• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #ifndef NET_CERT_TEST_ROOT_CERTS_H_
6 #define NET_CERT_TEST_ROOT_CERTS_H_
7 
8 #include "base/lazy_instance.h"
9 #include "base/memory/ref_counted.h"
10 #include "build/build_config.h"
11 #include "net/base/net_export.h"
12 
13 #if defined(USE_NSS) || defined(OS_IOS)
14 #include <list>
15 #elif defined(OS_WIN)
16 #include <windows.h>
17 #include <wincrypt.h>
18 #elif defined(OS_MACOSX)
19 #include <CoreFoundation/CFArray.h>
20 #include <Security/SecTrust.h>
21 #include "base/mac/scoped_cftyperef.h"
22 #endif
23 
24 namespace base {
25 class FilePath;
26 }
27 
28 namespace net {
29 
30 class X509Certificate;
31 
32 // TestRootCerts is a helper class for unit tests that is used to
33 // artificially mark a certificate as trusted, independent of the local
34 // machine configuration.
35 class NET_EXPORT_PRIVATE TestRootCerts {
36  public:
37   // Obtains the Singleton instance to the trusted certificates.
38   static TestRootCerts* GetInstance();
39 
40   // Returns true if an instance exists, without forcing an initialization.
41   static bool HasInstance();
42 
43   // Marks |certificate| as trusted for X509Certificate::Verify(). Returns
44   // false if the certificate could not be marked trusted.
45   bool Add(X509Certificate* certificate);
46 
47   // Reads a single certificate from |file| and marks it as trusted. Returns
48   // false if an error is encountered, such as being unable to read |file|
49   // or more than one certificate existing in |file|.
50   bool AddFromFile(const base::FilePath& file);
51 
52   // Clears the trusted status of any certificates that were previously
53   // marked trusted via Add().
54   void Clear();
55 
56   // Returns true if there are no certificates that have been marked trusted.
57   bool IsEmpty() const;
58 
59 #if defined(OS_MACOSX) && !defined(OS_IOS)
temporary_roots()60   CFArrayRef temporary_roots() const { return temporary_roots_; }
61 
62   // Modifies the root certificates of |trust_ref| to include the
63   // certificates stored in |temporary_roots_|. If IsEmpty() is true, this
64   // does not modify |trust_ref|.
65   OSStatus FixupSecTrustRef(SecTrustRef trust_ref) const;
66 
67   // Configures whether or not the default/system root store should also
68   // be trusted. By default, this is true, indicating that the TestRootCerts
69   // are used in addition to OS trust store.
70   void SetAllowSystemTrust(bool allow_system_trust);
71 
72 #elif defined(OS_WIN)
temporary_roots()73   HCERTSTORE temporary_roots() const { return temporary_roots_; }
74 
75   // Returns an HCERTCHAINENGINE suitable to be used for certificate
76   // validation routines, or NULL to indicate that the default system chain
77   // engine is appropriate. The caller is responsible for freeing the
78   // returned HCERTCHAINENGINE.
79   HCERTCHAINENGINE GetChainEngine() const;
80 #endif
81 
82  private:
83   friend struct base::DefaultLazyInstanceTraits<TestRootCerts>;
84 
85   TestRootCerts();
86   ~TestRootCerts();
87 
88   // Performs platform-dependent initialization.
89   void Init();
90 
91 #if defined(USE_NSS) || defined(OS_IOS)
92   // It is necessary to maintain a cache of the original certificate trust
93   // settings, in order to restore them when Clear() is called.
94   class TrustEntry;
95   std::list<TrustEntry*> trust_cache_;
96 #elif defined(OS_WIN)
97   HCERTSTORE temporary_roots_;
98 #elif defined(OS_MACOSX)
99   base::ScopedCFTypeRef<CFMutableArrayRef> temporary_roots_;
100   bool allow_system_trust_;
101 #endif
102 
103 #if defined(OS_WIN) || defined(USE_OPENSSL)
104   // True if there are no temporarily trusted root certificates.
105   bool empty_;
106 #endif
107 
108   DISALLOW_COPY_AND_ASSIGN(TestRootCerts);
109 };
110 
111 // Scoped helper for unittests to handle safely managing trusted roots.
112 class NET_EXPORT_PRIVATE ScopedTestRoot {
113  public:
114   ScopedTestRoot();
115   // Creates a ScopedTestRoot that will adds|cert| to the TestRootCerts store.
116   explicit ScopedTestRoot(X509Certificate* cert);
117   ~ScopedTestRoot();
118 
119   // Assigns |cert| to be the new test root cert. If |cert| is NULL, undoes
120   // any work the ScopedTestRoot may have previously done.
121   // If |cert_| contains a certificate (due to a prior call to Reset or due to
122   // a cert being passed at construction), the existing TestRootCerts store is
123   // cleared.
124   void Reset(X509Certificate* cert);
125 
126  private:
127   scoped_refptr<X509Certificate> cert_;
128 
129   DISALLOW_COPY_AND_ASSIGN(ScopedTestRoot);
130 };
131 
132 }  // namespace net
133 
134 #endif  // NET_CERT_TEST_ROOT_CERTS_H_
135