1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/memory/scoped_ptr.h"
6 #include "crypto/ec_private_key.h"
7 #include "crypto/openssl_util.h"
8 #include "crypto/scoped_openssl_types.h"
9 #include "net/cert/x509_util.h"
10 #include "net/cert/x509_util_openssl.h"
11 #include "testing/gtest/include/gtest/gtest.h"
17 typedef crypto::ScopedOpenSSL
<X509
, X509_free
>::Type ScopedX509
;
19 // Verify that a given certificate was signed with the private key corresponding
20 // to a given public key.
21 // |der_cert| is the DER-encoded X.509 certificate.
22 // |der_spki| is the DER-encoded public key of the signer.
23 void VerifyCertificateSignature(const std::string
& der_cert
,
24 const std::vector
<uint8
>& der_spki
) {
25 const unsigned char* cert_data
=
26 reinterpret_cast<const unsigned char*>(der_cert
.data());
27 int cert_data_len
= static_cast<int>(der_cert
.size());
28 ScopedX509
cert(d2i_X509(NULL
, &cert_data
, cert_data_len
));
29 ASSERT_TRUE(cert
.get());
31 // NOTE: SignatureVerifier wants the DER-encoded ASN.1 AlgorithmIdentifier
32 // but there is no OpenSSL API to extract it from an X509 object (!?)
33 // Use X509_verify() directly instead, which takes an EVP_PKEY.
34 const unsigned char* pub_key_data
= &der_spki
.front();
35 int pub_key_len
= static_cast<int>(der_spki
.size());
36 crypto::ScopedEVP_PKEY
pub_key(d2i_PUBKEY(NULL
, &pub_key_data
, pub_key_len
));
37 ASSERT_TRUE(pub_key
.get());
39 // NOTE: X509_verify() returns 1 in case of succes, 0 or -1 on error.
40 EXPECT_EQ(1, X509_verify(cert
.get(), pub_key
.get()));
43 // Verify the attributes of a domain-bound certificate.
44 // |domain| is the bound domain name.
45 // |der_cert| is the DER-encoded X.509 certificate.
46 void VerifyChannelID(const std::string
& domain
,
47 const std::string
& der_cert
) {
48 // Origin Bound Cert OID.
49 static const char oid_string
[] = "1.3.6.1.4.1.11129.2.1.6";
50 crypto::ScopedOpenSSL
<ASN1_OBJECT
, ASN1_OBJECT_free
>::Type
oid_obj(
51 OBJ_txt2obj(oid_string
, 0));
52 ASSERT_TRUE(oid_obj
.get());
54 const unsigned char* cert_data
=
55 reinterpret_cast<const unsigned char*>(der_cert
.data());
56 int cert_data_len
= static_cast<int>(der_cert
.size());
57 ScopedX509
cert(d2i_X509(NULL
, &cert_data
, cert_data_len
));
58 ASSERT_TRUE(cert
.get());
60 // Find the extension.
61 int ext_pos
= X509_get_ext_by_OBJ(cert
.get(), oid_obj
.get(), -1);
62 ASSERT_NE(-1, ext_pos
);
63 X509_EXTENSION
* ext
= X509_get_ext(cert
.get(), ext_pos
);
66 // Check its value, it must be an ASN.1 IA5STRING
67 // Which means <tag> <length> <domain>, with:
69 // <length> is the domain length, a single byte for short forms.
70 // <domain> are the domain characters.
71 // See http://en.wikipedia.org/wiki/X.690
72 ASN1_STRING
* value_asn1
= X509_EXTENSION_get_data(ext
);
73 ASSERT_TRUE(value_asn1
);
74 std::string
value_str(reinterpret_cast<const char*>(value_asn1
->data
),
77 // Check that the domain size is small enough for short form.
78 ASSERT_LE(domain
.size(), 127U) << "Domain is too long!";
79 std::string value_expected
;
80 value_expected
.resize(2);
81 value_expected
[0] = 22;
82 value_expected
[1] = static_cast<char>(domain
.size());
83 value_expected
+= domain
;
85 EXPECT_EQ(value_expected
, value_str
);
90 TEST(X509UtilOpenSSLTest
, IsSupportedValidityRange
) {
91 base::Time now
= base::Time::Now();
92 EXPECT_TRUE(x509_util::IsSupportedValidityRange(now
, now
));
93 EXPECT_FALSE(x509_util::IsSupportedValidityRange(
94 now
, now
- base::TimeDelta::FromSeconds(1)));
96 // See x509_util_openssl.cc to see how these were computed.
97 const int64 kDaysFromYear0001ToUnixEpoch
= 719162;
98 const int64 kDaysFromUnixEpochToYear10000
= 2932896 + 1;
100 // When computing too_old / too_late, add one day to account for
101 // possible leap seconds.
102 base::Time too_old
= base::Time::UnixEpoch() -
103 base::TimeDelta::FromDays(kDaysFromYear0001ToUnixEpoch
+ 1);
105 base::Time too_late
= base::Time::UnixEpoch() +
106 base::TimeDelta::FromDays(kDaysFromUnixEpochToYear10000
+ 1);
108 EXPECT_FALSE(x509_util::IsSupportedValidityRange(too_old
, too_old
));
109 EXPECT_FALSE(x509_util::IsSupportedValidityRange(too_old
, now
));
111 EXPECT_FALSE(x509_util::IsSupportedValidityRange(now
, too_late
));
112 EXPECT_FALSE(x509_util::IsSupportedValidityRange(too_late
, too_late
));
115 TEST(X509UtilOpenSSLTest
, CreateChannelIDEC
) {
116 // Create a sample ASCII weborigin.
117 std::string domain
= "weborigin.com";
118 base::Time now
= base::Time::Now();
120 scoped_ptr
<crypto::ECPrivateKey
> private_key(
121 crypto::ECPrivateKey::Create());
122 std::string der_cert
;
124 x509_util::CreateChannelIDEC(private_key
.get(),
125 x509_util::DIGEST_SHA1
,
129 now
+ base::TimeDelta::FromDays(1),
132 VerifyChannelID(domain
, der_cert
);
134 // signature_verifier_win and signature_verifier_mac can't handle EC certs.
135 std::vector
<uint8
> spki
;
136 ASSERT_TRUE(private_key
->ExportPublicKey(&spki
));
137 VerifyCertificateSignature(der_cert
, spki
);