blob: d5c678e593a0eafd9c060b04ac91532be3afd866 [file] [log] [blame]
// Copyright (c) 2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/base/cert_test_util.h"
#include "build/build_config.h"
#if defined(USE_OPENSSL)
#include <openssl/err.h>
#include <openssl/ssl.h>
#include <openssl/x509v3.h>
#include "base/openssl_util.h"
#elif defined(USE_NSS)
#include <cert.h>
#include "base/nss_util.h"
#elif defined(OS_MACOSX)
#include <Security/Security.h>
#include "base/mac/scoped_cftyperef.h"
#endif
#include "base/file_util.h"
#include "base/logging.h"
#include "base/path_service.h"
#include "net/base/x509_certificate.h"
namespace net {
#if defined(USE_OPENSSL)
X509Certificate* AddTemporaryRootCertToStore(X509* x509_cert) {
if (!X509_STORE_add_cert(X509Certificate::cert_store(), x509_cert)) {
unsigned long error_code = ERR_get_error();
if (ERR_GET_LIB(error_code) != ERR_LIB_X509 ||
ERR_GET_REASON(error_code) != X509_R_CERT_ALREADY_IN_HASH_TABLE) {
base::ClearOpenSSLERRStack();
return NULL;
}
}
return X509Certificate::CreateFromHandle(
x509_cert, X509Certificate::SOURCE_LONE_CERT_IMPORT,
X509Certificate::OSCertHandles());
}
X509Certificate* LoadTemporaryRootCert(const FilePath& filename) {
base::EnsureOpenSSLInit();
std::string rawcert;
if (!file_util::ReadFileToString(filename, &rawcert)) {
LOG(ERROR) << "Can't load certificate " << filename.value();
return NULL;
}
base::ScopedOpenSSL<BIO, BIO_free_all> cert_bio(
BIO_new_mem_buf(const_cast<char*>(rawcert.c_str()),
rawcert.length()));
if (!cert_bio.get()) {
LOG(ERROR) << "Can't create read-only BIO " << filename.value();
return NULL;
}
base::ScopedOpenSSL<X509, X509_free> pem_cert(PEM_read_bio_X509(
cert_bio.get(), NULL, NULL, NULL));
if (pem_cert.get())
return AddTemporaryRootCertToStore(pem_cert.get());
// File does not contain PEM data, let's try DER.
const unsigned char* der_data =
reinterpret_cast<const unsigned char*>(rawcert.c_str());
int der_length = rawcert.length();
base::ScopedOpenSSL<X509, X509_free> der_cert(d2i_X509(
NULL, &der_data, der_length));
if (der_cert.get())
return AddTemporaryRootCertToStore(der_cert.get());
LOG(ERROR) << "Can't parse certificate " << filename.value();
return NULL;
}
#elif defined(USE_NSS)
X509Certificate* LoadTemporaryRootCert(const FilePath& filename) {
base::EnsureNSSInit();
std::string rawcert;
if (!file_util::ReadFileToString(filename, &rawcert)) {
LOG(ERROR) << "Can't load certificate " << filename.value();
return NULL;
}
CERTCertificate *cert;
cert = CERT_DecodeCertFromPackage(const_cast<char *>(rawcert.c_str()),
rawcert.length());
if (!cert) {
LOG(ERROR) << "Can't convert certificate " << filename.value();
return NULL;
}
// TODO(port): remove this const_cast after NSS 3.12.3 is released
CERTCertTrust trust;
int rv = CERT_DecodeTrustString(&trust, const_cast<char *>("TCu,Cu,Tu"));
if (rv != SECSuccess) {
LOG(ERROR) << "Can't decode trust string";
CERT_DestroyCertificate(cert);
return NULL;
}
rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert, &trust);
if (rv != SECSuccess) {
LOG(ERROR) << "Can't change trust for certificate " << filename.value();
CERT_DestroyCertificate(cert);
return NULL;
}
X509Certificate* result = X509Certificate::CreateFromHandle(
cert,
X509Certificate::SOURCE_LONE_CERT_IMPORT,
X509Certificate::OSCertHandles());
CERT_DestroyCertificate(cert);
return result;
}
#endif
#if defined(OS_MACOSX)
X509Certificate* LoadTemporaryRootCert(const FilePath& filename) {
std::string rawcert;
if (!file_util::ReadFileToString(filename, &rawcert)) {
LOG(ERROR) << "Can't load certificate " << filename.value();
return NULL;
}
CFDataRef pem = CFDataCreate(kCFAllocatorDefault,
reinterpret_cast<const UInt8*>(rawcert.data()),
static_cast<CFIndex>(rawcert.size()));
if (!pem)
return NULL;
base::mac::ScopedCFTypeRef<CFDataRef> scoped_pem(pem);
SecExternalFormat input_format = kSecFormatUnknown;
SecExternalItemType item_type = kSecItemTypeUnknown;
CFArrayRef cert_array = NULL;
if (SecKeychainItemImport(pem, NULL, &input_format, &item_type, 0, NULL, NULL,
&cert_array))
return NULL;
base::mac::ScopedCFTypeRef<CFArrayRef> scoped_cert_array(cert_array);
if (!CFArrayGetCount(cert_array))
return NULL;
SecCertificateRef cert_ref = static_cast<SecCertificateRef>(
const_cast<void*>(CFArrayGetValueAtIndex(cert_array, 0)));
return X509Certificate::CreateFromHandle(cert_ref,
X509Certificate::SOURCE_LONE_CERT_IMPORT,
X509Certificate::OSCertHandles());
}
#endif
} // namespace net