blob: a3505c40db45de5473d74a27af7c8cd1dfc54697 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
|
// Copyright (c) 2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/base/keygen_handler.h"
#include "base/crypto/pk11_blocking_password_delegate.h"
#include "base/crypto/scoped_nss_types.h"
#include "base/logging.h"
#include "base/nss_util.h"
#include "base/nss_util_internal.h"
#include "net/third_party/mozilla_security_manager/nsKeygenHandler.h"
// PSM = Mozilla's Personal Security Manager.
namespace psm = mozilla_security_manager;
namespace net {
std::string KeygenHandler::GenKeyAndSignChallenge() {
// Ensure NSS is initialized.
base::EnsureNSSInit();
// TODO(mattm): allow choosing which slot to generate and store the key?
base::ScopedPK11Slot slot(base::GetDefaultNSSKeySlot());
if (!slot.get()) {
LOG(ERROR) << "Couldn't get internal key slot!";
return std::string();
}
// Authenticate to the token.
if (SECSuccess != PK11_Authenticate(slot.get(), PR_TRUE,
pk11_password_delegate_.get())) {
LOG(ERROR) << "Couldn't authenticate to internal key slot!";
return std::string();
}
return psm::GenKeyAndSignChallenge(key_size_in_bits_, challenge_, url_,
slot.get(), stores_key_);
}
void KeygenHandler::set_pk11_password_delegate(
base::PK11BlockingPasswordDelegate* delegate) {
pk11_password_delegate_.reset(delegate);
}
} // namespace net
|