agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 1 | # Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 | # Use of this source code is governed by a BSD-style license that can be |
| 3 | # found in the LICENSE file. |
| 4 | |
| 5 | import asn1 |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 6 | import datetime |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 7 | import hashlib |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 8 | import itertools |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 9 | import os |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 10 | import time |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 11 | |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 12 | GENERALIZED_TIME_FORMAT = "%Y%m%d%H%M%SZ" |
| 13 | |
| 14 | OCSP_STATE_GOOD = 1 |
| 15 | OCSP_STATE_REVOKED = 2 |
| 16 | OCSP_STATE_INVALID_RESPONSE = 3 |
| 17 | OCSP_STATE_UNAUTHORIZED = 4 |
| 18 | OCSP_STATE_UNKNOWN = 5 |
| 19 | OCSP_STATE_TRY_LATER = 6 |
| 20 | OCSP_STATE_INVALID_RESPONSE_DATA = 7 |
| 21 | OCSP_STATE_MISMATCHED_SERIAL = 8 |
| 22 | |
| 23 | OCSP_DATE_VALID = 1 |
| 24 | OCSP_DATE_OLD = 2 |
| 25 | OCSP_DATE_EARLY = 3 |
| 26 | OCSP_DATE_LONG = 4 |
| 27 | |
| 28 | OCSP_PRODUCED_VALID = 1 |
| 29 | OCSP_PRODUCED_BEFORE_CERT = 2 |
| 30 | OCSP_PRODUCED_AFTER_CERT = 3 |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 31 | |
| 32 | # This file implements very minimal certificate and OCSP generation. It's |
| 33 | # designed to test revocation checking. |
| 34 | |
| 35 | def RandomNumber(length_in_bytes): |
| 36 | '''RandomNumber returns a random number of length 8*|length_in_bytes| bits''' |
| 37 | rand = os.urandom(length_in_bytes) |
| 38 | n = 0 |
| 39 | for x in rand: |
| 40 | n <<= 8 |
| 41 | n |= ord(x) |
| 42 | return n |
| 43 | |
| 44 | |
| 45 | def ModExp(n, e, p): |
| 46 | '''ModExp returns n^e mod p''' |
| 47 | r = 1 |
| 48 | while e != 0: |
| 49 | if e & 1: |
| 50 | r = (r*n) % p |
| 51 | e >>= 1 |
| 52 | n = (n*n) % p |
| 53 | return r |
| 54 | |
rsleevi | 85d2177 | 2014-08-28 15:46:51 -0700 | [diff] [blame] | 55 | # PKCS1v15_SHA256_PREFIX is the ASN.1 prefix for a SHA256 signature. |
| 56 | PKCS1v15_SHA256_PREFIX = '3031300d060960864801650304020105000420'.decode('hex') |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 57 | |
| 58 | class RSA(object): |
| 59 | def __init__(self, modulus, e, d): |
| 60 | self.m = modulus |
| 61 | self.e = e |
| 62 | self.d = d |
| 63 | |
| 64 | self.modlen = 0 |
| 65 | m = modulus |
| 66 | while m != 0: |
| 67 | self.modlen += 1 |
| 68 | m >>= 8 |
| 69 | |
| 70 | def Sign(self, message): |
rsleevi | 85d2177 | 2014-08-28 15:46:51 -0700 | [diff] [blame] | 71 | digest = hashlib.sha256(message).digest() |
| 72 | prefix = PKCS1v15_SHA256_PREFIX |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 73 | |
| 74 | em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest)) |
| 75 | em[0] = '\x00' |
| 76 | em[1] = '\x01' |
| 77 | em += "\x00" + prefix + digest |
| 78 | |
| 79 | n = 0 |
| 80 | for x in em: |
| 81 | n <<= 8 |
| 82 | n |= ord(x) |
| 83 | |
| 84 | s = ModExp(n, self.d, self.m) |
| 85 | out = [] |
| 86 | while s != 0: |
| 87 | out.append(s & 0xff) |
| 88 | s >>= 8 |
| 89 | out.reverse() |
| 90 | return '\x00' * (self.modlen - len(out)) + asn1.ToBytes(out) |
| 91 | |
| 92 | def ToDER(self): |
| 93 | return asn1.ToDER(asn1.SEQUENCE([self.m, self.e])) |
| 94 | |
| 95 | |
| 96 | def Name(cn = None, c = None, o = None): |
| 97 | names = asn1.SEQUENCE([]) |
| 98 | |
| 99 | if cn is not None: |
| 100 | names.children.append( |
| 101 | asn1.SET([ |
| 102 | asn1.SEQUENCE([ |
| 103 | COMMON_NAME, cn, |
| 104 | ]) |
| 105 | ]) |
| 106 | ) |
| 107 | |
| 108 | if c is not None: |
| 109 | names.children.append( |
| 110 | asn1.SET([ |
| 111 | asn1.SEQUENCE([ |
| 112 | COUNTRY, c, |
| 113 | ]) |
| 114 | ]) |
| 115 | ) |
| 116 | |
| 117 | if o is not None: |
| 118 | names.children.append( |
| 119 | asn1.SET([ |
| 120 | asn1.SEQUENCE([ |
| 121 | ORGANIZATION, o, |
| 122 | ]) |
| 123 | ]) |
| 124 | ) |
| 125 | |
| 126 | return names |
| 127 | |
| 128 | |
| 129 | # The private key and root certificate name are hard coded here: |
| 130 | |
| 131 | # This is the private key |
| 132 | KEY = RSA(0x00a71998f2930bfe73d031a87f133d2f378eeeeed52a77e44d0fc9ff6f07ff32cbf3da999de4ed65832afcb0807f98787506539d258a0ce3c2c77967653099a9034a9b115a876c39a8c4e4ed4acd0c64095946fb39eeeb47a0704dbb018acf48c3a1c4b895fc409fb4a340a986b1afc45519ab9eca47c30185c771c64aa5ecf07d, |
| 133 | 3, |
| 134 | 0x6f6665f70cb2a9a28acbc5aa0cd374cfb49f49e371a542de0a86aa4a0554cc87f7e71113edf399021ca875aaffbafaf8aee268c3b15ded2c84fb9a4375bbc6011d841e57833bc6f998d25daf6fa7f166b233e3e54a4bae7a5aaaba21431324967d5ff3e1d4f413827994262115ca54396e7068d0afa7af787a5782bc7040e6d3) |
| 135 | |
| 136 | # And the same thing in PEM format |
| 137 | KEY_PEM = '''-----BEGIN RSA PRIVATE KEY----- |
| 138 | MIICXAIBAAKBgQCnGZjykwv+c9AxqH8TPS83ju7u1Sp35E0Pyf9vB/8yy/PamZ3k |
| 139 | 7WWDKvywgH+YeHUGU50ligzjwsd5Z2UwmakDSpsRWodsOajE5O1KzQxkCVlG+znu |
| 140 | 60egcE27AYrPSMOhxLiV/ECftKNAqYaxr8RVGaueykfDAYXHccZKpezwfQIBAwKB |
| 141 | gG9mZfcMsqmiisvFqgzTdM+0n0njcaVC3gqGqkoFVMyH9+cRE+3zmQIcqHWq/7r6 |
| 142 | +K7iaMOxXe0shPuaQ3W7xgEdhB5XgzvG+ZjSXa9vp/FmsjPj5UpLrnpaqrohQxMk |
| 143 | ln1f8+HU9BOCeZQmIRXKVDlucGjQr6eveHpXgrxwQObTAkEA2wBAfuduw5G0/VfN |
| 144 | Wx66D5fbPccfYFqLM5LuTimLmNqzK2gIKXckB2sm44gJZ6wVlumaB1CSNug2LNYx |
| 145 | 3cAjUwJBAMNUo1hbI8ugqqwI9kpxv9+2Heea4BlnXbS6tYF8pvkHMoliuxNbXmmB |
| 146 | u4zNB5iZ6V0ZZ4nvtUNo2cGr/h/Lcu8CQQCSACr/RPSCYSNTj948vya1D+d+hL+V |
| 147 | kbIiYfQ0G7Jl5yIc8AVw+hgE8hntBVuacrkPRmaviwwkms7IjsvpKsI3AkEAgjhs |
| 148 | 5ZIX3RXHHVtO3EvVP86+mmdAEO+TzdHOVlMZ+1ohsOx8t5I+8QEnszNaZbvw6Lua |
| 149 | W/UjgkXmgR1UFTJMnwJBAKErmAw21/g3SST0a4wlyaGT/MbXL8Ouwnb5IOKQVe55 |
| 150 | CZdeVeSh6cJ4hAcQKfr2s1JaZTJFIBPGKAif5HqpydA= |
| 151 | -----END RSA PRIVATE KEY----- |
| 152 | ''' |
| 153 | |
| 154 | # Root certificate CN |
| 155 | ISSUER_CN = "Testing CA" |
| 156 | |
| 157 | # All certificates are issued under this policy OID, in the Google arc: |
| 158 | CERT_POLICY_OID = asn1.OID([1, 3, 6, 1, 4, 1, 11129, 2, 4, 1]) |
| 159 | |
| 160 | # These result in the following root certificate: |
| 161 | # -----BEGIN CERTIFICATE----- |
mattm | adace8e | 2016-10-03 14:07:15 -0700 | [diff] [blame^] | 162 | # MIIBzTCCATagAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwpUZXN0aW5nIENBMB4X |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 163 | # DTEwMDEwMTA2MDAwMFoXDTMyMTIwMTA2MDAwMFowFTETMBEGA1UEAxMKVGVzdGluZyBDQTCBnTAN |
| 164 | # BgkqhkiG9w0BAQEFAAOBiwAwgYcCgYEApxmY8pML/nPQMah/Ez0vN47u7tUqd+RND8n/bwf/Msvz |
| 165 | # 2pmd5O1lgyr8sIB/mHh1BlOdJYoM48LHeWdlMJmpA0qbEVqHbDmoxOTtSs0MZAlZRvs57utHoHBN |
mattm | adace8e | 2016-10-03 14:07:15 -0700 | [diff] [blame^] | 166 | # uwGKz0jDocS4lfxAn7SjQKmGsa/EVRmrnspHwwGFx3HGSqXs8H0CAQOjLzAtMBIGA1UdEwEB/wQI |
| 167 | # MAYBAf8CAQAwFwYDVR0gBBAwDjAMBgorBgEEAdZ5AgQBMA0GCSqGSIb3DQEBCwUAA4GBAHJJigXg |
| 168 | # ArH/E9n3AilgivA58hawSRVqiTHHv7oAguDRrA4zC8IvsL6b/6LV7nA3KWM0OUSZSGE3zQb9UlB2 |
| 169 | # nNYsPMdv0Ls4GuOzVfy4bnQXqMWIflRw9L5Z5KH8Vu5U3ohoOUCfWN1sYMoeS9/22K9xtRsDPS+d |
| 170 | # pQo7Q6ZoOo8o |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 171 | # -----END CERTIFICATE----- |
| 172 | |
mattm | adace8e | 2016-10-03 14:07:15 -0700 | [diff] [blame^] | 173 | # If you update any of the above, you can generate a new root by running this |
| 174 | # file as a script. |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 175 | |
| 176 | |
| 177 | # Various OIDs |
| 178 | |
| 179 | AIA_OCSP = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1]) |
| 180 | AUTHORITY_INFORMATION_ACCESS = asn1.OID([1, 3, 6, 1, 5, 5, 7, 1, 1]) |
| 181 | BASIC_CONSTRAINTS = asn1.OID([2, 5, 29, 19]) |
| 182 | CERT_POLICIES = asn1.OID([2, 5, 29, 32]) |
| 183 | COMMON_NAME = asn1.OID([2, 5, 4, 3]) |
| 184 | COUNTRY = asn1.OID([2, 5, 4, 6]) |
| 185 | HASH_SHA1 = asn1.OID([1, 3, 14, 3, 2, 26]) |
| 186 | OCSP_TYPE_BASIC = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1, 1]) |
| 187 | ORGANIZATION = asn1.OID([2, 5, 4, 10]) |
| 188 | PUBLIC_KEY_RSA = asn1.OID([1, 2, 840, 113549, 1, 1, 1]) |
rsleevi | 85d2177 | 2014-08-28 15:46:51 -0700 | [diff] [blame] | 189 | SHA256_WITH_RSA_ENCRYPTION = asn1.OID([1, 2, 840, 113549, 1, 1, 11]) |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 190 | |
| 191 | |
| 192 | def MakeCertificate( |
| 193 | issuer_cn, subject_cn, serial, pubkey, privkey, ocsp_url = None): |
| 194 | '''MakeCertificate returns a DER encoded certificate, signed by privkey.''' |
| 195 | extensions = asn1.SEQUENCE([]) |
| 196 | |
| 197 | # Default subject name fields |
| 198 | c = "XX" |
| 199 | o = "Testing Org" |
| 200 | |
| 201 | if issuer_cn == subject_cn: |
| 202 | # Root certificate. |
| 203 | c = None |
| 204 | o = None |
| 205 | extensions.children.append( |
| 206 | asn1.SEQUENCE([ |
mattm | adace8e | 2016-10-03 14:07:15 -0700 | [diff] [blame^] | 207 | BASIC_CONSTRAINTS, |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 208 | True, |
| 209 | asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ |
| 210 | True, # IsCA |
| 211 | 0, # Path len |
| 212 | ]))), |
| 213 | ])) |
| 214 | |
| 215 | if ocsp_url is not None: |
| 216 | extensions.children.append( |
| 217 | asn1.SEQUENCE([ |
| 218 | AUTHORITY_INFORMATION_ACCESS, |
mattm | adace8e | 2016-10-03 14:07:15 -0700 | [diff] [blame^] | 219 | # There is implicitly a critical=False here. Since false is the default, |
| 220 | # encoding the value would be invalid DER. |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 221 | asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ |
| 222 | asn1.SEQUENCE([ |
| 223 | AIA_OCSP, |
| 224 | asn1.Raw(asn1.TagAndLength(0x86, len(ocsp_url)) + ocsp_url), |
| 225 | ]), |
| 226 | ]))), |
| 227 | ])) |
| 228 | |
| 229 | extensions.children.append( |
| 230 | asn1.SEQUENCE([ |
| 231 | CERT_POLICIES, |
mattm | adace8e | 2016-10-03 14:07:15 -0700 | [diff] [blame^] | 232 | # There is implicitly a critical=False here. Since false is the default, |
| 233 | # encoding the value would be invalid DER. |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 234 | asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ |
| 235 | asn1.SEQUENCE([ # PolicyInformation |
| 236 | CERT_POLICY_OID, |
| 237 | ]), |
| 238 | ]))), |
| 239 | ]) |
| 240 | ) |
| 241 | |
| 242 | tbsCert = asn1.ToDER(asn1.SEQUENCE([ |
| 243 | asn1.Explicit(0, 2), # Version |
| 244 | serial, |
rsleevi | 85d2177 | 2014-08-28 15:46:51 -0700 | [diff] [blame] | 245 | asn1.SEQUENCE([SHA256_WITH_RSA_ENCRYPTION, None]), # SignatureAlgorithm |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 246 | Name(cn = issuer_cn), # Issuer |
| 247 | asn1.SEQUENCE([ # Validity |
| 248 | asn1.UTCTime("100101060000Z"), # NotBefore |
| 249 | asn1.UTCTime("321201060000Z"), # NotAfter |
| 250 | ]), |
| 251 | Name(cn = subject_cn, c = c, o = o), # Subject |
| 252 | asn1.SEQUENCE([ # SubjectPublicKeyInfo |
| 253 | asn1.SEQUENCE([ # Algorithm |
| 254 | PUBLIC_KEY_RSA, |
| 255 | None, |
| 256 | ]), |
| 257 | asn1.BitString(asn1.ToDER(pubkey)), |
| 258 | ]), |
| 259 | asn1.Explicit(3, extensions), |
| 260 | ])) |
| 261 | |
| 262 | return asn1.ToDER(asn1.SEQUENCE([ |
| 263 | asn1.Raw(tbsCert), |
| 264 | asn1.SEQUENCE([ |
rsleevi | 85d2177 | 2014-08-28 15:46:51 -0700 | [diff] [blame] | 265 | SHA256_WITH_RSA_ENCRYPTION, |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 266 | None, |
| 267 | ]), |
| 268 | asn1.BitString(privkey.Sign(tbsCert)), |
| 269 | ])) |
| 270 | |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 271 | def MakeOCSPSingleResponse( |
| 272 | issuer_name_hash, issuer_key_hash, serial, ocsp_state, ocsp_date): |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 273 | cert_status = None |
agl@chromium.org | b5f388a | 2012-06-29 17:54:06 +0000 | [diff] [blame] | 274 | if ocsp_state == OCSP_STATE_REVOKED: |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 275 | cert_status = asn1.Explicit(1, asn1.GeneralizedTime("20100101060000Z")) |
agl@chromium.org | b5f388a | 2012-06-29 17:54:06 +0000 | [diff] [blame] | 276 | elif ocsp_state == OCSP_STATE_UNKNOWN: |
| 277 | cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 2, 0)) |
| 278 | elif ocsp_state == OCSP_STATE_GOOD: |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 279 | cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0)) |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 280 | elif ocsp_state == OCSP_STATE_MISMATCHED_SERIAL: |
| 281 | cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0)) |
| 282 | serial -= 1 |
agl@chromium.org | b5f388a | 2012-06-29 17:54:06 +0000 | [diff] [blame] | 283 | else: |
| 284 | raise ValueError('Bad OCSP state: ' + str(ocsp_state)) |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 285 | |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 286 | now = datetime.datetime.fromtimestamp(time.mktime(time.gmtime())) |
| 287 | if ocsp_date == OCSP_DATE_VALID: |
| 288 | thisUpdate = now - datetime.timedelta(days=1) |
| 289 | nextUpdate = thisUpdate + datetime.timedelta(weeks=1) |
| 290 | elif ocsp_date == OCSP_DATE_OLD: |
dadrian | 9a07cc9 | 2016-07-22 10:44:37 -0700 | [diff] [blame] | 291 | thisUpdate = now - datetime.timedelta(days=1, weeks=1) |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 292 | nextUpdate = thisUpdate + datetime.timedelta(weeks=1) |
| 293 | elif ocsp_date == OCSP_DATE_EARLY: |
dadrian | 9a07cc9 | 2016-07-22 10:44:37 -0700 | [diff] [blame] | 294 | thisUpdate = now + datetime.timedelta(days=1) |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 295 | nextUpdate = thisUpdate + datetime.timedelta(weeks=1) |
| 296 | elif ocsp_date == OCSP_DATE_LONG: |
| 297 | thisUpdate = now - datetime.timedelta(days=365) |
dadrian | 9a07cc9 | 2016-07-22 10:44:37 -0700 | [diff] [blame] | 298 | nextUpdate = thisUpdate + datetime.timedelta(days=366) |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 299 | else: |
| 300 | raise ValueError('Bad OCSP date: ' + str(ocsp_date)) |
| 301 | |
| 302 | return asn1.SEQUENCE([ # SingleResponse |
| 303 | asn1.SEQUENCE([ # CertID |
| 304 | asn1.SEQUENCE([ # hashAlgorithm |
| 305 | HASH_SHA1, |
| 306 | None, |
| 307 | ]), |
| 308 | issuer_name_hash, |
| 309 | issuer_key_hash, |
| 310 | serial, |
| 311 | ]), |
| 312 | cert_status, |
| 313 | asn1.GeneralizedTime( # thisUpdate |
| 314 | thisUpdate.strftime(GENERALIZED_TIME_FORMAT) |
| 315 | ), |
| 316 | asn1.Explicit( # nextUpdate |
| 317 | 0, |
| 318 | asn1.GeneralizedTime(nextUpdate.strftime(GENERALIZED_TIME_FORMAT)) |
| 319 | ), |
| 320 | ]) |
| 321 | |
| 322 | def MakeOCSPResponse( |
| 323 | issuer_cn, issuer_key, serial, ocsp_states, ocsp_dates, ocsp_produced): |
| 324 | # https://tools.ietf.org/html/rfc2560 |
| 325 | issuer_name_hash = asn1.OCTETSTRING( |
| 326 | hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest()) |
| 327 | |
| 328 | issuer_key_hash = asn1.OCTETSTRING( |
| 329 | hashlib.sha1(asn1.ToDER(issuer_key)).digest()) |
| 330 | |
| 331 | now = datetime.datetime.fromtimestamp(time.mktime(time.gmtime())) |
| 332 | if ocsp_produced == OCSP_PRODUCED_VALID: |
| 333 | producedAt = now - datetime.timedelta(days=1) |
| 334 | elif ocsp_produced == OCSP_PRODUCED_BEFORE_CERT: |
| 335 | producedAt = datetime.datetime.strptime( |
| 336 | "19100101050000Z", GENERALIZED_TIME_FORMAT) |
| 337 | elif ocsp_produced == OCSP_PRODUCED_AFTER_CERT: |
| 338 | producedAt = datetime.datetime.strptime( |
| 339 | "20321201070000Z", GENERALIZED_TIME_FORMAT) |
| 340 | else: |
| 341 | raise ValueError('Bad OCSP produced: ' + str(ocsp_produced)) |
| 342 | |
| 343 | single_responses = [ |
| 344 | MakeOCSPSingleResponse(issuer_name_hash, issuer_key_hash, serial, |
| 345 | ocsp_state, ocsp_date) |
| 346 | for ocsp_state, ocsp_date in itertools.izip(ocsp_states, ocsp_dates) |
| 347 | ] |
| 348 | |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 349 | basic_resp_data_der = asn1.ToDER(asn1.SEQUENCE([ |
| 350 | asn1.Explicit(2, issuer_key_hash), |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 351 | asn1.GeneralizedTime(producedAt.strftime(GENERALIZED_TIME_FORMAT)), |
| 352 | asn1.SEQUENCE(single_responses), |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 353 | ])) |
| 354 | |
| 355 | basic_resp = asn1.SEQUENCE([ |
| 356 | asn1.Raw(basic_resp_data_der), |
| 357 | asn1.SEQUENCE([ |
rsleevi | 85d2177 | 2014-08-28 15:46:51 -0700 | [diff] [blame] | 358 | SHA256_WITH_RSA_ENCRYPTION, |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 359 | None, |
| 360 | ]), |
| 361 | asn1.BitString(issuer_key.Sign(basic_resp_data_der)), |
| 362 | ]) |
| 363 | |
| 364 | resp = asn1.SEQUENCE([ |
| 365 | asn1.ENUMERATED(0), |
| 366 | asn1.Explicit(0, asn1.SEQUENCE([ |
| 367 | OCSP_TYPE_BASIC, |
| 368 | asn1.OCTETSTRING(asn1.ToDER(basic_resp)), |
| 369 | ])) |
| 370 | ]) |
| 371 | |
| 372 | return asn1.ToDER(resp) |
| 373 | |
| 374 | |
| 375 | def DERToPEM(der): |
| 376 | pem = '-----BEGIN CERTIFICATE-----\n' |
| 377 | pem += der.encode('base64') |
| 378 | pem += '-----END CERTIFICATE-----\n' |
| 379 | return pem |
| 380 | |
agl@chromium.org | b5f388a | 2012-06-29 17:54:06 +0000 | [diff] [blame] | 381 | # unauthorizedDER is an OCSPResponse with a status of 6: |
| 382 | # SEQUENCE { ENUM(6) } |
| 383 | unauthorizedDER = '30030a0106'.decode('hex') |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 384 | |
| 385 | def GenerateCertKeyAndOCSP(subject = "127.0.0.1", |
| 386 | ocsp_url = "http://127.0.0.1", |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 387 | ocsp_states = None, |
| 388 | ocsp_dates = None, |
| 389 | ocsp_produced = OCSP_PRODUCED_VALID, |
agl@chromium.org | df77814 | 2013-07-31 21:57:28 +0000 | [diff] [blame] | 390 | serial = 0): |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 391 | '''GenerateCertKeyAndOCSP returns a (cert_and_key_pem, ocsp_der) where: |
| 392 | * cert_and_key_pem contains a certificate and private key in PEM format |
| 393 | with the given subject common name and OCSP URL. |
| 394 | * ocsp_der contains a DER encoded OCSP response or None if ocsp_url is |
| 395 | None''' |
| 396 | |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 397 | if ocsp_states is None: |
| 398 | ocsp_states = [OCSP_STATE_GOOD] |
| 399 | if ocsp_dates is None: |
| 400 | ocsp_dates = [OCSP_DATE_VALID] |
| 401 | |
agl@chromium.org | df77814 | 2013-07-31 21:57:28 +0000 | [diff] [blame] | 402 | if serial == 0: |
| 403 | serial = RandomNumber(16) |
agl@chromium.org | f80c1e6 | 2012-04-24 16:33:41 +0000 | [diff] [blame] | 404 | cert_der = MakeCertificate(ISSUER_CN, bytes(subject), serial, KEY, KEY, |
| 405 | bytes(ocsp_url)) |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 406 | cert_pem = DERToPEM(cert_der) |
| 407 | |
| 408 | ocsp_der = None |
| 409 | if ocsp_url is not None: |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 410 | if ocsp_states[0] == OCSP_STATE_UNAUTHORIZED: |
agl@chromium.org | b5f388a | 2012-06-29 17:54:06 +0000 | [diff] [blame] | 411 | ocsp_der = unauthorizedDER |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 412 | elif ocsp_states[0] == OCSP_STATE_INVALID_RESPONSE: |
agl@chromium.org | b5f388a | 2012-06-29 17:54:06 +0000 | [diff] [blame] | 413 | ocsp_der = '3' |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 414 | elif ocsp_states[0] == OCSP_STATE_TRY_LATER: |
| 415 | resp = asn1.SEQUENCE([ |
| 416 | asn1.ENUMERATED(3), |
| 417 | ]) |
| 418 | ocsp_der = asn1.ToDER(resp) |
| 419 | elif ocsp_states[0] == OCSP_STATE_INVALID_RESPONSE_DATA: |
| 420 | invalid_data = asn1.ToDER(asn1.OCTETSTRING('not ocsp data')) |
| 421 | basic_resp = asn1.SEQUENCE([ |
| 422 | asn1.Raw(invalid_data), |
| 423 | asn1.SEQUENCE([ |
| 424 | SHA256_WITH_RSA_ENCRYPTION, |
| 425 | None, |
| 426 | ]), |
| 427 | asn1.BitString(KEY.Sign(invalid_data)), |
| 428 | ]) |
| 429 | resp = asn1.SEQUENCE([ |
| 430 | asn1.ENUMERATED(0), |
| 431 | asn1.Explicit(0, asn1.SEQUENCE([ |
| 432 | OCSP_TYPE_BASIC, |
| 433 | asn1.OCTETSTRING(asn1.ToDER(basic_resp)), |
| 434 | ])), |
| 435 | ]) |
| 436 | ocsp_der = asn1.ToDER(resp) |
agl@chromium.org | b5f388a | 2012-06-29 17:54:06 +0000 | [diff] [blame] | 437 | else: |
dadrian | 4ccf51c | 2016-07-20 15:36:58 -0700 | [diff] [blame] | 438 | ocsp_der = MakeOCSPResponse( |
| 439 | ISSUER_CN, KEY, serial, ocsp_states, ocsp_dates, ocsp_produced) |
agl@chromium.org | 77a9ad9 | 2012-03-20 15:14:27 +0000 | [diff] [blame] | 440 | |
| 441 | return (cert_pem + KEY_PEM, ocsp_der) |
mattm | adace8e | 2016-10-03 14:07:15 -0700 | [diff] [blame^] | 442 | |
| 443 | |
| 444 | if __name__ == '__main__': |
| 445 | def bin_to_array(s): |
| 446 | return ' '.join(['0x%02x,'%ord(c) for c in s]) |
| 447 | |
| 448 | import sys |
| 449 | sys.path.append(os.path.join(os.path.dirname(os.path.abspath(__file__)), '..', |
| 450 | '..', 'data', 'ssl', 'scripts')) |
| 451 | import crlsetutil |
| 452 | |
| 453 | der_root = MakeCertificate(ISSUER_CN, ISSUER_CN, 1, KEY, KEY, None) |
| 454 | print 'ocsp-test-root.pem:' |
| 455 | print DERToPEM(der_root) |
| 456 | |
| 457 | print |
| 458 | print 'kOCSPTestCertFingerprint:' |
| 459 | print bin_to_array(hashlib.sha1(der_root).digest()) |
| 460 | |
| 461 | print |
| 462 | print 'kOCSPTestCertSPKI:' |
| 463 | print bin_to_array(crlsetutil.der_cert_to_spki_hash(der_root)) |