Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(55)

Side by Side Diff: net/cert/internal/verification_policy.h

Issue 1259313002: Add some policy controls for VerifySignedData(). (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@add_python
Patch Set: Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | net/cert/internal/verification_policy.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef NET_CERT_INTERNAL_VERIFICATION_POLICY_H_
6 #define NET_CERT_INTERNAL_VERIFICATION_POLICY_H_
7
8 #include "base/compiler_specific.h"
9 #include "net/base/net_export.h"
10 #include "net/cert/internal/signature_algorithm.h"
11
12 namespace net {
13
14 class SignatureAlgorithm;
15
16 // This interface specifies policies that apply when verifying signed data.
17 class NET_EXPORT VerificationPolicy {
Ryan Sleevi 2015/07/28 21:14:53 Naming wise, this seems like it should be Signatur
eroman 2015/07/29 02:44:43 Done.
18 public:
19 virtual ~VerificationPolicy() {}
20
21 // Implementations should return true if |algorithm| is an allowed digest
22 // algorithm. This will be called *anywhere* a hash algorithm is used, which
23 // includes the main digest algorithm for RSA PKCS#1 v1.5, ECDSA, and
24 // RSASSA-PSS, and also includes the hash function used by RSASSA-PSS mask
25 // gen function.
26 virtual bool IsAcceptableDigestAlgorithm(DigestAlgorithm algorithm) const = 0;
Ryan Sleevi 2015/07/28 21:14:53 I'm a little torn on this interface, whether it sh
eroman 2015/07/29 02:44:43 Done (Changed to take a signature algorithm instea
27
28 // Implementations should return true if |curve_nid| is an allowed
29 // elliptical curve. |curve_nid| is an object ID from BoringSSL (for example
30 // NID_secp384r1).
31 virtual bool IsAcceptableCurveForEcdsa(int curve_nid) const = 0;
32
33 // Implementations should return true if |modulus_length_bits| is an allowed
34 // RSA key size in bits.
35 virtual bool IsAcceptableModulusLengthForRsa(
36 size_t modulus_length_bits) const = 0;
Ryan Sleevi 2015/07/28 21:14:53 We arguably similarly have an EC policy (nothing l
eroman 2015/07/29 02:44:43 This should already be covered by the IsAcceptable
37 };
38
39 // BaseVerificationPolicy is a concrete implementation of VerificationPolicy
40 // that applies some default behaviors, and allows configuring the minimum RSA
41 // key length.
42 //
43 // * Accepts all digest algorithms: SHA-1, SHA-256, SHA-384, SHA-512
44 // * Accepts the following curves: secp256r1, secp384r1, secp521r1
45 class NET_EXPORT BaseVerificationPolicy : public VerificationPolicy {
Ryan Sleevi 2015/07/28 21:14:53 Curious why this split? That is, why a pure virtu
eroman 2015/07/29 02:44:43 My reason for the split mainly came because of not
46 public:
47 explicit BaseVerificationPolicy(size_t min_rsa_modulus_length_bits);
48
49 bool IsAcceptableDigestAlgorithm(DigestAlgorithm algorithm) const override;
50
51 bool IsAcceptableCurveForEcdsa(int curve_nid) const override;
52
53 bool IsAcceptableModulusLengthForRsa(
54 size_t modulus_length_bits) const override;
55
56 private:
57 const size_t min_rsa_modulus_length_bits_;
58 };
59
60 } // namespace net
61
62 #endif // NET_CERT_INTERNAL_VERIFICATION_POLICY_H_
OLDNEW
« no previous file with comments | « no previous file | net/cert/internal/verification_policy.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698