|
| 1 | +#![cfg(all(feature = "builder", feature = "pem", feature = "std"))] |
| 2 | + |
| 3 | +use std::{str::FromStr, time::Duration}; |
| 4 | + |
| 5 | +use der::{EncodePem, pem::LineEnding}; |
| 6 | +use p256::{NistP256, ecdsa::DerSignature, pkcs8::DecodePrivateKey}; |
| 7 | +use rand::rng; |
| 8 | +use x509_cert::{ |
| 9 | + SubjectPublicKeyInfo, |
| 10 | + builder::{ |
| 11 | + Builder, CertificateBuilder, CrlBuilder, |
| 12 | + profile::{self, cabf::tls::CertificateType}, |
| 13 | + }, |
| 14 | + crl::RevokedCert, |
| 15 | + ext::pkix::{CrlNumber, name::GeneralNames}, |
| 16 | + name::Name, |
| 17 | + serial_number::SerialNumber, |
| 18 | + time::{Time, Validity}, |
| 19 | +}; |
| 20 | +use x509_cert_test_support::openssl; |
| 21 | + |
| 22 | +const PKCS8_PUBLIC_KEY_DER: &[u8] = include_bytes!("examples/p256-pub.der"); |
| 23 | +const PKCS8_PRIVATE_KEY_DER: &[u8] = include_bytes!("examples/p256-priv.der"); |
| 24 | + |
| 25 | +fn ecdsa_signer() -> ecdsa::SigningKey<NistP256> { |
| 26 | + let secret_key = p256::SecretKey::from_pkcs8_der(PKCS8_PRIVATE_KEY_DER).unwrap(); |
| 27 | + ecdsa::SigningKey::from(secret_key) |
| 28 | +} |
| 29 | + |
| 30 | +#[test] |
| 31 | +fn crl_signer() { |
| 32 | + let mut rng = rng(); |
| 33 | + let serial_number = SerialNumber::generate(&mut rng); |
| 34 | + let validity = Validity::from_now(Duration::new(5, 0)).unwrap(); |
| 35 | + let subject = |
| 36 | + Name::from_str("CN=World domination corporation,O=World domination Inc,C=US").unwrap(); |
| 37 | + let profile = profile::cabf::Root::new(false, subject).expect("create root profile"); |
| 38 | + let pub_key = SubjectPublicKeyInfo::try_from(PKCS8_PUBLIC_KEY_DER).expect("get ecdsa pub key"); |
| 39 | + |
| 40 | + let signer = ecdsa_signer(); |
| 41 | + let builder = CertificateBuilder::new(profile, serial_number, validity, pub_key) |
| 42 | + .expect("Create certificate"); |
| 43 | + |
| 44 | + let ca_certificate = builder.build::<_, DerSignature>(&signer).unwrap(); |
| 45 | + |
| 46 | + let crl_number = CrlNumber::try_from(42u128).unwrap(); |
| 47 | + |
| 48 | + let builder = CrlBuilder::new(&ca_certificate, crl_number) |
| 49 | + .unwrap() |
| 50 | + .with_certificates( |
| 51 | + vec![ |
| 52 | + RevokedCert { |
| 53 | + serial_number: SerialNumber::generate(&mut rng), |
| 54 | + revocation_date: Time::now().unwrap(), |
| 55 | + crl_entry_extensions: None, |
| 56 | + }, |
| 57 | + RevokedCert { |
| 58 | + serial_number: SerialNumber::generate(&mut rng), |
| 59 | + revocation_date: Time::now().unwrap(), |
| 60 | + crl_entry_extensions: None, |
| 61 | + }, |
| 62 | + ] |
| 63 | + .into_iter(), |
| 64 | + ); |
| 65 | + |
| 66 | + let crl = builder.build::<_, DerSignature>(&signer).unwrap(); |
| 67 | + |
| 68 | + let pem = crl.to_pem(LineEnding::LF).expect("generate pem"); |
| 69 | + println!("{}", openssl::check_crl(pem.as_bytes())); |
| 70 | +} |
| 71 | + |
| 72 | +/// Use `openssl verify` to run a mock certificate chain against a newly signed CRL. |
| 73 | +#[test] |
| 74 | +fn crl_verify() { |
| 75 | + let mut rng = rng(); |
| 76 | + let signer = ecdsa_signer(); |
| 77 | + |
| 78 | + let serial_number = SerialNumber::generate(&mut rng); |
| 79 | + let validity = Validity::from_now(Duration::new(60, 0)).unwrap(); |
| 80 | + let subject = Name::from_str("CN=root,O=World domination Inc,C=US").unwrap(); |
| 81 | + let profile = profile::cabf::Root::new(false, subject.clone()).expect("create root profile"); |
| 82 | + let pub_key = SubjectPublicKeyInfo::try_from(PKCS8_PUBLIC_KEY_DER).expect("get ecdsa pub key"); |
| 83 | + |
| 84 | + let builder = CertificateBuilder::new(profile, serial_number, validity, pub_key) |
| 85 | + .expect("Create certificate"); |
| 86 | + |
| 87 | + let ca_certificate = builder.build::<_, DerSignature>(&signer).unwrap(); |
| 88 | + |
| 89 | + let serial_number = SerialNumber::generate(&mut rng); |
| 90 | + let delegated = Name::from_str("CN=example.com,O=World domination Inc,C=US").unwrap(); |
| 91 | + let profile = profile::cabf::tls::Subscriber { |
| 92 | + certificate_type: CertificateType::domain_validated(delegated, GeneralNames::new()) |
| 93 | + .expect("create domain validated"), |
| 94 | + issuer: subject, |
| 95 | + client_auth: false, |
| 96 | + #[cfg(feature = "hazmat")] |
| 97 | + tls12_options: Default::default(), |
| 98 | + #[cfg(feature = "hazmat")] |
| 99 | + enable_data_encipherment: false, |
| 100 | + }; |
| 101 | + let pub_key = SubjectPublicKeyInfo::try_from(PKCS8_PUBLIC_KEY_DER).expect("get ecdsa pub key"); |
| 102 | + |
| 103 | + let builder = CertificateBuilder::new(profile, serial_number.clone(), validity, pub_key) |
| 104 | + .expect("Create certificate"); |
| 105 | + |
| 106 | + let leaf_certificate = builder.build::<_, DerSignature>(&signer).unwrap(); |
| 107 | + |
| 108 | + let crl_number = CrlNumber::try_from(42u128).unwrap(); |
| 109 | + |
| 110 | + let builder = CrlBuilder::new(&ca_certificate, crl_number) |
| 111 | + .unwrap() |
| 112 | + .with_certificates( |
| 113 | + vec![RevokedCert { |
| 114 | + serial_number, |
| 115 | + revocation_date: Time::now().unwrap(), |
| 116 | + crl_entry_extensions: None, |
| 117 | + }] |
| 118 | + .into_iter(), |
| 119 | + ); |
| 120 | + |
| 121 | + let crl = builder.build::<_, DerSignature>(&signer).unwrap(); |
| 122 | + |
| 123 | + println!( |
| 124 | + "{}", |
| 125 | + openssl::verify( |
| 126 | + ca_certificate |
| 127 | + .to_pem(LineEnding::LF) |
| 128 | + .expect("ca: generate pem") |
| 129 | + .as_bytes(), |
| 130 | + leaf_certificate |
| 131 | + .to_pem(LineEnding::LF) |
| 132 | + .expect("leaf: generate pem") |
| 133 | + .as_bytes(), |
| 134 | + crl.to_pem(LineEnding::LF) |
| 135 | + .expect("crl: generate pem") |
| 136 | + .as_bytes(), |
| 137 | + ) |
| 138 | + ); |
| 139 | +} |
0 commit comments