mirror of
https://github.com/yuzu-emu/mbedtls
synced 2024-11-25 04:29:00 +00:00
8b4331aa56
This was already working but not tested so far (Test case from previous commit still failing.) Test certificates generated with: programs/pkey/gen_key type=ec ec_curve=secp256r1 filename=cert91.key programs/pkey/gen_key type=ec ec_curve=secp256r1 filename=cert92.key programs/x509/cert_write serial=91 output_file=cert91.crt is_ca=1 \ issuer_key=cert91.key issuer_name="CN=Root 9,O=mbed TLS,C=UK" \ selfsign=1 max_pathlen=0 programs/x509/cert_write serial=92 output_file=cert92.crt \ issuer_key=cert91.key issuer_name="CN=Root 9,O=mbed TLS,C=UK" \ subject_key=cert92.key subject_name="CN=EE 92,O=mbed TLS,C=UK" mv cert9?.crt tests/data_files/dir4 rm cert9?.key
47 lines
1.8 KiB
Text
47 lines
1.8 KiB
Text
This directory contains the certificates for the tests targeting the enforcement of the policy indicated by the *pathLenConstraint* field. All leaf elements were generated with *is_ca* unset and all roots with the *selfsign=1* option.
|
|
|
|
1. zero pathlen constraint on an intermediate CA (invalid)
|
|
```
|
|
cert11.crt -> cert12.crt (max_pathlen=0) -> cert13.crt -> cert14.crt
|
|
```
|
|
|
|
2. zero pathlen constraint on the root CA (invalid)
|
|
```
|
|
cert21.crt (max_pathlen=0) -> cert22.crt -> cert23.crt
|
|
```
|
|
|
|
3. nonzero pathlen constraint on the root CA (invalid)
|
|
```
|
|
cert31.crt (max_pathlen=1) -> cert32.crt -> cert33.crt -> cert34.crt
|
|
```
|
|
|
|
4. nonzero pathlen constraint on an intermediate CA (invalid)
|
|
```
|
|
cert41.crt -> cert42.crt (max_pathlen=1) -> cert43.crt -> cert44.crt -> cert45.crt
|
|
```
|
|
|
|
5. nonzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (valid)
|
|
```
|
|
cert51.crt -> cert52.crt (max_pathlen=1) -> cert53.crt -> cert54.crt
|
|
```
|
|
|
|
6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid)
|
|
```
|
|
cert61.crt (max_pathlen=1) -> cert62.crt -> cert63.crt
|
|
```
|
|
|
|
7. pathlen constraint on the root CA with maximum number of elements and a self signed certificate in the chain (valid)
|
|
(This situation happens for example when a root of some hierarchy gets integrated into another hierarchy. In this case the certificates issued before the integration will have an intermadiate self signed certificate in their chain)
|
|
```
|
|
cert71.crt (max_pathlen=1) -> cert72.crt -> cert73.crt (self signed) -> cert74.crt -> cert74.crt
|
|
```
|
|
|
|
8. zero pathlen constraint on first intermediate CA (valid)
|
|
```
|
|
cert81.crt -> cert82.crt (max_pathlen=0) -> cert83.crt
|
|
```
|
|
|
|
9. zero pathlen constraint on trusted root (valid)
|
|
```
|
|
cert91.crt (max_pathlen=0) -> cert92.crt
|
|
```
|