| OLD | NEW |
| (Empty) |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/cert/ct_log_verifier.h" | |
| 6 | |
| 7 #include "base/logging.h" | |
| 8 #include "net/cert/ct_serialization.h" | |
| 9 #include "net/cert/signed_tree_head.h" | |
| 10 | |
| 11 namespace net { | |
| 12 | |
| 13 // static | |
| 14 scoped_ptr<CTLogVerifier> CTLogVerifier::Create( | |
| 15 const base::StringPiece& public_key, | |
| 16 const base::StringPiece& description) { | |
| 17 scoped_ptr<CTLogVerifier> result(new CTLogVerifier()); | |
| 18 if (!result->Init(public_key, description)) | |
| 19 result.reset(); | |
| 20 return result.Pass(); | |
| 21 } | |
| 22 | |
| 23 bool CTLogVerifier::Verify(const ct::LogEntry& entry, | |
| 24 const ct::SignedCertificateTimestamp& sct) { | |
| 25 if (sct.log_id != key_id()) { | |
| 26 DVLOG(1) << "SCT is not signed by this log."; | |
| 27 return false; | |
| 28 } | |
| 29 | |
| 30 if (!SignatureParametersMatch(sct.signature)) | |
| 31 return false; | |
| 32 | |
| 33 std::string serialized_log_entry; | |
| 34 if (!ct::EncodeLogEntry(entry, &serialized_log_entry)) { | |
| 35 DVLOG(1) << "Unable to serialize entry."; | |
| 36 return false; | |
| 37 } | |
| 38 std::string serialized_data; | |
| 39 if (!ct::EncodeV1SCTSignedData(sct.timestamp, serialized_log_entry, | |
| 40 sct.extensions, &serialized_data)) { | |
| 41 DVLOG(1) << "Unable to create SCT to verify."; | |
| 42 return false; | |
| 43 } | |
| 44 | |
| 45 return VerifySignature(serialized_data, sct.signature.signature_data); | |
| 46 } | |
| 47 | |
| 48 bool CTLogVerifier::SetSignedTreeHead( | |
| 49 scoped_ptr<ct::SignedTreeHead> signed_tree_head) { | |
| 50 if (!SignatureParametersMatch(signed_tree_head->signature)) | |
| 51 return false; | |
| 52 | |
| 53 std::string serialized_data; | |
| 54 ct::EncodeTreeHeadSignature(*signed_tree_head.get(), &serialized_data); | |
| 55 if (VerifySignature(serialized_data, | |
| 56 signed_tree_head->signature.signature_data)) { | |
| 57 signed_tree_head_.reset(signed_tree_head.release()); | |
| 58 return true; | |
| 59 } | |
| 60 return false; | |
| 61 } | |
| 62 | |
| 63 bool CTLogVerifier::SignatureParametersMatch( | |
| 64 const ct::DigitallySigned& signature) { | |
| 65 if (!signature.SignatureParametersMatch(hash_algorithm_, | |
| 66 signature_algorithm_)) { | |
| 67 DVLOG(1) << "Mismatched hash or signature algorithm. Hash: " | |
| 68 << hash_algorithm_ << " vs " << signature.hash_algorithm | |
| 69 << " Signature: " << signature_algorithm_ << " vs " | |
| 70 << signature.signature_algorithm << "."; | |
| 71 return false; | |
| 72 } | |
| 73 | |
| 74 return true; | |
| 75 } | |
| 76 | |
| 77 } // namespace net | |
| OLD | NEW |