Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2075)

Unified Diff: chrome/browser/safe_browsing/binary_integrity_service.h

Issue 444123002: Adding a new delayed analysis that verify binaries signature. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@grt
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/safe_browsing/binary_integrity_service.h
diff --git a/chrome/browser/safe_browsing/binary_integrity_service.h b/chrome/browser/safe_browsing/binary_integrity_service.h
new file mode 100644
index 0000000000000000000000000000000000000000..9ebc6d45cd645d787b6282ab57e76bf35cc9d732
--- /dev/null
+++ b/chrome/browser/safe_browsing/binary_integrity_service.h
@@ -0,0 +1,36 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CHROME_BROWSER_SAFE_BROWSING_BINARY_INTEGRITY_SERVICE_H_
+#define CHROME_BROWSER_SAFE_BROWSING_BINARY_INTEGRITY_SERVICE_H_
+
+#include <vector>
+
+#include "base/strings/string16.h"
+#include "chrome/browser/safe_browsing/add_incident_callback.h"
+
+namespace base {
+class FilePath;
+} // namespace base
+
+namespace safe_browsing {
+
+// Registers a process-wide analysis to the incident reporting service that
robertshield 2014/08/07 14:57:24 s/to/with/
pmonette_google.com 2014/08/07 21:29:28 Done.
+// verify the signature of the most critical binary used by Chrome. It will
robertshield 2014/08/07 14:57:24 s/verify/will verity/ s/binary/binaries/
pmonette_google.com 2014/08/07 21:29:28 Done.
+// send an incident report every time a signature verification fails.
+void RegisterBinaryIntegrityAnalysis();
+
+// Callback to pass to the incident reporting service. The incident reporting
+// service will decide when to start the analysis.
+void VerifyBinaryIntegrity(const AddIncidentCallback& callback);
+
+// Returns Chrome's current version.
+base::string16 GetChromeVersion();
robertshield 2014/08/07 14:57:24 I think there's something that will do this in src
pmonette_google.com 2014/08/07 21:29:28 Im using the CHROME_VERSION_STRING macro in "versi
+
+// Returns a vector containing the paths to all the binary to verify.
robertshield 2014/08/07 14:57:24 s/binary/binaries/
pmonette_google.com 2014/08/07 21:29:28 Done.
+std::vector<base::FilePath> GetCriticalBinariesPath();
+
+} // namespace safe_browsing
+
+#endif // CHROME_BROWSER_SAFE_BROWSING_BINARY_INTEGRITY_SERVICE_H_

Powered by Google App Engine
This is Rietveld 408576698