Index: chrome/browser/extensions/api/certificate_provider/certificate_provider_api.cc |
diff --git a/chrome/browser/extensions/api/certificate_provider/certificate_provider_api.cc b/chrome/browser/extensions/api/certificate_provider/certificate_provider_api.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..9e212645ce0449b1a26b775217b5ef0b2a397400 |
--- /dev/null |
+++ b/chrome/browser/extensions/api/certificate_provider/certificate_provider_api.cc |
@@ -0,0 +1,177 @@ |
+// Copyright 2015 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/extensions/api/certificate_provider/certificate_provider_api.h" |
+ |
+#include <stddef.h> |
+#include <stdint.h> |
+ |
+#include <vector> |
+ |
+#include "base/logging.h" |
+#include "base/memory/linked_ptr.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "base/stl_util.h" |
+#include "chrome/browser/chromeos/certificate_provider/certificate_provider_service.h" |
+#include "chrome/browser/chromeos/certificate_provider/certificate_provider_service_factory.h" |
+#include "chrome/common/extensions/api/certificate_provider.h" |
+#include "chrome/common/extensions/api/certificate_provider_internal.h" |
+#include "content/public/common/console_message_level.h" |
+#include "net/cert/x509_certificate.h" |
+#include "net/ssl/ssl_private_key.h" |
+ |
+namespace extensions { |
+ |
+namespace api_cp = api::certificate_provider; |
+namespace api_cpi = api::certificate_provider_internal; |
+ |
+namespace { |
+ |
+const char kErrorInvalidX509Cert[] = |
+ "Certificate is not a valid X.509 certificate."; |
+const char kErrorECDSANotSupported[] = "Key type ECDSA not supported."; |
+const char kErrorUnknownKeyType[] = "Key type unknown."; |
+const char kErrorAborted[] = "Request was aborted."; |
+const char kErrorTimeout[] = "Request timed out, reply rejected."; |
+ |
+} // namespace |
+ |
+CertificateProviderInternalReportCertificatesFunction:: |
+ ~CertificateProviderInternalReportCertificatesFunction() {} |
+ |
+ExtensionFunction::ResponseAction |
+CertificateProviderInternalReportCertificatesFunction::Run() { |
+ scoped_ptr<api_cpi::ReportCertificates::Params> params( |
+ api_cpi::ReportCertificates::Params::Create(*args_)); |
+ EXTENSION_FUNCTION_VALIDATE(params); |
+ |
+ chromeos::CertificateProviderService* const service = |
+ chromeos::CertificateProviderServiceFactory::GetForBrowserContext( |
+ browser_context()); |
+ DCHECK(service); |
+ |
+ if (!params->certificates) { |
+ // In the public API, the certificates parameter is mandatory. We only run |
+ // into this case, if the custom binding rejected the reply by the |
+ // extension. |
+ return RespondNow(Error(kErrorAborted)); |
+ } |
+ |
+ chromeos::certificate_provider::CertificateInfoList cert_infos; |
+ std::vector<std::vector<char>> rejected_certificates; |
+ for (linked_ptr<api_cp::CertificateInfo> input_cert_info : |
+ *params->certificates) { |
+ chromeos::certificate_provider::CertificateInfo parsed_cert_info; |
+ |
+ if (ParseCertificateInfo(*input_cert_info, &parsed_cert_info)) |
+ cert_infos.push_back(parsed_cert_info); |
+ else |
+ rejected_certificates.push_back(input_cert_info->certificate); |
+ } |
+ |
+ if (service->SetCertificatesProvidedByExtension( |
+ extension_id(), params->request_id, cert_infos)) { |
+ return RespondNow(ArgumentList( |
+ api_cpi::ReportCertificates::Results::Create(rejected_certificates))); |
+ } else { |
+ // The custom binding already checks for multiple reports to the same |
+ // request. The only remaining case, why this reply can fail is that the |
+ // request timed out. |
+ return RespondNow(Error(kErrorTimeout)); |
+ } |
+} |
+ |
+bool CertificateProviderInternalReportCertificatesFunction:: |
+ ParseCertificateInfo( |
+ const api_cp::CertificateInfo& info, |
+ chromeos::certificate_provider::CertificateInfo* out_info) { |
+ const std::vector<char>& cert_der = info.certificate; |
+ if (cert_der.empty()) { |
+ WriteToConsole(content::CONSOLE_MESSAGE_LEVEL_ERROR, kErrorInvalidX509Cert); |
+ return false; |
+ } |
+ |
+ out_info->certificate = net::X509Certificate::CreateFromBytes( |
+ vector_as_array(&cert_der), cert_der.size()); |
+ if (!out_info->certificate) { |
+ WriteToConsole(content::CONSOLE_MESSAGE_LEVEL_ERROR, kErrorInvalidX509Cert); |
+ return false; |
+ } |
+ |
+ size_t public_key_length_in_bits = 0; |
+ net::X509Certificate::PublicKeyType type = |
+ net::X509Certificate::kPublicKeyTypeUnknown; |
+ net::X509Certificate::GetPublicKeyInfo( |
+ out_info->certificate->os_cert_handle(), &public_key_length_in_bits, |
+ &type); |
+ |
+ switch (type) { |
+ case net::X509Certificate::kPublicKeyTypeRSA: |
+ DCHECK(public_key_length_in_bits); |
+ |
+ // Convert bits to bytes. |
+ out_info->max_signature_length_in_bytes = |
+ (public_key_length_in_bits + 7) / 8; |
+ out_info->type = net::SSLPrivateKey::Type::RSA; |
+ break; |
+ case net::X509Certificate::kPublicKeyTypeECDSA: |
+ WriteToConsole(content::CONSOLE_MESSAGE_LEVEL_ERROR, |
+ kErrorECDSANotSupported); |
+ return false; |
+ default: |
+ WriteToConsole(content::CONSOLE_MESSAGE_LEVEL_ERROR, |
+ kErrorUnknownKeyType); |
+ return false; |
+ } |
+ |
+ for (const api_cp::Hash hash : info.supported_hashes) { |
+ switch (hash) { |
+ case api_cp::HASH_MD5_SHA1: |
+ out_info->supported_hashes.push_back( |
+ net::SSLPrivateKey::Hash::MD5_SHA1); |
+ break; |
+ case api_cp::HASH_SHA1: |
+ out_info->supported_hashes.push_back(net::SSLPrivateKey::Hash::SHA1); |
+ break; |
+ case api_cp::HASH_SHA256: |
+ out_info->supported_hashes.push_back(net::SSLPrivateKey::Hash::SHA256); |
+ break; |
+ case api_cp::HASH_SHA384: |
+ out_info->supported_hashes.push_back(net::SSLPrivateKey::Hash::SHA384); |
+ break; |
+ case api_cp::HASH_SHA512: |
+ out_info->supported_hashes.push_back(net::SSLPrivateKey::Hash::SHA512); |
+ break; |
+ case api_cp::HASH_NONE: |
+ NOTREACHED(); |
+ return false; |
+ } |
+ } |
+ return true; |
+} |
+ |
+CertificateProviderInternalReportSignatureFunction:: |
+ ~CertificateProviderInternalReportSignatureFunction() {} |
+ |
+ExtensionFunction::ResponseAction |
+CertificateProviderInternalReportSignatureFunction::Run() { |
+ scoped_ptr<api_cpi::ReportSignature::Params> params( |
+ api_cpi::ReportSignature::Params::Create(*args_)); |
+ EXTENSION_FUNCTION_VALIDATE(params); |
+ |
+ chromeos::CertificateProviderService* const service = |
+ chromeos::CertificateProviderServiceFactory::GetForBrowserContext( |
+ browser_context()); |
+ DCHECK(service); |
+ |
+ std::vector<uint8_t> signature; |
+ // If an error occurred, |signature| will not be set. |
+ if (params->signature) |
+ signature.assign(params->signature->begin(), params->signature->end()); |
+ |
+ service->ReplyToSignRequest(extension_id(), params->request_id, signature); |
+ return RespondNow(NoArguments()); |
+} |
+ |
+} // namespace extensions |