mirror of
git://gcc.gnu.org/git/gcc.git
synced 2025-02-02 04:49:36 +08:00
8dc2499aa6
gotools/ * Makefile.am (go_cmd_cgo_files): Add ast_go118.go (check-go-tool): Copy golang.org/x/tools directories. * Makefile.in: Regenerate. Reviewed-on: https://go-review.googlesource.com/c/gofrontend/+/384695
96 lines
2.6 KiB
Go
96 lines
2.6 KiB
Go
// Copyright 2011 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package x509_test
|
|
|
|
import (
|
|
"crypto/ecdsa"
|
|
"crypto/elliptic"
|
|
"crypto/rand"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"crypto/x509/pkix"
|
|
"internal/testenv"
|
|
"math/big"
|
|
"runtime"
|
|
"testing"
|
|
"time"
|
|
)
|
|
|
|
func TestHybridPool(t *testing.T) {
|
|
if !(runtime.GOOS == "windows" || runtime.GOOS == "darwin" || runtime.GOOS == "ios") {
|
|
t.Skipf("platform verifier not available on %s", runtime.GOOS)
|
|
}
|
|
if !testenv.HasExternalNetwork() {
|
|
t.Skip()
|
|
}
|
|
|
|
// Get the google.com chain, which should be valid on all platforms we
|
|
// are testing
|
|
c, err := tls.Dial("tcp", "google.com:443", &tls.Config{InsecureSkipVerify: true})
|
|
if err != nil {
|
|
t.Fatalf("tls connection failed: %s", err)
|
|
}
|
|
googChain := c.ConnectionState().PeerCertificates
|
|
|
|
rootTmpl := &x509.Certificate{
|
|
SerialNumber: big.NewInt(1),
|
|
Subject: pkix.Name{CommonName: "Go test root"},
|
|
IsCA: true,
|
|
BasicConstraintsValid: true,
|
|
NotBefore: time.Now().Add(-time.Hour),
|
|
NotAfter: time.Now().Add(time.Hour * 10),
|
|
}
|
|
k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
|
if err != nil {
|
|
t.Fatalf("failed to generate test key: %s", err)
|
|
}
|
|
rootDER, err := x509.CreateCertificate(rand.Reader, rootTmpl, rootTmpl, k.Public(), k)
|
|
if err != nil {
|
|
t.Fatalf("failed to create test cert: %s", err)
|
|
}
|
|
root, err := x509.ParseCertificate(rootDER)
|
|
if err != nil {
|
|
t.Fatalf("failed to parse test cert: %s", err)
|
|
}
|
|
|
|
pool, err := x509.SystemCertPool()
|
|
if err != nil {
|
|
t.Fatalf("SystemCertPool failed: %s", err)
|
|
}
|
|
opts := x509.VerifyOptions{Roots: pool}
|
|
|
|
_, err = googChain[0].Verify(opts)
|
|
if err != nil {
|
|
t.Fatalf("verification failed for google.com chain (empty pool): %s", err)
|
|
}
|
|
|
|
pool.AddCert(root)
|
|
|
|
_, err = googChain[0].Verify(opts)
|
|
if err != nil {
|
|
t.Fatalf("verification failed for google.com chain (hybrid pool): %s", err)
|
|
}
|
|
|
|
certTmpl := &x509.Certificate{
|
|
SerialNumber: big.NewInt(1),
|
|
NotBefore: time.Now().Add(-time.Hour),
|
|
NotAfter: time.Now().Add(time.Hour * 10),
|
|
DNSNames: []string{"example.com"},
|
|
}
|
|
certDER, err := x509.CreateCertificate(rand.Reader, certTmpl, rootTmpl, k.Public(), k)
|
|
if err != nil {
|
|
t.Fatalf("failed to create test cert: %s", err)
|
|
}
|
|
cert, err := x509.ParseCertificate(certDER)
|
|
if err != nil {
|
|
t.Fatalf("failed to parse test cert: %s", err)
|
|
}
|
|
|
|
_, err = cert.Verify(opts)
|
|
if err != nil {
|
|
t.Fatalf("verification failed for custom chain (hybrid pool): %s", err)
|
|
}
|
|
}
|