text stringlengths 0 601k |
|---|
type eddsa_test_group = { jwk : json ; key : eddsa_key ; keyDer : string ; keyPem : string ; type_ : json ; [ @ yojson . key " type " ] tests : dsa_test list ; } |
type test_file = { algorithm : json ; generatorVersion : json ; header : json ; notes : json ; numberOfTests : json ; schema : json ; testGroups : json list ; } |
let get_json = function Ok x -> x | Error s -> failwith s |
let load_file_exn path = Yojson . Safe . from_file path |> [ % of_yojson : test_file ] |> get_json |
let ecdh_test_group_exn json = [ % of_yojson : ecdh_test_group ] json |> get_json |
let ecdsa_test_group_exn json = [ % of_yojson : ecdsa_test_group ] json |> get_json |
let eddsa_test_group_exn json = [ % of_yojson : eddsa_test_group ] json |> get_json |
type tBSCertificate = { version : [ ` V1 | ` V2 | ` V3 ] ; serial : Z . t ; signature : OID . t ; issuer : ( OID . t * string ) list list ; validity : Ptime . t * Ptime . t ; subject : ( OID . t * string ) list list ; pk_info : OID . t * Cstruct . t ; issuer_id : Cstruct . t option ; subject_id : Cstruct . t option ; e... |
type certificate = { tbs_cert : tBSCertificate ; signature_algo : OID . t ; signature : Cstruct . t } |
let def x = function None -> x | Some y -> y |
let def ' x = fun y -> if y = x then None else Some y |
let extensions = let extension = map ( fun ( oid , b , v ) -> ( oid , def false b , v ) ) ( fun ( oid , b , v ) -> ( oid , def ' false b , v ) ) @@ sequence3 ( required ~ label " : id " oid ) ( optional ~ label " : critical " bool ) ( required ~ label " : value " octet_string ) in sequence_of extension |
let directory_name = map ( function | ` C1 s -> s | ` C2 s -> s | ` C3 s -> s | ` C4 s -> s | ` C5 s -> s | ` C6 s -> s ) ( function s -> ` C1 s ) @@ choice6 printable_string utf8_string teletex_string universal_string bmp_string ia5_string |
let name = let attribute_tv = sequence2 ( required ~ label " : attr type " oid ) ( required ~ label " : attr value " directory_name ) in let rd_name = set_of attribute_tv in let rdn_sequence = sequence_of rd_name in rdn_sequence |
let algorithmIdentifier = map ( fun ( oid , _ ) -> oid ) ( fun oid -> ( oid , None ) ) @@ sequence2 ( required ~ label " : algorithm " oid ) ( optional ~ label " : params " null ) |
let version = map ( function 2 -> ` V2 | 3 -> ` V3 | _ -> ` V1 ) ( function ` V2 -> 2 | ` V3 -> 3 | _ -> 1 ) int |
let time = map ( function ` C1 t -> t | ` C2 t -> t ) ( fun t -> ` C2 t ) ( choice2 utc_time generalized_time ) |
let validity = sequence2 ( required ~ label " : not before " time ) ( required ~ label " : not after " time ) |
let subjectPublicKeyInfo = sequence2 ( required ~ label " : algorithm " algorithmIdentifier ) ( required ~ label " : subjectPK " bit_string_cs ) |
let tBSCertificate = let f = fun ( a , ( b , ( c , ( d , ( e , ( f , ( g , ( h , ( i , j ) ) ) ) ) ) ) ) ) -> { version = def ` V1 a ; serial = b ; signature = c ; issuer = d ; validity = e ; subject = f ; pk_info = g ; issuer_id = h ; subject_id = i ; extensions = j } and g = fun { version = a ; serial = b ; signature... |
let certificate = let f ( a , b , c ) = { tbs_cert = a ; signature_algo = b ; signature = c } and g { tbs_cert = a ; signature_algo = b ; signature = c } = ( a , b , c ) in map f g @@ sequence3 ( required ~ label " : tbsCertificate " tBSCertificate ) ( required ~ label " : signatureAlgorithm " algorithmIdentifier ) ( r... |
let cert_ber , cert_der = ( codec ber certificate , codec der certificate ) |
let examples = [ " 3082062030820408a003020102 0203020acd300d06092a864886 f70d0101050500305431143012 060355040a130b434163657274 20496e632e311e301c06035504 0b1315687474703a2f2f777777 2e4341636572742e6f7267311c 301a0603550403131343416365 727420436c617373203320526f 6f74301e170d31333039303431 35343333395a170d3135303930 3431... |
let time ( ) = None |
let with_loaded_file file ~ f = let fullpath = " . / testcertificates " / ^ file ^ " . pem " in let fd = Unix . ( openfile fullpath [ O_RDONLY ] 0 ) in let buf = Unix_cstruct . of_fd fd in try let r = f buf in Unix . close fd ; match r with | Ok data -> data | Error ( ` Msg m ) -> Alcotest . failf " decoding error in %... |
let priv = match with_loaded_file " private / cakey " ~ f : Private_key . decode_pem with | ` RSA x -> x | _ -> assert false |
let cert name = with_loaded_file name ~ f : Certificate . decode_pem |
let host name = Domain_name . host_exn ( Domain_name . of_string_exn name ) |
let invalid_cas = [ " cacert - basicconstraint - ca - false " ; " cacert - unknown - critical - extension " ; " cacert - keyusage - crlsign " ; " cacert - ext - usage - timestamping " ] |
let cert_public_is_pub cert = let pub = Mirage_crypto_pk . Rsa . pub_of_priv priv in ( match Certificate . public_key cert with | ` RSA pub ' when pub = pub ' -> ( ) | _ -> Alcotest . fail " public / private key doesn ' t match " ) |
let test_invalid_ca name ( ) = let c = cert name in cert_public_is_pub c ; Alcotest . ( check int " CA list is empty " 0 ( List . length ( Validation . valid_cas [ c ] ) ) ) |
let invalid_ca_tests = List . mapi ( fun i args -> " invalid CA " ^ string_of_int i , ` Quick , test_invalid_ca args ) invalid_cas |
let cacert = cert " cacert " |
let cacert_pathlen0 = cert " cacert - pathlen - 0 " |
let cacert_ext = cert " cacert - unknown - extension " |
let cacert_ext_ku = cert " cacert - ext - usage " |
let cacert_v1 = cert " cacert - v1 " |
let test_valid_ca c ( ) = cert_public_is_pub c ; Alcotest . ( check int " CA is valid " 1 ( List . length ( Validation . valid_cas [ c ] ) ) ) |
let valid_ca_tests = [ " valid CA cacert " , ` Quick , test_valid_ca cacert ; " valid CA cacert_pathlen0 " , ` Quick , test_valid_ca cacert_pathlen0 ; " valid CA cacert_ext " , ` Quick , test_valid_ca cacert_ext ; " valid CA cacert_v1 " , ` Quick , test_valid_ca cacert_v1 ] |
let first_cert name = with_loaded_file ( " first " / ^ name ) ~ f : Certificate . decode_pem |
let first_certs = [ ( " first " , true , [ " foo . foobar . com " ; " foobar . com " ] , [ ` Digital_signature ; ` Content_commitment ; ` Key_encipherment ] , None ) ; ( " first - basicconstraint - true " , false , [ " ca . foobar . com " ] , [ ` Digital_signature ; ` Content_commitment ; ` Key_encipherment ] , None ) ... |
let allowed_hashes = [ ` MD5 ; ` SHA1 ; ` SHA224 ; ` SHA256 ; ` SHA384 ; ` SHA512 ] |
let test_valid_ca_cert ( ? allowed_hashes = allowed_hashes ) server chain valid name ca ( ) = let anchors = ca and host = Some ( host name ) and full_chain = server :: chain in match valid , Validation . verify_chain_of_trust ~ time ~ allowed_hashes ~ host ~ anchors full_chain with | false , Ok _ -> Alcotest . fail " e... |
let test_cert c usages extusage ( ) = let ku , eku = let exts = Certificate . extensions c in let ku = match Extension . ( find Key_usage exts ) with | None -> [ ] | Some ( _crit , ku ) -> ku and eku = match Extension . ( find Ext_key_usage exts ) with | None -> [ ] | Some ( _crit , eku ) -> eku in ku , eku in ( if Lis... |
let first_cert_tests = List . mapi ( fun i ( name , _ , _ , us , eus ) -> " certificate property testing " ^ string_of_int i , ` Quick , test_cert ( first_cert name ) us eus ) first_certs |
let first_cert_ca_test ( ca , x ) = List . flatten ( List . map ( fun ( name , valid , cns , _ , _ ) -> let c = first_cert name in ( " verification CA " ^ x ^ " cn blablbalbala " , ` Quick , test_valid_ca_cert c [ ] false " blablabalbal " [ ca ] ) :: List . mapi ( fun i cn -> " certificate verification testing using CA... |
let ca_tests f = List . flatten ( List . map f [ ( cacert , " cacert " ) ; ( cacert_pathlen0 , " cacert_pathlen0 " ) ; ( cacert_ext , " cacert_ext " ) ; ( cacert_ext_ku , " cacert_ext_ku " ) ; ( cacert_v1 , " cacert_v1 " ) ] ) |
let first_wildcard_certs = [ ( " first - wildcard - subjaltname " , [ ` Digital_signature ; ` Content_commitment ; ` Key_encipherment ] , None ) ; ( " first - wildcard " , [ ` Digital_signature ; ` Content_commitment ; ` Key_encipherment ] , None ) ; ] |
let first_wildcard_cert_tests = List . mapi ( fun i ( name , us , eus ) -> " wildcard certificate property testing " ^ string_of_int i , ` Quick , test_cert ( first_cert name ) us eus ) first_wildcard_certs |
let first_wildcard_cert_ca_test ( ca , x ) = List . flatten ( List . map ( fun ( name , _ , _ ) -> let c = first_cert name in ( " verification CA " ^ x ^ " cn blablbalbala " , ` Quick , test_valid_ca_cert c [ ] false " blablabalbal " [ ca ] ) :: List . mapi ( fun i cn -> " wildcard certificate CA " ^ x ^ " and CN " ^ c... |
let intermediate_cas = [ ( true , " cacert " ) ; ( true , " cacert - any - ext " ) ; ( false , " cacert - ba - false " ) ; ( false , " cacert - no - bc " ) ; ( false , " cacert - no - keyusage " ) ; ( true , " cacert - ku - critical " ) ; ( true , " cacert - timestamp " ) ; ( false , " cacert - unknown " ) ; ( false , ... |
let im_cert name = with_loaded_file ( " intermediate " / ^ name ) ~ f : Certificate . decode_pem |
let second_certs = [ ( " second " , [ " second . foobar . com " ] , true , [ ` Digital_signature ; ` Content_commitment ; ` Key_encipherment ] , None ) ; ( " second - any " , [ " second . foobar . com " ] , true , [ ` Digital_signature ; ` Content_commitment ; ` Key_encipherment ] , Some [ ` Any ] ) ; ( " second - subj... |
let second_cert name = with_loaded_file ( " intermediate / second " / ^ name ) ~ f : Certificate . decode_pem |
let second_cert_tests = List . mapi ( fun i ( name , _ , _ , us , eus ) -> " second certificate property testing " ^ string_of_int i , ` Quick , test_cert ( second_cert name ) us eus ) second_certs |
let second_cert_ca_test ( cavalid , ca , x ) = List . flatten ( List . flatten ( List . map ( fun ( imvalid , im ) -> let chain = [ im_cert im ] in List . map ( fun ( name , cns , valid , _ , _ ) -> let c = second_cert name in ( " verification CA " ^ x ^ " cn blablbalbala " , ` Quick , test_valid_ca_cert c chain false ... |
let im_ca_tests f = List . flatten ( List . map f [ ( true , cacert , " cacert " ) ; ( true , cacert_ext , " cacert_ext " ) ; ( true , cacert_ext_ku , " cacert_ext_ku " ) ; ( true , cacert_v1 , " cacert_v1 " ) ; ( false , cacert_pathlen0 , " cacert_pathlen0 " ) ] ) |
let second_wildcard_cert_ca_test ( cavalid , ca , x ) = List . flatten ( List . map ( fun ( imvalid , im ) -> let chain = [ im_cert im ] in let c = second_cert " second - subj - wild " in ( " verification CA " ^ x ^ " cn blablbalbala " , ` Quick , test_valid_ca_cert c chain false " blablabalbal " [ ca ] ) :: List . map... |
let second_no_cn_cert_ca_test ( _ , ca , x ) = List . flatten ( List . map ( fun ( _ , im ) -> let chain = [ im_cert im ] in let c = second_cert " second - no - cn " in ( " verification CA " ^ x ^ " cn blablbalbala " , ` Quick , test_valid_ca_cert c chain false " blablabalbal " [ ca ] ) :: List . mapi ( fun i cn -> " c... |
let invalid_tests = let c = second_cert " second " in let h = " second . foobar . com " in let allowed_hashes = [ ` SHA256 ; ` SHA384 ; ` SHA512 ] in [ " invalid chain " , ` Quick , test_valid_ca_cert c [ ] false h [ cacert ] ; " broken chain " , ` Quick , test_valid_ca_cert c [ cacert ] false h [ cacert ] ; " no trust... |
let x509_tests = [ " Invalid CA " , invalid_ca_tests ; " Valid CA " , valid_ca_tests ; " Certificate " , first_cert_tests ; " CA tests with certificate " , ca_tests first_cert_ca_test ; " Wildcard certificate " , first_wildcard_cert_tests ; " CA tests with wildcard certificate " , ca_tests first_wildcard_cert_ca_test ;... |
let file_contents file = Deferred . Or_error . try_with ~ name ( : sprintf " read % s " file ) ( fun ( ) -> Reader . file_contents file ) ; ; |
let load_all_in_directory ~ directory ~ f = let open Deferred . Or_error . Let_syntax in let % bind files = Deferred . Or_error . try_with ( fun ( ) -> Sys . ls_dir directory ) in Deferred . Or_error . List . map files ~ f ( : fun file -> let % bind contents = file_contents ( directory ^/ file ) in f ~ contents ) ; ; |
module Or_error = struct include Or_error let of_result ~ to_string = Result . map_error ~ f ( : Fn . compose Error . of_string to_string ) let of_result_msg x = of_result x ~ to_string ( : fun ( ` Msg msg ) -> msg ) let lift_result_msg_of_cstruct f ~ contents = f ( Cstruct . of_string contents ) |> of_result_msg ; ; l... |
module CRL = struct include X509 . CRL let decode_der = Or_error . lift_result_msg_of_cstruct decode_der let revoke ? digest ~ issuer ~ this_update ? next_update ? extensions revoked_certs key = revoke ? digest ~ issuer ~ this_update ? next_update ? extensions revoked_certs key |> Or_error . of_result_msg ; ; let revok... |
module Certificate = struct include X509 . Certificate open Deferred . Or_error . Let_syntax let decode_pem_multiple = Or_error . lift_result_msg_of_cstruct decode_pem_multiple let decode_pem = Or_error . lift_result_msg_of_cstruct decode_pem let decode_der = Or_error . lift_result_msg_of_cstruct decode_der let of_pem_... |
module Authenticator = struct include X509 . Authenticator module Param = struct module Chain_of_trust = struct type t = { trust_anchors : [ ` File of Filename . t | ` Directory of Filename . t ] ; allowed_hashes : Mirage_crypto . Hash . hash list option ; crls : Filename . t option } let to_certs = function | ` File f... |
module Distinguished_name = struct include X509 . Distinguished_name let decode_der = Or_error . lift_result_msg_of_cstruct decode_der end |
module OCSP = struct include X509 . OCSP module Request = struct include Request let create ? certs ? digest ? requestor_name ? key cert_ids = create ? certs ? digest ? requestor_name ? key cert_ids |> Or_error . of_result_msg ; ; let decode_der = Or_error . lift_asn_error_of_cstruct decode_der end module Response = st... |
module PKCS12 = struct include X509 . PKCS12 let decode_der = Or_error . lift_result_msg_of_cstruct decode_der let verify password t = verify password t |> Or_error . of_result_msg end |
module Private_key = struct include X509 . Private_key let sign hash ? scheme key data = sign hash ? scheme key data |> Or_error . of_result_msg |> Or_error . map ~ f : Cstruct . to_string ; ; let decode_der = Or_error . lift_result_msg_of_cstruct decode_der let decode_pem = Or_error . lift_result_msg_of_cstruct decode... |
module Public_key = struct include X509 . Public_key let verify hash ? scheme ~ signature key data = let signature = Cstruct . of_string signature in let data = match data with | ` Digest data -> ` Digest ( Cstruct . of_string data ) | ` Message data -> ` Message ( Cstruct . of_string data ) in verify hash ? scheme ~ s... |
module Signing_request = struct include X509 . Signing_request let decode_der ? allowed_hashes der = Cstruct . of_string der |> decode_der ? allowed_hashes |> Or_error . of_result_msg ; ; let decode_pem pem = Cstruct . of_string pem |> decode_pem |> Or_error . of_result_msg let create subject ? digest ? extensions key ... |
let failure msg = fail @@ Failure msg |
let catch_invalid_arg th h = Lwt . catch ( fun ( ) -> th ) ( function | Invalid_argument msg -> h msg | exn -> fail exn ) |
let ( ) </> a b = a ^ " " / ^ b |
let o f g x = f ( g x ) |
let read_file path = let open Lwt_io in open_file ~ mode : Input path >>= fun file -> read file >|= Cstruct . of_string >>= fun cs -> close file >|= fun ( ) -> cs |
let read_dir path = let open Lwt_unix in let rec collect acc d = readdir_n d 10 >>= function | [ ] || -> return acc | xs -> collect ( Array . to_list xs @ acc ) d in opendir path >>= fun dir -> collect [ ] dir >>= fun entries -> closedir dir >|= fun ( ) -> entries |
let extension str = let n = String . length str in let rec scan = function | i when i = 0 -> None | i when str . [ i - 1 ] = ' . ' -> Some ( String . sub str i ( n - i ) ) | i -> scan ( pred i ) in scan n |
let private_of_pems ~ cert ~ priv_key = catch_invalid_arg ( read_file cert >|= fun pem -> match X509 . Certificate . decode_pem_multiple pem with | Ok cs -> cs | Error ( ` Msg m ) -> invalid_arg ( " failed to parse certificates " ^ m ) ) ( o failure @@ Printf . sprintf " Private certificates ( % s ) : % s " cert ) >>= ... |
let certs_of_pem path = catch_invalid_arg ( read_file path >|= fun pem -> match X509 . Certificate . decode_pem_multiple pem with | Ok cs -> cs | Error ( ` Msg m ) -> invalid_arg ( " failed to parse certificates " ^ m ) ) ( o failure @@ Printf . sprintf " Certificates in % s : % s " path ) |
let certs_of_pem_dir path = read_dir path >|= List . filter ( fun file -> extension file = Some " crt " ) >>= Lwt_list . map_p ( fun file -> certs_of_pem ( path </> file ) ) >|= List . concat |
let crl_of_pem path = catch_invalid_arg ( read_file path >|= fun data -> match X509 . CRL . decode_der data with | Ok cs -> cs | Error ( ` Msg m ) -> invalid_arg ( " failed to parse CRL " ^ m ) ) ( o failure @@ Printf . sprintf " CRL in % s : % s " path ) |
let crls_of_pem_dir = function | None -> Lwt . return None | Some path -> read_dir path >>= fun files -> Lwt_list . map_p ( fun file -> crl_of_pem ( path </> file ) ) files >|= fun crls -> Some crls |
let authenticator ? allowed_hashes ? crls param = let time ( ) = Some ( Ptime_clock . now ( ) ) in let of_cas cas = crls_of_pem_dir crls >|= fun crls -> X509 . Authenticator . chain_of_trust ? allowed_hashes ? crls ~ time cas and dotted_hex_to_cs hex = Cstruct . of_hex ( String . map ( function ' ' : -> ' ' | x -> x ) ... |
let cint i = " " $ ^ ( string_of_int i ) |
let off i a = String . concat [ string_of_int i ; " ( " ; a ; " ) " ] |
let my_print_string s ctx = Out_channel . output_string ctx . out s ; ctx |
let nacmd c = String . concat [ " \ t " ; c ; " \ n " ] |> my_print_string |
let slcmd c a = String . concat [ " \ t " ; c ; " \ t " ; a ; " \ n " ] |> my_print_string |
let bicmd c a b = String . concat [ " \ t " ; c ; " \ t " ; a ; " , " ; b ; " \ n " ] |> my_print_string |
let dot_string s = " \ t . string " " \ ^ s ^ " " \\ n " |> my_print_string |
let globl f = " \ t . globl " ^ f ^ " \ n " |> my_print_string |
let label f = f ^ " :\ n " |> my_print_string |
let movb = bicmd " movb " |
let movl = bicmd " movl " |
let movq = bicmd " movq " |
let pushq = slcmd " pushq " |
let popq = slcmd " popq " |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.