OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/sync/util/cryptographer.h" | |
6 | |
7 #include <string> | |
8 | |
9 #include "base/memory/scoped_ptr.h" | |
10 #include "base/string_util.h" | |
11 #include "chrome/browser/password_manager/encryptor.h" | |
12 #include "chrome/browser/sync/protocol/nigori_specifics.pb.h" | |
13 #include "chrome/browser/sync/protocol/password_specifics.pb.h" | |
14 #include "testing/gmock/include/gmock/gmock.h" | |
15 #include "testing/gtest/include/gtest/gtest.h" | |
16 | |
17 namespace browser_sync { | |
18 | |
19 using ::testing::Mock; | |
20 using ::testing::StrictMock; | |
21 using syncable::ModelTypeSet; | |
22 | |
23 namespace { | |
24 | |
25 class MockObserver : public Cryptographer::Observer { | |
26 public: | |
27 MOCK_METHOD2(OnEncryptedTypesChanged, | |
28 void(const syncable::ModelTypeSet&, bool)); | |
29 }; | |
30 | |
31 } // namespace | |
32 | |
33 TEST(CryptographerTest, EmptyCantDecrypt) { | |
34 Cryptographer cryptographer; | |
35 EXPECT_FALSE(cryptographer.is_ready()); | |
36 | |
37 sync_pb::EncryptedData encrypted; | |
38 encrypted.set_key_name("foo"); | |
39 encrypted.set_blob("bar"); | |
40 | |
41 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); | |
42 } | |
43 | |
44 TEST(CryptographerTest, EmptyCantEncrypt) { | |
45 Cryptographer cryptographer; | |
46 EXPECT_FALSE(cryptographer.is_ready()); | |
47 | |
48 sync_pb::EncryptedData encrypted; | |
49 sync_pb::PasswordSpecificsData original; | |
50 EXPECT_FALSE(cryptographer.Encrypt(original, &encrypted)); | |
51 } | |
52 | |
53 TEST(CryptographerTest, MissingCantDecrypt) { | |
54 Cryptographer cryptographer; | |
55 | |
56 KeyParams params = {"localhost", "dummy", "dummy"}; | |
57 cryptographer.AddKey(params); | |
58 EXPECT_TRUE(cryptographer.is_ready()); | |
59 | |
60 sync_pb::EncryptedData encrypted; | |
61 encrypted.set_key_name("foo"); | |
62 encrypted.set_blob("bar"); | |
63 | |
64 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); | |
65 } | |
66 | |
67 TEST(CryptographerTest, CanEncryptAndDecrypt) { | |
68 Cryptographer cryptographer; | |
69 | |
70 KeyParams params = {"localhost", "dummy", "dummy"}; | |
71 EXPECT_TRUE(cryptographer.AddKey(params)); | |
72 EXPECT_TRUE(cryptographer.is_ready()); | |
73 | |
74 sync_pb::PasswordSpecificsData original; | |
75 original.set_origin("http://example.com"); | |
76 original.set_username_value("azure"); | |
77 original.set_password_value("hunter2"); | |
78 | |
79 sync_pb::EncryptedData encrypted; | |
80 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); | |
81 | |
82 sync_pb::PasswordSpecificsData decrypted; | |
83 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); | |
84 | |
85 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | |
86 } | |
87 | |
88 TEST(CryptographerTest, AddKeySetsDefault) { | |
89 Cryptographer cryptographer; | |
90 | |
91 KeyParams params1 = {"localhost", "dummy", "dummy1"}; | |
92 EXPECT_TRUE(cryptographer.AddKey(params1)); | |
93 EXPECT_TRUE(cryptographer.is_ready()); | |
94 | |
95 sync_pb::PasswordSpecificsData original; | |
96 original.set_origin("http://example.com"); | |
97 original.set_username_value("azure"); | |
98 original.set_password_value("hunter2"); | |
99 | |
100 sync_pb::EncryptedData encrypted1; | |
101 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted1)); | |
102 sync_pb::EncryptedData encrypted2; | |
103 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted2)); | |
104 | |
105 KeyParams params2 = {"localhost", "dummy", "dummy2"}; | |
106 EXPECT_TRUE(cryptographer.AddKey(params2)); | |
107 EXPECT_TRUE(cryptographer.is_ready()); | |
108 | |
109 sync_pb::EncryptedData encrypted3; | |
110 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted3)); | |
111 sync_pb::EncryptedData encrypted4; | |
112 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted4)); | |
113 | |
114 EXPECT_EQ(encrypted1.key_name(), encrypted2.key_name()); | |
115 EXPECT_NE(encrypted1.key_name(), encrypted3.key_name()); | |
116 EXPECT_EQ(encrypted3.key_name(), encrypted4.key_name()); | |
117 } | |
118 | |
119 // Crashes, Bug 55178. | |
120 #if defined(OS_WIN) | |
121 #define MAYBE_EncryptExportDecrypt DISABLED_EncryptExportDecrypt | |
122 #else | |
123 #define MAYBE_EncryptExportDecrypt EncryptExportDecrypt | |
124 #endif | |
125 TEST(CryptographerTest, MAYBE_EncryptExportDecrypt) { | |
126 sync_pb::EncryptedData nigori; | |
127 sync_pb::EncryptedData encrypted; | |
128 | |
129 sync_pb::PasswordSpecificsData original; | |
130 original.set_origin("http://example.com"); | |
131 original.set_username_value("azure"); | |
132 original.set_password_value("hunter2"); | |
133 | |
134 { | |
135 Cryptographer cryptographer; | |
136 | |
137 KeyParams params = {"localhost", "dummy", "dummy"}; | |
138 cryptographer.AddKey(params); | |
139 EXPECT_TRUE(cryptographer.is_ready()); | |
140 | |
141 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); | |
142 EXPECT_TRUE(cryptographer.GetKeys(&nigori)); | |
143 } | |
144 | |
145 { | |
146 Cryptographer cryptographer; | |
147 EXPECT_FALSE(cryptographer.CanDecrypt(nigori)); | |
148 | |
149 cryptographer.SetPendingKeys(nigori); | |
150 EXPECT_FALSE(cryptographer.is_ready()); | |
151 EXPECT_TRUE(cryptographer.has_pending_keys()); | |
152 | |
153 KeyParams params = {"localhost", "dummy", "dummy"}; | |
154 EXPECT_TRUE(cryptographer.DecryptPendingKeys(params)); | |
155 EXPECT_TRUE(cryptographer.is_ready()); | |
156 EXPECT_FALSE(cryptographer.has_pending_keys()); | |
157 | |
158 sync_pb::PasswordSpecificsData decrypted; | |
159 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); | |
160 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | |
161 } | |
162 } | |
163 | |
164 // Crashes, Bug 55178. | |
165 #if defined(OS_WIN) | |
166 #define MAYBE_PackUnpack DISABLED_PackUnpack | |
167 #else | |
168 #define MAYBE_PackUnpack PackUnpack | |
169 #endif | |
170 TEST(CryptographerTest, MAYBE_PackUnpack) { | |
171 #if defined(OS_MACOSX) | |
172 Encryptor::UseMockKeychain(true); | |
173 #endif | |
174 | |
175 Nigori nigori; | |
176 ASSERT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); | |
177 std::string expected_user, expected_encryption, expected_mac; | |
178 ASSERT_TRUE(nigori.ExportKeys(&expected_user, &expected_encryption, | |
179 &expected_mac)); | |
180 | |
181 Cryptographer cryptographer; | |
182 std::string token; | |
183 EXPECT_TRUE(cryptographer.PackBootstrapToken(&nigori, &token)); | |
184 EXPECT_TRUE(IsStringUTF8(token)); | |
185 | |
186 scoped_ptr<Nigori> unpacked(cryptographer.UnpackBootstrapToken(token)); | |
187 EXPECT_NE(static_cast<Nigori*>(NULL), unpacked.get()); | |
188 | |
189 std::string user_key, encryption_key, mac_key; | |
190 ASSERT_TRUE(unpacked->ExportKeys(&user_key, &encryption_key, &mac_key)); | |
191 | |
192 EXPECT_EQ(expected_user, user_key); | |
193 EXPECT_EQ(expected_encryption, encryption_key); | |
194 EXPECT_EQ(expected_mac, mac_key); | |
195 } | |
196 | |
197 TEST(CryptographerTest, NigoriEncryptionTypes) { | |
198 Cryptographer cryptographer; | |
199 Cryptographer cryptographer2; | |
200 sync_pb::NigoriSpecifics nigori; | |
201 | |
202 StrictMock<MockObserver> observer; | |
203 cryptographer.AddObserver(&observer); | |
204 StrictMock<MockObserver> observer2; | |
205 cryptographer2.AddObserver(&observer2); | |
206 | |
207 // Just set the sensitive types (shouldn't trigger any | |
208 // notifications). | |
209 ModelTypeSet encrypted_types(Cryptographer::SensitiveTypes()); | |
210 cryptographer.SetEncryptedTypesForTest(encrypted_types); | |
211 cryptographer.UpdateNigoriFromEncryptedTypes(&nigori); | |
212 cryptographer2.UpdateEncryptedTypesFromNigori(nigori); | |
213 EXPECT_EQ(encrypted_types, cryptographer.GetEncryptedTypes()); | |
214 EXPECT_EQ(encrypted_types, cryptographer2.GetEncryptedTypes()); | |
215 | |
216 Mock::VerifyAndClearExpectations(&observer); | |
217 Mock::VerifyAndClearExpectations(&observer2); | |
218 | |
219 EXPECT_CALL(observer, | |
220 OnEncryptedTypesChanged(syncable::GetAllRealModelTypes(), | |
221 false)); | |
222 EXPECT_CALL(observer2, | |
223 OnEncryptedTypesChanged(syncable::GetAllRealModelTypes(), | |
224 false)); | |
225 | |
226 // Set all encrypted types | |
227 encrypted_types = syncable::GetAllRealModelTypes(); | |
228 cryptographer.SetEncryptedTypesForTest(encrypted_types); | |
229 cryptographer.UpdateNigoriFromEncryptedTypes(&nigori); | |
230 cryptographer2.UpdateEncryptedTypesFromNigori(nigori); | |
231 EXPECT_EQ(encrypted_types, cryptographer.GetEncryptedTypes()); | |
232 EXPECT_EQ(encrypted_types, cryptographer2.GetEncryptedTypes()); | |
233 } | |
234 | |
235 TEST(CryptographerTest, EncryptEverythingExplicit) { | |
236 ModelTypeSet real_types = syncable::GetAllRealModelTypes(); | |
237 sync_pb::NigoriSpecifics specifics; | |
238 specifics.set_encrypt_everything(true); | |
239 | |
240 Cryptographer cryptographer; | |
241 StrictMock<MockObserver> observer; | |
242 cryptographer.AddObserver(&observer); | |
243 | |
244 EXPECT_CALL(observer, | |
245 OnEncryptedTypesChanged(syncable::GetAllRealModelTypes(), | |
246 true)); | |
247 | |
248 EXPECT_FALSE(cryptographer.encrypt_everything()); | |
249 ModelTypeSet encrypted_types = cryptographer.GetEncryptedTypes(); | |
250 for (ModelTypeSet::iterator iter = real_types.begin(); | |
251 iter != real_types.end(); | |
252 ++iter) { | |
253 if (*iter == syncable::PASSWORDS || *iter == syncable::NIGORI) | |
254 EXPECT_EQ(1U, encrypted_types.count(*iter)); | |
255 else | |
256 EXPECT_EQ(0U, encrypted_types.count(*iter)); | |
257 } | |
258 | |
259 cryptographer.UpdateEncryptedTypesFromNigori(specifics); | |
260 | |
261 EXPECT_TRUE(cryptographer.encrypt_everything()); | |
262 encrypted_types = cryptographer.GetEncryptedTypes(); | |
263 for (ModelTypeSet::iterator iter = real_types.begin(); | |
264 iter != real_types.end(); | |
265 ++iter) { | |
266 EXPECT_EQ(1U, encrypted_types.count(*iter)); | |
267 } | |
268 | |
269 // Shouldn't trigger another notification. | |
270 specifics.set_encrypt_everything(true); | |
271 | |
272 cryptographer.RemoveObserver(&observer); | |
273 } | |
274 | |
275 TEST(CryptographerTest, EncryptEverythingImplicit) { | |
276 ModelTypeSet real_types = syncable::GetAllRealModelTypes(); | |
277 sync_pb::NigoriSpecifics specifics; | |
278 specifics.set_encrypt_bookmarks(true); // Non-passwords = encrypt everything | |
279 | |
280 Cryptographer cryptographer; | |
281 StrictMock<MockObserver> observer; | |
282 cryptographer.AddObserver(&observer); | |
283 | |
284 EXPECT_CALL(observer, | |
285 OnEncryptedTypesChanged(syncable::GetAllRealModelTypes(), | |
286 true)); | |
287 | |
288 EXPECT_FALSE(cryptographer.encrypt_everything()); | |
289 ModelTypeSet encrypted_types = cryptographer.GetEncryptedTypes(); | |
290 for (ModelTypeSet::iterator iter = real_types.begin(); | |
291 iter != real_types.end(); | |
292 ++iter) { | |
293 if (*iter == syncable::PASSWORDS || *iter == syncable::NIGORI) | |
294 EXPECT_EQ(1U, encrypted_types.count(*iter)); | |
295 else | |
296 EXPECT_EQ(0U, encrypted_types.count(*iter)); | |
297 } | |
298 | |
299 cryptographer.UpdateEncryptedTypesFromNigori(specifics); | |
300 | |
301 EXPECT_TRUE(cryptographer.encrypt_everything()); | |
302 encrypted_types = cryptographer.GetEncryptedTypes(); | |
303 for (ModelTypeSet::iterator iter = real_types.begin(); | |
304 iter != real_types.end(); | |
305 ++iter) { | |
306 EXPECT_EQ(1U, encrypted_types.count(*iter)); | |
307 } | |
308 | |
309 // Shouldn't trigger another notification. | |
310 specifics.set_encrypt_everything(true); | |
311 | |
312 cryptographer.RemoveObserver(&observer); | |
313 } | |
314 | |
315 TEST(CryptographerTest, UnknownSensitiveTypes) { | |
316 ModelTypeSet real_types = syncable::GetAllRealModelTypes(); | |
317 sync_pb::NigoriSpecifics specifics; | |
318 // Explicitly setting encrypt everything should override logic for implicit | |
319 // encrypt everything. | |
320 specifics.set_encrypt_everything(false); | |
321 specifics.set_encrypt_bookmarks(true); | |
322 | |
323 Cryptographer cryptographer; | |
324 StrictMock<MockObserver> observer; | |
325 cryptographer.AddObserver(&observer); | |
326 | |
327 syncable::ModelTypeSet expected_encrypted_types = | |
328 Cryptographer::SensitiveTypes(); | |
329 expected_encrypted_types.insert(syncable::BOOKMARKS); | |
330 | |
331 EXPECT_CALL(observer, | |
332 OnEncryptedTypesChanged(expected_encrypted_types, | |
333 false)); | |
334 | |
335 EXPECT_FALSE(cryptographer.encrypt_everything()); | |
336 ModelTypeSet encrypted_types = cryptographer.GetEncryptedTypes(); | |
337 for (ModelTypeSet::iterator iter = real_types.begin(); | |
338 iter != real_types.end(); | |
339 ++iter) { | |
340 if (*iter == syncable::PASSWORDS || *iter == syncable::NIGORI) | |
341 EXPECT_EQ(1U, encrypted_types.count(*iter)); | |
342 else | |
343 EXPECT_EQ(0U, encrypted_types.count(*iter)); | |
344 } | |
345 | |
346 cryptographer.UpdateEncryptedTypesFromNigori(specifics); | |
347 | |
348 EXPECT_FALSE(cryptographer.encrypt_everything()); | |
349 encrypted_types = cryptographer.GetEncryptedTypes(); | |
350 for (ModelTypeSet::iterator iter = real_types.begin(); | |
351 iter != real_types.end(); | |
352 ++iter) { | |
353 if (*iter == syncable::PASSWORDS || | |
354 *iter == syncable::NIGORI || | |
355 *iter == syncable::BOOKMARKS) | |
356 EXPECT_EQ(1U, encrypted_types.count(*iter)); | |
357 else | |
358 EXPECT_EQ(0U, encrypted_types.count(*iter)); | |
359 } | |
360 | |
361 cryptographer.RemoveObserver(&observer); | |
362 } | |
363 | |
364 } // namespace browser_sync | |
OLD | NEW |