mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-28 08:16:09 +03:00
117 lines
4.0 KiB
C
117 lines
4.0 KiB
C
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style license that can be
|
||
|
// found in the LICENSE file.
|
||
|
|
||
|
#ifndef NET_TEST_CERT_TEST_UTIL_H_
|
||
|
#define NET_TEST_CERT_TEST_UTIL_H_
|
||
|
|
||
|
#include <string>
|
||
|
|
||
|
#include "base/memory/ref_counted.h"
|
||
|
#include "net/cert/x509_cert_types.h"
|
||
|
#include "net/cert/x509_certificate.h"
|
||
|
#include "testing/gtest/include/gtest/gtest.h"
|
||
|
|
||
|
#if defined(USE_NSS_CERTS)
|
||
|
#include "net/cert/scoped_nss_types.h"
|
||
|
|
||
|
// From <pk11pub.h>
|
||
|
typedef struct PK11SlotInfoStr PK11SlotInfo;
|
||
|
|
||
|
#include "net/cert/scoped_nss_types.h"
|
||
|
#endif
|
||
|
|
||
|
namespace base {
|
||
|
class FilePath;
|
||
|
}
|
||
|
|
||
|
namespace net {
|
||
|
|
||
|
class EVRootCAMetadata;
|
||
|
|
||
|
#if defined(USE_NSS_CERTS)
|
||
|
// Imports a private key from file |key_filename| in |dir| into |slot|. The file
|
||
|
// must contain a PKCS#8 PrivateKeyInfo in DER encoding. Returns true on success
|
||
|
// and false on failure.
|
||
|
bool ImportSensitiveKeyFromFile(const base::FilePath& dir,
|
||
|
const std::string& key_filename,
|
||
|
PK11SlotInfo* slot);
|
||
|
|
||
|
bool ImportClientCertToSlot(CERTCertificate* cert, PK11SlotInfo* slot);
|
||
|
|
||
|
ScopedCERTCertificate ImportClientCertToSlot(
|
||
|
const scoped_refptr<X509Certificate>& cert,
|
||
|
PK11SlotInfo* slot);
|
||
|
|
||
|
scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
|
||
|
const base::FilePath& dir,
|
||
|
const std::string& cert_filename,
|
||
|
const std::string& key_filename,
|
||
|
PK11SlotInfo* slot,
|
||
|
ScopedCERTCertificate* nss_cert);
|
||
|
scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
|
||
|
const base::FilePath& dir,
|
||
|
const std::string& cert_filename,
|
||
|
const std::string& key_filename,
|
||
|
PK11SlotInfo* slot);
|
||
|
|
||
|
ScopedCERTCertificate ImportCERTCertificateFromFile(
|
||
|
const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file);
|
||
|
|
||
|
ScopedCERTCertificateList CreateCERTCertificateListFromFile(
|
||
|
const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file,
|
||
|
int format);
|
||
|
#endif
|
||
|
|
||
|
// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into a
|
||
|
// CertificateList.
|
||
|
CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file,
|
||
|
int format);
|
||
|
|
||
|
// Imports all the certificates given a list of filenames, and assigns the
|
||
|
// result to |*certs|. The filenames are relative to the test certificates
|
||
|
// directory.
|
||
|
::testing::AssertionResult LoadCertificateFiles(
|
||
|
const std::vector<std::string>& cert_filenames,
|
||
|
CertificateList* certs);
|
||
|
|
||
|
// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into
|
||
|
// a new X509Certificate. The first certificate in the chain will be used for
|
||
|
// the returned cert, with any additional certificates configured as
|
||
|
// intermediate certificates.
|
||
|
scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
|
||
|
const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file,
|
||
|
int format);
|
||
|
|
||
|
// Imports a single certificate from |cert_file|.
|
||
|
// |certs_dir| represents the test certificates directory. |cert_file| is the
|
||
|
// name of the certificate file. If cert_file contains multiple certificates,
|
||
|
// the first certificate found will be returned.
|
||
|
scoped_refptr<X509Certificate> ImportCertFromFile(const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file);
|
||
|
|
||
|
// ScopedTestEVPolicy causes certificates marked with |policy|, issued from a
|
||
|
// root with the given fingerprint, to be treated as EV. |policy| is expressed
|
||
|
// as a string of dotted numbers: i.e. "1.2.3.4".
|
||
|
// This should only be used in unittests as adding a CA twice causes a CHECK
|
||
|
// failure.
|
||
|
class ScopedTestEVPolicy {
|
||
|
public:
|
||
|
ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
|
||
|
const SHA256HashValue& fingerprint,
|
||
|
const char* policy);
|
||
|
~ScopedTestEVPolicy();
|
||
|
|
||
|
private:
|
||
|
SHA256HashValue fingerprint_;
|
||
|
EVRootCAMetadata* const ev_root_ca_metadata_;
|
||
|
};
|
||
|
|
||
|
} // namespace net
|
||
|
|
||
|
#endif // NET_TEST_CERT_TEST_UTIL_H_
|