summaryrefslogtreecommitdiff
path: root/src/regress/lib
diff options
context:
space:
mode:
authorbeck <>2023-04-28 16:50:16 +0000
committerbeck <>2023-04-28 16:50:16 +0000
commit894a54df05aae48b1ccfb4d0acd6170e67c7bd80 (patch)
treec1ffb128d53575a3341638cccf75fcf2d6427d05 /src/regress/lib
parent1ce60b4afbf4cde527424c04352d010e0bafb51b (diff)
downloadopenbsd-894a54df05aae48b1ccfb4d0acd6170e67c7bd80.tar.gz
openbsd-894a54df05aae48b1ccfb4d0acd6170e67c7bd80.tar.bz2
openbsd-894a54df05aae48b1ccfb4d0acd6170e67c7bd80.zip
Enable policy checking by default now that we are DAG implementation based.
This ensures that we will no longer silently ignore a certificate with a critical policy extention by default. ok tb@
Diffstat (limited to 'src/regress/lib')
-rw-r--r--src/regress/lib/libcrypto/x509/policy/policy.c13
1 files changed, 12 insertions, 1 deletions
diff --git a/src/regress/lib/libcrypto/x509/policy/policy.c b/src/regress/lib/libcrypto/x509/policy/policy.c
index 289f96db78..70f60af0a3 100644
--- a/src/regress/lib/libcrypto/x509/policy/policy.c
+++ b/src/regress/lib/libcrypto/x509/policy/policy.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: policy.c,v 1.9 2023/04/28 14:45:51 tb Exp $ */ 1/* $OpenBSD: policy.c,v 1.10 2023/04/28 16:50:16 beck Exp $ */
2/* 2/*
3 * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2020 Joel Sing <jsing@openbsd.org>
4 * Copyright (c) 2020-2023 Bob Beck <beck@openbsd.org> 4 * Copyright (c) 2020-2023 Bob Beck <beck@openbsd.org>
@@ -328,6 +328,17 @@ struct verify_cert_test verify_cert_tests[] = {
328 .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION, 328 .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION,
329 .want_legacy_error_depth = 0, 329 .want_legacy_error_depth = 0,
330 }, 330 },
331 {
332 .id = "invalid leaf without explicit policy",
333 .root_file = CERTSDIR "/" "policy_root.pem",
334 .intermediate_file = CERTSDIR "/" "policy_intermediate.pem",
335 .leaf_file = CERTSDIR "/" "policy_leaf_invalid.pem",
336 .want_chains = 0,
337 .want_error = X509_V_ERR_INVALID_POLICY_EXTENSION,
338 .want_error_depth = 0,
339 .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION,
340 .want_legacy_error_depth = 0,
341 },
331 /* There is a duplicate policy in the leaf policy extension. */ 342 /* There is a duplicate policy in the leaf policy extension. */
332 { 343 {
333 .id = "1 in duplicate policy extension in leaf", 344 .id = "1 in duplicate policy extension in leaf",