Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(621)

Side by Side Diff: net/data/ssl/certificates/README

Issue 2390493002: Tidy up ssl_platform_key_android_unittest.cc. (Closed)
Patch Set: Regenerate CrOS data Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 This directory contains various certificates for use with SSL-related 1 This directory contains various certificates for use with SSL-related
2 unit tests. 2 unit tests.
3 3
4 ===== Real-world certificates that need manual updating 4 ===== Real-world certificates that need manual updating
5 - google.binary.p7b 5 - google.binary.p7b
6 - google.chain.pem 6 - google.chain.pem
7 - google.pem_cert.p7b 7 - google.pem_cert.p7b
8 - google.pem_pkcs7.p7b 8 - google.pem_pkcs7.p7b
9 - google.pkcs7.p7b 9 - google.pkcs7.p7b
10 - google.single.der 10 - google.single.der
(...skipping 207 matching lines...) Expand 10 before | Expand all | Expand 10 after
218 - client_1.pk8 218 - client_1.pk8
219 - client_1_ca.pem 219 - client_1_ca.pem
220 - client_2.pem 220 - client_2.pem
221 - client_2.key 221 - client_2.key
222 - client_2.pk8 222 - client_2.pk8
223 - client_2_ca.pem 223 - client_2_ca.pem
224 - client_3.pem 224 - client_3.pem
225 - client_3.key 225 - client_3.key
226 - client_3.pk8 226 - client_3.pk8
227 - client_3_ca.pem 227 - client_3_ca.pem
228 - client_4.pem
229 - client_4.key
230 - client_4.pk8
231 - client_4_ca.pem
232 - client_root_ca.pem
228 This is a set of files used to unit test SSL client certificate 233 This is a set of files used to unit test SSL client certificate
229 authentication. 234 authentication.
230 - client_1_ca.pem and client_2_ca.pem are the certificates of 235 - client_1_ca.pem and client_2_ca.pem are the certificates of
231 two distinct signing CAs. 236 two distinct signing CAs.
232 - client_1.pem and client_1.key correspond to the certificate and 237 - client_1.pem and client_1.key correspond to the certificate and
233 private key for a first certificate signed by client_1_ca.pem. 238 private key for a first certificate signed by client_1_ca.pem.
234 - client_2.pem and client_2.key correspond to the certificate and 239 - client_2.pem and client_2.key correspond to the certificate and
235 private key for a second certificate signed by client_2_ca.pem. 240 private key for a second certificate signed by client_2_ca.pem.
236 - each .pk8 file contains the same key as the corresponding .key file 241 - each .pk8 file contains the same key as the corresponding .key file
237 as PKCS#8 PrivateKeyInfo in DER encoding. 242 as PKCS#8 PrivateKeyInfo in DER encoding.
238 - client_3.pem is nearly identical to client_2.pem, except it is used 243 - client_3.pem is nearly identical to client_2.pem, except it is used
239 to test wifi EAP-TLS authentication so it uses a different set 244 to test wifi EAP-TLS authentication so it uses a different set
240 of X509v3 extensions. Specifically it includes two Subject 245 of X509v3 extensions. Specifically it includes two Subject
241 Alternative Name fields recognized by Chrome OS. 246 Alternative Name fields recognized by Chrome OS.
242 247 - client_4.pem is similar to client_2.pem but is a P-256 ECDSA key rather
243 ===== From net/data/ssl/scripts/generate-android-test-key.sh 248 than RSA.
244 - android-test-key-rsa.pem 249 - client_root_ca.pem is the CA certificate which signed client_*_ca.pem.
245 - android-test-key-dsa.pem
246 - android-test-key-dsa-public.pem
247 - android-test-key-ecdsa.pem
248 - android-test-key-ecdsa-public.pem
249 This is a set of test RSA/DSA/ECDSA keys used by the Android-specific
250 unit test in net/android/keystore_unittest.c. They are used to verify
251 that the OpenSSL-specific wrapper for platform PrivateKey objects
252 works properly. See the generate-android-test-keys.sh script.
253 250
254 ===== From net/data/ssl/scripts/generate-bad-eku-certs.sh 251 ===== From net/data/ssl/scripts/generate-bad-eku-certs.sh
255 - eku-test-root.pem 252 - eku-test-root.pem
256 - non-crit-codeSigning-chain.pem 253 - non-crit-codeSigning-chain.pem
257 - crit-codeSigning-chain.pem 254 - crit-codeSigning-chain.pem
258 Two code-signing certificates (eKU: codeSigning; eKU: critical, 255 Two code-signing certificates (eKU: codeSigning; eKU: critical,
259 codeSigning) which we use to test that clients are making sure that web 256 codeSigning) which we use to test that clients are making sure that web
260 server certs are checked for correct eKU fields (when an eKU field is 257 server certs are checked for correct eKU fields (when an eKU field is
261 present). Since codeSigning is not valid for web server auth, the checks 258 present). Since codeSigning is not valid for web server auth, the checks
262 should fail. 259 should fail.
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after
296 aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL 293 aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL
297 containing the intermediate, which can be served via a URLRequestFilter. 294 containing the intermediate, which can be served via a URLRequestFilter.
298 aia-intermediate.der is stored in DER form for convenience, since that is 295 aia-intermediate.der is stored in DER form for convenience, since that is
299 the form expected of certificates discovered via AIA. 296 the form expected of certificates discovered via AIA.
300 297
301 ===== From net/data/ssl/scripts/generate-self-signed-certs.sh 298 ===== From net/data/ssl/scripts/generate-self-signed-certs.sh
302 - self-signed-invalid-name.pem 299 - self-signed-invalid-name.pem
303 - self-signed-invalid-sig.pem 300 - self-signed-invalid-sig.pem
304 Two "self-signed" certificates with mismatched names or an invalid 301 Two "self-signed" certificates with mismatched names or an invalid
305 signature, respectively. 302 signature, respectively.
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698