OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/cert/x509_util.h" | |
6 | |
7 #include "base/basictypes.h" | |
8 #include "base/memory/scoped_ptr.h" | |
9 #include "base/time/time.h" | |
10 #include "crypto/ec_private_key.h" | |
11 #include "crypto/rsa_private_key.h" | |
12 #include "net/cert/x509_certificate.h" | |
13 | |
14 namespace net { | |
15 | |
16 namespace x509_util { | |
17 | |
18 // RSA keys created by CreateKeyAndSelfSignedCert will be of this length. | |
19 static const uint16 kRSAKeyLength = 1024; | |
20 | |
21 // Certificates made by CreateKeyAndSelfSignedCert and | |
22 // CreateKeyAndChannelIDEC will be signed using this digest algorithm. | |
23 static const DigestAlgorithm kSignatureDigestAlgorithm = DIGEST_SHA256; | |
24 | |
25 ClientCertSorter::ClientCertSorter() : now_(base::Time::Now()) {} | |
26 | |
27 bool ClientCertSorter::operator()( | |
28 const scoped_refptr<X509Certificate>& a, | |
29 const scoped_refptr<X509Certificate>& b) const { | |
30 // Certificates that are null are sorted last. | |
31 if (!a.get() || !b.get()) | |
32 return a.get() && !b.get(); | |
33 | |
34 // Certificates that are expired/not-yet-valid are sorted last. | |
35 bool a_is_valid = now_ >= a->valid_start() && now_ <= a->valid_expiry(); | |
36 bool b_is_valid = now_ >= b->valid_start() && now_ <= b->valid_expiry(); | |
37 if (a_is_valid != b_is_valid) | |
38 return a_is_valid && !b_is_valid; | |
39 | |
40 // Certificates with longer expirations appear as higher priority (less | |
41 // than) certificates with shorter expirations. | |
42 if (a->valid_expiry() != b->valid_expiry()) | |
43 return a->valid_expiry() > b->valid_expiry(); | |
44 | |
45 // If the expiration dates are equivalent, certificates that were issued | |
46 // more recently should be prioritized over older certificates. | |
47 if (a->valid_start() != b->valid_start()) | |
48 return a->valid_start() > b->valid_start(); | |
49 | |
50 // Otherwise, prefer client certificates with shorter chains. | |
51 const X509Certificate::OSCertHandles& a_intermediates = | |
52 a->GetIntermediateCertificates(); | |
53 const X509Certificate::OSCertHandles& b_intermediates = | |
54 b->GetIntermediateCertificates(); | |
55 return a_intermediates.size() < b_intermediates.size(); | |
56 } | |
57 | |
58 bool CreateKeyAndChannelIDEC(const std::string& domain, | |
59 uint32 serial_number, | |
60 base::Time not_valid_before, | |
61 base::Time not_valid_after, | |
62 scoped_ptr<crypto::ECPrivateKey>* key, | |
63 std::string* der_cert) { | |
64 scoped_ptr<crypto::ECPrivateKey> new_key(crypto::ECPrivateKey::Create()); | |
65 if (!new_key.get()) | |
66 return false; | |
67 | |
68 bool success = CreateChannelIDEC(new_key.get(), | |
69 kSignatureDigestAlgorithm, | |
70 domain, | |
71 serial_number, | |
72 not_valid_before, | |
73 not_valid_after, | |
74 der_cert); | |
75 if (success) | |
76 key->reset(new_key.release()); | |
77 | |
78 return success; | |
79 } | |
80 | |
81 bool CreateKeyAndSelfSignedCert(const std::string& subject, | |
82 uint32 serial_number, | |
83 base::Time not_valid_before, | |
84 base::Time not_valid_after, | |
85 scoped_ptr<crypto::RSAPrivateKey>* key, | |
86 std::string* der_cert) { | |
87 scoped_ptr<crypto::RSAPrivateKey> new_key( | |
88 crypto::RSAPrivateKey::Create(kRSAKeyLength)); | |
89 if (!new_key.get()) | |
90 return false; | |
91 | |
92 bool success = CreateSelfSignedCert(new_key.get(), | |
93 kSignatureDigestAlgorithm, | |
94 subject, | |
95 serial_number, | |
96 not_valid_before, | |
97 not_valid_after, | |
98 der_cert); | |
99 if (success) | |
100 key->reset(new_key.release()); | |
101 | |
102 return success; | |
103 } | |
104 | |
105 } // namespace x509_util | |
106 | |
107 } // namespace net | |
OLD | NEW |