| Index: net/base/x509_util.h
|
| diff --git a/net/base/x509_util.h b/net/base/x509_util.h
|
| deleted file mode 100644
|
| index 734eebd897406ede51a5d98f37a7f1ff303ebd6b..0000000000000000000000000000000000000000
|
| --- a/net/base/x509_util.h
|
| +++ /dev/null
|
| @@ -1,73 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef NET_BASE_X509_UTIL_H_
|
| -#define NET_BASE_X509_UTIL_H_
|
| -
|
| -#include <string>
|
| -
|
| -#include "base/memory/ref_counted.h"
|
| -#include "base/time.h"
|
| -#include "net/base/net_export.h"
|
| -
|
| -namespace crypto {
|
| -class ECPrivateKey;
|
| -}
|
| -
|
| -namespace net {
|
| -
|
| -class X509Certificate;
|
| -
|
| -namespace x509_util {
|
| -
|
| -// Returns true if the times can be used to create an X.509 certificate.
|
| -// Certificates can accept dates from Jan 1st, 1 to Dec 31, 9999. A bug in NSS
|
| -// limited the range to 1950-9999
|
| -// (https://bugzilla.mozilla.org/show_bug.cgi?id=786531). This function will
|
| -// return whether it is supported by the currently used crypto library.
|
| -NET_EXPORT_PRIVATE bool IsSupportedValidityRange(base::Time not_valid_before,
|
| - base::Time not_valid_after);
|
| -
|
| -// Creates a server bound certificate containing the public key in |key|.
|
| -// Domain, serial number and validity period are given as
|
| -// parameters. The certificate is signed by the private key in |key|.
|
| -// The hashing algorithm for the signature is SHA-1.
|
| -//
|
| -// See Internet Draft draft-balfanz-tls-obc-00 for more details:
|
| -// http://tools.ietf.org/html/draft-balfanz-tls-obc-00
|
| -NET_EXPORT_PRIVATE bool CreateDomainBoundCertEC(
|
| - crypto::ECPrivateKey* key,
|
| - const std::string& domain,
|
| - uint32 serial_number,
|
| - base::Time not_valid_before,
|
| - base::Time not_valid_after,
|
| - std::string* der_cert);
|
| -
|
| -// Comparator for use in STL algorithms that will sort client certificates by
|
| -// order of preference.
|
| -// Returns true if |a| is more preferable than |b|, allowing it to be used
|
| -// with any algorithm that compares according to strict weak ordering.
|
| -//
|
| -// Criteria include:
|
| -// - Prefer certificates that have a longer validity period (later
|
| -// expiration dates)
|
| -// - If equal, prefer certificates that were issued more recently
|
| -// - If equal, prefer shorter chains (if available)
|
| -class NET_EXPORT_PRIVATE ClientCertSorter {
|
| - public:
|
| - ClientCertSorter();
|
| -
|
| - bool operator()(
|
| - const scoped_refptr<X509Certificate>& a,
|
| - const scoped_refptr<X509Certificate>& b) const;
|
| -
|
| - private:
|
| - base::Time now_;
|
| -};
|
| -
|
| -} // namespace x509_util
|
| -
|
| -} // namespace net
|
| -
|
| -#endif // NET_BASE_X509_UTIL_H_
|
|
|