summaryrefslogtreecommitdiffstats
path: root/chrome/common
diff options
context:
space:
mode:
authorbryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-11-05 00:18:41 +0000
committerbryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-11-05 00:18:41 +0000
commitbb31d1a5b20fc34906e1a7693633204aa9791fc9 (patch)
tree75d64afc65975174de92cb16e8132633d22d1374 /chrome/common
parentc23bcafe6ffdd7d11a9589eda01bda4a06e78519 (diff)
downloadchromium_src-bb31d1a5b20fc34906e1a7693633204aa9791fc9.zip
chromium_src-bb31d1a5b20fc34906e1a7693633204aa9791fc9.tar.gz
chromium_src-bb31d1a5b20fc34906e1a7693633204aa9791fc9.tar.bz2
Extract the certificate to use in the download protection pingback.
Also sync the request protobuf with the server side, and make SignatureUtil mockable. BUG=102540 TEST=SignatureutilWinTest,DownloadProtectionServiceTest Review URL: http://codereview.chromium.org/8459001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@108747 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common')
-rw-r--r--chrome/common/safe_browsing/csd.proto17
1 files changed, 5 insertions, 12 deletions
diff --git a/chrome/common/safe_browsing/csd.proto b/chrome/common/safe_browsing/csd.proto
index a95bad8..f425b2d 100644
--- a/chrome/common/safe_browsing/csd.proto
+++ b/chrome/common/safe_browsing/csd.proto
@@ -125,19 +125,12 @@ message ClientDownloadRequest {
repeated Resource resources = 4;
message SignatureInfo {
- // If the binary is signed this will contain the name of the certificate
- // authority that signed the binary. The format of that field is TBD.
- optional bytes certificate_issuer = 1;
-
- // Serial number of the certificate autority. This value uniquely
- // identifies the certificate authority.
- optional bytes certificate_serial_number = 2;
-
- // Name of the company / organization the ceritificate was issued to.
- optional bytes certificate_subject = 3;
-
// The full DER-encoded X.509 certificate extracted from the binary.
- optional bytes certificate_contents = 4;
+ // If this field is not present, it means the binary was unsigned.
+ optional bytes certificate_contents = 1;
+
+ // True if the signature was trusted on the client.
+ optional bool trusted = 2;
}
// This field will only be set if the binary is signed.