Windows should animate when they are about to get docked at screen edges.
[chromium-blink-merge.git] / net / cert / x509_util.h
blob8a6bae2c95fb7d40719535fabc7d674d15c6e87c
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_CERT_X509_UTIL_H_
6 #define NET_CERT_X509_UTIL_H_
8 #include <string>
10 #include "base/memory/ref_counted.h"
11 #include "base/time/time.h"
12 #include "net/base/net_export.h"
14 namespace crypto {
15 class ECPrivateKey;
16 class RSAPrivateKey;
19 namespace net {
21 class X509Certificate;
23 namespace x509_util {
25 // Returns true if the times can be used to create an X.509 certificate.
26 // Certificates can accept dates from Jan 1st, 1 to Dec 31, 9999. A bug in NSS
27 // limited the range to 1950-9999
28 // (https://bugzilla.mozilla.org/show_bug.cgi?id=786531). This function will
29 // return whether it is supported by the currently used crypto library.
30 NET_EXPORT_PRIVATE bool IsSupportedValidityRange(base::Time not_valid_before,
31 base::Time not_valid_after);
33 // Creates a server bound certificate containing the public key in |key|.
34 // Domain, serial number and validity period are given as
35 // parameters. The certificate is signed by the private key in |key|.
36 // The hashing algorithm for the signature is SHA-1.
38 // See Internet Draft draft-balfanz-tls-obc-00 for more details:
39 // http://tools.ietf.org/html/draft-balfanz-tls-obc-00
40 NET_EXPORT_PRIVATE bool CreateDomainBoundCertEC(
41 crypto::ECPrivateKey* key,
42 const std::string& domain,
43 uint32 serial_number,
44 base::Time not_valid_before,
45 base::Time not_valid_after,
46 std::string* der_cert);
48 // Create a self-signed certificate containing the public key in |key|.
49 // Subject, serial number and validity period are given as parameters.
50 // The certificate is signed by the private key in |key|. The hashing
51 // algorithm for the signature is SHA-1.
53 // |subject| is a distinguished name defined in RFC4514.
55 // An example:
56 // CN=Michael Wong,O=FooBar Corporation,DC=foobar,DC=com
58 // SECURITY WARNING
60 // Using self-signed certificates has the following security risks:
61 // 1. Encryption without authentication and thus vulnerable to
62 // man-in-the-middle attacks.
63 // 2. Self-signed certificates cannot be revoked.
65 // Use this certificate only after the above risks are acknowledged.
66 NET_EXPORT bool CreateSelfSignedCert(crypto::RSAPrivateKey* key,
67 const std::string& subject,
68 uint32 serial_number,
69 base::Time not_valid_before,
70 base::Time not_valid_after,
71 std::string* der_cert);
73 // Comparator for use in STL algorithms that will sort client certificates by
74 // order of preference.
75 // Returns true if |a| is more preferable than |b|, allowing it to be used
76 // with any algorithm that compares according to strict weak ordering.
78 // Criteria include:
79 // - Prefer certificates that have a longer validity period (later
80 // expiration dates)
81 // - If equal, prefer certificates that were issued more recently
82 // - If equal, prefer shorter chains (if available)
83 class NET_EXPORT_PRIVATE ClientCertSorter {
84 public:
85 ClientCertSorter();
87 bool operator()(
88 const scoped_refptr<X509Certificate>& a,
89 const scoped_refptr<X509Certificate>& b) const;
91 private:
92 base::Time now_;
95 } // namespace x509_util
97 } // namespace net
99 #endif // NET_CERT_X509_UTIL_H_