OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.h" | 5 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
10 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
11 #include "base/values.h" | 11 #include "base/values.h" |
12 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_tpm_key_manager.
h" | 12 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_tpm_key_manager.
h" |
13 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_tpm_key_manager_
factory.h" | 13 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_tpm_key_manager_
factory.h" |
| 14 #include "components/signin/core/account_id/account_id.h" |
14 | 15 |
15 namespace chromeos { | 16 namespace chromeos { |
16 | 17 |
17 namespace { | 18 namespace { |
18 | 19 |
19 const char kKeyBluetoothAddress[] = "bluetoothAddress"; | 20 const char kKeyBluetoothAddress[] = "bluetoothAddress"; |
20 const char kKeyPermitRecord[] = "permitRecord"; | 21 const char kKeyPermitRecord[] = "permitRecord"; |
21 const char kKeyPermitId[] = "permitRecord.id"; | 22 const char kKeyPermitId[] = "permitRecord.id"; |
22 const char kKeyPermitPermitId[] = "permitRecord.permitId"; | 23 const char kKeyPermitPermitId[] = "permitRecord.permitId"; |
23 const char kKeyPermitData[] = "permitRecord.data"; | 24 const char kKeyPermitData[] = "permitRecord.data"; |
(...skipping 21 matching lines...) Expand all Loading... |
45 const RefreshKeysCallback& callback) { | 46 const RefreshKeysCallback& callback) { |
46 base::Closure do_refresh_keys = base::Bind( | 47 base::Closure do_refresh_keys = base::Bind( |
47 &EasyUnlockKeyManager::RefreshKeysWithTpmKeyPresent, | 48 &EasyUnlockKeyManager::RefreshKeysWithTpmKeyPresent, |
48 weak_ptr_factory_.GetWeakPtr(), | 49 weak_ptr_factory_.GetWeakPtr(), |
49 user_context, | 50 user_context, |
50 base::Owned(remote_devices.DeepCopy()), | 51 base::Owned(remote_devices.DeepCopy()), |
51 callback); | 52 callback); |
52 | 53 |
53 EasyUnlockTpmKeyManager* tpm_key_manager = | 54 EasyUnlockTpmKeyManager* tpm_key_manager = |
54 EasyUnlockTpmKeyManagerFactory::GetInstance()->GetForUser( | 55 EasyUnlockTpmKeyManagerFactory::GetInstance()->GetForUser( |
55 user_context.GetUserID()); | 56 user_context.GetAccountId().GetUserEmail()); |
56 if (!tpm_key_manager) { | 57 if (!tpm_key_manager) { |
57 LOG(ERROR) << "No TPM key manager."; | 58 LOG(ERROR) << "No TPM key manager."; |
58 callback.Run(false); | 59 callback.Run(false); |
59 return; | 60 return; |
60 } | 61 } |
61 | 62 |
62 // Private TPM key is needed only when adding new keys. | 63 // Private TPM key is needed only when adding new keys. |
63 if (remote_devices.empty() || | 64 if (remote_devices.empty() || |
64 tpm_key_manager->PrepareTpmKey(false /* check_private_key */, | 65 tpm_key_manager->PrepareTpmKey(false /* check_private_key */, |
65 do_refresh_keys)) { | 66 do_refresh_keys)) { |
66 do_refresh_keys.Run(); | 67 do_refresh_keys.Run(); |
67 } else { | 68 } else { |
68 // In case Chrome is supposed to restart to apply user session flags, the | 69 // In case Chrome is supposed to restart to apply user session flags, the |
69 // Chrome restart will be postponed until Easy Sign-in keys are refreshed. | 70 // Chrome restart will be postponed until Easy Sign-in keys are refreshed. |
70 // This is to ensure that creating TPM key does not hang if TPM system | 71 // This is to ensure that creating TPM key does not hang if TPM system |
71 // loading takes too much time. Note that in normal circumstances the | 72 // loading takes too much time. Note that in normal circumstances the |
72 // chances that TPM slot cannot be loaded should be extremely low. | 73 // chances that TPM slot cannot be loaded should be extremely low. |
73 // TODO(tbarzic): Add some metrics to measure if the timeout even gets hit. | 74 // TODO(tbarzic): Add some metrics to measure if the timeout even gets hit. |
74 tpm_key_manager->StartGetSystemSlotTimeoutMs(2000); | 75 tpm_key_manager->StartGetSystemSlotTimeoutMs(2000); |
75 } | 76 } |
76 } | 77 } |
77 | 78 |
78 void EasyUnlockKeyManager::RefreshKeysWithTpmKeyPresent( | 79 void EasyUnlockKeyManager::RefreshKeysWithTpmKeyPresent( |
79 const UserContext& user_context, | 80 const UserContext& user_context, |
80 base::ListValue* remote_devices, | 81 base::ListValue* remote_devices, |
81 const RefreshKeysCallback& callback) { | 82 const RefreshKeysCallback& callback) { |
82 EasyUnlockTpmKeyManager* tpm_key_manager = | 83 EasyUnlockTpmKeyManager* tpm_key_manager = |
83 EasyUnlockTpmKeyManagerFactory::GetInstance()->GetForUser( | 84 EasyUnlockTpmKeyManagerFactory::GetInstance()->GetForUser( |
84 user_context.GetUserID()); | 85 user_context.GetAccountId().GetUserEmail()); |
85 std::string tpm_public_key = | 86 const std::string tpm_public_key = tpm_key_manager->GetPublicTpmKey( |
86 tpm_key_manager->GetPublicTpmKey(user_context.GetUserID()); | 87 user_context.GetAccountId().GetUserEmail()); |
87 | 88 |
88 EasyUnlockDeviceKeyDataList devices; | 89 EasyUnlockDeviceKeyDataList devices; |
89 if (!RemoteDeviceListToDeviceDataList(*remote_devices, &devices)) | 90 if (!RemoteDeviceListToDeviceDataList(*remote_devices, &devices)) |
90 devices.clear(); | 91 devices.clear(); |
91 | 92 |
92 write_operation_queue_.push_back(new EasyUnlockRefreshKeysOperation( | 93 write_operation_queue_.push_back(new EasyUnlockRefreshKeysOperation( |
93 user_context, tpm_public_key, devices, | 94 user_context, tpm_public_key, devices, |
94 base::Bind(&EasyUnlockKeyManager::OnKeysRefreshed, | 95 base::Bind(&EasyUnlockKeyManager::OnKeysRefreshed, |
95 weak_ptr_factory_.GetWeakPtr(), callback))); | 96 weak_ptr_factory_.GetWeakPtr(), callback))); |
96 RunNextOperation(); | 97 RunNextOperation(); |
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
215 const EasyUnlockDeviceKeyDataList& fetched_data) { | 216 const EasyUnlockDeviceKeyDataList& fetched_data) { |
216 if (!callback.is_null()) | 217 if (!callback.is_null()) |
217 callback.Run(fetch_success, fetched_data); | 218 callback.Run(fetch_success, fetched_data); |
218 | 219 |
219 DCHECK(pending_read_operation_); | 220 DCHECK(pending_read_operation_); |
220 pending_read_operation_.reset(); | 221 pending_read_operation_.reset(); |
221 RunNextOperation(); | 222 RunNextOperation(); |
222 } | 223 } |
223 | 224 |
224 } // namespace chromeos | 225 } // namespace chromeos |
OLD | NEW |