// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/test/cert_test_util.h" #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/threading/thread_restrictions.h" #include "net/cert/ev_root_ca_metadata.h" #include "net/cert/pem.h" #include "net/cert/x509_certificate.h" #include "net/cert/x509_util.h" #include "net/test/test_data_directory.h" #include "third_party/boringssl/src/include/openssl/bytestring.h" #include "third_party/boringssl/src/include/openssl/evp.h" namespace net { CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir, base::StringPiece cert_file, int format) { base::FilePath cert_path = certs_dir.AppendASCII(cert_file); std::string cert_data; if (!base::ReadFileToString(cert_path, &cert_data)) return CertificateList(); return X509Certificate::CreateCertificateListFromBytes( base::as_bytes(base::make_span(cert_data)), format); } ::testing::AssertionResult LoadCertificateFiles( const std::vector& cert_filenames, CertificateList* certs) { certs->clear(); for (const std::string& filename : cert_filenames) { scoped_refptr cert = CreateCertificateChainFromFile( GetTestCertsDirectory(), filename, X509Certificate::FORMAT_AUTO); if (!cert) return ::testing::AssertionFailure() << "Failed loading certificate from file: " << filename << " (in directory: " << GetTestCertsDirectory().value() << ")"; certs->push_back(cert); } return ::testing::AssertionSuccess(); } scoped_refptr CreateCertificateChainFromFile( const base::FilePath& certs_dir, base::StringPiece cert_file, int format) { CertificateList certs = CreateCertificateListFromFile( certs_dir, cert_file, format); if (certs.empty()) return nullptr; std::vector> intermediates; for (size_t i = 1; i < certs.size(); ++i) intermediates.push_back(bssl::UpRef(certs[i]->cert_buffer())); scoped_refptr result(X509Certificate::CreateFromBuffer( bssl::UpRef(certs[0]->cert_buffer()), std::move(intermediates))); return result; } scoped_refptr ImportCertFromFile( const base::FilePath& cert_path) { base::ScopedAllowBlockingForTesting allow_blocking; std::string cert_data; if (!base::ReadFileToString(cert_path, &cert_data)) return nullptr; CertificateList certs_in_file = X509Certificate::CreateCertificateListFromBytes( base::as_bytes(base::make_span(cert_data)), X509Certificate::FORMAT_AUTO); if (certs_in_file.empty()) return nullptr; return certs_in_file[0]; } scoped_refptr ImportCertFromFile( const base::FilePath& certs_dir, base::StringPiece cert_file) { return ImportCertFromFile(certs_dir.AppendASCII(cert_file)); } bssl::UniquePtr LoadPrivateKeyFromFile( const base::FilePath& key_path) { std::string key_string; if (!base::ReadFileToString(key_path, &key_string)) return nullptr; std::vector headers; headers.push_back("PRIVATE KEY"); PEMTokenizer pem_tokenizer(key_string, headers); if (!pem_tokenizer.GetNext()) return nullptr; CBS cbs; CBS_init(&cbs, reinterpret_cast(pem_tokenizer.data().data()), pem_tokenizer.data().size()); return bssl::UniquePtr(EVP_parse_private_key(&cbs)); } ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, const SHA256HashValue& fingerprint, const char* policy) : fingerprint_(fingerprint), ev_root_ca_metadata_(ev_root_ca_metadata) { EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy)); } ScopedTestEVPolicy::~ScopedTestEVPolicy() { EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_)); } } // namespace net