aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
* added chain processing with intermediate certificatesRasmus Dahlberg2020-11-0330-210/+171
| | | | | Basic test chains can be generated manually with openssl, see details in server/testdata/x509/README.md.
* removed fixed TODOsRasmus Dahlberg2020-11-034-9/+0
|
* added client-side consistency proof verificationRasmus Dahlberg2020-11-033-7/+105
|
* added client-side inclusion proof verificationRasmus Dahlberg2020-11-033-4/+94
|
* fixed signature verification and client get-sthRasmus Dahlberg2020-11-034-55/+77
|
* added get-sth client without signature verificationRasmus Dahlberg2020-11-033-3/+78
|
* refactored setup() from paths to client packageRasmus Dahlberg2020-11-032-42/+36
|
* fixed hard-coded protocol and minor refactoringRasmus Dahlberg2020-11-032-36/+46
|
* added helper to load log operators from fileRasmus Dahlberg2020-11-032-10/+19
|
* ignore temporary vim filesRasmus Dahlberg2020-11-031-0/+3
|
* moved x509 chain loading to stfe packageRasmus Dahlberg2020-11-033-29/+33
|
* removed unused codeRasmus Dahlberg2020-11-031-24/+0
|
* unified ed25519 signing key loading and parsingRasmus Dahlberg2020-11-033-38/+37
|
* prettified outputRasmus Dahlberg2020-11-031-1/+6
|
* fixed FindLog such that it uses a list of operatorsRasmus Dahlberg2020-11-035-21/+15
|
* added start on stfe clientRasmus Dahlberg2020-11-0210-6/+346
| | | | | | ChecksumV1 entries can be submitted using client-side ed25519 signatures. The resulting SignedDebugInfoV1 is then verified using the log's announced signature scheme and public key (currently only ed25519).
* added stfe server descriptorRasmus Dahlberg2020-11-023-0/+154
| | | | A collection of immutable log parameters, see documentation.
* rephrased signature algorithm to signature schemeRasmus Dahlberg2020-11-021-3/+3
|
* removed hash function as parameterRasmus Dahlberg2020-11-021-1/+3
| | | | Trillian doesn't give us much of a choice, see [1].
* removed unused codeRasmus Dahlberg2020-10-301-35/+0
|
* refactor types and documentationRasmus Dahlberg2020-10-308-208/+232
| | | | | | Structured files a bit better, added more documentation, switched to pointers as default (unless specifically motivated not to do so), and encapsulated TLS (un)marshaling for the respective types that use it.
* removed unused codeRasmus Dahlberg2020-10-301-4/+0
|
* removed fixed TODO commentRasmus Dahlberg2020-10-301-1/+0
|
* added sanity checks on Trillian responsesRasmus Dahlberg2020-10-302-27/+82
| | | | Based on the sanity checks that CTFE does.
* shortened variable namesRasmus Dahlberg2020-10-301-34/+34
|
* added max range and get-entries sanity checkingRasmus Dahlberg2020-10-304-19/+46
|
* started refactoring add-entry code path according to docRasmus Dahlberg2020-10-307-77/+127
|
* updated json output according to api docRasmus Dahlberg2020-10-303-89/+23
|
* fixed tls length specifiersRasmus Dahlberg2020-10-293-15/+14
|
* updated api documentationRasmus Dahlberg2020-10-291-30/+43
| | | | Specified additional details and simplified http output formatting.
* refactored and added sth error-checkingRasmus Dahlberg2020-10-292-15/+24
|
* added hash function (sha256) in log parametersRasmus Dahlberg2020-10-291-0/+2
|
* go fmtRasmus Dahlberg2020-10-286-35/+33
|
* added consistency-proof code pathRasmus Dahlberg2020-10-284-2/+119
|
* added signed tree head and get-sth code pathRasmus Dahlberg2020-10-285-4/+122
|
* added ed25519 signing and SDIsRasmus Dahlberg2020-10-278-4/+126
|
* isolated chain and signature verificationRasmus Dahlberg2020-10-272-30/+46
|
* decoupled log instance and infoRasmus Dahlberg2020-10-276-83/+159
| | | | | Makes things a bit more modular. As part of this process I also replaced ct/x509 with crypto/x509, which already suits our needs.
* moved common json-write code into a helperRasmus Dahlberg2020-10-272-31/+24
|
* fixed url typoRasmus Dahlberg2020-10-271-1/+1
|
* added leaf appendixRasmus Dahlberg2020-10-273-21/+64
|
* added additional interactive test scriptsRasmus Dahlberg2020-10-275-7/+55
|
* tested certificate chain code path furtherRasmus Dahlberg2020-10-2624-198/+304
| | | | | Added more documentation and quick helper scripts for now. We need to specify which signature schemes we expect/support from submitters.
* added signature verification for add-entryRasmus Dahlberg2020-10-261-8/+22
|
* added start on get-anchors code pathRasmus Dahlberg2020-10-234-16/+43
|
* added basic trust-anchor code pathRasmus Dahlberg2020-10-239-12/+235
| | | | | Pretty much the bare minimum to load trust anchors from file and check that the submitter's certificate chains back to something valid.
* moved TODO on gRPC error codes to a noteRasmus Dahlberg2020-10-231-5/+1
| | | | | | | It appears that a bad gRPC code is already captured as part of err. In other words, additional detail can be inside the following error clause. See example in CTFE's addChainInternal() function.
* added commentsRasmus Dahlberg2020-10-231-2/+2
|
* ran go fmtRasmus Dahlberg2020-10-231-1/+1
|
* refactored add-entry code pathRasmus Dahlberg2020-10-233-55/+63
|