| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_CERT_CT_LOG_VERIFIER_H_ | 5 #ifndef NET_CERT_CT_LOG_VERIFIER_H_ |
| 6 #define NET_CERT_CT_LOG_VERIFIER_H_ | 6 #define NET_CERT_CT_LOG_VERIFIER_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "base/gtest_prod_util.h" | 10 #include "base/gtest_prod_util.h" |
| (...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 53 const std::string& description() const { return description_; } | 53 const std::string& description() const { return description_; } |
| 54 // Returns the log's URL | 54 // Returns the log's URL |
| 55 const GURL& url() const { return url_; } | 55 const GURL& url() const { return url_; } |
| 56 | 56 |
| 57 // Returns the log's DNS domain for CT over DNS queries, as described in | 57 // Returns the log's DNS domain for CT over DNS queries, as described in |
| 58 // https://github.com/google/certificate-transparency-rfcs/blob/master/dns/dra
ft-ct-over-dns.md. | 58 // https://github.com/google/certificate-transparency-rfcs/blob/master/dns/dra
ft-ct-over-dns.md. |
| 59 // This will be empty if the log has no DNS API endpoint. | 59 // This will be empty if the log has no DNS API endpoint. |
| 60 const std::string& dns_domain() const { return dns_domain_; } | 60 const std::string& dns_domain() const { return dns_domain_; } |
| 61 | 61 |
| 62 // Verifies that |sct| is valid for |entry| and was signed by this log. | 62 // Verifies that |sct| is valid for |entry| and was signed by this log. |
| 63 bool Verify(const ct::LogEntry& entry, | 63 bool Verify(const ct::SignedEntryData& entry, |
| 64 const ct::SignedCertificateTimestamp& sct) const; | 64 const ct::SignedCertificateTimestamp& sct) const; |
| 65 | 65 |
| 66 // Verifies that |signed_tree_head| is a valid Signed Tree Head (RFC 6962, | 66 // Verifies that |signed_tree_head| is a valid Signed Tree Head (RFC 6962, |
| 67 // Section 3.5) for this log. | 67 // Section 3.5) for this log. |
| 68 bool VerifySignedTreeHead(const ct::SignedTreeHead& signed_tree_head) const; | 68 bool VerifySignedTreeHead(const ct::SignedTreeHead& signed_tree_head) const; |
| 69 | 69 |
| 70 // Verifies that |proof| is a valid consistency proof (RFC 6962, Section | 70 // Verifies that |proof| is a valid consistency proof (RFC 6962, Section |
| 71 // 2.1.2) for this log, and which proves that |old_tree_hash| has | 71 // 2.1.2) for this log, and which proves that |old_tree_hash| has |
| 72 // been fully incorporated into the Merkle tree represented by | 72 // been fully incorporated into the Merkle tree represented by |
| 73 // |new_tree_hash|. | 73 // |new_tree_hash|. |
| (...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 111 std::string dns_domain_; | 111 std::string dns_domain_; |
| 112 ct::DigitallySigned::HashAlgorithm hash_algorithm_; | 112 ct::DigitallySigned::HashAlgorithm hash_algorithm_; |
| 113 ct::DigitallySigned::SignatureAlgorithm signature_algorithm_; | 113 ct::DigitallySigned::SignatureAlgorithm signature_algorithm_; |
| 114 | 114 |
| 115 EVP_PKEY* public_key_; | 115 EVP_PKEY* public_key_; |
| 116 }; | 116 }; |
| 117 | 117 |
| 118 } // namespace net | 118 } // namespace net |
| 119 | 119 |
| 120 #endif // NET_CERT_CT_LOG_VERIFIER_H_ | 120 #endif // NET_CERT_CT_LOG_VERIFIER_H_ |
| OLD | NEW |