From 36d22d82aa202bb199967e9512281e9a53db42c9 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 21:33:14 +0200 Subject: Adding upstream version 115.7.0esr. Signed-off-by: Daniel Baumann --- security/nss/tests/libpkix/cert_trust.map | 6 + .../nss/tests/libpkix/certs/BrAirWaysBadSig.cert | Bin 0 -> 1647 bytes .../libpkix/certs/CertificatePoliciesCritical.crt | Bin 0 -> 805 bytes security/nss/tests/libpkix/certs/GoodCACert.crt | Bin 0 -> 625 bytes .../tests/libpkix/certs/NameConstraints.ca.cert | Bin 0 -> 626 bytes .../certs/NameConstraints.dcissallowed.cert | Bin 0 -> 888 bytes .../certs/NameConstraints.dcissblocked.cert | Bin 0 -> 889 bytes .../libpkix/certs/NameConstraints.dcisscopy.cert | Bin 0 -> 957 bytes .../certs/NameConstraints.intermediate.cert | Bin 0 -> 659 bytes .../certs/NameConstraints.intermediate2.cert | Bin 0 -> 644 bytes .../certs/NameConstraints.intermediate3.cert | Bin 0 -> 709 bytes .../certs/NameConstraints.intermediate4.cert | Bin 0 -> 607 bytes .../certs/NameConstraints.intermediate5.cert | Bin 0 -> 612 bytes .../certs/NameConstraints.intermediate6.cert | Bin 0 -> 611 bytes .../tests/libpkix/certs/NameConstraints.ipaca.cert | Bin 0 -> 1000 bytes .../tests/libpkix/certs/NameConstraints.ncca.cert | Bin 0 -> 669 bytes .../tests/libpkix/certs/NameConstraints.ocsp1.cert | Bin 0 -> 956 bytes .../libpkix/certs/NameConstraints.server1.cert | Bin 0 -> 660 bytes .../libpkix/certs/NameConstraints.server10.cert | Bin 0 -> 560 bytes .../libpkix/certs/NameConstraints.server11.cert | Bin 0 -> 585 bytes .../libpkix/certs/NameConstraints.server12.cert | Bin 0 -> 562 bytes .../libpkix/certs/NameConstraints.server13.cert | Bin 0 -> 574 bytes .../libpkix/certs/NameConstraints.server14.cert | Bin 0 -> 574 bytes .../libpkix/certs/NameConstraints.server15.cert | Bin 0 -> 634 bytes .../libpkix/certs/NameConstraints.server16.cert | Bin 0 -> 612 bytes .../libpkix/certs/NameConstraints.server17.cert | Bin 0 -> 630 bytes .../libpkix/certs/NameConstraints.server2.cert | Bin 0 -> 643 bytes .../libpkix/certs/NameConstraints.server3.cert | Bin 0 -> 660 bytes .../libpkix/certs/NameConstraints.server4.cert | Bin 0 -> 663 bytes .../libpkix/certs/NameConstraints.server5.cert | Bin 0 -> 646 bytes .../libpkix/certs/NameConstraints.server6.cert | Bin 0 -> 663 bytes .../libpkix/certs/NameConstraints.server7.cert | Bin 0 -> 578 bytes .../libpkix/certs/NameConstraints.server8.cert | Bin 0 -> 564 bytes .../libpkix/certs/NameConstraints.server9.cert | Bin 0 -> 551 bytes security/nss/tests/libpkix/certs/OCSPCA1.cert | Bin 0 -> 574 bytes security/nss/tests/libpkix/certs/OCSPCA1.p12 | Bin 0 -> 1690 bytes security/nss/tests/libpkix/certs/OCSPCA2.cert | Bin 0 -> 574 bytes security/nss/tests/libpkix/certs/OCSPCA2.p12 | Bin 0 -> 1690 bytes security/nss/tests/libpkix/certs/OCSPCA3.cert | Bin 0 -> 574 bytes security/nss/tests/libpkix/certs/OCSPCA3.p12 | Bin 0 -> 1690 bytes security/nss/tests/libpkix/certs/OCSPEE11.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE12.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE13.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE14.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE15.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE21.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE22.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE23.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE31.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE32.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPEE33.cert | Bin 0 -> 552 bytes security/nss/tests/libpkix/certs/OCSPRoot.cert | Bin 0 -> 549 bytes security/nss/tests/libpkix/certs/OCSPRoot.p12 | Bin 0 -> 1668 bytes security/nss/tests/libpkix/certs/PayPalEE.cert | Bin 0 -> 1949 bytes security/nss/tests/libpkix/certs/PayPalICA.cert | Bin 0 -> 1210 bytes security/nss/tests/libpkix/certs/PayPalRootCA.cert | Bin 0 -> 969 bytes security/nss/tests/libpkix/certs/TestCA.ca.cert | Bin 0 -> 628 bytes security/nss/tests/libpkix/certs/TestUser50.cert | Bin 0 -> 617 bytes security/nss/tests/libpkix/certs/TestUser51.cert | Bin 0 -> 617 bytes .../libpkix/certs/TrustAnchorRootCertificate.crt | Bin 0 -> 572 bytes .../libpkix/certs/ValidCertificatePathTest1EE.crt | Bin 0 -> 622 bytes security/nss/tests/libpkix/certs/anchor2dsa | Bin 0 -> 906 bytes security/nss/tests/libpkix/certs/crldiff.crl | Bin 0 -> 237 bytes security/nss/tests/libpkix/certs/crlgood.crl | Bin 0 -> 237 bytes .../libpkix/certs/extKeyUsage/codeSigningEKUCert | Bin 0 -> 696 bytes .../tests/libpkix/certs/extKeyUsage/multiEKUCert | Bin 0 -> 716 bytes .../nss/tests/libpkix/certs/extKeyUsage/noEKUCert | Bin 0 -> 742 bytes .../tests/libpkix/certs/generalName/altNameDnCert | Bin 0 -> 748 bytes .../libpkix/certs/generalName/altNameDnCert_diff | Bin 0 -> 747 bytes .../tests/libpkix/certs/generalName/altNameDnsCert | Bin 0 -> 700 bytes .../libpkix/certs/generalName/altNameDnsCert_diff | Bin 0 -> 700 bytes .../tests/libpkix/certs/generalName/altNameEdiCert | Bin 0 -> 702 bytes .../libpkix/certs/generalName/altNameEdiCert_diff | Bin 0 -> 700 bytes .../tests/libpkix/certs/generalName/altNameIpCert | Bin 0 -> 692 bytes .../libpkix/certs/generalName/altNameIpCert_diff | Bin 0 -> 692 bytes .../libpkix/certs/generalName/altNameNoneCert | Bin 0 -> 742 bytes .../tests/libpkix/certs/generalName/altNameOidCert | Bin 0 -> 691 bytes .../libpkix/certs/generalName/altNameOidCert_diff | Bin 0 -> 694 bytes .../libpkix/certs/generalName/altNameOtherCert | Bin 0 -> 698 bytes .../certs/generalName/altNameOtherCert_diff | Bin 0 -> 698 bytes .../libpkix/certs/generalName/altNameRfc822Cert | Bin 0 -> 740 bytes .../certs/generalName/altNameRfc822Cert_diff | Bin 0 -> 703 bytes .../libpkix/certs/generalName/altNameRfc822DnsCert | Bin 0 -> 718 bytes .../tests/libpkix/certs/generalName/altNameUriCert | Bin 0 -> 706 bytes .../libpkix/certs/generalName/altNameUriCert_diff | Bin 0 -> 708 bytes .../libpkix/certs/generalName/altNameX400Cert | Bin 0 -> 691 bytes .../libpkix/certs/generalName/altNameX400Cert_diff | Bin 0 -> 691 bytes security/nss/tests/libpkix/certs/hanfeiyu2hanfeiyu | Bin 0 -> 669 bytes security/nss/tests/libpkix/certs/hy2hc-bc | Bin 0 -> 668 bytes security/nss/tests/libpkix/certs/hy2hy-bc0 | Bin 0 -> 685 bytes security/nss/tests/libpkix/certs/issuer-hanfei.crl | Bin 0 -> 199 bytes security/nss/tests/libpkix/certs/issuer-none.crl | Bin 0 -> 196 bytes .../libpkix/certs/keyIdentifier/authKeyIDCert | Bin 0 -> 536 bytes .../libpkix/certs/keyIdentifier/subjKeyIDCert | Bin 0 -> 906 bytes .../tests/libpkix/certs/keyUsage/decipherOnlyCert | Bin 0 -> 692 bytes .../tests/libpkix/certs/keyUsage/encipherOnlyCert | Bin 0 -> 692 bytes .../libpkix/certs/keyUsage/multiKeyUsagesCert | Bin 0 -> 742 bytes .../tests/libpkix/certs/keyUsage/noKeyUsagesCert | Bin 0 -> 675 bytes security/nss/tests/libpkix/certs/make-ca-u50-u51 | 37 ++ security/nss/tests/libpkix/certs/make-nc | 508 ++++++++++++++++++++ security/nss/tests/libpkix/certs/noExtensionsCert | Bin 0 -> 680 bytes security/nss/tests/libpkix/certs/nss2alice | Bin 0 -> 605 bytes .../tests/libpkix/certs/publicKey/dsaWithParams | Bin 0 -> 906 bytes .../tests/libpkix/certs/publicKey/dsaWithoutParams | Bin 0 -> 536 bytes .../nss/tests/libpkix/certs/publicKey/labs2yassir | Bin 0 -> 676 bytes .../nss/tests/libpkix/certs/publicKey/yassir2labs | Bin 0 -> 676 bytes security/nss/tests/libpkix/certs/sun2sun | Bin 0 -> 666 bytes security/nss/tests/libpkix/certs/yassir2bcn | Bin 0 -> 742 bytes security/nss/tests/libpkix/certs/yassir2yassir | Bin 0 -> 760 bytes security/nss/tests/libpkix/common/libpkix_init.sh | 324 +++++++++++++ .../nss/tests/libpkix/common/libpkix_init_nist.sh | 70 +++ security/nss/tests/libpkix/libpkix.sh | 139 ++++++ .../tests/libpkix/pkix_pl_tests/module/cert8.db | Bin 0 -> 65536 bytes .../nss/tests/libpkix/pkix_pl_tests/module/key3.db | Bin 0 -> 32768 bytes .../module/rev_data/local/crldiff.crl | Bin 0 -> 237 bytes .../module/rev_data/local/crlgood.crl | Bin 0 -> 237 bytes .../module/rev_data/local/issuer-hanfei.crl | Bin 0 -> 199 bytes .../module/rev_data/local/issuer-none.crl | Bin 0 -> 196 bytes .../pkix_pl_tests/module/rev_data/test_eku_all.crt | Bin 0 -> 774 bytes .../rev_data/test_eku_allbutcodesigningEE.crt | Bin 0 -> 732 bytes .../module/rev_data/test_eku_clientauth.crt | Bin 0 -> 726 bytes .../module/rev_data/test_eku_clientauthEE.crt | Bin 0 -> 694 bytes .../rev_data/test_eku_codesigning_clientauth.crt | Bin 0 -> 734 bytes .../libpkix/pkix_pl_tests/module/runPLTests.sh | 101 ++++ .../tests/libpkix/pkix_pl_tests/module/secmod.db | Bin 0 -> 32768 bytes .../pkix_pl_tests/pki/rev_data/local/README | 3 + .../pkix_pl_tests/pki/rev_data/local/crldiff.crl | Bin 0 -> 237 bytes .../pkix_pl_tests/pki/rev_data/local/crlgood.crl | Bin 0 -> 237 bytes .../pki/rev_data/local/issuer-hanfei.crl | Bin 0 -> 199 bytes .../pki/rev_data/local/issuer-none.crl | Bin 0 -> 196 bytes .../tests/libpkix/pkix_pl_tests/pki/runPLTests.sh | 81 ++++ .../nss/tests/libpkix/pkix_pl_tests/runPLTests.sh | 67 +++ .../libpkix/pkix_pl_tests/system/runPLTests.sh | 46 ++ .../nss/tests/libpkix/pkix_tests/certsel/keyUsage | 0 .../tests/libpkix/pkix_tests/certsel/runTests.sh | 33 ++ .../tests/libpkix/pkix_tests/checker/runTests.sh | 31 ++ .../tests/libpkix/pkix_tests/crlsel/runTests.sh | 33 ++ .../tests/libpkix/pkix_tests/params/runTests.sh | 36 ++ .../tests/libpkix/pkix_tests/results/runTests.sh | 36 ++ security/nss/tests/libpkix/pkix_tests/runTests.sh | 98 ++++ .../nss/tests/libpkix/pkix_tests/store/runTests.sh | 32 ++ .../tests/libpkix/pkix_tests/top/anchorcert.crt | Bin 0 -> 694 bytes .../top/build_data/backtracking/signature/greg.crl | Bin 0 -> 169 bytes .../backtracking/signature/greg2yassir_badsig.crt | Bin 0 -> 689 bytes .../top/build_data/backtracking/signature/jes.crl | Bin 0 -> 153 bytes .../build_data/backtracking/signature/jes2greg.crt | Bin 0 -> 671 bytes .../build_data/backtracking/signature/jes2jes.crt | Bin 0 -> 656 bytes .../build_data/backtracking/signature/jes2labs.crt | Bin 0 -> 555 bytes .../top/build_data/backtracking/signature/labs.crl | Bin 0 -> 155 bytes .../backtracking/signature/labs2yassir.crt | Bin 0 -> 675 bytes .../build_data/backtracking/signature/yassir.crl | Bin 0 -> 173 bytes .../backtracking/signature/yassir2hanfei.crt | Bin 0 -> 692 bytes .../build_data/multi_path/signature/fail/greg.crl | Bin 0 -> 169 bytes .../multi_path/signature/fail/greg2yassir.crt | Bin 0 -> 689 bytes .../build_data/multi_path/signature/fail/jes.crl | Bin 0 -> 153 bytes .../multi_path/signature/fail/jes2greg.crt | Bin 0 -> 671 bytes .../multi_path/signature/fail/jes2jes.crt | Bin 0 -> 656 bytes .../multi_path/signature/fail/jes2labs.crt | Bin 0 -> 555 bytes .../build_data/multi_path/signature/fail/labs.crl | Bin 0 -> 155 bytes .../multi_path/signature/fail/labs2yassir.crt | Bin 0 -> 676 bytes .../multi_path/signature/fail/yassir.crl | Bin 0 -> 173 bytes .../multi_path/signature/fail/yassir2hanfei.crt | Bin 0 -> 692 bytes .../build_data/multi_path/signature/pass/greg.crl | Bin 0 -> 169 bytes .../multi_path/signature/pass/greg2yassir.crt | Bin 0 -> 689 bytes .../build_data/multi_path/signature/pass/jes.crl | Bin 0 -> 153 bytes .../multi_path/signature/pass/jes2greg.crt | Bin 0 -> 671 bytes .../multi_path/signature/pass/jes2jes.crt | Bin 0 -> 656 bytes .../multi_path/signature/pass/jes2labs.crt | Bin 0 -> 555 bytes .../build_data/multi_path/signature/pass/labs.crl | Bin 0 -> 155 bytes .../multi_path/signature/pass/labs2yassir.crt | Bin 0 -> 676 bytes .../multi_path/signature/pass/yassir.crl | Bin 0 -> 173 bytes .../multi_path/signature/pass/yassir2hanfei.crt | Bin 0 -> 692 bytes .../build_data/single_path/signature/fail/greg.crl | Bin 0 -> 169 bytes .../signature/fail/greg2yassir_badsig.crt | Bin 0 -> 689 bytes .../build_data/single_path/signature/fail/jes.crl | Bin 0 -> 153 bytes .../single_path/signature/fail/jes2greg.crt | Bin 0 -> 671 bytes .../single_path/signature/fail/jes2jes.crt | Bin 0 -> 656 bytes .../single_path/signature/fail/yassir.crl | Bin 0 -> 173 bytes .../single_path/signature/fail/yassir2hanfei.crt | Bin 0 -> 692 bytes .../build_data/single_path/signature/pass/greg.crl | Bin 0 -> 169 bytes .../single_path/signature/pass/greg2yassir.crt | Bin 0 -> 689 bytes .../build_data/single_path/signature/pass/jes.crl | Bin 0 -> 153 bytes .../single_path/signature/pass/jes2greg.crt | Bin 0 -> 671 bytes .../single_path/signature/pass/jes2jes.crt | Bin 0 -> 656 bytes .../single_path/signature/pass/yassir.crl | Bin 0 -> 173 bytes .../single_path/signature/pass/yassir2hanfei.crt | Bin 0 -> 692 bytes .../top/build_data/test1/greg2yassir.crt | Bin 0 -> 689 bytes .../pkix_tests/top/build_data/test1/jes2greg.crt | Bin 0 -> 671 bytes .../pkix_tests/top/build_data/test1/jes2jes.crt | Bin 0 -> 656 bytes .../pkix_tests/top/build_data/test1/jes2labs.crt | Bin 0 -> 555 bytes .../top/build_data/test1/labs2yassir.crt | Bin 0 -> 676 bytes .../top/build_data/test1/yassir2hanfei.crt | Bin 0 -> 692 bytes .../top/build_data/test1/yassir2richard.crt | Bin 0 -> 520 bytes .../pkix_tests/top/build_data/test2/jes2greg.crt | Bin 0 -> 671 bytes .../pkix_tests/top/build_data/test2/jes2jes.crt | Bin 0 -> 656 bytes .../pkix_tests/top/build_data/test2/jes2labs.crt | Bin 0 -> 555 bytes .../top/build_data/test2/labs2yassir.crt | Bin 0 -> 669 bytes .../top/build_data/test2/nelson2yassir.crt | Bin 0 -> 676 bytes .../top/build_data/test2/yassir2hanfei.crt | Bin 0 -> 692 bytes .../top/build_data/test2/yassir2richard.crt | Bin 0 -> 520 bytes .../pkix_tests/top/build_data/test3/jes2greg.crt | Bin 0 -> 671 bytes .../pkix_tests/top/build_data/test3/jes2jes.crt | Bin 0 -> 656 bytes .../pkix_tests/top/build_data/test3/jes2labs.crt | Bin 0 -> 555 bytes .../top/build_data/test3/labs2yassir.crt | Bin 0 -> 669 bytes .../top/build_data/test3/nelson2yassir.crt | Bin 0 -> 676 bytes .../top/build_data/test3/yassir2hanfei.crt | Bin 0 -> 692 bytes security/nss/tests/libpkix/pkix_tests/top/cert8.db | Bin 0 -> 65536 bytes .../nss/tests/libpkix/pkix_tests/top/goodcert.crt | Bin 0 -> 1031 bytes security/nss/tests/libpkix/pkix_tests/top/key3.db | Bin 0 -> 32768 bytes .../pkix_tests/top/rev_data/crlchecker/chem.crl | Bin 0 -> 239 bytes .../top/rev_data/crlchecker/chem2prof.crt | Bin 0 -> 709 bytes .../top/rev_data/crlchecker/phy2prof.crt | Bin 0 -> 707 bytes .../pkix_tests/top/rev_data/crlchecker/phys.crl | Bin 0 -> 201 bytes .../pkix_tests/top/rev_data/crlchecker/prof.crl | Bin 0 -> 203 bytes .../top/rev_data/crlchecker/prof2test.crt | Bin 0 -> 691 bytes .../pkix_tests/top/rev_data/crlchecker/sci.crl | Bin 0 -> 200 bytes .../top/rev_data/crlchecker/sci2chem.crt | Bin 0 -> 707 bytes .../pkix_tests/top/rev_data/crlchecker/sci2phy.crt | Bin 0 -> 703 bytes .../pkix_tests/top/rev_data/crlchecker/sci2sci.crt | Bin 0 -> 703 bytes .../pkix_tests/top/rev_data/crlchecker/test.crl | Bin 0 -> 205 bytes .../tests/libpkix/pkix_tests/top/revokedcert.crt | Bin 0 -> 1034 bytes .../nss/tests/libpkix/pkix_tests/top/runTests.sh | 517 +++++++++++++++++++++ .../nss/tests/libpkix/pkix_tests/top/secmod.db | Bin 0 -> 32768 bytes .../nss/tests/libpkix/pkix_tests/util/runTests.sh | 33 ++ security/nss/tests/libpkix/runTests.sh | 87 ++++ security/nss/tests/libpkix/sample_apps/README | 77 +++ security/nss/tests/libpkix/sample_apps/cert8.db | Bin 0 -> 65536 bytes security/nss/tests/libpkix/sample_apps/key3.db | Bin 0 -> 32768 bytes security/nss/tests/libpkix/sample_apps/runPerf.sh | 143 ++++++ security/nss/tests/libpkix/sample_apps/secmod.db | Bin 0 -> 32768 bytes security/nss/tests/libpkix/vfychain_test.lst | 4 + 231 files changed, 2542 insertions(+) create mode 100644 security/nss/tests/libpkix/cert_trust.map create mode 100644 security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert create mode 100644 security/nss/tests/libpkix/certs/CertificatePoliciesCritical.crt create mode 100644 security/nss/tests/libpkix/certs/GoodCACert.crt create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.ca.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.intermediate.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.ipaca.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.ncca.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server1.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server10.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server11.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server12.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server13.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server14.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server15.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server16.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server17.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server2.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server3.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server4.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server5.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server6.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server7.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server8.cert create mode 100644 security/nss/tests/libpkix/certs/NameConstraints.server9.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPCA1.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPCA1.p12 create mode 100644 security/nss/tests/libpkix/certs/OCSPCA2.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPCA2.p12 create mode 100644 security/nss/tests/libpkix/certs/OCSPCA3.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPCA3.p12 create mode 100644 security/nss/tests/libpkix/certs/OCSPEE11.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE12.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE13.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE14.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE15.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE21.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE22.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE23.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE31.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE32.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPEE33.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPRoot.cert create mode 100644 security/nss/tests/libpkix/certs/OCSPRoot.p12 create mode 100644 security/nss/tests/libpkix/certs/PayPalEE.cert create mode 100644 security/nss/tests/libpkix/certs/PayPalICA.cert create mode 100644 security/nss/tests/libpkix/certs/PayPalRootCA.cert create mode 100644 security/nss/tests/libpkix/certs/TestCA.ca.cert create mode 100644 security/nss/tests/libpkix/certs/TestUser50.cert create mode 100644 security/nss/tests/libpkix/certs/TestUser51.cert create mode 100644 security/nss/tests/libpkix/certs/TrustAnchorRootCertificate.crt create mode 100644 security/nss/tests/libpkix/certs/ValidCertificatePathTest1EE.crt create mode 100755 security/nss/tests/libpkix/certs/anchor2dsa create mode 100644 security/nss/tests/libpkix/certs/crldiff.crl create mode 100644 security/nss/tests/libpkix/certs/crlgood.crl create mode 100755 security/nss/tests/libpkix/certs/extKeyUsage/codeSigningEKUCert create mode 100755 security/nss/tests/libpkix/certs/extKeyUsage/multiEKUCert create mode 100755 security/nss/tests/libpkix/certs/extKeyUsage/noEKUCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameDnCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameDnCert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameDnsCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameDnsCert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameEdiCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameEdiCert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameIpCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameIpCert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameNoneCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameOidCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameOidCert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameOtherCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameOtherCert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameRfc822DnsCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameUriCert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameUriCert_diff create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameX400Cert create mode 100755 security/nss/tests/libpkix/certs/generalName/altNameX400Cert_diff create mode 100755 security/nss/tests/libpkix/certs/hanfeiyu2hanfeiyu create mode 100755 security/nss/tests/libpkix/certs/hy2hc-bc create mode 100755 security/nss/tests/libpkix/certs/hy2hy-bc0 create mode 100644 security/nss/tests/libpkix/certs/issuer-hanfei.crl create mode 100644 security/nss/tests/libpkix/certs/issuer-none.crl create mode 100755 security/nss/tests/libpkix/certs/keyIdentifier/authKeyIDCert create mode 100755 security/nss/tests/libpkix/certs/keyIdentifier/subjKeyIDCert create mode 100755 security/nss/tests/libpkix/certs/keyUsage/decipherOnlyCert create mode 100755 security/nss/tests/libpkix/certs/keyUsage/encipherOnlyCert create mode 100755 security/nss/tests/libpkix/certs/keyUsage/multiKeyUsagesCert create mode 100755 security/nss/tests/libpkix/certs/keyUsage/noKeyUsagesCert create mode 100755 security/nss/tests/libpkix/certs/make-ca-u50-u51 create mode 100755 security/nss/tests/libpkix/certs/make-nc create mode 100755 security/nss/tests/libpkix/certs/noExtensionsCert create mode 100644 security/nss/tests/libpkix/certs/nss2alice create mode 100755 security/nss/tests/libpkix/certs/publicKey/dsaWithParams create mode 100755 security/nss/tests/libpkix/certs/publicKey/dsaWithoutParams create mode 100755 security/nss/tests/libpkix/certs/publicKey/labs2yassir create mode 100755 security/nss/tests/libpkix/certs/publicKey/yassir2labs create mode 100755 security/nss/tests/libpkix/certs/sun2sun create mode 100755 security/nss/tests/libpkix/certs/yassir2bcn create mode 100755 security/nss/tests/libpkix/certs/yassir2yassir create mode 100644 security/nss/tests/libpkix/common/libpkix_init.sh create mode 100644 security/nss/tests/libpkix/common/libpkix_init_nist.sh create mode 100755 security/nss/tests/libpkix/libpkix.sh create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/module/cert8.db create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/module/key3.db create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crldiff.crl create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crlgood.crl create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-hanfei.crl create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-none.crl create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_all.crt create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_allbutcodesigningEE.crt create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauth.crt create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauthEE.crt create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_codesigning_clientauth.crt create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/module/runPLTests.sh create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/module/secmod.db create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local/README create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local/crldiff.crl create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local/crlgood.crl create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local/issuer-hanfei.crl create mode 100644 security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local/issuer-none.crl create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/pki/runPLTests.sh create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/runPLTests.sh create mode 100755 security/nss/tests/libpkix/pkix_pl_tests/system/runPLTests.sh create mode 100755 security/nss/tests/libpkix/pkix_tests/certsel/keyUsage create mode 100755 security/nss/tests/libpkix/pkix_tests/certsel/runTests.sh create mode 100755 security/nss/tests/libpkix/pkix_tests/checker/runTests.sh create mode 100755 security/nss/tests/libpkix/pkix_tests/crlsel/runTests.sh create mode 100755 security/nss/tests/libpkix/pkix_tests/params/runTests.sh create mode 100755 security/nss/tests/libpkix/pkix_tests/results/runTests.sh create mode 100755 security/nss/tests/libpkix/pkix_tests/runTests.sh create mode 100755 security/nss/tests/libpkix/pkix_tests/store/runTests.sh create mode 100644 security/nss/tests/libpkix/pkix_tests/top/anchorcert.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/greg.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/greg2yassir_badsig.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/jes.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/jes2labs.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/labs.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/labs2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/yassir.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/greg.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/greg2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/jes.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/jes2labs.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/labs.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/labs2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/yassir.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/greg.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/greg2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/jes.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/jes2labs.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/labs.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/labs2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/yassir.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail/greg.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail/greg2yassir_badsig.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail/jes.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail/yassir.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass/greg.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass/greg2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass/jes.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass/yassir.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test1/greg2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test1/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test1/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test1/jes2labs.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test1/labs2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test1/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test1/yassir2richard.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test2/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test2/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test2/jes2labs.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test2/labs2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test2/nelson2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test2/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test2/yassir2richard.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test3/jes2greg.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test3/jes2jes.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test3/jes2labs.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test3/labs2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test3/nelson2yassir.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/build_data/test3/yassir2hanfei.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/cert8.db create mode 100644 security/nss/tests/libpkix/pkix_tests/top/goodcert.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/key3.db create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/chem.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/chem2prof.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/phy2prof.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/phys.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/prof.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/prof2test.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/sci.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/sci2chem.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/sci2phy.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/sci2sci.crt create mode 100644 security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker/test.crl create mode 100644 security/nss/tests/libpkix/pkix_tests/top/revokedcert.crt create mode 100755 security/nss/tests/libpkix/pkix_tests/top/runTests.sh create mode 100644 security/nss/tests/libpkix/pkix_tests/top/secmod.db create mode 100755 security/nss/tests/libpkix/pkix_tests/util/runTests.sh create mode 100755 security/nss/tests/libpkix/runTests.sh create mode 100755 security/nss/tests/libpkix/sample_apps/README create mode 100755 security/nss/tests/libpkix/sample_apps/cert8.db create mode 100755 security/nss/tests/libpkix/sample_apps/key3.db create mode 100755 security/nss/tests/libpkix/sample_apps/runPerf.sh create mode 100755 security/nss/tests/libpkix/sample_apps/secmod.db create mode 100644 security/nss/tests/libpkix/vfychain_test.lst (limited to 'security/nss/tests/libpkix') diff --git a/security/nss/tests/libpkix/cert_trust.map b/security/nss/tests/libpkix/cert_trust.map new file mode 100644 index 0000000000..c992435f9e --- /dev/null +++ b/security/nss/tests/libpkix/cert_trust.map @@ -0,0 +1,6 @@ +TestCA.ca CT,C,C +TestUser50 ,, +TestUser51 ,, +PayPalRootCA CT,C,C +PayPalICA ,, +PayPalEE ,, diff --git a/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert b/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert new file mode 100644 index 0000000000..30d2f18c3d Binary files /dev/null and b/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert differ diff --git a/security/nss/tests/libpkix/certs/CertificatePoliciesCritical.crt b/security/nss/tests/libpkix/certs/CertificatePoliciesCritical.crt new file mode 100644 index 0000000000..efc2f2cd54 Binary files /dev/null and b/security/nss/tests/libpkix/certs/CertificatePoliciesCritical.crt differ diff --git a/security/nss/tests/libpkix/certs/GoodCACert.crt b/security/nss/tests/libpkix/certs/GoodCACert.crt new file mode 100644 index 0000000000..5aecbc0cfc Binary files /dev/null and b/security/nss/tests/libpkix/certs/GoodCACert.crt differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.ca.cert b/security/nss/tests/libpkix/certs/NameConstraints.ca.cert new file mode 100644 index 0000000000..c1bce9e337 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.ca.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert b/security/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert new file mode 100644 index 0000000000..23641b2909 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert b/security/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert new file mode 100644 index 0000000000..6b4ed9495f Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert b/security/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert new file mode 100644 index 0000000000..215bcd4e0b Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.intermediate.cert b/security/nss/tests/libpkix/certs/NameConstraints.intermediate.cert new file mode 100644 index 0000000000..8ecd1eb5a5 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.intermediate.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert b/security/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert new file mode 100644 index 0000000000..bd9942fc58 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert b/security/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert new file mode 100644 index 0000000000..d77da29e9f Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert b/security/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert new file mode 100644 index 0000000000..5cb406bf4a Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert b/security/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert new file mode 100644 index 0000000000..dec259c075 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert b/security/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert new file mode 100644 index 0000000000..d759e28fa9 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.ipaca.cert b/security/nss/tests/libpkix/certs/NameConstraints.ipaca.cert new file mode 100644 index 0000000000..4a451f3429 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.ipaca.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.ncca.cert b/security/nss/tests/libpkix/certs/NameConstraints.ncca.cert new file mode 100644 index 0000000000..8f6d8c5253 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.ncca.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert b/security/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert new file mode 100644 index 0000000000..817faafe3d Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server1.cert b/security/nss/tests/libpkix/certs/NameConstraints.server1.cert new file mode 100644 index 0000000000..657881a41b Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server1.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server10.cert b/security/nss/tests/libpkix/certs/NameConstraints.server10.cert new file mode 100644 index 0000000000..863eab5e5b Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server10.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server11.cert b/security/nss/tests/libpkix/certs/NameConstraints.server11.cert new file mode 100644 index 0000000000..16deb392ee Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server11.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server12.cert b/security/nss/tests/libpkix/certs/NameConstraints.server12.cert new file mode 100644 index 0000000000..67f9a2c2ce Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server12.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server13.cert b/security/nss/tests/libpkix/certs/NameConstraints.server13.cert new file mode 100644 index 0000000000..0bf5c7aa2e Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server13.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server14.cert b/security/nss/tests/libpkix/certs/NameConstraints.server14.cert new file mode 100644 index 0000000000..487cf68f9a Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server14.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server15.cert b/security/nss/tests/libpkix/certs/NameConstraints.server15.cert new file mode 100644 index 0000000000..30ef48f40d Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server15.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server16.cert b/security/nss/tests/libpkix/certs/NameConstraints.server16.cert new file mode 100644 index 0000000000..db07f53012 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server16.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server17.cert b/security/nss/tests/libpkix/certs/NameConstraints.server17.cert new file mode 100644 index 0000000000..56e07fb549 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server17.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server2.cert b/security/nss/tests/libpkix/certs/NameConstraints.server2.cert new file mode 100644 index 0000000000..3c7ecaf277 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server2.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server3.cert b/security/nss/tests/libpkix/certs/NameConstraints.server3.cert new file mode 100644 index 0000000000..14e2cc7c19 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server3.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server4.cert b/security/nss/tests/libpkix/certs/NameConstraints.server4.cert new file mode 100644 index 0000000000..155aa4b67b Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server4.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server5.cert b/security/nss/tests/libpkix/certs/NameConstraints.server5.cert new file mode 100644 index 0000000000..d599d6c8eb Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server5.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server6.cert b/security/nss/tests/libpkix/certs/NameConstraints.server6.cert new file mode 100644 index 0000000000..caccebf1f0 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server6.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server7.cert b/security/nss/tests/libpkix/certs/NameConstraints.server7.cert new file mode 100644 index 0000000000..66bdb5eff3 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server7.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server8.cert b/security/nss/tests/libpkix/certs/NameConstraints.server8.cert new file mode 100644 index 0000000000..6c398ee8a5 Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server8.cert differ diff --git a/security/nss/tests/libpkix/certs/NameConstraints.server9.cert b/security/nss/tests/libpkix/certs/NameConstraints.server9.cert new file mode 100644 index 0000000000..998439c1bb Binary files /dev/null and b/security/nss/tests/libpkix/certs/NameConstraints.server9.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPCA1.cert b/security/nss/tests/libpkix/certs/OCSPCA1.cert new file mode 100644 index 0000000000..cac92b7901 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPCA1.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPCA1.p12 b/security/nss/tests/libpkix/certs/OCSPCA1.p12 new file mode 100644 index 0000000000..82cc310340 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPCA1.p12 differ diff --git a/security/nss/tests/libpkix/certs/OCSPCA2.cert b/security/nss/tests/libpkix/certs/OCSPCA2.cert new file mode 100644 index 0000000000..3dd31100fd Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPCA2.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPCA2.p12 b/security/nss/tests/libpkix/certs/OCSPCA2.p12 new file mode 100644 index 0000000000..1c03d0d7e6 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPCA2.p12 differ diff --git a/security/nss/tests/libpkix/certs/OCSPCA3.cert b/security/nss/tests/libpkix/certs/OCSPCA3.cert new file mode 100644 index 0000000000..7d06458303 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPCA3.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPCA3.p12 b/security/nss/tests/libpkix/certs/OCSPCA3.p12 new file mode 100644 index 0000000000..610eb50a1d Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPCA3.p12 differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE11.cert b/security/nss/tests/libpkix/certs/OCSPEE11.cert new file mode 100644 index 0000000000..093756d3da Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE11.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE12.cert b/security/nss/tests/libpkix/certs/OCSPEE12.cert new file mode 100644 index 0000000000..14cd5b9ce3 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE12.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE13.cert b/security/nss/tests/libpkix/certs/OCSPEE13.cert new file mode 100644 index 0000000000..058b59d80a Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE13.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE14.cert b/security/nss/tests/libpkix/certs/OCSPEE14.cert new file mode 100644 index 0000000000..4f937b9e98 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE14.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE15.cert b/security/nss/tests/libpkix/certs/OCSPEE15.cert new file mode 100644 index 0000000000..fbb2000dd5 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE15.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE21.cert b/security/nss/tests/libpkix/certs/OCSPEE21.cert new file mode 100644 index 0000000000..a3f1305fd3 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE21.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE22.cert b/security/nss/tests/libpkix/certs/OCSPEE22.cert new file mode 100644 index 0000000000..198f2068d8 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE22.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE23.cert b/security/nss/tests/libpkix/certs/OCSPEE23.cert new file mode 100644 index 0000000000..32b3a631da Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE23.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE31.cert b/security/nss/tests/libpkix/certs/OCSPEE31.cert new file mode 100644 index 0000000000..3df0f62cba Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE31.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE32.cert b/security/nss/tests/libpkix/certs/OCSPEE32.cert new file mode 100644 index 0000000000..9bf5354aba Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE32.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPEE33.cert b/security/nss/tests/libpkix/certs/OCSPEE33.cert new file mode 100644 index 0000000000..4a3c102283 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPEE33.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPRoot.cert b/security/nss/tests/libpkix/certs/OCSPRoot.cert new file mode 100644 index 0000000000..8abc6bc87d Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPRoot.cert differ diff --git a/security/nss/tests/libpkix/certs/OCSPRoot.p12 b/security/nss/tests/libpkix/certs/OCSPRoot.p12 new file mode 100644 index 0000000000..166baf3f44 Binary files /dev/null and b/security/nss/tests/libpkix/certs/OCSPRoot.p12 differ diff --git a/security/nss/tests/libpkix/certs/PayPalEE.cert b/security/nss/tests/libpkix/certs/PayPalEE.cert new file mode 100644 index 0000000000..36a4470f71 Binary files /dev/null and b/security/nss/tests/libpkix/certs/PayPalEE.cert differ diff --git a/security/nss/tests/libpkix/certs/PayPalICA.cert b/security/nss/tests/libpkix/certs/PayPalICA.cert new file mode 100644 index 0000000000..dd14c1b218 Binary files /dev/null and b/security/nss/tests/libpkix/certs/PayPalICA.cert differ diff --git a/security/nss/tests/libpkix/certs/PayPalRootCA.cert b/security/nss/tests/libpkix/certs/PayPalRootCA.cert new file mode 100644 index 0000000000..dae0196507 Binary files /dev/null and b/security/nss/tests/libpkix/certs/PayPalRootCA.cert differ diff --git a/security/nss/tests/libpkix/certs/TestCA.ca.cert b/security/nss/tests/libpkix/certs/TestCA.ca.cert new file mode 100644 index 0000000000..627aead0e2 Binary files /dev/null and b/security/nss/tests/libpkix/certs/TestCA.ca.cert differ diff --git a/security/nss/tests/libpkix/certs/TestUser50.cert b/security/nss/tests/libpkix/certs/TestUser50.cert new file mode 100644 index 0000000000..0ce25bb5de Binary files /dev/null and b/security/nss/tests/libpkix/certs/TestUser50.cert differ diff --git a/security/nss/tests/libpkix/certs/TestUser51.cert b/security/nss/tests/libpkix/certs/TestUser51.cert new file mode 100644 index 0000000000..12c74e9f97 Binary files /dev/null and b/security/nss/tests/libpkix/certs/TestUser51.cert differ diff --git a/security/nss/tests/libpkix/certs/TrustAnchorRootCertificate.crt b/security/nss/tests/libpkix/certs/TrustAnchorRootCertificate.crt new file mode 100644 index 0000000000..21f520ee56 Binary files /dev/null and b/security/nss/tests/libpkix/certs/TrustAnchorRootCertificate.crt differ diff --git a/security/nss/tests/libpkix/certs/ValidCertificatePathTest1EE.crt b/security/nss/tests/libpkix/certs/ValidCertificatePathTest1EE.crt new file mode 100644 index 0000000000..26985c9f60 Binary files /dev/null and b/security/nss/tests/libpkix/certs/ValidCertificatePathTest1EE.crt differ diff --git a/security/nss/tests/libpkix/certs/anchor2dsa b/security/nss/tests/libpkix/certs/anchor2dsa new file mode 100755 index 0000000000..a1f9e05f60 Binary files /dev/null and b/security/nss/tests/libpkix/certs/anchor2dsa differ diff --git a/security/nss/tests/libpkix/certs/crldiff.crl b/security/nss/tests/libpkix/certs/crldiff.crl new file mode 100644 index 0000000000..d076ef89fb Binary files /dev/null and b/security/nss/tests/libpkix/certs/crldiff.crl differ diff --git a/security/nss/tests/libpkix/certs/crlgood.crl b/security/nss/tests/libpkix/certs/crlgood.crl new file mode 100644 index 0000000000..1ad019ed18 Binary files /dev/null and b/security/nss/tests/libpkix/certs/crlgood.crl differ diff --git a/security/nss/tests/libpkix/certs/extKeyUsage/codeSigningEKUCert b/security/nss/tests/libpkix/certs/extKeyUsage/codeSigningEKUCert new file mode 100755 index 0000000000..a1afd6a2d4 Binary files /dev/null and b/security/nss/tests/libpkix/certs/extKeyUsage/codeSigningEKUCert differ diff --git a/security/nss/tests/libpkix/certs/extKeyUsage/multiEKUCert b/security/nss/tests/libpkix/certs/extKeyUsage/multiEKUCert new file mode 100755 index 0000000000..55568917cc Binary files /dev/null and b/security/nss/tests/libpkix/certs/extKeyUsage/multiEKUCert differ diff --git a/security/nss/tests/libpkix/certs/extKeyUsage/noEKUCert b/security/nss/tests/libpkix/certs/extKeyUsage/noEKUCert new file mode 100755 index 0000000000..f9c83dc956 Binary files /dev/null and b/security/nss/tests/libpkix/certs/extKeyUsage/noEKUCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameDnCert b/security/nss/tests/libpkix/certs/generalName/altNameDnCert new file mode 100755 index 0000000000..43dac73413 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameDnCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameDnCert_diff b/security/nss/tests/libpkix/certs/generalName/altNameDnCert_diff new file mode 100755 index 0000000000..04d133f741 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameDnCert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameDnsCert b/security/nss/tests/libpkix/certs/generalName/altNameDnsCert new file mode 100755 index 0000000000..63754141af Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameDnsCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameDnsCert_diff b/security/nss/tests/libpkix/certs/generalName/altNameDnsCert_diff new file mode 100755 index 0000000000..4fe947e736 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameDnsCert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameEdiCert b/security/nss/tests/libpkix/certs/generalName/altNameEdiCert new file mode 100755 index 0000000000..95ec20423f Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameEdiCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameEdiCert_diff b/security/nss/tests/libpkix/certs/generalName/altNameEdiCert_diff new file mode 100755 index 0000000000..50e5440d93 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameEdiCert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameIpCert b/security/nss/tests/libpkix/certs/generalName/altNameIpCert new file mode 100755 index 0000000000..5f0e528a1e Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameIpCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameIpCert_diff b/security/nss/tests/libpkix/certs/generalName/altNameIpCert_diff new file mode 100755 index 0000000000..2407be54fb Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameIpCert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameNoneCert b/security/nss/tests/libpkix/certs/generalName/altNameNoneCert new file mode 100755 index 0000000000..f9c83dc956 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameNoneCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameOidCert b/security/nss/tests/libpkix/certs/generalName/altNameOidCert new file mode 100755 index 0000000000..fa92c9ecd8 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameOidCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameOidCert_diff b/security/nss/tests/libpkix/certs/generalName/altNameOidCert_diff new file mode 100755 index 0000000000..635e4d143b Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameOidCert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameOtherCert b/security/nss/tests/libpkix/certs/generalName/altNameOtherCert new file mode 100755 index 0000000000..bdfc7cb6a0 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameOtherCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameOtherCert_diff b/security/nss/tests/libpkix/certs/generalName/altNameOtherCert_diff new file mode 100755 index 0000000000..bfc8a79737 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameOtherCert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert b/security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert new file mode 100755 index 0000000000..9ad3271ab9 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert_diff b/security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert_diff new file mode 100755 index 0000000000..b8e5b2e709 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameRfc822Cert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameRfc822DnsCert b/security/nss/tests/libpkix/certs/generalName/altNameRfc822DnsCert new file mode 100755 index 0000000000..89be1811d3 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameRfc822DnsCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameUriCert b/security/nss/tests/libpkix/certs/generalName/altNameUriCert new file mode 100755 index 0000000000..1f46e79f06 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameUriCert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameUriCert_diff b/security/nss/tests/libpkix/certs/generalName/altNameUriCert_diff new file mode 100755 index 0000000000..864e86fb58 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameUriCert_diff differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameX400Cert b/security/nss/tests/libpkix/certs/generalName/altNameX400Cert new file mode 100755 index 0000000000..b0d10cf328 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameX400Cert differ diff --git a/security/nss/tests/libpkix/certs/generalName/altNameX400Cert_diff b/security/nss/tests/libpkix/certs/generalName/altNameX400Cert_diff new file mode 100755 index 0000000000..6523888478 Binary files /dev/null and b/security/nss/tests/libpkix/certs/generalName/altNameX400Cert_diff differ diff --git a/security/nss/tests/libpkix/certs/hanfeiyu2hanfeiyu b/security/nss/tests/libpkix/certs/hanfeiyu2hanfeiyu new file mode 100755 index 0000000000..3f34526834 Binary files /dev/null and b/security/nss/tests/libpkix/certs/hanfeiyu2hanfeiyu differ diff --git a/security/nss/tests/libpkix/certs/hy2hc-bc b/security/nss/tests/libpkix/certs/hy2hc-bc new file mode 100755 index 0000000000..691b8d9827 Binary files /dev/null and b/security/nss/tests/libpkix/certs/hy2hc-bc differ diff --git a/security/nss/tests/libpkix/certs/hy2hy-bc0 b/security/nss/tests/libpkix/certs/hy2hy-bc0 new file mode 100755 index 0000000000..18b5fe4a8b Binary files /dev/null and b/security/nss/tests/libpkix/certs/hy2hy-bc0 differ diff --git a/security/nss/tests/libpkix/certs/issuer-hanfei.crl b/security/nss/tests/libpkix/certs/issuer-hanfei.crl new file mode 100644 index 0000000000..6c9f0dbaa3 Binary files /dev/null and b/security/nss/tests/libpkix/certs/issuer-hanfei.crl differ diff --git a/security/nss/tests/libpkix/certs/issuer-none.crl b/security/nss/tests/libpkix/certs/issuer-none.crl new file mode 100644 index 0000000000..c1c83ba2cd Binary files /dev/null and b/security/nss/tests/libpkix/certs/issuer-none.crl differ diff --git a/security/nss/tests/libpkix/certs/keyIdentifier/authKeyIDCert b/security/nss/tests/libpkix/certs/keyIdentifier/authKeyIDCert new file mode 100755 index 0000000000..7eae4863e1 Binary files /dev/null and b/security/nss/tests/libpkix/certs/keyIdentifier/authKeyIDCert differ diff --git a/security/nss/tests/libpkix/certs/keyIdentifier/subjKeyIDCert b/security/nss/tests/libpkix/certs/keyIdentifier/subjKeyIDCert new file mode 100755 index 0000000000..a1f9e05f60 Binary files /dev/null and b/security/nss/tests/libpkix/certs/keyIdentifier/subjKeyIDCert differ diff --git a/security/nss/tests/libpkix/certs/keyUsage/decipherOnlyCert b/security/nss/tests/libpkix/certs/keyUsage/decipherOnlyCert new file mode 100755 index 0000000000..11a132d100 Binary files /dev/null and b/security/nss/tests/libpkix/certs/keyUsage/decipherOnlyCert differ diff --git a/security/nss/tests/libpkix/certs/keyUsage/encipherOnlyCert b/security/nss/tests/libpkix/certs/keyUsage/encipherOnlyCert new file mode 100755 index 0000000000..9b93771199 Binary files /dev/null and b/security/nss/tests/libpkix/certs/keyUsage/encipherOnlyCert differ diff --git a/security/nss/tests/libpkix/certs/keyUsage/multiKeyUsagesCert b/security/nss/tests/libpkix/certs/keyUsage/multiKeyUsagesCert new file mode 100755 index 0000000000..f9c83dc956 Binary files /dev/null and b/security/nss/tests/libpkix/certs/keyUsage/multiKeyUsagesCert differ diff --git a/security/nss/tests/libpkix/certs/keyUsage/noKeyUsagesCert b/security/nss/tests/libpkix/certs/keyUsage/noKeyUsagesCert new file mode 100755 index 0000000000..c58d9a2aa7 Binary files /dev/null and b/security/nss/tests/libpkix/certs/keyUsage/noKeyUsagesCert differ diff --git a/security/nss/tests/libpkix/certs/make-ca-u50-u51 b/security/nss/tests/libpkix/certs/make-ca-u50-u51 new file mode 100755 index 0000000000..9024e357db --- /dev/null +++ b/security/nss/tests/libpkix/certs/make-ca-u50-u51 @@ -0,0 +1,37 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +mkdir tmp +cd tmp +dd if=/dev/urandom bs=512 count=1 of=noise +echo "" > pwfile + +certutil -d . -N -f pwfile + +certutil -S -z noise -g 1024 -d . -n ca -s "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" -t C,C,C -x -m 1 -w -1 -v 600 -1 -2 -5 < TestCA.ca.cert +certutil -d . -L -n u50 -r > TestUser50.cert +certutil -d . -L -n u51 -r > TestUser51.cert + +echo "Created multiple files in subdirectory tmp: TestCA.ca.cert TestUser50.cert TestUser51.cert" diff --git a/security/nss/tests/libpkix/certs/make-nc b/security/nss/tests/libpkix/certs/make-nc new file mode 100755 index 0000000000..b6b0fdaefa --- /dev/null +++ b/security/nss/tests/libpkix/certs/make-nc @@ -0,0 +1,508 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +mkdir tmp +cd tmp +dd if=/dev/urandom bs=512 count=1 of=noise +echo "" > pwfile + +certutil -d . -N -f pwfile + +certutil -S -z noise -g 1024 -d . -n ca -s "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" -t C,C,C -x -m 1 -w -2 -v 240 -1 -2 -5 < NameConstraints.ca.cert +certutil -d . -L -n ica -r > NameConstraints.intermediate.cert +certutil -d . -L -n server1 -r > NameConstraints.server1.cert +certutil -d . -L -n server2 -r > NameConstraints.server2.cert +certutil -d . -L -n server3 -r > NameConstraints.server3.cert +certutil -d . -L -n ica2 -r > NameConstraints.intermediate2.cert +certutil -d . -L -n server4 -r > NameConstraints.server4.cert +certutil -d . -L -n server5 -r > NameConstraints.server5.cert +certutil -d . -L -n server6 -r > NameConstraints.server6.cert +certutil -d . -L -n ica3 -r > NameConstraints.intermediate3.cert +certutil -d . -L -n ica4 -r > NameConstraints.intermediate4.cert +certutil -d . -L -n server7 -r > NameConstraints.server7.cert +certutil -d . -L -n server8 -r > NameConstraints.server8.cert +certutil -d . -L -n server9 -r > NameConstraints.server9.cert +certutil -d . -L -n server10 -r > NameConstraints.server10.cert +certutil -d . -L -n server11 -r > NameConstraints.server11.cert +certutil -d . -L -n server11 -r > NameConstraints.server11.cert +certutil -d . -L -n server12 -r > NameConstraints.server12.cert +certutil -d . -L -n ica5 -r > NameConstraints.intermediate5.cert +certutil -d . -L -n server13 -r > NameConstraints.server13.cert +certutil -d . -L -n server14 -r > NameConstraints.server14.cert +certutil -d . -L -n ncca -r > NameConstraints.ncca.cert +certutil -d . -L -n ica6 -r > NameConstraints.intermediate6.cert +certutil -d . -L -n server15 -r > NameConstraints.server15.cert +certutil -d . -L -n server16 -r > NameConstraints.server16.cert +certutil -d . -L -n server17 -r > NameConstraints.server17.cert +certutil -d . -L -n dcisscopy -r > NameConstraints.dcisscopy.cert +certutil -d . -L -n dcissblocked -r > NameConstraints.dcissblocked.cert +certutil -d . -L -n dcissallowed -r > NameConstraints.dcissallowed.cert + +echo "Created multiple files in subdirectory tmp: NameConstraints.ca.cert NameConstraints.intermediate.cert NameConstraints.server1.cert NameConstraints.server2.cert NameConstraints.server3.cert NameConstraints.intermediate2.cert NameConstraints.server4.cert NameConstraints.server5.cert NameConstraints.server6.cert" diff --git a/security/nss/tests/libpkix/certs/noExtensionsCert b/security/nss/tests/libpkix/certs/noExtensionsCert new file mode 100755 index 0000000000..f3dc1c9731 Binary files /dev/null and b/security/nss/tests/libpkix/certs/noExtensionsCert differ diff --git a/security/nss/tests/libpkix/certs/nss2alice b/security/nss/tests/libpkix/certs/nss2alice new file mode 100644 index 0000000000..07ebff7ab2 Binary files /dev/null and b/security/nss/tests/libpkix/certs/nss2alice differ diff --git a/security/nss/tests/libpkix/certs/publicKey/dsaWithParams b/security/nss/tests/libpkix/certs/publicKey/dsaWithParams new file mode 100755 index 0000000000..a1f9e05f60 Binary files /dev/null and b/security/nss/tests/libpkix/certs/publicKey/dsaWithParams differ diff --git a/security/nss/tests/libpkix/certs/publicKey/dsaWithoutParams b/security/nss/tests/libpkix/certs/publicKey/dsaWithoutParams new file mode 100755 index 0000000000..7eae4863e1 Binary files /dev/null and b/security/nss/tests/libpkix/certs/publicKey/dsaWithoutParams differ diff --git a/security/nss/tests/libpkix/certs/publicKey/labs2yassir b/security/nss/tests/libpkix/certs/publicKey/labs2yassir new file mode 100755 index 0000000000..f5fe261157 Binary files /dev/null and b/security/nss/tests/libpkix/certs/publicKey/labs2yassir differ diff --git a/security/nss/tests/libpkix/certs/publicKey/yassir2labs b/security/nss/tests/libpkix/certs/publicKey/yassir2labs new file mode 100755 index 0000000000..f943854036 Binary files /dev/null and b/security/nss/tests/libpkix/certs/publicKey/yassir2labs differ diff --git a/security/nss/tests/libpkix/certs/sun2sun b/security/nss/tests/libpkix/certs/sun2sun new file mode 100755 index 0000000000..c75192be17 Binary files /dev/null and b/security/nss/tests/libpkix/certs/sun2sun differ diff --git a/security/nss/tests/libpkix/certs/yassir2bcn b/security/nss/tests/libpkix/certs/yassir2bcn new file mode 100755 index 0000000000..f9c83dc956 Binary files /dev/null and b/security/nss/tests/libpkix/certs/yassir2bcn differ diff --git a/security/nss/tests/libpkix/certs/yassir2yassir b/security/nss/tests/libpkix/certs/yassir2yassir new file mode 100755 index 0000000000..8444af5a3e Binary files /dev/null and b/security/nss/tests/libpkix/certs/yassir2yassir differ diff --git a/security/nss/tests/libpkix/common/libpkix_init.sh b/security/nss/tests/libpkix/common/libpkix_init.sh new file mode 100644 index 0000000000..01eb070e19 --- /dev/null +++ b/security/nss/tests/libpkix/common/libpkix_init.sh @@ -0,0 +1,324 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# libpkix_init.sh +# + +### when the script is exiting, handle it in the Cleanup routine...the result +### value will get set to 0 if all the tests completed successfully, so we can +### use that value in the handler + +trap 'Cleanup' EXIT + +result=1 +checkmem=0 +arenas=0 +quiet=0 + +doNIST=1 +doNIST_PDTest=0 +doPD=0 +doTop=0 +doModule=0 +doPki=0 +doOCSP=0 +doOCSPTest=0 + +combinedErrors=0 +totalErrors=0 +prematureTermination=0 +errors=0 + +if [ -z "${INIT_SOURCED}" ] ; then + libpkixCommondir=`pwd` + cd ../../common + . ./init.sh > /dev/null + cd ${libpkixCommondir} +fi + +DIST_BIN=${DIST}/${OBJDIR}/bin + +### setup some defaults +WD=`pwd` +prog=`basename $0` +testOut=${HOSTDIR}/${prog}.$$ +testOutMem=${HOSTDIR}/${prog}_mem.$$ + +#################### +# cleanup from tests +#################### +Cleanup() +{ + if [ ${testOut} != "" ]; then + rm -f ${testOut} + fi + + if [ ${testOutMem} != "" ]; then + rm -f ${testOutMem} + fi + + if [ -d ../../nist_pkits/certs ]; then + rm -f ../../nist_pkits/certs + fi + + if [ ${doTop} -eq 1 ]; then + for i in ${linkMStoreNistFiles}; do + if [ -f ${HOSTDIR}/rev_data/multiple_certstores/$i ]; then + rm -f ${HOSTDIR}/rev_data/multiple_certstores/$i + fi + done + if [ -d ${HOSTDIR}/rev_data/multiple_certstores ]; then + rm -fr ${HOSTDIR}/rev_data/multiple_certstores + fi + fi + + if [ ${doModule} -eq 1 ]; then + for i in ${linkModuleNistFiles}; do + if [ -f ${HOSTDIR}/rev_data/local/$i ]; then + rm -f ${HOSTDIR}/rev_data/local/$i + fi + done + for i in ${localCRLFiles}; do + if [ -f ${HOSTDIR}/rev_data/local/$i ]; then + rm -f ${HOSTDIR}/rev_data/local/$i + fi + done + fi + + if [ ${doPki} -eq 1 ]; then + for i in ${linkPkiNistFiles}; do + if [ -f ${HOSTDIR}/rev_data/local/$i ]; then + rm -f ${HOSTDIR}/rev_data/local/$i + fi + done + fi + + return ${result} +} + +### ParseArgs +ParseArgs() # args +{ + while [ $# -gt 0 ]; do + if [ $1 = "-checkmem" ]; then + checkmem=1 + elif [ $1 = "-quiet" ]; then + quiet=1 + elif [ $1 = "-arenas" ]; then + arenas=1 + fi + shift + done +} + +Display() # string +{ + if [ ${quiet} -eq 0 ]; then + echo "$1" + fi +} + +testHeadingEcho() +{ + echo "*******************************************************************************" + echo "START OF TESTS FOR ${testunit}${memText}" + echo "*******************************************************************************" + echo "" +} + +testEndingEcho() +{ + if [ ${totalErrors} -eq 0 ]; then + echo "" + echo "************************************************************" + echo "END OF TESTS FOR ${testunit}: ALL TESTS COMPLETED SUCCESSFULLY" + echo "************************************************************" + echo "" + return 0 + fi + + if [ ${totalErrors} -eq 1 ]; then + plural="" + else + plural="S" + fi + + echo "" + echo "************************************************************" + echo "END OF TESTS FOR ${testunit}: ${totalErrors} TEST${plural} FAILED" + echo "************************************************************" + echo "" + return ${totalErrors} +} + +########### +# RunTests +########### +RunTests() +{ + errors=0 + memErrors=0 + prematureErrors=0 + + failedpgms="" + failedmempgms="" + failedprematurepgms="" + memText="" + arenaCmd="" + + if [ ${checkmem} -eq 1 ]; then + memText=" (Memory Checking Enabled)" + fi + + if [ ${arenas} -eq 1 ]; then + arenaCmd="-arenas" + fi + + # + # Announce start of tests + # + Display "*******************************************************************************" + Display "START OF TESTS FOR PKIX ${testunit} ${memText}" + Display "*******************************************************************************" + Display "" + + # run each test specified by the input redirection below + + while read testPgm args; do + + shortTestPurpose=`echo $args | awk '{print $1 " " $2 " "}'` + fullTestPurpose=${args} + if [ ${doTop} -eq 1 -o ${doModule} -eq 1 -o ${doPki} -eq 1 ]; then + testPurpose=${shortTestPurpose} + else + testPurpose=${fullTestPurpose} + fi + + # If we want shorter command printout for NIST tests, delete next line + testPurpose=${fullTestPurpose} + + # Skip OCSP tests if OCSP is not defined in the environment + if [ ${doOCSPTest} -eq 0 ]; then + hasOCSP=`echo ${args} | grep OCSP-Test` + if [ ! -z "${hasOCSP}" ]; then + Display "SKIPPING ${testPgm} ${testPurpose}" + continue + fi + fi + + if [ ${doNIST} -eq 0 ]; then + hasNIST=`echo ${args} | grep NIST-Test` + if [ ! -z "${hasNIST}" ]; then + Display "SKIPPING ${testPgm} ${testPurpose}" + continue + fi + fi + + # This "if" is not reached when doNIST is not set. The assumption + # is that NIST tests are basic, NIST Path Discovery tests are + # additional + if [ ${doNIST_PDTest} -eq 0 ]; then + hasNIST=`echo ${args} | grep NIST-PDTest` + if [ ! -z "${hasNIST}" ]; then + Display "SKIPPING ${testPgm} ${testPurpose}" + continue + fi + fi + + Display "RUNNING ${testPgm} ${arenaCmd} ${testPurpose}" + + numtests=`expr ${numtests} + 1` + + if [ ${checkmem} -eq 1 ]; then + dbx -C -c "runargs ${arenaCmd} ${args};check -all;run;exit" ${DIST_BIN}/${testPgm} > ${testOut} 2>&1 + else + ${DIST_BIN}/${testPgm} ${arenaCmd} ${args} > ${testOut} 2>&1 + fi + + # Examine output file to see if test failed and keep track of number + # of failures and names of failed tests. This assumes that the test + # uses our utility library for displaying information + + cat ${testOut} | tail -2 | grep "COMPLETED SUCCESSFULLY" >/dev/null 2>&1 + + if [ $? -ne 0 ]; then + testFail=1 + errors=`expr ${errors} + 1` + failedpgms="${failedpgms}\n${testPgm} ${testPurpose} " +# cat ${testOut} + else + testFail=0 + passed=`expr ${passed} + 1` + fi + cat ${testOut} + html_msg ${testFail} 0 "${testPgm} ${arenaCmd} ${shortTestPurpose}" + + if [ ${checkmem} -eq 1 ]; then + grep "(actual leaks:" ${testOut} > ${testOutMem} 2>&1 + if [ $? -ne 0 ]; then + prematureErrors=`expr ${prematureErrors} + 1` + failedprematurepgms="${failedprematurepgms}${testPgm} " + Display "...program terminated prematurely (unable to check for memory leak errors) ..." + else + #grep "(actual leaks: 0" ${testOut} > /dev/null 2>&1 + # special consideration for memory leak in NSS_NoDB_Init + grep "(actual leaks: 1 total size: 4 bytes)" ${testOut} > /dev/null 2>&1 + if [ $? -ne 0 ]; then + memErrors=`expr ${memErrors} + 1` + failedmempgms="${failedmempgms}${testPgm} " + cat ${testOutMem} + fi + fi + fi + + done + + if [ ${errors} -eq 0 ]; then + if [ ${memErrors} -eq 0 ]; then + Display "" + Display "************************************************************" + Display "END OF TESTS FOR PKIX ${testunit}: ALL TESTS COMPLETED SUCCESSFULLY" + Display "************************************************************" + Display "" + return 0 + fi + fi + + if [ ${errors} -eq 1 ]; then + plural="" + else + plural="S" + fi + + Display "" + Display "*******************************************************************************" + Display "END OF TESTS FOR PKIX ${testunit}: ${errors} UNIT TEST${plural} FAILED: ${failedpgms}" + Display "" + if [ ${checkmem} -eq 1 ]; then + if [ ${memErrors} -eq 1 ]; then + memPlural="" + else + memPlural="S" + fi + Display " ${memErrors} MEMORY LEAK TEST${memPlural} FAILED: ${failedmempgms}" + + if [ ${prematureErrors} -ne 0 ]; then + if [ ${prematureErrors} -eq 1 ]; then + prematurePlural="" + else + prematurePlural="S" + fi + Display " ${prematureErrors} MEMORY LEAK TEST${prematurePlural} INDETERMINATE: ${failedprematurepgms}" + fi + + fi + Display "*******************************************************************************" + Display "" + combinedErrors=`expr ${errors} + ${memErrors} + ${prematureErrors}` + + return ${combinedErrors} + +} diff --git a/security/nss/tests/libpkix/common/libpkix_init_nist.sh b/security/nss/tests/libpkix/common/libpkix_init_nist.sh new file mode 100644 index 0000000000..d4dfd2a6cf --- /dev/null +++ b/security/nss/tests/libpkix/common/libpkix_init_nist.sh @@ -0,0 +1,70 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# libpkix_init_nist.sh +# + +# +# Any test that uses NIST files should have a tag of either NIST-Test or +# NIST-Test-Files-Used at the command option so if there are no NIST files +# installed in the system, the test can be skipped +# + +if [ -z "${NIST_FILES_DIR}" ] ; then + Display "" + Display "*******************************************************************************" + Display "The environment variable NIST_FILES_DIR is not defined. Therefore" + Display "tests depending on it will be skipped. To enable these tests set" + Display "NIST_FILES_DIR to the directory where NIST Certificates and CRLs" + Display "are located." + Display "*******************************************************************************" + Display "" + doNIST=0 +else + + NIST=${NIST_FILES_DIR} + doNIST=1 +fi + +# +# Any tests that use NIST Path Discovery files should have a tag of NIST-PDTest +# at the command option so if there are no NIST Path Discovery files +# installed in the system, the test can be skipped +# +if [ ${doPD} -eq 1 -a -z "${PDVAL}" ] ; then + + Display "" + Display "*******************************************************************************" + Display "The environment variable PDVAL is not defined. Therefore tests" + Display "depending on it will be skipped. To enable these tests set PDVAL to" + Display "the directory where NIST Path Discovery Certificates are located." + Display "*******************************************************************************" + Display "" + doNIST_PDTest=0 +else + + NIST_PDTEST=${PDVAL} + doNIST_PDTest=1 +fi + +# +# Any tests that use an OCSP Server should have a tag of OCSP-Test at the +# command option so if there is no OCSP Server installed in the system, the +# test can be skipped +# +if [ ${doOCSP} -eq 1 -a -z "${OCSP}" ] ; then + + Display "" + Display "*******************************************************************************" + Display "The environment variable OCSP is not defined. Therefore tests" + Display "depending on it will be skipped. To enable these tests set OCSP" + Display "non-NULL (the actual URI used is taken from the AIA extension)." + Display "*******************************************************************************" + Display "" + doOCSPTest=0 +else + doOCSPTest=1 +fi diff --git a/security/nss/tests/libpkix/libpkix.sh b/security/nss/tests/libpkix/libpkix.sh new file mode 100755 index 0000000000..25d38ccbe1 --- /dev/null +++ b/security/nss/tests/libpkix/libpkix.sh @@ -0,0 +1,139 @@ +#! /bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# runTests.sh +# + +totalErrors=0 +pkixErrors=0 +pkixplErrors=0 +checkMemArg="" +arenasArg="" +quietArg="" +memText="" + +############################## libpkix_init ############################### +# local shell function to initialize this script +######################################################################## +libpkix_init() +{ + SCRIPTNAME="libpkix.sh" + if [ -z "${CLEANUP}" ] ; then # if nobody else is responsible for + CLEANUP="${SCRIPTNAME}" # cleaning this script will do it + fi + + LIBPKIX_CURDIR=`pwd` + if [ -z "${INIT_SOURCED}" -o "${INIT_SOURCED}" != "TRUE" ] ; then + cd ../common + . ./init.sh + fi + cd ${LIBPKIX_CURDIR} + + SCRIPTNAME="libpkix.sh" +} + +############################## libpkix_cleanup ############################ +# local shell function to finish this script (no exit since it might be +# sourced) +######################################################################## +libpkix_cleanup() +{ + html "
" + cd ${QADIR} + . common/cleanup.sh +} + +############################## libpkix_UT_main ############################ +# local shell function to run libpkix unit tests +######################################################################## +ParseArgs () +{ + while [ $# -gt 0 ]; do + if [ $1 == "-checkmem" ]; then + checkMemArg=$1 + memText=" (Memory Checking Enabled)" + elif [ $1 == "-quiet" ]; then + quietArg=$1 + elif [ $1 == "-arenas" ]; then + arenasArg=$1 + fi + shift + done +} + +libpkix_UT_main() +{ + +html_head "LIBPKIX Unit Tests" + +ParseArgs + +echo "*******************************************************************************" +echo "START OF ALL TESTS${memText}" +echo "*******************************************************************************" +echo "" + +echo "RUNNING tests in pkix_pl_test"; +html_msg 0 0 "Running tests in pkix_pl_test:" +cd pkix_pl_tests; +runPLTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +pkixplErrors=$? +html_msg $? 0 "Results of tests in pkix_pl_test" + +echo "RUNNING tests in pkix_test"; +html_msg 0 0 "Running tests in pkix_test:" +cd ../pkix_tests; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +pkixErrors=$? +html_msg $? 0 "Results of tests in pkix_test" + +echo "RUNNING performance tests in sample_apps"; +html_msg 0 0 "Running performance tests in sample_apps:" +cd ../sample_apps; +runPerf.sh ${arenasArg} ${checkMemArg} ${quietArg} +pkixPerfErrors=$? +html_msg $? 0 "Results of performance tests in sample_apps" + +totalErrors=`expr ${pkixErrors} + ${pkixplErrors} + ${pkixPerfErrors}` + +if [ ${totalErrors} -eq 0 ]; then + echo "" + echo "************************************************************" + echo "END OF ALL TESTS: ALL TESTS COMPLETED SUCCESSFULLY" + echo "************************************************************" + html_msg ${totalErrors} 0 "ALL LIBPKIX TESTS COMPLETED SUCCESSFULLY" + + return 0 +fi + +if [ ${totalErrors} -eq 1 ]; then + plural="" +else + plural="S" +fi + +if [ ${totalErrors} -ne 0 ]; then + echo "" + echo "************************************************************" + echo "END OF ALL TESTS: ${totalErrors} TEST${plural} FAILED" + echo "************************************************************" + html_msg 1 0 "${totalErrors} LIBPKIX TEST${plural} FAILED" +return 1 +fi +} + +libpkix_run_tests() +{ + if [ -n "${BUILD_LIBPKIX_TESTS}" ]; then + libpkix_UT_main + fi +} + +################## main ################################################# + +libpkix_init +libpkix_run_tests +libpkix_cleanup diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/cert8.db b/security/nss/tests/libpkix/pkix_pl_tests/module/cert8.db new file mode 100755 index 0000000000..f09bebbcfe Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/cert8.db differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/key3.db b/security/nss/tests/libpkix/pkix_pl_tests/module/key3.db new file mode 100755 index 0000000000..5c3b3ebbb0 Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/key3.db differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crldiff.crl b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crldiff.crl new file mode 100644 index 0000000000..d076ef89fb Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crldiff.crl differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crlgood.crl b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crlgood.crl new file mode 100644 index 0000000000..1ad019ed18 Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/crlgood.crl differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-hanfei.crl b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-hanfei.crl new file mode 100644 index 0000000000..6c9f0dbaa3 Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-hanfei.crl differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-none.crl b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-none.crl new file mode 100644 index 0000000000..c1c83ba2cd Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local/issuer-none.crl differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_all.crt b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_all.crt new file mode 100644 index 0000000000..89b59d17df Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_all.crt differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_allbutcodesigningEE.crt b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_allbutcodesigningEE.crt new file mode 100644 index 0000000000..a80c10cd32 Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_allbutcodesigningEE.crt differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauth.crt b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauth.crt new file mode 100644 index 0000000000..3cd7bc9bce Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauth.crt differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauthEE.crt b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauthEE.crt new file mode 100644 index 0000000000..b0119ed261 Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_clientauthEE.crt differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_codesigning_clientauth.crt b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_codesigning_clientauth.crt new file mode 100644 index 0000000000..f90df0daca Binary files /dev/null and b/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/test_eku_codesigning_clientauth.crt differ diff --git a/security/nss/tests/libpkix/pkix_pl_tests/module/runPLTests.sh b/security/nss/tests/libpkix/pkix_pl_tests/module/runPLTests.sh new file mode 100755 index 0000000000..4c4cebe284 --- /dev/null +++ b/security/nss/tests/libpkix/pkix_pl_tests/module/runPLTests.sh @@ -0,0 +1,101 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# runPLTests.sh +# + +curdir=`pwd` +cd ../../common +. ./libpkix_init.sh > /dev/null +. ./libpkix_init_nist.sh +cd ${curdir} + +numtests=0 +passed=0 +testunit=MODULE +doModule=1 + +### setup NIST files need to link in +linkModuleNistFiles="InvalidDNnameConstraintsTest3EE.crt + InvalidonlySomeReasonsTest21EE.crt + indirectCRLCA3cRLIssuerCRL.crl + nameConstraintsDN3subCA2Cert.crt + nameConstraintsDN4CACert.crt + nameConstraintsDN5CACert.crt + onlyContainsAttributeCertsCACRL.crl + onlyContainsCACertsCACRL.crl + onlyContainsUserCertsCACRL.crl + onlySomeReasonsCA3compromiseCRL.crl + requireExplicitPolicy2CACert.crt + inhibitPolicyMapping5CACert.crt + inhibitAnyPolicy5CACert.crt + inhibitAnyPolicy0CACert.crt + P1Mapping1to234CACert.crt + UserNoticeQualifierTest15EE.crt + UserNoticeQualifierTest16EE.crt + UserNoticeQualifierTest17EE.crt + UserNoticeQualifierTest18EE.crt + CPSPointerQualifierTest20EE.crt" + +if [ -n "${NIST_FILES_DIR}" ]; then + if [ ! -d ${HOSTDIR}/rev_data/local ]; then + mkdir -p ${HOSTDIR}/rev_data/local + fi + + for i in ${linkModuleNistFiles}; do + if [ -f ${HOSTDIR}/rev_data/local/$i ]; then + rm ${HOSTDIR}/rev_data/local/$i + fi + cp ${NIST_FILES_DIR}/$i ${HOSTDIR}/rev_data/local/$i + done + + localCRLFiles="crlgood.crl + crldiff.crl + issuer-hanfei.crl + issuer-none.crl" + + for i in ${localCRLFiles}; do + cp ${curdir}/rev_data/local/$i ${HOSTDIR}/rev_data/local/$i + done +fi + +########## +# main +########## + +ParseArgs $* + +SOCKETTRACE=0 +export SOCKETTRACE + +RunTests < /dev/null +doPD=1 +. ./libpkix_init_nist.sh +cd ${curdir} + +numtests=0 +passed=0 +testunit=PKI +doPki=1 + +### setup NIST files need to link in +linkPkiNistFiles="InvalidDNnameConstraintsTest3EE.crt + InvalidonlySomeReasonsTest21EE.crt + indirectCRLCA3cRLIssuerCRL.crl + nameConstraintsDN3subCA2Cert.crt + nameConstraintsDN4CACert.crt + nameConstraintsDN5CACert.crt + onlyContainsAttributeCertsCACRL.crl + onlyContainsCACertsCACRL.crl + onlyContainsUserCertsCACRL.crl + onlySomeReasonsCA3compromiseCRL.crl + requireExplicitPolicy2CACert.crt + inhibitPolicyMapping5CACert.crt + inhibitAnyPolicy5CACert.crt + inhibitAnyPolicy0CACert.crt + P1Mapping1to234CACert.crt + UserNoticeQualifierTest15EE.crt + UserNoticeQualifierTest16EE.crt + UserNoticeQualifierTest17EE.crt + UserNoticeQualifierTest18EE.crt + CPSPointerQualifierTest20EE.crt" + +if [ -n "${NIST_FILES_DIR}" ]; then + if [ ! -d ${HOSTDIR}/rev_data/local ]; then + mkdir -p ${HOSTDIR}/rev_data/local + fi + + for i in ${linkPkiNistFiles}; do + if [ -f ${HOSTDIR}/rev_data/local/$i ]; then + rm ${HOSTDIR}/rev_data/local/$i + fi + cp ${NIST_FILES_DIR}/$i ${HOSTDIR}/rev_data/local/$i + done +fi + +########## +# main +######### + +TZ=US/Eastern + +ParseArgs $* + +RunTests < /dev/null +cd ${curdir} + +testunit="PKIX_PL" + +totalErrors=0 +moduleErrors=0 +systemErrors=0 +pkiErrors=0 +quiet=0 + +checkMemArg="" +arenasArg="" +quietArg="" + +### ParseArgs +myParseArgs() # args +{ + while [ $# -gt 0 ]; do + if [ $1 = "-checkmem" ]; then + checkMemArg=$1 + elif [ $1 = "-quiet" ]; then + quietArg=$1 + quiet=1 + elif [ $1 = "-arenas" ]; then + arenasArg=$1 + fi + shift + done +} + +myParseArgs $* + +testHeadingEcho + +echo "RUNNING tests in pki"; +cd pki; +runPLTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +pkiErrors=$? + +echo "RUNNING tests in system"; +cd ../system; +runPLTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +systemErrors=$? + +echo "RUNNING tests in module"; +cd ../module; +runPLTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +moduleErrors=$? + +totalErrors=`expr $moduleErrors + $systemErrors + $pkiErrors` + +testEndingEcho + +exit ${totalErrors} + diff --git a/security/nss/tests/libpkix/pkix_pl_tests/system/runPLTests.sh b/security/nss/tests/libpkix/pkix_pl_tests/system/runPLTests.sh new file mode 100755 index 0000000000..ec166cd084 --- /dev/null +++ b/security/nss/tests/libpkix/pkix_pl_tests/system/runPLTests.sh @@ -0,0 +1,46 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# runPLTests.sh +# + +curdir=`pwd` +cd ../../common +. ./libpkix_init.sh > /dev/null +cd ${curdir} + +numtests=0 +passed=0 +testunit=SYSTEM + + +########## +# main +########## + +ParseArgs $* + +RunTests < /dev/null +. ./libpkix_init_nist.sh +cd ${curdir} + +numtests=0 +passed=0 +testunit=CERTSEL + +########## +# main +########## + +ParseArgs $* + +RunTests < /dev/null +cd ${curdir} + +numtests=0 +passed=0 +testunit=CHECKER + +########## +# main +########## + +ParseArgs $* + +RunTests < /dev/null +cd ${curdir} + +numtests=0 +passed=0 +testunit=CRLSEL + + +########## +# main +########## + +ParseArgs $* + +RunTests < /dev/null +. ./libpkix_init_nist.sh +cd ${curdir} + +numtests=0 +passed=0 +testunit=PARAMS + + +########## +# main +########## + +ParseArgs $* + +RunTests < /dev/null +. ./libpkix_init_nist.sh +cd ${curdir} + +numtests=0 +passed=0 +testunit=RESULTS + + +########## +# main +########## + +ParseArgs $* + +RunTests < /dev/null +cd ${curdir} + +testunit="PKIX" + +totalErrors=0 +utilErrors=0 +crlselErrors=0 +paramsErrors=0 +resultsErrors=0 +topErrors=0 +checkerErrors=0 +certselErrors=0 +quiet=0 + +checkMemArg="" +arenasArg="" +quietArg="" +memText="" + +### ParseArgs +ParseArgs() # args +{ + while [ $# -gt 0 ]; do + if [ $1 = "-checkmem" ]; then + checkMemArg=$1 + memText=" (Memory Checking Enabled)" + elif [ $1 = "-quiet" ]; then + quietArg=$1 + quiet=1 + elif [ $1 = "-arenas" ]; then + arenasArg=$1 + fi + shift + done +} + +ParseArgs $* + +testHeadingEcho + +echo "RUNNING tests in certsel"; +cd certsel; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +certselErrors=$? + +echo "RUNNING tests in checker"; +cd ../checker; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +checkerErrors=$? + +echo "RUNNING tests in results"; +cd ../results; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +resultsErrors=$? + +echo "RUNNING tests in params"; +cd ../params; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +paramsErrors=$? + +echo "RUNNING tests in crlsel"; +cd ../crlsel; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +crlselErrors=$? + +echo "RUNNING tests in store"; +cd ../store; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +storeErrors=$? + +echo "RUNNING tests in util"; +cd ../util; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +utilErrors=$? + +echo "RUNNING tests in top"; +cd ../top; +runTests.sh ${arenasArg} ${checkMemArg} ${quietArg} +topErrors=$? + +totalErrors=`expr ${certselErrors} + ${checkerErrors} + ${resultsErrors} + ${paramsErrors} + ${crlselErrors} + ${storeErrors} + ${utilErrors} + ${topErrors}` + +testEndingEcho + +exit ${totalErrors} + diff --git a/security/nss/tests/libpkix/pkix_tests/store/runTests.sh b/security/nss/tests/libpkix/pkix_tests/store/runTests.sh new file mode 100755 index 0000000000..7b0bb3745c --- /dev/null +++ b/security/nss/tests/libpkix/pkix_tests/store/runTests.sh @@ -0,0 +1,32 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# runTests.sh +# + +curdir=`pwd` +cd ../../common +. ./libpkix_init.sh > /dev/null +cd ${curdir} + +numtests=0 +passed=0 +testunit=STORE + + +########## +# main +########## + +ParseArgs $* + +RunTests < /dev/null +doPD=1 +doOCSP=1 +. ./libpkix_init_nist.sh +cd ${curdir} + +numtests=0 +passed=0 +testunit=TOP +doTop=1 +linkMStoreNistFiles="store1/TrustAnchorRootCRL.crl + store1/TwoCRLsCABadCRL.crl + store2/TwoCRLsCAGoodCRL.crl" + +if [ ! -z "${NIST_FILES_DIR}" ] ; then + if [ -d ${HOSTDIR}/rev_data/multiple_certstores ]; then + rm -fr ${HOSTDIR}/rev_data/multiple_certstores + fi + mkdir -p ${HOSTDIR}/rev_data/multiple_certstores + mkdir -p ${HOSTDIR}/rev_data/multiple_certstores/store1 + mkdir -p ${HOSTDIR}/rev_data/multiple_certstores/store2 + for i in ${linkMStoreNistFiles}; do + if [ -f ${HOSTDIR}/rev_data/multiple_certstores/$i ]; then + rm ${HOSTDIR}/rev_data/multiple_certstores/$i + fi + fname=`basename $i` + cp ${NIST_FILES_DIR}/${fname} ${HOSTDIR}/rev_data/multiple_certstores/$i + done +fi + +ocspFiles="goodcert.crt revokedcert.crt anchorcert.crt + secmod.db key3.db cert8.db" + +if [ ! -z ${doOCSPTest} ] ; then + if [ -d ${HOSTDIR}/ocsp ]; then + rm -fr ${HOSTDIR}/ocsp + fi + mkdir -p ${HOSTDIR}/ocsp + for i in ${ocspFiles}; do + cp $i ${HOSTDIR}/ocsp/$i + + done +fi + +########## +# main +########## + +ParseArgs $* + +Display "" +Display "# ENE = expect no error (validation should succeed)" +Display "# EE = expect error (validation should fail)" +Display "" + +LOGGING=1 +SOCKETTRACE=1 +export LOGGING SOCKETTRACE + +RunTests < /dev/null +cd ${curdir} + +numtests=0 +passed=0 +testunit=UTIL + +########## +# main +########## + +ParseArgs $* + +RunTests < + Parses a certificate located at and displays it. + +Source: /tests/sample_apps/dumpcert.c +Binary: /bin/sample_apps/dumpcert + +============================================================================ + +USAGE: dumpcrl + Parses a CRL located at and displays it. + +Source: /tests/sample_apps/dumpcrl.c +Binary: /bin/sample_apps/dumpcrl + +============================================================================ + +USAGE: validateChain ... + Validates a chain of n certificates using the given trust anchor. + +Source: /tests/sample_apps/validateChain.c +Binary: /bin/sample_apps/validateChain + +============================================================================ + +PERFORMANCE EVALUATION APPLICATIONS + +============================================================================ + +USAGE: libpkix_buildthreads + + Sets up and runs a PKIX_BuildChain call for the number of seconds + specified by using the number of threads specified by + . This application assumes that the NSS certutil application + has already been run to create the NSS databases and that the + various nicknames on the command line have been associated with + certificates in the NSS databases. The NSS databases MUST reside + in the directory where this file is located and MUST be named + "cert8.db", "key3.db", and "secmod.db". There must exist a nickname + in the databases which has been marked as trusted. + +Source: /perf/libpkix_buildthreads/libpkix_buildthreads.c +Binary: /perf/libpkix_buildthreads/*.OBJ/libpkix_buildthreads + +============================================================================ + +USAGE: nssThreads + + Sets up and runs a CERT_VerifyCertificate call for the number of + seconds specified by using the number of threads specified + by . This application assumes that the NSS certutil + application has already been run to create the NSS databases and that + the various nicknames on the command line have been associated with + certificates in the NSS databases. The NSS databases MUST reside + in the directory where this file is located and MUST be named + "cert8.db", "key3.db", and "secmod.db". There must exist a nickname in + the databases which has been marked as trusted. + +Source: /perf/nss_threads/nss_threads.c +Binary: /perf/nss_threads/*.OBJ/nss_threads + +============================================================================ + diff --git a/security/nss/tests/libpkix/sample_apps/cert8.db b/security/nss/tests/libpkix/sample_apps/cert8.db new file mode 100755 index 0000000000..b39de42f18 Binary files /dev/null and b/security/nss/tests/libpkix/sample_apps/cert8.db differ diff --git a/security/nss/tests/libpkix/sample_apps/key3.db b/security/nss/tests/libpkix/sample_apps/key3.db new file mode 100755 index 0000000000..9c03916ee8 Binary files /dev/null and b/security/nss/tests/libpkix/sample_apps/key3.db differ diff --git a/security/nss/tests/libpkix/sample_apps/runPerf.sh b/security/nss/tests/libpkix/sample_apps/runPerf.sh new file mode 100755 index 0000000000..27b55215e3 --- /dev/null +++ b/security/nss/tests/libpkix/sample_apps/runPerf.sh @@ -0,0 +1,143 @@ +#!/bin/sh +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# runPerf.sh +# + +curdir=`pwd` +cd ../common +. ./libpkix_init.sh > /dev/null +cd ${curdir} + +numtests=0 +passed=0 +testunit=PERFORMANCE + +totalErrors=0 +loopErrors=0 + +ParseArgs $* + +testHeadingEcho + +Display "\nRunning executables at ${DIST_BIN}" +Display "Using libraries at ${LD_LIBRARY_PATH}" + + +# Check the performance data ... +perfTest() +{ + + Display "" + Display "*******************************************************************************" + Display "START OF PKIX PERFORMANCE SCENARIOS ${memText}" +Display "*******************************************************************************" + Display "" + + while read perfPgm args; do + numtests=`expr ${numtests} + 1` + Display "Running ${perfPgm} ${args}" + if [ ${checkmem} -eq 1 ]; then + dbx -C -c "runargs $args; check -all ;run;exit" ${DIST_BIN}/${perfPgm} > ${testOut} 2>&1 + else + ${DIST_BIN}/${perfPgm} ${args} > ${testOut} 2>&1 + fi + + # Examine output file to see if test failed and keep track of number + # of failures and names of failed tests. This assumes that the test + # uses our utility library for displaying information + + outputCount=`cat ${testOut} | grep "per second"` + + if [ $? -ne 0 ]; then + errors=`expr ${errors} + 1` + failedpgms="${failedpgms}${perfPgm} ${args}\n" + cat ${testOut} + else + Display ${outputCount} + passed=`expr ${passed} + 1` + fi + + if [ ${checkmem} -eq 1 ]; then + grep "(actual leaks:" ${testOut} > ${testOutMem} 2>&1 + if [ $? -ne 0 ]; then + prematureErrors=`expr ${prematureErrors} + 1` + failedprematurepgms="${failedprematurepgms}${perfPgm} " + Display "...program terminated prematurely (unable to check for memory leak errors) ..." + else + grep "(actual leaks: 1 total size: 4 bytes)" ${testOut} > /dev/null 2>&1 + if [ $? -ne 0 ]; then + memErrors=`expr ${memErrors} + 1` + failedmempgms="${failedmempgms}${perfPgm} " + Display ${testOutMem} + fi + fi + fi + done + return ${errors} +} + + +# If there is race condition bug, may this test catch it... +loopTest() +{ + totalLoop=10 + + Display "" + Display "*******************************************************************************" + Display "START OF TESTS FOR PKIX PERFORMANCE SANITY LOOP (${totalLoop} times)" +Display "*******************************************************************************" + Display "" + + errors=0 + iLoop=0 + perfPgm="${DIST_BIN}/pkixutil libpkix_buildthreads -d . 5 8 ValidCertificatePathTest1EE" + + while [ $iLoop -lt $totalLoop ] + do + iLoop=`expr $iLoop + 1` + numtests=`expr ${numtests} + 1` + + Display "Running ${perfPgm}" + ${perfPgm} > ${testOut} 2>&1 + Display `cat ${testOut} | grep "per second"` + + outputCount=`cat ${testOut} | grep "per second"` + + if [ $? -ne 0 ]; then + errors=`expr ${errors} + 1` + failedpgms="${failedpgms} ${perfPgm}\n" + cat ${testOut} + else + passed=`expr ${passed} + 1` + fi + done + + return ${errors} + +} + +#main +perfTest <