Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(141)

Side by Side Diff: net/data/ssl/certificates/README

Issue 13866049: Fix client certificate authentication on Mac and Linux introduced in r178732 (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Refresh key files for certs Created 7 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/cert/x509_certificate_mac.cc ('k') | net/data/ssl/certificates/client_1.key » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 This directory contains various certificates for use with SSL-related 1 This directory contains various certificates for use with SSL-related
2 unit tests. 2 unit tests.
3 3
4 - google.binary.p7b 4 - google.binary.p7b
5 - google.chain.pem 5 - google.chain.pem
6 - google.pem_cert.p7b 6 - google.pem_cert.p7b
7 - google.pem_pkcs7.p7b 7 - google.pem_pkcs7.p7b
8 - google.pkcs7.p7b 8 - google.pkcs7.p7b
9 - google.single.der 9 - google.single.der
10 - google.single.pem 10 - google.single.pem
(...skipping 130 matching lines...) Expand 10 before | Expand all | Expand 10 after
141 - android-test-key-dsa-public.pem 141 - android-test-key-dsa-public.pem
142 - android-test-key-ecdsa.pem 142 - android-test-key-ecdsa.pem
143 - android-test-key-ecdsa-public.pem 143 - android-test-key-ecdsa-public.pem
144 This is a set of test RSA/DSA/ECDSA keys used by the Android-specific 144 This is a set of test RSA/DSA/ECDSA keys used by the Android-specific
145 unit test in net/android/keystore_unittest.c. They are used to verify 145 unit test in net/android/keystore_unittest.c. They are used to verify
146 that the OpenSSL-specific wrapper for platform PrivateKey objects 146 that the OpenSSL-specific wrapper for platform PrivateKey objects
147 works properly. See the generate-android-test-keys.sh script. 147 works properly. See the generate-android-test-keys.sh script.
148 148
149 - client_1.pem 149 - client_1.pem
150 - client_1.key 150 - client_1.key
151 - client_1_root.pem 151 - client_1_ca.pem
152 - client_2.pem 152 - client_2.pem
153 - client_2.key 153 - client_2.key
154 - client_2_root.pem 154 - client_2_ca.pem
155 This is a set of files used to unit test SSL client authentication. 155 This is a set of files used to unit test SSL client certificate
156 Generated by net/data/ssl/scripts/generate-client-certificates.sh. 156 authentication. These are generated by
157 Unit test is in net/socket/ssl_client_socket_openssl_unittest.cc. 157 net/data/ssl/scripts/generate-client-certificates.sh
158 - client_1_root.pem and client_2_root.pem are the certificates of 158 - client_1_ca.pem and client_2_ca.pem are the certificates of
159 two distinct signing CAs. 159 two distinct signing CAs.
160 - client_1.pem and client_1.key correspond to the certificate and 160 - client_1.pem and client_1.key correspond to the certificate and
161 private key for a first certificate signed by client_1_root.pem. 161 private key for a first certificate signed by client_1_ca.pem.
162 - client_2.pem and client_2.key correspond to the certificate and 162 - client_2.pem and client_2.key correspond to the certificate and
163 private key for a second certificate signed by client_2_root.pem. 163 private key for a second certificate signed by client_2_ca.pem.
164 164
165 - eku-test-root.pem 165 - eku-test-root.pem
166 - non-crit-codeSigning-chain.pem 166 - non-crit-codeSigning-chain.pem
167 - crit-codeSigning-chain.pem 167 - crit-codeSigning-chain.pem
168 Two code-signing certificates (eKU: codeSigning; eKU: critical, 168 Two code-signing certificates (eKU: codeSigning; eKU: critical,
169 codeSigning) which we use to test that clients are making sure that web 169 codeSigning) which we use to test that clients are making sure that web
170 server certs are checked for correct eKU fields (when an eKU field is 170 server certs are checked for correct eKU fields (when an eKU field is
171 present). Since codeSigning is not valid for web server auth, the checks 171 present). Since codeSigning is not valid for web server auth, the checks
172 should fail. 172 should fail.
173 173
OLDNEW
« no previous file with comments | « net/cert/x509_certificate_mac.cc ('k') | net/data/ssl/certificates/client_1.key » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698