gecko/security/nss/tests/chains/scenarios/extension.cfg

135 lines
2.9 KiB
INI
Raw Normal View History

# ***** BEGIN LICENSE BLOCK *****
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
#
# The contents of this file are subject to the Mozilla Public License Version
# 1.1 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
# http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS IS" basis,
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
# for the specific language governing rights and limitations under the
# License.
#
# The Original Code is the Network Security Services (NSS)
#
# The Initial Developer of the Original Code is Sun Microsystems, Inc.
# Portions created by the Initial Developer are Copyright (C) 2009
# the Initial Developer. All Rights Reserved.
#
# Contributor(s):
# Slavomir Katuscak <slavomir.katuscak@sun.com>, Sun Microsystems
#
# Alternatively, the contents of this file may be used under the terms of
# either the GNU General Public License Version 2 or later (the "GPL"), or
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
# in which case the provisions of the GPL or the LGPL are applicable instead
# of those above. If you wish to allow use of your version of this file only
# under the terms of either the GPL or the LGPL, and not to allow others to
# use your version of this file under the terms of the MPL, indicate your
# decision by deleting the provisions above and replace them with the notice
# and other provisions required by the GPL or the LGPL. If you do not delete
# the provisions above, a recipient may use your version of this file under
# the terms of any one of the MPL, the GPL or the LGPL.
#
# ***** END LICENSE BLOCK *****
scenario Extension
entity Root
type Root
entity CA1
type Intermediate
issuer Root
policy OID.1.0
entity CA2
type Intermediate
issuer CA1
policy OID.1.0
entity User
type EE
issuer CA2
policy OID.1.0
db All
verify User:CA2
cert CA2:CA1
cert CA1:Root
cert Root:
trust Root:
policy OID.1.0
result pass
verify User:CA2
cert CA2:CA1
cert CA1:Root
cert Root:
trust Root:
policy OID.2.0
result fail
verify User:CA2
cert CA2:CA1
cert CA1:Root
trust CA1:Root
policy OID.1.0
result pass
verify User:CA2
cert CA2:CA1
cert CA1:Root
trust CA1:Root
policy OID.2.0
result fail
verify User:CA2
cert CA2:CA1
trust CA2:CA1
policy OID.1.0
result pass
verify User:CA2
cert CA2:CA1
trust CA2:CA1
policy OID.2.0
result fail
import Root::
import CA1:Root:
import CA2:CA1:
verify User:CA2
trust Root
policy OID.1.0
result pass
verify User:CA2
trust Root
policy OID.2.0
result fail
verify User:CA2
trust CA1
policy OID.1.0
result pass
verify User:CA2
trust CA1
policy OID.2.0
result fail
verify User:CA2
trust CA2
policy OID.1.0
result pass
verify User:CA2
trust CA2
policy OID.2.0
result fail