Fixed DEREncoder test case to use the test self-signed cert, not the iphone dev cert, which doesn't pass the test case yet.
2 // MYParsedCertificate.m
5 // Created by Jens Alfke on 6/2/09.
6 // Copyright 2009 Jens Alfke. All rights reserved.
10 // <http://en.wikipedia.org/wiki/X.509>
11 // <http://www.cs.auckland.ac.nz/~pgut001/pubs/x509guide.txt>
14 #import "MYParsedCertificate.h"
15 #import "MYASN1Object.h"
17 #import "MYBERParser.h"
18 #import "MYDEREncoder.h"
19 #import "MYPublicKey.h"
20 #import "MYCertificate.h"
21 #import "MYErrorUtils.h"
24 static id $atIf(NSArray *array, NSUInteger index) {
25 return index < array.count ?[array objectAtIndex: index] :nil;
29 @implementation MYParsedCertificate
32 static MYOID *kRSAAlgorithmID, *kRSAWithSHA1AlgorithmID;
36 if (!kRSAAlgorithmID) {
37 UInt32 components[7] = {1, 2, 840, 113549, 1, 1, 1,};
38 kRSAAlgorithmID = [[MYOID alloc] initWithComponents: components count: 7];
40 if (!kRSAWithSHA1AlgorithmID) {
41 UInt32 components[7] = {1, 2, 840, 113549, 1, 1, 5};
42 kRSAWithSHA1AlgorithmID = [[MYOID alloc] initWithComponents: components count: 7];
46 + (MYOID*) RSAAlgorithmID {return kRSAAlgorithmID;}
47 + (MYOID*) RSAWithSHA1AlgorithmID {return kRSAWithSHA1AlgorithmID;}
50 + (NSString*) validate: (id)root {
51 NSArray *top = $castIf(NSArray,root);
53 return @"Too few top-level components";
54 NSArray *info = $castIf(NSArray, [top objectAtIndex: 0]);
56 return @"Too few identity components";
57 MYASN1Object *version = $castIf(MYASN1Object, [info objectAtIndex: 0]);
58 if (!version || version.tag != 0)
59 return @"Missing or invalid version";
60 NSArray *versionComps = $castIf(NSArray, version.components);
61 if (!versionComps || versionComps.count != 1)
62 return @"Invalid version";
63 NSNumber *versionNum = $castIf(NSNumber, [versionComps objectAtIndex: 0]);
64 if (!versionNum || versionNum.intValue < 0 || versionNum.intValue > 2)
65 return @"Unrecognized version number";
70 - (id) initWithCertificateData: (NSData*)data error: (NSError**)outError;
74 if (outError) *outError = nil;
75 id root = MYBERParse(data,outError);
76 NSString *errorMsg = [[self class] validate: root];
79 *outError = MYError(2, MYASN1ErrorDomain, @"Invalid certificate: %@", errorMsg);
83 _root = [root retain];
98 @synthesize issuer=_issuer;
101 - (NSArray*) info {return $castIf(NSArray,$atIf(_root,0));}
103 - (BOOL) isSelfSigned {
104 id issuer = $atIf(self.info,3);
105 id subject = $atIf(self.info,5);
106 return $equal(issuer,subject);
109 - (MYPublicKey*) subjectPublicKey {
110 NSArray *keyInfo = $cast(NSArray, $atIf(self.info, 6));
111 MYOID *keyAlgorithmID = $castIf(MYOID, $atIf($castIf(NSArray,$atIf(keyInfo,0)), 0));
112 if (!$equal(keyAlgorithmID, kRSAAlgorithmID))
114 MYBitString *keyData = $cast(MYBitString, $atIf(keyInfo, 1));
115 if (!keyData) return nil;
116 return [[[MYPublicKey alloc] initWithKeyData: keyData.bits] autorelease];
118 NSArray *keyParts = $castIf(NSArray, MYBERParse(keyData, nil));
119 if (!keyParts) return nil;
120 MYBitString *modulus = $castIf(MYBitString, $atIf(keyParts,0));
121 int exponent = [$castIf(NSNumber, $atIf(keyParts,1)) intValue];
122 if (!modulus || exponent<3) return nil;
126 - (MYPublicKey*) issuerPublicKey {
128 return _issuer.publicKey;
129 else if (self.isSelfSigned)
130 return self.subjectPublicKey;
136 - (NSData*) signedData {
137 // The root object is a sequence; we want to extract the 1st object of that sequence.
138 const UInt8 *certStart = _data.bytes;
139 const UInt8 *start = MYBERGetContents(_data, nil);
140 if (!start) return nil;
141 size_t length = MYBERGetLength([NSData dataWithBytesNoCopy: (void*)start
142 length: _data.length - (start-certStart)
147 return [NSData dataWithBytes: start length: (start + length - certStart)];
150 - (MYOID*) signatureAlgorithmID {
151 return $castIf(MYOID, $atIf($castIf(NSArray,$atIf(_root,1)), 0));
154 - (NSData*) signature {
155 id signature = $atIf(_root,2);
156 if ([signature isKindOfClass: [MYBitString class]])
157 signature = [signature bits];
158 return $castIf(NSData,signature);
161 - (BOOL) validateSignature {
162 if (!$equal(self.signatureAlgorithmID, [MYParsedCertificate RSAWithSHA1AlgorithmID]))
164 NSData *signedData = self.signedData;
165 NSData *signature = self.signature;
166 MYPublicKey *pubKey = self.issuerPublicKey;
167 if (!signature || !pubKey) return NO;
168 return [pubKey verifySignature: signature ofData: signedData];
177 TestCase(ParsedCert) {
178 auto void testCert(NSString *filename, BOOL selfSigned);
179 testCert(@"../../Tests/selfsigned.cer", YES);
180 testCert(@"../../Tests/iphonedev.cer", NO);
181 auto void testCert(NSString *filename, BOOL selfSigned) {
182 Log(@"--- Creating MYParsedCertificate from %@", filename);
183 NSData *certData = [NSData dataWithContentsOfFile: filename];
184 //Log(@"Cert Data =\n%@", certData);
185 NSError *error = nil;
186 MYParsedCertificate *pcert = [[MYParsedCertificate alloc] initWithCertificateData: certData
189 CAssert(pcert != nil);
191 CAssertEq(pcert.isSelfSigned, selfSigned);
193 NSData *signedData = pcert.signedData;
194 //Log(@"Signed Data = (length=%x)\n%@", signedData.length, signedData);
195 CAssertEqual(signedData, [certData subdataWithRange: NSMakeRange(4,signedData.length)]);
197 Log(@"AlgID = %@", pcert.signatureAlgorithmID);
198 Log(@"Signature = %@", pcert.signature);
199 CAssertEqual(pcert.signatureAlgorithmID, [MYParsedCertificate RSAWithSHA1AlgorithmID]);
200 CAssert(pcert.signature != nil);
201 Log(@"Subject Public Key = %@", pcert.subjectPublicKey);
202 CAssert(pcert.subjectPublicKey);
204 Log(@"Issuer Public Key = %@", pcert.issuerPublicKey);
205 CAssert(pcert.issuerPublicKey);
207 CAssert(pcert.validateSignature);
214 /* Parsed form of selfsigned.cer:
218 MYASN1Object[2/0]: <-- version (int, constructed)
222 {1 2 840 113549 1 1 1} <-- algorithm ID
230 {1 2 840 113549 1 9 1}
243 Just a fictitious person
244 Sequence: <--validity
245 2009-04-12 21:54:35 -0700
246 2010-04-13 21:54:35 -0700
247 Sequence: <-- subject
254 {1 2 840 113549 1 9 1}
267 Just a fictitious person
268 Sequence: <-- public key info
270 {1 2 840 113549 1 1 1} <-- algorithm ID (RSA)
272 MYBitString<3082010a 02820101 0095713c 360badf2 d8575ebd 278fa26b a2e6d05e 1eb04eaa 9fa6f11b fd341556 038b3077 525c7adb f5aedf3b 249b08e6 7f77af26 7ff2feb8 5f4ccb96 5269dbd2 f01f19b6 55fc4ea3 a85f2ede 11ff80f8 fc23e662 f263f685 06a9ec07 f7ee4249 af184f21 2d9253d8 7f6f7cbc 96e6ba5c abc8f4e7 3bf6100b 06dcf3ee 999d4170 f5dd005d a24a54a1 3edaddd5 0675409d 6728a387 5fa71898 ebf7d93d 4af8742d f9a0e9ad 6dc21cfa fc2d1967 e692575b 56e5376c 8cf008e8 a442d787 6843a92e 9501b144 8a75adef 5e804fec 6d09740d 1ea8442e 67fac3be c5ea3af5 d95d9f95 2c507711 01c45942 28ad1410 23525324 62848476 d987d3c7 d65f9057 daf1e853 77020301 0001> <-- DER-encoded key
280 <301a0608 2b060105 05070301 06082b06 01050507 03020604 551d2500>
282 {1 2 840 113549 1 1 5}
284 MYBitString<79c8e789 50a11fcb 7398f5fe 0cfa2595 b2476f53 62dfbea2 70ae3a8b fdaf5a57 39be6101 fc5e0929 e57a0b2b 41e3ab52 f78ef1b5 ecc8848c da7f42aa b57c3df4 df4125a9 db4e6388 197c2a1c e326c1a5 5203b4ef da057b91 4abc43aa 3eeee6aa fe4303c3 0f000175 16b916b5 72f8b74f c682a06f 920e3bbf a16cdad8 fce3f184 adccc61e 8d3b44e5 8bd103f0 46310f6a 992f240a b290354c 04c519c9 22276df6 310ccb8e 942e38f6 555ca40b 71482e52 146a9988 f021c2c0 2d285db5 59d48eaf 7b20559f 068ea1a0 f07fbaee 29284ada 28bf8344 f435f30f 6263f0c9 9c4920ce a1b7c6c0 9cfa3bbb af5a0fee 5b0e94eb 9c57d28b 1bb9c977 be53e4bb b675ffaa>