blob: 73cd30591119969e5de1b2de56b984e54cdf6bac [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/os_crypt/keychain_password_mac.h"
#import <Security/Security.h>
#include "base/base64.h"
#include "base/mac/mac_logging.h"
#include "base/mac/scoped_cftyperef.h"
#include "base/rand_util.h"
#include "components/os_crypt/encryption_key_creation_util.h"
#include "crypto/apple_keychain.h"
using crypto::AppleKeychain;
namespace {
// Generates a random password and adds it to the Keychain. The added password
// is returned from the function. If an error occurs, an empty password is
// returned.
std::string AddRandomPasswordToKeychain(const AppleKeychain& keychain,
const std::string& service_name,
const std::string& account_name) {
// Generate a password with 128 bits of randomness.
const int kBytes = 128 / 8;
std::string password;
base::Base64Encode(base::RandBytesAsString(kBytes), &password);
void* password_data =
const_cast<void*>(static_cast<const void*>(password.data()));
OSStatus error = keychain.AddGenericPassword(
service_name.size(), service_name.data(), account_name.size(),
account_name.data(), password.size(), password_data, NULL);
if (error != noErr) {
OSSTATUS_DLOG(ERROR, error) << "Keychain add failed";
return std::string();
}
return password;
}
} // namespace
// These two strings ARE indeed user facing. But they are used to access
// the encryption keyword. So as to not lose encrypted data when system
// locale changes we DO NOT LOCALIZE.
#if defined(GOOGLE_CHROME_BUILD)
const char KeychainPassword::service_name[] = "Chrome Safe Storage";
const char KeychainPassword::account_name[] = "Chrome";
#else
const char KeychainPassword::service_name[] = "Chromium Safe Storage";
const char KeychainPassword::account_name[] = "Chromium";
#endif
KeychainPassword::KeychainPassword(
const AppleKeychain& keychain,
std::unique_ptr<EncryptionKeyCreationUtil> key_creation_util)
: keychain_(keychain), key_creation_util_(std::move(key_creation_util)) {}
KeychainPassword::~KeychainPassword() = default;
std::string KeychainPassword::GetPassword() const {
DCHECK(key_creation_util_);
UInt32 password_length = 0;
void* password_data = nullptr;
OSStatus error = keychain_.FindGenericPassword(
strlen(service_name), service_name, strlen(account_name), account_name,
&password_length, &password_data, nullptr);
if (error == noErr) {
std::string password =
std::string(static_cast<char*>(password_data), password_length);
keychain_.ItemFreeContent(password_data);
key_creation_util_->OnKeyWasFound();
return password;
}
if (error == errSecItemNotFound) {
key_creation_util_->OnKeyNotFound(keychain_);
std::string password =
AddRandomPasswordToKeychain(keychain_, service_name, account_name);
key_creation_util_->OnKeyStored(!password.empty());
return password;
}
key_creation_util_->OnKeychainLookupFailed(error);
OSSTATUS_DLOG(ERROR, error) << "Keychain lookup failed";
return std::string();
}