mirror of
https://github.com/classilla/tenfourfox.git
synced 2025-02-08 01:31:00 +00:00
211 lines
7.7 KiB
C++
211 lines
7.7 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This code is made available to you under your choice of the following sets
|
|
* of licensing terms:
|
|
*/
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*/
|
|
/* Copyright 2015 Mozilla Contributors
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "pkixtestutil.h"
|
|
|
|
#include "pkixder.h"
|
|
|
|
// python DottedOIDToCode.py --prefixdefine PREFIX_1_2_840_10040 1.2.840.10040
|
|
#define PREFIX_1_2_840_10040 0x2a, 0x86, 0x48, 0xce, 0x38
|
|
|
|
// python DottedOIDToCode.py --prefixdefine PREFIX_1_2_840_10045 1.2.840.10045
|
|
#define PREFIX_1_2_840_10045 0x2a, 0x86, 0x48, 0xce, 0x3d
|
|
|
|
// python DottedOIDToCode.py --prefixdefine PREFIX_1_2_840_113549 1.2.840.113549
|
|
#define PREFIX_1_2_840_113549 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d
|
|
|
|
namespace mozilla { namespace pkix { namespace test {
|
|
|
|
namespace {
|
|
|
|
enum class NULLParam { NO, YES };
|
|
|
|
template <size_t SIZE>
|
|
ByteString
|
|
OID(const uint8_t (&rawValue)[SIZE])
|
|
{
|
|
return TLV(der::OIDTag, ByteString(rawValue, SIZE));
|
|
}
|
|
|
|
template <size_t SIZE>
|
|
ByteString
|
|
SimpleAlgID(const uint8_t (&rawValue)[SIZE],
|
|
NULLParam nullParam = NULLParam::NO)
|
|
{
|
|
ByteString sequenceValue(OID(rawValue));
|
|
if (nullParam == NULLParam::YES) {
|
|
sequenceValue.append(TLV(der::NULLTag, ByteString()));
|
|
}
|
|
return TLV(der::SEQUENCE, sequenceValue);
|
|
}
|
|
|
|
template <size_t SIZE>
|
|
ByteString
|
|
DERInteger(const uint8_t (&rawValue)[SIZE])
|
|
{
|
|
ByteString value(rawValue, SIZE);
|
|
if (value[0] & 0x80u) {
|
|
// Prefix with a leading zero to disambiguate this from a negative value.
|
|
value.insert(value.begin(), 0x00);
|
|
}
|
|
return TLV(der::INTEGER, value);
|
|
}
|
|
|
|
// Generated with "openssl dsaparam -C -noout 2048" and reformatted.
|
|
// openssl 1.0 or later must be used so that a 256-bit Q value is
|
|
// generated.
|
|
static const uint8_t DSS_P_RAW[] =
|
|
{
|
|
0xB3,0xCD,0x29,0x44,0xF0,0x25,0xA7,0x73,0xFC,0x86,0x70,0xA2,
|
|
0x69,0x5A,0x97,0x3F,0xBD,0x1C,0x6F,0xAA,0x4A,0x40,0x42,0x8E,
|
|
0xCF,0xAE,0x62,0x12,0xED,0xB4,0xFD,0x05,0xC2,0xAE,0xB1,0x8C,
|
|
0xFC,0xBE,0x38,0x90,0xBB,0x7C,0xFF,0x16,0xF4,0xED,0xCE,0x72,
|
|
0x12,0x93,0x83,0xF0,0xA4,0xA1,0x71,0xDC,0x4B,0xF0,0x4E,0x3A,
|
|
0x2B,0xFA,0x17,0xB7,0xB3,0x2A,0xCC,0x2C,0xD3,0xC8,0x21,0x49,
|
|
0x7A,0x83,0x71,0x8B,0x3D,0x62,0x96,0xDC,0xAD,0xA8,0x03,0xBE,
|
|
0x1D,0x33,0x11,0xF3,0xEB,0xD8,0x1B,0x8D,0xDB,0x62,0x79,0x83,
|
|
0xF8,0x67,0x4E,0x62,0x21,0x2C,0x81,0x59,0xE8,0x73,0xD7,0xAF,
|
|
0xB9,0x63,0x60,0xEA,0xAE,0xEC,0x68,0x6A,0xB4,0xB0,0x65,0xBA,
|
|
0xA3,0x4C,0x09,0x99,0x29,0x6A,0x2E,0x2B,0xFC,0x6D,0x51,0xCA,
|
|
0x30,0xA2,0x2F,0x7A,0x65,0x76,0xA7,0x55,0x13,0x11,0xA0,0x02,
|
|
0xA2,0x59,0x4B,0xCE,0xA7,0x05,0xF6,0x07,0x35,0x9B,0x41,0xD7,
|
|
0x11,0x5A,0x18,0x57,0xA7,0x78,0x88,0xC3,0xA8,0xE3,0x39,0xF5,
|
|
0x47,0x3D,0x2E,0x18,0x54,0xB0,0xF0,0xBF,0x65,0x3F,0x77,0xC7,
|
|
0x11,0xB8,0x0D,0x52,0xAD,0xC8,0xE8,0x6D,0xF6,0x7E,0x88,0x65,
|
|
0x84,0x2B,0xF7,0xEF,0x8E,0xB5,0x7C,0xBD,0x2E,0x0D,0xF3,0xC6,
|
|
0xDD,0x0B,0xB4,0xF2,0x23,0x1F,0xDA,0x55,0x05,0xF5,0xDC,0x53,
|
|
0xA6,0x83,0xDA,0x5C,0xEF,0x29,0x02,0x78,0x68,0xD0,0xA4,0x39,
|
|
0x09,0x7F,0xFA,0x49,0x18,0xD0,0xB5,0x19,0x35,0x31,0x8E,0xDE,
|
|
0x43,0x35,0xA3,0xB9,0x6D,0xC1,0x70,0xC6,0x0D,0x18,0x24,0xEB,
|
|
0x1E,0x4D,0x52,0xB7,
|
|
};
|
|
|
|
static const uint8_t DSS_Q_RAW[] =
|
|
{
|
|
0x8D,0x6B,0x86,0x89,0x9C,0x8D,0x30,0x91,0xCC,0x6E,0x34,0xF1,
|
|
0xE8,0x9C,0x8A,0x5C,0xD6,0xAB,0x01,0x1E,0xC4,0xDB,0xFD,0x07,
|
|
0xEB,0x5F,0x4E,0xE8,0xFA,0xFC,0x98,0x2D,
|
|
};
|
|
|
|
static const uint8_t DSS_G_RAW[] =
|
|
{
|
|
0x0E,0x2C,0x34,0xB2,0xE1,0x66,0x49,0xB6,0x9A,0x7D,0x67,0x3E,
|
|
0xEE,0x98,0x35,0x18,0x28,0x35,0xFC,0x05,0x36,0x3B,0x94,0xE6,
|
|
0x1E,0x1C,0x5B,0x05,0x3E,0x86,0x1B,0xE3,0xED,0xD2,0xE1,0xF3,
|
|
0xF7,0xF7,0x60,0x6D,0x7D,0xA1,0xAF,0x9A,0xD1,0xDF,0xA2,0x9C,
|
|
0xFC,0xA2,0xEB,0x90,0x8B,0x1C,0x82,0x92,0x45,0x7B,0x30,0x2A,
|
|
0xFD,0x7A,0xE6,0x68,0x8F,0xEC,0x89,0x3A,0x9A,0xAD,0xFE,0x25,
|
|
0x5E,0x51,0xC5,0x29,0x45,0x7F,0xAC,0xDE,0xFC,0xB4,0x1B,0x3A,
|
|
0xDA,0xC7,0x21,0x68,0x87,0x27,0x8D,0x7B,0xB2,0xBB,0x41,0x60,
|
|
0x46,0x42,0x5B,0x6B,0xE8,0x80,0xD2,0xE4,0xA3,0x30,0x8F,0xD5,
|
|
0x71,0x07,0x8A,0x7B,0x32,0x56,0x84,0x41,0x1C,0xDF,0x69,0xE9,
|
|
0xFD,0xBA,0x48,0xE0,0x43,0xA0,0x38,0x92,0x12,0xF3,0x52,0xA5,
|
|
0x40,0x87,0xCB,0x34,0xBB,0x3E,0x25,0x29,0x3C,0xC6,0xA5,0x17,
|
|
0xFD,0x58,0x47,0x89,0xDB,0x9B,0xB9,0xCF,0xE9,0xA8,0xF2,0xEC,
|
|
0x55,0x76,0xF5,0xF1,0x9C,0x6E,0x0A,0x3F,0x16,0x5F,0x49,0x31,
|
|
0x31,0x1C,0x43,0xA2,0x83,0xDA,0xDD,0x7F,0x1C,0xEA,0x05,0x36,
|
|
0x7B,0xED,0x09,0xFB,0x6F,0x8A,0x2B,0x55,0xB9,0xBC,0x4A,0x8C,
|
|
0x28,0xC1,0x4D,0x13,0x6E,0x47,0xF4,0xAD,0x79,0x00,0xE9,0x5A,
|
|
0xB6,0xC7,0x73,0x28,0xA9,0x89,0xAD,0xE8,0x6E,0xC6,0x54,0xA5,
|
|
0x56,0x2D,0xAA,0x81,0x83,0x9E,0xC1,0x13,0x79,0xA4,0x12,0xE0,
|
|
0x76,0x1F,0x25,0x43,0xB6,0xDE,0x56,0xF7,0x52,0xCC,0x07,0xB8,
|
|
0x37,0xE2,0x8C,0xC5,0x56,0x8C,0xDD,0x63,0xF5,0xB6,0xA3,0x46,
|
|
0x62,0xF6,0x35,0x76,
|
|
};
|
|
|
|
} // unnamed namespace
|
|
|
|
TestSignatureAlgorithm::TestSignatureAlgorithm(
|
|
const TestPublicKeyAlgorithm& publicKeyAlg,
|
|
TestDigestAlgorithmID digestAlg,
|
|
const ByteString& algorithmIdentifier,
|
|
bool accepted)
|
|
: publicKeyAlg(publicKeyAlg)
|
|
, digestAlg(digestAlg)
|
|
, algorithmIdentifier(algorithmIdentifier)
|
|
, accepted(accepted)
|
|
{
|
|
}
|
|
|
|
ByteString DSS_P() { return ByteString(DSS_P_RAW, sizeof(DSS_P_RAW)); }
|
|
ByteString DSS_Q() { return ByteString(DSS_Q_RAW, sizeof(DSS_Q_RAW)); }
|
|
ByteString DSS_G() { return ByteString(DSS_G_RAW, sizeof(DSS_G_RAW)); }
|
|
|
|
TestPublicKeyAlgorithm
|
|
DSS()
|
|
{
|
|
static const uint8_t oidValue[] = { PREFIX_1_2_840_10040, 4, 1 };
|
|
|
|
// RFC 3279 Section-2.3.2
|
|
return TestPublicKeyAlgorithm(
|
|
TLV(der::SEQUENCE,
|
|
OID(oidValue) +
|
|
TLV(der::SEQUENCE,
|
|
DERInteger(DSS_P_RAW) +
|
|
DERInteger(DSS_Q_RAW) +
|
|
DERInteger(DSS_G_RAW))));
|
|
}
|
|
|
|
// RFC 3279 Section 2.3.1
|
|
TestPublicKeyAlgorithm
|
|
RSA_PKCS1()
|
|
{
|
|
static const uint8_t rsaEncryption[] = { PREFIX_1_2_840_113549, 1, 1, 1 };
|
|
return TestPublicKeyAlgorithm(SimpleAlgID(rsaEncryption, NULLParam::YES));
|
|
}
|
|
|
|
// RFC 3279 Section 2.2.1
|
|
TestSignatureAlgorithm md2WithRSAEncryption()
|
|
{
|
|
static const uint8_t oidValue[] = { PREFIX_1_2_840_113549, 1, 1, 2 };
|
|
return TestSignatureAlgorithm(RSA_PKCS1(), TestDigestAlgorithmID::MD2,
|
|
SimpleAlgID(oidValue), false);
|
|
}
|
|
|
|
// RFC 3279 Section 2.2.1
|
|
TestSignatureAlgorithm md5WithRSAEncryption()
|
|
{
|
|
static const uint8_t oidValue[] = { PREFIX_1_2_840_113549, 1, 1, 4 };
|
|
return TestSignatureAlgorithm(RSA_PKCS1(), TestDigestAlgorithmID::MD5,
|
|
SimpleAlgID(oidValue), false);
|
|
}
|
|
|
|
// RFC 3279 Section 2.2.1
|
|
TestSignatureAlgorithm sha1WithRSAEncryption()
|
|
{
|
|
static const uint8_t oidValue[] = { PREFIX_1_2_840_113549, 1, 1, 5 };
|
|
return TestSignatureAlgorithm(RSA_PKCS1(), TestDigestAlgorithmID::SHA1,
|
|
SimpleAlgID(oidValue), true);
|
|
}
|
|
|
|
// RFC 4055 Section 5
|
|
TestSignatureAlgorithm sha256WithRSAEncryption()
|
|
{
|
|
static const uint8_t oidValue[] = { PREFIX_1_2_840_113549, 1, 1, 11 };
|
|
return TestSignatureAlgorithm(RSA_PKCS1(), TestDigestAlgorithmID::SHA256,
|
|
SimpleAlgID(oidValue), true);
|
|
}
|
|
|
|
} } } // namespace mozilla::pkix
|