Compare commits

...

359 Commits

Author SHA1 Message Date
toddouska
830de9a9fb Merge pull request #3760 from JacobBarthelmeh/Release
prepare for release v4.7.0
2021-02-15 14:29:51 -08:00
toddouska
30462fcf95 Merge pull request #3756 from SparkiDev/sp_math_dh_agree
DH SP math: return key size error with DH Agree
2021-02-15 12:26:04 -08:00
toddouska
917205442b Merge pull request #3757 from SparkiDev/sp_smallstack_fixes
sp_lcm small stack: fix size of temporary
2021-02-15 12:25:13 -08:00
toddouska
888fab501b Merge pull request #3758 from SparkiDev/sp_exch_fix
SP math all: sp_exch fixed up
2021-02-15 12:23:28 -08:00
toddouska
742731a65f Merge pull request #3759 from JacobBarthelmeh/Testing
fix for haproxy and nginx build, remove execute bit on certs
2021-02-15 12:21:56 -08:00
Jacob Barthelmeh
847938f4d6 prepare for release v4.7.0 2021-02-16 02:41:37 +07:00
Jacob Barthelmeh
f4519018eb remove execute bit on smime bundles 2021-02-15 23:33:31 +07:00
Jacob Barthelmeh
0b0f370384 fix for haproxy and nginx build 2021-02-15 22:09:44 +07:00
Sean Parkinson
ba1c67843a Merge pull request #3752 from JacobBarthelmeh/Jenkins
changes from nightly Jenkins test review
2021-02-15 16:32:40 +10:00
JacobBarthelmeh
c5190d1294 Merge pull request #3753 from dgarske/wpas_revert
Fixes for hostapd (revert some configure.ac changes in PR #3289)
2021-02-15 09:45:27 +07:00
Sean Parkinson
e4f8545e36 SP math all: sp_exch fixed up 2021-02-15 10:29:45 +10:00
Sean Parkinson
e187a74b1c sp_lcm small stack: fix size of temporary
Temporary sp_int needs to be allocated to be 1 digit larger than a or b
for the div operation.
Change sp_div to check sizes of r and rem when passed in.
Fix sp_invmod, sp_gcm, sp_submod to use temporary sp_int sizes that work
with calls to sp_div().
2021-02-15 09:48:18 +10:00
Sean Parkinson
4b1c89ab38 DH SP math: return key size error with DH Agree
SP math requires SP to support DH operations.
When SP doesn't support bit size, WC_KEY_SIZE_E must be returned.
2021-02-15 09:04:43 +10:00
Sean Parkinson
505514415d Merge pull request #3748 from JacobBarthelmeh/Testing
always check index into certs
2021-02-15 08:20:28 +10:00
David Garske
98b5900266 Revert of changes in PR #3289, which should not have removed the HAVE_SECRET_CALLBACK and WOLFSSL_PUBLIC_ECC_ADD_DBL. These are required for hostapd. 2021-02-12 14:11:17 -08:00
toddouska
fc005f941c Merge pull request #3750 from embhorn/buffer_conflict
Fix use of 'buffer' in test
2021-02-12 13:59:18 -08:00
Elms
bde1a2209a tests: add include for ecc.h to fix compile error
fix testsuite implicit definition of `wc_ecc_fp_free` with
`./configure --enable-fpecc --enable-ecc --enable-stacksize`
2021-02-13 01:31:01 +07:00
David Garske
f311c9a038 Merge pull request #3751 from SparkiDev/aes_gcm_type
AES-GCM type fixes: internal functions now have word32 type parameters
2021-02-12 10:12:26 -08:00
Jacob Barthelmeh
1c852f60ab fix for g++ build 2021-02-12 23:26:54 +07:00
Jacob Barthelmeh
7e72fafd44 do not turn on FP_64BIT by default on Aarch64 2021-02-12 23:16:04 +07:00
Jacob Barthelmeh
a49c867b38 increase test buffer size for updated pkcs7 bundle 2021-02-12 23:16:04 +07:00
Jacob Barthelmeh
0938a0055d always use MAX_CHAIN_DEPTH for args->certs buffer 2021-02-12 15:18:14 +07:00
Sean Parkinson
3926ccd39b AES-GCM type fixes: internal functions now have word32 type parameters
Lengths were signed int for decrypt while unsigned int for encrypt.
Use word32 across the board.
Also fix AES-NI code on Windows to cast lengths to word64 before
multiplying by 8 to avoid averflow.
2021-02-12 08:30:08 +10:00
Eric Blankenhorn
2ac826c37e Fix use of 'buffer' in test 2021-02-11 15:58:26 -06:00
toddouska
ae073b7ce2 Merge pull request #3741 from elms/test/openssl_distcheck_fix
testing: fix openssl test for `distcheck`
2021-02-11 13:53:09 -08:00
toddouska
81dcf0d28b Merge pull request #3640 from tmael/evp_rsa2
Remove EVP_PKEY_RSA2
2021-02-11 13:51:46 -08:00
toddouska
1283a4d9f0 Merge pull request #3686 from embhorn/zd11571
Fix Free/SafeRTOS with XMALLOC_USER
2021-02-11 13:50:55 -08:00
toddouska
d40ea03621 Merge pull request #3703 from SparkiDev/sp_int_malloc
SP int: Rework allocation of temporaries
2021-02-11 13:49:45 -08:00
toddouska
f0ce6ada0f Merge pull request #3702 from guidovranken/zd11603
Prevent dangling pointer in TLSX_Cookie_Use
2021-02-11 12:31:02 -08:00
toddouska
3eeeb39fb7 Merge pull request #3711 from dgarske/ecc_encrypt_rng
Fix for `--enable-eccencrypt` with timing resistance enabled
2021-02-11 12:28:13 -08:00
toddouska
80b9949052 Merge pull request #3739 from kaleb-himes/FusionRTOS-Porting-R3
Fusion RTOS porting round 3
2021-02-11 12:25:55 -08:00
JacobBarthelmeh
e87e818c6e Merge pull request #3749 from dgarske/zd11624_pkcs11
Fix another PKCS11 case where the ECC key type is not set
2021-02-12 01:36:41 +07:00
toddouska
39cb84de25 Merge pull request #3697 from julek-wolfssl/openvpn-2.5-missing-stuff
OpenVPN master additions
2021-02-11 08:56:45 -08:00
David Garske
f006479645 Fix another PKCS11 case where the ECC key type is not set and causes failures. Broke in PR #3687. 2021-02-11 08:04:58 -08:00
Jacob Barthelmeh
90140fc5a4 always check index into certs 2021-02-11 21:50:51 +07:00
David Garske
d05dc921a7 Merge pull request #3745 from douzzer/enable-reproducible-build 2021-02-11 06:39:28 -08:00
Daniel Pouzzner
d64315a951 configure.ac: add --enable-reproducible-build: put ar and ranlib in deterministic mode, and leave LIBWOLFSSL_CONFIGURE_ARGS and LIBWOLFSSL_GLOBAL_CFLAGS out of the generated config.h. relates to PR #3417 . 2021-02-11 00:12:05 -06:00
Sean Parkinson
b330196c28 SP int: Rework allocation of temporaries
Allocate only as much is as needed.
Use macros to simplify code.
Don't use an sp_int if you can use an array of 'sp_int_digit's.
2021-02-11 10:34:40 +10:00
toddouska
acdc267104 Merge pull request #3718 from SparkiDev/sp_int_fast_nct
SP int: allow faster NCT exptmod to be compiled in
2021-02-10 16:14:39 -08:00
toddouska
032cc1645c Merge pull request #3713 from SparkiDev/tls_def_sess_ticket_cb
TLS Session Ticket: default encryption callback
2021-02-10 16:13:33 -08:00
toddouska
389a5e0301 Merge pull request #3684 from SparkiDev/sp_fixes_5
SP fixes: even mod testing, ECC compilation with SP
2021-02-10 16:10:21 -08:00
toddouska
6983aa9331 Merge pull request #3700 from SparkiDev/sp_math_lshb
SP math lshb: check space for result
2021-02-10 16:01:27 -08:00
toddouska
67b1280bbf Merge pull request #3545 from kabuobeid/smime
Added support for reading S/MIME messages via SMIME_read_PKCS7.
2021-02-10 15:59:32 -08:00
Sean Parkinson
0403f5f18d Merge pull request #3744 from JacobBarthelmeh/Certs
run renewcerts.sh script
2021-02-11 09:43:49 +10:00
Sean Parkinson
5151e1f749 Merge pull request #3715 from JacobBarthelmeh/Testing
openssl x509 small with req cert gen
2021-02-11 09:39:15 +10:00
Sean Parkinson
7efaf14fce Merge pull request #3727 from JacobBarthelmeh/Prime
check prime is prime with ecc compressed keys
2021-02-11 09:22:40 +10:00
Elms
d67934f6b8 scripts: remove use of realpath and fix external.test
`external.test` could fail quietly for not finding `ping.test` for
out-of-tree builds. Make it look relative to the script location.
2021-02-10 14:18:32 -08:00
JacobBarthelmeh
ac96e58928 Merge pull request #3743 from dgarske/zd11624
Fix for copy/paste error for ECC key type
2021-02-11 04:02:54 +07:00
Jacob Barthelmeh
41e5e547c4 run renewcerts.sh script 2021-02-11 03:12:54 +07:00
kaleb-himes
223ba43c2c Add debug message regarding failure 2021-02-10 12:15:43 -07:00
kaleb-himes
9e6ab4ab70 Address indendation, fix return on stub, remove warning 2021-02-10 11:26:29 -07:00
David Garske
c9c4a7ee68 Fix spelling errors. 2021-02-10 10:17:51 -08:00
David Garske
0c75099111 Fix for copy/paste error in PR 3728, which makes sure the ECC key type is specified. 2021-02-10 10:14:31 -08:00
kaleb-himes
4c171524dd Address missed CloseSocket item and revert some white space changes 2021-02-10 09:14:54 -07:00
Elms
9b6f382b2c testing: fix openssl test for distcheck
Previously missed case of cert locations for out-of-tree build. Use
relative path from script location for certificate path
2021-02-10 07:15:22 -08:00
Jacob Barthelmeh
3c0563908f openssl x509 small with req cert gen
add test for build case with x509small and add back in function

adjust macro guard for i2d_X509_NAME implementation

add macro guard on test case
2021-02-10 21:48:29 +07:00
kaleb-himes
7e428f90f2 Revert zero return, to be handled in stand-alone PR 2021-02-10 05:31:57 -07:00
kaleb-himes
15f9902e94 Address new file issue by Jenkins and peer feedback on return val of time 2021-02-10 04:16:34 -07:00
Sean Parkinson
64bc4b663d SP fixes: even mod testing, ECC compilation with SP
Even mod inversion will sometimes work with integer.c.
Don't call SP code to perform ECC ops unless WOLFSSL_HAVE_SP_ECC is
defined.
2021-02-10 14:38:58 +10:00
Sean Parkinson
794cb5c7a9 TLS Session Ticket: default encryption callback
Encrypts with ChaCha20-Poly1305 or AES-GCM.
Two keys in rotation.
Key used for encryption until ticket lifetime goes beyond expirary
(default 1 hour). If key can still be used for decryption, encrypt with
other key.
Private random used to generate keys.
2021-02-10 14:31:54 +10:00
kaleb-himes
89b97a0fbf Implement peer feedback 2021-02-09 18:42:23 -07:00
toddouska
b704c3b3f8 Merge pull request #3693 from SparkiDev/curve448_ppc64
Curve448 PPC64: 'char' is not always signed - use type 'sword8'
2021-02-09 16:08:06 -08:00
toddouska
75d0496f77 Merge pull request #3722 from SparkiDev/sp_clang_fix
test.c: don't check key NULL when not small stack
2021-02-09 16:07:04 -08:00
toddouska
157ad65a6e Merge pull request #3677 from SparkiDev/ecdsa_keep_e
ECDSA: don't modify the e mp_int (hash) value
2021-02-09 16:06:05 -08:00
toddouska
47b2e8342b Merge pull request #3698 from SparkiDev/sp_math_no_asm_fix
SP math: fix one word Montgomery Reduction for non-asm
2021-02-09 16:04:38 -08:00
toddouska
32424f715c Merge pull request #3699 from SparkiDev/sp_ecdsa_vfy_fix
SP ECC verify: check point for z=0 and set to infinity
2021-02-09 16:02:51 -08:00
toddouska
27475291b1 Merge pull request #3733 from SparkiDev/sp_int_mont_red_size
SP int: mont_red - check size of a relative to m
2021-02-09 16:00:24 -08:00
toddouska
ae3706d5e5 Merge pull request #3734 from SparkiDev/sp_int_8_bit
SP int: fixes for 8-bit digits
2021-02-09 15:59:26 -08:00
toddouska
2f47934184 Merge pull request #3735 from SparkiDev/sp_int_32_bit
SP int SP_WORD_SIZE=32: cast down explicitly
2021-02-09 15:56:49 -08:00
toddouska
fc30f379ee Merge pull request #3736 from SparkiDev/sp_int_neg_zero
SP int neg: fix handling of negative zero and mp_cond_copy
2021-02-09 15:48:21 -08:00
kaleb-himes
cfadc7e25a Merge branch 'FusionRTOS-Porting-R3' of https://github.com/kaleb-himes/wolfssl into FusionRTOS-Porting-R3 2021-02-09 16:47:44 -07:00
kaleb-himes
3472191af5 Remove ++ from VisualDSP dir, seems to be causing issues with make dist 2021-02-09 16:39:00 -07:00
toddouska
f63f0ccb94 Merge pull request #3740 from SparkiDev/tls13_one_hrr_sh
TLS 1.3: Only allow one ServerHello and one HelloRetryRequest
2021-02-09 14:59:10 -08:00
Sean Parkinson
ca3c5bf6c4 SP math lshb: check space for result 2021-02-10 08:58:58 +10:00
toddouska
33bfee0f1a Merge pull request #3717 from kaleb-himes/OE11_ACVP
XSTRNCASECMP for OE11 ACVP (CMSIS RTOS)
2021-02-09 14:52:21 -08:00
Sean Parkinson
9792e062c3 SP int: allow faster NCT exptmod to be compiled in
For small builds, this may be needed to get the right performance.
2021-02-10 08:51:32 +10:00
toddouska
9a7aba265a Merge pull request #3716 from kaleb-himes/OE10_ACVP_OE13_ACVP_WPAA
OE10 and OE13 ACVP updates for armv8 PAA
2021-02-09 14:50:42 -08:00
Kaleb Himes
73d7709724 Update comment about location for porting changes. 2021-02-09 15:39:12 -07:00
kaleb-himes
6d23728a56 Fusion RTOS porting round 3 2021-02-09 15:33:06 -07:00
toddouska
250b59f8fd Merge pull request #3688 from julek-wolfssl/correct-cert-free
Use wolfSSL_X509_free to free ourCert
2021-02-09 12:41:12 -08:00
Chris Conlon
012841bba3 Merge pull request #3738 from embhorn/cmp_layer_high
Compatibility layer API
2021-02-09 08:33:41 -07:00
David Garske
47d5f6f624 Merge pull request #3714 from SparkiDev/sp_int_rsavfy 2021-02-09 07:28:40 -08:00
Chris Conlon
71b495c422 Merge pull request #3712 from miyazakh/RND_bytes
handle size greater than RNG_MAX_BLOCK_LEN
2021-02-09 08:26:30 -07:00
Sean Parkinson
5818923762 Merge pull request #3723 from douzzer/AesCcmEncrypt-zero-inSz-null-in
AES-CCM null payload buffers with inSz zero
2021-02-09 17:22:03 +10:00
Daniel Pouzzner
bdd4ceb445 aes.c: fix overwide code text in wc_AesCcmEncrypt(). 2021-02-08 21:50:29 -06:00
Sean Parkinson
4d70d3a3c4 TLS 1.3: Only allow one ServerHello and one HelloRetryRequest 2021-02-09 12:51:53 +10:00
Sean Parkinson
539ef512fc SP int neg: fix handling of negative zero and mp_cond_copy
mp_cond_copy: copy sign when available.
Check for zero and ensure sign is MP_ZPOS.
2021-02-09 11:03:06 +10:00
Kareem Abuobeid
a4e819c60a Added support for reading S/MIME messages via SMIME_read_PKCS7. 2021-02-08 17:14:37 -07:00
Sean Parkinson
763f388471 SP int: get rsavfy and rsapub working again 2021-02-09 09:58:23 +10:00
toddouska
0d499a28e5 Merge pull request #3725 from elms/build/fix_distcheck
build: fix `make distcheck`
2021-02-08 15:57:04 -08:00
Sean Parkinson
3217c7afae Merge pull request #3732 from miyazakh/setverifydepth
issue callback when exceeding depth limit rather than error out
2021-02-09 09:51:45 +10:00
toddouska
f14f1f37d2 Merge pull request #3673 from elms/ssl_api/get_verify_mode
SSL: add support for `SSL_get_verify_mode`
2021-02-08 15:40:19 -08:00
toddouska
58f9b6ec01 Merge pull request #3676 from SparkiDev/tls13_blank_cert
TLS 1.3: ensure key for signature in CertificateVerify
2021-02-08 15:27:05 -08:00
Daniel Pouzzner
7a583d5b4b aesccm_test(): test for (and require) BAD_FUNC_ARG when in or out pointer to wc_AesCcm{En,De}crypt() is null and inSz > 0. 2021-02-08 16:43:38 -06:00
Daniel Pouzzner
b8a019dedd AES-CCM: allow null payload buffers in wc_AesCcmEncrypt() and wc_AesCcmDecrypt() when inSz is zero, and add to aesccm_test() a test for this, tolerating early BAD_FUNC_ARG (for FIPS and arch-specific 3rd party code), and a test for the zero-length string, that must succeed. 2021-02-08 16:34:09 -06:00
David Garske
dda4c3b3c4 Merge pull request #3724 from embhorn/zd11646
Move var declaration to top
2021-02-08 11:09:28 -08:00
Elms
12eddee104 scripts: fix tests for out of tree distcheck
Copying or using certs from directory relative to scripts source directory.
2021-02-08 10:43:31 -08:00
Eric Blankenhorn
6cff3f8488 Adding X509_LOOKUP_ctrl 2021-02-08 12:17:14 -06:00
Eric Blankenhorn
47b9c5b054 Adding X509_STORE_CTX API 2021-02-08 08:25:14 -06:00
Eric Blankenhorn
de47b9d88a Adding X509_VERIFY_PARAM API 2021-02-08 08:25:14 -06:00
Jacob Barthelmeh
812b44d58e guard check on prime with macro WOLFSSL_VALIDATE_ECC_IMPORT 2021-02-08 20:25:01 +07:00
Sean Parkinson
36d124ed2f Merge pull request #3730 from guidovranken/zd11650
SP math: Better error propagation
2021-02-08 14:17:43 +10:00
Sean Parkinson
c3cc36c55f SP int SP_WORD_SIZE=32: cast down explicitly 2021-02-08 13:20:12 +10:00
Sean Parkinson
7986b37aa5 SP int: fixes for 8-bit digits
Fix mask type in mp_cond_copy to be at least 16 bits to handle 'used'
being larger than 8-bit but mp_digit being 8-bit.
When large numbers are used with 8-bit words, mul/sqr partial sums will
overflow a word. Fix implementations to handle this.
2021-02-08 12:24:28 +10:00
Hideki Miyazaki
f13186827a issue callback when exceeding depth limit rather than error out 2021-02-08 11:01:45 +09:00
Sean Parkinson
aefddaf2b8 SP int: mont_red - check size of a relative to m 2021-02-08 10:07:15 +10:00
Jacob Barthelmeh
cced2038b8 conditional compile and check on idx 2021-02-08 06:10:04 +07:00
Guido Vranken
358dbd5090 _sp_exptmod_base_2: Break out of loops on error 2021-02-08 00:09:29 +01:00
Sean Parkinson
2933db8915 Merge pull request #3729 from guidovranken/zd11649
SHA 256,512: Only write hash if no error has occurred
2021-02-08 08:47:51 +10:00
Sean Parkinson
ea4b3110e8 Merge pull request #3728 from dgarske/zd11624
Fix for PKCS11 not properly exporting the public key due to a missing key type field
2021-02-08 08:32:04 +10:00
Guido Vranken
bc707d67c3 SP math: Better error propagation
ZD 11650
2021-02-06 09:09:41 +01:00
Guido Vranken
3fd2647383 SHA 256,512: Only write hash if no error has occurred
ZD 11649
2021-02-06 08:15:30 +01:00
Jacob Barthelmeh
644636e0f8 only check prime value with custom curves 2021-02-06 05:46:19 +07:00
Elms
e26f1529c0 build: revert change so make generates testsuite.test
A change to `include.am` caused `make check` to generate, but `make`
without arguments to not generate it.`
2021-02-05 14:39:07 -08:00
Elms
c17597a4fb build: arbitrary path for make check
To support builds in other directories, unit.test and wolfcrypt test
must be aware of the source and build directory.
2021-02-05 12:10:32 -08:00
David Garske
70b382e6cf Fix for PKCS11 not properly exporting the public key due to a missing key type field. This broke due to changes in PR #3687. Also resolved mismatch of enum types for the key type check. 2021-02-05 11:49:31 -08:00
Jacob Barthelmeh
c2be5dbe2b check prime is prime with ecc compressed keys 2021-02-06 01:54:25 +07:00
Elms
93ea355217 build: fix make distcheck
Need to check if `unit.test` was run from make process and set
different path to run unit test executable.

Writing files in the dist is not allowed during distcheck so write
files to subdirectory used build during distmake
2021-02-05 07:25:07 -08:00
Eric Blankenhorn
e4d79bf49e Move var declaration to top 2021-02-05 08:41:42 -06:00
Sean Parkinson
c4afce76f7 test.c: don't check key NULL when not small stack 2021-02-05 14:57:00 +10:00
kaleb-himes
4ade6eb802 XSTRNCASECMP for OE11 ACVP (CMSIS RTOS) 2021-02-03 16:03:20 -07:00
kaleb-himes
776964f7c7 OE10 and OE13 ACVP updates for armv8 PAA 2021-02-03 15:38:08 -07:00
Hideki Miyazaki
431e1c8ffe handle size greater than RNG_MAX_BLOCK_LEN 2021-02-03 12:23:36 +09:00
David Garske
714aa97490 Merge pull request #3710 from cconlon/0202
fix and update README.md markdown
2021-02-02 16:15:53 -08:00
David Garske
72a8a1069a Fix to only set missing RNG if needed. Resolves unit test, which already sets the RNG on the private key and the incoming context is not provided (use local). 2021-02-02 14:16:21 -08:00
David Garske
04e7fa3657 Fix for --enable-eccencrypt with timing resistance enabled. The ECC shared secret was missing the RNG. Fixes https://github.com/wolfSSL/wolfssl-examples/issues/243 2021-02-02 13:55:42 -08:00
Chris Conlon
7eb71b1bb1 Merge pull request #3344 from guidovranken/PKCS7_EncodeSigned-leak-fix
Check the right size before freeing flatSignedAttribs in PKCS7_EncodeSigned
2021-02-02 13:53:20 -07:00
Guido Vranken
f833d96ba3 Check the right size before freeing flatSignedAttribs in PKCS7_EncodeSigned 2021-02-02 10:15:00 -08:00
Chris Conlon
30c1c4a4f8 fix and update README.md markdown 2021-02-02 10:38:09 -07:00
Juliusz Sosinowicz
542e0d79ec Jenkins Fixes
- explicit conversions
- not all curves available for wolfSSL_CTX_set1_groups_list
- group funcs depend on HAVE_ECC
- `InitSuites` after `ssl->suites` has been set
2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
8a669615f8 Generate correct GCM tag 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
921fd34876 Detect version even if not compiled in 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
69dca4fd08 Rebase fixes
- wolfSSL_CTX_set1_groups_list and wolfSSL_set1_groups_list should use wolfSSL_CTX_set1_groups and wolfSSL_set1_groups respectively because it converts to correct groups representation
- Change to using "SHA1" as main name for SHA1
2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
46821196ab Fix call to wolfSSL_connect when in wolfSSL_connect_TLSv13
If a client is:
- TLS 1.3 capable
- calls connect with wolfSSL_connect_TLSv13
- on an WOLFSSL object that allows downgrading
then the call to wolfSSL_connect should happen before changing state to HELLO_AGAIN. Otherwise wolfSSL_connect will assume that messages up to ServerHelloDone have been read (when in reality only ServerHello had been read).

Enable keying material for OpenVPN
2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
ff43d39015 GCC complains about empty if 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
f5cf24dbdc SHA1 should not be called SHA. Leave alias for compatibility. 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
5d5d2e1f02 Check that curves in set_groups functions are valid 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
c18701ebe7 Implement RFC 5705: Keying Material Exporters for TLS 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
fdde2337a4 Add static buffer to wolfSSL_ERR_error_string
Add ED448 and ED25519 to wolfssl_object_info
Add more error messages
2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
6ed45a23d9 Fix getting cipher suites in compat layer 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
294e46e21a Set options when creating SSL 2021-02-02 12:06:11 +01:00
Juliusz Sosinowicz
3494218d98 Implement missing functionality for OpenVPN 2.5 2021-02-02 12:06:11 +01:00
David Garske
5577a2215f Merge pull request #3708 from JacobBarthelmeh/Testing 2021-02-01 10:11:16 -08:00
David Garske
ab5f9831ab Merge pull request #3707 from douzzer/test-openssl-small-stack
wolfcrypt/test/test.c: smallstack refactor of openssl test routines.
2021-02-01 09:30:04 -08:00
Jacob Barthelmeh
a7066a9be2 add stdint to test.c if using non blocking ecc test 2021-02-01 23:07:03 +07:00
Jacob Barthelmeh
fd01f79f86 add guard for rsa public only 2021-01-31 23:43:53 +07:00
Daniel Pouzzner
d14f4f8451 wolfcrypt/test/test.c: smallstack refactor of openssl test routines. 2021-01-30 00:01:15 -06:00
David Garske
f5f19fda42 Merge pull request #3704 from douzzer/aesgcm-table-small-stack
--enable-aesgcm=table --enable-smallstack
2021-01-29 19:53:08 -08:00
Daniel Pouzzner
d0b20f90d5 wolfcrypt/test/test.c: use HEAP_HINT, not NULL, for XREALLOC() too. 2021-01-29 20:16:51 -06:00
Daniel Pouzzner
8c0100e60e blake2b.c/blake2s.c: refactor so that smallstack code paths match performance of !smallstack path. 2021-01-29 17:19:42 -06:00
Daniel Pouzzner
a332cf36b5 add DYNAMIC_TYPE_AES and DYNAMIC_TYPE_CMAC to enum in types.h, and use these where appropriate;
in test.c: use use HEAP_HINT, not NULL in XMALLOC/XFREE calls;

fix a couple typos in aes_test() re WOLFSSL_ASYNC_CRYPT;

add various missing WOLFSSL_SMALL_STACK_STATIC qualifiers;

and streamline old smallstack refactor on-stack declarations declarations to use the much neater [1] construct.
2021-01-29 17:17:31 -06:00
David Garske
eae4124908 Merge pull request #3705 from lechner/repology-packaging-status
Show packaging status across Linux distributions in README.md
2021-01-29 14:48:26 -08:00
Felix Lechner
2033970369 Show packaging status across Linux distributions in README.md (from Repology)
Repology offers badges for wolfSSL's packaging status across all known
Linux distributions. [1] In Markdown documents, the HTML version with
a right-hand alignment uses up less space. It is added here.

The badge itself provides a hyperlink to more information [2]
including repositories in which wolfSSL is not yet represented.

[1] https://repology.org/project/wolfssl/badges
[2] https://repology.org/project/wolfssl/versions
2021-01-29 10:40:32 -08:00
Daniel Pouzzner
0f6ae330da wolfcrypt: smallstack refactors of AES code for lkm compatibility with --enable-aesgcm=table. 2021-01-28 22:51:28 -06:00
Sean Parkinson
91299c5abd Merge pull request #3701 from dgarske/pkcs7_devId
Fixes for PKCS7 with crypto callback (devId) with RSA and RNG
2021-01-29 10:56:41 +10:00
David Garske
4f6deb8ae9 Merge pull request #3594 from haydenroche5/zd10911
Fix issue with DoHandShakeMsgType/ShrinkInputBuffer when encryption i…
2021-01-28 16:55:04 -08:00
Hayden Roche
fc845da9f0 Fix issue with DoHandShakeMsgType/ShrinkInputBuffer when encryption is on (e.g.
during renegotiation).

This issue was brought to light by ZD 10911. When encryption is on (indicated
by the return value of IsEncryptionOn), DoHandShakeMsgType will finish up by
incrementing the input buffer index past the padding and MAC (if encrypt-then-
mac is enabled). In ProcessReply, if there are more messages to be read, the
index is decremented back before the padding and MAC. The issue arises when
ShrinkInputBuffer is called in between and copies data from the dynamic input
buffer to the static one. That function will get called with the index post-
increment, and thus the padding and MAC won't get copied into the static buffer,
which isn't what we want, since ProcessReply is going to decrement the index
since it thinks the padding and MAC are still there. This commit makes it so
the padding and MAC get included in the call to ShrinkInputBuffer when
encryption is on.
2021-01-28 15:37:00 -06:00
Guido Vranken
3da6b8364e Prevent dangling pointer in TLSX_Cookie_Use
ZD 11603
2021-01-28 18:53:35 +01:00
David Garske
2bd63d27bf Fixes for PKCS7 with crypto callback (deviceId), where it was not being used for RSA and RNG. ZD 11163. 2021-01-28 09:52:13 -08:00
David Garske
311a0d25dd Merge pull request #3696 from JacobBarthelmeh/Testing
fix for tested x509 small build
2021-01-28 06:59:26 -08:00
Sean Parkinson
590597a0e2 SP ECC verify: check point for z=0 and set to infinity 2021-01-28 14:43:51 +10:00
Sean Parkinson
0ccb0d5fce SP math: fix one word Montgomery Reduction for non-asm
Set the word size for x86.
2021-01-28 09:54:58 +10:00
Jacob Barthelmeh
bbcb98a8f7 fix for tested x509 small build 2021-01-27 23:00:24 +07:00
Sean Parkinson
7486cad291 Curve448 PPC64: 'char' is not always signed - use type 'sword8'
Ensure type 'sword8' is signed.
2021-01-27 18:16:25 +10:00
Sean Parkinson
c739b4d474 ECDSA sign: cleanup comments and variables
Remove mod at end as mulmod does this.
Change mp_add to mp_addmod_ct to keep the size of numbers to less than
order for mp_mulmod.
2021-01-27 09:39:11 +10:00
John Safranek
a1e083b5b1 Merge pull request #3689 from douzzer/fips-option-check-source
configure.ac: check compatibility of chosen FIPS option with source
2021-01-26 12:29:52 -08:00
John Safranek
d0e2566ad8 Merge pull request #3679 from julek-wolfssl/dtls-window
Correct old DTLS msg rcv update
2021-01-26 12:20:59 -08:00
Juliusz Sosinowicz
3d4f836c00 Correctly insert out of order msgs to queue 2021-01-26 15:12:08 +01:00
Juliusz Sosinowicz
4da9ade290 Use wolfSSL_X509_free to free ourCert 2021-01-26 11:32:05 +01:00
Daniel Pouzzner
a89087ed2d configure.ac: check compatibility of chosen FIPS option with the source tree, for early prevention of accidental attempts to build FIPS with non-FIPS source, or non-FIPS with FIPS source. 2021-01-25 17:56:28 -06:00
toddouska
6e0e507dad Merge pull request #3660 from dgarske/sess_ticket_aes_gcm
Added support for AES GCM session ticket encryption
2021-01-25 15:00:03 -08:00
toddouska
f91dcb950c Merge pull request #3670 from dgarske/keil
Fix for ARM Keil MDK compiler issue with `DECLARE_VAR_INIT`.
2021-01-25 14:57:05 -08:00
toddouska
27ef5b9a3d Merge pull request #3675 from SparkiDev/tls_no_ticket
TLS Session Ticket: Option to disable for TLS 1.2 and below
2021-01-25 14:54:10 -08:00
toddouska
f35f57c378 Merge pull request #3683 from SparkiDev/sp_int_mont_red_1
SP math all: fix 1 word Montgomery Reduce
2021-01-25 14:47:35 -08:00
toddouska
d201820e3a Merge pull request #3687 from guidovranken/x963-export-reject-invalid-keys
Reject undefined keys (eg. state is ECC_STATE_NONE) from X963 export …
2021-01-25 14:46:59 -08:00
toddouska
cf9e4f0caf Merge pull request #3518 from julek-wolfssl/openssh-fixes-v2
Fixes for openssh
2021-01-25 14:45:56 -08:00
Elms
234bf0c209 SSL: add const for *get_verify_mode to match openSSL 2021-01-25 10:37:50 -08:00
Elms
a2917ae29c SSL: cleanup verify_mode coding style 2021-01-25 10:29:36 -08:00
David Garske
05e1ee1694 Cleanup to use fixed sizes from defines for DECLARE_VAR. Resolves issue with Visual Studio and using a variable (even const) to declare an array size. 2021-01-25 09:14:12 -08:00
Guido Vranken
29f7eebef7 Reject undefined keys (eg. state is ECC_STATE_NONE) from X963 export functions
Additionally, harmonize the failure conditions of wc_ecc_export_x963 and
wc_ecc_export_x963_compressed.
2021-01-25 16:22:21 +01:00
Eric Blankenhorn
f7408560c6 Fix Free/SafeRTOS with XMALLOC_USER 2021-01-25 09:10:15 -06:00
Sean Parkinson
4f0ed55232 SP math all: fix 1 word Montgomery Reduce
May have 3 words in partial result before shifting down.
2021-01-25 10:19:27 +10:00
David Garske
fb9836ed28 Merge pull request #3678 from guidovranken/zd11556
Fix wc_ecc_sign_hash memory leak. ZD 11556.
2021-01-22 18:06:56 -08:00
Tesfa Mael
d29518ecac Remove duplicate macro 2021-01-22 13:02:30 -08:00
Elms
21ac86adb3 SSL: refactor SSL verify mode to be more compatible
This follows the bit flag pattern closer. Still doesn't support
`SSL_VERIFY_CLIENT_ONCE` and maybe other flags.
2021-01-22 12:17:07 -08:00
David Garske
13468d34e3 Apply same VS fixes to api.c as well. 2021-01-22 10:50:18 -08:00
David Garske
46aee19de3 Fix for Visual Studio issue with non-cost in array declaration. 2021-01-22 10:44:38 -08:00
toddouska
920c443864 Merge pull request #3250 from JacobBarthelmeh/Benchmark
add brainpool benchmark
2021-01-22 10:08:21 -08:00
David Garske
cd4dae8f09 Merge pull request #3674 from ejohnstown/alerts
Alerts
2021-01-22 09:16:56 -08:00
Juliusz Sosinowicz
b918fb9efe Correct old DTLS msg rcv update 2021-01-22 14:33:33 +01:00
Jacob Barthelmeh
6fa1556daf guard -ecc-all with HAVE_SELFTEST macro 2021-01-22 16:13:31 +07:00
Guido Vranken
905f0b1f5a Fix wc_ecc_sign_hash memory leak. ZD 11556. 2021-01-22 09:55:30 +01:00
Sean Parkinson
a84f1c813a TLS Session Ticket: Option to disable for TLS 1.2 and below
Customer may want session ticket supported with TLS 1.3 but not TLS 1.2
and below.
2021-01-22 13:19:29 +10:00
Sean Parkinson
9c34ecc130 ECDSA: don't modify the e mp_int (hash) value
Multiple loops of generating signatures require the same e value.
2021-01-22 12:51:21 +10:00
Sean Parkinson
fad1e67677 TLS 1.3: ensure key for signature in CertificateVerify 2021-01-22 11:54:53 +10:00
David Garske
9012317f5b Fix copy/paste typo. 2021-01-21 17:41:11 -08:00
David Garske
1ee40ad7bd Fix to always init the variable (not just when from heap). Cleanup of the DECLARE_ uses to make sure all allocations succeeded. 2021-01-21 17:12:29 -08:00
John Safranek
6f21995ec5 Alerts
Expand the guard around sending the PSK identity alert with a more limited option than enabling it with all the other alerts.
2021-01-21 16:42:54 -08:00
David Garske
4b47bf7b4e Merge pull request #3090 from lechner/utf8
Convert a header file to UTF-8 encoding.
2021-01-21 16:32:27 -08:00
David Garske
2017de1b0f Merge pull request #3617 from haydenroche5/cmake_user_settings
Add support for user settings to CMake.
2021-01-21 16:21:55 -08:00
David Garske
07f459b8d7 Merge pull request #3650 from kojo1/RsaSetRNG
add wc_RsaSetRNG to doc
2021-01-21 16:21:00 -08:00
David Garske
830b3cb676 Merge pull request #3653 from kojo1/fopen_binMode
binary mode, fopen
2021-01-21 16:20:07 -08:00
David Garske
aa64a8e835 Merge pull request #3672 from embhorn/zd11547
Fix FIPS compile errors
2021-01-21 16:08:53 -08:00
Elms
95d83c9856 SSL: refactor to allow session override or mode 2021-01-21 16:03:02 -08:00
toddouska
1acd6dfab2 Merge pull request #3635 from SparkiDev/hmac_openssl_fix
HMAC OpenSSL API: initialise HMAC ctx on new and allow key length of 0
2021-01-21 15:57:30 -08:00
toddouska
a8cfc23683 Merge pull request #3642 from SparkiDev/ecdsa_set_k_one_loop
ECDSA set k: WOLFSSL_ECDSA_SET_K_ONE_LOOP only tries k and fails when…
2021-01-21 15:56:36 -08:00
toddouska
5837d5e8de Merge pull request #3649 from dgarske/stm_aesgcm_perf
STM32 AES GCM crypto hardware performance improvements
2021-01-21 15:55:58 -08:00
toddouska
85f08466f9 Merge pull request #3655 from SparkiDev/ext_cache_sess
SESSION: internal cache sessions can't be freed same as external
2021-01-21 15:54:16 -08:00
toddouska
e9e96dff6a Merge pull request #3662 from embhorn/gh3659
Check method for NULL
2021-01-21 15:50:58 -08:00
toddouska
7b12dddf75 Merge pull request #3666 from SparkiDev/tls13_tick_before_group
TLS 1.3: don't group and wait on send session ticket
2021-01-21 15:49:52 -08:00
toddouska
22e6d52b7b Merge pull request #3667 from SparkiDev/sp_fixes_4
SP int: fix _sp_mul_d inclusion checks
2021-01-21 15:49:03 -08:00
toddouska
b825e51d23 Merge pull request #3664 from SparkiDev/sp_math_all_ppc64
SP math all: Fixes for PPC64 compiler
2021-01-21 15:48:34 -08:00
toddouska
848ae3e514 Merge pull request #3668 from SparkiDev/jenkins_fixes_2
Compress: fix unused vars
2021-01-21 15:46:30 -08:00
toddouska
344ad2a3f8 Merge pull request #3625 from SparkiDev/disable_alg_fix
Disable algs: fix code to compile with various algs off/on
2021-01-21 15:45:29 -08:00
John Safranek
fe7be3e15f Alerts
Alerts the server sends between receiving the client's CCS message and before it sends its own CCS message should not be encrypted.
2021-01-21 14:48:10 -08:00
Elms
7112a6dd78 SSL: add test and fix SSL_get_verify_mode 2021-01-21 14:20:27 -08:00
David Garske
fbe5fe1945 Merge pull request #3669 from embhorn/gh3657
Protect use of globalRNG
2021-01-21 14:09:59 -08:00
Elms
af3d842663 SSL: add support for SSL_get_verify_mode 2021-01-21 13:45:20 -08:00
John Safranek
3e4c3d13fe Merge pull request #3671 from julek-wolfssl/dtls-scr-2
DTLS secure renegotiation fixes
2021-01-21 13:37:05 -08:00
Eric Blankenhorn
fd8527c15e Fix FIPS compile errors 2021-01-21 15:27:42 -06:00
Jacob Barthelmeh
b418936f72 account for FIPS and g++ builds 2021-01-22 04:21:23 +07:00
Jacob Barthelmeh
177f4aecb6 add all curves to benchmark 2021-01-22 03:20:41 +07:00
Jacob Barthelmeh
e3fa462d72 add brainpool benchmark of key generation 2021-01-22 02:55:26 +07:00
JacobBarthelmeh
fe37137f12 add brainpool benchmark 2021-01-22 02:44:11 +07:00
Juliusz Sosinowicz
d8a01c6f8b DTLS: client re-send on duplicate HelloRequest as well 2021-01-21 12:45:16 +01:00
Juliusz Sosinowicz
969de38764 Reset dtls_start_timeout on a timeout 2021-01-21 12:45:16 +01:00
Juliusz Sosinowicz
774fdc9fd6 Free HS data on rehandshake
When we call _Rehandshake before we receive application data and the receive application data during the renegotiation process then it is possible for the send queue to be preemptively deleted
2021-01-21 12:45:16 +01:00
David Garske
17f101ef13 Fix for ARM Keil MDK compiler issue with DECLARE_VAR_INIT. 2021-01-20 16:57:30 -08:00
Eric Blankenhorn
02114e7739 Protect use of globalRNG 2021-01-20 16:30:18 -06:00
Eric Blankenhorn
a3cbcf255f Fix from review 2021-01-20 11:34:02 -06:00
David Garske
57b06f700d Merge pull request #3656 from haydenroche5/windows_rsa_public_decrypt
Allow wolfSSL_RSA_public_decrypt on Windows.
2021-01-20 09:09:49 -08:00
Hayden Roche
12abb5191d Allow wolfSSL_RSA_public_decrypt on Windows. 2021-01-20 06:57:59 -06:00
Sean Parkinson
55be60a63e Compress: fix unused vars
configure: C_EXTRA_FLAGS="-fdebug-types-section -g1" --disable-memory
--enable-mcapi --enable-ecc --enable-sha512 --with-libz
2021-01-20 13:09:43 +10:00
Sean Parkinson
e3182ff06e SP int: fix _sp_mul_d inclusion checks
configuration: --disable-asn --disable-filesystem --disable-shared --enable-cryptonly --enable-sp=smallrsa2048 --enable-sp-math --disable-dh --disable-ecc --disable-sha224 --enable-rsavfy --enable-rsapss
2021-01-20 12:38:10 +10:00
Sean Parkinson
7ec8d70eee TLS 1.3: don't group and wait on send session ticket
The state machine goes on and frees the handshake resources which frees
the digest for the client Finished message.
2021-01-20 10:57:37 +10:00
David Garske
9044f709c1 Add support for STM32_AESGCM_PARTIAL build option to speedup platforms that allow AAD header sizes that are not a multiple of 4 bytes. ZD 11364. 2021-01-19 13:54:53 -08:00
David Garske
ea5af87de3 Revert of uint32_t and uint8_t changes in PR #3658, which caused warnings. 2021-01-19 13:54:26 -08:00
David Garske
9ea5041d9d Benchmark for GMAC (AES GCM GHASH). 2021-01-19 13:42:25 -08:00
John Safranek
eaa1bc1ace Merge pull request #3595 from julek-wolfssl/dtls-only-resend-on-timeout
Only resend previous flight on a timeout from the network layer
2021-01-19 10:43:13 -08:00
David Garske
59305e9346 Fix for new include to pull in the AES GCM IV sizes in FIPS mode. 2021-01-19 07:53:36 -08:00
David Garske
8d1d616b39 Cleanup for the AES GCM IV and CCM IV sizes, which are missing with some FIPS builds. 2021-01-19 07:53:36 -08:00
David Garske
219cbd47eb Added support for AES GCM session ticket encryption. If ChaCha/Poly is disabled it will use AES GCM. Thanks Sean for the code in ZD 11511. 2021-01-19 07:53:36 -08:00
Sean Parkinson
523119289b SP math all: Fixes for PPC64 compiler 2021-01-19 21:30:36 +10:00
David Garske
209c4c08e1 Merge pull request #3663 from SparkiDev/sp_int_fixes_3
SP int: make sp_copy more available
2021-01-18 22:02:34 -08:00
Sean Parkinson
7d869a43b4 ECDSA set k: WOLFSSL_ECDSA_SET_K_ONE_LOOP only tries k and fails when it fails 2021-01-19 14:07:03 +10:00
Sean Parkinson
949af909bf SP int: make sp_copy more available 2021-01-19 11:01:00 +10:00
Sean Parkinson
6a5e802cc4 Disable algs: fix code to compile with various algs off/on
benchmark.c: Only X25519/Ed25519/X448/Ed448 now compiles
asn.c/asn.h: Only DSA now compiles
2021-01-19 09:54:21 +10:00
toddouska
a13e9bde29 Merge pull request #3599 from julek-wolfssl/nginx-mem-leak
Fix memory leaks
2021-01-18 15:31:50 -08:00
toddouska
5b7e6ccc14 Merge pull request #3613 from SparkiDev/sp_rand_prime_len
SP rand_prime: fix length check
2021-01-18 15:23:15 -08:00
toddouska
279c3f4c1b Merge pull request #3614 from SparkiDev/aes_test_fix
AES test: Remove unneeded loop
2021-01-18 15:22:06 -08:00
toddouska
78d2b3b440 Merge pull request #3616 from SparkiDev/sp_int_funcs
SP int: Hide func decls if only available with WOLFSSL_SP_MATH_ALL
2021-01-18 15:21:39 -08:00
toddouska
267b00e0a2 Merge pull request #3620 from haydenroche5/zd11434
Clamp the normalization value at the end of sp_mont_norm.
2021-01-18 15:21:03 -08:00
toddouska
85faf974aa Merge pull request #3621 from SparkiDev/sp_mac_arm64
SP arm64 MAC: stop non-ct mod inv from using x29
2021-01-18 15:19:46 -08:00
toddouska
87a0ee5ef4 Merge pull request #3622 from SparkiDev/sp_int_fixes_2
SP math all: doco fix and don't assign 0 to o
2021-01-18 15:19:06 -08:00
toddouska
4b5d7d0595 Merge pull request #3624 from SparkiDev/tls13_set_groups
TLS 1.3 key share: add a key share from supported list
2021-01-18 15:18:14 -08:00
toddouska
8ae609d078 Merge pull request #3626 from SparkiDev/tls13_middlebox_fix
TLS send change cipher: Don't set keys when negotiating TLS 1.3
2021-01-18 15:14:58 -08:00
toddouska
1e9394d5a8 Merge pull request #3627 from elms/EVP/ofb_rc4_size
EVP: return proper cipher type and block size
2021-01-18 15:13:55 -08:00
Eric Blankenhorn
50843b22cd Check method for NULL 2021-01-18 16:18:49 -06:00
toddouska
563e3c6b60 Merge pull request #3628 from SparkiDev/even_mp_test
RSA/DH test: even number error check fixup
2021-01-18 13:39:54 -08:00
toddouska
cd78a5dfb2 Merge pull request #3630 from SparkiDev/no_fs_all
X509 API no file system: hide wolfSSL_X509_NAME_print_ex_fp
2021-01-18 13:39:21 -08:00
toddouska
d514cc31b3 Merge pull request #3631 from SparkiDev/rsa_vfy_only_sp_fixes
RSA: verify only build fixes
2021-01-18 13:38:52 -08:00
toddouska
5a7e79cbfd Merge pull request #3632 from SparkiDev/all_not_tls13_fix
Configuration: enable all, disable TLS 1.3 - turn off TLS 1.3 only op…
2021-01-18 13:37:34 -08:00
toddouska
3bae6e2dc2 Merge pull request #3633 from SparkiDev/ecc_gen_z_fix
ECC gen z: convert blinding value to Montgomery form before using
2021-01-18 13:36:13 -08:00
toddouska
fff3c77568 Merge pull request #3644 from dgarske/zd11476
Fix for sniffer with TLS v1.2 static ECDH ciphers
2021-01-18 13:32:57 -08:00
toddouska
b1c8825e74 Merge pull request #3647 from dgarske/zd11424
Fix for TLS v1.3 early data mac digest
2021-01-18 13:31:44 -08:00
toddouska
67d4f7c37b Merge pull request #3658 from SparkiDev/curve25519_uint64_t
Curve25519: replace uint64_t with word64
2021-01-18 13:29:16 -08:00
Sean Parkinson
ac76ef8ee7 Curve25519: replace uint64_t with word64
Remove usages of stdint.h types
Added a sword type for signed words.
2021-01-18 17:30:36 +10:00
Sean Parkinson
eda1b52ee2 TLS 1.3 integrity only: initialize HMAC
Ensure the HMAC object is initialized when allocated.
2021-01-15 11:27:26 +10:00
Sean Parkinson
878f797a2b SESSION: internal cache sessions can't be freed same as external
refMutex is initialized for external sessions but not internal.
Differentiate by ensuring the refCount is always 1 or more for external
and 0 for internal.
2021-01-15 11:02:34 +10:00
John Safranek
0ac43bb095 Merge pull request #3618 from haydenroche5/ocsp_self_signed_issue
Modify ParseCertRelative to ensure issuerKeyHash gets parsed and copi…
2021-01-14 14:22:06 -08:00
Takashi Kojo
d72f0a50f4 binary mode fopen to avoid auto expand to CR/LF on Widonws 2021-01-15 06:05:55 +09:00
Takashi Kojo
e21fddf553 add wc_RsaSetRNG to doc 2021-01-14 10:42:49 +09:00
Sean Parkinson
5a4dfc1a29 Don't set encrypt side if sending early data
Make check to see if early data has been or is going to be sent.
Last message encrypted with this key is EndOfEarlyData message.
2021-01-14 09:44:09 +10:00
David Garske
22ce25afba Merge pull request #3648 from douzzer/disable-ecc-enable-dsa
--disable-ecc --enable-dsa
2021-01-13 14:00:20 -08:00
Daniel Pouzzner
1e49bc2e82 asn.c/asn.h: fix --disable-ecc --enable-dsa. 2021-01-13 13:55:06 -06:00
David Garske
d7aa8e1795 Fix for issue where mac digest changes between early data and server_hello, which can leave section of response uninitialized. ZD11424 2021-01-13 11:10:12 -08:00
Sean Parkinson
382deb1f86 Merge pull request #3645 from douzzer/sp_copy_pedantic_error_handling
sp_copy() pedantic error handling
2021-01-13 10:05:35 +10:00
Daniel Pouzzner
f8013580df sp_int.c: fix 4 instances of "Value stored to 'o' is never read" found by LLVM9 scan-build. 2021-01-12 15:01:28 -06:00
Daniel Pouzzner
fb82114866 sp_int.c: pay attention to the return value from sp_copy(), for general hygiene and to eliminate an inlining-related warning in sp_todecimal(). 2021-01-12 14:58:29 -06:00
David Garske
aaec9832e4 Fix for sniffer with TLS v1.2 static ECDH ciphers. The sniffer will now correctly try using the key for ECC if the RSA key decode fails. ZD 11476. 2021-01-12 09:49:32 -08:00
Sean Parkinson
129f3fd13f HMAC OpenSSL API: initialise HMAC ctx on new and allow key length of 0 2021-01-12 09:16:24 +10:00
Elms
8fec1de07c EVP: address CTR block size 2021-01-11 12:03:01 -08:00
Elms
3b07f5d8e3 EVP: expand tests for EVP_CIPHER_block_size 2021-01-11 12:03:01 -08:00
Elms
a6535528f3 EVP: add tests for openssl block size (including RC4) 2021-01-11 12:03:01 -08:00
Elms
0cccf58fec EVP: return proper cipher type for AES OFB 2021-01-11 12:03:01 -08:00
David Garske
88faef9bd9 Merge pull request #3641 from JacobBarthelmeh/Testing
add ca-cert-chain.der to renewcerts.sh, update ed25519 certs and gen …
2021-01-11 11:00:55 -08:00
Jacob Barthelmeh
e2b411805d add ca-cert-chain.der to renewcerts.sh, update ed25519 certs and gen script 2021-01-12 00:40:15 +07:00
Hayden Roche
a3cc4110b0 Clamp the normalization value at the end of sp_mont_norm. 2021-01-11 09:59:11 -06:00
Hayden Roche
798d9ed0d5 Various CMake changes.
- Add support for user settings to CMake.
- Update version number.
- Add an option to enable/disable generation of config.h and the HAVE_CONFIG_H
  define.
2021-01-08 12:15:58 -06:00
Juliusz Sosinowicz
a745947498 Code review changes 2021-01-08 15:27:30 +01:00
Juliusz Sosinowicz
23a4d64caf wolfSSL_EVP_PKEY_set1_EC_KEY should generate PKCS8 internal DER buffer
This PKCS8 buffer should include both the private and the public parts of the key.
2021-01-08 15:27:30 +01:00
Juliusz Sosinowicz
cd4affddac Set ecc_key.rng when using ECC_TIMING_RESISTANT
Set ecc_key.rng to either a local rng struct or the globalRNG object when using ECC_TIMING_RESISTANT
Add helpful logs to some ecc functions
2021-01-08 15:18:00 +01:00
Juliusz Sosinowicz
0fe3efb8b4 Add option to only resend previous DTLS flight on a network read timeout 2021-01-07 19:13:35 +01:00
Chris Conlon
c57fee136a Merge pull request #3568 from miyazakh/espidf_unittest
fix wolfssl unit test on ESP-IDF
2021-01-07 09:18:18 -07:00
Sean Parkinson
f955c92008 ECC gen z: convert blinding value to Montgomery form before using 2021-01-07 11:30:58 +10:00
David Garske
209ad82df2 Merge pull request #3629 from ejohnstown/aarch64
M1 Support
2021-01-06 14:12:45 -08:00
David Garske
931dc5b29f Merge pull request #3619 from tmael/fuzz_math
Fix for OSS-Fuzz issue #29103: out-of-bounds read in TLSX_CSR_Parse()
2021-01-06 14:10:28 -08:00
John Safranek
d4e13796c2 M1 Support
We separate out 64-bit desktop support based on the Intel check. With
the advent of the new Apple chip, ARM can also be a desktop processor.
Detect it like we do the Intel 64-bit, and treat it similarly with
respect to fast and normal math.
2021-01-06 09:21:07 -08:00
Sean Parkinson
fa86c1aa91 Configuration: enable all, disable TLS 1.3 - turn off TLS 1.3 only options
configuration: --enable-all --disable-tls13
Post-handshake authentication and HRR cookie are enable with
'--enable-all' but disabling TLS 1.3 caused configure to fail.
Don't enable these TLS 1.3 only options when TLS 1.3 is disabled.

Also fix up tests that don't work without TLS 1.3 enabled.
2021-01-06 14:19:57 +10:00
Sean Parkinson
cd0670cbd7 RSA: verify only build fixes
configuration: --disable-ecc --disable-dh --disable-aes --disable-aesgcm
--disable-sha512 --disable-sha384 --disable-sha --disable-poly1305
--disable-chacha --disable-md5 --disable-sha3 --enable-cryptonly
--disable-inline --enable-rsavfy --disable-asn --disable-oaep
--disable-rng --disable-filesystem --enable-sp=rsa2048 --enable-sp-math
Fixes to make code build again.
2021-01-06 11:58:15 +10:00
Sean Parkinson
5accd57c21 X509 API no file system: hide wolfSSL_X509_NAME_print_ex_fp
configuration: --enable-all --disable-filesystem
wolfSSL_X509_NAME_print_ex_fp has XFILE as a parameter and cannot be
compiled with --disable-filesystem
2021-01-06 11:05:58 +10:00
Sean Parkinson
10722fba14 RSA/DH test: even number error check fixup
Configuration: --enable-sp=3072
Test only enabled when SP is used.
Return codes checked are those we expect from SP.
Code, with configuration, is compiled so that 2048-bit operations are
not going to SP and the error returns were not correct.
2021-01-06 09:39:24 +10:00
Hideki Miyazaki
b8997d0b47 revert test_wolfssl.c changes
add test.c as src target
2021-01-05 16:20:42 +09:00
Hideki Miyazaki
99d4a7417a fix wolfssl unit test on ESP-IDF 2021-01-05 16:08:05 +09:00
Sean Parkinson
a6b69b6864 TLS send change cipher: Don't set keys when negotiating TLS 1.3 2021-01-05 14:32:48 +10:00
Sean Parkinson
f196c60c66 TLS 1.3 key share: add a key share from supported list 2021-01-05 13:08:48 +10:00
Sean Parkinson
1b94309a6c SP math all: doco fix and don't assign 0 to o
o is not used after that point so no need to zero it.
2021-01-05 10:40:34 +10:00
Sean Parkinson
2a2b194d71 SP arm64 MAC: non-ct mod inv not use so many registers 2021-01-05 10:23:14 +10:00
Tesfa Mael
46e260dd61 Correct unsigned arithmetic 2021-01-04 15:48:27 -08:00
Chris Conlon
54f072fd8d Merge pull request #3607 from douzzer/WOLFSSL_TEST_SUBROUTINE
test.c: add WOLFSSL_TEST_SUBROUTINE macro to make subtests optionally static
2021-01-04 10:10:56 -07:00
Hayden Roche
96ece3ac7d Modify ParseCertRelative to ensure issuerKeyHash gets parsed and copied into the
decoded cert for self-signed CA certs.

The bit of code that does this copy was previously inside a conditional that's
only entered if the certificate is not self-signed. The primary purpose of this
conditional is to set the maxPathLen field. It's possible that the copying of
the issuerKeyHash was mistakenly included in the "else" block here, when it
should be outside.
2021-01-04 10:34:09 -06:00
Sean Parkinson
b5403fe6b9 SP int: Hide func decls if only available with WOLFSSL_SP_MATH_ALL 2021-01-04 16:39:51 +10:00
Sean Parkinson
413bde9146 Merge pull request #3608 from tmael/sp_squre
Fix SP integer square
2021-01-04 16:29:40 +10:00
Sean Parkinson
faf7d307b4 Merge pull request #3606 from dgarske/zd11438
Fix for possible ECC sign memory leak with custom "k"
2021-01-04 15:39:53 +10:00
Tesfa Mael
01c27068c1 Correct SP x->used with sp_clamp() 2021-01-03 20:08:06 -08:00
Sean Parkinson
68c2e36ad5 AES test: Remove unneeded loop 2021-01-04 12:43:34 +10:00
Sean Parkinson
40ab08be45 SP rand_prime: fix length check
-ve length indicates to use a BBS prime (last two bits set)
2021-01-04 12:31:59 +10:00
John Safranek
ef56bc09f1 Merge pull request #3596 from julek-wolfssl/dtls-multiple-hellorequest
Calling wolfSSL_Rehandshake during renegotiation should not be an error
2020-12-31 13:53:32 -08:00
David Garske
fbb3e9fca3 Merge pull request #3605 from tmael/cm_free
Free mutex and fix tls13.test script
2020-12-31 08:40:35 -08:00
David Garske
c9ac64d77d Merge pull request #3609 from douzzer/lkm_kvmalloc
use kvmalloc()/kvfree() for heap allocations in the linuxkm build
2020-12-31 08:37:53 -08:00
Daniel Pouzzner
9dc8721032 linuxkm: on kernels >= 4.12, use kvmalloc()/kvfree() and a partial implementation of realloc() leveraging them, rather than kmalloc()/kfree()/krealloc(). this makes large allocations possible and relatively safe. note that the realloc() implementation fails gracefully when the supplied pointer is larger than the page size, but otherwise works normally. 2020-12-31 00:30:35 -06:00
Daniel Pouzzner
a2dec7ce9c test.c: work around toolchain/ecosystem bug on aarch64 linux 4.14.0-xilinx-v2018.3. 2020-12-30 20:03:13 -06:00
Tesfa Mael
9598c03716 Free mutex and fix test script 2020-12-30 17:40:15 -08:00
Daniel Pouzzner
3d88676ff1 test.c: add WOLFSSL_TEST_SUBROUTINE macro to qualify all previously global subtest handlers, defaulting to the empty string. this restores the version<=4.5 test.c namespace allowing end users to call the tests directly piecemeal. --enable-linuxkm[-defaults] sets -DWOLFSSL_TEST_SUBROUTINE=static for extra namespace hygiene. 2020-12-30 16:12:08 -06:00
David Garske
060ebd1ca2 Fix for possible ECC sign memory leak when using WOLFSSL_ECDSA_SET_K and wc_ecc_sign_set_k, where the k is not valid. ZD 11438. 2020-12-30 09:54:54 -08:00
David Garske
7fb2c0f63f Merge pull request #3603 from haydenroche5/zd11434
Ensure that all leading zeros are skipped in sp_tohex.
2020-12-30 08:28:52 -08:00
David Garske
1b6a988dc0 Merge pull request #3601 from tmael/mp_rand_p
Add parameter check in sp_rand_prime()
2020-12-30 08:20:18 -08:00
Hayden Roche
81f70fba5f Ensure that all leading zeros are skipped in sp_tohex. 2020-12-30 08:32:01 -06:00
Tesfa Mael
d366ca74af Review comments and cast 2020-12-29 19:48:45 -08:00
John Safranek
c482d16029 Merge pull request #3544 from haydenroche5/ocsp_stapling_bug
Fix bug where OCSP stapling wasn't happening even when requested by client
2020-12-29 14:23:10 -08:00
Chris Conlon
da007ecd7b Merge pull request #3409 from kojo1/mqx
add IDE/MQX
2020-12-29 13:53:37 -07:00
David Garske
c6abb59343 Merge pull request #3593 from tmael/sp_cast
casting fix for clang-12
2020-12-29 09:51:37 -08:00
tmael
837e9856f5 Merge pull request #3590 from dgarske/stcube_rel
Fixes for STM Cube Pack rename
2020-12-29 09:37:39 -08:00
David Garske
dc21d56545 Merge pull request #3600 from douzzer/low-resources-fixes
--enable-lowresource --enable-sp-math-all
2020-12-29 08:01:51 -08:00
Daniel Pouzzner
2bd0d4c467 wolfcrypt/src/evp.c: fix wolfSSL_EVP_CipherUpdate_GCM() to not fail when inl is zero, to properly handle realloc implementations that return NULL for zero-size allocations. 2020-12-28 23:49:48 -06:00
Daniel Pouzzner
fbcfc6adbf test.c: rehab fail codes in ecc_test_curve_size(). 2020-12-28 21:56:39 -06:00
Daniel Pouzzner
b0ca598d59 sp_int.h and ecc.h: add one more to SP_INT_DIGITS and FP_SIZE_ECC, to accommodate extra digit used by sp_mul(), sp_mulmod(), sp_sqr(), and sp_sqrmod(). 2020-12-28 18:06:18 -06:00
Tesfa Mael
cedec3ae28 Add parameter check 2020-12-28 15:53:56 -08:00
Daniel Pouzzner
764b3cf09d examples/client/client.c: add missing !defined(NO_SESSION_CACHE) gate around wolfSSL_get_session() for "print out session" code. 2020-12-28 17:49:58 -06:00
Juliusz Sosinowicz
8c07aafc43 Fix memory leaks
- Freeing the session object depends on the callback return
- The session object is malloc'ed when ssl->options.internalCacheOff
- wolfSSL_CTX_use_certificate needs to own the cert when KEEP_OUR_CERT because either it is up ref'ed or copied
2020-12-28 22:33:01 +01:00
Juliusz Sosinowicz
54479359f3 Calling wolfSSL_Rehandshake during renegotiation should not be an error
If we call wolfSSL_Rehandshake during a renegotiation then it should not result in a SECURE_RENEGOTIATION_E. wolfSSL_Rehandshake might be called when multiple HelloRequest messages are processed or the user could call this API during renegotiation. Either way wolfSSL should not treat this as an error if renegotiation is enabled.
2020-12-24 12:10:04 +01:00
David Garske
8b517975d1 Fixes from peer review. 2020-12-23 16:54:29 -08:00
elms
4280861af0 Merge pull request #3591 from dgarske/wolftpm
Added helper configure option '--enable-wolftpm`
2020-12-23 12:22:44 -08:00
Tesfa Mael
5c4011b3b4 cast to int 2020-12-23 12:09:35 -08:00
David Garske
b2155e6e26 Merge pull request #3592 from douzzer/verbose-heap-instrumentation
--enable-trackmemory=verbose
2020-12-23 11:40:45 -08:00
Daniel Pouzzner
d5dd35c739 add --enable-trackmemory=verbose, and add WOLFSSL_TEST_MAX_RELATIVE_HEAP_{BYTES,ALLOCS} and -m/-a (runtime counterparts) to wolfcrypt_test(). also add -h to wolfcrypt_test() to print available options. 2020-12-23 12:03:06 -06:00
David Garske
daa6833f37 Added helper configure option '--enable-wolftpm` to enable options used by wolfTPM. This enables (cert gen/req/ext, pkcs7, cryptocb and aes-cfb). 2020-12-23 08:09:24 -08:00
David Garske
e0f36baebe Fixes for STM Cube Pack rename. 2020-12-23 07:02:12 -08:00
Daniel Pouzzner
542ad0a81b linuxkm/module_hooks.c: separate cleanup into static libwolfssl_cleanup(), and call it from wolfssl_init() if wolfcrypt_test() fails. 2020-12-22 21:57:17 -06:00
David Garske
e6c71a1465 Merge branch 'master' into mqx 2020-12-21 07:28:26 -08:00
Hayden Roche
c47b98bca1 Allow OCSP stapling and NO_WOLFSSL_CLIENT to coexist. 2020-12-15 16:56:21 -06:00
Hayden Roche
eb6473b00f Fix bugs that made it so client side wasn't verifying certificate status. 2020-12-15 16:56:21 -06:00
Hayden Roche
801aa18b9e Fix bug where OCSP stapling wasn't happening even when requested by client.
The OCSP request that we created didn't have a URL for the OCSP responder, so
the server couldn't reach out to the responder for its cert status.
2020-12-15 16:56:21 -06:00
Takashi Kojo
203b7739c9 fix paths, add download site in README 2020-12-13 19:42:20 +09:00
Takashi Kojo
d3aacf4934 add IDE/MQX 2020-12-13 17:41:14 +09:00
Takashi Kojo
6154f29a31 Merge https://github.com/wolfssl/wolfssl 2020-12-13 17:27:53 +09:00
Takashi Kojo
1d2eb44bfb Merge https://github.com/wolfssl/wolfssl 2020-11-11 08:34:03 +09:00
Takashi Kojo
22816b53de set tag for zero len case 2020-10-30 16:13:37 +09:00
Felix Lechner
24e10bf4ab Convert a header file to UTF-8 encoding.
The file contained characters from the ISO 8859-1 legacy text
encoding. This commit onverts the file to UTF-8.
2020-06-30 11:14:52 -07:00
281 changed files with 21600 additions and 15123 deletions

4
.gitignore vendored
View File

@@ -242,6 +242,10 @@ linuxkm/libwolfssl.mod.c
linuxkm/module_exports.c
linuxkm/linuxkm/get_thread_size
# autotools generated
scripts/unit.test
wolfcrypt/test/test_paths.h
# MPLAB Generated Files (OS X)
mcapi/wolfcrypt_mcapi.X/nbproject/Makefile-*
mcapi/wolfcrypt_mcapi.X/nbproject/Package-default.bash

View File

@@ -28,16 +28,16 @@ if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_BINARY_DIR}")
You must delete them, or cmake will refuse to work.")
endif()
project(wolfssl VERSION 4.5.0 LANGUAGES C)
project(wolfssl VERSION 4.7.0 LANGUAGES C)
# shared library versioning
# increment if interfaces have been added, removed or changed
set(LIBTOOL_CURRENT 26)
set(LIBTOOL_CURRENT 27)
# increment if source code has changed set to zero if current is incremented
set(LIBTOOL_REVISION 0)
# increment if interfaces have been added set to zero if interfaces have been
# removed or changed
set(LIBTOOL_AGE 2)
set(LIBTOOL_AGE 3)
math(EXPR LIBTOOL_SO_VERSION "${LIBTOOL_CURRENT} - ${LIBTOOL_AGE}")
set(LIBTOOL_FULL_VERSION ${LIBTOOL_SO_VERSION}.${LIBTOOL_AGE}.${LIBTOOL_REVISION})
@@ -1203,30 +1203,37 @@ else()
endif()
endif()
# TODO: - User settings
set(WOLFSSL_USER_SETTINGS_HELP_STRING "Use your own user_settings.h and do not add Makefile CFLAGS (default: disabled)")
option(WOLFSSL_USER_SETTINGS ${WOLFSSL_USER_SETTINGS_HELP_STRING} "no")
set(WOLFSSL_OPTFLAGS_HELP_STRING "Enable default optimization CFLAGS for the compiler (default: enabled)")
option(WOLFSSL_OPTFLAGS ${WOLFSSL_OPTFLAGS_HELP_STRING} "yes")
# Generates the BUILD_* flags. These control what source files
# are included in the library. A series of AM_CONDITIONALs
# handle this in configure.ac.
# Generates the BUILD_* flags. These control what source files are included in
# the library. A series of AM_CONDITIONALs handle this in configure.ac.
generate_build_flags()
# TODO: - Bit of logic after optimization flags option (above)
# - Check for build-type conflicts section
# - Update CFLAGS based on options section
# - User settings section
# - BUILD_* flags and the logic they implement to control
# what gets built
# USER SETTINGS
if(WOLFSSL_USER_SETTINGS)
# Replace all options and just use WOLFSSL_USER_SETTINGS
set(WOLFSSL_DEFINITIONS "-DWOLFSSL_USER_SETTINGS")
endif()
# TODO: Applying definitions to everything like this, rather than
# individual targets, is discouraged in CMake.
add_definitions(${WOLFSSL_DEFINITIONS})
add_definitions("-DHAVE_CONFIG_H")
configure_file("${CMAKE_CURRENT_SOURCE_DIR}/cmake/config.in"
"${CMAKE_CURRENT_BINARY_DIR}/config.h" )
set(WOLFSSL_CONFIG_H_HELP_STRING "Enable generation of config.h and define HAVE_CONFIG_H (default: enabled)")
option(WOLFSSL_CONFIG_H ${WOLFSSL_CONFIG_H_HELP_STRING} "yes")
if(WOLFSSL_CONFIG_H)
add_definitions("-DHAVE_CONFIG_H")
configure_file("${CMAKE_CURRENT_SOURCE_DIR}/cmake/config.in"
"${CMAKE_CURRENT_BINARY_DIR}/config.h" )
endif()
# Suppress some warnings about separate compilation, inlining
add_definitions("-DWOLFSSL_IGNORE_FILE_WARN")
@@ -1292,11 +1299,6 @@ file(APPEND ${CYASSL_OPTION_FILE} " */\n")
file(READ ${OPTION_FILE} OPTION_FILE_CONTENTS)
file(APPEND ${CYASSL_OPTION_FILE} ${OPTION_FILE_CONTENTS})
add_definitions(${WOLFSSL_DEFINITIONS})
configure_file("${CMAKE_SOURCE_DIR}/cmake/config.in"
"${CMAKE_BINARY_DIR}/config.h" )
####################################################
# Library Target
####################################################

View File

@@ -1,3 +1,53 @@
# wolfSSL Release 4.7.0 (February 16, 2021)
Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
### New Feature Additions
* Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API, X509_STORE_CTX API added
* WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
* Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session tickets with TLS 1.2 while keeping TLS 1.3 session tickets available
* Implement RFC 5705: Keying Material Exporters for TLS
* Added --enable-reproducible-build flag for making more deterministic library outputs to assist debugging
### Fixes
* Fix to free mutex when cert manager is freed
* Compatibility layer EVP function to return the correct block size and type
* DTLS secure renegotiation fixes including resetting timeout and retransmit on duplicate HelloRequest
* Fix for edge case with shrink buffer and secure renegotiation
* Compile fix for type used with curve448 and PPC64
* Fixes for SP math all with PPC64 and other embedded compilers
* SP math all fix when performing montgomery reduction on one word modulus
* Fixes to SP math all to better support digit size of 8-bit
* Fix for results of edge case with SP integer square operation
* Stop non-ct mod inv from using register x29 with SP ARM64 build
* Fix edge case when generating z value of ECC with SP code
* Fixes for PKCS7 with crypto callback (devId) with RSA and RNG
* Fix for compiling builds with RSA verify and public only
* Fix for PKCS11 not properly exporting the public key due to a missing key type field
* Call certificate callback with certificate depth issues
* Fix for out-of-bounds read in TLSX_CSR_Parse()
* Fix incorrect AES-GCM tag generation in the EVP layer
* Fix for out of bounds write with SP math all enabled and an edge case of calling sp_tohex on the result of sp_mont_norm
* Fix for parameter check in sp_rand_prime to handle 0 length values
* Fix for edge case of failing malloc resulting in an out of bounds write with SHA256/SHA512 when small stack is enabled
### Improvements/Optimizations
* Added --enable-wolftpm option for easily building wolfSSL to be used with wolfTPM
* DTLS macro WOLFSSL_DTLS_RESEND_ONLY_TIMEOUT added for resending flight only after a timeout
* Update linux kernel module to use kvmalloc and kvfree
* Add user settings option to cmake build
* Added support for AES GCM session ticket encryption
* Thread protection for global RNG used by wolfSSL_RAND_bytes function calls
* Sanity check on FIPs configure flag used against the version of FIPs bundle
* --enable-aesgcm=table now is compatible with --enable-linuxkm
* Increase output buffer size that wolfSSL_RAND_bytes can handle
* Out of directory builds resolved, wolfSSL can now be built in a separate directory than the root wolfssl directory
### Vulnerabilities
* [HIGH] CVE-2021-3336: In earlier versions of wolfSSL there exists a potential man in the middle attack on TLS 1.3 clients. Malicious attackers with a privileged network position can impersonate TLS 1.3 servers and bypass authentication. Users that have applications with client side code and have TLS 1.3 turned on, should update to the latest version of wolfSSL. Users that do not have TLS 1.3 turned on, or that are server side only, are NOT affected by this report. For the code change see https://github.com/wolfSSL/wolfssl/pull/3676.
* [LOW] In the case of using custom ECC curves there is the potential for a crafted compressed ECC key that has a custom prime value to cause a hang when imported. This only affects applications that are loading in ECC keys with wolfSSL builds that have compressed ECC keys and custom ECC curves enabled.
* [LOW] With TLS 1.3 authenticated-only ciphers a section of the server hello could contain 16 bytes of uninitialized data when sent to the connected peer. This affects only a specific build of wolfSSL with TLS 1.3 early data enabled and using authenticated-only ciphers with TLS 1.3.
# wolfSSL Release 4.6.0 (December 22, 2020)
Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:

View File

@@ -1,6 +1,6 @@
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -DNO_MAIN_DRIVER -DWOLFSSL_USER_SETTINGS")
set(COMPONENT_SRCDIRS ".")
set(COMPONENT_SRCS "test_wolfssl.c" "../wolfcrypt/test/test.c")
set(COMPONENT_ADD_INCLUDEDIRS ".")
set(COMPONENT_REQUIRES unity test_utils wolfssl)

View File

@@ -3,9 +3,8 @@
The test contains of wolfSSL unit-test app on Unity.
When you want to run the app
1. Copy *test.c* file at /path/to/esp-idf/components/wolfssl/wolfcrypt/test/ folder to the wolfssl/test folder
2. Go to /esp-idf/tools/unit-test-app/ folder
3. "idf.py menuconfig" to configure unit test app.
4. "idf.py -T wolfssl build" to build wolfssl unit test app.
1. Go to /esp-idf/tools/unit-test-app/ folder
2. "idf.py menuconfig" to configure unit test app.
3. "idf.py -T wolfssl build" to build wolfssl unit test app.
See [https://docs.espressif.com/projects/esp-idf/en/latest/api-guides/unit-tests.html] for more information about unit test app.

153
IDE/MQX/Makefile Normal file
View File

@@ -0,0 +1,153 @@
WOLF_ROOT = ../..
MQX_ROOT = $(WOLF_ROOT)/../../../Freescale/Freescale_MQX_4_1/
CC = arm-none-eabi-gcc
AR = arm-none-eabi-ar
WOLFLIB = ./libwolfssl.a
MQXLIB =
OPTIMIZE = -O2
WORNING = \
-Wno-int-to-pointer-cast\
-Wno-incompatible-pointer-types\
-Wno-discarded-qualifiers\
-Wno-int-conversion\
-Wno-implicit-function-declaration\
-Wno-pointer-to-int-cast
USER_SETTINGS_H = -I./ -DWOLFSSL_USER_SETTINGS
CFLAGS = $(OPTIMIZE) -I$(WOLF_ROOT)/. $(USER_SETTINGS_H) $(MQX_INCLUDE) $(WORNING)
MQX_INCLUDE = -I$(MQX_ROOT)/mqx/source/include\
-I$(MQX_ROOT)/mqx/source/psp/cortex_m\
-I$(MQX_ROOT)/mqx/source/psp/cortex_a/compiler/gcc_arm\
-I$(MQX_ROOT)/mqx/source/psp/cortex_m/cpu\
-I$(MQX_ROOT)/mfs/source/include\
-I$(MQX_ROOT)/mqx/source/bsp/twrk70f120m\
-I$(MQX_ROOT)/mqx/source/io/cm\
-I$(MQX_ROOT)/mqx/source/io/lpm\
-I$(MQX_ROOT)/mqx/source/io/serial\
-I$(MQX_ROOT)/mqx/source/io/dma\
-I$(MQX_ROOT)/mqx/source/io/spi\
-I$(MQX_ROOT)/mqx/source/io/i2c\
-I$(MQX_ROOT)/mqx/source/io/io_mem\
-I$(MQX_ROOT)/mqx/source/io/io_null\
-I$(MQX_ROOT)/mqx/source/io/enet\
-I$(MQX_ROOT)/mqx/source/io/enet/macnet\
-I$(MQX_ROOT)/mqx/source/io/lwgpio\
-I$(MQX_ROOT)/mqx/source/io/gpio\
-I$(MQX_ROOT)/mqx/source/io/gpio/kgpio\
-I$(MQX_ROOT)/mqx/source/io/esdhc\
-I$(MQX_ROOT)/mqx/source/io/sdcard\
-I$(MQX_ROOT)/mqx/source/io/sdcard/sdcard_spi\
-I$(MQX_ROOT)/mqx/source/io/sdcard/sdcard_esdhc\
-I$(MQX_ROOT)/mqx/source/io/pccard\
-I$(MQX_ROOT)/mqx/source/io/pcflash\
-I$(MQX_ROOT)/mqx/source/io/adc/kadc\
-I$(MQX_ROOT)/mqx/source/io/adc\
-I$(MQX_ROOT)/mqx/source/io/lwadc\
-I$(MQX_ROOT)/mqx/source/io/flashx\
-I$(MQX_ROOT)/mqx/source/io/flashx/freescale\
-I$(MQX_ROOT)/mqx/source/io/hwtimer\
-I$(MQX_ROOT)/mqx/source/io/rtc\
-I$(MQX_ROOT)/mqx/source/io/debug\
-I$(MQX_ROOT)/mqx/source/io/tchres\
-I$(MQX_ROOT)/mqx/source/io/nandflash\
-I$(MQX_ROOT)/mqx/source/io/timer\
-I$(MQX_ROOT)/mqx/source/io/usb\
-I$(MQX_ROOT)/mqx/source/io/hmi\
-I$(MQX_ROOT)/mqx/source/io/sai\
-I$(MQX_ROOT)/mqx/source/io/rtcs\
-I$(MQX_ROOT)/rtcs/source/include
OBJ =\
$(WOLF_ROOT)/src/crl.o\
$(WOLF_ROOT)/src/internal.o\
$(WOLF_ROOT)/src/keys.o\
$(WOLF_ROOT)/src/ocsp.o\
$(WOLF_ROOT)/src/sniffer.o\
$(WOLF_ROOT)/src/ssl.o\
$(WOLF_ROOT)/src/tls13.o\
$(WOLF_ROOT)/src/tls.o\
$(WOLF_ROOT)/src/wolfio.o\
$(WOLF_ROOT)/wolfcrypt/src/aes.o\
$(WOLF_ROOT)/wolfcrypt/src/arc4.o\
$(WOLF_ROOT)/wolfcrypt/src/asm.o\
$(WOLF_ROOT)/wolfcrypt/src/asn.o\
$(WOLF_ROOT)/wolfcrypt/src/blake2b.o\
$(WOLF_ROOT)/wolfcrypt/src/blake2s.o\
$(WOLF_ROOT)/wolfcrypt/src/camellia.o\
$(WOLF_ROOT)/wolfcrypt/src/chacha20_poly1305.o\
$(WOLF_ROOT)/wolfcrypt/src/chacha.o\
$(WOLF_ROOT)/wolfcrypt/src/cmac.o\
$(WOLF_ROOT)/wolfcrypt/src/coding.o\
$(WOLF_ROOT)/wolfcrypt/src/compress.o\
$(WOLF_ROOT)/wolfcrypt/src/cpuid.o\
$(WOLF_ROOT)/wolfcrypt/src/cryptocb.o\
$(WOLF_ROOT)/wolfcrypt/src/curve25519.o\
$(WOLF_ROOT)/wolfcrypt/src/des3.o\
$(WOLF_ROOT)/wolfcrypt/src/dh.o\
$(WOLF_ROOT)/wolfcrypt/src/dsa.o\
$(WOLF_ROOT)/wolfcrypt/src/ecc.o\
$(WOLF_ROOT)/wolfcrypt/src/ecc_fp.o\
$(WOLF_ROOT)/wolfcrypt/src/ed25519.o\
$(WOLF_ROOT)/wolfcrypt/src/error.o\
$(WOLF_ROOT)/wolfcrypt/src/fe_low_mem.o\
$(WOLF_ROOT)/wolfcrypt/src/fe_operations.o\
$(WOLF_ROOT)/wolfcrypt/src/ge_low_mem.o\
$(WOLF_ROOT)/wolfcrypt/src/ge_operations.o\
$(WOLF_ROOT)/wolfcrypt/src/hash.o\
$(WOLF_ROOT)/wolfcrypt/src/hc128.o\
$(WOLF_ROOT)/wolfcrypt/src/hmac.o\
$(WOLF_ROOT)/wolfcrypt/src/idea.o\
$(WOLF_ROOT)/wolfcrypt/src/integer.o\
$(WOLF_ROOT)/wolfcrypt/src/logging.o\
$(WOLF_ROOT)/wolfcrypt/src/md2.o\
$(WOLF_ROOT)/wolfcrypt/src/md4.o\
$(WOLF_ROOT)/wolfcrypt/src/md5.o\
$(WOLF_ROOT)/wolfcrypt/src/memory.o\
$(WOLF_ROOT)/wolfcrypt/src/pkcs12.o\
$(WOLF_ROOT)/wolfcrypt/src/pkcs7.o\
$(WOLF_ROOT)/wolfcrypt/src/poly1305.o\
$(WOLF_ROOT)/wolfcrypt/src/pwdbased.o\
$(WOLF_ROOT)/wolfcrypt/src/rabbit.o\
$(WOLF_ROOT)/wolfcrypt/src/random.o\
$(WOLF_ROOT)/wolfcrypt/src/ripemd.o\
$(WOLF_ROOT)/wolfcrypt/src/rsa.o\
$(WOLF_ROOT)/wolfcrypt/src/sha256.o\
$(WOLF_ROOT)/wolfcrypt/src/sha3.o\
$(WOLF_ROOT)/wolfcrypt/src/sha512.o\
$(WOLF_ROOT)/wolfcrypt/src/sha.o\
$(WOLF_ROOT)/wolfcrypt/src/signature.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_arm32.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_arm64.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_armthumb.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_c32.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_c64.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_cortexm.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_int.o\
$(WOLF_ROOT)/wolfcrypt/src/sp_x86_64.o\
$(WOLF_ROOT)/wolfcrypt/src/srp.o\
$(WOLF_ROOT)/wolfcrypt/src/tfm.o\
$(WOLF_ROOT)/wolfcrypt/src/wc_encrypt.o\
$(WOLF_ROOT)/wolfcrypt/src/wc_pkcs11.o\
$(WOLF_ROOT)/wolfcrypt/src/wc_port.o\
$(WOLF_ROOT)/wolfcrypt/src/wolfevent.o\
$(WOLF_ROOT)/wolfcrypt/src/wolfmath.o
all : wolfssllib client server test benchmark
wolfssllib : $(OBJ)
$(AR) r $(WOLFLIB) $(OBJ)
test : wolfssllib ./user_settings.h
$(CC) -o test $(CFLAGS) $(WOLF_ROOT)/wolfcrypt/test/test.c $(WOLFLIB) $(MQXLIB)
benchmark : wolfssllib ./user_settings.h
$(CC) -o benchmark $(CFLAGS) $(WOLF_ROOT)/wolfcrypt/benchmark/benchmark.c $(WOLFLIB) $(WOLFLIB) $(MQXLIB)
server : wolfssllib ./user_settings.h
$(CC) -o server $(CFLAGS) $(WOLF_ROOT)/IDE/MQX/server-tls.c $(WOLFLIB) $(MQXLIB)
client : wolfssllib ./user_settings.h
$(CC) -o client $(CFLAGS) $(WOLF_ROOT)/IDE/MQX/client-tls.c $(WOLFLIB) $(MQXLIB)
clean :
rm $(OBJ) $(WOLFLIB)

29
IDE/MQX/README-jp.md Normal file
View File

@@ -0,0 +1,29 @@
# MQX向けビルド方法
## 概要
このMakefileはwolfSSLライブラリーとサンプルプログラムをMQX向けにビルドするためのものです。
以下のターゲットを含んでいます。
- wolfssllib: wolfSSL静的ライブラリー
- test: 暗号アルゴリズムのテスト
- benchmark: 暗号アルゴリズムのベンチマーク
- client: TLS クライアントサンプルプログラム
- server: TLS サーバサンプルプログラム
## 準備
- 事前にGCCをインストールしておいてください。
GNU Arm Embedded Toolchain, https://developer.arm.com
- 事前にMQXをインストールしておいてください。
Freescale MQX RTOS 4.1以降, https://www.nxp.com/
Freescale_MQX_4_1/doc/MQX_Getting_Started.pdfをご参照ください。
## 設定
- wolfSSL コンフィグレーションオプション
 <wolfSSL-root>/IDE/MQX/user_settings.hファイルに必要なオプションを追加または削除してください。
- Makefileの設定
MQX_ROOT: MQX のインストールパス
MQXLIB: リンクするMQX ライブラリのパス
CC: コンパイラコマンド
AR: ARコマンド
WOLF_ROOT: Makefileの格納位置を変える場合はこの定義を変更してください

27
IDE/MQX/README.md Normal file
View File

@@ -0,0 +1,27 @@
#How to build with MQX
## Overview
This Makefile is for building wolfSSL library and sample programs running with MQX.
It has following targets.
- wolfssllib: wolfSSL static library (libwolfssl.a)
- test: crypt test
- benchmark: cypher benchmark
- client: TLS client example
- server: TLS server example
## Prerequisites
- Installed GCC
Download from GNU Arm Embedded Toolchain at https://developer.arm.com/
- Installed MQX
Download Freescale MQX RTOS 4.1 or later at https://www.nxp.com/
Follow Freescale_MQX_4_1/doc/MQX_Getting_Started.pdf
## Setup
- wolfSSL configuration parameters
You can add or remove configuration options in <wolfSSL-root>/IDE/MQX/user_settings.h.
- Setup Makefile
MQX_ROOT: MQX source code installed path
MQXLIB: MQX library path to like with
CC: compiler
AR: archiver
WOLF_ROOT: change this if you move this Makefile location

163
IDE/MQX/client-tls.c Normal file
View File

@@ -0,0 +1,163 @@
/* client-tls.c
*
* Copyright (C) 2006-2020 wolfSSL Inc.
*
* This file is part of wolfSSL. (formerly known as CyaSSL)
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
*/
/* wolfSSL */
#include <wolfssl/wolfcrypt/settings.h>
#include <wolfssl/ssl.h>
#define DEFAULT_PORT 11111
#define CERT_FILE "../certs/ca-cert.pem"
int main(int argc, char** argv)
{
int sockfd;
struct sockaddr_in servAddr;
char buff[256];
size_t len;
int ret;
/* declare wolfSSL objects */
WOLFSSL_CTX* ctx;
WOLFSSL* ssl;
/* Check for proper calling convention */
if (argc != 2) {
printf("usage: %s <IPv4 address>\n", argv[0]);
return 0;
}
/* Create a socket that uses an internet IPv4 address,
* Sets the socket to be stream based (TCP),
* 0 means choose the default protocol. */
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
fprintf(stderr, "ERROR: failed to create the socket\n");
ret = -1;
goto end;
}
/* Initialize the server address struct with zeros */
memset(&servAddr, 0, sizeof(servAddr));
/* Fill in the server address */
servAddr.sin_family = AF_INET; /* using IPv4 */
servAddr.sin_port = htons(DEFAULT_PORT); /* on DEFAULT_PORT */
/* Get the server IPv4 address from the command line call */
if (inet_pton(AF_INET, argv[1], &servAddr.sin_addr, sizeof(servAddr.sin_addr)) != 1) {
fprintf(stderr, "ERROR: invalid address\n");
ret = -1;
goto end;
}
/* Connect to the server */
if ((ret = connect(sockfd, (struct sockaddr*) &servAddr, sizeof(servAddr)))
== -1) {
fprintf(stderr, "ERROR: failed to connect\n");
goto end;
}
/*---------------------------------*/
/* Start of security */
/*---------------------------------*/
/* Initialize wolfSSL */
if ((ret = wolfSSL_Init()) != WOLFSSL_SUCCESS) {
fprintf(stderr, "ERROR: Failed to initialize the library\n");
goto socket_cleanup;
}
/* Create and initialize WOLFSSL_CTX */
if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_client_method())) == NULL) {
fprintf(stderr, "ERROR: failed to create WOLFSSL_CTX\n");
ret = -1;
goto socket_cleanup;
}
/* Load client certificates into WOLFSSL_CTX */
if ((ret = wolfSSL_CTX_load_verify_locations(ctx, CERT_FILE, NULL))
!= SSL_SUCCESS) {
fprintf(stderr, "ERROR: failed to load %s, please check the file.\n",
CERT_FILE);
goto ctx_cleanup;
}
/* Create a WOLFSSL object */
if ((ssl = wolfSSL_new(ctx)) == NULL) {
fprintf(stderr, "ERROR: failed to create WOLFSSL object\n");
ret = -1;
goto ctx_cleanup;
}
/* Attach wolfSSL to the socket */
if ((ret = wolfSSL_set_fd(ssl, sockfd)) != WOLFSSL_SUCCESS) {
fprintf(stderr, "ERROR: Failed to set the file descriptor\n");
goto cleanup;
}
/* Connect to wolfSSL on the server side */
if ((ret = wolfSSL_connect(ssl)) != SSL_SUCCESS) {
fprintf(stderr, "ERROR: failed to connect to wolfSSL\n");
goto cleanup;
}
/* Get a message for the server from stdin */
printf("Message for server: ");
memset(buff, 0, sizeof(buff));
if (fgets(buff, sizeof(buff), stdin) == NULL) {
fprintf(stderr, "ERROR: failed to get message for server\n");
ret = -1;
goto cleanup;
}
len = strnlen(buff, sizeof(buff));
/* Send the message to the server */
if ((ret = wolfSSL_write(ssl, buff, len)) != len) {
fprintf(stderr, "ERROR: failed to write entire message\n");
fprintf(stderr, "%d bytes of %d bytes were sent", ret, (int) len);
goto cleanup;
}
/* Read the server data into our buff array */
memset(buff, 0, sizeof(buff));
if ((ret = wolfSSL_read(ssl, buff, sizeof(buff)-1)) == -1) {
fprintf(stderr, "ERROR: failed to read\n");
goto cleanup;
}
/* Print to stdout any data the server sends */
printf("Server: %s\n", buff);
/* Cleanup and return */
cleanup:
wolfSSL_free(ssl); /* Free the wolfSSL object */
ctx_cleanup:
wolfSSL_CTX_free(ctx); /* Free the wolfSSL context object */
wolfSSL_Cleanup(); /* Cleanup the wolfSSL environment */
socket_cleanup:
close(sockfd); /* Close the connection to the server */
end:
return ret; /* Return reporting a success */
}

11
IDE/MQX/include.am Normal file
View File

@@ -0,0 +1,11 @@
# vim:ft=automake
# included from Top Level Makefile.am
# All paths should be given relative to the root
EXTRA_DIST+= IDE/MQX/client-tls.c
EXTRA_DIST+= IDE/MQX/Makefile
EXTRA_DIST+= IDE/MQX/README-jp.md
EXTRA_DIST+= IDE/MQX/README.md
EXTRA_DIST+= IDE/MQX/server-tls.c
EXTRA_DIST+= IDE/MQX/user_config.h
EXTRA_DIST+= IDE/MQX/user_settings.h

194
IDE/MQX/server-tls.c Normal file
View File

@@ -0,0 +1,194 @@
/* server-tls.c
*
* Copyright (C) 2006-2020 wolfSSL Inc.
*
* This file is part of wolfSSL. (formerly known as CyaSSL)
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
*/
/* wolfSSL */
#include <wolfssl/wolfcrypt/settings.h>
#include <wolfssl/ssl.h>
#include <addrinfo.h>
#define DEFAULT_PORT 11111
#define CERT_FILE "../certs/server-cert.pem"
#define KEY_FILE "../certs/server-key.pem"
int main()
{
int sockfd;
int connd;
struct sockaddr_in servAddr;
struct sockaddr_in clientAddr;
socklen_t size = sizeof(clientAddr);
char buff[256];
size_t len;
int shutdown = 0;
int ret;
const char* reply = "I hear ya fa shizzle!\n";
/* declare wolfSSL objects */
WOLFSSL_CTX* ctx;
WOLFSSL* ssl;
/* Initialize wolfSSL */
wolfSSL_Init();
/* Create a socket that uses an internet IPv4 address,
* Sets the socket to be stream based (TCP),
* 0 means choose the default protocol. */
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
fprintf(stderr, "ERROR: failed to create the socket\n");
return -1;
}
/* Create and initialize WOLFSSL_CTX */
if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_server_method())) == NULL) {
fprintf(stderr, "ERROR: failed to create WOLFSSL_CTX\n");
return -1;
}
/* Load server certificates into WOLFSSL_CTX */
if (wolfSSL_CTX_use_certificate_file(ctx, CERT_FILE, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) {
fprintf(stderr, "ERROR: failed to load %s, please check the file.\n",
CERT_FILE);
return -1;
}
/* Load server key into WOLFSSL_CTX */
if (wolfSSL_CTX_use_PrivateKey_file(ctx, KEY_FILE, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) {
fprintf(stderr, "ERROR: failed to load %s, please check the file.\n",
KEY_FILE);
return -1;
}
/* Initialize the server address struct with zeros */
memset(&servAddr, 0, sizeof(servAddr));
/* Fill in the server address */
servAddr.sin_family = AF_INET; /* using IPv4 */
servAddr.sin_port = htons(DEFAULT_PORT); /* on DEFAULT_PORT */
servAddr.sin_addr.s_addr = INADDR_ANY; /* from anywhere */
/* Bind the server socket to our port */
if (bind(sockfd, (struct sockaddr*)&servAddr, sizeof(servAddr)) == -1) {
fprintf(stderr, "ERROR: failed to bind\n");
return -1;
}
/* Listen for a new connection, allow 5 pending connections */
if (listen(sockfd, 5) == -1) {
fprintf(stderr, "ERROR: failed to listen\n");
return -1;
}
/* Continue to accept clients until shutdown is issued */
while (!shutdown) {
printf("Waiting for a connection...\n");
/* Accept client connections */
if ((connd = accept(sockfd, (struct sockaddr*)&clientAddr, &size))
== -1) {
fprintf(stderr, "ERROR: failed to accept the connection\n\n");
return -1;
}
/* Create a WOLFSSL object */
if ((ssl = wolfSSL_new(ctx)) == NULL) {
fprintf(stderr, "ERROR: failed to create WOLFSSL object\n");
return -1;
}
/* Attach wolfSSL to the socket */
wolfSSL_set_fd(ssl, connd);
/* Establish TLS connection */
ret = wolfSSL_accept(ssl);
if (ret != SSL_SUCCESS) {
fprintf(stderr, "wolfSSL_accept error = %d\n",
wolfSSL_get_error(ssl, ret));
return -1;
}
printf("Client connected successfully\n");
/* Read the client data into our buff array */
memset(buff, 0, sizeof(buff));
if (wolfSSL_read(ssl, buff, sizeof(buff)-1) == -1) {
fprintf(stderr, "ERROR: failed to read\n");
return -1;
}
/* Print to stdout any data the client sends */
printf("Client: %s\n", buff);
/* Check for server shutdown command */
if (strncmp(buff, "shutdown", 8) == 0) {
printf("Shutdown command issued!\n");
shutdown = 1;
}
/* Write our reply into buff */
memset(buff, 0, sizeof(buff));
memcpy(buff, reply, strlen(reply));
len = strnlen(buff, sizeof(buff));
/* Reply back to the client */
if (wolfSSL_write(ssl, buff, len) != len) {
fprintf(stderr, "ERROR: failed to write\n");
return -1;
}
/* Cleanup after this connection */
wolfSSL_free(ssl); /* Free the wolfSSL object */
close(connd); /* Close the connection to the client */
}
printf("Shutdown complete\n");
/* Cleanup and return */
wolfSSL_CTX_free(ctx); /* Free the wolfSSL context object */
wolfSSL_Cleanup(); /* Cleanup the wolfSSL environment */
close(sockfd); /* Close the socket listening for clients */
return 0; /* Return reporting a success */
}

1
IDE/MQX/user_config.h Normal file
View File

@@ -0,0 +1 @@
#define MQX_CPU PSP_CPU_MK60DN512Z

63
IDE/MQX/user_settings.h Normal file
View File

@@ -0,0 +1,63 @@
/* wolfSSH */
#define WOLFSSL_PUBLIC_MP
/* TLS1.3 */
#define WOLFSSL_TLS13
#define HAVE_TLS_EXTENSIONS
#define HAVE_SUPPORTED_CURVES
#define HAVE_FFDHE_2048
#define HAVE_THREAD_LS
/* SP optimization */
#define WOLFSSL_HAVE_SP_RSA
#define WOLFSSL_HAVE_SP_DH
#define WOLFSSL_SP_4096
#define WOLFSSL_HAVE_SP_ECC
#define HAVE_ECC384
#define WOLFSSL_SP_384
/* Hardening */
#define TFM_TIMING_RESISTANT
#define ECC_TIMING_RESISTANT
#define WC_RSA_BLINDING
/* Default Cyphers */
#define HAVE_AESGCM
#define WOLFSSL_SHA512
#define WOLFSSL_SHA384
#define HAVE_HKDF
#define NO_DSA
#define HAVE_ECC
#define TFM_ECC256
#define ECC_SHAMIR
#define WC_RSA_PSS
#define WOLFSSL_BASE64_ENCODE
#define NO_RC4
#define NO_HC128
#define NO_RABBIT
#define WOLFSSL_SHA224
#define WOLFSSL_SHA3
#define WOLFSSL_SHAKE256
#define HAVE_POLY1305
#define HAVE_ONE_TIME_AUTH
#define HAVE_CHACHA
#define HAVE_HASHDRBG
#define HAVE_TLS_EXTENSIONS
#define HAVE_SUPPORTED_CURVES
#define HAVE_EXTENDED_MASTER
#define NO_RC4
#define HAVE_ENCRYPT_THEN_MAC
#define NO_PSK
#define NO_MD4
#define NO_PWDBASED
#define USE_FAST_MATH
#define WC_NO_ASYNC_THREADING
#define HAVE_DH_DEFAULT_PARAMS
#define NO_DES
#define WOLFSSL_DH_CONST
/* MQX */
#define FREESCALE_MQX
#define FREESCALE_NO_RNG

View File

@@ -14,7 +14,7 @@ These examples use the Cube HAL for STM32.
## Configuration
The settings for the wolfSSL CubeMX pack are in the generated `wolfSSL.wolfSSL_conf.h` file. An example of this is located in `IDE/STM32Cube/wolfSSL_conf.h` (renamed to avoid possible conflicts with generated file).
The settings for the wolfSSL CubeMX pack are in the generated `wolfSSL.I-CUBE-wolfSSL_conf.h` file. An example of this is located in `IDE/STM32Cube/wolfSSL_conf.h` (renamed to avoid possible conflicts with generated file).
The template used for generation is `IDE/STM32Cube/default_conf.ftl` which can be updated at `STM32Cube/Repository/Packs/wolfSSL/wolfSSL/[Version]/CubeMX/templates/default_conf.ftl`.
@@ -42,6 +42,37 @@ To enable the latest Cube HAL support please define `STM32_HAL_V2`.
If you'd like to use the older Standard Peripheral library undefine `WOLFSSL_STM32_CUBEMX`.
With STM32 Cube HAL v2 some AES GCM hardware has a limitation for the AAD header, which must be a multiple of 4 bytes.
If using `STM32_AESGCM_PARTIAL` with the following patch it will enable use for all AAD header sizes. The `STM32Cube_FW_F7_V1.16.0` patch is:
```
diff --git a/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h b/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h
--- a/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h
+++ b/Drivers/STM32F7xx_HAL_Driver/Inc/stm32f7xx_hal_cryp.h
@@ -63,6 +63,7 @@ typedef struct
GCM : also known as Additional Authentication Data
CCM : named B1 composed of the associated data length and Associated Data. */
uint32_t HeaderSize; /*!< The size of header buffer in word */
+ uint32_t HeaderPadSize; /*!< <PATCH> The size of padding in bytes added to actual header data to pad it to a multiple of 32 bits </PATCH> */
uint32_t *B0; /*!< B0 is first authentication block used only in AES CCM mode */
uint32_t DataWidthUnit; /*!< Data With Unit, this parameter can be value of @ref CRYP_Data_Width_Unit*/
uint32_t KeyIVConfigSkip; /*!< CRYP peripheral Key and IV configuration skip, to config Key and Initialization
diff --git a/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c b/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c
--- a/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c
+++ b/Drivers/STM32F7xx_HAL_Driver/Src/stm32f7xx_hal_cryp_ex.c
@@ -132,6 +132,8 @@ HAL_StatusTypeDef HAL_CRYPEx_AESGCM_GenerateAuthTAG(CRYP_HandleTypeDef *hcryp, u
uint64_t inputlength = (uint64_t)hcryp->SizesSum * 8U; /* input length in bits */
uint32_t tagaddr = (uint32_t)AuthTag;
+ headerlength -= ((uint64_t)(hcryp->Init.HeaderPadSize) * 8U); /* <PATCH> Decrement the header size removing the pad size </PATCH> */
+
if (hcryp->State == HAL_CRYP_STATE_READY)
{
/* Process locked */
```
If you are using FreeRTOS make sure your `FreeRTOSConfig.h` has its `configTOTAL_HEAP_SIZE` increased.
The TLS client/server benchmark example requires about 76 KB for allocated tasks (with stack) and peak heap. This uses both a TLS client and server to test a TLS connection locally for each enabled TLS cipher suite.

View File

@@ -11,6 +11,7 @@
[#assign s = name]
[#assign toto = s?replace(".","_")]
[#assign toto = toto?replace("/","")]
[#assign toto = toto?replace("-","_")]
[#assign inclusion_protection = toto?upper_case]
/* Define to prevent recursive inclusion -------------------------------------*/
#ifndef __${inclusion_protection}__
@@ -85,6 +86,7 @@ extern ${variable.value} ${variable.name};
#undef NO_STM32_CRYPTO
#define STM32_HAL_V2
#define HAL_CONSOLE_UART huart2
#define STM32_AESGCM_PARTIAL /* allow partial blocks and add auth info (header) */
#elif defined(STM32H753xx)
#define WOLFSSL_STM32H7
#undef NO_STM32_HASH
@@ -128,7 +130,9 @@ extern ${variable.value} ${variable.name};
WOLFSSL_STM32F7, WOLFSSL_STM32H7, WOLFSSL_STM32L4 and WOLFSSL_STM32L5 */
#define WOLFSSL_STM32F4
/* Debug UART */
/* Debug UART used for printf */
/* The UART interface number varies for each board/CPU */
/* Typically this is the UART attached to the ST-Link USB CDC UART port */
#define HAL_CONSOLE_UART huart4
/* Hardware Crypto - uncomment as available on hardware */
@@ -526,7 +530,7 @@ extern ${variable.value} ${variable.name};
#ifdef __cplusplus
}
#endif
#endif /*__ ${inclusion_protection}_H */
#endif /* ${inclusion_protection}_H */
/**
* @}

View File

@@ -1,4 +1,4 @@
/* wolfSSL_conf.h (example of generated wolfSSL.wolfSSL_conf.h)
/* wolfSSL_conf.h (example of generated wolfSSL.I-CUBE-wolfSSL_conf.h)
*
* Copyright (C) 2006-2020 wolfSSL Inc.
*
@@ -26,94 +26,95 @@
* (and not WOLFSSL_USER_SETTINGS or HAVE_CONF_H).
*/
#ifndef __WOLFSSL_WOLFSSL_CONF_H__
#define __WOLFSSL_WOLFSSL_CONF_H__
#ifndef __WOLFSSL_I_CUBE_WOLFSSL_CONF_H__
#define __WOLFSSL_I_CUBE_WOLFSSL_CONF_H__
#ifdef __cplusplus
extern "C" {
#endif
/**
MiddleWare name : wolfSSL.I-CUBE-wolfSSL.4.6.0
MiddleWare fileName : ./wolfSSL.I-CUBE-wolfSSL_conf.h
MiddleWare version :
*/
/*---------- Debug Support -----------*/
#define WOLF_CONF_DEBUG 0
/*---------- wolfCrypt Only -----------*/
#define WOLF_CONF_WOLFCRYPT_ONLY 0
/*---------- TLS v1.3 -----------*/
#define WOLF_CONF_TLS13 1
/*---------- TLS v1.2 -----------*/
#define WOLF_CONF_TLS12 1
/*---------- DTLS Support -----------*/
#define WOLF_CONF_DTLS 0
/*---------- Math Configuration -----------*/
#define WOLF_CONF_MATH 4
/*---------- RTOS -----------*/
#define WOLF_CONF_RTOS 2
/*---------- RSA Support -----------*/
#define WOLF_CONF_RSA 1
/*---------- ECC Support -----------*/
#define WOLF_CONF_ECC 1
/*---------- DH (DiffieHellman) Support -----------*/
#define WOLF_CONF_DH 1
/*---------- AES GCM Support -----------*/
#define WOLF_CONF_AESGCM 1
/*---------- AES CBC Support -----------*/
#define WOLF_CONF_AESCBC 0
/*---------- ChaCha20 / Poly1305 Support -----------*/
#define WOLF_CONF_CHAPOLY 1
/*---------- Ed25519 / Curve25519 Support -----------*/
#define WOLF_CONF_EDCURVE25519 0
/*---------- MD5 Support -----------*/
#define WOLF_CONF_MD5 0
/*---------- SHA1 Support -----------*/
#define WOLF_CONF_SHA1 0
/*---------- SHA2-224 Support -----------*/
#define WOLF_CONF_SHA2_224 0
/*---------- SHA2-256 Support -----------*/
#define WOLF_CONF_SHA2_256 1
/*---------- SHA2-384 Support -----------*/
#define WOLF_CONF_SHA2_384 0
/*---------- SHA2-512 Support -----------*/
#define WOLF_CONF_SHA2_512 0
/*---------- SHA3 Support -----------*/
#define WOLF_CONF_SHA3 0
/*---------- Pre-Shared-Key Support -----------*/
#define WOLF_CONF_PSK 0
/*---------- Pwd Based Key Derivation Support -----------*/
#define WOLF_CONF_PWDBASED 0
/*---------- Keep Peer Cert Support -----------*/
#define WOLF_CONF_KEEP_PEER_CERT 0
/*---------- Base64 Encode Support -----------*/
#define WOLF_CONF_BASE64_ENCODE 0
/*---------- OpenSSL Extra Support -----------*/
#define WOLF_CONF_OPENSSL_EXTRA 0
/*---------- wolfCrypt test/benchmark -----------*/
#define WOLF_CONF_TEST 1
/*---------- WOLF_CONF_DEBUG -----------*/
#define WOLF_CONF_DEBUG 0
/*---------- WOLF_CONF_WOLFCRYPT_ONLY -----------*/
#define WOLF_CONF_WOLFCRYPT_ONLY 0
/*---------- WOLF_CONF_TLS13 -----------*/
#define WOLF_CONF_TLS13 1
/*---------- WOLF_CONF_TLS12 -----------*/
#define WOLF_CONF_TLS12 1
/*---------- WOLF_CONF_DTLS -----------*/
#define WOLF_CONF_DTLS 0
/*---------- WOLF_CONF_MATH -----------*/
#define WOLF_CONF_MATH 4
/*---------- WOLF_CONF_RTOS -----------*/
#define WOLF_CONF_RTOS 2
/*---------- WOLF_CONF_RSA -----------*/
#define WOLF_CONF_RSA 1
/*---------- WOLF_CONF_ECC -----------*/
#define WOLF_CONF_ECC 1
/*---------- WOLF_CONF_DH -----------*/
#define WOLF_CONF_DH 1
/*---------- WOLF_CONF_AESGCM -----------*/
#define WOLF_CONF_AESGCM 1
/*---------- WOLF_CONF_AESCBC -----------*/
#define WOLF_CONF_AESCBC 0
/*---------- WOLF_CONF_CHAPOLY -----------*/
#define WOLF_CONF_CHAPOLY 1
/*---------- WOLF_CONF_EDCURVE25519 -----------*/
#define WOLF_CONF_EDCURVE25519 0
/*---------- WOLF_CONF_MD5 -----------*/
#define WOLF_CONF_MD5 0
/*---------- WOLF_CONF_SHA1 -----------*/
#define WOLF_CONF_SHA1 0
/*---------- WOLF_CONF_SHA2_224 -----------*/
#define WOLF_CONF_SHA2_224 0
/*---------- WOLF_CONF_SHA2_256 -----------*/
#define WOLF_CONF_SHA2_256 1
/*---------- WOLF_CONF_SHA2_384 -----------*/
#define WOLF_CONF_SHA2_384 0
/*---------- WOLF_CONF_SHA2_512 -----------*/
#define WOLF_CONF_SHA2_512 0
/*---------- WOLF_CONF_SHA3 -----------*/
#define WOLF_CONF_SHA3 0
/*---------- WOLF_CONF_PSK -----------*/
#define WOLF_CONF_PSK 0
/*---------- WOLF_CONF_PWDBASED -----------*/
#define WOLF_CONF_PWDBASED 0
/*---------- WOLF_CONF_KEEP_PEER_CERT -----------*/
#define WOLF_CONF_KEEP_PEER_CERT 0
/*---------- WOLF_CONF_BASE64_ENCODE -----------*/
#define WOLF_CONF_BASE64_ENCODE 0
/*---------- WOLF_CONF_OPENSSL_EXTRA -----------*/
#define WOLF_CONF_OPENSSL_EXTRA 0
/*---------- WOLF_CONF_TEST -----------*/
#define WOLF_CONF_TEST 1
/* ------------------------------------------------------------------------- */
/* Hardware platform */
@@ -177,9 +178,25 @@ extern "C" {
#define NO_STM32_RNG
#define WOLFSSL_GENSEED_FORTEST
#else
#warning Please define a hardware platform!
#define WOLFSSL_STM32F4 /* default */
#warning Please define a hardware platform!
/* This means there is not a pre-defined platform for your board/CPU */
/* You need to define a CPU type, HW crypto and debug UART */
/* CPU Type: WOLFSSL_STM32F1, WOLFSSL_STM32F2, WOLFSSL_STM32F4,
WOLFSSL_STM32F7, WOLFSSL_STM32H7, WOLFSSL_STM32L4 and WOLFSSL_STM32L5 */
#define WOLFSSL_STM32F4
/* Debug UART used for printf */
/* The UART interface number varies for each board/CPU */
/* Typically this is the UART attached to the ST-Link USB CDC UART port */
#define HAL_CONSOLE_UART huart4
/* Hardware Crypto - uncomment as available on hardware */
//#define WOLFSSL_STM32_PKA
//#define NO_STM32_RNG
//#undef NO_STM32_HASH
//#undef NO_STM32_CRYPTO
//#define WOLFSSL_GENSEED_FORTEST
//#define STM32_HAL_V2
#endif
/* ------------------------------------------------------------------------- */
@@ -257,7 +274,7 @@ extern "C" {
#if defined(WOLF_CONF_PWDBASED) && WOLF_CONF_PWDBASED == 0
#define NO_PWDBASED
#endif
#if defined(WOLF_CONF_KEEPPEERCERT) && WOLF_CONF_KEEPPEERCERT == 1
#if defined(WOLF_CONF_KEEP_PEER_CERT) && WOLF_CONF_KEEP_PEER_CERT == 1
#define KEEP_PEER_CERT
#endif
#if defined(WOLF_CONF_BASE64_ENCODE) && WOLF_CONF_BASE64_ENCODE == 1
@@ -380,7 +397,7 @@ extern "C" {
#define HAVE_AES_DECRYPT
#endif
/* Other possible AES modes */
/* Other possible AES modes */
//#define WOLFSSL_AES_COUNTER
//#define HAVE_AESCCM
//#define WOLFSSL_AES_XTS
@@ -558,4 +575,4 @@ extern "C" {
}
#endif
#endif /*__WOLFSSL_WOLFSSL_CONF_H__ */
#endif /* __WOLFSSL_I_CUBE_WOLFSSL_CONF_H__ */

6
IDE/VisualDSP/include.am Normal file
View File

@@ -0,0 +1,6 @@
# vim:ft=automake
# included from Top Level Makefile.am
# All paths should be given relative to the root
EXTRA_DIST+= IDE/VisualDSP/user_settings.h
EXTRA_DIST+= IDE/VisualDSP/wolf_tasks.c

View File

@@ -0,0 +1,752 @@
/* user_settings.h
*
* Copyright (C) 2006-2021 wolfSSL Inc.
*
* This file is part of wolfSSL.
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
*/
/* Custom wolfSSL user settings for FIPS VALIDATION START */
#ifndef WOLFSSL_USER_SETTINGS_H
#define WOLFSSL_USER_SETTINGS_H
#ifdef __cplusplus
extern "C" {
#endif
#include "fusioncfg.h"
/* Previously was included in ssl.c but for the sake of portability and existing
* projects, moved to IDE specific user_settings.h (stdarg.h include)
*/
#include <stdarg.h>
/* ------------------------------------------------------------------------- */
/* Platform */
/* ------------------------------------------------------------------------- */
#undef WOLFSSL_GENERAL_ALIGNMENT
#define WOLFSSL_GENERAL_ALIGNMENT 4
#undef SINGLE_THREADED
#define SINGLE_THREADED
#undef WOLFSSL_SMALL_STACK
//#define WOLFSSL_SMALL_STACK
#undef WOLFSSL_USER_IO
// #define WOLFSSL_USER_IO
#define HAVE_PKCS8
/* ------------------------------------------------------------------------- */
/* Math Configuration */
/* ------------------------------------------------------------------------- */
#undef SIZEOF_LONG_LONG
#define SIZEOF_LONG_LONG 8
#undef USE_FAST_MATH
#if 1
#define USE_FAST_MATH
#undef TFM_TIMING_RESISTANT
#define TFM_TIMING_RESISTANT
/* Optimizations */
//#define TFM_ARM
#endif
/* Wolf Single Precision Math */
#undef WOLFSSL_SP
#if 0
#define WOLFSSL_SP
//#define WOLFSSL_SP_SMALL /* use smaller version of code */
#define WOLFSSL_HAVE_SP_RSA
#define WOLFSSL_HAVE_SP_DH
#define WOLFSSL_HAVE_SP_ECC
#define WOLFSSL_SP_CACHE_RESISTANT
//#define WOLFSSL_SP_MATH /* only SP math - eliminates fast math code */
/* 64 or 32 bit version */
//#define WOLFSSL_SP_ASM /* required if using the ASM versions */
//#define WOLFSSL_SP_ARM32_ASM
//#define WOLFSSL_SP_ARM64_ASM
#endif
/* ------------------------------------------------------------------------- */
/* FIPS - Requires eval or license from wolfSSL */
/* ------------------------------------------------------------------------- */
#undef HAVE_FIPS
#if 1
#define HAVE_FIPS
#undef HAVE_FIPS_VERSION
#define HAVE_FIPS_VERSION 2
#ifdef SINGLE_THREADED
#undef NO_THREAD_LS
#define NO_THREAD_LS
#endif
#define NO_ATTRIBUTE_CONSTRUCTOR /* Required on ADSP BLACKFIN where memory
* is zeroized after
* __attribute__((constructor)) and before
* main();
*/
#endif
/* ------------------------------------------------------------------------- */
/* Crypto */
/* ------------------------------------------------------------------------- */
/* RSA */
#undef NO_RSA
#if 1
#ifdef USE_FAST_MATH
/* Maximum math bits (Max RSA key bits * 2) */
#undef FP_MAX_BITS
#define FP_MAX_BITS 8192
#endif
/* half as much memory but twice as slow */
#undef RSA_LOW_MEM
//#define RSA_LOW_MEM
/* Enables blinding mode, to prevent timing attacks */
#if 1
#undef WC_RSA_BLINDING
#define WC_RSA_BLINDING
#else
#undef WC_NO_HARDEN
#define WC_NO_HARDEN
#endif
/* RSA PSS Support */
#if 1
#define WC_RSA_PSS
#endif
#if 1
#define WC_RSA_NO_PADDING
#endif
#else
#define NO_RSA
#endif
/* ECC */
#undef HAVE_ECC
#if 1
#define HAVE_ECC
/* Manually define enabled curves */
#undef ECC_USER_CURVES
//#define ECC_USER_CURVES
#ifdef ECC_USER_CURVES
/* Manual Curve Selection */
//#define HAVE_ECC192
//#define HAVE_ECC224
#undef NO_ECC256
//#define HAVE_ECC384
//#define HAVE_ECC521
#endif
/* Fixed point cache (speeds repeated operations against same private key) */
#undef FP_ECC
//#define FP_ECC
#ifdef FP_ECC
/* Bits / Entries */
#undef FP_ENTRIES
#define FP_ENTRIES 2
#undef FP_LUT
#define FP_LUT 4
#endif
/* Optional ECC calculation method */
/* Note: doubles heap usage, but slightly faster */
#undef ECC_SHAMIR
#define ECC_SHAMIR
/* Reduces heap usage, but slower */
#undef ECC_TIMING_RESISTANT
#define ECC_TIMING_RESISTANT
/* Enable cofactor support */
#ifdef HAVE_FIPS
#undef HAVE_ECC_CDH
#define HAVE_ECC_CDH
#define NO_STRICT_ECDSA_LEN
#endif
/* Validate import */
#ifdef HAVE_FIPS
#undef WOLFSSL_VALIDATE_ECC_IMPORT
#define WOLFSSL_VALIDATE_ECC_IMPORT
#endif
/* Compressed Key Support */
#undef HAVE_COMP_KEY
//#define HAVE_COMP_KEY
/* Use alternate ECC size for ECC math */
#ifdef USE_FAST_MATH
#ifdef NO_RSA
/* Custom fastmath size if not using RSA */
/* MAX = ROUND32(ECC BITS 256) + SIZE_OF_MP_DIGIT(32) */
#undef FP_MAX_BITS
#define FP_MAX_BITS (256 + 32)
#else
#undef ALT_ECC_SIZE
#define ALT_ECC_SIZE
#endif
/* Speedups specific to curve */
#ifndef NO_ECC256
#undef TFM_ECC256
#define TFM_ECC256
#endif
#endif
#endif
/* DH */
#undef NO_DH
#if 1
/* Use table for DH instead of -lm (math) lib dependency */
#if 0
#define WOLFSSL_DH_CONST
#define HAVE_FFDHE_2048
#define HAVE_FFDHE_4096
#define HAVE_DH_DEFAULT_PARAMS
//#define HAVE_FFDHE_6144
//#define HAVE_FFDHE_8192
#endif
#ifdef HAVE_FIPS
#define WOLFSSL_VALIDATE_FFC_IMPORT
#define HAVE_FFDHE_Q
#endif
#else
#define NO_DH
#endif
/* AES */
#undef NO_AES
#if 1
#undef HAVE_AES_CBC
#define HAVE_AES_CBC
#undef HAVE_AESGCM
#define HAVE_AESGCM
/* GCM Method: GCM_SMALL, GCM_WORD32 or GCM_TABLE */
#define GCM_SMALL
#undef WOLFSSL_AES_DIRECT
#define WOLFSSL_AES_DIRECT
#undef HAVE_AES_ECB
#define HAVE_AES_ECB
#undef WOLFSSL_AES_COUNTER
#define WOLFSSL_AES_COUNTER
#undef HAVE_AESCCM
#define HAVE_AESCCM
#else
#define NO_AES
#endif
/* DES3 */
#undef NO_DES3
#if 1
#else
#define NO_DES3
#endif
/* ChaCha20 / Poly1305 */
#undef HAVE_CHACHA
#undef HAVE_POLY1305
#if 0
#define HAVE_CHACHA
#define HAVE_POLY1305
/* Needed for Poly1305 */
#undef HAVE_ONE_TIME_AUTH
#define HAVE_ONE_TIME_AUTH
#endif
/* Ed25519 / Curve25519 */
#undef HAVE_CURVE25519
#undef HAVE_ED25519
#if 0
#define HAVE_CURVE25519
#define HAVE_ED25519 /* ED25519 Requires SHA512 */
/* Optionally use small math (less flash usage, but much slower) */
#if 1
#define CURVED25519_SMALL
#endif
#endif
/* ------------------------------------------------------------------------- */
/* Hashing */
/* ------------------------------------------------------------------------- */
/* Sha */
#undef NO_SHA
#if 1
/* 1k smaller, but 25% slower */
//#define USE_SLOW_SHA
#else
#define NO_SHA
#endif
/* Sha256 */
#undef NO_SHA256
#if 1
/* not unrolled - ~2k smaller and ~25% slower */
//#define USE_SLOW_SHA256
/* Sha224 */
#if 1
#define WOLFSSL_SHA224
#endif
#else
#define NO_SHA256
#endif
/* Sha512 */
#undef WOLFSSL_SHA512
#if 1
#define WOLFSSL_SHA512
/* Sha384 */
#undef WOLFSSL_SHA384
#if 1
#define WOLFSSL_SHA384
#endif
/* over twice as small, but 50% slower */
//#define USE_SLOW_SHA512
#endif
/* Sha3 */
#undef WOLFSSL_SHA3
#if 1
#define WOLFSSL_SHA3
#ifdef HAVE_FIPS
#define WOLFSSL_NO_SHAKE256
#endif
#endif
/* MD5 */
#undef NO_MD5
#if 1
#else
#define NO_MD5
#endif
/* HKDF */
#undef HAVE_HKDF
#if 1
#define HAVE_HKDF
#endif
/* CMAC */
#undef WOLFSSL_CMAC
#if 1
#define WOLFSSL_CMAC
#endif
/* ------------------------------------------------------------------------- */
/* Benchmark / Test */
/* ------------------------------------------------------------------------- */
/* Use reduced benchmark / test sizes */
#undef BENCH_EMBEDDED
#define BENCH_EMBEDDED
#undef USE_CERT_BUFFERS_2048
//#define USE_CERT_BUFFERS_2048
//#undef USE_CERT_BUFFERS_1024
//#define USE_CERT_BUFFERS_1024
#undef USE_CERT_BUFFERS_256
//#define USE_CERT_BUFFERS_256
/* ------------------------------------------------------------------------- */
/* Debugging */
/* ------------------------------------------------------------------------- */
#undef DEBUG_WOLFSSL
#undef NO_ERROR_STRINGS
#if 1 //for debug wolfssl_init.
#define DEBUG_WOLFSSL
#else
#if 0
#define NO_ERROR_STRINGS
#endif
#endif
/* ------------------------------------------------------------------------- */
/* Memory */
/* ------------------------------------------------------------------------- */
/* Override Memory API's */
#if 1
#undef XMALLOC_OVERRIDE
#define XMALLOC_OVERRIDE
#include <fclstdlib.h>
#define XMALLOC(n, h, t) FCL_MALLOC(n)
#define XFREE(p, h, t) FCL_FREE(p)
#define XREALLOC(p, n, h, t) FCL_REALLOC(p, n)
#define XATOI(s) FCL_ATOI(s)
#endif
#if 0
/* Static memory requires fast math */
#define WOLFSSL_STATIC_MEMORY
/* Disable fallback malloc/free */
#define WOLFSSL_NO_MALLOC
#if 0
#define WOLFSSL_MALLOC_CHECK /* trap malloc failure */
#endif
#endif
/* Memory callbacks */
#if 0
#undef USE_WOLFSSL_MEMORY
#define USE_WOLFSSL_MEMORY
/* Use this to measure / print heap usage */
#if 0
#undef WOLFSSL_TRACK_MEMORY
#define WOLFSSL_TRACK_MEMORY
#undef WOLFSSL_DEBUG_MEMORY
#define WOLFSSL_DEBUG_MEMORY
#endif
#else
#ifndef WOLFSSL_STATIC_MEMORY
#define NO_WOLFSSL_MEMORY
/* Otherwise we will use stdlib malloc, free and realloc */
#endif
#endif
/* ------------------------------------------------------------------------- */
/* Port */
/* ------------------------------------------------------------------------- */
/* Override Current Time */
/* Allows custom "custom_time()" function to be used for benchmark */
//#define WOLFSSL_USER_CURRTIME
//#define WOLFSSL_GMTIME
//#define USER_TICKS
//extern unsigned long my_time(unsigned long* timer);
//#define XTIME my_time
#if 1
#include "fcltime.h"
#define time_t fclTime_t
#define USER_TIME
time_t fclTime( time_t* tod );
#define XTIME fclTime
#define XCTIME fclCtime
#define HAVE_TIME_T_TYPE
#endif
/* ------------------------------------------------------------------------- */
/* RNG */
/* ------------------------------------------------------------------------- */
/* Seed Source */
/* Size of returned HW RNG value */
#if 0
#define CUSTOM_RAND_TYPE unsigned int
extern unsigned int my_rng_seed_gen(void);
#undef CUSTOM_RAND_GENERATE
#define CUSTOM_RAND_GENERATE my_rng_seed_gen
#endif
/* Choose RNG method */
#if 1
/* Use built-in P-RNG (SHA256 based) with HW RNG */
/* P-RNG + HW RNG (P-RNG is ~8K) */
#undef HAVE_HASHDRBG
#define HAVE_HASHDRBG
#else
#undef WC_NO_HASHDRBG
#define WC_NO_HASHDRBG
/* Bypass P-RNG and use only HW RNG */
extern int my_rng_gen_block(unsigned char* output, unsigned int sz);
#undef CUSTOM_RAND_GENERATE_BLOCK
#define CUSTOM_RAND_GENERATE_BLOCK my_rng_gen_block
#endif
/* ------------------------------------------------------------------------- */
/* Custom Standard Lib */
/* ------------------------------------------------------------------------- */
/* Allows override of all standard library functions */
#undef STRING_USER
#if 1
#define STRING_USER
#include <fclstring.h>
#undef USE_WOLF_STRSEP
#define USE_WOLF_STRSEP
#define XSTRSEP(s1,d) wc_strsep((s1),(d))
#undef USE_WOLF_STRTOK
#define USE_WOLF_STRTOK
#define XSTRTOK(s1,d,ptr) wc_strtok((s1),(d),(ptr))
#define XSTRNSTR(s1,s2,n) FCL_STRSTR((s1),(s2))
#define XMEMCPY(d,s,l) FCL_MEMCPY((d),(s),(l))
#define XMEMSET(b,c,l) FCL_MEMSET((b),(c),(l))
#define XMEMCMP(s1,s2,n) FCL_MEMCMP((s1),(s2),(n))
#define XMEMMOVE(d,s,l) FCL_MEMMOVE((d),(s),(l))
#define XSTRLEN(s1) FCL_STRLEN((s1))
#define XSTRNCPY(s1,s2,n) FCL_STRNCPY((s1),(s2),(n))
#define XSTRSTR(s1,s2) FCL_STRSTR((s1),(s2))
#define XSTRNCMP(s1,s2,n) FCL_STRNCMP((s1),(s2),(n))
#define XSTRNCAT(s1,s2,n) FCL_STRNCAT((s1),(s2),(n))
#define XSTRNCASECMP(s1,s2,n) FCL_STRNCASECMP((s1),(s2),(n))
#define XSNPRINTF FCL_SNPRINTF
#endif
/* ------------------------------------------------------------------------- */
/* Enable Features */
/* ------------------------------------------------------------------------- */
#undef WOLFSSL_TLS13
#if 0
#define WOLFSSL_TLS13
#endif
#undef WOLFSSL_KEY_GEN
#if 1
#define WOLFSSL_KEY_GEN
#endif
#if defined(HAVE_FIPS) && !defined(WOLFSSL_KEY_GEN)
#define WOLFSSL_OLD_PRIME_CHECK
#endif
#undef KEEP_PEER_CERT
//#define KEEP_PEER_CERT
#undef HAVE_COMP_KEY
//#define HAVE_COMP_KEY
#undef HAVE_TLS_EXTENSIONS
//#define HAVE_TLS_EXTENSIONS
#undef HAVE_SUPPORTED_CURVES
#define HAVE_SUPPORTED_CURVES
#undef WOLFSSL_BASE64_ENCODE
#define WOLFSSL_BASE64_ENCODE
/* TLS Session Cache */
#if 0
#define SMALL_SESSION_CACHE
#else
// #define NO_SESSION_CACHE
#endif
#undef WOLFSSL_ALLOW_SSLV3
#define WOLFSSL_ALLOW_SSLV3
#undef WOLFSSL_ALLOW_TLSV10
#define WOLFSSL_ALLOW_TLSV10
/* ------------------------------------------------------------------------- */
/* Disable Features */
/* ------------------------------------------------------------------------- */
#undef NO_WOLFSSL_SERVER
//#define NO_WOLFSSL_SERVER
#undef NO_WOLFSSL_CLIENT
//#define NO_WOLFSSL_CLIENT
#undef NO_CRYPT_TEST
//#define NO_CRYPT_TEST
#undef NO_CRYPT_BENCHMARK
//#define NO_CRYPT_BENCHMARK
#undef WOLFCRYPT_ONLY
//#define WOLFCRYPT_ONLY
/* In-lining of misc.c functions */
/* If defined, must include wolfcrypt/src/misc.c in build */
/* Slower, but about 1k smaller */
#undef NO_INLINE
//#define NO_INLINE
#undef NO_FILESYSTEM
//#define NO_FILESYSTEM
#undef NO_WRITEV
#define NO_WRITEV
#undef NO_MAIN_DRIVER
#define NO_MAIN_DRIVER
#undef NO_DEV_RANDOM
//#define NO_DEV_RANDOM
#undef NO_DSA
//#define NO_DSA
#undef NO_RC4
#define NO_RC4
#undef NO_OLD_TLS
//#define NO_OLD_TLS
#undef NO_HC128
#define NO_HC128
#undef NO_RABBIT
#define NO_RABBIT
#undef NO_PSK
#define NO_PSK
#undef NO_MD4
#define NO_MD4
#undef NO_PWDBASED
//#define NO_PWDBASED
#undef NO_CODING
//#define NO_CODING
#undef NO_ASN_TIME
//#define NO_ASN_TIME
#undef NO_CERTS
//#define NO_CERTS
#undef NO_SIG_WRAPPER
//#define NO_SIG_WRAPPER
#undef NO_MAIN_DRIVER
#define NO_MAIN_DRIVER
#undef BLACKFIN_BUILD
#define BLACKFIN_BUILD
#ifdef BLACKFIN_BUILD
#include <builtins.h>
#undef WOLFSSL_HAVE_MAX
#define WOLFSSL_HAVE_MAX
#undef WOLFSSL_HAVE_MIN
#define WOLFSSL_HAVE_MIN
#include <fss_telnet_shell.h>
#define XMALLOC_OVERRIDE /* Need to use FCL stdlib instead of stdlib.h */
extern void * fclMalloc (unsigned int size);
extern void fclFree (void * memoryPointer);
extern void * fclRealloc (void * memoryPointer, unsigned int size);
#define XMALLOC(a, b, c) fclMalloc(a)
#define XFREE(a, b, c) fclFree(a)
#define XREALLOC(a, b, c, d) fclRealloc(a, b)
/*************************************************************
* wolfSSL testing
*/
typedef struct wolfArgs {
int argc;
char** argv;
int return_code;
struct fssShellInfo* info;
} wolfArgs;
#define printf FCL_PRINTF
#define WOLFSSL_BASE16
extern int aes_test_for_fips_hash(void);
int wolfcrypt_test_taskEnter(void *args);
int wolfcrypt_harness_taskEnter(void *args);
int wolf_task_start(void* voidinfo, char* argline);
int wolf_task_results(void* voidinfo, char* argline);
void wolfFIPS_Module_start(void);
/* For op testing */
#define USE_CERT_BUFFERS_2048
#define USE_CERT_BUFFERS_256
//#define NO_FILESYSTEM
#define OPENSSL_EXTRA
#define OPENSSL_ALL
#define HAVE_EX_DATA
#define WOLFSSL_EVP_DECRYPT_LEGACY
/* TLS 1.3 support */
#define WOLFSSL_TLS13
#define HAVE_TLS_EXTENSIONS
#define HAVE_SUPPORTED_CURVES
#define HAVE_ECC
#define HAVE_HKDF
#define HAVE_FFDHE_4096
#define WC_RSA_PSS
/* for static ciphers */
#define WOLFSSL_STATIC_RSA
#define WOLFSSL_STATIC_PSK
#define WOLFSSL_STATIC_EPHEMERAL
#define WOLFSSL_SNIFFER
/* TEMPORARY */
#define USING_JTAG
#endif /* BLACKFIN_BUILD */
#ifdef __cplusplus
}
#endif
#endif /* WOLFSSL_USER_SETTINGS_H */

117
IDE/VisualDSP/wolf_tasks.c Normal file
View File

@@ -0,0 +1,117 @@
/* wolf-tasks.c
*
* Copyright (C) 2006-2021 wolfSSL Inc.
*
* This file is part of wolfSSL.
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
*/
#include <wolfssl/wolfcrypt/settings.h>
#include <wolfcrypt/test/test.h>
#include <wolfssl/wolfcrypt/error-crypt.h>
#include <wolfssl/wolfcrypt/fips_test.h>
#ifdef FUSION_RTOS
#include <fcl_os.h>
#define RESULT_BUF_SIZE 1024
typedef struct {
int isRunning;
u8 buf[RESULT_BUF_SIZE];
int len;
} wolf_result_t;
static wolf_result_t _result = {0};
static void myFipsCb(int ok, int err, const char* hash);
static void myFipsCb(int ok, int err, const char* hash)
{
FCL_PRINTF("in my Fips callback, ok = %d, err = %d\n", ok, err);
FCL_PRINTF("message = %s\n", wc_GetErrorString(err));
FCL_PRINTF("hash = %s\n", hash);
if (err == IN_CORE_FIPS_E) {
FCL_PRINTF("In core integrity hash check failure, copy above hash\n");
FCL_PRINTF("into verifyCore[] in fips_test.c and rebuild\n");
}
}
static fclThreadHandle _task = NULL;
#define WOLF_TASK_STACK_SIZE (1024 * 100)
fclThreadPriority WOLF_TASK_PRIORITY = (fclThreadPriority) (FCL_THREAD_PRIORITY_TIME_CRITICAL+1);
int wolfcrypt_test_taskEnter(void *args)
{
int ret;
wolfCrypt_SetCb_fips(myFipsCb);
ret = wolfcrypt_test(args);
printf("Result of test was %d\n", ret);
_result.isRunning = 0;
fosTaskDelete(_task);
return 0;
}
/* Was only needed for CAVP testing purposes, not required for release.
int wolfcrypt_harness_taskEnter(void *args)
{
wolfCrypt_SetCb_fips(myFipsCb);
wolfcrypt_harness(args);
_result.isRunning = 0;
fosTaskDelete(_task);
return 0;
}
*/
int wolf_task_start(void* voidinfo, char* argline)
{
char optionA[] = "wolfcrypt_test";
fssShellInfo *info = (fssShellInfo*)voidinfo;
struct wolfArgs args;
if (_result.isRunning) {
fssShellPuts(info, "previous task still running\r\n");
return 1;
}
_result.isRunning = 1;
if (FCL_STRNCMP(argline, optionA, FCL_STRLEN(optionA)) == 0) {
_task = fclThreadCreate(wolfcrypt_test_taskEnter,
&args,
WOLF_TASK_STACK_SIZE,
WOLF_TASK_PRIORITY);
} else if (FCL_STRNCMP(argline, optionB, FCL_STRLEN(optionB)) == 0) {
_task = fclThreadCreate(wolfcrypt_harness_taskEnter,
&args,
WOLF_TASK_STACK_SIZE,
WOLF_TASK_PRIORITY);
} else {
printf("Invalid input: %s\n", argline);
printf("Please try with either wolfcrypt_test or wolfcrypt_harness\n");
return -1;
}
FCL_ASSERT(_task != FCL_THREAD_HANDLE_INVALID);
return 0;
}
#endif /* FUSION_RTOS */

View File

@@ -20,6 +20,7 @@ include IDE/CSBENCH/include.am
include IDE/ECLIPSE/DEOS/include.am
include IDE/ECLIPSE/MICRIUM/include.am
include IDE/ECLIPSE/SIFIVE/include.am
include IDE/MQX/include.am
include IDE/ECLIPSE/RTTHREAD/include.am
include IDE/mynewt/include.am
include IDE/Renesas/e2studio/DK-S7G2/include.am
@@ -34,6 +35,7 @@ include IDE/M68K/include.am
include IDE/HEXAGON/include.am
include IDE/RISCV/include.am
include IDE/XilinxSDK/include.am
include IDE/VisualDSP/include.am
EXTRA_DIST+= IDE/IAR-EWARM IDE/MDK-ARM IDE/MDK5-ARM IDE/MYSQL IDE/LPCXPRESSO IDE/HEXIWEAR IDE/Espressif IDE/zephyr
EXTRA_DIST+= IDE/OPENSTM32/README.md

View File

@@ -27,7 +27,9 @@ DIST_SUBDIRS_OPT =
@INC_AMINCLUDE@
DISTCLEANFILES+= aminclude.am
CLEANFILES+= cert.der \
CLEANFILES+= ecc-key.der \
ecc-public-key.der \
cert.der \
cert.pem \
certecc.der \
certecc.pem \

181
README
View File

@@ -73,155 +73,56 @@ should be used for the enum name.
*** end Notes ***
# wolfSSL Release 4.6.0 (December 22, 2020)
Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
# wolfSSL Release 4.7.0 (February 16, 2021)
Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
### New Feature Additions
###### New Build Options
* wolfSSL now enables linux kernel module support. Big news for Linux kernel module developers with crypto requirements! wolfCrypt and wolfSSL are now loadable as modules in the Linux kernel, providing the entire libwolfssl API natively to other kernel modules. For the first time on Linux, the entire TLS protocol stack can be loaded as a module, allowing fully kernel-resident TLS/DTLS endpoints with in-kernel handshaking. (--enable-linuxkm, --enable-linuxkm-defaults, --with-linux-source) (https://www.wolfssl.com/loading-wolfssl-into-the-linux-kernel/)
* Build tests and updated instructions for use with Apples A12Z chipset (https://www.wolfssl.com/preliminary-cryptographic-benchmarks-on-new-apple-a12z-bionic-platform/)
* Expansion of wolfSSL SP math implementation and addition of --enable-sp-math-all build option
* Apache httpd w/TLS 1.3 support added
* Sniffer support for TLS 1.3 and AES CCM
* Support small memory footprint build with only TLS 1.3 and PSK without code for (EC)DHE and certificates
###### New Hardware Acceleration
* Added support for NXP DCP (i.MX RT1060/1062) crypto co-processor
* Add Silicon Labs hardware acceleration using [SL SE Manager](https://docs.silabs.com/gecko-platform/latest/service/api/group-sl-se-manager)
###### New Algorithms
* RC2 ECB/CBC added for use with PKCS#12 bundles
* XChaCha and the XChaCha20-Poly1305 AEAD algorithm support added
###### Misc
* Added support for 802.11Q VLAN frames to sniffer
* Added OCSP function wolfSSL_get_ocsp_producedDate
* Added API to set CPU ID flags cpuid_select_flags, cpuid_set_flag, cpuid_clear_flag
* New DTLS/TLS non-blocking Secure Renegotiation example added to server.c and client.c
* Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API, X509_STORE_CTX API added
* WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
* Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session tickets with TLS 1.2 while keeping TLS 1.3 session tickets available
* Implement RFC 5705: Keying Material Exporters for TLS
* Added --enable-reproducible-build flag for making more deterministic library outputs to assist debugging
### Fixes
###### Math Library
* Fix mp_to_unsigned_bin_len out of bounds read with buffers longer than maximum MP
* Fix for fp_read_radix_16 out of bounds read
* Fix to add wrapper for new timing resistant wc_ecc_mulmod_ex2 function version in HW ECC acceleration
* Handle an edge case with RSA-PSS encoding message to hash
* Fix to free mutex when cert manager is freed
* Compatibility layer EVP function to return the correct block size and type
* DTLS secure renegotiation fixes including resetting timeout and retransmit on duplicate HelloRequest
* Fix for edge case with shrink buffer and secure renegotiation
* Compile fix for type used with curve448 and PPC64
* Fixes for SP math all with PPC64 and other embedded compilers
* SP math all fix when performing montgomery reduction on one word modulus
* Fixes to SP math all to better support digit size of 8-bit
* Fix for results of edge case with SP integer square operation
* Stop non-ct mod inv from using register x29 with SP ARM64 build
* Fix edge case when generating z value of ECC with SP code
* Fixes for PKCS7 with crypto callback (devId) with RSA and RNG
* Fix for compiling builds with RSA verify and public only
* Fix for PKCS11 not properly exporting the public key due to a missing key type field
* Call certificate callback with certificate depth issues
* Fix for out-of-bounds read in TLSX_CSR_Parse()
* Fix incorrect AES-GCM tag generation in the EVP layer
* Fix for out of bounds write with SP math all enabled and an edge case of calling sp_tohex on the result of sp_mont_norm
* Fix for parameter check in sp_rand_prime to handle 0 length values
* Fix for edge case of failing malloc resulting in an out of bounds write with SHA256/SHA512 when small stack is enabled
###### Compatibility Layer Fixes
* Fix for setting serial number wolfSSL_X509_set_serialNumber
* Fix for setting ASN1 time not before / not after with WOLFSSL_X509
* Fix for order of components in issuer name when using X509_sign
* Fix for compatibility layer API DH_compute_key
* EVP fix incorrect block size for GCM and buffer up AAD for encryption/decryption
* EVP fix for AES-XTS key length return value and fix for string compare calls
* Fix for mutex freeing during RNG failure case with EVP_KEY creation
* Non blocking use with compatibility layer BIOs in TLS connections
###### Build Configuration
* Fix for custom build with WOLFSSL_USER_MALLOC defined
* ED448 compiler warning on Intel 32bit systems
* CURVE448_SMALL build fix for 32bit systems with Curve448
* Fix to build SP math with IAR
* CMake fix to only set ranlib arguments for Mac, and for stray typo of , -> ;
* Build with --enable-wpas=small fix
* Fix for building fips ready using openssl extra
* Fixes for building with Microchip (min/max and undef SHA_BLOCK_SIZE)
* FIx for NO_FILESYSTEM build on Windows
* Fixed SHA256 support for IMX-RT1060
* Fix for ECC key gen with NO_TFM_64BIT
###### Sniffer
* Fixes for sniffer when using static ECC keys. Adds back TLS v1.2 static ECC key fallback detection and fixes new ECC RNG requirement for timing resistance
* Fix for sniffer with SNI enabled to properly handle WOLFSSL_SUCCESS error code in ProcessClientHello
* Fix for sniffer using HAVE_MAX_FRAGMENT in "certificate" type message
* Fix build error with unused "ret" when building with WOLFSSL_SNIFFER_WATCH.
* Fix to not treat cert/key not found as error in myWatchCb and WOLFSSL_SNIFFER_WATCH.
* Sniffer fixes for handling TCP `out-of-range sequence number`
* Fixes SSLv3 use of ECDH in sniffer
###### PKCS
* PKCS#11 fix to generate ECC key for decrypt/sign or derive
* Fix for resetting internal variables when parsing a malformed PKCS#7 bundle with PKCS7_VerifySignedData()
* Verify the extracted public key in wc_PKCS7_InitWithCert
* Fix for internal buffer size when using decompression with PKCS#7
###### Misc
* Pin the C# verify callback function to keep from garbage collection
* DH fixes for when public key is owned and freed after a handshake
* Fix for TLS 1.3 early data packets
* Fix for STM32 issue with some Cube HAL versions and STM32 example timeout
* Fix mmCAU and LTC hardware mutex locking to prevent double lock
* Fix potential race condition with CRL monitor
* Fix for possible malformed encrypted key with 3DES causing negative length
* AES-CTR performance fixed with AES-NI
### Improvements/Optimizations
##### SP and Math
* mp_radix_size adjustment for leading 0
* Resolve implicit cast warnings with SP build
* Change mp_sqr to return an error if the result won't fit into the fixed length dp
* ARM64 assembly with clang improvements, clang doesn't always handle use of x29 (FP or Frame Pointer) in inline assembly code correctly - reworked sp_2048_sqr_8 to not use x29
* SP mod exp changed to support exponents of different lengths
* TFM div: fix initial value of size in q so clamping doesn't OOB read
* Numerous stack depth improvements with --enable-smallstack
* Improve cache resistance with Base64 operations
* Added --enable-wolftpm option for easily building wolfSSL to be used with wolfTPM
* DTLS macro WOLFSSL_DTLS_RESEND_ONLY_TIMEOUT added for resending flight only after a timeout
* Update linux kernel module to use kvmalloc and kvfree
* Add user settings option to cmake build
* Added support for AES GCM session ticket encryption
* Thread protection for global RNG used by wolfSSL_RAND_bytes function calls
* Sanity check on FIPs configure flag used against the version of FIPs bundle
* --enable-aesgcm=table now is compatible with --enable-linuxkm
* Increase output buffer size that wolfSSL_RAND_bytes can handle
* Out of directory builds resolved, wolfSSL can now be built in a separate directory than the root wolfssl directory
###### TLS 1.3
* TLS 1.3 wolfSSL_peek want read return addition
* TLS 1.3: Fix P-521 algorithm matching
### Vulnerabilities
* [HIGH] CVE-2021-3336: In earlier versions of wolfSSL there exists a potential man in the middle attack on TLS 1.3 clients. Malicious attackers with a privileged network position can impersonate TLS 1.3 servers and bypass authentication. Users that have applications with client side code and have TLS 1.3 turned on, should update to the latest version of wolfSSL. Users that do not have TLS 1.3 turned on, or that are server side only, are NOT affected by this report. For the code change see https://github.com/wolfSSL/wolfssl/pull/3676.
* [LOW] In the case of using custom ECC curves there is the potential for a crafted compressed ECC key that has a custom prime value to cause a hang when imported. This only affects applications that are loading in ECC keys with wolfSSL builds that have compressed ECC keys and custom ECC curves enabled.
* [LOW] With TLS 1.3 authenticated-only ciphers a section of the server hello could contain 16 bytes of uninitialized data when sent to the connected peer. This affects only a specific build of wolfSSL with TLS 1.3 early data enabled and using authenticated-only ciphers with TLS 1.3.
###### PKCS
* Improvements and refactoring to PKCS#11 key look up
* PKCS #11 changes for signing and loading RSA public key from private
* check PKCS#7 SignedData private key is valid before using it
* check PKCS#7 VerifySignedData content length against total bundle size to avoid large malloc
###### Compatibility Layer
* EVP add block size for more ciphers in wolfSSL_EVP_CIPHER_block_size()
* Return long names instead of short names in wolfSSL_OBJ_obj2txt()
* Add additional OpenSSL compatibility functions to update the version of Apache httpd supported
* add "CCM8" variants to cipher_names "CCM-8" ciphers, for OpenSSL compat
###### Builds
* Cortex-M SP ASM support for IAR 6.70
* STM Cube pack support (IDE/STM32Cube)
* Build option --enable-aesgcm=4bit added for AES-GCM GMULT using 4 bit table
* Xilinx IDE updates to allow XTIME override for Xilinx, spelling fixes in Xilinx README.md, and add Xilinx SDK printf support
* Added ED448 to the "all" options and ED448 check key null argument sanity check
* Added ARC4, 3DES, nullcipher, BLAKE2, BLAKE2s, XChaCha, MD2, and MD4 to the “all” options
* Added an --enable-all-crypto option, to enable only the wolfCrypt features of --enable-all, combinable with --enable-cryptonly
* Added the ability to selectively remove features from --enable-all and --enable-all-crypto using specific --disable-<feature> options
* Use Intel intrinsics with Windows for RDSEED and RDRAND (thanks to dr-m from MariaDB)
* Add option to build with WOLFSSL_NO_CLIENT_AUTH
* Updated build requirements for wolfSSH use to be less restrictive
* lighttpd support update for v1.4.56
* Added batch file to copy files to ESP-IDF folders and resolved warnings when using v4.0 ESP-IDF
* Added --enable-stacksize=verbose, showing at a glance the stack high water mark for each subtest in testwolfcrypt
###### ECC
* Performance increase for ECC verify only, using non constant time SP modinv
* During ECC verify add validation of r and s before any use
* Always use safe add and dbl with ECC
* Timing resistant scalar multiplication updated with use of Joye double-add ladder
* Update mp_jacobi function to reduce stack and increase performance for base ECC build
* Reduce heap memory use with wc_EccPrivateKeyDecode, Improvement to ECC wc_ecc_sig_to_rs and wc_ecc_rs_raw_to_sig to reduce memory use (avoid the mp_int)
* Improve StoreECC_DSA_Sig bounds checking
###### OCSP
* OCSP improvement to handle extensions in singleResponse
* support for OCSP request/response for multiple certificates
* OCSP Must Staple option added to require OCSP stapling response
* Add support for id-pkix-ocsp-nocheck extension
###### Misc
* Additional code coverage added for ECC and RSA, PKCS#7, 3DES, EVP and Blake2b operations
* DTLS MTU: check MTU on write
* Refactor hash sig selection and add the macros WOLFSSL_STRONGEST_HASH_SIG (picks the strongest hash) and WOLFSSL_ECDSA_MATCH_HASH (will pick the hash to match the ECC curve)
* Strict certificate version allowed from client, TLS 1.2 / 1.3 can not accept client certificates lower than version 3
* wolfSSL_get_ciphers_compat(), skip the fake indicator ciphers like the renegotiation indication and the quantum-safe hybrid
* When parsing session ticket, check TLS version to see whether they are version compatible
* Additional sanity check for invalid ASN1 padding on integer type
* Adding in ChaCha20 streaming feature with Mac and Intel assembly build
* Sniffer build with --enable-oldtls option on
For additional vulnerability information visit the vulnerability page at
https://www.wolfssl.com/docs/security-vulnerabilities/

287
README.md
View File

@@ -1,227 +1,130 @@
*** Description ***
<a href="https://repology.org/project/wolfssl/versions">
<img src="https://repology.org/badge/vertical-allrepos/wolfssl.svg" alt="Packaging status" align="right">
</a>
The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS
library written in ANSI C and targeted for embedded, RTOS, and
resource-constrained environments - primarily because of its small size, speed,
and feature set. It is commonly used in standard operating environments as well
because of its royalty-free pricing and excellent cross platform support.
wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.2
levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers
such as ChaCha20, Curve25519, NTRU, and Blake2b. User benchmarking and feedback
reports dramatically better performance when using wolfSSL over OpenSSL.
# wolfSSL Embedded SSL/TLS Library
wolfSSL is powered by the wolfCrypt library. Two versions of the wolfCrypt
cryptography library have been FIPS 140-2 validated (Certificate #2425 and
certificate #3389). For additional information, visit the wolfCrypt FIPS FAQ
(https://www.wolfssl.com/license/fips/) or contact fips@wolfssl.com
The [wolfSSL embedded SSL library](https://www.wolfssl.com/products/wolfssl/)
(formerly CyaSSL) is a lightweight SSL/TLS library written in ANSI C and
targeted for embedded, RTOS, and resource-constrained environments - primarily
because of its small size, speed, and feature set. It is commonly used in
standard operating environments as well because of its royalty-free pricing
and excellent cross platform support. wolfSSL supports industry standards up
to the current [TLS 1.3](https://www.wolfssl.com/tls13) and DTLS 1.2, is up to
20 times smaller than OpenSSL, and offers progressive ciphers such as ChaCha20,
Curve25519, NTRU, and Blake2b. User benchmarking and feedback reports
dramatically better performance when using wolfSSL over OpenSSL.
*** Why choose wolfSSL? ***
wolfSSL is powered by the wolfCrypt cryptography library. Two versions of
wolfCrypt have been FIPS 140-2 validated (Certificate #2425 and
certificate #3389). FIPS 140-3 validation is in progress. For additional
information, visit the [wolfCrypt FIPS FAQ](https://www.wolfssl.com/license/fips/)
or contact fips@wolfssl.com.
There are many reasons to choose wolfSSL as your embedded SSL solution. Some of
the top reasons include size (typical footprint sizes range from 20-100 kB),
support for the newest standards (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3,
DTLS 1.0, and DTLS 1.2), current and progressive cipher support (including
stream ciphers), multi-platform, royalty free, and an OpenSSL compatibility API
to ease porting into existing applications which have previously used the
OpenSSL package. For a complete feature list, see chapter 4 of the wolfSSL
manual. (https://www.wolfssl.com/docs/wolfssl-manual/ch4/)
## Why Choose wolfSSL?
*** Notes, Please read ***
There are many reasons to choose wolfSSL as your embedded, desktop, mobile, or
enterprise SSL/TLS solution. Some of the top reasons include size (typical
footprint sizes range from 20-100 kB), support for the newest standards
(SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3, DTLS 1.0, and DTLS 1.2), current
and progressive cipher support (including stream ciphers), multi-platform,
royalty free, and an OpenSSL compatibility API to ease porting into existing
applications which have previously used the OpenSSL package. For a complete
feature list, see [Chapter 4](https://www.wolfssl.com/docs/wolfssl-manual/ch4/)
of the wolfSSL manual.
Note 1)
## Notes, Please Read
**Note 1)**
wolfSSL as of 3.6.6 no longer enables SSLv3 by default. wolfSSL also no longer
supports static key cipher suites with PSK, RSA, or ECDH. This means if you
plan to use TLS cipher suites you must enable DH (DH is on by default), or
enable ECC (ECC is on by default), or you must enable static key cipher suites
with
with one or more of the following defines:
WOLFSSL_STATIC_DH
WOLFSSL_STATIC_RSA
or
WOLFSSL_STATIC_PSK
though static key cipher suites are deprecated and will be removed from future
Though static key cipher suites are deprecated and will be removed from future
versions of TLS. They also lower your security by removing PFS. Since current
NTRU suites available do not use ephemeral keys, WOLFSSL_STATIC_RSA needs to be
used in order to build with NTRU suites.
NTRU suites available do not use ephemeral keys, ```WOLFSSL_STATIC_RSA``` needs
to be used in order to build with NTRU suites.
When compiling ssl.c, wolfSSL will now issue a compiler error if no cipher
suites are available. You can remove this error by defining
WOLFSSL_ALLOW_NO_SUITES in the event that you desire that, i.e., you're not
using TLS cipher suites.
```WOLFSSL_ALLOW_NO_SUITES``` in the event that you desire that, i.e., you're
not using TLS cipher suites.
Note 2)
**Note 2)**
wolfSSL takes a different approach to certificate verification than OpenSSL
does. The default policy for the client is to verify the server, this means
that if you don't load CAs to verify the server you'll get a connect error,
no signer error to confirm failure (-188).
If you want to mimic OpenSSL behavior of having SSL_connect succeed even if
If you want to mimic OpenSSL behavior of having SSL\_connect succeed even if
verifying the server fails and reducing security you can do this by calling:
wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
before calling wolfSSL_new();. Though it's not recommended.
before calling wolfSSL\_new();. Though it's not recommended.
Note 3)
**Note 3)**
The enum values SHA, SHA256, SHA384, SHA512 are no longer available when
wolfSSL is built with --enable-opensslextra (OPENSSL_EXTRA) or with the macro
NO_OLD_SHA_NAMES. These names get mapped to the OpenSSL API for a single call
hash function. Instead the name WC_SHA, WC_SHA256, WC_SHA384 and WC_SHA512
should be used for the enum name.
wolfSSL is built with --enable-opensslextra (```OPENSSL_EXTRA```) or with the
macro ```NO_OLD_SHA_NAMES```. These names get mapped to the OpenSSL API for a
single call hash function. Instead the name WC_SHA, WC_SHA256, WC_SHA384 and
WC_SHA512 should be used for the enum name.
*** end Notes ***
# wolfSSL Release 4.6.0 (December 22, 2020)
Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
# wolfSSL Release 4.7.0 (February 16, 2021)
Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
### New Feature Additions
###### New Build Options
* wolfSSL now enables linux kernel module support. Big news for Linux kernel module developers with crypto requirements! wolfCrypt and wolfSSL are now loadable as modules in the Linux kernel, providing the entire libwolfssl API natively to other kernel modules. For the first time on Linux, the entire TLS protocol stack can be loaded as a module, allowing fully kernel-resident TLS/DTLS endpoints with in-kernel handshaking. (--enable-linuxkm, --enable-linuxkm-defaults, --with-linux-source) (https://www.wolfssl.com/loading-wolfssl-into-the-linux-kernel/)
* Build tests and updated instructions for use with Apples A12Z chipset (https://www.wolfssl.com/preliminary-cryptographic-benchmarks-on-new-apple-a12z-bionic-platform/)
* Expansion of wolfSSL SP math implementation and addition of --enable-sp-math-all build option
* Apache httpd w/TLS 1.3 support added
* Sniffer support for TLS 1.3 and AES CCM
* Support small memory footprint build with only TLS 1.3 and PSK without code for (EC)DHE and certificates
###### New Hardware Acceleration
* Added support for NXP DCP (i.MX RT1060/1062) crypto co-processor
* Add Silicon Labs hardware acceleration using [SL SE Manager](https://docs.silabs.com/gecko-platform/latest/service/api/group-sl-se-manager)
###### New Algorithms
* RC2 ECB/CBC added for use with PKCS#12 bundles
* XChaCha and the XChaCha20-Poly1305 AEAD algorithm support added
###### Misc
* Added support for 802.11Q VLAN frames to sniffer
* Added OCSP function wolfSSL_get_ocsp_producedDate
* Added API to set CPU ID flags cpuid_select_flags, cpuid_set_flag, cpuid_clear_flag
* New DTLS/TLS non-blocking Secure Renegotiation example added to server.c and client.c
* Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API, X509_STORE_CTX API added
* WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
* Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session tickets with TLS 1.2 while keeping TLS 1.3 session tickets available
* Implement RFC 5705: Keying Material Exporters for TLS
* Added --enable-reproducible-build flag for making more deterministic library outputs to assist debugging
### Fixes
###### Math Library
* Fix mp_to_unsigned_bin_len out of bounds read with buffers longer than maximum MP
* Fix for fp_read_radix_16 out of bounds read
* Fix to add wrapper for new timing resistant wc_ecc_mulmod_ex2 function version in HW ECC acceleration
* Handle an edge case with RSA-PSS encoding message to hash
* Fix to free mutex when cert manager is freed
* Compatibility layer EVP function to return the correct block size and type
* DTLS secure renegotiation fixes including resetting timeout and retransmit on duplicate HelloRequest
* Fix for edge case with shrink buffer and secure renegotiation
* Compile fix for type used with curve448 and PPC64
* Fixes for SP math all with PPC64 and other embedded compilers
* SP math all fix when performing montgomery reduction on one word modulus
* Fixes to SP math all to better support digit size of 8-bit
* Fix for results of edge case with SP integer square operation
* Stop non-ct mod inv from using register x29 with SP ARM64 build
* Fix edge case when generating z value of ECC with SP code
* Fixes for PKCS7 with crypto callback (devId) with RSA and RNG
* Fix for compiling builds with RSA verify and public only
* Fix for PKCS11 not properly exporting the public key due to a missing key type field
* Call certificate callback with certificate depth issues
* Fix for out-of-bounds read in TLSX_CSR_Parse()
* Fix incorrect AES-GCM tag generation in the EVP layer
* Fix for out of bounds write with SP math all enabled and an edge case of calling sp_tohex on the result of sp_mont_norm
* Fix for parameter check in sp_rand_prime to handle 0 length values
* Fix for edge case of failing malloc resulting in an out of bounds write with SHA256/SHA512 when small stack is enabled
###### Compatibility Layer Fixes
* Fix for setting serial number wolfSSL_X509_set_serialNumber
* Fix for setting ASN1 time not before / not after with WOLFSSL_X509
* Fix for order of components in issuer name when using X509_sign
* Fix for compatibility layer API DH_compute_key
* EVP fix incorrect block size for GCM and buffer up AAD for encryption/decryption
* EVP fix for AES-XTS key length return value and fix for string compare calls
* Fix for mutex freeing during RNG failure case with EVP_KEY creation
* Non blocking use with compatibility layer BIOs in TLS connections
###### Build Configuration
* Fix for custom build with WOLFSSL_USER_MALLOC defined
* ED448 compiler warning on Intel 32bit systems
* CURVE448_SMALL build fix for 32bit systems with Curve448
* Fix to build SP math with IAR
* CMake fix to only set ranlib arguments for Mac, and for stray typo of , -> ;
* Build with --enable-wpas=small fix
* Fix for building fips ready using openssl extra
* Fixes for building with Microchip (min/max and undef SHA_BLOCK_SIZE)
* FIx for NO_FILESYSTEM build on Windows
* Fixed SHA256 support for IMX-RT1060
* Fix for ECC key gen with NO_TFM_64BIT
###### Sniffer
* Fixes for sniffer when using static ECC keys. Adds back TLS v1.2 static ECC key fallback detection and fixes new ECC RNG requirement for timing resistance
* Fix for sniffer with SNI enabled to properly handle WOLFSSL_SUCCESS error code in ProcessClientHello
* Fix for sniffer using HAVE_MAX_FRAGMENT in "certificate" type message
* Fix build error with unused "ret" when building with WOLFSSL_SNIFFER_WATCH.
* Fix to not treat cert/key not found as error in myWatchCb and WOLFSSL_SNIFFER_WATCH.
* Sniffer fixes for handling TCP `out-of-range sequence number`
* Fixes SSLv3 use of ECDH in sniffer
###### PKCS
* PKCS#11 fix to generate ECC key for decrypt/sign or derive
* Fix for resetting internal variables when parsing a malformed PKCS#7 bundle with PKCS7_VerifySignedData()
* Verify the extracted public key in wc_PKCS7_InitWithCert
* Fix for internal buffer size when using decompression with PKCS#7
###### Misc
* Pin the C# verify callback function to keep from garbage collection
* DH fixes for when public key is owned and freed after a handshake
* Fix for TLS 1.3 early data packets
* Fix for STM32 issue with some Cube HAL versions and STM32 example timeout
* Fix mmCAU and LTC hardware mutex locking to prevent double lock
* Fix potential race condition with CRL monitor
* Fix for possible malformed encrypted key with 3DES causing negative length
* AES-CTR performance fixed with AES-NI
### Improvements/Optimizations
##### SP and Math
* mp_radix_size adjustment for leading 0
* Resolve implicit cast warnings with SP build
* Change mp_sqr to return an error if the result won't fit into the fixed length dp
* ARM64 assembly with clang improvements, clang doesn't always handle use of x29 (FP or Frame Pointer) in inline assembly code correctly - reworked sp_2048_sqr_8 to not use x29
* SP mod exp changed to support exponents of different lengths
* TFM div: fix initial value of size in q so clamping doesn't OOB read
* Numerous stack depth improvements with --enable-smallstack
* Improve cache resistance with Base64 operations
* Added --enable-wolftpm option for easily building wolfSSL to be used with wolfTPM
* DTLS macro WOLFSSL_DTLS_RESEND_ONLY_TIMEOUT added for resending flight only after a timeout
* Update linux kernel module to use kvmalloc and kvfree
* Add user settings option to cmake build
* Added support for AES GCM session ticket encryption
* Thread protection for global RNG used by wolfSSL_RAND_bytes function calls
* Sanity check on FIPs configure flag used against the version of FIPs bundle
* --enable-aesgcm=table now is compatible with --enable-linuxkm
* Increase output buffer size that wolfSSL_RAND_bytes can handle
* Out of directory builds resolved, wolfSSL can now be built in a separate directory than the root wolfssl directory
###### TLS 1.3
* TLS 1.3 wolfSSL_peek want read return addition
* TLS 1.3: Fix P-521 algorithm matching
###### PKCS
* Improvements and refactoring to PKCS#11 key look up
* PKCS #11 changes for signing and loading RSA public key from private
* check PKCS#7 SignedData private key is valid before using it
* check PKCS#7 VerifySignedData content length against total bundle size to avoid large malloc
###### Compatibility Layer
* EVP add block size for more ciphers in wolfSSL_EVP_CIPHER_block_size()
* Return long names instead of short names in wolfSSL_OBJ_obj2txt()
* Add additional OpenSSL compatibility functions to update the version of Apache httpd supported
* add "CCM8" variants to cipher_names "CCM-8" ciphers, for OpenSSL compat
###### Builds
* Cortex-M SP ASM support for IAR 6.70
* STM Cube pack support (IDE/STM32Cube)
* Build option --enable-aesgcm=4bit added for AES-GCM GMULT using 4 bit table
* Xilinx IDE updates to allow XTIME override for Xilinx, spelling fixes in Xilinx README.md, and add Xilinx SDK printf support
* Added ED448 to the "all" options and ED448 check key null argument sanity check
* Added ARC4, 3DES, nullcipher, BLAKE2, BLAKE2s, XChaCha, MD2, and MD4 to the “all” options
* Added an --enable-all-crypto option, to enable only the wolfCrypt features of --enable-all, combinable with --enable-cryptonly
* Added the ability to selectively remove features from --enable-all and --enable-all-crypto using specific --disable-<feature> options
* Use Intel intrinsics with Windows for RDSEED and RDRAND (thanks to dr-m from MariaDB)
* Add option to build with WOLFSSL_NO_CLIENT_AUTH
* Updated build requirements for wolfSSH use to be less restrictive
* lighttpd support update for v1.4.56
* Added batch file to copy files to ESP-IDF folders and resolved warnings when using v4.0 ESP-IDF
* Added --enable-stacksize=verbose, showing at a glance the stack high water mark for each subtest in testwolfcrypt
###### ECC
* Performance increase for ECC verify only, using non constant time SP modinv
* During ECC verify add validation of r and s before any use
* Always use safe add and dbl with ECC
* Timing resistant scalar multiplication updated with use of Joye double-add ladder
* Update mp_jacobi function to reduce stack and increase performance for base ECC build
* Reduce heap memory use with wc_EccPrivateKeyDecode, Improvement to ECC wc_ecc_sig_to_rs and wc_ecc_rs_raw_to_sig to reduce memory use (avoid the mp_int)
* Improve StoreECC_DSA_Sig bounds checking
###### OCSP
* OCSP improvement to handle extensions in singleResponse
* support for OCSP request/response for multiple certificates
* OCSP Must Staple option added to require OCSP stapling response
* Add support for id-pkix-ocsp-nocheck extension
###### Misc
* Additional code coverage added for ECC and RSA, PKCS#7, 3DES, EVP and Blake2b operations
* DTLS MTU: check MTU on write
* Refactor hash sig selection and add the macros WOLFSSL_STRONGEST_HASH_SIG (picks the strongest hash) and WOLFSSL_ECDSA_MATCH_HASH (will pick the hash to match the ECC curve)
* Strict certificate version allowed from client, TLS 1.2 / 1.3 can not accept client certificates lower than version 3
* wolfSSL_get_ciphers_compat(), skip the fake indicator ciphers like the renegotiation indication and the quantum-safe hybrid
* When parsing session ticket, check TLS version to see whether they are version compatible
* Additional sanity check for invalid ASN1 padding on integer type
* Adding in ChaCha20 streaming feature with Mac and Intel assembly build
* Sniffer build with --enable-oldtls option on
### Vulnerabilities
* [HIGH] CVE-2021-3336: In earlier versions of wolfSSL there exists a potential man in the middle attack on TLS 1.3 clients. Malicious attackers with a privileged network position can impersonate TLS 1.3 servers and bypass authentication. Users that have applications with client side code and have TLS 1.3 turned on, should update to the latest version of wolfSSL. Users that do not have TLS 1.3 turned on, or that are server side only, are NOT affected by this report. For the code change see https://github.com/wolfSSL/wolfssl/pull/3676.
* [LOW] In the case of using custom ECC curves there is the potential for a crafted compressed ECC key that has a custom prime value to cause a hang when imported. This only affects applications that are loading in ECC keys with wolfSSL builds that have compressed ECC keys and custom ECC curves enabled.
* [LOW] With TLS 1.3 authenticated-only ciphers a section of the server hello could contain 16 bytes of uninitialized data when sent to the connected peer. This affects only a specific build of wolfSSL with TLS 1.3 early data enabled and using authenticated-only ciphers with TLS 1.3.
For additional vulnerability information visit the vulnerability page at
@@ -232,26 +135,22 @@ More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html
*** Resources ***
# Resources
[wolfSSL Website](https://www.wolfssl.com/)
[wolfSSL Wiki](https://github.com/wolfSSL/wolfssl/wiki)
[FIPS FAQ](https://wolfssl.com/license/fips)
[FIPS 140-2/140-3 FAQ](https://wolfssl.com/license/fips)
[wolfSSL Documents](https://wolfssl.com/wolfSSL/Docs.html)
[wolfSSL Documentation](https://wolfssl.com/wolfSSL/Docs.html)
[wolfSSL Manual](https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-toc.html)
[wolfSSL API Reference]
(https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-17-wolfssl-api-reference.html)
[wolfSSL API Reference](https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-17-wolfssl-api-reference.html)
[wolfCrypt API Reference]
(https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-18-wolfcrypt-api-reference.html)
[wolfCrypt API Reference](https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-18-wolfcrypt-api-reference.html)
[TLS 1.3](https://www.wolfssl.com/docs/tls13/)
[wolfSSL Vulnerabilities]
(https://www.wolfssl.com/docs/security-vulnerabilities/)
[wolfSSL Vulnerabilities](https://www.wolfssl.com/docs/security-vulnerabilities/)

Binary file not shown.

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
31:42:b4:2b:87:ef:4b:66:93:af:44:de:45:80:d8:8e:7e:e3:b5:07
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 10888915626055724693 (0x971d3311e8406e95)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (1024 bit)
Public-Key: (1024 bit)
Modulus:
00:cd:ac:dd:47:ec:be:b7:24:c3:63:1b:54:98:79:
e1:c7:31:16:59:d6:9d:77:9d:8d:e2:8b:ed:04:17:
@@ -29,7 +28,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:31:42:B4:2B:87:EF:4B:66:93:AF:44:DE:45:80:D8:8E:7E:E3:B5:07
serial:97:1D:33:11:E8:40:6E:95
X509v3 Basic Constraints:
CA:TRUE
@@ -38,35 +37,35 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
32:ed:94:35:3d:4a:76:d7:6e:a9:75:e9:f5:7a:7f:64:31:50:
6a:28:d5:92:21:d5:88:d2:51:82:c5:bb:1a:f9:26:fa:d8:4b:
83:b6:09:d4:62:19:e0:55:84:97:55:ba:5d:21:48:27:10:f0:
f3:5c:33:b8:38:9b:fb:57:4c:d8:1c:5b:ab:d3:1c:21:ee:3e:
2e:b8:c6:3a:92:5c:38:3c:25:40:2f:05:c6:c9:85:ff:27:f3:
ee:fa:10:58:db:5c:a6:8e:e0:d9:70:93:cd:be:7e:68:33:08:
c2:28:d6:5c:b3:15:19:af:0c:f7:ba:f0:bc:a1:cf:30:4e:38:
e6:4d
4e:b1:39:6a:23:a3:65:17:14:b6:52:2e:86:46:d5:4f:7c:d5:
6c:bb:fa:66:b1:71:54:a1:ad:0e:a2:b7:ba:59:65:8b:d5:87:
5d:51:d0:65:de:74:04:80:7c:da:3a:52:57:7a:1d:5d:46:7a:
06:79:75:e5:31:dd:1d:f6:54:77:fc:40:13:a1:5b:fd:9e:7d:
1c:fd:04:4f:7c:ee:92:a2:80:55:3c:3f:2a:1c:bd:3a:37:12:
0e:fd:52:60:66:19:d5:4b:f6:35:50:a3:59:d3:7f:6d:95:d7:
56:10:c6:86:28:f4:6e:6d:da:4e:1c:b4:e9:0b:4c:ed:62:0f:
64:06
-----BEGIN CERTIFICATE-----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Zm9Ad29sZnNzbC5jb22CCQCXHTMR6EBulTAMBgNVHRMEBTADAQH/MBwGA1UdEQQV
MBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
BQcDAjANBgkqhkiG9w0BAQsFAAOBgQBOsTlqI6NlFxS2Ui6GRtVPfNVsu/pmsXFU
oa0Oore6WWWL1YddUdBl3nQEgHzaOlJXeh1dRnoGeXXlMd0d9lR3/EAToVv9nn0c
/QRPfO6SooBVPD8qHL06NxIO/VJgZhnVS/Y1UKNZ039tlddWEMaGKPRubdpOHLTp
C0ztYg9kBg==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:1a:0f:b4:d6:66:91:f9:eb:d6:69:e9:5e:55:74:f3:4b:d7:74:8a
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_1024, OU = Programming-1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 14202541924425994169 (0xc51990a1c9010fb9)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_1024, OU=Programming-1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_1024, OU = Programming-1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_1024, OU=Programming-1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (1024 bit)
Public-Key: (1024 bit)
Modulus:
00:bc:73:0e:a8:49:f3:74:a2:a9:ef:18:a5:da:55:
99:21:f9:c8:ec:b3:6d:48:e5:35:35:75:77:37:ec:
@@ -29,7 +28,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:81:69:0F:F8:DF:DD:CF:34:29:D5:67:75:71:85:C7:75:10:69:59:EC
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_1024/OU=Programming-1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:77:1A:0F:B4:D6:66:91:F9:EB:D6:69:E9:5E:55:74:F3:4B:D7:74:8A
serial:C5:19:90:A1:C9:01:0F:B9
X509v3 Basic Constraints:
CA:TRUE
@@ -38,35 +37,35 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
a8:13:2c:fc:43:e9:db:59:c7:7e:32:8b:32:ba:a3:5c:2f:60:
ab:a1:ef:9a:64:36:4e:ce:05:6d:bc:63:b0:8f:91:f7:76:bb:
92:b4:b6:78:db:2e:7f:7f:9c:e7:58:4b:73:89:0f:d1:13:61:
a4:2a:2f:6e:c7:b1:19:bb:14:00:d7:0e:dd:7e:2f:66:e7:5f:
f9:0f:39:90:f6:6b:d3:84:1e:d0:09:23:22:27:f5:c9:96:ed:
45:d7:78:3c:eb:a7:d5:8a:f5:f4:dd:99:27:d2:4c:86:6e:63:
7d:a8:93:62:71:c1:cb:93:f4:81:3e:95:b3:a8:e5:a6:23:51:
4a:b5
30:ce:46:43:6d:70:e1:6d:bb:8f:4a:05:64:f7:2c:8d:0e:d6:
f9:1e:b6:2a:8e:ed:52:e1:7c:44:bf:59:54:da:2d:31:4d:e6:
79:d2:d0:d8:b4:cf:5b:16:0a:16:a1:be:62:9f:6c:24:46:7b:
b8:dd:b8:8d:7f:fe:f1:ac:62:94:e0:34:ce:4c:59:3a:c5:5a:
e6:40:d5:60:7e:20:5d:ed:43:92:d3:f3:ea:e0:d1:57:c8:ce:
41:79:db:81:41:c6:f0:0e:35:d4:6f:92:58:2d:d6:b2:ec:f1:
88:ff:6d:ca:63:d6:4a:8d:10:a6:23:06:77:9a:d5:ab:9d:64:
46:02
-----BEGIN CERTIFICATE-----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MIIEAjCCA2ugAwIBAgIJAMUZkKHJAQ+5MA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
A1UECgwMd29sZlNTTF8xMDI0MRkwFwYDVQQLDBBQcm9ncmFtbWluZy0xMDI0MRgw
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
ZnNzbC5jb20wHhcNMjEwMjEwMTk0OTUyWhcNMjMxMTA3MTk0OTUyWjCBnjELMAkG
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
BgNVBAoMDHdvbGZTU0xfMTAyNDEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMTAyNDEY
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
bGZzc2wuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8cw6oSfN0oqnv
GKXaVZkh+cjss21I5TU1dXc37NFhkF8+2eTV35TKwanXGdqGyehNxGE2gv6rrX53
JbuNEaW8YjqoOMw5ogRmtPf386raTQIOu16NaUjcd8koDiLpa6Qmukzowf1Kbysf
74qu9pBi5WQe6ys8Z8jcJwD2kWhlqQIDAQABo4IBRDCCAUAwHQYDVR0OBBYEFIFp
D/jf3c80KdVndXGFx3UQaVnsMIHTBgNVHSMEgcswgciAFIFpD/jf3c80KdVndXGF
x3UQaVnsoYGkpIGhMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQ
MA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8xMDI0MRkwFwYDVQQL
DBBQcm9ncmFtbWluZy0xMDI0MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAd
BgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb22CCQDFGZChyQEPuTAMBgNVHRME
BTADAQH/MBwGA1UdEQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQG
CCsGAQUFBwMBBggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOBgQAwzkZDbXDhbbuP
SgVk9yyNDtb5HrYqju1S4XxEv1lU2i0xTeZ50tDYtM9bFgoWob5in2wkRnu43biN
f/7xrGKU4DTOTFk6xVrmQNVgfiBd7UOS0/Pq4NFXyM5BeduBQcbwDjXUb5JYLday
7PGI/23KY9ZKjRCmIwZ3mtWrnWRGAg==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL, OU = Support_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL, OU=Support_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (1024 bit)
Public-Key: (1024 bit)
Modulus:
00:aa:3e:a5:9c:d3:17:49:65:43:de:d0:f3:4b:1c:
db:49:0c:fc:7a:65:05:6d:de:6a:c4:e4:73:2c:8a:
@@ -28,7 +28,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:31:42:B4:2B:87:EF:4B:66:93:AF:44:DE:45:80:D8:8E:7E:E3:B5:07
serial:97:1D:33:11:E8:40:6E:95
X509v3 Basic Constraints:
CA:TRUE
@@ -37,52 +37,50 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
56:14:19:1a:4f:09:91:cd:f5:a7:c5:69:e4:ea:1a:fd:56:c3:
55:fe:c8:cc:ed:56:a8:5f:86:fb:ab:9f:76:8a:db:b3:cc:68:
ce:99:fb:a4:5e:70:a8:3c:a8:b6:85:7c:cb:31:fe:4b:01:0c:
ac:f0:19:04:98:d0:e7:a5:a2:51:e2:52:a3:f7:42:d4:e2:2d:
f2:72:b5:e7:95:d0:b4:e3:d3:c1:34:a4:2f:7c:3c:ef:f0:45:
14:32:2f:c8:bf:9f:da:97:6a:da:cb:3f:ef:1f:ca:dc:7a:13:
1b:5a:45:41:f8:f0:34:49:9d:58:23:85:3d:99:ab:34:de:51:
32:76
27:0a:4e:08:8c:ba:73:d0:05:f2:ea:f9:51:8c:7e:29:14:23:
8e:9e:9a:fc:46:6f:10:68:59:d9:a0:ea:53:19:bd:28:89:e1:
97:1e:4c:b8:1e:be:0f:4d:9d:1d:76:57:17:31:95:c2:80:be:
04:d0:c2:e9:5c:e0:f4:81:3f:c4:b0:c5:86:ae:58:68:b9:ae:
0f:88:e8:63:6f:b9:08:f1:1b:56:90:fb:1f:2e:cc:e5:69:1f:
7c:02:4f:ed:b0:45:7c:2d:a8:59:11:a5:95:51:c7:50:d8:89:
c2:90:63:68:a8:41:6f:d0:37:26:6f:c8:0e:b5:a0:15:9d:a5:
e6:d2
-----BEGIN CERTIFICATE-----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b22CCQCXHTMR6EBulTAMBgNVHRMEBTADAQH/MBwGA1UdEQQVMBOCC2V4YW1wbGUu
Y29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjANBgkqhkiG
9w0BAQsFAAOBgQAnCk4IjLpz0AXy6vlRjH4pFCOOnpr8Rm8QaFnZoOpTGb0oieGX
Hky4Hr4PTZ0ddlcXMZXCgL4E0MLpXOD0gT/EsMWGrlhoua4PiOhjb7kI8RtWkPsf
LszlaR98Ak/tsEV8LahZEaWVUcdQ2InCkGNoqEFv0Dcmb8gOtaAVnaXm0g==
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
31:42:b4:2b:87:ef:4b:66:93:af:44:de:45:80:d8:8e:7e:e3:b5:07
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 10888915626055724693 (0x971d3311e8406e95)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting_1024, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting_1024, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (1024 bit)
Public-Key: (1024 bit)
Modulus:
00:cd:ac:dd:47:ec:be:b7:24:c3:63:1b:54:98:79:
e1:c7:31:16:59:d6:9d:77:9d:8d:e2:8b:ed:04:17:
@@ -100,7 +98,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:D3:22:8F:28:2C:E0:05:EE:D3:ED:C3:71:3D:C9:B2:36:3A:1D:BF:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting_1024/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:31:42:B4:2B:87:EF:4B:66:93:AF:44:DE:45:80:D8:8E:7E:E3:B5:07
serial:97:1D:33:11:E8:40:6E:95
X509v3 Basic Constraints:
CA:TRUE
@@ -109,35 +107,35 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
32:ed:94:35:3d:4a:76:d7:6e:a9:75:e9:f5:7a:7f:64:31:50:
6a:28:d5:92:21:d5:88:d2:51:82:c5:bb:1a:f9:26:fa:d8:4b:
83:b6:09:d4:62:19:e0:55:84:97:55:ba:5d:21:48:27:10:f0:
f3:5c:33:b8:38:9b:fb:57:4c:d8:1c:5b:ab:d3:1c:21:ee:3e:
2e:b8:c6:3a:92:5c:38:3c:25:40:2f:05:c6:c9:85:ff:27:f3:
ee:fa:10:58:db:5c:a6:8e:e0:d9:70:93:cd:be:7e:68:33:08:
c2:28:d6:5c:b3:15:19:af:0c:f7:ba:f0:bc:a1:cf:30:4e:38:
e6:4d
4e:b1:39:6a:23:a3:65:17:14:b6:52:2e:86:46:d5:4f:7c:d5:
6c:bb:fa:66:b1:71:54:a1:ad:0e:a2:b7:ba:59:65:8b:d5:87:
5d:51:d0:65:de:74:04:80:7c:da:3a:52:57:7a:1d:5d:46:7a:
06:79:75:e5:31:dd:1d:f6:54:77:fc:40:13:a1:5b:fd:9e:7d:
1c:fd:04:4f:7c:ee:92:a2:80:55:3c:3f:2a:1c:bd:3a:37:12:
0e:fd:52:60:66:19:d5:4b:f6:35:50:a3:59:d3:7f:6d:95:d7:
56:10:c6:86:28:f4:6e:6d:da:4e:1c:b4:e9:0b:4c:ed:62:0f:
64:06
-----BEGIN CERTIFICATE-----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Zm9Ad29sZnNzbC5jb22CCQCXHTMR6EBulTAMBgNVHRMEBTADAQH/MBwGA1UdEQQV
MBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
BQcDAjANBgkqhkiG9w0BAQsFAAOBgQBOsTlqI6NlFxS2Ui6GRtVPfNVsu/pmsXFU
oa0Oore6WWWL1YddUdBl3nQEgHzaOlJXeh1dRnoGeXXlMd0d9lR3/EAToVv9nn0c
/QRPfO6SooBVPD8qHL06NxIO/VJgZhnVS/Y1UKNZ039tlddWEMaGKPRubdpOHLTp
C0ztYg9kBg==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
53:82:30:49:e8:be:64:59:2e:35:41:ac:31:0d:4d:25:21:54:90:a4
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_3072, OU = Programming-3072, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 11880683778350266762 (0xa4e0aaf32950398a)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_3072, OU=Programming-3072, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_3072, OU = Programming-3072, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_3072, OU=Programming-3072, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (3072 bit)
Public-Key: (3072 bit)
Modulus:
00:ac:39:50:68:8f:78:f8:10:9b:68:96:d3:e1:9c:
56:68:5a:41:62:e3:b3:41:b0:55:80:17:b0:88:16:
@@ -46,7 +45,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:3D:D1:84:C2:AF:B0:20:49:BC:74:87:41:38:AB:BA:D2:D4:0C:A3:A8
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_3072/OU=Programming-3072/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:53:82:30:49:E8:BE:64:59:2E:35:41:AC:31:0D:4D:25:21:54:90:A4
serial:A4:E0:AA:F3:29:50:39:8A
X509v3 Basic Constraints:
CA:TRUE
@@ -55,60 +54,60 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
9e:c9:99:b8:8c:c1:a2:db:cb:78:73:5a:8a:8d:3b:f3:0a:2a:
2f:ef:30:09:18:49:e1:f7:9f:8a:a2:33:ce:7c:ec:88:a3:3d:
81:50:76:4b:2c:20:82:bc:99:30:82:7f:0e:33:9c:c8:02:9b:
3c:de:3e:65:78:2d:6e:27:39:4f:c4:18:d3:96:23:a3:2d:91:
57:90:52:bd:7d:12:3d:bf:7d:b1:35:2e:a6:be:26:95:3c:04:
5c:20:6c:d8:e5:36:b2:e1:7b:0f:a1:2c:1f:28:3c:19:cb:c4:
69:bb:59:b4:99:13:f2:e5:f5:6c:23:d3:69:3b:01:b7:5a:a1:
be:f6:70:00:6c:9c:2e:2f:22:ea:4c:7c:72:e3:99:21:a9:dd:
ba:8d:16:5c:88:f7:c0:99:c2:8e:83:10:3d:ea:c8:11:77:6a:
e5:78:47:92:33:ec:aa:35:8c:13:f0:4c:9d:dd:35:56:42:35:
36:ce:d8:46:d8:d7:d4:84:a1:17:bc:57:09:cb:da:56:d2:76:
ac:6a:c0:b3:71:a3:1c:d3:2c:ea:f6:4c:9a:4d:dd:3a:ce:10:
33:f0:82:34:70:71:5d:6f:77:8f:ec:a2:77:7d:1c:9e:7f:55:
6b:e5:d3:29:49:3d:77:fd:5f:bb:ca:7a:b9:80:b5:81:69:a3:
38:a3:c6:96:d2:21:1d:85:08:47:59:a9:d4:92:8e:94:3f:5a:
a1:36:d7:92:b7:2f:ce:f0:a8:40:50:ae:3f:d0:20:39:86:a6:
a1:7c:4f:23:5c:9c:5f:da:93:75:d6:93:b1:5f:30:25:76:6c:
77:8f:f8:8e:15:ae:66:5b:7d:ee:d3:49:ae:c6:1c:b0:90:96:
5d:36:9e:12:4c:98:4a:f1:d1:6b:a4:7f:76:cb:51:f9:f2:52:
07:e4:60:6f:67:6f:e3:a3:84:c0:43:0d:fd:f6:25:9e:3c:d3:
41:e9:44:c5:f7:b9:11:3b:0f:dc:9c:e3:dd:f2:ac:06:b3:20:
14:2d:6c:db:8e:78
57:21:c0:ad:6e:16:74:d5:b1:8b:19:55:49:7a:a4:5e:d6:18:
f9:03:80:4b:c2:71:d1:04:47:9c:b3:73:9c:4f:62:4a:3a:9a:
d4:48:e4:81:db:8d:15:df:5d:0f:08:13:28:28:d7:05:44:c1:
b9:6d:f1:75:60:74:d0:44:ae:91:0f:3a:7c:f4:ee:ea:6f:06:
3a:41:ae:6b:5c:8a:0d:85:6b:b3:fb:b1:5f:70:f7:9b:32:57:
fb:c4:6b:ce:90:86:0c:96:8a:41:4e:61:f3:a1:3f:55:e8:94:
56:12:6d:9e:46:2c:31:bd:3f:8a:70:c8:20:a4:fb:fa:c6:53:
58:bb:05:28:ba:89:0c:b1:5f:21:ac:1e:f1:35:fd:6b:14:c1:
69:08:e9:37:14:d8:76:50:2a:fc:aa:94:7f:39:52:3a:a7:3c:
0a:53:5e:e0:13:1a:00:ca:ac:aa:7e:f7:09:68:78:60:11:73:
ab:7d:58:fe:03:9f:e6:84:ea:51:58:40:82:a5:ff:a7:2c:ea:
42:a5:4c:b6:3b:5c:6b:ab:cf:56:8a:8c:ec:3c:f0:ae:d3:ca:
0e:09:71:cf:79:96:72:63:4b:24:7a:f3:79:ca:69:75:c9:b2:
a4:54:b8:84:40:2b:8f:24:27:6a:ed:8f:53:e0:55:9b:35:91:
18:11:cf:b0:3b:b8:65:3c:c6:ef:b0:78:7c:43:26:f1:12:84:
6b:2b:f0:7d:3c:7f:dc:67:a4:17:89:75:00:86:1a:ea:cd:1a:
cf:da:11:64:cc:bd:10:26:ef:6b:1b:93:b3:37:14:7f:12:80:
81:b6:fd:8a:8a:d8:95:5f:f9:1e:a5:1e:65:5f:75:8d:90:2a:
0d:b1:ab:26:16:31:b2:06:64:6f:2b:7e:4a:f4:de:e9:7a:ec:
67:35:f3:40:71:75:37:b3:e1:1d:ef:7d:e2:92:ec:d5:e5:bb:
99:79:50:11:b2:8a:57:1b:30:2e:b7:16:4c:c8:a6:99:b1:01:
34:08:9d:d8:df:af
-----BEGIN CERTIFICATE-----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MIIGBzCCBG+gAwIBAgIJAKTgqvMpUDmKMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD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-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:8a:a6:8a:3d:0a:72:ff:dd:e4:4f:56:bd:89:24:23:3c:0b:b6:40
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_4096, OU = Programming-4096, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 11546908179272725132 (0xa03edbcf979a728c)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_4096, OU=Programming-4096, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_4096, OU = Programming-4096, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_4096, OU=Programming-4096, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (4096 bit)
Public-Key: (4096 bit)
Modulus:
00:f5:d0:31:e4:71:59:58:b3:07:50:dd:16:79:fc:
c6:95:50:fc:46:0e:57:12:86:71:8d:e3:9b:4a:33:
@@ -55,7 +54,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:FA:54:89:67:E5:5F:B7:31:40:EA:FD:E7:F6:A3:C6:5A:56:16:A5:6E
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_4096/OU=Programming-4096/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:36:8A:A6:8A:3D:0A:72:FF:DD:E4:4F:56:BD:89:24:23:3C:0B:B6:40
serial:A0:3E:DB:CF:97:9A:72:8C
X509v3 Basic Constraints:
CA:TRUE
@@ -64,73 +63,72 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
64:d8:59:19:c0:b5:79:9e:58:63:ae:8b:28:64:81:d9:d2:cd:
e8:26:1f:04:09:7b:52:0a:7a:16:70:ee:37:8a:6d:7c:74:67:
51:2f:cf:97:a1:d6:54:a2:a3:93:dd:2b:63:5e:9f:13:56:7f:
8c:e5:9b:49:19:78:db:3d:75:fe:b7:b8:57:92:58:ff:84:8b:
d1:2f:f4:b0:22:d2:f9:bb:00:dd:3b:d2:7a:b9:d9:50:e5:90:
70:2d:77:f2:74:c2:40:2f:39:25:5d:8e:de:11:e1:cf:a7:8f:
8e:bd:2a:aa:2e:a1:14:3d:06:70:c7:c9:58:86:9e:4c:86:65:
9e:69:62:3e:30:22:eb:d5:00:d1:1e:8c:ba:f2:7b:a3:39:77:
fe:90:42:b7:a4:98:28:d7:82:4a:54:1b:27:c9:cf:09:b5:60:
b6:09:37:40:e9:a5:cd:3e:80:84:c4:c4:b6:63:06:ea:5c:63:
f2:2b:ee:00:31:52:d8:6c:cd:6a:d2:57:a0:6b:d5:a7:6e:4c:
ce:3b:ff:44:7d:99:a5:e3:fb:23:91:99:8c:19:ce:1f:c1:a1:
89:e3:bc:e8:74:2c:3d:80:bc:0c:6c:6a:39:a6:50:4c:d1:25:
1e:a6:96:f4:54:fd:2a:ce:3c:59:aa:1c:05:df:df:10:9a:2b:
52:9c:f1:a8:19:ac:56:03:56:1f:c9:a5:e4:aa:bc:e2:90:c1:
c9:ad:f5:94:1b:72:a7:c9:9e:90:26:2e:70:48:41:b5:2f:6c:
35:ca:30:e3:ca:71:5b:97:96:15:6f:b5:4d:43:d1:5a:02:d0:
21:48:ee:2b:c7:8d:e1:60:92:86:8c:5e:8d:9c:a1:6a:99:c0:
d0:3d:3a:8c:7e:c3:87:b2:81:8b:e9:bd:b0:d3:f3:6f:f2:89:
40:b9:d1:5c:d0:1c:9d:bf:80:fc:75:0a:66:c6:5a:d1:41:15:
31:07:55:f8:00:96:77:b4:a7:dc:d7:62:15:ed:75:7a:3e:cd:
b9:e0:56:7d:38:4c:2e:ec:ef:00:70:93:12:0d:25:5a:e7:f8:
02:37:e8:dd:bb:7e:61:9f:b2:a8:70:da:7f:94:7b:29:e0:a4:
58:01:8d:43:f1:25:16:59:fe:d5:21:42:ee:ab:a8:03:3e:ee:
1f:74:1c:43:2d:37:0f:05:14:29:0d:ac:e8:c7:72:0e:10:b5:
9e:f8:80:41:d0:a2:aa:6c:94:26:49:91:c7:2c:30:04:2a:91:
f0:e6:7f:76:71:80:09:07:00:98:b7:f1:1f:3c:0c:db:98:0a:
22:cc:af:6f:e5:c7:0d:26:a1:65:b3:5d:37:04:de:f4:61:91:
06:06:a4:9a:65:51:8b:3e
17:ab:22:61:05:6d:3a:c0:0d:6b:d9:15:82:11:cf:e7:f8:65:
da:c7:ef:da:0f:50:75:bd:55:cf:3d:50:dd:d4:0d:2c:04:48:
a8:25:3a:b9:c4:ce:48:7e:b8:63:cd:cd:ce:bc:50:26:dc:6d:
c2:1e:d1:71:3a:2f:db:e5:03:6b:73:55:23:70:76:1e:08:2a:
92:7b:d6:6a:ef:17:a0:f3:8c:ea:eb:c4:2e:cb:d4:d9:d5:ab:
f7:e6:8d:ec:d9:97:a1:56:a7:0b:5d:e5:3f:1f:5e:6a:7a:a4:
64:d7:b2:42:1a:1e:49:37:93:bc:be:13:a8:fb:b1:93:7b:a8:
2b:49:90:43:84:24:60:44:fc:32:74:85:0e:1b:f8:3a:92:3d:
aa:25:1b:9f:97:31:95:97:c5:3d:51:dd:b6:d5:4a:7e:41:b3:
90:83:7c:98:fa:cb:22:33:a5:f4:32:74:bd:3e:b1:3b:34:f9:
c3:3f:be:db:0e:d9:2f:1a:f9:d2:4f:14:53:63:f2:21:a3:e9:
c3:ad:04:6e:e7:ad:1f:6b:ce:4e:35:4a:61:84:b9:61:65:1d:
a2:d7:a1:e6:74:08:15:38:75:b0:23:70:22:15:59:2c:48:f0:
da:9a:99:d4:2b:83:df:9a:93:78:45:b9:84:5c:7e:71:90:da:
56:1c:9f:57:ed:76:f7:17:e5:d2:01:90:99:5f:4c:07:49:07:
82:75:92:44:7a:fe:9b:a7:4d:ec:c8:dc:46:67:28:04:8b:08:
17:94:13:e9:a0:d2:b2:26:56:27:60:94:5a:50:5c:cf:34:4d:
3f:35:e7:12:5d:c5:32:00:2f:e0:1d:09:e5:36:8d:77:93:f6:
e5:62:b4:a3:9b:c6:7c:e6:3d:d5:38:33:5f:23:5b:81:2e:24:
26:9e:98:a8:af:04:3d:65:3f:71:88:48:44:5c:1a:11:0e:1b:
e1:81:b1:b6:66:e6:3c:13:67:d6:6b:a3:f3:b7:f6:9f:14:a6:
87:7f:2b:14:31:22:7a:f5:0d:44:e6:a3:1a:d6:d2:dc:88:71:
37:28:11:6c:ef:95:ab:1d:c5:c3:9a:ef:1a:54:11:92:8e:89:
43:03:26:d0:e9:63:33:fe:79:4c:a6:6f:c4:58:58:2e:b6:ab:
57:a0:39:4d:ff:88:c0:23:2c:3b:e3:9a:df:48:d3:17:45:5d:
36:4e:00:58:72:c3:ef:e7:76:0b:f8:19:a8:5f:f6:53:98:49:
2b:52:b5:8e:a5:d8:73:6e:3c:23:23:06:86:25:6b:0d:3b:f2:
9a:17:33:a4:4e:f5:6b:de:b3:64:20:58:c6:6d:22:a9:ae:f4:
09:9d:0d:6e:9f:96:2a:9e
-----BEGIN CERTIFICATE-----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MIIHBzCCBO+gAwIBAgIJAKA+28+XmnKMMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD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-----END CERTIFICATE-----

Binary file not shown.

Binary file not shown.

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:ba:a4:f4:b1:f7:48:25:e3:5f:9b:da:a1:13:ed:d5:2b:03:67:15
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 12309252214903945037 (0xaad33fac180a374d)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:bf:0c:ca:2d:14:b2:1e:84:42:5b:cd:38:1f:4a:
f2:4d:75:10:f1:b6:35:9f:df:ca:7d:03:98:d3:ac:
@@ -38,7 +37,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:5E:BA:A4:F4:B1:F7:48:25:E3:5F:9B:DA:A1:13:ED:D5:2B:03:67:15
serial:AA:D3:3F:AC:18:0A:37:4D
X509v3 Basic Constraints:
CA:TRUE
@@ -47,47 +46,47 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
b9:ed:94:3e:00:73:2d:a5:d1:04:b3:fb:dc:f0:b7:0d:3d:ad:
96:74:4c:92:67:ad:6d:7c:e2:99:6a:33:ca:b2:0f:04:5a:a5:
67:f8:e3:0b:3d:f5:d0:5b:1e:20:52:12:92:28:ea:31:a3:51:
9e:8b:d2:39:e4:25:ea:61:61:41:16:2d:54:50:d3:fb:d0:34:
00:10:f1:7b:bc:f0:08:a7:f5:27:5e:7e:40:9d:99:b0:d3:31:
11:c3:9d:a9:51:a0:17:cf:83:2c:55:84:e0:d5:92:a0:05:3a:
9f:b8:75:f8:1b:e5:f7:a4:6c:e9:aa:25:8b:19:93:46:1f:3f:
33:af:47:29:cf:7b:8b:59:27:eb:d7:4f:cb:33:19:fa:5f:ee:
d8:13:e9:0c:07:ad:3b:c0:7f:10:d7:e4:ed:e8:db:16:e1:1f:
a4:7f:16:3c:bd:d7:11:f2:d4:3a:a9:9b:95:e1:39:51:99:eb:
5b:65:46:ef:63:84:73:95:23:b8:bf:b5:f6:4d:12:71:f7:ff:
33:aa:4a:8c:65:73:73:89:69:df:a6:dc:a4:91:ff:ae:c7:28:
93:b5:1a:de:a9:8f:2b:30:85:83:8b:99:82:ca:b3:7c:11:10:
88:9d:8e:6c:2c:f3:05:6f:cb:80:85:16:b7:ed:e4:68:fb:b6:
b6:31:8a:7d
62:98:c8:58:cf:56:03:86:5b:1b:71:49:7d:05:03:5d:e0:08:
86:ad:db:4a:de:ab:22:96:a8:c3:59:68:c1:37:90:40:df:bd:
89:d0:bc:da:8e:ef:87:b2:c2:62:52:e1:1a:29:17:6a:96:99:
c8:4e:d8:32:fe:b8:d1:5c:3b:0a:c2:3c:5f:a1:1e:98:7f:ce:
89:26:21:1f:64:9c:15:7a:9c:ef:fb:1d:85:6a:fa:98:ce:a8:
a9:ab:c3:a2:c0:eb:87:ed:bc:21:df:f3:07:5b:ae:fd:40:d4:
ae:20:d0:76:8a:31:0a:a2:62:7c:61:0d:ce:5d:9a:1e:e4:20:
88:51:49:fb:77:a9:cd:4d:c6:bf:54:99:33:ef:4b:a0:73:70:
6d:2e:d9:3d:08:f6:12:39:31:68:c6:61:5c:41:b5:1b:f4:38:
7d:fc:be:73:66:2d:f7:ca:5b:2c:5b:31:aa:cf:f6:7f:30:e4:
12:2c:8e:d6:38:51:e6:45:ee:d5:da:c3:83:d6:ed:5e:ec:d6:
b6:14:b3:93:59:e1:55:4a:7f:04:df:ce:65:d4:df:18:4f:dd:
b4:45:7f:a6:56:30:c4:05:44:98:9d:4f:26:6d:84:80:a0:5e:
ed:23:d1:48:87:0e:05:06:91:3b:b0:3c:bb:8c:8f:3c:7b:4c:
4f:a1:ca:98
-----BEGIN CERTIFICATE-----
MIIE/zCCA+egAwIBAgIUXrqk9LH3SCXjX5vaoRPt1SsDZxUwDQYJKoZIhvcNAQEL
BQAwgZQxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
b3plbWFuMREwDwYDVQQKDAhTYXd0b290aDETMBEGA1UECwwKQ29uc3VsdGluZzEY
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
bGZzc2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZQxCzAJ
BgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMREw
DwYDVQQKDAhTYXd0b290aDETMBEGA1UECwwKQ29uc3VsdGluZzEYMBYGA1UEAwwP
d3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29t
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvwzKLRSyHoRCW804H0ry
TXUQ8bY1n9/KfQOY06zeA2buKvHYsH1uB1QLEJghTYDLEiDnzE/eRX3Jcncy6sqQ
u2lSEAMvqPOVxfGLYlYb72dvpBBBla0Km+OlwLDScHZQMFuo6AgsfO2nonqNOCkc
rMft8nyVsJWCfUlcOM13Je+9gHVTlDw9ymNbnxW10x0TLxnRPNt2Osy4fcnlwtfa
QG/YIdxzG0ItU5z+Gvx9q3o2P5jehHwFZ85qFDiHqfGMtWjLaH9xICv1oGP1Vi+j
JtK3b7FaF9c4mQj+k1hv/sMTSQgWC6dNZwBSMWcjTpjtUUUduQTZC+zYKLNLve02
eQIDAQABo4IBRTCCAUEwHQYDVR0OBBYEFCeOZxF0wyYdP+0zY7Ok2B0w5ejVMIHU
BgNVHSMEgcwwgcmAFCeOZxF0wyYdP+0zY7Ok2B0w5ejVoYGapIGXMIGUMQswCQYD
MIIE6TCCA9GgAwIBAgIJAKrTP6wYCjdNMA0GCSqGSIb3DQEBCwUAMIGUMQswCQYD
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8G
A1UECgwIU2F3dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3
dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIU
Xrqk9LH3SCXjX5vaoRPt1SsDZxUwDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtl
eGFtcGxlLmNvbYcEfwAAATAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw
DQYJKoZIhvcNAQELBQADggEBALntlD4Acy2l0QSz+9zwtw09rZZ0TJJnrW184plq
M8qyDwRapWf44ws99dBbHiBSEpIo6jGjUZ6L0jnkJephYUEWLVRQ0/vQNAAQ8Xu8
8Ain9SdefkCdmbDTMRHDnalRoBfPgyxVhODVkqAFOp+4dfgb5fekbOmqJYsZk0Yf
PzOvRynPe4tZJ+vXT8szGfpf7tgT6QwHrTvAfxDX5O3o2xbhH6R/Fjy91xHy1Dqp
m5XhOVGZ61tlRu9jhHOVI7i/tfZNEnH3/zOqSoxlc3OJad+m3KSR/67HKJO1Gt6p
jyswhYOLmYLKs3wREIidjmws8wVvy4CFFrft5Gj7trYxin0=
dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAe
Fw0yMTAyMTAxOTQ5NTJaFw0yMzExMDcxOTQ5NTJaMIGUMQswCQYDVQQGEwJVUzEQ
MA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjERMA8GA1UECgwIU2F3
dG9vdGgxEzARBgNVBAsMCkNvbnN1bHRpbmcxGDAWBgNVBAMMD3d3dy53b2xmc3Ns
LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCCASIwDQYJKoZI
hvcNAQEBBQADggEPADCCAQoCggEBAL8Myi0Ush6EQlvNOB9K8k11EPG2NZ/fyn0D
mNOs3gNm7irx2LB9bgdUCxCYIU2AyxIg58xP3kV9yXJ3MurKkLtpUhADL6jzlcXx
i2JWG+9nb6QQQZWtCpvjpcCw0nB2UDBbqOgILHztp6J6jTgpHKzH7fJ8lbCVgn1J
XDjNdyXvvYB1U5Q8PcpjW58VtdMdEy8Z0TzbdjrMuH3J5cLX2kBv2CHccxtCLVOc
/hr8fat6Nj+Y3oR8BWfOahQ4h6nxjLVoy2h/cSAr9aBj9VYvoybSt2+xWhfXOJkI
/pNYb/7DE0kIFgunTWcAUjFnI06Y7VFFHbkE2Qvs2CizS73tNnkCAwEAAaOCATow
ggE2MB0GA1UdDgQWBBQnjmcRdMMmHT/tM2OzpNgdMOXo1TCByQYDVR0jBIHBMIG+
gBQnjmcRdMMmHT/tM2OzpNgdMOXo1aGBmqSBlzCBlDELMAkGA1UEBhMCVVMxEDAO
BgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xETAPBgNVBAoMCFNhd3Rv
b3RoMRMwEQYDVQQLDApDb25zdWx0aW5nMRgwFgYDVQQDDA93d3cud29sZnNzbC5j
b20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb22CCQCq0z+sGAo3TTAM
BgNVHRMEBTADAQH/MBwGA1UdEQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1Ud
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAYpjI
WM9WA4ZbG3FJfQUDXeAIhq3bSt6rIpaow1lowTeQQN+9idC82o7vh7LCYlLhGikX
apaZyE7YMv640Vw7CsI8X6EemH/OiSYhH2ScFXqc7/sdhWr6mM6oqavDosDrh+28
Id/zB1uu/UDUriDQdooxCqJifGENzl2aHuQgiFFJ+3epzU3Gv1SZM+9LoHNwbS7Z
PQj2EjkxaMZhXEG1G/Q4ffy+c2Yt98pbLFsxqs/2fzDkEiyO1jhR5kXu1drDg9bt
XuzWthSzk1nhVUp/BN/OZdTfGE/dtEV/plYwxAVEmJ1PJm2EgKBe7SPRSIcOBQaR
O7A8u4yPPHtMT6HKmA==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,18 +1,17 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7e:bd:d9:c1:a5:b2:60:a4:ba:f4:86:cf:13:ac:77:84:be:ac:07:e7
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 9459666439398825038 (0x83477c81d60d1c4e)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
pub:
04:02:d3:d9:6e:d6:01:8e:45:c8:b9:90:31:e5:c0:
4c:e3:9e:ad:29:38:98:ba:10:d6:e9:09:2a:80:a9:
2e:17:2a:b9:8a:bf:33:83:46:e3:95:0b:e4:77:40:
@@ -31,23 +30,23 @@ Certificate:
X509v3 Key Usage: critical
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ecdsa-with-SHA256
30:44:02:20:06:c3:0a:69:01:57:31:17:09:3f:21:95:4f:3f:
c5:20:e3:21:86:75:47:5e:87:f7:48:8a:1e:01:fa:d2:67:c8:
02:20:7d:c8:e9:2d:5b:74:28:87:71:db:a3:0e:19:84:cc:b3:
a6:83:35:75:f8:05:dd:fc:5e:51:2b:18:98:c4:ac:95
30:45:02:21:00:c5:83:ff:1e:51:f7:a1:e9:f1:42:c4:be:ed:
38:bd:38:32:8f:ae:3f:c7:6d:11:90:e9:99:ab:61:a2:db:a7:
4b:02:20:28:40:d9:ba:45:cc:a6:ea:fa:3f:3e:71:44:8e:02:
03:2f:41:0b:56:78:2d:a6:e8:5e:f6:ff:da:62:8c:f9:df
-----BEGIN CERTIFICATE-----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MIICijCCAjCgAwIBAgIJAINHfIHWDRxOMAoGCCqGSM49BAMCMIGXMQswCQYDVQQG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-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,18 +1,17 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
20:da:85:3f:78:c9:83:3b:ae:aa:5a:67:49:27:78:ba:90:de:66:6e
Signature Algorithm: ecdsa-with-SHA384
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 12132976075216541034 (0xa860fd750798556a)
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Development, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Development, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
pub:
04:ee:82:d4:39:9a:b1:27:82:f4:d7:ea:c6:bc:03:
1d:4d:83:61:f4:03:ae:7e:bd:d8:5a:a5:b9:f0:8e:
a2:a5:da:ce:87:3b:5a:ab:44:16:9c:f5:9f:62:dd:
@@ -33,27 +32,26 @@ Certificate:
X509v3 Key Usage: critical
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ecdsa-with-SHA384
30:66:02:31:00:d2:4e:24:af:70:3e:93:0b:2e:d5:7c:71:f3:
61:3e:8e:71:6d:2e:60:de:fb:ef:3f:be:02:b6:14:45:9b:0a:
12:af:af:41:d6:bb:79:ab:d1:4e:8d:9d:dc:98:25:4e:aa:02:
31:00:cf:2f:b7:32:70:e7:85:69:17:df:53:75:2b:36:74:d6:
1b:a2:62:f9:80:19:c1:3a:ea:9a:05:80:b6:c5:f8:a2:a2:ff:
f6:3d:aa:34:d6:e1:1f:e3:93:66:e7:91:4d:fa
30:65:02:30:47:a2:36:33:f4:27:bd:d0:5c:e6:8d:3e:31:a9:
4e:51:57:a9:93:28:72:0a:72:ab:6e:f9:56:c0:f5:70:02:9f:
9c:b2:4a:9c:3e:9f:fb:c5:64:26:7a:88:dc:4a:2a:25:02:31:
00:88:f8:e2:d5:20:82:f2:de:7b:cb:13:ac:cd:ff:e8:1e:4e:
84:3d:9c:af:5d:f9:01:e7:4f:d4:03:09:84:3d:7b:2b:83:e2:
ae:08:68:2e:5b:85:6f:43:f5:41:e0:c7:c9
-----BEGIN CERTIFICATE-----
MIIC0zCCAligAwIBAgIUINqFP3jJgzuuqlpnSSd4upDeZm4wCgYIKoZIzj0EAwMw
gZcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdT
ZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9wbWVudDEY
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
bGZzc2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZcxCzAJ
BgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxl
MRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtEZXZlbG9wbWVudDEYMBYGA1UE
AwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
Y29tMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE7oLUOZqxJ4L01+rGvAMdTYNh9AOu
fr3YWqW58I6ipdrOhztaq0QWnPWfYt32IM2cdjxAsT+XF99Z9s3ezUY1wO1eLki2
ZpFxdLcMP7mat4O9kz9fUC1wP941JeGQO4bgo2MwYTAdBgNVHQ4EFgQUq+DDJkwY
1HK70oSMnAoFkoASU1IwHwYDVR0jBBgwFoAUq+DDJkwY1HK70oSMnAoFkoASU1Iw
DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMDaQAw
ZgIxANJOJK9wPpMLLtV8cfNhPo5xbS5g3vvvP74CthRFmwoSr69B1rt5q9FOjZ3c
mCVOqgIxAM8vtzJw54VpF99TdSs2dNYbomL5gBnBOuqaBYC2xfiiov/2Pao01uEf
45Nm55FN+g==
MIICxzCCAk2gAwIBAgIJAKhg/XUHmFVqMAoGCCqGSM49BAMDMIGXMQswCQYDVQQG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-----END CERTIFICATE-----

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
45:45:81:82:e6:3a:bd:a2:e3:06:0e:ba:2c:45:74:4b:be:c0:39:11
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 17391944375755183620 (0xf15c9943663d9604)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
@@ -38,7 +37,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:45:45:81:82:E6:3A:BD:A2:E3:06:0E:BA:2C:45:74:4B:BE:C0:39:11
serial:F1:5C:99:43:66:3D:96:04
X509v3 Basic Constraints:
CA:TRUE
@@ -47,66 +46,64 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
c1:06:39:c8:ce:f5:81:49:55:e1:3a:55:aa:91:5d:64:f1:4b:
dc:33:1e:31:15:e7:10:71:16:0d:b5:00:dc:bb:22:0d:81:d9:
12:5c:0c:dd:61:e1:af:b5:e2:f7:7d:8b:e6:61:fd:ca:45:3a:
61:e7:18:56:2c:26:f2:df:14:f1:e0:3d:7f:62:12:5f:d8:04:
44:06:0c:72:b1:8a:50:72:67:77:74:01:ff:79:64:11:6e:b3:
84:51:19:22:b6:43:10:06:0d:39:46:5a:c6:57:0a:43:a1:94:
02:28:0a:12:38:85:04:0e:78:52:48:28:7e:6c:d9:f0:4b:04:
55:7c:39:01:c1:b4:5f:50:06:cf:da:6f:20:b8:94:f7:51:1a:
23:cb:30:e3:21:b4:a3:73:ad:48:fb:96:69:ef:2e:50:b6:67:
bc:64:ee:27:76:43:7a:34:59:8e:b4:57:53:7d:95:7e:50:7e:
64:4c:29:68:fe:81:4f:73:21:24:b5:a9:a2:49:5f:54:7f:0d:
c2:96:c7:f5:36:81:8e:c0:00:af:b4:10:6b:0e:bc:1a:3a:f1:
a6:dd:fd:8e:63:21:33:d4:32:31:1f:be:a3:7c:52:85:26:c8:
6e:50:6c:ac:3d:2e:c0:f9:50:ed:c8:4d:cd:13:50:ce:5e:de:
15:89:d1:fb
ba:2b:48:d1:a8:e3:c2:84:42:96:a1:7c:e5:f1:46:ba:4c:f7:
87:57:c7:78:c8:c1:32:c4:69:ff:85:bb:5d:6a:dd:c9:87:7e:
fe:bb:f4:fd:15:0a:4c:94:95:80:30:90:45:03:f8:33:87:ca:
5f:74:38:a4:d0:5a:c7:65:38:c3:b0:e8:87:b1:49:32:b9:ac:
e9:fb:d3:08:1d:a4:51:7b:d7:d9:4b:79:35:a2:3a:0b:e4:0c:
a0:02:9c:a1:68:e1:5d:6c:8e:2e:3a:24:de:bb:d6:1c:a7:ac:
2e:cd:57:44:48:f6:72:e0:c7:5b:93:dc:7d:5b:64:0e:17:84:
68:2c:95:1d:2c:86:d6:b0:74:67:51:6e:7b:f4:d5:61:38:51:
b3:18:e3:10:16:73:4b:36:8a:8a:62:05:f5:56:8a:be:21:e1:
78:7d:bf:ad:45:f9:0b:f5:af:a0:62:01:fd:3f:49:df:39:3c:
ff:46:e8:0a:fe:5c:6b:bb:41:a5:64:f1:5c:9b:51:4c:bc:6d:
9f:a3:20:ed:e9:48:e1:a9:be:08:2d:85:42:59:d6:43:7d:47:
22:a5:fa:1f:a2:58:76:0b:70:1c:1d:59:1d:aa:be:5d:2d:25:
7c:b1:06:b6:c0:aa:28:aa:93:7c:d0:bd:43:ad:91:50:1c:7b:
4d:f3:e4:d7
-----BEGIN CERTIFICATE-----
MIIFHTCCBAWgAwIBAgIURUWBguY6vaLjBg66LEV0S77AOREwDQYJKoZIhvcNAQEL
BQAwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxGTAXBgNVBAsMEFByb2dyYW1t
aW5nLTIwNDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJ
ARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0yMDA2MTkxMzIzNDFaFw0yMzAzMTYxMzIz
NDFaMIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwH
Qm96ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFt
bWluZy0yMDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0B
CQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
AoIBAQDDA9Er/jmkMkU7U8iEKyp8dJq9qipSB0fWpjayBzKO0Lppe8bDRJ7UgUj9
LWiii2e7oXXINixK0hv3i7rPDfnv7PGBHnubA0eav2XMf2UkaaboFIlb5DT3xbAU
k/Vnezp6eOEBVlaRphNCjdI8QJxM79GG3zdRGwyhO/Xxo0o15OHOlt8bfr9Ol9AQ
6KgIMIGvIAtDFMV0Z7Qygm+NhsKIQJk2g7oeQHIiF9dSZSRzsM7vGc2u/3hse8AS
A9ROcg1QbTujO6OZXp3I2QyFs9mK2VQm2236rLv/JUzE0Xn0cdOGQBgTsGO1ck4w
xJeEhi1WL9cV93/ArvX8W+X7obrTAgMBAAGjggFPMIIBSzAdBgNVHQ4EFgQUM9hF
Ztdohxh+VA1wJ5HHJteFZcAwgd4GA1UdIwSB1jCB04AUM9hFZtdohxh+VA1wJ5HH
JteFZcChgaSkgaEwgZ4xCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAw
DgYDVQQHDAdCb3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxGTAXBgNVBAsM
EFByb2dyYW1taW5nLTIwNDgxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0G
CSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIURUWBguY6vaLjBg66LEV0S77A
OREwDAYDVR0TBAUwAwEB/zAcBgNVHREEFTATggtleGFtcGxlLmNvbYcEfwAAATAd
BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEB
AMEGOcjO9YFJVeE6VaqRXWTxS9wzHjEV5xBxFg21ANy7Ig2B2RJcDN1h4a+14vd9
i+Zh/cpFOmHnGFYsJvLfFPHgPX9iEl/YBEQGDHKxilByZ3d0Af95ZBFus4RRGSK2
QxAGDTlGWsZXCkOhlAIoChI4hQQOeFJIKH5s2fBLBFV8OQHBtF9QBs/abyC4lPdR
GiPLMOMhtKNzrUj7lmnvLlC2Z7xk7id2Q3o0WY60V1N9lX5QfmRMKWj+gU9zISS1
qaJJX1R/DcKWx/U2gY7AAK+0EGsOvBo68abd/Y5jITPUMjEfvqN8UoUmyG5QbKw9
LsD5UO3ITc0TUM5e3hWJ0fs=
MIIFBzCCA++gAwIBAgIJAPFcmUNmPZYEMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD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-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
61:b3:1e:59:f3:68:6c:a4:79:42:83:2f:1a:50:71:03:be:32:aa:2c
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 16666221217456835267 (0xe74a4fe55697cac3)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
pub:
04:55:bf:f4:0f:44:50:9a:3d:ce:9b:b7:f0:c5:4d:
f5:70:7b:d4:ec:24:8e:19:80:ec:5a:4c:a2:24:03:
62:2c:9b:da:ef:a2:35:12:43:84:76:16:c6:56:95:
@@ -120,7 +117,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2
DirName:/C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:61:B3:1E:59:F3:68:6C:A4:79:42:83:2F:1A:50:71:03:BE:32:AA:2C
serial:E7:4A:4F:E5:56:97:CA:C3
X509v3 Basic Constraints:
CA:TRUE
@@ -129,28 +126,27 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: ecdsa-with-SHA256
30:46:02:21:00:e4:a0:23:26:2b:0b:42:0f:97:37:6d:cb:14:
23:c3:c3:e6:44:cf:5f:4c:26:a3:72:64:7a:9c:cb:64:ab:a6:
be:02:21:00:aa:c5:a3:50:f6:f1:a5:db:05:e0:75:d2:f7:ba:
49:5f:8f:7d:1c:44:b1:6e:df:c8:da:10:48:2d:53:08:a8:b4
30:46:02:21:00:e3:bb:ca:0e:31:2d:39:1d:94:25:81:90:d5:
11:f9:09:6d:58:16:23:be:9f:a9:18:64:83:3c:25:03:58:58:
39:02:21:00:a4:aa:b3:f0:09:c9:0c:2f:f7:b1:d4:8e:9f:a6:
b6:ab:1a:c7:37:ed:70:4d:34:04:a0:9b:3d:84:86:10:a0:f0
-----BEGIN CERTIFICATE-----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MIIDSTCCAu6gAwIBAgIJAOdKT+VWl8rDMAoGCCqGSM49BAMCMIGNMQswCQYDVQQG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-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
45:45:81:82:e6:3a:bd:a2:e3:06:0e:ba:2c:45:74:4b:be:c0:39:11
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 17391944375755183620 (0xf15c9943663d9604)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=Programming-2048, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
@@ -38,7 +37,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:45:45:81:82:E6:3A:BD:A2:E3:06:0E:BA:2C:45:74:4B:BE:C0:39:11
serial:F1:5C:99:43:66:3D:96:04
X509v3 Basic Constraints:
CA:TRUE
@@ -47,48 +46,47 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
c1:06:39:c8:ce:f5:81:49:55:e1:3a:55:aa:91:5d:64:f1:4b:
dc:33:1e:31:15:e7:10:71:16:0d:b5:00:dc:bb:22:0d:81:d9:
12:5c:0c:dd:61:e1:af:b5:e2:f7:7d:8b:e6:61:fd:ca:45:3a:
61:e7:18:56:2c:26:f2:df:14:f1:e0:3d:7f:62:12:5f:d8:04:
44:06:0c:72:b1:8a:50:72:67:77:74:01:ff:79:64:11:6e:b3:
84:51:19:22:b6:43:10:06:0d:39:46:5a:c6:57:0a:43:a1:94:
02:28:0a:12:38:85:04:0e:78:52:48:28:7e:6c:d9:f0:4b:04:
55:7c:39:01:c1:b4:5f:50:06:cf:da:6f:20:b8:94:f7:51:1a:
23:cb:30:e3:21:b4:a3:73:ad:48:fb:96:69:ef:2e:50:b6:67:
bc:64:ee:27:76:43:7a:34:59:8e:b4:57:53:7d:95:7e:50:7e:
64:4c:29:68:fe:81:4f:73:21:24:b5:a9:a2:49:5f:54:7f:0d:
c2:96:c7:f5:36:81:8e:c0:00:af:b4:10:6b:0e:bc:1a:3a:f1:
a6:dd:fd:8e:63:21:33:d4:32:31:1f:be:a3:7c:52:85:26:c8:
6e:50:6c:ac:3d:2e:c0:f9:50:ed:c8:4d:cd:13:50:ce:5e:de:
15:89:d1:fb
ba:2b:48:d1:a8:e3:c2:84:42:96:a1:7c:e5:f1:46:ba:4c:f7:
87:57:c7:78:c8:c1:32:c4:69:ff:85:bb:5d:6a:dd:c9:87:7e:
fe:bb:f4:fd:15:0a:4c:94:95:80:30:90:45:03:f8:33:87:ca:
5f:74:38:a4:d0:5a:c7:65:38:c3:b0:e8:87:b1:49:32:b9:ac:
e9:fb:d3:08:1d:a4:51:7b:d7:d9:4b:79:35:a2:3a:0b:e4:0c:
a0:02:9c:a1:68:e1:5d:6c:8e:2e:3a:24:de:bb:d6:1c:a7:ac:
2e:cd:57:44:48:f6:72:e0:c7:5b:93:dc:7d:5b:64:0e:17:84:
68:2c:95:1d:2c:86:d6:b0:74:67:51:6e:7b:f4:d5:61:38:51:
b3:18:e3:10:16:73:4b:36:8a:8a:62:05:f5:56:8a:be:21:e1:
78:7d:bf:ad:45:f9:0b:f5:af:a0:62:01:fd:3f:49:df:39:3c:
ff:46:e8:0a:fe:5c:6b:bb:41:a5:64:f1:5c:9b:51:4c:bc:6d:
9f:a3:20:ed:e9:48:e1:a9:be:08:2d:85:42:59:d6:43:7d:47:
22:a5:fa:1f:a2:58:76:0b:70:1c:1d:59:1d:aa:be:5d:2d:25:
7c:b1:06:b6:c0:aa:28:aa:93:7c:d0:bd:43:ad:91:50:1c:7b:
4d:f3:e4:d7
-----BEGIN CERTIFICATE-----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MIIFBzCCA++gAwIBAgIJAPFcmUNmPZYEMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
A1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFtbWluZy0yMDQ4MRgw
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
ZnNzbC5jb20wHhcNMjEwMjEwMTk0OTUyWhcNMjMxMTA3MTk0OTUyWjCBnjELMAkG
A1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTAT
BgNVBAoMDHdvbGZTU0xfMjA0ODEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMjA0ODEY
MBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdv
bGZzc2wuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwwPRK/45
pDJFO1PIhCsqfHSavaoqUgdH1qY2sgcyjtC6aXvGw0Se1IFI/S1oootnu6F1yDYs
StIb94u6zw357+zxgR57mwNHmr9lzH9lJGmm6BSJW+Q098WwFJP1Z3s6enjhAVZW
kaYTQo3SPECcTO/Rht83URsMoTv18aNKNeThzpbfG36/TpfQEOioCDCBryALQxTF
dGe0MoJvjYbCiECZNoO6HkByIhfXUmUkc7DO7xnNrv94bHvAEgPUTnINUG07ozuj
mV6dyNkMhbPZitlUJttt+qy7/yVMxNF59HHThkAYE7BjtXJOMMSXhIYtVi/XFfd/
wK71/Fvl+6G60wIDAQABo4IBRDCCAUAwHQYDVR0OBBYEFDPYRWbXaIcYflQNcCeR
xybXhWXAMIHTBgNVHSMEgcswgciAFDPYRWbXaIcYflQNcCeRxybXhWXAoYGkpIGh
MIGeMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96
ZW1hbjEVMBMGA1UECgwMd29sZlNTTF8yMDQ4MRkwFwYDVQQLDBBQcm9ncmFtbWlu
Zy0yMDQ4MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEW
EGluZm9Ad29sZnNzbC5jb22CCQDxXJlDZj2WBDAMBgNVHRMEBTADAQH/MBwGA1Ud
EQQVMBOCC2V4YW1wbGUuY29thwR/AAABMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr
BgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAuitI0ajjwoRClqF85fFGukz3h1fH
eMjBMsRp/4W7XWrdyYd+/rv0/RUKTJSVgDCQRQP4M4fKX3Q4pNBax2U4w7Doh7FJ
Mrms6fvTCB2kUXvX2Ut5NaI6C+QMoAKcoWjhXWyOLjok3rvWHKesLs1XREj2cuDH
W5PcfVtkDheEaCyVHSyG1rB0Z1Fue/TVYThRsxjjEBZzSzaKimIF9VaKviHheH2/
rUX5C/WvoGIB/T9J3zk8/0boCv5ca7tBpWTxXJtRTLxtn6Mg7elI4am+CC2FQlnW
Q31HIqX6H6JYdgtwHB1ZHaq+XS0lfLEGtsCqKKqTfNC9Q62RUBx7TfPk1w==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,18 +1,17 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
61:b3:1e:59:f3:68:6c:a4:79:42:83:2f:1a:50:71:03:be:32:aa:2c
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 16666221217456835267 (0xe74a4fe55697cac3)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Oregon, L=Salem, O=Client ECC, OU=Fast, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
pub:
04:55:bf:f4:0f:44:50:9a:3d:ce:9b:b7:f0:c5:4d:
f5:70:7b:d4:ec:24:8e:19:80:ec:5a:4c:a2:24:03:
62:2c:9b:da:ef:a2:35:12:43:84:76:16:c6:56:95:
@@ -26,7 +25,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:EB:D4:4B:59:6B:95:61:3F:51:57:B6:04:4D:89:41:88:44:5C:AB:F2
DirName:/C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:61:B3:1E:59:F3:68:6C:A4:79:42:83:2F:1A:50:71:03:BE:32:AA:2C
serial:E7:4A:4F:E5:56:97:CA:C3
X509v3 Basic Constraints:
CA:TRUE
@@ -35,28 +34,27 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: ecdsa-with-SHA256
30:46:02:21:00:e4:a0:23:26:2b:0b:42:0f:97:37:6d:cb:14:
23:c3:c3:e6:44:cf:5f:4c:26:a3:72:64:7a:9c:cb:64:ab:a6:
be:02:21:00:aa:c5:a3:50:f6:f1:a5:db:05:e0:75:d2:f7:ba:
49:5f:8f:7d:1c:44:b1:6e:df:c8:da:10:48:2d:53:08:a8:b4
30:46:02:21:00:e3:bb:ca:0e:31:2d:39:1d:94:25:81:90:d5:
11:f9:09:6d:58:16:23:be:9f:a9:18:64:83:3c:25:03:58:58:
39:02:21:00:a4:aa:b3:f0:09:c9:0c:2f:f7:b1:d4:8e:9f:a6:
b6:ab:1a:c7:37:ed:70:4d:34:04:a0:9b:3d:84:86:10:a0:f0
-----BEGIN CERTIFICATE-----
MIIDXzCCAwSgAwIBAgIUYbMeWfNobKR5QoMvGlBxA74yqiwwCgYIKoZIzj0EAwIw
gY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAMBgNVBAcMBVNhbGVt
MRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYDVQQLDARGYXN0MRgwFgYDVQQDDA93
d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20w
HhcNMjAwNjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBjTELMAkGA1UEBhMCVVMx
DzANBgNVBAgMBk9yZWdvbjEOMAwGA1UEBwwFU2FsZW0xEzARBgNVBAoMCkNsaWVu
dCBFQ0MxDTALBgNVBAsMBEZhc3QxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEf
MB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTBZMBMGByqGSM49AgEGCCqG
SM49AwEHA0IABFW/9A9EUJo9zpu38MVN9XB71OwkjhmA7FpMoiQDYiyb2u+iNRJD
hHYWxlaVBswBqb32dRpC972psjYiX8ddf7SjggE+MIIBOjAdBgNVHQ4EFgQU69RL
WWuVYT9RV7YETYlBiERcq/Iwgc0GA1UdIwSBxTCBwoAU69RLWWuVYT9RV7YETYlB
iERcq/KhgZOkgZAwgY0xCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAM
BgNVBAcMBVNhbGVtMRMwEQYDVQQKDApDbGllbnQgRUNDMQ0wCwYDVQQLDARGYXN0
MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9A
d29sZnNzbC5jb22CFGGzHlnzaGykeUKDLxpQcQO+MqosMAwGA1UdEwQFMAMBAf8w
HAYDVR0RBBUwE4ILZXhhbXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUH
AwEGCCsGAQUFBwMCMAoGCCqGSM49BAMCA0kAMEYCIQDkoCMmKwtCD5c3bcsUI8PD
5kTPX0wmo3JkepzLZKumvgIhAKrFo1D28aXbBeB10ve6SV+PfRxEsW7fyNoQSC1T
CKi0
MIIDSTCCAu6gAwIBAgIJAOdKT+VWl8rDMAoGCCqGSM49BAMCMIGNMQswCQYDVQQG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-----END CERTIFICATE-----

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
31:a3:17:40:4e:fb:ba:fe:19:56:3a:3d:f3:f1:e4:0d:d9:9b:66:7e
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = RELATIVE_URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 10273515510344552519 (0x8e92dbecdc8d9047)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=RELATIVE_URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = RELATIVE_URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=RELATIVE_URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
@@ -38,54 +37,54 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=RELATIVE_URI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:31:A3:17:40:4E:FB:BA:FE:19:56:3A:3D:F3:F1:E4:0D:D9:9B:66:7E
serial:8E:92:DB:EC:DC:8D:90:47
X509v3 Basic Constraints:
CA:FALSE
X509v3 Subject Alternative Name:
URI:../relative/page.html
Signature Algorithm: sha256WithRSAEncryption
43:41:a6:92:63:52:da:bc:83:90:02:b4:a0:9b:be:4c:1e:bf:
b5:33:67:81:6d:4c:69:6b:d2:d0:50:50:69:85:56:ab:67:0d:
3e:5e:21:9a:f5:ff:f6:5c:e1:7d:c5:e8:63:c1:11:e5:d0:31:
44:4d:d1:bd:14:e9:2d:a8:3d:b5:db:50:88:ef:9f:2a:25:94:
df:41:b3:b6:84:93:36:13:cd:17:46:18:c7:44:01:d7:20:42:
66:0e:42:e1:91:7c:61:f6:3a:e1:c5:69:cc:da:3b:51:58:2a:
8c:3d:d4:66:d2:eb:77:b1:4b:ae:24:d5:99:c3:5f:49:92:9f:
86:11:5a:c6:b6:81:2d:b7:31:b4:65:55:69:2c:cf:b2:b8:57:
6b:46:9f:fe:f7:d8:06:b6:b3:8e:1c:24:dc:f8:e3:e8:69:39:
e1:c9:97:06:5f:92:27:fa:ac:d6:ae:d3:a0:08:e5:76:ff:5a:
e0:4c:be:40:c8:5b:d8:65:c4:43:06:a1:3f:71:b0:ee:f2:0d:
85:cb:0f:f6:10:93:62:64:26:09:ad:a8:ff:3d:39:61:4c:0b:
2e:6f:cf:c8:00:59:8e:13:17:3a:f1:ff:30:21:71:ac:7a:ee:
52:e8:0e:82:1f:75:41:ed:36:4e:1e:5b:4a:95:ce:38:4b:7f:
20:ca:d7:86
b4:68:57:4f:dd:9b:14:4e:61:2e:7d:96:88:cc:bb:b9:9d:46:
70:48:ee:f3:ce:6e:cd:0a:06:5d:95:80:28:f5:e7:9c:50:8f:
a9:3a:6b:32:b1:33:92:87:13:6f:f6:ce:82:ef:5f:e7:a5:97:
23:1f:12:ff:a9:f3:33:54:4a:c9:92:68:47:12:51:89:84:48:
45:60:2e:9e:45:ca:3d:05:91:0f:dc:ef:0f:0e:3c:cb:95:f0:
68:f0:db:66:c6:06:35:88:8e:cd:18:94:2e:2c:7f:e8:b8:17:
fa:e8:31:2c:84:5a:f2:2d:92:47:e3:fa:8a:d2:5e:9a:16:ba:
fd:5f:75:cd:17:12:bd:e8:5f:61:93:ea:09:8b:da:ef:a1:9e:
4c:03:da:55:75:4e:b3:88:bb:a2:3a:5c:0b:90:41:60:63:84:
40:cf:c4:dd:87:6f:77:29:7b:00:c7:56:41:ce:04:5d:46:4e:
c1:6c:b0:75:dc:f2:b1:fd:35:68:79:b5:7e:9f:5d:00:b0:be:
b6:b6:19:71:44:bb:d3:41:1f:54:16:90:fb:32:41:0a:44:35:
59:0c:cc:a3:40:ff:02:fb:a1:e4:97:08:3a:e2:93:ed:6d:cf:
c8:a0:42:61:19:72:ee:e6:e4:30:af:5d:3b:76:e1:5c:7f:ca:
06:d5:20:0d
-----BEGIN CERTIFICATE-----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MIIE3TCCA8WgAwIBAgIJAI6S2+zcjZBHMA0GCSqGSIb3DQEBCwUAMIGaMQswCQYD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-----END CERTIFICATE-----

View File

@@ -1,17 +1,16 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
23:a1:03:97:86:ca:57:02:1c:21:00:25:07:d8:b9:89:1c:1e:df:f2
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 14951923003315625164 (0xcf7fe6c0b99e9ccc)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = URI, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:52 2021 GMT
Not After : Nov 7 19:49:52 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_2048, OU=URI, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:c3:03:d1:2b:fe:39:a4:32:45:3b:53:c8:84:2b:
2a:7c:74:9a:bd:aa:2a:52:07:47:d6:a6:36:b2:07:
@@ -38,53 +37,53 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:33:D8:45:66:D7:68:87:18:7E:54:0D:70:27:91:C7:26:D7:85:65:C0
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=URI/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:23:A1:03:97:86:CA:57:02:1C:21:00:25:07:D8:B9:89:1C:1E:DF:F2
serial:CF:7F:E6:C0:B9:9E:9C:CC
X509v3 Basic Constraints:
CA:FALSE
X509v3 Subject Alternative Name:
URI:https://www.wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
08:27:81:4b:56:bb:e4:06:57:3c:b6:83:e4:34:8a:65:33:76:
a7:55:c7:e9:eb:e4:7d:12:b7:24:b0:88:ad:fb:28:7d:36:0f:
2d:5c:09:98:62:4d:fe:73:25:ff:f2:79:e4:2c:85:38:44:44:
2a:9f:6d:35:ff:95:d5:b2:48:4f:40:6b:d7:a6:fd:a1:f4:e8:
46:69:68:a9:c1:97:68:a1:fb:ab:b8:f2:c0:58:71:6a:4e:f3:
ae:96:b5:9e:22:61:ca:d6:bc:3c:a9:bc:30:6c:1d:73:dc:e6:
a0:cd:a1:d5:e6:6f:9d:9c:56:a3:dd:56:27:cc:42:52:4a:6b:
48:b7:d2:b6:45:83:23:03:94:c2:1e:9d:d2:a4:86:9a:8f:2e:
65:49:a4:07:40:90:45:04:48:a0:f8:67:f0:5f:d8:02:34:1f:
4b:5f:b6:ab:80:a2:33:c6:0d:04:a7:ff:b4:45:ed:c2:07:00:
c4:58:2a:b9:cf:40:23:d2:b5:5d:e5:d7:00:1a:81:91:d8:ca:
da:fe:87:7c:91:77:72:2d:cc:ad:72:a4:5f:1b:19:62:57:f4:
47:c0:47:a8:7e:c4:ed:6f:52:c1:ff:7f:22:fa:ca:2d:d8:1d:
73:b3:3b:09:aa:08:b6:67:e9:fd:73:92:73:e4:0f:dd:40:25:
5a:1a:61:43
4b:f2:ec:8e:47:35:a9:fc:3c:36:98:48:b4:64:6c:3e:65:bd:
c9:d4:a7:38:3f:33:e2:60:ee:7f:aa:16:70:3f:c8:28:02:3e:
5c:d2:fe:a1:a7:d2:fb:e8:f6:6d:9f:c4:a4:b1:81:f4:6e:80:
3d:bc:27:f6:6e:d8:93:85:5e:cc:dd:5d:87:16:b3:75:85:72:
76:dd:9a:32:93:df:01:fa:4d:d2:d3:a4:27:fc:e3:bd:7a:f1:
9d:3d:08:2e:e7:1f:e3:b8:96:9e:11:0d:88:3b:ba:1f:b5:d8:
c7:67:9e:74:56:27:5b:55:88:5b:79:dc:2c:56:64:a0:71:72:
1a:06:d8:d4:0f:41:bf:9d:f3:3e:59:9e:b1:e5:41:6d:4a:a0:
44:e2:7a:d2:0b:3f:3a:45:14:ff:d5:42:8f:aa:8b:7d:ff:38:
e7:a9:c2:92:b0:4e:dc:c6:13:35:8c:25:ef:49:c1:06:c2:3b:
21:91:de:0f:14:0c:79:7d:3c:d6:14:57:ce:eb:9b:49:3f:c5:
ff:5c:5a:a8:81:cf:ba:0f:51:ec:01:82:56:0a:de:98:41:6f:
ec:43:47:6d:45:a4:92:67:f2:08:c0:65:d3:8c:47:9c:73:0e:
de:27:b7:44:33:44:eb:51:d5:ad:80:00:e1:f2:e3:ef:04:8c:
05:94:af:f6
-----BEGIN CERTIFICATE-----
MIIE2jCCA8KgAwIBAgIUI6EDl4bKVwIcIQAlB9i5iRwe3/IwDQYJKoZIhvcNAQEL
BQAwgZExCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdC
b3plbWFuMRUwEwYDVQQKDAx3b2xmU1NMXzIwNDgxDDAKBgNVBAsMA1VSSTEYMBYG
A1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZz
c2wuY29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZExCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMRUwEwYD
VQQKDAx3b2xmU1NMXzIwNDgxDDAKBgNVBAsMA1VSSTEYMBYGA1UEAwwPd3d3Lndv
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIBIjAN
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwwPRK/45pDJFO1PIhCsqfHSavaoq
UgdH1qY2sgcyjtC6aXvGw0Se1IFI/S1oootnu6F1yDYsStIb94u6zw357+zxgR57
mwNHmr9lzH9lJGmm6BSJW+Q098WwFJP1Z3s6enjhAVZWkaYTQo3SPECcTO/Rht83
URsMoTv18aNKNeThzpbfG36/TpfQEOioCDCBryALQxTFdGe0MoJvjYbCiECZNoO6
HkByIhfXUmUkc7DO7xnNrv94bHvAEgPUTnINUG07ozujmV6dyNkMhbPZitlUJttt
+qy7/yVMxNF59HHThkAYE7BjtXJOMMSXhIYtVi/XFfd/wK71/Fvl+6G60wIDAQAB
o4IBJjCCASIwHQYDVR0OBBYEFDPYRWbXaIcYflQNcCeRxybXhWXAMIHRBgNVHSME
gckwgcaAFDPYRWbXaIcYflQNcCeRxybXhWXAoYGXpIGUMIGRMQswCQYDVQQGEwJV
UzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UECgwM
d29sZlNTTF8yMDQ4MQwwCgYDVQQLDANVUkkxGDAWBgNVBAMMD3d3dy53b2xmc3Ns
LmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbYIUI6EDl4bKVwIc
IQAlB9i5iRwe3/IwCQYDVR0TBAIwADAiBgNVHREEGzAZhhdodHRwczovL3d3dy53
b2xmc3NsLmNvbTANBgkqhkiG9w0BAQsFAAOCAQEACCeBS1a75AZXPLaD5DSKZTN2
p1XH6evkfRK3JLCIrfsofTYPLVwJmGJN/nMl//J55CyFOEREKp9tNf+V1bJIT0Br
16b9ofToRmloqcGXaKH7q7jywFhxak7zrpa1niJhyta8PKm8MGwdc9zmoM2h1eZv
nZxWo91WJ8xCUkprSLfStkWDIwOUwh6d0qSGmo8uZUmkB0CQRQRIoPhn8F/YAjQf
S1+2q4CiM8YNBKf/tEXtwgcAxFgquc9AI9K1XeXXABqBkdjK2v6HfJF3ci3MrXKk
XxsZYlf0R8BHqH7E7W9Swf9/IvrKLdgdc7M7CaoItmfp/XOSc+QP3UAlWhphQw==
MIIExDCCA6ygAwIBAgIJAM9/5sC5npzMMA0GCSqGSIb3DQEBCwUAMIGRMQswCQYD
VQQGEwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMG
A1UECgwMd29sZlNTTF8yMDQ4MQwwCgYDVQQLDANVUkkxGDAWBgNVBAMMD3d3dy53
b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTAeFw0y
MTAyMTAxOTQ5NTJaFw0yMzExMDcxOTQ5NTJaMIGRMQswCQYDVQQGEwJVUzEQMA4G
A1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjEVMBMGA1UECgwMd29sZlNT
TF8yMDQ4MQwwCgYDVQQLDANVUkkxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEf
MB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCCASIwDQYJKoZIhvcNAQEB
BQADggEPADCCAQoCggEBAMMD0Sv+OaQyRTtTyIQrKnx0mr2qKlIHR9amNrIHMo7Q
uml7xsNEntSBSP0taKKLZ7uhdcg2LErSG/eLus8N+e/s8YEee5sDR5q/Zcx/ZSRp
pugUiVvkNPfFsBST9Wd7Onp44QFWVpGmE0KN0jxAnEzv0YbfN1EbDKE79fGjSjXk
4c6W3xt+v06X0BDoqAgwga8gC0MUxXRntDKCb42GwohAmTaDuh5AciIX11JlJHOw
zu8Zza7/eGx7wBID1E5yDVBtO6M7o5lencjZDIWz2YrZVCbbbfqsu/8lTMTRefRx
04ZAGBOwY7VyTjDEl4SGLVYv1xX3f8Cu9fxb5fuhutMCAwEAAaOCARswggEXMB0G
A1UdDgQWBBQz2EVm12iHGH5UDXAnkccm14VlwDCBxgYDVR0jBIG+MIG7gBQz2EVm
12iHGH5UDXAnkccm14VlwKGBl6SBlDCBkTELMAkGA1UEBhMCVVMxEDAOBgNVBAgM
B01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZTU0xfMjA0
ODEMMAoGA1UECwwDVVJJMRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkq
hkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb22CCQDPf+bAuZ6czDAJBgNVHRMEAjAA
MCIGA1UdEQQbMBmGF2h0dHBzOi8vd3d3LndvbGZzc2wuY29tMA0GCSqGSIb3DQEB
CwUAA4IBAQBL8uyORzWp/Dw2mEi0ZGw+Zb3J1Kc4PzPiYO5/qhZwP8goAj5c0v6h
p9L76PZtn8SksYH0boA9vCf2btiThV7M3V2HFrN1hXJ23Zoyk98B+k3S06Qn/OO9
evGdPQgu5x/juJaeEQ2IO7oftdjHZ550VidbVYhbedwsVmSgcXIaBtjUD0G/nfM+
WZ6x5UFtSqBE4nrSCz86RRT/1UKPqot9/zjnqcKSsE7cxhM1jCXvScEGwjshkd4P
FAx5fTzWFFfO65tJP8X/XFqogc+6D1HsAYJWCt6YQW/sQ0dtRaSSZ/IIwGXTjEec
cw7eJ7dEM0TrUdWtgADh8uPvBIwFlK/2
-----END CERTIFICATE-----

View File

@@ -1,10 +1,10 @@
-----BEGIN X509 CRL-----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HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
DTIzMTEwNzE5NDk1NVqgLzAtMB8GA1UdIwQYMBaAFKvgwyZMGNRyu9KEjJwKBZKA
ElNSMAoGA1UdFAQDAgEKMAoGCCqGSM49BAMCA2kAMGYCMQDZ3syfCgdSX34hw/9W
Vsh2Upsk5XetKwJ/t7YNniRF2xwPpWyNCB0Ib9ysoOKx+5wCMQDwHLLznMcFfY2p
QkEWT1XRcJ3WANZmtx/m4XjvgIjw6dkPQBqdHy7MSjvVds1nQ80=
-----END X509 CRL-----

View File

@@ -1,10 +1,10 @@
-----BEGIN X509 CRL-----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HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
DTIzMTEwNzE5NDk1NVqgLzAtMB8GA1UdIwQYMBaAFFaOmsPwQt4YuUVVbvmTz+rD
86UhMAoGA1UdFAQDAgEJMAoGCCqGSM49BAMCA0gAMEUCIGl4TP2PbJhqSSZN/0f6
4RWJhFwI1flAnFJPVBLBj+e7AiEAiGRDT35HS237kRWw4qlvQM57Gbaflq/aZ8SM
MIqTs0E=
-----END X509 CRL-----

View File

@@ -1,42 +1,42 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Jun 19 13:23:42 2020 GMT
Next Update: Mar 16 13:23:42 2023 GMT
Signature Algorithm: sha256WithRSAEncryption
Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Last Update: Feb 10 19:49:55 2021 GMT
Next Update: Nov 7 19:49:55 2023 GMT
CRL extensions:
X509v3 CRL Number:
6
Revoked Certificates:
Serial Number: 02
Revocation Date: Jun 19 13:23:42 2020 GMT
Revocation Date: Feb 10 19:49:55 2021 GMT
Signature Algorithm: sha256WithRSAEncryption
b2:ef:5c:b7:4d:69:54:de:fc:c1:bf:2e:0e:59:e1:ac:e1:a2:
a7:64:bd:77:ac:83:9d:1e:b9:66:74:ee:d4:79:75:79:a6:5e:
d9:a5:80:8a:47:6d:bc:2e:c7:60:5a:f1:39:8c:ff:63:f8:c8:
b9:dd:8e:44:93:44:24:1c:82:fd:1b:47:da:a0:d4:85:c9:5b:
46:5f:c9:47:93:fb:e1:9c:e0:16:4a:cd:90:bd:06:72:db:d7:
2f:ef:10:88:ce:b2:38:65:97:03:02:c7:b2:33:ac:d3:46:97:
62:b2:03:07:8f:72:43:ba:7c:f6:bb:79:77:d1:00:3b:82:ee:
ea:0b:0d:a3:a1:b6:9c:3d:13:42:14:eb:a7:fb:3a:86:a3:4f:
cb:bd:82:f4:e3:60:ae:9c:3b:55:6e:6e:9d:20:f0:18:39:a6:
a9:73:ef:85:bd:06:cd:d5:c5:64:35:a8:2a:ca:d5:bb:17:0c:
c5:38:12:b6:97:85:00:ae:c6:1c:a0:94:65:e9:cb:72:e3:6b:
27:3d:c1:6a:78:dd:41:22:bc:74:cc:6c:e3:15:d5:04:b2:fb:
12:13:6b:65:90:23:16:42:83:d5:84:56:d7:0b:c4:b7:3b:0d:
ec:25:23:9e:a9:93:b8:16:e1:21:49:29:0e:78:56:29:16:24:
e6:c1:f0:d3
a3:e5:bd:db:95:29:72:ae:b1:e9:1a:69:1e:7b:9c:ec:8e:e7:
1d:54:1e:22:b7:11:44:0b:20:3e:e4:ed:59:38:a7:81:07:6f:
bf:4d:f3:e0:5b:5e:46:3d:4e:04:7e:de:50:90:28:38:43:7e:
2b:3b:20:6b:c9:ac:fc:7b:e6:48:67:03:6a:24:82:52:97:ce:
82:0e:42:b8:0c:60:ac:3d:a5:bc:2b:39:cf:40:b4:c1:39:a9:
e9:af:84:9c:c4:87:74:e5:dc:c3:28:6e:f2:93:48:8a:6d:e2:
59:ae:f8:ed:16:77:46:4d:61:2a:7b:ec:bf:ae:8b:76:6e:3d:
13:b5:7e:68:af:41:7e:ee:ec:4f:ab:19:45:e3:72:94:1c:db:
5e:97:1a:24:4e:42:94:e4:b7:dc:5e:ba:6c:b0:1f:36:e7:63:
d3:4f:5d:53:4a:48:8c:91:8e:bb:51:c0:28:ed:0b:5c:a9:f7:
d7:ab:39:21:57:22:42:83:08:34:86:38:ca:3a:96:fc:6a:f0:
86:5e:0b:64:84:30:28:49:fe:62:43:1b:a5:f3:f4:e7:b6:30:
f4:ae:68:5a:82:9a:e1:00:2d:74:0e:60:b4:40:fe:f3:fe:b6:
f8:c9:21:79:7d:f1:ee:78:e4:8c:2d:96:69:13:c3:a8:53:d5:
af:5c:e9:0c
-----BEGIN X509 CRL-----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bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAy
MTAxOTQ5NTVaFw0yMzExMDcxOTQ5NTVaMBQwEgIBAhcNMjEwMjEwMTk0OTU1WqAO
MAwwCgYDVR0UBAMCAQYwDQYJKoZIhvcNAQELBQADggEBAKPlvduVKXKusekaaR57
nOyO5x1UHiK3EUQLID7k7Vk4p4EHb79N8+BbXkY9TgR+3lCQKDhDfis7IGvJrPx7
5khnA2okglKXzoIOQrgMYKw9pbwrOc9AtME5qemvhJzEh3Tl3MMobvKTSIpt4lmu
+O0Wd0ZNYSp77L+ui3ZuPRO1fmivQX7u7E+rGUXjcpQc216XGiROQpTkt9xeumyw
HzbnY9NPXVNKSIyRjrtRwCjtC1yp99erOSFXIkKDCDSGOMo6lvxq8IZeC2SEMChJ
/mJDG6Xz9Oe2MPSuaFqCmuEALXQOYLRA/vP+tvjJIXl98e545IwtlmkTw6hT1a9c
6Qw=
-----END X509 CRL-----

View File

@@ -1,41 +1,41 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Jun 19 13:23:42 2020 GMT
Next Update: Mar 16 13:23:42 2023 GMT
Signature Algorithm: sha256WithRSAEncryption
Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Last Update: Feb 10 19:49:55 2021 GMT
Next Update: Nov 7 19:49:55 2023 GMT
CRL extensions:
X509v3 CRL Number:
2
Revoked Certificates:
Serial Number: 02
Revocation Date: Jun 19 13:23:42 2020 GMT
Revocation Date: Feb 10 19:49:55 2021 GMT
Signature Algorithm: sha256WithRSAEncryption
79:05:2c:9d:74:45:10:4d:f9:77:49:7e:d3:d3:97:69:b8:72:
56:de:cd:81:a8:f3:5d:db:f7:eb:1f:02:a9:f0:25:02:43:7f:
b0:2c:df:c5:24:57:03:48:93:c3:f4:16:37:dd:e3:32:6a:61:
92:37:64:95:59:72:d8:1a:36:fa:d5:88:da:47:ac:c1:9a:93:
bd:6e:68:4d:85:5c:24:63:fa:4a:d3:89:72:28:e4:b6:98:e6:
47:26:82:82:cb:28:47:5d:b4:b4:50:48:ef:a8:50:80:e8:0b:
ca:d0:e4:af:e5:1e:a7:49:34:d8:10:76:6b:7e:14:a3:63:9a:
d2:54:a8:ff:5b:26:02:30:23:cf:db:e8:f3:f2:5f:68:90:bf:
aa:a8:0a:f9:a6:bc:9c:ec:b1:26:9b:fc:fd:7a:d6:af:6d:fc:
e2:2b:d8:62:c4:50:f0:8b:27:e9:9e:e0:44:4b:a2:32:21:06:
b6:89:b8:d3:2f:04:7d:c9:95:d7:a1:d1:b7:bb:9b:75:16:a7:
70:15:b1:2e:14:99:53:9c:cb:50:c8:00:5c:36:af:41:bf:a5:
f2:3b:67:9c:50:5b:ad:2c:50:cb:a3:c4:1f:09:c1:8d:b5:64:
8f:85:32:2e:04:8e:42:59:32:ec:3d:24:ec:7b:a4:01:59:bc:
55:c3:1f:b9
64:70:f6:a5:21:76:7d:3b:38:fd:42:a2:91:be:6a:54:05:7a:
a5:ce:4d:4c:57:db:d9:7b:5e:3c:86:8f:e8:d7:02:d7:7e:87:
9b:f2:0f:35:f3:62:c4:2a:5e:5e:f5:26:40:b1:d4:9a:8d:dc:
65:35:76:7e:e7:68:5a:57:66:48:d6:0b:bf:ac:d1:d3:5e:50:
40:14:ae:3f:3b:e7:5a:c2:c4:c2:41:ba:77:1d:b2:46:29:f8:
42:44:5c:3d:2a:92:87:18:fd:9d:54:11:5d:7b:82:0a:f0:46:
d0:c1:56:72:53:9d:85:ac:21:95:ff:65:8e:41:49:d3:be:c4:
b8:d0:f3:61:fb:eb:0a:a6:d9:f3:09:13:a9:74:01:2b:6c:8a:
08:59:ce:37:52:c4:0e:74:d0:52:56:9d:e1:22:42:13:1e:31:
cf:25:be:3e:df:c0:52:26:bf:f9:5b:c9:88:3f:29:4f:2f:80:
f9:90:97:cc:29:c8:28:4d:06:e9:d9:8e:a9:6c:1f:92:89:36:
67:c2:03:dc:02:99:4e:40:28:be:79:ef:ed:75:86:75:a2:06:
47:cd:a6:93:b0:8c:74:3c:97:3a:d2:b8:e2:b5:fb:b4:76:eb:
87:9f:97:f3:35:78:ee:d0:49:84:38:f1:2b:5c:5e:12:a1:c6:
69:7a:ff:85
-----BEGIN X509 CRL-----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HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
DTIzMTEwNzE5NDk1NVowFDASAgECFw0yMTAyMTAxOTQ5NTVaoA4wDDAKBgNVHRQE
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAZHD2pSF2fTs4/UKikb5qVAV6pc5NTFfb
2XtePIaP6NcC136Hm/IPNfNixCpeXvUmQLHUmo3cZTV2fudoWldmSNYLv6zR015Q
QBSuPzvnWsLEwkG6dx2yRin4QkRcPSqShxj9nVQRXXuCCvBG0MFWclOdhawhlf9l
jkFJ077EuNDzYfvrCqbZ8wkTqXQBK2yKCFnON1LEDnTQUlad4SJCEx4xzyW+Pt/A
Uia/+VvJiD8pTy+A+ZCXzCnIKE0G6dmOqWwfkok2Z8ID3AKZTkAovnnv7XWGdaIG
R82mk7CMdDyXOtK44rX7tHbrh5+X8zV47tBJhDjxK1xeEqHGaXr/hQ==
-----END X509 CRL-----

View File

@@ -1,44 +1,44 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Jun 19 13:23:42 2020 GMT
Next Update: Mar 16 13:23:42 2023 GMT
Signature Algorithm: sha256WithRSAEncryption
Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Last Update: Feb 10 19:49:55 2021 GMT
Next Update: Nov 7 19:49:55 2023 GMT
CRL extensions:
X509v3 CRL Number:
3
Revoked Certificates:
Serial Number: 01
Revocation Date: Jun 19 13:23:42 2020 GMT
Revocation Date: Feb 10 19:49:55 2021 GMT
Serial Number: 02
Revocation Date: Jun 19 13:23:42 2020 GMT
Revocation Date: Feb 10 19:49:55 2021 GMT
Signature Algorithm: sha256WithRSAEncryption
30:44:69:cd:7f:61:ac:6a:a0:fe:28:46:97:1c:0a:3c:c2:f9:
ad:77:d4:37:18:d7:49:d0:1f:56:d8:44:2c:4f:e2:a9:3d:2a:
b5:31:82:5d:38:bd:3a:1f:ab:9e:a0:3c:c4:61:27:46:6b:ee:
ff:87:72:02:a5:a2:e8:e4:87:c6:37:0c:2c:58:92:4f:28:9d:
4a:9a:59:f0:b9:c7:b1:2d:1e:a3:f4:51:ad:cd:92:1f:f9:96:
aa:75:3c:1d:af:2a:34:b0:f3:b3:b8:63:f2:50:14:95:0e:f4:
89:19:c3:b3:2b:f1:26:11:23:eb:a6:94:a5:67:10:54:3d:e6:
aa:57:9a:82:9c:21:0b:f7:4a:24:f6:b9:8b:33:1d:30:fd:cc:
4c:be:61:22:76:32:f6:dc:0a:8f:bf:4b:3e:db:39:84:79:30:
a1:54:3a:5e:a7:b9:c4:39:0a:dc:29:ed:90:8b:a2:46:4f:1b:
54:1c:03:c4:a9:00:ca:f8:d0:dd:4c:5c:36:18:d9:2e:b0:1c:
ed:e7:3a:88:7a:9e:6b:81:7c:4f:95:bf:24:2a:1b:30:40:0f:
e9:44:d8:21:8b:65:24:f4:b7:9c:61:f6:f1:17:f7:79:6d:03:
24:4f:c0:c5:db:09:85:91:8f:38:a0:20:af:66:56:3a:05:6f:
57:51:1e:2c
8e:c0:a9:05:07:8f:c0:f0:e8:54:63:86:8b:0b:65:80:fc:d5:
b8:97:48:2f:c3:43:02:df:63:65:53:bb:cf:4c:d6:90:28:3c:
15:be:48:b4:1a:39:5e:0f:73:a6:f0:39:b5:ca:82:99:98:d8:
8f:94:d9:3a:9a:ed:54:50:8c:20:8d:90:ce:02:f8:f6:2d:5d:
d2:48:99:4d:15:8f:c5:61:95:35:31:83:80:9a:4a:19:01:5e:
d2:fd:9c:2e:ee:b6:d8:c0:fa:38:7d:cc:6c:ce:c5:62:dc:95:
70:79:3e:09:89:14:11:f9:8a:06:b1:1a:ab:52:25:a9:e6:01:
96:9d:ea:b8:aa:81:14:6c:d0:75:a2:03:41:e0:24:06:44:b5:
ff:95:50:7f:e4:50:78:03:24:f1:2c:4f:f9:ae:72:b4:3b:a2:
1b:cb:ab:cd:86:2f:9a:3f:81:4e:c3:a9:34:2f:e0:55:66:90:
55:d1:ee:37:d6:25:a0:b2:ae:d6:6b:2a:1b:21:aa:d8:2b:36:
c1:30:05:88:dd:a9:58:09:65:eb:29:0a:e8:c3:b7:dc:39:51:
2f:34:6d:3a:07:99:cd:b0:80:4e:82:1e:c2:8e:f4:64:15:54:
a1:25:95:95:65:ba:46:a5:6d:ac:f6:57:f9:ae:26:5e:80:51:
c2:79:21:d7
-----BEGIN X509 CRL-----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MR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAyMTAxOTQ5NTVa
Fw0yMzExMDcxOTQ5NTVaMCgwEgIBARcNMjEwMjEwMTk0OTU1WjASAgECFw0yMTAy
MTAxOTQ5NTVaoA4wDDAKBgNVHRQEAwIBAzANBgkqhkiG9w0BAQsFAAOCAQEAjsCp
BQePwPDoVGOGiwtlgPzVuJdIL8NDAt9jZVO7z0zWkCg8Fb5ItBo5Xg9zpvA5tcqC
mZjYj5TZOprtVFCMII2QzgL49i1d0kiZTRWPxWGVNTGDgJpKGQFe0v2cLu622MD6
OH3MbM7FYtyVcHk+CYkUEfmKBrEaq1IlqeYBlp3quKqBFGzQdaIDQeAkBkS1/5VQ
f+RQeAMk8SxP+a5ytDuiG8urzYYvmj+BTsOpNC/gVWaQVdHuN9YloLKu1msqGyGq
2Cs2wTAFiN2pWAll6ykK6MO33DlRLzRtOgeZzbCAToIewo70ZBVUoSWVlWW6RqVt
rPZX+a4mXoBRwnkh1w==
-----END X509 CRL-----

View File

@@ -1,80 +1,80 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Jun 19 13:23:42 2020 GMT
Next Update: Mar 16 13:23:42 2023 GMT
Signature Algorithm: sha256WithRSAEncryption
Issuer: /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Last Update: Feb 10 19:49:55 2021 GMT
Next Update: Nov 7 19:49:55 2023 GMT
CRL extensions:
X509v3 CRL Number:
2
Revoked Certificates:
Serial Number: 02
Revocation Date: Jun 19 13:23:42 2020 GMT
Revocation Date: Feb 10 19:49:55 2021 GMT
Signature Algorithm: sha256WithRSAEncryption
79:05:2c:9d:74:45:10:4d:f9:77:49:7e:d3:d3:97:69:b8:72:
56:de:cd:81:a8:f3:5d:db:f7:eb:1f:02:a9:f0:25:02:43:7f:
b0:2c:df:c5:24:57:03:48:93:c3:f4:16:37:dd:e3:32:6a:61:
92:37:64:95:59:72:d8:1a:36:fa:d5:88:da:47:ac:c1:9a:93:
bd:6e:68:4d:85:5c:24:63:fa:4a:d3:89:72:28:e4:b6:98:e6:
47:26:82:82:cb:28:47:5d:b4:b4:50:48:ef:a8:50:80:e8:0b:
ca:d0:e4:af:e5:1e:a7:49:34:d8:10:76:6b:7e:14:a3:63:9a:
d2:54:a8:ff:5b:26:02:30:23:cf:db:e8:f3:f2:5f:68:90:bf:
aa:a8:0a:f9:a6:bc:9c:ec:b1:26:9b:fc:fd:7a:d6:af:6d:fc:
e2:2b:d8:62:c4:50:f0:8b:27:e9:9e:e0:44:4b:a2:32:21:06:
b6:89:b8:d3:2f:04:7d:c9:95:d7:a1:d1:b7:bb:9b:75:16:a7:
70:15:b1:2e:14:99:53:9c:cb:50:c8:00:5c:36:af:41:bf:a5:
f2:3b:67:9c:50:5b:ad:2c:50:cb:a3:c4:1f:09:c1:8d:b5:64:
8f:85:32:2e:04:8e:42:59:32:ec:3d:24:ec:7b:a4:01:59:bc:
55:c3:1f:b9
64:70:f6:a5:21:76:7d:3b:38:fd:42:a2:91:be:6a:54:05:7a:
a5:ce:4d:4c:57:db:d9:7b:5e:3c:86:8f:e8:d7:02:d7:7e:87:
9b:f2:0f:35:f3:62:c4:2a:5e:5e:f5:26:40:b1:d4:9a:8d:dc:
65:35:76:7e:e7:68:5a:57:66:48:d6:0b:bf:ac:d1:d3:5e:50:
40:14:ae:3f:3b:e7:5a:c2:c4:c2:41:ba:77:1d:b2:46:29:f8:
42:44:5c:3d:2a:92:87:18:fd:9d:54:11:5d:7b:82:0a:f0:46:
d0:c1:56:72:53:9d:85:ac:21:95:ff:65:8e:41:49:d3:be:c4:
b8:d0:f3:61:fb:eb:0a:a6:d9:f3:09:13:a9:74:01:2b:6c:8a:
08:59:ce:37:52:c4:0e:74:d0:52:56:9d:e1:22:42:13:1e:31:
cf:25:be:3e:df:c0:52:26:bf:f9:5b:c9:88:3f:29:4f:2f:80:
f9:90:97:cc:29:c8:28:4d:06:e9:d9:8e:a9:6c:1f:92:89:36:
67:c2:03:dc:02:99:4e:40:28:be:79:ef:ed:75:86:75:a2:06:
47:cd:a6:93:b0:8c:74:3c:97:3a:d2:b8:e2:b5:fb:b4:76:eb:
87:9f:97:f3:35:78:ee:d0:49:84:38:f1:2b:5c:5e:12:a1:c6:
69:7a:ff:85
-----BEGIN X509 CRL-----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HzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20XDTIxMDIxMDE5NDk1NVoX
DTIzMTEwNzE5NDk1NVowFDASAgECFw0yMTAyMTAxOTQ5NTVaoA4wDDAKBgNVHRQE
AwIBAjANBgkqhkiG9w0BAQsFAAOCAQEAZHD2pSF2fTs4/UKikb5qVAV6pc5NTFfb
2XtePIaP6NcC136Hm/IPNfNixCpeXvUmQLHUmo3cZTV2fudoWldmSNYLv6zR015Q
QBSuPzvnWsLEwkG6dx2yRin4QkRcPSqShxj9nVQRXXuCCvBG0MFWclOdhawhlf9l
jkFJ077EuNDzYfvrCqbZ8wkTqXQBK2yKCFnON1LEDnTQUlad4SJCEx4xzyW+Pt/A
Uia/+VvJiD8pTy+A+ZCXzCnIKE0G6dmOqWwfkok2Z8ID3AKZTkAovnnv7XWGdaIG
R82mk7CMdDyXOtK44rX7tHbrh5+X8zV47tBJhDjxK1xeEqHGaXr/hQ==
-----END X509 CRL-----
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_2048, OU = Programming-2048, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Jun 19 13:23:42 2020 GMT
Next Update: Mar 16 13:23:42 2023 GMT
Signature Algorithm: sha256WithRSAEncryption
Issuer: /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Last Update: Feb 10 19:49:55 2021 GMT
Next Update: Nov 7 19:49:55 2023 GMT
CRL extensions:
X509v3 CRL Number:
1
No Revoked Certificates.
Signature Algorithm: sha256WithRSAEncryption
41:8a:3f:6d:b2:f9:50:c3:cb:d6:18:09:f6:ed:c5:96:8b:3a:
5f:7c:52:e7:74:7e:64:ec:3e:b8:34:c2:46:72:76:4a:24:c3:
72:06:26:a7:49:1c:12:6a:99:db:d2:ad:55:a8:40:ef:33:f2:
4c:fc:af:d8:46:1c:18:82:39:7c:0b:fb:b3:66:a1:64:eb:47:
59:e7:3a:e1:5e:e6:e4:e9:18:69:96:90:64:85:74:97:33:ff:
91:38:78:e4:fa:fd:50:56:dc:0a:3b:68:b4:dc:6c:8c:65:04:
d8:e5:cf:f7:71:a9:d6:cb:18:c8:91:cb:6f:3d:ec:45:18:7b:
50:10:45:3b:00:91:88:e5:b6:1c:6f:26:ce:f6:3b:66:45:f7:
72:25:59:62:ec:15:29:26:25:f8:f0:0d:30:49:a3:0e:71:9e:
af:2d:30:62:2a:a5:8e:c3:ce:c0:cc:cb:5b:33:70:71:0d:0c:
85:37:6d:fd:50:65:8f:3a:07:21:a6:98:f8:cc:18:df:2b:48:
71:cb:25:62:e4:ab:20:b2:64:6d:68:e8:7c:8a:40:f4:0c:a9:
36:b7:a9:45:66:37:b1:10:6a:c7:c1:aa:87:8d:f9:0f:e9:39:
80:ef:9c:11:87:58:35:99:4d:af:92:3f:81:d7:33:78:1d:9b:
93:c8:eb:11
06:4d:a9:9b:4a:4c:b9:57:02:ff:06:89:d7:1b:39:3a:0a:64:
53:e1:15:93:77:f0:9c:69:f9:66:6d:76:67:2b:12:da:c6:9a:
9c:53:c1:3c:e5:17:d3:97:9f:bd:c7:d4:a3:6b:0d:e3:4b:f5:
ae:f2:63:58:70:28:e0:ab:09:5f:d1:b1:95:b3:4f:6a:7c:b7:
2c:a8:07:ef:d4:39:47:be:6d:31:a0:8f:f3:e9:0e:8a:3a:5f:
da:cd:7e:60:1e:cb:53:d9:18:31:7c:dc:d1:2f:ec:26:c8:f5:
e0:31:eb:f0:83:71:08:e7:05:bd:79:61:cb:7b:17:70:70:1a:
fa:f8:0b:a4:d0:b3:d5:53:ce:b7:88:7f:4d:96:0a:96:0d:28:
a3:4e:2c:8b:bb:d6:27:a0:12:b3:cd:78:79:8f:61:29:8a:e6:
d0:c6:a5:10:1e:f5:f8:a2:c2:cb:cd:a0:b5:6f:44:62:25:e8:
47:63:9f:5c:c3:d9:88:70:e8:a8:12:f5:7e:ba:99:ef:3c:73:
02:46:72:60:ea:80:d4:f0:98:2f:47:3f:e5:04:82:51:79:ae:
09:2c:60:2c:1d:8d:00:8b:60:27:e1:58:46:ac:48:4c:c6:bc:
26:43:72:08:4d:1d:c2:c9:e6:21:e6:0d:e9:19:ac:cb:65:f2:
96:9e:ff:d5
-----BEGIN X509 CRL-----
MIIB+DCB4QIBATANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCVVMxEDAOBgNV
BAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVtYW4xFTATBgNVBAoMDHdvbGZTU0xf
MjA0ODEZMBcGA1UECwwQUHJvZ3JhbW1pbmctMjA0ODEYMBYGA1UEAwwPd3d3Lndv
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMDA2
MTkxMzIzNDJaFw0yMzAzMTYxMzIzNDJaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG
9w0BAQsFAAOCAQEAQYo/bbL5UMPL1hgJ9u3Flos6X3xS53R+ZOw+uDTCRnJ2SiTD
cgYmp0kcEmqZ29KtVahA7zPyTPyv2EYcGII5fAv7s2ahZOtHWec64V7m5OkYaZaQ
ZIV0lzP/kTh45Pr9UFbcCjtotNxsjGUE2OXP93Gp1ssYyJHLbz3sRRh7UBBFOwCR
iOW2HG8mzvY7ZkX3ciVZYuwVKSYl+PANMEmjDnGery0wYiqljsPOwMzLWzNwcQ0M
hTdt/VBljzoHIaaY+MwY3ytIccslYuSrILJkbWjofIpA9AypNrepRWY3sRBqx8Gq
h435D+k5gO+cEYdYNZlNr5I/gdczeB2bk8jrEQ==
bGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAy
MTAxOTQ5NTVaFw0yMzExMDcxOTQ5NTVaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG
9w0BAQsFAAOCAQEABk2pm0pMuVcC/waJ1xs5OgpkU+EVk3fwnGn5Zm12ZysS2saa
nFPBPOUX05efvcfUo2sN40v1rvJjWHAo4KsJX9GxlbNPany3LKgH79Q5R75tMaCP
8+kOijpf2s1+YB7LU9kYMXzc0S/sJsj14DHr8INxCOcFvXlhy3sXcHAa+vgLpNCz
1VPOt4h/TZYKlg0oo04si7vWJ6ASs814eY9hKYrm0MalEB71+KLCy82gtW9EYiXo
R2OfXMPZiHDoqBL1frqZ7zxzAkZyYOqA1PCYL0c/5QSCUXmuCSxgLB2NAItgJ+FY
RqxITMa8JkNyCE0dwsnmIeYN6Rmsy2Xylp7/1Q==
-----END X509 CRL-----

View File

@@ -1,26 +1,26 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Oregon, L = Salem, O = Client ECC, OU = Fast, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Jun 19 13:23:42 2020 GMT
Next Update: Mar 16 13:23:42 2023 GMT
Signature Algorithm: ecdsa-with-SHA256
Issuer: /C=US/ST=Oregon/L=Salem/O=Client ECC/OU=Fast/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Last Update: Feb 10 19:49:55 2021 GMT
Next Update: Nov 7 19:49:55 2023 GMT
CRL extensions:
X509v3 CRL Number:
7
Revoked Certificates:
Serial Number: 02
Revocation Date: Jun 19 13:23:42 2020 GMT
Revocation Date: Feb 10 19:49:55 2021 GMT
Signature Algorithm: ecdsa-with-SHA256
30:44:02:20:1f:f9:3b:df:b9:ad:68:58:fb:48:d7:57:16:06:
6b:13:6f:81:53:a8:bc:ed:2b:ee:8f:0e:1f:a6:25:bd:c5:1d:
02:20:0b:49:18:aa:20:34:4b:45:b4:da:f8:34:d7:3d:86:d7:
00:1f:fa:93:49:f4:00:d4:5b:de:27:ea:c9:9d:7d:b2
30:45:02:20:65:84:ba:e0:1c:9d:4b:be:e8:90:61:64:b6:0e:
c6:75:77:9e:dd:ed:08:59:93:7e:86:a9:02:98:b4:01:57:4c:
02:21:00:84:76:4a:98:1b:ae:ff:2e:6c:a5:65:3d:25:8f:5c:
20:6a:6c:bb:52:02:11:1f:f6:2f:d4:c9:aa:d6:2f:ab:65
-----BEGIN X509 CRL-----
MIIBOzCB4wIBATAKBggqhkjOPQQDAjCBjTELMAkGA1UEBhMCVVMxDzANBgNVBAgM
MIIBPDCB4wIBATAKBggqhkjOPQQDAjCBjTELMAkGA1UEBhMCVVMxDzANBgNVBAgM
Bk9yZWdvbjEOMAwGA1UEBwwFU2FsZW0xEzARBgNVBAoMCkNsaWVudCBFQ0MxDTAL
BgNVBAsMBEZhc3QxGDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3
DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjAwNjE5MTMyMzQyWhcNMjMwMzE2MTMy
MzQyWjAUMBICAQIXDTIwMDYxOTEzMjM0MlqgDjAMMAoGA1UdFAQDAgEHMAoGCCqG
SM49BAMCA0cAMEQCIB/5O9+5rWhY+0jXVxYGaxNvgVOovO0r7o8OH6YlvcUdAiAL
SRiqIDRLRbTa+DTXPYbXAB/6k0n0ANRb3ifqyZ19sg==
DQEJARYQaW5mb0B3b2xmc3NsLmNvbRcNMjEwMjEwMTk0OTU1WhcNMjMxMTA3MTk0
OTU1WjAUMBICAQIXDTIxMDIxMDE5NDk1NVqgDjAMMAoGA1UdFAQDAgEHMAoGCCqG
SM49BAMCA0gAMEUCIGWEuuAcnUu+6JBhZLYOxnV3nt3tCFmTfoapApi0AVdMAiEA
hHZKmBuu/y5spWU9JY9cIGpsu1ICER/2L9TJqtYvq2U=
-----END X509 CRL-----

View File

@@ -1,26 +1,26 @@
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Washington, L = Seattle, O = Eliptic, OU = ECC, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Last Update: Jun 19 13:23:42 2020 GMT
Next Update: Mar 16 13:23:42 2023 GMT
Signature Algorithm: ecdsa-with-SHA256
Issuer: /C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Last Update: Feb 10 19:49:55 2021 GMT
Next Update: Nov 7 19:49:55 2023 GMT
CRL extensions:
X509v3 CRL Number:
8
Revoked Certificates:
Serial Number: 02
Revocation Date: Jun 19 13:23:42 2020 GMT
Revocation Date: Feb 10 19:49:55 2021 GMT
Signature Algorithm: ecdsa-with-SHA256
30:44:02:20:62:31:0a:f2:44:8f:53:6a:c9:c4:ee:81:b4:2b:
ef:a0:6d:ca:b1:81:ff:59:f8:b8:d2:de:2b:85:39:56:05:5c:
02:20:3b:b2:62:0b:50:8a:3b:40:49:9d:07:ed:3f:b3:69:38:
66:92:f6:1c:59:07:fe:d3:33:3e:bc:d2:f7:20:36:8c
30:44:02:20:54:0d:dc:8e:be:14:0c:d9:ce:6e:46:67:b9:5e:
86:9a:e7:b4:1f:b2:e1:8a:66:90:0f:48:50:ae:49:0c:32:21:
02:20:5a:ef:02:db:83:cf:9e:df:d4:d7:9d:60:a5:7a:56:7d:
b3:c8:8c:5d:01:33:0f:bd:5e:d0:da:8a:59:e6:e0:42
-----BEGIN X509 CRL-----
MIIBPTCB5QIBATAKBggqhkjOPQQDAjCBjzELMAkGA1UEBhMCVVMxEzARBgNVBAgM
Cldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB0VsaXB0aWMx
DDAKBgNVBAsMA0VDQzEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZI
hvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMDA2MTkxMzIzNDJaFw0yMzAzMTYx
MzIzNDJaMBQwEgIBAhcNMjAwNjE5MTMyMzQyWqAOMAwwCgYDVR0UBAMCAQgwCgYI
KoZIzj0EAwIDRwAwRAIgYjEK8kSPU2rJxO6BtCvvoG3KsYH/Wfi40t4rhTlWBVwC
IDuyYgtQijtASZ0H7T+zaThmkvYcWQf+0zM+vNL3IDaM
hvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tFw0yMTAyMTAxOTQ5NTVaFw0yMzExMDcx
OTQ5NTVaMBQwEgIBAhcNMjEwMjEwMTk0OTU1WqAOMAwwCgYDVR0UBAMCAQgwCgYI
KoZIzj0EAwIDRwAwRAIgVA3cjr4UDNnObkZnuV6Gmue0H7LhimaQD0hQrkkMMiEC
IFrvAtuDz57f1NedYKV6Vn2zyIxdATMPvV7Q2opZ5uBC
-----END X509 CRL-----

View File

@@ -1,9 +1,9 @@
-----BEGIN CERTIFICATE-----
MIIBLjCB1QIUG1+hLN2cYpa/I9DdQKzWnHdkuIIwCgYIKoZIzj0EAwIwGjELMAkG
A1UECgwCV1IxCzAJBgNVBAMMAkRFMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEz
MjM0MVowGjELMAkGA1UECgwCV1IxCzAJBgNVBAMMAkRFMFkwEwYHKoZIzj0CAQYI
KoZIzj0DAQcDQgAEJcD9Frgr8rgKHt2szmJSfFgKYH1Xddq9EcHVKupUa3bmPTb3
3VGXa6gm/numvZZVhVCdmn5pAdhDRYnZ/korJjAKBggqhkjOPQQDAgNIADBFAiBW
OIta9VMOnweJmwIL9oLlYxeQd/17VZKx/M+8o2sHJgIhAOg/1Q6oWp3tw3T2tLLn
U5Ge/MqDE4Uo+HZgtTL2aQzF
MIIBIzCBygIJAIxrmIr/9d3gMAoGCCqGSM49BAMCMBoxCzAJBgNVBAoMAldSMQsw
CQYDVQQDDAJERTAeFw0yMTAyMTAxOTQ5NTNaFw0yMzExMDcxOTQ5NTNaMBoxCzAJ
BgNVBAoMAldSMQswCQYDVQQDDAJERTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
BCXA/Ra4K/K4Ch7drM5iUnxYCmB9V3XavRHB1SrqVGt25j02991Rl2uoJv57pr2W
VYVQnZp+aQHYQ0WJ2f5KKyYwCgYIKoZIzj0EAwIDSAAwRQIhAMaYJZ3Mpdbd/o0j
o9X5/HUj5T15lRzwDVMbDy+DjOV3AiBEmFWgnQ3Xii2xcrHOyEG/iLzqZ5JuJqq/
j9BaGBwdlA==
-----END CERTIFICATE-----

Binary file not shown.

Binary file not shown.

View File

@@ -1,4 +1,4 @@
-----BEGIN EDDSA PRIVATE KEY-----
MFICAQAwBQYDK2VwBCIEIALLg+oVSN6eOx+rCjIui2cYL3VyBkk2pWBdv1+JXJBy
oSIEIGWqfwWkBDSg6q0fqYbw2H9y36kOE6A4ZiZe60gwgEhJ
MFICAQAwBQYDK2VwBCIEIAw37caag1d0w0pY63b7oe9Frg8SA0rLDtnWWDl7MafZ
oSIEIKqWfWdx1/6tqF8UGL4C0BV+gGS5IXuyP3x0bv/1hOKB
-----END EDDSA PRIVATE KEY-----

Binary file not shown.

View File

@@ -1,3 +1,3 @@
-----BEGIN PRIVATE KEY-----
MC4CAQAwBQYDK2VwBCIEIALLg+oVSN6eOx+rCjIui2cYL3VyBkk2pWBdv1+JXJBy
MC4CAQAwBQYDK2VwBCIEIAw37caag1d0w0pY63b7oe9Frg8SA0rLDtnWWDl7MafZ
-----END PRIVATE KEY-----

Binary file not shown.

View File

@@ -1,15 +1,15 @@
-----BEGIN CERTIFICATE-----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FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j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-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,4 +1,4 @@
-----BEGIN EDDSA PRIVATE KEY-----
MFICAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
oSIEIKLxJkCbolna2+YVf5oRtUhfVbpe7Ub3mGe+DJPjpI4Y
MFICAQAwBQYDK2VwBCIEICkn2+pW4KyBhuv1IuoymGLEqp9hTFcALhcvKrmHgkhs
oSIEIE6fglljSpes+m6VbFo7Uuuj2ef2J7uJ+3e046zCCGrA
-----END EDDSA PRIVATE KEY-----

View File

@@ -1,3 +1,3 @@
-----BEGIN PRIVATE KEY-----
MC4CAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
MC4CAQAwBQYDK2VwBCIEICkn2+pW4KyBhuv1IuoymGLEqp9hTFcALhcvKrmHgkhs
-----END PRIVATE KEY-----

Binary file not shown.

View File

@@ -1,15 +1,15 @@
-----BEGIN CERTIFICATE-----
MIICWDCCAgqgAwIBAgIQAI8vNbJTvU+S0f8dS0ClSTAFBgMrZXAwgaExCzAJBgNV
MIICTDCCAf6gAwIBAgIQFcHfya6OWie0wxPOBaz6TDAFBgMrZXAwgZsxCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ8wDQYD
VQQEDAZjbGllbnQxEDAOBgNVBAoMB3dvbGZTU0wxEDAOBgNVBAsMB0VEMjU1MTkx
GDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
b2xmc3NsLmNvbTAiGA8yMDE4MDQxMjE2MjIxN1oYDzIwMjEwMTA3MTUyMjE3WjCB
oTELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB01vbnRhbmExEDAOBgNVBAcMB0JvemVt
YW4xDzANBgNVBAQMBmNsaWVudDEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwH
RUQyNTUxOTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkB
FhBpbmZvQHdvbGZzc2wuY29tMCowBQYDK2VwAyEAovEmQJuiWdrb5hV/mhG1SF9V
ul7tRveYZ74Mk+OkjhijUjBQMB0GA1UdDgQWBBT+AUZ/bys+HLBv4cxNAiX3TQqV
uDAfBgNVHSMEGDAWgBT+AUZ/bys+HLBv4cxNAiX3TQqVuDAOBgNVHQ8BAf8EBAMC
BsAwBQYDK2VwA0EAKfZp4rlzEtFk64/pa2HbX+mnYmwQiUGA4+j9H9ATrpUAr/d3
4SIyrUZP3H7+rryKH5YK2p/Jk1InGLCL2r6BCQ==
GDAWBgNVBAMMD3d3dy53b2xmc3NsLmNvbTEZMBcGA1UEBQAQaW5mb0B3b2xmc3Ns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-----END CERTIFICATE-----

View File

@@ -3,6 +3,7 @@
EXAMPLE=$1
echo "This uses ed25519 certificate generator from wolfssl-examples github"
echo "The script takes in the directory to wolfssl-examples"
echo "https://github.com/wolfSSL/wolfssl-examples/pull/52"
pushd ${EXAMPLE}
make
@@ -30,3 +31,5 @@ NAME=client convert
NAME=root convert
NAME=ca convert
cp server-ed25519.pem server-ed25519-cert.pem

Binary file not shown.

View File

@@ -1,4 +1,4 @@
-----BEGIN EDDSA PRIVATE KEY-----
MFICAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
oSIEIKLxJkCbolna2+YVf5oRtUhfVbpe7Ub3mGe+DJPjpI4Y
MFICAQAwBQYDK2VwBCIEIPUBUd1CTNITOelSbDQlzuGA30xv42CVcvpe92sq7N+o
oSIEIIgura+qJ+c7nKcbmd2OK5+dL++bfwkNtP5Cs9JL+nwO
-----END EDDSA PRIVATE KEY-----

Binary file not shown.

View File

@@ -1,3 +1,3 @@
-----BEGIN PRIVATE KEY-----
MC4CAQAwBQYDK2VwBCIEICejNCo11Lu44dzY7A/BoNGiXPkG8ERdO5dNvd9KO6NO
MC4CAQAwBQYDK2VwBCIEIPUBUd1CTNITOelSbDQlzuGA30xv42CVcvpe92sq7N+o
-----END PRIVATE KEY-----

Binary file not shown.

View File

@@ -1,15 +1,15 @@
-----BEGIN CERTIFICATE-----
MIICYjCCAhSgAwIBAgIQAI8vNbJTvU+S0f8dS0ClSTAFBgMrZXAwgZ8xCzAJBgNV
MIICVjCCAgigAwIBAgIQYlI7cNFaPvFoHcYXLFMPzTAFBgMrZXAwgZkxCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
ZnNzbC5jb20wIhgPMjAxODA0MTIxNjIyMTdaGA8yMDIxMDEwNzE1MjIxN1owgZ8x
CzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFu
MQ0wCwYDVQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1
NTE5MRgwFgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGlu
Zm9Ad29sZnNzbC5jb20wKjAFBgMrZXADIQCi8SZAm6JZ2tvmFX+aEbVIX1W6Xu1G
95hnvgyT46SOGKNgMF4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQU/gFGf28rPhyw
b+HMTQIl900KlbgwHwYDVR0jBBgwFoAU/gFGf28rPhywb+HMTQIl900KlbgwDgYD
VR0PAQH/BAQDAgHGMAUGAytlcANBAEaxLiB1c316UlvcVyZ3bJ19dvCgG0Y8+2De
GGbS7KdC/RauChf9sxLzVoNj2P5Al5dsHeqpECevSCbCD9LGpAA=
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j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-----END CERTIFICATE-----

View File

@@ -1,15 +1,30 @@
-----BEGIN CERTIFICATE-----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A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
MCIYDzIwMjEwMjA5MTk1MDA0WhgPMjAyMzAyMTAxOTUwMDRaMIGZMQswCQYDVQQG
EwJVUzEQMA4GA1UECAwHTW9udGFuYTEQMA4GA1UEBwwHQm96ZW1hbjENMAsGA1UE
BAwETGVhZjEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
MCowBQYDK2VwAyEAi/OP+P/p9GU5NF71Iny3X/19LSd1vDHlmtPu8us3ryijUjBQ
MB0GA1UdDgQWBBQp8hOvwv+m0cj7fJgvDhEuOGSijjAfBgNVHSMEGDAWgBRuiw3J
LFlDYK+lMoVs9XTzulSbzDAOBgNVHQ8BAf8EBAMCBsAwBQYDK2VwA0EAo/sGXBKn
xIvogGi7VbdCmq1KbS04WEC2Kiu6DI22jOpQecqeUQ+iJ+Ua7tIlSsv0NPqqraq8
KKxhcSh1nWQbDQ==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIICVDCCAgagAwIBAgIQQAiKTYWESER1OSfza785ITAFBgMrZXAwgZkxCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j
b20wIhgPMjAyMTAyMDkxOTUwMDRaGA8yMDIzMDIxMDE5NTAwNFowgZcxCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQswCQYD
VQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
MCowBQYDK2VwAyEAqpZ9Z3HX/q2oXxQYvgLQFX6AZLkhe7I/fHRu//WE4oGjYDBe
MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFG6LDcksWUNgr6UyhWz1dPO6VJvMMB8G
A1UdIwQYMBaAFBl6CabmJl9fBlLOYyRaj1xxPbt3MA4GA1UdDwEB/wQEAwIBxjAF
BgMrZXADQQC7w3pxbsKWWTZl1BQDkNAauSRVUoKYgLK67OcsHMYTpbjNLan5jeT+
3z62i4fbzNBLDJD89XUSjtqQt1LRoE0F
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,4 +1,4 @@
-----BEGIN EDDSA PRIVATE KEY-----
MFICAQAwBQYDK2VwBCIEIAIvxf+6jtDSvwOOdo/IhoBxh5cx4kCs37uQFVJuJKE5
oSIEIGFd7LdFk8mEe2ghSk30BIu9zWxdPbdiLC0lwyJJyIby
MFICAQAwBQYDK2VwBCIEIHyd6hRAi4voY3m+UTepnRnoKo50DlIF3i9js6EkbTEG
oSIEIIvzj/j/6fRlOTRe9SJ8t1/9fS0ndbwx5ZrT7vLrN68o
-----END EDDSA PRIVATE KEY-----

View File

@@ -1,3 +1,3 @@
-----BEGIN PRIVATE KEY-----
MC4CAQAwBQYDK2VwBCIEIAIvxf+6jtDSvwOOdo/IhoBxh5cx4kCs37uQFVJuJKE5
MC4CAQAwBQYDK2VwBCIEIHyd6hRAi4voY3m+UTepnRnoKo50DlIF3i9js6EkbTEG
-----END PRIVATE KEY-----

Binary file not shown.

View File

@@ -1,30 +1,30 @@
-----BEGIN CERTIFICATE-----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A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIICYDCCAhKgAwIBAgIQAIC6aHfvpeVCfcZzLFSFuDAFBgMrZXAwgZ8xCzAJBgNV
MIICVDCCAgagAwIBAgIQQAiKTYWESER1OSfza785ITAFBgMrZXAwgZkxCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQ0wCwYD
VQQEDARSb290MRAwDgYDVQQKDAd3b2xmU1NMMRAwDgYDVQQLDAdFRDI1NTE5MRgw
FgYDVQQDDA93d3cud29sZnNzbC5jb20xHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29s
ZnNzbC5jb20wIhgPMjAxODA0MTIxNjIyMTdaGA8yMDIxMDEwNzE1MjIxN1owgZ0x
CzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFu
MQswCQYDVQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUx
OTEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMR8wHQYJKoZIhvcNAQkBFhBpbmZv
QHdvbGZzc2wuY29tMCowBQYDK2VwAyEAZap/BaQENKDqrR+phvDYf3LfqQ4ToDhm
Jl7rSDCASEmjYDBeMAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFJI/lnIC+mEcIW2I
3evdPJsXxJ+3MB8GA1UdIwQYMBaAFP4BRn9vKz4csG/hzE0CJfdNCpW4MA4GA1Ud
DwEB/wQEAwIBxjAFBgMrZXADQQBMQNB/vPv0ohpY9nLj6NoYDZTcDv3B5wKleu7L
wn76ofwVmv4e4Dfff6t2UAbUPRplcz+S1ERip0yzKgGH4wYG
FgYDVQQDDA93d3cud29sZnNzbC5jb20xGTAXBgNVBAUAEGluZm9Ad29sZnNzbC5j
b20wIhgPMjAyMTAyMDkxOTUwMDRaGA8yMDIzMDIxMDE5NTAwNFowgZcxCzAJBgNV
BAYTAlVTMRAwDgYDVQQIDAdNb250YW5hMRAwDgYDVQQHDAdCb3plbWFuMQswCQYD
VQQEDAJDQTEQMA4GA1UECgwHd29sZlNTTDEQMA4GA1UECwwHRUQyNTUxOTEYMBYG
A1UEAwwPd3d3LndvbGZzc2wuY29tMRkwFwYDVQQFABBpbmZvQHdvbGZzc2wuY29t
MCowBQYDK2VwAyEAqpZ9Z3HX/q2oXxQYvgLQFX6AZLkhe7I/fHRu//WE4oGjYDBe
MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFG6LDcksWUNgr6UyhWz1dPO6VJvMMB8G
A1UdIwQYMBaAFBl6CabmJl9fBlLOYyRaj1xxPbt3MA4GA1UdDwEB/wQEAwIBxjAF
BgMrZXADQQC7w3pxbsKWWTZl1BQDkNAauSRVUoKYgLK67OcsHMYTpbjNLan5jeT+
3z62i4fbzNBLDJD89XUSjtqQt1LRoE0F
-----END CERTIFICATE-----

View File

@@ -1,29 +1,29 @@
-----BEGIN CERTIFICATE-----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bWVudDEYMBYGA1UEAwwPd3d3LndvbGZzc2wuY29tMRUwEwYDVQQFEwx3b2xmU1NM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-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:de:b4:c8:5c:77:e0:2d:b1:f5:b9:ad:16:47:35:
a0:35:65:65:c6:e1:40:ab:1e:b4:b9:13:b7:cb:8c:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
6b:3f:8a:71:6e:3e:ef:9c:f9:45:86:d4:fe:f4:9b:1b:b8:6f:
b2:52:e2:a2:d5:4a:a7:30:79:76:1d:26:f7:d2:0b:c2:6e:d7:
17:76:31:f8:aa:37:17:13:85:7d:55:33:45:14:a5:2e:af:d9:
ba:e8:fe:8e:0b:b3:1a:bc:f0:9b:1d:00:c6:63:89:78:47:98:
7d:d8:ff:95:0b:4a:4f:27:c7:57:e8:79:a1:82:40:c5:63:79:
ec:ea:41:70:9c:8d:e8:9e:c6:33:a6:2c:c1:34:15:d9:e5:ad:
1d:df:18:aa:e6:6d:62:77:e6:9b:dd:82:7f:b6:70:23:f6:d9:
c2:67:5c:3d:a8:55:18:09:f7:9e:ec:68:9d:8b:27:53:04:21:
6e:a7:38:b4:3b:8b:2b:cf:78:a0:7b:4f:e0:92:f8:b6:f3:7d:
c1:7c:b4:59:34:27:6d:4e:b1:01:2c:b7:2f:cb:8b:ec:0e:e0:
03:1a:88:12:d0:3b:47:ca:0f:05:4a:ac:bd:5c:a5:24:7f:5f:
02:49:ef:74:e3:33:47:5f:99:92:64:ad:e0:9e:16:d4:c2:1e:
b7:5d:d5:5b:1d:ea:a6:21:19:45:9c:27:9d:dd:ee:62:c6:50:
0d:75:5e:32:f2:c1:63:6b:ec:7d:bb:4f:ae:86:93:f4:62:29:
27:8a:1f:31
1e:8f:fa:f5:32:ee:98:9e:ed:96:b4:a9:ea:d7:3c:05:74:36:
41:ef:1b:84:35:6a:3d:6c:c9:53:2a:50:f7:d1:80:d3:ec:99:
bc:4b:dd:86:69:e0:94:1c:c4:77:c9:6a:f7:ed:2c:0d:c5:17:
a7:15:75:25:14:2d:c6:14:8d:17:97:6d:e7:d7:38:88:d6:df:
ba:8c:aa:2a:f1:4e:ef:1f:4a:16:5a:fa:0c:50:ea:98:b1:4b:
36:97:24:21:ce:dc:e4:5c:ba:ae:e7:cb:2a:1d:f7:73:ff:17:
f3:9d:cf:26:4e:b7:cb:5c:8e:e4:9e:55:d2:00:f8:ca:53:c3:
53:3f:6d:65:aa:86:f4:f1:ed:26:1e:75:56:be:bd:80:f5:1c:
4e:4d:13:c3:1b:04:61:b9:c6:e2:6f:30:44:01:0e:63:d8:19:
ce:83:40:e9:c7:01:f2:51:d7:b7:cd:16:25:93:de:3e:7a:7d:
8d:72:1e:2b:66:76:91:df:b9:33:fa:04:b8:8c:c5:7a:ef:f6:
94:74:54:1e:96:4a:a8:f6:0d:59:f7:2f:f1:26:78:f6:c7:bf:
68:f9:b0:7f:a5:2d:1c:7b:fc:64:25:ed:a4:bb:e6:31:44:f9:
d5:5f:67:4d:01:29:84:b2:f8:fa:fb:6b:52:1e:66:c3:08:6b:
8e:d5:ad:b9
-----BEGIN CERTIFICATE-----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@@ -84,26 +84,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu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ggEBAB6P+vUy7pie7Za0qerXPAV0NkHvG4Q1aj1syVMqUPfRgNPsmbxL3YZp4JQc
xHfJavftLA3FF6cVdSUULcYUjReXbefXOIjW37qMqirxTu8fShZa+gxQ6pixSzaX
JCHO3ORcuq7nyyod93P/F/OdzyZOt8tcjuSeVdIA+MpTw1M/bWWqhvTx7SYedVa+
vYD1HE5NE8MbBGG5xuJvMEQBDmPYGc6DQOnHAfJR17fNFiWT3j56fY1yHitmdpHf
uTP6BLiMxXrv9pR0VB6WSqj2DVn3L/EmePbHv2j5sH+lLRx7/GQl7aS75jFE+dVf
Z00BKYSy+Pr7a1IeZsMIa47Vrbk=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
@@ -176,11 +176,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:d0:20:3c:35:19:6f:2c:44:b4:7e:42:c7:75:b4:
6a:2b:a9:23:85:bf:87:b4:ee:ca:d7:4b:1f:31:d7:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
0a:ef:11:86:ba:12:b6:5a:38:b7:7a:62:a9:e8:75:e8:25:a1:
72:5b:d1:ab:7e:b9:46:9c:ca:57:90:d2:cc:83:8e:3a:e7:05:
02:da:9d:da:ff:28:d0:51:bb:68:6b:3a:32:23:e3:ca:37:49:
82:b4:22:74:1b:22:49:c6:4e:54:20:46:89:0c:fd:d8:cd:a7:
15:cf:49:87:48:ad:07:ba:91:cc:85:39:20:c5:7f:c3:f5:07:
e4:83:c8:bd:a6:71:47:c1:6a:81:8c:af:8b:f8:80:3f:ec:b9:
e6:34:c8:01:bb:1c:d4:dd:11:8b:7b:0c:5c:3b:5d:b0:56:c6:
9f:35:fc:75:2e:f4:59:27:21:d6:b1:2a:71:6b:b0:c5:44:b0:
e3:0d:9d:ed:a0:8e:69:bc:ac:38:61:61:8b:ab:e0:07:cc:41:
70:da:55:56:09:4a:7a:ca:17:01:62:df:98:14:2a:1a:d4:52:
52:4c:4e:96:66:10:e4:46:f3:0c:e6:31:06:60:62:69:68:77:
2b:36:bd:28:6e:ed:fd:6c:29:c6:e9:c8:58:f1:51:d7:a4:91:
81:7b:b7:c3:2e:07:c4:fd:bd:35:d9:d9:82:27:97:4d:a4:71:
05:25:1c:67:a0:56:5e:ea:c2:1f:08:c2:ae:a6:e7:c0:15:72:
b3:e1:df:50
0c:13:dc:c2:28:a2:be:bb:0b:8e:29:28:aa:7a:99:04:e5:88:
c6:67:7e:8d:3f:8a:68:3a:7f:c5:e2:d0:ed:c9:95:4c:40:f2:
7a:87:73:17:fb:f8:c4:bf:1b:ff:54:be:33:6d:15:e3:4f:70:
f4:60:27:b2:67:cd:0e:0f:2a:81:ee:dc:9d:48:37:74:8a:4c:
11:47:23:f0:5d:7c:c1:78:70:1d:c1:87:db:26:b0:86:a8:42:
3d:87:87:43:e7:d9:3a:a8:5c:c5:66:a4:d5:4e:9b:d9:44:b2:
41:30:10:94:3b:fd:00:dc:02:63:05:d7:a1:75:ad:54:28:9e:
e4:07:3c:af:68:89:9b:71:96:21:ff:d6:4e:1d:d0:02:d5:21:
7d:ae:d8:07:96:6c:1f:ca:a5:ef:54:13:92:be:3c:7d:c0:65:
bf:5c:bb:ff:46:c2:69:0f:4c:29:70:6d:b7:52:d5:ed:9e:e4:
89:dc:41:0d:0a:94:bc:69:b3:dc:8a:a9:45:25:f1:2c:9b:5b:
85:bc:69:fb:94:31:05:2c:17:fa:78:28:36:78:7f:f9:0c:4f:
22:36:05:fe:bf:59:9d:5d:1f:9a:5e:8e:d8:1d:62:4d:d6:2d:
73:d6:26:c1:a5:bc:e3:62:81:fc:1e:cb:7f:3e:c3:00:c9:b0:
e0:c6:1f:c3
-----BEGIN CERTIFICATE-----
MIIE8DCCA9igAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
MjEwMTk0OTU0WhcNMjMxMTA3MTk0OTU0WjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
bWVkaWF0ZSBDQSAyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
@@ -84,26 +84,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu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ggEBAAwT3MIoor67C44pKKp6mQTliMZnfo0/img6f8Xi0O3JlUxA8nqHcxf7+MS/
G/9UvjNtFeNPcPRgJ7JnzQ4PKoHu3J1IN3SKTBFHI/BdfMF4cB3Bh9smsIaoQj2H
h0Pn2TqoXMVmpNVOm9lEskEwEJQ7/QDcAmMF16F1rVQonuQHPK9oiZtxliH/1k4d
0ALVIX2u2AeWbB/Kpe9UE5K+PH3AZb9cu/9GwmkPTClwbbdS1e2e5IncQQ0KlLxp
s9yKqUUl8SybW4W8afuUMQUsF/p4KDZ4f/kMTyI2Bf6/WZ1dH5pejtgdYk3WLXPW
JsGlvONigfwey38+wwDJsODGH8M=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----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@@ -176,11 +176,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL REVOKED intermediate CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL REVOKED intermediate CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:de:c5:04:10:7d:c2:21:e9:12:45:da:d5:ba:28:
fd:a6:f4:30:44:a0:df:f9:70:5e:17:26:97:59:5c:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
5d:d5:47:52:01:4a:b4:5f:a1:3e:97:ed:fd:b5:2f:0a:35:03:
c8:83:f5:1c:91:03:b6:9d:72:1f:64:9f:07:e6:29:c2:0e:d8:
ba:30:16:a7:7d:f6:4b:bf:9a:3f:46:b3:c2:14:c4:be:a1:d3:
8e:22:3e:9f:f8:20:ad:8e:c0:f3:0a:3e:94:66:2d:66:07:d7:
ca:70:8d:9a:01:5f:fb:20:32:a5:b9:b2:52:b1:21:e1:a0:8b:
46:aa:c9:e5:45:43:0c:14:e2:8e:ff:31:bc:c9:4e:f0:43:3a:
5e:fb:f3:6a:d4:61:91:34:ad:bb:13:9b:53:d8:0e:6b:43:25:
8a:58:9b:f4:d4:95:d9:78:23:cd:5c:92:43:84:71:73:63:4e:
fc:e5:4a:98:29:80:cf:b4:83:ea:b5:7c:e2:01:b4:66:10:78:
1b:06:4d:e8:45:c5:e8:25:fc:4d:3b:a8:ad:fc:52:dd:39:14:
f0:3e:90:35:a6:2a:30:01:82:93:87:c5:e3:4e:83:f7:0f:d0:
b7:1b:9f:96:11:59:3e:2b:8a:9e:6c:ed:a3:24:09:81:46:27:
ec:78:2e:ce:a1:e1:af:0f:50:33:8c:52:8b:1a:b1:1b:a1:44:
22:dc:01:96:94:1f:d9:cd:c7:ae:c2:15:50:77:9d:d1:0d:1d:
a1:42:65:15
9d:2f:66:43:34:cc:a4:d7:ae:09:81:ec:ca:bf:9e:e0:d6:28:
a0:25:63:5e:16:0a:e9:60:2c:c1:e6:36:5d:92:f0:7c:4a:22:
10:94:9b:1a:c6:8f:c3:a9:bb:69:53:b8:aa:30:91:c5:32:19:
35:7a:3e:86:af:f9:39:74:44:6e:5c:39:f6:b6:62:0c:33:8e:
f6:b9:d2:a7:e0:22:df:a3:4f:48:e4:04:f1:f7:20:f5:36:55:
a1:3d:08:ae:a9:12:eb:a8:97:59:6f:a0:b8:f0:ab:73:22:01:
cc:cc:96:29:ae:5f:46:ac:4e:47:1a:b9:8d:06:7e:88:67:5e:
16:12:64:37:85:2a:d8:f3:27:cd:fa:86:fc:84:4b:51:3a:f1:
c7:1a:27:8d:54:49:e6:cb:82:bb:7c:b3:3f:2f:10:d5:3a:74:
e5:36:7b:b5:c4:58:a4:48:35:af:35:ad:3d:44:74:44:83:99:
d0:a1:c6:2f:5f:f3:58:1a:33:2f:6c:4e:8e:44:ce:2a:ba:e9:
c6:7d:9f:22:12:44:05:38:f7:87:54:4d:8d:ac:72:1c:5a:2a:
74:9d:3b:30:31:d6:a9:39:d4:d6:0e:63:f8:46:07:ab:7f:01:
31:cc:85:91:72:10:37:94:c4:ec:f9:9d:7f:81:25:cb:ce:55:
48:85:86:2e
-----BEGIN CERTIFICATE-----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@@ -84,26 +84,26 @@ DgYDVQQHDAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdp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AQELBQADggEBAJ0vZkM0zKTXrgmB7Mq/nuDWKKAlY14WCulgLMHmNl2S8HxKIhCU
mxrGj8Opu2lTuKowkcUyGTV6Poav+Tl0RG5cOfa2Ygwzjva50qfgIt+jT0jkBPH3
IPU2VaE9CK6pEuuol1lvoLjwq3MiAczMlimuX0asTkcauY0GfohnXhYSZDeFKtjz
J836hvyES1E68ccaJ41USebLgrt8sz8vENU6dOU2e7XEWKRINa81rT1EdESDmdCh
xi9f81gaMy9sTo5Eziq66cZ9nyISRAU494dUTY2schxaKnSdOzAx1qk51NYOY/hG
B6t/ATHMhZFyEDeUxOz5nX+BJcvOVUiFhi4=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
@@ -176,11 +176,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4 (0x4)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL OCSP Responder, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL OCSP Responder/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:b8:ba:23:b4:f6:c3:7b:14:c3:a4:f5:1d:61:a1:
f5:1e:63:b9:85:23:34:50:6d:f8:7c:a2:8a:04:8b:
@@ -44,27 +44,27 @@ Certificate:
X509v3 Extended Key Usage:
OCSP Signing
Signature Algorithm: sha256WithRSAEncryption
7f:a6:bb:6a:fe:59:e2:6e:dd:00:73:ff:0c:1a:08:83:0f:82:
dd:8b:9a:3e:12:37:28:2e:93:02:c6:7e:93:30:53:f4:40:26:
74:c2:02:46:9c:a3:60:37:78:99:cb:96:13:ed:d4:ff:3b:d9:
53:b9:89:cf:f9:dc:74:c1:4e:df:a4:4c:26:75:6a:6f:21:92:
5a:a4:e7:22:04:dc:29:51:4e:b5:aa:8b:0b:b0:d4:1c:98:0a:
fb:65:fa:7a:cd:14:9b:25:be:9e:be:0d:37:55:7c:5e:22:69:
16:03:9a:20:66:4c:4b:aa:37:1a:07:66:30:3e:e3:86:3c:d8:
8b:67:d5:fd:66:53:f2:88:e5:29:68:d2:07:7d:52:d4:d3:16:
43:ae:27:b1:20:b0:88:73:9d:cf:ff:dd:3a:75:42:ad:63:dc:
f6:61:b3:6f:97:c4:c2:f8:88:16:62:5e:6a:17:fd:45:b8:ad:
7b:6b:52:80:c1:f7:43:b0:8d:4e:d9:75:fd:d9:ec:c9:ef:a3:
bf:08:1e:0f:15:d7:96:61:5f:6c:c1:0e:06:0f:f1:4e:07:dc:
22:0f:bc:99:89:92:ed:6a:3e:90:e3:24:89:87:a7:8c:cc:f8:
55:10:b2:d5:11:ee:ae:39:d1:b1:c0:09:fe:07:95:7e:cd:54:
4a:3b:48:bb
07:ca:a6:a1:9f:bf:af:92:41:35:66:51:ac:bc:2c:ec:e7:8d:
65:7e:e9:40:fe:5a:ab:8a:1d:3d:13:db:b4:43:2c:9a:36:98:
21:a5:e8:ca:a9:4d:fc:e3:f7:45:88:cd:33:bf:8a:62:10:2f:
b2:b7:04:ef:26:43:51:1d:43:62:7d:1e:50:c8:d5:98:94:71:
8f:3b:23:26:f1:71:8e:1e:3d:3f:21:fd:b7:2d:65:e4:07:65:
ac:3c:fc:c0:47:a9:32:f6:da:26:93:10:b2:d1:6d:c8:81:31:
7c:b0:6b:c5:22:8d:b3:fa:be:82:ea:41:42:c4:c0:ef:e3:84:
0f:6f:9a:03:63:b3:30:e0:31:81:2a:16:b3:47:d9:5b:38:93:
07:d0:6e:79:52:2c:e5:50:84:79:10:e7:f6:31:7a:3e:48:a2:
38:21:90:7a:f2:5f:48:a4:46:93:87:dd:5c:83:64:ea:b5:99:
a2:e9:01:40:fe:f0:48:66:4f:96:f7:83:52:f8:6d:f8:5f:ed:
0c:bb:be:d0:69:10:4b:99:8f:f8:61:53:9d:12:ca:86:aa:b1:
80:b4:a6:c1:cb:b7:48:f7:9f:55:b4:6e:ab:d3:a1:aa:4b:a7:
21:6e:16:7f:ad:bb:ea:0f:41:80:9b:7f:d6:46:a2:c0:61:72:
59:59:a0:07
-----BEGIN CERTIFICATE-----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@@ -80,26 +80,26 @@ CzAJBgNVBAYTAlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0
dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEYMBYG
A1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZz
c2wuY29tggFjMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA0GCSqGSIb3DQEBCwUAA4IB
AQB/prtq/lnibt0Ac/8MGgiDD4Ldi5o+EjcoLpMCxn6TMFP0QCZ0wgJGnKNgN3iZ
y5YT7dT/O9lTuYnP+dx0wU7fpEwmdWpvIZJapOciBNwpUU61qosLsNQcmAr7Zfp6
zRSbJb6evg03VXxeImkWA5ogZkxLqjcaB2YwPuOGPNiLZ9X9ZlPyiOUpaNIHfVLU
0xZDriexILCIc53P/906dUKtY9z2YbNvl8TC+IgWYl5qF/1FuK17a1KAwfdDsI1O
2XX92ezJ76O/CB4PFdeWYV9swQ4GD/FOB9wiD7yZiZLtaj6Q4ySJh6eMzPhVELLV
Ee6uOdGxwAn+B5V+zVRKO0i7
AQAHyqahn7+vkkE1ZlGsvCzs541lfulA/lqrih09E9u0QyyaNpghpejKqU384/dF
iM0zv4piEC+ytwTvJkNRHUNifR5QyNWYlHGPOyMm8XGOHj0/If23LWXkB2WsPPzA
R6ky9tomkxCy0W3IgTF8sGvFIo2z+r6C6kFCxMDv44QPb5oDY7Mw4DGBKhazR9lb
OJMH0G55UizlUIR5EOf2MXo+SKI4IZB68l9IpEaTh91cg2TqtZmi6QFA/vBIZk+W
94NS+G34X+0Mu77QaRBLmY/4YVOdEsqGqrGAtKbBy7dI959VtG6r06GqS6chbhZ/
rbvqD0GAm3/WRqLAYXJZWaAH
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -136,27 +136,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----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@@ -172,11 +172,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----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@@ -83,11 +83,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 5 (0x5)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www1.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www1.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:e6:96:55:75:cf:8a:97:68:8c:b6:38:f6:7a:05:
be:33:b6:51:47:37:8a:f7:db:91:be:92:6b:b7:00:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22221
Signature Algorithm: sha256WithRSAEncryption
3b:92:03:e0:e0:50:56:e5:06:7e:dd:7f:5c:3c:b1:9d:ed:3c:
f0:a9:a9:e6:93:f8:fd:f2:dc:db:7b:07:e7:2c:74:17:df:22:
f3:6c:85:20:0a:75:9d:62:11:1d:2e:03:0e:c4:34:b0:09:d2:
05:b4:03:80:9d:8c:a3:1e:a5:eb:18:e3:09:ee:25:1f:3e:de:
64:cb:65:82:49:a4:ec:f4:1e:91:be:3e:b6:b1:6b:ee:10:f0:
ca:9a:ce:a1:b6:69:25:ad:a0:a2:d6:6c:96:b6:ae:11:cd:ce:
0f:36:51:62:71:0d:0d:e7:16:e6:41:69:8c:18:92:55:3b:59:
ad:d1:f9:ce:f2:c2:1d:bb:cf:ca:9b:7d:08:f5:9a:33:2d:3d:
a1:85:bb:6e:9f:fb:6a:d8:97:0f:0b:12:f5:06:34:69:cc:f7:
95:7b:3e:fd:34:12:79:50:77:a1:96:1e:17:90:b5:b8:5e:28:
3b:d6:65:e5:80:a6:26:4b:82:a9:6a:30:11:49:17:20:8c:13:
9c:7b:0f:89:7a:6d:6c:6d:6c:b6:a0:aa:e5:45:82:b5:ac:e6:
cf:a7:97:47:f8:68:79:e4:67:6c:ec:e2:6a:c8:29:f6:d1:b3:
90:04:b5:6b:68:17:16:91:30:85:56:cf:be:53:89:6e:21:c8:
c9:0c:11:5c
78:2e:01:bd:b4:60:d9:68:ab:4d:47:a1:a2:97:00:5d:46:44:
6f:4f:d0:7c:23:ff:52:36:28:b5:72:1c:40:8c:16:1b:a1:4d:
d5:1a:0d:92:48:57:7d:5f:11:b6:07:1d:b1:c5:47:82:f1:16:
57:49:10:78:12:ef:16:86:8b:97:52:3a:5b:9d:58:4d:df:df:
e1:a0:9c:8b:8b:31:75:9c:81:0f:87:7c:13:c6:1d:e9:5d:d0:
c1:1e:b0:70:e5:b0:8f:cd:57:bc:3e:68:49:58:23:da:b8:ed:
10:c3:ae:5c:d1:85:b3:8d:85:5c:ec:01:a1:6a:4a:e1:bd:d8:
16:98:2f:a6:7c:a1:cb:57:11:d0:9a:50:8e:dc:1c:67:e2:9f:
a5:96:f7:51:52:d1:76:be:5b:c9:e2:af:e6:cb:df:00:64:44:
fb:ef:96:ae:3f:6d:d9:85:39:fc:86:42:a4:52:34:3e:a6:96:
0e:c9:34:28:11:77:1e:ac:e5:78:5f:96:e7:8c:78:b8:db:dd:
f7:ca:c6:68:c7:1b:b1:70:eb:6d:51:fd:6d:93:60:e4:18:ff:
c8:84:92:ad:f5:f0:a5:ea:f2:80:42:c9:a7:e0:ef:bf:b8:98:
b6:3a:91:86:40:4c:d1:90:e5:8d:57:0f:98:b0:ce:d9:a9:e2:
29:9d:a8:2a
-----BEGIN CERTIFICATE-----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@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx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AQB4LgG9tGDZaKtNR6GilwBdRkRvT9B8I/9SNii1chxAjBYboU3VGg2SSFd9XxG2
Bx2xxUeC8RZXSRB4Eu8WhouXUjpbnVhN39/hoJyLizF1nIEPh3wTxh3pXdDBHrBw
5bCPzVe8PmhJWCPauO0Qw65c0YWzjYVc7AGhakrhvdgWmC+mfKHLVxHQmlCO3Bxn
4p+llvdRUtF2vlvJ4q/my98AZET775auP23ZhTn8hkKkUjQ+ppYOyTQoEXcerOV4
X5bnjHi42933ysZoxxuxcOttUf1tk2DkGP/IhJKt9fCl6vKAQsmn4O+/uJi2OpGG
QEzRkOWNVw+YsM7ZqeIpnagq
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:de:b4:c8:5c:77:e0:2d:b1:f5:b9:ad:16:47:35:
a0:35:65:65:c6:e1:40:ab:1e:b4:b9:13:b7:cb:8c:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
6b:3f:8a:71:6e:3e:ef:9c:f9:45:86:d4:fe:f4:9b:1b:b8:6f:
b2:52:e2:a2:d5:4a:a7:30:79:76:1d:26:f7:d2:0b:c2:6e:d7:
17:76:31:f8:aa:37:17:13:85:7d:55:33:45:14:a5:2e:af:d9:
ba:e8:fe:8e:0b:b3:1a:bc:f0:9b:1d:00:c6:63:89:78:47:98:
7d:d8:ff:95:0b:4a:4f:27:c7:57:e8:79:a1:82:40:c5:63:79:
ec:ea:41:70:9c:8d:e8:9e:c6:33:a6:2c:c1:34:15:d9:e5:ad:
1d:df:18:aa:e6:6d:62:77:e6:9b:dd:82:7f:b6:70:23:f6:d9:
c2:67:5c:3d:a8:55:18:09:f7:9e:ec:68:9d:8b:27:53:04:21:
6e:a7:38:b4:3b:8b:2b:cf:78:a0:7b:4f:e0:92:f8:b6:f3:7d:
c1:7c:b4:59:34:27:6d:4e:b1:01:2c:b7:2f:cb:8b:ec:0e:e0:
03:1a:88:12:d0:3b:47:ca:0f:05:4a:ac:bd:5c:a5:24:7f:5f:
02:49:ef:74:e3:33:47:5f:99:92:64:ad:e0:9e:16:d4:c2:1e:
b7:5d:d5:5b:1d:ea:a6:21:19:45:9c:27:9d:dd:ee:62:c6:50:
0d:75:5e:32:f2:c1:63:6b:ec:7d:bb:4f:ae:86:93:f4:62:29:
27:8a:1f:31
1e:8f:fa:f5:32:ee:98:9e:ed:96:b4:a9:ea:d7:3c:05:74:36:
41:ef:1b:84:35:6a:3d:6c:c9:53:2a:50:f7:d1:80:d3:ec:99:
bc:4b:dd:86:69:e0:94:1c:c4:77:c9:6a:f7:ed:2c:0d:c5:17:
a7:15:75:25:14:2d:c6:14:8d:17:97:6d:e7:d7:38:88:d6:df:
ba:8c:aa:2a:f1:4e:ef:1f:4a:16:5a:fa:0c:50:ea:98:b1:4b:
36:97:24:21:ce:dc:e4:5c:ba:ae:e7:cb:2a:1d:f7:73:ff:17:
f3:9d:cf:26:4e:b7:cb:5c:8e:e4:9e:55:d2:00:f8:ca:53:c3:
53:3f:6d:65:aa:86:f4:f1:ed:26:1e:75:56:be:bd:80:f5:1c:
4e:4d:13:c3:1b:04:61:b9:c6:e2:6f:30:44:01:0e:63:d8:19:
ce:83:40:e9:c7:01:f2:51:d7:b7:cd:16:25:93:de:3e:7a:7d:
8d:72:1e:2b:66:76:91:df:b9:33:fa:04:b8:8c:c5:7a:ef:f6:
94:74:54:1e:96:4a:a8:f6:0d:59:f7:2f:f1:26:78:f6:c7:bf:
68:f9:b0:7f:a5:2d:1c:7b:fc:64:25:ed:a4:bb:e6:31:44:f9:
d5:5f:67:4d:01:29:84:b2:f8:fa:fb:6b:52:1e:66:c3:08:6b:
8e:d5:ad:b9
-----BEGIN CERTIFICATE-----
MIIE8DCCA9igAwIBAgIBATANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBoTELMAkGA1UEBhMCVVMxEzARBgNV
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NMIGludGVy
bWVkaWF0ZSBDQSAxMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wuY29tMIIB
@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu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ggEBAB6P+vUy7pie7Za0qerXPAV0NkHvG4Q1aj1syVMqUPfRgNPsmbxL3YZp4JQc
xHfJavftLA3FF6cVdSUULcYUjReXbefXOIjW37qMqirxTu8fShZa+gxQ6pixSzaX
JCHO3ORcuq7nyyod93P/F/OdzyZOt8tcjuSeVdIA+MpTw1M/bWWqhvTx7SYedVa+
vYD1HE5NE8MbBGG5xuJvMEQBDmPYGc6DQOnHAfJR17fNFiWT3j56fY1yHitmdpHf
uTP6BLiMxXrv9pR0VB6WSqj2DVn3L/EmePbHv2j5sH+lLRx7/GQl7aS75jFE+dVf
Z00BKYSy+Pr7a1IeZsMIa47Vrbk=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -233,27 +233,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----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@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 6 (0x6)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www2.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www2.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:c6:35:8a:e8:aa:bd:33:c9:5e:84:43:67:42:65:
2a:3c:e3:89:b4:a6:67:a1:3b:ee:6d:85:d1:d3:2b:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22221
Signature Algorithm: sha256WithRSAEncryption
ac:46:14:7b:31:3a:7e:eb:f8:a0:2b:9a:3d:50:a0:0a:8a:c6:
de:5d:8e:90:ca:c1:4c:ac:18:e4:26:24:31:2c:a5:2b:a4:2a:
3d:17:94:f0:07:7e:87:1d:12:65:1d:07:01:36:43:1f:35:39:
08:c6:d0:d8:8a:ec:4c:0c:61:70:79:5a:b1:5f:f5:e3:2b:6c:
28:4a:73:6e:e4:40:85:75:df:7a:cf:73:40:17:54:2a:e0:64:
71:c3:6f:2e:5e:34:84:e9:21:4b:20:01:d5:79:eb:8d:db:24:
01:e0:54:b7:72:c4:66:ad:d3:27:43:c3:0e:6a:ec:91:fa:9f:
0d:3e:ec:51:45:89:de:82:0b:fe:51:c7:c6:7d:0e:30:d2:b2:
cb:08:81:7b:33:ce:c8:1e:0d:08:c7:d3:2c:62:d5:a4:45:81:
33:8d:51:be:53:d7:85:55:e0:52:13:98:61:d8:28:f5:3c:36:
e6:be:9b:38:ec:75:4d:db:a7:1f:3b:3f:c6:79:00:bc:75:67:
46:69:df:0b:68:b5:cc:7d:03:01:24:82:93:fd:00:1d:f3:59:
9d:3f:77:ea:d4:9c:3b:10:e2:78:ff:65:5d:2c:f9:e7:d3:3e:
60:94:75:24:7c:97:b4:1d:a5:e3:0f:51:6e:85:44:e6:a4:75:
36:8c:bd:64
35:db:bd:7c:8c:c2:f1:83:77:3c:dd:bf:b4:5b:0c:6e:95:29:
30:a5:03:bb:54:45:47:88:cd:d4:46:80:94:bc:82:3f:8f:9c:
3e:3d:09:48:9c:77:91:b0:70:54:70:23:41:8c:2f:cb:0b:8f:
df:08:fe:ce:0d:76:38:c8:80:15:6f:ab:d8:fc:26:8f:02:55:
1b:e8:08:4c:c6:6f:38:23:8b:8b:52:fd:76:04:44:fb:5d:47:
31:83:87:2e:7f:a9:d1:34:db:7d:9c:73:9d:63:fc:2e:86:b2:
22:4b:5c:ef:95:d4:b3:0f:17:80:6c:67:5d:b3:c4:2a:7d:be:
22:b9:40:b7:82:d9:c7:38:e4:9b:2b:c9:a0:ef:53:ba:7a:1e:
a9:9c:b6:91:1e:e8:3d:2e:7f:d6:1f:35:db:72:56:ea:8f:0a:
7f:0a:64:91:c9:8d:79:75:63:45:e3:3b:2e:dc:01:12:ca:6c:
47:da:97:40:7e:9e:3e:16:1a:64:8b:3e:cd:b7:bd:ec:61:9e:
63:a9:0f:7a:cd:1c:e0:e0:2b:a9:74:ef:88:72:58:17:0c:ac:
ad:75:9e:6a:2e:a3:66:9e:79:a0:52:d1:77:cf:33:93:72:1a:
b8:0d:ab:9e:8f:32:34:52:9c:15:91:73:c3:a2:19:a4:21:96:
05:8c:0b:d0
-----BEGIN CERTIFICATE-----
MIIE7jCCA9agAwIBAgIBBjANBgkqhkiG9w0BAQsFADCBoTELMAkGA1UEBhMCVVMx
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NM
IGludGVybWVkaWF0ZSBDQSAxMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
Y29tMB4XDTIwMDYxOTEzMjM0MVoXDTIzMDMxNjEzMjM0MVowgZgxCzAJBgNVBAYT
Y29tMB4XDTIxMDIxMDE5NDk1NFoXDTIzMTEwNzE5NDk1NFowgZgxCzAJBgNVBAYT
AlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRAwDgYD
VQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEZMBcGA1UEAwwQd3d3
Mi53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCC
@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx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AQA12718jMLxg3c83b+0WwxulSkwpQO7VEVHiM3URoCUvII/j5w+PQlInHeRsHBU
cCNBjC/LC4/fCP7ODXY4yIAVb6vY/CaPAlUb6AhMxm84I4uLUv12BET7XUcxg4cu
f6nRNNt9nHOdY/wuhrIiS1zvldSzDxeAbGdds8Qqfb4iuUC3gtnHOOSbK8mg71O6
eh6pnLaRHug9Ln/WHzXbclbqjwp/CmSRyY15dWNF4zsu3AESymxH2pdAfp4+Fhpk
iz7Nt73sYZ5jqQ96zRzg4CupdO+IclgXDKytdZ5qLqNmnnmgUtF3zzOTchq4Daue
jzI0UpwVkXPDohmkIZYFjAvQ
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 1, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 1/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:de:b4:c8:5c:77:e0:2d:b1:f5:b9:ad:16:47:35:
a0:35:65:65:c6:e1:40:ab:1e:b4:b9:13:b7:cb:8c:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
6b:3f:8a:71:6e:3e:ef:9c:f9:45:86:d4:fe:f4:9b:1b:b8:6f:
b2:52:e2:a2:d5:4a:a7:30:79:76:1d:26:f7:d2:0b:c2:6e:d7:
17:76:31:f8:aa:37:17:13:85:7d:55:33:45:14:a5:2e:af:d9:
ba:e8:fe:8e:0b:b3:1a:bc:f0:9b:1d:00:c6:63:89:78:47:98:
7d:d8:ff:95:0b:4a:4f:27:c7:57:e8:79:a1:82:40:c5:63:79:
ec:ea:41:70:9c:8d:e8:9e:c6:33:a6:2c:c1:34:15:d9:e5:ad:
1d:df:18:aa:e6:6d:62:77:e6:9b:dd:82:7f:b6:70:23:f6:d9:
c2:67:5c:3d:a8:55:18:09:f7:9e:ec:68:9d:8b:27:53:04:21:
6e:a7:38:b4:3b:8b:2b:cf:78:a0:7b:4f:e0:92:f8:b6:f3:7d:
c1:7c:b4:59:34:27:6d:4e:b1:01:2c:b7:2f:cb:8b:ec:0e:e0:
03:1a:88:12:d0:3b:47:ca:0f:05:4a:ac:bd:5c:a5:24:7f:5f:
02:49:ef:74:e3:33:47:5f:99:92:64:ad:e0:9e:16:d4:c2:1e:
b7:5d:d5:5b:1d:ea:a6:21:19:45:9c:27:9d:dd:ee:62:c6:50:
0d:75:5e:32:f2:c1:63:6b:ec:7d:bb:4f:ae:86:93:f4:62:29:
27:8a:1f:31
1e:8f:fa:f5:32:ee:98:9e:ed:96:b4:a9:ea:d7:3c:05:74:36:
41:ef:1b:84:35:6a:3d:6c:c9:53:2a:50:f7:d1:80:d3:ec:99:
bc:4b:dd:86:69:e0:94:1c:c4:77:c9:6a:f7:ed:2c:0d:c5:17:
a7:15:75:25:14:2d:c6:14:8d:17:97:6d:e7:d7:38:88:d6:df:
ba:8c:aa:2a:f1:4e:ef:1f:4a:16:5a:fa:0c:50:ea:98:b1:4b:
36:97:24:21:ce:dc:e4:5c:ba:ae:e7:cb:2a:1d:f7:73:ff:17:
f3:9d:cf:26:4e:b7:cb:5c:8e:e4:9e:55:d2:00:f8:ca:53:c3:
53:3f:6d:65:aa:86:f4:f1:ed:26:1e:75:56:be:bd:80:f5:1c:
4e:4d:13:c3:1b:04:61:b9:c6:e2:6f:30:44:01:0e:63:d8:19:
ce:83:40:e9:c7:01:f2:51:d7:b7:cd:16:25:93:de:3e:7a:7d:
8d:72:1e:2b:66:76:91:df:b9:33:fa:04:b8:8c:c5:7a:ef:f6:
94:74:54:1e:96:4a:a8:f6:0d:59:f7:2f:f1:26:78:f6:c7:bf:
68:f9:b0:7f:a5:2d:1c:7b:fc:64:25:ed:a4:bb:e6:31:44:f9:
d5:5f:67:4d:01:29:84:b2:f8:fa:fb:6b:52:1e:66:c3:08:6b:
8e:d5:ad:b9
-----BEGIN CERTIFICATE-----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@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu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ggEBAB6P+vUy7pie7Za0qerXPAV0NkHvG4Q1aj1syVMqUPfRgNPsmbxL3YZp4JQc
xHfJavftLA3FF6cVdSUULcYUjReXbefXOIjW37qMqirxTu8fShZa+gxQ6pixSzaX
JCHO3ORcuq7nyyod93P/F/OdzyZOt8tcjuSeVdIA+MpTw1M/bWWqhvTx7SYedVa+
vYD1HE5NE8MbBGG5xuJvMEQBDmPYGc6DQOnHAfJR17fNFiWT3j56fY1yHitmdpHf
uTP6BLiMxXrv9pR0VB6WSqj2DVn3L/EmePbHv2j5sH+lLRx7/GQl7aS75jFE+dVf
Z00BKYSy+Pr7a1IeZsMIa47Vrbk=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -233,27 +233,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----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@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx
EDAOBgNVBAoMB3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQD
DA93b2xmU1NMIHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5j
b22CAWMwCwYDVR0PBAQDAgEGMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYW
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAozcdcO16
5tfkvg/EnkdFoPrKM3Ic/s6WeqrWGDaBJ6oux9kJRtwKAsX4bmsJuWrz1cxsYoQv
lgwYAhe7NrfjxeHUhnrGbCkoVSSaEFXwEkVjXQ1KMP6vSmCPkVpUU+zq3bMMUT7a
2Y5PLUqr5hZ6YUkuTgpIxS6UTNWo+ORJ2V8rTx/gLf/36B3pz+FG1FCs2crtxqQL
9O/s1Z//pcjIuPAhvabae6HN82RMCd1WIpS8jvaldsIG1PEaN3ZJ1ZlXZPHBdaPt
iLOvqiQoJ5a5AyvfiekrR27Tr68j+VlmLsQefrtE2tXbt9an33/EKHnH2UuSGNGu
y2Ixa336OxZ6tQ==
aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 7 (0x7)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:42 2020 GMT
Not After : Mar 16 13:23:42 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www3.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www3.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:be:19:65:1e:17:39:d4:33:fc:97:64:69:80:51:
fb:6c:7c:ca:e1:ba:2a:ab:d2:dd:30:61:f3:2e:47:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22222
Signature Algorithm: sha256WithRSAEncryption
b1:1d:46:1d:9c:de:5d:6e:2f:f1:a0:9a:68:2f:25:ed:2b:ae:
5c:47:01:9a:39:49:26:33:ab:78:10:9a:3f:ba:99:05:b2:47:
26:a3:ec:cb:5f:db:db:ef:f7:db:5d:04:bf:5f:89:d6:3d:aa:
3e:04:36:95:f4:44:9e:a1:f9:5d:b9:4d:a8:76:d4:9f:1e:42:
45:80:6f:d9:c8:83:ee:2a:85:ed:8c:26:25:ec:95:9f:ec:22:
41:f0:0d:66:b8:89:30:1d:84:44:0c:f8:4a:f9:4e:f9:c1:ff:
90:bd:71:e9:d4:ca:07:5b:4e:a8:cb:38:d3:b1:26:1f:eb:cd:
0a:ae:a6:45:40:2c:41:77:b6:c9:69:8c:7b:05:33:81:83:cf:
16:25:ea:7d:15:20:08:50:6c:64:0a:69:1f:19:58:dd:89:f9:
3a:84:4c:9e:9a:47:d2:f4:3f:b3:0b:29:ab:c8:1f:77:75:c6:
fa:8f:cd:d5:e6:5b:ab:1d:6e:9c:84:2a:d7:16:5d:25:bd:70:
34:c0:44:a0:fe:5c:66:64:74:37:f2:36:2a:a6:49:be:47:0e:
79:b0:82:7f:86:e4:94:01:85:44:82:1d:aa:59:31:1d:9e:1e:
28:39:7d:91:8c:c6:db:2e:90:6d:f7:a3:06:aa:88:e7:db:90:
64:c3:e2:17
8f:08:2b:50:a2:26:49:28:c1:f1:bf:d8:5e:75:e3:37:cf:e0:
48:c3:e3:fa:8b:ec:6f:f7:06:39:cc:12:6a:94:97:01:f1:3b:
71:9d:08:85:40:ae:de:ab:33:68:ab:af:d6:a4:b3:90:f4:8f:
12:31:31:52:98:6b:c8:bb:1e:5f:58:1a:31:5d:37:43:91:38:
be:b9:5b:17:cd:25:f1:49:09:76:19:57:fb:08:67:43:3e:d3:
20:e2:b6:bc:17:cc:21:9d:45:cf:1c:5c:dc:54:fd:22:b6:b4:
b2:91:b8:8f:c3:93:95:02:52:a0:49:ef:fb:f4:86:61:82:e8:
c0:fc:2b:b7:82:32:74:81:68:c3:85:4a:e5:e4:d4:4c:2d:22:
81:34:89:ca:aa:75:78:4d:5b:90:c2:a1:4f:ba:da:3a:f1:4e:
12:21:ac:b6:23:3b:e3:e5:50:b6:69:3b:94:d7:64:37:57:a4:
cd:a7:53:1e:e5:27:8f:3d:b7:3e:85:34:9e:db:54:a6:d5:b8:
cb:9d:df:41:e9:b2:16:5c:a6:38:31:fb:64:9e:cb:4b:9d:b7:
f9:cb:52:ed:87:fe:f7:04:bb:a3:6b:07:66:57:5c:1c:cd:c4:
f2:60:94:97:38:0f:52:a4:aa:bc:5d:b5:09:d1:75:bd:24:ab:
06:91:7e:24
-----BEGIN CERTIFICATE-----
MIIE7jCCA9agAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBoTELMAkGA1UEBhMCVVMx
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMSIwIAYDVQQDDBl3b2xmU1NM
IGludGVybWVkaWF0ZSBDQSAyMR8wHQYJKoZIhvcNAQkBFhBpbmZvQHdvbGZzc2wu
Y29tMB4XDTIwMDYxOTEzMjM0MloXDTIzMDMxNjEzMjM0MlowgZgxCzAJBgNVBAYT
Y29tMB4XDTIxMDIxMDE5NDk1NFoXDTIzMTEwNzE5NDk1NFowgZgxCzAJBgNVBAYT
AlVTMRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRAwDgYD
VQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmluZzEZMBcGA1UEAwwQd3d3
My53b2xmc3NsLmNvbTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3b2xmc3NsLmNvbTCC
@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx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AQCPCCtQoiZJKMHxv9hedeM3z+BIw+P6i+xv9wY5zBJqlJcB8TtxnQiFQK7eqzNo
q6/WpLOQ9I8SMTFSmGvIux5fWBoxXTdDkTi+uVsXzSXxSQl2GVf7CGdDPtMg4ra8
F8whnUXPHFzcVP0itrSykbiPw5OVAlKgSe/79IZhgujA/Cu3gjJ0gWjDhUrl5NRM
LSKBNInKqnV4TVuQwqFPuto68U4SIay2Izvj5VC2aTuU12Q3V6TNp1Me5SePPbc+
hTSe21Sm1bjLnd9B6bIWXKY4MftknstLnbf5y1Lth/73BLujawdmV1wczcTyYJSX
OA9SpKq8XbUJ0XW9JKsGkX4k
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:d0:20:3c:35:19:6f:2c:44:b4:7e:42:c7:75:b4:
6a:2b:a9:23:85:bf:87:b4:ee:ca:d7:4b:1f:31:d7:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
0a:ef:11:86:ba:12:b6:5a:38:b7:7a:62:a9:e8:75:e8:25:a1:
72:5b:d1:ab:7e:b9:46:9c:ca:57:90:d2:cc:83:8e:3a:e7:05:
02:da:9d:da:ff:28:d0:51:bb:68:6b:3a:32:23:e3:ca:37:49:
82:b4:22:74:1b:22:49:c6:4e:54:20:46:89:0c:fd:d8:cd:a7:
15:cf:49:87:48:ad:07:ba:91:cc:85:39:20:c5:7f:c3:f5:07:
e4:83:c8:bd:a6:71:47:c1:6a:81:8c:af:8b:f8:80:3f:ec:b9:
e6:34:c8:01:bb:1c:d4:dd:11:8b:7b:0c:5c:3b:5d:b0:56:c6:
9f:35:fc:75:2e:f4:59:27:21:d6:b1:2a:71:6b:b0:c5:44:b0:
e3:0d:9d:ed:a0:8e:69:bc:ac:38:61:61:8b:ab:e0:07:cc:41:
70:da:55:56:09:4a:7a:ca:17:01:62:df:98:14:2a:1a:d4:52:
52:4c:4e:96:66:10:e4:46:f3:0c:e6:31:06:60:62:69:68:77:
2b:36:bd:28:6e:ed:fd:6c:29:c6:e9:c8:58:f1:51:d7:a4:91:
81:7b:b7:c3:2e:07:c4:fd:bd:35:d9:d9:82:27:97:4d:a4:71:
05:25:1c:67:a0:56:5e:ea:c2:1f:08:c2:ae:a6:e7:c0:15:72:
b3:e1:df:50
0c:13:dc:c2:28:a2:be:bb:0b:8e:29:28:aa:7a:99:04:e5:88:
c6:67:7e:8d:3f:8a:68:3a:7f:c5:e2:d0:ed:c9:95:4c:40:f2:
7a:87:73:17:fb:f8:c4:bf:1b:ff:54:be:33:6d:15:e3:4f:70:
f4:60:27:b2:67:cd:0e:0f:2a:81:ee:dc:9d:48:37:74:8a:4c:
11:47:23:f0:5d:7c:c1:78:70:1d:c1:87:db:26:b0:86:a8:42:
3d:87:87:43:e7:d9:3a:a8:5c:c5:66:a4:d5:4e:9b:d9:44:b2:
41:30:10:94:3b:fd:00:dc:02:63:05:d7:a1:75:ad:54:28:9e:
e4:07:3c:af:68:89:9b:71:96:21:ff:d6:4e:1d:d0:02:d5:21:
7d:ae:d8:07:96:6c:1f:ca:a5:ef:54:13:92:be:3c:7d:c0:65:
bf:5c:bb:ff:46:c2:69:0f:4c:29:70:6d:b7:52:d5:ed:9e:e4:
89:dc:41:0d:0a:94:bc:69:b3:dc:8a:a9:45:25:f1:2c:9b:5b:
85:bc:69:fb:94:31:05:2c:17:fa:78:28:36:78:7f:f9:0c:4f:
22:36:05:fe:bf:59:9d:5d:1f:9a:5e:8e:d8:1d:62:4d:d6:2d:
73:d6:26:c1:a5:bc:e3:62:81:fc:1e:cb:7f:3e:c3:00:c9:b0:
e0:c6:1f:c3
-----BEGIN CERTIFICATE-----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@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu
ZzEYMBYGA1UEAwwPd29sZlNTTCByb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZv
QHdvbGZzc2wuY29tggFjMAsGA1UdDwQEAwIBBjAyBggrBgEFBQcBAQQmMCQwIgYI
KwYBBQUHMAGGFmh0dHA6Ly8xMjcuMC4wLjE6MjIyMjAwDQYJKoZIhvcNAQELBQAD
ggEBAArvEYa6ErZaOLd6YqnodegloXJb0at+uUacyleQ0syDjjrnBQLandr/KNBR
u2hrOjIj48o3SYK0InQbIknGTlQgRokM/djNpxXPSYdIrQe6kcyFOSDFf8P1B+SD
yL2mcUfBaoGMr4v4gD/sueY0yAG7HNTdEYt7DFw7XbBWxp81/HUu9FknIdaxKnFr
sMVEsOMNne2gjmm8rDhhYYur4AfMQXDaVVYJSnrKFwFi35gUKhrUUlJMTpZmEORG
8wzmMQZgYmlodys2vShu7f1sKcbpyFjxUdekkYF7t8MuB8T9vTXZ2YInl02kcQUl
HGegVl7qwh8Iwq6m58AVcrPh31A=
ggEBAAwT3MIoor67C44pKKp6mQTliMZnfo0/img6f8Xi0O3JlUxA8nqHcxf7+MS/
G/9UvjNtFeNPcPRgJ7JnzQ4PKoHu3J1IN3SKTBFHI/BdfMF4cB3Bh9smsIaoQj2H
h0Pn2TqoXMVmpNVOm9lEskEwEJQ7/QDcAmMF16F1rVQonuQHPK9oiZtxliH/1k4d
0ALVIX2u2AeWbB/Kpe9UE5K+PH3AZb9cu/9GwmkPTClwbbdS1e2e5IncQQ0KlLxp
s9yKqUUl8SybW4W8afuUMQUsF/p4KDZ4f/kMTyI2Bf6/WZ1dH5pejtgdYk3WLXPW
JsGlvONigfwey38+wwDJsODGH8M=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -233,27 +233,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----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@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 8 (0x8)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:42 2020 GMT
Not After : Mar 16 13:23:42 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www4.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www4.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:9c:ef:8a:7e:84:4d:58:7a:b1:91:c8:cb:68:76:
df:fe:0a:29:fe:7f:74:35:d5:c3:fd:43:be:d7:89:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22222
Signature Algorithm: sha256WithRSAEncryption
55:39:86:a2:0c:6f:a5:e5:4c:6d:26:1a:bf:f6:3b:ac:e4:76:
75:72:a0:08:96:06:34:4b:1c:0c:1b:f3:49:88:16:cf:98:ec:
23:3f:26:70:3f:06:ed:25:a5:a4:e6:c4:b5:2d:4b:a4:82:b2:
31:bb:d7:b1:a2:8e:65:78:31:69:1c:77:bf:56:4f:3f:e2:27:
08:24:e2:30:6d:de:4b:e2:ad:89:98:9a:9a:dc:e5:6c:23:a1:
f5:65:4a:6a:cd:0f:ee:0f:53:9d:40:63:43:f9:0a:4d:bc:1a:
8e:de:d8:43:6c:21:b9:56:3c:ab:36:4f:c9:28:27:d9:0e:74:
f9:b4:0a:55:9c:13:0e:06:23:21:5e:b0:0e:b9:6f:db:30:81:
85:68:a3:3a:36:8c:72:a7:79:5b:6c:52:3b:17:8c:fb:10:4d:
d7:d1:32:ec:c5:8e:48:2c:86:a4:78:fb:54:75:17:c9:f8:56:
87:f8:2f:b9:7e:b0:85:72:55:31:c5:b9:d1:70:4f:41:56:7f:
81:c8:21:fe:11:2c:cc:1e:e1:99:6a:35:50:e4:d2:ca:49:df:
fc:00:c7:0e:84:17:ba:70:a8:93:a1:b2:eb:ef:34:26:f8:f2:
8e:e1:ba:85:bc:39:c6:24:f0:74:d8:86:91:67:44:75:06:0a:
a3:04:7d:43
41:bd:96:38:c0:f7:87:a4:73:f5:bb:e8:4e:9d:83:45:03:17:
19:b8:02:55:73:4f:f7:4e:c8:07:b1:7c:24:97:e8:f1:7c:22:
43:ab:52:42:08:8b:d7:64:4d:30:99:e2:84:e8:f0:59:65:65:
fa:f4:84:da:b2:9f:84:37:e9:19:5a:0f:7c:4c:a7:6c:ef:81:
7d:da:ca:d2:3e:2a:3b:82:99:50:02:2f:39:09:e8:7a:d8:f2:
d5:7e:f6:77:bf:6b:f2:33:78:0e:f0:fc:d4:15:2b:04:e8:ea:
d6:1d:97:0b:7e:60:17:c1:f7:f0:cb:65:51:a1:65:0c:c0:22:
cd:f5:18:bb:20:82:6c:f8:16:79:30:3e:f5:67:a7:9e:8a:7e:
ae:f5:49:a1:e6:01:8a:d3:b4:92:8e:b6:ce:18:aa:00:67:f1:
19:7d:55:af:3c:5c:29:c3:04:a5:a5:e7:f5:67:af:d9:ca:75:
84:3d:6d:74:4e:d5:c8:25:d5:fb:f7:24:5c:83:32:9a:6a:5d:
de:20:c3:3c:47:91:6f:2e:39:b7:17:12:fc:b0:93:d2:d6:23:
44:c1:71:f4:33:80:21:f1:63:68:26:f7:ad:e4:35:86:3a:5b:
26:d6:9d:0e:cf:38:b8:3d:80:30:34:ee:9e:b8:b6:37:19:3c:
2d:ed:a3:63
-----BEGIN CERTIFICATE-----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@@ -84,26 +84,26 @@ U2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5lZXJpbmcx
GDAWBgNVBAMMD3dvbGZTU0wgcm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0B3
b2xmc3NsLmNvbYIBAjALBgNVHQ8EBAMCBeAwMgYIKwYBBQUHAQEEJjAkMCIGCCsG
AQUFBzABhhZodHRwOi8vMTI3LjAuMC4xOjIyMjIyMA0GCSqGSIb3DQEBCwUAA4IB
AQBVOYaiDG+l5UxtJhq/9jus5HZ1cqAIlgY0SxwMG/NJiBbPmOwjPyZwPwbtJaWk
5sS1LUukgrIxu9exoo5leDFpHHe/Vk8/4icIJOIwbd5L4q2JmJqa3OVsI6H1ZUpq
zQ/uD1OdQGND+QpNvBqO3thDbCG5VjyrNk/JKCfZDnT5tApVnBMOBiMhXrAOuW/b
MIGFaKM6Noxyp3lbbFI7F4z7EE3X0TLsxY5ILIakePtUdRfJ+FaH+C+5frCFclUx
xbnRcE9BVn+ByCH+ESzMHuGZajVQ5NLKSd/8AMcOhBe6cKiTobLr7zQm+PKO4bqF
vDnGJPB02IaRZ0R1BgqjBH1D
AQBBvZY4wPeHpHP1u+hOnYNFAxcZuAJVc0/3TsgHsXwkl+jxfCJDq1JCCIvXZE0w
meKE6PBZZWX69ITasp+EN+kZWg98TKds74F92srSPio7gplQAi85Ceh62PLVfvZ3
v2vyM3gO8PzUFSsE6OrWHZcLfmAXwffwy2VRoWUMwCLN9Ri7IIJs+BZ5MD71Z6ee
in6u9Umh5gGK07SSjrbOGKoAZ/EZfVWvPFwpwwSlpef1Z6/ZynWEPW10TtXIJdX7
9yRcgzKaal3eIMM8R5FvLjm3FxL8sJPS1iNEwXH0M4Ah8WNoJvet5DWGOlsm1p0O
zzi4PYAwNO6euLY3GTwt7aNj
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL intermediate CA 2, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL intermediate CA 2/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:d0:20:3c:35:19:6f:2c:44:b4:7e:42:c7:75:b4:
6a:2b:a9:23:85:bf:87:b4:ee:ca:d7:4b:1f:31:d7:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
0a:ef:11:86:ba:12:b6:5a:38:b7:7a:62:a9:e8:75:e8:25:a1:
72:5b:d1:ab:7e:b9:46:9c:ca:57:90:d2:cc:83:8e:3a:e7:05:
02:da:9d:da:ff:28:d0:51:bb:68:6b:3a:32:23:e3:ca:37:49:
82:b4:22:74:1b:22:49:c6:4e:54:20:46:89:0c:fd:d8:cd:a7:
15:cf:49:87:48:ad:07:ba:91:cc:85:39:20:c5:7f:c3:f5:07:
e4:83:c8:bd:a6:71:47:c1:6a:81:8c:af:8b:f8:80:3f:ec:b9:
e6:34:c8:01:bb:1c:d4:dd:11:8b:7b:0c:5c:3b:5d:b0:56:c6:
9f:35:fc:75:2e:f4:59:27:21:d6:b1:2a:71:6b:b0:c5:44:b0:
e3:0d:9d:ed:a0:8e:69:bc:ac:38:61:61:8b:ab:e0:07:cc:41:
70:da:55:56:09:4a:7a:ca:17:01:62:df:98:14:2a:1a:d4:52:
52:4c:4e:96:66:10:e4:46:f3:0c:e6:31:06:60:62:69:68:77:
2b:36:bd:28:6e:ed:fd:6c:29:c6:e9:c8:58:f1:51:d7:a4:91:
81:7b:b7:c3:2e:07:c4:fd:bd:35:d9:d9:82:27:97:4d:a4:71:
05:25:1c:67:a0:56:5e:ea:c2:1f:08:c2:ae:a6:e7:c0:15:72:
b3:e1:df:50
0c:13:dc:c2:28:a2:be:bb:0b:8e:29:28:aa:7a:99:04:e5:88:
c6:67:7e:8d:3f:8a:68:3a:7f:c5:e2:d0:ed:c9:95:4c:40:f2:
7a:87:73:17:fb:f8:c4:bf:1b:ff:54:be:33:6d:15:e3:4f:70:
f4:60:27:b2:67:cd:0e:0f:2a:81:ee:dc:9d:48:37:74:8a:4c:
11:47:23:f0:5d:7c:c1:78:70:1d:c1:87:db:26:b0:86:a8:42:
3d:87:87:43:e7:d9:3a:a8:5c:c5:66:a4:d5:4e:9b:d9:44:b2:
41:30:10:94:3b:fd:00:dc:02:63:05:d7:a1:75:ad:54:28:9e:
e4:07:3c:af:68:89:9b:71:96:21:ff:d6:4e:1d:d0:02:d5:21:
7d:ae:d8:07:96:6c:1f:ca:a5:ef:54:13:92:be:3c:7d:c0:65:
bf:5c:bb:ff:46:c2:69:0f:4c:29:70:6d:b7:52:d5:ed:9e:e4:
89:dc:41:0d:0a:94:bc:69:b3:dc:8a:a9:45:25:f1:2c:9b:5b:
85:bc:69:fb:94:31:05:2c:17:fa:78:28:36:78:7f:f9:0c:4f:
22:36:05:fe:bf:59:9d:5d:1f:9a:5e:8e:d8:1d:62:4d:d6:2d:
73:d6:26:c1:a5:bc:e3:62:81:fc:1e:cb:7f:3e:c3:00:c9:b0:
e0:c6:1f:c3
-----BEGIN CERTIFICATE-----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@@ -177,26 +177,26 @@ DAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdpbmVlcmlu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ggEBAAwT3MIoor67C44pKKp6mQTliMZnfo0/img6f8Xi0O3JlUxA8nqHcxf7+MS/
G/9UvjNtFeNPcPRgJ7JnzQ4PKoHu3J1IN3SKTBFHI/BdfMF4cB3Bh9smsIaoQj2H
h0Pn2TqoXMVmpNVOm9lEskEwEJQ7/QDcAmMF16F1rVQonuQHPK9oiZtxliH/1k4d
0ALVIX2u2AeWbB/Kpe9UE5K+PH3AZb9cu/9GwmkPTClwbbdS1e2e5IncQQ0KlLxp
s9yKqUUl8SybW4W8afuUMQUsF/p4KDZ4f/kMTyI2Bf6/WZ1dH5pejtgdYk3WLXPW
JsGlvONigfwey38+wwDJsODGH8M=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -233,27 +233,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----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@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

View File

@@ -2,15 +2,15 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 9 (0x9)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL REVOKED intermediate CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL REVOKED intermediate CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:42 2020 GMT
Not After : Mar 16 13:23:42 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = www5.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=www5.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ac:73:6d:e9:fa:8c:36:72:3e:89:3b:52:29:bd:
14:70:a2:00:b4:08:58:b6:c6:c0:bf:80:6a:1f:a5:
@@ -47,27 +47,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22223
Signature Algorithm: sha256WithRSAEncryption
55:da:28:39:5f:01:e7:85:42:35:24:88:27:fe:71:b0:ee:f8:
3f:7f:ed:c7:db:0c:8f:ed:04:25:e1:7e:a4:39:ef:fe:1c:54:
f2:c1:ad:92:a7:63:6e:bc:94:61:b2:fc:bb:b8:bc:d0:4e:1c:
f2:35:b6:2b:9e:70:a0:eb:7b:68:45:3d:14:e1:d2:e8:02:d5:
26:ac:81:6d:46:3a:4e:5a:98:a0:72:ec:c0:59:fe:59:9a:e0:
c8:33:2d:3c:86:71:3b:74:b4:0b:77:10:06:ac:9d:f0:34:60:
51:74:d0:52:d0:9c:78:3d:d9:ed:7b:bb:11:44:d8:cb:e3:bd:
14:d2:1e:98:49:b6:35:89:83:94:1a:ea:2a:8e:48:2d:65:ba:
a5:ff:a0:0f:98:55:1b:92:85:b8:e4:9f:7e:50:d0:07:65:40:
3f:d3:c8:67:65:c7:81:12:b3:96:42:dc:7b:22:32:de:41:5a:
8e:9a:21:99:50:ab:be:7b:12:97:f7:b0:0f:22:47:08:fd:2a:
4f:29:ce:02:59:52:bd:80:3a:24:a4:58:6d:39:04:e1:ce:c5:
75:12:a0:ac:af:39:81:c5:56:03:78:3e:08:91:c5:1a:17:e1:
6f:4e:b3:ae:37:3a:5a:89:2a:e0:c6:ad:26:e9:50:9c:05:69:
81:76:89:8d
82:34:f3:94:21:59:85:fb:8f:9e:ae:df:bb:ab:ba:4b:80:75:
c2:eb:1b:58:5d:45:d4:df:6c:a6:8a:8f:84:00:7a:da:00:71:
a3:89:07:52:78:04:05:ba:3d:aa:fd:0b:1e:82:22:12:a1:98:
39:fb:b8:91:92:dc:4a:a6:33:f9:fd:3b:a7:7d:96:63:ec:cd:
5c:ac:db:9d:dd:5c:0c:70:1e:31:61:e1:1c:38:b6:e4:d7:e1:
98:44:8e:20:ae:36:2c:e8:be:8b:82:38:f6:2e:46:46:a2:43:
51:e1:cd:fb:1d:f5:fe:14:57:fe:b4:55:6d:0c:55:45:3f:96:
96:7a:3c:be:40:31:27:69:d7:18:d2:7b:af:be:a9:7f:fe:fe:
75:b4:8c:ae:d8:48:9c:f6:60:ba:69:dd:1a:fe:ec:04:53:5e:
a9:04:91:46:89:4b:5d:01:79:36:66:ea:25:1c:af:fe:44:59:
90:3f:b0:4d:51:a4:ec:d9:c2:d1:35:12:79:26:ea:a4:99:b2:
ac:e6:7b:bc:bd:d1:06:d3:fe:5b:35:2e:58:46:30:bf:8c:1f:
15:da:e9:7e:3a:68:4c:85:89:38:2a:a2:6c:6d:14:25:17:32:
d2:96:0b:67:b9:c5:7b:de:ef:1a:13:b8:8a:d7:8f:db:b7:73:
cd:5b:d8:fc
-----BEGIN CERTIFICATE-----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@@ -84,26 +84,26 @@ A1UEBwwHU2VhdHRsZTEQMA4GA1UECgwHd29sZlNTTDEUMBIGA1UECwwLRW5naW5l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CwUAA4IBAQCCNPOUIVmF+4+ert+7q7pLgHXC6xtYXUXU32ymio+EAHraAHGjiQdS
eAQFuj2q/QsegiISoZg5+7iRktxKpjP5/TunfZZj7M1crNud3VwMcB4xYeEcOLbk
1+GYRI4grjYs6L6Lgjj2LkZGokNR4c37HfX+FFf+tFVtDFVFP5aWejy+QDEnadcY
0nuvvql//v51tIyu2Eic9mC6ad0a/uwEU16pBJFGiUtdAXk2ZuolHK/+RFmQP7BN
UaTs2cLRNRJ5JuqkmbKs5nu8vdEG0/5bNS5YRjC/jB8V2ul+OmhMhYk4KqJsbRQl
FzLSlgtnucV73u8aE7iK14/bt3PNW9j8
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL REVOKED intermediate CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:54 2021 GMT
Not After : Nov 7 19:49:54 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL REVOKED intermediate CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:de:c5:04:10:7d:c2:21:e9:12:45:da:d5:ba:28:
fd:a6:f4:30:44:a0:df:f9:70:5e:17:26:97:59:5c:
@@ -140,27 +140,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
5d:d5:47:52:01:4a:b4:5f:a1:3e:97:ed:fd:b5:2f:0a:35:03:
c8:83:f5:1c:91:03:b6:9d:72:1f:64:9f:07:e6:29:c2:0e:d8:
ba:30:16:a7:7d:f6:4b:bf:9a:3f:46:b3:c2:14:c4:be:a1:d3:
8e:22:3e:9f:f8:20:ad:8e:c0:f3:0a:3e:94:66:2d:66:07:d7:
ca:70:8d:9a:01:5f:fb:20:32:a5:b9:b2:52:b1:21:e1:a0:8b:
46:aa:c9:e5:45:43:0c:14:e2:8e:ff:31:bc:c9:4e:f0:43:3a:
5e:fb:f3:6a:d4:61:91:34:ad:bb:13:9b:53:d8:0e:6b:43:25:
8a:58:9b:f4:d4:95:d9:78:23:cd:5c:92:43:84:71:73:63:4e:
fc:e5:4a:98:29:80:cf:b4:83:ea:b5:7c:e2:01:b4:66:10:78:
1b:06:4d:e8:45:c5:e8:25:fc:4d:3b:a8:ad:fc:52:dd:39:14:
f0:3e:90:35:a6:2a:30:01:82:93:87:c5:e3:4e:83:f7:0f:d0:
b7:1b:9f:96:11:59:3e:2b:8a:9e:6c:ed:a3:24:09:81:46:27:
ec:78:2e:ce:a1:e1:af:0f:50:33:8c:52:8b:1a:b1:1b:a1:44:
22:dc:01:96:94:1f:d9:cd:c7:ae:c2:15:50:77:9d:d1:0d:1d:
a1:42:65:15
9d:2f:66:43:34:cc:a4:d7:ae:09:81:ec:ca:bf:9e:e0:d6:28:
a0:25:63:5e:16:0a:e9:60:2c:c1:e6:36:5d:92:f0:7c:4a:22:
10:94:9b:1a:c6:8f:c3:a9:bb:69:53:b8:aa:30:91:c5:32:19:
35:7a:3e:86:af:f9:39:74:44:6e:5c:39:f6:b6:62:0c:33:8e:
f6:b9:d2:a7:e0:22:df:a3:4f:48:e4:04:f1:f7:20:f5:36:55:
a1:3d:08:ae:a9:12:eb:a8:97:59:6f:a0:b8:f0:ab:73:22:01:
cc:cc:96:29:ae:5f:46:ac:4e:47:1a:b9:8d:06:7e:88:67:5e:
16:12:64:37:85:2a:d8:f3:27:cd:fa:86:fc:84:4b:51:3a:f1:
c7:1a:27:8d:54:49:e6:cb:82:bb:7c:b3:3f:2f:10:d5:3a:74:
e5:36:7b:b5:c4:58:a4:48:35:af:35:ad:3d:44:74:44:83:99:
d0:a1:c6:2f:5f:f3:58:1a:33:2f:6c:4e:8e:44:ce:2a:ba:e9:
c6:7d:9f:22:12:44:05:38:f7:87:54:4d:8d:ac:72:1c:5a:2a:
74:9d:3b:30:31:d6:a9:39:d4:d6:0e:63:f8:46:07:ab:7f:01:
31:cc:85:91:72:10:37:94:c4:ec:f9:9d:7f:81:25:cb:ce:55:
48:85:86:2e
-----BEGIN CERTIFICATE-----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@@ -177,26 +177,26 @@ DgYDVQQHDAdTZWF0dGxlMRAwDgYDVQQKDAd3b2xmU1NMMRQwEgYDVQQLDAtFbmdp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AQELBQADggEBAJ0vZkM0zKTXrgmB7Mq/nuDWKKAlY14WCulgLMHmNl2S8HxKIhCU
mxrGj8Opu2lTuKowkcUyGTV6Poav+Tl0RG5cOfa2Ygwzjva50qfgIt+jT0jkBPH3
IPU2VaE9CK6pEuuol1lvoLjwq3MiAczMlimuX0asTkcauY0GfohnXhYSZDeFKtjz
J836hvyES1E68ccaJ41USebLgrt8sz8vENU6dOU2e7XEWKRINa81rT1EdESDmdCh
xi9f81gaMy9sTo5Eziq66cZ9nyISRAU494dUTY2schxaKnSdOzAx1qk51NYOY/hG
B6t/ATHMhZFyEDeUxOz5nX+BJcvOVUiFhi4=
-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 99 (0x63)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Washington, L = Seattle, O = wolfSSL, OU = Engineering, CN = wolfSSL root CA, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Washington, L=Seattle, O=wolfSSL, OU=Engineering, CN=wolfSSL root CA/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Public-Key: (2048 bit)
Modulus:
00:ab:2c:b4:2f:1d:06:09:ef:4e:29:86:84:7e:cc:
bf:a6:79:7c:f0:c0:c1:64:25:8c:75:b7:10:05:ca:
@@ -233,27 +233,27 @@ Certificate:
OCSP - URI:http://127.0.0.1:22220
Signature Algorithm: sha256WithRSAEncryption
a3:37:1d:70:ed:7a:e6:d7:e4:be:0f:c4:9e:47:45:a0:fa:ca:
33:72:1c:fe:ce:96:7a:aa:d6:18:36:81:27:aa:2e:c7:d9:09:
46:dc:0a:02:c5:f8:6e:6b:09:b9:6a:f3:d5:cc:6c:62:84:2f:
96:0c:18:02:17:bb:36:b7:e3:c5:e1:d4:86:7a:c6:6c:29:28:
55:24:9a:10:55:f0:12:45:63:5d:0d:4a:30:fe:af:4a:60:8f:
91:5a:54:53:ec:ea:dd:b3:0c:51:3e:da:d9:8e:4f:2d:4a:ab:
e6:16:7a:61:49:2e:4e:0a:48:c5:2e:94:4c:d5:a8:f8:e4:49:
d9:5f:2b:4f:1f:e0:2d:ff:f7:e8:1d:e9:cf:e1:46:d4:50:ac:
d9:ca:ed:c6:a4:0b:f4:ef:ec:d5:9f:ff:a5:c8:c8:b8:f0:21:
bd:a6:da:7b:a1:cd:f3:64:4c:09:dd:56:22:94:bc:8e:f6:a5:
76:c2:06:d4:f1:1a:37:76:49:d5:99:57:64:f1:c1:75:a3:ed:
88:b3:af:aa:24:28:27:96:b9:03:2b:df:89:e9:2b:47:6e:d3:
af:af:23:f9:59:66:2e:c4:1e:7e:bb:44:da:d5:db:b7:d6:a7:
df:7f:c4:28:79:c7:d9:4b:92:18:d1:ae:cb:62:31:6b:7d:fa:
3b:16:7a:b5
3e:31:8d:ab:e8:39:25:0a:a0:01:53:03:10:e8:f9:d9:5e:51:
46:da:e2:e2:60:40:7c:ec:d7:c1:54:8f:5b:a1:1f:1b:43:64:
f5:b3:a5:b9:d1:9d:af:45:5a:53:00:ba:f7:53:63:5c:79:b5:
ad:0e:b3:0b:05:b0:2e:c7:ca:1f:52:13:47:38:9b:d0:cd:b5:
19:c1:f7:e6:1d:14:9b:81:8b:e7:ef:d9:70:32:b0:f1:96:b6:
ff:fe:fd:83:e7:fe:74:55:12:e4:93:3f:e3:54:7e:d3:d3:11:
ae:d4:e8:9b:70:97:64:7f:12:f3:38:26:62:38:c6:43:42:3b:
ea:87:67:80:e5:18:c5:28:54:f9:d3:33:4a:b9:33:1e:7c:45:
7a:e9:64:0f:50:fe:6d:b0:a3:aa:c4:98:7d:ef:53:2c:d1:0e:
d3:8b:2b:f3:3d:a4:df:26:50:b4:8b:ac:64:00:89:7b:5a:fb:
4f:b8:d3:f4:53:63:bd:e8:45:cc:2c:55:25:61:92:ff:41:b7:
27:6a:16:43:ff:0a:26:50:ef:31:9d:4f:6f:6e:ea:bd:1d:70:
69:c9:1f:ba:70:bf:b2:1d:4a:7d:57:d7:9e:a1:e8:86:34:e3:
fa:ee:3f:26:20:12:f5:15:83:53:a0:91:5d:a9:36:b3:02:a3:
42:94:c9:65
-----BEGIN CERTIFICATE-----
MIIE5jCCA86gAwIBAgIBYzANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCVVMx
EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoM
B3dvbGZTU0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NM
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjAw
NjE5MTMyMzQxWhcNMjMwMzE2MTMyMzQxWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
IHJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wHhcNMjEw
MjEwMTk0OTUzWhcNMjMxMTA3MTk0OTUzWjCBlzELMAkGA1UEBhMCVVMxEzARBgNV
BAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxEDAOBgNVBAoMB3dvbGZT
U0wxFDASBgNVBAsMC0VuZ2luZWVyaW5nMRgwFgYDVQQDDA93b2xmU1NMIHJvb3Qg
Q0ExHzAdBgkqhkiG9w0BCQEWEGluZm9Ad29sZnNzbC5jb20wggEiMA0GCSqGSIb3
@@ -269,11 +269,11 @@ A1UEBhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUx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aHR0cDovLzEyNy4wLjAuMToyMjIyMDANBgkqhkiG9w0BAQsFAAOCAQEAPjGNq+g5
JQqgAVMDEOj52V5RRtri4mBAfOzXwVSPW6EfG0Nk9bOludGdr0VaUwC691NjXHm1
rQ6zCwWwLsfKH1ITRzib0M21GcH35h0Um4GL5+/ZcDKw8Za2//79g+f+dFUS5JM/
41R+09MRrtTom3CXZH8S8zgmYjjGQ0I76odngOUYxShU+dMzSrkzHnxFeulkD1D+
bbCjqsSYfe9TLNEO04sr8z2k3yZQtIusZACJe1r7T7jT9FNjvehFzCxVJWGS/0G3
J2oWQ/8KJlDvMZ1Pb27qvR1wackfunC/sh1KfVfXnqHohjTj+u4/JiAS9RWDU6CR
Xak2swKjQpTJZQ==
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -2,16 +2,16 @@ Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_P521, OU = Root-P521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_P521, OU=Root-P521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Sep 14 23:57:18 2020 GMT
Not After : Jun 11 23:57:18 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_p521, OU = CA-p521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_p521, OU=CA-p521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (521 bit)
pub:
pub:
04:00:2d:18:24:2d:e4:db:6c:c3:69:9b:db:18:67:
33:f1:60:68:94:14:cd:91:4a:57:65:ef:36:fa:24:
82:88:ec:c7:f0:cb:48:45:6e:96:5f:7f:eb:76:be:
@@ -34,20 +34,20 @@ Certificate:
X509v3 Key Usage: critical
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: ecdsa-with-SHA256
30:81:87:02:41:60:cd:fa:94:0d:23:c3:4e:3c:b1:6e:d9:b6:
5b:0e:97:1e:a4:df:0a:7c:05:2e:61:0c:d7:c0:e5:86:16:0c:
7b:01:a5:33:9a:e6:31:a0:62:91:da:dc:22:d1:ba:4f:75:43:
94:43:67:91:20:08:66:96:27:53:b2:61:0e:59:0a:50:02:42:
01:ec:87:8d:ca:6d:e0:bf:30:ba:ef:37:13:ad:f6:d1:c4:fc:
b5:e5:4b:96:c2:83:a0:d8:ed:04:73:85:8d:54:d7:e9:9a:67:
8a:cf:11:36:4a:f2:2f:85:5a:24:5e:3c:79:e1:a7:c4:ec:78:
82:7a:52:25:c4:55:57:95:0e:6f:c9:d5
30:81:88:02:42:01:c4:4b:30:70:d8:b3:34:56:15:6a:b2:dc:
09:af:f9:f8:a2:b8:6b:e7:46:8c:5e:95:77:d0:db:92:6a:d4:
05:33:4b:94:66:eb:6c:02:50:c0:11:21:65:d8:47:c2:0c:6d:
10:c4:3b:93:97:66:ca:71:b0:a4:51:3d:e1:e9:71:c7:87:02:
42:00:a1:73:18:75:c7:aa:77:88:49:cd:5f:e6:7b:f5:c3:b0:
77:27:ed:23:08:7c:aa:ba:a0:40:21:69:98:6b:95:fe:97:fb:
26:70:5b:6b:52:1f:42:9b:7d:8c:81:91:bc:2a:b6:eb:b7:3a:
99:20:c7:17:44:61:ee:50:f2:e9:8d:ca:21
-----BEGIN CERTIFICATE-----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@@ -56,8 +56,8 @@ f+t2vkRAwxnAM2jEBgSOwiWxloMiDnvHsvwBhpHtQ1044AwljbPbsdzetyGAz4fe
ZPQhPi2veb320ABLgXn69xCqGc1A1x51NFMpA+1IVCHlj5W1m0GNX91y0lqjYzBh
MB0GA1UdDgQWBBRAiR0wXgxu1T3G1SWQ2rZCZ+3pgjAfBgNVHSMEGDAWgBRkp2iV
UzMYoiCSvGRVpqvKdmibyDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB
hjAKBggqhkjOPQQDAgOBiwAwgYcCQWDN+pQNI8NOPLFu2bZbDpcepN8KfAUuYQzX
wOWGFgx7AaUzmuYxoGKR2twi0bpPdUOUQ2eRIAhmlidTsmEOWQpQAkIB7IeNym3g
vzC67zcTrfbRxPy15UuWwoOg2O0Ec4WNVNfpmmeKzxE2SvIvhVokXjx54afE7HiC
elIlxFVXlQ5vydU=
hjAKBggqhkjOPQQDAgOBjAAwgYgCQgHESzBw2LM0VhVqstwJr/n4orhr50aMXpV3
0NuSatQFM0uUZutsAlDAESFl2EfCDG0QxDuTl2bKcbCkUT3h6XHHhwJCAKFzGHXH
qneISc1f5nv1w7B3J+0jCHyquqBAIWmYa5X+l/smcFtrUh9Cm32MgZG8KrbrtzqZ
IMcXRGHuUPLpjcoh
-----END CERTIFICATE-----

Binary file not shown.

View File

@@ -1,18 +1,17 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
24:9d:c6:98:df:09:87:30:42:bd:e6:4f:86:05:af:dc:82:89:d7:0e
Signature Algorithm: ecdsa-with-SHA256
Issuer: C = US, ST = Montana, L = Bozeman, O = wolfSSL_p521, OU = Client-p521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Serial Number: 12773897163527651161 (0xb145ffca8d6f7f59)
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=US, ST=Montana, L=Bozeman, O=wolfSSL_p521, OU=Client-p521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Validity
Not Before: Sep 14 23:57:18 2020 GMT
Not After : Jun 11 23:57:18 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL_p521, OU = Client-p521, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Not Before: Feb 10 19:49:53 2021 GMT
Not After : Nov 7 19:49:53 2023 GMT
Subject: C=US, ST=Montana, L=Bozeman, O=wolfSSL_p521, OU=Client-p521, CN=www.wolfssl.com/emailAddress=info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (521 bit)
pub:
pub:
04:01:62:6e:f1:00:ec:d8:99:58:9b:80:6b:fe:2c:
f1:b2:f0:c8:48:df:ac:d2:3b:71:29:ab:f0:66:63:
d8:8e:b5:c8:c2:fc:99:44:e2:45:b1:5a:7b:b9:73:
@@ -30,7 +29,7 @@ Certificate:
X509v3 Authority Key Identifier:
keyid:20:E1:BF:57:E5:F3:C3:0C:72:84:6A:C6:DF:BC:22:D0:B7:25:E5:A4
DirName:/C=US/ST=Montana/L=Bozeman/O=wolfSSL_p521/OU=Client-p521/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:24:9D:C6:98:DF:09:87:30:42:BD:E6:4F:86:05:AF:DC:82:89:D7:0E
serial:B1:45:FF:CA:8D:6F:7F:59
X509v3 Basic Constraints:
CA:TRUE
@@ -39,35 +38,35 @@ Certificate:
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: ecdsa-with-SHA256
30:81:87:02:42:01:e1:85:a5:0e:81:ff:b0:2a:d3:b8:73:8c:
1d:8e:1f:42:4c:de:cb:d1:63:69:ce:53:d0:2a:52:14:e4:7a:
2f:1e:c4:0b:1b:db:1e:36:97:72:ed:9b:2f:d4:93:79:06:ec:
41:6c:6c:18:28:99:56:b6:0b:58:c4:bc:47:db:64:a8:7e:02:
41:2b:d0:32:2e:03:81:32:f3:9a:65:58:a4:51:7e:9a:ad:c2:
99:bf:21:f1:a1:70:61:4b:ee:8e:df:3b:9c:79:e3:12:b4:3b:
9e:64:da:d0:ef:5b:50:7b:a1:b0:30:8f:af:66:71:9d:41:20:
cf:e8:9c:bd:f5:3b:c4:fe:00:43:35:24
30:81:88:02:42:00:b5:3e:42:5d:77:b3:41:07:f0:82:b1:00:
e9:d4:a7:12:bb:53:c8:8e:27:b5:1c:94:87:ab:41:02:fb:11:
a5:ce:6e:5d:6b:b6:61:eb:66:a3:40:78:cb:71:a7:77:fc:d6:
df:83:dd:07:85:3c:f4:32:4f:d2:78:41:39:96:7d:8f:47:02:
42:00:8a:cb:77:0c:8f:60:3b:48:cd:55:44:f1:c2:7d:b2:53:
d0:59:45:d2:89:4a:67:fd:b8:64:c2:f8:83:5e:17:52:4d:83:
b4:77:81:77:21:3b:82:1e:a4:3a:61:ba:a3:49:32:3a:af:60:
c5:4e:bf:77:95:1e:7b:21:6b:1c:3a:c7:c3
-----BEGIN CERTIFICATE-----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c3NsLmNvbYIJALFF/8qNb39ZMAwGA1UdEwQFMAMBAf8wHAYDVR0RBBUwE4ILZXhh
bXBsZS5jb22HBH8AAAEwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAoG
CCqGSM49BAMCA4GMADCBiAJCALU+Ql13s0EH8IKxAOnUpxK7U8iOJ7UclIerQQL7
EaXObl1rtmHrZqNAeMtxp3f81t+D3QeFPPQyT9J4QTmWfY9HAkIAist3DI9gO0jN
VUTxwn2yU9BZRdKJSmf9uGTC+INeF1JNg7R3gXchO4IepDphuqNJMjqvYMVOv3eV
Hnshaxw6x8M=
-----END CERTIFICATE-----

Binary file not shown.

Some files were not shown because too many files have changed in this diff Show More