bool ValidateSignatures(const bf::path& base_path,
PrivilegeLevel* level, common_installer::CertificateInfo* cert_info,
- bool check_reference, bool is_preload, std::string* error_message) {
+ bool check_reference, std::string* error_message) {
// Find signature files
ValidationCore::SignatureFileInfoSet signature_files;
ValidationCore::SignatureFinder signature_finder(base_path.string());
bool ValidateSignatures(const boost::filesystem::path& base_path,
PrivilegeLevel* level, common_installer::CertificateInfo* cert_info,
- bool check_reference, bool is_preload, std::string* error_message);
+ bool check_reference, std::string* error_message);
bool ValidatePrivilegeLevel(common_installer::PrivilegeLevel level,
const std::string& app_type, const char* api_version, GList* privileges,
}
Step::Status StepCheckSignature::CheckSignatures(bool check_reference,
- bool is_preload,
PrivilegeLevel* level) {
std::string error_message;
if (!ValidateSignatures(GetSignatureRoot(), level,
&context_->certificate_info.get(), check_reference,
- is_preload, &error_message)) {
+ &error_message)) {
on_error(Status::CERT_ERROR, error_message);
return Status::CERT_ERROR;
}
context_->request_type.get() == ci::RequestType::ManifestDirectUpdate)))
check_reference = false;
bool is_preload = context_->is_preload_request.get();
- Status status = CheckSignatures(check_reference, is_preload, &level);
+ Status status = CheckSignatures(check_reference, &level);
if (status != Status::OK)
return status;
virtual Status CheckPrivilegeLevel(PrivilegeLevel level);
private:
- Status CheckSignatures(bool check_reference, bool is_preload,
- PrivilegeLevel* level);
+ Status CheckSignatures(bool check_reference, PrivilegeLevel* level);
Status CheckSignatureMismatch();
STEP_NAME(Signature)
PrivilegeLevel level;
if (!ValidateSignatures(GetSignatureRoot(), &level,
&context_->certificate_info.get(), false,
- false, &error_message)) {
+ &error_message)) {
LOG(ERROR) << "Failed to verify signature: " << error_message;
return Status::CERT_ERROR;
}
common_installer::CertificateInfo cert_info;
std::string error;
EXPECT_TRUE(ValidateSignatures(*signature_file, &level, &cert_info, true,
- false, &error));
+ &error));
}
// Tests signature verifier with signature directory containing bad signatures
common_installer::CertificateInfo cert_info;
std::string error;
EXPECT_FALSE(ValidateSignatures(*signature_file, &level, &cert_info, true,
- false, &error));
+ &error));
}
} // namespace security