mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-12-07 13:24:12 +00:00
08a30eac51
MozReview-Commit-ID: 3iHUdZrzyXB --HG-- extra : rebase_source : d5590733c87c3a8a525eb29dabfdb9be2822a0a6
88 lines
3.7 KiB
C++
88 lines
3.7 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef MultiLogCTVerifier_h
|
|
#define MultiLogCTVerifier_h
|
|
|
|
#include "CTLogVerifier.h"
|
|
#include "CTVerifyResult.h"
|
|
#include "mozilla/Vector.h"
|
|
#include "pkix/Input.h"
|
|
#include "pkix/Result.h"
|
|
#include "pkix/Time.h"
|
|
#include "SignedCertificateTimestamp.h"
|
|
|
|
namespace mozilla { namespace ct {
|
|
|
|
// A Certificate Transparency verifier that can verify Signed Certificate
|
|
// Timestamps from multiple logs.
|
|
class MultiLogCTVerifier
|
|
{
|
|
public:
|
|
// Adds a new log to the list of known logs to verify against.
|
|
pkix::Result AddLog(CTLogVerifier&& log);
|
|
|
|
// Verifies SCTs embedded in the certificate itself, SCTs embedded in a
|
|
// stapled OCSP response, and SCTs obtained via the
|
|
// signed_certificate_timestamp TLS extension on the given |cert|.
|
|
//
|
|
// A certificate is permitted but not required to use multiple sources for
|
|
// SCTs. It is expected that most certificates will use only one source
|
|
// (embedding, TLS extension or OCSP stapling).
|
|
//
|
|
// The verifier stops on fatal errors (such as out of memory or invalid
|
|
// DER encoding of |cert|), but it does not stop on SCT decoding errors. See
|
|
// CTVerifyResult for more details.
|
|
//
|
|
// The internal state of the verifier object is not modified
|
|
// during the verification process.
|
|
//
|
|
// |cert| DER-encoded certificate to be validated using the provided SCTs.
|
|
// |sctListFromCert| SCT list embedded in |cert|, empty if not present.
|
|
// |issuerSubjectPublicKeyInfo| SPKI of |cert|'s issuer. Can be empty,
|
|
// in which case the embedded SCT list
|
|
// won't be verified.
|
|
// |sctListFromOCSPResponse| SCT list included in a stapled OCSP response
|
|
// for |cert|. Empty if not available.
|
|
// |sctListFromTLSExtension| is the SCT list from the TLS extension. Empty
|
|
// if no extension was present.
|
|
// |time| the current time. Used to make sure SCTs are not in the future.
|
|
// |result| will be filled with the SCTs present, divided into categories
|
|
// based on the verification result.
|
|
pkix::Result Verify(pkix::Input cert,
|
|
pkix::Input issuerSubjectPublicKeyInfo,
|
|
pkix::Input sctListFromCert,
|
|
pkix::Input sctListFromOCSPResponse,
|
|
pkix::Input sctListFromTLSExtension,
|
|
pkix::Time time,
|
|
CTVerifyResult& result);
|
|
|
|
private:
|
|
// Verifies a list of SCTs from |encodedSctList| over |expectedEntry|,
|
|
// placing the verification results in |result|. The SCTs in the list
|
|
// come from |origin| (as will be reflected in the origin field of each SCT).
|
|
pkix::Result VerifySCTs(pkix::Input encodedSctList,
|
|
const LogEntry& expectedEntry,
|
|
VerifiedSCT::Origin origin,
|
|
pkix::Time time,
|
|
CTVerifyResult& result);
|
|
|
|
// Verifies a single, parsed SCT against all known logs.
|
|
// Note: moves |sct| to the target list in |result|, invalidating |sct|.
|
|
pkix::Result VerifySingleSCT(SignedCertificateTimestamp&& sct,
|
|
const ct::LogEntry& expectedEntry,
|
|
VerifiedSCT::Origin origin,
|
|
pkix::Time time,
|
|
CTVerifyResult& result);
|
|
|
|
// The list of known logs.
|
|
Vector<CTLogVerifier> mLogs;
|
|
};
|
|
|
|
} } // namespace mozilla::ct
|
|
|
|
#endif // MultiLogCTVerifier_h
|