From 72b4bcac0374b3fa4e4e5ea275dad99dbe06e14f Mon Sep 17 00:00:00 2001 From: Xiaokang Qian Date: Mon, 6 Mar 2023 07:50:43 +0000 Subject: [PATCH 1/7] Add invalid size test case for signer info 1(the second one) Signed-off-by: Xiaokang Qian --- tests/data_files/Makefile | 6 ++++++ tests/suites/test_suite_pkcs7.data | 4 ++++ 2 files changed, 10 insertions(+) diff --git a/tests/data_files/Makefile b/tests/data_files/Makefile index 1b122ee8d6..7e394ef5d4 100644 --- a/tests/data_files/Makefile +++ b/tests/data_files/Makefile @@ -1384,6 +1384,12 @@ pkcs7_signerInfo_2_invalid_tag.der: pkcs7_data_3_signed.der echo 'a1' | xxd -r -p | dd of=$@ bs=1 seek=810 conv=notrunc all_final += pkcs7_signerInfo_2_invalid_tag.der +# pkcs7 signature file with corrupted signer info[1] +pkcs7_data_signed_badsigner1_badsize.der: pkcs7_data_3_signed.der + cp pkcs7_data_3_signed.der $@ + echo '\x72' | xxd -p -r | dd of=$@ bs=1 seek=438 conv=notrunc +all_final += pkcs7_data_signed_badsigner1_badsize.der + # pkcs7 file with version 2 pkcs7_data_cert_signed_v2.der: pkcs7_data_cert_signed_sha256.der cp pkcs7_data_cert_signed_sha256.der $@ diff --git a/tests/suites/test_suite_pkcs7.data b/tests/suites/test_suite_pkcs7.data index da8146bc15..8dfef6d498 100644 --- a/tests/suites/test_suite_pkcs7.data +++ b/tests/suites/test_suite_pkcs7.data @@ -30,6 +30,10 @@ PKCS7 Signed Data Parse Fail with corrupted signer info #6 depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner.der":MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO,MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) +PKCS7 Signed Data Parse Fail with corrupted signer info[1] invalid size #6.1 +depends_on:MBEDTLS_SHA256_C +pkcs7_parse:"data_files/pkcs7_data_signed_badsigner1_badsize.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO + PKCS7 Signed Data Parse Fail Version other than 1 #7 depends_on:MBEDTLS_SHA256_C pkcs7_parse:"data_files/pkcs7_data_cert_signed_v2.der":MBEDTLS_ERR_PKCS7_INVALID_VERSION From e8c696ffd10579f0f983eb7a7f8146566f14b8cb Mon Sep 17 00:00:00 2001 From: Xiaokang Qian Date: Mon, 6 Mar 2023 07:58:14 +0000 Subject: [PATCH 2/7] Add invalid size test case for signer info[2](The third one) Signed-off-by: Xiaokang Qian --- tests/data_files/Makefile | 6 ++++++ tests/suites/test_suite_pkcs7.data | 4 ++++ 2 files changed, 10 insertions(+) diff --git a/tests/data_files/Makefile b/tests/data_files/Makefile index 7e394ef5d4..341ceb07f3 100644 --- a/tests/data_files/Makefile +++ b/tests/data_files/Makefile @@ -1390,6 +1390,12 @@ pkcs7_data_signed_badsigner1_badsize.der: pkcs7_data_3_signed.der echo '\x72' | xxd -p -r | dd of=$@ bs=1 seek=438 conv=notrunc all_final += pkcs7_data_signed_badsigner1_badsize.der +# pkcs7 signature file with corrupted signer info[2] +pkcs7_data_signed_badsigner2_badsize.der: pkcs7_data_3_signed.der + cp pkcs7_data_3_signed.der $@ + echo '\x72'| xxd -p -r | dd of=$@ bs=1 seek=813 conv=notrunc +all_final += pkcs7_data_signed_badsigner2_badsize + # pkcs7 file with version 2 pkcs7_data_cert_signed_v2.der: pkcs7_data_cert_signed_sha256.der cp pkcs7_data_cert_signed_sha256.der $@ diff --git a/tests/suites/test_suite_pkcs7.data b/tests/suites/test_suite_pkcs7.data index 8dfef6d498..478bb9d3fc 100644 --- a/tests/suites/test_suite_pkcs7.data +++ b/tests/suites/test_suite_pkcs7.data @@ -34,6 +34,10 @@ PKCS7 Signed Data Parse Fail with corrupted signer info[1] invalid size #6.1 depends_on:MBEDTLS_SHA256_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner1_badsize.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO +PKCS7 Signed Data Parse Fail with corrupted signer info[2] invalid size #6.2 +depends_on:MBEDTLS_SHA256_C +pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_badsize.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO + PKCS7 Signed Data Parse Fail Version other than 1 #7 depends_on:MBEDTLS_SHA256_C pkcs7_parse:"data_files/pkcs7_data_cert_signed_v2.der":MBEDTLS_ERR_PKCS7_INVALID_VERSION From 8993a1456712177d326ce029e8c0c2ff99c55463 Mon Sep 17 00:00:00 2001 From: Xiaokang Qian Date: Mon, 6 Mar 2023 08:32:20 +0000 Subject: [PATCH 3/7] Add unexpected tag cases for signer info 1 and 2 Signed-off-by: Xiaokang Qian --- tests/data_files/Makefile | 10 ++++++++++ tests/suites/test_suite_pkcs7.data | 8 ++++++++ 2 files changed, 18 insertions(+) diff --git a/tests/data_files/Makefile b/tests/data_files/Makefile index 341ceb07f3..53d5e1dda6 100644 --- a/tests/data_files/Makefile +++ b/tests/data_files/Makefile @@ -1390,12 +1390,22 @@ pkcs7_data_signed_badsigner1_badsize.der: pkcs7_data_3_signed.der echo '\x72' | xxd -p -r | dd of=$@ bs=1 seek=438 conv=notrunc all_final += pkcs7_data_signed_badsigner1_badsize.der +pkcs7_data_signed_badsigner1_badtag.der: pkcs7_data_3_signed.der + cp pkcs7_data_3_signed.der $@ + echo '\xa1' | xxd -p -r | dd of=$@ bs=1 seek=442 conv=notrunc +all_final += pkcs7_data_signed_badsigner1_badtag.der + # pkcs7 signature file with corrupted signer info[2] pkcs7_data_signed_badsigner2_badsize.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ echo '\x72'| xxd -p -r | dd of=$@ bs=1 seek=813 conv=notrunc all_final += pkcs7_data_signed_badsigner2_badsize +pkcs7_data_signed_badsigner2_badtag.der: pkcs7_data_3_signed.der + cp pkcs7_data_3_signed.der $@ + echo '\xa1'| xxd -p -r | dd of=$@ bs=1 seek=817 conv=notrunc +all_final += pkcs7_data_signed_badsigner2_badtag + # pkcs7 file with version 2 pkcs7_data_cert_signed_v2.der: pkcs7_data_cert_signed_sha256.der cp pkcs7_data_cert_signed_sha256.der $@ diff --git a/tests/suites/test_suite_pkcs7.data b/tests/suites/test_suite_pkcs7.data index 478bb9d3fc..7df4ac8626 100644 --- a/tests/suites/test_suite_pkcs7.data +++ b/tests/suites/test_suite_pkcs7.data @@ -38,6 +38,14 @@ PKCS7 Signed Data Parse Fail with corrupted signer info[2] invalid size #6.2 depends_on:MBEDTLS_SHA256_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_badsize.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO +PKCS7 Signed Data Parse Fail with corrupted signer info[1] unexpected tag #6.3 +depends_on:MBEDTLS_SHA256_C +pkcs7_parse:"data_files/pkcs7_data_signed_badsigner1_badtag.der":MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO,MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) + +PKCS7 Signed Data Parse Fail with corrupted signer info[2] unexpected tag #6.4 +depends_on:MBEDTLS_SHA256_C +pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_badtag.der":MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO,MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) + PKCS7 Signed Data Parse Fail Version other than 1 #7 depends_on:MBEDTLS_SHA256_C pkcs7_parse:"data_files/pkcs7_data_cert_signed_v2.der":MBEDTLS_ERR_PKCS7_INVALID_VERSION From 9c703d80ca351513548eaf535f416707dc330a18 Mon Sep 17 00:00:00 2001 From: Xiaokang Qian Date: Mon, 6 Mar 2023 08:44:12 +0000 Subject: [PATCH 4/7] Add fuzz bad cases for signer info 1 and 2 Signed-off-by: Xiaokang Qian --- tests/data_files/Makefile | 10 ++++++++++ tests/suites/test_suite_pkcs7.data | 8 ++++++++ 2 files changed, 18 insertions(+) diff --git a/tests/data_files/Makefile b/tests/data_files/Makefile index 53d5e1dda6..9df46aa59a 100644 --- a/tests/data_files/Makefile +++ b/tests/data_files/Makefile @@ -1395,6 +1395,11 @@ pkcs7_data_signed_badsigner1_badtag.der: pkcs7_data_3_signed.der echo '\xa1' | xxd -p -r | dd of=$@ bs=1 seek=442 conv=notrunc all_final += pkcs7_data_signed_badsigner1_badtag.der +pkcs7_data_signed_badsigner1_fuzzbad.der: pkcs7_data_3_signed.der + cp pkcs7_data_3_signed.der $@ + echo '\xa1' | xxd -p -r | dd of=$@ bs=1 seek=550 conv=notrunc +all_final += pkcs7_data_signed_badsigner1_fuzzbad.der + # pkcs7 signature file with corrupted signer info[2] pkcs7_data_signed_badsigner2_badsize.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ @@ -1406,6 +1411,11 @@ pkcs7_data_signed_badsigner2_badtag.der: pkcs7_data_3_signed.der echo '\xa1'| xxd -p -r | dd of=$@ bs=1 seek=817 conv=notrunc all_final += pkcs7_data_signed_badsigner2_badtag +pkcs7_data_signed_badsigner2_fuzzbad.der: pkcs7_data_3_signed.der + cp pkcs7_data_3_signed.der $@ + echo '\xa1'| xxd -p -r | dd of=$@ bs=1 seek=925 conv=notrunc +all_final += pkcs7_data_signed_badsigner2_fuzzbad + # pkcs7 file with version 2 pkcs7_data_cert_signed_v2.der: pkcs7_data_cert_signed_sha256.der cp pkcs7_data_cert_signed_sha256.der $@ diff --git a/tests/suites/test_suite_pkcs7.data b/tests/suites/test_suite_pkcs7.data index 7df4ac8626..d7b248f0ed 100644 --- a/tests/suites/test_suite_pkcs7.data +++ b/tests/suites/test_suite_pkcs7.data @@ -46,6 +46,14 @@ PKCS7 Signed Data Parse Fail with corrupted signer info[2] unexpected tag #6.4 depends_on:MBEDTLS_SHA256_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_badtag.der":MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO,MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) +PKCS7 Signed Data Parse Fail with corrupted signer info[1] fuzz bad #6.5 +depends_on:MBEDTLS_SHA256_C +pkcs7_parse:"data_files/pkcs7_data_signed_badsigner1_fuzzbad.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO + +PKCS7 Signed Data Parse Fail with corrupted signer info[2] fuzz bad #6.6 +depends_on:MBEDTLS_SHA256_C +pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_fuzzbad.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO + PKCS7 Signed Data Parse Fail Version other than 1 #7 depends_on:MBEDTLS_SHA256_C pkcs7_parse:"data_files/pkcs7_data_cert_signed_v2.der":MBEDTLS_ERR_PKCS7_INVALID_VERSION From d2988adb31c2d9c4ff0e0c66e7d96f8b36f431f5 Mon Sep 17 00:00:00 2001 From: Xiaokang Qian Date: Tue, 7 Mar 2023 06:17:29 +0000 Subject: [PATCH 5/7] Add rsa dependencies for pkcs7 corrupt signer info cases Signed-off-by: Xiaokang Qian --- tests/suites/test_suite_pkcs7.data | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tests/suites/test_suite_pkcs7.data b/tests/suites/test_suite_pkcs7.data index d7b248f0ed..ffeec498ce 100644 --- a/tests/suites/test_suite_pkcs7.data +++ b/tests/suites/test_suite_pkcs7.data @@ -31,27 +31,27 @@ depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner.der":MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO,MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) PKCS7 Signed Data Parse Fail with corrupted signer info[1] invalid size #6.1 -depends_on:MBEDTLS_SHA256_C +depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner1_badsize.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO PKCS7 Signed Data Parse Fail with corrupted signer info[2] invalid size #6.2 -depends_on:MBEDTLS_SHA256_C +depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_badsize.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO PKCS7 Signed Data Parse Fail with corrupted signer info[1] unexpected tag #6.3 -depends_on:MBEDTLS_SHA256_C +depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner1_badtag.der":MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO,MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) PKCS7 Signed Data Parse Fail with corrupted signer info[2] unexpected tag #6.4 -depends_on:MBEDTLS_SHA256_C +depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_badtag.der":MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO,MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) PKCS7 Signed Data Parse Fail with corrupted signer info[1] fuzz bad #6.5 -depends_on:MBEDTLS_SHA256_C +depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner1_fuzzbad.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO PKCS7 Signed Data Parse Fail with corrupted signer info[2] fuzz bad #6.6 -depends_on:MBEDTLS_SHA256_C +depends_on:MBEDTLS_SHA256_C:MBEDTLS_RSA_C pkcs7_parse:"data_files/pkcs7_data_signed_badsigner2_fuzzbad.der":MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO PKCS7 Signed Data Parse Fail Version other than 1 #7 From c96d2de569e1247f270e919ee0da280d8c319d86 Mon Sep 17 00:00:00 2001 From: Xiaokang Qian Date: Tue, 7 Mar 2023 10:35:47 +0000 Subject: [PATCH 6/7] Update corrupted char for pkcs7 corrupt signer info cases Signed-off-by: Xiaokang Qian --- tests/data_files/Makefile | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tests/data_files/Makefile b/tests/data_files/Makefile index 9df46aa59a..80bdd25737 100644 --- a/tests/data_files/Makefile +++ b/tests/data_files/Makefile @@ -1387,33 +1387,33 @@ all_final += pkcs7_signerInfo_2_invalid_tag.der # pkcs7 signature file with corrupted signer info[1] pkcs7_data_signed_badsigner1_badsize.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ - echo '\x72' | xxd -p -r | dd of=$@ bs=1 seek=438 conv=notrunc + echo '72' | xxd -p -r | dd of=$@ bs=1 seek=438 conv=notrunc all_final += pkcs7_data_signed_badsigner1_badsize.der pkcs7_data_signed_badsigner1_badtag.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ - echo '\xa1' | xxd -p -r | dd of=$@ bs=1 seek=442 conv=notrunc + echo 'a1' | xxd -p -r | dd of=$@ bs=1 seek=442 conv=notrunc all_final += pkcs7_data_signed_badsigner1_badtag.der pkcs7_data_signed_badsigner1_fuzzbad.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ - echo '\xa1' | xxd -p -r | dd of=$@ bs=1 seek=550 conv=notrunc + echo 'a1' | xxd -p -r | dd of=$@ bs=1 seek=550 conv=notrunc all_final += pkcs7_data_signed_badsigner1_fuzzbad.der # pkcs7 signature file with corrupted signer info[2] pkcs7_data_signed_badsigner2_badsize.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ - echo '\x72'| xxd -p -r | dd of=$@ bs=1 seek=813 conv=notrunc + echo '72'| xxd -p -r | dd of=$@ bs=1 seek=813 conv=notrunc all_final += pkcs7_data_signed_badsigner2_badsize pkcs7_data_signed_badsigner2_badtag.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ - echo '\xa1'| xxd -p -r | dd of=$@ bs=1 seek=817 conv=notrunc + echo 'a1'| xxd -p -r | dd of=$@ bs=1 seek=817 conv=notrunc all_final += pkcs7_data_signed_badsigner2_badtag pkcs7_data_signed_badsigner2_fuzzbad.der: pkcs7_data_3_signed.der cp pkcs7_data_3_signed.der $@ - echo '\xa1'| xxd -p -r | dd of=$@ bs=1 seek=925 conv=notrunc + echo 'a1'| xxd -p -r | dd of=$@ bs=1 seek=925 conv=notrunc all_final += pkcs7_data_signed_badsigner2_fuzzbad # pkcs7 file with version 2 From 8657e3280ad463e3d957076f6f262d737fff3a1a Mon Sep 17 00:00:00 2001 From: Dave Rodgman Date: Thu, 9 Mar 2023 15:53:52 +0000 Subject: [PATCH 7/7] Add corrupt PKCS #7 test files Generated by running "make " and commiting the result. Signed-off-by: Dave Rodgman --- .../pkcs7_data_signed_badsigner1_badsize.der | Bin 0 -> 1185 bytes .../pkcs7_data_signed_badsigner1_badtag.der | Bin 0 -> 1185 bytes .../pkcs7_data_signed_badsigner1_fuzzbad.der | Bin 0 -> 1185 bytes .../pkcs7_data_signed_badsigner2_badsize.der | Bin 0 -> 1185 bytes .../pkcs7_data_signed_badsigner2_badtag.der | Bin 0 -> 1185 bytes .../pkcs7_data_signed_badsigner2_fuzzbad.der | Bin 0 -> 1185 bytes 6 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 tests/data_files/pkcs7_data_signed_badsigner1_badsize.der create mode 100644 tests/data_files/pkcs7_data_signed_badsigner1_badtag.der create mode 100644 tests/data_files/pkcs7_data_signed_badsigner1_fuzzbad.der create mode 100644 tests/data_files/pkcs7_data_signed_badsigner2_badsize.der create mode 100644 tests/data_files/pkcs7_data_signed_badsigner2_badtag.der create mode 100644 tests/data_files/pkcs7_data_signed_badsigner2_fuzzbad.der diff --git a/tests/data_files/pkcs7_data_signed_badsigner1_badsize.der b/tests/data_files/pkcs7_data_signed_badsigner1_badsize.der new file mode 100644 index 0000000000000000000000000000000000000000..da7f3a9910f62aa76ba08523e29d6db28c46cacf GIT binary patch literal 1185 zcmXqLVwuavsnzDu_MMlJooPW6OP@g#OBWL(qanWmFB@k(-%0lcd2g|8|nd{=;ys(YYF>l^D zqubl<&XlL2?F-poiMs7qy41y4pQ`1Mc1JT+Z9?XH{lK!_Jugq?3jRzF|6s)OJ*>dA z{Q}n&mCBq+f2v;Rd%76ToOjD$CZB(JakAc}h<{9F>83Mp<)1S>yS7|y!EPp>wKKCj z9-N-h>hn5=JMXy1&7bG8a;})ScCXnXlGvrL|9Oe%u?O|G8)meZ|9#UEHGO}rfbIog zuosaZ>_$u?VZNabs_P@?85LA+D&qUV`?=*Ix zV{ts$c+Z)4@62ZTdqv+}@hVcyQRRu|hc=@O+uIAP_p9kPZQJ+D+E1jxJgcYPrnXKi zy>j=*rleJ^wJ#2F32j?+uFtpL@UFCE@TBvJt?SR3tbY(OjkVhB<;KEo$Lg*h(#YAr z!v4p?^y7O9IoCbE{&2$V%PqhEBu?)8vs9*Y@^RVC;>G-8&!3mIRXzE8H0j#M*r%<} zclv#qwm3aGebMPv+qapebTgFgx_b8GgXs=$vRtMA2mAd}447}dytg_-gLBxgmG*>*s{$o-v8UQ^9-4Xx* literal 0 HcmV?d00001 diff --git a/tests/data_files/pkcs7_data_signed_badsigner1_badtag.der b/tests/data_files/pkcs7_data_signed_badsigner1_badtag.der new file mode 100644 index 0000000000000000000000000000000000000000..402b91050ffde574c123e3201496ef8fdde53ad6 GIT binary patch literal 1185 zcmXqLVwuavsnzDu_MMlJooPW6OP@g#OBWL(qanWmFB@k(-%0lcd2g|8|nd{=;ys(YYF>l^D zqubl<&XlL2?F-poiMs7qy41y4pQ`1Mc1JT+Z9?XH{lK!_Jugq?3jRzF|6s)OJ*>dA z{Q}n&mCBq+f2v;Rd%76ToOjD$CZB(JakAc}h<{9F>83Mp<)1S>yS7|y!EPp>wKKCj z9-N-h>hn5=JMXy1&7bG8a;})ScCXnXlGvrL|9Oe%u?O|G8)meZ|9#UEHGO}rfbIoo zurDMp*o~M(!hAy=RM$t&Gb*UuRK)jz_jAqf8p6TOk}%^=y!On;d-SfQ=+<*3zF&PX z#^QLg@t!m9-kHtv_lmx|;#H)YqskM_4{b&nwzn5n?^n}p+P3ePwVz0Xc~(!oO>Lc4 zdgbnqO-ZX-YhN7V656)tT%T{f;azFT;7R8bTi2g6S^pqn8f&%L%Z-KGj@4a1q>;0K zh5e6(>BsjJa;|%R{o#b!ms@`SNu1pGXQ@o*Zt9tVHXwtQhu}@o{ z@AUgJZE<>X`l8dTwr?{_>1HU~b@lAW2h$ziWVuTJ5BB?|7%<;@d37V>PPyezV{iWx zVGJxtzrI0Ai=*;GM@*+z`}u7>zI87qBzQEg+gYP@@w55+Np{RpDGZdQc4H=yB=@2j zrStk&3cH>ri^iKOpWoqgn{cq_>g+cED>St(s-)o@i|LE^3FY@b^nWU7@qHAS{^~Dn(Kl|P=<&=v~gNO_BX|8yN{l}zUGynjH_}zp6 literal 0 HcmV?d00001 diff --git a/tests/data_files/pkcs7_data_signed_badsigner1_fuzzbad.der b/tests/data_files/pkcs7_data_signed_badsigner1_fuzzbad.der new file mode 100644 index 0000000000000000000000000000000000000000..e19c54a05fdeebff3ffcf79ad7a51107a253730f GIT binary patch literal 1185 zcmXqLVwuavsnzDu_MMlJooPW6OP@g#OBWL(qanWmFB@k(-%0lcd2g|8|nd{=;ys(YYF>l^D zqubl<&XlL2?F-poiMs7qy41y4pQ`1Mc1JT+Z9?XH{lK!_Jugq?3jRzF|6s)OJ*>dA z{Q}n&mCBq+f2v;Rd%76ToOjD$CZB(JakAc}h<{9F>83Mp<)1S>yS7|y!EPp>wKKCj z9-N-h>hn5=JMXy1&7bG8a;})ScCXnXlGvrL|9Oe%u?O|G8)meZ|9#UEHGO}rfbIp# zg58KoB+NI|L3MrPJfnijO+|bkct6+tuE8Jd3xUDTk}%^=y!On;d-SfQ=+<*3zF&PX z#^QLg@t!m9-kHtv_lmx|;#H)YqskM_4{b&nwzn5n?^n}p+P3ePwVz0Xc~(!oO>Lc4 zdgbnqO-ZX-YhN7V656)tT%T{f;azFT;7R8bTi2g6S^pqn8f&%L%Z-KGj@4a1q>;0K zh5e6(>BsjJa;|%R{o#b!ms@`SNu1pGXQ@o*Zt9tVHXwtQhu}@o{ z@AUgJZE<>X`l8dTwr?{_>1HU~b@lAW2h$ziWVuTJ5BB?|7%<;@d37V>PPyezV{iWx zVGJxtzrI0Ai=*;GM@*+z`}u7>zI87qBzQEg+gYP@@w55+Np{RpDGZbayD^hUl6%pN z(s_L>g!)y>b9rIWa9q;Gt?13nlI-O@NA^A`HJr=1 z_j!%y)n2j7n_kN3CB87QS$zHN;>!9Pn`4%1Z}b*j%hy1*Pc!&0pLMdV-Ct<_u3paQY{TO1tA)1Yh)q&Z?=2VK-eu!@%`!@u zt2?4aW{)PHe`D?ACI7_UTqr+fykM2;BhxeWX`w5)SFC%}J|TM3@{q{wdyXzN{xs8M k@)r3&-)ycgp7{9L_l7B_Tyz>lT$oRD#WU(-%0lcd2g|8|nd{=;ys(YYF>l^D zqubl<&XlL2?F-poiMs7qy41y4pQ`1Mc1JT+Z9?XH{lK!_Jugq?3jRzF|6s)OJ*>dA z{Q}n&mCBq+f2v;Rd%76ToOjD$CZB(JakAc}h<{9F>83Mp<)1S>yS7|y!EPp>wKKCj z9-N-h>hn5=JMXy1&7bG8a;})ScCXnXlGvrL|9Oe%u?O|G8)meZ|9#UEHGO}rfbIp# zg58KoB+NI|L3MrPJfnijO+|bkct6+tt|1)kED1C2#B0xdyhra^if%nu;``MHV=Rs* z8}B*u?w#2zf3N7fD_%vaIjTI-{Lp5UVS9UF^?o(orfvIvS^J4Jm}m9W+tk)+rC09$ z*p#%Ywf4m!E}?CU&h`1$8{Uv^Xk1bi{OewV&VC<6HM)LV`!*x}7yj7eAZ7pJc}zmBIiF_9F6AyD^hUl6%pN z(s_L>g_-gLBxgmG*>*s{$o-v8UQ|i-4Xx* literal 0 HcmV?d00001 diff --git a/tests/data_files/pkcs7_data_signed_badsigner2_badtag.der b/tests/data_files/pkcs7_data_signed_badsigner2_badtag.der new file mode 100644 index 0000000000000000000000000000000000000000..7929444662e9d580b120d1341bd9ab926482b52a GIT binary patch literal 1185 zcmXqLVwuavsnzDu_MMlJooPW6OP@g#OBWL(qanWmFB@k(-%0lcd2g|8|nd{=;ys(YYF>l^D zqubl<&XlL2?F-poiMs7qy41y4pQ`1Mc1JT+Z9?XH{lK!_Jugq?3jRzF|6s)OJ*>dA z{Q}n&mCBq+f2v;Rd%76ToOjD$CZB(JakAc}h<{9F>83Mp<)1S>yS7|y!EPp>wKKCj z9-N-h>hn5=JMXy1&7bG8a;})ScCXnXlGvrL|9Oe%u?O|G8)meZ|9#UEHGO}rfbIp# zg58KoB+NI|L3MrPJfnijO+|bkct6+tt|1)kED1C2#B0xdyhra^if%nu;``MHV=Rs* z8}B*u?w#2zf3N7fD_%vaIjTI-{Lp5UVS9UF^?o(orfvIvS^J4Jm}m9W+tk)+rC09$ z*p#%Ywf4m!E}?CU&h`1$8{Uv^Xk1bi{OewV&VC<6HM)LV`!*x}7yj7eAZ7pJc}zmBIiG_J!o7c4H=yB=@2j zrStk&3cH>ri^iKOpWoqgn{cq_>g+cED>St(s-)o@i|LE^3FY@b^nWU7@qHAS{^~Dn(Kl|P=<&=v~gNO_BX|8yN{l}zUGynkNV%>xQ literal 0 HcmV?d00001 diff --git a/tests/data_files/pkcs7_data_signed_badsigner2_fuzzbad.der b/tests/data_files/pkcs7_data_signed_badsigner2_fuzzbad.der new file mode 100644 index 0000000000000000000000000000000000000000..b52bb78198b9520f728113a4f0e096fe10a5ddb7 GIT binary patch literal 1185 zcmXqLVwuavsnzDu_MMlJooPW6OP@g#OBWL(qanWmFB@k(-%0lcd2g|8|nd{=;ys(YYF>l^D zqubl<&XlL2?F-poiMs7qy41y4pQ`1Mc1JT+Z9?XH{lK!_Jugq?3jRzF|6s)OJ*>dA z{Q}n&mCBq+f2v;Rd%76ToOjD$CZB(JakAc}h<{9F>83Mp<)1S>yS7|y!EPp>wKKCj z9-N-h>hn5=JMXy1&7bG8a;})ScCXnXlGvrL|9Oe%u?O|G8)meZ|9#UEHGO}rfbIp# zg58KoB+NI|L3MrPJfnijO+|bkct6+tt|1)kED1C2#B0xdyhra^if%nu;``MHV=Rs* z8}B*u?w#2zf3N7fD_%vaIjTI-{Lp5UVS9UF^?o(orfvIvS^J4Jm}m9W+tk)+rC09$ z*p#%Ywf4m!E}?CU&h`1$8{Uv^Xk1bi{OewV&VC<6HM)LV`!*x}7yj7eAZ7pJc}zmBK(-up2XpB)J#OD4o~G zQrPu0Sv1~M`TP!_+xUZhAuzS)>g+cED>St(s-)o@i|LE^3FY@b^nWU7@qHAS{^~Dn(Kl|P=<&=v~gNO_BX|8yN{l}zUGynkKX5Fv= literal 0 HcmV?d00001