| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef NET_TEST_CERT_TEST_UTIL_H_ |
| #define NET_TEST_CERT_TEST_UTIL_H_ |
| |
| #include <string> |
| #include <vector> |
| |
| #include "base/memory/ref_counted.h" |
| #include "net/cert/x509_cert_types.h" |
| #include "net/cert/x509_certificate.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| |
| #if defined(USE_NSS_CERTS) |
| #include "net/cert/scoped_nss_types.h" |
| |
| // From <pk11pub.h> |
| typedef struct PK11SlotInfoStr PK11SlotInfo; |
| |
| #include "net/cert/scoped_nss_types.h" |
| #endif |
| |
| namespace base { |
| class FilePath; |
| } |
| |
| namespace net { |
| |
| class EVRootCAMetadata; |
| |
| #if defined(USE_NSS_CERTS) |
| // Imports a private key from file |key_filename| in |dir| into |slot|. The file |
| // must contain a PKCS#8 PrivateKeyInfo in DER encoding. Returns true on success |
| // and false on failure. |
| bool ImportSensitiveKeyFromFile(const base::FilePath& dir, |
| const std::string& key_filename, |
| PK11SlotInfo* slot); |
| |
| bool ImportClientCertToSlot(CERTCertificate* cert, PK11SlotInfo* slot); |
| |
| ScopedCERTCertificate ImportClientCertToSlot( |
| const scoped_refptr<X509Certificate>& cert, |
| PK11SlotInfo* slot); |
| |
| scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile( |
| const base::FilePath& dir, |
| const std::string& cert_filename, |
| const std::string& key_filename, |
| PK11SlotInfo* slot, |
| ScopedCERTCertificate* nss_cert); |
| scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile( |
| const base::FilePath& dir, |
| const std::string& cert_filename, |
| const std::string& key_filename, |
| PK11SlotInfo* slot); |
| |
| ScopedCERTCertificate ImportCERTCertificateFromFile( |
| const base::FilePath& certs_dir, |
| const std::string& cert_file); |
| |
| ScopedCERTCertificateList CreateCERTCertificateListFromFile( |
| const base::FilePath& certs_dir, |
| const std::string& cert_file, |
| int format); |
| #endif |
| |
| // Imports all of the certificates in |cert_file|, a file in |certs_dir|, into a |
| // CertificateList. |
| CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir, |
| const std::string& cert_file, |
| int format); |
| |
| // Imports all the certificates given a list of filenames, and assigns the |
| // result to |*certs|. The filenames are relative to the test certificates |
| // directory. |
| ::testing::AssertionResult LoadCertificateFiles( |
| const std::vector<std::string>& cert_filenames, |
| CertificateList* certs); |
| |
| // Imports all of the certificates in |cert_file|, a file in |certs_dir|, into |
| // a new X509Certificate. The first certificate in the chain will be used for |
| // the returned cert, with any additional certificates configured as |
| // intermediate certificates. |
| scoped_refptr<X509Certificate> CreateCertificateChainFromFile( |
| const base::FilePath& certs_dir, |
| const std::string& cert_file, |
| int format); |
| |
| // Imports a single certificate from |cert_file|. |
| // |certs_dir| represents the test certificates directory. |cert_file| is the |
| // name of the certificate file. If cert_file contains multiple certificates, |
| // the first certificate found will be returned. |
| scoped_refptr<X509Certificate> ImportCertFromFile(const base::FilePath& certs_dir, |
| const std::string& cert_file); |
| |
| // ScopedTestEVPolicy causes certificates marked with |policy|, issued from a |
| // root with the given fingerprint, to be treated as EV. |policy| is expressed |
| // as a string of dotted numbers: i.e. "1.2.3.4". |
| // This should only be used in unittests as adding a CA twice causes a CHECK |
| // failure. |
| class ScopedTestEVPolicy { |
| public: |
| ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, |
| const SHA256HashValue& fingerprint, |
| const char* policy); |
| ~ScopedTestEVPolicy(); |
| |
| private: |
| SHA256HashValue fingerprint_; |
| EVRootCAMetadata* const ev_root_ca_metadata_; |
| }; |
| |
| } // namespace net |
| |
| #endif // NET_TEST_CERT_TEST_UTIL_H_ |