blob: 77237dad6488dfd3732aa1d4b5e0ada5a03ed6ae [file] [log] [blame]
// Copyright 2019 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "cast/receiver/channel/testing/device_auth_test_helpers.h"
#include <string>
#include <utility>
#include "cast/common/certificate/testing/test_helpers.h"
#include "gtest/gtest.h"
#include "util/crypto/pem_helpers.h"
namespace openscreen {
namespace cast {
void InitStaticCredentialsFromFiles(StaticCredentialsProvider* creds,
bssl::UniquePtr<X509>* parsed_cert,
TrustStore* fake_trust_store,
absl::string_view privkey_filename,
absl::string_view chain_filename,
absl::string_view tls_filename) {
auto private_key = ReadKeyFromPemFile(privkey_filename);
ASSERT_TRUE(private_key);
std::vector<std::string> certs = ReadCertificatesFromPemFile(chain_filename);
ASSERT_GT(certs.size(), 1u);
// Use the root of the chain as the trust store for the test.
auto* data = reinterpret_cast<const uint8_t*>(certs.back().data());
auto fake_root =
bssl::UniquePtr<X509>(d2i_X509(nullptr, &data, certs.back().size()));
ASSERT_TRUE(fake_root);
certs.pop_back();
if (fake_trust_store) {
fake_trust_store->certs.emplace_back(fake_root.release());
}
creds->device_creds = DeviceCredentials{
std::move(certs), std::move(private_key), std::string()};
const std::vector<std::string> tls_cert =
ReadCertificatesFromPemFile(tls_filename);
ASSERT_EQ(tls_cert.size(), 1u);
data = reinterpret_cast<const uint8_t*>(tls_cert[0].data());
if (parsed_cert) {
*parsed_cert =
bssl::UniquePtr<X509>(d2i_X509(nullptr, &data, tls_cert[0].size()));
ASSERT_TRUE(*parsed_cert);
}
const auto* begin = reinterpret_cast<const uint8_t*>(tls_cert[0].data());
creds->tls_cert_der.assign(begin, begin + tls_cert[0].size());
}
} // namespace cast
} // namespace openscreen