Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chromeos/cert_loader.h" | 5 #include "chromeos/cert_loader.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 #include <utility> | 8 #include <utility> |
| 9 | 9 |
| 10 #include "base/bind.h" | 10 #include "base/bind.h" |
| 11 #include "base/location.h" | 11 #include "base/location.h" |
| 12 #include "base/memory/ptr_util.h" | |
| 12 #include "base/strings/string_number_conversions.h" | 13 #include "base/strings/string_number_conversions.h" |
| 13 #include "base/task_runner_util.h" | 14 #include "base/task_scheduler/post_task.h" |
| 14 #include "base/threading/worker_pool.h" | 15 #include "base/threading/worker_pool.h" |
| 15 #include "crypto/nss_util.h" | 16 #include "crypto/nss_util.h" |
| 16 #include "crypto/scoped_nss_types.h" | 17 #include "crypto/scoped_nss_types.h" |
| 17 #include "net/cert/nss_cert_database.h" | 18 #include "net/cert/nss_cert_database.h" |
| 18 #include "net/cert/nss_cert_database_chromeos.h" | 19 #include "net/cert/nss_cert_database_chromeos.h" |
| 19 #include "net/cert/x509_certificate.h" | 20 #include "net/cert/x509_certificate.h" |
| 20 | 21 |
| 21 namespace chromeos { | 22 namespace chromeos { |
| 22 | 23 |
| 23 static CertLoader* g_cert_loader = NULL; | 24 namespace { |
| 25 | |
| 26 // Checks if |certificate| is on the given |slot|. | |
| 27 bool IsCertificateOnSlot(const net::X509Certificate* certificate, | |
| 28 PK11SlotInfo* slot) { | |
| 29 crypto::ScopedPK11SlotList slots_for_cert( | |
| 30 PK11_GetAllSlotsForCert(certificate->os_cert_handle(), nullptr)); | |
| 31 if (!slots_for_cert) | |
| 32 return false; | |
| 33 | |
| 34 for (PK11SlotListElement* slot_element = | |
| 35 PK11_GetFirstSafe(slots_for_cert.get()); | |
| 36 slot_element; slot_element = PK11_GetNextSafe(slots_for_cert.get(), | |
| 37 slot_element, PR_FALSE)) { | |
| 38 if (slot_element->slot == slot) { | |
| 39 // All previously visited elements have been freed by PK11_GetNextSafe, | |
| 40 // but we're not calling that for the last one, so free it explicitly. | |
|
emaxx
2017/04/25 15:15:58
nit: My understanding was that the issue is not on
pmarko
2017/04/25 16:59:57
Actually:
- Each element in the list starts out wi
| |
| 41 // The slots_for_cert list itself will be freed because ScopedPK11SlotList | |
| 42 // is a unique_ptr. | |
| 43 PK11_FreeSlotListElement(slots_for_cert.get(), slot_element); | |
| 44 return true; | |
| 45 } | |
| 46 } | |
| 47 return false; | |
| 48 } | |
| 49 | |
| 50 // Goes through all certificates in |all_certs| and copies those certificates | |
| 51 // which are on |system_slot| to |system_certs|. | |
| 52 void FilterSystemTokenCertificates(const net::CertificateList* all_certs, | |
| 53 net::CertificateList* system_certs, | |
| 54 crypto::ScopedPK11Slot system_slot) { | |
| 55 VLOG(1) << "FilterSystemTokenCertificates"; | |
| 56 if (!system_slot) | |
| 57 return; | |
| 58 // Extract certificates which are in the system token into the | |
| 59 // system_certs_ sublist. | |
| 60 for (auto cert : *all_certs) { | |
| 61 if (IsCertificateOnSlot(cert.get(), system_slot.get())) { | |
| 62 system_certs->push_back(cert); | |
| 63 } | |
| 64 } | |
| 65 } | |
| 66 | |
| 67 } // namespace | |
| 68 | |
| 69 static CertLoader* g_cert_loader = nullptr; | |
| 24 static bool g_force_hardware_backed_for_test = false; | 70 static bool g_force_hardware_backed_for_test = false; |
| 25 | 71 |
| 26 // static | 72 // static |
| 27 void CertLoader::Initialize() { | 73 void CertLoader::Initialize() { |
| 28 CHECK(!g_cert_loader); | 74 CHECK(!g_cert_loader); |
| 29 g_cert_loader = new CertLoader(); | 75 g_cert_loader = new CertLoader(); |
| 30 } | 76 } |
| 31 | 77 |
| 32 // static | 78 // static |
| 33 void CertLoader::Shutdown() { | 79 void CertLoader::Shutdown() { |
| 34 CHECK(g_cert_loader); | 80 CHECK(g_cert_loader); |
| 35 delete g_cert_loader; | 81 delete g_cert_loader; |
| 36 g_cert_loader = NULL; | 82 g_cert_loader = nullptr; |
| 37 } | 83 } |
| 38 | 84 |
| 39 // static | 85 // static |
| 40 CertLoader* CertLoader::Get() { | 86 CertLoader* CertLoader::Get() { |
| 41 CHECK(g_cert_loader) << "CertLoader::Get() called before Initialize()"; | 87 CHECK(g_cert_loader) << "CertLoader::Get() called before Initialize()"; |
| 42 return g_cert_loader; | 88 return g_cert_loader; |
| 43 } | 89 } |
| 44 | 90 |
| 45 // static | 91 // static |
| 46 bool CertLoader::IsInitialized() { | 92 bool CertLoader::IsInitialized() { |
| 47 return g_cert_loader; | 93 return g_cert_loader; |
| 48 } | 94 } |
| 49 | 95 |
| 50 CertLoader::CertLoader() | 96 CertLoader::CertLoader() |
| 51 : certificates_loaded_(false), | 97 : certificates_loaded_(false), |
| 52 certificates_update_required_(false), | 98 certificates_update_required_(false), |
| 53 certificates_update_running_(false), | 99 certificates_update_running_(false), |
| 54 database_(NULL), | 100 database_(nullptr), |
| 55 cert_list_(new net::CertificateList), | 101 all_certs_(new net::CertificateList), |
| 56 weak_factory_(this) { | 102 weak_factory_(this) {} |
| 57 } | |
| 58 | 103 |
| 59 CertLoader::~CertLoader() { | 104 CertLoader::~CertLoader() { |
| 60 net::CertDatabase::GetInstance()->RemoveObserver(this); | 105 net::CertDatabase::GetInstance()->RemoveObserver(this); |
| 61 } | 106 } |
| 62 | 107 |
| 63 void CertLoader::StartWithNSSDB(net::NSSCertDatabase* database) { | 108 void CertLoader::StartWithNSSDB(net::NSSCertDatabase* database) { |
| 64 CHECK(!database_); | 109 CHECK(!database_); |
| 65 database_ = database; | 110 database_ = database; |
| 66 | 111 |
| 67 // Start observing cert database for changes. | 112 // Start observing cert database for changes. |
| (...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 109 // NOTE: This function relies on the convention that the same PKCS#11 ID | 154 // NOTE: This function relies on the convention that the same PKCS#11 ID |
| 110 // is shared between a certificate and its associated private and public | 155 // is shared between a certificate and its associated private and public |
| 111 // keys. I tried to implement this with PK11_GetLowLevelKeyIDForCert(), | 156 // keys. I tried to implement this with PK11_GetLowLevelKeyIDForCert(), |
| 112 // but that always returns NULL on Chrome OS for me. | 157 // but that always returns NULL on Chrome OS for me. |
| 113 std::string CertLoader::GetPkcs11IdAndSlotForCert( | 158 std::string CertLoader::GetPkcs11IdAndSlotForCert( |
| 114 const net::X509Certificate& cert, | 159 const net::X509Certificate& cert, |
| 115 int* slot_id) { | 160 int* slot_id) { |
| 116 DCHECK(slot_id); | 161 DCHECK(slot_id); |
| 117 | 162 |
| 118 CERTCertificateStr* cert_handle = cert.os_cert_handle(); | 163 CERTCertificateStr* cert_handle = cert.os_cert_handle(); |
| 119 SECKEYPrivateKey *priv_key = | 164 SECKEYPrivateKey* priv_key = |
| 120 PK11_FindKeyByAnyCert(cert_handle, NULL /* wincx */); | 165 PK11_FindKeyByAnyCert(cert_handle, nullptr /* wincx */); |
| 121 if (!priv_key) | 166 if (!priv_key) |
| 122 return std::string(); | 167 return std::string(); |
| 123 | 168 |
| 124 *slot_id = static_cast<int>(PK11_GetSlotID(priv_key->pkcs11Slot)); | 169 *slot_id = static_cast<int>(PK11_GetSlotID(priv_key->pkcs11Slot)); |
| 125 | 170 |
| 126 // Get the CKA_ID attribute for a key. | 171 // Get the CKA_ID attribute for a key. |
| 127 SECItem* sec_item = PK11_GetLowLevelKeyIDForPrivateKey(priv_key); | 172 SECItem* sec_item = PK11_GetLowLevelKeyIDForPrivateKey(priv_key); |
| 128 std::string pkcs11_id; | 173 std::string pkcs11_id; |
| 129 if (sec_item) { | 174 if (sec_item) { |
| 130 pkcs11_id = base::HexEncode(sec_item->data, sec_item->len); | 175 pkcs11_id = base::HexEncode(sec_item->data, sec_item->len); |
| (...skipping 10 matching lines...) Expand all Loading... | |
| 141 | 186 |
| 142 if (certificates_update_running_) { | 187 if (certificates_update_running_) { |
| 143 certificates_update_required_ = true; | 188 certificates_update_required_ = true; |
| 144 return; | 189 return; |
| 145 } | 190 } |
| 146 | 191 |
| 147 certificates_update_running_ = true; | 192 certificates_update_running_ = true; |
| 148 certificates_update_required_ = false; | 193 certificates_update_required_ = false; |
| 149 | 194 |
| 150 database_->ListCerts( | 195 database_->ListCerts( |
| 151 base::Bind(&CertLoader::UpdateCertificates, weak_factory_.GetWeakPtr())); | 196 base::Bind(&CertLoader::CertificatesLoaded, weak_factory_.GetWeakPtr())); |
| 197 } | |
| 198 | |
| 199 void CertLoader::CertificatesLoaded( | |
| 200 std::unique_ptr<net::CertificateList> all_certs) { | |
| 201 CHECK(thread_checker_.CalledOnValidThread()); | |
| 202 VLOG(1) << "CertificatesLoaded: " << all_certs->size(); | |
| 203 | |
| 204 crypto::ScopedPK11Slot system_slot = database_->GetSystemSlot(); | |
| 205 std::unique_ptr<net::CertificateList> system_certs = | |
| 206 base::MakeUnique<net::CertificateList>(); | |
| 207 base::PostTaskWithTraitsAndReply( | |
| 208 FROM_HERE, | |
| 209 base::TaskTraits() | |
| 210 .WithShutdownBehavior( | |
|
pmarko
2017/04/25 12:10:03
I've used the same traits that were used in the re
emaxx
2017/04/25 15:15:58
Maybe you're right; to me the difference between t
pmarko
2017/04/25 16:59:57
@fdoray: Could you give advice here? We have a tas
| |
| 211 base::TaskShutdownBehavior::CONTINUE_ON_SHUTDOWN) | |
| 212 .MayBlock(), | |
| 213 base::Bind( | |
| 214 &FilterSystemTokenCertificates, base::Unretained(all_certs.get()), | |
| 215 base::Unretained(system_certs.get()), base::Passed(&system_slot)), | |
| 216 base::Bind(&CertLoader::UpdateCertificates, weak_factory_.GetWeakPtr(), | |
| 217 base::Passed(&all_certs), base::Passed(&system_certs))); | |
| 152 } | 218 } |
| 153 | 219 |
| 154 void CertLoader::UpdateCertificates( | 220 void CertLoader::UpdateCertificates( |
| 155 std::unique_ptr<net::CertificateList> cert_list) { | 221 std::unique_ptr<net::CertificateList> all_certs, |
| 222 std::unique_ptr<net::CertificateList> system_certs) { | |
| 156 CHECK(thread_checker_.CalledOnValidThread()); | 223 CHECK(thread_checker_.CalledOnValidThread()); |
| 157 DCHECK(certificates_update_running_); | 224 DCHECK(certificates_update_running_); |
| 158 VLOG(1) << "UpdateCertificates: " << cert_list->size(); | 225 VLOG(1) << "UpdateCertificates: " << all_certs->size() << " (" |
| 226 << system_certs->size() << " on system slot)"; | |
| 159 | 227 |
| 160 // Ignore any existing certificates. | 228 // Ignore any existing certificates. |
| 161 cert_list_ = std::move(cert_list); | 229 all_certs_ = std::move(all_certs); |
| 230 system_certs_ = std::move(system_certs); | |
| 162 | 231 |
| 163 bool initial_load = !certificates_loaded_; | 232 bool initial_load = !certificates_loaded_; |
| 164 certificates_loaded_ = true; | 233 certificates_loaded_ = true; |
| 165 NotifyCertificatesLoaded(initial_load); | 234 NotifyCertificatesLoaded(initial_load); |
| 166 | 235 |
| 167 certificates_update_running_ = false; | 236 certificates_update_running_ = false; |
| 168 if (certificates_update_required_) | 237 if (certificates_update_required_) |
| 169 LoadCertificates(); | 238 LoadCertificates(); |
| 170 } | 239 } |
| 171 | 240 |
| 172 void CertLoader::NotifyCertificatesLoaded(bool initial_load) { | 241 void CertLoader::NotifyCertificatesLoaded(bool initial_load) { |
| 173 for (auto& observer : observers_) | 242 for (auto& observer : observers_) |
| 174 observer.OnCertificatesLoaded(*cert_list_, initial_load); | 243 observer.OnCertificatesLoaded(*all_certs_, initial_load); |
| 175 } | 244 } |
| 176 | 245 |
| 177 void CertLoader::OnCertDBChanged() { | 246 void CertLoader::OnCertDBChanged() { |
| 178 VLOG(1) << "OnCertDBChanged"; | 247 VLOG(1) << "OnCertDBChanged"; |
| 179 LoadCertificates(); | 248 LoadCertificates(); |
| 180 } | 249 } |
| 181 | 250 |
| 182 } // namespace chromeos | 251 } // namespace chromeos |
| OLD | NEW |