Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(446)

Unified Diff: net/cert/ct_log_verifier.h

Issue 55953002: CT: Adding SCT verification functionality: A CTLogVerifier instance can verify SCTs signed by a sin… (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Sorting out const castness Created 7 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | net/cert/ct_log_verifier.cc » ('j') | net/cert/ct_log_verifier_nss.cc » ('J')
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cert/ct_log_verifier.h
diff --git a/net/cert/ct_log_verifier.h b/net/cert/ct_log_verifier.h
new file mode 100644
index 0000000000000000000000000000000000000000..6a1b3a8220c4bfdee9533d0151939b5529e02a84
--- /dev/null
+++ b/net/cert/ct_log_verifier.h
@@ -0,0 +1,78 @@
+// Copyright (c) 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef NET_CERT_CT_LOG_VERIFIER_H_
+#define NET_CERT_CT_LOG_VERIFIER_H_
+
+#include <string>
+
+#include "base/gtest_prod_util.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/strings/string_piece.h"
+#include "net/base/net_export.h"
+#include "net/cert/signed_certificate_timestamp.h"
+
+// Forward declare the crypto types to avoid having to include the full
+// headers.
+#if defined(USE_OPENSSL)
+typedef struct evp_pkey_st EVP_PKEY;
+#else
+typedef struct SECKEYPublicKeyStr SECKEYPublicKey;
+#endif
+
+namespace net {
+
+// Class for verifying Signed Certificate Timestamps (SCTs) provided by a
+// specific log (whose identity is provided during construction).
+class NET_EXPORT CTLogVerifier {
+ public:
+ // Creates a new CTLogVerifier that will verify SignedCertificateTimestamps
+ // using |public_key|, which is a DER-encoded SubjectPublicKeyInfo.
+ // If |public_key| refers to an unsupported public key, returns NULL.
+ // |description| is a textual description of the log.
+ static scoped_ptr<CTLogVerifier> Create(
+ const base::StringPiece& public_key,
+ const base::StringPiece& description);
+
+ ~CTLogVerifier();
+
+ // Returns the log's key ID (RFC6962, Section 3.2)
+ const std::string& key_id() const { return key_id_; }
+ // Returns the log's human-readable description.
+ const std::string& description() const { return description_; }
+
+ // Verifies that |sct| contains a valid signature for |entry|.
+ bool Verify(const ct::LogEntry& entry,
+ const ct::SignedCertificateTimestamp& sct);
+
+ private:
+ FRIEND_TEST_ALL_PREFIXES(CTLogVerifierTest, VerifySignature);
+
+ CTLogVerifier();
+
+ // Performs crypto-library specific initialization.
+ bool Init(const base::StringPiece& public_key,
+ const base::StringPiece& description);
+
+ // Performs the underlying verification using the selected public key. Note
+ // that |signature| contains the raw signature data (eg: without any
+ // DigitallySigned struct encoding).
+ bool VerifySignature(const base::StringPiece& data_to_sign,
+ const base::StringPiece& signature);
+
+ std::string key_id_;
+ std::string description_;
+ ct::DigitallySigned::HashAlgorithm hash_algorithm_;
+ ct::DigitallySigned::SignatureAlgorithm signature_algorithm_;
+
+#if defined(USE_OPENSSL)
+ EVP_PKEY* public_key_;
+#else
+ SECKEYPublicKey* public_key_;
+#endif
+};
+
+} // namespace net
+
+#endif // NET_CERT_CT_LOG_VERIFIER_H_
« no previous file with comments | « no previous file | net/cert/ct_log_verifier.cc » ('j') | net/cert/ct_log_verifier_nss.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698