summaryrefslogtreecommitdiff
path: root/chromium/net/cert/merkle_tree_leaf.cc
blob: 1030213ac259f8dc7db3a62e914d058d308f57d5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "net/cert/merkle_tree_leaf.h"

#include "crypto/sha2.h"
#include "net/cert/ct_objects_extractor.h"
#include "net/cert/ct_serialization.h"
#include "net/cert/x509_certificate.h"

namespace net {

namespace ct {

MerkleTreeLeaf::MerkleTreeLeaf() = default;

MerkleTreeLeaf::MerkleTreeLeaf(const MerkleTreeLeaf& other) = default;

MerkleTreeLeaf::MerkleTreeLeaf(MerkleTreeLeaf&&) = default;

MerkleTreeLeaf::~MerkleTreeLeaf() = default;

bool HashMerkleTreeLeaf(const MerkleTreeLeaf& tree_leaf, std::string* out) {
  // Prepend 0 byte as per RFC 6962, section-2.1
  std::string leaf_in_tls_format("\x00", 1);
  if (!EncodeTreeLeaf(tree_leaf, &leaf_in_tls_format))
    return false;

  *out = crypto::SHA256HashString(leaf_in_tls_format);
  return true;
}

bool GetMerkleTreeLeaf(const X509Certificate* cert,
                       const SignedCertificateTimestamp* sct,
                       MerkleTreeLeaf* merkle_tree_leaf) {
  if (sct->origin == SignedCertificateTimestamp::SCT_EMBEDDED) {
    if (cert->intermediate_buffers().empty() ||
        !GetPrecertSignedEntry(cert->cert_buffer(),
                               cert->intermediate_buffers().front().get(),
                               &merkle_tree_leaf->signed_entry)) {
      return false;
    }
  } else {
    if (!GetX509SignedEntry(cert->cert_buffer(),
                            &merkle_tree_leaf->signed_entry)) {
      return false;
    }
  }

  merkle_tree_leaf->timestamp = sct->timestamp;
  merkle_tree_leaf->extensions = sct->extensions;
  return true;
}

}  // namespace ct

}  // namespace net