summaryrefslogtreecommitdiffstats
path: root/net/tools/testserver/minica.py
diff options
context:
space:
mode:
Diffstat (limited to 'net/tools/testserver/minica.py')
-rw-r--r--net/tools/testserver/minica.py328
1 files changed, 0 insertions, 328 deletions
diff --git a/net/tools/testserver/minica.py b/net/tools/testserver/minica.py
deleted file mode 100644
index 9824fd0..0000000
--- a/net/tools/testserver/minica.py
+++ /dev/null
@@ -1,328 +0,0 @@
-# Copyright (c) 2012 The Chromium Authors. All rights reserved.
-# Use of this source code is governed by a BSD-style license that can be
-# found in the LICENSE file.
-
-import asn1
-import hashlib
-import os
-
-
-# This file implements very minimal certificate and OCSP generation. It's
-# designed to test revocation checking.
-
-def RandomNumber(length_in_bytes):
- '''RandomNumber returns a random number of length 8*|length_in_bytes| bits'''
- rand = os.urandom(length_in_bytes)
- n = 0
- for x in rand:
- n <<= 8
- n |= ord(x)
- return n
-
-
-def ModExp(n, e, p):
- '''ModExp returns n^e mod p'''
- r = 1
- while e != 0:
- if e & 1:
- r = (r*n) % p
- e >>= 1
- n = (n*n) % p
- return r
-
-# PKCS1v15_SHA1_PREFIX is the ASN.1 prefix for a SHA1 signature.
-PKCS1v15_SHA1_PREFIX = '3021300906052b0e03021a05000414'.decode('hex')
-
-class RSA(object):
- def __init__(self, modulus, e, d):
- self.m = modulus
- self.e = e
- self.d = d
-
- self.modlen = 0
- m = modulus
- while m != 0:
- self.modlen += 1
- m >>= 8
-
- def Sign(self, message):
- digest = hashlib.sha1(message).digest()
- prefix = PKCS1v15_SHA1_PREFIX
-
- em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest))
- em[0] = '\x00'
- em[1] = '\x01'
- em += "\x00" + prefix + digest
-
- n = 0
- for x in em:
- n <<= 8
- n |= ord(x)
-
- s = ModExp(n, self.d, self.m)
- out = []
- while s != 0:
- out.append(s & 0xff)
- s >>= 8
- out.reverse()
- return '\x00' * (self.modlen - len(out)) + asn1.ToBytes(out)
-
- def ToDER(self):
- return asn1.ToDER(asn1.SEQUENCE([self.m, self.e]))
-
-
-def Name(cn = None, c = None, o = None):
- names = asn1.SEQUENCE([])
-
- if cn is not None:
- names.children.append(
- asn1.SET([
- asn1.SEQUENCE([
- COMMON_NAME, cn,
- ])
- ])
- )
-
- if c is not None:
- names.children.append(
- asn1.SET([
- asn1.SEQUENCE([
- COUNTRY, c,
- ])
- ])
- )
-
- if o is not None:
- names.children.append(
- asn1.SET([
- asn1.SEQUENCE([
- ORGANIZATION, o,
- ])
- ])
- )
-
- return names
-
-
-# The private key and root certificate name are hard coded here:
-
-# This is the private key
-KEY = RSA(0x00a71998f2930bfe73d031a87f133d2f378eeeeed52a77e44d0fc9ff6f07ff32cbf3da999de4ed65832afcb0807f98787506539d258a0ce3c2c77967653099a9034a9b115a876c39a8c4e4ed4acd0c64095946fb39eeeb47a0704dbb018acf48c3a1c4b895fc409fb4a340a986b1afc45519ab9eca47c30185c771c64aa5ecf07d,
- 3,
- 0x6f6665f70cb2a9a28acbc5aa0cd374cfb49f49e371a542de0a86aa4a0554cc87f7e71113edf399021ca875aaffbafaf8aee268c3b15ded2c84fb9a4375bbc6011d841e57833bc6f998d25daf6fa7f166b233e3e54a4bae7a5aaaba21431324967d5ff3e1d4f413827994262115ca54396e7068d0afa7af787a5782bc7040e6d3)
-
-# And the same thing in PEM format
-KEY_PEM = '''-----BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCnGZjykwv+c9AxqH8TPS83ju7u1Sp35E0Pyf9vB/8yy/PamZ3k
-7WWDKvywgH+YeHUGU50ligzjwsd5Z2UwmakDSpsRWodsOajE5O1KzQxkCVlG+znu
-60egcE27AYrPSMOhxLiV/ECftKNAqYaxr8RVGaueykfDAYXHccZKpezwfQIBAwKB
-gG9mZfcMsqmiisvFqgzTdM+0n0njcaVC3gqGqkoFVMyH9+cRE+3zmQIcqHWq/7r6
-+K7iaMOxXe0shPuaQ3W7xgEdhB5XgzvG+ZjSXa9vp/FmsjPj5UpLrnpaqrohQxMk
-ln1f8+HU9BOCeZQmIRXKVDlucGjQr6eveHpXgrxwQObTAkEA2wBAfuduw5G0/VfN
-Wx66D5fbPccfYFqLM5LuTimLmNqzK2gIKXckB2sm44gJZ6wVlumaB1CSNug2LNYx
-3cAjUwJBAMNUo1hbI8ugqqwI9kpxv9+2Heea4BlnXbS6tYF8pvkHMoliuxNbXmmB
-u4zNB5iZ6V0ZZ4nvtUNo2cGr/h/Lcu8CQQCSACr/RPSCYSNTj948vya1D+d+hL+V
-kbIiYfQ0G7Jl5yIc8AVw+hgE8hntBVuacrkPRmaviwwkms7IjsvpKsI3AkEAgjhs
-5ZIX3RXHHVtO3EvVP86+mmdAEO+TzdHOVlMZ+1ohsOx8t5I+8QEnszNaZbvw6Lua
-W/UjgkXmgR1UFTJMnwJBAKErmAw21/g3SST0a4wlyaGT/MbXL8Ouwnb5IOKQVe55
-CZdeVeSh6cJ4hAcQKfr2s1JaZTJFIBPGKAif5HqpydA=
------END RSA PRIVATE KEY-----
-'''
-
-# Root certificate CN
-ISSUER_CN = "Testing CA"
-
-# All certificates are issued under this policy OID, in the Google arc:
-CERT_POLICY_OID = asn1.OID([1, 3, 6, 1, 4, 1, 11129, 2, 4, 1])
-
-# These result in the following root certificate:
-# -----BEGIN CERTIFICATE-----
-# MIIB0TCCATqgAwIBAgIBATANBgkqhkiG9w0BAQUFADAVMRMwEQYDVQQDEwpUZXN0aW5nIENBMB4X
-# DTEwMDEwMTA2MDAwMFoXDTMyMTIwMTA2MDAwMFowFTETMBEGA1UEAxMKVGVzdGluZyBDQTCBnTAN
-# BgkqhkiG9w0BAQEFAAOBiwAwgYcCgYEApxmY8pML/nPQMah/Ez0vN47u7tUqd+RND8n/bwf/Msvz
-# 2pmd5O1lgyr8sIB/mHh1BlOdJYoM48LHeWdlMJmpA0qbEVqHbDmoxOTtSs0MZAlZRvs57utHoHBN
-# uwGKz0jDocS4lfxAn7SjQKmGsa/EVRmrnspHwwGFx3HGSqXs8H0CAQOjMzAxMBIGA1UdEwEB/wQI
-# MAYBAf8CAQAwGwYDVR0gAQEABBEwDzANBgsrBgEEAdZ5AgHODzANBgkqhkiG9w0BAQUFAAOBgQA/
-# STb40A6D+93jMfLGQzXc997IsaJZdoPt7tYa8PqGJBL62EiTj+erd/H5pDZx/2/bcpOG4m9J56yg
-# wOohbllw2TM+oeEd8syzV6X+1SIPnGI56JRrm3UXcHYx1Rq5loM9WKAiz/WmIWmskljsEQ7+542p
-# q0pkHjs8nuXovSkUYA==
-# -----END CERTIFICATE-----
-
-# If you update any of the above, you can generate a new root with the
-# following line:
-# print DERToPEM(MakeCertificate(ISSUER_CN, ISSUER_CN, 1, KEY, KEY, None))
-
-
-# Various OIDs
-
-AIA_OCSP = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1])
-AUTHORITY_INFORMATION_ACCESS = asn1.OID([1, 3, 6, 1, 5, 5, 7, 1, 1])
-BASIC_CONSTRAINTS = asn1.OID([2, 5, 29, 19])
-CERT_POLICIES = asn1.OID([2, 5, 29, 32])
-COMMON_NAME = asn1.OID([2, 5, 4, 3])
-COUNTRY = asn1.OID([2, 5, 4, 6])
-HASH_SHA1 = asn1.OID([1, 3, 14, 3, 2, 26])
-OCSP_TYPE_BASIC = asn1.OID([1, 3, 6, 1, 5, 5, 7, 48, 1, 1])
-ORGANIZATION = asn1.OID([2, 5, 4, 10])
-PUBLIC_KEY_RSA = asn1.OID([1, 2, 840, 113549, 1, 1, 1])
-SHA1_WITH_RSA_ENCRYPTION = asn1.OID([1, 2, 840, 113549, 1, 1, 5])
-
-
-def MakeCertificate(
- issuer_cn, subject_cn, serial, pubkey, privkey, ocsp_url = None):
- '''MakeCertificate returns a DER encoded certificate, signed by privkey.'''
- extensions = asn1.SEQUENCE([])
-
- # Default subject name fields
- c = "XX"
- o = "Testing Org"
-
- if issuer_cn == subject_cn:
- # Root certificate.
- c = None
- o = None
- extensions.children.append(
- asn1.SEQUENCE([
- basic_constraints,
- True,
- asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([
- True, # IsCA
- 0, # Path len
- ]))),
- ]))
-
- if ocsp_url is not None:
- extensions.children.append(
- asn1.SEQUENCE([
- AUTHORITY_INFORMATION_ACCESS,
- False,
- asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([
- asn1.SEQUENCE([
- AIA_OCSP,
- asn1.Raw(asn1.TagAndLength(0x86, len(ocsp_url)) + ocsp_url),
- ]),
- ]))),
- ]))
-
- extensions.children.append(
- asn1.SEQUENCE([
- CERT_POLICIES,
- False,
- asn1.OCTETSTRING(asn1.ToDER(asn1.SEQUENCE([
- asn1.SEQUENCE([ # PolicyInformation
- CERT_POLICY_OID,
- ]),
- ]))),
- ])
- )
-
- tbsCert = asn1.ToDER(asn1.SEQUENCE([
- asn1.Explicit(0, 2), # Version
- serial,
- asn1.SEQUENCE([SHA1_WITH_RSA_ENCRYPTION, None]), # SignatureAlgorithm
- Name(cn = issuer_cn), # Issuer
- asn1.SEQUENCE([ # Validity
- asn1.UTCTime("100101060000Z"), # NotBefore
- asn1.UTCTime("321201060000Z"), # NotAfter
- ]),
- Name(cn = subject_cn, c = c, o = o), # Subject
- asn1.SEQUENCE([ # SubjectPublicKeyInfo
- asn1.SEQUENCE([ # Algorithm
- PUBLIC_KEY_RSA,
- None,
- ]),
- asn1.BitString(asn1.ToDER(pubkey)),
- ]),
- asn1.Explicit(3, extensions),
- ]))
-
- return asn1.ToDER(asn1.SEQUENCE([
- asn1.Raw(tbsCert),
- asn1.SEQUENCE([
- SHA1_WITH_RSA_ENCRYPTION,
- None,
- ]),
- asn1.BitString(privkey.Sign(tbsCert)),
- ]))
-
-
-def MakeOCSPResponse(issuer_cn, issuer_key, serial, revoked):
- # https://tools.ietf.org/html/rfc2560
- issuer_name_hash = asn1.OCTETSTRING(
- hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest())
-
- issuer_key_hash = asn1.OCTETSTRING(
- hashlib.sha1(asn1.ToDER(issuer_key)).digest())
-
- cert_status = None
- if revoked:
- cert_status = asn1.Explicit(1, asn1.GeneralizedTime("20100101060000Z"))
- else:
- cert_status = asn1.Raw(asn1.TagAndLength(0x80 | 0, 0))
-
- basic_resp_data_der = asn1.ToDER(asn1.SEQUENCE([
- asn1.Explicit(2, issuer_key_hash),
- asn1.GeneralizedTime("20100101060000Z"), # producedAt
- asn1.SEQUENCE([
- asn1.SEQUENCE([ # SingleResponse
- asn1.SEQUENCE([ # CertID
- asn1.SEQUENCE([ # hashAlgorithm
- HASH_SHA1,
- None,
- ]),
- issuer_name_hash,
- issuer_key_hash,
- serial,
- ]),
- cert_status,
- asn1.GeneralizedTime("20100101060000Z"), # thisUpdate
- asn1.Explicit(0, asn1.GeneralizedTime("20300101060000Z")), # nextUpdate
- ]),
- ]),
- ]))
-
- basic_resp = asn1.SEQUENCE([
- asn1.Raw(basic_resp_data_der),
- asn1.SEQUENCE([
- SHA1_WITH_RSA_ENCRYPTION,
- None,
- ]),
- asn1.BitString(issuer_key.Sign(basic_resp_data_der)),
- ])
-
- resp = asn1.SEQUENCE([
- asn1.ENUMERATED(0),
- asn1.Explicit(0, asn1.SEQUENCE([
- OCSP_TYPE_BASIC,
- asn1.OCTETSTRING(asn1.ToDER(basic_resp)),
- ]))
- ])
-
- return asn1.ToDER(resp)
-
-
-def DERToPEM(der):
- pem = '-----BEGIN CERTIFICATE-----\n'
- pem += der.encode('base64')
- pem += '-----END CERTIFICATE-----\n'
- return pem
-
-
-def GenerateCertKeyAndOCSP(subject = "127.0.0.1",
- ocsp_url = "http://127.0.0.1",
- ocsp_revoked = False):
- '''GenerateCertKeyAndOCSP returns a (cert_and_key_pem, ocsp_der) where:
- * cert_and_key_pem contains a certificate and private key in PEM format
- with the given subject common name and OCSP URL.
- * ocsp_der contains a DER encoded OCSP response or None if ocsp_url is
- None'''
-
- serial = RandomNumber(16)
- cert_der = MakeCertificate(ISSUER_CN, subject, serial, KEY, KEY, ocsp_url)
- cert_pem = DERToPEM(cert_der)
-
- ocsp_der = None
- if ocsp_url is not None:
- ocsp_der = MakeOCSPResponse(ISSUER_CN, KEY, serial, ocsp_revoked)
-
- return (cert_pem + KEY_PEM, ocsp_der)