Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(380)

Side by Side Diff: net/cert/ct_objects_extractor.h

Issue 92443002: Extract Certificate Transparency SCTs from stapled OCSP responses (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@extract_scts
Patch Set: fix format errors Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_CERT_CT_OBJECTS_EXTRACTOR_H_ 5 #ifndef NET_CERT_CT_OBJECTS_EXTRACTOR_H_
6 #define NET_CERT_CT_OBJECTS_EXTRACTOR_H_ 6 #define NET_CERT_CT_OBJECTS_EXTRACTOR_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "net/base/net_export.h" 10 #include "net/base/net_export.h"
(...skipping 27 matching lines...) Expand all
38 38
39 // Obtains an X509Chain log entry for |leaf|, an X.509v3 certificate that 39 // Obtains an X509Chain log entry for |leaf|, an X.509v3 certificate that
40 // is not expected to contain an X.509v3 extension with the OID 40 // is not expected to contain an X.509v3 extension with the OID
41 // 1.3.6.1.4.1.11129.2.4.2 (meaning a certificate without an embedded SCT). 41 // 1.3.6.1.4.1.11129.2.4.2 (meaning a certificate without an embedded SCT).
42 // On success, fills |result| with the data for an X509Chain log entry and 42 // On success, fills |result| with the data for an X509Chain log entry and
43 // returns true. 43 // returns true.
44 // The filled |*result| should be verified using ct::CTLogVerifier::Verify 44 // The filled |*result| should be verified using ct::CTLogVerifier::Verify
45 NET_EXPORT_PRIVATE bool GetX509LogEntry(X509Certificate::OSCertHandle leaf, 45 NET_EXPORT_PRIVATE bool GetX509LogEntry(X509Certificate::OSCertHandle leaf,
46 LogEntry* result); 46 LogEntry* result);
47 47
48 // Extracts a SignedCertificateTimestampList that has been embedded within
49 // an OCSP response as an extension with the OID 1.3.6.1.4.1.11129.2.4.5.
50 // If the extension is present, and the response matches the issuer and
51 // serial number, returns true, updating |*sct_list| to contain
52 // the encoded list, minus the DER encoding necessary for the extension.
53 // |*sct_list| can then be further decoded with ct::DecodeSCTList.
54 NET_EXPORT_PRIVATE bool ExtractSCTListFromOCSPResponse(
55 X509Certificate::OSCertHandle issuer,
56 const std::string& cert_serial_number,
57 const std::string& ocsp_response,
58 std::string* sct_list);
59
48 } // namespace ct 60 } // namespace ct
49 61
50 } // namespace net 62 } // namespace net
51 63
52 #endif // NET_CERT_CT_OBJECTS_EXTRACTOR_H_ 64 #endif // NET_CERT_CT_OBJECTS_EXTRACTOR_H_
OLDNEW
« no previous file with comments | « no previous file | net/cert/ct_objects_extractor_nss.cc » ('j') | net/cert/ct_objects_extractor_nss.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698