Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(264)

Side by Side Diff: net/cert/ct_verifier.h

Issue 1216153010: Certificate Transparency: Add observer for Signed Certificate Timestamps (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | net/cert/ct_verifier.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_CERT_CT_VERIFIER_H_ 5 #ifndef NET_CERT_CT_VERIFIER_H_
6 #define NET_CERT_CT_VERIFIER_H_ 6 #define NET_CERT_CT_VERIFIER_H_
7 7
8 #include <string>
9
10 #include "base/memory/ref_counted.h"
8 #include "net/base/net_export.h" 11 #include "net/base/net_export.h"
9 12
10 namespace net { 13 namespace net {
11 14
12 namespace ct { 15 namespace ct {
13 struct CTVerifyResult; 16 struct CTVerifyResult;
17 struct SignedCertificateTimestamp;
14 } // namespace ct 18 } // namespace ct
15 19
16 class BoundNetLog; 20 class BoundNetLog;
21 class CTLogVerifier;
17 class X509Certificate; 22 class X509Certificate;
18 23
19 // Interface for verifying Signed Certificate Timestamps over a certificate. 24 // Interface for verifying Signed Certificate Timestamps over a certificate.
20 class NET_EXPORT CTVerifier { 25 class NET_EXPORT CTVerifier {
21 public: 26 public:
22 virtual ~CTVerifier() {} 27 class NET_EXPORT Observer {
28 public:
29 // Called for each Signed Certificate Timestamp from a known log that vas
30 // verified successfully (i.e. the signature verifies). |sct| is the
31 // Signed Certificate Timestamp, |log_verifier| is the log issuing this
32 // SCT.
33 // TODO(eranm): The certificate itself is also necessary for calculating
34 // the hash of the log entry. Will be added when implementing inclusion
35 // checking functionality.
Ryan Sleevi 2015/07/02 13:23:08 Why not have this interface provide the certificat
Eran Messeri 2015/07/02 14:12:51 Done.
36 virtual void OnSCTVerified(const ct::SignedCertificateTimestamp* sct,
37 scoped_refptr<CTLogVerifier> log_verifier) = 0;
Ryan Sleevi 2015/07/02 13:23:08 FIRST ORDER DESIGN: Why pass this as a scoped_refp
Eran Messeri 2015/07/02 14:12:52 Good point, the observer can hold a list of CTLogV
38 };
39
40 virtual ~CTVerifier();
Ryan Sleevi 2015/07/02 13:23:08 It's unclear why you're no longer inlining this? T
Eran Messeri 2015/07/02 14:12:51 Reverted.
23 41
24 // Verifies SCTs embedded in the certificate itself, SCTs embedded in a 42 // Verifies SCTs embedded in the certificate itself, SCTs embedded in a
25 // stapled OCSP response, and SCTs obtained via the 43 // stapled OCSP response, and SCTs obtained via the
26 // signed_certificate_timestamp TLS extension on the given |cert|. 44 // signed_certificate_timestamp TLS extension on the given |cert|.
27 // A certificate is permitted but not required to use multiple sources for 45 // A certificate is permitted but not required to use multiple sources for
28 // SCTs. It is expected that most certificates will use only one source 46 // SCTs. It is expected that most certificates will use only one source
29 // (embedding, TLS extension or OCSP stapling). If no stapled OCSP response 47 // (embedding, TLS extension or OCSP stapling). If no stapled OCSP response
30 // is available, |stapled_ocsp_response| should be an empty string. If no SCT 48 // is available, |stapled_ocsp_response| should be an empty string. If no SCT
31 // TLS extension was negotiated, |sct_list_from_tls_extension| should be an 49 // TLS extension was negotiated, |sct_list_from_tls_extension| should be an
32 // empty string. |result| will be filled with the SCTs present, divided into 50 // empty string. |result| will be filled with the SCTs present, divided into
33 // categories based on the verification result. 51 // categories based on the verification result.
34 virtual int Verify(X509Certificate* cert, 52 virtual int Verify(X509Certificate* cert,
35 const std::string& stapled_ocsp_response, 53 const std::string& stapled_ocsp_response,
36 const std::string& sct_list_from_tls_extension, 54 const std::string& sct_list_from_tls_extension,
37 ct::CTVerifyResult* result, 55 ct::CTVerifyResult* result,
38 const BoundNetLog& net_log) = 0; 56 const BoundNetLog& net_log) = 0;
57
58 virtual void StopNotifications() = 0;
Ryan Sleevi 2015/07/02 13:23:08 Document. Seems like this would be more logical a
Eran Messeri 2015/07/02 14:12:52 Using SetObserver(nullptr) would definitely do the
59
60 // Registers |observer| to receive notifications of validated SCTs. Does not
61 // take ownership of the observer as the observer may be performing
62 // URLRequests which have to be cancelled before this object is destroyed.
63 virtual void SetObserver(Observer* observer) = 0;
39 }; 64 };
40 65
41 } // namespace net 66 } // namespace net
42 67
43 #endif // NET_CERT_CT_VERIFIER_H_ 68 #endif // NET_CERT_CT_VERIFIER_H_
OLDNEW
« no previous file with comments | « no previous file | net/cert/ct_verifier.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698