blob: 2cf0c66e9820d93feb149f2c98955a7ae0fe3cc2 [file] [log] [blame]
Manuel Pégourié-Gonnard4be34492014-11-19 12:52:43 +01001This documents the X.509 CAs, certificates, and CRLS used for testing.
2
3Certification authorities
4-------------------------
5
6There are two main CAs for use as trusted roots:
7- test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
8 uses a RSA-2048 key
9- test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
10 uses an EC key with NIST P-384 (aka secp384r1)
11 variants used to test the keyUsage extension
12The files test-ca_cat12 and test-ca_cat21 contain them concatenated both ways.
13
14Two intermediate CAs are signed by them:
15- test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
16 uses RSA-4096, signed by test-ca2
17- test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
18 uses an EC key with NIST P-256, signed by test-ca
19
20Finally, other CAs for specific purposes:
21- enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
22 enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string.
23- test-ca-v1.crt: v1 "CA", signs
24 server1-v1.crt: v1 "intermediate CA", signs
25 server2-v1*.crt: EE cert (without of with chain in same file)
Manuel Pégourié-Gonnard9a702252015-06-23 10:14:36 +020026- keyUsage.decipherOnly.crt: has the decipherOnly keyUsage bit set
Manuel Pégourié-Gonnard4be34492014-11-19 12:52:43 +010027
28End-entity certificates
29-----------------------
30
31Short information fields:
32
33- name or pattern
34- issuing CA: 1 -> test-ca.crt
35 2 -> test-ca2.crt
36 I1 -> test-int-ca.crt
37 I2 -> test-int-ca2.crt
38 O -> other
39- key type: R -> RSA, E -> EC
40- C -> there is a CRL revoking this cert (see below)
41- L -> CN=localhost (useful for local test servers)
42- P1, P2 if the file include parent (resp. parent + grandparent)
43- free-form comments
44
45List of certificates:
46
47- cert_example_multi*.crt: 1/O R: subjectAltName
48- cert_example_wildcard.crt: 1 R: wildcard in subject's CN
49- cert_md*.crt, cert_sha*.crt: 1 R: signature hash
50- cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal)
51- cli2.crt: 2 E: basic
52- enco-cert-utf8str.pem: see enco-ca-prstr.pem above
53- server1*.crt: 1* R C*: misc *(server1-v1 see test-ca-v1.crt above)
54 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt
55- server2-v1*.crt: O R: see test-ca-v1.crt above
56- server2*.crt: 1 R L: misc
57- server3.crt: 1 E L: EC cert signed by RSA CA
58- server4.crt: 2 R L: RSA cert signed by EC CA
59- server5*.crt: 2* E L: misc *(except server5-selfsigned)
60 -sha*: hashes
61 -eku*: extendeKeyUsage (cli/srv = www client/server, cs = codesign, etc)
62 -ku*: keyUsage (ds = signatures, ke/ka = key exchange/agreement)
63- server6-ss-child.crt: O E: "child" of non-CA server5-selfsigned
64- server6.crt, server6.pem: 2 E L C: revoked
65- server7*.crt: I1 E L P1*: EC signed by RSA signed by EC *(except 7.crt)
66 *_space: with PEM error(s)
67- server8*.crt: I2 R L: RSA signed by EC signed by RSA (P1 for _int-ca2)
68- server9*.crt: 1 R C* L P1*: signed using RSASSA-PSS
69 *CRL for: 9.crt, -badsign, -with-ca (P1)
70
71Certificate revocation lists
72----------------------------
73
74Signing CA in parentheses (same meaning as certificates).
75
Manuel Pégourié-Gonnard6ea831d2015-06-22 16:50:52 +020076- crl-ec-sha*.pem: (2) server6.crt
Paul Bakker6152b022015-04-14 15:00:09 +020077- crl-future.pem: (2) server6.crt + unknown
Manuel Pégourié-Gonnard4be34492014-11-19 12:52:43 +010078- crl-rsa-pss-*.pem: (1) server9{,badsign,with-ca}.crt + cert_sha384.crt + unknown
79- crl.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.crt + unknown
80- crl_md*.pem: crl_sha*.pem: (1) same as crl.pem
81- crt_cat_*.pem: (1+2) concatenations in various orders:
82 ec = crl-ec-sha256.pem, ecfut = crl-future.pem
83 rsa = crl.pem, rsabadpem = same with pem error, rsaexp = crl_expired.pem
84
85Note: crl_future would revoke server9 and cert_sha384.crt if signed by CA 1
86 crl-rsa-pss* would revoke server6.crt if signed by CA 2