Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(794)

Side by Side Diff: chromeos/network/cert_loader.cc

Issue 14522013: Separate cert loading code from CertLibrary and move to src/chromeos (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase + Add comments / address nits Created 7 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chromeos/network/cert_loader.h"
6
7 #include <algorithm>
8
9 #include "base/chromeos/chromeos_version.h"
10 #include "base/observer_list_threadsafe.h"
11 #include "base/task_runner_util.h"
12 #include "base/threading/worker_pool.h"
13 #include "chromeos/dbus/cryptohome_client.h"
14 #include "chromeos/dbus/dbus_thread_manager.h"
15 #include "crypto/encryptor.h"
16 #include "crypto/nss_util.h"
17 #include "crypto/sha2.h"
18 #include "crypto/symmetric_key.h"
19 #include "net/cert/nss_cert_database.h"
20
21 namespace chromeos {
22
23 namespace {
24
25 // Delay between certificate requests while waiting for TPM/PKCS#11 init.
26 const int kRequestDelayMs = 500;
27
28 net::CertificateList* LoadNSSCertificates() {
29 net::CertificateList* cert_list(new net::CertificateList());
30 net::NSSCertDatabase::GetInstance()->ListCerts(cert_list);
31 return cert_list;
32 }
33
34 } // namespace
35
36 static CertLoader* g_cert_loader = NULL;
37
38 // static
39 void CertLoader::Initialize() {
40 CHECK(!g_cert_loader);
41 g_cert_loader = new CertLoader();
42 }
43
44 // static
45 void CertLoader::Shutdown() {
46 CHECK(g_cert_loader);
47 delete g_cert_loader;
48 g_cert_loader = NULL;
49 }
50
51 // static
52 CertLoader* CertLoader::Get() {
53 CHECK(g_cert_loader) << "CertLoader::Get() called before Initialize()";
54 return g_cert_loader;
55 }
56
57 CertLoader::CertLoader()
58 : observer_list_(new ObserverList),
59 tpm_token_ready_(false),
60 certificates_requested_(false),
61 certificates_loaded_(false),
62 key_store_loaded_(false),
63 weak_ptr_factory_(this) {
64 net::CertDatabase::GetInstance()->AddObserver(this);
65 LoginState::Get()->AddObserver(this);
66 if (LoginState::Get()->IsUserLoggedIn())
67 RequestCertificates();
68 }
69
70 CertLoader::~CertLoader() {
71 DCHECK(request_task_.is_null());
72 net::CertDatabase::GetInstance()->RemoveObserver(this);
73 LoginState::Get()->RemoveObserver(this);
74 }
75
76 void CertLoader::AddObserver(CertLoader::Observer* observer) {
77 observer_list_->AddObserver(observer);
78 }
79
80 void CertLoader::RemoveObserver(CertLoader::Observer* observer) {
81 observer_list_->RemoveObserver(observer);
82 }
83
84 bool CertLoader::RequestCertificates() {
85 CHECK(thread_checker_.CalledOnValidThread());
86 VLOG(1) << "RequestCertificates: " << LoginState::Get()->IsUserLoggedIn();
pneubeck (no reviews) 2013/05/02 14:58:35 nit: clarify VLOG to explain the printed value. E.
stevenjb 2013/05/03 01:00:31 I don't feel that would really be more helpful for
87 if (!LoginState::Get()->IsUserLoggedIn())
88 return false;
89
90 if (!key_store_loaded_) {
91 // Ensure we've opened the real user's key/certificate database.
92 crypto::OpenPersistentNSSDB();
93
94 if (base::chromeos::IsRunningOnChromeOS())
95 crypto::EnableTPMTokenForNSS();
96
97 key_store_loaded_ = true;
98 }
99
100 certificates_requested_ = true;
101
102 VLOG(1) << "Requesting Certificates.";
103 DBusThreadManager::Get()->GetCryptohomeClient()->TpmIsEnabled(
104 base::Bind(&CertLoader::OnTpmIsEnabled,
105 weak_ptr_factory_.GetWeakPtr()));
106
107 return true;
108 }
109
110 bool CertLoader::CertificatesLoading() const {
111 return certificates_requested_ && !certificates_loaded_;
112 }
113
114 bool CertLoader::IsHardwareBacked() const {
115 return !tpm_token_name_.empty();
116 }
117
118 // private methods
pneubeck (no reviews) 2013/05/02 14:58:35 nit: not helpful?
stevenjb 2013/05/03 01:00:31 Done.
119
120 void CertLoader::OnTpmIsEnabled(DBusMethodCallStatus call_status,
121 bool tpm_is_enabled) {
122 VLOG(1) << "OnTpmIsEnabled: " << tpm_is_enabled;
123 if (call_status != DBUS_METHOD_CALL_SUCCESS || !tpm_is_enabled) {
124 // TPM is not enabled, so proceed with empty tpm token name.
125 VLOG(1) << "TPM not available.";
126 StartLoadCertificates();
127 } else if (tpm_token_ready_) {
pneubeck (no reviews) 2013/05/02 14:58:35 verbally this doesn't make any sense .. if it's re
stevenjb 2013/05/03 01:00:31 Um, yes? The TPM needs to be initialized, once it
pneubeck (no reviews) 2013/05/03 09:42:54 "ready" sounds to me more like the initialization
128 InitializeTPMToken();
129 } else {
130 DBusThreadManager::Get()->GetCryptohomeClient()->Pkcs11IsTpmTokenReady(
131 base::Bind(&CertLoader::OnPkcs11IsTpmTokenReady,
132 weak_ptr_factory_.GetWeakPtr()));
133 }
134 }
135
136 void CertLoader::OnPkcs11IsTpmTokenReady(DBusMethodCallStatus call_status,
137 bool is_tpm_token_ready) {
138 VLOG(1) << "OnPkcs11IsTpmTokenReady: " << is_tpm_token_ready;
139 if (call_status != DBUS_METHOD_CALL_SUCCESS || !is_tpm_token_ready) {
140 MaybeRetryRequestCertificates();
141 return;
142 }
143
144 // Retrieve token_name_ and user_pin_ here since they will never change
145 // and CryptohomeClient calls are not thread safe.
146 DBusThreadManager::Get()->GetCryptohomeClient()->Pkcs11GetTpmTokenInfo(
147 base::Bind(&CertLoader::OnPkcs11GetTpmTokenInfo,
148 weak_ptr_factory_.GetWeakPtr()));
149 }
150
151 void CertLoader::OnPkcs11GetTpmTokenInfo(DBusMethodCallStatus call_status,
152 const std::string& token_name,
153 const std::string& user_pin) {
154 VLOG(1) << "OnPkcs11GetTpmTokenInfo: " << token_name;
155 if (call_status != DBUS_METHOD_CALL_SUCCESS) {
156 MaybeRetryRequestCertificates();
157 return;
158 }
159 tpm_token_name_ = token_name;
160 tpm_user_pin_ = user_pin;
161 tpm_token_ready_ = true;
162
163 InitializeTPMToken();
164 }
165
166 void CertLoader::InitializeTPMToken() {
pneubeck (no reviews) 2013/05/02 14:58:35 maybe rename to "InitializeNSSForTPM".
167 VLOG(1) << "InitializeTPMToken";
168 if (!crypto::InitializeTPMToken(tpm_token_name_, tpm_user_pin_)) {
169 MaybeRetryRequestCertificates();
170 return;
171 }
172 StartLoadCertificates();
173 }
174
175 void CertLoader::StartLoadCertificates() {
176 VLOG(1) << "Start Load Certificates";
177 base::PostTaskAndReplyWithResult(
pneubeck (no reviews) 2013/05/02 14:58:35 Not that it's really problematic, but I'd guess th
stevenjb 2013/05/03 01:00:31 Not sure I follow right now, but seems like a chan
178 base::WorkerPool::GetTaskRunner(true /* task_is_slow */),
179 FROM_HERE,
180 base::Bind(LoadNSSCertificates),
181 base::Bind(&CertLoader::UpdateCertificates,
182 weak_ptr_factory_.GetWeakPtr()));
183 }
184
185 void CertLoader::UpdateCertificates(net::CertificateList* cert_list) {
186 CHECK(thread_checker_.CalledOnValidThread());
187 DCHECK(cert_list);
188 VLOG(1) << "Update Certificates: " << cert_list->size();
pneubeck (no reviews) 2013/05/02 14:58:35 nit: make vlog self explanatory. "Number of certs:
stevenjb 2013/05/03 01:00:31 Again, doesn't seem helpful to me, will leave for
189
190 // Clear any existing certificates.
191 cert_list_ = *cert_list; // Copy vector
pneubeck (no reviews) 2013/05/02 14:58:35 nit: why not swap?
stevenjb 2013/05/03 01:00:31 Done.
192
193 // cert_list is constructed in LoadCertificates.
194 delete cert_list;
195
196 // Set loaded state and notify observers.
197 if (!certificates_loaded_) {
198 certificates_loaded_ = true;
199 NotifyCertificatesLoaded(true);
200 } else {
201 NotifyCertificatesLoaded(false);
202 }
203 }
204
205 void CertLoader::MaybeRetryRequestCertificates() {
pneubeck (no reviews) 2013/05/02 14:58:35 Rename to RetryRequestCertificates
206 if (!request_task_.is_null())
pneubeck (no reviews) 2013/05/02 14:58:35 I don't see the gain of storing the closure reques
stevenjb 2013/05/03 01:00:31 TODO: Refactor
207 return;
208
209 // Cryptohome does not notify us when the token is ready, so call
210 // this again after a delay.
211 request_task_ = base::Bind(&CertLoader::RequestCertificatesTask,
212 weak_ptr_factory_.GetWeakPtr());
213 MessageLoop::current()->PostDelayedTask(
214 FROM_HERE,
215 request_task_,
216 base::TimeDelta::FromMilliseconds(kRequestDelayMs));
217 }
218
219 void CertLoader::RequestCertificatesTask() {
220 // Reset the task to the initial state so is_null() returns true.
221 request_task_.Reset();
222 RequestCertificates();
223 }
224
225 void CertLoader::NotifyCertificatesLoaded(bool initial_load) {
226 observer_list_->Notify(
227 &CertLoader::Observer::OnCertificatesLoaded, cert_list_, initial_load);
228 }
229
230 void CertLoader::OnCertTrustChanged(const net::X509Certificate* cert) {
231 }
232
233 void CertLoader::OnCertAdded(const net::X509Certificate* cert) {
234 // Only load certificates if we have completed an initial request.
235 if (!certificates_loaded_)
236 return;
237 StartLoadCertificates();
pneubeck (no reviews) 2013/05/02 14:58:35 There is a race: if LoadNSSCertificates() is curr
stevenjb 2013/05/03 01:00:31 TODO: Refactor
238 }
239
240 void CertLoader::OnCertRemoved(const net::X509Certificate* cert) {
241 // Only load certificates if we have completed an initial request.
242 if (!certificates_loaded_)
243 return;
244 StartLoadCertificates();
245 }
246
247 void CertLoader::LoggedInStateChanged(LoginState::LoggedInState state) {
248 VLOG(1) << "LoggedInStateChanged: " << state;
249 if (LoginState::Get()->IsUserLoggedIn() && !certificates_requested_)
pneubeck (no reviews) 2013/05/02 14:58:35 the conditional !certificates_requested_ shouldn't
stevenjb 2013/05/03 01:00:31 TODO:Refactor
250 RequestCertificates();
251 }
252
253 } // namespace chromeos
OLDNEW
« chromeos/network/cert_loader.h ('K') | « chromeos/network/cert_loader.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698