|
Packit Service |
4684c1 |
/*
|
|
Packit Service |
4684c1 |
* Copyright (C) 2016 Free Software Foundation, Inc.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* Author: Nikos Mavrogiannopoulos, Martin Ukrop
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* This file is part of GnuTLS.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* GnuTLS is free software; you can redistribute it and/or modify it
|
|
Packit Service |
4684c1 |
* under the terms of the GNU General Public License as published by
|
|
Packit Service |
4684c1 |
* the Free Software Foundation; either version 3 of the License, or
|
|
Packit Service |
4684c1 |
* (at your option) any later version.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* GnuTLS is distributed in the hope that it will be useful, but
|
|
Packit Service |
4684c1 |
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit Service |
4684c1 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Packit Service |
4684c1 |
* General Public License for more details.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* You should have received a copy of the GNU General Public License
|
|
Packit Service |
4684c1 |
* along with GnuTLS; if not, write to the Free Software Foundation,
|
|
Packit Service |
4684c1 |
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#ifdef HAVE_CONFIG_H
|
|
Packit Service |
4684c1 |
#include <config.h>
|
|
Packit Service |
4684c1 |
#endif
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#include <stdio.h>
|
|
Packit Service |
4684c1 |
#include <stdlib.h>
|
|
Packit Service |
4684c1 |
#include <string.h>
|
|
Packit Service |
4684c1 |
#include <sys/types.h>
|
|
Packit Service |
4684c1 |
#include <unistd.h>
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#include <stdarg.h>
|
|
Packit Service |
4684c1 |
#include <stddef.h>
|
|
Packit Service |
4684c1 |
#include <setjmp.h>
|
|
Packit Service |
4684c1 |
#include <cmocka.h>
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#include <gnutls/gnutls.h>
|
|
Packit Service |
4684c1 |
#include <gnutls/x509.h>
|
|
Packit Service |
4684c1 |
#include "../lib/x509/ip.h"
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
typedef struct test_vars_t {
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t ip;
|
|
Packit Service |
4684c1 |
} test_vars_t;
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* just declaration: function is exported privately
|
|
Packit Service |
4684c1 |
from lib/x509/name_constraints.c (declared in lib/x509/x509_int.h)
|
|
Packit Service |
4684c1 |
but including the header breaks includes */
|
|
Packit Service |
4684c1 |
extern int _gnutls_x509_name_constraints_merge(
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc,
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_for_error(int ret) {
|
|
Packit Service |
4684c1 |
if (ret != GNUTLS_E_SUCCESS)
|
|
Packit Service |
4684c1 |
fail_msg("error in %d: %s\n", __LINE__, gnutls_strerror(ret));
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#define IP_ACCEPTED 1
|
|
Packit Service |
4684c1 |
#define IP_REJECTED 0
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_test_result(int ret, int expected_outcome,
|
|
Packit Service |
4684c1 |
gnutls_datum_t *tested_ip) {
|
|
Packit Service |
4684c1 |
if (expected_outcome == IP_ACCEPTED ? ret == 0 : ret != 0) {
|
|
Packit Service |
4684c1 |
char ip_out[48];
|
|
Packit Service |
4684c1 |
_gnutls_ip_to_string(tested_ip->data, tested_ip->size, ip_out, sizeof(ip_out));
|
|
Packit Service |
4684c1 |
if (expected_outcome == IP_ACCEPTED) {
|
|
Packit Service |
4684c1 |
fail_msg("Checking %.*s should have succeeded.\n",
|
|
Packit Service |
4684c1 |
(int) sizeof(ip_out), ip_out);
|
|
Packit Service |
4684c1 |
} else {
|
|
Packit Service |
4684c1 |
fail_msg("Checking %.*s should have failed.\n",
|
|
Packit Service |
4684c1 |
(int) sizeof(ip_out), ip_out);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void parse_cidr(const char* cidr, gnutls_datum_t *datum) {
|
|
Packit Service |
4684c1 |
if (datum->data != NULL) {
|
|
Packit Service |
4684c1 |
gnutls_free(datum->data);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
int ret = gnutls_x509_cidr_to_rfc5280(cidr, datum);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void tls_log_func(int level, const char *str) {
|
|
Packit Service |
4684c1 |
fprintf(stderr, "<%d>| %s", level, str);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static unsigned char cert_pem[] =
|
|
Packit Service |
4684c1 |
"-----BEGIN CERTIFICATE-----\n"
|
|
Packit Service |
4684c1 |
"MIIEMTCCAxmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UEBhMCR1Ix\n"
|
|
Packit Service |
4684c1 |
"RDBCBgNVBAoTO0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1\n"
|
|
Packit Service |
4684c1 |
"dGlvbnMgQ2VydC4gQXV0aG9yaXR5MUAwPgYDVQQDEzdIZWxsZW5pYyBBY2FkZW1p\n"
|
|
Packit Service |
4684c1 |
"YyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIFJvb3RDQSAyMDExMB4XDTExMTIw\n"
|
|
Packit Service |
4684c1 |
"NjEzNDk1MloXDTMxMTIwMTEzNDk1MlowgZUxCzAJBgNVBAYTAkdSMUQwQgYDVQQK\n"
|
|
Packit Service |
4684c1 |
"EztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIENl\n"
|
|
Packit Service |
4684c1 |
"cnQuIEF1dGhvcml0eTFAMD4GA1UEAxM3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl\n"
|
|
Packit Service |
4684c1 |
"c2VhcmNoIEluc3RpdHV0aW9ucyBSb290Q0EgMjAxMTCCASIwDQYJKoZIhvcNAQEB\n"
|
|
Packit Service |
4684c1 |
"BQADggEPADCCAQoCggEBAKlTAOMupvaO+mDYLZU++CwqVE7NuYRhlFhPjz2L5EPz\n"
|
|
Packit Service |
4684c1 |
"dYmNUeTDN9KKiE15HrcS3UN4SoqS5tdI1Q+kOilENbgH9mgdVc04UfCMJDGFr4PJ\n"
|
|
Packit Service |
4684c1 |
"fel3r+0ae50X+bOdOFAPplp5kYCvN66m0zH7tSYJnTxa71HFK9+WXesyHgLacEns\n"
|
|
Packit Service |
4684c1 |
"bgzImjeN9/E2YEsmLIKe0HjzDQ9jpFEw4fkrJxIH2Oq9GGKYsFk3fb7u8yBRQlqD\n"
|
|
Packit Service |
4684c1 |
"75O6aRXxYp2fmTmCobd0LovUxQt7L/DICto9eQqakxylKHJzkUOap9FNhYS5qXSP\n"
|
|
Packit Service |
4684c1 |
"FEDH3N6sQWRstBmbAmNtJGSPRLIl6s5ddAxjMlyNh+UCAwEAAaOBiTCBhjAPBgNV\n"
|
|
Packit Service |
4684c1 |
"HRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUppFC/RNhSiOeCKQp\n"
|
|
Packit Service |
4684c1 |
"5dgTBCPuQSUwRwYDVR0eBEAwPqA8MAWCAy5ncjAFggMuZXUwBoIELmVkdTAGggQu\n"
|
|
Packit Service |
4684c1 |
"b3JnMAWBAy5ncjAFgQMuZXUwBoEELmVkdTAGgQQub3JnMA0GCSqGSIb3DQEBBQUA\n"
|
|
Packit Service |
4684c1 |
"A4IBAQAf73lB4XtuP7KMhjdCSk4cNx6NZrokgclPEg8hwAOXhiVtXdMiKahsog2p\n"
|
|
Packit Service |
4684c1 |
"6z0GW5k6x8zDmjR/qw7IThzh+uTczQ2+vyT+bOdrwg3IBp5OjWEopmr95fZi6hg8\n"
|
|
Packit Service |
4684c1 |
"TqBTnbI6nOulnJEWtk2C4AwFSKls9cz4y51JtPACpf1wA+2KIaWuE4ZJwzNzvoc7\n"
|
|
Packit Service |
4684c1 |
"dIsXRSZMFpGD/md9zU1jZ/rzAxKWeAaNsWftjj++n08C9bMJL/NMh98qy5V8Acys\n"
|
|
Packit Service |
4684c1 |
"Nnq/onN694/BtZqhFLKPM58N7yLcZnuEvUUXBj08yrl3NI/K6s8/MT7jiOOASSXI\n"
|
|
Packit Service |
4684c1 |
"l7WdmplNsDz4SgCbZN2fOUvRJ9e4\n"
|
|
Packit Service |
4684c1 |
"-----END CERTIFICATE-----\n";
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
const gnutls_datum_t cert = { cert_pem, sizeof(cert_pem) };
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
// CIDRs mostly use prefix for documentation purposes (RFC5737, RFC3849)
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_generation_reading_basic_checking(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
unsigned int i, num_permitted, num_excluded, type;
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_t crt;
|
|
Packit Service |
4684c1 |
gnutls_datum_t name;
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_global_set_log_function(tls_log_func);
|
|
Packit Service |
4684c1 |
gnutls_global_set_log_level(2);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* 1: test the generation of name constraints */
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_crt_init(&crt;;
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_crt_import(crt, &cert, GNUTLS_X509_FMT_PEM);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
num_permitted = num_excluded = 0;
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
num_permitted++;
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8::/32", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
num_permitted++;
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.0/26", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
num_excluded++;
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8::/34", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
num_excluded++;
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
// Try to add invalid name constraints
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8::/34", ip);
|
|
Packit Service |
4684c1 |
ip->data[30] = 2;
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
if (ret == 0)
|
|
Packit Service |
4684c1 |
fail_msg("Checking invalid network mask should have failed.");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8::/34", ip);
|
|
Packit Service |
4684c1 |
ip->size = 31;
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
if (ret == 0)
|
|
Packit Service |
4684c1 |
fail_msg("Checking invalid IP size should have failed.");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_crt_set_name_constraints(crt, nc, 1);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* 2: test the reading of the generated constraints */
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
i = 0;
|
|
Packit Service |
4684c1 |
do {
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_get_permitted(nc, i++, &type, &name);
|
|
Packit Service |
4684c1 |
#ifdef DEBUG
|
|
Packit Service |
4684c1 |
_gnutls_cidr_to_string(name.data, name.size, ip_out, sizeof(ip_out));
|
|
Packit Service |
4684c1 |
printf("Loaded name constraint: %s\n",ip_out);
|
|
Packit Service |
4684c1 |
#endif
|
|
Packit Service |
4684c1 |
} while(ret == 0);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (i-1 != num_permitted) {
|
|
Packit Service |
4684c1 |
fail_msg("Could not read all contraints; read %d, expected %d\n", i-1, num_permitted);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
i = 0;
|
|
Packit Service |
4684c1 |
do {
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_get_excluded(nc, i++, &type, &name);
|
|
Packit Service |
4684c1 |
#ifdef DEBUG
|
|
Packit Service |
4684c1 |
_gnutls_cidr_to_string(name.data, name.size, ip_out, sizeof(ip_out));
|
|
Packit Service |
4684c1 |
printf("Loaded name constraint: %s\n",ip_out);
|
|
Packit Service |
4684c1 |
#endif
|
|
Packit Service |
4684c1 |
} while(ret == 0);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (i-1 != num_excluded) {
|
|
Packit Service |
4684c1 |
fail_msg("Could not read all excluded contraints; read %d, expected %d\n", i-1, num_excluded);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* 3: test the name constraints check function */
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.250/32", ip);
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.114.0/32", ip);
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.10/32", ip);
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8:4000::/128", ip);
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB9::/128", ip);
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8:10::/128", ip);
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_deinit(crt);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_universal_constraint_checking(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 3b setting universal constraint */
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8::/0", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("2001:DB8:10::/128", ip);
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("::/128", ip);
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_simple_intersection(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 4: simple intersection
|
|
Packit Service |
4684c1 |
* --------P:203.0.113.0/24--------
|
|
Packit Service |
4684c1 |
* --P:203.0.113.0/26--
|
|
Packit Service |
4684c1 |
* A B C
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.0/26", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.2/32", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.113.250/32", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("203.0.114.0/32", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_empty_intersection(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 5: empty intersection
|
|
Packit Service |
4684c1 |
* --P:127.0.113.0/24--
|
|
Packit Service |
4684c1 |
* --P:255.0.113.0/24--
|
|
Packit Service |
4684c1 |
* A B C
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.2/32", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.0.2/32", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.2/32", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_mediocre_intersection(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 6: mediocre intersection
|
|
Packit Service |
4684c1 |
* --------P:127.0.113.0/24--------
|
|
Packit Service |
4684c1 |
* --P:127.0.113.0/26-- --P:255.0.113.0/24--
|
|
Packit Service |
4684c1 |
* A B C D
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.0/26", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.2/32", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.250/32", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.0.2/32", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.2/32", ip); // D
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_difficult_intersection(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 7: difficult intersection
|
|
Packit Service |
4684c1 |
* --------P:0.0.0.0/3--------------- --P:88.0.0.0/5--
|
|
Packit Service |
4684c1 |
* --P:0.0.0.0/5-- --P:16.0.0.0/5-- ----P:64.0.0.0/3----
|
|
Packit Service |
4684c1 |
* A B C D E F G H
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("0.0.0.0/3", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("88.0.0.0/5", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("0.0.0.0/5", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("16.0.0.0/5", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("64.0.0.0/3", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("0.0.113.2/32", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("15.255.255.255/32", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("16.0.0.0/32", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("31.12.25.2/32", ip); // D
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("63.255.255.255/32", ip); // E
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("64.0.0.0/32", ip); // F
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("89.125.7.187/32", ip); // G
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("96.0.0.0/32", ip); // H
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_ipv6_intersection(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 8: IPv6 intersection
|
|
Packit Service |
4684c1 |
* --------P:affb::/16----- --P:affd:0000::/20--
|
|
Packit Service |
4684c1 |
* --P:affb:aa00::/24--
|
|
Packit Service |
4684c1 |
* A B C D E F G
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affb::/16", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("affd:0000::/20", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("affb:aa00::/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affa:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affb:a500::/128", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affb:aa00::/128", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_ACCEPTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affb:ab01::/128", ip); // D
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affc::/128", ip); // E
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affd:0fff::/128", ip); // F
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("affd:1000::/128", ip); // G
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_empty_ipv4_intersection_ipv6_remains(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 9: IPv4 and IPv6 in a common test case
|
|
Packit Service |
4684c1 |
* IPv4 with empty intersection, but IPv6 gets restricted as well
|
|
Packit Service |
4684c1 |
* --P:127.0.113.0/24--
|
|
Packit Service |
4684c1 |
* --P:255.0.113.0/24--
|
|
Packit Service |
4684c1 |
* A B C
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* --P:bfa6::/16--
|
|
Packit Service |
4684c1 |
* D E
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("bfa6::/16", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.2/32", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.0.2/32", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.2/32", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("bfa6:ab01::/128", ip); // D
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("bfa7::/128", ip); // E
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_empty_ipv4v6_intersections(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 10: IPv4 and IPv6 in a common test case
|
|
Packit Service |
4684c1 |
* both IPv4 and IPv6 have empty intersection
|
|
Packit Service |
4684c1 |
* --P:127.0.113.0/24--
|
|
Packit Service |
4684c1 |
* --P:255.0.113.0/24--
|
|
Packit Service |
4684c1 |
* A B C
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* --P:bfa6::/16--
|
|
Packit Service |
4684c1 |
* --P:cfa6::/16--
|
|
Packit Service |
4684c1 |
* D E F
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("bfa6::/16", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("cfa6::/16", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.2/32", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.0.2/32", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.113.2/32", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("bfa6:ab01::/128", ip); // D
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("bfa7::/128", ip); // E
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("cfa7:00cc::/128", ip); // F
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void check_ipv4v6_single_constraint_each(void **glob_state)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
/* 11: 1 IPv4 range and 1 IPv6 range in a common test case
|
|
Packit Service |
4684c1 |
* (no overlap)
|
|
Packit Service |
4684c1 |
* --P:127.0.113.0/24--
|
|
Packit Service |
4684c1 |
* A B
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* --P:bfa6::/16--
|
|
Packit Service |
4684c1 |
* C D
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
|
|
Packit Service |
4684c1 |
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.0/24", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
parse_cidr("bfa6::/16", ip);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("127.0.113.2/32", ip); // A
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("255.0.0.2/32", ip); // B
|
|
Packit Service |
4684c1 |
ip->size = 4; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("bfa6:ab01::/128", ip); // C
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
parse_cidr("bfa7::/128", ip); // D
|
|
Packit Service |
4684c1 |
ip->size = 16; // strip network mask
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
|
|
Packit Service |
4684c1 |
check_test_result(ret, IP_REJECTED, ip);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static int setup(void **state) {
|
|
Packit Service |
4684c1 |
test_vars_t* test_vars = gnutls_malloc(sizeof(test_vars_t));
|
|
Packit Service |
4684c1 |
if (test_vars == NULL)
|
|
Packit Service |
4684c1 |
return -1;
|
|
Packit Service |
4684c1 |
test_vars->ip.size = 0;
|
|
Packit Service |
4684c1 |
test_vars->ip.data = NULL;
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_init(&(test_vars->nc));
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_name_constraints_init(&(test_vars->nc2));
|
|
Packit Service |
4684c1 |
check_for_error(ret);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
*state = test_vars;
|
|
Packit Service |
4684c1 |
return 0;
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static int teardown(void **state) {
|
|
Packit Service |
4684c1 |
test_vars_t* test_vars = *state;
|
|
Packit Service |
4684c1 |
gnutls_free(test_vars->ip.data);
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_deinit(test_vars->nc);
|
|
Packit Service |
4684c1 |
gnutls_x509_name_constraints_deinit(test_vars->nc2);
|
|
Packit Service |
4684c1 |
gnutls_free(*state);
|
|
Packit Service |
4684c1 |
return 0;
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
int main(int argc, char **argv)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
const struct CMUnitTest tests[] = {
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_generation_reading_basic_checking, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_universal_constraint_checking, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_simple_intersection, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_empty_intersection, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_mediocre_intersection, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_difficult_intersection, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_ipv6_intersection, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_empty_ipv4_intersection_ipv6_remains, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_empty_ipv4v6_intersections, setup, teardown),
|
|
Packit Service |
4684c1 |
cmocka_unit_test_setup_teardown(check_ipv4v6_single_constraint_each, setup, teardown)
|
|
Packit Service |
4684c1 |
};
|
|
Packit Service |
4684c1 |
cmocka_run_group_tests(tests, NULL, NULL);
|
|
Packit Service |
4684c1 |
}
|