Chromium Code Reviews| Index: chromeos/attestation/attestation_constants.h |
| diff --git a/chromeos/attestation/attestation_constants.h b/chromeos/attestation/attestation_constants.h |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..6e980f96ffab4eb7cf5b19cb2705b96e9d75b8e3 |
| --- /dev/null |
| +++ b/chromeos/attestation/attestation_constants.h |
| @@ -0,0 +1,59 @@ |
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#ifndef CHROMEOS_ATTESTATION_ATTESTATION_CONSTANTS_H_ |
| +#define CHROMEOS_ATTESTATION_ATTESTATION_CONSTANTS_H_ |
| + |
| +namespace chromeos { |
| +namespace attestation { |
| + |
| +// Options available for customizing an attestation certificate. |
| +enum AttestationCertificateOptions { |
|
Mattias Nissler (ping if slow)
2013/04/24 12:57:53
nit: We usually follow good practice for enums to
dkrahn
2013/04/25 01:06:52
The style guide gives this as an example of a good
Daniel Erat
2013/04/25 01:15:30
I think I agree with Mattias here. Omitting prefi
dkrahn
2013/04/25 02:45:35
That makes sense, and this CL does pull these out
|
| + CERTIFICATE_OPTION_NONE = 0, |
| + // A stable identifier is simply an identifier that is not affected by device |
| + // state changes, including device recovery. |
| + INCLUDE_STABLE_ID = 1, |
| + // Device state information contains a quoted assertion of whether the device |
| + // is in verified mode. |
| + INCLUDE_DEVICE_STATE = 1 << 1 |
|
Mattias Nissler (ping if slow)
2013/04/24 12:57:53
nit: putting a trailing colon here makes it easier
dkrahn
2013/04/25 01:06:52
Done. Good idea. I'm not in the habit...
|
| +}; |
| + |
| +// Key types supported by the Chrome OS attestation subsystem. |
| +enum AttestationKeyType { |
| + // The key will be associated with the device itself and will be available |
| + // regardless of which user is signed-in. |
| + DEVICE_KEY, |
| + // The key will be associated with the current user and will only be available |
| + // when that user is signed-in. |
| + USER_KEY |
|
Mattias Nissler (ping if slow)
2013/04/24 12:57:53
ditto
dkrahn
2013/04/25 01:06:52
Done.
|
| +}; |
| + |
| +// Options available for customizing an attestation challenge response. |
| +enum AttestationChallengeOptions { |
| + CHALLENGE_RESPONSE_OPTION_NONE = 0, |
| + // Indicates that a SignedPublicKeyAndChallenge should be embedded in the |
| + // challenge response. |
| + INCLUDE_SIGNED_PUBLIC_KEY = 1 |
|
Mattias Nissler (ping if slow)
2013/04/24 12:57:53
ditto.
dkrahn
2013/04/25 01:06:52
Done.
|
| +}; |
| + |
| +// Available attestation certificate profiles. |
| +enum AttestationCertificateProfile { |
| + // Uses the following options: INCLUDE_STABLE_ID | INCLUDE_DEVICE_STATE. |
| + ENTERPRISE_MACHINE_CERTIFICATE, |
| + // Uses the following options: INCLUDE_DEVICE_STATE. |
| + ENTERPRISE_USER_CERTIFICATE, |
|
Mattias Nissler (ping if slow)
2013/04/24 12:57:53
ah, and here you have it :)
dkrahn
2013/04/25 01:06:52
there was a third value at one time :)
|
| +}; |
| + |
| +// A key name for the Enterprise Machine Key. This key should always be stored |
| +// as a DEVICE_KEY. |
| +extern const char kEnterpriseMachineKey[]; |
| + |
| +// A key name for the Enterprise User Key. This key should always be stored as |
| +// a USER_KEY. |
| +extern const char kEnterpriseUserKey[]; |
| + |
| +} // namespace attestation |
| +} // namespace chromeos |
| + |
| +#endif // CHROMEOS_ATTESTATION_ATTESTATION_CONSTANTS_H_ |