• Home
Name Date Size #Lines LOC

..--

1024-rsa-ee-by-1024-rsa-intermediate.pemD03-May-20242.5 KiB5049

1024-rsa-ee-by-2048-rsa-intermediate.pemD03-May-20243.1 KiB6059

1024-rsa-ee-by-768-rsa-intermediate.pemD03-May-20242.3 KiB4847

1024-rsa-ee-by-prime256v1-ecdsa-intermediate.pemD03-May-20242.2 KiB4544

1024-rsa-intermediate.pemD03-May-20243.2 KiB6463

2029_globalsign_com_cert.pemD03-May-20241.9 KiB3231

2048-rsa-ee-by-1024-rsa-intermediate.pemD03-May-20243.2 KiB6261

2048-rsa-ee-by-2048-rsa-intermediate.pemD03-May-20243.8 KiB7271

2048-rsa-ee-by-768-rsa-intermediate.pemD03-May-20243 KiB6059

2048-rsa-ee-by-prime256v1-ecdsa-intermediate.pemD03-May-20242.9 KiB5756

2048-rsa-intermediate.pemD03-May-20243.9 KiB7675

2048-rsa-root.pemD03-May-20244 KiB7675

768-rsa-ee-by-1024-rsa-intermediate.pemD03-May-20242.3 KiB4847

768-rsa-ee-by-2048-rsa-intermediate.pemD03-May-20242.9 KiB5756

768-rsa-ee-by-768-rsa-intermediate.pemD03-May-20242.1 KiB4544

768-rsa-ee-by-prime256v1-ecdsa-intermediate.pemD03-May-20242 KiB4342

768-rsa-intermediate.pemD03-May-20243 KiB6160

READMED03-May-202410.8 KiB257211

aia-cert.pemD03-May-20244 KiB7775

aia-intermediate.derD03-May-2024736

aia-root.pemD03-May-20243.8 KiB7372

android-test-key-dsa-public.pemD03-May-20241.2 KiB2120

android-test-key-dsa.pemD03-May-20241.2 KiB2120

android-test-key-ecdsa-public.pemD03-May-2024178 54

android-test-key-ecdsa.pemD03-May-2024302 98

android-test-key-rsa.pemD03-May-20241.6 KiB2827

client-nokey.p12D03-May-2024895

client.p12D03-May-20241.7 KiB

client_1.keyD03-May-20241.6 KiB2827

client_1.pemD03-May-20243.8 KiB7372

client_1.pk8D03-May-20241.2 KiB

client_1_ca.pemD03-May-20243.7 KiB7271

client_2.keyD03-May-20241.6 KiB2827

client_2.pemD03-May-20243.8 KiB7372

client_2.pk8D03-May-20241.2 KiB

client_2_ca.pemD03-May-20243.7 KiB7271

comodo.chain.pemD03-May-202417.1 KiB318302

crit-codeSigning-chain.pemD03-May-20245.8 KiB106105

crlset_by_intermediate_serial.rawD03-May-2024147

crlset_by_leaf_spki.rawD03-May-2024155

crlset_by_root_serial.rawD03-May-2024147

cross-signed-leaf.pemD03-May-20244.4 KiB8381

cross-signed-root-md5.pemD03-May-20244 KiB7675

cross-signed-root-sha1.pemD03-May-20244 KiB7675

ct-test-embedded-cert.pemD03-May-20246.5 KiB127124

ct-test-embedded-with-intermediate-chain.pemD03-May-20249.6 KiB189185

ct-test-embedded-with-intermediate-preca-chain.pemD03-May-20249.6 KiB189185

ct-test-embedded-with-preca-chain.pemD03-May-20246.5 KiB128125

cybertrust_baltimore_cross_certified_1.pemD03-May-20244.3 KiB8379

cybertrust_baltimore_cross_certified_2.pemD03-May-20244.5 KiB8682

cybertrust_baltimore_root.pemD03-May-20244.2 KiB7877

cybertrust_gte_root.pemD03-May-20242.5 KiB4948

cybertrust_omniroot_chain.pemD03-May-20242.9 KiB4948

diginotar_cyber_ca.pemD03-May-20241.9 KiB3331

diginotar_pkioverheid.pemD03-May-20241.6 KiB2927

diginotar_pkioverheid_g2.pemD03-May-20242.3 KiB3938

diginotar_public_ca_2025.pemD03-May-20242.1 KiB3635

diginotar_root_ca.pemD03-May-20241.9 KiB3332

diginotar_services_1024_ca.pemD03-May-20241.3 KiB2423

dod_ca_13_cert.derD03-May-20241.1 KiB

dod_ca_17_cert.derD03-May-20241 KiB

dod_root_ca_2_cert.derD03-May-2024884

duplicate_cn_1.p12D03-May-20242.3 KiB

duplicate_cn_1.pemD03-May-20244.1 KiB7977

duplicate_cn_2.p12D03-May-20242.3 KiB

duplicate_cn_2.pemD03-May-20244.1 KiB7977

eku-test-root.pemD03-May-20244 KiB7675

empty_subject_cert.derD03-May-2024418

expired_cert.pemD03-May-20246 KiB111109

explicit-policy-chain.pemD03-May-202411.8 KiB229226

foaf.me.chromium-test-cert.derD03-May-2024990

globalsign_ev_sha256_ca_cert.pemD03-May-20241.5 KiB2625

google.binary.p7bD03-May-20241.6 KiB

google.chain.pemD03-May-20242.2 KiB3838

google.pem_cert.p7bD03-May-20242.3 KiB3837

google.pem_pkcs7.p7bD03-May-20242.2 KiB3837

google.single.derD03-May-2024805

google.single.pemD03-May-20241.1 KiB1919

google_diginotar.pemD03-May-20241.8 KiB3130

googlenew.chain.pemD03-May-20242.2 KiB3938

invalid_key_usage_cert.derD03-May-2024940

mit.davidben.derD03-May-2024965

multi-root-chain1.pemD03-May-202417.5 KiB329327

multi-root-chain2.pemD03-May-202417.5 KiB329327

multivalue_rdn.pemD03-May-20243 KiB6058

name_constraint_bad.pemD03-May-20245.9 KiB110108

name_constraint_good.pemD03-May-20246 KiB110108

ndn.ca.crtD03-May-20242.1 KiB3635

nist.derD03-May-20241.3 KiB

no_subject_common_name_cert.pemD03-May-20245.7 KiB110104

non-crit-codeSigning-chain.pemD03-May-20245.8 KiB106105

ocsp-test-root.pemD03-May-20242.4 KiB5250

ok_cert.pemD03-May-20246 KiB111109

prime256v1-ecdsa-ee-by-1024-rsa-intermediate.pemD03-May-20242.1 KiB4544

prime256v1-ecdsa-ee-by-2048-rsa-intermediate.pemD03-May-20242.7 KiB5554

prime256v1-ecdsa-ee-by-768-rsa-intermediate.pemD03-May-20241.9 KiB4241

prime256v1-ecdsa-ee-by-prime256v1-ecdsa-intermediate.pemD03-May-20241.8 KiB4039

prime256v1-ecdsa-intermediate.pemD03-May-20242.9 KiB5958

punycodetest.pemD03-May-20243.9 KiB7473

quic_intermediate.crtD03-May-20243.9 KiB7675

quic_intermediate.keyD03-May-20241.6 KiB2827

quic_root.crtD03-May-20243.9 KiB7574

quic_root.keyD03-May-20241.6 KiB2827

quic_test.example.com.crtD03-May-20244 KiB7877

quic_test.example.com.keyD03-May-20241.6 KiB2827

quic_test_ecc.example.com.crtD03-May-20242.9 KiB6160

quic_test_ecc.example.com.keyD03-May-2024227 65

redundant-server-chain.pemD03-May-202417.5 KiB329327

redundant-validated-chain-root.pemD03-May-20243.9 KiB7574

redundant-validated-chain.pemD03-May-202413.6 KiB255253

root_ca_cert.pemD03-May-20245.6 KiB102101

salesforce_com_test.pemD03-May-20244.3 KiB8278

satveda.pemD03-May-202411 KiB208197

sha256.pemD03-May-20243.8 KiB7170

spdy_pooling.pemD03-May-20244.1 KiB7473

subjectAltName_sanity_check.pemD03-May-20244.3 KiB7877

test_mail_google_com.pemD03-May-20241.5 KiB2726

thawte.single.pemD03-May-20241.1 KiB1919

unescaped.pemD03-May-20243.4 KiB6361

unittest.key.binD03-May-2024635

unittest.originbound.derD03-May-2024488

unittest.originbound.key.derD03-May-2024633

unittest.selfsigned.derD03-May-2024414

verisign_intermediate_ca_2011.pemD03-May-20243.7 KiB7269

verisign_intermediate_ca_2016.pemD03-May-20243.7 KiB7269

weak_digest_md2_ee.pemD03-May-20243.1 KiB6260

weak_digest_md2_intermediate.pemD03-May-20242.8 KiB5856

weak_digest_md2_root.pemD03-May-2024778 1514

weak_digest_md4_ee.pemD03-May-20243.1 KiB6260

weak_digest_md4_intermediate.pemD03-May-20242.8 KiB5856

weak_digest_md4_root.pemD03-May-2024778 1514

weak_digest_md5_ee.pemD03-May-20243.1 KiB6260

weak_digest_md5_intermediate.pemD03-May-20242.8 KiB5856

weak_digest_md5_root.pemD03-May-2024778 1514

weak_digest_sha1_ee.pemD03-May-20243.1 KiB6260

weak_digest_sha1_intermediate.pemD03-May-20242.8 KiB5856

weak_digest_sha1_root.pemD03-May-2024778 1514

websocket_cacert.pemD03-May-20243.1 KiB6260

websocket_client_cert.p12D03-May-20242.5 KiB

www_us_army_mil_cert.derD03-May-20241.2 KiB

x509_verify_results.chain.pemD03-May-20242.9 KiB5150

README

1This directory contains various certificates for use with SSL-related
2unit tests.
3
4===== Real-world certificates that need manual updating
5- google.binary.p7b
6- google.chain.pem
7- google.pem_cert.p7b
8- google.pem_pkcs7.p7b
9- google.pkcs7.p7b
10- google.single.der
11- google.single.pem
12- thawte.single.pem : Certificates for testing parsing of different formats.
13
14- googlenew.chain.pem : The refreshed Google certificate
15     (valid until Sept 30 2013).
16
17- mit.davidben.der : An expired MIT client certificate.
18
19- foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity
20     created for testing.
21
22- www_us_army_mil_cert.der
23- dod_ca_17_cert.der
24- dod_root_ca_2_cert.der :
25     A certificate chain used for testing certificate imports
26
27- unosoft_hu_cert : Certificate used by X509CertificateTest.UnoSoftCertParsing.
28
29- google_diginotar.pem
30- diginotar_public_ca_2025.pem : A certificate chain for the regression test
31      of http://crbug.com/94673
32
33- salesforce_com_test.pem
34- verisign_intermediate_ca_2011.pem
35- verisign_intermediate_ca_2016.pem : Certificates for testing two
36     X509Certificate objects that contain the same server certificate but
37     different intermediate CA certificates.  The two intermediate CA
38     certificates actually represent the same intermediate CA but have
39     different validity periods.
40
41- cybertrust_gte_root.pem
42- cybertrust_baltimore_root.pem
43- cybertrust_omniroot_chain.pem
44- cybertrust_baltimore_cross_certified_1.pem
45- cybertrust_baltimore_cross_certified_2.pem
46     These certificates are reflect a portion of the CyberTrust (Verizon
47     Business) CA hierarchy. _gte_root.pem is a legacy 1024-bit root that is
48     still widely supported, while _baltimore_root.pem reflects the newer
49     2048-bit root. For clients that only support the GTE root, two versions
50     of the Baltimore root were cross-signed by GTE, namely
51     _cross_certified_[1,2].pem. _omniroot_chain.pem contains a certificate
52     chain that was issued under the Baltimore root. Combined, these
53     certificates can be used to test real-world cross-signing; in practice,
54     they are used to test certain workarounds for OS X's chain building code.
55
56- ndn.ca.crt: "New Dream Network Certificate Authority" root certificate.
57     This is an X.509 v1 certificate that omits the version field. Used to
58     test that the certificate version gets the default value v1.
59
60- ct-test-embedded-cert.pem
61- ct-test-embedded-with-intermediate-chain.pem
62- ct-test-embedded-with-intermediate-preca-chain.pem
63- ct-test-embedded-with-preca-chain.pem
64     Test certificate chains for Certificate Transparency: Each of these
65     files contains a leaf certificate as the first certificate, which has
66     embedded SCTs, followed by the issuer certificates chain.
67     All files are from the src/test/testdada directory in
68     https://code.google.com/p/certificate-transparency/
69
70- comodo.chain.pem : A certificate chain for www.comodo.com which should be
71     recognised as EV. Expires Jun 20 2015.
72
73===== Manually generated certificates
74- client.p12 : A PKCS #12 file containing a client certificate and a private
75     key created for testing.  The password is "12345".
76
77- client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
78     as the one in client.p12) but no private key. The password is "12345".
79
80- unittest.selfsigned.der : A self-signed certificate generated using private
81     key in unittest.key.bin. The common name is "unittest".
82
83- unittest.key.bin : private key stored unencrypted.
84
85- unittest.originbound.der: A test origin-bound certificate for
86     https://www.google.com:443.
87- unittest.originbound.key.der: matching PrivateKeyInfo.
88
89- x509_verify_results.chain.pem : A simple certificate chain used to test that
90    the correctly ordered, filtered certificate chain is returned during
91    verification, regardless of the order in which the intermediate/root CA
92    certificates are provided.
93
94- test_mail_google_com.pem : A certificate signed by the test CA for
95    "mail.google.com". Because it is signed by that CA instead of the true CA
96    for that host, it will fail the
97    TransportSecurityState::IsChainOfPublicKeysPermitted test.
98
99- multivalue_rdn.pem : A regression test for http://crbug.com/101009. A
100     certificate with all of the AttributeTypeAndValues stored within a single
101     RelativeDistinguishedName, rather than one AVA per RDN as normally seen.
102
103- unescaped.pem : Regression test for http://crbug.com/102839. Contains
104     characters such as '=' and '"' that would normally be escaped when
105     converting a subject/issuer name to their stringized form.
106
107- ocsp-test-root.pem : A root certificate for the code in
108      net/tools/testserver/minica.py
109
110- websocket_cacert.pem : The testing root CA for testing WebSocket client
111     certificate authentication.
112     This file is used in SSLUITest.TestWSSClientCert.
113
114- websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
115     and a private key created for WebSocket testing. The password is "".
116     This file is used in SSLUITest.TestWSSClientCert.
117
118- no_subject_common_name_cert.pem: Used to test the function that generates a
119  NSS certificate nickname for a user certificate. This certificate's Subject
120  field doesn't have a common name.
121
122- quic_intermediate.crt
123- quic_test_ecc.example.com.crt
124- quic_test.example.com.crt
125- quic_root.crt
126     These certificates are used by the ProofVerifier's unit tests of QUIC.
127
128===== From net/data/ssl/scripts/generate-test-certs.sh
129- expired_cert.pem
130- ok_cert.pem
131- root_ca_cert.pem
132     These certificates are the common certificates used by the Python test
133     server for simulating HTTPS connections.
134
135- name_constraint_bad.pem
136- name_constraint_good.pem
137    Two certificates used to test the built-in ability to restrict a root to
138    a particular namespace.
139
140- sha256.pem: Used to test the handling of SHA-256 certs on Windows.
141
142- spdy_pooling.pem : Used to test the handling of spdy IP connection pooling
143
144- subjectAltName_sanity_check.pem : Used to test the handling of various types
145     within the subjectAltName extension of a certificate.
146
147- punycodetest.pem : A test self-signed server certificate with punycode name.
148     The common name is "xn--wgv71a119e.com" (日本語.com)
149
150===== From net/data/ssl/scripts/generate-weak-test-chains.sh
151- 2048-rsa-root.pem
152- {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem
153- {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-ee-by-
154      {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem
155      Test certificates used to ensure that weak keys are detected and rejected
156
157===== From net/data/ssl/scripts/generate-cross-signed-certs.sh
158- cross-signed-leaf.pem
159- cross-signed-root-md5.pem
160- cross-signed-root-sha1.pem
161     A certificate chain for regression testing http://crbug.com/108514
162
163===== From net/data/ssl/scripts/generate-redundant-test-chains.sh
164- redundant-validated-chain.pem
165- redundant-server-chain.pem
166- redundant-validated-chain-root.pem
167
168     Two chains, A -> B -> C -> D and A -> B -> C2 (C and C2 share the same
169     public key) to test that SSLInfo gets the reconstructed, re-ordered
170     chain instead of the chain as served. See
171     SSLClientSocketTest.VerifyReturnChainProperlyOrdered in
172     net/socket/ssl_client_socket_unittest.cc. These chains are valid until
173     26 Feb 2022 and are generated by
174     net/data/ssl/scripts/generate-redundant-test-chains.sh.
175
176===== From net/data/ssl/scripts/generate-policy-certs.sh
177- explicit-policy-chain.pem
178     A test certificate chain with requireExplicitPolicy field set on the
179     intermediate, with SkipCerts=0. This is used for regression testing
180     http://crbug.com/31497.
181
182===== From net/data/ssl/scripts/generate-client-certificates.sh
183- client_1.pem
184- client_1.key
185- client_1.pk8
186- client_1_ca.pem
187- client_2.pem
188- client_2.key
189- client_2.pk8
190- client_2_ca.pem
191     This is a set of files used to unit test SSL client certificate
192     authentication.
193     - client_1_ca.pem and client_2_ca.pem are the certificates of
194       two distinct signing CAs.
195     - client_1.pem and client_1.key correspond to the certificate and
196       private key for a first certificate signed by client_1_ca.pem.
197     - client_2.pem and client_2.key correspond to the certificate and
198       private key for a second certificate signed by client_2_ca.pem.
199     - each .pk8 file contains the same key as the corresponding .key file
200       as PKCS#8 PrivateKeyInfo in DER encoding.
201
202===== From net/data/ssl/scripts/generate-android-test-key.sh
203- android-test-key-rsa.pem
204- android-test-key-dsa.pem
205- android-test-key-dsa-public.pem
206- android-test-key-ecdsa.pem
207- android-test-key-ecdsa-public.pem
208     This is a set of test RSA/DSA/ECDSA keys used by the Android-specific
209     unit test in net/android/keystore_unittest.c. They are used to verify
210     that the OpenSSL-specific wrapper for platform PrivateKey objects
211     works properly. See the generate-android-test-keys.sh script.
212
213===== From net/data/ssl/scripts/generate-bad-eku-certs.sh
214- eku-test-root.pem
215- non-crit-codeSigning-chain.pem
216- crit-codeSigning-chain.pem
217     Two code-signing certificates (eKU: codeSigning; eKU: critical,
218     codeSigning) which we use to test that clients are making sure that web
219     server certs are checked for correct eKU fields (when an eKU field is
220     present). Since codeSigning is not valid for web server auth, the checks
221     should fail.
222
223===== From net/data/ssl/scripts/generate-multi-root-test-chains.sh
224- multi-root-chain1.pem
225- multi-root-chain2.pem
226     Two chains, A -> B -> C -> D and A -> B -> C2 -> E (C and C2 share the
227     same public key) to test that certificate validation caching does not
228     interfere with the chain_verify_callback used by CertVerifyProcChromeOS.
229     See CertVerifyProcChromeOSTest.
230
231===== From net/data/ssl/scripts/generate-duplicate-cn-certs.sh
232- duplicate_cn_1.p12
233- duplicate_cn_1.pem
234- duplicate_cn_2.p12
235- duplicate_cn_2.pem
236     Two certificates from the same issuer that share the same common name,
237     but have distinct subject names (namely, their O fields differ). NSS
238     requires that certificates have unique nicknames if they do not share the
239     same subject, and these certificates are used to test that the nickname
240     generation algorithm generates unique nicknames.
241     The .pem versions contain just the certs, while the .p12 versions contain
242     both the cert and a private key, since there are multiple ways to import
243     certificates into NSS.
244
245===== From net/data/ssl/scripts/generate-aia-certs.sh
246- aia-cert.pem
247- aia-intermediate.der
248- aia-root.pem
249     A certificate chain which we use to ensure AIA fetching works correctly
250     when using NSS to verify certificates (which uses our HTTP stack).
251     aia-cert.pem has a caIssuers that points to "aia-test.invalid" as the URL
252     containing the intermediate, which can be served via a URLRequestFilter.
253     aia-intermediate.der is stored in DER form for convenience, since that is
254     the form expected of certificates discovered via AIA.
255
256
257