1 This directory contains various certificates for use with SSL-related
11 - thawte.single.pem : Certificates for testing parsing of different formats.
13 - googlenew.chain.pem : The refreshed Google certificate
14 (valid until Sept 30 2013).
16 - mit.davidben.der : An expired MIT client certificate.
18 - foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity
21 - www_us_army_mil_cert.der
23 - dod_root_ca_2_cert.der : A certificate chain for regression tests of
24 http://crbug.com/31497.
26 - expired_cert.pem : An expired certificate, used by test_server.cc.
28 - ok_cert.pem : A valid certificate, used by test_server.cc
30 - root_ca_cert.crt : The testing root CA used to sign the test_server.cc's
33 - unosoft_hu_cert : Certificate used by X509CertificateTest.UnoSoftCertParsing.
35 - client.p12 : A PKCS #12 file containing a client certificate and a private
36 key created for testing. The password is "12345".
38 - client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
39 as the one in client.p12) but no private key. The password is "12345".
41 - punycodetest.der : A test self-signed server certificate with punycode name.
42 The common name is "xn--wgv71a119e.com" (日本語.com)
44 - unittest.selfsigned.der : A self-signed certificate generated using private
45 key in unittest.key.bin. The common name is "unittest".
47 - unittest.key.bin : private key stored unencrypted.
49 - unittest.originbound.der: A test origin-bound certificate for
50 https://www.google.com:443.
51 - unittest.originbound.key.der: matching PrivateKeyInfo.
53 - x509_verify_results.chain.pem : A simple certificate chain used to test that
54 the correctly ordered, filtered certificate chain is returned during
55 verification, regardless of the order in which the intermediate/root CA
56 certificates are provided.
58 - google_diginotar.pem
59 - diginotar_public_ca_2025.pem : A certificate chain for the regression test
60 of http://crbug.com/94673
62 - test_mail_google_com.pem : A certificate signed by the test CA for
63 "mail.google.com". Because it is signed by that CA instead of the true CA
64 for that host, it will fail the
65 TransportSecurityState::IsChainOfPublicKeysPermitted test.
67 - salesforce_com_test.pem
68 - verisign_intermediate_ca_2011.pem
69 - verisign_intermediate_ca_2016.pem : Certificates for testing two
70 X509Certificate objects that contain the same server certificate but
71 different intermediate CA certificates. The two intermediate CA
72 certificates actually represent the same intermediate CA but have
73 different validity periods.
75 - multivalue_rdn.pem : A regression test for http://crbug.com/101009. A
76 certificate with all of the AttributeTypeAndValues stored within a single
77 RelativeDistinguishedName, rather than one AVA per RDN as normally seen.
79 - unescaped.pem : Regression test for http://crbug.com/102839. Contains
80 characters such as '=' and '"' that would normally be escaped when
81 converting a subject/issuer name to their stringized form.
84 - {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem
85 - {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-ee-by-
86 {768-rsa,1024-rsa,2048-rsa,prime256v1-ecdsa}-intermediate.pem
87 These certficates are generated by
88 net/data/ssl/scripts/generate-weak-test-chains.sh and used in the
89 RejectWeakKeys test in net/base/x509_certificate_unittest.cc.
91 - images_etrade_wallst_com.pem
92 - globalsign_orgv1_ca.pem
93 - globalsign_root_ca_md5.pem : A certificate chain for the regression test
94 of http://crbug.com/108514
96 - redundant-validated-chain.pem
97 - redundant-server-chain.pem
98 - redundant-validated-chain-root.pem
100 Two chains, A -> B -> C -> D and A -> B -> C2 (C and C2 share the same
101 public key) to test that SSLInfo gets the reconstructed, re-ordered
102 chain instead of the chain as served. See
103 SSLClientSocketTest.VerifyReturnChainProperlyOrdered in
104 net/socket/ssl_client_socket_unittest.cc. These chains are valid until
105 26 Feb 2022 and are generated by
106 net/data/ssl/scripts/generate-redundant-test-chains.sh.
108 - comodo.chain.pem : A certificate chain for www.comodo.com which should be
109 recognised as EV. Expires Jun 21 2013.
111 - ocsp-test-root.pem : A root certificate for the code in
112 net/tools/testserver/minica.py
114 - spdy_pooling.pem : Used to test the handling of spdy IP connection pooling
115 Generated by using the command
116 "openssl req -x509 -days 3650 -sha1 -extensions req_spdy_pooling \
117 -config ../scripts/ee.cnf -newkey rsa:1024 -text \
118 -out spdy_pooling.pem"
120 - subjectAltName_sanity_check.pem : Used to test the handling of various types
121 within the subjectAltName extension of a certificate. Generated by using
123 "openssl req -x509 -days 3650 -sha1 -extensions req_san_sanity \
124 -config ../scripts/ee.cnf -newkey rsa:1024 -text \
125 -out subjectAltName_sanity_check.pem"
127 - ndn.ca.crt: "New Dream Network Certificate Authority" root certificate.
128 This is an X.509 v1 certificate that omits the version field. Used to
129 test that the certificate version gets the default value v1.
131 - websocket_cacert.pem : The testing root CA for testing WebSocket client
132 certificate authentication.
133 This file is used in SSLUITest.TestWSSClientCert.
135 - websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
136 and a private key created for WebSocket testing. The password is "".
137 This file is used in SSLUITest.TestWSSClientCert.