Index: chrome/browser/password_manager/password_store_mac.cc |
diff --git a/chrome/browser/password_manager/password_store_mac.cc b/chrome/browser/password_manager/password_store_mac.cc |
index 74456e0a14452e354e109009a7b5377a6f7019ef..874fa8ada946936c58490dbceeab32fc206e9b02 100644 |
--- a/chrome/browser/password_manager/password_store_mac.cc |
+++ b/chrome/browser/password_manager/password_store_mac.cc |
@@ -8,6 +8,7 @@ |
#include <CoreServices/CoreServices.h> |
#include <set> |
#include <string> |
+#include <utility> |
#include <vector> |
#include "base/callback.h" |
@@ -233,7 +234,8 @@ PasswordForm::Scheme SchemeForAuthType(SecAuthenticationType auth_type) { |
bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain, |
const SecKeychainItemRef& keychain_item, |
- PasswordForm* form) { |
+ PasswordForm* form, |
+ bool extract_password_data) { |
DCHECK(form); |
SecKeychainAttributeInfo attrInfo; |
@@ -252,11 +254,18 @@ bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain, |
SecKeychainAttributeList *attrList; |
UInt32 password_length; |
- void* password_data; |
+ |
+ // If |extract_password_data| is false, do not pass in a reference to |
+ // |password_data|. ItemCopyAttributesAndData will then extract only the |
+ // attributes of |keychain_item| (doesn't require OS authorization), and not |
+ // attempt to extract its password data (requires OS authorization). |
+ void* password_data = NULL; |
+ void** password_data_ref = extract_password_data ? &password_data : NULL; |
+ |
OSStatus result = keychain.ItemCopyAttributesAndData(keychain_item, &attrInfo, |
NULL, &attrList, |
&password_length, |
- &password_data); |
+ password_data_ref); |
if (result != noErr) { |
// We don't log errSecAuthFailed because that just means that the user |
@@ -267,8 +276,10 @@ bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain, |
return false; |
} |
- UTF8ToUTF16(static_cast<const char *>(password_data), password_length, |
- &(form->password_value)); |
+ if (extract_password_data) { |
+ UTF8ToUTF16(static_cast<const char *>(password_data), password_length, |
+ &(form->password_value)); |
+ } |
int port = kAnyPort; |
std::string server; |
@@ -446,14 +457,58 @@ void MergePasswordForms(std::vector<PasswordForm*>* keychain_forms, |
std::vector<PasswordForm*> GetPasswordsForForms( |
const AppleKeychain& keychain, |
std::vector<PasswordForm*>* database_forms) { |
+ // We first load the attributes of all items in the keychain without loading |
+ // their password data, and then match items in |database_forms| against them. |
+ // This allows us to avoid individually searching through the keychain for |
+ // passwords matching each form in |database_forms|, and results in a |
+ // significant performance gain, since we are replacing O(N) keychain search |
+ // operations with a single operation that loads all keychain items, and then |
+ // selective reads of only the passwords we're interested in. |
stuartmorgan
2013/09/18 19:23:32
The we/us feels like noise here; would read better
Raghu Simha
2013/09/19 21:23:23
Done.
|
+ // See crbug.com/263685. |
+ |
+ // First load references to all items in the system keychain, and copy all |
+ // their attributes into a container of pairs of pointers to PasswordForms and |
+ // SecKeychainItemRefs without copying any password data. |
+ // This operation does not require OS authorization. |
MacKeychainPasswordFormAdapter keychain_adapter(&keychain); |
+ std::vector<SecKeychainItemRef> keychain_items = |
+ keychain_adapter.GetAllPasswordFormKeychainItems(); |
+ std::vector<std::pair<SecKeychainItemRef*, PasswordForm*> > item_form_pairs; |
+ for (std::vector<SecKeychainItemRef>::iterator i = keychain_items.begin(); |
+ i != keychain_items.end(); ++i) { |
+ PasswordForm* form_without_password = new PasswordForm(); |
+ internal_keychain_helpers::FillPasswordFormFromKeychainItem( |
+ keychain, |
+ *i, |
+ form_without_password, |
+ false); // Load password attributes, but not password data. |
+ item_form_pairs.push_back(std::make_pair(&(*i), form_without_password)); |
+ } |
stuartmorgan
2013/09/18 19:23:32
Please extract this into a helper method; this add
Raghu Simha
2013/09/19 21:23:23
Done.
|
+ // Next, compare the attributes of the PasswordForms in |database_forms| |
+ // against those in |item_form_pairs|, and extract password data for each |
+ // matching PasswordForm using its corresponding SecKeychainItemRef. |
std::vector<PasswordForm*> merged_forms; |
for (std::vector<PasswordForm*>::iterator i = database_forms->begin(); |
i != database_forms->end();) { |
std::vector<PasswordForm*> db_form_container(1, *i); |
- std::vector<PasswordForm*> keychain_matches = |
- keychain_adapter.PasswordsMergeableWithForm(**i); |
+ std::vector<PasswordForm*> keychain_matches; |
+ for (std::vector<std::pair<SecKeychainItemRef*, PasswordForm*> >::iterator j |
+ = item_form_pairs.begin(); j != item_form_pairs.end(); ++j) { |
+ if ((*i)->username_value == j->second->username_value && |
+ (*i)->scheme == j->second->scheme && |
+ GURL((*i)->signon_realm) == GURL(j->second->signon_realm)) { |
stuartmorgan
2013/09/18 19:23:32
Isn't this just FormsMatchForMerge? Except that it
Raghu Simha
2013/09/19 21:23:23
I was getting tripped up by the fact that when Fil
|
+ // Create a new object, since the caller is responsible for deleting the |
+ // returned forms. |
+ PasswordForm* form_with_password = new PasswordForm(); |
+ internal_keychain_helpers::FillPasswordFormFromKeychainItem( |
+ keychain, |
+ *(j->first), |
+ form_with_password, |
+ true); // Load password attributes and data. |
+ keychain_matches.push_back(form_with_password); |
stuartmorgan
2013/09/18 19:23:32
What happened to all the logic in MatchingKeychain
Raghu Simha
2013/09/19 21:23:23
My earlier reasoning was as follows:
- Since serve
|
+ } |
+ } |
stuartmorgan
2013/09/18 19:23:32
Again, please extract a helper method.
Raghu Simha
2013/09/19 21:23:23
Done.
|
MergePasswordForms(&keychain_matches, &db_form_container, &merged_forms); |
if (db_form_container.empty()) { |
i = database_forms->erase(i); |
@@ -462,6 +517,14 @@ std::vector<PasswordForm*> GetPasswordsForForms( |
} |
STLDeleteElements(&keychain_matches); |
} |
+ |
+ // Clean up temporary PasswordForms and SecKeychainItemRefs. |
+ STLDeleteContainerPairSecondPointers(item_form_pairs.begin(), |
+ item_form_pairs.end()); |
+ for (std::vector<SecKeychainItemRef>::iterator i = keychain_items.begin(); |
+ i != keychain_items.end(); ++i) { |
+ keychain.Free(*i); |
+ } |
return merged_forms; |
} |
@@ -502,7 +565,8 @@ PasswordForm* MacKeychainPasswordFormAdapter::PasswordExactlyMatchingForm( |
PasswordForm* form = new PasswordForm(); |
internal_keychain_helpers::FillPasswordFormFromKeychainItem(*keychain_, |
keychain_item, |
- form); |
+ form, |
+ true); |
keychain_->Free(keychain_item); |
return form; |
} |
@@ -523,8 +587,8 @@ bool MacKeychainPasswordFormAdapter::HasPasswordsMergeableWithForm( |
return !matches.empty(); |
} |
-std::vector<PasswordForm*> |
- MacKeychainPasswordFormAdapter::GetAllPasswordFormPasswords() { |
+std::vector<SecKeychainItemRef> |
+ MacKeychainPasswordFormAdapter::GetAllPasswordFormKeychainItems() { |
SecAuthenticationType supported_auth_types[] = { |
kSecAuthenticationTypeHTMLForm, |
kSecAuthenticationTypeHTTPBasic, |
@@ -538,8 +602,13 @@ std::vector<PasswordForm*> |
NULL, NULL, NULL, CreatorCodeForSearch()); |
keychain_search.FindMatchingItems(&matches); |
} |
+ return matches; |
+} |
- return ConvertKeychainItemsToForms(&matches); |
+std::vector<PasswordForm*> |
+ MacKeychainPasswordFormAdapter::GetAllPasswordFormPasswords() { |
+ std::vector<SecKeychainItemRef> items = GetAllPasswordFormKeychainItems(); |
+ return ConvertKeychainItemsToForms(&items); |
} |
bool MacKeychainPasswordFormAdapter::AddPassword(const PasswordForm& form) { |
@@ -607,8 +676,8 @@ std::vector<PasswordForm*> |
for (std::vector<SecKeychainItemRef>::const_iterator i = items->begin(); |
i != items->end(); ++i) { |
PasswordForm* form = new PasswordForm(); |
- if (internal_keychain_helpers::FillPasswordFormFromKeychainItem(*keychain_, |
- *i, form)) { |
+ if (internal_keychain_helpers::FillPasswordFormFromKeychainItem( |
+ *keychain_, *i, form, true)) { |
keychain_forms.push_back(form); |
} |
keychain_->Free(*i); |