// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/test/cert_test_util.h" #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/threading/thread_restrictions.h" #include "net/cert/ev_root_ca_metadata.h" #include "net/cert/x509_certificate.h" #include "net/cert/x509_util.h" #include "net/test/test_data_directory.h" namespace net { CertificateList CreateCertificateListFromFile( const base::FilePath& certs_dir, const std::string& cert_file, int format) { base::FilePath cert_path = certs_dir.AppendASCII(cert_file); std::string cert_data; if (!base::ReadFileToString(cert_path, &cert_data)) return CertificateList(); return X509Certificate::CreateCertificateListFromBytes(cert_data.data(), cert_data.size(), format); } ::testing::AssertionResult LoadCertificateFiles( const std::vector& cert_filenames, CertificateList* certs) { certs->clear(); for (const std::string& filename : cert_filenames) { scoped_refptr cert = CreateCertificateChainFromFile( GetTestCertsDirectory(), filename, X509Certificate::FORMAT_AUTO); if (!cert) return ::testing::AssertionFailure() << "Failed loading certificate from file: " << filename << " (in directory: " << GetTestCertsDirectory().value() << ")"; certs->push_back(cert); } return ::testing::AssertionSuccess(); } scoped_refptr CreateCertificateChainFromFile( const base::FilePath& certs_dir, const std::string& cert_file, int format) { CertificateList certs = CreateCertificateListFromFile( certs_dir, cert_file, format); if (certs.empty()) return NULL; std::vector> intermediates; for (size_t i = 1; i < certs.size(); ++i) intermediates.push_back(bssl::UpRef(certs[i]->cert_buffer())); scoped_refptr result(X509Certificate::CreateFromBuffer( bssl::UpRef(certs[0]->cert_buffer()), std::move(intermediates))); return result; } scoped_refptr ImportCertFromFile( const base::FilePath& certs_dir, const std::string& cert_file) { base::ScopedAllowBlockingForTesting allow_blocking; base::FilePath cert_path = certs_dir.AppendASCII(cert_file); std::string cert_data; if (!base::ReadFileToString(cert_path, &cert_data)) return NULL; CertificateList certs_in_file = X509Certificate::CreateCertificateListFromBytes( cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO); if (certs_in_file.empty()) return NULL; return certs_in_file[0]; } ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, const SHA256HashValue& fingerprint, const char* policy) : fingerprint_(fingerprint), ev_root_ca_metadata_(ev_root_ca_metadata) { EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy)); } ScopedTestEVPolicy::~ScopedTestEVPolicy() { EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_)); } } // namespace net