OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 syntax = "proto2"; | 5 syntax = "proto2"; |
6 | 6 |
7 option optimize_for = LITE_RUNTIME; | 7 option optimize_for = LITE_RUNTIME; |
8 | 8 |
9 package enterprise_management; | 9 package enterprise_management; |
10 | 10 |
(...skipping 307 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
318 | 318 |
319 // If new_public_key is specified, this field contains a signature | 319 // If new_public_key is specified, this field contains a signature |
320 // of a PolicyPublicKeyAndDomain protobuf, signed using a key only | 320 // of a PolicyPublicKeyAndDomain protobuf, signed using a key only |
321 // available to DMServer. The public key portion of this well-known key is | 321 // available to DMServer. The public key portion of this well-known key is |
322 // embedded into the Chrome binary. The hash of that embedded key is passed | 322 // embedded into the Chrome binary. The hash of that embedded key is passed |
323 // to DMServer as verification_key_hash field in PolicyFetchRequest. DMServer | 323 // to DMServer as verification_key_hash field in PolicyFetchRequest. DMServer |
324 // will pick a private key on the server which matches the hash (matches | 324 // will pick a private key on the server which matches the hash (matches |
325 // public key on the client). If DMServer is unable to find matching key, it | 325 // public key on the client). If DMServer is unable to find matching key, it |
326 // will return an error instead of policy data. | 326 // will return an error instead of policy data. |
327 // In case hash was not specified, DMServer will leave verification signature | 327 // In case hash was not specified, DMServer will leave verification signature |
328 // field empty (legacy behavior). | 328 // field empty (legacy behavior). |
329 // In addition to the checks between new_public_key | 329 // In addition to the checks between new_public_key |
330 // and new_public_key_signature described above, Chrome also verifies | 330 // and new_public_key_signature described above, Chrome also verifies |
331 // new_public_key with the embedded public key and | 331 // new_public_key with the embedded public key and |
332 // new_public_key_verification_signature. | 332 // new_public_key_verification_signature. |
333 optional bytes new_public_key_verification_signature = 7; | 333 optional bytes new_public_key_verification_signature = 7; |
334 } | 334 } |
335 | 335 |
336 // Protobuf used to generate the new_public_key_verification_signature field. | 336 // Protobuf used to generate the new_public_key_verification_signature field. |
337 message PolicyPublicKeyAndDomain { | 337 message PolicyPublicKeyAndDomain { |
338 // The public key to sign (taken from the |new_public_key| field in | 338 // The public key to sign (taken from the |new_public_key| field in |
339 // PolicyFetchResponse). | 339 // PolicyFetchResponse). |
340 optional bytes new_public_key = 1; | 340 optional bytes new_public_key = 1; |
341 | 341 |
(...skipping 294 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
636 // * ping | 636 // * ping |
637 // * policy | 637 // * policy |
638 // * register | 638 // * register |
639 // * status | 639 // * status |
640 // * unregister | 640 // * unregister |
641 // * api_authorization | 641 // * api_authorization |
642 // | 642 // |
643 // * devicetype: MUST BE "1" for Android or "2" for Chrome OS. | 643 // * devicetype: MUST BE "1" for Android or "2" for Chrome OS. |
644 // * apptype: MUST BE Android or Chrome. | 644 // * apptype: MUST BE Android or Chrome. |
645 // * deviceid: MUST BE no more than 64-char in [\x21-\x7E]. | 645 // * deviceid: MUST BE no more than 64-char in [\x21-\x7E]. |
646 // * agent: MUST BE no more than 64-char long. | 646 // * agent: MUST BE a string of characters. |
647 // * HTTP Authorization header MUST be in the following formats: | 647 // * HTTP Authorization header MUST be in the following formats: |
648 // * For register and ping requests | 648 // * For register and ping requests |
649 // Authorization: GoogleLogin auth=<auth cookie for Mobile Sync> | 649 // Authorization: GoogleLogin auth=<auth cookie for Mobile Sync> |
650 // | 650 // |
651 // * For unregister, policy, status, and cert_upload requests | 651 // * For unregister, policy, status, and cert_upload requests |
652 // Authorization: GoogleDMToken token=<dm token from register> | 652 // Authorization: GoogleDMToken token=<dm token from register> |
653 // | 653 // |
654 // * The Authorization header isn't used for enterprise_check | 654 // * The Authorization header isn't used for enterprise_check |
655 // request, nor for register requests using OAuth. In the latter case, | 655 // request, nor for register requests using OAuth. In the latter case, |
656 // the OAuth token is passed in the "oauth" parameter. | 656 // the OAuth token is passed in the "oauth" parameter. |
(...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
738 | 738 |
739 // EMCert upload response. | 739 // EMCert upload response. |
740 optional DeviceCertUploadResponse cert_upload_response = 9; | 740 optional DeviceCertUploadResponse cert_upload_response = 9; |
741 | 741 |
742 // Response to OAuth2 authorization code request. | 742 // Response to OAuth2 authorization code request. |
743 optional DeviceServiceApiAccessResponse service_api_access_response = 10; | 743 optional DeviceServiceApiAccessResponse service_api_access_response = 10; |
744 | 744 |
745 // Device-state retrieval. | 745 // Device-state retrieval. |
746 optional DeviceStateRetrievalResponse device_state_retrieval_response = 11; | 746 optional DeviceStateRetrievalResponse device_state_retrieval_response = 11; |
747 } | 747 } |
OLD | NEW |