• Home
Name Date Size #Lines LOC

..--

1024-rsa-ee-by-1024-rsa-intermediate.pemD06-Sep-20243 KiB6260

1024-rsa-ee-by-2048-rsa-intermediate.pemD06-Sep-20243.7 KiB7270

1024-rsa-ee-by-768-rsa-intermediate.pemD06-Sep-20242.9 KiB5957

1024-rsa-ee-by-prime256v1-ecdsa-intermediate.pemD06-Sep-20242.8 KiB5755

1024-rsa-intermediate.pemD06-Sep-20243.2 KiB6463

10_year_validity.pemD06-Sep-20244.6 KiB8685

11_year_validity.pemD06-Sep-20244.6 KiB8685

2029_globalsign_com_cert.pemD06-Sep-20241.9 KiB3231

2048-rsa-ee-by-1024-rsa-intermediate.pemD06-Sep-20243.8 KiB7472

2048-rsa-ee-by-2048-rsa-intermediate.pemD06-Sep-20244.4 KiB8381

2048-rsa-ee-by-768-rsa-intermediate.pemD06-Sep-20243.6 KiB7169

2048-rsa-ee-by-prime256v1-ecdsa-intermediate.pemD06-Sep-20243.5 KiB6866

2048-rsa-intermediate.pemD06-Sep-20243.9 KiB7675

2048-rsa-root.pemD06-Sep-20244 KiB7675

398_days_1_second_after_2020_09_01.pemD06-Sep-20244.6 KiB8685

398_days_after_2020_09_01.pemD06-Sep-20244.6 KiB8685

399_days_after_2020_09_01.pemD06-Sep-20244.6 KiB8685

39_months_after_2015_04.pemD06-Sep-20244.6 KiB8685

39_months_based_on_last_day.pemD06-Sep-20244.6 KiB8685

40_months_after_2015_04.pemD06-Sep-20244.6 KiB8685

60_months_after_2012_07.pemD06-Sep-20244.6 KiB8685

61_months_after_2012_07.pemD06-Sep-20244.6 KiB8685

768-rsa-ee-by-1024-rsa-intermediate.pemD06-Sep-20242.9 KiB5957

768-rsa-ee-by-2048-rsa-intermediate.pemD06-Sep-20243.5 KiB6967

768-rsa-ee-by-768-rsa-intermediate.pemD06-Sep-20242.7 KiB5654

768-rsa-ee-by-prime256v1-ecdsa-intermediate.pemD06-Sep-20242.6 KiB5452

768-rsa-intermediate.pemD06-Sep-20243 KiB6160

825_days_1_second_after_2018_03_01.pemD06-Sep-20244.6 KiB8685

825_days_after_2018_03_01.pemD06-Sep-20244.6 KiB8685

826_days_after_2018_03_01.pemD06-Sep-20244.6 KiB8685

900_days_after_2019_07_01.pemD06-Sep-20244.6 KiB8685

BUILD.gnD06-Sep-2024447 1412

READMED06-Sep-202412.5 KiB311261

bad_validity.pemD06-Sep-20246.1 KiB113112

can_sign_http_exchanges_draft_extension.pemD06-Sep-20241.3 KiB2322

can_sign_http_exchanges_draft_extension_invalid.pemD06-Sep-20241.3 KiB2322

client-empty-password.p12D06-Sep-20242.3 KiB

client-nokey.p12D06-Sep-2024895

client-null-password.p12D06-Sep-20242.3 KiB

client.p12D06-Sep-20241.7 KiB

client_1.keyD06-Sep-20241.7 KiB2928

client_1.pemD06-Sep-20244.1 KiB7978

client_1.pk8D06-Sep-20241.2 KiB

client_1_ca.pemD06-Sep-20244 KiB7978

client_2.keyD06-Sep-20241.7 KiB2928

client_2.pemD06-Sep-20244.1 KiB7978

client_2.pk8D06-Sep-20241.2 KiB

client_2_ca.pemD06-Sep-20244 KiB7978

client_3.keyD06-Sep-20241.7 KiB2928

client_3.pemD06-Sep-20244.1 KiB7877

client_3.pk8D06-Sep-20241.2 KiB

client_3_ca.pemD06-Sep-20244 KiB7978

client_4.keyD06-Sep-2024227 65

client_4.pemD06-Sep-20243 KiB6362

client_4.pk8D06-Sep-2024138

client_4_ca.pemD06-Sep-20244 KiB7978

client_5.keyD06-Sep-2024288 76

client_5.pemD06-Sep-20243.2 KiB6564

client_5.pk8D06-Sep-2024185

client_5_ca.pemD06-Sep-20244 KiB7978

client_6.keyD06-Sep-2024365 87

client_6.pemD06-Sep-20243.4 KiB6867

client_6.pk8D06-Sep-2024241

client_6_ca.pemD06-Sep-20244 KiB7978

client_7.keyD06-Sep-2024916 1716

client_7.pemD06-Sep-20243.4 KiB6766

client_7.pk8D06-Sep-2024636

client_7_ca.pemD06-Sep-20244 KiB7978

client_root_ca.pemD06-Sep-20241.1 KiB1918

common_name_only.pemD06-Sep-20246.1 KiB112111

crit-codeSigning-chain.pemD06-Sep-20246 KiB111110

crlset_blocked_interception_by_intermediate.rawD06-Sep-2024224

crlset_blocked_interception_by_root.rawD06-Sep-2024224

crlset_by_intermediate_serial.rawD06-Sep-2024231

crlset_by_leaf_spki.rawD06-Sep-2024224

crlset_by_leaf_subject_no_spki.rawD06-Sep-2024228

crlset_by_root_serial.rawD06-Sep-2024231

crlset_by_root_spki.rawD06-Sep-2024224

crlset_by_root_subject.rawD06-Sep-2024274

crlset_by_root_subject_no_spki.rawD06-Sep-2024228

crlset_known_interception_by_root.rawD06-Sep-2024224

cronet-quic-chain.pemD06-Sep-20248.3 KiB160159

cronet-quic-leaf-cert.keyD06-Sep-20241.2 KiB

cronet-quic-leaf-cert.key.pkcs8.pemD06-Sep-20241.7 KiB2928

cronet-quic-root.pemD06-Sep-20241.1 KiB2019

cross-signed-leaf.pemD06-Sep-20244.4 KiB8381

cross-signed-root-md5.pemD06-Sep-20244 KiB7675

cross-signed-root-sha256.pemD06-Sep-20244 KiB7675

ct-test-embedded-cert.pemD06-Sep-20246.5 KiB127124

ct-test-embedded-with-intermediate-chain.pemD06-Sep-20249.6 KiB189185

ct-test-embedded-with-intermediate-preca-chain.pemD06-Sep-20249.6 KiB189185

ct-test-embedded-with-preca-chain.pemD06-Sep-20246.5 KiB128125

ct-test-embedded-with-uids.pemD06-Sep-20244.2 KiB8280

dec_2017.pemD06-Sep-20244.6 KiB8685

diginotar_cyber_ca.pemD06-Sep-20241.9 KiB3331

diginotar_pkioverheid.pemD06-Sep-20241.6 KiB2927

diginotar_pkioverheid_g2.pemD06-Sep-20242.3 KiB3938

diginotar_public_ca_2025.pemD06-Sep-20242.1 KiB3635

diginotar_root_ca.pemD06-Sep-20241.9 KiB3332

diginotar_services_1024_ca.pemD06-Sep-20241.3 KiB2423

duplicate_cn_1.p12D06-Sep-20242.3 KiB

duplicate_cn_1.pemD06-Sep-20244.1 KiB7977

duplicate_cn_2.p12D06-Sep-20242.3 KiB

duplicate_cn_2.pemD06-Sep-20244.1 KiB7977

ec-prime256v1-1.keyD06-Sep-2024241 65

ec-prime256v1-2.keyD06-Sep-2024241 65

ec-prime256v1-3.keyD06-Sep-2024241 65

eku-test-root.pemD06-Sep-20244 KiB7877

ev_test.pemD06-Sep-20243.8 KiB7170

ev_test_state_only.pemD06-Sep-20243.7 KiB7069

expired_cert.pemD06-Sep-20246.2 KiB114113

foaf.me.chromium-test-cert.derD06-Sep-2024990

google.binary.p7bD06-Sep-20241.6 KiB

google.chain.pemD06-Sep-20242.2 KiB3838

google.pem_cert.p7bD06-Sep-20242.3 KiB3837

google.pem_pkcs7.p7bD06-Sep-20242.2 KiB3837

google.single.derD06-Sep-2024805

google.single.pemD06-Sep-20241.1 KiB1919

google_diginotar.pemD06-Sep-20241.8 KiB3130

intermediate_ca_cert.pemD06-Sep-20246.1 KiB111110

invalid_key_usage_cert.derD06-Sep-2024940

key_usage_p256.keyD06-Sep-2024241 65

key_usage_p256_both.pemD06-Sep-20242.1 KiB4645

key_usage_p256_digitalsignature.pemD06-Sep-20242 KiB4645

key_usage_p256_keyagreement.pemD06-Sep-20242 KiB4645

key_usage_p256_no_extension.pemD06-Sep-20241.9 KiB4241

key_usage_rsa.keyD06-Sep-20241.7 KiB2928

key_usage_rsa_both.pemD06-Sep-20245.6 KiB101100

key_usage_rsa_digitalsignature.pemD06-Sep-20245.5 KiB10099

key_usage_rsa_keyencipherment.pemD06-Sep-20245.4 KiB10099

key_usage_rsa_no_extension.pemD06-Sep-20245.4 KiB9796

large_key.pemD06-Sep-202411.9 KiB197196

leaf_from_known_root.pemD06-Sep-202426.6 KiB667660

lets-encrypt-dst-x3-root.pemD06-Sep-202424.5 KiB465443

lets-encrypt-isrg-x1-root.pemD06-Sep-202420.6 KiB381366

localhost_cert.pemD06-Sep-20246.2 KiB114113

may_2018.pemD06-Sep-20244.6 KiB8685

mit.davidben.derD06-Sep-2024965

multi-root-A-by-B.pemD06-Sep-20246 KiB110108

multi-root-B-by-C.pemD06-Sep-20243.9 KiB7574

multi-root-B-by-F.pemD06-Sep-20243.9 KiB7574

multi-root-C-by-D.pemD06-Sep-20243.9 KiB7574

multi-root-C-by-E.pemD06-Sep-20243.9 KiB7574

multi-root-D-by-D.pemD06-Sep-20243.9 KiB7675

multi-root-E-by-E.pemD06-Sep-20243.9 KiB7675

multi-root-F-by-E.pemD06-Sep-20243.9 KiB7574

multi-root-chain1.pemD06-Sep-202416.2 KiB306304

multi-root-chain2.pemD06-Sep-202416.2 KiB306304

multi-root-crlset-C.rawD06-Sep-2024155

multi-root-crlset-CD-and-FE.rawD06-Sep-2024187

multi-root-crlset-D-and-E.rawD06-Sep-2024203

multi-root-crlset-E.rawD06-Sep-2024155

multi-root-crlset-unrelated.rawD06-Sep-2024148

multi-root.keychainD06-Sep-202432.3 KiB

multivalue_rdn.pemD06-Sep-20243 KiB6058

name_constrained_key.pemD06-Sep-20241.7 KiB2928

ndn.ca.crtD06-Sep-20242.1 KiB3635

nist.derD06-Sep-20241.3 KiB

no_subject_common_name_cert.pemD06-Sep-20245.7 KiB110104

non-crit-codeSigning-chain.pemD06-Sep-20246 KiB111110

ok_cert.pemD06-Sep-20246.2 KiB114113

ok_cert_by_intermediate.pemD06-Sep-202410.7 KiB196195

policies_sanity_check.pemD06-Sep-20244.9 KiB9493

post_june_2016.pemD06-Sep-20244.6 KiB8685

pre_br_validity_bad_121.pemD06-Sep-20244.6 KiB8685

pre_br_validity_bad_2020.pemD06-Sep-20244.6 KiB8685

pre_br_validity_ok.pemD06-Sep-20244.6 KiB8685

pre_june_2016.pemD06-Sep-20244.6 KiB8685

prime256v1-ecdsa-ee-by-1024-rsa-intermediate.pemD06-Sep-20242.7 KiB5654

prime256v1-ecdsa-ee-by-2048-rsa-intermediate.pemD06-Sep-20243.3 KiB6664

prime256v1-ecdsa-ee-by-768-rsa-intermediate.pemD06-Sep-20242.5 KiB5452

prime256v1-ecdsa-ee-by-prime256v1-ecdsa-intermediate.pemD06-Sep-20242.4 KiB5149

prime256v1-ecdsa-intermediate.pemD06-Sep-20242.9 KiB5958

punycodetest.pemD06-Sep-20244.2 KiB7978

quic-chain.pemD06-Sep-20247.7 KiB148147

quic-ecdsa-leaf.keyD06-Sep-2024138

quic-leaf-cert.keyD06-Sep-20241.2 KiB

quic-leaf-cert.key.pkcs8.pemD06-Sep-20241.7 KiB2928

quic-leaf-cert.key.sctD06-Sep-202433

quic-root.pemD06-Sep-20241 KiB1918

quic-short-lived.pemD06-Sep-20241.9 KiB4342

redundant-server-chain.pemD06-Sep-202417.7 KiB334332

redundant-validated-chain-root.pemD06-Sep-20244 KiB7675

redundant-validated-chain.pemD06-Sep-202413.8 KiB260258

root_ca_cert.pemD06-Sep-20246 KiB109108

rsa-1024-1.keyD06-Sep-2024920 1716

rsa-1024-2.keyD06-Sep-2024916 1716

rsa-1024-3.keyD06-Sep-2024916 1716

rsa-2048-1.keyD06-Sep-20241.7 KiB2928

rsa-2048-2.keyD06-Sep-20241.7 KiB2928

rsa-2048-3.keyD06-Sep-20241.7 KiB2928

rsa-768-1.keyD06-Sep-2024721 1413

rsa-768-2.keyD06-Sep-2024721 1413

rsa-768-3.keyD06-Sep-2024717 1413

rsa-8200-1.keyD06-Sep-20246.2 KiB101100

salesforce_com_test.pemD06-Sep-20244.3 KiB8278

self-signed-invalid-name.pemD06-Sep-20243.8 KiB7069

self-signed-invalid-sig.pemD06-Sep-20243.8 KiB7069

sha1_2016.pemD06-Sep-20244.6 KiB8685

sha1_leaf.pemD06-Sep-20246.2 KiB114113

spdy_pooling.pemD06-Sep-20244.3 KiB8079

start_after_expiry.pemD06-Sep-20244.6 KiB8685

subjectAltName_sanity_check.pemD06-Sep-20244.5 KiB8382

subjectAltName_www_example_com.pemD06-Sep-20244.3 KiB8180

test_names.pemD06-Sep-20246.4 KiB115114

treadclimber.pemD06-Sep-202412.5 KiB228213

treadclimber.sctlistD06-Sep-2024484

unescaped.pemD06-Sep-20243.4 KiB6361

unittest.key.binD06-Sep-2024635

unittest.selfsigned.derD06-Sep-2024414

verisign_intermediate_ca_2011.pemD06-Sep-20243.7 KiB7269

verisign_intermediate_ca_2016.pemD06-Sep-20243.7 KiB7269

weak_digest_md2_ee.pemD06-Sep-20243.1 KiB6260

weak_digest_md2_intermediate.pemD06-Sep-20242.8 KiB5856

weak_digest_md2_root.pemD06-Sep-2024778 1514

weak_digest_md4_ee.pemD06-Sep-20243.1 KiB6260

weak_digest_md4_intermediate.pemD06-Sep-20242.8 KiB5856

weak_digest_md4_root.pemD06-Sep-2024778 1514

weak_digest_md5_ee.pemD06-Sep-20243.1 KiB6260

weak_digest_md5_intermediate.pemD06-Sep-20242.8 KiB5856

weak_digest_md5_root.pemD06-Sep-2024778 1514

weak_digest_sha1_ee.pemD06-Sep-20243.1 KiB6260

weak_digest_sha1_intermediate.pemD06-Sep-20242.8 KiB5856

weak_digest_sha1_root.pemD06-Sep-2024778 1514

websocket_cacert.pemD06-Sep-20243.1 KiB6260

websocket_client_cert.p12D06-Sep-20242.5 KiB

wildcard.pemD06-Sep-20246.3 KiB114113

x509_verify_results.chain.pemD06-Sep-202413.3 KiB248247

README

1This directory contains various certificates for use with SSL-related
2unit tests.
3
4===== Real-world certificates that need manual updating
5- google.binary.p7b
6- google.chain.pem
7- google.pem_cert.p7b
8- google.pem_pkcs7.p7b
9- google.pkcs7.p7b
10- google.single.der
11- google.single.pem : Certificates for testing parsing of different formats.
12
13- mit.davidben.der : An expired MIT client certificate.
14
15- foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity
16     created for testing.
17
18- google_diginotar.pem
19- diginotar_public_ca_2025.pem : A certificate chain for the regression test
20      of http://crbug.com/94673
21
22- salesforce_com_test.pem
23- verisign_intermediate_ca_2011.pem
24- verisign_intermediate_ca_2016.pem : Certificates for testing two
25     X509Certificate objects that contain the same server certificate but
26     different intermediate CA certificates.  The two intermediate CA
27     certificates actually represent the same intermediate CA but have
28     different validity periods.
29
30- ndn.ca.crt: "New Dream Network Certificate Authority" root certificate.
31     This is an X.509 v1 certificate that omits the version field. Used to
32     test that the certificate version gets the default value v1.
33
34- ct-test-embedded-cert.pem
35- ct-test-embedded-with-intermediate-chain.pem
36- ct-test-embedded-with-intermediate-preca-chain.pem
37- ct-test-embedded-with-preca-chain.pem
38     Test certificate chains for Certificate Transparency: Each of these
39     files contains a leaf certificate as the first certificate, which has
40     embedded SCTs, followed by the issuer certificates chain.
41     All files are from the src/test/testdada directory in
42     https://code.google.com/p/certificate-transparency/
43
44- leaf_from_known_root.pem : A certificate issued by a public trust anchor,
45     used for CertVerifyProcInternalTest.TestKnownRoot. Using for other
46     purposes is not recommended. This needs to be updated periodically so the
47     server name the cert is valid for may change.
48
49- lets-encrypt-dst-x3-root.pem: A chain that ends in the Lets encrypt DST X3
50  root (https://crt.sh/?id=8395). Has the same leaf as
51  lets-encrypt-isrg-x1-root.pem.
52- lets-encrypt-isrg-x1-root.pem: A chain that ends in the Lets encrypt ISRG X1
53  root (https://crt.sh/?id=9314791). Has the same leaf as
54  lets-encrypt-dst-x3-root.pem.
55
56===== Manually generated certificates
57- client.p12 : A PKCS #12 file containing a client certificate and a private
58     key created for testing.  The password is "12345".
59
60- client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
61     as the one in client.p12) but no private key. The password is "12345".
62
63- client-empty-password.p12 : A PKCS #12 file containing an unencrypted client
64     certificate and a encrypted private key.  The password is the empty string,
65     encoded as two zero bytes.  (PKCS#12 passwords are encoded as
66     NUL-terminated UTF-16.)
67
68- client-null-password.p12 : A PKCS #12 file containing an unencrypted client
69     certificate and a encrypted private key.  The password is the empty string,
70     encoded as the empty byte string.
71
72- unittest.selfsigned.der : A self-signed certificate generated using private
73     key in unittest.key.bin. The common name is "unittest".
74
75- unittest.key.bin : private key stored unencrypted.
76
77- multivalue_rdn.pem : A regression test for http://crbug.com/101009. A
78     certificate with all of the AttributeTypeAndValues stored within a single
79     RelativeDistinguishedName, rather than one AVA per RDN as normally seen.
80
81- unescaped.pem : Regression test for http://crbug.com/102839. Contains
82     characters such as '=' and '"' that would normally be escaped when
83     converting a subject/issuer name to their stringized form.
84
85- websocket_cacert.pem : The testing root CA for testing WebSocket client
86     certificate authentication.
87     This file is used in SSLUITest.TestWSSClientCert.
88
89- websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
90     and a private key created for WebSocket testing. The password is "".
91     This file is used in SSLUITest.TestWSSClientCert.
92
93- no_subject_common_name_cert.pem: Used to test the function that generates a
94  NSS certificate nickname for a user certificate. This certificate's Subject
95  field doesn't have a common name.
96
97- ct-test-embedded-with-uids.pem: A certificate with embedded SCT and
98  issuer/subject unique IDs. This certificate should only be used in parsing
99  tests and otherwise kept fixed. The signature, etc., are intentionally
100  invalid.
101
102- name_constrained_key.pem
103  The private key matching the public_key_hash of the kDomainsTest constraint
104  in CertVerifyProc::HasNameConstraintsViolation.
105
106===== From net/data/ssl/scripts/generate-quic-chain.sh
107- quic-chain.pem
108- quic-leaf-cert.key
109- quic-leaf-cert.key.pkcs8.pem
110- quic-root.pem
111     These certificates are used by integration tests that use QUIC.
112
113- quic-leaf-cert.key.sct
114     This isn't generated and just contains a simple text file (the contents
115     don't actually matter, just the presence of the file).
116
117===== From net/data/ssl/scripts/generate-test-certs.sh
118- expired_cert.pem
119- ok_cert.pem
120- root_ca_cert.pem
121    These certificates are the common certificates used by the Python test
122    server for simulating HTTPS connections.
123
124- intermediate_ca_cert.pem
125- ok_cert_by_intermediate.pem
126    These certificates simulate a more common chain of root (root_ca_cert.pem)
127    to intermediate (intermediate_ca_cert.pem) to leaf
128    (ok_cert_by_intermediate.pem).
129
130- wildcard_.pem
131    A certificate and private key valid for *.example.org, used in various
132    net unit tests.
133
134- test_names.pem
135    A certificate and private key valid for a number of test names. See
136    [test_names] in ee.cnf. Other names may be added as needed.
137
138- bad_validity.pem
139    A certificate and private key only valid on 0001-01-01. Windows refuses to
140    parse this certificate.
141
142- spdy_pooling.pem : Used to test the handling of spdy IP connection pooling
143
144- subjectAltName_sanity_check.pem : Used to test the handling of various types
145     within the subjectAltName extension of a certificate.
146
147- policies_sanity_check.pem : Used to test the parsing of various types of
148     certificatePolicies extension policyQualifiers.
149
150- punycodetest.pem : A test self-signed server certificate with punycode name.
151     The common name is "xn--wgv71a119e.com" (日本語.com)
152
153- sha1_2016.pem
154    Used to test the handling of SHA1 certificates expiring in 2016.
155
156- 10_year_validity.pem
157- 11_year_validity.pem
158- 39_months_after_2015_04.pem
159- 40_months_after_2015_04.pem
160- 60_months_after_2012_07.pem
161- 61_months_after_2012_07.pem
162- pre_br_validity_bad_121.pem
163- pre_br_validity_bad_2020.pem
164- pre_br_validity_ok.pem
165- start_after_expiry.pem
166    Certs to test that the maximum validity durations set by the CA/Browser
167    Forum Baseline Requirements are enforced.
168
169- may_2018.pem
170   An 825-day certificate issued on May 1, 2018, the official start of
171   enforcement requiring Certificate Transparency for new certificates. This
172   certificate does not have any embedded SCTs.
173
174- x509_verify_results.chain.pem : A simple certificate chain used to test that
175    the correctly ordered, filtered certificate chain is returned during
176    verification, regardless of the order in which the intermediate/root CA
177    certificates are provided.
178
179- ev_test.pem
180- ev_test_state_only.pem
181     Certificates for testing EV display (including regression test for
182     https://crbug.com/1069113).
183
184===== From net/data/ssl/scripts/generate-test-keys.sh
185- rsa-{768,1024,2048}-{1..3}.key
186- ec-prime256v1-{1..3}.key
187     Pre-generated keys of various types/sizes.
188     Useful for tests that generate RSA certificates with CertBuilder without
189     having to pay the cost of generating RSA keys at runtime. Multiple keys
190     of each size are provided. (EC keys are cheap to generate at runtime, but
191     having some as files simplifies test logic in cases where the test is
192     reading both RSA and EC keys from files.)
193
194===== From net/data/ssl/scripts/generate-redundant-test-chains.sh
195- redundant-validated-chain.pem
196- redundant-server-chain.pem
197- redundant-validated-chain-root.pem
198
199     Two chains, A -> B -> C -> D and A -> B -> C2 (C and C2 share the same
200     public key) to test that SSLInfo gets the reconstructed, re-ordered
201     chain instead of the chain as served. See
202     SSLClientSocketTest.VerifyReturnChainProperlyOrdered in
203     net/socket/ssl_client_socket_unittest.cc. These chains are valid until
204     26 Feb 2022 and are generated by
205     net/data/ssl/scripts/generate-redundant-test-chains.sh.
206
207===== From net/data/ssl/scripts/generate-client-certificates.sh
208- client_1.pem
209- client_1.key
210- client_1.pk8
211- client_1_ca.pem
212- client_2.pem
213- client_2.key
214- client_2.pk8
215- client_2_ca.pem
216- client_3.pem
217- client_3.key
218- client_3.pk8
219- client_3_ca.pem
220- client_4.pem
221- client_4.key
222- client_4.pk8
223- client_4_ca.pem
224- client_5.pem
225- client_5.key
226- client_5.pk8
227- client_5_ca.pem
228- client_6.pem
229- client_6.key
230- client_6.pk8
231- client_6_ca.pem
232- client_root_ca.pem
233     This is a set of files used to unit test SSL client certificate
234     authentication.
235     - client_1_ca.pem and client_2_ca.pem are the certificates of
236       two distinct signing CAs.
237     - client_1.pem and client_1.key correspond to the certificate and
238       private key for a first certificate signed by client_1_ca.pem.
239     - client_2.pem and client_2.key correspond to the certificate and
240       private key for a second certificate signed by client_2_ca.pem.
241     - each .pk8 file contains the same key as the corresponding .key file
242       as PKCS#8 PrivateKeyInfo in DER encoding.
243     - client_3.pem is nearly identical to client_2.pem, except it is used
244       to test wifi EAP-TLS authentication so it uses a different set
245       of X509v3 extensions.  Specifically it includes two Subject
246       Alternative Name fields recognized by Chrome OS.
247     - client_4.pem is similar to client_2.pem but is a P-256 ECDSA key rather
248       than RSA.
249     - client_5.pem is similar to client_2.pem but is a P-384 ECDSA key rather
250       than RSA.
251     - client_6.pem is similar to client_2.pem but is a P-521 ECDSA key rather
252       than RSA.
253     - client_root_ca.pem is the CA certificate which signed client_*_ca.pem.
254
255===== From net/data/ssl/scripts/generate-bad-eku-certs.sh
256- eku-test-root.pem
257- non-crit-codeSigning-chain.pem
258- crit-codeSigning-chain.pem
259     Two code-signing certificates (eKU: codeSigning; eKU: critical,
260     codeSigning) which we use to test that clients are making sure that web
261     server certs are checked for correct eKU fields (when an eKU field is
262     present). Since codeSigning is not valid for web server auth, the checks
263     should fail.
264
265===== From net/data/ssl/scripts/generate-multi-root-test-chains.sh
266- multi-root-chain1.pem
267- multi-root-chain2.pem
268     Two chains, A -> B -> C -> D and A -> B -> C2 -> E (C and C2 share the
269     same public key) to test that certificate validation caching does not
270     interfere with the chain_verify_callback used by CertVerifyProcChromeOS.
271     See CertVerifyProcChromeOSTest.
272
273===== From net/data/ssl/scripts/generate-multi-root-keychain.sh
274- multi-root.keychain: An OSX Keychain containing the generated
275  certificates multi-root-*-by-*.pem
276
277===== From net/data/ssl/scripts/generate-duplicate-cn-certs.sh
278- duplicate_cn_1.p12
279- duplicate_cn_1.pem
280- duplicate_cn_2.p12
281- duplicate_cn_2.pem
282     Two certificates from the same issuer that share the same common name,
283     but have distinct subject names (namely, their O fields differ). NSS
284     requires that certificates have unique nicknames if they do not share the
285     same subject, and these certificates are used to test that the nickname
286     generation algorithm generates unique nicknames.
287     The .pem versions contain just the certs, while the .p12 versions contain
288     both the cert and a private key, since there are multiple ways to import
289     certificates into NSS.
290
291===== From net/data/ssl/scripts/generate-self-signed-certs.sh
292- self-signed-invalid-name.pem
293- self-signed-invalid-sig.pem
294     Two "self-signed" certificates with mismatched names or an invalid
295     signature, respectively.
296
297===== From net/data/ssl/scripts/generate-key-usage-certs.sh
298- key_usage_rsa_no_extension.pem
299- key_usage_rsa_keyencipherment.pem
300- key_usage_rsa_digitalsignature.pem
301- key_usage_rsa_both.pem
302     Self-signed RSA certificates with various combinations of keyUsage
303     flags. Their private key is key_usage_rsa.key.
304
305- key_usage_p256_no_extension.pem
306- key_usage_p256_keyagreement.pem
307- key_usage_p256_digitalsignature.pem
308- key_usage_p256_both.pem
309     Self-signed P-256 certificates with various combinations of keyUsage
310     flags. Their private key is key_usage_p256.key.
311