Index: src/platform/cryptohome/authenticator.h |
diff --git a/src/platform/cryptohome/authenticator.h b/src/platform/cryptohome/authenticator.h |
deleted file mode 100644 |
index 68825fbcc42de70a06fecefdefe9669acba97a1b..0000000000000000000000000000000000000000 |
--- a/src/platform/cryptohome/authenticator.h |
+++ /dev/null |
@@ -1,102 +0,0 @@ |
-// Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef CRYPTOHOME_AUTHENTICATOR_H_ |
-#define CRYPTOHOME_AUTHENTICATOR_H_ |
- |
-#include "base/basictypes.h" |
-#include "base/file_path.h" |
-#include "chromeos/utility.h" |
-#include "cryptohome/credentials.h" |
- |
-namespace cryptohome { |
- |
-// System salt and user dirs start here. |
-extern const std::string kDefaultShadowRoot; |
- |
-class Authenticator { |
- |
- public: |
- // Initializes the authenticator with the default shadow root of |
- // "/home/.shadow/". |
- Authenticator(); |
- |
- // Initializes the authenticator with an alternative shadow root. The |
- // shadow_root should point to a directory with the system salt and |
- // obfuscated user directories. |
- // |
- // Parameters |
- // shadow_root - A local file system path containing the system salt |
- // and obfuscated user directories. |
- // |
- explicit Authenticator(const std::string &shadow_root); |
- |
- virtual ~Authenticator(); |
- |
- // Loads the system salt, and anything else that might need to be done. |
- // This *must* be called before other methods. |
- // |
- // Returns false if the initialization fails for some reason. May also |
- // spew LOG messages on failure. |
- virtual bool Init(); |
- |
- // Enumerates all of the master keys (master.0, master.1, etc), looking |
- // for ones that can be successfully decrypted with the given credentials. |
- // |
- // Parameters |
- // credentials - An object representing the user's credentials. |
- // |
- virtual bool TestAllMasterKeys(const Credentials &credentials) const; |
- |
- private: |
- std::string shadow_root_; |
- chromeos::Blob system_salt_; |
- |
- bool LoadFileBytes(const FilePath &path, chromeos::Blob *blob) const; |
- bool LoadFileString(const FilePath &path, std::string *str) const; |
- |
- // Returns the system salt |
- chromeos::Blob GetSystemSalt() const; |
- |
- // "Wraps" the hashed password using the same algorithm as |
- // cryptohome::password_to_wrapper. This encodes the hashed_password in a |
- // master key specific salt, resulting in the passphrase for the master |
- // key. |
- // |
- // Parameters |
- // master_salt_file - The local filesystem path to the salt file for the |
- // master password that you intend to decrypt. |
- // hashed_password - The user's hashed password, as returned by |
- // Credentials::GetPasswordWeakHash. |
- // iters - The number of wrap iterations to perform. Should be the same |
- // number that were used by the cryptohome script to create the passphrase. |
- // |
- std::string IteratedWrapHashedPassword(const FilePath &master_salt_file, |
- const std::string &hashed_password, |
- const int iters) const; |
- |
- // Same as above, except with a default iters of 1. |
- std::string WrapHashedPassword(const FilePath &master_salt_file, |
- const std::string &hashed_password) const; |
- |
- bool TestDecrypt(const std::string passphrase, |
- const chromeos::Blob salt, |
- const chromeos::Blob cipher_text) const; |
- |
- // Attempts to decrypt a single master key. |
- // |
- // Parameters |
- // master_key_file - The full local filesystem path to the master key. |
- // hashed_password - The hashed password (as returned by |
- // Credentials.GetPasswordWeakHash) |
- // |
- bool TestOneMasterKey(const FilePath &master_key_file, |
- const std::string &hashed_password) const; |
- |
- DISALLOW_COPY_AND_ASSIGN(Authenticator); |
-}; |
- |
-} // namespace cryptohome |
- |
-#endif // CRYPTOHOME_AUTHENTICATOR_H_ |