Chromium Code Reviews| Index: net/tools/testserver/minica.py |
| diff --git a/net/tools/testserver/minica.py b/net/tools/testserver/minica.py |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..8fd36877ddc68e7bcb0ccf4f75e636adc5c1a59c |
| --- /dev/null |
| +++ b/net/tools/testserver/minica.py |
| @@ -0,0 +1,327 @@ |
| +# Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| +# Use of this source code is governed by a BSD-style license that can be |
| +# found in the LICENSE file. |
| + |
| +import asn1 |
| +import hashlib |
| +import os |
| + |
| + |
| +# This file implements very minimal certificate and OCSP generation. It's |
| +# designed to test revocation checking. |
| + |
| +def RandomNumber(length_in_bytes): |
| + '''RandomNumber returns a random number of length 8*|length_in_bytes| bits''' |
| + rand = os.urandom(length_in_bytes) |
| + n = 0 |
| + for x in rand: |
| + n <<= 8 |
| + n |= ord(x) |
| + return n |
| + |
| + |
| +def ModExp(n, e, p): |
| + '''ModExp returns n^e mod p''' |
| + r = 1 |
| + while e != 0: |
| + if e & 1: |
| + r = (r*n) % p |
| + e >>= 1 |
| + n = (n*n) % p |
| + return r |
| + |
| + |
| +class RSA(object): |
| + def __init__(self, modulus, e, d): |
| + self.m = modulus |
| + self.e = e |
| + self.d = d |
| + |
| + self.modlen = 0 |
| + m = modulus |
| + while m != 0: |
| + self.modlen += 1 |
| + m >>= 8 |
| + |
| + def Sign(self, message): |
| + digest = hashlib.sha1(message).digest() |
| + # This is the ASN.1 prefix for a SHA1 signature. |
| + prefix = '3021300906052b0e03021a05000414'.decode('hex') |
|
Ryan Sleevi
2012/03/13 23:06:39
nit: This should be some form of constant.
agl
2012/03/13 23:44:03
Done.
|
| + |
| + em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest)) |
| + em[0] = '\x00' |
| + em[1] = '\x01' |
| + em += "\x00" + prefix + digest |
| + |
| + n = 0 |
| + for x in em: |
| + n <<= 8 |
| + n |= ord(x) |
| + |
| + s = ModExp(n, self.d, self.m) |
| + out = [] |
| + while s != 0: |
| + out.append(s & 0xff) |
| + s >>= 8 |
| + out.reverse() |
| + return '\x00' * (self.modlen - len(out)) + asn1.ToBytes(out) |
| + |
| + def ToDER(self): |
| + return asn1.ToDER(asn1.SEQUENCE([self.m, self.e])) |
| + |
| + |
| +def Name(cn = None, c = None, o = None): |
| + names = asn1.SEQUENCE([]) |
| + |
| + if cn is not None: |
| + names.children.append( |
| + asn1.SET([ |
| + asn1.SEQUENCE([ |
| + common_name, cn, |
| + ]) |
| + ]) |
| + ) |
| + |
| + if c is not None: |
| + names.children.append( |
| + asn1.SET([ |
| + asn1.SEQUENCE([ |
| + country, c, |
| + ]) |
| + ]) |
| + ) |
| + |
| + if o is not None: |
| + names.children.append( |
| + asn1.SET([ |
| + asn1.SEQUENCE([ |
| + organization, o, |
| + ]) |
| + ]) |
| + ) |
| + |
| + return names |
| + |
| + |
| +# The private key and root certificate name are hard coded here: |
| + |
| +# This is the private key |
| +key = RSA(0x00a71998f2930bfe73d031a87f133d2f378eeeeed52a77e44d0fc9ff6f07ff32cbf3da999de4ed65832afcb0807f98787506539d258a0ce3c2c77967653099a9034a9b115a876c39a8c4e4ed4acd0c64095946fb39eeeb47a0704dbb018acf48c3a1c4b895fc409fb4a340a986b1afc45519ab9eca47c30185c771c64aa5ecf07d, |
| + 3, |
| + 0x6f6665f70cb2a9a28acbc5aa0cd374cfb49f49e371a542de0a86aa4a0554cc87f7e71113edf399021ca875aaffbafaf8aee268c3b15ded2c84fb9a4375bbc6011d841e57833bc6f998d25daf6fa7f166b233e3e54a4bae7a5aaaba21431324967d5ff3e1d4f413827994262115ca54396e7068d0afa7af787a5782bc7040e6d3) |
| + |
| +# And the same thing in PEM format |
| +key_pem = '''-----BEGIN RSA PRIVATE KEY----- |
| +MIICXAIBAAKBgQCnGZjykwv+c9AxqH8TPS83ju7u1Sp35E0Pyf9vB/8yy/PamZ3k |
| +7WWDKvywgH+YeHUGU50ligzjwsd5Z2UwmakDSpsRWodsOajE5O1KzQxkCVlG+znu |
| +60egcE27AYrPSMOhxLiV/ECftKNAqYaxr8RVGaueykfDAYXHccZKpezwfQIBAwKB |
| +gG9mZfcMsqmiisvFqgzTdM+0n0njcaVC3gqGqkoFVMyH9+cRE+3zmQIcqHWq/7r6 |
| ++K7iaMOxXe0shPuaQ3W7xgEdhB5XgzvG+ZjSXa9vp/FmsjPj5UpLrnpaqrohQxMk |
| +ln1f8+HU9BOCeZQmIRXKVDlucGjQr6eveHpXgrxwQObTAkEA2wBAfuduw5G0/VfN |
| +Wx66D5fbPccfYFqLM5LuTimLmNqzK2gIKXckB2sm44gJZ6wVlumaB1CSNug2LNYx |
| +3cAjUwJBAMNUo1hbI8ugqqwI9kpxv9+2Heea4BlnXbS6tYF8pvkHMoliuxNbXmmB |
| +u4zNB5iZ6V0ZZ4nvtUNo2cGr/h/Lcu8CQQCSACr/RPSCYSNTj948vya1D+d+hL+V |
| +kbIiYfQ0G7Jl5yIc8AVw+hgE8hntBVuacrkPRmaviwwkms7IjsvpKsI3AkEAgjhs |
| +5ZIX3RXHHVtO3EvVP86+mmdAEO+TzdHOVlMZ+1ohsOx8t5I+8QEnszNaZbvw6Lua |
| +W/UjgkXmgR1UFTJMnwJBAKErmAw21/g3SST0a4wlyaGT/MbXL8Ouwnb5IOKQVe55 |
| +CZdeVeSh6cJ4hAcQKfr2s1JaZTJFIBPGKAif5HqpydA= |
| +-----END RSA PRIVATE KEY----- |
| +''' |
| + |
| +# Root certificate CN |
| +issuer_cn = "Testing CA" |
| + |
| +# All certificates are issued under this policy OID, in the Google arc: |
| +certPolicyOID = asn1.OID([1, 3, 6, 1, 4, 1, 11129, 2, 4, 1]) |
| + |
| +# These result in the following root certificate: |
| +# -----BEGIN CERTIFICATE----- |
| +# MIIB0TCCATqgAwIBAgIBATANBgkqhkiG9w0BAQUFADAVMRMwEQYDVQQDEwpUZXN0aW5nIENBMB4X |
| +# DTEwMDEwMTA2MDAwMFoXDTMyMTIwMTA2MDAwMFowFTETMBEGA1UEAxMKVGVzdGluZyBDQTCBnTAN |
| +# BgkqhkiG9w0BAQEFAAOBiwAwgYcCgYEApxmY8pML/nPQMah/Ez0vN47u7tUqd+RND8n/bwf/Msvz |
| +# 2pmd5O1lgyr8sIB/mHh1BlOdJYoM48LHeWdlMJmpA0qbEVqHbDmoxOTtSs0MZAlZRvs57utHoHBN |
| +# uwGKz0jDocS4lfxAn7SjQKmGsa/EVRmrnspHwwGFx3HGSqXs8H0CAQOjMzAxMBIGA1UdEwEB/wQI |
| +# MAYBAf8CAQAwGwYDVR0gAQEABBEwDzANBgsrBgEEAdZ5AgHODzANBgkqhkiG9w0BAQUFAAOBgQA/ |
| +# STb40A6D+93jMfLGQzXc997IsaJZdoPt7tYa8PqGJBL62EiTj+erd/H5pDZx/2/bcpOG4m9J56yg |
| +# wOohbllw2TM+oeEd8syzV6X+1SIPnGI56JRrm3UXcHYx1Rq5loM9WKAiz/WmIWmskljsEQ7+542p |
| +# q0pkHjs8nuXovSkUYA== |
| +# -----END CERTIFICATE----- |
| + |
|
Ryan Sleevi
2012/03/13 23:06:39
As should all of these
agl
2012/03/13 23:44:03
They are constants, but I've renamed them ALL_CAPS
|
| +# If you update any of the above, you can generate a new root with the |
| +# following line: |
| +# print DERToPEM(MakeCertificate(issuer_cn, issuer_cn, 1, key, key, None)) |
| + |
| + |
| +# Various OIDs |
| + |
| +aia_ocsp = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1]) |
| +authority_information_access = asn1.OID([1, 3, 6, 1, 5, 5, 7, 1, 1]) |
| +basic_constraints = asn1.OID([2, 5, 29, 19]) |
| +cert_policies = asn1.OID([2, 5, 29, 32]) |
| +common_name = asn1.OID([2, 5, 4, 3]) |
| +country = asn1.OID([2, 5, 4, 6]) |
| +hash_sha1 = asn1.OID([1, 3, 14, 3, 2, 26]) |
| +ocsp_type_basic = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1, 1]) |
| +organization = asn1.OID([2, 5, 4, 10]) |
| +public_key_rsa = asn1.OID([1, 2, 840, 113549, 1, 1, 1]) |
| +sha1_with_rsa_encryption = asn1.OID([1, 2, 840, 113549, 1, 1, 5]) |
|
Ryan Sleevi
2012/03/13 23:06:39
And these, renamed in ALL_CAPS per the style.
agl
2012/03/13 23:44:03
Done.
|
| + |
| + |
| +def MakeCertificate( |
| + issuer_cn, subject_cn, serial, pubkey, privkey, ocsp_url = None): |
| + '''MakeCertificate returns a DER encoded certificate, signed by privkey.''' |
| + extensions = asn1.SEQUENCE([]) |
| + |
| + # Default subject name fields |
| + c = "XX" |
| + o = "Testing Org" |
| + |
| + if issuer_cn == subject_cn: |
| + # Root certificate. |
| + c = None |
| + o = None |
| + extensions.children.append( |
| + asn1.SEQUENCE([ |
| + basic_constraints, |
| + True, |
| + asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ |
| + True, # IsCA |
| + 0, # Path len |
| + ]))), |
| + ])) |
| + |
| + if ocsp_url is not None: |
| + extensions.children.append( |
| + asn1.SEQUENCE([ |
| + authority_information_access, |
| + False, |
| + asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ |
| + asn1.SEQUENCE([ |
| + aia_ocsp, |
| + asn1.Raw(asn1.TagAndLength(0x86, len(ocsp_url)) + ocsp_url), |
| + ]), |
| + ]))), |
| + ])) |
| + |
| + extensions.children.append( |
| + asn1.SEQUENCE([ |
| + cert_policies, |
| + False, |
| + asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ |
| + asn1.SEQUENCE([ # PolicyInformation |
| + certPolicyOID, |
| + ]), |
| + ]))), |
| + ]) |
| + ) |
| + |
| + tbsCert = asn1.ToDER(asn1.SEQUENCE([ |
| + asn1.Explicit(0, 2), # Version |
| + serial, |
| + asn1.SEQUENCE([sha1_with_rsa_encryption, None]), # SignatureAlgorithm |
| + Name(cn = issuer_cn), # Issuer |
| + asn1.SEQUENCE([ # Validity |
| + asn1.UTCTime("100101060000Z"), # NotBefore |
| + asn1.UTCTime("321201060000Z"), # NotAfter |
| + ]), |
| + Name(cn = subject_cn, c = c, o = o), # Subject |
| + asn1.SEQUENCE([ # SubjectPublicKeyInfo |
| + asn1.SEQUENCE([ # Algorithm |
| + public_key_rsa, |
| + None, |
| + ]), |
| + asn1.BitString(asn1.ToDER(key)), |
| + ]), |
| + asn1.Explicit(3, extensions), |
| + ])) |
| + |
| + return asn1.ToDER(asn1.SEQUENCE([ |
| + asn1.Raw(tbsCert), |
| + asn1.SEQUENCE([ |
| + sha1_with_rsa_encryption, |
| + None, |
| + ]), |
| + asn1.BitString(key.Sign(tbsCert)), |
| + ])) |
| + |
| + |
| +def MakeOCSPResponse(issuer_cn, issuer_key, serial, revoked): |
| + # https://tools.ietf.org/html/rfc2560 |
| + issuer_name_hash = asn1.OCTETSTRING( |
| + hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest()) |
| + |
| + issuer_key_hash = asn1.OCTETSTRING( |
| + hashlib.sha1(asn1.ToDER(issuer_key)).digest()) |
| + |
| + cert_status = None |
| + if revoked: |
| + cert_status = asn1.Explicit(1, asn1.GeneralizedTime("20100101060000Z")) |
| + else: |
| + cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0)) |
| + |
| + basic_resp_data_der = asn1.ToDER(asn1.SEQUENCE([ |
| + asn1.Explicit(2, issuer_key_hash), |
| + asn1.GeneralizedTime("20100101060000Z"), # producedAt |
| + asn1.SEQUENCE([ |
| + asn1.SEQUENCE([ # SingleResponse |
| + asn1.SEQUENCE([ # CertID |
| + asn1.SEQUENCE([ # hashAlgorithm |
| + hash_sha1, |
| + None, |
| + ]), |
| + issuer_name_hash, |
| + issuer_key_hash, |
| + serial, |
| + ]), |
| + cert_status, |
| + asn1.GeneralizedTime("20100101060000Z"), # thisUpdate |
| + asn1.Explicit(0, asn1.GeneralizedTime("20300101060000Z")), # nextUpdate |
| + ]), |
| + ]), |
| + ])) |
| + |
| + basic_resp = asn1.SEQUENCE([ |
| + asn1.Raw(basic_resp_data_der), |
| + asn1.SEQUENCE([ |
| + sha1_with_rsa_encryption, |
| + None, |
| + ]), |
| + asn1.BitString(key.Sign(basic_resp_data_der)), |
| + ]) |
| + |
| + resp = asn1.SEQUENCE([ |
| + asn1.ENUMERATED(0), |
| + asn1.Explicit(0, asn1.SEQUENCE([ |
| + ocsp_type_basic, |
| + asn1.OCTETSTRING(asn1.ToDER(basic_resp)), |
| + ])) |
| + ]) |
| + |
| + return asn1.ToDER(resp) |
| + |
| + |
| +def DERToPEM(der): |
| + pem = '-----BEGIN CERTIFICATE-----\n' |
| + pem += der.encode('base64') |
| + pem += '-----END CERTIFICATE-----\n' |
| + return pem |
| + |
| + |
| +def GenerateCertKeyAndOCSP(subject = "127.0.0.1", |
| + ocsp_url = "http://127.0.0.1", |
| + ocsp_revoked = False): |
| + '''GenerateCertKeyAndOCSP returns a (cert_and_key_pem, ocsp_der) where: |
| + * cert_and_key_pem contains a certificate and private key in PEM format |
| + with the given subject common name and OCSP URL. |
| + * ocsp_der contains a DER encoded OCSP response or None if ocsp_url is |
| + None''' |
| + |
| + serial = RandomNumber(16) |
| + cert_der = MakeCertificate(issuer_cn, subject, serial, key, key, ocsp_url) |
| + cert_pem = DERToPEM(cert_der) |
| + |
| + ocsp_der = None |
| + if ocsp_url is not None: |
| + ocsp_der = MakeOCSPResponse(issuer_cn, key, serial, ocsp_revoked) |
| + |
| + return (cert_pem + key_pem, ocsp_der) |