1
0
Fork 0
mirror of https://github.com/ruby/ruby.git synced 2022-11-09 12:17:21 -05:00
This commit is contained in:
Benoit Daloze 2022-06-26 14:50:14 +02:00
parent f616e81637
commit d3d5ef0cca
74 changed files with 1201 additions and 324 deletions

View file

@ -0,0 +1,78 @@
require_relative '../../../../spec_helper'
require 'openssl'
describe "OpenSSL::X509::Name.verify" do
it "returns true for valid certificate" do
key = OpenSSL::PKey::RSA.new 2048
cert = OpenSSL::X509::Certificate.new
cert.version = 2
cert.serial = 1
cert.subject = OpenSSL::X509::Name.parse "/DC=org/DC=truffleruby/CN=TruffleRuby CA"
cert.issuer = cert.subject
cert.public_key = key.public_key
cert.not_before = Time.now
cert.not_after = cert.not_before + 365 * 24 * 60 * 60
cert.sign key, OpenSSL::Digest.new('SHA1')
store = OpenSSL::X509::Store.new
store.add_cert(cert)
store.verify(cert).should == true
end
it "returns false for an expired certificate" do
key = OpenSSL::PKey::RSA.new 2048
cert = OpenSSL::X509::Certificate.new
cert.version = 2
cert.serial = 1
cert.subject = OpenSSL::X509::Name.parse "/DC=org/DC=truffleruby/CN=TruffleRuby CA"
cert.issuer = cert.subject
cert.public_key = key.public_key
cert.not_before = Time.now - 10
cert.not_after = Time.now - 5
cert.sign key, OpenSSL::Digest.new('SHA1')
store = OpenSSL::X509::Store.new
store.add_cert(cert)
store.verify(cert).should == false
end
it "returns false for an expired root certificate" do
root_key = OpenSSL::PKey::RSA.new 2048
root_cert = OpenSSL::X509::Certificate.new
root_cert.version = 2
root_cert.serial = 1
root_cert.subject = OpenSSL::X509::Name.parse "/DC=org/DC=truffleruby/CN=TruffleRuby CA"
root_cert.issuer = root_cert.subject
root_cert.public_key = root_key.public_key
root_cert.not_before = Time.now - 10
root_cert.not_after = Time.now - 5
ef = OpenSSL::X509::ExtensionFactory.new
ef.subject_certificate = root_cert
ef.issuer_certificate = root_cert
root_cert.add_extension(ef.create_extension("basicConstraints","CA:TRUE",true))
root_cert.add_extension(ef.create_extension("keyUsage","keyCertSign, cRLSign", true))
root_cert.add_extension(ef.create_extension("subjectKeyIdentifier","hash",false))
root_cert.add_extension(ef.create_extension("authorityKeyIdentifier","keyid:always",false))
root_cert.sign(root_key, OpenSSL::Digest.new('SHA256'))
key = OpenSSL::PKey::RSA.new 2048
cert = OpenSSL::X509::Certificate.new
cert.version = 2
cert.serial = 2
cert.subject = OpenSSL::X509::Name.parse "/DC=org/DC=truffleruby/CN=TruffleRuby certificate"
cert.issuer = root_cert.subject
cert.public_key = key.public_key
cert.not_before = Time.now
cert.not_after = cert.not_before + 1 * 365 * 24 * 60 * 60
ef = OpenSSL::X509::ExtensionFactory.new
ef.subject_certificate = cert
ef.issuer_certificate = root_cert
cert.add_extension(ef.create_extension("keyUsage","digitalSignature", true))
cert.add_extension(ef.create_extension("subjectKeyIdentifier","hash",false))
cert.sign(root_key, OpenSSL::Digest.new('SHA256'))
store = OpenSSL::X509::Store.new
store.add_cert(root_cert)
store.add_cert(cert)
store.verify(cert).should == false
end
end