:22:96:a8:c3:59:68:c1:37:90:40:df:bd:
|
||||
89:d0:bc:da:8e:ef:87:b2:c2:62:52:e1:1a:29:17:6a:96:99:
|
||||
c8:4e:d8:32:fe:b8:d1:5c:3b:0a:c2:3c:5f:a1:1e:98:7f:ce:
|
||||
89:26:21:1f:64:9c:15:7a:9c:ef:fb:1d:85:6a:fa:98:ce:a8:
|
||||
a9:ab:c3:a2:c0:eb:87:ed:bc:21:df:f3:07:5b:ae:fd:40:d4:
|
||||
ae:20:d0:76:8a:31:0a:a2:62:7c:61:0d:ce:5d:9a:1e:e4:20:
|
||||
88:51:49:fb:77:a9:cd:4d:c6:bf:54:99:33:ef:4b:a0:73:70:
|
||||
6d:2e:d9:3d:08:f6:12:39:31:68:c6:61:5c:41:b5:1b:f4:38:
|
||||
7d:fc:be:73:66:2d:f7:ca:5b:2c:5b:31:aa:cf:f6:7f:30:e4:
|
||||
12:2c:8e:d6:38:51:e6:45:ee:d5:da:c3:83:d6:ed:5e:ec:d6:
|
||||
b6:14:b3:93:59:e1:55:4a:7f:04:df:ce:65:d4:df:18:4f:dd:
|
||||
b4:45:7f:a6:56:30:c4:05:44:98:9d:4f:26:6d:84:80:a0:5e:
|
||||
ed:23:d1:48:87:0e:05:06:91:3b:b0:3c:bb:8c:8f:3c:7b:4c:
|
||||
4f:a1:ca:98
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE/zCCA+egAwIBAgIUXrqk9LH3SCXjX5vaoRPt1SsDZxUwDQYJKoZIhvcNAQEL
|
||||
BQAwgZQxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMREwDwYDVQQKDAhTYXd0b290aDETMBEGA1UECwwKQ29uc3VsdGluZzEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZQxCzAJ
|
||||
BgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREw
|
||||
DwYDVQQKDAhTYXd0b290aDETMBEGA1UECwwKQ29uc3VsdGluZzEYMBYGA1UEAwwP
|
||||
d3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29t
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvwzKLRSyHoRCW804H0ry
|
||||
TXUQ8bY1n9/KfQOY06zeA2buKvHYsH1uB1QLEJghTYDLEiDnzE/eRX3Jcncy6sqQ
|
||||
u2lSEAMvqPOVxfGLYlYb72dvpBBBla0Km+OlwLDScHZQMFuo6AgsfO2nonqNOCkc
|
||||
rMft8nyVsJWCfUlcOM13Je+9gHVTlDw9ymNbnxW10x0TLxnRPNt2Osy4fcnlwtfa
|
||||
QG/YIdxzG0ItU5z+Gvx9q3o2P5jehHwFZ85qFDiHqfGMtWjLaH9xICv1oGP1Vi+j
|
||||
JtK3b7FaF9c4mQj+k1hv/sMTSQgWC6dNZwBSMWcjTpjtUUUduQTZC+zYKLNLve02
|
||||
eQIDAQABo4IBRTCCAUEwHQYDVR0OBBYEFCeOZxF0wyYdP+0zY7Ok2B0w5ejVMIHU
|
||||
BgNVHSMEgcwwgcmAFCeOZxF0wyYdP+0zY7Ok2B0w5ejVoYGapIGXMIGUMQswCQYD
|
||||
MIIE6TCCA9GgAwIBAgIJAKrTP6wYCjdNMA0GCSqGSIb3DQEBCwUAMIGUMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8G
|
||||
A1UECgwIU2F3dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3
|
||||
dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIU
|
||||
Xrqk9LH3SCXjX5vaoRPt1SsDZxUwDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtl
|
||||
eGFtcGxlLmNvbYcEfwAAATAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw
|
||||
DQYJKoZIhvcNAQELBQADggEBALntlD4Acy2l0QSz+9zwtw09rZZ0TJJnrW184plq
|
||||
M8qyDwRapWf44ws99dBbHiBSEpIo6jGjUZ6L0jnkJephYUEWLVRQ0/vQNAAQ8Xu8
|
||||
8Ain9SdefkCdmbDTMRHDnalRoBfPgyxVhODVkqAFOp+4dfgb5fekbOmqJYsZk0Yf
|
||||
PzOvRynPe4tZJ+vXT8szGfpf7tgT6QwHrTvAfxDX5O3o2xbhH6R/Fjy91xHy1Dqp
|
||||
m5XhOVGZ61tlRu9jhHOVI7i/tfZNEnH3/zOqSoxlc3OJad+m3KSR/67HKJO1Gt6p
|
||||
jyswhYOLmYLKs3wREIidjmws8wVvy4CFFrft5Gj7trYxin0=
|
||||
dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAe
|
||||
Fw0yMTAyMTAxOTQ5NTJaFw0yMzExMDcxOTQ5NTJaMIGUMQswCQYDVQQGEwJVUzEQ
|
||||
MA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8GA1UECgwIU2F3
|
||||
dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3dy53b2xmc3Ns
|
||||
LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCCASIwDQYJKoZI
|
||||
hvcNAQEBBQADggEPADCCAQoCggEBAL8Myi0Ush6EQlvNOB9K8k11EPG2NZ/fyn0D
|
||||
mNOs3gNm7irx2LB9bgdUCxCYIU2AyxIg58xP3kV9yXJ3MurKkLtpUhADL6jzlcXx
|
||||
i2JWG+9nb6QQQZWtCpvjpcCw0nB2UDBbqOgILHztp6J6jTgpHKzH7fJ8lbCVgn1J
|
||||
XDjNdyXvvYB1U5Q8PcpjW58VtdMdEy8Z0TzbdjrMuH3J5cLX2kBv2CHccxtCLVOc
|
||||
/hr8fat6Nj+Y3oR8BWfOahQ4h6nxjLVoy2h/cSAr9aBj9VYvoybSt2+xWhfXOJkI
|
||||
/pNYb/7DE0kIFgunTWcAUjFnI06Y7VFFHbkE2Qvs2CizS73tNnkCAwEAAaOCATow
|
||||
ggE2MB0GA1UdDgQWBBQnjmcRdMMmHT/tM2OzpNgdMOXo1TCByQYDVR0jBIHBMIG+
|
||||
gBQnjmcRdMMmHT/tM2OzpNgdMOXo1aGBmqSBlzCBlDELMAkGA1UEBhMCVVMxEDAO
|
||||
BgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rv
|
||||
b3RoMRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5j
|
||||
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb22CCQCq0z+sGAo3TTAM
|
||||
BgNVHRMEBTADAQH/MBwGA1UdEQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1Ud
|
||||
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAYpjI
|
||||
WM9WA4ZbG3FJfQUDXeAIhq3bSt6rIpaow1lowTeQQN+9idC82o7vh7LCYlLhGikX
|
||||
apaZyE7YMv640Vw7CsI8X6EemH/OiSYhH2ScFXqc7/sdhWr6mM6oqavDosDrh+28
|
||||
Id/zB1uu/UDUriDQdooxCqJifGENzl2aHuQgiFFJ+3epzU3Gv1SZM+9LoHNwbS7Z
|
||||
PQj2EjkxaMZhXEG1G/Q4ffy+c2Yt98pbLFsxqs/2fzDkEiyO1jhR5kXu1drDg9bt
|
||||
XuzWthSzk1nhVUp/BN/OZdTfGE/dtEV/plYwxAVEmJ1PJm2EgKBe7SPRSIcOBQaR
|
||||
O7A8u4yPPHtMT6HKmA==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,18 +1,17 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
7e:bd:d9:c1:a5:b2:60:a4:ba:f4:86:cf:13:ac:77:84:be:ac:07:e7
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 9459666439398825038 (0x83477c81d60d1c4e)
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (256 bit)
|
||||
pub:
|
||||
pub:
|
||||
04:02:d3:d9:6e:d6:01:8e:45:c8:b9:90:31:e5:c0:
|
||||
4c:e3:9e:ad:29:38:98:ba:10:d6:e9:09:2a:80:a9:
|
||||
2e:17:2a:b9:8a:bf:33:83:46:e3:95:0b:e4:77:40:
|
||||
@@ -31,23 +30,23 @@ Certificate:
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:44:02:20:06:c3:0a:69:01:57:31:17:09:3f:21:95:4f:3f:
|
||||
c5:20:e3:21:86:75:47:5e:87:f7:48:8a:1e:01:fa:d2:67:c8:
|
||||
02:20:7d:c8:e9:2d:5b:74:28:87:71:db:a3:0e:19:84:cc:b3:
|
||||
a6:83:35:75:f8:05:dd:fc:5e:51:2b:18:98:c4:ac:95
|
||||
30:45:02:21:00:c5:83:ff:1e:51:f7:a1:e9:f1:42:c4:be:ed:
|
||||
38:bd:38:32:8f:ae:3f:c7:6d:11:90:e9:99:ab:61:a2:db:a7:
|
||||
4b:02:20:28:40:d9:ba:45:cc:a6:ea:fa:3f:3e:71:44:8e:02:
|
||||
03:2f:41:0b:56:78:2d:a6:e8:5e:f6:ff:da:62:8c:f9:df
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIClDCCAjugAwIBAgIUfr3ZwaWyYKS69IbPE6x3hL6sB+cwCgYIKoZIzj0EAwIw
|
||||
gZcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdT
|
||||
ZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9wbWVudDEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZcxCzAJ
|
||||
BgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxl
|
||||
MRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9wbWVudDEYMBYGA1UE
|
||||
AwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEAtPZbtYBjkXIuZAx5cBM456t
|
||||
KTiYuhDW6QkqgKkuFyq5ir8zg0bjlQvkd0C1O0NFMw9hU3w3RMHL/IDK6EPqp6Nj
|
||||
MGEwHQYDVR0OBBYEFFaOmsPwQt4YuUVVbvmTz+rD86UhMB8GA1UdIwQYMBaAFFaO
|
||||
msPwQt4YuUVVbvmTz+rD86UhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD
|
||||
AgGGMAoGCCqGSM49BAMCA0cAMEQCIAbDCmkBVzEXCT8hlU8/xSDjIYZ1R16H90iK
|
||||
HgH60mfIAiB9yOktW3Qoh3Hbow4ZhMyzpoM1dfgF3fxeUSsYmMSslQ==
|
||||
MIICijCCAjCgAwIBAgIJAINHfIHWDRxOMAoGCCqGSM49BAMCMIGXMQswCQYDVQQG
|
||||
EwJVUzETMBEGA1UECAwKV2FzaGluZ3RvbjEQMA4GA1UEBwwHU2VhdHRsZTEQMA4G
|
||||
A1UECgwHd29sZlNTTDEUMBIGA1UECwwLRGV2ZWxvcG1lbnQxGDAWBgNVBAMMD3d3
|
||||
dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAe
|
||||
Fw0yMTAyMTAxOTQ5NTNaFw0yMzExMDcxOTQ5NTNaMIGXMQswCQYDVQQGEwJVUzET
|
||||
MBEGA1UECAwKV2FzaGluZ3RvbjEQMA4GA1UEBwwHU2VhdHRsZTEQMA4GA1UECgwH
|
||||
d29sZlNTTDEUMBIGA1UECwwLRGV2ZWxvcG1lbnQxGDAWBgNVBAMMD3d3dy53b2xm
|
||||
c3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTBZMBMGByqG
|
||||
SM49AgEGCCqGSM49AwEHA0IABALT2W7WAY5FyLmQMeXATOOerSk4mLoQ1ukJKoCp
|
||||
LhcquYq/M4NG45UL5HdAtTtDRTMPYVN8N0TBy/yAyuhD6qejYzBhMB0GA1UdDgQW
|
||||
BBRWjprD8ELeGLlFVW75k8/qw/OlITAfBgNVHSMEGDAWgBRWjprD8ELeGLlFVW75
|
||||
k8/qw/OlITAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAKBggqhkjO
|
||||
PQQDAgNIADBFAiEAxYP/HlH3oenxQsS+7Ti9ODKPrj/HbRGQ6ZmrYaLbp0sCIChA
|
||||
2bpFzKbq+j8+cUSOAgMvQQtWeC2m6F72/9pijPnf
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,18 +1,17 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
20:da:85:3f:78:c9:83:3b:ae:aa:5a:67:49:27:78:ba:90:de:66:6e
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 12132976075216541034 (0xa860fd750798556a)
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
pub:
|
||||
04:ee:82:d4:39:9a:b1:27:82:f4:d7:ea:c6:bc:03:
|
||||
1d:4d:83:61:f4:03:ae:7e:bd:d8:5a:a5:b9:f0:8e:
|
||||
a2:a5:da:ce:87:3b:5a:ab:44:16:9c:f5:9f:62:dd:
|
||||
@@ -33,27 +32,26 @@ Certificate:
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
30:66:02:31:00:d2:4e:24:af:70:3e:93:0b:2e:d5:7c:71:f3:
|
||||
61:3e:8e:71:6d:2e:60:de:fb:ef:3f:be:02:b6:14:45:9b:0a:
|
||||
12:af:af:41:d6:bb:79:ab:d1:4e:8d:9d:dc:98:25:4e:aa:02:
|
||||
31:00:cf:2f:b7:32:70:e7:85:69:17:df:53:75:2b:36:74:d6:
|
||||
1b:a2:62:f9:80:19:c1:3a:ea:9a:05:80:b6:c5:f8:a2:a2:ff:
|
||||
f6:3d:aa:34:d6:e1:1f:e3:93:66:e7:91:4d:fa
|
||||
30:65:02:30:47:a2:36:33:f4:27:bd:d0:5c:e6:8d:3e:31:a9:
|
||||
4e:51:57:a9:93:28:72:0a:72:ab:6e:f9:56:c0:f5:70:02:9f:
|
||||
9c:b2:4a:9c:3e:9f:fb:c5:64:26:7a:88:dc:4a:2a:25:02:31:
|
||||
00:88:f8:e2:d5:20:82:f2:de:7b:cb:13:ac:cd:ff:e8:1e:4e:
|
||||
84:3d:9c:af:5d:f9:01:e7:4f:d4:03:09:84:3d:7b:2b:83:e2:
|
||||
ae:08:68:2e:5b:85:6f:43:f5:41:e0:c7:c9
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIC0zCCAligAwIBAgIUINqFP3jJgzuuqlpnSSd4upDeZm4wCgYIKoZIzj0EAwMw
|
||||
gZcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdT
|
||||
ZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9wbWVudDEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZcxCzAJ
|
||||
BgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxl
|
||||
MRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9wbWVudDEYMBYGA1UE
|
||||
AwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE7oLUOZqxJ4L01+rGvAMdTYNh9AOu
|
||||
fr3YWqW58I6ipdrOhztaq0QWnPWfYt32IM2cdjxAsT+XF99Z9s3ezUY1wO1eLki2
|
||||
ZpFxdLcMP7mat4O9kz9fUC1wP941JeGQO4bgo2MwYTAdBgNVHQ4EFgQUq+DDJkwY
|
||||
1HK70oSMnAoFkoASU1IwHwYDVR0jBBgwFoAUq+DDJkwY1HK70oSMnAoFkoASU1Iw
|
||||
DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMDaQAw
|
||||
ZgIxANJOJK9wPpMLLtV8cfNhPo5xbS5g3vvvP74CthRFmwoSr69B1rt5q9FOjZ3c
|
||||
mCVOqgIxAM8vtzJw54VpF99TdSs2dNYbomL5gBnBOuqaBYC2xfiiov/2Pao01uEf
|
||||
45Nm55FN+g==
|
||||
MIICxzCCAk2gAwIBAgIJAKhg/XUHmFVqMAoGCCqGSM49BAMDMIGXMQswCQYDVQQG
|
||||
EwJVUzETMBEGA1UECAwKV2FzaGluZ3RvbjEQMA4GA1UEBwwHU2VhdHRsZTEQMA4G
|
||||
A1UECgwHd29sZlNTTDEUMBIGA1UECwwLRGV2ZWxvcG1lbnQxGDAWBgNVBAMMD3d3
|
||||
dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAe
|
||||
Fw0yMTAyMTAxOTQ5NTNaFw0yMzExMDcxOTQ5NTNaMIGXMQswCQYDVQQGEwJVUzET
|
||||
MBEGA1UECAwKV2FzaGluZ3RvbjEQMA4GA1UEBwwHU2VhdHRsZTEQMA4GA1UECgwH
|
||||
d29sZlNTTDEUMBIGA1UECwwLRGV2ZWxvcG1lbnQxGDAWBgNVBAMMD3d3dy53b2xm
|
||||
c3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTB2MBAGByqG
|
||||
SM49AgEGBSuBBAAiA2IABO6C1DmasSeC9NfqxrwDHU2DYfQDrn692FqlufCOoqXa
|
||||
zoc7WqtEFpz1n2Ld9iDNnHY8QLE/lxffWfbN3s1GNcDtXi5ItmaRcXS3DD+5mreD
|
||||
vZM/X1AtcD/eNSXhkDuG4KNjMGEwHQYDVR0OBBYEFKvgwyZMGNRyu9KEjJwKBZKA
|
||||
ElNSMB8GA1UdIwQYMBaAFKvgwyZMGNRyu9KEjJwKBZKAElNSMA8GA1UdEwEB/wQF
|
||||
MAMBAf8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2gAMGUCMEeiNjP0J73Q
|
||||
XOaNPjGpTlFXqZMocgpyq275VsD1cAKfnLJKnD6f+8VkJnqI3EoqJQIxAIj44tUg
|
||||
gvLee8sTrM3/6B5OhD2cr135AedP1AMJhD17K4PirghoLluFb0P1QeDHyQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
45:45:81:82:e6:3a:bd:a2:e3:06:0e:ba:2c:45:74:4b:be:c0:39:11
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 17391944375755183620 (0xf15c9943663d9604)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
|
||||
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
|
||||
@@ -38,7 +37,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:45:45:81:82:E6:3A:BD:A2:E3:06:0E:BA:2C:45:74:4B:BE:C0:39:11
|
||||
serial:F1:5C:99:43:66:3D:96:04
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -47,66 +46,64 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
c1:06:39:c8:ce:f5:81:49:55:e1:3a:55:aa:91:5d:64:f1:4b:
|
||||
dc:33:1e:31:15:e7:10:71:16:0d:b5:00:dc:bb:22:0d:81:d9:
|
||||
12:5c:0c:dd:61:e1:af:b5:e2:f7:7d:8b:e6:61:fd:ca:45:3a:
|
||||
61:e7:18:56:2c:26:f2:df:14:f1:e0:3d:7f:62:12:5f:d8:04:
|
||||
44:06:0c:72:b1:8a:50:72:67:77:74:01:ff:79:64:11:6e:b3:
|
||||
84:51:19:22:b6:43:10:06:0d:39:46:5a:c6:57:0a:43:a1:94:
|
||||
02:28:0a:12:38:85:04:0e:78:52:48:28:7e:6c:d9:f0:4b:04:
|
||||
55:7c:39:01:c1:b4:5f:50:06:cf:da:6f:20:b8:94:f7:51:1a:
|
||||
23:cb:30:e3:21:b4:a3:73:ad:48:fb:96:69:ef:2e:50:b6:67:
|
||||
bc:64:ee:27:76:43:7a:34:59:8e:b4:57:53:7d:95:7e:50:7e:
|
||||
64:4c:29:68:fe:81:4f:73:21:24:b5:a9:a2:49:5f:54:7f:0d:
|
||||
c2:96:c7:f5:36:81:8e:c0:00:af:b4:10:6b:0e:bc:1a:3a:f1:
|
||||
a6:dd:fd:8e:63:21:33:d4:32:31:1f:be:a3:7c:52:85:26:c8:
|
||||
6e:50:6c:ac:3d:2e:c0:f9:50:ed:c8:4d:cd:13:50:ce:5e:de:
|
||||
15:89:d1:fb
|
||||
ba:2b:48:d1:a8:e3:c2:84:42:96:a1:7c:e5:f1:46:ba:4c:f7:
|
||||
87:57:c7:78:c8:c1:32:c4:69:ff:85:bb:5d:6a:dd:c9:87:7e:
|
||||
fe:bb:f4:fd:15:0a:4c:94:95:80:30:90:45:03:f8:33:87:ca:
|
||||
5f:74:38:a4:d0:5a:c7:65:38:c3:b0:e8:87:b1:49:32:b9:ac:
|
||||
e9:fb:d3:08:1d:a4:51:7b:d7:d9:4b:79:35:a2:3a:0b:e4:0c:
|
||||
a0:02:9c:a1:68:e1:5d:6c:8e:2e:3a:24:de:bb:d6:1c:a7:ac:
|
||||
2e:cd:57:44:48:f6:72:e0:c7:5b:93:dc:7d:5b:64:0e:17:84:
|
||||
68:2c:95:1d:2c:86:d6:b0:74:67:51:6e:7b:f4:d5:61:38:51:
|
||||
b3:18:e3:10:16:73:4b:36:8a:8a:62:05:f5:56:8a:be:21:e1:
|
||||
78:7d:bf:ad:45:f9:0b:f5:af:a0:62:01:fd:3f:49:df:39:3c:
|
||||
ff:46:e8:0a:fe:5c:6b:bb:41:a5:64:f1:5c:9b:51:4c:bc:6d:
|
||||
9f:a3:20:ed:e9:48:e1:a9:be:08:2d:85:42:59:d6:43:7d:47:
|
||||
22:a5:fa:1f:a2:58:76:0b:70:1c:1d:59:1d:aa:be:5d:2d:25:
|
||||
7c:b1:06:b6:c0:aa:28:aa:93:7c:d0:bd:43:ad:91:50:1c:7b:
|
||||
4d:f3:e4:d7
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFHTCCBAWgAwIBAgIURUWBguY6vaLjBg66LEV0S77AOREwDQYJKoZIhvcNAQEL
|
||||
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxGTAXBgNVBAsMEFByb2dyYW1t
|
||||
aW5nLTIwNDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
|
||||
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yMDA2MTkxMzIzNDFaFw0yMzAzMTYxMzIz
|
||||
NDFaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
|
||||
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFt
|
||||
bWluZy0yMDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
|
||||
CQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
|
||||
AoIBAQDDA9Er/jmkMkU7U8iEKyp8dJq9qipSB0fWpjayBzKO0Lppe8bDRJ7UgUj9
|
||||
LWiii2e7oXXINixK0hv3i7rPDfnv7PGBHnubA0eav2XMf2UkaaboFIlb5DT3xbAU
|
||||
k/Vnezp6eOEBVlaRphNCjdI8QJxM79GG3zdRGwyhO/Xxo0o15OHOlt8bfr9Ol9AQ
|
||||
6KgIMIGvIAtDFMV0Z7Qygm+NhsKIQJk2g7oeQHIiF9dSZSRzsM7vGc2u/3hse8AS
|
||||
A9ROcg1QbTujO6OZXp3I2QyFs9mK2VQm2236rLv/JUzE0Xn0cdOGQBgTsGO1ck4w
|
||||
xJeEhi1WL9cV93/ArvX8W+X7obrTAgMBAAGjggFPMIIBSzAdBgNVHQ4EFgQUM9hF
|
||||
Ztdohxh+VA1wJ5HHJteFZcAwgd4GA1UdIwSB1jCB04AUM9hFZtdohxh+VA1wJ5HH
|
||||
JteFZcChgaSkgaEwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAw
|
||||
DgYDVQQHDAdCb3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxGTAXBgNVBAsM
|
||||
EFByb2dyYW1taW5nLTIwNDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0G
|
||||
CSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIURUWBguY6vaLjBg66LEV0S77A
|
||||
OREwDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNvbYcEfwAAATAd
|
||||
BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEB
|
||||
AMEGOcjO9YFJVeE6VaqRXWTxS9wzHjEV5xBxFg21ANy7Ig2B2RJcDN1h4a+14vd9
|
||||
i+Zh/cpFOmHnGFYsJvLfFPHgPX9iEl/YBEQGDHKxilByZ3d0Af95ZBFus4RRGSK2
|
||||
QxAGDTlGWsZXCkOhlAIoChI4hQQOeFJIKH5s2fBLBFV8OQHBtF9QBs/abyC4lPdR
|
||||
GiPLMOMhtKNzrUj7lmnvLlC2Z7xk7id2Q3o0WY60V1N9lX5QfmRMKWj+gU9zISS1
|
||||
qaJJX1R/DcKWx/U2gY7AAK+0EGsOvBo68abd/Y5jITPUMjEfvqN8UoUmyG5QbKw9
|
||||
LsD5UO3ITc0TUM5e3hWJ0fs=
|
||||
MIIFBzCCA++gAwIBAgIJAPFcmUNmPZYEMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
|
||||
A1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFtbWluZy0yMDQ4MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wHhcNMjEwMjEwMTk0OTUyWhcNMjMxMTA3MTk0OTUyWjCBnjELMAkG
|
||||
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
|
||||
BgNVBAoMDHdvbGZTU0xfMjA0ODEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMjA0ODEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwwPRK/45
|
||||
pDJFO1PIhCsqfHSavaoqUgdH1qY2sgcyjtC6aXvGw0Se1IFI/S1oootnu6F1yDYs
|
||||
StIb94u6zw357+zxgR57mwNHmr9lzH9lJGmm6BSJW+Q098WwFJP1Z3s6enjhAVZW
|
||||
kaYTQo3SPECcTO/Rht83URsMoTv18aNKNeThzpbfG36/TpfQEOioCDCBryALQxTF
|
||||
dGe0MoJvjYbCiECZNoO6HkByIhfXUmUkc7DO7xnNrv94bHvAEgPUTnINUG07ozuj
|
||||
mV6dyNkMhbPZitlUJttt+qy7/yVMxNF59HHThkAYE7BjtXJOMMSXhIYtVi/XFfd/
|
||||
wK71/Fvl+6G60wIDAQABo4IBRDCCAUAwHQYDVR0OBBYEFDPYRWbXaIcYflQNcCeR
|
||||
xybXhWXAMIHTBgNVHSMEgcswgciAFDPYRWbXaIcYflQNcCeRxybXhWXAoYGkpIGh
|
||||
MIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96
|
||||
ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFtbWlu
|
||||
Zy0yMDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEW
|
||||
EGluZm9Ad29sZnNzbC5jb22CCQDxXJlDZj2WBDAMBgNVHRMEBTADAQH/MBwGA1Ud
|
||||
EQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr
|
||||
BgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAuitI0ajjwoRClqF85fFGukz3h1fH
|
||||
eMjBMsRp/4W7XWrdyYd+/rv0/RUKTJSVgDCQRQP4M4fKX3Q4pNBax2U4w7Doh7FJ
|
||||
Mrms6fvTCB2kUXvX2Ut5NaI6C+QMoAKcoWjhXWyOLjok3rvWHKesLs1XREj2cuDH
|
||||
W5PcfVtkDheEaCyVHSyG1rB0Z1Fue/TVYThRsxjjEBZzSzaKimIF9VaKviHheH2/
|
||||
rUX5C/WvoGIB/T9J3zk8/0boCv5ca7tBpWTxXJtRTLxtn6Mg7elI4am+CC2FQlnW
|
||||
Q31HIqX6H6JYdgtwHB1ZHaq+XS0lfLEGtsCqKKqTfNC9Q62RUBx7TfPk1w==
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
61:b3:1e:59:f3:68:6c:a4:79:42:83:2f:1a:50:71:03:be:32:aa:2c
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 16666221217456835267 (0xe74a4fe55697cac3)
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (256 bit)
|
||||
pub:
|
||||
pub:
|
||||
04:55:bf:f4:0f:44:50:9a:3d:ce:9b:b7:f0:c5:4d:
|
||||
f5:70:7b:d4:ec:24:8e:19:80:ec:5a:4c:a2:24:03:
|
||||
62:2c:9b:da:ef:a2:35:12:43:84:76:16:c6:56:95:
|
||||
@@ -120,7 +117,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2
|
||||
DirName:/C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:61:B3:1E:59:F3:68:6C:A4:79:42:83:2F:1A:50:71:03:BE:32:AA:2C
|
||||
serial:E7:4A:4F:E5:56:97:CA:C3
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -129,28 +126,27 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:46:02:21:00:e4:a0:23:26:2b:0b:42:0f:97:37:6d:cb:14:
|
||||
23:c3:c3:e6:44:cf:5f:4c:26:a3:72:64:7a:9c:cb:64:ab:a6:
|
||||
be:02:21:00:aa:c5:a3:50:f6:f1:a5:db:05:e0:75:d2:f7:ba:
|
||||
49:5f:8f:7d:1c:44:b1:6e:df:c8:da:10:48:2d:53:08:a8:b4
|
||||
30:46:02:21:00:e3:bb:ca:0e:31:2d:39:1d:94:25:81:90:d5:
|
||||
11:f9:09:6d:58:16:23:be:9f:a9:18:64:83:3c:25:03:58:58:
|
||||
39:02:21:00:a4:aa:b3:f0:09:c9:0c:2f:f7:b1:d4:8e:9f:a6:
|
||||
b6:ab:1a:c7:37:ed:70:4d:34:04:a0:9b:3d:84:86:10:a0:f0
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDXzCCAwSgAwIBAgIUYbMeWfNobKR5QoMvGlBxA74yqiwwCgYIKoZIzj0EAwIw
|
||||
gY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAMBgNVBAcMBVNhbGVt
|
||||
MRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYDVQQLDARGYXN0MRgwFgYDVQQDDA93
|
||||
d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20w
|
||||
HhcNMjAwNjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBjTELMAkGA1UEBhMCVVMx
|
||||
DzANBgNVBAgMBk9yZWdvbjEOMAwGA1UEBwwFU2FsZW0xEzARBgNVBAoMCkNsaWVu
|
||||
dCBFQ0MxDTALBgNVBAsMBEZhc3QxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEf
|
||||
MB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTBZMBMGByqGSM49AgEGCCqG
|
||||
SM49AwEHA0IABFW/9A9EUJo9zpu38MVN9XB71OwkjhmA7FpMoiQDYiyb2u+iNRJD
|
||||
hHYWxlaVBswBqb32dRpC972psjYiX8ddf7SjggE+MIIBOjAdBgNVHQ4EFgQU69RL
|
||||
WWuVYT9RV7YETYlBiERcq/Iwgc0GA1UdIwSBxTCBwoAU69RLWWuVYT9RV7YETYlB
|
||||
iERcq/KhgZOkgZAwgY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAM
|
||||
BgNVBAcMBVNhbGVtMRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYDVQQLDARGYXN0
|
||||
MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9A
|
||||
d29sZnNzbC5jb22CFGGzHlnzaGykeUKDLxpQcQO+MqosMAwGA1UdEwQFMAMBAf8w
|
||||
HAYDVR0RBBUwE4ILZXhhbXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUH
|
||||
AwEGCCsGAQUFBwMCMAoGCCqGSM49BAMCA0kAMEYCIQDkoCMmKwtCD5c3bcsUI8PD
|
||||
5kTPX0wmo3JkepzLZKumvgIhAKrFo1D28aXbBeB10ve6SV+PfRxEsW7fyNoQSC1T
|
||||
CKi0
|
||||
MIIDSTCCAu6gAwIBAgIJAOdKT+VWl8rDMAoGCCqGSM49BAMCMIGNMQswCQYDVQQG
|
||||
EwJVUzEPMA0GA1UECAwGT3JlZ29uMQ4wDAYDVQQHDAVTYWxlbTETMBEGA1UECgwK
|
||||
Q2xpZW50IEVDQzENMAsGA1UECwwERmFzdDEYMBYGA1UEAwwPd3d3LndvbGZzc2wu
|
||||
Y29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMB4XDTIxMDIxMDE5
|
||||
NDk1M1oXDTIzMTEwNzE5NDk1M1owgY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZP
|
||||
cmVnb24xDjAMBgNVBAcMBVNhbGVtMRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYD
|
||||
VQQLDARGYXN0MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
|
||||
CQEWEGluZm9Ad29sZnNzbC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAARV
|
||||
v/QPRFCaPc6bt/DFTfVwe9TsJI4ZgOxaTKIkA2Ism9rvojUSQ4R2FsZWlQbMAam9
|
||||
9nUaQve9qbI2Il/HXX+0o4IBMzCCAS8wHQYDVR0OBBYEFOvUS1lrlWE/UVe2BE2J
|
||||
QYhEXKvyMIHCBgNVHSMEgbowgbeAFOvUS1lrlWE/UVe2BE2JQYhEXKvyoYGTpIGQ
|
||||
MIGNMQswCQYDVQQGEwJVUzEPMA0GA1UECAwGT3JlZ29uMQ4wDAYDVQQHDAVTYWxl
|
||||
bTETMBEGA1UECgwKQ2xpZW50IEVDQzENMAsGA1UECwwERmFzdDEYMBYGA1UEAwwP
|
||||
d3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29t
|
||||
ggkA50pP5VaXysMwDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNv
|
||||
bYcEfwAAATAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCgYIKoZIzj0E
|
||||
AwIDSQAwRgIhAOO7yg4xLTkdlCWBkNUR+QltWBYjvp+pGGSDPCUDWFg5AiEApKqz
|
||||
8AnJDC/3sdSOn6a2qxrHN+1wTTQEoJs9hIYQoPA=
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
45:45:81:82:e6:3a:bd:a2:e3:06:0e:ba:2c:45:74:4b:be:c0:39:11
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 17391944375755183620 (0xf15c9943663d9604)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
|
||||
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
|
||||
@@ -38,7 +37,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:45:45:81:82:E6:3A:BD:A2:E3:06:0E:BA:2C:45:74:4B:BE:C0:39:11
|
||||
serial:F1:5C:99:43:66:3D:96:04
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -47,48 +46,47 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
c1:06:39:c8:ce:f5:81:49:55:e1:3a:55:aa:91:5d:64:f1:4b:
|
||||
dc:33:1e:31:15:e7:10:71:16:0d:b5:00:dc:bb:22:0d:81:d9:
|
||||
12:5c:0c:dd:61:e1:af:b5:e2:f7:7d:8b:e6:61:fd:ca:45:3a:
|
||||
61:e7:18:56:2c:26:f2:df:14:f1:e0:3d:7f:62:12:5f:d8:04:
|
||||
44:06:0c:72:b1:8a:50:72:67:77:74:01:ff:79:64:11:6e:b3:
|
||||
84:51:19:22:b6:43:10:06:0d:39:46:5a:c6:57:0a:43:a1:94:
|
||||
02:28:0a:12:38:85:04:0e:78:52:48:28:7e:6c:d9:f0:4b:04:
|
||||
55:7c:39:01:c1:b4:5f:50:06:cf:da:6f:20:b8:94:f7:51:1a:
|
||||
23:cb:30:e3:21:b4:a3:73:ad:48:fb:96:69:ef:2e:50:b6:67:
|
||||
bc:64:ee:27:76:43:7a:34:59:8e:b4:57:53:7d:95:7e:50:7e:
|
||||
64:4c:29:68:fe:81:4f:73:21:24:b5:a9:a2:49:5f:54:7f:0d:
|
||||
c2:96:c7:f5:36:81:8e:c0:00:af:b4:10:6b:0e:bc:1a:3a:f1:
|
||||
a6:dd:fd:8e:63:21:33:d4:32:31:1f:be:a3:7c:52:85:26:c8:
|
||||
6e:50:6c:ac:3d:2e:c0:f9:50:ed:c8:4d:cd:13:50:ce:5e:de:
|
||||
15:89:d1:fb
|
||||
ba:2b:48:d1:a8:e3:c2:84:42:96:a1:7c:e5:f1:46:ba:4c:f7:
|
||||
87:57:c7:78:c8:c1:32:c4:69:ff:85:bb:5d:6a:dd:c9:87:7e:
|
||||
fe:bb:f4:fd:15:0a:4c:94:95:80:30:90:45:03:f8:33:87:ca:
|
||||
5f:74:38:a4:d0:5a:c7:65:38:c3:b0:e8:87:b1:49:32:b9:ac:
|
||||
e9:fb:d3:08:1d:a4:51:7b:d7:d9:4b:79:35:a2:3a:0b:e4:0c:
|
||||
a0:02:9c:a1:68:e1:5d:6c:8e:2e:3a:24:de:bb:d6:1c:a7:ac:
|
||||
2e:cd:57:44:48:f6:72:e0:c7:5b:93:dc:7d:5b:64:0e:17:84:
|
||||
68:2c:95:1d:2c:86:d6:b0:74:67:51:6e:7b:f4:d5:61:38:51:
|
||||
b3:18:e3:10:16:73:4b:36:8a:8a:62:05:f5:56:8a:be:21:e1:
|
||||
78:7d:bf:ad:45:f9:0b:f5:af:a0:62:01:fd:3f:49:df:39:3c:
|
||||
ff:46:e8:0a:fe:5c:6b:bb:41:a5:64:f1:5c:9b:51:4c:bc:6d:
|
||||
9f:a3:20:ed:e9:48:e1:a9:be:08:2d:85:42:59:d6:43:7d:47:
|
||||
22:a5:fa:1f:a2:58:76:0b:70:1c:1d:59:1d:aa:be:5d:2d:25:
|
||||
7c:b1:06:b6:c0:aa:28:aa:93:7c:d0:bd:43:ad:91:50:1c:7b:
|
||||
4d:f3:e4:d7
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFHTCCBAWgAwIBAgIURUWBguY6vaLjBg66LEV0S77AOREwDQYJKoZIhvcNAQEL
|
||||
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxGTAXBgNVBAsMEFByb2dyYW1t
|
||||
aW5nLTIwNDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
|
||||
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yMDA2MTkxMzIzNDFaFw0yMzAzMTYxMzIz
|
||||
NDFaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
|
||||
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFt
|
||||
bWluZy0yMDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
|
||||
CQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
|
||||
AoIBAQDDA9Er/jmkMkU7U8iEKyp8dJq9qipSB0fWpjayBzKO0Lppe8bDRJ7UgUj9
|
||||
LWiii2e7oXXINixK0hv3i7rPDfnv7PGBHnubA0eav2XMf2UkaaboFIlb5DT3xbAU
|
||||
k/Vnezp6eOEBVlaRphNCjdI8QJxM79GG3zdRGwyhO/Xxo0o15OHOlt8bfr9Ol9AQ
|
||||
6KgIMIGvIAtDFMV0Z7Qygm+NhsKIQJk2g7oeQHIiF9dSZSRzsM7vGc2u/3hse8AS
|
||||
A9ROcg1QbTujO6OZXp3I2QyFs9mK2VQm2236rLv/JUzE0Xn0cdOGQBgTsGO1ck4w
|
||||
xJeEhi1WL9cV93/ArvX8W+X7obrTAgMBAAGjggFPMIIBSzAdBgNVHQ4EFgQUM9hF
|
||||
Ztdohxh+VA1wJ5HHJteFZcAwgd4GA1UdIwSB1jCB04AUM9hFZtdohxh+VA1wJ5HH
|
||||
JteFZcChgaSkgaEwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAw
|
||||
DgYDVQQHDAdCb3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxGTAXBgNVBAsM
|
||||
EFByb2dyYW1taW5nLTIwNDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0G
|
||||
CSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIURUWBguY6vaLjBg66LEV0S77A
|
||||
OREwDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNvbYcEfwAAATAd
|
||||
BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEB
|
||||
AMEGOcjO9YFJVeE6VaqRXWTxS9wzHjEV5xBxFg21ANy7Ig2B2RJcDN1h4a+14vd9
|
||||
i+Zh/cpFOmHnGFYsJvLfFPHgPX9iEl/YBEQGDHKxilByZ3d0Af95ZBFus4RRGSK2
|
||||
QxAGDTlGWsZXCkOhlAIoChI4hQQOeFJIKH5s2fBLBFV8OQHBtF9QBs/abyC4lPdR
|
||||
GiPLMOMhtKNzrUj7lmnvLlC2Z7xk7id2Q3o0WY60V1N9lX5QfmRMKWj+gU9zISS1
|
||||
qaJJX1R/DcKWx/U2gY7AAK+0EGsOvBo68abd/Y5jITPUMjEfvqN8UoUmyG5QbKw9
|
||||
LsD5UO3ITc0TUM5e3hWJ0fs=
|
||||
MIIFBzCCA++gAwIBAgIJAPFcmUNmPZYEMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
|
||||
A1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFtbWluZy0yMDQ4MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wHhcNMjEwMjEwMTk0OTUyWhcNMjMxMTA3MTk0OTUyWjCBnjELMAkG
|
||||
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
|
||||
BgNVBAoMDHdvbGZTU0xfMjA0ODEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMjA0ODEY
|
||||
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwwPRK/45
|
||||
pDJFO1PIhCsqfHSavaoqUgdH1qY2sgcyjtC6aXvGw0Se1IFI/S1oootnu6F1yDYs
|
||||
StIb94u6zw357+zxgR57mwNHmr9lzH9lJGmm6BSJW+Q098WwFJP1Z3s6enjhAVZW
|
||||
kaYTQo3SPECcTO/Rht83URsMoTv18aNKNeThzpbfG36/TpfQEOioCDCBryALQxTF
|
||||
dGe0MoJvjYbCiECZNoO6HkByIhfXUmUkc7DO7xnNrv94bHvAEgPUTnINUG07ozuj
|
||||
mV6dyNkMhbPZitlUJttt+qy7/yVMxNF59HHThkAYE7BjtXJOMMSXhIYtVi/XFfd/
|
||||
wK71/Fvl+6G60wIDAQABo4IBRDCCAUAwHQYDVR0OBBYEFDPYRWbXaIcYflQNcCeR
|
||||
xybXhWXAMIHTBgNVHSMEgcswgciAFDPYRWbXaIcYflQNcCeRxybXhWXAoYGkpIGh
|
||||
MIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96
|
||||
ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFtbWlu
|
||||
Zy0yMDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEW
|
||||
EGluZm9Ad29sZnNzbC5jb22CCQDxXJlDZj2WBDAMBgNVHRMEBTADAQH/MBwGA1Ud
|
||||
EQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr
|
||||
BgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAuitI0ajjwoRClqF85fFGukz3h1fH
|
||||
eMjBMsRp/4W7XWrdyYd+/rv0/RUKTJSVgDCQRQP4M4fKX3Q4pNBax2U4w7Doh7FJ
|
||||
Mrms6fvTCB2kUXvX2Ut5NaI6C+QMoAKcoWjhXWyOLjok3rvWHKesLs1XREj2cuDH
|
||||
W5PcfVtkDheEaCyVHSyG1rB0Z1Fue/TVYThRsxjjEBZzSzaKimIF9VaKviHheH2/
|
||||
rUX5C/WvoGIB/T9J3zk8/0boCv5ca7tBpWTxXJtRTLxtn6Mg7elI4am+CC2FQlnW
|
||||
Q31HIqX6H6JYdgtwHB1ZHaq+XS0lfLEGtsCqKKqTfNC9Q62RUBx7TfPk1w==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,18 +1,17 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
61:b3:1e:59:f3:68:6c:a4:79:42:83:2f:1a:50:71:03:be:32:aa:2c
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 16666221217456835267 (0xe74a4fe55697cac3)
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (256 bit)
|
||||
pub:
|
||||
pub:
|
||||
04:55:bf:f4:0f:44:50:9a:3d:ce:9b:b7:f0:c5:4d:
|
||||
f5:70:7b:d4:ec:24:8e:19:80:ec:5a:4c:a2:24:03:
|
||||
62:2c:9b:da:ef:a2:35:12:43:84:76:16:c6:56:95:
|
||||
@@ -26,7 +25,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2
|
||||
DirName:/C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:61:B3:1E:59:F3:68:6C:A4:79:42:83:2F:1A:50:71:03:BE:32:AA:2C
|
||||
serial:E7:4A:4F:E5:56:97:CA:C3
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -35,28 +34,27 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:46:02:21:00:e4:a0:23:26:2b:0b:42:0f:97:37:6d:cb:14:
|
||||
23:c3:c3:e6:44:cf:5f:4c:26:a3:72:64:7a:9c:cb:64:ab:a6:
|
||||
be:02:21:00:aa:c5:a3:50:f6:f1:a5:db:05:e0:75:d2:f7:ba:
|
||||
49:5f:8f:7d:1c:44:b1:6e:df:c8:da:10:48:2d:53:08:a8:b4
|
||||
30:46:02:21:00:e3:bb:ca:0e:31:2d:39:1d:94:25:81:90:d5:
|
||||
11:f9:09:6d:58:16:23:be:9f:a9:18:64:83:3c:25:03:58:58:
|
||||
39:02:21:00:a4:aa:b3:f0:09:c9:0c:2f:f7:b1:d4:8e:9f:a6:
|
||||
b6:ab:1a:c7:37:ed:70:4d:34:04:a0:9b:3d:84:86:10:a0:f0
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDXzCCAwSgAwIBAgIUYbMeWfNobKR5QoMvGlBxA74yqiwwCgYIKoZIzj0EAwIw
|
||||
gY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAMBgNVBAcMBVNhbGVt
|
||||
MRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYDVQQLDARGYXN0MRgwFgYDVQQDDA93
|
||||
d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20w
|
||||
HhcNMjAwNjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBjTELMAkGA1UEBhMCVVMx
|
||||
DzANBgNVBAgMBk9yZWdvbjEOMAwGA1UEBwwFU2FsZW0xEzARBgNVBAoMCkNsaWVu
|
||||
dCBFQ0MxDTALBgNVBAsMBEZhc3QxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEf
|
||||
MB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTBZMBMGByqGSM49AgEGCCqG
|
||||
SM49AwEHA0IABFW/9A9EUJo9zpu38MVN9XB71OwkjhmA7FpMoiQDYiyb2u+iNRJD
|
||||
hHYWxlaVBswBqb32dRpC972psjYiX8ddf7SjggE+MIIBOjAdBgNVHQ4EFgQU69RL
|
||||
WWuVYT9RV7YETYlBiERcq/Iwgc0GA1UdIwSBxTCBwoAU69RLWWuVYT9RV7YETYlB
|
||||
iERcq/KhgZOkgZAwgY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAM
|
||||
BgNVBAcMBVNhbGVtMRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYDVQQLDARGYXN0
|
||||
MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9A
|
||||
d29sZnNzbC5jb22CFGGzHlnzaGykeUKDLxpQcQO+MqosMAwGA1UdEwQFMAMBAf8w
|
||||
HAYDVR0RBBUwE4ILZXhhbXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUH
|
||||
AwEGCCsGAQUFBwMCMAoGCCqGSM49BAMCA0kAMEYCIQDkoCMmKwtCD5c3bcsUI8PD
|
||||
5kTPX0wmo3JkepzLZKumvgIhAKrFo1D28aXbBeB10ve6SV+PfRxEsW7fyNoQSC1T
|
||||
CKi0
|
||||
MIIDSTCCAu6gAwIBAgIJAOdKT+VWl8rDMAoGCCqGSM49BAMCMIGNMQswCQYDVQQG
|
||||
EwJVUzEPMA0GA1UECAwGT3JlZ29uMQ4wDAYDVQQHDAVTYWxlbTETMBEGA1UECgwK
|
||||
Q2xpZW50IEVDQzENMAsGA1UECwwERmFzdDEYMBYGA1UEAwwPd3d3LndvbGZzc2wu
|
||||
Y29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMB4XDTIxMDIxMDE5
|
||||
NDk1M1oXDTIzMTEwNzE5NDk1M1owgY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZP
|
||||
cmVnb24xDjAMBgNVBAcMBVNhbGVtMRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYD
|
||||
VQQLDARGYXN0MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
|
||||
CQEWEGluZm9Ad29sZnNzbC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAARV
|
||||
v/QPRFCaPc6bt/DFTfVwe9TsJI4ZgOxaTKIkA2Ism9rvojUSQ4R2FsZWlQbMAam9
|
||||
9nUaQve9qbI2Il/HXX+0o4IBMzCCAS8wHQYDVR0OBBYEFOvUS1lrlWE/UVe2BE2J
|
||||
QYhEXKvyMIHCBgNVHSMEgbowgbeAFOvUS1lrlWE/UVe2BE2JQYhEXKvyoYGTpIGQ
|
||||
MIGNMQswCQYDVQQGEwJVUzEPMA0GA1UECAwGT3JlZ29uMQ4wDAYDVQQHDAVTYWxl
|
||||
bTETMBEGA1UECgwKQ2xpZW50IEVDQzENMAsGA1UECwwERmFzdDEYMBYGA1UEAwwP
|
||||
d3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29t
|
||||
ggkA50pP5VaXysMwDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNv
|
||||
bYcEfwAAATAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCgYIKoZIzj0E
|
||||
AwIDSQAwRgIhAOO7yg4xLTkdlCWBkNUR+QltWBYjvp+pGGSDPCUDWFg5AiEApKqz
|
||||
8AnJDC/3sdSOn6a2qxrHN+1wTTQEoJs9hIYQoPA=
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
31:a3:17:40:4e:fb:ba:fe:19:56:3a:3d:f3:f1:e4:0d:d9:9b:66:7e
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = RELATIVE_URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 10273515510344552519 (0x8e92dbecdc8d9047)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=RELATIVE_URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = RELATIVE_URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=RELATIVE_URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
|
||||
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
|
||||
@@ -38,54 +37,54 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=RELATIVE_URI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:31:A3:17:40:4E:FB:BA:FE:19:56:3A:3D:F3:F1:E4:0D:D9:9B:66:7E
|
||||
serial:8E:92:DB:EC:DC:8D:90:47
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
X509v3 Subject Alternative Name:
|
||||
URI:../relative/page.html
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
43:41:a6:92:63:52:da:bc:83:90:02:b4:a0:9b:be:4c:1e:bf:
|
||||
b5:33:67:81:6d:4c:69:6b:d2:d0:50:50:69:85:56:ab:67:0d:
|
||||
3e:5e:21:9a:f5:ff:f6:5c:e1:7d:c5:e8:63:c1:11:e5:d0:31:
|
||||
44:4d:d1:bd:14:e9:2d:a8:3d:b5:db:50:88:ef:9f:2a:25:94:
|
||||
df:41:b3:b6:84:93:36:13:cd:17:46:18:c7:44:01:d7:20:42:
|
||||
66:0e:42:e1:91:7c:61:f6:3a:e1:c5:69:cc:da:3b:51:58:2a:
|
||||
8c:3d:d4:66:d2:eb:77:b1:4b:ae:24:d5:99:c3:5f:49:92:9f:
|
||||
86:11:5a:c6:b6:81:2d:b7:31:b4:65:55:69:2c:cf:b2:b8:57:
|
||||
6b:46:9f:fe:f7:d8:06:b6:b3:8e:1c:24:dc:f8:e3:e8:69:39:
|
||||
e1:c9:97:06:5f:92:27:fa:ac:d6:ae:d3:a0:08:e5:76:ff:5a:
|
||||
e0:4c:be:40:c8:5b:d8:65:c4:43:06:a1:3f:71:b0:ee:f2:0d:
|
||||
85:cb:0f:f6:10:93:62:64:26:09:ad:a8:ff:3d:39:61:4c:0b:
|
||||
2e:6f:cf:c8:00:59:8e:13:17:3a:f1:ff:30:21:71:ac:7a:ee:
|
||||
52:e8:0e:82:1f:75:41:ed:36:4e:1e:5b:4a:95:ce:38:4b:7f:
|
||||
20:ca:d7:86
|
||||
b4:68:57:4f:dd:9b:14:4e:61:2e:7d:96:88:cc:bb:b9:9d:46:
|
||||
70:48:ee:f3:ce:6e:cd:0a:06:5d:95:80:28:f5:e7:9c:50:8f:
|
||||
a9:3a:6b:32:b1:33:92:87:13:6f:f6:ce:82:ef:5f:e7:a5:97:
|
||||
23:1f:12:ff:a9:f3:33:54:4a:c9:92:68:47:12:51:89:84:48:
|
||||
45:60:2e:9e:45:ca:3d:05:91:0f:dc:ef:0f:0e:3c:cb:95:f0:
|
||||
68:f0:db:66:c6:06:35:88:8e:cd:18:94:2e:2c:7f:e8:b8:17:
|
||||
fa:e8:31:2c:84:5a:f2:2d:92:47:e3:fa:8a:d2:5e:9a:16:ba:
|
||||
fd:5f:75:cd:17:12:bd:e8:5f:61:93:ea:09:8b:da:ef:a1:9e:
|
||||
4c:03:da:55:75:4e:b3:88:bb:a2:3a:5c:0b:90:41:60:63:84:
|
||||
40:cf:c4:dd:87:6f:77:29:7b:00:c7:56:41:ce:04:5d:46:4e:
|
||||
c1:6c:b0:75:dc:f2:b1:fd:35:68:79:b5:7e:9f:5d:00:b0:be:
|
||||
b6:b6:19:71:44:bb:d3:41:1f:54:16:90:fb:32:41:0a:44:35:
|
||||
59:0c:cc:a3:40:ff:02:fb:a1:e4:97:08:3a:e2:93:ed:6d:cf:
|
||||
c8:a0:42:61:19:72:ee:e6:e4:30:af:5d:3b:76:e1:5c:7f:ca:
|
||||
06:d5:20:0d
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8zCCA9ugAwIBAgIUMaMXQE77uv4ZVjo98/HkDdmbZn4wDQYJKoZIhvcNAQEL
|
||||
BQAwgZoxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxFTATBgNVBAsMDFJFTEFUSVZF
|
||||
X1VSSTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBp
|
||||
bmZvQHdvbGZzc2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVow
|
||||
gZoxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3pl
|
||||
bWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxFTATBgNVBAsMDFJFTEFUSVZFX1VS
|
||||
STEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwwPR
|
||||
K/45pDJFO1PIhCsqfHSavaoqUgdH1qY2sgcyjtC6aXvGw0Se1IFI/S1oootnu6F1
|
||||
yDYsStIb94u6zw357+zxgR57mwNHmr9lzH9lJGmm6BSJW+Q098WwFJP1Z3s6enjh
|
||||
AVZWkaYTQo3SPECcTO/Rht83URsMoTv18aNKNeThzpbfG36/TpfQEOioCDCBryAL
|
||||
QxTFdGe0MoJvjYbCiECZNoO6HkByIhfXUmUkc7DO7xnNrv94bHvAEgPUTnINUG07
|
||||
ozujmV6dyNkMhbPZitlUJttt+qy7/yVMxNF59HHThkAYE7BjtXJOMMSXhIYtVi/X
|
||||
Ffd/wK71/Fvl+6G60wIDAQABo4IBLTCCASkwHQYDVR0OBBYEFDPYRWbXaIcYflQN
|
||||
cCeRxybXhWXAMIHaBgNVHSMEgdIwgc+AFDPYRWbXaIcYflQNcCeRxybXhWXAoYGg
|
||||
pIGdMIGaMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
|
||||
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRUwEwYDVQQLDAxSRUxBVElW
|
||||
RV9VUkkxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQ
|
||||
aW5mb0B3b2xmc3NsLmNvbYIUMaMXQE77uv4ZVjo98/HkDdmbZn4wCQYDVR0TBAIw
|
||||
ADAgBgNVHREEGTAXhhUuLi9yZWxhdGl2ZS9wYWdlLmh0bWwwDQYJKoZIhvcNAQEL
|
||||
BQADggEBAENBppJjUtq8g5ACtKCbvkwev7UzZ4FtTGlr0tBQUGmFVqtnDT5eIZr1
|
||||
//Zc4X3F6GPBEeXQMURN0b0U6S2oPbXbUIjvnyollN9Bs7aEkzYTzRdGGMdEAdcg
|
||||
QmYOQuGRfGH2OuHFaczaO1FYKow91GbS63exS64k1ZnDX0mSn4YRWsa2gS23MbRl
|
||||
VWksz7K4V2tGn/732Aa2s44cJNz44+hpOeHJlwZfkif6rNau06AI5Xb/WuBMvkDI
|
||||
W9hlxEMGoT9xsO7yDYXLD/YQk2JkJgmtqP89OWFMCy5vz8gAWY4TFzrx/zAhcax6
|
||||
7lLoDoIfdUHtNk4eW0qVzjhLfyDK14Y=
|
||||
MIIE3TCCA8WgAwIBAgIJAI6S2+zcjZBHMA0GCSqGSIb3DQEBCwUAMIGaMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
|
||||
A1UECgwMd29sZlNTTF8yMDQ4MRUwEwYDVQQLDAxSRUxBVElWRV9VUkkxGDAWBgNV
|
||||
BAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3Ns
|
||||
LmNvbTAeFw0yMTAyMTAxOTQ5NTJaFw0yMzExMDcxOTQ5NTJaMIGaMQswCQYDVQQG
|
||||
EwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UE
|
||||
CgwMd29sZlNTTF8yMDQ4MRUwEwYDVQQLDAxSRUxBVElWRV9VUkkxGDAWBgNVBAMM
|
||||
D3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNv
|
||||
bTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMMD0Sv+OaQyRTtTyIQr
|
||||
Knx0mr2qKlIHR9amNrIHMo7Quml7xsNEntSBSP0taKKLZ7uhdcg2LErSG/eLus8N
|
||||
+e/s8YEee5sDR5q/Zcx/ZSRppugUiVvkNPfFsBST9Wd7Onp44QFWVpGmE0KN0jxA
|
||||
nEzv0YbfN1EbDKE79fGjSjXk4c6W3xt+v06X0BDoqAgwga8gC0MUxXRntDKCb42G
|
||||
wohAmTaDuh5AciIX11JlJHOwzu8Zza7/eGx7wBID1E5yDVBtO6M7o5lencjZDIWz
|
||||
2YrZVCbbbfqsu/8lTMTRefRx04ZAGBOwY7VyTjDEl4SGLVYv1xX3f8Cu9fxb5fuh
|
||||
utMCAwEAAaOCASIwggEeMB0GA1UdDgQWBBQz2EVm12iHGH5UDXAnkccm14VlwDCB
|
||||
zwYDVR0jBIHHMIHEgBQz2EVm12iHGH5UDXAnkccm14VlwKGBoKSBnTCBmjELMAkG
|
||||
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
|
||||
BgNVBAoMDHdvbGZTU0xfMjA0ODEVMBMGA1UECwwMUkVMQVRJVkVfVVJJMRgwFgYD
|
||||
VQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNz
|
||||
bC5jb22CCQCOktvs3I2QRzAJBgNVHRMEAjAAMCAGA1UdEQQZMBeGFS4uL3JlbGF0
|
||||
aXZlL3BhZ2UuaHRtbDANBgkqhkiG9w0BAQsFAAOCAQEAtGhXT92bFE5hLn2WiMy7
|
||||
uZ1GcEju885uzQoGXZWAKPXnnFCPqTprMrEzkocTb/bOgu9f56WXIx8S/6nzM1RK
|
||||
yZJoRxJRiYRIRWAunkXKPQWRD9zvDw48y5XwaPDbZsYGNYiOzRiULix/6LgX+ugx
|
||||
LIRa8i2SR+P6itJemha6/V91zRcSvehfYZPqCYva76GeTAPaVXVOs4i7ojpcC5BB
|
||||
YGOEQM/E3Ydvdyl7AMdWQc4EXUZOwWywddzysf01aHm1fp9dALC+trYZcUS700Ef
|
||||
VBaQ+zJBCkQ1WQzMo0D/Avuh5JcIOuKT7W3PyKBCYRly7ubkMK9dO3bhXH/KBtUg
|
||||
DQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -1,17 +1,16 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
23:a1:03:97:86:ca:57:02:1c:21:00:25:07:d8:b9:89:1c:1e:df:f2
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 14951923003315625164 (0xcf7fe6c0b99e9ccc)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:52 2021 GMT
|
||||
Not After : Nov 7 19:49:52 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
|
||||
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
|
||||
@@ -38,53 +37,53 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=URI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:23:A1:03:97:86:CA:57:02:1C:21:00:25:07:D8:B9:89:1C:1E:DF:F2
|
||||
serial:CF:7F:E6:C0:B9:9E:9C:CC
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
X509v3 Subject Alternative Name:
|
||||
URI:https://www.wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
08:27:81:4b:56:bb:e4:06:57:3c:b6:83:e4:34:8a:65:33:76:
|
||||
a7:55:c7:e9:eb:e4:7d:12:b7:24:b0:88:ad:fb:28:7d:36:0f:
|
||||
2d:5c:09:98:62:4d:fe:73:25:ff:f2:79:e4:2c:85:38:44:44:
|
||||
2a:9f:6d:35:ff:95:d5:b2:48:4f:40:6b:d7:a6:fd:a1:f4:e8:
|
||||
46:69:68:a9:c1:97:68:a1:fb:ab:b8:f2:c0:58:71:6a:4e:f3:
|
||||
ae:96:b5:9e:22:61:ca:d6:bc:3c:a9:bc:30:6c:1d:73:dc:e6:
|
||||
a0:cd:a1:d5:e6:6f:9d:9c:56:a3:dd:56:27:cc:42:52:4a:6b:
|
||||
48:b7:d2:b6:45:83:23:03:94:c2:1e:9d:d2:a4:86:9a:8f:2e:
|
||||
65:49:a4:07:40:90:45:04:48:a0:f8:67:f0:5f:d8:02:34:1f:
|
||||
4b:5f:b6:ab:80:a2:33:c6:0d:04:a7:ff:b4:45:ed:c2:07:00:
|
||||
c4:58:2a:b9:cf:40:23:d2:b5:5d:e5:d7:00:1a:81:91:d8:ca:
|
||||
da:fe:87:7c:91:77:72:2d:cc:ad:72:a4:5f:1b:19:62:57:f4:
|
||||
47:c0:47:a8:7e:c4:ed:6f:52:c1:ff:7f:22:fa:ca:2d:d8:1d:
|
||||
73:b3:3b:09:aa:08:b6:67:e9:fd:73:92:73:e4:0f:dd:40:25:
|
||||
5a:1a:61:43
|
||||
4b:f2:ec:8e:47:35:a9:fc:3c:36:98:48:b4:64:6c:3e:65:bd:
|
||||
c9:d4:a7:38:3f:33:e2:60:ee:7f:aa:16:70:3f:c8:28:02:3e:
|
||||
5c:d2:fe:a1:a7:d2:fb:e8:f6:6d:9f:c4:a4:b1:81:f4:6e:80:
|
||||
3d:bc:27:f6:6e:d8:93:85:5e:cc:dd:5d:87:16:b3:75:85:72:
|
||||
76:dd:9a:32:93:df:01:fa:4d:d2:d3:a4:27:fc:e3:bd:7a:f1:
|
||||
9d:3d:08:2e:e7:1f:e3:b8:96:9e:11:0d:88:3b:ba:1f:b5:d8:
|
||||
c7:67:9e:74:56:27:5b:55:88:5b:79:dc:2c:56:64:a0:71:72:
|
||||
1a:06:d8:d4:0f:41:bf:9d:f3:3e:59:9e:b1:e5:41:6d:4a:a0:
|
||||
44:e2:7a:d2:0b:3f:3a:45:14:ff:d5:42:8f:aa:8b:7d:ff:38:
|
||||
e7:a9:c2:92:b0:4e:dc:c6:13:35:8c:25:ef:49:c1:06:c2:3b:
|
||||
21:91:de:0f:14:0c:79:7d:3c:d6:14:57:ce:eb:9b:49:3f:c5:
|
||||
ff:5c:5a:a8:81:cf:ba:0f:51:ec:01:82:56:0a:de:98:41:6f:
|
||||
ec:43:47:6d:45:a4:92:67:f2:08:c0:65:d3:8c:47:9c:73:0e:
|
||||
de:27:b7:44:33:44:eb:51:d5:ad:80:00:e1:f2:e3:ef:04:8c:
|
||||
05:94:af:f6
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE2jCCA8KgAwIBAgIUI6EDl4bKVwIcIQAlB9i5iRwe3/IwDQYJKoZIhvcNAQEL
|
||||
BQAwgZExCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
|
||||
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxDDAKBgNVBAsMA1VSSTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZz
|
||||
c2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZExCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRUwEwYD
|
||||
VQQKDAx3b2xmU1NMXzIwNDgxDDAKBgNVBAsMA1VSSTEYMBYGA1UEAwwPd3d3Lndv
|
||||
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwwPRK/45pDJFO1PIhCsqfHSavaoq
|
||||
UgdH1qY2sgcyjtC6aXvGw0Se1IFI/S1oootnu6F1yDYsStIb94u6zw357+zxgR57
|
||||
mwNHmr9lzH9lJGmm6BSJW+Q098WwFJP1Z3s6enjhAVZWkaYTQo3SPECcTO/Rht83
|
||||
URsMoTv18aNKNeThzpbfG36/TpfQEOioCDCBryALQxTFdGe0MoJvjYbCiECZNoO6
|
||||
HkByIhfXUmUkc7DO7xnNrv94bHvAEgPUTnINUG07ozujmV6dyNkMhbPZitlUJttt
|
||||
+qy7/yVMxNF59HHThkAYE7BjtXJOMMSXhIYtVi/XFfd/wK71/Fvl+6G60wIDAQAB
|
||||
o4IBJjCCASIwHQYDVR0OBBYEFDPYRWbXaIcYflQNcCeRxybXhWXAMIHRBgNVHSME
|
||||
gckwgcaAFDPYRWbXaIcYflQNcCeRxybXhWXAoYGXpIGUMIGRMQswCQYDVQQGEwJV
|
||||
UzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UECgwM
|
||||
d29sZlNTTF8yMDQ4MQwwCgYDVQQLDANVUkkxGDAWBgNVBAMMD3d3dy53b2xmc3Ns
|
||||
LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIUI6EDl4bKVwIc
|
||||
IQAlB9i5iRwe3/IwCQYDVR0TBAIwADAiBgNVHREEGzAZhhdodHRwczovL3d3dy53
|
||||
b2xmc3NsLmNvbTANBgkqhkiG9w0BAQsFAAOCAQEACCeBS1a75AZXPLaD5DSKZTN2
|
||||
p1XH6evkfRK3JLCIrfsofTYPLVwJmGJN/nMl//J55CyFOEREKp9tNf+V1bJIT0Br
|
||||
16b9ofToRmloqcGXaKH7q7jywFhxak7zrpa1niJhyta8PKm8MGwdc9zmoM2h1eZv
|
||||
nZxWo91WJ8xCUkprSLfStkWDIwOUwh6d0qSGmo8uZUmkB0CQRQRIoPhn8F/YAjQf
|
||||
S1+2q4CiM8YNBKf/tEXtwgcAxFgquc9AI9K1XeXXABqBkdjK2v6HfJF3ci3MrXKk
|
||||
XxsZYlf0R8BHqH7E7W9Swf9/IvrKLdgdc7M7CaoItmfp/XOSc+QP3UAlWhphQw==
|
||||
MIIExDCCA6ygAwIBAgIJAM9/5sC5npzMMA0GCSqGSIb3DQEBCwUAMIGRMQswCQYD
|
||||
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
|
||||
A1UECgwMd29sZlNTTF8yMDQ4MQwwCgYDVQQLDANVUkkxGDAWBgNVBAMMD3d3dy53
|
||||
b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0y
|
||||
MTAyMTAxOTQ5NTJaFw0yMzExMDcxOTQ5NTJaMIGRMQswCQYDVQQGEwJVUzEQMA4G
|
||||
A1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UECgwMd29sZlNT
|
||||
TF8yMDQ4MQwwCgYDVQQLDANVUkkxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEf
|
||||
MB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCCASIwDQYJKoZIhvcNAQEB
|
||||
BQADggEPADCCAQoCggEBAMMD0Sv+OaQyRTtTyIQrKnx0mr2qKlIHR9amNrIHMo7Q
|
||||
uml7xsNEntSBSP0taKKLZ7uhdcg2LErSG/eLus8N+e/s8YEee5sDR5q/Zcx/ZSRp
|
||||
pugUiVvkNPfFsBST9Wd7Onp44QFWVpGmE0KN0jxAnEzv0YbfN1EbDKE79fGjSjXk
|
||||
4c6W3xt+v06X0BDoqAgwga8gC0MUxXRntDKCb42GwohAmTaDuh5AciIX11JlJHOw
|
||||
zu8Zza7/eGx7wBID1E5yDVBtO6M7o5lencjZDIWz2YrZVCbbbfqsu/8lTMTRefRx
|
||||
04ZAGBOwY7VyTjDEl4SGLVYv1xX3f8Cu9fxb5fuhutMCAwEAAaOCARswggEXMB0G
|
||||
A1UdDgQWBBQz2EVm12iHGH5UDXAnkccm14VlwDCBxgYDVR0jBIG+MIG7gBQz2EVm
|
||||
12iHGH5UDXAnkccm14VlwKGBl6SBlDCBkTELMAkGA1UEBhMCVVMxEDAOBgNVBAgM
|
||||
B01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZTU0xfMjA0
|
||||
ODEMMAoGA1UECwwDVVJJMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkq
|
||||
hkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb22CCQDPf+bAuZ6czDAJBgNVHRMEAjAA
|
||||
MCIGA1UdEQQbMBmGF2h0dHBzOi8vd3d3LndvbGZzc2wuY29tMA0GCSqGSIb3DQEB
|
||||
CwUAA4IBAQBL8uyORzWp/Dw2mEi0ZGw+Zb3J1Kc4PzPiYO5/qhZwP8goAj5c0v6h
|
||||
p9L76PZtn8SksYH0boA9vCf2btiThV7M3V2HFrN1hXJ23Zoyk98B+k3S06Qn/OO9
|
||||
evGdPQgu5x/juJaeEQ2IO7oftdjHZ550VidbVYhbedwsVmSgcXIaBtjUD0G/nfM+
|
||||
WZ6x5UFtSqBE4nrSCz86RRT/1UKPqot9/zjnqcKSsE7cxhM1jCXvScEGwjshkd4P
|
||||
FAx5fTzWFFfO65tJP8X/XFqogc+6D1HsAYJWCt6YQW/sQ0dtRaSSZ/IIwGXTjEec
|
||||
cw7eJ7dEM0TrUdWtgADh8uPvBIwFlK/2
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIBcTCB+AIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
|
||||
MIIBcjCB+AIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
|
||||
Cldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZTU0wx
|
||||
FDASBgNVBAsMC0RldmVsb3BtZW50MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIwMDYxOTEzMjM0MloX
|
||||
DTIzMDMxNjEzMjM0MlqgLzAtMB8GA1UdIwQYMBaAFKvgwyZMGNRyu9KEjJwKBZKA
|
||||
ElNSMAoGA1UdFAQDAgEKMAoGCCqGSM49BAMCA2gAMGUCMQCYv4i35bniugAZXLqH
|
||||
BICnycG4Dh+1lOT9XKADStPOwqwrY2C2HWq9mRbXQibBCaQCME3fI9B1B1BKBphF
|
||||
23RPNfyv/8J0Ipwvz3SlxnyIQ/XxgyruB4F3mZEYMwBpiiwbpg==
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
|
||||
DTIzMTEwNzE5NDk1NVqgLzAtMB8GA1UdIwQYMBaAFKvgwyZMGNRyu9KEjJwKBZKA
|
||||
ElNSMAoGA1UdFAQDAgEKMAoGCCqGSM49BAMCA2kAMGYCMQDZ3syfCgdSX34hw/9W
|
||||
Vsh2Upsk5XetKwJ/t7YNniRF2xwPpWyNCB0Ib9ysoOKx+5wCMQDwHLLznMcFfY2p
|
||||
QkEWT1XRcJ3WANZmtx/m4XjvgIjw6dkPQBqdHy7MSjvVds1nQ80=
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIBUDCB+AIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
|
||||
MIIBUTCB+AIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
|
||||
Cldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZTU0wx
|
||||
FDASBgNVBAsMC0RldmVsb3BtZW50MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIwMDYxOTEzMjM0MloX
|
||||
DTIzMDMxNjEzMjM0MlqgLzAtMB8GA1UdIwQYMBaAFFaOmsPwQt4YuUVVbvmTz+rD
|
||||
86UhMAoGA1UdFAQDAgEJMAoGCCqGSM49BAMCA0cAMEQCIC7AFXZO+5wTzQPqLaVl
|
||||
IFqqhiMpTGhEHwSd+7+HuO1jAiA1lLz5UVpDUqXyoC22UgrrbjlClkNGiGPDoU/a
|
||||
bjjgKg==
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
|
||||
DTIzMTEwNzE5NDk1NVqgLzAtMB8GA1UdIwQYMBaAFFaOmsPwQt4YuUVVbvmTz+rD
|
||||
86UhMAoGA1UdFAQDAgEJMAoGCCqGSM49BAMCA0gAMEUCIGl4TP2PbJhqSSZN/0f6
|
||||
4RWJhFwI1flAnFJPVBLBj+e7AiEAiGRDT35HS237kRWw4qlvQM57Gbaflq/aZ8SM
|
||||
MIqTs0E=
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,42 +1,42 @@
|
||||
Certificate Revocation List (CRL):
|
||||
Version 2 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Last Update: Jun 19 13:23:42 2020 GMT
|
||||
Next Update: Mar 16 13:23:42 2023 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Last Update: Feb 10 19:49:55 2021 GMT
|
||||
Next Update: Nov 7 19:49:55 2023 GMT
|
||||
CRL extensions:
|
||||
X509v3 CRL Number:
|
||||
6
|
||||
Revoked Certificates:
|
||||
Serial Number: 02
|
||||
Revocation Date: Jun 19 13:23:42 2020 GMT
|
||||
Revocation Date: Feb 10 19:49:55 2021 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b2:ef:5c:b7:4d:69:54:de:fc:c1:bf:2e:0e:59:e1:ac:e1:a2:
|
||||
a7:64:bd:77:ac:83:9d:1e:b9:66:74:ee:d4:79:75:79:a6:5e:
|
||||
d9:a5:80:8a:47:6d:bc:2e:c7:60:5a:f1:39:8c:ff:63:f8:c8:
|
||||
b9:dd:8e:44:93:44:24:1c:82:fd:1b:47:da:a0:d4:85:c9:5b:
|
||||
46:5f:c9:47:93:fb:e1:9c:e0:16:4a:cd:90:bd:06:72:db:d7:
|
||||
2f:ef:10:88:ce:b2:38:65:97:03:02:c7:b2:33:ac:d3:46:97:
|
||||
62:b2:03:07:8f:72:43:ba:7c:f6:bb:79:77:d1:00:3b:82:ee:
|
||||
ea:0b:0d:a3:a1:b6:9c:3d:13:42:14:eb:a7:fb:3a:86:a3:4f:
|
||||
cb:bd:82:f4:e3:60:ae:9c:3b:55:6e:6e:9d:20:f0:18:39:a6:
|
||||
a9:73:ef:85:bd:06:cd:d5:c5:64:35:a8:2a:ca:d5:bb:17:0c:
|
||||
c5:38:12:b6:97:85:00:ae:c6:1c:a0:94:65:e9:cb:72:e3:6b:
|
||||
27:3d:c1:6a:78:dd:41:22:bc:74:cc:6c:e3:15:d5:04:b2:fb:
|
||||
12:13:6b:65:90:23:16:42:83:d5:84:56:d7:0b:c4:b7:3b:0d:
|
||||
ec:25:23:9e:a9:93:b8:16:e1:21:49:29:0e:78:56:29:16:24:
|
||||
e6:c1:f0:d3
|
||||
a3:e5:bd:db:95:29:72:ae:b1:e9:1a:69:1e:7b:9c:ec:8e:e7:
|
||||
1d:54:1e:22:b7:11:44:0b:20:3e:e4:ed:59:38:a7:81:07:6f:
|
||||
bf:4d:f3:e0:5b:5e:46:3d:4e:04:7e:de:50:90:28:38:43:7e:
|
||||
2b:3b:20:6b:c9:ac:fc:7b:e6:48:67:03:6a:24:82:52:97:ce:
|
||||
82:0e:42:b8:0c:60:ac:3d:a5:bc:2b:39:cf:40:b4:c1:39:a9:
|
||||
e9:af:84:9c:c4:87:74:e5:dc:c3:28:6e:f2:93:48:8a:6d:e2:
|
||||
59:ae:f8:ed:16:77:46:4d:61:2a:7b:ec:bf:ae:8b:76:6e:3d:
|
||||
13:b5:7e:68:af:41:7e:ee:ec:4f:ab:19:45:e3:72:94:1c:db:
|
||||
5e:97:1a:24:4e:42:94:e4:b7:dc:5e:ba:6c:b0:1f:36:e7:63:
|
||||
d3:4f:5d:53:4a:48:8c:91:8e:bb:51:c0:28:ed:0b:5c:a9:f7:
|
||||
d7:ab:39:21:57:22:42:83:08:34:86:38:ca:3a:96:fc:6a:f0:
|
||||
86:5e:0b:64:84:30:28:49:fe:62:43:1b:a5:f3:f4:e7:b6:30:
|
||||
f4:ae:68:5a:82:9a:e1:00:2d:74:0e:60:b4:40:fe:f3:fe:b6:
|
||||
f8:c9:21:79:7d:f1:ee:78:e4:8c:2d:96:69:13:c3:a8:53:d5:
|
||||
af:5c:e9:0c
|
||||
-----BEGIN X509 CRL-----
|
||||
MIICDjCB9wIBATANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCVVMxEDAOBgNV
|
||||
BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZTU0xf
|
||||
MjA0ODEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMjA0ODEYMBYGA1UEAwwPd3d3Lndv
|
||||
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMDA2
|
||||
MTkxMzIzNDJaFw0yMzAzMTYxMzIzNDJaMBQwEgIBAhcNMjAwNjE5MTMyMzQyWqAO
|
||||
MAwwCgYDVR0UBAMCAQYwDQYJKoZIhvcNAQELBQADggEBALLvXLdNaVTe/MG/Lg5Z
|
||||
4azhoqdkvXesg50euWZ07tR5dXmmXtmlgIpHbbwux2Ba8TmM/2P4yLndjkSTRCQc
|
||||
gv0bR9qg1IXJW0ZfyUeT++Gc4BZKzZC9BnLb1y/vEIjOsjhllwMCx7IzrNNGl2Ky
|
||||
AwePckO6fPa7eXfRADuC7uoLDaOhtpw9E0IU66f7OoajT8u9gvTjYK6cO1Vubp0g
|
||||
8Bg5pqlz74W9Bs3VxWQ1qCrK1bsXDMU4EraXhQCuxhyglGXpy3Ljayc9wWp43UEi
|
||||
vHTMbOMV1QSy+xITa2WQIxZCg9WEVtcLxLc7DewlI56pk7gW4SFJKQ54VikWJObB
|
||||
8NM=
|
||||
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAy
|
||||
MTAxOTQ5NTVaFw0yMzExMDcxOTQ5NTVaMBQwEgIBAhcNMjEwMjEwMTk0OTU1WqAO
|
||||
MAwwCgYDVR0UBAMCAQYwDQYJKoZIhvcNAQELBQADggEBAKPlvduVKXKusekaaR57
|
||||
nOyO5x1UHiK3EUQLID7k7Vk4p4EHb79N8+BbXkY9TgR+3lCQKDhDfis7IGvJrPx7
|
||||
5khnA2okglKXzoIOQrgMYKw9pbwrOc9AtME5qemvhJzEh3Tl3MMobvKTSIpt4lmu
|
||||
+O0Wd0ZNYSp77L+ui3ZuPRO1fmivQX7u7E+rGUXjcpQc216XGiROQpTkt9xeumyw
|
||||
HzbnY9NPXVNKSIyRjrtRwCjtC1yp99erOSFXIkKDCDSGOMo6lvxq8IZeC2SEMChJ
|
||||
/mJDG6Xz9Oe2MPSuaFqCmuEALXQOYLRA/vP+tvjJIXl98e545IwtlmkTw6hT1a9c
|
||||
6Qw=
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,41 +1,41 @@
|
||||
Certificate Revocation List (CRL):
|
||||
Version 2 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Last Update: Jun 19 13:23:42 2020 GMT
|
||||
Next Update: Mar 16 13:23:42 2023 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Last Update: Feb 10 19:49:55 2021 GMT
|
||||
Next Update: Nov 7 19:49:55 2023 GMT
|
||||
CRL extensions:
|
||||
X509v3 CRL Number:
|
||||
2
|
||||
Revoked Certificates:
|
||||
Serial Number: 02
|
||||
Revocation Date: Jun 19 13:23:42 2020 GMT
|
||||
Revocation Date: Feb 10 19:49:55 2021 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
79:05:2c:9d:74:45:10:4d:f9:77:49:7e:d3:d3:97:69:b8:72:
|
||||
56:de:cd:81:a8:f3:5d:db:f7:eb:1f:02:a9:f0:25:02:43:7f:
|
||||
b0:2c:df:c5:24:57:03:48:93:c3:f4:16:37:dd:e3:32:6a:61:
|
||||
92:37:64:95:59:72:d8:1a:36:fa:d5:88:da:47:ac:c1:9a:93:
|
||||
bd:6e:68:4d:85:5c:24:63:fa:4a:d3:89:72:28:e4:b6:98:e6:
|
||||
47:26:82:82:cb:28:47:5d:b4:b4:50:48:ef:a8:50:80:e8:0b:
|
||||
ca:d0:e4:af:e5:1e:a7:49:34:d8:10:76:6b:7e:14:a3:63:9a:
|
||||
d2:54:a8:ff:5b:26:02:30:23:cf:db:e8:f3:f2:5f:68:90:bf:
|
||||
aa:a8:0a:f9:a6:bc:9c:ec:b1:26:9b:fc:fd:7a:d6:af:6d:fc:
|
||||
e2:2b:d8:62:c4:50:f0:8b:27:e9:9e:e0:44:4b:a2:32:21:06:
|
||||
b6:89:b8:d3:2f:04:7d:c9:95:d7:a1:d1:b7:bb:9b:75:16:a7:
|
||||
70:15:b1:2e:14:99:53:9c:cb:50:c8:00:5c:36:af:41:bf:a5:
|
||||
f2:3b:67:9c:50:5b:ad:2c:50:cb:a3:c4:1f:09:c1:8d:b5:64:
|
||||
8f:85:32:2e:04:8e:42:59:32:ec:3d:24:ec:7b:a4:01:59:bc:
|
||||
55:c3:1f:b9
|
||||
64:70:f6:a5:21:76:7d:3b:38:fd:42:a2:91:be:6a:54:05:7a:
|
||||
a5:ce:4d:4c:57:db:d9:7b:5e:3c:86:8f:e8:d7:02:d7:7e:87:
|
||||
9b:f2:0f:35:f3:62:c4:2a:5e:5e:f5:26:40:b1:d4:9a:8d:dc:
|
||||
65:35:76:7e:e7:68:5a:57:66:48:d6:0b:bf:ac:d1:d3:5e:50:
|
||||
40:14:ae:3f:3b:e7:5a:c2:c4:c2:41:ba:77:1d:b2:46:29:f8:
|
||||
42:44:5c:3d:2a:92:87:18:fd:9d:54:11:5d:7b:82:0a:f0:46:
|
||||
d0:c1:56:72:53:9d:85:ac:21:95:ff:65:8e:41:49:d3:be:c4:
|
||||
b8:d0:f3:61:fb:eb:0a:a6:d9:f3:09:13:a9:74:01:2b:6c:8a:
|
||||
08:59:ce:37:52:c4:0e:74:d0:52:56:9d:e1:22:42:13:1e:31:
|
||||
cf:25:be:3e:df:c0:52:26:bf:f9:5b:c9:88:3f:29:4f:2f:80:
|
||||
f9:90:97:cc:29:c8:28:4d:06:e9:d9:8e:a9:6c:1f:92:89:36:
|
||||
67:c2:03:dc:02:99:4e:40:28:be:79:ef:ed:75:86:75:a2:06:
|
||||
47:cd:a6:93:b0:8c:74:3c:97:3a:d2:b8:e2:b5:fb:b4:76:eb:
|
||||
87:9f:97:f3:35:78:ee:d0:49:84:38:f1:2b:5c:5e:12:a1:c6:
|
||||
69:7a:ff:85
|
||||
-----BEGIN X509 CRL-----
|
||||
MIICBDCB7QIBATANBgkqhkiG9w0BAQsFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV
|
||||
BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3Ro
|
||||
MRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIwMDYxOTEzMjM0MloX
|
||||
DTIzMDMxNjEzMjM0MlowFDASAgECFw0yMDA2MTkxMzIzNDJaoA4wDDAKBgNVHRQE
|
||||
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAeQUsnXRFEE35d0l+09OXabhyVt7Ngajz
|
||||
Xdv36x8CqfAlAkN/sCzfxSRXA0iTw/QWN93jMmphkjdklVly2Bo2+tWI2keswZqT
|
||||
vW5oTYVcJGP6StOJcijktpjmRyaCgssoR120tFBI76hQgOgLytDkr+Uep0k02BB2
|
||||
a34Uo2Oa0lSo/1smAjAjz9vo8/JfaJC/qqgK+aa8nOyxJpv8/XrWr2384ivYYsRQ
|
||||
8Isn6Z7gREuiMiEGtom40y8EfcmV16HRt7ubdRancBWxLhSZU5zLUMgAXDavQb+l
|
||||
8jtnnFBbrSxQy6PEHwnBjbVkj4UyLgSOQlky7D0k7HukAVm8VcMfuQ==
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
|
||||
DTIzMTEwNzE5NDk1NVowFDASAgECFw0yMTAyMTAxOTQ5NTVaoA4wDDAKBgNVHRQE
|
||||
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAZHD2pSF2fTs4/UKikb5qVAV6pc5NTFfb
|
||||
2XtePIaP6NcC136Hm/IPNfNixCpeXvUmQLHUmo3cZTV2fudoWldmSNYLv6zR015Q
|
||||
QBSuPzvnWsLEwkG6dx2yRin4QkRcPSqShxj9nVQRXXuCCvBG0MFWclOdhawhlf9l
|
||||
jkFJ077EuNDzYfvrCqbZ8wkTqXQBK2yKCFnON1LEDnTQUlad4SJCEx4xzyW+Pt/A
|
||||
Uia/+VvJiD8pTy+A+ZCXzCnIKE0G6dmOqWwfkok2Z8ID3AKZTkAovnnv7XWGdaIG
|
||||
R82mk7CMdDyXOtK44rX7tHbrh5+X8zV47tBJhDjxK1xeEqHGaXr/hQ==
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,44 +1,44 @@
|
||||
Certificate Revocation List (CRL):
|
||||
Version 2 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Last Update: Jun 19 13:23:42 2020 GMT
|
||||
Next Update: Mar 16 13:23:42 2023 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Last Update: Feb 10 19:49:55 2021 GMT
|
||||
Next Update: Nov 7 19:49:55 2023 GMT
|
||||
CRL extensions:
|
||||
X509v3 CRL Number:
|
||||
3
|
||||
Revoked Certificates:
|
||||
Serial Number: 01
|
||||
Revocation Date: Jun 19 13:23:42 2020 GMT
|
||||
Revocation Date: Feb 10 19:49:55 2021 GMT
|
||||
Serial Number: 02
|
||||
Revocation Date: Jun 19 13:23:42 2020 GMT
|
||||
Revocation Date: Feb 10 19:49:55 2021 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
30:44:69:cd:7f:61:ac:6a:a0:fe:28:46:97:1c:0a:3c:c2:f9:
|
||||
ad:77:d4:37:18:d7:49:d0:1f:56:d8:44:2c:4f:e2:a9:3d:2a:
|
||||
b5:31:82:5d:38:bd:3a:1f:ab:9e:a0:3c:c4:61:27:46:6b:ee:
|
||||
ff:87:72:02:a5:a2:e8:e4:87:c6:37:0c:2c:58:92:4f:28:9d:
|
||||
4a:9a:59:f0:b9:c7:b1:2d:1e:a3:f4:51:ad:cd:92:1f:f9:96:
|
||||
aa:75:3c:1d:af:2a:34:b0:f3:b3:b8:63:f2:50:14:95:0e:f4:
|
||||
89:19:c3:b3:2b:f1:26:11:23:eb:a6:94:a5:67:10:54:3d:e6:
|
||||
aa:57:9a:82:9c:21:0b:f7:4a:24:f6:b9:8b:33:1d:30:fd:cc:
|
||||
4c:be:61:22:76:32:f6:dc:0a:8f:bf:4b:3e:db:39:84:79:30:
|
||||
a1:54:3a:5e:a7:b9:c4:39:0a:dc:29:ed:90:8b:a2:46:4f:1b:
|
||||
54:1c:03:c4:a9:00:ca:f8:d0:dd:4c:5c:36:18:d9:2e:b0:1c:
|
||||
ed:e7:3a:88:7a:9e:6b:81:7c:4f:95:bf:24:2a:1b:30:40:0f:
|
||||
e9:44:d8:21:8b:65:24:f4:b7:9c:61:f6:f1:17:f7:79:6d:03:
|
||||
24:4f:c0:c5:db:09:85:91:8f:38:a0:20:af:66:56:3a:05:6f:
|
||||
57:51:1e:2c
|
||||
8e:c0:a9:05:07:8f:c0:f0:e8:54:63:86:8b:0b:65:80:fc:d5:
|
||||
b8:97:48:2f:c3:43:02:df:63:65:53:bb:cf:4c:d6:90:28:3c:
|
||||
15:be:48:b4:1a:39:5e:0f:73:a6:f0:39:b5:ca:82:99:98:d8:
|
||||
8f:94:d9:3a:9a:ed:54:50:8c:20:8d:90:ce:02:f8:f6:2d:5d:
|
||||
d2:48:99:4d:15:8f:c5:61:95:35:31:83:80:9a:4a:19:01:5e:
|
||||
d2:fd:9c:2e:ee:b6:d8:c0:fa:38:7d:cc:6c:ce:c5:62:dc:95:
|
||||
70:79:3e:09:89:14:11:f9:8a:06:b1:1a:ab:52:25:a9:e6:01:
|
||||
96:9d:ea:b8:aa:81:14:6c:d0:75:a2:03:41:e0:24:06:44:b5:
|
||||
ff:95:50:7f:e4:50:78:03:24:f1:2c:4f:f9:ae:72:b4:3b:a2:
|
||||
1b:cb:ab:cd:86:2f:9a:3f:81:4e:c3:a9:34:2f:e0:55:66:90:
|
||||
55:d1:ee:37:d6:25:a0:b2:ae:d6:6b:2a:1b:21:aa:d8:2b:36:
|
||||
c1:30:05:88:dd:a9:58:09:65:eb:29:0a:e8:c3:b7:dc:39:51:
|
||||
2f:34:6d:3a:07:99:cd:b0:80:4e:82:1e:c2:8e:f4:64:15:54:
|
||||
a1:25:95:95:65:ba:46:a5:6d:ac:f6:57:f9:ae:26:5e:80:51:
|
||||
c2:79:21:d7
|
||||
-----BEGIN X509 CRL-----
|
||||
MIICGTCCAQECAQEwDQYJKoZIhvcNAQELBQAwgZQxCzAJBgNVBAYTAlVTMRAwDgYD
|
||||
VQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREwDwYDVQQKDAhTYXd0b290
|
||||
aDETMBEGA1UECwwKQ29uc3VsdGluZzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29t
|
||||
MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMDA2MTkxMzIzNDJa
|
||||
Fw0yMzAzMTYxMzIzNDJaMCgwEgIBARcNMjAwNjE5MTMyMzQyWjASAgECFw0yMDA2
|
||||
MTkxMzIzNDJaoA4wDDAKBgNVHRQEAwIBAzANBgkqhkiG9w0BAQsFAAOCAQEAMERp
|
||||
zX9hrGqg/ihGlxwKPML5rXfUNxjXSdAfVthELE/iqT0qtTGCXTi9Oh+rnqA8xGEn
|
||||
Rmvu/4dyAqWi6OSHxjcMLFiSTyidSppZ8LnHsS0eo/RRrc2SH/mWqnU8Ha8qNLDz
|
||||
s7hj8lAUlQ70iRnDsyvxJhEj66aUpWcQVD3mqleagpwhC/dKJPa5izMdMP3MTL5h
|
||||
InYy9twKj79LPts5hHkwoVQ6Xqe5xDkK3CntkIuiRk8bVBwDxKkAyvjQ3UxcNhjZ
|
||||
LrAc7ec6iHqea4F8T5W/JCobMEAP6UTYIYtlJPS3nGH28Rf3eW0DJE/AxdsJhZGP
|
||||
OKAgr2ZWOgVvV1EeLA==
|
||||
MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAyMTAxOTQ5NTVa
|
||||
Fw0yMzExMDcxOTQ5NTVaMCgwEgIBARcNMjEwMjEwMTk0OTU1WjASAgECFw0yMTAy
|
||||
MTAxOTQ5NTVaoA4wDDAKBgNVHRQEAwIBAzANBgkqhkiG9w0BAQsFAAOCAQEAjsCp
|
||||
BQePwPDoVGOGiwtlgPzVuJdIL8NDAt9jZVO7z0zWkCg8Fb5ItBo5Xg9zpvA5tcqC
|
||||
mZjYj5TZOprtVFCMII2QzgL49i1d0kiZTRWPxWGVNTGDgJpKGQFe0v2cLu622MD6
|
||||
OH3MbM7FYtyVcHk+CYkUEfmKBrEaq1IlqeYBlp3quKqBFGzQdaIDQeAkBkS1/5VQ
|
||||
f+RQeAMk8SxP+a5ytDuiG8urzYYvmj+BTsOpNC/gVWaQVdHuN9YloLKu1msqGyGq
|
||||
2Cs2wTAFiN2pWAll6ykK6MO33DlRLzRtOgeZzbCAToIewo70ZBVUoSWVlWW6RqVt
|
||||
rPZX+a4mXoBRwnkh1w==
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,80 +1,80 @@
|
||||
Certificate Revocation List (CRL):
|
||||
Version 2 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Last Update: Jun 19 13:23:42 2020 GMT
|
||||
Next Update: Mar 16 13:23:42 2023 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Last Update: Feb 10 19:49:55 2021 GMT
|
||||
Next Update: Nov 7 19:49:55 2023 GMT
|
||||
CRL extensions:
|
||||
X509v3 CRL Number:
|
||||
2
|
||||
Revoked Certificates:
|
||||
Serial Number: 02
|
||||
Revocation Date: Jun 19 13:23:42 2020 GMT
|
||||
Revocation Date: Feb 10 19:49:55 2021 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
79:05:2c:9d:74:45:10:4d:f9:77:49:7e:d3:d3:97:69:b8:72:
|
||||
56:de:cd:81:a8:f3:5d:db:f7:eb:1f:02:a9:f0:25:02:43:7f:
|
||||
b0:2c:df:c5:24:57:03:48:93:c3:f4:16:37:dd:e3:32:6a:61:
|
||||
92:37:64:95:59:72:d8:1a:36:fa:d5:88:da:47:ac:c1:9a:93:
|
||||
bd:6e:68:4d:85:5c:24:63:fa:4a:d3:89:72:28:e4:b6:98:e6:
|
||||
47:26:82:82:cb:28:47:5d:b4:b4:50:48:ef:a8:50:80:e8:0b:
|
||||
ca:d0:e4:af:e5:1e:a7:49:34:d8:10:76:6b:7e:14:a3:63:9a:
|
||||
d2:54:a8:ff:5b:26:02:30:23:cf:db:e8:f3:f2:5f:68:90:bf:
|
||||
aa:a8:0a:f9:a6:bc:9c:ec:b1:26:9b:fc:fd:7a:d6:af:6d:fc:
|
||||
e2:2b:d8:62:c4:50:f0:8b:27:e9:9e:e0:44:4b:a2:32:21:06:
|
||||
b6:89:b8:d3:2f:04:7d:c9:95:d7:a1:d1:b7:bb:9b:75:16:a7:
|
||||
70:15:b1:2e:14:99:53:9c:cb:50:c8:00:5c:36:af:41:bf:a5:
|
||||
f2:3b:67:9c:50:5b:ad:2c:50:cb:a3:c4:1f:09:c1:8d:b5:64:
|
||||
8f:85:32:2e:04:8e:42:59:32:ec:3d:24:ec:7b:a4:01:59:bc:
|
||||
55:c3:1f:b9
|
||||
64:70:f6:a5:21:76:7d:3b:38:fd:42:a2:91:be:6a:54:05:7a:
|
||||
a5:ce:4d:4c:57:db:d9:7b:5e:3c:86:8f:e8:d7:02:d7:7e:87:
|
||||
9b:f2:0f:35:f3:62:c4:2a:5e:5e:f5:26:40:b1:d4:9a:8d:dc:
|
||||
65:35:76:7e:e7:68:5a:57:66:48:d6:0b:bf:ac:d1:d3:5e:50:
|
||||
40:14:ae:3f:3b:e7:5a:c2:c4:c2:41:ba:77:1d:b2:46:29:f8:
|
||||
42:44:5c:3d:2a:92:87:18:fd:9d:54:11:5d:7b:82:0a:f0:46:
|
||||
d0:c1:56:72:53:9d:85:ac:21:95:ff:65:8e:41:49:d3:be:c4:
|
||||
b8:d0:f3:61:fb:eb:0a:a6:d9:f3:09:13:a9:74:01:2b:6c:8a:
|
||||
08:59:ce:37:52:c4:0e:74:d0:52:56:9d:e1:22:42:13:1e:31:
|
||||
cf:25:be:3e:df:c0:52:26:bf:f9:5b:c9:88:3f:29:4f:2f:80:
|
||||
f9:90:97:cc:29:c8:28:4d:06:e9:d9:8e:a9:6c:1f:92:89:36:
|
||||
67:c2:03:dc:02:99:4e:40:28:be:79:ef:ed:75:86:75:a2:06:
|
||||
47:cd:a6:93:b0:8c:74:3c:97:3a:d2:b8:e2:b5:fb:b4:76:eb:
|
||||
87:9f:97:f3:35:78:ee:d0:49:84:38:f1:2b:5c:5e:12:a1:c6:
|
||||
69:7a:ff:85
|
||||
-----BEGIN X509 CRL-----
|
||||
MIICBDCB7QIBATANBgkqhkiG9w0BAQsFADCBlDELMAkGA1UEBhMCVVMxEDAOBgNV
|
||||
BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rvb3Ro
|
||||
MRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20x
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIwMDYxOTEzMjM0MloX
|
||||
DTIzMDMxNjEzMjM0MlowFDASAgECFw0yMDA2MTkxMzIzNDJaoA4wDDAKBgNVHRQE
|
||||
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAeQUsnXRFEE35d0l+09OXabhyVt7Ngajz
|
||||
Xdv36x8CqfAlAkN/sCzfxSRXA0iTw/QWN93jMmphkjdklVly2Bo2+tWI2keswZqT
|
||||
vW5oTYVcJGP6StOJcijktpjmRyaCgssoR120tFBI76hQgOgLytDkr+Uep0k02BB2
|
||||
a34Uo2Oa0lSo/1smAjAjz9vo8/JfaJC/qqgK+aa8nOyxJpv8/XrWr2384ivYYsRQ
|
||||
8Isn6Z7gREuiMiEGtom40y8EfcmV16HRt7ubdRancBWxLhSZU5zLUMgAXDavQb+l
|
||||
8jtnnFBbrSxQy6PEHwnBjbVkj4UyLgSOQlky7D0k7HukAVm8VcMfuQ==
|
||||
HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
|
||||
DTIzMTEwNzE5NDk1NVowFDASAgECFw0yMTAyMTAxOTQ5NTVaoA4wDDAKBgNVHRQE
|
||||
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAZHD2pSF2fTs4/UKikb5qVAV6pc5NTFfb
|
||||
2XtePIaP6NcC136Hm/IPNfNixCpeXvUmQLHUmo3cZTV2fudoWldmSNYLv6zR015Q
|
||||
QBSuPzvnWsLEwkG6dx2yRin4QkRcPSqShxj9nVQRXXuCCvBG0MFWclOdhawhlf9l
|
||||
jkFJ077EuNDzYfvrCqbZ8wkTqXQBK2yKCFnON1LEDnTQUlad4SJCEx4xzyW+Pt/A
|
||||
Uia/+VvJiD8pTy+A+ZCXzCnIKE0G6dmOqWwfkok2Z8ID3AKZTkAovnnv7XWGdaIG
|
||||
R82mk7CMdDyXOtK44rX7tHbrh5+X8zV47tBJhDjxK1xeEqHGaXr/hQ==
|
||||
-----END X509 CRL-----
|
||||
Certificate Revocation List (CRL):
|
||||
Version 2 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Last Update: Jun 19 13:23:42 2020 GMT
|
||||
Next Update: Mar 16 13:23:42 2023 GMT
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Last Update: Feb 10 19:49:55 2021 GMT
|
||||
Next Update: Nov 7 19:49:55 2023 GMT
|
||||
CRL extensions:
|
||||
X509v3 CRL Number:
|
||||
1
|
||||
No Revoked Certificates.
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
41:8a:3f:6d:b2:f9:50:c3:cb:d6:18:09:f6:ed:c5:96:8b:3a:
|
||||
5f:7c:52:e7:74:7e:64:ec:3e:b8:34:c2:46:72:76:4a:24:c3:
|
||||
72:06:26:a7:49:1c:12:6a:99:db:d2:ad:55:a8:40:ef:33:f2:
|
||||
4c:fc:af:d8:46:1c:18:82:39:7c:0b:fb:b3:66:a1:64:eb:47:
|
||||
59:e7:3a:e1:5e:e6:e4:e9:18:69:96:90:64:85:74:97:33:ff:
|
||||
91:38:78:e4:fa:fd:50:56:dc:0a:3b:68:b4:dc:6c:8c:65:04:
|
||||
d8:e5:cf:f7:71:a9:d6:cb:18:c8:91:cb:6f:3d:ec:45:18:7b:
|
||||
50:10:45:3b:00:91:88:e5:b6:1c:6f:26:ce:f6:3b:66:45:f7:
|
||||
72:25:59:62:ec:15:29:26:25:f8:f0:0d:30:49:a3:0e:71:9e:
|
||||
af:2d:30:62:2a:a5:8e:c3:ce:c0:cc:cb:5b:33:70:71:0d:0c:
|
||||
85:37:6d:fd:50:65:8f:3a:07:21:a6:98:f8:cc:18:df:2b:48:
|
||||
71:cb:25:62:e4:ab:20:b2:64:6d:68:e8:7c:8a:40:f4:0c:a9:
|
||||
36:b7:a9:45:66:37:b1:10:6a:c7:c1:aa:87:8d:f9:0f:e9:39:
|
||||
80:ef:9c:11:87:58:35:99:4d:af:92:3f:81:d7:33:78:1d:9b:
|
||||
93:c8:eb:11
|
||||
06:4d:a9:9b:4a:4c:b9:57:02:ff:06:89:d7:1b:39:3a:0a:64:
|
||||
53:e1:15:93:77:f0:9c:69:f9:66:6d:76:67:2b:12:da:c6:9a:
|
||||
9c:53:c1:3c:e5:17:d3:97:9f:bd:c7:d4:a3:6b:0d:e3:4b:f5:
|
||||
ae:f2:63:58:70:28:e0:ab:09:5f:d1:b1:95:b3:4f:6a:7c:b7:
|
||||
2c:a8:07:ef:d4:39:47:be:6d:31:a0:8f:f3:e9:0e:8a:3a:5f:
|
||||
da:cd:7e:60:1e:cb:53:d9:18:31:7c:dc:d1:2f:ec:26:c8:f5:
|
||||
e0:31:eb:f0:83:71:08:e7:05:bd:79:61:cb:7b:17:70:70:1a:
|
||||
fa:f8:0b:a4:d0:b3:d5:53:ce:b7:88:7f:4d:96:0a:96:0d:28:
|
||||
a3:4e:2c:8b:bb:d6:27:a0:12:b3:cd:78:79:8f:61:29:8a:e6:
|
||||
d0:c6:a5:10:1e:f5:f8:a2:c2:cb:cd:a0:b5:6f:44:62:25:e8:
|
||||
47:63:9f:5c:c3:d9:88:70:e8:a8:12:f5:7e:ba:99:ef:3c:73:
|
||||
02:46:72:60:ea:80:d4:f0:98:2f:47:3f:e5:04:82:51:79:ae:
|
||||
09:2c:60:2c:1d:8d:00:8b:60:27:e1:58:46:ac:48:4c:c6:bc:
|
||||
26:43:72:08:4d:1d:c2:c9:e6:21:e6:0d:e9:19:ac:cb:65:f2:
|
||||
96:9e:ff:d5
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIB+DCB4QIBATANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCVVMxEDAOBgNV
|
||||
BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZTU0xf
|
||||
MjA0ODEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMjA0ODEYMBYGA1UEAwwPd3d3Lndv
|
||||
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMDA2
|
||||
MTkxMzIzNDJaFw0yMzAzMTYxMzIzNDJaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG
|
||||
9w0BAQsFAAOCAQEAQYo/bbL5UMPL1hgJ9u3Flos6X3xS53R+ZOw+uDTCRnJ2SiTD
|
||||
cgYmp0kcEmqZ29KtVahA7zPyTPyv2EYcGII5fAv7s2ahZOtHWec64V7m5OkYaZaQ
|
||||
ZIV0lzP/kTh45Pr9UFbcCjtotNxsjGUE2OXP93Gp1ssYyJHLbz3sRRh7UBBFOwCR
|
||||
iOW2HG8mzvY7ZkX3ciVZYuwVKSYl+PANMEmjDnGery0wYiqljsPOwMzLWzNwcQ0M
|
||||
hTdt/VBljzoHIaaY+MwY3ytIccslYuSrILJkbWjofIpA9AypNrepRWY3sRBqx8Gq
|
||||
h435D+k5gO+cEYdYNZlNr5I/gdczeB2bk8jrEQ==
|
||||
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAy
|
||||
MTAxOTQ5NTVaFw0yMzExMDcxOTQ5NTVaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG
|
||||
9w0BAQsFAAOCAQEABk2pm0pMuVcC/waJ1xs5OgpkU+EVk3fwnGn5Zm12ZysS2saa
|
||||
nFPBPOUX05efvcfUo2sN40v1rvJjWHAo4KsJX9GxlbNPany3LKgH79Q5R75tMaCP
|
||||
8+kOijpf2s1+YB7LU9kYMXzc0S/sJsj14DHr8INxCOcFvXlhy3sXcHAa+vgLpNCz
|
||||
1VPOt4h/TZYKlg0oo04si7vWJ6ASs814eY9hKYrm0MalEB71+KLCy82gtW9EYiXo
|
||||
R2OfXMPZiHDoqBL1frqZ7zxzAkZyYOqA1PCYL0c/5QSCUXmuCSxgLB2NAItgJ+FY
|
||||
RqxITMa8JkNyCE0dwsnmIeYN6Rmsy2Xylp7/1Q==
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
Certificate Revocation List (CRL):
|
||||
Version 2 (0x1)
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Last Update: Jun 19 13:23:42 2020 GMT
|
||||
Next Update: Mar 16 13:23:42 2023 GMT
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: /C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Last Update: Feb 10 19:49:55 2021 GMT
|
||||
Next Update: Nov 7 19:49:55 2023 GMT
|
||||
CRL extensions:
|
||||
X509v3 CRL Number:
|
||||
7
|
||||
Revoked Certificates:
|
||||
Serial Number: 02
|
||||
Revocation Date: Jun 19 13:23:42 2020 GMT
|
||||
Revocation Date: Feb 10 19:49:55 2021 GMT
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:44:02:20:1f:f9:3b:df:b9:ad:68:58:fb:48:d7:57:16:06:
|
||||
6b:13:6f:81:53:a8:bc:ed:2b:ee:8f:0e:1f:a6:25:bd:c5:1d:
|
||||
02:20:0b:49:18:aa:20:34:4b:45:b4:da:f8:34:d7:3d:86:d7:
|
||||
00:1f:fa:93:49:f4:00:d4:5b:de:27:ea:c9:9d:7d:b2
|
||||
30:45:02:20:65:84:ba:e0:1c:9d:4b:be:e8:90:61:64:b6:0e:
|
||||
c6:75:77:9e:dd:ed:08:59:93:7e:86:a9:02:98:b4:01:57:4c:
|
||||
02:21:00:84:76:4a:98:1b:ae:ff:2e:6c:a5:65:3d:25:8f:5c:
|
||||
20:6a:6c:bb:52:02:11:1f:f6:2f:d4:c9:aa:d6:2f:ab:65
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIBOzCB4wIBATAKBggqhkjOPQQDAjCBjTELMAkGA1UEBhMCVVMxDzANBgNVBAgM
|
||||
MIIBPDCB4wIBATAKBggqhkjOPQQDAjCBjTELMAkGA1UEBhMCVVMxDzANBgNVBAgM
|
||||
Bk9yZWdvbjEOMAwGA1UEBwwFU2FsZW0xEzARBgNVBAoMCkNsaWVudCBFQ0MxDTAL
|
||||
BgNVBAsMBEZhc3QxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3
|
||||
DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjAwNjE5MTMyMzQyWhcNMjMwMzE2MTMy
|
||||
MzQyWjAUMBICAQIXDTIwMDYxOTEzMjM0MlqgDjAMMAoGA1UdFAQDAgEHMAoGCCqG
|
||||
SM49BAMCA0cAMEQCIB/5O9+5rWhY+0jXVxYGaxNvgVOovO0r7o8OH6YlvcUdAiAL
|
||||
SRiqIDRLRbTa+DTXPYbXAB/6k0n0ANRb3ifqyZ19sg==
|
||||
DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjEwMjEwMTk0OTU1WhcNMjMxMTA3MTk0
|
||||
OTU1WjAUMBICAQIXDTIxMDIxMDE5NDk1NVqgDjAMMAoGA1UdFAQDAgEHMAoGCCqG
|
||||
SM49BAMCA0gAMEUCIGWEuuAcnUu+6JBhZLYOxnV3nt3tCFmTfoapApi0AVdMAiEA
|
||||
hHZKmBuu/y5spWU9JY9cIGpsu1ICER/2L9TJqtYvq2U=
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
Certificate Revocation List (CRL):
|
||||
Version 2 (0x1)
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = Eliptic, OU = ECC, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Last Update: Jun 19 13:23:42 2020 GMT
|
||||
Next Update: Mar 16 13:23:42 2023 GMT
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: /C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Last Update: Feb 10 19:49:55 2021 GMT
|
||||
Next Update: Nov 7 19:49:55 2023 GMT
|
||||
CRL extensions:
|
||||
X509v3 CRL Number:
|
||||
8
|
||||
Revoked Certificates:
|
||||
Serial Number: 02
|
||||
Revocation Date: Jun 19 13:23:42 2020 GMT
|
||||
Revocation Date: Feb 10 19:49:55 2021 GMT
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:44:02:20:62:31:0a:f2:44:8f:53:6a:c9:c4:ee:81:b4:2b:
|
||||
ef:a0:6d:ca:b1:81:ff:59:f8:b8:d2:de:2b:85:39:56:05:5c:
|
||||
02:20:3b:b2:62:0b:50:8a:3b:40:49:9d:07:ed:3f:b3:69:38:
|
||||
66:92:f6:1c:59:07:fe:d3:33:3e:bc:d2:f7:20:36:8c
|
||||
30:44:02:20:54:0d:dc:8e:be:14:0c:d9:ce:6e:46:67:b9:5e:
|
||||
86:9a:e7:b4:1f:b2:e1:8a:66:90:0f:48:50:ae:49:0c:32:21:
|
||||
02:20:5a:ef:02:db:83:cf:9e:df:d4:d7:9d:60:a5:7a:56:7d:
|
||||
b3:c8:8c:5d:01:33:0f:bd:5e:d0:da:8a:59:e6:e0:42
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIBPTCB5QIBATAKBggqhkjOPQQDAjCBjzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
|
||||
Cldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB0VsaXB0aWMx
|
||||
DDAKBgNVBAsMA0VDQzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZI
|
||||
hvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMDA2MTkxMzIzNDJaFw0yMzAzMTYx
|
||||
MzIzNDJaMBQwEgIBAhcNMjAwNjE5MTMyMzQyWqAOMAwwCgYDVR0UBAMCAQgwCgYI
|
||||
KoZIzj0EAwIDRwAwRAIgYjEK8kSPU2rJxO6BtCvvoG3KsYH/Wfi40t4rhTlWBVwC
|
||||
IDuyYgtQijtASZ0H7T+zaThmkvYcWQf+0zM+vNL3IDaM
|
||||
hvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAyMTAxOTQ5NTVaFw0yMzExMDcx
|
||||
OTQ5NTVaMBQwEgIBAhcNMjEwMjEwMTk0OTU1WqAOMAwwCgYDVR0UBAMCAQgwCgYI
|
||||
KoZIzj0EAwIDRwAwRAIgVA3cjr4UDNnObkZnuV6Gmue0H7LhimaQD0hQrkkMMiEC
|
||||
IFrvAtuDz57f1NedYKV6Vn2zyIxdATMPvV7Q2opZ5uBC
|
||||
-----END X509 CRL-----
|
||||
|
||||
@@ -1,9 +1,9 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIBLjCB1QIUG1+hLN2cYpa/I9DdQKzWnHdkuIIwCgYIKoZIzj0EAwIwGjELMAkG
|
||||
A1UECgwCV1IxCzAJBgNVBAMMAkRFMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEz
|
||||
MjM0MVowGjELMAkGA1UECgwCV1IxCzAJBgNVBAMMAkRFMFkwEwYHKoZIzj0CAQYI
|
||||
KoZIzj0DAQcDQgAEJcD9Frgr8rgKHt2szmJSfFgKYH1Xddq9EcHVKupUa3bmPTb3
|
||||
3VGXa6gm/numvZZVhVCdmn5pAdhDRYnZ/korJjAKBggqhkjOPQQDAgNIADBFAiBW
|
||||
OIta9VMOnweJmwIL9oLlYxeQd/17VZKx/M+8o2sHJgIhAOg/1Q6oWp3tw3T2tLLn
|
||||
U5Ge/MqDE4Uo+HZgtTL2aQzF
|
||||
MIIBIzCBygIJAIxrmIr/9d3gMAoGCCqGSM49BAMCMBoxCzAJBgNVBAoMAldSMQsw
|
||||
CQYDVQQDDAJERTAeFw0yMTAyMTAxOTQ5NTNaFw0yMzExMDcxOTQ5NTNaMBoxCzAJ
|
||||
BgNVBAoMAldSMQswCQYDVQQDDAJERTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
|
||||
BCXA/Ra4K/K4Ch7drM5iUnxYCmB9V3XavRHB1SrqVGt25j02991Rl2uoJv57pr2W
|
||||
VYVQnZp+aQHYQ0WJ2f5KKyYwCgYIKoZIzj0EAwIDSAAwRQIhAMaYJZ3Mpdbd/o0j
|
||||
o9X5/HUj5T15lRzwDVMbDy+DjOV3AiBEmFWgnQ3Xii2xcrHOyEG/iLzqZ5JuJqq/
|
||||
j9BaGBwdlA==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
Binary file not shown.
@@ -1,4 +1,4 @@
|
||||
-----BEGIN EDDSA PRIVATE KEY-----
|
||||
MFICAQAwBQYDK2VwBCIEIALLg+oVSN6eOx+rCjIui2cYL3VyBkk2pWBdv1+JXJBy
|
||||
oSIEIGWqfwWkBDSg6q0fqYbw2H9y36kOE6A4ZiZe60gwgEhJ
|
||||
MFICAQAwBQYDK2VwBCIEIAw37caag1d0w0pY63b7oe9Frg8SA0rLDtnWWDl7MafZ
|
||||
oSIEIKqWfWdx1/6tqF8UGL4C0BV+gGS5IXuyP3x0bv/1hOKB
|
||||
-----END EDDSA PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,3 +1,3 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MC4CAQAwBQYDK2VwBCIEIALLg+oVSN6eOx+rCjIui2cYL3VyBkk2pWBdv1+JXJBy
|
||||
MC4CAQAwBQYDK2VwBCIEIAw37caag1d0w0pY63b7oe9Frg8SA0rLDtnWWDl7MafZ
|
||||
-----END PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,15 +1,15 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICYDCCAhKgAwIBAgIQAIC6aHfvpeVCfcZzLFSFuDAFBgMrZXAwgZ8xCzAJBgNV
|
||||
MIICVDCCAgagAwIBAgIQQAiKTYWESER1OSfza785ITAFBgMrZXAwgZkxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
|
||||
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wIhgPMjAxODA0MTIxNjIyMTdaGA8yMDIxMDEwNzE1MjIxN1owgZ0x
|
||||
CzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFu
|
||||
MQswCQYDVQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUx
|
||||
OTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tMCowBQYDK2VwAyEAZap/BaQENKDqrR+phvDYf3LfqQ4ToDhm
|
||||
Jl7rSDCASEmjYDBeMAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFJI/lnIC+mEcIW2I
|
||||
3evdPJsXxJ+3MB8GA1UdIwQYMBaAFP4BRn9vKz4csG/hzE0CJfdNCpW4MA4GA1Ud
|
||||
DwEB/wQEAwIBxjAFBgMrZXADQQBMQNB/vPv0ohpY9nLj6NoYDZTcDv3B5wKleu7L
|
||||
wn76ofwVmv4e4Dfff6t2UAbUPRplcz+S1ERip0yzKgGH4wYG
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j
|
||||
b20wIhgPMjAyMTAyMDkxOTUwMDRaGA8yMDIzMDIxMDE5NTAwNFowgZcxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQswCQYD
|
||||
VQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
|
||||
MCowBQYDK2VwAyEAqpZ9Z3HX/q2oXxQYvgLQFX6AZLkhe7I/fHRu//WE4oGjYDBe
|
||||
MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFG6LDcksWUNgr6UyhWz1dPO6VJvMMB8G
|
||||
A1UdIwQYMBaAFBl6CabmJl9fBlLOYyRaj1xxPbt3MA4GA1UdDwEB/wQEAwIBxjAF
|
||||
BgMrZXADQQC7w3pxbsKWWTZl1BQDkNAauSRVUoKYgLK67OcsHMYTpbjNLan5jeT+
|
||||
3z62i4fbzNBLDJD89XUSjtqQt1LRoE0F
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,4 +1,4 @@
|
||||
-----BEGIN EDDSA PRIVATE KEY-----
|
||||
MFICAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
|
||||
oSIEIKLxJkCbolna2+YVf5oRtUhfVbpe7Ub3mGe+DJPjpI4Y
|
||||
MFICAQAwBQYDK2VwBCIEICkn2+pW4KyBhuv1IuoymGLEqp9hTFcALhcvKrmHgkhs
|
||||
oSIEIE6fglljSpes+m6VbFo7Uuuj2ef2J7uJ+3e046zCCGrA
|
||||
-----END EDDSA PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,3 +1,3 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MC4CAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
|
||||
MC4CAQAwBQYDK2VwBCIEICkn2+pW4KyBhuv1IuoymGLEqp9hTFcALhcvKrmHgkhs
|
||||
-----END PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,15 +1,15 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICWDCCAgqgAwIBAgIQAI8vNbJTvU+S0f8dS0ClSTAFBgMrZXAwgaExCzAJBgNV
|
||||
MIICTDCCAf6gAwIBAgIQFcHfya6OWie0wxPOBaz6TDAFBgMrZXAwgZsxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ8wDQYD
|
||||
VQQEDAZjbGllbnQxEDAOBgNVBAoMB3dvbGZTU0wxEDAOBgNVBAsMB0VEMjU1MTkx
|
||||
GDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
|
||||
b2xmc3NsLmNvbTAiGA8yMDE4MDQxMjE2MjIxN1oYDzIwMjEwMTA3MTUyMjE3WjCB
|
||||
oTELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVt
|
||||
YW4xDzANBgNVBAQMBmNsaWVudDEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwH
|
||||
RUQyNTUxOTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkB
|
||||
FhBpbmZvQHdvbGZzc2wuY29tMCowBQYDK2VwAyEAovEmQJuiWdrb5hV/mhG1SF9V
|
||||
ul7tRveYZ74Mk+OkjhijUjBQMB0GA1UdDgQWBBT+AUZ/bys+HLBv4cxNAiX3TQqV
|
||||
uDAfBgNVHSMEGDAWgBT+AUZ/bys+HLBv4cxNAiX3TQqVuDAOBgNVHQ8BAf8EBAMC
|
||||
BsAwBQYDK2VwA0EAKfZp4rlzEtFk64/pa2HbX+mnYmwQiUGA4+j9H9ATrpUAr/d3
|
||||
4SIyrUZP3H7+rryKH5YK2p/Jk1InGLCL2r6BCQ==
|
||||
GDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEZMBcGA1UEBQAQaW5mb0B3b2xmc3Ns
|
||||
LmNvbTAiGA8yMDIxMDIwOTE5NTAwNFoYDzIwMjMwMjEwMTk1MDA0WjCBmzELMAkG
|
||||
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xDzAN
|
||||
BgNVBAQMBmNsaWVudDEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUx
|
||||
OTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZz
|
||||
c2wuY29tMCowBQYDK2VwAyEATp+CWWNKl6z6bpVsWjtS66PZ5/Ynu4n7d7TjrMII
|
||||
asCjUjBQMB0GA1UdDgQWBBQxmyle67rNf5gcL3e47pgvKH2Z+DAfBgNVHSMEGDAW
|
||||
gBQxmyle67rNf5gcL3e47pgvKH2Z+DAOBgNVHQ8BAf8EBAMCBsAwBQYDK2VwA0EA
|
||||
2DDJOFXo02UBBQyoCvcK5n21/GJmFQiwlQQICFMzq//6xYm8eYtNN/RkCnBDysvj
|
||||
p6jnAwZw6/MMujoxC3PtCg==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -3,6 +3,7 @@
|
||||
EXAMPLE=$1
|
||||
echo "This uses ed25519 certificate generator from wolfssl-examples github"
|
||||
echo "The script takes in the directory to wolfssl-examples"
|
||||
echo "https://github.com/wolfSSL/wolfssl-examples/pull/52"
|
||||
|
||||
pushd ${EXAMPLE}
|
||||
make
|
||||
@@ -30,3 +31,5 @@ NAME=client convert
|
||||
NAME=root convert
|
||||
NAME=ca convert
|
||||
|
||||
cp server-ed25519.pem server-ed25519-cert.pem
|
||||
|
||||
|
||||
Binary file not shown.
@@ -1,4 +1,4 @@
|
||||
-----BEGIN EDDSA PRIVATE KEY-----
|
||||
MFICAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
|
||||
oSIEIKLxJkCbolna2+YVf5oRtUhfVbpe7Ub3mGe+DJPjpI4Y
|
||||
MFICAQAwBQYDK2VwBCIEIPUBUd1CTNITOelSbDQlzuGA30xv42CVcvpe92sq7N+o
|
||||
oSIEIIgura+qJ+c7nKcbmd2OK5+dL++bfwkNtP5Cs9JL+nwO
|
||||
-----END EDDSA PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,3 +1,3 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MC4CAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
|
||||
MC4CAQAwBQYDK2VwBCIEIPUBUd1CTNITOelSbDQlzuGA30xv42CVcvpe92sq7N+o
|
||||
-----END PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,15 +1,15 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICYjCCAhSgAwIBAgIQAI8vNbJTvU+S0f8dS0ClSTAFBgMrZXAwgZ8xCzAJBgNV
|
||||
MIICVjCCAgigAwIBAgIQYlI7cNFaPvFoHcYXLFMPzTAFBgMrZXAwgZkxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
|
||||
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wIhgPMjAxODA0MTIxNjIyMTdaGA8yMDIxMDEwNzE1MjIxN1owgZ8x
|
||||
CzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFu
|
||||
MQ0wCwYDVQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1
|
||||
NTE5MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGlu
|
||||
Zm9Ad29sZnNzbC5jb20wKjAFBgMrZXADIQCi8SZAm6JZ2tvmFX+aEbVIX1W6Xu1G
|
||||
95hnvgyT46SOGKNgMF4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQU/gFGf28rPhyw
|
||||
b+HMTQIl900KlbgwHwYDVR0jBBgwFoAU/gFGf28rPhywb+HMTQIl900KlbgwDgYD
|
||||
VR0PAQH/BAQDAgHGMAUGAytlcANBAEaxLiB1c316UlvcVyZ3bJ19dvCgG0Y8+2De
|
||||
GGbS7KdC/RauChf9sxLzVoNj2P5Al5dsHeqpECevSCbCD9LGpAA=
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j
|
||||
b20wIhgPMjAyMTAyMDkxOTUwMDRaGA8yMDIzMDIxMDE5NTAwNFowgZkxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
|
||||
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j
|
||||
b20wKjAFBgMrZXADIQCILq2vqifnO5ynG5ndjiufnS/vm38JDbT+QrPSS/p8DqNg
|
||||
MF4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUGXoJpuYmX18GUs5jJFqPXHE9u3cw
|
||||
HwYDVR0jBBgwFoAUGXoJpuYmX18GUs5jJFqPXHE9u3cwDgYDVR0PAQH/BAQDAgHG
|
||||
MAUGAytlcANBAOzVbL+V/Ik567gy9xUG5NwC1PE/SXEl6pNWTewxHAj8wU1IkDLT
|
||||
FLYfC9ezVkWy9aOYaLH79T63Hl/tIahybgc=
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -1,15 +1,30 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICUjCCAgSgAwIBAgIQAM3yL77cB/q7ZQPi/+pqmTAFBgMrZXAwgZ0xCzAJBgNV
|
||||
MIICRjCCAfigAwIBAgIQQyBFY/XbM3h5GPnWdnTeajAFBgMrZXAwgZcxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQswCQYD
|
||||
VQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZz
|
||||
c2wuY29tMCIYDzIwMTgwNDEyMTYyMjE3WhgPMjAyMTAxMDcxNTIyMTdaMIGfMQsw
|
||||
CQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEN
|
||||
MAsGA1UEBAwETGVhZjEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUx
|
||||
OTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tMCowBQYDK2VwAyEAYV3st0WTyYR7aCFKTfQEi73NbF09t2Is
|
||||
LSXDIknIhvKjUjBQMB0GA1UdDgQWBBQzyChjjPRX7h6wxxISdoqAMDrLEDAfBgNV
|
||||
HSMEGDAWgBSSP5ZyAvphHCFtiN3r3TybF8SftzAOBgNVHQ8BAf8EBAMCBsAwBQYD
|
||||
K2VwA0EAFYiG/GbR4PbPyQlG0FDiAV33z1e4upCEy/EkS++llX1pkoioiWPMkEDC
|
||||
QTpAdrEtqKiXyXPHgjAkYbCqyqpoAA==
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
|
||||
MCIYDzIwMjEwMjA5MTk1MDA0WhgPMjAyMzAyMTAxOTUwMDRaMIGZMQswCQYDVQQG
|
||||
EwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjENMAsGA1UE
|
||||
BAwETGVhZjEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
|
||||
MCowBQYDK2VwAyEAi/OP+P/p9GU5NF71Iny3X/19LSd1vDHlmtPu8us3ryijUjBQ
|
||||
MB0GA1UdDgQWBBQp8hOvwv+m0cj7fJgvDhEuOGSijjAfBgNVHSMEGDAWgBRuiw3J
|
||||
LFlDYK+lMoVs9XTzulSbzDAOBgNVHQ8BAf8EBAMCBsAwBQYDK2VwA0EAo/sGXBKn
|
||||
xIvogGi7VbdCmq1KbS04WEC2Kiu6DI22jOpQecqeUQ+iJ+Ua7tIlSsv0NPqqraq8
|
||||
KKxhcSh1nWQbDQ==
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICVDCCAgagAwIBAgIQQAiKTYWESER1OSfza785ITAFBgMrZXAwgZkxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
|
||||
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j
|
||||
b20wIhgPMjAyMTAyMDkxOTUwMDRaGA8yMDIzMDIxMDE5NTAwNFowgZcxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQswCQYD
|
||||
VQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
|
||||
MCowBQYDK2VwAyEAqpZ9Z3HX/q2oXxQYvgLQFX6AZLkhe7I/fHRu//WE4oGjYDBe
|
||||
MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFG6LDcksWUNgr6UyhWz1dPO6VJvMMB8G
|
||||
A1UdIwQYMBaAFBl6CabmJl9fBlLOYyRaj1xxPbt3MA4GA1UdDwEB/wQEAwIBxjAF
|
||||
BgMrZXADQQC7w3pxbsKWWTZl1BQDkNAauSRVUoKYgLK67OcsHMYTpbjNLan5jeT+
|
||||
3z62i4fbzNBLDJD89XUSjtqQt1LRoE0F
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,4 +1,4 @@
|
||||
-----BEGIN EDDSA PRIVATE KEY-----
|
||||
MFICAQAwBQYDK2VwBCIEIAIvxf+6jtDSvwOOdo/IhoBxh5cx4kCs37uQFVJuJKE5
|
||||
oSIEIGFd7LdFk8mEe2ghSk30BIu9zWxdPbdiLC0lwyJJyIby
|
||||
MFICAQAwBQYDK2VwBCIEIHyd6hRAi4voY3m+UTepnRnoKo50DlIF3i9js6EkbTEG
|
||||
oSIEIIvzj/j/6fRlOTRe9SJ8t1/9fS0ndbwx5ZrT7vLrN68o
|
||||
-----END EDDSA PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,3 +1,3 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MC4CAQAwBQYDK2VwBCIEIAIvxf+6jtDSvwOOdo/IhoBxh5cx4kCs37uQFVJuJKE5
|
||||
MC4CAQAwBQYDK2VwBCIEIHyd6hRAi4voY3m+UTepnRnoKo50DlIF3i9js6EkbTEG
|
||||
-----END PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -1,30 +1,30 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICUjCCAgSgAwIBAgIQAM3yL77cB/q7ZQPi/+pqmTAFBgMrZXAwgZ0xCzAJBgNV
|
||||
MIICRjCCAfigAwIBAgIQQyBFY/XbM3h5GPnWdnTeajAFBgMrZXAwgZcxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQswCQYD
|
||||
VQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZz
|
||||
c2wuY29tMCIYDzIwMTgwNDEyMTYyMjE3WhgPMjAyMTAxMDcxNTIyMTdaMIGfMQsw
|
||||
CQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEN
|
||||
MAsGA1UEBAwETGVhZjEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUx
|
||||
OTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tMCowBQYDK2VwAyEAYV3st0WTyYR7aCFKTfQEi73NbF09t2Is
|
||||
LSXDIknIhvKjUjBQMB0GA1UdDgQWBBQzyChjjPRX7h6wxxISdoqAMDrLEDAfBgNV
|
||||
HSMEGDAWgBSSP5ZyAvphHCFtiN3r3TybF8SftzAOBgNVHQ8BAf8EBAMCBsAwBQYD
|
||||
K2VwA0EAFYiG/GbR4PbPyQlG0FDiAV33z1e4upCEy/EkS++llX1pkoioiWPMkEDC
|
||||
QTpAdrEtqKiXyXPHgjAkYbCqyqpoAA==
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
|
||||
MCIYDzIwMjEwMjA5MTk1MDA0WhgPMjAyMzAyMTAxOTUwMDRaMIGZMQswCQYDVQQG
|
||||
EwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjENMAsGA1UE
|
||||
BAwETGVhZjEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
|
||||
MCowBQYDK2VwAyEAi/OP+P/p9GU5NF71Iny3X/19LSd1vDHlmtPu8us3ryijUjBQ
|
||||
MB0GA1UdDgQWBBQp8hOvwv+m0cj7fJgvDhEuOGSijjAfBgNVHSMEGDAWgBRuiw3J
|
||||
LFlDYK+lMoVs9XTzulSbzDAOBgNVHQ8BAf8EBAMCBsAwBQYDK2VwA0EAo/sGXBKn
|
||||
xIvogGi7VbdCmq1KbS04WEC2Kiu6DI22jOpQecqeUQ+iJ+Ua7tIlSsv0NPqqraq8
|
||||
KKxhcSh1nWQbDQ==
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICYDCCAhKgAwIBAgIQAIC6aHfvpeVCfcZzLFSFuDAFBgMrZXAwgZ8xCzAJBgNV
|
||||
MIICVDCCAgagAwIBAgIQQAiKTYWESER1OSfza785ITAFBgMrZXAwgZkxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
|
||||
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
|
||||
ZnNzbC5jb20wIhgPMjAxODA0MTIxNjIyMTdaGA8yMDIxMDEwNzE1MjIxN1owgZ0x
|
||||
CzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFu
|
||||
MQswCQYDVQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUx
|
||||
OTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tMCowBQYDK2VwAyEAZap/BaQENKDqrR+phvDYf3LfqQ4ToDhm
|
||||
Jl7rSDCASEmjYDBeMAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFJI/lnIC+mEcIW2I
|
||||
3evdPJsXxJ+3MB8GA1UdIwQYMBaAFP4BRn9vKz4csG/hzE0CJfdNCpW4MA4GA1Ud
|
||||
DwEB/wQEAwIBxjAFBgMrZXADQQBMQNB/vPv0ohpY9nLj6NoYDZTcDv3B5wKleu7L
|
||||
wn76ofwVmv4e4Dfff6t2UAbUPRplcz+S1ERip0yzKgGH4wYG
|
||||
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j
|
||||
b20wIhgPMjAyMTAyMDkxOTUwMDRaGA8yMDIzMDIxMDE5NTAwNFowgZcxCzAJBgNV
|
||||
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQswCQYD
|
||||
VQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
|
||||
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
|
||||
MCowBQYDK2VwAyEAqpZ9Z3HX/q2oXxQYvgLQFX6AZLkhe7I/fHRu//WE4oGjYDBe
|
||||
MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFG6LDcksWUNgr6UyhWz1dPO6VJvMMB8G
|
||||
A1UdIwQYMBaAFBl6CabmJl9fBlLOYyRaj1xxPbt3MA4GA1UdDwEB/wQEAwIBxjAF
|
||||
BgMrZXADQQC7w3pxbsKWWTZl1BQDkNAauSRVUoKYgLK67OcsHMYTpbjNLan5jeT+
|
||||
3z62i4fbzNBLDJD89XUSjtqQt1LRoE0F
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -1,29 +1,29 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8DCCA9igAwIBAgIQAJRoi3ieHovpl5HPgCG/LTANBgkqhkiG9w0BAQUFADCB
|
||||
MIIFBzCCA++gAwIBAgIQMR8ILKCzOEvwC/AXGSWKWDANBgkqhkiG9w0BAQUFADCB
|
||||
lDELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVt
|
||||
YW4xETAPBgNVBAoMCFNhd3Rvb3RoMRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYD
|
||||
VQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNz
|
||||
bC5jb20wIhgPMjAxODA0MTIxNjIzMDJaGA8yMDIxMDEwNzE1MjMwMlowgaMxCzAJ
|
||||
BgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmdlb24xETAPBgNVBAcMCFBvcnRsYW5kMQ0w
|
||||
bC5jb20wIhgPMjAyMTAyMDkxOTUwMzBaGA8yMDIzMTEwNzE5NTAzMFowgboxCzAJ
|
||||
BgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xETAPBgNVBAcMCFBvcnRsYW5kMQ0w
|
||||
CwYDVQQEDARUZXN0MRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9w
|
||||
bWVudDEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBp
|
||||
bmZvQHdvbGZzc2wuY29tMIICTTAaBgsrBgEEAcEWAQEBAQYLKwYBBAHBFgEBAi4D
|
||||
ggItAASCAiiZEHm4vGsXiO64RwVglZIonsSRfqdQno0pBIk93shwAryAnF7ufVJf
|
||||
4+Bhb9E4GJap88Kof6kSF8FsyWYU3xly0ZSitmGCHXpF7pqQ2V5n1n6mnvYcV4Ql
|
||||
WR0tPe+1CEkxYsdQaIr7QXLW5ZW4rmZGmL42uioCro4k13x/YhWBsmHuo1C3vnj8
|
||||
t5D215pZ6FOD1SMcWIwEzQVncLzvMIous804sY5WYvGzJAkmSv+hgWY52+CoYxUU
|
||||
LlYA81m5VksOLV8DxsNRvRIOYiUkBqKxzXMcuoOO/TzS/POYoyZ/DupuveP8fNFn
|
||||
GuvpFwApCFEfVSz3uwHctziuQUnXvpstRY6mmdqbipISrddXwxfTgIp//M4JlV8X
|
||||
wC3PrfoGx4xR6xmu0iUaJuBmwx1D4l0m4dPXFLKrMV+evZVo5rlYPBbNot7c9BeN
|
||||
yE9nqnsKFT2PphPM1JlSEQHTZoVYGopAVRES/L+wBiy023gjU3Q9/HrQy5TWwkwH
|
||||
RhyhvP1WTumNCB6Z+cofi02e7CJr20BX0+T9Q6xkOiX2rZ7bii4j68lxITcs7mWk
|
||||
FHvlgWk+sdxZ0CPm+V4VmU7kRouZVmXuTE8lZuXByayKiDEUcB7fC7uynV7Vd+UR
|
||||
XaXw2iU6ytK1qPw2i5O3cCO+BSjDYyVDHrvaJOfyi+1WfzZLJav3ogm5FtaUmr/+
|
||||
tAe/4sxscqwUmmPjgab5y+WL9AMXNEuUJnBGG4R3MwAwDQYJKoZIhvcNAQEFBQAD
|
||||
ggEBAKFpalpswsMwzjLbT2UL/TpR8CpQ5tdN0OmDvW6Rr70RgFp8FDT50+H9b+Db
|
||||
OdoT8CI5dlTK47sN/R/Q1IoABUr8ymW4oFwSmyNgEK4RdQg4MN9PEeChR0V1TLKM
|
||||
p77IMksd9RZpiDsrmZl+rOTwGDkt+7INZmyvrJqurjmxYYZs4UsgEivUPZqA48xF
|
||||
LbwLdfifLe0O+2tDixiiVPdL5RarT90SVB1yyU7EMHUmI4Mv6dssn9qd0Wou1fVf
|
||||
bL66woDcr/vkV9O94RqlKsWKSnHNKQxmItHM3yO5yWWpTcITQLokyVPBxl1e3cT0
|
||||
Hln0y5owdmjr0+rPnvUZoZROfto=
|
||||
bWVudDEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMRUwEwYDVQQFEwx3b2xmU1NM
|
||||
MTIzNDUxHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggJNMBoGCysG
|
||||
AQQBwRYBAQEBBgsrBgEEAcEWAQECLgOCAi0ABIICKJXoRX/LkS71JEpP72eR3NN2
|
||||
FnLtLhBsM19zkQaNzr+HF88KgALHnkM1ufiPBu5BC3Qplb/Zk2UAK9oSbdSb9nr5
|
||||
cPCVie0MIUkYX3Dd6fICzVulmwUWeokFs9i82Li69tdtBVwlfzCihieZ+eafE27H
|
||||
wlnm1UIIWiTrYu3hs0GPepgJqc1Umj8gjm61k0KdeiYKjmFHFa+wuU+kUji6nljE
|
||||
yLA8iEbW7kefeQj01A4AMCAet74TuBm5r1Mly1/GT8cFyAj5Kn/mufgfaFNVrdvW
|
||||
q62pTFxJEFeLra/ShUulIx7f58SaaxMGk90bFSo1Q/HlNW1ijXulkO+XZkIsAyqU
|
||||
wfuh0HdIgQw+pHOn3UNrSWs4klsdm6lR/Vke4xoNedcyW7B6i1zd8QzeG57N4IZF
|
||||
1ZBdU2OBMcCBEvhL9TYdDRo5FZF7QUMv1d4C5R2nG176RBho65yFJoJT8VreyTDO
|
||||
MUlD5n0BQMdZzTIdFMaepB6LHKBKqI5uJh5PYaKdajM/WkJnBCIv9eHpBoNP9YBZ
|
||||
r/C9/5WcQAd37f5yk2AxxFdOve9jgXWI9X/E3QglVbwK84t2yIVRjq0ojEu1ln50
|
||||
dwWIpzbvmkPS2dD0/YhJQ22J1qfT8LosOKkB7t98m5E4MwgQVHUUWmR69VfPzggP
|
||||
AXRV3TXZkL0mSA/ml5P4rBuYmBFTogYIRZY80Gmmlx/Cz3nzvm/AHhH5+5zH279V
|
||||
Pzu/V7m2ADANBgkqhkiG9w0BAQUFAAOCAQEAawKWRypsPE0AvIWPiR6K7qgMWRe0
|
||||
vq+l9BqkkapQT5H5kIKAEsgFZTXYpZb4WLp5MOhZZVH16Q29p9KP84UuU3F3coHl
|
||||
UDQYEBwIfb8XJERcHftZluODYLKNm7nRyeEgQKAYyjTRt/2ShKBUqlt/2fTyvKi9
|
||||
IBR//pCoMY3o+jIg7Kiq6ro/GKZ7JHDayoahqlXJ08ZsbOU5A5GVYon9dGAGHoNE
|
||||
bkimZ3N4eDIHpxE/qCKp3GdYifQFxpUIemN3BdzToikg1CRRCcC65Qg7rRwJt91T
|
||||
wbzuhM1flJmm7nZMTyEVTpVrIud96clU5qdQ+qmbKwJzGxrS1eTs4QHcHg==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:de:b4:c8:5c:77:e0:2d:b1:f5:b9:ad:16:47:35:
|
||||
a0:35:65:65:c6:e1:40:ab:1e:b4:b9:13:b7:cb:8c:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
6b:3f:8a:71:6e:3e:ef:9c:f9:45:86:d4:fe:f4:9b:1b:b8:6f:
|
||||
b2:52:e2:a2:d5:4a:a7:30:79:76:1d:26:f7:d2:0b:c2:6e:d7:
|
||||
17:76:31:f8:aa:37:17:13:85:7d:55:33:45:14:a5:2e:af:d9:
|
||||
ba:e8:fe:8e:0b:b3:1a:bc:f0:9b:1d:00:c6:63:89:78:47:98:
|
||||
7d:d8:ff:95:0b:4a:4f:27:c7:57:e8:79:a1:82:40:c5:63:79:
|
||||
ec:ea:41:70:9c:8d:e8:9e:c6:33:a6:2c:c1:34:15:d9:e5:ad:
|
||||
1d:df:18:aa:e6:6d:62:77:e6:9b:dd:82:7f:b6:70:23:f6:d9:
|
||||
c2:67:5c:3d:a8:55:18:09:f7:9e:ec:68:9d:8b:27:53:04:21:
|
||||
6e:a7:38:b4:3b:8b:2b:cf:78:a0:7b:4f:e0:92:f8:b6:f3:7d:
|
||||
c1:7c:b4:59:34:27:6d:4e:b1:01:2c:b7:2f:cb:8b:ec:0e:e0:
|
||||
03:1a:88:12:d0:3b:47:ca:0f:05:4a:ac:bd:5c:a5:24:7f:5f:
|
||||
02:49:ef:74:e3:33:47:5f:99:92:64:ad:e0:9e:16:d4:c2:1e:
|
||||
b7:5d:d5:5b:1d:ea:a6:21:19:45:9c:27:9d:dd:ee:62:c6:50:
|
||||
0d:75:5e:32:f2:c1:63:6b:ec:7d:bb:4f:ae:86:93:f4:62:29:
|
||||
27:8a:1f:31
|
||||
1e:8f:fa:f5:32:ee:98:9e:ed:96:b4:a9:ea:d7:3c:05:74:36:
|
||||
41:ef:1b:84:35:6a:3d:6c:c9:53:2a:50:f7:d1:80:d3:ec:99:
|
||||
bc:4b:dd:86:69:e0:94:1c:c4:77:c9:6a:f7:ed:2c:0d:c5:17:
|
||||
a7:15:75:25:14:2d:c6:14:8d:17:97:6d:e7:d7:38:88:d6:df:
|
||||
ba:8c:aa:2a:f1:4e:ef:1f:4a:16:5a:fa:0c:50:ea:98:b1:4b:
|
||||
36:97:24:21:ce:dc:e4:5c:ba:ae:e7:cb:2a:1d:f7:73:ff:17:
|
||||
f3:9d:cf:26:4e:b7:cb:5c:8e:e4:9e:55:d2:00:f8:ca:53:c3:
|
||||
53:3f:6d:65:aa:86:f4:f1:ed:26:1e:75:56:be:bd:80:f5:1c:
|
||||
4e:4d:13:c3:1b:04:61:b9:c6:e2:6f:30:44:01:0e:63:d8:19:
|
||||
ce:83:40:e9:c7:01:f2:51:d7:b7:cd:16:25:93:de:3e:7a:7d:
|
||||
8d:72:1e:2b:66:76:91:df:b9:33:fa:04:b8:8c:c5:7a:ef:f6:
|
||||
94:74:54:1e:96:4a:a8:f6:0d:59:f7:2f:f1:26:78:f6:c7:bf:
|
||||
68:f9:b0:7f:a5:2d:1c:7b:fc:64:25:ed:a4:bb:e6:31:44:f9:
|
||||
d5:5f:67:4d:01:29:84:b2:f8:fa:fb:6b:52:1e:66:c3:08:6b:
|
||||
8e:d5:ad:b9
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8DCCA9igAwIBAgIBATANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
|
||||
bWVkaWF0ZSBDQSAxMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
|
||||
@@ -84,26 +84,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu
|
||||
ZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQmMCQwIgYI
|
||||
KwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcNAQELBQAD
|
||||
ggEBAGs/inFuPu+c+UWG1P70mxu4b7JS4qLVSqcweXYdJvfSC8Ju1xd2MfiqNxcT
|
||||
hX1VM0UUpS6v2bro/o4Lsxq88JsdAMZjiXhHmH3Y/5ULSk8nx1foeaGCQMVjeezq
|
||||
QXCcjeiexjOmLME0FdnlrR3fGKrmbWJ35pvdgn+2cCP22cJnXD2oVRgJ957saJ2L
|
||||
J1MEIW6nOLQ7iyvPeKB7T+CS+LbzfcF8tFk0J21OsQEsty/Li+wO4AMaiBLQO0fK
|
||||
DwVKrL1cpSR/XwJJ73TjM0dfmZJkreCeFtTCHrdd1Vsd6qYhGUWcJ53d7mLGUA11
|
||||
XjLywWNr7H27T66Gk/RiKSeKHzE=
|
||||
ggEBAB6P+vUy7pie7Za0qerXPAV0NkHvG4Q1aj1syVMqUPfRgNPsmbxL3YZp4JQc
|
||||
xHfJavftLA3FF6cVdSUULcYUjReXbefXOIjW37qMqirxTu8fShZa+gxQ6pixSzaX
|
||||
JCHO3ORcuq7nyyod93P/F/OdzyZOt8tcjuSeVdIA+MpTw1M/bWWqhvTx7SYedVa+
|
||||
vYD1HE5NE8MbBGG5xuJvMEQBDmPYGc6DQOnHAfJR17fNFiWT3j56fY1yHitmdpHf
|
||||
uTP6BLiMxXrv9pR0VB6WSqj2DVn3L/EmePbHv2j5sH+lLRx7/GQl7aS75jFE+dVf
|
||||
Z00BKYSy+Pr7a1IeZsMIa47Vrbk=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -176,11 +176,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d0:20:3c:35:19:6f:2c:44:b4:7e:42:c7:75:b4:
|
||||
6a:2b:a9:23:85:bf:87:b4:ee:ca:d7:4b:1f:31:d7:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
0a:ef:11:86:ba:12:b6:5a:38:b7:7a:62:a9:e8:75:e8:25:a1:
|
||||
72:5b:d1:ab:7e:b9:46:9c:ca:57:90:d2:cc:83:8e:3a:e7:05:
|
||||
02:da:9d:da:ff:28:d0:51:bb:68:6b:3a:32:23:e3:ca:37:49:
|
||||
82:b4:22:74:1b:22:49:c6:4e:54:20:46:89:0c:fd:d8:cd:a7:
|
||||
15:cf:49:87:48:ad:07:ba:91:cc:85:39:20:c5:7f:c3:f5:07:
|
||||
e4:83:c8:bd:a6:71:47:c1:6a:81:8c:af:8b:f8:80:3f:ec:b9:
|
||||
e6:34:c8:01:bb:1c:d4:dd:11:8b:7b:0c:5c:3b:5d:b0:56:c6:
|
||||
9f:35:fc:75:2e:f4:59:27:21:d6:b1:2a:71:6b:b0:c5:44:b0:
|
||||
e3:0d:9d:ed:a0:8e:69:bc:ac:38:61:61:8b:ab:e0:07:cc:41:
|
||||
70:da:55:56:09:4a:7a:ca:17:01:62:df:98:14:2a:1a:d4:52:
|
||||
52:4c:4e:96:66:10:e4:46:f3:0c:e6:31:06:60:62:69:68:77:
|
||||
2b:36:bd:28:6e:ed:fd:6c:29:c6:e9:c8:58:f1:51:d7:a4:91:
|
||||
81:7b:b7:c3:2e:07:c4:fd:bd:35:d9:d9:82:27:97:4d:a4:71:
|
||||
05:25:1c:67:a0:56:5e:ea:c2:1f:08:c2:ae:a6:e7:c0:15:72:
|
||||
b3:e1:df:50
|
||||
0c:13:dc:c2:28:a2:be:bb:0b:8e:29:28:aa:7a:99:04:e5:88:
|
||||
c6:67:7e:8d:3f:8a:68:3a:7f:c5:e2:d0:ed:c9:95:4c:40:f2:
|
||||
7a:87:73:17:fb:f8:c4:bf:1b:ff:54:be:33:6d:15:e3:4f:70:
|
||||
f4:60:27:b2:67:cd:0e:0f:2a:81:ee:dc:9d:48:37:74:8a:4c:
|
||||
11:47:23:f0:5d:7c:c1:78:70:1d:c1:87:db:26:b0:86:a8:42:
|
||||
3d:87:87:43:e7:d9:3a:a8:5c:c5:66:a4:d5:4e:9b:d9:44:b2:
|
||||
41:30:10:94:3b:fd:00:dc:02:63:05:d7:a1:75:ad:54:28:9e:
|
||||
e4:07:3c:af:68:89:9b:71:96:21:ff:d6:4e:1d:d0:02:d5:21:
|
||||
7d:ae:d8:07:96:6c:1f:ca:a5:ef:54:13:92:be:3c:7d:c0:65:
|
||||
bf:5c:bb:ff:46:c2:69:0f:4c:29:70:6d:b7:52:d5:ed:9e:e4:
|
||||
89:dc:41:0d:0a:94:bc:69:b3:dc:8a:a9:45:25:f1:2c:9b:5b:
|
||||
85:bc:69:fb:94:31:05:2c:17:fa:78:28:36:78:7f:f9:0c:4f:
|
||||
22:36:05:fe:bf:59:9d:5d:1f:9a:5e:8e:d8:1d:62:4d:d6:2d:
|
||||
73:d6:26:c1:a5:bc:e3:62:81:fc:1e:cb:7f:3e:c3:00:c9:b0:
|
||||
e0:c6:1f:c3
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8DCCA9igAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTU0WhcNMjMxMTA3MTk0OTU0WjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
|
||||
bWVkaWF0ZSBDQSAyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
|
||||
@@ -84,26 +84,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu
|
||||
ZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQmMCQwIgYI
|
||||
KwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcNAQELBQAD
|
||||
ggEBAArvEYa6ErZaOLd6YqnodegloXJb0at+uUacyleQ0syDjjrnBQLandr/KNBR
|
||||
u2hrOjIj48o3SYK0InQbIknGTlQgRokM/djNpxXPSYdIrQe6kcyFOSDFf8P1B+SD
|
||||
yL2mcUfBaoGMr4v4gD/sueY0yAG7HNTdEYt7DFw7XbBWxp81/HUu9FknIdaxKnFr
|
||||
sMVEsOMNne2gjmm8rDhhYYur4AfMQXDaVVYJSnrKFwFi35gUKhrUUlJMTpZmEORG
|
||||
8wzmMQZgYmlodys2vShu7f1sKcbpyFjxUdekkYF7t8MuB8T9vTXZ2YInl02kcQUl
|
||||
HGegVl7qwh8Iwq6m58AVcrPh31A=
|
||||
ggEBAAwT3MIoor67C44pKKp6mQTliMZnfo0/img6f8Xi0O3JlUxA8nqHcxf7+MS/
|
||||
G/9UvjNtFeNPcPRgJ7JnzQ4PKoHu3J1IN3SKTBFHI/BdfMF4cB3Bh9smsIaoQj2H
|
||||
h0Pn2TqoXMVmpNVOm9lEskEwEJQ7/QDcAmMF16F1rVQonuQHPK9oiZtxliH/1k4d
|
||||
0ALVIX2u2AeWbB/Kpe9UE5K+PH3AZb9cu/9GwmkPTClwbbdS1e2e5IncQQ0KlLxp
|
||||
s9yKqUUl8SybW4W8afuUMQUsF/p4KDZ4f/kMTyI2Bf6/WZ1dH5pejtgdYk3WLXPW
|
||||
JsGlvONigfwey38+wwDJsODGH8M=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -176,11 +176,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 3 (0x3)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL REVOKED intermediate CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL REVOKED intermediate CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:de:c5:04:10:7d:c2:21:e9:12:45:da:d5:ba:28:
|
||||
fd:a6:f4:30:44:a0:df:f9:70:5e:17:26:97:59:5c:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
5d:d5:47:52:01:4a:b4:5f:a1:3e:97:ed:fd:b5:2f:0a:35:03:
|
||||
c8:83:f5:1c:91:03:b6:9d:72:1f:64:9f:07:e6:29:c2:0e:d8:
|
||||
ba:30:16:a7:7d:f6:4b:bf:9a:3f:46:b3:c2:14:c4:be:a1:d3:
|
||||
8e:22:3e:9f:f8:20:ad:8e:c0:f3:0a:3e:94:66:2d:66:07:d7:
|
||||
ca:70:8d:9a:01:5f:fb:20:32:a5:b9:b2:52:b1:21:e1:a0:8b:
|
||||
46:aa:c9:e5:45:43:0c:14:e2:8e:ff:31:bc:c9:4e:f0:43:3a:
|
||||
5e:fb:f3:6a:d4:61:91:34:ad:bb:13:9b:53:d8:0e:6b:43:25:
|
||||
8a:58:9b:f4:d4:95:d9:78:23:cd:5c:92:43:84:71:73:63:4e:
|
||||
fc:e5:4a:98:29:80:cf:b4:83:ea:b5:7c:e2:01:b4:66:10:78:
|
||||
1b:06:4d:e8:45:c5:e8:25:fc:4d:3b:a8:ad:fc:52:dd:39:14:
|
||||
f0:3e:90:35:a6:2a:30:01:82:93:87:c5:e3:4e:83:f7:0f:d0:
|
||||
b7:1b:9f:96:11:59:3e:2b:8a:9e:6c:ed:a3:24:09:81:46:27:
|
||||
ec:78:2e:ce:a1:e1:af:0f:50:33:8c:52:8b:1a:b1:1b:a1:44:
|
||||
22:dc:01:96:94:1f:d9:cd:c7:ae:c2:15:50:77:9d:d1:0d:1d:
|
||||
a1:42:65:15
|
||||
9d:2f:66:43:34:cc:a4:d7:ae:09:81:ec:ca:bf:9e:e0:d6:28:
|
||||
a0:25:63:5e:16:0a:e9:60:2c:c1:e6:36:5d:92:f0:7c:4a:22:
|
||||
10:94:9b:1a:c6:8f:c3:a9:bb:69:53:b8:aa:30:91:c5:32:19:
|
||||
35:7a:3e:86:af:f9:39:74:44:6e:5c:39:f6:b6:62:0c:33:8e:
|
||||
f6:b9:d2:a7:e0:22:df:a3:4f:48:e4:04:f1:f7:20:f5:36:55:
|
||||
a1:3d:08:ae:a9:12:eb:a8:97:59:6f:a0:b8:f0:ab:73:22:01:
|
||||
cc:cc:96:29:ae:5f:46:ac:4e:47:1a:b9:8d:06:7e:88:67:5e:
|
||||
16:12:64:37:85:2a:d8:f3:27:cd:fa:86:fc:84:4b:51:3a:f1:
|
||||
c7:1a:27:8d:54:49:e6:cb:82:bb:7c:b3:3f:2f:10:d5:3a:74:
|
||||
e5:36:7b:b5:c4:58:a4:48:35:af:35:ad:3d:44:74:44:83:99:
|
||||
d0:a1:c6:2f:5f:f3:58:1a:33:2f:6c:4e:8e:44:ce:2a:ba:e9:
|
||||
c6:7d:9f:22:12:44:05:38:f7:87:54:4d:8d:ac:72:1c:5a:2a:
|
||||
74:9d:3b:30:31:d6:a9:39:d4:d6:0e:63:f8:46:07:ab:7f:01:
|
||||
31:cc:85:91:72:10:37:94:c4:ec:f9:9d:7f:81:25:cb:ce:55:
|
||||
48:85:86:2e
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE9jCCA96gAwIBAgIBAzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBpzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTU0WhcNMjMxMTA3MTk0OTU0WjCBpzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSgwJgYDVQQDDB93b2xmU1NMIFJFVk9L
|
||||
RUQgaW50ZXJtZWRpYXRlIENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
@@ -84,26 +84,26 @@ DgYDVQQHDAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdp
|
||||
bmVlcmluZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkB
|
||||
FhBpbmZvQHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQm
|
||||
MCQwIgYIKwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcN
|
||||
AQELBQADggEBAF3VR1IBSrRfoT6X7f21Lwo1A8iD9RyRA7adch9knwfmKcIO2Low
|
||||
Fqd99ku/mj9Gs8IUxL6h044iPp/4IK2OwPMKPpRmLWYH18pwjZoBX/sgMqW5slKx
|
||||
IeGgi0aqyeVFQwwU4o7/MbzJTvBDOl7782rUYZE0rbsTm1PYDmtDJYpYm/TUldl4
|
||||
I81ckkOEcXNjTvzlSpgpgM+0g+q1fOIBtGYQeBsGTehFxegl/E07qK38Ut05FPA+
|
||||
kDWmKjABgpOHxeNOg/cP0Lcbn5YRWT4rip5s7aMkCYFGJ+x4Ls6h4a8PUDOMUosa
|
||||
sRuhRCLcAZaUH9nNx67CFVB3ndENHaFCZRU=
|
||||
AQELBQADggEBAJ0vZkM0zKTXrgmB7Mq/nuDWKKAlY14WCulgLMHmNl2S8HxKIhCU
|
||||
mxrGj8Opu2lTuKowkcUyGTV6Poav+Tl0RG5cOfa2Ygwzjva50qfgIt+jT0jkBPH3
|
||||
IPU2VaE9CK6pEuuol1lvoLjwq3MiAczMlimuX0asTkcauY0GfohnXhYSZDeFKtjz
|
||||
J836hvyES1E68ccaJ41USebLgrt8sz8vENU6dOU2e7XEWKRINa81rT1EdESDmdCh
|
||||
xi9f81gaMy9sTo5Eziq66cZ9nyISRAU494dUTY2schxaKnSdOzAx1qk51NYOY/hG
|
||||
B6t/ATHMhZFyEDeUxOz5nX+BJcvOVUiFhi4=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -176,11 +176,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 4 (0x4)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL OCSP Responder, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL OCSP Responder/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b8:ba:23:b4:f6:c3:7b:14:c3:a4:f5:1d:61:a1:
|
||||
f5:1e:63:b9:85:23:34:50:6d:f8:7c:a2:8a:04:8b:
|
||||
@@ -44,27 +44,27 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
OCSP Signing
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
7f:a6:bb:6a:fe:59:e2:6e:dd:00:73:ff:0c:1a:08:83:0f:82:
|
||||
dd:8b:9a:3e:12:37:28:2e:93:02:c6:7e:93:30:53:f4:40:26:
|
||||
74:c2:02:46:9c:a3:60:37:78:99:cb:96:13:ed:d4:ff:3b:d9:
|
||||
53:b9:89:cf:f9:dc:74:c1:4e:df:a4:4c:26:75:6a:6f:21:92:
|
||||
5a:a4:e7:22:04:dc:29:51:4e:b5:aa:8b:0b:b0:d4:1c:98:0a:
|
||||
fb:65:fa:7a:cd:14:9b:25:be:9e:be:0d:37:55:7c:5e:22:69:
|
||||
16:03:9a:20:66:4c:4b:aa:37:1a:07:66:30:3e:e3:86:3c:d8:
|
||||
8b:67:d5:fd:66:53:f2:88:e5:29:68:d2:07:7d:52:d4:d3:16:
|
||||
43:ae:27:b1:20:b0:88:73:9d:cf:ff:dd:3a:75:42:ad:63:dc:
|
||||
f6:61:b3:6f:97:c4:c2:f8:88:16:62:5e:6a:17:fd:45:b8:ad:
|
||||
7b:6b:52:80:c1:f7:43:b0:8d:4e:d9:75:fd:d9:ec:c9:ef:a3:
|
||||
bf:08:1e:0f:15:d7:96:61:5f:6c:c1:0e:06:0f:f1:4e:07:dc:
|
||||
22:0f:bc:99:89:92:ed:6a:3e:90:e3:24:89:87:a7:8c:cc:f8:
|
||||
55:10:b2:d5:11:ee:ae:39:d1:b1:c0:09:fe:07:95:7e:cd:54:
|
||||
4a:3b:48:bb
|
||||
07:ca:a6:a1:9f:bf:af:92:41:35:66:51:ac:bc:2c:ec:e7:8d:
|
||||
65:7e:e9:40:fe:5a:ab:8a:1d:3d:13:db:b4:43:2c:9a:36:98:
|
||||
21:a5:e8:ca:a9:4d:fc:e3:f7:45:88:cd:33:bf:8a:62:10:2f:
|
||||
b2:b7:04:ef:26:43:51:1d:43:62:7d:1e:50:c8:d5:98:94:71:
|
||||
8f:3b:23:26:f1:71:8e:1e:3d:3f:21:fd:b7:2d:65:e4:07:65:
|
||||
ac:3c:fc:c0:47:a9:32:f6:da:26:93:10:b2:d1:6d:c8:81:31:
|
||||
7c:b0:6b:c5:22:8d:b3:fa:be:82:ea:41:42:c4:c0:ef:e3:84:
|
||||
0f:6f:9a:03:63:b3:30:e0:31:81:2a:16:b3:47:d9:5b:38:93:
|
||||
07:d0:6e:79:52:2c:e5:50:84:79:10:e7:f6:31:7a:3e:48:a2:
|
||||
38:21:90:7a:f2:5f:48:a4:46:93:87:dd:5c:83:64:ea:b5:99:
|
||||
a2:e9:01:40:fe:f0:48:66:4f:96:f7:83:52:f8:6d:f8:5f:ed:
|
||||
0c:bb:be:d0:69:10:4b:99:8f:f8:61:53:9d:12:ca:86:aa:b1:
|
||||
80:b4:a6:c1:cb:b7:48:f7:9f:55:b4:6e:ab:d3:a1:aa:4b:a7:
|
||||
21:6e:16:7f:ad:bb:ea:0f:41:80:9b:7f:d6:46:a2:c0:61:72:
|
||||
59:59:a0:07
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEvjCCA6agAwIBAgIBBDANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBnjELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTU0WhcNMjMxMTA3MTk0OTU0WjCBnjELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMR8wHQYDVQQDDBZ3b2xmU1NMIE9DU1Ag
|
||||
UmVzcG9uZGVyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIBIjAN
|
||||
@@ -80,26 +80,26 @@ CzAJBgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0
|
||||
dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEYMBYG
|
||||
A1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZz
|
||||
c2wuY29tggFjMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA0GCSqGSIb3DQEBCwUAA4IB
|
||||
AQB/prtq/lnibt0Ac/8MGgiDD4Ldi5o+EjcoLpMCxn6TMFP0QCZ0wgJGnKNgN3iZ
|
||||
y5YT7dT/O9lTuYnP+dx0wU7fpEwmdWpvIZJapOciBNwpUU61qosLsNQcmAr7Zfp6
|
||||
zRSbJb6evg03VXxeImkWA5ogZkxLqjcaB2YwPuOGPNiLZ9X9ZlPyiOUpaNIHfVLU
|
||||
0xZDriexILCIc53P/906dUKtY9z2YbNvl8TC+IgWYl5qF/1FuK17a1KAwfdDsI1O
|
||||
2XX92ezJ76O/CB4PFdeWYV9swQ4GD/FOB9wiD7yZiZLtaj6Q4ySJh6eMzPhVELLV
|
||||
Ee6uOdGxwAn+B5V+zVRKO0i7
|
||||
AQAHyqahn7+vkkE1ZlGsvCzs541lfulA/lqrih09E9u0QyyaNpghpejKqU384/dF
|
||||
iM0zv4piEC+ytwTvJkNRHUNifR5QyNWYlHGPOyMm8XGOHj0/If23LWXkB2WsPPzA
|
||||
R6ky9tomkxCy0W3IgTF8sGvFIo2z+r6C6kFCxMDv44QPb5oDY7Mw4DGBKhazR9lb
|
||||
OJMH0G55UizlUIR5EOf2MXo+SKI4IZB68l9IpEaTh91cg2TqtZmi6QFA/vBIZk+W
|
||||
94NS+G34X+0Mu77QaRBLmY/4YVOdEsqGqrGAtKbBy7dI959VtG6r06GqS6chbhZ/
|
||||
rbvqD0GAm3/WRqLAYXJZWaAH
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -136,27 +136,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -172,11 +172,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -83,11 +83,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 5 (0x5)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www1.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www1.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:e6:96:55:75:cf:8a:97:68:8c:b6:38:f6:7a:05:
|
||||
be:33:b6:51:47:37:8a:f7:db:91:be:92:6b:b7:00:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22221
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
3b:92:03:e0:e0:50:56:e5:06:7e:dd:7f:5c:3c:b1:9d:ed:3c:
|
||||
f0:a9:a9:e6:93:f8:fd:f2:dc:db:7b:07:e7:2c:74:17:df:22:
|
||||
f3:6c:85:20:0a:75:9d:62:11:1d:2e:03:0e:c4:34:b0:09:d2:
|
||||
05:b4:03:80:9d:8c:a3:1e:a5:eb:18:e3:09:ee:25:1f:3e:de:
|
||||
64:cb:65:82:49:a4:ec:f4:1e:91:be:3e:b6:b1:6b:ee:10:f0:
|
||||
ca:9a:ce:a1:b6:69:25:ad:a0:a2:d6:6c:96:b6:ae:11:cd:ce:
|
||||
0f:36:51:62:71:0d:0d:e7:16:e6:41:69:8c:18:92:55:3b:59:
|
||||
ad:d1:f9:ce:f2:c2:1d:bb:cf:ca:9b:7d:08:f5:9a:33:2d:3d:
|
||||
a1:85:bb:6e:9f:fb:6a:d8:97:0f:0b:12:f5:06:34:69:cc:f7:
|
||||
95:7b:3e:fd:34:12:79:50:77:a1:96:1e:17:90:b5:b8:5e:28:
|
||||
3b:d6:65:e5:80:a6:26:4b:82:a9:6a:30:11:49:17:20:8c:13:
|
||||
9c:7b:0f:89:7a:6d:6c:6d:6c:b6:a0:aa:e5:45:82:b5:ac:e6:
|
||||
cf:a7:97:47:f8:68:79:e4:67:6c:ec:e2:6a:c8:29:f6:d1:b3:
|
||||
90:04:b5:6b:68:17:16:91:30:85:56:cf:be:53:89:6e:21:c8:
|
||||
c9:0c:11:5c
|
||||
78:2e:01:bd:b4:60:d9:68:ab:4d:47:a1:a2:97:00:5d:46:44:
|
||||
6f:4f:d0:7c:23:ff:52:36:28:b5:72:1c:40:8c:16:1b:a1:4d:
|
||||
d5:1a:0d:92:48:57:7d:5f:11:b6:07:1d:b1:c5:47:82:f1:16:
|
||||
57:49:10:78:12:ef:16:86:8b:97:52:3a:5b:9d:58:4d:df:df:
|
||||
e1:a0:9c:8b:8b:31:75:9c:81:0f:87:7c:13:c6:1d:e9:5d:d0:
|
||||
c1:1e:b0:70:e5:b0:8f:cd:57:bc:3e:68:49:58:23:da:b8:ed:
|
||||
10:c3:ae:5c:d1:85:b3:8d:85:5c:ec:01:a1:6a:4a:e1:bd:d8:
|
||||
16:98:2f:a6:7c:a1:cb:57:11:d0:9a:50:8e:dc:1c:67:e2:9f:
|
||||
a5:96:f7:51:52:d1:76:be:5b:c9:e2:af:e6:cb:df:00:64:44:
|
||||
fb:ef:96:ae:3f:6d:d9:85:39:fc:86:42:a4:52:34:3e:a6:96:
|
||||
0e:c9:34:28:11:77:1e:ac:e5:78:5f:96:e7:8c:78:b8:db:dd:
|
||||
f7:ca:c6:68:c7:1b:b1:70:eb:6d:51:fd:6d:93:60:e4:18:ff:
|
||||
c8:84:92:ad:f5:f0:a5:ea:f2:80:42:c9:a7:e0:ef:bf:b8:98:
|
||||
b6:3a:91:86:40:4c:d1:90:e5:8d:57:0f:98:b0:ce:d9:a9:e2:
|
||||
29:9d:a8:2a
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE7jCCA9agAwIBAgIBBTANBgkqhkiG9w0BAQsFADCBoTELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NM
|
||||
IGludGVybWVkaWF0ZSBDQSAxMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZgxCzAJBgNVBAYT
|
||||
Y29tMB4XDTIxMDIxMDE5NDk1NFoXDTIzMTEwNzE5NDk1NFowgZgxCzAJBgNVBAYT
|
||||
AlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRAwDgYD
|
||||
VQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEZMBcGA1UEAwwQd3d3
|
||||
MS53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCC
|
||||
@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx
|
||||
GDAWBgNVBAMMD3dvbGZTU0wgcm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
|
||||
b2xmc3NsLmNvbYIBATALBgNVHQ8EBAMCBeAwMgYIKwYBBQUHAQEEJjAkMCIGCCsG
|
||||
AQUFBzABhhZodHRwOi8vMTI3LjAuMC4xOjIyMjIxMA0GCSqGSIb3DQEBCwUAA4IB
|
||||
AQA7kgPg4FBW5QZ+3X9cPLGd7Tzwqanmk/j98tzbewfnLHQX3yLzbIUgCnWdYhEd
|
||||
LgMOxDSwCdIFtAOAnYyjHqXrGOMJ7iUfPt5ky2WCSaTs9B6Rvj62sWvuEPDKms6h
|
||||
tmklraCi1myWtq4Rzc4PNlFicQ0N5xbmQWmMGJJVO1mt0fnO8sIdu8/Km30I9Zoz
|
||||
LT2hhbtun/tq2JcPCxL1BjRpzPeVez79NBJ5UHehlh4XkLW4Xig71mXlgKYmS4Kp
|
||||
ajARSRcgjBOcew+Jem1sbWy2oKrlRYK1rObPp5dH+Gh55Gds7OJqyCn20bOQBLVr
|
||||
aBcWkTCFVs++U4luIcjJDBFc
|
||||
AQB4LgG9tGDZaKtNR6GilwBdRkRvT9B8I/9SNii1chxAjBYboU3VGg2SSFd9XxG2
|
||||
Bx2xxUeC8RZXSRB4Eu8WhouXUjpbnVhN39/hoJyLizF1nIEPh3wTxh3pXdDBHrBw
|
||||
5bCPzVe8PmhJWCPauO0Qw65c0YWzjYVc7AGhakrhvdgWmC+mfKHLVxHQmlCO3Bxn
|
||||
4p+llvdRUtF2vlvJ4q/my98AZET775auP23ZhTn8hkKkUjQ+ppYOyTQoEXcerOV4
|
||||
X5bnjHi42933ysZoxxuxcOttUf1tk2DkGP/IhJKt9fCl6vKAQsmn4O+/uJi2OpGG
|
||||
QEzRkOWNVw+YsM7ZqeIpnagq
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:de:b4:c8:5c:77:e0:2d:b1:f5:b9:ad:16:47:35:
|
||||
a0:35:65:65:c6:e1:40:ab:1e:b4:b9:13:b7:cb:8c:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
6b:3f:8a:71:6e:3e:ef:9c:f9:45:86:d4:fe:f4:9b:1b:b8:6f:
|
||||
b2:52:e2:a2:d5:4a:a7:30:79:76:1d:26:f7:d2:0b:c2:6e:d7:
|
||||
17:76:31:f8:aa:37:17:13:85:7d:55:33:45:14:a5:2e:af:d9:
|
||||
ba:e8:fe:8e:0b:b3:1a:bc:f0:9b:1d:00:c6:63:89:78:47:98:
|
||||
7d:d8:ff:95:0b:4a:4f:27:c7:57:e8:79:a1:82:40:c5:63:79:
|
||||
ec:ea:41:70:9c:8d:e8:9e:c6:33:a6:2c:c1:34:15:d9:e5:ad:
|
||||
1d:df:18:aa:e6:6d:62:77:e6:9b:dd:82:7f:b6:70:23:f6:d9:
|
||||
c2:67:5c:3d:a8:55:18:09:f7:9e:ec:68:9d:8b:27:53:04:21:
|
||||
6e:a7:38:b4:3b:8b:2b:cf:78:a0:7b:4f:e0:92:f8:b6:f3:7d:
|
||||
c1:7c:b4:59:34:27:6d:4e:b1:01:2c:b7:2f:cb:8b:ec:0e:e0:
|
||||
03:1a:88:12:d0:3b:47:ca:0f:05:4a:ac:bd:5c:a5:24:7f:5f:
|
||||
02:49:ef:74:e3:33:47:5f:99:92:64:ad:e0:9e:16:d4:c2:1e:
|
||||
b7:5d:d5:5b:1d:ea:a6:21:19:45:9c:27:9d:dd:ee:62:c6:50:
|
||||
0d:75:5e:32:f2:c1:63:6b:ec:7d:bb:4f:ae:86:93:f4:62:29:
|
||||
27:8a:1f:31
|
||||
1e:8f:fa:f5:32:ee:98:9e:ed:96:b4:a9:ea:d7:3c:05:74:36:
|
||||
41:ef:1b:84:35:6a:3d:6c:c9:53:2a:50:f7:d1:80:d3:ec:99:
|
||||
bc:4b:dd:86:69:e0:94:1c:c4:77:c9:6a:f7:ed:2c:0d:c5:17:
|
||||
a7:15:75:25:14:2d:c6:14:8d:17:97:6d:e7:d7:38:88:d6:df:
|
||||
ba:8c:aa:2a:f1:4e:ef:1f:4a:16:5a:fa:0c:50:ea:98:b1:4b:
|
||||
36:97:24:21:ce:dc:e4:5c:ba:ae:e7:cb:2a:1d:f7:73:ff:17:
|
||||
f3:9d:cf:26:4e:b7:cb:5c:8e:e4:9e:55:d2:00:f8:ca:53:c3:
|
||||
53:3f:6d:65:aa:86:f4:f1:ed:26:1e:75:56:be:bd:80:f5:1c:
|
||||
4e:4d:13:c3:1b:04:61:b9:c6:e2:6f:30:44:01:0e:63:d8:19:
|
||||
ce:83:40:e9:c7:01:f2:51:d7:b7:cd:16:25:93:de:3e:7a:7d:
|
||||
8d:72:1e:2b:66:76:91:df:b9:33:fa:04:b8:8c:c5:7a:ef:f6:
|
||||
94:74:54:1e:96:4a:a8:f6:0d:59:f7:2f:f1:26:78:f6:c7:bf:
|
||||
68:f9:b0:7f:a5:2d:1c:7b:fc:64:25:ed:a4:bb:e6:31:44:f9:
|
||||
d5:5f:67:4d:01:29:84:b2:f8:fa:fb:6b:52:1e:66:c3:08:6b:
|
||||
8e:d5:ad:b9
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8DCCA9igAwIBAgIBATANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
|
||||
bWVkaWF0ZSBDQSAxMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
|
||||
@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu
|
||||
ZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQmMCQwIgYI
|
||||
KwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcNAQELBQAD
|
||||
ggEBAGs/inFuPu+c+UWG1P70mxu4b7JS4qLVSqcweXYdJvfSC8Ju1xd2MfiqNxcT
|
||||
hX1VM0UUpS6v2bro/o4Lsxq88JsdAMZjiXhHmH3Y/5ULSk8nx1foeaGCQMVjeezq
|
||||
QXCcjeiexjOmLME0FdnlrR3fGKrmbWJ35pvdgn+2cCP22cJnXD2oVRgJ957saJ2L
|
||||
J1MEIW6nOLQ7iyvPeKB7T+CS+LbzfcF8tFk0J21OsQEsty/Li+wO4AMaiBLQO0fK
|
||||
DwVKrL1cpSR/XwJJ73TjM0dfmZJkreCeFtTCHrdd1Vsd6qYhGUWcJ53d7mLGUA11
|
||||
XjLywWNr7H27T66Gk/RiKSeKHzE=
|
||||
ggEBAB6P+vUy7pie7Za0qerXPAV0NkHvG4Q1aj1syVMqUPfRgNPsmbxL3YZp4JQc
|
||||
xHfJavftLA3FF6cVdSUULcYUjReXbefXOIjW37qMqirxTu8fShZa+gxQ6pixSzaX
|
||||
JCHO3ORcuq7nyyod93P/F/OdzyZOt8tcjuSeVdIA+MpTw1M/bWWqhvTx7SYedVa+
|
||||
vYD1HE5NE8MbBGG5xuJvMEQBDmPYGc6DQOnHAfJR17fNFiWT3j56fY1yHitmdpHf
|
||||
uTP6BLiMxXrv9pR0VB6WSqj2DVn3L/EmePbHv2j5sH+lLRx7/GQl7aS75jFE+dVf
|
||||
Z00BKYSy+Pr7a1IeZsMIa47Vrbk=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -233,27 +233,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6 (0x6)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www2.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www2.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c6:35:8a:e8:aa:bd:33:c9:5e:84:43:67:42:65:
|
||||
2a:3c:e3:89:b4:a6:67:a1:3b:ee:6d:85:d1:d3:2b:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22221
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
ac:46:14:7b:31:3a:7e:eb:f8:a0:2b:9a:3d:50:a0:0a:8a:c6:
|
||||
de:5d:8e:90:ca:c1:4c:ac:18:e4:26:24:31:2c:a5:2b:a4:2a:
|
||||
3d:17:94:f0:07:7e:87:1d:12:65:1d:07:01:36:43:1f:35:39:
|
||||
08:c6:d0:d8:8a:ec:4c:0c:61:70:79:5a:b1:5f:f5:e3:2b:6c:
|
||||
28:4a:73:6e:e4:40:85:75:df:7a:cf:73:40:17:54:2a:e0:64:
|
||||
71:c3:6f:2e:5e:34:84:e9:21:4b:20:01:d5:79:eb:8d:db:24:
|
||||
01:e0:54:b7:72:c4:66:ad:d3:27:43:c3:0e:6a:ec:91:fa:9f:
|
||||
0d:3e:ec:51:45:89:de:82:0b:fe:51:c7:c6:7d:0e:30:d2:b2:
|
||||
cb:08:81:7b:33:ce:c8:1e:0d:08:c7:d3:2c:62:d5:a4:45:81:
|
||||
33:8d:51:be:53:d7:85:55:e0:52:13:98:61:d8:28:f5:3c:36:
|
||||
e6:be:9b:38:ec:75:4d:db:a7:1f:3b:3f:c6:79:00:bc:75:67:
|
||||
46:69:df:0b:68:b5:cc:7d:03:01:24:82:93:fd:00:1d:f3:59:
|
||||
9d:3f:77:ea:d4:9c:3b:10:e2:78:ff:65:5d:2c:f9:e7:d3:3e:
|
||||
60:94:75:24:7c:97:b4:1d:a5:e3:0f:51:6e:85:44:e6:a4:75:
|
||||
36:8c:bd:64
|
||||
35:db:bd:7c:8c:c2:f1:83:77:3c:dd:bf:b4:5b:0c:6e:95:29:
|
||||
30:a5:03:bb:54:45:47:88:cd:d4:46:80:94:bc:82:3f:8f:9c:
|
||||
3e:3d:09:48:9c:77:91:b0:70:54:70:23:41:8c:2f:cb:0b:8f:
|
||||
df:08:fe:ce:0d:76:38:c8:80:15:6f:ab:d8:fc:26:8f:02:55:
|
||||
1b:e8:08:4c:c6:6f:38:23:8b:8b:52:fd:76:04:44:fb:5d:47:
|
||||
31:83:87:2e:7f:a9:d1:34:db:7d:9c:73:9d:63:fc:2e:86:b2:
|
||||
22:4b:5c:ef:95:d4:b3:0f:17:80:6c:67:5d:b3:c4:2a:7d:be:
|
||||
22:b9:40:b7:82:d9:c7:38:e4:9b:2b:c9:a0:ef:53:ba:7a:1e:
|
||||
a9:9c:b6:91:1e:e8:3d:2e:7f:d6:1f:35:db:72:56:ea:8f:0a:
|
||||
7f:0a:64:91:c9:8d:79:75:63:45:e3:3b:2e:dc:01:12:ca:6c:
|
||||
47:da:97:40:7e:9e:3e:16:1a:64:8b:3e:cd:b7:bd:ec:61:9e:
|
||||
63:a9:0f:7a:cd:1c:e0:e0:2b:a9:74:ef:88:72:58:17:0c:ac:
|
||||
ad:75:9e:6a:2e:a3:66:9e:79:a0:52:d1:77:cf:33:93:72:1a:
|
||||
b8:0d:ab:9e:8f:32:34:52:9c:15:91:73:c3:a2:19:a4:21:96:
|
||||
05:8c:0b:d0
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE7jCCA9agAwIBAgIBBjANBgkqhkiG9w0BAQsFADCBoTELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NM
|
||||
IGludGVybWVkaWF0ZSBDQSAxMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZgxCzAJBgNVBAYT
|
||||
Y29tMB4XDTIxMDIxMDE5NDk1NFoXDTIzMTEwNzE5NDk1NFowgZgxCzAJBgNVBAYT
|
||||
AlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRAwDgYD
|
||||
VQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEZMBcGA1UEAwwQd3d3
|
||||
Mi53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCC
|
||||
@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx
|
||||
GDAWBgNVBAMMD3dvbGZTU0wgcm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
|
||||
b2xmc3NsLmNvbYIBATALBgNVHQ8EBAMCBeAwMgYIKwYBBQUHAQEEJjAkMCIGCCsG
|
||||
AQUFBzABhhZodHRwOi8vMTI3LjAuMC4xOjIyMjIxMA0GCSqGSIb3DQEBCwUAA4IB
|
||||
AQCsRhR7MTp+6/igK5o9UKAKisbeXY6QysFMrBjkJiQxLKUrpCo9F5TwB36HHRJl
|
||||
HQcBNkMfNTkIxtDYiuxMDGFweVqxX/XjK2woSnNu5ECFdd96z3NAF1Qq4GRxw28u
|
||||
XjSE6SFLIAHVeeuN2yQB4FS3csRmrdMnQ8MOauyR+p8NPuxRRYneggv+UcfGfQ4w
|
||||
0rLLCIF7M87IHg0Ix9MsYtWkRYEzjVG+U9eFVeBSE5hh2Cj1PDbmvps47HVN26cf
|
||||
Oz/GeQC8dWdGad8LaLXMfQMBJIKT/QAd81mdP3fq1Jw7EOJ4/2VdLPnn0z5glHUk
|
||||
fJe0HaXjD1FuhUTmpHU2jL1k
|
||||
AQA12718jMLxg3c83b+0WwxulSkwpQO7VEVHiM3URoCUvII/j5w+PQlInHeRsHBU
|
||||
cCNBjC/LC4/fCP7ODXY4yIAVb6vY/CaPAlUb6AhMxm84I4uLUv12BET7XUcxg4cu
|
||||
f6nRNNt9nHOdY/wuhrIiS1zvldSzDxeAbGdds8Qqfb4iuUC3gtnHOOSbK8mg71O6
|
||||
eh6pnLaRHug9Ln/WHzXbclbqjwp/CmSRyY15dWNF4zsu3AESymxH2pdAfp4+Fhpk
|
||||
iz7Nt73sYZ5jqQ96zRzg4CupdO+IclgXDKytdZ5qLqNmnnmgUtF3zzOTchq4Daue
|
||||
jzI0UpwVkXPDohmkIZYFjAvQ
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:de:b4:c8:5c:77:e0:2d:b1:f5:b9:ad:16:47:35:
|
||||
a0:35:65:65:c6:e1:40:ab:1e:b4:b9:13:b7:cb:8c:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
6b:3f:8a:71:6e:3e:ef:9c:f9:45:86:d4:fe:f4:9b:1b:b8:6f:
|
||||
b2:52:e2:a2:d5:4a:a7:30:79:76:1d:26:f7:d2:0b:c2:6e:d7:
|
||||
17:76:31:f8:aa:37:17:13:85:7d:55:33:45:14:a5:2e:af:d9:
|
||||
ba:e8:fe:8e:0b:b3:1a:bc:f0:9b:1d:00:c6:63:89:78:47:98:
|
||||
7d:d8:ff:95:0b:4a:4f:27:c7:57:e8:79:a1:82:40:c5:63:79:
|
||||
ec:ea:41:70:9c:8d:e8:9e:c6:33:a6:2c:c1:34:15:d9:e5:ad:
|
||||
1d:df:18:aa:e6:6d:62:77:e6:9b:dd:82:7f:b6:70:23:f6:d9:
|
||||
c2:67:5c:3d:a8:55:18:09:f7:9e:ec:68:9d:8b:27:53:04:21:
|
||||
6e:a7:38:b4:3b:8b:2b:cf:78:a0:7b:4f:e0:92:f8:b6:f3:7d:
|
||||
c1:7c:b4:59:34:27:6d:4e:b1:01:2c:b7:2f:cb:8b:ec:0e:e0:
|
||||
03:1a:88:12:d0:3b:47:ca:0f:05:4a:ac:bd:5c:a5:24:7f:5f:
|
||||
02:49:ef:74:e3:33:47:5f:99:92:64:ad:e0:9e:16:d4:c2:1e:
|
||||
b7:5d:d5:5b:1d:ea:a6:21:19:45:9c:27:9d:dd:ee:62:c6:50:
|
||||
0d:75:5e:32:f2:c1:63:6b:ec:7d:bb:4f:ae:86:93:f4:62:29:
|
||||
27:8a:1f:31
|
||||
1e:8f:fa:f5:32:ee:98:9e:ed:96:b4:a9:ea:d7:3c:05:74:36:
|
||||
41:ef:1b:84:35:6a:3d:6c:c9:53:2a:50:f7:d1:80:d3:ec:99:
|
||||
bc:4b:dd:86:69:e0:94:1c:c4:77:c9:6a:f7:ed:2c:0d:c5:17:
|
||||
a7:15:75:25:14:2d:c6:14:8d:17:97:6d:e7:d7:38:88:d6:df:
|
||||
ba:8c:aa:2a:f1:4e:ef:1f:4a:16:5a:fa:0c:50:ea:98:b1:4b:
|
||||
36:97:24:21:ce:dc:e4:5c:ba:ae:e7:cb:2a:1d:f7:73:ff:17:
|
||||
f3:9d:cf:26:4e:b7:cb:5c:8e:e4:9e:55:d2:00:f8:ca:53:c3:
|
||||
53:3f:6d:65:aa:86:f4:f1:ed:26:1e:75:56:be:bd:80:f5:1c:
|
||||
4e:4d:13:c3:1b:04:61:b9:c6:e2:6f:30:44:01:0e:63:d8:19:
|
||||
ce:83:40:e9:c7:01:f2:51:d7:b7:cd:16:25:93:de:3e:7a:7d:
|
||||
8d:72:1e:2b:66:76:91:df:b9:33:fa:04:b8:8c:c5:7a:ef:f6:
|
||||
94:74:54:1e:96:4a:a8:f6:0d:59:f7:2f:f1:26:78:f6:c7:bf:
|
||||
68:f9:b0:7f:a5:2d:1c:7b:fc:64:25:ed:a4:bb:e6:31:44:f9:
|
||||
d5:5f:67:4d:01:29:84:b2:f8:fa:fb:6b:52:1e:66:c3:08:6b:
|
||||
8e:d5:ad:b9
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8DCCA9igAwIBAgIBATANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
|
||||
bWVkaWF0ZSBDQSAxMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
|
||||
@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu
|
||||
ZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQmMCQwIgYI
|
||||
KwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcNAQELBQAD
|
||||
ggEBAGs/inFuPu+c+UWG1P70mxu4b7JS4qLVSqcweXYdJvfSC8Ju1xd2MfiqNxcT
|
||||
hX1VM0UUpS6v2bro/o4Lsxq88JsdAMZjiXhHmH3Y/5ULSk8nx1foeaGCQMVjeezq
|
||||
QXCcjeiexjOmLME0FdnlrR3fGKrmbWJ35pvdgn+2cCP22cJnXD2oVRgJ957saJ2L
|
||||
J1MEIW6nOLQ7iyvPeKB7T+CS+LbzfcF8tFk0J21OsQEsty/Li+wO4AMaiBLQO0fK
|
||||
DwVKrL1cpSR/XwJJ73TjM0dfmZJkreCeFtTCHrdd1Vsd6qYhGUWcJ53d7mLGUA11
|
||||
XjLywWNr7H27T66Gk/RiKSeKHzE=
|
||||
ggEBAB6P+vUy7pie7Za0qerXPAV0NkHvG4Q1aj1syVMqUPfRgNPsmbxL3YZp4JQc
|
||||
xHfJavftLA3FF6cVdSUULcYUjReXbefXOIjW37qMqirxTu8fShZa+gxQ6pixSzaX
|
||||
JCHO3ORcuq7nyyod93P/F/OdzyZOt8tcjuSeVdIA+MpTw1M/bWWqhvTx7SYedVa+
|
||||
vYD1HE5NE8MbBGG5xuJvMEQBDmPYGc6DQOnHAfJR17fNFiWT3j56fY1yHitmdpHf
|
||||
uTP6BLiMxXrv9pR0VB6WSqj2DVn3L/EmePbHv2j5sH+lLRx7/GQl7aS75jFE+dVf
|
||||
Z00BKYSy+Pr7a1IeZsMIa47Vrbk=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -233,27 +233,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 7 (0x7)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:42 2020 GMT
|
||||
Not After : Mar 16 13:23:42 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www3.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www3.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:be:19:65:1e:17:39:d4:33:fc:97:64:69:80:51:
|
||||
fb:6c:7c:ca:e1:ba:2a:ab:d2:dd:30:61:f3:2e:47:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22222
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b1:1d:46:1d:9c:de:5d:6e:2f:f1:a0:9a:68:2f:25:ed:2b:ae:
|
||||
5c:47:01:9a:39:49:26:33:ab:78:10:9a:3f:ba:99:05:b2:47:
|
||||
26:a3:ec:cb:5f:db:db:ef:f7:db:5d:04:bf:5f:89:d6:3d:aa:
|
||||
3e:04:36:95:f4:44:9e:a1:f9:5d:b9:4d:a8:76:d4:9f:1e:42:
|
||||
45:80:6f:d9:c8:83:ee:2a:85:ed:8c:26:25:ec:95:9f:ec:22:
|
||||
41:f0:0d:66:b8:89:30:1d:84:44:0c:f8:4a:f9:4e:f9:c1:ff:
|
||||
90:bd:71:e9:d4:ca:07:5b:4e:a8:cb:38:d3:b1:26:1f:eb:cd:
|
||||
0a:ae:a6:45:40:2c:41:77:b6:c9:69:8c:7b:05:33:81:83:cf:
|
||||
16:25:ea:7d:15:20:08:50:6c:64:0a:69:1f:19:58:dd:89:f9:
|
||||
3a:84:4c:9e:9a:47:d2:f4:3f:b3:0b:29:ab:c8:1f:77:75:c6:
|
||||
fa:8f:cd:d5:e6:5b:ab:1d:6e:9c:84:2a:d7:16:5d:25:bd:70:
|
||||
34:c0:44:a0:fe:5c:66:64:74:37:f2:36:2a:a6:49:be:47:0e:
|
||||
79:b0:82:7f:86:e4:94:01:85:44:82:1d:aa:59:31:1d:9e:1e:
|
||||
28:39:7d:91:8c:c6:db:2e:90:6d:f7:a3:06:aa:88:e7:db:90:
|
||||
64:c3:e2:17
|
||||
8f:08:2b:50:a2:26:49:28:c1:f1:bf:d8:5e:75:e3:37:cf:e0:
|
||||
48:c3:e3:fa:8b:ec:6f:f7:06:39:cc:12:6a:94:97:01:f1:3b:
|
||||
71:9d:08:85:40:ae:de:ab:33:68:ab:af:d6:a4:b3:90:f4:8f:
|
||||
12:31:31:52:98:6b:c8:bb:1e:5f:58:1a:31:5d:37:43:91:38:
|
||||
be:b9:5b:17:cd:25:f1:49:09:76:19:57:fb:08:67:43:3e:d3:
|
||||
20:e2:b6:bc:17:cc:21:9d:45:cf:1c:5c:dc:54:fd:22:b6:b4:
|
||||
b2:91:b8:8f:c3:93:95:02:52:a0:49:ef:fb:f4:86:61:82:e8:
|
||||
c0:fc:2b:b7:82:32:74:81:68:c3:85:4a:e5:e4:d4:4c:2d:22:
|
||||
81:34:89:ca:aa:75:78:4d:5b:90:c2:a1:4f:ba:da:3a:f1:4e:
|
||||
12:21:ac:b6:23:3b:e3:e5:50:b6:69:3b:94:d7:64:37:57:a4:
|
||||
cd:a7:53:1e:e5:27:8f:3d:b7:3e:85:34:9e:db:54:a6:d5:b8:
|
||||
cb:9d:df:41:e9:b2:16:5c:a6:38:31:fb:64:9e:cb:4b:9d:b7:
|
||||
f9:cb:52:ed:87:fe:f7:04:bb:a3:6b:07:66:57:5c:1c:cd:c4:
|
||||
f2:60:94:97:38:0f:52:a4:aa:bc:5d:b5:09:d1:75:bd:24:ab:
|
||||
06:91:7e:24
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE7jCCA9agAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBoTELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NM
|
||||
IGludGVybWVkaWF0ZSBDQSAyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMB4XDTIwMDYxOTEzMjM0MloXDTIzMDMxNjEzMjM0MlowgZgxCzAJBgNVBAYT
|
||||
Y29tMB4XDTIxMDIxMDE5NDk1NFoXDTIzMTEwNzE5NDk1NFowgZgxCzAJBgNVBAYT
|
||||
AlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRAwDgYD
|
||||
VQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEZMBcGA1UEAwwQd3d3
|
||||
My53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCC
|
||||
@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx
|
||||
GDAWBgNVBAMMD3dvbGZTU0wgcm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
|
||||
b2xmc3NsLmNvbYIBAjALBgNVHQ8EBAMCBeAwMgYIKwYBBQUHAQEEJjAkMCIGCCsG
|
||||
AQUFBzABhhZodHRwOi8vMTI3LjAuMC4xOjIyMjIyMA0GCSqGSIb3DQEBCwUAA4IB
|
||||
AQCxHUYdnN5dbi/xoJpoLyXtK65cRwGaOUkmM6t4EJo/upkFskcmo+zLX9vb7/fb
|
||||
XQS/X4nWPao+BDaV9ESeoflduU2odtSfHkJFgG/ZyIPuKoXtjCYl7JWf7CJB8A1m
|
||||
uIkwHYREDPhK+U75wf+QvXHp1MoHW06oyzjTsSYf680KrqZFQCxBd7bJaYx7BTOB
|
||||
g88WJep9FSAIUGxkCmkfGVjdifk6hEyemkfS9D+zCymryB93dcb6j83V5lurHW6c
|
||||
hCrXFl0lvXA0wESg/lxmZHQ38jYqpkm+Rw55sIJ/huSUAYVEgh2qWTEdnh4oOX2R
|
||||
jMbbLpBt96MGqojn25Bkw+IX
|
||||
AQCPCCtQoiZJKMHxv9hedeM3z+BIw+P6i+xv9wY5zBJqlJcB8TtxnQiFQK7eqzNo
|
||||
q6/WpLOQ9I8SMTFSmGvIux5fWBoxXTdDkTi+uVsXzSXxSQl2GVf7CGdDPtMg4ra8
|
||||
F8whnUXPHFzcVP0itrSykbiPw5OVAlKgSe/79IZhgujA/Cu3gjJ0gWjDhUrl5NRM
|
||||
LSKBNInKqnV4TVuQwqFPuto68U4SIay2Izvj5VC2aTuU12Q3V6TNp1Me5SePPbc+
|
||||
hTSe21Sm1bjLnd9B6bIWXKY4MftknstLnbf5y1Lth/73BLujawdmV1wczcTyYJSX
|
||||
OA9SpKq8XbUJ0XW9JKsGkX4k
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d0:20:3c:35:19:6f:2c:44:b4:7e:42:c7:75:b4:
|
||||
6a:2b:a9:23:85:bf:87:b4:ee:ca:d7:4b:1f:31:d7:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
0a:ef:11:86:ba:12:b6:5a:38:b7:7a:62:a9:e8:75:e8:25:a1:
|
||||
72:5b:d1:ab:7e:b9:46:9c:ca:57:90:d2:cc:83:8e:3a:e7:05:
|
||||
02:da:9d:da:ff:28:d0:51:bb:68:6b:3a:32:23:e3:ca:37:49:
|
||||
82:b4:22:74:1b:22:49:c6:4e:54:20:46:89:0c:fd:d8:cd:a7:
|
||||
15:cf:49:87:48:ad:07:ba:91:cc:85:39:20:c5:7f:c3:f5:07:
|
||||
e4:83:c8:bd:a6:71:47:c1:6a:81:8c:af:8b:f8:80:3f:ec:b9:
|
||||
e6:34:c8:01:bb:1c:d4:dd:11:8b:7b:0c:5c:3b:5d:b0:56:c6:
|
||||
9f:35:fc:75:2e:f4:59:27:21:d6:b1:2a:71:6b:b0:c5:44:b0:
|
||||
e3:0d:9d:ed:a0:8e:69:bc:ac:38:61:61:8b:ab:e0:07:cc:41:
|
||||
70:da:55:56:09:4a:7a:ca:17:01:62:df:98:14:2a:1a:d4:52:
|
||||
52:4c:4e:96:66:10:e4:46:f3:0c:e6:31:06:60:62:69:68:77:
|
||||
2b:36:bd:28:6e:ed:fd:6c:29:c6:e9:c8:58:f1:51:d7:a4:91:
|
||||
81:7b:b7:c3:2e:07:c4:fd:bd:35:d9:d9:82:27:97:4d:a4:71:
|
||||
05:25:1c:67:a0:56:5e:ea:c2:1f:08:c2:ae:a6:e7:c0:15:72:
|
||||
b3:e1:df:50
|
||||
0c:13:dc:c2:28:a2:be:bb:0b:8e:29:28:aa:7a:99:04:e5:88:
|
||||
c6:67:7e:8d:3f:8a:68:3a:7f:c5:e2:d0:ed:c9:95:4c:40:f2:
|
||||
7a:87:73:17:fb:f8:c4:bf:1b:ff:54:be:33:6d:15:e3:4f:70:
|
||||
f4:60:27:b2:67:cd:0e:0f:2a:81:ee:dc:9d:48:37:74:8a:4c:
|
||||
11:47:23:f0:5d:7c:c1:78:70:1d:c1:87:db:26:b0:86:a8:42:
|
||||
3d:87:87:43:e7:d9:3a:a8:5c:c5:66:a4:d5:4e:9b:d9:44:b2:
|
||||
41:30:10:94:3b:fd:00:dc:02:63:05:d7:a1:75:ad:54:28:9e:
|
||||
e4:07:3c:af:68:89:9b:71:96:21:ff:d6:4e:1d:d0:02:d5:21:
|
||||
7d:ae:d8:07:96:6c:1f:ca:a5:ef:54:13:92:be:3c:7d:c0:65:
|
||||
bf:5c:bb:ff:46:c2:69:0f:4c:29:70:6d:b7:52:d5:ed:9e:e4:
|
||||
89:dc:41:0d:0a:94:bc:69:b3:dc:8a:a9:45:25:f1:2c:9b:5b:
|
||||
85:bc:69:fb:94:31:05:2c:17:fa:78:28:36:78:7f:f9:0c:4f:
|
||||
22:36:05:fe:bf:59:9d:5d:1f:9a:5e:8e:d8:1d:62:4d:d6:2d:
|
||||
73:d6:26:c1:a5:bc:e3:62:81:fc:1e:cb:7f:3e:c3:00:c9:b0:
|
||||
e0:c6:1f:c3
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8DCCA9igAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTU0WhcNMjMxMTA3MTk0OTU0WjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
|
||||
bWVkaWF0ZSBDQSAyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
|
||||
@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu
|
||||
ZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQmMCQwIgYI
|
||||
KwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcNAQELBQAD
|
||||
ggEBAArvEYa6ErZaOLd6YqnodegloXJb0at+uUacyleQ0syDjjrnBQLandr/KNBR
|
||||
u2hrOjIj48o3SYK0InQbIknGTlQgRokM/djNpxXPSYdIrQe6kcyFOSDFf8P1B+SD
|
||||
yL2mcUfBaoGMr4v4gD/sueY0yAG7HNTdEYt7DFw7XbBWxp81/HUu9FknIdaxKnFr
|
||||
sMVEsOMNne2gjmm8rDhhYYur4AfMQXDaVVYJSnrKFwFi35gUKhrUUlJMTpZmEORG
|
||||
8wzmMQZgYmlodys2vShu7f1sKcbpyFjxUdekkYF7t8MuB8T9vTXZ2YInl02kcQUl
|
||||
HGegVl7qwh8Iwq6m58AVcrPh31A=
|
||||
ggEBAAwT3MIoor67C44pKKp6mQTliMZnfo0/img6f8Xi0O3JlUxA8nqHcxf7+MS/
|
||||
G/9UvjNtFeNPcPRgJ7JnzQ4PKoHu3J1IN3SKTBFHI/BdfMF4cB3Bh9smsIaoQj2H
|
||||
h0Pn2TqoXMVmpNVOm9lEskEwEJQ7/QDcAmMF16F1rVQonuQHPK9oiZtxliH/1k4d
|
||||
0ALVIX2u2AeWbB/Kpe9UE5K+PH3AZb9cu/9GwmkPTClwbbdS1e2e5IncQQ0KlLxp
|
||||
s9yKqUUl8SybW4W8afuUMQUsF/p4KDZ4f/kMTyI2Bf6/WZ1dH5pejtgdYk3WLXPW
|
||||
JsGlvONigfwey38+wwDJsODGH8M=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -233,27 +233,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 8 (0x8)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:42 2020 GMT
|
||||
Not After : Mar 16 13:23:42 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www4.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www4.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:9c:ef:8a:7e:84:4d:58:7a:b1:91:c8:cb:68:76:
|
||||
df:fe:0a:29:fe:7f:74:35:d5:c3:fd:43:be:d7:89:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22222
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
55:39:86:a2:0c:6f:a5:e5:4c:6d:26:1a:bf:f6:3b:ac:e4:76:
|
||||
75:72:a0:08:96:06:34:4b:1c:0c:1b:f3:49:88:16:cf:98:ec:
|
||||
23:3f:26:70:3f:06:ed:25:a5:a4:e6:c4:b5:2d:4b:a4:82:b2:
|
||||
31:bb:d7:b1:a2:8e:65:78:31:69:1c:77:bf:56:4f:3f:e2:27:
|
||||
08:24:e2:30:6d:de:4b:e2:ad:89:98:9a:9a:dc:e5:6c:23:a1:
|
||||
f5:65:4a:6a:cd:0f:ee:0f:53:9d:40:63:43:f9:0a:4d:bc:1a:
|
||||
8e:de:d8:43:6c:21:b9:56:3c:ab:36:4f:c9:28:27:d9:0e:74:
|
||||
f9:b4:0a:55:9c:13:0e:06:23:21:5e:b0:0e:b9:6f:db:30:81:
|
||||
85:68:a3:3a:36:8c:72:a7:79:5b:6c:52:3b:17:8c:fb:10:4d:
|
||||
d7:d1:32:ec:c5:8e:48:2c:86:a4:78:fb:54:75:17:c9:f8:56:
|
||||
87:f8:2f:b9:7e:b0:85:72:55:31:c5:b9:d1:70:4f:41:56:7f:
|
||||
81:c8:21:fe:11:2c:cc:1e:e1:99:6a:35:50:e4:d2:ca:49:df:
|
||||
fc:00:c7:0e:84:17:ba:70:a8:93:a1:b2:eb:ef:34:26:f8:f2:
|
||||
8e:e1:ba:85:bc:39:c6:24:f0:74:d8:86:91:67:44:75:06:0a:
|
||||
a3:04:7d:43
|
||||
41:bd:96:38:c0:f7:87:a4:73:f5:bb:e8:4e:9d:83:45:03:17:
|
||||
19:b8:02:55:73:4f:f7:4e:c8:07:b1:7c:24:97:e8:f1:7c:22:
|
||||
43:ab:52:42:08:8b:d7:64:4d:30:99:e2:84:e8:f0:59:65:65:
|
||||
fa:f4:84:da:b2:9f:84:37:e9:19:5a:0f:7c:4c:a7:6c:ef:81:
|
||||
7d:da:ca:d2:3e:2a:3b:82:99:50:02:2f:39:09:e8:7a:d8:f2:
|
||||
d5:7e:f6:77:bf:6b:f2:33:78:0e:f0:fc:d4:15:2b:04:e8:ea:
|
||||
d6:1d:97:0b:7e:60:17:c1:f7:f0:cb:65:51:a1:65:0c:c0:22:
|
||||
cd:f5:18:bb:20:82:6c:f8:16:79:30:3e:f5:67:a7:9e:8a:7e:
|
||||
ae:f5:49:a1:e6:01:8a:d3:b4:92:8e:b6:ce:18:aa:00:67:f1:
|
||||
19:7d:55:af:3c:5c:29:c3:04:a5:a5:e7:f5:67:af:d9:ca:75:
|
||||
84:3d:6d:74:4e:d5:c8:25:d5:fb:f7:24:5c:83:32:9a:6a:5d:
|
||||
de:20:c3:3c:47:91:6f:2e:39:b7:17:12:fc:b0:93:d2:d6:23:
|
||||
44:c1:71:f4:33:80:21:f1:63:68:26:f7:ad:e4:35:86:3a:5b:
|
||||
26:d6:9d:0e:cf:38:b8:3d:80:30:34:ee:9e:b8:b6:37:19:3c:
|
||||
2d:ed:a3:63
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE7jCCA9agAwIBAgIBCDANBgkqhkiG9w0BAQsFADCBoTELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NM
|
||||
IGludGVybWVkaWF0ZSBDQSAyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
Y29tMB4XDTIwMDYxOTEzMjM0MloXDTIzMDMxNjEzMjM0MlowgZgxCzAJBgNVBAYT
|
||||
Y29tMB4XDTIxMDIxMDE5NDk1NFoXDTIzMTEwNzE5NDk1NFowgZgxCzAJBgNVBAYT
|
||||
AlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRAwDgYD
|
||||
VQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEZMBcGA1UEAwwQd3d3
|
||||
NC53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCC
|
||||
@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx
|
||||
GDAWBgNVBAMMD3dvbGZTU0wgcm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
|
||||
b2xmc3NsLmNvbYIBAjALBgNVHQ8EBAMCBeAwMgYIKwYBBQUHAQEEJjAkMCIGCCsG
|
||||
AQUFBzABhhZodHRwOi8vMTI3LjAuMC4xOjIyMjIyMA0GCSqGSIb3DQEBCwUAA4IB
|
||||
AQBVOYaiDG+l5UxtJhq/9jus5HZ1cqAIlgY0SxwMG/NJiBbPmOwjPyZwPwbtJaWk
|
||||
5sS1LUukgrIxu9exoo5leDFpHHe/Vk8/4icIJOIwbd5L4q2JmJqa3OVsI6H1ZUpq
|
||||
zQ/uD1OdQGND+QpNvBqO3thDbCG5VjyrNk/JKCfZDnT5tApVnBMOBiMhXrAOuW/b
|
||||
MIGFaKM6Noxyp3lbbFI7F4z7EE3X0TLsxY5ILIakePtUdRfJ+FaH+C+5frCFclUx
|
||||
xbnRcE9BVn+ByCH+ESzMHuGZajVQ5NLKSd/8AMcOhBe6cKiTobLr7zQm+PKO4bqF
|
||||
vDnGJPB02IaRZ0R1BgqjBH1D
|
||||
AQBBvZY4wPeHpHP1u+hOnYNFAxcZuAJVc0/3TsgHsXwkl+jxfCJDq1JCCIvXZE0w
|
||||
meKE6PBZZWX69ITasp+EN+kZWg98TKds74F92srSPio7gplQAi85Ceh62PLVfvZ3
|
||||
v2vyM3gO8PzUFSsE6OrWHZcLfmAXwffwy2VRoWUMwCLN9Ri7IIJs+BZ5MD71Z6ee
|
||||
in6u9Umh5gGK07SSjrbOGKoAZ/EZfVWvPFwpwwSlpef1Z6/ZynWEPW10TtXIJdX7
|
||||
9yRcgzKaal3eIMM8R5FvLjm3FxL8sJPS1iNEwXH0M4Ah8WNoJvet5DWGOlsm1p0O
|
||||
zzi4PYAwNO6euLY3GTwt7aNj
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d0:20:3c:35:19:6f:2c:44:b4:7e:42:c7:75:b4:
|
||||
6a:2b:a9:23:85:bf:87:b4:ee:ca:d7:4b:1f:31:d7:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
0a:ef:11:86:ba:12:b6:5a:38:b7:7a:62:a9:e8:75:e8:25:a1:
|
||||
72:5b:d1:ab:7e:b9:46:9c:ca:57:90:d2:cc:83:8e:3a:e7:05:
|
||||
02:da:9d:da:ff:28:d0:51:bb:68:6b:3a:32:23:e3:ca:37:49:
|
||||
82:b4:22:74:1b:22:49:c6:4e:54:20:46:89:0c:fd:d8:cd:a7:
|
||||
15:cf:49:87:48:ad:07:ba:91:cc:85:39:20:c5:7f:c3:f5:07:
|
||||
e4:83:c8:bd:a6:71:47:c1:6a:81:8c:af:8b:f8:80:3f:ec:b9:
|
||||
e6:34:c8:01:bb:1c:d4:dd:11:8b:7b:0c:5c:3b:5d:b0:56:c6:
|
||||
9f:35:fc:75:2e:f4:59:27:21:d6:b1:2a:71:6b:b0:c5:44:b0:
|
||||
e3:0d:9d:ed:a0:8e:69:bc:ac:38:61:61:8b:ab:e0:07:cc:41:
|
||||
70:da:55:56:09:4a:7a:ca:17:01:62:df:98:14:2a:1a:d4:52:
|
||||
52:4c:4e:96:66:10:e4:46:f3:0c:e6:31:06:60:62:69:68:77:
|
||||
2b:36:bd:28:6e:ed:fd:6c:29:c6:e9:c8:58:f1:51:d7:a4:91:
|
||||
81:7b:b7:c3:2e:07:c4:fd:bd:35:d9:d9:82:27:97:4d:a4:71:
|
||||
05:25:1c:67:a0:56:5e:ea:c2:1f:08:c2:ae:a6:e7:c0:15:72:
|
||||
b3:e1:df:50
|
||||
0c:13:dc:c2:28:a2:be:bb:0b:8e:29:28:aa:7a:99:04:e5:88:
|
||||
c6:67:7e:8d:3f:8a:68:3a:7f:c5:e2:d0:ed:c9:95:4c:40:f2:
|
||||
7a:87:73:17:fb:f8:c4:bf:1b:ff:54:be:33:6d:15:e3:4f:70:
|
||||
f4:60:27:b2:67:cd:0e:0f:2a:81:ee:dc:9d:48:37:74:8a:4c:
|
||||
11:47:23:f0:5d:7c:c1:78:70:1d:c1:87:db:26:b0:86:a8:42:
|
||||
3d:87:87:43:e7:d9:3a:a8:5c:c5:66:a4:d5:4e:9b:d9:44:b2:
|
||||
41:30:10:94:3b:fd:00:dc:02:63:05:d7:a1:75:ad:54:28:9e:
|
||||
e4:07:3c:af:68:89:9b:71:96:21:ff:d6:4e:1d:d0:02:d5:21:
|
||||
7d:ae:d8:07:96:6c:1f:ca:a5:ef:54:13:92:be:3c:7d:c0:65:
|
||||
bf:5c:bb:ff:46:c2:69:0f:4c:29:70:6d:b7:52:d5:ed:9e:e4:
|
||||
89:dc:41:0d:0a:94:bc:69:b3:dc:8a:a9:45:25:f1:2c:9b:5b:
|
||||
85:bc:69:fb:94:31:05:2c:17:fa:78:28:36:78:7f:f9:0c:4f:
|
||||
22:36:05:fe:bf:59:9d:5d:1f:9a:5e:8e:d8:1d:62:4d:d6:2d:
|
||||
73:d6:26:c1:a5:bc:e3:62:81:fc:1e:cb:7f:3e:c3:00:c9:b0:
|
||||
e0:c6:1f:c3
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE8DCCA9igAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTU0WhcNMjMxMTA3MTk0OTU0WjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
|
||||
bWVkaWF0ZSBDQSAyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
|
||||
@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu
|
||||
ZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZv
|
||||
QHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQmMCQwIgYI
|
||||
KwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcNAQELBQAD
|
||||
ggEBAArvEYa6ErZaOLd6YqnodegloXJb0at+uUacyleQ0syDjjrnBQLandr/KNBR
|
||||
u2hrOjIj48o3SYK0InQbIknGTlQgRokM/djNpxXPSYdIrQe6kcyFOSDFf8P1B+SD
|
||||
yL2mcUfBaoGMr4v4gD/sueY0yAG7HNTdEYt7DFw7XbBWxp81/HUu9FknIdaxKnFr
|
||||
sMVEsOMNne2gjmm8rDhhYYur4AfMQXDaVVYJSnrKFwFi35gUKhrUUlJMTpZmEORG
|
||||
8wzmMQZgYmlodys2vShu7f1sKcbpyFjxUdekkYF7t8MuB8T9vTXZ2YInl02kcQUl
|
||||
HGegVl7qwh8Iwq6m58AVcrPh31A=
|
||||
ggEBAAwT3MIoor67C44pKKp6mQTliMZnfo0/img6f8Xi0O3JlUxA8nqHcxf7+MS/
|
||||
G/9UvjNtFeNPcPRgJ7JnzQ4PKoHu3J1IN3SKTBFHI/BdfMF4cB3Bh9smsIaoQj2H
|
||||
h0Pn2TqoXMVmpNVOm9lEskEwEJQ7/QDcAmMF16F1rVQonuQHPK9oiZtxliH/1k4d
|
||||
0ALVIX2u2AeWbB/Kpe9UE5K+PH3AZb9cu/9GwmkPTClwbbdS1e2e5IncQQ0KlLxp
|
||||
s9yKqUUl8SybW4W8afuUMQUsF/p4KDZ4f/kMTyI2Bf6/WZ1dH5pejtgdYk3WLXPW
|
||||
JsGlvONigfwey38+wwDJsODGH8M=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -233,27 +233,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
@@ -2,15 +2,15 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 9 (0x9)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL REVOKED intermediate CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL REVOKED intermediate CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:42 2020 GMT
|
||||
Not After : Mar 16 13:23:42 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www5.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www5.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ac:73:6d:e9:fa:8c:36:72:3e:89:3b:52:29:bd:
|
||||
14:70:a2:00:b4:08:58:b6:c6:c0:bf:80:6a:1f:a5:
|
||||
@@ -47,27 +47,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22223
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
55:da:28:39:5f:01:e7:85:42:35:24:88:27:fe:71:b0:ee:f8:
|
||||
3f:7f:ed:c7:db:0c:8f:ed:04:25:e1:7e:a4:39:ef:fe:1c:54:
|
||||
f2:c1:ad:92:a7:63:6e:bc:94:61:b2:fc:bb:b8:bc:d0:4e:1c:
|
||||
f2:35:b6:2b:9e:70:a0:eb:7b:68:45:3d:14:e1:d2:e8:02:d5:
|
||||
26:ac:81:6d:46:3a:4e:5a:98:a0:72:ec:c0:59:fe:59:9a:e0:
|
||||
c8:33:2d:3c:86:71:3b:74:b4:0b:77:10:06:ac:9d:f0:34:60:
|
||||
51:74:d0:52:d0:9c:78:3d:d9:ed:7b:bb:11:44:d8:cb:e3:bd:
|
||||
14:d2:1e:98:49:b6:35:89:83:94:1a:ea:2a:8e:48:2d:65:ba:
|
||||
a5:ff:a0:0f:98:55:1b:92:85:b8:e4:9f:7e:50:d0:07:65:40:
|
||||
3f:d3:c8:67:65:c7:81:12:b3:96:42:dc:7b:22:32:de:41:5a:
|
||||
8e:9a:21:99:50:ab:be:7b:12:97:f7:b0:0f:22:47:08:fd:2a:
|
||||
4f:29:ce:02:59:52:bd:80:3a:24:a4:58:6d:39:04:e1:ce:c5:
|
||||
75:12:a0:ac:af:39:81:c5:56:03:78:3e:08:91:c5:1a:17:e1:
|
||||
6f:4e:b3:ae:37:3a:5a:89:2a:e0:c6:ad:26:e9:50:9c:05:69:
|
||||
81:76:89:8d
|
||||
82:34:f3:94:21:59:85:fb:8f:9e:ae:df:bb:ab:ba:4b:80:75:
|
||||
c2:eb:1b:58:5d:45:d4:df:6c:a6:8a:8f:84:00:7a:da:00:71:
|
||||
a3:89:07:52:78:04:05:ba:3d:aa:fd:0b:1e:82:22:12:a1:98:
|
||||
39:fb:b8:91:92:dc:4a:a6:33:f9:fd:3b:a7:7d:96:63:ec:cd:
|
||||
5c:ac:db:9d:dd:5c:0c:70:1e:31:61:e1:1c:38:b6:e4:d7:e1:
|
||||
98:44:8e:20:ae:36:2c:e8:be:8b:82:38:f6:2e:46:46:a2:43:
|
||||
51:e1:cd:fb:1d:f5:fe:14:57:fe:b4:55:6d:0c:55:45:3f:96:
|
||||
96:7a:3c:be:40:31:27:69:d7:18:d2:7b:af:be:a9:7f:fe:fe:
|
||||
75:b4:8c:ae:d8:48:9c:f6:60:ba:69:dd:1a:fe:ec:04:53:5e:
|
||||
a9:04:91:46:89:4b:5d:01:79:36:66:ea:25:1c:af:fe:44:59:
|
||||
90:3f:b0:4d:51:a4:ec:d9:c2:d1:35:12:79:26:ea:a4:99:b2:
|
||||
ac:e6:7b:bc:bd:d1:06:d3:fe:5b:35:2e:58:46:30:bf:8c:1f:
|
||||
15:da:e9:7e:3a:68:4c:85:89:38:2a:a2:6c:6d:14:25:17:32:
|
||||
d2:96:0b:67:b9:c5:7b:de:ef:1a:13:b8:8a:d7:8f:db:b7:73:
|
||||
cd:5b:d8:fc
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE9DCCA9ygAwIBAgIBCTANBgkqhkiG9w0BAQsFADCBpzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSgwJgYDVQQDDB93b2xmU1NM
|
||||
IFJFVk9LRUQgaW50ZXJtZWRpYXRlIENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
|
||||
bGZzc2wuY29tMB4XDTIwMDYxOTEzMjM0MloXDTIzMDMxNjEzMjM0MlowgZgxCzAJ
|
||||
bGZzc2wuY29tMB4XDTIxMDIxMDE5NDk1NFoXDTIzMTEwNzE5NDk1NFowgZgxCzAJ
|
||||
BgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxl
|
||||
MRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEZMBcGA1UE
|
||||
AwwQd3d3NS53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3Ns
|
||||
@@ -84,26 +84,26 @@ A1UEBwwHU2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5l
|
||||
ZXJpbmcxGDAWBgNVBAMMD3dvbGZTU0wgcm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQ
|
||||
aW5mb0B3b2xmc3NsLmNvbYIBAzALBgNVHQ8EBAMCBeAwMgYIKwYBBQUHAQEEJjAk
|
||||
MCIGCCsGAQUFBzABhhZodHRwOi8vMTI3LjAuMC4xOjIyMjIzMA0GCSqGSIb3DQEB
|
||||
CwUAA4IBAQBV2ig5XwHnhUI1JIgn/nGw7vg/f+3H2wyP7QQl4X6kOe/+HFTywa2S
|
||||
p2NuvJRhsvy7uLzQThzyNbYrnnCg63toRT0U4dLoAtUmrIFtRjpOWpigcuzAWf5Z
|
||||
muDIMy08hnE7dLQLdxAGrJ3wNGBRdNBS0Jx4Pdnte7sRRNjL470U0h6YSbY1iYOU
|
||||
GuoqjkgtZbql/6APmFUbkoW45J9+UNAHZUA/08hnZceBErOWQtx7IjLeQVqOmiGZ
|
||||
UKu+exKX97APIkcI/SpPKc4CWVK9gDokpFhtOQThzsV1EqCsrzmBxVYDeD4IkcUa
|
||||
F+FvTrOuNzpaiSrgxq0m6VCcBWmBdomN
|
||||
CwUAA4IBAQCCNPOUIVmF+4+ert+7q7pLgHXC6xtYXUXU32ymio+EAHraAHGjiQdS
|
||||
eAQFuj2q/QsegiISoZg5+7iRktxKpjP5/TunfZZj7M1crNud3VwMcB4xYeEcOLbk
|
||||
1+GYRI4grjYs6L6Lgjj2LkZGokNR4c37HfX+FFf+tFVtDFVFP5aWejy+QDEnadcY
|
||||
0nuvvql//v51tIyu2Eic9mC6ad0a/uwEU16pBJFGiUtdAXk2ZuolHK/+RFmQP7BN
|
||||
UaTs2cLRNRJ5JuqkmbKs5nu8vdEG0/5bNS5YRjC/jB8V2ul+OmhMhYk4KqJsbRQl
|
||||
FzLSlgtnucV73u8aE7iK14/bt3PNW9j8
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 3 (0x3)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL REVOKED intermediate CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:54 2021 GMT
|
||||
Not After : Nov 7 19:49:54 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL REVOKED intermediate CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:de:c5:04:10:7d:c2:21:e9:12:45:da:d5:ba:28:
|
||||
fd:a6:f4:30:44:a0:df:f9:70:5e:17:26:97:59:5c:
|
||||
@@ -140,27 +140,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
5d:d5:47:52:01:4a:b4:5f:a1:3e:97:ed:fd:b5:2f:0a:35:03:
|
||||
c8:83:f5:1c:91:03:b6:9d:72:1f:64:9f:07:e6:29:c2:0e:d8:
|
||||
ba:30:16:a7:7d:f6:4b:bf:9a:3f:46:b3:c2:14:c4:be:a1:d3:
|
||||
8e:22:3e:9f:f8:20:ad:8e:c0:f3:0a:3e:94:66:2d:66:07:d7:
|
||||
ca:70:8d:9a:01:5f:fb:20:32:a5:b9:b2:52:b1:21:e1:a0:8b:
|
||||
46:aa:c9:e5:45:43:0c:14:e2:8e:ff:31:bc:c9:4e:f0:43:3a:
|
||||
5e:fb:f3:6a:d4:61:91:34:ad:bb:13:9b:53:d8:0e:6b:43:25:
|
||||
8a:58:9b:f4:d4:95:d9:78:23:cd:5c:92:43:84:71:73:63:4e:
|
||||
fc:e5:4a:98:29:80:cf:b4:83:ea:b5:7c:e2:01:b4:66:10:78:
|
||||
1b:06:4d:e8:45:c5:e8:25:fc:4d:3b:a8:ad:fc:52:dd:39:14:
|
||||
f0:3e:90:35:a6:2a:30:01:82:93:87:c5:e3:4e:83:f7:0f:d0:
|
||||
b7:1b:9f:96:11:59:3e:2b:8a:9e:6c:ed:a3:24:09:81:46:27:
|
||||
ec:78:2e:ce:a1:e1:af:0f:50:33:8c:52:8b:1a:b1:1b:a1:44:
|
||||
22:dc:01:96:94:1f:d9:cd:c7:ae:c2:15:50:77:9d:d1:0d:1d:
|
||||
a1:42:65:15
|
||||
9d:2f:66:43:34:cc:a4:d7:ae:09:81:ec:ca:bf:9e:e0:d6:28:
|
||||
a0:25:63:5e:16:0a:e9:60:2c:c1:e6:36:5d:92:f0:7c:4a:22:
|
||||
10:94:9b:1a:c6:8f:c3:a9:bb:69:53:b8:aa:30:91:c5:32:19:
|
||||
35:7a:3e:86:af:f9:39:74:44:6e:5c:39:f6:b6:62:0c:33:8e:
|
||||
f6:b9:d2:a7:e0:22:df:a3:4f:48:e4:04:f1:f7:20:f5:36:55:
|
||||
a1:3d:08:ae:a9:12:eb:a8:97:59:6f:a0:b8:f0:ab:73:22:01:
|
||||
cc:cc:96:29:ae:5f:46:ac:4e:47:1a:b9:8d:06:7e:88:67:5e:
|
||||
16:12:64:37:85:2a:d8:f3:27:cd:fa:86:fc:84:4b:51:3a:f1:
|
||||
c7:1a:27:8d:54:49:e6:cb:82:bb:7c:b3:3f:2f:10:d5:3a:74:
|
||||
e5:36:7b:b5:c4:58:a4:48:35:af:35:ad:3d:44:74:44:83:99:
|
||||
d0:a1:c6:2f:5f:f3:58:1a:33:2f:6c:4e:8e:44:ce:2a:ba:e9:
|
||||
c6:7d:9f:22:12:44:05:38:f7:87:54:4d:8d:ac:72:1c:5a:2a:
|
||||
74:9d:3b:30:31:d6:a9:39:d4:d6:0e:63:f8:46:07:ab:7f:01:
|
||||
31:cc:85:91:72:10:37:94:c4:ec:f9:9d:7f:81:25:cb:ce:55:
|
||||
48:85:86:2e
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE9jCCA96gAwIBAgIBAzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBpzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTU0WhcNMjMxMTA3MTk0OTU0WjCBpzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSgwJgYDVQQDDB93b2xmU1NMIFJFVk9L
|
||||
RUQgaW50ZXJtZWRpYXRlIENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
|
||||
@@ -177,26 +177,26 @@ DgYDVQQHDAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdp
|
||||
bmVlcmluZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkB
|
||||
FhBpbmZvQHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQm
|
||||
MCQwIgYIKwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcN
|
||||
AQELBQADggEBAF3VR1IBSrRfoT6X7f21Lwo1A8iD9RyRA7adch9knwfmKcIO2Low
|
||||
Fqd99ku/mj9Gs8IUxL6h044iPp/4IK2OwPMKPpRmLWYH18pwjZoBX/sgMqW5slKx
|
||||
IeGgi0aqyeVFQwwU4o7/MbzJTvBDOl7782rUYZE0rbsTm1PYDmtDJYpYm/TUldl4
|
||||
I81ckkOEcXNjTvzlSpgpgM+0g+q1fOIBtGYQeBsGTehFxegl/E07qK38Ut05FPA+
|
||||
kDWmKjABgpOHxeNOg/cP0Lcbn5YRWT4rip5s7aMkCYFGJ+x4Ls6h4a8PUDOMUosa
|
||||
sRuhRCLcAZaUH9nNx67CFVB3ndENHaFCZRU=
|
||||
AQELBQADggEBAJ0vZkM0zKTXrgmB7Mq/nuDWKKAlY14WCulgLMHmNl2S8HxKIhCU
|
||||
mxrGj8Opu2lTuKowkcUyGTV6Poav+Tl0RG5cOfa2Ygwzjva50qfgIt+jT0jkBPH3
|
||||
IPU2VaE9CK6pEuuol1lvoLjwq3MiAczMlimuX0asTkcauY0GfohnXhYSZDeFKtjz
|
||||
J836hvyES1E68ccaJ41USebLgrt8sz8vENU6dOU2e7XEWKRINa81rT1EdESDmdCh
|
||||
xi9f81gaMy9sTo5Eziq66cZ9nyISRAU494dUTY2schxaKnSdOzAx1qk51NYOY/hG
|
||||
B6t/ATHMhZFyEDeUxOz5nX+BJcvOVUiFhi4=
|
||||
-----END CERTIFICATE-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 99 (0x63)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Jun 19 13:23:41 2020 GMT
|
||||
Not After : Mar 16 13:23:41 2023 GMT
|
||||
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
|
||||
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
|
||||
@@ -233,27 +233,27 @@ Certificate:
|
||||
OCSP - URI:http://127.0.0.1:22220
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
|
||||
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
|
||||
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
|
||||
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
|
||||
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
|
||||
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
|
||||
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
|
||||
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
|
||||
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
|
||||
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
|
||||
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
|
||||
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
|
||||
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
|
||||
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
|
||||
3b:16:7a:b5
|
||||
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
|
||||
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
|
||||
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
|
||||
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
|
||||
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
|
||||
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
|
||||
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
|
||||
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
|
||||
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
|
||||
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
|
||||
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
|
||||
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
|
||||
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
|
||||
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
|
||||
42:94:c9:65
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
|
||||
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
|
||||
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
|
||||
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
|
||||
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
|
||||
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
|
||||
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
|
||||
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
|
||||
@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
|
||||
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
|
||||
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
|
||||
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
|
||||
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
|
||||
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
|
||||
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
|
||||
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
|
||||
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
|
||||
y2Ixa336OxZ6tQ==
|
||||
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
|
||||
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
|
||||
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
|
||||
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
|
||||
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
|
||||
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
|
||||
Xak2swKjQpTJZQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -2,16 +2,16 @@ Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_P521, OU = Root-P521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_P521, OU=Root-P521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Sep 14 23:57:18 2020 GMT
|
||||
Not After : Jun 11 23:57:18 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_p521, OU = CA-p521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_p521, OU=CA-p521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (521 bit)
|
||||
pub:
|
||||
pub:
|
||||
04:00:2d:18:24:2d:e4:db:6c:c3:69:9b:db:18:67:
|
||||
33:f1:60:68:94:14:cd:91:4a:57:65:ef:36:fa:24:
|
||||
82:88:ec:c7:f0:cb:48:45:6e:96:5f:7f:eb:76:be:
|
||||
@@ -34,20 +34,20 @@ Certificate:
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:81:87:02:41:60:cd:fa:94:0d:23:c3:4e:3c:b1:6e:d9:b6:
|
||||
5b:0e:97:1e:a4:df:0a:7c:05:2e:61:0c:d7:c0:e5:86:16:0c:
|
||||
7b:01:a5:33:9a:e6:31:a0:62:91:da:dc:22:d1:ba:4f:75:43:
|
||||
94:43:67:91:20:08:66:96:27:53:b2:61:0e:59:0a:50:02:42:
|
||||
01:ec:87:8d:ca:6d:e0:bf:30:ba:ef:37:13:ad:f6:d1:c4:fc:
|
||||
b5:e5:4b:96:c2:83:a0:d8:ed:04:73:85:8d:54:d7:e9:9a:67:
|
||||
8a:cf:11:36:4a:f2:2f:85:5a:24:5e:3c:79:e1:a7:c4:ec:78:
|
||||
82:7a:52:25:c4:55:57:95:0e:6f:c9:d5
|
||||
30:81:88:02:42:01:c4:4b:30:70:d8:b3:34:56:15:6a:b2:dc:
|
||||
09:af:f9:f8:a2:b8:6b:e7:46:8c:5e:95:77:d0:db:92:6a:d4:
|
||||
05:33:4b:94:66:eb:6c:02:50:c0:11:21:65:d8:47:c2:0c:6d:
|
||||
10:c4:3b:93:97:66:ca:71:b0:a4:51:3d:e1:e9:71:c7:87:02:
|
||||
42:00:a1:73:18:75:c7:aa:77:88:49:cd:5f:e6:7b:f5:c3:b0:
|
||||
77:27:ed:23:08:7c:aa:ba:a0:40:21:69:98:6b:95:fe:97:fb:
|
||||
26:70:5b:6b:52:1f:42:9b:7d:8c:81:91:bc:2a:b6:eb:b7:3a:
|
||||
99:20:c7:17:44:61:ee:50:f2:e9:8d:ca:21
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDBzCCAmmgAwIBAgIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEDAO
|
||||
MIIDCDCCAmmgAwIBAgIBATAKBggqhkjOPQQDAjCBlzELMAkGA1UEBhMCVVMxEDAO
|
||||
BgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZT
|
||||
U0xfUDUyMTESMBAGA1UECwwJUm9vdC1QNTIxMRgwFgYDVQQDDA93d3cud29sZnNz
|
||||
bC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAwOTE0
|
||||
MjM1NzE4WhcNMjMwNjExMjM1NzE4WjCBlTELMAkGA1UEBhMCVVMxEDAOBgNVBAgM
|
||||
bC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEwMjEw
|
||||
MTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlTELMAkGA1UEBhMCVVMxEDAOBgNVBAgM
|
||||
B01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZTU0xfcDUy
|
||||
MTEQMA4GA1UECwwHQ0EtcDUyMTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8w
|
||||
HQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIGbMBAGByqGSM49AgEGBSuB
|
||||
@@ -56,8 +56,8 @@ f+t2vkRAwxnAM2jEBgSOwiWxloMiDnvHsvwBhpHtQ1044AwljbPbsdzetyGAz4fe
|
||||
ZPQhPi2veb320ABLgXn69xCqGc1A1x51NFMpA+1IVCHlj5W1m0GNX91y0lqjYzBh
|
||||
MB0GA1UdDgQWBBRAiR0wXgxu1T3G1SWQ2rZCZ+3pgjAfBgNVHSMEGDAWgBRkp2iV
|
||||
UzMYoiCSvGRVpqvKdmibyDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB
|
||||
hjAKBggqhkjOPQQDAgOBiwAwgYcCQWDN+pQNI8NOPLFu2bZbDpcepN8KfAUuYQzX
|
||||
wOWGFgx7AaUzmuYxoGKR2twi0bpPdUOUQ2eRIAhmlidTsmEOWQpQAkIB7IeNym3g
|
||||
vzC67zcTrfbRxPy15UuWwoOg2O0Ec4WNVNfpmmeKzxE2SvIvhVokXjx54afE7HiC
|
||||
elIlxFVXlQ5vydU=
|
||||
hjAKBggqhkjOPQQDAgOBjAAwgYgCQgHESzBw2LM0VhVqstwJr/n4orhr50aMXpV3
|
||||
0NuSatQFM0uUZutsAlDAESFl2EfCDG0QxDuTl2bKcbCkUT3h6XHHhwJCAKFzGHXH
|
||||
qneISc1f5nv1w7B3J+0jCHyquqBAIWmYa5X+l/smcFtrUh9Cm32MgZG8KrbrtzqZ
|
||||
IMcXRGHuUPLpjcoh
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
@@ -1,18 +1,17 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
24:9d:c6:98:df:09:87:30:42:bd:e6:4f:86:05:af:dc:82:89:d7:0e
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_p521, OU = Client-p521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Serial Number: 12773897163527651161 (0xb145ffca8d6f7f59)
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_p521, OU=Client-p521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Validity
|
||||
Not Before: Sep 14 23:57:18 2020 GMT
|
||||
Not After : Jun 11 23:57:18 2023 GMT
|
||||
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_p521, OU = Client-p521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
|
||||
Not Before: Feb 10 19:49:53 2021 GMT
|
||||
Not After : Nov 7 19:49:53 2023 GMT
|
||||
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_p521, OU=Client-p521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (521 bit)
|
||||
pub:
|
||||
pub:
|
||||
04:01:62:6e:f1:00:ec:d8:99:58:9b:80:6b:fe:2c:
|
||||
f1:b2:f0:c8:48:df:ac:d2:3b:71:29:ab:f0:66:63:
|
||||
d8:8e:b5:c8:c2:fc:99:44:e2:45:b1:5a:7b:b9:73:
|
||||
@@ -30,7 +29,7 @@ Certificate:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:20:E1:BF:57:E5:F3:C3:0C:72:84:6A:C6:DF:BC:22:D0:B7:25:E5:A4
|
||||
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_p521/OU=Client-p521/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
|
||||
serial:24:9D:C6:98:DF:09:87:30:42:BD:E6:4F:86:05:AF:DC:82:89:D7:0E
|
||||
serial:B1:45:FF:CA:8D:6F:7F:59
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
@@ -39,35 +38,35 @@ Certificate:
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication, TLS Web Client Authentication
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:81:87:02:42:01:e1:85:a5:0e:81:ff:b0:2a:d3:b8:73:8c:
|
||||
1d:8e:1f:42:4c:de:cb:d1:63:69:ce:53:d0:2a:52:14:e4:7a:
|
||||
2f:1e:c4:0b:1b:db:1e:36:97:72:ed:9b:2f:d4:93:79:06:ec:
|
||||
41:6c:6c:18:28:99:56:b6:0b:58:c4:bc:47:db:64:a8:7e:02:
|
||||
41:2b:d0:32:2e:03:81:32:f3:9a:65:58:a4:51:7e:9a:ad:c2:
|
||||
99:bf:21:f1:a1:70:61:4b:ee:8e:df:3b:9c:79:e3:12:b4:3b:
|
||||
9e:64:da:d0:ef:5b:50:7b:a1:b0:30:8f:af:66:71:9d:41:20:
|
||||
cf:e8:9c:bd:f5:3b:c4:fe:00:43:35:24
|
||||
30:81:88:02:42:00:b5:3e:42:5d:77:b3:41:07:f0:82:b1:00:
|
||||
e9:d4:a7:12:bb:53:c8:8e:27:b5:1c:94:87:ab:41:02:fb:11:
|
||||
a5:ce:6e:5d:6b:b6:61:eb:66:a3:40:78:cb:71:a7:77:fc:d6:
|
||||
df:83:dd:07:85:3c:f4:32:4f:d2:78:41:39:96:7d:8f:47:02:
|
||||
42:00:8a:cb:77:0c:8f:60:3b:48:cd:55:44:f1:c2:7d:b2:53:
|
||||
d0:59:45:d2:89:4a:67:fd:b8:64:c2:f8:83:5e:17:52:4d:83:
|
||||
b4:77:81:77:21:3b:82:1e:a4:3a:61:ba:a3:49:32:3a:af:60:
|
||||
c5:4e:bf:77:95:1e:7b:21:6b:1c:3a:c7:c3
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIECTCCA2ugAwIBAgIUJJ3GmN8JhzBCveZPhgWv3IKJ1w4wCgYIKoZIzj0EAwIw
|
||||
gZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3pl
|
||||
bWFuMRUwEwYDVQQKDAx3b2xmU1NMX3A1MjExFDASBgNVBAsMC0NsaWVudC1wNTIx
|
||||
MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9A
|
||||
d29sZnNzbC5jb20wHhcNMjAwOTE0MjM1NzE4WhcNMjMwNjExMjM1NzE4WjCBmTEL
|
||||
MIID9DCCA1WgAwIBAgIJALFF/8qNb39ZMAoGCCqGSM49BAMCMIGZMQswCQYDVQQG
|
||||
EwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UE
|
||||
CgwMd29sZlNTTF9wNTIxMRQwEgYDVQQLDAtDbGllbnQtcDUyMTEYMBYGA1UEAwwP
|
||||
d3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29t
|
||||
MB4XDTIxMDIxMDE5NDk1M1oXDTIzMTEwNzE5NDk1M1owgZkxCzAJBgNVBAYTAlVT
|
||||
MRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRUwEwYDVQQKDAx3
|
||||
b2xmU1NMX3A1MjExFDASBgNVBAsMC0NsaWVudC1wNTIxMRgwFgYDVQQDDA93d3cu
|
||||
d29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wgZsw
|
||||
EAYHKoZIzj0CAQYFK4EEACMDgYYABAFibvEA7NiZWJuAa/4s8bLwyEjfrNI7cSmr
|
||||
8GZj2I61yML8mUTiRbFae7lzAdp57JwmJzRFJtWJS0T+aU5yFOOLvAAPCaIDw1rc
|
||||
lYL2+fac/7VrdZVLpChdnpAE0cAe1f1Dnh6DwBErKwdtqXoQ12fnUTck2L8DDYu1
|
||||
QFxP1hNzQryR2aOCAT8wggE7MB0GA1UdDgQWBBQg4b9X5fPDDHKEasbfvCLQtyXl
|
||||
pDCBzgYDVR0jBIHGMIHDgBQg4b9X5fPDDHKEasbfvCLQtyXlpKGBn6SBnDCBmTEL
|
||||
MAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4x
|
||||
FTATBgNVBAoMDHdvbGZTU0xfcDUyMTEUMBIGA1UECwwLQ2xpZW50LXA1MjExGDAW
|
||||
BgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xm
|
||||
c3NsLmNvbTCBmzAQBgcqhkjOPQIBBgUrgQQAIwOBhgAEAWJu8QDs2JlYm4Br/izx
|
||||
svDISN+s0jtxKavwZmPYjrXIwvyZROJFsVp7uXMB2nnsnCYnNEUm1YlLRP5pTnIU
|
||||
44u8AA8JogPDWtyVgvb59pz/tWt1lUukKF2ekATRwB7V/UOeHoPAESsrB22pehDX
|
||||
Z+dRNyTYvwMNi7VAXE/WE3NCvJHZo4IBSjCCAUYwHQYDVR0OBBYEFCDhv1fl88MM
|
||||
coRqxt+8ItC3JeWkMIHZBgNVHSMEgdEwgc6AFCDhv1fl88MMcoRqxt+8ItC3JeWk
|
||||
oYGfpIGcMIGZMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UE
|
||||
BwwHQm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF9wNTIxMRQwEgYDVQQLDAtDbGll
|
||||
bnQtcDUyMTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkB
|
||||
FhBpbmZvQHdvbGZzc2wuY29tghQkncaY3wmHMEK95k+GBa/cgonXDjAMBgNVHRME
|
||||
BTADAQH/MBwGA1UdEQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQG
|
||||
CCsGAQUFBwMBBggrBgEFBQcDAjAKBggqhkjOPQQDAgOBiwAwgYcCQgHhhaUOgf+w
|
||||
KtO4c4wdjh9CTN7L0WNpzlPQKlIU5HovHsQLG9seNpdy7Zsv1JN5BuxBbGwYKJlW
|
||||
tgtYxLxH22SofgJBK9AyLgOBMvOaZVikUX6arcKZvyHxoXBhS+6O3zuceeMStDue
|
||||
ZNrQ71tQe6GwMI+vZnGdQSDP6Jy99TvE/gBDNSQ=
|
||||
c3NsLmNvbYIJALFF/8qNb39ZMAwGA1UdEwQFMAMBAf8wHAYDVR0RBBUwE4ILZXhh
|
||||
bXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAoG
|
||||
CCqGSM49BAMCA4GMADCBiAJCALU+Ql13s0EH8IKxAOnUpxK7U8iOJ7UclIerQQL7
|
||||
EaXObl1rtmHrZqNAeMtxp3f81t+D3QeFPPQyT9J4QTmWfY9HAkIAist3DI9gO0jN
|
||||
VUTxwn2yU9BZRdKJSmf9uGTC+INeF1JNg7R3gXchO4IepDphuqNJMjqvYMVOv3eV
|
||||
Hnshaxw6x8M=
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
Binary file not shown.
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user