| OLD | NEW |
| (Empty) | |
| 1 #!/usr/bin/env python |
| 2 # Copyright 2015 The Chromium Authors. All rights reserved. |
| 3 # Use of this source code is governed by a BSD-style license that can be |
| 4 # found in the LICENSE file. |
| 5 |
| 6 import base64 |
| 7 import copy |
| 8 import os |
| 9 import random |
| 10 import subprocess |
| 11 import sys |
| 12 import tempfile |
| 13 |
| 14 sys.path += [os.path.join('..', 'verify_name_match_unittest', 'scripts')] |
| 15 |
| 16 import generate_names |
| 17 |
| 18 |
| 19 def generate(s, out_fn): |
| 20 conf_tempfile = tempfile.NamedTemporaryFile() |
| 21 conf_tempfile.write(str(s)) |
| 22 conf_tempfile.flush() |
| 23 der_tmpfile = tempfile.NamedTemporaryFile() |
| 24 description_tmpfile = tempfile.NamedTemporaryFile() |
| 25 subprocess.check_call(['openssl', 'asn1parse', '-genconf', conf_tempfile.name, |
| 26 '-i', '-out', der_tmpfile.name], |
| 27 stdout=description_tmpfile) |
| 28 conf_tempfile.close() |
| 29 |
| 30 output_file = open(out_fn, 'w') |
| 31 description_tmpfile.seek(0) |
| 32 output_file.write(description_tmpfile.read()) |
| 33 output_file.write('-----BEGIN %s-----\n' % s.token()) |
| 34 output_file.write(base64.encodestring(der_tmpfile.read())) |
| 35 output_file.write('-----END %s-----\n' % s.token()) |
| 36 output_file.close() |
| 37 |
| 38 |
| 39 class SubjectAltNameGenerator: |
| 40 def __init__(self): |
| 41 self.names = [] |
| 42 |
| 43 def token(self): |
| 44 return "SUBJECT ALTERNATIVE NAME" |
| 45 |
| 46 def add_name(self, general_name): |
| 47 self.names.append(general_name) |
| 48 |
| 49 def __str__(self): |
| 50 s = "asn1 = OCTWRAP,SEQUENCE:subjectAltNameSequence\n" |
| 51 s += "[subjectAltNameSequence]\n" |
| 52 s_suffix = "" |
| 53 for n, name in enumerate(self.names): |
| 54 n1, n2 = (str(name) + '\n').split('\n', 1) |
| 55 if n2: |
| 56 s_suffix += n2 + '\n' |
| 57 s += '%s%s\n' % (n, n1) |
| 58 |
| 59 return s + s_suffix |
| 60 |
| 61 |
| 62 class NameConstraintsGenerator: |
| 63 def __init__(self, |
| 64 force_permitted_sequence=False, |
| 65 force_excluded_sequence=False): |
| 66 self.permitted = [] |
| 67 self.excluded = [] |
| 68 self.force_permitted_sequence = force_permitted_sequence |
| 69 self.force_excluded_sequence = force_excluded_sequence |
| 70 |
| 71 def token(self): |
| 72 return "NAME CONSTRAINTS" |
| 73 |
| 74 def union_from(self, c): |
| 75 self.permitted.extend(c.permitted) |
| 76 self.excluded.extend(c.excluded) |
| 77 |
| 78 def add_permitted(self, general_name): |
| 79 self.permitted.append(general_name) |
| 80 |
| 81 def add_excluded(self, general_name): |
| 82 self.excluded.append(general_name) |
| 83 |
| 84 def __str__(self): |
| 85 s = "asn1 = SEQUENCE:nameConstraintsSequence\n[nameConstraintsSequence]\n" |
| 86 |
| 87 if self.permitted or self.force_permitted_sequence: |
| 88 s += "permittedSubtrees = IMPLICIT:0,SEQUENCE:permittedSubtreesSequence\n" |
| 89 if self.excluded or self.force_excluded_sequence: |
| 90 s += "excludedSubtrees = IMPLICIT:1,SEQUENCE:excludedSubtreesSequence\n" |
| 91 |
| 92 if self.permitted or self.force_permitted_sequence: |
| 93 s += "[permittedSubtreesSequence]\n" |
| 94 for n, subtree in enumerate(self.permitted): |
| 95 s += 'subtree%i = SEQUENCE:permittedSubtree%i\n' % (n, n) |
| 96 |
| 97 if self.excluded or self.force_excluded_sequence: |
| 98 s += "[excludedSubtreesSequence]\n" |
| 99 for n, subtree in enumerate(self.excluded): |
| 100 s += 'subtree%i = SEQUENCE:excludedSubtree%i\n' % (n, n) |
| 101 |
| 102 for n, subtree in enumerate(self.permitted): |
| 103 s += '[permittedSubtree%i]\n%s\n' % (n, subtree) |
| 104 |
| 105 for n, subtree in enumerate(self.excluded): |
| 106 s += '[excludedSubtree%i]\n%s\n' % (n, subtree) |
| 107 |
| 108 return s |
| 109 |
| 110 |
| 111 def otherName(): |
| 112 i = random.randint(0, sys.maxint) |
| 113 s = 'otherName = IMPLICIT:0,SEQUENCE:otherNameSequence%i\n' % i |
| 114 s += '[otherNameSequence%i]\n' % i |
| 115 s += 'type_id = OID:1.2.3.4.5\n' |
| 116 s += 'value = FORMAT:HEX,OCTETSTRING:DEADBEEF\n' |
| 117 return s |
| 118 |
| 119 |
| 120 def rfc822Name(name): |
| 121 return 'rfc822Name = IMPLICIT:1,IA5STRING:' + name |
| 122 |
| 123 |
| 124 def dNSName(name): |
| 125 return 'dNSName = IMPLICIT:2,IA5STRING:' + name |
| 126 |
| 127 |
| 128 def x400Address(): |
| 129 i = random.randint(0, sys.maxint) |
| 130 s = 'x400Address = IMPLICIT:3,SEQUENCE:x400AddressSequence%i\n' % i |
| 131 s += '[x400AddressSequence%i]\n' % i |
| 132 s += 'builtinstandardattributes = SEQUENCE:BuiltInStandardAttributes%i\n' % i |
| 133 s += '[BuiltInStandardAttributes%i]\n' % i |
| 134 s += 'countryname = EXPLICIT:1A,PRINTABLESTRING:US\n' |
| 135 return s |
| 136 |
| 137 |
| 138 def directoryName(name): |
| 139 return str(name).replace( |
| 140 'asn1 = SEQUENCE', 'directoryName = IMPLICIT:4,SEQUENCE') |
| 141 |
| 142 |
| 143 def ediPartyName(): |
| 144 i = random.randint(0, sys.maxint) |
| 145 s = 'ediPartyName = IMPLICIT:5,SEQUENCE:ediPartyNameSequence%i\n' % i |
| 146 s += '[ediPartyNameSequence%i]\n' % i |
| 147 s += 'partyName = IMPLICIT:1,UTF8:foo\n' |
| 148 return s |
| 149 |
| 150 |
| 151 def uniformResourceIdentifier(name): |
| 152 return 'uniformResourceIdentifier = IMPLICIT:6,IA5STRING:' + name |
| 153 |
| 154 |
| 155 def iPAddress(addr, enforce_length=True): |
| 156 if enforce_length: |
| 157 assert len(addr) in (4,16) |
| 158 addr_str = "" |
| 159 for addr_byte in addr: |
| 160 addr_str += '%02X'%(addr_byte) |
| 161 return 'iPAddress = IMPLICIT:7,FORMAT:HEX,OCTETSTRING:' + addr_str |
| 162 |
| 163 |
| 164 def iPAddressRange(addr, netmask, enforce_length=True): |
| 165 if enforce_length: |
| 166 assert len(addr) == len(netmask) |
| 167 assert len(addr) in (4,16) |
| 168 addr_str = "" |
| 169 netmask_str = "" |
| 170 for addr_byte, mask_byte in map(None, addr, netmask): |
| 171 assert (addr_byte & ~mask_byte) == 0 |
| 172 addr_str += '%02X'%(addr_byte) |
| 173 netmask_str += '%02X'%(mask_byte) |
| 174 return ('iPAddress = IMPLICIT:7,FORMAT:HEX,OCTETSTRING:' + addr_str + |
| 175 netmask_str) |
| 176 |
| 177 |
| 178 def registeredID(oid): |
| 179 return 'registeredID = IMPLICIT:8,OID:' + oid |
| 180 |
| 181 |
| 182 def WithMinMax(val, minimum=None, maximum=None): |
| 183 s = val |
| 184 s += '\n' |
| 185 assert '\n[' not in s |
| 186 if minimum is not None: |
| 187 s += 'minimum = IMPLICIT:0,INTEGER:%i\n' % minimum |
| 188 if maximum is not None: |
| 189 s += 'maximum = IMPLICIT:1,INTEGER:%i\n' % maximum |
| 190 return s |
| 191 |
| 192 |
| 193 def main(): |
| 194 dnsname_constraints = NameConstraintsGenerator() |
| 195 dnsname_constraints.add_permitted(dNSName("permitted.example.com")) |
| 196 dnsname_constraints.add_permitted(dNSName("permitted.example2.com")) |
| 197 dnsname_constraints.add_permitted(dNSName("permitted.example3.com.")) |
| 198 dnsname_constraints.add_permitted(dNSName("alsopermitted.example.com")) |
| 199 dnsname_constraints.add_excluded(dNSName("excluded.permitted.example.com")) |
| 200 dnsname_constraints.add_permitted( |
| 201 dNSName("stillnotpermitted.excluded.permitted.example.com")) |
| 202 dnsname_constraints.add_excluded(dNSName("extraneousexclusion.example.com")) |
| 203 generate(dnsname_constraints, "dnsname.pem") |
| 204 |
| 205 c = NameConstraintsGenerator() |
| 206 c.add_excluded(dNSName("excluded.permitted.example.com")) |
| 207 generate(c, "dnsname-excluded.pem") |
| 208 |
| 209 c = NameConstraintsGenerator() |
| 210 c.add_permitted(dNSName("permitted.example.com")) |
| 211 c.add_excluded(dNSName("")) |
| 212 generate(c, "dnsname-excludeall.pem") |
| 213 |
| 214 c = NameConstraintsGenerator() |
| 215 c.add_permitted(dNSName("permitted.example.com")) |
| 216 c.add_excluded(dNSName(".")) |
| 217 generate(c, "dnsname-exclude_dot.pem") |
| 218 |
| 219 ipaddress_constraints = NameConstraintsGenerator() |
| 220 ipaddress_constraints.add_permitted( |
| 221 iPAddressRange((192,168,0,0),(255,255,0,0))) |
| 222 ipaddress_constraints.add_excluded( |
| 223 iPAddressRange((192,168,5,0),(255,255,255,0))) |
| 224 ipaddress_constraints.add_permitted( |
| 225 iPAddressRange((192,168,5,32),(255,255,255,96))) |
| 226 ipaddress_constraints.add_permitted( |
| 227 iPAddressRange((192,167,5,32),(255,255,255,96))) |
| 228 ipaddress_constraints.add_excluded( |
| 229 iPAddressRange((192,166,5,32),(255,255,255,96))) |
| 230 ipaddress_constraints.add_permitted(iPAddressRange( |
| 231 (1,2,3,4,5,6,7,8,9,10,11,12,0,0,0,0), |
| 232 (255,255,255,255,255,255,255,255,255,255,255,255,0,0,0,0))) |
| 233 ipaddress_constraints.add_excluded(iPAddressRange( |
| 234 (1,2,3,4,5,6,7,8,9,10,11,12,5,0,0,0), |
| 235 (255,255,255,255,255,255,255,255,255,255,255,255,255,0,0,0))) |
| 236 ipaddress_constraints.add_permitted(iPAddressRange( |
| 237 (1,2,3,4,5,6,7,8,9,10,11,12,5,32,0,0), |
| 238 (255,255,255,255,255,255,255,255,255,255,255,255,255,96,0,0))) |
| 239 ipaddress_constraints.add_permitted(iPAddressRange( |
| 240 (1,2,3,4,5,6,7,8,9,10,11,11,5,32,0,0), |
| 241 (255,255,255,255,255,255,255,255,255,255,255,255,255,96,0,0))) |
| 242 ipaddress_constraints.add_excluded(iPAddressRange( |
| 243 (1,2,3,4,5,6,7,8,9,10,11,10,5,32,0,0), |
| 244 (255,255,255,255,255,255,255,255,255,255,255,255,255,96,0,0))) |
| 245 generate(ipaddress_constraints, "ipaddress.pem") |
| 246 |
| 247 c = NameConstraintsGenerator() |
| 248 c.add_excluded(iPAddressRange((192,168,5,0),(255,255,255,0))) |
| 249 generate(c, "ipaddress-excluded.pem") |
| 250 |
| 251 c = NameConstraintsGenerator() |
| 252 c.add_permitted(iPAddressRange((192,168,0,0),(255,255,0,0))) |
| 253 c.add_permitted(iPAddressRange((1,2,3,4,5,6,7,8,9,10,11,12,0,0,0,0), |
| 254 (255,255,255,255,255,255,255,255, |
| 255 255,255,255,255,0,0,0,0))) |
| 256 c.add_excluded(iPAddressRange((0,0,0,0),(0,0,0,0))) |
| 257 c.add_excluded(iPAddressRange((0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0), |
| 258 (0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0))) |
| 259 generate(c, "ipaddress-excludeall.pem") |
| 260 |
| 261 c = NameConstraintsGenerator() |
| 262 c.add_permitted(iPAddressRange((192,168,0,0),(255,255,255,0))) |
| 263 c.add_permitted(iPAddressRange((192,168,5,0,0),(255,255,255,0,0), |
| 264 enforce_length=False)) |
| 265 generate(c, "ipaddress-invalid_addr.pem") |
| 266 |
| 267 n_us = generate_names.NameGenerator() |
| 268 n_us.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'US') |
| 269 generate(n_us, "name-us.pem") |
| 270 n_us_az = copy.deepcopy(n_us) |
| 271 n_us_az.add_rdn().add_attr('stateOrProvinceName', 'UTF8', 'Arizona') |
| 272 generate(n_us_az, "name-us-arizona.pem") |
| 273 n_us_ca = copy.deepcopy(n_us) |
| 274 n_us_ca.add_rdn().add_attr('stateOrProvinceName', 'UTF8', 'California') |
| 275 generate(n_us_ca, "name-us-california.pem") |
| 276 n_us_ca_mountain_view = copy.deepcopy(n_us_ca) |
| 277 n_us_ca_mountain_view.add_rdn().add_attr( |
| 278 'localityName', 'UTF8', 'Mountain View') |
| 279 generate(n_us_ca_mountain_view, "name-us-california-mountain_view.pem") |
| 280 |
| 281 n_jp = generate_names.NameGenerator() |
| 282 n_jp.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'JP') |
| 283 generate(n_jp, "name-jp.pem") |
| 284 n_jp_tokyo = copy.deepcopy(n_jp) |
| 285 n_jp_tokyo.add_rdn().add_attr( |
| 286 'stateOrProvinceName', 'UTF8', '\xe6\x9d\xb1\xe4\xba\xac', 'FORMAT:UTF8') |
| 287 generate(n_jp_tokyo, "name-jp-tokyo.pem") |
| 288 |
| 289 n_us_az_foodotcom = copy.deepcopy(n_us_az) |
| 290 n_us_az_foodotcom.add_rdn().add_attr('commonName', 'UTF8', 'foo.com') |
| 291 generate(n_us_az_foodotcom, "name-us-arizona-foo.com.pem") |
| 292 |
| 293 n_us_az_permittedexamplecom = copy.deepcopy(n_us_az) |
| 294 n_us_az_permittedexamplecom.add_rdn().add_attr('commonName', 'UTF8', |
| 295 'permitted.example.com') |
| 296 generate(n_us_az_permittedexamplecom, |
| 297 "name-us-arizona-permitted.example.com.pem") |
| 298 |
| 299 n_us_ca_permittedexamplecom = copy.deepcopy(n_us_ca) |
| 300 n_us_ca_permittedexamplecom.add_rdn().add_attr('commonName', 'UTF8', |
| 301 'permitted.example.com') |
| 302 generate(n_us_ca_permittedexamplecom, |
| 303 "name-us-california-permitted.example.com.pem") |
| 304 |
| 305 n_us_az_ip1111 = copy.deepcopy(n_us_az) |
| 306 n_us_az_ip1111.add_rdn().add_attr('commonName', 'UTF8', '1.1.1.1') |
| 307 generate(n_us_az_ip1111, "name-us-arizona-1.1.1.1.pem") |
| 308 |
| 309 n_us_az_192_168_1_1 = copy.deepcopy(n_us_az) |
| 310 n_us_az_192_168_1_1.add_rdn().add_attr('commonName', 'UTF8', '192.168.1.1') |
| 311 generate(n_us_az_192_168_1_1, "name-us-arizona-192.168.1.1.pem") |
| 312 |
| 313 n_us_az_192_168_1_1_bmp = copy.deepcopy(n_us_az) |
| 314 n_us_az_192_168_1_1_bmp.add_rdn().add_attr('commonName', 'BMPSTRING', |
| 315 '192.168.1.1') |
| 316 generate(n_us_az_192_168_1_1_bmp, "name-us-arizona-192.168.1.1-bmp.pem") |
| 317 |
| 318 n_us_az_192_168_1_1_t61 = copy.deepcopy(n_us_az) |
| 319 n_us_az_192_168_1_1_t61.add_rdn().add_attr('commonName', 'T61STRING', |
| 320 '192.168.1.1') |
| 321 generate(n_us_az_192_168_1_1_t61, "name-us-arizona-192.168.1.1-t61.pem") |
| 322 |
| 323 n_us_az_ipv6 = copy.deepcopy(n_us_az) |
| 324 n_us_az_ipv6.add_rdn().add_attr('commonName', 'UTF8', |
| 325 '102:304:506:708:90a:b0c::1') |
| 326 generate(n_us_az_ipv6, "name-us-arizona-ipv6.pem") |
| 327 |
| 328 n_us_ca_192_168_1_1 = copy.deepcopy(n_us_ca) |
| 329 n_us_ca_192_168_1_1.add_rdn().add_attr('commonName', 'UTF8', '192.168.1.1') |
| 330 generate(n_us_ca_192_168_1_1, "name-us-california-192.168.1.1.pem") |
| 331 |
| 332 n_us_az_email = copy.deepcopy(n_us_az) |
| 333 n_us_az_email.add_rdn().add_attr('emailAddress', 'IA5STRING', |
| 334 'bar@example.com') |
| 335 generate(n_us_az_email, "name-us-arizona-email.pem") |
| 336 |
| 337 n_ca = generate_names.NameGenerator() |
| 338 n_ca.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'CA') |
| 339 generate(n_ca, "name-ca.pem") |
| 340 |
| 341 n_de = generate_names.NameGenerator() |
| 342 n_de.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'DE') |
| 343 generate(n_de, "name-de.pem") |
| 344 |
| 345 n_empty = generate_names.NameGenerator() |
| 346 generate(n_empty, "name-empty.pem") |
| 347 |
| 348 |
| 349 directoryname_constraints = NameConstraintsGenerator() |
| 350 directoryname_constraints.add_permitted(directoryName(n_us)) |
| 351 directoryname_constraints.add_excluded(directoryName(n_us_ca)) |
| 352 directoryname_constraints.add_permitted(directoryName(n_us_ca_mountain_view)) |
| 353 directoryname_constraints.add_excluded(directoryName(n_de)) |
| 354 directoryname_constraints.add_permitted(directoryName(n_jp_tokyo)) |
| 355 generate(directoryname_constraints, "directoryname.pem") |
| 356 |
| 357 c = NameConstraintsGenerator() |
| 358 c.union_from(directoryname_constraints) |
| 359 c.union_from(dnsname_constraints) |
| 360 generate(c, "directoryname_and_dnsname.pem") |
| 361 |
| 362 c = NameConstraintsGenerator() |
| 363 c.union_from(directoryname_constraints) |
| 364 c.union_from(dnsname_constraints) |
| 365 c.union_from(ipaddress_constraints) |
| 366 generate(c, "directoryname_and_dnsname_and_ipaddress.pem") |
| 367 |
| 368 c = NameConstraintsGenerator() |
| 369 c.add_excluded(directoryName(n_us_ca)) |
| 370 generate(c, "directoryname-excluded.pem") |
| 371 |
| 372 c = NameConstraintsGenerator() |
| 373 c.add_permitted(directoryName(n_us)) |
| 374 c.add_excluded(directoryName(n_empty)) |
| 375 generate(c, "directoryname-excludeall.pem") |
| 376 |
| 377 san = SubjectAltNameGenerator() |
| 378 san.add_name(dNSName("permitted.example.com")) |
| 379 san.add_name(iPAddress((192,168,1,2))) |
| 380 san.add_name(directoryName(n_us_az)) |
| 381 generate(san, "san-permitted.pem") |
| 382 |
| 383 san2 = copy.deepcopy(san) |
| 384 san2.add_name(dNSName("foo.stillnotpermitted.excluded.permitted.example.com")) |
| 385 generate(san2, "san-excluded-dnsname.pem") |
| 386 |
| 387 san2 = copy.deepcopy(san) |
| 388 san2.add_name(iPAddress((192,168,5,5))) |
| 389 generate(san2, "san-excluded-ipaddress.pem") |
| 390 |
| 391 san2 = copy.deepcopy(san) |
| 392 san2.add_name(directoryName(n_us_ca_mountain_view)) |
| 393 generate(san2, "san-excluded-directoryname.pem") |
| 394 |
| 395 san = SubjectAltNameGenerator() |
| 396 san.add_name(otherName()) |
| 397 generate(san, "san-othername.pem") |
| 398 |
| 399 san = SubjectAltNameGenerator() |
| 400 san.add_name(rfc822Name("foo@example.com")) |
| 401 generate(san, "san-rfc822name.pem") |
| 402 |
| 403 san = SubjectAltNameGenerator() |
| 404 san.add_name(x400Address()) |
| 405 generate(san, "san-x400address.pem") |
| 406 |
| 407 san = SubjectAltNameGenerator() |
| 408 san.add_name(ediPartyName()) |
| 409 generate(san, "san-edipartyname.pem") |
| 410 |
| 411 san = SubjectAltNameGenerator() |
| 412 san.add_name(uniformResourceIdentifier('http://example.com')) |
| 413 generate(san, "san-uri.pem") |
| 414 |
| 415 san = SubjectAltNameGenerator() |
| 416 san.add_name(registeredID("1.2.3.4")) |
| 417 generate(san, "san-registeredid.pem") |
| 418 |
| 419 san = SubjectAltNameGenerator() |
| 420 generate(san, "san-invalid-empty.pem") |
| 421 |
| 422 san = SubjectAltNameGenerator() |
| 423 san.add_name(iPAddress((192,168,0,5,0), enforce_length=False)) |
| 424 generate(san, "san-invalid-ipaddress.pem") |
| 425 |
| 426 c = NameConstraintsGenerator() |
| 427 c.add_permitted(otherName()) |
| 428 generate(c, "othername-permitted.pem") |
| 429 c = NameConstraintsGenerator() |
| 430 c.add_excluded(otherName()) |
| 431 generate(c, "othername-excluded.pem") |
| 432 |
| 433 c = NameConstraintsGenerator() |
| 434 c.add_permitted(rfc822Name("foo@example.com")) |
| 435 generate(c, "rfc822name-permitted.pem") |
| 436 c = NameConstraintsGenerator() |
| 437 c.add_excluded(rfc822Name("foo@example.com")) |
| 438 generate(c, "rfc822name-excluded.pem") |
| 439 |
| 440 c = NameConstraintsGenerator() |
| 441 c.add_permitted(x400Address()) |
| 442 generate(c, "x400address-permitted.pem") |
| 443 c = NameConstraintsGenerator() |
| 444 c.add_excluded(x400Address()) |
| 445 generate(c, "x400address-excluded.pem") |
| 446 |
| 447 c = NameConstraintsGenerator() |
| 448 c.add_permitted(ediPartyName()) |
| 449 generate(c, "edipartyname-permitted.pem") |
| 450 c = NameConstraintsGenerator() |
| 451 c.add_excluded(ediPartyName()) |
| 452 generate(c, "edipartyname-excluded.pem") |
| 453 |
| 454 c = NameConstraintsGenerator() |
| 455 c.add_permitted(uniformResourceIdentifier("http://example.com")) |
| 456 generate(c, "uri-permitted.pem") |
| 457 c = NameConstraintsGenerator() |
| 458 c.add_excluded(uniformResourceIdentifier("http://example.com")) |
| 459 generate(c, "uri-excluded.pem") |
| 460 |
| 461 c = NameConstraintsGenerator() |
| 462 c.add_permitted(registeredID("1.2.3.4")) |
| 463 generate(c, "registeredid-permitted.pem") |
| 464 c = NameConstraintsGenerator() |
| 465 c.add_excluded(registeredID("1.2.3.4")) |
| 466 generate(c, "registeredid-excluded.pem") |
| 467 |
| 468 c = NameConstraintsGenerator() |
| 469 generate(c, "invalid-no_subtrees.pem") |
| 470 |
| 471 c = NameConstraintsGenerator(force_permitted_sequence=True) |
| 472 generate(c, "invalid-empty_permitted_subtree.pem") |
| 473 |
| 474 c = NameConstraintsGenerator(force_excluded_sequence=True) |
| 475 generate(c, "invalid-empty_excluded_subtree.pem") |
| 476 |
| 477 c = NameConstraintsGenerator() |
| 478 c.add_permitted(WithMinMax(dNSName("permitted.example.com"), minimum=0)) |
| 479 generate(c, "dnsname-with_min_0.pem") |
| 480 |
| 481 c = NameConstraintsGenerator() |
| 482 c.add_permitted(WithMinMax(dNSName("permitted.example.com"), minimum=1)) |
| 483 generate(c, "dnsname-with_min_1.pem") |
| 484 |
| 485 c = NameConstraintsGenerator() |
| 486 c.add_permitted(WithMinMax( |
| 487 dNSName("permitted.example.com"), minimum=0, maximum=2)) |
| 488 generate(c, "dnsname-with_min_0_and_max.pem") |
| 489 |
| 490 c = NameConstraintsGenerator() |
| 491 c.add_permitted(WithMinMax( |
| 492 dNSName("permitted.example.com"), minimum=1, maximum=2)) |
| 493 generate(c, "dnsname-with_min_1_and_max.pem") |
| 494 |
| 495 c = NameConstraintsGenerator() |
| 496 c.add_permitted(WithMinMax(dNSName("permitted.example.com"), maximum=2)) |
| 497 generate(c, "dnsname-with_max.pem") |
| 498 |
| 499 |
| 500 if __name__ == '__main__': |
| 501 main() |
| OLD | NEW |