• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "net/cert/x509_util.h"
6 
7 #include "base/basictypes.h"
8 #include "base/memory/scoped_ptr.h"
9 #include "base/time/time.h"
10 #include "crypto/ec_private_key.h"
11 #include "crypto/rsa_private_key.h"
12 #include "net/cert/x509_certificate.h"
13 
14 namespace net {
15 
16 namespace x509_util {
17 
18 // RSA keys created by CreateKeyAndSelfSignedCert will be of this length.
19 static const uint16 kRSAKeyLength = 1024;
20 
21 // Certificates made by CreateKeyAndSelfSignedCert and
22 //  CreateKeyAndChannelIDEC will be signed using this digest algorithm.
23 static const DigestAlgorithm kSignatureDigestAlgorithm = DIGEST_SHA256;
24 
ClientCertSorter()25 ClientCertSorter::ClientCertSorter() : now_(base::Time::Now()) {}
26 
operator ()(const scoped_refptr<X509Certificate> & a,const scoped_refptr<X509Certificate> & b) const27 bool ClientCertSorter::operator()(
28     const scoped_refptr<X509Certificate>& a,
29     const scoped_refptr<X509Certificate>& b) const {
30   // Certificates that are null are sorted last.
31   if (!a.get() || !b.get())
32     return a.get() && !b.get();
33 
34   // Certificates that are expired/not-yet-valid are sorted last.
35   bool a_is_valid = now_ >= a->valid_start() && now_ <= a->valid_expiry();
36   bool b_is_valid = now_ >= b->valid_start() && now_ <= b->valid_expiry();
37   if (a_is_valid != b_is_valid)
38     return a_is_valid && !b_is_valid;
39 
40   // Certificates with longer expirations appear as higher priority (less
41   // than) certificates with shorter expirations.
42   if (a->valid_expiry() != b->valid_expiry())
43     return a->valid_expiry() > b->valid_expiry();
44 
45   // If the expiration dates are equivalent, certificates that were issued
46   // more recently should be prioritized over older certificates.
47   if (a->valid_start() != b->valid_start())
48     return a->valid_start() > b->valid_start();
49 
50   // Otherwise, prefer client certificates with shorter chains.
51   const X509Certificate::OSCertHandles& a_intermediates =
52       a->GetIntermediateCertificates();
53   const X509Certificate::OSCertHandles& b_intermediates =
54       b->GetIntermediateCertificates();
55   return a_intermediates.size() < b_intermediates.size();
56 }
57 
CreateKeyAndChannelIDEC(const std::string & domain,uint32 serial_number,base::Time not_valid_before,base::Time not_valid_after,scoped_ptr<crypto::ECPrivateKey> * key,std::string * der_cert)58 bool CreateKeyAndChannelIDEC(const std::string& domain,
59                              uint32 serial_number,
60                              base::Time not_valid_before,
61                              base::Time not_valid_after,
62                              scoped_ptr<crypto::ECPrivateKey>* key,
63                              std::string* der_cert) {
64   scoped_ptr<crypto::ECPrivateKey> new_key(crypto::ECPrivateKey::Create());
65   if (!new_key.get())
66     return false;
67 
68   bool success = CreateChannelIDEC(new_key.get(),
69                                    kSignatureDigestAlgorithm,
70                                    domain,
71                                    serial_number,
72                                    not_valid_before,
73                                    not_valid_after,
74                                    der_cert);
75   if (success)
76     key->reset(new_key.release());
77 
78   return success;
79 }
80 
CreateKeyAndSelfSignedCert(const std::string & subject,uint32 serial_number,base::Time not_valid_before,base::Time not_valid_after,scoped_ptr<crypto::RSAPrivateKey> * key,std::string * der_cert)81 bool CreateKeyAndSelfSignedCert(const std::string& subject,
82                                 uint32 serial_number,
83                                 base::Time not_valid_before,
84                                 base::Time not_valid_after,
85                                 scoped_ptr<crypto::RSAPrivateKey>* key,
86                                 std::string* der_cert) {
87   scoped_ptr<crypto::RSAPrivateKey> new_key(
88       crypto::RSAPrivateKey::Create(kRSAKeyLength));
89   if (!new_key.get())
90     return false;
91 
92   bool success = CreateSelfSignedCert(new_key.get(),
93                                       kSignatureDigestAlgorithm,
94                                       subject,
95                                       serial_number,
96                                       not_valid_before,
97                                       not_valid_after,
98                                       der_cert);
99   if (success)
100     key->reset(new_key.release());
101 
102   return success;
103 }
104 
105 }  // namespace x509_util
106 
107 }  // namespace net
108