Revert of Clean up Smart Lock cryptohome keys logic: (patchset #5 id:80001 of https...
[chromium-blink-merge.git] / net / cert / x509_util.h
blobf4c67e27e763aeacfb42f224005c98b97ab3b90c
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_CERT_X509_UTIL_H_
6 #define NET_CERT_X509_UTIL_H_
8 #include <string>
10 #include "base/memory/ref_counted.h"
11 #include "base/memory/scoped_ptr.h"
12 #include "base/time/time.h"
13 #include "net/base/net_export.h"
15 namespace crypto {
16 class ECPrivateKey;
17 class RSAPrivateKey;
20 namespace net {
22 class X509Certificate;
24 namespace x509_util {
26 // Supported digest algorithms for signing certificates.
27 enum DigestAlgorithm {
28 DIGEST_SHA1,
29 DIGEST_SHA256
32 // Returns true if the times can be used to create an X.509 certificate.
33 // Certificates can accept dates from Jan 1st, 1 to Dec 31, 9999. A bug in NSS
34 // limited the range to 1950-9999
35 // (https://bugzilla.mozilla.org/show_bug.cgi?id=786531). This function will
36 // return whether it is supported by the currently used crypto library.
37 NET_EXPORT_PRIVATE bool IsSupportedValidityRange(base::Time not_valid_before,
38 base::Time not_valid_after);
40 // Creates a private keypair and server bound certificate.
41 // Domain, serial number and validity period are given as
42 // parameters. The certificate is signed by the private key in |key|.
43 // The signature algorithm may be updated periodically to match best practices.
45 // See Internet Draft draft-balfanz-tls-obc-00 for more details:
46 // http://tools.ietf.org/html/draft-balfanz-tls-obc-00
47 NET_EXPORT_PRIVATE bool CreateKeyAndChannelIDEC(
48 const std::string& domain,
49 uint32 serial_number,
50 base::Time not_valid_before,
51 base::Time not_valid_after,
52 scoped_ptr<crypto::ECPrivateKey>* key,
53 std::string* der_cert);
55 // Helper function for CreateKeyAndChannelIDEC.
56 NET_EXPORT_PRIVATE bool CreateChannelIDEC(crypto::ECPrivateKey* key,
57 DigestAlgorithm alg,
58 const std::string& domain,
59 uint32 serial_number,
60 base::Time not_valid_before,
61 base::Time not_valid_after,
62 std::string* der_cert);
64 // Creates a public-private keypair and a self-signed certificate.
65 // Subject, serial number and validity period are given as parameters.
66 // The certificate is signed by the private key in |key|. The key length and
67 // signature algorithm may be updated periodically to match best practices.
69 // |subject| is a distinguished name defined in RFC4514 with _only_ a CN
70 // component, as in:
71 // CN=Michael Wong
73 // SECURITY WARNING
75 // Using self-signed certificates has the following security risks:
76 // 1. Encryption without authentication and thus vulnerable to
77 // man-in-the-middle attacks.
78 // 2. Self-signed certificates cannot be revoked.
80 // Use this certificate only after the above risks are acknowledged.
81 NET_EXPORT bool CreateKeyAndSelfSignedCert(
82 const std::string& subject,
83 uint32 serial_number,
84 base::Time not_valid_before,
85 base::Time not_valid_after,
86 scoped_ptr<crypto::RSAPrivateKey>* key,
87 std::string* der_cert);
89 // Creates a self-signed certificate from a provided key, using the specified
90 // hash algorithm. You should not re-use a key for signing data with multiple
91 // signature algorithms or parameters.
92 NET_EXPORT bool CreateSelfSignedCert(crypto::RSAPrivateKey* key,
93 DigestAlgorithm alg,
94 const std::string& subject,
95 uint32 serial_number,
96 base::Time not_valid_before,
97 base::Time not_valid_after,
98 std::string* der_cert);
100 // Comparator for use in STL algorithms that will sort client certificates by
101 // order of preference.
102 // Returns true if |a| is more preferable than |b|, allowing it to be used
103 // with any algorithm that compares according to strict weak ordering.
105 // Criteria include:
106 // - Prefer certificates that have a longer validity period (later
107 // expiration dates)
108 // - If equal, prefer certificates that were issued more recently
109 // - If equal, prefer shorter chains (if available)
110 class NET_EXPORT_PRIVATE ClientCertSorter {
111 public:
112 ClientCertSorter();
114 bool operator()(
115 const scoped_refptr<X509Certificate>& a,
116 const scoped_refptr<X509Certificate>& b) const;
118 private:
119 base::Time now_;
122 } // namespace x509_util
124 } // namespace net
126 #endif // NET_CERT_X509_UTIL_H_