Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 1 | Test vectors |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 2 | ============ |
| 3 | |
| 4 | Testing the correctness of the primitives implemented in each ``cryptography`` |
Alex Stapleton | a39a319 | 2014-03-14 20:03:12 +0000 | [diff] [blame] | 5 | backend requires trusted test vectors. Where possible these vectors are |
| 6 | obtained from official sources such as `NIST`_ or `IETF`_ RFCs. When this is |
| 7 | not possible ``cryptography`` has chosen to create a set of custom vectors |
| 8 | using an official vector file as input to verify consistency between |
| 9 | implemented backends. |
| 10 | |
| 11 | Vectors are kept in the `cryptography_vectors` package rather than within our |
| 12 | main test suite. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 13 | |
| 14 | Sources |
| 15 | ------- |
| 16 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 17 | Asymmetric ciphers |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 18 | ~~~~~~~~~~~~~~~~~~ |
| 19 | |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 20 | * RSA PKCS #1 from the RSA FTP site (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/ |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 21 | and ftp://ftp.rsa.com/pub/rsalabs/tmp/). |
Paul Kehrer | 7f0039c | 2014-03-03 22:32:11 -0400 | [diff] [blame] | 22 | * RSA FIPS 186-2 and PKCS1 v1.5 vulnerability test vectors from `NIST CAVP`_. |
Alex Stapleton | 07c6a39 | 2014-04-02 11:05:30 +0100 | [diff] [blame] | 23 | * FIPS 186-2 and FIPS 186-3 DSA test vectors from `NIST CAVP`_. |
| 24 | * FIPS 186-2 and FIPS 186-3 ECDSA test vectors from `NIST CAVP`_. |
Simo Sorce | 83e563e | 2015-05-06 10:56:31 -0400 | [diff] [blame] | 25 | * DH and ECDH and ECDH+KDF(17.4) test vectors from `NIST CAVP`_. |
Alex Stapleton | 833a8ea | 2014-04-02 14:50:56 +0100 | [diff] [blame] | 26 | * Ed25519 test vectors from the `Ed25519 website_`. |
Alex Stapleton | e7da0ab | 2014-03-02 14:04:33 +0000 | [diff] [blame] | 27 | * OpenSSL PEM RSA serialization vectors from the `OpenSSL example key`_ and |
| 28 | `GnuTLS key parsing tests`_. |
| 29 | * OpenSSL PEM DSA serialization vectors from the `GnuTLS example keys`_. |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 30 | * PKCS #8 PEM serialization vectors from |
| 31 | |
Paul Kehrer | b525adf | 2014-09-29 15:18:23 -0500 | [diff] [blame] | 32 | * GnuTLS: `enc-rsa-pkcs8.pem`_, `enc2-rsa-pkcs8.pem`_, |
Alex Gaynor | 899c3ac | 2014-11-18 18:45:24 -0800 | [diff] [blame] | 33 | `unenc-rsa-pkcs8.pem`_, `pkcs12_s2k_pem.c`_. The contents of |
| 34 | `enc2-rsa-pkcs8.pem`_ was re-encrypted using a stronger PKCS#8 cipher. |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 35 | * `Botan's ECC private keys`_. |
Paul Kehrer | b07a0c9 | 2015-03-02 13:21:27 -0600 | [diff] [blame] | 36 | * `asymmetric/public/PKCS1/dsa.pub.pem`_ is a PKCS1 DSA public key from the |
| 37 | Ruby test suite. |
| 38 | |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 39 | |
Alex Stapleton | e0afa5d | 2015-05-03 18:14:20 +0100 | [diff] [blame] | 40 | Custom asymmetric vectors |
Paul Kehrer | ebc2650 | 2014-11-26 19:18:56 -1000 | [diff] [blame] | 41 | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 42 | |
Alex Stapleton | e0afa5d | 2015-05-03 18:14:20 +0100 | [diff] [blame] | 43 | .. toctree:: |
| 44 | :maxdepth: 1 |
| 45 | |
| 46 | custom-vectors/secp256k1 |
Paul Kehrer | 3079299 | 2016-06-02 15:11:03 -0700 | [diff] [blame] | 47 | custom-vectors/rsa-oaep-sha2 |
Alex Stapleton | e0afa5d | 2015-05-03 18:14:20 +0100 | [diff] [blame] | 48 | |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 49 | * ``asymmetric/PEM_Serialization/ec_private_key.pem`` and |
| 50 | ``asymmetric/DER_Serialization/ec_private_key.der`` - Contains an Elliptic |
Paul Kehrer | 0498d4c | 2015-01-01 22:29:12 -0600 | [diff] [blame] | 51 | Curve key generated by OpenSSL from the curve ``secp256r1``. |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 52 | * ``asymmetric/PEM_Serialization/ec_private_key_encrypted.pem`` and |
| 53 | ``asymmetric/DER_Serialization/ec_private_key_encrypted.der``- Contains the |
Paul Kehrer | 0498d4c | 2015-01-01 22:29:12 -0600 | [diff] [blame] | 54 | same Elliptic Curve key as ``ec_private_key.pem``, except that it is |
| 55 | encrypted with AES-128 with the password "123456". |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 56 | * ``asymmetric/PEM_Serialization/ec_public_key.pem`` and |
| 57 | ``asymmetric/DER_Serialization/ec_public_key.der``- Contains the public key |
Paul Kehrer | 0498d4c | 2015-01-01 22:29:12 -0600 | [diff] [blame] | 58 | corresponding to ``ec_private_key.pem``, generated using OpenSSL. |
| 59 | * ``asymmetric/PEM_Serialization/rsa_private_key.pem`` - Contains an RSA 2048 |
| 60 | bit key generated using OpenSSL, protected by the secret "123456" with DES3 |
| 61 | encryption. |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 62 | * ``asymmetric/PEM_Serialization/rsa_public_key.pem`` and |
| 63 | ``asymmetric/DER_Serialization/rsa_public_key.der``- Contains an RSA 2048 |
Paul Kehrer | 0498d4c | 2015-01-01 22:29:12 -0600 | [diff] [blame] | 64 | bit public generated using OpenSSL from ``rsa_private_key.pem``. |
| 65 | * ``asymmetric/PEM_Serialization/dsaparam.pem`` - Contains 2048-bit DSA |
| 66 | parameters generated using OpenSSL; contains no keys. |
| 67 | * ``asymmetric/PEM_Serialization/dsa_private_key.pem`` - Contains a DSA 2048 |
| 68 | bit key generated using OpenSSL from the parameters in ``dsaparam.pem``, |
| 69 | protected by the secret "123456" with DES3 encryption. |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 70 | * ``asymmetric/PEM_Serialization/dsa_public_key.pem`` and |
| 71 | ``asymmetric/DER_Serialization/dsa_public_key.der`` - Contains a DSA 2048 bit |
Paul Kehrer | 0498d4c | 2015-01-01 22:29:12 -0600 | [diff] [blame] | 72 | key generated using OpenSSL from ``dsa_private_key.pem``. |
Paul Kehrer | 4b8abc3 | 2015-01-06 14:46:15 +0000 | [diff] [blame] | 73 | * ``asymmetric/PKCS8/unenc-dsa-pkcs8.pem`` and |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 74 | ``asymmetric/DER_Serialization/unenc-dsa-pkcs8.der`` - Contains a DSA 1024 |
Paul Kehrer | a36661e | 2015-01-04 07:57:40 -0600 | [diff] [blame] | 75 | bit key generated using OpenSSL. |
Paul Kehrer | 4b8abc3 | 2015-01-06 14:46:15 +0000 | [diff] [blame] | 76 | * ``asymmetric/PKCS8/unenc-dsa-pkcs8.pub.pem`` and |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 77 | ``asymmetric/DER_Serialization/unenc-dsa-pkcs8.pub.der`` - Contains a DSA |
Paul Kehrer | a673dcc | 2015-01-03 23:26:01 -0600 | [diff] [blame] | 78 | 2048 bit public key generated using OpenSSL from ``unenc-dsa-pkcs8.pem``. |
Paul Kehrer | 10831a0 | 2015-01-03 18:45:04 -0600 | [diff] [blame] | 79 | * DER conversions of the `GnuTLS example keys`_ for DSA as well as the |
| 80 | `OpenSSL example key`_ for RSA. |
| 81 | * DER conversions of `enc-rsa-pkcs8.pem`_, `enc2-rsa-pkcs8.pem`_, and |
| 82 | `unenc-rsa-pkcs8.pem`_. |
Paul Kehrer | 6d97742 | 2015-03-02 19:38:34 -0600 | [diff] [blame] | 83 | * ``asymmetric/public/PKCS1/rsa.pub.pem`` and |
| 84 | ``asymmetric/public/PKCS1/rsa.pub.der`` are PKCS1 conversions of the public |
| 85 | key from ``asymmetric/PKCS8/unenc-rsa-pkcs8.pem`` using PEM and DER encoding. |
Paul Kehrer | ebc2650 | 2014-11-26 19:18:56 -1000 | [diff] [blame] | 86 | |
Alex Stapleton | e0afa5d | 2015-05-03 18:14:20 +0100 | [diff] [blame] | 87 | |
Alex Stapleton | 91ca343 | 2015-04-12 20:06:39 +0100 | [diff] [blame] | 88 | Key exchange |
| 89 | ~~~~~~~~~~~~ |
| 90 | |
| 91 | * ``vectors/cryptography_vectors/asymmetric/DH/RFC5114.txt`` contains |
| 92 | Diffie-Hellman examples from appendix A.1, A.2 and A.3 of :rfc:`5114`. |
| 93 | |
Aviv Palivoda | 495f21a | 2016-11-25 18:51:28 +0200 | [diff] [blame] | 94 | * ``vectors/cryptography_vectors/asymmetric/DH/vec.txt`` contains |
| 95 | Diffie-Hellman examples from `botan`_. |
| 96 | |
| 97 | * ``vectors/cryptography_vectors/asymmetric/DH/bad_exchange.txt`` contains |
| 98 | Diffie-Hellman vector pairs that were generated using OpenSSL |
| 99 | DH_generate_parameters_ex and DH_generate_key. |
| 100 | |
Paul Kehrer | bab4e39 | 2014-11-24 11:48:17 -1000 | [diff] [blame] | 101 | X.509 |
| 102 | ~~~~~ |
| 103 | |
| 104 | * PKITS test suite from `NIST PKI Testing`_. |
Paul Kehrer | ebc2650 | 2014-11-26 19:18:56 -1000 | [diff] [blame] | 105 | * ``v1_cert.pem`` from the OpenSSL source tree (`testx509.pem`_). |
| 106 | * ``ecdsa_root.pem`` - `DigiCert Global Root G3`_, a ``secp384r1`` ECDSA root |
| 107 | certificate. |
Paul Kehrer | b01622d | 2015-02-13 11:59:15 -0600 | [diff] [blame] | 108 | * ``verisign-md2-root.pem`` - A legacy Verisign public root signed using the |
Paul Kehrer | 2b6ba0c | 2015-02-14 18:58:20 -0600 | [diff] [blame] | 109 | MD2 algorithm. This is a PEM conversion of the `root data`_ in the NSS source |
| 110 | tree. |
Paul Kehrer | e0eafaa | 2015-03-20 22:33:37 -0500 | [diff] [blame] | 111 | * ``cryptography.io.pem`` - A leaf certificate issued by RapidSSL for the |
| 112 | cryptography website. |
Paul Kehrer | 4113d5b | 2015-08-05 17:42:43 +0100 | [diff] [blame] | 113 | * ``rapidssl_sha256_ca_g3.pem`` - The intermediate CA that issued the |
| 114 | ``cryptography.io.pem`` certificate. |
Paul Kehrer | e651b7f | 2015-06-23 08:31:15 -0500 | [diff] [blame] | 115 | * ``wildcard_san.pem`` - A leaf certificate issued by a public CA for |
| 116 | ``langui.sh`` that contains wildcard entries in the SAN extension. |
Paul Kehrer | 0ed3d91 | 2015-07-04 16:48:08 -0500 | [diff] [blame] | 117 | * ``san_edipartyname.der`` - A DSA certificate from a `Mozilla bug`_ |
| 118 | containing a SAN extension with an ``ediPartyName`` general name. |
| 119 | * ``san_x400address.der`` - A DSA certificate from a `Mozilla bug`_ containing |
| 120 | a SAN extension with an ``x400Address`` general name. |
Alex Gaynor | 0ab8e9e | 2016-02-26 12:29:56 -0500 | [diff] [blame] | 121 | * ``department-of-state-root.pem`` - The intermediary CA for the Department of |
| 122 | State, issued by the United States Federal Government's Common Policy CA. |
| 123 | Notably has a ``critical`` policy constraints extensions. |
Paul Kehrer | d3c21ca | 2016-03-11 23:38:00 -0400 | [diff] [blame] | 124 | * ``e-trust.ru.der`` - A certificate from a `Russian CA`_ signed using the GOST |
| 125 | cipher and containing numerous unusual encodings such as NUMERICSTRING in |
| 126 | the subject DN. |
Paul Kehrer | f6f238e | 2016-11-11 10:41:31 -0800 | [diff] [blame] | 127 | * ``alternate-rsa-sha1-oid.pem`` - A certificate from an |
| 128 | `unknown signature OID`_ Mozilla bug that uses an alternate signature OID for |
| 129 | RSA with SHA1. |
Paul Kehrer | ebc2650 | 2014-11-26 19:18:56 -1000 | [diff] [blame] | 130 | |
| 131 | Custom X.509 Vectors |
| 132 | ~~~~~~~~~~~~~~~~~~~~ |
| 133 | |
| 134 | * ``invalid_version.pem`` - Contains an RSA 2048 bit certificate with the |
| 135 | X.509 version field set to ``0x7``. |
| 136 | * ``post2000utctime.pem`` - Contains an RSA 2048 bit certificate with the |
| 137 | ``notBefore`` and ``notAfter`` fields encoded as post-2000 ``UTCTime``. |
Paul Kehrer | a850c61 | 2014-12-12 14:21:18 -0600 | [diff] [blame] | 138 | * ``dsa_selfsigned_ca.pem`` - Contains a DSA self-signed CA certificate |
| 139 | generated using OpenSSL. |
Paul Kehrer | d317bae | 2014-12-12 11:42:31 -0600 | [diff] [blame] | 140 | * ``ec_no_named_curve.pem`` - Contains an ECDSA certificate that does not have |
| 141 | an embedded OID defining the curve. |
Paul Kehrer | 2221720 | 2015-01-17 21:26:28 -0600 | [diff] [blame] | 142 | * ``all_supported_names.pem`` - An RSA 2048 bit certificate generated using |
| 143 | OpenSSL that contains a subject and issuer that have two of each supported |
| 144 | attribute type from :rfc:`5280`. |
Paul Kehrer | 1207d15 | 2015-01-17 21:31:42 -0600 | [diff] [blame] | 145 | * ``unsupported_subject_name.pem`` - An RSA 2048 bit self-signed CA certificate |
| 146 | generated using OpenSSL that contains the unsupported "initials" name. |
Paul Kehrer | 6392b4b | 2015-01-17 22:20:01 -0600 | [diff] [blame] | 147 | * ``utf8_common_name.pem`` - An RSA 2048 bit self-signed CA certificate |
| 148 | generated using OpenSSL that contains a UTF8String common name with the value |
| 149 | "We heart UTF8!â„¢". |
Paul Kehrer | e0eafaa | 2015-03-20 22:33:37 -0500 | [diff] [blame] | 150 | * ``two_basic_constraints.pem`` - An RSA 2048 bit self-signed certificate |
| 151 | containing two basic constraints extensions. |
| 152 | * ``basic_constraints_not_critical.pem`` - An RSA 2048 bit self-signed |
| 153 | certificate containing a basic constraints extension that is not marked as |
| 154 | critical. |
Paul Kehrer | d1ed673 | 2015-03-25 00:17:36 -0500 | [diff] [blame] | 155 | * ``bc_path_length_zero.pem`` - An RSA 2048 bit self-signed |
| 156 | certificate containing a basic constraints extension with a path length of |
| 157 | zero. |
Paul Kehrer | b2e6c83 | 2015-03-27 22:19:13 -0500 | [diff] [blame] | 158 | * ``unsupported_extension.pem`` - An RSA 2048 bit self-signed certificate |
| 159 | containing an unsupported extension type. The OID was encoded as |
| 160 | "1.2.3.4" with an ``extnValue`` of "value". |
Paul Kehrer | 249d9be | 2015-12-30 09:52:56 -0600 | [diff] [blame] | 161 | * ``unsupported_extension_2.pem`` - A ``secp256r1`` certificate |
| 162 | containing two unsupported extensions. The OIDs are ``1.3.6.1.4.1.41482.2`` |
| 163 | with an ``extnValue`` of ``1.3.6.1.4.1.41482.1.2`` and |
| 164 | ``1.3.6.1.4.1.45724.2.1.1`` with an ``extnValue`` of ``\x03\x02\x040`` |
Paul Kehrer | f5ac6c6 | 2015-03-27 23:27:00 -0500 | [diff] [blame] | 165 | * ``unsupported_extension_critical.pem`` - An RSA 2048 bit self-signed |
| 166 | certificate containing an unsupported extension type marked critical. The OID |
| 167 | was encoded as "1.2.3.4" with an ``extnValue`` of "value". |
Paul Kehrer | 2e3c709 | 2015-03-27 10:24:05 -0500 | [diff] [blame] | 168 | * ``san_email_dns_ip_dirname_uri.pem`` - An RSA 2048 bit self-signed |
| 169 | certificate containing a subject alternative name extension with the |
| 170 | following general names: ``rfc822Name``, ``dNSName``, ``iPAddress``, |
| 171 | ``directoryName``, and ``uniformResourceIdentifier``. |
Dominic Chen | 87bb957 | 2015-10-09 00:23:07 -0400 | [diff] [blame] | 172 | * ``san_empty_hostname.pem`` - An RSA 2048 bit self-signed certificate |
| 173 | containing a subject alternative extension with an empty ``dNSName`` |
| 174 | general name. |
Paul Kehrer | 2e3c709 | 2015-03-27 10:24:05 -0500 | [diff] [blame] | 175 | * ``san_other_name.pem`` - An RSA 2048 bit self-signed certificate containing |
| 176 | a subject alternative name extension with the ``otherName`` general name. |
| 177 | * ``san_registered_id.pem`` - An RSA 1024 bit certificate containing a |
| 178 | subject alternative name extension with the ``registeredID`` general name. |
Paul Kehrer | c88bce5 | 2015-04-02 19:32:45 -0500 | [diff] [blame] | 179 | * ``all_key_usages.pem`` - An RSA 2048 bit self-signed certificate containing |
| 180 | a key usage extension with all nine purposes set to true. |
Paul Kehrer | 986e5fa | 2015-05-01 23:24:10 -0500 | [diff] [blame] | 181 | * ``extended_key_usage.pem`` - An RSA 2048 bit self-signed certificate |
| 182 | containing an extended key usage extension with eight usages. |
Paul Kehrer | 542f4e5 | 2015-04-20 14:57:32 -0500 | [diff] [blame] | 183 | * ``san_idna_names.pem`` - An RSA 2048 bit self-signed certificate containing |
| 184 | a subject alternative name extension with ``rfc822Name``, ``dNSName``, and |
| 185 | ``uniformResourceIdentifier`` general names with IDNA (:rfc:`5895`) encoding. |
Paul Kehrer | 3f0522f | 2015-06-26 18:46:19 -0500 | [diff] [blame] | 186 | * ``san_wildcard_idna.pem`` - An RSA 2048 bit self-signed certificate |
| 187 | containing a subject alternative name extension with a ``dNSName`` general |
| 188 | name with a wildcard IDNA (:rfc:`5895`) domain. |
Paul Kehrer | d0a66e7 | 2015-05-15 08:50:50 -0700 | [diff] [blame] | 189 | * ``san_idna2003_dnsname.pem`` - An RSA 2048 bit self-signed certificate |
| 190 | containing a subject alternative name extension with an IDNA 2003 |
| 191 | (:rfc:`3490`) ``dNSName``. |
Paul Kehrer | 542f4e5 | 2015-04-20 14:57:32 -0500 | [diff] [blame] | 192 | * ``san_rfc822_names.pem`` - An RSA 2048 bit self-signed certificate containing |
| 193 | a subject alternative name extension with various ``rfc822Name`` values. |
Paul Kehrer | 60163d7 | 2015-04-29 21:23:14 -0500 | [diff] [blame] | 194 | * ``san_rfc822_idna.pem`` - An RSA 2048 bit self-signed certificate containing |
| 195 | a subject alternative name extension with an IDNA ``rfc822Name``. |
Paul Kehrer | 542f4e5 | 2015-04-20 14:57:32 -0500 | [diff] [blame] | 196 | * ``san_uri_with_port.pem`` - An RSA 2048 bit self-signed certificate |
| 197 | containing a subject alternative name extension with various |
| 198 | ``uniformResourceIdentifier`` values. |
Paul Kehrer | fbc6219 | 2015-04-29 21:37:42 -0500 | [diff] [blame] | 199 | * ``san_ipaddr.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 200 | subject alternative name extension with an ``iPAddress`` value. |
| 201 | * ``san_dirname.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 202 | subject alternative name extension with a ``directoryName`` value. |
Paul Kehrer | 67a62c8 | 2015-05-01 23:15:58 -0500 | [diff] [blame] | 203 | * ``inhibit_any_policy_5.pem`` - An RSA 2048 bit self-signed certificate |
| 204 | containing an inhibit any policy extension with the value 5. |
| 205 | * ``inhibit_any_policy_negative.pem`` - An RSA 2048 bit self-signed certificate |
| 206 | containing an inhibit any policy extension with the value -1. |
Paul Kehrer | b0deb44 | 2015-05-03 10:53:45 -0500 | [diff] [blame] | 207 | * ``authority_key_identifier.pem`` - An RSA 2048 bit self-signed certificate |
| 208 | containing an authority key identifier extension with key identifier, |
| 209 | authority certificate issuer, and authority certificate serial number fields. |
Paul Kehrer | 0d52e2a | 2015-05-03 11:17:12 -0500 | [diff] [blame] | 210 | * ``authority_key_identifier_no_keyid.pem`` - An RSA 2048 bit self-signed |
| 211 | certificate containing an authority key identifier extension with authority |
| 212 | certificate issuer and authority certificate serial number fields. |
Paul Kehrer | 64c82e0 | 2015-05-04 17:38:52 -0500 | [diff] [blame] | 213 | * ``aia_ocsp_ca_issuers.pem`` - An RSA 2048 bit self-signed certificate |
| 214 | containing an authority information access extension with two OCSP and one |
| 215 | CA issuers entry. |
| 216 | * ``aia_ocsp.pem`` - An RSA 2048 bit self-signed certificate |
| 217 | containing an authority information access extension with an OCSP entry. |
| 218 | * ``aia_ca_issuers.pem`` - An RSA 2048 bit self-signed certificate |
| 219 | containing an authority information access extension with a CA issuers entry. |
Dominic Chen | 87bb957 | 2015-10-09 00:23:07 -0400 | [diff] [blame] | 220 | * ``cdp_empty_hostname.pem`` - An RSA 2048 bit self-signed certificate |
| 221 | containing a CRL distribution point extension with ``fullName`` URI without |
| 222 | a hostname. |
Paul Kehrer | 28d5421 | 2015-05-10 14:58:21 -0500 | [diff] [blame] | 223 | * ``cdp_fullname_reasons_crl_issuer.pem`` - An RSA 1024 bit certificate |
| 224 | containing a CRL distribution points extension with ``fullName``, |
| 225 | ``cRLIssuer``, and ``reasons`` data. |
| 226 | * ``cdp_crl_issuer.pem`` - An RSA 1024 bit certificate containing a CRL |
| 227 | distribution points extension with ``cRLIssuer`` data. |
Paul Kehrer | 208d678 | 2015-05-12 23:09:13 -0500 | [diff] [blame] | 228 | * ``cdp_all_reasons.pem`` - An RSA 1024 bit certificate containing a CRL |
| 229 | distribution points extension with all ``reasons`` bits set. |
| 230 | * ``cdp_reason_aa_compromise.pem`` - An RSA 1024 bit certificate containing a |
| 231 | CRL distribution points extension with the ``AACompromise`` ``reasons`` bit |
| 232 | set. |
Paul Kehrer | cf1109d | 2015-06-17 22:40:06 -0600 | [diff] [blame] | 233 | * ``nc_permitted_excluded.pem`` - An RSA 2048 bit self-signed certificate |
| 234 | containing a name constraints extension with both permitted and excluded |
Paul Kehrer | 7155c98 | 2015-06-29 07:53:54 -0500 | [diff] [blame] | 235 | elements. Contains ``IPv4`` and ``IPv6`` addresses with network mask as well |
| 236 | as ``dNSName`` with a leading period. |
| 237 | * ``nc_permitted_excluded_2.pem`` - An RSA 2048 bit self-signed certificate |
| 238 | containing a name constraints extension with both permitted and excluded |
| 239 | elements. Unlike ``nc_permitted_excluded.pem``, the general names do not |
| 240 | contain any name constraints specific values. |
Paul Kehrer | cf1109d | 2015-06-17 22:40:06 -0600 | [diff] [blame] | 241 | * ``nc_permitted.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 242 | name constraints extension with permitted elements. |
Paul Kehrer | 7155c98 | 2015-06-29 07:53:54 -0500 | [diff] [blame] | 243 | * ``nc_permitted_2.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 244 | name constraints extension with permitted elements that do not contain any |
| 245 | name constraints specific values. |
Paul Kehrer | cf1109d | 2015-06-17 22:40:06 -0600 | [diff] [blame] | 246 | * ``nc_excluded.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 247 | name constraints extension with excluded elements. |
Paul Kehrer | 5d3f7b7 | 2015-06-28 00:39:21 -0500 | [diff] [blame] | 248 | * ``nc_invalid_ip_netmask.pem`` - An RSA 2048 bit self-signed certificate |
| 249 | containing a name constraints extension with a permitted element that has an |
| 250 | ``IPv6`` IP and an invalid network mask. |
Paul Kehrer | 8f458ab | 2015-07-01 21:17:17 -0500 | [diff] [blame] | 251 | * ``nc_single_ip_netmask.pem`` - An RSA 2048 bit self-signed certificate |
| 252 | containing a name constraints extension with a permitted element that has two |
| 253 | IPs with ``/32`` and ``/128`` network masks. |
Paul Kehrer | cdfe0f9 | 2015-05-11 20:00:29 -0500 | [diff] [blame] | 254 | * ``cp_user_notice_with_notice_reference.pem`` - An RSA 2048 bit self-signed |
| 255 | certificate containing a certificate policies extension with a |
| 256 | notice reference in the user notice. |
| 257 | * ``cp_user_notice_with_explicit_text.pem`` - An RSA 2048 bit self-signed |
| 258 | certificate containing a certificate policies extension with explicit |
| 259 | text and no notice reference. |
| 260 | * ``cp_cps_uri.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 261 | certificate policies extension with a CPS URI and no user notice. |
Paul Kehrer | 5ac4154 | 2015-05-12 16:04:52 -0500 | [diff] [blame] | 262 | * ``cp_user_notice_no_explicit_text.pem`` - An RSA 2048 bit self-signed |
| 263 | certificate containing a certificate policies extension with a user notice |
| 264 | with no explicit text. |
Paul Kehrer | 0f98436 | 2015-08-01 20:45:08 +0100 | [diff] [blame] | 265 | * ``cp_invalid.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 266 | certificate policies extension with invalid data. |
Paul Kehrer | 769e7f2 | 2015-06-17 22:28:29 -0600 | [diff] [blame] | 267 | * ``ian_uri.pem`` - An RSA 2048 bit certificate containing an issuer |
| 268 | alternative name extension with a ``URI`` general name. |
Paul Kehrer | d59b07c | 2015-06-07 18:51:50 -0500 | [diff] [blame] | 269 | * ``ocsp_nocheck.pem`` - An RSA 2048 bit self-signed certificate containing |
| 270 | an ``OCSPNoCheck`` extension. |
Paul Kehrer | 7733562 | 2015-06-17 21:52:32 -0600 | [diff] [blame] | 271 | * ``pc_inhibit_require.pem`` - An RSA 2048 bit self-signed certificate |
| 272 | containing a policy constraints extension with both inhibit policy mapping |
| 273 | and require explicit policy elements. |
| 274 | * ``pc_inhibit.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 275 | policy constraints extension with an inhibit policy mapping element. |
| 276 | * ``pc_require.pem`` - An RSA 2048 bit self-signed certificate containing a |
| 277 | policy constraints extension with a require explicit policy element. |
Alex Gaynor | 96605fc | 2015-10-10 09:03:07 -0400 | [diff] [blame] | 278 | * ``unsupported_subject_public_key_info.pem`` - A certificate whose public key |
| 279 | is an unknown OID (``1.3.6.1.4.1.8432.1.1.2``). |
Paul Kehrer | 4a6e2de | 2016-02-27 10:31:17 -0600 | [diff] [blame] | 280 | * ``policy_constraints_explicit.pem`` - A self-signed certificate containing |
| 281 | a ``policyConstraints`` extension with a ``requireExplicitPolicy`` value. |
Paul Kehrer | ff2167a | 2015-02-24 10:45:41 -0600 | [diff] [blame] | 282 | |
| 283 | Custom X.509 Request Vectors |
| 284 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 285 | |
Paul Kehrer | 89e4c95 | 2015-03-30 15:15:00 -0500 | [diff] [blame] | 286 | * ``dsa_sha1.pem`` and ``dsa_sha1.der`` - Contain a certificate request using |
| 287 | 1024-bit DSA parameters and SHA1 generated using OpenSSL. |
| 288 | * ``rsa_md4.pem`` and ``rsa_md4.der`` - Contain a certificate request using |
| 289 | 2048 bit RSA and MD4 generated using OpenSSL. |
| 290 | * ``rsa_sha1.pem`` and ``rsa_sha1.der`` - Contain a certificate request using |
| 291 | 2048 bit RSA and SHA1 generated using OpenSSL. |
| 292 | * ``rsa_sha256.pem`` and ``rsa_sha256.der`` - Contain a certificate request |
| 293 | using 2048 bit RSA and SHA256 generated using OpenSSL. |
| 294 | * ``ec_sha256.pem`` and ``ec_sha256.der`` - Contain a certificate request |
| 295 | using EC (``secp384r1``) and SHA256 generated using OpenSSL. |
Paul Kehrer | 0c518be | 2015-03-30 21:10:51 -0500 | [diff] [blame] | 296 | * ``san_rsa_sha1.pem`` and ``san_rsa_sha1.der`` - Contain a certificate |
| 297 | request using RSA and SHA1 with a subject alternative name extension |
| 298 | generated using OpenSSL. |
Andre Caron | 2b54fb0 | 2015-05-16 10:20:51 -0400 | [diff] [blame] | 299 | * ``two_basic_constraints.pem`` - A certificate signing request |
Joern Heissler | 1bd77e2 | 2016-01-13 22:51:37 +0100 | [diff] [blame] | 300 | for an RSA 2048 bit key containing two basic constraints extensions. |
Andre Caron | 2b54fb0 | 2015-05-16 10:20:51 -0400 | [diff] [blame] | 301 | * ``unsupported_extension.pem`` - A certificate signing request |
Andre Caron | 6cfe79b | 2015-05-16 08:41:52 -0400 | [diff] [blame] | 302 | for an RSA 2048 bit key containing containing an unsupported |
| 303 | extension type. The OID was encoded as "1.2.3.4" with an |
| 304 | ``extnValue`` of "value". |
Andre Caron | 2b54fb0 | 2015-05-16 10:20:51 -0400 | [diff] [blame] | 305 | * ``unsupported_extension_critical.pem`` - A certificate signing |
Andre Caron | 6cfe79b | 2015-05-16 08:41:52 -0400 | [diff] [blame] | 306 | request for an RSA 2048 bit key containing containing an unsupported |
| 307 | extension type marked critical. The OID was encoded as "1.2.3.4" |
| 308 | with an ``extnValue`` of "value". |
Joern Heissler | 1bd77e2 | 2016-01-13 22:51:37 +0100 | [diff] [blame] | 309 | * ``basic_constraints.pem`` - A certificate signing request for an RSA |
Andre Caron | c97ca7e | 2015-05-16 22:16:44 -0400 | [diff] [blame] | 310 | 2048 bit key containing a basic constraints extension marked as |
| 311 | critical. |
Joern Heissler | 1bd77e2 | 2016-01-13 22:51:37 +0100 | [diff] [blame] | 312 | * ``invalid_signature.pem`` - A certificate signing request for an RSA |
| 313 | 1024 bit key containing an invalid signature with correct padding. |
Paul Kehrer | bab4e39 | 2014-11-24 11:48:17 -1000 | [diff] [blame] | 314 | |
Erik Trauschke | 0150e3d | 2015-05-29 13:11:22 -0700 | [diff] [blame] | 315 | Custom X.509 Certificate Revocation List Vectors |
| 316 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 317 | |
| 318 | * ``crl_all_reasons.pem`` - Contains a CRL with 12 revoked certificates, whose |
| 319 | serials match their list position. It includes one revocation without |
Erik Trauschke | 70d3138 | 2015-05-29 14:29:28 -0700 | [diff] [blame] | 320 | any entry extensions, 10 revocations with every supported reason code and one |
Erik Trauschke | 0150e3d | 2015-05-29 13:11:22 -0700 | [diff] [blame] | 321 | revocation with an unsupported, non-critical entry extension with the OID |
| 322 | value set to "1.2.3.4". |
| 323 | * ``crl_dup_entry_ext.pem`` - Contains a CRL with one revocation which has a |
| 324 | duplicate entry extension. |
| 325 | * ``crl_md2_unknown_crit_entry_ext.pem`` - Contains a CRL with one revocation |
| 326 | which contains an unsupported critical entry extension with the OID value set |
| 327 | to "1.2.3.4". The CRL uses an unsupported MD2 signature algorithm. |
| 328 | * ``crl_unsupported_reason.pem`` - Contains a CRL with one revocation which has |
| 329 | an unsupported reason code. |
Erik Trauschke | a6c8259 | 2015-10-15 21:10:20 -0700 | [diff] [blame] | 330 | * ``crl_inval_cert_issuer_entry_ext.pem`` - Contains a CRL with one revocation |
| 331 | which has one entry extension for certificate issuer with an empty value. |
Paul Kehrer | 9543a33 | 2015-12-20 18:48:24 -0600 | [diff] [blame] | 332 | * ``crl_empty.pem`` - Contains a CRL with no revoked certificates. |
Paul Kehrer | 93df8b7 | 2015-12-22 17:16:13 -0600 | [diff] [blame] | 333 | * ``crl_ian_aia_aki.pem`` - Contains a CRL with ``IssuerAlternativeName``, |
| 334 | ``AuthorityInformationAccess``, ``AuthorityKeyIdentifier`` and ``CRLNumber`` |
| 335 | extensions. |
Erik Trauschke | 0150e3d | 2015-05-29 13:11:22 -0700 | [diff] [blame] | 336 | |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 337 | Hashes |
| 338 | ~~~~~~ |
| 339 | |
| 340 | * MD5 from :rfc:`1321`. |
| 341 | * RIPEMD160 from the `RIPEMD website`_. |
| 342 | * SHA1 from `NIST CAVP`_. |
| 343 | * SHA2 (224, 256, 384, 512) from `NIST CAVP`_. |
| 344 | * Whirlpool from the `Whirlpool website`_. |
Terry Chia | 7e6afe8 | 2016-04-09 22:04:12 +0800 | [diff] [blame] | 345 | * Blake2s and Blake2b from OpenSSL `test/evptests.txt`_. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 346 | |
| 347 | HMAC |
| 348 | ~~~~ |
| 349 | |
| 350 | * HMAC-MD5 from :rfc:`2202`. |
| 351 | * HMAC-SHA1 from :rfc:`2202`. |
| 352 | * HMAC-RIPEMD160 from :rfc:`2286`. |
| 353 | * HMAC-SHA2 (224, 256, 384, 512) from :rfc:`4231`. |
| 354 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 355 | Key derivation functions |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 356 | ~~~~~~~~~~~~~~~~~~~~~~~~ |
| 357 | |
| 358 | * HKDF (SHA1, SHA256) from :rfc:`5869`. |
| 359 | * PBKDF2 (HMAC-SHA1) from :rfc:`6070`. |
Alex Gaynor | 75e72ea | 2014-03-01 12:18:27 -0800 | [diff] [blame] | 360 | * scrypt from the `draft RFC`_. |
Simo Sorce | e69da95 | 2015-09-15 11:16:56 -0400 | [diff] [blame] | 361 | * X9.63 KDF from `NIST CAVP`_. |
Jared Messenger | fac4d64 | 2016-03-14 14:27:09 -0700 | [diff] [blame] | 362 | * SP 800-108 Counter Mode KDF (HMAC-SHA1, HMAC-SHA224, HMAC-SHA256, |
| 363 | HMAC-SHA384, HMAC-SHA512) from `NIST CAVP`_. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 364 | |
Paul Kehrer | 16430f9 | 2015-03-15 09:06:25 -0500 | [diff] [blame] | 365 | Key wrapping |
| 366 | ~~~~~~~~~~~~ |
| 367 | |
| 368 | * AES key wrap (AESKW) and 3DES key wrap test vectors from `NIST CAVP`_. |
| 369 | |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 370 | Recipes |
| 371 | ~~~~~~~ |
| 372 | |
| 373 | * Fernet from its `specification repository`_. |
| 374 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 375 | Symmetric ciphers |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 376 | ~~~~~~~~~~~~~~~~~ |
| 377 | |
Paul Kehrer | e547d8f | 2014-02-15 21:37:52 -0600 | [diff] [blame] | 378 | * AES (CBC, CFB, ECB, GCM, OFB) from `NIST CAVP`_. |
| 379 | * AES CTR from :rfc:`3686`. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 380 | * 3DES (CBC, CFB, ECB, OFB) from `NIST CAVP`_. |
Ehren Kret | e23c0b7 | 2015-11-28 02:40:33 -0800 | [diff] [blame] | 381 | * ARC4 (KEY-LENGTH: 40, 56, 64, 80, 128, 192, 256) from :rfc:`6229`. |
| 382 | * ARC4 (KEY-LENGTH: 160) generated by this project. |
| 383 | See: :doc:`/development/custom-vectors/arc4` |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 384 | * Blowfish (CBC, CFB, ECB, OFB) from `Bruce Schneier's vectors`_. |
| 385 | * Camellia (ECB) from NTT's `Camellia page`_ as linked by `CRYPTREC`_. |
| 386 | * Camellia (CBC, CFB, OFB) from `OpenSSL's test vectors`_. |
| 387 | * CAST5 (ECB) from :rfc:`2144`. |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 388 | * CAST5 (CBC, CFB, OFB) generated by this project. |
| 389 | See: :doc:`/development/custom-vectors/cast5` |
Paul Kehrer | b09622c | 2014-02-16 19:32:04 -0600 | [diff] [blame] | 390 | * IDEA (ECB) from the `NESSIE IDEA vectors`_ created by `NESSIE`_. |
| 391 | * IDEA (CBC, CFB, OFB) generated by this project. |
| 392 | See: :doc:`/development/custom-vectors/idea` |
Paul Kehrer | 1d0f973 | 2014-04-08 08:44:25 -0500 | [diff] [blame] | 393 | * SEED (ECB) from :rfc:`4269`. |
Paul Kehrer | f0e12ac | 2014-04-08 08:59:40 -0500 | [diff] [blame] | 394 | * SEED (CBC) from :rfc:`4196`. |
Paul Kehrer | 6d8f9b0 | 2014-04-08 09:17:02 -0500 | [diff] [blame] | 395 | * SEED (CFB, OFB) generated by this project. |
| 396 | See: :doc:`/development/custom-vectors/seed` |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 397 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 398 | Two factor authentication |
Ayrx | 933dd68 | 2014-02-18 23:26:11 +0800 | [diff] [blame] | 399 | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 400 | |
| 401 | * HOTP from :rfc:`4226` |
Alex Gaynor | 75e72ea | 2014-03-01 12:18:27 -0800 | [diff] [blame] | 402 | * TOTP from :rfc:`6238` (Note that an `errata`_ for the test vectors in RFC |
| 403 | 6238 exists) |
Ayrx | 933dd68 | 2014-02-18 23:26:11 +0800 | [diff] [blame] | 404 | |
Ayrx | 1d6b77b | 2014-04-10 23:11:03 +0800 | [diff] [blame] | 405 | CMAC |
| 406 | ~~~~ |
| 407 | |
Ayrx | fa52e6a | 2014-04-14 22:26:21 +0800 | [diff] [blame] | 408 | * AES-128, AES-192, AES-256, 3DES from `NIST SP-800-38B`_ |
Ayrx | 1d6b77b | 2014-04-10 23:11:03 +0800 | [diff] [blame] | 409 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 410 | Creating test vectors |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 411 | --------------------- |
| 412 | |
| 413 | When official vectors are unavailable ``cryptography`` may choose to build |
Paul Kehrer | 9f7ad19 | 2014-09-24 21:54:39 -0500 | [diff] [blame] | 414 | its own using existing vectors as source material. |
michael-hart | 59f7219 | 2014-09-24 11:31:20 +0100 | [diff] [blame] | 415 | |
Paul Kehrer | ebc2650 | 2014-11-26 19:18:56 -1000 | [diff] [blame] | 416 | Custom Symmetric Vectors |
| 417 | ~~~~~~~~~~~~~~~~~~~~~~~~ |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 418 | |
| 419 | .. toctree:: |
| 420 | :maxdepth: 1 |
| 421 | |
Ehren Kret | 6c83cc6 | 2015-11-28 03:24:15 -0800 | [diff] [blame] | 422 | custom-vectors/arc4 |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 423 | custom-vectors/cast5 |
Paul Kehrer | b09622c | 2014-02-16 19:32:04 -0600 | [diff] [blame] | 424 | custom-vectors/idea |
Paul Kehrer | 6d8f9b0 | 2014-04-08 09:17:02 -0500 | [diff] [blame] | 425 | custom-vectors/seed |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 426 | |
| 427 | If official test vectors appear in the future the custom generated vectors |
| 428 | should be discarded. |
| 429 | |
| 430 | Any vectors generated by this method must also be prefixed with the following |
| 431 | header format (substituting the correct information): |
| 432 | |
| 433 | .. code-block:: python |
| 434 | |
| 435 | # CAST5 CBC vectors built for https://github.com/pyca/cryptography |
| 436 | # Derived from the AESVS MMT test data for CBC |
| 437 | # Verified against the CommonCrypto and Go crypto packages |
| 438 | # Key Length : 128 |
| 439 | |
Alex Gaynor | e51236d | 2016-11-06 10:13:35 -0500 | [diff] [blame] | 440 | .. _`NIST`: https://www.nist.gov/ |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 441 | .. _`IETF`: https://www.ietf.org/ |
| 442 | .. _`NIST CAVP`: http://csrc.nist.gov/groups/STM/cavp/ |
| 443 | .. _`Bruce Schneier's vectors`: https://www.schneier.com/code/vectors.txt |
Alex Gaynor | 4566cb9 | 2015-10-02 06:40:05 -0700 | [diff] [blame] | 444 | .. _`Camellia page`: https://info.isl.ntt.co.jp/crypt/eng/camellia/ |
Alex Gaynor | 6422d83 | 2016-03-06 21:40:57 -0500 | [diff] [blame] | 445 | .. _`CRYPTREC`: https://www.cryptrec.go.jp |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 446 | .. _`OpenSSL's test vectors`: https://github.com/openssl/openssl/blob/97cf1f6c2854a3a955fd7dd3a1f113deba00c9ef/crypto/evp/evptests.txt#L232 |
| 447 | .. _`RIPEMD website`: http://homes.esat.kuleuven.be/~bosselae/ripemd160.html |
| 448 | .. _`Whirlpool website`: http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html |
Alex Gaynor | 75e72ea | 2014-03-01 12:18:27 -0800 | [diff] [blame] | 449 | .. _`draft RFC`: https://tools.ietf.org/html/draft-josefsson-scrypt-kdf-01 |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 450 | .. _`Specification repository`: https://github.com/fernet/spec |
Alex Gaynor | 3197ab5 | 2015-10-02 06:33:11 -0700 | [diff] [blame] | 451 | .. _`errata`: https://www.rfc-editor.org/errata_search.php?rfc=6238 |
Paul Kehrer | 5e9a8a3 | 2015-03-02 13:25:45 -0600 | [diff] [blame] | 452 | .. _`OpenSSL example key`: https://github.com/openssl/openssl/blob/d02b48c63a58ea4367a0e905979f140b7d090f86/test/testrsa.pem |
Paul Kehrer | dac86a9 | 2015-03-06 08:36:07 -0600 | [diff] [blame] | 453 | .. _`GnuTLS key parsing tests`: https://gitlab.com/gnutls/gnutls/commit/f16ef39ef0303b02d7fa590a37820440c466ce8d |
| 454 | .. _`enc-rsa-pkcs8.pem`: https://gitlab.com/gnutls/gnutls/blob/f8d943b38bf74eaaa11d396112daf43cb8aa82ae/tests/pkcs8-decode/encpkcs8.pem |
| 455 | .. _`enc2-rsa-pkcs8.pem`: https://gitlab.com/gnutls/gnutls/blob/f8d943b38bf74eaaa11d396112daf43cb8aa82ae/tests/pkcs8-decode/enc2pkcs8.pem |
| 456 | .. _`unenc-rsa-pkcs8.pem`: https://gitlab.com/gnutls/gnutls/blob/f8d943b38bf74eaaa11d396112daf43cb8aa82ae/tests/pkcs8-decode/unencpkcs8.pem |
| 457 | .. _`pkcs12_s2k_pem.c`: https://gitlab.com/gnutls/gnutls/blob/f8d943b38bf74eaaa11d396112daf43cb8aa82ae/tests/pkcs12_s2k_pem.c |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 458 | .. _`Botan's ECC private keys`: https://github.com/randombit/botan/tree/4917f26a2b154e841cd27c1bcecdd41d2bdeb6ce/src/tests/data/ecc |
Alex Gaynor | 3efbf49 | 2015-03-09 07:13:22 -0400 | [diff] [blame] | 459 | .. _`GnuTLS example keys`: https://gitlab.com/gnutls/gnutls/commit/ad2061deafdd7db78fd405f9d143b0a7c579da7b |
Paul Kehrer | b09622c | 2014-02-16 19:32:04 -0600 | [diff] [blame] | 460 | .. _`NESSIE IDEA vectors`: https://www.cosic.esat.kuleuven.be/nessie/testvectors/bc/idea/Idea-128-64.verified.test-vectors |
| 461 | .. _`NESSIE`: https://en.wikipedia.org/wiki/NESSIE |
Alex Stapleton | 833a8ea | 2014-04-02 14:50:56 +0100 | [diff] [blame] | 462 | .. _`Ed25519 website`: http://ed25519.cr.yp.to/software.html |
Ayrx | 40afce0 | 2014-04-13 19:17:52 +0800 | [diff] [blame] | 463 | .. _`NIST SP-800-38B`: http://csrc.nist.gov/publications/nistpubs/800-38B/Updated_CMAC_Examples.pdf |
Paul Kehrer | bab4e39 | 2014-11-24 11:48:17 -1000 | [diff] [blame] | 464 | .. _`NIST PKI Testing`: http://csrc.nist.gov/groups/ST/crypto_apps_infra/pki/pkitesting.html |
Paul Kehrer | ebc2650 | 2014-11-26 19:18:56 -1000 | [diff] [blame] | 465 | .. _`testx509.pem`: https://github.com/openssl/openssl/blob/master/test/testx509.pem |
| 466 | .. _`DigiCert Global Root G3`: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt |
Paul Kehrer | 2b6ba0c | 2015-02-14 18:58:20 -0600 | [diff] [blame] | 467 | .. _`root data`: https://hg.mozilla.org/projects/nss/file/25b2922cc564/security/nss/lib/ckfw/builtins/certdata.txt#l2053 |
Paul Kehrer | b07a0c9 | 2015-03-02 13:21:27 -0600 | [diff] [blame] | 468 | .. _`asymmetric/public/PKCS1/dsa.pub.pem`: https://github.com/ruby/ruby/blob/4ccb387f3bc436a08fc6d72c4931994f5de95110/test/openssl/test_pkey_dsa.rb#L53 |
Paul Kehrer | 0ed3d91 | 2015-07-04 16:48:08 -0500 | [diff] [blame] | 469 | .. _`Mozilla bug`: https://bugzilla.mozilla.org/show_bug.cgi?id=233586 |
Alex Gaynor | 4377454 | 2016-04-09 10:51:09 -0400 | [diff] [blame] | 470 | .. _`Russian CA`: https://e-trust.gosuslugi.ru/MainCA |
Terry Chia | 7e6afe8 | 2016-04-09 22:04:12 +0800 | [diff] [blame] | 471 | .. _`test/evptests.txt`: https://github.com/openssl/openssl/blob/2d0b44126763f989a4cbffbffe9d0c7518158bb7/test/evptests.txt |
Paul Kehrer | f6f238e | 2016-11-11 10:41:31 -0800 | [diff] [blame] | 472 | .. _`unknown signature OID`: https://bugzilla.mozilla.org/show_bug.cgi?id=405966 |
Aviv Palivoda | 495f21a | 2016-11-25 18:51:28 +0200 | [diff] [blame] | 473 | .. _`botan`: https://github.com/randombit/botan/blob/57789bdfc55061002b2727d0b32587612829a37c/src/tests/data/pubkey/dh.vec |