blob: 37b80029516f60c014658b576f20fcfc68dec94f [file] [log] [blame]
Ben Murdochbb1529c2013-08-08 10:24:53 +01001// Copyright 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/cert/jwk_serializer.h"
6
7#include "base/base64.h"
8#include "base/values.h"
9#include "testing/gtest/include/gtest/gtest.h"
10
11namespace net {
12
13// This is the ASN.1 prefix for a P-256 public key. Specifically it's:
14// SEQUENCE
15// SEQUENCE
16// OID id-ecPublicKey
17// OID prime256v1
18// BIT STRING, length 66, 0 trailing bits: 0x04
19//
20// The 0x04 in the BIT STRING is the prefix for an uncompressed, X9.62
21// public key. Following that are the two field elements as 32-byte,
22// big-endian numbers, as required by the Channel ID.
23static const unsigned char kP256SpkiPrefix[] = {
24 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
25 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
26 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
27 0x42, 0x00, 0x04
28};
29static const unsigned int kEcPointSize = 32U;
30
31// This is a valid P-256 public key.
32static const unsigned char kSpkiEc[] = {
33 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
34 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
35 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
36 0x42, 0x00, 0x04,
37 0x29, 0x5d, 0x6e, 0xfe, 0x33, 0x77, 0x26, 0xea,
38 0x5b, 0xa4, 0xe6, 0x1b, 0x34, 0x6e, 0x7b, 0xa0,
39 0xa3, 0x8f, 0x33, 0x49, 0xa0, 0x9c, 0xae, 0x98,
40 0xbd, 0x46, 0x0d, 0xf6, 0xd4, 0x5a, 0xdc, 0x8a,
41 0x1f, 0x8a, 0xb2, 0x20, 0x51, 0xb7, 0xd2, 0x87,
42 0x0d, 0x53, 0x7e, 0x5d, 0x94, 0xa3, 0xe0, 0x34,
43 0x16, 0xa1, 0xcc, 0x10, 0x48, 0xcd, 0x70, 0x9c,
44 0x05, 0xd3, 0xd2, 0xca, 0xdf, 0x44, 0x2f, 0xf4
45};
46
47// This is a P-256 public key with 0 X and Y values.
48static const unsigned char kSpkiEcWithZeroXY[] = {
49 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
50 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
51 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
52 0x42, 0x00, 0x04,
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
55 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
57 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
58 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
59 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
60 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
61};
62
63#if !defined(USE_OPENSSL)
64
65TEST(JwkSerializerNSSTest, ConvertSpkiFromDerToJwkEc) {
66 base::StringPiece spki;
67 base::DictionaryValue public_key_jwk;
68
69 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
70 EXPECT_TRUE(public_key_jwk.empty());
71
72 // Test the result of a "normal" point on this curve.
73 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc));
74 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
75
76 std::string string_value;
77 EXPECT_TRUE(public_key_jwk.GetString("alg", &string_value));
78 EXPECT_STREQ("EC", string_value.c_str());
79 EXPECT_TRUE(public_key_jwk.GetString("crv", &string_value));
80 EXPECT_STREQ("P-256", string_value.c_str());
81
82 EXPECT_TRUE(public_key_jwk.GetString("x", &string_value));
83 std::string decoded_coordinate;
84 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate));
85 EXPECT_EQ(kEcPointSize, decoded_coordinate.size());
86 EXPECT_EQ(0,
87 memcmp(decoded_coordinate.data(),
88 kSpkiEc + sizeof(kP256SpkiPrefix),
89 kEcPointSize));
90
91 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value));
92 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate));
93 EXPECT_EQ(kEcPointSize, decoded_coordinate.size());
94 EXPECT_EQ(0,
95 memcmp(decoded_coordinate.data(),
96 kSpkiEc + sizeof(kP256SpkiPrefix) + kEcPointSize,
97 kEcPointSize));
98
99 // Test the result of a corner case: leading 0s in the x, y coordinates are
100 // not trimmed, but the point is fixed-length encoded.
101 spki.set(reinterpret_cast<const char*>(kSpkiEcWithZeroXY),
102 sizeof(kSpkiEcWithZeroXY));
103 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
104
105 EXPECT_TRUE(public_key_jwk.GetString("alg", &string_value));
106 EXPECT_STREQ("EC", string_value.c_str());
107 EXPECT_TRUE(public_key_jwk.GetString("crv", &string_value));
108 EXPECT_STREQ("P-256", string_value.c_str());
109
110 EXPECT_TRUE(public_key_jwk.GetString("x", &string_value));
111 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate));
112 EXPECT_EQ(kEcPointSize, decoded_coordinate.size());
113 EXPECT_EQ(0,
114 memcmp(decoded_coordinate.data(),
115 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix),
116 kEcPointSize));
117
118 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value));
119 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate));
120 EXPECT_EQ(kEcPointSize, decoded_coordinate.size());
121 EXPECT_EQ(0,
122 memcmp(decoded_coordinate.data(),
123 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix) + kEcPointSize,
124 kEcPointSize));
125}
126
127#else
128
129// For OpenSSL, JwkSerializer::ConvertSpkiFromDerToJwk() is not yet implemented
130// and should return false. This unit test ensures that a stub implementation
131// is present.
132TEST(JwkSerializerOpenSSLTest, ConvertSpkiFromDerToJwkNotImplemented) {
133 base::StringPiece spki;
134 base::DictionaryValue public_key_jwk;
135
136 // The empty SPKI is trivially non-convertible...
137 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
138 EXPECT_TRUE(public_key_jwk.empty());
139 // but even a valid SPKI is non-convertible via the stub OpenSSL
140 // implementation.
141 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc));
142 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
143 EXPECT_TRUE(public_key_jwk.empty());
144}
145
146#endif // !defined(USE_OPENSSL)
147
148} // namespace net