blob: d7f39a1d6912af0b497099625814188b114f462a [file] [log] [blame]
agl@chromium.org77a9ad92012-03-20 15:14:27 +00001# Copyright (c) 2012 The Chromium Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5import asn1
dadrian4ccf51c2016-07-20 15:36:58 -07006import datetime
agl@chromium.org77a9ad92012-03-20 15:14:27 +00007import hashlib
dadrian4ccf51c2016-07-20 15:36:58 -07008import itertools
agl@chromium.org77a9ad92012-03-20 15:14:27 +00009import os
dadrian4ccf51c2016-07-20 15:36:58 -070010import time
agl@chromium.org77a9ad92012-03-20 15:14:27 +000011
dadrian4ccf51c2016-07-20 15:36:58 -070012GENERALIZED_TIME_FORMAT = "%Y%m%d%H%M%SZ"
13
14OCSP_STATE_GOOD = 1
15OCSP_STATE_REVOKED = 2
16OCSP_STATE_INVALID_RESPONSE = 3
17OCSP_STATE_UNAUTHORIZED = 4
18OCSP_STATE_UNKNOWN = 5
19OCSP_STATE_TRY_LATER = 6
20OCSP_STATE_INVALID_RESPONSE_DATA = 7
21OCSP_STATE_MISMATCHED_SERIAL = 8
22
23OCSP_DATE_VALID = 1
24OCSP_DATE_OLD = 2
25OCSP_DATE_EARLY = 3
26OCSP_DATE_LONG = 4
27
28OCSP_PRODUCED_VALID = 1
29OCSP_PRODUCED_BEFORE_CERT = 2
30OCSP_PRODUCED_AFTER_CERT = 3
agl@chromium.org77a9ad92012-03-20 15:14:27 +000031
32# This file implements very minimal certificate and OCSP generation. It's
33# designed to test revocation checking.
34
35def RandomNumber(length_in_bytes):
36 '''RandomNumber returns a random number of length 8*|length_in_bytes| bits'''
37 rand = os.urandom(length_in_bytes)
38 n = 0
39 for x in rand:
40 n <<= 8
41 n |= ord(x)
42 return n
43
44
45def ModExp(n, e, p):
46 '''ModExp returns n^e mod p'''
47 r = 1
48 while e != 0:
49 if e & 1:
50 r = (r*n) % p
51 e >>= 1
52 n = (n*n) % p
53 return r
54
rsleevi85d21772014-08-28 15:46:51 -070055# PKCS1v15_SHA256_PREFIX is the ASN.1 prefix for a SHA256 signature.
56PKCS1v15_SHA256_PREFIX = '3031300d060960864801650304020105000420'.decode('hex')
agl@chromium.org77a9ad92012-03-20 15:14:27 +000057
58class RSA(object):
59 def __init__(self, modulus, e, d):
60 self.m = modulus
61 self.e = e
62 self.d = d
63
64 self.modlen = 0
65 m = modulus
66 while m != 0:
67 self.modlen += 1
68 m >>= 8
69
70 def Sign(self, message):
rsleevi85d21772014-08-28 15:46:51 -070071 digest = hashlib.sha256(message).digest()
72 prefix = PKCS1v15_SHA256_PREFIX
agl@chromium.org77a9ad92012-03-20 15:14:27 +000073
74 em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest))
75 em[0] = '\x00'
76 em[1] = '\x01'
77 em += "\x00" + prefix + digest
78
79 n = 0
80 for x in em:
81 n <<= 8
82 n |= ord(x)
83
84 s = ModExp(n, self.d, self.m)
85 out = []
86 while s != 0:
87 out.append(s & 0xff)
88 s >>= 8
89 out.reverse()
90 return '\x00' * (self.modlen - len(out)) + asn1.ToBytes(out)
91
92 def ToDER(self):
93 return asn1.ToDER(asn1.SEQUENCE([self.m, self.e]))
94
95
96def Name(cn = None, c = None, o = None):
97 names = asn1.SEQUENCE([])
98
99 if cn is not None:
100 names.children.append(
101 asn1.SET([
102 asn1.SEQUENCE([
103 COMMON_NAME, cn,
104 ])
105 ])
106 )
107
108 if c is not None:
109 names.children.append(
110 asn1.SET([
111 asn1.SEQUENCE([
112 COUNTRY, c,
113 ])
114 ])
115 )
116
117 if o is not None:
118 names.children.append(
119 asn1.SET([
120 asn1.SEQUENCE([
121 ORGANIZATION, o,
122 ])
123 ])
124 )
125
126 return names
127
128
129# The private key and root certificate name are hard coded here:
130
131# This is the private key
132KEY = RSA(0x00a71998f2930bfe73d031a87f133d2f378eeeeed52a77e44d0fc9ff6f07ff32cbf3da999de4ed65832afcb0807f98787506539d258a0ce3c2c77967653099a9034a9b115a876c39a8c4e4ed4acd0c64095946fb39eeeb47a0704dbb018acf48c3a1c4b895fc409fb4a340a986b1afc45519ab9eca47c30185c771c64aa5ecf07d,
133 3,
134 0x6f6665f70cb2a9a28acbc5aa0cd374cfb49f49e371a542de0a86aa4a0554cc87f7e71113edf399021ca875aaffbafaf8aee268c3b15ded2c84fb9a4375bbc6011d841e57833bc6f998d25daf6fa7f166b233e3e54a4bae7a5aaaba21431324967d5ff3e1d4f413827994262115ca54396e7068d0afa7af787a5782bc7040e6d3)
135
136# And the same thing in PEM format
137KEY_PEM = '''-----BEGIN RSA PRIVATE KEY-----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151-----END RSA PRIVATE KEY-----
152'''
153
154# Root certificate CN
155ISSUER_CN = "Testing CA"
156
157# All certificates are issued under this policy OID, in the Google arc:
158CERT_POLICY_OID = asn1.OID([1, 3, 6, 1, 4, 1, 11129, 2, 4, 1])
159
160# These result in the following root certificate:
161# -----BEGIN CERTIFICATE-----
mattmadace8e2016-10-03 14:07:15 -0700162# MIIBzTCCATagAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwpUZXN0aW5nIENBMB4X
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000163# DTEwMDEwMTA2MDAwMFoXDTMyMTIwMTA2MDAwMFowFTETMBEGA1UEAxMKVGVzdGluZyBDQTCBnTAN
164# BgkqhkiG9w0BAQEFAAOBiwAwgYcCgYEApxmY8pML/nPQMah/Ez0vN47u7tUqd+RND8n/bwf/Msvz
165# 2pmd5O1lgyr8sIB/mHh1BlOdJYoM48LHeWdlMJmpA0qbEVqHbDmoxOTtSs0MZAlZRvs57utHoHBN
mattmadace8e2016-10-03 14:07:15 -0700166# uwGKz0jDocS4lfxAn7SjQKmGsa/EVRmrnspHwwGFx3HGSqXs8H0CAQOjLzAtMBIGA1UdEwEB/wQI
167# MAYBAf8CAQAwFwYDVR0gBBAwDjAMBgorBgEEAdZ5AgQBMA0GCSqGSIb3DQEBCwUAA4GBAHJJigXg
168# ArH/E9n3AilgivA58hawSRVqiTHHv7oAguDRrA4zC8IvsL6b/6LV7nA3KWM0OUSZSGE3zQb9UlB2
169# nNYsPMdv0Ls4GuOzVfy4bnQXqMWIflRw9L5Z5KH8Vu5U3ohoOUCfWN1sYMoeS9/22K9xtRsDPS+d
170# pQo7Q6ZoOo8o
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000171# -----END CERTIFICATE-----
172
mattmadace8e2016-10-03 14:07:15 -0700173# If you update any of the above, you can generate a new root by running this
174# file as a script.
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000175
176
177# Various OIDs
178
179AIA_OCSP = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1])
180AUTHORITY_INFORMATION_ACCESS = asn1.OID([1, 3, 6, 1, 5, 5, 7, 1, 1])
181BASIC_CONSTRAINTS = asn1.OID([2, 5, 29, 19])
182CERT_POLICIES = asn1.OID([2, 5, 29, 32])
183COMMON_NAME = asn1.OID([2, 5, 4, 3])
184COUNTRY = asn1.OID([2, 5, 4, 6])
185HASH_SHA1 = asn1.OID([1, 3, 14, 3, 2, 26])
186OCSP_TYPE_BASIC = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1, 1])
187ORGANIZATION = asn1.OID([2, 5, 4, 10])
188PUBLIC_KEY_RSA = asn1.OID([1, 2, 840, 113549, 1, 1, 1])
rsleevi85d21772014-08-28 15:46:51 -0700189SHA256_WITH_RSA_ENCRYPTION = asn1.OID([1, 2, 840, 113549, 1, 1, 11])
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000190
191
192def MakeCertificate(
193 issuer_cn, subject_cn, serial, pubkey, privkey, ocsp_url = None):
194 '''MakeCertificate returns a DER encoded certificate, signed by privkey.'''
195 extensions = asn1.SEQUENCE([])
196
197 # Default subject name fields
198 c = "XX"
199 o = "Testing Org"
200
201 if issuer_cn == subject_cn:
202 # Root certificate.
203 c = None
204 o = None
205 extensions.children.append(
206 asn1.SEQUENCE([
mattmadace8e2016-10-03 14:07:15 -0700207 BASIC_CONSTRAINTS,
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000208 True,
209 asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([
210 True, # IsCA
211 0, # Path len
212 ]))),
213 ]))
214
215 if ocsp_url is not None:
216 extensions.children.append(
217 asn1.SEQUENCE([
218 AUTHORITY_INFORMATION_ACCESS,
mattmadace8e2016-10-03 14:07:15 -0700219 # There is implicitly a critical=False here. Since false is the default,
220 # encoding the value would be invalid DER.
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000221 asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([
222 asn1.SEQUENCE([
223 AIA_OCSP,
224 asn1.Raw(asn1.TagAndLength(0x86, len(ocsp_url)) + ocsp_url),
225 ]),
226 ]))),
227 ]))
228
229 extensions.children.append(
230 asn1.SEQUENCE([
231 CERT_POLICIES,
mattmadace8e2016-10-03 14:07:15 -0700232 # There is implicitly a critical=False here. Since false is the default,
233 # encoding the value would be invalid DER.
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000234 asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([
235 asn1.SEQUENCE([ # PolicyInformation
236 CERT_POLICY_OID,
237 ]),
238 ]))),
239 ])
240 )
241
242 tbsCert = asn1.ToDER(asn1.SEQUENCE([
243 asn1.Explicit(0, 2), # Version
244 serial,
rsleevi85d21772014-08-28 15:46:51 -0700245 asn1.SEQUENCE([SHA256_WITH_RSA_ENCRYPTION, None]), # SignatureAlgorithm
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000246 Name(cn = issuer_cn), # Issuer
247 asn1.SEQUENCE([ # Validity
248 asn1.UTCTime("100101060000Z"), # NotBefore
249 asn1.UTCTime("321201060000Z"), # NotAfter
250 ]),
251 Name(cn = subject_cn, c = c, o = o), # Subject
252 asn1.SEQUENCE([ # SubjectPublicKeyInfo
253 asn1.SEQUENCE([ # Algorithm
254 PUBLIC_KEY_RSA,
255 None,
256 ]),
257 asn1.BitString(asn1.ToDER(pubkey)),
258 ]),
259 asn1.Explicit(3, extensions),
260 ]))
261
262 return asn1.ToDER(asn1.SEQUENCE([
263 asn1.Raw(tbsCert),
264 asn1.SEQUENCE([
rsleevi85d21772014-08-28 15:46:51 -0700265 SHA256_WITH_RSA_ENCRYPTION,
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000266 None,
267 ]),
268 asn1.BitString(privkey.Sign(tbsCert)),
269 ]))
270
dadrian4ccf51c2016-07-20 15:36:58 -0700271def MakeOCSPSingleResponse(
272 issuer_name_hash, issuer_key_hash, serial, ocsp_state, ocsp_date):
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000273 cert_status = None
agl@chromium.orgb5f388a2012-06-29 17:54:06 +0000274 if ocsp_state == OCSP_STATE_REVOKED:
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000275 cert_status = asn1.Explicit(1, asn1.GeneralizedTime("20100101060000Z"))
agl@chromium.orgb5f388a2012-06-29 17:54:06 +0000276 elif ocsp_state == OCSP_STATE_UNKNOWN:
277 cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 2, 0))
278 elif ocsp_state == OCSP_STATE_GOOD:
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000279 cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0))
dadrian4ccf51c2016-07-20 15:36:58 -0700280 elif ocsp_state == OCSP_STATE_MISMATCHED_SERIAL:
281 cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0))
282 serial -= 1
agl@chromium.orgb5f388a2012-06-29 17:54:06 +0000283 else:
284 raise ValueError('Bad OCSP state: ' + str(ocsp_state))
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000285
dadrian4ccf51c2016-07-20 15:36:58 -0700286 now = datetime.datetime.fromtimestamp(time.mktime(time.gmtime()))
287 if ocsp_date == OCSP_DATE_VALID:
288 thisUpdate = now - datetime.timedelta(days=1)
289 nextUpdate = thisUpdate + datetime.timedelta(weeks=1)
290 elif ocsp_date == OCSP_DATE_OLD:
dadrian9a07cc92016-07-22 10:44:37 -0700291 thisUpdate = now - datetime.timedelta(days=1, weeks=1)
dadrian4ccf51c2016-07-20 15:36:58 -0700292 nextUpdate = thisUpdate + datetime.timedelta(weeks=1)
293 elif ocsp_date == OCSP_DATE_EARLY:
dadrian9a07cc92016-07-22 10:44:37 -0700294 thisUpdate = now + datetime.timedelta(days=1)
dadrian4ccf51c2016-07-20 15:36:58 -0700295 nextUpdate = thisUpdate + datetime.timedelta(weeks=1)
296 elif ocsp_date == OCSP_DATE_LONG:
297 thisUpdate = now - datetime.timedelta(days=365)
dadrian9a07cc92016-07-22 10:44:37 -0700298 nextUpdate = thisUpdate + datetime.timedelta(days=366)
dadrian4ccf51c2016-07-20 15:36:58 -0700299 else:
300 raise ValueError('Bad OCSP date: ' + str(ocsp_date))
301
302 return asn1.SEQUENCE([ # SingleResponse
303 asn1.SEQUENCE([ # CertID
304 asn1.SEQUENCE([ # hashAlgorithm
305 HASH_SHA1,
306 None,
307 ]),
308 issuer_name_hash,
309 issuer_key_hash,
310 serial,
311 ]),
312 cert_status,
313 asn1.GeneralizedTime( # thisUpdate
314 thisUpdate.strftime(GENERALIZED_TIME_FORMAT)
315 ),
316 asn1.Explicit( # nextUpdate
317 0,
318 asn1.GeneralizedTime(nextUpdate.strftime(GENERALIZED_TIME_FORMAT))
319 ),
320 ])
321
322def MakeOCSPResponse(
323 issuer_cn, issuer_key, serial, ocsp_states, ocsp_dates, ocsp_produced):
324 # https://tools.ietf.org/html/rfc2560
325 issuer_name_hash = asn1.OCTETSTRING(
326 hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest())
327
328 issuer_key_hash = asn1.OCTETSTRING(
329 hashlib.sha1(asn1.ToDER(issuer_key)).digest())
330
331 now = datetime.datetime.fromtimestamp(time.mktime(time.gmtime()))
332 if ocsp_produced == OCSP_PRODUCED_VALID:
333 producedAt = now - datetime.timedelta(days=1)
334 elif ocsp_produced == OCSP_PRODUCED_BEFORE_CERT:
335 producedAt = datetime.datetime.strptime(
336 "19100101050000Z", GENERALIZED_TIME_FORMAT)
337 elif ocsp_produced == OCSP_PRODUCED_AFTER_CERT:
338 producedAt = datetime.datetime.strptime(
339 "20321201070000Z", GENERALIZED_TIME_FORMAT)
340 else:
341 raise ValueError('Bad OCSP produced: ' + str(ocsp_produced))
342
343 single_responses = [
344 MakeOCSPSingleResponse(issuer_name_hash, issuer_key_hash, serial,
345 ocsp_state, ocsp_date)
346 for ocsp_state, ocsp_date in itertools.izip(ocsp_states, ocsp_dates)
347 ]
348
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000349 basic_resp_data_der = asn1.ToDER(asn1.SEQUENCE([
350 asn1.Explicit(2, issuer_key_hash),
dadrian4ccf51c2016-07-20 15:36:58 -0700351 asn1.GeneralizedTime(producedAt.strftime(GENERALIZED_TIME_FORMAT)),
352 asn1.SEQUENCE(single_responses),
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000353 ]))
354
355 basic_resp = asn1.SEQUENCE([
356 asn1.Raw(basic_resp_data_der),
357 asn1.SEQUENCE([
rsleevi85d21772014-08-28 15:46:51 -0700358 SHA256_WITH_RSA_ENCRYPTION,
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000359 None,
360 ]),
361 asn1.BitString(issuer_key.Sign(basic_resp_data_der)),
362 ])
363
364 resp = asn1.SEQUENCE([
365 asn1.ENUMERATED(0),
366 asn1.Explicit(0, asn1.SEQUENCE([
367 OCSP_TYPE_BASIC,
368 asn1.OCTETSTRING(asn1.ToDER(basic_resp)),
369 ]))
370 ])
371
372 return asn1.ToDER(resp)
373
374
375def DERToPEM(der):
376 pem = '-----BEGIN CERTIFICATE-----\n'
377 pem += der.encode('base64')
378 pem += '-----END CERTIFICATE-----\n'
379 return pem
380
agl@chromium.orgb5f388a2012-06-29 17:54:06 +0000381# unauthorizedDER is an OCSPResponse with a status of 6:
382# SEQUENCE { ENUM(6) }
383unauthorizedDER = '30030a0106'.decode('hex')
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000384
385def GenerateCertKeyAndOCSP(subject = "127.0.0.1",
386 ocsp_url = "http://127.0.0.1",
dadrian4ccf51c2016-07-20 15:36:58 -0700387 ocsp_states = None,
388 ocsp_dates = None,
389 ocsp_produced = OCSP_PRODUCED_VALID,
agl@chromium.orgdf778142013-07-31 21:57:28 +0000390 serial = 0):
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000391 '''GenerateCertKeyAndOCSP returns a (cert_and_key_pem, ocsp_der) where:
392 * cert_and_key_pem contains a certificate and private key in PEM format
393 with the given subject common name and OCSP URL.
394 * ocsp_der contains a DER encoded OCSP response or None if ocsp_url is
395 None'''
396
dadrian4ccf51c2016-07-20 15:36:58 -0700397 if ocsp_states is None:
398 ocsp_states = [OCSP_STATE_GOOD]
399 if ocsp_dates is None:
400 ocsp_dates = [OCSP_DATE_VALID]
401
agl@chromium.orgdf778142013-07-31 21:57:28 +0000402 if serial == 0:
403 serial = RandomNumber(16)
agl@chromium.orgf80c1e62012-04-24 16:33:41 +0000404 cert_der = MakeCertificate(ISSUER_CN, bytes(subject), serial, KEY, KEY,
405 bytes(ocsp_url))
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000406 cert_pem = DERToPEM(cert_der)
407
408 ocsp_der = None
409 if ocsp_url is not None:
dadrian4ccf51c2016-07-20 15:36:58 -0700410 if ocsp_states[0] == OCSP_STATE_UNAUTHORIZED:
agl@chromium.orgb5f388a2012-06-29 17:54:06 +0000411 ocsp_der = unauthorizedDER
dadrian4ccf51c2016-07-20 15:36:58 -0700412 elif ocsp_states[0] == OCSP_STATE_INVALID_RESPONSE:
agl@chromium.orgb5f388a2012-06-29 17:54:06 +0000413 ocsp_der = '3'
dadrian4ccf51c2016-07-20 15:36:58 -0700414 elif ocsp_states[0] == OCSP_STATE_TRY_LATER:
415 resp = asn1.SEQUENCE([
416 asn1.ENUMERATED(3),
417 ])
418 ocsp_der = asn1.ToDER(resp)
419 elif ocsp_states[0] == OCSP_STATE_INVALID_RESPONSE_DATA:
420 invalid_data = asn1.ToDER(asn1.OCTETSTRING('not ocsp data'))
421 basic_resp = asn1.SEQUENCE([
422 asn1.Raw(invalid_data),
423 asn1.SEQUENCE([
424 SHA256_WITH_RSA_ENCRYPTION,
425 None,
426 ]),
427 asn1.BitString(KEY.Sign(invalid_data)),
428 ])
429 resp = asn1.SEQUENCE([
430 asn1.ENUMERATED(0),
431 asn1.Explicit(0, asn1.SEQUENCE([
432 OCSP_TYPE_BASIC,
433 asn1.OCTETSTRING(asn1.ToDER(basic_resp)),
434 ])),
435 ])
436 ocsp_der = asn1.ToDER(resp)
agl@chromium.orgb5f388a2012-06-29 17:54:06 +0000437 else:
dadrian4ccf51c2016-07-20 15:36:58 -0700438 ocsp_der = MakeOCSPResponse(
439 ISSUER_CN, KEY, serial, ocsp_states, ocsp_dates, ocsp_produced)
agl@chromium.org77a9ad92012-03-20 15:14:27 +0000440
441 return (cert_pem + KEY_PEM, ocsp_der)
mattmadace8e2016-10-03 14:07:15 -0700442
443
444if __name__ == '__main__':
445 def bin_to_array(s):
446 return ' '.join(['0x%02x,'%ord(c) for c in s])
447
448 import sys
449 sys.path.append(os.path.join(os.path.dirname(os.path.abspath(__file__)), '..',
450 '..', 'data', 'ssl', 'scripts'))
451 import crlsetutil
452
453 der_root = MakeCertificate(ISSUER_CN, ISSUER_CN, 1, KEY, KEY, None)
454 print 'ocsp-test-root.pem:'
455 print DERToPEM(der_root)
456
457 print
458 print 'kOCSPTestCertFingerprint:'
459 print bin_to_array(hashlib.sha1(der_root).digest())
460
461 print
462 print 'kOCSPTestCertSPKI:'
463 print bin_to_array(crlsetutil.der_cert_to_spki_hash(der_root))