summaryrefslogtreecommitdiff
path: root/chromium/net/data/ssl/certificates/README
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/data/ssl/certificates/README')
-rw-r--r--chromium/net/data/ssl/certificates/README228
1 files changed, 228 insertions, 0 deletions
diff --git a/chromium/net/data/ssl/certificates/README b/chromium/net/data/ssl/certificates/README
new file mode 100644
index 00000000000..01f6dfd69c8
--- /dev/null
+++ b/chromium/net/data/ssl/certificates/README
@@ -0,0 +1,228 @@
+This directory contains various certificates for use with SSL-related
+unit tests.
+
+- google.binary.p7b
+- google.chain.pem
+- google.pem_cert.p7b
+- google.pem_pkcs7.p7b
+- google.pkcs7.p7b
+- google.single.der
+- google.single.pem
+- thawte.single.pem : Certificates for testing parsing of different formats.
+
+- googlenew.chain.pem : The refreshed Google certificate
+ (valid until Sept 30 2013).
+
+- mit.davidben.der : An expired MIT client certificate.
+
+- foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity
+ created for testing.
+
+- www_us_army_mil_cert.der
+- dod_ca_17_cert.der
+- dod_root_ca_2_cert.der :
+ A certificate chain used for testing certificate imports
+
+- unosoft_hu_cert : Certificate used by X509CertificateTest.UnoSoftCertParsing.
+
+- client.p12 : A PKCS #12 file containing a client certificate and a private
+ key created for testing. The password is "12345".
+
+- client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
+ as the one in client.p12) but no private key. The password is "12345".
+
+- punycodetest.der : A test self-signed server certificate with punycode name.
+ The common name is "xn--wgv71a119e.com" (日本語.com)
+
+- unittest.selfsigned.der : A self-signed certificate generated using private
+ key in unittest.key.bin. The common name is "unittest".
+
+- unittest.key.bin : private key stored unencrypted.
+
+- unittest.originbound.der: A test origin-bound certificate for
+ https://www.google.com:443.
+- unittest.originbound.key.der: matching PrivateKeyInfo.
+
+- x509_verify_results.chain.pem : A simple certificate chain used to test that
+ the correctly ordered, filtered certificate chain is returned during
+ verification, regardless of the order in which the intermediate/root CA
+ certificates are provided.
+
+- google_diginotar.pem
+- diginotar_public_ca_2025.pem : A certificate chain for the regression test
+ of http://crbug.com/94673
+
+- test_mail_google_com.pem : A certificate signed by the test CA for
+ "mail.google.com". Because it is signed by that CA instead of the true CA
+ for that host, it will fail the
+ TransportSecurityState::IsChainOfPublicKeysPermitted test.
+
+- salesforce_com_test.pem
+- verisign_intermediate_ca_2011.pem
+- verisign_intermediate_ca_2016.pem : Certificates for testing two
+ X509Certificate objects that contain the same server certificate but
+ different intermediate CA certificates. The two intermediate CA
+ certificates actually represent the same intermediate CA but have
+ different validity periods.
+
+- multivalue_rdn.pem : A regression test for http://crbug.com/101009. A
+ certificate with all of the AttributeTypeAndValues stored within a single
+ RelativeDistinguishedName, rather than one AVA per RDN as normally seen.
+
+- unescaped.pem : Regression test for http://crbug.com/102839. Contains
+ characters such as '=' and '"' that would normally be escaped when
+ converting a subject/issuer name to their stringized form.
+
+- 2048-rsa-root.pem
+- {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem
+- {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-ee-by-
+ {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem
+ These certficates are generated by
+ net/data/ssl/scripts/generate-weak-test-chains.sh and used in the
+ RejectWeakKeys test in net/base/x509_certificate_unittest.cc.
+
+- cross-signed-leaf.pem
+- cross-signed-root-md5.pem
+- cross-signed-root-sha1.pem
+ A certificate chain for regression testing http://crbug.com/108514,
+ generated via scripts/generate-cross-signed-certs.sh
+
+- redundant-validated-chain.pem
+- redundant-server-chain.pem
+- redundant-validated-chain-root.pem
+
+ Two chains, A -> B -> C -> D and A -> B -> C2 (C and C2 share the same
+ public key) to test that SSLInfo gets the reconstructed, re-ordered
+ chain instead of the chain as served. See
+ SSLClientSocketTest.VerifyReturnChainProperlyOrdered in
+ net/socket/ssl_client_socket_unittest.cc. These chains are valid until
+ 26 Feb 2022 and are generated by
+ net/data/ssl/scripts/generate-redundant-test-chains.sh.
+
+- comodo.chain.pem : A certificate chain for www.comodo.com which should be
+ recognised as EV. Expires Jun 21 2013.
+
+- ocsp-test-root.pem : A root certificate for the code in
+ net/tools/testserver/minica.py
+
+- spdy_pooling.pem : Used to test the handling of spdy IP connection pooling
+ Generated by using the command
+ "openssl req -x509 -days 3650 -sha1 -extensions req_spdy_pooling \
+ -config ../scripts/ee.cnf -newkey rsa:1024 -text \
+ -out spdy_pooling.pem"
+
+- subjectAltName_sanity_check.pem : Used to test the handling of various types
+ within the subjectAltName extension of a certificate. Generated by using
+ the command
+ "openssl req -x509 -days 3650 -sha1 -extensions req_san_sanity \
+ -config ../scripts/ee.cnf -newkey rsa:1024 -text \
+ -out subjectAltName_sanity_check.pem"
+
+- ndn.ca.crt: "New Dream Network Certificate Authority" root certificate.
+ This is an X.509 v1 certificate that omits the version field. Used to
+ test that the certificate version gets the default value v1.
+
+- websocket_cacert.pem : The testing root CA for testing WebSocket client
+ certificate authentication.
+ This file is used in SSLUITest.TestWSSClientCert.
+
+- websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
+ and a private key created for WebSocket testing. The password is "".
+ This file is used in SSLUITest.TestWSSClientCert.
+
+- android-test-key-rsa.pem
+- android-test-key-dsa.pem
+- android-test-key-dsa-public.pem
+- android-test-key-ecdsa.pem
+- android-test-key-ecdsa-public.pem
+ This is a set of test RSA/DSA/ECDSA keys used by the Android-specific
+ unit test in net/android/keystore_unittest.c. They are used to verify
+ that the OpenSSL-specific wrapper for platform PrivateKey objects
+ works properly. See the generate-android-test-keys.sh script.
+
+- client_1.pem
+- client_1.key
+- client_1_ca.pem
+- client_2.pem
+- client_2.key
+- client_2_ca.pem
+ This is a set of files used to unit test SSL client certificate
+ authentication. These are generated by
+ net/data/ssl/scripts/generate-client-certificates.sh
+ - client_1_ca.pem and client_2_ca.pem are the certificates of
+ two distinct signing CAs.
+ - client_1.pem and client_1.key correspond to the certificate and
+ private key for a first certificate signed by client_1_ca.pem.
+ - client_2.pem and client_2.key correspond to the certificate and
+ private key for a second certificate signed by client_2_ca.pem.
+
+- eku-test-root.pem
+- non-crit-codeSigning-chain.pem
+- crit-codeSigning-chain.pem
+ Two code-signing certificates (eKU: codeSigning; eKU: critical,
+ codeSigning) which we use to test that clients are making sure that web
+ server certs are checked for correct eKU fields (when an eKU field is
+ present). Since codeSigning is not valid for web server auth, the checks
+ should fail.
+
+- duplicate_cn_1.p12
+- duplicate_cn_1.pem
+- duplicate_cn_2.p12
+- duplicate_cn_2.pem
+ Two certificates from the same issuer that share the same common name,
+ but have distinct subject names (namely, their O fields differ). NSS
+ requires that certificates have unique nicknames if they do not share the
+ same subject, and these certificates are used to test that the nickname
+ generation algorithm generates unique nicknames.
+ The .pem versions contain just the certs, while the .p12 versions contain
+ both the cert and a private key, since there are multiple ways to import
+ certificates into NSS.
+
+- aia-cert.pem
+- aia-intermediate.der
+- aia-root.pem
+ A certificate chain which we use to ensure AIA fetching works correctly
+ when using NSS to verify certificates (which uses our HTTP stack).
+ aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL
+ containing the intermediate, which can be served via a URLRequestFilter.
+ aia-intermediate.der is stored in DER form for convenience, since that is
+ the form expected of certificates discovered via AIA.
+
+- cybertrust_gte_root.pem
+- cybertrust_baltimore_root.pem
+- cybertrust_omniroot_chain.pem
+- cybertrust_baltimore_cross_certified_1.pem
+- cybertrust_baltimore_cross_certified_2.pem
+ These certificates are reflect a portion of the CyberTrust (Verizon
+ Business) CA hierarchy. _gte_root.pem is a legacy 1024-bit root that is
+ still widely supported, while _baltimore_root.pem reflects the newer
+ 2048-bit root. For clients that only support the GTE root, two versions
+ of the Baltimore root were cross-signed by GTE, namely
+ _cross_certified_[1,2].pem. _omniroot_chain.pem contains a certificate
+ chain that was issued under the Baltimore root. Combined, these
+ certificates can be used to test real-world cross-signing; in practice,
+ they are used to test certain workarounds for OS X's chain building code.
+
+- no_subject_common_name_cert.pem: Used to test the function that generates a
+ NSS certificate nickname for a user certificate. This certificate's Subject
+ field doesn't have a common name.
+
+- expired_cert.pem
+- ok_cert.pem
+- root_ca_cert.pem
+ These certificates are the common certificates used by the Python test
+ server for simulating HTTPS connections. They are generated by running
+ the script net/data/ssl/scripts/generate-test-certs.sh.
+
+- quic_intermediate.crt
+- quic_test_ecc.example.com.crt
+- quic_test.example.com.crt
+- quic_root.crt
+ These certificates are used by the ProofVerifier's unit tests of QUIC.
+
+- explicit-policy-chain.pem
+ A test certificate chain with requireExplicitPolicy field set on the
+ intermediate, with SkipCerts=0. This is used for regression testing
+ http://crbug.com/31497. It is generated by running the script
+ net/data/ssl/scripts/generate-policy-certs.sh
+