Chromium Code Reviews| Index: net/cert/multi_log_ct_verifier.h |
| diff --git a/net/cert/multi_log_ct_verifier.h b/net/cert/multi_log_ct_verifier.h |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..470d9b994c613a5d8d46975be4dd954fe1867109 |
| --- /dev/null |
| +++ b/net/cert/multi_log_ct_verifier.h |
| @@ -0,0 +1,70 @@ |
| +// Copyright 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#ifndef NET_CERT_MULTI_LOG_CT_VERIFIER_H_ |
| +#define NET_CERT_MULTI_LOG_CT_VERIFIER_H_ |
| + |
| +#include <map> |
| +#include <string> |
| + |
| +#include "base/memory/linked_ptr.h" |
| +#include "base/memory/scoped_ptr.h" |
| +#include "net/base/net_export.h" |
| +#include "net/cert/ct_verifier.h" |
| +#include "net/cert/signed_certificate_timestamp.h" |
| + |
| +namespace net { |
| + |
| +namespace ct { |
| +struct LogEntry; |
| +} // namespace ct |
| + |
| +class CTLogVerifier; |
| + |
| +// A Certificate Transparency verifier that can verify Signed Certificate |
| +// Timestamps from multiple logs. |
| +// There should be a global instance of this class and for all known logs, |
| +// AddLog should be called with a CTLogVerifier (which is created from the |
| +// log's public key). |
| +class NET_EXPORT MultiLogCTVerifier : public CTVerifier { |
| + public: |
| + MultiLogCTVerifier(); |
| + virtual ~MultiLogCTVerifier(); |
| + |
| + void AddLog(scoped_ptr<CTLogVerifier> log_verifier); |
| + |
| + // CTVerifier implementation: |
| + virtual int Verify(X509Certificate* cert, |
| + const std::string& sct_list_from_ocsp, |
| + const std::string& sct_list_from_tls_extension, |
| + ct::CTVerifyResult* result) OVERRIDE; |
| + |
| + private: |
| + // Mapping from a log's ID to the verifier for this log. |
| + // A log's ID is the SHA-256 of the log's key, as defined in section 3.2. |
| + // of RFC6962 |
| + typedef std::map<std::string, linked_ptr<CTLogVerifier> > IDToLogMap; |
| + |
| + // Verify a list of SCTs from |encoded_sct_list| over |expected_entry|, |
| + // placing the verification results in |result|. The SCTs in the list |
| + // come from |origin| (as will be indicated in the origin field of each SCT) |
|
wtc
2013/11/21 23:26:34
Nit: line 46 and line 51 are missing a period (.)
Eran M. (Google)
2013/11/23 21:02:07
Done.
|
| + bool VerifySCTs(const std::string& encoded_sct_list, |
| + const ct::LogEntry& expected_entry, |
| + ct::SignedCertificateTimestamp::Origin origin, |
| + ct::CTVerifyResult* result); |
| + |
| + // Verifies a single, parsed SCT against all logs. |
| + bool VerifySingleSCT( |
| + const ct::SignedCertificateTimestamp& sct, |
| + const ct::LogEntry& expected_entry, |
| + ct::CTVerifyResult* result); |
| + |
| + IDToLogMap logs_; |
| + |
| + DISALLOW_COPY_AND_ASSIGN(MultiLogCTVerifier); |
| +}; |
| + |
| +} // namespace net |
| + |
| +#endif // NET_CERT_MULTI_LOG_CT_VERIFIER_H_ |