mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
0ccf958b45
== NSS portion == r=rrelyea/wtc for upgrading mozilla-central to cvs tag NSS_3_12_6_BETA1 == This includes reapplying the (merged) patch from bug 519550 on top of NSS. == PSM portion == Includes the patch to disable TLS compression, r=kaie == Include the patch to disable zlib test programs, which don't work on maemo, r=kaie
408 lines
6.6 KiB
INI
408 lines
6.6 KiB
INI
# ***** BEGIN LICENSE BLOCK *****
|
|
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
#
|
|
# The contents of this file are subject to the Mozilla Public License Version
|
|
# 1.1 (the "License"); you may not use this file except in compliance with
|
|
# the License. You may obtain a copy of the License at
|
|
# http://www.mozilla.org/MPL/
|
|
#
|
|
# Software distributed under the License is distributed on an "AS IS" basis,
|
|
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
# for the specific language governing rights and limitations under the
|
|
# License.
|
|
#
|
|
# The Original Code is the Network Security Services (NSS)
|
|
#
|
|
# The Initial Developer of the Original Code is Sun Microsystems, Inc.
|
|
# Portions created by the Initial Developer are Copyright (C) 2009
|
|
# the Initial Developer. All Rights Reserved.
|
|
#
|
|
# Contributor(s):
|
|
# Slavomir Katuscak <slavomir.katuscak@sun.com>, Sun Microsystems
|
|
#
|
|
# Alternatively, the contents of this file may be used under the terms of
|
|
# either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
# in which case the provisions of the GPL or the LGPL are applicable instead
|
|
# of those above. If you wish to allow use of your version of this file only
|
|
# under the terms of either the GPL or the LGPL, and not to allow others to
|
|
# use your version of this file under the terms of the MPL, indicate your
|
|
# decision by deleting the provisions above and replace them with the notice
|
|
# and other provisions required by the GPL or the LGPL. If you do not delete
|
|
# the provisions above, a recipient may use your version of this file under
|
|
# the terms of any one of the MPL, the GPL or the LGPL.
|
|
#
|
|
# ***** END LICENSE BLOCK *****
|
|
|
|
scenario AnyPolicyWithLevel
|
|
|
|
entity RootCA
|
|
type Root
|
|
|
|
entity CA1
|
|
type Intermediate
|
|
issuer RootCA
|
|
policy any
|
|
inhibit 1
|
|
|
|
entity CA12
|
|
type Intermediate
|
|
issuer CA1
|
|
policy any
|
|
|
|
entity CA13
|
|
type Intermediate
|
|
issuer CA12
|
|
policy OID.1.0
|
|
|
|
entity EE1
|
|
type EE
|
|
issuer CA13
|
|
policy OID.1.0
|
|
|
|
entity CA22
|
|
type Intermediate
|
|
issuer CA1
|
|
policy any
|
|
|
|
entity CA23
|
|
type Intermediate
|
|
issuer CA22
|
|
policy any
|
|
|
|
entity EE2
|
|
type EE
|
|
issuer CA23
|
|
policy OID.1.0
|
|
|
|
entity CA32
|
|
type Intermediate
|
|
issuer CA1
|
|
policy any
|
|
inhibit 1
|
|
|
|
entity CA33
|
|
type Intermediate
|
|
issuer CA32
|
|
policy any
|
|
|
|
entity EE3
|
|
type EE
|
|
issuer CA33
|
|
policy OID.1.0
|
|
|
|
entity CA42
|
|
type Intermediate
|
|
issuer CA1
|
|
policy any
|
|
policy OID.1.0
|
|
|
|
entity CA43
|
|
type Intermediate
|
|
issuer CA42
|
|
policy any
|
|
policy OID.1.0
|
|
|
|
entity EE4
|
|
type EE
|
|
issuer CA43
|
|
policy OID.1.0
|
|
|
|
entity CA52
|
|
type Intermediate
|
|
issuer CA1
|
|
policy any
|
|
policy OID.1.0
|
|
|
|
entity CA53
|
|
type Intermediate
|
|
issuer CA52
|
|
policy any
|
|
|
|
entity EE5
|
|
type EE
|
|
issuer CA53
|
|
policy OID.1.0
|
|
|
|
entity CA61
|
|
type Intermediate
|
|
issuer RootCA
|
|
policy any
|
|
inhibit 5
|
|
|
|
entity CA62
|
|
type Intermediate
|
|
issuer CA61
|
|
policy any
|
|
|
|
entity EE62
|
|
type EE
|
|
issuer CA62
|
|
policy OID.1.0
|
|
|
|
entity CA63
|
|
type Intermediate
|
|
issuer CA62
|
|
policy any
|
|
|
|
entity EE63
|
|
type EE
|
|
issuer CA63
|
|
policy OID.1.0
|
|
|
|
entity CA64
|
|
type Intermediate
|
|
issuer CA63
|
|
policy any
|
|
|
|
entity EE64
|
|
type EE
|
|
issuer CA64
|
|
policy OID.1.0
|
|
|
|
entity CA65
|
|
type Intermediate
|
|
issuer CA64
|
|
policy any
|
|
|
|
entity EE65
|
|
type EE
|
|
issuer CA65
|
|
policy OID.1.0
|
|
|
|
entity CA66
|
|
type Intermediate
|
|
issuer CA65
|
|
policy any
|
|
|
|
entity EE66
|
|
type EE
|
|
issuer CA66
|
|
policy OID.1.0
|
|
|
|
entity CA67
|
|
type Intermediate
|
|
issuer CA66
|
|
policy any
|
|
|
|
entity EE67
|
|
type EE
|
|
issuer CA67
|
|
policy OID.1.0
|
|
|
|
db All
|
|
|
|
verify EE1:CA13
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA12:CA1
|
|
cert CA13:CA12
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result pass
|
|
|
|
verify EE1:CA13
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA12:CA1
|
|
cert CA13:CA12
|
|
trust RootCA:
|
|
policy OID.2.0
|
|
result fail
|
|
|
|
verify EE1:CA13
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA12:CA1
|
|
cert CA13:CA12
|
|
trust RootCA:
|
|
policy OID.2.5.29.32.0
|
|
result pass
|
|
|
|
verify EE2:CA23
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA22:CA1
|
|
cert CA23:CA22
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result fail
|
|
|
|
verify EE2:CA23
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA22:CA1
|
|
cert CA23:CA22
|
|
trust RootCA:
|
|
policy OID.2.0
|
|
result fail
|
|
|
|
verify EE2:CA23
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA22:CA1
|
|
cert CA23:CA22
|
|
trust RootCA:
|
|
policy OID.2.5.29.32.0
|
|
result fail
|
|
|
|
verify EE3:CA33
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA32:CA1
|
|
cert CA33:CA32
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result fail
|
|
|
|
verify EE3:CA33
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA32:CA1
|
|
cert CA33:CA32
|
|
trust RootCA:
|
|
policy OID.2.0
|
|
result fail
|
|
|
|
verify EE3:CA33
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA32:CA1
|
|
cert CA33:CA32
|
|
trust RootCA:
|
|
policy OID.2.5.29.32.0
|
|
result fail
|
|
|
|
verify EE4:CA43
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA42:CA1
|
|
cert CA43:CA42
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result pass
|
|
|
|
verify EE4:CA43
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA42:CA1
|
|
cert CA43:CA42
|
|
trust RootCA:
|
|
policy OID.2.0
|
|
result fail
|
|
|
|
verify EE4:CA43
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA42:CA1
|
|
cert CA43:CA42
|
|
trust RootCA:
|
|
policy OID.2.5.29.32.0
|
|
result pass
|
|
|
|
verify EE5:CA53
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA52:CA1
|
|
cert CA53:CA52
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result fail
|
|
|
|
verify EE5:CA53
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA52:CA1
|
|
cert CA53:CA52
|
|
trust RootCA:
|
|
policy OID.2.0
|
|
result fail
|
|
|
|
verify EE5:CA53
|
|
cert RootCA:
|
|
cert CA1:RootCA
|
|
cert CA52:CA1
|
|
cert CA53:CA52
|
|
trust RootCA:
|
|
policy OID.2.5.29.32.0
|
|
result fail
|
|
|
|
verify EE62:CA62
|
|
cert RootCA:
|
|
cert CA61:RootCA
|
|
cert CA62:CA61
|
|
cert CA63:CA62
|
|
cert CA64:CA63
|
|
cert CA65:CA64
|
|
cert CA66:CA65
|
|
cert CA67:CA66
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result pass
|
|
|
|
verify EE63:CA63
|
|
cert RootCA:
|
|
cert CA61:RootCA
|
|
cert CA62:CA61
|
|
cert CA63:CA62
|
|
cert CA64:CA63
|
|
cert CA65:CA64
|
|
cert CA66:CA65
|
|
cert CA67:CA66
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result pass
|
|
|
|
verify EE64:CA64
|
|
cert RootCA:
|
|
cert CA61:RootCA
|
|
cert CA62:CA61
|
|
cert CA63:CA62
|
|
cert CA64:CA63
|
|
cert CA65:CA64
|
|
cert CA66:CA65
|
|
cert CA67:CA66
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result pass
|
|
|
|
verify EE65:CA65
|
|
cert RootCA:
|
|
cert CA61:RootCA
|
|
cert CA62:CA61
|
|
cert CA63:CA62
|
|
cert CA64:CA63
|
|
cert CA65:CA64
|
|
cert CA66:CA65
|
|
cert CA67:CA66
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result pass
|
|
|
|
verify EE66:CA66
|
|
cert RootCA:
|
|
cert CA61:RootCA
|
|
cert CA62:CA61
|
|
cert CA63:CA62
|
|
cert CA64:CA63
|
|
cert CA65:CA64
|
|
cert CA66:CA65
|
|
cert CA67:CA66
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result pass
|
|
|
|
verify EE67:CA67
|
|
cert RootCA:
|
|
cert CA61:RootCA
|
|
cert CA62:CA61
|
|
cert CA63:CA62
|
|
cert CA64:CA63
|
|
cert CA65:CA64
|
|
cert CA66:CA65
|
|
cert CA67:CA66
|
|
trust RootCA:
|
|
policy OID.1.0
|
|
result fail
|
|
|