OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/base/keygen_handler.h" | |
6 | |
7 #include "base/logging.h" | |
8 #include "crypto/nss_crypto_module_delegate.h" | |
9 #include "crypto/nss_util.h" | |
10 #include "crypto/scoped_nss_types.h" | |
11 #include "net/third_party/mozilla_security_manager/nsKeygenHandler.h" | |
12 | |
13 // PSM = Mozilla's Personal Security Manager. | |
14 namespace psm = mozilla_security_manager; | |
15 | |
16 namespace net { | |
17 | |
18 std::string KeygenHandler::GenKeyAndSignChallenge() { | |
19 crypto::EnsureNSSInit(); | |
20 | |
21 crypto::ScopedPK11Slot slot; | |
22 if (crypto_module_delegate_) { | |
23 slot = crypto_module_delegate_->RequestSlot().Pass(); | |
24 } else { | |
25 LOG(ERROR) << "Could not get an NSS key slot."; | |
26 return std::string(); | |
27 } | |
28 | |
29 // Authenticate to the token. | |
30 if (SECSuccess != PK11_Authenticate(slot.get(), | |
31 PR_TRUE, | |
32 crypto_module_delegate_->wincx())) { | |
33 LOG(ERROR) << "Could not authenticate to the key slot."; | |
34 return std::string(); | |
35 } | |
36 | |
37 return psm::GenKeyAndSignChallenge(key_size_in_bits_, challenge_, url_, | |
38 slot.get(), stores_key_); | |
39 } | |
40 | |
41 void KeygenHandler::set_crypto_module_delegate( | |
42 scoped_ptr<crypto::NSSCryptoModuleDelegate> delegate) { | |
43 crypto_module_delegate_ = delegate.Pass(); | |
44 } | |
45 | |
46 } // namespace net | |
OLD | NEW |