/**
 *	@file    testkeys/EC/384_EC_CA.h
 *	@version 8e6f0e1 (HEAD -> master)
 *
 *	Auto generated from PEM file.
 */
/*
	Auto generated X.509 certificate as binary DER.
Certificate:
    Data:
        Version: 3
        Serial Number:
            23:28
        Issuer: CN=MatrixSSL Sample CA (Elliptic curve secp384r1), C=US, ST=WA, L=Seattle, O=Inside Secure Corporation, OU=Test
        Validity:
            Not Before: 2014/03/13
            Not After : 2017/03/12
        Subject: CN=MatrixSSL Sample CA (Elliptic curve secp384r1), C=US, ST=WA, L=Seattle, O=Inside Secure Corporation, OU=Test
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (384 bit)
                pub:
                    9e:04:34:99:ef:8a:25:1d:84:f2:f2:40:c4:d5:d1:53:
                    7d:54:ec:20:36:df:1a:e2:e4:70:f8:d3:39:a0:39:18:
                    3d:b1:fa:2d:ec:a2:c1:46:df:6d:94:8f:de:dc:d2:3d
                    19:2f:16:ec:52:58:3a:80:c1:c3:bf:85:27:16:42:07:
                    e0:02:f1:d7:95:c9:10:ec:b0:a0:98:8a:42:b5:51:e8:
                    21:fb:29:af:f9:45:a8:b2:76:10:46:ef:e4:ec:df:c1
                ASN1 OID: secp384r1
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:TRUE
            X509v3 Key Usage: 0x4
            X509v3 Extended Key Usage: 0x0
            X509v3 Subject Key Identifier:
                44:ed:fc:8b:17:42:6e:61:f6:35:93:3d:3f:81:97:6f:
                67:68:5a:1b
            X509v3 Authority Key Identifier:
                44:ed:fc:8b:17:42:6e:61:f6:35:93:3d:3f:81:97:6f:
                67:68:5a:1b
    Signature Algorithm: ecdsa-with-SHA384
        30:65:02:31:00:d4:64:ae:1c:db:14:f8:91:c8:17:d4:
        ef:d0:8b:36:6e:f6:47:65:e5:b6:e8:ed:e4:b5:6d:44:
        b8:70:60:a1:bb:bb:68:19:29:82:a4:fa:d5:e7:9f:0f:
        b4:f9:a4:db:95:02:30:3e:b6:30:06:6d:ad:f0:25:08:
        b6:30:fa:ce:84:33:2b:d6:c2:ae:6c:85:cc:42:cc:02:
        19:0c:18:7b:55:7b:17:3c:e7:ce:14:4f:74:80:29:cd:
        98:87:4d:46:58:a4:de
*/
#define EC384CA_SIZE	704
const static unsigned char EC384CA[EC384CA_SIZE] =
	"\x30\x82\x02\xbc\x30\x82\x02\x42\xa0\x03\x02\x01\x02\x02\x02\x23"
	"\x28\x30\x0a\x06\x08\x2a\x86\x48\xce\x3d\x04\x03\x03\x30\x81\x98"
	"\x31\x0b\x30\x09\x06\x03\x55\x04\x06\x13\x02\x55\x53\x31\x0b\x30"
	"\x09\x06\x03\x55\x04\x08\x0c\x02\x57\x41\x31\x10\x30\x0e\x06\x03"
	"\x55\x04\x07\x0c\x07\x53\x65\x61\x74\x74\x6c\x65\x31\x22\x30\x20"
	"\x06\x03\x55\x04\x0a\x0c\x19\x49\x6e\x73\x69\x64\x65\x20\x53\x65"
	"\x63\x75\x72\x65\x20\x43\x6f\x72\x70\x6f\x72\x61\x74\x69\x6f\x6e"
	"\x31\x0d\x30\x0b\x06\x03\x55\x04\x0b\x0c\x04\x54\x65\x73\x74\x31"
	"\x37\x30\x35\x06\x03\x55\x04\x03\x0c\x2e\x4d\x61\x74\x72\x69\x78"
	"\x53\x53\x4c\x20\x53\x61\x6d\x70\x6c\x65\x20\x43\x41\x20\x28\x45"
	"\x6c\x6c\x69\x70\x74\x69\x63\x20\x63\x75\x72\x76\x65\x20\x73\x65"
	"\x63\x70\x33\x38\x34\x72\x31\x29\x30\x1e\x17\x0d\x31\x34\x30\x33"
	"\x31\x33\x32\x33\x32\x31\x32\x37\x5a\x17\x0d\x31\x37\x30\x33\x31"
	"\x32\x32\x33\x32\x31\x32\x37\x5a\x30\x81\x98\x31\x0b\x30\x09\x06"
	"\x03\x55\x04\x06\x13\x02\x55\x53\x31\x0b\x30\x09\x06\x03\x55\x04"
	"\x08\x0c\x02\x57\x41\x31\x10\x30\x0e\x06\x03\x55\x04\x07\x0c\x07"
	"\x53\x65\x61\x74\x74\x6c\x65\x31\x22\x30\x20\x06\x03\x55\x04\x0a"
	"\x0c\x19\x49\x6e\x73\x69\x64\x65\x20\x53\x65\x63\x75\x72\x65\x20"
	"\x43\x6f\x72\x70\x6f\x72\x61\x74\x69\x6f\x6e\x31\x0d\x30\x0b\x06"
	"\x03\x55\x04\x0b\x0c\x04\x54\x65\x73\x74\x31\x37\x30\x35\x06\x03"
	"\x55\x04\x03\x0c\x2e\x4d\x61\x74\x72\x69\x78\x53\x53\x4c\x20\x53"
	"\x61\x6d\x70\x6c\x65\x20\x43\x41\x20\x28\x45\x6c\x6c\x69\x70\x74"
	"\x69\x63\x20\x63\x75\x72\x76\x65\x20\x73\x65\x63\x70\x33\x38\x34"
	"\x72\x31\x29\x30\x76\x30\x10\x06\x07\x2a\x86\x48\xce\x3d\x02\x01"
	"\x06\x05\x2b\x81\x04\x00\x22\x03\x62\x00\x04\x9e\x04\x34\x99\xef"
	"\x8a\x25\x1d\x84\xf2\xf2\x40\xc4\xd5\xd1\x53\x7d\x54\xec\x20\x36"
	"\xdf\x1a\xe2\xe4\x70\xf8\xd3\x39\xa0\x39\x18\x3d\xb1\xfa\x2d\xec"
	"\xa2\xc1\x46\xdf\x6d\x94\x8f\xde\xdc\xd2\x3d\x19\x2f\x16\xec\x52"
	"\x58\x3a\x80\xc1\xc3\xbf\x85\x27\x16\x42\x07\xe0\x02\xf1\xd7\x95"
	"\xc9\x10\xec\xb0\xa0\x98\x8a\x42\xb5\x51\xe8\x21\xfb\x29\xaf\xf9"
	"\x45\xa8\xb2\x76\x10\x46\xef\xe4\xec\xdf\xc1\xa3\x5d\x30\x5b\x30"
	"\x0b\x06\x03\x55\x1d\x0f\x04\x04\x03\x02\x02\x04\x30\x1d\x06\x03"
	"\x55\x1d\x0e\x04\x16\x04\x14\x44\xed\xfc\x8b\x17\x42\x6e\x61\xf6"
	"\x35\x93\x3d\x3f\x81\x97\x6f\x67\x68\x5a\x1b\x30\x1f\x06\x03\x55"
	"\x1d\x23\x04\x18\x30\x16\x80\x14\x44\xed\xfc\x8b\x17\x42\x6e\x61"
	"\xf6\x35\x93\x3d\x3f\x81\x97\x6f\x67\x68\x5a\x1b\x30\x0c\x06\x03"
	"\x55\x1d\x13\x04\x05\x30\x03\x01\x01\xff\x30\x0a\x06\x08\x2a\x86"
	"\x48\xce\x3d\x04\x03\x03\x03\x68\x00\x30\x65\x02\x31\x00\xd4\x64"
	"\xae\x1c\xdb\x14\xf8\x91\xc8\x17\xd4\xef\xd0\x8b\x36\x6e\xf6\x47"
	"\x65\xe5\xb6\xe8\xed\xe4\xb5\x6d\x44\xb8\x70\x60\xa1\xbb\xbb\x68"
	"\x19\x29\x82\xa4\xfa\xd5\xe7\x9f\x0f\xb4\xf9\xa4\xdb\x95\x02\x30"
	"\x3e\xb6\x30\x06\x6d\xad\xf0\x25\x08\xb6\x30\xfa\xce\x84\x33\x2b"
	"\xd6\xc2\xae\x6c\x85\xcc\x42\xcc\x02\x19\x0c\x18\x7b\x55\x7b\x17"
	"\x3c\xe7\xce\x14\x4f\x74\x80\x29\xcd\x98\x87\x4d\x46\x58\xa4\xde";
