Index: net/cert/internal/verify_signed_data.h |
diff --git a/net/cert/internal/verify_signed_data.h b/net/cert/internal/verify_signed_data.h |
index fc622e8f563ab2edb037393e5eb5d669a78de78b..40836b34b8ad71edeb1017df83e2240ff002e160 100644 |
--- a/net/cert/internal/verify_signed_data.h |
+++ b/net/cert/internal/verify_signed_data.h |
@@ -15,6 +15,7 @@ class Input; |
} // namespace der |
class SignatureAlgorithm; |
+class SignaturePolicy; |
// Verifies that |signature_value| is a valid signature of |signed_data| using |
// the algorithm |signature_algorithm| and the public key |public_key|. |
@@ -25,12 +26,18 @@ class SignatureAlgorithm; |
// signature's value (to be interpreted according to the signature |
// algorithm). |
// |public_key| - A DER-encoded SubjectPublicKeyInfo. |
+// |policy| - Instance of the policy to use. This will be queried to |
+// determine if: |
+// * The parsed RSA key is an adequate size. |
+// * The parsed EC key is for an allowed curve. |
+// * The signature algorithm and its parameters are acceptable. |
// |
// Returns true if verification was successful. |
NET_EXPORT bool VerifySignedData(const SignatureAlgorithm& signature_algorithm, |
const der::Input& signed_data, |
const der::Input& signature_value_bit_string, |
- const der::Input& public_key) |
+ const der::Input& public_key, |
+ const SignaturePolicy* policy) |
WARN_UNUSED_RESULT; |
} // namespace net |