blob: d6870ed6be4e78a72e81e3ea39549ce744c52265 [file] [log] [blame]
[email protected]e54d0af2012-03-03 01:07:151// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]c81d9dcc2010-03-17 00:51:442// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]6e7845ae2013-03-29 21:48:115#ifndef NET_TEST_CERT_TEST_UTIL_H_
6#define NET_TEST_CERT_TEST_UTIL_H_
[email protected]c81d9dcc2010-03-17 00:51:447
[email protected]32765f82010-12-16 00:01:378#include <string>
9
[email protected]3b63f8f42011-03-28 01:54:1510#include "base/memory/ref_counted.h"
[email protected]6e7845ae2013-03-29 21:48:1111#include "net/cert/x509_cert_types.h"
12#include "net/cert/x509_certificate.h"
eromance65aff2017-02-04 00:05:3213#include "testing/gtest/include/gtest/gtest.h"
[email protected]c81d9dcc2010-03-17 00:51:4414
davidben71f35ff2015-04-17 20:54:4815#if defined(USE_NSS_CERTS)
Matt Mueller381b1772017-08-18 06:22:5816#include "net/cert/scoped_nss_types.h"
17
[email protected]83e1ae32014-07-18 10:57:0718// From <pk11pub.h>
19typedef struct PK11SlotInfoStr PK11SlotInfo;
Matt Mueller947a0b82017-08-18 01:43:1620
21#include "net/cert/scoped_nss_types.h"
[email protected]83e1ae32014-07-18 10:57:0722#endif
23
[email protected]a3ef4832013-02-02 05:12:3324namespace base {
[email protected]864b1362010-08-19 03:49:3825class FilePath;
[email protected]a3ef4832013-02-02 05:12:3326}
[email protected]864b1362010-08-19 03:49:3827
[email protected]c81d9dcc2010-03-17 00:51:4428namespace net {
29
[email protected]7d015e42012-03-14 16:15:1230class EVRootCAMetadata;
31
davidben71f35ff2015-04-17 20:54:4832#if defined(USE_NSS_CERTS)
davidben85bad9e2015-05-11 20:20:1033// Imports a private key from file |key_filename| in |dir| into |slot|. The file
34// must contain a PKCS#8 PrivateKeyInfo in DER encoding. Returns true on success
35// and false on failure.
36bool ImportSensitiveKeyFromFile(const base::FilePath& dir,
37 const std::string& key_filename,
38 PK11SlotInfo* slot);
[email protected]cc9b29fb2014-08-02 11:52:2639
Matt Mueller6c8b07c62017-10-09 21:02:2540bool ImportClientCertToSlot(CERTCertificate* cert, PK11SlotInfo* slot);
41
Matt Mueller947a0b82017-08-18 01:43:1642ScopedCERTCertificate ImportClientCertToSlot(
43 const scoped_refptr<X509Certificate>& cert,
44 PK11SlotInfo* slot);
[email protected]cc9b29fb2014-08-02 11:52:2645
46scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
47 const base::FilePath& dir,
48 const std::string& cert_filename,
49 const std::string& key_filename,
Matt Mueller947a0b82017-08-18 01:43:1650 PK11SlotInfo* slot,
51 ScopedCERTCertificate* nss_cert);
52scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
53 const base::FilePath& dir,
54 const std::string& cert_filename,
55 const std::string& key_filename,
[email protected]cc9b29fb2014-08-02 11:52:2656 PK11SlotInfo* slot);
Matt Mueller381b1772017-08-18 06:22:5857
58ScopedCERTCertificate ImportCERTCertificateFromFile(
59 const base::FilePath& certs_dir,
60 const std::string& cert_file);
61
62ScopedCERTCertificateList CreateCERTCertificateListFromFile(
63 const base::FilePath& certs_dir,
64 const std::string& cert_file,
65 int format);
[email protected]83e1ae32014-07-18 10:57:0766#endif
67
68// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into a
69// CertificateList.
[email protected]a3ef4832013-02-02 05:12:3370CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir,
[email protected]e54d0af2012-03-03 01:07:1571 const std::string& cert_file,
72 int format);
73
eromance65aff2017-02-04 00:05:3274// Imports all the certificates given a list of filenames, and assigns the
75// result to |*certs|. The filenames are relative to the test certificates
76// directory.
77::testing::AssertionResult LoadCertificateFiles(
78 const std::vector<std::string>& cert_filenames,
79 CertificateList* certs);
80
[email protected]1f11d6f2013-11-24 22:33:0081// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into
82// a new X509Certificate. The first certificate in the chain will be used for
83// the returned cert, with any additional certificates configured as
84// intermediate certificates.
85scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
86 const base::FilePath& certs_dir,
87 const std::string& cert_file,
88 int format);
89
90// Imports a single certificate from |cert_file|.
[email protected]42fdb452012-11-01 12:44:4091// |certs_dir| represents the test certificates directory. |cert_file| is the
[email protected]32765f82010-12-16 00:01:3792// name of the certificate file. If cert_file contains multiple certificates,
93// the first certificate found will be returned.
[email protected]a3ef4832013-02-02 05:12:3394scoped_refptr<X509Certificate> ImportCertFromFile(const base::FilePath& certs_dir,
[email protected]32765f82010-12-16 00:01:3795 const std::string& cert_file);
[email protected]c81d9dcc2010-03-17 00:51:4496
[email protected]7d015e42012-03-14 16:15:1297// ScopedTestEVPolicy causes certificates marked with |policy|, issued from a
98// root with the given fingerprint, to be treated as EV. |policy| is expressed
99// as a string of dotted numbers: i.e. "1.2.3.4".
100// This should only be used in unittests as adding a CA twice causes a CHECK
101// failure.
102class ScopedTestEVPolicy {
103 public:
104 ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
David Benjamin9cedc3a52017-08-20 21:30:58105 const SHA256HashValue& fingerprint,
[email protected]7d015e42012-03-14 16:15:12106 const char* policy);
107 ~ScopedTestEVPolicy();
108
109 private:
David Benjamin9cedc3a52017-08-20 21:30:58110 SHA256HashValue fingerprint_;
[email protected]7d015e42012-03-14 16:15:12111 EVRootCAMetadata* const ev_root_ca_metadata_;
112};
113
[email protected]c81d9dcc2010-03-17 00:51:44114} // namespace net
115
[email protected]6e7845ae2013-03-29 21:48:11116#endif // NET_TEST_CERT_TEST_UTIL_H_