gecko/security/nss/tests/chains/scenarios/anypolicywithlevel.cfg
Kai Engert 0ccf958b45 Bug 527659, Update mozilla-central to NSS 3.12.6 (beta)
== NSS portion
== r=rrelyea/wtc for upgrading mozilla-central to cvs tag NSS_3_12_6_BETA1
== This includes reapplying the (merged) patch from bug 519550 on top of NSS.
== PSM portion
== Includes the patch to disable TLS compression, r=kaie
== Include the patch to disable zlib test programs, which don't work on maemo, r=kaie
2010-02-07 12:54:28 +01:00

408 lines
6.6 KiB
INI

# ***** BEGIN LICENSE BLOCK *****
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
#
# The contents of this file are subject to the Mozilla Public License Version
# 1.1 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
# http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS IS" basis,
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
# for the specific language governing rights and limitations under the
# License.
#
# The Original Code is the Network Security Services (NSS)
#
# The Initial Developer of the Original Code is Sun Microsystems, Inc.
# Portions created by the Initial Developer are Copyright (C) 2009
# the Initial Developer. All Rights Reserved.
#
# Contributor(s):
# Slavomir Katuscak <slavomir.katuscak@sun.com>, Sun Microsystems
#
# Alternatively, the contents of this file may be used under the terms of
# either the GNU General Public License Version 2 or later (the "GPL"), or
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
# in which case the provisions of the GPL or the LGPL are applicable instead
# of those above. If you wish to allow use of your version of this file only
# under the terms of either the GPL or the LGPL, and not to allow others to
# use your version of this file under the terms of the MPL, indicate your
# decision by deleting the provisions above and replace them with the notice
# and other provisions required by the GPL or the LGPL. If you do not delete
# the provisions above, a recipient may use your version of this file under
# the terms of any one of the MPL, the GPL or the LGPL.
#
# ***** END LICENSE BLOCK *****
scenario AnyPolicyWithLevel
entity RootCA
type Root
entity CA1
type Intermediate
issuer RootCA
policy any
inhibit 1
entity CA12
type Intermediate
issuer CA1
policy any
entity CA13
type Intermediate
issuer CA12
policy OID.1.0
entity EE1
type EE
issuer CA13
policy OID.1.0
entity CA22
type Intermediate
issuer CA1
policy any
entity CA23
type Intermediate
issuer CA22
policy any
entity EE2
type EE
issuer CA23
policy OID.1.0
entity CA32
type Intermediate
issuer CA1
policy any
inhibit 1
entity CA33
type Intermediate
issuer CA32
policy any
entity EE3
type EE
issuer CA33
policy OID.1.0
entity CA42
type Intermediate
issuer CA1
policy any
policy OID.1.0
entity CA43
type Intermediate
issuer CA42
policy any
policy OID.1.0
entity EE4
type EE
issuer CA43
policy OID.1.0
entity CA52
type Intermediate
issuer CA1
policy any
policy OID.1.0
entity CA53
type Intermediate
issuer CA52
policy any
entity EE5
type EE
issuer CA53
policy OID.1.0
entity CA61
type Intermediate
issuer RootCA
policy any
inhibit 5
entity CA62
type Intermediate
issuer CA61
policy any
entity EE62
type EE
issuer CA62
policy OID.1.0
entity CA63
type Intermediate
issuer CA62
policy any
entity EE63
type EE
issuer CA63
policy OID.1.0
entity CA64
type Intermediate
issuer CA63
policy any
entity EE64
type EE
issuer CA64
policy OID.1.0
entity CA65
type Intermediate
issuer CA64
policy any
entity EE65
type EE
issuer CA65
policy OID.1.0
entity CA66
type Intermediate
issuer CA65
policy any
entity EE66
type EE
issuer CA66
policy OID.1.0
entity CA67
type Intermediate
issuer CA66
policy any
entity EE67
type EE
issuer CA67
policy OID.1.0
db All
verify EE1:CA13
cert RootCA:
cert CA1:RootCA
cert CA12:CA1
cert CA13:CA12
trust RootCA:
policy OID.1.0
result pass
verify EE1:CA13
cert RootCA:
cert CA1:RootCA
cert CA12:CA1
cert CA13:CA12
trust RootCA:
policy OID.2.0
result fail
verify EE1:CA13
cert RootCA:
cert CA1:RootCA
cert CA12:CA1
cert CA13:CA12
trust RootCA:
policy OID.2.5.29.32.0
result pass
verify EE2:CA23
cert RootCA:
cert CA1:RootCA
cert CA22:CA1
cert CA23:CA22
trust RootCA:
policy OID.1.0
result fail
verify EE2:CA23
cert RootCA:
cert CA1:RootCA
cert CA22:CA1
cert CA23:CA22
trust RootCA:
policy OID.2.0
result fail
verify EE2:CA23
cert RootCA:
cert CA1:RootCA
cert CA22:CA1
cert CA23:CA22
trust RootCA:
policy OID.2.5.29.32.0
result fail
verify EE3:CA33
cert RootCA:
cert CA1:RootCA
cert CA32:CA1
cert CA33:CA32
trust RootCA:
policy OID.1.0
result fail
verify EE3:CA33
cert RootCA:
cert CA1:RootCA
cert CA32:CA1
cert CA33:CA32
trust RootCA:
policy OID.2.0
result fail
verify EE3:CA33
cert RootCA:
cert CA1:RootCA
cert CA32:CA1
cert CA33:CA32
trust RootCA:
policy OID.2.5.29.32.0
result fail
verify EE4:CA43
cert RootCA:
cert CA1:RootCA
cert CA42:CA1
cert CA43:CA42
trust RootCA:
policy OID.1.0
result pass
verify EE4:CA43
cert RootCA:
cert CA1:RootCA
cert CA42:CA1
cert CA43:CA42
trust RootCA:
policy OID.2.0
result fail
verify EE4:CA43
cert RootCA:
cert CA1:RootCA
cert CA42:CA1
cert CA43:CA42
trust RootCA:
policy OID.2.5.29.32.0
result pass
verify EE5:CA53
cert RootCA:
cert CA1:RootCA
cert CA52:CA1
cert CA53:CA52
trust RootCA:
policy OID.1.0
result fail
verify EE5:CA53
cert RootCA:
cert CA1:RootCA
cert CA52:CA1
cert CA53:CA52
trust RootCA:
policy OID.2.0
result fail
verify EE5:CA53
cert RootCA:
cert CA1:RootCA
cert CA52:CA1
cert CA53:CA52
trust RootCA:
policy OID.2.5.29.32.0
result fail
verify EE62:CA62
cert RootCA:
cert CA61:RootCA
cert CA62:CA61
cert CA63:CA62
cert CA64:CA63
cert CA65:CA64
cert CA66:CA65
cert CA67:CA66
trust RootCA:
policy OID.1.0
result pass
verify EE63:CA63
cert RootCA:
cert CA61:RootCA
cert CA62:CA61
cert CA63:CA62
cert CA64:CA63
cert CA65:CA64
cert CA66:CA65
cert CA67:CA66
trust RootCA:
policy OID.1.0
result pass
verify EE64:CA64
cert RootCA:
cert CA61:RootCA
cert CA62:CA61
cert CA63:CA62
cert CA64:CA63
cert CA65:CA64
cert CA66:CA65
cert CA67:CA66
trust RootCA:
policy OID.1.0
result pass
verify EE65:CA65
cert RootCA:
cert CA61:RootCA
cert CA62:CA61
cert CA63:CA62
cert CA64:CA63
cert CA65:CA64
cert CA66:CA65
cert CA67:CA66
trust RootCA:
policy OID.1.0
result pass
verify EE66:CA66
cert RootCA:
cert CA61:RootCA
cert CA62:CA61
cert CA63:CA62
cert CA64:CA63
cert CA65:CA64
cert CA66:CA65
cert CA67:CA66
trust RootCA:
policy OID.1.0
result pass
verify EE67:CA67
cert RootCA:
cert CA61:RootCA
cert CA62:CA61
cert CA63:CA62
cert CA64:CA63
cert CA65:CA64
cert CA66:CA65
cert CA67:CA66
trust RootCA:
policy OID.1.0
result fail