// Copyright 2019 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "cast/receiver/channel/testing/device_auth_test_helpers.h" #include #include #include "cast/common/certificate/testing/test_helpers.h" #include "gtest/gtest.h" #include "util/crypto/pem_helpers.h" namespace openscreen { namespace cast { void InitStaticCredentialsFromFiles(StaticCredentialsProvider* creds, bssl::UniquePtr* parsed_cert, TrustStore* fake_trust_store, absl::string_view privkey_filename, absl::string_view chain_filename, absl::string_view tls_filename) { auto private_key = ReadKeyFromPemFile(privkey_filename); ASSERT_TRUE(private_key); std::vector certs = ReadCertificatesFromPemFile(chain_filename); ASSERT_GT(certs.size(), 1u); // Use the root of the chain as the trust store for the test. auto* data = reinterpret_cast(certs.back().data()); auto fake_root = bssl::UniquePtr(d2i_X509(nullptr, &data, certs.back().size())); ASSERT_TRUE(fake_root); certs.pop_back(); if (fake_trust_store) { fake_trust_store->certs.emplace_back(fake_root.release()); } creds->device_creds = DeviceCredentials{ std::move(certs), std::move(private_key), std::string()}; const std::vector tls_cert = ReadCertificatesFromPemFile(tls_filename); ASSERT_EQ(tls_cert.size(), 1u); data = reinterpret_cast(tls_cert[0].data()); if (parsed_cert) { *parsed_cert = bssl::UniquePtr(d2i_X509(nullptr, &data, tls_cert[0].size())); ASSERT_TRUE(*parsed_cert); } const auto* begin = reinterpret_cast(tls_cert[0].data()); creds->tls_cert_der.assign(begin, begin + tls_cert[0].size()); } } // namespace cast } // namespace openscreen