OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/chromeos/login/extended_authenticator.h" | |
6 | |
7 #include "base/bind.h" | |
8 #include "base/strings/string_number_conversions.h" | |
9 #include "base/strings/string_util.h" | |
10 #include "chrome/browser/chromeos/boot_times_loader.h" | |
11 #include "chrome/browser/chromeos/login/login_status_consumer.h" | |
12 #include "chrome/browser/chromeos/login/parallel_authenticator.h" | |
13 #include "chromeos/cryptohome/async_method_caller.h" | |
14 #include "chromeos/cryptohome/cryptohome_parameters.h" | |
15 #include "chromeos/cryptohome/homedir_methods.h" | |
16 #include "chromeos/cryptohome/system_salt_getter.h" | |
17 #include "chromeos/dbus/cryptohome_client.h" | |
18 #include "chromeos/dbus/dbus_thread_manager.h" | |
19 #include "content/public/browser/browser_thread.h" | |
20 #include "crypto/sha2.h" | |
21 #include "google_apis/gaia/gaia_auth_util.h" | |
22 #include "third_party/cros_system_api/dbus/service_constants.h" | |
23 | |
24 using content::BrowserThread; | |
25 | |
26 namespace chromeos { | |
27 | |
28 namespace { | |
29 | |
30 void RecordStartMarker(const std::string& marker) { | |
31 std::string full_marker = "Cryptohome-"; | |
32 full_marker.append(marker); | |
33 full_marker.append("-Start"); | |
34 chromeos::BootTimesLoader::Get()->AddLoginTimeMarker(full_marker, false); | |
35 } | |
36 | |
37 void RecordEndMarker(const std::string& marker) { | |
38 std::string full_marker = "Cryptohome-"; | |
39 full_marker.append(marker); | |
40 full_marker.append("-End"); | |
41 chromeos::BootTimesLoader::Get()->AddLoginTimeMarker(full_marker, false); | |
42 } | |
43 | |
44 } // namespace | |
45 | |
46 ExtendedAuthenticator::ExtendedAuthenticator(AuthStatusConsumer* consumer) | |
47 : salt_obtained_(false), consumer_(consumer), old_consumer_(NULL) { | |
48 SystemSaltGetter::Get()->GetSystemSalt( | |
49 base::Bind(&ExtendedAuthenticator::OnSaltObtained, this)); | |
50 } | |
51 | |
52 ExtendedAuthenticator::ExtendedAuthenticator(LoginStatusConsumer* consumer) | |
53 : salt_obtained_(false), consumer_(NULL), old_consumer_(consumer) { | |
54 SystemSaltGetter::Get()->GetSystemSalt( | |
55 base::Bind(&ExtendedAuthenticator::OnSaltObtained, this)); | |
56 } | |
57 | |
58 ExtendedAuthenticator::~ExtendedAuthenticator() {} | |
59 | |
60 void ExtendedAuthenticator::SetConsumer(LoginStatusConsumer* consumer) { | |
61 old_consumer_ = consumer; | |
62 } | |
63 | |
64 void ExtendedAuthenticator::OnSaltObtained(const std::string& system_salt) { | |
65 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
66 | |
67 salt_obtained_ = true; | |
68 system_salt_ = system_salt; | |
69 for (size_t i = 0; i < hashing_queue_.size(); i++) { | |
70 hashing_queue_[i].Run(system_salt); | |
71 } | |
72 hashing_queue_.clear(); | |
73 } | |
74 | |
75 void ExtendedAuthenticator::AuthenticateToMount( | |
76 const UserContext& context, | |
77 const HashSuccessCallback& success_callback) { | |
78 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
79 TransformContext(context, | |
80 base::Bind(&ExtendedAuthenticator::DoAuthenticateToMount, | |
81 this, | |
82 success_callback)); | |
83 } | |
84 | |
85 void ExtendedAuthenticator::AuthenticateToCheck( | |
86 const UserContext& context, | |
87 const base::Closure& success_callback) { | |
88 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
89 | |
90 TransformContext(context, | |
91 base::Bind(&ExtendedAuthenticator::DoAuthenticateToCheck, | |
92 this, | |
93 success_callback)); | |
94 } | |
95 | |
96 void ExtendedAuthenticator::CreateMount( | |
97 const std::string& user_id, | |
98 const std::vector<cryptohome::KeyDefinition>& keys, | |
99 const HashSuccessCallback& success_callback) { | |
100 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
101 | |
102 RecordStartMarker("MountEx"); | |
103 | |
104 std::string canonicalized = gaia::CanonicalizeEmail(user_id); | |
105 cryptohome::Identification id(canonicalized); | |
106 cryptohome::Authorization auth(keys.front()); | |
107 cryptohome::MountParameters mount(false); | |
108 for (size_t i = 0; i < keys.size(); i++) { | |
109 mount.create_keys.push_back(keys[i]); | |
110 } | |
111 UserContext context(user_id, keys.front().key, std::string()); | |
112 context.SetKeyLabel(keys.front().label); | |
113 | |
114 cryptohome::HomedirMethods::GetInstance()->MountEx( | |
115 id, | |
116 auth, | |
117 mount, | |
118 base::Bind(&ExtendedAuthenticator::OnMountComplete, | |
119 this, | |
120 "MountEx", | |
121 context, | |
122 success_callback)); | |
123 } | |
124 | |
125 void ExtendedAuthenticator::AddKey(const UserContext& context, | |
126 const cryptohome::KeyDefinition& key, | |
127 bool replace_existing, | |
128 const base::Closure& success_callback) { | |
129 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
130 TransformContext(context, | |
131 base::Bind(&ExtendedAuthenticator::DoAddKey, | |
132 this, | |
133 key, | |
134 replace_existing, | |
135 success_callback)); | |
136 } | |
137 | |
138 void ExtendedAuthenticator::UpdateKeyAuthorized( | |
139 const UserContext& context, | |
140 const cryptohome::KeyDefinition& key, | |
141 const std::string& signature, | |
142 const base::Closure& success_callback) { | |
143 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
144 TransformContext(context, | |
145 base::Bind(&ExtendedAuthenticator::DoUpdateKeyAuthorized, | |
146 this, | |
147 key, | |
148 signature, | |
149 success_callback)); | |
150 } | |
151 | |
152 void ExtendedAuthenticator::RemoveKey(const UserContext& context, | |
153 const std::string& key_to_remove, | |
154 const base::Closure& success_callback) { | |
155 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
156 TransformContext(context, | |
157 base::Bind(&ExtendedAuthenticator::DoRemoveKey, | |
158 this, | |
159 key_to_remove, | |
160 success_callback)); | |
161 } | |
162 | |
163 void ExtendedAuthenticator::DoAuthenticateToMount( | |
164 const HashSuccessCallback& success_callback, | |
165 const UserContext& user_context) { | |
166 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
167 | |
168 RecordStartMarker("MountEx"); | |
169 | |
170 std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID()); | |
171 cryptohome::Identification id(canonicalized); | |
172 cryptohome::Authorization auth(user_context.GetPassword(), | |
173 user_context.GetKeyLabel()); | |
174 cryptohome::MountParameters mount(false); | |
175 | |
176 cryptohome::HomedirMethods::GetInstance()->MountEx( | |
177 id, | |
178 auth, | |
179 mount, | |
180 base::Bind(&ExtendedAuthenticator::OnMountComplete, | |
181 this, | |
182 "MountEx", | |
183 user_context, | |
184 success_callback)); | |
185 } | |
186 | |
187 void ExtendedAuthenticator::DoAuthenticateToCheck( | |
188 const base::Closure& success_callback, | |
189 const UserContext& user_context) { | |
190 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
191 | |
192 RecordStartMarker("CheckKeyEx"); | |
193 | |
194 std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID()); | |
195 cryptohome::Identification id(canonicalized); | |
196 cryptohome::Authorization auth(user_context.GetPassword(), | |
197 user_context.GetKeyLabel()); | |
198 | |
199 cryptohome::HomedirMethods::GetInstance()->CheckKeyEx( | |
200 id, | |
201 auth, | |
202 base::Bind(&ExtendedAuthenticator::OnOperationComplete, | |
203 this, | |
204 "CheckKeyEx", | |
205 user_context, | |
206 success_callback)); | |
207 } | |
208 | |
209 void ExtendedAuthenticator::DoAddKey(const cryptohome::KeyDefinition& key, | |
210 bool replace_existing, | |
211 const base::Closure& success_callback, | |
212 const UserContext& user_context) { | |
213 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
214 | |
215 RecordStartMarker("AddKeyEx"); | |
216 | |
217 std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID()); | |
218 cryptohome::Identification id(canonicalized); | |
219 cryptohome::Authorization auth(user_context.GetPassword(), | |
220 user_context.GetKeyLabel()); | |
221 | |
222 cryptohome::HomedirMethods::GetInstance()->AddKeyEx( | |
223 id, | |
224 auth, | |
225 key, | |
226 replace_existing, | |
227 base::Bind(&ExtendedAuthenticator::OnOperationComplete, | |
228 this, | |
229 "AddKeyEx", | |
230 user_context, | |
231 success_callback)); | |
232 } | |
233 | |
234 void ExtendedAuthenticator::DoUpdateKeyAuthorized( | |
235 const cryptohome::KeyDefinition& key, | |
236 const std::string& signature, | |
237 const base::Closure& success_callback, | |
238 const UserContext& user_context) { | |
239 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
240 RecordStartMarker("UpdateKeyAuthorized"); | |
241 | |
242 std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID()); | |
243 cryptohome::Identification id(canonicalized); | |
244 cryptohome::Authorization auth(user_context.GetPassword(), | |
245 user_context.GetKeyLabel()); | |
246 | |
247 cryptohome::HomedirMethods::GetInstance()->UpdateKeyEx( | |
248 id, | |
249 auth, | |
250 key, | |
251 signature, | |
252 base::Bind(&ExtendedAuthenticator::OnOperationComplete, | |
253 this, | |
254 "UpdateKeyAuthorized", | |
255 user_context, | |
256 success_callback)); | |
257 } | |
258 | |
259 void ExtendedAuthenticator::DoRemoveKey(const std::string& key_to_remove, | |
260 const base::Closure& success_callback, | |
261 const UserContext& user_context) { | |
262 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
263 | |
264 RecordStartMarker("RemoveKeyEx"); | |
265 | |
266 std::string canonicalized = gaia::CanonicalizeEmail(user_context.GetUserID()); | |
267 cryptohome::Identification id(canonicalized); | |
268 cryptohome::Authorization auth(user_context.GetPassword(), | |
269 user_context.GetKeyLabel()); | |
270 | |
271 cryptohome::HomedirMethods::GetInstance()->RemoveKeyEx( | |
272 id, | |
273 auth, | |
274 key_to_remove, | |
275 base::Bind(&ExtendedAuthenticator::OnOperationComplete, | |
276 this, | |
277 "RemoveKeyEx", | |
278 user_context, | |
279 success_callback)); | |
280 } | |
281 | |
282 void ExtendedAuthenticator::OnMountComplete( | |
283 const std::string& time_marker, | |
284 const UserContext& user_context, | |
285 const HashSuccessCallback& success_callback, | |
286 bool success, | |
287 cryptohome::MountError return_code, | |
288 const std::string& mount_hash) { | |
289 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
290 | |
291 RecordEndMarker(time_marker); | |
292 UserContext copy; | |
293 copy.CopyFrom(user_context); | |
294 copy.SetUserIDHash(mount_hash); | |
295 if (return_code == cryptohome::MOUNT_ERROR_NONE) { | |
296 if (!success_callback.is_null()) | |
297 success_callback.Run(mount_hash); | |
298 if (old_consumer_) | |
299 old_consumer_->OnLoginSuccess(copy); | |
300 return; | |
301 } | |
302 AuthState state = FAILED_MOUNT; | |
303 if (return_code == cryptohome::MOUNT_ERROR_TPM_COMM_ERROR || | |
304 return_code == cryptohome::MOUNT_ERROR_TPM_DEFEND_LOCK || | |
305 return_code == cryptohome::MOUNT_ERROR_TPM_NEEDS_REBOOT) { | |
306 state = FAILED_TPM; | |
307 } | |
308 if (return_code == cryptohome::MOUNT_ERROR_USER_DOES_NOT_EXIST) { | |
309 state = NO_MOUNT; | |
310 } | |
311 if (consumer_) | |
312 consumer_->OnAuthenticationFailure(state); | |
313 if (old_consumer_) { | |
314 LoginFailure failure(LoginFailure::COULD_NOT_MOUNT_CRYPTOHOME); | |
315 old_consumer_->OnLoginFailure(failure); | |
316 } | |
317 } | |
318 | |
319 void ExtendedAuthenticator::OnOperationComplete( | |
320 const std::string& time_marker, | |
321 const UserContext& user_context, | |
322 const base::Closure& success_callback, | |
323 bool success, | |
324 cryptohome::MountError return_code) { | |
325 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
326 | |
327 RecordEndMarker(time_marker); | |
328 if (return_code == cryptohome::MOUNT_ERROR_NONE) { | |
329 if (!success_callback.is_null()) | |
330 success_callback.Run(); | |
331 if (old_consumer_) | |
332 old_consumer_->OnLoginSuccess(user_context); | |
333 return; | |
334 } | |
335 | |
336 AuthState state = FAILED_MOUNT; | |
337 | |
338 if (return_code == cryptohome::MOUNT_ERROR_TPM_COMM_ERROR || | |
339 return_code == cryptohome::MOUNT_ERROR_TPM_DEFEND_LOCK || | |
340 return_code == cryptohome::MOUNT_ERROR_TPM_NEEDS_REBOOT) { | |
341 state = FAILED_TPM; | |
342 } | |
343 | |
344 if (return_code == cryptohome::MOUNT_ERROR_USER_DOES_NOT_EXIST) | |
345 state = NO_MOUNT; | |
346 | |
347 if (consumer_) | |
348 consumer_->OnAuthenticationFailure(state); | |
349 | |
350 if (old_consumer_) { | |
351 LoginFailure failure(LoginFailure::UNLOCK_FAILED); | |
352 old_consumer_->OnLoginFailure(failure); | |
353 } | |
354 } | |
355 | |
356 void ExtendedAuthenticator::HashPasswordWithSalt( | |
357 const std::string& password, | |
358 const HashSuccessCallback& success_callback) { | |
359 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
360 DCHECK(consumer_) << "This is a part of new API"; | |
361 | |
362 DoHashWithSalt(password, success_callback, system_salt_); | |
363 } | |
364 | |
365 void ExtendedAuthenticator::TransformContext(const UserContext& user_context, | |
366 const ContextCallback& callback) { | |
367 if (!user_context.DoesNeedPasswordHashing()) { | |
368 callback.Run(user_context); | |
369 } else { | |
370 DoHashWithSalt(user_context.GetPassword(), | |
371 base::Bind(&ExtendedAuthenticator::DidTransformContext, | |
372 this, | |
373 user_context, | |
374 callback), | |
375 system_salt_); | |
376 } | |
377 } | |
378 | |
379 void ExtendedAuthenticator::DidTransformContext( | |
380 const UserContext& user_context, | |
381 const ContextCallback& callback, | |
382 const std::string& hashed_password) { | |
383 DCHECK(user_context.DoesNeedPasswordHashing()); | |
384 UserContext context; | |
385 context.CopyFrom(user_context); | |
386 context.SetPassword(hashed_password); | |
387 context.SetDoesNeedPasswordHashing(false); | |
388 callback.Run(context); | |
389 } | |
390 | |
391 void ExtendedAuthenticator::DoHashWithSalt(const std::string& password, | |
392 const HashSuccessCallback& callback, | |
393 const std::string& system_salt) { | |
394 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
395 | |
396 if (salt_obtained_) { | |
397 std::string hash = | |
398 ParallelAuthenticator::HashPassword(password, system_salt); | |
399 callback.Run(hash); | |
400 return; | |
401 } | |
402 hashing_queue_.push_back(base::Bind( | |
403 &ExtendedAuthenticator::DoHashWithSalt, this, password, callback)); | |
404 } | |
405 | |
406 } // namespace chromeos | |
OLD | NEW |