123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134 |
- // Copyright (c) 2012 The Chromium Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style license that can be
- // found in the LICENSE file.
- #ifndef NET_TEST_CERT_TEST_UTIL_H_
- #define NET_TEST_CERT_TEST_UTIL_H_
- #include <string>
- #include <vector>
- #include "base/memory/raw_ptr.h"
- #include "base/memory/ref_counted.h"
- #include "base/strings/string_piece.h"
- #include "crypto/crypto_buildflags.h"
- #include "net/base/hash_value.h"
- #include "net/cert/x509_certificate.h"
- #include "testing/gtest/include/gtest/gtest.h"
- #if BUILDFLAG(USE_NSS_CERTS)
- #include "net/cert/scoped_nss_types.h"
- // From <pk11pub.h>
- typedef struct PK11SlotInfoStr PK11SlotInfo;
- #include "net/cert/scoped_nss_types.h"
- #endif
- namespace base {
- class FilePath;
- }
- namespace net {
- class EVRootCAMetadata;
- #if BUILDFLAG(USE_NSS_CERTS)
- // Imports a private key from file |key_filename| in |dir| into |slot|. The file
- // must contain a PKCS#8 PrivateKeyInfo in DER encoding. Returns true on success
- // and false on failure.
- bool ImportSensitiveKeyFromFile(const base::FilePath& dir,
- base::StringPiece key_filename,
- PK11SlotInfo* slot);
- bool ImportClientCertToSlot(CERTCertificate* cert, PK11SlotInfo* slot);
- ScopedCERTCertificate ImportClientCertToSlot(
- const scoped_refptr<X509Certificate>& cert,
- PK11SlotInfo* slot);
- scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
- const base::FilePath& dir,
- base::StringPiece cert_filename,
- base::StringPiece key_filename,
- PK11SlotInfo* slot,
- ScopedCERTCertificate* nss_cert);
- scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
- const base::FilePath& dir,
- base::StringPiece cert_filename,
- base::StringPiece key_filename,
- PK11SlotInfo* slot);
- ScopedCERTCertificate ImportCERTCertificateFromFile(
- const base::FilePath& certs_dir,
- base::StringPiece cert_file);
- ScopedCERTCertificateList CreateCERTCertificateListFromFile(
- const base::FilePath& certs_dir,
- base::StringPiece cert_file,
- int format);
- #endif
- // Imports all of the certificates in |cert_file|, a file in |certs_dir|, into a
- // CertificateList.
- CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir,
- base::StringPiece cert_file,
- int format);
- // Imports all the certificates given a list of filenames, and assigns the
- // result to |*certs|. The filenames are relative to the test certificates
- // directory.
- ::testing::AssertionResult LoadCertificateFiles(
- const std::vector<std::string>& cert_filenames,
- CertificateList* certs);
- // Imports all of the certificates in |cert_file|, a file in |certs_dir|, into
- // a new X509Certificate. The first certificate in the chain will be used for
- // the returned cert, with any additional certificates configured as
- // intermediate certificates.
- scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
- const base::FilePath& certs_dir,
- base::StringPiece cert_file,
- int format);
- // Imports a single certificate from |cert_path|.
- // If the file contains multiple certificates, the first certificate found
- // will be returned.
- scoped_refptr<X509Certificate> ImportCertFromFile(
- const base::FilePath& cert_path);
- // Imports a single certificate from |cert_file|.
- // |certs_dir| represents the test certificates directory. |cert_file| is the
- // name of the certificate file. If cert_file contains multiple certificates,
- // the first certificate found will be returned.
- scoped_refptr<X509Certificate> ImportCertFromFile(
- const base::FilePath& certs_dir,
- base::StringPiece cert_file);
- // Imports a private key from |key_path|, which should be a PEM file containing
- // a PRIVATE KEY block. Only the first private key found will be returned, if
- // the file contains multiple private keys or other PEM blocks, they will be
- // ignored.
- bssl::UniquePtr<EVP_PKEY> LoadPrivateKeyFromFile(
- const base::FilePath& key_path);
- // ScopedTestEVPolicy causes certificates marked with |policy|, issued from a
- // root with the given fingerprint, to be treated as EV. |policy| is expressed
- // as a string of dotted numbers: i.e. "1.2.3.4".
- // This should only be used in unittests as adding a CA twice causes a CHECK
- // failure.
- class ScopedTestEVPolicy {
- public:
- ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
- const SHA256HashValue& fingerprint,
- const char* policy);
- ~ScopedTestEVPolicy();
- private:
- SHA256HashValue fingerprint_;
- const raw_ptr<EVRootCAMetadata> ev_root_ca_metadata_;
- };
- } // namespace net
- #endif // NET_TEST_CERT_TEST_UTIL_H_
|