Name Date Size #Lines LOC

..--

READMEH A D25-Apr-20252.5 KiB7552

badclient.keyH A D25-Apr-20251.7 KiB2928

badclient.pemH A D25-Apr-20251.3 KiB2322

badserver.keyH A D25-Apr-20251.7 KiB2928

badserver.pemH A D25-Apr-20251.3 KiB2322

ca-openssl.cnfH A D25-Apr-2025542 1915

ca.keyH A D25-Apr-20251.7 KiB2928

ca.pemH A D25-Apr-20251.2 KiB2120

client.keyH A D25-Apr-20251.7 KiB2928

client.pemH A D25-Apr-20251.1 KiB2120

ecdsa.keyH A D25-Apr-2025237 65

index.txtHD25-Apr-20250

openssl.cnfH A D25-Apr-202510.7 KiB360270

server0.keyH A D25-Apr-20251.7 KiB2928

server0.pemH A D25-Apr-20251.2 KiB2120

server1-openssl.cnfH A D25-Apr-20252.8 KiB8369

server1.keyH A D25-Apr-20251.7 KiB2928

server1.pemH A D25-Apr-20251.3 KiB2322

README

1The test credentials (CONFIRMEDTESTKEY) have been generated with the following
2commands:
3
4Bad credentials (badclient.* / badserver.*):
5============================================
6
7These are self-signed certificates:
8
9$ openssl req -x509 -newkey rsa:2048 -keyout badserver.key -out badserver.pem \
10  -days 3650 -nodes
11
12When prompted for certificate information, everything is default except the
13common name which is set to badserver.test.google.com.
14
15
16Valid test credentials:
17=======================
18
19The ca is self-signed:
20----------------------
21
22$ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
23  -config ca-openssl.cnf -days 3650 -extensions v3_req
24When prompted for certificate information, everything is default.
25
26client is issued by CA:
27-----------------------
28
29$ openssl genrsa -out client.key.rsa 2048
30$ openssl pkcs8 -topk8 -in client.key.rsa -out client.key -nocrypt
31$ openssl req -new -key client.key -out client.csr
32
33When prompted for certificate information, everything is default except the
34common name which is set to testclient.
35
36$ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \
37  -out client.pem -days 3650
38
39server0 is issued by CA:
40------------------------
41
42$ openssl genrsa -out server0.key.rsa 2048
43$ openssl pkcs8 -topk8 -in server0.key.rsa -out server0.key -nocrypt
44$ openssl req -new -key server0.key -out server0.csr
45
46When prompted for certificate information, everything is default except the
47common name which is set to *.test.google.com.au.
48
49$ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in server0.csr \
50  -out server0.pem -days 3650
51
52server1 is issued by CA with a special config for subject alternative names:
53----------------------------------------------------------------------------
54
55$ openssl genrsa -out server1.key.rsa 2048
56$ openssl pkcs8 -topk8 -in server1.key.rsa -out server1.key -nocrypt
57$ openssl req -new -key server1.key -out server1.csr -config server1-openssl.cnf
58
59When prompted for certificate information, everything is default except the
60common name which is set to *.test.google.com.
61
62$ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in server1.csr \
63  -out server1.pem -extensions req_ext -extfile server1-openssl.cnf -days 3650
64
65ecdsa.key is used to test keys with algorithm other than RSA:
66----------------------------------------------------------------------------
67$ openssl ecparam -name secp256k1 -genkey -noout -out ecdsa.pem
68$ openssl pkcs8 -topk8 -in ecdsa.pem -out ecdsa.key -nocrypt
69
70Clean up:
71---------
72$ rm *.rsa
73$ rm *.csr
74$ rm ca.srl
75