Conversation
Signed-off-by: William Woodruff <william@trailofbits.com>
|
OpenSSL 1.1.1 appears to really struggle to produce well-formed error messages here: ...so we probably need to stub out the error emission for that version. |
Signed-off-by: William Woodruff <william@trailofbits.com>
|
|
New testcasesThere are new testcases in this change. openssl-3.3.3
openssl-3.5.0
openssl-3.0.16
gnutls-certtool-3.8.3
rustls-webpki
openssl-3.4.1
openssl-3.2.4
gocryptox509-go1.24.3
openssl-1.1
pyca-cryptography-45.0.2
rust-webpki
certvalidator-0.11.1
|
|
This appears to generate data in a completely different way than we do in our existing test cases. Is there a reason to do things differently? Should we port all the existing cert generation to this style? |
@tnytown can correct me but I believe this approach was the easiest way to hack some invalid states into CRLs. Looking at it more however, I think we can do a bit of cleanup here -- rather than implicitly pulling (I think that'll reduce the need for extra support code here + shorten the diff a good bit.)
IMO no -- this is a pretty niche case where our existing APIs/generation techniques (like the handful of OpenSSL CLI scripts) don't work super well, whereas they work fine (and are more readable/maintainable) more generally. |
Yep, that's correct—I didn't want to rely on the ability of other tooling to encode invalid CRLs (
Agree on saving the intermediate stencils for introspection, but either way I think we'll need a tool that signs over the CRL. AFAIK |
|
I was looking at adapting some of the test cases from rustls/webpki to x509-limbo, but it looks like most of our interesting testcases are just bare DER that we cooked up with I'll keep an eye on the outcome of this branch to decide the best way to adapt the DER testcases based on how these |
Reopens #439.