]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Add a Certificate Policies Test
authorMatt Caswell <matt@openssl.org>
Tue, 7 Mar 2023 17:07:57 +0000 (17:07 +0000)
committerTomas Mraz <tomas@openssl.org>
Tue, 28 Mar 2023 11:31:38 +0000 (13:31 +0200)
Test that a valid certificate policy is accepted and that an invalid
certificate policy is rejected. Specifically we are checking that a
leaf certificate with an invalid policy is detected.

Related-to: CVE-2023-0465
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20585)

test/recipes/25-test_verify.t

index b60ed5a77d364eec4ca7a903dc156684800bebc2..58f9de410fca84b0eb348f9d59bfddadf8e814da 100644 (file)
@@ -29,7 +29,7 @@ sub verify {
     run(app([@args]));
 }
 
-plan tests => 183;
+plan tests => 185;
 
 # Canonical success
 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
@@ -558,3 +558,14 @@ SKIP: {
     ok(run(app([ qw(openssl verify -trusted), $rsapluscert_file, $cert_file ])),
        'Mixed key + cert file test');
 }
+
+# Certificate Policies
+ok(verify("ee-cert-policies", "", ["root-cert"], ["ca-pol-cert"],
+          "-policy_check", "-policy", "1.3.6.1.4.1.16604.998855.1",
+          "-explicit_policy"),
+   "Certificate policy");
+
+ok(!verify("ee-cert-policies-bad", "", ["root-cert"], ["ca-pol-cert"],
+           "-policy_check", "-policy", "1.3.6.1.4.1.16604.998855.1",
+           "-explicit_policy"),
+   "Bad certificate policy");