| /* |
| * |
| * Copyright (c) 2013-2017 Nest Labs, Inc. |
| * All rights reserved. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| /** |
| * @file |
| * Test weave certificates and private keys |
| * |
| */ |
| |
| #include "ToolCommon.h" |
| |
| // Certificate and private key for Test Device 1 |
| // |
| |
| uint64_t TestDevice1_NodeId = 0x18B4300000000001ULL; |
| |
| uint8_t TestDevice1_Cert[] = |
| { |
| |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBhzCCAT6gAwIBAgIIEEjK8u1PmzAwCQYHKoZIzj0EATAiMSAwHgYKKwYBBAGC |
| wysBAwwQMThCNDMwRUVFRTAwMDAwMjAeFw0xMzEwMjIwMDQ3MDBaFw0yMzEwMjAw |
| MDQ3MDBaMCIxIDAeBgorBgEEAYLDKwEBDBAxOEI0MzAwMDAwMDAwMDAxME4wEAYH |
| KoZIzj0CAQYFK4EEACEDOgAE72edUwyZ/51yQrH5tmAgjiWfNXLwo+eD5lYUk/lo |
| RWWLJDFeh4xkNSWHGQOZzUWhJPp2CxKeOX6jajBoMAwGA1UdEwEB/wQCMAAwDgYD |
| VR0PAQH/BAQDAgWgMCAGA1UdJQEB/wQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAR |
| BgNVHQ4ECgQITv9HUeTGY5swEwYDVR0jBAwwCoAIRONAOKnUtacwCQYHKoZIzj0E |
| AQM4ADA1Ahhdt1KwlRMRcfFbZAOAjBi+oSDxhrpFbBQCGQDFDc8mAoARjFE6vZWV |
| dpR3yUb/7cCgPb0= |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x10, 0x48, 0xca, 0xf2, 0xed, 0x4f, |
| 0x9b, 0x30, 0x24, 0x02, 0x04, 0x57, 0x03, 0x00, 0x27, 0x13, 0x02, 0x00, 0x00, 0xee, 0xee, 0x30, |
| 0xb4, 0x18, 0x18, 0x26, 0x04, 0x04, 0x23, 0x73, 0x1a, 0x26, 0x05, 0x04, 0xcc, 0x98, 0x2d, 0x57, |
| 0x06, 0x00, 0x27, 0x11, 0x01, 0x00, 0x00, 0x00, 0x00, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, |
| 0x24, 0x08, 0x25, 0x30, 0x0a, 0x39, 0x04, 0xef, 0x67, 0x9d, 0x53, 0x0c, 0x99, 0xff, 0x9d, 0x72, |
| 0x42, 0xb1, 0xf9, 0xb6, 0x60, 0x20, 0x8e, 0x25, 0x9f, 0x35, 0x72, 0xf0, 0xa3, 0xe7, 0x83, 0xe6, |
| 0x56, 0x14, 0x93, 0xf9, 0x68, 0x45, 0x65, 0x8b, 0x24, 0x31, 0x5e, 0x87, 0x8c, 0x64, 0x35, 0x25, |
| 0x87, 0x19, 0x03, 0x99, 0xcd, 0x45, 0xa1, 0x24, 0xfa, 0x76, 0x0b, 0x12, 0x9e, 0x39, 0x7e, 0x35, |
| 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, 0x01, |
| 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4e, 0xff, 0x47, |
| 0x51, 0xe4, 0xc6, 0x63, 0x9b, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xe3, 0x40, 0x38, 0xa9, |
| 0xd4, 0xb5, 0xa7, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x18, 0x5d, 0xb7, 0x52, 0xb0, 0x95, 0x13, 0x11, |
| 0x71, 0xf1, 0x5b, 0x64, 0x03, 0x80, 0x8c, 0x18, 0xbe, 0xa1, 0x20, 0xf1, 0x86, 0xba, 0x45, 0x6c, |
| 0x14, 0x30, 0x02, 0x19, 0x00, 0xc5, 0x0d, 0xcf, 0x26, 0x02, 0x80, 0x11, 0x8c, 0x51, 0x3a, 0xbd, |
| 0x95, 0x95, 0x76, 0x94, 0x77, 0xc9, 0x46, 0xff, 0xed, 0xc0, 0xa0, 0x3d, 0xbd, 0x18, 0x18 |
| }; |
| |
| uint16_t TestDevice1_CertLength = sizeof(TestDevice1_Cert); |
| |
| uint8_t TestDevice1_PrivateKey[] = |
| { |
| |
| /* |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHKmH22bJe2mLomgimLLt70dguW98M6EsKajVuO6gBwYFK4EEACGhPAM6 |
| AATvZ51TDJn/nXJCsfm2YCCOJZ81cvCj54PmVhST+WhFZYskMV6HjGQ1JYcZA5nN |
| RaEk+nYLEp45fg== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x24, 0x01, 0x25, 0x30, 0x02, 0x1c, 0xa9, 0x87, 0xdb, |
| 0x66, 0xc9, 0x7b, 0x69, 0x8b, 0xa2, 0x68, 0x22, 0x98, 0xb2, 0xed, 0xef, 0x47, 0x60, 0xb9, 0x6f, |
| 0x7c, 0x33, 0xa1, 0x2c, 0x29, 0xa8, 0xd5, 0xb8, 0xee, 0x30, 0x03, 0x39, 0x04, 0xef, 0x67, 0x9d, |
| 0x53, 0x0c, 0x99, 0xff, 0x9d, 0x72, 0x42, 0xb1, 0xf9, 0xb6, 0x60, 0x20, 0x8e, 0x25, 0x9f, 0x35, |
| 0x72, 0xf0, 0xa3, 0xe7, 0x83, 0xe6, 0x56, 0x14, 0x93, 0xf9, 0x68, 0x45, 0x65, 0x8b, 0x24, 0x31, |
| 0x5e, 0x87, 0x8c, 0x64, 0x35, 0x25, 0x87, 0x19, 0x03, 0x99, 0xcd, 0x45, 0xa1, 0x24, 0xfa, 0x76, |
| 0x0b, 0x12, 0x9e, 0x39, 0x7e, 0x18 |
| }; |
| |
| uint16_t TestDevice1_PrivateKeyLength = sizeof(TestDevice1_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 2 |
| // |
| |
| uint64_t TestDevice2_NodeId = 0x18B4300000000002ULL; |
| |
| uint8_t TestDevice2_Cert[] = |
| { |
| |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBiDCCAT6gAwIBAgIIPFTEnv7rh0wwCQYHKoZIzj0EATAiMSAwHgYKKwYBBAGC |
| wysBAwwQMThCNDMwRUVFRTAwMDAwMjAeFw0xMzEwMjIwMDUwMTJaFw0yMzEwMjAw |
| MDUwMTJaMCIxIDAeBgorBgEEAYLDKwEBDBAxOEI0MzAwMDAwMDAwMDAyME4wEAYH |
| KoZIzj0CAQYFK4EEACEDOgAEsB7F17Jiyrxe1x8foLbzy3FgKoWViydIURUEow3D |
| CI6q5jGbsGugF5WuSwzFkc+r3q5LXDh33bGjajBoMAwGA1UdEwEB/wQCMAAwDgYD |
| VR0PAQH/BAQDAgWgMCAGA1UdJQEB/wQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAR |
| BgNVHQ4ECgQIQUiUV0usIFswEwYDVR0jBAwwCoAIRONAOKnUtacwCQYHKoZIzj0E |
| AQM5ADA2AhkAruDfkbDeZ+RfrLIaVNGrAFkhP3+hQaTdAhkAht6WT6mSTsRRV9N4 |
| FzXTUuNKw2GuxQVW |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x3c, 0x54, 0xc4, 0x9e, 0xfe, 0xeb, |
| 0x87, 0x4c, 0x24, 0x02, 0x04, 0x57, 0x03, 0x00, 0x27, 0x13, 0x02, 0x00, 0x00, 0xee, 0xee, 0x30, |
| 0xb4, 0x18, 0x18, 0x26, 0x04, 0xc4, 0x23, 0x73, 0x1a, 0x26, 0x05, 0xc4, 0xcc, 0x98, 0x2d, 0x57, |
| 0x06, 0x00, 0x27, 0x11, 0x02, 0x00, 0x00, 0x00, 0x00, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, |
| 0x24, 0x08, 0x25, 0x30, 0x0a, 0x39, 0x04, 0xb0, 0x1e, 0xc5, 0xd7, 0xb2, 0x62, 0xca, 0xbc, 0x5e, |
| 0xd7, 0x1f, 0x1f, 0xa0, 0xb6, 0xf3, 0xcb, 0x71, 0x60, 0x2a, 0x85, 0x95, 0x8b, 0x27, 0x48, 0x51, |
| 0x15, 0x04, 0xa3, 0x0d, 0xc3, 0x08, 0x8e, 0xaa, 0xe6, 0x31, 0x9b, 0xb0, 0x6b, 0xa0, 0x17, 0x95, |
| 0xae, 0x4b, 0x0c, 0xc5, 0x91, 0xcf, 0xab, 0xde, 0xae, 0x4b, 0x5c, 0x38, 0x77, 0xdd, 0xb1, 0x35, |
| 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, 0x01, |
| 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x41, 0x48, 0x94, |
| 0x57, 0x4b, 0xac, 0x20, 0x5b, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xe3, 0x40, 0x38, 0xa9, |
| 0xd4, 0xb5, 0xa7, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x19, 0x00, 0xae, 0xe0, 0xdf, 0x91, 0xb0, 0xde, |
| 0x67, 0xe4, 0x5f, 0xac, 0xb2, 0x1a, 0x54, 0xd1, 0xab, 0x00, 0x59, 0x21, 0x3f, 0x7f, 0xa1, 0x41, |
| 0xa4, 0xdd, 0x30, 0x02, 0x19, 0x00, 0x86, 0xde, 0x96, 0x4f, 0xa9, 0x92, 0x4e, 0xc4, 0x51, 0x57, |
| 0xd3, 0x78, 0x17, 0x35, 0xd3, 0x52, 0xe3, 0x4a, 0xc3, 0x61, 0xae, 0xc5, 0x05, 0x56, 0x18, 0x18 |
| }; |
| |
| uint16_t TestDevice2_CertLength = sizeof(TestDevice2_Cert); |
| |
| uint8_t TestDevice2_PrivateKey[] = |
| { |
| |
| /* |
| -----BEGIN PRIVATE KEY----- |
| MHgCAQAwEAYHKoZIzj0CAQYFK4EEACEEYTBfAgEBBByBDFNiy0wkB3RHmWaUrn/9 |
| hdUP5JrfLTndurQ3oTwDOgAEsB7F17Jiyrxe1x8foLbzy3FgKoWViydIURUEow3D |
| CI6q5jGbsGugF5WuSwzFkc+r3q5LXDh33bE= |
| -----END PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x24, 0x01, 0x25, 0x30, 0x02, 0x1c, 0x81, 0x0c, 0x53, |
| 0x62, 0xcb, 0x4c, 0x24, 0x07, 0x74, 0x47, 0x99, 0x66, 0x94, 0xae, 0x7f, 0xfd, 0x85, 0xd5, 0x0f, |
| 0xe4, 0x9a, 0xdf, 0x2d, 0x39, 0xdd, 0xba, 0xb4, 0x37, 0x30, 0x03, 0x39, 0x04, 0xb0, 0x1e, 0xc5, |
| 0xd7, 0xb2, 0x62, 0xca, 0xbc, 0x5e, 0xd7, 0x1f, 0x1f, 0xa0, 0xb6, 0xf3, 0xcb, 0x71, 0x60, 0x2a, |
| 0x85, 0x95, 0x8b, 0x27, 0x48, 0x51, 0x15, 0x04, 0xa3, 0x0d, 0xc3, 0x08, 0x8e, 0xaa, 0xe6, 0x31, |
| 0x9b, 0xb0, 0x6b, 0xa0, 0x17, 0x95, 0xae, 0x4b, 0x0c, 0xc5, 0x91, 0xcf, 0xab, 0xde, 0xae, 0x4b, |
| 0x5c, 0x38, 0x77, 0xdd, 0xb1, 0x18 |
| }; |
| |
| uint16_t TestDevice2_PrivateKeyLength = sizeof(TestDevice2_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 3 |
| // |
| |
| uint64_t TestDevice3_NodeId = 0x18B4300000000003ULL; |
| |
| uint8_t TestDevice3_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x0E, 0x0E, 0x6B, 0x67, 0x78, 0x0D, |
| 0x08, 0x29, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x03, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0x40, 0xC4, 0xF3, 0x78, 0x39, 0xBD, 0x9F, 0xC2, |
| 0x1D, 0x5F, 0x63, 0xD0, 0xD3, 0xC5, 0x20, 0xED, 0xD3, 0x65, 0x43, 0xED, 0xB6, 0x30, 0x0A, 0xDA, |
| 0x1B, 0xC4, 0xE7, 0x80, 0xDB, 0x45, 0xD7, 0x3C, 0xEB, 0xD2, 0xFB, 0xCE, 0x96, 0xA2, 0x07, 0x6C, |
| 0x07, 0xDE, 0xC9, 0xDD, 0x56, 0x3E, 0xC2, 0xA2, 0x54, 0xAA, 0xE4, 0xE2, 0x2B, 0xA5, 0x8F, 0x9A, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x49, 0x89, |
| 0x4D, 0x8B, 0x7A, 0x99, 0x63, 0x77, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x19, 0x00, 0xFE, 0x32, 0x4E, 0x5E, 0x26, |
| 0x2F, 0xB0, 0x18, 0x0A, 0x90, 0xBB, 0x59, 0x4D, 0x9E, 0xC5, 0x8D, 0x0F, 0xF5, 0x01, 0x65, 0x86, |
| 0x16, 0xD6, 0x71, 0x30, 0x02, 0x18, 0x1B, 0xDA, 0xB8, 0x3B, 0x89, 0xA6, 0x63, 0xA7, 0x61, 0x65, |
| 0xF6, 0xF8, 0x80, 0x80, 0xA9, 0xC8, 0x8E, 0x81, 0x43, 0x08, 0xDA, 0xBB, 0x3A, 0x46, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDevice3_CertLength = sizeof(TestDevice3_Cert); |
| |
| uint8_t TestDevice3_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0x2A, 0x9E, 0x10, 0x6F, 0x3A, 0x4A, 0xFB, 0x59, 0x59, 0xCE, 0x58, 0x77, 0x18, 0x0C, 0x44, 0x3B, |
| 0x0F, 0xAD, 0xA3, 0x45, 0x17, 0x4B, 0x55, 0x56, 0xC7, 0x1C, 0x5E, 0x62, 0x30, 0x03, 0x39, 0x04, |
| 0x40, 0xC4, 0xF3, 0x78, 0x39, 0xBD, 0x9F, 0xC2, 0x1D, 0x5F, 0x63, 0xD0, 0xD3, 0xC5, 0x20, 0xED, |
| 0xD3, 0x65, 0x43, 0xED, 0xB6, 0x30, 0x0A, 0xDA, 0x1B, 0xC4, 0xE7, 0x80, 0xDB, 0x45, 0xD7, 0x3C, |
| 0xEB, 0xD2, 0xFB, 0xCE, 0x96, 0xA2, 0x07, 0x6C, 0x07, 0xDE, 0xC9, 0xDD, 0x56, 0x3E, 0xC2, 0xA2, |
| 0x54, 0xAA, 0xE4, 0xE2, 0x2B, 0xA5, 0x8F, 0x9A, 0x18, |
| }; |
| |
| uint16_t TestDevice3_PrivateKeyLength = sizeof(TestDevice3_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 4 |
| // |
| |
| uint64_t TestDevice4_NodeId = 0x18B4300000000004ULL; |
| |
| uint8_t TestDevice4_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x09, 0x1E, 0xBA, 0xAC, 0xB0, 0xF5, |
| 0x62, 0x81, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0xE5, 0xCB, 0x25, 0xE1, 0x33, 0xF6, 0xA4, 0x2A, |
| 0xBD, 0x7D, 0x4E, 0x52, 0x25, 0xAB, 0x7E, 0x02, 0x17, 0x45, 0x6A, 0x66, 0x8F, 0x7A, 0x98, 0x8C, |
| 0x96, 0xF4, 0xAA, 0xAC, 0xEB, 0x9E, 0x2B, 0x33, 0x52, 0xCD, 0xB1, 0xC9, 0xBB, 0xA5, 0xA7, 0xC8, |
| 0xE2, 0x72, 0x95, 0x05, 0x07, 0x92, 0x6C, 0x19, 0x06, 0xF5, 0x7F, 0xD3, 0x8D, 0x09, 0x9C, 0xEE, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x42, 0xA7, |
| 0x36, 0x47, 0xBA, 0x95, 0x4A, 0xA6, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x18, 0x77, 0x36, 0xE5, 0xCD, 0x8C, 0x6B, |
| 0xA1, 0x7E, 0x89, 0x1F, 0x67, 0x28, 0x51, 0xE6, 0x1B, 0x12, 0x0A, 0x27, 0x8D, 0x4B, 0x70, 0x78, |
| 0x70, 0x84, 0x30, 0x02, 0x19, 0x00, 0xA4, 0x45, 0x12, 0xC7, 0x32, 0x51, 0x49, 0x9A, 0xD6, 0x91, |
| 0x35, 0x06, 0x74, 0xC4, 0x54, 0x22, 0x9D, 0x2F, 0x59, 0x7C, 0x7A, 0xE7, 0xCE, 0x26, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDevice4_CertLength = sizeof(TestDevice4_Cert); |
| |
| uint8_t TestDevice4_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0x44, 0xC4, 0x28, 0x10, 0xE9, 0xED, 0x3F, 0x25, 0xE0, 0xC3, 0xB6, 0x4B, 0x2A, 0x91, 0x87, 0x61, |
| 0xBB, 0x37, 0x8F, 0x96, 0x6B, 0x80, 0x49, 0xD0, 0x74, 0xF7, 0x3E, 0x5B, 0x30, 0x03, 0x39, 0x04, |
| 0xE5, 0xCB, 0x25, 0xE1, 0x33, 0xF6, 0xA4, 0x2A, 0xBD, 0x7D, 0x4E, 0x52, 0x25, 0xAB, 0x7E, 0x02, |
| 0x17, 0x45, 0x6A, 0x66, 0x8F, 0x7A, 0x98, 0x8C, 0x96, 0xF4, 0xAA, 0xAC, 0xEB, 0x9E, 0x2B, 0x33, |
| 0x52, 0xCD, 0xB1, 0xC9, 0xBB, 0xA5, 0xA7, 0xC8, 0xE2, 0x72, 0x95, 0x05, 0x07, 0x92, 0x6C, 0x19, |
| 0x06, 0xF5, 0x7F, 0xD3, 0x8D, 0x09, 0x9C, 0xEE, 0x18, |
| }; |
| |
| uint16_t TestDevice4_PrivateKeyLength = sizeof(TestDevice4_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 5 |
| // |
| |
| uint64_t TestDevice5_NodeId = 0x18B4300000000005ULL; |
| |
| uint8_t TestDevice5_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x2B, 0x98, 0x4A, 0x46, 0x49, 0xEF, |
| 0x71, 0x5B, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x05, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0xC3, 0xF7, 0x6C, 0x56, 0xEB, 0xEC, 0x71, 0x66, |
| 0x8D, 0x82, 0x54, 0x03, 0xFE, 0x28, 0xB2, 0x70, 0xDA, 0x80, 0x8A, 0x73, 0xC4, 0x18, 0x3D, 0x76, |
| 0x2C, 0x51, 0x4B, 0xBF, 0xE1, 0xF7, 0x80, 0xF9, 0xFB, 0xEE, 0x2C, 0x4F, 0xD1, 0xC6, 0xCC, 0x37, |
| 0xFF, 0x09, 0xBD, 0x12, 0xD4, 0x1D, 0xE9, 0x71, 0xFF, 0x54, 0xCB, 0xC1, 0xD0, 0xE4, 0x4F, 0x77, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x41, 0x1A, |
| 0x66, 0x84, 0x71, 0x80, 0xD1, 0x58, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x18, 0x26, 0x56, 0x58, 0x8B, 0x30, 0xF2, |
| 0xD8, 0xE9, 0xDD, 0x11, 0xEC, 0xDD, 0x2E, 0x00, 0xD4, 0xED, 0xC5, 0x81, 0x05, 0x9A, 0x06, 0x52, |
| 0x89, 0x86, 0x30, 0x02, 0x18, 0x4C, 0x6B, 0x40, 0x65, 0x44, 0xE0, 0x07, 0x1E, 0xC5, 0x35, 0x68, |
| 0xFF, 0x2F, 0x9F, 0xE2, 0x23, 0x29, 0x68, 0x0B, 0xF8, 0xE5, 0x1D, 0x50, 0x5F, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDevice5_CertLength = sizeof(TestDevice5_Cert); |
| |
| uint8_t TestDevice5_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0x98, 0xEB, 0xC4, 0x6D, 0x0A, 0xAD, 0x6E, 0xCC, 0x0C, 0x6A, 0xCB, 0x57, 0x96, 0x97, 0x3A, 0xE8, |
| 0x36, 0x64, 0x39, 0xF7, 0x08, 0x59, 0x62, 0xBB, 0xFB, 0x82, 0xA9, 0xE0, 0x30, 0x03, 0x39, 0x04, |
| 0xC3, 0xF7, 0x6C, 0x56, 0xEB, 0xEC, 0x71, 0x66, 0x8D, 0x82, 0x54, 0x03, 0xFE, 0x28, 0xB2, 0x70, |
| 0xDA, 0x80, 0x8A, 0x73, 0xC4, 0x18, 0x3D, 0x76, 0x2C, 0x51, 0x4B, 0xBF, 0xE1, 0xF7, 0x80, 0xF9, |
| 0xFB, 0xEE, 0x2C, 0x4F, 0xD1, 0xC6, 0xCC, 0x37, 0xFF, 0x09, 0xBD, 0x12, 0xD4, 0x1D, 0xE9, 0x71, |
| 0xFF, 0x54, 0xCB, 0xC1, 0xD0, 0xE4, 0x4F, 0x77, 0x18, |
| }; |
| |
| uint16_t TestDevice5_PrivateKeyLength = sizeof(TestDevice5_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 6 |
| // |
| |
| uint64_t TestDevice6_NodeId = 0x18B4300000000006ULL; |
| |
| uint8_t TestDevice6_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x71, 0xCC, 0x48, 0x30, 0xB8, 0x6D, |
| 0x51, 0x5C, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x06, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0x9B, 0xA4, 0xA1, 0x43, 0x82, 0x81, 0xCB, 0x33, |
| 0x4C, 0x67, 0x70, 0x39, 0xB1, 0x25, 0xE2, 0x27, 0xF1, 0x96, 0xB0, 0x27, 0xA9, 0x35, 0xFD, 0xFF, |
| 0x90, 0xAA, 0x3D, 0xC7, 0xE6, 0x4D, 0x9A, 0x28, 0xAF, 0x20, 0x19, 0x18, 0xA4, 0xCD, 0xED, 0x9E, |
| 0x07, 0xAB, 0x21, 0x46, 0xE2, 0x44, 0x28, 0x1D, 0x8B, 0xE8, 0x74, 0x40, 0x09, 0x40, 0xC8, 0x18, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x44, 0x6F, |
| 0x6D, 0x7F, 0xD7, 0xC3, 0x4D, 0x47, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x19, 0x00, 0x89, 0xE2, 0x74, 0x27, 0x77, |
| 0x72, 0x11, 0x9C, 0x54, 0x6B, 0x75, 0xCD, 0xF4, 0xDF, 0xEE, 0xCD, 0x14, 0xC3, 0x94, 0x47, 0xF0, |
| 0xD1, 0xA4, 0x9E, 0x30, 0x02, 0x19, 0x00, 0x93, 0xB5, 0xFD, 0xC3, 0xE9, 0x53, 0xA3, 0x81, 0xAE, |
| 0x49, 0xE3, 0x43, 0x4D, 0x57, 0xB5, 0x6B, 0xB0, 0x21, 0x0B, 0x24, 0x7F, 0xAF, 0x2D, 0x02, 0x18, |
| 0x18, |
| }; |
| |
| uint16_t TestDevice6_CertLength = sizeof(TestDevice6_Cert); |
| |
| uint8_t TestDevice6_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0x07, 0x38, 0xBE, 0x9E, 0x25, 0xB1, 0x5A, 0xB0, 0xA6, 0x75, 0xE3, 0x90, 0xA8, 0x3E, 0x74, 0xEC, |
| 0xBB, 0x6D, 0x37, 0x5F, 0xAF, 0x69, 0x38, 0xE1, 0x06, 0x46, 0x71, 0x2A, 0x30, 0x03, 0x39, 0x04, |
| 0x9B, 0xA4, 0xA1, 0x43, 0x82, 0x81, 0xCB, 0x33, 0x4C, 0x67, 0x70, 0x39, 0xB1, 0x25, 0xE2, 0x27, |
| 0xF1, 0x96, 0xB0, 0x27, 0xA9, 0x35, 0xFD, 0xFF, 0x90, 0xAA, 0x3D, 0xC7, 0xE6, 0x4D, 0x9A, 0x28, |
| 0xAF, 0x20, 0x19, 0x18, 0xA4, 0xCD, 0xED, 0x9E, 0x07, 0xAB, 0x21, 0x46, 0xE2, 0x44, 0x28, 0x1D, |
| 0x8B, 0xE8, 0x74, 0x40, 0x09, 0x40, 0xC8, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDevice6_PrivateKeyLength = sizeof(TestDevice6_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 7 |
| // |
| |
| uint64_t TestDevice7_NodeId = 0x18B4300000000007ULL; |
| |
| uint8_t TestDevice7_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x4A, 0x18, 0x0A, 0x04, 0x41, 0x2A, |
| 0x54, 0x86, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x07, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0xA5, 0xFC, 0x73, 0x38, 0x49, 0xCB, 0x15, 0x94, |
| 0x8F, 0xD6, 0xD0, 0x52, 0x76, 0x81, 0xBA, 0x14, 0xEC, 0x58, 0x6E, 0xFE, 0x49, 0x8F, 0x63, 0x9E, |
| 0x18, 0xB2, 0x9F, 0x85, 0xB8, 0x23, 0x48, 0x2A, 0x05, 0x08, 0x17, 0xED, 0x8D, 0x9C, 0xEB, 0x69, |
| 0x1B, 0xAC, 0xE1, 0x60, 0x67, 0x5E, 0xD9, 0x46, 0x36, 0xB8, 0x1C, 0x98, 0xC6, 0x5A, 0xE3, 0xEF, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4F, 0xD5, |
| 0x32, 0x9D, 0x8C, 0x4A, 0xB6, 0xDC, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x18, 0x49, 0x3C, 0x16, 0xD5, 0x8F, 0xEE, |
| 0x63, 0x19, 0xA0, 0x06, 0xCD, 0xAE, 0x66, 0x51, 0xC6, 0xDD, 0xD7, 0x91, 0x3D, 0x47, 0x7D, 0xEF, |
| 0x3A, 0x40, 0x30, 0x02, 0x19, 0x00, 0xD4, 0xFE, 0x26, 0xA8, 0xDB, 0x68, 0x8D, 0x57, 0x1C, 0xC9, |
| 0xA3, 0x33, 0x23, 0xDD, 0x65, 0xE7, 0x92, 0xCA, 0xC2, 0x48, 0x77, 0xEA, 0xFD, 0x31, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDevice7_CertLength = sizeof(TestDevice7_Cert); |
| |
| uint8_t TestDevice7_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0xF9, 0xA2, 0x7E, 0x72, 0xFA, 0x71, 0x6D, 0xF4, 0x67, 0xC1, 0x42, 0x9D, 0xBD, 0x42, 0x4B, 0xE3, |
| 0xDC, 0x95, 0x98, 0x9E, 0xAE, 0xAC, 0x9B, 0x6A, 0xAD, 0x2C, 0x5B, 0x41, 0x30, 0x03, 0x39, 0x04, |
| 0xA5, 0xFC, 0x73, 0x38, 0x49, 0xCB, 0x15, 0x94, 0x8F, 0xD6, 0xD0, 0x52, 0x76, 0x81, 0xBA, 0x14, |
| 0xEC, 0x58, 0x6E, 0xFE, 0x49, 0x8F, 0x63, 0x9E, 0x18, 0xB2, 0x9F, 0x85, 0xB8, 0x23, 0x48, 0x2A, |
| 0x05, 0x08, 0x17, 0xED, 0x8D, 0x9C, 0xEB, 0x69, 0x1B, 0xAC, 0xE1, 0x60, 0x67, 0x5E, 0xD9, 0x46, |
| 0x36, 0xB8, 0x1C, 0x98, 0xC6, 0x5A, 0xE3, 0xEF, 0x18, |
| }; |
| |
| uint16_t TestDevice7_PrivateKeyLength = sizeof(TestDevice7_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 8 |
| // |
| |
| uint64_t TestDevice8_NodeId = 0x18B4300000000008ULL; |
| |
| uint8_t TestDevice8_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x7C, 0xA7, 0x23, 0x41, 0x4B, 0x76, |
| 0x6D, 0xA5, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0xA2, 0x0C, 0xC8, 0x43, 0xAD, 0x15, 0x63, 0x09, |
| 0x62, 0x26, 0xBB, 0x3B, 0x6A, 0x92, 0x55, 0x2F, 0xE6, 0x9B, 0x9A, 0xC8, 0x31, 0xBF, 0x5B, 0x11, |
| 0xAA, 0xCF, 0x89, 0xA0, 0xF8, 0x32, 0xC8, 0xFF, 0x3E, 0xD3, 0xD1, 0xE5, 0x3F, 0x90, 0x47, 0xE2, |
| 0x20, 0xB9, 0x26, 0x1A, 0xE1, 0xD0, 0x50, 0x02, 0x77, 0xEC, 0x5F, 0x2C, 0x49, 0x23, 0x79, 0x73, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4F, 0x34, |
| 0x3A, 0x5B, 0xC0, 0x17, 0xF4, 0x8C, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x18, 0x0D, 0xE0, 0x14, 0x42, 0x33, 0xE0, |
| 0x5F, 0x3D, 0xE3, 0x3E, 0xDB, 0xE2, 0x62, 0x5D, 0x97, 0xEF, 0x31, 0x66, 0xEE, 0x07, 0x2D, 0x49, |
| 0x24, 0x6F, 0x30, 0x02, 0x19, 0x00, 0xCF, 0x4A, 0x36, 0xDB, 0xB1, 0x81, 0xB0, 0xE0, 0xFE, 0x7E, |
| 0xEB, 0x27, 0xF9, 0xE5, 0xEA, 0x42, 0x8F, 0xE6, 0x89, 0xBE, 0x17, 0xE0, 0x6D, 0x55, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDevice8_CertLength = sizeof(TestDevice8_Cert); |
| |
| uint8_t TestDevice8_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0xA8, 0x54, 0xA2, 0x77, 0x93, 0xAF, 0x34, 0x20, 0xC4, 0xBE, 0x81, 0x76, 0x4C, 0xD2, 0x68, 0x46, |
| 0xD8, 0x9E, 0xA9, 0xE3, 0xFC, 0x8A, 0x89, 0xD7, 0x8A, 0xD8, 0x1E, 0xC9, 0x30, 0x03, 0x39, 0x04, |
| 0xA2, 0x0C, 0xC8, 0x43, 0xAD, 0x15, 0x63, 0x09, 0x62, 0x26, 0xBB, 0x3B, 0x6A, 0x92, 0x55, 0x2F, |
| 0xE6, 0x9B, 0x9A, 0xC8, 0x31, 0xBF, 0x5B, 0x11, 0xAA, 0xCF, 0x89, 0xA0, 0xF8, 0x32, 0xC8, 0xFF, |
| 0x3E, 0xD3, 0xD1, 0xE5, 0x3F, 0x90, 0x47, 0xE2, 0x20, 0xB9, 0x26, 0x1A, 0xE1, 0xD0, 0x50, 0x02, |
| 0x77, 0xEC, 0x5F, 0x2C, 0x49, 0x23, 0x79, 0x73, 0x18, |
| }; |
| |
| uint16_t TestDevice8_PrivateKeyLength = sizeof(TestDevice8_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 9 |
| // |
| |
| uint64_t TestDevice9_NodeId = 0x18B4300000000009ULL; |
| |
| uint8_t TestDevice9_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x40, 0xF9, 0x6B, 0xB4, 0x70, 0x55, |
| 0x6C, 0x49, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x09, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0x19, 0x17, 0x1E, 0x9C, 0xB6, 0xA4, 0x3A, 0x45, |
| 0xB0, 0x67, 0x9A, 0x9C, 0x79, 0x39, 0xE0, 0x86, 0x86, 0xAC, 0xAB, 0x9E, 0x19, 0xD0, 0x37, 0x06, |
| 0xF7, 0xC4, 0xD2, 0x92, 0x5B, 0xE3, 0x73, 0x44, 0x2F, 0x90, 0x68, 0x93, 0x04, 0x0A, 0x00, 0xF5, |
| 0xCF, 0x0E, 0x5E, 0xEE, 0xA7, 0x04, 0x83, 0xF2, 0x05, 0x51, 0xB8, 0x31, 0x3D, 0x5B, 0x55, 0xB6, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x43, 0xA5, |
| 0x5F, 0x97, 0x27, 0xD8, 0x77, 0x26, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x19, 0x00, 0xE5, 0x38, 0x88, 0x3A, 0x90, |
| 0x8C, 0x1F, 0x64, 0xA1, 0xEB, 0x20, 0xA2, 0x30, 0xD2, 0x41, 0x59, 0x3A, 0x01, 0xD7, 0x78, 0x7B, |
| 0x7A, 0x88, 0xCC, 0x30, 0x02, 0x19, 0x00, 0x93, 0xCA, 0x28, 0x4C, 0xA5, 0xD1, 0x6C, 0xE8, 0x0B, |
| 0x47, 0x8A, 0x70, 0x9C, 0xBE, 0x8A, 0x82, 0xF1, 0xA5, 0x7D, 0xE8, 0x29, 0xB8, 0xB7, 0x7A, 0x18, |
| 0x18, |
| }; |
| |
| uint16_t TestDevice9_CertLength = sizeof(TestDevice9_Cert); |
| |
| uint8_t TestDevice9_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0x5C, 0xD8, 0xF0, 0x9E, 0x52, 0xCC, 0x86, 0xD2, 0xF6, 0xC1, 0x48, 0x13, 0x42, 0xB4, 0x92, 0x49, |
| 0xB8, 0x1E, 0x2F, 0x16, 0x68, 0x42, 0x2B, 0x64, 0xC8, 0xFB, 0xB4, 0x15, 0x30, 0x03, 0x39, 0x04, |
| 0x19, 0x17, 0x1E, 0x9C, 0xB6, 0xA4, 0x3A, 0x45, 0xB0, 0x67, 0x9A, 0x9C, 0x79, 0x39, 0xE0, 0x86, |
| 0x86, 0xAC, 0xAB, 0x9E, 0x19, 0xD0, 0x37, 0x06, 0xF7, 0xC4, 0xD2, 0x92, 0x5B, 0xE3, 0x73, 0x44, |
| 0x2F, 0x90, 0x68, 0x93, 0x04, 0x0A, 0x00, 0xF5, 0xCF, 0x0E, 0x5E, 0xEE, 0xA7, 0x04, 0x83, 0xF2, |
| 0x05, 0x51, 0xB8, 0x31, 0x3D, 0x5B, 0x55, 0xB6, 0x18, |
| }; |
| |
| uint16_t TestDevice9_PrivateKeyLength = sizeof(TestDevice9_PrivateKey); |
| |
| |
| // Certificate and private key for Test Device 10 |
| // |
| |
| uint64_t TestDevice10_NodeId = 0x18B430000000000AULL; |
| |
| uint8_t TestDevice10_Cert[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x56, 0xC9, 0x85, 0x76, 0xE3, 0x0F, |
| 0xA4, 0xB0, 0x24, 0x02, 0x04, 0x37, 0x03, 0x27, 0x13, 0x02, 0x00, 0x00, 0xEE, 0xEE, 0x30, 0xB4, |
| 0x18, 0x18, 0x26, 0x04, 0xB9, 0x2D, 0x12, 0x1D, 0x26, 0x05, 0x39, 0xCB, 0x3B, 0x30, 0x37, 0x06, |
| 0x27, 0x11, 0x0A, 0x00, 0x00, 0x00, 0x00, 0x30, 0xB4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5A, 0x23, 0x30, 0x0A, 0x39, 0x04, 0x62, 0xBB, 0xB5, 0xA3, 0x8D, 0x22, 0x89, 0x14, |
| 0x07, 0x64, 0x71, 0xE4, 0xE5, 0x85, 0x99, 0x5F, 0x28, 0x9C, 0x6F, 0xA1, 0xB7, 0x34, 0x7C, 0x7B, |
| 0x94, 0x60, 0x41, 0x81, 0x49, 0x9E, 0x1C, 0xB4, 0x8E, 0x16, 0x57, 0xF4, 0xD4, 0x6D, 0x0F, 0xA4, |
| 0xB0, 0x45, 0x07, 0xD0, 0xEE, 0x4D, 0x01, 0x8D, 0xC9, 0xF0, 0x39, 0x66, 0x52, 0x93, 0x65, 0xBC, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x45, 0xAF, |
| 0xE2, 0x6F, 0x99, 0xD7, 0x42, 0x70, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x44, 0xE3, 0x40, 0x38, |
| 0xA9, 0xD4, 0xB5, 0xA7, 0x18, 0x35, 0x0C, 0x30, 0x01, 0x19, 0x00, 0xA5, 0x9E, 0xCC, 0x64, 0xE8, |
| 0x6F, 0x1E, 0x93, 0x14, 0x02, 0xE0, 0x39, 0x77, 0xDD, 0x35, 0xE6, 0xF7, 0x3B, 0x7E, 0xCC, 0x4A, |
| 0x58, 0x78, 0x71, 0x30, 0x02, 0x19, 0x00, 0xAB, 0xF5, 0x73, 0x8F, 0x5B, 0x01, 0x8C, 0x8F, 0xAC, |
| 0x72, 0x75, 0xEA, 0xBF, 0xE2, 0xFA, 0xC6, 0x03, 0x5E, 0x1E, 0xD0, 0xF0, 0x15, 0x7B, 0x0D, 0x18, |
| 0x18, |
| }; |
| |
| uint16_t TestDevice10_CertLength = sizeof(TestDevice10_Cert); |
| |
| uint8_t TestDevice10_PrivateKey[] = |
| { |
| 0xD5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5A, 0x23, 0x30, 0x02, 0x1C, |
| 0xD7, 0xD6, 0x6C, 0x2E, 0x67, 0xD9, 0x8F, 0x29, 0x36, 0x0F, 0x0A, 0x1E, 0x58, 0xCA, 0x85, 0x02, |
| 0x3D, 0x85, 0x22, 0x0C, 0x34, 0x8E, 0x1F, 0x7D, 0xC2, 0x84, 0xD5, 0xFE, 0x30, 0x03, 0x39, 0x04, |
| 0x62, 0xBB, 0xB5, 0xA3, 0x8D, 0x22, 0x89, 0x14, 0x07, 0x64, 0x71, 0xE4, 0xE5, 0x85, 0x99, 0x5F, |
| 0x28, 0x9C, 0x6F, 0xA1, 0xB7, 0x34, 0x7C, 0x7B, 0x94, 0x60, 0x41, 0x81, 0x49, 0x9E, 0x1C, 0xB4, |
| 0x8E, 0x16, 0x57, 0xF4, 0xD4, 0x6D, 0x0F, 0xA4, 0xB0, 0x45, 0x07, 0xD0, 0xEE, 0x4D, 0x01, 0x8D, |
| 0xC9, 0xF0, 0x39, 0x66, 0x52, 0x93, 0x65, 0xBC, 0x18, |
| }; |
| |
| uint16_t TestDevice10_PrivateKeyLength = sizeof(TestDevice10_PrivateKey); |
| |
| |
| // Certificate and private key for Directory Endpoint |
| // |
| |
| uint64_t TestDirectoryEndpoint_NodeId = 0x18B4300200000001ULL; |
| |
| uint8_t TestDirectoryEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkDCCAT+gAwIBAgIIX9Rn5VEMoDMwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAwMTBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABEAZLjXtJr0bR1WAx1NDL8zstYAVkkorgsUodW7C |
| ow/RrQoiMPhOAimd3sgZwuJsbBeTO50rvx7Jo2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECEd9i9Q35tazMBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCAz8AMDwCHBvpcEvbf5uyNye/ead234qiBttK7s9y/R8A3IkCHF5ZyNz8EBK4 |
| 7rX2MEzlNCsHRYC8xOhCouHy4Ts= |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x5f, 0xd4, 0x67, 0xe5, 0x51, 0x0c, |
| 0xa0, 0x33, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x01, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0x40, 0x19, 0x2e, 0x35, 0xed, 0x26, 0xbd, 0x1b, |
| 0x47, 0x55, 0x80, 0xc7, 0x53, 0x43, 0x2f, 0xcc, 0xec, 0xb5, 0x80, 0x15, 0x92, 0x4a, 0x2b, 0x82, |
| 0xc5, 0x28, 0x75, 0x6e, 0xc2, 0xa3, 0x0f, 0xd1, 0xad, 0x0a, 0x22, 0x30, 0xf8, 0x4e, 0x02, 0x29, |
| 0x9d, 0xde, 0xc8, 0x19, 0xc2, 0xe2, 0x6c, 0x6c, 0x17, 0x93, 0x3b, 0x9d, 0x2b, 0xbf, 0x1e, 0xc9, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x47, 0x7d, |
| 0x8b, 0xd4, 0x37, 0xe6, 0xd6, 0xb3, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1c, 0x1b, 0xe9, 0x70, 0x4b, 0xdb, 0x7f, |
| 0x9b, 0xb2, 0x37, 0x27, 0xbf, 0x79, 0xa7, 0x76, 0xdf, 0x8a, 0xa2, 0x06, 0xdb, 0x4a, 0xee, 0xcf, |
| 0x72, 0xfd, 0x1f, 0x00, 0xdc, 0x89, 0x30, 0x02, 0x1c, 0x5e, 0x59, 0xc8, 0xdc, 0xfc, 0x10, 0x12, |
| 0xb8, 0xee, 0xb5, 0xf6, 0x30, 0x4c, 0xe5, 0x34, 0x2b, 0x07, 0x45, 0x80, 0xbc, 0xc4, 0xe8, 0x42, |
| 0xa2, 0xe1, 0xf2, 0xe1, 0x3b, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDirectoryEndpoint_CertLength = sizeof(TestDirectoryEndpoint_Cert); |
| |
| uint8_t TestDirectoryEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHOxQWSpbJr/XQ9601elWh6Zm0VSU2lWWGa6UDSygBwYFK4EEACGhPAM6 |
| AARAGS417Sa9G0dVgMdTQy/M7LWAFZJKK4LFKHVuwqMP0a0KIjD4TgIpnd7IGcLi |
| bGwXkzudK78eyQ== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0xec, 0x50, 0x59, 0x2a, 0x5b, 0x26, 0xbf, 0xd7, 0x43, 0xde, 0xb4, 0xd5, 0xe9, 0x56, 0x87, 0xa6, |
| 0x66, 0xd1, 0x54, 0x94, 0xda, 0x55, 0x96, 0x19, 0xae, 0x94, 0x0d, 0x2c, 0x30, 0x03, 0x39, 0x04, |
| 0x40, 0x19, 0x2e, 0x35, 0xed, 0x26, 0xbd, 0x1b, 0x47, 0x55, 0x80, 0xc7, 0x53, 0x43, 0x2f, 0xcc, |
| 0xec, 0xb5, 0x80, 0x15, 0x92, 0x4a, 0x2b, 0x82, 0xc5, 0x28, 0x75, 0x6e, 0xc2, 0xa3, 0x0f, 0xd1, |
| 0xad, 0x0a, 0x22, 0x30, 0xf8, 0x4e, 0x02, 0x29, 0x9d, 0xde, 0xc8, 0x19, 0xc2, 0xe2, 0x6c, 0x6c, |
| 0x17, 0x93, 0x3b, 0x9d, 0x2b, 0xbf, 0x1e, 0xc9, 0x18, |
| }; |
| |
| uint16_t TestDirectoryEndpoint_PrivateKeyLength = sizeof(TestDirectoryEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for SoftwareUpdate Endpoint |
| // |
| |
| uint64_t TestSoftwareUpdateEndpoint_NodeId = 0x18B4300200000002ULL; |
| |
| uint8_t TestSoftwareUpdateEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkDCCAT+gAwIBAgIIALkdahMSPiQwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAwMjBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABESYpkHt2zgwn72PFVD0wsOyhfmafalb3v/hI3th |
| swyAjeSsaxEk9sFdftfOKHjmR8I8V5VRsteVo2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECExH0hssgQ+oMBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCAz8AMDwCHDN55x48CkeGxYtNyZDE8c/2SDfL/xuBRe+ZYawCHE11b6rVbDet |
| 5BrgJGi3C9os+5UQLGOAm6EjYFs= |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x00, 0xb9, 0x1d, 0x6a, 0x13, 0x12, |
| 0x3e, 0x24, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x02, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0x44, 0x98, 0xa6, 0x41, 0xed, 0xdb, 0x38, 0x30, |
| 0x9f, 0xbd, 0x8f, 0x15, 0x50, 0xf4, 0xc2, 0xc3, 0xb2, 0x85, 0xf9, 0x9a, 0x7d, 0xa9, 0x5b, 0xde, |
| 0xff, 0xe1, 0x23, 0x7b, 0x61, 0xb3, 0x0c, 0x80, 0x8d, 0xe4, 0xac, 0x6b, 0x11, 0x24, 0xf6, 0xc1, |
| 0x5d, 0x7e, 0xd7, 0xce, 0x28, 0x78, 0xe6, 0x47, 0xc2, 0x3c, 0x57, 0x95, 0x51, 0xb2, 0xd7, 0x95, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4c, 0x47, |
| 0xd2, 0x1b, 0x2c, 0x81, 0x0f, 0xa8, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1c, 0x33, 0x79, 0xe7, 0x1e, 0x3c, 0x0a, |
| 0x47, 0x86, 0xc5, 0x8b, 0x4d, 0xc9, 0x90, 0xc4, 0xf1, 0xcf, 0xf6, 0x48, 0x37, 0xcb, 0xff, 0x1b, |
| 0x81, 0x45, 0xef, 0x99, 0x61, 0xac, 0x30, 0x02, 0x1c, 0x4d, 0x75, 0x6f, 0xaa, 0xd5, 0x6c, 0x37, |
| 0xad, 0xe4, 0x1a, 0xe0, 0x24, 0x68, 0xb7, 0x0b, 0xda, 0x2c, 0xfb, 0x95, 0x10, 0x2c, 0x63, 0x80, |
| 0x9b, 0xa1, 0x23, 0x60, 0x5b, 0x18, 0x18, |
| }; |
| |
| uint16_t TestSoftwareUpdateEndpoint_CertLength = sizeof(TestSoftwareUpdateEndpoint_Cert); |
| |
| uint8_t TestSoftwareUpdateEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHDgBQZmM/K6v4P2ayF3+SsyB/HEYia0VUFB5PUOgBwYFK4EEACGhPAM6 |
| AAREmKZB7ds4MJ+9jxVQ9MLDsoX5mn2pW97/4SN7YbMMgI3krGsRJPbBXX7Xzih4 |
| 5kfCPFeVUbLXlQ== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0x38, 0x01, 0x41, 0x99, 0x8c, 0xfc, 0xae, 0xaf, 0xe0, 0xfd, 0x9a, 0xc8, 0x5d, 0xfe, 0x4a, 0xcc, |
| 0x81, 0xfc, 0x71, 0x18, 0x89, 0xad, 0x15, 0x50, 0x50, 0x79, 0x3d, 0x43, 0x30, 0x03, 0x39, 0x04, |
| 0x44, 0x98, 0xa6, 0x41, 0xed, 0xdb, 0x38, 0x30, 0x9f, 0xbd, 0x8f, 0x15, 0x50, 0xf4, 0xc2, 0xc3, |
| 0xb2, 0x85, 0xf9, 0x9a, 0x7d, 0xa9, 0x5b, 0xde, 0xff, 0xe1, 0x23, 0x7b, 0x61, 0xb3, 0x0c, 0x80, |
| 0x8d, 0xe4, 0xac, 0x6b, 0x11, 0x24, 0xf6, 0xc1, 0x5d, 0x7e, 0xd7, 0xce, 0x28, 0x78, 0xe6, 0x47, |
| 0xc2, 0x3c, 0x57, 0x95, 0x51, 0xb2, 0xd7, 0x95, 0x18, |
| }; |
| |
| uint16_t TestSoftwareUpdateEndpoint_PrivateKeyLength = sizeof(TestSoftwareUpdateEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for DataManagement Endpoint |
| // |
| |
| uint64_t TestDataManagementEndpoint_NodeId = 0x18B4300200000003ULL; |
| |
| uint8_t TestDataManagementEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkTCCAT+gAwIBAgIIE8D+J0he20owCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAwMzBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABNKtOPo7alj2B/gFo6+7WMNPeVa1pfagpzwsXJ2o |
| 5OuS6X6oMX1xeLE17uhg7NGZXxt3GPbVgrz4o2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECEadlDrd8HvVMBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCA0AAMD0CHENPxm5feyBrgaQWjhWiUvJB4jMmXT2Ys8Y2h5ECHQC9iywc2v/N |
| q8g16paBF6SVlR0s0keZ9kSP72vI |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x13, 0xc0, 0xfe, 0x27, 0x48, 0x5e, |
| 0xdb, 0x4a, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x03, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0xd2, 0xad, 0x38, 0xfa, 0x3b, 0x6a, 0x58, 0xf6, |
| 0x07, 0xf8, 0x05, 0xa3, 0xaf, 0xbb, 0x58, 0xc3, 0x4f, 0x79, 0x56, 0xb5, 0xa5, 0xf6, 0xa0, 0xa7, |
| 0x3c, 0x2c, 0x5c, 0x9d, 0xa8, 0xe4, 0xeb, 0x92, 0xe9, 0x7e, 0xa8, 0x31, 0x7d, 0x71, 0x78, 0xb1, |
| 0x35, 0xee, 0xe8, 0x60, 0xec, 0xd1, 0x99, 0x5f, 0x1b, 0x77, 0x18, 0xf6, 0xd5, 0x82, 0xbc, 0xf8, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x46, 0x9d, |
| 0x94, 0x3a, 0xdd, 0xf0, 0x7b, 0xd5, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1c, 0x43, 0x4f, 0xc6, 0x6e, 0x5f, 0x7b, |
| 0x20, 0x6b, 0x81, 0xa4, 0x16, 0x8e, 0x15, 0xa2, 0x52, 0xf2, 0x41, 0xe2, 0x33, 0x26, 0x5d, 0x3d, |
| 0x98, 0xb3, 0xc6, 0x36, 0x87, 0x91, 0x30, 0x02, 0x1d, 0x00, 0xbd, 0x8b, 0x2c, 0x1c, 0xda, 0xff, |
| 0xcd, 0xab, 0xc8, 0x35, 0xea, 0x96, 0x81, 0x17, 0xa4, 0x95, 0x95, 0x1d, 0x2c, 0xd2, 0x47, 0x99, |
| 0xf6, 0x44, 0x8f, 0xef, 0x6b, 0xc8, 0x18, 0x18, |
| }; |
| |
| uint16_t TestDataManagementEndpoint_CertLength = sizeof(TestDataManagementEndpoint_Cert); |
| |
| uint8_t TestDataManagementEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHOl63tDxrlFoxEwDkSJksNQK+VMRDwY4+ha2P+igBwYFK4EEACGhPAM6 |
| AATSrTj6O2pY9gf4BaOvu1jDT3lWtaX2oKc8LFydqOTrkul+qDF9cXixNe7oYOzR |
| mV8bdxj21YK8+A== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0xe9, 0x7a, 0xde, 0xd0, 0xf1, 0xae, 0x51, 0x68, 0xc4, 0x4c, 0x03, 0x91, 0x22, 0x64, 0xb0, 0xd4, |
| 0x0a, 0xf9, 0x53, 0x11, 0x0f, 0x06, 0x38, 0xfa, 0x16, 0xb6, 0x3f, 0xe8, 0x30, 0x03, 0x39, 0x04, |
| 0xd2, 0xad, 0x38, 0xfa, 0x3b, 0x6a, 0x58, 0xf6, 0x07, 0xf8, 0x05, 0xa3, 0xaf, 0xbb, 0x58, 0xc3, |
| 0x4f, 0x79, 0x56, 0xb5, 0xa5, 0xf6, 0xa0, 0xa7, 0x3c, 0x2c, 0x5c, 0x9d, 0xa8, 0xe4, 0xeb, 0x92, |
| 0xe9, 0x7e, 0xa8, 0x31, 0x7d, 0x71, 0x78, 0xb1, 0x35, 0xee, 0xe8, 0x60, 0xec, 0xd1, 0x99, 0x5f, |
| 0x1b, 0x77, 0x18, 0xf6, 0xd5, 0x82, 0xbc, 0xf8, 0x18, |
| }; |
| |
| uint16_t TestDataManagementEndpoint_PrivateKeyLength = sizeof(TestDataManagementEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for LogUpload Endpoint |
| // |
| |
| uint64_t TestLogUploadEndpoint_NodeId = 0x18B4300200000004ULL; |
| |
| uint8_t TestLogUploadEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkTCCAT+gAwIBAgIISCOySfLYRhUwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAwNDBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABBYgk7na/Np+h19BS3TGAsEq2oEryZQnvL812JuF |
| dAq88ss5v9ukcSwc0K8AvBXhRb0Vq6WFLML0o2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECEsDPBq+YzK5MBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCA0AAMD0CHFTZSuFduj6Alv1V7JG/l1ve72Qoh8pAgb/8VuwCHQCnL4NrsWvb |
| GD2y/oEmyhBH45c7jWuDb8B0z9aq |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x48, 0x23, 0xb2, 0x49, 0xf2, 0xd8, |
| 0x46, 0x15, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x04, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0x16, 0x20, 0x93, 0xb9, 0xda, 0xfc, 0xda, 0x7e, |
| 0x87, 0x5f, 0x41, 0x4b, 0x74, 0xc6, 0x02, 0xc1, 0x2a, 0xda, 0x81, 0x2b, 0xc9, 0x94, 0x27, 0xbc, |
| 0xbf, 0x35, 0xd8, 0x9b, 0x85, 0x74, 0x0a, 0xbc, 0xf2, 0xcb, 0x39, 0xbf, 0xdb, 0xa4, 0x71, 0x2c, |
| 0x1c, 0xd0, 0xaf, 0x00, 0xbc, 0x15, 0xe1, 0x45, 0xbd, 0x15, 0xab, 0xa5, 0x85, 0x2c, 0xc2, 0xf4, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4b, 0x03, |
| 0x3c, 0x1a, 0xbe, 0x63, 0x32, 0xb9, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1c, 0x54, 0xd9, 0x4a, 0xe1, 0x5d, 0xba, |
| 0x3e, 0x80, 0x96, 0xfd, 0x55, 0xec, 0x91, 0xbf, 0x97, 0x5b, 0xde, 0xef, 0x64, 0x28, 0x87, 0xca, |
| 0x40, 0x81, 0xbf, 0xfc, 0x56, 0xec, 0x30, 0x02, 0x1d, 0x00, 0xa7, 0x2f, 0x83, 0x6b, 0xb1, 0x6b, |
| 0xdb, 0x18, 0x3d, 0xb2, 0xfe, 0x81, 0x26, 0xca, 0x10, 0x47, 0xe3, 0x97, 0x3b, 0x8d, 0x6b, 0x83, |
| 0x6f, 0xc0, 0x74, 0xcf, 0xd6, 0xaa, 0x18, 0x18, |
| }; |
| |
| uint16_t TestLogUploadEndpoint_CertLength = sizeof(TestLogUploadEndpoint_Cert); |
| |
| uint8_t TestLogUploadEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHKJ4M0FoV1K7X8KTrCKFD4YbY8TD0HNwVYA7fSqgBwYFK4EEACGhPAM6 |
| AAQWIJO52vzafodfQUt0xgLBKtqBK8mUJ7y/NdibhXQKvPLLOb/bpHEsHNCvALwV |
| 4UW9FaulhSzC9A== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0xa2, 0x78, 0x33, 0x41, 0x68, 0x57, 0x52, 0xbb, 0x5f, 0xc2, 0x93, 0xac, 0x22, 0x85, 0x0f, 0x86, |
| 0x1b, 0x63, 0xc4, 0xc3, 0xd0, 0x73, 0x70, 0x55, 0x80, 0x3b, 0x7d, 0x2a, 0x30, 0x03, 0x39, 0x04, |
| 0x16, 0x20, 0x93, 0xb9, 0xda, 0xfc, 0xda, 0x7e, 0x87, 0x5f, 0x41, 0x4b, 0x74, 0xc6, 0x02, 0xc1, |
| 0x2a, 0xda, 0x81, 0x2b, 0xc9, 0x94, 0x27, 0xbc, 0xbf, 0x35, 0xd8, 0x9b, 0x85, 0x74, 0x0a, 0xbc, |
| 0xf2, 0xcb, 0x39, 0xbf, 0xdb, 0xa4, 0x71, 0x2c, 0x1c, 0xd0, 0xaf, 0x00, 0xbc, 0x15, 0xe1, 0x45, |
| 0xbd, 0x15, 0xab, 0xa5, 0x85, 0x2c, 0xc2, 0xf4, 0x18, |
| }; |
| |
| uint16_t TestLogUploadEndpoint_PrivateKeyLength = sizeof(TestLogUploadEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for ServiceProvisioning Endpoint |
| // |
| |
| uint64_t TestServiceProvisioningEndpoint_NodeId = 0x18B4300200000010ULL; |
| |
| uint8_t TestServiceProvisioningEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkjCCAT+gAwIBAgIIDW0Qz6h+DKUwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAxMDBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABOYhxkgji2lraC5lB6fnf5noiivxSdIuqlyl997f |
| N5E3PpUcehc1TMSCuaM0z1+7I0EI3BEjrsdIo2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECEGBrlAnPtvvMBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCA0EAMD4CHQDw3/Ve1it3tPPiKBVZvoNu9NBTQ2AUqMU2siXIAh0AtRx67h7z |
| iERhclT4kg89pWrjQa0BA1nic5zrZg== |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x0d, 0x6d, 0x10, 0xcf, 0xa8, 0x7e, |
| 0x0c, 0xa5, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x10, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0xe6, 0x21, 0xc6, 0x48, 0x23, 0x8b, 0x69, 0x6b, |
| 0x68, 0x2e, 0x65, 0x07, 0xa7, 0xe7, 0x7f, 0x99, 0xe8, 0x8a, 0x2b, 0xf1, 0x49, 0xd2, 0x2e, 0xaa, |
| 0x5c, 0xa5, 0xf7, 0xde, 0xdf, 0x37, 0x91, 0x37, 0x3e, 0x95, 0x1c, 0x7a, 0x17, 0x35, 0x4c, 0xc4, |
| 0x82, 0xb9, 0xa3, 0x34, 0xcf, 0x5f, 0xbb, 0x23, 0x41, 0x08, 0xdc, 0x11, 0x23, 0xae, 0xc7, 0x48, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x41, 0x81, |
| 0xae, 0x50, 0x27, 0x3e, 0xdb, 0xef, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1d, 0x00, 0xf0, 0xdf, 0xf5, 0x5e, 0xd6, |
| 0x2b, 0x77, 0xb4, 0xf3, 0xe2, 0x28, 0x15, 0x59, 0xbe, 0x83, 0x6e, 0xf4, 0xd0, 0x53, 0x43, 0x60, |
| 0x14, 0xa8, 0xc5, 0x36, 0xb2, 0x25, 0xc8, 0x30, 0x02, 0x1d, 0x00, 0xb5, 0x1c, 0x7a, 0xee, 0x1e, |
| 0xf3, 0x88, 0x44, 0x61, 0x72, 0x54, 0xf8, 0x92, 0x0f, 0x3d, 0xa5, 0x6a, 0xe3, 0x41, 0xad, 0x01, |
| 0x03, 0x59, 0xe2, 0x73, 0x9c, 0xeb, 0x66, 0x18, 0x18, |
| }; |
| |
| uint16_t TestServiceProvisioningEndpoint_CertLength = sizeof(TestServiceProvisioningEndpoint_Cert); |
| |
| uint8_t TestServiceProvisioningEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHLaAUnZPwfa1XbeF//nlV2CiVeU08pgqLSQmjKSgBwYFK4EEACGhPAM6 |
| AATmIcZII4tpa2guZQen53+Z6Ior8UnSLqpcpffe3zeRNz6VHHoXNUzEgrmjNM9f |
| uyNBCNwRI67HSA== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0xb6, 0x80, 0x52, 0x76, 0x4f, 0xc1, 0xf6, 0xb5, 0x5d, 0xb7, 0x85, 0xff, 0xf9, 0xe5, 0x57, 0x60, |
| 0xa2, 0x55, 0xe5, 0x34, 0xf2, 0x98, 0x2a, 0x2d, 0x24, 0x26, 0x8c, 0xa4, 0x30, 0x03, 0x39, 0x04, |
| 0xe6, 0x21, 0xc6, 0x48, 0x23, 0x8b, 0x69, 0x6b, 0x68, 0x2e, 0x65, 0x07, 0xa7, 0xe7, 0x7f, 0x99, |
| 0xe8, 0x8a, 0x2b, 0xf1, 0x49, 0xd2, 0x2e, 0xaa, 0x5c, 0xa5, 0xf7, 0xde, 0xdf, 0x37, 0x91, 0x37, |
| 0x3e, 0x95, 0x1c, 0x7a, 0x17, 0x35, 0x4c, 0xc4, 0x82, 0xb9, 0xa3, 0x34, 0xcf, 0x5f, 0xbb, 0x23, |
| 0x41, 0x08, 0xdc, 0x11, 0x23, 0xae, 0xc7, 0x48, 0x18, |
| }; |
| |
| uint16_t TestServiceProvisioningEndpoint_PrivateKeyLength = sizeof(TestServiceProvisioningEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for Tunnel Endpoint |
| // |
| |
| uint64_t TestTunnelEndpoint_NodeId = 0x18B4300200000011ULL; |
| |
| uint8_t TestTunnelEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkDCCAT+gAwIBAgIIdJ+ay9e9YdAwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAxMTBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABMzJ/5YN1iExOIZBgA3LxPAkrUXgO3ZqjUrwsgyc |
| ZHEixqjosQqizGiNapJVBXmtCOUuATQ5w6mco2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECEraJSevWJpQMBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCAz8AMDwCHDT9n4dGrUtnJfBREEckHSwGav+LN4llIShrsJICHBWWm4cHenZu |
| LMPn+lZvt/anxhYmWuvOGhrXWeA= |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x74, 0x9f, 0x9a, 0xcb, 0xd7, 0xbd, |
| 0x61, 0xd0, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x11, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0xcc, 0xc9, 0xff, 0x96, 0x0d, 0xd6, 0x21, 0x31, |
| 0x38, 0x86, 0x41, 0x80, 0x0d, 0xcb, 0xc4, 0xf0, 0x24, 0xad, 0x45, 0xe0, 0x3b, 0x76, 0x6a, 0x8d, |
| 0x4a, 0xf0, 0xb2, 0x0c, 0x9c, 0x64, 0x71, 0x22, 0xc6, 0xa8, 0xe8, 0xb1, 0x0a, 0xa2, 0xcc, 0x68, |
| 0x8d, 0x6a, 0x92, 0x55, 0x05, 0x79, 0xad, 0x08, 0xe5, 0x2e, 0x01, 0x34, 0x39, 0xc3, 0xa9, 0x9c, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4a, 0xda, |
| 0x25, 0x27, 0xaf, 0x58, 0x9a, 0x50, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1c, 0x34, 0xfd, 0x9f, 0x87, 0x46, 0xad, |
| 0x4b, 0x67, 0x25, 0xf0, 0x51, 0x10, 0x47, 0x24, 0x1d, 0x2c, 0x06, 0x6a, 0xff, 0x8b, 0x37, 0x89, |
| 0x65, 0x21, 0x28, 0x6b, 0xb0, 0x92, 0x30, 0x02, 0x1c, 0x15, 0x96, 0x9b, 0x87, 0x07, 0x7a, 0x76, |
| 0x6e, 0x2c, 0xc3, 0xe7, 0xfa, 0x56, 0x6f, 0xb7, 0xf6, 0xa7, 0xc6, 0x16, 0x26, 0x5a, 0xeb, 0xce, |
| 0x1a, 0x1a, 0xd7, 0x59, 0xe0, 0x18, 0x18, |
| }; |
| |
| uint16_t TestTunnelEndpoint_CertLength = sizeof(TestTunnelEndpoint_Cert); |
| |
| uint8_t TestTunnelEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHBkWyJ+tQH+cfDIk/3jTRK9sMJRdW6BuY2vyLE2gBwYFK4EEACGhPAM6 |
| AATMyf+WDdYhMTiGQYANy8TwJK1F4Dt2ao1K8LIMnGRxIsao6LEKosxojWqSVQV5 |
| rQjlLgE0OcOpnA== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0x19, 0x16, 0xc8, 0x9f, 0xad, 0x40, 0x7f, 0x9c, 0x7c, 0x32, 0x24, 0xff, 0x78, 0xd3, 0x44, 0xaf, |
| 0x6c, 0x30, 0x94, 0x5d, 0x5b, 0xa0, 0x6e, 0x63, 0x6b, 0xf2, 0x2c, 0x4d, 0x30, 0x03, 0x39, 0x04, |
| 0xcc, 0xc9, 0xff, 0x96, 0x0d, 0xd6, 0x21, 0x31, 0x38, 0x86, 0x41, 0x80, 0x0d, 0xcb, 0xc4, 0xf0, |
| 0x24, 0xad, 0x45, 0xe0, 0x3b, 0x76, 0x6a, 0x8d, 0x4a, 0xf0, 0xb2, 0x0c, 0x9c, 0x64, 0x71, 0x22, |
| 0xc6, 0xa8, 0xe8, 0xb1, 0x0a, 0xa2, 0xcc, 0x68, 0x8d, 0x6a, 0x92, 0x55, 0x05, 0x79, 0xad, 0x08, |
| 0xe5, 0x2e, 0x01, 0x34, 0x39, 0xc3, 0xa9, 0x9c, 0x18, |
| }; |
| |
| uint16_t TestTunnelEndpoint_PrivateKeyLength = sizeof(TestTunnelEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for ServiceRouter Endpoint |
| // |
| |
| uint64_t TestServiceRouterEndpoint_NodeId = 0x18B4300200000012ULL; |
| |
| uint8_t TestServiceRouterEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkTCCAT+gAwIBAgIIC6s0jH1dnCQwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAxMjBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABKYWHDJ+RMBBG7AAp5aXLk2flRo1hUdr2/lSMir9 |
| CXwvCG/LpJlolpBTvE0Zg964rLD0ssmDhDIdo2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECEAF7cfm5WifMBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCA0AAMD0CHQCGnrCcSAsyGb2cv8vCLt4oiYHkx6QFQTuVgc6zAhwmP73EBDry |
| QUCKl5J8HIUGANETZUXKiunOY0VY |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x0b, 0xab, 0x34, 0x8c, 0x7d, 0x5d, |
| 0x9c, 0x24, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x12, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0xa6, 0x16, 0x1c, 0x32, 0x7e, 0x44, 0xc0, 0x41, |
| 0x1b, 0xb0, 0x00, 0xa7, 0x96, 0x97, 0x2e, 0x4d, 0x9f, 0x95, 0x1a, 0x35, 0x85, 0x47, 0x6b, 0xdb, |
| 0xf9, 0x52, 0x32, 0x2a, 0xfd, 0x09, 0x7c, 0x2f, 0x08, 0x6f, 0xcb, 0xa4, 0x99, 0x68, 0x96, 0x90, |
| 0x53, 0xbc, 0x4d, 0x19, 0x83, 0xde, 0xb8, 0xac, 0xb0, 0xf4, 0xb2, 0xc9, 0x83, 0x84, 0x32, 0x1d, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x40, 0x05, |
| 0xed, 0xc7, 0xe6, 0xe5, 0x68, 0x9f, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1d, 0x00, 0x86, 0x9e, 0xb0, 0x9c, 0x48, |
| 0x0b, 0x32, 0x19, 0xbd, 0x9c, 0xbf, 0xcb, 0xc2, 0x2e, 0xde, 0x28, 0x89, 0x81, 0xe4, 0xc7, 0xa4, |
| 0x05, 0x41, 0x3b, 0x95, 0x81, 0xce, 0xb3, 0x30, 0x02, 0x1c, 0x26, 0x3f, 0xbd, 0xc4, 0x04, 0x3a, |
| 0xf2, 0x41, 0x40, 0x8a, 0x97, 0x92, 0x7c, 0x1c, 0x85, 0x06, 0x00, 0xd1, 0x13, 0x65, 0x45, 0xca, |
| 0x8a, 0xe9, 0xce, 0x63, 0x45, 0x58, 0x18, 0x18, |
| }; |
| |
| uint16_t TestServiceRouterEndpoint_CertLength = sizeof(TestServiceRouterEndpoint_Cert); |
| |
| uint8_t TestServiceRouterEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHHBiu+dlZYR30HnSqpSiNv7+CzmqL9hNJXp/rPKgBwYFK4EEACGhPAM6 |
| AASmFhwyfkTAQRuwAKeWly5Nn5UaNYVHa9v5UjIq/Ql8Lwhvy6SZaJaQU7xNGYPe |
| uKyw9LLJg4QyHQ== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0x70, 0x62, 0xbb, 0xe7, 0x65, 0x65, 0x84, 0x77, 0xd0, 0x79, 0xd2, 0xaa, 0x94, 0xa2, 0x36, 0xfe, |
| 0xfe, 0x0b, 0x39, 0xaa, 0x2f, 0xd8, 0x4d, 0x25, 0x7a, 0x7f, 0xac, 0xf2, 0x30, 0x03, 0x39, 0x04, |
| 0xa6, 0x16, 0x1c, 0x32, 0x7e, 0x44, 0xc0, 0x41, 0x1b, 0xb0, 0x00, 0xa7, 0x96, 0x97, 0x2e, 0x4d, |
| 0x9f, 0x95, 0x1a, 0x35, 0x85, 0x47, 0x6b, 0xdb, 0xf9, 0x52, 0x32, 0x2a, 0xfd, 0x09, 0x7c, 0x2f, |
| 0x08, 0x6f, 0xcb, 0xa4, 0x99, 0x68, 0x96, 0x90, 0x53, 0xbc, 0x4d, 0x19, 0x83, 0xde, 0xb8, 0xac, |
| 0xb0, 0xf4, 0xb2, 0xc9, 0x83, 0x84, 0x32, 0x1d, 0x18, |
| }; |
| |
| uint16_t TestServiceRouterEndpoint_PrivateKeyLength = sizeof(TestServiceRouterEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for FileDownload Endpoint |
| // |
| |
| uint64_t TestFileDownloadEndpoint_NodeId = 0x18B4300200000013ULL; |
| |
| uint8_t TestFileDownloadEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkjCCAT+gAwIBAgIIebXo5XD6iwcwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAxMzBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABCpmzv1KnqYczgFfIH+BuZHymakSKHTayzplfRmi |
| wO95iySpFL6jiU64YYUTlx5Vps9xR8zbNHvuo2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECE0nONFonzSsMBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCA0EAMD4CHQD6o2s6XNglNihw4Y/WUWpSnKXwmBQfZ6KbHsa7Ah0AmSfGohHb |
| WwIKgOWdWq2Ulp1iL5Cm4ppnRiaBHg== |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x79, 0xb5, 0xe8, 0xe5, 0x70, 0xfa, |
| 0x8b, 0x07, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x13, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0x2a, 0x66, 0xce, 0xfd, 0x4a, 0x9e, 0xa6, 0x1c, |
| 0xce, 0x01, 0x5f, 0x20, 0x7f, 0x81, 0xb9, 0x91, 0xf2, 0x99, 0xa9, 0x12, 0x28, 0x74, 0xda, 0xcb, |
| 0x3a, 0x65, 0x7d, 0x19, 0xa2, 0xc0, 0xef, 0x79, 0x8b, 0x24, 0xa9, 0x14, 0xbe, 0xa3, 0x89, 0x4e, |
| 0xb8, 0x61, 0x85, 0x13, 0x97, 0x1e, 0x55, 0xa6, 0xcf, 0x71, 0x47, 0xcc, 0xdb, 0x34, 0x7b, 0xee, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4d, 0x27, |
| 0x38, 0xd1, 0x68, 0x9f, 0x34, 0xac, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1d, 0x00, 0xfa, 0xa3, 0x6b, 0x3a, 0x5c, |
| 0xd8, 0x25, 0x36, 0x28, 0x70, 0xe1, 0x8f, 0xd6, 0x51, 0x6a, 0x52, 0x9c, 0xa5, 0xf0, 0x98, 0x14, |
| 0x1f, 0x67, 0xa2, 0x9b, 0x1e, 0xc6, 0xbb, 0x30, 0x02, 0x1d, 0x00, 0x99, 0x27, 0xc6, 0xa2, 0x11, |
| 0xdb, 0x5b, 0x02, 0x0a, 0x80, 0xe5, 0x9d, 0x5a, 0xad, 0x94, 0x96, 0x9d, 0x62, 0x2f, 0x90, 0xa6, |
| 0xe2, 0x9a, 0x67, 0x46, 0x26, 0x81, 0x1e, 0x18, 0x18, |
| }; |
| |
| uint16_t TestFileDownloadEndpoint_CertLength = sizeof(TestFileDownloadEndpoint_Cert); |
| |
| uint8_t TestFileDownloadEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHDXcE/d5ZlHh1hmt1AePNHG1W9eFZhRTLydroFugBwYFK4EEACGhPAM6 |
| AAQqZs79Sp6mHM4BXyB/gbmR8pmpEih02ss6ZX0ZosDveYskqRS+o4lOuGGFE5ce |
| VabPcUfM2zR77g== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0x35, 0xdc, 0x13, 0xf7, 0x79, 0x66, 0x51, 0xe1, 0xd6, 0x19, 0xad, 0xd4, 0x07, 0x8f, 0x34, 0x71, |
| 0xb5, 0x5b, 0xd7, 0x85, 0x66, 0x14, 0x53, 0x2f, 0x27, 0x6b, 0xa0, 0x5b, 0x30, 0x03, 0x39, 0x04, |
| 0x2a, 0x66, 0xce, 0xfd, 0x4a, 0x9e, 0xa6, 0x1c, 0xce, 0x01, 0x5f, 0x20, 0x7f, 0x81, 0xb9, 0x91, |
| 0xf2, 0x99, 0xa9, 0x12, 0x28, 0x74, 0xda, 0xcb, 0x3a, 0x65, 0x7d, 0x19, 0xa2, 0xc0, 0xef, 0x79, |
| 0x8b, 0x24, 0xa9, 0x14, 0xbe, 0xa3, 0x89, 0x4e, 0xb8, 0x61, 0x85, 0x13, 0x97, 0x1e, 0x55, 0xa6, |
| 0xcf, 0x71, 0x47, 0xcc, 0xdb, 0x34, 0x7b, 0xee, 0x18, |
| }; |
| |
| uint16_t TestFileDownloadEndpoint_PrivateKeyLength = sizeof(TestFileDownloadEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for BastionService Endpoint |
| // |
| |
| uint64_t TestBastionServiceEndpoint_NodeId = 0x18B4300200000014ULL; |
| |
| uint8_t TestBastionServiceEndpoint_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBkDCCAT+gAwIBAgIIehMHw61ac6MwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMDEyMDAwMDAwMDMwHhcNMTcwNjEyMDAwMDAwWhcNMjcwNjEz |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAgwQMThCNDMwMDIwMDAwMDAxNDBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABJSTls9PeNRsea5OJejODx7qr/JlWkp7akNcu/1y |
| qgEtrQDY2M9Eav0+o3a3ZRtPCgUTAI6SFU0Wo2owaDAMBgNVHRMBAf8EAjAAMA4G |
| A1UdDwEB/wQEAwIFoDAgBgNVHSUBAf8EFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw |
| EQYDVR0OBAoECEtq5ay4nYw7MBMGA1UdIwQMMAqACEe0q/SlstA9MAoGCCqGSM49 |
| BAMCAz8AMDwCHFuxMrW7EcgGbMXPXJ9uTxaP0YFQsOkHldQ0eCoCHEPtqUPC3h+J |
| Fd9mIcHYk8KnL4/oehKugkYUoEE= |
| -----END CERTIFICATE----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x7a, 0x13, 0x07, 0xc3, 0xad, 0x5a, |
| 0x73, 0xa3, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0x15, 0x97, 0x34, 0x37, 0x06, |
| 0x27, 0x12, 0x14, 0x00, 0x00, 0x00, 0x02, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0x94, 0x93, 0x96, 0xcf, 0x4f, 0x78, 0xd4, 0x6c, |
| 0x79, 0xae, 0x4e, 0x25, 0xe8, 0xce, 0x0f, 0x1e, 0xea, 0xaf, 0xf2, 0x65, 0x5a, 0x4a, 0x7b, 0x6a, |
| 0x43, 0x5c, 0xbb, 0xfd, 0x72, 0xaa, 0x01, 0x2d, 0xad, 0x00, 0xd8, 0xd8, 0xcf, 0x44, 0x6a, 0xfd, |
| 0x3e, 0xa3, 0x76, 0xb7, 0x65, 0x1b, 0x4f, 0x0a, 0x05, 0x13, 0x00, 0x8e, 0x92, 0x15, 0x4d, 0x16, |
| 0x35, 0x83, 0x29, 0x01, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x05, 0x18, 0x35, 0x84, 0x29, |
| 0x01, 0x36, 0x02, 0x04, 0x02, 0x04, 0x01, 0x18, 0x18, 0x35, 0x81, 0x30, 0x02, 0x08, 0x4b, 0x6a, |
| 0xe5, 0xac, 0xb8, 0x9d, 0x8c, 0x3b, 0x18, 0x35, 0x80, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, |
| 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1c, 0x5b, 0xb1, 0x32, 0xb5, 0xbb, 0x11, |
| 0xc8, 0x06, 0x6c, 0xc5, 0xcf, 0x5c, 0x9f, 0x6e, 0x4f, 0x16, 0x8f, 0xd1, 0x81, 0x50, 0xb0, 0xe9, |
| 0x07, 0x95, 0xd4, 0x34, 0x78, 0x2a, 0x30, 0x02, 0x1c, 0x43, 0xed, 0xa9, 0x43, 0xc2, 0xde, 0x1f, |
| 0x89, 0x15, 0xdf, 0x66, 0x21, 0xc1, 0xd8, 0x93, 0xc2, 0xa7, 0x2f, 0x8f, 0xe8, 0x7a, 0x12, 0xae, |
| 0x82, 0x46, 0x14, 0xa0, 0x41, 0x18, 0x18, |
| }; |
| |
| uint16_t TestBastionServiceEndpoint_CertLength = sizeof(TestBastionServiceEndpoint_Cert); |
| |
| uint8_t TestBastionServiceEndpoint_PrivateKey[] = |
| { |
| /* |
| -----BEGIN EC PARAMETERS----- |
| BgUrgQQAIQ== |
| -----END EC PARAMETERS----- |
| -----BEGIN EC PRIVATE KEY----- |
| MGgCAQEEHF8/Yg8lMypYfDOqFgg+aOD4QWvkJi9shDT0UoCgBwYFK4EEACGhPAM6 |
| AASUk5bPT3jUbHmuTiXozg8e6q/yZVpKe2pDXLv9cqoBLa0A2NjPRGr9PqN2t2Ub |
| TwoFEwCOkhVNFg== |
| -----END EC PRIVATE KEY----- |
| */ |
| |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x26, 0x01, 0x25, 0x00, 0x5a, 0x23, 0x30, 0x02, 0x1c, |
| 0x5f, 0x3f, 0x62, 0x0f, 0x25, 0x33, 0x2a, 0x58, 0x7c, 0x33, 0xaa, 0x16, 0x08, 0x3e, 0x68, 0xe0, |
| 0xf8, 0x41, 0x6b, 0xe4, 0x26, 0x2f, 0x6c, 0x84, 0x34, 0xf4, 0x52, 0x80, 0x30, 0x03, 0x39, 0x04, |
| 0x94, 0x93, 0x96, 0xcf, 0x4f, 0x78, 0xd4, 0x6c, 0x79, 0xae, 0x4e, 0x25, 0xe8, 0xce, 0x0f, 0x1e, |
| 0xea, 0xaf, 0xf2, 0x65, 0x5a, 0x4a, 0x7b, 0x6a, 0x43, 0x5c, 0xbb, 0xfd, 0x72, 0xaa, 0x01, 0x2d, |
| 0xad, 0x00, 0xd8, 0xd8, 0xcf, 0x44, 0x6a, 0xfd, 0x3e, 0xa3, 0x76, 0xb7, 0x65, 0x1b, 0x4f, 0x0a, |
| 0x05, 0x13, 0x00, 0x8e, 0x92, 0x15, 0x4d, 0x16, 0x18, |
| }; |
| |
| uint16_t TestBastionServiceEndpoint_PrivateKeyLength = sizeof(TestBastionServiceEndpoint_PrivateKey); |
| |
| |
| // Certificate and private key for Mock Service Endpoint Root |
| // |
| |
| uint64_t TestMockRoot_CAId = 0x18B430EEEE000001ULL; |
| |
| uint8_t TestMockRoot_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBcTCCASCgAwIBAgIIF0KR10ZaOA4wCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMEVFMTIwMDAwMDEwHhcNMTcwNjAxMDAwMDAwWhcNNDIwNTMx |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAwwQMThCNDMwRUUxMjAwMDAwMTBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABPYE52diHCH5+xE/Gevlw3iN+9YL2sHNrfbMv5Ca |
| dgnJK8SJMH7C+c4INZd9jFU/M0wYtkSDU5qJo0swSTAPBgNVHRMBAf8EBTADAQH/ |
| MA4GA1UdDwEB/wQEAwIBBjARBgNVHQ4ECgQITig8if5ujqEwEwYDVR0jBAwwCoAI |
| Tig8if5ujqEwCgYIKoZIzj0EAwIDPwAwPAIcVzNbHv1EHMlpLfhChh+TI/hGJOHW |
| uUrA8SCT5AIcKQVlLJMMlm6uhDKDQVR4VmggsNssEdzTJwJhUQ== |
| -----END CERTIFICATE----- |
| */ |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x17, 0x42, 0x91, 0xd7, 0x46, 0x5a, |
| 0x38, 0x0e, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x01, 0x00, 0x00, 0x12, 0xee, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x80, 0xa6, 0x5d, 0x21, 0x26, 0x05, 0x7f, 0x64, 0x42, 0x51, 0x37, 0x06, |
| 0x27, 0x13, 0x01, 0x00, 0x00, 0x12, 0xee, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0xf6, 0x04, 0xe7, 0x67, 0x62, 0x1c, 0x21, 0xf9, |
| 0xfb, 0x11, 0x3f, 0x19, 0xeb, 0xe5, 0xc3, 0x78, 0x8d, 0xfb, 0xd6, 0x0b, 0xda, 0xc1, 0xcd, 0xad, |
| 0xf6, 0xcc, 0xbf, 0x90, 0x9a, 0x76, 0x09, 0xc9, 0x2b, 0xc4, 0x89, 0x30, 0x7e, 0xc2, 0xf9, 0xce, |
| 0x08, 0x35, 0x97, 0x7d, 0x8c, 0x55, 0x3f, 0x33, 0x4c, 0x18, 0xb6, 0x44, 0x83, 0x53, 0x9a, 0x89, |
| 0x35, 0x83, 0x29, 0x01, 0x29, 0x02, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x60, 0x18, 0x35, |
| 0x81, 0x30, 0x02, 0x08, 0x4e, 0x28, 0x3c, 0x89, 0xfe, 0x6e, 0x8e, 0xa1, 0x18, 0x35, 0x80, 0x30, |
| 0x02, 0x08, 0x4e, 0x28, 0x3c, 0x89, 0xfe, 0x6e, 0x8e, 0xa1, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1c, |
| 0x57, 0x33, 0x5b, 0x1e, 0xfd, 0x44, 0x1c, 0xc9, 0x69, 0x2d, 0xf8, 0x42, 0x86, 0x1f, 0x93, 0x23, |
| 0xf8, 0x46, 0x24, 0xe1, 0xd6, 0xb9, 0x4a, 0xc0, 0xf1, 0x20, 0x93, 0xe4, 0x30, 0x02, 0x1c, 0x29, |
| 0x05, 0x65, 0x2c, 0x93, 0x0c, 0x96, 0x6e, 0xae, 0x84, 0x32, 0x83, 0x41, 0x54, 0x78, 0x56, 0x68, |
| 0x20, 0xb0, 0xdb, 0x2c, 0x11, 0xdc, 0xd3, 0x27, 0x02, 0x61, 0x51, 0x18, 0x18, |
| }; |
| |
| uint16_t TestMockRoot_CertLength = sizeof(TestMockRoot_Cert); |
| |
| |
| // Certificate and private key for Mock Service Endpoint CA |
| // |
| |
| uint64_t TestMockServiceEndpointCA_CAId = 0x18B430EEEE000002ULL; |
| |
| uint8_t TestMockServiceEndpointCA_Cert[] = |
| { |
| /* |
| -----BEGIN CERTIFICATE----- |
| MIIBczCCASCgAwIBAgIIBdBn3AonyMYwCgYIKoZIzj0EAwIwIjEgMB4GCisGAQQB |
| gsMrAQMMEDE4QjQzMEVFMTIwMDAwMDEwHhcNMTcwNjEyMDAwMDAwWhcNNDIwNjEx |
| MjM1OTU5WjAiMSAwHgYKKwYBBAGCwysBAwwQMThCNDMwMTIwMDAwMDAwMzBOMBAG |
| ByqGSM49AgEGBSuBBAAhAzoABOd2OzYJP/hiIVFQMv1+1z1J9aw/X/q2BgzaNRJz |
| 6yIhfjhuPNZagMy/XyHOfncczU1d9W24EnTWo0swSTAPBgNVHRMBAf8EBTADAQH/ |
| MA4GA1UdDwEB/wQEAwIBBjARBgNVHQ4ECgQIR7Sr9KWy0D0wEwYDVR0jBAwwCoAI |
| Tig8if5ujqEwCgYIKoZIzj0EAwIDQQAwPgIdAMQ5ZEQIQNuB4xbEdg5wqOfSp0Qy |
| 55UZ4/ku1zMCHQDqp1GjQcTY/tUq1uAKAzYBJly8XLD0cQ9WOBhr |
| -----END CERTIFICATE----- |
| */ |
| 0xd5, 0x00, 0x00, 0x04, 0x00, 0x01, 0x00, 0x30, 0x01, 0x08, 0x05, 0xd0, 0x67, 0xdc, 0x0a, 0x27, |
| 0xc8, 0xc6, 0x24, 0x02, 0x05, 0x37, 0x03, 0x27, 0x13, 0x01, 0x00, 0x00, 0x12, 0xee, 0x30, 0xb4, |
| 0x18, 0x18, 0x26, 0x04, 0x00, 0x27, 0x6c, 0x21, 0x26, 0x05, 0xff, 0xe4, 0x50, 0x51, 0x37, 0x06, |
| 0x27, 0x13, 0x03, 0x00, 0x00, 0x00, 0x12, 0x30, 0xb4, 0x18, 0x18, 0x24, 0x07, 0x02, 0x26, 0x08, |
| 0x25, 0x00, 0x5a, 0x23, 0x30, 0x0a, 0x39, 0x04, 0xe7, 0x76, 0x3b, 0x36, 0x09, 0x3f, 0xf8, 0x62, |
| 0x21, 0x51, 0x50, 0x32, 0xfd, 0x7e, 0xd7, 0x3d, 0x49, 0xf5, 0xac, 0x3f, 0x5f, 0xfa, 0xb6, 0x06, |
| 0x0c, 0xda, 0x35, 0x12, 0x73, 0xeb, 0x22, 0x21, 0x7e, 0x38, 0x6e, 0x3c, 0xd6, 0x5a, 0x80, 0xcc, |
| 0xbf, 0x5f, 0x21, 0xce, 0x7e, 0x77, 0x1c, 0xcd, 0x4d, 0x5d, 0xf5, 0x6d, 0xb8, 0x12, 0x74, 0xd6, |
| 0x35, 0x83, 0x29, 0x01, 0x29, 0x02, 0x18, 0x35, 0x82, 0x29, 0x01, 0x24, 0x02, 0x60, 0x18, 0x35, |
| 0x81, 0x30, 0x02, 0x08, 0x47, 0xb4, 0xab, 0xf4, 0xa5, 0xb2, 0xd0, 0x3d, 0x18, 0x35, 0x80, 0x30, |
| 0x02, 0x08, 0x4e, 0x28, 0x3c, 0x89, 0xfe, 0x6e, 0x8e, 0xa1, 0x18, 0x35, 0x0c, 0x30, 0x01, 0x1d, |
| 0x00, 0xc4, 0x39, 0x64, 0x44, 0x08, 0x40, 0xdb, 0x81, 0xe3, 0x16, 0xc4, 0x76, 0x0e, 0x70, 0xa8, |
| 0xe7, 0xd2, 0xa7, 0x44, 0x32, 0xe7, 0x95, 0x19, 0xe3, 0xf9, 0x2e, 0xd7, 0x33, 0x30, 0x02, 0x1d, |
| 0x00, 0xea, 0xa7, 0x51, 0xa3, 0x41, 0xc4, 0xd8, 0xfe, 0xd5, 0x2a, 0xd6, 0xe0, 0x0a, 0x03, 0x36, |
| 0x01, 0x26, 0x5c, 0xbc, 0x5c, 0xb0, 0xf4, 0x71, 0x0f, 0x56, 0x38, 0x18, 0x6b, 0x18, 0x18, |
| }; |
| |
| uint16_t TestMockServiceEndpointCA_CertLength = sizeof(TestMockServiceEndpointCA_Cert); |
| |
| |
| TestNodeCert TestNodeCerts[] = |
| { |
| { 0x18B4300000000001ULL, TestDevice1_Cert, sizeof(TestDevice1_Cert), TestDevice1_PrivateKey, sizeof(TestDevice1_PrivateKey) }, |
| { 0x18B4300000000002ULL, TestDevice2_Cert, sizeof(TestDevice2_Cert), TestDevice2_PrivateKey, sizeof(TestDevice2_PrivateKey) }, |
| { 0x18B4300000000003ULL, TestDevice3_Cert, sizeof(TestDevice3_Cert), TestDevice3_PrivateKey, sizeof(TestDevice3_PrivateKey) }, |
| { 0x18B4300000000004ULL, TestDevice4_Cert, sizeof(TestDevice4_Cert), TestDevice4_PrivateKey, sizeof(TestDevice4_PrivateKey) }, |
| { 0x18B4300000000005ULL, TestDevice5_Cert, sizeof(TestDevice5_Cert), TestDevice5_PrivateKey, sizeof(TestDevice5_PrivateKey) }, |
| { 0x18B4300000000006ULL, TestDevice6_Cert, sizeof(TestDevice6_Cert), TestDevice6_PrivateKey, sizeof(TestDevice6_PrivateKey) }, |
| { 0x18B4300000000007ULL, TestDevice7_Cert, sizeof(TestDevice7_Cert), TestDevice7_PrivateKey, sizeof(TestDevice7_PrivateKey) }, |
| { 0x18B4300000000008ULL, TestDevice8_Cert, sizeof(TestDevice8_Cert), TestDevice8_PrivateKey, sizeof(TestDevice8_PrivateKey) }, |
| { 0x18B4300000000009ULL, TestDevice9_Cert, sizeof(TestDevice9_Cert), TestDevice9_PrivateKey, sizeof(TestDevice9_PrivateKey) }, |
| { 0x18B430000000000AULL, TestDevice10_Cert, sizeof(TestDevice10_Cert), TestDevice10_PrivateKey, sizeof(TestDevice10_PrivateKey) }, |
| { 0x18B4300200000001ULL, TestDirectoryEndpoint_Cert, sizeof(TestDirectoryEndpoint_Cert), TestDirectoryEndpoint_PrivateKey, sizeof(TestDirectoryEndpoint_PrivateKey) }, |
| { 0x18B4300200000002ULL, TestSoftwareUpdateEndpoint_Cert, sizeof(TestSoftwareUpdateEndpoint_Cert), TestSoftwareUpdateEndpoint_PrivateKey, sizeof(TestSoftwareUpdateEndpoint_PrivateKey) }, |
| { 0x18B4300200000003ULL, TestDataManagementEndpoint_Cert, sizeof(TestDataManagementEndpoint_Cert), TestDataManagementEndpoint_PrivateKey, sizeof(TestDataManagementEndpoint_PrivateKey) }, |
| { 0x18B4300200000004ULL, TestLogUploadEndpoint_Cert, sizeof(TestLogUploadEndpoint_Cert), TestLogUploadEndpoint_PrivateKey, sizeof(TestLogUploadEndpoint_PrivateKey) }, |
| { 0x18B4300200000010ULL, TestServiceProvisioningEndpoint_Cert, sizeof(TestServiceProvisioningEndpoint_Cert), TestServiceProvisioningEndpoint_PrivateKey, sizeof(TestServiceProvisioningEndpoint_PrivateKey) }, |
| { 0x18B4300200000011ULL, TestTunnelEndpoint_Cert, sizeof(TestTunnelEndpoint_Cert), TestTunnelEndpoint_PrivateKey, sizeof(TestTunnelEndpoint_PrivateKey) }, |
| { 0x18B4300200000012ULL, TestServiceRouterEndpoint_Cert, sizeof(TestServiceRouterEndpoint_Cert), TestServiceRouterEndpoint_PrivateKey, sizeof(TestServiceRouterEndpoint_PrivateKey) }, |
| { 0x18B4300200000013ULL, TestFileDownloadEndpoint_Cert, sizeof(TestFileDownloadEndpoint_Cert), TestFileDownloadEndpoint_PrivateKey, sizeof(TestFileDownloadEndpoint_PrivateKey) }, |
| { 0x18B4300200000014ULL, TestBastionServiceEndpoint_Cert, sizeof(TestBastionServiceEndpoint_Cert), TestBastionServiceEndpoint_PrivateKey, sizeof(TestBastionServiceEndpoint_PrivateKey) }, |
| { 0, NULL, 0, NULL, 0 } |
| }; |
| |
| |
| TestCACert TestCACerts[] = |
| { |
| { TestMockRoot_CAId, TestMockRoot_Cert, TestMockRoot_CertLength }, |
| { TestMockServiceEndpointCA_CAId, TestMockServiceEndpointCA_Cert, TestMockServiceEndpointCA_CertLength }, |
| { 0, NULL, 0 } |
| }; |
| |
| |
| bool GetTestNodeCert(uint64_t nodeId, const uint8_t *& cert, uint16_t& certLen) |
| { |
| for (TestNodeCert *p = TestNodeCerts; p->NodeId != 0; p++) |
| if (p->NodeId == nodeId) |
| { |
| cert = p->Cert; |
| certLen = p->CertLength; |
| return true; |
| } |
| return false; |
| } |
| |
| bool GetTestNodePrivateKey(uint64_t nodeId, const uint8_t *& key, uint16_t& keyLen) |
| { |
| for (TestNodeCert *p = TestNodeCerts; p->NodeId != 0; p++) |
| if (p->NodeId == nodeId) |
| { |
| key = p->PrivateKey; |
| keyLen = p->PrivateKeyLength; |
| return true; |
| } |
| return false; |
| } |
| |
| bool GetTestCACert(uint64_t caId, const uint8_t *& cert, uint16_t& certLen) |
| { |
| for (TestCACert *p = TestCACerts; p->CAId != 0; p++) |
| if (p->CAId == caId) |
| { |
| cert = p->Cert; |
| certLen = p->CertLength; |
| return true; |
| } |
| return false; |
| } |