123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115 |
- // Copyright (c) 2012 The Chromium Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style license that can be
- // found in the LICENSE file.
- #include "net/test/cert_test_util.h"
- #include "base/files/file_path.h"
- #include "base/files/file_util.h"
- #include "base/threading/thread_restrictions.h"
- #include "net/cert/ev_root_ca_metadata.h"
- #include "net/cert/pem.h"
- #include "net/cert/x509_certificate.h"
- #include "net/cert/x509_util.h"
- #include "net/test/test_data_directory.h"
- #include "third_party/boringssl/src/include/openssl/bytestring.h"
- #include "third_party/boringssl/src/include/openssl/evp.h"
- namespace net {
- CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir,
- base::StringPiece cert_file,
- int format) {
- base::FilePath cert_path = certs_dir.AppendASCII(cert_file);
- std::string cert_data;
- if (!base::ReadFileToString(cert_path, &cert_data))
- return CertificateList();
- return X509Certificate::CreateCertificateListFromBytes(
- base::as_bytes(base::make_span(cert_data)), format);
- }
- ::testing::AssertionResult LoadCertificateFiles(
- const std::vector<std::string>& cert_filenames,
- CertificateList* certs) {
- certs->clear();
- for (const std::string& filename : cert_filenames) {
- scoped_refptr<X509Certificate> cert = CreateCertificateChainFromFile(
- GetTestCertsDirectory(), filename, X509Certificate::FORMAT_AUTO);
- if (!cert)
- return ::testing::AssertionFailure()
- << "Failed loading certificate from file: " << filename
- << " (in directory: " << GetTestCertsDirectory().value() << ")";
- certs->push_back(cert);
- }
- return ::testing::AssertionSuccess();
- }
- scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
- const base::FilePath& certs_dir,
- base::StringPiece cert_file,
- int format) {
- CertificateList certs = CreateCertificateListFromFile(
- certs_dir, cert_file, format);
- if (certs.empty())
- return nullptr;
- std::vector<bssl::UniquePtr<CRYPTO_BUFFER>> intermediates;
- for (size_t i = 1; i < certs.size(); ++i)
- intermediates.push_back(bssl::UpRef(certs[i]->cert_buffer()));
- scoped_refptr<X509Certificate> result(X509Certificate::CreateFromBuffer(
- bssl::UpRef(certs[0]->cert_buffer()), std::move(intermediates)));
- return result;
- }
- scoped_refptr<X509Certificate> ImportCertFromFile(
- const base::FilePath& cert_path) {
- base::ScopedAllowBlockingForTesting allow_blocking;
- std::string cert_data;
- if (!base::ReadFileToString(cert_path, &cert_data))
- return nullptr;
- CertificateList certs_in_file =
- X509Certificate::CreateCertificateListFromBytes(
- base::as_bytes(base::make_span(cert_data)),
- X509Certificate::FORMAT_AUTO);
- if (certs_in_file.empty())
- return nullptr;
- return certs_in_file[0];
- }
- scoped_refptr<X509Certificate> ImportCertFromFile(
- const base::FilePath& certs_dir,
- base::StringPiece cert_file) {
- return ImportCertFromFile(certs_dir.AppendASCII(cert_file));
- }
- bssl::UniquePtr<EVP_PKEY> LoadPrivateKeyFromFile(
- const base::FilePath& key_path) {
- std::string key_string;
- if (!base::ReadFileToString(key_path, &key_string))
- return nullptr;
- std::vector<std::string> headers;
- headers.push_back("PRIVATE KEY");
- PEMTokenizer pem_tokenizer(key_string, headers);
- if (!pem_tokenizer.GetNext())
- return nullptr;
- CBS cbs;
- CBS_init(&cbs, reinterpret_cast<const uint8_t*>(pem_tokenizer.data().data()),
- pem_tokenizer.data().size());
- return bssl::UniquePtr<EVP_PKEY>(EVP_parse_private_key(&cbs));
- }
- ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
- const SHA256HashValue& fingerprint,
- const char* policy)
- : fingerprint_(fingerprint), ev_root_ca_metadata_(ev_root_ca_metadata) {
- EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy));
- }
- ScopedTestEVPolicy::~ScopedTestEVPolicy() {
- EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_));
- }
- } // namespace net
|