OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "crypto/nss_util.h" | 5 #include "crypto/nss_util.h" |
6 | 6 |
7 #include <nss.h> | 7 #include <nss.h> |
8 #include <pk11pub.h> | 8 #include <pk11pub.h> |
9 #include <plarena.h> | 9 #include <plarena.h> |
10 #include <prerror.h> | 10 #include <prerror.h> |
(...skipping 246 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
257 ScopedPK11Slot private_slot_; | 257 ScopedPK11Slot private_slot_; |
258 | 258 |
259 bool private_slot_initialization_started_; | 259 bool private_slot_initialization_started_; |
260 | 260 |
261 typedef std::vector<base::Callback<void(ScopedPK11Slot)> > | 261 typedef std::vector<base::Callback<void(ScopedPK11Slot)> > |
262 SlotReadyCallbackList; | 262 SlotReadyCallbackList; |
263 SlotReadyCallbackList tpm_ready_callback_list_; | 263 SlotReadyCallbackList tpm_ready_callback_list_; |
264 }; | 264 }; |
265 | 265 |
266 class ScopedChapsLoadFixup { | 266 class ScopedChapsLoadFixup { |
267 public: | 267 public: |
268 ScopedChapsLoadFixup(); | 268 ScopedChapsLoadFixup(); |
269 ~ScopedChapsLoadFixup(); | 269 ~ScopedChapsLoadFixup(); |
270 | 270 |
271 private: | 271 private: |
272 #if defined(COMPONENT_BUILD) | 272 #if defined(COMPONENT_BUILD) |
273 void *chaps_handle_; | 273 void* chaps_handle_; |
274 #endif | 274 #endif |
275 }; | 275 }; |
276 | 276 |
277 #if defined(COMPONENT_BUILD) | 277 #if defined(COMPONENT_BUILD) |
278 | 278 |
279 ScopedChapsLoadFixup::ScopedChapsLoadFixup() { | 279 ScopedChapsLoadFixup::ScopedChapsLoadFixup() { |
280 // HACK: libchaps links the system protobuf and there are symbol conflicts | 280 // HACK: libchaps links the system protobuf and there are symbol conflicts |
281 // with the bundled copy. Load chaps with RTLD_DEEPBIND to workaround. | 281 // with the bundled copy. Load chaps with RTLD_DEEPBIND to workaround. |
282 chaps_handle_ = dlopen(kChapsPath, RTLD_LOCAL | RTLD_NOW | RTLD_DEEPBIND); | 282 chaps_handle_ = dlopen(kChapsPath, RTLD_LOCAL | RTLD_NOW | RTLD_DEEPBIND); |
283 } | 283 } |
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
361 } | 361 } |
362 | 362 |
363 // Note that a reference is not taken to chaps_module_. This is safe since | 363 // Note that a reference is not taken to chaps_module_. This is safe since |
364 // NSSInitSingleton is Leaky, so the reference it holds is never released. | 364 // NSSInitSingleton is Leaky, so the reference it holds is never released. |
365 std::unique_ptr<TPMModuleAndSlot> tpm_args( | 365 std::unique_ptr<TPMModuleAndSlot> tpm_args( |
366 new TPMModuleAndSlot(chaps_module_)); | 366 new TPMModuleAndSlot(chaps_module_)); |
367 TPMModuleAndSlot* tpm_args_ptr = tpm_args.get(); | 367 TPMModuleAndSlot* tpm_args_ptr = tpm_args.get(); |
368 if (base::WorkerPool::PostTaskAndReply( | 368 if (base::WorkerPool::PostTaskAndReply( |
369 FROM_HERE, | 369 FROM_HERE, |
370 base::Bind(&NSSInitSingleton::InitializeTPMTokenOnWorkerThread, | 370 base::Bind(&NSSInitSingleton::InitializeTPMTokenOnWorkerThread, |
371 system_slot_id, | 371 system_slot_id, tpm_args_ptr), |
372 tpm_args_ptr), | |
373 base::Bind(&NSSInitSingleton::OnInitializedTPMTokenAndSystemSlot, | 372 base::Bind(&NSSInitSingleton::OnInitializedTPMTokenAndSystemSlot, |
374 base::Unretained(this), // NSSInitSingleton is leaky | 373 base::Unretained(this), // NSSInitSingleton is leaky |
375 callback, | 374 callback, base::Passed(&tpm_args)), |
376 base::Passed(&tpm_args)), | 375 true /* task_is_slow */)) { |
377 true /* task_is_slow */ | |
378 )) { | |
379 initializing_tpm_token_ = true; | 376 initializing_tpm_token_ = true; |
380 } else { | 377 } else { |
381 base::ThreadTaskRunnerHandle::Get()->PostTask( | 378 base::ThreadTaskRunnerHandle::Get()->PostTask( |
382 FROM_HERE, base::Bind(callback, false)); | 379 FROM_HERE, base::Bind(callback, false)); |
383 } | 380 } |
384 } | 381 } |
385 | 382 |
386 static void InitializeTPMTokenOnWorkerThread(CK_SLOT_ID token_slot_id, | 383 static void InitializeTPMTokenOnWorkerThread(CK_SLOT_ID token_slot_id, |
387 TPMModuleAndSlot* tpm_args) { | 384 TPMModuleAndSlot* tpm_args) { |
388 // This tries to load the Chaps module so NSS can talk to the hardware | 385 // This tries to load the Chaps module so NSS can talk to the hardware |
(...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
523 if (!chaps_module_) | 520 if (!chaps_module_) |
524 return; | 521 return; |
525 | 522 |
526 // Note that a reference is not taken to chaps_module_. This is safe since | 523 // Note that a reference is not taken to chaps_module_. This is safe since |
527 // NSSInitSingleton is Leaky, so the reference it holds is never released. | 524 // NSSInitSingleton is Leaky, so the reference it holds is never released. |
528 std::unique_ptr<TPMModuleAndSlot> tpm_args( | 525 std::unique_ptr<TPMModuleAndSlot> tpm_args( |
529 new TPMModuleAndSlot(chaps_module_)); | 526 new TPMModuleAndSlot(chaps_module_)); |
530 TPMModuleAndSlot* tpm_args_ptr = tpm_args.get(); | 527 TPMModuleAndSlot* tpm_args_ptr = tpm_args.get(); |
531 base::WorkerPool::PostTaskAndReply( | 528 base::WorkerPool::PostTaskAndReply( |
532 FROM_HERE, | 529 FROM_HERE, |
533 base::Bind(&NSSInitSingleton::InitializeTPMTokenOnWorkerThread, | 530 base::Bind(&NSSInitSingleton::InitializeTPMTokenOnWorkerThread, slot_id, |
534 slot_id, | |
535 tpm_args_ptr), | 531 tpm_args_ptr), |
536 base::Bind(&NSSInitSingleton::OnInitializedTPMForChromeOSUser, | 532 base::Bind(&NSSInitSingleton::OnInitializedTPMForChromeOSUser, |
537 base::Unretained(this), // NSSInitSingleton is leaky | 533 base::Unretained(this), // NSSInitSingleton is leaky |
538 username_hash, | 534 username_hash, base::Passed(&tpm_args)), |
539 base::Passed(&tpm_args)), | 535 true /* task_is_slow */); |
540 true /* task_is_slow */ | |
541 ); | |
542 } | 536 } |
543 | 537 |
544 void OnInitializedTPMForChromeOSUser( | 538 void OnInitializedTPMForChromeOSUser( |
545 const std::string& username_hash, | 539 const std::string& username_hash, |
546 std::unique_ptr<TPMModuleAndSlot> tpm_args) { | 540 std::unique_ptr<TPMModuleAndSlot> tpm_args) { |
547 DCHECK(thread_checker_.CalledOnValidThread()); | 541 DCHECK(thread_checker_.CalledOnValidThread()); |
548 DVLOG(2) << "Got tpm slot for " << username_hash << " " | 542 DVLOG(2) << "Got tpm slot for " << username_hash << " " |
549 << !!tpm_args->tpm_slot; | 543 << !!tpm_args->tpm_slot; |
550 chromeos_user_map_[username_hash]->SetPrivateSlot( | 544 chromeos_user_map_[username_hash]->SetPrivateSlot( |
551 std::move(tpm_args->tpm_slot)); | 545 std::move(tpm_args->tpm_slot)); |
(...skipping 429 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
981 return time.ToInternalValue() - base::Time::UnixEpoch().ToInternalValue(); | 975 return time.ToInternalValue() - base::Time::UnixEpoch().ToInternalValue(); |
982 } | 976 } |
983 | 977 |
984 #if !defined(OS_CHROMEOS) | 978 #if !defined(OS_CHROMEOS) |
985 PK11SlotInfo* GetPersistentNSSKeySlot() { | 979 PK11SlotInfo* GetPersistentNSSKeySlot() { |
986 return g_nss_singleton.Get().GetPersistentNSSKeySlot(); | 980 return g_nss_singleton.Get().GetPersistentNSSKeySlot(); |
987 } | 981 } |
988 #endif | 982 #endif |
989 | 983 |
990 } // namespace crypto | 984 } // namespace crypto |
OLD | NEW |