| Index: components/os_crypt/os_crypt_linux.cc
|
| diff --git a/components/os_crypt/os_crypt_linux.cc b/components/os_crypt/os_crypt_linux.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..a1c187aef2042c1002637a3574b02207a27a5c7c
|
| --- /dev/null
|
| +++ b/components/os_crypt/os_crypt_linux.cc
|
| @@ -0,0 +1,235 @@
|
| +// Copyright 2016 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "components/os_crypt/os_crypt.h"
|
| +
|
| +#include <stddef.h>
|
| +
|
| +#include <algorithm>
|
| +#include <iterator>
|
| +#include <memory>
|
| +
|
| +#include "base/lazy_instance.h"
|
| +#include "base/logging.h"
|
| +#include "base/strings/string_util.h"
|
| +#include "base/strings/utf_string_conversions.h"
|
| +#include "components/os_crypt/key_storage_linux.h"
|
| +#include "crypto/encryptor.h"
|
| +#include "crypto/symmetric_key.h"
|
| +
|
| +namespace {
|
| +
|
| +// Salt for Symmetric key derivation.
|
| +const char kSalt[] = "saltysalt";
|
| +
|
| +// Key size required for 128 bit AES.
|
| +const size_t kDerivedKeySizeInBits = 128;
|
| +
|
| +// Constant for Symmetic key derivation.
|
| +const size_t kEncryptionIterations = 1;
|
| +
|
| +// Size of initialization vector for AES 128-bit.
|
| +const size_t kIVBlockSizeAES128 = 16;
|
| +
|
| +// Password version. V10 means that the hardcoded password will be used.
|
| +// V11 means that a password is/will be stored using an OS-level library (e.g
|
| +// Libsecret). V11 will not be used if such a library is not available.
|
| +// Used for array indexing.
|
| +enum Version {
|
| + V10 = 0,
|
| + V11 = 1,
|
| +};
|
| +
|
| +// Prefix for cipher text returned by obfuscation version. We prefix the
|
| +// ciphertext with this string so that future data migration can detect
|
| +// this and migrate to full encryption without data loss.
|
| +const char kObfuscationPrefix[][4] = {
|
| + "v10", "v11",
|
| +};
|
| +
|
| +struct Cache {
|
| + std::unique_ptr<KeyStorageLinux> key_storage_cache;
|
| + std::unique_ptr<std::string> password_v10_cache;
|
| + std::unique_ptr<std::string> password_v11_cache;
|
| + bool is_key_storage_cached;
|
| + bool is_password_v11_cached;
|
| +};
|
| +
|
| +base::LazyInstance<Cache>::Leaky g_cache = LAZY_INSTANCE_INITIALIZER;
|
| +
|
| +// Lazy acquisition and caching of a KeyStorage. Will be null if no service is
|
| +// found.
|
| +KeyStorageLinux* GetKeyStorage() {
|
| + if (!g_cache.Get().is_key_storage_cached) {
|
| + g_cache.Get().is_key_storage_cached = true;
|
| + g_cache.Get().key_storage_cache = KeyStorageLinux::CreateService();
|
| + }
|
| + return g_cache.Get().key_storage_cache.get();
|
| +}
|
| +
|
| +// Returns a cached string of "peanuts".
|
| +std::string* GetPasswordV10() {
|
| + if (!g_cache.Get().password_v10_cache.get())
|
| + g_cache.Get().password_v10_cache.reset(new std::string("peanuts"));
|
| + return g_cache.Get().password_v10_cache.get();
|
| +}
|
| +
|
| +// Caches and returns the password from the KeyStorage or null if there is no
|
| +// service.
|
| +std::string* GetPasswordV11() {
|
| + if (!g_cache.Get().is_password_v11_cached) {
|
| + g_cache.Get().is_password_v11_cached = true;
|
| + g_cache.Get().password_v11_cache.reset(
|
| + GetKeyStorage() ? new std::string(GetKeyStorage()->GetKey()) : nullptr);
|
| + }
|
| + return g_cache.Get().password_v11_cache.get();
|
| +}
|
| +
|
| +// Pointer to a function that creates and returns the |KeyStorage| instance to
|
| +// be used. The function maintains ownership of the pointer.
|
| +KeyStorageLinux* (*g_key_storage_provider)() = &GetKeyStorage;
|
| +
|
| +// Pointers to functions that return a password for deriving the encryption key.
|
| +// One function for each supported password version (see Version enum).
|
| +std::string* (*g_get_password[])() = {
|
| + &GetPasswordV10, &GetPasswordV11,
|
| +};
|
| +
|
| +// Generates a newly allocated SymmetricKey object based on a password.
|
| +// Ownership of the key is passed to the caller. Returns null key if a key
|
| +// generation error occurs.
|
| +std::unique_ptr<crypto::SymmetricKey> GetEncryptionKey(Version version) {
|
| + std::string salt(kSalt);
|
| +
|
| + std::string* password = g_get_password[version]();
|
| + if (!password)
|
| + return nullptr;
|
| +
|
| + // Create an encryption key from our password and salt.
|
| + std::unique_ptr<crypto::SymmetricKey> encryption_key(
|
| + crypto::SymmetricKey::DeriveKeyFromPassword(
|
| + crypto::SymmetricKey::AES, *password, salt, kEncryptionIterations,
|
| + kDerivedKeySizeInBits));
|
| + DCHECK(encryption_key);
|
| +
|
| + return encryption_key;
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +// static
|
| +bool OSCrypt::EncryptString16(const base::string16& plaintext,
|
| + std::string* ciphertext) {
|
| + return EncryptString(base::UTF16ToUTF8(plaintext), ciphertext);
|
| +}
|
| +
|
| +// static
|
| +bool OSCrypt::DecryptString16(const std::string& ciphertext,
|
| + base::string16* plaintext) {
|
| + std::string utf8;
|
| + if (!DecryptString(ciphertext, &utf8))
|
| + return false;
|
| +
|
| + *plaintext = base::UTF8ToUTF16(utf8);
|
| + return true;
|
| +}
|
| +
|
| +// static
|
| +bool OSCrypt::EncryptString(const std::string& plaintext,
|
| + std::string* ciphertext) {
|
| + if (plaintext.empty()) {
|
| + ciphertext->clear();
|
| + return true;
|
| + }
|
| +
|
| + // If a |KeyStorage| is available, use a password backed by the |KeyStorage|.
|
| + // Otherwise use the hardcoded password.
|
| + Version version = g_key_storage_provider() ? Version::V11 : Version::V10;
|
| +
|
| + std::unique_ptr<crypto::SymmetricKey> encryption_key(
|
| + GetEncryptionKey(version));
|
| + if (!encryption_key)
|
| + return false;
|
| +
|
| + std::string iv(kIVBlockSizeAES128, ' ');
|
| + crypto::Encryptor encryptor;
|
| + if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv))
|
| + return false;
|
| +
|
| + if (!encryptor.Encrypt(plaintext, ciphertext))
|
| + return false;
|
| +
|
| + // Prefix the cipher text with version information.
|
| + ciphertext->insert(0, kObfuscationPrefix[version]);
|
| + return true;
|
| +}
|
| +
|
| +// static
|
| +bool OSCrypt::DecryptString(const std::string& ciphertext,
|
| + std::string* plaintext) {
|
| + if (ciphertext.empty()) {
|
| + plaintext->clear();
|
| + return true;
|
| + }
|
| +
|
| + // Check that the incoming ciphertext was encrypted and with what version.
|
| + // Credit card numbers are current legacy unencrypted data, so false match
|
| + // with prefix won't happen.
|
| + Version version;
|
| + if (base::StartsWith(ciphertext, kObfuscationPrefix[Version::V10],
|
| + base::CompareCase::SENSITIVE)) {
|
| + version = Version::V10;
|
| + } else if (base::StartsWith(ciphertext, kObfuscationPrefix[Version::V11],
|
| + base::CompareCase::SENSITIVE)) {
|
| + version = Version::V11;
|
| + } else {
|
| + // If the prefix is not found then we'll assume we're dealing with
|
| + // old data saved as clear text and we'll return it directly.
|
| + *plaintext = ciphertext;
|
| + return true;
|
| + }
|
| +
|
| + std::unique_ptr<crypto::SymmetricKey> encryption_key(
|
| + GetEncryptionKey(version));
|
| + if (!encryption_key)
|
| + return false;
|
| +
|
| + std::string iv(kIVBlockSizeAES128, ' ');
|
| + crypto::Encryptor encryptor;
|
| + if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv))
|
| + return false;
|
| +
|
| + // Strip off the versioning prefix before decrypting.
|
| + std::string raw_ciphertext =
|
| + ciphertext.substr(strlen(kObfuscationPrefix[version]));
|
| +
|
| + if (!encryptor.Decrypt(raw_ciphertext, plaintext))
|
| + return false;
|
| +
|
| + return true;
|
| +}
|
| +
|
| +void UseMockKeyStorageForTesting(KeyStorageLinux* (*get_key_storage_mock)(),
|
| + std::string* (*get_password_v11_mock)()) {
|
| + // Save the real implementation to restore it later.
|
| + static bool is_get_password_saved = false;
|
| + static std::string* (*get_password_save[arraysize(g_get_password)])();
|
| + if (!is_get_password_saved) {
|
| + std::copy(std::begin(g_get_password), std::end(g_get_password),
|
| + std::begin(get_password_save));
|
| + is_get_password_saved = true;
|
| + }
|
| +
|
| + if (get_key_storage_mock && get_password_v11_mock) {
|
| + // Bypass calling KeyStorage::CreateService and caching of the key for V11
|
| + g_get_password[Version::V11] = get_password_v11_mock;
|
| + // OSCrypt will determine the encryption version by checking if a
|
| + // |KeyStorage| instance can be created. Enable V11 by returning the mock.
|
| + g_key_storage_provider = get_key_storage_mock;
|
| + } else {
|
| + // Restore real implementation
|
| + std::copy(std::begin(get_password_save), std::end(get_password_save),
|
| + std::begin(g_get_password));
|
| + }
|
| +}
|
|
|