NOTE: This page is meant to be viewed as rendered by GitHub pages, not in GitHub.
Files are named with the pattern: [supplier]-[YYYYMMDD]-[optional_descriptive_string].[extension]
.
The descriptive string for most of these test files is constructed as follows:
Code | Meaning |
---|---|
C | Claim |
A | Parent ingredient (acquisition) |
I | Ingredient |
X | Hash mismatch - off the golden path (OTGP) |
E-clm- | Error: A referenced claim is missing |
E-dat- | Error: Hard binding hash mismatch (same as X or OTGP) |
E-sig- | Error: Signature did not validate |
E-uri- | Error: An assertion has been tampered with (URI hash mismatch) |
The manifest store JSON files listed below are generated by running C2PA Tool. For details, see below.
NOTE: Content Credentials for the assets from Adobe were added using C2PA Tool’s test certificate, which is not on the Verify tool’s temporary known certificate list. Thus, for these images, Verify displays the message This Content Credential was issued by an unknown source.
To generate the manifest store files:
extract-manifests.sh
script as follows:
cd public-testfiles
./extract-manifests.sh
The script runs C2PA Tool on all the files in the video/mp4
, image/jpeg
, and pdf
directories with the -d
option to generate a detailed and standard manifest reports, saving them to sub-directories with the same base name as each asset within the manifests
directory. Each sub-directory will also include extracted thumbnails.