Index: chrome/browser/chromeos/login/owner_manager.cc |
diff --git a/chrome/browser/chromeos/login/owner_manager.cc b/chrome/browser/chromeos/login/owner_manager.cc |
deleted file mode 100644 |
index 7f9a20a7913fb8d1d39d759ec8ee4c5941049b36..0000000000000000000000000000000000000000 |
--- a/chrome/browser/chromeos/login/owner_manager.cc |
+++ /dev/null |
@@ -1,147 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/chromeos/login/owner_manager.h" |
- |
-#include <string> |
-#include <vector> |
- |
-#include "base/bind.h" |
-#include "base/file_path.h" |
-#include "base/file_util.h" |
-#include "chrome/browser/browser_process.h" |
-#include "chrome/browser/chromeos/boot_times_loader.h" |
-#include "chrome/browser/chromeos/login/signed_settings_cache.h" |
-#include "chrome/common/chrome_notification_types.h" |
-#include "content/public/browser/browser_thread.h" |
-#include "content/public/browser/notification_service.h" |
- |
-using content::BrowserThread; |
- |
-namespace chromeos { |
- |
-OwnerManager::OwnerManager() |
- : private_key_(NULL), |
- public_key_(0), |
- utils_(OwnerKeyUtils::Create()) { |
-} |
- |
-void OwnerManager::UpdateOwnerKey(const BrowserThread::ID thread_id, |
- const std::vector<uint8>& key, |
- KeyUpdateDelegate* d) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- |
- public_key_ = key; |
- |
- BrowserThread::PostTask( |
- thread_id, FROM_HERE, |
- base::Bind(&OwnerManager::CallKeyUpdateDelegate, this, d)); |
-} |
- |
-void OwnerManager::LoadOwnerKey() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- VLOG(1) << "Loading owner key"; |
- int result = chrome::NOTIFICATION_OWNER_KEY_FETCH_ATTEMPT_SUCCEEDED; |
- |
- // If |public_key_| isn't empty, we already have the key, so don't |
- // try to import again. |
- if (public_key_.empty() && |
- !utils_->ImportPublicKey(utils_->GetOwnerKeyFilePath(), &public_key_)) { |
- result = chrome::NOTIFICATION_OWNER_KEY_FETCH_ATTEMPT_FAILED; |
- } |
- |
- // Whether we loaded the public key or not, send a notification indicating |
- // that we're done with this attempt. |
- BrowserThread::PostTask( |
- BrowserThread::UI, FROM_HERE, |
- base::Bind(&OwnerManager::SendNotification, this, result, |
- content::NotificationService::NoDetails())); |
-} |
- |
-bool OwnerManager::EnsurePublicKey() { |
- if (public_key_.empty()) |
- LoadOwnerKey(); |
- |
- return !public_key_.empty(); |
-} |
- |
-bool OwnerManager::EnsurePrivateKey() { |
- if (!EnsurePublicKey()) |
- return false; |
- |
- if (!private_key_.get()) |
- private_key_.reset(utils_->FindPrivateKey(public_key_)); |
- |
- return private_key_.get() != NULL; |
-} |
- |
-void OwnerManager::Sign(const BrowserThread::ID thread_id, |
- const std::string& data, |
- Delegate* d) { |
- BootTimesLoader::Get()->AddLoginTimeMarker("SignStart", false); |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- |
- // If it's not the case that we can get both keys... |
- if (!(EnsurePublicKey() && EnsurePrivateKey())) { |
- BrowserThread::PostTask( |
- thread_id, FROM_HERE, |
- base::Bind(&OwnerManager::CallDelegate, this, d, KEY_UNAVAILABLE, |
- std::vector<uint8>())); |
- BootTimesLoader::Get()->AddLoginTimeMarker("SignEnd", false); |
- return; |
- } |
- |
- VLOG(1) << "Starting signing attempt"; |
- KeyOpCode return_code = SUCCESS; |
- std::vector<uint8> signature; |
- if (!utils_->Sign(data, &signature, private_key_.get())) { |
- return_code = OPERATION_FAILED; |
- } |
- |
- BrowserThread::PostTask( |
- thread_id, FROM_HERE, |
- base::Bind(&OwnerManager::CallDelegate, this, d, return_code, signature)); |
- BootTimesLoader::Get()->AddLoginTimeMarker("SignEnd", false); |
-} |
- |
-void OwnerManager::Verify(const BrowserThread::ID thread_id, |
- const std::string& data, |
- const std::vector<uint8>& signature, |
- Delegate* d) { |
- BootTimesLoader::Get()->AddLoginTimeMarker("VerifyStart", false); |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- |
- if (!EnsurePublicKey()) { |
- BrowserThread::PostTask( |
- thread_id, FROM_HERE, |
- base::Bind(&OwnerManager::CallDelegate, this, d, KEY_UNAVAILABLE, |
- std::vector<uint8>())); |
- BootTimesLoader::Get()->AddLoginTimeMarker("VerifyEnd", false); |
- return; |
- } |
- |
- VLOG(1) << "Starting verify attempt"; |
- KeyOpCode return_code = SUCCESS; |
- if (!utils_->Verify(data, signature, public_key_)) { |
- return_code = OPERATION_FAILED; |
- } |
- BrowserThread::PostTask( |
- thread_id, FROM_HERE, |
- base::Bind(&OwnerManager::CallDelegate, this, d, return_code, |
- std::vector<uint8>())); |
- BootTimesLoader::Get()->AddLoginTimeMarker("VerifyEnd", false); |
-} |
- |
-OwnerManager::~OwnerManager() {} |
- |
-void OwnerManager::SendNotification( |
- int type, |
- const content::NotificationDetails& details) { |
- content::NotificationService::current()->Notify( |
- type, |
- content::NotificationService::AllSources(), |
- details); |
-} |
- |
-} // namespace chromeos |