1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_CERT_X509_UTIL_H_
6 #define NET_CERT_X509_UTIL_H_
10 #include "base/memory/ref_counted.h"
11 #include "base/memory/scoped_ptr.h"
12 #include "base/time/time.h"
13 #include "net/base/net_export.h"
22 class X509Certificate
;
26 // Supported digest algorithms for signing certificates.
27 enum DigestAlgorithm
{
32 // Returns true if the times can be used to create an X.509 certificate.
33 // Certificates can accept dates from Jan 1st, 1 to Dec 31, 9999. A bug in NSS
34 // limited the range to 1950-9999
35 // (https://bugzilla.mozilla.org/show_bug.cgi?id=786531). This function will
36 // return whether it is supported by the currently used crypto library.
37 NET_EXPORT_PRIVATE
bool IsSupportedValidityRange(base::Time not_valid_before
,
38 base::Time not_valid_after
);
40 // Creates a private keypair and server bound certificate.
41 // Domain, serial number and validity period are given as
42 // parameters. The certificate is signed by the private key in |key|.
43 // The signature algorithm may be updated periodically to match best practices.
45 // See Internet Draft draft-balfanz-tls-obc-00 for more details:
46 // http://tools.ietf.org/html/draft-balfanz-tls-obc-00
47 NET_EXPORT_PRIVATE
bool CreateKeyAndDomainBoundCertEC(
48 const std::string
& domain
,
50 base::Time not_valid_before
,
51 base::Time not_valid_after
,
52 scoped_ptr
<crypto::ECPrivateKey
>* key
,
53 std::string
* der_cert
);
55 // Helper function for CreateKeyAndDomainBoundCertEC.
56 NET_EXPORT_PRIVATE
bool CreateDomainBoundCertEC(crypto::ECPrivateKey
* key
,
58 const std::string
& domain
,
60 base::Time not_valid_before
,
61 base::Time not_valid_after
,
62 std::string
* der_cert
);
64 // Creates a public-private keypair and a self-signed certificate.
65 // Subject, serial number and validity period are given as parameters.
66 // The certificate is signed by the private key in |key|. The key length and
67 // signature algorithm may be updated periodically to match best practices.
69 // |subject| is a distinguished name defined in RFC4514 with _only_ a CN
75 // Using self-signed certificates has the following security risks:
76 // 1. Encryption without authentication and thus vulnerable to
77 // man-in-the-middle attacks.
78 // 2. Self-signed certificates cannot be revoked.
80 // Use this certificate only after the above risks are acknowledged.
81 NET_EXPORT
bool CreateKeyAndSelfSignedCert(
82 const std::string
& subject
,
84 base::Time not_valid_before
,
85 base::Time not_valid_after
,
86 scoped_ptr
<crypto::RSAPrivateKey
>* key
,
87 std::string
* der_cert
);
89 // Creates a self-signed certificate from a provided key, using the specified
90 // hash algorithm. You should not re-use a key for signing data with multiple
91 // signature algorithms or parameters.
92 NET_EXPORT
bool CreateSelfSignedCert(crypto::RSAPrivateKey
* key
,
94 const std::string
& subject
,
96 base::Time not_valid_before
,
97 base::Time not_valid_after
,
98 std::string
* der_cert
);
100 // Comparator for use in STL algorithms that will sort client certificates by
101 // order of preference.
102 // Returns true if |a| is more preferable than |b|, allowing it to be used
103 // with any algorithm that compares according to strict weak ordering.
106 // - Prefer certificates that have a longer validity period (later
108 // - If equal, prefer certificates that were issued more recently
109 // - If equal, prefer shorter chains (if available)
110 class NET_EXPORT_PRIVATE ClientCertSorter
{
115 const scoped_refptr
<X509Certificate
>& a
,
116 const scoped_refptr
<X509Certificate
>& b
) const;
122 } // namespace x509_util
126 #endif // NET_CERT_X509_UTIL_H_