/*
* Copyright (C) 2016 Free Software Foundation, Inc.
*
* Author: Nikos Mavrogiannopoulos, Martin Ukrop
*
* This file is part of GnuTLS.
*
* GnuTLS is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* GnuTLS is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with GnuTLS; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <unistd.h>
#include <stdarg.h>
#include <stddef.h>
#include <setjmp.h>
#include <cmocka.h>
#include <gnutls/gnutls.h>
#include <gnutls/x509.h>
#include "../lib/x509/ip.h"
typedef struct test_vars_t {
gnutls_x509_name_constraints_t nc;
gnutls_x509_name_constraints_t nc2;
gnutls_datum_t ip;
} test_vars_t;
/* just declaration: function is exported privately
from lib/x509/name_constraints.c (declared in lib/x509/x509_int.h)
but including the header breaks includes */
extern int _gnutls_x509_name_constraints_merge(
gnutls_x509_name_constraints_t nc,
gnutls_x509_name_constraints_t nc2);
static void check_for_error(int ret) {
if (ret != GNUTLS_E_SUCCESS)
fail_msg("error in %d: %s\n", __LINE__, gnutls_strerror(ret));
}
#define IP_ACCEPTED 1
#define IP_REJECTED 0
static void check_test_result(int ret, int expected_outcome,
gnutls_datum_t *tested_ip) {
if (expected_outcome == IP_ACCEPTED ? ret == 0 : ret != 0) {
char ip_out[48];
_gnutls_ip_to_string(tested_ip->data, tested_ip->size, ip_out, sizeof(ip_out));
if (expected_outcome == IP_ACCEPTED) {
fail_msg("Checking %.*s should have succeeded.\n",
(int) sizeof(ip_out), ip_out);
} else {
fail_msg("Checking %.*s should have failed.\n",
(int) sizeof(ip_out), ip_out);
}
}
}
static void parse_cidr(const char* cidr, gnutls_datum_t *datum) {
if (datum->data != NULL) {
gnutls_free(datum->data);
}
int ret = gnutls_x509_cidr_to_rfc5280(cidr, datum);
check_for_error(ret);
}
static void tls_log_func(int level, const char *str) {
fprintf(stderr, "<%d>| %s", level, str);
}
static unsigned char cert_pem[] =
"-----BEGIN CERTIFICATE-----\n"
"MIIEMTCCAxmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UEBhMCR1Ix\n"
"RDBCBgNVBAoTO0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1\n"
"dGlvbnMgQ2VydC4gQXV0aG9yaXR5MUAwPgYDVQQDEzdIZWxsZW5pYyBBY2FkZW1p\n"
"YyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIFJvb3RDQSAyMDExMB4XDTExMTIw\n"
"NjEzNDk1MloXDTMxMTIwMTEzNDk1MlowgZUxCzAJBgNVBAYTAkdSMUQwQgYDVQQK\n"
"EztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIENl\n"
"cnQuIEF1dGhvcml0eTFAMD4GA1UEAxM3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl\n"
"c2VhcmNoIEluc3RpdHV0aW9ucyBSb290Q0EgMjAxMTCCASIwDQYJKoZIhvcNAQEB\n"
"BQADggEPADCCAQoCggEBAKlTAOMupvaO+mDYLZU++CwqVE7NuYRhlFhPjz2L5EPz\n"
"dYmNUeTDN9KKiE15HrcS3UN4SoqS5tdI1Q+kOilENbgH9mgdVc04UfCMJDGFr4PJ\n"
"fel3r+0ae50X+bOdOFAPplp5kYCvN66m0zH7tSYJnTxa71HFK9+WXesyHgLacEns\n"
"bgzImjeN9/E2YEsmLIKe0HjzDQ9jpFEw4fkrJxIH2Oq9GGKYsFk3fb7u8yBRQlqD\n"
"75O6aRXxYp2fmTmCobd0LovUxQt7L/DICto9eQqakxylKHJzkUOap9FNhYS5qXSP\n"
"FEDH3N6sQWRstBmbAmNtJGSPRLIl6s5ddAxjMlyNh+UCAwEAAaOBiTCBhjAPBgNV\n"
"HRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUppFC/RNhSiOeCKQp\n"
"5dgTBCPuQSUwRwYDVR0eBEAwPqA8MAWCAy5ncjAFggMuZXUwBoIELmVkdTAGggQu\n"
"b3JnMAWBAy5ncjAFgQMuZXUwBoEELmVkdTAGgQQub3JnMA0GCSqGSIb3DQEBBQUA\n"
"A4IBAQAf73lB4XtuP7KMhjdCSk4cNx6NZrokgclPEg8hwAOXhiVtXdMiKahsog2p\n"
"6z0GW5k6x8zDmjR/qw7IThzh+uTczQ2+vyT+bOdrwg3IBp5OjWEopmr95fZi6hg8\n"
"TqBTnbI6nOulnJEWtk2C4AwFSKls9cz4y51JtPACpf1wA+2KIaWuE4ZJwzNzvoc7\n"
"dIsXRSZMFpGD/md9zU1jZ/rzAxKWeAaNsWftjj++n08C9bMJL/NMh98qy5V8Acys\n"
"Nnq/onN694/BtZqhFLKPM58N7yLcZnuEvUUXBj08yrl3NI/K6s8/MT7jiOOASSXI\n"
"l7WdmplNsDz4SgCbZN2fOUvRJ9e4\n"
"-----END CERTIFICATE-----\n";
const gnutls_datum_t cert = { cert_pem, sizeof(cert_pem) };
// CIDRs mostly use prefix for documentation purposes (RFC5737, RFC3849)
static void check_generation_reading_basic_checking(void **glob_state)
{
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
unsigned int i, num_permitted, num_excluded, type;
gnutls_x509_crt_t crt;
gnutls_datum_t name;
gnutls_global_set_log_function(tls_log_func);
gnutls_global_set_log_level(2);
/* 1: test the generation of name constraints */
ret = gnutls_x509_crt_init(&crt);
check_for_error(ret);
ret = gnutls_x509_crt_import(crt, &cert, GNUTLS_X509_FMT_PEM);
check_for_error(ret);
num_permitted = num_excluded = 0;
parse_cidr("203.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
num_permitted++;
check_for_error(ret);
parse_cidr("2001:DB8::/32", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
num_permitted++;
check_for_error(ret);
parse_cidr("203.0.113.0/26", ip);
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
num_excluded++;
check_for_error(ret);
parse_cidr("2001:DB8::/34", ip);
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
num_excluded++;
check_for_error(ret);
// Try to add invalid name constraints
parse_cidr("2001:DB8::/34", ip);
ip->data[30] = 2;
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
if (ret == 0)
fail_msg("Checking invalid network mask should have failed.");
parse_cidr("2001:DB8::/34", ip);
ip->size = 31;
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
if (ret == 0)
fail_msg("Checking invalid IP size should have failed.");
ret = gnutls_x509_crt_set_name_constraints(crt, nc, 1);
check_for_error(ret);
/* 2: test the reading of the generated constraints */
i = 0;
do {
ret = gnutls_x509_name_constraints_get_permitted(nc, i++, &type, &name);
#ifdef DEBUG
_gnutls_cidr_to_string(name.data, name.size, ip_out, sizeof(ip_out));
printf("Loaded name constraint: %s\n",ip_out);
#endif
} while(ret == 0);
if (i-1 != num_permitted) {
fail_msg("Could not read all contraints; read %d, expected %d\n", i-1, num_permitted);
}
i = 0;
do {
ret = gnutls_x509_name_constraints_get_excluded(nc, i++, &type, &name);
#ifdef DEBUG
_gnutls_cidr_to_string(name.data, name.size, ip_out, sizeof(ip_out));
printf("Loaded name constraint: %s\n",ip_out);
#endif
} while(ret == 0);
if (i-1 != num_excluded) {
fail_msg("Could not read all excluded contraints; read %d, expected %d\n", i-1, num_excluded);
}
/* 3: test the name constraints check function */
parse_cidr("203.0.113.250/32", ip);
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("203.0.114.0/32", ip);
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("203.0.113.10/32", ip);
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("2001:DB8:4000::/128", ip);
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("2001:DB9::/128", ip);
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("2001:DB8:10::/128", ip);
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
gnutls_x509_crt_deinit(crt);
}
static void check_universal_constraint_checking(void **glob_state)
{
/* 3b setting universal constraint */
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("2001:DB8::/0", ip);
ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("2001:DB8:10::/128", ip);
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("::/128", ip);
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_simple_intersection(void **glob_state)
{
/* 4: simple intersection
* --------P:203.0.113.0/24--------
* --P:203.0.113.0/26--
* A B C
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("203.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("203.0.113.0/26", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("203.0.113.2/32", ip); // A
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("203.0.113.250/32", ip); // B
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("203.0.114.0/32", ip); // C
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_empty_intersection(void **glob_state)
{
/* 5: empty intersection
* --P:127.0.113.0/24--
* --P:255.0.113.0/24--
* A B C
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("127.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("255.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("127.0.113.2/32", ip); // A
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.0.2/32", ip); // B
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.113.2/32", ip); // C
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_mediocre_intersection(void **glob_state)
{
/* 6: mediocre intersection
* --------P:127.0.113.0/24--------
* --P:127.0.113.0/26-- --P:255.0.113.0/24--
* A B C D
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("127.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("127.0.113.0/26", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("255.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("127.0.113.2/32", ip); // A
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("127.0.113.250/32", ip); // B
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.0.2/32", ip); // C
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.113.2/32", ip); // D
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_difficult_intersection(void **glob_state)
{
/* 7: difficult intersection
* --------P:0.0.0.0/3--------------- --P:88.0.0.0/5--
* --P:0.0.0.0/5-- --P:16.0.0.0/5-- ----P:64.0.0.0/3----
* A B C D E F G H
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("0.0.0.0/3", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("88.0.0.0/5", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("0.0.0.0/5", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("16.0.0.0/5", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("64.0.0.0/3", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("0.0.113.2/32", ip); // A
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("15.255.255.255/32", ip); // B
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("16.0.0.0/32", ip); // C
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("31.12.25.2/32", ip); // D
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("63.255.255.255/32", ip); // E
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("64.0.0.0/32", ip); // F
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("89.125.7.187/32", ip); // G
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("96.0.0.0/32", ip); // H
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_ipv6_intersection(void **glob_state)
{
/* 8: IPv6 intersection
* --------P:affb::/16----- --P:affd:0000::/20--
* --P:affb:aa00::/24--
* A B C D E F G
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("affb::/16", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("affd:0000::/20", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("affb:aa00::/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("affa:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128", ip); // A
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("affb:a500::/128", ip); // B
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("affb:aa00::/128", ip); // C
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_ACCEPTED, ip);
parse_cidr("affb:ab01::/128", ip); // D
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("affc::/128", ip); // E
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("affd:0fff::/128", ip); // F
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("affd:1000::/128", ip); // G
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_empty_ipv4_intersection_ipv6_remains(void **glob_state)
{
/* 9: IPv4 and IPv6 in a common test case
* IPv4 with empty intersection, but IPv6 gets restricted as well
* --P:127.0.113.0/24--
* --P:255.0.113.0/24--
* A B C
*
* --P:bfa6::/16--
* D E
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("127.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("bfa6::/16", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("255.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("127.0.113.2/32", ip); // A
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.0.2/32", ip); // B
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.113.2/32", ip); // C
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("bfa6:ab01::/128", ip); // D
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("bfa7::/128", ip); // E
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_empty_ipv4v6_intersections(void **glob_state)
{
/* 10: IPv4 and IPv6 in a common test case
* both IPv4 and IPv6 have empty intersection
* --P:127.0.113.0/24--
* --P:255.0.113.0/24--
* A B C
*
* --P:bfa6::/16--
* --P:cfa6::/16--
* D E F
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("127.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("bfa6::/16", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("255.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("cfa6::/16", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("127.0.113.2/32", ip); // A
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.0.2/32", ip); // B
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.113.2/32", ip); // C
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("bfa6:ab01::/128", ip); // D
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("bfa7::/128", ip); // E
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("cfa7:00cc::/128", ip); // F
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static void check_ipv4v6_single_constraint_each(void **glob_state)
{
/* 11: 1 IPv4 range and 1 IPv6 range in a common test case
* (no overlap)
* --P:127.0.113.0/24--
* A B
*
* --P:bfa6::/16--
* C D
*/
int ret;
gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc;
gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2;
gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip);
parse_cidr("127.0.113.0/24", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
parse_cidr("bfa6::/16", ip);
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip);
check_for_error(ret);
ret = _gnutls_x509_name_constraints_merge(nc, nc2);
check_for_error(ret);
parse_cidr("127.0.113.2/32", ip); // A
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("255.0.0.2/32", ip); // B
ip->size = 4; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("bfa6:ab01::/128", ip); // C
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
parse_cidr("bfa7::/128", ip); // D
ip->size = 16; // strip network mask
ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip);
check_test_result(ret, IP_REJECTED, ip);
}
static int setup(void **state) {
test_vars_t* test_vars = gnutls_malloc(sizeof(test_vars_t));
if (test_vars == NULL)
return -1;
test_vars->ip.size = 0;
test_vars->ip.data = NULL;
int ret;
ret = gnutls_x509_name_constraints_init(&(test_vars->nc));
check_for_error(ret);
ret = gnutls_x509_name_constraints_init(&(test_vars->nc2));
check_for_error(ret);
*state = test_vars;
return 0;
}
static int teardown(void **state) {
test_vars_t* test_vars = *state;
gnutls_free(test_vars->ip.data);
gnutls_x509_name_constraints_deinit(test_vars->nc);
gnutls_x509_name_constraints_deinit(test_vars->nc2);
gnutls_free(*state);
return 0;
}
int main(int argc, char **argv)
{
const struct CMUnitTest tests[] = {
cmocka_unit_test_setup_teardown(check_generation_reading_basic_checking, setup, teardown),
cmocka_unit_test_setup_teardown(check_universal_constraint_checking, setup, teardown),
cmocka_unit_test_setup_teardown(check_simple_intersection, setup, teardown),
cmocka_unit_test_setup_teardown(check_empty_intersection, setup, teardown),
cmocka_unit_test_setup_teardown(check_mediocre_intersection, setup, teardown),
cmocka_unit_test_setup_teardown(check_difficult_intersection, setup, teardown),
cmocka_unit_test_setup_teardown(check_ipv6_intersection, setup, teardown),
cmocka_unit_test_setup_teardown(check_empty_ipv4_intersection_ipv6_remains, setup, teardown),
cmocka_unit_test_setup_teardown(check_empty_ipv4v6_intersections, setup, teardown),
cmocka_unit_test_setup_teardown(check_ipv4v6_single_constraint_each, setup, teardown)
};
cmocka_run_group_tests(tests, NULL, NULL);
}