12798 lines
542 KiB
C++
12798 lines
542 KiB
C++
/* vim: set ts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/* This file is generated from sources in nss/gtests/common/wycheproof
|
|
* automatically and should not be touched manually.
|
|
* Generation is trigged by calling python3 genTestVectors.py */
|
|
|
|
#ifndef dsa_vectors_h__
|
|
#define dsa_vectors_h__
|
|
|
|
#include "testvectors_base/test-structs.h"
|
|
|
|
static const std::vector<uint8_t> kPubKey0{
|
|
0x30, 0x82, 0x01, 0xb6, 0x30, 0x82, 0x01, 0x2b, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x01, 0x1e, 0x02, 0x81, 0x81,
|
|
0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73,
|
|
0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8,
|
|
0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07,
|
|
0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17,
|
|
0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d,
|
|
0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8,
|
|
0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6,
|
|
0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a,
|
|
0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62,
|
|
0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d,
|
|
0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00,
|
|
0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x81, 0x80, 0x08,
|
|
0x35, 0xaa, 0x8c, 0x35, 0x8b, 0xbf, 0x01, 0xa1, 0x84, 0x6d, 0x12, 0x06,
|
|
0x32, 0x3f, 0xab, 0xe4, 0x08, 0xb0, 0xe9, 0x87, 0x89, 0xfc, 0xc6, 0x23,
|
|
0x9d, 0xa1, 0x4d, 0x4b, 0x3f, 0x86, 0xc2, 0x76, 0xa8, 0xf4, 0x8a, 0xa8,
|
|
0x5a, 0x59, 0x50, 0x7e, 0x62, 0x0a, 0xd1, 0xbc, 0x74, 0x5f, 0x0f, 0x1c,
|
|
0xbf, 0x63, 0xec, 0x98, 0xc2, 0x29, 0xc2, 0x61, 0x0d, 0x77, 0xc6, 0x34,
|
|
0xd1, 0x64, 0x2e, 0x40, 0x43, 0x54, 0x77, 0x16, 0x55, 0xb2, 0xd5, 0x66,
|
|
0x2f, 0x7a, 0x45, 0x22, 0x71, 0x78, 0xce, 0x34, 0x30, 0xaf, 0x0f, 0x6b,
|
|
0x3b, 0xb9, 0x4b, 0x52, 0xf7, 0xf5, 0x1e, 0x97, 0xba, 0xd6, 0x59, 0xb1,
|
|
0xba, 0x06, 0x84, 0xe2, 0x08, 0xbe, 0x62, 0x4c, 0x28, 0xd8, 0x2f, 0xb1,
|
|
0x16, 0x2f, 0x18, 0xdd, 0x9d, 0xce, 0x45, 0x21, 0x64, 0x61, 0x65, 0x4c,
|
|
0xf3, 0x37, 0x46, 0x24, 0xd1, 0x5a, 0x8d, 0x03, 0x81, 0x84, 0x00, 0x02,
|
|
0x81, 0x80, 0x17, 0x39, 0x31, 0xdd, 0xa3, 0x1e, 0xff, 0x32, 0xf2, 0x4b,
|
|
0x38, 0x30, 0x91, 0xbf, 0x77, 0xea, 0xcd, 0xc6, 0xef, 0xd5, 0x57, 0x62,
|
|
0x49, 0x11, 0xd8, 0xe9, 0xb9, 0xde, 0xbf, 0x0f, 0x25, 0x6d, 0x0c, 0xff,
|
|
0xac, 0x55, 0x67, 0xb3, 0x3f, 0x6e, 0xaa, 0xe9, 0xd3, 0x27, 0x5b, 0xbe,
|
|
0xd7, 0xef, 0x9f, 0x5f, 0x94, 0xc4, 0x00, 0x3c, 0x95, 0x9e, 0x49, 0xa1,
|
|
0xed, 0x3f, 0x58, 0xc3, 0x1b, 0x21, 0xba, 0xcc, 0xc0, 0xed, 0x88, 0x40,
|
|
0xb4, 0x61, 0x45, 0xf1, 0x21, 0xb8, 0x90, 0x6d, 0x07, 0x21, 0x29, 0xba,
|
|
0xe0, 0x1f, 0x07, 0x19, 0x47, 0x99, 0x7e, 0x8e, 0xf7, 0x60, 0xd2, 0xd9,
|
|
0xea, 0x21, 0xd0, 0x8a, 0x5e, 0xb7, 0xe8, 0x93, 0x90, 0xb2, 0x1a, 0x85,
|
|
0x66, 0x47, 0x13, 0xc5, 0x49, 0xe2, 0x5f, 0xed, 0xa6, 0xe9, 0xe6, 0xc3,
|
|
0x19, 0x70, 0x86, 0x6b, 0xdf, 0xbc, 0x8f, 0xa9, 0x81, 0xf6};
|
|
|
|
static const std::vector<uint8_t> kPubKey1{
|
|
0x30, 0x82, 0x01, 0xb6, 0x30, 0x82, 0x01, 0x2b, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x01, 0x1e, 0x02, 0x81, 0x81,
|
|
0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73,
|
|
0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8,
|
|
0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07,
|
|
0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17,
|
|
0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d,
|
|
0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8,
|
|
0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6,
|
|
0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a,
|
|
0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62,
|
|
0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d,
|
|
0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00,
|
|
0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x81, 0x80, 0x08,
|
|
0x35, 0xaa, 0x8c, 0x35, 0x8b, 0xbf, 0x01, 0xa1, 0x84, 0x6d, 0x12, 0x06,
|
|
0x32, 0x3f, 0xab, 0xe4, 0x08, 0xb0, 0xe9, 0x87, 0x89, 0xfc, 0xc6, 0x23,
|
|
0x9d, 0xa1, 0x4d, 0x4b, 0x3f, 0x86, 0xc2, 0x76, 0xa8, 0xf4, 0x8a, 0xa8,
|
|
0x5a, 0x59, 0x50, 0x7e, 0x62, 0x0a, 0xd1, 0xbc, 0x74, 0x5f, 0x0f, 0x1c,
|
|
0xbf, 0x63, 0xec, 0x98, 0xc2, 0x29, 0xc2, 0x61, 0x0d, 0x77, 0xc6, 0x34,
|
|
0xd1, 0x64, 0x2e, 0x40, 0x43, 0x54, 0x77, 0x16, 0x55, 0xb2, 0xd5, 0x66,
|
|
0x2f, 0x7a, 0x45, 0x22, 0x71, 0x78, 0xce, 0x34, 0x30, 0xaf, 0x0f, 0x6b,
|
|
0x3b, 0xb9, 0x4b, 0x52, 0xf7, 0xf5, 0x1e, 0x97, 0xba, 0xd6, 0x59, 0xb1,
|
|
0xba, 0x06, 0x84, 0xe2, 0x08, 0xbe, 0x62, 0x4c, 0x28, 0xd8, 0x2f, 0xb1,
|
|
0x16, 0x2f, 0x18, 0xdd, 0x9d, 0xce, 0x45, 0x21, 0x64, 0x61, 0x65, 0x4c,
|
|
0xf3, 0x37, 0x46, 0x24, 0xd1, 0x5a, 0x8d, 0x03, 0x81, 0x84, 0x00, 0x02,
|
|
0x81, 0x80, 0x71, 0x3e, 0x9f, 0x81, 0x08, 0xa6, 0xa7, 0x07, 0x54, 0x85,
|
|
0xa3, 0x7c, 0xe1, 0xa3, 0xb0, 0x40, 0xcc, 0xe5, 0x63, 0xa0, 0x44, 0x56,
|
|
0x14, 0xfe, 0x09, 0x9f, 0xb1, 0xbf, 0xfd, 0x68, 0xac, 0xb3, 0x6f, 0x9e,
|
|
0x04, 0xd8, 0xad, 0x17, 0xac, 0xe3, 0xc1, 0x36, 0xda, 0x66, 0xf7, 0x30,
|
|
0xeb, 0x7f, 0xf1, 0x89, 0x36, 0x42, 0x4f, 0xfa, 0x4e, 0x5a, 0xe5, 0xb1,
|
|
0xe7, 0xda, 0xc3, 0x75, 0xd8, 0xd1, 0x64, 0x69, 0x72, 0x54, 0xb8, 0xb7,
|
|
0xe8, 0x48, 0xf5, 0xe7, 0x9d, 0xa2, 0x5c, 0x79, 0xdf, 0x5c, 0x07, 0x27,
|
|
0xd5, 0xda, 0x34, 0x98, 0x40, 0x5c, 0xd0, 0xf4, 0xe4, 0x6d, 0x13, 0x6c,
|
|
0x35, 0x1d, 0x70, 0x3c, 0xc4, 0xbf, 0x0d, 0x3f, 0x4f, 0xbb, 0x16, 0x53,
|
|
0x92, 0x88, 0x86, 0x84, 0x96, 0x4a, 0x93, 0xad, 0x30, 0xfa, 0x17, 0x94,
|
|
0x88, 0xca, 0xd4, 0xa6, 0x65, 0x5d, 0xd4, 0xfa, 0x97, 0x54};
|
|
|
|
static const std::vector<uint8_t> kPubKey2{
|
|
0x30, 0x82, 0x01, 0xb4, 0x30, 0x82, 0x01, 0x2b, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x01, 0x1e, 0x02, 0x81, 0x81,
|
|
0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73,
|
|
0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8,
|
|
0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07,
|
|
0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17,
|
|
0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d,
|
|
0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8,
|
|
0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6,
|
|
0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a,
|
|
0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62,
|
|
0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d,
|
|
0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00,
|
|
0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x81, 0x80, 0x08,
|
|
0x35, 0xaa, 0x8c, 0x35, 0x8b, 0xbf, 0x01, 0xa1, 0x84, 0x6d, 0x12, 0x06,
|
|
0x32, 0x3f, 0xab, 0xe4, 0x08, 0xb0, 0xe9, 0x87, 0x89, 0xfc, 0xc6, 0x23,
|
|
0x9d, 0xa1, 0x4d, 0x4b, 0x3f, 0x86, 0xc2, 0x76, 0xa8, 0xf4, 0x8a, 0xa8,
|
|
0x5a, 0x59, 0x50, 0x7e, 0x62, 0x0a, 0xd1, 0xbc, 0x74, 0x5f, 0x0f, 0x1c,
|
|
0xbf, 0x63, 0xec, 0x98, 0xc2, 0x29, 0xc2, 0x61, 0x0d, 0x77, 0xc6, 0x34,
|
|
0xd1, 0x64, 0x2e, 0x40, 0x43, 0x54, 0x77, 0x16, 0x55, 0xb2, 0xd5, 0x66,
|
|
0x2f, 0x7a, 0x45, 0x22, 0x71, 0x78, 0xce, 0x34, 0x30, 0xaf, 0x0f, 0x6b,
|
|
0x3b, 0xb9, 0x4b, 0x52, 0xf7, 0xf5, 0x1e, 0x97, 0xba, 0xd6, 0x59, 0xb1,
|
|
0xba, 0x06, 0x84, 0xe2, 0x08, 0xbe, 0x62, 0x4c, 0x28, 0xd8, 0x2f, 0xb1,
|
|
0x16, 0x2f, 0x18, 0xdd, 0x9d, 0xce, 0x45, 0x21, 0x64, 0x61, 0x65, 0x4c,
|
|
0xf3, 0x37, 0x46, 0x24, 0xd1, 0x5a, 0x8d, 0x03, 0x81, 0x82, 0x00, 0x02,
|
|
0x7f, 0x61, 0xfe, 0x5b, 0x61, 0xf6, 0xd5, 0x55, 0xad, 0xa7, 0xdc, 0x0e,
|
|
0xba, 0xc3, 0x45, 0x9f, 0xcc, 0xd8, 0xdf, 0xba, 0xd1, 0x8b, 0xa9, 0x4d,
|
|
0xbe, 0xa5, 0x24, 0x37, 0xcd, 0x7f, 0xb4, 0x31, 0xdf, 0x40, 0x4d, 0x47,
|
|
0x38, 0xc5, 0x94, 0xe7, 0x20, 0xa6, 0xd7, 0x86, 0x27, 0x5a, 0xcd, 0x02,
|
|
0x25, 0x9c, 0xa6, 0x13, 0xa0, 0x8a, 0x2d, 0xe1, 0x18, 0xd0, 0x15, 0x0d,
|
|
0x2c, 0xca, 0xe6, 0x02, 0x10, 0x2a, 0xca, 0x0c, 0xd0, 0x36, 0x66, 0xa5,
|
|
0x3f, 0x67, 0xc0, 0xb9, 0x94, 0x3d, 0xf5, 0x04, 0x6c, 0x15, 0xba, 0xea,
|
|
0xf4, 0x96, 0xa9, 0xf0, 0x18, 0xb7, 0xc9, 0x39, 0xde, 0x15, 0x09, 0xde,
|
|
0x71, 0xce, 0x47, 0xdd, 0x6f, 0x44, 0xc5, 0x7f, 0x4e, 0x01, 0xe5, 0x69,
|
|
0xbe, 0x46, 0x93, 0x27, 0x73, 0x19, 0x0c, 0x15, 0x44, 0x70, 0xce, 0xfb,
|
|
0xd1, 0xf4, 0xaf, 0x82, 0xd2, 0x8e, 0x4b, 0x31};
|
|
|
|
static const std::vector<uint8_t> kPubKey3{
|
|
0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01,
|
|
0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed,
|
|
0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf,
|
|
0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7,
|
|
0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae,
|
|
0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4,
|
|
0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3,
|
|
0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9,
|
|
0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b,
|
|
0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad,
|
|
0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64,
|
|
0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34,
|
|
0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f,
|
|
0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7,
|
|
0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98,
|
|
0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33,
|
|
0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25,
|
|
0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1,
|
|
0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66,
|
|
0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87,
|
|
0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e,
|
|
0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76,
|
|
0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96,
|
|
0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69,
|
|
0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50,
|
|
0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a,
|
|
0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0,
|
|
0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37,
|
|
0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64,
|
|
0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76,
|
|
0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2,
|
|
0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c,
|
|
0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68,
|
|
0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27,
|
|
0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96,
|
|
0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87,
|
|
0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83,
|
|
0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5,
|
|
0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d,
|
|
0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29,
|
|
0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde,
|
|
0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf,
|
|
0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe,
|
|
0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3,
|
|
0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7,
|
|
0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01,
|
|
0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x1e, 0x77, 0xf8, 0x42, 0xb1, 0xae,
|
|
0x0f, 0xcd, 0x99, 0x29, 0xd3, 0x94, 0x16, 0x1d, 0x41, 0xe1, 0x46, 0x14,
|
|
0xff, 0x75, 0x07, 0xa9, 0xa3, 0x1f, 0x4a, 0x1f, 0x14, 0xd2, 0x2e, 0x2a,
|
|
0x62, 0x7a, 0x1f, 0x4e, 0x59, 0x66, 0x24, 0x88, 0x3f, 0x1a, 0x5b, 0x16,
|
|
0x8e, 0x94, 0x25, 0x14, 0x6f, 0x22, 0xd5, 0xf6, 0xee, 0x28, 0x75, 0x74,
|
|
0x14, 0x71, 0x4b, 0xb9, 0x94, 0xba, 0x11, 0x29, 0xf0, 0x15, 0xd6, 0xe0,
|
|
0x4a, 0x71, 0x7e, 0xdf, 0x9b, 0x53, 0x0a, 0x5d, 0x5c, 0xab, 0x94, 0xf1,
|
|
0x46, 0x31, 0xe8, 0xb4, 0xcf, 0x79, 0xae, 0xb3, 0x58, 0xcc, 0x74, 0x18,
|
|
0x45, 0x55, 0x38, 0x41, 0xe8, 0xac, 0x46, 0x16, 0x30, 0xe8, 0x04, 0xa6,
|
|
0x2f, 0x43, 0x67, 0x6b, 0xa6, 0x79, 0x4a, 0xf6, 0x68, 0x99, 0xc3, 0x77,
|
|
0xb8, 0x69, 0xea, 0x61, 0x2a, 0x7b, 0x9f, 0xe6, 0x61, 0x1a, 0xa9, 0x6b,
|
|
0xe5, 0x2e, 0xb8, 0xb6, 0x2c, 0x97, 0x91, 0x17, 0xbb, 0xbc, 0xca, 0x8a,
|
|
0x7e, 0xc1, 0xe1, 0xff, 0xab, 0x1c, 0x7d, 0xfc, 0xfc, 0x70, 0x48, 0x70,
|
|
0x0d, 0x3a, 0xe3, 0x85, 0x81, 0x36, 0xe8, 0x97, 0x70, 0x1d, 0x7c, 0x29,
|
|
0x21, 0xb5, 0xdf, 0xef, 0x1d, 0x1f, 0x89, 0x7f, 0x50, 0xd9, 0x6c, 0xa1,
|
|
0xb5, 0xc2, 0xed, 0xc5, 0x8c, 0xad, 0xa1, 0x89, 0x19, 0xe3, 0x56, 0x42,
|
|
0xf0, 0x80, 0x7e, 0xeb, 0xfa, 0x00, 0xc9, 0x9a, 0x32, 0xf4, 0xd0, 0x95,
|
|
0xc3, 0x18, 0x8f, 0x78, 0xed, 0x54, 0x71, 0x1b, 0xe0, 0x32, 0x5c, 0x4b,
|
|
0x53, 0x2a, 0xec, 0xcd, 0x65, 0x40, 0xa5, 0x67, 0xc3, 0x27, 0x22, 0x54,
|
|
0x40, 0xea, 0x15, 0x31, 0x9b, 0xde, 0x06, 0x51, 0x04, 0x79, 0xa1, 0x86,
|
|
0x17, 0x99, 0xe2, 0x5b, 0x57, 0xde, 0xcc, 0x73, 0xc0, 0x36, 0xd7, 0x5a,
|
|
0x07, 0x02, 0xbd, 0x37, 0x3c, 0xa2, 0x31, 0x34, 0x99, 0x31};
|
|
|
|
static const std::vector<uint8_t> kPubKey4{
|
|
0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01,
|
|
0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed,
|
|
0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf,
|
|
0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7,
|
|
0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae,
|
|
0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4,
|
|
0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3,
|
|
0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9,
|
|
0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b,
|
|
0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad,
|
|
0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64,
|
|
0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34,
|
|
0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f,
|
|
0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7,
|
|
0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98,
|
|
0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33,
|
|
0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25,
|
|
0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1,
|
|
0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66,
|
|
0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87,
|
|
0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e,
|
|
0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76,
|
|
0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96,
|
|
0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69,
|
|
0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50,
|
|
0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a,
|
|
0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0,
|
|
0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37,
|
|
0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64,
|
|
0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76,
|
|
0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2,
|
|
0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c,
|
|
0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68,
|
|
0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27,
|
|
0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96,
|
|
0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87,
|
|
0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83,
|
|
0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5,
|
|
0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d,
|
|
0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29,
|
|
0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde,
|
|
0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf,
|
|
0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe,
|
|
0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3,
|
|
0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7,
|
|
0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01,
|
|
0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x69, 0x78, 0xb6, 0x8d, 0x31, 0x33,
|
|
0x4e, 0xe5, 0xbc, 0x7b, 0x3e, 0x91, 0xab, 0x6c, 0x23, 0x36, 0xfa, 0xb4,
|
|
0x5c, 0x64, 0x83, 0x6b, 0xd9, 0x2c, 0xb5, 0x33, 0x7b, 0x73, 0x4d, 0xb9,
|
|
0xe8, 0xe4, 0x4f, 0x88, 0x9f, 0x88, 0x69, 0x82, 0x9f, 0x4f, 0xe1, 0x74,
|
|
0xdc, 0x93, 0x44, 0xc1, 0x64, 0xa0, 0xba, 0x5b, 0x01, 0x26, 0x25, 0x9b,
|
|
0xa8, 0xa4, 0x3f, 0x60, 0x75, 0x64, 0xfa, 0x4a, 0x1d, 0x0d, 0x49, 0x64,
|
|
0x5e, 0x1d, 0x58, 0x86, 0xa1, 0xfc, 0x48, 0x5e, 0x2f, 0xe9, 0x1e, 0x56,
|
|
0xea, 0xe3, 0x30, 0xda, 0x05, 0xe1, 0x7b, 0x0b, 0x3d, 0x01, 0x8c, 0x29,
|
|
0x02, 0x85, 0xb2, 0x49, 0xbc, 0x40, 0x9e, 0x7a, 0xf5, 0x43, 0x00, 0xfc,
|
|
0x7c, 0x3e, 0xb3, 0x49, 0x11, 0x45, 0x7e, 0x23, 0x71, 0x93, 0x1a, 0xd9,
|
|
0x30, 0x2e, 0x84, 0x50, 0xcd, 0x95, 0xdf, 0x3d, 0x56, 0x1e, 0xa0, 0xad,
|
|
0x94, 0xd0, 0xa2, 0xea, 0xbc, 0xaf, 0xe0, 0xdd, 0x67, 0x28, 0xfb, 0x28,
|
|
0x00, 0x29, 0xb5, 0x56, 0xd9, 0xf4, 0xfa, 0x7c, 0x0f, 0x46, 0xa7, 0x80,
|
|
0x43, 0x29, 0x93, 0x67, 0x08, 0xe9, 0x7e, 0x11, 0xfc, 0x22, 0xb2, 0xa5,
|
|
0x07, 0x61, 0xa8, 0x90, 0xc6, 0x5b, 0x5f, 0xea, 0x2a, 0x1a, 0x41, 0x72,
|
|
0xf6, 0xbe, 0x9e, 0xaa, 0x60, 0xe7, 0x38, 0xcd, 0xf6, 0x0c, 0x01, 0x51,
|
|
0x42, 0xe2, 0xe5, 0x62, 0xbb, 0x62, 0xa1, 0x1e, 0x81, 0x0c, 0xcd, 0xf0,
|
|
0xbf, 0x63, 0x33, 0x07, 0x38, 0x2f, 0x2d, 0x9a, 0x97, 0x69, 0xb1, 0x15,
|
|
0xdf, 0xcd, 0xab, 0x4b, 0xac, 0xae, 0x73, 0xfe, 0xca, 0x28, 0x9d, 0xb2,
|
|
0x09, 0xdc, 0xe3, 0x4c, 0xbe, 0x12, 0x6e, 0x8c, 0x7f, 0x9d, 0x9e, 0x4f,
|
|
0x8f, 0x71, 0x13, 0x49, 0xa6, 0x08, 0xd5, 0x67, 0xb4, 0x8c, 0x05, 0x0e,
|
|
0x9d, 0xfb, 0x32, 0xbc, 0x18, 0x4e, 0xca, 0xa4, 0xf0, 0xf0};
|
|
|
|
static const std::vector<uint8_t> kPubKey5{
|
|
0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01,
|
|
0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed,
|
|
0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf,
|
|
0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7,
|
|
0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae,
|
|
0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4,
|
|
0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3,
|
|
0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9,
|
|
0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b,
|
|
0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad,
|
|
0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64,
|
|
0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34,
|
|
0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f,
|
|
0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7,
|
|
0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98,
|
|
0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33,
|
|
0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25,
|
|
0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1,
|
|
0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66,
|
|
0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87,
|
|
0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e,
|
|
0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76,
|
|
0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96,
|
|
0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69,
|
|
0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50,
|
|
0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a,
|
|
0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0,
|
|
0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37,
|
|
0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64,
|
|
0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76,
|
|
0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2,
|
|
0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c,
|
|
0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68,
|
|
0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27,
|
|
0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96,
|
|
0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87,
|
|
0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83,
|
|
0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5,
|
|
0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d,
|
|
0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29,
|
|
0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde,
|
|
0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf,
|
|
0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe,
|
|
0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3,
|
|
0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7,
|
|
0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01,
|
|
0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x2a, 0x64, 0x95, 0x3b, 0xde, 0x40,
|
|
0x78, 0x9f, 0x80, 0xed, 0x82, 0x27, 0x19, 0x22, 0x86, 0x11, 0x5b, 0x92,
|
|
0xd0, 0x9d, 0x5d, 0xe9, 0x69, 0x04, 0xe8, 0x03, 0xec, 0x4e, 0xcf, 0xbd,
|
|
0x73, 0xe0, 0xf0, 0x8e, 0x82, 0x91, 0x0f, 0xeb, 0xf1, 0x9f, 0xa3, 0xcd,
|
|
0xc5, 0x5f, 0xf2, 0x0e, 0xb9, 0x70, 0xd9, 0xc7, 0x12, 0xf4, 0x47, 0x85,
|
|
0xc0, 0xfd, 0x59, 0x2c, 0x17, 0xfb, 0x43, 0xf4, 0x62, 0x53, 0x57, 0xa4,
|
|
0xac, 0x8a, 0x1a, 0x62, 0x8f, 0x72, 0x04, 0x0a, 0xe5, 0x36, 0x08, 0x39,
|
|
0xc7, 0xc1, 0xf6, 0xb2, 0x14, 0xe7, 0xa1, 0x55, 0x30, 0xfe, 0x22, 0x88,
|
|
0x71, 0x39, 0xea, 0x0f, 0x05, 0xa9, 0xda, 0xf9, 0xd9, 0x5b, 0xd6, 0xb7,
|
|
0x46, 0x7a, 0xbf, 0x91, 0x07, 0xc9, 0xfb, 0xe3, 0x1e, 0x36, 0x33, 0x02,
|
|
0x76, 0xee, 0xcc, 0xce, 0x3d, 0x59, 0x63, 0x52, 0x06, 0xd6, 0x0c, 0xa2,
|
|
0x56, 0xf9, 0xaf, 0x60, 0x62, 0x76, 0x26, 0xb0, 0x59, 0x49, 0x84, 0xb5,
|
|
0xa0, 0x75, 0xc4, 0x2c, 0x42, 0x06, 0x7f, 0xa8, 0xc3, 0x30, 0xf2, 0x58,
|
|
0xbc, 0xf1, 0x45, 0xdf, 0x27, 0xa9, 0x7d, 0xa8, 0xee, 0x41, 0x9b, 0x54,
|
|
0xe3, 0xab, 0x29, 0x6c, 0x7c, 0xe9, 0xef, 0x6a, 0x01, 0x13, 0x38, 0x9b,
|
|
0x3c, 0xac, 0x78, 0x85, 0xb4, 0x4b, 0x37, 0x22, 0xd2, 0x7c, 0xad, 0x60,
|
|
0xe4, 0xe5, 0xa9, 0x24, 0xa1, 0xed, 0x03, 0x42, 0xce, 0xa9, 0xe9, 0x92,
|
|
0x56, 0xf6, 0xbc, 0x13, 0x08, 0xd4, 0xaf, 0x2c, 0x0a, 0xf9, 0x37, 0x9b,
|
|
0x1c, 0xf2, 0x11, 0x9c, 0xe1, 0x13, 0xc0, 0x85, 0x70, 0x5f, 0x55, 0x19,
|
|
0xcc, 0xc1, 0xba, 0x85, 0x62, 0xa2, 0x23, 0x61, 0x90, 0xd3, 0xf0, 0xc0,
|
|
0xa1, 0x0f, 0x01, 0x46, 0x6a, 0xd7, 0x9a, 0x48, 0x12, 0x7c, 0x28, 0x43,
|
|
0x3f, 0x6b, 0x34, 0xe2, 0x4a, 0x53, 0x9a, 0xf6, 0x0f, 0x3d};
|
|
|
|
static const std::vector<uint8_t> kPubKey6{
|
|
0x30, 0x82, 0x03, 0x43, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01,
|
|
0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed,
|
|
0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf,
|
|
0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7,
|
|
0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae,
|
|
0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4,
|
|
0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3,
|
|
0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9,
|
|
0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b,
|
|
0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad,
|
|
0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64,
|
|
0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34,
|
|
0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f,
|
|
0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7,
|
|
0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98,
|
|
0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33,
|
|
0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25,
|
|
0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1,
|
|
0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66,
|
|
0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87,
|
|
0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e,
|
|
0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76,
|
|
0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96,
|
|
0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69,
|
|
0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50,
|
|
0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a,
|
|
0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0,
|
|
0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37,
|
|
0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64,
|
|
0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76,
|
|
0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2,
|
|
0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c,
|
|
0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68,
|
|
0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27,
|
|
0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96,
|
|
0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87,
|
|
0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83,
|
|
0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5,
|
|
0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d,
|
|
0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29,
|
|
0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde,
|
|
0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf,
|
|
0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe,
|
|
0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3,
|
|
0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7,
|
|
0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01,
|
|
0x06, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00, 0x84, 0x81, 0x77, 0xb9, 0xbc,
|
|
0xff, 0x13, 0x6c, 0x52, 0xca, 0xef, 0x2a, 0x4a, 0x9b, 0xcb, 0x64, 0xdb,
|
|
0xef, 0xba, 0xc6, 0x9e, 0x18, 0xaa, 0xe4, 0x99, 0x69, 0x6b, 0x5e, 0xc7,
|
|
0xb2, 0x70, 0xe9, 0x04, 0x78, 0xb4, 0x13, 0xbb, 0x8a, 0xd8, 0xf8, 0xee,
|
|
0xe8, 0xad, 0x32, 0x10, 0x7d, 0x7b, 0xa4, 0x92, 0xc3, 0x6b, 0x00, 0x7f,
|
|
0x9e, 0xf3, 0x0e, 0xbe, 0x1e, 0xe4, 0x84, 0xd0, 0xea, 0x7c, 0xb0, 0xff,
|
|
0x4a, 0xfa, 0xa8, 0xc7, 0x05, 0xad, 0x5e, 0x16, 0x57, 0x69, 0x75, 0x41,
|
|
0x4f, 0x1b, 0xc0, 0xef, 0xed, 0x25, 0xc2, 0x19, 0x0a, 0x3e, 0xd0, 0x06,
|
|
0x8b, 0xff, 0xa1, 0xf0, 0x3b, 0xf6, 0xf2, 0x10, 0x56, 0xc9, 0xbb, 0x38,
|
|
0x33, 0x50, 0x85, 0x19, 0x97, 0xcb, 0xc8, 0x9c, 0xf8, 0x72, 0x9b, 0x39,
|
|
0x45, 0x27, 0xf0, 0x8a, 0xb9, 0x3c, 0xe9, 0xb3, 0x60, 0xaa, 0x05, 0x5a,
|
|
0x47, 0x17, 0x7e, 0x82, 0xa4, 0xce, 0x6f, 0xe7, 0x6c, 0x8d, 0xff, 0xdd,
|
|
0xbd, 0x6e, 0xe2, 0x0f, 0xa0, 0x8d, 0x00, 0x85, 0xd3, 0x98, 0x3e, 0xdd,
|
|
0x2c, 0x8d, 0x9a, 0x36, 0x6a, 0xd2, 0x24, 0x5b, 0x4e, 0xd2, 0x8d, 0x67,
|
|
0x54, 0x76, 0x9f, 0x5f, 0x3a, 0x79, 0x8b, 0xe4, 0xbe, 0x19, 0xcf, 0x46,
|
|
0x93, 0x99, 0x86, 0x5d, 0x46, 0x4e, 0x3f, 0x64, 0x04, 0x38, 0xbc, 0xe0,
|
|
0x3c, 0x96, 0x2c, 0x23, 0x44, 0xd0, 0xd5, 0x50, 0x54, 0x2a, 0xed, 0x3d,
|
|
0xb5, 0x5c, 0x15, 0x38, 0x33, 0xbe, 0xa4, 0x4b, 0x41, 0x46, 0x87, 0x8b,
|
|
0xa3, 0x47, 0xc8, 0x61, 0x44, 0x36, 0xc6, 0xaa, 0xc4, 0xfd, 0x1a, 0x60,
|
|
0xf2, 0x5c, 0x62, 0xb3, 0xf8, 0x69, 0xa7, 0xd5, 0x5c, 0xab, 0x4b, 0x71,
|
|
0x22, 0xd5, 0xe9, 0xaf, 0x43, 0x22, 0xa3, 0xfc, 0x82, 0x14, 0xfa, 0x55,
|
|
0xdc, 0x1e, 0xe0, 0x21, 0x45, 0x9f, 0xb2, 0xc4, 0x59, 0x58, 0x27};
|
|
|
|
static const std::vector<uint8_t> kPubKey7{
|
|
0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86,
|
|
0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01,
|
|
0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed,
|
|
0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf,
|
|
0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7,
|
|
0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae,
|
|
0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4,
|
|
0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3,
|
|
0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9,
|
|
0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b,
|
|
0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad,
|
|
0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64,
|
|
0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34,
|
|
0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f,
|
|
0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7,
|
|
0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98,
|
|
0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33,
|
|
0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25,
|
|
0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1,
|
|
0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66,
|
|
0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87,
|
|
0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e,
|
|
0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76,
|
|
0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96,
|
|
0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69,
|
|
0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50,
|
|
0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a,
|
|
0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0,
|
|
0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37,
|
|
0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64,
|
|
0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76,
|
|
0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2,
|
|
0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c,
|
|
0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68,
|
|
0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27,
|
|
0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96,
|
|
0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87,
|
|
0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83,
|
|
0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5,
|
|
0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d,
|
|
0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29,
|
|
0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde,
|
|
0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf,
|
|
0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe,
|
|
0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3,
|
|
0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7,
|
|
0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01,
|
|
0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x62, 0x93, 0x74, 0x92, 0x95, 0x37,
|
|
0xe2, 0xc3, 0xb0, 0x9f, 0x30, 0xd8, 0x81, 0x55, 0x4c, 0xa7, 0x35, 0x7f,
|
|
0x89, 0xe2, 0x51, 0x05, 0x47, 0x4d, 0xbb, 0xce, 0x06, 0xe4, 0x00, 0x1e,
|
|
0xfd, 0x61, 0x48, 0x1a, 0x45, 0x7a, 0xa0, 0xd7, 0xd7, 0xe5, 0x65, 0xe9,
|
|
0x0b, 0x7a, 0x3d, 0x9c, 0x68, 0x80, 0x05, 0xfb, 0x40, 0x4b, 0xf3, 0xb6,
|
|
0xd3, 0xe6, 0x1e, 0x40, 0x23, 0x00, 0xbe, 0xee, 0x7c, 0x58, 0xce, 0xea,
|
|
0xf0, 0x0b, 0x11, 0x2d, 0xdf, 0xee, 0xf3, 0xcb, 0xc2, 0x02, 0x0b, 0xa2,
|
|
0x20, 0x6d, 0xd4, 0xef, 0x05, 0x63, 0xd7, 0xfa, 0x52, 0xc3, 0x21, 0xb4,
|
|
0xee, 0x62, 0x80, 0xeb, 0x85, 0x85, 0x04, 0x1d, 0x03, 0xca, 0xdb, 0x92,
|
|
0x44, 0xdf, 0xf2, 0x1d, 0xc9, 0x04, 0x17, 0xbb, 0xe6, 0xf0, 0x6b, 0x91,
|
|
0xc2, 0xca, 0x64, 0x84, 0x43, 0x7c, 0x38, 0x46, 0x92, 0x6b, 0x18, 0xee,
|
|
0x22, 0x27, 0x50, 0x81, 0xb6, 0x07, 0x26, 0xe7, 0xa2, 0x6a, 0x29, 0xa9,
|
|
0x47, 0xea, 0xbd, 0x03, 0x5e, 0xde, 0x83, 0xd6, 0x59, 0x27, 0xb3, 0xce,
|
|
0xb0, 0xd4, 0xd8, 0xc2, 0xf3, 0x4e, 0x94, 0xa3, 0xde, 0x0f, 0x57, 0xe4,
|
|
0xea, 0x99, 0xaf, 0x05, 0x96, 0x57, 0x52, 0x9f, 0x69, 0x54, 0xb1, 0xac,
|
|
0x9b, 0xb4, 0x48, 0x4c, 0xa7, 0x6b, 0x40, 0x83, 0xe1, 0xcf, 0x42, 0x64,
|
|
0xef, 0xf0, 0x28, 0x66, 0x21, 0x37, 0x76, 0x1e, 0x4d, 0x7f, 0x35, 0xb1,
|
|
0xed, 0xa3, 0xcf, 0x51, 0x68, 0x56, 0xf2, 0x55, 0x53, 0x84, 0x0e, 0x43,
|
|
0xae, 0x38, 0x37, 0x9d, 0x23, 0x4b, 0x06, 0xc8, 0x91, 0x82, 0x21, 0x32,
|
|
0x08, 0x1d, 0x19, 0xf0, 0xd5, 0xdb, 0x9f, 0x23, 0xb4, 0xbb, 0xd5, 0xf5,
|
|
0x66, 0x7d, 0xd7, 0x8f, 0x3d, 0xd7, 0xf1, 0xfe, 0x5f, 0x25, 0xca, 0x48,
|
|
0x51, 0x5f, 0x63, 0x35, 0xce, 0x1c, 0x9f, 0xd0, 0xa6, 0x4b};
|
|
|
|
const DsaTestVector kDsaWycheproofVectors[] = {
|
|
|
|
// Comment: Legacy:ASN encoding of r misses leading 0
|
|
// tcID: 1
|
|
{SEC_OID_SHA1,
|
|
1,
|
|
{0x30, 0x2c, 0x02, 0x14, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1,
|
|
0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1,
|
|
0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
true},
|
|
|
|
// Comment: valid
|
|
// tcID: 2
|
|
{SEC_OID_SHA1,
|
|
2,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
true},
|
|
|
|
// Comment: long form encoding of length of sequence
|
|
// tcID: 3
|
|
{SEC_OID_SHA1,
|
|
3,
|
|
{0x30, 0x81, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38,
|
|
0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35,
|
|
0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of sequence contains leading 0
|
|
// tcID: 4
|
|
{SEC_OID_SHA1,
|
|
4,
|
|
{0x30, 0x82, 0x00, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25,
|
|
0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: wrong length of sequence
|
|
// tcID: 5
|
|
{SEC_OID_SHA1,
|
|
5,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: wrong length of sequence
|
|
// tcID: 6
|
|
{SEC_OID_SHA1,
|
|
6,
|
|
{0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of sequence
|
|
// tcID: 7
|
|
{SEC_OID_SHA1,
|
|
7,
|
|
{0x30, 0x85, 0x01, 0x00, 0x00, 0x00, 0x2d, 0x02, 0x15, 0x00, 0xaa,
|
|
0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d,
|
|
0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of sequence
|
|
// tcID: 8
|
|
{SEC_OID_SHA1,
|
|
8,
|
|
{0x30, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x02,
|
|
0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14,
|
|
0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14,
|
|
0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**31 - 1
|
|
// tcID: 9
|
|
{SEC_OID_SHA1,
|
|
9,
|
|
{0x30, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x02, 0x15, 0x00, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**32 - 1
|
|
// tcID: 10
|
|
{SEC_OID_SHA1,
|
|
10,
|
|
{0x30, 0x84, 0xff, 0xff, 0xff, 0xff, 0x02, 0x15, 0x00, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**40 - 1
|
|
// tcID: 11
|
|
{SEC_OID_SHA1,
|
|
11,
|
|
{0x30, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x15, 0x00, 0xaa,
|
|
0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d,
|
|
0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**64 - 1
|
|
// tcID: 12
|
|
{SEC_OID_SHA1,
|
|
12,
|
|
{0x30, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02,
|
|
0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56,
|
|
0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: incorrect length of sequence
|
|
// tcID: 13
|
|
{SEC_OID_SHA1,
|
|
13,
|
|
{0x30, 0xff, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 14
|
|
{SEC_OID_SHA1,
|
|
14,
|
|
{0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 15
|
|
{SEC_OID_SHA1,
|
|
15,
|
|
{0x30, 0x2d, 0x02, 0x80, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 16
|
|
{SEC_OID_SHA1,
|
|
16,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x80, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: removing sequence
|
|
// tcID: 17
|
|
{SEC_OID_SHA1,
|
|
17,
|
|
{},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: lonely sequence tag
|
|
// tcID: 18
|
|
{SEC_OID_SHA1,
|
|
18,
|
|
{0x30},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending 0's to sequence
|
|
// tcID: 19
|
|
{SEC_OID_SHA1,
|
|
19,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: prepending 0's to sequence
|
|
// tcID: 20
|
|
{SEC_OID_SHA1,
|
|
20,
|
|
{0x30, 0x2f, 0x00, 0x00, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25,
|
|
0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending unused 0's to sequence
|
|
// tcID: 21
|
|
{SEC_OID_SHA1,
|
|
21,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending null value to sequence
|
|
// tcID: 22
|
|
{SEC_OID_SHA1,
|
|
22,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x05, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 23
|
|
{SEC_OID_SHA1,
|
|
23,
|
|
{0x30, 0x32, 0x49, 0x81, 0x77, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa,
|
|
0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d,
|
|
0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 24
|
|
{SEC_OID_SHA1,
|
|
24,
|
|
{0x30, 0x31, 0x25, 0x00, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 25
|
|
{SEC_OID_SHA1,
|
|
25,
|
|
{0x30, 0x2f, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20,
|
|
0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3,
|
|
0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 26
|
|
{SEC_OID_SHA1,
|
|
26,
|
|
{0x30, 0x32, 0x22, 0x1a, 0x49, 0x81, 0x77, 0x02, 0x15, 0x00, 0xaa,
|
|
0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d,
|
|
0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 27
|
|
{SEC_OID_SHA1,
|
|
27,
|
|
{0x30, 0x31, 0x22, 0x19, 0x25, 0x00, 0x02, 0x15, 0x00, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 28
|
|
{SEC_OID_SHA1,
|
|
28,
|
|
{0x30, 0x35, 0x22, 0x17, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 29
|
|
{SEC_OID_SHA1,
|
|
29,
|
|
{0x30, 0x32, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x19, 0x49, 0x81, 0x77, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 30
|
|
{SEC_OID_SHA1,
|
|
30,
|
|
{0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x18, 0x25, 0x00, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 31
|
|
{SEC_OID_SHA1,
|
|
31,
|
|
{0x30, 0x35, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x16, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20,
|
|
0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3,
|
|
0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 32
|
|
{SEC_OID_SHA1,
|
|
32,
|
|
{0x30, 0x35, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x30, 0x2d, 0x02,
|
|
0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56,
|
|
0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 33
|
|
{SEC_OID_SHA1,
|
|
33,
|
|
{0x30, 0x33, 0xaa, 0x02, 0xaa, 0xbb, 0x30, 0x2d, 0x02, 0x15, 0x00,
|
|
0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67,
|
|
0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14,
|
|
0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 34
|
|
{SEC_OID_SHA1,
|
|
34,
|
|
{0x30, 0x35, 0x22, 0x1d, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02,
|
|
0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56,
|
|
0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 35
|
|
{SEC_OID_SHA1,
|
|
35,
|
|
{0x30, 0x33, 0x22, 0x1b, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x15, 0x00,
|
|
0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67,
|
|
0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14,
|
|
0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 36
|
|
{SEC_OID_SHA1,
|
|
36,
|
|
{0x30, 0x35, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x1c, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 37
|
|
{SEC_OID_SHA1,
|
|
37,
|
|
{0x30, 0x33, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x1a, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x14,
|
|
0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated length of sequence
|
|
// tcID: 38
|
|
{SEC_OID_SHA1,
|
|
38,
|
|
{0x30, 0x81},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 39
|
|
{SEC_OID_SHA1,
|
|
39,
|
|
{0x30, 0x80, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20,
|
|
0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3,
|
|
0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 40
|
|
{SEC_OID_SHA1,
|
|
40,
|
|
{0x30, 0x31, 0x22, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 41
|
|
{SEC_OID_SHA1,
|
|
41,
|
|
{0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x80, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20,
|
|
0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3,
|
|
0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 42
|
|
{SEC_OID_SHA1,
|
|
42,
|
|
{0x30, 0x80, 0x31, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20,
|
|
0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3,
|
|
0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 43
|
|
{SEC_OID_SHA1,
|
|
43,
|
|
{0x30, 0x31, 0x22, 0x80, 0x03, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 44
|
|
{SEC_OID_SHA1,
|
|
44,
|
|
{0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x80, 0x03, 0x14, 0x49, 0x6d, 0x52, 0x20,
|
|
0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3,
|
|
0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Replacing sequence with NULL
|
|
// tcID: 45
|
|
{SEC_OID_SHA1,
|
|
45,
|
|
{0x05, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 46
|
|
{SEC_OID_SHA1,
|
|
46,
|
|
{0x2e, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 47
|
|
{SEC_OID_SHA1,
|
|
47,
|
|
{0x2f, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 48
|
|
{SEC_OID_SHA1,
|
|
48,
|
|
{0x31, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 49
|
|
{SEC_OID_SHA1,
|
|
49,
|
|
{0x32, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 50
|
|
{SEC_OID_SHA1,
|
|
50,
|
|
{0xff, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: dropping value of sequence
|
|
// tcID: 51
|
|
{SEC_OID_SHA1,
|
|
51,
|
|
{0x30, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition for sequence
|
|
// tcID: 52
|
|
{SEC_OID_SHA1,
|
|
52,
|
|
{0x30, 0x31, 0x30, 0x01, 0x02, 0x30, 0x2c, 0x15, 0x00, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated sequence
|
|
// tcID: 53
|
|
{SEC_OID_SHA1,
|
|
53,
|
|
{0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated sequence
|
|
// tcID: 54
|
|
{SEC_OID_SHA1,
|
|
54,
|
|
{0x30, 0x2c, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1,
|
|
0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1,
|
|
0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length
|
|
// tcID: 55
|
|
{SEC_OID_SHA1,
|
|
55,
|
|
{0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length with truncated delimiter
|
|
// tcID: 56
|
|
{SEC_OID_SHA1,
|
|
56,
|
|
{0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length with additional element
|
|
// tcID: 57
|
|
{SEC_OID_SHA1,
|
|
57,
|
|
{0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6,
|
|
0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b,
|
|
0x96, 0x4c, 0x3b, 0x05, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length with truncated element
|
|
// tcID: 58
|
|
{SEC_OID_SHA1,
|
|
58,
|
|
{0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6,
|
|
0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b,
|
|
0x96, 0x4c, 0x3b, 0x06, 0x08, 0x11, 0x22, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length with garbage
|
|
// tcID: 59
|
|
{SEC_OID_SHA1,
|
|
59,
|
|
{0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6,
|
|
0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b,
|
|
0x96, 0x4c, 0x3b, 0x00, 0x00, 0xfe, 0x02, 0xbe, 0xef},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: indefinite length with nonempty EOC
|
|
// tcID: 60
|
|
{SEC_OID_SHA1,
|
|
60,
|
|
{0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6,
|
|
0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b,
|
|
0x96, 0x4c, 0x3b, 0x00, 0x02, 0xbe, 0xef},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: prepend empty sequence
|
|
// tcID: 61
|
|
{SEC_OID_SHA1,
|
|
61,
|
|
{0x30, 0x2f, 0x30, 0x00, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25,
|
|
0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: append empty sequence
|
|
// tcID: 62
|
|
{SEC_OID_SHA1,
|
|
62,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x30, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: append garbage with high tag number
|
|
// tcID: 63
|
|
{SEC_OID_SHA1,
|
|
63,
|
|
{0x30, 0x30, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0xbf, 0x7f, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: sequence of sequence
|
|
// tcID: 64
|
|
{SEC_OID_SHA1,
|
|
64,
|
|
{0x30, 0x2f, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25,
|
|
0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated sequence: removed last 1 elements
|
|
// tcID: 65
|
|
{SEC_OID_SHA1,
|
|
65,
|
|
{0x30, 0x17, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: repeating element in sequence
|
|
// tcID: 66
|
|
{SEC_OID_SHA1,
|
|
66,
|
|
{0x30, 0x43, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x02,
|
|
0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: long form encoding of length of integer
|
|
// tcID: 67
|
|
{SEC_OID_SHA1,
|
|
67,
|
|
{0x30, 0x2e, 0x02, 0x81, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38,
|
|
0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35,
|
|
0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: long form encoding of length of integer
|
|
// tcID: 68
|
|
{SEC_OID_SHA1,
|
|
68,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x81, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35,
|
|
0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer contains leading 0
|
|
// tcID: 69
|
|
{SEC_OID_SHA1,
|
|
69,
|
|
{0x30, 0x2f, 0x02, 0x82, 0x00, 0x15, 0x00, 0xaa, 0x6a, 0x25,
|
|
0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer contains leading 0
|
|
// tcID: 70
|
|
{SEC_OID_SHA1,
|
|
70,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x82, 0x00, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 71
|
|
{SEC_OID_SHA1,
|
|
71,
|
|
{0x30, 0x2d, 0x02, 0x16, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 72
|
|
{SEC_OID_SHA1,
|
|
72,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 73
|
|
{SEC_OID_SHA1,
|
|
73,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x15, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 74
|
|
{SEC_OID_SHA1,
|
|
74,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x13, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of integer
|
|
// tcID: 75
|
|
{SEC_OID_SHA1,
|
|
75,
|
|
{0x30, 0x32, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x15, 0x00, 0xaa,
|
|
0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d,
|
|
0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of integer
|
|
// tcID: 76
|
|
{SEC_OID_SHA1,
|
|
76,
|
|
{0x30, 0x32, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of integer
|
|
// tcID: 77
|
|
{SEC_OID_SHA1,
|
|
77,
|
|
{0x30, 0x36, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14,
|
|
0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14,
|
|
0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of integer
|
|
// tcID: 78
|
|
{SEC_OID_SHA1,
|
|
78,
|
|
{0x30, 0x36, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x14,
|
|
0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**31 - 1
|
|
// tcID: 79
|
|
{SEC_OID_SHA1,
|
|
79,
|
|
{0x30, 0x31, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x00, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**31 - 1
|
|
// tcID: 80
|
|
{SEC_OID_SHA1,
|
|
80,
|
|
{0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**32 - 1
|
|
// tcID: 81
|
|
{SEC_OID_SHA1,
|
|
81,
|
|
{0x30, 0x31, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x00, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**32 - 1
|
|
// tcID: 82
|
|
{SEC_OID_SHA1,
|
|
82,
|
|
{0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**40 - 1
|
|
// tcID: 83
|
|
{SEC_OID_SHA1,
|
|
83,
|
|
{0x30, 0x32, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0xaa,
|
|
0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d,
|
|
0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**40 - 1
|
|
// tcID: 84
|
|
{SEC_OID_SHA1,
|
|
84,
|
|
{0x30, 0x32, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**64 - 1
|
|
// tcID: 85
|
|
{SEC_OID_SHA1,
|
|
85,
|
|
{0x30, 0x35, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
0xff, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56,
|
|
0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**64 - 1
|
|
// tcID: 86
|
|
{SEC_OID_SHA1,
|
|
86,
|
|
{0x30, 0x35, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
0xff, 0xff, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: incorrect length of integer
|
|
// tcID: 87
|
|
{SEC_OID_SHA1,
|
|
87,
|
|
{0x30, 0x2d, 0x02, 0xff, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: incorrect length of integer
|
|
// tcID: 88
|
|
{SEC_OID_SHA1,
|
|
88,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0xff, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: removing integer
|
|
// tcID: 89
|
|
{SEC_OID_SHA1,
|
|
89,
|
|
{0x30, 0x16, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35,
|
|
0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: lonely integer tag
|
|
// tcID: 90
|
|
{SEC_OID_SHA1,
|
|
90,
|
|
{0x30, 0x17, 0x02, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20,
|
|
0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: lonely integer tag
|
|
// tcID: 91
|
|
{SEC_OID_SHA1,
|
|
91,
|
|
{0x30, 0x18, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending 0's to integer
|
|
// tcID: 92
|
|
{SEC_OID_SHA1,
|
|
92,
|
|
{0x30, 0x2f, 0x02, 0x17, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending 0's to integer
|
|
// tcID: 93
|
|
{SEC_OID_SHA1,
|
|
93,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x16, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: prepending 0's to integer
|
|
// tcID: 94
|
|
{SEC_OID_SHA1,
|
|
94,
|
|
{0x30, 0x2f, 0x02, 0x17, 0x00, 0x00, 0x00, 0xaa, 0x6a, 0x25,
|
|
0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: prepending 0's to integer
|
|
// tcID: 95
|
|
{SEC_OID_SHA1,
|
|
95,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x16, 0x00, 0x00, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending unused 0's to integer
|
|
// tcID: 96
|
|
{SEC_OID_SHA1,
|
|
96,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending null value to integer
|
|
// tcID: 97
|
|
{SEC_OID_SHA1,
|
|
97,
|
|
{0x30, 0x2f, 0x02, 0x17, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x05, 0x00, 0x02, 0x14, 0x49,
|
|
0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: appending null value to integer
|
|
// tcID: 98
|
|
{SEC_OID_SHA1,
|
|
98,
|
|
{0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x16, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x05, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated length of integer
|
|
// tcID: 99
|
|
{SEC_OID_SHA1,
|
|
99,
|
|
{0x30, 0x18, 0x02, 0x81, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated length of integer
|
|
// tcID: 100
|
|
{SEC_OID_SHA1,
|
|
100,
|
|
{0x30, 0x19, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x81},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Replacing integer with NULL
|
|
// tcID: 101
|
|
{SEC_OID_SHA1,
|
|
101,
|
|
{0x30, 0x18, 0x05, 0x00, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Replacing integer with NULL
|
|
// tcID: 102
|
|
{SEC_OID_SHA1,
|
|
102,
|
|
{0x30, 0x19, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x05, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 103
|
|
{SEC_OID_SHA1,
|
|
103,
|
|
{0x30, 0x2d, 0x00, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 104
|
|
{SEC_OID_SHA1,
|
|
104,
|
|
{0x30, 0x2d, 0x01, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 105
|
|
{SEC_OID_SHA1,
|
|
105,
|
|
{0x30, 0x2d, 0x03, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 106
|
|
{SEC_OID_SHA1,
|
|
106,
|
|
{0x30, 0x2d, 0x04, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 107
|
|
{SEC_OID_SHA1,
|
|
107,
|
|
{0x30, 0x2d, 0xff, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 108
|
|
{SEC_OID_SHA1,
|
|
108,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x00, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 109
|
|
{SEC_OID_SHA1,
|
|
109,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x01, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 110
|
|
{SEC_OID_SHA1,
|
|
110,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x03, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 111
|
|
{SEC_OID_SHA1,
|
|
111,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x04, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 112
|
|
{SEC_OID_SHA1,
|
|
112,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0xff, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: dropping value of integer
|
|
// tcID: 113
|
|
{SEC_OID_SHA1,
|
|
113,
|
|
{0x30, 0x18, 0x02, 0x00, 0x02, 0x14, 0x49, 0x6d, 0x52,
|
|
0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91,
|
|
0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: dropping value of integer
|
|
// tcID: 114
|
|
{SEC_OID_SHA1,
|
|
114,
|
|
{0x30, 0x19, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f,
|
|
0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition for integer
|
|
// tcID: 115
|
|
{SEC_OID_SHA1,
|
|
115,
|
|
{0x30, 0x31, 0x22, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0xaa, 0x6a,
|
|
0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37,
|
|
0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: using composition for integer
|
|
// tcID: 116
|
|
{SEC_OID_SHA1,
|
|
116,
|
|
{0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e,
|
|
0x38, 0xdb, 0x4a, 0x22, 0x18, 0x02, 0x01, 0x49, 0x02, 0x13, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20,
|
|
0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: modify first byte of integer
|
|
// tcID: 117
|
|
{SEC_OID_SHA1,
|
|
117,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x02, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: modify first byte of integer
|
|
// tcID: 118
|
|
{SEC_OID_SHA1,
|
|
118,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x4b, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: modify last byte of integer
|
|
// tcID: 119
|
|
{SEC_OID_SHA1,
|
|
119,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0xca, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: modify last byte of integer
|
|
// tcID: 120
|
|
{SEC_OID_SHA1,
|
|
120,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0xbb},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 121
|
|
{SEC_OID_SHA1,
|
|
121,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1,
|
|
0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 122
|
|
{SEC_OID_SHA1,
|
|
122,
|
|
{0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x13, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 123
|
|
{SEC_OID_SHA1,
|
|
123,
|
|
{0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x13, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1,
|
|
0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: leading ff in integer
|
|
// tcID: 124
|
|
{SEC_OID_SHA1,
|
|
124,
|
|
{0x30, 0x2e, 0x02, 0x16, 0xff, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d,
|
|
0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38,
|
|
0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35,
|
|
0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: leading ff in integer
|
|
// tcID: 125
|
|
{SEC_OID_SHA1,
|
|
125,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x15, 0xff, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35,
|
|
0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: replaced integer by infinity
|
|
// tcID: 126
|
|
{SEC_OID_SHA1,
|
|
126,
|
|
{0x30, 0x19, 0x09, 0x01, 0x80, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: replaced integer by infinity
|
|
// tcID: 127
|
|
{SEC_OID_SHA1,
|
|
127,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x09, 0x01, 0x80},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: replacing integer with zero
|
|
// tcID: 128
|
|
{SEC_OID_SHA1,
|
|
128,
|
|
{0x30, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0x49, 0x6d,
|
|
0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9,
|
|
0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: replacing integer with zero
|
|
// tcID: 129
|
|
{SEC_OID_SHA1,
|
|
129,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf,
|
|
0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8,
|
|
0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 130
|
|
{SEC_OID_SHA1,
|
|
130,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x01, 0x63, 0x75, 0x5e, 0x49, 0xc9, 0xce, 0x35,
|
|
0x20, 0x1c, 0x9d, 0xf4, 0xac, 0xd2, 0xe5, 0xfd, 0x48, 0x86, 0x2d, 0x64,
|
|
0xfb, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 131
|
|
{SEC_OID_SHA1,
|
|
131,
|
|
{0x30, 0x2c, 0x02, 0x14, 0xf1, 0x5e, 0xec, 0xd5, 0xb5, 0x2c, 0xec, 0xa2,
|
|
0x8f, 0x8a, 0xda, 0x2d, 0x9c, 0x15, 0xf4, 0x19, 0x96, 0x44, 0x51, 0x99,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1,
|
|
0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 132
|
|
{SEC_OID_SHA1,
|
|
132,
|
|
{0x30, 0x2d, 0x02, 0x15, 0xff, 0x55, 0x95, 0xda, 0x70, 0x40, 0x82, 0x6f,
|
|
0x1e, 0xa9, 0xeb, 0x98, 0x92, 0xc8, 0x82, 0x07, 0x4e, 0xf1, 0xc7, 0x24,
|
|
0xb6, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 133
|
|
{SEC_OID_SHA1,
|
|
133,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x0e, 0xa1, 0x13, 0x2a, 0x4a, 0xd3, 0x13, 0x5d,
|
|
0x70, 0x75, 0x25, 0xd2, 0x63, 0xea, 0x0b, 0xe6, 0x69, 0xbb, 0xae, 0x67,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1,
|
|
0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 134
|
|
{SEC_OID_SHA1,
|
|
134,
|
|
{0x30, 0x2d, 0x02, 0x15, 0xfe, 0x9c, 0x8a, 0xa1, 0xb6, 0x36, 0x31, 0xca,
|
|
0xdf, 0xe3, 0x62, 0x0b, 0x53, 0x2d, 0x1a, 0x02, 0xb7, 0x79, 0xd2, 0x9b,
|
|
0x05, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 135
|
|
{SEC_OID_SHA1,
|
|
135,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x01, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32,
|
|
0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 136
|
|
{SEC_OID_SHA1,
|
|
136,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x55, 0x95, 0xda, 0x70, 0x40, 0x82, 0x6f, 0x1e,
|
|
0xa9, 0xeb, 0x98, 0x92, 0xc8, 0x82, 0x07, 0x4e, 0xf1, 0xc7, 0x24, 0xb6,
|
|
0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1,
|
|
0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 137
|
|
{SEC_OID_SHA1,
|
|
137,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x15, 0x01, 0x02, 0x78, 0x8a, 0xda, 0xc0, 0x47, 0x21, 0x73,
|
|
0xf9, 0x5b, 0x86, 0xd0, 0xbb, 0xa3, 0xc7, 0xe9, 0xb3, 0x8a, 0xd5, 0xec},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 138
|
|
{SEC_OID_SHA1,
|
|
138,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x90, 0x62, 0x19, 0x66, 0xab, 0xa5, 0xd8, 0xf6, 0x6c,
|
|
0x48, 0x6c, 0x51, 0x84, 0xd3, 0xbe, 0xba, 0xc3, 0xa1, 0xc2, 0x8a},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 139
|
|
{SEC_OID_SHA1,
|
|
139,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0xb6, 0x92, 0xad, 0xdf, 0x4a, 0x09, 0x82, 0xca, 0xcd,
|
|
0x2e, 0x06, 0x6e, 0xdf, 0xc4, 0x3c, 0xad, 0xc4, 0x69, 0xb3, 0xc5},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 140
|
|
{SEC_OID_SHA1,
|
|
140,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x14, 0x6f, 0x9d, 0xe6, 0x99, 0x54, 0x5a, 0x27, 0x09, 0x93,
|
|
0xb7, 0x93, 0xae, 0x7b, 0x2c, 0x41, 0x45, 0x3c, 0x5e, 0x3d, 0x76},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 141
|
|
{SEC_OID_SHA1,
|
|
141,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x15, 0xfe, 0xfd, 0x87, 0x75, 0x25, 0x3f, 0xb8, 0xde, 0x8c,
|
|
0x06, 0xa4, 0x79, 0x2f, 0x44, 0x5c, 0x38, 0x16, 0x4c, 0x75, 0x2a, 0x14},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 142
|
|
{SEC_OID_SHA1,
|
|
142,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x15, 0x01, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35,
|
|
0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 143
|
|
{SEC_OID_SHA1,
|
|
143,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90,
|
|
0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb,
|
|
0x4a, 0x02, 0x15, 0x00, 0xb6, 0x92, 0xad, 0xdf, 0x4a, 0x09, 0x82, 0xca,
|
|
0xcd, 0x2e, 0x06, 0x6e, 0xdf, 0xc4, 0x3c, 0xad, 0xc4, 0x69, 0xb3, 0xc5},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 144
|
|
{SEC_OID_SHA1,
|
|
144,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0xff, 0x46, 0xf4,
|
|
0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0,
|
|
0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 145
|
|
{SEC_OID_SHA1,
|
|
145,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 146
|
|
{SEC_OID_SHA1,
|
|
146,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 147
|
|
{SEC_OID_SHA1,
|
|
147,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 148
|
|
{SEC_OID_SHA1,
|
|
148,
|
|
{0x30, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0x5c, 0x85,
|
|
0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 149
|
|
{SEC_OID_SHA1,
|
|
149,
|
|
{0x30, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0x5c, 0x85,
|
|
0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 150
|
|
{SEC_OID_SHA1,
|
|
150,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 151
|
|
{SEC_OID_SHA1,
|
|
151,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 152
|
|
{SEC_OID_SHA1,
|
|
152,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 153
|
|
{SEC_OID_SHA1,
|
|
153,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x01, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 154
|
|
{SEC_OID_SHA1,
|
|
154,
|
|
{0x30, 0x81, 0x87, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c,
|
|
0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05,
|
|
0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06,
|
|
0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb,
|
|
0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e,
|
|
0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99,
|
|
0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d,
|
|
0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f,
|
|
0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d,
|
|
0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11,
|
|
0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd,
|
|
0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 155
|
|
{SEC_OID_SHA1,
|
|
155,
|
|
{0x30, 0x08, 0x02, 0x01, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 156
|
|
{SEC_OID_SHA1,
|
|
156,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 157
|
|
{SEC_OID_SHA1,
|
|
157,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0xff, 0x46, 0xf4,
|
|
0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0,
|
|
0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 158
|
|
{SEC_OID_SHA1,
|
|
158,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 159
|
|
{SEC_OID_SHA1,
|
|
159,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 160
|
|
{SEC_OID_SHA1,
|
|
160,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 161
|
|
{SEC_OID_SHA1,
|
|
161,
|
|
{0x30, 0x19, 0x02, 0x01, 0x01, 0x02, 0x14, 0x5c, 0x85,
|
|
0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 162
|
|
{SEC_OID_SHA1,
|
|
162,
|
|
{0x30, 0x19, 0x02, 0x01, 0x01, 0x02, 0x14, 0x5c, 0x85,
|
|
0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 163
|
|
{SEC_OID_SHA1,
|
|
163,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 164
|
|
{SEC_OID_SHA1,
|
|
164,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 165
|
|
{SEC_OID_SHA1,
|
|
165,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 166
|
|
{SEC_OID_SHA1,
|
|
166,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x01, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 167
|
|
{SEC_OID_SHA1,
|
|
167,
|
|
{0x30, 0x81, 0x87, 0x02, 0x01, 0x01, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c,
|
|
0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05,
|
|
0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06,
|
|
0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb,
|
|
0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e,
|
|
0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99,
|
|
0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d,
|
|
0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f,
|
|
0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d,
|
|
0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11,
|
|
0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd,
|
|
0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 168
|
|
{SEC_OID_SHA1,
|
|
168,
|
|
{0x30, 0x08, 0x02, 0x01, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 169
|
|
{SEC_OID_SHA1,
|
|
169,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 170
|
|
{SEC_OID_SHA1,
|
|
170,
|
|
{0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0xff, 0x46, 0xf4,
|
|
0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0,
|
|
0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 171
|
|
{SEC_OID_SHA1,
|
|
171,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 172
|
|
{SEC_OID_SHA1,
|
|
172,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 173
|
|
{SEC_OID_SHA1,
|
|
173,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 174
|
|
{SEC_OID_SHA1,
|
|
174,
|
|
{0x30, 0x19, 0x02, 0x01, 0xff, 0x02, 0x14, 0x5c, 0x85,
|
|
0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 175
|
|
{SEC_OID_SHA1,
|
|
175,
|
|
{0x30, 0x19, 0x02, 0x01, 0xff, 0x02, 0x14, 0x5c, 0x85,
|
|
0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 176
|
|
{SEC_OID_SHA1,
|
|
176,
|
|
{0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 177
|
|
{SEC_OID_SHA1,
|
|
177,
|
|
{0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 178
|
|
{SEC_OID_SHA1,
|
|
178,
|
|
{0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 179
|
|
{SEC_OID_SHA1,
|
|
179,
|
|
{0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x01, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 180
|
|
{SEC_OID_SHA1,
|
|
180,
|
|
{0x30, 0x81, 0x87, 0x02, 0x01, 0xff, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c,
|
|
0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05,
|
|
0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06,
|
|
0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb,
|
|
0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e,
|
|
0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99,
|
|
0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d,
|
|
0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f,
|
|
0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d,
|
|
0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11,
|
|
0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd,
|
|
0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 181
|
|
{SEC_OID_SHA1,
|
|
181,
|
|
{0x30, 0x08, 0x02, 0x01, 0xff, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 182
|
|
{SEC_OID_SHA1,
|
|
182,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 183
|
|
{SEC_OID_SHA1,
|
|
183,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8,
|
|
0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39,
|
|
0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 184
|
|
{SEC_OID_SHA1,
|
|
184,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 185
|
|
{SEC_OID_SHA1,
|
|
185,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 186
|
|
{SEC_OID_SHA1,
|
|
186,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 187
|
|
{SEC_OID_SHA1,
|
|
187,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8,
|
|
0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44,
|
|
0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 188
|
|
{SEC_OID_SHA1,
|
|
188,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8,
|
|
0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44,
|
|
0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 189
|
|
{SEC_OID_SHA1,
|
|
189,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8,
|
|
0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6,
|
|
0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 190
|
|
{SEC_OID_SHA1,
|
|
190,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8,
|
|
0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6,
|
|
0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 191
|
|
{SEC_OID_SHA1,
|
|
191,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8,
|
|
0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6,
|
|
0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 192
|
|
{SEC_OID_SHA1,
|
|
192,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8,
|
|
0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 193
|
|
{SEC_OID_SHA1,
|
|
193,
|
|
{0x30, 0x81, 0x9a, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52,
|
|
0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44,
|
|
0xd8, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94,
|
|
0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56,
|
|
0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6,
|
|
0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc,
|
|
0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa,
|
|
0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8,
|
|
0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50,
|
|
0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1,
|
|
0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54,
|
|
0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e,
|
|
0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75,
|
|
0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 194
|
|
{SEC_OID_SHA1,
|
|
194,
|
|
{0x30, 0x1b, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28,
|
|
0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b,
|
|
0xbb, 0xfa, 0x44, 0xd8, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 195
|
|
{SEC_OID_SHA1,
|
|
195,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 196
|
|
{SEC_OID_SHA1,
|
|
196,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9,
|
|
0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39,
|
|
0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 197
|
|
{SEC_OID_SHA1,
|
|
197,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 198
|
|
{SEC_OID_SHA1,
|
|
198,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 199
|
|
{SEC_OID_SHA1,
|
|
199,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 200
|
|
{SEC_OID_SHA1,
|
|
200,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9,
|
|
0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44,
|
|
0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 201
|
|
{SEC_OID_SHA1,
|
|
201,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9,
|
|
0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44,
|
|
0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 202
|
|
{SEC_OID_SHA1,
|
|
202,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9,
|
|
0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6,
|
|
0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 203
|
|
{SEC_OID_SHA1,
|
|
203,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9,
|
|
0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6,
|
|
0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 204
|
|
{SEC_OID_SHA1,
|
|
204,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9,
|
|
0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6,
|
|
0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 205
|
|
{SEC_OID_SHA1,
|
|
205,
|
|
{0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f,
|
|
0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9,
|
|
0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 206
|
|
{SEC_OID_SHA1,
|
|
206,
|
|
{0x30, 0x81, 0x9a, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52,
|
|
0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44,
|
|
0xd9, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94,
|
|
0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56,
|
|
0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6,
|
|
0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc,
|
|
0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa,
|
|
0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8,
|
|
0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50,
|
|
0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1,
|
|
0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54,
|
|
0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e,
|
|
0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75,
|
|
0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 207
|
|
{SEC_OID_SHA1,
|
|
207,
|
|
{0x30, 0x1b, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28,
|
|
0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b,
|
|
0xbb, 0xfa, 0x44, 0xd9, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 208
|
|
{SEC_OID_SHA1,
|
|
208,
|
|
{0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05,
|
|
0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4,
|
|
0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 209
|
|
{SEC_OID_SHA1,
|
|
209,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb0, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1,
|
|
0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 210
|
|
{SEC_OID_SHA1,
|
|
210,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb0, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 211
|
|
{SEC_OID_SHA1,
|
|
211,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb0, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 212
|
|
{SEC_OID_SHA1,
|
|
212,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb0, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 213
|
|
{SEC_OID_SHA1,
|
|
213,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb0, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 214
|
|
{SEC_OID_SHA1,
|
|
214,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb0, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 215
|
|
{SEC_OID_SHA1,
|
|
215,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb0, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 216
|
|
{SEC_OID_SHA1,
|
|
216,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb0, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 217
|
|
{SEC_OID_SHA1,
|
|
217,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb0, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 218
|
|
{SEC_OID_SHA1,
|
|
218,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb0, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 219
|
|
{SEC_OID_SHA1,
|
|
219,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50,
|
|
0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4,
|
|
0x89, 0xb0, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82,
|
|
0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c,
|
|
0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59,
|
|
0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4,
|
|
0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37,
|
|
0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f,
|
|
0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03,
|
|
0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b,
|
|
0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39,
|
|
0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d,
|
|
0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70,
|
|
0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 220
|
|
{SEC_OID_SHA1,
|
|
220,
|
|
{0x30, 0x1c, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb0, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 221
|
|
{SEC_OID_SHA1,
|
|
221,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb0, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 222
|
|
{SEC_OID_SHA1,
|
|
222,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb1, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1,
|
|
0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 223
|
|
{SEC_OID_SHA1,
|
|
223,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 224
|
|
{SEC_OID_SHA1,
|
|
224,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 225
|
|
{SEC_OID_SHA1,
|
|
225,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 226
|
|
{SEC_OID_SHA1,
|
|
226,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb1, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 227
|
|
{SEC_OID_SHA1,
|
|
227,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb1, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 228
|
|
{SEC_OID_SHA1,
|
|
228,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb1, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 229
|
|
{SEC_OID_SHA1,
|
|
229,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb1, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 230
|
|
{SEC_OID_SHA1,
|
|
230,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb1, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 231
|
|
{SEC_OID_SHA1,
|
|
231,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb1, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 232
|
|
{SEC_OID_SHA1,
|
|
232,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50,
|
|
0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4,
|
|
0x89, 0xb1, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82,
|
|
0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c,
|
|
0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59,
|
|
0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4,
|
|
0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37,
|
|
0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f,
|
|
0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03,
|
|
0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b,
|
|
0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39,
|
|
0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d,
|
|
0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70,
|
|
0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 233
|
|
{SEC_OID_SHA1,
|
|
233,
|
|
{0x30, 0x1c, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb1, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 234
|
|
{SEC_OID_SHA1,
|
|
234,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb1, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 235
|
|
{SEC_OID_SHA1,
|
|
235,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb2, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1,
|
|
0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 236
|
|
{SEC_OID_SHA1,
|
|
236,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb2, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 237
|
|
{SEC_OID_SHA1,
|
|
237,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb2, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 238
|
|
{SEC_OID_SHA1,
|
|
238,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb2, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 239
|
|
{SEC_OID_SHA1,
|
|
239,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb2, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 240
|
|
{SEC_OID_SHA1,
|
|
240,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb2, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 241
|
|
{SEC_OID_SHA1,
|
|
241,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb2, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 242
|
|
{SEC_OID_SHA1,
|
|
242,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb2, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 243
|
|
{SEC_OID_SHA1,
|
|
243,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb2, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 244
|
|
{SEC_OID_SHA1,
|
|
244,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4,
|
|
0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89,
|
|
0xb2, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 245
|
|
{SEC_OID_SHA1,
|
|
245,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50,
|
|
0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4,
|
|
0x89, 0xb2, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82,
|
|
0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c,
|
|
0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59,
|
|
0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4,
|
|
0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37,
|
|
0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f,
|
|
0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03,
|
|
0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b,
|
|
0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39,
|
|
0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d,
|
|
0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70,
|
|
0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 246
|
|
{SEC_OID_SHA1,
|
|
246,
|
|
{0x30, 0x1c, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb2, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 247
|
|
{SEC_OID_SHA1,
|
|
247,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a,
|
|
0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04,
|
|
0x97, 0x77, 0xf4, 0x89, 0xb2, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 248
|
|
{SEC_OID_SHA1,
|
|
248,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1,
|
|
0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 249
|
|
{SEC_OID_SHA1,
|
|
249,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 250
|
|
{SEC_OID_SHA1,
|
|
250,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 251
|
|
{SEC_OID_SHA1,
|
|
251,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 252
|
|
{SEC_OID_SHA1,
|
|
252,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 253
|
|
{SEC_OID_SHA1,
|
|
253,
|
|
{0x30, 0x2d, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63,
|
|
0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 254
|
|
{SEC_OID_SHA1,
|
|
254,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 255
|
|
{SEC_OID_SHA1,
|
|
255,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 256
|
|
{SEC_OID_SHA1,
|
|
256,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e,
|
|
0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 257
|
|
{SEC_OID_SHA1,
|
|
257,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 258
|
|
{SEC_OID_SHA1,
|
|
258,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82,
|
|
0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c,
|
|
0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59,
|
|
0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4,
|
|
0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37,
|
|
0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f,
|
|
0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03,
|
|
0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b,
|
|
0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39,
|
|
0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d,
|
|
0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70,
|
|
0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 259
|
|
{SEC_OID_SHA1,
|
|
259,
|
|
{0x30, 0x1c, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 260
|
|
{SEC_OID_SHA1,
|
|
260,
|
|
{0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 261
|
|
{SEC_OID_SHA1,
|
|
261,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf,
|
|
0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b,
|
|
0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 262
|
|
{SEC_OID_SHA1,
|
|
262,
|
|
{0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 263
|
|
{SEC_OID_SHA1,
|
|
263,
|
|
{0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 264
|
|
{SEC_OID_SHA1,
|
|
264,
|
|
{0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 265
|
|
{SEC_OID_SHA1,
|
|
265,
|
|
{0x30, 0x81, 0x9a, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52,
|
|
0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44,
|
|
0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 266
|
|
{SEC_OID_SHA1,
|
|
266,
|
|
{0x30, 0x81, 0x9a, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52,
|
|
0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44,
|
|
0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 267
|
|
{SEC_OID_SHA1,
|
|
267,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50,
|
|
0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4,
|
|
0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 268
|
|
{SEC_OID_SHA1,
|
|
268,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50,
|
|
0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4,
|
|
0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 269
|
|
{SEC_OID_SHA1,
|
|
269,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50,
|
|
0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4,
|
|
0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 270
|
|
{SEC_OID_SHA1,
|
|
270,
|
|
{0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 271
|
|
{SEC_OID_SHA1,
|
|
271,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1,
|
|
0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4,
|
|
0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52,
|
|
0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67,
|
|
0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b,
|
|
0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a,
|
|
0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3,
|
|
0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb,
|
|
0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9,
|
|
0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf,
|
|
0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93,
|
|
0xd5, 0x70, 0x75, 0x1f, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1,
|
|
0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4,
|
|
0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52,
|
|
0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67,
|
|
0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b,
|
|
0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a,
|
|
0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3,
|
|
0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb,
|
|
0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9,
|
|
0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf,
|
|
0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93,
|
|
0xd5, 0x70, 0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 272
|
|
{SEC_OID_SHA1,
|
|
272,
|
|
{0x30, 0x81, 0x89, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 273
|
|
{SEC_OID_SHA1,
|
|
273,
|
|
{0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7,
|
|
0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c,
|
|
0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b,
|
|
0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea,
|
|
0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60,
|
|
0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86,
|
|
0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3,
|
|
0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6,
|
|
0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36,
|
|
0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c,
|
|
0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5,
|
|
0x70, 0x75, 0x1f, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 274
|
|
{SEC_OID_SHA1,
|
|
274,
|
|
{0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0xff,
|
|
0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76,
|
|
0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 275
|
|
{SEC_OID_SHA1,
|
|
275,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 276
|
|
{SEC_OID_SHA1,
|
|
276,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 277
|
|
{SEC_OID_SHA1,
|
|
277,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0xff},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 278
|
|
{SEC_OID_SHA1,
|
|
278,
|
|
{0x30, 0x1b, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x14, 0x5c,
|
|
0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 279
|
|
{SEC_OID_SHA1,
|
|
279,
|
|
{0x30, 0x1b, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x14, 0x5c,
|
|
0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6,
|
|
0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 280
|
|
{SEC_OID_SHA1,
|
|
280,
|
|
{0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x00,
|
|
0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89,
|
|
0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 281
|
|
{SEC_OID_SHA1,
|
|
281,
|
|
{0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x00,
|
|
0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89,
|
|
0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 282
|
|
{SEC_OID_SHA1,
|
|
282,
|
|
{0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x00,
|
|
0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89,
|
|
0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 283
|
|
{SEC_OID_SHA1,
|
|
283,
|
|
{0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x01,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 284
|
|
{SEC_OID_SHA1,
|
|
284,
|
|
{0x30, 0x81, 0x89, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x81, 0x81, 0x00,
|
|
0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84,
|
|
0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c,
|
|
0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b,
|
|
0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e,
|
|
0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08,
|
|
0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1,
|
|
0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3,
|
|
0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda,
|
|
0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93,
|
|
0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08,
|
|
0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 285
|
|
{SEC_OID_SHA1,
|
|
285,
|
|
{0x30, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 286
|
|
{SEC_OID_SHA1,
|
|
286,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x01, 0x42},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 287
|
|
{SEC_OID_SHA1,
|
|
287,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x0c, 0x01, 0x30},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 288
|
|
{SEC_OID_SHA1,
|
|
288,
|
|
{0x30, 0x05, 0x02, 0x01, 0x01, 0x0c, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 289
|
|
{SEC_OID_SHA1,
|
|
289,
|
|
{0x30, 0x09, 0x0c, 0x02, 0x25, 0x73, 0x0c, 0x03, 0x73, 0x25, 0x73},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 290
|
|
{SEC_OID_SHA1,
|
|
290,
|
|
{0x30, 0x08, 0x02, 0x01, 0x01, 0x30, 0x03, 0x02, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 291
|
|
{SEC_OID_SHA1,
|
|
291,
|
|
{0x30, 0x03, 0x02, 0x01, 0x01},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 292
|
|
{SEC_OID_SHA1,
|
|
292,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x01, 0x01, 0x00},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
false},
|
|
|
|
// Comment: random signature
|
|
// tcID: 293
|
|
{SEC_OID_SHA1,
|
|
293,
|
|
{0x30, 0x2e, 0x02, 0x15, 0x00, 0x88, 0x54, 0xbd, 0xb5, 0x2d, 0x20, 0xff,
|
|
0x9e, 0xa4, 0x99, 0x48, 0x3f, 0xba, 0x4d, 0x3c, 0x10, 0x1a, 0x58, 0x6f,
|
|
0xc7, 0x02, 0x15, 0x00, 0xb2, 0x30, 0x45, 0x90, 0x09, 0x95, 0xd3, 0xfe,
|
|
0x3c, 0x4c, 0x63, 0x8a, 0x3e, 0x06, 0x45, 0x8a, 0x25, 0xa1, 0xe9, 0xdd},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 294
|
|
{SEC_OID_SHA1,
|
|
294,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x4f, 0x6b, 0xf1, 0x89, 0x41, 0xab, 0xbf, 0x33,
|
|
0x21, 0x1d, 0x95, 0x61, 0xa1, 0x4f, 0x9a, 0xeb, 0xd0, 0x3f, 0x4e, 0x94,
|
|
0x02, 0x14, 0x21, 0x8c, 0xda, 0x35, 0x0d, 0xef, 0x7f, 0x75, 0x61, 0x7f,
|
|
0xcc, 0x79, 0x9d, 0x0c, 0xf2, 0xcf, 0x6b, 0x23, 0x43, 0x8d},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 295
|
|
{SEC_OID_SHA1,
|
|
295,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x45, 0x9e, 0xaf, 0x08, 0x86, 0x16, 0x00, 0x81,
|
|
0xb4, 0x7f, 0xc5, 0x73, 0xfb, 0x3d, 0x15, 0x2d, 0x68, 0x0d, 0x3b, 0x4b,
|
|
0x02, 0x14, 0x42, 0x93, 0xdb, 0xb9, 0x4d, 0xb4, 0xc9, 0x30, 0xd6, 0x7e,
|
|
0x27, 0xfc, 0x4e, 0xc8, 0x53, 0x8b, 0x58, 0xd1, 0xc7, 0xcd},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 296
|
|
{SEC_OID_SHA1,
|
|
296,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x0a, 0x6c, 0x12, 0xb8, 0xff, 0x5c, 0xa2, 0x1c,
|
|
0x4e, 0xa0, 0xc7, 0xac, 0xea, 0x38, 0xd7, 0x6f, 0xd1, 0x70, 0xb9, 0x7f,
|
|
0x02, 0x14, 0x29, 0xce, 0x2c, 0xf2, 0x67, 0x2f, 0xa6, 0x40, 0x03, 0x16,
|
|
0x80, 0xdc, 0xe2, 0x22, 0x39, 0x32, 0xf6, 0x13, 0xf6, 0xa5},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 297
|
|
{SEC_OID_SHA1,
|
|
297,
|
|
{0x30, 0x2c, 0x02, 0x14, 0x34, 0xbc, 0xe4, 0x77, 0x3e, 0x5e, 0x11, 0x87,
|
|
0x5e, 0xa2, 0x20, 0x2b, 0xc3, 0x3e, 0x01, 0xfe, 0x00, 0xb3, 0x32, 0x1a,
|
|
0x02, 0x14, 0x2b, 0x29, 0x4e, 0x01, 0xa9, 0x72, 0x96, 0xd8, 0x4e, 0x4c,
|
|
0x60, 0xbf, 0xba, 0x05, 0xd2, 0x76, 0x09, 0x81, 0xc9, 0x20},
|
|
kPubKey0,
|
|
{0x31, 0x32, 0x33, 0x34, 0x30, 0x30},
|
|
true},
|
|
|
|
// Comment: r,s = 1,1
|
|
// tcID: 298
|
|
{SEC_OID_SHA1,
|
|
298,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey1,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: r,s = 1,5
|
|
// tcID: 299
|
|
{SEC_OID_SHA1,
|
|
299,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x05},
|
|
kPubKey1,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: u2 small
|
|
// tcID: 300
|
|
{SEC_OID_SHA1,
|
|
300,
|
|
{0x30, 0x19, 0x02, 0x01, 0x01, 0x02, 0x14, 0x25, 0x02,
|
|
0x3e, 0x8b, 0x9b, 0xa9, 0xba, 0x72, 0xf4, 0x81, 0xe9,
|
|
0x0c, 0xb8, 0xae, 0x67, 0x51, 0x7e, 0x64, 0x1b, 0x8a},
|
|
kPubKey1,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: s == q-1
|
|
// tcID: 301
|
|
{SEC_OID_SHA1,
|
|
301,
|
|
{0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b,
|
|
0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f,
|
|
0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0},
|
|
kPubKey1,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: s == 1
|
|
// tcID: 302
|
|
{SEC_OID_SHA1,
|
|
302,
|
|
{0x30, 0x19, 0x02, 0x14, 0x62, 0xba, 0x82, 0x73, 0x81,
|
|
0x39, 0x6d, 0xc4, 0x4f, 0xac, 0xc6, 0x6c, 0x34, 0x4f,
|
|
0x91, 0x78, 0x8f, 0x11, 0xc6, 0xfc, 0x02, 0x01, 0x01},
|
|
kPubKey2,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: Legacy:ASN encoding of s misses leading 0
|
|
// tcID: 303
|
|
{SEC_OID_SHA224,
|
|
303,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1c, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4,
|
|
0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
true},
|
|
|
|
// Comment: valid
|
|
// tcID: 304
|
|
{SEC_OID_SHA224,
|
|
304,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
true},
|
|
|
|
// Comment: long form encoding of length of sequence
|
|
// tcID: 305
|
|
{SEC_OID_SHA224,
|
|
305,
|
|
{0x30, 0x81, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc,
|
|
0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of sequence contains leading 0
|
|
// tcID: 306
|
|
{SEC_OID_SHA224,
|
|
306,
|
|
{0x30, 0x82, 0x00, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad,
|
|
0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: wrong length of sequence
|
|
// tcID: 307
|
|
{SEC_OID_SHA224,
|
|
307,
|
|
{0x30, 0x3e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: wrong length of sequence
|
|
// tcID: 308
|
|
{SEC_OID_SHA224,
|
|
308,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of sequence
|
|
// tcID: 309
|
|
{SEC_OID_SHA224,
|
|
309,
|
|
{0x30, 0x85, 0x01, 0x00, 0x00, 0x00, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4,
|
|
0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91,
|
|
0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of sequence
|
|
// tcID: 310
|
|
{SEC_OID_SHA224,
|
|
310,
|
|
{0x30, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3d, 0x02,
|
|
0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe,
|
|
0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16,
|
|
0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88,
|
|
0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8,
|
|
0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**31 - 1
|
|
// tcID: 311
|
|
{SEC_OID_SHA224,
|
|
311,
|
|
{0x30, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**32 - 1
|
|
// tcID: 312
|
|
{SEC_OID_SHA224,
|
|
312,
|
|
{0x30, 0x84, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**40 - 1
|
|
// tcID: 313
|
|
{SEC_OID_SHA224,
|
|
313,
|
|
{0x30, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4,
|
|
0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91,
|
|
0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**64 - 1
|
|
// tcID: 314
|
|
{SEC_OID_SHA224,
|
|
314,
|
|
{0x30, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1c,
|
|
0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14,
|
|
0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17,
|
|
0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: incorrect length of sequence
|
|
// tcID: 315
|
|
{SEC_OID_SHA224,
|
|
315,
|
|
{0x30, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 316
|
|
{SEC_OID_SHA224,
|
|
316,
|
|
{0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 317
|
|
{SEC_OID_SHA224,
|
|
317,
|
|
{0x30, 0x3d, 0x02, 0x80, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 318
|
|
{SEC_OID_SHA224,
|
|
318,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x80, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: removing sequence
|
|
// tcID: 319
|
|
{SEC_OID_SHA224, 319, {}, kPubKey3, {0x48, 0x65, 0x6c, 0x6c, 0x6f}, false},
|
|
|
|
// Comment: lonely sequence tag
|
|
// tcID: 320
|
|
{SEC_OID_SHA224,
|
|
320,
|
|
{0x30},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending 0's to sequence
|
|
// tcID: 321
|
|
{SEC_OID_SHA224,
|
|
321,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: prepending 0's to sequence
|
|
// tcID: 322
|
|
{SEC_OID_SHA224,
|
|
322,
|
|
{0x30, 0x3f, 0x00, 0x00, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad,
|
|
0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending unused 0's to sequence
|
|
// tcID: 323
|
|
{SEC_OID_SHA224,
|
|
323,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending null value to sequence
|
|
// tcID: 324
|
|
{SEC_OID_SHA224,
|
|
324,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x05, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 325
|
|
{SEC_OID_SHA224,
|
|
325,
|
|
{0x30, 0x42, 0x49, 0x81, 0x77, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4,
|
|
0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91,
|
|
0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 326
|
|
{SEC_OID_SHA224,
|
|
326,
|
|
{0x30, 0x41, 0x25, 0x00, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 327
|
|
{SEC_OID_SHA224,
|
|
327,
|
|
{0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d,
|
|
0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81,
|
|
0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 328
|
|
{SEC_OID_SHA224,
|
|
328,
|
|
{0x30, 0x42, 0x22, 0x21, 0x49, 0x81, 0x77, 0x02, 0x1c, 0x1e, 0x41, 0xb4,
|
|
0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91,
|
|
0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 329
|
|
{SEC_OID_SHA224,
|
|
329,
|
|
{0x30, 0x41, 0x22, 0x20, 0x25, 0x00, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 330
|
|
{SEC_OID_SHA224,
|
|
330,
|
|
{0x30, 0x45, 0x22, 0x1e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, 0x04,
|
|
0xde, 0xad, 0xbe, 0xef, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 331
|
|
{SEC_OID_SHA224,
|
|
331,
|
|
{0x30, 0x42, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x22, 0x49, 0x81,
|
|
0x77, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 332
|
|
{SEC_OID_SHA224,
|
|
332,
|
|
{0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x21, 0x25, 0x00,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 333
|
|
{SEC_OID_SHA224,
|
|
333,
|
|
{0x30, 0x45, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x1f, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d,
|
|
0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81,
|
|
0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 334
|
|
{SEC_OID_SHA224,
|
|
334,
|
|
{0x30, 0x45, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x30, 0x3d, 0x02, 0x1c,
|
|
0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14,
|
|
0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17,
|
|
0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 335
|
|
{SEC_OID_SHA224,
|
|
335,
|
|
{0x30, 0x43, 0xaa, 0x02, 0xaa, 0xbb, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41,
|
|
0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb,
|
|
0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8,
|
|
0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 336
|
|
{SEC_OID_SHA224,
|
|
336,
|
|
{0x30, 0x45, 0x22, 0x24, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1c,
|
|
0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14,
|
|
0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17,
|
|
0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 337
|
|
{SEC_OID_SHA224,
|
|
337,
|
|
{0x30, 0x43, 0x22, 0x22, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x1c, 0x1e, 0x41,
|
|
0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb,
|
|
0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8,
|
|
0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 338
|
|
{SEC_OID_SHA224,
|
|
338,
|
|
{0x30, 0x45, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x25, 0xaa, 0x00,
|
|
0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 339
|
|
{SEC_OID_SHA224,
|
|
339,
|
|
{0x30, 0x43, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x23, 0xaa, 0x02,
|
|
0xaa, 0xbb, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated length of sequence
|
|
// tcID: 340
|
|
{SEC_OID_SHA224,
|
|
340,
|
|
{0x30, 0x81},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 341
|
|
{SEC_OID_SHA224,
|
|
341,
|
|
{0x30, 0x80, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d,
|
|
0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81,
|
|
0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 342
|
|
{SEC_OID_SHA224,
|
|
342,
|
|
{0x30, 0x41, 0x22, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 343
|
|
{SEC_OID_SHA224,
|
|
343,
|
|
{0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x80, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d,
|
|
0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81,
|
|
0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 344
|
|
{SEC_OID_SHA224,
|
|
344,
|
|
{0x30, 0x80, 0x31, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d,
|
|
0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81,
|
|
0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 345
|
|
{SEC_OID_SHA224,
|
|
345,
|
|
{0x30, 0x41, 0x22, 0x80, 0x03, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 346
|
|
{SEC_OID_SHA224,
|
|
346,
|
|
{0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x80, 0x03, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d,
|
|
0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81,
|
|
0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Replacing sequence with NULL
|
|
// tcID: 347
|
|
{SEC_OID_SHA224,
|
|
347,
|
|
{0x05, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 348
|
|
{SEC_OID_SHA224,
|
|
348,
|
|
{0x2e, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 349
|
|
{SEC_OID_SHA224,
|
|
349,
|
|
{0x2f, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 350
|
|
{SEC_OID_SHA224,
|
|
350,
|
|
{0x31, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 351
|
|
{SEC_OID_SHA224,
|
|
351,
|
|
{0x32, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 352
|
|
{SEC_OID_SHA224,
|
|
352,
|
|
{0xff, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: dropping value of sequence
|
|
// tcID: 353
|
|
{SEC_OID_SHA224,
|
|
353,
|
|
{0x30, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition for sequence
|
|
// tcID: 354
|
|
{SEC_OID_SHA224,
|
|
354,
|
|
{0x30, 0x41, 0x30, 0x01, 0x02, 0x30, 0x3c, 0x1c, 0x1e, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated sequence
|
|
// tcID: 355
|
|
{SEC_OID_SHA224,
|
|
355,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated sequence
|
|
// tcID: 356
|
|
{SEC_OID_SHA224,
|
|
356,
|
|
{0x30, 0x3c, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48,
|
|
0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4,
|
|
0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length
|
|
// tcID: 357
|
|
{SEC_OID_SHA224,
|
|
357,
|
|
{0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length with truncated delimiter
|
|
// tcID: 358
|
|
{SEC_OID_SHA224,
|
|
358,
|
|
{0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length with additional element
|
|
// tcID: 359
|
|
{SEC_OID_SHA224,
|
|
359,
|
|
{0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad,
|
|
0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24,
|
|
0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8,
|
|
0x78, 0x62, 0x36, 0x05, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length with truncated element
|
|
// tcID: 360
|
|
{SEC_OID_SHA224,
|
|
360,
|
|
{0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad,
|
|
0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24,
|
|
0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8,
|
|
0x78, 0x62, 0x36, 0x06, 0x08, 0x11, 0x22, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length with garbage
|
|
// tcID: 361
|
|
{SEC_OID_SHA224,
|
|
361,
|
|
{0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad,
|
|
0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24,
|
|
0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8,
|
|
0x78, 0x62, 0x36, 0x00, 0x00, 0xfe, 0x02, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: indefinite length with nonempty EOC
|
|
// tcID: 362
|
|
{SEC_OID_SHA224,
|
|
362,
|
|
{0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad,
|
|
0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24,
|
|
0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8,
|
|
0x78, 0x62, 0x36, 0x00, 0x02, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: prepend empty sequence
|
|
// tcID: 363
|
|
{SEC_OID_SHA224,
|
|
363,
|
|
{0x30, 0x3f, 0x30, 0x00, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad,
|
|
0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: append empty sequence
|
|
// tcID: 364
|
|
{SEC_OID_SHA224,
|
|
364,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x30, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: append garbage with high tag number
|
|
// tcID: 365
|
|
{SEC_OID_SHA224,
|
|
365,
|
|
{0x30, 0x40, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0xbf, 0x7f, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: sequence of sequence
|
|
// tcID: 366
|
|
{SEC_OID_SHA224,
|
|
366,
|
|
{0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad,
|
|
0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated sequence: removed last 1 elements
|
|
// tcID: 367
|
|
{SEC_OID_SHA224,
|
|
367,
|
|
{0x30, 0x1e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: repeating element in sequence
|
|
// tcID: 368
|
|
{SEC_OID_SHA224,
|
|
368,
|
|
{0x30, 0x5c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad,
|
|
0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24,
|
|
0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8,
|
|
0x78, 0x62, 0x36, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37,
|
|
0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: long form encoding of length of integer
|
|
// tcID: 369
|
|
{SEC_OID_SHA224,
|
|
369,
|
|
{0x30, 0x3e, 0x02, 0x81, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc,
|
|
0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: long form encoding of length of integer
|
|
// tcID: 370
|
|
{SEC_OID_SHA224,
|
|
370,
|
|
{0x30, 0x3e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x81, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer contains leading 0
|
|
// tcID: 371
|
|
{SEC_OID_SHA224,
|
|
371,
|
|
{0x30, 0x3f, 0x02, 0x82, 0x00, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad,
|
|
0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer contains leading 0
|
|
// tcID: 372
|
|
{SEC_OID_SHA224,
|
|
372,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x82, 0x00, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 373
|
|
{SEC_OID_SHA224,
|
|
373,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 374
|
|
{SEC_OID_SHA224,
|
|
374,
|
|
{0x30, 0x3d, 0x02, 0x1b, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 375
|
|
{SEC_OID_SHA224,
|
|
375,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1e, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 376
|
|
{SEC_OID_SHA224,
|
|
376,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1c, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of integer
|
|
// tcID: 377
|
|
{SEC_OID_SHA224,
|
|
377,
|
|
{0x30, 0x42, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x1c, 0x1e, 0x41, 0xb4,
|
|
0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91,
|
|
0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of integer
|
|
// tcID: 378
|
|
{SEC_OID_SHA224,
|
|
378,
|
|
{0x30, 0x42, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x85, 0x01, 0x00,
|
|
0x00, 0x00, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of integer
|
|
// tcID: 379
|
|
{SEC_OID_SHA224,
|
|
379,
|
|
{0x30, 0x46, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe,
|
|
0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16,
|
|
0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88,
|
|
0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8,
|
|
0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of integer
|
|
// tcID: 380
|
|
{SEC_OID_SHA224,
|
|
380,
|
|
{0x30, 0x46, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x89, 0x01, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88,
|
|
0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8,
|
|
0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**31 - 1
|
|
// tcID: 381
|
|
{SEC_OID_SHA224,
|
|
381,
|
|
{0x30, 0x41, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x1e, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**31 - 1
|
|
// tcID: 382
|
|
{SEC_OID_SHA224,
|
|
382,
|
|
{0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x84, 0x7f, 0xff,
|
|
0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**32 - 1
|
|
// tcID: 383
|
|
{SEC_OID_SHA224,
|
|
383,
|
|
{0x30, 0x41, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x1e, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**32 - 1
|
|
// tcID: 384
|
|
{SEC_OID_SHA224,
|
|
384,
|
|
{0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x84, 0xff, 0xff,
|
|
0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**40 - 1
|
|
// tcID: 385
|
|
{SEC_OID_SHA224,
|
|
385,
|
|
{0x30, 0x42, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x1e, 0x41, 0xb4,
|
|
0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91,
|
|
0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**40 - 1
|
|
// tcID: 386
|
|
{SEC_OID_SHA224,
|
|
386,
|
|
{0x30, 0x42, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x85, 0xff, 0xff,
|
|
0xff, 0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**64 - 1
|
|
// tcID: 387
|
|
{SEC_OID_SHA224,
|
|
387,
|
|
{0x30, 0x45, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14,
|
|
0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17,
|
|
0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**64 - 1
|
|
// tcID: 388
|
|
{SEC_OID_SHA224,
|
|
388,
|
|
{0x30, 0x45, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x88, 0xff, 0xff,
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: incorrect length of integer
|
|
// tcID: 389
|
|
{SEC_OID_SHA224,
|
|
389,
|
|
{0x30, 0x3d, 0x02, 0xff, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: incorrect length of integer
|
|
// tcID: 390
|
|
{SEC_OID_SHA224,
|
|
390,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: removing integer
|
|
// tcID: 391
|
|
{SEC_OID_SHA224,
|
|
391,
|
|
{0x30, 0x1f, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37,
|
|
0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: lonely integer tag
|
|
// tcID: 392
|
|
{SEC_OID_SHA224,
|
|
392,
|
|
{0x30, 0x20, 0x02, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37,
|
|
0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: lonely integer tag
|
|
// tcID: 393
|
|
{SEC_OID_SHA224,
|
|
393,
|
|
{0x30, 0x1f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending 0's to integer
|
|
// tcID: 394
|
|
{SEC_OID_SHA224,
|
|
394,
|
|
{0x30, 0x3f, 0x02, 0x1e, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00,
|
|
0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending 0's to integer
|
|
// tcID: 395
|
|
{SEC_OID_SHA224,
|
|
395,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1f, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: prepending 0's to integer
|
|
// tcID: 396
|
|
{SEC_OID_SHA224,
|
|
396,
|
|
{0x30, 0x3f, 0x02, 0x1e, 0x00, 0x00, 0x1e, 0x41, 0xb4, 0x79, 0xad,
|
|
0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9,
|
|
0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: prepending 0's to integer
|
|
// tcID: 397
|
|
{SEC_OID_SHA224,
|
|
397,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1f, 0x00, 0x00, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending unused 0's to integer
|
|
// tcID: 398
|
|
{SEC_OID_SHA224,
|
|
398,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00,
|
|
0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending null value to integer
|
|
// tcID: 399
|
|
{SEC_OID_SHA224,
|
|
399,
|
|
{0x30, 0x3f, 0x02, 0x1e, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x05,
|
|
0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3,
|
|
0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69,
|
|
0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: appending null value to integer
|
|
// tcID: 400
|
|
{SEC_OID_SHA224,
|
|
400,
|
|
{0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1f, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x05, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated length of integer
|
|
// tcID: 401
|
|
{SEC_OID_SHA224,
|
|
401,
|
|
{0x30, 0x21, 0x02, 0x81, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated length of integer
|
|
// tcID: 402
|
|
{SEC_OID_SHA224,
|
|
402,
|
|
{0x30, 0x20, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x81},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Replacing integer with NULL
|
|
// tcID: 403
|
|
{SEC_OID_SHA224,
|
|
403,
|
|
{0x30, 0x21, 0x05, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Replacing integer with NULL
|
|
// tcID: 404
|
|
{SEC_OID_SHA224,
|
|
404,
|
|
{0x30, 0x20, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x05, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 405
|
|
{SEC_OID_SHA224,
|
|
405,
|
|
{0x30, 0x3d, 0x00, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 406
|
|
{SEC_OID_SHA224,
|
|
406,
|
|
{0x30, 0x3d, 0x01, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 407
|
|
{SEC_OID_SHA224,
|
|
407,
|
|
{0x30, 0x3d, 0x03, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 408
|
|
{SEC_OID_SHA224,
|
|
408,
|
|
{0x30, 0x3d, 0x04, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 409
|
|
{SEC_OID_SHA224,
|
|
409,
|
|
{0x30, 0x3d, 0xff, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 410
|
|
{SEC_OID_SHA224,
|
|
410,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 411
|
|
{SEC_OID_SHA224,
|
|
411,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x01,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 412
|
|
{SEC_OID_SHA224,
|
|
412,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x03,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 413
|
|
{SEC_OID_SHA224,
|
|
413,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x04,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 414
|
|
{SEC_OID_SHA224,
|
|
414,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0xff,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: dropping value of integer
|
|
// tcID: 415
|
|
{SEC_OID_SHA224,
|
|
415,
|
|
{0x30, 0x21, 0x02, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2,
|
|
0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1,
|
|
0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: dropping value of integer
|
|
// tcID: 416
|
|
{SEC_OID_SHA224,
|
|
416,
|
|
{0x30, 0x20, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition for integer
|
|
// tcID: 417
|
|
{SEC_OID_SHA224,
|
|
417,
|
|
{0x30, 0x41, 0x22, 0x20, 0x02, 0x01, 0x1e, 0x02, 0x1b, 0x41, 0xb4, 0x79,
|
|
0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0,
|
|
0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: using composition for integer
|
|
// tcID: 418
|
|
{SEC_OID_SHA224,
|
|
418,
|
|
{0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x21, 0x02, 0x01,
|
|
0x00, 0x02, 0x1c, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: modify first byte of integer
|
|
// tcID: 419
|
|
{SEC_OID_SHA224,
|
|
419,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1c, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: modify first byte of integer
|
|
// tcID: 420
|
|
{SEC_OID_SHA224,
|
|
420,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x02, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: modify last byte of integer
|
|
// tcID: 421
|
|
{SEC_OID_SHA224,
|
|
421,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0x4d, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: modify last byte of integer
|
|
// tcID: 422
|
|
{SEC_OID_SHA224,
|
|
422,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0xb6},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 423
|
|
{SEC_OID_SHA224,
|
|
423,
|
|
{0x30, 0x3c, 0x02, 0x1b, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4,
|
|
0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 424
|
|
{SEC_OID_SHA224,
|
|
424,
|
|
{0x30, 0x3c, 0x02, 0x1b, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48,
|
|
0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d,
|
|
0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4,
|
|
0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33,
|
|
0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 425
|
|
{SEC_OID_SHA224,
|
|
425,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1c, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: leading ff in integer
|
|
// tcID: 426
|
|
{SEC_OID_SHA224,
|
|
426,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0xff, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc,
|
|
0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: leading ff in integer
|
|
// tcID: 427
|
|
{SEC_OID_SHA224,
|
|
427,
|
|
{0x30, 0x3e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1e, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: replaced integer by infinity
|
|
// tcID: 428
|
|
{SEC_OID_SHA224,
|
|
428,
|
|
{0x30, 0x22, 0x09, 0x01, 0x80, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88,
|
|
0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8,
|
|
0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: replaced integer by infinity
|
|
// tcID: 429
|
|
{SEC_OID_SHA224,
|
|
429,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x09, 0x01, 0x80},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: replacing integer with zero
|
|
// tcID: 430
|
|
{SEC_OID_SHA224,
|
|
430,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88,
|
|
0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8,
|
|
0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: replacing integer with zero
|
|
// tcID: 431
|
|
{SEC_OID_SHA224,
|
|
431,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05,
|
|
0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43,
|
|
0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 432
|
|
{SEC_OID_SHA224,
|
|
432,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xd9, 0x38, 0x4b, 0x20, 0x32, 0xd0,
|
|
0x60, 0xe5, 0x98, 0x48, 0xf8, 0x7c, 0xb4, 0x53, 0x59, 0x36, 0xbc,
|
|
0x25, 0xfa, 0x77, 0x95, 0x9e, 0x96, 0xd7, 0xf8, 0x8e, 0x33, 0x2a,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 433
|
|
{SEC_OID_SHA224,
|
|
433,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0xff, 0x63, 0x4b, 0x1d, 0xd3, 0x27, 0xde,
|
|
0x71, 0x25, 0xda, 0x79, 0x03, 0xad, 0x21, 0x63, 0xca, 0x2a, 0xdd,
|
|
0xc0, 0x96, 0x10, 0x1f, 0xd3, 0x95, 0x56, 0x7e, 0xe3, 0x60, 0x70,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 434
|
|
{SEC_OID_SHA224,
|
|
434,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0xe1, 0xbe, 0x4b, 0x86, 0x52, 0xa8, 0x96,
|
|
0xfa, 0x46, 0x9f, 0x01, 0xeb, 0x15, 0x24, 0x6e, 0x4f, 0x33, 0x0c,
|
|
0xb7, 0xbc, 0x25, 0x46, 0xe9, 0xe8, 0xc4, 0x47, 0x36, 0x33, 0x02,
|
|
0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 435
|
|
{SEC_OID_SHA224,
|
|
435,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9c, 0xb4, 0xe2, 0x2c, 0xd8, 0x21,
|
|
0x8e, 0xda, 0x25, 0x86, 0xfc, 0x52, 0xde, 0x9c, 0x35, 0xd5, 0x22,
|
|
0x3f, 0x69, 0xef, 0xe0, 0x2c, 0x6a, 0xa9, 0x81, 0x1c, 0x9f, 0x90,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 436
|
|
{SEC_OID_SHA224,
|
|
436,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0xff, 0x26, 0xc7, 0xb4, 0xdf, 0xcd, 0x2f,
|
|
0x9f, 0x1a, 0x67, 0xb7, 0x07, 0x83, 0x4b, 0xac, 0xa6, 0xc9, 0x43,
|
|
0xda, 0x05, 0x88, 0x6a, 0x61, 0x69, 0x28, 0x07, 0x71, 0xcc, 0xd6,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 437
|
|
{SEC_OID_SHA224,
|
|
437,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57,
|
|
0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc,
|
|
0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 438
|
|
{SEC_OID_SHA224,
|
|
438,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xe1, 0xbe, 0x4b, 0x86, 0x52, 0xa8,
|
|
0x96, 0xfa, 0x46, 0x9f, 0x01, 0xeb, 0x15, 0x24, 0x6e, 0x4f, 0x33,
|
|
0x0c, 0xb7, 0xbc, 0x25, 0x46, 0xe9, 0xe8, 0xc4, 0x47, 0x36, 0x33,
|
|
0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f,
|
|
0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67,
|
|
0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 439
|
|
{SEC_OID_SHA224,
|
|
439,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x01, 0x68, 0xdc, 0xf0, 0x2f, 0x57, 0xb0, 0xca, 0xef, 0x7d,
|
|
0xdc, 0x18, 0x3b, 0xee, 0x1c, 0xa9, 0x4e, 0xe0, 0x9c, 0x1a, 0x02,
|
|
0xee, 0x4b, 0x02, 0x00, 0xa5, 0x4d, 0xcb, 0x93},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 440
|
|
{SEC_OID_SHA224,
|
|
440,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1c, 0xf2, 0xef, 0xc2, 0xe2, 0x4c, 0xbe, 0xdb, 0x2f, 0xc0, 0x0c,
|
|
0x23, 0x6c, 0x5b, 0x2d, 0x1a, 0x43, 0x02, 0x36, 0xb5, 0x9b, 0x78,
|
|
0x80, 0x00, 0x7f, 0x2b, 0xa2, 0xf8, 0xd9},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 441
|
|
{SEC_OID_SHA224,
|
|
441,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0xff, 0x52, 0x19, 0xa6, 0x77, 0x2d, 0xc8, 0x2c, 0xf0, 0x61,
|
|
0x0b, 0xe2, 0x2b, 0xdb, 0x5b, 0x1e, 0x37, 0x0e, 0x96, 0x98, 0x30,
|
|
0xcc, 0x9a, 0x7e, 0xc0, 0x17, 0x87, 0x9d, 0xca},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 442
|
|
{SEC_OID_SHA224,
|
|
442,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1c, 0x0d, 0x10, 0x3d, 0x1d, 0xb3, 0x41, 0x24, 0xd0, 0x3f, 0xf3,
|
|
0xdc, 0x93, 0xa4, 0xd2, 0xe5, 0xbc, 0xfd, 0xc9, 0x4a, 0x64, 0x87,
|
|
0x7f, 0xff, 0x80, 0xd4, 0x5d, 0x07, 0x27},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 443
|
|
{SEC_OID_SHA224,
|
|
443,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0xfe, 0x97, 0x23, 0x0f, 0xd0, 0xa8, 0x4f, 0x35, 0x10, 0x82,
|
|
0x23, 0xe7, 0xc4, 0x11, 0xe3, 0x56, 0xb1, 0x1f, 0x63, 0xe5, 0xfd,
|
|
0x11, 0xb4, 0xfd, 0xff, 0x5a, 0xb2, 0x34, 0x6d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 444
|
|
{SEC_OID_SHA224,
|
|
444,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1d, 0x01, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e,
|
|
0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf,
|
|
0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 445
|
|
{SEC_OID_SHA224,
|
|
445,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69,
|
|
0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3,
|
|
0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02,
|
|
0x1c, 0x52, 0x19, 0xa6, 0x77, 0x2d, 0xc8, 0x2c, 0xf0, 0x61, 0x0b,
|
|
0xe2, 0x2b, 0xdb, 0x5b, 0x1e, 0x37, 0x0e, 0x96, 0x98, 0x30, 0xcc,
|
|
0x9a, 0x7e, 0xc0, 0x17, 0x87, 0x9d, 0xca},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 446
|
|
{SEC_OID_SHA224,
|
|
446,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59,
|
|
0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a,
|
|
0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 447
|
|
{SEC_OID_SHA224,
|
|
447,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 448
|
|
{SEC_OID_SHA224,
|
|
448,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 449
|
|
{SEC_OID_SHA224,
|
|
449,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 450
|
|
{SEC_OID_SHA224,
|
|
450,
|
|
{0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 451
|
|
{SEC_OID_SHA224,
|
|
451,
|
|
{0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 452
|
|
{SEC_OID_SHA224,
|
|
452,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 453
|
|
{SEC_OID_SHA224,
|
|
453,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 454
|
|
{SEC_OID_SHA224,
|
|
454,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 455
|
|
{SEC_OID_SHA224,
|
|
455,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 456
|
|
{SEC_OID_SHA224,
|
|
456,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00,
|
|
0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a,
|
|
0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18,
|
|
0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51,
|
|
0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53,
|
|
0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87,
|
|
0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08,
|
|
0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45,
|
|
0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20,
|
|
0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00,
|
|
0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8,
|
|
0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac,
|
|
0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11,
|
|
0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7,
|
|
0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15,
|
|
0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f,
|
|
0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e,
|
|
0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a,
|
|
0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04,
|
|
0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08,
|
|
0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07,
|
|
0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39,
|
|
0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 457
|
|
{SEC_OID_SHA224,
|
|
457,
|
|
{0x30, 0x08, 0x02, 0x01, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 458
|
|
{SEC_OID_SHA224,
|
|
458,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 459
|
|
{SEC_OID_SHA224,
|
|
459,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59,
|
|
0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a,
|
|
0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 460
|
|
{SEC_OID_SHA224,
|
|
460,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 461
|
|
{SEC_OID_SHA224,
|
|
461,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 462
|
|
{SEC_OID_SHA224,
|
|
462,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 463
|
|
{SEC_OID_SHA224,
|
|
463,
|
|
{0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 464
|
|
{SEC_OID_SHA224,
|
|
464,
|
|
{0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 465
|
|
{SEC_OID_SHA224,
|
|
465,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 466
|
|
{SEC_OID_SHA224,
|
|
466,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 467
|
|
{SEC_OID_SHA224,
|
|
467,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 468
|
|
{SEC_OID_SHA224,
|
|
468,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 469
|
|
{SEC_OID_SHA224,
|
|
469,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x01, 0x02, 0x82, 0x01, 0x01, 0x00,
|
|
0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a,
|
|
0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18,
|
|
0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51,
|
|
0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53,
|
|
0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87,
|
|
0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08,
|
|
0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45,
|
|
0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20,
|
|
0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00,
|
|
0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8,
|
|
0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac,
|
|
0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11,
|
|
0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7,
|
|
0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15,
|
|
0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f,
|
|
0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e,
|
|
0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a,
|
|
0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04,
|
|
0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08,
|
|
0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07,
|
|
0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39,
|
|
0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 470
|
|
{SEC_OID_SHA224,
|
|
470,
|
|
{0x30, 0x08, 0x02, 0x01, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 471
|
|
{SEC_OID_SHA224,
|
|
471,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 472
|
|
{SEC_OID_SHA224,
|
|
472,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59,
|
|
0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a,
|
|
0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 473
|
|
{SEC_OID_SHA224,
|
|
473,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 474
|
|
{SEC_OID_SHA224,
|
|
474,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 475
|
|
{SEC_OID_SHA224,
|
|
475,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 476
|
|
{SEC_OID_SHA224,
|
|
476,
|
|
{0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 477
|
|
{SEC_OID_SHA224,
|
|
477,
|
|
{0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 478
|
|
{SEC_OID_SHA224,
|
|
478,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 479
|
|
{SEC_OID_SHA224,
|
|
479,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 480
|
|
{SEC_OID_SHA224,
|
|
480,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 481
|
|
{SEC_OID_SHA224,
|
|
481,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 482
|
|
{SEC_OID_SHA224,
|
|
482,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0xff, 0x02, 0x82, 0x01, 0x01, 0x00,
|
|
0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a,
|
|
0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18,
|
|
0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51,
|
|
0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53,
|
|
0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87,
|
|
0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08,
|
|
0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45,
|
|
0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20,
|
|
0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00,
|
|
0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8,
|
|
0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac,
|
|
0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11,
|
|
0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7,
|
|
0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15,
|
|
0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f,
|
|
0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e,
|
|
0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a,
|
|
0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04,
|
|
0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08,
|
|
0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07,
|
|
0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39,
|
|
0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 483
|
|
{SEC_OID_SHA224,
|
|
483,
|
|
{0x30, 0x08, 0x02, 0x01, 0xff, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 484
|
|
{SEC_OID_SHA224,
|
|
484,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 485
|
|
{SEC_OID_SHA224,
|
|
485,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21,
|
|
0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 486
|
|
{SEC_OID_SHA224,
|
|
486,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 487
|
|
{SEC_OID_SHA224,
|
|
487,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 488
|
|
{SEC_OID_SHA224,
|
|
488,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 489
|
|
{SEC_OID_SHA224,
|
|
489,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 490
|
|
{SEC_OID_SHA224,
|
|
490,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 491
|
|
{SEC_OID_SHA224,
|
|
491,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 492
|
|
{SEC_OID_SHA224,
|
|
492,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 493
|
|
{SEC_OID_SHA224,
|
|
493,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 494
|
|
{SEC_OID_SHA224,
|
|
494,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 495
|
|
{SEC_OID_SHA224,
|
|
495,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x82,
|
|
0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab,
|
|
0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b,
|
|
0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06,
|
|
0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2,
|
|
0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8,
|
|
0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14,
|
|
0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62,
|
|
0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8,
|
|
0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95,
|
|
0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d,
|
|
0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4,
|
|
0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29,
|
|
0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d,
|
|
0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09,
|
|
0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6,
|
|
0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90,
|
|
0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4,
|
|
0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b,
|
|
0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4,
|
|
0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb,
|
|
0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05,
|
|
0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 496
|
|
{SEC_OID_SHA224,
|
|
496,
|
|
{0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2,
|
|
0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a,
|
|
0xb4, 0xae, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 497
|
|
{SEC_OID_SHA224,
|
|
497,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 498
|
|
{SEC_OID_SHA224,
|
|
498,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21,
|
|
0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 499
|
|
{SEC_OID_SHA224,
|
|
499,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 500
|
|
{SEC_OID_SHA224,
|
|
500,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 501
|
|
{SEC_OID_SHA224,
|
|
501,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 502
|
|
{SEC_OID_SHA224,
|
|
502,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 503
|
|
{SEC_OID_SHA224,
|
|
503,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 504
|
|
{SEC_OID_SHA224,
|
|
504,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 505
|
|
{SEC_OID_SHA224,
|
|
505,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 506
|
|
{SEC_OID_SHA224,
|
|
506,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 507
|
|
{SEC_OID_SHA224,
|
|
507,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 508
|
|
{SEC_OID_SHA224,
|
|
508,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x82,
|
|
0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab,
|
|
0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b,
|
|
0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06,
|
|
0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2,
|
|
0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8,
|
|
0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14,
|
|
0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62,
|
|
0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8,
|
|
0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95,
|
|
0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d,
|
|
0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4,
|
|
0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29,
|
|
0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d,
|
|
0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09,
|
|
0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6,
|
|
0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90,
|
|
0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4,
|
|
0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b,
|
|
0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4,
|
|
0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb,
|
|
0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05,
|
|
0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 509
|
|
{SEC_OID_SHA224,
|
|
509,
|
|
{0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2,
|
|
0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a,
|
|
0xb4, 0xaf, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 510
|
|
{SEC_OID_SHA224,
|
|
510,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 511
|
|
{SEC_OID_SHA224,
|
|
511,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 512
|
|
{SEC_OID_SHA224,
|
|
512,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 513
|
|
{SEC_OID_SHA224,
|
|
513,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 514
|
|
{SEC_OID_SHA224,
|
|
514,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 515
|
|
{SEC_OID_SHA224,
|
|
515,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 516
|
|
{SEC_OID_SHA224,
|
|
516,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 517
|
|
{SEC_OID_SHA224,
|
|
517,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 518
|
|
{SEC_OID_SHA224,
|
|
518,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 519
|
|
{SEC_OID_SHA224,
|
|
519,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 520
|
|
{SEC_OID_SHA224,
|
|
520,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 521
|
|
{SEC_OID_SHA224,
|
|
521,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 522
|
|
{SEC_OID_SHA224,
|
|
522,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc,
|
|
0xd5, 0x69, 0x5c, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 523
|
|
{SEC_OID_SHA224,
|
|
523,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 524
|
|
{SEC_OID_SHA224,
|
|
524,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 525
|
|
{SEC_OID_SHA224,
|
|
525,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 526
|
|
{SEC_OID_SHA224,
|
|
526,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 527
|
|
{SEC_OID_SHA224,
|
|
527,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 528
|
|
{SEC_OID_SHA224,
|
|
528,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 529
|
|
{SEC_OID_SHA224,
|
|
529,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 530
|
|
{SEC_OID_SHA224,
|
|
530,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 531
|
|
{SEC_OID_SHA224,
|
|
531,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 532
|
|
{SEC_OID_SHA224,
|
|
532,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 533
|
|
{SEC_OID_SHA224,
|
|
533,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 534
|
|
{SEC_OID_SHA224,
|
|
534,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 535
|
|
{SEC_OID_SHA224,
|
|
535,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc,
|
|
0xd5, 0x69, 0x5d, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 536
|
|
{SEC_OID_SHA224,
|
|
536,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 537
|
|
{SEC_OID_SHA224,
|
|
537,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 538
|
|
{SEC_OID_SHA224,
|
|
538,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 539
|
|
{SEC_OID_SHA224,
|
|
539,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 540
|
|
{SEC_OID_SHA224,
|
|
540,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 541
|
|
{SEC_OID_SHA224,
|
|
541,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 542
|
|
{SEC_OID_SHA224,
|
|
542,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 543
|
|
{SEC_OID_SHA224,
|
|
543,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 544
|
|
{SEC_OID_SHA224,
|
|
544,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 545
|
|
{SEC_OID_SHA224,
|
|
545,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 546
|
|
{SEC_OID_SHA224,
|
|
546,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 547
|
|
{SEC_OID_SHA224,
|
|
547,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 548
|
|
{SEC_OID_SHA224,
|
|
548,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc,
|
|
0xd5, 0x69, 0x5e, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 549
|
|
{SEC_OID_SHA224,
|
|
549,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 550
|
|
{SEC_OID_SHA224,
|
|
550,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 551
|
|
{SEC_OID_SHA224,
|
|
551,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 552
|
|
{SEC_OID_SHA224,
|
|
552,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 553
|
|
{SEC_OID_SHA224,
|
|
553,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 554
|
|
{SEC_OID_SHA224,
|
|
554,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 555
|
|
{SEC_OID_SHA224,
|
|
555,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 556
|
|
{SEC_OID_SHA224,
|
|
556,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 557
|
|
{SEC_OID_SHA224,
|
|
557,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 558
|
|
{SEC_OID_SHA224,
|
|
558,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 559
|
|
{SEC_OID_SHA224,
|
|
559,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 560
|
|
{SEC_OID_SHA224,
|
|
560,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 561
|
|
{SEC_OID_SHA224,
|
|
561,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 562
|
|
{SEC_OID_SHA224,
|
|
562,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 563
|
|
{SEC_OID_SHA224,
|
|
563,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 564
|
|
{SEC_OID_SHA224,
|
|
564,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 565
|
|
{SEC_OID_SHA224,
|
|
565,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 566
|
|
{SEC_OID_SHA224,
|
|
566,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 567
|
|
{SEC_OID_SHA224,
|
|
567,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 568
|
|
{SEC_OID_SHA224,
|
|
568,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 569
|
|
{SEC_OID_SHA224,
|
|
569,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 570
|
|
{SEC_OID_SHA224,
|
|
570,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 571
|
|
{SEC_OID_SHA224,
|
|
571,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 572
|
|
{SEC_OID_SHA224,
|
|
572,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 573
|
|
{SEC_OID_SHA224,
|
|
573,
|
|
{0x30, 0x82, 0x02, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa,
|
|
0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e,
|
|
0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e,
|
|
0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8,
|
|
0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0,
|
|
0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac,
|
|
0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11,
|
|
0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c,
|
|
0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10,
|
|
0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6,
|
|
0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c,
|
|
0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2,
|
|
0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81,
|
|
0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59,
|
|
0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b,
|
|
0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0,
|
|
0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1,
|
|
0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1,
|
|
0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23,
|
|
0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d,
|
|
0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe,
|
|
0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 574
|
|
{SEC_OID_SHA224,
|
|
574,
|
|
{0x30, 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 575
|
|
{SEC_OID_SHA224,
|
|
575,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 576
|
|
{SEC_OID_SHA224,
|
|
576,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0xff,
|
|
0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18,
|
|
0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 577
|
|
{SEC_OID_SHA224,
|
|
577,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 578
|
|
{SEC_OID_SHA224,
|
|
578,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 579
|
|
{SEC_OID_SHA224,
|
|
579,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 580
|
|
{SEC_OID_SHA224,
|
|
580,
|
|
{0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d,
|
|
0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd,
|
|
0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 581
|
|
{SEC_OID_SHA224,
|
|
581,
|
|
{0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d,
|
|
0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd,
|
|
0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 582
|
|
{SEC_OID_SHA224,
|
|
582,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00,
|
|
0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7,
|
|
0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 583
|
|
{SEC_OID_SHA224,
|
|
583,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00,
|
|
0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7,
|
|
0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 584
|
|
{SEC_OID_SHA224,
|
|
584,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00,
|
|
0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7,
|
|
0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 585
|
|
{SEC_OID_SHA224,
|
|
585,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x01,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 586
|
|
{SEC_OID_SHA224,
|
|
586,
|
|
{0x30, 0x82, 0x01, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x82, 0x01,
|
|
0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed,
|
|
0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf,
|
|
0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7,
|
|
0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae,
|
|
0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4,
|
|
0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3,
|
|
0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9,
|
|
0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b,
|
|
0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad,
|
|
0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64,
|
|
0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34,
|
|
0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f,
|
|
0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7,
|
|
0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98,
|
|
0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33,
|
|
0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25,
|
|
0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1,
|
|
0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66,
|
|
0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87,
|
|
0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e,
|
|
0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76,
|
|
0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 587
|
|
{SEC_OID_SHA224,
|
|
587,
|
|
{0x30, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 588
|
|
{SEC_OID_SHA224,
|
|
588,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 589
|
|
{SEC_OID_SHA224,
|
|
589,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x0c, 0x01, 0x30},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 590
|
|
{SEC_OID_SHA224,
|
|
590,
|
|
{0x30, 0x05, 0x02, 0x01, 0x01, 0x0c, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 591
|
|
{SEC_OID_SHA224,
|
|
591,
|
|
{0x30, 0x09, 0x0c, 0x02, 0x25, 0x73, 0x0c, 0x03, 0x73, 0x25, 0x73},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 592
|
|
{SEC_OID_SHA224,
|
|
592,
|
|
{0x30, 0x08, 0x02, 0x01, 0x01, 0x30, 0x03, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 593
|
|
{SEC_OID_SHA224,
|
|
593,
|
|
{0x30, 0x03, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 594
|
|
{SEC_OID_SHA224,
|
|
594,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x01, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
false},
|
|
|
|
// Comment: random signature
|
|
// tcID: 595
|
|
{SEC_OID_SHA224,
|
|
595,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x85, 0xc7, 0x71, 0xec, 0xf9, 0xc7,
|
|
0x7d, 0xeb, 0xae, 0x0c, 0x54, 0xf7, 0x49, 0xdb, 0xa4, 0xb0, 0x7a,
|
|
0xe5, 0x19, 0xca, 0x10, 0x37, 0x09, 0x1d, 0xd6, 0xf2, 0x94, 0xcf,
|
|
0x02, 0x1d, 0x00, 0xa0, 0x2f, 0x74, 0x98, 0x51, 0x98, 0xcf, 0x88,
|
|
0xe3, 0x10, 0xe5, 0x52, 0x77, 0xba, 0x59, 0x8b, 0x33, 0x61, 0x64,
|
|
0x85, 0x0f, 0xdd, 0x53, 0x08, 0xa7, 0xbe, 0xb1, 0xa7},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 596
|
|
{SEC_OID_SHA224,
|
|
596,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x04, 0x3c, 0xd5, 0x58, 0x0b, 0x8b, 0xfb,
|
|
0x59, 0x75, 0xed, 0xef, 0x13, 0x2d, 0x6d, 0xe7, 0x84, 0x80, 0x96,
|
|
0x39, 0x2e, 0x0a, 0xdf, 0x46, 0x34, 0x2b, 0xad, 0x7b, 0xb7, 0x02,
|
|
0x1c, 0x14, 0x2b, 0x65, 0x72, 0xce, 0x61, 0xb0, 0x32, 0xd4, 0x5d,
|
|
0x45, 0x97, 0xa8, 0x8c, 0x4e, 0x54, 0xdd, 0x59, 0x3f, 0xa7, 0xca,
|
|
0x6c, 0x8e, 0x68, 0x82, 0xdf, 0x77, 0xf6},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 597
|
|
{SEC_OID_SHA224,
|
|
597,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x91, 0x4e, 0x4f, 0x7b, 0xa8, 0xdf,
|
|
0x44, 0xcf, 0x63, 0xc5, 0x7d, 0x21, 0x9c, 0x6b, 0x5d, 0xa0, 0x93,
|
|
0xfe, 0x3a, 0x94, 0x60, 0x4b, 0xd2, 0xef, 0x88, 0xb6, 0x30, 0xf5,
|
|
0x02, 0x1c, 0x6a, 0x7b, 0x80, 0x4c, 0xbf, 0xc6, 0x99, 0x37, 0x90,
|
|
0x3b, 0xbd, 0x0c, 0x8f, 0x67, 0x30, 0x6a, 0x6e, 0x8b, 0xf0, 0xd0,
|
|
0x50, 0x1a, 0xe3, 0xf3, 0x19, 0x0d, 0xca, 0x19},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 598
|
|
{SEC_OID_SHA224,
|
|
598,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x0a, 0x8f, 0xfb, 0x16, 0x0d, 0xa0, 0xff,
|
|
0xe3, 0x19, 0xe7, 0xd3, 0xa5, 0xea, 0x29, 0x9f, 0x53, 0x1f, 0x84,
|
|
0x21, 0xbf, 0xdc, 0xfd, 0x6b, 0xb6, 0x6c, 0x6a, 0xdc, 0xf2, 0x02,
|
|
0x1d, 0x00, 0x8a, 0x75, 0xe2, 0xcb, 0xaa, 0x70, 0x9b, 0x2b, 0x5d,
|
|
0x81, 0xd3, 0x46, 0xf6, 0xe9, 0x0a, 0x8d, 0xc3, 0x53, 0xc5, 0x83,
|
|
0x53, 0x93, 0xb1, 0xd5, 0xa6, 0x65, 0x3f, 0x3c},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 599
|
|
{SEC_OID_SHA224,
|
|
599,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xa7, 0xf1, 0x64, 0xd3, 0x2f, 0x44,
|
|
0x68, 0x4f, 0xcd, 0xe8, 0x9f, 0x0f, 0xa9, 0x64, 0x71, 0x28, 0xbc,
|
|
0x0c, 0x29, 0x0f, 0x08, 0xc9, 0xb9, 0xe6, 0xf7, 0xdb, 0x3f, 0xe1,
|
|
0x02, 0x1c, 0x2d, 0xca, 0x34, 0xdb, 0x2f, 0x32, 0x0c, 0x95, 0xde,
|
|
0x4e, 0x9d, 0xe4, 0x98, 0x6b, 0xbf, 0x50, 0x86, 0x07, 0x53, 0xd5,
|
|
0xde, 0xb7, 0x28, 0x23, 0x76, 0x78, 0xaf, 0xb6},
|
|
kPubKey3,
|
|
{0x48, 0x65, 0x6c, 0x6c, 0x6f},
|
|
true},
|
|
|
|
// Comment: r,s = 1,1
|
|
// tcID: 600
|
|
{SEC_OID_SHA224,
|
|
600,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey4,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: r,s = 1,5
|
|
// tcID: 601
|
|
{SEC_OID_SHA224,
|
|
601,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x05},
|
|
kPubKey4,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: u2 small
|
|
// tcID: 602
|
|
{SEC_OID_SHA224,
|
|
602,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0x95, 0x92, 0x12, 0x1e,
|
|
0xd1, 0x2d, 0x93, 0x19, 0x7f, 0x1f, 0xfb, 0x86, 0x3a, 0xc6, 0x39, 0x37,
|
|
0xf2, 0x8e, 0xf4, 0xf6, 0x2f, 0x1e, 0x00, 0x9a, 0x30, 0xaa, 0xba, 0xb1},
|
|
kPubKey4,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: s == q-1
|
|
// tcID: 603
|
|
{SEC_OID_SHA224,
|
|
603,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey4,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: s == 1
|
|
// tcID: 604
|
|
{SEC_OID_SHA224,
|
|
604,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5a, 0x25, 0x2f, 0x4f, 0xc5, 0x56, 0x18, 0x74,
|
|
0x7f, 0xd9, 0x4b, 0x13, 0xc9, 0xbe, 0xe6, 0x2b, 0xb9, 0x58, 0xd8, 0x57,
|
|
0x77, 0xcb, 0x07, 0xdd, 0x90, 0x71, 0x0d, 0x24, 0x02, 0x01, 0x01},
|
|
kPubKey5,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: Legacy:ASN encoding of r misses leading 0
|
|
// tcID: 605
|
|
{SEC_OID_SHA256,
|
|
605,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e,
|
|
0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14,
|
|
0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: valid
|
|
// tcID: 606
|
|
{SEC_OID_SHA256,
|
|
606,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: long form encoding of length of sequence
|
|
// tcID: 607
|
|
{SEC_OID_SHA256,
|
|
607,
|
|
{0x30, 0x81, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a,
|
|
0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of sequence contains leading 0
|
|
// tcID: 608
|
|
{SEC_OID_SHA256,
|
|
608,
|
|
{0x30, 0x82, 0x00, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1,
|
|
0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: wrong length of sequence
|
|
// tcID: 609
|
|
{SEC_OID_SHA256,
|
|
609,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: wrong length of sequence
|
|
// tcID: 610
|
|
{SEC_OID_SHA256,
|
|
610,
|
|
{0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of sequence
|
|
// tcID: 611
|
|
{SEC_OID_SHA256,
|
|
611,
|
|
{0x30, 0x85, 0x01, 0x00, 0x00, 0x00, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f,
|
|
0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3,
|
|
0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of sequence
|
|
// tcID: 612
|
|
{SEC_OID_SHA256,
|
|
612,
|
|
{0x30, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3d, 0x02,
|
|
0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84,
|
|
0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6,
|
|
0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47,
|
|
0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54,
|
|
0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**31 - 1
|
|
// tcID: 613
|
|
{SEC_OID_SHA256,
|
|
613,
|
|
{0x30, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**32 - 1
|
|
// tcID: 614
|
|
{SEC_OID_SHA256,
|
|
614,
|
|
{0x30, 0x84, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**40 - 1
|
|
// tcID: 615
|
|
{SEC_OID_SHA256,
|
|
615,
|
|
{0x30, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f,
|
|
0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3,
|
|
0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of sequence = 2**64 - 1
|
|
// tcID: 616
|
|
{SEC_OID_SHA256,
|
|
616,
|
|
{0x30, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1d,
|
|
0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae,
|
|
0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06,
|
|
0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: incorrect length of sequence
|
|
// tcID: 617
|
|
{SEC_OID_SHA256,
|
|
617,
|
|
{0x30, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 618
|
|
{SEC_OID_SHA256,
|
|
618,
|
|
{0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 619
|
|
{SEC_OID_SHA256,
|
|
619,
|
|
{0x30, 0x3d, 0x02, 0x80, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length without termination
|
|
// tcID: 620
|
|
{SEC_OID_SHA256,
|
|
620,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x80, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: removing sequence
|
|
// tcID: 621
|
|
{SEC_OID_SHA256, 621, {}, kPubKey3, {0x54, 0x65, 0x73, 0x74}, false},
|
|
|
|
// Comment: lonely sequence tag
|
|
// tcID: 622
|
|
{SEC_OID_SHA256, 622, {0x30}, kPubKey3, {0x54, 0x65, 0x73, 0x74}, false},
|
|
|
|
// Comment: appending 0's to sequence
|
|
// tcID: 623
|
|
{SEC_OID_SHA256,
|
|
623,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: prepending 0's to sequence
|
|
// tcID: 624
|
|
{SEC_OID_SHA256,
|
|
624,
|
|
{0x30, 0x3f, 0x00, 0x00, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1,
|
|
0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: appending unused 0's to sequence
|
|
// tcID: 625
|
|
{SEC_OID_SHA256,
|
|
625,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: appending null value to sequence
|
|
// tcID: 626
|
|
{SEC_OID_SHA256,
|
|
626,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x05, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 627
|
|
{SEC_OID_SHA256,
|
|
627,
|
|
{0x30, 0x42, 0x49, 0x81, 0x77, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f,
|
|
0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3,
|
|
0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 628
|
|
{SEC_OID_SHA256,
|
|
628,
|
|
{0x30, 0x41, 0x25, 0x00, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 629
|
|
{SEC_OID_SHA256,
|
|
629,
|
|
{0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c,
|
|
0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b,
|
|
0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 630
|
|
{SEC_OID_SHA256,
|
|
630,
|
|
{0x30, 0x42, 0x22, 0x22, 0x49, 0x81, 0x77, 0x02, 0x1d, 0x00, 0x9b, 0x6f,
|
|
0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3,
|
|
0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 631
|
|
{SEC_OID_SHA256,
|
|
631,
|
|
{0x30, 0x41, 0x22, 0x21, 0x25, 0x00, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 632
|
|
{SEC_OID_SHA256,
|
|
632,
|
|
{0x30, 0x45, 0x22, 0x1f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x00,
|
|
0x04, 0xde, 0xad, 0xbe, 0xef, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 633
|
|
{SEC_OID_SHA256,
|
|
633,
|
|
{0x30, 0x42, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x21, 0x49,
|
|
0x81, 0x77, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 634
|
|
{SEC_OID_SHA256,
|
|
634,
|
|
{0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x20, 0x25,
|
|
0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including garbage
|
|
// tcID: 635
|
|
{SEC_OID_SHA256,
|
|
635,
|
|
{0x30, 0x45, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x1e, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c,
|
|
0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b,
|
|
0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 636
|
|
{SEC_OID_SHA256,
|
|
636,
|
|
{0x30, 0x45, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x30, 0x3d, 0x02, 0x1d,
|
|
0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae,
|
|
0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06,
|
|
0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 637
|
|
{SEC_OID_SHA256,
|
|
637,
|
|
{0x30, 0x43, 0xaa, 0x02, 0xaa, 0xbb, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b,
|
|
0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a,
|
|
0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73,
|
|
0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 638
|
|
{SEC_OID_SHA256,
|
|
638,
|
|
{0x30, 0x45, 0x22, 0x25, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1d,
|
|
0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae,
|
|
0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06,
|
|
0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 639
|
|
{SEC_OID_SHA256,
|
|
639,
|
|
{0x30, 0x43, 0x22, 0x23, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x1d, 0x00, 0x9b,
|
|
0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a,
|
|
0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73,
|
|
0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 640
|
|
{SEC_OID_SHA256,
|
|
640,
|
|
{0x30, 0x45, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x24, 0xaa,
|
|
0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: including undefined tags
|
|
// tcID: 641
|
|
{SEC_OID_SHA256,
|
|
641,
|
|
{0x30, 0x43, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x22, 0xaa,
|
|
0x02, 0xaa, 0xbb, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated length of sequence
|
|
// tcID: 642
|
|
{SEC_OID_SHA256,
|
|
642,
|
|
{0x30, 0x81},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 643
|
|
{SEC_OID_SHA256,
|
|
643,
|
|
{0x30, 0x80, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c,
|
|
0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b,
|
|
0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 644
|
|
{SEC_OID_SHA256,
|
|
644,
|
|
{0x30, 0x41, 0x22, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x00,
|
|
0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition with indefinite length
|
|
// tcID: 645
|
|
{SEC_OID_SHA256,
|
|
645,
|
|
{0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x80, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c,
|
|
0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b,
|
|
0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 646
|
|
{SEC_OID_SHA256,
|
|
646,
|
|
{0x30, 0x80, 0x31, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c,
|
|
0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b,
|
|
0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 647
|
|
{SEC_OID_SHA256,
|
|
647,
|
|
{0x30, 0x41, 0x22, 0x80, 0x03, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x00,
|
|
0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition with wrong tag
|
|
// tcID: 648
|
|
{SEC_OID_SHA256,
|
|
648,
|
|
{0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x80, 0x03,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c,
|
|
0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b,
|
|
0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Replacing sequence with NULL
|
|
// tcID: 649
|
|
{SEC_OID_SHA256,
|
|
649,
|
|
{0x05, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 650
|
|
{SEC_OID_SHA256,
|
|
650,
|
|
{0x2e, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 651
|
|
{SEC_OID_SHA256,
|
|
651,
|
|
{0x2f, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 652
|
|
{SEC_OID_SHA256,
|
|
652,
|
|
{0x31, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 653
|
|
{SEC_OID_SHA256,
|
|
653,
|
|
{0x32, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of sequence
|
|
// tcID: 654
|
|
{SEC_OID_SHA256,
|
|
654,
|
|
{0xff, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: dropping value of sequence
|
|
// tcID: 655
|
|
{SEC_OID_SHA256,
|
|
655,
|
|
{0x30, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition for sequence
|
|
// tcID: 656
|
|
{SEC_OID_SHA256,
|
|
656,
|
|
{0x30, 0x41, 0x30, 0x01, 0x02, 0x30, 0x3c, 0x1d, 0x00, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated sequence
|
|
// tcID: 657
|
|
{SEC_OID_SHA256,
|
|
657,
|
|
{0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated sequence
|
|
// tcID: 658
|
|
{SEC_OID_SHA256,
|
|
658,
|
|
{0x30, 0x3c, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e,
|
|
0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14,
|
|
0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length
|
|
// tcID: 659
|
|
{SEC_OID_SHA256,
|
|
659,
|
|
{0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length with truncated delimiter
|
|
// tcID: 660
|
|
{SEC_OID_SHA256,
|
|
660,
|
|
{0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length with additional element
|
|
// tcID: 661
|
|
{SEC_OID_SHA256,
|
|
661,
|
|
{0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f,
|
|
0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6,
|
|
0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb,
|
|
0x42, 0xb1, 0x16, 0x05, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length with truncated element
|
|
// tcID: 662
|
|
{SEC_OID_SHA256,
|
|
662,
|
|
{0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f,
|
|
0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6,
|
|
0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb,
|
|
0x42, 0xb1, 0x16, 0x06, 0x08, 0x11, 0x22, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length with garbage
|
|
// tcID: 663
|
|
{SEC_OID_SHA256,
|
|
663,
|
|
{0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f,
|
|
0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6,
|
|
0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb,
|
|
0x42, 0xb1, 0x16, 0x00, 0x00, 0xfe, 0x02, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: indefinite length with nonempty EOC
|
|
// tcID: 664
|
|
{SEC_OID_SHA256,
|
|
664,
|
|
{0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f,
|
|
0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6,
|
|
0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb,
|
|
0x42, 0xb1, 0x16, 0x00, 0x02, 0xbe, 0xef},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: prepend empty sequence
|
|
// tcID: 665
|
|
{SEC_OID_SHA256,
|
|
665,
|
|
{0x30, 0x3f, 0x30, 0x00, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1,
|
|
0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: append empty sequence
|
|
// tcID: 666
|
|
{SEC_OID_SHA256,
|
|
666,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x30, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: append garbage with high tag number
|
|
// tcID: 667
|
|
{SEC_OID_SHA256,
|
|
667,
|
|
{0x30, 0x40, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0xbf, 0x7f, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: sequence of sequence
|
|
// tcID: 668
|
|
{SEC_OID_SHA256,
|
|
668,
|
|
{0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1,
|
|
0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated sequence: removed last 1 elements
|
|
// tcID: 669
|
|
{SEC_OID_SHA256,
|
|
669,
|
|
{0x30, 0x1f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: repeating element in sequence
|
|
// tcID: 670
|
|
{SEC_OID_SHA256,
|
|
670,
|
|
{0x30, 0x5b, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f,
|
|
0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6,
|
|
0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb,
|
|
0x42, 0xb1, 0x16, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: long form encoding of length of integer
|
|
// tcID: 671
|
|
{SEC_OID_SHA256,
|
|
671,
|
|
{0x30, 0x3e, 0x02, 0x81, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a,
|
|
0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: long form encoding of length of integer
|
|
// tcID: 672
|
|
{SEC_OID_SHA256,
|
|
672,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x81, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer contains leading 0
|
|
// tcID: 673
|
|
{SEC_OID_SHA256,
|
|
673,
|
|
{0x30, 0x3f, 0x02, 0x82, 0x00, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1,
|
|
0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer contains leading 0
|
|
// tcID: 674
|
|
{SEC_OID_SHA256,
|
|
674,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x82, 0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 675
|
|
{SEC_OID_SHA256,
|
|
675,
|
|
{0x30, 0x3d, 0x02, 0x1e, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 676
|
|
{SEC_OID_SHA256,
|
|
676,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 677
|
|
{SEC_OID_SHA256,
|
|
677,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1d, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: wrong length of integer
|
|
// tcID: 678
|
|
{SEC_OID_SHA256,
|
|
678,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1b, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of integer
|
|
// tcID: 679
|
|
{SEC_OID_SHA256,
|
|
679,
|
|
{0x30, 0x42, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x1d, 0x00, 0x9b, 0x6f,
|
|
0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3,
|
|
0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: uint32 overflow in length of integer
|
|
// tcID: 680
|
|
{SEC_OID_SHA256,
|
|
680,
|
|
{0x30, 0x42, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x85, 0x01,
|
|
0x00, 0x00, 0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of integer
|
|
// tcID: 681
|
|
{SEC_OID_SHA256,
|
|
681,
|
|
{0x30, 0x46, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84,
|
|
0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6,
|
|
0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47,
|
|
0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54,
|
|
0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: uint64 overflow in length of integer
|
|
// tcID: 682
|
|
{SEC_OID_SHA256,
|
|
682,
|
|
{0x30, 0x46, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x89, 0x01,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47,
|
|
0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54,
|
|
0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**31 - 1
|
|
// tcID: 683
|
|
{SEC_OID_SHA256,
|
|
683,
|
|
{0x30, 0x41, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x00, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**31 - 1
|
|
// tcID: 684
|
|
{SEC_OID_SHA256,
|
|
684,
|
|
{0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x84, 0x7f,
|
|
0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**32 - 1
|
|
// tcID: 685
|
|
{SEC_OID_SHA256,
|
|
685,
|
|
{0x30, 0x41, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x00, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**32 - 1
|
|
// tcID: 686
|
|
{SEC_OID_SHA256,
|
|
686,
|
|
{0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x84, 0xff,
|
|
0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**40 - 1
|
|
// tcID: 687
|
|
{SEC_OID_SHA256,
|
|
687,
|
|
{0x30, 0x42, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x9b, 0x6f,
|
|
0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3,
|
|
0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**40 - 1
|
|
// tcID: 688
|
|
{SEC_OID_SHA256,
|
|
688,
|
|
{0x30, 0x42, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x85, 0xff,
|
|
0xff, 0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**64 - 1
|
|
// tcID: 689
|
|
{SEC_OID_SHA256,
|
|
689,
|
|
{0x30, 0x45, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae,
|
|
0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06,
|
|
0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: length of integer = 2**64 - 1
|
|
// tcID: 690
|
|
{SEC_OID_SHA256,
|
|
690,
|
|
{0x30, 0x45, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x88, 0xff,
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: incorrect length of integer
|
|
// tcID: 691
|
|
{SEC_OID_SHA256,
|
|
691,
|
|
{0x30, 0x3d, 0x02, 0xff, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: incorrect length of integer
|
|
// tcID: 692
|
|
{SEC_OID_SHA256,
|
|
692,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: removing integer
|
|
// tcID: 693
|
|
{SEC_OID_SHA256,
|
|
693,
|
|
{0x30, 0x1e, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: lonely integer tag
|
|
// tcID: 694
|
|
{SEC_OID_SHA256,
|
|
694,
|
|
{0x30, 0x1f, 0x02, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6,
|
|
0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: lonely integer tag
|
|
// tcID: 695
|
|
{SEC_OID_SHA256,
|
|
695,
|
|
{0x30, 0x20, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: appending 0's to integer
|
|
// tcID: 696
|
|
{SEC_OID_SHA256,
|
|
696,
|
|
{0x30, 0x3f, 0x02, 0x1f, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x00, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: appending 0's to integer
|
|
// tcID: 697
|
|
{SEC_OID_SHA256,
|
|
697,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1e, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: prepending 0's to integer
|
|
// tcID: 698
|
|
{SEC_OID_SHA256,
|
|
698,
|
|
{0x30, 0x3f, 0x02, 0x1f, 0x00, 0x00, 0x00, 0x9b, 0x6f, 0xe4, 0xa1,
|
|
0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5,
|
|
0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: prepending 0's to integer
|
|
// tcID: 699
|
|
{SEC_OID_SHA256,
|
|
699,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1e, 0x00, 0x00, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: appending unused 0's to integer
|
|
// tcID: 700
|
|
{SEC_OID_SHA256,
|
|
700,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x00, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: appending null value to integer
|
|
// tcID: 701
|
|
{SEC_OID_SHA256,
|
|
701,
|
|
{0x30, 0x3f, 0x02, 0x1f, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x05, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f,
|
|
0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: appending null value to integer
|
|
// tcID: 702
|
|
{SEC_OID_SHA256,
|
|
702,
|
|
{0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1e, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x05, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated length of integer
|
|
// tcID: 703
|
|
{SEC_OID_SHA256,
|
|
703,
|
|
{0x30, 0x20, 0x02, 0x81, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6,
|
|
0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated length of integer
|
|
// tcID: 704
|
|
{SEC_OID_SHA256,
|
|
704,
|
|
{0x30, 0x21, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x81},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Replacing integer with NULL
|
|
// tcID: 705
|
|
{SEC_OID_SHA256,
|
|
705,
|
|
{0x30, 0x20, 0x05, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6,
|
|
0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Replacing integer with NULL
|
|
// tcID: 706
|
|
{SEC_OID_SHA256,
|
|
706,
|
|
{0x30, 0x21, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x05, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 707
|
|
{SEC_OID_SHA256,
|
|
707,
|
|
{0x30, 0x3d, 0x00, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 708
|
|
{SEC_OID_SHA256,
|
|
708,
|
|
{0x30, 0x3d, 0x01, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 709
|
|
{SEC_OID_SHA256,
|
|
709,
|
|
{0x30, 0x3d, 0x03, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 710
|
|
{SEC_OID_SHA256,
|
|
710,
|
|
{0x30, 0x3d, 0x04, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 711
|
|
{SEC_OID_SHA256,
|
|
711,
|
|
{0x30, 0x3d, 0xff, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 712
|
|
{SEC_OID_SHA256,
|
|
712,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 713
|
|
{SEC_OID_SHA256,
|
|
713,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x01, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 714
|
|
{SEC_OID_SHA256,
|
|
714,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x03, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 715
|
|
{SEC_OID_SHA256,
|
|
715,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x04, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: changing tag value of integer
|
|
// tcID: 716
|
|
{SEC_OID_SHA256,
|
|
716,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0xff, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: dropping value of integer
|
|
// tcID: 717
|
|
{SEC_OID_SHA256,
|
|
717,
|
|
{0x30, 0x20, 0x02, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6,
|
|
0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48,
|
|
0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: dropping value of integer
|
|
// tcID: 718
|
|
{SEC_OID_SHA256,
|
|
718,
|
|
{0x30, 0x21, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition for integer
|
|
// tcID: 719
|
|
{SEC_OID_SHA256,
|
|
719,
|
|
{0x30, 0x41, 0x22, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x9b, 0x6f, 0xe4,
|
|
0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13,
|
|
0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: using composition for integer
|
|
// tcID: 720
|
|
{SEC_OID_SHA256,
|
|
720,
|
|
{0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x20, 0x02,
|
|
0x01, 0x5f, 0x02, 0x1b, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: modify first byte of integer
|
|
// tcID: 721
|
|
{SEC_OID_SHA256,
|
|
721,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x02, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: modify first byte of integer
|
|
// tcID: 722
|
|
{SEC_OID_SHA256,
|
|
722,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5d, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: modify last byte of integer
|
|
// tcID: 723
|
|
{SEC_OID_SHA256,
|
|
723,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x13,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: modify last byte of integer
|
|
// tcID: 724
|
|
{SEC_OID_SHA256,
|
|
724,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x96},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 725
|
|
{SEC_OID_SHA256,
|
|
725,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14,
|
|
0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 726
|
|
{SEC_OID_SHA256,
|
|
726,
|
|
{0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1b, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: truncated integer
|
|
// tcID: 727
|
|
{SEC_OID_SHA256,
|
|
727,
|
|
{0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1b, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14,
|
|
0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: leading ff in integer
|
|
// tcID: 728
|
|
{SEC_OID_SHA256,
|
|
728,
|
|
{0x30, 0x3e, 0x02, 0x1e, 0xff, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb,
|
|
0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a,
|
|
0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee,
|
|
0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: leading ff in integer
|
|
// tcID: 729
|
|
{SEC_OID_SHA256,
|
|
729,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1d, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: replaced integer by infinity
|
|
// tcID: 730
|
|
{SEC_OID_SHA256,
|
|
730,
|
|
{0x30, 0x21, 0x09, 0x01, 0x80, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: replaced integer by infinity
|
|
// tcID: 731
|
|
{SEC_OID_SHA256,
|
|
731,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x09, 0x01, 0x80},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: replacing integer with zero
|
|
// tcID: 732
|
|
{SEC_OID_SHA256,
|
|
732,
|
|
{0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11,
|
|
0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70,
|
|
0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: replacing integer with zero
|
|
// tcID: 733
|
|
{SEC_OID_SHA256,
|
|
733,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46,
|
|
0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61,
|
|
0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 734
|
|
{SEC_OID_SHA256,
|
|
734,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x01, 0x56, 0x66, 0x7b, 0x48, 0x51, 0x4d,
|
|
0x3e, 0x5d, 0x54, 0x6c, 0xa8, 0x9f, 0xf4, 0x5a, 0xda, 0x90, 0x47,
|
|
0x41, 0x13, 0xed, 0x24, 0x8b, 0x87, 0x34, 0x30, 0xab, 0x57, 0xf0,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 735
|
|
{SEC_OID_SHA256,
|
|
735,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0xe0, 0x79, 0x4d, 0xfb, 0x46, 0x5b, 0x4e,
|
|
0x9d, 0x96, 0x9c, 0xb3, 0xd0, 0x61, 0x6b, 0x4b, 0x84, 0x68, 0xdb,
|
|
0xaf, 0x85, 0xae, 0xc0, 0x85, 0xb2, 0xb7, 0x00, 0x85, 0x36, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14,
|
|
0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 736
|
|
{SEC_OID_SHA256,
|
|
736,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0xff, 0x64, 0x90, 0x1b, 0x5e, 0x34, 0x2b,
|
|
0xb9, 0x82, 0x8a, 0x7b, 0x51, 0xc7, 0xd5, 0x1c, 0xec, 0xf5, 0xa7,
|
|
0xf1, 0x9e, 0x46, 0x96, 0x59, 0xf9, 0x8c, 0x8c, 0x2a, 0x11, 0x6d,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 737
|
|
{SEC_OID_SHA256,
|
|
737,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x1f, 0x86, 0xb2, 0x04, 0xb9, 0xa4, 0xb1,
|
|
0x62, 0x69, 0x63, 0x4c, 0x2f, 0x9e, 0x94, 0xb4, 0x7b, 0x97, 0x24,
|
|
0x50, 0x7a, 0x51, 0x3f, 0x7a, 0x4d, 0x48, 0xff, 0x7a, 0xca, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14,
|
|
0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 738
|
|
{SEC_OID_SHA256,
|
|
738,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0xfe, 0xa9, 0x99, 0x84, 0xb7, 0xae, 0xb2,
|
|
0xc1, 0xa2, 0xab, 0x93, 0x57, 0x60, 0x0b, 0xa5, 0x25, 0x6f, 0xb8,
|
|
0xbe, 0xec, 0x12, 0xdb, 0x74, 0x78, 0xcb, 0xcf, 0x54, 0xa8, 0x10,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 739
|
|
{SEC_OID_SHA256,
|
|
739,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x01, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4,
|
|
0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38,
|
|
0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 740
|
|
{SEC_OID_SHA256,
|
|
740,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x64, 0x90, 0x1b, 0x5e, 0x34, 0x2b, 0xb9,
|
|
0x82, 0x8a, 0x7b, 0x51, 0xc7, 0xd5, 0x1c, 0xec, 0xf5, 0xa7, 0xf1,
|
|
0x9e, 0x46, 0x96, 0x59, 0xf9, 0x8c, 0x8c, 0x2a, 0x11, 0x6d, 0x02,
|
|
0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14,
|
|
0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c,
|
|
0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 741
|
|
{SEC_OID_SHA256,
|
|
741,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1d, 0x01, 0x1a, 0xde, 0xb9, 0xed, 0x97, 0x4f, 0x87, 0x8d,
|
|
0xc2, 0xfc, 0x26, 0xf4, 0xbf, 0x86, 0xff, 0xda, 0x5f, 0x7a, 0xbe,
|
|
0x6c, 0x26, 0xeb, 0xab, 0xf9, 0xb8, 0x18, 0x1a, 0x73},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 742
|
|
{SEC_OID_SHA256,
|
|
742,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0xa4, 0xf1, 0x8c, 0xa0, 0x8c, 0x5d, 0x97, 0xce, 0x05,
|
|
0x2c, 0x32, 0x25, 0x2c, 0x97, 0x70, 0xce, 0x81, 0x15, 0x5a, 0x04,
|
|
0xb1, 0x20, 0xaa, 0x78, 0x3e, 0x6d, 0x47, 0xb9},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 743
|
|
{SEC_OID_SHA256,
|
|
743,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0xa0, 0x17, 0xdc, 0xb8, 0xee, 0x29, 0x70, 0x52, 0x1b,
|
|
0xeb, 0xd3, 0x73, 0x09, 0xf0, 0xc7, 0xab, 0x8f, 0xb7, 0xf3, 0xc7,
|
|
0x93, 0xf9, 0xd4, 0xc7, 0x04, 0xbd, 0x4e, 0xea},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 744
|
|
{SEC_OID_SHA256,
|
|
744,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1c, 0x5b, 0x0e, 0x73, 0x5f, 0x73, 0xa2, 0x68, 0x31, 0xfa,
|
|
0xd3, 0xcd, 0xda, 0xd3, 0x68, 0x8f, 0x31, 0x7e, 0xea, 0xa5, 0xfb,
|
|
0x4e, 0xdf, 0x55, 0x87, 0xc1, 0x92, 0xb8, 0x47},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 745
|
|
{SEC_OID_SHA256,
|
|
745,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1d, 0xfe, 0xe5, 0x21, 0x46, 0x12, 0x68, 0xb0, 0x78, 0x72,
|
|
0x3d, 0x03, 0xd9, 0x0b, 0x40, 0x79, 0x00, 0x25, 0xa0, 0x85, 0x41,
|
|
0x93, 0xd9, 0x14, 0x54, 0x06, 0x47, 0xe7, 0xe5, 0x8d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 746
|
|
{SEC_OID_SHA256,
|
|
746,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1d, 0x01, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad,
|
|
0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c,
|
|
0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Modified r or s, e.g. by adding or subtracting the group order
|
|
// tcID: 747
|
|
{SEC_OID_SHA256,
|
|
747,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4,
|
|
0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58,
|
|
0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93,
|
|
0x02, 0x1d, 0x00, 0xa0, 0x17, 0xdc, 0xb8, 0xee, 0x29, 0x70, 0x52,
|
|
0x1b, 0xeb, 0xd3, 0x73, 0x09, 0xf0, 0xc7, 0xab, 0x8f, 0xb7, 0xf3,
|
|
0xc7, 0x93, 0xf9, 0xd4, 0xc7, 0x04, 0xbd, 0x4e, 0xea},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 748
|
|
{SEC_OID_SHA256,
|
|
748,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59,
|
|
0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a,
|
|
0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 749
|
|
{SEC_OID_SHA256,
|
|
749,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 750
|
|
{SEC_OID_SHA256,
|
|
750,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 751
|
|
{SEC_OID_SHA256,
|
|
751,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 752
|
|
{SEC_OID_SHA256,
|
|
752,
|
|
{0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 753
|
|
{SEC_OID_SHA256,
|
|
753,
|
|
{0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 754
|
|
{SEC_OID_SHA256,
|
|
754,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 755
|
|
{SEC_OID_SHA256,
|
|
755,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 756
|
|
{SEC_OID_SHA256,
|
|
756,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 757
|
|
{SEC_OID_SHA256,
|
|
757,
|
|
{0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 758
|
|
{SEC_OID_SHA256,
|
|
758,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00,
|
|
0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a,
|
|
0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18,
|
|
0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51,
|
|
0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53,
|
|
0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87,
|
|
0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08,
|
|
0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45,
|
|
0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20,
|
|
0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00,
|
|
0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8,
|
|
0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac,
|
|
0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11,
|
|
0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7,
|
|
0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15,
|
|
0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f,
|
|
0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e,
|
|
0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a,
|
|
0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04,
|
|
0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08,
|
|
0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07,
|
|
0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39,
|
|
0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 759
|
|
{SEC_OID_SHA256,
|
|
759,
|
|
{0x30, 0x08, 0x02, 0x01, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 760
|
|
{SEC_OID_SHA256,
|
|
760,
|
|
{0x30, 0x06, 0x02, 0x01, 0x00, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 761
|
|
{SEC_OID_SHA256,
|
|
761,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59,
|
|
0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a,
|
|
0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 762
|
|
{SEC_OID_SHA256,
|
|
762,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 763
|
|
{SEC_OID_SHA256,
|
|
763,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 764
|
|
{SEC_OID_SHA256,
|
|
764,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 765
|
|
{SEC_OID_SHA256,
|
|
765,
|
|
{0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 766
|
|
{SEC_OID_SHA256,
|
|
766,
|
|
{0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 767
|
|
{SEC_OID_SHA256,
|
|
767,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 768
|
|
{SEC_OID_SHA256,
|
|
768,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 769
|
|
{SEC_OID_SHA256,
|
|
769,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 770
|
|
{SEC_OID_SHA256,
|
|
770,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 771
|
|
{SEC_OID_SHA256,
|
|
771,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x01, 0x02, 0x82, 0x01, 0x01, 0x00,
|
|
0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a,
|
|
0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18,
|
|
0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51,
|
|
0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53,
|
|
0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87,
|
|
0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08,
|
|
0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45,
|
|
0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20,
|
|
0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00,
|
|
0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8,
|
|
0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac,
|
|
0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11,
|
|
0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7,
|
|
0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15,
|
|
0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f,
|
|
0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e,
|
|
0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a,
|
|
0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04,
|
|
0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08,
|
|
0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07,
|
|
0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39,
|
|
0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 772
|
|
{SEC_OID_SHA256,
|
|
772,
|
|
{0x30, 0x08, 0x02, 0x01, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 773
|
|
{SEC_OID_SHA256,
|
|
773,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 774
|
|
{SEC_OID_SHA256,
|
|
774,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59,
|
|
0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a,
|
|
0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 775
|
|
{SEC_OID_SHA256,
|
|
775,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 776
|
|
{SEC_OID_SHA256,
|
|
776,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 777
|
|
{SEC_OID_SHA256,
|
|
777,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 778
|
|
{SEC_OID_SHA256,
|
|
778,
|
|
{0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 779
|
|
{SEC_OID_SHA256,
|
|
779,
|
|
{0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42,
|
|
0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7,
|
|
0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 780
|
|
{SEC_OID_SHA256,
|
|
780,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 781
|
|
{SEC_OID_SHA256,
|
|
781,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 782
|
|
{SEC_OID_SHA256,
|
|
782,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 783
|
|
{SEC_OID_SHA256,
|
|
783,
|
|
{0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 784
|
|
{SEC_OID_SHA256,
|
|
784,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0xff, 0x02, 0x82, 0x01, 0x01, 0x00,
|
|
0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a,
|
|
0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18,
|
|
0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51,
|
|
0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53,
|
|
0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87,
|
|
0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08,
|
|
0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45,
|
|
0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20,
|
|
0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00,
|
|
0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8,
|
|
0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac,
|
|
0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11,
|
|
0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7,
|
|
0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15,
|
|
0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f,
|
|
0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e,
|
|
0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a,
|
|
0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04,
|
|
0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08,
|
|
0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07,
|
|
0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39,
|
|
0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 785
|
|
{SEC_OID_SHA256,
|
|
785,
|
|
{0x30, 0x08, 0x02, 0x01, 0xff, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 786
|
|
{SEC_OID_SHA256,
|
|
786,
|
|
{0x30, 0x06, 0x02, 0x01, 0xff, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 787
|
|
{SEC_OID_SHA256,
|
|
787,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21,
|
|
0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 788
|
|
{SEC_OID_SHA256,
|
|
788,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 789
|
|
{SEC_OID_SHA256,
|
|
789,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 790
|
|
{SEC_OID_SHA256,
|
|
790,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 791
|
|
{SEC_OID_SHA256,
|
|
791,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 792
|
|
{SEC_OID_SHA256,
|
|
792,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 793
|
|
{SEC_OID_SHA256,
|
|
793,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 794
|
|
{SEC_OID_SHA256,
|
|
794,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 795
|
|
{SEC_OID_SHA256,
|
|
795,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 796
|
|
{SEC_OID_SHA256,
|
|
796,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02,
|
|
0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 797
|
|
{SEC_OID_SHA256,
|
|
797,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x82,
|
|
0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab,
|
|
0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b,
|
|
0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06,
|
|
0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2,
|
|
0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8,
|
|
0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14,
|
|
0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62,
|
|
0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8,
|
|
0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95,
|
|
0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d,
|
|
0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4,
|
|
0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29,
|
|
0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d,
|
|
0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09,
|
|
0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6,
|
|
0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90,
|
|
0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4,
|
|
0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b,
|
|
0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4,
|
|
0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb,
|
|
0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05,
|
|
0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 798
|
|
{SEC_OID_SHA256,
|
|
798,
|
|
{0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2,
|
|
0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a,
|
|
0xb4, 0xae, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 799
|
|
{SEC_OID_SHA256,
|
|
799,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 800
|
|
{SEC_OID_SHA256,
|
|
800,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21,
|
|
0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 801
|
|
{SEC_OID_SHA256,
|
|
801,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 802
|
|
{SEC_OID_SHA256,
|
|
802,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 803
|
|
{SEC_OID_SHA256,
|
|
803,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 804
|
|
{SEC_OID_SHA256,
|
|
804,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 805
|
|
{SEC_OID_SHA256,
|
|
805,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73,
|
|
0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 806
|
|
{SEC_OID_SHA256,
|
|
806,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 807
|
|
{SEC_OID_SHA256,
|
|
807,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 808
|
|
{SEC_OID_SHA256,
|
|
808,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde,
|
|
0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 809
|
|
{SEC_OID_SHA256,
|
|
809,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b,
|
|
0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02,
|
|
0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 810
|
|
{SEC_OID_SHA256,
|
|
810,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99,
|
|
0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x82,
|
|
0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab,
|
|
0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b,
|
|
0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06,
|
|
0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2,
|
|
0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8,
|
|
0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14,
|
|
0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62,
|
|
0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8,
|
|
0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95,
|
|
0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d,
|
|
0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4,
|
|
0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29,
|
|
0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d,
|
|
0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09,
|
|
0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6,
|
|
0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90,
|
|
0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4,
|
|
0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b,
|
|
0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4,
|
|
0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb,
|
|
0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05,
|
|
0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 811
|
|
{SEC_OID_SHA256,
|
|
811,
|
|
{0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc,
|
|
0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2,
|
|
0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a,
|
|
0xb4, 0xaf, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 812
|
|
{SEC_OID_SHA256,
|
|
812,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef,
|
|
0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 813
|
|
{SEC_OID_SHA256,
|
|
813,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 814
|
|
{SEC_OID_SHA256,
|
|
814,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 815
|
|
{SEC_OID_SHA256,
|
|
815,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 816
|
|
{SEC_OID_SHA256,
|
|
816,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 817
|
|
{SEC_OID_SHA256,
|
|
817,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 818
|
|
{SEC_OID_SHA256,
|
|
818,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 819
|
|
{SEC_OID_SHA256,
|
|
819,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 820
|
|
{SEC_OID_SHA256,
|
|
820,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 821
|
|
{SEC_OID_SHA256,
|
|
821,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 822
|
|
{SEC_OID_SHA256,
|
|
822,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 823
|
|
{SEC_OID_SHA256,
|
|
823,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 824
|
|
{SEC_OID_SHA256,
|
|
824,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc,
|
|
0xd5, 0x69, 0x5c, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 825
|
|
{SEC_OID_SHA256,
|
|
825,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 826
|
|
{SEC_OID_SHA256,
|
|
826,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 827
|
|
{SEC_OID_SHA256,
|
|
827,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 828
|
|
{SEC_OID_SHA256,
|
|
828,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 829
|
|
{SEC_OID_SHA256,
|
|
829,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 830
|
|
{SEC_OID_SHA256,
|
|
830,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 831
|
|
{SEC_OID_SHA256,
|
|
831,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 832
|
|
{SEC_OID_SHA256,
|
|
832,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 833
|
|
{SEC_OID_SHA256,
|
|
833,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 834
|
|
{SEC_OID_SHA256,
|
|
834,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 835
|
|
{SEC_OID_SHA256,
|
|
835,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 836
|
|
{SEC_OID_SHA256,
|
|
836,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 837
|
|
{SEC_OID_SHA256,
|
|
837,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc,
|
|
0xd5, 0x69, 0x5d, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 838
|
|
{SEC_OID_SHA256,
|
|
838,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 839
|
|
{SEC_OID_SHA256,
|
|
839,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 840
|
|
{SEC_OID_SHA256,
|
|
840,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 841
|
|
{SEC_OID_SHA256,
|
|
841,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 842
|
|
{SEC_OID_SHA256,
|
|
842,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 843
|
|
{SEC_OID_SHA256,
|
|
843,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 844
|
|
{SEC_OID_SHA256,
|
|
844,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 845
|
|
{SEC_OID_SHA256,
|
|
845,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 846
|
|
{SEC_OID_SHA256,
|
|
846,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 847
|
|
{SEC_OID_SHA256,
|
|
847,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 848
|
|
{SEC_OID_SHA256,
|
|
848,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78,
|
|
0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 849
|
|
{SEC_OID_SHA256,
|
|
849,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef,
|
|
0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 850
|
|
{SEC_OID_SHA256,
|
|
850,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85,
|
|
0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7,
|
|
0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc,
|
|
0xd5, 0x69, 0x5e, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 851
|
|
{SEC_OID_SHA256,
|
|
851,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7,
|
|
0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 852
|
|
{SEC_OID_SHA256,
|
|
852,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d,
|
|
0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 853
|
|
{SEC_OID_SHA256,
|
|
853,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 854
|
|
{SEC_OID_SHA256,
|
|
854,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 855
|
|
{SEC_OID_SHA256,
|
|
855,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 856
|
|
{SEC_OID_SHA256,
|
|
856,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 857
|
|
{SEC_OID_SHA256,
|
|
857,
|
|
{0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19,
|
|
0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 858
|
|
{SEC_OID_SHA256,
|
|
858,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 859
|
|
{SEC_OID_SHA256,
|
|
859,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 860
|
|
{SEC_OID_SHA256,
|
|
860,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2,
|
|
0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 861
|
|
{SEC_OID_SHA256,
|
|
861,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 862
|
|
{SEC_OID_SHA256,
|
|
862,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02,
|
|
0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf,
|
|
0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e,
|
|
0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36,
|
|
0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7,
|
|
0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad,
|
|
0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f,
|
|
0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d,
|
|
0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58,
|
|
0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1,
|
|
0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f,
|
|
0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04,
|
|
0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0,
|
|
0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33,
|
|
0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68,
|
|
0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53,
|
|
0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72,
|
|
0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50,
|
|
0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde,
|
|
0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58,
|
|
0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23,
|
|
0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c,
|
|
0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 863
|
|
{SEC_OID_SHA256,
|
|
863,
|
|
{0x30, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 864
|
|
{SEC_OID_SHA256,
|
|
864,
|
|
{0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 865
|
|
{SEC_OID_SHA256,
|
|
865,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20,
|
|
0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 866
|
|
{SEC_OID_SHA256,
|
|
866,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 867
|
|
{SEC_OID_SHA256,
|
|
867,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 868
|
|
{SEC_OID_SHA256,
|
|
868,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 869
|
|
{SEC_OID_SHA256,
|
|
869,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 870
|
|
{SEC_OID_SHA256,
|
|
870,
|
|
{0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef,
|
|
0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 871
|
|
{SEC_OID_SHA256,
|
|
871,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 872
|
|
{SEC_OID_SHA256,
|
|
872,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 873
|
|
{SEC_OID_SHA256,
|
|
873,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf,
|
|
0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 874
|
|
{SEC_OID_SHA256,
|
|
874,
|
|
{0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 875
|
|
{SEC_OID_SHA256,
|
|
875,
|
|
{0x30, 0x82, 0x02, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa,
|
|
0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e,
|
|
0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e,
|
|
0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8,
|
|
0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0,
|
|
0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac,
|
|
0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11,
|
|
0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c,
|
|
0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10,
|
|
0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6,
|
|
0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c,
|
|
0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2,
|
|
0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81,
|
|
0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59,
|
|
0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b,
|
|
0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0,
|
|
0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1,
|
|
0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1,
|
|
0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23,
|
|
0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d,
|
|
0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe,
|
|
0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 876
|
|
{SEC_OID_SHA256,
|
|
876,
|
|
{0x30, 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 877
|
|
{SEC_OID_SHA256,
|
|
877,
|
|
{0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35,
|
|
0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51,
|
|
0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4,
|
|
0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18,
|
|
0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47,
|
|
0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84,
|
|
0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f,
|
|
0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0,
|
|
0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37,
|
|
0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba,
|
|
0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86,
|
|
0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9,
|
|
0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa,
|
|
0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9,
|
|
0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea,
|
|
0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32,
|
|
0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b,
|
|
0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d,
|
|
0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5,
|
|
0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21,
|
|
0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22,
|
|
0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6,
|
|
0x67, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 878
|
|
{SEC_OID_SHA256,
|
|
878,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0xff,
|
|
0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18,
|
|
0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc,
|
|
0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 879
|
|
{SEC_OID_SHA256,
|
|
879,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 880
|
|
{SEC_OID_SHA256,
|
|
880,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 881
|
|
{SEC_OID_SHA256,
|
|
881,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0xff},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 882
|
|
{SEC_OID_SHA256,
|
|
882,
|
|
{0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d,
|
|
0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd,
|
|
0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 883
|
|
{SEC_OID_SHA256,
|
|
883,
|
|
{0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d,
|
|
0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd,
|
|
0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd,
|
|
0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 884
|
|
{SEC_OID_SHA256,
|
|
884,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00,
|
|
0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7,
|
|
0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 885
|
|
{SEC_OID_SHA256,
|
|
885,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00,
|
|
0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7,
|
|
0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 886
|
|
{SEC_OID_SHA256,
|
|
886,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00,
|
|
0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7,
|
|
0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33,
|
|
0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 887
|
|
{SEC_OID_SHA256,
|
|
887,
|
|
{0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x01,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 888
|
|
{SEC_OID_SHA256,
|
|
888,
|
|
{0x30, 0x82, 0x01, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x82, 0x01,
|
|
0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed,
|
|
0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf,
|
|
0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7,
|
|
0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae,
|
|
0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4,
|
|
0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3,
|
|
0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9,
|
|
0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b,
|
|
0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad,
|
|
0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64,
|
|
0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34,
|
|
0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f,
|
|
0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7,
|
|
0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98,
|
|
0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33,
|
|
0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25,
|
|
0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1,
|
|
0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66,
|
|
0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87,
|
|
0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e,
|
|
0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76,
|
|
0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 889
|
|
{SEC_OID_SHA256,
|
|
889,
|
|
{0x30, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signatures with special case values for r and s.
|
|
// tcID: 890
|
|
{SEC_OID_SHA256,
|
|
890,
|
|
{0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x01, 0x42},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 891
|
|
{SEC_OID_SHA256,
|
|
891,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x0c, 0x01, 0x30},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 892
|
|
{SEC_OID_SHA256,
|
|
892,
|
|
{0x30, 0x05, 0x02, 0x01, 0x01, 0x0c, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 893
|
|
{SEC_OID_SHA256,
|
|
893,
|
|
{0x30, 0x09, 0x0c, 0x02, 0x25, 0x73, 0x0c, 0x03, 0x73, 0x25, 0x73},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 894
|
|
{SEC_OID_SHA256,
|
|
894,
|
|
{0x30, 0x08, 0x02, 0x01, 0x01, 0x30, 0x03, 0x02, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 895
|
|
{SEC_OID_SHA256,
|
|
895,
|
|
{0x30, 0x03, 0x02, 0x01, 0x01},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: Signature encoding contains wrong type.
|
|
// tcID: 896
|
|
{SEC_OID_SHA256,
|
|
896,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x01, 0x01, 0x00},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
false},
|
|
|
|
// Comment: random signature
|
|
// tcID: 897
|
|
{SEC_OID_SHA256,
|
|
897,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x29, 0x64, 0x10, 0xb8, 0xcb, 0x62, 0x00,
|
|
0xed, 0xaf, 0xd1, 0x20, 0x5e, 0x73, 0x77, 0xa0, 0x9a, 0xd2, 0x01,
|
|
0x1a, 0xc7, 0xb1, 0x5b, 0x8b, 0xc9, 0xb9, 0xb4, 0xc6, 0xdb, 0x02,
|
|
0x1c, 0x25, 0xca, 0x28, 0x3c, 0x86, 0x8d, 0xc2, 0xa5, 0xce, 0x86,
|
|
0xaa, 0xfc, 0xf6, 0x81, 0xce, 0x21, 0xd6, 0x60, 0xb4, 0x61, 0xda,
|
|
0x48, 0x27, 0x0f, 0x15, 0xb5, 0x38, 0x89},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 898
|
|
{SEC_OID_SHA256,
|
|
898,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x34, 0x7c, 0x4f, 0x68, 0x75, 0xbf, 0x44,
|
|
0x76, 0xaf, 0xbd, 0xd6, 0xb2, 0xb1, 0xf9, 0xe3, 0x5c, 0x87, 0x0e,
|
|
0x78, 0x5e, 0x70, 0x8e, 0x66, 0x11, 0x09, 0xbd, 0x06, 0x8e, 0x02,
|
|
0x1d, 0x00, 0xb0, 0xb9, 0x08, 0xa6, 0x17, 0xd3, 0xad, 0x6c, 0x8b,
|
|
0xc2, 0x77, 0xf3, 0x97, 0x09, 0x5c, 0x00, 0xe6, 0x59, 0xc8, 0x6c,
|
|
0xa7, 0xc6, 0x00, 0x09, 0x05, 0x71, 0xab, 0x17},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 899
|
|
{SEC_OID_SHA256,
|
|
899,
|
|
{0x30, 0x3c, 0x02, 0x1c, 0x3c, 0x76, 0xbc, 0x6f, 0x17, 0x36, 0x94,
|
|
0x14, 0xd4, 0xc2, 0x1c, 0x53, 0x61, 0xed, 0x0c, 0xca, 0x6e, 0x79,
|
|
0xf7, 0x3f, 0x90, 0x70, 0x6f, 0x1f, 0x7c, 0xa9, 0xf0, 0x5a, 0x02,
|
|
0x1c, 0x3c, 0xc6, 0x0d, 0x8a, 0x0d, 0x44, 0xfb, 0x96, 0x7b, 0xaa,
|
|
0x0e, 0x56, 0x21, 0xe1, 0x2c, 0xd4, 0x34, 0xaa, 0xfd, 0x74, 0x8c,
|
|
0xba, 0x3e, 0x7c, 0xdc, 0x73, 0x3b, 0x2f},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 900
|
|
{SEC_OID_SHA256,
|
|
900,
|
|
{0x30, 0x3e, 0x02, 0x1d, 0x00, 0x86, 0xa5, 0xef, 0xea, 0x8e, 0x6a,
|
|
0x80, 0x33, 0xb8, 0xa0, 0x03, 0x4b, 0x52, 0xae, 0x61, 0x4e, 0x1f,
|
|
0x14, 0xfb, 0xcb, 0xfa, 0x0b, 0xb5, 0x01, 0x94, 0xef, 0xa6, 0xa7,
|
|
0x02, 0x1d, 0x00, 0xb3, 0xd6, 0x6f, 0x6d, 0x2b, 0x10, 0xcf, 0xe6,
|
|
0x2f, 0xe9, 0x6b, 0x78, 0xfc, 0xf4, 0x1c, 0xa7, 0xb4, 0x42, 0xac,
|
|
0xeb, 0x98, 0xab, 0x10, 0x9a, 0x01, 0x40, 0x9e, 0x4a},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: random signature
|
|
// tcID: 901
|
|
{SEC_OID_SHA256,
|
|
901,
|
|
{0x30, 0x3d, 0x02, 0x1c, 0x16, 0x72, 0x7d, 0x52, 0xbd, 0x71, 0x1e,
|
|
0x9a, 0x63, 0xe0, 0xdd, 0x2c, 0x4d, 0xb0, 0x45, 0xcf, 0xb9, 0x93,
|
|
0x94, 0x2b, 0x1e, 0x39, 0xe4, 0xf4, 0x3a, 0x65, 0xc1, 0x1a, 0x02,
|
|
0x1d, 0x00, 0x9f, 0xb9, 0xc0, 0x2d, 0x10, 0xc9, 0x68, 0xe7, 0x5b,
|
|
0xb1, 0x5a, 0xca, 0xb8, 0x46, 0x7f, 0x30, 0xb8, 0x44, 0x81, 0xf6,
|
|
0x79, 0xe1, 0x36, 0xe8, 0xaf, 0x65, 0xa2, 0x66},
|
|
kPubKey3,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: r,s = 1,1
|
|
// tcID: 902
|
|
{SEC_OID_SHA256,
|
|
902,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01},
|
|
kPubKey6,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: r,s = 1,5
|
|
// tcID: 903
|
|
{SEC_OID_SHA256,
|
|
903,
|
|
{0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x05},
|
|
kPubKey6,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: u2 small
|
|
// tcID: 904
|
|
{SEC_OID_SHA256,
|
|
904,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0x95, 0x92, 0x12, 0x1e,
|
|
0xd1, 0x2d, 0x93, 0x19, 0x7f, 0x1f, 0xfb, 0x86, 0x3a, 0xc6, 0x39, 0x37,
|
|
0xf2, 0x8e, 0xf4, 0xf6, 0x2f, 0x1e, 0x00, 0x9a, 0x30, 0xaa, 0xba, 0xb1},
|
|
kPubKey6,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: s == q-1
|
|
// tcID: 905
|
|
{SEC_OID_SHA256,
|
|
905,
|
|
{0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6,
|
|
0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85,
|
|
0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c},
|
|
kPubKey6,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true},
|
|
|
|
// Comment: s == 1
|
|
// tcID: 906
|
|
{SEC_OID_SHA256,
|
|
906,
|
|
{0x30, 0x21, 0x02, 0x1c, 0x5a, 0x25, 0x2f, 0x4f, 0xc5, 0x56, 0x18, 0x74,
|
|
0x7f, 0xd9, 0x4b, 0x13, 0xc9, 0xbe, 0xe6, 0x2b, 0xb9, 0x58, 0xd8, 0x57,
|
|
0x77, 0xcb, 0x07, 0xdd, 0x90, 0x71, 0x0d, 0x24, 0x02, 0x01, 0x01},
|
|
kPubKey7,
|
|
{0x54, 0x65, 0x73, 0x74},
|
|
true}};
|
|
|
|
#endif // dsa_vectors_h__
|