mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-29 08:24:11 -04:00
Test x509 csr SAN DN and RFC822 generation
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com>
This commit is contained in:
parent
6bc7a38683
commit
34ccd8d0b6
@ -1303,8 +1303,7 @@ all_final += server1.req.sha256
|
|||||||
|
|
||||||
server1.req.sha256.ext: server1.key
|
server1.req.sha256.ext: server1.key
|
||||||
# Generating this with OpenSSL as a comparison point to test we're getting the same result
|
# Generating this with OpenSSL as a comparison point to test we're getting the same result
|
||||||
openssl req -new -out $@ -key $< -subj '/C=NL/O=PolarSSL/CN=PolarSSL Server 1' -sha256 -addext "extendedKeyUsage=serverAuth" -addext "subjectAltName=URI:http://pki.example.com/,IP:127.1.1.0,DNS:example.com"
|
openssl req -new -out $@ -key $< -subj '/C=NL/O=PolarSSL/CN=PolarSSL Server 1' -sha256 -config server1.req.sha256.conf
|
||||||
all_final += server1.req.sha256.ext
|
|
||||||
|
|
||||||
parse_input/server1.req.sha384 server1.req.sha384: server1.key
|
parse_input/server1.req.sha384 server1.req.sha384: server1.key
|
||||||
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA384
|
$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< subject_name="C=NL,O=PolarSSL,CN=PolarSSL Server 1" md=SHA384
|
||||||
|
17
tests/data_files/server1.req.sha256.conf
Normal file
17
tests/data_files/server1.req.sha256.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
req_extensions = req_ext
|
||||||
|
|
||||||
|
[req_ext]
|
||||||
|
extendedKeyUsage = serverAuth
|
||||||
|
subjectAltName = @alt_names
|
||||||
|
|
||||||
|
[alt_names]
|
||||||
|
email = mail@example.com
|
||||||
|
DNS = example.com
|
||||||
|
dirName = dirname_sect
|
||||||
|
IP = 127.0.0.1
|
||||||
|
URI = http://pki.example.com
|
||||||
|
|
||||||
|
[dirname_sect]
|
||||||
|
C=UK
|
||||||
|
O=Mbed TLS
|
||||||
|
CN=Mbed TLS directoryName SAN
|
@ -1,18 +1,20 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
MIIC3jCCAcYCAQAwPDELMAkGA1UEBhMCTkwxETAPBgNVBAoMCFBvbGFyU1NMMRow
|
MIIDPzCCAicCAQAwPDELMAkGA1UEBhMCTkwxETAPBgNVBAoMCFBvbGFyU1NMMRow
|
||||||
GAYDVQQDDBFQb2xhclNTTCBTZXJ2ZXIgMTCCASIwDQYJKoZIhvcNAQEBBQADggEP
|
GAYDVQQDDBFQb2xhclNTTCBTZXJ2ZXIgMTCCASIwDQYJKoZIhvcNAQEBBQADggEP
|
||||||
ADCCAQoCggEBAKkCHz1AatVVU4v9Nu6CZS4VYV6Jv7joRZDb7ogWUtPxQ1BHlhJZ
|
ADCCAQoCggEBAKkCHz1AatVVU4v9Nu6CZS4VYV6Jv7joRZDb7ogWUtPxQ1BHlhJZ
|
||||||
ZIdr/SvgRvlzvt3PkuGRW+1moG+JKXlFgNCDatVBQ3dfOXwJBEeCsFc5cO2j7BUZ
|
ZIdr/SvgRvlzvt3PkuGRW+1moG+JKXlFgNCDatVBQ3dfOXwJBEeCsFc5cO2j7BUZ
|
||||||
HqgzCEfBBUKp/UzDtN/dBh9NEFFAZ3MTD0D4bYElXwqxU8YwfhU5rPla7n+SnqYF
|
HqgzCEfBBUKp/UzDtN/dBh9NEFFAZ3MTD0D4bYElXwqxU8YwfhU5rPla7n+SnqYF
|
||||||
W+cTl4W1I5LZ1CQG1QkliXUH3aYajz8JGb6tZSxk65Wb3P5BXhem2mxbacwCuhQs
|
W+cTl4W1I5LZ1CQG1QkliXUH3aYajz8JGb6tZSxk65Wb3P5BXhem2mxbacwCuhQs
|
||||||
FiScStzN0PdSZ3PxLaAj/X70McotcMqJCwTbLqZPcG6ezr1YieJTWZ5uWpJl4og/
|
FiScStzN0PdSZ3PxLaAj/X70McotcMqJCwTbLqZPcG6ezr1YieJTWZ5uWpJl4og/
|
||||||
DJQZo93l6J2VE+0p26twEtxaymsXq1KCVLECAwEAAaBdMFsGCSqGSIb3DQEJDjFO
|
DJQZo93l6J2VE+0p26twEtxaymsXq1KCVLECAwEAAaCBvTCBugYJKoZIhvcNAQkO
|
||||||
MEwwEwYDVR0lBAwwCgYIKwYBBQUHAwEwNQYDVR0RBC4wLIYXaHR0cDovL3BraS5l
|
MYGsMIGpMBMGA1UdJQQMMAoGCCsGAQUFBwMBMIGRBgNVHREEgYkwgYaBEG1haWxA
|
||||||
eGFtcGxlLmNvbS+HBH8BAQCCC2V4YW1wbGUuY29tMA0GCSqGSIb3DQEBCwUAA4IB
|
ZXhhbXBsZS5jb22CC2V4YW1wbGUuY29tpEcwRTELMAkGA1UEBhMCVUsxETAPBgNV
|
||||||
AQCGmTIXEUvTqwChkzRtxPIQDDchrMnCXgUrTSxre5nvUOpjVlcIIPGWAwxRovfe
|
BAoMCE1iZWQgVExTMSMwIQYDVQQDDBpNYmVkIFRMUyBkaXJlY3RvcnlOYW1lIFNB
|
||||||
pW6OaGZ/3xD0dRAcOW08sTD6GRUazFrubPA1eZiNC7vYdWV59qm84N5yRR/s8Hm+
|
TocEfwAAAYYWaHR0cDovL3BraS5leGFtcGxlLmNvbTANBgkqhkiG9w0BAQsFAAOC
|
||||||
okwI47m7W9C0pfaNXchgFUQBn16TrZxPXklbCpBJ/TFV+1ODY0sJPHYiCFpYI+Jz
|
AQEAclrNmmgAoa4ctwyBwD1T8jbyBeuxTf+ifc+MQ6pE7YuYSlanHE5l/CoVlW14
|
||||||
YuJmadP2BHucl8wv2RyVHywOmV1sDc74i9igVrBCAh8wu+kqImMtrnkGZDxrnj/L
|
lR5gA01pWJJ7T8RBvo25OqXbvMFSafeGXpSHOG69A6p/7YULtbPuS6uvtdR0m3t+
|
||||||
5P1eDfdqG2cN+s40RnMQMosh3UfqpNV/bTgAqBPP2uluT9L1KpWcjZeuvisOgVTq
|
2IacL0q5FsSmPw07RNfVGDFniKVqD8eAuYnhFztk0+uZVYD4xGezUckb2wTbzFpu
|
||||||
XwFI5s34fen2DUVw6MWNfbDK
|
lUA/NhoWfCyV44TDR5fy23qNXywEhatDU/3nMmSJpBVy4y7J6BQVCl/fbyuKIOqu
|
||||||
|
0OVP+FvANSO46twA9+38hI+/nPuVwtbBvg1aLBMbLZ3Egi2uozokYFYL22JYNGJo
|
||||||
|
XORQgR66Sdrvfhiug+F5xmldCg==
|
||||||
-----END CERTIFICATE REQUEST-----
|
-----END CERTIFICATE REQUEST-----
|
||||||
|
@ -153,24 +153,44 @@ void x509_csr_check(char *key_file, char *cert_req_check_file, int md_type,
|
|||||||
mbedtls_x509_san_list san_ip;
|
mbedtls_x509_san_list san_ip;
|
||||||
mbedtls_x509_san_list san_dns;
|
mbedtls_x509_san_list san_dns;
|
||||||
mbedtls_x509_san_list san_uri;
|
mbedtls_x509_san_list san_uri;
|
||||||
|
mbedtls_x509_san_list san_mail;
|
||||||
|
mbedtls_x509_san_list san_dn;
|
||||||
mbedtls_x509_san_list *san_list = NULL;
|
mbedtls_x509_san_list *san_list = NULL;
|
||||||
const char san_ip_name[] = { 0x7f, 0x01, 0x01, 0x00 }; // 127.1.1.0
|
mbedtls_asn1_named_data *ext_san_dirname = NULL;
|
||||||
|
|
||||||
|
const char san_ip_name[] = { 0x7f, 0x00, 0x00, 0x01 }; // 127.0.0.1
|
||||||
const char *san_dns_name = "example.com";
|
const char *san_dns_name = "example.com";
|
||||||
const char *san_uri_name = "http://pki.example.com/";
|
const char *san_dn_name = "C=UK,O=Mbed TLS,CN=Mbed TLS directoryName SAN";
|
||||||
|
const char *san_mail_name = "mail@example.com";
|
||||||
|
const char *san_uri_name = "http://pki.example.com";
|
||||||
|
|
||||||
|
san_mail.node.type = MBEDTLS_X509_SAN_RFC822_NAME;
|
||||||
|
san_mail.node.san.unstructured_name.p = (unsigned char *) san_mail_name;
|
||||||
|
san_mail.node.san.unstructured_name.len = strlen(san_mail_name);
|
||||||
|
san_mail.next = NULL;
|
||||||
|
|
||||||
|
san_dns.node.type = MBEDTLS_X509_SAN_DNS_NAME;
|
||||||
|
san_dns.node.san.unstructured_name.p = (unsigned char *) san_dns_name;
|
||||||
|
san_dns.node.san.unstructured_name.len = strlen(san_dns_name);
|
||||||
|
san_dns.next = &san_mail;
|
||||||
|
|
||||||
|
san_dn.node.type = MBEDTLS_X509_SAN_DIRECTORY_NAME;
|
||||||
|
TEST_ASSERT(mbedtls_x509_string_to_names(&ext_san_dirname,
|
||||||
|
san_dn_name) == 0);
|
||||||
|
san_dn.node.san.directory_name = *ext_san_dirname;
|
||||||
|
san_dn.next = &san_dns;
|
||||||
|
|
||||||
|
san_ip.node.type = MBEDTLS_X509_SAN_IP_ADDRESS;
|
||||||
|
san_ip.node.san.unstructured_name.p = (unsigned char *) san_ip_name;
|
||||||
|
san_ip.node.san.unstructured_name.len = sizeof(san_ip_name);
|
||||||
|
san_ip.next = &san_dn;
|
||||||
|
|
||||||
san_uri.node.type = MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER;
|
san_uri.node.type = MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER;
|
||||||
san_uri.node.san.unstructured_name.p = (unsigned char *) san_uri_name;
|
san_uri.node.san.unstructured_name.p = (unsigned char *) san_uri_name;
|
||||||
san_uri.node.san.unstructured_name.len = strlen(san_uri_name);
|
san_uri.node.san.unstructured_name.len = strlen(san_uri_name);
|
||||||
san_uri.next = NULL;
|
san_uri.next = &san_ip;
|
||||||
san_ip.node.type = MBEDTLS_X509_SAN_IP_ADDRESS;
|
|
||||||
san_ip.node.san.unstructured_name.p = (unsigned char *) san_ip_name;
|
san_list = &san_uri;
|
||||||
san_ip.node.san.unstructured_name.len = sizeof(san_ip_name);
|
|
||||||
san_ip.next = &san_uri;
|
|
||||||
san_dns.node.type = MBEDTLS_X509_SAN_DNS_NAME;
|
|
||||||
san_dns.node.san.unstructured_name.p = (unsigned char *) san_dns_name;
|
|
||||||
san_dns.node.san.unstructured_name.len = strlen(san_dns_name);
|
|
||||||
san_dns.next = &san_ip;
|
|
||||||
san_list = &san_dns;
|
|
||||||
|
|
||||||
memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
|
memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user