1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/cert/jwk_serializer.h"
7 #include "base/base64.h"
8 #include "base/values.h"
9 #include "testing/gtest/include/gtest/gtest.h"
13 #if !defined(USE_OPENSSL)
14 // This is the ASN.1 prefix for a P-256 public key. Specifically it's:
19 // BIT STRING, length 66, 0 trailing bits: 0x04
21 // The 0x04 in the BIT STRING is the prefix for an uncompressed, X9.62
22 // public key. Following that are the two field elements as 32-byte,
23 // big-endian numbers, as required by the Channel ID.
24 static const unsigned char kP256SpkiPrefix
[] = {
25 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
26 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
27 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
30 static const unsigned int kEcCoordinateSize
= 32U;
33 // This is a valid P-256 public key.
34 static const unsigned char kSpkiEc
[] = {
35 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
36 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
37 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
39 0x29, 0x5d, 0x6e, 0xfe, 0x33, 0x77, 0x26, 0xea,
40 0x5b, 0xa4, 0xe6, 0x1b, 0x34, 0x6e, 0x7b, 0xa0,
41 0xa3, 0x8f, 0x33, 0x49, 0xa0, 0x9c, 0xae, 0x98,
42 0xbd, 0x46, 0x0d, 0xf6, 0xd4, 0x5a, 0xdc, 0x8a,
43 0x1f, 0x8a, 0xb2, 0x20, 0x51, 0xb7, 0xd2, 0x87,
44 0x0d, 0x53, 0x7e, 0x5d, 0x94, 0xa3, 0xe0, 0x34,
45 0x16, 0xa1, 0xcc, 0x10, 0x48, 0xcd, 0x70, 0x9c,
46 0x05, 0xd3, 0xd2, 0xca, 0xdf, 0x44, 0x2f, 0xf4
49 #if !defined(USE_OPENSSL)
50 // This is a P-256 public key with 0 X and Y values.
51 static const unsigned char kSpkiEcWithZeroXY
[] = {
52 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
53 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
54 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
57 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
58 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
59 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
60 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
63 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
66 TEST(JwkSerializerNSSTest
, ConvertSpkiFromDerToJwkEc
) {
67 base::StringPiece spki
;
68 base::DictionaryValue public_key_jwk
;
70 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki
, &public_key_jwk
));
71 EXPECT_TRUE(public_key_jwk
.empty());
73 // Test the result of a "normal" point on this curve.
74 spki
.set(reinterpret_cast<const char*>(kSpkiEc
), sizeof(kSpkiEc
));
75 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki
, &public_key_jwk
));
77 std::string string_value
;
78 EXPECT_TRUE(public_key_jwk
.GetString("kty", &string_value
));
79 EXPECT_STREQ("EC", string_value
.c_str());
80 EXPECT_TRUE(public_key_jwk
.GetString("crv", &string_value
));
81 EXPECT_STREQ("P-256", string_value
.c_str());
83 EXPECT_TRUE(public_key_jwk
.GetString("x", &string_value
));
84 std::string decoded_coordinate
;
85 EXPECT_TRUE(base::Base64Decode(string_value
, &decoded_coordinate
));
86 EXPECT_EQ(kEcCoordinateSize
, decoded_coordinate
.size());
88 memcmp(decoded_coordinate
.data(),
89 kSpkiEc
+ sizeof(kP256SpkiPrefix
),
92 EXPECT_TRUE(public_key_jwk
.GetString("y", &string_value
));
93 EXPECT_TRUE(base::Base64Decode(string_value
, &decoded_coordinate
));
94 EXPECT_EQ(kEcCoordinateSize
, decoded_coordinate
.size());
96 memcmp(decoded_coordinate
.data(),
97 kSpkiEc
+ sizeof(kP256SpkiPrefix
) + kEcCoordinateSize
,
100 // Test the result of a corner case: leading 0s in the x, y coordinates are
101 // not trimmed, but the point is fixed-length encoded.
102 spki
.set(reinterpret_cast<const char*>(kSpkiEcWithZeroXY
),
103 sizeof(kSpkiEcWithZeroXY
));
104 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki
, &public_key_jwk
));
106 EXPECT_TRUE(public_key_jwk
.GetString("kty", &string_value
));
107 EXPECT_STREQ("EC", string_value
.c_str());
108 EXPECT_TRUE(public_key_jwk
.GetString("crv", &string_value
));
109 EXPECT_STREQ("P-256", string_value
.c_str());
111 EXPECT_TRUE(public_key_jwk
.GetString("x", &string_value
));
112 EXPECT_TRUE(base::Base64Decode(string_value
, &decoded_coordinate
));
113 EXPECT_EQ(kEcCoordinateSize
, decoded_coordinate
.size());
115 memcmp(decoded_coordinate
.data(),
116 kSpkiEcWithZeroXY
+ sizeof(kP256SpkiPrefix
),
119 EXPECT_TRUE(public_key_jwk
.GetString("y", &string_value
));
120 EXPECT_TRUE(base::Base64Decode(string_value
, &decoded_coordinate
));
121 EXPECT_EQ(kEcCoordinateSize
, decoded_coordinate
.size());
123 memcmp(decoded_coordinate
.data(),
124 kSpkiEcWithZeroXY
+ sizeof(kP256SpkiPrefix
) + kEcCoordinateSize
,
130 // For OpenSSL, JwkSerializer::ConvertSpkiFromDerToJwk() is not yet implemented
131 // and should return false. This unit test ensures that a stub implementation
133 TEST(JwkSerializerOpenSSLTest
, ConvertSpkiFromDerToJwkNotImplemented
) {
134 base::StringPiece spki
;
135 base::DictionaryValue public_key_jwk
;
137 // The empty SPKI is trivially non-convertible...
138 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki
, &public_key_jwk
));
139 EXPECT_TRUE(public_key_jwk
.empty());
140 // but even a valid SPKI is non-convertible via the stub OpenSSL
142 spki
.set(reinterpret_cast<const char*>(kSpkiEc
), sizeof(kSpkiEc
));
143 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki
, &public_key_jwk
));
144 EXPECT_TRUE(public_key_jwk
.empty());
147 #endif // !defined(USE_OPENSSL)