OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/sync/util/nigori.h" | 5 #include "chrome/browser/sync/util/nigori.h" |
6 | 6 |
7 #if defined(OS_WIN) | 7 #if defined(OS_WIN) |
8 #include <winsock2.h> // for htonl | 8 #include <winsock2.h> // for htonl |
9 #endif | 9 #endif |
10 | 10 |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
54 return stream_.str(); | 54 return stream_.str(); |
55 } | 55 } |
56 | 56 |
57 private: | 57 private: |
58 std::ostringstream stream_; | 58 std::ostringstream stream_; |
59 }; | 59 }; |
60 | 60 |
61 // static | 61 // static |
62 const char Nigori::kSaltSalt[] = "saltsalt"; | 62 const char Nigori::kSaltSalt[] = "saltsalt"; |
63 | 63 |
64 Nigori::Nigori(const std::string& hostname) | 64 Nigori::Nigori() { |
65 : hostname_(hostname) { | |
66 } | 65 } |
67 | 66 |
68 Nigori::~Nigori() { | 67 Nigori::~Nigori() { |
69 } | 68 } |
70 | 69 |
71 bool Nigori::Init(const std::string& username, const std::string& password) { | 70 bool Nigori::InitByDerivation(const std::string& hostname, |
| 71 const std::string& username, |
| 72 const std::string& password) { |
| 73 hostname_ = hostname; |
72 username_ = username; | 74 username_ = username; |
73 password_ = password; | 75 password_ = password; |
74 | 76 |
75 NigoriStream salt_password; | 77 NigoriStream salt_password; |
76 salt_password << username << hostname_; | 78 salt_password << username << hostname; |
77 | 79 |
78 // Suser = PBKDF2(Username || Servername, "saltsalt", Nsalt, 8) | 80 // Suser = PBKDF2(Username || Servername, "saltsalt", Nsalt, 8) |
79 scoped_ptr<SymmetricKey> user_salt(SymmetricKey::DeriveKeyFromPassword( | 81 scoped_ptr<SymmetricKey> user_salt(SymmetricKey::DeriveKeyFromPassword( |
80 SymmetricKey::HMAC_SHA1, salt_password.str(), | 82 SymmetricKey::HMAC_SHA1, salt_password.str(), |
81 kSaltSalt, | 83 kSaltSalt, |
82 kSaltIterations, | 84 kSaltIterations, |
83 kSaltKeySizeInBits)); | 85 kSaltKeySizeInBits)); |
84 DCHECK(user_salt.get()); | 86 DCHECK(user_salt.get()); |
85 | 87 |
86 std::string raw_user_salt; | 88 std::string raw_user_salt; |
(...skipping 11 matching lines...) Expand all Loading... |
98 | 100 |
99 // Kmac = PBKDF2(P, Suser, Nmac, 16) | 101 // Kmac = PBKDF2(P, Suser, Nmac, 16) |
100 mac_key_.reset(SymmetricKey::DeriveKeyFromPassword( | 102 mac_key_.reset(SymmetricKey::DeriveKeyFromPassword( |
101 SymmetricKey::HMAC_SHA1, password, raw_user_salt, kSigningIterations, | 103 SymmetricKey::HMAC_SHA1, password, raw_user_salt, kSigningIterations, |
102 kDerivedKeySizeInBits)); | 104 kDerivedKeySizeInBits)); |
103 DCHECK(mac_key_.get()); | 105 DCHECK(mac_key_.get()); |
104 | 106 |
105 return true; | 107 return true; |
106 } | 108 } |
107 | 109 |
| 110 bool Nigori::InitByImport(const std::string& user_key, |
| 111 const std::string& encryption_key, |
| 112 const std::string& mac_key) { |
| 113 user_key_.reset(SymmetricKey::Import(SymmetricKey::AES, user_key)); |
| 114 DCHECK(user_key_.get()); |
| 115 |
| 116 encryption_key_.reset(SymmetricKey::Import(SymmetricKey::AES, |
| 117 encryption_key)); |
| 118 DCHECK(encryption_key_.get()); |
| 119 |
| 120 mac_key_.reset(SymmetricKey::Import(SymmetricKey::HMAC_SHA1, mac_key)); |
| 121 DCHECK(mac_key_.get()); |
| 122 |
| 123 return user_key_.get() && encryption_key_.get() && mac_key_.get(); |
| 124 } |
| 125 |
108 // Permute[Kenc,Kmac](type || name) | 126 // Permute[Kenc,Kmac](type || name) |
109 bool Nigori::Permute(Type type, const std::string& name, | 127 bool Nigori::Permute(Type type, const std::string& name, |
110 std::string* permuted) const { | 128 std::string* permuted) const { |
111 DCHECK_LT(0U, name.size()); | 129 DCHECK_LT(0U, name.size()); |
112 | 130 |
113 NigoriStream plaintext; | 131 NigoriStream plaintext; |
114 plaintext << type << name; | 132 plaintext << type << name; |
115 | 133 |
116 Encryptor encryptor; | 134 Encryptor encryptor; |
117 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, | 135 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, |
(...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
221 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv)) | 239 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv)) |
222 return false; | 240 return false; |
223 | 241 |
224 std::string plaintext; | 242 std::string plaintext; |
225 if (!encryptor.Decrypt(ciphertext, value)) | 243 if (!encryptor.Decrypt(ciphertext, value)) |
226 return false; | 244 return false; |
227 | 245 |
228 return true; | 246 return true; |
229 } | 247 } |
230 | 248 |
| 249 bool Nigori::ExportKeys(std::string* user_key, |
| 250 std::string* encryption_key, |
| 251 std::string* mac_key) const { |
| 252 DCHECK(user_key); |
| 253 DCHECK(encryption_key); |
| 254 DCHECK(mac_key); |
| 255 |
| 256 return user_key_->GetRawKey(user_key) && |
| 257 encryption_key_->GetRawKey(encryption_key) && |
| 258 mac_key_->GetRawKey(mac_key); |
| 259 } |
| 260 |
231 } // namespace browser_sync | 261 } // namespace browser_sync |
OLD | NEW |