OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/chromeos/login/managed/managed_user_authenticator.h" | |
6 | |
7 #include "base/bind.h" | |
8 #include "base/strings/string_number_conversions.h" | |
9 #include "base/strings/string_util.h" | |
10 #include "chrome/browser/chromeos/boot_times_loader.h" | |
11 #include "chromeos/cryptohome/async_method_caller.h" | |
12 #include "chromeos/cryptohome/cryptohome_parameters.h" | |
13 #include "chromeos/cryptohome/system_salt_getter.h" | |
14 #include "chromeos/dbus/cryptohome_client.h" | |
15 #include "chromeos/dbus/dbus_thread_manager.h" | |
16 #include "chromeos/login/auth/key.h" | |
17 #include "content/public/browser/browser_thread.h" | |
18 #include "crypto/sha2.h" | |
19 #include "google_apis/gaia/gaia_auth_util.h" | |
20 #include "third_party/cros_system_api/dbus/service_constants.h" | |
21 | |
22 using content::BrowserThread; | |
23 | |
24 namespace chromeos { | |
25 | |
26 namespace { | |
27 | |
28 // Records status and calls resolver->Resolve(). | |
29 void TriggerResolve(ManagedUserAuthenticator::AuthAttempt* attempt, | |
30 scoped_refptr<ManagedUserAuthenticator> resolver, | |
31 bool success, | |
32 cryptohome::MountError return_code) { | |
33 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
34 attempt->RecordCryptohomeStatus(success, return_code); | |
35 resolver->Resolve(); | |
36 } | |
37 | |
38 // Records status and calls resolver->Resolve(). | |
39 void TriggerResolveResult(ManagedUserAuthenticator::AuthAttempt* attempt, | |
40 scoped_refptr<ManagedUserAuthenticator> resolver, | |
41 bool success, | |
42 const std::string& result) { | |
43 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
44 attempt->RecordHash(result); | |
45 resolver->Resolve(); | |
46 } | |
47 | |
48 // Calls TriggerResolve while adding login time marker. | |
49 void TriggerResolveWithLoginTimeMarker( | |
50 const std::string& marker_name, | |
51 ManagedUserAuthenticator::AuthAttempt* attempt, | |
52 scoped_refptr<ManagedUserAuthenticator> resolver, | |
53 bool success, | |
54 cryptohome::MountError return_code) { | |
55 chromeos::BootTimesLoader::Get()->AddLoginTimeMarker(marker_name, false); | |
56 TriggerResolve(attempt, resolver, success, return_code); | |
57 } | |
58 | |
59 // Calls cryptohome's mount method. | |
60 void Mount(ManagedUserAuthenticator::AuthAttempt* attempt, | |
61 scoped_refptr<ManagedUserAuthenticator> resolver, | |
62 int flags, | |
63 const std::string& system_salt) { | |
64 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
65 chromeos::BootTimesLoader::Get()->AddLoginTimeMarker( | |
66 "CryptohomeMount-LMU-Start", false); | |
67 | |
68 Key key(attempt->password); | |
69 key.Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt); | |
70 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMount( | |
71 attempt->username, | |
72 key.GetSecret(), | |
73 flags, | |
74 base::Bind(&TriggerResolveWithLoginTimeMarker, | |
75 "CryptohomeMount-LMU-End", | |
76 attempt, | |
77 resolver)); | |
78 | |
79 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( | |
80 attempt->username, | |
81 base::Bind(&TriggerResolveResult, attempt, resolver)); | |
82 } | |
83 | |
84 // Calls cryptohome's addKey method. | |
85 void AddKey(ManagedUserAuthenticator::AuthAttempt* attempt, | |
86 scoped_refptr<ManagedUserAuthenticator> resolver, | |
87 const std::string& plain_text_master_key, | |
88 const std::string& system_salt) { | |
89 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
90 chromeos::BootTimesLoader::Get()->AddLoginTimeMarker( | |
91 "CryptohomeAddKey-LMU-Start", false); | |
92 | |
93 Key user_key(attempt->password); | |
94 user_key.Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt); | |
95 Key master_key(plain_text_master_key); | |
96 master_key.Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt); | |
97 cryptohome::AsyncMethodCaller::GetInstance()->AsyncAddKey( | |
98 attempt->username, | |
99 user_key.GetSecret(), | |
100 master_key.GetSecret(), | |
101 base::Bind(&TriggerResolveWithLoginTimeMarker, | |
102 "CryptohomeAddKey-LMU-End", | |
103 attempt, | |
104 resolver)); | |
105 } | |
106 | |
107 } // namespace | |
108 | |
109 ManagedUserAuthenticator::ManagedUserAuthenticator(AuthStatusConsumer* consumer) | |
110 : consumer_(consumer) {} | |
111 | |
112 void ManagedUserAuthenticator::AuthenticateToMount( | |
113 const std::string& username, | |
114 const std::string& password) { | |
115 std::string canonicalized = gaia::CanonicalizeEmail(username); | |
116 | |
117 current_state_.reset(new ManagedUserAuthenticator::AuthAttempt( | |
118 canonicalized, password, false)); | |
119 | |
120 SystemSaltGetter::Get()->GetSystemSalt( | |
121 base::Bind(&Mount, | |
122 current_state_.get(), | |
123 scoped_refptr<ManagedUserAuthenticator>(this), | |
124 cryptohome::MOUNT_FLAGS_NONE)); | |
125 } | |
126 | |
127 void ManagedUserAuthenticator::AuthenticateToCreate( | |
128 const std::string& username, | |
129 const std::string& password) { | |
130 std::string canonicalized = gaia::CanonicalizeEmail(username); | |
131 | |
132 current_state_.reset(new ManagedUserAuthenticator::AuthAttempt( | |
133 canonicalized, password, false)); | |
134 | |
135 SystemSaltGetter::Get()->GetSystemSalt( | |
136 base::Bind(&Mount, | |
137 current_state_.get(), | |
138 scoped_refptr<ManagedUserAuthenticator>(this), | |
139 cryptohome::CREATE_IF_MISSING)); | |
140 } | |
141 | |
142 void ManagedUserAuthenticator::AddMasterKey( | |
143 const std::string& username, | |
144 const std::string& password, | |
145 const std::string& master_key) { | |
146 std::string canonicalized = gaia::CanonicalizeEmail(username); | |
147 | |
148 current_state_.reset(new ManagedUserAuthenticator::AuthAttempt( | |
149 canonicalized, password, true)); | |
150 | |
151 SystemSaltGetter::Get()->GetSystemSalt( | |
152 base::Bind(&AddKey, | |
153 current_state_.get(), | |
154 scoped_refptr<ManagedUserAuthenticator>(this), | |
155 master_key)); | |
156 } | |
157 | |
158 void ManagedUserAuthenticator::OnAuthenticationSuccess( | |
159 const std::string& mount_hash, | |
160 bool add_key) { | |
161 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
162 VLOG(1) << "Locally managed user authentication success"; | |
163 if (consumer_) { | |
164 if (add_key) | |
165 consumer_->OnAddKeySuccess(); | |
166 else | |
167 consumer_->OnMountSuccess(mount_hash); | |
168 } | |
169 } | |
170 | |
171 void ManagedUserAuthenticator::OnAuthenticationFailure( | |
172 ManagedUserAuthenticator::AuthState state) { | |
173 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
174 LOG(WARNING) << "Locally managed user authentication failure"; | |
175 if (consumer_) | |
176 consumer_->OnAuthenticationFailure(state); | |
177 } | |
178 | |
179 void ManagedUserAuthenticator::Resolve() { | |
180 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
181 ManagedUserAuthenticator::AuthState state = ResolveState(); | |
182 VLOG(1) << "Resolved state to: " << state; | |
183 switch (state) { | |
184 case CONTINUE: | |
185 // These are intermediate states; we need more info from a request that | |
186 // is still pending. | |
187 break; | |
188 case FAILED_MOUNT: | |
189 // In this case, whether login succeeded or not, we can't log | |
190 // the user in because their data is horked. So, override with | |
191 // the appropriate failure. | |
192 BrowserThread::PostTask( | |
193 BrowserThread::UI, | |
194 FROM_HERE, | |
195 base::Bind( | |
196 &ManagedUserAuthenticator::OnAuthenticationFailure, this, state)); | |
197 break; | |
198 case NO_MOUNT: | |
199 // In this case, whether login succeeded or not, we can't log | |
200 // the user in because no data exist. So, override with | |
201 // the appropriate failure. | |
202 BrowserThread::PostTask( | |
203 BrowserThread::UI, | |
204 FROM_HERE, | |
205 base::Bind( | |
206 &ManagedUserAuthenticator::OnAuthenticationFailure, this, state)); | |
207 break; | |
208 case FAILED_TPM: | |
209 // In this case, we tried to create/mount cryptohome and failed | |
210 // because of the critical TPM error. | |
211 // Chrome will notify user and request reboot. | |
212 BrowserThread::PostTask( | |
213 BrowserThread::UI, | |
214 FROM_HERE, | |
215 base::Bind( | |
216 &ManagedUserAuthenticator::OnAuthenticationFailure, this, state)); | |
217 break; | |
218 case SUCCESS: | |
219 VLOG(2) << "Locally managed user login"; | |
220 BrowserThread::PostTask( | |
221 BrowserThread::UI, | |
222 FROM_HERE, | |
223 base::Bind(&ManagedUserAuthenticator::OnAuthenticationSuccess, | |
224 this, | |
225 current_state_->hash(), | |
226 current_state_->add_key)); | |
227 break; | |
228 default: | |
229 NOTREACHED(); | |
230 break; | |
231 } | |
232 } | |
233 | |
234 ManagedUserAuthenticator::~ManagedUserAuthenticator() {} | |
235 | |
236 ManagedUserAuthenticator::AuthState ManagedUserAuthenticator::ResolveState() { | |
237 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
238 // If we haven't mounted the user's home dir yet, we can't be done. | |
239 // We never get past here if a cryptohome op is still pending. | |
240 // This is an important invariant. | |
241 if (!current_state_->cryptohome_complete()) | |
242 return CONTINUE; | |
243 if (!current_state_->add_key && !current_state_->hash_obtained()) | |
244 return CONTINUE; | |
245 | |
246 AuthState state; | |
247 | |
248 if (current_state_->cryptohome_outcome()) | |
249 state = ResolveCryptohomeSuccessState(); | |
250 else | |
251 state = ResolveCryptohomeFailureState(); | |
252 | |
253 DCHECK(current_state_->cryptohome_complete()); | |
254 DCHECK(current_state_->hash_obtained() || current_state_->add_key); | |
255 return state; | |
256 } | |
257 | |
258 ManagedUserAuthenticator::AuthState | |
259 ManagedUserAuthenticator::ResolveCryptohomeFailureState() { | |
260 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
261 if (current_state_->cryptohome_code() == | |
262 cryptohome::MOUNT_ERROR_TPM_NEEDS_REBOOT) { | |
263 // Critical TPM error detected, reboot needed. | |
264 return FAILED_TPM; | |
265 } | |
266 | |
267 if (current_state_->cryptohome_code() == | |
268 cryptohome::MOUNT_ERROR_USER_DOES_NOT_EXIST) { | |
269 // If we tried a mount but the user did not exist, then we should wait | |
270 // for online login to succeed and try again with the "create" flag set. | |
271 return NO_MOUNT; | |
272 } | |
273 | |
274 return FAILED_MOUNT; | |
275 } | |
276 | |
277 ManagedUserAuthenticator::AuthState | |
278 ManagedUserAuthenticator::ResolveCryptohomeSuccessState() { | |
279 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
280 return SUCCESS; | |
281 } | |
282 | |
283 ManagedUserAuthenticator::AuthAttempt::AuthAttempt(const std::string& username, | |
284 const std::string& password, | |
285 bool add_key_attempt) | |
286 : username(username), | |
287 password(password), | |
288 add_key(add_key_attempt), | |
289 cryptohome_complete_(false), | |
290 cryptohome_outcome_(false), | |
291 hash_obtained_(false), | |
292 cryptohome_code_(cryptohome::MOUNT_ERROR_NONE) {} | |
293 | |
294 ManagedUserAuthenticator::AuthAttempt::~AuthAttempt() {} | |
295 | |
296 void ManagedUserAuthenticator::AuthAttempt::RecordCryptohomeStatus( | |
297 bool cryptohome_outcome, | |
298 cryptohome::MountError cryptohome_code) { | |
299 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
300 cryptohome_complete_ = true; | |
301 cryptohome_outcome_ = cryptohome_outcome; | |
302 cryptohome_code_ = cryptohome_code; | |
303 } | |
304 | |
305 void ManagedUserAuthenticator::AuthAttempt::RecordHash( | |
306 const std::string& hash) { | |
307 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
308 hash_obtained_ = true; | |
309 hash_ = hash; | |
310 } | |
311 | |
312 bool ManagedUserAuthenticator::AuthAttempt::cryptohome_complete() { | |
313 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
314 return cryptohome_complete_; | |
315 } | |
316 | |
317 bool ManagedUserAuthenticator::AuthAttempt::cryptohome_outcome() { | |
318 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
319 return cryptohome_outcome_; | |
320 } | |
321 | |
322 cryptohome::MountError | |
323 ManagedUserAuthenticator::AuthAttempt::cryptohome_code() { | |
324 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
325 return cryptohome_code_; | |
326 } | |
327 | |
328 bool ManagedUserAuthenticator::AuthAttempt::hash_obtained() { | |
329 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
330 return hash_obtained_; | |
331 } | |
332 | |
333 std::string ManagedUserAuthenticator::AuthAttempt::hash() { | |
334 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
335 return hash_; | |
336 } | |
337 | |
338 } // namespace chromeos | |
OLD | NEW |