mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-24 14:26:09 +03:00
112 lines
4.4 KiB
C
112 lines
4.4 KiB
C
|
// Copyright 2013 The Chromium Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style license that can be
|
||
|
// found in the LICENSE file.
|
||
|
|
||
|
#ifndef NET_CERT_CT_LOG_VERIFIER_H_
|
||
|
#define NET_CERT_CT_LOG_VERIFIER_H_
|
||
|
|
||
|
#include <string>
|
||
|
|
||
|
#include "base/gtest_prod_util.h"
|
||
|
#include "base/memory/ref_counted.h"
|
||
|
#include "base/strings/string_piece.h"
|
||
|
#include "net/base/net_export.h"
|
||
|
#include "net/cert/signed_certificate_timestamp.h"
|
||
|
|
||
|
// Forward declare the crypto types to avoid having to include the full
|
||
|
// headers.
|
||
|
typedef struct evp_pkey_st EVP_PKEY;
|
||
|
|
||
|
namespace net {
|
||
|
|
||
|
namespace ct {
|
||
|
struct MerkleAuditProof;
|
||
|
struct MerkleConsistencyProof;
|
||
|
struct SignedTreeHead;
|
||
|
} // namespace ct
|
||
|
|
||
|
// Class for verifying signatures of a single Certificate Transparency
|
||
|
// log, whose identity is provided during construction.
|
||
|
// Currently can verify Signed Certificate Timestamp (SCT) and Signed
|
||
|
// Tree Head (STH) signatures.
|
||
|
// Immutable: Does not hold any state beyond the log information it was
|
||
|
// initialized with.
|
||
|
class NET_EXPORT CTLogVerifier
|
||
|
: public base::RefCountedThreadSafe<CTLogVerifier> {
|
||
|
public:
|
||
|
// Creates a new CTLogVerifier that will verify SignedCertificateTimestamps
|
||
|
// using |public_key|, which is a DER-encoded SubjectPublicKeyInfo.
|
||
|
// If |public_key| refers to an unsupported public key, returns NULL.
|
||
|
// |description| is a textual description of the log.
|
||
|
// |dns_domain| is the DNS name of the log's DNS API endpoint, if one exists.
|
||
|
static scoped_refptr<const CTLogVerifier> Create(
|
||
|
const base::StringPiece& public_key,
|
||
|
std::string description,
|
||
|
std::string dns_domain);
|
||
|
|
||
|
// Returns the log's key ID (RFC6962, Section 3.2)
|
||
|
const std::string& key_id() const { return key_id_; }
|
||
|
// Returns the log's human-readable description.
|
||
|
const std::string& description() const { return description_; }
|
||
|
|
||
|
// Returns the log's DNS domain for CT over DNS queries, as described in
|
||
|
// https://github.com/google/certificate-transparency-rfcs/blob/master/dns/draft-ct-over-dns.md.
|
||
|
const std::string& dns_domain() const { return dns_domain_; }
|
||
|
|
||
|
// Verifies that |sct| is valid for |entry| and was signed by this log.
|
||
|
bool Verify(const ct::SignedEntryData& entry,
|
||
|
const ct::SignedCertificateTimestamp& sct) const;
|
||
|
|
||
|
// Verifies that |signed_tree_head| is a valid Signed Tree Head (RFC 6962,
|
||
|
// Section 3.5) for this log.
|
||
|
bool VerifySignedTreeHead(const ct::SignedTreeHead& signed_tree_head) const;
|
||
|
|
||
|
// Verifies that |proof| is a valid consistency proof (RFC 6962, Section
|
||
|
// 2.1.2) for this log, and which proves that |old_tree_hash| has
|
||
|
// been fully incorporated into the Merkle tree represented by
|
||
|
// |new_tree_hash|.
|
||
|
bool VerifyConsistencyProof(const ct::MerkleConsistencyProof& proof,
|
||
|
const std::string& old_tree_hash,
|
||
|
const std::string& new_tree_hash) const;
|
||
|
|
||
|
// Verifies that |proof| is a valid audit proof (RFC 6962, Section 2.1.1) for
|
||
|
// this log, and which proves that the certificate represented by |leaf_hash|
|
||
|
// has been incorporated into the Merkle tree represented by |root_hash|.
|
||
|
// Returns true if verification succeeds, false otherwise.
|
||
|
bool VerifyAuditProof(const ct::MerkleAuditProof& proof,
|
||
|
const std::string& root_hash,
|
||
|
const std::string& leaf_hash) const;
|
||
|
|
||
|
private:
|
||
|
FRIEND_TEST_ALL_PREFIXES(CTLogVerifierTest, VerifySignature);
|
||
|
friend class base::RefCountedThreadSafe<CTLogVerifier>;
|
||
|
|
||
|
CTLogVerifier(std::string description, std::string dns_domain);
|
||
|
~CTLogVerifier();
|
||
|
|
||
|
// Performs crypto-library specific initialization.
|
||
|
bool Init(const base::StringPiece& public_key);
|
||
|
|
||
|
// Performs the underlying verification using the selected public key. Note
|
||
|
// that |signature| contains the raw signature data (eg: without any
|
||
|
// DigitallySigned struct encoding).
|
||
|
bool VerifySignature(const base::StringPiece& data_to_sign,
|
||
|
const base::StringPiece& signature) const;
|
||
|
|
||
|
// Returns true if the signature and hash algorithms in |signature|
|
||
|
// match those of the log
|
||
|
bool SignatureParametersMatch(const ct::DigitallySigned& signature) const;
|
||
|
|
||
|
std::string key_id_;
|
||
|
std::string description_;
|
||
|
std::string dns_domain_;
|
||
|
ct::DigitallySigned::HashAlgorithm hash_algorithm_;
|
||
|
ct::DigitallySigned::SignatureAlgorithm signature_algorithm_;
|
||
|
|
||
|
EVP_PKEY* public_key_;
|
||
|
};
|
||
|
|
||
|
} // namespace net
|
||
|
|
||
|
#endif // NET_CERT_CT_LOG_VERIFIER_H_
|