| // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/base/cert_test_util.h" |
| |
| #include "build/build_config.h" |
| |
| #if defined(USE_NSS) |
| #include <cert.h> |
| #include "base/nss_util.h" |
| #elif defined(OS_MACOSX) |
| #include <Security/Security.h> |
| #include "base/scoped_cftyperef.h" |
| #endif |
| |
| #include "base/file_util.h" |
| #include "base/logging.h" |
| #include "base/path_service.h" |
| #include "net/base/x509_certificate.h" |
| |
| namespace net { |
| |
| #if defined(USE_NSS) |
| X509Certificate* LoadTemporaryRootCert(const FilePath& filename) { |
| base::EnsureNSSInit(); |
| |
| std::string rawcert; |
| if (!file_util::ReadFileToString(filename, &rawcert)) { |
| LOG(ERROR) << "Can't load certificate " << filename.value(); |
| return NULL; |
| } |
| |
| CERTCertificate *cert; |
| cert = CERT_DecodeCertFromPackage(const_cast<char *>(rawcert.c_str()), |
| rawcert.length()); |
| if (!cert) { |
| LOG(ERROR) << "Can't convert certificate " << filename.value(); |
| return NULL; |
| } |
| |
| // TODO(port): remove this const_cast after NSS 3.12.3 is released |
| CERTCertTrust trust; |
| int rv = CERT_DecodeTrustString(&trust, const_cast<char *>("TCu,Cu,Tu")); |
| if (rv != SECSuccess) { |
| LOG(ERROR) << "Can't decode trust string"; |
| CERT_DestroyCertificate(cert); |
| return NULL; |
| } |
| |
| rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert, &trust); |
| if (rv != SECSuccess) { |
| LOG(ERROR) << "Can't change trust for certificate " << filename.value(); |
| CERT_DestroyCertificate(cert); |
| return NULL; |
| } |
| |
| X509Certificate* result = X509Certificate::CreateFromHandle( |
| cert, |
| X509Certificate::SOURCE_LONE_CERT_IMPORT, |
| X509Certificate::OSCertHandles()); |
| CERT_DestroyCertificate(cert); |
| return result; |
| } |
| #endif |
| |
| #if defined(OS_MACOSX) |
| X509Certificate* LoadTemporaryRootCert(const FilePath& filename) { |
| std::string rawcert; |
| if (!file_util::ReadFileToString(filename, &rawcert)) { |
| LOG(ERROR) << "Can't load certificate " << filename.value(); |
| return NULL; |
| } |
| |
| CFDataRef pem = CFDataCreate(kCFAllocatorDefault, |
| reinterpret_cast<const UInt8*>(rawcert.data()), |
| static_cast<CFIndex>(rawcert.size())); |
| if (!pem) |
| return NULL; |
| scoped_cftyperef<CFDataRef> scoped_pem(pem); |
| |
| SecExternalFormat input_format = kSecFormatUnknown; |
| SecExternalItemType item_type = kSecItemTypeUnknown; |
| CFArrayRef cert_array = NULL; |
| if (SecKeychainItemImport(pem, NULL, &input_format, &item_type, 0, NULL, NULL, |
| &cert_array)) |
| return NULL; |
| scoped_cftyperef<CFArrayRef> scoped_cert_array(cert_array); |
| |
| if (!CFArrayGetCount(cert_array)) |
| return NULL; |
| |
| SecCertificateRef cert_ref = static_cast<SecCertificateRef>( |
| const_cast<void*>(CFArrayGetValueAtIndex(cert_array, 0))); |
| |
| return X509Certificate::CreateFromHandle(cert_ref, |
| X509Certificate::SOURCE_LONE_CERT_IMPORT, |
| X509Certificate::OSCertHandles()); |
| } |
| #endif |
| |
| } // namespace net |