mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-10 18:00:15 +01:00
44b7f056d9
bug1001332, 56b691c003ad, bug1086145, bug1054069, bug1155922, bug991783, bug1125025, bug1162521, bug1162644, bug1132941, bug1164364, bug1166205, bug1166163, bug1166515, bug1138554, bug1167046, bug1167043, bug1169451, bug1172128, bug1170322, bug102794, bug1128184, bug557830, bug1174648, bug1180244, bug1177784, bug1173413, bug1169174, bug1084669, bug951455, bug1183395, bug1177430, bug1183827, bug1160139, bug1154106, bug1142209, bug1185033, bug1193467, bug1182667(with sha512 changes backed out, which breaks VC6 compilation), bug1158489, bug337796
2030 lines
70 KiB
Bash
2030 lines
70 KiB
Bash
#! /bin/bash
|
|
#
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
########################################################################
|
|
#
|
|
# mozilla/security/nss/tests/cert/rcert.sh
|
|
#
|
|
# Certificate generating and handeling for NSS QA, can be included
|
|
# multiple times from all.sh and the individual scripts
|
|
#
|
|
# needs to work on all Unix and Windows platforms
|
|
#
|
|
# included from (don't expect this to be up to date)
|
|
# --------------------------------------------------
|
|
# all.sh
|
|
# ssl.sh
|
|
# smime.sh
|
|
# tools.sh
|
|
#
|
|
# special strings
|
|
# ---------------
|
|
# FIXME ... known problems, search for this string
|
|
# NOTE .... unexpected behavior
|
|
#
|
|
# FIXME - Netscape - NSS
|
|
########################################################################
|
|
|
|
############################## cert_init ###############################
|
|
# local shell function to initialize this script
|
|
########################################################################
|
|
cert_init()
|
|
{
|
|
SCRIPTNAME="cert.sh"
|
|
if [ -z "${CLEANUP}" ] ; then # if nobody else is responsible for
|
|
CLEANUP="${SCRIPTNAME}" # cleaning this script will do it
|
|
fi
|
|
if [ -z "${INIT_SOURCED}" ] ; then
|
|
cd ../common
|
|
. ./init.sh
|
|
fi
|
|
if [ -z "${IOPR_CERT_SOURCED}" ]; then
|
|
. ../iopr/cert_iopr.sh
|
|
fi
|
|
SCRIPTNAME="cert.sh"
|
|
CRL_GRP_DATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
html_head "Certutil and Crlutil Tests with ECC"
|
|
else
|
|
html_head "Certutil and Crlutil Tests"
|
|
fi
|
|
|
|
LIBDIR="${DIST}/${OBJDIR}/lib"
|
|
|
|
ROOTCERTSFILE=`ls -1 ${LIBDIR}/*nssckbi* | head -1`
|
|
if [ ! "${ROOTCERTSFILE}" ] ; then
|
|
html_failed "Looking for root certs module."
|
|
cert_log "ERROR: Root certs module not found."
|
|
Exit 5 "Fatal - Root certs module not found."
|
|
else
|
|
html_passed "Looking for root certs module."
|
|
fi
|
|
|
|
if [ "${OS_ARCH}" = "WINNT" -a "$OS_NAME" = "CYGWIN_NT" ]; then
|
|
ROOTCERTSFILE=`cygpath -m ${ROOTCERTSFILE}`
|
|
fi
|
|
}
|
|
|
|
cert_log() ###################### write the cert_status file
|
|
{
|
|
echo "$SCRIPTNAME $*"
|
|
echo $* >>${CERT_LOG_FILE}
|
|
}
|
|
|
|
########################################################################
|
|
# function wraps calls to pk12util, also: writes action and options
|
|
# to stdout.
|
|
# Params are the same as to pk12util.
|
|
# Returns pk12util status
|
|
#
|
|
pk12u()
|
|
{
|
|
echo "${CU_ACTION} --------------------------"
|
|
|
|
echo "pk12util $@"
|
|
${BINDIR}/pk12util $@
|
|
RET=$?
|
|
|
|
return $RET
|
|
}
|
|
|
|
################################ certu #################################
|
|
# local shell function to call certutil, also: writes action and options to
|
|
# stdout, sets variable RET and writes results to the html file results
|
|
########################################################################
|
|
certu()
|
|
{
|
|
echo "$SCRIPTNAME: ${CU_ACTION} --------------------------"
|
|
EXPECTED=${RETEXPECTED-0}
|
|
|
|
if [ -n "${CU_SUBJECT}" ]; then
|
|
#the subject of the cert contains blanks, and the shell
|
|
#will strip the quotes off the string, if called otherwise...
|
|
echo "certutil -s \"${CU_SUBJECT}\" $*"
|
|
${PROFTOOL} ${BINDIR}/certutil -s "${CU_SUBJECT}" $*
|
|
RET=$?
|
|
CU_SUBJECT=""
|
|
else
|
|
echo "certutil $*"
|
|
${PROFTOOL} ${BINDIR}/certutil $*
|
|
RET=$?
|
|
fi
|
|
if [ "$RET" -ne "$EXPECTED" ]; then
|
|
CERTFAILED=$RET
|
|
html_failed "${CU_ACTION} ($RET=$EXPECTED) "
|
|
cert_log "ERROR: ${CU_ACTION} failed $RET"
|
|
else
|
|
html_passed "${CU_ACTION}"
|
|
fi
|
|
|
|
return $RET
|
|
}
|
|
|
|
################################ crlu #################################
|
|
# local shell function to call crlutil, also: writes action and options to
|
|
# stdout, sets variable RET and writes results to the html file results
|
|
########################################################################
|
|
crlu()
|
|
{
|
|
echo "$SCRIPTNAME: ${CU_ACTION} --------------------------"
|
|
|
|
CRLUTIL="crlutil -q"
|
|
echo "$CRLUTIL $*"
|
|
${PROFTOOL} ${BINDIR}/$CRLUTIL $*
|
|
RET=$?
|
|
if [ "$RET" -ne 0 ]; then
|
|
CRLFAILED=$RET
|
|
html_failed "${CU_ACTION} ($RET) "
|
|
cert_log "ERROR: ${CU_ACTION} failed $RET"
|
|
else
|
|
html_passed "${CU_ACTION}"
|
|
fi
|
|
|
|
return $RET
|
|
}
|
|
|
|
################################ ocspr ##################################
|
|
# local shell function to call ocsresp, also: writes action and options to
|
|
# stdout, sets variable RET and writes results to the html file results
|
|
#########################################################################
|
|
ocspr()
|
|
{
|
|
echo "$SCRIPTNAME: ${OR_ACTION} --------------------------"
|
|
|
|
OCSPRESP="ocspresp"
|
|
echo "$OCSPRESP $*"
|
|
${PROFTOOL} ${BINDIR}/$OCSPRESP $*
|
|
RET=$?
|
|
if [ "$RET" -ne 0 ]; then
|
|
OCSPFAILED=$RET
|
|
html_failed "${OR_ACTION} ($RET) "
|
|
cert_log "ERROR: ${OR_ACTION} failed $RET"
|
|
else
|
|
html_passed "${OR_ACTION}"
|
|
fi
|
|
|
|
return $RET
|
|
}
|
|
|
|
modu()
|
|
{
|
|
echo "$SCRIPTNAME: ${CU_ACTION} --------------------------"
|
|
|
|
MODUTIL="modutil"
|
|
echo "$MODUTIL $*"
|
|
# echo is used to press Enter expected by modutil
|
|
echo | ${BINDIR}/$MODUTIL $*
|
|
RET=$?
|
|
if [ "$RET" -ne 0 ]; then
|
|
MODFAILED=$RET
|
|
html_failed "${CU_ACTION} ($RET) "
|
|
cert_log "ERROR: ${CU_ACTION} failed $RET"
|
|
else
|
|
html_passed "${CU_ACTION}"
|
|
fi
|
|
|
|
return $RET
|
|
}
|
|
|
|
############################# cert_init_cert ##########################
|
|
# local shell function to initialize creation of client and server certs
|
|
########################################################################
|
|
cert_init_cert()
|
|
{
|
|
CERTDIR="$1"
|
|
CERTNAME="$2"
|
|
CERTSERIAL="$3"
|
|
DOMAIN="$4"
|
|
|
|
if [ ! -d "${CERTDIR}" ]; then
|
|
mkdir -p "${CERTDIR}"
|
|
else
|
|
echo "$SCRIPTNAME: WARNING - ${CERTDIR} exists"
|
|
fi
|
|
cd "${CERTDIR}"
|
|
CERTDIR="."
|
|
|
|
PROFILEDIR=`cd ${CERTDIR}; pwd`
|
|
if [ "${OS_ARCH}" = "WINNT" -a "$OS_NAME" = "CYGWIN_NT" ]; then
|
|
PROFILEDIR=`cygpath -m ${PROFILEDIR}`
|
|
fi
|
|
if [ -n "${MULTIACCESS_DBM}" ]; then
|
|
PROFILEDIR="multiaccess:${DOMAIN}"
|
|
fi
|
|
|
|
noise
|
|
}
|
|
|
|
############################# hw_acc #################################
|
|
# local shell function to add hw accelerator modules to the db
|
|
########################################################################
|
|
hw_acc()
|
|
{
|
|
HW_ACC_RET=0
|
|
HW_ACC_ERR=""
|
|
if [ -n "$O_HWACC" -a "$O_HWACC" = ON -a -z "$USE_64" ] ; then
|
|
echo "creating $CERTNAME s cert with hwaccelerator..."
|
|
#case $ACCELERATOR in
|
|
#rainbow)
|
|
|
|
echo "modutil -add rainbow -libfile /usr/lib/libcryptoki22.so "
|
|
echo " -dbdir ${PROFILEDIR} 2>&1 "
|
|
echo | ${BINDIR}/modutil -add rainbow -libfile /usr/lib/libcryptoki22.so \
|
|
-dbdir ${PROFILEDIR} 2>&1
|
|
if [ "$?" -ne 0 ]; then
|
|
echo "modutil -add rainbow failed in `pwd`"
|
|
HW_ACC_RET=1
|
|
HW_ACC_ERR="modutil -add rainbow"
|
|
fi
|
|
|
|
echo "modutil -add ncipher "
|
|
echo " -libfile /opt/nfast/toolkits/pkcs11/libcknfast.so "
|
|
echo " -dbdir ${PROFILEDIR} 2>&1 "
|
|
echo | ${BINDIR}/modutil -add ncipher \
|
|
-libfile /opt/nfast/toolkits/pkcs11/libcknfast.so \
|
|
-dbdir ${PROFILEDIR} 2>&1
|
|
if [ "$?" -ne 0 ]; then
|
|
echo "modutil -add ncipher failed in `pwd`"
|
|
HW_ACC_RET=`expr $HW_ACC_RET + 2`
|
|
HW_ACC_ERR="$HW_ACC_ERR,modutil -add ncipher"
|
|
fi
|
|
if [ "$HW_ACC_RET" -ne 0 ]; then
|
|
html_failed "Adding HW accelerators to certDB for ${CERTNAME} ($HW_ACC_RET) "
|
|
else
|
|
html_passed "Adding HW accelerators to certDB for ${CERTNAME}"
|
|
fi
|
|
|
|
fi
|
|
return $HW_ACC_RET
|
|
}
|
|
|
|
############################# cert_create_cert #########################
|
|
# local shell function to create client certs
|
|
# initialize DB, import
|
|
# root cert
|
|
# add cert to DB
|
|
########################################################################
|
|
cert_create_cert()
|
|
{
|
|
cert_init_cert "$1" "$2" "$3" "$4"
|
|
|
|
CU_ACTION="Initializing ${CERTNAME}'s Cert DB"
|
|
certu -N -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Loading root cert module to ${CERTNAME}'s Cert DB"
|
|
modu -add "RootCerts" -libfile "${ROOTCERTSFILE}" -dbdir "${PROFILEDIR}" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
hw_acc
|
|
|
|
CU_ACTION="Import Root CA for $CERTNAME"
|
|
certu -A -n "TestCA" -t "TC,TC,TC" -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${R_CADIR}/TestCA.ca.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Import DSA Root CA for $CERTNAME"
|
|
certu -A -n "TestCA-dsa" -t "TC,TC,TC" -f "${R_PWFILE}" \
|
|
-d "${PROFILEDIR}" -i "${R_CADIR}/TestCA-dsa.ca.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Import EC Root CA for $CERTNAME"
|
|
certu -A -n "TestCA-ec" -t "TC,TC,TC" -f "${R_PWFILE}" \
|
|
-d "${PROFILEDIR}" -i "${R_CADIR}/TestCA-ec.ca.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
fi
|
|
|
|
cert_add_cert "$5"
|
|
return $?
|
|
}
|
|
|
|
############################# cert_add_cert ############################
|
|
# local shell function to add client certs to an existing CERT DB
|
|
# generate request
|
|
# sign request
|
|
# import Cert
|
|
#
|
|
########################################################################
|
|
cert_add_cert()
|
|
{
|
|
CU_ACTION="Generate Cert Request for $CERTNAME"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -f "${R_PWFILE}" -z "${R_NOISE_FILE}" -o req 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s Request"
|
|
certu -C -c "TestCA" -m "$CERTSERIAL" -v 60 -d "${P_R_CADIR}" \
|
|
-i req -o "${CERTNAME}.cert" -f "${R_PWFILE}" "$1" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Import $CERTNAME's Cert"
|
|
certu -A -n "$CERTNAME" -t "u,u,u" -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-i "${CERTNAME}.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
cert_log "SUCCESS: $CERTNAME's Cert Created"
|
|
|
|
#
|
|
# Generate and add DSA cert
|
|
#
|
|
CU_ACTION="Generate DSA Cert Request for $CERTNAME"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -k dsa -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s DSA Request"
|
|
certu -C -c "TestCA-dsa" -m "$CERTSERIAL" -v 60 -d "${P_R_CADIR}" \
|
|
-i req -o "${CERTNAME}-dsa.cert" -f "${R_PWFILE}" "$1" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Import $CERTNAME's DSA Cert"
|
|
certu -A -n "${CERTNAME}-dsa" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-dsa.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
cert_log "SUCCESS: $CERTNAME's DSA Cert Created"
|
|
|
|
# Generate DSA certificate signed with RSA
|
|
CU_ACTION="Generate mixed DSA Cert Request for $CERTNAME"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -k dsa -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s DSA Request with RSA"
|
|
# Avoid conflicting serial numbers with TestCA issuer by keeping
|
|
# this set far away. A smaller number risks colliding with the
|
|
# extended ssl user certificates.
|
|
NEWSERIAL=`expr ${CERTSERIAL} + 20000`
|
|
certu -C -c "TestCA" -m "$NEWSERIAL" -v 60 -d "${P_R_CADIR}" \
|
|
-i req -o "${CERTNAME}-dsamixed.cert" -f "${R_PWFILE}" "$1" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Import $CERTNAME's mixed DSA Cert"
|
|
certu -A -n "${CERTNAME}-dsamixed" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-dsamixed.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
cert_log "SUCCESS: $CERTNAME's mixed DSA Cert Created"
|
|
|
|
#
|
|
# Generate and add EC cert
|
|
#
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CURVE="secp384r1"
|
|
CU_ACTION="Generate EC Cert Request for $CERTNAME"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -k ec -q "${CURVE}" -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s EC Request"
|
|
certu -C -c "TestCA-ec" -m "$CERTSERIAL" -v 60 -d "${P_R_CADIR}" \
|
|
-i req -o "${CERTNAME}-ec.cert" -f "${R_PWFILE}" "$1" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Import $CERTNAME's EC Cert"
|
|
certu -A -n "${CERTNAME}-ec" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-ec.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
cert_log "SUCCESS: $CERTNAME's EC Cert Created"
|
|
|
|
# Generate EC certificate signed with RSA
|
|
CU_ACTION="Generate mixed EC Cert Request for $CERTNAME"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -k ec -q "${CURVE}" -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s EC Request with RSA"
|
|
# Avoid conflicting serial numbers with TestCA issuer by keeping
|
|
# this set far away. A smaller number risks colliding with the
|
|
# extended ssl user certificates.
|
|
NEWSERIAL=`expr ${CERTSERIAL} + 10000`
|
|
certu -C -c "TestCA" -m "$NEWSERIAL" -v 60 -d "${P_R_CADIR}" \
|
|
-i req -o "${CERTNAME}-ecmixed.cert" -f "${R_PWFILE}" "$1" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
CU_ACTION="Import $CERTNAME's mixed EC Cert"
|
|
certu -A -n "${CERTNAME}-ecmixed" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-ecmixed.cert" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
cert_log "SUCCESS: $CERTNAME's mixed EC Cert Created"
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
################################# cert_all_CA ################################
|
|
# local shell function to build the additional Temp. Certificate Authority (CA)
|
|
# used for the "real life" ssl test with 2 different CA's in the
|
|
# client and in the server's dir
|
|
##########################################################################
|
|
cert_all_CA()
|
|
{
|
|
echo nss > ${PWFILE}
|
|
|
|
ALL_CU_SUBJECT="CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
cert_CA $CADIR TestCA -x "CTu,CTu,CTu" ${D_CA} "1"
|
|
|
|
ALL_CU_SUBJECT="CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_CA $SERVER_CADIR serverCA -x "Cu,Cu,Cu" ${D_SERVER_CA} "2"
|
|
ALL_CU_SUBJECT="CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_CA $SERVER_CADIR chain-1-serverCA "-c serverCA" "u,u,u" ${D_SERVER_CA} "3"
|
|
ALL_CU_SUBJECT="CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_CA $SERVER_CADIR chain-2-serverCA "-c chain-1-serverCA" "u,u,u" ${D_SERVER_CA} "4"
|
|
|
|
|
|
|
|
ALL_CU_SUBJECT="CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_CA $CLIENT_CADIR clientCA -x "Tu,Cu,Cu" ${D_CLIENT_CA} "5"
|
|
ALL_CU_SUBJECT="CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_CA $CLIENT_CADIR chain-1-clientCA "-c clientCA" "u,u,u" ${D_CLIENT_CA} "6"
|
|
ALL_CU_SUBJECT="CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_CA $CLIENT_CADIR chain-2-clientCA "-c chain-1-clientCA" "u,u,u" ${D_CLIENT_CA} "7"
|
|
|
|
rm $CLIENT_CADIR/root.cert $SERVER_CADIR/root.cert
|
|
|
|
# root.cert in $CLIENT_CADIR and in $SERVER_CADIR is one of the last
|
|
# in the chain
|
|
|
|
|
|
#
|
|
# Create DSA version of TestCA
|
|
ALL_CU_SUBJECT="CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
cert_dsa_CA $CADIR TestCA-dsa -x "CTu,CTu,CTu" ${D_CA} "1"
|
|
#
|
|
# Create DSA versions of the intermediate CA certs
|
|
ALL_CU_SUBJECT="CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_dsa_CA $SERVER_CADIR serverCA-dsa -x "Cu,Cu,Cu" ${D_SERVER_CA} "2"
|
|
ALL_CU_SUBJECT="CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_dsa_CA $SERVER_CADIR chain-1-serverCA-dsa "-c serverCA-dsa" "u,u,u" ${D_SERVER_CA} "3"
|
|
ALL_CU_SUBJECT="CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_dsa_CA $SERVER_CADIR chain-2-serverCA-dsa "-c chain-1-serverCA-dsa" "u,u,u" ${D_SERVER_CA} "4"
|
|
|
|
ALL_CU_SUBJECT="CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_dsa_CA $CLIENT_CADIR clientCA-dsa -x "Tu,Cu,Cu" ${D_CLIENT_CA} "5"
|
|
ALL_CU_SUBJECT="CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_dsa_CA $CLIENT_CADIR chain-1-clientCA-dsa "-c clientCA-dsa" "u,u,u" ${D_CLIENT_CA} "6"
|
|
ALL_CU_SUBJECT="CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_dsa_CA $CLIENT_CADIR chain-2-clientCA-dsa "-c chain-1-clientCA-dsa" "u,u,u" ${D_CLIENT_CA} "7"
|
|
|
|
rm $CLIENT_CADIR/dsaroot.cert $SERVER_CADIR/dsaroot.cert
|
|
# dsaroot.cert in $CLIENT_CADIR and in $SERVER_CADIR is one of the last
|
|
# in the chain
|
|
|
|
|
|
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
#
|
|
# Create EC version of TestCA
|
|
CA_CURVE="secp521r1"
|
|
ALL_CU_SUBJECT="CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
cert_ec_CA $CADIR TestCA-ec -x "CTu,CTu,CTu" ${D_CA} "1" ${CA_CURVE}
|
|
#
|
|
# Create EC versions of the intermediate CA certs
|
|
ALL_CU_SUBJECT="CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_ec_CA $SERVER_CADIR serverCA-ec -x "Cu,Cu,Cu" ${D_SERVER_CA} "2" ${CA_CURVE}
|
|
ALL_CU_SUBJECT="CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_ec_CA $SERVER_CADIR chain-1-serverCA-ec "-c serverCA-ec" "u,u,u" ${D_SERVER_CA} "3" ${CA_CURVE}
|
|
ALL_CU_SUBJECT="CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_ec_CA $SERVER_CADIR chain-2-serverCA-ec "-c chain-1-serverCA-ec" "u,u,u" ${D_SERVER_CA} "4" ${CA_CURVE}
|
|
|
|
ALL_CU_SUBJECT="CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_ec_CA $CLIENT_CADIR clientCA-ec -x "Tu,Cu,Cu" ${D_CLIENT_CA} "5" ${CA_CURVE}
|
|
ALL_CU_SUBJECT="CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_ec_CA $CLIENT_CADIR chain-1-clientCA-ec "-c clientCA-ec" "u,u,u" ${D_CLIENT_CA} "6" ${CA_CURVE}
|
|
ALL_CU_SUBJECT="CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US"
|
|
cert_ec_CA $CLIENT_CADIR chain-2-clientCA-ec "-c chain-1-clientCA-ec" "u,u,u" ${D_CLIENT_CA} "7" ${CA_CURVE}
|
|
|
|
rm $CLIENT_CADIR/ecroot.cert $SERVER_CADIR/ecroot.cert
|
|
# ecroot.cert in $CLIENT_CADIR and in $SERVER_CADIR is one of the last
|
|
# in the chain
|
|
|
|
fi
|
|
}
|
|
|
|
################################# cert_CA ################################
|
|
# local shell function to build the Temp. Certificate Authority (CA)
|
|
# used for testing purposes, creating a CA Certificate and a root cert
|
|
##########################################################################
|
|
cert_CA()
|
|
{
|
|
CUR_CADIR=$1
|
|
NICKNAME=$2
|
|
SIGNER=$3
|
|
TRUSTARG=$4
|
|
DOMAIN=$5
|
|
CERTSERIAL=$6
|
|
|
|
echo "$SCRIPTNAME: Creating a CA Certificate $NICKNAME =========================="
|
|
|
|
if [ ! -d "${CUR_CADIR}" ]; then
|
|
mkdir -p "${CUR_CADIR}"
|
|
fi
|
|
cd ${CUR_CADIR}
|
|
pwd
|
|
|
|
LPROFILE=`pwd`
|
|
if [ "${OS_ARCH}" = "WINNT" -a "$OS_NAME" = "CYGWIN_NT" ]; then
|
|
LPROFILE=`cygpath -m ${LPROFILE}`
|
|
fi
|
|
if [ -n "${MULTIACCESS_DBM}" ]; then
|
|
LPROFILE="multiaccess:${DOMAIN}"
|
|
fi
|
|
|
|
if [ "$SIGNER" = "-x" ] ; then # self signed -> create DB
|
|
CU_ACTION="Creating CA Cert DB"
|
|
certu -N -d "${LPROFILE}" -f ${R_PWFILE} 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
Exit 5 "Fatal - failed to create CA $NICKNAME "
|
|
fi
|
|
|
|
CU_ACTION="Loading root cert module to CA Cert DB"
|
|
modu -add "RootCerts" -libfile "${ROOTCERTSFILE}" -dbdir "${LPROFILE}" 2>&1
|
|
if [ "$RET" -ne 0 ]; then
|
|
return $RET
|
|
fi
|
|
|
|
echo "$SCRIPTNAME: Certificate initialized ----------"
|
|
fi
|
|
|
|
|
|
################# Creating CA Cert ######################################
|
|
#
|
|
CU_ACTION="Creating CA Cert $NICKNAME "
|
|
CU_SUBJECT=$ALL_CU_SUBJECT
|
|
certu -S -n $NICKNAME -t $TRUSTARG -v 600 $SIGNER -d ${LPROFILE} -1 -2 -5 \
|
|
-f ${R_PWFILE} -z ${R_NOISE_FILE} -m $CERTSERIAL 2>&1 <<CERTSCRIPT
|
|
5
|
|
6
|
|
9
|
|
n
|
|
y
|
|
-1
|
|
n
|
|
5
|
|
6
|
|
7
|
|
9
|
|
n
|
|
CERTSCRIPT
|
|
|
|
if [ "$RET" -ne 0 ]; then
|
|
echo "return value is $RET"
|
|
Exit 6 "Fatal - failed to create CA cert"
|
|
fi
|
|
|
|
################# Exporting Root Cert ###################################
|
|
#
|
|
CU_ACTION="Exporting Root Cert"
|
|
certu -L -n $NICKNAME -r -d ${LPROFILE} -o root.cert
|
|
if [ "$RET" -ne 0 ]; then
|
|
Exit 7 "Fatal - failed to export root cert"
|
|
fi
|
|
cp root.cert ${NICKNAME}.ca.cert
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
################################ cert_dsa_CA #############################
|
|
# local shell function to build the Temp. Certificate Authority (CA)
|
|
# used for testing purposes, creating a CA Certificate and a root cert
|
|
# This is the ECC version of cert_CA.
|
|
##########################################################################
|
|
cert_dsa_CA()
|
|
{
|
|
CUR_CADIR=$1
|
|
NICKNAME=$2
|
|
SIGNER=$3
|
|
TRUSTARG=$4
|
|
DOMAIN=$5
|
|
CERTSERIAL=$6
|
|
|
|
echo "$SCRIPTNAME: Creating an DSA CA Certificate $NICKNAME =========================="
|
|
|
|
if [ ! -d "${CUR_CADIR}" ]; then
|
|
mkdir -p "${CUR_CADIR}"
|
|
fi
|
|
cd ${CUR_CADIR}
|
|
pwd
|
|
|
|
LPROFILE=.
|
|
if [ -n "${MULTIACCESS_DBM}" ]; then
|
|
LPROFILE="multiaccess:${DOMAIN}"
|
|
fi
|
|
|
|
################# Creating an DSA CA Cert ###############################
|
|
#
|
|
CU_ACTION="Creating DSA CA Cert $NICKNAME "
|
|
CU_SUBJECT=$ALL_CU_SUBJECT
|
|
certu -S -n $NICKNAME -k dsa -t $TRUSTARG -v 600 $SIGNER \
|
|
-d ${LPROFILE} -1 -2 -5 -f ${R_PWFILE} -z ${R_NOISE_FILE} \
|
|
-m $CERTSERIAL 2>&1 <<CERTSCRIPT
|
|
5
|
|
6
|
|
9
|
|
n
|
|
y
|
|
-1
|
|
n
|
|
5
|
|
6
|
|
7
|
|
9
|
|
n
|
|
CERTSCRIPT
|
|
|
|
if [ "$RET" -ne 0 ]; then
|
|
echo "return value is $RET"
|
|
Exit 6 "Fatal - failed to create DSA CA cert"
|
|
fi
|
|
|
|
################# Exporting DSA Root Cert ###############################
|
|
#
|
|
CU_ACTION="Exporting DSA Root Cert"
|
|
certu -L -n $NICKNAME -r -d ${LPROFILE} -o dsaroot.cert
|
|
if [ "$RET" -ne 0 ]; then
|
|
Exit 7 "Fatal - failed to export dsa root cert"
|
|
fi
|
|
cp dsaroot.cert ${NICKNAME}.ca.cert
|
|
}
|
|
|
|
|
|
|
|
|
|
################################ cert_ec_CA ##############################
|
|
# local shell function to build the Temp. Certificate Authority (CA)
|
|
# used for testing purposes, creating a CA Certificate and a root cert
|
|
# This is the ECC version of cert_CA.
|
|
##########################################################################
|
|
cert_ec_CA()
|
|
{
|
|
CUR_CADIR=$1
|
|
NICKNAME=$2
|
|
SIGNER=$3
|
|
TRUSTARG=$4
|
|
DOMAIN=$5
|
|
CERTSERIAL=$6
|
|
CURVE=$7
|
|
|
|
echo "$SCRIPTNAME: Creating an EC CA Certificate $NICKNAME =========================="
|
|
|
|
if [ ! -d "${CUR_CADIR}" ]; then
|
|
mkdir -p "${CUR_CADIR}"
|
|
fi
|
|
cd ${CUR_CADIR}
|
|
pwd
|
|
|
|
LPROFILE=.
|
|
if [ -n "${MULTIACCESS_DBM}" ]; then
|
|
LPROFILE="multiaccess:${DOMAIN}"
|
|
fi
|
|
|
|
################# Creating an EC CA Cert ################################
|
|
#
|
|
CU_ACTION="Creating EC CA Cert $NICKNAME "
|
|
CU_SUBJECT=$ALL_CU_SUBJECT
|
|
certu -S -n $NICKNAME -k ec -q $CURVE -t $TRUSTARG -v 600 $SIGNER \
|
|
-d ${LPROFILE} -1 -2 -5 -f ${R_PWFILE} -z ${R_NOISE_FILE} \
|
|
-m $CERTSERIAL 2>&1 <<CERTSCRIPT
|
|
5
|
|
6
|
|
9
|
|
n
|
|
y
|
|
-1
|
|
n
|
|
5
|
|
6
|
|
7
|
|
9
|
|
n
|
|
CERTSCRIPT
|
|
|
|
if [ "$RET" -ne 0 ]; then
|
|
echo "return value is $RET"
|
|
Exit 6 "Fatal - failed to create EC CA cert"
|
|
fi
|
|
|
|
################# Exporting EC Root Cert ################################
|
|
#
|
|
CU_ACTION="Exporting EC Root Cert"
|
|
certu -L -n $NICKNAME -r -d ${LPROFILE} -o ecroot.cert
|
|
if [ "$RET" -ne 0 ]; then
|
|
Exit 7 "Fatal - failed to export ec root cert"
|
|
fi
|
|
cp ecroot.cert ${NICKNAME}.ca.cert
|
|
}
|
|
|
|
############################## cert_smime_client #############################
|
|
# local shell function to create client Certificates for S/MIME tests
|
|
##############################################################################
|
|
cert_smime_client()
|
|
{
|
|
CERTFAILED=0
|
|
echo "$SCRIPTNAME: Creating Client CA Issued Certificates =============="
|
|
|
|
cert_create_cert ${ALICEDIR} "Alice" 30 ${D_ALICE}
|
|
cert_create_cert ${BOBDIR} "Bob" 40 ${D_BOB}
|
|
|
|
echo "$SCRIPTNAME: Creating Dave's Certificate -------------------------"
|
|
cert_create_cert "${DAVEDIR}" Dave 50 ${D_DAVE}
|
|
|
|
## XXX With this new script merging ECC and non-ECC tests, the
|
|
## call to cert_create_cert ends up creating two separate certs
|
|
## one for Eve and another for Eve-ec but they both end up with
|
|
## the same Subject Alt Name Extension, i.e., both the cert for
|
|
## Eve@bogus.com and the cert for Eve-ec@bogus.com end up
|
|
## listing eve@bogus.net in the Certificate Subject Alt Name extension.
|
|
## This can cause a problem later when cmsutil attempts to create
|
|
## enveloped data and accidently picks up the ECC cert (NSS currently
|
|
## does not support ECC for enveloped data creation). This script
|
|
## avoids the problem by ensuring that these conflicting certs are
|
|
## never added to the same cert database (see comment marked XXXX).
|
|
echo "$SCRIPTNAME: Creating multiEmail's Certificate --------------------"
|
|
cert_create_cert "${EVEDIR}" "Eve" 60 ${D_EVE} "-7 eve@bogus.net,eve@bogus.cc,beve@bogus.com"
|
|
|
|
#echo "************* Copying CA files to ${SERVERDIR}"
|
|
#cp ${CADIR}/*.db .
|
|
#hw_acc
|
|
|
|
#########################################################################
|
|
#
|
|
#cd ${CERTDIR}
|
|
#CU_ACTION="Creating ${CERTNAME}'s Server Cert"
|
|
#CU_SUBJECT="CN=${CERTNAME}, E=${CERTNAME}@bogus.com, O=BOGUS Netscape, L=Mountain View, ST=California, C=US"
|
|
#certu -S -n "${CERTNAME}" -c "TestCA" -t "u,u,u" -m "$CERTSERIAL" \
|
|
# -d ${PROFILEDIR} -f "${R_PWFILE}" -z "${R_NOISE_FILE}" -v 60 2>&1
|
|
|
|
#CU_ACTION="Export Dave's Cert"
|
|
#cd ${DAVEDIR}
|
|
#certu -L -n "Dave" -r -d ${P_R_DAVE} -o Dave.cert
|
|
|
|
################# Importing Certificates for S/MIME tests ###############
|
|
#
|
|
echo "$SCRIPTNAME: Importing Certificates =============================="
|
|
CU_ACTION="Import Bob's cert into Alice's db"
|
|
certu -E -t ",," -d ${P_R_ALICEDIR} -f ${R_PWFILE} \
|
|
-i ${R_BOBDIR}/Bob.cert 2>&1
|
|
|
|
CU_ACTION="Import Dave's cert into Alice's DB"
|
|
certu -E -t ",," -d ${P_R_ALICEDIR} -f ${R_PWFILE} \
|
|
-i ${R_DAVEDIR}/Dave.cert 2>&1
|
|
|
|
CU_ACTION="Import Dave's cert into Bob's DB"
|
|
certu -E -t ",," -d ${P_R_BOBDIR} -f ${R_PWFILE} \
|
|
-i ${R_DAVEDIR}/Dave.cert 2>&1
|
|
|
|
CU_ACTION="Import Eve's cert into Alice's DB"
|
|
certu -E -t ",," -d ${P_R_ALICEDIR} -f ${R_PWFILE} \
|
|
-i ${R_EVEDIR}/Eve.cert 2>&1
|
|
|
|
CU_ACTION="Import Eve's cert into Bob's DB"
|
|
certu -E -t ",," -d ${P_R_BOBDIR} -f ${R_PWFILE} \
|
|
-i ${R_EVEDIR}/Eve.cert 2>&1
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
echo "$SCRIPTNAME: Importing EC Certificates =============================="
|
|
CU_ACTION="Import Bob's EC cert into Alice's db"
|
|
certu -E -t ",," -d ${P_R_ALICEDIR} -f ${R_PWFILE} \
|
|
-i ${R_BOBDIR}/Bob-ec.cert 2>&1
|
|
|
|
CU_ACTION="Import Dave's EC cert into Alice's DB"
|
|
certu -E -t ",," -d ${P_R_ALICEDIR} -f ${R_PWFILE} \
|
|
-i ${R_DAVEDIR}/Dave-ec.cert 2>&1
|
|
|
|
CU_ACTION="Import Dave's EC cert into Bob's DB"
|
|
certu -E -t ",," -d ${P_R_BOBDIR} -f ${R_PWFILE} \
|
|
-i ${R_DAVEDIR}/Dave-ec.cert 2>&1
|
|
|
|
## XXXX Do not import Eve's EC cert until we can make sure that
|
|
## the email addresses listed in the Subject Alt Name Extension
|
|
## inside Eve's ECC and non-ECC certs are different.
|
|
# CU_ACTION="Import Eve's EC cert into Alice's DB"
|
|
# certu -E -t ",," -d ${P_R_ALICEDIR} -f ${R_PWFILE} \
|
|
# -i ${R_EVEDIR}/Eve-ec.cert 2>&1
|
|
|
|
# CU_ACTION="Import Eve's EC cert into Bob's DB"
|
|
# certu -E -t ",," -d ${P_R_BOBDIR} -f ${R_PWFILE} \
|
|
# -i ${R_EVEDIR}/Eve-ec.cert 2>&1
|
|
fi
|
|
|
|
if [ "$CERTFAILED" != 0 ] ; then
|
|
cert_log "ERROR: SMIME failed $RET"
|
|
else
|
|
cert_log "SUCCESS: SMIME passed"
|
|
fi
|
|
}
|
|
|
|
############################## cert_extended_ssl #######################
|
|
# local shell function to create client + server certs for extended SSL test
|
|
########################################################################
|
|
cert_extended_ssl()
|
|
{
|
|
|
|
################# Creating Certs for extended SSL test ####################
|
|
#
|
|
CERTFAILED=0
|
|
echo "$SCRIPTNAME: Creating Certificates, issued by the last ==============="
|
|
echo " of a chain of CA's which are not in the same database============"
|
|
|
|
echo "Server Cert"
|
|
cert_init_cert ${EXT_SERVERDIR} "${HOSTADDR}" 1 ${D_EXT_SERVER}
|
|
|
|
CU_ACTION="Initializing ${CERTNAME}'s Cert DB (ext.)"
|
|
certu -N -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Loading root cert module to ${CERTNAME}'s Cert DB (ext.)"
|
|
modu -add "RootCerts" -libfile "${ROOTCERTSFILE}" -dbdir "${PROFILEDIR}" 2>&1
|
|
|
|
CU_ACTION="Generate Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -f "${R_PWFILE}" -z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s Request (ext)"
|
|
cp ${CERTDIR}/req ${SERVER_CADIR}
|
|
certu -C -c "chain-2-serverCA" -m 200 -v 60 -d "${P_SERVER_CADIR}" \
|
|
-i req -o "${CERTNAME}.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's Cert -t u,u,u (ext)"
|
|
certu -A -n "$CERTNAME" -t "u,u,u" -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-i "${CERTNAME}.cert" 2>&1
|
|
|
|
CU_ACTION="Import Client Root CA -t T,, for $CERTNAME (ext.)"
|
|
certu -A -n "clientCA" -t "T,," -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${CLIENT_CADIR}/clientCA.ca.cert" 2>&1
|
|
|
|
#
|
|
# Repeat the above for DSA certs
|
|
#
|
|
CU_ACTION="Generate DSA Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k dsa -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s DSA Request (ext)"
|
|
cp ${CERTDIR}/req ${SERVER_CADIR}
|
|
certu -C -c "chain-2-serverCA-dsa" -m 200 -v 60 -d "${P_SERVER_CADIR}" \
|
|
-i req -o "${CERTNAME}-dsa.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's DSA Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-dsa" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-dsa.cert" 2>&1
|
|
|
|
CU_ACTION="Import Client DSA Root CA -t T,, for $CERTNAME (ext.)"
|
|
certu -A -n "clientCA-dsa" -t "T,," -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${CLIENT_CADIR}/clientCA-dsa.ca.cert" 2>&1
|
|
#
|
|
# done with DSA certs
|
|
#
|
|
# Repeat again for mixed DSA certs
|
|
#
|
|
CU_ACTION="Generate mixed DSA Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k dsa -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s mixed DSA Request (ext)"
|
|
cp ${CERTDIR}/req ${SERVER_CADIR}
|
|
certu -C -c "chain-2-serverCA" -m 202 -v 60 -d "${P_SERVER_CADIR}" \
|
|
-i req -o "${CERTNAME}-dsamixed.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's mixed DSA Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-dsamixed" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-dsamixed.cert" 2>&1
|
|
|
|
# CU_ACTION="Import Client mixed DSA Root CA -t T,, for $CERTNAME (ext.)"
|
|
# certu -A -n "clientCA-dsamixed" -t "T,," -f "${R_PWFILE}" \
|
|
# -d "${PROFILEDIR}" -i "${CLIENT_CADIR}/clientCA-dsamixed.ca.cert" \
|
|
# 2>&1
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
#
|
|
# Repeat the above for EC certs
|
|
#
|
|
EC_CURVE="secp256r1"
|
|
CU_ACTION="Generate EC Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k ec -q "${EC_CURVE}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s EC Request (ext)"
|
|
cp ${CERTDIR}/req ${SERVER_CADIR}
|
|
certu -C -c "chain-2-serverCA-ec" -m 200 -v 60 -d "${P_SERVER_CADIR}" \
|
|
-i req -o "${CERTNAME}-ec.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's EC Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-ec" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-ec.cert" 2>&1
|
|
|
|
CU_ACTION="Import Client EC Root CA -t T,, for $CERTNAME (ext.)"
|
|
certu -A -n "clientCA-ec" -t "T,," -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${CLIENT_CADIR}/clientCA-ec.ca.cert" 2>&1
|
|
#
|
|
# done with EC certs
|
|
#
|
|
# Repeat again for mixed EC certs
|
|
#
|
|
EC_CURVE="secp256r1"
|
|
CU_ACTION="Generate mixed EC Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k ec -q "${EC_CURVE}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s mixed EC Request (ext)"
|
|
cp ${CERTDIR}/req ${SERVER_CADIR}
|
|
certu -C -c "chain-2-serverCA" -m 201 -v 60 -d "${P_SERVER_CADIR}" \
|
|
-i req -o "${CERTNAME}-ecmixed.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's mixed EC Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-ecmixed" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-ecmixed.cert" 2>&1
|
|
|
|
# CU_ACTION="Import Client mixed EC Root CA -t T,, for $CERTNAME (ext.)"
|
|
# certu -A -n "clientCA-ecmixed" -t "T,," -f "${R_PWFILE}" \
|
|
# -d "${PROFILEDIR}" -i "${CLIENT_CADIR}/clientCA-ecmixed.ca.cert" \
|
|
# 2>&1
|
|
fi
|
|
|
|
echo "Importing all the server's own CA chain into the servers DB"
|
|
for CA in `find ${SERVER_CADIR} -name "?*.ca.cert"` ;
|
|
do
|
|
N=`basename $CA | sed -e "s/.ca.cert//"`
|
|
if [ $N = "serverCA" -o $N = "serverCA-ec" -o $N = "serverCA-dsa" ] ; then
|
|
T="-t C,C,C"
|
|
else
|
|
T="-t u,u,u"
|
|
fi
|
|
CU_ACTION="Import $N CA $T for $CERTNAME (ext.) "
|
|
certu -A -n $N $T -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${CA}" 2>&1
|
|
done
|
|
#============
|
|
echo "Client Cert"
|
|
cert_init_cert ${EXT_CLIENTDIR} ExtendedSSLUser 1 ${D_EXT_CLIENT}
|
|
|
|
CU_ACTION="Initializing ${CERTNAME}'s Cert DB (ext.)"
|
|
certu -N -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Loading root cert module to ${CERTNAME}'s Cert DB (ext.)"
|
|
modu -add "RootCerts" -libfile "${ROOTCERTSFILE}" -dbdir "${PROFILEDIR}" 2>&1
|
|
|
|
CU_ACTION="Generate Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -f "${R_PWFILE}" -z "${R_NOISE_FILE}" \
|
|
-o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s Request (ext)"
|
|
cp ${CERTDIR}/req ${CLIENT_CADIR}
|
|
certu -C -c "chain-2-clientCA" -m 300 -v 60 -d "${P_CLIENT_CADIR}" \
|
|
-i req -o "${CERTNAME}.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's Cert -t u,u,u (ext)"
|
|
certu -A -n "$CERTNAME" -t "u,u,u" -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-i "${CERTNAME}.cert" 2>&1
|
|
CU_ACTION="Import Server Root CA -t C,C,C for $CERTNAME (ext.)"
|
|
certu -A -n "serverCA" -t "C,C,C" -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${SERVER_CADIR}/serverCA.ca.cert" 2>&1
|
|
|
|
#
|
|
# Repeat the above for DSA certs
|
|
#
|
|
CU_ACTION="Generate DSA Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k dsa -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s DSA Request (ext)"
|
|
cp ${CERTDIR}/req ${CLIENT_CADIR}
|
|
certu -C -c "chain-2-clientCA-dsa" -m 300 -v 60 -d "${P_CLIENT_CADIR}" \
|
|
-i req -o "${CERTNAME}-dsa.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's DSA Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-dsa" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-dsa.cert" 2>&1
|
|
|
|
CU_ACTION="Import Server DSA Root CA -t C,C,C for $CERTNAME (ext.)"
|
|
certu -A -n "serverCA-dsa" -t "C,C,C" -f "${R_PWFILE}" \
|
|
-d "${PROFILEDIR}" -i "${SERVER_CADIR}/serverCA-dsa.ca.cert" 2>&1
|
|
#
|
|
# done with DSA certs
|
|
#
|
|
#
|
|
# Repeat the above for mixed DSA certs
|
|
#
|
|
CU_ACTION="Generate mixed DSA Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k dsa -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s mixed DSA Request (ext)"
|
|
cp ${CERTDIR}/req ${CLIENT_CADIR}
|
|
certu -C -c "chain-2-clientCA" -m 302 -v 60 -d "${P_CLIENT_CADIR}" \
|
|
-i req -o "${CERTNAME}-dsamixed.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's mixed DSA Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-dsamixed" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-dsamixed.cert" 2>&1
|
|
|
|
# CU_ACTION="Import Server DSA Root CA -t C,C,C for $CERTNAME (ext.)"
|
|
# certu -A -n "serverCA-dsa" -t "C,C,C" -f "${R_PWFILE}" \
|
|
# -d "${PROFILEDIR}" -i "${SERVER_CADIR}/serverCA-dsa.ca.cert" 2>&1
|
|
#
|
|
# done with mixed DSA certs
|
|
#
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
#
|
|
# Repeat the above for EC certs
|
|
#
|
|
CU_ACTION="Generate EC Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k ec -q "${EC_CURVE}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s EC Request (ext)"
|
|
cp ${CERTDIR}/req ${CLIENT_CADIR}
|
|
certu -C -c "chain-2-clientCA-ec" -m 300 -v 60 -d "${P_CLIENT_CADIR}" \
|
|
-i req -o "${CERTNAME}-ec.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's EC Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-ec" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-ec.cert" 2>&1
|
|
|
|
CU_ACTION="Import Server EC Root CA -t C,C,C for $CERTNAME (ext.)"
|
|
certu -A -n "serverCA-ec" -t "C,C,C" -f "${R_PWFILE}" \
|
|
-d "${PROFILEDIR}" -i "${SERVER_CADIR}/serverCA-ec.ca.cert" 2>&1
|
|
#
|
|
# done with EC certs
|
|
#
|
|
#
|
|
# Repeat the above for mixed EC certs
|
|
#
|
|
CU_ACTION="Generate mixed EC Cert Request for $CERTNAME (ext)"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -k ec -q "${EC_CURVE}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s mixed EC Request (ext)"
|
|
cp ${CERTDIR}/req ${CLIENT_CADIR}
|
|
certu -C -c "chain-2-clientCA" -m 301 -v 60 -d "${P_CLIENT_CADIR}" \
|
|
-i req -o "${CERTNAME}-ecmixed.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's mixed EC Cert -t u,u,u (ext)"
|
|
certu -A -n "${CERTNAME}-ecmixed" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-ecmixed.cert" 2>&1
|
|
|
|
# CU_ACTION="Import Server EC Root CA -t C,C,C for $CERTNAME (ext.)"
|
|
# certu -A -n "serverCA-ec" -t "C,C,C" -f "${R_PWFILE}" \
|
|
# -d "${PROFILEDIR}" -i "${SERVER_CADIR}/serverCA-ec.ca.cert" 2>&1
|
|
#
|
|
# done with mixed EC certs
|
|
#
|
|
fi
|
|
|
|
echo "Importing all the client's own CA chain into the servers DB"
|
|
for CA in `find ${CLIENT_CADIR} -name "?*.ca.cert"` ;
|
|
do
|
|
N=`basename $CA | sed -e "s/.ca.cert//"`
|
|
if [ $N = "clientCA" -o $N = "clientCA-ec" -o $N = "clientCA-dsa" ] ; then
|
|
T="-t T,C,C"
|
|
else
|
|
T="-t u,u,u"
|
|
fi
|
|
CU_ACTION="Import $N CA $T for $CERTNAME (ext.)"
|
|
certu -A -n $N $T -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${CA}" 2>&1
|
|
done
|
|
if [ "$CERTFAILED" != 0 ] ; then
|
|
cert_log "ERROR: EXT failed $RET"
|
|
else
|
|
cert_log "SUCCESS: EXT passed"
|
|
fi
|
|
}
|
|
|
|
############################## cert_ssl ################################
|
|
# local shell function to create client + server certs for SSL test
|
|
########################################################################
|
|
cert_ssl()
|
|
{
|
|
################# Creating Certs for SSL test ###########################
|
|
#
|
|
CERTFAILED=0
|
|
echo "$SCRIPTNAME: Creating Client CA Issued Certificates ==============="
|
|
cert_create_cert ${CLIENTDIR} "TestUser" 70 ${D_CLIENT}
|
|
|
|
echo "$SCRIPTNAME: Creating Server CA Issued Certificate for \\"
|
|
echo " ${HOSTADDR} ------------------------------------"
|
|
cert_create_cert ${SERVERDIR} "${HOSTADDR}" 100 ${D_SERVER}
|
|
echo "$SCRIPTNAME: Creating Server CA Issued Certificate for \\"
|
|
echo " ${HOSTADDR}-sni --------------------------------"
|
|
CERTSERIAL=101
|
|
CERTNAME="${HOST}-sni${sniCertCount}.${DOMSUF}"
|
|
cert_add_cert
|
|
CU_ACTION="Modify trust attributes of Root CA -t TC,TC,TC"
|
|
certu -M -n "TestCA" -t "TC,TC,TC" -d ${PROFILEDIR} -f "${R_PWFILE}"
|
|
|
|
CU_ACTION="Modify trust attributes of DSA Root CA -t TC,TC,TC"
|
|
certu -M -n "TestCA-dsa" -t "TC,TC,TC" -d ${PROFILEDIR} -f "${R_PWFILE}"
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Modify trust attributes of EC Root CA -t TC,TC,TC"
|
|
certu -M -n "TestCA-ec" -t "TC,TC,TC" -d ${PROFILEDIR} -f "${R_PWFILE}"
|
|
fi
|
|
# cert_init_cert ${SERVERDIR} "${HOSTADDR}" 1 ${D_SERVER}
|
|
# echo "************* Copying CA files to ${SERVERDIR}"
|
|
# cp ${CADIR}/*.db .
|
|
# hw_acc
|
|
# CU_ACTION="Creating ${CERTNAME}'s Server Cert"
|
|
# CU_SUBJECT="CN=${CERTNAME}, O=BOGUS Netscape, L=Mountain View, ST=California, C=US"
|
|
# certu -S -n "${CERTNAME}" -c "TestCA" -t "Pu,Pu,Pu" -d ${PROFILEDIR} \
|
|
# -f "${R_PWFILE}" -z "${R_NOISE_FILE}" -v 60 2>&1
|
|
|
|
if [ "$CERTFAILED" != 0 ] ; then
|
|
cert_log "ERROR: SSL failed $RET"
|
|
else
|
|
cert_log "SUCCESS: SSL passed"
|
|
fi
|
|
|
|
echo "$SCRIPTNAME: Creating database for OCSP stapling tests ==============="
|
|
echo "cp -r ${SERVERDIR} ${STAPLINGDIR}"
|
|
cp -r ${R_SERVERDIR} ${R_STAPLINGDIR}
|
|
pk12u -o ${R_STAPLINGDIR}/ca.p12 -n TestCA -k ${R_PWFILE} -w ${R_PWFILE} -d ${R_CADIR}
|
|
pk12u -i ${R_STAPLINGDIR}/ca.p12 -k ${R_PWFILE} -w ${R_PWFILE} -d ${R_STAPLINGDIR}
|
|
}
|
|
############################## cert_stresscerts ################################
|
|
# local shell function to create client certs for SSL stresstest
|
|
########################################################################
|
|
cert_stresscerts()
|
|
{
|
|
|
|
############### Creating Certs for SSL stress test #######################
|
|
#
|
|
CERTDIR="$CLIENTDIR"
|
|
cd "${CERTDIR}"
|
|
|
|
PROFILEDIR=`cd ${CERTDIR}; pwd`
|
|
if [ "${OS_ARCH}" = "WINNT" -a "$OS_NAME" = "CYGWIN_NT" ]; then
|
|
PROFILEDIR=`cygpath -m ${PROFILEDIR}`
|
|
fi
|
|
if [ -n "${MULTIACCESS_DBM}" ]; then
|
|
PROFILEDIR="multiaccess:${D_CLIENT}"
|
|
fi
|
|
CERTFAILED=0
|
|
echo "$SCRIPTNAME: Creating Client CA Issued Certificates ==============="
|
|
|
|
CONTINUE=$GLOB_MAX_CERT
|
|
CERTSERIAL=10
|
|
|
|
while [ $CONTINUE -ge $GLOB_MIN_CERT ]
|
|
do
|
|
CERTNAME="TestUser$CONTINUE"
|
|
# cert_add_cert ${CLIENTDIR} "TestUser$CONTINUE" $CERTSERIAL
|
|
cert_add_cert
|
|
CERTSERIAL=`expr $CERTSERIAL + 1 `
|
|
CONTINUE=`expr $CONTINUE - 1 `
|
|
done
|
|
if [ "$CERTFAILED" != 0 ] ; then
|
|
cert_log "ERROR: StressCert failed $RET"
|
|
else
|
|
cert_log "SUCCESS: StressCert passed"
|
|
fi
|
|
}
|
|
|
|
############################## cert_fips #####################################
|
|
# local shell function to create certificates for FIPS tests
|
|
##############################################################################
|
|
cert_fips()
|
|
{
|
|
CERTFAILED=0
|
|
echo "$SCRIPTNAME: Creating FIPS 140 DSA Certificates =============="
|
|
cert_init_cert "${FIPSDIR}" "FIPS PUB 140 Test Certificate" 1000 "${D_FIPS}"
|
|
|
|
CU_ACTION="Initializing ${CERTNAME}'s Cert DB"
|
|
certu -N -d "${PROFILEDIR}" -f "${R_FIPSPWFILE}" 2>&1
|
|
|
|
CU_ACTION="Loading root cert module to ${CERTNAME}'s Cert DB (ext.)"
|
|
modu -add "RootCerts" -libfile "${ROOTCERTSFILE}" -dbdir "${PROFILEDIR}" 2>&1
|
|
|
|
echo "$SCRIPTNAME: Enable FIPS mode on database -----------------------"
|
|
CU_ACTION="Enable FIPS mode on database for ${CERTNAME}"
|
|
echo "modutil -dbdir ${PROFILEDIR} -fips true "
|
|
${BINDIR}/modutil -dbdir ${PROFILEDIR} -fips true 2>&1 <<MODSCRIPT
|
|
y
|
|
MODSCRIPT
|
|
RET=$?
|
|
if [ "$RET" -ne 0 ]; then
|
|
html_failed "${CU_ACTION} ($RET) "
|
|
cert_log "ERROR: ${CU_ACTION} failed $RET"
|
|
else
|
|
html_passed "${CU_ACTION}"
|
|
fi
|
|
|
|
CU_ACTION="Generate Certificate for ${CERTNAME}"
|
|
CU_SUBJECT="CN=${CERTNAME}, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US"
|
|
certu -S -n ${FIPSCERTNICK} -x -t "Cu,Cu,Cu" -d "${PROFILEDIR}" -f "${R_FIPSPWFILE}" -k dsa -v 600 -m 500 -z "${R_NOISE_FILE}" 2>&1
|
|
if [ "$RET" -eq 0 ]; then
|
|
cert_log "SUCCESS: FIPS passed"
|
|
fi
|
|
}
|
|
|
|
############################## cert_eccurves ###########################
|
|
# local shell function to create server certs for all EC curves
|
|
########################################################################
|
|
cert_eccurves()
|
|
{
|
|
################# Creating Certs for EC curves test ########################
|
|
#
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
echo "$SCRIPTNAME: Creating Server CA Issued Certificate for "
|
|
echo " EC Curves Test Certificates ------------------------------------"
|
|
|
|
cert_init_cert "${ECCURVES_DIR}" "EC Curves Test Certificates" 1 ${D_ECCURVES}
|
|
|
|
CU_ACTION="Initializing EC Curve's Cert DB"
|
|
certu -N -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Loading root cert module to EC Curve's Cert DB"
|
|
modu -add "RootCerts" -libfile "${ROOTCERTSFILE}" -dbdir "${PROFILEDIR}" 2>&1
|
|
|
|
CU_ACTION="Import EC Root CA for $CERTNAME"
|
|
certu -A -n "TestCA-ec" -t "TC,TC,TC" -f "${R_PWFILE}" \
|
|
-d "${PROFILEDIR}" -i "${R_CADIR}/TestCA-ec.ca.cert" 2>&1
|
|
|
|
if [ -n "${NSS_ECC_MORE_THAN_SUITE_B}" ] ; then
|
|
CURVE_LIST="c2pnb163v1 c2pnb163v2 c2pnb163v3 c2pnb176v1 \
|
|
c2pnb208w1 c2pnb272w1 c2pnb304w1 c2pnb368w1 \
|
|
c2tnb191v1 c2tnb191v2 c2tnb191v3 c2tnb239v1 \
|
|
c2tnb239v2 c2tnb239v3 c2tnb359v1 c2tnb431r1 \
|
|
nistb163 nistb233 nistb283 nistb409 nistb571 \
|
|
nistk163 nistk233 nistk283 nistk409 nistk571 \
|
|
nistp192 nistp224 nistp256 nistp384 nistp521 \
|
|
prime192v1 prime192v2 prime192v3 \
|
|
prime239v1 prime239v2 prime239v3 \
|
|
secp112r1 secp112r2 secp128r1 secp128r2 secp160k1 \
|
|
secp160r1 secp160r2 secp192k1 secp192r1 secp224k1 \
|
|
secp224r1 secp256k1 secp256r1 secp384r1 secp521r1 \
|
|
sect113r1 sect113r2 sect131r1 sect131r2 sect163k1 sect163r1 \
|
|
sect163r2 sect193r1 sect193r2 sect233k1 sect233r1 sect239k1 \
|
|
sect283k1 sect283r1 sect409k1 sect409r1 sect571k1 sect571r1"
|
|
else
|
|
CURVE_LIST="nistp256 nistp384 nistp521"
|
|
fi
|
|
CERTSERIAL=2000
|
|
|
|
for CURVE in ${CURVE_LIST}
|
|
do
|
|
CERTFAILED=0
|
|
CERTNAME="Curve-${CURVE}"
|
|
CERTSERIAL=`expr $CERTSERIAL + 1 `
|
|
CU_ACTION="Generate EC Cert Request for $CERTNAME"
|
|
CU_SUBJECT="CN=$CERTNAME, E=${CERTNAME}-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -k ec -q "${CURVE}" -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
if [ $RET -eq 0 ] ; then
|
|
CU_ACTION="Sign ${CERTNAME}'s EC Request"
|
|
certu -C -c "TestCA-ec" -m "$CERTSERIAL" -v 60 -d "${P_R_CADIR}" \
|
|
-i req -o "${CERTNAME}-ec.cert" -f "${R_PWFILE}" "$1" 2>&1
|
|
fi
|
|
|
|
if [ $RET -eq 0 ] ; then
|
|
CU_ACTION="Import $CERTNAME's EC Cert"
|
|
certu -A -n "${CERTNAME}-ec" -t "u,u,u" -d "${PROFILEDIR}" \
|
|
-f "${R_PWFILE}" -i "${CERTNAME}-ec.cert" 2>&1
|
|
fi
|
|
done
|
|
|
|
fi # $NSS_DISABLE_ECC
|
|
}
|
|
|
|
########################### cert_extensions_test #############################
|
|
# local shell function to test cert extensions generation
|
|
##############################################################################
|
|
cert_extensions_test()
|
|
{
|
|
COUNT=`expr ${COUNT} + 1`
|
|
CERTNAME=TestExt${COUNT}
|
|
CU_SUBJECT="CN=${CERTNAME}, E=${CERTNAME}@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
|
|
echo
|
|
echo certutil -d ${CERT_EXTENSIONS_DIR} -S -n ${CERTNAME} \
|
|
-t "u,u,u" -o ${CERT_EXTENSIONS_DIR}/tempcert -s "${CU_SUBJECT}" -x -f ${R_PWFILE} \
|
|
-z "${R_NOISE_FILE}" -${OPT} \< ${TARG_FILE}
|
|
echo "certutil options:"
|
|
cat ${TARG_FILE}
|
|
${BINDIR}/certutil -d ${CERT_EXTENSIONS_DIR} -S -n ${CERTNAME} \
|
|
-t "u,u,u" -o ${CERT_EXTENSIONS_DIR}/tempcert -s "${CU_SUBJECT}" -x -f ${R_PWFILE} \
|
|
-z "${R_NOISE_FILE}" -${OPT} < ${TARG_FILE}
|
|
RET=$?
|
|
if [ "${RET}" -ne 0 ]; then
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - Create and Add Certificate"
|
|
cert_log "ERROR: ${TESTNAME} - Create and Add Certificate failed"
|
|
return 1
|
|
fi
|
|
|
|
echo certutil -d ${CERT_EXTENSIONS_DIR} -L -n ${CERTNAME}
|
|
EXTLIST=`${BINDIR}/certutil -d ${CERT_EXTENSIONS_DIR} -L -n ${CERTNAME}`
|
|
RET=$?
|
|
echo "${EXTLIST}"
|
|
if [ "${RET}" -ne 0 ]; then
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - List Certificate"
|
|
cert_log "ERROR: ${TESTNAME} - List Certificate failed"
|
|
return 1
|
|
fi
|
|
|
|
for FL in `echo ${FILTERLIST} | tr \| ' '`; do
|
|
FL="`echo ${FL} | tr _ ' '`"
|
|
EXPSTAT=0
|
|
if [ X`echo "${FL}" | cut -c 1` = 'X!' ]; then
|
|
EXPSTAT=1
|
|
FL=`echo ${FL} | tr -d '!'`
|
|
fi
|
|
echo "${EXTLIST}" | grep "${FL}" >/dev/null 2>&1
|
|
RET=$?
|
|
if [ "${RET}" -ne "${EXPSTAT}" ]; then
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - Looking for ${FL}" "returned ${RET}, expected is ${EXPSTAT}"
|
|
cert_log "ERROR: ${TESTNAME} - Looking for ${FL} failed"
|
|
return 1
|
|
fi
|
|
done
|
|
|
|
html_passed "${TESTNAME} (${COUNT})"
|
|
return 0
|
|
}
|
|
|
|
############################## cert_extensions ###############################
|
|
# local shell function to run cert extensions tests
|
|
##############################################################################
|
|
cert_extensions()
|
|
{
|
|
CERTNAME=TestExt
|
|
cert_create_cert ${CERT_EXTENSIONS_DIR} ${CERTNAME} 90 ${D_CERT_EXTENSTIONS}
|
|
TARG_FILE=${CERT_EXTENSIONS_DIR}/test.args
|
|
|
|
COUNT=0
|
|
while read ARG OPT FILTERLIST; do
|
|
if [ X"`echo ${ARG} | cut -c 1`" = "X#" ]; then
|
|
continue
|
|
fi
|
|
if [ X"`echo ${ARG} | cut -c 1`" = "X!" ]; then
|
|
TESTNAME="${FILTERLIST}"
|
|
continue
|
|
fi
|
|
if [ X"${ARG}" = "X=" ]; then
|
|
cert_extensions_test
|
|
rm -f ${TARG_FILE}
|
|
else
|
|
echo ${ARG} >> ${TARG_FILE}
|
|
fi
|
|
done < ${QADIR}/cert/certext.txt
|
|
}
|
|
|
|
cert_make_with_param()
|
|
{
|
|
DIRPASS="$1"
|
|
CERTNAME="$2"
|
|
MAKE="$3"
|
|
SUBJ="$4"
|
|
EXTRA="$5"
|
|
EXPECT="$6"
|
|
TESTNAME="$7"
|
|
|
|
echo certutil ${DIRPASS} -s "${SUBJ}" ${MAKE} ${CERTNAME} ${EXTRA}
|
|
${BINDIR}/certutil ${DIRPASS} -s "${SUBJ}" ${MAKE} ${CERTNAME} ${EXTRA}
|
|
|
|
RET=$?
|
|
if [ "${RET}" -ne "${EXPECT}" ]; then
|
|
# if we expected failure to create, then delete unexpected certificate
|
|
if [ "${EXPECT}" -ne 0 ]; then
|
|
${BINDIR}/certutil ${DIRPASS} -D ${CERTNAME}
|
|
fi
|
|
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - ${EXTRA}"
|
|
cert_log "ERROR: ${TESTNAME} - ${EXTRA} failed"
|
|
return 1
|
|
fi
|
|
|
|
html_passed "${TESTNAME} (${COUNT})"
|
|
return 0
|
|
}
|
|
|
|
cert_list_and_count_dns()
|
|
{
|
|
DIRPASS="$1"
|
|
CERTNAME="$2"
|
|
EXPECT="$3"
|
|
EXPECTCOUNT="$4"
|
|
TESTNAME="$5"
|
|
|
|
echo certutil ${DIRPASS} -L ${CERTNAME}
|
|
${BINDIR}/certutil ${DIRPASS} -L ${CERTNAME}
|
|
|
|
RET=$?
|
|
if [ "${RET}" -ne "${EXPECT}" ]; then
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - list and count"
|
|
cert_log "ERROR: ${TESTNAME} - list and count failed"
|
|
return 1
|
|
fi
|
|
|
|
LISTCOUNT=`${BINDIR}/certutil ${DIRPASS} -L ${CERTNAME} | grep -wc DNS`
|
|
if [ "${LISTCOUNT}" -ne "${EXPECTCOUNT}" ]; then
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - list and count"
|
|
cert_log "ERROR: ${TESTNAME} - list and count failed"
|
|
return 1
|
|
fi
|
|
|
|
html_passed "${TESTNAME} (${COUNT})"
|
|
return 0
|
|
}
|
|
|
|
cert_dump_ext_to_file()
|
|
{
|
|
DIRPASS="$1"
|
|
CERTNAME="$2"
|
|
OID="$3"
|
|
OUTFILE="$4"
|
|
EXPECT="$5"
|
|
TESTNAME="$6"
|
|
|
|
echo certutil ${DIRPASS} -L ${CERTNAME} --dump-ext-val ${OID}
|
|
echo "writing output to ${OUTFILE}"
|
|
${BINDIR}/certutil ${DIRPASS} -L ${CERTNAME} --dump-ext-val ${OID} > ${OUTFILE}
|
|
|
|
RET=$?
|
|
if [ "${RET}" -ne "${EXPECT}" ]; then
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - dump to file"
|
|
cert_log "ERROR: ${TESTNAME} - dump to file failed"
|
|
return 1
|
|
fi
|
|
|
|
html_passed "${TESTNAME} (${COUNT})"
|
|
return 0
|
|
}
|
|
|
|
cert_delete()
|
|
{
|
|
DIRPASS="$1"
|
|
CERTNAME="$2"
|
|
EXPECT="$3"
|
|
TESTNAME="$4"
|
|
|
|
echo certutil ${DIRPASS} -D ${CERTNAME}
|
|
${BINDIR}/certutil ${DIRPASS} -D ${CERTNAME}
|
|
|
|
RET=$?
|
|
if [ "${RET}" -ne "${EXPECT}" ]; then
|
|
CERTFAILED=1
|
|
html_failed "${TESTNAME} (${COUNT}) - delete cert"
|
|
cert_log "ERROR: ${TESTNAME} - delete cert failed"
|
|
return 1
|
|
fi
|
|
|
|
html_passed "${TESTNAME} (${COUNT})"
|
|
return 0
|
|
}
|
|
|
|
cert_inc_count()
|
|
{
|
|
COUNT=`expr ${COUNT} + 1`
|
|
}
|
|
|
|
############################## cert_crl_ssl ############################
|
|
# test adding subject-alt-name, dumping, and adding generic extension
|
|
########################################################################
|
|
cert_san_and_generic_extensions()
|
|
{
|
|
EXTDUMP=${CERT_EXTENSIONS_DIR}/sanext.der
|
|
|
|
DIR="-d ${CERT_EXTENSIONS_DIR} -f ${R_PWFILE}"
|
|
CERTNAME="-n WithSAN"
|
|
MAKE="-S -t ,, -x -z ${R_NOISE_FILE}"
|
|
SUBJ="CN=example.com"
|
|
|
|
TESTNAME="san-and-generic-extensions"
|
|
|
|
cert_inc_count
|
|
cert_make_with_param "${DIR}" "${CERTNAME}" "${MAKE}" "${SUBJ}" \
|
|
"--extSAN example.com" 255 \
|
|
"create cert with invalid SAN parameter"
|
|
|
|
cert_inc_count
|
|
cert_make_with_param "${DIR}" "${CERTNAME}" "${MAKE}" "${SUBJ}" \
|
|
"--extSAN example.com,dns:www.example.com" 255 \
|
|
"create cert with invalid SAN parameter"
|
|
|
|
TN="create cert with valid SAN parameter"
|
|
|
|
cert_inc_count
|
|
cert_make_with_param "${DIR}" "${CERTNAME}" "${MAKE}" "${SUBJ}" \
|
|
"--extSAN dns:example.com,dns:www.example.com" 0 \
|
|
"${TN}"
|
|
|
|
cert_inc_count
|
|
cert_list_and_count_dns "${DIR}" "${CERTNAME}" 0 2 \
|
|
"${TN}"
|
|
|
|
cert_inc_count
|
|
cert_dump_ext_to_file "${DIR}" "${CERTNAME}" "2.5.29.17" "${EXTDUMP}" 0 \
|
|
"dump extension 2.5.29.17 to file ${EXTDUMP}"
|
|
|
|
cert_inc_count
|
|
cert_delete "${DIR}" "${CERTNAME}" 0 \
|
|
"${TN}"
|
|
|
|
cert_inc_count
|
|
cert_list_and_count_dns "${DIR}" "${CERTNAME}" 255 0 \
|
|
"expect failure to list cert, because we deleted it"
|
|
|
|
cert_inc_count
|
|
cert_make_with_param "${DIR}" "${CERTNAME}" "${MAKE}" "${SUBJ}" \
|
|
"--extGeneric ${EXTDUMP}" 255 \
|
|
"create cert with invalid generic ext parameter"
|
|
|
|
cert_inc_count
|
|
cert_make_with_param "${DIR}" "${CERTNAME}" "${MAKE}" "${SUBJ}" \
|
|
"--extGeneric not-critical:${EXTDUMP}" 255 \
|
|
"create cert with invalid generic ext parameter"
|
|
|
|
cert_inc_count
|
|
cert_make_with_param "${DIR}" "${CERTNAME}" "${MAKE}" "${SUBJ}" \
|
|
"--extGeneric not-critical:${EXTDUMP},2.5.29.17:critical:${EXTDUMP}" 255 \
|
|
"create cert with invalid generic ext parameter"
|
|
|
|
TN="create cert with valid generic ext parameter"
|
|
|
|
cert_inc_count
|
|
cert_make_with_param "${DIR}" "${CERTNAME}" "${MAKE}" "${SUBJ}" \
|
|
"--extGeneric 2.5.29.17:not-critical:${EXTDUMP}" 0 \
|
|
"${TN}"
|
|
|
|
cert_inc_count
|
|
cert_list_and_count_dns "${DIR}" "${CERTNAME}" 0 2 \
|
|
"${TN}"
|
|
|
|
cert_inc_count
|
|
cert_delete "${DIR}" "${CERTNAME}" 0 \
|
|
"${TN}"
|
|
|
|
cert_inc_count
|
|
cert_list_and_count_dns "${DIR}" "${CERTNAME}" 255 0 \
|
|
"expect failure to list cert, because we deleted it"
|
|
}
|
|
|
|
############################## cert_crl_ssl ############################
|
|
# local shell function to generate certs and crls for SSL tests
|
|
########################################################################
|
|
cert_crl_ssl()
|
|
{
|
|
|
|
################# Creating Certs ###################################
|
|
#
|
|
CERTFAILED=0
|
|
CERTSERIAL=${CRL_GRP_1_BEGIN}
|
|
|
|
cd $CADIR
|
|
|
|
PROFILEDIR=`cd ${CLIENTDIR}; pwd`
|
|
if [ "${OS_ARCH}" = "WINNT" -a "$OS_NAME" = "CYGWIN_NT" ]; then
|
|
PROFILEDIR=`cygpath -m ${PROFILEDIR}`
|
|
fi
|
|
CRL_GRPS_END=`expr ${CRL_GRP_1_BEGIN} + ${TOTAL_CRL_RANGE} - 1`
|
|
echo "$SCRIPTNAME: Creating Client CA Issued Certificates Range $CRL_GRP_1_BEGIN - $CRL_GRPS_END ==="
|
|
CU_ACTION="Creating client test certs"
|
|
|
|
while [ $CERTSERIAL -le $CRL_GRPS_END ]
|
|
do
|
|
CERTNAME="TestUser$CERTSERIAL"
|
|
cert_add_cert
|
|
CERTSERIAL=`expr $CERTSERIAL + 1 `
|
|
done
|
|
|
|
#################### CRL Creation ##############################
|
|
CRL_GEN_RES=0
|
|
echo "$SCRIPTNAME: Creating CA CRL ====================================="
|
|
|
|
CRL_GRP_END=`expr ${CRL_GRP_1_BEGIN} + ${CRL_GRP_1_RANGE} - 1`
|
|
CRL_FILE_GRP_1=${R_SERVERDIR}/root.crl_${CRL_GRP_1_BEGIN}-${CRL_GRP_END}
|
|
CRL_FILE=${CRL_FILE_GRP_1}
|
|
|
|
CRLUPDATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
CU_ACTION="Generating CRL for range ${CRL_GRP_1_BEGIN}-${CRL_GRP_END} TestCA authority"
|
|
CRL_GRP_END_=`expr ${CRL_GRP_END} - 1`
|
|
crlu -d $CADIR -G -n "TestCA" -f ${R_PWFILE} \
|
|
-o ${CRL_FILE_GRP_1}_or <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_1_BEGIN}-${CRL_GRP_END_} $CRL_GRP_DATE
|
|
addext reasonCode 0 4
|
|
addext issuerAltNames 0 "rfc822Name:caemail@ca.com|dnsName:ca.com|directoryName:CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US|URI:http://ca.com|ipAddress:192.168.0.1|registerID=reg CA"
|
|
EOF_CRLINI
|
|
# This extension should be added to the list, but currently nss has bug
|
|
#addext authKeyId 0 "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" 1
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_1}_or
|
|
|
|
|
|
CU_ACTION="Generating CRL (DSA) for range ${CRL_GRP_1_BEGIN}-${CRL_GRP_END} TestCA-dsa authority"
|
|
|
|
# Until Bug 292285 is resolved, do not encode x400 Addresses. After
|
|
# the bug is resolved, reintroduce "x400Address:x400Address" within
|
|
# addext issuerAltNames ...
|
|
crlu -q -d $CADIR -G -n "TestCA-dsa" -f ${R_PWFILE} \
|
|
-o ${CRL_FILE_GRP_1}_or-dsa <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_1_BEGIN}-${CRL_GRP_END_} $CRL_GRP_DATE
|
|
addext reasonCode 0 4
|
|
addext issuerAltNames 0 "rfc822Name:ca-dsaemail@ca.com|dnsName:ca-dsa.com|directoryName:CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US|URI:http://ca-dsa.com|ipAddress:192.168.0.1|registerID=reg CA (DSA)"
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_1}_or-dsa
|
|
|
|
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Generating CRL (ECC) for range ${CRL_GRP_1_BEGIN}-${CRL_GRP_END} TestCA-ec authority"
|
|
|
|
# Until Bug 292285 is resolved, do not encode x400 Addresses. After
|
|
# the bug is resolved, reintroduce "x400Address:x400Address" within
|
|
# addext issuerAltNames ...
|
|
crlu -q -d $CADIR -G -n "TestCA-ec" -f ${R_PWFILE} \
|
|
-o ${CRL_FILE_GRP_1}_or-ec <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_1_BEGIN}-${CRL_GRP_END_} $CRL_GRP_DATE
|
|
addext reasonCode 0 4
|
|
addext issuerAltNames 0 "rfc822Name:ca-ecemail@ca.com|dnsName:ca-ec.com|directoryName:CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US|URI:http://ca-ec.com|ipAddress:192.168.0.1|registerID=reg CA (ECC)"
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_1}_or-ec
|
|
fi
|
|
|
|
echo test > file
|
|
############################# Modification ##################################
|
|
|
|
echo "$SCRIPTNAME: Modifying CA CRL by adding one more cert ============"
|
|
sleep 2
|
|
CRLUPDATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
CRL_GRP_DATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
CU_ACTION="Modify CRL by adding one more cert"
|
|
crlu -d $CADIR -M -n "TestCA" -f ${R_PWFILE} -o ${CRL_FILE_GRP_1}_or1 \
|
|
-i ${CRL_FILE_GRP_1}_or <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_END} $CRL_GRP_DATE
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_1}_or1
|
|
TEMPFILES="$TEMPFILES ${CRL_FILE_GRP_1}_or"
|
|
|
|
|
|
CU_ACTION="Modify CRL (DSA) by adding one more cert"
|
|
crlu -d $CADIR -M -n "TestCA-dsa" -f ${R_PWFILE} -o ${CRL_FILE_GRP_1}_or1-dsa \
|
|
-i ${CRL_FILE_GRP_1}_or-dsa <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_END} $CRL_GRP_DATE
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_1}_or1-dsa
|
|
TEMPFILES="$TEMPFILES ${CRL_FILE_GRP_1}_or-dsa"
|
|
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Modify CRL (ECC) by adding one more cert"
|
|
crlu -d $CADIR -M -n "TestCA-ec" -f ${R_PWFILE} \
|
|
-o ${CRL_FILE_GRP_1}_or1-ec -i ${CRL_FILE_GRP_1}_or-ec <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_END} $CRL_GRP_DATE
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_1}_or1-ec
|
|
TEMPFILES="$TEMPFILES ${CRL_FILE_GRP_1}_or-ec"
|
|
fi
|
|
|
|
########### Removing one cert ${UNREVOKED_CERT_GRP_1} #######################
|
|
echo "$SCRIPTNAME: Modifying CA CRL by removing one cert ==============="
|
|
CU_ACTION="Modify CRL by removing one cert"
|
|
sleep 2
|
|
CRLUPDATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
crlu -d $CADIR -M -n "TestCA" -f ${R_PWFILE} -o ${CRL_FILE_GRP_1} \
|
|
-i ${CRL_FILE_GRP_1}_or1 <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
rmcert ${UNREVOKED_CERT_GRP_1}
|
|
EOF_CRLINI
|
|
chmod 600 ${CRL_FILE_GRP_1}
|
|
TEMPFILES="$TEMPFILES ${CRL_FILE_GRP_1}_or1"
|
|
|
|
|
|
CU_ACTION="Modify CRL (DSA) by removing one cert"
|
|
sleep 2
|
|
CRLUPDATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
crlu -d $CADIR -M -n "TestCA-dsa" -f ${R_PWFILE} -o ${CRL_FILE_GRP_1} \
|
|
-i ${CRL_FILE_GRP_1}_or1 <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
rmcert ${UNREVOKED_CERT_GRP_1}
|
|
EOF_CRLINI
|
|
chmod 600 ${CRL_FILE_GRP_1}
|
|
TEMPFILES="$TEMPFILES ${CRL_FILE_GRP_1}_or1-dsa"
|
|
|
|
|
|
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Modify CRL (ECC) by removing one cert"
|
|
crlu -d $CADIR -M -n "TestCA-ec" -f ${R_PWFILE} -o ${CRL_FILE_GRP_1}-ec \
|
|
-i ${CRL_FILE_GRP_1}_or1-ec <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
rmcert ${UNREVOKED_CERT_GRP_1}
|
|
EOF_CRLINI
|
|
chmod 600 ${CRL_FILE_GRP_1}-ec
|
|
TEMPFILES="$TEMPFILES ${CRL_FILE_GRP_1}_or1-ec"
|
|
fi
|
|
|
|
########### Creating second CRL which includes groups 1 and 2 ##############
|
|
CRL_GRP_END=`expr ${CRL_GRP_2_BEGIN} + ${CRL_GRP_2_RANGE} - 1`
|
|
CRL_FILE_GRP_2=${R_SERVERDIR}/root.crl_${CRL_GRP_2_BEGIN}-${CRL_GRP_END}
|
|
|
|
echo "$SCRIPTNAME: Creating CA CRL for groups 1 and 2 ==============="
|
|
sleep 2
|
|
CRLUPDATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
CRL_GRP_DATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
CU_ACTION="Creating CRL for groups 1 and 2"
|
|
crlu -d $CADIR -M -n "TestCA" -f ${R_PWFILE} -o ${CRL_FILE_GRP_2} \
|
|
-i ${CRL_FILE_GRP_1} <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_2_BEGIN}-${CRL_GRP_END} $CRL_GRP_DATE
|
|
addext invalidityDate 0 $CRLUPDATE
|
|
rmcert ${UNREVOKED_CERT_GRP_2}
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_2}
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Creating CRL (ECC) for groups 1 and 2"
|
|
crlu -d $CADIR -M -n "TestCA-ec" -f ${R_PWFILE} -o ${CRL_FILE_GRP_2}-ec \
|
|
-i ${CRL_FILE_GRP_1}-ec <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_2_BEGIN}-${CRL_GRP_END} $CRL_GRP_DATE
|
|
addext invalidityDate 0 $CRLUPDATE
|
|
rmcert ${UNREVOKED_CERT_GRP_2}
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_2}-ec
|
|
fi
|
|
|
|
########### Creating second CRL which includes groups 1, 2 and 3 ##############
|
|
CRL_GRP_END=`expr ${CRL_GRP_3_BEGIN} + ${CRL_GRP_3_RANGE} - 1`
|
|
CRL_FILE_GRP_3=${R_SERVERDIR}/root.crl_${CRL_GRP_3_BEGIN}-${CRL_GRP_END}
|
|
|
|
|
|
|
|
echo "$SCRIPTNAME: Creating CA CRL for groups 1, 2 and 3 ==============="
|
|
sleep 2
|
|
CRLUPDATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
CRL_GRP_DATE=`date -u "+%Y%m%d%H%M%SZ"`
|
|
CU_ACTION="Creating CRL for groups 1, 2 and 3"
|
|
crlu -d $CADIR -M -n "TestCA" -f ${R_PWFILE} -o ${CRL_FILE_GRP_3} \
|
|
-i ${CRL_FILE_GRP_2} <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_3_BEGIN}-${CRL_GRP_END} $CRL_GRP_DATE
|
|
rmcert ${UNREVOKED_CERT_GRP_3}
|
|
addext crlNumber 0 2
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_3}
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Creating CRL (ECC) for groups 1, 2 and 3"
|
|
crlu -d $CADIR -M -n "TestCA-ec" -f ${R_PWFILE} -o ${CRL_FILE_GRP_3}-ec \
|
|
-i ${CRL_FILE_GRP_2}-ec <<EOF_CRLINI
|
|
update=$CRLUPDATE
|
|
addcert ${CRL_GRP_3_BEGIN}-${CRL_GRP_END} $CRL_GRP_DATE
|
|
rmcert ${UNREVOKED_CERT_GRP_3}
|
|
addext crlNumber 0 2
|
|
EOF_CRLINI
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
chmod 600 ${CRL_FILE_GRP_3}-ec
|
|
fi
|
|
|
|
############ Importing Server CA Issued CRL for certs of first group #######
|
|
|
|
echo "$SCRIPTNAME: Importing Server CA Issued CRL for certs ${CRL_GRP_BEGIN} trough ${CRL_GRP_END}"
|
|
CU_ACTION="Importing CRL for groups 1"
|
|
crlu -D -n TestCA -f "${R_PWFILE}" -d "${R_SERVERDIR}"
|
|
crlu -I -i ${CRL_FILE} -n "TestCA" -f "${R_PWFILE}" -d "${R_SERVERDIR}"
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
if [ -z "$NSS_DISABLE_ECC" ] ; then
|
|
CU_ACTION="Importing CRL (ECC) for groups 1"
|
|
crlu -D -n TestCA-ec -f "${R_PWFILE}" -d "${R_SERVERDIR}"
|
|
crlu -I -i ${CRL_FILE}-ec -n "TestCA-ec" -f "${R_PWFILE}" \
|
|
-d "${R_SERVERDIR}"
|
|
CRL_GEN_RES=`expr $? + $CRL_GEN_RES`
|
|
fi
|
|
|
|
if [ "$CERTFAILED" != 0 -o "$CRL_GEN_RES" != 0 ] ; then
|
|
cert_log "ERROR: SSL CRL prep failed $CERTFAILED : $CRL_GEN_RES"
|
|
else
|
|
cert_log "SUCCESS: SSL CRL prep passed"
|
|
fi
|
|
}
|
|
|
|
#################
|
|
# Verify the we can successfully change the password on the database
|
|
#
|
|
cert_test_password()
|
|
{
|
|
CERTFAILED=0
|
|
echo "$SCRIPTNAME: Create A Password Test Cert =============="
|
|
cert_init_cert "${DBPASSDIR}" "Password Test Cert" 1000 "${D_DBPASSDIR}"
|
|
|
|
echo "$SCRIPTNAME: Create A Password Test Ca --------"
|
|
ALL_CU_SUBJECT="CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
cert_CA ${DBPASSDIR} PasswordCA -x "CTu,CTu,CTu" ${D_DBPASS} "1"
|
|
|
|
# now change the password
|
|
CU_ACTION="Changing password on ${CERTNAME}'s Cert DB"
|
|
certu -W -d "${PROFILEDIR}" -f "${R_PWFILE}" -@ "${R_FIPSPWFILE}" 2>&1
|
|
|
|
# finally make sure we can use the old key with the new password
|
|
CU_ACTION="Generate Certificate for ${CERTNAME} with new password"
|
|
CU_SUBJECT="CN=${CERTNAME}, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -S -n PasswordCert -c PasswordCA -t "u,u,u" -d "${PROFILEDIR}" -f "${R_FIPSPWFILE}" -z "${R_NOISE_FILE}" 2>&1
|
|
if [ "$RET" -eq 0 ]; then
|
|
cert_log "SUCCESS: PASSWORD passed"
|
|
fi
|
|
CU_ACTION="Verify Certificate for ${CERTNAME} with new password"
|
|
certu -V -n PasswordCert -u S -d "${PROFILEDIR}" -f "${R_FIPSPWFILE}" 2>&1
|
|
}
|
|
|
|
###############################
|
|
# test if we can distrust a certificate.
|
|
#
|
|
# we create 3 new certs:
|
|
# 1 leaf signed by the trusted root.
|
|
# 1 intermediate signed by the trusted root.
|
|
# 1 leaf signed by the intermediate.
|
|
#
|
|
# we mark the first leaf and the intermediate as explicitly untrusted.
|
|
# we then try to verify the two leaf certs for our possible usages.
|
|
# All verification should fail.
|
|
#
|
|
cert_test_distrust()
|
|
{
|
|
echo "$SCRIPTNAME: Creating Distrusted Certificate"
|
|
cert_create_cert ${DISTRUSTDIR} "Distrusted" 2000 ${D_DISTRUST}
|
|
CU_ACTION="Mark CERT as unstrusted"
|
|
certu -M -n "Distrusted" -t p,p,p -d ${PROFILEDIR} -f "${R_PWFILE}" 2>&1
|
|
echo "$SCRIPTNAME: Creating Distrusted Intermediate"
|
|
CERTNAME="DistrustedCA"
|
|
ALL_CU_SUBJECT="CN=${CERTNAME}, E=${CERTNAME}@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
cert_CA ${CADIR} "${CERTNAME}" "-c TestCA" ",," ${D_CA} 2010 2>&1
|
|
CU_ACTION="Import Distrusted Intermediate"
|
|
certu -A -n "${CERTNAME}" -t "p,p,p" -f "${R_PWFILE}" -d "${PROFILEDIR}" \
|
|
-i "${R_CADIR}/DistrustedCA.ca.cert" 2>&1
|
|
|
|
# now create the last leaf signed by our distrusted CA
|
|
# since it's not signed by TestCA it requires more steps.
|
|
CU_ACTION="Generate Cert Request for Leaf Chained to Distrusted CA"
|
|
CERTNAME="LeafChainedToDistrustedCA"
|
|
CU_SUBJECT="CN=${CERTNAME}, E=${CERTNAME}@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US"
|
|
certu -R -d "${PROFILEDIR}" -f "${R_PWFILE}" -z "${R_NOISE_FILE}" -o req 2>&1
|
|
|
|
CU_ACTION="Sign ${CERTNAME}'s Request"
|
|
cp ${CERTDIR}/req ${CADIR}
|
|
certu -C -c "DistrustedCA" -m 100 -v 60 -d "${P_R_CADIR}" \
|
|
-i req -o "${CERTNAME}.cert" -f "${R_PWFILE}" 2>&1
|
|
|
|
CU_ACTION="Import $CERTNAME's Cert -t u,u,u"
|
|
certu -A -n "$CERTNAME" -t "u,u,u" -d "${PROFILEDIR}" -f "${R_PWFILE}" \
|
|
-i "${CERTNAME}.cert" 2>&1
|
|
|
|
RETEXPECTED=255
|
|
CU_ACTION="Verify ${CERTNAME} Cert for SSL Server"
|
|
certu -V -n ${CERTNAME} -u V -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for SSL Client"
|
|
certu -V -n ${CERTNAME} -u C -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for Email signer"
|
|
certu -V -n ${CERTNAME} -u S -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for Email recipient"
|
|
certu -V -n ${CERTNAME} -u R -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for OCSP responder"
|
|
certu -V -n ${CERTNAME} -u O -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for Object Signer"
|
|
certu -V -n ${CERTNAME} -u J -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
|
|
CERTNAME="Distrusted"
|
|
CU_ACTION="Verify ${CERTNAME} Cert for SSL Server"
|
|
certu -V -n ${CERTNAME} -u V -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for SSL Client"
|
|
certu -V -n ${CERTNAME} -u C -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for Email signer"
|
|
certu -V -n ${CERTNAME} -u S -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for Email recipient"
|
|
certu -V -n ${CERTNAME} -u R -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for OCSP responder"
|
|
certu -V -n ${CERTNAME} -u O -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
CU_ACTION="Verify ${CERTNAME} Cert for Object Signer"
|
|
certu -V -n ${CERTNAME} -u J -d "${PROFILEDIR}" -f "${R_PWFILE}" 2>&1
|
|
RETEXPECTED=0
|
|
}
|
|
|
|
cert_test_ocspresp()
|
|
{
|
|
echo "$SCRIPTNAME: OCSP response creation selftest"
|
|
OR_ACTION="perform selftest"
|
|
RETEXPECTED=0
|
|
ocspr ${SERVER_CADIR} "serverCA" "chain-1-serverCA" -f "${R_PWFILE}" 2>&1
|
|
}
|
|
|
|
############################## cert_cleanup ############################
|
|
# local shell function to finish this script (no exit since it might be
|
|
# sourced)
|
|
########################################################################
|
|
cert_cleanup()
|
|
{
|
|
cert_log "$SCRIPTNAME: finished $SCRIPTNAME"
|
|
html "</TABLE><BR>"
|
|
cd ${QADIR}
|
|
. common/cleanup.sh
|
|
}
|
|
|
|
################## main #################################################
|
|
|
|
cert_init
|
|
cert_all_CA
|
|
cert_extended_ssl
|
|
cert_ssl
|
|
cert_smime_client
|
|
if [ -z "$NSS_TEST_DISABLE_FIPS" ]; then
|
|
cert_fips
|
|
fi
|
|
cert_eccurves
|
|
cert_extensions
|
|
cert_san_and_generic_extensions
|
|
cert_test_password
|
|
cert_test_distrust
|
|
cert_test_ocspresp
|
|
|
|
if [ -z "$NSS_TEST_DISABLE_CRL" ] ; then
|
|
cert_crl_ssl
|
|
else
|
|
echo "$SCRIPTNAME: Skipping CRL Tests"
|
|
fi
|
|
|
|
if [ -n "$DO_DIST_ST" -a "$DO_DIST_ST" = "TRUE" ] ; then
|
|
cert_stresscerts
|
|
fi
|
|
|
|
cert_iopr_setup
|
|
|
|
cert_cleanup
|