OLD | NEW |
---|---|
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_BASE_KEYGEN_HANDLER_H_ | 5 #ifndef NET_BASE_KEYGEN_HANDLER_H_ |
6 #define NET_BASE_KEYGEN_HANDLER_H_ | 6 #define NET_BASE_KEYGEN_HANDLER_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/callback_forward.h" | 10 #include "base/callback_forward.h" |
11 #include "base/memory/scoped_ptr.h" | 11 #include "base/memory/scoped_ptr.h" |
12 #include "build/build_config.h" | 12 #include "build/build_config.h" |
13 #include "net/base/net_export.h" | 13 #include "net/base/net_export.h" |
14 #include "url/gurl.h" | 14 #include "url/gurl.h" |
15 | 15 |
16 #if defined(USE_NSS) | |
17 #include "crypto/scoped_nss_types.h" | |
pneubeck (no reviews)
2014/07/15 14:07:28
hmpf. This leaks nss includes into content/shell w
| |
18 #endif | |
19 | |
16 namespace crypto { | 20 namespace crypto { |
17 class NSSCryptoModuleDelegate; | 21 class CryptoModuleBlockingPasswordDelegate; |
18 } | 22 } |
19 | 23 |
20 namespace net { | 24 namespace net { |
21 | 25 |
22 // This class handles keypair generation for generating client | 26 // This class handles keypair generation for generating client |
23 // certificates via the <keygen> tag. | 27 // certificates via the <keygen> tag. |
24 // <http://dev.w3.org/html5/spec/Overview.html#the-keygen-element> | 28 // <http://dev.w3.org/html5/spec/Overview.html#the-keygen-element> |
25 // <https://developer.mozilla.org/En/HTML/HTML_Extensions/KEYGEN_Tag> | 29 // <https://developer.mozilla.org/En/HTML/HTML_Extensions/KEYGEN_Tag> |
26 | 30 |
27 class NET_EXPORT KeygenHandler { | 31 class NET_EXPORT KeygenHandler { |
28 public: | 32 public: |
29 // Creates a handler that will generate a key with the given key size and | 33 // Creates a handler that will generate a key with the given key size and |
30 // incorporate the |challenge| into the Netscape SPKAC structure. The request | 34 // incorporate the |challenge| into the Netscape SPKAC structure. The request |
31 // for the key originated from |url|. | 35 // for the key originated from |url|. |
32 KeygenHandler(int key_size_in_bits, | 36 KeygenHandler(int key_size_in_bits, |
33 const std::string& challenge, | 37 const std::string& challenge, |
34 const GURL& url); | 38 const GURL& url); |
35 ~KeygenHandler(); | 39 ~KeygenHandler(); |
36 | 40 |
37 // Actually generates the key-pair and the cert request (SPKAC), and returns | 41 // Actually generates the key-pair and the cert request (SPKAC), and returns |
38 // a base64-encoded string suitable for use as the form value of <keygen>. | 42 // a base64-encoded string suitable for use as the form value of <keygen>. |
39 std::string GenKeyAndSignChallenge(); | 43 std::string GenKeyAndSignChallenge(); |
40 | 44 |
41 // Exposed only for unit tests. | 45 // Exposed only for unit tests. |
42 void set_stores_key(bool store) { stores_key_ = store;} | 46 void set_stores_key(bool store) { stores_key_ = store;} |
43 | 47 |
44 #if defined(USE_NSS) | 48 #if defined(USE_NSS) |
49 void set_key_slot(PK11SlotInfo* slot); | |
50 | |
45 // Register the delegate to be used to get the token to store the key in, and | 51 // Register the delegate to be used to get the token to store the key in, and |
46 // to get the password if the token is unauthenticated. | 52 // to get the password if the token is unauthenticated. |
47 // GenKeyAndSignChallenge runs on a worker thread, so using a blocking | 53 // GenKeyAndSignChallenge runs on a worker thread, so using a blocking |
48 // password callback is okay here. | 54 // password callback is okay here. |
49 void set_crypto_module_delegate( | 55 void set_crypto_module_delegate( |
50 scoped_ptr<crypto::NSSCryptoModuleDelegate> delegate); | 56 scoped_ptr<crypto::CryptoModuleBlockingPasswordDelegate> delegate); |
51 #endif // defined(USE_NSS) | 57 #endif // defined(USE_NSS) |
52 | 58 |
53 private: | 59 private: |
54 int key_size_in_bits_; // key size in bits (usually 2048) | 60 int key_size_in_bits_; // key size in bits (usually 2048) |
55 std::string challenge_; // challenge string sent by server | 61 std::string challenge_; // challenge string sent by server |
56 GURL url_; // the URL that requested the key | 62 GURL url_; // the URL that requested the key |
57 bool stores_key_; // should the generated key-pair be stored persistently? | 63 bool stores_key_; // should the generated key-pair be stored persistently? |
58 #if defined(USE_NSS) | 64 #if defined(USE_NSS) |
65 crypto::ScopedPK11Slot slot_; | |
59 // The callback for requesting a password to the PKCS#11 token. | 66 // The callback for requesting a password to the PKCS#11 token. |
60 scoped_ptr<crypto::NSSCryptoModuleDelegate> crypto_module_delegate_; | 67 scoped_ptr<crypto::CryptoModuleBlockingPasswordDelegate> |
68 crypto_module_delegate_; | |
61 #endif // defined(USE_NSS) | 69 #endif // defined(USE_NSS) |
62 }; | 70 }; |
63 | 71 |
64 } // namespace net | 72 } // namespace net |
65 | 73 |
66 #endif // NET_BASE_KEYGEN_HANDLER_H_ | 74 #endif // NET_BASE_KEYGEN_HANDLER_H_ |
OLD | NEW |