Only grant permissions to new extensions from sync if they have the expected version
[chromium-blink-merge.git] / components / ownership / owner_key_util_impl.cc
blobfdf29e9a7854ab07f2cb7816e1ee738bbdb6597f
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "components/ownership/owner_key_util_impl.h"
7 #include <keythi.h>
8 #include <limits>
10 #include "base/files/file_util.h"
11 #include "base/logging.h"
12 #include "base/sys_info.h"
13 #include "crypto/nss_key_util.h"
15 namespace ownership {
17 OwnerKeyUtilImpl::OwnerKeyUtilImpl(const base::FilePath& public_key_file)
18 : public_key_file_(public_key_file) {
21 OwnerKeyUtilImpl::~OwnerKeyUtilImpl() {
24 bool OwnerKeyUtilImpl::ImportPublicKey(std::vector<uint8>* output) {
25 // Get the file size (must fit in a 32 bit int for NSS).
26 int64 file_size;
27 if (!base::GetFileSize(public_key_file_, &file_size)) {
28 #if defined(OS_CHROMEOS)
29 LOG_IF(ERROR, base::SysInfo::IsRunningOnChromeOS())
30 << "Could not get size of " << public_key_file_.value();
31 #endif // defined(OS_CHROMEOS)
32 return false;
34 if (file_size > static_cast<int64>(std::numeric_limits<int>::max())) {
35 LOG(ERROR) << public_key_file_.value() << "is " << file_size
36 << "bytes!!! Too big!";
37 return false;
39 int32 safe_file_size = static_cast<int32>(file_size);
41 output->resize(safe_file_size);
43 if (safe_file_size == 0) {
44 LOG(WARNING) << "Public key file is empty. This seems wrong.";
45 return false;
48 // Get the key data off of disk
49 int data_read =
50 base::ReadFile(public_key_file_,
51 reinterpret_cast<char*>(vector_as_array(output)),
52 safe_file_size);
53 return data_read == safe_file_size;
56 crypto::ScopedSECKEYPrivateKey OwnerKeyUtilImpl::FindPrivateKeyInSlot(
57 const std::vector<uint8>& key,
58 PK11SlotInfo* slot) {
59 if (!slot)
60 return nullptr;
62 crypto::ScopedSECKEYPrivateKey private_key(
63 crypto::FindNSSKeyFromPublicKeyInfoInSlot(key, slot));
64 if (!private_key || SECKEY_GetPrivateKeyType(private_key.get()) != rsaKey)
65 return nullptr;
66 return private_key.Pass();
69 bool OwnerKeyUtilImpl::IsPublicKeyPresent() {
70 return base::PathExists(public_key_file_);
73 } // namespace ownership