blob: 6334dd7edd8e170fef9b9ce92b8447a3c4437f93 [file] [log] [blame]
[email protected]e54d0af2012-03-03 01:07:151// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]c81d9dcc2010-03-17 00:51:442// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]6e7845ae2013-03-29 21:48:115#ifndef NET_TEST_CERT_TEST_UTIL_H_
6#define NET_TEST_CERT_TEST_UTIL_H_
[email protected]c81d9dcc2010-03-17 00:51:447
[email protected]32765f82010-12-16 00:01:378#include <string>
9
[email protected]3b63f8f42011-03-28 01:54:1510#include "base/memory/ref_counted.h"
[email protected]6e7845ae2013-03-29 21:48:1111#include "net/cert/x509_cert_types.h"
12#include "net/cert/x509_certificate.h"
[email protected]c81d9dcc2010-03-17 00:51:4413
[email protected]83e1ae32014-07-18 10:57:0714#if defined(USE_NSS)
15#include "base/memory/scoped_ptr.h"
16
17// From <pk11pub.h>
18typedef struct PK11SlotInfoStr PK11SlotInfo;
19#endif
20
[email protected]a3ef4832013-02-02 05:12:3321namespace base {
[email protected]864b1362010-08-19 03:49:3822class FilePath;
[email protected]a3ef4832013-02-02 05:12:3323}
[email protected]864b1362010-08-19 03:49:3824
[email protected]83e1ae32014-07-18 10:57:0725namespace crypto {
26class RSAPrivateKey;
27}
28
[email protected]c81d9dcc2010-03-17 00:51:4429namespace net {
30
[email protected]7d015e42012-03-14 16:15:1231class EVRootCAMetadata;
32
[email protected]83e1ae32014-07-18 10:57:0733#if defined(USE_NSS)
34// Imports a private key from file |key_filename| in |dir|. The file must
35// contain a PKCS#8 PrivateKeyInfo in DER encoding. The key is imported to
36// |slot|.
37scoped_ptr<crypto::RSAPrivateKey> ImportSensitiveKeyFromFile(
38 const base::FilePath& dir,
39 const std::string& key_filename,
40 PK11SlotInfo* slot);
[email protected]cc9b29fb2014-08-02 11:52:2641
42bool ImportClientCertToSlot(const scoped_refptr<X509Certificate>& cert,
43 PK11SlotInfo* slot);
44
45scoped_refptr<X509Certificate> ImportClientCertAndKeyFromFile(
46 const base::FilePath& dir,
47 const std::string& cert_filename,
48 const std::string& key_filename,
49 PK11SlotInfo* slot);
[email protected]83e1ae32014-07-18 10:57:0750#endif
51
52// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into a
53// CertificateList.
[email protected]a3ef4832013-02-02 05:12:3354CertificateList CreateCertificateListFromFile(const base::FilePath& certs_dir,
[email protected]e54d0af2012-03-03 01:07:1555 const std::string& cert_file,
56 int format);
57
[email protected]1f11d6f2013-11-24 22:33:0058// Imports all of the certificates in |cert_file|, a file in |certs_dir|, into
59// a new X509Certificate. The first certificate in the chain will be used for
60// the returned cert, with any additional certificates configured as
61// intermediate certificates.
62scoped_refptr<X509Certificate> CreateCertificateChainFromFile(
63 const base::FilePath& certs_dir,
64 const std::string& cert_file,
65 int format);
66
67// Imports a single certificate from |cert_file|.
[email protected]42fdb452012-11-01 12:44:4068// |certs_dir| represents the test certificates directory. |cert_file| is the
[email protected]32765f82010-12-16 00:01:3769// name of the certificate file. If cert_file contains multiple certificates,
70// the first certificate found will be returned.
[email protected]a3ef4832013-02-02 05:12:3371scoped_refptr<X509Certificate> ImportCertFromFile(const base::FilePath& certs_dir,
[email protected]32765f82010-12-16 00:01:3772 const std::string& cert_file);
[email protected]c81d9dcc2010-03-17 00:51:4473
[email protected]7d015e42012-03-14 16:15:1274// ScopedTestEVPolicy causes certificates marked with |policy|, issued from a
75// root with the given fingerprint, to be treated as EV. |policy| is expressed
76// as a string of dotted numbers: i.e. "1.2.3.4".
77// This should only be used in unittests as adding a CA twice causes a CHECK
78// failure.
79class ScopedTestEVPolicy {
80 public:
81 ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata,
[email protected]ede03212012-09-07 12:52:2682 const SHA1HashValue& fingerprint,
[email protected]7d015e42012-03-14 16:15:1283 const char* policy);
84 ~ScopedTestEVPolicy();
85
86 private:
[email protected]ede03212012-09-07 12:52:2687 SHA1HashValue fingerprint_;
[email protected]7d015e42012-03-14 16:15:1288 EVRootCAMetadata* const ev_root_ca_metadata_;
89};
90
[email protected]c81d9dcc2010-03-17 00:51:4491} // namespace net
92
[email protected]6e7845ae2013-03-29 21:48:1193#endif // NET_TEST_CERT_TEST_UTIL_H_