Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(124)

Side by Side Diff: net/cert/ct_objects_extractor.h

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/cert/ct_log_verifier_unittest.cc ('k') | net/cert/ct_objects_extractor_nss.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef NET_CERT_CT_OBJECTS_EXTRACTOR_H_
6 #define NET_CERT_CT_OBJECTS_EXTRACTOR_H_
7
8 #include <string>
9
10 #include "net/base/net_export.h"
11 #include "net/cert/x509_certificate.h"
12
13 namespace net {
14
15 namespace ct {
16
17 struct LogEntry;
18
19 // Extracts a SignedCertificateTimestampList that has been embedded within a
20 // leaf cert as an X.509v3 extension with the OID 1.3.6.1.4.1.11129.2.4.2.
21 // If the extension is present, returns true, updating |*sct_list| to contain
22 // the encoded list, minus the DER encoding necessary for the extension.
23 // |*sct_list| can then be further decoded with ct::DecodeSCTList
24 NET_EXPORT_PRIVATE bool ExtractEmbeddedSCTList(
25 X509Certificate::OSCertHandle cert,
26 std::string* sct_list);
27
28 // Obtains a PrecertChain log entry for |leaf|, an X.509v3 certificate that
29 // contains an X.509v3 extension with the OID 1.3.6.1.4.1.11129.2.4.2. On
30 // success, fills |*result| with the data for a PrecertChain log entry and
31 // returns true.
32 // The filled |*result| should be verified using ct::CTLogVerifier::Verify
33 // Note: If |leaf| does not contain the required extension, it is treated as
34 // a failure.
35 NET_EXPORT_PRIVATE bool GetPrecertLogEntry(X509Certificate::OSCertHandle leaf,
36 X509Certificate::OSCertHandle issuer,
37 LogEntry* result);
38
39 // Obtains an X509Chain log entry for |leaf|, an X.509v3 certificate that
40 // is not expected to contain an X.509v3 extension with the OID
41 // 1.3.6.1.4.1.11129.2.4.2 (meaning a certificate without an embedded SCT).
42 // On success, fills |result| with the data for an X509Chain log entry and
43 // returns true.
44 // The filled |*result| should be verified using ct::CTLogVerifier::Verify
45 NET_EXPORT_PRIVATE bool GetX509LogEntry(X509Certificate::OSCertHandle leaf,
46 LogEntry* result);
47
48 // Extracts a SignedCertificateTimestampList that has been embedded within
49 // an OCSP response as an extension with the OID 1.3.6.1.4.1.11129.2.4.5.
50 // If the extension is present, and the response matches the issuer and
51 // serial number, returns true, updating |*sct_list| to contain
52 // the encoded list, minus the DER encoding necessary for the extension.
53 // |*sct_list| can then be further decoded with ct::DecodeSCTList.
54 NET_EXPORT_PRIVATE bool ExtractSCTListFromOCSPResponse(
55 X509Certificate::OSCertHandle issuer,
56 const std::string& cert_serial_number,
57 const std::string& ocsp_response,
58 std::string* sct_list);
59
60 } // namespace ct
61
62 } // namespace net
63
64 #endif // NET_CERT_CT_OBJECTS_EXTRACTOR_H_
OLDNEW
« no previous file with comments | « net/cert/ct_log_verifier_unittest.cc ('k') | net/cert/ct_objects_extractor_nss.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698