| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_tpm_key_manager.
h" | 5 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_tpm_key_manager.
h" |
| 6 | 6 |
| 7 #include <cryptohi.h> | 7 #include <cryptohi.h> |
| 8 #include <keyhi.h> | 8 #include <keyhi.h> |
| 9 | 9 |
| 10 #include "base/base64.h" | 10 #include "base/base64.h" |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 49 base::Callback<void(crypto::ScopedPK11Slot)> callback_on_origin_thread = | 49 base::Callback<void(crypto::ScopedPK11Slot)> callback_on_origin_thread = |
| 50 base::Bind(&RunCallbackOnThreadRunner, response_task_runner, callback); | 50 base::Bind(&RunCallbackOnThreadRunner, response_task_runner, callback); |
| 51 | 51 |
| 52 crypto::ScopedPK11Slot system_slot = | 52 crypto::ScopedPK11Slot system_slot = |
| 53 crypto::GetSystemNSSKeySlot(callback_on_origin_thread); | 53 crypto::GetSystemNSSKeySlot(callback_on_origin_thread); |
| 54 if (system_slot) | 54 if (system_slot) |
| 55 callback_on_origin_thread.Run(system_slot.Pass()); | 55 callback_on_origin_thread.Run(system_slot.Pass()); |
| 56 } | 56 } |
| 57 | 57 |
| 58 // Checks if a private RSA key associated with |public_key| can be found in | 58 // Checks if a private RSA key associated with |public_key| can be found in |
| 59 // |slot|. | 59 // |slot|. |slot| must be non-null. |
| 60 // Must be called on a worker thread. | 60 // Must be called on a worker thread. |
| 61 crypto::ScopedSECKEYPrivateKey GetPrivateKeyOnWorkerThread( | 61 crypto::ScopedSECKEYPrivateKey GetPrivateKeyOnWorkerThread( |
| 62 PK11SlotInfo* slot, | 62 PK11SlotInfo* slot, |
| 63 const std::string& public_key) { | 63 const std::string& public_key) { |
| 64 CHECK(slot); |
| 65 |
| 64 const uint8* public_key_uint8 = | 66 const uint8* public_key_uint8 = |
| 65 reinterpret_cast<const uint8*>(public_key.data()); | 67 reinterpret_cast<const uint8*>(public_key.data()); |
| 66 std::vector<uint8> public_key_vector( | 68 std::vector<uint8> public_key_vector( |
| 67 public_key_uint8, public_key_uint8 + public_key.size()); | 69 public_key_uint8, public_key_uint8 + public_key.size()); |
| 68 | 70 |
| 69 // TODO(davidben): This should be equivalent to calling | |
| 70 // FindNSSKeyFromPublicKeyInfoInSlot. | |
| 71 crypto::ScopedSECKEYPrivateKey rsa_key( | 71 crypto::ScopedSECKEYPrivateKey rsa_key( |
| 72 crypto::FindNSSKeyFromPublicKeyInfo(public_key_vector)); | 72 crypto::FindNSSKeyFromPublicKeyInfoInSlot(public_key_vector, slot)); |
| 73 if (!rsa_key || rsa_key->pkcs11Slot != slot || | 73 if (!rsa_key || SECKEY_GetPrivateKeyType(rsa_key.get()) != rsaKey) |
| 74 SECKEY_GetPrivateKeyType(rsa_key.get()) != rsaKey) { | |
| 75 return nullptr; | 74 return nullptr; |
| 76 } | |
| 77 return rsa_key.Pass(); | 75 return rsa_key.Pass(); |
| 78 } | 76 } |
| 79 | 77 |
| 80 // Signs |data| using a private key associated with |public_key| and stored in | 78 // Signs |data| using a private key associated with |public_key| and stored in |
| 81 // |slot|. Once the data is signed, callback is run on |response_task_runner|. | 79 // |slot|. Once the data is signed, callback is run on |response_task_runner|. |
| 82 // In case of an error, the callback will be passed an empty string. | 80 // In case of an error, the callback will be passed an empty string. |
| 83 void SignDataOnWorkerThread( | 81 void SignDataOnWorkerThread( |
| 84 crypto::ScopedPK11Slot slot, | 82 crypto::ScopedPK11Slot slot, |
| 85 const std::string& public_key, | 83 const std::string& public_key, |
| 86 const std::string& data, | 84 const std::string& data, |
| (...skipping 265 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 352 // If key creation failed, reset the state machine. | 350 // If key creation failed, reset the state machine. |
| 353 create_tpm_key_state_ = | 351 create_tpm_key_state_ = |
| 354 public_key.empty() ? CREATE_TPM_KEY_NOT_STARTED : CREATE_TPM_KEY_DONE; | 352 public_key.empty() ? CREATE_TPM_KEY_NOT_STARTED : CREATE_TPM_KEY_DONE; |
| 355 } | 353 } |
| 356 | 354 |
| 357 void EasyUnlockTpmKeyManager::OnDataSigned( | 355 void EasyUnlockTpmKeyManager::OnDataSigned( |
| 358 const base::Callback<void(const std::string&)>& callback, | 356 const base::Callback<void(const std::string&)>& callback, |
| 359 const std::string& signature) { | 357 const std::string& signature) { |
| 360 callback.Run(signature); | 358 callback.Run(signature); |
| 361 } | 359 } |
| OLD | NEW |