summaryrefslogtreecommitdiffstats
path: root/chromeos/cert_loader.h
diff options
context:
space:
mode:
authorstevenjb@chromium.org <stevenjb@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-07-26 17:48:49 +0000
committerstevenjb@chromium.org <stevenjb@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-07-26 17:48:49 +0000
commit60833392e57ba72933e6007dbb8c4cc9206a8b74 (patch)
tree05c2abe4bef09334e5553dae8d79e01b710f536e /chromeos/cert_loader.h
parent8f61914919ce717ef09edeaa21b217e2f737061f (diff)
downloadchromium_src-60833392e57ba72933e6007dbb8c4cc9206a8b74.zip
chromium_src-60833392e57ba72933e6007dbb8c4cc9206a8b74.tar.gz
chromium_src-60833392e57ba72933e6007dbb8c4cc9206a8b74.tar.bz2
Call crypto::InitializeTPMToken on the IO thread (Take 2)
This is identical to https://chromiumcodereview.appspot.com/15649018 with the following addition: Call DeviceSettingsService::EnsureReload once certs are loaded BUG=244455 R=mnissler@chromium.org, nkostylev@chromium.org, rsleevi@chromium.org, xiyuan@chromium.org Review URL: https://codereview.chromium.org/20130002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@213951 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chromeos/cert_loader.h')
-rw-r--r--chromeos/cert_loader.h183
1 files changed, 183 insertions, 0 deletions
diff --git a/chromeos/cert_loader.h b/chromeos/cert_loader.h
new file mode 100644
index 0000000..69e3191
--- /dev/null
+++ b/chromeos/cert_loader.h
@@ -0,0 +1,183 @@
+// Copyright (c) 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CHROMEOS_CERT_LOADER_H_
+#define CHROMEOS_CERT_LOADER_H_
+
+#include <string>
+
+#include "base/memory/ref_counted.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/memory/weak_ptr.h"
+#include "base/observer_list_threadsafe.h"
+#include "base/threading/thread_checker.h"
+#include "chromeos/chromeos_export.h"
+#include "chromeos/dbus/dbus_method_call_status.h"
+#include "chromeos/login/login_state.h"
+#include "net/cert/cert_database.h"
+#include "net/cert/x509_certificate.h"
+
+namespace base {
+class SequencedTaskRunner;
+}
+
+namespace crypto {
+class SymmetricKey;
+}
+
+namespace chromeos {
+
+// This class is responsible for initializing the TPM token and loading
+// certificates once the TPM is initialized. It is expected to be constructed
+// on the UI thread and public methods should all be called from the UI thread.
+// When certificates have been loaded (after login completes), or the cert
+// database changes, observers are called with OnCertificatesLoaded().
+class CHROMEOS_EXPORT CertLoader : public net::CertDatabase::Observer,
+ public LoginState::Observer {
+ public:
+ class Observer {
+ public:
+ virtual ~Observer() {}
+
+ // Called when the certificates, passed for convenience as |cert_list|,
+ // have completed loading. |initial_load| is true the first time this
+ // is called.
+ virtual void OnCertificatesLoaded(const net::CertificateList& cert_list,
+ bool initial_load) = 0;
+
+ protected:
+ Observer() {}
+
+ private:
+ DISALLOW_COPY_AND_ASSIGN(Observer);
+ };
+
+ // Sets the global instance. Must be called before any calls to Get().
+ static void Initialize();
+
+ // Destroys the global instance.
+ static void Shutdown();
+
+ // Gets the global instance. Initialize() must be called first.
+ static CertLoader* Get();
+
+ // Returns true if the global instance has been initialized.
+ static bool IsInitialized();
+
+ // |crypto_task_runner| is the task runner that any synchronous crypto calls
+ // should be made from. e.g. in Chrome this is the IO thread. Must be called
+ // after the thread is started. Certificate loading will not happen unless
+ // this is set.
+ void SetCryptoTaskRunner(
+ const scoped_refptr<base::SequencedTaskRunner>& crypto_task_runner);
+
+ void AddObserver(CertLoader::Observer* observer);
+ void RemoveObserver(CertLoader::Observer* observer);
+
+ // Returns true when the certificate list has been requested but not loaded.
+ bool CertificatesLoading() const;
+
+ // Returns true if the TPM is available for hardware-backed certificates.
+ bool IsHardwareBacked() const;
+
+ std::string GetPkcs11IdForCert(const net::X509Certificate& cert) const;
+
+ bool certificates_loaded() const { return certificates_loaded_; }
+
+ // TPM info is only valid once the TPM is available (IsHardwareBacked is
+ // true). Otherwise empty strings will be returned.
+ const std::string& tpm_token_name() const { return tpm_token_name_; }
+ const std::string& tpm_token_slot() const { return tpm_token_slot_; }
+ const std::string& tpm_user_pin() const { return tpm_user_pin_; }
+
+ // This will be empty until certificates_loaded() is true.
+ const net::CertificateList& cert_list() const { return cert_list_; }
+
+ private:
+ CertLoader();
+ virtual ~CertLoader();
+
+ void Init();
+ void MaybeRequestCertificates();
+
+ // This is the cyclic chain of callbacks to initialize the TPM token and to
+ // kick off the update of the certificate list.
+ void InitializeTokenAndLoadCertificates();
+ void RetryTokenInitializationLater();
+ void OnPersistentNSSDBOpened();
+ void OnTpmIsEnabled(DBusMethodCallStatus call_status,
+ bool tpm_is_enabled);
+ void OnPkcs11IsTpmTokenReady(DBusMethodCallStatus call_status,
+ bool is_tpm_token_ready);
+ void OnPkcs11GetTpmTokenInfo(DBusMethodCallStatus call_status,
+ const std::string& token_name,
+ const std::string& user_pin);
+ void OnTPMTokenInitialized(bool success);
+
+ // These calls handle the updating of the certificate list after the TPM token
+ // was initialized.
+ void StartLoadCertificates();
+ void UpdateCertificates(net::CertificateList* cert_list);
+
+ void NotifyCertificatesLoaded(bool initial_load);
+
+ // net::CertDatabase::Observer
+ virtual void OnCertTrustChanged(const net::X509Certificate* cert) OVERRIDE;
+ virtual void OnCertAdded(const net::X509Certificate* cert) OVERRIDE;
+ virtual void OnCertRemoved(const net::X509Certificate* cert) OVERRIDE;
+
+ // LoginState::Observer
+ virtual void LoggedInStateChanged(LoginState::LoggedInState state) OVERRIDE;
+
+ ObserverList<Observer> observers_;
+
+ bool certificates_requested_;
+ bool certificates_loaded_;
+ bool certificates_update_required_;
+ bool certificates_update_running_;
+
+ // The states are traversed in this order but some might get omitted or never
+ // be left.
+ enum TPMTokenState {
+ TPM_STATE_UNKNOWN,
+ TPM_DB_OPENED,
+ TPM_DISABLED,
+ TPM_ENABLED,
+ TPM_TOKEN_READY,
+ TPM_TOKEN_INFO_RECEIVED,
+ TPM_TOKEN_INITIALIZED,
+ };
+ TPMTokenState tpm_token_state_;
+
+ // The current request delay before the next attempt to initialize the
+ // TPM. Will be adapted after each attempt.
+ base::TimeDelta tpm_request_delay_;
+
+ // Cached TPM token info.
+ std::string tpm_token_name_;
+ std::string tpm_token_slot_;
+ std::string tpm_user_pin_;
+
+ // Cached Certificates.
+ net::CertificateList cert_list_;
+
+ base::ThreadChecker thread_checker_;
+
+ // TaskRunner for crypto calls.
+ scoped_refptr<base::SequencedTaskRunner> crypto_task_runner_;
+
+ // This factory should be used only for callbacks during TPMToken
+ // initialization.
+ base::WeakPtrFactory<CertLoader> initialize_token_factory_;
+
+ // This factory should be used only for callbacks during updating the
+ // certificate list.
+ base::WeakPtrFactory<CertLoader> update_certificates_factory_;
+
+ DISALLOW_COPY_AND_ASSIGN(CertLoader);
+};
+
+} // namespace chromeos
+
+#endif // CHROMEOS_CERT_LOADER_H_