mirror of
https://github.com/zeromicro/go-zero.git
synced 2026-05-10 08:29:58 +08:00
fix: critical security fixes in core/codec (S0) (#5479)
This commit is contained in:
@@ -1,7 +1,12 @@
|
||||
package codec
|
||||
|
||||
import (
|
||||
"crypto/ecdsa"
|
||||
"crypto/elliptic"
|
||||
"crypto/rand"
|
||||
"crypto/x509"
|
||||
"encoding/base64"
|
||||
"encoding/pem"
|
||||
"os"
|
||||
"testing"
|
||||
|
||||
@@ -58,3 +63,78 @@ func TestBadPubKey(t *testing.T) {
|
||||
_, err := NewRsaEncrypter([]byte("foo"))
|
||||
assert.Equal(t, ErrPublicKey, err)
|
||||
}
|
||||
|
||||
func TestOAEPCryption(t *testing.T) {
|
||||
enc, err := NewRsaOAEPEncrypter([]byte(pubKey))
|
||||
assert.Nil(t, err)
|
||||
ret, err := enc.Encrypt([]byte(testBody))
|
||||
assert.Nil(t, err)
|
||||
|
||||
file, err := fs.TempFilenameWithText(priKey)
|
||||
assert.Nil(t, err)
|
||||
defer os.Remove(file)
|
||||
dec, err := NewRsaOAEPDecrypter(file)
|
||||
assert.Nil(t, err)
|
||||
actual, err := dec.Decrypt(ret)
|
||||
assert.Nil(t, err)
|
||||
assert.Equal(t, testBody, string(actual))
|
||||
|
||||
actual, err = dec.DecryptBase64(base64.StdEncoding.EncodeToString(ret))
|
||||
assert.Nil(t, err)
|
||||
assert.Equal(t, testBody, string(actual))
|
||||
|
||||
// empty input
|
||||
actual, err = dec.DecryptBase64("")
|
||||
assert.Nil(t, err)
|
||||
assert.Nil(t, actual)
|
||||
}
|
||||
|
||||
func TestOAEPBadKeys(t *testing.T) {
|
||||
_, err := NewRsaOAEPEncrypter([]byte("bad"))
|
||||
assert.Equal(t, ErrPublicKey, err)
|
||||
|
||||
_, err = NewRsaOAEPDecrypter("nonexistent")
|
||||
assert.Error(t, err)
|
||||
|
||||
// valid PEM but invalid private key content
|
||||
badPem, err := fs.TempFilenameWithText("-----BEGIN RSA PRIVATE KEY-----\nYmFk\n-----END RSA PRIVATE KEY-----")
|
||||
assert.Nil(t, err)
|
||||
defer os.Remove(badPem)
|
||||
_, err = NewRsaOAEPDecrypter(badPem)
|
||||
assert.Error(t, err)
|
||||
|
||||
// not PEM content at all
|
||||
notPem, err := fs.TempFilenameWithText("not a pem file")
|
||||
assert.Nil(t, err)
|
||||
defer os.Remove(notPem)
|
||||
_, err = NewRsaOAEPDecrypter(notPem)
|
||||
assert.Equal(t, ErrPrivateKey, err)
|
||||
}
|
||||
|
||||
func TestOAEPEncrypterParseError(t *testing.T) {
|
||||
// valid PEM block but invalid public key content
|
||||
badPub := []byte("-----BEGIN PUBLIC KEY-----\nYmFk\n-----END PUBLIC KEY-----")
|
||||
_, err := NewRsaOAEPEncrypter(badPub)
|
||||
assert.Error(t, err)
|
||||
}
|
||||
|
||||
func TestOAEPEncrypterNonRsaKey(t *testing.T) {
|
||||
ecKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
||||
assert.Nil(t, err)
|
||||
derBytes, err := x509.MarshalPKIXPublicKey(&ecKey.PublicKey)
|
||||
assert.Nil(t, err)
|
||||
ecPem := pem.EncodeToMemory(&pem.Block{Type: "PUBLIC KEY", Bytes: derBytes})
|
||||
_, err = NewRsaOAEPEncrypter(ecPem)
|
||||
assert.Equal(t, ErrNotRsaKey, err)
|
||||
}
|
||||
|
||||
func TestOAEPDecryptBase64Error(t *testing.T) {
|
||||
file, err := fs.TempFilenameWithText(priKey)
|
||||
assert.Nil(t, err)
|
||||
defer os.Remove(file)
|
||||
dec, err := NewRsaOAEPDecrypter(file)
|
||||
assert.Nil(t, err)
|
||||
|
||||
_, err = dec.DecryptBase64("not-valid-base64!!!")
|
||||
assert.Error(t, err)
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user