Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(9700)

Unified Diff: chrome/common/extensions/api/certificate_provider.idl

Issue 1232553003: Add new certificateProvider extension API. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/common/extensions/api/certificate_provider.idl
diff --git a/chrome/common/extensions/api/certificate_provider.idl b/chrome/common/extensions/api/certificate_provider.idl
new file mode 100644
index 0000000000000000000000000000000000000000..e3b6fbdc28f0eb9cfab8e8cc19df9425772c7eb5
--- /dev/null
+++ b/chrome/common/extensions/api/certificate_provider.idl
@@ -0,0 +1,75 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+// Use this API to make certificates, for example from a Smart Card, available
+// to the platform which can then use these certificates for TLS client
+// authentication.
+namespace certificateProvider {
+ enum Hash {
+ MD5_SHA1,
+ SHA1,
+ SHA256,
+ SHA384,
+ SHA512
+ };
+
+ dictionary CertificateInfo {
+ // Must be the DER encoding of a X.509 client certificate.
+ ArrayBuffer certificate;
+
+ // Must be set to all hashes supported for this certificate. This extension
+ // will only be asked for signatures of digests calculated with one of these
+ // hash algorithms.
+ Hash[] supportedHashes;
+ };
+
+ dictionary SignRequest {
+ // The digest that must be signed.
+ ArrayBuffer digest;
+
+ // Refers to the hash algorithm that was used to create |digest|.
+ Hash hash;
+ };
+
+ // Either |error| or |signature| and not both must be set.
+ dictionary SignatureDetails {
+ // If the signature of the digest could not be calculated, this field must
+ // be set.
+ DOMString? error;
+
+ // If no error occurred, this field must be set to the signature of the
+ // digest using the private the of the requested client certificate.
+ // For an RSA key, the signature must be a PKCS#1 signature. The extension
+ // is responsible for prepending the DigestInfo prefix and adding PKCS#1
+ // padding.
+ ArrayBuffer? signature;
+ };
+
+ callback DoneCallback = void ();
+
+ interface Functions {
+ // Notifies Chrome that this extension serves the certificates listed in
+ // |certificates|. This list must only contain client certificates for
+ // which the extension can sign data with the according private key.
Ryan Sleevi 2015/07/10 12:07:56 // Notifies Chrome that this extension is capable
pneubeck (no reviews) 2015/07/10 12:23:52 Done.
+ static void publishClientCertificates(CertificateInfo[] certificates,
+ DoneCallback callback);
+
+ // Responses to a previous |onSignDigestRequested| event. |requestId| must
+ // match the id of such an event. For each id, this function must be called
+ // exactly once.
+ static void replyToSignRequest(long requestId, SignatureDetails reply);
+ };
+
+ interface Events {
+ // This event fires every time the browser navigates to a server that
+ // requests a client certificate provided by this extension using
+ // |publicClientCertificates|. To use a client certificate to authenticate
Ryan Sleevi 2015/07/10 12:07:56 Comment-wise, I think you want to reword this to i
pneubeck (no reviews) 2015/07/10 12:23:52 only added to your proposal: s/algorithm/algorith
+ // to that server, the extension has to sign the digest of some data as
+ // provided in |request| with the according private key. The signature must
+ // be handed to the browser using the function |replyToSignRequest|.
+ // After this event is fired until the signature is returned, the browser
+ // navigation is blocked. Long delays reduce the user's experience.
Ryan Sleevi 2015/07/10 12:07:56 I'd delete these two sentences entirely - we don't
pneubeck (no reviews) 2015/07/10 12:23:52 Done.
+ static void onSignDigestRequested(long requestId, SignRequest request);
+ };
+};
« no previous file with comments | « chrome/common/extensions/api/_permission_features.json ('k') | chrome/common/extensions/api/platform_keys.idl » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698