|
Packit |
549fdc |
/*
|
|
Packit |
549fdc |
* Copyright (C) 2016 Red Hat, Inc.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* Authors: Nikos Mavrogiannopoulos, Martin Ukrop
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* This file is part of GnuTLS.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* GnuTLS is free software; you can redistribute it and/or modify it
|
|
Packit |
549fdc |
* under the terms of the GNU General Public License as published by
|
|
Packit |
549fdc |
* the Free Software Foundation; either version 3 of the License, or
|
|
Packit |
549fdc |
* (at your option) any later version.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* GnuTLS is distributed in the hope that it will be useful, but
|
|
Packit |
549fdc |
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit |
549fdc |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Packit |
549fdc |
* General Public License for more details.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* You should have received a copy of the GNU General Public License
|
|
Packit |
549fdc |
* along with GnuTLS; if not, write to the Free Software Foundation,
|
|
Packit |
549fdc |
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* Parts copied from GnuTLS example programs. */
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#ifdef HAVE_CONFIG_H
|
|
Packit |
549fdc |
#include <config.h>
|
|
Packit |
549fdc |
#endif
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#include <stdio.h>
|
|
Packit |
549fdc |
#include <stdlib.h>
|
|
Packit |
549fdc |
#include <string.h>
|
|
Packit |
549fdc |
#include <sys/types.h>
|
|
Packit |
549fdc |
#include <unistd.h>
|
|
Packit |
549fdc |
#include "../lib/gnutls_int.h"
|
|
Packit |
549fdc |
#include "../lib/x509/x509_int.h"
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#include "utils.h"
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* Test for name constraints PKIX extension.
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
static void check_for_error(int ret) {
|
|
Packit |
549fdc |
if (ret != GNUTLS_E_SUCCESS)
|
|
Packit |
549fdc |
fail("error in %d: %s\n", __LINE__, gnutls_strerror(ret));
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#define NAME_ACCEPTED 1
|
|
Packit |
549fdc |
#define NAME_REJECTED 0
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
static void check_test_result(int suite, int ret, int expected_outcome,
|
|
Packit |
549fdc |
gnutls_datum_t *tested_data) {
|
|
Packit |
549fdc |
if (expected_outcome == NAME_ACCEPTED ? ret == 0 : ret != 0) {
|
|
Packit |
549fdc |
if (expected_outcome == NAME_ACCEPTED) {
|
|
Packit |
549fdc |
fail("Checking \"%.*s\" should have succeeded (suite %d).\n",
|
|
Packit |
549fdc |
tested_data->size, tested_data->data, suite);
|
|
Packit |
549fdc |
} else {
|
|
Packit |
549fdc |
fail("Checking \"%.*s\" should have failed (suite %d).\n",
|
|
Packit |
549fdc |
tested_data->size, tested_data->data, suite);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
static void set_name(const char *name, gnutls_datum_t *datum) {
|
|
Packit |
549fdc |
datum->data = (unsigned char*) name;
|
|
Packit |
549fdc |
datum->size = strlen((char*) name);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
static void tls_log_func(int level, const char *str)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
fprintf(stderr, "<%d>| %s", level, str);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
void doit(void)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
int ret, suite;
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_t nc1, nc2;
|
|
Packit |
549fdc |
gnutls_datum_t name;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_global_set_log_function(tls_log_func);
|
|
Packit |
549fdc |
if (debug)
|
|
Packit |
549fdc |
gnutls_global_set_log_level(1000);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* 0: test the merge permitted name constraints
|
|
Packit |
549fdc |
* NC1: permitted DNS org
|
|
Packit |
549fdc |
* permitted DNS ccc.com
|
|
Packit |
549fdc |
* permitted email ccc.com
|
|
Packit |
549fdc |
* NC2: permitted DNS org
|
|
Packit |
549fdc |
* permitted DNS aaa.bbb.ccc.com
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
suite = 0;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc1;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc2;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("org", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_RFC822NAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("org", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("aaa.bbb.ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = _gnutls_x509_name_constraints_merge(nc1, nc2);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* unrelated */
|
|
Packit |
549fdc |
set_name("xxx.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.org", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_ACCEPTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("xxx.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* check intersection of permitted */
|
|
Packit |
549fdc |
set_name("xxx.aaa.bbb.ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_ACCEPTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("aaa.bbb.ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_ACCEPTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("xxx.bbb.ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("xxx.ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_RFC822NAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_ACCEPTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("xxx.ccc.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_RFC822NAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc1);
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc2);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* 1: test the merge of excluded name constraints
|
|
Packit |
549fdc |
* NC1: denied DNS example.com
|
|
Packit |
549fdc |
* NC2: denied DNS example.net
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
suite = 1;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc1;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc2;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_excluded(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.net", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_excluded(nc2, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = _gnutls_x509_name_constraints_merge(nc1, nc2);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("xxx.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("xxx.example.net", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.net", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.org", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_ACCEPTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc1);
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc2);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* 2: test permitted constraints with empty intersection
|
|
Packit |
549fdc |
* (no permitted nodes remain)
|
|
Packit |
549fdc |
* NC1: permitted DNS one.example.com
|
|
Packit |
549fdc |
* NC2: permitted DNS two.example.com
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
suite = 2;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc1;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc2;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("one.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("two.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = _gnutls_x509_name_constraints_merge(nc1, nc2);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("one.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("two.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("three.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("org", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc1);
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc2);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* 3: test more permitted constraints, some with empty intersection
|
|
Packit |
549fdc |
* NC1: permitted DNS foo.com
|
|
Packit |
549fdc |
* permitted DNS bar.com
|
|
Packit |
549fdc |
* permitted email redhat.com
|
|
Packit |
549fdc |
* NC2: permitted DNS sub.foo.com
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
suite = 3;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc1;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc2;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("foo.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("bar.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("sub.foo.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = _gnutls_x509_name_constraints_merge(nc1, nc2);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("foo.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("bar.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("sub.foo.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_ACCEPTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("anothersub.foo.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc1);
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc2);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* 4: test permitted constraints with empty intersection
|
|
Packit |
549fdc |
* almost identical to 2, but extra name constraint of different type
|
|
Packit |
549fdc |
* that remains after intersection
|
|
Packit |
549fdc |
* NC1: permitted DNS three.example.com
|
|
Packit |
549fdc |
* permitted email redhat.com
|
|
Packit |
549fdc |
* NC2: permitted DNS four.example.com
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
suite = 4;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc1;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_init(&nc2;;
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("three.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("redhat.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc1, GNUTLS_SAN_RFC822NAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("four.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = _gnutls_x509_name_constraints_merge(nc1, nc2);
|
|
Packit |
549fdc |
check_for_error(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("three.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("four.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("five.example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("example.com", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
set_name("org", &name);
|
|
Packit |
549fdc |
ret = gnutls_x509_name_constraints_check(nc1, GNUTLS_SAN_DNSNAME, &name);
|
|
Packit |
549fdc |
check_test_result(suite, ret, NAME_REJECTED, &name);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc1);
|
|
Packit |
549fdc |
gnutls_x509_name_constraints_deinit(nc2);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* Test footer */
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (debug)
|
|
Packit |
549fdc |
success("Test success.\n");
|
|
Packit |
549fdc |
}
|