2 * Copyright 2012-2018 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
12 #include <openssl/e_os2.h>
13 #include <openssl/x509.h>
14 #include <openssl/x509v3.h>
15 #include "internal/nelem.h"
18 #ifdef OPENSSL_SYS_WINDOWS
19 # define strcasecmp _stricmp
22 DEFINE_STACK_OF(GENERAL_NAME
)
24 static const char *const names
[] = {
25 "a", "b", ".", "*", "@",
26 ".a", "a.", ".b", "b.", ".*", "*.", "*@", "@*", "a@", "@a", "b@", "..",
27 "-example.com", "example-.com",
28 "@@", "**", "*.com", "*com", "*.*.com", "*com", "com*", "*example.com",
29 "*@example.com", "test@*.example.com", "example.com", "www.example.com",
30 "test.www.example.com", "*.example.com", "*.www.example.com",
31 "test.*.example.com", "www.*.com",
32 ".www.example.com", "*www.example.com",
33 "example.net", "xn--rger-koa.example.com",
34 "*.xn--rger-koa.example.com", "www.xn--rger-koa.example.com",
35 "*.good--example.com", "www.good--example.com",
36 "*.xn--bar.com", "xn--foo.xn--bar.com",
37 "a.example.com", "b.example.com",
38 "postmaster@example.com", "Postmaster@example.com",
39 "postmaster@EXAMPLE.COM",
43 static const char *const exceptions
[] = {
44 "set CN: host: [*.example.com] matches [a.example.com]",
45 "set CN: host: [*.example.com] matches [b.example.com]",
46 "set CN: host: [*.example.com] matches [www.example.com]",
47 "set CN: host: [*.example.com] matches [xn--rger-koa.example.com]",
48 "set CN: host: [*.www.example.com] matches [test.www.example.com]",
49 "set CN: host: [*.www.example.com] matches [.www.example.com]",
50 "set CN: host: [*www.example.com] matches [www.example.com]",
51 "set CN: host: [test.www.example.com] matches [.www.example.com]",
52 "set CN: host: [*.xn--rger-koa.example.com] matches [www.xn--rger-koa.example.com]",
53 "set CN: host: [*.xn--bar.com] matches [xn--foo.xn--bar.com]",
54 "set CN: host: [*.good--example.com] matches [www.good--example.com]",
55 "set CN: host-no-wildcards: [*.www.example.com] matches [.www.example.com]",
56 "set CN: host-no-wildcards: [test.www.example.com] matches [.www.example.com]",
57 "set emailAddress: email: [postmaster@example.com] does not match [Postmaster@example.com]",
58 "set emailAddress: email: [postmaster@EXAMPLE.COM] does not match [Postmaster@example.com]",
59 "set emailAddress: email: [Postmaster@example.com] does not match [postmaster@example.com]",
60 "set emailAddress: email: [Postmaster@example.com] does not match [postmaster@EXAMPLE.COM]",
61 "set dnsName: host: [*.example.com] matches [www.example.com]",
62 "set dnsName: host: [*.example.com] matches [a.example.com]",
63 "set dnsName: host: [*.example.com] matches [b.example.com]",
64 "set dnsName: host: [*.example.com] matches [xn--rger-koa.example.com]",
65 "set dnsName: host: [*.www.example.com] matches [test.www.example.com]",
66 "set dnsName: host-no-wildcards: [*.www.example.com] matches [.www.example.com]",
67 "set dnsName: host-no-wildcards: [test.www.example.com] matches [.www.example.com]",
68 "set dnsName: host: [*.www.example.com] matches [.www.example.com]",
69 "set dnsName: host: [*www.example.com] matches [www.example.com]",
70 "set dnsName: host: [test.www.example.com] matches [.www.example.com]",
71 "set dnsName: host: [*.xn--rger-koa.example.com] matches [www.xn--rger-koa.example.com]",
72 "set dnsName: host: [*.xn--bar.com] matches [xn--foo.xn--bar.com]",
73 "set dnsName: host: [*.good--example.com] matches [www.good--example.com]",
74 "set rfc822Name: email: [postmaster@example.com] does not match [Postmaster@example.com]",
75 "set rfc822Name: email: [Postmaster@example.com] does not match [postmaster@example.com]",
76 "set rfc822Name: email: [Postmaster@example.com] does not match [postmaster@EXAMPLE.COM]",
77 "set rfc822Name: email: [postmaster@EXAMPLE.COM] does not match [Postmaster@example.com]",
81 static int is_exception(const char *msg
)
85 for (p
= exceptions
; *p
; ++p
)
86 if (strcmp(msg
, *p
) == 0)
91 static int set_cn(X509
*crt
, ...)
106 nid
= va_arg(ap
, int);
109 name
= va_arg(ap
, const char *);
110 if (!X509_NAME_add_entry_by_NID(n
, nid
, MBSTRING_ASC
,
111 (unsigned char *)name
, -1, -1, 1))
114 if (!X509_set_subject_name(crt
, n
))
124 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
125 X509_EXTENSION *X509_EXTENSION_create_by_NID(X509_EXTENSION **ex,
126 int nid, int crit, ASN1_OCTET_STRING *data);
127 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
130 static int set_altname(X509
*crt
, ...)
133 GENERAL_NAMES
*gens
= NULL
;
134 GENERAL_NAME
*gen
= NULL
;
135 ASN1_IA5STRING
*ia5
= NULL
;
138 gens
= sk_GENERAL_NAME_new_null();
144 type
= va_arg(ap
, int);
147 name
= va_arg(ap
, const char *);
149 gen
= GENERAL_NAME_new();
152 ia5
= ASN1_IA5STRING_new();
155 if (!ASN1_STRING_set(ia5
, name
, -1))
160 GENERAL_NAME_set0_value(gen
, type
, ia5
);
166 sk_GENERAL_NAME_push(gens
, gen
);
169 if (!X509_add1_ext_i2d(crt
, NID_subject_alt_name
, gens
, 0, 0))
173 ASN1_IA5STRING_free(ia5
);
174 GENERAL_NAME_free(gen
);
175 GENERAL_NAMES_free(gens
);
180 static int set_cn1(X509
*crt
, const char *name
)
182 return set_cn(crt
, NID_commonName
, name
, 0);
185 static int set_cn_and_email(X509
*crt
, const char *name
)
187 return set_cn(crt
, NID_commonName
, name
,
188 NID_pkcs9_emailAddress
, "dummy@example.com", 0);
191 static int set_cn2(X509
*crt
, const char *name
)
193 return set_cn(crt
, NID_commonName
, "dummy value",
194 NID_commonName
, name
, 0);
197 static int set_cn3(X509
*crt
, const char *name
)
199 return set_cn(crt
, NID_commonName
, name
,
200 NID_commonName
, "dummy value", 0);
203 static int set_email1(X509
*crt
, const char *name
)
205 return set_cn(crt
, NID_pkcs9_emailAddress
, name
, 0);
208 static int set_email2(X509
*crt
, const char *name
)
210 return set_cn(crt
, NID_pkcs9_emailAddress
, "dummy@example.com",
211 NID_pkcs9_emailAddress
, name
, 0);
214 static int set_email3(X509
*crt
, const char *name
)
216 return set_cn(crt
, NID_pkcs9_emailAddress
, name
,
217 NID_pkcs9_emailAddress
, "dummy@example.com", 0);
220 static int set_email_and_cn(X509
*crt
, const char *name
)
222 return set_cn(crt
, NID_pkcs9_emailAddress
, name
,
223 NID_commonName
, "www.example.org", 0);
226 static int set_altname_dns(X509
*crt
, const char *name
)
228 return set_altname(crt
, GEN_DNS
, name
, 0);
231 static int set_altname_email(X509
*crt
, const char *name
)
233 return set_altname(crt
, GEN_EMAIL
, name
, 0);
237 int (*fn
) (X509
*, const char *);
243 static const struct set_name_fn name_fns
[] = {
244 {set_cn1
, "set CN", 1, 0},
245 {set_cn2
, "set CN", 1, 0},
246 {set_cn3
, "set CN", 1, 0},
247 {set_cn_and_email
, "set CN", 1, 0},
248 {set_email1
, "set emailAddress", 0, 1},
249 {set_email2
, "set emailAddress", 0, 1},
250 {set_email3
, "set emailAddress", 0, 1},
251 {set_email_and_cn
, "set emailAddress", 0, 1},
252 {set_altname_dns
, "set dnsName", 1, 0},
253 {set_altname_email
, "set rfc822Name", 0, 1},
256 static X509
*make_cert(void)
260 if (!TEST_ptr(crt
= X509_new()))
262 if (!TEST_true(X509_set_version(crt
, 2))) {
269 static int check_message(const struct set_name_fn
*fn
, const char *op
,
270 const char *nameincert
, int match
, const char *name
)
276 BIO_snprintf(msg
, sizeof(msg
), "%s: %s: [%s] %s [%s]",
277 fn
->name
, op
, nameincert
,
278 match
? "matches" : "does not match", name
);
279 if (is_exception(msg
))
281 TEST_error("%s", msg
);
285 static int run_cert(X509
*crt
, const char *nameincert
,
286 const struct set_name_fn
*fn
)
288 const char *const *pname
= names
;
291 for (; *pname
!= NULL
; ++pname
) {
292 int samename
= strcasecmp(nameincert
, *pname
) == 0;
293 size_t namelen
= strlen(*pname
);
294 char *name
= OPENSSL_malloc(namelen
);
297 memcpy(name
, *pname
, namelen
);
300 if (!TEST_int_ge(ret
= X509_check_host(crt
, name
, namelen
, 0, NULL
),
303 } else if (fn
->host
) {
304 if (ret
== 1 && !samename
)
306 if (ret
== 0 && samename
)
310 if (!TEST_true(check_message(fn
, "host", nameincert
, match
, *pname
)))
314 if (!TEST_int_ge(ret
= X509_check_host(crt
, name
, namelen
,
315 X509_CHECK_FLAG_NO_WILDCARDS
,
318 } else if (fn
->host
) {
319 if (ret
== 1 && !samename
)
321 if (ret
== 0 && samename
)
325 if (!TEST_true(check_message(fn
, "host-no-wildcards",
326 nameincert
, match
, *pname
)))
330 ret
= X509_check_email(crt
, name
, namelen
, 0);
332 if (ret
&& !samename
)
334 if (!ret
&& samename
&& strchr(nameincert
, '@') != NULL
)
338 if (!TEST_true(check_message(fn
, "email", nameincert
, match
, *pname
)))
346 static int call_run_cert(int i
)
349 const struct set_name_fn
*pfn
= &name_fns
[i
];
351 const char *const *pname
;
353 TEST_info("%s", pfn
->name
);
354 for (pname
= names
; *pname
!= NULL
; pname
++) {
355 if (!TEST_ptr(crt
= make_cert())
356 || !TEST_true(pfn
->fn(crt
, *pname
))
357 || !run_cert(crt
, *pname
, pfn
))
364 int setup_tests(void)
366 ADD_ALL_TESTS(call_run_cert
, OSSL_NELEM(name_fns
));