/*
* Copyright (c) Meta Platforms, Inc. and affiliates.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <ctime>
#include <folly/portability/GTest.h>
#include <folly/ssl/OpenSSLPtrTypes.h>
using namespace folly;
using namespace folly::ssl;
using namespace testing;
TEST(OpenSSLPortabilityTest, TestRSASetter) {
RsaUniquePtr r(RSA_new());
BIGNUM* n = BN_new();
BIGNUM* e = BN_new();
BIGNUM* d = BN_new();
BIGNUM* n_actual;
BIGNUM* e_actual;
BIGNUM* d_actual;
EXPECT_TRUE(BN_set_bit(n, 1));
EXPECT_TRUE(BN_set_bit(e, 3));
EXPECT_TRUE(BN_set_bit(d, 2));
RSA_set0_key(r.get(), n, e, d);
RSA_get0_key(
r.get(),
(const BIGNUM**)&n_actual,
(const BIGNUM**)&e_actual,
(const BIGNUM**)&d_actual);
// BN_cmp returns 0 if the two BIGNUMs are equal
EXPECT_FALSE(BN_cmp(n, n_actual));
EXPECT_FALSE(BN_cmp(e, e_actual));
EXPECT_FALSE(BN_cmp(d, d_actual));
RsaUniquePtr public_key(RSA_new());
BIGNUM* n_public = BN_new();
BIGNUM* e_public = BN_new();
EXPECT_TRUE(BN_set_bit(n_public, 1));
EXPECT_TRUE(BN_set_bit(e_public, 3));
RSA_set0_key(public_key.get(), n_public, e_public, nullptr);
BIGNUM* n_public_actual;
BIGNUM* e_public_actual;
RSA_get0_key(
public_key.get(),
(const BIGNUM**)&n_public_actual,
(const BIGNUM**)&e_public_actual,
nullptr);
EXPECT_FALSE(BN_cmp(n_public, n_public_actual));
EXPECT_FALSE(BN_cmp(e_public, e_public_actual));
}
TEST(OpenSSLPortabilityTest, TestEcdsaSigPortability) {
EcdsaSigUniquePtr ecdsa(ECDSA_SIG_new());
BIGNUM* r = BN_new();
BIGNUM* s = BN_new();
BIGNUM* r_actual;
BIGNUM* s_actual;
EXPECT_TRUE(BN_set_bit(r, 1));
EXPECT_TRUE(BN_set_bit(s, 2));
EXPECT_TRUE(ECDSA_SIG_set0(ecdsa.get(), r, s));
ECDSA_SIG_get0(
ecdsa.get(), (const BIGNUM**)&r_actual, (const BIGNUM**)&s_actual);
// BN_cmp returns 0 if the two BIGNUMs are equal
EXPECT_FALSE(BN_cmp(r, r_actual));
EXPECT_FALSE(BN_cmp(s, s_actual));
}
TEST(OpenSSLPortabilityTest, TestX509RevokedApi) {
X509_REVOKED* rev = X509_REVOKED_new();
ASN1_INTEGER* serial = ASN1_INTEGER_new();
ASN1_INTEGER_set(serial, 1234L);
ASN1_TIME* revocation_date = ASN1_TIME_new();
time_t t = time(nullptr);
ASN1_TIME_set(revocation_date, t);
X509_REVOKED_set_serialNumber(rev, serial);
X509_REVOKED_set_revocationDate(rev, revocation_date);
const ASN1_INTEGER* retrieved_serial = X509_REVOKED_get0_serialNumber(rev);
const ASN1_TIME* retrieved_date = X509_REVOKED_get0_revocationDate(rev);
EXPECT_EQ(0, ASN1_INTEGER_cmp(serial, retrieved_serial));
int diff_days;
int diff_secs;
ASN1_TIME_diff(&diff_days, &diff_secs, revocation_date, retrieved_date);
EXPECT_EQ(0, diff_days);
EXPECT_EQ(0, diff_secs);
ASN1_INTEGER_free(serial);
ASN1_TIME_free(revocation_date);
X509_REVOKED_free(rev);
}