Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(114)

Unified Diff: sync/internal_api/sync_encryption_handler_impl.cc

Issue 10827266: [Sync] Add SyncEncryptionHandler (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Address comments 2 Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: sync/internal_api/sync_encryption_handler_impl.cc
diff --git a/sync/internal_api/sync_encryption_handler_impl.cc b/sync/internal_api/sync_encryption_handler_impl.cc
new file mode 100644
index 0000000000000000000000000000000000000000..e7d210b95577032c68f312163ed50c033603ee13
--- /dev/null
+++ b/sync/internal_api/sync_encryption_handler_impl.cc
@@ -0,0 +1,673 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "sync/internal_api/sync_encryption_handler_impl.h"
+
+#include <queue>
+#include <string>
+
+#include "base/bind.h"
+#include "base/message_loop.h"
+#include "base/tracked_objects.h"
+#include "base/metrics/histogram.h"
+#include "sync/internal_api/public/read_node.h"
+#include "sync/internal_api/public/read_transaction.h"
+#include "sync/internal_api/public/user_share.h"
+#include "sync/internal_api/public/util/experiments.h"
+#include "sync/internal_api/public/write_node.h"
+#include "sync/internal_api/public/write_transaction.h"
+#include "sync/protocol/encryption.pb.h"
+#include "sync/protocol/nigori_specifics.pb.h"
+#include "sync/syncable/base_transaction.h"
+#include "sync/syncable/directory.h"
+#include "sync/syncable/entry.h"
+#include "sync/syncable/nigori_util.h"
+#include "sync/util/cryptographer.h"
+
+namespace syncer {
+
+namespace {
+// The maximum number of times we will automatically overwrite the nigori node
+// because the encryption keys don't match (per chrome instantiation).
+// We protect ourselves against nigori rollbacks, but it's possible two
+// different clients might have contrasting view of what the nigori node state
+// should be, in which case they might ping pong (see crbug.com/119207).
+static const int kNigoriOverwriteLimit = 10;
+}
+
+SyncEncryptionHandlerImpl::SyncEncryptionHandlerImpl(
+ UserShare* user_share,
+ Cryptographer* cryptographer)
+ : weak_ptr_factory_(ALLOW_THIS_IN_INITIALIZER_LIST(this)),
+ user_share_(user_share),
+ cryptographer_(cryptographer),
+ encrypted_types_(SensitiveTypes()),
+ encrypt_everything_(false),
+ explicit_passphrase_(false),
+ nigori_overwrite_count_(0) {
+}
+
+SyncEncryptionHandlerImpl::~SyncEncryptionHandlerImpl() {}
+
+void SyncEncryptionHandlerImpl::AddObserver(Observer* observer) {
+ DCHECK(!observers_.HasObserver(observer));
+ observers_.AddObserver(observer);
+}
+
+void SyncEncryptionHandlerImpl::RemoveObserver(Observer* observer) {
+ DCHECK(observers_.HasObserver(observer));
+ observers_.RemoveObserver(observer);
+}
+
+void SyncEncryptionHandlerImpl::Init() {
+ WriteTransaction trans(FROM_HERE, user_share_);
+ WriteNode node(&trans);
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ cryptographer_ = cryptographer;
+
+ if (node.InitByTagLookup(kNigoriTag) != BaseNode::INIT_OK)
+ return;
+ if (!ApplyNigoriUpdateImpl(node.GetNigoriSpecifics(),
+ trans.GetWrappedTrans()))
+ WriteEncryptionStateToNigori(&trans);
tim (not reviewing) 2012/08/15 00:23:30 nit - { } around multi line ifs
Nicolas Zea 2012/08/15 01:08:29 Done.
+
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnCryptographerStateChanged(cryptographer));
+
+ if (cryptographer->is_ready())
tim (not reviewing) 2012/08/15 00:23:30 Comment about what happens if !is_ready
Nicolas Zea 2012/08/15 01:08:29 Done.
+ ReEncryptEverything(&trans);
+}
+
+// Note: this is called from within a syncable transaction, so we need to post
+// tasks if we want to do any work that creates a new sync_api transaction.
+void SyncEncryptionHandlerImpl::ApplyNigoriUpdate(
+ const sync_pb::NigoriSpecifics& nigori,
+ syncable::BaseTransaction* const trans) {
+ DCHECK(trans);
+ if (!ApplyNigoriUpdateImpl(nigori, trans)) {
+ MessageLoop::current()->PostTask(
+ FROM_HERE,
+ base::Bind(&SyncEncryptionHandlerImpl::RewriteNigori,
+ weak_ptr_factory_.GetWeakPtr()));
+ }
+
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnCryptographerStateChanged(cryptographer_));
+}
+
+// Note: this is always called via the Cryptographer interface right now,
+// so a transaction is already held. Once we remove that interface, we'll
+// need to enforce holding a transaction when calling this method.
+ModelTypeSet SyncEncryptionHandlerImpl::GetEncryptedTypes() const {
+ return encrypted_types_;
+}
+
+void SyncEncryptionHandlerImpl::SetEncryptionPassphrase(
+ const std::string& passphrase,
+ bool is_explicit) {
+ // We do not accept empty passphrases.
+ if (passphrase.empty()) {
+ NOTREACHED() << "Cannot encrypt with an empty passphrase.";
+ return;
+ }
+
+ // All accesses to the cryptographer are protected by a transaction.
+ WriteTransaction trans(FROM_HERE, user_share_);
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ KeyParams key_params = {"localhost", "dummy", passphrase};
+ WriteNode node(&trans);
+ if (node.InitByTagLookup(kNigoriTag) != BaseNode::INIT_OK) {
+ NOTREACHED();
+ return;
+ }
+
+ bool nigori_has_explicit_passphrase =
+ node.GetNigoriSpecifics().using_explicit_passphrase();
+ std::string bootstrap_token;
+ sync_pb::EncryptedData pending_keys;
+ if (cryptographer->has_pending_keys())
+ pending_keys = cryptographer->GetPendingKeys();
+ bool success = false;
+
+
+ // There are six cases to handle here:
+ // 1. The user has no pending keys and is setting their current GAIA password
+ // as the encryption passphrase. This happens either during first time sync
+ // with a clean profile, or after re-authenticating on a profile that was
+ // already signed in with the cryptographer ready.
+ // 2. The user has no pending keys, and is overwriting an (already provided)
+ // implicit passphrase with an explicit (custom) passphrase.
+ // 3. The user has pending keys for an explicit passphrase that is somehow set
+ // to their current GAIA passphrase.
+ // 4. The user has pending keys encrypted with their current GAIA passphrase
+ // and the caller passes in the current GAIA passphrase.
+ // 5. The user has pending keys encrypted with an older GAIA passphrase
+ // and the caller passes in the current GAIA passphrase.
+ // 6. The user has previously done encryption with an explicit passphrase.
+ // Furthermore, we enforce the fact that the bootstrap encryption token will
+ // always be derived from the newest GAIA password if the account is using
+ // an implicit passphrase (even if the data is encrypted with an old GAIA
+ // password). If the account is using an explicit (custom) passphrase, the
+ // bootstrap token will be derived from the most recently provided explicit
+ // passphrase (that was able to decrypt the data).
+ if (!nigori_has_explicit_passphrase) {
+ if (!cryptographer->has_pending_keys()) {
+ if (cryptographer->AddKey(key_params)) {
+ // Case 1 and 2. We set a new GAIA passphrase when there are no pending
+ // keys (1), or overwriting an implicit passphrase with a new explicit
+ // one (2) when there are no pending keys.
+ DVLOG(1) << "Setting " << (is_explicit ? "explicit" : "implicit" )
+ << " passphrase for encryption.";
+ cryptographer->GetBootstrapToken(&bootstrap_token);
+ success = true;
+ } else {
+ NOTREACHED() << "Failed to add key to cryptographer.";
+ success = false;
+ }
+ } else { // cryptographer->has_pending_keys() == true
+ if (is_explicit) {
+ // This can only happen if the nigori node is updated with a new
+ // implicit passphrase while a client is attempting to set a new custom
+ // passphrase (race condition).
+ DVLOG(1) << "Failing because an implicit passphrase is already set.";
+ success = false;
+ } else { // is_explicit == false
+ if (cryptographer->DecryptPendingKeys(key_params)) {
+ // Case 4. We successfully decrypted with the implicit GAIA passphrase
+ // passed in.
+ DVLOG(1) << "Implicit internal passphrase accepted for decryption.";
+ cryptographer->GetBootstrapToken(&bootstrap_token);
+ success = true;
+ } else {
+ // Case 5. Encryption was done with an old GAIA password, but we were
+ // provided with the current GAIA password. We need to generate a new
+ // bootstrap token to preserve it. We build a temporary cryptographer
+ // to allow us to extract these params without polluting our current
+ // cryptographer.
+ DVLOG(1) << "Implicit internal passphrase failed to decrypt, adding "
+ << "anyways as default passphrase and persisting via "
+ << "bootstrap token.";
+ Cryptographer temp_cryptographer(cryptographer->encryptor());
+ temp_cryptographer.AddKey(key_params);
+ temp_cryptographer.GetBootstrapToken(&bootstrap_token);
+ // We then set the new passphrase as the default passphrase of the
+ // real cryptographer, even though we have pending keys. This is safe,
+ // as although Cryptographer::is_initialized() will now be true,
+ // is_ready() will remain false due to having pending keys.
+ cryptographer->AddKey(key_params);
+ success = false;
+ }
+ } // is_explicit
+ } // cryptographer->has_pending_keys()
+ } else { // nigori_has_explicit_passphrase == true
+ // Case 6. We do not want to override a previously set explicit passphrase,
+ // so we return a failure.
+ DVLOG(1) << "Failing because an explicit passphrase is already set.";
+ success = false;
+ }
+
+ DVLOG_IF(1, !success)
+ << "Failure in SetEncryptionPassphrase; notifying and returning.";
+ DVLOG_IF(1, success)
+ << "Successfully set encryption passphrase; updating nigori and "
+ "reencrypting.";
+
+ FinishSetPassphrase(
+ success, bootstrap_token, is_explicit, &trans, &node);
+}
+
+void SyncEncryptionHandlerImpl::SetDecryptionPassphrase(
+ const std::string& passphrase) {
+ // We do not accept empty passphrases.
+ if (passphrase.empty()) {
+ NOTREACHED() << "Cannot decrypt with an empty passphrase.";
+ return;
+ }
+
+ // All accesses to the cryptographer are protected by a transaction.
+ WriteTransaction trans(FROM_HERE, user_share_);
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ KeyParams key_params = {"localhost", "dummy", passphrase};
+ WriteNode node(&trans);
+ if (node.InitByTagLookup(kNigoriTag) != BaseNode::INIT_OK) {
+ NOTREACHED();
+ return;
+ }
+
+ if (!cryptographer->has_pending_keys()) {
+ // Note that this *can* happen in a rare situation where data is
+ // re-encrypted on another client while a SetDecryptionPassphrase() call is
+ // in-flight on this client. It is rare enough that we choose to do nothing.
+ NOTREACHED() << "Attempt to set decryption passphrase failed because there "
+ << "were no pending keys.";
+ return;
+ }
+
+ bool nigori_has_explicit_passphrase =
+ node.GetNigoriSpecifics().using_explicit_passphrase();
+ std::string bootstrap_token;
+ sync_pb::EncryptedData pending_keys;
+ pending_keys = cryptographer->GetPendingKeys();
+ bool success = false;
+
+ // There are three cases to handle here:
+ // 7. We're using the current GAIA password to decrypt the pending keys. This
+ // happens when signing in to an account with a previously set implicit
+ // passphrase, where the data is already encrypted with the newest GAIA
+ // password.
+ // 8. The user is providing an old GAIA password to decrypt the pending keys.
+ // In this case, the user is using an implicit passphrase, but has changed
+ // their password since they last encrypted their data, and therefore
+ // their current GAIA password was unable to decrypt the data. This will
+ // happen when the user is setting up a new profile with a previously
+ // encrypted account (after changing passwords).
+ // 9. The user is providing a previously set explicit passphrase to decrypt
+ // the pending keys.
+ if (!nigori_has_explicit_passphrase) {
+ if (cryptographer->is_initialized()) {
+ // We only want to change the default encryption key to the pending
+ // one if the pending keybag already contains the current default.
+ // This covers the case where a different client re-encrypted
+ // everything with a newer gaia passphrase (and hence the keybag
+ // contains keys from all previously used gaia passphrases).
+ // Otherwise, we're in a situation where the pending keys are
+ // encrypted with an old gaia passphrase, while the default is the
+ // current gaia passphrase. In that case, we preserve the default.
+ Cryptographer temp_cryptographer(cryptographer->encryptor());
+ temp_cryptographer.SetPendingKeys(cryptographer->GetPendingKeys());
+ if (temp_cryptographer.DecryptPendingKeys(key_params)) {
+ // Check to see if the pending bag of keys contains the current
+ // default key.
+ sync_pb::EncryptedData encrypted;
+ cryptographer->GetKeys(&encrypted);
+ if (temp_cryptographer.CanDecrypt(encrypted)) {
+ DVLOG(1) << "Implicit user provided passphrase accepted for "
+ << "decryption, overwriting default.";
+ // Case 7. The pending keybag contains the current default. Go ahead
+ // and update the cryptographer, letting the default change.
+ cryptographer->DecryptPendingKeys(key_params);
+ cryptographer->GetBootstrapToken(&bootstrap_token);
+ success = true;
+ } else {
+ // Case 8. The pending keybag does not contain the current default
+ // encryption key. We decrypt the pending keys here, and in
+ // FinishSetPassphrase, re-encrypt everything with the current GAIA
+ // passphrase instead of the passphrase just provided by the user.
+ DVLOG(1) << "Implicit user provided passphrase accepted for "
+ << "decryption, restoring implicit internal passphrase "
+ << "as default.";
+ std::string bootstrap_token_from_current_key;
+ cryptographer->GetBootstrapToken(
+ &bootstrap_token_from_current_key);
+ cryptographer->DecryptPendingKeys(key_params);
+ // Overwrite the default from the pending keys.
+ cryptographer->AddKeyFromBootstrapToken(
+ bootstrap_token_from_current_key);
+ success = true;
+ }
+ } else { // !temp_cryptographer.DecryptPendingKeys(..)
+ DVLOG(1) << "Implicit user provided passphrase failed to decrypt.";
+ success = false;
+ } // temp_cryptographer.DecryptPendingKeys(...)
+ } else { // cryptographer->is_initialized() == false
+ if (cryptographer->DecryptPendingKeys(key_params)) {
+ // This can happpen in two cases:
+ // - First time sync on android, where we'll never have a
+ // !user_provided passphrase.
+ // - This is a restart for a client that lost their bootstrap token.
+ // In both cases, we should go ahead and initialize the cryptographer
+ // and persist the new bootstrap token.
+ //
+ // Note: at this point, we cannot distinguish between cases 7 and 8
+ // above. This user provided passphrase could be the current or the
+ // old. But, as long as we persist the token, there's nothing more
+ // we can do.
+ cryptographer->GetBootstrapToken(&bootstrap_token);
+ DVLOG(1) << "Implicit user provided passphrase accepted, initializing"
+ << " cryptographer.";
+ success = true;
+ } else {
+ DVLOG(1) << "Implicit user provided passphrase failed to decrypt.";
+ success = false;
+ }
+ } // cryptographer->is_initialized()
+ } else { // nigori_has_explicit_passphrase == true
+ // Case 9. Encryption was done with an explicit passphrase, and we decrypt
+ // with the passphrase provided by the user.
+ if (cryptographer->DecryptPendingKeys(key_params)) {
+ DVLOG(1) << "Explicit passphrase accepted for decryption.";
+ cryptographer->GetBootstrapToken(&bootstrap_token);
+ success = true;
+ } else {
+ DVLOG(1) << "Explicit passphrase failed to decrypt.";
+ success = false;
+ }
+ } // nigori_has_explicit_passphrase
+
+ DVLOG_IF(1, !success)
+ << "Failure in SetDecryptionPassphrase; notifying and returning.";
+ DVLOG_IF(1, success)
+ << "Successfully set decryption passphrase; updating nigori and "
+ "reencrypting.";
+
+ FinishSetPassphrase(success,
+ bootstrap_token,
+ nigori_has_explicit_passphrase,
+ &trans,
+ &node);
+}
+
+void SyncEncryptionHandlerImpl::EnableEncryptEverything() {
+ if (encrypt_everything_) {
+ DCHECK(encrypted_types_.Equals(ModelTypeSet::All()));
+ return;
+ }
+ WriteTransaction trans(FROM_HERE, user_share_);
+ encrypt_everything_ = true;
+ // Change |encrypted_types_| directly to avoid sending more than one
+ // notification.
+ encrypted_types_ = ModelTypeSet::All();
+ FOR_EACH_OBSERVER(
+ Observer, observers_,
+ OnEncryptedTypesChanged(encrypted_types_, encrypt_everything_));
+ WriteEncryptionStateToNigori(&trans);
+ ReEncryptEverything(&trans);
+}
+
+bool SyncEncryptionHandlerImpl::EncryptEverythingEnabled() const {
+ ReadTransaction trans(FROM_HERE, user_share_);
+ return encrypt_everything_;
+}
+
+bool SyncEncryptionHandlerImpl::IsUsingExplicitPassphrase() const {
+ ReadTransaction trans(FROM_HERE, user_share_);
+ return explicit_passphrase_;
+}
+
+// This function iterates over all encrypted types. There are many scenarios in
+// which data for some or all types is not currently available. In that case,
+// the lookup of the root node will fail and we will skip encryption for that
+// type.
+void SyncEncryptionHandlerImpl::ReEncryptEverything(
+ WriteTransaction* trans) {
+ Cryptographer* cryptographer = trans->GetCryptographer();
+ if (!cryptographer->is_ready())
+ return;
+ ModelTypeSet encrypted_types = GetEncryptedTypes();
+ for (ModelTypeSet::Iterator iter = encrypted_types.First();
+ iter.Good(); iter.Inc()) {
+ if (iter.Get() == PASSWORDS || iter.Get() == NIGORI)
+ continue; // These types handle encryption differently.
+
+ ReadNode type_root(trans);
+ std::string tag = ModelTypeToRootTag(iter.Get());
+ if (type_root.InitByTagLookup(tag) != BaseNode::INIT_OK)
+ continue; // Don't try to reencrypt if the type's data is unavailable.
+
+ // Iterate through all children of this datatype.
+ std::queue<int64> to_visit;
+ int64 child_id = type_root.GetFirstChildId();
+ to_visit.push(child_id);
+ while (!to_visit.empty()) {
+ child_id = to_visit.front();
+ to_visit.pop();
+ if (child_id == kInvalidId)
+ continue;
+
+ WriteNode child(trans);
+ if (child.InitByIdLookup(child_id) != BaseNode::INIT_OK) {
+ NOTREACHED();
+ continue;
+ }
+ if (child.GetIsFolder()) {
+ to_visit.push(child.GetFirstChildId());
+ }
+ if (child.GetEntry()->Get(syncable::UNIQUE_SERVER_TAG).empty()) {
+ // Rewrite the specifics of the node with encrypted data if necessary
+ // (only rewrite the non-unique folders).
+ child.ResetFromSpecifics();
+ }
+ to_visit.push(child.GetSuccessorId());
+ }
+ }
+
+ // Passwords are encrypted with their own legacy scheme. Passwords are always
+ // encrypted so we don't need to check GetEncryptedTypes() here.
+ ReadNode passwords_root(trans);
+ std::string passwords_tag = ModelTypeToRootTag(PASSWORDS);
+ if (passwords_root.InitByTagLookup(passwords_tag) ==
+ BaseNode::INIT_OK) {
+ int64 child_id = passwords_root.GetFirstChildId();
+ while (child_id != kInvalidId) {
+ WriteNode child(trans);
+ if (child.InitByIdLookup(child_id) != BaseNode::INIT_OK) {
+ NOTREACHED();
+ return;
+ }
+ child.SetPasswordSpecifics(child.GetPasswordSpecifics());
+ child_id = child.GetSuccessorId();
+ }
+ }
+
+ // NOTE: We notify from within a transaction.
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnEncryptionComplete());
+}
+
+bool SyncEncryptionHandlerImpl::ApplyNigoriUpdateImpl(
+ const sync_pb::NigoriSpecifics& nigori,
+ syncable::BaseTransaction* const trans) {
+ Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans);
+ bool nigori_types_need_update = !UpdateEncryptedTypesFromNigori(nigori);
+ if (nigori.using_explicit_passphrase())
+ explicit_passphrase_ = true;
+
+ bool nigori_needs_new_keys = false;
+ if (!nigori.encrypted().blob().empty()) {
+ if (cryptographer->CanDecrypt(nigori.encrypted())) {
+ cryptographer->InstallKeys(nigori.encrypted());
+ // We only update the default passphrase if this was a new explicit
+ // passphrase. Else, since it was decryptable, it must not have been a new
+ // key.
+ if (nigori.using_explicit_passphrase())
+ cryptographer->SetDefaultKey(nigori.encrypted().key_name());
+
+ // Check if the cryptographer's keybag is newer than the nigori's
+ // keybag. If so, we need to overwrite the nigori node.
+ sync_pb::EncryptedData new_keys = nigori.encrypted();
+ if (!cryptographer->GetKeys(&new_keys))
+ NOTREACHED();
+ if (nigori.encrypted().SerializeAsString() !=
+ new_keys.SerializeAsString())
+ nigori_needs_new_keys = true;
+ } else {
+ cryptographer->SetPendingKeys(nigori.encrypted());
+ }
+ } else {
+ nigori_needs_new_keys = true;
+ }
+
+ // If we've completed a sync cycle and the cryptographer isn't ready
+ // yet or has pending keys, prompt the user for a passphrase.
+ if (cryptographer->has_pending_keys()) {
+ DVLOG(1) << "OnPassphraseRequired Sent";
+ sync_pb::EncryptedData pending_keys = cryptographer->GetPendingKeys();
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnPassphraseRequired(REASON_DECRYPTION,
+ pending_keys));
+ } else if (!cryptographer->is_ready()) {
+ DVLOG(1) << "OnPassphraseRequired sent because cryptographer is not "
+ << "ready";
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnPassphraseRequired(REASON_ENCRYPTION,
+ sync_pb::EncryptedData()));
+ }
+
+ // Check if the current local encryption state is stricter/newer than the
+ // nigori state. If so, we need to overwrite the nigori node with the local
+ // state.
+ if (nigori.using_explicit_passphrase() != explicit_passphrase_ ||
+ nigori.encrypt_everything() != encrypt_everything_ ||
+ nigori_types_need_update ||
+ nigori_needs_new_keys) {
+ return false;
+ }
+ return true;
+}
+
+void SyncEncryptionHandlerImpl::RewriteNigori() {
+ WriteTransaction trans(FROM_HERE, user_share_);
+ WriteEncryptionStateToNigori(&trans);
+}
+
+void SyncEncryptionHandlerImpl::WriteEncryptionStateToNigori(
+ WriteTransaction* trans) {
+ WriteNode nigori_node(trans);
+ // This can happen in tests that don't have nigori nodes.
+ if (!nigori_node.InitByTagLookup(kNigoriTag) == BaseNode::INIT_OK)
+ return;
+ sync_pb::NigoriSpecifics nigori = nigori_node.GetNigoriSpecifics();
+ Cryptographer* cryptographer = trans->GetCryptographer();
+ if (cryptographer->is_ready() &&
+ nigori_overwrite_count_ < kNigoriOverwriteLimit) {
+ // Does not modify the encrypted blob if the unencrypted data already
+ // matches what is about to be written.
+ sync_pb::EncryptedData original_keys = nigori.encrypted();
+ if (!cryptographer->GetKeys(nigori.mutable_encrypted()))
+ NOTREACHED();
+
+ if (nigori.encrypted().SerializeAsString() !=
+ original_keys.SerializeAsString()) {
+ // We've updated the nigori node's encryption keys. In order to prevent
+ // a possible looping of two clients constantly overwriting each other,
+ // we limit the absolute number of overwrites per client instantiation.
+ nigori_overwrite_count_++;
+ UMA_HISTOGRAM_COUNTS("Sync.AutoNigoriOverwrites",
+ nigori_overwrite_count_);
+ }
+
+ // Note: we don't try to set using_explicit_passphrase here since if that
+ // is lost the user can always set it again. The main point is to preserve
+ // the encryption keys so all data remains decryptable.
+ }
+ syncable::UpdateNigoriFromEncryptedTypes(encrypted_types_,
+ encrypt_everything_,
+ &nigori);
+
+ // If nothing has changed, this is a no-op.
+ nigori_node.SetNigoriSpecifics(nigori);
+}
+
+bool SyncEncryptionHandlerImpl::UpdateEncryptedTypesFromNigori(
+ const sync_pb::NigoriSpecifics& nigori) {
+ if (nigori.encrypt_everything()) {
+ if (!encrypt_everything_) {
+ encrypt_everything_ = true;
+ encrypted_types_ = ModelTypeSet::All();
+ FOR_EACH_OBSERVER(
+ Observer, observers_,
+ OnEncryptedTypesChanged(encrypted_types_, encrypt_everything_));
+ }
+ DCHECK(encrypted_types_.Equals(ModelTypeSet::All()));
+ return true;
+ }
+
+ ModelTypeSet encrypted_types;
+ encrypted_types = syncable::GetEncryptedTypesFromNigori(nigori);
+ encrypted_types.PutAll(SensitiveTypes());
+
+ // If anything more than the sensitive types were encrypted, and
+ // encrypt_everything is not explicitly set to false, we assume it means
+ // a client intended to enable encrypt everything.
+ if (!nigori.has_encrypt_everything() &&
+ !Difference(encrypted_types, SensitiveTypes()).Empty()) {
+ if (!encrypt_everything_) {
+ encrypt_everything_ = true;
+ encrypted_types_ = ModelTypeSet::All();
+ FOR_EACH_OBSERVER(
+ Observer, observers_,
+ OnEncryptedTypesChanged(encrypted_types_, encrypt_everything_));
+ }
+ DCHECK(encrypted_types_.Equals(ModelTypeSet::All()));
+ return false;
+ }
+
+ MergeEncryptedTypes(encrypted_types);
+ return encrypted_types_.Equals(encrypted_types);
+}
+
+void SyncEncryptionHandlerImpl::UpdateNigoriFromEncryptedTypes(
tim (not reviewing) 2012/08/15 00:23:30 If we keep the nigori_util version, do we still ne
Nicolas Zea 2012/08/15 01:08:29 This one accesses the local state (i.e. encrypted_
+ sync_pb::NigoriSpecifics* nigori,
+ syncable::BaseTransaction* const trans) const {
+ syncable::UpdateNigoriFromEncryptedTypes(encrypted_types_,
+ encrypt_everything_,
+ nigori);
+}
+
+void SyncEncryptionHandlerImpl::FinishSetPassphrase(
+ bool success,
+ const std::string& bootstrap_token,
+ bool is_explicit,
+ WriteTransaction* trans,
+ WriteNode* nigori_node) {
+ Cryptographer* cryptographer = trans->GetCryptographer();
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnCryptographerStateChanged(cryptographer));
+
+ // It's possible we need to change the bootstrap token even if we failed to
+ // set the passphrase (for example if we need to preserve the new GAIA
+ // passphrase).
+ if (!bootstrap_token.empty()) {
+ DVLOG(1) << "Bootstrap token updated.";
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnBootstrapTokenUpdated(bootstrap_token));
+ }
+
+ if (!success) {
+ if (cryptographer->is_ready()) {
+ LOG(ERROR) << "Attempt to change passphrase failed while cryptographer "
+ << "was ready.";
+ } else if (cryptographer->has_pending_keys()) {
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnPassphraseRequired(REASON_DECRYPTION,
+ cryptographer->GetPendingKeys()));
+ } else {
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnPassphraseRequired(REASON_ENCRYPTION,
+ sync_pb::EncryptedData()));
+ }
+ return;
+ }
+
+ FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
+ OnPassphraseAccepted());
+ DCHECK(cryptographer->is_ready());
+
+ sync_pb::NigoriSpecifics specifics(nigori_node->GetNigoriSpecifics());
+ // Does not modify specifics.encrypted() if the original decrypted data was
+ // the same.
+ if (!cryptographer->GetKeys(specifics.mutable_encrypted())) {
+ NOTREACHED();
+ return;
+ }
+ explicit_passphrase_ = is_explicit;
+ specifics.set_using_explicit_passphrase(is_explicit);
+ nigori_node->SetNigoriSpecifics(specifics);
+
+ // Does nothing if everything is already encrypted or the cryptographer has
+ // pending keys.
+ ReEncryptEverything(trans);
+}
+
+void SyncEncryptionHandlerImpl::MergeEncryptedTypes(
+ ModelTypeSet encrypted_types) {
+ if (!encrypted_types_.HasAll(encrypted_types)) {
+ encrypted_types_ = encrypted_types;
+ FOR_EACH_OBSERVER(
+ Observer, observers_,
+ OnEncryptedTypesChanged(encrypted_types_, encrypt_everything_));
+ }
+}
+
+} // namespace browser_sync

Powered by Google App Engine
This is Rietveld 408576698