mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
Bug 585122 - In PSM provide EV only with OCSP revocation (Part 2: tests). r=briansmith.
This commit is contained in:
parent
c739891ca3
commit
34263e81e7
@ -18,6 +18,8 @@ let certList = [
|
||||
// Test for successful EV validation
|
||||
'int-ev-valid',
|
||||
'ev-valid',
|
||||
'no-ocsp-url-cert', // a cert signed by the EV auth that has no OCSP url
|
||||
// but that contains a valid CRLDP.
|
||||
|
||||
// Testing a root that looks like EV but is not EV enabled
|
||||
'int-non-ev-root',
|
||||
@ -34,10 +36,10 @@ var gOCSPResponseCounter = 0;
|
||||
|
||||
function start_ocsp_responder() {
|
||||
const SERVER_PORT = 8888;
|
||||
|
||||
gHttpServer = new HttpServer();
|
||||
gHttpServer.registerPrefixHandler("/",
|
||||
function handleServerCallback(aRequest, aResponse) {
|
||||
do_check_neq(aRequest.host, "crl.example.com"); // No CRL checks
|
||||
let cert_nick = aRequest.path.slice(1, aRequest.path.length - 1);
|
||||
do_print("Generating ocsp response for '" + cert_nick + "'");
|
||||
aResponse.setStatusLine(aRequest.httpVersion, 200, "OK");
|
||||
@ -55,6 +57,7 @@ function start_ocsp_responder() {
|
||||
gOCSPResponseCounter++;
|
||||
});
|
||||
gHttpServer.identity.setPrimary("http", "www.example.com", SERVER_PORT);
|
||||
gHttpServer.identity.add("http", "crl.example.com", SERVER_PORT);
|
||||
gHttpServer.start(SERVER_PORT);
|
||||
}
|
||||
|
||||
@ -91,7 +94,9 @@ function run_test() {
|
||||
load_ca("non-evroot-ca");
|
||||
|
||||
// setup and start ocsp responder
|
||||
Services.prefs.setCharPref("network.dns.localDomains", 'www.example.com');
|
||||
Services.prefs.setCharPref("network.dns.localDomains",
|
||||
'www.example.com, crl.example.com');
|
||||
|
||||
start_ocsp_responder();
|
||||
|
||||
run_next_test();
|
||||
@ -108,6 +113,11 @@ add_test(function() {
|
||||
run_next_test();
|
||||
});
|
||||
|
||||
add_test(function() {
|
||||
check_ee_for_ev("no-ocsp-url-cert", false);
|
||||
run_next_test();
|
||||
});
|
||||
|
||||
// Test for bug 917380
|
||||
add_test(function () {
|
||||
const nsIX509Cert = Ci.nsIX509Cert;
|
||||
|
Binary file not shown.
Binary file not shown.
@ -31,9 +31,9 @@ subject_key_ident = "subjectKeyIdentifier = hash\n"
|
||||
aia_prefix = "authorityInfoAccess = OCSP;URI:http://www.example.com:8888/"
|
||||
aia_suffix ="/\n"
|
||||
intermediate_crl = ("crlDistributionPoints = " +
|
||||
"URI:http://crl.example.com/root-ev.crl\n")
|
||||
"URI:http://crl.example.com:8888/root-ev.crl\n")
|
||||
endentity_crl = ("crlDistributionPoints = " +
|
||||
"URI:http://crl.example.com/ee-crl.crl\n")
|
||||
"URI:http://crl.example.com:8888/ee-crl.crl\n")
|
||||
|
||||
mozilla_testing_ev_policy = ("certificatePolicies = @v3_ca_ev_cp\n\n" +
|
||||
"[ v3_ca_ev_cp ]\n" +
|
||||
@ -93,6 +93,22 @@ def generate_certs():
|
||||
"int-" + prefix)
|
||||
import_cert_and_pkcs12(int_cert, pk12file, "int-" + prefix, ",,")
|
||||
import_untrusted_cert(ee_cert, prefix)
|
||||
|
||||
# now we generate an end entity cert with an AIA with no OCSP URL
|
||||
no_ocsp_url_ext_aia = ("authorityInfoAccess =" +
|
||||
"caIssuers;URI:http://www.example.com/ca.html\n");
|
||||
[no_ocsp_key, no_ocsp_cert] = CertUtils.generate_cert_generic(db,
|
||||
srcdir,
|
||||
random.randint(100, 40000000),
|
||||
key_type,
|
||||
'no-ocsp-url-cert',
|
||||
EE_basic_constraints + EE_full_ku +
|
||||
Server_eku + authority_key_ident +
|
||||
no_ocsp_url_ext_aia + endentity_crl +
|
||||
mozilla_testing_ev_policy,
|
||||
int_key, int_cert);
|
||||
import_untrusted_cert(no_ocsp_cert, 'no-ocsp-url-cert');
|
||||
|
||||
[bad_ca_key, bad_ca_cert] = CertUtils.generate_cert_generic( db,
|
||||
srcdir,
|
||||
1,
|
||||
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Loading…
Reference in New Issue
Block a user