|
4 | 4 | "crypto/ecdsa" |
5 | 5 | "crypto/elliptic" |
6 | 6 | "crypto/rand" |
| 7 | + "crypto/rsa" |
7 | 8 | "crypto/x509" |
8 | 9 | "io/ioutil" |
9 | 10 | "strings" |
@@ -220,3 +221,97 @@ func TestECDSAX509PublickeyID(t *testing.T) { |
220 | 221 |
|
221 | 222 | require.Equal(t, tufPrivKey.ID(), tufID) |
222 | 223 | } |
| 224 | + |
| 225 | +func TestValidateCertificateWithSHA1(t *testing.T) { |
| 226 | + // Test against SHA1 signature algorithm cert first |
| 227 | + startTime := time.Now() |
| 228 | + template, err := NewCertificate("something", startTime, startTime.AddDate(10, 0, 0)) |
| 229 | + require.NoError(t, err) |
| 230 | + // SHA1 signature algorithm is invalid |
| 231 | + template.SignatureAlgorithm = x509.ECDSAWithSHA1 |
| 232 | + template.PublicKeyAlgorithm = x509.ECDSA |
| 233 | + |
| 234 | + privKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) |
| 235 | + require.NoError(t, err) |
| 236 | + |
| 237 | + derBytes, err := x509.CreateCertificate( |
| 238 | + rand.Reader, template, template, &privKey.PublicKey, privKey) |
| 239 | + require.NoError(t, err) |
| 240 | + |
| 241 | + sha1Cert, err := x509.ParseCertificate(derBytes) |
| 242 | + require.NoError(t, err) |
| 243 | + |
| 244 | + // Regardless of expiry check, this certificate should fail to validate |
| 245 | + require.Error(t, ValidateCertificate(sha1Cert, false)) |
| 246 | + require.Error(t, ValidateCertificate(sha1Cert, true)) |
| 247 | +} |
| 248 | + |
| 249 | +func TestValidateCertificateWithExpiredCert(t *testing.T) { |
| 250 | + // Test against an expired cert for 10 years ago, only valid for a day |
| 251 | + startTime := time.Now().AddDate(-10, 0, 0) |
| 252 | + template, err := NewCertificate("something", startTime, startTime.AddDate(0, 0, 1)) |
| 253 | + require.NoError(t, err) |
| 254 | + template.SignatureAlgorithm = x509.ECDSAWithSHA256 |
| 255 | + template.PublicKeyAlgorithm = x509.ECDSA |
| 256 | + |
| 257 | + privKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) |
| 258 | + require.NoError(t, err) |
| 259 | + |
| 260 | + derBytes, err := x509.CreateCertificate( |
| 261 | + rand.Reader, template, template, &privKey.PublicKey, privKey) |
| 262 | + require.NoError(t, err) |
| 263 | + |
| 264 | + expiredCert, err := x509.ParseCertificate(derBytes) |
| 265 | + require.NoError(t, err) |
| 266 | + |
| 267 | + // If we don't check expiry, this cert is perfectly valid |
| 268 | + require.NoError(t, ValidateCertificate(expiredCert, false)) |
| 269 | + // We should get an error when we check expiry |
| 270 | + require.Error(t, ValidateCertificate(expiredCert, true)) |
| 271 | +} |
| 272 | + |
| 273 | +func TestValidateCertificateWithInvalidExpiry(t *testing.T) { |
| 274 | + // Test against a cert with an invalid expiry window: from 10 years in the future to 10 years ago |
| 275 | + startTime := time.Now().AddDate(10, 0, 0) |
| 276 | + template, err := NewCertificate("something", startTime, startTime.AddDate(-10, 0, 0)) |
| 277 | + require.NoError(t, err) |
| 278 | + template.SignatureAlgorithm = x509.ECDSAWithSHA256 |
| 279 | + template.PublicKeyAlgorithm = x509.ECDSA |
| 280 | + |
| 281 | + privKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) |
| 282 | + require.NoError(t, err) |
| 283 | + |
| 284 | + derBytes, err := x509.CreateCertificate( |
| 285 | + rand.Reader, template, template, &privKey.PublicKey, privKey) |
| 286 | + require.NoError(t, err) |
| 287 | + |
| 288 | + invalidCert, err := x509.ParseCertificate(derBytes) |
| 289 | + require.NoError(t, err) |
| 290 | + |
| 291 | + // Regardless of expiry check, this certificate should fail to validate |
| 292 | + require.Error(t, ValidateCertificate(invalidCert, false)) |
| 293 | + require.Error(t, ValidateCertificate(invalidCert, true)) |
| 294 | +} |
| 295 | + |
| 296 | +func TestValidateCertificateWithShortKey(t *testing.T) { |
| 297 | + startTime := time.Now() |
| 298 | + template, err := NewCertificate("something", startTime, startTime.AddDate(10, 0, 0)) |
| 299 | + require.NoError(t, err) |
| 300 | + template.SignatureAlgorithm = x509.SHA256WithRSA |
| 301 | + template.PublicKeyAlgorithm = x509.RSA |
| 302 | + |
| 303 | + // Use only 1024 bit modulus, this will fail |
| 304 | + weakPrivKey, err := rsa.GenerateKey(rand.Reader, 1024) |
| 305 | + require.NoError(t, err) |
| 306 | + |
| 307 | + derBytes, err := x509.CreateCertificate( |
| 308 | + rand.Reader, template, template, &weakPrivKey.PublicKey, weakPrivKey) |
| 309 | + require.NoError(t, err) |
| 310 | + |
| 311 | + weakKeyCert, err := x509.ParseCertificate(derBytes) |
| 312 | + require.NoError(t, err) |
| 313 | + |
| 314 | + // Regardless of expiry check, this certificate should fail to validate |
| 315 | + require.Error(t, ValidateCertificate(weakKeyCert, false)) |
| 316 | + require.Error(t, ValidateCertificate(weakKeyCert, true)) |
| 317 | +} |
0 commit comments