| Index: chrome/browser/chromeos/login/auth/extended_authenticator.cc
|
| diff --git a/chrome/browser/chromeos/login/auth/extended_authenticator.cc b/chrome/browser/chromeos/login/auth/extended_authenticator.cc
|
| deleted file mode 100644
|
| index 271a9c1473abdb25778034a97b0e5c3d7b8a7ee9..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/chromeos/login/auth/extended_authenticator.cc
|
| +++ /dev/null
|
| @@ -1,383 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/chromeos/login/auth/extended_authenticator.h"
|
| -
|
| -#include "base/bind.h"
|
| -#include "base/strings/string_number_conversions.h"
|
| -#include "base/strings/string_util.h"
|
| -#include "chrome/browser/chromeos/boot_times_loader.h"
|
| -#include "chromeos/cryptohome/async_method_caller.h"
|
| -#include "chromeos/cryptohome/cryptohome_parameters.h"
|
| -#include "chromeos/cryptohome/homedir_methods.h"
|
| -#include "chromeos/cryptohome/system_salt_getter.h"
|
| -#include "chromeos/dbus/cryptohome_client.h"
|
| -#include "chromeos/dbus/dbus_thread_manager.h"
|
| -#include "chromeos/login/auth/auth_status_consumer.h"
|
| -#include "chromeos/login/auth/key.h"
|
| -#include "chromeos/login/auth/user_context.h"
|
| -#include "content/public/browser/browser_thread.h"
|
| -#include "crypto/sha2.h"
|
| -#include "google_apis/gaia/gaia_auth_util.h"
|
| -#include "third_party/cros_system_api/dbus/service_constants.h"
|
| -
|
| -using content::BrowserThread;
|
| -
|
| -namespace chromeos {
|
| -
|
| -namespace {
|
| -
|
| -void RecordStartMarker(const std::string& marker) {
|
| - std::string full_marker = "Cryptohome-";
|
| - full_marker.append(marker);
|
| - full_marker.append("-Start");
|
| - chromeos::BootTimesLoader::Get()->AddLoginTimeMarker(full_marker, false);
|
| -}
|
| -
|
| -void RecordEndMarker(const std::string& marker) {
|
| - std::string full_marker = "Cryptohome-";
|
| - full_marker.append(marker);
|
| - full_marker.append("-End");
|
| - chromeos::BootTimesLoader::Get()->AddLoginTimeMarker(full_marker, false);
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -ExtendedAuthenticator::ExtendedAuthenticator(NewAuthStatusConsumer* consumer)
|
| - : salt_obtained_(false), consumer_(consumer), old_consumer_(NULL) {
|
| - SystemSaltGetter::Get()->GetSystemSalt(
|
| - base::Bind(&ExtendedAuthenticator::OnSaltObtained, this));
|
| -}
|
| -
|
| -ExtendedAuthenticator::ExtendedAuthenticator(AuthStatusConsumer* consumer)
|
| - : salt_obtained_(false), consumer_(NULL), old_consumer_(consumer) {
|
| - SystemSaltGetter::Get()->GetSystemSalt(
|
| - base::Bind(&ExtendedAuthenticator::OnSaltObtained, this));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::SetConsumer(AuthStatusConsumer* consumer) {
|
| - old_consumer_ = consumer;
|
| -}
|
| -
|
| -void ExtendedAuthenticator::AuthenticateToMount(
|
| - const UserContext& context,
|
| - const ResultCallback& success_callback) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - TransformKeyIfNeeded(context,
|
| - base::Bind(&ExtendedAuthenticator::DoAuthenticateToMount,
|
| - this,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::AuthenticateToCheck(
|
| - const UserContext& context,
|
| - const base::Closure& success_callback) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - TransformKeyIfNeeded(context,
|
| - base::Bind(&ExtendedAuthenticator::DoAuthenticateToCheck,
|
| - this,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::CreateMount(
|
| - const std::string& user_id,
|
| - const std::vector<cryptohome::KeyDefinition>& keys,
|
| - const ResultCallback& success_callback) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - RecordStartMarker("MountEx");
|
| -
|
| - std::string canonicalized = gaia::CanonicalizeEmail(user_id);
|
| - cryptohome::Identification id(canonicalized);
|
| - cryptohome::Authorization auth(keys.front());
|
| - cryptohome::MountParameters mount(false);
|
| - for (size_t i = 0; i < keys.size(); i++) {
|
| - mount.create_keys.push_back(keys[i]);
|
| - }
|
| - UserContext context(user_id);
|
| - Key key(keys.front().key);
|
| - key.SetLabel(keys.front().label);
|
| - context.SetKey(key);
|
| -
|
| - cryptohome::HomedirMethods::GetInstance()->MountEx(
|
| - id,
|
| - auth,
|
| - mount,
|
| - base::Bind(&ExtendedAuthenticator::OnMountComplete,
|
| - this,
|
| - "MountEx",
|
| - context,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::AddKey(const UserContext& context,
|
| - const cryptohome::KeyDefinition& key,
|
| - bool replace_existing,
|
| - const base::Closure& success_callback) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - TransformKeyIfNeeded(context,
|
| - base::Bind(&ExtendedAuthenticator::DoAddKey,
|
| - this,
|
| - key,
|
| - replace_existing,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::UpdateKeyAuthorized(
|
| - const UserContext& context,
|
| - const cryptohome::KeyDefinition& key,
|
| - const std::string& signature,
|
| - const base::Closure& success_callback) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - TransformKeyIfNeeded(context,
|
| - base::Bind(&ExtendedAuthenticator::DoUpdateKeyAuthorized,
|
| - this,
|
| - key,
|
| - signature,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::RemoveKey(const UserContext& context,
|
| - const std::string& key_to_remove,
|
| - const base::Closure& success_callback) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - TransformKeyIfNeeded(context,
|
| - base::Bind(&ExtendedAuthenticator::DoRemoveKey,
|
| - this,
|
| - key_to_remove,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::TransformKeyIfNeeded(
|
| - const UserContext& user_context,
|
| - const ContextCallback& callback) {
|
| - if (user_context.GetKey()->GetKeyType() != Key::KEY_TYPE_PASSWORD_PLAIN) {
|
| - callback.Run(user_context);
|
| - return;
|
| - }
|
| -
|
| - if (!salt_obtained_) {
|
| - system_salt_callbacks_.push_back(base::Bind(
|
| - &ExtendedAuthenticator::TransformKeyIfNeeded,
|
| - this,
|
| - user_context,
|
| - callback));
|
| - return;
|
| - }
|
| -
|
| - UserContext transformed_context = user_context;
|
| - transformed_context.GetKey()->Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF,
|
| - system_salt_);
|
| - callback.Run(transformed_context);
|
| -}
|
| -
|
| -ExtendedAuthenticator::~ExtendedAuthenticator() {
|
| -}
|
| -
|
| -void ExtendedAuthenticator::OnSaltObtained(const std::string& system_salt) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - salt_obtained_ = true;
|
| - system_salt_ = system_salt;
|
| - for (std::vector<base::Closure>::const_iterator it =
|
| - system_salt_callbacks_.begin();
|
| - it != system_salt_callbacks_.end(); ++it) {
|
| - it->Run();
|
| - }
|
| - system_salt_callbacks_.clear();
|
| -}
|
| -
|
| -void ExtendedAuthenticator::DoAuthenticateToMount(
|
| - const ResultCallback& success_callback,
|
| - const UserContext& user_context) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - RecordStartMarker("MountEx");
|
| -
|
| - std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID());
|
| - cryptohome::Identification id(canonicalized);
|
| - const Key* const key = user_context.GetKey();
|
| - cryptohome::Authorization auth(key->GetSecret(), key->GetLabel());
|
| - cryptohome::MountParameters mount(false);
|
| -
|
| - cryptohome::HomedirMethods::GetInstance()->MountEx(
|
| - id,
|
| - auth,
|
| - mount,
|
| - base::Bind(&ExtendedAuthenticator::OnMountComplete,
|
| - this,
|
| - "MountEx",
|
| - user_context,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::DoAuthenticateToCheck(
|
| - const base::Closure& success_callback,
|
| - const UserContext& user_context) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - RecordStartMarker("CheckKeyEx");
|
| -
|
| - std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID());
|
| - cryptohome::Identification id(canonicalized);
|
| - const Key* const key = user_context.GetKey();
|
| - cryptohome::Authorization auth(key->GetSecret(), key->GetLabel());
|
| -
|
| - cryptohome::HomedirMethods::GetInstance()->CheckKeyEx(
|
| - id,
|
| - auth,
|
| - base::Bind(&ExtendedAuthenticator::OnOperationComplete,
|
| - this,
|
| - "CheckKeyEx",
|
| - user_context,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::DoAddKey(const cryptohome::KeyDefinition& key,
|
| - bool replace_existing,
|
| - const base::Closure& success_callback,
|
| - const UserContext& user_context) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - RecordStartMarker("AddKeyEx");
|
| -
|
| - std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID());
|
| - cryptohome::Identification id(canonicalized);
|
| - const Key* const auth_key = user_context.GetKey();
|
| - cryptohome::Authorization auth(auth_key->GetSecret(), auth_key->GetLabel());
|
| -
|
| - cryptohome::HomedirMethods::GetInstance()->AddKeyEx(
|
| - id,
|
| - auth,
|
| - key,
|
| - replace_existing,
|
| - base::Bind(&ExtendedAuthenticator::OnOperationComplete,
|
| - this,
|
| - "AddKeyEx",
|
| - user_context,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::DoUpdateKeyAuthorized(
|
| - const cryptohome::KeyDefinition& key,
|
| - const std::string& signature,
|
| - const base::Closure& success_callback,
|
| - const UserContext& user_context) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - RecordStartMarker("UpdateKeyAuthorized");
|
| -
|
| - std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID());
|
| - cryptohome::Identification id(canonicalized);
|
| - const Key* const auth_key = user_context.GetKey();
|
| - cryptohome::Authorization auth(auth_key->GetSecret(), auth_key->GetLabel());
|
| -
|
| - cryptohome::HomedirMethods::GetInstance()->UpdateKeyEx(
|
| - id,
|
| - auth,
|
| - key,
|
| - signature,
|
| - base::Bind(&ExtendedAuthenticator::OnOperationComplete,
|
| - this,
|
| - "UpdateKeyAuthorized",
|
| - user_context,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::DoRemoveKey(const std::string& key_to_remove,
|
| - const base::Closure& success_callback,
|
| - const UserContext& user_context) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - RecordStartMarker("RemoveKeyEx");
|
| -
|
| - std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID());
|
| - cryptohome::Identification id(canonicalized);
|
| - const Key* const auth_key = user_context.GetKey();
|
| - cryptohome::Authorization auth(auth_key->GetSecret(), auth_key->GetLabel());
|
| -
|
| - cryptohome::HomedirMethods::GetInstance()->RemoveKeyEx(
|
| - id,
|
| - auth,
|
| - key_to_remove,
|
| - base::Bind(&ExtendedAuthenticator::OnOperationComplete,
|
| - this,
|
| - "RemoveKeyEx",
|
| - user_context,
|
| - success_callback));
|
| -}
|
| -
|
| -void ExtendedAuthenticator::OnMountComplete(
|
| - const std::string& time_marker,
|
| - const UserContext& user_context,
|
| - const ResultCallback& success_callback,
|
| - bool success,
|
| - cryptohome::MountError return_code,
|
| - const std::string& mount_hash) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - RecordEndMarker(time_marker);
|
| - UserContext copy = user_context;
|
| - copy.SetUserIDHash(mount_hash);
|
| - if (return_code == cryptohome::MOUNT_ERROR_NONE) {
|
| - if (!success_callback.is_null())
|
| - success_callback.Run(mount_hash);
|
| - if (old_consumer_)
|
| - old_consumer_->OnAuthSuccess(copy);
|
| - return;
|
| - }
|
| - AuthState state = FAILED_MOUNT;
|
| - if (return_code == cryptohome::MOUNT_ERROR_TPM_COMM_ERROR ||
|
| - return_code == cryptohome::MOUNT_ERROR_TPM_DEFEND_LOCK ||
|
| - return_code == cryptohome::MOUNT_ERROR_TPM_NEEDS_REBOOT) {
|
| - state = FAILED_TPM;
|
| - }
|
| - if (return_code == cryptohome::MOUNT_ERROR_USER_DOES_NOT_EXIST) {
|
| - state = NO_MOUNT;
|
| - }
|
| - if (consumer_)
|
| - consumer_->OnAuthenticationFailure(state);
|
| - if (old_consumer_) {
|
| - AuthFailure failure(AuthFailure::COULD_NOT_MOUNT_CRYPTOHOME);
|
| - old_consumer_->OnAuthFailure(failure);
|
| - }
|
| -}
|
| -
|
| -void ExtendedAuthenticator::OnOperationComplete(
|
| - const std::string& time_marker,
|
| - const UserContext& user_context,
|
| - const base::Closure& success_callback,
|
| - bool success,
|
| - cryptohome::MountError return_code) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| -
|
| - RecordEndMarker(time_marker);
|
| - if (return_code == cryptohome::MOUNT_ERROR_NONE) {
|
| - if (!success_callback.is_null())
|
| - success_callback.Run();
|
| - if (old_consumer_)
|
| - old_consumer_->OnAuthSuccess(user_context);
|
| - return;
|
| - }
|
| -
|
| - AuthState state = FAILED_MOUNT;
|
| -
|
| - if (return_code == cryptohome::MOUNT_ERROR_TPM_COMM_ERROR ||
|
| - return_code == cryptohome::MOUNT_ERROR_TPM_DEFEND_LOCK ||
|
| - return_code == cryptohome::MOUNT_ERROR_TPM_NEEDS_REBOOT) {
|
| - state = FAILED_TPM;
|
| - }
|
| -
|
| - if (return_code == cryptohome::MOUNT_ERROR_USER_DOES_NOT_EXIST)
|
| - state = NO_MOUNT;
|
| -
|
| - if (consumer_)
|
| - consumer_->OnAuthenticationFailure(state);
|
| -
|
| - if (old_consumer_) {
|
| - AuthFailure failure(AuthFailure::UNLOCK_FAILED);
|
| - old_consumer_->OnAuthFailure(failure);
|
| - }
|
| -}
|
| -
|
| -} // namespace chromeos
|
|
|