]> Cypherpunks repositories - gostls13.git/commitdiff
crypto/x509: run a subset of the NIST PKI test suite
authorRoland Shoemaker <roland@golang.org>
Mon, 7 Oct 2024 22:53:59 +0000 (15:53 -0700)
committerRoland Shoemaker <roland@golang.org>
Fri, 22 Nov 2024 17:43:48 +0000 (17:43 +0000)
This vendors the vectors (generated using [0], derived from the
BoringSSL script which generates their test headers) and all of the
certs, but only runs the subset of the suite that is focused on policy
validation.

In the future we may want to run more of the suite, since it is focused
on path validation, not path building, the way it interacts with our
hybrid path builder/validator is kind of complicated.

Updates #68484
Updates #45857

[0] https://gist.github.com/rolandshoemaker/a4efa9d65c2cef74a46ea40f47f0729e

Change-Id: Ic04323dcd76aa5cbd6372c8cb1c44ccb91ccbca4
Reviewed-on: https://go-review.googlesource.com/c/go/+/618415
Reviewed-by: Russ Cox <rsc@golang.org>
Reviewed-by: Filippo Valsorda <filippo@golang.org>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>

408 files changed:
src/crypto/x509/pkits_test.go [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/README.md [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesNoPoliciesTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest13EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesanyPolicyTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/AnyPolicyTest14EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BadCRLIssuerNameCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BadCRLSignatureCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BadSignedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BadnotAfterDateCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BadnotBeforeDateCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/CPSPointerQualifierTest20EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DSACACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DSAParametersInheritedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest12EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/GeneralizedTimeCRLnextUpdateCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/GoodCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/GoodsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLIssuerNameTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLSignatureTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidCASignatureTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotAfterDateTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotBeforeDateTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest31EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest33EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest38EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest12EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest13EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest15EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest16EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest17EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest20EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidDSASignatureTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidEESignatureTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotAfterDateTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotBeforeDateTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest23EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest26EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidLongSerialNumberTest18EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingFromanyPolicyTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingToanyPolicyTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingCRLTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingbasicConstraintsTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingOrderTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidNegativeSerialNumberTest15EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidOldCRLnextUpdateTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest22EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest24EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest26EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedCATest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedEETest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest35EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest37EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidWrongCRLTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest27EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest31EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest32EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest34EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest35EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsAttributeCertsTest14EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsCACertsTest12EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsUserCertsTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest15EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest16EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest17EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest20EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest21EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest12EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000CRLnextUpdateTest12EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/LongSerialNumberCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/Mapping1to2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/MappingFromanyPolicyCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/MappingToanyPolicyCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/MissingbasicConstraintsCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/NameOrderingCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/NegativeSerialNumberCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/NoCRLCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/NoPoliciesCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/NoissuingDistributionPointCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/OldCRLnextUpdateCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/OverlappingPoliciesTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/P1anyPolicyMapping1to2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PanyPolicyMapping1to2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subCAP123Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subsubCAP123P12Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subCAP12Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subCAP1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subsubCAP1P2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/PoliciesP3CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/RFC3280MandatoryAttributeTypesCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/RFC3280OptionalAttributeTypesCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/RevokedsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/RolloverfromPrintableStringtoUTF8StringCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/TrustAnchorRootCertificate.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/TwoCRLsCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UIDCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UTF8StringCaseInsensitiveMatchCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UTF8StringEncodedNamesCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLEntryExtensionCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLExtensionCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest15EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest16EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest17EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest18EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest19EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidCertificatePathTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest30EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest32EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNandRFC822nameConstraintsTest27EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest14EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest18EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest19EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDSAParameterInheritanceTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidDSASignaturesTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest22EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest24EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest25EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest16EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest17EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingCapitalizationTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidNameUIDsTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidNegativeSerialNumberTest14EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidNoissuingDistributionPointTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest12EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest13EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest14EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest21EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest23EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest25EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidTwoCRLsTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest34EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest36EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringEncodedNamesTest9EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidbasicConstraintsNotCriticalTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest28EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest29EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest30EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest33EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest5EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitAnyPolicyTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidkeyUsageNotCriticalTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidonlyContainsCACertsTest13EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest18EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest19EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest13EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest14EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest7EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest8EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/Validpre2000UTCnotBeforeDateTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest1EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest2EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest4EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/WrongCRLCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/anyPolicyCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsCriticalcAFalseCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalcAFalseCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA3Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/deltaCRLIndicatorNoBaseCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/distributionPoint1CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/distributionPoint2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3cRLIssuerCert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4cRLIssuerCert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA5Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA6Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy0CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCAIAP5Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subsubCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicyTest3EE.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalcRLSignFalseCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalkeyCertSignFalseCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalcRLSignFalseCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1SelfIssuedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA3Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN4CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN5CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS1CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA3Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI1CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/onlyContainsAttributeCertsCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/onlyContainsCACertsCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/onlyContainsUserCertsCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA3Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA4Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0SelfIssuedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCA2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA0Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA1Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA4Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA00Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA11Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA41Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA11XCert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA41XCert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/pre2000CRLnextUpdateCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubsubCACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7CACert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subCARE2Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt [new file with mode: 0644]
src/crypto/x509/testdata/nist-pkits/vectors.json [new file with mode: 0644]

diff --git a/src/crypto/x509/pkits_test.go b/src/crypto/x509/pkits_test.go
new file mode 100644 (file)
index 0000000..b1139bb
--- /dev/null
@@ -0,0 +1,186 @@
+// Copyright 2024 The Go Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+package x509
+
+import (
+       "encoding/json"
+       "os"
+       "path/filepath"
+       "slices"
+       "testing"
+)
+
+var nistTestPolicies = map[string]OID{
+       "anyPolicy":          anyPolicyOID,
+       "NIST-test-policy-1": mustNewOIDFromInts([]uint64{2, 16, 840, 1, 101, 3, 2, 1, 48, 1}),
+       "NIST-test-policy-2": mustNewOIDFromInts([]uint64{2, 16, 840, 1, 101, 3, 2, 1, 48, 2}),
+       "NIST-test-policy-3": mustNewOIDFromInts([]uint64{2, 16, 840, 1, 101, 3, 2, 1, 48, 3}),
+       "NIST-test-policy-6": mustNewOIDFromInts([]uint64{2, 16, 840, 1, 101, 3, 2, 1, 48, 6}),
+}
+
+func TestNISTPKITSPolicy(t *testing.T) {
+       // This test runs a subset of the NIST PKI path validation test suite that
+       // focuses of policy validation, rather than the entire suite. Since the
+       // suite assumes you are only validating the path, rather than building
+       // _and_ validating the path, we take the path as given and run
+       // policiesValid on it.
+
+       certDir := "testdata/nist-pkits/certs"
+
+       var testcases []struct {
+               Name                        string
+               CertPath                    []string
+               InitialPolicySet            []string
+               InitialPolicyMappingInhibit bool
+               InitialExplicitPolicy       bool
+               InitialAnyPolicyInhibit     bool
+               ShouldValidate              bool
+               Skipped                     bool
+       }
+       b, err := os.ReadFile("testdata/nist-pkits/vectors.json")
+       if err != nil {
+               t.Fatal(err)
+       }
+       if err := json.Unmarshal(b, &testcases); err != nil {
+               t.Fatal(err)
+       }
+
+       policyTests := map[string]bool{
+               "4.8.1 All Certificates Same Policy Test1 (Subpart 1)":     true,
+               "4.8.1 All Certificates Same Policy Test1 (Subpart 2)":     true,
+               "4.8.1 All Certificates Same Policy Test1 (Subpart 3)":     true,
+               "4.8.1 All Certificates Same Policy Test1 (Subpart 4)":     true,
+               "4.8.2 All Certificates No Policies Test2 (Subpart 1)":     true,
+               "4.8.2 All Certificates No Policies Test2 (Subpart 2)":     true,
+               "4.8.3 Different Policies Test3 (Subpart 1)":               true,
+               "4.8.3 Different Policies Test3 (Subpart 2)":               true,
+               "4.8.3 Different Policies Test3 (Subpart 3)":               true,
+               "4.8.4 Different Policies Test4":                           true,
+               "4.8.5 Different Policies Test5":                           true,
+               "4.8.6 Overlapping Policies Test6 (Subpart 1)":             true,
+               "4.8.6 Overlapping Policies Test6 (Subpart 2)":             true,
+               "4.8.6 Overlapping Policies Test6 (Subpart 3)":             true,
+               "4.8.7 Different Policies Test7":                           true,
+               "4.8.8 Different Policies Test8":                           true,
+               "4.8.9 Different Policies Test9":                           true,
+               "4.8.10 All Certificates Same Policies Test10 (Subpart 1)": true,
+               "4.8.10 All Certificates Same Policies Test10 (Subpart 2)": true,
+               "4.8.10 All Certificates Same Policies Test10 (Subpart 3)": true,
+               "4.8.11 All Certificates AnyPolicy Test11 (Subpart 1)":     true,
+               "4.8.11 All Certificates AnyPolicy Test11 (Subpart 2)":     true,
+               "4.8.12 Different Policies Test12":                         true,
+               "4.8.13 All Certificates Same Policies Test13 (Subpart 1)": true,
+               "4.8.13 All Certificates Same Policies Test13 (Subpart 2)": true,
+               "4.8.13 All Certificates Same Policies Test13 (Subpart 3)": true,
+               "4.8.14 AnyPolicy Test14 (Subpart 1)":                      true,
+               "4.8.14 AnyPolicy Test14 (Subpart 2)":                      true,
+               "4.8.15 User Notice Qualifier Test15":                      true,
+               "4.8.16 User Notice Qualifier Test16":                      true,
+               "4.8.17 User Notice Qualifier Test17":                      true,
+               "4.8.18 User Notice Qualifier Test18 (Subpart 1)":          true,
+               "4.8.18 User Notice Qualifier Test18 (Subpart 2)":          true,
+               "4.8.19 User Notice Qualifier Test19":                      true,
+               "4.8.20 CPS Pointer Qualifier Test20":                      true,
+               "4.9.1 Valid RequireExplicitPolicy Test1":                  true,
+               "4.9.2 Valid RequireExplicitPolicy Test2":                  true,
+               "4.9.3 Invalid RequireExplicitPolicy Test3":                true,
+               "4.9.4 Valid RequireExplicitPolicy Test4":                  true,
+               "4.9.5 Invalid RequireExplicitPolicy Test5":                true,
+               "4.9.6 Valid Self-Issued requireExplicitPolicy Test6":      true,
+               "4.9.7 Invalid Self-Issued requireExplicitPolicy Test7":    true,
+               "4.9.8 Invalid Self-Issued requireExplicitPolicy Test8":    true,
+               "4.10.1.1 Valid Policy Mapping Test1 (Subpart 1)":          true,
+               "4.10.1.2 Valid Policy Mapping Test1 (Subpart 2)":          true,
+               "4.10.1.3 Valid Policy Mapping Test1 (Subpart 3)":          true,
+               "4.10.2 Invalid Policy Mapping Test2 (Subpart 1)":          true,
+               "4.10.2 Invalid Policy Mapping Test2 (Subpart 2)":          true,
+               "4.10.3 Valid Policy Mapping Test3 (Subpart 1)":            true,
+               "4.10.3 Valid Policy Mapping Test3 (Subpart 2)":            true,
+               "4.10.4 Invalid Policy Mapping Test4":                      true,
+               "4.10.5 Valid Policy Mapping Test5 (Subpart 1)":            true,
+               "4.10.5 Valid Policy Mapping Test5 (Subpart 2)":            true,
+               "4.10.6 Valid Policy Mapping Test6 (Subpart 1)":            true,
+               "4.10.6 Valid Policy Mapping Test6 (Subpart 2)":            true,
+               "4.10.7 Invalid Mapping From anyPolicy Test7":              true,
+               "4.10.8 Invalid Mapping To anyPolicy Test8":                true,
+               "4.10.9 Valid Policy Mapping Test9":                        true,
+               "4.10.10 Invalid Policy Mapping Test10":                    true,
+               "4.10.11 Valid Policy Mapping Test11":                      true,
+               "4.10.12 Valid Policy Mapping Test12 (Subpart 1)":          true,
+               "4.10.12 Valid Policy Mapping Test12 (Subpart 2)":          true,
+               "4.10.13 Valid Policy Mapping Test13 (Subpart 1)":          true,
+               "4.10.13 Valid Policy Mapping Test13 (Subpart 2)":          true,
+               "4.10.13 Valid Policy Mapping Test13 (Subpart 3)":          true,
+               "4.10.14 Valid Policy Mapping Test14":                      true,
+               "4.11.1 Invalid inhibitPolicyMapping Test1":                true,
+               "4.11.2 Valid inhibitPolicyMapping Test2":                  true,
+               "4.11.3 Invalid inhibitPolicyMapping Test3":                true,
+               "4.11.4 Valid inhibitPolicyMapping Test4":                  true,
+               "4.11.5 Invalid inhibitPolicyMapping Test5":                true,
+               "4.11.6 Invalid inhibitPolicyMapping Test6":                true,
+               "4.11.7 Valid Self-Issued inhibitPolicyMapping Test7":      true,
+               "4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8":    true,
+               "4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9":    true,
+               "4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10":  true,
+               "4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11":  true,
+               "4.12.1 Invalid inhibitAnyPolicy Test1":                    true,
+               "4.12.2 Valid inhibitAnyPolicy Test2":                      true,
+               "4.12.3 inhibitAnyPolicy Test3 (Subpart 1)":                true,
+               "4.12.3 inhibitAnyPolicy Test3 (Subpart 2)":                true,
+               "4.12.4 Invalid inhibitAnyPolicy Test4":                    true,
+               "4.12.5 Invalid inhibitAnyPolicy Test5":                    true,
+               "4.12.6 Invalid inhibitAnyPolicy Test6":                    true,
+               "4.12.7 Valid Self-Issued inhibitAnyPolicy Test7":          true,
+               "4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8":        true,
+               "4.12.9 Valid Self-Issued inhibitAnyPolicy Test9":          true,
+               "4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10":      true,
+       }
+
+       for _, tc := range testcases {
+               if !policyTests[tc.Name] {
+                       continue
+               }
+               t.Run(tc.Name, func(t *testing.T) {
+                       var chain []*Certificate
+                       for _, c := range tc.CertPath {
+                               certDER, err := os.ReadFile(filepath.Join(certDir, c))
+                               if err != nil {
+                                       t.Fatal(err)
+                               }
+                               cert, err := ParseCertificate(certDER)
+                               if err != nil {
+                                       t.Fatal(err)
+                               }
+                               chain = append(chain, cert)
+                       }
+                       slices.Reverse(chain)
+
+                       var initialPolicies []OID
+                       for _, pstr := range tc.InitialPolicySet {
+                               policy, ok := nistTestPolicies[pstr]
+                               if !ok {
+                                       t.Fatalf("unknown test policy: %s", pstr)
+                               }
+                               initialPolicies = append(initialPolicies, policy)
+                       }
+
+                       valid := policiesValid(chain, VerifyOptions{
+                               CertificatePolicies:   initialPolicies,
+                               inhibitPolicyMapping:  tc.InitialPolicyMappingInhibit,
+                               requireExplicitPolicy: tc.InitialExplicitPolicy,
+                               inhibitAnyPolicy:      tc.InitialAnyPolicyInhibit,
+                       })
+                       if !valid {
+                               if !tc.ShouldValidate {
+                                       return
+                               }
+                               t.Fatalf("Failed to validate: %s", err)
+                       }
+                       if !tc.ShouldValidate {
+                               t.Fatal("Expected path validation to fail")
+                       }
+               })
+       }
+}
diff --git a/src/crypto/x509/testdata/nist-pkits/README.md b/src/crypto/x509/testdata/nist-pkits/README.md
new file mode 100644 (file)
index 0000000..7b76126
--- /dev/null
@@ -0,0 +1,6 @@
+Test vectors and certificates for the "Path Validation Testing Program"
+ portion of the NIST Public Key Infrastructure Testing suite: https://csrc.nist.gov/projects/pki-testing.
+
+Vectors are extracted from the provided PDF: https://csrc.nist.gov/CSRC/media/Projects/PKI-Testing/documents/PKITS.pdf.
+
+Vectors and test material are public domain (United States Government Work under 17 U.S.C. 105).
\ No newline at end of file
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesNoPoliciesTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesNoPoliciesTest2EE.crt
new file mode 100644 (file)
index 0000000..ae6be6c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesNoPoliciesTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest10EE.crt
new file mode 100644 (file)
index 0000000..e36fdb8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest13EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest13EE.crt
new file mode 100644 (file)
index 0000000..c296e5a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesSamePoliciesTest13EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesanyPolicyTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesanyPolicyTest11EE.crt
new file mode 100644 (file)
index 0000000..7439f85
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/AllCertificatesanyPolicyTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/AnyPolicyTest14EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/AnyPolicyTest14EE.crt
new file mode 100644 (file)
index 0000000..a6cf352
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/AnyPolicyTest14EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BadCRLIssuerNameCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BadCRLIssuerNameCACert.crt
new file mode 100644 (file)
index 0000000..05e4b3d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BadCRLIssuerNameCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BadCRLSignatureCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BadCRLSignatureCACert.crt
new file mode 100644 (file)
index 0000000..6dfa00d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BadCRLSignatureCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BadSignedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BadSignedCACert.crt
new file mode 100644 (file)
index 0000000..0a598fc
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BadSignedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BadnotAfterDateCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BadnotAfterDateCACert.crt
new file mode 100644 (file)
index 0000000..7a7dcec
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BadnotAfterDateCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BadnotBeforeDateCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BadnotBeforeDateCACert.crt
new file mode 100644 (file)
index 0000000..33cfbd7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BadnotBeforeDateCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCACert.crt
new file mode 100644 (file)
index 0000000..4e12452
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt
new file mode 100644 (file)
index 0000000..7f86064
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyCACert.crt
new file mode 100644 (file)
index 0000000..1f83cb8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt
new file mode 100644 (file)
index 0000000..8773e48
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyCACert.crt
new file mode 100644 (file)
index 0000000..b00748c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt
new file mode 100644 (file)
index 0000000..963f57a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/CPSPointerQualifierTest20EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/CPSPointerQualifierTest20EE.crt
new file mode 100644 (file)
index 0000000..706d98d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/CPSPointerQualifierTest20EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DSACACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/DSACACert.crt
new file mode 100644 (file)
index 0000000..14787b0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DSACACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DSAParametersInheritedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/DSAParametersInheritedCACert.crt
new file mode 100644 (file)
index 0000000..5e2fa5b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DSAParametersInheritedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest12EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest12EE.crt
new file mode 100644 (file)
index 0000000..7873bd8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest12EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest3EE.crt
new file mode 100644 (file)
index 0000000..57f1df4
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest4EE.crt
new file mode 100644 (file)
index 0000000..4967f41
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest5EE.crt
new file mode 100644 (file)
index 0000000..b6d3123
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest7EE.crt
new file mode 100644 (file)
index 0000000..4c9c82b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest8EE.crt
new file mode 100644 (file)
index 0000000..6c01f37
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest9EE.crt
new file mode 100644 (file)
index 0000000..b2e30bd
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/DifferentPoliciesTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/GeneralizedTimeCRLnextUpdateCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/GeneralizedTimeCRLnextUpdateCACert.crt
new file mode 100644 (file)
index 0000000..f4acda6
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/GeneralizedTimeCRLnextUpdateCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/GoodCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/GoodCACert.crt
new file mode 100644 (file)
index 0000000..edbfa64
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/GoodCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/GoodsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/GoodsubCACert.crt
new file mode 100644 (file)
index 0000000..7a770c3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/GoodsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt
new file mode 100644 (file)
index 0000000..9f4d95f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLIssuerNameTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLIssuerNameTest5EE.crt
new file mode 100644 (file)
index 0000000..e24d88d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLIssuerNameTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLSignatureTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLSignatureTest4EE.crt
new file mode 100644 (file)
index 0000000..4b35bd2
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBadCRLSignatureTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt
new file mode 100644 (file)
index 0000000..348df8f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt
new file mode 100644 (file)
index 0000000..3ca7995
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt
new file mode 100644 (file)
index 0000000..6cc192b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt
new file mode 100644 (file)
index 0000000..18033bc
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidCASignatureTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidCASignatureTest2EE.crt
new file mode 100644 (file)
index 0000000..1f4ad3e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidCASignatureTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotAfterDateTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotAfterDateTest5EE.crt
new file mode 100644 (file)
index 0000000..a9938aa
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotAfterDateTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotBeforeDateTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotBeforeDateTest1EE.crt
new file mode 100644 (file)
index 0000000..f15d6a9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidCAnotBeforeDateTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest31EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest31EE.crt
new file mode 100644 (file)
index 0000000..5f7ad15
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest31EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest33EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest33EE.crt
new file mode 100644 (file)
index 0000000..fa59d6f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest33EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest38EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest38EE.crt
new file mode 100644 (file)
index 0000000..334fed1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNSnameConstraintsTest38EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt
new file mode 100644 (file)
index 0000000..f724473
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt
new file mode 100644 (file)
index 0000000..468cb7b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest10EE.crt
new file mode 100644 (file)
index 0000000..806ebf3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest12EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest12EE.crt
new file mode 100644 (file)
index 0000000..5f3a49f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest12EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest13EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest13EE.crt
new file mode 100644 (file)
index 0000000..d64ddf5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest13EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest15EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest15EE.crt
new file mode 100644 (file)
index 0000000..fd864ce
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest15EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest16EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest16EE.crt
new file mode 100644 (file)
index 0000000..455658d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest16EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest17EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest17EE.crt
new file mode 100644 (file)
index 0000000..63f262b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest17EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest20EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest20EE.crt
new file mode 100644 (file)
index 0000000..a7ef322
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest20EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest2EE.crt
new file mode 100644 (file)
index 0000000..3fd895c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest3EE.crt
new file mode 100644 (file)
index 0000000..decbf34
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest7EE.crt
new file mode 100644 (file)
index 0000000..6ac7665
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest8EE.crt
new file mode 100644 (file)
index 0000000..48adc0a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest9EE.crt
new file mode 100644 (file)
index 0000000..ed753d4
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDNnameConstraintsTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidDSASignatureTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDSASignatureTest6EE.crt
new file mode 100644 (file)
index 0000000..a1725b1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidDSASignatureTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidEESignatureTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidEESignatureTest3EE.crt
new file mode 100644 (file)
index 0000000..9238109
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidEESignatureTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotAfterDateTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotAfterDateTest6EE.crt
new file mode 100644 (file)
index 0000000..af6fdf8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotAfterDateTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotBeforeDateTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotBeforeDateTest2EE.crt
new file mode 100644 (file)
index 0000000..3ddef09
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidEEnotBeforeDateTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest23EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest23EE.crt
new file mode 100644 (file)
index 0000000..5cf92f7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest23EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest26EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest26EE.crt
new file mode 100644 (file)
index 0000000..c4b45f8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidIDPwithindirectCRLTest26EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidLongSerialNumberTest18EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidLongSerialNumberTest18EE.crt
new file mode 100644 (file)
index 0000000..56b1ab4
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidLongSerialNumberTest18EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingFromanyPolicyTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingFromanyPolicyTest7EE.crt
new file mode 100644 (file)
index 0000000..eec4c3c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingFromanyPolicyTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingToanyPolicyTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingToanyPolicyTest8EE.crt
new file mode 100644 (file)
index 0000000..ee6914c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMappingToanyPolicyTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingCRLTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingCRLTest1EE.crt
new file mode 100644 (file)
index 0000000..30b0275
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingCRLTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingbasicConstraintsTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingbasicConstraintsTest1EE.crt
new file mode 100644 (file)
index 0000000..80ba7a0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidMissingbasicConstraintsTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingOrderTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingOrderTest2EE.crt
new file mode 100644 (file)
index 0000000..6b7d7de
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingOrderTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingTest1EE.crt
new file mode 100644 (file)
index 0000000..ee18fa0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidNameChainingTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidNegativeSerialNumberTest15EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidNegativeSerialNumberTest15EE.crt
new file mode 100644 (file)
index 0000000..2c479ca
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidNegativeSerialNumberTest15EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidOldCRLnextUpdateTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidOldCRLnextUpdateTest11EE.crt
new file mode 100644 (file)
index 0000000..1ec410d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidOldCRLnextUpdateTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest10EE.crt
new file mode 100644 (file)
index 0000000..053a608
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest2EE.crt
new file mode 100644 (file)
index 0000000..1ed6615
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest4EE.crt
new file mode 100644 (file)
index 0000000..a194a04
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidPolicyMappingTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest22EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest22EE.crt
new file mode 100644 (file)
index 0000000..c9ad311
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest22EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest24EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest24EE.crt
new file mode 100644 (file)
index 0000000..28ef8f7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest24EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest26EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest26EE.crt
new file mode 100644 (file)
index 0000000..0e7f719
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRFC822nameConstraintsTest26EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedCATest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedCATest2EE.crt
new file mode 100644 (file)
index 0000000..8054597
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedCATest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedEETest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedEETest3EE.crt
new file mode 100644 (file)
index 0000000..455cb02
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidRevokedEETest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt
new file mode 100644 (file)
index 0000000..2e85ce5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt
new file mode 100644 (file)
index 0000000..ee48b7f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt
new file mode 100644 (file)
index 0000000..e729fe7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt
new file mode 100644 (file)
index 0000000..103e094
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt
new file mode 100644 (file)
index 0000000..3eaa74d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt
new file mode 100644 (file)
index 0000000..1a1da9f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt
new file mode 100644 (file)
index 0000000..2ff84b8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt
new file mode 100644 (file)
index 0000000..d4050e6
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt
new file mode 100644 (file)
index 0000000..77b6a3c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt
new file mode 100644 (file)
index 0000000..2cbab48
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt
new file mode 100644 (file)
index 0000000..e703d67
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest35EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest35EE.crt
new file mode 100644 (file)
index 0000000..6509668
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest35EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest37EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest37EE.crt
new file mode 100644 (file)
index 0000000..e64db47
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidURInameConstraintsTest37EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt
new file mode 100644 (file)
index 0000000..8630e99
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest10EE.crt
new file mode 100644 (file)
index 0000000..42fda8f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest9EE.crt
new file mode 100644 (file)
index 0000000..c3f93b5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCRLExtensionTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
new file mode 100644 (file)
index 0000000..9200ccc
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidWrongCRLTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidWrongCRLTest6EE.crt
new file mode 100644 (file)
index 0000000..148f9fb
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidWrongCRLTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest2EE.crt
new file mode 100644 (file)
index 0000000..3d5b829
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest3EE.crt
new file mode 100644 (file)
index 0000000..f791140
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcAFalseTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest27EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest27EE.crt
new file mode 100644 (file)
index 0000000..2433e3b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest27EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest31EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest31EE.crt
new file mode 100644 (file)
index 0000000..210bb41
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest31EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest32EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest32EE.crt
new file mode 100644 (file)
index 0000000..5509dda
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest32EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest34EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest34EE.crt
new file mode 100644 (file)
index 0000000..8b9041f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest34EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest35EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest35EE.crt
new file mode 100644 (file)
index 0000000..32e72a2
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidcRLIssuerTest35EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt
new file mode 100644 (file)
index 0000000..10da321
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest10EE.crt
new file mode 100644 (file)
index 0000000..d60812c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest3EE.crt
new file mode 100644 (file)
index 0000000..6b3c374
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest4EE.crt
new file mode 100644 (file)
index 0000000..b959414
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest6EE.crt
new file mode 100644 (file)
index 0000000..ea141b1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest9EE.crt
new file mode 100644 (file)
index 0000000..de4da9d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddeltaCRLTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest2EE.crt
new file mode 100644 (file)
index 0000000..a60b030
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest3EE.crt
new file mode 100644 (file)
index 0000000..bbb8271
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest6EE.crt
new file mode 100644 (file)
index 0000000..a47f7b2
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest8EE.crt
new file mode 100644 (file)
index 0000000..af3a366
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest9EE.crt
new file mode 100644 (file)
index 0000000..3456831
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvaliddistributionPointTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest1EE.crt
new file mode 100644 (file)
index 0000000..828203b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest4EE.crt
new file mode 100644 (file)
index 0000000..2ffd9dd
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest5EE.crt
new file mode 100644 (file)
index 0000000..2fc212d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest6EE.crt
new file mode 100644 (file)
index 0000000..9aafebf
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitAnyPolicyTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest1EE.crt
new file mode 100644 (file)
index 0000000..65ca634
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest3EE.crt
new file mode 100644 (file)
index 0000000..c8b06f0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest5EE.crt
new file mode 100644 (file)
index 0000000..f3526ef
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest6EE.crt
new file mode 100644 (file)
index 0000000..733c152
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidinhibitPolicyMappingTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt
new file mode 100644 (file)
index 0000000..cfddd3a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt
new file mode 100644 (file)
index 0000000..16c103f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt
new file mode 100644 (file)
index 0000000..5583f19
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt
new file mode 100644 (file)
index 0000000..f3062e9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsAttributeCertsTest14EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsAttributeCertsTest14EE.crt
new file mode 100644 (file)
index 0000000..279306e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsAttributeCertsTest14EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsCACertsTest12EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsCACertsTest12EE.crt
new file mode 100644 (file)
index 0000000..f206348
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsCACertsTest12EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsUserCertsTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsUserCertsTest11EE.crt
new file mode 100644 (file)
index 0000000..ecf5128
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlyContainsUserCertsTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest15EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest15EE.crt
new file mode 100644 (file)
index 0000000..f536fc6
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest15EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest16EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest16EE.crt
new file mode 100644 (file)
index 0000000..af5aa4b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest16EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest17EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest17EE.crt
new file mode 100644 (file)
index 0000000..59722f9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest17EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest20EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest20EE.crt
new file mode 100644 (file)
index 0000000..4a0f191
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest20EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest21EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest21EE.crt
new file mode 100644 (file)
index 0000000..59a02de
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidonlySomeReasonsTest21EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest10EE.crt
new file mode 100644 (file)
index 0000000..447115e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest11EE.crt
new file mode 100644 (file)
index 0000000..c28c455
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest12EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest12EE.crt
new file mode 100644 (file)
index 0000000..dc6d0dd
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest12EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest5EE.crt
new file mode 100644 (file)
index 0000000..b8830a2
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest6EE.crt
new file mode 100644 (file)
index 0000000..b96d3c6
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest9EE.crt
new file mode 100644 (file)
index 0000000..c339f6f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidpathLenConstraintTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000CRLnextUpdateTest12EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000CRLnextUpdateTest12EE.crt
new file mode 100644 (file)
index 0000000..3e1ba07
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000CRLnextUpdateTest12EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt
new file mode 100644 (file)
index 0000000..4a7e31c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest3EE.crt
new file mode 100644 (file)
index 0000000..e9b7cf2
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest5EE.crt
new file mode 100644 (file)
index 0000000..971d0a5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/InvalidrequireExplicitPolicyTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/LongSerialNumberCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/LongSerialNumberCACert.crt
new file mode 100644 (file)
index 0000000..12830d9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/LongSerialNumberCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/Mapping1to2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/Mapping1to2CACert.crt
new file mode 100644 (file)
index 0000000..4b70c9a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/Mapping1to2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/MappingFromanyPolicyCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/MappingFromanyPolicyCACert.crt
new file mode 100644 (file)
index 0000000..0a8f1e9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/MappingFromanyPolicyCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/MappingToanyPolicyCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/MappingToanyPolicyCACert.crt
new file mode 100644 (file)
index 0000000..d93d8c7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/MappingToanyPolicyCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/MissingbasicConstraintsCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/MissingbasicConstraintsCACert.crt
new file mode 100644 (file)
index 0000000..e6f41a4
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/MissingbasicConstraintsCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/NameOrderingCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/NameOrderingCACert.crt
new file mode 100644 (file)
index 0000000..f1c4a55
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/NameOrderingCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/NegativeSerialNumberCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/NegativeSerialNumberCACert.crt
new file mode 100644 (file)
index 0000000..1a4d9ba
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/NegativeSerialNumberCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/NoCRLCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/NoCRLCACert.crt
new file mode 100644 (file)
index 0000000..71c607d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/NoCRLCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/NoPoliciesCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/NoPoliciesCACert.crt
new file mode 100644 (file)
index 0000000..3a94cb1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/NoPoliciesCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/NoissuingDistributionPointCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/NoissuingDistributionPointCACert.crt
new file mode 100644 (file)
index 0000000..c4f182a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/NoissuingDistributionPointCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/OldCRLnextUpdateCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/OldCRLnextUpdateCACert.crt
new file mode 100644 (file)
index 0000000..2666670
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/OldCRLnextUpdateCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/OverlappingPoliciesTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/OverlappingPoliciesTest6EE.crt
new file mode 100644 (file)
index 0000000..82b5b5e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/OverlappingPoliciesTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3CACert.crt
new file mode 100644 (file)
index 0000000..9139bd7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subCACert.crt
new file mode 100644 (file)
index 0000000..3b9c2a7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subsubCACert.crt
new file mode 100644 (file)
index 0000000..91fc36a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/P12Mapping1to3subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234CACert.crt
new file mode 100644 (file)
index 0000000..3500737
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234subCACert.crt
new file mode 100644 (file)
index 0000000..eb900eb
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/P1Mapping1to234subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/P1anyPolicyMapping1to2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/P1anyPolicyMapping1to2CACert.crt
new file mode 100644 (file)
index 0000000..3818b6a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/P1anyPolicyMapping1to2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PanyPolicyMapping1to2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PanyPolicyMapping1to2CACert.crt
new file mode 100644 (file)
index 0000000..db22048
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PanyPolicyMapping1to2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234CACert.crt
new file mode 100644 (file)
index 0000000..36cf4ce
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subCAP123Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subCAP123Cert.crt
new file mode 100644 (file)
index 0000000..1ab7ab1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subCAP123Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subsubCAP123P12Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subsubCAP123P12Cert.crt
new file mode 100644 (file)
index 0000000..df83446
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP1234subsubCAP123P12Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123CACert.crt
new file mode 100644 (file)
index 0000000..26262a3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subCAP12Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subCAP12Cert.crt
new file mode 100644 (file)
index 0000000..cef6abe
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subCAP12Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P1Cert.crt
new file mode 100644 (file)
index 0000000..49e66b5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P2Cert.crt
new file mode 100644 (file)
index 0000000..d7b5a42
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubCAP12P2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt
new file mode 100644 (file)
index 0000000..3a79422
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12CACert.crt
new file mode 100644 (file)
index 0000000..dc1b60d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subCAP1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subCAP1Cert.crt
new file mode 100644 (file)
index 0000000..081f951
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subCAP1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subsubCAP1P2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subsubCAP1P2Cert.crt
new file mode 100644 (file)
index 0000000..e8d0bb8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP12subsubCAP1P2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCA2Cert.crt
new file mode 100644 (file)
index 0000000..c734009
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCACert.crt
new file mode 100644 (file)
index 0000000..0f3fbbb
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP2subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP3CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP3CACert.crt
new file mode 100644 (file)
index 0000000..9740b30
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/PoliciesP3CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/RFC3280MandatoryAttributeTypesCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/RFC3280MandatoryAttributeTypesCACert.crt
new file mode 100644 (file)
index 0000000..9c648a3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/RFC3280MandatoryAttributeTypesCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/RFC3280OptionalAttributeTypesCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/RFC3280OptionalAttributeTypesCACert.crt
new file mode 100644 (file)
index 0000000..306303a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/RFC3280OptionalAttributeTypesCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/RevokedsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/RevokedsubCACert.crt
new file mode 100644 (file)
index 0000000..25705b2
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/RevokedsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/RolloverfromPrintableStringtoUTF8StringCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/RolloverfromPrintableStringtoUTF8StringCACert.crt
new file mode 100644 (file)
index 0000000..32ddfe3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/RolloverfromPrintableStringtoUTF8StringCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt
new file mode 100644 (file)
index 0000000..17b3cbb
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt
new file mode 100644 (file)
index 0000000..d747ea1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt
new file mode 100644 (file)
index 0000000..3c1730f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crt
new file mode 100644 (file)
index 0000000..e75eb4c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/TrustAnchorRootCertificate.crt b/src/crypto/x509/testdata/nist-pkits/certs/TrustAnchorRootCertificate.crt
new file mode 100644 (file)
index 0000000..04efaa0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/TrustAnchorRootCertificate.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/TwoCRLsCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/TwoCRLsCACert.crt
new file mode 100644 (file)
index 0000000..28eb60a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/TwoCRLsCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UIDCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/UIDCACert.crt
new file mode 100644 (file)
index 0000000..ec04d74
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UIDCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UTF8StringCaseInsensitiveMatchCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/UTF8StringCaseInsensitiveMatchCACert.crt
new file mode 100644 (file)
index 0000000..2d653ef
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UTF8StringCaseInsensitiveMatchCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UTF8StringEncodedNamesCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/UTF8StringEncodedNamesCACert.crt
new file mode 100644 (file)
index 0000000..ae2ce8a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UTF8StringEncodedNamesCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLEntryExtensionCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLEntryExtensionCACert.crt
new file mode 100644 (file)
index 0000000..6912881
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLEntryExtensionCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLExtensionCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLExtensionCACert.crt
new file mode 100644 (file)
index 0000000..2e2c3ef
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UnknownCRLExtensionCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest15EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest15EE.crt
new file mode 100644 (file)
index 0000000..afb3455
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest15EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest16EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest16EE.crt
new file mode 100644 (file)
index 0000000..7d3bcc5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest16EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest17EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest17EE.crt
new file mode 100644 (file)
index 0000000..5fefe19
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest17EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest18EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest18EE.crt
new file mode 100644 (file)
index 0000000..1168b58
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest18EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest19EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest19EE.crt
new file mode 100644 (file)
index 0000000..3cb86cd
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/UserNoticeQualifierTest19EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt
new file mode 100644 (file)
index 0000000..c91b9f3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt
new file mode 100644 (file)
index 0000000..34197f0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt
new file mode 100644 (file)
index 0000000..9a7919b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt
new file mode 100644 (file)
index 0000000..038e4d7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidCertificatePathTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidCertificatePathTest1EE.crt
new file mode 100644 (file)
index 0000000..69ba301
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidCertificatePathTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest30EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest30EE.crt
new file mode 100644 (file)
index 0000000..e5235c7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest30EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest32EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest32EE.crt
new file mode 100644 (file)
index 0000000..8bc3e87
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNSnameConstraintsTest32EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNandRFC822nameConstraintsTest27EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNandRFC822nameConstraintsTest27EE.crt
new file mode 100644 (file)
index 0000000..2332d4c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNandRFC822nameConstraintsTest27EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest11EE.crt
new file mode 100644 (file)
index 0000000..f8fe122
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest14EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest14EE.crt
new file mode 100644 (file)
index 0000000..4364e1b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest14EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest18EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest18EE.crt
new file mode 100644 (file)
index 0000000..3b5ac8b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest18EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest19EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest19EE.crt
new file mode 100644 (file)
index 0000000..20fa140
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest19EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest1EE.crt
new file mode 100644 (file)
index 0000000..c59e921
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest4EE.crt
new file mode 100644 (file)
index 0000000..c6cfcbb
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest5EE.crt
new file mode 100644 (file)
index 0000000..f2c4dfc
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest6EE.crt
new file mode 100644 (file)
index 0000000..6757119
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDNnameConstraintsTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDSAParameterInheritanceTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDSAParameterInheritanceTest5EE.crt
new file mode 100644 (file)
index 0000000..d8b6ce3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDSAParameterInheritanceTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidDSASignaturesTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidDSASignaturesTest4EE.crt
new file mode 100644 (file)
index 0000000..2fc40a6
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidDSASignaturesTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt
new file mode 100644 (file)
index 0000000..7f77ee8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt
new file mode 100644 (file)
index 0000000..f97ed0a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt
new file mode 100644 (file)
index 0000000..2ef73e1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest22EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest22EE.crt
new file mode 100644 (file)
index 0000000..66296ac
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest22EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest24EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest24EE.crt
new file mode 100644 (file)
index 0000000..0a1b85d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest24EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest25EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest25EE.crt
new file mode 100644 (file)
index 0000000..6f69c0c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidIDPwithindirectCRLTest25EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest16EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest16EE.crt
new file mode 100644 (file)
index 0000000..44e8905
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest16EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest17EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest17EE.crt
new file mode 100644 (file)
index 0000000..9618658
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidLongSerialNumberTest17EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingCapitalizationTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingCapitalizationTest5EE.crt
new file mode 100644 (file)
index 0000000..c0a6b3d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingCapitalizationTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest3EE.crt
new file mode 100644 (file)
index 0000000..fc0f65d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest4EE.crt
new file mode 100644 (file)
index 0000000..a8ffc87
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameChainingWhitespaceTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidNameUIDsTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameUIDsTest6EE.crt
new file mode 100644 (file)
index 0000000..7d0b706
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidNameUIDsTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidNegativeSerialNumberTest14EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidNegativeSerialNumberTest14EE.crt
new file mode 100644 (file)
index 0000000..ab39228
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidNegativeSerialNumberTest14EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidNoissuingDistributionPointTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidNoissuingDistributionPointTest10EE.crt
new file mode 100644 (file)
index 0000000..89eac75
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidNoissuingDistributionPointTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest11EE.crt
new file mode 100644 (file)
index 0000000..865c975
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest12EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest12EE.crt
new file mode 100644 (file)
index 0000000..eb4306a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest12EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest13EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest13EE.crt
new file mode 100644 (file)
index 0000000..2d1b18c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest13EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest14EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest14EE.crt
new file mode 100644 (file)
index 0000000..2487d62
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest14EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest1EE.crt
new file mode 100644 (file)
index 0000000..f2bd7d3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest3EE.crt
new file mode 100644 (file)
index 0000000..e941bbb
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest5EE.crt
new file mode 100644 (file)
index 0000000..d084fc7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest6EE.crt
new file mode 100644 (file)
index 0000000..97dd2e7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest9EE.crt
new file mode 100644 (file)
index 0000000..ef1ac89
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidPolicyMappingTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt
new file mode 100644 (file)
index 0000000..15825d7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt
new file mode 100644 (file)
index 0000000..60a2031
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest21EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest21EE.crt
new file mode 100644 (file)
index 0000000..576a1b8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest21EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest23EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest23EE.crt
new file mode 100644 (file)
index 0000000..c0ff759
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest23EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest25EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest25EE.crt
new file mode 100644 (file)
index 0000000..75f67b7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidRFC822nameConstraintsTest25EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt
new file mode 100644 (file)
index 0000000..0a4e150
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt
new file mode 100644 (file)
index 0000000..16968ab
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt
new file mode 100644 (file)
index 0000000..1516f1e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt
new file mode 100644 (file)
index 0000000..a4385c1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt
new file mode 100644 (file)
index 0000000..1cb0924
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt
new file mode 100644 (file)
index 0000000..ed34676
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt
new file mode 100644 (file)
index 0000000..44e5c1e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt
new file mode 100644 (file)
index 0000000..0826091
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidTwoCRLsTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidTwoCRLsTest7EE.crt
new file mode 100644 (file)
index 0000000..c42779d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidTwoCRLsTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest34EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest34EE.crt
new file mode 100644 (file)
index 0000000..be8ef42
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest34EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest36EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest36EE.crt
new file mode 100644 (file)
index 0000000..6a24838
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidURInameConstraintsTest36EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt
new file mode 100644 (file)
index 0000000..d1f80a7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringEncodedNamesTest9EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringEncodedNamesTest9EE.crt
new file mode 100644 (file)
index 0000000..b14d789
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidUTF8StringEncodedNamesTest9EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
new file mode 100644 (file)
index 0000000..d55dcb1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidbasicConstraintsNotCriticalTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidbasicConstraintsNotCriticalTest4EE.crt
new file mode 100644 (file)
index 0000000..4059c01
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidbasicConstraintsNotCriticalTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest28EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest28EE.crt
new file mode 100644 (file)
index 0000000..9145515
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest28EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest29EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest29EE.crt
new file mode 100644 (file)
index 0000000..b10632b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest29EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest30EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest30EE.crt
new file mode 100644 (file)
index 0000000..593ef98
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest30EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest33EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest33EE.crt
new file mode 100644 (file)
index 0000000..2ae810a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidcRLIssuerTest33EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest2EE.crt
new file mode 100644 (file)
index 0000000..a2eb9a7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest5EE.crt
new file mode 100644 (file)
index 0000000..1a3f7f5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest7EE.crt
new file mode 100644 (file)
index 0000000..43b44bc
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest8EE.crt
new file mode 100644 (file)
index 0000000..8be2458
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddeltaCRLTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest1EE.crt
new file mode 100644 (file)
index 0000000..b2c832f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest4EE.crt
new file mode 100644 (file)
index 0000000..47feb00
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest5EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest5EE.crt
new file mode 100644 (file)
index 0000000..a93d666
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest5EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest7EE.crt
new file mode 100644 (file)
index 0000000..107f102
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValiddistributionPointTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitAnyPolicyTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitAnyPolicyTest2EE.crt
new file mode 100644 (file)
index 0000000..df4ba44
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitAnyPolicyTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest2EE.crt
new file mode 100644 (file)
index 0000000..f13524a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest4EE.crt
new file mode 100644 (file)
index 0000000..75daa87
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidinhibitPolicyMappingTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidkeyUsageNotCriticalTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidkeyUsageNotCriticalTest3EE.crt
new file mode 100644 (file)
index 0000000..6da7906
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidkeyUsageNotCriticalTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidonlyContainsCACertsTest13EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidonlyContainsCACertsTest13EE.crt
new file mode 100644 (file)
index 0000000..3eec5cc
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidonlyContainsCACertsTest13EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest18EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest18EE.crt
new file mode 100644 (file)
index 0000000..f255d3a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest18EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest19EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest19EE.crt
new file mode 100644 (file)
index 0000000..912968e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidonlySomeReasonsTest19EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest13EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest13EE.crt
new file mode 100644 (file)
index 0000000..1ad52ef
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest13EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest14EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest14EE.crt
new file mode 100644 (file)
index 0000000..76800f5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest14EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest7EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest7EE.crt
new file mode 100644 (file)
index 0000000..f3368ed
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest7EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest8EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest8EE.crt
new file mode 100644 (file)
index 0000000..8ff0a13
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidpathLenConstraintTest8EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/Validpre2000UTCnotBeforeDateTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/Validpre2000UTCnotBeforeDateTest3EE.crt
new file mode 100644 (file)
index 0000000..15b2928
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/Validpre2000UTCnotBeforeDateTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest1EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest1EE.crt
new file mode 100644 (file)
index 0000000..7cf888e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest1EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest2EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest2EE.crt
new file mode 100644 (file)
index 0000000..2388936
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest2EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest4EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest4EE.crt
new file mode 100644 (file)
index 0000000..e93a0e1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/ValidrequireExplicitPolicyTest4EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/WrongCRLCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/WrongCRLCACert.crt
new file mode 100644 (file)
index 0000000..3a96d87
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/WrongCRLCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/anyPolicyCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/anyPolicyCACert.crt
new file mode 100644 (file)
index 0000000..df54668
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/anyPolicyCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsCriticalcAFalseCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsCriticalcAFalseCACert.crt
new file mode 100644 (file)
index 0000000..4b678fe
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsCriticalcAFalseCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalCACert.crt
new file mode 100644 (file)
index 0000000..d6c7fb8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalcAFalseCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalcAFalseCACert.crt
new file mode 100644 (file)
index 0000000..27e670e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/basicConstraintsNotCriticalcAFalseCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA1Cert.crt
new file mode 100644 (file)
index 0000000..6815e4f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA2Cert.crt
new file mode 100644 (file)
index 0000000..2f64a74
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA3Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA3Cert.crt
new file mode 100644 (file)
index 0000000..31e6b33
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLCA3Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLIndicatorNoBaseCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLIndicatorNoBaseCACert.crt
new file mode 100644 (file)
index 0000000..7cd82a4
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/deltaCRLIndicatorNoBaseCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/distributionPoint1CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/distributionPoint1CACert.crt
new file mode 100644 (file)
index 0000000..2325081
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/distributionPoint1CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/distributionPoint2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/distributionPoint2CACert.crt
new file mode 100644 (file)
index 0000000..205b62a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/distributionPoint2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA1Cert.crt
new file mode 100644 (file)
index 0000000..046deef
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA2Cert.crt
new file mode 100644 (file)
index 0000000..de9a0be
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3Cert.crt
new file mode 100644 (file)
index 0000000..03bb3eb
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3cRLIssuerCert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3cRLIssuerCert.crt
new file mode 100644 (file)
index 0000000..20e8267
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA3cRLIssuerCert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4Cert.crt
new file mode 100644 (file)
index 0000000..f1cb26b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4cRLIssuerCert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4cRLIssuerCert.crt
new file mode 100644 (file)
index 0000000..ff1203d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA4cRLIssuerCert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA5Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA5Cert.crt
new file mode 100644 (file)
index 0000000..c4f9f17
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA5Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA6Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA6Cert.crt
new file mode 100644 (file)
index 0000000..46443aa
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/indirectCRLCA6Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy0CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy0CACert.crt
new file mode 100644 (file)
index 0000000..cf36110
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy0CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1CACert.crt
new file mode 100644 (file)
index 0000000..0494c8f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedCACert.crt
new file mode 100644 (file)
index 0000000..6512e9d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt
new file mode 100644 (file)
index 0000000..42e0034
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA1Cert.crt
new file mode 100644 (file)
index 0000000..633536c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA2Cert.crt
new file mode 100644 (file)
index 0000000..319e809
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCAIAP5Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCAIAP5Cert.crt
new file mode 100644 (file)
index 0000000..a3c4f21
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subCAIAP5Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subsubCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subsubCA2Cert.crt
new file mode 100644 (file)
index 0000000..3c4512a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy1subsubCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5CACert.crt
new file mode 100644 (file)
index 0000000..fc9b423
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subCACert.crt
new file mode 100644 (file)
index 0000000..11ceeb7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subsubCACert.crt
new file mode 100644 (file)
index 0000000..32bbffe
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicy5subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicyTest3EE.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicyTest3EE.crt
new file mode 100644 (file)
index 0000000..2c8fd4f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitAnyPolicyTest3EE.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0CACert.crt
new file mode 100644 (file)
index 0000000..16808f7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0subCACert.crt
new file mode 100644 (file)
index 0000000..846abc9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping0subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12CACert.crt
new file mode 100644 (file)
index 0000000..5baaf35
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCACert.crt
new file mode 100644 (file)
index 0000000..b2f0979
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt
new file mode 100644 (file)
index 0000000..4ad9f1e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCACert.crt
new file mode 100644 (file)
index 0000000..f514e5d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt
new file mode 100644 (file)
index 0000000..b1e9ff8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1CACert.crt
new file mode 100644 (file)
index 0000000..ec47ee6
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt
new file mode 100644 (file)
index 0000000..65155c7
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt
new file mode 100644 (file)
index 0000000..ae18916
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subCACert.crt
new file mode 100644 (file)
index 0000000..80135df
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subsubCACert.crt
new file mode 100644 (file)
index 0000000..3a72ec1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping1P1subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5CACert.crt
new file mode 100644 (file)
index 0000000..fd09223
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subCACert.crt
new file mode 100644 (file)
index 0000000..93857ab
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubCACert.crt
new file mode 100644 (file)
index 0000000..134b7f8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubsubCACert.crt
new file mode 100644 (file)
index 0000000..dfb268d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/inhibitPolicyMapping5subsubsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalcRLSignFalseCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalcRLSignFalseCACert.crt
new file mode 100644 (file)
index 0000000..2467c94
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalcRLSignFalseCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalkeyCertSignFalseCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalkeyCertSignFalseCACert.crt
new file mode 100644 (file)
index 0000000..aa19cec
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageCriticalkeyCertSignFalseCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalCACert.crt
new file mode 100644 (file)
index 0000000..bab8307
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalcRLSignFalseCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalcRLSignFalseCACert.crt
new file mode 100644 (file)
index 0000000..a6d878c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalcRLSignFalseCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
new file mode 100644 (file)
index 0000000..ef1056f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1CACert.crt
new file mode 100644 (file)
index 0000000..206359f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1SelfIssuedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1SelfIssuedCACert.crt
new file mode 100644 (file)
index 0000000..452ea54
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1SelfIssuedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA1Cert.crt
new file mode 100644 (file)
index 0000000..645f0ae
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA2Cert.crt
new file mode 100644 (file)
index 0000000..6cfc592
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA3Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA3Cert.crt
new file mode 100644 (file)
index 0000000..840d073
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN1subCA3Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN2CACert.crt
new file mode 100644 (file)
index 0000000..c68d496
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3CACert.crt
new file mode 100644 (file)
index 0000000..87ba14d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA1Cert.crt
new file mode 100644 (file)
index 0000000..7eed575
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA2Cert.crt
new file mode 100644 (file)
index 0000000..08f2245
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN3subCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN4CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN4CACert.crt
new file mode 100644 (file)
index 0000000..3b11463
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN4CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN5CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN5CACert.crt
new file mode 100644 (file)
index 0000000..c190f7a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDN5CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS1CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS1CACert.crt
new file mode 100644 (file)
index 0000000..a7ec3bd
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS1CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS2CACert.crt
new file mode 100644 (file)
index 0000000..c708462
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsDNS2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA1Cert.crt
new file mode 100644 (file)
index 0000000..1be8e99
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA2Cert.crt
new file mode 100644 (file)
index 0000000..58308f8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA3Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA3Cert.crt
new file mode 100644 (file)
index 0000000..ff6ba16
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsRFC822CA3Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI1CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI1CACert.crt
new file mode 100644 (file)
index 0000000..5f638c0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI1CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI2CACert.crt
new file mode 100644 (file)
index 0000000..e06b637
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/nameConstraintsURI2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsAttributeCertsCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsAttributeCertsCACert.crt
new file mode 100644 (file)
index 0000000..e8d2b72
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsAttributeCertsCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsCACertsCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsCACertsCACert.crt
new file mode 100644 (file)
index 0000000..d75988a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsCACertsCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsUserCertsCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsUserCertsCACert.crt
new file mode 100644 (file)
index 0000000..0d0b950
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/onlyContainsUserCertsCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA1Cert.crt
new file mode 100644 (file)
index 0000000..ca247b0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA2Cert.crt
new file mode 100644 (file)
index 0000000..c1cce6e
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA3Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA3Cert.crt
new file mode 100644 (file)
index 0000000..cd65a82
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA3Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA4Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA4Cert.crt
new file mode 100644 (file)
index 0000000..f205db0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/onlySomeReasonsCA4Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0CACert.crt
new file mode 100644 (file)
index 0000000..ce9b90d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0SelfIssuedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0SelfIssuedCACert.crt
new file mode 100644 (file)
index 0000000..6e8f97c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0SelfIssuedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCA2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCA2Cert.crt
new file mode 100644 (file)
index 0000000..2fc8fb5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCA2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCACert.crt
new file mode 100644 (file)
index 0000000..b156179
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint0subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1CACert.crt
new file mode 100644 (file)
index 0000000..a424261
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedCACert.crt
new file mode 100644 (file)
index 0000000..87590c3
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedsubCACert.crt
new file mode 100644 (file)
index 0000000..f2c43ea
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1SelfIssuedsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1subCACert.crt
new file mode 100644 (file)
index 0000000..05a2bac
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint1subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6CACert.crt
new file mode 100644 (file)
index 0000000..c254a23
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA0Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA0Cert.crt
new file mode 100644 (file)
index 0000000..0a8c99d
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA0Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA1Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA1Cert.crt
new file mode 100644 (file)
index 0000000..bd68629
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA1Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA4Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA4Cert.crt
new file mode 100644 (file)
index 0000000..822a383
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subCA4Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA00Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA00Cert.crt
new file mode 100644 (file)
index 0000000..e2fd7ae
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA00Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA11Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA11Cert.crt
new file mode 100644 (file)
index 0000000..44c0162
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA11Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA41Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA41Cert.crt
new file mode 100644 (file)
index 0000000..284f4a9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubCA41Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA11XCert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA11XCert.crt
new file mode 100644 (file)
index 0000000..9766cf0
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA11XCert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA41XCert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA41XCert.crt
new file mode 100644 (file)
index 0000000..e147531
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pathLenConstraint6subsubsubCA41XCert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/pre2000CRLnextUpdateCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/pre2000CRLnextUpdateCACert.crt
new file mode 100644 (file)
index 0000000..30aff16
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/pre2000CRLnextUpdateCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0CACert.crt
new file mode 100644 (file)
index 0000000..16594b9
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subCACert.crt
new file mode 100644 (file)
index 0000000..b7a1518
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubCACert.crt
new file mode 100644 (file)
index 0000000..db57e9b
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubsubCACert.crt
new file mode 100644 (file)
index 0000000..4952094
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy0subsubsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10CACert.crt
new file mode 100644 (file)
index 0000000..3a54e7f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subCACert.crt
new file mode 100644 (file)
index 0000000..650a53f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubCACert.crt
new file mode 100644 (file)
index 0000000..139be53
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubsubCACert.crt
new file mode 100644 (file)
index 0000000..a7c216c
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy10subsubsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2CACert.crt
new file mode 100644 (file)
index 0000000..f7ca7ae
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedCACert.crt
new file mode 100644 (file)
index 0000000..9d16269
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt
new file mode 100644 (file)
index 0000000..b53bec1
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2subCACert.crt
new file mode 100644 (file)
index 0000000..36fc0d8
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy2subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4CACert.crt
new file mode 100644 (file)
index 0000000..723ae42
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subCACert.crt
new file mode 100644 (file)
index 0000000..1bd237f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubCACert.crt
new file mode 100644 (file)
index 0000000..1a37158
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubsubCACert.crt
new file mode 100644 (file)
index 0000000..3047d74
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy4subsubsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5CACert.crt
new file mode 100644 (file)
index 0000000..c6b69ad
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subCACert.crt
new file mode 100644 (file)
index 0000000..1695853
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubCACert.crt
new file mode 100644 (file)
index 0000000..093963a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubsubCACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubsubCACert.crt
new file mode 100644 (file)
index 0000000..58da176
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy5subsubsubCACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7CACert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7CACert.crt
new file mode 100644 (file)
index 0000000..aba4a7f
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7CACert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subCARE2Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subCARE2Cert.crt
new file mode 100644 (file)
index 0000000..c57e9e4
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subCARE2Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt
new file mode 100644 (file)
index 0000000..343efa5
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt
new file mode 100644 (file)
index 0000000..9a8e72a
Binary files /dev/null and b/src/crypto/x509/testdata/nist-pkits/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt differ
diff --git a/src/crypto/x509/testdata/nist-pkits/vectors.json b/src/crypto/x509/testdata/nist-pkits/vectors.json
new file mode 100644 (file)
index 0000000..5842b43
--- /dev/null
@@ -0,0 +1,5010 @@
+[
+    {
+        "Name": "4.1.1 Valid Signatures Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidCertificatePathTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.1.2 Invalid CA Signature Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BadSignedCACert.crt",
+            "InvalidCASignatureTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BadSignedCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.1.3 Invalid EE Signature Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "InvalidEESignatureTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.1.4 Valid DSA Signatures Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "DSACACert.crt",
+            "ValidDSASignaturesTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "DSACACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.1.5 Valid DSA Parameter Inheritance Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "DSACACert.crt",
+            "DSAParametersInheritedCACert.crt",
+            "ValidDSAParameterInheritanceTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "DSACACRL.crl",
+            "DSAParametersInheritedCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.1.6 Invalid DSA Signature Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "DSACACert.crt",
+            "InvalidDSASignatureTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "DSACACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.1 Invalid CA notBefore Date Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BadnotBeforeDateCACert.crt",
+            "InvalidCAnotBeforeDateTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BadnotBeforeDateCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.2 Invalid EE notBefore Date Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "InvalidEEnotBeforeDateTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.3 Valid pre2000 UTC notBefore Date Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "Validpre2000UTCnotBeforeDateTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.4 Valid GeneralizedTime notBefore Date Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidGeneralizedTimenotBeforeDateTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.5 Invalid CA notAfter Date Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BadnotAfterDateCACert.crt",
+            "InvalidCAnotAfterDateTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BadnotAfterDateCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.6 Invalid EE notAfter Date Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "InvalidEEnotAfterDateTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.7 Invalid pre2000 UTC EE notAfter Date Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "Invalidpre2000UTCEEnotAfterDateTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.2.8 Valid GeneralizedTime notAfter Date Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidGeneralizedTimenotAfterDateTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.1 Invalid Name Chaining EE Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "InvalidNameChainingTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.2 Invalid Name Chaining Order Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "NameOrderingCACert.crt",
+            "InvalidNameChainingOrderTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "NameOrderCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.3 Valid Name Chaining Whitespace Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidNameChainingWhitespaceTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.4 Valid Name Chaining Whitespace Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidNameChainingWhitespaceTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.5 Valid Name Chaining Capitalization Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidNameChainingCapitalizationTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.6 Valid Name Chaining UIDs Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UIDCACert.crt",
+            "ValidNameUIDsTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "UIDCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.7 Valid RFC3280 Mandatory Attribute Types Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "RFC3280MandatoryAttributeTypesCACert.crt",
+            "ValidRFC3280MandatoryAttributeTypesTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "RFC3280MandatoryAttributeTypesCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.8 Valid RFC3280 Optional Attribute Types Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "RFC3280OptionalAttributeTypesCACert.crt",
+            "ValidRFC3280OptionalAttributeTypesTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "RFC3280OptionalAttributeTypesCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.9 Valid UTF8String Encoded Names Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UTF8StringEncodedNamesCACert.crt",
+            "ValidUTF8StringEncodedNamesTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "UTF8StringEncodedNamesCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.10 Valid Rollover from PrintableString to UTF8String Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "RolloverfromPrintableStringtoUTF8StringCACert.crt",
+            "ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "RolloverfromPrintableStringtoUTF8StringCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.3.11 Valid UTF8String Case Insensitive Match Test11",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UTF8StringCaseInsensitiveMatchCACert.crt",
+            "ValidUTF8StringCaseInsensitiveMatchTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "UTF8StringCaseInsensitiveMatchCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.1 Missing CRL Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "NoCRLCACert.crt",
+            "InvalidMissingCRLTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.2 Invalid Revoked CA Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "RevokedsubCACert.crt",
+            "InvalidRevokedCATest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "RevokedsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.3 Invalid Revoked EE Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "InvalidRevokedEETest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.4 Invalid Bad CRL Signature Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BadCRLSignatureCACert.crt",
+            "InvalidBadCRLSignatureTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BadCRLSignatureCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.5 Invalid Bad CRL Issuer Name Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BadCRLIssuerNameCACert.crt",
+            "InvalidBadCRLIssuerNameTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BadCRLIssuerNameCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.6 Invalid Wrong CRL Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "WrongCRLCACert.crt",
+            "InvalidWrongCRLTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "WrongCRLCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.7 Valid Two CRLs Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "TwoCRLsCACert.crt",
+            "ValidTwoCRLsTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "TwoCRLsCAGoodCRL.crl",
+            "TwoCRLsCABadCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.8 Invalid Unknown CRL Entry Extension Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UnknownCRLEntryExtensionCACert.crt",
+            "InvalidUnknownCRLEntryExtensionTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "UnknownCRLEntryExtensionCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.9 Invalid Unknown CRL Extension Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UnknownCRLExtensionCACert.crt",
+            "InvalidUnknownCRLExtensionTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "UnknownCRLExtensionCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.10 Invalid Unknown CRL Extension Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UnknownCRLExtensionCACert.crt",
+            "InvalidUnknownCRLExtensionTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "UnknownCRLExtensionCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.11 Invalid Old CRL nextUpdate Test11",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "OldCRLnextUpdateCACert.crt",
+            "InvalidOldCRLnextUpdateTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "OldCRLnextUpdateCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.12 Invalid pre2000 CRL nextUpdate Test12",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pre2000CRLnextUpdateCACert.crt",
+            "Invalidpre2000CRLnextUpdateTest12EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pre2000CRLnextUpdateCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.13 Valid GeneralizedTime CRL nextUpdate Test13",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GeneralizedTimeCRLnextUpdateCACert.crt",
+            "ValidGeneralizedTimeCRLnextUpdateTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GeneralizedTimeCRLnextUpdateCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.14 Valid Negative Serial Number Test14",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "NegativeSerialNumberCACert.crt",
+            "ValidNegativeSerialNumberTest14EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "NegativeSerialNumberCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.15 Invalid Negative Serial Number Test15",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "NegativeSerialNumberCACert.crt",
+            "InvalidNegativeSerialNumberTest15EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "NegativeSerialNumberCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.16 Valid Long Serial Number Test16",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "LongSerialNumberCACert.crt",
+            "ValidLongSerialNumberTest16EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "LongSerialNumberCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.17 Valid Long Serial Number Test17",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "LongSerialNumberCACert.crt",
+            "ValidLongSerialNumberTest17EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "LongSerialNumberCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.18 Invalid Long Serial Number Test18",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "LongSerialNumberCACert.crt",
+            "InvalidLongSerialNumberTest18EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "LongSerialNumberCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.19 Valid Separate Certificate and CRL Keys Test19",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "SeparateCertificateandCRLKeysCertificateSigningCACert.crt",
+            "SeparateCertificateandCRLKeysCRLSigningCert.crt",
+            "ValidSeparateCertificateandCRLKeysTest19EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "SeparateCertificateandCRLKeysCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.20 Invalid Separate Certificate and CRL Keys Test20",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "SeparateCertificateandCRLKeysCertificateSigningCACert.crt",
+            "SeparateCertificateandCRLKeysCRLSigningCert.crt",
+            "InvalidSeparateCertificateandCRLKeysTest20EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "SeparateCertificateandCRLKeysCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.4.21 Invalid Separate Certificate and CRL Keys Test21",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt",
+            "SeparateCertificateandCRLKeysCA2CRLSigningCert.crt",
+            "InvalidSeparateCertificateandCRLKeysTest21EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "SeparateCertificateandCRLKeysCA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.1 Valid Basic Self-Issued Old With New Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedNewKeyCACert.crt",
+            "BasicSelfIssuedNewKeyOldWithNewCACert.crt",
+            "ValidBasicSelfIssuedOldWithNewTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedNewKeyCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.2 Invalid Basic Self-Issued Old With New Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedNewKeyCACert.crt",
+            "BasicSelfIssuedNewKeyOldWithNewCACert.crt",
+            "InvalidBasicSelfIssuedOldWithNewTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedNewKeyCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.3 Valid Basic Self-Issued New With Old Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedOldKeyCACert.crt",
+            "BasicSelfIssuedOldKeyNewWithOldCACert.crt",
+            "ValidBasicSelfIssuedNewWithOldTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedOldKeySelfIssuedCertCRL.crl",
+            "BasicSelfIssuedOldKeyCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.4 Valid Basic Self-Issued New With Old Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedOldKeyCACert.crt",
+            "BasicSelfIssuedOldKeyNewWithOldCACert.crt",
+            "ValidBasicSelfIssuedNewWithOldTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedOldKeySelfIssuedCertCRL.crl",
+            "BasicSelfIssuedOldKeyCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.5 Invalid Basic Self-Issued New With Old Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedOldKeyCACert.crt",
+            "BasicSelfIssuedOldKeyNewWithOldCACert.crt",
+            "InvalidBasicSelfIssuedNewWithOldTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedOldKeySelfIssuedCertCRL.crl",
+            "BasicSelfIssuedOldKeyCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.6 Valid Basic Self-Issued CRL Signing Key Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedCRLSigningKeyCACert.crt",
+            "BasicSelfIssuedCRLSigningKeyCRLCert.crt",
+            "ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl",
+            "BasicSelfIssuedCRLSigningKeyCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedCRLSigningKeyCACert.crt",
+            "BasicSelfIssuedCRLSigningKeyCRLCert.crt",
+            "InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl",
+            "BasicSelfIssuedCRLSigningKeyCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "BasicSelfIssuedCRLSigningKeyCACert.crt",
+            "BasicSelfIssuedCRLSigningKeyCRLCert.crt",
+            "InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl",
+            "BasicSelfIssuedCRLSigningKeyCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.1 Invalid Missing basicConstraints Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "MissingbasicConstraintsCACert.crt",
+            "InvalidMissingbasicConstraintsTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "MissingbasicConstraintsCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.2 Invalid cA False Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "basicConstraintsCriticalcAFalseCACert.crt",
+            "InvalidcAFalseTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "basicConstraintsCriticalcAFalseCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.3 Invalid cA False Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "basicConstraintsNotCriticalcAFalseCACert.crt",
+            "InvalidcAFalseTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "basicConstraintsNotCriticalcAFalseCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.4 Valid basicConstraints Not Critical Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "basicConstraintsNotCriticalCACert.crt",
+            "ValidbasicConstraintsNotCriticalTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "basicConstraintsNotCriticalCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.5 Invalid pathLenConstraint Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint0CACert.crt",
+            "pathLenConstraint0subCACert.crt",
+            "InvalidpathLenConstraintTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint0CACRL.crl",
+            "pathLenConstraint0subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.6 Invalid pathLenConstraint Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint0CACert.crt",
+            "pathLenConstraint0subCACert.crt",
+            "InvalidpathLenConstraintTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint0CACRL.crl",
+            "pathLenConstraint0subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.7 Valid pathLenConstraint Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint0CACert.crt",
+            "ValidpathLenConstraintTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint0CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.8 Valid pathLenConstraint Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint0CACert.crt",
+            "ValidpathLenConstraintTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint0CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.9 Invalid pathLenConstraint Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint6CACert.crt",
+            "pathLenConstraint6subCA0Cert.crt",
+            "pathLenConstraint6subsubCA00Cert.crt",
+            "InvalidpathLenConstraintTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint6CACRL.crl",
+            "pathLenConstraint6subCA0CRL.crl",
+            "pathLenConstraint6subsubCA00CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.10 Invalid pathLenConstraint Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint6CACert.crt",
+            "pathLenConstraint6subCA0Cert.crt",
+            "pathLenConstraint6subsubCA00Cert.crt",
+            "InvalidpathLenConstraintTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint6CACRL.crl",
+            "pathLenConstraint6subCA0CRL.crl",
+            "pathLenConstraint6subsubCA00CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.11 Invalid pathLenConstraint Test11",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint6CACert.crt",
+            "pathLenConstraint6subCA1Cert.crt",
+            "pathLenConstraint6subsubCA11Cert.crt",
+            "pathLenConstraint6subsubsubCA11XCert.crt",
+            "InvalidpathLenConstraintTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint6CACRL.crl",
+            "pathLenConstraint6subCA1CRL.crl",
+            "pathLenConstraint6subsubCA11CRL.crl",
+            "pathLenConstraint6subsubsubCA11XCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.12 Invalid pathLenConstraint Test12",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint6CACert.crt",
+            "pathLenConstraint6subCA1Cert.crt",
+            "pathLenConstraint6subsubCA11Cert.crt",
+            "pathLenConstraint6subsubsubCA11XCert.crt",
+            "InvalidpathLenConstraintTest12EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint6CACRL.crl",
+            "pathLenConstraint6subCA1CRL.crl",
+            "pathLenConstraint6subsubCA11CRL.crl",
+            "pathLenConstraint6subsubsubCA11XCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.13 Valid pathLenConstraint Test13",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint6CACert.crt",
+            "pathLenConstraint6subCA4Cert.crt",
+            "pathLenConstraint6subsubCA41Cert.crt",
+            "pathLenConstraint6subsubsubCA41XCert.crt",
+            "ValidpathLenConstraintTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint6CACRL.crl",
+            "pathLenConstraint6subCA4CRL.crl",
+            "pathLenConstraint6subsubCA41CRL.crl",
+            "pathLenConstraint6subsubsubCA41XCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.14 Valid pathLenConstraint Test14",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint6CACert.crt",
+            "pathLenConstraint6subCA4Cert.crt",
+            "pathLenConstraint6subsubCA41Cert.crt",
+            "pathLenConstraint6subsubsubCA41XCert.crt",
+            "ValidpathLenConstraintTest14EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint6CACRL.crl",
+            "pathLenConstraint6subCA4CRL.crl",
+            "pathLenConstraint6subsubCA41CRL.crl",
+            "pathLenConstraint6subsubsubCA41XCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.15 Valid Self-Issued pathLenConstraint Test15",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint0CACert.crt",
+            "pathLenConstraint0SelfIssuedCACert.crt",
+            "ValidSelfIssuedpathLenConstraintTest15EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint0CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.16 Invalid Self-Issued pathLenConstraint Test16",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint0CACert.crt",
+            "pathLenConstraint0SelfIssuedCACert.crt",
+            "pathLenConstraint0subCA2Cert.crt",
+            "InvalidSelfIssuedpathLenConstraintTest16EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint0CACRL.crl",
+            "pathLenConstraint0subCA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.6.17 Valid Self-Issued pathLenConstraint Test17",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "pathLenConstraint1CACert.crt",
+            "pathLenConstraint1SelfIssuedCACert.crt",
+            "pathLenConstraint1subCACert.crt",
+            "pathLenConstraint1SelfIssuedsubCACert.crt",
+            "ValidSelfIssuedpathLenConstraintTest17EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "pathLenConstraint1CACRL.crl",
+            "pathLenConstraint1subCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.7.1 Invalid keyUsage Critical keyCertSign False Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "keyUsageCriticalkeyCertSignFalseCACert.crt",
+            "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "keyUsageCriticalkeyCertSignFalseCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "keyUsageNotCriticalkeyCertSignFalseCACert.crt",
+            "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "keyUsageNotCriticalkeyCertSignFalseCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.7.3 Valid keyUsage Not Critical Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "keyUsageNotCriticalCACert.crt",
+            "ValidkeyUsageNotCriticalTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "keyUsageNotCriticalCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.7.4 Invalid keyUsage Critical cRLSign False Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "keyUsageCriticalcRLSignFalseCACert.crt",
+            "InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "keyUsageCriticalcRLSignFalseCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.7.5 Invalid keyUsage Not Critical cRLSign False Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "keyUsageNotCriticalcRLSignFalseCACert.crt",
+            "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "keyUsageNotCriticalcRLSignFalseCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.1 All Certificates Same Policy Test1 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidCertificatePathTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.1 All Certificates Same Policy Test1 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidCertificatePathTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.1 All Certificates Same Policy Test1 (Subpart 3)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidCertificatePathTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.1 All Certificates Same Policy Test1 (Subpart 4)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "ValidCertificatePathTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1",
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.2 All Certificates No Policies Test2 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "NoPoliciesCACert.crt",
+            "AllCertificatesNoPoliciesTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "NoPoliciesCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.2 All Certificates No Policies Test2 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "NoPoliciesCACert.crt",
+            "AllCertificatesNoPoliciesTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "NoPoliciesCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.3 Different Policies Test3 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "PoliciesP2subCACert.crt",
+            "DifferentPoliciesTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "PoliciesP2subCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.3 Different Policies Test3 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "PoliciesP2subCACert.crt",
+            "DifferentPoliciesTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "PoliciesP2subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.3 Different Policies Test3 (Subpart 3)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "PoliciesP2subCACert.crt",
+            "DifferentPoliciesTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "PoliciesP2subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-1",
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.4 Different Policies Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "GoodsubCACert.crt",
+            "DifferentPoliciesTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "GoodsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.5 Different Policies Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "PoliciesP2subCA2Cert.crt",
+            "DifferentPoliciesTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "PoliciesP2subCA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.6 Overlapping Policies Test6 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP1234CACert.crt",
+            "PoliciesP1234subCAP123Cert.crt",
+            "PoliciesP1234subsubCAP123P12Cert.crt",
+            "OverlappingPoliciesTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP1234CACRL.crl",
+            "PoliciesP1234subCAP123CRL.crl",
+            "PoliciesP1234subsubCAP123P12CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.6 Overlapping Policies Test6 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP1234CACert.crt",
+            "PoliciesP1234subCAP123Cert.crt",
+            "PoliciesP1234subsubCAP123P12Cert.crt",
+            "OverlappingPoliciesTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP1234CACRL.crl",
+            "PoliciesP1234subCAP123CRL.crl",
+            "PoliciesP1234subsubCAP123P12CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.6 Overlapping Policies Test6 (Subpart 3)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP1234CACert.crt",
+            "PoliciesP1234subCAP123Cert.crt",
+            "PoliciesP1234subsubCAP123P12Cert.crt",
+            "OverlappingPoliciesTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP1234CACRL.crl",
+            "PoliciesP1234subCAP123CRL.crl",
+            "PoliciesP1234subsubCAP123P12CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.7 Different Policies Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP123CACert.crt",
+            "PoliciesP123subCAP12Cert.crt",
+            "PoliciesP123subsubCAP12P1Cert.crt",
+            "DifferentPoliciesTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP123CACRL.crl",
+            "PoliciesP123subCAP12CRL.crl",
+            "PoliciesP123subsubCAP12P1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.8 Different Policies Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP12CACert.crt",
+            "PoliciesP12subCAP1Cert.crt",
+            "PoliciesP12subsubCAP1P2Cert.crt",
+            "DifferentPoliciesTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP12CACRL.crl",
+            "PoliciesP12subCAP1CRL.crl",
+            "PoliciesP12subsubCAP1P2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.9 Different Policies Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP123CACert.crt",
+            "PoliciesP123subCAP12Cert.crt",
+            "PoliciesP123subsubCAP12P2Cert.crt",
+            "PoliciesP123subsubsubCAP12P2P1Cert.crt",
+            "DifferentPoliciesTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP123CACRL.crl",
+            "PoliciesP123subCAP12CRL.crl",
+            "PoliciesP123subsubCAP2P2CRL.crl",
+            "PoliciesP123subsubsubCAP12P2P1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.10 All Certificates Same Policies Test10 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP12CACert.crt",
+            "AllCertificatesSamePoliciesTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP12CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.10 All Certificates Same Policies Test10 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP12CACert.crt",
+            "AllCertificatesSamePoliciesTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP12CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.10 All Certificates Same Policies Test10 (Subpart 3)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP12CACert.crt",
+            "AllCertificatesSamePoliciesTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP12CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.11 All Certificates AnyPolicy Test11 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "anyPolicyCACert.crt",
+            "AllCertificatesanyPolicyTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "anyPolicyCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.11 All Certificates AnyPolicy Test11 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "anyPolicyCACert.crt",
+            "AllCertificatesanyPolicyTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "anyPolicyCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.12 Different Policies Test12",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP3CACert.crt",
+            "DifferentPoliciesTest12EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP3CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.13 All Certificates Same Policies Test13 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP123CACert.crt",
+            "AllCertificatesSamePoliciesTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP123CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.13 All Certificates Same Policies Test13 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP123CACert.crt",
+            "AllCertificatesSamePoliciesTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP123CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.13 All Certificates Same Policies Test13 (Subpart 3)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP123CACert.crt",
+            "AllCertificatesSamePoliciesTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP123CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-3"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.14 AnyPolicy Test14 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "anyPolicyCACert.crt",
+            "AnyPolicyTest14EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "anyPolicyCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.14 AnyPolicy Test14 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "anyPolicyCACert.crt",
+            "AnyPolicyTest14EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "anyPolicyCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.15 User Notice Qualifier Test15",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UserNoticeQualifierTest15EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.16 User Notice Qualifier Test16",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "UserNoticeQualifierTest16EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.17 User Notice Qualifier Test17",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "UserNoticeQualifierTest17EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.18 User Notice Qualifier Test18 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP12CACert.crt",
+            "UserNoticeQualifierTest18EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP12CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.18 User Notice Qualifier Test18 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PoliciesP12CACert.crt",
+            "UserNoticeQualifierTest18EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PoliciesP12CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.19 User Notice Qualifier Test19",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "UserNoticeQualifierTest19EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.8.20 CPS Pointer Qualifier Test20",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "CPSPointerQualifierTest20EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": true,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.1 Valid RequireExplicitPolicy Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy10CACert.crt",
+            "requireExplicitPolicy10subCACert.crt",
+            "requireExplicitPolicy10subsubCACert.crt",
+            "requireExplicitPolicy10subsubsubCACert.crt",
+            "ValidrequireExplicitPolicyTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy10CACRL.crl",
+            "requireExplicitPolicy10subCACRL.crl",
+            "requireExplicitPolicy10subsubCACRL.crl",
+            "requireExplicitPolicy10subsubsubCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.2 Valid RequireExplicitPolicy Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy5CACert.crt",
+            "requireExplicitPolicy5subCACert.crt",
+            "requireExplicitPolicy5subsubCACert.crt",
+            "requireExplicitPolicy5subsubsubCACert.crt",
+            "ValidrequireExplicitPolicyTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy5CACRL.crl",
+            "requireExplicitPolicy5subCACRL.crl",
+            "requireExplicitPolicy5subsubCACRL.crl",
+            "requireExplicitPolicy5subsubsubCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.3 Invalid RequireExplicitPolicy Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy4CACert.crt",
+            "requireExplicitPolicy4subCACert.crt",
+            "requireExplicitPolicy4subsubCACert.crt",
+            "requireExplicitPolicy4subsubsubCACert.crt",
+            "InvalidrequireExplicitPolicyTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy4CACRL.crl",
+            "requireExplicitPolicy4subCACRL.crl",
+            "requireExplicitPolicy4subsubCACRL.crl",
+            "requireExplicitPolicy4subsubsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.4 Valid RequireExplicitPolicy Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy0CACert.crt",
+            "requireExplicitPolicy0subCACert.crt",
+            "requireExplicitPolicy0subsubCACert.crt",
+            "requireExplicitPolicy0subsubsubCACert.crt",
+            "ValidrequireExplicitPolicyTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy0CACRL.crl",
+            "requireExplicitPolicy0subCACRL.crl",
+            "requireExplicitPolicy0subsubCACRL.crl",
+            "requireExplicitPolicy0subsubsubCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.5 Invalid RequireExplicitPolicy Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy7CACert.crt",
+            "requireExplicitPolicy7subCARE2Cert.crt",
+            "requireExplicitPolicy7subsubCARE2RE4Cert.crt",
+            "requireExplicitPolicy7subsubsubCARE2RE4Cert.crt",
+            "InvalidrequireExplicitPolicyTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy7CACRL.crl",
+            "requireExplicitPolicy7subCARE2CRL.crl",
+            "requireExplicitPolicy7subsubCARE2RE4CRL.crl",
+            "requireExplicitPolicy7subsubsubCARE2RE4CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.6 Valid Self-Issued requireExplicitPolicy Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy2CACert.crt",
+            "requireExplicitPolicy2SelfIssuedCACert.crt",
+            "ValidSelfIssuedrequireExplicitPolicyTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.7 Invalid Self-Issued requireExplicitPolicy Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy2CACert.crt",
+            "requireExplicitPolicy2SelfIssuedCACert.crt",
+            "requireExplicitPolicy2subCACert.crt",
+            "InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy2CACRL.crl",
+            "requireExplicitPolicy2subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.9.8 Invalid Self-Issued requireExplicitPolicy Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "requireExplicitPolicy2CACert.crt",
+            "requireExplicitPolicy2SelfIssuedCACert.crt",
+            "requireExplicitPolicy2subCACert.crt",
+            "requireExplicitPolicy2SelfIssuedsubCACert.crt",
+            "InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "requireExplicitPolicy2CACRL.crl",
+            "requireExplicitPolicy2subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.1.1 Valid Policy Mapping Test1 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "Mapping1to2CACert.crt",
+            "ValidPolicyMappingTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "Mapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.1.2 Valid Policy Mapping Test1 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "Mapping1to2CACert.crt",
+            "ValidPolicyMappingTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "Mapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.1.3 Valid Policy Mapping Test1 (Subpart 3)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "Mapping1to2CACert.crt",
+            "ValidPolicyMappingTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "Mapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": true,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.2 Invalid Policy Mapping Test2 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "Mapping1to2CACert.crt",
+            "InvalidPolicyMappingTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "Mapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.2 Invalid Policy Mapping Test2 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "Mapping1to2CACert.crt",
+            "InvalidPolicyMappingTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "Mapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": true,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.3 Valid Policy Mapping Test3 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P12Mapping1to3CACert.crt",
+            "P12Mapping1to3subCACert.crt",
+            "P12Mapping1to3subsubCACert.crt",
+            "ValidPolicyMappingTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P12Mapping1to3CACRL.crl",
+            "P12Mapping1to3subCACRL.crl",
+            "P12Mapping1to3subsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.3 Valid Policy Mapping Test3 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P12Mapping1to3CACert.crt",
+            "P12Mapping1to3subCACert.crt",
+            "P12Mapping1to3subsubCACert.crt",
+            "ValidPolicyMappingTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P12Mapping1to3CACRL.crl",
+            "P12Mapping1to3subCACRL.crl",
+            "P12Mapping1to3subsubCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.4 Invalid Policy Mapping Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P12Mapping1to3CACert.crt",
+            "P12Mapping1to3subCACert.crt",
+            "P12Mapping1to3subsubCACert.crt",
+            "InvalidPolicyMappingTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P12Mapping1to3CACRL.crl",
+            "P12Mapping1to3subCACRL.crl",
+            "P12Mapping1to3subsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.5 Valid Policy Mapping Test5 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1Mapping1to234CACert.crt",
+            "P1Mapping1to234subCACert.crt",
+            "ValidPolicyMappingTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1Mapping1to234CACRL.crl",
+            "P1Mapping1to234subCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.5 Valid Policy Mapping Test5 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1Mapping1to234CACert.crt",
+            "P1Mapping1to234subCACert.crt",
+            "ValidPolicyMappingTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1Mapping1to234CACRL.crl",
+            "P1Mapping1to234subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-6"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.6 Valid Policy Mapping Test6 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1Mapping1to234CACert.crt",
+            "P1Mapping1to234subCACert.crt",
+            "ValidPolicyMappingTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1Mapping1to234CACRL.crl",
+            "P1Mapping1to234subCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.6 Valid Policy Mapping Test6 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1Mapping1to234CACert.crt",
+            "P1Mapping1to234subCACert.crt",
+            "ValidPolicyMappingTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1Mapping1to234CACRL.crl",
+            "P1Mapping1to234subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-6"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.7 Invalid Mapping From anyPolicy Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "MappingFromanyPolicyCACert.crt",
+            "InvalidMappingFromanyPolicyTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "MappingFromanyPolicyCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.8 Invalid Mapping To anyPolicy Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "MappingToanyPolicyCACert.crt",
+            "InvalidMappingToanyPolicyTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "MappingToanyPolicyCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.9 Valid Policy Mapping Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "PanyPolicyMapping1to2CACert.crt",
+            "ValidPolicyMappingTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "PanyPolicyMapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.10 Invalid Policy Mapping Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "GoodsubCAPanyPolicyMapping1to2CACert.crt",
+            "InvalidPolicyMappingTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "GoodsubCAPanyPolicyMapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.11 Valid Policy Mapping Test11",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "GoodCACert.crt",
+            "GoodsubCAPanyPolicyMapping1to2CACert.crt",
+            "ValidPolicyMappingTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl",
+            "GoodsubCAPanyPolicyMapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.12 Valid Policy Mapping Test12 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P12Mapping1to3CACert.crt",
+            "ValidPolicyMappingTest12EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P12Mapping1to3CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.12 Valid Policy Mapping Test12 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P12Mapping1to3CACert.crt",
+            "ValidPolicyMappingTest12EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P12Mapping1to3CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.13 Valid Policy Mapping Test13 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1anyPolicyMapping1to2CACert.crt",
+            "ValidPolicyMappingTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1anyPolicyMapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.13 Valid Policy Mapping Test13 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1anyPolicyMapping1to2CACert.crt",
+            "ValidPolicyMappingTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1anyPolicyMapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "NIST-test-policy-1",
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.13 Valid Policy Mapping Test13 (Subpart 3)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1anyPolicyMapping1to2CACert.crt",
+            "ValidPolicyMappingTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1anyPolicyMapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "NIST-test-policy-2"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.10.14 Valid Policy Mapping Test14",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "P1anyPolicyMapping1to2CACert.crt",
+            "ValidPolicyMappingTest14EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "P1anyPolicyMapping1to2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.1 Invalid inhibitPolicyMapping Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping0CACert.crt",
+            "inhibitPolicyMapping0subCACert.crt",
+            "InvalidinhibitPolicyMappingTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping0CACRL.crl",
+            "inhibitPolicyMapping0subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.2 Valid inhibitPolicyMapping Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P12CACert.crt",
+            "inhibitPolicyMapping1P12subCACert.crt",
+            "ValidinhibitPolicyMappingTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P12CACRL.crl",
+            "inhibitPolicyMapping1P12subCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.3 Invalid inhibitPolicyMapping Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P12CACert.crt",
+            "inhibitPolicyMapping1P12subCACert.crt",
+            "inhibitPolicyMapping1P12subsubCACert.crt",
+            "InvalidinhibitPolicyMappingTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P12CACRL.crl",
+            "inhibitPolicyMapping1P12subCACRL.crl",
+            "inhibitPolicyMapping1P12subsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.4 Valid inhibitPolicyMapping Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P12CACert.crt",
+            "inhibitPolicyMapping1P12subCACert.crt",
+            "inhibitPolicyMapping1P12subsubCACert.crt",
+            "ValidinhibitPolicyMappingTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P12CACRL.crl",
+            "inhibitPolicyMapping1P12subCACRL.crl",
+            "inhibitPolicyMapping1P12subsubCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.5 Invalid inhibitPolicyMapping Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping5CACert.crt",
+            "inhibitPolicyMapping5subCACert.crt",
+            "inhibitPolicyMapping5subsubCACert.crt",
+            "inhibitPolicyMapping5subsubsubCACert.crt",
+            "InvalidinhibitPolicyMappingTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping5CACRL.crl",
+            "inhibitPolicyMapping5subCACRL.crl",
+            "inhibitPolicyMapping5subsubCACRL.crl",
+            "inhibitPolicyMapping5subsubsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.6 Invalid inhibitPolicyMapping Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P12CACert.crt",
+            "inhibitPolicyMapping1P12subCAIPM5Cert.crt",
+            "inhibitPolicyMapping1P12subsubCAIPM5Cert.crt",
+            "InvalidinhibitPolicyMappingTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P12CACRL.crl",
+            "inhibitPolicyMapping1P12subCAIPM5CRL.crl",
+            "inhibitPolicyMapping1P12subsubCAIPM5CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.7 Valid Self-Issued inhibitPolicyMapping Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P1CACert.crt",
+            "inhibitPolicyMapping1P1SelfIssuedCACert.crt",
+            "inhibitPolicyMapping1P1subCACert.crt",
+            "ValidSelfIssuedinhibitPolicyMappingTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P1CACRL.crl",
+            "inhibitPolicyMapping1P1subCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P1CACert.crt",
+            "inhibitPolicyMapping1P1SelfIssuedCACert.crt",
+            "inhibitPolicyMapping1P1subCACert.crt",
+            "inhibitPolicyMapping1P1subsubCACert.crt",
+            "InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P1CACRL.crl",
+            "inhibitPolicyMapping1P1subCACRL.crl",
+            "inhibitPolicyMapping1P1subsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P1CACert.crt",
+            "inhibitPolicyMapping1P1SelfIssuedCACert.crt",
+            "inhibitPolicyMapping1P1subCACert.crt",
+            "inhibitPolicyMapping1P1subsubCACert.crt",
+            "InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P1CACRL.crl",
+            "inhibitPolicyMapping1P1subCACRL.crl",
+            "inhibitPolicyMapping1P1subsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P1CACert.crt",
+            "inhibitPolicyMapping1P1SelfIssuedCACert.crt",
+            "inhibitPolicyMapping1P1subCACert.crt",
+            "inhibitPolicyMapping1P1SelfIssuedsubCACert.crt",
+            "InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P1CACRL.crl",
+            "inhibitPolicyMapping1P1subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitPolicyMapping1P1CACert.crt",
+            "inhibitPolicyMapping1P1SelfIssuedCACert.crt",
+            "inhibitPolicyMapping1P1subCACert.crt",
+            "inhibitPolicyMapping1P1SelfIssuedsubCACert.crt",
+            "InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitPolicyMapping1P1CACRL.crl",
+            "inhibitPolicyMapping1P1subCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.1 Invalid inhibitAnyPolicy Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy0CACert.crt",
+            "InvalidinhibitAnyPolicyTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy0CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.2 Valid inhibitAnyPolicy Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy0CACert.crt",
+            "ValidinhibitAnyPolicyTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy0CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.3 inhibitAnyPolicy Test3 (Subpart 1)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1subCA1Cert.crt",
+            "inhibitAnyPolicyTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCA1CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.3 inhibitAnyPolicy Test3 (Subpart 2)",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1subCA1Cert.crt",
+            "inhibitAnyPolicyTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": true
+    },
+    {
+        "Name": "4.12.4 Invalid inhibitAnyPolicy Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1subCA1Cert.crt",
+            "InvalidinhibitAnyPolicyTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.5 Invalid inhibitAnyPolicy Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy5CACert.crt",
+            "inhibitAnyPolicy5subCACert.crt",
+            "inhibitAnyPolicy5subsubCACert.crt",
+            "InvalidinhibitAnyPolicyTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy5CACRL.crl",
+            "inhibitAnyPolicy5subCACRL.crl",
+            "inhibitAnyPolicy5subsubCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.6 Invalid inhibitAnyPolicy Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1subCAIAP5Cert.crt",
+            "InvalidinhibitAnyPolicyTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCAIAP5CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.7 Valid Self-Issued inhibitAnyPolicy Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1SelfIssuedCACert.crt",
+            "inhibitAnyPolicy1subCA2Cert.crt",
+            "ValidSelfIssuedinhibitAnyPolicyTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCA2CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1SelfIssuedCACert.crt",
+            "inhibitAnyPolicy1subCA2Cert.crt",
+            "inhibitAnyPolicy1subsubCA2Cert.crt",
+            "InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCA2CRL.crl",
+            "inhibitAnyPolicy1subsubCA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.9 Valid Self-Issued inhibitAnyPolicy Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1SelfIssuedCACert.crt",
+            "inhibitAnyPolicy1subCA2Cert.crt",
+            "inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt",
+            "ValidSelfIssuedinhibitAnyPolicyTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCA2CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "inhibitAnyPolicy1CACert.crt",
+            "inhibitAnyPolicy1SelfIssuedCACert.crt",
+            "inhibitAnyPolicy1subCA2Cert.crt",
+            "InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "inhibitAnyPolicy1CACRL.crl",
+            "inhibitAnyPolicy1subCA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.1 Valid DN nameConstraints Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "ValidDNnameConstraintsTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.2 Invalid DN nameConstraints Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "InvalidDNnameConstraintsTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.3 Invalid DN nameConstraints Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "InvalidDNnameConstraintsTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.4 Valid DN nameConstraints Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "ValidDNnameConstraintsTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.5 Valid DN nameConstraints Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN2CACert.crt",
+            "ValidDNnameConstraintsTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.6 Valid DN nameConstraints Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN3CACert.crt",
+            "ValidDNnameConstraintsTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN3CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.7 Invalid DN nameConstraints Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN3CACert.crt",
+            "InvalidDNnameConstraintsTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN3CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.8 Invalid DN nameConstraints Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN4CACert.crt",
+            "InvalidDNnameConstraintsTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN4CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.9 Invalid DN nameConstraints Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN4CACert.crt",
+            "InvalidDNnameConstraintsTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN4CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.10 Invalid DN nameConstraints Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN5CACert.crt",
+            "InvalidDNnameConstraintsTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN5CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.11 Valid DN nameConstraints Test11",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN5CACert.crt",
+            "ValidDNnameConstraintsTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN5CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.12 Invalid DN nameConstraints Test12",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "nameConstraintsDN1subCA1Cert.crt",
+            "InvalidDNnameConstraintsTest12EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl",
+            "nameConstraintsDN1subCA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.13 Invalid DN nameConstraints Test13",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "nameConstraintsDN1subCA2Cert.crt",
+            "InvalidDNnameConstraintsTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl",
+            "nameConstraintsDN1subCA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.14 Valid DN nameConstraints Test14",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "nameConstraintsDN1subCA2Cert.crt",
+            "ValidDNnameConstraintsTest14EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl",
+            "nameConstraintsDN1subCA2CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.15 Invalid DN nameConstraints Test15",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN3CACert.crt",
+            "nameConstraintsDN3subCA1Cert.crt",
+            "InvalidDNnameConstraintsTest15EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN3CACRL.crl",
+            "nameConstraintsDN3subCA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.16 Invalid DN nameConstraints Test16",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN3CACert.crt",
+            "nameConstraintsDN3subCA1Cert.crt",
+            "InvalidDNnameConstraintsTest16EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN3CACRL.crl",
+            "nameConstraintsDN3subCA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.17 Invalid DN nameConstraints Test17",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN3CACert.crt",
+            "nameConstraintsDN3subCA2Cert.crt",
+            "InvalidDNnameConstraintsTest17EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN3CACRL.crl",
+            "nameConstraintsDN3subCA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.18 Valid DN nameConstraints Test18",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN3CACert.crt",
+            "nameConstraintsDN3subCA2Cert.crt",
+            "ValidDNnameConstraintsTest18EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN3CACRL.crl",
+            "nameConstraintsDN3subCA2CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.19 Valid Self-Issued DN nameConstraints Test19",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "nameConstraintsDN1SelfIssuedCACert.crt",
+            "ValidDNnameConstraintsTest19EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.20 Invalid Self-Issued DN nameConstraints Test20",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "InvalidDNnameConstraintsTest20EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.21 Valid RFC822 nameConstraints Test21",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsRFC822CA1Cert.crt",
+            "ValidRFC822nameConstraintsTest21EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsRFC822CA1CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.22 Invalid RFC822 nameConstraints Test22",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsRFC822CA1Cert.crt",
+            "InvalidRFC822nameConstraintsTest22EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsRFC822CA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.23 Valid RFC822 nameConstraints Test23",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsRFC822CA2Cert.crt",
+            "ValidRFC822nameConstraintsTest23EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsRFC822CA2CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.24 Invalid RFC822 nameConstraints Test24",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsRFC822CA2Cert.crt",
+            "InvalidRFC822nameConstraintsTest24EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsRFC822CA2CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.25 Valid RFC822 nameConstraints Test25",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsRFC822CA3Cert.crt",
+            "ValidRFC822nameConstraintsTest25EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsRFC822CA3CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.26 Invalid RFC822 nameConstraints Test26",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsRFC822CA3Cert.crt",
+            "InvalidRFC822nameConstraintsTest26EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsRFC822CA3CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.27 Valid DN and RFC822 nameConstraints Test27",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "nameConstraintsDN1subCA3Cert.crt",
+            "ValidDNandRFC822nameConstraintsTest27EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl",
+            "nameConstraintsDN1subCA3CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.28 Invalid DN and RFC822 nameConstraints Test28",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "nameConstraintsDN1subCA3Cert.crt",
+            "InvalidDNandRFC822nameConstraintsTest28EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl",
+            "nameConstraintsDN1subCA3CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.29 Invalid DN and RFC822 nameConstraints Test29",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDN1CACert.crt",
+            "nameConstraintsDN1subCA3Cert.crt",
+            "InvalidDNandRFC822nameConstraintsTest29EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDN1CACRL.crl",
+            "nameConstraintsDN1subCA3CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.30 Valid DNS nameConstraints Test30",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDNS1CACert.crt",
+            "ValidDNSnameConstraintsTest30EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDNS1CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.31 Invalid DNS nameConstraints Test31",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDNS1CACert.crt",
+            "InvalidDNSnameConstraintsTest31EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDNS1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.32 Valid DNS nameConstraints Test32",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDNS2CACert.crt",
+            "ValidDNSnameConstraintsTest32EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDNS2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.33 Invalid DNS nameConstraints Test33",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDNS2CACert.crt",
+            "InvalidDNSnameConstraintsTest33EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDNS2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.34 Valid URI nameConstraints Test34",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsURI1CACert.crt",
+            "ValidURInameConstraintsTest34EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsURI1CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.35 Invalid URI nameConstraints Test35",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsURI1CACert.crt",
+            "InvalidURInameConstraintsTest35EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsURI1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.36 Valid URI nameConstraints Test36",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsURI2CACert.crt",
+            "ValidURInameConstraintsTest36EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsURI2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.37 Invalid URI nameConstraints Test37",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsURI2CACert.crt",
+            "InvalidURInameConstraintsTest37EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsURI2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.13.38 Invalid DNS nameConstraints Test38",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "nameConstraintsDNS1CACert.crt",
+            "InvalidDNSnameConstraintsTest38EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "nameConstraintsDNS1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.1 Valid distributionPoint Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint1CACert.crt",
+            "ValiddistributionPointTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint1CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.2 Invalid distributionPoint Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint1CACert.crt",
+            "InvaliddistributionPointTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.3 Invalid distributionPoint Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint1CACert.crt",
+            "InvaliddistributionPointTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint1CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.4 Valid distributionPoint Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint1CACert.crt",
+            "ValiddistributionPointTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint1CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.5 Valid distributionPoint Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint2CACert.crt",
+            "ValiddistributionPointTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.6 Invalid distributionPoint Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint2CACert.crt",
+            "InvaliddistributionPointTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.7 Valid distributionPoint Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint2CACert.crt",
+            "ValiddistributionPointTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint2CACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.8 Invalid distributionPoint Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint2CACert.crt",
+            "InvaliddistributionPointTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.9 Invalid distributionPoint Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "distributionPoint2CACert.crt",
+            "InvaliddistributionPointTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "distributionPoint2CACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.10 Valid No issuingDistributionPoint Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "NoissuingDistributionPointCACert.crt",
+            "ValidNoissuingDistributionPointTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "NoissuingDistributionPointCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.11 Invalid onlyContainsUserCerts CRL Test11",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlyContainsUserCertsCACert.crt",
+            "InvalidonlyContainsUserCertsTest11EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlyContainsUserCertsCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.12 Invalid onlyContainsCACerts CRL Test12",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlyContainsCACertsCACert.crt",
+            "InvalidonlyContainsCACertsTest12EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlyContainsCACertsCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.13 Valid onlyContainsCACerts CRL Test13",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlyContainsCACertsCACert.crt",
+            "ValidonlyContainsCACertsTest13EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlyContainsCACertsCACRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.14 Invalid onlyContainsAttributeCerts Test14",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlyContainsAttributeCertsCACert.crt",
+            "InvalidonlyContainsAttributeCertsTest14EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlyContainsAttributeCertsCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.15 Invalid onlySomeReasons Test15",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlySomeReasonsCA1Cert.crt",
+            "InvalidonlySomeReasonsTest15EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlySomeReasonsCA1compromiseCRL.crl",
+            "onlySomeReasonsCA1otherreasonsCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.16 Invalid onlySomeReasons Test16",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlySomeReasonsCA1Cert.crt",
+            "InvalidonlySomeReasonsTest16EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlySomeReasonsCA1compromiseCRL.crl",
+            "onlySomeReasonsCA1otherreasonsCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.17 Invalid onlySomeReasons Test17",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlySomeReasonsCA2Cert.crt",
+            "InvalidonlySomeReasonsTest17EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlySomeReasonsCA2CRL1.crl",
+            "onlySomeReasonsCA2CRL2.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.18 Valid onlySomeReasons Test18",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlySomeReasonsCA3Cert.crt",
+            "ValidonlySomeReasonsTest18EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlySomeReasonsCA3compromiseCRL.crl",
+            "onlySomeReasonsCA3otherreasonsCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.19 Valid onlySomeReasons Test19",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlySomeReasonsCA4Cert.crt",
+            "ValidonlySomeReasonsTest19EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlySomeReasonsCA4compromiseCRL.crl",
+            "onlySomeReasonsCA4otherreasonsCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.20 Invalid onlySomeReasons Test20",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlySomeReasonsCA4Cert.crt",
+            "InvalidonlySomeReasonsTest20EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlySomeReasonsCA4compromiseCRL.crl",
+            "onlySomeReasonsCA4otherreasonsCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.21 Invalid onlySomeReasons Test21",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "onlySomeReasonsCA4Cert.crt",
+            "InvalidonlySomeReasonsTest21EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "onlySomeReasonsCA4compromiseCRL.crl",
+            "onlySomeReasonsCA4otherreasonsCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.22 Valid IDP with indirectCRL Test22",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA1Cert.crt",
+            "ValidIDPwithindirectCRLTest22EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA1CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.23 Invalid IDP with indirectCRL Test23",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA1Cert.crt",
+            "InvalidIDPwithindirectCRLTest23EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.24 Valid IDP with indirectCRL Test24",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA2Cert.crt",
+            "indirectCRLCA1Cert.crt",
+            "ValidIDPwithindirectCRLTest24EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA1CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.25 Valid IDP with indirectCRL Test25",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA2Cert.crt",
+            "indirectCRLCA1Cert.crt",
+            "ValidIDPwithindirectCRLTest25EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA1CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.26 Invalid IDP with indirectCRL Test26",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA2Cert.crt",
+            "indirectCRLCA1Cert.crt",
+            "InvalidIDPwithindirectCRLTest26EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA1CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.27 Invalid cRLIssuer Test27",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA2Cert.crt",
+            "GoodCACert.crt",
+            "InvalidcRLIssuerTest27EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "GoodCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.28 Valid cRLIssuer Test28",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA3Cert.crt",
+            "indirectCRLCA3cRLIssuerCert.crt",
+            "ValidcRLIssuerTest28EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA3CRL.crl",
+            "indirectCRLCA3cRLIssuerCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.29 Valid cRLIssuer Test29",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA3Cert.crt",
+            "indirectCRLCA3cRLIssuerCert.crt",
+            "ValidcRLIssuerTest29EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA3CRL.crl",
+            "indirectCRLCA3cRLIssuerCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.30 Valid cRLIssuer Test30",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA4Cert.crt",
+            "indirectCRLCA4cRLIssuerCert.crt",
+            "ValidcRLIssuerTest30EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA4cRLIssuerCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.31 Invalid cRLIssuer Test31",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA5Cert.crt",
+            "indirectCRLCA6Cert.crt",
+            "InvalidcRLIssuerTest31EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA5CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.32 Invalid cRLIssuer Test32",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA5Cert.crt",
+            "indirectCRLCA6Cert.crt",
+            "InvalidcRLIssuerTest32EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA5CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.33 Valid cRLIssuer Test33",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA5Cert.crt",
+            "indirectCRLCA6Cert.crt",
+            "ValidcRLIssuerTest33EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA5CRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.34 Invalid cRLIssuer Test34",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA5Cert.crt",
+            "InvalidcRLIssuerTest34EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA5CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.14.35 Invalid cRLIssuer Test35",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "indirectCRLCA5Cert.crt",
+            "InvalidcRLIssuerTest35EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "indirectCRLCA5CRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.1 Invalid deltaCRLIndicator No Base Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLIndicatorNoBaseCACert.crt",
+            "InvaliddeltaCRLIndicatorNoBaseTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLIndicatorNoBaseCACRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.2 Valid delta-CRL Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA1Cert.crt",
+            "ValiddeltaCRLTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA1CRL.crl",
+            "deltaCRLCA1deltaCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.3 Invalid delta-CRL Test3",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA1Cert.crt",
+            "InvaliddeltaCRLTest3EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA1CRL.crl",
+            "deltaCRLCA1deltaCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.4 Invalid delta-CRL Test4",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA1Cert.crt",
+            "InvaliddeltaCRLTest4EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA1CRL.crl",
+            "deltaCRLCA1deltaCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.5 Valid delta-CRL Test5",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA1Cert.crt",
+            "ValiddeltaCRLTest5EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA1CRL.crl",
+            "deltaCRLCA1deltaCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.6 Invalid delta-CRL Test6",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA1Cert.crt",
+            "InvaliddeltaCRLTest6EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA1CRL.crl",
+            "deltaCRLCA1deltaCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.7 Valid delta-CRL Test7",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA1Cert.crt",
+            "ValiddeltaCRLTest7EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA1CRL.crl",
+            "deltaCRLCA1deltaCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.8 Valid delta-CRL Test8",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA2Cert.crt",
+            "ValiddeltaCRLTest8EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA2CRL.crl",
+            "deltaCRLCA2deltaCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.9 Invalid delta-CRL Test9",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA2Cert.crt",
+            "InvaliddeltaCRLTest9EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA2CRL.crl",
+            "deltaCRLCA2deltaCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.15.10 Invalid delta-CRL Test10",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "deltaCRLCA3Cert.crt",
+            "InvaliddeltaCRLTest10EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl",
+            "deltaCRLCA3CRL.crl",
+            "deltaCRLCA3deltaCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.16.1 Valid Unknown Not Critical Certificate Extension Test1",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "ValidUnknownNotCriticalCertificateExtensionTest1EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl"
+        ],
+        "ShouldValidate": true,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    },
+    {
+        "Name": "4.16.2 Invalid Unknown Critical Certificate Extension Test2",
+        "CertPath": [
+            "TrustAnchorRootCertificate.crt",
+            "InvalidUnknownCriticalCertificateExtensionTest2EE.crt"
+        ],
+        "CRLPath": [
+            "TrustAnchorRootCRL.crl"
+        ],
+        "ShouldValidate": false,
+        "InitialPolicySet": [
+            "anyPolicy"
+        ],
+        "InitialPolicyMappingInhibit": false,
+        "InitialExplicitPolicy": false,
+        "InitialAnyPolicyInhibit": false
+    }
+]
\ No newline at end of file