| OLD | NEW |
| 1 This directory contains various certificates for use with SSL-related | 1 This directory contains various certificates for use with SSL-related |
| 2 unit tests. | 2 unit tests. |
| 3 | 3 |
| 4 ===== Real-world certificates that need manual updating | 4 ===== Real-world certificates that need manual updating |
| 5 - google.binary.p7b | 5 - google.binary.p7b |
| 6 - google.chain.pem | 6 - google.chain.pem |
| 7 - google.pem_cert.p7b | 7 - google.pem_cert.p7b |
| 8 - google.pem_pkcs7.p7b | 8 - google.pem_pkcs7.p7b |
| 9 - google.pkcs7.p7b | 9 - google.pkcs7.p7b |
| 10 - google.single.der | 10 - google.single.der |
| (...skipping 79 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 90 | 90 |
| 91 - unittest.selfsigned.der : A self-signed certificate generated using private | 91 - unittest.selfsigned.der : A self-signed certificate generated using private |
| 92 key in unittest.key.bin. The common name is "unittest". | 92 key in unittest.key.bin. The common name is "unittest". |
| 93 | 93 |
| 94 - unittest.key.bin : private key stored unencrypted. | 94 - unittest.key.bin : private key stored unencrypted. |
| 95 | 95 |
| 96 - unittest.originbound.der: A test origin-bound certificate for | 96 - unittest.originbound.der: A test origin-bound certificate for |
| 97 https://www.google.com:443. | 97 https://www.google.com:443. |
| 98 - unittest.originbound.key.der: matching PrivateKeyInfo. | 98 - unittest.originbound.key.der: matching PrivateKeyInfo. |
| 99 | 99 |
| 100 - x509_verify_results.chain.pem : A simple certificate chain used to test that | |
| 101 the correctly ordered, filtered certificate chain is returned during | |
| 102 verification, regardless of the order in which the intermediate/root CA | |
| 103 certificates are provided. | |
| 104 | |
| 105 - test_mail_google_com.pem : A certificate signed by the test CA for | 100 - test_mail_google_com.pem : A certificate signed by the test CA for |
| 106 "mail.google.com". Because it is signed by that CA instead of the true CA | 101 "mail.google.com". Because it is signed by that CA instead of the true CA |
| 107 for that host, it will fail the | 102 for that host, it will fail the |
| 108 TransportSecurityState::IsChainOfPublicKeysPermitted test. Format | 103 TransportSecurityState::IsChainOfPublicKeysPermitted test. Format |
| 109 intentionally does not include diagnostic output. | 104 intentionally does not include diagnostic output. |
| 110 | 105 |
| 111 - multivalue_rdn.pem : A regression test for http://crbug.com/101009. A | 106 - multivalue_rdn.pem : A regression test for http://crbug.com/101009. A |
| 112 certificate with all of the AttributeTypeAndValues stored within a single | 107 certificate with all of the AttributeTypeAndValues stored within a single |
| 113 RelativeDistinguishedName, rather than one AVA per RDN as normally seen. | 108 RelativeDistinguishedName, rather than one AVA per RDN as normally seen. |
| 114 | 109 |
| (...skipping 22 matching lines...) Expand all Loading... |
| 137 - quic_root.crt | 132 - quic_root.crt |
| 138 These certificates are used by the ProofVerifier's unit tests of QUIC. | 133 These certificates are used by the ProofVerifier's unit tests of QUIC. |
| 139 | 134 |
| 140 ===== From net/data/ssl/scripts/generate-test-certs.sh | 135 ===== From net/data/ssl/scripts/generate-test-certs.sh |
| 141 - expired_cert.pem | 136 - expired_cert.pem |
| 142 - ok_cert.pem | 137 - ok_cert.pem |
| 143 - root_ca_cert.pem | 138 - root_ca_cert.pem |
| 144 These certificates are the common certificates used by the Python test | 139 These certificates are the common certificates used by the Python test |
| 145 server for simulating HTTPS connections. | 140 server for simulating HTTPS connections. |
| 146 | 141 |
| 142 - intermediate_ca_cert.pem |
| 143 - ok_cert_by_intermediate.pem |
| 144 These certificates simulate a more common chain of root (root_ca_cert.pem) |
| 145 to intermediate (intermediate_ca_cert.pem) to leaf |
| 146 (ok_cert_by_intermediate.pem). |
| 147 |
| 147 - wildcard_.pem | 148 - wildcard_.pem |
| 148 A certificate and private key valid for *.example.org, used in various | 149 A certificate and private key valid for *.example.org, used in various |
| 149 net unit tests. | 150 net unit tests. |
| 150 | 151 |
| 151 - name_constraint_bad.pem | 152 - name_constraint_bad.pem |
| 152 - name_constraint_good.pem | 153 - name_constraint_good.pem |
| 153 Two certificates used to test the built-in ability to restrict a root to | 154 Two certificates used to test the built-in ability to restrict a root to |
| 154 a particular namespace. | 155 a particular namespace. |
| 155 | 156 |
| 156 - bad_validity.pem | 157 - bad_validity.pem |
| (...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 190 cannot validate the applicant controls that domain. | 191 cannot validate the applicant controls that domain. |
| 191 | 192 |
| 192 - pre_june_2016.pem | 193 - pre_june_2016.pem |
| 193 - post_june_2016.pem | 194 - post_june_2016.pem |
| 194 Certs to test that policies related to enforcing CT on Symantec are | 195 Certs to test that policies related to enforcing CT on Symantec are |
| 195 properly gated on the issuance date. | 196 properly gated on the issuance date. |
| 196 | 197 |
| 197 - tls_feature_extension.pem | 198 - tls_feature_extension.pem |
| 198 A certificate that contains the TLS Feature Extension. | 199 A certificate that contains the TLS Feature Extension. |
| 199 | 200 |
| 201 - x509_verify_results.chain.pem : A simple certificate chain used to test that |
| 202 the correctly ordered, filtered certificate chain is returned during |
| 203 verification, regardless of the order in which the intermediate/root CA |
| 204 certificates are provided. |
| 205 |
| 200 ===== From net/data/ssl/scripts/generate-weak-test-chains.sh | 206 ===== From net/data/ssl/scripts/generate-weak-test-chains.sh |
| 201 - 2048-rsa-root.pem | 207 - 2048-rsa-root.pem |
| 202 - {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem | 208 - {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem |
| 203 - {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-ee-by- | 209 - {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-ee-by- |
| 204 {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem | 210 {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem |
| 205 Test certificates used to ensure that weak keys are detected and rejected | 211 Test certificates used to ensure that weak keys are detected and rejected |
| 206 | 212 |
| 207 ===== From net/data/ssl/scripts/generate-cross-signed-certs.sh | 213 ===== From net/data/ssl/scripts/generate-cross-signed-certs.sh |
| 208 - cross-signed-leaf.pem | 214 - cross-signed-leaf.pem |
| 209 - cross-signed-root-md5.pem | 215 - cross-signed-root-md5.pem |
| (...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 310 aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL | 316 aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL |
| 311 containing the intermediate, which can be served via a URLRequestFilter. | 317 containing the intermediate, which can be served via a URLRequestFilter. |
| 312 aia-intermediate.der is stored in DER form for convenience, since that is | 318 aia-intermediate.der is stored in DER form for convenience, since that is |
| 313 the form expected of certificates discovered via AIA. | 319 the form expected of certificates discovered via AIA. |
| 314 | 320 |
| 315 ===== From net/data/ssl/scripts/generate-self-signed-certs.sh | 321 ===== From net/data/ssl/scripts/generate-self-signed-certs.sh |
| 316 - self-signed-invalid-name.pem | 322 - self-signed-invalid-name.pem |
| 317 - self-signed-invalid-sig.pem | 323 - self-signed-invalid-sig.pem |
| 318 Two "self-signed" certificates with mismatched names or an invalid | 324 Two "self-signed" certificates with mismatched names or an invalid |
| 319 signature, respectively. | 325 signature, respectively. |
| OLD | NEW |