/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef MultiLogCTVerifier_h #define MultiLogCTVerifier_h #include "CTLogVerifier.h" #include "CTVerifyResult.h" #include "mozilla/Vector.h" #include "pkix/Input.h" #include "pkix/Result.h" #include "pkix/Time.h" #include "SignedCertificateTimestamp.h" namespace mozilla { namespace ct { // A Certificate Transparency verifier that can verify Signed Certificate // Timestamps from multiple logs. class MultiLogCTVerifier { public: // Adds a new log to the list of known logs to verify against. pkix::Result AddLog(pkix::Input publicKey); // Verifies SCTs embedded in the certificate itself, SCTs embedded in a // stapled OCSP response, and SCTs obtained via the // signed_certificate_timestamp TLS extension on the given |cert|. // // A certificate is permitted but not required to use multiple sources for // SCTs. It is expected that most certificates will use only one source // (embedding, TLS extension or OCSP stapling). // // The verifier stops on fatal errors (such as out of memory or invalid // DER encoding of |cert|), but it does not stop on SCT decoding errors. See // CTVerifyResult for more details. // // The internal state of the verifier object is not modified // during the verification process. // // |cert| DER-encoded certificate to be validated using the provided SCTs. // |sctListFromCert| SCT list embedded in |cert|, empty if not present. // |issuerSubjectPublicKeyInfo| SPKI of |cert|'s issuer. Can be empty, // in which case the embedded SCT list // won't be verified. // |sctListFromOCSPResponse| SCT list included in a stapled OCSP response // for |cert|. Empty if not available. // |sctListFromTLSExtension| is the SCT list from the TLS extension. Empty // if no extension was present. // |time| the current time. Used to make sure SCTs are not in the future. // |result| will be filled with the SCTs present, divided into categories // based on the verification result. pkix::Result Verify(pkix::Input cert, pkix::Input issuerSubjectPublicKeyInfo, pkix::Input sctListFromCert, pkix::Input sctListFromOCSPResponse, pkix::Input sctListFromTLSExtension, pkix::Time time, CTVerifyResult& result); private: // Verifies a list of SCTs from |encodedSctList| over |expectedEntry|, // placing the verification results in |result|. The SCTs in the list // come from |origin| (as will be reflected in the origin field of each SCT). pkix::Result VerifySCTs(pkix::Input encodedSctList, const LogEntry& expectedEntry, SignedCertificateTimestamp::Origin origin, pkix::Time time, CTVerifyResult& result); // Verifies a single, parsed SCT against all known logs. // Note: moves |sct| to the target list in |result|, invalidating |sct|. pkix::Result VerifySingleSCT(SignedCertificateTimestamp&& sct, const ct::LogEntry& expectedEntry, pkix::Time time, CTVerifyResult& result); // The list of known logs. Vector mLogs; }; } } // namespace mozilla::ct #endif // MultiLogCTVerifier_h