security/nss/tests/pkits/pkits.sh

Thu, 22 Jan 2015 13:21:57 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Thu, 22 Jan 2015 13:21:57 +0100
branch
TOR_BUG_9701
changeset 15
b8a032363ba2
permissions
-rwxr-xr-x

Incorporate requested changes from Mozilla in review:
https://bugzilla.mozilla.org/show_bug.cgi?id=1123480#c6

     1 #!/bin/bash
     2 #
     3 # This Source Code Form is subject to the terms of the Mozilla Public
     4 # License, v. 2.0. If a copy of the MPL was not distributed with this
     5 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
     7 ########################################################################
     8 #
     9 # mozilla/security/nss/tests/pkits/pkits.sh
    10 #
    11 # Script to test the NIST PKITS tests 
    12 #
    13 # needs to work on all Unix and Windows platforms
    14 #
    15 # tests implemented:
    16 #    vfychain 
    17 #
    18 # special NOTES
    19 # ---------------
    20 # NIST PKITS data needs to be downloaded from
    21 # http://csrc.nist.gov/pki/testing/x509paths.html
    22 # Environment variable PKITS_DATA needs to be set to the directory
    23 # where this data is downloaded, or test data needs to be copied under 
    24 # the mozilla source tree in mozilla/PKITS_DATA
    25 ########################################################################
    27 ############################## pkits_init ##############################
    28 # local shell function to initialize this script 
    29 ########################################################################
    30 pkits_init()
    31 {
    32   SCRIPTNAME=pkits.sh
    34   if [ -z "${CLEANUP}" ] ; then
    35       CLEANUP="${SCRIPTNAME}"
    36   fi
    38   if [ -z "${INIT_SOURCED}" -o "${INIT_SOURCED}" != "TRUE" ]; then
    39       cd ../common
    40       . ./init.sh
    41   fi
    43   if [ -z "${PKITS_DATA}" ]; then
    44       echo "${SCRIPTNAME}: PKITS data directory not defined, skipping."
    45       exit 0
    46   fi      
    48   if [ ! -d "${PKITS_DATA}" ]; then
    49       echo "${SCRIPTNAME}: PKITS data directory ${PKITS_DATA} doesn't exist, skipping."
    50       exit 0
    51   fi
    53   PKITSDIR=${HOSTDIR}/pkits
    55   COPYDIR=${PKITSDIR}/copydir
    57   mkdir -p ${PKITSDIR}
    58   mkdir -p ${COPYDIR}
    59   mkdir -p ${PKITSDIR}/html
    61   certs=${PKITS_DATA}/certs
    62   crls=${PKITS_DATA}/crls
    64   cd ${PKITSDIR}
    66   PKITSdb=${PKITSDIR}/PKITSdb
    67   PKITSbkp=${PKITSDIR}/PKITSbkp
    69   PKITS_LOG=${PKITSDIR}/pkits.log #getting its own logfile
    70   pkits_log "Start of logfile $PKITS_LOG"
    72   if [ ! -d "${PKITSdb}" ]; then
    73       mkdir -p ${PKITSdb}
    74   else
    75       pkits_log "$SCRIPTNAME: WARNING - ${PKITSdb} exists"
    76   fi
    78   if [ ! -d "${PKITSbkp}" ]; then
    79       mkdir -p ${PKITSbkp}
    80   else
    81       pkits_log "$SCRIPTNAME: WARNING - ${PKITSbkp} exists"
    82   fi
    84   echo "HOSTDIR" $HOSTDIR
    85   echo "PKITSDIR" $PKITSDIR
    86   echo "PKITSdb" $PKITSdb
    87   echo "PKITSbkp" $PKITSbkp
    88   echo "PKITS_DATA" $PKITS_DATA
    89   echo "certs" $certs
    90   echo "crls" $crls
    92   echo nss > ${PKITSdb}/pw
    93   ${BINDIR}/certutil -N -d ${PKITSdb} -f ${PKITSdb}/pw
    95   ${BINDIR}/certutil -A -n TrustAnchorRootCertificate -t "C,C,C" -i \
    96       $certs/TrustAnchorRootCertificate.crt -d $PKITSdb
    97   if [ -z "$NSS_NO_PKITS_CRLS" ]; then
    98     ${BINDIR}/crlutil -I -i $crls/TrustAnchorRootCRL.crl -d ${PKITSdb} -f ${PKITSdb}/pw
    99   else
   100     html  "<H3>NO CRLs are being used.</H3>"
   101     pkits_log "NO CRLs are being used."
   102   fi
   104   cp ${PKITSdb}/* ${PKITSbkp}
   106   KNOWN_BUG=
   107 }
   109 ############################### pkits_log ##############################
   110 # write to pkits.log file
   111 ########################################################################
   112 pkits_log()
   113 {
   114   echo "$SCRIPTNAME $*"
   115   echo $* >> ${PKITS_LOG}
   116 }
   118 restore_db()
   119 {
   120   echo "Restore DB"
   121   rm ${PKITSdb}/*
   122   cp ${PKITSbkp}/* ${PKITSdb}
   123 }
   125 log_banner()
   126 {
   127   echo ""
   128   echo "--------------------------------------------------------------------"
   129   echo "Test case ${VFY_ACTION}"
   130   echo ""
   131 }
   133 start_table()
   134 {
   135   html "<TABLE BORDER=1><TR><TH COLSPAN=3>$*</TH></TR>"
   136   html "<TR><TH width=500>Test Case</TH><TH width=50>Result</TH></TR>" 
   137   echo ""
   138   echo "***************************************************************"
   139   echo "$*"
   140   echo "***************************************************************"
   141 }
   143 break_table()
   144 {
   145   html "</TABLE><P>"
   146   start_table "$@"
   147 }
   149 ################################ pkits #################################
   150 # local shell function for positive testcases, calls vfychain, writes 
   151 # action and options to stdout, sets variable RET and writes results to 
   152 # the html file results
   153 ########################################################################
   154 pkits()
   155 {
   156   echo "vfychain -d $PKITSdb -u 4 $*"
   157   ${BINDIR}/vfychain -d $PKITSdb -u 4 $* > ${PKITSDIR}/cmdout.txt 2>&1
   158   RET=$?
   159   CNT=`grep -c ERROR ${PKITSDIR}/cmdout.txt`
   160   RET=`expr ${RET} + ${CNT}`
   161   cat ${PKITSDIR}/cmdout.txt
   163   if [ "$RET" -ne 0 ]; then
   164       html_failed "${VFY_ACTION} ($RET) "
   165       pkits_log "ERROR: ${VFY_ACTION} failed $RET"
   166   else
   167       html_passed "${VFY_ACTION}"
   168       pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
   169   fi
   171   return $RET
   172 }
   174 ################################ pkitsn #################################
   175 # local shell function for negative testcases, calls vfychain, writes 
   176 # action and options to stdout, sets variable RET and writes results to 
   177 # the html file results
   178 ########################################################################
   179 pkitsn()
   180 {
   181   echo "vfychain -d $PKITSdb -u 4 $*"
   182   ${BINDIR}/vfychain -d $PKITSdb -u 4 $* > ${PKITSDIR}/cmdout.txt 2>&1
   183   RET=$?
   184   CNT=`grep -c ERROR ${PKITSDIR}/cmdout.txt`
   185   RET=`expr ${RET} + ${CNT}`
   186   cat ${PKITSDIR}/cmdout.txt
   188   if [ "$RET" -eq 0 ]; then
   189       html_failed "${VFY_ACTION} ($RET) "
   190       pkits_log "ERROR: ${VFY_ACTION} failed $RET"
   191   else
   192       html_passed "${VFY_ACTION} ($RET) "
   193       pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
   194   fi
   195   return $RET
   196 }
   198 ################################ crlImport #############################
   199 # local shell function to import a CRL, calls crlutil -I -i, writes 
   200 # action and options to stdout
   201 ########################################################################
   202 crlImport()
   203 {
   204   if [ -z "$NSS_NO_PKITS_CRLS" ]; then
   205     echo "crlutil -d $PKITSdb -I -f ${PKITSdb}/pw -i $crls/$*"
   206     ${BINDIR}/crlutil -d ${PKITSdb} -I -f ${PKITSdb}/pw -i $crls/$* > ${PKITSDIR}/cmdout.txt 2>&1
   207     RET=$?
   208     cat ${PKITSDIR}/cmdout.txt
   210     if [ "$RET" -ne 0 ]; then
   211         html_failed "${VFY_ACTION} ($RET) "
   212         pkits_log "ERROR: ${VFY_ACTION} failed $RET"
   213     fi
   214   fi
   215 }
   217 ################################ crlImportn #############################
   218 # local shell function to import an incorrect CRL, calls crlutil -I -i, 
   219 # writes action and options to stdout
   220 ########################################################################
   221 crlImportn()
   222 {
   223   RET=0
   224   if [ -z "$NSS_NO_PKITS_CRLS" ]; then
   225     echo "crlutil -d $PKITSdb -I -f ${PKITSdb}/pw -i $crls/$*"
   226     ${BINDIR}/crlutil -d ${PKITSdb} -I -f ${PKITSdb}/pw -i $crls/$* > ${PKITSDIR}/cmdout.txt 2>&1
   227     RET=$?
   228     cat ${PKITSDIR}/cmdout.txt
   230     if [ "$RET" -eq 0 ]; then
   231         html_failed "${VFY_ACTION} ($RET) "
   232         pkits_log "ERROR: ${VFY_ACTION} failed $RET"
   233     else
   234         html_passed "${VFY_ACTION} ($RET) "
   235         pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
   236     fi
   237   fi
   238   return $RET
   239 }
   241 ################################ certImport #############################
   242 # local shell function to import a Cert, calls certutil -A, writes 
   243 # action and options to stdout
   244 ########################################################################
   245 certImport()
   246 {
   247   echo "certutil -d $PKITSdb -A -t \",,\" -n $* -i $certs/$*.crt"
   248   ${BINDIR}/certutil -d $PKITSdb -A -t ",," -n $* -i $certs/$*.crt > ${PKITSDIR}/cmdout.txt 2>&1
   249   RET=$?
   250   cat ${PKITSDIR}/cmdout.txt
   252   if [ "$RET" -ne 0 ]; then
   253       html_failed "${VFY_ACTION} ($RET) "
   254       pkits_log "ERROR: ${VFY_ACTION} failed $RET"
   255   fi
   256 }
   258 ################################ certImportn #############################
   259 # local shell function to import an incorrect Cert, calls certutil -A, 
   260 # writes action and options to stdout
   261 ########################################################################
   262 certImportn()
   263 {
   264   RET=0
   265   if [ -z "$NSS_NO_PKITS_CRLS" ]; then
   266     echo "certutil -d $PKITSdb -A -t \",,\" -n $* -i $certs/$*.crt"
   267     ${BINDIR}/certutil -d $PKITSdb -A -t ",," -n $* -i $certs/$*.crt > ${PKITSDIR}/cmdout.txt 2>&1
   268     RET=$?
   269     cat ${PKITSDIR}/cmdout.txt
   271     if [ "$RET" -eq 0 ]; then
   272         html_failed "${VFY_ACTION} ($RET) "
   273         pkits_log "ERROR: ${VFY_ACTION} failed $RET"
   274     else
   275         html_passed "${VFY_ACTION} ($RET) "
   276         pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
   277     fi
   278   fi
   279 }
   281 ############################## pkits_tests_bySection ###################
   282 # running the various PKITS tests
   283 ########################################################################
   284 pkits_SignatureVerification()
   285 {
   286   start_table "NIST PKITS Section 4.1: Signature Verification"
   288   VFY_ACTION="Valid Signatures Test1"; log_banner
   289   certImport GoodCACert
   290   crlImport GoodCACRL.crl
   291   pkits $certs/ValidCertificatePathTest1EE.crt $certs/GoodCACert.crt
   292   restore_db
   294   VFY_ACTION="Invalid CA Signature Test2"; log_banner
   295   certImport BadSignedCACert
   296   crlImport BadSignedCACRL.crl
   297   pkitsn $certs/InvalidCASignatureTest2EE.crt \
   298     $certs/BadSignedCACert.crt
   299   restore_db
   301   VFY_ACTION="Invalid EE Signature Test3"; log_banner
   302   certImport GoodCACert
   303   crlImport GoodCACRL.crl
   304   pkitsn $certs/InvalidEESignatureTest3EE.crt $certs/GoodCACert.crt
   305   restore_db
   307   VFY_ACTION="Valid DSA Signatures Test4"; log_banner
   308   certImport DSACACert
   309   crlImport DSACACRL.crl
   310   pkits $certs/ValidDSASignaturesTest4EE.crt $certs/DSACACert.crt
   311   restore_db
   313   VFY_ACTION="Valid DSA Parameter Inheritance Test5"; log_banner
   314   certImport DSACACert
   315   crlImport DSACACRL.crl
   316   certImport DSAParametersInheritedCACert
   317   crlImport DSAParametersInheritedCACRL.crl
   318   pkits $certs/ValidDSAParameterInheritanceTest5EE.crt \
   319       $certs/DSAParametersInheritedCACert.crt \
   320       $certs/DSACACert.crt
   321   restore_db
   323   VFY_ACTION="Invalid DSA Signature Test6"; log_banner
   324   certImport DSACACert
   325   crlImport DSACACRL.crl
   326   pkitsn $certs/InvalidDSASignatureTest6EE.crt $certs/DSACACert.crt
   327   restore_db
   328 }
   330 pkits_ValidityPeriods()
   331 {
   332   break_table "NIST PKITS Section 4.2: Validity Periods"
   334   VFY_ACTION="Invalid CA notBefore Date Test1"; log_banner
   335   certImport BadnotBeforeDateCACert
   336   crlImportn BadnotBeforeDateCACRL.crl
   337   if [ $RET -eq 0 ] ; then 
   338       pkitsn $certs/InvalidCAnotBeforeDateTest1EE.crt \
   339           $certs/BadnotBeforeDateCACert.crt
   340   fi
   341   restore_db
   343   VFY_ACTION="Invalid EE notBefore Date Test2"; log_banner
   344   certImport GoodCACert
   345   crlImport GoodCACRL.crl
   346   pkitsn $certs/InvalidEEnotBeforeDateTest2EE.crt \
   347       $certs/GoodCACert.crt
   348   restore_db
   350   VFY_ACTION="Valid pre2000 UTC notBefore Date Test3"; log_banner
   351   certImport GoodCACert
   352   crlImport GoodCACRL.crl
   353   pkits $certs/Validpre2000UTCnotBeforeDateTest3EE.crt \
   354       $certs/GoodCACert.crt
   355   restore_db
   357   VFY_ACTION="Valid GeneralizedTime notBefore Date Test4"; log_banner
   358   certImport GoodCACert
   359   crlImport GoodCACRL.crl
   360   pkits $certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt \
   361       $certs/GoodCACert.crt
   362   restore_db
   364   VFY_ACTION="Invalid CA notAfter Date Test5"; log_banner
   365   certImport BadnotAfterDateCACert
   366   crlImportn BadnotAfterDateCACRL.crl
   367   if [ $RET -eq 0 ] ; then 
   368       pkitsn $certs/InvalidCAnotAfterDateTest5EE.crt \
   369           $certs/BadnotAfterDateCACert.crt
   370   fi
   371   restore_db
   373   VFY_ACTION="Invalid EE notAfter Date Test6"; log_banner
   374   certImport GoodCACert
   375   crlImport GoodCACRL.crl
   376   pkitsn $certs/InvalidEEnotAfterDateTest6EE.crt \
   377       $certs/GoodCACert.crt
   378   restore_db
   380   VFY_ACTION="Invalid pre2000 UTC EE notAfter Date Test7"; log_banner
   381   certImport GoodCACert
   382   crlImport GoodCACRL.crl
   383   pkitsn $certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt \
   384       $certs/GoodCACert.crt
   385   restore_db
   387   VFY_ACTION="ValidGeneralizedTime notAfter Date Test8"; log_banner
   388   certImport GoodCACert
   389   crlImport GoodCACRL.crl
   390   pkits $certs/ValidGeneralizedTimenotAfterDateTest8EE.crt \
   391       $certs/GoodCACert.crt
   392   restore_db
   393 }
   395 pkits_NameChaining()
   396 {
   397   break_table "NIST PKITS Section 4.3: Verifying NameChaining"
   399   VFY_ACTION="Invalid Name Chaining EE Test1"; log_banner
   400   certImport GoodCACert
   401   crlImport GoodCACRL.crl
   402   pkitsn $certs/InvalidNameChainingTest1EE.crt \
   403       $certs/GoodCACert.crt
   404   restore_db
   406   VFY_ACTION="Invalid Name Chaining Order Test2"; log_banner
   407   certImport NameOrderingCACert
   408   crlImport NameOrderCACRL.crl
   409   pkitsn $certs/InvalidNameChainingOrderTest2EE.crt \
   410       $certs/NameOrderingCACert.crt
   411   restore_db
   413 ### bug 216123 ###
   414 if [ -n "${KNOWN_BUG}" ]; then
   415   VFY_ACTION="Valid Name Chaining Whitespace Test3"; log_banner
   416   certImport GoodCACert
   417   crlImport GoodCACRL.crl
   418   pkits $certs/ValidNameChainingWhitespaceTest3EE.crt \
   419       $certs/GoodCACert.crt
   420   restore_db
   422   VFY_ACTION="Valid Name Chaining Whitespace Test4"; log_banner
   423   certImport GoodCACert
   424   crlImport GoodCACRL.crl
   425   pkits $certs/ValidNameChainingWhitespaceTest4EE.crt \
   426       $certs/GoodCACert.crt
   427   restore_db
   429   VFY_ACTION="Valid Name Chaining Capitalization Test5"; log_banner
   430   certImport GoodCACert
   431   crlImport GoodCACRL.crl
   432   pkits $certs/ValidNameChainingCapitalizationTest5EE.crt \
   433       $certs/GoodCACert.crt
   434   restore_db
   435 fi
   437   VFY_ACTION="Valid Name Chaining UIDs Test6"; log_banner
   438   certImport UIDCACert
   439   crlImport UIDCACRL.crl
   440   pkits $certs/ValidNameUIDsTest6EE.crt $certs/UIDCACert.crt
   441   restore_db
   443   VFY_ACTION="Valid RFC3280 Mandatory Attribute Types Test7"; log_banner
   444   certImport RFC3280MandatoryAttributeTypesCACert
   445   crlImport RFC3280MandatoryAttributeTypesCACRL.crl
   446   pkits $certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt \
   447       $certs/RFC3280MandatoryAttributeTypesCACert.crt
   448   restore_db
   450   VFY_ACTION="Valid RFC3280 Optional Attribute Types Test8"; log_banner
   451   certImport RFC3280OptionalAttributeTypesCACert
   452   crlImport RFC3280OptionalAttributeTypesCACRL.crl
   453   pkits $certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt \
   454       $certs/RFC3280OptionalAttributeTypesCACert.crt
   455   restore_db
   457   VFY_ACTION="Valid UTF8String Encoded Names Test9"; log_banner
   458   certImport UTF8StringEncodedNamesCACert
   459   crlImport UTF8StringEncodedNamesCACRL.crl
   460   pkits $certs/ValidUTF8StringEncodedNamesTest9EE.crt \
   461       $certs/UTF8StringEncodedNamesCACert.crt
   462   restore_db
   464 ### bug 216123 ###
   465 if [ -n "${KNOWN_BUG}" ]; then
   466   VFY_ACTION="Valid Rollover from PrintableString to UTF8String Test10"; log_banner
   467   certImport RolloverfromPrintableStringtoUTF8StringCACert
   468   crlImport RolloverfromPrintableStringtoUTF8StringCACRL.crl
   469   pkits $certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt \
   470       $certs/RolloverfromPrintableStringtoUTF8StringCACert.crt
   471   restore_db
   473   VFY_ACTION="Valid UTF8String case Insensitive Match Test11"; log_banner
   474   certImport UTF8StringCaseInsensitiveMatchCACert
   475   crlImport UTF8StringCaseInsensitiveMatchCACRL.crl
   476   pkits $certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt \
   477       $certs/UTF8StringCaseInsensitiveMatchCACert.crt
   478   restore_db
   479 fi
   480 }
   482 pkits_BasicCertRevocation()
   483 {
   484   break_table "NIST PKITS Section 4.4: Basic Certificate Revocation Tests"
   486 ### bug 414556 ###
   487 if [ -n "${KNOWN_BUG}" ]; then
   488   VFY_ACTION="Missing CRL Test1"; log_banner
   489   pkitsn $certs/InvalidMissingCRLTest1EE.crt \
   490       $certs/NoCRLCACert.crt
   491 fi
   493   VFY_ACTION="Invalid Revoked CA Test2"; log_banner
   494   certImport RevokedsubCACert
   495   crlImport RevokedsubCACRL.crl
   496   certImport GoodCACert
   497   crlImport GoodCACRL.crl
   498   pkitsn $certs/InvalidRevokedCATest2EE.crt \
   499      $certs/RevokedsubCACert.crt $certs/GoodCACert.crt
   500   restore_db
   502   VFY_ACTION="Invalid Revoked EE Test3"; log_banner
   503   certImport GoodCACert
   504   crlImport GoodCACRL.crl
   505   pkitsn $certs/InvalidRevokedEETest3EE.crt \
   506      $certs/GoodCACert.crt
   507   restore_db
   509   VFY_ACTION="Invalid Bad CRL Signature Test4"; log_banner
   510   certImport BadCRLSignatureCACert
   511   crlImportn BadCRLSignatureCACRL.crl
   512   if [ $RET -eq 0 ] ; then 
   513       pkitsn $certs/InvalidBadCRLSignatureTest4EE.crt \
   514           $certs/BadCRLSignatureCACert.crt
   515   fi
   516   restore_db
   518   VFY_ACTION="Invalid Bad CRL Issuer Name Test5"; log_banner
   519   certImport BadCRLIssuerNameCACert
   520   crlImportn BadCRLIssuerNameCACRL.crl
   521   if [ $RET -eq 0 ] ; then 
   522       pkitsn $certs/InvalidBadCRLIssuerNameTest5EE.crt \
   523           $certs/BadCRLIssuerNameCACert.crt
   524   fi
   525   restore_db
   527 ### bug 414556 ###
   528 if [ -n "${KNOWN_BUG}" ]; then
   529   VFY_ACTION="Invalid Wrong CRL Test6"; log_banner
   530   certImport WrongCRLCACert
   531   crlImport WrongCRLCACRL.crl
   532   pkitsn $certs/InvalidWrongCRLTest6EE.crt \
   533       $certs/WrongCRLCACert.crt
   534   restore_db
   535 fi
   537   VFY_ACTION="Valid Two CRLs Test7"; log_banner
   538   certImport TwoCRLsCACert
   539   crlImport TwoCRLsCAGoodCRL.crl
   540   crlImportn TwoCRLsCABadCRL.crl
   541   pkits $certs/ValidTwoCRLsTest7EE.crt \
   542      $certs/TwoCRLsCACert.crt
   543   restore_db
   545   VFY_ACTION="Invalid Unknown CRL Entry Extension Test8"; log_banner
   546   certImport UnknownCRLEntryExtensionCACert
   547   crlImportn UnknownCRLEntryExtensionCACRL.crl
   548   if [ $RET -eq 0 ] ; then 
   549       pkitsn $certs/InvalidUnknownCRLEntryExtensionTest8EE.crt \
   550           $certs/UnknownCRLEntryExtensionCACert.crt
   551   fi
   552   restore_db
   554   VFY_ACTION="Invalid Unknown CRL Extension Test9"; log_banner
   555   certImport UnknownCRLExtensionCACert
   556   crlImportn UnknownCRLExtensionCACRL.crl
   557   if [ $RET -eq 0 ] ; then 
   558       pkitsn $certs/InvalidUnknownCRLExtensionTest9EE.crt \
   559           $certs/UnknownCRLExtensionCACert.crt
   560   fi
   561   restore_db
   563   VFY_ACTION="Invalid Unknown CRL Extension Test10"; log_banner
   564   certImport UnknownCRLExtensionCACert
   565   crlImportn UnknownCRLExtensionCACRL.crl
   566   if [ $RET -eq 0 ] ; then 
   567       pkitsn $certs/InvalidUnknownCRLExtensionTest10EE.crt \
   568           $certs/UnknownCRLExtensionCACert.crt
   569   fi
   570   restore_db
   572 ### bug 414563 ###
   573 if [ -n "${KNOWN_BUG}" ]; then
   574   VFY_ACTION="Invalid Old CRL nextUpdate Test11"; log_banner
   575   certImport OldCRLnextUpdateCACert
   576   crlImport OldCRLnextUpdateCACRL.crl
   577   pkitsn $certs/InvalidOldCRLnextUpdateTest11EE.crt \
   578      $certs/OldCRLnextUpdateCACert.crt
   579   restore_db
   581   VFY_ACTION="Invalid pre2000 CRL nextUpdate Test12"; log_banner
   582   certImport pre2000CRLnextUpdateCACert
   583   crlImport pre2000CRLnextUpdateCACRL.crl
   584   pkitsn $certs/Invalidpre2000CRLnextUpdateTest12EE.crt \
   585      $certs/pre2000CRLnextUpdateCACert.crt
   586   restore_db
   587 fi
   589   VFY_ACTION="Valid GeneralizedTime CRL nextUpdate Test13"; log_banner
   590   certImport GeneralizedTimeCRLnextUpdateCACert
   591   crlImport GeneralizedTimeCRLnextUpdateCACRL.crl
   592   pkits $certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt \
   593      $certs/GeneralizedTimeCRLnextUpdateCACert.crt
   594   restore_db
   596   VFY_ACTION="Valid Negative Serial Number Test14"; log_banner
   597   certImport NegativeSerialNumberCACert
   598   crlImport NegativeSerialNumberCACRL.crl
   599   pkits $certs/ValidNegativeSerialNumberTest14EE.crt \
   600      $certs/NegativeSerialNumberCACert.crt
   601   restore_db
   603   VFY_ACTION="Invalid Negative Serial Number Test15"; log_banner
   604   certImport NegativeSerialNumberCACert
   605   crlImport NegativeSerialNumberCACRL.crl
   606   pkitsn $certs/InvalidNegativeSerialNumberTest15EE.crt \
   607      $certs/NegativeSerialNumberCACert.crt
   608   restore_db
   610   VFY_ACTION="Valid Long Serial Number Test16"; log_banner
   611   certImport LongSerialNumberCACert
   612   crlImport LongSerialNumberCACRL.crl
   613   pkits $certs/ValidLongSerialNumberTest16EE.crt \
   614      $certs/LongSerialNumberCACert.crt
   615   restore_db
   617   VFY_ACTION="Valid Long Serial Number Test17"; log_banner
   618   certImport LongSerialNumberCACert
   619   crlImport LongSerialNumberCACRL.crl
   620   pkits $certs/ValidLongSerialNumberTest17EE.crt \
   621      $certs/LongSerialNumberCACert.crt
   622   restore_db
   624   VFY_ACTION="Invalid Long Serial Number Test18"; log_banner
   625   certImport LongSerialNumberCACert
   626   crlImport LongSerialNumberCACRL.crl
   627   pkitsn $certs/InvalidLongSerialNumberTest18EE.crt \
   628      $certs/LongSerialNumberCACert.crt
   629   restore_db
   631 ### bug 232737 ###
   632 if [ -n "${KNOWN_BUG}" ]; then
   633   VFY_ACTION="Valid Separate Certificate and CRL Keys Test19"; log_banner
   634   certImport SeparateCertificateandCRLKeysCertificateSigningCACert
   635   certImport SeparateCertificateandCRLKeysCRLSigningCert
   636   crlImport SeparateCertificateandCRLKeysCRL.crl
   637   pkits $certs/ValidSeparateCertificateandCRLKeysTest19EE.crt \
   638      $certs/SeparateCertificateandCRLKeysCRLSigningCert.crt
   639   restore_db
   641   VFY_ACTION="Invalid Separate Certificate and CRL Keys Test20"; log_banner
   642   certImport SeparateCertificateandCRLKeysCertificateSigningCACert
   643   certImport SeparateCertificateandCRLKeysCRLSigningCert
   644   crlImport SeparateCertificateandCRLKeysCRL.crl
   645   pkits $certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt \
   646      $certs/SeparateCertificateandCRLKeysCRLSigningCert.crt
   647   restore_db
   649   VFY_ACTION="Invalid Separate Certificate and CRL Keys Test21"; log_banner
   650   certImport SeparateCertificateandCRLKeysCA2CertificateSigningCACert
   651   certImport SeparateCertificateandCRLKeysCA2CRLSigningCert
   652   crlImport SeparateCertificateandCRLKeysCA2CRL.crl
   653   pkits $certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt \
   654      $certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt
   655   restore_db
   656 fi
   657 }
   659 pkits_PathVerificWithSelfIssuedCerts()
   660 {
   661   break_table "NIST PKITS Section 4.5: Self-Issued Certificates"
   663 ### bug 232737 ###
   664 if [ -n "${KNOWN_BUG}" ]; then
   665   VFY_ACTION="Valid Basic Self-Issued Old With New Test1"; log_banner
   666   certImport BasicSelfIssuedNewKeyCACert
   667   crlImport BasicSelfIssuedNewKeyCACRL.crl
   668   pkits $certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt \
   669       $certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt \
   670       $certs/BasicSelfIssuedNewKeyCACert.crt
   671   restore_db
   673   VFY_ACTION="Invalid Basic Self-Issued Old With New Test2"; log_banner
   674   certImport BasicSelfIssuedNewKeyCACert
   675   crlImport BasicSelfIssuedNewKeyCACRL.crl
   676   pkitsn $certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt \
   677       $certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt \
   678       $certs/BasicSelfIssuedNewKeyCACert.crt
   679   restore_db
   680 fi
   682 ### bugs 321755 & 418769 ###
   683 if [ -n "${KNOWN_BUG}" ]; then
   684   VFY_ACTION="Valid Basic Self-Issued New With Old Test3"; log_banner
   685   certImport BasicSelfIssuedOldKeyCACert
   686   crlImport BasicSelfIssuedOldKeyCACRL.crl
   687   pkits $certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt \
   688       $certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt \
   689       $certs/BasicSelfIssuedOldKeyCACert.crt
   690   restore_db
   692   VFY_ACTION="Valid Basic Self-Issued New With Old Test4"; log_banner
   693   certImport BasicSelfIssuedOldKeyCACert
   694   crlImport BasicSelfIssuedOldKeyCACRL.crl
   695   pkits $certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt \
   696       $certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt \
   697       $certs/BasicSelfIssuedOldKeyCACert.crt
   698   restore_db
   700   VFY_ACTION="Invalid Basic Self-Issued New With Old Test5"; log_banner
   701   certImport BasicSelfIssuedOldKeyCACert
   702   crlImport BasicSelfIssuedOldKeyCACRL.crl
   703   pkitsn $certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt \
   704       $certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt \
   705       $certs/BasicSelfIssuedOldKeyCACert.crt
   706   restore_db
   708   VFY_ACTION="Valid Basic Self-Issued CRL Signing Key Test6"; log_banner
   709   certImport BasicSelfIssuedCRLSigningKeyCACert
   710   crlImport BasicSelfIssuedOldKeyCACRL.crl
   711   pkits $certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt \
   712       $certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt \
   713       $certs/BasicSelfIssuedCRLSigningKeyCACert.crt
   714   restore_db
   716   VFY_ACTION="Invalid Basic Self-Issued CRL Signing Key Test7"; log_banner
   717   certImport BasicSelfIssuedCRLSigningKeyCACert
   718   crlImport BasicSelfIssuedOldKeyCACRL.crl
   719   pkitsn $certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt \
   720       $certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt \
   721       $certs/BasicSelfIssuedCRLSigningKeyCACert.crt
   722   restore_db
   724   VFY_ACTION="Invalid Basic Self-Issued CRL Signing Key Test8"; log_banner
   725   certImport BasicSelfIssuedCRLSigningKeyCACert
   726   crlImport BasicSelfIssuedOldKeyCACRL.crl
   727   pkitsn $certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt \
   728       $certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt \
   729       $certs/BasicSelfIssuedCRLSigningKeyCACert.crt
   730   restore_db
   731 fi
   732 }
   734 pkits_BasicConstraints()
   735 {
   736   break_table "NIST PKITS Section 4.6: Verifying Basic Constraints"
   738   VFY_ACTION="Invalid Missing basicConstraints Test1"; log_banner
   739   certImport MissingbasicConstraintsCACert
   740   crlImport MissingbasicConstraintsCACRL.crl
   741   pkitsn $certs/InvalidMissingbasicConstraintsTest1EE.crt \
   742       $certs/MissingbasicConstraintsCACert.crt
   743   restore_db
   745   VFY_ACTION="Invalid cA False Test2"; log_banner
   746   certImport basicConstraintsCriticalcAFalseCACert
   747   crlImport basicConstraintsCriticalcAFalseCACRL.crl
   748   pkitsn $certs/InvalidcAFalseTest2EE.crt \
   749       $certs/basicConstraintsCriticalcAFalseCACert.crt
   750   restore_db
   752   VFY_ACTION="Invalid cA False Test3"; log_banner
   753   certImport basicConstraintsNotCriticalcAFalseCACert
   754   crlImport basicConstraintsNotCriticalcAFalseCACRL.crl
   755   pkitsn $certs/InvalidcAFalseTest3EE.crt \
   756       $certs/basicConstraintsNotCriticalcAFalseCACert.crt
   757   restore_db
   759   VFY_ACTION="Valid basicConstraints Not Critical Test4"; log_banner
   760   certImport basicConstraintsNotCriticalCACert
   761   crlImport basicConstraintsNotCriticalCACRL.crl
   762   pkits $certs/ValidbasicConstraintsNotCriticalTest4EE.crt \
   763       $certs/basicConstraintsNotCriticalCACert.crt
   764   restore_db
   766   VFY_ACTION="Invalid pathLenConstraint Test5"; log_banner
   767   certImport pathLenConstraint0CACert
   768   crlImport pathLenConstraint0CACRL.crl
   769   certImport pathLenConstraint0subCACert
   770   crlImport pathLenConstraint0subCACRL.crl
   771   pkitsn $certs/InvalidpathLenConstraintTest5EE.crt \
   772       $certs/pathLenConstraint0subCACert.crt \
   773       $certs/pathLenConstraint0CACert.crt
   774   restore_db
   776   VFY_ACTION="Invalid pathLenConstraint Test6"; log_banner
   777   certImport pathLenConstraint0CACert
   778   crlImport pathLenConstraint0CACRL.crl
   779   certImport pathLenConstraint0subCACert
   780   crlImport pathLenConstraint0subCACRL.crl
   781   pkitsn $certs/InvalidpathLenConstraintTest6EE.crt \
   782       $certs/pathLenConstraint0subCACert.crt \
   783       $certs/pathLenConstraint0CACert.crt
   784   restore_db
   786   VFY_ACTION="Valid pathLenConstraint Test7"; log_banner
   787   certImport pathLenConstraint0CACert
   788   crlImport pathLenConstraint0CACRL.crl
   789   pkits $certs/ValidpathLenConstraintTest7EE.crt \
   790       $certs/pathLenConstraint0CACert.crt
   791   restore_db
   793   VFY_ACTION="Valid pathLenConstraint test8"; log_banner
   794   certImport pathLenConstraint0CACert
   795   crlImport pathLenConstraint0CACRL.crl
   796   pkits $certs/ValidpathLenConstraintTest8EE.crt \
   797       $certs/pathLenConstraint0CACert.crt
   798   restore_db
   800   VFY_ACTION="Invalid pathLenConstraint Test9"; log_banner
   801   certImport pathLenConstraint6CACert
   802   crlImport pathLenConstraint6CACRL.crl
   803   certImport pathLenConstraint6subCA0Cert
   804   crlImport pathLenConstraint6subCA0CRL.crl
   805   certImport pathLenConstraint6subsubCA00Cert
   806   crlImport pathLenConstraint6subsubCA00CRL.crl
   807   pkitsn $certs/InvalidpathLenConstraintTest9EE.crt \
   808       $certs/pathLenConstraint6subsubCA00Cert.crt \
   809       $certs/pathLenConstraint6subCA0Cert.crt \
   810       $certs/pathLenConstraint6CACert.crt
   811   restore_db
   813   VFY_ACTION="Invalid pathLenConstraint Test10"; log_banner
   814   certImport pathLenConstraint6CACert
   815   crlImport pathLenConstraint6CACRL.crl
   816   certImport pathLenConstraint6subCA0Cert
   817   crlImport pathLenConstraint6subCA0CRL.crl
   818   certImport pathLenConstraint6subsubCA00Cert
   819   crlImport pathLenConstraint6subsubCA00CRL.crl
   820   pkitsn $certs/InvalidpathLenConstraintTest10EE.crt \
   821       $certs/pathLenConstraint6subsubCA00Cert.crt \
   822       $certs/pathLenConstraint6subCA0Cert.crt \
   823       $certs/pathLenConstraint6CACert.crt
   824   restore_db
   826   VFY_ACTION="Invalid pathLenConstraint Test11"; log_banner
   827   certImport pathLenConstraint6CACert
   828   crlImport pathLenConstraint6CACRL.crl
   829   certImport pathLenConstraint6subCA1Cert
   830   crlImport pathLenConstraint6subCA1CRL.crl
   831   certImport pathLenConstraint6subsubCA11Cert
   832   crlImport pathLenConstraint6subsubCA11CRL.crl
   833   certImport pathLenConstraint6subsubsubCA11XCert
   834   crlImport pathLenConstraint6subsubsubCA11XCRL.crl
   835   pkitsn $certs/InvalidpathLenConstraintTest11EE.crt \
   836       $certs/pathLenConstraint6subsubsubCA11XCert.crt \
   837       $certs/pathLenConstraint6subsubCA11Cert.crt \
   838       $certs/pathLenConstraint6subCA1Cert.crt \
   839       $certs/pathLenConstraint6CACert.crt
   840   restore_db
   842   VFY_ACTION="Invalid pathLenConstraint test12"; log_banner
   843   certImport pathLenConstraint6CACert
   844   crlImport pathLenConstraint6CACRL.crl
   845   certImport pathLenConstraint6subCA1Cert
   846   crlImport pathLenConstraint6subCA1CRL.crl
   847   certImport pathLenConstraint6subsubCA11Cert
   848   crlImport pathLenConstraint6subsubCA11CRL.crl
   849   certImport pathLenConstraint6subsubsubCA11XCert
   850   crlImport pathLenConstraint6subsubsubCA11XCRL.crl
   851   pkitsn $certs/InvalidpathLenConstraintTest12EE.crt \
   852       $certs/pathLenConstraint6subsubsubCA11XCert.crt \
   853       $certs/pathLenConstraint6subsubCA11Cert.crt \
   854       $certs/pathLenConstraint6subCA1Cert.crt \
   855       $certs/pathLenConstraint6CACert.crt
   856   restore_db
   858   VFY_ACTION="Valid pathLenConstraint Test13"; log_banner
   859   certImport pathLenConstraint6CACert
   860   crlImport pathLenConstraint6CACRL.crl
   861   certImport pathLenConstraint6subCA4Cert
   862   crlImport pathLenConstraint6subCA4CRL.crl
   863   certImport pathLenConstraint6subsubCA41Cert
   864   crlImport pathLenConstraint6subsubCA41CRL.crl
   865   certImport pathLenConstraint6subsubsubCA41XCert
   866   crlImport pathLenConstraint6subsubsubCA41XCRL.crl
   867   pkits $certs/ValidpathLenConstraintTest13EE.crt \
   868       $certs/pathLenConstraint6subsubsubCA41XCert.crt \
   869       $certs/pathLenConstraint6subsubCA41Cert.crt \
   870       $certs/pathLenConstraint6subCA4Cert.crt \
   871       $certs/pathLenConstraint6CACert.crt
   872   restore_db
   874   VFY_ACTION="Valid pathLenConstraint Test14"; log_banner
   875   certImport pathLenConstraint6CACert
   876   crlImport pathLenConstraint6CACRL.crl
   877   certImport pathLenConstraint6subCA4Cert
   878   crlImport pathLenConstraint6subCA4CRL.crl
   879   certImport pathLenConstraint6subsubCA41Cert
   880   crlImport pathLenConstraint6subsubCA41CRL.crl
   881   certImport pathLenConstraint6subsubsubCA41XCert
   882   crlImport pathLenConstraint6subsubsubCA41XCRL.crl
   883   pkits $certs/ValidpathLenConstraintTest14EE.crt \
   884       $certs/pathLenConstraint6subsubsubCA41XCert.crt \
   885       $certs/pathLenConstraint6subsubCA41Cert.crt \
   886       $certs/pathLenConstraint6subCA4Cert.crt \
   887       $certs/pathLenConstraint6CACert.crt
   888   restore_db
   890 ### bug 232737 ###
   891 if [ -n "${KNOWN_BUG}" ]; then
   892   VFY_ACTION="Valid Self-Issued pathLenConstraint Test15"; log_banner
   893   certImport pathLenConstraint0CACert
   894   crlImport pathLenConstraint0CACRL.crl
   895   pkits $certs/ValidSelfIssuedpathLenConstraintTest15EE.crt \
   896       $certs/pathLenConstraint0SelfIssuedCACert.crt \
   897       $certs/pathLenConstraint0CACert.crt
   898   restore_db
   899 fi
   901   VFY_ACTION="Invalid Self-Issued pathLenConstraint Test16"; log_banner
   902   certImport pathLenConstraint0CACert
   903   crlImport pathLenConstraint0CACRL.crl
   904   certImport pathLenConstraint0subCA2Cert
   905   crlImport pathLenConstraint0subCA2CRL.crl
   906   pkitsn $certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt \
   907       $certs/pathLenConstraint0subCA2Cert.crt \
   908       $certs/pathLenConstraint0SelfIssuedCACert.crt \
   909       $certs/pathLenConstraint0CACert.crt
   910   restore_db
   912 ### bug 232737 ###
   913 if [ -n "${KNOWN_BUG}" ]; then
   914   VFY_ACTION="Valid Self-Issued pathLenConstraint Test17"; log_banner
   915   certImport pathLenConstraint1CACert
   916   crlImport pathLenConstraint1CACRL.crl
   917   certImport pathLenConstraint1subCACert
   918   crlImport pathLenConstraint1subCACRL.crl
   919   pkits $certs/ValidSelfIssuedpathLenConstraintTest17EE.crt \
   920       $certs/pathLenConstraint1SelfIssuedsubCACert.crt \
   921       $certs/pathLenConstraint1subCACert.crt \
   922       $certs/pathLenConstraint1SelfIssuedCACert.crt \
   923       $certs/pathLenConstraint1CACert.crt
   924   restore_db
   925 fi
   926 }
   928 pkits_KeyUsage()
   929 {
   930   break_table "NIST PKITS Section 4.7: Key Usage"
   932   VFY_ACTION="Invalid keyUsage Critical keyCertSign False Test1"; log_banner
   933   certImport keyUsageCriticalkeyCertSignFalseCACert
   934   crlImport keyUsageCriticalkeyCertSignFalseCACRL.crl
   935   pkitsn $certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt \
   936       $certs/keyUsageCriticalkeyCertSignFalseCACert.crt
   937   restore_db
   939   VFY_ACTION="Invalid keyUsage Not Critical keyCertSign False Test2"; log_banner
   940   certImport keyUsageNotCriticalkeyCertSignFalseCACert
   941   crlImport keyUsageNotCriticalkeyCertSignFalseCACRL.crl
   942   pkitsn $certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt \
   943       $certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
   944   restore_db
   946   VFY_ACTION="Valid keyUsage Not Critical Test3"; log_banner
   947   certImport keyUsageNotCriticalCACert
   948   crlImport keyUsageNotCriticalCACRL.crl
   949   pkits $certs/ValidkeyUsageNotCriticalTest3EE.crt \
   950       $certs/keyUsageNotCriticalCACert.crt
   951   restore_db
   953   VFY_ACTION="Invalid keyUsage Critical cRLSign False Test4"; log_banner
   954   certImport keyUsageCriticalcRLSignFalseCACert
   955   crlImportn keyUsageCriticalcRLSignFalseCACRL.crl
   956   if [ $RET -eq 0 ] ; then 
   957       pkitsn $certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt \
   958           $certs/keyUsageCriticalcRLSignFalseCACert.crt
   959   fi
   960   restore_db
   962   VFY_ACTION="Invalid keyUsage Not Critical cRLSign False Test5"; log_banner
   963   certImport keyUsageNotCriticalcRLSignFalseCACert
   964   crlImportn keyUsageNotCriticalcRLSignFalseCACRL.crl
   965   if [ $RET -eq 0 ] ; then 
   966       pkitsn $certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt \
   967           $certs/keyUsageNotCriticalcRLSignFalseCACert.crt
   968   fi
   969   restore_db
   970 }
   972 pkits_CertificatePolicies()
   973 {
   974   break_table "NIST PKITS Section 4.8: Certificate Policies"
   976   VFY_ACTION="All Certificates Same Policy Test1"; log_banner
   977   certImport GoodCACert
   978   crlImport GoodCACRL.crl
   979   pkits $certs/ValidCertificatePathTest1EE.crt \
   980       $certs/GoodCACert.crt
   981   restore_db
   983   VFY_ACTION="All Certificates No Policies Test2"; log_banner
   984   certImport NoPoliciesCACert
   985   crlImport NoPoliciesCACRL.crl
   986   pkits $certs/AllCertificatesNoPoliciesTest2EE.crt \
   987       $certs/NoPoliciesCACert.crt
   988   restore_db
   990   VFY_ACTION="Different Policies Test3"; log_banner
   991   certImport GoodCACert
   992   crlImport GoodCACRL.crl
   993   certImport PoliciesP2subCACert
   994   crlImport PoliciesP2subCACRL.crl
   995   pkits $certs/DifferentPoliciesTest3EE.crt \
   996       $certs/PoliciesP2subCACert.crt \
   997       $certs/GoodCACert.crt
   998   restore_db
  1000   VFY_ACTION="Different Policies Test4"; log_banner
  1001   certImport GoodCACert
  1002   crlImport GoodCACRL.crl
  1003   certImport GoodsubCACert
  1004   crlImport GoodsubCACRL.crl
  1005   pkits $certs/DifferentPoliciesTest4EE.crt \
  1006       $certs/GoodsubCACert.crt \
  1007       $certs/GoodCACert.crt
  1008   restore_db
  1010   VFY_ACTION="Different Policies Test5"; log_banner
  1011   certImport GoodCACert
  1012   crlImport GoodCACRL.crl
  1013   certImport PoliciesP2subCA2Cert
  1014   crlImport PoliciesP2subCA2CRL.crl
  1015   pkits $certs/DifferentPoliciesTest5EE.crt \
  1016       $certs/PoliciesP2subCA2Cert.crt \
  1017       $certs/GoodCACert.crt
  1018   restore_db
  1020   VFY_ACTION="Overlapping Policies Test6"; log_banner
  1021   certImport PoliciesP1234CACert
  1022   crlImport PoliciesP1234CACRL.crl
  1023   certImport PoliciesP1234subCAP123Cert
  1024   crlImport PoliciesP1234subCAP123CRL.crl
  1025   certImport PoliciesP1234subsubCAP123P12Cert
  1026   crlImport PoliciesP1234subsubCAP123P12CRL.crl
  1027   pkits $certs/OverlappingPoliciesTest6EE.crt \
  1028       $certs/PoliciesP1234subsubCAP123P12Cert.crt \
  1029       $certs/PoliciesP1234subCAP123Cert.crt \
  1030       $certs/PoliciesP1234CACert.crt
  1031   restore_db
  1033   VFY_ACTION="Different Policies Test7"; log_banner
  1034   certImport PoliciesP123CACert
  1035   crlImport PoliciesP123CACRL.crl
  1036   certImport PoliciesP123subCAP12Cert
  1037   crlImport PoliciesP123subCAP12CRL.crl
  1038   certImport PoliciesP123subsubCAP12P1Cert
  1039   crlImport PoliciesP123subsubCAP12P1CRL.crl
  1040   pkits $certs/DifferentPoliciesTest7EE.crt \
  1041       $certs/PoliciesP123subsubCAP12P1Cert.crt \
  1042       $certs/PoliciesP123subCAP12Cert.crt \
  1043       $certs/PoliciesP123CACert.crt
  1044   restore_db
  1046   VFY_ACTION="Different Policies Test8"; log_banner
  1047   certImport PoliciesP12CACert
  1048   crlImport PoliciesP12CACRL.crl
  1049   certImport PoliciesP12subCAP1Cert
  1050   crlImport PoliciesP12subCAP1CRL.crl
  1051   certImport PoliciesP12subsubCAP1P2Cert
  1052   crlImport PoliciesP12subsubCAP1P2CRL.crl
  1053   pkits $certs/DifferentPoliciesTest8EE.crt \
  1054       $certs/PoliciesP123subsubCAP12P1Cert.crt \
  1055       $certs/PoliciesP12subCAP1Cert.crt \
  1056       $certs/PoliciesP12CACert.crt
  1057   restore_db
  1059   VFY_ACTION="Different Policies Test9"; log_banner
  1060   certImport PoliciesP123CACert
  1061   crlImport PoliciesP123CACRL.crl
  1062   certImport PoliciesP123subCAP12Cert
  1063   crlImport PoliciesP123subCAP12CRL.crl
  1064   certImport PoliciesP123subsubCAP12P2Cert
  1065   crlImport PoliciesP123subsubCAP2P2CRL.crl
  1066   certImport PoliciesP123subsubsubCAP12P2P1Cert
  1067   crlImport PoliciesP123subsubsubCAP12P2P1CRL.crl
  1068   pkits $certs/DifferentPoliciesTest9EE.crt \
  1069       $certs/PoliciesP123subsubsubCAP12P2P1Cert.crt \
  1070       $certs/PoliciesP123subsubCAP12P1Cert.crt \
  1071       $certs/PoliciesP12subCAP1Cert.crt \
  1072       $certs/PoliciesP12CACert.crt
  1073   restore_db
  1075   VFY_ACTION="All Certificates Same Policies Test10"; log_banner
  1076   certImport PoliciesP12CACert
  1077   crlImport PoliciesP12CACRL.crl
  1078   pkits $certs/AllCertificatesSamePoliciesTest10EE.crt \
  1079       $certs/NoPoliciesCACert.crt
  1080   restore_db
  1082   VFY_ACTION="All Certificates AnyPolicy Test11"; log_banner
  1083   certImport anyPolicyCACert
  1084   crlImport anyPolicyCACRL.crl
  1085   pkits $certs/AllCertificatesanyPolicyTest11EE.crt \
  1086       $certs/anyPolicyCACert.crt
  1087   restore_db
  1089   VFY_ACTION="Different Policies Test12"; log_banner
  1090   certImport PoliciesP3CACert
  1091   crlImport PoliciesP3CACRL.crl
  1092   pkits $certs/DifferentPoliciesTest12EE.crt \
  1093       $certs/PoliciesP3CACert.crt
  1094   restore_db
  1096   VFY_ACTION="All Certificates Same Policies Test13"; log_banner
  1097   certImport PoliciesP123CACert
  1098   crlImport PoliciesP123CACRL.crl
  1099   pkits $certs/AllCertificatesSamePoliciesTest13EE.crt \
  1100       $certs/PoliciesP123CACert.crt
  1101   restore_db
  1103   VFY_ACTION="AnyPolicy Test14"; log_banner
  1104   certImport anyPolicyCACert
  1105   crlImport anyPolicyCACRL.crl
  1106   pkits $certs/AnyPolicyTest14EE.crt \
  1107       $certs/anyPolicyCACert.crt
  1108   restore_db
  1110   VFY_ACTION="User Notice Qualifier Test15"; log_banner
  1111   pkits $certs/UserNoticeQualifierTest15EE.crt
  1113   VFY_ACTION="User Notice Qualifier Test16"; log_banner
  1114   certImport GoodCACert
  1115   crlImport GoodCACRL.crl
  1116   pkits $certs/UserNoticeQualifierTest16EE.crt \
  1117       $certs/GoodCACert.crt
  1119   VFY_ACTION="User Notice Qualifier Test17"; log_banner
  1120   certImport GoodCACert
  1121   crlImport GoodCACRL.crl
  1122   pkits $certs/UserNoticeQualifierTest17EE.crt \
  1123       $certs/GoodCACert.crt
  1124   restore_db
  1126   VFY_ACTION="User Notice Qualifier Test18"; log_banner
  1127   certImport PoliciesP12CACert
  1128   crlImport PoliciesP12CACRL.crl
  1129   pkits $certs/UserNoticeQualifierTest18EE.crt \
  1130       $certs/PoliciesP12CACert.crt
  1131   restore_db
  1133   VFY_ACTION="User Notice Qualifier Test19"; log_banner
  1134   pkits $certs/UserNoticeQualifierTest19EE.crt
  1136   VFY_ACTION="CPS Pointer Qualifier Test20"; log_banner
  1137   certImport GoodCACert
  1138   crlImport GoodCACRL.crl
  1139   pkits $certs/CPSPointerQualifierTest20EE.crt \
  1140       $certs/GoodCACert.crt
  1141   restore_db
  1144 pkits_RequireExplicitPolicy()
  1146   break_table "NIST PKITS Section 4.9: Require Explicit Policy"
  1148   VFY_ACTION="Valid RequireExplicitPolicy Test1"; log_banner
  1149   certImportn requireExplicitPolicy10CACert
  1150   crlImportn requireExplicitPolicy10CACRL.crl
  1151   certImport requireExplicitPolicy10subCACert
  1152   crlImport requireExplicitPolicy10subCACRL.crl
  1153   certImport requireExplicitPolicy10subsubCACert
  1154   crlImport requireExplicitPolicy10subsubCACRL.crl
  1155   certImport requireExplicitPolicy10subsubsubCACert
  1156   crlImport requireExplicitPolicy10subsubsubCACRL.crl
  1157   pkits $certs/ValidrequireExplicitPolicyTest1EE.crt \
  1158       $certs/requireExplicitPolicy10subsubsubCACert.crt \
  1159       $certs/requireExplicitPolicy10subsubCACert.crt \
  1160       $certs/requireExplicitPolicy10subCACert.crt \
  1161       $certs/requireExplicitPolicy10CACert.crt
  1162   restore_db
  1164   VFY_ACTION="Valid RequireExplicitPolicy Test2"; log_banner
  1165   certImportn requireExplicitPolicy5CACert
  1166   crlImportn requireExplicitPolicy5CACRL.crl
  1167   certImport requireExplicitPolicy5subCACert
  1168   crlImport requireExplicitPolicy5subCACRL.crl
  1169   certImport requireExplicitPolicy5subsubCACert
  1170   crlImport requireExplicitPolicy5subsubCACRL.crl
  1171   certImport requireExplicitPolicy5subsubsubCACert
  1172   crlImport requireExplicitPolicy5subsubsubCACRL.crl
  1173   pkits $certs/ValidrequireExplicitPolicyTest2EE.crt \
  1174       $certs/requireExplicitPolicy5subsubsubCACert.crt \
  1175       $certs/requireExplicitPolicy5subsubCACert.crt \
  1176       $certs/requireExplicitPolicy5subCACert.crt \
  1177       $certs/requireExplicitPolicy5CACert.crt
  1178   restore_db
  1180   VFY_ACTION="Invalid RequireExplicitPolicy Test3"; log_banner
  1181   certImportn requireExplicitPolicy4CACert
  1182   crlImportn requireExplicitPolicy4CACRL.crl
  1183   certImport requireExplicitPolicy4subCACert
  1184   crlImport requireExplicitPolicy4subCACRL.crl
  1185   certImport requireExplicitPolicy4subsubCACert
  1186   crlImport requireExplicitPolicy4subsubCACRL.crl
  1187   certImport requireExplicitPolicy4subsubsubCACert
  1188   crlImport requireExplicitPolicy4subsubsubCACRL.crl
  1189   pkitsn $certs/InvalidrequireExplicitPolicyTest3EE.crt \
  1190       $certs/requireExplicitPolicy4subsubsubCACert.crt \
  1191       $certs/requireExplicitPolicy4subsubCACert.crt \
  1192       $certs/requireExplicitPolicy4subCACert.crt \
  1193       $certs/requireExplicitPolicy4CACert.crt
  1194   restore_db
  1196   VFY_ACTION="Valid RequireExplicitPolicy Test4"; log_banner
  1197   certImportn requireExplicitPolicy0CACert
  1198   crlImportn requireExplicitPolicy0CACRL.crl
  1199   certImport requireExplicitPolicy0subCACert
  1200   crlImport requireExplicitPolicy0subCACRL.crl
  1201   certImport requireExplicitPolicy0subsubCACert
  1202   crlImport requireExplicitPolicy0subsubCACRL.crl
  1203   certImport requireExplicitPolicy0subsubsubCACert
  1204   crlImport requireExplicitPolicy0subsubsubCACRL.crl
  1205   pkits $certs/ValidrequireExplicitPolicyTest4EE.crt \
  1206       $certs/requireExplicitPolicy0subsubsubCACert.crt \
  1207       $certs/requireExplicitPolicy0subsubCACert.crt \
  1208       $certs/requireExplicitPolicy0subCACert.crt \
  1209       $certs/requireExplicitPolicy0CACert.crt
  1210   restore_db
  1212   VFY_ACTION="Invalid RequireExplicitPolicy Test5"; log_banner
  1213   certImportn requireExplicitPolicy7CACert
  1214   crlImportn requireExplicitPolicy7CACRL.crl
  1215   certImportn requireExplicitPolicy7subCARE2Cert
  1216   crlImportn requireExplicitPolicy7subCARE2CRL.crl
  1217   certImportn requireExplicitPolicy7subsubCARE2RE4Cert
  1218   crlImportn requireExplicitPolicy7subsubCARE2RE4CRL.crl
  1219   certImport requireExplicitPolicy7subsubsubCARE2RE4Cert
  1220   crlImport requireExplicitPolicy7subsubsubCARE2RE4CRL.crl
  1221   pkitsn $certs/InvalidrequireExplicitPolicyTest5EE.crt \
  1222       $certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt \
  1223       $certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt \
  1224       $certs/requireExplicitPolicy7subCARE2Cert.crt \
  1225       $certs/requireExplicitPolicy7CACert.crt
  1226   restore_db
  1228   VFY_ACTION="Valid Self-Issued RequireExplicitPolicy Test6"; log_banner
  1229   certImportn requireExplicitPolicy2CACert
  1230   crlImportn requireExplicitPolicy2CACRL.crl
  1231   pkits $certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt \
  1232       $certs/requireExplicitPolicy2SelfIssuedCACert.crt \
  1233       $certs/requireExplicitPolicy2CACert.crt
  1234   restore_db
  1236   VFY_ACTION="Invalid Self-Issued RequireExplicitPolicy Test7"; log_banner
  1237   certImportn requireExplicitPolicy2CACert
  1238   crlImportn requireExplicitPolicy2CACRL.crl
  1239   certImport requireExplicitPolicy2subCACert
  1240   crlImport requireExplicitPolicy2subCACRL.crl
  1241   pkitsn $certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt \
  1242       $certs/requireExplicitPolicy2subCACert.crt \
  1243       $certs/requireExplicitPolicy2SelfIssuedCACert.crt \
  1244       $certs/requireExplicitPolicy2CACert.crt
  1245   restore_db
  1247   VFY_ACTION="Invalid Self-Issued RequireExplicitPolicy Test8"; log_banner
  1248   certImportn requireExplicitPolicy2CACert
  1249   crlImportn requireExplicitPolicy2CACRL.crl
  1250   certImport requireExplicitPolicy2subCACert
  1251   crlImport requireExplicitPolicy2subCACRL.crl
  1252   pkitsn $certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt \
  1253       $certs/requireExplicitPolicy2SelfIssuedsubCACert.crt \
  1254       $certs/requireExplicitPolicy2subCACert.crt \
  1255       $certs/requireExplicitPolicy2SelfIssuedCACert.crt \
  1256       $certs/requireExplicitPolicy2CACert.crt
  1257   restore_db
  1260 pkits_PolicyMappings()
  1262   break_table "NIST PKITS Section 4.10: Policy Mappings"
  1264   VFY_ACTION="Valid Policy Mapping Test1"; log_banner
  1265   certImportn Mapping1to2CACert
  1266   crlImportn Mapping1to2CACRL.crl
  1267   pkits $certs/ValidPolicyMappingTest1EE.crt \
  1268       $certs/Mapping1to2CACert.crt
  1269   restore_db
  1271   VFY_ACTION="Invalid Policy Mapping Test2"; log_banner
  1272   certImportn Mapping1to2CACert
  1273   crlImportn Mapping1to2CACRL.crl
  1274   pkitsn $certs/InvalidPolicyMappingTest2EE.crt \
  1275       $certs/Mapping1to2CACert.crt
  1276   restore_db
  1278   VFY_ACTION="Valid Policy Mapping Test3"; log_banner
  1279   certImportn P12Mapping1to3CACert
  1280   crlImportn P12Mapping1to3CACRL.crl
  1281   certImportn P12Mapping1to3subCACert
  1282   crlImportn P12Mapping1to3subCACRL.crl
  1283   certImportn P12Mapping1to3subsubCACert
  1284   crlImportn P12Mapping1to3subsubCACRL.crl
  1285   pkits $certs/ValidPolicyMappingTest3EE.crt \
  1286       $certs/P12Mapping1to3subsubCACert.crt \
  1287       $certs/P12Mapping1to3subCACert.crt \
  1288       $certs/P12Mapping1to3CA.crt
  1289   restore_db
  1291   VFY_ACTION="Invalid Policy Mapping Test4"; log_banner
  1292   certImportn P12Mapping1to3CACert
  1293   crlImportn P12Mapping1to3CACRL.crl
  1294   certImportn P12Mapping1to3subCACert
  1295   crlImportn P12Mapping1to3subCACRL.crl
  1296   certImportn P12Mapping1to3subsubCACert
  1297   crlImportn P12Mapping1to3subsubCACRL.crl
  1298   pkitsn $certs/InvalidPolicyMappingTest4EE.crt \
  1299       $certs/P12Mapping1to3subsubCACert.crt \
  1300       $certs/P12Mapping1to3subCACert.crt \
  1301       $certs/P12Mapping1to3CA.crt
  1302   restore_db
  1304   VFY_ACTION="Valid Policy Mapping Test5"; log_banner
  1305   certImportn P1Mapping1to234CACert
  1306   crlImportn P1Mapping1to234CACRL.crl
  1307   certImportn P1Mapping1to234subCACert
  1308   crlImportn P1Mapping1to234subCACRL.crl
  1309   pkits $certs/ValidPolicyMappingTest5EE.crt \
  1310       $certs/P1Mapping1to234subCACert.crt \
  1311       $certs/P1Mapping1to234CA.crt
  1312   restore_db
  1314   VFY_ACTION="Valid Policy Mapping Test6"; log_banner
  1315   certImportn P1Mapping1to234CACert
  1316   crlImportn P1Mapping1to234CACRL.crl
  1317   certImportn P1Mapping1to234subCACert
  1318   crlImportn P1Mapping1to234subCACRL.crl
  1319   pkits $certs/ValidPolicyMappingTest6EE.crt \
  1320       $certs/P1Mapping1to234subCACert.crt \
  1321       $certs/P1Mapping1to234CA.crt
  1322   restore_db
  1324   VFY_ACTION="Invalid Mapping from anyPolicy Test7"; log_banner
  1325   certImportn MappingFromanyPolicyCACert
  1326   crlImportn MappingFromanyPolicyCACRL.crl
  1327   pkitsn $certs/InvalidMappingFromanyPolicyTest7EE.crt \
  1328       $certs/MappingFromanyPolicyCACert.crt
  1329   restore_db
  1331   VFY_ACTION="Invalid Mapping to anyPolicy Test8"; log_banner
  1332   certImportn MappingToanyPolicyCACert
  1333   crlImportn MappingToanyPolicyCACRL.crl
  1334   pkitsn $certs/InvalidMappingToanyPolicyTest8EE.crt \
  1335       $certs/MappingToanyPolicyCACert.crt
  1336   restore_db
  1338   VFY_ACTION="Valid Policy Mapping Test9"; log_banner
  1339   certImport PanyPolicyMapping1to2CACert
  1340   crlImport PanyPolicyMapping1to2CACRL.crl
  1341   pkits $certs/ValidPolicyMappingTest9EE.crt \
  1342       $certs/PanyPolicyMapping1to2CACert.crt
  1343   restore_db
  1345   VFY_ACTION="Invalid Policy Mapping Test10"; log_banner
  1346   certImport GoodCACert
  1347   crlImport GoodCACRL.crl
  1348   certImportn GoodsubCAPanyPolicyMapping1to2CACert
  1349   crlImportn GoodsubCAPanyPolicyMapping1to2CACRL.crl
  1350   pkitsn $certs/InvalidPolicyMappingTest10EE.crt \
  1351       $certs/GoodsubCAPanyPolicyMapping1to2CACert.crt \
  1352       $certs/GoodCACert.crt
  1353   restore_db
  1355   VFY_ACTION="Valid Policy Mapping Test11"; log_banner
  1356   certImport GoodCACert
  1357   crlImport GoodCACRL.crl
  1358   certImportn GoodsubCAPanyPolicyMapping1to2CACert
  1359   crlImportn GoodsubCAPanyPolicyMapping1to2CACRL.crl
  1360   pkits $certs/ValidPolicyMappingTest11EE.crt \
  1361       $certs/GoodsubCAPanyPolicyMapping1to2CACert.crt \
  1362       $certs/GoodCACert.crt
  1363   restore_db
  1365   VFY_ACTION="Valid Policy Mapping Test12"; log_banner
  1366   certImportn P12Mapping1to3CACert
  1367   crlImportn P12Mapping1to3CACRL.crl
  1368   pkits $certs/ValidPolicyMappingTest12EE.crt \
  1369       $certs/P12Mapping1to3CACert.crt
  1370   restore_db
  1372   VFY_ACTION="Valid Policy Mapping Test13"; log_banner
  1373   certImportn P1anyPolicyMapping1to2CACert
  1374   crlImportn P1anyPolicyMapping1to2CACRL.crl
  1375   pkits $certs/ValidPolicyMappingTest13EE.crt \
  1376       $certs/P1anyPolicyMapping1to2CACert.crt
  1377   restore_db
  1379   VFY_ACTION="Valid Policy Mapping Test14"; log_banner
  1380   certImportn P1anyPolicyMapping1to2CACert
  1381   crlImportn P1anyPolicyMapping1to2CACRL.crl
  1382   pkits $certs/ValidPolicyMappingTest14EE.crt \
  1383       $certs/P1anyPolicyMapping1to2CACert.crt
  1384   restore_db
  1388 pkits_InhibitPolicyMapping()
  1390   break_table "NIST PKITS Section 4.11: Inhibit Policy Mapping"
  1392   VFY_ACTION="Invalid inhibitPolicyMapping Test1"; log_banner
  1393   certImportn inhibitPolicyMapping0CACert
  1394   crlImportn inhibitPolicyMapping0CACRL.crl
  1395   certImportn inhibitPolicyMapping0subCACert
  1396   crlImportn inhibitPolicyMapping0subCACRL.crl
  1397   pkitsn $certs/InvalidinhibitPolicyMappingTest1EE.crt \
  1398       $certs/inhibitPolicyMapping0CACert.crt \
  1399       $certs/inhibitPolicyMapping0subCACert.crt
  1400   restore_db
  1402   VFY_ACTION="Valid inhibitPolicyMapping Test2"; log_banner
  1403   certImportn inhibitPolicyMapping1P12CACert
  1404   crlImportn inhibitPolicyMapping1P12CACRL.crl
  1405   certImportn inhibitPolicyMapping1P12subCACert
  1406   crlImportn inhibitPolicyMapping1P12subCACRL.crl
  1407   pkits $certs/ValidinhibitPolicyMappingTest2EE.crt \
  1408       $certs/inhibitPolicyMapping1P12CACert.crt \
  1409       $certs/inhibitPolicyMapping1P12subCACert.crt
  1410   restore_db
  1412   VFY_ACTION="Invalid inhibitPolicyMapping Test3"; log_banner
  1413   certImportn inhibitPolicyMapping1P12CACert
  1414   crlImportn inhibitPolicyMapping1P12CACRL.crl
  1415   certImportn inhibitPolicyMapping1P12subCACert
  1416   crlImportn inhibitPolicyMapping1P12subCACRL.crl
  1417   certImportn inhibitPolicyMapping1P12subsubCACert
  1418   crlImportn inhibitPolicyMapping1P12subsubCACRL.crl
  1419   pkitsn $certs/InvalidinhibitPolicyMappingTest3EE.crt \
  1420       $certs/inhibitPolicyMapping1P12subsubCACert.crt \
  1421       $certs/inhibitPolicyMapping1P12subCACert.crt \
  1422       $certs/inhibitPolicyMapping1P12CACert.crt
  1423   restore_db
  1425   VFY_ACTION="Valid inhibitPolicyMapping Test4"; log_banner
  1426   certImportn inhibitPolicyMapping1P12CACert
  1427   crlImportn inhibitPolicyMapping1P12CACRL.crl
  1428   certImportn inhibitPolicyMapping1P12subCACert
  1429   crlImportn inhibitPolicyMapping1P12subCACRL.crl
  1430   certImportn inhibitPolicyMapping1P12subsubCACert
  1431   crlImportn inhibitPolicyMapping1P12subsubCACRL.crl
  1432   pkits $certs/ValidinhibitPolicyMappingTest4EE.crt \
  1433       $certs/inhibitPolicyMapping1P12CACert.crt \
  1434       $certs/inhibitPolicyMapping1P12subCACert.crt
  1435   restore_db
  1437   VFY_ACTION="Invalid inhibitPolicyMapping Test5"; log_banner
  1438   certImportn inhibitPolicyMapping5CACert
  1439   crlImportn inhibitPolicyMapping5CACRL.crl
  1440   certImportn inhibitPolicyMapping5subCACert
  1441   crlImportn inhibitPolicyMapping5subCACRL.crl
  1442   certImport inhibitPolicyMapping5subsubCACert
  1443   crlImport inhibitPolicyMapping5subsubCACRL.crl
  1444   pkitsn $certs/InvalidinhibitPolicyMappingTest5EE.crt \
  1445       $certs/inhibitPolicyMapping5subsubCACert.crt \
  1446       $certs/inhibitPolicyMapping5subCACert.crt \
  1447       $certs/inhibitPolicyMapping5CACert.crt
  1448   restore_db
  1450   VFY_ACTION="Invalid inhibitPolicyMapping Test6"; log_banner
  1451   certImportn inhibitPolicyMapping1P12CACert
  1452   crlImportn inhibitPolicyMapping1P12CACRL.crl
  1453   certImportn inhibitPolicyMapping1P12subCAIPM5Cert
  1454   crlImportn inhibitPolicyMapping1P12subCAIPM5CRL.crl
  1455   certImport inhibitPolicyMapping1P12subsubCAIPM5Cert
  1456   crlImportn inhibitPolicyMapping1P12subsubCAIPM5CRL.crl
  1457   pkitsn $certs/InvalidinhibitPolicyMappingTest6EE.crt \
  1458       $certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt \
  1459       $certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt \
  1460       $certs/inhibitPolicyMapping1P12CACert.crt
  1461   restore_db
  1463   VFY_ACTION="Valid Self-Issued inhibitPolicyMapping Test7"; log_banner
  1464   certImportn inhibitPolicyMapping1P1CACert
  1465   crlImportn inhibitPolicyMapping1P1CACRL.crl
  1466   certImportn inhibitPolicyMapping1P1subCACert
  1467   crlImportn inhibitPolicyMapping1P1subCACRL.crl
  1468   pkits $certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt \
  1469       $certs/inhibitPolicyMapping1P1subCACert.crt \
  1470       $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
  1471       $certs/inhibitPolicyMapping1P1CACert.crt
  1472   restore_db
  1474   VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test8"; log_banner
  1475   certImportn inhibitPolicyMapping1P1CACert
  1476   crlImportn inhibitPolicyMapping1P1CACRL.crl
  1477   certImportn inhibitPolicyMapping1P1subCACert
  1478   crlImportn inhibitPolicyMapping1P1subCACRL.crl
  1479   certImport inhibitPolicyMapping1P1subsubCACert
  1480   crlImportn inhibitPolicyMapping1P1subsubCACRL.crl
  1481   pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt \
  1482       $certs/inhibitPolicyMapping1P1subsubCACert.crt \
  1483       $certs/inhibitPolicyMapping1P1subCACert.crt \
  1484       $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
  1485       $certs/inhibitPolicyMapping1P1CACert.crt
  1486   restore_db
  1488   VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test9"; log_banner
  1489   certImportn inhibitPolicyMapping1P1CACert
  1490   crlImportn inhibitPolicyMapping1P1CACRL.crl
  1491   certImportn inhibitPolicyMapping1P1subCACert
  1492   crlImportn inhibitPolicyMapping1P1subCACRL.crl
  1493   certImportn inhibitPolicyMapping1P1subsubCACert
  1494   crlImportn inhibitPolicyMapping1P1subsubCACRL.crl
  1495   pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt \
  1496       $certs/inhibitPolicyMapping1P1subsubCACert.crt \
  1497       $certs/inhibitPolicyMapping1P1subCACert.crt \
  1498       $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
  1499       $certs/inhibitPolicyMapping1P1CACert.crt
  1500   restore_db
  1502   VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test10"; log_banner
  1503   certImportn inhibitPolicyMapping1P1CACert
  1504   crlImportn inhibitPolicyMapping1P1CACRL.crl
  1505   certImportn inhibitPolicyMapping1P1subCACert
  1506   crlImportn inhibitPolicyMapping1P1subCACRL.crl
  1507   pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt \
  1508       $certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt \
  1509       $certs/inhibitPolicyMapping1P1subCACert.crt \
  1510       $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
  1511       $certs/inhibitPolicyMapping1P1CACert.crt
  1512   restore_db
  1514   VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test11"; log_banner
  1515   certImportn inhibitPolicyMapping1P1CACert
  1516   crlImportn inhibitPolicyMapping1P1CACRL.crl
  1517   certImportn inhibitPolicyMapping1P1subCACert
  1518   crlImportn inhibitPolicyMapping1P1subCACRL.crl
  1519   pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt \
  1520       $certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt \
  1521       $certs/inhibitPolicyMapping1P1subCACert.crt \
  1522       $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
  1523       $certs/inhibitPolicyMapping1P1CACert.crt
  1524   restore_db
  1528 pkits_InhibitAnyPolicy()
  1530   break_table "NIST PKITS Section 4.12: Inhibit Any Policy"
  1532   VFY_ACTION="Invalid inhibitAnyPolicy Test1"; log_banner
  1533   certImportn inhibitAnyPolicy0CACert
  1534   crlImportn inhibitAnyPolicy0CACRL.crl
  1535   pkitsn $certs/InvalidinhibitAnyPolicyTest1EE.crt \
  1536       $certs/inhibitAnyPolicy0CACert.crt
  1537   restore_db
  1539   VFY_ACTION="Valid inhibitAnyPolicy Test2"; log_banner
  1540   certImportn inhibitAnyPolicy0CACert
  1541   crlImportn inhibitAnyPolicy0CACRL.crl
  1542   pkits $certs/ValidinhibitAnyPolicyTest2EE.crt \
  1543       $certs/inhibitAnyPolicy0CACert.crt
  1544   restore_db
  1546   VFY_ACTION="inhibitAnyPolicy Test3"; log_banner
  1547   certImportn inhibitAnyPolicy1CACert
  1548   crlImportn inhibitAnyPolicy1CACRL.crl
  1549   certImport inhibitAnyPolicy1subCA1Cert
  1550   crlImport inhibitAnyPolicy1subCA1CRL.crl
  1551   pkits $certs/inhibitAnyPolicyTest3EE.crt \
  1552       $certs/inhibitAnyPolicy1CACert.crt \
  1553       $certs/inhibitAnyPolicy1subCA1Cert.crt
  1554   restore_db
  1556   VFY_ACTION="Invalid inhibitAnyPolicy Test4"; log_banner
  1557   certImportn inhibitAnyPolicy1CACert
  1558   crlImportn inhibitAnyPolicy1CACRL.crl
  1559   certImport inhibitAnyPolicy1subCA1Cert
  1560   crlImport inhibitAnyPolicy1subCA1CRL.crl
  1561   pkitsn $certs/InvalidinhibitAnyPolicyTest4EE.crt \
  1562       $certs/inhibitAnyPolicy1CACert.crt \
  1563       $certs/inhibitAnyPolicy1subCA1Cert.crt
  1564   restore_db
  1566   VFY_ACTION="Invalid inhibitAnyPolicy Test5"; log_banner
  1567   certImportn inhibitAnyPolicy5CACert
  1568   crlImportn inhibitAnyPolicy5CACRL.crl
  1569   certImportn inhibitAnyPolicy5subCACert
  1570   crlImportn inhibitAnyPolicy5subCACRL.crl
  1571   certImport inhibitAnyPolicy5subsubCACert
  1572   crlImport inhibitAnyPolicy5subsubCACRL.crl
  1573   pkitsn $certs/InvalidinhibitAnyPolicyTest5EE.crt \
  1574       $certs/inhibitAnyPolicy5CACert.crt \
  1575       $certs/inhibitAnyPolicy5subCACert.crt \
  1576       $certs/inhibitAnyPolicy5subsubCACert.crt
  1577   restore_db
  1579   VFY_ACTION="Invalid inhibitAnyPolicy Test6"; log_banner
  1580   certImportn inhibitAnyPolicy1CACert
  1581   crlImportn inhibitAnyPolicy1CACRL.crl
  1582   certImportn inhibitAnyPolicy1subCAIAP5Cert
  1583   crlImportn inhibitAnyPolicy1subCAIAP5CRL.crl
  1584   pkitsn $certs/InvalidinhibitAnyPolicyTest5EE.crt \
  1585       $certs/inhibitAnyPolicy1CACert.crt \
  1586       $certs/inhibitAnyPolicy5subCACert.crt \
  1587       $certs/inhibitAnyPolicy5subsubCACert.crt
  1588   restore_db
  1590   VFY_ACTION="Valid Self-Issued inhibitAnyPolicy Test7"; log_banner
  1591   certImportn inhibitAnyPolicy1CACert
  1592   crlImportn inhibitAnyPolicy1CACRL.crl
  1593   certImport inhibitAnyPolicy1subCA2Cert
  1594   crlImport inhibitAnyPolicy1subCA2CRL.crl
  1595   pkits $certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt \
  1596       $certs/inhibitAnyPolicy1CACert.crt \
  1597       $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
  1598       $certs/inhibitAnyPolicy1subCA2Cert.crt
  1599   restore_db
  1601   VFY_ACTION="Invalid Self-Issued inhibitAnyPolicy Test8"; log_banner
  1602   certImportn inhibitAnyPolicy1CACert
  1603   crlImportn inhibitAnyPolicy1CACRL.crl
  1604   certImport inhibitAnyPolicy1subCA2Cert
  1605   crlImport inhibitAnyPolicy1subCA2CRL.crl
  1606   certImport inhibitAnyPolicy1subsubCA2Cert
  1607   crlImport inhibitAnyPolicy1subsubCA2CRL.crl
  1608   pkitsn $certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt \
  1609       $certs/inhibitAnyPolicy1CACert.crt \
  1610       $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
  1611       $certs/inhibitAnyPolicy1subCA2Cert.crt \
  1612       $certs/inhibitAnyPolicy1subsubCA2Cert.crt
  1613   restore_db
  1615   VFY_ACTION="Valid Self-Issued inhibitAnyPolicy Test9"; log_banner
  1616   certImportn inhibitAnyPolicy1CACert
  1617   crlImportn inhibitAnyPolicy1CACRL.crl
  1618   certImport inhibitAnyPolicy1subCA2Cert
  1619   crlImport inhibitAnyPolicy1subCA2CRL.crl
  1620   pkits $certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt \
  1621       $certs/inhibitAnyPolicy1CACert.crt \
  1622       $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
  1623       $certs/inhibitAnyPolicy1subCA2Cert.crt \
  1624       $certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt
  1625   restore_db
  1627   VFY_ACTION="Invalid Self-Issued inhibitAnyPolicy Test10"; log_banner
  1628   certImportn inhibitAnyPolicy1CACert
  1629   crlImportn inhibitAnyPolicy1CACRL.crl
  1630   certImport inhibitAnyPolicy1subCA2Cert
  1631   crlImport inhibitAnyPolicy1subCA2CRL.crl
  1632   pkitsn $certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt \
  1633       $certs/inhibitAnyPolicy1CACert.crt \
  1634       $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
  1635       $certs/inhibitAnyPolicy1subCA2Cert.crt
  1636   restore_db
  1640 pkits_NameConstraints()
  1642   break_table "NIST PKITS Section 4.13: Name Constraints"
  1644   VFY_ACTION="Valid DN nameConstraints Test1"; log_banner
  1645   certImport nameConstraintsDN1CACert
  1646   crlImport nameConstraintsDN1CACRL.crl
  1647   pkits $certs/ValidDNnameConstraintsTest1EE.crt \
  1648       $certs/nameConstraintsDN1CACert.crt
  1649   restore_db
  1651   VFY_ACTION="Invalid DN nameConstraints Test2"; log_banner
  1652   certImport nameConstraintsDN1CACert
  1653   crlImport nameConstraintsDN1CACRL.crl
  1654   pkitsn $certs/InvalidDNnameConstraintsTest2EE.crt \
  1655       $certs/nameConstraintsDN1CACert.crt
  1656   restore_db
  1658   VFY_ACTION="Invalid DN nameConstraints Test3"; log_banner
  1659   certImport nameConstraintsDN1CACert
  1660   crlImport nameConstraintsDN1CACRL.crl
  1661   pkitsn $certs/InvalidDNnameConstraintsTest3EE.crt \
  1662       $certs/nameConstraintsDN1CACert.crt
  1663   restore_db
  1665   VFY_ACTION="Valid DN nameConstraints Test4"; log_banner
  1666   certImport nameConstraintsDN1CACert
  1667   crlImport nameConstraintsDN1CACRL.crl
  1668   pkits $certs/ValidDNnameConstraintsTest4EE.crt \
  1669       $certs/nameConstraintsDN1CACert.crt
  1670   restore_db
  1672   VFY_ACTION="Valid DN nameConstraints Test5"; log_banner
  1673   certImport nameConstraintsDN2CACert
  1674   crlImport nameConstraintsDN2CACRL.crl
  1675   pkits $certs/ValidDNnameConstraintsTest5EE.crt \
  1676       $certs/nameConstraintsDN2CACert.crt
  1677   restore_db
  1679   VFY_ACTION="Valid DN nameConstraints Test6"; log_banner
  1680   certImport nameConstraintsDN3CACert
  1681   crlImport nameConstraintsDN3CACRL.crl
  1682   pkits $certs/ValidDNnameConstraintsTest6EE.crt \
  1683       $certs/nameConstraintsDN3CACert.crt
  1684   restore_db
  1686   VFY_ACTION="Invalid DN nameConstraints Test7"; log_banner
  1687   certImport nameConstraintsDN3CACert
  1688   crlImport nameConstraintsDN3CACRL.crl
  1689   pkitsn $certs/InvalidDNnameConstraintsTest7EE.crt \
  1690       $certs/nameConstraintsDN3CACert.crt
  1691   restore_db
  1693   VFY_ACTION="Invalid DN nameConstraints Test8"; log_banner
  1694   certImport nameConstraintsDN4CACert
  1695   crlImport nameConstraintsDN4CACRL.crl
  1696   pkitsn $certs/InvalidDNnameConstraintsTest8EE.crt \
  1697       $certs/nameConstraintsDN4CACert.crt
  1698   restore_db
  1700   VFY_ACTION="Invalid DN nameConstraints Test9"; log_banner
  1701   certImport nameConstraintsDN4CACert
  1702   crlImport nameConstraintsDN4CACRL.crl
  1703   pkitsn $certs/InvalidDNnameConstraintsTest9EE.crt \
  1704       $certs/nameConstraintsDN4CACert.crt
  1705   restore_db
  1707   VFY_ACTION="Invalid DN nameConstraints Test10"; log_banner
  1708   certImport nameConstraintsDN5CACert
  1709   crlImport nameConstraintsDN5CACRL.crl
  1710   pkitsn $certs/InvalidDNnameConstraintsTest10EE.crt \
  1711       $certs/nameConstraintsDN5CACert.crt
  1712   restore_db
  1714   VFY_ACTION="Valid DN nameConstraints Test11"; log_banner
  1715   certImport nameConstraintsDN5CACert
  1716   crlImport nameConstraintsDN5CACRL.crl
  1717   pkits $certs/ValidDNnameConstraintsTest11EE.crt \
  1718       $certs/nameConstraintsDN5CACert.crt
  1719   restore_db
  1721   VFY_ACTION="Invalid DN nameConstraints Test12"; log_banner
  1722   certImport nameConstraintsDN1CACert
  1723   crlImport nameConstraintsDN1CACRL.crl
  1724   certImport nameConstraintsDN1subCA1Cert
  1725   crlImport nameConstraintsDN1subCA1CRL.crl
  1726   pkitsn $certs/InvalidDNnameConstraintsTest12EE.crt \
  1727       $certs/nameConstraintsDN1subCA1Cert.crt \
  1728       $certs/nameConstraintsDN1CACert.crt
  1729   restore_db
  1731   VFY_ACTION="Invalid DN nameConstraints Test13"; log_banner
  1732   certImport nameConstraintsDN1CACert
  1733   crlImport nameConstraintsDN1CACRL.crl
  1734   certImport nameConstraintsDN1subCA2Cert
  1735   crlImport nameConstraintsDN1subCA2CRL.crl
  1736   pkitsn $certs/InvalidDNnameConstraintsTest13EE.crt \
  1737       $certs/nameConstraintsDN1subCA2Cert.crt \
  1738       $certs/nameConstraintsDN1CACert.crt
  1739   restore_db
  1741   VFY_ACTION="Valid DN nameConstraints Test14"; log_banner
  1742   certImport nameConstraintsDN1CACert
  1743   crlImport nameConstraintsDN1CACRL.crl
  1744   certImport nameConstraintsDN1subCA2Cert
  1745   crlImport nameConstraintsDN1subCA2CRL.crl
  1746   pkits $certs/ValidDNnameConstraintsTest14EE.crt \
  1747       $certs/nameConstraintsDN1subCA2Cert.crt \
  1748       $certs/nameConstraintsDN1CACert.crt
  1749   restore_db
  1751   VFY_ACTION="Invalid DN nameConstraints Test15"; log_banner
  1752   certImport nameConstraintsDN3CACert
  1753   crlImport nameConstraintsDN3CACRL.crl
  1754   certImport nameConstraintsDN3subCA1Cert
  1755   crlImport nameConstraintsDN3subCA1CRL.crl
  1756   pkitsn $certs/InvalidDNnameConstraintsTest15EE.crt \
  1757       $certs/nameConstraintsDN3subCA1Cert.crt \
  1758       $certs/nameConstraintsDN3CACert.crt
  1759   restore_db
  1761   VFY_ACTION="Invalid DN nameConstraints Test16"; log_banner
  1762   certImport nameConstraintsDN3CACert
  1763   crlImport nameConstraintsDN3CACRL.crl
  1764   certImport nameConstraintsDN3subCA1Cert
  1765   crlImport nameConstraintsDN3subCA1CRL.crl
  1766   pkitsn $certs/InvalidDNnameConstraintsTest16EE.crt \
  1767       $certs/nameConstraintsDN3subCA1Cert.crt \
  1768       $certs/nameConstraintsDN3CACert.crt
  1769   restore_db
  1771   VFY_ACTION="Invalid DN nameConstraints Test17"; log_banner
  1772   certImport nameConstraintsDN3CACert
  1773   crlImport nameConstraintsDN3CACRL.crl
  1774   certImport nameConstraintsDN3subCA2Cert
  1775   crlImport nameConstraintsDN3subCA2CRL.crl
  1776   pkitsn $certs/InvalidDNnameConstraintsTest17EE.crt \
  1777       $certs/nameConstraintsDN3subCA2Cert.crt \
  1778       $certs/nameConstraintsDN3CACert.crt
  1779   restore_db
  1781   VFY_ACTION="Valid DN nameConstraints Test18"; log_banner
  1782   certImport nameConstraintsDN3CACert
  1783   crlImport nameConstraintsDN3CACRL.crl
  1784   certImport nameConstraintsDN3subCA2Cert
  1785   crlImport nameConstraintsDN3subCA2CRL.crl
  1786   pkits $certs/ValidDNnameConstraintsTest18EE.crt \
  1787       $certs/nameConstraintsDN3subCA2Cert.crt \
  1788       $certs/nameConstraintsDN3CACert.crt
  1789   restore_db
  1791 ### bug 232737 ###
  1792 if [ -n "${KNOWN_BUG}" ]; then
  1793   VFY_ACTION="Valid Self-Issued DN nameConstraints Test19"; log_banner
  1794   certImport nameConstraintsDN1CACert
  1795   crlImport nameConstraintsDN1CACRL.crl
  1796   pkits $certs/ValidDNnameConstraintsTest19EE.crt \
  1797       $certs/nameConstraintsDN1SelfIssuedCACert.crt \
  1798       $certs/nameConstraintsDN1CACert.crt
  1799   restore_db
  1800 fi
  1802   VFY_ACTION="Invalid Self-Issued DN nameConstraints Test20"; log_banner
  1803   certImport nameConstraintsDN1CACert
  1804   crlImport nameConstraintsDN1CACRL.crl
  1805   pkitsn $certs/InvalidDNnameConstraintsTest20EE.crt \
  1806       $certs/nameConstraintsDN1CACert.crt
  1807   restore_db
  1809   VFY_ACTION="Valid RFC822 nameConstraints Test21"; log_banner
  1810   certImport nameConstraintsRFC822CA1Cert
  1811   crlImport nameConstraintsRFC822CA1CRL.crl
  1812   pkits $certs/ValidRFC822nameConstraintsTest21EE.crt \
  1813       $certs/nameConstraintsRFC822CA1Cert.crt
  1814   restore_db
  1816   VFY_ACTION="Invalid RFC822 nameConstraints Test22"; log_banner
  1817   certImport nameConstraintsRFC822CA1Cert
  1818   crlImport nameConstraintsRFC822CA1CRL.crl
  1819   pkitsn $certs/InvalidRFC822nameConstraintsTest22EE.crt \
  1820       $certs/nameConstraintsRFC822CA1Cert.crt
  1821   restore_db
  1823   VFY_ACTION="Valid RFC822 nameConstraints Test23"; log_banner
  1824   certImport nameConstraintsRFC822CA2Cert
  1825   crlImport nameConstraintsRFC822CA2CRL.crl
  1826   pkits $certs/ValidRFC822nameConstraintsTest23EE.crt \
  1827       $certs/nameConstraintsRFC822CA2Cert.crt
  1828   restore_db
  1830   VFY_ACTION="Invalid RFC822 nameConstraints Test24"; log_banner
  1831   certImport nameConstraintsRFC822CA2Cert
  1832   crlImport nameConstraintsRFC822CA2CRL.crl
  1833   pkitsn $certs/InvalidRFC822nameConstraintsTest24EE.crt \
  1834       $certs/nameConstraintsRFC822CA2Cert.crt
  1835   restore_db
  1837   VFY_ACTION="Valid RFC822 nameConstraints Test25"; log_banner
  1838   certImport nameConstraintsRFC822CA3Cert
  1839   crlImport nameConstraintsRFC822CA3CRL.crl
  1840   pkits $certs/ValidRFC822nameConstraintsTest25EE.crt \
  1841       $certs/nameConstraintsRFC822CA3Cert.crt
  1842   restore_db
  1844   VFY_ACTION="Invalid RFC822 nameConstraints Test26"; log_banner
  1845   certImport nameConstraintsRFC822CA3Cert
  1846   crlImport nameConstraintsRFC822CA3CRL.crl
  1847   pkitsn $certs/InvalidRFC822nameConstraintsTest26EE.crt \
  1848       $certs/nameConstraintsRFC822CA3Cert.crt
  1849   restore_db
  1851   VFY_ACTION="Valid DN and RFC822 nameConstraints Test27"; log_banner
  1852   certImport nameConstraintsDN1CACert
  1853   crlImport nameConstraintsDN1CACRL.crl
  1854   certImport nameConstraintsDN1subCA3Cert
  1855   crlImport nameConstraintsDN1subCA3CRL.crl
  1856   pkits $certs/ValidDNandRFC822nameConstraintsTest27EE.crt \
  1857       $certs/nameConstraintsDN1subCA3Cert.crt \
  1858       $certs/nameConstraintsDN1CACert.crt
  1859   restore_db
  1861   VFY_ACTION="Invalid DN and RFC822 nameConstraints Test28"; log_banner
  1862   certImport nameConstraintsDN1CACert
  1863   crlImport nameConstraintsDN1CACRL.crl
  1864   certImport nameConstraintsDN1subCA3Cert
  1865   crlImport nameConstraintsDN1subCA3CRL.crl
  1866   pkitsn $certs/InvalidDNandRFC822nameConstraintsTest28EE.crt \
  1867       $certs/nameConstraintsDN1subCA3Cert.crt \
  1868       $certs/nameConstraintsDN1CACert.crt
  1869   restore_db
  1871   VFY_ACTION="Invalid DN and RFC822 nameConstraints Test29"; log_banner
  1872   certImport nameConstraintsDN1CACert
  1873   crlImport nameConstraintsDN1CACRL.crl
  1874   certImport nameConstraintsDN1subCA3Cert
  1875   crlImport nameConstraintsDN1subCA3CRL.crl
  1876   pkitsn $certs/InvalidDNandRFC822nameConstraintsTest29EE.crt \
  1877       $certs/nameConstraintsDN1subCA3Cert.crt \
  1878       $certs/nameConstraintsDN1CACert.crt
  1879   restore_db
  1881   VFY_ACTION="Valid DNS nameConstraints Test30"; log_banner
  1882   certImport nameConstraintsDNS1CACert
  1883   crlImport nameConstraintsDNS1CACRL.crl
  1884   pkits $certs/ValidDNSnameConstraintsTest30EE.crt \
  1885       $certs/nameConstraintsDNS1CACert.crt
  1886   restore_db
  1888   VFY_ACTION="Invalid DNS nameConstraints Test31"; log_banner
  1889   certImport nameConstraintsDNS1CACert
  1890   crlImport nameConstraintsDNS1CACRL.crl
  1891   pkitsn $certs/InvalidDNSnameConstraintsTest31EE.crt \
  1892       $certs/nameConstraintsDNS1CACert.crt
  1893   restore_db
  1895   VFY_ACTION="Valid DNS nameConstraints Test32"; log_banner
  1896   certImport nameConstraintsDNS2CACert
  1897   crlImport nameConstraintsDNS2CACRL.crl
  1898   pkits $certs/ValidDNSnameConstraintsTest32EE.crt \
  1899       $certs/nameConstraintsDNS2CACert.crt
  1900   restore_db
  1902   VFY_ACTION="Invalid DNS nameConstraints Test33"; log_banner
  1903   certImport nameConstraintsDNS2CACert
  1904   crlImport nameConstraintsDNS2CACRL.crl
  1905   pkitsn $certs/InvalidDNSnameConstraintsTest33EE.crt \
  1906       $certs/nameConstraintsDNS2CACert.crt
  1907   restore_db
  1909   VFY_ACTION="Valid URI nameConstraints Test34"; log_banner
  1910   certImport nameConstraintsURI1CACert
  1911   crlImport nameConstraintsURI1CACRL.crl
  1912   pkits $certs/ValidURInameConstraintsTest34EE.crt \
  1913       $certs/nameConstraintsURI1CACert.crt
  1914   restore_db
  1916   VFY_ACTION="Invalid URI nameConstraints Test35"; log_banner
  1917   certImport nameConstraintsURI1CACert
  1918   crlImport nameConstraintsURI1CACRL.crl
  1919   pkitsn $certs/InvalidURInameConstraintsTest35EE.crt \
  1920       $certs/nameConstraintsURI1CACert.crt
  1921   restore_db
  1923   VFY_ACTION="Valid URI nameConstraints Test36"; log_banner
  1924   certImport nameConstraintsURI2CACert
  1925   crlImport nameConstraintsURI2CACRL.crl
  1926   pkits $certs/ValidURInameConstraintsTest36EE.crt \
  1927       $certs/nameConstraintsURI2CACert.crt
  1928   restore_db
  1930   VFY_ACTION="Invalid URI nameConstraints Test37"; log_banner
  1931   certImport nameConstraintsURI2CACert
  1932   crlImport nameConstraintsURI2CACRL.crl
  1933   pkitsn $certs/InvalidURInameConstraintsTest37EE.crt \
  1934       $certs/nameConstraintsURI2CACert.crt
  1935   restore_db
  1937   VFY_ACTION="Invalid DNS nameConstraints Test38"; log_banner
  1938   certImport nameConstraintsDNS1CACert
  1939   crlImport nameConstraintsDNS1CACRL.crl
  1940   pkitsn $certs/InvalidDNSnameConstraintsTest38EE.crt \
  1941       $certs/nameConstraintsDNS1CACert.crt
  1942   restore_db
  1945 pkits_PvtCertExtensions()
  1947   break_table "NIST PKITS Section 4.16: Private Certificate Extensions"
  1949   VFY_ACTION="Valid Unknown Not Critical Certificate Extension Test1"; log_banner
  1950   pkits $certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
  1952   VFY_ACTION="Invalid Unknown Critical Certificate Extension Test2"; log_banner
  1953   pkitsn $certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
  1956 ############################## pkits_cleanup ###########################
  1957 # local shell function to finish this script (no exit since it might be 
  1958 # sourced)
  1959 ########################################################################
  1960 pkits_cleanup()
  1962   html "</TABLE><BR>"
  1963   cd ${QADIR}
  1964   . common/cleanup.sh
  1968 ################################## main ################################
  1969 pkits_init 
  1970 pkits_SignatureVerification | tee -a $PKITS_LOG
  1971 pkits_ValidityPeriods | tee -a $PKITS_LOG
  1972 pkits_NameChaining | tee -a $PKITS_LOG
  1973 pkits_BasicCertRevocation | tee -a $PKITS_LOG
  1974 pkits_PathVerificWithSelfIssuedCerts | tee -a $PKITS_LOG
  1975 pkits_BasicConstraints | tee -a $PKITS_LOG
  1976 pkits_KeyUsage | tee -a $PKITS_LOG
  1977 if [ -n "$NSS_PKITS_POLICIES" ]; then
  1978   pkits_CertificatePolicies | tee -a $PKITS_LOG
  1979   pkits_RequireExplicitPolicy | tee -a $PKITS_LOG
  1980   pkits_PolicyMappings | tee -a $PKITS_LOG
  1981   pkits_InhibitPolicyMapping | tee -a $PKITS_LOG
  1982   pkits_InhibitAnyPolicy | tee -a $PKITS_LOG
  1983 fi
  1984 pkits_NameConstraints | tee -a $PKITS_LOG
  1985 pkits_PvtCertExtensions | tee -a $PKITS_LOG
  1986 pkits_cleanup

mercurial