blob: 36ec19e381bc5d6357a964bded32fe8140c3744f [file] [log] [blame]
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/test/cert_test_util.h"
#include "base/files/file_path.h"
#include "base/files/file_util.h"
#include "base/threading/thread_restrictions.h"
#include "net/cert/ev_root_ca_metadata.h"
#include "net/cert/pem.h"
#include "net/cert/x509_certificate.h"
#include "net/cert/x509_util.h"
#include "net/test/test_data_directory.h"
#include "third_party/boringssl/src/include/openssl/bytestring.h"
#include "third_party/boringssl/src/include/openssl/evp.h"
namespace net {
CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir,
base::StringPiece cert_file,
int format) {
base::FilePath cert_path = certs_dir.AppendASCII(cert_file);
std::string cert_data;
if (!base::ReadFileToString(cert_path, &cert_data))
return CertificateList();
return X509Certificate::CreateCertificateListFromBytes(
base::as_bytes(base::make_span(cert_data)), format);
}
::testing::AssertionResult LoadCertificateFiles(
const std::vector<std::string>& cert_filenames,
CertificateList* certs) {
certs->clear();
for (const std::string& filename : cert_filenames) {
scoped_refptr<X509Certificate> cert = CreateCertificateChainFromFile(
GetTestCertsDirectory(), filename, X509Certificate::FORMAT_AUTO);
if (!cert)
return ::testing::AssertionFailure()
<< "Failed loading certificate from file: " << filename
<< " (in directory: " << GetTestCertsDirectory().value() << ")";
certs->push_back(cert);
}
return ::testing::AssertionSuccess();
}
scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
const base::FilePath& certs_dir,
base::StringPiece cert_file,
int format) {
CertificateList certs = CreateCertificateListFromFile(
certs_dir, cert_file, format);
if (certs.empty())
return nullptr;
std::vector<bssl::UniquePtr<CRYPTO_BUFFER>> intermediates;
for (size_t i = 1; i < certs.size(); ++i)
intermediates.push_back(bssl::UpRef(certs[i]->cert_buffer()));
scoped_refptr<X509Certificate> result(X509Certificate::CreateFromBuffer(
bssl::UpRef(certs[0]->cert_buffer()), std::move(intermediates)));
return result;
}
scoped_refptr<X509Certificate> ImportCertFromFile(
const base::FilePath& cert_path) {
base::ScopedAllowBlockingForTesting allow_blocking;
std::string cert_data;
if (!base::ReadFileToString(cert_path, &cert_data))
return nullptr;
CertificateList certs_in_file =
X509Certificate::CreateCertificateListFromBytes(
base::as_bytes(base::make_span(cert_data)),
X509Certificate::FORMAT_AUTO);
if (certs_in_file.empty())
return nullptr;
return certs_in_file[0];
}
scoped_refptr<X509Certificate> ImportCertFromFile(
const base::FilePath& certs_dir,
base::StringPiece cert_file) {
return ImportCertFromFile(certs_dir.AppendASCII(cert_file));
}
ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
const SHA256HashValue& fingerprint,
const char* policy)
: fingerprint_(fingerprint), ev_root_ca_metadata_(ev_root_ca_metadata) {
EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy));
}
ScopedTestEVPolicy::~ScopedTestEVPolicy() {
EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_));
}
} // namespace net