1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
|
// Copyright 2014 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/os_crypt/sync/keychain_password_mac.h"
#import <Security/Security.h>
#include "base/apple/osstatus_logging.h"
#include "base/apple/scoped_cftyperef.h"
#include "base/base64.h"
#include "base/containers/span.h"
#include "base/metrics/histogram_functions.h"
#include "base/no_destructor.h"
#include "base/rand_util.h"
#include "build/branding_buildflags.h"
#include "crypto/apple_keychain.h"
#include "third_party/abseil-cpp/absl/cleanup/cleanup.h"
using crypto::AppleKeychain;
#if defined(ALLOW_RUNTIME_CONFIGURABLE_KEY_STORAGE)
using KeychainNameContainerType = base::NoDestructor<std::string>;
#else
using KeychainNameContainerType = const base::NoDestructor<std::string>;
#endif
namespace {
// These two strings ARE indeed user facing. But they are used to access
// the encryption keyword. So as to not lose encrypted data when system
// locale changes we DO NOT LOCALIZE.
#if BUILDFLAG(GOOGLE_CHROME_BRANDING)
const char kDefaultServiceName[] = "Chrome Safe Storage";
const char kDefaultAccountName[] = "Chrome";
#else
const char kDefaultServiceName[] = "Chromium Safe Storage";
const char kDefaultAccountName[] = "Chromium";
#endif
// These values are persisted to logs. Entries should not be renumbered and
// numeric values should never be reused.
enum class FindGenericPasswordResult {
kPasswordFound = 0,
kPasswordNotFound = 1,
kErrorOccurred = 2,
kMaxValue = kErrorOccurred,
};
// Generates a random password and adds it to the Keychain. The added password
// is returned from the function. If an error occurs, an empty password is
// returned.
std::string AddRandomPasswordToKeychain(const AppleKeychain& keychain,
const std::string& service_name,
const std::string& account_name) {
// Generate a password with 128 bits of randomness.
const int kBytes = 128 / 8;
std::string password = base::Base64Encode(base::RandBytesAsVector(kBytes));
OSStatus error = keychain.AddGenericPassword(service_name, account_name,
base::as_byte_span(password));
if (error != noErr) {
OSSTATUS_DLOG(ERROR, error) << "Keychain add failed";
return std::string();
}
return password;
}
} // namespace
// static
KeychainPassword::KeychainNameType& KeychainPassword::GetServiceName() {
static KeychainNameContainerType service_name(kDefaultServiceName);
return *service_name;
}
// static
KeychainPassword::KeychainNameType& KeychainPassword::GetAccountName() {
static KeychainNameContainerType account_name(kDefaultAccountName);
return *account_name;
}
KeychainPassword::KeychainPassword(const AppleKeychain& keychain)
: keychain_(keychain) {}
KeychainPassword::~KeychainPassword() = default;
std::string KeychainPassword::GetPassword() const {
FindGenericPasswordResult uma_result;
absl::Cleanup log_uma_result = [&uma_result] {
base::UmaHistogramEnumeration("OSCrypt.Mac.FindGenericPasswordResult",
uma_result);
};
auto password =
keychain_->FindGenericPassword(GetServiceName(), GetAccountName());
if (password.has_value()) {
uma_result = FindGenericPasswordResult::kPasswordFound;
return std::string(base::as_string_view(*password));
}
if (password.error() == errSecItemNotFound) {
uma_result = FindGenericPasswordResult::kPasswordNotFound;
return AddRandomPasswordToKeychain(*keychain_, GetServiceName(),
GetAccountName());
}
OSSTATUS_LOG(ERROR, password.error()) << "Keychain lookup failed";
uma_result = FindGenericPasswordResult::kErrorOccurred;
base::UmaHistogramSparse("OSCrypt.Mac.FindGenericPasswordError",
password.error());
return std::string();
}
|