зеркало из https://github.com/mozilla/gecko-dev.git
added a few more missing $ for variable PKITSdb for more accurate log reporting
also, minor optimization of crlImport and crlImportn script so that $crls does not have to be specified on every line
This commit is contained in:
Родитель
abd8d73159
Коммит
03643e5f7d
|
@ -159,7 +159,7 @@ break_table()
|
|||
########################################################################
|
||||
pkits()
|
||||
{
|
||||
echo "vfychain -d PKITSdb -u 4 $*"
|
||||
echo "vfychain -d $PKITSdb -u 4 $*"
|
||||
vfychain -d $PKITSdb -u 4 $* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
RET=$?
|
||||
RET=$(expr $RET + $(grep -c ERROR ${PKITSDIR}/cmdout.txt))
|
||||
|
@ -183,7 +183,7 @@ pkits()
|
|||
########################################################################
|
||||
pkitsn()
|
||||
{
|
||||
echo "vfychain -d PKITSdb -u 4 $*"
|
||||
echo "vfychain -d $PKITSdb -u 4 $*"
|
||||
vfychain -d $PKITSdb -u 4 $* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
RET=$?
|
||||
RET=$(expr $RET + $(grep -c ERROR ${PKITSDIR}/cmdout.txt))
|
||||
|
@ -206,8 +206,8 @@ pkitsn()
|
|||
crlImport()
|
||||
{
|
||||
if [ "$NSS_NO_PKITS_CRLS" -ne 1 ]; then
|
||||
echo "crlutil -d PKITSdb -I -i $*"
|
||||
crlutil -d ${PKITSdb} -I -i $* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
echo "crlutil -d $PKITSdb -I -i $crls/$*"
|
||||
crlutil -d ${PKITSdb} -I -i $crls/$* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
RET=$?
|
||||
cat ${PKITSDIR}/cmdout.txt
|
||||
|
||||
|
@ -226,8 +226,8 @@ crlImportn()
|
|||
{
|
||||
RET=0
|
||||
if [ "$NSS_NO_PKITS_CRLS" -ne 1 ]; then
|
||||
echo "crlutil -d PKITSdb -I -i $*"
|
||||
crlutil -d ${PKITSdb} -I -i $* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
echo "crlutil -d $PKITSdb -I -i $crls/$*"
|
||||
crlutil -d ${PKITSdb} -I -i $crls/$* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
RET=$?
|
||||
cat ${PKITSDIR}/cmdout.txt
|
||||
|
||||
|
@ -251,7 +251,7 @@ crlImportn()
|
|||
delete()
|
||||
{
|
||||
if [ "$NSS_NO_PKITS_CRLS" -ne 1 ]; then
|
||||
echo "crlutil -d PKITSdb -D -n $*"
|
||||
echo "crlutil -d $PKITSdb -D -n $*"
|
||||
crlutil -d ${PKITSdb} -D -n $* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
RET=$?
|
||||
cat ${PKITSDIR}/cmdout.txt
|
||||
|
@ -262,7 +262,7 @@ delete()
|
|||
fi
|
||||
fi
|
||||
|
||||
echo "certutil -d PKITSdb -D -n $*"
|
||||
echo "certutil -d $PKITSdb -D -n $*"
|
||||
certutil -d $PKITSdb -D -n $* > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
RET=$?
|
||||
cat ${PKITSDIR}/cmdout.txt
|
||||
|
@ -279,7 +279,7 @@ delete()
|
|||
########################################################################
|
||||
certImport()
|
||||
{
|
||||
echo "certutil -d PKITSdb -A -t \",,\" -n $* -i $certs/$*.crt"
|
||||
echo "certutil -d $PKITSdb -A -t \",,\" -n $* -i $certs/$*.crt"
|
||||
certutil -d $PKITSdb -A -t ",," -n $* -i $certs/$*.crt > ${PKITSDIR}/cmdout.txt 2>&1
|
||||
RET=$?
|
||||
cat ${PKITSDIR}/cmdout.txt
|
||||
|
@ -299,31 +299,31 @@ pkits_SignatureVerification()
|
|||
|
||||
VFY_ACTION="Valid Signatures Test1"; log_banner
|
||||
certImport GoodCACert
|
||||
crlImport $crls/GoodCACRL.crl
|
||||
crlImport GoodCACRL.crl
|
||||
pkits $certs/ValidCertificatePathTest1EE.crt $certs/GoodCACert.crt
|
||||
delete GoodCACert
|
||||
|
||||
VFY_ACTION="Invalid CA Signature Test2"; log_banner
|
||||
certImport BadSignedCACert
|
||||
crlImport $crls/BadSignedCACRL.crl
|
||||
crlImport BadSignedCACRL.crl
|
||||
pkitsn $certs/InvalidCASignatureTest2EE.crt \
|
||||
$certs/BadSignedCACert.crt
|
||||
delete BadSignedCACert
|
||||
|
||||
VFY_ACTION="Invalid EE Signature Test3"; log_banner
|
||||
certImport GoodCACert
|
||||
crlImport $crls/GoodCACRL.crl
|
||||
crlImport GoodCACRL.crl
|
||||
pkitsn $certs/InvalidEESignatureTest3EE.crt $certs/GoodCACert.crt
|
||||
delete GoodCACert
|
||||
|
||||
VFY_ACTION="Valid DSA Signatures Test4"; log_banner
|
||||
certImport DSACACert
|
||||
crlImport $crls/DSACACRL.crl
|
||||
crlImport DSACACRL.crl
|
||||
pkits $certs/ValidDSASignaturesTest4EE.crt $certs/DSACACert.crt
|
||||
|
||||
VFY_ACTION="Valid DSA Parameter Inheritance Test5"; log_banner
|
||||
certImport DSAParametersInheritedCACert
|
||||
crlImport $crls/DSAParametersInheritedCACRL.crl
|
||||
crlImport DSAParametersInheritedCACRL.crl
|
||||
pkits $certs/ValidDSAParameterInheritanceTest5EE.crt \
|
||||
$certs/DSAParametersInheritedCACert.crt \
|
||||
$certs/DSACACert.crt
|
||||
|
@ -340,7 +340,7 @@ pkits_ValidityPeriods()
|
|||
|
||||
VFY_ACTION="Invalid CA notBefore Date Test1"; log_banner
|
||||
certImport BadnotBeforeDateCACert
|
||||
crlImportn $crls/BadnotBeforeDateCACRL.crl
|
||||
crlImportn BadnotBeforeDateCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidCAnotBeforeDateTest1EE.crt \
|
||||
$certs/BadnotBeforeDateCACert.crt
|
||||
|
@ -349,7 +349,7 @@ pkits_ValidityPeriods()
|
|||
|
||||
VFY_ACTION="Invalid EE notBefore Date Test2"; log_banner
|
||||
certImport GoodCACert
|
||||
crlImport $crls/GoodCACRL.crl
|
||||
crlImport GoodCACRL.crl
|
||||
pkitsn $certs/InvalidEEnotBeforeDateTest2EE.crt \
|
||||
$certs/GoodCACert.crt
|
||||
|
||||
|
@ -364,7 +364,7 @@ pkits_ValidityPeriods()
|
|||
|
||||
VFY_ACTION="Invalid CA notAfter Date Test5"; log_banner
|
||||
certImport BadnotAfterDateCACert
|
||||
crlImportn $crls/BadnotAfterDateCACRL.crl
|
||||
crlImportn BadnotAfterDateCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidCAnotAfterDateTest5EE.crt \
|
||||
$certs/BadnotAfterDateCACert.crt
|
||||
|
@ -373,7 +373,7 @@ pkits_ValidityPeriods()
|
|||
|
||||
VFY_ACTION="Invalid EE notAfter Date Test6"; log_banner
|
||||
certImport GoodCACert
|
||||
crlImport $crls/GoodCACRL.crl
|
||||
crlImport GoodCACRL.crl
|
||||
pkitsn $certs/InvalidEEnotAfterDateTest6EE.crt \
|
||||
$certs/GoodCACert.crt
|
||||
|
||||
|
@ -393,21 +393,21 @@ pkits_NameChaining()
|
|||
|
||||
VFY_ACTION="Invalid Name Chaining EE Test1"; log_banner
|
||||
certImport GoodCACert
|
||||
crlImport $crls/GoodCACRL.crl
|
||||
crlImport GoodCACRL.crl
|
||||
pkitsn $certs/InvalidNameChainingTest1EE.crt \
|
||||
$certs/GoodCACert.crt
|
||||
delete GoodCACert
|
||||
|
||||
VFY_ACTION="Invalid Name Chaining Order Test2"; log_banner
|
||||
certImport NameOrderingCACert
|
||||
crlImport $crls/NameOrderCACRL.crl
|
||||
crlImport NameOrderCACRL.crl
|
||||
pkitsn $certs/InvalidNameChainingOrderTest2EE.crt \
|
||||
$certs/NameOrderingCACert.crt
|
||||
delete NameOrderingCACert
|
||||
|
||||
VFY_ACTION="Valid Name Chaining Whitespace Test3"; log_banner
|
||||
certImport GoodCACert
|
||||
crlImport $crls/GoodCACRL.crl
|
||||
crlImport GoodCACRL.crl
|
||||
pkits $certs/ValidNameChainingWhitespaceTest3EE.crt \
|
||||
$certs/GoodCACert.crt
|
||||
|
||||
|
@ -422,41 +422,41 @@ pkits_NameChaining()
|
|||
|
||||
VFY_ACTION="Valid Name Chaining UIDs Test6"; log_banner
|
||||
certImport UIDCACert
|
||||
crlImport $crls/UIDCACRL.crl
|
||||
crlImport UIDCACRL.crl
|
||||
pkits $certs/ValidNameUIDsTest6EE.crt $certs/UIDCACert.crt
|
||||
delete UIDCACert
|
||||
|
||||
VFY_ACTION="Valid RFC3280 Mandatory Attribute Types Test7"; log_banner
|
||||
certImport RFC3280MandatoryAttributeTypesCACert
|
||||
crlImport $crls/RFC3280MandatoryAttributeTypesCACRL.crl
|
||||
crlImport RFC3280MandatoryAttributeTypesCACRL.crl
|
||||
pkits $certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt \
|
||||
$certs/RFC3280MandatoryAttributeTypesCACert.crt
|
||||
delete RFC3280MandatoryAttributeTypesCACert
|
||||
|
||||
VFY_ACTION="Valid RFC3280 Optional Attribute Types Test8"; log_banner
|
||||
certImport RFC3280OptionalAttributeTypesCACert
|
||||
crlImport $crls/RFC3280OptionalAttributeTypesCACRL.crl
|
||||
crlImport RFC3280OptionalAttributeTypesCACRL.crl
|
||||
pkits $certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt \
|
||||
$certs/RFC3280OptionalAttributeTypesCACert.crt
|
||||
delete RFC3280OptionalAttributeTypesCACert
|
||||
|
||||
VFY_ACTION="Valid UTF8String Encoded Names Test9"; log_banner
|
||||
certImport UTF8StringEncodedNamesCACert
|
||||
crlImport $crls/UTF8StringEncodedNamesCACRL.crl
|
||||
crlImport UTF8StringEncodedNamesCACRL.crl
|
||||
pkits $certs/ValidUTF8StringEncodedNamesTest9EE.crt \
|
||||
$certs/UTF8StringEncodedNamesCACert.crt
|
||||
delete UTF8StringEncodedNamesCACert
|
||||
|
||||
VFY_ACTION="Valid Rollover from PrintableString to UTF8String Test10"; log_banner
|
||||
certImport RolloverfromPrintableStringtoUTF8StringCACert
|
||||
crlImport $crls/RolloverfromPrintableStringtoUTF8StringCACRL.crl
|
||||
crlImport RolloverfromPrintableStringtoUTF8StringCACRL.crl
|
||||
pkits $certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt \
|
||||
$certs/RolloverfromPrintableStringtoUTF8StringCACert.crt
|
||||
delete RolloverfromPrintableStringtoUTF8StringCACert
|
||||
|
||||
VFY_ACTION="Valid UTF8String case Insensitive Match Test11"; log_banner
|
||||
certImport UTF8StringCaseInsensitiveMatchCACert
|
||||
crlImport $crls/UTF8StringCaseInsensitiveMatchCACRL.crl
|
||||
crlImport UTF8StringCaseInsensitiveMatchCACRL.crl
|
||||
pkits $certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt \
|
||||
$certs/UTF8StringCaseInsensitiveMatchCACert.crt
|
||||
delete UTF8StringCaseInsensitiveMatchCACert
|
||||
|
@ -472,9 +472,9 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Invalid Revoked CA Test2"; log_banner
|
||||
certImport RevokedsubCACert
|
||||
crlImport $crls/RevokedsubCACRL.crl
|
||||
crlImport RevokedsubCACRL.crl
|
||||
certImport GoodCACert
|
||||
crlImport $crls/GoodCACRL.crl
|
||||
crlImport GoodCACRL.crl
|
||||
pkitsn $certs/InvalidRevokedCATest2EE.crt \
|
||||
$certs/RevokedsubCACert.crt $certs/GoodCACert.crt
|
||||
delete RevokedsubCACert
|
||||
|
@ -486,7 +486,7 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Invalid Bad CRL Signature Test4"; log_banner
|
||||
certImport BadCRLSignatureCACert
|
||||
crlImportn $crls/BadCRLSignatureCACRL.crl
|
||||
crlImportn BadCRLSignatureCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidBadCRLSignatureTest4EE.crt \
|
||||
$certs/BadCRLSignatureCACert.crt
|
||||
|
@ -495,7 +495,7 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Invalid Bad CRL Issuer Name Test5"; log_banner
|
||||
certImport BadCRLIssuerNameCACert
|
||||
crlImportn $crls/BadCRLIssuerNameCACRL.crl
|
||||
crlImportn BadCRLIssuerNameCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidBadCRLIssuerNameTest5EE.crt \
|
||||
$certs/BadCRLIssuerNameCACert.crt
|
||||
|
@ -504,7 +504,7 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Invalid Wrong CRL Test6"; log_banner
|
||||
certImport WrongCRLCACert
|
||||
crlImportn $crls/WrongCRLCACRL.crl
|
||||
crlImportn WrongCRLCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidWrongCRLTest6EE.crt \
|
||||
$certs/WrongCRLCACert.crt
|
||||
|
@ -513,15 +513,15 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Valid Two CRLs Test7"; log_banner
|
||||
certImport TwoCRLsCACert
|
||||
crlImport $crls/TwoCRLsCAGoodCRL.crl
|
||||
crlImport $crls/TwoCRLsCABadCRL.crl
|
||||
crlImport TwoCRLsCAGoodCRL.crl
|
||||
crlImport TwoCRLsCABadCRL.crl
|
||||
pkits $certs/ValidTwoCRLsTest7EE.crt \
|
||||
$certs/TwoCRLsCACert.crt
|
||||
delete TwoCRLsCACert
|
||||
|
||||
VFY_ACTION="Invalid Unknown CRL Entry Extension Test8"; log_banner
|
||||
certImport UnknownCRLEntryExtensionCACert
|
||||
crlImportn $crls/UnknownCRLEntryExtensionCACRL.crl
|
||||
crlImportn UnknownCRLEntryExtensionCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidUnknownCRLEntryExtensionTest8EE.crt \
|
||||
$certs/UnknownCRLEntryExtensionCACert.crt
|
||||
|
@ -530,14 +530,14 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Invalid Unknown CRL Extension Test9"; log_banner
|
||||
certImport UnknownCRLExtensionCACert
|
||||
crlImportn $crls/UnknownCRLExtensionCACRL.crl
|
||||
crlImportn UnknownCRLExtensionCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidUnknownCRLExtensionTest9EE.crt \
|
||||
$certs/UnknownCRLExtensionCACert.crt
|
||||
fi
|
||||
|
||||
VFY_ACTION="Invalid Unknown CRL Extension Test10"; log_banner
|
||||
crlImportn $crls/UnknownCRLExtensionCACRL.crl
|
||||
crlImportn UnknownCRLExtensionCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidUnknownCRLExtensionTest10EE.crt \
|
||||
$certs/UnknownCRLExtensionCACert.crt
|
||||
|
@ -546,28 +546,28 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Invalid Old CRL nextUpdate Test11"; log_banner
|
||||
certImport OldCRLnextUpdateCACert
|
||||
crlImport $crls/OldCRLnextUpdateCACRL.crl
|
||||
crlImport OldCRLnextUpdateCACRL.crl
|
||||
pkitsn $certs/InvalidOldCRLnextUpdateTest11EE.crt \
|
||||
$certs/OldCRLnextUpdateCACert.crt
|
||||
delete OldCRLnextUpdateCACert
|
||||
|
||||
VFY_ACTION="Invalid pre2000 CRL nextUpdate Test12"; log_banner
|
||||
certImport pre2000CRLnextUpdateCACert
|
||||
crlImport $crls/pre2000CRLnextUpdateCACRL.crl
|
||||
crlImport pre2000CRLnextUpdateCACRL.crl
|
||||
pkitsn $certs/Invalidpre2000CRLnextUpdateTest12EE.crt \
|
||||
$certs/pre2000CRLnextUpdateCACert.crt
|
||||
delete pre2000CRLnextUpdateCACert
|
||||
|
||||
VFY_ACTION="Valid GeneralizedTime CRL nextUpdate Test13"; log_banner
|
||||
certImport GeneralizedTimeCRLnextUpdateCACert
|
||||
crlImport $crls/GeneralizedTimeCRLnextUpdateCACRL.crl
|
||||
crlImport GeneralizedTimeCRLnextUpdateCACRL.crl
|
||||
pkits $certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt \
|
||||
$certs/GeneralizedTimeCRLnextUpdateCACert.crt
|
||||
delete GeneralizedTimeCRLnextUpdateCACert
|
||||
|
||||
VFY_ACTION="Valid Negative Serial Number Test14"; log_banner
|
||||
certImport NegativeSerialNumberCACert
|
||||
crlImport $crls/NegativeSerialNumberCACRL.crl
|
||||
crlImport NegativeSerialNumberCACRL.crl
|
||||
pkits $certs/ValidNegativeSerialNumberTest14EE.crt \
|
||||
$certs/NegativeSerialNumberCACert.crt
|
||||
|
||||
|
@ -578,7 +578,7 @@ pkits_BasicCertRevocation()
|
|||
|
||||
VFY_ACTION="Valid Long Serial Number Test16"; log_banner
|
||||
certImport LongSerialNumberCACert
|
||||
crlImport $crls/LongSerialNumberCACRL.crl
|
||||
crlImport LongSerialNumberCACRL.crl
|
||||
pkits $certs/ValidLongSerialNumberTest16EE.crt \
|
||||
$certs/LongSerialNumberCACert.crt
|
||||
|
||||
|
@ -598,7 +598,7 @@ pkits_PathVerificWithSelfIssuedCerts()
|
|||
|
||||
VFY_ACTION="Valid Basic Self-Issued Old With New Test1"; log_banner
|
||||
certImport BasicSelfIssuedNewKeyCACert
|
||||
crlImport $crls/BasicSelfIssuedNewKeyCACRL.crl
|
||||
crlImport BasicSelfIssuedNewKeyCACRL.crl
|
||||
pkits $certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt \
|
||||
$certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt \
|
||||
$certs/BasicSelfIssuedNewKeyCACert.crt
|
||||
|
@ -611,7 +611,7 @@ pkits_PathVerificWithSelfIssuedCerts()
|
|||
|
||||
VFY_ACTION="Valid Basic Self-Issued New With Old Test3"; log_banner
|
||||
certImport BasicSelfIssuedOldKeyCACert
|
||||
crlImport $crls/BasicSelfIssuedOldKeyCACRL.crl
|
||||
crlImport BasicSelfIssuedOldKeyCACRL.crl
|
||||
pkits $certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt \
|
||||
$certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt \
|
||||
$certs/BasicSelfIssuedOldKeyCACert.crt
|
||||
|
@ -629,7 +629,7 @@ pkits_PathVerificWithSelfIssuedCerts()
|
|||
|
||||
VFY_ACTION="Valid Basic Self-Issued CRL Signing Key Test6"; log_banner
|
||||
certImport BasicSelfIssuedCRLSigningKeyCACert
|
||||
crlImport $crls/BasicSelfIssuedOldKeyCACRL.crl
|
||||
crlImport BasicSelfIssuedOldKeyCACRL.crl
|
||||
pkits $certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt \
|
||||
$certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt \
|
||||
$certs/BasicSelfIssuedCRLSigningKeyCACert.crt
|
||||
|
@ -652,37 +652,37 @@ pkits_BasicConstraints()
|
|||
|
||||
VFY_ACTION="Invalid Missing basicConstraints Test1"; log_banner
|
||||
certImport MissingbasicConstraintsCACert
|
||||
crlImport $crls/MissingbasicConstraintsCACRL.crl
|
||||
crlImport MissingbasicConstraintsCACRL.crl
|
||||
pkitsn $certs/InvalidMissingbasicConstraintsTest1EE.crt \
|
||||
$certs/MissingbasicConstraintsCACert.crt
|
||||
delete MissingbasicConstraintsCACert
|
||||
|
||||
VFY_ACTION="Invalid cA False Test2"; log_banner
|
||||
certImport basicConstraintsCriticalcAFalseCACert
|
||||
crlImport $crls/basicConstraintsCriticalcAFalseCACRL.crl
|
||||
crlImport basicConstraintsCriticalcAFalseCACRL.crl
|
||||
pkitsn $certs/InvalidcAFalseTest2EE.crt \
|
||||
$certs/basicConstraintsCriticalcAFalseCACert.crt
|
||||
delete basicConstraintsCriticalcAFalseCACert
|
||||
|
||||
VFY_ACTION="Invalid cA False Test3"; log_banner
|
||||
certImport basicConstraintsNotCriticalcAFalseCACert
|
||||
crlImport $crls/basicConstraintsNotCriticalcAFalseCACRL.crl
|
||||
crlImport basicConstraintsNotCriticalcAFalseCACRL.crl
|
||||
pkitsn $certs/InvalidcAFalseTest3EE.crt \
|
||||
$certs/basicConstraintsNotCriticalcAFalseCACert.crt
|
||||
delete basicConstraintsNotCriticalcAFalseCACert
|
||||
|
||||
VFY_ACTION="Valid basicConstraints Not Critical Test4"; log_banner
|
||||
certImport basicConstraintsNotCriticalCACert
|
||||
crlImport $crls/basicConstraintsNotCriticalCACRL.crl
|
||||
crlImport basicConstraintsNotCriticalCACRL.crl
|
||||
pkits $certs/ValidbasicConstraintsNotCriticalTest4EE.crt \
|
||||
$certs/basicConstraintsNotCriticalCACert.crt
|
||||
delete basicConstraintsNotCriticalCACert
|
||||
|
||||
VFY_ACTION="Invalid pathLenConstraint Test5"; log_banner
|
||||
certImport pathLenConstraint0CACert
|
||||
crlImport $crls/pathLenConstraint0CACRL.crl
|
||||
crlImport pathLenConstraint0CACRL.crl
|
||||
certImport pathLenConstraint0subCACert
|
||||
crlImport $crls/pathLenConstraint0subCACRL.crl
|
||||
crlImport pathLenConstraint0subCACRL.crl
|
||||
pkitsn $certs/InvalidpathLenConstraintTest5EE.crt \
|
||||
$certs/pathLenConstraint0subCACert.crt \
|
||||
$certs/pathLenConstraint0CACert.crt
|
||||
|
@ -704,11 +704,11 @@ pkits_BasicConstraints()
|
|||
|
||||
VFY_ACTION="Invalid pathLenConstraint Test9"; log_banner
|
||||
certImport pathLenConstraint6CACert
|
||||
crlImport $crls/pathLenConstraint6CACRL.crl
|
||||
crlImport pathLenConstraint6CACRL.crl
|
||||
certImport pathLenConstraint6subCA0Cert
|
||||
crlImport $crls/pathLenConstraint6subCA0CRL.crl
|
||||
crlImport pathLenConstraint6subCA0CRL.crl
|
||||
certImport pathLenConstraint6subsubCA00Cert
|
||||
crlImport $crls/pathLenConstraint6subsubCA00CRL.crl
|
||||
crlImport pathLenConstraint6subsubCA00CRL.crl
|
||||
pkitsn $certs/InvalidpathLenConstraintTest9EE.crt \
|
||||
$certs/pathLenConstraint6subsubCA00Cert.crt \
|
||||
$certs/pathLenConstraint6subCA0Cert.crt \
|
||||
|
@ -724,11 +724,11 @@ pkits_BasicConstraints()
|
|||
|
||||
VFY_ACTION="Invalid pathLenConstraint Test11"; log_banner
|
||||
certImport pathLenConstraint6subCA1Cert
|
||||
crlImport $crls/pathLenConstraint6subCA1CRL.crl
|
||||
crlImport pathLenConstraint6subCA1CRL.crl
|
||||
certImport pathLenConstraint6subsubCA11Cert
|
||||
crlImport $crls/pathLenConstraint6subsubCA11CRL.crl
|
||||
crlImport pathLenConstraint6subsubCA11CRL.crl
|
||||
certImport pathLenConstraint6subsubsubCA11XCert
|
||||
crlImport $crls/pathLenConstraint6subsubsubCA11XCRL.crl
|
||||
crlImport pathLenConstraint6subsubsubCA11XCRL.crl
|
||||
pkitsn $certs/InvalidpathLenConstraintTest11EE.crt \
|
||||
$certs/pathLenConstraint6subsubsubCA11XCert.crt \
|
||||
$certs/pathLenConstraint6subsubCA11Cert.crt \
|
||||
|
@ -747,11 +747,11 @@ pkits_BasicConstraints()
|
|||
|
||||
VFY_ACTION="Valid pathLenConstraint Test13"; log_banner
|
||||
certImport pathLenConstraint6subCA4Cert
|
||||
crlImport $crls/pathLenConstraint6subCA4CRL.crl
|
||||
crlImport pathLenConstraint6subCA4CRL.crl
|
||||
certImport pathLenConstraint6subsubCA41Cert
|
||||
crlImport $crls/pathLenConstraint6subsubCA41CRL.crl
|
||||
crlImport pathLenConstraint6subsubCA41CRL.crl
|
||||
certImport pathLenConstraint6subsubsubCA41XCert
|
||||
crlImport $crls/pathLenConstraint6subsubsubCA41XCRL.crl
|
||||
crlImport pathLenConstraint6subsubsubCA41XCRL.crl
|
||||
pkits $certs/ValidpathLenConstraintTest13EE.crt \
|
||||
$certs/pathLenConstraint6subsubsubCA41XCert.crt \
|
||||
$certs/pathLenConstraint6subsubCA41Cert.crt \
|
||||
|
@ -771,14 +771,14 @@ pkits_BasicConstraints()
|
|||
|
||||
VFY_ACTION="Valid Self-Issued pathLenConstraint Test15"; log_banner
|
||||
certImport pathLenConstraint0CACert
|
||||
crlImport $crls/pathLenConstraint0CACRL.crl
|
||||
crlImport pathLenConstraint0CACRL.crl
|
||||
pkits $certs/ValidSelfIssuedpathLenConstraintTest15EE.crt \
|
||||
$certs/pathLenConstraint0SelfIssuedCACert.crt \
|
||||
$certs/pathLenConstraint0CACert.crt
|
||||
|
||||
VFY_ACTION="Invalid Self-Issued pathLenConstraint Test16"; log_banner
|
||||
certImport pathLenConstraint0subCA2Cert
|
||||
crlImport $crls/pathLenConstraint0subCA2CRL.crl
|
||||
crlImport pathLenConstraint0subCA2CRL.crl
|
||||
pkitsn $certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt \
|
||||
$certs/pathLenConstraint0subCA2Cert.crt \
|
||||
$certs/pathLenConstraint0SelfIssuedCACert.crt \
|
||||
|
@ -788,9 +788,9 @@ pkits_BasicConstraints()
|
|||
|
||||
VFY_ACTION="Valid Self-Issued pathLenConstraint Test17"; log_banner
|
||||
certImport pathLenConstraint1CACert
|
||||
crlImport $crls/pathLenConstraint1CACRL.crl
|
||||
crlImport pathLenConstraint1CACRL.crl
|
||||
certImport pathLenConstraint1subCACert
|
||||
crlImport $crls/pathLenConstraint1subCACRL.crl
|
||||
crlImport pathLenConstraint1subCACRL.crl
|
||||
pkits $certs/ValidSelfIssuedpathLenConstraintTest17EE.crt \
|
||||
$certs/pathLenConstraint1SelfIssuedsubCACert.crt \
|
||||
$certs/pathLenConstraint1subCACert.crt \
|
||||
|
@ -806,27 +806,27 @@ pkits_KeyUsage()
|
|||
|
||||
VFY_ACTION="Invalid keyUsage Critical keyCertSign False Test1"; log_banner
|
||||
certImport keyUsageCriticalkeyCertSignFalseCACert
|
||||
crlImport $crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
|
||||
crlImport keyUsageCriticalkeyCertSignFalseCACRL.crl
|
||||
pkitsn $certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt \
|
||||
$certs/keyUsageCriticalkeyCertSignFalseCACert.crt
|
||||
delete keyUsageCriticalkeyCertSignFalseCACert
|
||||
|
||||
VFY_ACTION="Invalid keyUsage Not Critical keyCertSign False Test2"; log_banner
|
||||
certImport keyUsageNotCriticalkeyCertSignFalseCACert
|
||||
crlImport $crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
|
||||
crlImport keyUsageNotCriticalkeyCertSignFalseCACRL.crl
|
||||
pkitsn $certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt \
|
||||
$certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
|
||||
delete keyUsageNotCriticalkeyCertSignFalseCACert
|
||||
|
||||
VFY_ACTION="Valid keyUsage Not Critical Test3"; log_banner
|
||||
certImport keyUsageNotCriticalCACert
|
||||
crlImport $crls/keyUsageNotCriticalCACRL.crl
|
||||
crlImport keyUsageNotCriticalCACRL.crl
|
||||
pkits $certs/ValidkeyUsageNotCriticalTest3EE.crt \
|
||||
$certs/keyUsageNotCriticalCACert.crt
|
||||
|
||||
VFY_ACTION="Invalid keyUsage Critical cRLSign False Test4"; log_banner
|
||||
certImport keyUsageCriticalcRLSignFalseCACert
|
||||
crlImportn $crls/keyUsageCriticalcRLSignFalseCACRL.crl
|
||||
crlImportn keyUsageCriticalcRLSignFalseCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt \
|
||||
$certs/keyUsageCriticalcRLSignFalseCACert.crt
|
||||
|
@ -834,7 +834,7 @@ pkits_KeyUsage()
|
|||
|
||||
VFY_ACTION="Invalid keyUsage Not Critical cRLSign False Test5"; log_banner
|
||||
certImport keyUsageNotCriticalcRLSignFalseCACert
|
||||
crlImportn $crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
|
||||
crlImportn keyUsageNotCriticalcRLSignFalseCACRL.crl
|
||||
if [ $RET -eq 0 ] ; then
|
||||
pkitsn $certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt \
|
||||
$certs/keyUsageNotCriticalcRLSignFalseCACert.crt
|
||||
|
@ -847,7 +847,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid DN nameConstraints Test1"; log_banner
|
||||
certImport nameConstraintsDN1CACert
|
||||
crlImport $crls/nameConstraintsDN1CACRL.crl
|
||||
crlImport nameConstraintsDN1CACRL.crl
|
||||
pkits $certs/ValidDNnameConstraintsTest1EE.crt \
|
||||
$certs/nameConstraintsDN1CACert.crt
|
||||
|
||||
|
@ -866,14 +866,14 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid DN nameConstraints Test5"; log_banner
|
||||
certImport nameConstraintsDN2CACert
|
||||
crlImport $crls/nameConstraintsDN2CACRL.crl
|
||||
crlImport nameConstraintsDN2CACRL.crl
|
||||
pkits $certs/ValidDNnameConstraintsTest5EE.crt \
|
||||
$certs/nameConstraintsDN2CACert.crt
|
||||
delete nameConstraintsDN2CACert
|
||||
|
||||
VFY_ACTION="Valid DN nameConstraints Test6"; log_banner
|
||||
certImport nameConstraintsDN3CACert
|
||||
crlImport $crls/nameConstraintsDN3CACRL.crl
|
||||
crlImport nameConstraintsDN3CACRL.crl
|
||||
pkits $certs/ValidDNnameConstraintsTest6EE.crt \
|
||||
$certs/nameConstraintsDN3CACert.crt
|
||||
|
||||
|
@ -884,7 +884,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Invalid DN nameConstraints Test8"; log_banner
|
||||
certImport nameConstraintsDN4CACert
|
||||
crlImport $crls/nameConstraintsDN4CACRL.crl
|
||||
crlImport nameConstraintsDN4CACRL.crl
|
||||
pkitsn $certs/InvalidDNnameConstraintsTest8EE.crt \
|
||||
$certs/nameConstraintsDN4CACert.crt
|
||||
|
||||
|
@ -895,7 +895,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Invalid DN nameConstraints Test10"; log_banner
|
||||
certImport nameConstraintsDN5CACert
|
||||
crlImport $crls/nameConstraintsDN5CACRL.crl
|
||||
crlImport nameConstraintsDN5CACRL.crl
|
||||
pkitsn $certs/InvalidDNnameConstraintsTest10EE.crt \
|
||||
$certs/nameConstraintsDN5CACert.crt
|
||||
|
||||
|
@ -906,9 +906,9 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Invalid DN nameConstraints Test12"; log_banner
|
||||
certImport nameConstraintsDN1CACert
|
||||
crlImport $crls/nameConstraintsDN1CACRL.crl
|
||||
crlImport nameConstraintsDN1CACRL.crl
|
||||
certImport nameConstraintsDN1subCA1Cert
|
||||
crlImport $crls/nameConstraintsDN1subCA1CRL.crl
|
||||
crlImport nameConstraintsDN1subCA1CRL.crl
|
||||
pkitsn $certs/InvalidDNnameConstraintsTest12EE.crt \
|
||||
$certs/nameConstraintsDN1subCA1Cert.crt \
|
||||
$certs/nameConstraintsDN1CACert.crt
|
||||
|
@ -916,7 +916,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Invalid DN nameConstraints Test13"; log_banner
|
||||
certImport nameConstraintsDN1subCA2Cert
|
||||
crlImport $crls/nameConstraintsDN1subCA2CRL.crl
|
||||
crlImport nameConstraintsDN1subCA2CRL.crl
|
||||
pkitsn $certs/InvalidDNnameConstraintsTest13EE.crt \
|
||||
$certs/nameConstraintsDN1subCA2Cert.crt \
|
||||
$certs/nameConstraintsDN1CACert.crt
|
||||
|
@ -930,9 +930,9 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Invalid DN nameConstraints Test15"; log_banner
|
||||
certImport nameConstraintsDN3CACert
|
||||
crlImport $crls/nameConstraintsDN3CACRL.crl
|
||||
crlImport nameConstraintsDN3CACRL.crl
|
||||
certImport nameConstraintsDN3subCA1Cert
|
||||
crlImport $crls/nameConstraintsDN3subCA1CRL.crl
|
||||
crlImport nameConstraintsDN3subCA1CRL.crl
|
||||
pkitsn $certs/InvalidDNnameConstraintsTest15EE.crt \
|
||||
$certs/nameConstraintsDN3subCA1Cert.crt \
|
||||
$certs/nameConstraintsDN3CACert.crt
|
||||
|
@ -945,7 +945,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Invalid DN nameConstraints Test17"; log_banner
|
||||
certImport nameConstraintsDN3subCA2Cert
|
||||
crlImport $crls/nameConstraintsDN3subCA2CRL.crl
|
||||
crlImport nameConstraintsDN3subCA2CRL.crl
|
||||
pkitsn $certs/InvalidDNnameConstraintsTest17EE.crt \
|
||||
$certs/nameConstraintsDN3subCA2Cert.crt \
|
||||
$certs/nameConstraintsDN3CACert.crt
|
||||
|
@ -958,7 +958,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid Self-Issued DN nameConstraints Test19"; log_banner
|
||||
certImport nameConstraintsDN1CACert
|
||||
crlImport $crls/nameConstraintsDN1CACRL.crl
|
||||
crlImport nameConstraintsDN1CACRL.crl
|
||||
pkits $certs/ValidDNnameConstraintsTest19EE.crt \
|
||||
$certs/nameConstraintsDN1SelfIssuedCACert.crt \
|
||||
$certs/nameConstraintsDN1CACert.crt
|
||||
|
@ -970,7 +970,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid RFC822 nameConstraints Test21"; log_banner
|
||||
certImport nameConstraintsRFC822CA1Cert
|
||||
crlImport $crls/nameConstraintsRFC822CA1CRL.crl
|
||||
crlImport nameConstraintsRFC822CA1CRL.crl
|
||||
pkits $certs/ValidRFC822nameConstraintsTest21EE.crt \
|
||||
$certs/nameConstraintsRFC822CA1Cert.crt
|
||||
|
||||
|
@ -981,7 +981,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid RFC822 nameConstraints Test23"; log_banner
|
||||
certImport nameConstraintsRFC822CA2Cert
|
||||
crlImport $crls/nameConstraintsRFC822CA2CRL.crl
|
||||
crlImport nameConstraintsRFC822CA2CRL.crl
|
||||
pkits $certs/ValidRFC822nameConstraintsTest23EE.crt \
|
||||
$certs/nameConstraintsRFC822CA2Cert.crt
|
||||
|
||||
|
@ -992,7 +992,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid RFC822 nameConstraints Test25"; log_banner
|
||||
certImport nameConstraintsRFC822CA3Cert
|
||||
crlImport $crls/nameConstraintsRFC822CA3CRL.crl
|
||||
crlImport nameConstraintsRFC822CA3CRL.crl
|
||||
pkits $certs/ValidRFC822nameConstraintsTest25EE.crt \
|
||||
$certs/nameConstraintsRFC822CA3Cert.crt
|
||||
|
||||
|
@ -1003,9 +1003,9 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid DN and RFC822 nameConstraints Test27"; log_banner
|
||||
certImport nameConstraintsDN1CACert
|
||||
crlImport $crls/nameConstraintsDN1CACRL.crl
|
||||
crlImport nameConstraintsDN1CACRL.crl
|
||||
certImport nameConstraintsDN1subCA3Cert
|
||||
crlImport $crls/nameConstraintsDN1subCA3CRL.crl
|
||||
crlImport nameConstraintsDN1subCA3CRL.crl
|
||||
pkits $certs/ValidDNandRFC822nameConstraintsTest27EE.crt \
|
||||
$certs/nameConstraintsDN1subCA3Cert.crt \
|
||||
$certs/nameConstraintsDN1CACert.crt
|
||||
|
@ -1024,7 +1024,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid DNS nameConstraints Test30"; log_banner
|
||||
certImport nameConstraintsDNS1CACert
|
||||
crlImport $crls/nameConstraintsDNS1CACRL.crl
|
||||
crlImport nameConstraintsDNS1CACRL.crl
|
||||
pkits $certs/ValidDNSnameConstraintsTest30EE.crt \
|
||||
$certs/nameConstraintsDNS1CACert.crt
|
||||
|
||||
|
@ -1035,7 +1035,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid DNS nameConstraints Test32"; log_banner
|
||||
certImport nameConstraintsDNS2CACert
|
||||
crlImport $crls/nameConstraintsDNS2CACRL.crl
|
||||
crlImport nameConstraintsDNS2CACRL.crl
|
||||
pkits $certs/ValidDNSnameConstraintsTest32EE.crt \
|
||||
$certs/nameConstraintsDNS2CACert.crt
|
||||
|
||||
|
@ -1046,7 +1046,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid URI nameConstraints Test34"; log_banner
|
||||
certImport nameConstraintsURI1CACert
|
||||
crlImport $crls/nameConstraintsURI1CACRL.crl
|
||||
crlImport nameConstraintsURI1CACRL.crl
|
||||
pkits $certs/ValidURInameConstraintsTest34EE.crt \
|
||||
$certs/nameConstraintsURI1CACert.crt
|
||||
|
||||
|
@ -1057,7 +1057,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Valid URI nameConstraints Test36"; log_banner
|
||||
certImport nameConstraintsURI2CACert
|
||||
crlImport $crls/nameConstraintsURI2CACRL.crl
|
||||
crlImport nameConstraintsURI2CACRL.crl
|
||||
pkits $certs/ValidURInameConstraintsTest36EE.crt \
|
||||
$certs/nameConstraintsURI2CACert.crt
|
||||
|
||||
|
@ -1068,7 +1068,7 @@ pkits_NameConstraints()
|
|||
|
||||
VFY_ACTION="Invalid DNS nameConstraints Test38"; log_banner
|
||||
certImport nameConstraintsDNS1CACert
|
||||
crlImport $crls/nameConstraintsDNS1CACRL.crl
|
||||
crlImport nameConstraintsDNS1CACRL.crl
|
||||
pkitsn $certs/InvalidDNSnameConstraintsTest38EE.crt \
|
||||
$certs/nameConstraintsDNS1CACert.crt
|
||||
delete nameConstraintsDNS1CACert
|
||||
|
|
Загрузка…
Ссылка в новой задаче