Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 1 | This documents the X.509 CAs, certificates, and CRLS used for testing. |
| 2 | |
| 3 | Certification authorities |
| 4 | ------------------------- |
| 5 | |
| 6 | There are two main CAs for use as trusted roots: |
| 7 | - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA" |
| 8 | uses a RSA-2048 key |
Gilles Peskine | f040a17 | 2017-05-05 18:56:12 +0200 | [diff] [blame] | 9 | test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with |
| 10 | different hashes. |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 11 | - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA" |
| 12 | uses an EC key with NIST P-384 (aka secp384r1) |
| 13 | variants used to test the keyUsage extension |
| 14 | The files test-ca_cat12 and test-ca_cat21 contain them concatenated both ways. |
| 15 | |
| 16 | Two intermediate CAs are signed by them: |
| 17 | - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA" |
| 18 | uses RSA-4096, signed by test-ca2 |
| 19 | - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA" |
| 20 | uses an EC key with NIST P-256, signed by test-ca |
| 21 | |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 22 | A third intermediate CA is signed by test-int-ca2.crt: |
| 23 | - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3" |
Manuel Pégourié-Gonnard | d19a41d | 2017-07-14 11:05:59 +0200 | [diff] [blame^] | 24 | uses an EC key with NIST P-256, signed by test-int-ca2 |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 25 | |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 26 | Finally, other CAs for specific purposes: |
| 27 | - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert |
| 28 | enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string. |
| 29 | - test-ca-v1.crt: v1 "CA", signs |
| 30 | server1-v1.crt: v1 "intermediate CA", signs |
| 31 | server2-v1*.crt: EE cert (without of with chain in same file) |
Manuel Pégourié-Gonnard | 9a70225 | 2015-06-23 10:14:36 +0200 | [diff] [blame] | 32 | - keyUsage.decipherOnly.crt: has the decipherOnly keyUsage bit set |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 33 | |
| 34 | End-entity certificates |
| 35 | ----------------------- |
| 36 | |
| 37 | Short information fields: |
| 38 | |
| 39 | - name or pattern |
| 40 | - issuing CA: 1 -> test-ca.crt |
| 41 | 2 -> test-ca2.crt |
| 42 | I1 -> test-int-ca.crt |
| 43 | I2 -> test-int-ca2.crt |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 44 | I3 -> test-int-ca3.crt |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 45 | O -> other |
| 46 | - key type: R -> RSA, E -> EC |
| 47 | - C -> there is a CRL revoking this cert (see below) |
| 48 | - L -> CN=localhost (useful for local test servers) |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 49 | - P1, P2 if the file includes parent (resp. parent + grandparent) |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 50 | - free-form comments |
| 51 | |
| 52 | List of certificates: |
| 53 | |
| 54 | - cert_example_multi*.crt: 1/O R: subjectAltName |
| 55 | - cert_example_wildcard.crt: 1 R: wildcard in subject's CN |
| 56 | - cert_md*.crt, cert_sha*.crt: 1 R: signature hash |
| 57 | - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal) |
| 58 | - cli2.crt: 2 E: basic |
Gilles Peskine | f040a17 | 2017-05-05 18:56:12 +0200 | [diff] [blame] | 59 | - cli-rsa.key, cli-rsa-*.crt: RSA key used for test clients, signed by |
| 60 | the RSA test CA. |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 61 | - enco-cert-utf8str.pem: see enco-ca-prstr.pem above |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 62 | - server1*.crt: 1* R C* P1*: misc *(server1-v1 see test-ca-v1.crt above) |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 63 | *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 64 | P1 only for _ca.crt |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 65 | - server2-v1*.crt: O R: see test-ca-v1.crt above |
| 66 | - server2*.crt: 1 R L: misc |
| 67 | - server3.crt: 1 E L: EC cert signed by RSA CA |
| 68 | - server4.crt: 2 R L: RSA cert signed by EC CA |
| 69 | - server5*.crt: 2* E L: misc *(except server5-selfsigned) |
| 70 | -sha*: hashes |
| 71 | -eku*: extendeKeyUsage (cli/srv = www client/server, cs = codesign, etc) |
| 72 | -ku*: keyUsage (ds = signatures, ke/ka = key exchange/agreement) |
| 73 | - server6-ss-child.crt: O E: "child" of non-CA server5-selfsigned |
| 74 | - server6.crt, server6.pem: 2 E L C: revoked |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 75 | - server7*.crt: I1 E L P1*: EC signed by RSA signed by EC |
| 76 | *P1 except 7.crt, P2 _int-ca_ca2.crt |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 77 | *_space: with PEM error(s) |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 78 | _spurious: has spurious cert in its chain (S7 + I2 + I1) |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 79 | - server8*.crt: I2 R L: RSA signed by EC signed by RSA (P1 for _int-ca2) |
| 80 | - server9*.crt: 1 R C* L P1*: signed using RSASSA-PSS |
| 81 | *CRL for: 9.crt, -badsign, -with-ca (P1) |
Manuel Pégourié-Gonnard | 560fea3 | 2015-09-01 11:59:24 +0200 | [diff] [blame] | 82 | - server10*.crt: I3 E L P2/P3 |
Manuel Pégourié-Gonnard | b341dd5 | 2017-06-06 10:25:43 +0200 | [diff] [blame] | 83 | _spurious: S10 + I3 + I1(spurious) + I2 |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 84 | |
| 85 | Certificate revocation lists |
| 86 | ---------------------------- |
| 87 | |
| 88 | Signing CA in parentheses (same meaning as certificates). |
| 89 | |
Manuel Pégourié-Gonnard | 6ea831d | 2015-06-22 16:50:52 +0200 | [diff] [blame] | 90 | - crl-ec-sha*.pem: (2) server6.crt |
Paul Bakker | 6152b02 | 2015-04-14 15:00:09 +0200 | [diff] [blame] | 91 | - crl-future.pem: (2) server6.crt + unknown |
Manuel Pégourié-Gonnard | 4be3449 | 2014-11-19 12:52:43 +0100 | [diff] [blame] | 92 | - crl-rsa-pss-*.pem: (1) server9{,badsign,with-ca}.crt + cert_sha384.crt + unknown |
| 93 | - crl.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.crt + unknown |
| 94 | - crl_md*.pem: crl_sha*.pem: (1) same as crl.pem |
| 95 | - crt_cat_*.pem: (1+2) concatenations in various orders: |
| 96 | ec = crl-ec-sha256.pem, ecfut = crl-future.pem |
| 97 | rsa = crl.pem, rsabadpem = same with pem error, rsaexp = crl_expired.pem |
| 98 | |
| 99 | Note: crl_future would revoke server9 and cert_sha384.crt if signed by CA 1 |
| 100 | crl-rsa-pss* would revoke server6.crt if signed by CA 2 |
Gilles Peskine | f040a17 | 2017-05-05 18:56:12 +0200 | [diff] [blame] | 101 | |
| 102 | Generation |
| 103 | ---------- |
| 104 | |
| 105 | Newer test files have been generated through commands in the Makefile. The |
| 106 | resulting files are committed to the repository so that the tests can |
| 107 | run without having to re-do the generation and so that the output is the |
| 108 | same for everyone (the generation process is randomized). |
| 109 | |
| 110 | The origin of older certificates has not been recorded. |