| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sync/util/cryptographer.h" | 5 #include "sync/util/cryptographer.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
| 10 #include "base/string_util.h" | 10 #include "base/string_util.h" |
| 11 #include "sync/protocol/password_specifics.pb.h" | 11 #include "sync/protocol/password_specifics.pb.h" |
| 12 #include "sync/test/fake_encryptor.h" | 12 #include "sync/test/fake_encryptor.h" |
| 13 #include "testing/gmock/include/gmock/gmock.h" | 13 #include "testing/gmock/include/gmock/gmock.h" |
| 14 #include "testing/gtest/include/gtest/gtest.h" | 14 #include "testing/gtest/include/gtest/gtest.h" |
| 15 | 15 |
| 16 namespace syncer { | 16 namespace syncer { |
| 17 | 17 |
| 18 namespace { | 18 namespace { |
| 19 | 19 |
| 20 using ::testing::_; | 20 using ::testing::_; |
| 21 | 21 |
| 22 } // namespace | 22 } // namespace |
| 23 | 23 |
| 24 class SyncCryptographerTest : public ::testing::Test { | 24 class CryptographerTest : public ::testing::Test { |
| 25 protected: | 25 protected: |
| 26 SyncCryptographerTest() : cryptographer_(&encryptor_) {} | 26 CryptographerTest() : cryptographer_(&encryptor_) {} |
| 27 | 27 |
| 28 FakeEncryptor encryptor_; | 28 FakeEncryptor encryptor_; |
| 29 Cryptographer cryptographer_; | 29 Cryptographer cryptographer_; |
| 30 }; | 30 }; |
| 31 | 31 |
| 32 TEST_F(SyncCryptographerTest, EmptyCantDecrypt) { | 32 TEST_F(CryptographerTest, EmptyCantDecrypt) { |
| 33 EXPECT_FALSE(cryptographer_.is_ready()); | 33 EXPECT_FALSE(cryptographer_.is_ready()); |
| 34 | 34 |
| 35 sync_pb::EncryptedData encrypted; | 35 sync_pb::EncryptedData encrypted; |
| 36 encrypted.set_key_name("foo"); | 36 encrypted.set_key_name("foo"); |
| 37 encrypted.set_blob("bar"); | 37 encrypted.set_blob("bar"); |
| 38 | 38 |
| 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); | 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); |
| 40 } | 40 } |
| 41 | 41 |
| 42 TEST_F(SyncCryptographerTest, EmptyCantEncrypt) { | 42 TEST_F(CryptographerTest, EmptyCantEncrypt) { |
| 43 EXPECT_FALSE(cryptographer_.is_ready()); | 43 EXPECT_FALSE(cryptographer_.is_ready()); |
| 44 | 44 |
| 45 sync_pb::EncryptedData encrypted; | 45 sync_pb::EncryptedData encrypted; |
| 46 sync_pb::PasswordSpecificsData original; | 46 sync_pb::PasswordSpecificsData original; |
| 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); | 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); |
| 48 } | 48 } |
| 49 | 49 |
| 50 TEST_F(SyncCryptographerTest, MissingCantDecrypt) { | 50 TEST_F(CryptographerTest, MissingCantDecrypt) { |
| 51 KeyParams params = {"localhost", "dummy", "dummy"}; | 51 KeyParams params = {"localhost", "dummy", "dummy"}; |
| 52 cryptographer_.AddKey(params); | 52 cryptographer_.AddKey(params); |
| 53 EXPECT_TRUE(cryptographer_.is_ready()); | 53 EXPECT_TRUE(cryptographer_.is_ready()); |
| 54 | 54 |
| 55 sync_pb::EncryptedData encrypted; | 55 sync_pb::EncryptedData encrypted; |
| 56 encrypted.set_key_name("foo"); | 56 encrypted.set_key_name("foo"); |
| 57 encrypted.set_blob("bar"); | 57 encrypted.set_blob("bar"); |
| 58 | 58 |
| 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); | 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); |
| 60 } | 60 } |
| 61 | 61 |
| 62 TEST_F(SyncCryptographerTest, CanEncryptAndDecrypt) { | 62 TEST_F(CryptographerTest, CanEncryptAndDecrypt) { |
| 63 KeyParams params = {"localhost", "dummy", "dummy"}; | 63 KeyParams params = {"localhost", "dummy", "dummy"}; |
| 64 EXPECT_TRUE(cryptographer_.AddKey(params)); | 64 EXPECT_TRUE(cryptographer_.AddKey(params)); |
| 65 EXPECT_TRUE(cryptographer_.is_ready()); | 65 EXPECT_TRUE(cryptographer_.is_ready()); |
| 66 | 66 |
| 67 sync_pb::PasswordSpecificsData original; | 67 sync_pb::PasswordSpecificsData original; |
| 68 original.set_origin("http://example.com"); | 68 original.set_origin("http://example.com"); |
| 69 original.set_username_value("azure"); | 69 original.set_username_value("azure"); |
| 70 original.set_password_value("hunter2"); | 70 original.set_password_value("hunter2"); |
| 71 | 71 |
| 72 sync_pb::EncryptedData encrypted; | 72 sync_pb::EncryptedData encrypted; |
| 73 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted)); | 73 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted)); |
| 74 | 74 |
| 75 sync_pb::PasswordSpecificsData decrypted; | 75 sync_pb::PasswordSpecificsData decrypted; |
| 76 EXPECT_TRUE(cryptographer_.Decrypt(encrypted, &decrypted)); | 76 EXPECT_TRUE(cryptographer_.Decrypt(encrypted, &decrypted)); |
| 77 | 77 |
| 78 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | 78 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); |
| 79 } | 79 } |
| 80 | 80 |
| 81 TEST_F(SyncCryptographerTest, EncryptOnlyIfDifferent) { | 81 TEST_F(CryptographerTest, EncryptOnlyIfDifferent) { |
| 82 KeyParams params = {"localhost", "dummy", "dummy"}; | 82 KeyParams params = {"localhost", "dummy", "dummy"}; |
| 83 EXPECT_TRUE(cryptographer_.AddKey(params)); | 83 EXPECT_TRUE(cryptographer_.AddKey(params)); |
| 84 EXPECT_TRUE(cryptographer_.is_ready()); | 84 EXPECT_TRUE(cryptographer_.is_ready()); |
| 85 | 85 |
| 86 sync_pb::PasswordSpecificsData original; | 86 sync_pb::PasswordSpecificsData original; |
| 87 original.set_origin("http://example.com"); | 87 original.set_origin("http://example.com"); |
| 88 original.set_username_value("azure"); | 88 original.set_username_value("azure"); |
| 89 original.set_password_value("hunter2"); | 89 original.set_password_value("hunter2"); |
| 90 | 90 |
| 91 sync_pb::EncryptedData encrypted; | 91 sync_pb::EncryptedData encrypted; |
| (...skipping 10 matching lines...) Expand all Loading... |
| 102 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3)); | 102 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3)); |
| 103 | 103 |
| 104 sync_pb::PasswordSpecificsData decrypted; | 104 sync_pb::PasswordSpecificsData decrypted; |
| 105 EXPECT_TRUE(cryptographer_.Decrypt(encrypted2, &decrypted)); | 105 EXPECT_TRUE(cryptographer_.Decrypt(encrypted2, &decrypted)); |
| 106 // encrypted2 should match encrypted, encrypted3 should not (due to salting). | 106 // encrypted2 should match encrypted, encrypted3 should not (due to salting). |
| 107 EXPECT_EQ(encrypted.SerializeAsString(), encrypted2.SerializeAsString()); | 107 EXPECT_EQ(encrypted.SerializeAsString(), encrypted2.SerializeAsString()); |
| 108 EXPECT_NE(encrypted.SerializeAsString(), encrypted3.SerializeAsString()); | 108 EXPECT_NE(encrypted.SerializeAsString(), encrypted3.SerializeAsString()); |
| 109 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | 109 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); |
| 110 } | 110 } |
| 111 | 111 |
| 112 TEST_F(SyncCryptographerTest, AddKeySetsDefault) { | 112 TEST_F(CryptographerTest, AddKeySetsDefault) { |
| 113 KeyParams params1 = {"localhost", "dummy", "dummy1"}; | 113 KeyParams params1 = {"localhost", "dummy", "dummy1"}; |
| 114 EXPECT_TRUE(cryptographer_.AddKey(params1)); | 114 EXPECT_TRUE(cryptographer_.AddKey(params1)); |
| 115 EXPECT_TRUE(cryptographer_.is_ready()); | 115 EXPECT_TRUE(cryptographer_.is_ready()); |
| 116 | 116 |
| 117 sync_pb::PasswordSpecificsData original; | 117 sync_pb::PasswordSpecificsData original; |
| 118 original.set_origin("http://example.com"); | 118 original.set_origin("http://example.com"); |
| 119 original.set_username_value("azure"); | 119 original.set_username_value("azure"); |
| 120 original.set_password_value("hunter2"); | 120 original.set_password_value("hunter2"); |
| 121 | 121 |
| 122 sync_pb::EncryptedData encrypted1; | 122 sync_pb::EncryptedData encrypted1; |
| (...skipping 14 matching lines...) Expand all Loading... |
| 137 EXPECT_NE(encrypted1.key_name(), encrypted3.key_name()); | 137 EXPECT_NE(encrypted1.key_name(), encrypted3.key_name()); |
| 138 EXPECT_EQ(encrypted3.key_name(), encrypted4.key_name()); | 138 EXPECT_EQ(encrypted3.key_name(), encrypted4.key_name()); |
| 139 } | 139 } |
| 140 | 140 |
| 141 // Crashes, Bug 55178. | 141 // Crashes, Bug 55178. |
| 142 #if defined(OS_WIN) | 142 #if defined(OS_WIN) |
| 143 #define MAYBE_EncryptExportDecrypt DISABLED_EncryptExportDecrypt | 143 #define MAYBE_EncryptExportDecrypt DISABLED_EncryptExportDecrypt |
| 144 #else | 144 #else |
| 145 #define MAYBE_EncryptExportDecrypt EncryptExportDecrypt | 145 #define MAYBE_EncryptExportDecrypt EncryptExportDecrypt |
| 146 #endif | 146 #endif |
| 147 TEST_F(SyncCryptographerTest, MAYBE_EncryptExportDecrypt) { | 147 TEST_F(CryptographerTest, MAYBE_EncryptExportDecrypt) { |
| 148 sync_pb::EncryptedData nigori; | 148 sync_pb::EncryptedData nigori; |
| 149 sync_pb::EncryptedData encrypted; | 149 sync_pb::EncryptedData encrypted; |
| 150 | 150 |
| 151 sync_pb::PasswordSpecificsData original; | 151 sync_pb::PasswordSpecificsData original; |
| 152 original.set_origin("http://example.com"); | 152 original.set_origin("http://example.com"); |
| 153 original.set_username_value("azure"); | 153 original.set_username_value("azure"); |
| 154 original.set_password_value("hunter2"); | 154 original.set_password_value("hunter2"); |
| 155 | 155 |
| 156 { | 156 { |
| 157 Cryptographer cryptographer(&encryptor_); | 157 Cryptographer cryptographer(&encryptor_); |
| (...skipping 18 matching lines...) Expand all Loading... |
| 176 EXPECT_TRUE(cryptographer.DecryptPendingKeys(params)); | 176 EXPECT_TRUE(cryptographer.DecryptPendingKeys(params)); |
| 177 EXPECT_TRUE(cryptographer.is_ready()); | 177 EXPECT_TRUE(cryptographer.is_ready()); |
| 178 EXPECT_FALSE(cryptographer.has_pending_keys()); | 178 EXPECT_FALSE(cryptographer.has_pending_keys()); |
| 179 | 179 |
| 180 sync_pb::PasswordSpecificsData decrypted; | 180 sync_pb::PasswordSpecificsData decrypted; |
| 181 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); | 181 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); |
| 182 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | 182 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); |
| 183 } | 183 } |
| 184 } | 184 } |
| 185 | 185 |
| 186 TEST_F(SyncCryptographerTest, Bootstrap) { | 186 TEST_F(CryptographerTest, Bootstrap) { |
| 187 KeyParams params = {"localhost", "dummy", "dummy"}; | 187 KeyParams params = {"localhost", "dummy", "dummy"}; |
| 188 cryptographer_.AddKey(params); | 188 cryptographer_.AddKey(params); |
| 189 | 189 |
| 190 std::string token; | 190 std::string token; |
| 191 EXPECT_TRUE(cryptographer_.GetBootstrapToken(&token)); | 191 EXPECT_TRUE(cryptographer_.GetBootstrapToken(&token)); |
| 192 EXPECT_TRUE(IsStringUTF8(token)); | 192 EXPECT_TRUE(IsStringUTF8(token)); |
| 193 | 193 |
| 194 Cryptographer other_cryptographer(&encryptor_); | 194 Cryptographer other_cryptographer(&encryptor_); |
| 195 other_cryptographer.Bootstrap(token); | 195 other_cryptographer.Bootstrap(token); |
| 196 EXPECT_TRUE(other_cryptographer.is_ready()); | 196 EXPECT_TRUE(other_cryptographer.is_ready()); |
| 197 | 197 |
| 198 const char secret[] = "secret"; | 198 const char secret[] = "secret"; |
| 199 sync_pb::EncryptedData encrypted; | 199 sync_pb::EncryptedData encrypted; |
| 200 EXPECT_TRUE(other_cryptographer.EncryptString(secret, &encrypted)); | 200 EXPECT_TRUE(other_cryptographer.EncryptString(secret, &encrypted)); |
| 201 EXPECT_TRUE(cryptographer_.CanDecryptUsingDefaultKey(encrypted)); | 201 EXPECT_TRUE(cryptographer_.CanDecryptUsingDefaultKey(encrypted)); |
| 202 } | 202 } |
| 203 | 203 |
| 204 } // namespace syncer | 204 } // namespace syncer |
| OLD | NEW |