| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/test/cert_test_util.h" | 5 #include "net/test/cert_test_util.h" |
| 6 | 6 |
| 7 #include "base/file_util.h" | 7 #include "base/file_util.h" |
| 8 #include "base/files/file_path.h" | 8 #include "base/files/file_path.h" |
| 9 #include "base/path_service.h" | 9 #include "base/path_service.h" |
| 10 #include "net/cert/ev_root_ca_metadata.h" | 10 #include "net/cert/ev_root_ca_metadata.h" |
| 11 #include "net/cert/x509_certificate.h" | 11 #include "net/cert/x509_certificate.h" |
| 12 #include "testing/gtest/include/gtest/gtest.h" | 12 #include "testing/gtest/include/gtest/gtest.h" |
| 13 | 13 |
| 14 namespace net { | 14 namespace net { |
| 15 | 15 |
| 16 CertificateList CreateCertificateListFromFile( | 16 CertificateList CreateCertificateListFromFile( |
| 17 const base::FilePath& certs_dir, | 17 const base::FilePath& certs_dir, |
| 18 const std::string& cert_file, | 18 const std::string& cert_file, |
| 19 int format) { | 19 int format) { |
| 20 base::FilePath cert_path = certs_dir.AppendASCII(cert_file); | 20 base::FilePath cert_path = certs_dir.AppendASCII(cert_file); |
| 21 std::string cert_data; | 21 std::string cert_data; |
| 22 if (!base::ReadFileToString(cert_path, &cert_data)) | 22 if (!base::ReadFileToString(cert_path, &cert_data)) |
| 23 return CertificateList(); | 23 return CertificateList(); |
| 24 return X509Certificate::CreateCertificateListFromBytes(cert_data.data(), | 24 return X509Certificate::CreateCertificateListFromBytes(cert_data.data(), |
| 25 cert_data.size(), | 25 cert_data.size(), |
| 26 format); | 26 format); |
| 27 } | 27 } |
| 28 | 28 |
| 29 scoped_refptr<X509Certificate> CreateCertificateChainFromFile( |
| 30 const base::FilePath& certs_dir, |
| 31 const std::string& cert_file, |
| 32 int format) { |
| 33 CertificateList certs = CreateCertificateListFromFile( |
| 34 certs_dir, cert_file, format); |
| 35 if (certs.empty()) |
| 36 return NULL; |
| 37 |
| 38 X509Certificate::OSCertHandles intermediates; |
| 39 for (size_t i = 1; i < certs.size(); ++i) |
| 40 intermediates.push_back(certs[i]->os_cert_handle()); |
| 41 |
| 42 scoped_refptr<X509Certificate> result(X509Certificate::CreateFromHandle( |
| 43 certs[0]->os_cert_handle(), intermediates)); |
| 44 return result; |
| 45 } |
| 46 |
| 29 scoped_refptr<X509Certificate> ImportCertFromFile( | 47 scoped_refptr<X509Certificate> ImportCertFromFile( |
| 30 const base::FilePath& certs_dir, | 48 const base::FilePath& certs_dir, |
| 31 const std::string& cert_file) { | 49 const std::string& cert_file) { |
| 32 base::FilePath cert_path = certs_dir.AppendASCII(cert_file); | 50 base::FilePath cert_path = certs_dir.AppendASCII(cert_file); |
| 33 std::string cert_data; | 51 std::string cert_data; |
| 34 if (!base::ReadFileToString(cert_path, &cert_data)) | 52 if (!base::ReadFileToString(cert_path, &cert_data)) |
| 35 return NULL; | 53 return NULL; |
| 36 | 54 |
| 37 CertificateList certs_in_file = | 55 CertificateList certs_in_file = |
| 38 X509Certificate::CreateCertificateListFromBytes( | 56 X509Certificate::CreateCertificateListFromBytes( |
| 39 cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO); | 57 cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO); |
| 40 if (certs_in_file.empty()) | 58 if (certs_in_file.empty()) |
| 41 return NULL; | 59 return NULL; |
| 42 return certs_in_file[0]; | 60 return certs_in_file[0]; |
| 43 } | 61 } |
| 44 | 62 |
| 45 ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, | 63 ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, |
| 46 const SHA1HashValue& fingerprint, | 64 const SHA1HashValue& fingerprint, |
| 47 const char* policy) | 65 const char* policy) |
| 48 : fingerprint_(fingerprint), | 66 : fingerprint_(fingerprint), |
| 49 ev_root_ca_metadata_(ev_root_ca_metadata) { | 67 ev_root_ca_metadata_(ev_root_ca_metadata) { |
| 50 EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy)); | 68 EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy)); |
| 51 } | 69 } |
| 52 | 70 |
| 53 ScopedTestEVPolicy::~ScopedTestEVPolicy() { | 71 ScopedTestEVPolicy::~ScopedTestEVPolicy() { |
| 54 EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_)); | 72 EXPECT_TRUE(ev_root_ca_metadata_->RemoveEVCA(fingerprint_)); |
| 55 } | 73 } |
| 56 | 74 |
| 57 } // namespace net | 75 } // namespace net |
| OLD | NEW |