Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // Client side phishing and malware detection request and response | 5 // Client side phishing and malware detection request and response |
| 6 // protocol buffers. Those protocol messages should be kept in sync | 6 // protocol buffers. Those protocol messages should be kept in sync |
| 7 // with the server implementation. | 7 // with the server implementation. |
| 8 // | 8 // |
| 9 // If you want to change this protocol definition or you have questions | 9 // If you want to change this protocol definition or you have questions |
| 10 // regarding its format please contact chrome-anti-phishing@googlegroups.com. | 10 // regarding its format please contact chrome-anti-phishing@googlegroups.com. |
| (...skipping 190 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 201 message CertificateChain { | 201 message CertificateChain { |
| 202 // A single link in the chain. | 202 // A single link in the chain. |
| 203 message Element { | 203 message Element { |
| 204 // DER-encoded X.509 representation of the certificate. | 204 // DER-encoded X.509 representation of the certificate. |
| 205 optional bytes certificate = 1; | 205 optional bytes certificate = 1; |
| 206 // Fields 2 - 7 are only used on the server. | 206 // Fields 2 - 7 are only used on the server. |
| 207 } | 207 } |
| 208 repeated Element element = 1; | 208 repeated Element element = 1; |
| 209 } | 209 } |
| 210 | 210 |
| 211 message ExtendedAttr { | |
|
Robert Sesek
2015/10/08 19:20:06
Document the message type too, specifically callin
Greg K
2015/10/09 17:12:01
Done.
| |
| 212 // This is the name of the extended attribute. | |
| 213 required string key = 1; | |
| 214 // This is the value of the extended attribute. | |
| 215 optional bytes value = 2; | |
| 216 } | |
| 217 | |
| 211 message SignatureInfo { | 218 message SignatureInfo { |
| 212 // All certificate chains for each of the binary's signers. Multiple chains | 219 // All certificate chains for each of the binary's signers. Multiple chains |
| 213 // may be present if the binary or any certificate has multiple signers. | 220 // may be present if the binary or any certificate has multiple signers. |
| 214 // Absence of certificate chains does not imply that the binary is not | 221 // Absence of certificate chains does not imply that the binary is not |
| 215 // signed (in that case, SignedData blobs extracted from the binary may be | 222 // signed (in that case, SignedData blobs extracted from the binary may be |
| 216 // preset), but does mean that trust has not been verified. | 223 // preset), but does mean that trust has not been verified. |
| 217 repeated CertificateChain certificate_chain = 1; | 224 repeated CertificateChain certificate_chain = 1; |
| 218 | 225 |
| 219 // True if the signature was trusted on the client. | 226 // True if the signature was trusted on the client. |
| 220 optional bool trusted = 2; | 227 optional bool trusted = 2; |
| 221 | 228 |
| 222 // On Windows, PKCS#7 SignedData blobs extracted from a portable executable | 229 // On Windows, PKCS#7 SignedData blobs extracted from a portable executable |
| 223 // image's attribute certificate table. The presence of these does not imply | 230 // image's attribute certificate table. The presence of these does not imply |
| 224 // that the signatures were deemed trusted by the client. | 231 // that the signatures were deemed trusted by the client. |
| 225 // On Mac, this is the code signature blob referenced by the | 232 // On Mac, this is the code signature blob referenced by the |
| 226 // LC_CODE_SIGNATURE load command. | 233 // LC_CODE_SIGNATURE load command. |
| 227 repeated bytes signed_data = 3; | 234 repeated bytes signed_data = 3; |
| 235 | |
| 236 // On OS X, code signing data can be contained in the extended attributes of | |
| 237 // a file. As GateKeeper respects this signature, we look for it and collect | |
| 238 // it. | |
| 239 repeated ExtendedAttr xattr = 4; | |
| 228 } | 240 } |
| 229 | 241 |
| 230 // This field will only be set if the binary is signed. | 242 // This field will only be set if the binary is signed. |
| 231 optional SignatureInfo signature = 5; | 243 optional SignatureInfo signature = 5; |
| 232 | 244 |
| 233 // True if the download was user initiated. | 245 // True if the download was user initiated. |
| 234 optional bool user_initiated = 6; | 246 optional bool user_initiated = 6; |
| 235 | 247 |
| 236 // Fields 7 and 8 are only used on the server. | 248 // Fields 7 and 8 are only used on the server. |
| 237 | 249 |
| (...skipping 176 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 414 WEAK_LEGACY_OBSOLETE = 2; | 426 WEAK_LEGACY_OBSOLETE = 2; |
| 415 CHANGED = 3; | 427 CHANGED = 3; |
| 416 UNTRUSTED_UNKNOWN_VALUE = 4; | 428 UNTRUSTED_UNKNOWN_VALUE = 4; |
| 417 } | 429 } |
| 418 | 430 |
| 419 optional string path = 1; | 431 optional string path = 1; |
| 420 optional string atomic_value = 2; | 432 optional string atomic_value = 2; |
| 421 repeated string split_key = 3; | 433 repeated string split_key = 3; |
| 422 optional ValueState value_state = 4; | 434 optional ValueState value_state = 4; |
| 423 } | 435 } |
| 436 | |
| 424 message BinaryIntegrityIncident { | 437 message BinaryIntegrityIncident { |
| 425 optional string file_basename = 1; | 438 optional string file_basename = 1; |
| 426 optional ClientDownloadRequest.SignatureInfo signature = 2; | 439 optional ClientDownloadRequest.SignatureInfo signature = 2; |
| 440 optional ClientDownloadRequest.ImageHeaders image_headers = 3; | |
| 441 optional int32 sec_error = 4; | |
| 427 } | 442 } |
| 443 | |
| 428 message BlacklistLoadIncident { | 444 message BlacklistLoadIncident { |
| 429 optional string path = 1; | 445 optional string path = 1; |
| 430 optional ClientDownloadRequest.Digests digest = 2; | 446 optional ClientDownloadRequest.Digests digest = 2; |
| 431 optional string version = 3; | 447 optional string version = 3; |
| 432 optional bool blacklist_initialized = 4; | 448 optional bool blacklist_initialized = 4; |
| 433 optional ClientDownloadRequest.SignatureInfo signature = 5; | 449 optional ClientDownloadRequest.SignatureInfo signature = 5; |
| 434 optional ClientDownloadRequest.ImageHeaders image_headers = 6; | 450 optional ClientDownloadRequest.ImageHeaders image_headers = 6; |
| 435 } | 451 } |
| 436 message VariationsSeedSignatureIncident { | 452 message VariationsSeedSignatureIncident { |
| 437 optional string variations_seed_signature = 1; | 453 optional string variations_seed_signature = 1; |
| (...skipping 126 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 564 message EnvironmentRequest { optional int32 dll_index = 1; } | 580 message EnvironmentRequest { optional int32 dll_index = 1; } |
| 565 | 581 |
| 566 repeated EnvironmentRequest environment_requests = 3; | 582 repeated EnvironmentRequest environment_requests = 3; |
| 567 } | 583 } |
| 568 | 584 |
| 569 message DownloadMetadata { | 585 message DownloadMetadata { |
| 570 optional uint32 download_id = 1; | 586 optional uint32 download_id = 1; |
| 571 | 587 |
| 572 optional ClientIncidentReport.DownloadDetails download = 2; | 588 optional ClientIncidentReport.DownloadDetails download = 2; |
| 573 } | 589 } |
| OLD | NEW |