OpenSSLCertUtilsTest.cpp 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287
  1. /*
  2. * Copyright 2017-present Facebook, Inc.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include <folly/ssl/OpenSSLCertUtils.h>
  17. #include <folly/Format.h>
  18. #include <folly/Range.h>
  19. #include <folly/String.h>
  20. #include <folly/container/Enumerate.h>
  21. #include <folly/portability/GTest.h>
  22. #include <folly/portability/OpenSSL.h>
  23. #include <folly/ssl/Init.h>
  24. #include <folly/ssl/OpenSSLPtrTypes.h>
  25. using namespace testing;
  26. using namespace folly;
  27. const char* kTestCertWithoutSan = "folly/io/async/test/certs/tests-cert.pem";
  28. const char* kTestCa = "folly/io/async/test/certs/ca-cert.pem";
  29. // Test key
  30. // -----BEGIN EC PRIVATE KEY-----
  31. // MHcCAQEEIBskFwVZ9miFN+SKCFZPe9WEuFGmP+fsecLUnsTN6bOcoAoGCCqGSM49
  32. // AwEHoUQDQgAE7/f4YYOYunAM/VkmjDYDg3AWUgyyTIraWmmQZsnu0bYNV/lLLfNz
  33. // CtHggxGSwEtEe40nNb9C8wQmHUvb7VBBlw==
  34. // -----END EC PRIVATE KEY-----
  35. const std::string kTestCertWithSan = folly::stripLeftMargin(R"(
  36. -----BEGIN CERTIFICATE-----
  37. MIIDXDCCAkSgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBQMQswCQYDVQQGEwJVUzEL
  38. MAkGA1UECAwCQ0ExDTALBgNVBAoMBEFzb3gxJTAjBgNVBAMMHEFzb3ggQ2VydGlm
  39. aWNhdGlvbiBBdXRob3JpdHkwHhcNMTcwMjEzMjMyMTAzWhcNNDQwNzAxMjMyMTAz
  40. WjAwMQswCQYDVQQGEwJVUzENMAsGA1UECgwEQXNveDESMBAGA1UEAwwJMTI3LjAu
  41. MC4xMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7/f4YYOYunAM/VkmjDYDg3AW
  42. UgyyTIraWmmQZsnu0bYNV/lLLfNzCtHggxGSwEtEe40nNb9C8wQmHUvb7VBBl6OC
  43. ASowggEmMAkGA1UdEwQCMAAwLAYJYIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJh
  44. dGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRx1kmdZEfXHmWLHpSDI0Lh8hmfwzAf
  45. BgNVHSMEGDAWgBQX3ykJKb97nxp/6UZJyDvts7noezAxBgNVHREEKjAoghJhbm90
  46. aGVyZXhhbXBsZS5jb22CEioudGhpcmRleGFtcGxlLmNvbTB4BggrBgEFBQcBAQRs
  47. MGowaAYIKwYBBQUHMAKGXGh0dHBzOi8vcGhhYnJpY2F0b3IuZmIuY29tL2RpZmZ1
  48. c2lvbi9GQkNPREUvYnJvd3NlL21hc3Rlci90aS90ZXN0X2NlcnRzL2NhX2NlcnQu
  49. cGVtP3ZpZXc9cmF3MA0GCSqGSIb3DQEBCwUAA4IBAQCj3FLjLMLudaFDiYo9pAPQ
  50. NBYNpG27aajQCvnEsYaMAGnNBxUUhv/E4xpnJEhatiCJWlPgGebdjXkpXYkLxnFj
  51. 38UmpfZbNcvPPKxXmjIlkpYeFwcHTAUpFmMXVHdr8FjkDSN+qWHLllMFNAAqp0U6
  52. 4VWjDlq9xCjzNw+8fdcEpwylpPrbNyQHqSO1k+DhM2qPuQfiWPmHe2PbJv8JB3no
  53. HWGi9SNe0FjtJM3066L0Gj8g/bFDo/pnyKguQyGkS7PaepK5/u5Y2fMMBO/m4+U0
  54. b9Yb0TvatsqL688CoZcSn73A0yAjptwbD/4HmcVlG2j/y8eTVpXisugu6Xz+QQGu
  55. -----END CERTIFICATE-----
  56. )");
  57. const std::string kTestCertBundle = folly::stripLeftMargin(R"(
  58. -----BEGIN CERTIFICATE-----
  59. MIIDgzCCAmugAwIBAgIJAIkcS3PQcCm+MA0GCSqGSIb3DQEBCwUAMFgxCzAJBgNV
  60. BAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAaBgNVBAoME0RlZmF1bHQg
  61. Q29tcGFueSBMdGQxFDASBgNVBAMMC3Rlc3QgY2VydCAxMB4XDTE3MTAyMzIwNTcw
  62. M1oXDTE4MTAyMzIwNTcwM1owWDELMAkGA1UEBhMCWFgxFTATBgNVBAcMDERlZmF1
  63. bHQgQ2l0eTEcMBoGA1UECgwTRGVmYXVsdCBDb21wYW55IEx0ZDEUMBIGA1UEAwwL
  64. dGVzdCBjZXJ0IDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCplTzR
  65. 6shdhVNbx5HFViiYDBjRYXCWiUeR0/0+XPkyI+DPIGAQ6Mre8WD03GPebYn7j3Lr
  66. JwgV06BJNvVCLDy0SJbf6ToxGfKWSLEWOoip32nIpb9qxURtx44NUvhChP54hhKI
  67. zAf8nNlS+qKUYbmixJHeUWO//8wNpsMKDkvtfVUZ6oVV3JPOOihJ+sQ0sIc5x+xk
  68. 3eWfa0cNoZnxu4plQg2O4RlHOv8ruMW6BttpcqQ8I+Rxq+/YOhNQhX+6GZ1+Rs+f
  69. ddWXYNH6tFxsLIEbgCqHhLGw7g+JRms9R+CxLCpjmhYhR2xgl6KQu/Racr2T/17z
  70. 897VfY7X94PmamidAgMBAAGjUDBOMB0GA1UdDgQWBBRHQvRr2p3/83y1yXiiVnnS
  71. zObpzTAfBgNVHSMEGDAWgBRHQvRr2p3/83y1yXiiVnnSzObpzTAMBgNVHRMEBTAD
  72. AQH/MA0GCSqGSIb3DQEBCwUAA4IBAQAk61K1sjrS7rrLnGND1o1Q6D2ebgb1wcfU
  73. WX+ZnhlkUxjSS1nHmaulMftpvzbgrOt7HWZKMXIpetnDSfksrGpw6QJ3VWFIJlH5
  74. P4x8//pVeI5jQd4W7gIl65tZOc5cEH8aqnzkaGP8YBx6BI6N8px1gZVgePVu3ebR
  75. eLdrWH2l4VishWOf6rO/ltQdTwRIqj08QNsWmSrRK2d7J/DGA6R9JkdyxeLdxqmB
  76. 2BMwJ7IVR+bWuTzD9Zk5lZseIVFcIksxmQ8jJuZXUdN8WOT/65p9UnN+Cc6+Q7F4
  77. rlVz+ytcdvaf5mDeqFILDK6btWcUP2Vr1EfRDt/QBrU6OjAVQD+U
  78. -----END CERTIFICATE-----
  79. -----BEGIN CERTIFICATE-----
  80. MIIDgzCCAmugAwIBAgIJAPzrfjTkvHezMA0GCSqGSIb3DQEBCwUAMFgxCzAJBgNV
  81. BAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAaBgNVBAoME0RlZmF1bHQg
  82. Q29tcGFueSBMdGQxFDASBgNVBAMMC3Rlc3QgY2VydCAyMB4XDTE3MTAyMzIwNTcx
  83. NloXDTE4MTAyMzIwNTcxNlowWDELMAkGA1UEBhMCWFgxFTATBgNVBAcMDERlZmF1
  84. bHQgQ2l0eTEcMBoGA1UECgwTRGVmYXVsdCBDb21wYW55IEx0ZDEUMBIGA1UEAwwL
  85. dGVzdCBjZXJ0IDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzy9G/
  86. NM7Llp+foYxug2Dqc3r9zWtb4PvbRqoz8W0ZRy0GkL3JtOfLWtlz+RCGa//mlGMA
  87. HLa+Qg77nnjuhO/KCCgQS9fxHY+zcv1VBwzsKmKcju4BCscsTLPsy0SJCXBXSgnH
  88. S4NMR/K+YozwdikEZRbU4VLJiw44CeJ1h74r2ElHYuOL0SpL8PSlv7kJu3/xWUiV
  89. L2iWk+y8yKIpCRQ9I7+L0kuhylZAmVBTKtgbdcLfERqQNNWAT7D+p/6CwNmpT9ei
  90. G2xJ0N4bt3w8kwcZ+IkGwei8Nadix+POe3WVU9K1VXVfoLZ9nNWKRnwIFP4Bsmld
  91. rP4Uy2IZuhrKE4BPAgMBAAGjUDBOMB0GA1UdDgQWBBQkmeMfPQaax9wCZL16jSSG
  92. XigBWjAfBgNVHSMEGDAWgBQkmeMfPQaax9wCZL16jSSGXigBWjAMBgNVHRMEBTAD
  93. AQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCXzqxYp1FqMS2M+opCSPezgPDBdE2S9g6d
  94. HJHV5CLptGnu1vQIlyCXy/7X9b6Qq8UzuYyFacN/37tbNw6sGyTRfL8sEeFYfFoT
  95. GvgSrRqSM47ZBYx5jW/Uslkc5qbq+v4zeGCq5611stQKsJYIudu0+PjJmgtNF6en
  96. zTx8B6eS79GRN3/M7/kFLlxeZNCQpmKwvPp8P7JE4ZHUtuzQoKtjdt/etWpS76fV
  97. Akx7VhCFg/lw80tmgSclq885hYRYc6DOKfUubWOacKVfmHwL4oDiSffBonI7MoH8
  98. SJbzsCBpVd/tkDADZpxBQplGV7AaDBoNS0qvZHfH5x9R9R5lx9M+
  99. -----END CERTIFICATE-----
  100. -----BEGIN CERTIFICATE-----
  101. MIIDgzCCAmugAwIBAgIJAOzqPJDDfSKDMA0GCSqGSIb3DQEBCwUAMFgxCzAJBgNV
  102. BAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAaBgNVBAoME0RlZmF1bHQg
  103. Q29tcGFueSBMdGQxFDASBgNVBAMMC3Rlc3QgY2VydCAzMB4XDTE3MTAyMzIwNTcy
  104. NVoXDTE4MTAyMzIwNTcyNVowWDELMAkGA1UEBhMCWFgxFTATBgNVBAcMDERlZmF1
  105. bHQgQ2l0eTEcMBoGA1UECgwTRGVmYXVsdCBDb21wYW55IEx0ZDEUMBIGA1UEAwwL
  106. dGVzdCBjZXJ0IDMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDWqU2b
  107. eBzaOAja6od84hFfgvitOGrCYqLXMUXe0X7AlldzXV4zHaVyTKdEwDwvKDi5p9OF
  108. uTxSZkZ0JSPHZeH2/rHXidNMWdtiy5x/5ra1u9ctN7jHeboIxmdpfxoGq7s6cRA5
  109. oRh0bCNmw+Y7K+1RITmPloB7155RbrJYZR5MOFIaCnZV3j/icKjASTOg3ivXX4lx
  110. BoHGMYF8rl+51FIJsuXvnBgF+GhadMVSWl4Qy6gLliml1MgujlmFg9/1y/xzdWZg
  111. yyLI3tvw7fo/NN62u41VQBdCGdpvnVxU4ADu2/T0vhAS+Bh2CMK1OAAw61x1507S
  112. f68mab9s8at49qefAgMBAAGjUDBOMB0GA1UdDgQWBBQnn76Swsnld6Q1weLgpo/S
  113. tt0KeTAfBgNVHSMEGDAWgBQnn76Swsnld6Q1weLgpo/Stt0KeTAMBgNVHRMEBTAD
  114. AQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCB0XANIWyP7DYROh6MFQLqeylngd9iUGNe
  115. BMT4pWu60p5ZX13kK/gbV/P2cayUkkWEMWpzKcIX70IkaB5y/OxVMXUXo94UupsM
  116. b1T736wHA0TLeL7yDj9OnMYj/qa2r8pAyEObI84KoWRGMHH9UPSRbVMVrhg/agBA
  117. LA6eZhwiGctkCy09kp+SFbUpv+SMyVp60UrPub6j68Hzd0FioGY01Os7nScuPNo0
  118. rl2S+G36bcem8Z5MOkJ0LEFi6ctK9JdLcHkr1SVavo3fsYZaIZraJxFGcYUVyLT+
  119. Rw7ydBokxHWsmVJczuRmEovXcTmgIphti234e7usKjw8M5mGwYfa
  120. -----END CERTIFICATE-----
  121. )");
  122. class OpenSSLCertUtilsTest : public Test {
  123. public:
  124. void SetUp() override {
  125. folly::ssl::init();
  126. }
  127. };
  128. static folly::ssl::X509UniquePtr readCertFromFile(const std::string& filename) {
  129. folly::ssl::BioUniquePtr bio(BIO_new(BIO_s_file()));
  130. if (!bio) {
  131. throw std::runtime_error("Couldn't create BIO");
  132. }
  133. if (BIO_read_filename(bio.get(), filename.c_str()) != 1) {
  134. throw std::runtime_error("Couldn't read cert file: " + filename);
  135. }
  136. return folly::ssl::X509UniquePtr(
  137. PEM_read_bio_X509(bio.get(), nullptr, nullptr, nullptr));
  138. }
  139. static folly::ssl::X509UniquePtr readCertFromData(
  140. const folly::StringPiece data) {
  141. folly::ssl::BioUniquePtr bio(BIO_new_mem_buf(data.data(), data.size()));
  142. if (!bio) {
  143. throw std::runtime_error("Couldn't create BIO");
  144. }
  145. return folly::ssl::X509UniquePtr(
  146. PEM_read_bio_X509(bio.get(), nullptr, nullptr, nullptr));
  147. }
  148. TEST_F(OpenSSLCertUtilsTest, TestX509CN) {
  149. auto x509 = readCertFromFile(kTestCertWithoutSan);
  150. EXPECT_NE(x509, nullptr);
  151. auto identity = folly::ssl::OpenSSLCertUtils::getCommonName(*x509);
  152. EXPECT_EQ(identity.value(), "Asox Company");
  153. auto sans = folly::ssl::OpenSSLCertUtils::getSubjectAltNames(*x509);
  154. EXPECT_EQ(sans.size(), 0);
  155. }
  156. TEST_F(OpenSSLCertUtilsTest, TestX509Sans) {
  157. auto x509 = readCertFromData(kTestCertWithSan);
  158. EXPECT_NE(x509, nullptr);
  159. auto identity = folly::ssl::OpenSSLCertUtils::getCommonName(*x509);
  160. EXPECT_EQ(identity.value(), "127.0.0.1");
  161. auto altNames = folly::ssl::OpenSSLCertUtils::getSubjectAltNames(*x509);
  162. EXPECT_EQ(altNames.size(), 2);
  163. EXPECT_EQ(altNames[0], "anotherexample.com");
  164. EXPECT_EQ(altNames[1], "*.thirdexample.com");
  165. }
  166. TEST_F(OpenSSLCertUtilsTest, TestX509IssuerAndSubject) {
  167. auto x509 = readCertFromData(kTestCertWithSan);
  168. EXPECT_NE(x509, nullptr);
  169. auto issuer = folly::ssl::OpenSSLCertUtils::getIssuer(*x509);
  170. EXPECT_EQ(
  171. issuer.value(),
  172. "C = US, ST = CA, O = Asox, CN = Asox Certification Authority");
  173. auto subj = folly::ssl::OpenSSLCertUtils::getSubject(*x509);
  174. EXPECT_EQ(subj.value(), "C = US, O = Asox, CN = 127.0.0.1");
  175. }
  176. TEST_F(OpenSSLCertUtilsTest, TestX509Dates) {
  177. auto x509 = readCertFromData(kTestCertWithSan);
  178. EXPECT_NE(x509, nullptr);
  179. auto notBefore = folly::ssl::OpenSSLCertUtils::getNotBeforeTime(*x509);
  180. EXPECT_EQ(notBefore, "Feb 13 23:21:03 2017 GMT");
  181. auto notAfter = folly::ssl::OpenSSLCertUtils::getNotAfterTime(*x509);
  182. EXPECT_EQ(notAfter, "Jul 1 23:21:03 2044 GMT");
  183. }
  184. TEST_F(OpenSSLCertUtilsTest, TestX509Summary) {
  185. auto x509 = readCertFromData(kTestCertWithSan);
  186. EXPECT_NE(x509, nullptr);
  187. auto summary = folly::ssl::OpenSSLCertUtils::toString(*x509);
  188. EXPECT_EQ(
  189. summary.value(),
  190. " Version: 3 (0x2)\n Serial Number: 2 (0x2)\n"
  191. " Issuer: C = US, ST = CA, O = Asox, CN = Asox Certification Authority\n"
  192. " Validity\n Not Before: Feb 13 23:21:03 2017 GMT\n"
  193. " Not After : Jul 1 23:21:03 2044 GMT\n"
  194. " Subject: C = US, O = Asox, CN = 127.0.0.1\n"
  195. " X509v3 extensions:\n"
  196. " X509v3 Basic Constraints: \n"
  197. " CA:FALSE\n"
  198. " Netscape Comment: \n"
  199. " OpenSSL Generated Certificate\n"
  200. " X509v3 Subject Key Identifier: \n"
  201. " 71:D6:49:9D:64:47:D7:1E:65:8B:1E:94:83:23:42:E1:F2:19:9F:C3\n"
  202. " X509v3 Authority Key Identifier: \n"
  203. " keyid:17:DF:29:09:29:BF:7B:9F:1A:7F:E9:46:49:C8:3B:ED:B3:B9:E8:7B\n\n"
  204. " X509v3 Subject Alternative Name: \n"
  205. " DNS:anotherexample.com, DNS:*.thirdexample.com\n"
  206. " Authority Information Access: \n"
  207. " CA Issuers - URI:https://phabricator.fb.com/diffusion/FBCODE/browse/master/ti/test_certs/ca_cert.pem?view=raw\n\n");
  208. }
  209. TEST_F(OpenSSLCertUtilsTest, TestDerEncodeDecode) {
  210. auto x509 = readCertFromData(kTestCertWithSan);
  211. auto der = folly::ssl::OpenSSLCertUtils::derEncode(*x509);
  212. auto decoded = folly::ssl::OpenSSLCertUtils::derDecode(der->coalesce());
  213. EXPECT_EQ(
  214. folly::ssl::OpenSSLCertUtils::toString(*x509),
  215. folly::ssl::OpenSSLCertUtils::toString(*decoded));
  216. }
  217. TEST_F(OpenSSLCertUtilsTest, TestDerDecodeJunkData) {
  218. StringPiece junk{"MyFakeCertificate"};
  219. EXPECT_THROW(
  220. folly::ssl::OpenSSLCertUtils::derDecode(junk), std::runtime_error);
  221. }
  222. TEST_F(OpenSSLCertUtilsTest, TestDerDecodeTooShort) {
  223. auto x509 = readCertFromData(kTestCertWithSan);
  224. auto der = folly::ssl::OpenSSLCertUtils::derEncode(*x509);
  225. der->trimEnd(1);
  226. EXPECT_THROW(
  227. folly::ssl::OpenSSLCertUtils::derDecode(der->coalesce()),
  228. std::runtime_error);
  229. }
  230. TEST_F(OpenSSLCertUtilsTest, TestReadCertsFromBuffer) {
  231. auto certs = folly::ssl::OpenSSLCertUtils::readCertsFromBuffer(
  232. StringPiece(kTestCertBundle));
  233. EXPECT_EQ(certs.size(), 3);
  234. for (auto i : folly::enumerate(certs)) {
  235. auto identity = folly::ssl::OpenSSLCertUtils::getCommonName(**i);
  236. EXPECT_TRUE(identity);
  237. EXPECT_EQ(*identity, folly::sformat("test cert {}", i.index + 1));
  238. }
  239. }
  240. TEST_F(OpenSSLCertUtilsTest, TestX509Digest) {
  241. auto x509 = readCertFromFile(kTestCertWithoutSan);
  242. EXPECT_NE(x509, nullptr);
  243. auto sha1Digest = folly::ssl::OpenSSLCertUtils::getDigestSha1(*x509);
  244. EXPECT_EQ(
  245. folly::hexlify(folly::range(sha1Digest)),
  246. "b84e951d6c4e6cc70346357fab43d7ed73a07b0f");
  247. auto sha2Digest = folly::ssl::OpenSSLCertUtils::getDigestSha256(*x509);
  248. EXPECT_EQ(
  249. folly::hexlify(folly::range(sha2Digest)),
  250. "364d3a6a0b10d0635ce59b40c0b7f505ab2cd9fd0a06661cdc61d9cb8c9c9821");
  251. }
  252. TEST_F(OpenSSLCertUtilsTest, TestX509Store) {
  253. auto store = folly::ssl::OpenSSLCertUtils::readStoreFromFile(kTestCa);
  254. EXPECT_NE(store, nullptr);
  255. auto x509 = readCertFromFile(kTestCertWithoutSan);
  256. folly::ssl::X509StoreCtxUniquePtr ctx(X509_STORE_CTX_new());
  257. auto rc = X509_STORE_CTX_init(ctx.get(), store.get(), x509.get(), nullptr);
  258. EXPECT_EQ(rc, 1);
  259. rc = X509_verify_cert(ctx.get());
  260. EXPECT_EQ(rc, 1);
  261. }