OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_CERT_CT_LOG_VERIFIER_H_ | 5 #ifndef NET_CERT_CT_LOG_VERIFIER_H_ |
6 #define NET_CERT_CT_LOG_VERIFIER_H_ | 6 #define NET_CERT_CT_LOG_VERIFIER_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/gtest_prod_util.h" | 10 #include "base/gtest_prod_util.h" |
(...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
53 const std::string& description() const { return description_; } | 53 const std::string& description() const { return description_; } |
54 // Returns the log's URL | 54 // Returns the log's URL |
55 const GURL& url() const { return url_; } | 55 const GURL& url() const { return url_; } |
56 | 56 |
57 // Returns the log's DNS domain for CT over DNS queries, as described in | 57 // Returns the log's DNS domain for CT over DNS queries, as described in |
58 // https://github.com/google/certificate-transparency-rfcs/blob/master/dns/dra
ft-ct-over-dns.md. | 58 // https://github.com/google/certificate-transparency-rfcs/blob/master/dns/dra
ft-ct-over-dns.md. |
59 // This will be empty if the log has no DNS API endpoint. | 59 // This will be empty if the log has no DNS API endpoint. |
60 const std::string& dns_domain() const { return dns_domain_; } | 60 const std::string& dns_domain() const { return dns_domain_; } |
61 | 61 |
62 // Verifies that |sct| is valid for |entry| and was signed by this log. | 62 // Verifies that |sct| is valid for |entry| and was signed by this log. |
63 bool Verify(const ct::LogEntry& entry, | 63 bool Verify(const ct::SignedEntryData& entry, |
64 const ct::SignedCertificateTimestamp& sct) const; | 64 const ct::SignedCertificateTimestamp& sct) const; |
65 | 65 |
66 // Verifies that |signed_tree_head| is a valid Signed Tree Head (RFC 6962, | 66 // Verifies that |signed_tree_head| is a valid Signed Tree Head (RFC 6962, |
67 // Section 3.5) for this log. | 67 // Section 3.5) for this log. |
68 bool VerifySignedTreeHead(const ct::SignedTreeHead& signed_tree_head) const; | 68 bool VerifySignedTreeHead(const ct::SignedTreeHead& signed_tree_head) const; |
69 | 69 |
70 // Verifies that |proof| is a valid consistency proof (RFC 6962, Section | 70 // Verifies that |proof| is a valid consistency proof (RFC 6962, Section |
71 // 2.1.2) for this log, and which proves that |old_tree_hash| has | 71 // 2.1.2) for this log, and which proves that |old_tree_hash| has |
72 // been fully incorporated into the Merkle tree represented by | 72 // been fully incorporated into the Merkle tree represented by |
73 // |new_tree_hash|. | 73 // |new_tree_hash|. |
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
111 std::string dns_domain_; | 111 std::string dns_domain_; |
112 ct::DigitallySigned::HashAlgorithm hash_algorithm_; | 112 ct::DigitallySigned::HashAlgorithm hash_algorithm_; |
113 ct::DigitallySigned::SignatureAlgorithm signature_algorithm_; | 113 ct::DigitallySigned::SignatureAlgorithm signature_algorithm_; |
114 | 114 |
115 EVP_PKEY* public_key_; | 115 EVP_PKEY* public_key_; |
116 }; | 116 }; |
117 | 117 |
118 } // namespace net | 118 } // namespace net |
119 | 119 |
120 #endif // NET_CERT_CT_LOG_VERIFIER_H_ | 120 #endif // NET_CERT_CT_LOG_VERIFIER_H_ |
OLD | NEW |