OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/ownership/owner_settings_service.h" | 5 #include "components/ownership/owner_settings_service.h" |
6 | 6 |
7 #include <cryptohi.h> | 7 #include <cryptohi.h> |
8 #include <keyhi.h> | 8 #include <keyhi.h> |
9 #include <stdint.h> | 9 #include <stdint.h> |
10 | 10 |
11 #include "base/bind.h" | 11 #include "base/bind.h" |
12 #include "base/callback.h" | 12 #include "base/callback.h" |
13 #include "base/location.h" | 13 #include "base/location.h" |
14 #include "base/logging.h" | 14 #include "base/logging.h" |
15 #include "base/message_loop/message_loop.h" | 15 #include "base/message_loop/message_loop.h" |
16 #include "base/task_runner.h" | 16 #include "base/task_runner.h" |
17 #include "base/task_runner_util.h" | 17 #include "base/task_runner_util.h" |
18 #include "base/values.h" | 18 #include "base/values.h" |
19 #include "components/ownership/owner_key_util.h" | 19 #include "components/ownership/owner_key_util.h" |
20 #include "crypto/scoped_nss_types.h" | 20 #include "crypto/scoped_nss_types.h" |
21 | 21 |
22 namespace em = enterprise_management; | 22 namespace em = enterprise_management; |
23 | 23 |
24 namespace ownership { | 24 namespace ownership { |
25 | 25 |
26 namespace { | 26 namespace { |
27 | 27 |
28 using ScopedSGNContext = | 28 using ScopedSGNContext = std::unique_ptr< |
29 scoped_ptr<SGNContext, | 29 SGNContext, |
30 crypto::NSSDestroyer1<SGNContext, SGN_DestroyContext, PR_TRUE>>; | 30 crypto::NSSDestroyer1<SGNContext, SGN_DestroyContext, PR_TRUE>>; |
31 | 31 |
32 scoped_ptr<em::PolicyFetchResponse> AssembleAndSignPolicy( | 32 std::unique_ptr<em::PolicyFetchResponse> AssembleAndSignPolicy( |
33 scoped_ptr<em::PolicyData> policy, | 33 std::unique_ptr<em::PolicyData> policy, |
34 SECKEYPrivateKey* private_key) { | 34 SECKEYPrivateKey* private_key) { |
35 // Assemble the policy. | 35 // Assemble the policy. |
36 scoped_ptr<em::PolicyFetchResponse> policy_response( | 36 std::unique_ptr<em::PolicyFetchResponse> policy_response( |
37 new em::PolicyFetchResponse()); | 37 new em::PolicyFetchResponse()); |
38 if (!policy->SerializeToString(policy_response->mutable_policy_data())) { | 38 if (!policy->SerializeToString(policy_response->mutable_policy_data())) { |
39 LOG(ERROR) << "Failed to encode policy payload."; | 39 LOG(ERROR) << "Failed to encode policy payload."; |
40 return scoped_ptr<em::PolicyFetchResponse>(nullptr); | 40 return nullptr; |
41 } | 41 } |
42 | 42 |
43 ScopedSGNContext sign_context( | 43 ScopedSGNContext sign_context( |
44 SGN_NewContext(SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION, private_key)); | 44 SGN_NewContext(SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION, private_key)); |
45 if (!sign_context) { | 45 if (!sign_context) { |
46 NOTREACHED(); | 46 NOTREACHED(); |
47 return nullptr; | 47 return nullptr; |
48 } | 48 } |
49 | 49 |
50 SECItem signature_item; | 50 SECItem signature_item; |
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
95 if (private_key_.get()) { | 95 if (private_key_.get()) { |
96 base::MessageLoop::current()->PostTask(FROM_HERE, | 96 base::MessageLoop::current()->PostTask(FROM_HERE, |
97 base::Bind(callback, IsOwner())); | 97 base::Bind(callback, IsOwner())); |
98 } else { | 98 } else { |
99 pending_is_owner_callbacks_.push_back(callback); | 99 pending_is_owner_callbacks_.push_back(callback); |
100 } | 100 } |
101 } | 101 } |
102 | 102 |
103 bool OwnerSettingsService::AssembleAndSignPolicyAsync( | 103 bool OwnerSettingsService::AssembleAndSignPolicyAsync( |
104 base::TaskRunner* task_runner, | 104 base::TaskRunner* task_runner, |
105 scoped_ptr<em::PolicyData> policy, | 105 std::unique_ptr<em::PolicyData> policy, |
106 const AssembleAndSignPolicyAsyncCallback& callback) { | 106 const AssembleAndSignPolicyAsyncCallback& callback) { |
107 DCHECK(thread_checker_.CalledOnValidThread()); | 107 DCHECK(thread_checker_.CalledOnValidThread()); |
108 if (!task_runner || !IsOwner()) | 108 if (!task_runner || !IsOwner()) |
109 return false; | 109 return false; |
110 return base::PostTaskAndReplyWithResult( | 110 return base::PostTaskAndReplyWithResult( |
111 task_runner, | 111 task_runner, |
112 FROM_HERE, | 112 FROM_HERE, |
113 base::Bind( | 113 base::Bind( |
114 &AssembleAndSignPolicy, base::Passed(&policy), private_key_->key()), | 114 &AssembleAndSignPolicy, base::Passed(&policy), private_key_->key()), |
115 callback); | 115 callback); |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
159 for (std::vector<IsOwnerCallback>::iterator it(is_owner_callbacks.begin()); | 159 for (std::vector<IsOwnerCallback>::iterator it(is_owner_callbacks.begin()); |
160 it != is_owner_callbacks.end(); | 160 it != is_owner_callbacks.end(); |
161 ++it) { | 161 ++it) { |
162 it->Run(is_owner); | 162 it->Run(is_owner); |
163 } | 163 } |
164 | 164 |
165 OnPostKeypairLoadedActions(); | 165 OnPostKeypairLoadedActions(); |
166 } | 166 } |
167 | 167 |
168 } // namespace ownership | 168 } // namespace ownership |
OLD | NEW |