1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/test/cert_test_util.h"
7 #include "base/files/file_path.h"
8 #include "base/files/file_util.h"
9 #include "base/path_service.h"
10 #include "net/cert/ev_root_ca_metadata.h"
11 #include "net/cert/x509_certificate.h"
12 #include "testing/gtest/include/gtest/gtest.h"
16 CertificateList
CreateCertificateListFromFile(
17 const base::FilePath
& certs_dir
,
18 const std::string
& cert_file
,
20 base::FilePath cert_path
= certs_dir
.AppendASCII(cert_file
);
21 std::string cert_data
;
22 if (!base::ReadFileToString(cert_path
, &cert_data
))
23 return CertificateList();
24 return X509Certificate::CreateCertificateListFromBytes(cert_data
.data(),
29 scoped_refptr
<X509Certificate
> CreateCertificateChainFromFile(
30 const base::FilePath
& certs_dir
,
31 const std::string
& cert_file
,
33 CertificateList certs
= CreateCertificateListFromFile(
34 certs_dir
, cert_file
, format
);
38 X509Certificate::OSCertHandles intermediates
;
39 for (size_t i
= 1; i
< certs
.size(); ++i
)
40 intermediates
.push_back(certs
[i
]->os_cert_handle());
42 scoped_refptr
<X509Certificate
> result(X509Certificate::CreateFromHandle(
43 certs
[0]->os_cert_handle(), intermediates
));
47 scoped_refptr
<X509Certificate
> ImportCertFromFile(
48 const base::FilePath
& certs_dir
,
49 const std::string
& cert_file
) {
50 base::FilePath cert_path
= certs_dir
.AppendASCII(cert_file
);
51 std::string cert_data
;
52 if (!base::ReadFileToString(cert_path
, &cert_data
))
55 CertificateList certs_in_file
=
56 X509Certificate::CreateCertificateListFromBytes(
57 cert_data
.data(), cert_data
.size(), X509Certificate::FORMAT_AUTO
);
58 if (certs_in_file
.empty())
60 return certs_in_file
[0];
63 ScopedTestEVPolicy::ScopedTestEVPolicy(EVRootCAMetadata
* ev_root_ca_metadata
,
64 const SHA1HashValue
& fingerprint
,
66 : fingerprint_(fingerprint
),
67 ev_root_ca_metadata_(ev_root_ca_metadata
) {
68 EXPECT_TRUE(ev_root_ca_metadata
->AddEVCA(fingerprint
, policy
));
71 ScopedTestEVPolicy::~ScopedTestEVPolicy() {
72 EXPECT_TRUE(ev_root_ca_metadata_
->RemoveEVCA(fingerprint_
));