Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_create_keys_oper ation.h" | |
| 6 | |
| 7 #include <string> | |
| 8 | |
| 9 #include "base/base64.h" | |
| 10 #include "base/bind.h" | |
| 11 #include "base/logging.h" | |
| 12 #include "base/memory/scoped_ptr.h" | |
| 13 #include "base/strings/string_util.h" | |
| 14 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.h" | |
| 15 #include "chrome/browser/chromeos/login/easy_unlock/easy_unlock_types.h" | |
| 16 #include "chromeos/cryptohome/homedir_methods.h" | |
| 17 #include "chromeos/dbus/dbus_thread_manager.h" | |
| 18 #include "chromeos/dbus/easy_unlock_client.h" | |
| 19 #include "crypto/encryptor.h" | |
| 20 #include "crypto/random.h" | |
| 21 #include "crypto/symmetric_key.h" | |
| 22 #include "google_apis/gaia/gaia_auth_util.h" | |
| 23 #include "third_party/cros_system_api/dbus/service_constants.h" | |
| 24 | |
| 25 namespace chromeos { | |
| 26 | |
| 27 namespace { | |
| 28 | |
| 29 const int kUserKeyByteSize = 16; | |
| 30 const int kSessionKeyByteSize = 16; | |
| 31 | |
| 32 const int kEasyUnlockKeyRevision = 1; | |
| 33 const int kEasyUnlockKeyPrivileges = | |
| 34 cryptohome::PRIV_MOUNT | cryptohome::PRIV_ADD | cryptohome::PRIV_REMOVE; | |
| 35 | |
| 36 bool WebSafeBase64Decode(const std::string& encoded, std::string* decoded) { | |
| 37 std::string adjusted_encoded = encoded; | |
| 38 base::ReplaceChars(adjusted_encoded, "-", "+", &adjusted_encoded); | |
| 39 base::ReplaceChars(adjusted_encoded, "_", "/", &adjusted_encoded); | |
| 40 | |
| 41 return base::Base64Decode(adjusted_encoded, decoded); | |
| 42 } | |
| 43 | |
| 44 } // namespace | |
| 45 | |
| 46 ///////////////////////////////////////////////////////////////////////////// | |
| 47 // EasyUnlockCreateKeysOperation::ChallengeCreator | |
| 48 | |
| 49 class EasyUnlockCreateKeysOperation::ChallengeCreator { | |
| 50 public: | |
| 51 typedef base::Callback<void (bool success)> ChallengeCreatedCallback; | |
| 52 ChallengeCreator(const std::string& user_key, | |
| 53 const std::string& session_key, | |
| 54 const std::string& tpm_pub_key, | |
| 55 EasyUnlockDeviceKeyData* device, | |
| 56 const ChallengeCreatedCallback& callback); | |
| 57 ~ChallengeCreator(); | |
| 58 | |
| 59 void Start(); | |
| 60 | |
| 61 const std::string& user_key() const { return user_key_; } | |
| 62 | |
| 63 private: | |
| 64 void OnEcKeyPairGenerated(const std::string& ec_public_key, | |
| 65 const std::string& ec_private_key); | |
| 66 void OnEskGenerated(const std::string& esk); | |
| 67 | |
| 68 void GeneratePayload(); | |
| 69 void OnPayloadMessageGenerated(const std::string& payload_message); | |
| 70 void OnPayloadGenerated(const std::string& payload); | |
| 71 | |
| 72 void OnChallengeGenerated(const std::string& challenge); | |
| 73 | |
| 74 const std::string user_key_; | |
| 75 const std::string session_key_; | |
| 76 const std::string tpm_pub_key_; | |
| 77 EasyUnlockDeviceKeyData* device_; | |
| 78 ChallengeCreatedCallback callback_; | |
| 79 | |
| 80 std::string ec_public_key_; | |
| 81 std::string esk_; | |
| 82 | |
| 83 // Owned by DBusThreadManager | |
| 84 chromeos::EasyUnlockClient* easy_unlock_client_; | |
| 85 | |
| 86 base::WeakPtrFactory<ChallengeCreator> weak_ptr_factory_; | |
| 87 | |
| 88 DISALLOW_COPY_AND_ASSIGN(ChallengeCreator); | |
| 89 }; | |
| 90 | |
| 91 EasyUnlockCreateKeysOperation::ChallengeCreator::ChallengeCreator( | |
| 92 const std::string& user_key, | |
| 93 const std::string& session_key, | |
| 94 const std::string& tpm_pub_key, | |
| 95 EasyUnlockDeviceKeyData* device, | |
| 96 const ChallengeCreatedCallback& callback) | |
| 97 : user_key_(user_key), | |
| 98 session_key_(session_key), | |
| 99 tpm_pub_key_(tpm_pub_key), | |
| 100 device_(device), | |
| 101 callback_(callback), | |
| 102 easy_unlock_client_( | |
| 103 chromeos::DBusThreadManager::Get()->GetEasyUnlockClient()), | |
| 104 weak_ptr_factory_(this) { | |
| 105 } | |
| 106 | |
| 107 EasyUnlockCreateKeysOperation::ChallengeCreator::~ChallengeCreator() { | |
| 108 } | |
| 109 | |
| 110 void EasyUnlockCreateKeysOperation::ChallengeCreator::Start() { | |
| 111 easy_unlock_client_->GenerateEcP256KeyPair( | |
| 112 base::Bind(&ChallengeCreator::OnEcKeyPairGenerated, | |
| 113 weak_ptr_factory_.GetWeakPtr())); | |
| 114 } | |
| 115 | |
| 116 void EasyUnlockCreateKeysOperation::ChallengeCreator::OnEcKeyPairGenerated( | |
| 117 const std::string& ec_private_key, | |
| 118 const std::string& ec_public_key) { | |
| 119 if (ec_private_key.empty() || ec_public_key.empty()) { | |
| 120 LOG(ERROR) << "Easy unlock failed to generate ec key pair."; | |
| 121 callback_.Run(false); | |
| 122 return; | |
| 123 } | |
| 124 | |
| 125 std::string device_pub_key; | |
| 126 if (!WebSafeBase64Decode(device_->public_key, &device_pub_key)) { | |
| 127 LOG(ERROR) << "Easy unlock failed to decode device public key."; | |
| 128 callback_.Run(false); | |
| 129 return; | |
| 130 } | |
| 131 | |
| 132 ec_public_key_ = ec_public_key; | |
| 133 easy_unlock_client_->PerformECDHKeyAgreement( | |
| 134 ec_private_key, | |
| 135 device_pub_key, | |
| 136 base::Bind(&ChallengeCreator::OnEskGenerated, | |
| 137 weak_ptr_factory_.GetWeakPtr())); | |
| 138 } | |
| 139 | |
| 140 void EasyUnlockCreateKeysOperation::ChallengeCreator::OnEskGenerated( | |
| 141 const std::string& esk) { | |
| 142 if (esk.empty()) { | |
| 143 LOG(ERROR) << "Easy unlock failed to generate challenge esk."; | |
| 144 callback_.Run(false); | |
| 145 return; | |
| 146 } | |
| 147 | |
| 148 esk_ = esk; | |
| 149 GeneratePayload(); | |
| 150 } | |
| 151 | |
| 152 void EasyUnlockCreateKeysOperation::ChallengeCreator::GeneratePayload() { | |
| 153 // Work around to get HeaderAndBody bytes to use as challenge payload. | |
| 154 easy_unlock_client_->CreateSecureMessage( | |
| 155 session_key_, | |
| 156 esk_, | |
| 157 std::string(), // associated data | |
| 158 std::string(), // public meta | |
| 159 tpm_pub_key_, | |
|
tbarzic
2014/09/09 19:32:21
I think android expect this to be GenericPublicKey
xiyuan
2014/09/09 20:25:30
Yep. Added a TODO to wrap it in GenericPublicKey p
| |
| 160 std::string(), // decryption key id | |
| 161 easy_unlock::kEncryptionTypeAES256CBC, | |
| 162 easy_unlock::kSignatureTypeHMACSHA256, | |
| 163 base::Bind(&ChallengeCreator::OnPayloadMessageGenerated, | |
| 164 weak_ptr_factory_.GetWeakPtr())); | |
| 165 } | |
| 166 | |
| 167 void | |
| 168 EasyUnlockCreateKeysOperation::ChallengeCreator::OnPayloadMessageGenerated( | |
| 169 const std::string& payload_message) { | |
| 170 easy_unlock_client_->UnwrapSecureMessage( | |
| 171 payload_message, | |
| 172 esk_, | |
| 173 std::string(), // associated data | |
| 174 easy_unlock::kEncryptionTypeAES256CBC, | |
| 175 easy_unlock::kSignatureTypeHMACSHA256, | |
| 176 base::Bind(&ChallengeCreator::OnPayloadGenerated, | |
| 177 weak_ptr_factory_.GetWeakPtr())); | |
| 178 } | |
| 179 | |
| 180 void EasyUnlockCreateKeysOperation::ChallengeCreator::OnPayloadGenerated( | |
| 181 const std::string& payload) { | |
| 182 if (payload.empty()) { | |
| 183 LOG(ERROR) << "Easy unlock failed to generate challenge payload."; | |
| 184 callback_.Run(false); | |
| 185 return; | |
| 186 } | |
| 187 | |
| 188 easy_unlock_client_->CreateSecureMessage( | |
| 189 payload, | |
| 190 esk_, | |
| 191 std::string(), // associated data | |
| 192 std::string(), // public meta | |
| 193 std::string(), // verification key id | |
| 194 ec_public_key_, // decryption key id | |
| 195 easy_unlock::kEncryptionTypeAES256CBC, | |
| 196 easy_unlock::kSignatureTypeHMACSHA256, | |
| 197 base::Bind(&ChallengeCreator::OnChallengeGenerated, | |
| 198 weak_ptr_factory_.GetWeakPtr())); | |
| 199 } | |
| 200 | |
| 201 void EasyUnlockCreateKeysOperation::ChallengeCreator::OnChallengeGenerated( | |
| 202 const std::string& challenge) { | |
| 203 if (challenge.empty()) { | |
| 204 LOG(ERROR) << "Easy unlock failed to generate challenge."; | |
| 205 callback_.Run(false); | |
| 206 return; | |
| 207 } | |
| 208 | |
| 209 device_->challenge = challenge; | |
| 210 callback_.Run(true); | |
| 211 } | |
| 212 | |
| 213 ///////////////////////////////////////////////////////////////////////////// | |
| 214 // EasyUnlockCreateKeysOperation | |
| 215 | |
| 216 EasyUnlockCreateKeysOperation::EasyUnlockCreateKeysOperation( | |
| 217 const UserContext& user_context, | |
| 218 const EasyUnlockDeviceKeyDataList& devices, | |
| 219 const CreateKeysCallback& callback) | |
| 220 : user_context_(user_context), | |
| 221 devices_(devices), | |
| 222 callback_(callback), | |
| 223 key_creation_index_(-1), | |
| 224 weak_ptr_factory_(this) { | |
| 225 // Must have the secret and callback. | |
| 226 DCHECK(!user_context_.GetKey()->GetSecret().empty()); | |
| 227 DCHECK(!callback_.is_null()); | |
| 228 } | |
| 229 | |
| 230 EasyUnlockCreateKeysOperation::~EasyUnlockCreateKeysOperation() { | |
| 231 } | |
| 232 | |
| 233 void EasyUnlockCreateKeysOperation::Start() { | |
| 234 key_creation_index_ = 0; | |
| 235 CreateKeyForDeviceAtIndex(key_creation_index_); | |
| 236 } | |
| 237 | |
| 238 void EasyUnlockCreateKeysOperation::CreateKeyForDeviceAtIndex(int index) { | |
| 239 DCHECK(index >= 0); | |
| 240 if (index == static_cast<int>(devices_.size())) { | |
|
tbarzic
2014/09/09 19:32:21
I'd rather make key_creation_index_ size_t; and ma
xiyuan
2014/09/09 20:25:30
Done. Changed to size_t. Not really need a started
| |
| 241 callback_.Run(true); | |
| 242 return; | |
| 243 } | |
| 244 | |
| 245 std::string user_key; | |
| 246 crypto::RandBytes(WriteInto(&user_key, kUserKeyByteSize + 1), | |
| 247 kUserKeyByteSize); | |
| 248 | |
| 249 scoped_ptr<crypto::SymmetricKey> session_key( | |
| 250 crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, | |
| 251 kSessionKeyByteSize * 8)); | |
| 252 | |
| 253 std::string iv(kSessionKeyByteSize, ' '); | |
| 254 crypto::Encryptor encryptor; | |
| 255 if (!encryptor.Init(session_key.get(), crypto::Encryptor::CBC, iv)) { | |
| 256 LOG(ERROR) << "Easy unlock failed to init encryptor for key creation."; | |
| 257 callback_.Run(false); | |
| 258 return; | |
| 259 } | |
| 260 | |
| 261 EasyUnlockDeviceKeyData* device = &devices_[index]; | |
| 262 if (!encryptor.Encrypt(user_key, &device->wrapped_secret)) { | |
| 263 LOG(ERROR) << "Easy unlock failed to encrypt user key for key creation."; | |
| 264 callback_.Run(false); | |
| 265 return; | |
| 266 } | |
| 267 | |
| 268 std::string raw_session_key; | |
| 269 session_key->GetRawKey(&raw_session_key); | |
| 270 | |
| 271 challenge_creator_.reset(new ChallengeCreator( | |
| 272 user_key, | |
| 273 raw_session_key, | |
| 274 std::string(), | |
| 275 device, | |
| 276 base::Bind(&EasyUnlockCreateKeysOperation::OnChallengeCreated, | |
| 277 weak_ptr_factory_.GetWeakPtr(), | |
| 278 index))); | |
| 279 challenge_creator_->Start(); | |
| 280 } | |
| 281 | |
| 282 void EasyUnlockCreateKeysOperation::OnChallengeCreated(int index, | |
| 283 bool success) { | |
| 284 DCHECK_EQ(key_creation_index_, index); | |
| 285 | |
| 286 if (!success) { | |
| 287 LOG(ERROR) << "Easy unlock failed to create challenge for key creation."; | |
| 288 callback_.Run(false); | |
| 289 return; | |
| 290 } | |
| 291 | |
| 292 EasyUnlockDeviceKeyData* device = &devices_[index]; | |
| 293 | |
| 294 cryptohome::KeyDefinition key_def( | |
| 295 challenge_creator_->user_key(), | |
| 296 EasyUnlockKeyManager::GetKeyLabel(index), | |
| 297 kEasyUnlockKeyPrivileges); | |
| 298 key_def.revision = kEasyUnlockKeyRevision; | |
| 299 key_def.provider_data.push_back( | |
| 300 cryptohome::ProviderDataEntry(kEasyUnlockKeyMetaNameBluetoothAddress, | |
| 301 device->bluetooth_address)); | |
| 302 key_def.provider_data.push_back( | |
| 303 cryptohome::ProviderDataEntry(kEasyUnlockKeyMetaNamePsk, | |
| 304 device->psk)); | |
| 305 key_def.provider_data.push_back( | |
| 306 cryptohome::ProviderDataEntry(kEasyUnlockKeyMetaNamePubKey, | |
| 307 device->public_key)); | |
| 308 key_def.provider_data.push_back( | |
| 309 cryptohome::ProviderDataEntry(kEasyUnlockKeyMetaNameChallenge, | |
| 310 device->challenge)); | |
| 311 // TODO(xiyuan): Store wrapped secret when all pieces are in place. | |
| 312 key_def.provider_data.push_back( | |
| 313 cryptohome::ProviderDataEntry(kEasyUnlockKeyMetaNameWrappedSecret, | |
| 314 key_def.key)); | |
| 315 | |
| 316 // Add cryptohome key. | |
| 317 std::string canonicalized = | |
| 318 gaia::CanonicalizeEmail(user_context_.GetUserID()); | |
| 319 cryptohome::Identification id(canonicalized); | |
| 320 const Key* const auth_key = user_context_.GetKey(); | |
| 321 cryptohome::Authorization auth(auth_key->GetSecret(), auth_key->GetLabel()); | |
| 322 cryptohome::HomedirMethods::GetInstance()->AddKeyEx( | |
| 323 id, | |
| 324 auth, | |
| 325 key_def, | |
| 326 true, // clobber | |
| 327 base::Bind(&EasyUnlockCreateKeysOperation::OnKeyCreated, | |
| 328 weak_ptr_factory_.GetWeakPtr(), | |
| 329 index)); | |
| 330 } | |
| 331 | |
| 332 void EasyUnlockCreateKeysOperation::OnKeyCreated( | |
| 333 int index, | |
| 334 bool success, | |
| 335 cryptohome::MountError return_code) { | |
| 336 DCHECK_EQ(key_creation_index_, index); | |
| 337 | |
| 338 if (!success) { | |
| 339 LOG(ERROR) << "Easy unlock failed to create key, code=" << return_code; | |
| 340 callback_.Run(false); | |
| 341 return; | |
| 342 } | |
| 343 | |
| 344 ++key_creation_index_; | |
| 345 CreateKeyForDeviceAtIndex(key_creation_index_); | |
| 346 } | |
| 347 | |
| 348 } // namespace chromeos | |
| OLD | NEW |