Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(421)

Unified Diff: net/cert/x509_util.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/cert/x509_util.h ('k') | net/cert/x509_util_android.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cert/x509_util.cc
diff --git a/net/cert/x509_util.cc b/net/cert/x509_util.cc
deleted file mode 100644
index d74340eaf6fcb64aeae067d277adbe402f7d5ee9..0000000000000000000000000000000000000000
--- a/net/cert/x509_util.cc
+++ /dev/null
@@ -1,107 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "net/cert/x509_util.h"
-
-#include "base/basictypes.h"
-#include "base/memory/scoped_ptr.h"
-#include "base/time/time.h"
-#include "crypto/ec_private_key.h"
-#include "crypto/rsa_private_key.h"
-#include "net/cert/x509_certificate.h"
-
-namespace net {
-
-namespace x509_util {
-
-// RSA keys created by CreateKeyAndSelfSignedCert will be of this length.
-static const uint16 kRSAKeyLength = 1024;
-
-// Certificates made by CreateKeyAndSelfSignedCert and
-// CreateKeyAndChannelIDEC will be signed using this digest algorithm.
-static const DigestAlgorithm kSignatureDigestAlgorithm = DIGEST_SHA256;
-
-ClientCertSorter::ClientCertSorter() : now_(base::Time::Now()) {}
-
-bool ClientCertSorter::operator()(
- const scoped_refptr<X509Certificate>& a,
- const scoped_refptr<X509Certificate>& b) const {
- // Certificates that are null are sorted last.
- if (!a.get() || !b.get())
- return a.get() && !b.get();
-
- // Certificates that are expired/not-yet-valid are sorted last.
- bool a_is_valid = now_ >= a->valid_start() && now_ <= a->valid_expiry();
- bool b_is_valid = now_ >= b->valid_start() && now_ <= b->valid_expiry();
- if (a_is_valid != b_is_valid)
- return a_is_valid && !b_is_valid;
-
- // Certificates with longer expirations appear as higher priority (less
- // than) certificates with shorter expirations.
- if (a->valid_expiry() != b->valid_expiry())
- return a->valid_expiry() > b->valid_expiry();
-
- // If the expiration dates are equivalent, certificates that were issued
- // more recently should be prioritized over older certificates.
- if (a->valid_start() != b->valid_start())
- return a->valid_start() > b->valid_start();
-
- // Otherwise, prefer client certificates with shorter chains.
- const X509Certificate::OSCertHandles& a_intermediates =
- a->GetIntermediateCertificates();
- const X509Certificate::OSCertHandles& b_intermediates =
- b->GetIntermediateCertificates();
- return a_intermediates.size() < b_intermediates.size();
-}
-
-bool CreateKeyAndChannelIDEC(const std::string& domain,
- uint32 serial_number,
- base::Time not_valid_before,
- base::Time not_valid_after,
- scoped_ptr<crypto::ECPrivateKey>* key,
- std::string* der_cert) {
- scoped_ptr<crypto::ECPrivateKey> new_key(crypto::ECPrivateKey::Create());
- if (!new_key.get())
- return false;
-
- bool success = CreateChannelIDEC(new_key.get(),
- kSignatureDigestAlgorithm,
- domain,
- serial_number,
- not_valid_before,
- not_valid_after,
- der_cert);
- if (success)
- key->reset(new_key.release());
-
- return success;
-}
-
-bool CreateKeyAndSelfSignedCert(const std::string& subject,
- uint32 serial_number,
- base::Time not_valid_before,
- base::Time not_valid_after,
- scoped_ptr<crypto::RSAPrivateKey>* key,
- std::string* der_cert) {
- scoped_ptr<crypto::RSAPrivateKey> new_key(
- crypto::RSAPrivateKey::Create(kRSAKeyLength));
- if (!new_key.get())
- return false;
-
- bool success = CreateSelfSignedCert(new_key.get(),
- kSignatureDigestAlgorithm,
- subject,
- serial_number,
- not_valid_before,
- not_valid_after,
- der_cert);
- if (success)
- key->reset(new_key.release());
-
- return success;
-}
-
-} // namespace x509_util
-
-} // namespace net
« no previous file with comments | « net/cert/x509_util.h ('k') | net/cert/x509_util_android.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698