OLD | NEW |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/extensions/api/enterprise_platform_keys_private/enterpr
ise_platform_keys_private_api.h" | 5 #include "chrome/browser/extensions/api/enterprise_platform_keys_private/enterpr
ise_platform_keys_private_api.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/base64.h" | 9 #include "base/base64.h" |
10 #include "base/callback.h" | 10 #include "base/callback.h" |
(...skipping 390 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
401 async_caller, | 401 async_caller, |
402 attestation_flow, | 402 attestation_flow, |
403 install_attributes) { | 403 install_attributes) { |
404 } | 404 } |
405 | 405 |
406 EPKPChallengeUserKey::~EPKPChallengeUserKey() { | 406 EPKPChallengeUserKey::~EPKPChallengeUserKey() { |
407 } | 407 } |
408 | 408 |
409 void EPKPChallengeUserKey::RegisterProfilePrefs( | 409 void EPKPChallengeUserKey::RegisterProfilePrefs( |
410 user_prefs::PrefRegistrySyncable* registry) { | 410 user_prefs::PrefRegistrySyncable* registry) { |
411 registry->RegisterBooleanPref( | 411 registry->RegisterBooleanPref(prefs::kAttestationEnabled, false); |
412 prefs::kAttestationEnabled, | 412 registry->RegisterListPref(prefs::kAttestationExtensionWhitelist); |
413 false, | |
414 user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); | |
415 registry->RegisterListPref(prefs::kAttestationExtensionWhitelist, | |
416 user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); | |
417 } | 413 } |
418 | 414 |
419 bool EPKPChallengeUserKey::RunAsync() { | 415 bool EPKPChallengeUserKey::RunAsync() { |
420 scoped_ptr<api_epkp::ChallengeUserKey::Params> params( | 416 scoped_ptr<api_epkp::ChallengeUserKey::Params> params( |
421 api_epkp::ChallengeUserKey::Params::Create(*args_)); | 417 api_epkp::ChallengeUserKey::Params::Create(*args_)); |
422 EXTENSION_FUNCTION_VALIDATE(params.get()); | 418 EXTENSION_FUNCTION_VALIDATE(params.get()); |
423 | 419 |
424 std::string challenge; | 420 std::string challenge; |
425 if (!base::Base64Decode(params->challenge, &challenge)) { | 421 if (!base::Base64Decode(params->challenge, &challenge)) { |
426 SetError(kChallengeBadBase64Error); | 422 SetError(kChallengeBadBase64Error); |
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
545 | 541 |
546 results_ = api_epkp::ChallengeUserKey::Results::Create(encoded_response); | 542 results_ = api_epkp::ChallengeUserKey::Results::Create(encoded_response); |
547 SendResponse(true); | 543 SendResponse(true); |
548 } | 544 } |
549 | 545 |
550 bool EPKPChallengeUserKey::IsRemoteAttestationEnabledForUser() const { | 546 bool EPKPChallengeUserKey::IsRemoteAttestationEnabledForUser() const { |
551 return GetProfile()->GetPrefs()->GetBoolean(prefs::kAttestationEnabled); | 547 return GetProfile()->GetPrefs()->GetBoolean(prefs::kAttestationEnabled); |
552 } | 548 } |
553 | 549 |
554 } // namespace extensions | 550 } // namespace extensions |
OLD | NEW |