summaryrefslogtreecommitdiff
path: root/chromium/net/cert/multi_log_ct_verifier.h
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/cert/multi_log_ct_verifier.h')
-rw-r--r--chromium/net/cert/multi_log_ct_verifier.h71
1 files changed, 71 insertions, 0 deletions
diff --git a/chromium/net/cert/multi_log_ct_verifier.h b/chromium/net/cert/multi_log_ct_verifier.h
new file mode 100644
index 00000000000..d70ba4581f5
--- /dev/null
+++ b/chromium/net/cert/multi_log_ct_verifier.h
@@ -0,0 +1,71 @@
+// Copyright 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef NET_CERT_MULTI_LOG_CT_VERIFIER_H_
+#define NET_CERT_MULTI_LOG_CT_VERIFIER_H_
+
+#include <map>
+#include <string>
+
+#include "base/memory/linked_ptr.h"
+#include "base/memory/scoped_ptr.h"
+#include "net/base/net_export.h"
+#include "net/cert/ct_verifier.h"
+#include "net/cert/signed_certificate_timestamp.h"
+
+namespace net {
+
+namespace ct {
+struct LogEntry;
+} // namespace ct
+
+class CTLogVerifier;
+
+// A Certificate Transparency verifier that can verify Signed Certificate
+// Timestamps from multiple logs.
+// There should be a global instance of this class and for all known logs,
+// AddLog should be called with a CTLogVerifier (which is created from the
+// log's public key).
+class NET_EXPORT MultiLogCTVerifier : public CTVerifier {
+ public:
+ MultiLogCTVerifier();
+ virtual ~MultiLogCTVerifier();
+
+ void AddLog(scoped_ptr<CTLogVerifier> log_verifier);
+
+ // CTVerifier implementation:
+ virtual int Verify(X509Certificate* cert,
+ const std::string& stapled_ocsp_response,
+ const std::string& sct_list_from_tls_extension,
+ ct::CTVerifyResult* result,
+ const BoundNetLog& net_log) OVERRIDE;
+
+ private:
+ // Mapping from a log's ID to the verifier for this log.
+ // A log's ID is the SHA-256 of the log's key, as defined in section 3.2.
+ // of RFC6962.
+ typedef std::map<std::string, linked_ptr<CTLogVerifier> > IDToLogMap;
+
+ // Verify a list of SCTs from |encoded_sct_list| over |expected_entry|,
+ // placing the verification results in |result|. The SCTs in the list
+ // come from |origin| (as will be indicated in the origin field of each SCT).
+ bool VerifySCTs(const std::string& encoded_sct_list,
+ const ct::LogEntry& expected_entry,
+ ct::SignedCertificateTimestamp::Origin origin,
+ ct::CTVerifyResult* result);
+
+ // Verifies a single, parsed SCT against all logs.
+ bool VerifySingleSCT(
+ scoped_refptr<ct::SignedCertificateTimestamp> sct,
+ const ct::LogEntry& expected_entry,
+ ct::CTVerifyResult* result);
+
+ IDToLogMap logs_;
+
+ DISALLOW_COPY_AND_ASSIGN(MultiLogCTVerifier);
+};
+
+} // namespace net
+
+#endif // NET_CERT_MULTI_LOG_CT_VERIFIER_H_