1 // Copyright 2013 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "net/cert/jwk_serializer.h" 6 7 #include "base/base64.h" 8 #include "base/values.h" 9 #include "testing/gtest/include/gtest/gtest.h" 10 11 namespace net { 12 13 #if !defined(USE_OPENSSL) 14 // This is the ASN.1 prefix for a P-256 public key. Specifically it's: 15 // SEQUENCE 16 // SEQUENCE 17 // OID id-ecPublicKey 18 // OID prime256v1 19 // BIT STRING, length 66, 0 trailing bits: 0x04 20 // 21 // The 0x04 in the BIT STRING is the prefix for an uncompressed, X9.62 22 // public key. Following that are the two field elements as 32-byte, 23 // big-endian numbers, as required by the Channel ID. 24 static const unsigned char kP256SpkiPrefix[] = { 25 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 26 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 27 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 28 0x42, 0x00, 0x04 29 }; 30 static const unsigned int kEcCoordinateSize = 32U; 31 #endif 32 33 // This is a valid P-256 public key. 34 static const unsigned char kSpkiEc[] = { 35 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 36 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 37 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 38 0x42, 0x00, 0x04, 39 0x29, 0x5d, 0x6e, 0xfe, 0x33, 0x77, 0x26, 0xea, 40 0x5b, 0xa4, 0xe6, 0x1b, 0x34, 0x6e, 0x7b, 0xa0, 41 0xa3, 0x8f, 0x33, 0x49, 0xa0, 0x9c, 0xae, 0x98, 42 0xbd, 0x46, 0x0d, 0xf6, 0xd4, 0x5a, 0xdc, 0x8a, 43 0x1f, 0x8a, 0xb2, 0x20, 0x51, 0xb7, 0xd2, 0x87, 44 0x0d, 0x53, 0x7e, 0x5d, 0x94, 0xa3, 0xe0, 0x34, 45 0x16, 0xa1, 0xcc, 0x10, 0x48, 0xcd, 0x70, 0x9c, 46 0x05, 0xd3, 0xd2, 0xca, 0xdf, 0x44, 0x2f, 0xf4 47 }; 48 49 #if !defined(USE_OPENSSL) 50 // This is a P-256 public key with 0 X and Y values. 51 static const unsigned char kSpkiEcWithZeroXY[] = { 52 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 53 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 54 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 55 0x42, 0x00, 0x04, 56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 57 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 58 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 59 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 60 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 63 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 64 }; 65 66 TEST(JwkSerializerNSSTest, ConvertSpkiFromDerToJwkEc) { 67 base::StringPiece spki; 68 base::DictionaryValue public_key_jwk; 69 70 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 71 EXPECT_TRUE(public_key_jwk.empty()); 72 73 // Test the result of a "normal" point on this curve. 74 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 75 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 76 77 std::string string_value; 78 EXPECT_TRUE(public_key_jwk.GetString("kty", &string_value)); 79 EXPECT_STREQ("EC", string_value.c_str()); 80 EXPECT_TRUE(public_key_jwk.GetString("crv", &string_value)); 81 EXPECT_STREQ("P-256", string_value.c_str()); 82 83 EXPECT_TRUE(public_key_jwk.GetString("x", &string_value)); 84 std::string decoded_coordinate; 85 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate)); 86 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size()); 87 EXPECT_EQ(0, 88 memcmp(decoded_coordinate.data(), 89 kSpkiEc + sizeof(kP256SpkiPrefix), 90 kEcCoordinateSize)); 91 92 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value)); 93 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate)); 94 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size()); 95 EXPECT_EQ(0, 96 memcmp(decoded_coordinate.data(), 97 kSpkiEc + sizeof(kP256SpkiPrefix) + kEcCoordinateSize, 98 kEcCoordinateSize)); 99 100 // Test the result of a corner case: leading 0s in the x, y coordinates are 101 // not trimmed, but the point is fixed-length encoded. 102 spki.set(reinterpret_cast<const char*>(kSpkiEcWithZeroXY), 103 sizeof(kSpkiEcWithZeroXY)); 104 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 105 106 EXPECT_TRUE(public_key_jwk.GetString("kty", &string_value)); 107 EXPECT_STREQ("EC", string_value.c_str()); 108 EXPECT_TRUE(public_key_jwk.GetString("crv", &string_value)); 109 EXPECT_STREQ("P-256", string_value.c_str()); 110 111 EXPECT_TRUE(public_key_jwk.GetString("x", &string_value)); 112 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate)); 113 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size()); 114 EXPECT_EQ(0, 115 memcmp(decoded_coordinate.data(), 116 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix), 117 kEcCoordinateSize)); 118 119 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value)); 120 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate)); 121 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size()); 122 EXPECT_EQ(0, 123 memcmp(decoded_coordinate.data(), 124 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix) + kEcCoordinateSize, 125 kEcCoordinateSize)); 126 } 127 128 #else 129 130 // For OpenSSL, JwkSerializer::ConvertSpkiFromDerToJwk() is not yet implemented 131 // and should return false. This unit test ensures that a stub implementation 132 // is present. 133 TEST(JwkSerializerOpenSSLTest, ConvertSpkiFromDerToJwkNotImplemented) { 134 base::StringPiece spki; 135 base::DictionaryValue public_key_jwk; 136 137 // The empty SPKI is trivially non-convertible... 138 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 139 EXPECT_TRUE(public_key_jwk.empty()); 140 // but even a valid SPKI is non-convertible via the stub OpenSSL 141 // implementation. 142 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 143 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 144 EXPECT_TRUE(public_key_jwk.empty()); 145 } 146 147 #endif // !defined(USE_OPENSSL) 148 149 } // namespace net 150