Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(201)

Unified Diff: net/data/name_constraints_unittest/scripts/generate_name_constraints.py

Issue 1214933009: Class for parsing and evaluating RFC 5280 NameConstraints. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@compare_DN2
Patch Set: ios copy_test_data Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/data/name_constraints_unittest/scripts/generate_name_constraints.py
diff --git a/net/data/name_constraints_unittest/scripts/generate_name_constraints.py b/net/data/name_constraints_unittest/scripts/generate_name_constraints.py
new file mode 100755
index 0000000000000000000000000000000000000000..df298110910ed3ea86fe5ff7b2cbbd960e1255d6
--- /dev/null
+++ b/net/data/name_constraints_unittest/scripts/generate_name_constraints.py
@@ -0,0 +1,418 @@
+#!/usr/bin/env python
+# Copyright 2015 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+import base64
+import copy
+import os
+import random
+import subprocess
+import sys
+import tempfile
+
+sys.path += [os.path.join('..', '..', 'verify_name_match_unittest', 'scripts')]
+
+import generate_names
+
+
+def generate(s, fn):
+ out_fn = os.path.join('..', 'name_constraints', fn + '.pem')
+ conf_tempfile = tempfile.NamedTemporaryFile()
+ conf_tempfile.write(str(s))
+ conf_tempfile.flush()
+ der_tmpfile = tempfile.NamedTemporaryFile()
+ description_tmpfile = tempfile.NamedTemporaryFile()
+ subprocess.check_call(['openssl', 'asn1parse', '-genconf', conf_tempfile.name,
+ '-i', '-out', der_tmpfile.name],
+ stdout=description_tmpfile)
+ conf_tempfile.close()
+
+ output_file = open(out_fn, 'w')
+ description_tmpfile.seek(0)
+ output_file.write(description_tmpfile.read())
+ output_file.write('-----BEGIN %s-----\n' % s.token())
+ output_file.write(base64.encodestring(der_tmpfile.read()))
+ output_file.write('-----END %s-----\n' % s.token())
+ output_file.close()
+
+
+class SubjectAltNameGenerator:
+ def __init__(self):
+ self.names = []
+
+ def token(self):
+ return "SUBJECT ALTERNATIVE NAME"
+
+ def add_name(self, general_name):
+ self.names.append(general_name)
+
+ def __str__(self):
+ s = "asn1 = SEQUENCE:subjectAltNameSequence\n[subjectAltNameSequence]\n"
+ s_suffix = ""
+ for n, name in enumerate(self.names):
+ n1, n2 = (str(name) + '\n').split('\n', 1)
+ if n2:
+ s_suffix += n2 + '\n'
+ s += '%s%s\n' % (n, n1)
+
+ return s + s_suffix
+
+
+class NameConstraintsGenerator:
+ def __init__(self):
+ self.permitted = []
+ self.excluded = []
+
+ def token(self):
+ return "NAME CONSTRAINTS"
+
+ def add_permitted(self, general_name):
+ self.permitted.append(general_name)
+
+ def add_excluded(self, general_name):
+ self.excluded.append(general_name)
+
+ def __str__(self):
+ s = "asn1 = SEQUENCE:nameConstraintsSequence\n[nameConstraintsSequence]\n"
+
+ if self.permitted:
+ s += "permittedSubtrees = IMPLICIT:0,SEQUENCE:permittedSubtreesSequence\n"
+ if self.excluded:
+ s += "excludedSubtrees = IMPLICIT:1,SEQUENCE:excludedSubtreesSequence\n"
+
+ if self.permitted:
+ s += "[permittedSubtreesSequence]\n"
+ for n, subtree in enumerate(self.permitted):
+ s += 'subtree%i = SEQUENCE:permittedSubtree%i\n' % (n, n)
+
+ if self.excluded:
+ s += "[excludedSubtreesSequence]\n"
+ for n, subtree in enumerate(self.excluded):
+ s += 'subtree%i = SEQUENCE:excludedSubtree%i\n' % (n, n)
+
+ for n, subtree in enumerate(self.permitted):
+ s += '[permittedSubtree%i]\n%s\n' % (n, subtree)
+
+ for n, subtree in enumerate(self.excluded):
+ s += '[excludedSubtree%i]\n%s\n' % (n, subtree)
+
+ return s
+
+
+def otherName():
+ i = random.randint(0, sys.maxint)
+ s = 'otherName = IMPLICIT:0,SEQUENCE:otherNameSequence%i\n' % i
+ s += '[otherNameSequence%i]\n' % i
+ s += 'type_id = OID:1.2.3.4.5\n'
+ s += 'value = FORMAT:HEX,OCTETSTRING:DEADBEEF\n'
+ return s
+
+
+def rfc822Name(name):
+ return 'rfc822Name = IMPLICIT:1,IA5STRING:' + name
+
+
+def dNSName(name):
+ return 'dNSName = IMPLICIT:2,IA5STRING:' + name
+
+
+def x400Address():
+ i = random.randint(0, sys.maxint)
+ s = 'x400Address = IMPLICIT:3,SEQUENCE:x400AddressSequence%i\n' % i
+ s += '[x400AddressSequence%i]\n' % i
+ s += 'builtinstandardattributes = SEQUENCE:BuiltInStandardAttributes%i\n' % i
+ s += '[BuiltInStandardAttributes%i]\n' % i
+ s += 'countryname = EXPLICIT:1A,PRINTABLESTRING:US\n'
+ return s
+
+
+def directoryName(name):
+ return str(name).replace(
+ 'asn1 = SEQUENCE', 'directoryName = IMPLICIT:4,SEQUENCE')
+
+
+def ediPartyName():
+ i = random.randint(0, sys.maxint)
+ s = 'ediPartyName = IMPLICIT:5,SEQUENCE:ediPartyNameSequence%i\n' % i
+ s += '[ediPartyNameSequence%i]\n' % i
+ s += 'partyName = IMPLICIT:1,UTF8:foo\n'
+ return s
+
+
+def uniformResourceIdentifier(name):
+ return 'uniformResourceIdentifier = IMPLICIT:6,IA5STRING:' + name
+
+
+def iPAddress(addr):
+ assert len(addr) in (4,16)
+ addr_str = ""
+ for addr_byte in addr:
+ addr_str += '%02X'%(addr_byte)
+ return 'iPAddress = IMPLICIT:7,FORMAT:HEX,OCTETSTRING:' + addr_str
+
+
+def iPAddressRange(addr, netmask):
+ assert len(addr) == len(netmask)
+ assert len(addr) in (4,16)
+ addr_str = ""
+ netmask_str = ""
+ for addr_byte, mask_byte in map(None, addr, netmask):
+ assert (addr_byte & ~mask_byte) == 0
+ addr_str += '%02X'%(addr_byte)
+ netmask_str += '%02X'%(mask_byte)
+ return ('iPAddress = IMPLICIT:7,FORMAT:HEX,OCTETSTRING:' + addr_str +
+ netmask_str)
+
+
+def registeredID(oid):
+ return 'registeredID = IMPLICIT:8,OID:' + oid
+
+
+def WithMinMax(val, minimum=None, maximum=None):
+ s = val
+ s += '\n'
+ assert '\n[' not in s
+ if minimum is not None:
+ s += 'minimum = IMPLICIT:0,INTEGER:%i\n' % minimum
+ if maximum is not None:
+ s += 'maximum = IMPLICIT:1,INTEGER:%i\n' % maximum
+ return s
+
+
+def main():
+ c = NameConstraintsGenerator()
+ c.add_permitted(dNSName("permitted.example.com"))
+ c.add_permitted(dNSName("permitted.example2.com"))
+ c.add_permitted(dNSName("permitted.example3.com."))
+ c.add_permitted(dNSName("alsopermitted.example.com"))
+ c.add_excluded(dNSName("excluded.permitted.example.com"))
+ c.add_permitted(dNSName("stillnotpermitted.excluded.permitted.example.com"))
+ c.add_excluded(dNSName("extraneousexclusion.example.com"))
+ generate(c, "dnsname")
+
+ c = NameConstraintsGenerator()
+ c.add_excluded(dNSName("excluded.permitted.example.com"))
+ generate(c, "dnsname-excluded")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(dNSName("permitted.example.com"))
+ c.add_excluded(dNSName(""))
+ generate(c, "dnsname-excludeall")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(iPAddressRange((192,168,0,0),(255,255,0,0)))
+ c.add_excluded(iPAddressRange((192,168,5,0),(255,255,255,0)))
+ c.add_permitted(iPAddressRange((192,168,5,32),(255,255,255,96)))
+ c.add_permitted(iPAddressRange((192,167,5,32),(255,255,255,96)))
+ c.add_excluded(iPAddressRange((192,166,5,32),(255,255,255,96)))
+ c.add_permitted(iPAddressRange((1,2,3,4,5,6,7,8,9,10,11,12,0,0,0,0),
+ (255,255,255,255,255,255,255,255,
+ 255,255,255,255,0,0,0,0)))
+ c.add_excluded(iPAddressRange((1,2,3,4,5,6,7,8,9,10,11,12,5,0,0,0),
+ (255,255,255,255,255,255,255,255,
+ 255,255,255,255,255,0,0,0)))
+ c.add_permitted(iPAddressRange((1,2,3,4,5,6,7,8,9,10,11,12,5,32,0,0),
+ (255,255,255,255,255,255,255,255,
+ 255,255,255,255,255,96,0,0)))
+ c.add_permitted(iPAddressRange((1,2,3,4,5,6,7,8,9,10,11,11,5,32,0,0),
+ (255,255,255,255,255,255,255,255,
+ 255,255,255,255,255,96,0,0)))
+ c.add_excluded(iPAddressRange((1,2,3,4,5,6,7,8,9,10,11,10,5,32,0,0),
+ (255,255,255,255,255,255,255,255,
+ 255,255,255,255,255,96,0,0)))
+ generate(c, "ipaddress")
+
+ c = NameConstraintsGenerator()
+ c.add_excluded(iPAddressRange((192,168,5,0),(255,255,255,0)))
+ generate(c, "ipaddress-excluded")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(iPAddressRange((192,168,0,0),(255,255,0,0)))
+ c.add_permitted(iPAddressRange((1,2,3,4,5,6,7,8,9,10,11,12,0,0,0,0),
+ (255,255,255,255,255,255,255,255,
+ 255,255,255,255,0,0,0,0)))
+ c.add_excluded(iPAddressRange((0,0,0,0),(0,0,0,0)))
+ c.add_excluded(iPAddressRange((0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0),
+ (0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0)))
+ generate(c, "ipaddress-excludeall")
+
+ n_us = generate_names.NameGenerator()
+ n_us.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'US')
+ generate(n_us, "name-us")
+ n_us_az = copy.deepcopy(n_us)
+ n_us_az.add_rdn().add_attr('stateOrProvinceName', 'UTF8', 'Arizona')
+ generate(n_us_az, "name-us-arizona")
+ n_us_ca = copy.deepcopy(n_us)
+ n_us_ca.add_rdn().add_attr('stateOrProvinceName', 'UTF8', 'California')
+ generate(n_us_ca, "name-us-california")
+ n_us_ca_mountain_view = copy.deepcopy(n_us_ca)
+ n_us_ca_mountain_view.add_rdn().add_attr(
+ 'localityName', 'UTF8', 'Mountain View')
+ generate(n_us_ca_mountain_view, "name-us-california-mountain_view")
+
+ n_jp = generate_names.NameGenerator()
+ n_jp.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'JP')
+ generate(n_jp, "name-jp")
+ n_jp_tokyo = copy.deepcopy(n_jp)
+ n_jp_tokyo.add_rdn().add_attr(
+ 'stateOrProvinceName', 'UTF8', '\xe6\x9d\xb1\xe4\xba\xac', 'FORMAT:UTF8')
+ generate(n_jp_tokyo, "name-jp-tokyo")
+
+ n_us_az_foodotcom = copy.deepcopy(n_us_az)
+ n_us_az_foodotcom.add_rdn().add_attr('commonName', 'UTF8', 'foo.com')
+ generate(n_us_az_foodotcom, "name-us-arizona-foo.com")
+
+ n_us_az_permittedexamplecom = copy.deepcopy(n_us_az)
+ n_us_az_permittedexamplecom.add_rdn().add_attr('commonName', 'UTF8',
+ 'permitted.example.com')
+ generate(n_us_az_permittedexamplecom, "name-us-arizona-permitted.example.com")
+
+ n_us_ca_permittedexamplecom = copy.deepcopy(n_us_ca)
+ n_us_ca_permittedexamplecom.add_rdn().add_attr('commonName', 'UTF8',
+ 'permitted.example.com')
+ generate(n_us_ca_permittedexamplecom,
+ "name-us-california-permitted.example.com")
+
+ n_us_az_ip1111 = copy.deepcopy(n_us_az)
+ n_us_az_ip1111.add_rdn().add_attr('commonName', 'UTF8', '1.1.1.1')
+ generate(n_us_az_ip1111, "name-us-arizona-1.1.1.1")
+
+ n_us_az_192_168_1_1 = copy.deepcopy(n_us_az)
+ n_us_az_192_168_1_1.add_rdn().add_attr('commonName', 'UTF8', '192.168.1.1')
+ generate(n_us_az_192_168_1_1, "name-us-arizona-192.168.1.1")
+
+ n_us_az_192_168_1_1_bmp = copy.deepcopy(n_us_az)
+ n_us_az_192_168_1_1_bmp.add_rdn().add_attr('commonName', 'BMPSTRING',
+ '192.168.1.1')
+ generate(n_us_az_192_168_1_1_bmp, "name-us-arizona-192.168.1.1-bmp")
+
+ n_us_az_192_168_1_1_t61 = copy.deepcopy(n_us_az)
+ n_us_az_192_168_1_1_t61.add_rdn().add_attr('commonName', 'T61STRING',
+ '192.168.1.1')
+ generate(n_us_az_192_168_1_1_t61, "name-us-arizona-192.168.1.1-t61")
+
+ n_us_az_ipv6 = copy.deepcopy(n_us_az)
+ n_us_az_ipv6.add_rdn().add_attr('commonName', 'UTF8',
+ '102:304:506:708:90a:b0c::1')
+ generate(n_us_az_ipv6, "name-us-arizona-ipv6")
+
+ n_us_ca_192_168_1_1 = copy.deepcopy(n_us_ca)
+ n_us_ca_192_168_1_1.add_rdn().add_attr('commonName', 'UTF8', '192.168.1.1')
+ generate(n_us_ca_192_168_1_1, "name-us-california-192.168.1.1")
+
+ n_us_az_email = copy.deepcopy(n_us_az)
+ n_us_az_email.add_rdn().add_attr('emailAddress', 'IA5STRING',
+ 'bar@example.com')
+ generate(n_us_az_email, "name-us-arizona-email")
+
+ n_ca = generate_names.NameGenerator()
+ n_ca.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'CA')
+ generate(n_ca, "name-ca")
+
+ n_de = generate_names.NameGenerator()
+ n_de.add_rdn().add_attr('countryName', 'PRINTABLESTRING', 'DE')
+ generate(n_de, "name-de")
+
+ n_empty = generate_names.NameGenerator()
+ generate(n_empty, "name-empty")
+
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(directoryName(n_us))
+ c.add_excluded(directoryName(n_us_ca))
+ c.add_permitted(directoryName(n_us_ca_mountain_view))
+ c.add_excluded(directoryName(n_de))
+ c.add_permitted(directoryName(n_jp_tokyo))
+ generate(c, "directoryname")
+
+ c = NameConstraintsGenerator()
+ c.add_excluded(directoryName(n_us_ca))
+ generate(c, "directoryname-excluded")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(directoryName(n_us))
+ c.add_excluded(directoryName(n_empty))
+ generate(c, "directoryname-excludeall")
+
+ san = SubjectAltNameGenerator()
+ san.add_name(dNSName("permitted.example.com"))
+ san.add_name(iPAddress((192,168,1,2)))
+ san.add_name(directoryName(n_us_az))
+ generate(san, "san-permitted")
+
+ san2 = copy.deepcopy(san)
+ san2.add_name(dNSName("foo.stillnotpermitted.excluded.permitted.example.com"))
+ generate(san2, "san-excluded-dnsname")
+
+ san2 = copy.deepcopy(san)
+ san2.add_name(iPAddress((192,168,5,5)))
+ generate(san2, "san-excluded-ipaddress")
+
+ san2 = copy.deepcopy(san)
+ san2.add_name(directoryName(n_us_ca_mountain_view))
+ generate(san2, "san-excluded-directoryname")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(otherName())
+ generate(c, "othername-permitted")
+ c = NameConstraintsGenerator()
+ c.add_excluded(otherName())
+ generate(c, "othername-excluded")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(rfc822Name("foo@example.com"))
+ generate(c, "rfc822name-permitted")
+ c = NameConstraintsGenerator()
+ c.add_excluded(rfc822Name("foo@example.com"))
+ generate(c, "rfc822name-excluded")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(x400Address())
+ generate(c, "x400address-permitted")
+ c = NameConstraintsGenerator()
+ c.add_excluded(x400Address())
+ generate(c, "x400address-excluded")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(ediPartyName())
+ generate(c, "edipartyname-permitted")
+ c = NameConstraintsGenerator()
+ c.add_excluded(ediPartyName())
+ generate(c, "edipartyname-excluded")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(registeredID("1.2.3.4"))
+ generate(c, "registeredid-permitted")
+ c = NameConstraintsGenerator()
+ c.add_excluded(registeredID("1.2.3.4"))
+ generate(c, "registeredid-excluded")
+
+ c = NameConstraintsGenerator()
+ generate(c, "invalid-no_subtrees")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(WithMinMax(dNSName("permitted.example.com"), minimum=0))
+ generate(c, "dnsname-with_min_0")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(WithMinMax(dNSName("permitted.example.com"), minimum=1))
+ generate(c, "dnsname-with_min_1")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(WithMinMax(
+ dNSName("permitted.example.com"), minimum=0, maximum=2))
+ generate(c, "dnsname-with_min_0_and_max")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(WithMinMax(
+ dNSName("permitted.example.com"), minimum=1, maximum=2))
+ generate(c, "dnsname-with_min_1_and_max")
+
+ c = NameConstraintsGenerator()
+ c.add_permitted(WithMinMax(dNSName("permitted.example.com"), maximum=2))
+ generate(c, "dnsname-with_max")
+
+
+if __name__ == '__main__':
+ main()

Powered by Google App Engine
This is Rietveld 408576698