OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CHROME_BROWSER_SIGNIN_EASY_UNLOCK_SERVICE_SIGNIN_CHROMEOS_H_ | 5 #ifndef CHROME_BROWSER_SIGNIN_EASY_UNLOCK_SERVICE_SIGNIN_CHROMEOS_H_ |
6 #define CHROME_BROWSER_SIGNIN_EASY_UNLOCK_SERVICE_SIGNIN_CHROMEOS_H_ | 6 #define CHROME_BROWSER_SIGNIN_EASY_UNLOCK_SERVICE_SIGNIN_CHROMEOS_H_ |
7 | 7 |
8 #include <map> | 8 #include <map> |
9 #include <memory> | 9 #include <memory> |
10 #include <string> | 10 #include <string> |
(...skipping 113 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
124 const chromeos::EasyUnlockDeviceKeyDataList& data); | 124 const chromeos::EasyUnlockDeviceKeyDataList& data); |
125 | 125 |
126 // If the device data has been loaded for the current user, returns it. | 126 // If the device data has been loaded for the current user, returns it. |
127 // Otherwise, returns NULL. | 127 // Otherwise, returns NULL. |
128 const UserData* FindLoadedDataForCurrentUser() const; | 128 const UserData* FindLoadedDataForCurrentUser() const; |
129 | 129 |
130 // User id of the user currently associated with the service. | 130 // User id of the user currently associated with the service. |
131 AccountId account_id_; | 131 AccountId account_id_; |
132 | 132 |
133 // Maps account ids to their fetched cryptohome key data. | 133 // Maps account ids to their fetched cryptohome key data. |
134 std::map<AccountId, UserData*> user_data_; | 134 std::map<AccountId, std::unique_ptr<UserData>> user_data_; |
135 | 135 |
136 // Whether failed attempts to load user data should be retried. | 136 // Whether failed attempts to load user data should be retried. |
137 // This is to handle case where cryptohome daemon is not started in time the | 137 // This is to handle case where cryptohome daemon is not started in time the |
138 // service attempts to load some data. Retries will be allowed only until the | 138 // service attempts to load some data. Retries will be allowed only until the |
139 // first data load finishes (even if it fails). | 139 // first data load finishes (even if it fails). |
140 bool allow_cryptohome_backoff_ = true; | 140 bool allow_cryptohome_backoff_ = true; |
141 | 141 |
142 // Whether the service has been successfully initialized, and has not been | 142 // Whether the service has been successfully initialized, and has not been |
143 // shut down. | 143 // shut down. |
144 bool service_active_ = false; | 144 bool service_active_ = false; |
145 | 145 |
146 // The timestamp for the most recent time when a user pod was focused. | 146 // The timestamp for the most recent time when a user pod was focused. |
147 base::TimeTicks user_pod_last_focused_timestamp_; | 147 base::TimeTicks user_pod_last_focused_timestamp_; |
148 | 148 |
149 // Handles wrapping the user's challenge with the TPM. | 149 // Handles wrapping the user's challenge with the TPM. |
150 std::unique_ptr<chromeos::EasyUnlockChallengeWrapper> challenge_wrapper_; | 150 std::unique_ptr<chromeos::EasyUnlockChallengeWrapper> challenge_wrapper_; |
151 | 151 |
152 base::WeakPtrFactory<EasyUnlockServiceSignin> weak_ptr_factory_; | 152 base::WeakPtrFactory<EasyUnlockServiceSignin> weak_ptr_factory_; |
153 | 153 |
154 DISALLOW_COPY_AND_ASSIGN(EasyUnlockServiceSignin); | 154 DISALLOW_COPY_AND_ASSIGN(EasyUnlockServiceSignin); |
155 }; | 155 }; |
156 | 156 |
157 #endif // CHROME_BROWSER_SIGNIN_EASY_UNLOCK_SERVICE_SIGNIN_CHROMEOS_H_ | 157 #endif // CHROME_BROWSER_SIGNIN_EASY_UNLOCK_SERVICE_SIGNIN_CHROMEOS_H_ |
OLD | NEW |