Chromium Code Reviews| Index: net/cert/ct_log_verifier.h |
| diff --git a/net/cert/ct_log_verifier.h b/net/cert/ct_log_verifier.h |
| index cf2484cdaefb3439235713dc7657da55b185196a..97845aabe4fab707a243fded6b4d7cee5fa14ce8 100644 |
| --- a/net/cert/ct_log_verifier.h |
| +++ b/net/cert/ct_log_verifier.h |
| @@ -46,6 +46,8 @@ class NET_EXPORT CTLogVerifier { |
| const std::string& key_id() const { return key_id_; } |
| // Returns the log's human-readable description. |
| const std::string& description() const { return description_; } |
| + // Returns the log's URL |
| + const GURL& url() const { return url_; } |
| // Verifies that |sct| contains a valid signature for |entry|. |
| bool Verify(const ct::LogEntry& entry, |
| @@ -54,7 +56,7 @@ class NET_EXPORT CTLogVerifier { |
| // Verifies and sets |signed_tree_head|. If |signed_tree_head|'s signature is |
| // valid, stores it and returns true. Otherwise, discards the sth and |
| // returns false. |
| - bool SetSignedTreeHead(scoped_ptr<ct::SignedTreeHead> signed_tree_head); |
|
davidben
2015/05/07 21:59:38
I'm assume this'll go away in a rebase? I remember
Eran Messeri
2015/07/10 13:15:48
Correct.
|
| + bool VerifySignedTreeHead(const ct::SignedTreeHead* signed_tree_head); |
| private: |
| FRIEND_TEST_ALL_PREFIXES(CTLogVerifierTest, VerifySignature); |
| @@ -79,7 +81,6 @@ class NET_EXPORT CTLogVerifier { |
| GURL url_; |
| ct::DigitallySigned::HashAlgorithm hash_algorithm_; |
| ct::DigitallySigned::SignatureAlgorithm signature_algorithm_; |
| - scoped_ptr<ct::SignedTreeHead> signed_tree_head_; |
| #if defined(USE_OPENSSL) |
| EVP_PKEY* public_key_; |