Merge pull request #7436 from AndrzejKurek/x509-verify-san-ip

x509 SAN IP parsing
This commit is contained in:
Gilles Peskine 2023-04-21 22:00:58 +02:00 committed by GitHub
commit 935a987b2b
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 431 additions and 25 deletions

View file

@ -0,0 +1,2 @@
Features
* X.509 hostname verification now supports IPAddress Subject Alternate Names.

View file

@ -638,7 +638,7 @@ int mbedtls_x509_crt_verify_info(char *buf, size_t size, const char *prefix,
* \param cn The expected Common Name. This will be checked to be * \param cn The expected Common Name. This will be checked to be
* present in the certificate's subjectAltNames extension or, * present in the certificate's subjectAltNames extension or,
* if this extension is absent, as a CN component in its * if this extension is absent, as a CN component in its
* Subject name. Currently only DNS names are supported. This * Subject name. DNS names and IP addresses are supported. This
* may be \c NULL if the CN need not be verified. * may be \c NULL if the CN need not be verified.
* \param flags The address at which to store the result of the verification. * \param flags The address at which to store the result of the verification.
* If the verification couldn't be completed, the flag value is * If the verification couldn't be completed, the flag value is

View file

@ -49,6 +49,7 @@
#include "mbedtls/psa_util.h" #include "mbedtls/psa_util.h"
#endif /* MBEDTLS_USE_PSA_CRYPTO */ #endif /* MBEDTLS_USE_PSA_CRYPTO */
#include "hash_info.h" #include "hash_info.h"
#include "x509_invasive.h"
#include "mbedtls/platform.h" #include "mbedtls/platform.h"
@ -58,6 +59,10 @@
#if defined(MBEDTLS_HAVE_TIME) #if defined(MBEDTLS_HAVE_TIME)
#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) #if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
#define WIN32_LEAN_AND_MEAN
#ifndef _WIN32_WINNT
#define _WIN32_WINNT 0x0600
#endif
#include <windows.h> #include <windows.h>
#else #else
#include <time.h> #include <time.h>
@ -2524,6 +2529,194 @@ find_parent:
} }
} }
#ifdef _WIN32
#ifdef _MSC_VER
#pragma comment(lib, "ws2_32.lib")
#include <winsock2.h>
#include <ws2tcpip.h>
#elif (defined(__MINGW32__) || defined(__MINGW64__)) && _WIN32_WINNT >= 0x0600
#include <winsock2.h>
#include <ws2tcpip.h>
#endif
#elif defined(__sun)
/* Solaris requires -lsocket -lnsl for inet_pton() */
#elif defined(__has_include)
#if __has_include(<sys/socket.h>)
#include <sys/socket.h>
#endif
#if __has_include(<arpa/inet.h>)
#include <arpa/inet.h>
#endif
#endif
/* Use whether or not AF_INET6 is defined to indicate whether or not to use
* the platform inet_pton() or a local implementation (below). The local
* implementation may be used even in cases where the platform provides
* inet_pton(), e.g. when there are different includes required and/or the
* platform implementation requires dependencies on additional libraries.
* Specifically, Windows requires custom includes and additional link
* dependencies, and Solaris requires additional link dependencies.
* Also, as a coarse heuristic, use the local implementation if the compiler
* does not support __has_include(), or if the definition of AF_INET6 is not
* provided by headers included (or not) via __has_include() above.
* MBEDTLS_TEST_SW_INET_PTON is a bypass define to force testing of this code //no-check-names
* despite having a platform that has inet_pton. */
#if !defined(AF_INET6) || defined(MBEDTLS_TEST_SW_INET_PTON) //no-check-names
/* Definition located further below to possibly reduce compiler inlining */
static int x509_inet_pton_ipv4(const char *src, void *dst);
#define li_cton(c, n) \
(((n) = (c) - '0') <= 9 || (((n) = ((c)&0xdf) - 'A') <= 5 ? ((n) += 10) : 0))
static int x509_inet_pton_ipv6(const char *src, void *dst)
{
const unsigned char *p = (const unsigned char *) src;
int nonzero_groups = 0, num_digits, zero_group_start = -1;
uint16_t addr[8];
do {
/* note: allows excess leading 0's, e.g. 1:0002:3:... */
uint16_t group = num_digits = 0;
for (uint8_t digit; num_digits < 4; num_digits++) {
if (li_cton(*p, digit) == 0) {
break;
}
group = (group << 4) | digit;
p++;
}
if (num_digits != 0) {
addr[nonzero_groups++] = MBEDTLS_IS_BIG_ENDIAN ? group :
(group << 8) | (group >> 8);
if (*p == '\0') {
break;
} else if (*p == '.') {
/* Don't accept IPv4 too early or late */
if ((nonzero_groups == 0 && zero_group_start == -1) ||
nonzero_groups >= 7) {
break;
}
/* Walk back to prior ':', then parse as IPv4-mapped */
int steps = 4;
do {
p--;
steps--;
} while (*p != ':' && steps > 0);
if (*p != ':') {
break;
}
p++;
nonzero_groups--;
if (x509_inet_pton_ipv4((const char *) p,
addr + nonzero_groups) != 0) {
break;
}
nonzero_groups += 2;
p = (const unsigned char *) "";
break;
} else if (*p != ':') {
return -1;
}
} else {
/* Don't accept a second zero group or an invalid delimiter */
if (zero_group_start != -1 || *p != ':') {
return -1;
}
zero_group_start = nonzero_groups;
/* Accept a zero group at start, but it has to be a double colon */
if (zero_group_start == 0 && *++p != ':') {
return -1;
}
if (p[1] == '\0') {
++p;
break;
}
}
++p;
} while (nonzero_groups < 8);
if (*p != '\0') {
return -1;
}
if (zero_group_start != -1) {
if (nonzero_groups > 6) {
return -1;
}
int zero_groups = 8 - nonzero_groups;
int groups_after_zero = nonzero_groups - zero_group_start;
/* Move the non-zero part to after the zeroes */
if (groups_after_zero) {
memmove(addr + zero_group_start + zero_groups,
addr + zero_group_start,
groups_after_zero * sizeof(*addr));
}
memset(addr + zero_group_start, 0, zero_groups * sizeof(*addr));
} else {
if (nonzero_groups != 8) {
return -1;
}
}
memcpy(dst, addr, sizeof(addr));
return 0;
}
static int x509_inet_pton_ipv4(const char *src, void *dst)
{
/* note: allows leading 0's, e.g. 000.000.000.000 */
const unsigned char *p = (const unsigned char *) src;
uint8_t *res = (uint8_t *) dst;
uint8_t digit, num_digits = 0;
uint8_t num_octets = 0;
uint16_t octet;
do {
octet = num_digits = 0;
do {
digit = *p - '0';
if (digit > 9) {
break;
}
octet = octet * 10 + digit;
num_digits++;
p++;
} while (num_digits < 3);
if (octet >= 256 || num_digits > 3 || num_digits == 0) {
break;
}
*res++ = (uint8_t) octet;
num_octets++;
} while (num_octets < 4 && *p++ == '.');
return num_octets == 4 && *p == '\0' ? 0 : -1;
}
#else
static int x509_inet_pton_ipv6(const char *src, void *dst)
{
return inet_pton(AF_INET6, src, dst) == 1 ? 0 : -1;
}
static int x509_inet_pton_ipv4(const char *src, void *dst)
{
return inet_pton(AF_INET, src, dst) == 1 ? 0 : -1;
}
#endif /* !AF_INET6 || MBEDTLS_TEST_SW_INET_PTON */ //no-check-names
MBEDTLS_STATIC_TESTABLE
size_t mbedtls_x509_crt_parse_cn_inet_pton(const char *cn, void *dst)
{
return strchr(cn, ':') == NULL
? x509_inet_pton_ipv4(cn, dst) == 0 ? 4 : 0
: x509_inet_pton_ipv6(cn, dst) == 0 ? 16 : 0;
}
/* /*
* Check for CN match * Check for CN match
*/ */
@ -2544,24 +2737,51 @@ static int x509_crt_check_cn(const mbedtls_x509_buf *name,
return -1; return -1;
} }
static int x509_crt_check_san_ip(const mbedtls_x509_sequence *san,
const char *cn, size_t cn_len)
{
uint32_t ip[4];
cn_len = mbedtls_x509_crt_parse_cn_inet_pton(cn, ip);
if (cn_len == 0) {
return -1;
}
for (const mbedtls_x509_sequence *cur = san; cur != NULL; cur = cur->next) {
const unsigned char san_type = (unsigned char) cur->buf.tag &
MBEDTLS_ASN1_TAG_VALUE_MASK;
if (san_type == MBEDTLS_X509_SAN_IP_ADDRESS &&
cur->buf.len == cn_len && memcmp(cur->buf.p, ip, cn_len) == 0) {
return 0;
}
}
return -1;
}
/* /*
* Check for SAN match, see RFC 5280 Section 4.2.1.6 * Check for SAN match, see RFC 5280 Section 4.2.1.6
*/ */
static int x509_crt_check_san(const mbedtls_x509_buf *name, static int x509_crt_check_san(const mbedtls_x509_sequence *san,
const char *cn, size_t cn_len) const char *cn, size_t cn_len)
{ {
const unsigned char san_type = (unsigned char) name->tag & int san_ip = 0;
MBEDTLS_ASN1_TAG_VALUE_MASK; for (const mbedtls_x509_sequence *cur = san; cur != NULL; cur = cur->next) {
switch ((unsigned char) cur->buf.tag & MBEDTLS_ASN1_TAG_VALUE_MASK) {
/* dNSName */ case MBEDTLS_X509_SAN_DNS_NAME: /* dNSName */
if (san_type == MBEDTLS_X509_SAN_DNS_NAME) { if (x509_crt_check_cn(&cur->buf, cn, cn_len) == 0) {
return x509_crt_check_cn(name, cn, cn_len); return 0;
}
break;
case MBEDTLS_X509_SAN_IP_ADDRESS: /* iPAddress */
san_ip = 1;
break;
/* (We may handle other types here later.) */
default: /* Unrecognized type */
break;
}
} }
/* (We may handle other types here later.) */ return san_ip ? x509_crt_check_san_ip(san, cn, cn_len) : -1;
/* Unrecognized type */
return -1;
} }
/* /*
@ -2572,31 +2792,23 @@ static void x509_crt_verify_name(const mbedtls_x509_crt *crt,
uint32_t *flags) uint32_t *flags)
{ {
const mbedtls_x509_name *name; const mbedtls_x509_name *name;
const mbedtls_x509_sequence *cur;
size_t cn_len = strlen(cn); size_t cn_len = strlen(cn);
if (crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME) { if (crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME) {
for (cur = &crt->subject_alt_names; cur != NULL; cur = cur->next) { if (x509_crt_check_san(&crt->subject_alt_names, cn, cn_len) == 0) {
if (x509_crt_check_san(&cur->buf, cn, cn_len) == 0) { return;
break;
}
}
if (cur == NULL) {
*flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH;
} }
} else { } else {
for (name = &crt->subject; name != NULL; name = name->next) { for (name = &crt->subject; name != NULL; name = name->next) {
if (MBEDTLS_OID_CMP(MBEDTLS_OID_AT_CN, &name->oid) == 0 && if (MBEDTLS_OID_CMP(MBEDTLS_OID_AT_CN, &name->oid) == 0 &&
x509_crt_check_cn(&name->val, cn, cn_len) == 0) { x509_crt_check_cn(&name->val, cn, cn_len) == 0) {
break; return;
} }
} }
if (name == NULL) {
*flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH;
}
} }
*flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH;
} }
/* /*

53
library/x509_invasive.h Normal file
View file

@ -0,0 +1,53 @@
/**
* \file x509_invasive.h
*
* \brief x509 module: interfaces for invasive testing only.
*
* The interfaces in this file are intended for testing purposes only.
* They SHOULD NOT be made available in library integrations except when
* building the library for testing.
*/
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef MBEDTLS_X509_INVASIVE_H
#define MBEDTLS_X509_INVASIVE_H
#include "common.h"
#if defined(MBEDTLS_TEST_HOOKS)
/**
* \brief This function parses a CN string as an IP address.
*
* \param cn The CN string to parse. CN string MUST be NUL-terminated.
* \param dst The target buffer to populate with the binary IP address.
* The buffer MUST be 16 bytes to save IPv6, and should be
* 4-byte aligned if the result will be used as struct in_addr.
* e.g. uint32_t dst[4]
*
* \note \cn is parsed as an IPv6 address if string contains ':',
* else \cn is parsed as an IPv4 address.
*
* \return Length of binary IP address; num bytes written to target.
* \return \c 0 on failure to parse CN string as an IP address.
*/
size_t mbedtls_x509_crt_parse_cn_inet_pton(const char *cn, void *dst);
#endif /* MBEDTLS_TEST_HOOKS */
#endif /* MBEDTLS_X509_INVASIVE_H */

View file

@ -1219,6 +1219,17 @@ component_test_psa_external_rng_no_drbg_use_psa () {
tests/ssl-opt.sh -f 'Default\|opaque' tests/ssl-opt.sh -f 'Default\|opaque'
} }
component_test_sw_inet_pton () {
msg "build: default plus MBEDTLS_TEST_SW_INET_PTON"
# MBEDTLS_TEST_HOOKS required for x509_crt_parse_cn_inet_pton
scripts/config.py set MBEDTLS_TEST_HOOKS
make CFLAGS="-DMBEDTLS_TEST_SW_INET_PTON"
msg "test: default plus MBEDTLS_TEST_SW_INET_PTON"
make test
}
component_test_crypto_full_md_light_only () { component_test_crypto_full_md_light_only () {
msg "build: crypto_full with only the light subset of MD" msg "build: crypto_full with only the light subset of MD"
scripts/config.py crypto_full scripts/config.py crypto_full

View file

@ -1023,6 +1023,119 @@ X509 CRT verification: domain identical to IPv6 in SubjectAltName
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C
x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"abcd.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"":"NULL" x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"abcd.example.com":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"":"NULL"
X509 CRT verification: matching IPv4 in SubjectAltName
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_SOME:MBEDTLS_MD_CAN_SHA256:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C
x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"97.98.99.100":0:0:"":"NULL"
X509 CRT verification: mismatching IPv4 in SubjectAltName
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_SOME:MBEDTLS_MD_CAN_SHA256:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C
x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"7.8.9.10":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"":"NULL"
X509 CRT verification: IPv4 with trailing data in SubjectAltName
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_SOME:MBEDTLS_MD_CAN_SHA256:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C
x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"97.98.99.100?":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"":"NULL"
X509 CRT verification: matching IPv6 in SubjectAltName
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_SOME:MBEDTLS_MD_CAN_SHA256:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C
x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"6162\:6364\:2E65\:7861\:6D70\:6C65\:2E63\:6F6D":0:0:"":"NULL"
X509 CRT verification: mismatching IPv6 in SubjectAltName
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_SOME:MBEDTLS_MD_CAN_SHA256:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_RSA_C
x509_verify:"data_files/server5-tricky-ip-san.crt":"data_files/server5-tricky-ip-san.crt":"data_files/crl_sha256.pem":"6162\:6364\:\:6F6D":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_CN_MISMATCH:"":"NULL"
X509 CRT parse CN: IPv4 valid address
x509_crt_parse_cn_inet_pton:"10.10.10.10":"0A0A0A0A":4
X509 CRT parse CN: IPv4 excess 0s
x509_crt_parse_cn_inet_pton:"10.0000.10.10":"":0
X509 CRT parse CN: IPv4 short address
x509_crt_parse_cn_inet_pton:"10.10.10":"":0
X509 CRT parse CN: IPv4 invalid ? char
x509_crt_parse_cn_inet_pton:"10.10?10.10":"":0
X509 CRT parse CN: IPv4 invalid - char
x509_crt_parse_cn_inet_pton:"10.-10.10.10":"":0
X509 CRT parse CN: IPv4 invalid + char
x509_crt_parse_cn_inet_pton:"10.+10.10.10":"":0
X509 CRT parse CN: IPv4 begin dot
x509_crt_parse_cn_inet_pton:".10.10.10.10":"":0
X509 CRT parse CN: IPv4 end dot
x509_crt_parse_cn_inet_pton:"10.10.10.10.":"":0
X509 CRT parse CN: IPv4 consecutive dots
x509_crt_parse_cn_inet_pton:"10.10..10.10.":"":0
X509 CRT parse CN: IPv4 overlarge octet 256
x509_crt_parse_cn_inet_pton:"10.256.10.10":"":0
X509 CRT parse CN: IPv4 overlarge octet 999
x509_crt_parse_cn_inet_pton:"10.10.10.999":"":0
X509 CRT parse CN: IPv4 overlarge octet 1000
x509_crt_parse_cn_inet_pton:"10.1000.10.10":"":0
X509 CRT parse CN: IPv4 additional octet
x509_crt_parse_cn_inet_pton:"10.10.10.10.10":"":0
X509 CRT parse CN: IPv6 valid address
x509_crt_parse_cn_inet_pton:"1\:2\:3\:4\:5\:6\:7\:8":"00010002000300040005000600070008":16
X509 CRT parse CN: IPv6 valid address shorthand
x509_crt_parse_cn_inet_pton:"6263\:\:1":"62630000000000000000000000000001":16
X509 CRT parse CN: IPv6 valid address shorthand start
x509_crt_parse_cn_inet_pton:"\:\:1":"00000000000000000000000000000001":16
X509 CRT parse CN: IPv6 valid address extra 0s
x509_crt_parse_cn_inet_pton:"0001\:\:0001\:0001":"00010000000000000000000000010001":16
X509 CRT parse CN: IPv6 invalid address excess 0s
x509_crt_parse_cn_inet_pton:"1\:00000\:1\:0":"":0
X509 CRT parse CN: IPv6 invalid address - start single colon
x509_crt_parse_cn_inet_pton:"\:6263\:\:1":"":0
X509 CRT parse CN: IPv6 invalid address - end single colon
x509_crt_parse_cn_inet_pton:"6263\:\:1\:":"":0
X509 CRT parse CN: IPv6 short address
x509_crt_parse_cn_inet_pton:"1\:1\:1":"":0
X509 CRT parse CN: IPv6 wildcard address
x509_crt_parse_cn_inet_pton:"\:\:":"00000000000000000000000000000000":16
X509 CRT parse CN: IPv6 address too long
x509_crt_parse_cn_inet_pton:"1\:2\:3\:4\:5\:6\:7\:8\:9":"":0
X509 CRT parse CN: IPv6 long hextet
x509_crt_parse_cn_inet_pton:"12345\:\:1":"":0
X509 CRT parse CN: IPv6 invalid char
x509_crt_parse_cn_inet_pton:"\:\:\:1":"":0
X509 CRT parse CN: IPv6 invalid - char
x509_crt_parse_cn_inet_pton:"\:\:-1\:1":"":0
X509 CRT parse CN: IPv6 invalid + char
x509_crt_parse_cn_inet_pton:"\:\:+1\:1":"":0
X509 CRT parse CN: IPv6 valid address IPv4-mapped
x509_crt_parse_cn_inet_pton:"\:\:ffff\:1.2.3.4":"00000000000000000000ffff01020304":16
X509 CRT parse CN: IPv6 invalid address IPv4-mapped #1
x509_crt_parse_cn_inet_pton:"\:\:ffff\:999.2.3.4":"":0
X509 CRT parse CN: IPv6 invalid address IPv4-mapped #2
x509_crt_parse_cn_inet_pton:"\:\:ffff\:1111.2.3.4":"":0
X509 CRT parse CN: IPv6 invalid address IPv4-mapped #3
x509_crt_parse_cn_inet_pton:"\:\:1.2.3.4\:ffff":"":0
X509 CRT verification with ca callback: failure X509 CRT verification with ca callback: failure
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_MD_CAN_SHA1:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK
x509_verify_ca_cb_failure:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":MBEDTLS_ERR_X509_FATAL_ERROR x509_verify_ca_cb_failure:"data_files/server1.crt":"data_files/test-ca.crt":"NULL":MBEDTLS_ERR_X509_FATAL_ERROR

View file

@ -11,6 +11,8 @@
#include "mbedtls/pk.h" #include "mbedtls/pk.h"
#include "string.h" #include "string.h"
#include "x509_invasive.h"
#if MBEDTLS_X509_MAX_INTERMEDIATE_CA > 19 #if MBEDTLS_X509_MAX_INTERMEDIATE_CA > 19
#error "The value of MBEDTLS_X509_MAX_INTERMEDIATE_C is larger \ #error "The value of MBEDTLS_X509_MAX_INTERMEDIATE_C is larger \
than the current threshold 19. To test larger values, please \ than the current threshold 19. To test larger values, please \
@ -436,6 +438,19 @@ void x509_accessor_ext_types(int ext_type, int has_ext_type)
} }
/* END_CASE */ /* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_X509_CRT_PARSE_C:MBEDTLS_TEST_HOOKS */
void x509_crt_parse_cn_inet_pton(const char *cn, data_t *exp, int ref_ret)
{
uint32_t addr[4];
size_t addrlen = mbedtls_x509_crt_parse_cn_inet_pton(cn, addr);
TEST_EQUAL(addrlen, (size_t) ref_ret);
if (addrlen) {
ASSERT_COMPARE(exp->x, exp->len, addr, addrlen);
}
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_FS_IO:MBEDTLS_X509_CRT_PARSE_C */ /* BEGIN_CASE depends_on:MBEDTLS_FS_IO:MBEDTLS_X509_CRT_PARSE_C */
void x509_parse_san(char *crt_file, char *result_str, int parse_result) void x509_parse_san(char *crt_file, char *result_str, int parse_result)
{ {