File: tpm_challenge_key_with_timeout.cc

package info (click to toggle)
chromium 138.0.7204.183-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-proposed-updates
  • size: 6,080,960 kB
  • sloc: cpp: 34,937,079; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,954; asm: 946,768; xml: 739,971; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,811; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (59 lines) | stat: -rw-r--r-- 1,979 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
// Copyright 2019 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "chrome/browser/ash/attestation/tpm_challenge_key_with_timeout.h"

#include "base/memory/ptr_util.h"
#include "base/task/sequenced_task_runner.h"

namespace ash {
namespace attestation {

TpmChallengeKeyWithTimeout::TpmChallengeKeyWithTimeout() = default;
TpmChallengeKeyWithTimeout::~TpmChallengeKeyWithTimeout() {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
}

void TpmChallengeKeyWithTimeout::BuildResponse(
    base::TimeDelta timeout,
    ::attestation::VerifiedAccessFlow flow_type,
    Profile* profile,
    TpmChallengeKeyCallback callback,
    const std::string& challenge,
    bool register_key,
    ::attestation::KeyType key_crypto_type,
    const std::string& key_name_for_spkac,
    const std::optional<std::string>& signals) {
  DCHECK(!callback_);
  callback_ = std::move(callback);

  base::SequencedTaskRunner::GetCurrentDefault()->PostDelayedTask(
      FROM_HERE,
      base::BindOnce(&TpmChallengeKeyWithTimeout::ResolveCallback,
                     weak_factory_.GetWeakPtr(),
                     TpmChallengeKeyResult::MakeError(
                         TpmChallengeKeyResultCode::kTimeoutError)),
      timeout);

  challenger_ = TpmChallengeKeyFactory::Create();
  challenger_->BuildResponse(
      flow_type, profile,
      base::BindOnce(&TpmChallengeKeyWithTimeout::ResolveCallback,
                     weak_factory_.GetWeakPtr()),
      challenge, register_key, key_crypto_type, key_name_for_spkac, signals);
}

void TpmChallengeKeyWithTimeout::ResolveCallback(
    const TpmChallengeKeyResult& result) {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);

  weak_factory_.InvalidateWeakPtrs();
  challenger_.reset();

  std::move(callback_).Run(result);
  // No more member accesses here: |this| could be deleted at this point.
}

}  // namespace attestation
}  // namespace ash