gecko-dev/build/pgo/certs
Ehsan Akhgari 033bc59a4b Bug 531590 - Increase the default validity of the self-signed certificate that we use for our tests to 10 years by default; r=mayhemer
This is a dump of the new certificate information obtained by running
`certutil -L -d . -n 'pgo server certificate'`:

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 2 (0x2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Temporary Certificate Authority,O=Mozilla Testing,OU=Prof
            ile Guided Optimization"
        Validity:
            Not Before: Mon Nov 07 20:38:29 2011
            Not After : Sun Nov 07 20:38:29 2021
        Subject: "CN=example.com"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:43:79:cf:52:ce:49:08:47:9c:57:9b:f8:0b:de:7a:
                    ca:ba:1c:88:9f:fd:d8:0b:df:a8:98:92:22:46:08:3e:
                    d2:25:4c:09:c2:32:3f:51:f9:79:60:b6:ac:94:0e:7a:
                    33:13:e7:0b:f7:97:72:3b:37:8f:d4:e5:ea:0c:e2:9e:
                    4a:5b:28:1d:8c:eb:a1:b4:96:47:37:bf:fc:f0:87:d3:
                    ca:13:7e:38:45:f5:3f:75:1d:45:0d:72:36:b3:cf:57:
                    13:99:cd:6d:3c:b8:e9:9c:ec:af:2e:2c:25:3a:d5:13:
                    7e:6f:51:63:2a:eb:e1:4f:ee:68:42:63:c2:f4:e1:a3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Subject Alt Name
            DNS name: "example.com"
            DNS name: "test1.example.com"
            DNS name: "test2.example.com"
            DNS name: "sub1.test1.example.com"
            DNS name: "sub1.test2.example.com"
            DNS name: "sub2.test1.example.com"
            DNS name: "sub2.test2.example.com"
            DNS name: "requestclientcert.example.com"
            DNS name: "requireclientcert.example.com"
            DNS name: "xn--hxajbheg2az3al.xn--jxalpdlp"
            DNS name: "sub1.xn--hxajbheg2az3al.xn--jxalpdlp"
            DNS name: "sectest1.example.org"
            DNS name: "sub.sectest2.example.org"
            DNS name: "sectest2.example.org"
            DNS name: "sub.sectest1.example.org"
            DNS name: "redirproxy.example.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a2:f1:08:1c:de:74:27:95:34:a0:1a:6c:9c:fe:8f:7f:
        45:38:af:1f:bb:04:b6:e5:f8:e4:35:bf:ce:23:53:74:
        ca:89:26:6b:22:d7:f3:f7:66:d4:f1:8b:95:7d:c4:27:
        44:57:10:f3:3d:ea:bb:0c:88:d2:09:67:e3:d1:47:6c:
        2c:2b:6d:78:41🆎7e:64:59:e3:df:05:fa:65:72:c9:
        fd:5b:f6:0e:39:7d:02:31:99:5b:fb:29:17:9a:c9:0e:
        64:4d:8c💿bf:6e:d0:9e:b0:68:a6:d9:ee:a0:16:ec:
        50:dc:58:7e:7b:82:3e:ce:98:a6:20:4d:a6:bd:ad:05
    Fingerprint (MD5):
        CC:F2:AD:07:F9:B8:A5:3B:A6:BB:75:80:4E:E6:BB:08
    Fingerprint (SHA1):
        2D:E7:9A:AE:80:CB:FD:51:B1:23:E0:CF:6F:6B:51:19:E5:28:BB:95

    Certificate Trust Flags:
        SSL Flags:
            Terminal Record
            Trusted
            User
        Email Flags:
            User
        Object Signing Flags:
            User
2011-11-07 18:48:49 -05:00
..
bug483440-attack2b.ca Bug 483440 - PSM doesn't detect invalid OID encodings in Cert Viewer Details tab, r=nelson+johnath 2009-07-29 22:23:27 +02:00
bug483440-attack7.ca Bug 483440 - PSM doesn't detect invalid OID encodings in Cert Viewer Details tab, r=nelson+johnath 2009-07-29 22:23:27 +02:00
bug483440-pk10oflo.ca Bug 483440 - PSM doesn't detect invalid OID encodings in Cert Viewer Details tab, r=nelson+johnath 2009-07-29 22:23:27 +02:00
cert8.db Bug 531590 - Increase the default validity of the self-signed certificate that we use for our tests to 10 years by default; r=mayhemer 2011-11-07 18:48:49 -05:00
jartests-object.ca
key3.db Bug 531590 - Increase the default validity of the self-signed certificate that we use for our tests to 10 years by default; r=mayhemer 2011-11-07 18:48:49 -05:00
mochitest.client
pgoca.ca
pgoca.p12
secmod.db