/**
 *	@file    testkeys/EC/192_EC_CA.h
 *	@version 8e6f0e1 (HEAD -> master)
 *
 *	Auto generated from PEM file.
 */
/*
	Auto generated X.509 certificate as binary DER.
Certificate:
    Data:
        Version: 3
        Serial Number:
            1b:58
        Issuer: CN=MatrixSSL Sample CA (Elliptic curve prime192v1), C=US, ST=WA, L=Seattle, O=Inside Secure Corporation., OU=Test
        Validity:
            Not Before: 2014/03/17
            Not After : 2017/03/16
        Subject: CN=MatrixSSL Sample CA (Elliptic curve prime192v1), C=US, ST=WA, L=Seattle, O=Inside Secure Corporation., OU=Test
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (192 bit)
                pub:
                    59:ee:a1:5d:bb:9e:32:82:7c:98:5a:b8:70:63:07:af:
                    f2:0d:b3:15:27:8c:01:76
                    41:b6:6a:9a:a1:45:88:23:fb:0b:e6:3d:80:d6:0a:cc:
                    fb:00:57:ee:18:93:64:e0
                ASN1 OID: secp192r1
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:TRUE
            X509v3 Key Usage: 0x8004
            X509v3 Extended Key Usage: 0x0
            X509v3 Subject Key Identifier:
                93:3f:b3:5a:38:55:dd:b4:d6:6e:84:cc:66:ce:8c:26:
                5b:1c:17:20
            X509v3 Authority Key Identifier:
                93:3f:b3:5a:38:55:dd:b4:d6:6e:84:cc:66:ce:8c:26:
                5b:1c:17:20
    Signature Algorithm: ecdsa-with-SHA256
        30:34:02:18:78:d0:b2:50:8e:3e:2b:ec:bf:f9:25:ee:
        0f:b9:ad:c6:ec:66:93:76:1d:cd:29:1b:02:18:63:fa:
        37:aa:45:4d:17:46:af:a4:23:84:fc:ef:d6:f5:1c:ce:
        5e:32:1b:1b:42:07
*/
#define EC192CA_SIZE	615
const static unsigned char EC192CA[EC192CA_SIZE] =
	"\x30\x82\x02\x63\x30\x82\x02\x1a\xa0\x03\x02\x01\x02\x02\x02\x1b"
	"\x58\x30\x0a\x06\x08\x2a\x86\x48\xce\x3d\x04\x03\x02\x30\x81\x9a"
	"\x31\x0b\x30\x09\x06\x03\x55\x04\x06\x13\x02\x55\x53\x31\x0b\x30"
	"\x09\x06\x03\x55\x04\x08\x0c\x02\x57\x41\x31\x10\x30\x0e\x06\x03"
	"\x55\x04\x07\x0c\x07\x53\x65\x61\x74\x74\x6c\x65\x31\x23\x30\x21"
	"\x06\x03\x55\x04\x0a\x0c\x1a\x49\x6e\x73\x69\x64\x65\x20\x53\x65"
	"\x63\x75\x72\x65\x20\x43\x6f\x72\x70\x6f\x72\x61\x74\x69\x6f\x6e"
	"\x2e\x31\x0d\x30\x0b\x06\x03\x55\x04\x0b\x0c\x04\x54\x65\x73\x74"
	"\x31\x38\x30\x36\x06\x03\x55\x04\x03\x0c\x2f\x4d\x61\x74\x72\x69"
	"\x78\x53\x53\x4c\x20\x53\x61\x6d\x70\x6c\x65\x20\x43\x41\x20\x28"
	"\x45\x6c\x6c\x69\x70\x74\x69\x63\x20\x63\x75\x72\x76\x65\x20\x70"
	"\x72\x69\x6d\x65\x31\x39\x32\x76\x31\x29\x30\x1e\x17\x0d\x31\x34"
	"\x30\x33\x31\x37\x32\x31\x33\x37\x30\x37\x5a\x17\x0d\x31\x37\x30"
	"\x33\x31\x36\x32\x31\x33\x37\x30\x37\x5a\x30\x81\x9a\x31\x0b\x30"
	"\x09\x06\x03\x55\x04\x06\x13\x02\x55\x53\x31\x0b\x30\x09\x06\x03"
	"\x55\x04\x08\x0c\x02\x57\x41\x31\x10\x30\x0e\x06\x03\x55\x04\x07"
	"\x0c\x07\x53\x65\x61\x74\x74\x6c\x65\x31\x23\x30\x21\x06\x03\x55"
	"\x04\x0a\x0c\x1a\x49\x6e\x73\x69\x64\x65\x20\x53\x65\x63\x75\x72"
	"\x65\x20\x43\x6f\x72\x70\x6f\x72\x61\x74\x69\x6f\x6e\x2e\x31\x0d"
	"\x30\x0b\x06\x03\x55\x04\x0b\x0c\x04\x54\x65\x73\x74\x31\x38\x30"
	"\x36\x06\x03\x55\x04\x03\x0c\x2f\x4d\x61\x74\x72\x69\x78\x53\x53"
	"\x4c\x20\x53\x61\x6d\x70\x6c\x65\x20\x43\x41\x20\x28\x45\x6c\x6c"
	"\x69\x70\x74\x69\x63\x20\x63\x75\x72\x76\x65\x20\x70\x72\x69\x6d"
	"\x65\x31\x39\x32\x76\x31\x29\x30\x49\x30\x13\x06\x07\x2a\x86\x48"
	"\xce\x3d\x02\x01\x06\x08\x2a\x86\x48\xce\x3d\x03\x01\x01\x03\x32"
	"\x00\x04\x59\xee\xa1\x5d\xbb\x9e\x32\x82\x7c\x98\x5a\xb8\x70\x63"
	"\x07\xaf\xf2\x0d\xb3\x15\x27\x8c\x01\x76\x41\xb6\x6a\x9a\xa1\x45"
	"\x88\x23\xfb\x0b\xe6\x3d\x80\xd6\x0a\xcc\xfb\x00\x57\xee\x18\x93"
	"\x64\xe0\xa3\x5e\x30\x5c\x30\x0c\x06\x03\x55\x1d\x0f\x04\x05\x03"
	"\x03\x07\x04\x80\x30\x1d\x06\x03\x55\x1d\x0e\x04\x16\x04\x14\x93"
	"\x3f\xb3\x5a\x38\x55\xdd\xb4\xd6\x6e\x84\xcc\x66\xce\x8c\x26\x5b"
	"\x1c\x17\x20\x30\x1f\x06\x03\x55\x1d\x23\x04\x18\x30\x16\x80\x14"
	"\x93\x3f\xb3\x5a\x38\x55\xdd\xb4\xd6\x6e\x84\xcc\x66\xce\x8c\x26"
	"\x5b\x1c\x17\x20\x30\x0c\x06\x03\x55\x1d\x13\x04\x05\x30\x03\x01"
	"\x01\xff\x30\x0a\x06\x08\x2a\x86\x48\xce\x3d\x04\x03\x02\x03\x37"
	"\x00\x30\x34\x02\x18\x78\xd0\xb2\x50\x8e\x3e\x2b\xec\xbf\xf9\x25"
	"\xee\x0f\xb9\xad\xc6\xec\x66\x93\x76\x1d\xcd\x29\x1b\x02\x18\x63"
	"\xfa\x37\xaa\x45\x4d\x17\x46\xaf\xa4\x23\x84\xfc\xef\xd6\xf5\x1c"
	"\xce\x5e\x32\x1b\x1b\x42\x07";
