blob: b34a54ae2249f334daed59af367fedc44dfc2971 [file] [log] [blame]
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_BROWSER_WEB_PACKAGE_SIGNED_EXCHANGE_SIGNATURE_VERIFIER_H_
#define CONTENT_BROWSER_WEB_PACKAGE_SIGNED_EXCHANGE_SIGNATURE_VERIFIER_H_
#include "base/memory/ref_counted.h"
#include "base/optional.h"
#include "content/common/content_export.h"
#include "net/cert/x509_certificate.h"
#include "services/network/ignore_errors_cert_verifier.h"
namespace base {
class CommandLine;
class Time;
} // namespace base
namespace content {
class SignedExchangeEnvelope;
class SignedExchangeDevToolsProxy;
// SignedExchangeSignatureVerifier verifies the signature of the given
// signed exchange. This is done by reconstructing the signed message
// and verifying the cryptographic signature enclosed in "Signature" response
// header (given as |input.signature|).
//
// Note that SignedExchangeSignatureVerifier does not ensure the validity
// of the certificate used to generate the signature, which can't be done
// synchronously. (See SignedExchangeCertFetcher for this logic.)
//
// https://wicg.github.io/webpackage/draft-yasskin-httpbis-origin-signed-exchanges-impl.html#signature-validity
class CONTENT_EXPORT SignedExchangeSignatureVerifier final {
public:
// This enum is used for recording histograms. Treat as append-only.
enum class Result {
kSuccess,
kErrNoCertificate,
kErrNoCertificateSHA256,
kErrCertificateSHA256Mismatch,
kErrInvalidSignatureFormat,
kErrSignatureVerificationFailed,
kErrInvalidSignatureIntegrity,
kErrInvalidTimestamp,
kErrUnsupportedCertType,
kMaxValue = kErrUnsupportedCertType
};
// An utility class which holds a set of certificates which errors should be
// ignored. It parses a comma-delimited list of base64-encoded SHA-256 SPKI
// fingerprints, and can query if a certificate is included in the set.
// CONTENT_EXPORT since it is used from the unit test.
class CONTENT_EXPORT IgnoreErrorsSPKIList {
public:
explicit IgnoreErrorsSPKIList(const base::CommandLine& command_line);
~IgnoreErrorsSPKIList();
bool ShouldIgnoreError(scoped_refptr<net::X509Certificate> certificate);
private:
FRIEND_TEST_ALL_PREFIXES(SignedExchangeSignatureVerifierTest,
IgnoreErrorsSPKIList);
explicit IgnoreErrorsSPKIList(const std::string& spki_list);
void Parse(const std::string& spki_list);
network::IgnoreErrorsCertVerifier::SPKIHashSet hash_set_;
DISALLOW_COPY_AND_ASSIGN(IgnoreErrorsSPKIList);
};
static Result Verify(const SignedExchangeEnvelope& envelope,
scoped_refptr<net::X509Certificate> certificate,
const base::Time& verification_time,
SignedExchangeDevToolsProxy* devtools_proxy);
};
} // namespace content
#endif // CONTENT_BROWSER_WEB_PACKAGE_SIGNED_EXCHANGE_SIGNATURE_VERIFIER_H_