Index: ppapi/api/private/ppb_platform_verification_private.idl |
diff --git a/ppapi/api/private/ppb_platform_verification_private.idl b/ppapi/api/private/ppb_platform_verification_private.idl |
new file mode 100644 |
index 0000000000000000000000000000000000000000..68573a3c4c68c79d21dd5df1a49582a396bd4cbf |
--- /dev/null |
+++ b/ppapi/api/private/ppb_platform_verification_private.idl |
@@ -0,0 +1,89 @@ |
+/* Copyright 2013 The Chromium Authors. All rights reserved. |
+ * Use of this source code is governed by a BSD-style license that can be |
+ * found in the LICENSE file. |
+ */ |
+ |
+/** |
+ * This file defines the API for platform verification. Currently, it only |
+ * supports Chrome OS. |
+ */ |
+ |
+[generate_thunk] |
+ |
+label Chrome { |
+ M31 = 0.1 |
+}; |
+ |
+/** |
+ * The <code>PPB_PlatformVerification_Private</code> interface allows authorized |
+ * services to verify that the underlying platform is trusted. An example of |
dmichael (off chromium)
2013/09/09 15:54:21
Would it be worthwhile to expand on what you mean
DaleCurtis
2013/09/09 20:49:14
I believe the current text is sufficient. I'm hesi
|
+ * a trusted platform is a Chromebook in verified boot mode. |
dmichael (off chromium)
2013/09/09 15:54:21
s/a Chromebook/ChromeOS
?
since not all ChromeOS d
DaleCurtis
2013/09/09 20:49:14
Done.
|
+ */ |
+ |
+interface PPB_PlatformVerification_Private { |
+ /** |
+ * Create() creates a <code>PPB_PlatformVerification_Private</code> object. |
+ * |
+ * @pram[in] instance A <code>PP_Instance</code> identifying one instance of |
+ * a module. |
+ * |
+ * @return A <code>PP_Resource</code> corresponding to a |
+ * <code>PPB_PlatformVerification_Private</code> if successful, 0 if creation |
+ * failed. |
+ */ |
+ PP_Resource Create([in] PP_Instance instance); |
+ |
+ /** |
+ * IsPlatformVerification() determines if the provided resource is a |
+ * <code>PPB_PlatformVerification_Private</code>. |
+ * |
+ * @param[in] resource A <code>PP_Resource</code> corresponding to a |
+ * <code>PPB_PlatformVerification_Private</code>. |
+ * |
+ * @return <code>PP_TRUE</code> if the resource is a |
+ * <code>PPB_PlatformVerification_Private</code>, <code>PP_FALSE</code> if the |
+ * resource is invalid or some type other than |
+ * <code>PPB_PlatformVerification_Private</code>. |
+ */ |
+ PP_Bool IsPlatformVerification([in] PP_Resource resource); |
+ |
+ /* Whether the platform can be challenged and is expected to pass. |
+ */ |
dmichael (off chromium)
2013/09/09 15:54:21
nit: Please use the same comment format as the oth
DaleCurtis
2013/09/09 20:49:14
Done.
|
+ PP_Bool CanChallengePlatform([in] PP_Resource instance); |
dmichael (off chromium)
2013/09/09 15:54:21
This doesn't seem strictly necessary. Is this basi
DaleCurtis
2013/09/09 20:49:14
Yes, kind of, it avoids both the cost of creating
|
+ |
+ /** |
+ * Requests a platform challenge for a given service id. |
dmichael (off chromium)
2013/09/09 15:54:21
Do you have any public documentation giving more d
DaleCurtis
2013/09/09 20:49:14
For ChromeOS it's just n bits of nonce data; which
|
+ * |
+ * @param[in] service_id A <code>PP_Var</code> of type |
+ * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge. |
+ * |
+ * @param[in] challenge A <code>PP_Var</code> of type |
+ * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data. |
DaleCurtis
2013/09/06 21:49:32
One PPAPI Q I have is whether it's worth having th
dmichael (off chromium)
2013/09/09 15:54:21
tl;dr: ArrayBuffer vars seem like the right choic
DaleCurtis
2013/09/09 20:49:14
Thanks for the detailed answer.
|
+ * |
+ * @param[out] signed_data A <code>PP_Var</code> of type |
+ * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the data signed by the |
+ * platform. |
+ * |
+ * @param[out] signed_data_signature A <code>PP_Var</code> of type |
+ * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the signature of the |
+ * signed data block. |
+ * |
+ * @param[out] platform_key_certificate A <code>PP_Var</code> of type |
+ * <code>PP_VARTYPE_STRING</code> that contains the device specific |
+ * certificate for the requested service_id. |
+ * |
+ * @param[in] callback A <code>PP_CompletionCallback</code> to be called after |
+ * the platform challenge has been completed. This callback will only run if |
+ * the return code is <code>PP_OK_COMPLETIONPENDING</code>. |
+ * |
+ * @return An int32_t containing an error code from <code>pp_errors.h</code>. |
+ */ |
+ int32_t ChallengePlatform( |
+ [in] PP_Resource instance, |
+ [in] PP_Var service_id, |
+ [in] PP_Var challenge, |
+ [out] PP_Var signed_data, |
+ [out] PP_Var signed_data_signature, |
+ [out] PP_Var platform_key_certificate, |
+ [in] PP_CompletionCallback callback); |
+}; |