mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-24 22:36:09 +03:00
94 lines
3.3 KiB
C++
94 lines
3.3 KiB
C++
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style license that can be
|
||
|
// found in the LICENSE file.
|
||
|
|
||
|
#include "net/test/cert_test_util.h"
|
||
|
|
||
|
#include "base/files/file_path.h"
|
||
|
#include "base/files/file_util.h"
|
||
|
#include "base/threading/thread_restrictions.h"
|
||
|
#include "net/cert/ev_root_ca_metadata.h"
|
||
|
#include "net/cert/x509_certificate.h"
|
||
|
#include "net/cert/x509_util.h"
|
||
|
#include "net/test/test_data_directory.h"
|
||
|
|
||
|
namespace net {
|
||
|
|
||
|
CertificateList CreateCertificateListFromFile(
|
||
|
const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file,
|
||
|
int format) {
|
||
|
base::FilePath cert_path = certs_dir.AppendASCII(cert_file);
|
||
|
std::string cert_data;
|
||
|
if (!base::ReadFileToString(cert_path, &cert_data))
|
||
|
return CertificateList();
|
||
|
return X509Certificate::CreateCertificateListFromBytes(cert_data.data(),
|
||
|
cert_data.size(),
|
||
|
format);
|
||
|
}
|
||
|
|
||
|
::testing::AssertionResult LoadCertificateFiles(
|
||
|
const std::vector<std::string>& cert_filenames,
|
||
|
CertificateList* certs) {
|
||
|
certs->clear();
|
||
|
for (const std::string& filename : cert_filenames) {
|
||
|
scoped_refptr<X509Certificate> cert = CreateCertificateChainFromFile(
|
||
|
GetTestCertsDirectory(), filename, X509Certificate::FORMAT_AUTO);
|
||
|
if (!cert)
|
||
|
return ::testing::AssertionFailure()
|
||
|
<< "Failed loading certificate from file: " << filename
|
||
|
<< " (in directory: " << GetTestCertsDirectory().value() << ")";
|
||
|
certs->push_back(cert);
|
||
|
}
|
||
|
|
||
|
return ::testing::AssertionSuccess();
|
||
|
}
|
||
|
|
||
|
scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
|
||
|
const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file,
|
||
|
int format) {
|
||
|
CertificateList certs = CreateCertificateListFromFile(
|
||
|
certs_dir, cert_file, format);
|
||
|
if (certs.empty())
|
||
|
return nullptr;
|
||
|
|
||
|
std::vector<bssl::UniquePtr<CRYPTO_BUFFER>> intermediates;
|
||
|
for (size_t i = 1; i < certs.size(); ++i)
|
||
|
intermediates.push_back(bssl::UpRef(certs[i]->cert_buffer()));
|
||
|
|
||
|
scoped_refptr<X509Certificate> result(X509Certificate::CreateFromBuffer(
|
||
|
bssl::UpRef(certs[0]->cert_buffer()), std::move(intermediates)));
|
||
|
return result;
|
||
|
}
|
||
|
|
||
|
scoped_refptr<X509Certificate> ImportCertFromFile(
|
||
|
const base::FilePath& certs_dir,
|
||
|
const std::string& cert_file) {
|
||
|
base::ScopedAllowBlockingForTesting allow_blocking;
|
||
|
base::FilePath cert_path = certs_dir.AppendASCII(cert_file);
|
||
|
std::string cert_data;
|
||
|
if (!base::ReadFileToString(cert_path, &cert_data))
|
||
|
return nullptr;
|
||
|
|
||
|
CertificateList certs_in_file =
|
||
|
X509Certificate::CreateCertificateListFromBytes(
|
||
|
cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO);
|
||
|
if (certs_in_file.empty())
|
||
|
return nullptr;
|
||
|
return certs_in_file[0];
|
||
|
}
|
||
|
|
||
|
ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
|
||
|
const SHA256HashValue& fingerprint,
|
||
|
const char* policy)
|
||
|
: fingerprint_(fingerprint), ev_root_ca_metadata_(ev_root_ca_metadata) {
|
||
|
EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy));
|
||
|
}
|
||
|
|
||
|
ScopedTestEVPolicy::~ScopedTestEVPolicy() {
|
||
|
EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_));
|
||
|
}
|
||
|
|
||
|
} // namespace net
|