Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(82)

Unified Diff: chrome/browser/safe_browsing/signature_evaluator_mac.h

Issue 1363613004: Implement anonymous, opt-in, collection of OS X binary integrity incidents. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Ran git cl format Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/safe_browsing/signature_evaluator_mac.h
diff --git a/chrome/browser/safe_browsing/signature_evaluator_mac.h b/chrome/browser/safe_browsing/signature_evaluator_mac.h
new file mode 100644
index 0000000000000000000000000000000000000000..d14ba14296e6127b7784f241b613aec7b58e1a98
--- /dev/null
+++ b/chrome/browser/safe_browsing/signature_evaluator_mac.h
@@ -0,0 +1,71 @@
+// Copyright (c) 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CHROME_COMMON_SAFE_BROWSING_SIGNATURE_EVALUATOR_MAC_H_
+#define CHROME_COMMON_SAFE_BROWSING_SIGNATURE_EVALUATOR_MAC_H_
+
+#include <Security/Security.h>
+
+#include <string>
+
+#include "base/files/file_path.h"
+#include "base/mac/scoped_cftyperef.h"
+#include "base/macros.h"
+#include "base/memory/ref_counted.h"
+#include "chrome/browser/safe_browsing/incident_reporting/binary_integrity_incident.h"
+
+namespace safe_browsing {
+
+// Wraps the OS X SecStaticCode API, to evaluate a given file object
+// with a given code requirement, and produce a list of incident reports
+// for files that fail code signature validity checks.
+class MacSignatureEvaluator {
+ public:
+ explicit MacSignatureEvaluator(const base::FilePath& signed_object_path);
+
+ // The requirement string must be a valid "Code Signing Requirement Language
+ // string, which describes the identity of the signer.
+ MacSignatureEvaluator(const base::FilePath& signed_object_path,
+ const std::string& requirement);
+
+ ~MacSignatureEvaluator();
+
+ // Creates the static code object and requirement string, and returns
+ // true if the object creation succeeds, else false.
+ bool Initialize();
+
+ // Evaluate the signature and return a list of any binary integrity incident
+ // reports. Returns true if and only if the signed code object is valid.
+ bool PerformEvaluation(
+ ClientIncidentReport_IncidentData_BinaryIntegrityIncident* incident);
+
+ // Returns relative path component between a parent and a child.
+ // For example, /foo/bar and /foo/bar/y returns y. Note that
+ // this knows nothing about symlinks. Exposed for testing.
+ static bool GetRelativePathComponent(const base::FilePath& parent,
+ const base::FilePath& child,
+ std::string* out);
+
+ private:
+ // The path to the code object on disk.
+ base::FilePath path_;
+
+ // A Code Signing Requirement string.
+ std::string requirement_str_;
+
+ // Records whether or not a requirement string was specified.
+ bool has_requirement_;
+
+ // The static code object constructed from the code object on disk.
+ base::ScopedCFTypeRef<SecStaticCodeRef> code_;
+
+ // The requirement object constructed from the requirement string.
+ base::ScopedCFTypeRef<SecRequirementRef> requirement_;
+
+ DISALLOW_COPY_AND_ASSIGN(MacSignatureEvaluator);
+};
+
+} // namespace safe_browsing
+
+#endif // CHROME_COMMON_SAFE_BROWSING_SIGNATURE_EVALUATOR_MAC_H_

Powered by Google App Engine
This is Rietveld 408576698