wolfcrypt-jni/examples/certs
Chris Conlon b302945e5b add example client.p12 file for WolfSSLKeyStore testing 2024-11-13 10:50:28 -07:00
..
crl JCE: add WolfSSLKeyStore (WKS) KeyStore implementation 2024-07-15 15:50:06 -06:00
intermediate JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
systemcerts JCE: skip WolfSSLKeyStoreTest.testLoadSystemCAKeyStore() if JAR has not been created yet 2024-11-08 11:40:54 -07:00
README.md JCE: add WolfSSLKeyStore (WKS) KeyStore implementation 2024-07-15 15:50:06 -06:00
ca-cert.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-cert.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-client.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
ca-client.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
ca-ecc-cert.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-ecc-cert.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-ecc-key.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-key.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-key.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-keyPkcs8.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ca-server-ecc-256.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
ca-server-ecc-256.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
ca-server-rsa-2048.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
ca-server-rsa-2048.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
ca-server.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
ca-server.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
cacerts.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
cacerts.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client-cert.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
client-cert.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
client-ecc-cert.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
client-ecc-cert.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
client-ecc.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client-ecc.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client-key.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
client-key.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
client-keyPub.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
client-rsa-1024.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client-rsa-1024.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client-rsa.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client-rsa.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
client.p12 add example client.p12 file for WolfSSLKeyStore testing 2024-11-13 10:50:28 -07:00
client.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
dh2048.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ecc-client-key.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ecc-client-key.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ecc-key.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
ecc-keyPkcs8.der JCE: add WolfSSLKeyStore (WKS) KeyStore implementation 2024-07-15 15:50:06 -06:00
keytool-print-wks.sh JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server-cert.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
server-cert.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
server-ecc.der JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
server-ecc.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server-ecc.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
server-ecc.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server-key.der JCE: add WolfSSLKeyStore (WKS) KeyStore implementation 2024-07-15 15:50:06 -06:00
server-key.pem JCE: add implementation of CertPathValidator (PKIX) 2024-02-21 13:37:44 -07:00
server-keyPkcs8.der JCE: add WolfSSLKeyStore (WKS) KeyStore implementation 2024-07-15 15:50:06 -06:00
server-rsa-1024.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server-rsa-1024.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server-rsa.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server-rsa.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server.jks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
server.wks JNI/JCE: update example certs, JKS, and WKS files. Add method names to 2024-07-15 15:50:09 -06:00
update-certs.sh JCE: add WolfSSLKeyStore (WKS) KeyStore implementation 2024-07-15 15:50:06 -06:00
update-jks-wks.sh add example client.p12 file for WolfSSLKeyStore testing 2024-11-13 10:50:28 -07:00

README.md

Example and Test Certificates, Keys, and KeyStore Files

This directory contains example certificates, keys, and Java KeyStore files used for testing and examples.

These certificates and keys have been copied over from the wolfSSL proper example certs directory.

If new certs/keys are needed or added here, consider if they should also be added to wolfSSL proper.

Updating Example Certificates and Keys

To update the example certificates and keys, use the provided update-certs.sh bash script. This script requires one argument on the command line which is the location of the wolfSSL proper certs directory.

$ cd wolfcryptjni/examples/certs
$ ./update-certs.sh /path/to/wolfssl/certs

This script only updates the .pem and .der certificate and key files. To update the example Java KeyStore files, see the next section.

Updating Example Java KeyStore Files

To update the example Java KeyStore files, use the provided update-jks-wks.sh bash script. This script requires one argument on the command line which is the location of the wolfSSL proper certs directory.

This script will create new KeyStore files from original certificates. It will first create JKS KeyStore files, then convert those to WKS (WolfSSLKeyStore) format.

$ cd wolfcryptjni/examples/certs
$ ./update-jks-wks.sh /path/to/wolfssl/certs

This script only updates the example .jks and .wks files and not the individual .pem or .der files in this directory. For that, please see the above section.

Testing that Java keytool can read/parse WKS files

To confirm that Java keytool can parse WolfSSLKeyStore (WKS) format stores OK, the keytool-print-wks.sh script can be used. This will call keytool -list on each WKS KeyStore which is expected to pass successfully.

Support

Please contact the wolfSSL support team at support@wolfssl.com with any questions or feedback.