OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 syntax = "proto2"; | 5 syntax = "proto2"; |
6 | 6 |
7 option optimize_for = LITE_RUNTIME; | 7 option optimize_for = LITE_RUNTIME; |
8 | 8 |
9 package enterprise_management; | 9 package enterprise_management; |
10 | 10 |
(...skipping 279 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
290 // If the public key has been rotated on the server, the new public | 290 // If the public key has been rotated on the server, the new public |
291 // key is sent here. It is already used for |policy_data_signature| | 291 // key is sent here. It is already used for |policy_data_signature| |
292 // above, whereas |new_public_key_signature| is created using the | 292 // above, whereas |new_public_key_signature| is created using the |
293 // old key (so the client can trust the new key). If this is the | 293 // old key (so the client can trust the new key). If this is the |
294 // first time when the client requests policies (so it doesn't have | 294 // first time when the client requests policies (so it doesn't have |
295 // on old public key), then |new_public_key_signature| is empty. | 295 // on old public key), then |new_public_key_signature| is empty. |
296 optional bytes new_public_key = 5; | 296 optional bytes new_public_key = 5; |
297 optional bytes new_public_key_signature = 6; | 297 optional bytes new_public_key_signature = 6; |
298 | 298 |
299 // If new_public_key is specified, this field contains a signature | 299 // If new_public_key is specified, this field contains a signature |
300 // of that key, signed using a key only available to DMServer. | 300 // of a PolicyPublicKeyAndDomain protobuf, signed using a key only |
301 // The public key portion of this well-known key is embedded into the | 301 // available to DMServer. The public key portion of this well-known key is |
302 // Chrome binary. The hash of that embedded key is passed to DMServer | 302 // embedded into the Chrome binary. The hash of that embedded key is passed |
303 // as verification_key_hash field in PolicyFetchRequest. DMServer will | 303 // to DMServer as verification_key_hash field in PolicyFetchRequest. DMServer |
304 // pick a private key on the server which matches the hash (matches public | 304 // will pick a private key on the server which matches the hash (matches |
305 // key on the client). If DMServer is unable to find matching key, it will | 305 // public key on the client). If DMServer is unable to find matching key, it |
306 // return an error instead of policy data. | 306 // will return an error instead of policy data. |
307 // In case hash was not specified, DMServer will leave verification signature | 307 // In case hash was not specified, DMServer will leave verification signature |
308 // field empty (legacy behavior). | 308 // field empty (legacy behavior). |
309 // In addition to the checks between new_public_key | 309 // In addition to the checks between new_public_key |
310 // and new_public_key_signature described above, Chrome also verifies | 310 // and new_public_key_signature described above, Chrome also verifies |
311 // new_public_key with the embedded public key and | 311 // new_public_key with the embedded public key and |
312 // new_public_key_verification_signature. | 312 // new_public_key_verification_signature. |
313 optional bytes new_public_key_verification_signature = 7; | 313 optional bytes new_public_key_verification_signature = 7; |
314 } | 314 } |
315 | 315 |
| 316 // Protobuf used to generate the new_public_key_verification_signature field. |
| 317 message PolicyPublicKeyAndDomain { |
| 318 // The public key to sign (taken from the |new_public_key| field in |
| 319 // PolicyFetchResponse). |
| 320 optional bytes new_public_key = 1; |
| 321 |
| 322 // The domain associated with this key (should match the domain portion of |
| 323 // the username field of the policy). |
| 324 optional string domain = 2; |
| 325 } |
| 326 |
316 // Request from device to server for reading policies. | 327 // Request from device to server for reading policies. |
317 message DevicePolicyRequest { | 328 message DevicePolicyRequest { |
318 // The policy fetch request. If this field exists, the request must | 329 // The policy fetch request. If this field exists, the request must |
319 // comes from a non-TT client. The repeated field allows client to | 330 // comes from a non-TT client. The repeated field allows client to |
320 // request multiple policies for better performance. | 331 // request multiple policies for better performance. |
321 repeated PolicyFetchRequest request = 3; | 332 repeated PolicyFetchRequest request = 3; |
322 } | 333 } |
323 | 334 |
324 // Response from server to device for reading policies. | 335 // Response from server to device for reading policies. |
325 message DevicePolicyResponse { | 336 message DevicePolicyResponse { |
(...skipping 323 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
649 | 660 |
650 // Auto-enrollment detection response. | 661 // Auto-enrollment detection response. |
651 optional DeviceAutoEnrollmentResponse auto_enrollment_response = 8; | 662 optional DeviceAutoEnrollmentResponse auto_enrollment_response = 8; |
652 | 663 |
653 // EMCert upload response. | 664 // EMCert upload response. |
654 optional DeviceCertUploadResponse cert_upload_response = 9; | 665 optional DeviceCertUploadResponse cert_upload_response = 9; |
655 | 666 |
656 // Response to OAuth2 authorization code request. | 667 // Response to OAuth2 authorization code request. |
657 optional DeviceServiceApiAccessResponse service_api_access_response = 10; | 668 optional DeviceServiceApiAccessResponse service_api_access_response = 10; |
658 } | 669 } |
OLD | NEW |