| Index: net/cert/ct_log_verifier.cc
|
| diff --git a/net/cert/ct_log_verifier.cc b/net/cert/ct_log_verifier.cc
|
| deleted file mode 100644
|
| index 6efb96a93192d1001a74a3019f20cc06acc0a949..0000000000000000000000000000000000000000
|
| --- a/net/cert/ct_log_verifier.cc
|
| +++ /dev/null
|
| @@ -1,77 +0,0 @@
|
| -// Copyright 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/cert/ct_log_verifier.h"
|
| -
|
| -#include "base/logging.h"
|
| -#include "net/cert/ct_serialization.h"
|
| -#include "net/cert/signed_tree_head.h"
|
| -
|
| -namespace net {
|
| -
|
| -// static
|
| -scoped_ptr<CTLogVerifier> CTLogVerifier::Create(
|
| - const base::StringPiece& public_key,
|
| - const base::StringPiece& description) {
|
| - scoped_ptr<CTLogVerifier> result(new CTLogVerifier());
|
| - if (!result->Init(public_key, description))
|
| - result.reset();
|
| - return result.Pass();
|
| -}
|
| -
|
| -bool CTLogVerifier::Verify(const ct::LogEntry& entry,
|
| - const ct::SignedCertificateTimestamp& sct) {
|
| - if (sct.log_id != key_id()) {
|
| - DVLOG(1) << "SCT is not signed by this log.";
|
| - return false;
|
| - }
|
| -
|
| - if (!SignatureParametersMatch(sct.signature))
|
| - return false;
|
| -
|
| - std::string serialized_log_entry;
|
| - if (!ct::EncodeLogEntry(entry, &serialized_log_entry)) {
|
| - DVLOG(1) << "Unable to serialize entry.";
|
| - return false;
|
| - }
|
| - std::string serialized_data;
|
| - if (!ct::EncodeV1SCTSignedData(sct.timestamp, serialized_log_entry,
|
| - sct.extensions, &serialized_data)) {
|
| - DVLOG(1) << "Unable to create SCT to verify.";
|
| - return false;
|
| - }
|
| -
|
| - return VerifySignature(serialized_data, sct.signature.signature_data);
|
| -}
|
| -
|
| -bool CTLogVerifier::SetSignedTreeHead(
|
| - scoped_ptr<ct::SignedTreeHead> signed_tree_head) {
|
| - if (!SignatureParametersMatch(signed_tree_head->signature))
|
| - return false;
|
| -
|
| - std::string serialized_data;
|
| - ct::EncodeTreeHeadSignature(*signed_tree_head.get(), &serialized_data);
|
| - if (VerifySignature(serialized_data,
|
| - signed_tree_head->signature.signature_data)) {
|
| - signed_tree_head_.reset(signed_tree_head.release());
|
| - return true;
|
| - }
|
| - return false;
|
| -}
|
| -
|
| -bool CTLogVerifier::SignatureParametersMatch(
|
| - const ct::DigitallySigned& signature) {
|
| - if (!signature.SignatureParametersMatch(hash_algorithm_,
|
| - signature_algorithm_)) {
|
| - DVLOG(1) << "Mismatched hash or signature algorithm. Hash: "
|
| - << hash_algorithm_ << " vs " << signature.hash_algorithm
|
| - << " Signature: " << signature_algorithm_ << " vs "
|
| - << signature.signature_algorithm << ".";
|
| - return false;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -} // namespace net
|
|
|