| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/cert/ct_log_verifier.h" | 5 #include "net/cert/ct_log_verifier.h" |
| 6 | 6 |
| 7 #include "base/logging.h" | 7 #include "base/logging.h" |
| 8 #include "net/cert/ct_serialization.h" | 8 #include "net/cert/ct_serialization.h" |
| 9 #include "net/cert/signed_tree_head.h" | 9 #include "net/cert/signed_tree_head.h" |
| 10 | 10 |
| 11 namespace net { | 11 namespace net { |
| 12 | 12 |
| 13 // static | 13 // static |
| 14 scoped_refptr<CTLogVerifier> CTLogVerifier::Create( | 14 scoped_refptr<const CTLogVerifier> CTLogVerifier::Create( |
| 15 const base::StringPiece& public_key, | 15 const base::StringPiece& public_key, |
| 16 const base::StringPiece& description, | 16 const base::StringPiece& description, |
| 17 const base::StringPiece& url) { | 17 const base::StringPiece& url) { |
| 18 GURL log_url(url.as_string()); | 18 GURL log_url(url.as_string()); |
| 19 if (!log_url.is_valid()) | 19 if (!log_url.is_valid()) |
| 20 return nullptr; | 20 return nullptr; |
| 21 scoped_refptr<CTLogVerifier> result(new CTLogVerifier(description, log_url)); | 21 scoped_refptr<CTLogVerifier> result(new CTLogVerifier(description, log_url)); |
| 22 if (!result->Init(public_key)) | 22 if (!result->Init(public_key)) |
| 23 return nullptr; | 23 return nullptr; |
| 24 return result; | 24 return result; |
| 25 } | 25 } |
| 26 | 26 |
| 27 CTLogVerifier::CTLogVerifier(const base::StringPiece& description, | 27 CTLogVerifier::CTLogVerifier(const base::StringPiece& description, |
| 28 const GURL& url) | 28 const GURL& url) |
| 29 : description_(description.as_string()), | 29 : description_(description.as_string()), |
| 30 url_(url), | 30 url_(url), |
| 31 hash_algorithm_(ct::DigitallySigned::HASH_ALGO_NONE), | 31 hash_algorithm_(ct::DigitallySigned::HASH_ALGO_NONE), |
| 32 signature_algorithm_(ct::DigitallySigned::SIG_ALGO_ANONYMOUS), | 32 signature_algorithm_(ct::DigitallySigned::SIG_ALGO_ANONYMOUS), |
| 33 public_key_(NULL) { | 33 public_key_(NULL) { |
| 34 DCHECK(url_.is_valid()); | 34 DCHECK(url_.is_valid()); |
| 35 } | 35 } |
| 36 | 36 |
| 37 bool CTLogVerifier::Verify(const ct::LogEntry& entry, | 37 bool CTLogVerifier::Verify(const ct::LogEntry& entry, |
| 38 const ct::SignedCertificateTimestamp& sct) { | 38 const ct::SignedCertificateTimestamp& sct) const { |
| 39 if (sct.log_id != key_id()) { | 39 if (sct.log_id != key_id()) { |
| 40 DVLOG(1) << "SCT is not signed by this log."; | 40 DVLOG(1) << "SCT is not signed by this log."; |
| 41 return false; | 41 return false; |
| 42 } | 42 } |
| 43 | 43 |
| 44 if (!SignatureParametersMatch(sct.signature)) | 44 if (!SignatureParametersMatch(sct.signature)) |
| 45 return false; | 45 return false; |
| 46 | 46 |
| 47 std::string serialized_log_entry; | 47 std::string serialized_log_entry; |
| 48 if (!ct::EncodeLogEntry(entry, &serialized_log_entry)) { | 48 if (!ct::EncodeLogEntry(entry, &serialized_log_entry)) { |
| 49 DVLOG(1) << "Unable to serialize entry."; | 49 DVLOG(1) << "Unable to serialize entry."; |
| 50 return false; | 50 return false; |
| 51 } | 51 } |
| 52 std::string serialized_data; | 52 std::string serialized_data; |
| 53 if (!ct::EncodeV1SCTSignedData(sct.timestamp, serialized_log_entry, | 53 if (!ct::EncodeV1SCTSignedData(sct.timestamp, serialized_log_entry, |
| 54 sct.extensions, &serialized_data)) { | 54 sct.extensions, &serialized_data)) { |
| 55 DVLOG(1) << "Unable to create SCT to verify."; | 55 DVLOG(1) << "Unable to create SCT to verify."; |
| 56 return false; | 56 return false; |
| 57 } | 57 } |
| 58 | 58 |
| 59 return VerifySignature(serialized_data, sct.signature.signature_data); | 59 return VerifySignature(serialized_data, sct.signature.signature_data); |
| 60 } | 60 } |
| 61 | 61 |
| 62 bool CTLogVerifier::VerifySignedTreeHead( | 62 bool CTLogVerifier::VerifySignedTreeHead( |
| 63 const ct::SignedTreeHead& signed_tree_head) { | 63 const ct::SignedTreeHead& signed_tree_head) const { |
| 64 if (!SignatureParametersMatch(signed_tree_head.signature)) | 64 if (!SignatureParametersMatch(signed_tree_head.signature)) |
| 65 return false; | 65 return false; |
| 66 | 66 |
| 67 std::string serialized_data; | 67 std::string serialized_data; |
| 68 ct::EncodeTreeHeadSignature(signed_tree_head, &serialized_data); | 68 ct::EncodeTreeHeadSignature(signed_tree_head, &serialized_data); |
| 69 if (VerifySignature(serialized_data, | 69 if (VerifySignature(serialized_data, |
| 70 signed_tree_head.signature.signature_data)) { | 70 signed_tree_head.signature.signature_data)) { |
| 71 return true; | 71 return true; |
| 72 } | 72 } |
| 73 return false; | 73 return false; |
| 74 } | 74 } |
| 75 | 75 |
| 76 bool CTLogVerifier::SignatureParametersMatch( | 76 bool CTLogVerifier::SignatureParametersMatch( |
| 77 const ct::DigitallySigned& signature) { | 77 const ct::DigitallySigned& signature) const { |
| 78 if (!signature.SignatureParametersMatch(hash_algorithm_, | 78 if (!signature.SignatureParametersMatch(hash_algorithm_, |
| 79 signature_algorithm_)) { | 79 signature_algorithm_)) { |
| 80 DVLOG(1) << "Mismatched hash or signature algorithm. Hash: " | 80 DVLOG(1) << "Mismatched hash or signature algorithm. Hash: " |
| 81 << hash_algorithm_ << " vs " << signature.hash_algorithm | 81 << hash_algorithm_ << " vs " << signature.hash_algorithm |
| 82 << " Signature: " << signature_algorithm_ << " vs " | 82 << " Signature: " << signature_algorithm_ << " vs " |
| 83 << signature.signature_algorithm << "."; | 83 << signature.signature_algorithm << "."; |
| 84 return false; | 84 return false; |
| 85 } | 85 } |
| 86 | 86 |
| 87 return true; | 87 return true; |
| 88 } | 88 } |
| 89 | 89 |
| 90 } // namespace net | 90 } // namespace net |
| OLD | NEW |