1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
|
/* Any copyright is dedicated to the Public Domain.
* http://creativecommons.org/publicdomain/zero/1.0/ */
"use strict";
// Tests X509.jsm functionality.
var { X509 } = Cu.import("resource://gre/modules/psm/X509.jsm", {});
function stringToBytes(s) {
let b = [];
for (let i = 0; i < s.length; i++) {
b.push(s.charCodeAt(i));
}
return b;
}
function readPEMToBytes(filename) {
return stringToBytes(atob(pemToBase64(readFile(do_get_file(filename)))));
}
function run_test() {
let certificate = new X509.Certificate();
certificate.parse(readPEMToBytes("bad_certs/default-ee.pem"));
equal(certificate.tbsCertificate.version, 3,
"default-ee.pem should be x509v3");
// serialNumber
deepEqual(certificate.tbsCertificate.serialNumber,
[ 0x35, 0x1b, 0xe9, 0x3a, 0x1b, 0x03, 0x1c, 0x46, 0x1b, 0x45,
0xfe, 0x9b, 0xb2, 0x20, 0x0f, 0x6e, 0xf2, 0x9e, 0xd9, 0x50 ],
"default-ee.pem should have expected serialNumber");
deepEqual(certificate.tbsCertificate.signature.algorithm._values,
[ 1, 2, 840, 113549, 1, 1, 11 ], // sha256WithRSAEncryption
"default-ee.pem should have sha256WithRSAEncryption signature");
// TODO: there should actually be an explicit encoded NULL here, but it looks
// like pycert doesn't include it.
deepEqual(certificate.tbsCertificate.signature.parameters, null,
"default-ee.pem should have NULL parameters for signature");
equal(certificate.tbsCertificate.issuer.rdns.length, 1,
"default-ee.pem should have one RDN in issuer");
equal(certificate.tbsCertificate.issuer.rdns[0].avas.length, 1,
"default-ee.pem should have one AVA in RDN in issuer");
deepEqual(certificate.tbsCertificate.issuer.rdns[0].avas[0].value.value,
stringToBytes("Test CA"),
"default-ee.pem should have issuer 'Test CA'");
equal(certificate.tbsCertificate.validity.notBefore.time.getTime(),
Date.parse("2015-11-28T00:00:00.000Z"),
"default-ee.pem should have the correct value for notBefore");
equal(certificate.tbsCertificate.validity.notAfter.time.getTime(),
Date.parse("2018-02-05T00:00:00.000Z"),
"default-ee.pem should have the correct value for notAfter");
equal(certificate.tbsCertificate.subject.rdns.length, 1,
"default-ee.pem should have one RDN in subject");
equal(certificate.tbsCertificate.subject.rdns[0].avas.length, 1,
"default-ee.pem should have one AVA in RDN in subject");
deepEqual(certificate.tbsCertificate.subject.rdns[0].avas[0].value.value,
stringToBytes("Test End-entity"),
"default-ee.pem should have subject 'Test End-entity'");
deepEqual(certificate.tbsCertificate.subjectPublicKeyInfo.algorithm.algorithm._values,
[ 1, 2, 840, 113549, 1, 1, 1 ], // rsaEncryption
"default-ee.pem should have a spki algorithm of rsaEncryption");
equal(certificate.tbsCertificate.extensions.length, 2,
"default-ee.pem should have two extensions");
deepEqual(certificate.signatureAlgorithm.algorithm._values,
[ 1, 2, 840, 113549, 1, 1, 11 ], // sha256WithRSAEncryption
"default-ee.pem should have sha256WithRSAEncryption signatureAlgorithm");
// TODO: there should actually be an explicit encoded NULL here, but it looks
// like pycert doesn't include it.
deepEqual(certificate.signatureAlgorithm.parameters, null,
"default-ee.pem should have NULL parameters for signatureAlgorithm");
equal(certificate.signatureValue.length, 2048 / 8,
"length of signature on default-ee.pem should be 2048 bits");
}
|