2016-04-11 16:17:25 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "CTTestUtils.h"
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <iomanip>
|
|
|
|
|
2017-08-18 10:50:49 +03:00
|
|
|
#include "BTInclusionProof.h"
|
2016-07-05 08:35:06 +03:00
|
|
|
#include "CTSerialization.h"
|
|
|
|
#include "gtest/gtest.h"
|
2016-04-11 16:17:25 +03:00
|
|
|
#include "mozilla/Assertions.h"
|
2016-07-05 08:35:06 +03:00
|
|
|
#include "mozilla/Move.h"
|
2016-04-11 16:17:25 +03:00
|
|
|
#include "mozilla/Vector.h"
|
|
|
|
#include "pkix/Input.h"
|
2016-07-05 08:35:06 +03:00
|
|
|
#include "pkix/pkix.h"
|
|
|
|
#include "pkix/pkixnss.h"
|
|
|
|
#include "pkix/pkixtypes.h"
|
2016-04-11 16:17:25 +03:00
|
|
|
#include "pkix/Result.h"
|
2016-07-05 08:35:06 +03:00
|
|
|
#include "pkixcheck.h"
|
|
|
|
#include "pkixutil.h"
|
2016-04-11 16:17:25 +03:00
|
|
|
#include "SignedCertificateTimestamp.h"
|
|
|
|
#include "SignedTreeHead.h"
|
|
|
|
|
|
|
|
namespace mozilla { namespace ct {
|
|
|
|
|
|
|
|
using namespace mozilla::pkix;
|
|
|
|
|
2016-07-05 08:35:06 +03:00
|
|
|
// The following test vectors are from the CT test data repository at
|
2016-04-11 16:17:25 +03:00
|
|
|
// https://github.com/google/certificate-transparency/tree/master/test/testdata
|
|
|
|
|
|
|
|
// test-cert.pem
|
|
|
|
const char kDefaultDerCert[] =
|
|
|
|
"308202ca30820233a003020102020106300d06092a864886f70d01010505003055310b3009"
|
|
|
|
"06035504061302474231243022060355040a131b4365727469666963617465205472616e73"
|
|
|
|
"706172656e6379204341310e300c0603550408130557616c65733110300e06035504071307"
|
|
|
|
"4572772057656e301e170d3132303630313030303030305a170d3232303630313030303030"
|
|
|
|
"305a3052310b30090603550406130247423121301f060355040a1318436572746966696361"
|
|
|
|
"7465205472616e73706172656e6379310e300c0603550408130557616c65733110300e0603"
|
|
|
|
"55040713074572772057656e30819f300d06092a864886f70d010101050003818d00308189"
|
|
|
|
"02818100b1fa37936111f8792da2081c3fe41925008531dc7f2c657bd9e1de4704160b4c9f"
|
|
|
|
"19d54ada4470404c1c51341b8f1f7538dddd28d9aca48369fc5646ddcc7617f8168aae5b41"
|
|
|
|
"d43331fca2dadfc804d57208949061f9eef902ca47ce88c644e000f06eeeccabdc9dd2f68a"
|
|
|
|
"22ccb09dc76e0dbc73527765b1a37a8c676253dcc10203010001a381ac3081a9301d060355"
|
|
|
|
"1d0e041604146a0d982a3b62c44b6d2ef4e9bb7a01aa9cb798e2307d0603551d2304763074"
|
|
|
|
"80145f9d880dc873e654d4f80dd8e6b0c124b447c355a159a4573055310b30090603550406"
|
|
|
|
"1302474231243022060355040a131b4365727469666963617465205472616e73706172656e"
|
|
|
|
"6379204341310e300c0603550408130557616c65733110300e060355040713074572772057"
|
|
|
|
"656e82010030090603551d1304023000300d06092a864886f70d010105050003818100171c"
|
|
|
|
"d84aac414a9a030f22aac8f688b081b2709b848b4e5511406cd707fed028597a9faefc2eee"
|
|
|
|
"2978d633aaac14ed3235197da87e0f71b8875f1ac9e78b281749ddedd007e3ecf50645f8cb"
|
|
|
|
"f667256cd6a1647b5e13203bb8582de7d6696f656d1c60b95f456b7fcf338571908f1c6972"
|
|
|
|
"7d24c4fccd249295795814d1dac0e6";
|
|
|
|
|
|
|
|
// key hash of test-cert.pem's issuer (ca-cert.pem)
|
|
|
|
const char kDefaultIssuerKeyHash[] =
|
|
|
|
"02adddca08b8bf9861f035940c940156d8350fdff899a6239c6bd77255b8f8fc";
|
|
|
|
|
|
|
|
const char kDefaultDerTbsCert[] =
|
|
|
|
"30820233a003020102020107300d06092a864886f70d01010505003055310b300906035504"
|
|
|
|
"061302474231243022060355040a131b4365727469666963617465205472616e7370617265"
|
|
|
|
"6e6379204341310e300c0603550408130557616c65733110300e0603550407130745727720"
|
|
|
|
"57656e301e170d3132303630313030303030305a170d3232303630313030303030305a3052"
|
|
|
|
"310b30090603550406130247423121301f060355040a131843657274696669636174652054"
|
|
|
|
"72616e73706172656e6379310e300c0603550408130557616c65733110300e060355040713"
|
|
|
|
"074572772057656e30819f300d06092a864886f70d010101050003818d0030818902818100"
|
|
|
|
"beef98e7c26877ae385f75325a0c1d329bedf18faaf4d796bf047eb7e1ce15c95ba2f80ee4"
|
|
|
|
"58bd7db86f8a4b252191a79bd700c38e9c0389b45cd4dc9a120ab21e0cb41cd0e72805a410"
|
|
|
|
"cd9c5bdb5d4927726daf1710f60187377ea25b1a1e39eed0b88119dc154dc68f7da8e30caf"
|
|
|
|
"158a33e6c9509f4a05b01409ff5dd87eb50203010001a381ac3081a9301d0603551d0e0416"
|
|
|
|
"04142031541af25c05ffd8658b6843794f5e9036f7b4307d0603551d230476307480145f9d"
|
|
|
|
"880dc873e654d4f80dd8e6b0c124b447c355a159a4573055310b3009060355040613024742"
|
|
|
|
"31243022060355040a131b4365727469666963617465205472616e73706172656e63792043"
|
|
|
|
"41310e300c0603550408130557616c65733110300e060355040713074572772057656e8201"
|
|
|
|
"0030090603551d1304023000";
|
|
|
|
|
|
|
|
// DigitallySigned of test-cert.proof
|
|
|
|
const char kTestDigitallySigned[] =
|
|
|
|
"0403004730450220606e10ae5c2d5a1b0aed49dc4937f48de71a4e9784e9c208dfbfe9ef53"
|
|
|
|
"6cf7f2022100beb29c72d7d06d61d06bdb38a069469aa86fe12e18bb7cc45689a2c0187ef5"
|
|
|
|
"a5";
|
|
|
|
|
|
|
|
// test-cert.proof
|
|
|
|
const char kTestSignedCertificateTimestamp[] =
|
|
|
|
"00df1c2ec11500945247a96168325ddc5c7959e8f7c6d388fc002e0bbd3f74d7640000013d"
|
|
|
|
"db27ded900000403004730450220606e10ae5c2d5a1b0aed49dc4937f48de71a4e9784e9c2"
|
|
|
|
"08dfbfe9ef536cf7f2022100beb29c72d7d06d61d06bdb38a069469aa86fe12e18bb7cc456"
|
|
|
|
"89a2c0187ef5a5";
|
|
|
|
|
|
|
|
// ct-server-key-public.pem
|
|
|
|
const char kEcP256PublicKey[] =
|
|
|
|
"3059301306072a8648ce3d020106082a8648ce3d0301070342000499783cb14533c0161a5a"
|
|
|
|
"b45bf95d08a29cd0ea8dd4c84274e2be59ad15c676960cf0afa1074a57ac644b23479e5b3f"
|
|
|
|
"b7b245eb4b420ef370210371a944beaceb";
|
|
|
|
|
|
|
|
// key id (sha256) of ct-server-key-public.pem
|
|
|
|
const char kTestKeyId[] =
|
|
|
|
"df1c2ec11500945247a96168325ddc5c7959e8f7c6d388fc002e0bbd3f74d764";
|
|
|
|
|
|
|
|
// signature field of DigitallySigned from test-cert.proof
|
|
|
|
const char kTestSCTSignatureData[] =
|
|
|
|
"30450220606e10ae5c2d5a1b0aed49dc4937f48de71a4e9784e9c208dfbfe9ef536cf7f202"
|
|
|
|
"2100beb29c72d7d06d61d06bdb38a069469aa86fe12e18bb7cc45689a2c0187ef5a5";
|
|
|
|
|
|
|
|
// signature field of DigitallySigned from test-embedded-pre-cert.proof
|
|
|
|
const char kTestSCTPrecertSignatureData[] =
|
|
|
|
"30450220482f6751af35dba65436be1fd6640f3dbf9a41429495924530288fa3e5e23e0602"
|
|
|
|
"2100e4edc0db3ac572b1e2f5e8ab6a680653987dcf41027dfeffa105519d89edbf08";
|
|
|
|
|
|
|
|
// For the sample STH
|
|
|
|
const char kSampleSTHSHA256RootHash[] =
|
|
|
|
"726467216167397babca293dca398e4ce6b621b18b9bc42f30c900d1f92ac1e4";
|
|
|
|
const char kSampleSTHTreeHeadSignature[] =
|
|
|
|
"0403004730450220365a91a2a88f2b9332f41d8959fa7086da7e6d634b7b089bc9da066426"
|
|
|
|
"6c7a20022100e38464f3c0fd066257b982074f7ac87655e0c8f714768a050b4be9a7b441cb"
|
|
|
|
"d3";
|
|
|
|
const size_t kSampleSTHTreeSize = 21u;
|
|
|
|
const uint64_t kSampleSTHTimestamp = 1396877277237u;
|
|
|
|
|
2016-07-05 08:35:06 +03:00
|
|
|
// test-embedded-cert.pem
|
|
|
|
const char kTestEmbeddedCertData[] =
|
|
|
|
"30820359308202c2a003020102020107300d06092a864886f70d01010505"
|
|
|
|
"003055310b300906035504061302474231243022060355040a131b436572"
|
|
|
|
"7469666963617465205472616e73706172656e6379204341310e300c0603"
|
|
|
|
"550408130557616c65733110300e060355040713074572772057656e301e"
|
|
|
|
"170d3132303630313030303030305a170d3232303630313030303030305a"
|
|
|
|
"3052310b30090603550406130247423121301f060355040a131843657274"
|
|
|
|
"69666963617465205472616e73706172656e6379310e300c060355040813"
|
|
|
|
"0557616c65733110300e060355040713074572772057656e30819f300d06"
|
|
|
|
"092a864886f70d010101050003818d0030818902818100beef98e7c26877"
|
|
|
|
"ae385f75325a0c1d329bedf18faaf4d796bf047eb7e1ce15c95ba2f80ee4"
|
|
|
|
"58bd7db86f8a4b252191a79bd700c38e9c0389b45cd4dc9a120ab21e0cb4"
|
|
|
|
"1cd0e72805a410cd9c5bdb5d4927726daf1710f60187377ea25b1a1e39ee"
|
|
|
|
"d0b88119dc154dc68f7da8e30caf158a33e6c9509f4a05b01409ff5dd87e"
|
|
|
|
"b50203010001a382013a30820136301d0603551d0e041604142031541af2"
|
|
|
|
"5c05ffd8658b6843794f5e9036f7b4307d0603551d230476307480145f9d"
|
|
|
|
"880dc873e654d4f80dd8e6b0c124b447c355a159a4573055310b30090603"
|
|
|
|
"5504061302474231243022060355040a131b436572746966696361746520"
|
|
|
|
"5472616e73706172656e6379204341310e300c0603550408130557616c65"
|
|
|
|
"733110300e060355040713074572772057656e82010030090603551d1304"
|
|
|
|
"02300030818a060a2b06010401d679020402047c047a0078007600df1c2e"
|
|
|
|
"c11500945247a96168325ddc5c7959e8f7c6d388fc002e0bbd3f74d76400"
|
|
|
|
"00013ddb27df9300000403004730450220482f6751af35dba65436be1fd6"
|
|
|
|
"640f3dbf9a41429495924530288fa3e5e23e06022100e4edc0db3ac572b1"
|
|
|
|
"e2f5e8ab6a680653987dcf41027dfeffa105519d89edbf08300d06092a86"
|
|
|
|
"4886f70d0101050500038181008a0c4bef099d479279afa0a28e689f91e1"
|
|
|
|
"c4421be2d269a2ea6ca4e8215ddeddca1504a11e7c87c4b77e80f0e97903"
|
|
|
|
"5268f27ca20e166804ae556f316981f96a394ab7abfd3e255ac0044513fe"
|
|
|
|
"76570c6795abe4703133d303f89f3afa6bbcfc517319dfd95b934241211f"
|
|
|
|
"634035c3d078307a68c6075a2e20c89f36b8910ca0";
|
|
|
|
|
|
|
|
const char kTestTbsCertData[] =
|
|
|
|
"30820233a003020102020107300d06092a864886f70d0101050500305531"
|
|
|
|
"0b300906035504061302474231243022060355040a131b43657274696669"
|
|
|
|
"63617465205472616e73706172656e6379204341310e300c060355040813"
|
|
|
|
"0557616c65733110300e060355040713074572772057656e301e170d3132"
|
|
|
|
"303630313030303030305a170d3232303630313030303030305a3052310b"
|
|
|
|
"30090603550406130247423121301f060355040a13184365727469666963"
|
|
|
|
"617465205472616e73706172656e6379310e300c0603550408130557616c"
|
|
|
|
"65733110300e060355040713074572772057656e30819f300d06092a8648"
|
|
|
|
"86f70d010101050003818d0030818902818100beef98e7c26877ae385f75"
|
|
|
|
"325a0c1d329bedf18faaf4d796bf047eb7e1ce15c95ba2f80ee458bd7db8"
|
|
|
|
"6f8a4b252191a79bd700c38e9c0389b45cd4dc9a120ab21e0cb41cd0e728"
|
|
|
|
"05a410cd9c5bdb5d4927726daf1710f60187377ea25b1a1e39eed0b88119"
|
|
|
|
"dc154dc68f7da8e30caf158a33e6c9509f4a05b01409ff5dd87eb5020301"
|
|
|
|
"0001a381ac3081a9301d0603551d0e041604142031541af25c05ffd8658b"
|
|
|
|
"6843794f5e9036f7b4307d0603551d230476307480145f9d880dc873e654"
|
|
|
|
"d4f80dd8e6b0c124b447c355a159a4573055310b30090603550406130247"
|
|
|
|
"4231243022060355040a131b4365727469666963617465205472616e7370"
|
|
|
|
"6172656e6379204341310e300c0603550408130557616c65733110300e06"
|
|
|
|
"0355040713074572772057656e82010030090603551d1304023000";
|
|
|
|
|
|
|
|
// test-embedded-with-preca-cert.pem
|
|
|
|
const char kTestEmbeddedWithPreCaCertData[] =
|
|
|
|
"30820359308202c2a003020102020108300d06092a864886f70d01010505"
|
|
|
|
"003055310b300906035504061302474231243022060355040a131b436572"
|
|
|
|
"7469666963617465205472616e73706172656e6379204341310e300c0603"
|
|
|
|
"550408130557616c65733110300e060355040713074572772057656e301e"
|
|
|
|
"170d3132303630313030303030305a170d3232303630313030303030305a"
|
|
|
|
"3052310b30090603550406130247423121301f060355040a131843657274"
|
|
|
|
"69666963617465205472616e73706172656e6379310e300c060355040813"
|
|
|
|
"0557616c65733110300e060355040713074572772057656e30819f300d06"
|
|
|
|
"092a864886f70d010101050003818d0030818902818100afaeeacac51ab7"
|
|
|
|
"cebdf9eacae7dd175295e193955a17989aef8d97ab7cdff7761093c0b823"
|
|
|
|
"d2a4e3a51a17b86f28162b66a2538935ebecdc1036233da2dd6531b0c63b"
|
|
|
|
"cc68761ebdc854037b77399246b870a7b72b14c9b1667de09a9640ed9f3f"
|
|
|
|
"3c725d950b4d26559869fe7f1e919a66eb76d35c0117c6bcd0d8cfd21028"
|
|
|
|
"b10203010001a382013a30820136301d0603551d0e04160414612c64efac"
|
|
|
|
"79b728397c9d93e6df86465fa76a88307d0603551d230476307480145f9d"
|
|
|
|
"880dc873e654d4f80dd8e6b0c124b447c355a159a4573055310b30090603"
|
|
|
|
"5504061302474231243022060355040a131b436572746966696361746520"
|
|
|
|
"5472616e73706172656e6379204341310e300c0603550408130557616c65"
|
|
|
|
"733110300e060355040713074572772057656e82010030090603551d1304"
|
|
|
|
"02300030818a060a2b06010401d679020402047c047a0078007600df1c2e"
|
|
|
|
"c11500945247a96168325ddc5c7959e8f7c6d388fc002e0bbd3f74d76400"
|
|
|
|
"00013ddb27e05b000004030047304502207aa79604c47480f3727b084f90"
|
|
|
|
"b3989f79091885e00484431a2a297cbf3a355c022100b49fd8120b0d644c"
|
|
|
|
"d7e75269b4da6317a9356cb950224fc11cc296b2e39b2386300d06092a86"
|
|
|
|
"4886f70d010105050003818100a3a86c41ad0088a25aedc4e7b529a2ddbf"
|
|
|
|
"9e187ffb362157e9302d961b73b43cba0ae1e230d9e45049b7e8c924792e"
|
|
|
|
"bbe7d175baa87b170dfad8ee788984599d05257994084e2e0e796fca5836"
|
|
|
|
"881c3e053553e06ab230f919089b914e4a8e2da45f8a87f2c81a25a61f04"
|
|
|
|
"fe1cace60155653827d41fad9f0658f287d058192c";
|
|
|
|
|
|
|
|
// ca-cert.pem
|
|
|
|
const char kCaCertData[] =
|
|
|
|
"308202d030820239a003020102020100300d06092a864886f70d01010505"
|
|
|
|
"003055310b300906035504061302474231243022060355040a131b436572"
|
|
|
|
"7469666963617465205472616e73706172656e6379204341310e300c0603"
|
|
|
|
"550408130557616c65733110300e060355040713074572772057656e301e"
|
|
|
|
"170d3132303630313030303030305a170d3232303630313030303030305a"
|
|
|
|
"3055310b300906035504061302474231243022060355040a131b43657274"
|
|
|
|
"69666963617465205472616e73706172656e6379204341310e300c060355"
|
|
|
|
"0408130557616c65733110300e060355040713074572772057656e30819f"
|
|
|
|
"300d06092a864886f70d010101050003818d0030818902818100d58a6853"
|
|
|
|
"6210a27119936e778321181c2a4013c6d07b8c76eb9157d3d0fb4b3b516e"
|
|
|
|
"cecbd1c98d91c52f743fab635d55099cd13abaf31ae541442451a74c7816"
|
|
|
|
"f2243cf848cf2831cce67ba04a5a23819f3cba37e624d9c3bdb299b839dd"
|
|
|
|
"fe2631d2cb3a84fc7bb2b5c52fcfc14fff406f5cd44669cbb2f7cfdf86fb"
|
|
|
|
"6ab9d1b10203010001a381af3081ac301d0603551d0e041604145f9d880d"
|
|
|
|
"c873e654d4f80dd8e6b0c124b447c355307d0603551d230476307480145f"
|
|
|
|
"9d880dc873e654d4f80dd8e6b0c124b447c355a159a4573055310b300906"
|
|
|
|
"035504061302474231243022060355040a131b4365727469666963617465"
|
|
|
|
"205472616e73706172656e6379204341310e300c0603550408130557616c"
|
|
|
|
"65733110300e060355040713074572772057656e820100300c0603551d13"
|
|
|
|
"040530030101ff300d06092a864886f70d0101050500038181000608cc4a"
|
|
|
|
"6d64f2205e146c04b276f92b0efa94a5daf23afc3806606d3990d0a1ea23"
|
|
|
|
"3d40295769463b046661e7fa1d179915209aea2e0a775176411227d7c003"
|
|
|
|
"07c7470e61584fd7334224727f51d690bc47a9df354db0f6eb25955de189"
|
|
|
|
"3c4dd5202b24a2f3e440d274b54e1bd376269ca96289b76ecaa41090e14f"
|
|
|
|
"3b0a942e";
|
|
|
|
|
|
|
|
// intermediate-cert.pem
|
|
|
|
const char kIntermediateCertData[] =
|
|
|
|
"308202dd30820246a003020102020109300d06092a864886f70d01010505"
|
|
|
|
"003055310b300906035504061302474231243022060355040a131b436572"
|
|
|
|
"7469666963617465205472616e73706172656e6379204341310e300c0603"
|
|
|
|
"550408130557616c65733110300e060355040713074572772057656e301e"
|
|
|
|
"170d3132303630313030303030305a170d3232303630313030303030305a"
|
|
|
|
"3062310b30090603550406130247423131302f060355040a132843657274"
|
|
|
|
"69666963617465205472616e73706172656e637920496e7465726d656469"
|
|
|
|
"617465204341310e300c0603550408130557616c65733110300e06035504"
|
|
|
|
"0713074572772057656e30819f300d06092a864886f70d01010105000381"
|
|
|
|
"8d0030818902818100d76a678d116f522e55ff821c90642508b7074b14d7"
|
|
|
|
"71159064f7927efdedb87135a1365ee7de18cbd5ce865f860c78f433b4d0"
|
|
|
|
"d3d3407702e7a3ef542b1dfe9bbaa7cdf94dc5975fc729f86f105f381b24"
|
|
|
|
"3535cf9c800f5ca780c1d3c84400ee65d16ee9cf52db8adffe50f5c49335"
|
|
|
|
"0b2190bf50d5bc36f3cac5a8daae92cd8b0203010001a381af3081ac301d"
|
|
|
|
"0603551d0e04160414965508050278479e8773764131bc143a47e229ab30"
|
|
|
|
"7d0603551d230476307480145f9d880dc873e654d4f80dd8e6b0c124b447"
|
|
|
|
"c355a159a4573055310b300906035504061302474231243022060355040a"
|
|
|
|
"131b4365727469666963617465205472616e73706172656e637920434131"
|
|
|
|
"0e300c0603550408130557616c65733110300e0603550407130745727720"
|
|
|
|
"57656e820100300c0603551d13040530030101ff300d06092a864886f70d"
|
|
|
|
"0101050500038181002206dab1c66b71dce095c3f6aa2ef72cf7761be7ab"
|
|
|
|
"d7fc39c31a4cfe1bd96d6734ca82f22dde5a0c8bbbdd825d7b6f3e7612ad"
|
|
|
|
"8db300a7e21169886023262284c3aa5d2191efda10bf9235d37b3a2a340d"
|
|
|
|
"59419b94a48566f3fac3cd8b53d5a4e98270ead297b07210f9ce4a2138b1"
|
|
|
|
"8811143b93fa4e7a87dd37e1385f2c2908";
|
|
|
|
|
|
|
|
// test-embedded-with-intermediate-cert.pem
|
|
|
|
const char kTestEmbeddedWithIntermediateCertData[] =
|
|
|
|
"30820366308202cfa003020102020102300d06092a864886f70d01010505"
|
|
|
|
"003062310b30090603550406130247423131302f060355040a1328436572"
|
|
|
|
"7469666963617465205472616e73706172656e637920496e7465726d6564"
|
|
|
|
"69617465204341310e300c0603550408130557616c65733110300e060355"
|
|
|
|
"040713074572772057656e301e170d3132303630313030303030305a170d"
|
|
|
|
"3232303630313030303030305a3052310b30090603550406130247423121"
|
|
|
|
"301f060355040a13184365727469666963617465205472616e7370617265"
|
|
|
|
"6e6379310e300c0603550408130557616c65733110300e06035504071307"
|
|
|
|
"4572772057656e30819f300d06092a864886f70d010101050003818d0030"
|
|
|
|
"818902818100bb272b26e5deb5459d4acca027e8f12a4d839ac3730a6a10"
|
|
|
|
"9ff7e25498ddbd3f1895d08ba41f8de34967a3a086ce13a90dd5adbb5418"
|
|
|
|
"4bdc08e1ac7826adb8dc9c717bfd7da5b41b4db1736e00f1dac3cec9819c"
|
|
|
|
"cb1a28ba120b020a820e940dd61f95b5432a4bc05d0818f18ce2154eb38d"
|
|
|
|
"2fa7d22d72b976e560db0c7fc77f0203010001a382013a30820136301d06"
|
|
|
|
"03551d0e04160414b1b148e658e703f5f7f3105f20b3c384d7eff1bf307d"
|
|
|
|
"0603551d23047630748014965508050278479e8773764131bc143a47e229"
|
|
|
|
"aba159a4573055310b300906035504061302474231243022060355040a13"
|
|
|
|
"1b4365727469666963617465205472616e73706172656e6379204341310e"
|
|
|
|
"300c0603550408130557616c65733110300e060355040713074572772057"
|
|
|
|
"656e82010930090603551d130402300030818a060a2b06010401d6790204"
|
|
|
|
"02047c047a0078007600df1c2ec11500945247a96168325ddc5c7959e8f7"
|
|
|
|
"c6d388fc002e0bbd3f74d7640000013ddb27e2a400000403004730450221"
|
|
|
|
"00a6d34517f3392d9ec5d257adf1c597dc45bd4cd3b73856c616a9fb99e5"
|
|
|
|
"ae75a802205e26c8d1c7e222fe8cda29baeb04a834ee97d34fd81718f1aa"
|
|
|
|
"e0cd66f4b8a93f300d06092a864886f70d0101050500038181000f95a5b4"
|
|
|
|
"e128a914b1e88be8b32964221b58f4558433d020a8e246cca65a40bcbf5f"
|
|
|
|
"2d48933ebc99be6927ca756472fb0bdc7f505f41f462f2bc19d0b299c990"
|
|
|
|
"918df8820f3d31db37979e8bad563b17f00ae67b0f8731c106c943a73bf5"
|
|
|
|
"36af168afe21ef4adfcae19a3cc074899992bf506bc5ce1decaaf07ffeeb"
|
|
|
|
"c805c039";
|
|
|
|
|
|
|
|
// test-embedded-with-intermediate-preca-cert.pem
|
|
|
|
const char kTestEmbeddedWithIntermediatePreCaCertData[] =
|
|
|
|
"30820366308202cfa003020102020103300d06092a864886f70d01010505"
|
|
|
|
"003062310b30090603550406130247423131302f060355040a1328436572"
|
|
|
|
"7469666963617465205472616e73706172656e637920496e7465726d6564"
|
|
|
|
"69617465204341310e300c0603550408130557616c65733110300e060355"
|
|
|
|
"040713074572772057656e301e170d3132303630313030303030305a170d"
|
|
|
|
"3232303630313030303030305a3052310b30090603550406130247423121"
|
|
|
|
"301f060355040a13184365727469666963617465205472616e7370617265"
|
|
|
|
"6e6379310e300c0603550408130557616c65733110300e06035504071307"
|
|
|
|
"4572772057656e30819f300d06092a864886f70d010101050003818d0030"
|
|
|
|
"818902818100d4497056cdfc65e1342cc3df6e654b8af0104702acd2275c"
|
|
|
|
"7d3fb1fc438a89b212110d6419bcc13ae47d64bba241e6706b9ed627f8b3"
|
|
|
|
"4a0d7dff1c44b96287c54bea9d10dc017bceb64f7b6aff3c35a474afec40"
|
|
|
|
"38ab3640b0cd1fb0582ec03b179a2776c8c435d14ab4882d59d7b724fa37"
|
|
|
|
"7ca6db08392173f9c6056b3abadf0203010001a382013a30820136301d06"
|
|
|
|
"03551d0e0416041432da5518d87f1d26ea2767973c0bef286e786a4a307d"
|
|
|
|
"0603551d23047630748014965508050278479e8773764131bc143a47e229"
|
|
|
|
"aba159a4573055310b300906035504061302474231243022060355040a13"
|
|
|
|
"1b4365727469666963617465205472616e73706172656e6379204341310e"
|
|
|
|
"300c0603550408130557616c65733110300e060355040713074572772057"
|
|
|
|
"656e82010930090603551d130402300030818a060a2b06010401d6790204"
|
|
|
|
"02047c047a0078007600df1c2ec11500945247a96168325ddc5c7959e8f7"
|
|
|
|
"c6d388fc002e0bbd3f74d7640000013ddb27e3be00000403004730450221"
|
|
|
|
"00d9f61a07fee021e3159f3ca2f570d833ff01374b2096cba5658c5e16fb"
|
|
|
|
"43eb3002200b76fe475138d8cf76833831304dabf043eb1213c96e13ff4f"
|
|
|
|
"a37f7cd3c8dc1f300d06092a864886f70d01010505000381810088ee4e9e"
|
|
|
|
"5eed6b112cc764b151ed929400e9406789c15fbbcfcdab2f10b400234139"
|
|
|
|
"e6ce65c1e51b47bf7c8950f80bccd57168567954ed35b0ce9346065a5eae"
|
|
|
|
"5bf95d41da8e27cee9eeac688f4bd343f9c2888327abd8b9f68dcb1e3050"
|
|
|
|
"041d31bda8e2dd6d39b3664de5ce0870f5fc7e6a00d6ed00528458d953d2"
|
|
|
|
"37586d73";
|
2016-04-11 16:17:25 +03:00
|
|
|
|
2017-08-18 10:50:49 +03:00
|
|
|
// Given the ordered set of data [ 0x00, 0x01, 0x02, deadbeef ],
|
|
|
|
// the 'inclusion proof' of the leaf of index '2' (for '0x02') is created from
|
|
|
|
// the Merkle Tree generated for that set of data.
|
|
|
|
// A Merkle inclusion proof for a leaf in a Merkle Tree is the shortest list
|
|
|
|
// of additional nodes in the Merkle Tree required to compute the Merkle Tree
|
|
|
|
// Hash (also called 'Merkle Tree head') for that tree.
|
|
|
|
// This follows the structure defined in RFC 6962-bis.
|
|
|
|
//
|
|
|
|
// https://tools.ietf.org/html/draft-ietf-trans-rfc6962-bis-24#section-2.1
|
|
|
|
|
|
|
|
const char kTestInclusionProof[] =
|
|
|
|
"020100" // logId
|
|
|
|
"0000000000000004" // tree size
|
|
|
|
"0000000000000002" // leaf index
|
|
|
|
"0042" // inclusion path length
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestNodeHash0[] =
|
|
|
|
"48c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729";
|
|
|
|
|
|
|
|
const char kTestNodeHash1[] =
|
|
|
|
"a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a";
|
|
|
|
|
|
|
|
const char kTestInclusionProofUnexpectedData[] = "12345678";
|
|
|
|
|
|
|
|
const char kTestInclusionProofInvalidHashSize[] =
|
|
|
|
"020100" // logId
|
|
|
|
"0000000000000004" // treesize
|
|
|
|
"0000000000000002" // leafindex
|
|
|
|
"0042" // inclusion path length
|
|
|
|
"3048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // invalid hash size
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofInvalidHash[] =
|
|
|
|
"020100" // logId
|
|
|
|
"0000000000000004" // treesize
|
|
|
|
"0000000000000002" // leafindex
|
|
|
|
"0042" // inclusion path length
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427"; // truncated node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofMissingLogId[] =
|
|
|
|
"0000000000000004" // treesize
|
|
|
|
"0000000000000002" // leafindex
|
|
|
|
"0042"
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofNullPathLength[] =
|
|
|
|
"020100"
|
|
|
|
"0000000000000004" // treesize
|
|
|
|
"0000000000000002" // leafindex
|
|
|
|
"0000"
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofPathLengthTooSmall[] =
|
|
|
|
"020100"
|
|
|
|
"0000000000000004" // treesize
|
|
|
|
"0000000000000002" // leafindex
|
|
|
|
"0036"
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofPathLengthTooLarge[] =
|
|
|
|
"020100"
|
|
|
|
"0000000000000004" // treesize
|
|
|
|
"0000000000000002" // leafindex
|
|
|
|
"0080"
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofNullTreeSize[] =
|
|
|
|
"020100"
|
|
|
|
"0000000000000000" // treesize
|
|
|
|
"0000000000000002" // leafindex
|
|
|
|
"0042"
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofLeafIndexOutOfBounds[] =
|
|
|
|
"020100"
|
|
|
|
"0000000000000004" // treesize
|
|
|
|
"0000000000000004" // leafindex
|
|
|
|
"0042"
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a"; // node hash 1
|
|
|
|
|
|
|
|
const char kTestInclusionProofExtraData[] =
|
|
|
|
"020100" // logId
|
|
|
|
"0000000000000004" // tree size
|
|
|
|
"0000000000000002" // leaf index
|
|
|
|
"0042" // inclusion path length
|
|
|
|
"2048c90c8ae24688d6bef5d48a30c2cc8b6754335a8db21793cc0a8e3bed321729" // node hash 0
|
|
|
|
"20a20bf9a7cc2dc8a08f5f415a71b19f6ac427bab54d24eec868b5d3103449953a" // node hash 1
|
|
|
|
"123456"; // extra data after the proof
|
|
|
|
|
2016-04-11 16:17:25 +03:00
|
|
|
static uint8_t
|
|
|
|
CharToByte(char c)
|
|
|
|
{
|
|
|
|
if (c >= '0' && c <= '9') {
|
|
|
|
return c - '0';
|
|
|
|
} else if (c >= 'a' && c <= 'f') {
|
|
|
|
return c - 'a' + 10;
|
|
|
|
} else if (c >= 'A' && c <= 'F') {
|
|
|
|
return c - 'A' + 10;
|
|
|
|
}
|
|
|
|
MOZ_RELEASE_ASSERT(false);
|
2016-07-26 12:48:49 +03:00
|
|
|
return 0;
|
2016-04-11 16:17:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static Buffer
|
|
|
|
HexToBytes(const char* hexData)
|
|
|
|
{
|
|
|
|
size_t hexLen = strlen(hexData);
|
|
|
|
MOZ_RELEASE_ASSERT(hexLen > 0 && (hexLen % 2 == 0));
|
|
|
|
size_t resultLen = hexLen / 2;
|
|
|
|
Buffer result;
|
|
|
|
MOZ_RELEASE_ASSERT(result.reserve(resultLen));
|
|
|
|
for (size_t i = 0; i < resultLen; ++i) {
|
|
|
|
uint8_t hi = CharToByte(hexData[i*2]);
|
|
|
|
uint8_t lo = CharToByte(hexData[i*2 + 1]);
|
|
|
|
result.infallibleAppend((hi << 4) | lo);
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
GetX509CertLogEntry(LogEntry& entry)
|
|
|
|
{
|
|
|
|
entry.Reset();
|
|
|
|
entry.type = ct::LogEntry::Type::X509;
|
|
|
|
entry.leafCertificate = HexToBytes(kDefaultDerCert);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
2016-07-05 08:35:06 +03:00
|
|
|
GetDEREncodedX509Cert()
|
2016-04-11 16:17:25 +03:00
|
|
|
{
|
|
|
|
return HexToBytes(kDefaultDerCert);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
GetPrecertLogEntry(LogEntry& entry)
|
|
|
|
{
|
|
|
|
entry.Reset();
|
|
|
|
entry.type = ct::LogEntry::Type::Precert;
|
|
|
|
entry.issuerKeyHash = HexToBytes(kDefaultIssuerKeyHash);
|
|
|
|
entry.tbsCertificate = HexToBytes(kDefaultDerTbsCert);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestDigitallySigned()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestDigitallySigned);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestDigitallySignedData()
|
|
|
|
{
|
|
|
|
Buffer encoded = GetTestDigitallySigned();
|
|
|
|
// The encoded buffer contains the signature data itself from the 4th byte.
|
|
|
|
// The first bytes are:
|
|
|
|
// 1 byte of hash algorithm
|
|
|
|
// 1 byte of signature algorithm
|
|
|
|
// 2 bytes - prefix containing length of the signature data.
|
|
|
|
Buffer result;
|
|
|
|
MOZ_RELEASE_ASSERT(result.append(encoded.begin() + 4, encoded.end()));
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestSignedCertificateTimestamp()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestSignedCertificateTimestamp);
|
|
|
|
}
|
|
|
|
|
2017-08-18 10:50:49 +03:00
|
|
|
Buffer
|
|
|
|
GetTestInclusionProof()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProof);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofUnexpectedData()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofUnexpectedData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofInvalidHashSize()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofInvalidHashSize);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofInvalidHash()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofInvalidHash);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofMissingLogId()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofMissingLogId);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofNullPathLength()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofNullPathLength);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofPathLengthTooSmall()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofPathLengthTooSmall);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofPathLengthTooLarge()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofPathLengthTooLarge);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofNullTreeSize()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofNullTreeSize);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofLeafIndexOutOfBounds()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofLeafIndexOutOfBounds);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestInclusionProofExtraData()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestInclusionProofExtraData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestNodeHash0()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestNodeHash0);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestNodeHash1()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestNodeHash1);
|
|
|
|
}
|
|
|
|
|
2016-04-11 16:17:25 +03:00
|
|
|
Buffer
|
|
|
|
GetTestPublicKey()
|
|
|
|
{
|
|
|
|
return HexToBytes(kEcP256PublicKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetTestPublicKeyId()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestKeyId);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
GetX509CertSCT(SignedCertificateTimestamp& sct)
|
|
|
|
{
|
|
|
|
sct.version = ct::SignedCertificateTimestamp::Version::V1;
|
|
|
|
sct.logId = HexToBytes(kTestKeyId);
|
|
|
|
// Time the log issued a SCT for this certificate, which is
|
|
|
|
// Fri Apr 5 10:04:16.089 2013
|
|
|
|
sct.timestamp = INT64_C(1365181456089);
|
|
|
|
sct.extensions.clear();
|
|
|
|
|
|
|
|
sct.signature.hashAlgorithm =
|
|
|
|
ct::DigitallySigned::HashAlgorithm::SHA256;
|
|
|
|
sct.signature.signatureAlgorithm =
|
|
|
|
ct::DigitallySigned::SignatureAlgorithm::ECDSA;
|
|
|
|
sct.signature.signatureData = HexToBytes(kTestSCTSignatureData);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
GetPrecertSCT(SignedCertificateTimestamp& sct)
|
|
|
|
{
|
|
|
|
sct.version = ct::SignedCertificateTimestamp::Version::V1;
|
|
|
|
sct.logId = HexToBytes(kTestKeyId);
|
|
|
|
// Time the log issued a SCT for this Precertificate, which is
|
|
|
|
// Fri Apr 5 10:04:16.275 2013
|
|
|
|
sct.timestamp = INT64_C(1365181456275);
|
|
|
|
sct.extensions.clear();
|
|
|
|
|
|
|
|
sct.signature.hashAlgorithm =
|
|
|
|
ct::DigitallySigned::HashAlgorithm::SHA256;
|
|
|
|
sct.signature.signatureAlgorithm =
|
|
|
|
ct::DigitallySigned::SignatureAlgorithm::ECDSA;
|
|
|
|
sct.signature.signatureData = HexToBytes(kTestSCTPrecertSignatureData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDefaultIssuerKeyHash()
|
|
|
|
{
|
|
|
|
return HexToBytes(kDefaultIssuerKeyHash);
|
|
|
|
}
|
|
|
|
|
|
|
|
// A sample, valid STH
|
|
|
|
void
|
|
|
|
GetSampleSignedTreeHead(SignedTreeHead& sth)
|
|
|
|
{
|
|
|
|
sth.version = SignedTreeHead::Version::V1;
|
|
|
|
sth.timestamp = kSampleSTHTimestamp;
|
|
|
|
sth.treeSize = kSampleSTHTreeSize;
|
|
|
|
sth.sha256RootHash = GetSampleSTHSHA256RootHash();
|
|
|
|
GetSampleSTHTreeHeadDecodedSignature(sth.signature);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetSampleSTHSHA256RootHash()
|
|
|
|
{
|
|
|
|
return HexToBytes(kSampleSTHSHA256RootHash);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetSampleSTHTreeHeadSignature()
|
|
|
|
{
|
|
|
|
return HexToBytes(kSampleSTHTreeHeadSignature);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
GetSampleSTHTreeHeadDecodedSignature(DigitallySigned& signature)
|
|
|
|
{
|
|
|
|
Buffer ths = HexToBytes(kSampleSTHTreeHeadSignature);
|
|
|
|
Input thsInput;
|
2016-07-05 08:35:06 +03:00
|
|
|
ASSERT_EQ(Success, thsInput.Init(ths.begin(), ths.length()));
|
2016-04-11 16:17:25 +03:00
|
|
|
Reader thsReader(thsInput);
|
2016-07-05 08:35:06 +03:00
|
|
|
ASSERT_EQ(Success, DecodeDigitallySigned(thsReader, signature));
|
|
|
|
ASSERT_TRUE(thsReader.AtEnd());
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDEREncodedTestEmbeddedCert()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestEmbeddedCertData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDEREncodedTestTbsCert()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestTbsCertData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDEREncodedTestEmbeddedWithPreCACert()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestEmbeddedWithPreCaCertData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDEREncodedCACert()
|
|
|
|
{
|
|
|
|
return HexToBytes(kCaCertData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDEREncodedIntermediateCert()
|
|
|
|
{
|
|
|
|
return HexToBytes(kIntermediateCertData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDEREncodedTestEmbeddedWithIntermediateCert()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestEmbeddedWithIntermediateCertData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
GetDEREncodedTestEmbeddedWithIntermediatePreCACert()
|
|
|
|
{
|
|
|
|
return HexToBytes(kTestEmbeddedWithIntermediatePreCaCertData);
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
ExtractCertSPKI(Input cert)
|
|
|
|
{
|
|
|
|
BackCert backCert(cert, EndEntityOrCA::MustBeEndEntity, nullptr);
|
|
|
|
MOZ_RELEASE_ASSERT(backCert.Init() == Success);
|
|
|
|
|
|
|
|
Input spkiInput = backCert.GetSubjectPublicKeyInfo();
|
|
|
|
Buffer spki;
|
|
|
|
MOZ_RELEASE_ASSERT(InputToBuffer(spkiInput, spki) == Success);
|
|
|
|
return spki;
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
ExtractCertSPKI(const Buffer& cert)
|
|
|
|
{
|
|
|
|
return ExtractCertSPKI(InputForBuffer(cert));
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ExtractEmbeddedSCTList(Input cert, Buffer& result)
|
|
|
|
{
|
|
|
|
result.clear();
|
|
|
|
BackCert backCert(cert, EndEntityOrCA::MustBeEndEntity, nullptr);
|
|
|
|
ASSERT_EQ(Success, backCert.Init());
|
|
|
|
const Input* scts = backCert.GetSignedCertificateTimestamps();
|
|
|
|
if (scts) {
|
|
|
|
Input sctList;
|
|
|
|
ASSERT_EQ(Success,
|
|
|
|
ExtractSignedCertificateTimestampListFromExtension(*scts,
|
|
|
|
sctList));
|
|
|
|
ASSERT_EQ(Success, InputToBuffer(sctList, result));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ExtractEmbeddedSCTList(const Buffer& cert, Buffer& result)
|
|
|
|
{
|
|
|
|
ExtractEmbeddedSCTList(InputForBuffer(cert), result);
|
|
|
|
}
|
|
|
|
|
|
|
|
class OCSPExtensionTrustDomain : public TrustDomain
|
|
|
|
{
|
|
|
|
public:
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result GetCertTrust(EndEntityOrCA, const CertPolicyId&,
|
|
|
|
Input, TrustLevel&) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result FindIssuer(Input, IssuerChecker&, Time) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result CheckRevocation(EndEntityOrCA, const CertID&, Time, Duration,
|
|
|
|
const Input*, const Input*) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result IsChainValid(const DERArray&, Time, const CertPolicyId&) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result DigestBuf(Input item, DigestAlgorithm digestAlg,
|
|
|
|
/*out*/ uint8_t* digestBuf, size_t digestBufLen) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
return DigestBufNSS(item, digestAlg, digestBuf, digestBufLen);
|
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result CheckSignatureDigestAlgorithm(DigestAlgorithm, EndEntityOrCA, Time)
|
2016-07-05 08:35:06 +03:00
|
|
|
override
|
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result CheckECDSACurveIsAcceptable(EndEntityOrCA, NamedCurve) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result VerifyECDSASignedDigest(const SignedDigest& signedDigest,
|
|
|
|
Input subjectPublicKeyInfo) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
return VerifyECDSASignedDigestNSS(signedDigest, subjectPublicKeyInfo,
|
|
|
|
nullptr);
|
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result CheckRSAPublicKeyModulusSizeInBits(EndEntityOrCA, unsigned int)
|
2016-07-05 08:35:06 +03:00
|
|
|
override
|
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result VerifyRSAPKCS1SignedDigest(const SignedDigest& signedDigest,
|
|
|
|
Input subjectPublicKeyInfo) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
return VerifyRSAPKCS1SignedDigestNSS(signedDigest, subjectPublicKeyInfo,
|
|
|
|
nullptr);
|
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result CheckValidityIsAcceptable(Time, Time, EndEntityOrCA, KeyPurposeId)
|
2016-07-05 08:35:06 +03:00
|
|
|
override
|
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result NetscapeStepUpMatchesServerAuth(Time, bool&) override
|
2016-07-05 08:35:06 +03:00
|
|
|
{
|
|
|
|
ADD_FAILURE();
|
2017-08-30 07:28:31 +03:00
|
|
|
return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE;
|
2016-07-05 08:35:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void NoteAuxiliaryExtension(AuxiliaryExtension extension, Input data) override
|
|
|
|
{
|
|
|
|
if (extension != AuxiliaryExtension::SCTListFromOCSPResponse) {
|
|
|
|
ADD_FAILURE();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (InputToBuffer(data, signedCertificateTimestamps) != Success) {
|
|
|
|
ADD_FAILURE();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Buffer signedCertificateTimestamps;
|
|
|
|
};
|
|
|
|
|
|
|
|
void
|
|
|
|
ExtractSCTListFromOCSPResponse(Input cert,
|
|
|
|
Input issuerSPKI,
|
|
|
|
Input encodedResponse,
|
|
|
|
Time time,
|
|
|
|
Buffer& result)
|
|
|
|
{
|
|
|
|
result.clear();
|
|
|
|
|
|
|
|
BackCert backCert(cert, EndEntityOrCA::MustBeEndEntity, nullptr);
|
|
|
|
ASSERT_EQ(Success, backCert.Init());
|
|
|
|
|
|
|
|
CertID certID(backCert.GetIssuer(), issuerSPKI, backCert.GetSerialNumber());
|
|
|
|
|
|
|
|
bool expired;
|
|
|
|
OCSPExtensionTrustDomain trustDomain;
|
2017-08-30 07:28:31 +03:00
|
|
|
pkix::Result rv = VerifyEncodedOCSPResponse(trustDomain, certID,
|
|
|
|
time, /*time*/
|
|
|
|
1000, /*maxLifetimeInDays*/
|
|
|
|
encodedResponse, expired);
|
2016-07-05 08:35:06 +03:00
|
|
|
ASSERT_EQ(Success, rv);
|
|
|
|
|
|
|
|
result = Move(trustDomain.signedCertificateTimestamps);
|
2016-04-11 16:17:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
Buffer
|
|
|
|
cloneBuffer(const Buffer& buffer)
|
|
|
|
{
|
|
|
|
Buffer cloned;
|
|
|
|
MOZ_RELEASE_ASSERT(cloned.appendAll(buffer));
|
|
|
|
return cloned;
|
|
|
|
}
|
|
|
|
|
|
|
|
Input
|
|
|
|
InputForBuffer(const Buffer& buffer)
|
|
|
|
{
|
|
|
|
Input input;
|
|
|
|
MOZ_RELEASE_ASSERT(Success ==
|
2016-07-05 08:35:06 +03:00
|
|
|
input.Init(buffer.begin(), buffer.length()));
|
|
|
|
return input;
|
|
|
|
}
|
|
|
|
|
|
|
|
Input InputForSECItem(const SECItem& item)
|
|
|
|
{
|
|
|
|
Input input;
|
|
|
|
MOZ_RELEASE_ASSERT(Success ==
|
|
|
|
input.Init(item.data, item.len));
|
2016-04-11 16:17:25 +03:00
|
|
|
return input;
|
|
|
|
}
|
|
|
|
|
|
|
|
} } // namespace mozilla::ct
|
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
|
|
|
|
std::ostream&
|
|
|
|
operator<<(std::ostream& stream, const ct::Buffer& buffer)
|
|
|
|
{
|
|
|
|
if (buffer.empty()) {
|
|
|
|
stream << "EMPTY";
|
|
|
|
} else {
|
|
|
|
for (size_t i = 0; i < buffer.length(); ++i) {
|
|
|
|
if (i >= 1000) {
|
|
|
|
stream << "...";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
stream << std::hex << std::setw(2) << std::setfill('0')
|
|
|
|
<< static_cast<unsigned>(buffer[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
stream << std::dec;
|
|
|
|
return stream;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace mozilla
|