Index: net/cert/multi_log_ct_verifier.h |
diff --git a/net/cert/multi_log_ct_verifier.h b/net/cert/multi_log_ct_verifier.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..7ceace0e45f3b0104de56249086a832f156ac0f1 |
--- /dev/null |
+++ b/net/cert/multi_log_ct_verifier.h |
@@ -0,0 +1,70 @@ |
+// Copyright 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef NET_CERT_MULTI_LOG_CT_VERIFIER_H_ |
+#define NET_CERT_MULTI_LOG_CT_VERIFIER_H_ |
+ |
+#include <map> |
+#include <string> |
+ |
+#include "base/memory/linked_ptr.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "net/base/net_export.h" |
+#include "net/cert/ct_verifier.h" |
+#include "net/cert/signed_certificate_timestamp.h" |
+ |
+namespace net { |
+ |
+namespace ct { |
+struct LogEntry; |
+} // namespace ct |
+ |
+class CTLogVerifier; |
+ |
+// A Certificate Transparency verifier that can verify Signed Certificate |
+// Timestamps from multiple logs. |
+// There should be a global instance of this class and for all known logs, |
+// AddLog should be called with a CTLogVerifier (which is created from the |
+// log's public key). |
+class NET_EXPORT MultiLogCTVerifier : public CTVerifier { |
+ public: |
+ MultiLogCTVerifier(); |
+ virtual ~MultiLogCTVerifier(); |
+ |
+ void AddLog(scoped_ptr<CTLogVerifier> log_verifier); |
+ |
+ // CTVerifier implementation: |
+ virtual int Verify(X509Certificate* cert, |
+ const std::string& sct_list_from_ocsp, |
+ const std::string& sct_list_from_tls_extension, |
+ ct::CTVerifyResult* result) OVERRIDE; |
+ |
+ private: |
+ // Mapping from a log's ID to the verifier for this log. |
+ // A log's ID is the SHA-256 of the log's key, as defined in section 3.2. |
+ // of RFC6962. |
+ typedef std::map<std::string, linked_ptr<CTLogVerifier> > IDToLogMap; |
+ |
+ // Verify a list of SCTs from |encoded_sct_list| over |expected_entry|, |
+ // placing the verification results in |result|. The SCTs in the list |
+ // come from |origin| (as will be indicated in the origin field of each SCT). |
+ bool VerifySCTs(const std::string& encoded_sct_list, |
+ const ct::LogEntry& expected_entry, |
+ ct::SignedCertificateTimestamp::Origin origin, |
+ ct::CTVerifyResult* result); |
+ |
+ // Verifies a single, parsed SCT against all logs. |
+ bool VerifySingleSCT( |
+ scoped_refptr<ct::SignedCertificateTimestamp> sct, |
+ const ct::LogEntry& expected_entry, |
+ ct::CTVerifyResult* result); |
+ |
+ IDToLogMap logs_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(MultiLogCTVerifier); |
+}; |
+ |
+} // namespace net |
+ |
+#endif // NET_CERT_MULTI_LOG_CT_VERIFIER_H_ |