OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/supervised/supervised_user_authenticatio
n.h" | 5 #include "chrome/browser/chromeos/login/supervised/supervised_user_authenticatio
n.h" |
6 | 6 |
7 #include "base/base64.h" | 7 #include "base/base64.h" |
8 #include "base/json/json_file_value_serializer.h" | 8 #include "base/json/json_file_value_serializer.h" |
9 #include "base/macros.h" | 9 #include "base/macros.h" |
10 #include "base/metrics/histogram.h" | 10 #include "base/metrics/histogram.h" |
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
48 std::string BuildRawHMACKey() { | 48 std::string BuildRawHMACKey() { |
49 scoped_ptr<crypto::SymmetricKey> key(crypto::SymmetricKey::GenerateRandomKey( | 49 scoped_ptr<crypto::SymmetricKey> key(crypto::SymmetricKey::GenerateRandomKey( |
50 crypto::SymmetricKey::AES, kHMACKeySizeInBits)); | 50 crypto::SymmetricKey::AES, kHMACKeySizeInBits)); |
51 std::string raw_result, result; | 51 std::string raw_result, result; |
52 key->GetRawKey(&raw_result); | 52 key->GetRawKey(&raw_result); |
53 base::Base64Encode(raw_result, &result); | 53 base::Base64Encode(raw_result, &result); |
54 return result; | 54 return result; |
55 } | 55 } |
56 | 56 |
57 base::DictionaryValue* LoadPasswordData(base::FilePath profile_dir) { | 57 base::DictionaryValue* LoadPasswordData(base::FilePath profile_dir) { |
58 JSONFileValueSerializer serializer(profile_dir.Append(kPasswordUpdateFile)); | 58 JSONFileValueDeserializer deserializer( |
| 59 profile_dir.Append(kPasswordUpdateFile)); |
59 std::string error_message; | 60 std::string error_message; |
60 int error_code = JSONFileValueSerializer::JSON_NO_ERROR; | 61 int error_code = JSONFileValueDeserializer::JSON_NO_ERROR; |
61 scoped_ptr<base::Value> value( | 62 scoped_ptr<base::Value> value( |
62 serializer.Deserialize(&error_code, &error_message)); | 63 deserializer.Deserialize(&error_code, &error_message)); |
63 if (JSONFileValueSerializer::JSON_NO_ERROR != error_code) { | 64 if (JSONFileValueDeserializer::JSON_NO_ERROR != error_code) { |
64 LOG(ERROR) << "Could not deserialize password data, error = " << error_code | 65 LOG(ERROR) << "Could not deserialize password data, error = " << error_code |
65 << " / " << error_message; | 66 << " / " << error_message; |
66 return NULL; | 67 return NULL; |
67 } | 68 } |
68 base::DictionaryValue* result; | 69 base::DictionaryValue* result; |
69 if (!value->GetAsDictionary(&result)) { | 70 if (!value->GetAsDictionary(&result)) { |
70 LOG(ERROR) << "Stored password data is not a dictionary"; | 71 LOG(ERROR) << "Stored password data is not a dictionary"; |
71 return NULL; | 72 return NULL; |
72 } | 73 } |
73 ignore_result(value.release()); | 74 ignore_result(value.release()); |
(...skipping 240 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
314 LOG(FATAL) << "HMAC::Sign failed"; | 315 LOG(FATAL) << "HMAC::Sign failed"; |
315 | 316 |
316 std::string raw_result(out_bytes, out_bytes + sizeof(out_bytes)); | 317 std::string raw_result(out_bytes, out_bytes + sizeof(out_bytes)); |
317 | 318 |
318 std::string result; | 319 std::string result; |
319 base::Base64Encode(raw_result, &result); | 320 base::Base64Encode(raw_result, &result); |
320 return result; | 321 return result; |
321 } | 322 } |
322 | 323 |
323 } // namespace chromeos | 324 } // namespace chromeos |
OLD | NEW |