OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #ifndef NET_CERT_X509_UTIL_H_ | |
6 #define NET_CERT_X509_UTIL_H_ | |
7 | |
8 #include <string> | |
9 | |
10 #include "base/memory/ref_counted.h" | |
11 #include "base/memory/scoped_ptr.h" | |
12 #include "base/time/time.h" | |
13 #include "net/base/net_export.h" | |
14 | |
15 namespace crypto { | |
16 class ECPrivateKey; | |
17 class RSAPrivateKey; | |
18 } | |
19 | |
20 namespace net { | |
21 | |
22 class X509Certificate; | |
23 | |
24 namespace x509_util { | |
25 | |
26 // Supported digest algorithms for signing certificates. | |
27 enum DigestAlgorithm { | |
28 DIGEST_SHA1, | |
29 DIGEST_SHA256 | |
30 }; | |
31 | |
32 // Returns true if the times can be used to create an X.509 certificate. | |
33 // Certificates can accept dates from Jan 1st, 1 to Dec 31, 9999. A bug in NSS | |
34 // limited the range to 1950-9999 | |
35 // (https://bugzilla.mozilla.org/show_bug.cgi?id=786531). This function will | |
36 // return whether it is supported by the currently used crypto library. | |
37 NET_EXPORT_PRIVATE bool IsSupportedValidityRange(base::Time not_valid_before, | |
38 base::Time not_valid_after); | |
39 | |
40 // Creates a private keypair and server bound certificate. | |
41 // Domain, serial number and validity period are given as | |
42 // parameters. The certificate is signed by the private key in |key|. | |
43 // The signature algorithm may be updated periodically to match best practices. | |
44 // | |
45 // See Internet Draft draft-balfanz-tls-obc-00 for more details: | |
46 // http://tools.ietf.org/html/draft-balfanz-tls-obc-00 | |
47 NET_EXPORT_PRIVATE bool CreateKeyAndChannelIDEC( | |
48 const std::string& domain, | |
49 uint32 serial_number, | |
50 base::Time not_valid_before, | |
51 base::Time not_valid_after, | |
52 scoped_ptr<crypto::ECPrivateKey>* key, | |
53 std::string* der_cert); | |
54 | |
55 // Helper function for CreateKeyAndChannelIDEC. | |
56 NET_EXPORT_PRIVATE bool CreateChannelIDEC(crypto::ECPrivateKey* key, | |
57 DigestAlgorithm alg, | |
58 const std::string& domain, | |
59 uint32 serial_number, | |
60 base::Time not_valid_before, | |
61 base::Time not_valid_after, | |
62 std::string* der_cert); | |
63 | |
64 // Creates a public-private keypair and a self-signed certificate. | |
65 // Subject, serial number and validity period are given as parameters. | |
66 // The certificate is signed by the private key in |key|. The key length and | |
67 // signature algorithm may be updated periodically to match best practices. | |
68 // | |
69 // |subject| is a distinguished name defined in RFC4514 with _only_ a CN | |
70 // component, as in: | |
71 // CN=Michael Wong | |
72 // | |
73 // SECURITY WARNING | |
74 // | |
75 // Using self-signed certificates has the following security risks: | |
76 // 1. Encryption without authentication and thus vulnerable to | |
77 // man-in-the-middle attacks. | |
78 // 2. Self-signed certificates cannot be revoked. | |
79 // | |
80 // Use this certificate only after the above risks are acknowledged. | |
81 NET_EXPORT bool CreateKeyAndSelfSignedCert( | |
82 const std::string& subject, | |
83 uint32 serial_number, | |
84 base::Time not_valid_before, | |
85 base::Time not_valid_after, | |
86 scoped_ptr<crypto::RSAPrivateKey>* key, | |
87 std::string* der_cert); | |
88 | |
89 // Creates a self-signed certificate from a provided key, using the specified | |
90 // hash algorithm. You should not re-use a key for signing data with multiple | |
91 // signature algorithms or parameters. | |
92 NET_EXPORT bool CreateSelfSignedCert(crypto::RSAPrivateKey* key, | |
93 DigestAlgorithm alg, | |
94 const std::string& subject, | |
95 uint32 serial_number, | |
96 base::Time not_valid_before, | |
97 base::Time not_valid_after, | |
98 std::string* der_cert); | |
99 | |
100 // Comparator for use in STL algorithms that will sort client certificates by | |
101 // order of preference. | |
102 // Returns true if |a| is more preferable than |b|, allowing it to be used | |
103 // with any algorithm that compares according to strict weak ordering. | |
104 // | |
105 // Criteria include: | |
106 // - Prefer certificates that have a longer validity period (later | |
107 // expiration dates) | |
108 // - If equal, prefer certificates that were issued more recently | |
109 // - If equal, prefer shorter chains (if available) | |
110 class NET_EXPORT_PRIVATE ClientCertSorter { | |
111 public: | |
112 ClientCertSorter(); | |
113 | |
114 bool operator()( | |
115 const scoped_refptr<X509Certificate>& a, | |
116 const scoped_refptr<X509Certificate>& b) const; | |
117 | |
118 private: | |
119 base::Time now_; | |
120 }; | |
121 | |
122 } // namespace x509_util | |
123 | |
124 } // namespace net | |
125 | |
126 #endif // NET_CERT_X509_UTIL_H_ | |
OLD | NEW |