| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chromeos/cert_loader.h" | 5 #include "chromeos/cert_loader.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/location.h" | 10 #include "base/location.h" |
| (...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 77 } | 77 } |
| 78 | 78 |
| 79 void CertLoader::AddObserver(CertLoader::Observer* observer) { | 79 void CertLoader::AddObserver(CertLoader::Observer* observer) { |
| 80 observers_.AddObserver(observer); | 80 observers_.AddObserver(observer); |
| 81 } | 81 } |
| 82 | 82 |
| 83 void CertLoader::RemoveObserver(CertLoader::Observer* observer) { | 83 void CertLoader::RemoveObserver(CertLoader::Observer* observer) { |
| 84 observers_.RemoveObserver(observer); | 84 observers_.RemoveObserver(observer); |
| 85 } | 85 } |
| 86 | 86 |
| 87 int CertLoader::TPMTokenSlotID() const { | |
| 88 if (!database_) | |
| 89 return -1; | |
| 90 crypto::ScopedPK11Slot slot(database_->GetPrivateSlot()); | |
| 91 DCHECK(slot); | |
| 92 return static_cast<int>(PK11_GetSlotID(slot.get())); | |
| 93 } | |
| 94 | |
| 95 bool CertLoader::IsHardwareBacked() const { | 87 bool CertLoader::IsHardwareBacked() const { |
| 96 if (force_hardware_backed_for_test_) | 88 if (force_hardware_backed_for_test_) |
| 97 return true; | 89 return true; |
| 98 if (!database_) | 90 if (!database_) |
| 99 return false; | 91 return false; |
| 100 crypto::ScopedPK11Slot slot(database_->GetPrivateSlot()); | 92 crypto::ScopedPK11Slot slot(database_->GetPrivateSlot()); |
| 101 DCHECK(slot); | 93 DCHECK(slot); |
| 102 return PK11_IsHW(slot.get()); | 94 return PK11_IsHW(slot.get()); |
| 103 } | 95 } |
| 104 | 96 |
| (...skipping 10 matching lines...) Expand all Loading... |
| 115 | 107 |
| 116 // static | 108 // static |
| 117 // | 109 // |
| 118 // For background see this discussion on dev-tech-crypto.lists.mozilla.org: | 110 // For background see this discussion on dev-tech-crypto.lists.mozilla.org: |
| 119 // http://web.archiveorange.com/archive/v/6JJW7E40sypfZGtbkzxX | 111 // http://web.archiveorange.com/archive/v/6JJW7E40sypfZGtbkzxX |
| 120 // | 112 // |
| 121 // NOTE: This function relies on the convention that the same PKCS#11 ID | 113 // NOTE: This function relies on the convention that the same PKCS#11 ID |
| 122 // is shared between a certificate and its associated private and public | 114 // is shared between a certificate and its associated private and public |
| 123 // keys. I tried to implement this with PK11_GetLowLevelKeyIDForCert(), | 115 // keys. I tried to implement this with PK11_GetLowLevelKeyIDForCert(), |
| 124 // but that always returns NULL on Chrome OS for me. | 116 // but that always returns NULL on Chrome OS for me. |
| 125 std::string CertLoader::GetPkcs11IdForCert(const net::X509Certificate& cert) { | 117 std::string CertLoader::GetPkcs11IdAndSlotForCert( |
| 118 const net::X509Certificate& cert, |
| 119 int* slot_id) { |
| 120 DCHECK(slot_id); |
| 121 |
| 126 CERTCertificateStr* cert_handle = cert.os_cert_handle(); | 122 CERTCertificateStr* cert_handle = cert.os_cert_handle(); |
| 127 SECKEYPrivateKey *priv_key = | 123 SECKEYPrivateKey *priv_key = |
| 128 PK11_FindKeyByAnyCert(cert_handle, NULL /* wincx */); | 124 PK11_FindKeyByAnyCert(cert_handle, NULL /* wincx */); |
| 129 if (!priv_key) | 125 if (!priv_key) |
| 130 return std::string(); | 126 return std::string(); |
| 131 | 127 |
| 128 *slot_id = static_cast<int>(PK11_GetSlotID(priv_key->pkcs11Slot)); |
| 129 |
| 132 // Get the CKA_ID attribute for a key. | 130 // Get the CKA_ID attribute for a key. |
| 133 SECItem* sec_item = PK11_GetLowLevelKeyIDForPrivateKey(priv_key); | 131 SECItem* sec_item = PK11_GetLowLevelKeyIDForPrivateKey(priv_key); |
| 134 std::string pkcs11_id; | 132 std::string pkcs11_id; |
| 135 if (sec_item) { | 133 if (sec_item) { |
| 136 pkcs11_id = base::HexEncode(sec_item->data, sec_item->len); | 134 pkcs11_id = base::HexEncode(sec_item->data, sec_item->len); |
| 137 SECITEM_FreeItem(sec_item, PR_TRUE); | 135 SECITEM_FreeItem(sec_item, PR_TRUE); |
| 138 } | 136 } |
| 139 SECKEY_DestroyPrivateKey(priv_key); | 137 SECKEY_DestroyPrivateKey(priv_key); |
| 140 | 138 |
| 141 return pkcs11_id; | 139 return pkcs11_id; |
| (...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 191 VLOG(1) << "OnCertAdded"; | 189 VLOG(1) << "OnCertAdded"; |
| 192 LoadCertificates(); | 190 LoadCertificates(); |
| 193 } | 191 } |
| 194 | 192 |
| 195 void CertLoader::OnCertRemoved(const net::X509Certificate* cert) { | 193 void CertLoader::OnCertRemoved(const net::X509Certificate* cert) { |
| 196 VLOG(1) << "OnCertRemoved"; | 194 VLOG(1) << "OnCertRemoved"; |
| 197 LoadCertificates(); | 195 LoadCertificates(); |
| 198 } | 196 } |
| 199 | 197 |
| 200 } // namespace chromeos | 198 } // namespace chromeos |
| OLD | NEW |