]> Cypherpunks.ru repositories - gostls13.git/commitdiff
crypto/x509: Reallow duplicate attributes in CSRs.
authorRob Stradling <rob@sectigo.com>
Tue, 6 Sep 2022 16:30:31 +0000 (17:30 +0100)
committerGopher Robot <gobot@golang.org>
Tue, 15 Nov 2022 17:38:58 +0000 (17:38 +0000)
Change-Id: I3fb4331c2b1b6adafbac3e76eaf66c79cd5ef56f
Reviewed-on: https://go-review.googlesource.com/c/go/+/428636
Run-TryBot: Roland Shoemaker <roland@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Roland Shoemaker <roland@golang.org>
Auto-Submit: Roland Shoemaker <roland@golang.org>

src/crypto/x509/x509.go
src/crypto/x509/x509_test.go

index b8c4b720cc2fe18362cff4e654616da1db4758fe..fb773e5beda4b5083fa228e7ac48f217c3e76455 100644 (file)
@@ -1831,18 +1831,13 @@ func parseCSRExtensions(rawAttributes []asn1.RawValue) ([]pkix.Extension, error)
        }
 
        var ret []pkix.Extension
-       seenExts := make(map[string]bool)
+       requestedExts := make(map[string]bool)
        for _, rawAttr := range rawAttributes {
                var attr pkcs10Attribute
                if rest, err := asn1.Unmarshal(rawAttr.FullBytes, &attr); err != nil || len(rest) != 0 || len(attr.Values) == 0 {
                        // Ignore attributes that don't parse.
                        continue
                }
-               oidStr := attr.Id.String()
-               if seenExts[oidStr] {
-                       return nil, errors.New("x509: certificate request contains duplicate extensions")
-               }
-               seenExts[oidStr] = true
 
                if !attr.Id.Equal(oidExtensionRequest) {
                        continue
@@ -1852,7 +1847,6 @@ func parseCSRExtensions(rawAttributes []asn1.RawValue) ([]pkix.Extension, error)
                if _, err := asn1.Unmarshal(attr.Values[0].FullBytes, &extensions); err != nil {
                        return nil, err
                }
-               requestedExts := make(map[string]bool)
                for _, ext := range extensions {
                        oidStr := ext.Id.String()
                        if requestedExts[oidStr] {
index 0ba6d3e9fa487a8092d3c181da4ae1174b170af3..22697cd3fff43fbf7982990f28f5d2e0b021a679 100644 (file)
@@ -3798,10 +3798,32 @@ VLOVx0i+/Q7fikp3hbN1JwuMTU0v2KL/IKoUcZc02+5xiYrnOIt5
 func TestDuplicateExtensionsCSR(t *testing.T) {
        b, _ := pem.Decode([]byte(dupExtCSR))
        if b == nil {
-               t.Fatalf("couldn't decode test certificate")
+               t.Fatalf("couldn't decode test CSR")
        }
        _, err := ParseCertificateRequest(b.Bytes)
        if err == nil {
-               t.Fatal("ParseCertificate should fail when parsing certificate with duplicate extensions")
+               t.Fatal("ParseCertificateRequest should fail when parsing CSR with duplicate extensions")
+       }
+}
+
+const dupAttCSR = `-----BEGIN CERTIFICATE REQUEST-----
+MIIBbDCB1gIBADAPMQ0wCwYDVQQDEwR0ZXN0MIGfMA0GCSqGSIb3DQEBAQUAA4GN
+ADCBiQKBgQCj5Po3PKO/JNuxr+B+WNfMIzqqYztdlv+mTQhT0jOR5rTkUvxeeHH8
+YclryES2dOISjaUOTmOAr5GQIIdQl4Ql33Cp7ZR/VWcRn+qvTak0Yow+xVsDo0n4
+7IcvvP6CJ7FRoYBUakVczeXLxCjLwdyK16VGJM06eRzDLykPxpPwLQIDAQABoB4w
+DQYCKgMxBwwFdGVzdDEwDQYCKgMxBwwFdGVzdDIwDQYJKoZIhvcNAQELBQADgYEA
+UJ8hsHxtnIeqb2ufHnQFJO+wEJhx2Uxm/BTuzHOeffuQkwATez4skZ7SlX9exgb7
+6jRMRilqb4F7f8w+uDoqxRrA9zc8mwY16zPsyBhRet+ZGbj/ilgvGmtZ21qZZ/FU
+0pJFJIVLM3l49Onr5uIt5+hCWKwHlgE0nGpjKLR3cMg=
+-----END CERTIFICATE REQUEST-----`
+
+func TestDuplicateAttributesCSR(t *testing.T) {
+       b, _ := pem.Decode([]byte(dupAttCSR))
+       if b == nil {
+               t.Fatalf("couldn't decode test CSR")
+       }
+       _, err := ParseCertificateRequest(b.Bytes)
+       if err != nil {
+               t.Fatal("ParseCertificateRequest should succeed when parsing CSR with duplicate attributes")
        }
 }