| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chromeos/attestation/attestation_flow.h" | 5 #include "chromeos/attestation/attestation_flow.h" |
| 6 | 6 |
| 7 #include <utility> | 7 #include <utility> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/memory/ptr_util.h" |
| 11 #include "base/timer/timer.h" |
| 10 #include "chromeos/cryptohome/async_method_caller.h" | 12 #include "chromeos/cryptohome/async_method_caller.h" |
| 11 #include "chromeos/cryptohome/cryptohome_parameters.h" | 13 #include "chromeos/cryptohome/cryptohome_parameters.h" |
| 12 #include "chromeos/dbus/cryptohome_client.h" | 14 #include "chromeos/dbus/cryptohome_client.h" |
| 13 #include "components/signin/core/account_id/account_id.h" | 15 #include "components/signin/core/account_id/account_id.h" |
| 14 | 16 |
| 15 namespace chromeos { | 17 namespace chromeos { |
| 16 namespace attestation { | 18 namespace attestation { |
| 17 | 19 |
| 18 namespace { | 20 namespace { |
| 19 | 21 |
| 22 // Default backoff policy. |
| 23 constexpr net::BackoffEntry::Policy kDefaultBackoffPolicy = { |
| 24 // Number of initial errors (in sequence) to ignore before applying |
| 25 // exponential back-off rules. |
| 26 0, |
| 27 |
| 28 // Initial delay for exponential back-off in ms. |
| 29 2000, |
| 30 |
| 31 // Factor by which the waiting time will be multiplied. |
| 32 2, |
| 33 |
| 34 // Fuzzing percentage. ex: 10% will spread requests randomly |
| 35 // between 90%-100% of the calculated time. |
| 36 0, |
| 37 |
| 38 // Maximum amount of time we are willing to delay our request in ms. |
| 39 -1, |
| 40 |
| 41 // Time to keep an entry from being discarded even when it |
| 42 // has no significant state, -1 to never discard. |
| 43 -1, |
| 44 |
| 45 // Don't use initial delay unless the last request was an error. |
| 46 false, |
| 47 }; |
| 48 |
| 20 // Redirects to one of three callbacks based on a boolean value and dbus call | 49 // Redirects to one of three callbacks based on a boolean value and dbus call |
| 21 // status. | 50 // status. |
| 22 // | 51 // |
| 23 // Parameters | 52 // Parameters |
| 24 // on_true - Called when status=succes and value=true. | 53 // on_true - Called when status=succes and value=true. |
| 25 // on_false - Called when status=success and value=false. | 54 // on_false - Called when status=success and value=false. |
| 26 // on_fail - Called when status=failure. | 55 // on_fail - Called when status=failure. |
| 27 // status - The D-Bus operation status. | 56 // status - The D-Bus operation status. |
| 28 // value - The value returned by the D-Bus operation. | 57 // value - The value returned by the D-Bus operation. |
| 29 void DBusBoolRedirectCallback(const base::Closure& on_true, | 58 void DBusBoolRedirectCallback(const base::Closure& on_true, |
| 30 const base::Closure& on_false, | 59 const base::Closure& on_false, |
| 31 const base::Closure& on_fail, | 60 const base::Closure& on_fail, |
| 61 const std::string& on_fail_message, |
| 32 DBusMethodCallStatus status, | 62 DBusMethodCallStatus status, |
| 33 bool value) { | 63 bool value) { |
| 34 if (status != DBUS_METHOD_CALL_SUCCESS) { | 64 if (status != DBUS_METHOD_CALL_SUCCESS) { |
| 35 LOG(ERROR) << "Attestation: Failed to query enrollment state."; | 65 LOG(ERROR) << "Attestation: Failed to " << on_fail_message << "."; |
| 36 if (!on_fail.is_null()) | 66 if (!on_fail.is_null()) |
| 37 on_fail.Run(); | 67 on_fail.Run(); |
| 38 return; | 68 return; |
| 39 } | 69 } |
| 40 const base::Closure& task = value ? on_true : on_false; | 70 const base::Closure& task = value ? on_true : on_false; |
| 41 if (!task.is_null()) | 71 if (!task.is_null()) |
| 42 task.Run(); | 72 task.Run(); |
| 43 } | 73 } |
| 44 | 74 |
| 45 void DBusDataMethodCallback( | 75 void DBusDataMethodCallback( |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 84 return kEnterpriseUserKey; | 114 return kEnterpriseUserKey; |
| 85 case PROFILE_CONTENT_PROTECTION_CERTIFICATE: | 115 case PROFILE_CONTENT_PROTECTION_CERTIFICATE: |
| 86 return std::string(kContentProtectionKeyPrefix) + request_origin; | 116 return std::string(kContentProtectionKeyPrefix) + request_origin; |
| 87 } | 117 } |
| 88 NOTREACHED(); | 118 NOTREACHED(); |
| 89 return ""; | 119 return ""; |
| 90 } | 120 } |
| 91 | 121 |
| 92 AttestationFlow::AttestationFlow(cryptohome::AsyncMethodCaller* async_caller, | 122 AttestationFlow::AttestationFlow(cryptohome::AsyncMethodCaller* async_caller, |
| 93 CryptohomeClient* cryptohome_client, | 123 CryptohomeClient* cryptohome_client, |
| 94 std::unique_ptr<ServerProxy> server_proxy) | 124 std::unique_ptr<ServerProxy> server_proxy, |
| 125 base::TimeDelta preparedness_timeout) |
| 95 : async_caller_(async_caller), | 126 : async_caller_(async_caller), |
| 96 cryptohome_client_(cryptohome_client), | 127 cryptohome_client_(cryptohome_client), |
| 97 server_proxy_(std::move(server_proxy)), | 128 server_proxy_(std::move(server_proxy)), |
| 129 preparedness_timeout_(preparedness_timeout), |
| 130 retry_timer_(new base::OneShotTimer()), |
| 131 retry_backoff_(&kDefaultBackoffPolicy), |
| 98 weak_factory_(this) {} | 132 weak_factory_(this) {} |
| 99 | 133 |
| 100 AttestationFlow::~AttestationFlow() { | 134 AttestationFlow::~AttestationFlow() { |
| 101 } | 135 } |
| 102 | 136 |
| 103 void AttestationFlow::GetCertificate( | 137 void AttestationFlow::GetCertificate( |
| 104 AttestationCertificateProfile certificate_profile, | 138 AttestationCertificateProfile certificate_profile, |
| 105 const AccountId& account_id, | 139 const AccountId& account_id, |
| 106 const std::string& request_origin, | 140 const std::string& request_origin, |
| 107 bool force_new_key, | 141 bool force_new_key, |
| 108 const CertificateCallback& callback) { | 142 const CertificateCallback& callback) { |
| 143 // Fail requests if we are backing off right now. |
| 144 if (retry_backoff_.ShouldRejectRequest()) { |
| 145 if (!callback.is_null()) |
| 146 callback.Run(false, ""); |
| 147 return; |
| 148 } |
| 109 // If this device has not enrolled with the Privacy CA, we need to do that | 149 // If this device has not enrolled with the Privacy CA, we need to do that |
| 110 // first. Once enrolled we can proceed with the certificate request. | 150 // first. Once enrolled we can proceed with the certificate request. |
| 111 base::Closure do_cert_request = base::Bind( | 151 base::Closure do_cert_request = base::Bind( |
| 112 &AttestationFlow::StartCertificateRequest, weak_factory_.GetWeakPtr(), | 152 &AttestationFlow::StartCertificateRequest, weak_factory_.GetWeakPtr(), |
| 113 certificate_profile, account_id, request_origin, force_new_key, callback); | 153 certificate_profile, account_id, request_origin, force_new_key, callback); |
| 114 base::Closure on_enroll_failure = base::Bind(callback, false, ""); | 154 base::Closure on_enroll_failure = base::Bind(callback, false, ""); |
| 115 base::Closure do_enroll = base::Bind(&AttestationFlow::StartEnroll, | 155 base::Closure initiate_enroll = |
| 116 weak_factory_.GetWeakPtr(), | 156 base::Bind(&AttestationFlow::InitiateEnroll, weak_factory_.GetWeakPtr(), |
| 117 on_enroll_failure, | 157 on_enroll_failure, do_cert_request); |
| 118 do_cert_request); | 158 cryptohome_client_->TpmAttestationIsEnrolled( |
| 119 cryptohome_client_->TpmAttestationIsEnrolled(base::Bind( | 159 base::Bind(&DBusBoolRedirectCallback, |
| 120 &DBusBoolRedirectCallback, | 160 do_cert_request, // If enrolled, proceed with cert request. |
| 121 do_cert_request, // If enrolled, proceed with cert request. | 161 initiate_enroll, // If not enrolled, initiate enrollment. |
| 122 do_enroll, // If not enrolled, initiate enrollment. | 162 on_enroll_failure, "check enrollment state")); |
| 123 on_enroll_failure)); | 163 } |
| 164 |
| 165 void AttestationFlow::SetRetryTimerForTest( |
| 166 std::unique_ptr<base::OneShotTimer> retry_timer) { |
| 167 retry_timer_ = std::move(retry_timer); |
| 168 } |
| 169 |
| 170 void AttestationFlow::InitiateEnroll(const base::Closure& on_failure, |
| 171 const base::Closure& next_task) { |
| 172 base::Closure do_enroll = |
| 173 base::Bind(&AttestationFlow::StartEnroll, weak_factory_.GetWeakPtr(), |
| 174 on_failure, next_task); |
| 175 base::Closure retry_initiate_enroll = |
| 176 base::Bind(&AttestationFlow::RetryInitiateEnroll, |
| 177 weak_factory_.GetWeakPtr(), on_failure, next_task); |
| 178 cryptohome_client_->TpmAttestationIsPrepared( |
| 179 base::Bind(&DBusBoolRedirectCallback, do_enroll, retry_initiate_enroll, |
| 180 on_failure, "check for attestation readiness")); |
| 181 } |
| 182 |
| 183 void AttestationFlow::RetryInitiateEnroll(const base::Closure& on_failure, |
| 184 const base::Closure& next_task) { |
| 185 auto retry_delay = retry_backoff_.GetTimeUntilRelease(); |
| 186 if (retry_delay > preparedness_timeout_) { |
| 187 LOG(ERROR) << "Attestation: not ready for attestation." |
| 188 << " Giving up on retrying."; |
| 189 if (!on_failure.is_null()) |
| 190 on_failure.Run(); |
| 191 } else { |
| 192 preparedness_timeout_ -= retry_delay; |
| 193 retry_backoff_.InformOfRequest(false); |
| 194 LOG(WARNING) << "Attestation: not ready for attestation yet." |
| 195 << " Retrying in " << retry_delay << " ms."; |
| 196 retry_timer_->Start( |
| 197 FROM_HERE, retry_delay, |
| 198 base::Bind(&AttestationFlow::InitiateEnroll, weak_factory_.GetWeakPtr(), |
| 199 on_failure, next_task)); |
| 200 } |
| 124 } | 201 } |
| 125 | 202 |
| 126 void AttestationFlow::StartEnroll(const base::Closure& on_failure, | 203 void AttestationFlow::StartEnroll(const base::Closure& on_failure, |
| 127 const base::Closure& next_task) { | 204 const base::Closure& next_task) { |
| 205 // We are done retrying the enrollment initiation (i.e. TPM is ready). |
| 206 retry_backoff_.Reset(); |
| 128 // Get the attestation service to create a Privacy CA enrollment request. | 207 // Get the attestation service to create a Privacy CA enrollment request. |
| 129 async_caller_->AsyncTpmAttestationCreateEnrollRequest( | 208 async_caller_->AsyncTpmAttestationCreateEnrollRequest( |
| 130 server_proxy_->GetType(), | 209 server_proxy_->GetType(), |
| 131 base::Bind(&AttestationFlow::SendEnrollRequestToPCA, | 210 base::Bind(&AttestationFlow::SendEnrollRequestToPCA, |
| 132 weak_factory_.GetWeakPtr(), | 211 weak_factory_.GetWeakPtr(), |
| 133 on_failure, | 212 on_failure, |
| 134 next_task)); | 213 next_task)); |
| 135 } | 214 } |
| 136 | 215 |
| 137 void AttestationFlow::SendEnrollRequestToPCA(const base::Closure& on_failure, | 216 void AttestationFlow::SendEnrollRequestToPCA(const base::Closure& on_failure, |
| (...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 215 &AttestationFlow::GetExistingCertificate, weak_factory_.GetWeakPtr(), | 294 &AttestationFlow::GetExistingCertificate, weak_factory_.GetWeakPtr(), |
| 216 key_type, account_id, key_name, callback); | 295 key_type, account_id, key_name, callback); |
| 217 // If the key does not exist, call this method back with |generate_new_key| | 296 // If the key does not exist, call this method back with |generate_new_key| |
| 218 // set to true. | 297 // set to true. |
| 219 base::Closure on_key_not_exists = base::Bind( | 298 base::Closure on_key_not_exists = base::Bind( |
| 220 &AttestationFlow::StartCertificateRequest, weak_factory_.GetWeakPtr(), | 299 &AttestationFlow::StartCertificateRequest, weak_factory_.GetWeakPtr(), |
| 221 certificate_profile, account_id, request_origin, true, callback); | 300 certificate_profile, account_id, request_origin, true, callback); |
| 222 cryptohome_client_->TpmAttestationDoesKeyExist( | 301 cryptohome_client_->TpmAttestationDoesKeyExist( |
| 223 key_type, cryptohome::Identification(account_id), key_name, | 302 key_type, cryptohome::Identification(account_id), key_name, |
| 224 base::Bind(&DBusBoolRedirectCallback, on_key_exists, on_key_not_exists, | 303 base::Bind(&DBusBoolRedirectCallback, on_key_exists, on_key_not_exists, |
| 225 base::Bind(callback, false, ""))); | 304 base::Bind(callback, false, ""), |
| 305 "check for existence of attestation key")); |
| 226 } | 306 } |
| 227 } | 307 } |
| 228 | 308 |
| 229 void AttestationFlow::SendCertificateRequestToPCA( | 309 void AttestationFlow::SendCertificateRequestToPCA( |
| 230 AttestationKeyType key_type, | 310 AttestationKeyType key_type, |
| 231 const AccountId& account_id, | 311 const AccountId& account_id, |
| 232 const std::string& key_name, | 312 const std::string& key_name, |
| 233 const CertificateCallback& callback, | 313 const CertificateCallback& callback, |
| 234 bool success, | 314 bool success, |
| 235 const std::string& data) { | 315 const std::string& data) { |
| (...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 278 } | 358 } |
| 279 | 359 |
| 280 ServerProxy::~ServerProxy() {} | 360 ServerProxy::~ServerProxy() {} |
| 281 | 361 |
| 282 PrivacyCAType ServerProxy::GetType() { | 362 PrivacyCAType ServerProxy::GetType() { |
| 283 return DEFAULT_PCA; | 363 return DEFAULT_PCA; |
| 284 } | 364 } |
| 285 | 365 |
| 286 } // namespace attestation | 366 } // namespace attestation |
| 287 } // namespace chromeos | 367 } // namespace chromeos |
| OLD | NEW |