Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

Revision f6b2ab0ba4fede20d7fdc81a0b281d3470a4d6e9 authored by Jonathan M. Wilbur on 21 August 2024, 02:25:03 UTC, committed by Tomas Mraz on 10 September 2024, 17:17:34 UTC
test: authorityAttributeIdentifier X.509v3 extension
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25244)
1 parent 221e8fa
  • Files
  • Changes
  • 0b326f3
  • /
  • test
  • /
  • x509_req_test.c
Raw File
Cook and download a directory from the Software Heritage Vault

You have requested the cooking of the directory with identifier None into a standard tar.gz archive.

Are you sure you want to continue ?

Download a directory from the Software Heritage Vault

You have requested the download of the directory with identifier None as a standard tar.gz archive.

Are you sure you want to continue ?

Cook and download a revision from the Software Heritage Vault

You have requested the cooking of the history heading to revision with identifier swh:1:rev:f6b2ab0ba4fede20d7fdc81a0b281d3470a4d6e9 into a bare git archive.

Are you sure you want to continue ?

Download a revision from the Software Heritage Vault

You have requested the download of the history heading to revision with identifier swh:1:rev:f6b2ab0ba4fede20d7fdc81a0b281d3470a4d6e9 as a bare git archive.

Are you sure you want to continue ?

Invalid Email !

The provided email is not well-formed.

Download link has expired

The requested archive is no longer available for download from the Software Heritage Vault.

Do you want to cook it again ?

Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • revision
  • content
revision badge
swh:1:rev:f6b2ab0ba4fede20d7fdc81a0b281d3470a4d6e9
content badge Iframe embedding
swh:1:cnt:b37fd0599adab42092ec93bc98d322f8f8fbcf8f
x509_req_test.c
/*
 * Copyright 2024 The OpenSSL Project Authors. All Rights Reserved.
 *
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
 */

#include <openssl/pem.h>
#include <openssl/x509.h>

#include "testutil.h"

static char *certsDir = NULL;

/*
 * Test for the missing X509 version check discussed in issue #5738 and
 * added in PR #24677.
 * This test tries to verify a malformed CSR with the X509 version set
 * version 6, instead of 1. As this request is malformed, even its
 * signature is valid, the verification must fail.
 */
static int test_x509_req_detect_invalid_version(void)
{
    char *certFilePath;
    BIO *bio = NULL;
    EVP_PKEY *pkey = NULL;
    X509_REQ *req = NULL;
    int ret = 0;

    certFilePath = test_mk_file_path(certsDir, "x509-req-detect-invalid-version.pem");
    if (certFilePath == NULL)
        goto err;
    if (!TEST_ptr(bio = BIO_new_file(certFilePath, "r")))
        goto err;
    req = PEM_read_bio_X509_REQ(bio, NULL, 0, NULL);
    if (req == NULL) {
        ret = 1; /* success, reading PEM with invalid CSR data is allowed to fail. */
        goto err;
    }
    if (!TEST_ptr(pkey = X509_REQ_get_pubkey(req)))
        goto err;
    /* Verification MUST fail at this point. ret != 1. */
    if (!TEST_int_ne(X509_REQ_verify(req, pkey), 1))
        goto err;
    ret = 1; /* success */
err:
    EVP_PKEY_free(pkey);
    X509_REQ_free(req);
    BIO_free(bio);
    OPENSSL_free(certFilePath);
    return ret;
}

OPT_TEST_DECLARE_USAGE("certdir\n")

int setup_tests(void)
{
    if (!test_skip_common_options()) {
        TEST_error("Error parsing test options\n");
        return 0;
    }
    if (!TEST_ptr(certsDir = test_get_argument(0)))
        return 0;

    ADD_TEST(test_x509_req_detect_invalid_version);
    return 1;
}

void cleanup_tests(void)
{
}
The diff you're trying to view is too large. Only the first 1000 changed files have been loaded.
Showing with 0 additions and 0 deletions (0 / 0 diffs computed)
swh spinner

Computing file changes ...

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top