deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-CA.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-CA', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-CA_EP.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-CA_EP', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-CA_EP_NS_OS_SA_TS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-CA_EP_NS_OS_SA_TS', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-CA_NS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-CA_NS', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-CA_OS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-CA_OS', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-CA_SA.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-CA_SA', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-CA_TS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-CA_TS', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_TS'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-CA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-EP.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-EP', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-EP_NS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-EP_NS', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-EP_OS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-EP_OS', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-EP_SA.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-EP_SA', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-EP_TS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-EP_TS', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_TS'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-EP_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-NONE.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-NONE', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NONE'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NONE'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-NS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-NS', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-NS_OS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-NS_OS', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_OS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-NS_SA.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-NS_SA', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-NS_TS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-NS_TS', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-NS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-OS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-OS', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-OS_SA.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-OS_SA', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-OS_TS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-OS_TS', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-OS_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-OS_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-OS_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-OS_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-OS_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-OS_TS'), PRErrorCodeSuccess, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-OS_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-SA.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-SA', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-SA_TS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-SA_TS', ',,'), PRErrorCodeSuccess, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA_TS'), PRErrorCodeSuccess, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-SA_TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku-TS.js
+++ /dev/null
@@ -1,164 +0,0 @@
-//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-
- checkCertErrorGeneric(certdb, load_cert('int-EKU-TS', ',,'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-CA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-EP_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NONE-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-NS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-OS_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-SA_TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLClient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageSSLServer);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_KEY_USAGE, certificateUsageSSLCA);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailSigner);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageEmailRecipient);
- checkCertErrorGeneric(certdb, cert_from_file('ee-EKU-TS-int-EKU-TS'), SEC_ERROR_INADEQUATE_CERT_TYPE, certificateUsageStatusResponder);
-}
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku.js
@@ -0,0 +1,69 @@
+// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
+// This Source Code Form is subject to the terms of the Mozilla Public
+// License, v. 2.0. If a copy of the MPL was not distributed with this
+// file, You can obtain one at http://mozilla.org/MPL/2.0/.
+
+// Tests that the extended key usage extension is properly processed by the
+// platform when verifying certificates. There are already comprehensive tests
+// in mozilla::pkix itself, but these tests serve as integration tests to ensure
+// that the cases we're particularly concerned about are correctly handled.
+
+"use strict";
+
+do_get_profile(); // must be called before getting nsIX509CertDB
+const certdb = Cc["@mozilla.org/security/x509certdb;1"]
+ .getService(Ci.nsIX509CertDB);
+
+function certFromFile(certName) {
+ return constructCertFromFile(`test_cert_eku/${certName}.pem`);
+}
+
+function loadCertWithTrust(certName, trustString) {
+ addCertFromFile(certdb, `test_cert_eku/${certName}.pem`, trustString);
+}
+
+function checkEndEntity(cert, expectedResult) {
+ checkCertErrorGeneric(certdb, cert, expectedResult, certificateUsageSSLServer);
+}
+
+function run_test() {
+ loadCertWithTrust("ca", "CTu,,");
+ // end-entity has id-kp-serverAuth => success
+ checkEndEntity(certFromFile("ee-SA"), PRErrorCodeSuccess);
+ // end-entity has id-kp-serverAuth => success
+ checkEndEntity(certFromFile("ee-SA-CA"), PRErrorCodeSuccess);
+ // end-entity has extended key usage, but id-kp-serverAuth is not present =>
+ // failure
+ checkEndEntity(certFromFile("ee-CA"), SEC_ERROR_INADEQUATE_CERT_TYPE);
+ // end-entity has id-kp-serverAuth => success
+ checkEndEntity(certFromFile("ee-SA-nsSGC"), PRErrorCodeSuccess);
+ // end-entity has extended key usage, but id-kp-serverAuth is not present =>
+ // failure (in particular, Netscape Server Gated Crypto is not an acceptable
+ // substitute for end-entity certificates).
+ checkEndEntity(certFromFile("ee-nsSGC"), SEC_ERROR_INADEQUATE_CERT_TYPE);
+ // end-entity has id-kp-OCSPSigning, which is not acceptable for end-entity
+ // certificates being verified as TLS server certificates => failure
+ checkEndEntity(certFromFile("ee-SA-OCSP"), SEC_ERROR_INADEQUATE_CERT_TYPE);
+
+ // intermediate has id-kp-serverAuth => success
+ loadCertWithTrust("int-SA", ",,");
+ checkEndEntity(certFromFile("ee-int-SA"), PRErrorCodeSuccess);
+ // intermediate has id-kp-serverAuth => success
+ loadCertWithTrust("int-SA-CA", ",,");
+ checkEndEntity(certFromFile("ee-int-SA-CA"), PRErrorCodeSuccess);
+ // intermediate has extended key usage, but id-kp-serverAuth is not present
+ // => failure
+ loadCertWithTrust("int-CA", ",,");
+ checkEndEntity(certFromFile("ee-int-CA"), SEC_ERROR_INADEQUATE_CERT_TYPE);
+ // intermediate has id-kp-serverAuth => success
+ loadCertWithTrust("int-SA-nsSGC", ",,");
+ checkEndEntity(certFromFile("ee-int-SA-nsSGC"), PRErrorCodeSuccess);
+ // intermediate has Netscape Server Gated Crypto, which is acceptable for CA
+ // certificates only => success
+ loadCertWithTrust("int-nsSGC", ",,");
+ checkEndEntity(certFromFile("ee-int-nsSGC"), PRErrorCodeSuccess);
+ // intermediate has id-kp-OCSPSigning, which is acceptable for CA
+ // certificates => success
+ loadCertWithTrust("int-SA-OCSP", ",,");
+ checkEndEntity(certFromFile("ee-int-SA-OCSP"), PRErrorCodeSuccess);
+}
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-CA.pem.certspec
@@ -0,0 +1,3 @@
+issuer:ca
+subject:ee-CA
+extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-CA-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-CA-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-CA-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-CA-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-CA-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-CA-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-CA-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-CA-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-CA-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-CA-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-CA-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-CA-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-CA-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-CA-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-CA-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-CA-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-CA-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-CA-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-CA-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-CA-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-CA-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-CA-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-CA_EP-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-CA_EP-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-CA_EP-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-CA_EP-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-CA_EP-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-CA_EP-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-CA_EP-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-CA_EP-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-CA_EP-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-CA_EP-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-CA_EP-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-CA_EP-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-CA_EP-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-CA_EP-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-CA_EP-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-CA_EP-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-CA_EP-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-CA_EP-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-CA_EP-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-CA_EP-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-CA_EP-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-CA_EP-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-CA_NS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-CA_NS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-CA_NS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-CA_NS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-CA_NS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-CA_NS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-CA_NS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-CA_NS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-CA_NS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-CA_NS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-CA_NS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-CA_NS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-CA_NS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-CA_NS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-CA_NS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-CA_NS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-CA_NS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-CA_NS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-CA_NS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-CA_NS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-CA_NS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_NS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-CA_NS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-CA_OS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-CA_OS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-CA_OS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-CA_OS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-CA_OS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-CA_OS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-CA_OS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-CA_OS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-CA_OS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-CA_OS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-CA_OS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-CA_OS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-CA_OS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-CA_OS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-CA_OS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-CA_OS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-CA_OS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-CA_OS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-CA_OS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-CA_OS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-CA_OS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_OS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-CA_OS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-CA_SA-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-CA_SA-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-CA_SA-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-CA_SA-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-CA_SA-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-CA_SA-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-CA_SA-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-CA_SA-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-CA_SA-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-CA_SA-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-CA_SA-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-CA_SA-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-CA_SA-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-CA_SA-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-CA_SA-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-CA_SA-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-CA_SA-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-CA_SA-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-CA_SA-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-CA_SA-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-CA_SA-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_SA-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-CA_SA-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-CA_TS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-CA_TS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-CA_TS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-CA_TS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-CA_TS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-CA_TS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-CA_TS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-CA_TS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-CA_TS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-CA_TS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-CA_TS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-CA_TS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-CA_TS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-CA_TS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-CA_TS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-CA_TS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-CA_TS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-CA_TS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-CA_TS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-CA_TS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-CA_TS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-CA_TS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-CA_TS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-EP-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-EP-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-EP-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-EP-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-EP-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-EP-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-EP-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-EP-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-EP-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-EP-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-EP-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-EP-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-EP-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-EP-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-EP-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-EP-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-EP-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-EP-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-EP-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-EP-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-EP-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-EP-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-EP_NS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-EP_NS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-EP_NS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-EP_NS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-EP_NS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-EP_NS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-EP_NS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-EP_NS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-EP_NS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-EP_NS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-EP_NS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-EP_NS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-EP_NS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-EP_NS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-EP_NS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-EP_NS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-EP_NS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-EP_NS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-EP_NS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-EP_NS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-EP_NS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_NS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-EP_NS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-EP_OS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-EP_OS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-EP_OS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-EP_OS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-EP_OS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-EP_OS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-EP_OS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-EP_OS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-EP_OS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-EP_OS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-EP_OS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-EP_OS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-EP_OS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-EP_OS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-EP_OS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-EP_OS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-EP_OS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-EP_OS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-EP_OS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-EP_OS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-EP_OS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_OS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-EP_OS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-EP_SA-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-EP_SA-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-EP_SA-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-EP_SA-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-EP_SA-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-EP_SA-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-EP_SA-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-EP_SA-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-EP_SA-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-EP_SA-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-EP_SA-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-EP_SA-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-EP_SA-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-EP_SA-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-EP_SA-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-EP_SA-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-EP_SA-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-EP_SA-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-EP_SA-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-EP_SA-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-EP_SA-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_SA-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-EP_SA-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-EP_TS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-EP_TS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-EP_TS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-EP_TS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-EP_TS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-EP_TS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-EP_TS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-EP_TS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-EP_TS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-EP_TS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-EP_TS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-EP_TS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-EP_TS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-EP_TS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-EP_TS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-EP_TS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-EP_TS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-EP_TS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-EP_TS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-EP_TS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-EP_TS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-EP_TS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-EP_TS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-NONE-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-NONE-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-NONE-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-NONE-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-NONE-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-NONE-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-NONE-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-NONE-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-NONE-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-NONE-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-NONE-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-NONE-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-NONE-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-NONE-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-NONE-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-NONE-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-NONE-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-NONE-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-NONE-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-NONE-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-NONE-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NONE-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-NONE-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-NS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-NS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-NS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-NS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-NS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-NS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-NS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-NS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-NS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-NS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-NS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-NS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-NS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-NS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-NS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-NS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-NS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-NS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-NS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-NS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-NS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-NS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-NS_OS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-NS_OS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-NS_OS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-NS_OS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-NS_OS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-NS_OS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-NS_OS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-NS_OS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-NS_OS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-NS_OS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-NS_OS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-NS_OS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-NS_OS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-NS_OS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-NS_OS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-NS_OS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-NS_OS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-NS_OS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-NS_OS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-NS_OS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-NS_OS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_OS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-NS_OS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-NS_SA-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-NS_SA-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-NS_SA-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-NS_SA-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-NS_SA-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-NS_SA-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-NS_SA-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-NS_SA-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-NS_SA-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-NS_SA-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-NS_SA-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-NS_SA-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-NS_SA-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-NS_SA-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-NS_SA-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-NS_SA-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-NS_SA-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-NS_SA-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-NS_SA-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-NS_SA-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-NS_SA-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_SA-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-NS_SA-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-NS_TS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-NS_TS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-NS_TS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-NS_TS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-NS_TS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-NS_TS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-NS_TS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-NS_TS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-NS_TS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-NS_TS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-NS_TS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-NS_TS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-NS_TS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-NS_TS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-NS_TS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-NS_TS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-NS_TS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-NS_TS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-NS_TS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-NS_TS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-NS_TS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-NS_TS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-NS_TS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-OS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-OS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-OS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-OS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-OS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-OS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-OS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-OS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-OS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-OS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-OS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-OS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-OS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-OS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-OS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-OS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-OS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-OS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-OS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-OS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-OS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-OS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-OS_SA-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-OS_SA-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-OS_SA-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-OS_SA-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-OS_SA-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-OS_SA-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-OS_SA-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-OS_SA-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-OS_SA-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-OS_SA-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-OS_SA-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-OS_SA-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-OS_SA-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-OS_SA-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-OS_SA-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-OS_SA-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-OS_SA-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-OS_SA-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-OS_SA-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-OS_SA-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-OS_SA-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_SA-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-OS_SA-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-OS_TS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-OS_TS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-OS_TS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-OS_TS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-OS_TS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-OS_TS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-OS_TS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-OS_TS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-OS_TS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-OS_TS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-OS_TS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-OS_TS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-OS_TS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-OS_TS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-OS_TS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-OS_TS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-OS_TS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-OS_TS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-OS_TS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-OS_TS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-OS_TS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-OS_TS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-OS_TS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-SA-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-SA-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-SA-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-SA-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-SA-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-SA-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-SA-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-SA-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-SA-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-SA-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-SA-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-SA-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-SA-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-SA-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-SA-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-SA-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-SA-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-SA-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-SA-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-SA-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-SA-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-SA-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-SA_TS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-SA_TS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-SA_TS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-SA_TS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-SA_TS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-SA_TS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-SA_TS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-SA_TS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-SA_TS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-SA_TS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-SA_TS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-SA_TS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-SA_TS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-SA_TS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-SA_TS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-SA_TS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-SA_TS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-SA_TS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-SA_TS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-SA_TS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-SA_TS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-SA_TS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-SA_TS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA
-subject:ee-EKU-TS-int-EKU-CA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP
-subject:ee-EKU-TS-int-EKU-CA_EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_EP_NS_OS_SA_TS
-subject:ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_NS
-subject:ee-EKU-TS-int-EKU-CA_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_OS
-subject:ee-EKU-TS-int-EKU-CA_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_SA
-subject:ee-EKU-TS-int-EKU-CA_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-CA_TS
-subject:ee-EKU-TS-int-EKU-CA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP
-subject:ee-EKU-TS-int-EKU-EP
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_NS
-subject:ee-EKU-TS-int-EKU-EP_NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_OS
-subject:ee-EKU-TS-int-EKU-EP_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_SA
-subject:ee-EKU-TS-int-EKU-EP_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-EP_TS
-subject:ee-EKU-TS-int-EKU-EP_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NONE
-subject:ee-EKU-TS-int-EKU-NONE
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS
-subject:ee-EKU-TS-int-EKU-NS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_OS
-subject:ee-EKU-TS-int-EKU-NS_OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_SA
-subject:ee-EKU-TS-int-EKU-NS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-NS_TS
-subject:ee-EKU-TS-int-EKU-NS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS
-subject:ee-EKU-TS-int-EKU-OS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_SA
-subject:ee-EKU-TS-int-EKU-OS_SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-OS_TS
-subject:ee-EKU-TS-int-EKU-OS_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA
-subject:ee-EKU-TS-int-EKU-SA
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-SA_TS
-subject:ee-EKU-TS-int-EKU-SA_TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/ee-EKU-TS-int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:int-EKU-TS
-subject:ee-EKU-TS-int-EKU-TS
-extension:basicConstraints:,
-extension:keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement
-extension:extKeyUsage:timeStamping
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-SA-CA.pem.certspec
@@ -0,0 +1,3 @@
+issuer:ca
+subject:ee-SA-CA
+extension:extKeyUsage:serverAuth,clientAuth
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-SA-OCSP.pem.certspec
@@ -0,0 +1,3 @@
+issuer:ca
+subject:ee-SA-OCSP
+extension:extKeyUsage:serverAuth,OCSPSigning
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-SA-nsSGC.pem.certspec
@@ -0,0 +1,3 @@
+issuer:ca
+subject:ee-SA-nsSGC
+extension:extKeyUsage:serverAuth,nsSGC
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-SA.pem.certspec
@@ -0,0 +1,3 @@
+issuer:ca
+subject:ee-SA
+extension:extKeyUsage:serverAuth
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-int-CA.pem.certspec
@@ -0,0 +1,2 @@
+issuer:int-CA
+subject:ee-int-CA
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-int-SA-CA.pem.certspec
@@ -0,0 +1,2 @@
+issuer:int-SA-CA
+subject:ee-int-SA-CA
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-int-SA-OCSP.pem.certspec
@@ -0,0 +1,2 @@
+issuer:int-SA-OCSP
+subject:ee-int-SA-OCSP
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-int-SA-nsSGC.pem.certspec
@@ -0,0 +1,2 @@
+issuer:int-SA-nsSGC
+subject:ee-int-SA-nsSGC
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-int-SA.pem.certspec
@@ -0,0 +1,2 @@
+issuer:int-SA
+subject:ee-int-SA
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-int-nsSGC.pem.certspec
@@ -0,0 +1,2 @@
+issuer:int-nsSGC
+subject:ee-int-nsSGC
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/ee-nsSGC.pem.certspec
@@ -0,0 +1,3 @@
+issuer:ca
+subject:ee-nsSGC
+extension:extKeyUsage:nsSGC
deleted file mode 100755
--- a/security/manager/ssl/tests/unit/test_cert_eku/generate.py
+++ /dev/null
@@ -1,236 +0,0 @@
-#!/usr/bin/env python
-
-# This Source Code Form is subject to the terms of the Mozilla Public
-# License, v. 2.0. If a copy of the MPL was not distributed with this
-# file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-# codesigning differs significantly between mozilla::pkix and
-# classic NSS that actual testing on it is not very useful
-eku_values = { 'SA': "serverAuth",
- 'CA': "clientAuth",
- #'CS': "codeSigning",
- 'EP': "emailProtection",
- 'TS': "timeStamping",
- 'NS': "nsSGC", # Netscape Server Gated Crypto.
- 'OS': "OCSPSigning"
- }
-
-cert_usages = [ "certificateUsageSSLClient",
- "certificateUsageSSLServer",
- "certificateUsageSSLCA",
- "certificateUsageEmailSigner",
- "certificateUsageEmailRecipient",
- #"certificateUsageObjectSigner",
- "certificateUsageStatusResponder"
- ]
-
-js_file_header = """//// AUTOGENERATED FILE, DO NOT EDIT
-// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
-// This Source Code Form is subject to the terms of the Mozilla Public
-// License, v. 2.0. If a copy of the MPL was not distributed with this
-// file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-"use strict";
-
-do_get_profile(); // must be called before getting nsIX509CertDB
-const certdb = Cc["@mozilla.org/security/x509certdb;1"]
- .getService(Ci.nsIX509CertDB);
-
-function cert_from_file(filename) {
- return constructCertFromFile(`test_cert_eku/${filename}.pem`);
-}
-
-function load_cert(cert_name, trust_string) {
- addCertFromFile(certdb, `test_cert_eku/${cert_name}.pem`, trust_string);
- return cert_from_file(cert_name);
-}
-
-function run_test() {
- load_cert("ca", "CT,CT,CT");
-"""
-
-js_file_footer = """}
-"""
-
-def gen_int_js_output(int_string):
- expectedResult = "SEC_ERROR_INADEQUATE_CERT_TYPE"
- # For a certificate to verify successfully as a SSL CA, it must either
- # have no EKU or have the Server Auth or Netscape Server Gated Crypto
- # usage (the second of which is deprecated but currently supported for
- # compatibility purposes).
- if ("NONE" in int_string or "SA" in int_string or "NS" in int_string):
- expectedResult = "PRErrorCodeSuccess"
- return (" checkCertErrorGeneric(certdb, load_cert('" + int_string +
- "', ',,'), " + expectedResult + ", certificateUsageSSLCA);\n")
-
-def single_test_output(ee_name, cert_usage, error):
- return (" checkCertErrorGeneric(certdb, cert_from_file('" + ee_name +
- "'), " + error + ", " + cert_usage + ");\n")
-
-def usage_to_abbreviation(usage):
- if usage is "certificateUsageStatusResponder":
- return "OS"
- if usage is "certificateUsageSSLServer":
- return "SA"
- if usage is "certificateUsageSSLClient":
- return "CA"
- if (usage is "certificateUsageEmailSigner" or
- usage is "certificateUsageEmailRecipient"):
- return "EP"
- raise Exception("unsupported usage: " + usage)
-
-# In general, for a certificate to be compatible with a usage, it must either
-# have no EKU at all or that usage must be present in its EKU extension.
-def has_compatible_eku(name_string, usage_abbreviation):
- return ("NONE" in name_string or usage_abbreviation in name_string)
-
-def gen_ee_js_output(int_string, ee_string, cert_usage, ee_name):
- if cert_usage is "certificateUsageSSLCA":
- # since none of these are CA certs (BC) these should all fail
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_KEY_USAGE")
-
- usage_abbreviation = usage_to_abbreviation(cert_usage)
- if cert_usage is "certificateUsageStatusResponder":
- # For the Status Responder usage, the OSCP Signing usage must be
- # present in the end-entity's EKU extension (i.e. if the extension
- # is not present, the cert is not compatible with this usage).
- if "OS" not in ee_string:
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_CERT_TYPE")
- if not has_compatible_eku(int_string, usage_abbreviation):
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_CERT_TYPE")
- return single_test_output(ee_name, cert_usage, "PRErrorCodeSuccess")
-
- # If the usage isn't Status Responder, if the end-entity certificate has
- # the OCSP Signing usage in its EKU, it is not valid for any other usage.
- if "OS" in ee_string:
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_CERT_TYPE")
-
- if cert_usage is "certificateUsageSSLServer":
- if not has_compatible_eku(ee_string, usage_abbreviation):
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_CERT_TYPE")
- # If the usage is SSL Server, the intermediate certificate must either
- # have no EKU extension or it must have the Server Auth or Netscape
- # Server Gated Crypto (deprecated but allowed for compatibility).
- if ("SA" not in int_string and "NONE" not in int_string and
- "NS" not in int_string):
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_CERT_TYPE")
- return single_test_output(ee_name, cert_usage, "PRErrorCodeSuccess")
-
- if not has_compatible_eku(ee_string, usage_abbreviation):
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_CERT_TYPE")
- if not has_compatible_eku(int_string, usage_abbreviation):
- return single_test_output(ee_name, cert_usage,
- "SEC_ERROR_INADEQUATE_CERT_TYPE")
-
- return single_test_output(ee_name, cert_usage, "PRErrorCodeSuccess")
-
-def generate_test_eku():
- outmap = { "NONE" : ""}
- # add each one by itself
- for eku_name in (eku_values.keys()):
- outmap[eku_name] = eku_values[eku_name]
- # now combo of duples
- eku_names = sorted(eku_values.keys())
- for i in range(len(eku_names)):
- for j in range(i + 1, len(eku_names)):
- name = eku_names[i] + "_" + eku_names[j]
- outmap[name] = (eku_values[eku_names[i]] + "," +
- eku_values[eku_names[j]])
- all_names = eku_names[0]
- all_values = eku_values[eku_names[0]]
- for i in range (1, len(eku_names)):
- all_names = all_names + "_" + eku_names[i]
- all_values = all_values + "," + eku_values[eku_names[i]]
- outmap[all_names] = all_values
- return outmap
-
-def generate_certspec_file(issuer_name, name, extensions_list):
- filename = name + ".pem.certspec"
- with open(filename, "w") as f:
- f.write("issuer:%s\n" % issuer_name)
- f.write("subject:%s\n" % name)
- for extension in extensions_list:
- f.write("extension:%s\n" % extension)
-
-def generate_certs():
- generate_certspec_file("ca", "ca", ["basicConstraints:cA,"])
- cert_list = ["ca.pem"]
-
- # now we do it again for valid basic constraints but strange eku/ku at the
- # intermediate layer
- eku_dict = generate_test_eku()
- print eku_dict
- for eku_name in (sorted(eku_dict.keys())):
- # Divide the tests into multiple files to avoid time outs
- js_outfile = open("../test_cert_eku-" + eku_name + ".js", "w")
- js_outfile.write(js_file_header)
-
- # generate int
- int_name = "int-EKU-" + eku_name
- int_eku = "extKeyUsage:" + eku_dict[eku_name]
- int_extensions_list = [
- "basicConstraints:cA,",
- "keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign"
- ]
- if eku_name != "NONE":
- int_extensions_list.append(int_eku)
- generate_certspec_file("ca", int_name, int_extensions_list)
- cert_list.append(int_name + ".pem")
-
- js_outfile.write("\n")
- js_outfile.write(gen_int_js_output(int_name))
-
- for ee_eku_name in (sorted(eku_dict.keys())):
- ee_base_name = "ee-EKU-" + ee_eku_name
- ee_name = ee_base_name + "-" + int_name
- ee_eku = "extKeyUsage:" + eku_dict[ee_eku_name]
- ee_extensions_list = [
- "basicConstraints:,",
- "keyUsage:digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement"
- ]
- if ee_eku_name != "NONE":
- ee_extensions_list.append(ee_eku)
- generate_certspec_file(int_name, ee_name, ee_extensions_list)
- cert_list.append(ee_name + ".pem")
-
- for cert_usage in (cert_usages):
- js_outfile.write(gen_ee_js_output(int_name, ee_base_name,
- cert_usage, ee_name))
-
- js_outfile.write(js_file_footer)
- js_outfile.close()
-
- return cert_list
-
-def generate_mozbuild_file(generated_cert_filenames):
- MOZ_BUILD_HEADER = """# AUTOGENERATED FILE, DO NOT EDIT
-# -*- Mode: python; c-basic-offset: 4; indent-tabs-mode: nil; tab-width: 40 -*-
-# vim: set filetype=python:
-# This Source Code Form is subject to the terms of the Mozilla Public
-# License, v. 2.0. If a copy of the MPL was not distributed with this
-# file, You can obtain one at http://mozilla.org/MPL/2.0/.
-
-test_certificates = (
-"""
-
- MOZ_BUILD_FOOTER = """)
-
-for test_certificate in test_certificates:
- TestCertificate(test_certificate)
-"""
-
- with open("moz.build", "w") as f:
- f.write(MOZ_BUILD_HEADER)
- for cert_filename in sorted(generated_cert_filenames):
- f.write(" '%s',\n" % cert_filename)
- f.write(MOZ_BUILD_FOOTER)
-
-generated_cert_filenames = generate_certs()
-generate_mozbuild_file(generated_cert_filenames)
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/int-CA.pem.certspec
@@ -0,0 +1,4 @@
+issuer:ca
+subject:int-CA
+extension:basicConstraints:cA,
+extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-CA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-CA
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:clientAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-CA_EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-CA_EP
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:clientAuth,emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-CA_EP_NS_OS_SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-CA_EP_NS_OS_SA_TS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:clientAuth,emailProtection,nsSGC,OCSPSigning,serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-CA_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-CA_NS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:clientAuth,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-CA_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-CA_OS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:clientAuth,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-CA_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-CA_SA
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:clientAuth,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-CA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-CA_TS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:clientAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-EP.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-EP
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:emailProtection
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-EP_NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-EP_NS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:emailProtection,nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-EP_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-EP_OS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:emailProtection,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-EP_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-EP_SA
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:emailProtection,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-EP_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-EP_TS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:emailProtection,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-NONE.pem.certspec
+++ /dev/null
@@ -1,4 +0,0 @@
-issuer:ca
-subject:int-EKU-NONE
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-NS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-NS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:nsSGC
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-NS_OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-NS_OS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:nsSGC,OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-NS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-NS_SA
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:nsSGC,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-NS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-NS_TS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:nsSGC,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-OS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-OS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:OCSPSigning
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-OS_SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-OS_SA
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:OCSPSigning,serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-OS_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-OS_TS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:OCSPSigning,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-SA.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-SA
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:serverAuth
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-SA_TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-SA_TS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:serverAuth,timeStamping
deleted file mode 100644
--- a/security/manager/ssl/tests/unit/test_cert_eku/int-EKU-TS.pem.certspec
+++ /dev/null
@@ -1,5 +0,0 @@
-issuer:ca
-subject:int-EKU-TS
-extension:basicConstraints:cA,
-extension:keyUsage:keyCertSign,digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement,cRLSign
-extension:extKeyUsage:timeStamping
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/int-SA-CA.pem.certspec
@@ -0,0 +1,4 @@
+issuer:ca
+subject:int-SA-CA
+extension:basicConstraints:cA,
+extension:extKeyUsage:serverAuth,clientAuth
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/int-SA-OCSP.pem.certspec
@@ -0,0 +1,4 @@
+issuer:ca
+subject:int-SA-OCSP
+extension:basicConstraints:cA,
+extension:extKeyUsage:serverAuth,OCSPSigning
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/int-SA-nsSGC.pem.certspec
@@ -0,0 +1,4 @@
+issuer:ca
+subject:int-SA-nsSGC
+extension:basicConstraints:cA,
+extension:extKeyUsage:serverAuth,nsSGC
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/int-SA.pem.certspec
@@ -0,0 +1,4 @@
+issuer:ca
+subject:int-SA
+extension:basicConstraints:cA,
+extension:extKeyUsage:serverAuth
new file mode 100644
--- /dev/null
+++ b/security/manager/ssl/tests/unit/test_cert_eku/int-nsSGC.pem.certspec
@@ -0,0 +1,4 @@
+issuer:ca
+subject:int-nsSGC
+extension:basicConstraints:cA,
+extension:extKeyUsage:nsSGC
--- a/security/manager/ssl/tests/unit/test_cert_eku/moz.build
+++ b/security/manager/ssl/tests/unit/test_cert_eku/moz.build
@@ -1,565 +1,30 @@
-# AUTOGENERATED FILE, DO NOT EDIT
# -*- Mode: python; c-basic-offset: 4; indent-tabs-mode: nil; tab-width: 40 -*-
# vim: set filetype=python:
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
test_certificates = (
'ca.pem',
- 'ee-EKU-CA-int-EKU-CA.pem',
- 'ee-EKU-CA-int-EKU-CA_EP.pem',
- 'ee-EKU-CA-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-CA-int-EKU-CA_NS.pem',
- 'ee-EKU-CA-int-EKU-CA_OS.pem',
- 'ee-EKU-CA-int-EKU-CA_SA.pem',
- 'ee-EKU-CA-int-EKU-CA_TS.pem',
- 'ee-EKU-CA-int-EKU-EP.pem',
- 'ee-EKU-CA-int-EKU-EP_NS.pem',
- 'ee-EKU-CA-int-EKU-EP_OS.pem',
- 'ee-EKU-CA-int-EKU-EP_SA.pem',
- 'ee-EKU-CA-int-EKU-EP_TS.pem',
- 'ee-EKU-CA-int-EKU-NONE.pem',
- 'ee-EKU-CA-int-EKU-NS.pem',
- 'ee-EKU-CA-int-EKU-NS_OS.pem',
- 'ee-EKU-CA-int-EKU-NS_SA.pem',
- 'ee-EKU-CA-int-EKU-NS_TS.pem',
- 'ee-EKU-CA-int-EKU-OS.pem',
- 'ee-EKU-CA-int-EKU-OS_SA.pem',
- 'ee-EKU-CA-int-EKU-OS_TS.pem',
- 'ee-EKU-CA-int-EKU-SA.pem',
- 'ee-EKU-CA-int-EKU-SA_TS.pem',
- 'ee-EKU-CA-int-EKU-TS.pem',
- 'ee-EKU-CA_EP-int-EKU-CA.pem',
- 'ee-EKU-CA_EP-int-EKU-CA_EP.pem',
- 'ee-EKU-CA_EP-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-CA_EP-int-EKU-CA_NS.pem',
- 'ee-EKU-CA_EP-int-EKU-CA_OS.pem',
- 'ee-EKU-CA_EP-int-EKU-CA_SA.pem',
- 'ee-EKU-CA_EP-int-EKU-CA_TS.pem',
- 'ee-EKU-CA_EP-int-EKU-EP.pem',
- 'ee-EKU-CA_EP-int-EKU-EP_NS.pem',
- 'ee-EKU-CA_EP-int-EKU-EP_OS.pem',
- 'ee-EKU-CA_EP-int-EKU-EP_SA.pem',
- 'ee-EKU-CA_EP-int-EKU-EP_TS.pem',
- 'ee-EKU-CA_EP-int-EKU-NONE.pem',
- 'ee-EKU-CA_EP-int-EKU-NS.pem',
- 'ee-EKU-CA_EP-int-EKU-NS_OS.pem',
- 'ee-EKU-CA_EP-int-EKU-NS_SA.pem',
- 'ee-EKU-CA_EP-int-EKU-NS_TS.pem',
- 'ee-EKU-CA_EP-int-EKU-OS.pem',
- 'ee-EKU-CA_EP-int-EKU-OS_SA.pem',
- 'ee-EKU-CA_EP-int-EKU-OS_TS.pem',
- 'ee-EKU-CA_EP-int-EKU-SA.pem',
- 'ee-EKU-CA_EP-int-EKU-SA_TS.pem',
- 'ee-EKU-CA_EP-int-EKU-TS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_NS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_OS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_SA.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-CA_TS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_NS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_OS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_SA.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-EP_TS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NONE.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_OS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_SA.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-NS_TS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_SA.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-OS_TS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-SA_TS.pem',
- 'ee-EKU-CA_EP_NS_OS_SA_TS-int-EKU-TS.pem',
- 'ee-EKU-CA_NS-int-EKU-CA.pem',
- 'ee-EKU-CA_NS-int-EKU-CA_EP.pem',
- 'ee-EKU-CA_NS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-CA_NS-int-EKU-CA_NS.pem',
- 'ee-EKU-CA_NS-int-EKU-CA_OS.pem',
- 'ee-EKU-CA_NS-int-EKU-CA_SA.pem',
- 'ee-EKU-CA_NS-int-EKU-CA_TS.pem',
- 'ee-EKU-CA_NS-int-EKU-EP.pem',
- 'ee-EKU-CA_NS-int-EKU-EP_NS.pem',
- 'ee-EKU-CA_NS-int-EKU-EP_OS.pem',
- 'ee-EKU-CA_NS-int-EKU-EP_SA.pem',
- 'ee-EKU-CA_NS-int-EKU-EP_TS.pem',
- 'ee-EKU-CA_NS-int-EKU-NONE.pem',
- 'ee-EKU-CA_NS-int-EKU-NS.pem',
- 'ee-EKU-CA_NS-int-EKU-NS_OS.pem',
- 'ee-EKU-CA_NS-int-EKU-NS_SA.pem',
- 'ee-EKU-CA_NS-int-EKU-NS_TS.pem',
- 'ee-EKU-CA_NS-int-EKU-OS.pem',
- 'ee-EKU-CA_NS-int-EKU-OS_SA.pem',
- 'ee-EKU-CA_NS-int-EKU-OS_TS.pem',
- 'ee-EKU-CA_NS-int-EKU-SA.pem',
- 'ee-EKU-CA_NS-int-EKU-SA_TS.pem',
- 'ee-EKU-CA_NS-int-EKU-TS.pem',
- 'ee-EKU-CA_OS-int-EKU-CA.pem',
- 'ee-EKU-CA_OS-int-EKU-CA_EP.pem',
- 'ee-EKU-CA_OS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-CA_OS-int-EKU-CA_NS.pem',
- 'ee-EKU-CA_OS-int-EKU-CA_OS.pem',
- 'ee-EKU-CA_OS-int-EKU-CA_SA.pem',
- 'ee-EKU-CA_OS-int-EKU-CA_TS.pem',
- 'ee-EKU-CA_OS-int-EKU-EP.pem',
- 'ee-EKU-CA_OS-int-EKU-EP_NS.pem',
- 'ee-EKU-CA_OS-int-EKU-EP_OS.pem',
- 'ee-EKU-CA_OS-int-EKU-EP_SA.pem',
- 'ee-EKU-CA_OS-int-EKU-EP_TS.pem',
- 'ee-EKU-CA_OS-int-EKU-NONE.pem',
- 'ee-EKU-CA_OS-int-EKU-NS.pem',
- 'ee-EKU-CA_OS-int-EKU-NS_OS.pem',
- 'ee-EKU-CA_OS-int-EKU-NS_SA.pem',
- 'ee-EKU-CA_OS-int-EKU-NS_TS.pem',
- 'ee-EKU-CA_OS-int-EKU-OS.pem',
- 'ee-EKU-CA_OS-int-EKU-OS_SA.pem',
- 'ee-EKU-CA_OS-int-EKU-OS_TS.pem',
- 'ee-EKU-CA_OS-int-EKU-SA.pem',
- 'ee-EKU-CA_OS-int-EKU-SA_TS.pem',
- 'ee-EKU-CA_OS-int-EKU-TS.pem',
- 'ee-EKU-CA_SA-int-EKU-CA.pem',
- 'ee-EKU-CA_SA-int-EKU-CA_EP.pem',
- 'ee-EKU-CA_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-CA_SA-int-EKU-CA_NS.pem',
- 'ee-EKU-CA_SA-int-EKU-CA_OS.pem',
- 'ee-EKU-CA_SA-int-EKU-CA_SA.pem',
- 'ee-EKU-CA_SA-int-EKU-CA_TS.pem',
- 'ee-EKU-CA_SA-int-EKU-EP.pem',
- 'ee-EKU-CA_SA-int-EKU-EP_NS.pem',
- 'ee-EKU-CA_SA-int-EKU-EP_OS.pem',
- 'ee-EKU-CA_SA-int-EKU-EP_SA.pem',
- 'ee-EKU-CA_SA-int-EKU-EP_TS.pem',
- 'ee-EKU-CA_SA-int-EKU-NONE.pem',
- 'ee-EKU-CA_SA-int-EKU-NS.pem',
- 'ee-EKU-CA_SA-int-EKU-NS_OS.pem',
- 'ee-EKU-CA_SA-int-EKU-NS_SA.pem',
- 'ee-EKU-CA_SA-int-EKU-NS_TS.pem',
- 'ee-EKU-CA_SA-int-EKU-OS.pem',
- 'ee-EKU-CA_SA-int-EKU-OS_SA.pem',
- 'ee-EKU-CA_SA-int-EKU-OS_TS.pem',
- 'ee-EKU-CA_SA-int-EKU-SA.pem',
- 'ee-EKU-CA_SA-int-EKU-SA_TS.pem',
- 'ee-EKU-CA_SA-int-EKU-TS.pem',
- 'ee-EKU-CA_TS-int-EKU-CA.pem',
- 'ee-EKU-CA_TS-int-EKU-CA_EP.pem',
- 'ee-EKU-CA_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-CA_TS-int-EKU-CA_NS.pem',
- 'ee-EKU-CA_TS-int-EKU-CA_OS.pem',
- 'ee-EKU-CA_TS-int-EKU-CA_SA.pem',
- 'ee-EKU-CA_TS-int-EKU-CA_TS.pem',
- 'ee-EKU-CA_TS-int-EKU-EP.pem',
- 'ee-EKU-CA_TS-int-EKU-EP_NS.pem',
- 'ee-EKU-CA_TS-int-EKU-EP_OS.pem',
- 'ee-EKU-CA_TS-int-EKU-EP_SA.pem',
- 'ee-EKU-CA_TS-int-EKU-EP_TS.pem',
- 'ee-EKU-CA_TS-int-EKU-NONE.pem',
- 'ee-EKU-CA_TS-int-EKU-NS.pem',
- 'ee-EKU-CA_TS-int-EKU-NS_OS.pem',
- 'ee-EKU-CA_TS-int-EKU-NS_SA.pem',
- 'ee-EKU-CA_TS-int-EKU-NS_TS.pem',
- 'ee-EKU-CA_TS-int-EKU-OS.pem',
- 'ee-EKU-CA_TS-int-EKU-OS_SA.pem',
- 'ee-EKU-CA_TS-int-EKU-OS_TS.pem',
- 'ee-EKU-CA_TS-int-EKU-SA.pem',
- 'ee-EKU-CA_TS-int-EKU-SA_TS.pem',
- 'ee-EKU-CA_TS-int-EKU-TS.pem',
- 'ee-EKU-EP-int-EKU-CA.pem',
- 'ee-EKU-EP-int-EKU-CA_EP.pem',
- 'ee-EKU-EP-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-EP-int-EKU-CA_NS.pem',
- 'ee-EKU-EP-int-EKU-CA_OS.pem',
- 'ee-EKU-EP-int-EKU-CA_SA.pem',
- 'ee-EKU-EP-int-EKU-CA_TS.pem',
- 'ee-EKU-EP-int-EKU-EP.pem',
- 'ee-EKU-EP-int-EKU-EP_NS.pem',
- 'ee-EKU-EP-int-EKU-EP_OS.pem',
- 'ee-EKU-EP-int-EKU-EP_SA.pem',
- 'ee-EKU-EP-int-EKU-EP_TS.pem',
- 'ee-EKU-EP-int-EKU-NONE.pem',
- 'ee-EKU-EP-int-EKU-NS.pem',
- 'ee-EKU-EP-int-EKU-NS_OS.pem',
- 'ee-EKU-EP-int-EKU-NS_SA.pem',
- 'ee-EKU-EP-int-EKU-NS_TS.pem',
- 'ee-EKU-EP-int-EKU-OS.pem',
- 'ee-EKU-EP-int-EKU-OS_SA.pem',
- 'ee-EKU-EP-int-EKU-OS_TS.pem',
- 'ee-EKU-EP-int-EKU-SA.pem',
- 'ee-EKU-EP-int-EKU-SA_TS.pem',
- 'ee-EKU-EP-int-EKU-TS.pem',
- 'ee-EKU-EP_NS-int-EKU-CA.pem',
- 'ee-EKU-EP_NS-int-EKU-CA_EP.pem',
- 'ee-EKU-EP_NS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-EP_NS-int-EKU-CA_NS.pem',
- 'ee-EKU-EP_NS-int-EKU-CA_OS.pem',
- 'ee-EKU-EP_NS-int-EKU-CA_SA.pem',
- 'ee-EKU-EP_NS-int-EKU-CA_TS.pem',
- 'ee-EKU-EP_NS-int-EKU-EP.pem',
- 'ee-EKU-EP_NS-int-EKU-EP_NS.pem',
- 'ee-EKU-EP_NS-int-EKU-EP_OS.pem',
- 'ee-EKU-EP_NS-int-EKU-EP_SA.pem',
- 'ee-EKU-EP_NS-int-EKU-EP_TS.pem',
- 'ee-EKU-EP_NS-int-EKU-NONE.pem',
- 'ee-EKU-EP_NS-int-EKU-NS.pem',
- 'ee-EKU-EP_NS-int-EKU-NS_OS.pem',
- 'ee-EKU-EP_NS-int-EKU-NS_SA.pem',
- 'ee-EKU-EP_NS-int-EKU-NS_TS.pem',
- 'ee-EKU-EP_NS-int-EKU-OS.pem',
- 'ee-EKU-EP_NS-int-EKU-OS_SA.pem',
- 'ee-EKU-EP_NS-int-EKU-OS_TS.pem',
- 'ee-EKU-EP_NS-int-EKU-SA.pem',
- 'ee-EKU-EP_NS-int-EKU-SA_TS.pem',
- 'ee-EKU-EP_NS-int-EKU-TS.pem',
- 'ee-EKU-EP_OS-int-EKU-CA.pem',
- 'ee-EKU-EP_OS-int-EKU-CA_EP.pem',
- 'ee-EKU-EP_OS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-EP_OS-int-EKU-CA_NS.pem',
- 'ee-EKU-EP_OS-int-EKU-CA_OS.pem',
- 'ee-EKU-EP_OS-int-EKU-CA_SA.pem',
- 'ee-EKU-EP_OS-int-EKU-CA_TS.pem',
- 'ee-EKU-EP_OS-int-EKU-EP.pem',
- 'ee-EKU-EP_OS-int-EKU-EP_NS.pem',
- 'ee-EKU-EP_OS-int-EKU-EP_OS.pem',
- 'ee-EKU-EP_OS-int-EKU-EP_SA.pem',
- 'ee-EKU-EP_OS-int-EKU-EP_TS.pem',
- 'ee-EKU-EP_OS-int-EKU-NONE.pem',
- 'ee-EKU-EP_OS-int-EKU-NS.pem',
- 'ee-EKU-EP_OS-int-EKU-NS_OS.pem',
- 'ee-EKU-EP_OS-int-EKU-NS_SA.pem',
- 'ee-EKU-EP_OS-int-EKU-NS_TS.pem',
- 'ee-EKU-EP_OS-int-EKU-OS.pem',
- 'ee-EKU-EP_OS-int-EKU-OS_SA.pem',
- 'ee-EKU-EP_OS-int-EKU-OS_TS.pem',
- 'ee-EKU-EP_OS-int-EKU-SA.pem',
- 'ee-EKU-EP_OS-int-EKU-SA_TS.pem',
- 'ee-EKU-EP_OS-int-EKU-TS.pem',
- 'ee-EKU-EP_SA-int-EKU-CA.pem',
- 'ee-EKU-EP_SA-int-EKU-CA_EP.pem',
- 'ee-EKU-EP_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-EP_SA-int-EKU-CA_NS.pem',
- 'ee-EKU-EP_SA-int-EKU-CA_OS.pem',
- 'ee-EKU-EP_SA-int-EKU-CA_SA.pem',
- 'ee-EKU-EP_SA-int-EKU-CA_TS.pem',
- 'ee-EKU-EP_SA-int-EKU-EP.pem',
- 'ee-EKU-EP_SA-int-EKU-EP_NS.pem',
- 'ee-EKU-EP_SA-int-EKU-EP_OS.pem',
- 'ee-EKU-EP_SA-int-EKU-EP_SA.pem',
- 'ee-EKU-EP_SA-int-EKU-EP_TS.pem',
- 'ee-EKU-EP_SA-int-EKU-NONE.pem',
- 'ee-EKU-EP_SA-int-EKU-NS.pem',
- 'ee-EKU-EP_SA-int-EKU-NS_OS.pem',
- 'ee-EKU-EP_SA-int-EKU-NS_SA.pem',
- 'ee-EKU-EP_SA-int-EKU-NS_TS.pem',
- 'ee-EKU-EP_SA-int-EKU-OS.pem',
- 'ee-EKU-EP_SA-int-EKU-OS_SA.pem',
- 'ee-EKU-EP_SA-int-EKU-OS_TS.pem',
- 'ee-EKU-EP_SA-int-EKU-SA.pem',
- 'ee-EKU-EP_SA-int-EKU-SA_TS.pem',
- 'ee-EKU-EP_SA-int-EKU-TS.pem',
- 'ee-EKU-EP_TS-int-EKU-CA.pem',
- 'ee-EKU-EP_TS-int-EKU-CA_EP.pem',
- 'ee-EKU-EP_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-EP_TS-int-EKU-CA_NS.pem',
- 'ee-EKU-EP_TS-int-EKU-CA_OS.pem',
- 'ee-EKU-EP_TS-int-EKU-CA_SA.pem',
- 'ee-EKU-EP_TS-int-EKU-CA_TS.pem',
- 'ee-EKU-EP_TS-int-EKU-EP.pem',
- 'ee-EKU-EP_TS-int-EKU-EP_NS.pem',
- 'ee-EKU-EP_TS-int-EKU-EP_OS.pem',
- 'ee-EKU-EP_TS-int-EKU-EP_SA.pem',
- 'ee-EKU-EP_TS-int-EKU-EP_TS.pem',
- 'ee-EKU-EP_TS-int-EKU-NONE.pem',
- 'ee-EKU-EP_TS-int-EKU-NS.pem',
- 'ee-EKU-EP_TS-int-EKU-NS_OS.pem',
- 'ee-EKU-EP_TS-int-EKU-NS_SA.pem',
- 'ee-EKU-EP_TS-int-EKU-NS_TS.pem',
- 'ee-EKU-EP_TS-int-EKU-OS.pem',
- 'ee-EKU-EP_TS-int-EKU-OS_SA.pem',
- 'ee-EKU-EP_TS-int-EKU-OS_TS.pem',
- 'ee-EKU-EP_TS-int-EKU-SA.pem',
- 'ee-EKU-EP_TS-int-EKU-SA_TS.pem',
- 'ee-EKU-EP_TS-int-EKU-TS.pem',
- 'ee-EKU-NONE-int-EKU-CA.pem',
- 'ee-EKU-NONE-int-EKU-CA_EP.pem',
- 'ee-EKU-NONE-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-NONE-int-EKU-CA_NS.pem',
- 'ee-EKU-NONE-int-EKU-CA_OS.pem',
- 'ee-EKU-NONE-int-EKU-CA_SA.pem',
- 'ee-EKU-NONE-int-EKU-CA_TS.pem',
- 'ee-EKU-NONE-int-EKU-EP.pem',
- 'ee-EKU-NONE-int-EKU-EP_NS.pem',
- 'ee-EKU-NONE-int-EKU-EP_OS.pem',
- 'ee-EKU-NONE-int-EKU-EP_SA.pem',
- 'ee-EKU-NONE-int-EKU-EP_TS.pem',
- 'ee-EKU-NONE-int-EKU-NONE.pem',
- 'ee-EKU-NONE-int-EKU-NS.pem',
- 'ee-EKU-NONE-int-EKU-NS_OS.pem',
- 'ee-EKU-NONE-int-EKU-NS_SA.pem',
- 'ee-EKU-NONE-int-EKU-NS_TS.pem',
- 'ee-EKU-NONE-int-EKU-OS.pem',
- 'ee-EKU-NONE-int-EKU-OS_SA.pem',
- 'ee-EKU-NONE-int-EKU-OS_TS.pem',
- 'ee-EKU-NONE-int-EKU-SA.pem',
- 'ee-EKU-NONE-int-EKU-SA_TS.pem',
- 'ee-EKU-NONE-int-EKU-TS.pem',
- 'ee-EKU-NS-int-EKU-CA.pem',
- 'ee-EKU-NS-int-EKU-CA_EP.pem',
- 'ee-EKU-NS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-NS-int-EKU-CA_NS.pem',
- 'ee-EKU-NS-int-EKU-CA_OS.pem',
- 'ee-EKU-NS-int-EKU-CA_SA.pem',
- 'ee-EKU-NS-int-EKU-CA_TS.pem',
- 'ee-EKU-NS-int-EKU-EP.pem',
- 'ee-EKU-NS-int-EKU-EP_NS.pem',
- 'ee-EKU-NS-int-EKU-EP_OS.pem',
- 'ee-EKU-NS-int-EKU-EP_SA.pem',
- 'ee-EKU-NS-int-EKU-EP_TS.pem',
- 'ee-EKU-NS-int-EKU-NONE.pem',
- 'ee-EKU-NS-int-EKU-NS.pem',
- 'ee-EKU-NS-int-EKU-NS_OS.pem',
- 'ee-EKU-NS-int-EKU-NS_SA.pem',
- 'ee-EKU-NS-int-EKU-NS_TS.pem',
- 'ee-EKU-NS-int-EKU-OS.pem',
- 'ee-EKU-NS-int-EKU-OS_SA.pem',
- 'ee-EKU-NS-int-EKU-OS_TS.pem',
- 'ee-EKU-NS-int-EKU-SA.pem',
- 'ee-EKU-NS-int-EKU-SA_TS.pem',
- 'ee-EKU-NS-int-EKU-TS.pem',
- 'ee-EKU-NS_OS-int-EKU-CA.pem',
- 'ee-EKU-NS_OS-int-EKU-CA_EP.pem',
- 'ee-EKU-NS_OS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-NS_OS-int-EKU-CA_NS.pem',
- 'ee-EKU-NS_OS-int-EKU-CA_OS.pem',
- 'ee-EKU-NS_OS-int-EKU-CA_SA.pem',
- 'ee-EKU-NS_OS-int-EKU-CA_TS.pem',
- 'ee-EKU-NS_OS-int-EKU-EP.pem',
- 'ee-EKU-NS_OS-int-EKU-EP_NS.pem',
- 'ee-EKU-NS_OS-int-EKU-EP_OS.pem',
- 'ee-EKU-NS_OS-int-EKU-EP_SA.pem',
- 'ee-EKU-NS_OS-int-EKU-EP_TS.pem',
- 'ee-EKU-NS_OS-int-EKU-NONE.pem',
- 'ee-EKU-NS_OS-int-EKU-NS.pem',
- 'ee-EKU-NS_OS-int-EKU-NS_OS.pem',
- 'ee-EKU-NS_OS-int-EKU-NS_SA.pem',
- 'ee-EKU-NS_OS-int-EKU-NS_TS.pem',
- 'ee-EKU-NS_OS-int-EKU-OS.pem',
- 'ee-EKU-NS_OS-int-EKU-OS_SA.pem',
- 'ee-EKU-NS_OS-int-EKU-OS_TS.pem',
- 'ee-EKU-NS_OS-int-EKU-SA.pem',
- 'ee-EKU-NS_OS-int-EKU-SA_TS.pem',
- 'ee-EKU-NS_OS-int-EKU-TS.pem',
- 'ee-EKU-NS_SA-int-EKU-CA.pem',
- 'ee-EKU-NS_SA-int-EKU-CA_EP.pem',
- 'ee-EKU-NS_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-NS_SA-int-EKU-CA_NS.pem',
- 'ee-EKU-NS_SA-int-EKU-CA_OS.pem',
- 'ee-EKU-NS_SA-int-EKU-CA_SA.pem',
- 'ee-EKU-NS_SA-int-EKU-CA_TS.pem',
- 'ee-EKU-NS_SA-int-EKU-EP.pem',
- 'ee-EKU-NS_SA-int-EKU-EP_NS.pem',
- 'ee-EKU-NS_SA-int-EKU-EP_OS.pem',
- 'ee-EKU-NS_SA-int-EKU-EP_SA.pem',
- 'ee-EKU-NS_SA-int-EKU-EP_TS.pem',
- 'ee-EKU-NS_SA-int-EKU-NONE.pem',
- 'ee-EKU-NS_SA-int-EKU-NS.pem',
- 'ee-EKU-NS_SA-int-EKU-NS_OS.pem',
- 'ee-EKU-NS_SA-int-EKU-NS_SA.pem',
- 'ee-EKU-NS_SA-int-EKU-NS_TS.pem',
- 'ee-EKU-NS_SA-int-EKU-OS.pem',
- 'ee-EKU-NS_SA-int-EKU-OS_SA.pem',
- 'ee-EKU-NS_SA-int-EKU-OS_TS.pem',
- 'ee-EKU-NS_SA-int-EKU-SA.pem',
- 'ee-EKU-NS_SA-int-EKU-SA_TS.pem',
- 'ee-EKU-NS_SA-int-EKU-TS.pem',
- 'ee-EKU-NS_TS-int-EKU-CA.pem',
- 'ee-EKU-NS_TS-int-EKU-CA_EP.pem',
- 'ee-EKU-NS_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-NS_TS-int-EKU-CA_NS.pem',
- 'ee-EKU-NS_TS-int-EKU-CA_OS.pem',
- 'ee-EKU-NS_TS-int-EKU-CA_SA.pem',
- 'ee-EKU-NS_TS-int-EKU-CA_TS.pem',
- 'ee-EKU-NS_TS-int-EKU-EP.pem',
- 'ee-EKU-NS_TS-int-EKU-EP_NS.pem',
- 'ee-EKU-NS_TS-int-EKU-EP_OS.pem',
- 'ee-EKU-NS_TS-int-EKU-EP_SA.pem',
- 'ee-EKU-NS_TS-int-EKU-EP_TS.pem',
- 'ee-EKU-NS_TS-int-EKU-NONE.pem',
- 'ee-EKU-NS_TS-int-EKU-NS.pem',
- 'ee-EKU-NS_TS-int-EKU-NS_OS.pem',
- 'ee-EKU-NS_TS-int-EKU-NS_SA.pem',
- 'ee-EKU-NS_TS-int-EKU-NS_TS.pem',
- 'ee-EKU-NS_TS-int-EKU-OS.pem',
- 'ee-EKU-NS_TS-int-EKU-OS_SA.pem',
- 'ee-EKU-NS_TS-int-EKU-OS_TS.pem',
- 'ee-EKU-NS_TS-int-EKU-SA.pem',
- 'ee-EKU-NS_TS-int-EKU-SA_TS.pem',
- 'ee-EKU-NS_TS-int-EKU-TS.pem',
- 'ee-EKU-OS-int-EKU-CA.pem',
- 'ee-EKU-OS-int-EKU-CA_EP.pem',
- 'ee-EKU-OS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-OS-int-EKU-CA_NS.pem',
- 'ee-EKU-OS-int-EKU-CA_OS.pem',
- 'ee-EKU-OS-int-EKU-CA_SA.pem',
- 'ee-EKU-OS-int-EKU-CA_TS.pem',
- 'ee-EKU-OS-int-EKU-EP.pem',
- 'ee-EKU-OS-int-EKU-EP_NS.pem',
- 'ee-EKU-OS-int-EKU-EP_OS.pem',
- 'ee-EKU-OS-int-EKU-EP_SA.pem',
- 'ee-EKU-OS-int-EKU-EP_TS.pem',
- 'ee-EKU-OS-int-EKU-NONE.pem',
- 'ee-EKU-OS-int-EKU-NS.pem',
- 'ee-EKU-OS-int-EKU-NS_OS.pem',
- 'ee-EKU-OS-int-EKU-NS_SA.pem',
- 'ee-EKU-OS-int-EKU-NS_TS.pem',
- 'ee-EKU-OS-int-EKU-OS.pem',
- 'ee-EKU-OS-int-EKU-OS_SA.pem',
- 'ee-EKU-OS-int-EKU-OS_TS.pem',
- 'ee-EKU-OS-int-EKU-SA.pem',
- 'ee-EKU-OS-int-EKU-SA_TS.pem',
- 'ee-EKU-OS-int-EKU-TS.pem',
- 'ee-EKU-OS_SA-int-EKU-CA.pem',
- 'ee-EKU-OS_SA-int-EKU-CA_EP.pem',
- 'ee-EKU-OS_SA-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-OS_SA-int-EKU-CA_NS.pem',
- 'ee-EKU-OS_SA-int-EKU-CA_OS.pem',
- 'ee-EKU-OS_SA-int-EKU-CA_SA.pem',
- 'ee-EKU-OS_SA-int-EKU-CA_TS.pem',
- 'ee-EKU-OS_SA-int-EKU-EP.pem',
- 'ee-EKU-OS_SA-int-EKU-EP_NS.pem',
- 'ee-EKU-OS_SA-int-EKU-EP_OS.pem',
- 'ee-EKU-OS_SA-int-EKU-EP_SA.pem',
- 'ee-EKU-OS_SA-int-EKU-EP_TS.pem',
- 'ee-EKU-OS_SA-int-EKU-NONE.pem',
- 'ee-EKU-OS_SA-int-EKU-NS.pem',
- 'ee-EKU-OS_SA-int-EKU-NS_OS.pem',
- 'ee-EKU-OS_SA-int-EKU-NS_SA.pem',
- 'ee-EKU-OS_SA-int-EKU-NS_TS.pem',
- 'ee-EKU-OS_SA-int-EKU-OS.pem',
- 'ee-EKU-OS_SA-int-EKU-OS_SA.pem',
- 'ee-EKU-OS_SA-int-EKU-OS_TS.pem',
- 'ee-EKU-OS_SA-int-EKU-SA.pem',
- 'ee-EKU-OS_SA-int-EKU-SA_TS.pem',
- 'ee-EKU-OS_SA-int-EKU-TS.pem',
- 'ee-EKU-OS_TS-int-EKU-CA.pem',
- 'ee-EKU-OS_TS-int-EKU-CA_EP.pem',
- 'ee-EKU-OS_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-OS_TS-int-EKU-CA_NS.pem',
- 'ee-EKU-OS_TS-int-EKU-CA_OS.pem',
- 'ee-EKU-OS_TS-int-EKU-CA_SA.pem',
- 'ee-EKU-OS_TS-int-EKU-CA_TS.pem',
- 'ee-EKU-OS_TS-int-EKU-EP.pem',
- 'ee-EKU-OS_TS-int-EKU-EP_NS.pem',
- 'ee-EKU-OS_TS-int-EKU-EP_OS.pem',
- 'ee-EKU-OS_TS-int-EKU-EP_SA.pem',
- 'ee-EKU-OS_TS-int-EKU-EP_TS.pem',
- 'ee-EKU-OS_TS-int-EKU-NONE.pem',
- 'ee-EKU-OS_TS-int-EKU-NS.pem',
- 'ee-EKU-OS_TS-int-EKU-NS_OS.pem',
- 'ee-EKU-OS_TS-int-EKU-NS_SA.pem',
- 'ee-EKU-OS_TS-int-EKU-NS_TS.pem',
- 'ee-EKU-OS_TS-int-EKU-OS.pem',
- 'ee-EKU-OS_TS-int-EKU-OS_SA.pem',
- 'ee-EKU-OS_TS-int-EKU-OS_TS.pem',
- 'ee-EKU-OS_TS-int-EKU-SA.pem',
- 'ee-EKU-OS_TS-int-EKU-SA_TS.pem',
- 'ee-EKU-OS_TS-int-EKU-TS.pem',
- 'ee-EKU-SA-int-EKU-CA.pem',
- 'ee-EKU-SA-int-EKU-CA_EP.pem',
- 'ee-EKU-SA-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-SA-int-EKU-CA_NS.pem',
- 'ee-EKU-SA-int-EKU-CA_OS.pem',
- 'ee-EKU-SA-int-EKU-CA_SA.pem',
- 'ee-EKU-SA-int-EKU-CA_TS.pem',
- 'ee-EKU-SA-int-EKU-EP.pem',
- 'ee-EKU-SA-int-EKU-EP_NS.pem',
- 'ee-EKU-SA-int-EKU-EP_OS.pem',
- 'ee-EKU-SA-int-EKU-EP_SA.pem',
- 'ee-EKU-SA-int-EKU-EP_TS.pem',
- 'ee-EKU-SA-int-EKU-NONE.pem',
- 'ee-EKU-SA-int-EKU-NS.pem',
- 'ee-EKU-SA-int-EKU-NS_OS.pem',
- 'ee-EKU-SA-int-EKU-NS_SA.pem',
- 'ee-EKU-SA-int-EKU-NS_TS.pem',
- 'ee-EKU-SA-int-EKU-OS.pem',
- 'ee-EKU-SA-int-EKU-OS_SA.pem',
- 'ee-EKU-SA-int-EKU-OS_TS.pem',
- 'ee-EKU-SA-int-EKU-SA.pem',
- 'ee-EKU-SA-int-EKU-SA_TS.pem',
- 'ee-EKU-SA-int-EKU-TS.pem',
- 'ee-EKU-SA_TS-int-EKU-CA.pem',
- 'ee-EKU-SA_TS-int-EKU-CA_EP.pem',
- 'ee-EKU-SA_TS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-SA_TS-int-EKU-CA_NS.pem',
- 'ee-EKU-SA_TS-int-EKU-CA_OS.pem',
- 'ee-EKU-SA_TS-int-EKU-CA_SA.pem',
- 'ee-EKU-SA_TS-int-EKU-CA_TS.pem',
- 'ee-EKU-SA_TS-int-EKU-EP.pem',
- 'ee-EKU-SA_TS-int-EKU-EP_NS.pem',
- 'ee-EKU-SA_TS-int-EKU-EP_OS.pem',
- 'ee-EKU-SA_TS-int-EKU-EP_SA.pem',
- 'ee-EKU-SA_TS-int-EKU-EP_TS.pem',
- 'ee-EKU-SA_TS-int-EKU-NONE.pem',
- 'ee-EKU-SA_TS-int-EKU-NS.pem',
- 'ee-EKU-SA_TS-int-EKU-NS_OS.pem',
- 'ee-EKU-SA_TS-int-EKU-NS_SA.pem',
- 'ee-EKU-SA_TS-int-EKU-NS_TS.pem',
- 'ee-EKU-SA_TS-int-EKU-OS.pem',
- 'ee-EKU-SA_TS-int-EKU-OS_SA.pem',
- 'ee-EKU-SA_TS-int-EKU-OS_TS.pem',
- 'ee-EKU-SA_TS-int-EKU-SA.pem',
- 'ee-EKU-SA_TS-int-EKU-SA_TS.pem',
- 'ee-EKU-SA_TS-int-EKU-TS.pem',
- 'ee-EKU-TS-int-EKU-CA.pem',
- 'ee-EKU-TS-int-EKU-CA_EP.pem',
- 'ee-EKU-TS-int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'ee-EKU-TS-int-EKU-CA_NS.pem',
- 'ee-EKU-TS-int-EKU-CA_OS.pem',
- 'ee-EKU-TS-int-EKU-CA_SA.pem',
- 'ee-EKU-TS-int-EKU-CA_TS.pem',
- 'ee-EKU-TS-int-EKU-EP.pem',
- 'ee-EKU-TS-int-EKU-EP_NS.pem',
- 'ee-EKU-TS-int-EKU-EP_OS.pem',
- 'ee-EKU-TS-int-EKU-EP_SA.pem',
- 'ee-EKU-TS-int-EKU-EP_TS.pem',
- 'ee-EKU-TS-int-EKU-NONE.pem',
- 'ee-EKU-TS-int-EKU-NS.pem',
- 'ee-EKU-TS-int-EKU-NS_OS.pem',
- 'ee-EKU-TS-int-EKU-NS_SA.pem',
- 'ee-EKU-TS-int-EKU-NS_TS.pem',
- 'ee-EKU-TS-int-EKU-OS.pem',
- 'ee-EKU-TS-int-EKU-OS_SA.pem',
- 'ee-EKU-TS-int-EKU-OS_TS.pem',
- 'ee-EKU-TS-int-EKU-SA.pem',
- 'ee-EKU-TS-int-EKU-SA_TS.pem',
- 'ee-EKU-TS-int-EKU-TS.pem',
- 'int-EKU-CA.pem',
- 'int-EKU-CA_EP.pem',
- 'int-EKU-CA_EP_NS_OS_SA_TS.pem',
- 'int-EKU-CA_NS.pem',
- 'int-EKU-CA_OS.pem',
- 'int-EKU-CA_SA.pem',
- 'int-EKU-CA_TS.pem',
- 'int-EKU-EP.pem',
- 'int-EKU-EP_NS.pem',
- 'int-EKU-EP_OS.pem',
- 'int-EKU-EP_SA.pem',
- 'int-EKU-EP_TS.pem',
- 'int-EKU-NONE.pem',
- 'int-EKU-NS.pem',
- 'int-EKU-NS_OS.pem',
- 'int-EKU-NS_SA.pem',
- 'int-EKU-NS_TS.pem',
- 'int-EKU-OS.pem',
- 'int-EKU-OS_SA.pem',
- 'int-EKU-OS_TS.pem',
- 'int-EKU-SA.pem',
- 'int-EKU-SA_TS.pem',
- 'int-EKU-TS.pem',
+ 'ee-CA.pem',
+ 'ee-SA-CA.pem',
+ 'ee-SA-OCSP.pem',
+ 'ee-SA-nsSGC.pem',
+ 'ee-SA.pem',
+ 'ee-int-CA.pem',
+ 'ee-int-SA-CA.pem',
+ 'ee-int-SA-OCSP.pem',
+ 'ee-int-SA-nsSGC.pem',
+ 'ee-int-SA.pem',
+ 'ee-int-nsSGC.pem',
+ 'ee-nsSGC.pem',
+ 'int-CA.pem',
+ 'int-SA-CA.pem',
+ 'int-SA-OCSP.pem',
+ 'int-SA-nsSGC.pem',
+ 'int-SA.pem',
+ 'int-nsSGC.pem',
)
for test_certificate in test_certificates:
GeneratedTestCertificate(test_certificate)
--- a/security/manager/ssl/tests/unit/xpcshell.ini
+++ b/security/manager/ssl/tests/unit/xpcshell.ini
@@ -28,39 +28,17 @@ support-files =
[test_add_preexisting_cert.js]
[test_cert_blocklist.js]
skip-if = buildapp == "b2g"
tags = addons psm
[test_cert_chains.js]
run-sequentially = hardcoded ports
[test_cert_dbKey.js]
-[test_cert_eku-CA.js]
-[test_cert_eku-CA_EP.js]
-[test_cert_eku-CA_EP_NS_OS_SA_TS.js]
-[test_cert_eku-CA_NS.js]
-[test_cert_eku-CA_OS.js]
-[test_cert_eku-CA_SA.js]
-[test_cert_eku-CA_TS.js]
-[test_cert_eku-EP.js]
-[test_cert_eku-EP_NS.js]
-[test_cert_eku-EP_OS.js]
-[test_cert_eku-EP_SA.js]
-[test_cert_eku-EP_TS.js]
-[test_cert_eku-NONE.js]
-[test_cert_eku-NS.js]
-[test_cert_eku-NS_OS.js]
-[test_cert_eku-NS_SA.js]
-[test_cert_eku-NS_TS.js]
-[test_cert_eku-OS.js]
-[test_cert_eku-OS_SA.js]
-[test_cert_eku-OS_TS.js]
-[test_cert_eku-SA.js]
-[test_cert_eku-SA_TS.js]
-[test_cert_eku-TS.js]
+[test_cert_eku.js]
[test_cert_embedded_null.js]
[test_cert_keyUsage.js]
[test_cert_overrides.js]
run-sequentially = hardcoded ports
[test_cert_override_bits_mismatches.js]
run-sequentially = hardcoded ports
[test_cert_sha1.js]
[test_cert_signatures.js]