| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/chromeos/network_settings/onc_utils.h" | |
| 6 | |
| 7 #include "base/base64.h" | |
| 8 #include "base/json/json_reader.h" | |
| 9 #include "base/values.h" | |
| 10 #include "chrome/browser/chromeos/cros/onc_constants.h" | |
| 11 #include "crypto/encryptor.h" | |
| 12 #include "crypto/hmac.h" | |
| 13 #include "crypto/symmetric_key.h" | |
| 14 #include "grit/generated_resources.h" | |
| 15 #include "ui/base/l10n/l10n_util.h" | |
| 16 | |
| 17 namespace chromeos { | |
| 18 namespace onc { | |
| 19 | |
| 20 scoped_ptr<base::DictionaryValue> ReadDictionaryFromJson( | |
| 21 const std::string& json, | |
| 22 std::string* error) { | |
| 23 base::Value* root = base::JSONReader::ReadAndReturnError( | |
| 24 json, base::JSON_ALLOW_TRAILING_COMMAS, NULL, error); | |
| 25 | |
| 26 base::DictionaryValue* dict_ptr = NULL; | |
| 27 if (root != NULL && !root->GetAsDictionary(&dict_ptr)) { | |
| 28 if (error) { | |
| 29 *error = l10n_util::GetStringUTF8( | |
| 30 IDS_NETWORK_CONFIG_ERROR_NETWORK_NOT_A_JSON_DICTIONARY); | |
| 31 } | |
| 32 delete root; | |
| 33 } | |
| 34 | |
| 35 return make_scoped_ptr(dict_ptr); | |
| 36 } | |
| 37 | |
| 38 scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, | |
| 39 const base::DictionaryValue& root, | |
| 40 std::string* error) { | |
| 41 const int kKeySizeInBits = 256; | |
| 42 const int kMaxIterationCount = 500000; | |
| 43 std::string onc_type; | |
| 44 std::string initial_vector; | |
| 45 std::string salt; | |
| 46 std::string cipher; | |
| 47 std::string stretch_method; | |
| 48 std::string hmac_method; | |
| 49 std::string hmac; | |
| 50 int iterations; | |
| 51 std::string ciphertext; | |
| 52 | |
| 53 if (!root.GetString(encrypted::kCiphertext, &ciphertext) || | |
| 54 !root.GetString(encrypted::kCipher, &cipher) || | |
| 55 !root.GetString(encrypted::kHMAC, &hmac) || | |
| 56 !root.GetString(encrypted::kHMACMethod, &hmac_method) || | |
| 57 !root.GetString(encrypted::kIV, &initial_vector) || | |
| 58 !root.GetInteger(encrypted::kIterations, &iterations) || | |
| 59 !root.GetString(encrypted::kSalt, &salt) || | |
| 60 !root.GetString(encrypted::kStretch, &stretch_method) || | |
| 61 !root.GetString(encrypted::kType, &onc_type) || | |
| 62 onc_type != kEncryptedConfiguration) { | |
| 63 *error = l10n_util::GetStringUTF8( | |
| 64 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_MALFORMED); | |
| 65 return scoped_ptr<base::DictionaryValue>(); | |
| 66 } | |
| 67 | |
| 68 if (hmac_method != encrypted::kSHA1 || | |
| 69 cipher != encrypted::kAES256 || | |
| 70 stretch_method != encrypted::kPBKDF2) { | |
| 71 *error = l10n_util::GetStringUTF8( | |
| 72 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNSUPPORTED_ENCRYPTION); | |
| 73 return scoped_ptr<base::DictionaryValue>(); | |
| 74 } | |
| 75 | |
| 76 // Make sure iterations != 0, since that's not valid. | |
| 77 if (iterations == 0) { | |
| 78 *error = l10n_util::GetStringUTF8( | |
| 79 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | |
| 80 return scoped_ptr<base::DictionaryValue>(); | |
| 81 } | |
| 82 | |
| 83 // Simply a sanity check to make sure we can't lock up the machine | |
| 84 // for too long with a huge number (or a negative number). | |
| 85 if (iterations < 0 || iterations > kMaxIterationCount) { | |
| 86 *error = l10n_util::GetStringUTF8( | |
| 87 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_TOO_MANY_ITERATIONS); | |
| 88 return scoped_ptr<base::DictionaryValue>(); | |
| 89 } | |
| 90 | |
| 91 if (!base::Base64Decode(salt, &salt)) { | |
| 92 *error = l10n_util::GetStringUTF8( | |
| 93 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | |
| 94 return scoped_ptr<base::DictionaryValue>(); | |
| 95 } | |
| 96 | |
| 97 scoped_ptr<crypto::SymmetricKey> key( | |
| 98 crypto::SymmetricKey::DeriveKeyFromPassword(crypto::SymmetricKey::AES, | |
| 99 passphrase, | |
| 100 salt, | |
| 101 iterations, | |
| 102 kKeySizeInBits)); | |
| 103 | |
| 104 if (!base::Base64Decode(initial_vector, &initial_vector)) { | |
| 105 *error = l10n_util::GetStringUTF8( | |
| 106 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | |
| 107 return scoped_ptr<base::DictionaryValue>(); | |
| 108 } | |
| 109 if (!base::Base64Decode(ciphertext, &ciphertext)) { | |
| 110 *error = l10n_util::GetStringUTF8( | |
| 111 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | |
| 112 return scoped_ptr<base::DictionaryValue>(); | |
| 113 } | |
| 114 if (!base::Base64Decode(hmac, &hmac)) { | |
| 115 *error = l10n_util::GetStringUTF8( | |
| 116 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | |
| 117 return scoped_ptr<base::DictionaryValue>(); | |
| 118 } | |
| 119 | |
| 120 crypto::HMAC hmac_verifier(crypto::HMAC::SHA1); | |
| 121 if (!hmac_verifier.Init(key.get()) || | |
| 122 !hmac_verifier.Verify(ciphertext, hmac)) { | |
| 123 *error = l10n_util::GetStringUTF8( | |
| 124 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | |
| 125 return scoped_ptr<base::DictionaryValue>(); | |
| 126 } | |
| 127 | |
| 128 crypto::Encryptor decryptor; | |
| 129 if (!decryptor.Init(key.get(), crypto::Encryptor::CBC, initial_vector)) { | |
| 130 *error = l10n_util::GetStringUTF8( | |
| 131 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | |
| 132 return scoped_ptr<base::DictionaryValue>(); | |
| 133 } | |
| 134 | |
| 135 std::string plaintext; | |
| 136 if (!decryptor.Decrypt(ciphertext, &plaintext)) { | |
| 137 *error = l10n_util::GetStringUTF8( | |
| 138 IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | |
| 139 return scoped_ptr<base::DictionaryValue>(); | |
| 140 } | |
| 141 | |
| 142 scoped_ptr<base::DictionaryValue> new_root = | |
| 143 ReadDictionaryFromJson(plaintext, error); | |
| 144 if (new_root.get() == NULL && error->empty()) { | |
| 145 *error = l10n_util::GetStringUTF8( | |
| 146 IDS_NETWORK_CONFIG_ERROR_NETWORK_PROP_DICT_MALFORMED); | |
| 147 } | |
| 148 return new_root.Pass(); | |
| 149 } | |
| 150 | |
| 151 } // chromeos | |
| 152 } // onc | |
| OLD | NEW |