| OLD | NEW |
| (Empty) |
| 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 # Use of this source code is governed by a BSD-style license that can be | |
| 3 # found in the LICENSE file. | |
| 4 | |
| 5 import asn1 | |
| 6 import hashlib | |
| 7 import os | |
| 8 | |
| 9 | |
| 10 # This file implements very minimal certificate and OCSP generation. It's | |
| 11 # designed to test revocation checking. | |
| 12 | |
| 13 def RandomNumber(length_in_bytes): | |
| 14 '''RandomNumber returns a random number of length 8*|length_in_bytes| bits''' | |
| 15 rand = os.urandom(length_in_bytes) | |
| 16 n = 0 | |
| 17 for x in rand: | |
| 18 n <<= 8 | |
| 19 n |= ord(x) | |
| 20 return n | |
| 21 | |
| 22 | |
| 23 def ModExp(n, e, p): | |
| 24 '''ModExp returns n^e mod p''' | |
| 25 r = 1 | |
| 26 while e != 0: | |
| 27 if e & 1: | |
| 28 r = (r*n) % p | |
| 29 e >>= 1 | |
| 30 n = (n*n) % p | |
| 31 return r | |
| 32 | |
| 33 # PKCS1v15_SHA256_PREFIX is the ASN.1 prefix for a SHA256 signature. | |
| 34 PKCS1v15_SHA256_PREFIX = '3031300d060960864801650304020105000420'.decode('hex') | |
| 35 | |
| 36 class RSA(object): | |
| 37 def __init__(self, modulus, e, d): | |
| 38 self.m = modulus | |
| 39 self.e = e | |
| 40 self.d = d | |
| 41 | |
| 42 self.modlen = 0 | |
| 43 m = modulus | |
| 44 while m != 0: | |
| 45 self.modlen += 1 | |
| 46 m >>= 8 | |
| 47 | |
| 48 def Sign(self, message): | |
| 49 digest = hashlib.sha256(message).digest() | |
| 50 prefix = PKCS1v15_SHA256_PREFIX | |
| 51 | |
| 52 em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest)) | |
| 53 em[0] = '\x00' | |
| 54 em[1] = '\x01' | |
| 55 em += "\x00" + prefix + digest | |
| 56 | |
| 57 n = 0 | |
| 58 for x in em: | |
| 59 n <<= 8 | |
| 60 n |= ord(x) | |
| 61 | |
| 62 s = ModExp(n, self.d, self.m) | |
| 63 out = [] | |
| 64 while s != 0: | |
| 65 out.append(s & 0xff) | |
| 66 s >>= 8 | |
| 67 out.reverse() | |
| 68 return '\x00' * (self.modlen - len(out)) + asn1.ToBytes(out) | |
| 69 | |
| 70 def ToDER(self): | |
| 71 return asn1.ToDER(asn1.SEQUENCE([self.m, self.e])) | |
| 72 | |
| 73 | |
| 74 def Name(cn = None, c = None, o = None): | |
| 75 names = asn1.SEQUENCE([]) | |
| 76 | |
| 77 if cn is not None: | |
| 78 names.children.append( | |
| 79 asn1.SET([ | |
| 80 asn1.SEQUENCE([ | |
| 81 COMMON_NAME, cn, | |
| 82 ]) | |
| 83 ]) | |
| 84 ) | |
| 85 | |
| 86 if c is not None: | |
| 87 names.children.append( | |
| 88 asn1.SET([ | |
| 89 asn1.SEQUENCE([ | |
| 90 COUNTRY, c, | |
| 91 ]) | |
| 92 ]) | |
| 93 ) | |
| 94 | |
| 95 if o is not None: | |
| 96 names.children.append( | |
| 97 asn1.SET([ | |
| 98 asn1.SEQUENCE([ | |
| 99 ORGANIZATION, o, | |
| 100 ]) | |
| 101 ]) | |
| 102 ) | |
| 103 | |
| 104 return names | |
| 105 | |
| 106 | |
| 107 # The private key and root certificate name are hard coded here: | |
| 108 | |
| 109 # This is the private key | |
| 110 KEY = RSA(0x00a71998f2930bfe73d031a87f133d2f378eeeeed52a77e44d0fc9ff6f07ff32cbf3
da999de4ed65832afcb0807f98787506539d258a0ce3c2c77967653099a9034a9b115a876c39a8c4
e4ed4acd0c64095946fb39eeeb47a0704dbb018acf48c3a1c4b895fc409fb4a340a986b1afc45519
ab9eca47c30185c771c64aa5ecf07d, | |
| 111 3, | |
| 112 0x6f6665f70cb2a9a28acbc5aa0cd374cfb49f49e371a542de0a86aa4a0554cc87f7e7
1113edf399021ca875aaffbafaf8aee268c3b15ded2c84fb9a4375bbc6011d841e57833bc6f998d2
5daf6fa7f166b233e3e54a4bae7a5aaaba21431324967d5ff3e1d4f413827994262115ca54396e70
68d0afa7af787a5782bc7040e6d3) | |
| 113 | |
| 114 # And the same thing in PEM format | |
| 115 KEY_PEM = '''-----BEGIN RSA PRIVATE KEY----- | |
| 116 MIICXAIBAAKBgQCnGZjykwv+c9AxqH8TPS83ju7u1Sp35E0Pyf9vB/8yy/PamZ3k | |
| 117 7WWDKvywgH+YeHUGU50ligzjwsd5Z2UwmakDSpsRWodsOajE5O1KzQxkCVlG+znu | |
| 118 60egcE27AYrPSMOhxLiV/ECftKNAqYaxr8RVGaueykfDAYXHccZKpezwfQIBAwKB | |
| 119 gG9mZfcMsqmiisvFqgzTdM+0n0njcaVC3gqGqkoFVMyH9+cRE+3zmQIcqHWq/7r6 | |
| 120 +K7iaMOxXe0shPuaQ3W7xgEdhB5XgzvG+ZjSXa9vp/FmsjPj5UpLrnpaqrohQxMk | |
| 121 ln1f8+HU9BOCeZQmIRXKVDlucGjQr6eveHpXgrxwQObTAkEA2wBAfuduw5G0/VfN | |
| 122 Wx66D5fbPccfYFqLM5LuTimLmNqzK2gIKXckB2sm44gJZ6wVlumaB1CSNug2LNYx | |
| 123 3cAjUwJBAMNUo1hbI8ugqqwI9kpxv9+2Heea4BlnXbS6tYF8pvkHMoliuxNbXmmB | |
| 124 u4zNB5iZ6V0ZZ4nvtUNo2cGr/h/Lcu8CQQCSACr/RPSCYSNTj948vya1D+d+hL+V | |
| 125 kbIiYfQ0G7Jl5yIc8AVw+hgE8hntBVuacrkPRmaviwwkms7IjsvpKsI3AkEAgjhs | |
| 126 5ZIX3RXHHVtO3EvVP86+mmdAEO+TzdHOVlMZ+1ohsOx8t5I+8QEnszNaZbvw6Lua | |
| 127 W/UjgkXmgR1UFTJMnwJBAKErmAw21/g3SST0a4wlyaGT/MbXL8Ouwnb5IOKQVe55 | |
| 128 CZdeVeSh6cJ4hAcQKfr2s1JaZTJFIBPGKAif5HqpydA= | |
| 129 -----END RSA PRIVATE KEY----- | |
| 130 ''' | |
| 131 | |
| 132 # Root certificate CN | |
| 133 ISSUER_CN = "Testing CA" | |
| 134 | |
| 135 # All certificates are issued under this policy OID, in the Google arc: | |
| 136 CERT_POLICY_OID = asn1.OID([1, 3, 6, 1, 4, 1, 11129, 2, 4, 1]) | |
| 137 | |
| 138 # These result in the following root certificate: | |
| 139 # -----BEGIN CERTIFICATE----- | |
| 140 # MIIB0TCCATqgAwIBAgIBATANBgkqhkiG9w0BAQUFADAVMRMwEQYDVQQDEwpUZXN0aW5nIENBMB4X | |
| 141 # DTEwMDEwMTA2MDAwMFoXDTMyMTIwMTA2MDAwMFowFTETMBEGA1UEAxMKVGVzdGluZyBDQTCBnTAN | |
| 142 # BgkqhkiG9w0BAQEFAAOBiwAwgYcCgYEApxmY8pML/nPQMah/Ez0vN47u7tUqd+RND8n/bwf/Msvz | |
| 143 # 2pmd5O1lgyr8sIB/mHh1BlOdJYoM48LHeWdlMJmpA0qbEVqHbDmoxOTtSs0MZAlZRvs57utHoHBN | |
| 144 # uwGKz0jDocS4lfxAn7SjQKmGsa/EVRmrnspHwwGFx3HGSqXs8H0CAQOjMzAxMBIGA1UdEwEB/wQI | |
| 145 # MAYBAf8CAQAwGwYDVR0gAQEABBEwDzANBgsrBgEEAdZ5AgHODzANBgkqhkiG9w0BAQUFAAOBgQA/ | |
| 146 # STb40A6D+93jMfLGQzXc997IsaJZdoPt7tYa8PqGJBL62EiTj+erd/H5pDZx/2/bcpOG4m9J56yg | |
| 147 # wOohbllw2TM+oeEd8syzV6X+1SIPnGI56JRrm3UXcHYx1Rq5loM9WKAiz/WmIWmskljsEQ7+542p | |
| 148 # q0pkHjs8nuXovSkUYA== | |
| 149 # -----END CERTIFICATE----- | |
| 150 | |
| 151 # If you update any of the above, you can generate a new root with the | |
| 152 # following line: | |
| 153 # print DERToPEM(MakeCertificate(ISSUER_CN, ISSUER_CN, 1, KEY, KEY, None)) | |
| 154 | |
| 155 | |
| 156 # Various OIDs | |
| 157 | |
| 158 AIA_OCSP = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1]) | |
| 159 AUTHORITY_INFORMATION_ACCESS = asn1.OID([1, 3, 6, 1, 5, 5, 7, 1, 1]) | |
| 160 BASIC_CONSTRAINTS = asn1.OID([2, 5, 29, 19]) | |
| 161 CERT_POLICIES = asn1.OID([2, 5, 29, 32]) | |
| 162 COMMON_NAME = asn1.OID([2, 5, 4, 3]) | |
| 163 COUNTRY = asn1.OID([2, 5, 4, 6]) | |
| 164 HASH_SHA1 = asn1.OID([1, 3, 14, 3, 2, 26]) | |
| 165 OCSP_TYPE_BASIC = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1, 1]) | |
| 166 ORGANIZATION = asn1.OID([2, 5, 4, 10]) | |
| 167 PUBLIC_KEY_RSA = asn1.OID([1, 2, 840, 113549, 1, 1, 1]) | |
| 168 SHA256_WITH_RSA_ENCRYPTION = asn1.OID([1, 2, 840, 113549, 1, 1, 11]) | |
| 169 | |
| 170 | |
| 171 def MakeCertificate( | |
| 172 issuer_cn, subject_cn, serial, pubkey, privkey, ocsp_url = None): | |
| 173 '''MakeCertificate returns a DER encoded certificate, signed by privkey.''' | |
| 174 extensions = asn1.SEQUENCE([]) | |
| 175 | |
| 176 # Default subject name fields | |
| 177 c = "XX" | |
| 178 o = "Testing Org" | |
| 179 | |
| 180 if issuer_cn == subject_cn: | |
| 181 # Root certificate. | |
| 182 c = None | |
| 183 o = None | |
| 184 extensions.children.append( | |
| 185 asn1.SEQUENCE([ | |
| 186 basic_constraints, | |
| 187 True, | |
| 188 asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ | |
| 189 True, # IsCA | |
| 190 0, # Path len | |
| 191 ]))), | |
| 192 ])) | |
| 193 | |
| 194 if ocsp_url is not None: | |
| 195 extensions.children.append( | |
| 196 asn1.SEQUENCE([ | |
| 197 AUTHORITY_INFORMATION_ACCESS, | |
| 198 False, | |
| 199 asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ | |
| 200 asn1.SEQUENCE([ | |
| 201 AIA_OCSP, | |
| 202 asn1.Raw(asn1.TagAndLength(0x86, len(ocsp_url)) + ocsp_url), | |
| 203 ]), | |
| 204 ]))), | |
| 205 ])) | |
| 206 | |
| 207 extensions.children.append( | |
| 208 asn1.SEQUENCE([ | |
| 209 CERT_POLICIES, | |
| 210 False, | |
| 211 asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ | |
| 212 asn1.SEQUENCE([ # PolicyInformation | |
| 213 CERT_POLICY_OID, | |
| 214 ]), | |
| 215 ]))), | |
| 216 ]) | |
| 217 ) | |
| 218 | |
| 219 tbsCert = asn1.ToDER(asn1.SEQUENCE([ | |
| 220 asn1.Explicit(0, 2), # Version | |
| 221 serial, | |
| 222 asn1.SEQUENCE([SHA256_WITH_RSA_ENCRYPTION, None]), # SignatureAlgorithm | |
| 223 Name(cn = issuer_cn), # Issuer | |
| 224 asn1.SEQUENCE([ # Validity | |
| 225 asn1.UTCTime("100101060000Z"), # NotBefore | |
| 226 asn1.UTCTime("321201060000Z"), # NotAfter | |
| 227 ]), | |
| 228 Name(cn = subject_cn, c = c, o = o), # Subject | |
| 229 asn1.SEQUENCE([ # SubjectPublicKeyInfo | |
| 230 asn1.SEQUENCE([ # Algorithm | |
| 231 PUBLIC_KEY_RSA, | |
| 232 None, | |
| 233 ]), | |
| 234 asn1.BitString(asn1.ToDER(pubkey)), | |
| 235 ]), | |
| 236 asn1.Explicit(3, extensions), | |
| 237 ])) | |
| 238 | |
| 239 return asn1.ToDER(asn1.SEQUENCE([ | |
| 240 asn1.Raw(tbsCert), | |
| 241 asn1.SEQUENCE([ | |
| 242 SHA256_WITH_RSA_ENCRYPTION, | |
| 243 None, | |
| 244 ]), | |
| 245 asn1.BitString(privkey.Sign(tbsCert)), | |
| 246 ])) | |
| 247 | |
| 248 | |
| 249 def MakeOCSPResponse(issuer_cn, issuer_key, serial, ocsp_state): | |
| 250 # https://tools.ietf.org/html/rfc2560 | |
| 251 issuer_name_hash = asn1.OCTETSTRING( | |
| 252 hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest()) | |
| 253 | |
| 254 issuer_key_hash = asn1.OCTETSTRING( | |
| 255 hashlib.sha1(asn1.ToDER(issuer_key)).digest()) | |
| 256 | |
| 257 cert_status = None | |
| 258 if ocsp_state == OCSP_STATE_REVOKED: | |
| 259 cert_status = asn1.Explicit(1, asn1.GeneralizedTime("20100101060000Z")) | |
| 260 elif ocsp_state == OCSP_STATE_UNKNOWN: | |
| 261 cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 2, 0)) | |
| 262 elif ocsp_state == OCSP_STATE_GOOD: | |
| 263 cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0)) | |
| 264 else: | |
| 265 raise ValueError('Bad OCSP state: ' + str(ocsp_state)) | |
| 266 | |
| 267 basic_resp_data_der = asn1.ToDER(asn1.SEQUENCE([ | |
| 268 asn1.Explicit(2, issuer_key_hash), | |
| 269 asn1.GeneralizedTime("20100101060000Z"), # producedAt | |
| 270 asn1.SEQUENCE([ | |
| 271 asn1.SEQUENCE([ # SingleResponse | |
| 272 asn1.SEQUENCE([ # CertID | |
| 273 asn1.SEQUENCE([ # hashAlgorithm | |
| 274 HASH_SHA1, | |
| 275 None, | |
| 276 ]), | |
| 277 issuer_name_hash, | |
| 278 issuer_key_hash, | |
| 279 serial, | |
| 280 ]), | |
| 281 cert_status, | |
| 282 asn1.GeneralizedTime("20100101060000Z"), # thisUpdate | |
| 283 asn1.Explicit(0, asn1.GeneralizedTime("20300101060000Z")), # nextUpdate | |
| 284 ]), | |
| 285 ]), | |
| 286 ])) | |
| 287 | |
| 288 basic_resp = asn1.SEQUENCE([ | |
| 289 asn1.Raw(basic_resp_data_der), | |
| 290 asn1.SEQUENCE([ | |
| 291 SHA256_WITH_RSA_ENCRYPTION, | |
| 292 None, | |
| 293 ]), | |
| 294 asn1.BitString(issuer_key.Sign(basic_resp_data_der)), | |
| 295 ]) | |
| 296 | |
| 297 resp = asn1.SEQUENCE([ | |
| 298 asn1.ENUMERATED(0), | |
| 299 asn1.Explicit(0, asn1.SEQUENCE([ | |
| 300 OCSP_TYPE_BASIC, | |
| 301 asn1.OCTETSTRING(asn1.ToDER(basic_resp)), | |
| 302 ])) | |
| 303 ]) | |
| 304 | |
| 305 return asn1.ToDER(resp) | |
| 306 | |
| 307 | |
| 308 def DERToPEM(der): | |
| 309 pem = '-----BEGIN CERTIFICATE-----\n' | |
| 310 pem += der.encode('base64') | |
| 311 pem += '-----END CERTIFICATE-----\n' | |
| 312 return pem | |
| 313 | |
| 314 OCSP_STATE_GOOD = 1 | |
| 315 OCSP_STATE_REVOKED = 2 | |
| 316 OCSP_STATE_INVALID = 3 | |
| 317 OCSP_STATE_UNAUTHORIZED = 4 | |
| 318 OCSP_STATE_UNKNOWN = 5 | |
| 319 | |
| 320 # unauthorizedDER is an OCSPResponse with a status of 6: | |
| 321 # SEQUENCE { ENUM(6) } | |
| 322 unauthorizedDER = '30030a0106'.decode('hex') | |
| 323 | |
| 324 def GenerateCertKeyAndOCSP(subject = "127.0.0.1", | |
| 325 ocsp_url = "http://127.0.0.1", | |
| 326 ocsp_state = OCSP_STATE_GOOD, | |
| 327 serial = 0): | |
| 328 '''GenerateCertKeyAndOCSP returns a (cert_and_key_pem, ocsp_der) where: | |
| 329 * cert_and_key_pem contains a certificate and private key in PEM format | |
| 330 with the given subject common name and OCSP URL. | |
| 331 * ocsp_der contains a DER encoded OCSP response or None if ocsp_url is | |
| 332 None''' | |
| 333 | |
| 334 if serial == 0: | |
| 335 serial = RandomNumber(16) | |
| 336 cert_der = MakeCertificate(ISSUER_CN, bytes(subject), serial, KEY, KEY, | |
| 337 bytes(ocsp_url)) | |
| 338 cert_pem = DERToPEM(cert_der) | |
| 339 | |
| 340 ocsp_der = None | |
| 341 if ocsp_url is not None: | |
| 342 if ocsp_state == OCSP_STATE_UNAUTHORIZED: | |
| 343 ocsp_der = unauthorizedDER | |
| 344 elif ocsp_state == OCSP_STATE_INVALID: | |
| 345 ocsp_der = '3' | |
| 346 else: | |
| 347 ocsp_der = MakeOCSPResponse(ISSUER_CN, KEY, serial, ocsp_state) | |
| 348 | |
| 349 return (cert_pem + KEY_PEM, ocsp_der) | |
| OLD | NEW |