Name Date Size #Lines LOC

..--

10_year_validity.pemH A D25-Apr-20254.6 KiB8685

11_year_validity.pemH A D25-Apr-20254.6 KiB8685

2029_globalsign_com_cert.pemH A D25-Apr-20251.9 KiB3231

2_client_certs_1_key.p12HD25-Apr-20253.3 KiB

398_days_1_second_after_2020_09_01.pemH A D25-Apr-20254.6 KiB8685

398_days_after_2020_09_01.pemH A D25-Apr-20254.6 KiB8685

399_days_after_2020_09_01.pemH A D25-Apr-20254.6 KiB8685

39_months_after_2015_04.pemH A D25-Apr-20254.6 KiB8685

39_months_based_on_last_day.pemH A D25-Apr-20254.6 KiB8685

40_months_after_2015_04.pemH A D25-Apr-20254.6 KiB8685

60_months_after_2012_07.pemH A D25-Apr-20254.6 KiB8685

61_months_after_2012_07.pemH A D25-Apr-20254.6 KiB8685

825_days_1_second_after_2018_03_01.pemH A D25-Apr-20254.6 KiB8685

825_days_after_2018_03_01.pemH A D25-Apr-20254.6 KiB8685

826_days_after_2018_03_01.pemH A D25-Apr-20254.6 KiB8685

900_days_after_2019_07_01.pemH A D25-Apr-20254.6 KiB8685

BUILD.gnH A D25-Apr-2025447 1412

READMEH A D25-Apr-202513.1 KiB322270

bad_validity.pemH A D25-Apr-20256.1 KiB113112

can_sign_http_exchanges_draft_extension.pemH A D25-Apr-20251.3 KiB2322

can_sign_http_exchanges_draft_extension_invalid.pemH A D25-Apr-20251.3 KiB2322

client-empty-password.p12HD25-Apr-20252.3 KiB

client-nokey.p12HD25-Apr-2025895

client-null-password.p12HD25-Apr-20252.3 KiB

client.p12HD25-Apr-20251.7 KiB

client_1.keyH A D25-Apr-20251.7 KiB2928

client_1.pemH A D25-Apr-20254.1 KiB7978

client_1.pk8HD25-Apr-20251.2 KiB

client_1_ca.pemH A D25-Apr-20254 KiB7978

client_1_u16_password.p12HD25-Apr-20252.5 KiB

client_2.keyH A D25-Apr-20251.7 KiB2928

client_2.pemH A D25-Apr-20254.1 KiB7978

client_2.pk8HD25-Apr-20251.2 KiB

client_2_ca.pemH A D25-Apr-20254 KiB7978

client_3.keyH A D25-Apr-20251.7 KiB2928

client_3.pemH A D25-Apr-20254.1 KiB7877

client_3.pk8HD25-Apr-20251.2 KiB

client_3_ca.pemH A D25-Apr-20254 KiB7978

client_4.keyH A D25-Apr-2025227 65

client_4.pemH A D25-Apr-20253 KiB6362

client_4.pk8HD25-Apr-2025138

client_4_ca.pemH A D25-Apr-20254 KiB7978

client_5.keyH A D25-Apr-2025288 76

client_5.pemH A D25-Apr-20253.2 KiB6564

client_5.pk8HD25-Apr-2025185

client_5_ca.pemH A D25-Apr-20254 KiB7978

client_6.keyH A D25-Apr-2025365 87

client_6.pemH A D25-Apr-20253.4 KiB6867

client_6.pk8HD25-Apr-2025241

client_6_ca.pemH A D25-Apr-20254 KiB7978

client_7.keyH A D25-Apr-2025916 1716

client_7.pemH A D25-Apr-20253.4 KiB6766

client_7.pk8HD25-Apr-2025636

client_7_ca.pemH A D25-Apr-20254 KiB7978

client_root_ca.pemH A D25-Apr-20251.1 KiB1918

client_with_ec_key.p12HD25-Apr-20251.2 KiB

common_name_only.pemH A D25-Apr-20256.1 KiB112111

crit-codeSigning-chain.pemH A D25-Apr-20256 KiB111110

crlset_blocked_interception_by_intermediate.rawHD25-Apr-2025224

crlset_blocked_interception_by_root.rawHD25-Apr-2025224

crlset_by_intermediate_serial.rawHD25-Apr-2025231

crlset_by_leaf_spki.rawHD25-Apr-2025224

crlset_by_leaf_subject_no_spki.rawHD25-Apr-2025228

crlset_by_root_serial.rawHD25-Apr-2025231

crlset_by_root_spki.rawHD25-Apr-2025224

crlset_by_root_subject.rawHD25-Apr-2025274

crlset_by_root_subject_no_spki.rawHD25-Apr-2025228

crlset_known_interception_by_root.rawHD25-Apr-2025224

cronet-quic-chain.pemH A D25-Apr-20258.3 KiB160159

cronet-quic-leaf-cert.keyHD25-Apr-20251.2 KiB

cronet-quic-leaf-cert.key.pkcs8.pemH A D25-Apr-20251.7 KiB2928

cronet-quic-root.pemH A D25-Apr-20251.1 KiB2019

ct-test-embedded-cert.pemH A D25-Apr-20256.5 KiB127124

ct-test-embedded-with-intermediate-chain.pemH A D25-Apr-20259.6 KiB189185

ct-test-embedded-with-intermediate-preca-chain.pemH A D25-Apr-20259.6 KiB189185

ct-test-embedded-with-preca-chain.pemH A D25-Apr-20256.5 KiB128125

ct-test-embedded-with-uids.pemH A D25-Apr-20254.2 KiB8280

diginotar_cyber_ca.pemH A D25-Apr-20251.9 KiB3331

diginotar_pkioverheid.pemH A D25-Apr-20251.6 KiB2927

diginotar_pkioverheid_g2.pemH A D25-Apr-20252.3 KiB3938

diginotar_public_ca_2025.pemH A D25-Apr-20252.1 KiB3635

diginotar_root_ca.pemH A D25-Apr-20251.9 KiB3332

diginotar_services_1024_ca.pemH A D25-Apr-20251.3 KiB2423

duplicate_cn_1.p12HD25-Apr-20252.3 KiB

duplicate_cn_1.pemH A D25-Apr-20254.1 KiB7977

duplicate_cn_2.p12HD25-Apr-20252.3 KiB

duplicate_cn_2.pemH A D25-Apr-20254.1 KiB7977

ec-prime256v1-1.keyH A D25-Apr-2025241 65

ec-prime256v1-2.keyH A D25-Apr-2025241 65

ec-prime256v1-3.keyH A D25-Apr-2025241 65

eku-test-root.pemH A D25-Apr-20254 KiB7877

ev_test.pemH A D25-Apr-20253.8 KiB7170

ev_test_state_only.pemH A D25-Apr-20253.7 KiB7069

expired_cert.pemH A D25-Apr-20256.2 KiB114113

foaf.me.chromium-test-cert.derHD25-Apr-2025990

google.binary.p7bHD25-Apr-20251.6 KiB

google.chain.pemH A D25-Apr-20252.2 KiB3838

google.pem_cert.p7bH A D25-Apr-20252.3 KiB3837

google.pem_pkcs7.p7bH A D25-Apr-20252.2 KiB3837

google.single.derHD25-Apr-2025805

google.single.pemH A D25-Apr-20251.1 KiB1919

google_diginotar.pemH A D25-Apr-20251.8 KiB3130

intermediate_ca_cert.pemH A D25-Apr-20256.1 KiB111110

invalid_key_usage_cert.derHD25-Apr-2025940

key_usage_p256.keyH A D25-Apr-2025241 65

key_usage_p256_both.pemH A D25-Apr-20252.1 KiB4645

key_usage_p256_digitalsignature.pemH A D25-Apr-20252 KiB4645

key_usage_p256_keyagreement.pemH A D25-Apr-20252 KiB4645

key_usage_p256_no_extension.pemH A D25-Apr-20251.9 KiB4241

key_usage_rsa.keyH A D25-Apr-20251.7 KiB2928

key_usage_rsa_both.pemH A D25-Apr-20255.6 KiB101100

key_usage_rsa_digitalsignature.pemH A D25-Apr-20255.5 KiB10099

key_usage_rsa_keyencipherment.pemH A D25-Apr-20255.4 KiB10099

key_usage_rsa_no_extension.pemH A D25-Apr-20255.4 KiB9796

leaf_from_known_root.pemH A D25-Apr-202522 KiB396389

lets-encrypt-dst-x3-root.pemH A D25-Apr-202524.5 KiB465443

lets-encrypt-isrg-x1-root.pemH A D25-Apr-202520.6 KiB381366

localhost_cert.pemH A D25-Apr-20256.2 KiB114113

may_2018.pemH A D25-Apr-20254.6 KiB8685

mit.davidben.derHD25-Apr-2025965

multi-root-A-by-B.pemH A D25-Apr-20256 KiB110108

multi-root-B-by-C.pemH A D25-Apr-20253.9 KiB7574

multi-root-B-by-F.pemH A D25-Apr-20253.9 KiB7574

multi-root-C-by-D.pemH A D25-Apr-20253.9 KiB7574

multi-root-C-by-E.pemH A D25-Apr-20253.9 KiB7574

multi-root-D-by-D.pemH A D25-Apr-20253.9 KiB7675

multi-root-E-by-E.pemH A D25-Apr-20253.9 KiB7675

multi-root-F-by-E.pemH A D25-Apr-20253.9 KiB7574

multi-root-chain1.pemH A D25-Apr-202516.2 KiB306304

multi-root-chain2.pemH A D25-Apr-202516.2 KiB306304

multi-root-crlset-C.rawHD25-Apr-2025155

multi-root-crlset-CD-and-FE.rawHD25-Apr-2025187

multi-root-crlset-D-and-E.rawHD25-Apr-2025203

multi-root-crlset-E.rawHD25-Apr-2025155

multi-root-crlset-unrelated.rawHD25-Apr-2025148

multi-root.keychainHD25-Apr-202532.3 KiB

multivalue_rdn.pemH A D25-Apr-20253 KiB6058

name_constrained_key.pemH A D25-Apr-20251.7 KiB2928

ndn.ca.crtH A D25-Apr-20252.1 KiB3635

nist.derHD25-Apr-20251.3 KiB

no_subject_common_name_cert.pemH A D25-Apr-20255.7 KiB110104

non-crit-codeSigning-chain.pemH A D25-Apr-20256 KiB111110

ok_cert.pemH A D25-Apr-20256.2 KiB114113

ok_cert_by_intermediate.pemH A D25-Apr-202510.7 KiB196195

policies_sanity_check.pemH A D25-Apr-20254.9 KiB9493

pre_br_validity_bad_121.pemH A D25-Apr-20254.6 KiB8685

pre_br_validity_bad_2020.pemH A D25-Apr-20254.6 KiB8685

pre_br_validity_ok.pemH A D25-Apr-20254.6 KiB8685

punycodetest.pemH A D25-Apr-20254.2 KiB7978

quic-chain.pemH A D25-Apr-20257.7 KiB148147

quic-ecdsa-leaf.keyHD25-Apr-2025138

quic-leaf-cert.keyHD25-Apr-20251.2 KiB

quic-leaf-cert.key.pkcs8.pemH A D25-Apr-20251.7 KiB2928

quic-leaf-cert.key.sctHD25-Apr-202533

quic-root.pemH A D25-Apr-20251 KiB1918

quic-short-lived.pemH A D25-Apr-20251.9 KiB4342

redundant-server-chain.pemH A D25-Apr-202517.7 KiB334332

redundant-validated-chain-root.pemH A D25-Apr-20254 KiB7675

redundant-validated-chain.pemH A D25-Apr-202513.8 KiB260258

root_ca_cert.pemH A D25-Apr-20256 KiB109108

rsa-1024-1.keyH A D25-Apr-2025920 1716

rsa-1024-2.keyH A D25-Apr-2025916 1716

rsa-1024-3.keyH A D25-Apr-2025916 1716

rsa-2048-1.keyH A D25-Apr-20251.7 KiB2928

rsa-2048-2.keyH A D25-Apr-20251.7 KiB2928

rsa-2048-3.keyH A D25-Apr-20251.7 KiB2928

rsa-768-1.keyH A D25-Apr-2025721 1413

rsa-768-2.keyH A D25-Apr-2025721 1413

rsa-768-3.keyH A D25-Apr-2025717 1413

rsa-8200-1.keyH A D25-Apr-20256.2 KiB101100

salesforce_com_test.pemH A D25-Apr-20254.3 KiB8278

self-signed-invalid-name.pemH A D25-Apr-20253.8 KiB7069

self-signed-invalid-sig.pemH A D25-Apr-20253.8 KiB7069

sha1_2016.pemH A D25-Apr-20254.6 KiB8685

sha1_leaf.pemH A D25-Apr-20256.2 KiB114113

spdy_pooling.pemH A D25-Apr-20254.3 KiB8079

start_after_expiry.pemH A D25-Apr-20254.6 KiB8685

subjectAltName_sanity_check.pemH A D25-Apr-20254.5 KiB8382

subjectAltName_www_example_com.pemH A D25-Apr-20254.3 KiB8180

test_names.pemH A D25-Apr-20256.4 KiB115114

unescaped.pemH A D25-Apr-20253.4 KiB6361

unittest.key.binHD25-Apr-2025635

unittest.selfsigned.derHD25-Apr-2025414

verisign_intermediate_ca_2011.pemH A D25-Apr-20253.7 KiB7269

verisign_intermediate_ca_2016.pemH A D25-Apr-20253.7 KiB7269

weak_digest_md2_ee.pemH A D25-Apr-20253.1 KiB6260

weak_digest_md2_intermediate.pemH A D25-Apr-20252.8 KiB5856

weak_digest_md2_root.pemH A D25-Apr-2025778 1514

weak_digest_md4_ee.pemH A D25-Apr-20253.1 KiB6260

weak_digest_md4_intermediate.pemH A D25-Apr-20252.8 KiB5856

weak_digest_md4_root.pemH A D25-Apr-2025778 1514

weak_digest_md5_ee.pemH A D25-Apr-20253.1 KiB6260

weak_digest_md5_intermediate.pemH A D25-Apr-20252.8 KiB5856

weak_digest_md5_root.pemH A D25-Apr-2025778 1514

weak_digest_sha1_ee.pemH A D25-Apr-20253.1 KiB6260

weak_digest_sha1_intermediate.pemH A D25-Apr-20252.8 KiB5856

weak_digest_sha1_root.pemH A D25-Apr-2025778 1514

websocket_cacert.pemH A D25-Apr-20253.1 KiB6260

websocket_client_cert.p12HD25-Apr-20252.5 KiB

wildcard.pemH A D25-Apr-20256.3 KiB114113

x509_verify_results.chain.pemH A D25-Apr-202513.3 KiB248247

README

1This directory contains various certificates for use with SSL-related
2unit tests.
3
4===== Real-world certificates that need manual updating
5- google.binary.p7b
6- google.chain.pem
7- google.pem_cert.p7b
8- google.pem_pkcs7.p7b
9- google.pkcs7.p7b
10- google.single.der
11- google.single.pem : Certificates for testing parsing of different formats.
12
13- mit.davidben.der : An expired MIT client certificate.
14
15- foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity
16     created for testing.
17
18- google_diginotar.pem
19- diginotar_public_ca_2025.pem : A certificate chain for the regression test
20      of http://crbug.com/94673
21
22- salesforce_com_test.pem
23- verisign_intermediate_ca_2011.pem
24- verisign_intermediate_ca_2016.pem : Certificates for testing two
25     X509Certificate objects that contain the same server certificate but
26     different intermediate CA certificates.  The two intermediate CA
27     certificates actually represent the same intermediate CA but have
28     different validity periods.
29
30- ndn.ca.crt: "New Dream Network Certificate Authority" root certificate.
31     This is an X.509 v1 certificate that omits the version field. Used to
32     test that the certificate version gets the default value v1.
33
34- ct-test-embedded-cert.pem
35- ct-test-embedded-with-intermediate-chain.pem
36- ct-test-embedded-with-intermediate-preca-chain.pem
37- ct-test-embedded-with-preca-chain.pem
38     Test certificate chains for Certificate Transparency: Each of these
39     files contains a leaf certificate as the first certificate, which has
40     embedded SCTs, followed by the issuer certificates chain.
41     All files are from the src/test/testdada directory in
42     https://code.google.com/p/certificate-transparency/
43
44- leaf_from_known_root.pem : A certificate issued by a public trust anchor,
45     used for CertVerifyProcInternalTest.TestKnownRoot. Using for other
46     purposes is not recommended. This needs to be updated periodically so the
47     server name the cert is valid for may change.
48
49- lets-encrypt-dst-x3-root.pem: A chain that ends in the Lets encrypt DST X3
50  root (https://crt.sh/?id=8395). Has the same leaf as
51  lets-encrypt-isrg-x1-root.pem.
52- lets-encrypt-isrg-x1-root.pem: A chain that ends in the Lets encrypt ISRG X1
53  root (https://crt.sh/?id=9314791). Has the same leaf as
54  lets-encrypt-dst-x3-root.pem.
55
56===== Manually generated certificates
57- client.p12 : A PKCS #12 file containing a client certificate and a private
58     RSA key created for testing.  The password is "12345".
59
60- client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
61     as the one in client.p12) but no private key. The password is "12345".
62
63- client-empty-password.p12 : A PKCS #12 file containing an unencrypted client
64     certificate and a encrypted private key.  The password is the empty string,
65     encoded as two zero bytes.  (PKCS#12 passwords are encoded as
66     NUL-terminated UTF-16.)
67
68- client-null-password.p12 : A PKCS #12 file containing an unencrypted client
69     certificate and a encrypted private key.  The password is the empty string,
70     encoded as the empty byte string.
71
72- client_with_ec_key.p12 : A PKCS #12 file containing a client certificate and
73     a private EC key created for testing.  The password is "12345".
74
75- unittest.selfsigned.der : A self-signed certificate generated using private
76     key in unittest.key.bin. The common name is "unittest".
77
78- unittest.key.bin : private key stored unencrypted.
79
80- multivalue_rdn.pem : A regression test for http://crbug.com/101009. A
81     certificate with all of the AttributeTypeAndValues stored within a single
82     RelativeDistinguishedName, rather than one AVA per RDN as normally seen.
83
84- unescaped.pem : Regression test for http://crbug.com/102839. Contains
85     characters such as '=' and '"' that would normally be escaped when
86     converting a subject/issuer name to their stringized form.
87
88- websocket_cacert.pem : The testing root CA for testing WebSocket client
89     certificate authentication.
90     This file is used in SSLUITest.TestWSSClientCert.
91
92- websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
93     and a private key created for WebSocket testing. The password is "".
94     This file is used in SSLUITest.TestWSSClientCert.
95
96- no_subject_common_name_cert.pem: Used to test the function that generates a
97  NSS certificate nickname for a user certificate. This certificate's Subject
98  field doesn't have a common name.
99
100- ct-test-embedded-with-uids.pem: A certificate with embedded SCT and
101  issuer/subject unique IDs. This certificate should only be used in parsing
102  tests and otherwise kept fixed. The signature, etc., are intentionally
103  invalid.
104
105- name_constrained_key.pem
106  The private key matching the public_key_hash of the kDomainsTest constraint
107  in CertVerifyProc::HasNameConstraintsViolation.
108
109===== From net/data/ssl/scripts/generate-quic-chain.sh
110- quic-chain.pem
111- quic-leaf-cert.key
112- quic-leaf-cert.key.pkcs8.pem
113- quic-root.pem
114     These certificates are used by integration tests that use QUIC.
115
116- quic-leaf-cert.key.sct
117     This isn't generated and just contains a simple text file (the contents
118     don't actually matter, just the presence of the file).
119
120===== From net/data/ssl/scripts/generate-test-certs.sh
121- expired_cert.pem
122- ok_cert.pem
123- root_ca_cert.pem
124    These certificates are the common certificates used by the Python test
125    server for simulating HTTPS connections.
126
127- intermediate_ca_cert.pem
128- ok_cert_by_intermediate.pem
129    These certificates simulate a more common chain of root (root_ca_cert.pem)
130    to intermediate (intermediate_ca_cert.pem) to leaf
131    (ok_cert_by_intermediate.pem).
132
133- wildcard_.pem
134    A certificate and private key valid for *.example.org, used in various
135    net unit tests.
136
137- test_names.pem
138    A certificate and private key valid for a number of test names. See
139    [test_names] in ee.cnf. Other names may be added as needed.
140
141- bad_validity.pem
142    A certificate and private key only valid on 0001-01-01. Windows refuses to
143    parse this certificate.
144
145- spdy_pooling.pem : Used to test the handling of spdy IP connection pooling
146
147- subjectAltName_sanity_check.pem : Used to test the handling of various types
148     within the subjectAltName extension of a certificate.
149
150- policies_sanity_check.pem : Used to test the parsing of various types of
151     certificatePolicies extension policyQualifiers.
152
153- punycodetest.pem : A test self-signed server certificate with punycode name.
154     The common name is "xn--wgv71a119e.com" (日本語.com)
155
156- sha1_2016.pem
157    Used to test the handling of SHA1 certificates expiring in 2016.
158
159- 10_year_validity.pem
160- 11_year_validity.pem
161- 39_months_after_2015_04.pem
162- 40_months_after_2015_04.pem
163- 60_months_after_2012_07.pem
164- 61_months_after_2012_07.pem
165- pre_br_validity_bad_121.pem
166- pre_br_validity_bad_2020.pem
167- pre_br_validity_ok.pem
168- start_after_expiry.pem
169    Certs to test that the maximum validity durations set by the CA/Browser
170    Forum Baseline Requirements are enforced.
171
172- may_2018.pem
173   An 825-day certificate issued on May 1, 2018, the official start of
174   enforcement requiring Certificate Transparency for new certificates. This
175   certificate does not have any embedded SCTs.
176
177- x509_verify_results.chain.pem : A simple certificate chain used to test that
178    the correctly ordered, filtered certificate chain is returned during
179    verification, regardless of the order in which the intermediate/root CA
180    certificates are provided.
181
182- ev_test.pem
183- ev_test_state_only.pem
184     Certificates for testing EV display (including regression test for
185     https://crbug.com/1069113).
186
187===== From net/data/ssl/scripts/generate-test-keys.sh
188- rsa-{768,1024,2048}-{1..3}.key
189- ec-prime256v1-{1..3}.key
190     Pre-generated keys of various types/sizes.
191     Useful for tests that generate RSA certificates with CertBuilder without
192     having to pay the cost of generating RSA keys at runtime. Multiple keys
193     of each size are provided. (EC keys are cheap to generate at runtime, but
194     having some as files simplifies test logic in cases where the test is
195     reading both RSA and EC keys from files.)
196
197===== From net/data/ssl/scripts/generate-redundant-test-chains.sh
198- redundant-validated-chain.pem
199- redundant-server-chain.pem
200- redundant-validated-chain-root.pem
201
202     Two chains, A -> B -> C -> D and A -> B -> C2 (C and C2 share the same
203     public key) to test that SSLInfo gets the reconstructed, re-ordered
204     chain instead of the chain as served. See
205     SSLClientSocketTest.VerifyReturnChainProperlyOrdered in
206     net/socket/ssl_client_socket_unittest.cc. These chains are valid until
207     26 Feb 2022 and are generated by
208     net/data/ssl/scripts/generate-redundant-test-chains.sh.
209
210===== From net/data/ssl/scripts/generate-client-certificates.sh
211- client_1.pem
212- client_1.key
213- client_1.pk8
214- client_1_ca.pem
215- client_2.pem
216- client_2.key
217- client_2.pk8
218- client_2_ca.pem
219- client_3.pem
220- client_3.key
221- client_3.pk8
222- client_3_ca.pem
223- client_4.pem
224- client_4.key
225- client_4.pk8
226- client_4_ca.pem
227- client_5.pem
228- client_5.key
229- client_5.pk8
230- client_5_ca.pem
231- client_6.pem
232- client_6.key
233- client_6.pk8
234- client_6_ca.pem
235- client_1_u16_password.p12
236- client_root_ca.pem
237     This is a set of files used to unit test SSL client certificate
238     authentication.
239     - client_1_ca.pem and client_2_ca.pem are the certificates of
240       two distinct signing CAs.
241     - client_1.pem and client_1.key correspond to the certificate and
242       private key for a first certificate signed by client_1_ca.pem.
243     - client_2.pem and client_2.key correspond to the certificate and
244       private key for a second certificate signed by client_2_ca.pem.
245     - each .pk8 file contains the same key as the corresponding .key file
246       as PKCS#8 PrivateKeyInfo in DER encoding.
247     - client_3.pem is nearly identical to client_2.pem, except it is used
248       to test wifi EAP-TLS authentication so it uses a different set
249       of X509v3 extensions.  Specifically it includes two Subject
250       Alternative Name fields recognized by Chrome OS.
251     - client_4.pem is similar to client_2.pem but is a P-256 ECDSA key rather
252       than RSA.
253     - client_5.pem is similar to client_2.pem but is a P-384 ECDSA key rather
254       than RSA.
255     - client_6.pem is similar to client_2.pem but is a P-521 ECDSA key rather
256       than RSA.
257     - client_root_ca.pem is the CA certificate which signed client_*_ca.pem.
258     - client_1_u16_password.p12 contains the client_1.key and client_1.pem key
259       and certificate, but is encoded as a PKCS#12 file and has a password with
260       UTF-16 symbols ("Hello, 世界").
261
262===== From net/data/ssl/scripts/generate-bad-eku-certs.sh
263- eku-test-root.pem
264- non-crit-codeSigning-chain.pem
265- crit-codeSigning-chain.pem
266     Two code-signing certificates (eKU: codeSigning; eKU: critical,
267     codeSigning) which we use to test that clients are making sure that web
268     server certs are checked for correct eKU fields (when an eKU field is
269     present). Since codeSigning is not valid for web server auth, the checks
270     should fail.
271
272===== From net/data/ssl/scripts/generate-multi-root-test-chains.sh
273- multi-root-chain1.pem
274- multi-root-chain2.pem
275     Two chains, A -> B -> C -> D and A -> B -> C2 -> E (C and C2 share the
276     same public key) to test that certificate validation caching does not
277     interfere with the chain_verify_callback used by CertVerifyProcChromeOS.
278     See CertVerifyProcChromeOSTest.
279
280===== From net/data/ssl/scripts/generate-multi-root-keychain.sh
281- multi-root.keychain: An OSX Keychain containing the generated
282  certificates multi-root-*-by-*.pem
283
284===== From net/data/ssl/scripts/generate-duplicate-cn-certs.sh
285- duplicate_cn_1.p12
286- duplicate_cn_1.pem
287- duplicate_cn_2.p12
288- duplicate_cn_2.pem
289     Two certificates from the same issuer that share the same common name,
290     but have distinct subject names (namely, their O fields differ). NSS
291     requires that certificates have unique nicknames if they do not share the
292     same subject, and these certificates are used to test that the nickname
293     generation algorithm generates unique nicknames.
294     The .pem versions contain just the certs, while the .p12 versions contain
295     both the cert and a private key, since there are multiple ways to import
296     certificates into NSS.
297
298===== From net/data/ssl/scripts/generate-self-signed-certs.sh
299- self-signed-invalid-name.pem
300- self-signed-invalid-sig.pem
301     Two "self-signed" certificates with mismatched names or an invalid
302     signature, respectively.
303
304===== From net/data/ssl/scripts/generate-key-usage-certs.sh
305- key_usage_rsa_no_extension.pem
306- key_usage_rsa_keyencipherment.pem
307- key_usage_rsa_digitalsignature.pem
308- key_usage_rsa_both.pem
309     Self-signed RSA certificates with various combinations of keyUsage
310     flags. Their private key is key_usage_rsa.key.
311
312- key_usage_p256_no_extension.pem
313- key_usage_p256_keyagreement.pem
314- key_usage_p256_digitalsignature.pem
315- key_usage_p256_both.pem
316     Self-signed P-256 certificates with various combinations of keyUsage
317     flags. Their private key is key_usage_p256.key.
318
319===== From net/data/ssl/scripts/generate_2_client_certs_1_key.sh
320- 2_client_certs_1_key.p12
321     Key pair and two client certificates for it in a single .p12 file.
322