2 * Copyright 2012-2017 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include "internal/nelem.h"
13 #include <openssl/x509.h>
14 #include <openssl/x509v3.h>
17 static const char *const names
[] = {
18 "a", "b", ".", "*", "@",
19 ".a", "a.", ".b", "b.", ".*", "*.", "*@", "@*", "a@", "@a", "b@", "..",
20 "-example.com", "example-.com",
21 "@@", "**", "*.com", "*com", "*.*.com", "*com", "com*", "*example.com",
22 "*@example.com", "test@*.example.com", "example.com", "www.example.com",
23 "test.www.example.com", "*.example.com", "*.www.example.com",
24 "test.*.example.com", "www.*.com",
25 ".www.example.com", "*www.example.com",
26 "example.net", "xn--rger-koa.example.com",
27 "*.xn--rger-koa.example.com", "www.xn--rger-koa.example.com",
28 "*.good--example.com", "www.good--example.com",
29 "*.xn--bar.com", "xn--foo.xn--bar.com",
30 "a.example.com", "b.example.com",
31 "postmaster@example.com", "Postmaster@example.com",
32 "postmaster@EXAMPLE.COM",
36 static const char *const exceptions
[] = {
37 "set CN: host: [*.example.com] matches [a.example.com]",
38 "set CN: host: [*.example.com] matches [b.example.com]",
39 "set CN: host: [*.example.com] matches [www.example.com]",
40 "set CN: host: [*.example.com] matches [xn--rger-koa.example.com]",
41 "set CN: host: [*.www.example.com] matches [test.www.example.com]",
42 "set CN: host: [*.www.example.com] matches [.www.example.com]",
43 "set CN: host: [*www.example.com] matches [www.example.com]",
44 "set CN: host: [test.www.example.com] matches [.www.example.com]",
45 "set CN: host: [*.xn--rger-koa.example.com] matches [www.xn--rger-koa.example.com]",
46 "set CN: host: [*.xn--bar.com] matches [xn--foo.xn--bar.com]",
47 "set CN: host: [*.good--example.com] matches [www.good--example.com]",
48 "set CN: host-no-wildcards: [*.www.example.com] matches [.www.example.com]",
49 "set CN: host-no-wildcards: [test.www.example.com] matches [.www.example.com]",
50 "set emailAddress: email: [postmaster@example.com] does not match [Postmaster@example.com]",
51 "set emailAddress: email: [postmaster@EXAMPLE.COM] does not match [Postmaster@example.com]",
52 "set emailAddress: email: [Postmaster@example.com] does not match [postmaster@example.com]",
53 "set emailAddress: email: [Postmaster@example.com] does not match [postmaster@EXAMPLE.COM]",
54 "set dnsName: host: [*.example.com] matches [www.example.com]",
55 "set dnsName: host: [*.example.com] matches [a.example.com]",
56 "set dnsName: host: [*.example.com] matches [b.example.com]",
57 "set dnsName: host: [*.example.com] matches [xn--rger-koa.example.com]",
58 "set dnsName: host: [*.www.example.com] matches [test.www.example.com]",
59 "set dnsName: host-no-wildcards: [*.www.example.com] matches [.www.example.com]",
60 "set dnsName: host-no-wildcards: [test.www.example.com] matches [.www.example.com]",
61 "set dnsName: host: [*.www.example.com] matches [.www.example.com]",
62 "set dnsName: host: [*www.example.com] matches [www.example.com]",
63 "set dnsName: host: [test.www.example.com] matches [.www.example.com]",
64 "set dnsName: host: [*.xn--rger-koa.example.com] matches [www.xn--rger-koa.example.com]",
65 "set dnsName: host: [*.xn--bar.com] matches [xn--foo.xn--bar.com]",
66 "set dnsName: host: [*.good--example.com] matches [www.good--example.com]",
67 "set rfc822Name: email: [postmaster@example.com] does not match [Postmaster@example.com]",
68 "set rfc822Name: email: [Postmaster@example.com] does not match [postmaster@example.com]",
69 "set rfc822Name: email: [Postmaster@example.com] does not match [postmaster@EXAMPLE.COM]",
70 "set rfc822Name: email: [postmaster@EXAMPLE.COM] does not match [Postmaster@example.com]",
74 static int is_exception(const char *msg
)
78 for (p
= exceptions
; *p
; ++p
)
79 if (strcmp(msg
, *p
) == 0)
84 static int set_cn(X509
*crt
, ...)
99 nid
= va_arg(ap
, int);
102 name
= va_arg(ap
, const char *);
103 if (!X509_NAME_add_entry_by_NID(n
, nid
, MBSTRING_ASC
,
104 (unsigned char *)name
, -1, -1, 1))
107 if (!X509_set_subject_name(crt
, n
))
117 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
118 X509_EXTENSION *X509_EXTENSION_create_by_NID(X509_EXTENSION **ex,
119 int nid, int crit, ASN1_OCTET_STRING *data);
120 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
123 static int set_altname(X509
*crt
, ...)
126 GENERAL_NAMES
*gens
= NULL
;
127 GENERAL_NAME
*gen
= NULL
;
128 ASN1_IA5STRING
*ia5
= NULL
;
131 gens
= sk_GENERAL_NAME_new_null();
137 type
= va_arg(ap
, int);
140 name
= va_arg(ap
, const char *);
142 gen
= GENERAL_NAME_new();
145 ia5
= ASN1_IA5STRING_new();
148 if (!ASN1_STRING_set(ia5
, name
, -1))
153 GENERAL_NAME_set0_value(gen
, type
, ia5
);
159 sk_GENERAL_NAME_push(gens
, gen
);
162 if (!X509_add1_ext_i2d(crt
, NID_subject_alt_name
, gens
, 0, 0))
166 ASN1_IA5STRING_free(ia5
);
167 GENERAL_NAME_free(gen
);
168 GENERAL_NAMES_free(gens
);
173 static int set_cn1(X509
*crt
, const char *name
)
175 return set_cn(crt
, NID_commonName
, name
, 0);
178 static int set_cn_and_email(X509
*crt
, const char *name
)
180 return set_cn(crt
, NID_commonName
, name
,
181 NID_pkcs9_emailAddress
, "dummy@example.com", 0);
184 static int set_cn2(X509
*crt
, const char *name
)
186 return set_cn(crt
, NID_commonName
, "dummy value",
187 NID_commonName
, name
, 0);
190 static int set_cn3(X509
*crt
, const char *name
)
192 return set_cn(crt
, NID_commonName
, name
,
193 NID_commonName
, "dummy value", 0);
196 static int set_email1(X509
*crt
, const char *name
)
198 return set_cn(crt
, NID_pkcs9_emailAddress
, name
, 0);
201 static int set_email2(X509
*crt
, const char *name
)
203 return set_cn(crt
, NID_pkcs9_emailAddress
, "dummy@example.com",
204 NID_pkcs9_emailAddress
, name
, 0);
207 static int set_email3(X509
*crt
, const char *name
)
209 return set_cn(crt
, NID_pkcs9_emailAddress
, name
,
210 NID_pkcs9_emailAddress
, "dummy@example.com", 0);
213 static int set_email_and_cn(X509
*crt
, const char *name
)
215 return set_cn(crt
, NID_pkcs9_emailAddress
, name
,
216 NID_commonName
, "www.example.org", 0);
219 static int set_altname_dns(X509
*crt
, const char *name
)
221 return set_altname(crt
, GEN_DNS
, name
, 0);
224 static int set_altname_email(X509
*crt
, const char *name
)
226 return set_altname(crt
, GEN_EMAIL
, name
, 0);
230 int (*fn
) (X509
*, const char *);
236 static const struct set_name_fn name_fns
[] = {
237 {set_cn1
, "set CN", 1, 0},
238 {set_cn2
, "set CN", 1, 0},
239 {set_cn3
, "set CN", 1, 0},
240 {set_cn_and_email
, "set CN", 1, 0},
241 {set_email1
, "set emailAddress", 0, 1},
242 {set_email2
, "set emailAddress", 0, 1},
243 {set_email3
, "set emailAddress", 0, 1},
244 {set_email_and_cn
, "set emailAddress", 0, 1},
245 {set_altname_dns
, "set dnsName", 1, 0},
246 {set_altname_email
, "set rfc822Name", 0, 1},
249 static X509
*make_cert()
253 if (!TEST_ptr(crt
= X509_new()))
255 if (!TEST_true(X509_set_version(crt
, 2))) {
262 static int check_message(const struct set_name_fn
*fn
, const char *op
,
263 const char *nameincert
, int match
, const char *name
)
269 BIO_snprintf(msg
, sizeof(msg
), "%s: %s: [%s] %s [%s]",
270 fn
->name
, op
, nameincert
,
271 match
? "matches" : "does not match", name
);
272 if (is_exception(msg
))
274 TEST_error("%s", msg
);
278 static int run_cert(X509
*crt
, const char *nameincert
,
279 const struct set_name_fn
*fn
)
281 const char *const *pname
= names
;
284 for (; *pname
!= NULL
; ++pname
) {
285 int samename
= strcasecmp(nameincert
, *pname
) == 0;
286 size_t namelen
= strlen(*pname
);
287 char *name
= OPENSSL_malloc(namelen
);
290 memcpy(name
, *pname
, namelen
);
293 if (!TEST_int_ge(ret
= X509_check_host(crt
, name
, namelen
, 0, NULL
),
296 } else if (fn
->host
) {
297 if (ret
== 1 && !samename
)
299 if (ret
== 0 && samename
)
303 if (!TEST_true(check_message(fn
, "host", nameincert
, match
, *pname
)))
307 if (!TEST_int_ge(ret
= X509_check_host(crt
, name
, namelen
,
308 X509_CHECK_FLAG_NO_WILDCARDS
,
311 } else if (fn
->host
) {
312 if (ret
== 1 && !samename
)
314 if (ret
== 0 && samename
)
318 if (!TEST_true(check_message(fn
, "host-no-wildcards",
319 nameincert
, match
, *pname
)))
323 ret
= X509_check_email(crt
, name
, namelen
, 0);
325 if (ret
&& !samename
)
327 if (!ret
&& samename
&& strchr(nameincert
, '@') != NULL
)
331 if (!TEST_true(check_message(fn
, "email", nameincert
, match
, *pname
)))
339 static int call_run_cert(int i
)
342 const struct set_name_fn
*pfn
= &name_fns
[i
];
344 const char *const *pname
;
346 TEST_info("%s", pfn
->name
);
347 for (pname
= names
; *pname
!= NULL
; pname
++) {
348 if (!TEST_ptr(crt
= make_cert())
349 || !TEST_true(pfn
->fn(crt
, *pname
))
350 || !run_cert(crt
, *pname
, pfn
))
357 int setup_tests(void)
359 ADD_ALL_TESTS(call_run_cert
, OSSL_NELEM(name_fns
));