/security/nss/tests/chains/scenarios/mapping2.cfg
http://github.com/zpao/v8monkey · Config · 103 lines · 88 code · 15 blank · 0 comment · 0 complexity · 62bac85c2ef4d3b14446837d41a89549 MD5 · raw file
- # ***** BEGIN LICENSE BLOCK *****
- # Version: MPL 1.1/GPL 2.0/LGPL 2.1
- #
- # The contents of this file are subject to the Mozilla Public License Version
- # 1.1 (the "License"); you may not use this file except in compliance with
- # the License. You may obtain a copy of the License at
- # http://www.mozilla.org/MPL/
- #
- # Software distributed under the License is distributed on an "AS IS" basis,
- # WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
- # for the specific language governing rights and limitations under the
- # License.
- #
- # The Original Code is the Network Security Services (NSS)
- #
- # The Initial Developer of the Original Code is Sun Microsystems, Inc.
- # Portions created by the Initial Developer are Copyright (C) 2009
- # the Initial Developer. All Rights Reserved.
- #
- # Contributor(s):
- # Slavomir Katuscak <slavomir.katuscak@sun.com>, Sun Microsystems
- #
- # Alternatively, the contents of this file may be used under the terms of
- # either the GNU General Public License Version 2 or later (the "GPL"), or
- # the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
- # in which case the provisions of the GPL or the LGPL are applicable instead
- # of those above. If you wish to allow use of your version of this file only
- # under the terms of either the GPL or the LGPL, and not to allow others to
- # use your version of this file under the terms of the MPL, indicate your
- # decision by deleting the provisions above and replace them with the notice
- # and other provisions required by the GPL or the LGPL. If you do not delete
- # the provisions above, a recipient may use your version of this file under
- # the terms of any one of the MPL, the GPL or the LGPL.
- #
- # ***** END LICENSE BLOCK *****
- scenario Mapping2
- entity Root
- type Root
- entity CA1
- type Intermediate
- issuer Root
- policy OID.1.0
- entity CA2
- type Intermediate
- issuer CA1
- policy OID.1.0
- mapping OID.1.0:OID.1.1
- entity CA3
- type Intermediate
- issuer CA2
- policy OID.1.1
- entity User
- type EE
- issuer CA3
- policy OID.1.1
- db All
- import Root::
- import CA1:Root:
- import CA2:CA1:
- import CA3:CA2:
- verify User:CA3
- trust Root
- policy OID.1.0
- # should fail, bug 430859
- result pass
- verify User:CA3
- trust Root
- policy OID.1.1
- # should pass, bug 430859
- result fail
- verify User:CA3
- trust CA1
- policy OID.1.0
- # should fail, bug 430859
- result pass
- verify User:CA3
- trust CA1
- policy OID.1.1
- # should pass, bug 430859
- result fail
- verify User:CA3
- trust CA2
- policy OID.1.0
- result fail
- verify User:CA3
- trust CA2
- policy OID.1.1
- result pass