OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/certificate_manager_model.h" | 5 #include "chrome/browser/certificate_manager_model.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/i18n/time_formatting.h" | 8 #include "base/i18n/time_formatting.h" |
9 #include "base/logging.h" | 9 #include "base/logging.h" |
10 #include "base/strings/utf_string_conversions.h" | 10 #include "base/strings/utf_string_conversions.h" |
11 #include "chrome/browser/ui/crypto_module_password_dialog.h" | 11 #include "chrome/browser/ui/crypto_module_password_dialog.h" |
12 #include "chrome/common/net/x509_certificate_model.h" | 12 #include "chrome/common/net/x509_certificate_model.h" |
| 13 #include "content/public/browser/browser_context.h" |
| 14 #include "content/public/browser/browser_thread.h" |
| 15 #include "content/public/browser/nss_context.h" |
| 16 #include "content/public/browser/resource_context.h" |
13 #include "net/base/crypto_module.h" | 17 #include "net/base/crypto_module.h" |
14 #include "net/base/net_errors.h" | 18 #include "net/base/net_errors.h" |
15 #include "net/cert/x509_certificate.h" | 19 #include "net/cert/x509_certificate.h" |
16 | 20 |
17 #if defined(OS_CHROMEOS) | 21 #if defined(OS_CHROMEOS) |
18 #include <cert.h> | 22 #include <cert.h> |
19 | 23 |
20 #include "crypto/nss_util.h" | 24 #include "crypto/nss_util.h" |
21 #include "grit/generated_resources.h" | 25 #include "grit/generated_resources.h" |
22 #include "ui/base/l10n/l10n_util.h" | 26 #include "ui/base/l10n/l10n_util.h" |
23 #endif | 27 #endif |
24 | 28 |
25 CertificateManagerModel::CertificateManagerModel(Observer* observer) | 29 using content::BrowserThread; |
26 : cert_db_(net::NSSCertDatabase::GetInstance()), | 30 |
27 observer_(observer) { | 31 namespace { |
| 32 |
| 33 void GotCertDBOnIOThread( |
| 34 const base::Callback<void(net::NSSCertDatabase*)>& callback, |
| 35 net::NSSCertDatabase* cert_db) { |
| 36 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); |
| 37 |
| 38 BrowserThread::PostTask( |
| 39 BrowserThread::UI, FROM_HERE, base::Bind(callback, cert_db)); |
| 40 } |
| 41 |
| 42 } // namespace |
| 43 |
| 44 CertificateManagerModel::CertificateManagerModel( |
| 45 content::BrowserContext* browser_context, |
| 46 Observer* observer) |
| 47 : observer_(observer), |
| 48 weak_ptr_factory_(this) { |
| 49 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 50 VLOG(1) << "Getting cert_db for profile..."; |
| 51 BrowserThread::PostTask( |
| 52 BrowserThread::IO, |
| 53 FROM_HERE, |
| 54 base::Bind(&content::GetNSSCertDatabaseForResourceContext, |
| 55 browser_context->GetResourceContext(), |
| 56 base::Bind(GotCertDBOnIOThread, |
| 57 base::Bind(&CertificateManagerModel::GotCertDB, |
| 58 weak_ptr_factory_.GetWeakPtr())))); |
28 } | 59 } |
29 | 60 |
30 CertificateManagerModel::~CertificateManagerModel() { | 61 CertificateManagerModel::~CertificateManagerModel() { |
31 } | 62 } |
32 | 63 |
33 void CertificateManagerModel::Refresh() { | 64 void CertificateManagerModel::Refresh() { |
| 65 // XXX should the rest of the NSS stuff also be on IO thread? or a worker |
| 66 // thread? |
34 VLOG(1) << "refresh started"; | 67 VLOG(1) << "refresh started"; |
35 net::CryptoModuleList modules; | 68 net::CryptoModuleList modules; |
36 cert_db_->ListModules(&modules, false); | 69 cert_db_->ListModules(&modules, false); |
37 VLOG(1) << "refresh waiting for unlocking..."; | 70 VLOG(1) << "refresh waiting for unlocking..."; |
38 chrome::UnlockSlotsIfNecessary( | 71 chrome::UnlockSlotsIfNecessary( |
39 modules, | 72 modules, |
40 chrome::kCryptoModulePasswordListCerts, | 73 chrome::kCryptoModulePasswordListCerts, |
41 std::string(), // unused. | 74 std::string(), // unused. |
42 base::Bind(&CertificateManagerModel::RefreshSlotsUnlocked, | 75 base::Bind(&CertificateManagerModel::RefreshSlotsUnlocked, |
43 base::Unretained(this))); | 76 base::Unretained(this))); |
44 } | 77 } |
45 | 78 |
| 79 void CertificateManagerModel::GotCertDB(net::NSSCertDatabase* cert_db) { |
| 80 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 81 DCHECK(cert_db); |
| 82 VLOG(1) << "Got cert_db"; |
| 83 cert_db_ = cert_db; |
| 84 observer_->CertificateManagerModelReady(); |
| 85 } |
| 86 |
46 void CertificateManagerModel::RefreshSlotsUnlocked() { | 87 void CertificateManagerModel::RefreshSlotsUnlocked() { |
47 VLOG(1) << "refresh listing certs..."; | 88 VLOG(1) << "refresh listing certs..."; |
48 cert_db_->ListCerts(&cert_list_); | 89 cert_db_->ListCerts(&cert_list_); |
49 observer_->CertificatesRefreshed(); | 90 observer_->CertificatesRefreshed(); |
50 VLOG(1) << "refresh finished"; | 91 VLOG(1) << "refresh finished"; |
51 } | 92 } |
52 | 93 |
53 void CertificateManagerModel::FilterAndBuildOrgGroupingMap( | 94 void CertificateManagerModel::FilterAndBuildOrgGroupingMap( |
54 net::CertType filter_type, | 95 net::CertType filter_type, |
55 CertificateManagerModel::OrgGroupingMap* map) const { | 96 CertificateManagerModel::OrgGroupingMap* map) const { |
(...skipping 94 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
150 bool CertificateManagerModel::Delete(net::X509Certificate* cert) { | 191 bool CertificateManagerModel::Delete(net::X509Certificate* cert) { |
151 bool result = cert_db_->DeleteCertAndKey(cert); | 192 bool result = cert_db_->DeleteCertAndKey(cert); |
152 if (result) | 193 if (result) |
153 Refresh(); | 194 Refresh(); |
154 return result; | 195 return result; |
155 } | 196 } |
156 | 197 |
157 bool CertificateManagerModel::IsHardwareBacked( | 198 bool CertificateManagerModel::IsHardwareBacked( |
158 const net::X509Certificate* cert) const { | 199 const net::X509Certificate* cert) const { |
159 #if defined(OS_CHROMEOS) | 200 #if defined(OS_CHROMEOS) |
160 return crypto::IsTPMTokenReady() && | 201 // XXX should we actually do the opposite check and make sure the cert doesn't |
161 cert->os_cert_handle()->slot == | 202 // exist in any non-tpm slots? |
162 cert_db_->GetPrivateModule()->os_module_handle(); | 203 return crypto::IsTPMTokenEnabledForNSS() && |
| 204 PK11_FindCertInSlot(cert_db_->GetPrivateModule()->os_module_handle(), |
| 205 cert->os_cert_handle(), |
| 206 NULL) != CK_INVALID_HANDLE; |
163 #else | 207 #else |
164 return false; | 208 return false; |
165 #endif | 209 #endif |
166 } | 210 } |
OLD | NEW |