blob: 219ccd872572dc3af65daac31edecebdd54f3f09 [file] [log] [blame]
[email protected]e54d0af2012-03-03 01:07:151// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]c81d9dcc2010-03-17 00:51:442// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]6e7845ae2013-03-29 21:48:115#ifndef NET_TEST_CERT_TEST_UTIL_H_
6#define NET_TEST_CERT_TEST_UTIL_H_
[email protected]c81d9dcc2010-03-17 00:51:447
[email protected]32765f82010-12-16 00:01:378#include <string>
9
[email protected]3b63f8f42011-03-28 01:54:1510#include "base/memory/ref_counted.h"
[email protected]6e7845ae2013-03-29 21:48:1111#include "net/cert/x509_cert_types.h"
12#include "net/cert/x509_certificate.h"
[email protected]c81d9dcc2010-03-17 00:51:4413
davidben71f35ff2015-04-17 20:54:4814#if defined(USE_NSS_CERTS)
[email protected]83e1ae32014-07-18 10:57:0715// From <pk11pub.h>
16typedef struct PK11SlotInfoStr PK11SlotInfo;
17#endif
18
[email protected]a3ef4832013-02-02 05:12:3319namespace base {
[email protected]864b1362010-08-19 03:49:3820class FilePath;
[email protected]a3ef4832013-02-02 05:12:3321}
[email protected]864b1362010-08-19 03:49:3822
[email protected]83e1ae32014-07-18 10:57:0723namespace crypto {
24class RSAPrivateKey;
25}
26
[email protected]c81d9dcc2010-03-17 00:51:4427namespace net {
28
[email protected]7d015e42012-03-14 16:15:1229class EVRootCAMetadata;
30
davidben71f35ff2015-04-17 20:54:4831#if defined(USE_NSS_CERTS)
davidben85bad9e2015-05-11 20:20:1032// Imports a private key from file |key_filename| in |dir| into |slot|. The file
33// must contain a PKCS#8 PrivateKeyInfo in DER encoding. Returns true on success
34// and false on failure.
35bool ImportSensitiveKeyFromFile(const base::FilePath& dir,
36 const std::string& key_filename,
37 PK11SlotInfo* slot);
[email protected]cc9b29fb2014-08-02 11:52:2638
39bool ImportClientCertToSlot(const scoped_refptr<X509Certificate>& cert,
40 PK11SlotInfo* slot);
41
42scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
43 const base::FilePath& dir,
44 const std::string& cert_filename,
45 const std::string& key_filename,
46 PK11SlotInfo* slot);
[email protected]83e1ae32014-07-18 10:57:0747#endif
48
49// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into a
50// CertificateList.
[email protected]a3ef4832013-02-02 05:12:3351CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir,
[email protected]e54d0af2012-03-03 01:07:1552 const std::string& cert_file,
53 int format);
54
[email protected]1f11d6f2013-11-24 22:33:0055// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into
56// a new X509Certificate. The first certificate in the chain will be used for
57// the returned cert, with any additional certificates configured as
58// intermediate certificates.
59scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
60 const base::FilePath& certs_dir,
61 const std::string& cert_file,
62 int format);
63
64// Imports a single certificate from |cert_file|.
[email protected]42fdb452012-11-01 12:44:4065// |certs_dir| represents the test certificates directory. |cert_file| is the
[email protected]32765f82010-12-16 00:01:3766// name of the certificate file. If cert_file contains multiple certificates,
67// the first certificate found will be returned.
[email protected]a3ef4832013-02-02 05:12:3368scoped_refptr<X509Certificate> ImportCertFromFile(const base::FilePath& certs_dir,
[email protected]32765f82010-12-16 00:01:3769 const std::string& cert_file);
[email protected]c81d9dcc2010-03-17 00:51:4470
[email protected]7d015e42012-03-14 16:15:1271// ScopedTestEVPolicy causes certificates marked with |policy|, issued from a
72// root with the given fingerprint, to be treated as EV. |policy| is expressed
73// as a string of dotted numbers: i.e. "1.2.3.4".
74// This should only be used in unittests as adding a CA twice causes a CHECK
75// failure.
76class ScopedTestEVPolicy {
77 public:
78 ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
[email protected]ede03212012-09-07 12:52:2679 const SHA1HashValue& fingerprint,
[email protected]7d015e42012-03-14 16:15:1280 const char* policy);
81 ~ScopedTestEVPolicy();
82
83 private:
[email protected]ede03212012-09-07 12:52:2684 SHA1HashValue fingerprint_;
[email protected]7d015e42012-03-14 16:15:1285 EVRootCAMetadata* const ev_root_ca_metadata_;
86};
87
[email protected]c81d9dcc2010-03-17 00:51:4488} // namespace net
89
[email protected]6e7845ae2013-03-29 21:48:1190#endif // NET_TEST_CERT_TEST_UTIL_H_