Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(70)

Side by Side Diff: net/data/ssl/certificates/README

Issue 2390493002: Tidy up ssl_platform_key_android_unittest.cc. (Closed)
Patch Set: Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 This directory contains various certificates for use with SSL-related 1 This directory contains various certificates for use with SSL-related
2 unit tests. 2 unit tests.
3 3
4 ===== Real-world certificates that need manual updating 4 ===== Real-world certificates that need manual updating
5 - google.binary.p7b 5 - google.binary.p7b
6 - google.chain.pem 6 - google.chain.pem
7 - google.pem_cert.p7b 7 - google.pem_cert.p7b
8 - google.pem_pkcs7.p7b 8 - google.pem_pkcs7.p7b
9 - google.pkcs7.p7b 9 - google.pkcs7.p7b
10 - google.single.der 10 - google.single.der
(...skipping 207 matching lines...) Expand 10 before | Expand all | Expand 10 after
218 - client_1.pk8 218 - client_1.pk8
219 - client_1_ca.pem 219 - client_1_ca.pem
220 - client_2.pem 220 - client_2.pem
221 - client_2.key 221 - client_2.key
222 - client_2.pk8 222 - client_2.pk8
223 - client_2_ca.pem 223 - client_2_ca.pem
224 - client_3.pem 224 - client_3.pem
225 - client_3.key 225 - client_3.key
226 - client_3.pk8 226 - client_3.pk8
227 - client_3_ca.pem 227 - client_3_ca.pem
228 - client_4.pem
229 - client_4.key
230 - client_4.pk8
231 - client_4_ca.pem
228 This is a set of files used to unit test SSL client certificate 232 This is a set of files used to unit test SSL client certificate
229 authentication. 233 authentication.
230 - client_1_ca.pem and client_2_ca.pem are the certificates of 234 - client_1_ca.pem and client_2_ca.pem are the certificates of
231 two distinct signing CAs. 235 two distinct signing CAs.
232 - client_1.pem and client_1.key correspond to the certificate and 236 - client_1.pem and client_1.key correspond to the certificate and
233 private key for a first certificate signed by client_1_ca.pem. 237 private key for a first certificate signed by client_1_ca.pem.
234 - client_2.pem and client_2.key correspond to the certificate and 238 - client_2.pem and client_2.key correspond to the certificate and
235 private key for a second certificate signed by client_2_ca.pem. 239 private key for a second certificate signed by client_2_ca.pem.
236 - each .pk8 file contains the same key as the corresponding .key file 240 - each .pk8 file contains the same key as the corresponding .key file
237 as PKCS#8 PrivateKeyInfo in DER encoding. 241 as PKCS#8 PrivateKeyInfo in DER encoding.
238 - client_3.pem is nearly identical to client_2.pem, except it is used 242 - client_3.pem is nearly identical to client_2.pem, except it is used
239 to test wifi EAP-TLS authentication so it uses a different set 243 to test wifi EAP-TLS authentication so it uses a different set
240 of X509v3 extensions. Specifically it includes two Subject 244 of X509v3 extensions. Specifically it includes two Subject
241 Alternative Name fields recognized by Chrome OS. 245 Alternative Name fields recognized by Chrome OS.
242 246 - client_4.pem is similar to client_2.pem but is a P-256 ECDSA key rather
243 ===== From net/data/ssl/scripts/generate-android-test-key.sh 247 than RSA.
244 - android-test-key-rsa.pem
245 - android-test-key-dsa.pem
246 - android-test-key-dsa-public.pem
247 - android-test-key-ecdsa.pem
248 - android-test-key-ecdsa-public.pem
249 This is a set of test RSA/DSA/ECDSA keys used by the Android-specific
250 unit test in net/android/keystore_unittest.c. They are used to verify
251 that the OpenSSL-specific wrapper for platform PrivateKey objects
252 works properly. See the generate-android-test-keys.sh script.
253 248
254 ===== From net/data/ssl/scripts/generate-bad-eku-certs.sh 249 ===== From net/data/ssl/scripts/generate-bad-eku-certs.sh
255 - eku-test-root.pem 250 - eku-test-root.pem
256 - non-crit-codeSigning-chain.pem 251 - non-crit-codeSigning-chain.pem
257 - crit-codeSigning-chain.pem 252 - crit-codeSigning-chain.pem
258 Two code-signing certificates (eKU: codeSigning; eKU: critical, 253 Two code-signing certificates (eKU: codeSigning; eKU: critical,
259 codeSigning) which we use to test that clients are making sure that web 254 codeSigning) which we use to test that clients are making sure that web
260 server certs are checked for correct eKU fields (when an eKU field is 255 server certs are checked for correct eKU fields (when an eKU field is
261 present). Since codeSigning is not valid for web server auth, the checks 256 present). Since codeSigning is not valid for web server auth, the checks
262 should fail. 257 should fail.
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after
296 aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL 291 aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL
297 containing the intermediate, which can be served via a URLRequestFilter. 292 containing the intermediate, which can be served via a URLRequestFilter.
298 aia-intermediate.der is stored in DER form for convenience, since that is 293 aia-intermediate.der is stored in DER form for convenience, since that is
299 the form expected of certificates discovered via AIA. 294 the form expected of certificates discovered via AIA.
300 295
301 ===== From net/data/ssl/scripts/generate-self-signed-certs.sh 296 ===== From net/data/ssl/scripts/generate-self-signed-certs.sh
302 - self-signed-invalid-name.pem 297 - self-signed-invalid-name.pem
303 - self-signed-invalid-sig.pem 298 - self-signed-invalid-sig.pem
304 Two "self-signed" certificates with mismatched names or an invalid 299 Two "self-signed" certificates with mismatched names or an invalid
305 signature, respectively. 300 signature, respectively.
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698