 Chromium Code Reviews
 Chromium Code Reviews Issue 92443002:
  Extract Certificate Transparency SCTs from stapled OCSP responses  (Closed) 
  Base URL: https://chromium.googlesource.com/chromium/src.git@extract_scts
    
  
    Issue 92443002:
  Extract Certificate Transparency SCTs from stapled OCSP responses  (Closed) 
  Base URL: https://chromium.googlesource.com/chromium/src.git@extract_scts| OLD | NEW | 
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be | 
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. | 
| 4 | 4 | 
| 5 #ifndef NET_CERT_CT_VERIFIER_H_ | 5 #ifndef NET_CERT_CT_VERIFIER_H_ | 
| 6 #define NET_CERT_CT_VERIFIER_H_ | 6 #define NET_CERT_CT_VERIFIER_H_ | 
| 7 | 7 | 
| 8 #include "net/base/net_export.h" | 8 #include "net/base/net_export.h" | 
| 9 | 9 | 
| 10 namespace net { | 10 namespace net { | 
| 11 | 11 | 
| 12 namespace ct { | 12 namespace ct { | 
| 13 struct CTVerifyResult; | 13 struct CTVerifyResult; | 
| 14 } // namespace ct | 14 } // namespace ct | 
| 15 | 15 | 
| 16 class BoundNetLog; | 16 class BoundNetLog; | 
| 17 class X509Certificate; | 17 class X509Certificate; | 
| 18 | 18 | 
| 19 // Interface for verifying Signed Certificate Timestamps over a certificate. | 19 // Interface for verifying Signed Certificate Timestamps over a certificate. | 
| 20 class NET_EXPORT CTVerifier { | 20 class NET_EXPORT CTVerifier { | 
| 21 public: | 21 public: | 
| 22 virtual ~CTVerifier() {} | 22 virtual ~CTVerifier() {} | 
| 23 | 23 | 
| 24 // Verifies either embedded SCTs or SCTs obtained via the | 24 // Verifies SCTs embedded in the certificate itself, SCTs embedded in a | 
| 25 // signed_certificate_timestamp TLS extension or OCSP on the given |cert| | 25 // stapled OCSP response, and SCTs obtained via the | 
| 26 // |result| will be filled with these SCTs, divided into categories based on | 26 // signed_certificate_timestamp TLS extension on the given |cert|. | 
| 27 // the verification result. | 27 // Only some SCT methods may be used for the given |cert|; unused | 
| 28 // |stapled_ocsp_response| and |sct_list_from_tls_extension| should be left | |
| 
Ryan Sleevi
2013/12/11 07:33:05
I don't understand the "unused" comment here, or t
 
ekasper
2013/12/11 15:40:51
Clarified.
 | |
| 29 // empty. |result| will be filled with these SCTs, divided into categories | |
| 30 // based on the verification result. | |
| 28 virtual int Verify(X509Certificate* cert, | 31 virtual int Verify(X509Certificate* cert, | 
| 29 const std::string& sct_list_from_ocsp, | 32 const std::string& stapled_ocsp_response, | 
| 30 const std::string& sct_list_from_tls_extension, | 33 const std::string& sct_list_from_tls_extension, | 
| 31 ct::CTVerifyResult* result, | 34 ct::CTVerifyResult* result, | 
| 32 const BoundNetLog& net_log) = 0; | 35 const BoundNetLog& net_log) = 0; | 
| 33 }; | 36 }; | 
| 34 | 37 | 
| 35 } // namespace net | 38 } // namespace net | 
| 36 | 39 | 
| 37 #endif // NET_CERT_CT_VERIFIER_H_ | 40 #endif // NET_CERT_CT_VERIFIER_H_ | 
| OLD | NEW |