/**
 *	@file    testkeys/EC/192_EC.h
 *	@version 8e6f0e1 (HEAD -> master)
 *
 *	Auto generated from PEM file.
 */
/*
	Auto generated X.509 certificate as binary DER.
Certificate:
    Data:
        Version: 3
        Serial Number:
            1b:bc
        Issuer: CN=MatrixSSL Sample CA (Elliptic curve prime192v1), C=US, ST=WA, L=Seattle, O=Inside Secure Corporation., OU=Test
        Validity:
            Not Before: 2014/03/17
            Not After : 2017/03/16
        Subject: CN=MatrixSSL Sample Cert (Elliptic curve prime192v1), C=US, ST=WA, L=Seattle, O=Inside Secure Corporation, OU=Test
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (192 bit)
                pub:
                    ca:e2:9c:75:aa:63:72:2b:76:87:3d:9a:af:b6:b4:c6:
                    69:7a:0c:b8:77:e7:30:f5
                    8f:4e:78:b3:03:68:91:f6:32:58:c5:15:70:9a:f8:db:
                    d7:4b:a3:64:83:69:e6:d1
                ASN1 OID: secp192r1
        X509v3 extensions:
            X509v3 Subject Alternative Name: DNS
                localhost
            X509v3 Subject Alternative Name: iPAddress
                127.0.0.1
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Key Usage: 0x0
            X509v3 Extended Key Usage: 0x6
                TLS WWW server authentication
                TLS WWW client authentication
            X509v3 Subject Key Identifier:
                43:79:2b:cd:64:5e:70:7e:35:05:72:c9:5c:d2:4a:a0:
                f4:b9:da:05
            X509v3 Authority Key Identifier:
                93:3f:b3:5a:38:55:dd:b4:d6:6e:84:cc:66:ce:8c:26:
                5b:1c:17:20
    Signature Algorithm: ecdsa-with-SHA256
        30:34:02:18:78:76:4a:89:88:85:21:30:ff:3a:91:7a:
        ae:50:83:46:77:59:ea:fb:b1:af:13:bb:02:18:05:a1:
        90:96:0c:94:30:b7:c1:64:a5:96:b1:67:3b:a8:7a:92:
        87:7e:7b:4a:0d:38
*/
#define EC192_SIZE	660
const static unsigned char EC192[EC192_SIZE] =
	"\x30\x82\x02\x90\x30\x82\x02\x47\xa0\x03\x02\x01\x02\x02\x02\x1b"
	"\xbc\x30\x0a\x06\x08\x2a\x86\x48\xce\x3d\x04\x03\x02\x30\x81\x9a"
	"\x31\x0b\x30\x09\x06\x03\x55\x04\x06\x13\x02\x55\x53\x31\x0b\x30"
	"\x09\x06\x03\x55\x04\x08\x0c\x02\x57\x41\x31\x10\x30\x0e\x06\x03"
	"\x55\x04\x07\x0c\x07\x53\x65\x61\x74\x74\x6c\x65\x31\x23\x30\x21"
	"\x06\x03\x55\x04\x0a\x0c\x1a\x49\x6e\x73\x69\x64\x65\x20\x53\x65"
	"\x63\x75\x72\x65\x20\x43\x6f\x72\x70\x6f\x72\x61\x74\x69\x6f\x6e"
	"\x2e\x31\x0d\x30\x0b\x06\x03\x55\x04\x0b\x0c\x04\x54\x65\x73\x74"
	"\x31\x38\x30\x36\x06\x03\x55\x04\x03\x0c\x2f\x4d\x61\x74\x72\x69"
	"\x78\x53\x53\x4c\x20\x53\x61\x6d\x70\x6c\x65\x20\x43\x41\x20\x28"
	"\x45\x6c\x6c\x69\x70\x74\x69\x63\x20\x63\x75\x72\x76\x65\x20\x70"
	"\x72\x69\x6d\x65\x31\x39\x32\x76\x31\x29\x30\x1e\x17\x0d\x31\x34"
	"\x30\x33\x31\x37\x32\x31\x33\x37\x30\x37\x5a\x17\x0d\x31\x37\x30"
	"\x33\x31\x36\x32\x31\x33\x37\x30\x37\x5a\x30\x81\x9b\x31\x0b\x30"
	"\x09\x06\x03\x55\x04\x06\x13\x02\x55\x53\x31\x0b\x30\x09\x06\x03"
	"\x55\x04\x08\x0c\x02\x57\x41\x31\x10\x30\x0e\x06\x03\x55\x04\x07"
	"\x0c\x07\x53\x65\x61\x74\x74\x6c\x65\x31\x22\x30\x20\x06\x03\x55"
	"\x04\x0a\x0c\x19\x49\x6e\x73\x69\x64\x65\x20\x53\x65\x63\x75\x72"
	"\x65\x20\x43\x6f\x72\x70\x6f\x72\x61\x74\x69\x6f\x6e\x31\x0d\x30"
	"\x0b\x06\x03\x55\x04\x0b\x0c\x04\x54\x65\x73\x74\x31\x3a\x30\x38"
	"\x06\x03\x55\x04\x03\x0c\x31\x4d\x61\x74\x72\x69\x78\x53\x53\x4c"
	"\x20\x53\x61\x6d\x70\x6c\x65\x20\x43\x65\x72\x74\x20\x28\x45\x6c"
	"\x6c\x69\x70\x74\x69\x63\x20\x63\x75\x72\x76\x65\x20\x70\x72\x69"
	"\x6d\x65\x31\x39\x32\x76\x31\x29\x30\x49\x30\x13\x06\x07\x2a\x86"
	"\x48\xce\x3d\x02\x01\x06\x08\x2a\x86\x48\xce\x3d\x03\x01\x01\x03"
	"\x32\x00\x04\xca\xe2\x9c\x75\xaa\x63\x72\x2b\x76\x87\x3d\x9a\xaf"
	"\xb6\xb4\xc6\x69\x7a\x0c\xb8\x77\xe7\x30\xf5\x8f\x4e\x78\xb3\x03"
	"\x68\x91\xf6\x32\x58\xc5\x15\x70\x9a\xf8\xdb\xd7\x4b\xa3\x64\x83"
	"\x69\xe6\xd1\xa3\x81\x89\x30\x81\x86\x30\x09\x06\x03\x55\x1d\x13"
	"\x04\x02\x30\x00\x30\x1d\x06\x03\x55\x1d\x0e\x04\x16\x04\x14\x43"
	"\x79\x2b\xcd\x64\x5e\x70\x7e\x35\x05\x72\xc9\x5c\xd2\x4a\xa0\xf4"
	"\xb9\xda\x05\x30\x1f\x06\x03\x55\x1d\x23\x04\x18\x30\x16\x80\x14"
	"\x93\x3f\xb3\x5a\x38\x55\xdd\xb4\xd6\x6e\x84\xcc\x66\xce\x8c\x26"
	"\x5b\x1c\x17\x20\x30\x1d\x06\x03\x55\x1d\x25\x04\x16\x30\x14\x06"
	"\x08\x2b\x06\x01\x05\x05\x07\x03\x01\x06\x08\x2b\x06\x01\x05\x05"
	"\x07\x03\x02\x30\x1a\x06\x03\x55\x1d\x11\x04\x13\x30\x11\x82\x09"
	"\x6c\x6f\x63\x61\x6c\x68\x6f\x73\x74\x87\x04\x7f\x00\x00\x01\x30"
	"\x0a\x06\x08\x2a\x86\x48\xce\x3d\x04\x03\x02\x03\x37\x00\x30\x34"
	"\x02\x18\x78\x76\x4a\x89\x88\x85\x21\x30\xff\x3a\x91\x7a\xae\x50"
	"\x83\x46\x77\x59\xea\xfb\xb1\xaf\x13\xbb\x02\x18\x05\xa1\x90\x96"
	"\x0c\x94\x30\xb7\xc1\x64\xa5\x96\xb1\x67\x3b\xa8\x7a\x92\x87\x7e"
	"\x7b\x4a\x0d\x38";
