Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 302679 Details for
Bug 442800
RFE: support UUID in Subject Alternative Name extension
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
added implementation for support of UUID in Subject Alternative name extension
442800.1 (text/plain), 5.26 KB, created by
Christina Fu
on 2008-04-16 22:04:25 UTC
(
hide
)
Description:
added implementation for support of UUID in Subject Alternative name extension
Filename:
MIME Type:
Creator:
Christina Fu
Created:
2008-04-16 22:04:25 UTC
Size:
5.26 KB
patch
obsolete
>Index: base/common/src/com/netscape/cms/profile/def/SubjectAltNameExtDefault.java >=================================================================== >--- base/common/src/com/netscape/cms/profile/def/SubjectAltNameExtDefault.java (revision 20) >+++ base/common/src/com/netscape/cms/profile/def/SubjectAltNameExtDefault.java (working copy) >@@ -47,6 +47,8 @@ > public static final String CONFIG_GN_ENABLE = "subjAltExtGNEnable_"; > public static final String CONFIG_TYPE = "subjAltExtType_"; > public static final String CONFIG_PATTERN = "subjAltExtPattern_"; >+ public static final String CONFIG_SOURCE = "subjAltExtSource_"; >+ public static final String CONFIG_SOURCE_UUID = "UUID"; > > public static final String CONFIG_OLD_TYPE = "subjAltExtType"; > public static final String CONFIG_OLD_PATTERN = "subjAltExtPattern"; >@@ -395,12 +397,13 @@ > String enable = getConfig(CONFIG_GN_ENABLE +i); > if (enable != null && enable.equals("true")) { > CMS.debug("SubjectAltNameExtDefault: createExtension i=" +i); >+ > String pattern = getConfig(CONFIG_PATTERN + i); > if (pattern == null || pattern.equals("")) { > pattern = " "; > } > >- if (!pattern.equals("")) { >+ if (!pattern.equals("")) { > String gname = ""; > > if (request != null) { >@@ -410,14 +413,34 @@ > CMS.debug("gname is empty, not added"); > continue; > } >- GeneralNameInterface n = parseGeneralName(getConfig(CONFIG_TYPE + i) + ":" + gname); >- CMS.debug("adding gname: "+gname); >- if (n != null) { >+ CMS.debug("SubjectAltNameExtDefault: createExtension got gname=" +gname); >+ // see if this is server-generated (e.g. UUID) >+ String source = getConfig(CONFIG_SOURCE +i); >+ String type = getConfig(CONFIG_TYPE + i); >+ if ((source != null) && (type.equalsIgnoreCase("OtherName"))) { >+ CMS.debug("SubjectAlternativeNameExtension: using "+ >+ source+ " as gn"); >+ if (source.equals(CONFIG_SOURCE_UUID)) { >+ UUID randUUID = UUID.randomUUID(); >+ gname = gname +randUUID.toString(); >+ } else { >+ CMS.debug("SubjectAltNameExtDefault: createExtension - unsupported server-generated type: "+source+". Supported: UUID"); >+ } >+ CMS.debug("SubjectAltNameExtDefault: createExtension got new gname=" +gname); >+ } >+ >+ GeneralNameInterface n = parseGeneralName(type + ":" + gname); >+ >+ CMS.debug("adding gname: "+gname); >+ if (n != null) { >+ CMS.debug("SubjectAlternativeNameExtension: n not null"); > gn.addElement(n); > count++; >- } >- } >- } >+ } else { >+ CMS.debug("SubjectAlternativeNameExtension: n null"); >+ } >+ } >+ } > } //for > > if (count != 0) { >Index: base/ca/shared/conf/CS.cfg >=================================================================== >--- base/ca/shared/conf/CS.cfg (revision 16) >+++ base/ca/shared/conf/CS.cfg (working copy) >@@ -796,7 +796,9 @@ > oidmap.subject_info_access.class=netscape.security.extensions.SubjectInfoAccessExtension > oidmap.subject_info_access.oid=1.3.6.1.5.5.7.1.11 > os.userid=nobody >-profile.list=caUserCert,caDualCert,caSignedLogCert,caTPSCert,caRARouterCert,caRouterCert,caServerCert,caOtherCert,caCACert,caInstallCACert,caRACert,caOCSPCert,caTransportCert,caDirUserCert,caAgentServerCert,caAgentFileSigning,caCMCUserCert,caFullCMCUserCert,caSimpleCMCUserCert,caTokenDeviceKeyEnrollment,caTokenUserEncryptionKeyEnrollment,caTokenUserSigningKeyEnrollment,caTempTokenDeviceKeyEnrollment,caTempTokenUserEncryptionKeyEnrollment,caTempTokenUserSigningKeyEnrollment,caAdminCert,caInternalAuthServerCert,caInternalAuthTransportCert,caInternalAuthDRMstorageCert,caInternalAuthSubsystemCert,caInternalAuthOCSPCert,DomainController,caDualRAuserCert,caRAagentCert,caRAserverCert >+profile.list=caUserCert,caDualCert,caSignedLogCert,caTPSCert,caRARouterCert,caRouterCert,caServerCert,caOtherCert,caCACert,caInstallCACert,caRACert,caOCSPCert,caTransportCert,caDirUserCert,caAgentServerCert,caAgentFileSigning,caCMCUserCert,caFullCMCUserCert,caSimpleCMCUserCert,caTokenDeviceKeyEnrollment,caTokenUserEncryptionKeyEnrollment,caTokenUserSigningKeyEnrollment,caTempTokenDeviceKeyEnrollment,caTempTokenUserEncryptionKeyEnrollment,caTempTokenUserSigningKeyEnrollment,caAdminCert,caInternalAuthServerCert,caInternalAuthTransportCert,caInternalAuthDRMstorageCert,caInternalAuthSubsystemCert,caInternalAuthOCSPCert,DomainController,caDualRAuserCert,caRAagentCert,caRAserverCert,caUserCertSANuuid >+profile.caUserCertSANuuid.class_id=caEnrollImpl >+profile.caUserCertSANuuid.config=[PKI_INSTANCE_PATH]/profiles/ca/caUserCertSANuuid.cfg > profile.DomainController.class_id=caEnrollImpl > profile.DomainController.config=[PKI_INSTANCE_PATH]/profiles/ca/DomainController.cfg > profile.caAgentFileSigning.class_id=caEnrollImpl
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 442800
:
302679
|
302680
|
302814
|
302815
|
302822
|
302823
|
302826
|
302827