|  | // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style license that can be | 
|  | // found in the LICENSE file. | 
|  |  | 
|  | #ifndef NET_CERT_TEST_ROOT_CERTS_H_ | 
|  | #define NET_CERT_TEST_ROOT_CERTS_H_ | 
|  |  | 
|  | #include "base/lazy_instance.h" | 
|  | #include "base/macros.h" | 
|  | #include "base/memory/ref_counted.h" | 
|  | #include "build/build_config.h" | 
|  | #include "net/base/net_export.h" | 
|  |  | 
|  | #if defined(USE_NSS_CERTS) || defined(OS_IOS) | 
|  | #include <list> | 
|  | #elif defined(USE_OPENSSL_CERTS) && !defined(OS_ANDROID) | 
|  | #include <vector> | 
|  | #elif defined(OS_WIN) | 
|  | #include <windows.h> | 
|  | #include "crypto/wincrypt_shim.h" | 
|  | #elif defined(OS_MACOSX) | 
|  | #include <CoreFoundation/CFArray.h> | 
|  | #include <Security/SecTrust.h> | 
|  | #include "base/mac/scoped_cftyperef.h" | 
|  | #endif | 
|  |  | 
|  | #if defined(USE_NSS_CERTS) | 
|  | typedef struct CERTCertificateStr CERTCertificate; | 
|  | #elif defined(USE_OPENSSL_CERTS) && !defined(OS_ANDROID) | 
|  | typedef struct x509_st X509; | 
|  | #endif | 
|  |  | 
|  | namespace base { | 
|  | class FilePath; | 
|  | } | 
|  |  | 
|  | namespace net { | 
|  |  | 
|  | class X509Certificate; | 
|  |  | 
|  | // TestRootCerts is a helper class for unit tests that is used to | 
|  | // artificially mark a certificate as trusted, independent of the local | 
|  | // machine configuration. | 
|  | class NET_EXPORT TestRootCerts { | 
|  | public: | 
|  | // Obtains the Singleton instance to the trusted certificates. | 
|  | static TestRootCerts* GetInstance(); | 
|  |  | 
|  | // Returns true if an instance exists, without forcing an initialization. | 
|  | static bool HasInstance(); | 
|  |  | 
|  | // Marks |certificate| as trusted for X509Certificate::Verify(). Returns | 
|  | // false if the certificate could not be marked trusted. | 
|  | bool Add(X509Certificate* certificate); | 
|  |  | 
|  | // Reads a single certificate from |file| and marks it as trusted. Returns | 
|  | // false if an error is encountered, such as being unable to read |file| | 
|  | // or more than one certificate existing in |file|. | 
|  | bool AddFromFile(const base::FilePath& file); | 
|  |  | 
|  | // Clears the trusted status of any certificates that were previously | 
|  | // marked trusted via Add(). | 
|  | void Clear(); | 
|  |  | 
|  | // Returns true if there are no certificates that have been marked trusted. | 
|  | bool IsEmpty() const; | 
|  |  | 
|  | #if defined(USE_NSS_CERTS) | 
|  | bool Contains(CERTCertificate* cert) const; | 
|  | #elif defined(OS_MACOSX) && !defined(OS_IOS) | 
|  | CFArrayRef temporary_roots() const { return temporary_roots_; } | 
|  |  | 
|  | // Modifies the root certificates of |trust_ref| to include the | 
|  | // certificates stored in |temporary_roots_|. If IsEmpty() is true, this | 
|  | // does not modify |trust_ref|. | 
|  | OSStatus FixupSecTrustRef(SecTrustRef trust_ref) const; | 
|  |  | 
|  | // Configures whether or not the default/system root store should also | 
|  | // be trusted. By default, this is true, indicating that the TestRootCerts | 
|  | // are used in addition to OS trust store. | 
|  | void SetAllowSystemTrust(bool allow_system_trust); | 
|  | #elif defined(USE_OPENSSL_CERTS) && !defined(OS_ANDROID) | 
|  | const std::vector<scoped_refptr<X509Certificate> >& | 
|  | temporary_roots() const { return temporary_roots_; } | 
|  | bool Contains(X509* cert) const; | 
|  | #elif defined(OS_WIN) | 
|  | HCERTSTORE temporary_roots() const { return temporary_roots_; } | 
|  |  | 
|  | // Returns an HCERTCHAINENGINE suitable to be used for certificate | 
|  | // validation routines, or NULL to indicate that the default system chain | 
|  | // engine is appropriate. The caller is responsible for freeing the | 
|  | // returned HCERTCHAINENGINE. | 
|  | HCERTCHAINENGINE GetChainEngine() const; | 
|  | #endif | 
|  |  | 
|  | private: | 
|  | friend struct base::DefaultLazyInstanceTraits<TestRootCerts>; | 
|  |  | 
|  | TestRootCerts(); | 
|  | ~TestRootCerts(); | 
|  |  | 
|  | // Performs platform-dependent initialization. | 
|  | void Init(); | 
|  |  | 
|  | #if defined(USE_NSS_CERTS) || defined(OS_IOS) | 
|  | // It is necessary to maintain a cache of the original certificate trust | 
|  | // settings, in order to restore them when Clear() is called. | 
|  | class TrustEntry; | 
|  | std::list<TrustEntry*> trust_cache_; | 
|  | #elif defined(USE_OPENSSL_CERTS) && !defined(OS_ANDROID) | 
|  | std::vector<scoped_refptr<X509Certificate> > temporary_roots_; | 
|  | #elif defined(OS_WIN) | 
|  | HCERTSTORE temporary_roots_; | 
|  | #elif defined(OS_MACOSX) | 
|  | base::ScopedCFTypeRef<CFMutableArrayRef> temporary_roots_; | 
|  | bool allow_system_trust_; | 
|  | #endif | 
|  |  | 
|  | #if defined(OS_WIN) || defined(OS_ANDROID) | 
|  | // True if there are no temporarily trusted root certificates. | 
|  | bool empty_; | 
|  | #endif | 
|  |  | 
|  | DISALLOW_COPY_AND_ASSIGN(TestRootCerts); | 
|  | }; | 
|  |  | 
|  | // Scoped helper for unittests to handle safely managing trusted roots. | 
|  | class NET_EXPORT_PRIVATE ScopedTestRoot { | 
|  | public: | 
|  | ScopedTestRoot(); | 
|  | // Creates a ScopedTestRoot that will adds|cert| to the TestRootCerts store. | 
|  | explicit ScopedTestRoot(X509Certificate* cert); | 
|  | ~ScopedTestRoot(); | 
|  |  | 
|  | // Assigns |cert| to be the new test root cert. If |cert| is NULL, undoes | 
|  | // any work the ScopedTestRoot may have previously done. | 
|  | // If |cert_| contains a certificate (due to a prior call to Reset or due to | 
|  | // a cert being passed at construction), the existing TestRootCerts store is | 
|  | // cleared. | 
|  | void Reset(X509Certificate* cert); | 
|  |  | 
|  | private: | 
|  | scoped_refptr<X509Certificate> cert_; | 
|  |  | 
|  | DISALLOW_COPY_AND_ASSIGN(ScopedTestRoot); | 
|  | }; | 
|  |  | 
|  | }  // namespace net | 
|  |  | 
|  | #endif  // NET_CERT_TEST_ROOT_CERTS_H_ |