2 # test handling of expired certs, Radar 3622125.
7 crlNetFetchEnable = false
8 certNetFetchEnable = false
9 useSystemAnchors = false
12 test = "Basic sanity check"
16 # IS_IN_ANCHORS IS_ROOT
21 # verify that each of the three expired certs really is expired
23 test = "Verify expired leaf"
24 cert = ecExpiredLeaf.cer
27 error = CSSMERR_TP_CERT_EXPIRED
28 # EXPIRED IS_IN_INPUT_CERTS
32 test = "Verify expired CA"
34 cert = ecExpiredCA.cer
36 error = CSSMERR_TP_CERT_EXPIRED
37 # EXPIRED IS_IN_INPUT_CERTS
41 test = "Verify expired Root"
44 root = ecExpiredRoot.cer
45 error = CSSMERR_TP_CERT_EXPIRED
46 # EXPIRED CSSM_CERT_STATUS_IS_ROOT CSSM_CERT_STATUS_IS_IN_ANCHORS
51 # Verify expired cert recovery for each cert (not leaf though)
53 test = "Verify recovery from expired CA"
55 cert = ecExpiredCA.cer
60 # IS_IN_ANCHORS IS_ROOT
64 test = "Verify recovery from expired Root in input certs"
67 cert = ecExpiredRoot.cer
71 # IS_IN_ANCHORS IS_ROOT
75 test = "Verify recovery from expired Root in anchors"
78 root = ecExpiredRoot.cer
82 # IS_IN_ANCHORS IS_ROOT
87 # Verify recovery from expired cert in input with good one in DLDB
89 test = "Expired CA in input certs, good one in DLDB"
91 cert = ecExpiredCA.cer
93 # Verify !IS_IN_INPUT_CERTS
95 certDb = goodCA.keychain
98 test = "Expired root in input certs, good one in DLDB"
101 cert = ecExpiredRoot.cer
102 root = ecGoodRoot.cer
103 certDb = goodRoot.keychain
106 # IS_IN_ANCHORS IS_ROOT
111 # Verify recovery from expired cert in DLDB with good one in DLDB
113 test = "Expired CA in DLDB, good one in DLDB"
114 cert = ecGoodLeaf.cer
115 root = ecGoodRoot.cer
116 certDb = expiredCA.keychain
117 # Verify !IS_IN_INPUT_CERTS
119 certDb = goodCA.keychain
122 test = "Expired root in DLDB, good one in DLDB"
123 cert = ecGoodLeaf.cer
125 root = ecGoodRoot.cer
126 certDb = expiredRoot.keychain
127 certDb = goodRoot.keychain
130 # IS_IN_ANCHORS IS_ROOT
135 # Verify recovery with both good and expired CA in inputs AND DLDB
137 test = "Expired and good CA and root in both inputs and DLDBs"
138 cert = ecGoodLeaf.cer
139 cert = ecExpiredCA.cer
140 cert = ecExpiredRoot.cer
142 root = ecExpiredRoot.cer
143 root = ecGoodRoot.cer
144 certDb = expiredCA.keychain
145 certDb = expiredRoot.keychain
146 certDb = goodCA.keychain