/* * Copyright (C) 2016 Free Software Foundation, Inc. * * Author: Nikos Mavrogiannopoulos, Martin Ukrop * * This file is part of GnuTLS. * * GnuTLS is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * GnuTLS is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with GnuTLS; if not, write to the Free Software Foundation, * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #include #include #include #include #include "../lib/x509/ip.h" typedef struct test_vars_t { gnutls_x509_name_constraints_t nc; gnutls_x509_name_constraints_t nc2; gnutls_datum_t ip; } test_vars_t; /* just declaration: function is exported privately from lib/x509/name_constraints.c (declared in lib/x509/x509_int.h) but including the header breaks includes */ extern int _gnutls_x509_name_constraints_merge( gnutls_x509_name_constraints_t nc, gnutls_x509_name_constraints_t nc2); static void check_for_error(int ret) { if (ret != GNUTLS_E_SUCCESS) fail_msg("error in %d: %s\n", __LINE__, gnutls_strerror(ret)); } #define IP_ACCEPTED 1 #define IP_REJECTED 0 static void check_test_result(int ret, int expected_outcome, gnutls_datum_t *tested_ip) { if (expected_outcome == IP_ACCEPTED ? ret == 0 : ret != 0) { char ip_out[48]; _gnutls_ip_to_string(tested_ip->data, tested_ip->size, ip_out, sizeof(ip_out)); if (expected_outcome == IP_ACCEPTED) { fail_msg("Checking %.*s should have succeeded.\n", (int) sizeof(ip_out), ip_out); } else { fail_msg("Checking %.*s should have failed.\n", (int) sizeof(ip_out), ip_out); } } } static void parse_cidr(const char* cidr, gnutls_datum_t *datum) { if (datum->data != NULL) { gnutls_free(datum->data); } int ret = gnutls_x509_cidr_to_rfc5280(cidr, datum); check_for_error(ret); } static void tls_log_func(int level, const char *str) { fprintf(stderr, "<%d>| %s", level, str); } static unsigned char cert_pem[] = "-----BEGIN CERTIFICATE-----\n" "MIIEMTCCAxmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UEBhMCR1Ix\n" "RDBCBgNVBAoTO0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1\n" "dGlvbnMgQ2VydC4gQXV0aG9yaXR5MUAwPgYDVQQDEzdIZWxsZW5pYyBBY2FkZW1p\n" "YyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIFJvb3RDQSAyMDExMB4XDTExMTIw\n" "NjEzNDk1MloXDTMxMTIwMTEzNDk1MlowgZUxCzAJBgNVBAYTAkdSMUQwQgYDVQQK\n" "EztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIENl\n" "cnQuIEF1dGhvcml0eTFAMD4GA1UEAxM3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl\n" "c2VhcmNoIEluc3RpdHV0aW9ucyBSb290Q0EgMjAxMTCCASIwDQYJKoZIhvcNAQEB\n" "BQADggEPADCCAQoCggEBAKlTAOMupvaO+mDYLZU++CwqVE7NuYRhlFhPjz2L5EPz\n" "dYmNUeTDN9KKiE15HrcS3UN4SoqS5tdI1Q+kOilENbgH9mgdVc04UfCMJDGFr4PJ\n" "fel3r+0ae50X+bOdOFAPplp5kYCvN66m0zH7tSYJnTxa71HFK9+WXesyHgLacEns\n" "bgzImjeN9/E2YEsmLIKe0HjzDQ9jpFEw4fkrJxIH2Oq9GGKYsFk3fb7u8yBRQlqD\n" "75O6aRXxYp2fmTmCobd0LovUxQt7L/DICto9eQqakxylKHJzkUOap9FNhYS5qXSP\n" "FEDH3N6sQWRstBmbAmNtJGSPRLIl6s5ddAxjMlyNh+UCAwEAAaOBiTCBhjAPBgNV\n" "HRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUppFC/RNhSiOeCKQp\n" "5dgTBCPuQSUwRwYDVR0eBEAwPqA8MAWCAy5ncjAFggMuZXUwBoIELmVkdTAGggQu\n" "b3JnMAWBAy5ncjAFgQMuZXUwBoEELmVkdTAGgQQub3JnMA0GCSqGSIb3DQEBBQUA\n" "A4IBAQAf73lB4XtuP7KMhjdCSk4cNx6NZrokgclPEg8hwAOXhiVtXdMiKahsog2p\n" "6z0GW5k6x8zDmjR/qw7IThzh+uTczQ2+vyT+bOdrwg3IBp5OjWEopmr95fZi6hg8\n" "TqBTnbI6nOulnJEWtk2C4AwFSKls9cz4y51JtPACpf1wA+2KIaWuE4ZJwzNzvoc7\n" "dIsXRSZMFpGD/md9zU1jZ/rzAxKWeAaNsWftjj++n08C9bMJL/NMh98qy5V8Acys\n" "Nnq/onN694/BtZqhFLKPM58N7yLcZnuEvUUXBj08yrl3NI/K6s8/MT7jiOOASSXI\n" "l7WdmplNsDz4SgCbZN2fOUvRJ9e4\n" "-----END CERTIFICATE-----\n"; const gnutls_datum_t cert = { cert_pem, sizeof(cert_pem) }; // CIDRs mostly use prefix for documentation purposes (RFC5737, RFC3849) static void check_generation_reading_basic_checking(void **glob_state) { int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); unsigned int i, num_permitted, num_excluded, type; gnutls_x509_crt_t crt; gnutls_datum_t name; gnutls_global_set_log_function(tls_log_func); gnutls_global_set_log_level(2); /* 1: test the generation of name constraints */ ret = gnutls_x509_crt_init(&crt); check_for_error(ret); ret = gnutls_x509_crt_import(crt, &cert, GNUTLS_X509_FMT_PEM); check_for_error(ret); num_permitted = num_excluded = 0; parse_cidr("203.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); num_permitted++; check_for_error(ret); parse_cidr("2001:DB8::/32", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); num_permitted++; check_for_error(ret); parse_cidr("203.0.113.0/26", ip); ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip); num_excluded++; check_for_error(ret); parse_cidr("2001:DB8::/34", ip); ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip); num_excluded++; check_for_error(ret); // Try to add invalid name constraints parse_cidr("2001:DB8::/34", ip); ip->data[30] = 2; ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip); if (ret == 0) fail_msg("Checking invalid network mask should have failed."); parse_cidr("2001:DB8::/34", ip); ip->size = 31; ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); if (ret == 0) fail_msg("Checking invalid IP size should have failed."); ret = gnutls_x509_crt_set_name_constraints(crt, nc, 1); check_for_error(ret); /* 2: test the reading of the generated constraints */ i = 0; do { ret = gnutls_x509_name_constraints_get_permitted(nc, i++, &type, &name); #ifdef DEBUG _gnutls_cidr_to_string(name.data, name.size, ip_out, sizeof(ip_out)); printf("Loaded name constraint: %s\n",ip_out); #endif } while(ret == 0); if (i-1 != num_permitted) { fail_msg("Could not read all constraints; read %d, expected %d\n", i-1, num_permitted); } i = 0; do { ret = gnutls_x509_name_constraints_get_excluded(nc, i++, &type, &name); #ifdef DEBUG _gnutls_cidr_to_string(name.data, name.size, ip_out, sizeof(ip_out)); printf("Loaded name constraint: %s\n",ip_out); #endif } while(ret == 0); if (i-1 != num_excluded) { fail_msg("Could not read all excluded constraints; read %d, expected %d\n", i-1, num_excluded); } /* 3: test the name constraints check function */ parse_cidr("203.0.113.250/32", ip); ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("203.0.114.0/32", ip); ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("203.0.113.10/32", ip); ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("2001:DB8:4000::/128", ip); ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("2001:DB9::/128", ip); ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("2001:DB8:10::/128", ip); ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); gnutls_x509_crt_deinit(crt); } static void check_universal_constraint_checking(void **glob_state) { /* 3b setting universal constraint */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("2001:DB8::/0", ip); ret = gnutls_x509_name_constraints_add_excluded(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("2001:DB8:10::/128", ip); ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("::/128", ip); ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_simple_intersection(void **glob_state) { /* 4: simple intersection * --------P:203.0.113.0/24-------- * --P:203.0.113.0/26-- * A B C */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("203.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("203.0.113.0/26", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("203.0.113.2/32", ip); // A ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("203.0.113.250/32", ip); // B ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("203.0.114.0/32", ip); // C ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_empty_intersection(void **glob_state) { /* 5: empty intersection * --P:127.0.113.0/24-- * --P:255.0.113.0/24-- * A B C */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("127.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("255.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("127.0.113.2/32", ip); // A ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.0.2/32", ip); // B ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.113.2/32", ip); // C ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_mediocre_intersection(void **glob_state) { /* 6: mediocre intersection * --------P:127.0.113.0/24-------- * --P:127.0.113.0/26-- --P:255.0.113.0/24-- * A B C D */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("127.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("127.0.113.0/26", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("255.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("127.0.113.2/32", ip); // A ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("127.0.113.250/32", ip); // B ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.0.2/32", ip); // C ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.113.2/32", ip); // D ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_difficult_intersection(void **glob_state) { /* 7: difficult intersection * --------P:0.0.0.0/3--------------- --P:88.0.0.0/5-- * --P:0.0.0.0/5-- --P:16.0.0.0/5-- ----P:64.0.0.0/3---- * A B C D E F G H */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("0.0.0.0/3", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("88.0.0.0/5", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("0.0.0.0/5", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("16.0.0.0/5", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("64.0.0.0/3", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("0.0.113.2/32", ip); // A ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("15.255.255.255/32", ip); // B ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("16.0.0.0/32", ip); // C ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("31.12.25.2/32", ip); // D ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("63.255.255.255/32", ip); // E ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("64.0.0.0/32", ip); // F ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("89.125.7.187/32", ip); // G ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("96.0.0.0/32", ip); // H ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_ipv6_intersection(void **glob_state) { /* 8: IPv6 intersection * --------P:affb::/16----- --P:affd:0000::/20-- * --P:affb:aa00::/24-- * A B C D E F G */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("affb::/16", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("affd:0000::/20", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("affb:aa00::/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("affa:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128", ip); // A ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("affb:a500::/128", ip); // B ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("affb:aa00::/128", ip); // C ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_ACCEPTED, ip); parse_cidr("affb:ab01::/128", ip); // D ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("affc::/128", ip); // E ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("affd:0fff::/128", ip); // F ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("affd:1000::/128", ip); // G ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_empty_ipv4_intersection_ipv6_remains(void **glob_state) { /* 9: IPv4 and IPv6 in a common test case * IPv4 with empty intersection, but IPv6 gets restricted as well * --P:127.0.113.0/24-- * --P:255.0.113.0/24-- * A B C * * --P:bfa6::/16-- * D E */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("127.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("bfa6::/16", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("255.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("127.0.113.2/32", ip); // A ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.0.2/32", ip); // B ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.113.2/32", ip); // C ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("bfa6:ab01::/128", ip); // D ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("bfa7::/128", ip); // E ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_empty_ipv4v6_intersections(void **glob_state) { /* 10: IPv4 and IPv6 in a common test case * both IPv4 and IPv6 have empty intersection * --P:127.0.113.0/24-- * --P:255.0.113.0/24-- * A B C * * --P:bfa6::/16-- * --P:cfa6::/16-- * D E F */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("127.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("bfa6::/16", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("255.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("cfa6::/16", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("127.0.113.2/32", ip); // A ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.0.2/32", ip); // B ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.113.2/32", ip); // C ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("bfa6:ab01::/128", ip); // D ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("bfa7::/128", ip); // E ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("cfa7:00cc::/128", ip); // F ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static void check_ipv4v6_single_constraint_each(void **glob_state) { /* 11: 1 IPv4 range and 1 IPv6 range in a common test case * (no overlap) * --P:127.0.113.0/24-- * A B * * --P:bfa6::/16-- * C D */ int ret; gnutls_x509_name_constraints_t nc = ((test_vars_t*)*glob_state)->nc; gnutls_x509_name_constraints_t nc2 = ((test_vars_t*)*glob_state)->nc2; gnutls_datum_t *ip = &(((test_vars_t*)*glob_state)->ip); parse_cidr("127.0.113.0/24", ip); ret = gnutls_x509_name_constraints_add_permitted(nc, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); parse_cidr("bfa6::/16", ip); ret = gnutls_x509_name_constraints_add_permitted(nc2, GNUTLS_SAN_IPADDRESS, ip); check_for_error(ret); ret = _gnutls_x509_name_constraints_merge(nc, nc2); check_for_error(ret); parse_cidr("127.0.113.2/32", ip); // A ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("255.0.0.2/32", ip); // B ip->size = 4; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("bfa6:ab01::/128", ip); // C ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); parse_cidr("bfa7::/128", ip); // D ip->size = 16; // strip network mask ret = gnutls_x509_name_constraints_check(nc, GNUTLS_SAN_IPADDRESS, ip); check_test_result(ret, IP_REJECTED, ip); } static int setup(void **state) { test_vars_t* test_vars = gnutls_malloc(sizeof(test_vars_t)); if (test_vars == NULL) return -1; test_vars->ip.size = 0; test_vars->ip.data = NULL; int ret; ret = gnutls_x509_name_constraints_init(&(test_vars->nc)); check_for_error(ret); ret = gnutls_x509_name_constraints_init(&(test_vars->nc2)); check_for_error(ret); *state = test_vars; return 0; } static int teardown(void **state) { test_vars_t* test_vars = *state; gnutls_free(test_vars->ip.data); gnutls_x509_name_constraints_deinit(test_vars->nc); gnutls_x509_name_constraints_deinit(test_vars->nc2); gnutls_free(*state); return 0; } int main(int argc, char **argv) { const struct CMUnitTest tests[] = { cmocka_unit_test_setup_teardown(check_generation_reading_basic_checking, setup, teardown), cmocka_unit_test_setup_teardown(check_universal_constraint_checking, setup, teardown), cmocka_unit_test_setup_teardown(check_simple_intersection, setup, teardown), cmocka_unit_test_setup_teardown(check_empty_intersection, setup, teardown), cmocka_unit_test_setup_teardown(check_mediocre_intersection, setup, teardown), cmocka_unit_test_setup_teardown(check_difficult_intersection, setup, teardown), cmocka_unit_test_setup_teardown(check_ipv6_intersection, setup, teardown), cmocka_unit_test_setup_teardown(check_empty_ipv4_intersection_ipv6_remains, setup, teardown), cmocka_unit_test_setup_teardown(check_empty_ipv4v6_intersections, setup, teardown), cmocka_unit_test_setup_teardown(check_ipv4v6_single_constraint_each, setup, teardown) }; cmocka_run_group_tests(tests, NULL, NULL); }