scep 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +15 -0
- data/.rspec +2 -0
- data/.ruby-version +1 -0
- data/.travis.yml +6 -0
- data/Gemfile +4 -0
- data/README.md +144 -0
- data/Rakefile +2 -0
- data/lib/scep/endpoint.rb +169 -0
- data/lib/scep/keypair.rb +69 -0
- data/lib/scep/pkcs7_cert_only.rb +86 -0
- data/lib/scep/pki_operation/base.rb +121 -0
- data/lib/scep/pki_operation/proxy.rb +117 -0
- data/lib/scep/pki_operation/request.rb +70 -0
- data/lib/scep/pki_operation/response.rb +86 -0
- data/lib/scep/pki_operation.rb +10 -0
- data/lib/scep/version.rb +3 -0
- data/lib/scep.rb +41 -0
- data/scep.gemspec +32 -0
- data/spec/console +7 -0
- data/spec/fixtures/self-signed.crt +18 -0
- data/spec/fixtures/self-signed.csr +14 -0
- data/spec/fixtures/self-signed.key +15 -0
- data/spec/lib/scep/endpoint_spec.rb +131 -0
- data/spec/lib/scep/keypair_spec.rb +30 -0
- data/spec/lib/scep/pkcs7_cert_only_spec.rb +42 -0
- data/spec/lib/scep/pki_operation/base_spec.rb +56 -0
- data/spec/lib/scep/pki_operation/proxy_spec.rb +45 -0
- data/spec/lib/scep/pki_operation/request_spec.rb +55 -0
- data/spec/lib/scep/pki_operation/response_spec.rb +36 -0
- data/spec/spec_helper.rb +61 -0
- metadata +171 -0
@@ -0,0 +1,56 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
|
3
|
+
describe SCEP::PKIOperation::Base do
|
4
|
+
let(:ca_keypair) { generate_keypair}
|
5
|
+
let(:signed_keypair) { generate_keypair(ca_keypair) }
|
6
|
+
let(:ra_keypair) { generate_keypair }
|
7
|
+
let(:payload) { 'Hello World!' }
|
8
|
+
let(:base) { SCEP::PKIOperation::Base.new(ra_keypair) }
|
9
|
+
|
10
|
+
describe '#x509_store' do
|
11
|
+
it 'returns an OpenSSL::X509::Store object' do
|
12
|
+
expect(base.x509_store).to be_a(OpenSSL::X509::Store)
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
describe '#unsign_and_unencrypt_raw' do
|
17
|
+
|
18
|
+
let(:p7enc) { OpenSSL::PKCS7.encrypt([ra_keypair.certificate], payload, SCEP::PKIOperation::Base.create_default_cipher, OpenSSL::PKCS7::BINARY) }
|
19
|
+
let(:p7sign) { OpenSSL::PKCS7.sign(signed_keypair.certificate, signed_keypair.private_key, p7enc.to_der, [signed_keypair.certificate], OpenSSL::PKCS7::BINARY) }
|
20
|
+
|
21
|
+
context 'without verification' do
|
22
|
+
it 'decrypts the paylaod without issue' do
|
23
|
+
decrypted = base.send(:unsign_and_unencrypt_raw, p7sign.to_der, false)
|
24
|
+
expect(decrypted).to eql(payload)
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
context 'with verification enabled' do
|
29
|
+
|
30
|
+
context 'when verification succeeds' do
|
31
|
+
it 'decrypts the payload' do
|
32
|
+
base.x509_store.add_cert signed_keypair.certificate
|
33
|
+
decrypted = base.send(:unsign_and_unencrypt_raw, p7sign.to_der, true)
|
34
|
+
expect(decrypted).to eql(payload)
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
context 'when verification fails' do
|
39
|
+
let(:unrelated_keypair) { generate_keypair }
|
40
|
+
|
41
|
+
it 'raises VerificationFailed if it is not verified against the correct certificate' do
|
42
|
+
base.x509_store.add_cert unrelated_keypair.certificate
|
43
|
+
expect {
|
44
|
+
base.send(:unsign_and_unencrypt_raw, p7sign.to_der, true)
|
45
|
+
}.to raise_error(SCEP::PKIOperation::VerificationFailed)
|
46
|
+
end
|
47
|
+
|
48
|
+
it 'raises VerificationFailed if no certs are added to the x509_store' do
|
49
|
+
expect {
|
50
|
+
base.send(:unsign_and_unencrypt_raw, p7sign.to_der, true)
|
51
|
+
}.to raise_error(SCEP::PKIOperation::VerificationFailed)
|
52
|
+
end
|
53
|
+
end
|
54
|
+
end
|
55
|
+
end
|
56
|
+
end
|
@@ -0,0 +1,45 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
|
3
|
+
describe SCEP::PKIOperation::Proxy do
|
4
|
+
|
5
|
+
let(:endpoint) { SCEP::Endpoint.new('https://scep.com') }
|
6
|
+
let(:our_ra_keypair) { generate_keypair }
|
7
|
+
let(:their_ca_keypair) { generate_keypair }
|
8
|
+
let(:original_keypair) { generate_keypair }
|
9
|
+
let(:proxy) { SCEP::PKIOperation::Proxy.new(endpoint, our_ra_keypair) }
|
10
|
+
let(:csr) { OpenSSL::X509::Request.new read_fixture('self-signed.csr') }
|
11
|
+
let(:original_request) { SCEP::PKIOperation::Request.new(original_keypair)}
|
12
|
+
|
13
|
+
before do
|
14
|
+
proxy.add_response_verification_certificate(their_ca_keypair.cert)
|
15
|
+
proxy.add_request_verification_certificate(original_keypair.cert)
|
16
|
+
original_request.csr = csr
|
17
|
+
end
|
18
|
+
|
19
|
+
describe '#forward_pki_request' do
|
20
|
+
let(:signed_keypair) { generate_keypair(their_ca_keypair) }
|
21
|
+
|
22
|
+
let(:stubbed_response) do
|
23
|
+
response = SCEP::PKIOperation::Response.new(their_ca_keypair)
|
24
|
+
response.signed_certificates = signed_keypair.cert
|
25
|
+
response
|
26
|
+
end
|
27
|
+
|
28
|
+
let(:stubbed_response_der) { stubbed_response.encrypt(our_ra_keypair.cert) }
|
29
|
+
|
30
|
+
before do
|
31
|
+
allow(endpoint).to receive(:pki_operation).and_return(stubbed_response_der)
|
32
|
+
|
33
|
+
allow(endpoint).to receive(:ca_certificate).and_return(their_ca_keypair.cert)
|
34
|
+
end
|
35
|
+
|
36
|
+
it 'returns a correctly formatted response' do
|
37
|
+
der_original_request = original_request.encrypt(our_ra_keypair.cert)
|
38
|
+
result = proxy.forward_pki_request(der_original_request)
|
39
|
+
|
40
|
+
expect(result.csr.to_pem).to eql(csr.to_pem)
|
41
|
+
expect(result.signed_certificates.first.to_pem).to eql(signed_keypair.cert.to_pem)
|
42
|
+
expect(result.p7enc_response.to_der.length).to_not eql(0)
|
43
|
+
end
|
44
|
+
end
|
45
|
+
end
|
@@ -0,0 +1,55 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
|
3
|
+
describe SCEP::PKIOperation::Request do
|
4
|
+
|
5
|
+
let(:ra_keypair) { generate_keypair }
|
6
|
+
let(:misc_keypair) { generate_keypair}
|
7
|
+
let(:csr) { OpenSSL::X509::Request.new read_fixture('self-signed.csr') }
|
8
|
+
let(:payload) { csr.to_der }
|
9
|
+
let(:p7enc) { OpenSSL::PKCS7.encrypt([ra_keypair.certificate], payload, SCEP::PKIOperation::Base.create_default_cipher, OpenSSL::PKCS7::BINARY) }
|
10
|
+
let(:p7sign) { OpenSSL::PKCS7.sign(misc_keypair.certificate, misc_keypair.private_key, p7enc.to_der, [misc_keypair.certificate], OpenSSL::PKCS7::BINARY) }
|
11
|
+
|
12
|
+
subject { SCEP::PKIOperation::Request.new(ra_keypair) }
|
13
|
+
|
14
|
+
before do
|
15
|
+
subject.x509_store.add_cert(misc_keypair.certificate)
|
16
|
+
end
|
17
|
+
|
18
|
+
describe '#decrypt' do
|
19
|
+
it 'decrypts the csr in its original format' do
|
20
|
+
subject.decrypt(p7sign.to_der)
|
21
|
+
expect(subject.csr.to_pem).to eql(csr.to_pem)
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
describe '#encrypt' do
|
26
|
+
it 'encrypts and signs the CSR' do
|
27
|
+
subject.csr = csr
|
28
|
+
encrypted = subject.encrypt(misc_keypair.certificate)
|
29
|
+
|
30
|
+
# Might as well use our already tested decryption method above
|
31
|
+
request = SCEP::PKIOperation::Request.new(misc_keypair)
|
32
|
+
request.add_verification_certificate(ra_keypair.certificate)
|
33
|
+
request.decrypt(encrypted)
|
34
|
+
expect(request.csr.to_pem).to eql(csr.to_pem)
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
describe '#proxy' do
|
39
|
+
let(:final_keypair) { generate_keypair }
|
40
|
+
|
41
|
+
it 'decrypts the csr and then re-encrypts it for another target cert' do
|
42
|
+
subject.verify_against(ra_keypair.certificate)
|
43
|
+
encrypted = subject.proxy(p7sign.to_der, final_keypair.certificate)
|
44
|
+
expect(subject.csr.to_pem).to eql(csr.to_pem)
|
45
|
+
|
46
|
+
# Now make sure our new keypair can access & decrypt it
|
47
|
+
request = SCEP::PKIOperation::Request.new(final_keypair)
|
48
|
+
request.verify_against(ra_keypair.certificate)
|
49
|
+
request.decrypt(encrypted)
|
50
|
+
expect(request.csr.to_pem).to eql(csr.to_pem)
|
51
|
+
# As you can imagine, we should be able to do *n* number of proxies
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
end
|
@@ -0,0 +1,36 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
|
3
|
+
describe SCEP::PKIOperation::Response do
|
4
|
+
|
5
|
+
let(:ra_keypair) { generate_keypair }
|
6
|
+
let(:our_keypair) { generate_keypair}
|
7
|
+
let(:response_cert) { generate_keypair.cert }
|
8
|
+
|
9
|
+
let(:payload) { SCEP::PKCS7CertOnly.new([response_cert]).to_der }
|
10
|
+
let(:p7enc) { OpenSSL::PKCS7.encrypt([our_keypair.certificate], payload, SCEP::PKIOperation::Base.create_default_cipher, OpenSSL::PKCS7::BINARY) }
|
11
|
+
let(:p7sign) { OpenSSL::PKCS7.sign(ra_keypair.certificate, ra_keypair.private_key, p7enc.to_der, [ra_keypair.certificate], OpenSSL::PKCS7::BINARY) }
|
12
|
+
|
13
|
+
|
14
|
+
describe '#decrypt' do
|
15
|
+
it 'assigns #signed_certificates correctly' do
|
16
|
+
response = SCEP::PKIOperation::Response.new(our_keypair)
|
17
|
+
response.verify_against ra_keypair.certificate
|
18
|
+
response.decrypt(p7sign.to_der)
|
19
|
+
expect(response.signed_certificates.first.to_pem).to eql(response_cert.to_pem)
|
20
|
+
end
|
21
|
+
end
|
22
|
+
|
23
|
+
describe '#encrypt' do
|
24
|
+
it 'successfully encrypts a PKCS7 payload' do
|
25
|
+
first_response = SCEP::PKIOperation::Response.new(ra_keypair)
|
26
|
+
first_response.signed_certificates = [response_cert]
|
27
|
+
encrypted = first_response.encrypt(our_keypair.certificate)
|
28
|
+
|
29
|
+
final_response = SCEP::PKIOperation::Response.new(our_keypair)
|
30
|
+
final_response.verify_against ra_keypair.cert
|
31
|
+
final_response.decrypt(encrypted)
|
32
|
+
expect(final_response.signed_certificates.first.to_pem).to eql(response_cert.to_pem)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
|
36
|
+
end
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1,61 @@
|
|
1
|
+
require 'rubygems'
|
2
|
+
require 'bundler'
|
3
|
+
|
4
|
+
Bundler.require :default
|
5
|
+
|
6
|
+
require 'webmock/rspec'
|
7
|
+
|
8
|
+
def read_fixture(path)
|
9
|
+
File.open(fixture_path path).read
|
10
|
+
end
|
11
|
+
|
12
|
+
def fixture_path(path)
|
13
|
+
"spec/fixtures/#{path}"
|
14
|
+
end
|
15
|
+
|
16
|
+
|
17
|
+
def next_serial
|
18
|
+
@serial ||= 0
|
19
|
+
@serial += 1
|
20
|
+
@serial
|
21
|
+
end
|
22
|
+
|
23
|
+
# Helper to generate a self-signed certificate
|
24
|
+
# @param [SCEP::Keypair] signer
|
25
|
+
# @return [SCEP::Keypair]
|
26
|
+
# @see http://stackoverflow.com/questions/2381394/ruby-generate-self-signed-certificate
|
27
|
+
def generate_keypair(signer = nil, serial = nil)
|
28
|
+
serial ||= next_serial
|
29
|
+
|
30
|
+
private_key = OpenSSL::PKey::RSA.new(1024)
|
31
|
+
subject = '/C=BE/O=Test/OU=Test/CN=Test'
|
32
|
+
|
33
|
+
signer_private_key = signer ? signer.private_key : private_key
|
34
|
+
signer_name = signer ? signer.certificate.subject : OpenSSL::X509::Name.parse(subject)
|
35
|
+
|
36
|
+
cert = OpenSSL::X509::Certificate.new
|
37
|
+
cert.subject = OpenSSL::X509::Name.parse(subject)
|
38
|
+
cert.issuer = signer_name
|
39
|
+
cert.not_before = Time.now
|
40
|
+
cert.not_after = Time.now + 365 * 24 * 360
|
41
|
+
cert.public_key = private_key.public_key
|
42
|
+
cert.serial = serial
|
43
|
+
cert.version = 3
|
44
|
+
|
45
|
+
ef = OpenSSL::X509::ExtensionFactory.new
|
46
|
+
ef.subject_certificate = cert
|
47
|
+
ef.issuer_certificate = cert
|
48
|
+
cert.extensions = [
|
49
|
+
ef.create_extension('basicConstraints', 'CA:TRUE', true),
|
50
|
+
ef.create_extension('subjectKeyIdentifier', 'hash')
|
51
|
+
]
|
52
|
+
cert.add_extension ef.create_extension(
|
53
|
+
'authorityKeyIdentifier',
|
54
|
+
'keyid:alyways,issuer:always')
|
55
|
+
|
56
|
+
|
57
|
+
cert.sign signer_private_key, OpenSSL::Digest::SHA1.new
|
58
|
+
|
59
|
+
|
60
|
+
return SCEP::Keypair.new(cert, private_key)
|
61
|
+
end
|
metadata
ADDED
@@ -0,0 +1,171 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: scep
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.0.1
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Christopher Thornton
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
date: 2015-05-12 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: httparty
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - ">="
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '0'
|
20
|
+
type: :runtime
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - ">="
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '0'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: bundler
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - "~>"
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '1.7'
|
34
|
+
type: :development
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - "~>"
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '1.7'
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: rake
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - "~>"
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: '10.0'
|
48
|
+
type: :development
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - "~>"
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: '10.0'
|
55
|
+
- !ruby/object:Gem::Dependency
|
56
|
+
name: pry
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
58
|
+
requirements:
|
59
|
+
- - "~>"
|
60
|
+
- !ruby/object:Gem::Version
|
61
|
+
version: 0.9.0
|
62
|
+
type: :development
|
63
|
+
prerelease: false
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
65
|
+
requirements:
|
66
|
+
- - "~>"
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: 0.9.0
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: rspec
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - "~>"
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '3.0'
|
76
|
+
type: :development
|
77
|
+
prerelease: false
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - "~>"
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: '3.0'
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: webmock
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ">="
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0'
|
90
|
+
type: :development
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - ">="
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '0'
|
97
|
+
description: Makes development of SCEP services easier
|
98
|
+
email:
|
99
|
+
- christopher.thornton@onelogin.com
|
100
|
+
executables: []
|
101
|
+
extensions: []
|
102
|
+
extra_rdoc_files: []
|
103
|
+
files:
|
104
|
+
- ".gitignore"
|
105
|
+
- ".rspec"
|
106
|
+
- ".ruby-version"
|
107
|
+
- ".travis.yml"
|
108
|
+
- Gemfile
|
109
|
+
- README.md
|
110
|
+
- Rakefile
|
111
|
+
- lib/scep.rb
|
112
|
+
- lib/scep/endpoint.rb
|
113
|
+
- lib/scep/keypair.rb
|
114
|
+
- lib/scep/pkcs7_cert_only.rb
|
115
|
+
- lib/scep/pki_operation.rb
|
116
|
+
- lib/scep/pki_operation/base.rb
|
117
|
+
- lib/scep/pki_operation/proxy.rb
|
118
|
+
- lib/scep/pki_operation/request.rb
|
119
|
+
- lib/scep/pki_operation/response.rb
|
120
|
+
- lib/scep/version.rb
|
121
|
+
- scep.gemspec
|
122
|
+
- spec/console
|
123
|
+
- spec/fixtures/self-signed.crt
|
124
|
+
- spec/fixtures/self-signed.csr
|
125
|
+
- spec/fixtures/self-signed.key
|
126
|
+
- spec/lib/scep/endpoint_spec.rb
|
127
|
+
- spec/lib/scep/keypair_spec.rb
|
128
|
+
- spec/lib/scep/pkcs7_cert_only_spec.rb
|
129
|
+
- spec/lib/scep/pki_operation/base_spec.rb
|
130
|
+
- spec/lib/scep/pki_operation/proxy_spec.rb
|
131
|
+
- spec/lib/scep/pki_operation/request_spec.rb
|
132
|
+
- spec/lib/scep/pki_operation/response_spec.rb
|
133
|
+
- spec/spec_helper.rb
|
134
|
+
homepage: https://github.com/onelogin/scep-gem
|
135
|
+
licenses:
|
136
|
+
- Proprietary
|
137
|
+
metadata: {}
|
138
|
+
post_install_message:
|
139
|
+
rdoc_options: []
|
140
|
+
require_paths:
|
141
|
+
- lib
|
142
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
143
|
+
requirements:
|
144
|
+
- - ">="
|
145
|
+
- !ruby/object:Gem::Version
|
146
|
+
version: '0'
|
147
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
148
|
+
requirements:
|
149
|
+
- - ">="
|
150
|
+
- !ruby/object:Gem::Version
|
151
|
+
version: '0'
|
152
|
+
requirements: []
|
153
|
+
rubyforge_project:
|
154
|
+
rubygems_version: 2.4.5
|
155
|
+
signing_key:
|
156
|
+
specification_version: 4
|
157
|
+
summary: SCEP libraries
|
158
|
+
test_files:
|
159
|
+
- spec/console
|
160
|
+
- spec/fixtures/self-signed.crt
|
161
|
+
- spec/fixtures/self-signed.csr
|
162
|
+
- spec/fixtures/self-signed.key
|
163
|
+
- spec/lib/scep/endpoint_spec.rb
|
164
|
+
- spec/lib/scep/keypair_spec.rb
|
165
|
+
- spec/lib/scep/pkcs7_cert_only_spec.rb
|
166
|
+
- spec/lib/scep/pki_operation/base_spec.rb
|
167
|
+
- spec/lib/scep/pki_operation/proxy_spec.rb
|
168
|
+
- spec/lib/scep/pki_operation/request_spec.rb
|
169
|
+
- spec/lib/scep/pki_operation/response_spec.rb
|
170
|
+
- spec/spec_helper.rb
|
171
|
+
has_rdoc:
|