keystore.go 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
  1. package dsig
  2. import (
  3. "crypto/rand"
  4. "crypto/rsa"
  5. "crypto/x509"
  6. "math/big"
  7. "time"
  8. )
  9. type X509KeyStore interface {
  10. GetKeyPair() (privateKey *rsa.PrivateKey, cert []byte, err error)
  11. }
  12. type X509ChainStore interface {
  13. GetChain() (certs [][]byte, err error)
  14. }
  15. type X509CertificateStore interface {
  16. Certificates() (roots []*x509.Certificate, err error)
  17. }
  18. type MemoryX509CertificateStore struct {
  19. Roots []*x509.Certificate
  20. }
  21. func (mX509cs *MemoryX509CertificateStore) Certificates() ([]*x509.Certificate, error) {
  22. return mX509cs.Roots, nil
  23. }
  24. type MemoryX509KeyStore struct {
  25. privateKey *rsa.PrivateKey
  26. cert []byte
  27. }
  28. func (ks *MemoryX509KeyStore) GetKeyPair() (*rsa.PrivateKey, []byte, error) {
  29. return ks.privateKey, ks.cert, nil
  30. }
  31. func RandomKeyStoreForTest() X509KeyStore {
  32. key, err := rsa.GenerateKey(rand.Reader, 1024)
  33. if err != nil {
  34. panic(err)
  35. }
  36. now := time.Now()
  37. template := &x509.Certificate{
  38. SerialNumber: big.NewInt(0),
  39. NotBefore: now.Add(-5 * time.Minute),
  40. NotAfter: now.Add(365 * 24 * time.Hour),
  41. KeyUsage: x509.KeyUsageDigitalSignature,
  42. ExtKeyUsage: []x509.ExtKeyUsage{},
  43. BasicConstraintsValid: true,
  44. }
  45. cert, err := x509.CreateCertificate(rand.Reader, template, template, &key.PublicKey, key)
  46. if err != nil {
  47. panic(err)
  48. }
  49. return &MemoryX509KeyStore{
  50. privateKey: key,
  51. cert: cert,
  52. }
  53. }