1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file.
10 # This file implements very minimal certificate and OCSP generation. It's
11 # designed to test revocation checking.
13 def RandomNumber(length_in_bytes
):
14 '''RandomNumber returns a random number of length 8*|length_in_bytes| bits'''
15 rand
= os
.urandom(length_in_bytes
)
24 '''ModExp returns n^e mod p'''
33 # PKCS1v15_SHA256_PREFIX is the ASN.1 prefix for a SHA256 signature.
34 PKCS1v15_SHA256_PREFIX
= '3031300d060960864801650304020105000420'.decode('hex')
37 def __init__(self
, modulus
, e
, d
):
48 def Sign(self
, message
):
49 digest
= hashlib
.sha256(message
).digest()
50 prefix
= PKCS1v15_SHA256_PREFIX
52 em
= ['\xff'] * (self
.modlen
- 1 - len(prefix
) - len(digest
))
55 em
+= "\x00" + prefix
+ digest
62 s
= ModExp(n
, self
.d
, self
.m
)
68 return '\x00' * (self
.modlen
- len(out
)) + asn1
.ToBytes(out
)
71 return asn1
.ToDER(asn1
.SEQUENCE([self
.m
, self
.e
]))
74 def Name(cn
= None, c
= None, o
= None):
75 names
= asn1
.SEQUENCE([])
78 names
.children
.append(
87 names
.children
.append(
96 names
.children
.append(
107 # The private key and root certificate name are hard coded here:
109 # This is the private key
110 KEY
= RSA(0x00a71998f2930bfe73d031a87f133d2f378eeeeed52a77e44d0fc9ff6f07ff32cbf3da999de4ed65832afcb0807f98787506539d258a0ce3c2c77967653099a9034a9b115a876c39a8c4e4ed4acd0c64095946fb39eeeb47a0704dbb018acf48c3a1c4b895fc409fb4a340a986b1afc45519ab9eca47c30185c771c64aa5ecf07d,
112 0x6f6665f70cb2a9a28acbc5aa0cd374cfb49f49e371a542de0a86aa4a0554cc87f7e71113edf399021ca875aaffbafaf8aee268c3b15ded2c84fb9a4375bbc6011d841e57833bc6f998d25daf6fa7f166b233e3e54a4bae7a5aaaba21431324967d5ff3e1d4f413827994262115ca54396e7068d0afa7af787a5782bc7040e6d3)
114 # And the same thing in PEM format
115 KEY_PEM
= '''-----BEGIN RSA PRIVATE KEY-----
116 MIICXAIBAAKBgQCnGZjykwv+c9AxqH8TPS83ju7u1Sp35E0Pyf9vB/8yy/PamZ3k
117 7WWDKvywgH+YeHUGU50ligzjwsd5Z2UwmakDSpsRWodsOajE5O1KzQxkCVlG+znu
118 60egcE27AYrPSMOhxLiV/ECftKNAqYaxr8RVGaueykfDAYXHccZKpezwfQIBAwKB
119 gG9mZfcMsqmiisvFqgzTdM+0n0njcaVC3gqGqkoFVMyH9+cRE+3zmQIcqHWq/7r6
120 +K7iaMOxXe0shPuaQ3W7xgEdhB5XgzvG+ZjSXa9vp/FmsjPj5UpLrnpaqrohQxMk
121 ln1f8+HU9BOCeZQmIRXKVDlucGjQr6eveHpXgrxwQObTAkEA2wBAfuduw5G0/VfN
122 Wx66D5fbPccfYFqLM5LuTimLmNqzK2gIKXckB2sm44gJZ6wVlumaB1CSNug2LNYx
123 3cAjUwJBAMNUo1hbI8ugqqwI9kpxv9+2Heea4BlnXbS6tYF8pvkHMoliuxNbXmmB
124 u4zNB5iZ6V0ZZ4nvtUNo2cGr/h/Lcu8CQQCSACr/RPSCYSNTj948vya1D+d+hL+V
125 kbIiYfQ0G7Jl5yIc8AVw+hgE8hntBVuacrkPRmaviwwkms7IjsvpKsI3AkEAgjhs
126 5ZIX3RXHHVtO3EvVP86+mmdAEO+TzdHOVlMZ+1ohsOx8t5I+8QEnszNaZbvw6Lua
127 W/UjgkXmgR1UFTJMnwJBAKErmAw21/g3SST0a4wlyaGT/MbXL8Ouwnb5IOKQVe55
128 CZdeVeSh6cJ4hAcQKfr2s1JaZTJFIBPGKAif5HqpydA=
129 -----END RSA PRIVATE KEY-----
132 # Root certificate CN
133 ISSUER_CN
= "Testing CA"
135 # All certificates are issued under this policy OID, in the Google arc:
136 CERT_POLICY_OID
= asn1
.OID([1, 3, 6, 1, 4, 1, 11129, 2, 4, 1])
138 # These result in the following root certificate:
139 # -----BEGIN CERTIFICATE-----
140 # MIIB0TCCATqgAwIBAgIBATANBgkqhkiG9w0BAQUFADAVMRMwEQYDVQQDEwpUZXN0aW5nIENBMB4X
141 # DTEwMDEwMTA2MDAwMFoXDTMyMTIwMTA2MDAwMFowFTETMBEGA1UEAxMKVGVzdGluZyBDQTCBnTAN
142 # BgkqhkiG9w0BAQEFAAOBiwAwgYcCgYEApxmY8pML/nPQMah/Ez0vN47u7tUqd+RND8n/bwf/Msvz
143 # 2pmd5O1lgyr8sIB/mHh1BlOdJYoM48LHeWdlMJmpA0qbEVqHbDmoxOTtSs0MZAlZRvs57utHoHBN
144 # uwGKz0jDocS4lfxAn7SjQKmGsa/EVRmrnspHwwGFx3HGSqXs8H0CAQOjMzAxMBIGA1UdEwEB/wQI
145 # MAYBAf8CAQAwGwYDVR0gAQEABBEwDzANBgsrBgEEAdZ5AgHODzANBgkqhkiG9w0BAQUFAAOBgQA/
146 # STb40A6D+93jMfLGQzXc997IsaJZdoPt7tYa8PqGJBL62EiTj+erd/H5pDZx/2/bcpOG4m9J56yg
147 # wOohbllw2TM+oeEd8syzV6X+1SIPnGI56JRrm3UXcHYx1Rq5loM9WKAiz/WmIWmskljsEQ7+542p
148 # q0pkHjs8nuXovSkUYA==
149 # -----END CERTIFICATE-----
151 # If you update any of the above, you can generate a new root with the
153 # print DERToPEM(MakeCertificate(ISSUER_CN, ISSUER_CN, 1, KEY, KEY, None))
158 AIA_OCSP
= asn1
.OID([1, 3, 6, 1, 5, 5, 7, 48, 1])
159 AUTHORITY_INFORMATION_ACCESS
= asn1
.OID([1, 3, 6, 1, 5, 5, 7, 1, 1])
160 BASIC_CONSTRAINTS
= asn1
.OID([2, 5, 29, 19])
161 CERT_POLICIES
= asn1
.OID([2, 5, 29, 32])
162 COMMON_NAME
= asn1
.OID([2, 5, 4, 3])
163 COUNTRY
= asn1
.OID([2, 5, 4, 6])
164 HASH_SHA1
= asn1
.OID([1, 3, 14, 3, 2, 26])
165 OCSP_TYPE_BASIC
= asn1
.OID([1, 3, 6, 1, 5, 5, 7, 48, 1, 1])
166 ORGANIZATION
= asn1
.OID([2, 5, 4, 10])
167 PUBLIC_KEY_RSA
= asn1
.OID([1, 2, 840, 113549, 1, 1, 1])
168 SHA256_WITH_RSA_ENCRYPTION
= asn1
.OID([1, 2, 840, 113549, 1, 1, 11])
172 issuer_cn
, subject_cn
, serial
, pubkey
, privkey
, ocsp_url
= None):
173 '''MakeCertificate returns a DER encoded certificate, signed by privkey.'''
174 extensions
= asn1
.SEQUENCE([])
176 # Default subject name fields
180 if issuer_cn
== subject_cn
:
184 extensions
.children
.append(
188 asn1
.OCTETSTRING(asn1
.ToDER(asn1
.SEQUENCE([
194 if ocsp_url
is not None:
195 extensions
.children
.append(
197 AUTHORITY_INFORMATION_ACCESS
,
199 asn1
.OCTETSTRING(asn1
.ToDER(asn1
.SEQUENCE([
202 asn1
.Raw(asn1
.TagAndLength(0x86, len(ocsp_url
)) + ocsp_url
),
207 extensions
.children
.append(
211 asn1
.OCTETSTRING(asn1
.ToDER(asn1
.SEQUENCE([
212 asn1
.SEQUENCE([ # PolicyInformation
219 tbsCert
= asn1
.ToDER(asn1
.SEQUENCE([
220 asn1
.Explicit(0, 2), # Version
222 asn1
.SEQUENCE([SHA256_WITH_RSA_ENCRYPTION
, None]), # SignatureAlgorithm
223 Name(cn
= issuer_cn
), # Issuer
224 asn1
.SEQUENCE([ # Validity
225 asn1
.UTCTime("100101060000Z"), # NotBefore
226 asn1
.UTCTime("321201060000Z"), # NotAfter
228 Name(cn
= subject_cn
, c
= c
, o
= o
), # Subject
229 asn1
.SEQUENCE([ # SubjectPublicKeyInfo
230 asn1
.SEQUENCE([ # Algorithm
234 asn1
.BitString(asn1
.ToDER(pubkey
)),
236 asn1
.Explicit(3, extensions
),
239 return asn1
.ToDER(asn1
.SEQUENCE([
242 SHA256_WITH_RSA_ENCRYPTION
,
245 asn1
.BitString(privkey
.Sign(tbsCert
)),
249 def MakeOCSPResponse(issuer_cn
, issuer_key
, serial
, ocsp_state
):
250 # https://tools.ietf.org/html/rfc2560
251 issuer_name_hash
= asn1
.OCTETSTRING(
252 hashlib
.sha1(asn1
.ToDER(Name(cn
= issuer_cn
))).digest())
254 issuer_key_hash
= asn1
.OCTETSTRING(
255 hashlib
.sha1(asn1
.ToDER(issuer_key
)).digest())
258 if ocsp_state
== OCSP_STATE_REVOKED
:
259 cert_status
= asn1
.Explicit(1, asn1
.GeneralizedTime("20100101060000Z"))
260 elif ocsp_state
== OCSP_STATE_UNKNOWN
:
261 cert_status
= asn1
.Raw(asn1
.TagAndLength(0x80 |
2, 0))
262 elif ocsp_state
== OCSP_STATE_GOOD
:
263 cert_status
= asn1
.Raw(asn1
.TagAndLength(0x80 |
0, 0))
265 raise ValueError('Bad OCSP state: ' + str(ocsp_state
))
267 basic_resp_data_der
= asn1
.ToDER(asn1
.SEQUENCE([
268 asn1
.Explicit(2, issuer_key_hash
),
269 asn1
.GeneralizedTime("20100101060000Z"), # producedAt
271 asn1
.SEQUENCE([ # SingleResponse
272 asn1
.SEQUENCE([ # CertID
273 asn1
.SEQUENCE([ # hashAlgorithm
282 asn1
.GeneralizedTime("20100101060000Z"), # thisUpdate
283 asn1
.Explicit(0, asn1
.GeneralizedTime("20300101060000Z")), # nextUpdate
288 basic_resp
= asn1
.SEQUENCE([
289 asn1
.Raw(basic_resp_data_der
),
291 SHA256_WITH_RSA_ENCRYPTION
,
294 asn1
.BitString(issuer_key
.Sign(basic_resp_data_der
)),
297 resp
= asn1
.SEQUENCE([
299 asn1
.Explicit(0, asn1
.SEQUENCE([
301 asn1
.OCTETSTRING(asn1
.ToDER(basic_resp
)),
305 return asn1
.ToDER(resp
)
309 pem
= '-----BEGIN CERTIFICATE-----\n'
310 pem
+= der
.encode('base64')
311 pem
+= '-----END CERTIFICATE-----\n'
315 OCSP_STATE_REVOKED
= 2
316 OCSP_STATE_INVALID
= 3
317 OCSP_STATE_UNAUTHORIZED
= 4
318 OCSP_STATE_UNKNOWN
= 5
320 # unauthorizedDER is an OCSPResponse with a status of 6:
321 # SEQUENCE { ENUM(6) }
322 unauthorizedDER
= '30030a0106'.decode('hex')
324 def GenerateCertKeyAndOCSP(subject
= "127.0.0.1",
325 ocsp_url
= "http://127.0.0.1",
326 ocsp_state
= OCSP_STATE_GOOD
,
328 '''GenerateCertKeyAndOCSP returns a (cert_and_key_pem, ocsp_der) where:
329 * cert_and_key_pem contains a certificate and private key in PEM format
330 with the given subject common name and OCSP URL.
331 * ocsp_der contains a DER encoded OCSP response or None if ocsp_url is
335 serial
= RandomNumber(16)
336 cert_der
= MakeCertificate(ISSUER_CN
, bytes(subject
), serial
, KEY
, KEY
,
338 cert_pem
= DERToPEM(cert_der
)
341 if ocsp_url
is not None:
342 if ocsp_state
== OCSP_STATE_UNAUTHORIZED
:
343 ocsp_der
= unauthorizedDER
344 elif ocsp_state
== OCSP_STATE_INVALID
:
347 ocsp_der
= MakeOCSPResponse(ISSUER_CN
, KEY
, serial
, ocsp_state
)
349 return (cert_pem
+ KEY_PEM
, ocsp_der
)