2 * Copyright 2012-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 #include <openssl/x509.h>
11 #include <openssl/x509v3.h>
15 static const char *const names
[] = {
16 "a", "b", ".", "*", "@",
17 ".a", "a.", ".b", "b.", ".*", "*.", "*@", "@*", "a@", "@a", "b@", "..",
18 "-example.com", "example-.com",
19 "@@", "**", "*.com", "*com", "*.*.com", "*com", "com*", "*example.com",
20 "*@example.com", "test@*.example.com", "example.com", "www.example.com",
21 "test.www.example.com", "*.example.com", "*.www.example.com",
22 "test.*.example.com", "www.*.com",
23 ".www.example.com", "*www.example.com",
24 "example.net", "xn--rger-koa.example.com",
25 "*.xn--rger-koa.example.com", "www.xn--rger-koa.example.com",
26 "*.good--example.com", "www.good--example.com",
27 "*.xn--bar.com", "xn--foo.xn--bar.com",
28 "a.example.com", "b.example.com",
29 "postmaster@example.com", "Postmaster@example.com",
30 "postmaster@EXAMPLE.COM",
34 static const char *const exceptions
[] = {
35 "set CN: host: [*.example.com] matches [a.example.com]",
36 "set CN: host: [*.example.com] matches [b.example.com]",
37 "set CN: host: [*.example.com] matches [www.example.com]",
38 "set CN: host: [*.example.com] matches [xn--rger-koa.example.com]",
39 "set CN: host: [*.www.example.com] matches [test.www.example.com]",
40 "set CN: host: [*.www.example.com] matches [.www.example.com]",
41 "set CN: host: [*www.example.com] matches [www.example.com]",
42 "set CN: host: [test.www.example.com] matches [.www.example.com]",
43 "set CN: host: [*.xn--rger-koa.example.com] matches [www.xn--rger-koa.example.com]",
44 "set CN: host: [*.xn--bar.com] matches [xn--foo.xn--bar.com]",
45 "set CN: host: [*.good--example.com] matches [www.good--example.com]",
46 "set CN: host-no-wildcards: [*.www.example.com] matches [.www.example.com]",
47 "set CN: host-no-wildcards: [test.www.example.com] matches [.www.example.com]",
48 "set emailAddress: email: [postmaster@example.com] does not match [Postmaster@example.com]",
49 "set emailAddress: email: [postmaster@EXAMPLE.COM] does not match [Postmaster@example.com]",
50 "set emailAddress: email: [Postmaster@example.com] does not match [postmaster@example.com]",
51 "set emailAddress: email: [Postmaster@example.com] does not match [postmaster@EXAMPLE.COM]",
52 "set dnsName: host: [*.example.com] matches [www.example.com]",
53 "set dnsName: host: [*.example.com] matches [a.example.com]",
54 "set dnsName: host: [*.example.com] matches [b.example.com]",
55 "set dnsName: host: [*.example.com] matches [xn--rger-koa.example.com]",
56 "set dnsName: host: [*.www.example.com] matches [test.www.example.com]",
57 "set dnsName: host-no-wildcards: [*.www.example.com] matches [.www.example.com]",
58 "set dnsName: host-no-wildcards: [test.www.example.com] matches [.www.example.com]",
59 "set dnsName: host: [*.www.example.com] matches [.www.example.com]",
60 "set dnsName: host: [*www.example.com] matches [www.example.com]",
61 "set dnsName: host: [test.www.example.com] matches [.www.example.com]",
62 "set dnsName: host: [*.xn--rger-koa.example.com] matches [www.xn--rger-koa.example.com]",
63 "set dnsName: host: [*.xn--bar.com] matches [xn--foo.xn--bar.com]",
64 "set dnsName: host: [*.good--example.com] matches [www.good--example.com]",
65 "set rfc822Name: email: [postmaster@example.com] does not match [Postmaster@example.com]",
66 "set rfc822Name: email: [Postmaster@example.com] does not match [postmaster@example.com]",
67 "set rfc822Name: email: [Postmaster@example.com] does not match [postmaster@EXAMPLE.COM]",
68 "set rfc822Name: email: [postmaster@EXAMPLE.COM] does not match [Postmaster@example.com]",
72 static int is_exception(const char *msg
)
75 for (p
= exceptions
; *p
; ++p
)
76 if (strcmp(msg
, *p
) == 0)
81 static int set_cn(X509
*crt
, ...)
93 nid
= va_arg(ap
, int);
96 name
= va_arg(ap
, const char *);
97 if (!X509_NAME_add_entry_by_NID(n
, nid
, MBSTRING_ASC
,
98 (unsigned char *)name
, -1, -1, 1))
101 if (!X509_set_subject_name(crt
, n
))
111 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
112 X509_EXTENSION *X509_EXTENSION_create_by_NID(X509_EXTENSION **ex,
113 int nid, int crit, ASN1_OCTET_STRING *data);
114 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
117 static int set_altname(X509
*crt
, ...)
120 GENERAL_NAMES
*gens
= NULL
;
121 GENERAL_NAME
*gen
= NULL
;
122 ASN1_IA5STRING
*ia5
= NULL
;
125 gens
= sk_GENERAL_NAME_new_null();
131 type
= va_arg(ap
, int);
134 name
= va_arg(ap
, const char *);
136 gen
= GENERAL_NAME_new();
139 ia5
= ASN1_IA5STRING_new();
142 if (!ASN1_STRING_set(ia5
, name
, -1))
147 GENERAL_NAME_set0_value(gen
, type
, ia5
);
153 sk_GENERAL_NAME_push(gens
, gen
);
156 if (!X509_add1_ext_i2d(crt
, NID_subject_alt_name
, gens
, 0, 0))
160 ASN1_IA5STRING_free(ia5
);
161 GENERAL_NAME_free(gen
);
162 GENERAL_NAMES_free(gens
);
167 static int set_cn1(X509
*crt
, const char *name
)
169 return set_cn(crt
, NID_commonName
, name
, 0);
172 static int set_cn_and_email(X509
*crt
, const char *name
)
174 return set_cn(crt
, NID_commonName
, name
,
175 NID_pkcs9_emailAddress
, "dummy@example.com", 0);
178 static int set_cn2(X509
*crt
, const char *name
)
180 return set_cn(crt
, NID_commonName
, "dummy value",
181 NID_commonName
, name
, 0);
184 static int set_cn3(X509
*crt
, const char *name
)
186 return set_cn(crt
, NID_commonName
, name
,
187 NID_commonName
, "dummy value", 0);
190 static int set_email1(X509
*crt
, const char *name
)
192 return set_cn(crt
, NID_pkcs9_emailAddress
, name
, 0);
195 static int set_email2(X509
*crt
, const char *name
)
197 return set_cn(crt
, NID_pkcs9_emailAddress
, "dummy@example.com",
198 NID_pkcs9_emailAddress
, name
, 0);
201 static int set_email3(X509
*crt
, const char *name
)
203 return set_cn(crt
, NID_pkcs9_emailAddress
, name
,
204 NID_pkcs9_emailAddress
, "dummy@example.com", 0);
207 static int set_email_and_cn(X509
*crt
, const char *name
)
209 return set_cn(crt
, NID_pkcs9_emailAddress
, name
,
210 NID_commonName
, "www.example.org", 0);
213 static int set_altname_dns(X509
*crt
, const char *name
)
215 return set_altname(crt
, GEN_DNS
, name
, 0);
218 static int set_altname_email(X509
*crt
, const char *name
)
220 return set_altname(crt
, GEN_EMAIL
, name
, 0);
224 int (*fn
) (X509
*, const char *);
230 static const struct set_name_fn name_fns
[] = {
231 {set_cn1
, "set CN", 1, 0},
232 {set_cn2
, "set CN", 1, 0},
233 {set_cn3
, "set CN", 1, 0},
234 {set_cn_and_email
, "set CN", 1, 0},
235 {set_email1
, "set emailAddress", 0, 1},
236 {set_email2
, "set emailAddress", 0, 1},
237 {set_email3
, "set emailAddress", 0, 1},
238 {set_email_and_cn
, "set emailAddress", 0, 1},
239 {set_altname_dns
, "set dnsName", 1, 0},
240 {set_altname_email
, "set rfc822Name", 0, 1},
244 static X509
*make_cert()
248 X509_NAME
*issuer
= NULL
;
252 if (!X509_set_version(crt
, 3))
257 X509_NAME_free(issuer
);
263 static void check_message(const struct set_name_fn
*fn
, const char *op
,
264 const char *nameincert
, int match
, const char *name
)
269 BIO_snprintf(msg
, sizeof(msg
), "%s: %s: [%s] %s [%s]",
270 fn
->name
, op
, nameincert
,
271 match
? "matches" : "does not match", name
);
272 if (is_exception(msg
))
278 static void run_cert(X509
*crt
, const char *nameincert
,
279 const struct set_name_fn
*fn
)
281 const char *const *pname
= names
;
283 int samename
= strcasecmp(nameincert
, *pname
) == 0;
284 size_t namelen
= strlen(*pname
);
285 char *name
= malloc(namelen
);
287 memcpy(name
, *pname
, namelen
);
289 ret
= X509_check_host(crt
, name
, namelen
, 0, NULL
);
292 fprintf(stderr
, "internal error in X509_check_host");
294 } else if (fn
->host
) {
295 if (ret
== 1 && !samename
)
297 if (ret
== 0 && samename
)
301 check_message(fn
, "host", nameincert
, match
, *pname
);
303 ret
= X509_check_host(crt
, name
, namelen
,
304 X509_CHECK_FLAG_NO_WILDCARDS
, NULL
);
307 fprintf(stderr
, "internal error in X509_check_host");
309 } else if (fn
->host
) {
310 if (ret
== 1 && !samename
)
312 if (ret
== 0 && samename
)
316 check_message(fn
, "host-no-wildcards", nameincert
, match
, *pname
);
318 ret
= X509_check_email(crt
, name
, namelen
, 0);
321 if (ret
&& !samename
)
323 if (!ret
&& samename
&& strchr(nameincert
, '@') != NULL
)
327 check_message(fn
, "email", nameincert
, match
, *pname
);
335 const struct set_name_fn
*pfn
= name_fns
;
337 const char *const *pname
= names
;
339 X509
*crt
= make_cert();
341 fprintf(stderr
, "make_cert failed\n");
344 if (!pfn
->fn(crt
, *pname
)) {
345 fprintf(stderr
, "X509 name setting failed\n");
348 run_cert(crt
, *pname
, pfn
);
354 return errors
> 0 ? 1 : 0;