nss_util.cc revision a1401311d1ab56c4ed0a474bd38c108f75cb0cd9
15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/nss_util.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/nss_util_internal.h"
75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <nss.h>
92a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include <pk11pub.h>
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <plarena.h>
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <prerror.h>
125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <prinit.h>
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <prtime.h>
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <secmod.h>
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
165d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#if defined(OS_OPENBSD)
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <sys/mount.h>
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <sys/param.h>
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
21a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#include <map>
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <vector>
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
245d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#include "base/bind.h"
25f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)#include "base/cpu.h"
262a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/debug/alias.h"
27f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)#include "base/debug/stack_trace.h"
285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/environment.h"
295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/file_util.h"
302a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/files/file_path.h"
315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/lazy_instance.h"
325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h"
335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/memory/scoped_ptr.h"
345d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#include "base/message_loop/message_loop.h"
352a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/metrics/histogram.h"
365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/native_library.h"
37a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#include "base/stl_util.h"
38868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/stringprintf.h"
39f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)#include "base/threading/thread_checker.h"
405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/threading/thread_restrictions.h"
41a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)#include "base/threading/worker_pool.h"
425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "build/build_config.h"
435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// USE_NSS means we use NSS for everything crypto-related.  If USE_NSS is not
455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// defined, such as on Mac and Windows, we use NSS for SSL only -- we don't
465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// use NSS for crypto or certificate verification, and we don't use the NSS
475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// certificate and key databases.
485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/synchronization/lock.h"
505d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#include "crypto/nss_crypto_module_delegate.h"
515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_NSS)
525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace crypto {
545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace {
565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_CHROMEOS)
585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const char kNSSDatabaseName[] = "Real NSS database";
595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Constants for loading the Chrome OS TPM-backed PKCS #11 library.
615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const char kChapsModuleName[] = "Chaps";
625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const char kChapsPath[] = "libchaps.so";
635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fake certificate authority database used for testing.
652a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)static const base::FilePath::CharType kReadOnlyCertDB[] =
665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    FILE_PATH_LITERAL("/etc/fake_root_ca/nssdb");
675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(OS_CHROMEOS)
685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)std::string GetNSSErrorMessage() {
705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::string result;
715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (PR_GetErrorTextLength()) {
72c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)    scoped_ptr<char[]> error_text(new char[PR_GetErrorTextLength() + 1]);
735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PRInt32 copied = PR_GetErrorText(error_text.get());
745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    result = std::string(error_text.get(), copied);
755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
762a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    result = base::StringPrintf("NSS error code: %d", PR_GetError());
775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return result;
795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
822a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)base::FilePath GetDefaultConfigDirectory() {
83a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  base::FilePath dir = base::GetHomeDir();
845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (dir.empty()) {
855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LOG(ERROR) << "Failed to get home directory.";
865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return dir;
875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  dir = dir.AppendASCII(".pki").AppendASCII("nssdb");
89a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  if (!base::CreateDirectory(dir)) {
905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LOG(ERROR) << "Failed to create " << dir.value() << " directory.";
915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    dir.clear();
925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
93a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  DVLOG(2) << "DefaultConfigDirectory: " << dir.value();
945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return dir;
955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
97d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// On non-Chrome OS platforms, return the default config directory. On Chrome OS
98d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// test images, return a read-only directory with fake root CA certs (which are
99d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// used by the local Google Accounts server mock we use when testing our login
100d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// code). On Chrome OS non-test images (where the read-only directory doesn't
101d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// exist), return an empty path.
1022a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)base::FilePath GetInitialConfigDirectory() {
1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_CHROMEOS)
104d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  base::FilePath database_dir = base::FilePath(kReadOnlyCertDB);
105d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (!base::PathExists(database_dir))
106d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    database_dir.clear();
107d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  return database_dir;
1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#else
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return GetDefaultConfigDirectory();
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(OS_CHROMEOS)
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// This callback for NSS forwards all requests to a caller-specified
1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// CryptoModuleBlockingPasswordDelegate object.
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)char* PKCS11PasswordFunc(PK11SlotInfo* slot, PRBool retry, void* arg) {
1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  crypto::CryptoModuleBlockingPasswordDelegate* delegate =
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<crypto::CryptoModuleBlockingPasswordDelegate*>(arg);
1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (delegate) {
1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    bool cancelled = false;
1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    std::string password = delegate->RequestPassword(PK11_GetTokenName(slot),
1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                                     retry != PR_FALSE,
1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                                     &cancelled);
1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (cancelled)
1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return NULL;
1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    char* result = PORT_Strdup(password.c_str());
1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    password.replace(0, password.size(), password.size(), 0);
1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return result;
1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DLOG(ERROR) << "PK11 password requested with NULL arg";
1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return NULL;
1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// NSS creates a local cache of the sqlite database if it detects that the
1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// filesystem the database is on is much slower than the local disk.  The
1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// detection doesn't work with the latest versions of sqlite, such as 3.6.22
1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// (NSS bug https://bugzilla.mozilla.org/show_bug.cgi?id=578561).  So we set
1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// the NSS environment variable NSS_SDB_USE_CACHE to "yes" to override NSS's
1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// detection when database_dir is on NFS.  See http://crbug.com/48585.
1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)//
1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// TODO(wtc): port this function to other USE_NSS platforms.  It is defined
1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// only for OS_LINUX and OS_OPENBSD simply because the statfs structure
1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// is OS-specific.
1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)//
1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Because this function sets an environment variable it must be run before we
1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// go multi-threaded.
1462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void UseLocalCacheOfNSSDatabaseIfNFS(const base::FilePath& database_dir) {
1475d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  bool db_on_nfs = false;
1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_LINUX)
149a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  base::FileSystemType fs_type = base::FILE_SYSTEM_UNKNOWN;
150a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  if (base::GetFileSystemType(database_dir, &fs_type))
151a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    db_on_nfs = (fs_type == base::FILE_SYSTEM_NFS);
1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_OPENBSD)
1535d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  struct statfs buf;
1545d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  if (statfs(database_dir.value().c_str(), &buf) == 0)
1555d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    db_on_nfs = (strcmp(buf.f_fstypename, MOUNT_NFS) == 0);
1565d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#else
1575d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  NOTIMPLEMENTED();
1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
1595d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
1605d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  if (db_on_nfs) {
1615d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    scoped_ptr<base::Environment> env(base::Environment::Create());
1625d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    static const char kUseCacheEnvVar[] = "NSS_SDB_USE_CACHE";
1635d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    if (!env->HasVar(kUseCacheEnvVar))
1645d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      env->SetVar(kUseCacheEnvVar, "yes");
1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_NSS)
1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// A singleton to initialize/deinitialize NSPR.
1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Separate from the NSS singleton because we initialize NSPR on the UI thread.
1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Now that we're leaking the singleton, we could merge back with the NSS
1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// singleton.
1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class NSPRInitSingleton {
1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  friend struct base::DefaultLazyInstanceTraits<NSPRInitSingleton>;
1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NSPRInitSingleton() {
1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PR_Init(PR_USER_THREAD, PR_PRIORITY_NORMAL, 0);
1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // NOTE(willchan): We don't actually execute this code since we leak NSS to
1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // prevent non-joinable threads from using NSS after it's already been shut
1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // down.
1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ~NSPRInitSingleton() {
1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PL_ArenaFinish();
1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PRStatus prstatus = PR_Cleanup();
1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (prstatus != PR_SUCCESS)
1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(ERROR) << "PR_Cleanup failed; was NSPR initialized on wrong thread?";
1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)base::LazyInstance<NSPRInitSingleton>::Leaky
1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    g_nspr_singleton = LAZY_INSTANCE_INITIALIZER;
1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// This is a LazyInstance so that it will be deleted automatically when the
1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// unittest exits.  NSSInitSingleton is a LeakySingleton, so it would not be
1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// deleted if it were a regular member.
1992a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)base::LazyInstance<base::ScopedTempDir> g_test_nss_db_dir =
2002a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    LAZY_INSTANCE_INITIALIZER;
2012a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
2022a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// Force a crash with error info on NSS_NoDB_Init failure.
2032a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void CrashOnNSSInitFailure() {
2042a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  int nss_error = PR_GetError();
2052a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  int os_error = PR_GetOSError();
2062a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  base::debug::Alias(&nss_error);
2072a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  base::debug::Alias(&os_error);
2082a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  LOG(ERROR) << "Error initializing NSS without a persistent database: "
2092a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)             << GetNSSErrorMessage();
2102a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  LOG(FATAL) << "nss_error=" << nss_error << ", os_error=" << os_error;
2112a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)}
2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
213a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#if defined(OS_CHROMEOS)
214a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)class ChromeOSUserData {
215a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) public:
216a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ChromeOSUserData(ScopedPK11Slot public_slot, bool is_primary_user)
217a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      : public_slot_(public_slot.Pass()),
218a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)        is_primary_user_(is_primary_user) {}
219a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ~ChromeOSUserData() {
220a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (public_slot_ && !is_primary_user_) {
221a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      SECStatus status = SECMOD_CloseUserDB(public_slot_.get());
222a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      if (status != SECSuccess)
223a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)        PLOG(ERROR) << "SECMOD_CloseUserDB failed: " << PORT_GetError();
224a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
225a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
226a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
227a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ScopedPK11Slot GetPublicSlot() {
228a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return ScopedPK11Slot(
229a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)        public_slot_ ? PK11_ReferenceSlot(public_slot_.get()) : NULL);
230a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
231a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
232a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ScopedPK11Slot GetPrivateSlot(
233a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const base::Callback<void(ScopedPK11Slot)>& callback) {
234a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (private_slot_)
235a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return ScopedPK11Slot(PK11_ReferenceSlot(private_slot_.get()));
236a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (!callback.is_null())
237a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      tpm_ready_callback_list_.push_back(callback);
238a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return ScopedPK11Slot();
239a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
240a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
241a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void SetPrivateSlot(ScopedPK11Slot private_slot) {
242a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(!private_slot_);
243a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    private_slot_ = private_slot.Pass();
244a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
245a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    SlotReadyCallbackList callback_list;
246a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    callback_list.swap(tpm_ready_callback_list_);
247a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    for (SlotReadyCallbackList::iterator i = callback_list.begin();
248a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)         i != callback_list.end();
249a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)         ++i) {
250a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      (*i).Run(ScopedPK11Slot(PK11_ReferenceSlot(private_slot_.get())));
251a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
252a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
253a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
254a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles) private:
255a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ScopedPK11Slot public_slot_;
256a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ScopedPK11Slot private_slot_;
257a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  bool is_primary_user_;
258a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
259a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  typedef std::vector<base::Callback<void(ScopedPK11Slot)> >
260a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      SlotReadyCallbackList;
261a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  SlotReadyCallbackList tpm_ready_callback_list_;
262a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)};
263a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#endif  // defined(OS_CHROMEOS)
264a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
2655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class NSSInitSingleton {
2665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
2675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_CHROMEOS)
268a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  // Used with PostTaskAndReply to pass handles to worker thread and back.
269a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  struct TPMModuleAndSlot {
270a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    explicit TPMModuleAndSlot(SECMODModule* init_chaps_module)
271a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        : chaps_module(init_chaps_module), tpm_slot(NULL) {}
272a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    SECMODModule* chaps_module;
273a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    PK11SlotInfo* tpm_slot;
274a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  };
275a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)
2765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  void OpenPersistentNSSDB() {
277f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
278f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
2795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!chromeos_user_logged_in_) {
2805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // GetDefaultConfigDirectory causes us to do blocking IO on UI thread.
2815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // Temporarily allow it until we fix http://crbug.com/70119
2825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      base::ThreadRestrictions::ScopedAllowIO allow_io;
2835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      chromeos_user_logged_in_ = true;
2845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // This creates another DB slot in NSS that is read/write, unlike
2865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // the fake root CA cert DB and the "default" crypto key
2875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // provider, which are still read-only (because we initialized
2885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // NSS before we had a cryptohome mounted).
2895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      software_slot_ = OpenUserDB(GetDefaultConfigDirectory(),
2905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                  kNSSDatabaseName);
2915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
2925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
2935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
294a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  PK11SlotInfo* OpenPersistentNSSDBForPath(const base::FilePath& path) {
295a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
296a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // NSS is allowed to do IO on the current thread since dispatching
297a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // to a dedicated thread would still have the affect of blocking
298a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // the current thread, due to NSS's internal locking requirements
299a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    base::ThreadRestrictions::ScopedAllowIO allow_io;
300a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
301a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    base::FilePath nssdb_path = path.AppendASCII(".pki").AppendASCII("nssdb");
302a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (!base::CreateDirectory(nssdb_path)) {
303a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      LOG(ERROR) << "Failed to create " << nssdb_path.value() << " directory.";
304a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return NULL;
305a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
306a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return OpenUserDB(nssdb_path, kNSSDatabaseName);
307a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
308a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
3095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  void EnableTPMTokenForNSS() {
310f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
311f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
3121e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    // If this gets set, then we'll use the TPM for certs with
3131e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    // private keys, otherwise we'll fall back to the software
3141e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    // implementation.
3155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    tpm_token_enabled_for_nss_ = true;
3165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
318a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  bool IsTPMTokenEnabledForNSS() {
319a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
320a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return tpm_token_enabled_for_nss_;
321a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
322a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
323a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  void InitializeTPMToken(int token_slot_id,
324a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                          const base::Callback<void(bool)>& callback) {
325f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
326a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // Should not be called while there is already an initialization in
327a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // progress.
328a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    DCHECK(!initializing_tpm_token_);
3295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // If EnableTPMTokenForNSS hasn't been called, return false.
330a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (!tpm_token_enabled_for_nss_) {
331a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      base::MessageLoop::current()->PostTask(FROM_HERE,
332a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                             base::Bind(callback, false));
333a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      return;
334a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    }
3355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // If everything is already initialized, then return true.
337a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // Note that only |tpm_slot_| is checked, since |chaps_module_| could be
338a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // NULL in tests while |tpm_slot_| has been set to the test DB.
339a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (tpm_slot_) {
340a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      base::MessageLoop::current()->PostTask(FROM_HERE,
341a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                             base::Bind(callback, true));
342a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      return;
343a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    }
3445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
345a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // Note that a reference is not taken to chaps_module_. This is safe since
346a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // NSSInitSingleton is Leaky, so the reference it holds is never released.
347a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    scoped_ptr<TPMModuleAndSlot> tpm_args(new TPMModuleAndSlot(chaps_module_));
348a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    TPMModuleAndSlot* tpm_args_ptr = tpm_args.get();
349a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (base::WorkerPool::PostTaskAndReply(
350a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)            FROM_HERE,
351a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)            base::Bind(&NSSInitSingleton::InitializeTPMTokenOnWorkerThread,
352a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                       token_slot_id,
353a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                       tpm_args_ptr),
354a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)            base::Bind(&NSSInitSingleton::OnInitializedTPMToken,
355a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                       base::Unretained(this),  // NSSInitSingleton is leaky
356a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                       callback,
357a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                       base::Passed(&tpm_args)),
358a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)            true /* task_is_slow */
359a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)            )) {
360a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      initializing_tpm_token_ = true;
361a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    } else {
362a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      base::MessageLoop::current()->PostTask(FROM_HERE,
363a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                             base::Bind(callback, false));
364a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    }
365a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  }
366a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)
367a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  static void InitializeTPMTokenOnWorkerThread(CK_SLOT_ID token_slot_id,
368a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                               TPMModuleAndSlot* tpm_args) {
3695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // This tries to load the Chaps module so NSS can talk to the hardware
3705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // TPM.
371a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (!tpm_args->chaps_module) {
372a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      DVLOG(3) << "Loading chaps...";
373a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      tpm_args->chaps_module = LoadModule(
3745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          kChapsModuleName,
3755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          kChapsPath,
3765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          // For more details on these parameters, see:
3775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          // https://developer.mozilla.org/en/PKCS11_Module_Specs
3785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          // slotFlags=[PublicCerts] -- Certificates and public keys can be
3795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          //   read from this slot without requiring a call to C_Login.
3805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          // askpw=only -- Only authenticate to the token when necessary.
3815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          "NSS=\"slotParams=(0={slotFlags=[PublicCerts] askpw=only})\"");
3825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
383a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (tpm_args->chaps_module) {
384a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      tpm_args->tpm_slot =
385a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)          GetTPMSlotForIdOnWorkerThread(tpm_args->chaps_module, token_slot_id);
386a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    }
387a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  }
3885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
389a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  void OnInitializedTPMToken(const base::Callback<void(bool)>& callback,
390a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                             scoped_ptr<TPMModuleAndSlot> tpm_args) {
391a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
392a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    DVLOG(2) << "Loaded chaps: " << !!tpm_args->chaps_module
393a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)             << ", got tpm slot: " << !!tpm_args->tpm_slot;
394a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)
395a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    chaps_module_ = tpm_args->chaps_module;
396a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    tpm_slot_ = tpm_args->tpm_slot;
397a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (!chaps_module_ && test_slot_) {
398a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      // chromeos_unittests try to test the TPM initialization process. If we
399a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      // have a test DB open, pretend that it is the TPM slot.
400a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      tpm_slot_ = PK11_ReferenceSlot(test_slot_);
401a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    }
402a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    initializing_tpm_token_ = false;
403a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
404a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (tpm_slot_) {
405a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      TPMReadyCallbackList callback_list;
406a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      callback_list.swap(tpm_ready_callback_list_);
407a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      for (TPMReadyCallbackList::iterator i = callback_list.begin();
408a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)           i != callback_list.end();
409a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)           ++i) {
410a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)        (*i).Run();
411a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      }
4125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
413a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)
414a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    callback.Run(!!tpm_slot_);
4155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
4165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
417a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  bool IsTPMTokenReady(const base::Closure& callback) {
418a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (!callback.is_null()) {
419a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // Cannot DCHECK in the general case yet, but since the callback is
420a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // a new addition to the API, DCHECK to make sure at least the new uses
421a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // don't regress.
422a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      DCHECK(thread_checker_.CalledOnValidThread());
423a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    } else if (!thread_checker_.CalledOnValidThread()) {
424a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // TODO(mattm): Change to DCHECK when callers have been fixed.
425f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      DVLOG(1) << "Called on wrong thread.\n"
426f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)               << base::debug::StackTrace().ToString();
4275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
4285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
429a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (tpm_slot_ != NULL)
430a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return true;
431a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
432a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (!callback.is_null())
433a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      tpm_ready_callback_list_.push_back(callback);
434a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
435a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return false;
4365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
4375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4381e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)  // Note that CK_SLOT_ID is an unsigned long, but cryptohome gives us the slot
4391e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)  // id as an int. This should be safe since this is only used with chaps, which
4401e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)  // we also control.
441a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  static PK11SlotInfo* GetTPMSlotForIdOnWorkerThread(SECMODModule* chaps_module,
442a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                                     CK_SLOT_ID slot_id) {
443a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    DCHECK(chaps_module);
4441e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)
445a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DVLOG(3) << "Poking chaps module.";
446a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    SECStatus rv = SECMOD_UpdateSlotList(chaps_module);
4471e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    if (rv != SECSuccess)
4481e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)      PLOG(ERROR) << "SECMOD_UpdateSlotList failed: " << PORT_GetError();
4491e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)
450a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    PK11SlotInfo* slot = SECMOD_LookupSlot(chaps_module->moduleID, slot_id);
4511e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    if (!slot)
4521e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)      LOG(ERROR) << "TPM slot " << slot_id << " not found.";
4531e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    return slot;
4545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
455a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
456a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  bool InitializeNSSForChromeOSUser(
457a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const std::string& email,
458a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const std::string& username_hash,
459a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      bool is_primary_user,
460a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const base::FilePath& path) {
461a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
462a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (chromeos_user_map_.find(username_hash) != chromeos_user_map_.end()) {
463a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      // This user already exists in our mapping.
464a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      DVLOG(2) << username_hash << " already initialized.";
465a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return false;
466a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
467a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    ScopedPK11Slot public_slot;
468a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (is_primary_user) {
469a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      DVLOG(2) << "Primary user, using GetPublicNSSKeySlot()";
470a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      public_slot.reset(GetPublicNSSKeySlot());
471a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    } else {
472a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      DVLOG(2) << "Opening NSS DB " << path.value();
473a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      public_slot.reset(OpenPersistentNSSDBForPath(path));
474a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
475a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    chromeos_user_map_[username_hash] =
476a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)        new ChromeOSUserData(public_slot.Pass(), is_primary_user);
477a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return true;
478a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
479a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
480a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void InitializeTPMForChromeOSUser(const std::string& username_hash,
481a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                    CK_SLOT_ID slot_id) {
482a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
483a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(chromeos_user_map_.find(username_hash) != chromeos_user_map_.end());
484a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)
485a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    if (!chaps_module_)
486a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)      return;
487a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)
488a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // Note that a reference is not taken to chaps_module_. This is safe since
489a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    // NSSInitSingleton is Leaky, so the reference it holds is never released.
490a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    scoped_ptr<TPMModuleAndSlot> tpm_args(new TPMModuleAndSlot(chaps_module_));
491a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    TPMModuleAndSlot* tpm_args_ptr = tpm_args.get();
492a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    base::WorkerPool::PostTaskAndReply(
493a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        FROM_HERE,
494a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        base::Bind(&NSSInitSingleton::InitializeTPMTokenOnWorkerThread,
495a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                   slot_id,
496a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                   tpm_args_ptr),
497a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        base::Bind(&NSSInitSingleton::OnInitializedTPMForChromeOSUser,
498a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                   base::Unretained(this),  // NSSInitSingleton is leaky
499a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                   username_hash,
500a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                   base::Passed(&tpm_args)),
501a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        true /* task_is_slow */
502a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        );
503a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  }
504a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)
505a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  void OnInitializedTPMForChromeOSUser(const std::string& username_hash,
506a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                       scoped_ptr<TPMModuleAndSlot> tpm_args) {
507a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
508a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    DVLOG(2) << "Got tpm slot for " << username_hash << " "
509a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)             << !!tpm_args->tpm_slot;
510a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    chromeos_user_map_[username_hash]->SetPrivateSlot(
511a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        ScopedPK11Slot(tpm_args->tpm_slot));
512a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
513a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
514a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  void InitializePrivateSoftwareSlotForChromeOSUser(
515a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const std::string& username_hash) {
516a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
5175d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    VLOG(1) << "using software private slot for " << username_hash;
518a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(chromeos_user_map_.find(username_hash) != chromeos_user_map_.end());
519a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    chromeos_user_map_[username_hash]->SetPrivateSlot(
520a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)        chromeos_user_map_[username_hash]->GetPublicSlot());
521a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
522a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
523a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ScopedPK11Slot GetPublicSlotForChromeOSUser(
524a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const std::string& username_hash) {
525a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
5265d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
5275d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    if (username_hash.empty()) {
5285d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      DVLOG(2) << "empty username_hash";
5295d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      return ScopedPK11Slot();
5305d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    }
5315d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
532a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (test_slot_) {
533a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      DVLOG(2) << "returning test_slot_ for " << username_hash;
534a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return ScopedPK11Slot(PK11_ReferenceSlot(test_slot_));
535a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
536a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
537a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (chromeos_user_map_.find(username_hash) == chromeos_user_map_.end()) {
538a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      LOG(ERROR) << username_hash << " not initialized.";
539a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return ScopedPK11Slot();
540a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
541a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return chromeos_user_map_[username_hash]->GetPublicSlot();
542a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
543a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
544a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ScopedPK11Slot GetPrivateSlotForChromeOSUser(
545a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const std::string& username_hash,
546a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      const base::Callback<void(ScopedPK11Slot)>& callback) {
547a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
5485d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
5495d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    if (username_hash.empty()) {
5505d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      DVLOG(2) << "empty username_hash";
5515d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      if (!callback.is_null()) {
5525d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)        base::MessageLoop::current()->PostTask(
5535d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)            FROM_HERE, base::Bind(callback, base::Passed(ScopedPK11Slot())));
5545d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      }
5555d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      return ScopedPK11Slot();
5565d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    }
5575d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
558a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    DCHECK(chromeos_user_map_.find(username_hash) != chromeos_user_map_.end());
559a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
560a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    if (test_slot_) {
561a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      DVLOG(2) << "returning test_slot_ for " << username_hash;
562a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      return ScopedPK11Slot(PK11_ReferenceSlot(test_slot_));
563a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    }
564a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
565a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    return chromeos_user_map_[username_hash]->GetPrivateSlot(callback);
566a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  }
5675d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
5685d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  void CloseTestChromeOSUser(const std::string& username_hash) {
5695d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
5705d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    ChromeOSUserMap::iterator i = chromeos_user_map_.find(username_hash);
5715d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    DCHECK(i != chromeos_user_map_.end());
5725d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    delete i->second;
5735d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    chromeos_user_map_.erase(i);
5745d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  }
5755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(OS_CHROMEOS)
5765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool OpenTestNSSDB() {
579f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
580a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // NSS is allowed to do IO on the current thread since dispatching
581a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // to a dedicated thread would still have the affect of blocking
582a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // the current thread, due to NSS's internal locking requirements
583a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    base::ThreadRestrictions::ScopedAllowIO allow_io;
584f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
5855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (test_slot_)
5865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return true;
5875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!g_test_nss_db_dir.Get().CreateUniqueTempDir())
5885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return false;
589c2db58bd994c04d98e4ee2cd7565b71548655fe3Ben Murdoch    test_slot_ = OpenUserDB(g_test_nss_db_dir.Get().path(), kTestTPMTokenName);
5905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return !!test_slot_;
5915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
5925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  void CloseTestNSSDB() {
594f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DCHECK(thread_checker_.CalledOnValidThread());
595a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // NSS is allowed to do IO on the current thread since dispatching
596a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // to a dedicated thread would still have the affect of blocking
597a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    // the current thread, due to NSS's internal locking requirements
598a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    base::ThreadRestrictions::ScopedAllowIO allow_io;
599f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
600eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    if (!test_slot_)
601eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch      return;
602eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    SECStatus status = SECMOD_CloseUserDB(test_slot_);
603eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    if (status != SECSuccess)
604eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch      PLOG(ERROR) << "SECMOD_CloseUserDB failed: " << PORT_GetError();
605eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    PK11_FreeSlot(test_slot_);
606eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    test_slot_ = NULL;
607eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    ignore_result(g_test_nss_db_dir.Get().Delete());
6085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PK11SlotInfo* GetPublicNSSKeySlot() {
611f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    // TODO(mattm): Change to DCHECK when callers have been fixed.
612f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (!thread_checker_.CalledOnValidThread()) {
613f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      DVLOG(1) << "Called on wrong thread.\n"
614f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)               << base::debug::StackTrace().ToString();
615f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    }
616f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
6175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (test_slot_)
6185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return PK11_ReferenceSlot(test_slot_);
6195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (software_slot_)
6205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return PK11_ReferenceSlot(software_slot_);
6215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return PK11_GetInternalKeySlot();
6225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PK11SlotInfo* GetPrivateNSSKeySlot() {
625f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    // TODO(mattm): Change to DCHECK when callers have been fixed.
626f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (!thread_checker_.CalledOnValidThread()) {
627f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      DVLOG(1) << "Called on wrong thread.\n"
628f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)               << base::debug::StackTrace().ToString();
629f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    }
630f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
6315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (test_slot_)
6325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return PK11_ReferenceSlot(test_slot_);
6335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_CHROMEOS)
6355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (tpm_token_enabled_for_nss_) {
636a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      if (IsTPMTokenReady(base::Closure())) {
6375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        return PK11_ReferenceSlot(tpm_slot_);
6385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      } else {
6395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // If we were supposed to get the hardware token, but were
6405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // unable to, return NULL rather than fall back to sofware.
6415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        return NULL;
6425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
6435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
6445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
6455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // If we weren't supposed to enable the TPM for NSS, then return
6465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // the software slot.
6475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (software_slot_)
6485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return PK11_ReferenceSlot(software_slot_);
6495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return PK11_GetInternalKeySlot();
6505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
6535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::Lock* write_lock() {
6545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return &write_lock_;
6555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_NSS)
6575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // This method is used to force NSS to be initialized without a DB.
6595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Call this method before NSSInitSingleton() is constructed.
6605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  static void ForceNoDBInit() {
6615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    force_nodb_init_ = true;
6625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
6655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  friend struct base::DefaultLazyInstanceTraits<NSSInitSingleton>;
6665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NSSInitSingleton()
6685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      : tpm_token_enabled_for_nss_(false),
669a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)        initializing_tpm_token_(false),
6705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        chaps_module_(NULL),
6715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        software_slot_(NULL),
6725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        test_slot_(NULL),
6735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        tpm_slot_(NULL),
6745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        root_(NULL),
6755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        chromeos_user_logged_in_(false) {
6762a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    base::TimeTicks start_time = base::TimeTicks::Now();
677f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
678f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    // It's safe to construct on any thread, since LazyInstance will prevent any
679f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    // other threads from accessing until the constructor is done.
680f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    thread_checker_.DetachFromThread();
681f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
682f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    DisableAESNIIfNeeded();
683f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
6845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    EnsureNSPRInit();
6855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
686bb1529ce867d8845a77ec7cdf3e3003ef1771a40Ben Murdoch    // We *must* have NSS >= 3.14.3.
6875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    COMPILE_ASSERT(
688bb1529ce867d8845a77ec7cdf3e3003ef1771a40Ben Murdoch        (NSS_VMAJOR == 3 && NSS_VMINOR == 14 && NSS_VPATCH >= 3) ||
689bb1529ce867d8845a77ec7cdf3e3003ef1771a40Ben Murdoch        (NSS_VMAJOR == 3 && NSS_VMINOR > 14) ||
6905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        (NSS_VMAJOR > 3),
6915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        nss_version_check_failed);
6925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Also check the run-time NSS version.
6935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // NSS_VersionCheck is a >= check, not strict equality.
694bb1529ce867d8845a77ec7cdf3e3003ef1771a40Ben Murdoch    if (!NSS_VersionCheck("3.14.3")) {
695bb1529ce867d8845a77ec7cdf3e3003ef1771a40Ben Murdoch      LOG(FATAL) << "NSS_VersionCheck(\"3.14.3\") failed. NSS >= 3.14.3 is "
696bb1529ce867d8845a77ec7cdf3e3003ef1771a40Ben Murdoch                    "required. Please upgrade to the latest NSS, and if you "
6975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                    "still get this error, contact your distribution "
6985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                    "maintainer.";
6995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
7005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    SECStatus status = SECFailure;
7025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    bool nodb_init = force_nodb_init_;
7035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if !defined(USE_NSS)
7055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Use the system certificate store, so initialize NSS without database.
7065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    nodb_init = true;
7075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
7085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (nodb_init) {
7105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      status = NSS_NoDB_Init(NULL);
7115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (status != SECSuccess) {
7122a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)        CrashOnNSSInitFailure();
7132a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)        return;
7145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
7155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_IOS)
7165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      root_ = InitDefaultRootCerts();
7175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(OS_IOS)
7185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
7195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
7202a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      base::FilePath database_dir = GetInitialConfigDirectory();
7215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (!database_dir.empty()) {
7225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // This duplicates the work which should have been done in
7235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // EarlySetupForNSSInit. However, this function is idempotent so
7245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // there's no harm done.
7255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        UseLocalCacheOfNSSDatabaseIfNFS(database_dir);
7265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // Initialize with a persistent database (likely, ~/.pki/nssdb).
7285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // Use "sql:" which can be shared by multiple processes safely.
7295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        std::string nss_config_dir =
7302a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)            base::StringPrintf("sql:%s", database_dir.value().c_str());
7315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_CHROMEOS)
7325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        status = NSS_Init(nss_config_dir.c_str());
7335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#else
7345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        status = NSS_InitReadWrite(nss_config_dir.c_str());
7355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
7365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        if (status != SECSuccess) {
7375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          LOG(ERROR) << "Error initializing NSS with a persistent "
7385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                        "database (" << nss_config_dir
7395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                     << "): " << GetNSSErrorMessage();
7405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        }
7415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
7425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (status != SECSuccess) {
7435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        VLOG(1) << "Initializing NSS without a persistent database.";
7445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        status = NSS_NoDB_Init(NULL);
7455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        if (status != SECSuccess) {
7462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)          CrashOnNSSInitFailure();
7475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          return;
7485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        }
7495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
7505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      PK11_SetPasswordFunc(PKCS11PasswordFunc);
7525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // If we haven't initialized the password for the NSS databases,
7545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // initialize an empty-string password so that we don't need to
7555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // log in.
7565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      PK11SlotInfo* slot = PK11_GetInternalKeySlot();
7575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (slot) {
7585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // PK11_InitPin may write to the keyDB, but no other thread can use NSS
7595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // yet, so we don't need to lock.
7605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        if (PK11_NeedUserInit(slot))
7615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          PK11_InitPin(slot, NULL, NULL);
7625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        PK11_FreeSlot(slot);
7635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
7645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      root_ = InitDefaultRootCerts();
7665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_NSS)
7675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
7682a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
7692a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    // Disable MD5 certificate signatures. (They are disabled by default in
7702a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    // NSS 3.14.)
7712a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    NSS_SetAlgorithmPolicy(SEC_OID_MD5, 0, NSS_USE_ALG_IN_CERT_SIGNATURE);
7722a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    NSS_SetAlgorithmPolicy(SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION,
7732a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                           0, NSS_USE_ALG_IN_CERT_SIGNATURE);
7742a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
7752a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    // The UMA bit is conditionally set for this histogram in
7762a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    // chrome/common/startup_metric_utils.cc .
7772a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    HISTOGRAM_CUSTOM_TIMES("Startup.SlowStartupNSSInit",
7782a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                           base::TimeTicks::Now() - start_time,
7792a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                           base::TimeDelta::FromMilliseconds(10),
7802a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                           base::TimeDelta::FromHours(1),
7812a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                           50);
7825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
7835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // NOTE(willchan): We don't actually execute this code since we leak NSS to
7855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // prevent non-joinable threads from using NSS after it's already been shut
7865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // down.
7875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ~NSSInitSingleton() {
788a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#if defined(OS_CHROMEOS)
789a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    STLDeleteValues(&chromeos_user_map_);
790a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#endif
7915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (tpm_slot_) {
7925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      PK11_FreeSlot(tpm_slot_);
7935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      tpm_slot_ = NULL;
7945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
7955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (software_slot_) {
7965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      SECMOD_CloseUserDB(software_slot_);
7975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      PK11_FreeSlot(software_slot_);
7985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      software_slot_ = NULL;
7995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
8005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    CloseTestNSSDB();
8015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (root_) {
8025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      SECMOD_UnloadUserModule(root_);
8035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      SECMOD_DestroyModule(root_);
8045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      root_ = NULL;
8055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
8065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (chaps_module_) {
8075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      SECMOD_UnloadUserModule(chaps_module_);
8085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      SECMOD_DestroyModule(chaps_module_);
8095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      chaps_module_ = NULL;
8105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
8115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
8125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    SECStatus status = NSS_Shutdown();
8135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (status != SECSuccess) {
8145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // We VLOG(1) because this failure is relatively harmless (leaking, but
8155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // we're shutting down anyway).
8165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      VLOG(1) << "NSS_Shutdown failed; see http://crbug.com/4609";
8175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
8185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
8195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
8205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS) || defined(OS_IOS)
8215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Load nss's built-in root certs.
8225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  SECMODModule* InitDefaultRootCerts() {
8235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    SECMODModule* root = LoadModule("Root Certs", "libnssckbi.so", NULL);
8245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (root)
8255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return root;
8265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
8275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Aw, snap.  Can't find/load root cert shared library.
8285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // This will make it hard to talk to anybody via https.
8291e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    // TODO(mattm): Re-add the NOTREACHED here when crbug.com/310972 is fixed.
8305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
8315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
8325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
8335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Load the given module for this NSS session.
834a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  static SECMODModule* LoadModule(const char* name,
835a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                  const char* library_path,
836a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                                  const char* params) {
8372a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    std::string modparams = base::StringPrintf(
8385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        "name=\"%s\" library=\"%s\" %s",
8395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        name, library_path, params ? params : "");
8405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
8415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Shouldn't need to const_cast here, but SECMOD doesn't properly
8425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // declare input string arguments as const.  Bug
8435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // https://bugzilla.mozilla.org/show_bug.cgi?id=642546 was filed
8445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // on NSS codebase to address this.
8455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    SECMODModule* module = SECMOD_LoadUserModule(
8465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        const_cast<char*>(modparams.c_str()), NULL, PR_FALSE);
8475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!module) {
8485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(ERROR) << "Error loading " << name << " module into NSS: "
8495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 << GetNSSErrorMessage();
8505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return NULL;
8515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
8521e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    if (!module->loaded) {
8531e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)      LOG(ERROR) << "After loading " << name << ", loaded==false: "
8541e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)                 << GetNSSErrorMessage();
8551e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)      SECMOD_DestroyModule(module);
8561e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)      return NULL;
8571e9bf3e0803691d0a228da41fc608347b6db4340Torne (Richard Coles)    }
8585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return module;
8595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
8605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
8615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
8622a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  static PK11SlotInfo* OpenUserDB(const base::FilePath& path,
8635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                  const char* description) {
8645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const std::string modspec =
8652a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)        base::StringPrintf("configDir='sql:%s' tokenDescription='%s'",
8662a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                           path.value().c_str(), description);
8675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PK11SlotInfo* db_slot = SECMOD_OpenUserDB(modspec.c_str());
8685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (db_slot) {
8695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (PK11_NeedUserInit(db_slot))
8705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        PK11_InitPin(db_slot, NULL, NULL);
8715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
8725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    else {
8735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(ERROR) << "Error opening persistent database (" << modspec
8745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 << "): " << GetNSSErrorMessage();
8755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
8765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return db_slot;
8775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
8785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
879f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  static void DisableAESNIIfNeeded() {
880f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    if (NSS_VersionCheck("3.15") && !NSS_VersionCheck("3.15.4")) {
881f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      // Some versions of NSS have a bug that causes AVX instructions to be
882f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      // used without testing whether XSAVE is enabled by the operating system.
883f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      // In order to work around this, we disable AES-NI in NSS when we find
884f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      // that |has_avx()| is false (which includes the XSAVE test). See
885f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      // https://bugzilla.mozilla.org/show_bug.cgi?id=940794
886f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      base::CPU cpu;
887f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
888f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      if (cpu.has_avx_hardware() && !cpu.has_avx()) {
889f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)        base::Environment::Create()->SetVar("NSS_DISABLE_HW_AES", "1");
890f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)      }
891f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)    }
892f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  }
893f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
8945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // If this is set to true NSS is forced to be initialized without a DB.
8955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  static bool force_nodb_init_;
8965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
8975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool tpm_token_enabled_for_nss_;
898a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  bool initializing_tpm_token_;
899a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  typedef std::vector<base::Closure> TPMReadyCallbackList;
900a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  TPMReadyCallbackList tpm_ready_callback_list_;
9015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  SECMODModule* chaps_module_;
9025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PK11SlotInfo* software_slot_;
9035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PK11SlotInfo* test_slot_;
9045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PK11SlotInfo* tpm_slot_;
9055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  SECMODModule* root_;
9065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool chromeos_user_logged_in_;
907a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#if defined(OS_CHROMEOS)
908a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  typedef std::map<std::string, ChromeOSUserData*> ChromeOSUserMap;
909a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  ChromeOSUserMap chromeos_user_map_;
910a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#endif
9115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
9125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // TODO(davidben): When https://bugzilla.mozilla.org/show_bug.cgi?id=564011
9135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // is fixed, we will no longer need the lock.
9145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::Lock write_lock_;
9155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_NSS)
916f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)
917f2477e01787aa58f445919b809d89e252beef54fTorne (Richard Coles)  base::ThreadChecker thread_checker_;
9185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
9195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// static
9215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool NSSInitSingleton::force_nodb_init_ = false;
9225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)base::LazyInstance<NSSInitSingleton>::Leaky
9245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    g_nss_singleton = LAZY_INSTANCE_INITIALIZER;
9255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace
9265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
927c2db58bd994c04d98e4ee2cd7565b71548655fe3Ben Murdochconst char kTestTPMTokenName[] = "Test DB";
928c2db58bd994c04d98e4ee2cd7565b71548655fe3Ben Murdoch
9295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
9305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void EarlySetupForNSSInit() {
9312a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  base::FilePath database_dir = GetInitialConfigDirectory();
9325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!database_dir.empty())
9335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    UseLocalCacheOfNSSDatabaseIfNFS(database_dir);
9345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
9355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
9365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void EnsureNSPRInit() {
9385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  g_nspr_singleton.Get();
9395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
9405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9412a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)void InitNSSSafely() {
9422a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  // We might fork, but we haven't loaded any security modules.
9432a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  DisableNSSForkCheck();
9442a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  // If we're sandboxed, we shouldn't be able to open user security modules,
9452a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  // but it's more correct to tell NSS to not even try.
9462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  // Loading user security modules would have security implications.
9472a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  ForceNSSNoDBInit();
9482a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  // Initialize NSS.
9492a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  EnsureNSSInit();
9502a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)}
9512a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
9525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void EnsureNSSInit() {
9535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Initializing SSL causes us to do blocking IO.
9545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Temporarily allow it until we fix
9555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  //   http://code.google.com/p/chromium/issues/detail?id=59847
9565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::ThreadRestrictions::ScopedAllowIO allow_io;
9575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  g_nss_singleton.Get();
9585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
9595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void ForceNSSNoDBInit() {
9615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NSSInitSingleton::ForceNoDBInit();
9625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
9635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DisableNSSForkCheck() {
9655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_ptr<base::Environment> env(base::Environment::Create());
9665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  env->SetVar("NSS_STRICT_NOFORK", "DISABLED");
9675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
9685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void LoadNSSLibraries() {
9705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Some NSS libraries are linked dynamically so load them here.
9715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
9725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Try to search for multiple directories to load the libraries.
9732a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  std::vector<base::FilePath> paths;
9745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Use relative path to Search PATH for the library files.
9762a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  paths.push_back(base::FilePath());
9775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // For Debian derivatives NSS libraries are located here.
9792a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  paths.push_back(base::FilePath("/usr/lib/nss"));
9805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
981a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  // Ubuntu 11.10 (Oneiric) and Debian Wheezy place the libraries here.
9825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(ARCH_CPU_X86_64)
9832a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  paths.push_back(base::FilePath("/usr/lib/x86_64-linux-gnu/nss"));
9845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(ARCH_CPU_X86)
9852a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  paths.push_back(base::FilePath("/usr/lib/i386-linux-gnu/nss"));
9865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(ARCH_CPU_ARMEL)
987a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#if defined(__ARM_PCS_VFP)
988a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  paths.push_back(base::FilePath("/usr/lib/arm-linux-gnueabihf/nss"));
989a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)#else
9902a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  paths.push_back(base::FilePath("/usr/lib/arm-linux-gnueabi/nss"));
9915d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#endif  // defined(__ARM_PCS_VFP)
992a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)#elif defined(ARCH_CPU_MIPSEL)
993a36e5920737c6adbddd3e43b760e5de8431db6e0Torne (Richard Coles)  paths.push_back(base::FilePath("/usr/lib/mipsel-linux-gnu/nss"));
9945d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#endif  // defined(ARCH_CPU_X86_64)
9955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // A list of library files to load.
9975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::vector<std::string> libs;
9985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  libs.push_back("libsoftokn3.so");
9995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  libs.push_back("libfreebl3.so");
10005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // For each combination of library file and path, check for existence and
10025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // then load.
10035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  size_t loaded = 0;
10045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < libs.size(); ++i) {
10055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    for (size_t j = 0; j < paths.size(); ++j) {
10062a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      base::FilePath path = paths[j].Append(libs[i]);
10075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      base::NativeLibrary lib = base::LoadNativeLibrary(path, NULL);
10085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (lib) {
10095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        ++loaded;
10105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        break;
10115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
10125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
10135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
10145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (loaded == libs.size()) {
10165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    VLOG(3) << "NSS libraries loaded.";
10175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
10185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LOG(ERROR) << "Failed to load NSS libraries.";
10195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
10205d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#endif  // defined(USE_NSS)
10215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool CheckNSSVersion(const char* version) {
10245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return !!NSS_VersionCheck(version);
10255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_NSS)
10285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ScopedTestNSSDB::ScopedTestNSSDB()
10295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  : is_open_(g_nss_singleton.Get().OpenTestNSSDB()) {
10305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ScopedTestNSSDB::~ScopedTestNSSDB() {
1033eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  // Don't close when NSS is < 3.15.1, because it would require an additional
1034eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  // sleep for 1 second after closing the database, due to
1035eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  // http://bugzil.la/875601.
1036eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  if (NSS_VersionCheck("3.15.1")) {
1037eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch    g_nss_singleton.Get().CloseTestNSSDB();
1038eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  }
10395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)base::Lock* GetNSSWriteLock() {
10425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return g_nss_singleton.Get().write_lock();
10435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AutoNSSWriteLock::AutoNSSWriteLock() : lock_(GetNSSWriteLock()) {
10465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // May be NULL if the lock is not needed in our version of NSS.
10475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (lock_)
10485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    lock_->Acquire();
10495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AutoNSSWriteLock::~AutoNSSWriteLock() {
10525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (lock_) {
10535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    lock_->AssertAcquired();
10545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    lock_->Release();
10555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
10565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AutoSECMODListReadLock::AutoSECMODListReadLock()
10595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      : lock_(SECMOD_GetDefaultModuleListLock()) {
10605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    SECMOD_GetReadLock(lock_);
10615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
10625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)AutoSECMODListReadLock::~AutoSECMODListReadLock() {
10645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  SECMOD_ReleaseReadLock(lock_);
10655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_NSS)
10685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_CHROMEOS)
10705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void OpenPersistentNSSDB() {
10715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  g_nss_singleton.Get().OpenPersistentNSSDB();
10725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
10745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void EnableTPMTokenForNSS() {
10755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  g_nss_singleton.Get().EnableTPMTokenForNSS();
10765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1078a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)bool IsTPMTokenEnabledForNSS() {
1079a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return g_nss_singleton.Get().IsTPMTokenEnabledForNSS();
1080a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
1081a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
1082a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)bool IsTPMTokenReady(const base::Closure& callback) {
1083a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return g_nss_singleton.Get().IsTPMTokenReady(callback);
10845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
10855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1086a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)void InitializeTPMToken(int token_slot_id,
1087a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)                        const base::Callback<void(bool)>& callback) {
1088a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  g_nss_singleton.Get().InitializeTPMToken(token_slot_id, callback);
10895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1090a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)
10915d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)ScopedTestNSSChromeOSUser::ScopedTestNSSChromeOSUser(
10925d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    const std::string& username_hash)
10935d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    : username_hash_(username_hash), constructed_successfully_(false) {
10945d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  if (!temp_dir_.CreateUniqueTempDir())
10955d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    return;
10965d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  constructed_successfully_ =
10975d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)      InitializeNSSForChromeOSUser(username_hash,
10985d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)                                   username_hash,
10995d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)                                   false /* is_primary_user */,
11005d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)                                   temp_dir_.path());
11015d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)}
11025d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
11035d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)ScopedTestNSSChromeOSUser::~ScopedTestNSSChromeOSUser() {
11045d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  if (constructed_successfully_)
11055d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)    g_nss_singleton.Get().CloseTestChromeOSUser(username_hash_);
11065d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)}
11075d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
11085d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)void ScopedTestNSSChromeOSUser::FinishInit() {
11095d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  InitializePrivateSoftwareSlotForChromeOSUser(username_hash_);
11105d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)}
11115d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)
1112a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)bool InitializeNSSForChromeOSUser(
1113a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    const std::string& email,
1114a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    const std::string& username_hash,
1115a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    bool is_primary_user,
1116a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    const base::FilePath& path) {
1117a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return g_nss_singleton.Get().InitializeNSSForChromeOSUser(
1118a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      email, username_hash, is_primary_user, path);
1119a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
1120a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void InitializeTPMForChromeOSUser(
1121a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    const std::string& username_hash,
1122a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    CK_SLOT_ID slot_id) {
1123a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  g_nss_singleton.Get().InitializeTPMForChromeOSUser(username_hash, slot_id);
1124a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
1125a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)void InitializePrivateSoftwareSlotForChromeOSUser(
1126a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    const std::string& username_hash) {
1127a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  g_nss_singleton.Get().InitializePrivateSoftwareSlotForChromeOSUser(
1128a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)      username_hash);
1129a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
1130a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)ScopedPK11Slot GetPublicSlotForChromeOSUser(const std::string& username_hash) {
1131a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return g_nss_singleton.Get().GetPublicSlotForChromeOSUser(username_hash);
1132a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
1133a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)ScopedPK11Slot GetPrivateSlotForChromeOSUser(
1134a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    const std::string& username_hash,
1135a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)    const base::Callback<void(ScopedPK11Slot)>& callback) {
1136a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)  return g_nss_singleton.Get().GetPrivateSlotForChromeOSUser(username_hash,
1137a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)                                                             callback);
1138a3f6a49ab37290eeeb8db0f41ec0f1cb74a68be7Torne (Richard Coles)}
11395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(OS_CHROMEOS)
11405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
11415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)base::Time PRTimeToBaseTime(PRTime prtime) {
11425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return base::Time::FromInternalValue(
11435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      prtime + base::Time::UnixEpoch().ToInternalValue());
11445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
11455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
11465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PRTime BaseTimeToPRTime(base::Time time) {
11475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return time.ToInternalValue() - base::Time::UnixEpoch().ToInternalValue();
11485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
11495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
11505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PK11SlotInfo* GetPublicNSSKeySlot() {
11515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return g_nss_singleton.Get().GetPublicNSSKeySlot();
11525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
11535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
11545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PK11SlotInfo* GetPrivateNSSKeySlot() {
11555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return g_nss_singleton.Get().GetPrivateNSSKeySlot();
11565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
11575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
11585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace crypto
1159