OLD | NEW |
---|---|
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CHROME_BROWSER_SYNC_UTIL_CRYPTOGRAPHER_H_ | 5 #ifndef CHROME_BROWSER_SYNC_UTIL_CRYPTOGRAPHER_H_ |
6 #define CHROME_BROWSER_SYNC_UTIL_CRYPTOGRAPHER_H_ | 6 #define CHROME_BROWSER_SYNC_UTIL_CRYPTOGRAPHER_H_ |
7 #pragma once | 7 #pragma once |
8 | 8 |
9 #include <map> | 9 #include <map> |
10 #include <string> | 10 #include <string> |
11 | 11 |
12 #include "base/gtest_prod_util.h" | 12 #include "base/gtest_prod_util.h" |
13 #include "base/memory/linked_ptr.h" | 13 #include "base/memory/linked_ptr.h" |
14 #include "base/memory/scoped_ptr.h" | 14 #include "base/memory/scoped_ptr.h" |
15 #include "base/observer_list.h" | |
15 #include "chrome/browser/sync/protocol/nigori_specifics.pb.h" | 16 #include "chrome/browser/sync/protocol/nigori_specifics.pb.h" |
16 #include "chrome/browser/sync/syncable/model_type.h" | 17 #include "chrome/browser/sync/syncable/model_type.h" |
17 #include "chrome/browser/sync/util/nigori.h" | 18 #include "chrome/browser/sync/util/nigori.h" |
18 | 19 |
19 namespace browser_sync { | 20 namespace browser_sync { |
20 | 21 |
21 extern const char kNigoriTag[]; | 22 extern const char kNigoriTag[]; |
22 | 23 |
23 // The parameters used to initialize a Nigori instance. | 24 // The parameters used to initialize a Nigori instance. |
24 struct KeyParams { | 25 struct KeyParams { |
(...skipping 11 matching lines...) Expand all Loading... | |
36 // Most likely, an updated Nigori node means that a new passphrase has been set | 37 // Most likely, an updated Nigori node means that a new passphrase has been set |
37 // and that future node updates won't be decryptable. To remedy this, the user | 38 // and that future node updates won't be decryptable. To remedy this, the user |
38 // should be prompted for the new passphrase and DecryptPendingKeys be called. | 39 // should be prompted for the new passphrase and DecryptPendingKeys be called. |
39 // | 40 // |
40 // Whenever a update to an encrypted node is received from the server, | 41 // Whenever a update to an encrypted node is received from the server, |
41 // CanDecrypt should be used to verify whether the Cryptographer can decrypt | 42 // CanDecrypt should be used to verify whether the Cryptographer can decrypt |
42 // that node. If it cannot, then the application of that update should be | 43 // that node. If it cannot, then the application of that update should be |
43 // delayed until after it can be decrypted. | 44 // delayed until after it can be decrypted. |
44 class Cryptographer { | 45 class Cryptographer { |
45 public: | 46 public: |
46 Cryptographer(); | 47 // All Observer methods are done synchronously, so they're called |
48 // under a transaction (since all Cryptographer operations are done | |
49 // under a transaction). | |
50 class Observer { | |
51 public: | |
52 virtual void OnEncryptedTypesChanged( | |
53 const syncable::ModelTypeSet& encrypted_types, | |
54 bool encrypt_everything) = 0; | |
55 | |
56 // Send when all encrypted types have finished encryption. | |
57 // Guaranteed to be called immeduately after a call of | |
Nicolas Zea
2011/10/21 14:29:07
immediately
akalin
2011/10/22 03:28:38
Rendered moot
| |
58 // OnEncryptedTypesChanged(). | |
59 virtual void OnEncryptionComplete() = 0; | |
60 | |
61 protected: | |
62 virtual ~Observer(); | |
63 }; | |
64 | |
65 explicit Cryptographer(); | |
47 ~Cryptographer(); | 66 ~Cryptographer(); |
48 | 67 |
49 // When update on cryptographer is called this enum tells if the | 68 // When update on cryptographer is called this enum tells if the |
50 // cryptographer was succesfully able to update using the nigori node or if | 69 // cryptographer was succesfully able to update using the nigori node or if |
51 // it needs a key to decrypt the nigori node. | 70 // it needs a key to decrypt the nigori node. |
52 enum UpdateResult { | 71 enum UpdateResult { |
53 SUCCESS, | 72 SUCCESS, |
54 NEEDS_PASSPHRASE | 73 NEEDS_PASSPHRASE |
55 }; | 74 }; |
56 | 75 |
76 // Manage observers. | |
77 void AddObserver(Observer* observer); | |
78 void RemoveObserver(Observer* observer); | |
79 | |
57 // |restored_bootstrap_token| can be provided via this method to bootstrap | 80 // |restored_bootstrap_token| can be provided via this method to bootstrap |
58 // Cryptographer instance into the ready state (is_ready will be true). | 81 // Cryptographer instance into the ready state (is_ready will be true). |
59 // It must be a string that was previously built by the | 82 // It must be a string that was previously built by the |
60 // GetSerializedBootstrapToken function. It is possible that the token is no | 83 // GetSerializedBootstrapToken function. It is possible that the token is no |
61 // longer valid (due to server key change), in which case the normal | 84 // longer valid (due to server key change), in which case the normal |
62 // decryption code paths will fail and the user will need to provide a new | 85 // decryption code paths will fail and the user will need to provide a new |
63 // passphrase. | 86 // passphrase. |
64 // It is an error to call this if is_ready() == true, though it is fair to | 87 // It is an error to call this if is_ready() == true, though it is fair to |
65 // never call Bootstrap at all. | 88 // never call Bootstrap at all. |
66 void Bootstrap(const std::string& restored_bootstrap_token); | 89 void Bootstrap(const std::string& restored_bootstrap_token); |
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
144 | 167 |
145 // Setter/getter for whether all current and future datatypes should be | 168 // Setter/getter for whether all current and future datatypes should be |
146 // encrypted. Once set you cannot unset without reading from a new nigori | 169 // encrypted. Once set you cannot unset without reading from a new nigori |
147 // node. | 170 // node. |
148 void set_encrypt_everything(); | 171 void set_encrypt_everything(); |
149 bool encrypt_everything() const; | 172 bool encrypt_everything() const; |
150 | 173 |
151 // Set all types in |new_types| as requiring encryption (in addition to the | 174 // Set all types in |new_types| as requiring encryption (in addition to the |
152 // currently encrypted types). Note: once a type requires encryption it can | 175 // currently encrypted types). Note: once a type requires encryption it can |
153 // never stop requiring encryption without clearing the server data. | 176 // never stop requiring encryption without clearing the server data. |
154 void SetEncryptedTypes(syncable::ModelTypeSet new_types); | 177 void SetEncryptedTypes(syncable::ModelTypeSet new_types); |
Nicolas Zea
2011/10/21 14:29:07
This isn't really used any more (outside of tests)
akalin
2011/10/22 03:28:38
Actually, I ended up needing to clean it up, so I
| |
155 | 178 |
156 // Return the set of encrypted types. | 179 // Return the set of encrypted types. |
157 syncable::ModelTypeSet GetEncryptedTypes() const; | 180 syncable::ModelTypeSet GetEncryptedTypes() const; |
158 | 181 |
182 // Triggers an OnEncryptedTypesChanged and an OnEncryptionComplete | |
183 // notifiation. | |
Nicolas Zea
2011/10/21 14:29:07
Is it necessary to always trigger the OnEncryptedT
akalin
2011/10/22 03:28:38
Yeah, fixed. It should only trigger when it actua
| |
184 void MarkEncryptionComplete(); | |
185 | |
159 private: | 186 private: |
160 FRIEND_TEST_ALL_PREFIXES(CryptographerTest, PackUnpack); | 187 FRIEND_TEST_ALL_PREFIXES(CryptographerTest, PackUnpack); |
161 typedef std::map<std::string, linked_ptr<const Nigori> > NigoriMap; | 188 typedef std::map<std::string, linked_ptr<const Nigori> > NigoriMap; |
162 | 189 |
190 // Calls OnEncryptedTypesChanged() on all observers. | |
191 void EmitEncryptedTypesChangeNotification(); | |
Nicolas Zea
2011/10/21 14:29:07
EncryptedTypesChange... -> EncryptedTypesChanged..
akalin
2011/10/22 03:28:38
Done.
| |
192 | |
163 // Helper method to instantiate Nigori instances for each set of key | 193 // Helper method to instantiate Nigori instances for each set of key |
164 // parameters in |bag| and setting the default encryption key to | 194 // parameters in |bag| and setting the default encryption key to |
165 // |default_key_name|. | 195 // |default_key_name|. |
166 void InstallKeys(const std::string& default_key_name, | 196 void InstallKeys(const std::string& default_key_name, |
167 const sync_pb::NigoriKeyBag& bag); | 197 const sync_pb::NigoriKeyBag& bag); |
168 | 198 |
169 bool AddKeyImpl(Nigori* nigori); | 199 bool AddKeyImpl(Nigori* nigori); |
170 | 200 |
171 // Functions to serialize + encrypt a Nigori object in an opaque format for | 201 // Functions to serialize + encrypt a Nigori object in an opaque format for |
172 // persistence by sync infrastructure. | 202 // persistence by sync infrastructure. |
173 bool PackBootstrapToken(const Nigori* nigori, std::string* pack_into) const; | 203 bool PackBootstrapToken(const Nigori* nigori, std::string* pack_into) const; |
174 Nigori* UnpackBootstrapToken(const std::string& token) const; | 204 Nigori* UnpackBootstrapToken(const std::string& token) const; |
175 | 205 |
206 ObserverList<Observer> observers_; | |
207 | |
176 NigoriMap nigoris_; // The Nigoris we know about, mapped by key name. | 208 NigoriMap nigoris_; // The Nigoris we know about, mapped by key name. |
177 NigoriMap::value_type* default_nigori_; // The Nigori used for encryption. | 209 NigoriMap::value_type* default_nigori_; // The Nigori used for encryption. |
178 | 210 |
179 scoped_ptr<sync_pb::EncryptedData> pending_keys_; | 211 scoped_ptr<sync_pb::EncryptedData> pending_keys_; |
180 | 212 |
181 syncable::ModelTypeSet encrypted_types_; | 213 syncable::ModelTypeSet encrypted_types_; |
182 bool encrypt_everything_; | 214 bool encrypt_everything_; |
183 | 215 |
184 DISALLOW_COPY_AND_ASSIGN(Cryptographer); | 216 DISALLOW_COPY_AND_ASSIGN(Cryptographer); |
185 }; | 217 }; |
186 | 218 |
187 } // namespace browser_sync | 219 } // namespace browser_sync |
188 | 220 |
189 #endif // CHROME_BROWSER_SYNC_UTIL_CRYPTOGRAPHER_H_ | 221 #endif // CHROME_BROWSER_SYNC_UTIL_CRYPTOGRAPHER_H_ |
OLD | NEW |