Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(288)

Side by Side Diff: components/policy/proto/device_management_backend.proto

Issue 143183007: Update policy signature verification to include policy domain. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Trying again after mysterious chunk-mismatch error on last upload. Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 syntax = "proto2"; 5 syntax = "proto2";
6 6
7 option optimize_for = LITE_RUNTIME; 7 option optimize_for = LITE_RUNTIME;
8 8
9 package enterprise_management; 9 package enterprise_management;
10 10
(...skipping 279 matching lines...) Expand 10 before | Expand all | Expand 10 after
290 // If the public key has been rotated on the server, the new public 290 // If the public key has been rotated on the server, the new public
291 // key is sent here. It is already used for |policy_data_signature| 291 // key is sent here. It is already used for |policy_data_signature|
292 // above, whereas |new_public_key_signature| is created using the 292 // above, whereas |new_public_key_signature| is created using the
293 // old key (so the client can trust the new key). If this is the 293 // old key (so the client can trust the new key). If this is the
294 // first time when the client requests policies (so it doesn't have 294 // first time when the client requests policies (so it doesn't have
295 // on old public key), then |new_public_key_signature| is empty. 295 // on old public key), then |new_public_key_signature| is empty.
296 optional bytes new_public_key = 5; 296 optional bytes new_public_key = 5;
297 optional bytes new_public_key_signature = 6; 297 optional bytes new_public_key_signature = 6;
298 298
299 // If new_public_key is specified, this field contains a signature 299 // If new_public_key is specified, this field contains a signature
300 // of that key, signed using a key only available to DMServer. 300 // of a PolicyPublicKeyAndDomain protobuf, signed using a key only
301 // The public key portion of this well-known key is embedded into the 301 // available to DMServer. The public key portion of this well-known key is
302 // Chrome binary. The hash of that embedded key is passed to DMServer 302 // embedded into the Chrome binary. The hash of that embedded key is passed
303 // as verification_key_hash field in PolicyFetchRequest. DMServer will 303 // to DMServer as verification_key_hash field in PolicyFetchRequest. DMServer
304 // pick a private key on the server which matches the hash (matches public 304 // will pick a private key on the server which matches the hash (matches
305 // key on the client). If DMServer is unable to find matching key, it will 305 // public key on the client). If DMServer is unable to find matching key, it
306 // return an error instead of policy data. 306 // will return an error instead of policy data.
307 // In case hash was not specified, DMServer will leave verification signature 307 // In case hash was not specified, DMServer will leave verification signature
308 // field empty (legacy behavior). 308 // field empty (legacy behavior).
309 // In addition to the checks between new_public_key 309 // In addition to the checks between new_public_key
310 // and new_public_key_signature described above, Chrome also verifies 310 // and new_public_key_signature described above, Chrome also verifies
311 // new_public_key with the embedded public key and 311 // new_public_key with the embedded public key and
312 // new_public_key_verification_signature. 312 // new_public_key_verification_signature.
313 optional bytes new_public_key_verification_signature = 7; 313 optional bytes new_public_key_verification_signature = 7;
314 } 314 }
315 315
316 // Protobuf used to generate the new_public_key_verification_signature field.
317 message PolicyPublicKeyAndDomain {
318 // The public key to sign (taken from the |new_public_key| field in
319 // PolicyFetchResponse).
320 optional bytes new_public_key = 1;
Mattias Nissler (ping if slow) 2014/02/13 10:52:53 nit: newline
Andrew T Wilson (Slow) 2014/02/13 12:15:36 Done.
321 // The domain associated with this key (should match the domain portion of
322 // the username field of the policy).
323 optional string domain = 2;
324 }
325
316 // Request from device to server for reading policies. 326 // Request from device to server for reading policies.
317 message DevicePolicyRequest { 327 message DevicePolicyRequest {
318 // The policy fetch request. If this field exists, the request must 328 // The policy fetch request. If this field exists, the request must
319 // comes from a non-TT client. The repeated field allows client to 329 // comes from a non-TT client. The repeated field allows client to
320 // request multiple policies for better performance. 330 // request multiple policies for better performance.
321 repeated PolicyFetchRequest request = 3; 331 repeated PolicyFetchRequest request = 3;
322 } 332 }
323 333
324 // Response from server to device for reading policies. 334 // Response from server to device for reading policies.
325 message DevicePolicyResponse { 335 message DevicePolicyResponse {
(...skipping 323 matching lines...) Expand 10 before | Expand all | Expand 10 after
649 659
650 // Auto-enrollment detection response. 660 // Auto-enrollment detection response.
651 optional DeviceAutoEnrollmentResponse auto_enrollment_response = 8; 661 optional DeviceAutoEnrollmentResponse auto_enrollment_response = 8;
652 662
653 // EMCert upload response. 663 // EMCert upload response.
654 optional DeviceCertUploadResponse cert_upload_response = 9; 664 optional DeviceCertUploadResponse cert_upload_response = 9;
655 665
656 // Response to OAuth2 authorization code request. 666 // Response to OAuth2 authorization code request.
657 optional DeviceServiceApiAccessResponse service_api_access_response = 10; 667 optional DeviceServiceApiAccessResponse service_api_access_response = 10;
658 } 668 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698