OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/ownership/owner_settings_service.h" | 5 #include "components/ownership/owner_settings_service.h" |
6 | 6 |
7 #include <cryptohi.h> | 7 #include <cryptohi.h> |
8 #include <keyhi.h> | 8 #include <keyhi.h> |
9 #include <stdint.h> | 9 #include <stdint.h> |
10 | 10 |
(...skipping 19 matching lines...) Expand all Loading... |
30 crypto::NSSDestroyer1<SGNContext, SGN_DestroyContext, PR_TRUE>>; | 30 crypto::NSSDestroyer1<SGNContext, SGN_DestroyContext, PR_TRUE>>; |
31 | 31 |
32 scoped_ptr<em::PolicyFetchResponse> AssembleAndSignPolicy( | 32 scoped_ptr<em::PolicyFetchResponse> AssembleAndSignPolicy( |
33 scoped_ptr<em::PolicyData> policy, | 33 scoped_ptr<em::PolicyData> policy, |
34 SECKEYPrivateKey* private_key) { | 34 SECKEYPrivateKey* private_key) { |
35 // Assemble the policy. | 35 // Assemble the policy. |
36 scoped_ptr<em::PolicyFetchResponse> policy_response( | 36 scoped_ptr<em::PolicyFetchResponse> policy_response( |
37 new em::PolicyFetchResponse()); | 37 new em::PolicyFetchResponse()); |
38 if (!policy->SerializeToString(policy_response->mutable_policy_data())) { | 38 if (!policy->SerializeToString(policy_response->mutable_policy_data())) { |
39 LOG(ERROR) << "Failed to encode policy payload."; | 39 LOG(ERROR) << "Failed to encode policy payload."; |
40 return scoped_ptr<em::PolicyFetchResponse>(nullptr).Pass(); | 40 return scoped_ptr<em::PolicyFetchResponse>(nullptr); |
41 } | 41 } |
42 | 42 |
43 ScopedSGNContext sign_context( | 43 ScopedSGNContext sign_context( |
44 SGN_NewContext(SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION, private_key)); | 44 SGN_NewContext(SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION, private_key)); |
45 if (!sign_context) { | 45 if (!sign_context) { |
46 NOTREACHED(); | 46 NOTREACHED(); |
47 return nullptr; | 47 return nullptr; |
48 } | 48 } |
49 | 49 |
50 SECItem signature_item; | 50 SECItem signature_item; |
51 if (SGN_Begin(sign_context.get()) != SECSuccess || | 51 if (SGN_Begin(sign_context.get()) != SECSuccess || |
52 SGN_Update(sign_context.get(), | 52 SGN_Update(sign_context.get(), |
53 reinterpret_cast<const uint8_t*>( | 53 reinterpret_cast<const uint8_t*>( |
54 policy_response->policy_data().c_str()), | 54 policy_response->policy_data().c_str()), |
55 policy_response->policy_data().size()) != SECSuccess || | 55 policy_response->policy_data().size()) != SECSuccess || |
56 SGN_End(sign_context.get(), &signature_item) != SECSuccess) { | 56 SGN_End(sign_context.get(), &signature_item) != SECSuccess) { |
57 LOG(ERROR) << "Failed to create policy signature."; | 57 LOG(ERROR) << "Failed to create policy signature."; |
58 return nullptr; | 58 return nullptr; |
59 } | 59 } |
60 | 60 |
61 policy_response->mutable_policy_data_signature()->assign( | 61 policy_response->mutable_policy_data_signature()->assign( |
62 reinterpret_cast<const char*>(signature_item.data), signature_item.len); | 62 reinterpret_cast<const char*>(signature_item.data), signature_item.len); |
63 SECITEM_FreeItem(&signature_item, PR_FALSE); | 63 SECITEM_FreeItem(&signature_item, PR_FALSE); |
64 | 64 |
65 return policy_response.Pass(); | 65 return policy_response; |
66 } | 66 } |
67 | 67 |
68 } // namepace | 68 } // namepace |
69 | 69 |
70 OwnerSettingsService::OwnerSettingsService( | 70 OwnerSettingsService::OwnerSettingsService( |
71 const scoped_refptr<ownership::OwnerKeyUtil>& owner_key_util) | 71 const scoped_refptr<ownership::OwnerKeyUtil>& owner_key_util) |
72 : owner_key_util_(owner_key_util), weak_factory_(this) { | 72 : owner_key_util_(owner_key_util), weak_factory_(this) { |
73 } | 73 } |
74 | 74 |
75 OwnerSettingsService::~OwnerSettingsService() { | 75 OwnerSettingsService::~OwnerSettingsService() { |
(...skipping 83 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
159 for (std::vector<IsOwnerCallback>::iterator it(is_owner_callbacks.begin()); | 159 for (std::vector<IsOwnerCallback>::iterator it(is_owner_callbacks.begin()); |
160 it != is_owner_callbacks.end(); | 160 it != is_owner_callbacks.end(); |
161 ++it) { | 161 ++it) { |
162 it->Run(is_owner); | 162 it->Run(is_owner); |
163 } | 163 } |
164 | 164 |
165 OnPostKeypairLoadedActions(); | 165 OnPostKeypairLoadedActions(); |
166 } | 166 } |
167 | 167 |
168 } // namespace ownership | 168 } // namespace ownership |
OLD | NEW |