Thu, 22 Jan 2015 13:21:57 +0100
Incorporate requested changes from Mozilla in review:
https://bugzilla.mozilla.org/show_bug.cgi?id=1123480#c6
1 #!/bin/bash
2 #
3 # This Source Code Form is subject to the terms of the Mozilla Public
4 # License, v. 2.0. If a copy of the MPL was not distributed with this
5 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
7 ########################################################################
8 #
9 # mozilla/security/nss/tests/pkits/pkits.sh
10 #
11 # Script to test the NIST PKITS tests
12 #
13 # needs to work on all Unix and Windows platforms
14 #
15 # tests implemented:
16 # vfychain
17 #
18 # special NOTES
19 # ---------------
20 # NIST PKITS data needs to be downloaded from
21 # http://csrc.nist.gov/pki/testing/x509paths.html
22 # Environment variable PKITS_DATA needs to be set to the directory
23 # where this data is downloaded, or test data needs to be copied under
24 # the mozilla source tree in mozilla/PKITS_DATA
25 ########################################################################
27 ############################## pkits_init ##############################
28 # local shell function to initialize this script
29 ########################################################################
30 pkits_init()
31 {
32 SCRIPTNAME=pkits.sh
34 if [ -z "${CLEANUP}" ] ; then
35 CLEANUP="${SCRIPTNAME}"
36 fi
38 if [ -z "${INIT_SOURCED}" -o "${INIT_SOURCED}" != "TRUE" ]; then
39 cd ../common
40 . ./init.sh
41 fi
43 if [ -z "${PKITS_DATA}" ]; then
44 echo "${SCRIPTNAME}: PKITS data directory not defined, skipping."
45 exit 0
46 fi
48 if [ ! -d "${PKITS_DATA}" ]; then
49 echo "${SCRIPTNAME}: PKITS data directory ${PKITS_DATA} doesn't exist, skipping."
50 exit 0
51 fi
53 PKITSDIR=${HOSTDIR}/pkits
55 COPYDIR=${PKITSDIR}/copydir
57 mkdir -p ${PKITSDIR}
58 mkdir -p ${COPYDIR}
59 mkdir -p ${PKITSDIR}/html
61 certs=${PKITS_DATA}/certs
62 crls=${PKITS_DATA}/crls
64 cd ${PKITSDIR}
66 PKITSdb=${PKITSDIR}/PKITSdb
67 PKITSbkp=${PKITSDIR}/PKITSbkp
69 PKITS_LOG=${PKITSDIR}/pkits.log #getting its own logfile
70 pkits_log "Start of logfile $PKITS_LOG"
72 if [ ! -d "${PKITSdb}" ]; then
73 mkdir -p ${PKITSdb}
74 else
75 pkits_log "$SCRIPTNAME: WARNING - ${PKITSdb} exists"
76 fi
78 if [ ! -d "${PKITSbkp}" ]; then
79 mkdir -p ${PKITSbkp}
80 else
81 pkits_log "$SCRIPTNAME: WARNING - ${PKITSbkp} exists"
82 fi
84 echo "HOSTDIR" $HOSTDIR
85 echo "PKITSDIR" $PKITSDIR
86 echo "PKITSdb" $PKITSdb
87 echo "PKITSbkp" $PKITSbkp
88 echo "PKITS_DATA" $PKITS_DATA
89 echo "certs" $certs
90 echo "crls" $crls
92 echo nss > ${PKITSdb}/pw
93 ${BINDIR}/certutil -N -d ${PKITSdb} -f ${PKITSdb}/pw
95 ${BINDIR}/certutil -A -n TrustAnchorRootCertificate -t "C,C,C" -i \
96 $certs/TrustAnchorRootCertificate.crt -d $PKITSdb
97 if [ -z "$NSS_NO_PKITS_CRLS" ]; then
98 ${BINDIR}/crlutil -I -i $crls/TrustAnchorRootCRL.crl -d ${PKITSdb} -f ${PKITSdb}/pw
99 else
100 html "<H3>NO CRLs are being used.</H3>"
101 pkits_log "NO CRLs are being used."
102 fi
104 cp ${PKITSdb}/* ${PKITSbkp}
106 KNOWN_BUG=
107 }
109 ############################### pkits_log ##############################
110 # write to pkits.log file
111 ########################################################################
112 pkits_log()
113 {
114 echo "$SCRIPTNAME $*"
115 echo $* >> ${PKITS_LOG}
116 }
118 restore_db()
119 {
120 echo "Restore DB"
121 rm ${PKITSdb}/*
122 cp ${PKITSbkp}/* ${PKITSdb}
123 }
125 log_banner()
126 {
127 echo ""
128 echo "--------------------------------------------------------------------"
129 echo "Test case ${VFY_ACTION}"
130 echo ""
131 }
133 start_table()
134 {
135 html "<TABLE BORDER=1><TR><TH COLSPAN=3>$*</TH></TR>"
136 html "<TR><TH width=500>Test Case</TH><TH width=50>Result</TH></TR>"
137 echo ""
138 echo "***************************************************************"
139 echo "$*"
140 echo "***************************************************************"
141 }
143 break_table()
144 {
145 html "</TABLE><P>"
146 start_table "$@"
147 }
149 ################################ pkits #################################
150 # local shell function for positive testcases, calls vfychain, writes
151 # action and options to stdout, sets variable RET and writes results to
152 # the html file results
153 ########################################################################
154 pkits()
155 {
156 echo "vfychain -d $PKITSdb -u 4 $*"
157 ${BINDIR}/vfychain -d $PKITSdb -u 4 $* > ${PKITSDIR}/cmdout.txt 2>&1
158 RET=$?
159 CNT=`grep -c ERROR ${PKITSDIR}/cmdout.txt`
160 RET=`expr ${RET} + ${CNT}`
161 cat ${PKITSDIR}/cmdout.txt
163 if [ "$RET" -ne 0 ]; then
164 html_failed "${VFY_ACTION} ($RET) "
165 pkits_log "ERROR: ${VFY_ACTION} failed $RET"
166 else
167 html_passed "${VFY_ACTION}"
168 pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
169 fi
171 return $RET
172 }
174 ################################ pkitsn #################################
175 # local shell function for negative testcases, calls vfychain, writes
176 # action and options to stdout, sets variable RET and writes results to
177 # the html file results
178 ########################################################################
179 pkitsn()
180 {
181 echo "vfychain -d $PKITSdb -u 4 $*"
182 ${BINDIR}/vfychain -d $PKITSdb -u 4 $* > ${PKITSDIR}/cmdout.txt 2>&1
183 RET=$?
184 CNT=`grep -c ERROR ${PKITSDIR}/cmdout.txt`
185 RET=`expr ${RET} + ${CNT}`
186 cat ${PKITSDIR}/cmdout.txt
188 if [ "$RET" -eq 0 ]; then
189 html_failed "${VFY_ACTION} ($RET) "
190 pkits_log "ERROR: ${VFY_ACTION} failed $RET"
191 else
192 html_passed "${VFY_ACTION} ($RET) "
193 pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
194 fi
195 return $RET
196 }
198 ################################ crlImport #############################
199 # local shell function to import a CRL, calls crlutil -I -i, writes
200 # action and options to stdout
201 ########################################################################
202 crlImport()
203 {
204 if [ -z "$NSS_NO_PKITS_CRLS" ]; then
205 echo "crlutil -d $PKITSdb -I -f ${PKITSdb}/pw -i $crls/$*"
206 ${BINDIR}/crlutil -d ${PKITSdb} -I -f ${PKITSdb}/pw -i $crls/$* > ${PKITSDIR}/cmdout.txt 2>&1
207 RET=$?
208 cat ${PKITSDIR}/cmdout.txt
210 if [ "$RET" -ne 0 ]; then
211 html_failed "${VFY_ACTION} ($RET) "
212 pkits_log "ERROR: ${VFY_ACTION} failed $RET"
213 fi
214 fi
215 }
217 ################################ crlImportn #############################
218 # local shell function to import an incorrect CRL, calls crlutil -I -i,
219 # writes action and options to stdout
220 ########################################################################
221 crlImportn()
222 {
223 RET=0
224 if [ -z "$NSS_NO_PKITS_CRLS" ]; then
225 echo "crlutil -d $PKITSdb -I -f ${PKITSdb}/pw -i $crls/$*"
226 ${BINDIR}/crlutil -d ${PKITSdb} -I -f ${PKITSdb}/pw -i $crls/$* > ${PKITSDIR}/cmdout.txt 2>&1
227 RET=$?
228 cat ${PKITSDIR}/cmdout.txt
230 if [ "$RET" -eq 0 ]; then
231 html_failed "${VFY_ACTION} ($RET) "
232 pkits_log "ERROR: ${VFY_ACTION} failed $RET"
233 else
234 html_passed "${VFY_ACTION} ($RET) "
235 pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
236 fi
237 fi
238 return $RET
239 }
241 ################################ certImport #############################
242 # local shell function to import a Cert, calls certutil -A, writes
243 # action and options to stdout
244 ########################################################################
245 certImport()
246 {
247 echo "certutil -d $PKITSdb -A -t \",,\" -n $* -i $certs/$*.crt"
248 ${BINDIR}/certutil -d $PKITSdb -A -t ",," -n $* -i $certs/$*.crt > ${PKITSDIR}/cmdout.txt 2>&1
249 RET=$?
250 cat ${PKITSDIR}/cmdout.txt
252 if [ "$RET" -ne 0 ]; then
253 html_failed "${VFY_ACTION} ($RET) "
254 pkits_log "ERROR: ${VFY_ACTION} failed $RET"
255 fi
256 }
258 ################################ certImportn #############################
259 # local shell function to import an incorrect Cert, calls certutil -A,
260 # writes action and options to stdout
261 ########################################################################
262 certImportn()
263 {
264 RET=0
265 if [ -z "$NSS_NO_PKITS_CRLS" ]; then
266 echo "certutil -d $PKITSdb -A -t \",,\" -n $* -i $certs/$*.crt"
267 ${BINDIR}/certutil -d $PKITSdb -A -t ",," -n $* -i $certs/$*.crt > ${PKITSDIR}/cmdout.txt 2>&1
268 RET=$?
269 cat ${PKITSDIR}/cmdout.txt
271 if [ "$RET" -eq 0 ]; then
272 html_failed "${VFY_ACTION} ($RET) "
273 pkits_log "ERROR: ${VFY_ACTION} failed $RET"
274 else
275 html_passed "${VFY_ACTION} ($RET) "
276 pkits_log "SUCCESS: ${VFY_ACTION} returned as expected $RET"
277 fi
278 fi
279 }
281 ############################## pkits_tests_bySection ###################
282 # running the various PKITS tests
283 ########################################################################
284 pkits_SignatureVerification()
285 {
286 start_table "NIST PKITS Section 4.1: Signature Verification"
288 VFY_ACTION="Valid Signatures Test1"; log_banner
289 certImport GoodCACert
290 crlImport GoodCACRL.crl
291 pkits $certs/ValidCertificatePathTest1EE.crt $certs/GoodCACert.crt
292 restore_db
294 VFY_ACTION="Invalid CA Signature Test2"; log_banner
295 certImport BadSignedCACert
296 crlImport BadSignedCACRL.crl
297 pkitsn $certs/InvalidCASignatureTest2EE.crt \
298 $certs/BadSignedCACert.crt
299 restore_db
301 VFY_ACTION="Invalid EE Signature Test3"; log_banner
302 certImport GoodCACert
303 crlImport GoodCACRL.crl
304 pkitsn $certs/InvalidEESignatureTest3EE.crt $certs/GoodCACert.crt
305 restore_db
307 VFY_ACTION="Valid DSA Signatures Test4"; log_banner
308 certImport DSACACert
309 crlImport DSACACRL.crl
310 pkits $certs/ValidDSASignaturesTest4EE.crt $certs/DSACACert.crt
311 restore_db
313 VFY_ACTION="Valid DSA Parameter Inheritance Test5"; log_banner
314 certImport DSACACert
315 crlImport DSACACRL.crl
316 certImport DSAParametersInheritedCACert
317 crlImport DSAParametersInheritedCACRL.crl
318 pkits $certs/ValidDSAParameterInheritanceTest5EE.crt \
319 $certs/DSAParametersInheritedCACert.crt \
320 $certs/DSACACert.crt
321 restore_db
323 VFY_ACTION="Invalid DSA Signature Test6"; log_banner
324 certImport DSACACert
325 crlImport DSACACRL.crl
326 pkitsn $certs/InvalidDSASignatureTest6EE.crt $certs/DSACACert.crt
327 restore_db
328 }
330 pkits_ValidityPeriods()
331 {
332 break_table "NIST PKITS Section 4.2: Validity Periods"
334 VFY_ACTION="Invalid CA notBefore Date Test1"; log_banner
335 certImport BadnotBeforeDateCACert
336 crlImportn BadnotBeforeDateCACRL.crl
337 if [ $RET -eq 0 ] ; then
338 pkitsn $certs/InvalidCAnotBeforeDateTest1EE.crt \
339 $certs/BadnotBeforeDateCACert.crt
340 fi
341 restore_db
343 VFY_ACTION="Invalid EE notBefore Date Test2"; log_banner
344 certImport GoodCACert
345 crlImport GoodCACRL.crl
346 pkitsn $certs/InvalidEEnotBeforeDateTest2EE.crt \
347 $certs/GoodCACert.crt
348 restore_db
350 VFY_ACTION="Valid pre2000 UTC notBefore Date Test3"; log_banner
351 certImport GoodCACert
352 crlImport GoodCACRL.crl
353 pkits $certs/Validpre2000UTCnotBeforeDateTest3EE.crt \
354 $certs/GoodCACert.crt
355 restore_db
357 VFY_ACTION="Valid GeneralizedTime notBefore Date Test4"; log_banner
358 certImport GoodCACert
359 crlImport GoodCACRL.crl
360 pkits $certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt \
361 $certs/GoodCACert.crt
362 restore_db
364 VFY_ACTION="Invalid CA notAfter Date Test5"; log_banner
365 certImport BadnotAfterDateCACert
366 crlImportn BadnotAfterDateCACRL.crl
367 if [ $RET -eq 0 ] ; then
368 pkitsn $certs/InvalidCAnotAfterDateTest5EE.crt \
369 $certs/BadnotAfterDateCACert.crt
370 fi
371 restore_db
373 VFY_ACTION="Invalid EE notAfter Date Test6"; log_banner
374 certImport GoodCACert
375 crlImport GoodCACRL.crl
376 pkitsn $certs/InvalidEEnotAfterDateTest6EE.crt \
377 $certs/GoodCACert.crt
378 restore_db
380 VFY_ACTION="Invalid pre2000 UTC EE notAfter Date Test7"; log_banner
381 certImport GoodCACert
382 crlImport GoodCACRL.crl
383 pkitsn $certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt \
384 $certs/GoodCACert.crt
385 restore_db
387 VFY_ACTION="ValidGeneralizedTime notAfter Date Test8"; log_banner
388 certImport GoodCACert
389 crlImport GoodCACRL.crl
390 pkits $certs/ValidGeneralizedTimenotAfterDateTest8EE.crt \
391 $certs/GoodCACert.crt
392 restore_db
393 }
395 pkits_NameChaining()
396 {
397 break_table "NIST PKITS Section 4.3: Verifying NameChaining"
399 VFY_ACTION="Invalid Name Chaining EE Test1"; log_banner
400 certImport GoodCACert
401 crlImport GoodCACRL.crl
402 pkitsn $certs/InvalidNameChainingTest1EE.crt \
403 $certs/GoodCACert.crt
404 restore_db
406 VFY_ACTION="Invalid Name Chaining Order Test2"; log_banner
407 certImport NameOrderingCACert
408 crlImport NameOrderCACRL.crl
409 pkitsn $certs/InvalidNameChainingOrderTest2EE.crt \
410 $certs/NameOrderingCACert.crt
411 restore_db
413 ### bug 216123 ###
414 if [ -n "${KNOWN_BUG}" ]; then
415 VFY_ACTION="Valid Name Chaining Whitespace Test3"; log_banner
416 certImport GoodCACert
417 crlImport GoodCACRL.crl
418 pkits $certs/ValidNameChainingWhitespaceTest3EE.crt \
419 $certs/GoodCACert.crt
420 restore_db
422 VFY_ACTION="Valid Name Chaining Whitespace Test4"; log_banner
423 certImport GoodCACert
424 crlImport GoodCACRL.crl
425 pkits $certs/ValidNameChainingWhitespaceTest4EE.crt \
426 $certs/GoodCACert.crt
427 restore_db
429 VFY_ACTION="Valid Name Chaining Capitalization Test5"; log_banner
430 certImport GoodCACert
431 crlImport GoodCACRL.crl
432 pkits $certs/ValidNameChainingCapitalizationTest5EE.crt \
433 $certs/GoodCACert.crt
434 restore_db
435 fi
437 VFY_ACTION="Valid Name Chaining UIDs Test6"; log_banner
438 certImport UIDCACert
439 crlImport UIDCACRL.crl
440 pkits $certs/ValidNameUIDsTest6EE.crt $certs/UIDCACert.crt
441 restore_db
443 VFY_ACTION="Valid RFC3280 Mandatory Attribute Types Test7"; log_banner
444 certImport RFC3280MandatoryAttributeTypesCACert
445 crlImport RFC3280MandatoryAttributeTypesCACRL.crl
446 pkits $certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt \
447 $certs/RFC3280MandatoryAttributeTypesCACert.crt
448 restore_db
450 VFY_ACTION="Valid RFC3280 Optional Attribute Types Test8"; log_banner
451 certImport RFC3280OptionalAttributeTypesCACert
452 crlImport RFC3280OptionalAttributeTypesCACRL.crl
453 pkits $certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt \
454 $certs/RFC3280OptionalAttributeTypesCACert.crt
455 restore_db
457 VFY_ACTION="Valid UTF8String Encoded Names Test9"; log_banner
458 certImport UTF8StringEncodedNamesCACert
459 crlImport UTF8StringEncodedNamesCACRL.crl
460 pkits $certs/ValidUTF8StringEncodedNamesTest9EE.crt \
461 $certs/UTF8StringEncodedNamesCACert.crt
462 restore_db
464 ### bug 216123 ###
465 if [ -n "${KNOWN_BUG}" ]; then
466 VFY_ACTION="Valid Rollover from PrintableString to UTF8String Test10"; log_banner
467 certImport RolloverfromPrintableStringtoUTF8StringCACert
468 crlImport RolloverfromPrintableStringtoUTF8StringCACRL.crl
469 pkits $certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt \
470 $certs/RolloverfromPrintableStringtoUTF8StringCACert.crt
471 restore_db
473 VFY_ACTION="Valid UTF8String case Insensitive Match Test11"; log_banner
474 certImport UTF8StringCaseInsensitiveMatchCACert
475 crlImport UTF8StringCaseInsensitiveMatchCACRL.crl
476 pkits $certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt \
477 $certs/UTF8StringCaseInsensitiveMatchCACert.crt
478 restore_db
479 fi
480 }
482 pkits_BasicCertRevocation()
483 {
484 break_table "NIST PKITS Section 4.4: Basic Certificate Revocation Tests"
486 ### bug 414556 ###
487 if [ -n "${KNOWN_BUG}" ]; then
488 VFY_ACTION="Missing CRL Test1"; log_banner
489 pkitsn $certs/InvalidMissingCRLTest1EE.crt \
490 $certs/NoCRLCACert.crt
491 fi
493 VFY_ACTION="Invalid Revoked CA Test2"; log_banner
494 certImport RevokedsubCACert
495 crlImport RevokedsubCACRL.crl
496 certImport GoodCACert
497 crlImport GoodCACRL.crl
498 pkitsn $certs/InvalidRevokedCATest2EE.crt \
499 $certs/RevokedsubCACert.crt $certs/GoodCACert.crt
500 restore_db
502 VFY_ACTION="Invalid Revoked EE Test3"; log_banner
503 certImport GoodCACert
504 crlImport GoodCACRL.crl
505 pkitsn $certs/InvalidRevokedEETest3EE.crt \
506 $certs/GoodCACert.crt
507 restore_db
509 VFY_ACTION="Invalid Bad CRL Signature Test4"; log_banner
510 certImport BadCRLSignatureCACert
511 crlImportn BadCRLSignatureCACRL.crl
512 if [ $RET -eq 0 ] ; then
513 pkitsn $certs/InvalidBadCRLSignatureTest4EE.crt \
514 $certs/BadCRLSignatureCACert.crt
515 fi
516 restore_db
518 VFY_ACTION="Invalid Bad CRL Issuer Name Test5"; log_banner
519 certImport BadCRLIssuerNameCACert
520 crlImportn BadCRLIssuerNameCACRL.crl
521 if [ $RET -eq 0 ] ; then
522 pkitsn $certs/InvalidBadCRLIssuerNameTest5EE.crt \
523 $certs/BadCRLIssuerNameCACert.crt
524 fi
525 restore_db
527 ### bug 414556 ###
528 if [ -n "${KNOWN_BUG}" ]; then
529 VFY_ACTION="Invalid Wrong CRL Test6"; log_banner
530 certImport WrongCRLCACert
531 crlImport WrongCRLCACRL.crl
532 pkitsn $certs/InvalidWrongCRLTest6EE.crt \
533 $certs/WrongCRLCACert.crt
534 restore_db
535 fi
537 VFY_ACTION="Valid Two CRLs Test7"; log_banner
538 certImport TwoCRLsCACert
539 crlImport TwoCRLsCAGoodCRL.crl
540 crlImportn TwoCRLsCABadCRL.crl
541 pkits $certs/ValidTwoCRLsTest7EE.crt \
542 $certs/TwoCRLsCACert.crt
543 restore_db
545 VFY_ACTION="Invalid Unknown CRL Entry Extension Test8"; log_banner
546 certImport UnknownCRLEntryExtensionCACert
547 crlImportn UnknownCRLEntryExtensionCACRL.crl
548 if [ $RET -eq 0 ] ; then
549 pkitsn $certs/InvalidUnknownCRLEntryExtensionTest8EE.crt \
550 $certs/UnknownCRLEntryExtensionCACert.crt
551 fi
552 restore_db
554 VFY_ACTION="Invalid Unknown CRL Extension Test9"; log_banner
555 certImport UnknownCRLExtensionCACert
556 crlImportn UnknownCRLExtensionCACRL.crl
557 if [ $RET -eq 0 ] ; then
558 pkitsn $certs/InvalidUnknownCRLExtensionTest9EE.crt \
559 $certs/UnknownCRLExtensionCACert.crt
560 fi
561 restore_db
563 VFY_ACTION="Invalid Unknown CRL Extension Test10"; log_banner
564 certImport UnknownCRLExtensionCACert
565 crlImportn UnknownCRLExtensionCACRL.crl
566 if [ $RET -eq 0 ] ; then
567 pkitsn $certs/InvalidUnknownCRLExtensionTest10EE.crt \
568 $certs/UnknownCRLExtensionCACert.crt
569 fi
570 restore_db
572 ### bug 414563 ###
573 if [ -n "${KNOWN_BUG}" ]; then
574 VFY_ACTION="Invalid Old CRL nextUpdate Test11"; log_banner
575 certImport OldCRLnextUpdateCACert
576 crlImport OldCRLnextUpdateCACRL.crl
577 pkitsn $certs/InvalidOldCRLnextUpdateTest11EE.crt \
578 $certs/OldCRLnextUpdateCACert.crt
579 restore_db
581 VFY_ACTION="Invalid pre2000 CRL nextUpdate Test12"; log_banner
582 certImport pre2000CRLnextUpdateCACert
583 crlImport pre2000CRLnextUpdateCACRL.crl
584 pkitsn $certs/Invalidpre2000CRLnextUpdateTest12EE.crt \
585 $certs/pre2000CRLnextUpdateCACert.crt
586 restore_db
587 fi
589 VFY_ACTION="Valid GeneralizedTime CRL nextUpdate Test13"; log_banner
590 certImport GeneralizedTimeCRLnextUpdateCACert
591 crlImport GeneralizedTimeCRLnextUpdateCACRL.crl
592 pkits $certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt \
593 $certs/GeneralizedTimeCRLnextUpdateCACert.crt
594 restore_db
596 VFY_ACTION="Valid Negative Serial Number Test14"; log_banner
597 certImport NegativeSerialNumberCACert
598 crlImport NegativeSerialNumberCACRL.crl
599 pkits $certs/ValidNegativeSerialNumberTest14EE.crt \
600 $certs/NegativeSerialNumberCACert.crt
601 restore_db
603 VFY_ACTION="Invalid Negative Serial Number Test15"; log_banner
604 certImport NegativeSerialNumberCACert
605 crlImport NegativeSerialNumberCACRL.crl
606 pkitsn $certs/InvalidNegativeSerialNumberTest15EE.crt \
607 $certs/NegativeSerialNumberCACert.crt
608 restore_db
610 VFY_ACTION="Valid Long Serial Number Test16"; log_banner
611 certImport LongSerialNumberCACert
612 crlImport LongSerialNumberCACRL.crl
613 pkits $certs/ValidLongSerialNumberTest16EE.crt \
614 $certs/LongSerialNumberCACert.crt
615 restore_db
617 VFY_ACTION="Valid Long Serial Number Test17"; log_banner
618 certImport LongSerialNumberCACert
619 crlImport LongSerialNumberCACRL.crl
620 pkits $certs/ValidLongSerialNumberTest17EE.crt \
621 $certs/LongSerialNumberCACert.crt
622 restore_db
624 VFY_ACTION="Invalid Long Serial Number Test18"; log_banner
625 certImport LongSerialNumberCACert
626 crlImport LongSerialNumberCACRL.crl
627 pkitsn $certs/InvalidLongSerialNumberTest18EE.crt \
628 $certs/LongSerialNumberCACert.crt
629 restore_db
631 ### bug 232737 ###
632 if [ -n "${KNOWN_BUG}" ]; then
633 VFY_ACTION="Valid Separate Certificate and CRL Keys Test19"; log_banner
634 certImport SeparateCertificateandCRLKeysCertificateSigningCACert
635 certImport SeparateCertificateandCRLKeysCRLSigningCert
636 crlImport SeparateCertificateandCRLKeysCRL.crl
637 pkits $certs/ValidSeparateCertificateandCRLKeysTest19EE.crt \
638 $certs/SeparateCertificateandCRLKeysCRLSigningCert.crt
639 restore_db
641 VFY_ACTION="Invalid Separate Certificate and CRL Keys Test20"; log_banner
642 certImport SeparateCertificateandCRLKeysCertificateSigningCACert
643 certImport SeparateCertificateandCRLKeysCRLSigningCert
644 crlImport SeparateCertificateandCRLKeysCRL.crl
645 pkits $certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt \
646 $certs/SeparateCertificateandCRLKeysCRLSigningCert.crt
647 restore_db
649 VFY_ACTION="Invalid Separate Certificate and CRL Keys Test21"; log_banner
650 certImport SeparateCertificateandCRLKeysCA2CertificateSigningCACert
651 certImport SeparateCertificateandCRLKeysCA2CRLSigningCert
652 crlImport SeparateCertificateandCRLKeysCA2CRL.crl
653 pkits $certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt \
654 $certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt
655 restore_db
656 fi
657 }
659 pkits_PathVerificWithSelfIssuedCerts()
660 {
661 break_table "NIST PKITS Section 4.5: Self-Issued Certificates"
663 ### bug 232737 ###
664 if [ -n "${KNOWN_BUG}" ]; then
665 VFY_ACTION="Valid Basic Self-Issued Old With New Test1"; log_banner
666 certImport BasicSelfIssuedNewKeyCACert
667 crlImport BasicSelfIssuedNewKeyCACRL.crl
668 pkits $certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt \
669 $certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt \
670 $certs/BasicSelfIssuedNewKeyCACert.crt
671 restore_db
673 VFY_ACTION="Invalid Basic Self-Issued Old With New Test2"; log_banner
674 certImport BasicSelfIssuedNewKeyCACert
675 crlImport BasicSelfIssuedNewKeyCACRL.crl
676 pkitsn $certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt \
677 $certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt \
678 $certs/BasicSelfIssuedNewKeyCACert.crt
679 restore_db
680 fi
682 ### bugs 321755 & 418769 ###
683 if [ -n "${KNOWN_BUG}" ]; then
684 VFY_ACTION="Valid Basic Self-Issued New With Old Test3"; log_banner
685 certImport BasicSelfIssuedOldKeyCACert
686 crlImport BasicSelfIssuedOldKeyCACRL.crl
687 pkits $certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt \
688 $certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt \
689 $certs/BasicSelfIssuedOldKeyCACert.crt
690 restore_db
692 VFY_ACTION="Valid Basic Self-Issued New With Old Test4"; log_banner
693 certImport BasicSelfIssuedOldKeyCACert
694 crlImport BasicSelfIssuedOldKeyCACRL.crl
695 pkits $certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt \
696 $certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt \
697 $certs/BasicSelfIssuedOldKeyCACert.crt
698 restore_db
700 VFY_ACTION="Invalid Basic Self-Issued New With Old Test5"; log_banner
701 certImport BasicSelfIssuedOldKeyCACert
702 crlImport BasicSelfIssuedOldKeyCACRL.crl
703 pkitsn $certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt \
704 $certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt \
705 $certs/BasicSelfIssuedOldKeyCACert.crt
706 restore_db
708 VFY_ACTION="Valid Basic Self-Issued CRL Signing Key Test6"; log_banner
709 certImport BasicSelfIssuedCRLSigningKeyCACert
710 crlImport BasicSelfIssuedOldKeyCACRL.crl
711 pkits $certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt \
712 $certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt \
713 $certs/BasicSelfIssuedCRLSigningKeyCACert.crt
714 restore_db
716 VFY_ACTION="Invalid Basic Self-Issued CRL Signing Key Test7"; log_banner
717 certImport BasicSelfIssuedCRLSigningKeyCACert
718 crlImport BasicSelfIssuedOldKeyCACRL.crl
719 pkitsn $certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt \
720 $certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt \
721 $certs/BasicSelfIssuedCRLSigningKeyCACert.crt
722 restore_db
724 VFY_ACTION="Invalid Basic Self-Issued CRL Signing Key Test8"; log_banner
725 certImport BasicSelfIssuedCRLSigningKeyCACert
726 crlImport BasicSelfIssuedOldKeyCACRL.crl
727 pkitsn $certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt \
728 $certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt \
729 $certs/BasicSelfIssuedCRLSigningKeyCACert.crt
730 restore_db
731 fi
732 }
734 pkits_BasicConstraints()
735 {
736 break_table "NIST PKITS Section 4.6: Verifying Basic Constraints"
738 VFY_ACTION="Invalid Missing basicConstraints Test1"; log_banner
739 certImport MissingbasicConstraintsCACert
740 crlImport MissingbasicConstraintsCACRL.crl
741 pkitsn $certs/InvalidMissingbasicConstraintsTest1EE.crt \
742 $certs/MissingbasicConstraintsCACert.crt
743 restore_db
745 VFY_ACTION="Invalid cA False Test2"; log_banner
746 certImport basicConstraintsCriticalcAFalseCACert
747 crlImport basicConstraintsCriticalcAFalseCACRL.crl
748 pkitsn $certs/InvalidcAFalseTest2EE.crt \
749 $certs/basicConstraintsCriticalcAFalseCACert.crt
750 restore_db
752 VFY_ACTION="Invalid cA False Test3"; log_banner
753 certImport basicConstraintsNotCriticalcAFalseCACert
754 crlImport basicConstraintsNotCriticalcAFalseCACRL.crl
755 pkitsn $certs/InvalidcAFalseTest3EE.crt \
756 $certs/basicConstraintsNotCriticalcAFalseCACert.crt
757 restore_db
759 VFY_ACTION="Valid basicConstraints Not Critical Test4"; log_banner
760 certImport basicConstraintsNotCriticalCACert
761 crlImport basicConstraintsNotCriticalCACRL.crl
762 pkits $certs/ValidbasicConstraintsNotCriticalTest4EE.crt \
763 $certs/basicConstraintsNotCriticalCACert.crt
764 restore_db
766 VFY_ACTION="Invalid pathLenConstraint Test5"; log_banner
767 certImport pathLenConstraint0CACert
768 crlImport pathLenConstraint0CACRL.crl
769 certImport pathLenConstraint0subCACert
770 crlImport pathLenConstraint0subCACRL.crl
771 pkitsn $certs/InvalidpathLenConstraintTest5EE.crt \
772 $certs/pathLenConstraint0subCACert.crt \
773 $certs/pathLenConstraint0CACert.crt
774 restore_db
776 VFY_ACTION="Invalid pathLenConstraint Test6"; log_banner
777 certImport pathLenConstraint0CACert
778 crlImport pathLenConstraint0CACRL.crl
779 certImport pathLenConstraint0subCACert
780 crlImport pathLenConstraint0subCACRL.crl
781 pkitsn $certs/InvalidpathLenConstraintTest6EE.crt \
782 $certs/pathLenConstraint0subCACert.crt \
783 $certs/pathLenConstraint0CACert.crt
784 restore_db
786 VFY_ACTION="Valid pathLenConstraint Test7"; log_banner
787 certImport pathLenConstraint0CACert
788 crlImport pathLenConstraint0CACRL.crl
789 pkits $certs/ValidpathLenConstraintTest7EE.crt \
790 $certs/pathLenConstraint0CACert.crt
791 restore_db
793 VFY_ACTION="Valid pathLenConstraint test8"; log_banner
794 certImport pathLenConstraint0CACert
795 crlImport pathLenConstraint0CACRL.crl
796 pkits $certs/ValidpathLenConstraintTest8EE.crt \
797 $certs/pathLenConstraint0CACert.crt
798 restore_db
800 VFY_ACTION="Invalid pathLenConstraint Test9"; log_banner
801 certImport pathLenConstraint6CACert
802 crlImport pathLenConstraint6CACRL.crl
803 certImport pathLenConstraint6subCA0Cert
804 crlImport pathLenConstraint6subCA0CRL.crl
805 certImport pathLenConstraint6subsubCA00Cert
806 crlImport pathLenConstraint6subsubCA00CRL.crl
807 pkitsn $certs/InvalidpathLenConstraintTest9EE.crt \
808 $certs/pathLenConstraint6subsubCA00Cert.crt \
809 $certs/pathLenConstraint6subCA0Cert.crt \
810 $certs/pathLenConstraint6CACert.crt
811 restore_db
813 VFY_ACTION="Invalid pathLenConstraint Test10"; log_banner
814 certImport pathLenConstraint6CACert
815 crlImport pathLenConstraint6CACRL.crl
816 certImport pathLenConstraint6subCA0Cert
817 crlImport pathLenConstraint6subCA0CRL.crl
818 certImport pathLenConstraint6subsubCA00Cert
819 crlImport pathLenConstraint6subsubCA00CRL.crl
820 pkitsn $certs/InvalidpathLenConstraintTest10EE.crt \
821 $certs/pathLenConstraint6subsubCA00Cert.crt \
822 $certs/pathLenConstraint6subCA0Cert.crt \
823 $certs/pathLenConstraint6CACert.crt
824 restore_db
826 VFY_ACTION="Invalid pathLenConstraint Test11"; log_banner
827 certImport pathLenConstraint6CACert
828 crlImport pathLenConstraint6CACRL.crl
829 certImport pathLenConstraint6subCA1Cert
830 crlImport pathLenConstraint6subCA1CRL.crl
831 certImport pathLenConstraint6subsubCA11Cert
832 crlImport pathLenConstraint6subsubCA11CRL.crl
833 certImport pathLenConstraint6subsubsubCA11XCert
834 crlImport pathLenConstraint6subsubsubCA11XCRL.crl
835 pkitsn $certs/InvalidpathLenConstraintTest11EE.crt \
836 $certs/pathLenConstraint6subsubsubCA11XCert.crt \
837 $certs/pathLenConstraint6subsubCA11Cert.crt \
838 $certs/pathLenConstraint6subCA1Cert.crt \
839 $certs/pathLenConstraint6CACert.crt
840 restore_db
842 VFY_ACTION="Invalid pathLenConstraint test12"; log_banner
843 certImport pathLenConstraint6CACert
844 crlImport pathLenConstraint6CACRL.crl
845 certImport pathLenConstraint6subCA1Cert
846 crlImport pathLenConstraint6subCA1CRL.crl
847 certImport pathLenConstraint6subsubCA11Cert
848 crlImport pathLenConstraint6subsubCA11CRL.crl
849 certImport pathLenConstraint6subsubsubCA11XCert
850 crlImport pathLenConstraint6subsubsubCA11XCRL.crl
851 pkitsn $certs/InvalidpathLenConstraintTest12EE.crt \
852 $certs/pathLenConstraint6subsubsubCA11XCert.crt \
853 $certs/pathLenConstraint6subsubCA11Cert.crt \
854 $certs/pathLenConstraint6subCA1Cert.crt \
855 $certs/pathLenConstraint6CACert.crt
856 restore_db
858 VFY_ACTION="Valid pathLenConstraint Test13"; log_banner
859 certImport pathLenConstraint6CACert
860 crlImport pathLenConstraint6CACRL.crl
861 certImport pathLenConstraint6subCA4Cert
862 crlImport pathLenConstraint6subCA4CRL.crl
863 certImport pathLenConstraint6subsubCA41Cert
864 crlImport pathLenConstraint6subsubCA41CRL.crl
865 certImport pathLenConstraint6subsubsubCA41XCert
866 crlImport pathLenConstraint6subsubsubCA41XCRL.crl
867 pkits $certs/ValidpathLenConstraintTest13EE.crt \
868 $certs/pathLenConstraint6subsubsubCA41XCert.crt \
869 $certs/pathLenConstraint6subsubCA41Cert.crt \
870 $certs/pathLenConstraint6subCA4Cert.crt \
871 $certs/pathLenConstraint6CACert.crt
872 restore_db
874 VFY_ACTION="Valid pathLenConstraint Test14"; log_banner
875 certImport pathLenConstraint6CACert
876 crlImport pathLenConstraint6CACRL.crl
877 certImport pathLenConstraint6subCA4Cert
878 crlImport pathLenConstraint6subCA4CRL.crl
879 certImport pathLenConstraint6subsubCA41Cert
880 crlImport pathLenConstraint6subsubCA41CRL.crl
881 certImport pathLenConstraint6subsubsubCA41XCert
882 crlImport pathLenConstraint6subsubsubCA41XCRL.crl
883 pkits $certs/ValidpathLenConstraintTest14EE.crt \
884 $certs/pathLenConstraint6subsubsubCA41XCert.crt \
885 $certs/pathLenConstraint6subsubCA41Cert.crt \
886 $certs/pathLenConstraint6subCA4Cert.crt \
887 $certs/pathLenConstraint6CACert.crt
888 restore_db
890 ### bug 232737 ###
891 if [ -n "${KNOWN_BUG}" ]; then
892 VFY_ACTION="Valid Self-Issued pathLenConstraint Test15"; log_banner
893 certImport pathLenConstraint0CACert
894 crlImport pathLenConstraint0CACRL.crl
895 pkits $certs/ValidSelfIssuedpathLenConstraintTest15EE.crt \
896 $certs/pathLenConstraint0SelfIssuedCACert.crt \
897 $certs/pathLenConstraint0CACert.crt
898 restore_db
899 fi
901 VFY_ACTION="Invalid Self-Issued pathLenConstraint Test16"; log_banner
902 certImport pathLenConstraint0CACert
903 crlImport pathLenConstraint0CACRL.crl
904 certImport pathLenConstraint0subCA2Cert
905 crlImport pathLenConstraint0subCA2CRL.crl
906 pkitsn $certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt \
907 $certs/pathLenConstraint0subCA2Cert.crt \
908 $certs/pathLenConstraint0SelfIssuedCACert.crt \
909 $certs/pathLenConstraint0CACert.crt
910 restore_db
912 ### bug 232737 ###
913 if [ -n "${KNOWN_BUG}" ]; then
914 VFY_ACTION="Valid Self-Issued pathLenConstraint Test17"; log_banner
915 certImport pathLenConstraint1CACert
916 crlImport pathLenConstraint1CACRL.crl
917 certImport pathLenConstraint1subCACert
918 crlImport pathLenConstraint1subCACRL.crl
919 pkits $certs/ValidSelfIssuedpathLenConstraintTest17EE.crt \
920 $certs/pathLenConstraint1SelfIssuedsubCACert.crt \
921 $certs/pathLenConstraint1subCACert.crt \
922 $certs/pathLenConstraint1SelfIssuedCACert.crt \
923 $certs/pathLenConstraint1CACert.crt
924 restore_db
925 fi
926 }
928 pkits_KeyUsage()
929 {
930 break_table "NIST PKITS Section 4.7: Key Usage"
932 VFY_ACTION="Invalid keyUsage Critical keyCertSign False Test1"; log_banner
933 certImport keyUsageCriticalkeyCertSignFalseCACert
934 crlImport keyUsageCriticalkeyCertSignFalseCACRL.crl
935 pkitsn $certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt \
936 $certs/keyUsageCriticalkeyCertSignFalseCACert.crt
937 restore_db
939 VFY_ACTION="Invalid keyUsage Not Critical keyCertSign False Test2"; log_banner
940 certImport keyUsageNotCriticalkeyCertSignFalseCACert
941 crlImport keyUsageNotCriticalkeyCertSignFalseCACRL.crl
942 pkitsn $certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt \
943 $certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
944 restore_db
946 VFY_ACTION="Valid keyUsage Not Critical Test3"; log_banner
947 certImport keyUsageNotCriticalCACert
948 crlImport keyUsageNotCriticalCACRL.crl
949 pkits $certs/ValidkeyUsageNotCriticalTest3EE.crt \
950 $certs/keyUsageNotCriticalCACert.crt
951 restore_db
953 VFY_ACTION="Invalid keyUsage Critical cRLSign False Test4"; log_banner
954 certImport keyUsageCriticalcRLSignFalseCACert
955 crlImportn keyUsageCriticalcRLSignFalseCACRL.crl
956 if [ $RET -eq 0 ] ; then
957 pkitsn $certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt \
958 $certs/keyUsageCriticalcRLSignFalseCACert.crt
959 fi
960 restore_db
962 VFY_ACTION="Invalid keyUsage Not Critical cRLSign False Test5"; log_banner
963 certImport keyUsageNotCriticalcRLSignFalseCACert
964 crlImportn keyUsageNotCriticalcRLSignFalseCACRL.crl
965 if [ $RET -eq 0 ] ; then
966 pkitsn $certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt \
967 $certs/keyUsageNotCriticalcRLSignFalseCACert.crt
968 fi
969 restore_db
970 }
972 pkits_CertificatePolicies()
973 {
974 break_table "NIST PKITS Section 4.8: Certificate Policies"
976 VFY_ACTION="All Certificates Same Policy Test1"; log_banner
977 certImport GoodCACert
978 crlImport GoodCACRL.crl
979 pkits $certs/ValidCertificatePathTest1EE.crt \
980 $certs/GoodCACert.crt
981 restore_db
983 VFY_ACTION="All Certificates No Policies Test2"; log_banner
984 certImport NoPoliciesCACert
985 crlImport NoPoliciesCACRL.crl
986 pkits $certs/AllCertificatesNoPoliciesTest2EE.crt \
987 $certs/NoPoliciesCACert.crt
988 restore_db
990 VFY_ACTION="Different Policies Test3"; log_banner
991 certImport GoodCACert
992 crlImport GoodCACRL.crl
993 certImport PoliciesP2subCACert
994 crlImport PoliciesP2subCACRL.crl
995 pkits $certs/DifferentPoliciesTest3EE.crt \
996 $certs/PoliciesP2subCACert.crt \
997 $certs/GoodCACert.crt
998 restore_db
1000 VFY_ACTION="Different Policies Test4"; log_banner
1001 certImport GoodCACert
1002 crlImport GoodCACRL.crl
1003 certImport GoodsubCACert
1004 crlImport GoodsubCACRL.crl
1005 pkits $certs/DifferentPoliciesTest4EE.crt \
1006 $certs/GoodsubCACert.crt \
1007 $certs/GoodCACert.crt
1008 restore_db
1010 VFY_ACTION="Different Policies Test5"; log_banner
1011 certImport GoodCACert
1012 crlImport GoodCACRL.crl
1013 certImport PoliciesP2subCA2Cert
1014 crlImport PoliciesP2subCA2CRL.crl
1015 pkits $certs/DifferentPoliciesTest5EE.crt \
1016 $certs/PoliciesP2subCA2Cert.crt \
1017 $certs/GoodCACert.crt
1018 restore_db
1020 VFY_ACTION="Overlapping Policies Test6"; log_banner
1021 certImport PoliciesP1234CACert
1022 crlImport PoliciesP1234CACRL.crl
1023 certImport PoliciesP1234subCAP123Cert
1024 crlImport PoliciesP1234subCAP123CRL.crl
1025 certImport PoliciesP1234subsubCAP123P12Cert
1026 crlImport PoliciesP1234subsubCAP123P12CRL.crl
1027 pkits $certs/OverlappingPoliciesTest6EE.crt \
1028 $certs/PoliciesP1234subsubCAP123P12Cert.crt \
1029 $certs/PoliciesP1234subCAP123Cert.crt \
1030 $certs/PoliciesP1234CACert.crt
1031 restore_db
1033 VFY_ACTION="Different Policies Test7"; log_banner
1034 certImport PoliciesP123CACert
1035 crlImport PoliciesP123CACRL.crl
1036 certImport PoliciesP123subCAP12Cert
1037 crlImport PoliciesP123subCAP12CRL.crl
1038 certImport PoliciesP123subsubCAP12P1Cert
1039 crlImport PoliciesP123subsubCAP12P1CRL.crl
1040 pkits $certs/DifferentPoliciesTest7EE.crt \
1041 $certs/PoliciesP123subsubCAP12P1Cert.crt \
1042 $certs/PoliciesP123subCAP12Cert.crt \
1043 $certs/PoliciesP123CACert.crt
1044 restore_db
1046 VFY_ACTION="Different Policies Test8"; log_banner
1047 certImport PoliciesP12CACert
1048 crlImport PoliciesP12CACRL.crl
1049 certImport PoliciesP12subCAP1Cert
1050 crlImport PoliciesP12subCAP1CRL.crl
1051 certImport PoliciesP12subsubCAP1P2Cert
1052 crlImport PoliciesP12subsubCAP1P2CRL.crl
1053 pkits $certs/DifferentPoliciesTest8EE.crt \
1054 $certs/PoliciesP123subsubCAP12P1Cert.crt \
1055 $certs/PoliciesP12subCAP1Cert.crt \
1056 $certs/PoliciesP12CACert.crt
1057 restore_db
1059 VFY_ACTION="Different Policies Test9"; log_banner
1060 certImport PoliciesP123CACert
1061 crlImport PoliciesP123CACRL.crl
1062 certImport PoliciesP123subCAP12Cert
1063 crlImport PoliciesP123subCAP12CRL.crl
1064 certImport PoliciesP123subsubCAP12P2Cert
1065 crlImport PoliciesP123subsubCAP2P2CRL.crl
1066 certImport PoliciesP123subsubsubCAP12P2P1Cert
1067 crlImport PoliciesP123subsubsubCAP12P2P1CRL.crl
1068 pkits $certs/DifferentPoliciesTest9EE.crt \
1069 $certs/PoliciesP123subsubsubCAP12P2P1Cert.crt \
1070 $certs/PoliciesP123subsubCAP12P1Cert.crt \
1071 $certs/PoliciesP12subCAP1Cert.crt \
1072 $certs/PoliciesP12CACert.crt
1073 restore_db
1075 VFY_ACTION="All Certificates Same Policies Test10"; log_banner
1076 certImport PoliciesP12CACert
1077 crlImport PoliciesP12CACRL.crl
1078 pkits $certs/AllCertificatesSamePoliciesTest10EE.crt \
1079 $certs/NoPoliciesCACert.crt
1080 restore_db
1082 VFY_ACTION="All Certificates AnyPolicy Test11"; log_banner
1083 certImport anyPolicyCACert
1084 crlImport anyPolicyCACRL.crl
1085 pkits $certs/AllCertificatesanyPolicyTest11EE.crt \
1086 $certs/anyPolicyCACert.crt
1087 restore_db
1089 VFY_ACTION="Different Policies Test12"; log_banner
1090 certImport PoliciesP3CACert
1091 crlImport PoliciesP3CACRL.crl
1092 pkits $certs/DifferentPoliciesTest12EE.crt \
1093 $certs/PoliciesP3CACert.crt
1094 restore_db
1096 VFY_ACTION="All Certificates Same Policies Test13"; log_banner
1097 certImport PoliciesP123CACert
1098 crlImport PoliciesP123CACRL.crl
1099 pkits $certs/AllCertificatesSamePoliciesTest13EE.crt \
1100 $certs/PoliciesP123CACert.crt
1101 restore_db
1103 VFY_ACTION="AnyPolicy Test14"; log_banner
1104 certImport anyPolicyCACert
1105 crlImport anyPolicyCACRL.crl
1106 pkits $certs/AnyPolicyTest14EE.crt \
1107 $certs/anyPolicyCACert.crt
1108 restore_db
1110 VFY_ACTION="User Notice Qualifier Test15"; log_banner
1111 pkits $certs/UserNoticeQualifierTest15EE.crt
1113 VFY_ACTION="User Notice Qualifier Test16"; log_banner
1114 certImport GoodCACert
1115 crlImport GoodCACRL.crl
1116 pkits $certs/UserNoticeQualifierTest16EE.crt \
1117 $certs/GoodCACert.crt
1119 VFY_ACTION="User Notice Qualifier Test17"; log_banner
1120 certImport GoodCACert
1121 crlImport GoodCACRL.crl
1122 pkits $certs/UserNoticeQualifierTest17EE.crt \
1123 $certs/GoodCACert.crt
1124 restore_db
1126 VFY_ACTION="User Notice Qualifier Test18"; log_banner
1127 certImport PoliciesP12CACert
1128 crlImport PoliciesP12CACRL.crl
1129 pkits $certs/UserNoticeQualifierTest18EE.crt \
1130 $certs/PoliciesP12CACert.crt
1131 restore_db
1133 VFY_ACTION="User Notice Qualifier Test19"; log_banner
1134 pkits $certs/UserNoticeQualifierTest19EE.crt
1136 VFY_ACTION="CPS Pointer Qualifier Test20"; log_banner
1137 certImport GoodCACert
1138 crlImport GoodCACRL.crl
1139 pkits $certs/CPSPointerQualifierTest20EE.crt \
1140 $certs/GoodCACert.crt
1141 restore_db
1142 }
1144 pkits_RequireExplicitPolicy()
1145 {
1146 break_table "NIST PKITS Section 4.9: Require Explicit Policy"
1148 VFY_ACTION="Valid RequireExplicitPolicy Test1"; log_banner
1149 certImportn requireExplicitPolicy10CACert
1150 crlImportn requireExplicitPolicy10CACRL.crl
1151 certImport requireExplicitPolicy10subCACert
1152 crlImport requireExplicitPolicy10subCACRL.crl
1153 certImport requireExplicitPolicy10subsubCACert
1154 crlImport requireExplicitPolicy10subsubCACRL.crl
1155 certImport requireExplicitPolicy10subsubsubCACert
1156 crlImport requireExplicitPolicy10subsubsubCACRL.crl
1157 pkits $certs/ValidrequireExplicitPolicyTest1EE.crt \
1158 $certs/requireExplicitPolicy10subsubsubCACert.crt \
1159 $certs/requireExplicitPolicy10subsubCACert.crt \
1160 $certs/requireExplicitPolicy10subCACert.crt \
1161 $certs/requireExplicitPolicy10CACert.crt
1162 restore_db
1164 VFY_ACTION="Valid RequireExplicitPolicy Test2"; log_banner
1165 certImportn requireExplicitPolicy5CACert
1166 crlImportn requireExplicitPolicy5CACRL.crl
1167 certImport requireExplicitPolicy5subCACert
1168 crlImport requireExplicitPolicy5subCACRL.crl
1169 certImport requireExplicitPolicy5subsubCACert
1170 crlImport requireExplicitPolicy5subsubCACRL.crl
1171 certImport requireExplicitPolicy5subsubsubCACert
1172 crlImport requireExplicitPolicy5subsubsubCACRL.crl
1173 pkits $certs/ValidrequireExplicitPolicyTest2EE.crt \
1174 $certs/requireExplicitPolicy5subsubsubCACert.crt \
1175 $certs/requireExplicitPolicy5subsubCACert.crt \
1176 $certs/requireExplicitPolicy5subCACert.crt \
1177 $certs/requireExplicitPolicy5CACert.crt
1178 restore_db
1180 VFY_ACTION="Invalid RequireExplicitPolicy Test3"; log_banner
1181 certImportn requireExplicitPolicy4CACert
1182 crlImportn requireExplicitPolicy4CACRL.crl
1183 certImport requireExplicitPolicy4subCACert
1184 crlImport requireExplicitPolicy4subCACRL.crl
1185 certImport requireExplicitPolicy4subsubCACert
1186 crlImport requireExplicitPolicy4subsubCACRL.crl
1187 certImport requireExplicitPolicy4subsubsubCACert
1188 crlImport requireExplicitPolicy4subsubsubCACRL.crl
1189 pkitsn $certs/InvalidrequireExplicitPolicyTest3EE.crt \
1190 $certs/requireExplicitPolicy4subsubsubCACert.crt \
1191 $certs/requireExplicitPolicy4subsubCACert.crt \
1192 $certs/requireExplicitPolicy4subCACert.crt \
1193 $certs/requireExplicitPolicy4CACert.crt
1194 restore_db
1196 VFY_ACTION="Valid RequireExplicitPolicy Test4"; log_banner
1197 certImportn requireExplicitPolicy0CACert
1198 crlImportn requireExplicitPolicy0CACRL.crl
1199 certImport requireExplicitPolicy0subCACert
1200 crlImport requireExplicitPolicy0subCACRL.crl
1201 certImport requireExplicitPolicy0subsubCACert
1202 crlImport requireExplicitPolicy0subsubCACRL.crl
1203 certImport requireExplicitPolicy0subsubsubCACert
1204 crlImport requireExplicitPolicy0subsubsubCACRL.crl
1205 pkits $certs/ValidrequireExplicitPolicyTest4EE.crt \
1206 $certs/requireExplicitPolicy0subsubsubCACert.crt \
1207 $certs/requireExplicitPolicy0subsubCACert.crt \
1208 $certs/requireExplicitPolicy0subCACert.crt \
1209 $certs/requireExplicitPolicy0CACert.crt
1210 restore_db
1212 VFY_ACTION="Invalid RequireExplicitPolicy Test5"; log_banner
1213 certImportn requireExplicitPolicy7CACert
1214 crlImportn requireExplicitPolicy7CACRL.crl
1215 certImportn requireExplicitPolicy7subCARE2Cert
1216 crlImportn requireExplicitPolicy7subCARE2CRL.crl
1217 certImportn requireExplicitPolicy7subsubCARE2RE4Cert
1218 crlImportn requireExplicitPolicy7subsubCARE2RE4CRL.crl
1219 certImport requireExplicitPolicy7subsubsubCARE2RE4Cert
1220 crlImport requireExplicitPolicy7subsubsubCARE2RE4CRL.crl
1221 pkitsn $certs/InvalidrequireExplicitPolicyTest5EE.crt \
1222 $certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt \
1223 $certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt \
1224 $certs/requireExplicitPolicy7subCARE2Cert.crt \
1225 $certs/requireExplicitPolicy7CACert.crt
1226 restore_db
1228 VFY_ACTION="Valid Self-Issued RequireExplicitPolicy Test6"; log_banner
1229 certImportn requireExplicitPolicy2CACert
1230 crlImportn requireExplicitPolicy2CACRL.crl
1231 pkits $certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt \
1232 $certs/requireExplicitPolicy2SelfIssuedCACert.crt \
1233 $certs/requireExplicitPolicy2CACert.crt
1234 restore_db
1236 VFY_ACTION="Invalid Self-Issued RequireExplicitPolicy Test7"; log_banner
1237 certImportn requireExplicitPolicy2CACert
1238 crlImportn requireExplicitPolicy2CACRL.crl
1239 certImport requireExplicitPolicy2subCACert
1240 crlImport requireExplicitPolicy2subCACRL.crl
1241 pkitsn $certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt \
1242 $certs/requireExplicitPolicy2subCACert.crt \
1243 $certs/requireExplicitPolicy2SelfIssuedCACert.crt \
1244 $certs/requireExplicitPolicy2CACert.crt
1245 restore_db
1247 VFY_ACTION="Invalid Self-Issued RequireExplicitPolicy Test8"; log_banner
1248 certImportn requireExplicitPolicy2CACert
1249 crlImportn requireExplicitPolicy2CACRL.crl
1250 certImport requireExplicitPolicy2subCACert
1251 crlImport requireExplicitPolicy2subCACRL.crl
1252 pkitsn $certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt \
1253 $certs/requireExplicitPolicy2SelfIssuedsubCACert.crt \
1254 $certs/requireExplicitPolicy2subCACert.crt \
1255 $certs/requireExplicitPolicy2SelfIssuedCACert.crt \
1256 $certs/requireExplicitPolicy2CACert.crt
1257 restore_db
1258 }
1260 pkits_PolicyMappings()
1261 {
1262 break_table "NIST PKITS Section 4.10: Policy Mappings"
1264 VFY_ACTION="Valid Policy Mapping Test1"; log_banner
1265 certImportn Mapping1to2CACert
1266 crlImportn Mapping1to2CACRL.crl
1267 pkits $certs/ValidPolicyMappingTest1EE.crt \
1268 $certs/Mapping1to2CACert.crt
1269 restore_db
1271 VFY_ACTION="Invalid Policy Mapping Test2"; log_banner
1272 certImportn Mapping1to2CACert
1273 crlImportn Mapping1to2CACRL.crl
1274 pkitsn $certs/InvalidPolicyMappingTest2EE.crt \
1275 $certs/Mapping1to2CACert.crt
1276 restore_db
1278 VFY_ACTION="Valid Policy Mapping Test3"; log_banner
1279 certImportn P12Mapping1to3CACert
1280 crlImportn P12Mapping1to3CACRL.crl
1281 certImportn P12Mapping1to3subCACert
1282 crlImportn P12Mapping1to3subCACRL.crl
1283 certImportn P12Mapping1to3subsubCACert
1284 crlImportn P12Mapping1to3subsubCACRL.crl
1285 pkits $certs/ValidPolicyMappingTest3EE.crt \
1286 $certs/P12Mapping1to3subsubCACert.crt \
1287 $certs/P12Mapping1to3subCACert.crt \
1288 $certs/P12Mapping1to3CA.crt
1289 restore_db
1291 VFY_ACTION="Invalid Policy Mapping Test4"; log_banner
1292 certImportn P12Mapping1to3CACert
1293 crlImportn P12Mapping1to3CACRL.crl
1294 certImportn P12Mapping1to3subCACert
1295 crlImportn P12Mapping1to3subCACRL.crl
1296 certImportn P12Mapping1to3subsubCACert
1297 crlImportn P12Mapping1to3subsubCACRL.crl
1298 pkitsn $certs/InvalidPolicyMappingTest4EE.crt \
1299 $certs/P12Mapping1to3subsubCACert.crt \
1300 $certs/P12Mapping1to3subCACert.crt \
1301 $certs/P12Mapping1to3CA.crt
1302 restore_db
1304 VFY_ACTION="Valid Policy Mapping Test5"; log_banner
1305 certImportn P1Mapping1to234CACert
1306 crlImportn P1Mapping1to234CACRL.crl
1307 certImportn P1Mapping1to234subCACert
1308 crlImportn P1Mapping1to234subCACRL.crl
1309 pkits $certs/ValidPolicyMappingTest5EE.crt \
1310 $certs/P1Mapping1to234subCACert.crt \
1311 $certs/P1Mapping1to234CA.crt
1312 restore_db
1314 VFY_ACTION="Valid Policy Mapping Test6"; log_banner
1315 certImportn P1Mapping1to234CACert
1316 crlImportn P1Mapping1to234CACRL.crl
1317 certImportn P1Mapping1to234subCACert
1318 crlImportn P1Mapping1to234subCACRL.crl
1319 pkits $certs/ValidPolicyMappingTest6EE.crt \
1320 $certs/P1Mapping1to234subCACert.crt \
1321 $certs/P1Mapping1to234CA.crt
1322 restore_db
1324 VFY_ACTION="Invalid Mapping from anyPolicy Test7"; log_banner
1325 certImportn MappingFromanyPolicyCACert
1326 crlImportn MappingFromanyPolicyCACRL.crl
1327 pkitsn $certs/InvalidMappingFromanyPolicyTest7EE.crt \
1328 $certs/MappingFromanyPolicyCACert.crt
1329 restore_db
1331 VFY_ACTION="Invalid Mapping to anyPolicy Test8"; log_banner
1332 certImportn MappingToanyPolicyCACert
1333 crlImportn MappingToanyPolicyCACRL.crl
1334 pkitsn $certs/InvalidMappingToanyPolicyTest8EE.crt \
1335 $certs/MappingToanyPolicyCACert.crt
1336 restore_db
1338 VFY_ACTION="Valid Policy Mapping Test9"; log_banner
1339 certImport PanyPolicyMapping1to2CACert
1340 crlImport PanyPolicyMapping1to2CACRL.crl
1341 pkits $certs/ValidPolicyMappingTest9EE.crt \
1342 $certs/PanyPolicyMapping1to2CACert.crt
1343 restore_db
1345 VFY_ACTION="Invalid Policy Mapping Test10"; log_banner
1346 certImport GoodCACert
1347 crlImport GoodCACRL.crl
1348 certImportn GoodsubCAPanyPolicyMapping1to2CACert
1349 crlImportn GoodsubCAPanyPolicyMapping1to2CACRL.crl
1350 pkitsn $certs/InvalidPolicyMappingTest10EE.crt \
1351 $certs/GoodsubCAPanyPolicyMapping1to2CACert.crt \
1352 $certs/GoodCACert.crt
1353 restore_db
1355 VFY_ACTION="Valid Policy Mapping Test11"; log_banner
1356 certImport GoodCACert
1357 crlImport GoodCACRL.crl
1358 certImportn GoodsubCAPanyPolicyMapping1to2CACert
1359 crlImportn GoodsubCAPanyPolicyMapping1to2CACRL.crl
1360 pkits $certs/ValidPolicyMappingTest11EE.crt \
1361 $certs/GoodsubCAPanyPolicyMapping1to2CACert.crt \
1362 $certs/GoodCACert.crt
1363 restore_db
1365 VFY_ACTION="Valid Policy Mapping Test12"; log_banner
1366 certImportn P12Mapping1to3CACert
1367 crlImportn P12Mapping1to3CACRL.crl
1368 pkits $certs/ValidPolicyMappingTest12EE.crt \
1369 $certs/P12Mapping1to3CACert.crt
1370 restore_db
1372 VFY_ACTION="Valid Policy Mapping Test13"; log_banner
1373 certImportn P1anyPolicyMapping1to2CACert
1374 crlImportn P1anyPolicyMapping1to2CACRL.crl
1375 pkits $certs/ValidPolicyMappingTest13EE.crt \
1376 $certs/P1anyPolicyMapping1to2CACert.crt
1377 restore_db
1379 VFY_ACTION="Valid Policy Mapping Test14"; log_banner
1380 certImportn P1anyPolicyMapping1to2CACert
1381 crlImportn P1anyPolicyMapping1to2CACRL.crl
1382 pkits $certs/ValidPolicyMappingTest14EE.crt \
1383 $certs/P1anyPolicyMapping1to2CACert.crt
1384 restore_db
1385 }
1388 pkits_InhibitPolicyMapping()
1389 {
1390 break_table "NIST PKITS Section 4.11: Inhibit Policy Mapping"
1392 VFY_ACTION="Invalid inhibitPolicyMapping Test1"; log_banner
1393 certImportn inhibitPolicyMapping0CACert
1394 crlImportn inhibitPolicyMapping0CACRL.crl
1395 certImportn inhibitPolicyMapping0subCACert
1396 crlImportn inhibitPolicyMapping0subCACRL.crl
1397 pkitsn $certs/InvalidinhibitPolicyMappingTest1EE.crt \
1398 $certs/inhibitPolicyMapping0CACert.crt \
1399 $certs/inhibitPolicyMapping0subCACert.crt
1400 restore_db
1402 VFY_ACTION="Valid inhibitPolicyMapping Test2"; log_banner
1403 certImportn inhibitPolicyMapping1P12CACert
1404 crlImportn inhibitPolicyMapping1P12CACRL.crl
1405 certImportn inhibitPolicyMapping1P12subCACert
1406 crlImportn inhibitPolicyMapping1P12subCACRL.crl
1407 pkits $certs/ValidinhibitPolicyMappingTest2EE.crt \
1408 $certs/inhibitPolicyMapping1P12CACert.crt \
1409 $certs/inhibitPolicyMapping1P12subCACert.crt
1410 restore_db
1412 VFY_ACTION="Invalid inhibitPolicyMapping Test3"; log_banner
1413 certImportn inhibitPolicyMapping1P12CACert
1414 crlImportn inhibitPolicyMapping1P12CACRL.crl
1415 certImportn inhibitPolicyMapping1P12subCACert
1416 crlImportn inhibitPolicyMapping1P12subCACRL.crl
1417 certImportn inhibitPolicyMapping1P12subsubCACert
1418 crlImportn inhibitPolicyMapping1P12subsubCACRL.crl
1419 pkitsn $certs/InvalidinhibitPolicyMappingTest3EE.crt \
1420 $certs/inhibitPolicyMapping1P12subsubCACert.crt \
1421 $certs/inhibitPolicyMapping1P12subCACert.crt \
1422 $certs/inhibitPolicyMapping1P12CACert.crt
1423 restore_db
1425 VFY_ACTION="Valid inhibitPolicyMapping Test4"; log_banner
1426 certImportn inhibitPolicyMapping1P12CACert
1427 crlImportn inhibitPolicyMapping1P12CACRL.crl
1428 certImportn inhibitPolicyMapping1P12subCACert
1429 crlImportn inhibitPolicyMapping1P12subCACRL.crl
1430 certImportn inhibitPolicyMapping1P12subsubCACert
1431 crlImportn inhibitPolicyMapping1P12subsubCACRL.crl
1432 pkits $certs/ValidinhibitPolicyMappingTest4EE.crt \
1433 $certs/inhibitPolicyMapping1P12CACert.crt \
1434 $certs/inhibitPolicyMapping1P12subCACert.crt
1435 restore_db
1437 VFY_ACTION="Invalid inhibitPolicyMapping Test5"; log_banner
1438 certImportn inhibitPolicyMapping5CACert
1439 crlImportn inhibitPolicyMapping5CACRL.crl
1440 certImportn inhibitPolicyMapping5subCACert
1441 crlImportn inhibitPolicyMapping5subCACRL.crl
1442 certImport inhibitPolicyMapping5subsubCACert
1443 crlImport inhibitPolicyMapping5subsubCACRL.crl
1444 pkitsn $certs/InvalidinhibitPolicyMappingTest5EE.crt \
1445 $certs/inhibitPolicyMapping5subsubCACert.crt \
1446 $certs/inhibitPolicyMapping5subCACert.crt \
1447 $certs/inhibitPolicyMapping5CACert.crt
1448 restore_db
1450 VFY_ACTION="Invalid inhibitPolicyMapping Test6"; log_banner
1451 certImportn inhibitPolicyMapping1P12CACert
1452 crlImportn inhibitPolicyMapping1P12CACRL.crl
1453 certImportn inhibitPolicyMapping1P12subCAIPM5Cert
1454 crlImportn inhibitPolicyMapping1P12subCAIPM5CRL.crl
1455 certImport inhibitPolicyMapping1P12subsubCAIPM5Cert
1456 crlImportn inhibitPolicyMapping1P12subsubCAIPM5CRL.crl
1457 pkitsn $certs/InvalidinhibitPolicyMappingTest6EE.crt \
1458 $certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt \
1459 $certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt \
1460 $certs/inhibitPolicyMapping1P12CACert.crt
1461 restore_db
1463 VFY_ACTION="Valid Self-Issued inhibitPolicyMapping Test7"; log_banner
1464 certImportn inhibitPolicyMapping1P1CACert
1465 crlImportn inhibitPolicyMapping1P1CACRL.crl
1466 certImportn inhibitPolicyMapping1P1subCACert
1467 crlImportn inhibitPolicyMapping1P1subCACRL.crl
1468 pkits $certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt \
1469 $certs/inhibitPolicyMapping1P1subCACert.crt \
1470 $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
1471 $certs/inhibitPolicyMapping1P1CACert.crt
1472 restore_db
1474 VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test8"; log_banner
1475 certImportn inhibitPolicyMapping1P1CACert
1476 crlImportn inhibitPolicyMapping1P1CACRL.crl
1477 certImportn inhibitPolicyMapping1P1subCACert
1478 crlImportn inhibitPolicyMapping1P1subCACRL.crl
1479 certImport inhibitPolicyMapping1P1subsubCACert
1480 crlImportn inhibitPolicyMapping1P1subsubCACRL.crl
1481 pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt \
1482 $certs/inhibitPolicyMapping1P1subsubCACert.crt \
1483 $certs/inhibitPolicyMapping1P1subCACert.crt \
1484 $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
1485 $certs/inhibitPolicyMapping1P1CACert.crt
1486 restore_db
1488 VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test9"; log_banner
1489 certImportn inhibitPolicyMapping1P1CACert
1490 crlImportn inhibitPolicyMapping1P1CACRL.crl
1491 certImportn inhibitPolicyMapping1P1subCACert
1492 crlImportn inhibitPolicyMapping1P1subCACRL.crl
1493 certImportn inhibitPolicyMapping1P1subsubCACert
1494 crlImportn inhibitPolicyMapping1P1subsubCACRL.crl
1495 pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt \
1496 $certs/inhibitPolicyMapping1P1subsubCACert.crt \
1497 $certs/inhibitPolicyMapping1P1subCACert.crt \
1498 $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
1499 $certs/inhibitPolicyMapping1P1CACert.crt
1500 restore_db
1502 VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test10"; log_banner
1503 certImportn inhibitPolicyMapping1P1CACert
1504 crlImportn inhibitPolicyMapping1P1CACRL.crl
1505 certImportn inhibitPolicyMapping1P1subCACert
1506 crlImportn inhibitPolicyMapping1P1subCACRL.crl
1507 pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt \
1508 $certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt \
1509 $certs/inhibitPolicyMapping1P1subCACert.crt \
1510 $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
1511 $certs/inhibitPolicyMapping1P1CACert.crt
1512 restore_db
1514 VFY_ACTION="Invalid Self-Issued inhibitPolicyMapping Test11"; log_banner
1515 certImportn inhibitPolicyMapping1P1CACert
1516 crlImportn inhibitPolicyMapping1P1CACRL.crl
1517 certImportn inhibitPolicyMapping1P1subCACert
1518 crlImportn inhibitPolicyMapping1P1subCACRL.crl
1519 pkitsn $certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt \
1520 $certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt \
1521 $certs/inhibitPolicyMapping1P1subCACert.crt \
1522 $certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt \
1523 $certs/inhibitPolicyMapping1P1CACert.crt
1524 restore_db
1525 }
1528 pkits_InhibitAnyPolicy()
1529 {
1530 break_table "NIST PKITS Section 4.12: Inhibit Any Policy"
1532 VFY_ACTION="Invalid inhibitAnyPolicy Test1"; log_banner
1533 certImportn inhibitAnyPolicy0CACert
1534 crlImportn inhibitAnyPolicy0CACRL.crl
1535 pkitsn $certs/InvalidinhibitAnyPolicyTest1EE.crt \
1536 $certs/inhibitAnyPolicy0CACert.crt
1537 restore_db
1539 VFY_ACTION="Valid inhibitAnyPolicy Test2"; log_banner
1540 certImportn inhibitAnyPolicy0CACert
1541 crlImportn inhibitAnyPolicy0CACRL.crl
1542 pkits $certs/ValidinhibitAnyPolicyTest2EE.crt \
1543 $certs/inhibitAnyPolicy0CACert.crt
1544 restore_db
1546 VFY_ACTION="inhibitAnyPolicy Test3"; log_banner
1547 certImportn inhibitAnyPolicy1CACert
1548 crlImportn inhibitAnyPolicy1CACRL.crl
1549 certImport inhibitAnyPolicy1subCA1Cert
1550 crlImport inhibitAnyPolicy1subCA1CRL.crl
1551 pkits $certs/inhibitAnyPolicyTest3EE.crt \
1552 $certs/inhibitAnyPolicy1CACert.crt \
1553 $certs/inhibitAnyPolicy1subCA1Cert.crt
1554 restore_db
1556 VFY_ACTION="Invalid inhibitAnyPolicy Test4"; log_banner
1557 certImportn inhibitAnyPolicy1CACert
1558 crlImportn inhibitAnyPolicy1CACRL.crl
1559 certImport inhibitAnyPolicy1subCA1Cert
1560 crlImport inhibitAnyPolicy1subCA1CRL.crl
1561 pkitsn $certs/InvalidinhibitAnyPolicyTest4EE.crt \
1562 $certs/inhibitAnyPolicy1CACert.crt \
1563 $certs/inhibitAnyPolicy1subCA1Cert.crt
1564 restore_db
1566 VFY_ACTION="Invalid inhibitAnyPolicy Test5"; log_banner
1567 certImportn inhibitAnyPolicy5CACert
1568 crlImportn inhibitAnyPolicy5CACRL.crl
1569 certImportn inhibitAnyPolicy5subCACert
1570 crlImportn inhibitAnyPolicy5subCACRL.crl
1571 certImport inhibitAnyPolicy5subsubCACert
1572 crlImport inhibitAnyPolicy5subsubCACRL.crl
1573 pkitsn $certs/InvalidinhibitAnyPolicyTest5EE.crt \
1574 $certs/inhibitAnyPolicy5CACert.crt \
1575 $certs/inhibitAnyPolicy5subCACert.crt \
1576 $certs/inhibitAnyPolicy5subsubCACert.crt
1577 restore_db
1579 VFY_ACTION="Invalid inhibitAnyPolicy Test6"; log_banner
1580 certImportn inhibitAnyPolicy1CACert
1581 crlImportn inhibitAnyPolicy1CACRL.crl
1582 certImportn inhibitAnyPolicy1subCAIAP5Cert
1583 crlImportn inhibitAnyPolicy1subCAIAP5CRL.crl
1584 pkitsn $certs/InvalidinhibitAnyPolicyTest5EE.crt \
1585 $certs/inhibitAnyPolicy1CACert.crt \
1586 $certs/inhibitAnyPolicy5subCACert.crt \
1587 $certs/inhibitAnyPolicy5subsubCACert.crt
1588 restore_db
1590 VFY_ACTION="Valid Self-Issued inhibitAnyPolicy Test7"; log_banner
1591 certImportn inhibitAnyPolicy1CACert
1592 crlImportn inhibitAnyPolicy1CACRL.crl
1593 certImport inhibitAnyPolicy1subCA2Cert
1594 crlImport inhibitAnyPolicy1subCA2CRL.crl
1595 pkits $certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt \
1596 $certs/inhibitAnyPolicy1CACert.crt \
1597 $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
1598 $certs/inhibitAnyPolicy1subCA2Cert.crt
1599 restore_db
1601 VFY_ACTION="Invalid Self-Issued inhibitAnyPolicy Test8"; log_banner
1602 certImportn inhibitAnyPolicy1CACert
1603 crlImportn inhibitAnyPolicy1CACRL.crl
1604 certImport inhibitAnyPolicy1subCA2Cert
1605 crlImport inhibitAnyPolicy1subCA2CRL.crl
1606 certImport inhibitAnyPolicy1subsubCA2Cert
1607 crlImport inhibitAnyPolicy1subsubCA2CRL.crl
1608 pkitsn $certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt \
1609 $certs/inhibitAnyPolicy1CACert.crt \
1610 $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
1611 $certs/inhibitAnyPolicy1subCA2Cert.crt \
1612 $certs/inhibitAnyPolicy1subsubCA2Cert.crt
1613 restore_db
1615 VFY_ACTION="Valid Self-Issued inhibitAnyPolicy Test9"; log_banner
1616 certImportn inhibitAnyPolicy1CACert
1617 crlImportn inhibitAnyPolicy1CACRL.crl
1618 certImport inhibitAnyPolicy1subCA2Cert
1619 crlImport inhibitAnyPolicy1subCA2CRL.crl
1620 pkits $certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt \
1621 $certs/inhibitAnyPolicy1CACert.crt \
1622 $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
1623 $certs/inhibitAnyPolicy1subCA2Cert.crt \
1624 $certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt
1625 restore_db
1627 VFY_ACTION="Invalid Self-Issued inhibitAnyPolicy Test10"; log_banner
1628 certImportn inhibitAnyPolicy1CACert
1629 crlImportn inhibitAnyPolicy1CACRL.crl
1630 certImport inhibitAnyPolicy1subCA2Cert
1631 crlImport inhibitAnyPolicy1subCA2CRL.crl
1632 pkitsn $certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt \
1633 $certs/inhibitAnyPolicy1CACert.crt \
1634 $certs/inhibitAnyPolicy1SelfIssuedCACert.crt \
1635 $certs/inhibitAnyPolicy1subCA2Cert.crt
1636 restore_db
1637 }
1640 pkits_NameConstraints()
1641 {
1642 break_table "NIST PKITS Section 4.13: Name Constraints"
1644 VFY_ACTION="Valid DN nameConstraints Test1"; log_banner
1645 certImport nameConstraintsDN1CACert
1646 crlImport nameConstraintsDN1CACRL.crl
1647 pkits $certs/ValidDNnameConstraintsTest1EE.crt \
1648 $certs/nameConstraintsDN1CACert.crt
1649 restore_db
1651 VFY_ACTION="Invalid DN nameConstraints Test2"; log_banner
1652 certImport nameConstraintsDN1CACert
1653 crlImport nameConstraintsDN1CACRL.crl
1654 pkitsn $certs/InvalidDNnameConstraintsTest2EE.crt \
1655 $certs/nameConstraintsDN1CACert.crt
1656 restore_db
1658 VFY_ACTION="Invalid DN nameConstraints Test3"; log_banner
1659 certImport nameConstraintsDN1CACert
1660 crlImport nameConstraintsDN1CACRL.crl
1661 pkitsn $certs/InvalidDNnameConstraintsTest3EE.crt \
1662 $certs/nameConstraintsDN1CACert.crt
1663 restore_db
1665 VFY_ACTION="Valid DN nameConstraints Test4"; log_banner
1666 certImport nameConstraintsDN1CACert
1667 crlImport nameConstraintsDN1CACRL.crl
1668 pkits $certs/ValidDNnameConstraintsTest4EE.crt \
1669 $certs/nameConstraintsDN1CACert.crt
1670 restore_db
1672 VFY_ACTION="Valid DN nameConstraints Test5"; log_banner
1673 certImport nameConstraintsDN2CACert
1674 crlImport nameConstraintsDN2CACRL.crl
1675 pkits $certs/ValidDNnameConstraintsTest5EE.crt \
1676 $certs/nameConstraintsDN2CACert.crt
1677 restore_db
1679 VFY_ACTION="Valid DN nameConstraints Test6"; log_banner
1680 certImport nameConstraintsDN3CACert
1681 crlImport nameConstraintsDN3CACRL.crl
1682 pkits $certs/ValidDNnameConstraintsTest6EE.crt \
1683 $certs/nameConstraintsDN3CACert.crt
1684 restore_db
1686 VFY_ACTION="Invalid DN nameConstraints Test7"; log_banner
1687 certImport nameConstraintsDN3CACert
1688 crlImport nameConstraintsDN3CACRL.crl
1689 pkitsn $certs/InvalidDNnameConstraintsTest7EE.crt \
1690 $certs/nameConstraintsDN3CACert.crt
1691 restore_db
1693 VFY_ACTION="Invalid DN nameConstraints Test8"; log_banner
1694 certImport nameConstraintsDN4CACert
1695 crlImport nameConstraintsDN4CACRL.crl
1696 pkitsn $certs/InvalidDNnameConstraintsTest8EE.crt \
1697 $certs/nameConstraintsDN4CACert.crt
1698 restore_db
1700 VFY_ACTION="Invalid DN nameConstraints Test9"; log_banner
1701 certImport nameConstraintsDN4CACert
1702 crlImport nameConstraintsDN4CACRL.crl
1703 pkitsn $certs/InvalidDNnameConstraintsTest9EE.crt \
1704 $certs/nameConstraintsDN4CACert.crt
1705 restore_db
1707 VFY_ACTION="Invalid DN nameConstraints Test10"; log_banner
1708 certImport nameConstraintsDN5CACert
1709 crlImport nameConstraintsDN5CACRL.crl
1710 pkitsn $certs/InvalidDNnameConstraintsTest10EE.crt \
1711 $certs/nameConstraintsDN5CACert.crt
1712 restore_db
1714 VFY_ACTION="Valid DN nameConstraints Test11"; log_banner
1715 certImport nameConstraintsDN5CACert
1716 crlImport nameConstraintsDN5CACRL.crl
1717 pkits $certs/ValidDNnameConstraintsTest11EE.crt \
1718 $certs/nameConstraintsDN5CACert.crt
1719 restore_db
1721 VFY_ACTION="Invalid DN nameConstraints Test12"; log_banner
1722 certImport nameConstraintsDN1CACert
1723 crlImport nameConstraintsDN1CACRL.crl
1724 certImport nameConstraintsDN1subCA1Cert
1725 crlImport nameConstraintsDN1subCA1CRL.crl
1726 pkitsn $certs/InvalidDNnameConstraintsTest12EE.crt \
1727 $certs/nameConstraintsDN1subCA1Cert.crt \
1728 $certs/nameConstraintsDN1CACert.crt
1729 restore_db
1731 VFY_ACTION="Invalid DN nameConstraints Test13"; log_banner
1732 certImport nameConstraintsDN1CACert
1733 crlImport nameConstraintsDN1CACRL.crl
1734 certImport nameConstraintsDN1subCA2Cert
1735 crlImport nameConstraintsDN1subCA2CRL.crl
1736 pkitsn $certs/InvalidDNnameConstraintsTest13EE.crt \
1737 $certs/nameConstraintsDN1subCA2Cert.crt \
1738 $certs/nameConstraintsDN1CACert.crt
1739 restore_db
1741 VFY_ACTION="Valid DN nameConstraints Test14"; log_banner
1742 certImport nameConstraintsDN1CACert
1743 crlImport nameConstraintsDN1CACRL.crl
1744 certImport nameConstraintsDN1subCA2Cert
1745 crlImport nameConstraintsDN1subCA2CRL.crl
1746 pkits $certs/ValidDNnameConstraintsTest14EE.crt \
1747 $certs/nameConstraintsDN1subCA2Cert.crt \
1748 $certs/nameConstraintsDN1CACert.crt
1749 restore_db
1751 VFY_ACTION="Invalid DN nameConstraints Test15"; log_banner
1752 certImport nameConstraintsDN3CACert
1753 crlImport nameConstraintsDN3CACRL.crl
1754 certImport nameConstraintsDN3subCA1Cert
1755 crlImport nameConstraintsDN3subCA1CRL.crl
1756 pkitsn $certs/InvalidDNnameConstraintsTest15EE.crt \
1757 $certs/nameConstraintsDN3subCA1Cert.crt \
1758 $certs/nameConstraintsDN3CACert.crt
1759 restore_db
1761 VFY_ACTION="Invalid DN nameConstraints Test16"; log_banner
1762 certImport nameConstraintsDN3CACert
1763 crlImport nameConstraintsDN3CACRL.crl
1764 certImport nameConstraintsDN3subCA1Cert
1765 crlImport nameConstraintsDN3subCA1CRL.crl
1766 pkitsn $certs/InvalidDNnameConstraintsTest16EE.crt \
1767 $certs/nameConstraintsDN3subCA1Cert.crt \
1768 $certs/nameConstraintsDN3CACert.crt
1769 restore_db
1771 VFY_ACTION="Invalid DN nameConstraints Test17"; log_banner
1772 certImport nameConstraintsDN3CACert
1773 crlImport nameConstraintsDN3CACRL.crl
1774 certImport nameConstraintsDN3subCA2Cert
1775 crlImport nameConstraintsDN3subCA2CRL.crl
1776 pkitsn $certs/InvalidDNnameConstraintsTest17EE.crt \
1777 $certs/nameConstraintsDN3subCA2Cert.crt \
1778 $certs/nameConstraintsDN3CACert.crt
1779 restore_db
1781 VFY_ACTION="Valid DN nameConstraints Test18"; log_banner
1782 certImport nameConstraintsDN3CACert
1783 crlImport nameConstraintsDN3CACRL.crl
1784 certImport nameConstraintsDN3subCA2Cert
1785 crlImport nameConstraintsDN3subCA2CRL.crl
1786 pkits $certs/ValidDNnameConstraintsTest18EE.crt \
1787 $certs/nameConstraintsDN3subCA2Cert.crt \
1788 $certs/nameConstraintsDN3CACert.crt
1789 restore_db
1791 ### bug 232737 ###
1792 if [ -n "${KNOWN_BUG}" ]; then
1793 VFY_ACTION="Valid Self-Issued DN nameConstraints Test19"; log_banner
1794 certImport nameConstraintsDN1CACert
1795 crlImport nameConstraintsDN1CACRL.crl
1796 pkits $certs/ValidDNnameConstraintsTest19EE.crt \
1797 $certs/nameConstraintsDN1SelfIssuedCACert.crt \
1798 $certs/nameConstraintsDN1CACert.crt
1799 restore_db
1800 fi
1802 VFY_ACTION="Invalid Self-Issued DN nameConstraints Test20"; log_banner
1803 certImport nameConstraintsDN1CACert
1804 crlImport nameConstraintsDN1CACRL.crl
1805 pkitsn $certs/InvalidDNnameConstraintsTest20EE.crt \
1806 $certs/nameConstraintsDN1CACert.crt
1807 restore_db
1809 VFY_ACTION="Valid RFC822 nameConstraints Test21"; log_banner
1810 certImport nameConstraintsRFC822CA1Cert
1811 crlImport nameConstraintsRFC822CA1CRL.crl
1812 pkits $certs/ValidRFC822nameConstraintsTest21EE.crt \
1813 $certs/nameConstraintsRFC822CA1Cert.crt
1814 restore_db
1816 VFY_ACTION="Invalid RFC822 nameConstraints Test22"; log_banner
1817 certImport nameConstraintsRFC822CA1Cert
1818 crlImport nameConstraintsRFC822CA1CRL.crl
1819 pkitsn $certs/InvalidRFC822nameConstraintsTest22EE.crt \
1820 $certs/nameConstraintsRFC822CA1Cert.crt
1821 restore_db
1823 VFY_ACTION="Valid RFC822 nameConstraints Test23"; log_banner
1824 certImport nameConstraintsRFC822CA2Cert
1825 crlImport nameConstraintsRFC822CA2CRL.crl
1826 pkits $certs/ValidRFC822nameConstraintsTest23EE.crt \
1827 $certs/nameConstraintsRFC822CA2Cert.crt
1828 restore_db
1830 VFY_ACTION="Invalid RFC822 nameConstraints Test24"; log_banner
1831 certImport nameConstraintsRFC822CA2Cert
1832 crlImport nameConstraintsRFC822CA2CRL.crl
1833 pkitsn $certs/InvalidRFC822nameConstraintsTest24EE.crt \
1834 $certs/nameConstraintsRFC822CA2Cert.crt
1835 restore_db
1837 VFY_ACTION="Valid RFC822 nameConstraints Test25"; log_banner
1838 certImport nameConstraintsRFC822CA3Cert
1839 crlImport nameConstraintsRFC822CA3CRL.crl
1840 pkits $certs/ValidRFC822nameConstraintsTest25EE.crt \
1841 $certs/nameConstraintsRFC822CA3Cert.crt
1842 restore_db
1844 VFY_ACTION="Invalid RFC822 nameConstraints Test26"; log_banner
1845 certImport nameConstraintsRFC822CA3Cert
1846 crlImport nameConstraintsRFC822CA3CRL.crl
1847 pkitsn $certs/InvalidRFC822nameConstraintsTest26EE.crt \
1848 $certs/nameConstraintsRFC822CA3Cert.crt
1849 restore_db
1851 VFY_ACTION="Valid DN and RFC822 nameConstraints Test27"; log_banner
1852 certImport nameConstraintsDN1CACert
1853 crlImport nameConstraintsDN1CACRL.crl
1854 certImport nameConstraintsDN1subCA3Cert
1855 crlImport nameConstraintsDN1subCA3CRL.crl
1856 pkits $certs/ValidDNandRFC822nameConstraintsTest27EE.crt \
1857 $certs/nameConstraintsDN1subCA3Cert.crt \
1858 $certs/nameConstraintsDN1CACert.crt
1859 restore_db
1861 VFY_ACTION="Invalid DN and RFC822 nameConstraints Test28"; log_banner
1862 certImport nameConstraintsDN1CACert
1863 crlImport nameConstraintsDN1CACRL.crl
1864 certImport nameConstraintsDN1subCA3Cert
1865 crlImport nameConstraintsDN1subCA3CRL.crl
1866 pkitsn $certs/InvalidDNandRFC822nameConstraintsTest28EE.crt \
1867 $certs/nameConstraintsDN1subCA3Cert.crt \
1868 $certs/nameConstraintsDN1CACert.crt
1869 restore_db
1871 VFY_ACTION="Invalid DN and RFC822 nameConstraints Test29"; log_banner
1872 certImport nameConstraintsDN1CACert
1873 crlImport nameConstraintsDN1CACRL.crl
1874 certImport nameConstraintsDN1subCA3Cert
1875 crlImport nameConstraintsDN1subCA3CRL.crl
1876 pkitsn $certs/InvalidDNandRFC822nameConstraintsTest29EE.crt \
1877 $certs/nameConstraintsDN1subCA3Cert.crt \
1878 $certs/nameConstraintsDN1CACert.crt
1879 restore_db
1881 VFY_ACTION="Valid DNS nameConstraints Test30"; log_banner
1882 certImport nameConstraintsDNS1CACert
1883 crlImport nameConstraintsDNS1CACRL.crl
1884 pkits $certs/ValidDNSnameConstraintsTest30EE.crt \
1885 $certs/nameConstraintsDNS1CACert.crt
1886 restore_db
1888 VFY_ACTION="Invalid DNS nameConstraints Test31"; log_banner
1889 certImport nameConstraintsDNS1CACert
1890 crlImport nameConstraintsDNS1CACRL.crl
1891 pkitsn $certs/InvalidDNSnameConstraintsTest31EE.crt \
1892 $certs/nameConstraintsDNS1CACert.crt
1893 restore_db
1895 VFY_ACTION="Valid DNS nameConstraints Test32"; log_banner
1896 certImport nameConstraintsDNS2CACert
1897 crlImport nameConstraintsDNS2CACRL.crl
1898 pkits $certs/ValidDNSnameConstraintsTest32EE.crt \
1899 $certs/nameConstraintsDNS2CACert.crt
1900 restore_db
1902 VFY_ACTION="Invalid DNS nameConstraints Test33"; log_banner
1903 certImport nameConstraintsDNS2CACert
1904 crlImport nameConstraintsDNS2CACRL.crl
1905 pkitsn $certs/InvalidDNSnameConstraintsTest33EE.crt \
1906 $certs/nameConstraintsDNS2CACert.crt
1907 restore_db
1909 VFY_ACTION="Valid URI nameConstraints Test34"; log_banner
1910 certImport nameConstraintsURI1CACert
1911 crlImport nameConstraintsURI1CACRL.crl
1912 pkits $certs/ValidURInameConstraintsTest34EE.crt \
1913 $certs/nameConstraintsURI1CACert.crt
1914 restore_db
1916 VFY_ACTION="Invalid URI nameConstraints Test35"; log_banner
1917 certImport nameConstraintsURI1CACert
1918 crlImport nameConstraintsURI1CACRL.crl
1919 pkitsn $certs/InvalidURInameConstraintsTest35EE.crt \
1920 $certs/nameConstraintsURI1CACert.crt
1921 restore_db
1923 VFY_ACTION="Valid URI nameConstraints Test36"; log_banner
1924 certImport nameConstraintsURI2CACert
1925 crlImport nameConstraintsURI2CACRL.crl
1926 pkits $certs/ValidURInameConstraintsTest36EE.crt \
1927 $certs/nameConstraintsURI2CACert.crt
1928 restore_db
1930 VFY_ACTION="Invalid URI nameConstraints Test37"; log_banner
1931 certImport nameConstraintsURI2CACert
1932 crlImport nameConstraintsURI2CACRL.crl
1933 pkitsn $certs/InvalidURInameConstraintsTest37EE.crt \
1934 $certs/nameConstraintsURI2CACert.crt
1935 restore_db
1937 VFY_ACTION="Invalid DNS nameConstraints Test38"; log_banner
1938 certImport nameConstraintsDNS1CACert
1939 crlImport nameConstraintsDNS1CACRL.crl
1940 pkitsn $certs/InvalidDNSnameConstraintsTest38EE.crt \
1941 $certs/nameConstraintsDNS1CACert.crt
1942 restore_db
1943 }
1945 pkits_PvtCertExtensions()
1946 {
1947 break_table "NIST PKITS Section 4.16: Private Certificate Extensions"
1949 VFY_ACTION="Valid Unknown Not Critical Certificate Extension Test1"; log_banner
1950 pkits $certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
1952 VFY_ACTION="Invalid Unknown Critical Certificate Extension Test2"; log_banner
1953 pkitsn $certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
1954 }
1956 ############################## pkits_cleanup ###########################
1957 # local shell function to finish this script (no exit since it might be
1958 # sourced)
1959 ########################################################################
1960 pkits_cleanup()
1961 {
1962 html "</TABLE><BR>"
1963 cd ${QADIR}
1964 . common/cleanup.sh
1965 }
1968 ################################## main ################################
1969 pkits_init
1970 pkits_SignatureVerification | tee -a $PKITS_LOG
1971 pkits_ValidityPeriods | tee -a $PKITS_LOG
1972 pkits_NameChaining | tee -a $PKITS_LOG
1973 pkits_BasicCertRevocation | tee -a $PKITS_LOG
1974 pkits_PathVerificWithSelfIssuedCerts | tee -a $PKITS_LOG
1975 pkits_BasicConstraints | tee -a $PKITS_LOG
1976 pkits_KeyUsage | tee -a $PKITS_LOG
1977 if [ -n "$NSS_PKITS_POLICIES" ]; then
1978 pkits_CertificatePolicies | tee -a $PKITS_LOG
1979 pkits_RequireExplicitPolicy | tee -a $PKITS_LOG
1980 pkits_PolicyMappings | tee -a $PKITS_LOG
1981 pkits_InhibitPolicyMapping | tee -a $PKITS_LOG
1982 pkits_InhibitAnyPolicy | tee -a $PKITS_LOG
1983 fi
1984 pkits_NameConstraints | tee -a $PKITS_LOG
1985 pkits_PvtCertExtensions | tee -a $PKITS_LOG
1986 pkits_cleanup