NameDateSize

..14-Dec-201728

keystoreH A D14-Dec-20173.9 KiB

READMEH A D14-Dec-20173.3 KiB

truststoreH A D14-Dec-20172.2 KiB

unknown_keystoreH A D14-Dec-20172.5 KiB

README

1Keystores used for the JSSE regression test suite.
2
3keystore
4truststore
5==========
6
7These are the primary two keystores and contain entries for testing most
8of the JSSE regression test files.  There are three entries, one RSA-based,
9one DSA-based and one EC-based.  If they expire, simply recreate them
10using keytool and most of the test cases should work.
11
12The password on both files is:
13
14    passphrase
15
16There are no individual key entry passwords at this time.
17
18
19keystore entries
20================
21
22Alias name: dummy
23-----------------
24Creation date: May 16, 2016
25Entry type: PrivateKeyEntry
26Certificate chain length: 1
27Certificate[1]:
28Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
29Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
30Serial number: 57399b87
31Valid from: Mon May 16 10:06:38 UTC 2016 until: Sat May 16 10:06:38 UTC 2026
32Signature algorithm name: SHA256withRSA
33Version: 1
34
35This can be generated using hacked (update the keytool source code so that
36it can be used for version 1 X.509 certificate) keytool command:
37% keytool -genkeypair -alias dummy -keyalg RSA -keysize 2048 \
38  -sigalg SHA256withRSA \
39  -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \
40  -validity 3652 -keypass passphrase -keystore keystore -storepass passphrase
41
42
43Alias name: dummyecdsa
44----------------------
45Creation date: May 16, 2016
46Entry type: PrivateKeyEntry
47Certificate chain length: 1
48Certificate[1]:
49Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
50Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
51Serial number: 57399c1d
52Valid from: Mon May 16 10:09:01 UTC 2016 until: Sat May 16 10:09:01 UTC 2026
53Signature algorithm name: SHA256withECDSA
54Version: 1
55
56This can be generated using hacked (update the keytool source code so that
57it can be used for version 1 X.509 certificate) keytool command:
58% keytool -genkeypair -alias dummy -keyalg EC -keysize 256 \
59  -sigalg SHA256withECDSA \
60  -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \
61  -validity 3652 -keypass passphrase -keystore keystore -storepass passphrase
62
63Alias name: dummydsa
64--------------------
65Creation date: Mar 11, 2007
66Entry type: PrivateKeyEntry
67Certificate chain length: 1
68Certificate[1]:
69Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
70Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
71Serial number: 45f3a314
72Valid from: Sun Mar 11 06:35:00 UTC 2007 until: Wed Mar 08 06:35:00 UTC 2017
73Certificate fingerprints:
74Signature algorithm name: SHA1withDSA
75Version: 1
76
77This can be generated using hacked (update the keytool source code so that
78it can be used for version 1 X.509 certificate) keytool command:
79% keytool -genkeypair -alias dummy -keyalg DSA -keysize 1024 \
80  -sigalg SHA1withDSA \
81  -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \
82  -validity 3652 -keypass passphrase -keystore keystore -storepass passphrase
83
84
85truststore entries
86==================
87This key store contains only trusted certificate entries.  The same
88certificates are used in both keystore and truststore.
89
90
91unknown_keystore
92================
93A keystore you can use when you don't want things to be verified.
94Use this with keystore/truststore, and you'll never get a match.
95