This test verifies behavior when a certificate has an unparseable/unsupported SPKI. It should be handled equivalently to a certificate with a failed signature verification: further processing should be shortcircuited. The certificate chain has 2 problems:
The verification should fail with only the SPKI parsing error, since further processing should be short-circuited.
Instructions for generating test certificate chain:
cp ../expired-target/chain.pem .int-pre.pemprint_certificates --output=der2ascii int-pre.pem > int.derasciiint.derascii to replace SPKI OID with something invalidint.tbs.derascii ascii2der < int.tbs.derascii > int.tbs.deropenssl pkeyutl -sign -rawin -in int.tbs.der -digest sha256 -inkey ../expired-target/keys/Root.key -out - | xxd -p -c 0int.derasciiascii2der < int.derascii > int.derprint_certificates --output=openssl_text,pem int.der > int.pemchain.pem with the contents of int.pem