scep 0.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,56 @@
1
+ require 'spec_helper'
2
+
3
+ describe SCEP::PKIOperation::Base do
4
+ let(:ca_keypair) { generate_keypair}
5
+ let(:signed_keypair) { generate_keypair(ca_keypair) }
6
+ let(:ra_keypair) { generate_keypair }
7
+ let(:payload) { 'Hello World!' }
8
+ let(:base) { SCEP::PKIOperation::Base.new(ra_keypair) }
9
+
10
+ describe '#x509_store' do
11
+ it 'returns an OpenSSL::X509::Store object' do
12
+ expect(base.x509_store).to be_a(OpenSSL::X509::Store)
13
+ end
14
+ end
15
+
16
+ describe '#unsign_and_unencrypt_raw' do
17
+
18
+ let(:p7enc) { OpenSSL::PKCS7.encrypt([ra_keypair.certificate], payload, SCEP::PKIOperation::Base.create_default_cipher, OpenSSL::PKCS7::BINARY) }
19
+ let(:p7sign) { OpenSSL::PKCS7.sign(signed_keypair.certificate, signed_keypair.private_key, p7enc.to_der, [signed_keypair.certificate], OpenSSL::PKCS7::BINARY) }
20
+
21
+ context 'without verification' do
22
+ it 'decrypts the paylaod without issue' do
23
+ decrypted = base.send(:unsign_and_unencrypt_raw, p7sign.to_der, false)
24
+ expect(decrypted).to eql(payload)
25
+ end
26
+ end
27
+
28
+ context 'with verification enabled' do
29
+
30
+ context 'when verification succeeds' do
31
+ it 'decrypts the payload' do
32
+ base.x509_store.add_cert signed_keypair.certificate
33
+ decrypted = base.send(:unsign_and_unencrypt_raw, p7sign.to_der, true)
34
+ expect(decrypted).to eql(payload)
35
+ end
36
+ end
37
+
38
+ context 'when verification fails' do
39
+ let(:unrelated_keypair) { generate_keypair }
40
+
41
+ it 'raises VerificationFailed if it is not verified against the correct certificate' do
42
+ base.x509_store.add_cert unrelated_keypair.certificate
43
+ expect {
44
+ base.send(:unsign_and_unencrypt_raw, p7sign.to_der, true)
45
+ }.to raise_error(SCEP::PKIOperation::VerificationFailed)
46
+ end
47
+
48
+ it 'raises VerificationFailed if no certs are added to the x509_store' do
49
+ expect {
50
+ base.send(:unsign_and_unencrypt_raw, p7sign.to_der, true)
51
+ }.to raise_error(SCEP::PKIOperation::VerificationFailed)
52
+ end
53
+ end
54
+ end
55
+ end
56
+ end
@@ -0,0 +1,45 @@
1
+ require 'spec_helper'
2
+
3
+ describe SCEP::PKIOperation::Proxy do
4
+
5
+ let(:endpoint) { SCEP::Endpoint.new('https://scep.com') }
6
+ let(:our_ra_keypair) { generate_keypair }
7
+ let(:their_ca_keypair) { generate_keypair }
8
+ let(:original_keypair) { generate_keypair }
9
+ let(:proxy) { SCEP::PKIOperation::Proxy.new(endpoint, our_ra_keypair) }
10
+ let(:csr) { OpenSSL::X509::Request.new read_fixture('self-signed.csr') }
11
+ let(:original_request) { SCEP::PKIOperation::Request.new(original_keypair)}
12
+
13
+ before do
14
+ proxy.add_response_verification_certificate(their_ca_keypair.cert)
15
+ proxy.add_request_verification_certificate(original_keypair.cert)
16
+ original_request.csr = csr
17
+ end
18
+
19
+ describe '#forward_pki_request' do
20
+ let(:signed_keypair) { generate_keypair(their_ca_keypair) }
21
+
22
+ let(:stubbed_response) do
23
+ response = SCEP::PKIOperation::Response.new(their_ca_keypair)
24
+ response.signed_certificates = signed_keypair.cert
25
+ response
26
+ end
27
+
28
+ let(:stubbed_response_der) { stubbed_response.encrypt(our_ra_keypair.cert) }
29
+
30
+ before do
31
+ allow(endpoint).to receive(:pki_operation).and_return(stubbed_response_der)
32
+
33
+ allow(endpoint).to receive(:ca_certificate).and_return(their_ca_keypair.cert)
34
+ end
35
+
36
+ it 'returns a correctly formatted response' do
37
+ der_original_request = original_request.encrypt(our_ra_keypair.cert)
38
+ result = proxy.forward_pki_request(der_original_request)
39
+
40
+ expect(result.csr.to_pem).to eql(csr.to_pem)
41
+ expect(result.signed_certificates.first.to_pem).to eql(signed_keypair.cert.to_pem)
42
+ expect(result.p7enc_response.to_der.length).to_not eql(0)
43
+ end
44
+ end
45
+ end
@@ -0,0 +1,55 @@
1
+ require 'spec_helper'
2
+
3
+ describe SCEP::PKIOperation::Request do
4
+
5
+ let(:ra_keypair) { generate_keypair }
6
+ let(:misc_keypair) { generate_keypair}
7
+ let(:csr) { OpenSSL::X509::Request.new read_fixture('self-signed.csr') }
8
+ let(:payload) { csr.to_der }
9
+ let(:p7enc) { OpenSSL::PKCS7.encrypt([ra_keypair.certificate], payload, SCEP::PKIOperation::Base.create_default_cipher, OpenSSL::PKCS7::BINARY) }
10
+ let(:p7sign) { OpenSSL::PKCS7.sign(misc_keypair.certificate, misc_keypair.private_key, p7enc.to_der, [misc_keypair.certificate], OpenSSL::PKCS7::BINARY) }
11
+
12
+ subject { SCEP::PKIOperation::Request.new(ra_keypair) }
13
+
14
+ before do
15
+ subject.x509_store.add_cert(misc_keypair.certificate)
16
+ end
17
+
18
+ describe '#decrypt' do
19
+ it 'decrypts the csr in its original format' do
20
+ subject.decrypt(p7sign.to_der)
21
+ expect(subject.csr.to_pem).to eql(csr.to_pem)
22
+ end
23
+ end
24
+
25
+ describe '#encrypt' do
26
+ it 'encrypts and signs the CSR' do
27
+ subject.csr = csr
28
+ encrypted = subject.encrypt(misc_keypair.certificate)
29
+
30
+ # Might as well use our already tested decryption method above
31
+ request = SCEP::PKIOperation::Request.new(misc_keypair)
32
+ request.add_verification_certificate(ra_keypair.certificate)
33
+ request.decrypt(encrypted)
34
+ expect(request.csr.to_pem).to eql(csr.to_pem)
35
+ end
36
+ end
37
+
38
+ describe '#proxy' do
39
+ let(:final_keypair) { generate_keypair }
40
+
41
+ it 'decrypts the csr and then re-encrypts it for another target cert' do
42
+ subject.verify_against(ra_keypair.certificate)
43
+ encrypted = subject.proxy(p7sign.to_der, final_keypair.certificate)
44
+ expect(subject.csr.to_pem).to eql(csr.to_pem)
45
+
46
+ # Now make sure our new keypair can access & decrypt it
47
+ request = SCEP::PKIOperation::Request.new(final_keypair)
48
+ request.verify_against(ra_keypair.certificate)
49
+ request.decrypt(encrypted)
50
+ expect(request.csr.to_pem).to eql(csr.to_pem)
51
+ # As you can imagine, we should be able to do *n* number of proxies
52
+ end
53
+ end
54
+
55
+ end
@@ -0,0 +1,36 @@
1
+ require 'spec_helper'
2
+
3
+ describe SCEP::PKIOperation::Response do
4
+
5
+ let(:ra_keypair) { generate_keypair }
6
+ let(:our_keypair) { generate_keypair}
7
+ let(:response_cert) { generate_keypair.cert }
8
+
9
+ let(:payload) { SCEP::PKCS7CertOnly.new([response_cert]).to_der }
10
+ let(:p7enc) { OpenSSL::PKCS7.encrypt([our_keypair.certificate], payload, SCEP::PKIOperation::Base.create_default_cipher, OpenSSL::PKCS7::BINARY) }
11
+ let(:p7sign) { OpenSSL::PKCS7.sign(ra_keypair.certificate, ra_keypair.private_key, p7enc.to_der, [ra_keypair.certificate], OpenSSL::PKCS7::BINARY) }
12
+
13
+
14
+ describe '#decrypt' do
15
+ it 'assigns #signed_certificates correctly' do
16
+ response = SCEP::PKIOperation::Response.new(our_keypair)
17
+ response.verify_against ra_keypair.certificate
18
+ response.decrypt(p7sign.to_der)
19
+ expect(response.signed_certificates.first.to_pem).to eql(response_cert.to_pem)
20
+ end
21
+ end
22
+
23
+ describe '#encrypt' do
24
+ it 'successfully encrypts a PKCS7 payload' do
25
+ first_response = SCEP::PKIOperation::Response.new(ra_keypair)
26
+ first_response.signed_certificates = [response_cert]
27
+ encrypted = first_response.encrypt(our_keypair.certificate)
28
+
29
+ final_response = SCEP::PKIOperation::Response.new(our_keypair)
30
+ final_response.verify_against ra_keypair.cert
31
+ final_response.decrypt(encrypted)
32
+ expect(final_response.signed_certificates.first.to_pem).to eql(response_cert.to_pem)
33
+ end
34
+ end
35
+
36
+ end
@@ -0,0 +1,61 @@
1
+ require 'rubygems'
2
+ require 'bundler'
3
+
4
+ Bundler.require :default
5
+
6
+ require 'webmock/rspec'
7
+
8
+ def read_fixture(path)
9
+ File.open(fixture_path path).read
10
+ end
11
+
12
+ def fixture_path(path)
13
+ "spec/fixtures/#{path}"
14
+ end
15
+
16
+
17
+ def next_serial
18
+ @serial ||= 0
19
+ @serial += 1
20
+ @serial
21
+ end
22
+
23
+ # Helper to generate a self-signed certificate
24
+ # @param [SCEP::Keypair] signer
25
+ # @return [SCEP::Keypair]
26
+ # @see http://stackoverflow.com/questions/2381394/ruby-generate-self-signed-certificate
27
+ def generate_keypair(signer = nil, serial = nil)
28
+ serial ||= next_serial
29
+
30
+ private_key = OpenSSL::PKey::RSA.new(1024)
31
+ subject = '/C=BE/O=Test/OU=Test/CN=Test'
32
+
33
+ signer_private_key = signer ? signer.private_key : private_key
34
+ signer_name = signer ? signer.certificate.subject : OpenSSL::X509::Name.parse(subject)
35
+
36
+ cert = OpenSSL::X509::Certificate.new
37
+ cert.subject = OpenSSL::X509::Name.parse(subject)
38
+ cert.issuer = signer_name
39
+ cert.not_before = Time.now
40
+ cert.not_after = Time.now + 365 * 24 * 360
41
+ cert.public_key = private_key.public_key
42
+ cert.serial = serial
43
+ cert.version = 3
44
+
45
+ ef = OpenSSL::X509::ExtensionFactory.new
46
+ ef.subject_certificate = cert
47
+ ef.issuer_certificate = cert
48
+ cert.extensions = [
49
+ ef.create_extension('basicConstraints', 'CA:TRUE', true),
50
+ ef.create_extension('subjectKeyIdentifier', 'hash')
51
+ ]
52
+ cert.add_extension ef.create_extension(
53
+ 'authorityKeyIdentifier',
54
+ 'keyid:alyways,issuer:always')
55
+
56
+
57
+ cert.sign signer_private_key, OpenSSL::Digest::SHA1.new
58
+
59
+
60
+ return SCEP::Keypair.new(cert, private_key)
61
+ end
metadata ADDED
@@ -0,0 +1,171 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: scep
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.0.1
5
+ platform: ruby
6
+ authors:
7
+ - Christopher Thornton
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2015-05-12 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: httparty
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - ">="
18
+ - !ruby/object:Gem::Version
19
+ version: '0'
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - ">="
25
+ - !ruby/object:Gem::Version
26
+ version: '0'
27
+ - !ruby/object:Gem::Dependency
28
+ name: bundler
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '1.7'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '1.7'
41
+ - !ruby/object:Gem::Dependency
42
+ name: rake
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '10.0'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '10.0'
55
+ - !ruby/object:Gem::Dependency
56
+ name: pry
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: 0.9.0
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: 0.9.0
69
+ - !ruby/object:Gem::Dependency
70
+ name: rspec
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - "~>"
74
+ - !ruby/object:Gem::Version
75
+ version: '3.0'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - "~>"
81
+ - !ruby/object:Gem::Version
82
+ version: '3.0'
83
+ - !ruby/object:Gem::Dependency
84
+ name: webmock
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - ">="
88
+ - !ruby/object:Gem::Version
89
+ version: '0'
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - ">="
95
+ - !ruby/object:Gem::Version
96
+ version: '0'
97
+ description: Makes development of SCEP services easier
98
+ email:
99
+ - christopher.thornton@onelogin.com
100
+ executables: []
101
+ extensions: []
102
+ extra_rdoc_files: []
103
+ files:
104
+ - ".gitignore"
105
+ - ".rspec"
106
+ - ".ruby-version"
107
+ - ".travis.yml"
108
+ - Gemfile
109
+ - README.md
110
+ - Rakefile
111
+ - lib/scep.rb
112
+ - lib/scep/endpoint.rb
113
+ - lib/scep/keypair.rb
114
+ - lib/scep/pkcs7_cert_only.rb
115
+ - lib/scep/pki_operation.rb
116
+ - lib/scep/pki_operation/base.rb
117
+ - lib/scep/pki_operation/proxy.rb
118
+ - lib/scep/pki_operation/request.rb
119
+ - lib/scep/pki_operation/response.rb
120
+ - lib/scep/version.rb
121
+ - scep.gemspec
122
+ - spec/console
123
+ - spec/fixtures/self-signed.crt
124
+ - spec/fixtures/self-signed.csr
125
+ - spec/fixtures/self-signed.key
126
+ - spec/lib/scep/endpoint_spec.rb
127
+ - spec/lib/scep/keypair_spec.rb
128
+ - spec/lib/scep/pkcs7_cert_only_spec.rb
129
+ - spec/lib/scep/pki_operation/base_spec.rb
130
+ - spec/lib/scep/pki_operation/proxy_spec.rb
131
+ - spec/lib/scep/pki_operation/request_spec.rb
132
+ - spec/lib/scep/pki_operation/response_spec.rb
133
+ - spec/spec_helper.rb
134
+ homepage: https://github.com/onelogin/scep-gem
135
+ licenses:
136
+ - Proprietary
137
+ metadata: {}
138
+ post_install_message:
139
+ rdoc_options: []
140
+ require_paths:
141
+ - lib
142
+ required_ruby_version: !ruby/object:Gem::Requirement
143
+ requirements:
144
+ - - ">="
145
+ - !ruby/object:Gem::Version
146
+ version: '0'
147
+ required_rubygems_version: !ruby/object:Gem::Requirement
148
+ requirements:
149
+ - - ">="
150
+ - !ruby/object:Gem::Version
151
+ version: '0'
152
+ requirements: []
153
+ rubyforge_project:
154
+ rubygems_version: 2.4.5
155
+ signing_key:
156
+ specification_version: 4
157
+ summary: SCEP libraries
158
+ test_files:
159
+ - spec/console
160
+ - spec/fixtures/self-signed.crt
161
+ - spec/fixtures/self-signed.csr
162
+ - spec/fixtures/self-signed.key
163
+ - spec/lib/scep/endpoint_spec.rb
164
+ - spec/lib/scep/keypair_spec.rb
165
+ - spec/lib/scep/pkcs7_cert_only_spec.rb
166
+ - spec/lib/scep/pki_operation/base_spec.rb
167
+ - spec/lib/scep/pki_operation/proxy_spec.rb
168
+ - spec/lib/scep/pki_operation/request_spec.rb
169
+ - spec/lib/scep/pki_operation/response_spec.rb
170
+ - spec/spec_helper.rb
171
+ has_rdoc: