Index: chromeos/network/onc/onc_utils.cc |
diff --git a/chrome/browser/chromeos/network_settings/onc_utils.cc b/chromeos/network/onc/onc_utils.cc |
similarity index 64% |
rename from chrome/browser/chromeos/network_settings/onc_utils.cc |
rename to chromeos/network/onc/onc_utils.cc |
index 9b57cbe97dafd4aeaff16cd65906b443781dba6d..62e0d4682ace119565c61e0be4b9eba297f7a1ec 100644 |
--- a/chrome/browser/chromeos/network_settings/onc_utils.cc |
+++ b/chromeos/network/onc/onc_utils.cc |
@@ -2,33 +2,40 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#include "chrome/browser/chromeos/network_settings/onc_utils.h" |
+#include "chromeos/network/onc/onc_utils.h" |
#include "base/base64.h" |
#include "base/json/json_reader.h" |
+#include "base/logging.h" |
#include "base/values.h" |
-#include "chrome/browser/chromeos/cros/onc_constants.h" |
+#include "chromeos/network/network_event_log.h" |
+#include "chromeos/network/onc/onc_constants.h" |
#include "crypto/encryptor.h" |
#include "crypto/hmac.h" |
#include "crypto/symmetric_key.h" |
-#include "grit/generated_resources.h" |
-#include "ui/base/l10n/l10n_util.h" |
+ |
+#define ONC_LOG_WARNING(message) NET_LOG_WARNING("ONC", message) |
+#define ONC_LOG_ERROR(message) NET_LOG_ERROR("ONC", message) |
namespace chromeos { |
namespace onc { |
+namespace { |
+ |
+const char kUnableToDecrypt[] = "Unable to decrypt encrypted ONC"; |
+const char kUnableToDecode[] = "Unable to decode encrypted ONC"; |
+ |
+} // namespace |
+ |
scoped_ptr<base::DictionaryValue> ReadDictionaryFromJson( |
- const std::string& json, |
- std::string* error) { |
+ const std::string& json) { |
+ std::string error; |
base::Value* root = base::JSONReader::ReadAndReturnError( |
- json, base::JSON_ALLOW_TRAILING_COMMAS, NULL, error); |
+ json, base::JSON_ALLOW_TRAILING_COMMAS, NULL, &error); |
base::DictionaryValue* dict_ptr = NULL; |
- if (root != NULL && !root->GetAsDictionary(&dict_ptr)) { |
- if (error) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_NETWORK_NOT_A_JSON_DICTIONARY); |
- } |
+ if (!root || !root->GetAsDictionary(&dict_ptr)) { |
+ ONC_LOG_ERROR("Invalid JSON Dictionary: " + error); |
delete root; |
} |
@@ -36,8 +43,7 @@ scoped_ptr<base::DictionaryValue> ReadDictionaryFromJson( |
} |
scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, |
- const base::DictionaryValue& root, |
- std::string* error) { |
+ const base::DictionaryValue& root) { |
const int kKeySizeInBits = 256; |
const int kMaxIterationCount = 500000; |
std::string onc_type; |
@@ -60,37 +66,33 @@ scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, |
!root.GetString(encrypted::kStretch, &stretch_method) || |
!root.GetString(encrypted::kType, &onc_type) || |
onc_type != kEncryptedConfiguration) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_MALFORMED); |
+ |
+ ONC_LOG_ERROR("Encrypted ONC malformed."); |
return scoped_ptr<base::DictionaryValue>(); |
} |
if (hmac_method != encrypted::kSHA1 || |
cipher != encrypted::kAES256 || |
stretch_method != encrypted::kPBKDF2) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNSUPPORTED_ENCRYPTION); |
+ ONC_LOG_ERROR("Encrypted ONC unsupported encryption scheme."); |
return scoped_ptr<base::DictionaryValue>(); |
} |
// Make sure iterations != 0, since that's not valid. |
if (iterations == 0) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); |
+ ONC_LOG_ERROR(kUnableToDecrypt); |
return scoped_ptr<base::DictionaryValue>(); |
} |
// Simply a sanity check to make sure we can't lock up the machine |
// for too long with a huge number (or a negative number). |
if (iterations < 0 || iterations > kMaxIterationCount) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_TOO_MANY_ITERATIONS); |
+ ONC_LOG_ERROR("Too many iterations in encrypted ONC"); |
return scoped_ptr<base::DictionaryValue>(); |
} |
if (!base::Base64Decode(salt, &salt)) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); |
+ ONC_LOG_ERROR(kUnableToDecode); |
return scoped_ptr<base::DictionaryValue>(); |
} |
@@ -102,51 +104,61 @@ scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, |
kKeySizeInBits)); |
if (!base::Base64Decode(initial_vector, &initial_vector)) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); |
+ ONC_LOG_ERROR(kUnableToDecode); |
return scoped_ptr<base::DictionaryValue>(); |
} |
if (!base::Base64Decode(ciphertext, &ciphertext)) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); |
+ ONC_LOG_ERROR(kUnableToDecode); |
return scoped_ptr<base::DictionaryValue>(); |
} |
if (!base::Base64Decode(hmac, &hmac)) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); |
+ ONC_LOG_ERROR(kUnableToDecode); |
return scoped_ptr<base::DictionaryValue>(); |
} |
crypto::HMAC hmac_verifier(crypto::HMAC::SHA1); |
if (!hmac_verifier.Init(key.get()) || |
!hmac_verifier.Verify(ciphertext, hmac)) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); |
+ ONC_LOG_ERROR(kUnableToDecrypt); |
return scoped_ptr<base::DictionaryValue>(); |
} |
crypto::Encryptor decryptor; |
if (!decryptor.Init(key.get(), crypto::Encryptor::CBC, initial_vector)) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); |
+ ONC_LOG_ERROR(kUnableToDecrypt); |
return scoped_ptr<base::DictionaryValue>(); |
} |
std::string plaintext; |
if (!decryptor.Decrypt(ciphertext, &plaintext)) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); |
+ ONC_LOG_ERROR(kUnableToDecrypt); |
return scoped_ptr<base::DictionaryValue>(); |
} |
scoped_ptr<base::DictionaryValue> new_root = |
- ReadDictionaryFromJson(plaintext, error); |
- if (new_root.get() == NULL && error->empty()) { |
- *error = l10n_util::GetStringUTF8( |
- IDS_NETWORK_CONFIG_ERROR_NETWORK_PROP_DICT_MALFORMED); |
+ ReadDictionaryFromJson(plaintext); |
+ if (new_root.get() == NULL) { |
+ ONC_LOG_ERROR("Property dictionary malformed."); |
+ return scoped_ptr<base::DictionaryValue>(); |
} |
+ |
return new_root.Pass(); |
} |
+std::string GetSourceAsString(ONCSource source) { |
+ switch (source) { |
+ case ONC_SOURCE_DEVICE_POLICY: |
+ return "device policy"; |
+ case ONC_SOURCE_USER_POLICY: |
+ return "user policy"; |
+ case ONC_SOURCE_NONE: |
+ return "none"; |
+ case ONC_SOURCE_USER_IMPORT: |
+ return "user import"; |
+ } |
+ NOTREACHED() << "unknown ONC source " << source; |
+ return "unknown"; |
+} |
+ |
} // chromeos |
} // onc |