blob: d70ba4581f5c364fdeae5d44c9202ee32645bd8f [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <map>
#include <string>
#include "base/memory/linked_ptr.h"
#include "base/memory/scoped_ptr.h"
#include "net/base/net_export.h"
#include "net/cert/ct_verifier.h"
#include "net/cert/signed_certificate_timestamp.h"
namespace net {
namespace ct {
struct LogEntry;
} // namespace ct
class CTLogVerifier;
// A Certificate Transparency verifier that can verify Signed Certificate
// Timestamps from multiple logs.
// There should be a global instance of this class and for all known logs,
// AddLog should be called with a CTLogVerifier (which is created from the
// log's public key).
class NET_EXPORT MultiLogCTVerifier : public CTVerifier {
virtual ~MultiLogCTVerifier();
void AddLog(scoped_ptr<CTLogVerifier> log_verifier);
// CTVerifier implementation:
virtual int Verify(X509Certificate* cert,
const std::string& stapled_ocsp_response,
const std::string& sct_list_from_tls_extension,
ct::CTVerifyResult* result,
const BoundNetLog& net_log) OVERRIDE;
// Mapping from a log's ID to the verifier for this log.
// A log's ID is the SHA-256 of the log's key, as defined in section 3.2.
// of RFC6962.
typedef std::map<std::string, linked_ptr<CTLogVerifier> > IDToLogMap;
// Verify a list of SCTs from |encoded_sct_list| over |expected_entry|,
// placing the verification results in |result|. The SCTs in the list
// come from |origin| (as will be indicated in the origin field of each SCT).
bool VerifySCTs(const std::string& encoded_sct_list,
const ct::LogEntry& expected_entry,
ct::SignedCertificateTimestamp::Origin origin,
ct::CTVerifyResult* result);
// Verifies a single, parsed SCT against all logs.
bool VerifySingleSCT(
scoped_refptr<ct::SignedCertificateTimestamp> sct,
const ct::LogEntry& expected_entry,
ct::CTVerifyResult* result);
IDToLogMap logs_;
} // namespace net