| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/test/cert_test_util.h" |
| |
| #include "base/files/file_path.h" |
| #include "base/files/file_util.h" |
| #include "base/threading/thread_restrictions.h" |
| #include "net/cert/ev_root_ca_metadata.h" |
| #include "net/cert/x509_certificate.h" |
| #include "net/cert/x509_util.h" |
| #include "net/test/test_data_directory.h" |
| |
| namespace net { |
| |
| CertificateList CreateCertificateListFromFile( |
| const base::FilePath& certs_dir, |
| const std::string& cert_file, |
| int format) { |
| base::FilePath cert_path = certs_dir.AppendASCII(cert_file); |
| std::string cert_data; |
| if (!base::ReadFileToString(cert_path, &cert_data)) |
| return CertificateList(); |
| return X509Certificate::CreateCertificateListFromBytes(cert_data.data(), |
| cert_data.size(), |
| format); |
| } |
| |
| ::testing::AssertionResult LoadCertificateFiles( |
| const std::vector<std::string>& cert_filenames, |
| CertificateList* certs) { |
| certs->clear(); |
| for (const std::string& filename : cert_filenames) { |
| scoped_refptr<X509Certificate> cert = CreateCertificateChainFromFile( |
| GetTestCertsDirectory(), filename, X509Certificate::FORMAT_AUTO); |
| if (!cert) |
| return ::testing::AssertionFailure() |
| << "Failed loading certificate from file: " << filename |
| << " (in directory: " << GetTestCertsDirectory().value() << ")"; |
| certs->push_back(cert); |
| } |
| |
| return ::testing::AssertionSuccess(); |
| } |
| |
| scoped_refptr<X509Certificate> CreateCertificateChainFromFile( |
| const base::FilePath& certs_dir, |
| const std::string& cert_file, |
| int format) { |
| CertificateList certs = CreateCertificateListFromFile( |
| certs_dir, cert_file, format); |
| if (certs.empty()) |
| return nullptr; |
| |
| std::vector<bssl::UniquePtr<CRYPTO_BUFFER>> intermediates; |
| for (size_t i = 1; i < certs.size(); ++i) |
| intermediates.push_back(bssl::UpRef(certs[i]->cert_buffer())); |
| |
| scoped_refptr<X509Certificate> result(X509Certificate::CreateFromBuffer( |
| bssl::UpRef(certs[0]->cert_buffer()), std::move(intermediates))); |
| return result; |
| } |
| |
| scoped_refptr<X509Certificate> ImportCertFromFile( |
| const base::FilePath& certs_dir, |
| const std::string& cert_file) { |
| base::ScopedAllowBlockingForTesting allow_blocking; |
| base::FilePath cert_path = certs_dir.AppendASCII(cert_file); |
| std::string cert_data; |
| if (!base::ReadFileToString(cert_path, &cert_data)) |
| return nullptr; |
| |
| CertificateList certs_in_file = |
| X509Certificate::CreateCertificateListFromBytes( |
| cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO); |
| if (certs_in_file.empty()) |
| return nullptr; |
| return certs_in_file[0]; |
| } |
| |
| ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, |
| const SHA256HashValue& fingerprint, |
| const char* policy) |
| : fingerprint_(fingerprint), ev_root_ca_metadata_(ev_root_ca_metadata) { |
| EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy)); |
| } |
| |
| ScopedTestEVPolicy::~ScopedTestEVPolicy() { |
| EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_)); |
| } |
| |
| } // namespace net |