Skip to content

Allow SubjectInfoAccess extension without id-ad-caRepository entry#10368

Open
holtrop-wolfssl wants to merge 1 commit intowolfSSL:masterfrom
holtrop-wolfssl:gh10359
Open

Allow SubjectInfoAccess extension without id-ad-caRepository entry#10368
holtrop-wolfssl wants to merge 1 commit intowolfSSL:masterfrom
holtrop-wolfssl:gh10359

Conversation

@holtrop-wolfssl
Copy link
Copy Markdown
Contributor

Previously parsing a SubjectInfoAccess certificate containing a SubjectInfoAccess extension that did not contain an id-ad-caRepository resulted in an error.

Description

Fixes #10359

Testing

Generated certificate with SIA extension without id-ad-caRepository OID present. Tested that wc_ParseCert() failed before change and passed afterward.

Checklist

  • added tests
  • updated/added doxygen
  • updated appropriate READMEs
  • Updated manual and documentation

@holtrop-wolfssl holtrop-wolfssl self-assigned this Apr 30, 2026
Copilot AI review requested due to automatic review settings April 30, 2026 19:40
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Relaxes X.509 Subject Information Access (SIA) parsing so certificates without an id-ad-caRepository access method are accepted (RFC 5280-compliant), and adds a regression test plus supporting test-certificate generation artifacts.

Changes:

  • Remove the hard failure in DecodeSubjInfoAcc() when id-ad-caRepository is absent.
  • Add an API test covering SIA present but without id-ad-caRepository.
  • Add a new SIA test certificate and update cert regeneration scripts/configs (plus ignore .rnd).

Reviewed changes

Copilot reviewed 5 out of 6 changed files in this pull request and generated 2 comments.

Show a summary per file
File Description
wolfcrypt/src/asn.c Stops rejecting SIA extensions that don’t include id-ad-caRepository.
tests/api.c Adds a regression test that parses a cert with SIA but no caRepository entry.
certs/sia/timestamping-sia-cert.pem New test certificate containing SIA with only timeStamping access method.
certs/renewcerts/wolfssl.cnf Adds an OpenSSL config section to generate the new SIA test cert.
certs/renewcerts.sh Adds regeneration steps for the new SIA test cert; improves cleanup and makes script cwd-independent.
.gitignore Ignores generated certs/.rnd.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread tests/api.c Outdated
Comment thread wolfcrypt/src/asn.c
@holtrop-wolfssl holtrop-wolfssl force-pushed the gh10359 branch 2 times, most recently from dc57e42 to b0f0c95 Compare April 30, 2026 20:48
@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 1, 2026

MemBrowse Memory Report

No memory changes detected for:

@holtrop-wolfssl
Copy link
Copy Markdown
Contributor Author

retest this please (hudson.AbortException: Build 'PRB-multi-test-script' failed with result: FAILURE)

Previously parsing a SubjectInfoAccess certificate containing a
SubjectInfoAccess extension that did not contain an id-ad-caRepository
resulted in an error.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

DecodeSubjInfoAcc() rejects RFC 5280-compliant certs without id-ad-caRepository

3 participants