| Index: net/tools/testserver/minica.py | 
| diff --git a/net/tools/testserver/minica.py b/net/tools/testserver/minica.py | 
| new file mode 100644 | 
| index 0000000000000000000000000000000000000000..9824fd0d5f929b3f0c4f01a6c8e4949107239c57 | 
| --- /dev/null | 
| +++ b/net/tools/testserver/minica.py | 
| @@ -0,0 +1,328 @@ | 
| +# Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
| +# Use of this source code is governed by a BSD-style license that can be | 
| +# found in the LICENSE file. | 
| + | 
| +import asn1 | 
| +import hashlib | 
| +import os | 
| + | 
| + | 
| +# This file implements very minimal certificate and OCSP generation. It's | 
| +# designed to test revocation checking. | 
| + | 
| +def RandomNumber(length_in_bytes): | 
| +  '''RandomNumber returns a random number of length 8*|length_in_bytes| bits''' | 
| +  rand = os.urandom(length_in_bytes) | 
| +  n = 0 | 
| +  for x in rand: | 
| +    n <<= 8 | 
| +    n |= ord(x) | 
| +  return n | 
| + | 
| + | 
| +def ModExp(n, e, p): | 
| +  '''ModExp returns n^e mod p''' | 
| +  r = 1 | 
| +  while e != 0: | 
| +    if e & 1: | 
| +      r = (r*n) % p | 
| +    e >>= 1 | 
| +    n = (n*n) % p | 
| +  return r | 
| + | 
| +# PKCS1v15_SHA1_PREFIX is the ASN.1 prefix for a SHA1 signature. | 
| +PKCS1v15_SHA1_PREFIX = '3021300906052b0e03021a05000414'.decode('hex') | 
| + | 
| +class RSA(object): | 
| +  def __init__(self, modulus, e, d): | 
| +    self.m = modulus | 
| +    self.e = e | 
| +    self.d = d | 
| + | 
| +    self.modlen = 0 | 
| +    m = modulus | 
| +    while m != 0: | 
| +      self.modlen += 1 | 
| +      m >>= 8 | 
| + | 
| +  def Sign(self, message): | 
| +    digest = hashlib.sha1(message).digest() | 
| +    prefix = PKCS1v15_SHA1_PREFIX | 
| + | 
| +    em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest)) | 
| +    em[0] = '\x00' | 
| +    em[1] = '\x01' | 
| +    em += "\x00" + prefix + digest | 
| + | 
| +    n = 0 | 
| +    for x in em: | 
| +      n <<= 8 | 
| +      n |= ord(x) | 
| + | 
| +    s = ModExp(n, self.d, self.m) | 
| +    out = [] | 
| +    while s != 0: | 
| +      out.append(s & 0xff) | 
| +      s >>= 8 | 
| +    out.reverse() | 
| +    return '\x00' * (self.modlen - len(out)) + asn1.ToBytes(out) | 
| + | 
| +  def ToDER(self): | 
| +    return asn1.ToDER(asn1.SEQUENCE([self.m, self.e])) | 
| + | 
| + | 
| +def Name(cn = None, c = None, o = None): | 
| +  names = asn1.SEQUENCE([]) | 
| + | 
| +  if cn is not None: | 
| +    names.children.append( | 
| +      asn1.SET([ | 
| +        asn1.SEQUENCE([ | 
| +          COMMON_NAME, cn, | 
| +        ]) | 
| +      ]) | 
| +    ) | 
| + | 
| +  if c is not None: | 
| +    names.children.append( | 
| +      asn1.SET([ | 
| +        asn1.SEQUENCE([ | 
| +          COUNTRY, c, | 
| +        ]) | 
| +      ]) | 
| +    ) | 
| + | 
| +  if o is not None: | 
| +    names.children.append( | 
| +      asn1.SET([ | 
| +        asn1.SEQUENCE([ | 
| +          ORGANIZATION, o, | 
| +        ]) | 
| +      ]) | 
| +    ) | 
| + | 
| +  return names | 
| + | 
| + | 
| +# The private key and root certificate name are hard coded here: | 
| + | 
| +# This is the private key | 
| +KEY = RSA(0x00a71998f2930bfe73d031a87f133d2f378eeeeed52a77e44d0fc9ff6f07ff32cbf3da999de4ed65832afcb0807f98787506539d258a0ce3c2c77967653099a9034a9b115a876c39a8c4e4ed4acd0c64095946fb39eeeb47a0704dbb018acf48c3a1c4b895fc409fb4a340a986b1afc45519ab9eca47c30185c771c64aa5ecf07d, | 
| +          3, | 
| +          0x6f6665f70cb2a9a28acbc5aa0cd374cfb49f49e371a542de0a86aa4a0554cc87f7e71113edf399021ca875aaffbafaf8aee268c3b15ded2c84fb9a4375bbc6011d841e57833bc6f998d25daf6fa7f166b233e3e54a4bae7a5aaaba21431324967d5ff3e1d4f413827994262115ca54396e7068d0afa7af787a5782bc7040e6d3) | 
| + | 
| +# And the same thing in PEM format | 
| +KEY_PEM = '''-----BEGIN RSA PRIVATE KEY----- | 
| +MIICXAIBAAKBgQCnGZjykwv+c9AxqH8TPS83ju7u1Sp35E0Pyf9vB/8yy/PamZ3k | 
| +7WWDKvywgH+YeHUGU50ligzjwsd5Z2UwmakDSpsRWodsOajE5O1KzQxkCVlG+znu | 
| +60egcE27AYrPSMOhxLiV/ECftKNAqYaxr8RVGaueykfDAYXHccZKpezwfQIBAwKB | 
| +gG9mZfcMsqmiisvFqgzTdM+0n0njcaVC3gqGqkoFVMyH9+cRE+3zmQIcqHWq/7r6 | 
| ++K7iaMOxXe0shPuaQ3W7xgEdhB5XgzvG+ZjSXa9vp/FmsjPj5UpLrnpaqrohQxMk | 
| +ln1f8+HU9BOCeZQmIRXKVDlucGjQr6eveHpXgrxwQObTAkEA2wBAfuduw5G0/VfN | 
| +Wx66D5fbPccfYFqLM5LuTimLmNqzK2gIKXckB2sm44gJZ6wVlumaB1CSNug2LNYx | 
| +3cAjUwJBAMNUo1hbI8ugqqwI9kpxv9+2Heea4BlnXbS6tYF8pvkHMoliuxNbXmmB | 
| +u4zNB5iZ6V0ZZ4nvtUNo2cGr/h/Lcu8CQQCSACr/RPSCYSNTj948vya1D+d+hL+V | 
| +kbIiYfQ0G7Jl5yIc8AVw+hgE8hntBVuacrkPRmaviwwkms7IjsvpKsI3AkEAgjhs | 
| +5ZIX3RXHHVtO3EvVP86+mmdAEO+TzdHOVlMZ+1ohsOx8t5I+8QEnszNaZbvw6Lua | 
| +W/UjgkXmgR1UFTJMnwJBAKErmAw21/g3SST0a4wlyaGT/MbXL8Ouwnb5IOKQVe55 | 
| +CZdeVeSh6cJ4hAcQKfr2s1JaZTJFIBPGKAif5HqpydA= | 
| +-----END RSA PRIVATE KEY----- | 
| +''' | 
| + | 
| +# Root certificate CN | 
| +ISSUER_CN = "Testing CA" | 
| + | 
| +# All certificates are issued under this policy OID, in the Google arc: | 
| +CERT_POLICY_OID = asn1.OID([1, 3, 6, 1, 4, 1, 11129, 2, 4, 1]) | 
| + | 
| +# These result in the following root certificate: | 
| +# -----BEGIN CERTIFICATE----- | 
| +# MIIB0TCCATqgAwIBAgIBATANBgkqhkiG9w0BAQUFADAVMRMwEQYDVQQDEwpUZXN0aW5nIENBMB4X | 
| +# DTEwMDEwMTA2MDAwMFoXDTMyMTIwMTA2MDAwMFowFTETMBEGA1UEAxMKVGVzdGluZyBDQTCBnTAN | 
| +# BgkqhkiG9w0BAQEFAAOBiwAwgYcCgYEApxmY8pML/nPQMah/Ez0vN47u7tUqd+RND8n/bwf/Msvz | 
| +# 2pmd5O1lgyr8sIB/mHh1BlOdJYoM48LHeWdlMJmpA0qbEVqHbDmoxOTtSs0MZAlZRvs57utHoHBN | 
| +# uwGKz0jDocS4lfxAn7SjQKmGsa/EVRmrnspHwwGFx3HGSqXs8H0CAQOjMzAxMBIGA1UdEwEB/wQI | 
| +# MAYBAf8CAQAwGwYDVR0gAQEABBEwDzANBgsrBgEEAdZ5AgHODzANBgkqhkiG9w0BAQUFAAOBgQA/ | 
| +# STb40A6D+93jMfLGQzXc997IsaJZdoPt7tYa8PqGJBL62EiTj+erd/H5pDZx/2/bcpOG4m9J56yg | 
| +# wOohbllw2TM+oeEd8syzV6X+1SIPnGI56JRrm3UXcHYx1Rq5loM9WKAiz/WmIWmskljsEQ7+542p | 
| +# q0pkHjs8nuXovSkUYA== | 
| +# -----END CERTIFICATE----- | 
| + | 
| +# If you update any of the above, you can generate a new root with the | 
| +# following line: | 
| +#   print DERToPEM(MakeCertificate(ISSUER_CN, ISSUER_CN, 1, KEY, KEY, None)) | 
| + | 
| + | 
| +# Various OIDs | 
| + | 
| +AIA_OCSP = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1]) | 
| +AUTHORITY_INFORMATION_ACCESS = asn1.OID([1, 3, 6, 1, 5, 5, 7, 1, 1]) | 
| +BASIC_CONSTRAINTS = asn1.OID([2, 5, 29, 19]) | 
| +CERT_POLICIES = asn1.OID([2, 5, 29, 32]) | 
| +COMMON_NAME = asn1.OID([2, 5, 4, 3]) | 
| +COUNTRY = asn1.OID([2, 5, 4, 6]) | 
| +HASH_SHA1 = asn1.OID([1, 3, 14, 3, 2, 26]) | 
| +OCSP_TYPE_BASIC = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1, 1]) | 
| +ORGANIZATION = asn1.OID([2, 5, 4, 10]) | 
| +PUBLIC_KEY_RSA = asn1.OID([1, 2, 840, 113549, 1, 1, 1]) | 
| +SHA1_WITH_RSA_ENCRYPTION = asn1.OID([1, 2, 840, 113549, 1, 1, 5]) | 
| + | 
| + | 
| +def MakeCertificate( | 
| +    issuer_cn, subject_cn, serial, pubkey, privkey, ocsp_url = None): | 
| +  '''MakeCertificate returns a DER encoded certificate, signed by privkey.''' | 
| +  extensions = asn1.SEQUENCE([]) | 
| + | 
| +  # Default subject name fields | 
| +  c = "XX" | 
| +  o = "Testing Org" | 
| + | 
| +  if issuer_cn == subject_cn: | 
| +    # Root certificate. | 
| +    c = None | 
| +    o = None | 
| +    extensions.children.append( | 
| +      asn1.SEQUENCE([ | 
| +        basic_constraints, | 
| +        True, | 
| +        asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ | 
| +          True, # IsCA | 
| +          0, # Path len | 
| +        ]))), | 
| +      ])) | 
| + | 
| +  if ocsp_url is not None: | 
| +    extensions.children.append( | 
| +      asn1.SEQUENCE([ | 
| +        AUTHORITY_INFORMATION_ACCESS, | 
| +        False, | 
| +        asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ | 
| +          asn1.SEQUENCE([ | 
| +            AIA_OCSP, | 
| +            asn1.Raw(asn1.TagAndLength(0x86, len(ocsp_url)) + ocsp_url), | 
| +          ]), | 
| +        ]))), | 
| +      ])) | 
| + | 
| +  extensions.children.append( | 
| +    asn1.SEQUENCE([ | 
| +      CERT_POLICIES, | 
| +      False, | 
| +      asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([ | 
| +        asn1.SEQUENCE([ # PolicyInformation | 
| +          CERT_POLICY_OID, | 
| +        ]), | 
| +      ]))), | 
| +    ]) | 
| +  ) | 
| + | 
| +  tbsCert = asn1.ToDER(asn1.SEQUENCE([ | 
| +      asn1.Explicit(0, 2), # Version | 
| +      serial, | 
| +      asn1.SEQUENCE([SHA1_WITH_RSA_ENCRYPTION, None]), # SignatureAlgorithm | 
| +      Name(cn = issuer_cn), # Issuer | 
| +      asn1.SEQUENCE([ # Validity | 
| +        asn1.UTCTime("100101060000Z"), # NotBefore | 
| +        asn1.UTCTime("321201060000Z"), # NotAfter | 
| +      ]), | 
| +      Name(cn = subject_cn, c = c, o = o), # Subject | 
| +      asn1.SEQUENCE([ # SubjectPublicKeyInfo | 
| +        asn1.SEQUENCE([ # Algorithm | 
| +          PUBLIC_KEY_RSA, | 
| +          None, | 
| +        ]), | 
| +        asn1.BitString(asn1.ToDER(pubkey)), | 
| +      ]), | 
| +      asn1.Explicit(3, extensions), | 
| +    ])) | 
| + | 
| +  return asn1.ToDER(asn1.SEQUENCE([ | 
| +    asn1.Raw(tbsCert), | 
| +    asn1.SEQUENCE([ | 
| +      SHA1_WITH_RSA_ENCRYPTION, | 
| +      None, | 
| +    ]), | 
| +    asn1.BitString(privkey.Sign(tbsCert)), | 
| +  ])) | 
| + | 
| + | 
| +def MakeOCSPResponse(issuer_cn, issuer_key, serial, revoked): | 
| +  # https://tools.ietf.org/html/rfc2560 | 
| +  issuer_name_hash = asn1.OCTETSTRING( | 
| +      hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest()) | 
| + | 
| +  issuer_key_hash = asn1.OCTETSTRING( | 
| +      hashlib.sha1(asn1.ToDER(issuer_key)).digest()) | 
| + | 
| +  cert_status = None | 
| +  if revoked: | 
| +    cert_status = asn1.Explicit(1, asn1.GeneralizedTime("20100101060000Z")) | 
| +  else: | 
| +    cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0)) | 
| + | 
| +  basic_resp_data_der = asn1.ToDER(asn1.SEQUENCE([ | 
| +    asn1.Explicit(2, issuer_key_hash), | 
| +    asn1.GeneralizedTime("20100101060000Z"), # producedAt | 
| +    asn1.SEQUENCE([ | 
| +      asn1.SEQUENCE([ # SingleResponse | 
| +        asn1.SEQUENCE([ # CertID | 
| +          asn1.SEQUENCE([ # hashAlgorithm | 
| +            HASH_SHA1, | 
| +            None, | 
| +          ]), | 
| +          issuer_name_hash, | 
| +          issuer_key_hash, | 
| +          serial, | 
| +        ]), | 
| +        cert_status, | 
| +        asn1.GeneralizedTime("20100101060000Z"), # thisUpdate | 
| +        asn1.Explicit(0, asn1.GeneralizedTime("20300101060000Z")), # nextUpdate | 
| +      ]), | 
| +    ]), | 
| +  ])) | 
| + | 
| +  basic_resp = asn1.SEQUENCE([ | 
| +    asn1.Raw(basic_resp_data_der), | 
| +    asn1.SEQUENCE([ | 
| +      SHA1_WITH_RSA_ENCRYPTION, | 
| +      None, | 
| +    ]), | 
| +    asn1.BitString(issuer_key.Sign(basic_resp_data_der)), | 
| +  ]) | 
| + | 
| +  resp = asn1.SEQUENCE([ | 
| +    asn1.ENUMERATED(0), | 
| +    asn1.Explicit(0, asn1.SEQUENCE([ | 
| +      OCSP_TYPE_BASIC, | 
| +      asn1.OCTETSTRING(asn1.ToDER(basic_resp)), | 
| +    ])) | 
| +  ]) | 
| + | 
| +  return asn1.ToDER(resp) | 
| + | 
| + | 
| +def DERToPEM(der): | 
| +  pem = '-----BEGIN CERTIFICATE-----\n' | 
| +  pem += der.encode('base64') | 
| +  pem += '-----END CERTIFICATE-----\n' | 
| +  return pem | 
| + | 
| + | 
| +def GenerateCertKeyAndOCSP(subject = "127.0.0.1", | 
| +                           ocsp_url = "http://127.0.0.1", | 
| +                           ocsp_revoked = False): | 
| +  '''GenerateCertKeyAndOCSP returns a (cert_and_key_pem, ocsp_der) where: | 
| +       * cert_and_key_pem contains a certificate and private key in PEM format | 
| +         with the given subject common name and OCSP URL. | 
| +       * ocsp_der contains a DER encoded OCSP response or None if ocsp_url is | 
| +         None''' | 
| + | 
| +  serial = RandomNumber(16) | 
| +  cert_der = MakeCertificate(ISSUER_CN, subject, serial, KEY, KEY, ocsp_url) | 
| +  cert_pem = DERToPEM(cert_der) | 
| + | 
| +  ocsp_der = None | 
| +  if ocsp_url is not None: | 
| +    ocsp_der = MakeOCSPResponse(ISSUER_CN, KEY, serial, ocsp_revoked) | 
| + | 
| +  return (cert_pem + KEY_PEM, ocsp_der) | 
|  |