OLD | NEW |
| (Empty) |
1 // Copyright 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #ifndef SYNC_UTIL_CRYPTOGRAPHER_H_ | |
6 #define SYNC_UTIL_CRYPTOGRAPHER_H_ | |
7 | |
8 #include <map> | |
9 #include <memory> | |
10 #include <string> | |
11 | |
12 #include "base/macros.h" | |
13 #include "base/memory/linked_ptr.h" | |
14 #include "sync/base/sync_export.h" | |
15 #include "sync/protocol/encryption.pb.h" | |
16 #include "sync/util/nigori.h" | |
17 | |
18 namespace sync_pb { | |
19 class NigoriKeyBag; | |
20 class NigoriSpecifics; | |
21 } | |
22 | |
23 namespace syncer { | |
24 | |
25 class Encryptor; | |
26 | |
27 SYNC_EXPORT extern const char kNigoriTag[]; | |
28 | |
29 // The parameters used to initialize a Nigori instance. | |
30 struct KeyParams { | |
31 std::string hostname; | |
32 std::string username; | |
33 std::string password; | |
34 }; | |
35 | |
36 // This class manages the Nigori objects used to encrypt and decrypt sensitive | |
37 // sync data (eg. passwords). Each Nigori object knows how to handle data | |
38 // protected with a particular passphrase. | |
39 // | |
40 // Whenever an update to the Nigori sync node is received from the server, | |
41 // SetPendingKeys should be called with the encrypted contents of that node. | |
42 // Most likely, an updated Nigori node means that a new passphrase has been set | |
43 // and that future node updates won't be decryptable. To remedy this, the user | |
44 // should be prompted for the new passphrase and DecryptPendingKeys be called. | |
45 // | |
46 // Whenever a update to an encrypted node is received from the server, | |
47 // CanDecrypt should be used to verify whether the Cryptographer can decrypt | |
48 // that node. If it cannot, then the application of that update should be | |
49 // delayed until after it can be decrypted. | |
50 class SYNC_EXPORT Cryptographer { | |
51 public: | |
52 // Does not take ownership of |encryptor|. | |
53 explicit Cryptographer(Encryptor* encryptor); | |
54 explicit Cryptographer(const Cryptographer& other); | |
55 ~Cryptographer(); | |
56 | |
57 // |restored_bootstrap_token| can be provided via this method to bootstrap | |
58 // Cryptographer instance into the ready state (is_ready will be true). | |
59 // It must be a string that was previously built by the | |
60 // GetSerializedBootstrapToken function. It is possible that the token is no | |
61 // longer valid (due to server key change), in which case the normal | |
62 // decryption code paths will fail and the user will need to provide a new | |
63 // passphrase. | |
64 // It is an error to call this if is_ready() == true, though it is fair to | |
65 // never call Bootstrap at all. | |
66 void Bootstrap(const std::string& restored_bootstrap_token); | |
67 | |
68 // Returns whether we can decrypt |encrypted| using the keys we currently know | |
69 // about. | |
70 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const; | |
71 | |
72 // Returns whether |encrypted| can be decrypted using the default encryption | |
73 // key. | |
74 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const; | |
75 | |
76 // Encrypts |message| into |encrypted|. Does not overwrite |encrypted| if | |
77 // |message| already matches the decrypted data within |encrypted| and | |
78 // |encrypted| was encrypted with the current default key. This avoids | |
79 // unnecessarily modifying |encrypted| if the change had no practical effect. | |
80 // Returns true unless encryption fails or |message| isn't valid (e.g. a | |
81 // required field isn't set). | |
82 bool Encrypt(const ::google::protobuf::MessageLite& message, | |
83 sync_pb::EncryptedData* encrypted) const; | |
84 | |
85 // Encrypted |serialized| into |encrypted|. Does not overwrite |encrypted| if | |
86 // |message| already matches the decrypted data within |encrypted| and | |
87 // |encrypted| was encrypted with the current default key. This avoids | |
88 // unnecessarily modifying |encrypted| if the change had no practical effect. | |
89 // Returns true unless encryption fails or |message| isn't valid (e.g. a | |
90 // required field isn't set). | |
91 bool EncryptString(const std::string& serialized, | |
92 sync_pb::EncryptedData* encrypted) const; | |
93 | |
94 // Decrypts |encrypted| into |message|. Returns true unless decryption fails, | |
95 // or |message| fails to parse the decrypted data. | |
96 bool Decrypt(const sync_pb::EncryptedData& encrypted, | |
97 ::google::protobuf::MessageLite* message) const; | |
98 | |
99 // Decrypts |encrypted| and returns plaintext decrypted data. If decryption | |
100 // fails, returns empty string. | |
101 std::string DecryptToString(const sync_pb::EncryptedData& encrypted) const; | |
102 | |
103 // Encrypts the set of currently known keys into |encrypted|. Returns true if | |
104 // successful. | |
105 bool GetKeys(sync_pb::EncryptedData* encrypted) const; | |
106 | |
107 // Creates a new Nigori instance using |params|. If successful, |params| will | |
108 // become the default encryption key and be used for all future calls to | |
109 // Encrypt. | |
110 // Will decrypt the pending keys and install them if possible (pending key | |
111 // will not overwrite default). | |
112 bool AddKey(const KeyParams& params); | |
113 | |
114 // Same as AddKey(..), but builds the new Nigori from a previously persisted | |
115 // bootstrap token. This can be useful when consuming a bootstrap token | |
116 // with a cryptographer that has already been initialized. | |
117 // Updates the default key. | |
118 // Will decrypt the pending keys and install them if possible (pending key | |
119 // will not overwrite default). | |
120 bool AddKeyFromBootstrapToken(const std::string& restored_bootstrap_token); | |
121 | |
122 // Creates a new Nigori instance using |params|. If successful, |params| | |
123 // will be added to the nigori keybag, but will not be the default encryption | |
124 // key (default_nigori_ will remain the same). | |
125 // Prereq: is_initialized() must be true. | |
126 // Will decrypt the pending keys and install them if possible (pending key | |
127 // will become the new default). | |
128 bool AddNonDefaultKey(const KeyParams& params); | |
129 | |
130 // Decrypts |encrypted| and uses its contents to initialize Nigori instances. | |
131 // Returns true unless decryption of |encrypted| fails. The caller is | |
132 // responsible for checking that CanDecrypt(encrypted) == true. | |
133 // Does not modify the default key. | |
134 void InstallKeys(const sync_pb::EncryptedData& encrypted); | |
135 | |
136 // Makes a local copy of |encrypted| to later be decrypted by | |
137 // DecryptPendingKeys. This should only be used if CanDecrypt(encrypted) == | |
138 // false. | |
139 void SetPendingKeys(const sync_pb::EncryptedData& encrypted); | |
140 | |
141 // Makes |pending_keys_| available to callers that may want to cache its | |
142 // value for later use on the UI thread. It is illegal to call this if the | |
143 // cryptographer has no pending keys. Like other calls that access the | |
144 // cryptographer, this method must be called from within a transaction. | |
145 const sync_pb::EncryptedData& GetPendingKeys() const; | |
146 | |
147 // Attempts to decrypt the set of keys that was copied in the previous call to | |
148 // SetPendingKeys using |params|. Returns true if the pending keys were | |
149 // successfully decrypted and installed. If successful, the default key | |
150 // is updated. | |
151 bool DecryptPendingKeys(const KeyParams& params); | |
152 | |
153 // Sets the default key to the nigori with name |key_name|. |key_name| must | |
154 // correspond to a nigori that has already been installed into the keybag. | |
155 void SetDefaultKey(const std::string& key_name); | |
156 | |
157 bool is_initialized() const { | |
158 return !nigoris_.empty() && !default_nigori_name_.empty(); | |
159 } | |
160 | |
161 // Returns whether this Cryptographer is ready to encrypt and decrypt data. | |
162 bool is_ready() const { | |
163 return is_initialized() && !has_pending_keys(); | |
164 } | |
165 | |
166 // Returns whether there is a pending set of keys that needs to be decrypted. | |
167 bool has_pending_keys() const { return NULL != pending_keys_.get(); } | |
168 | |
169 // Obtain a token that can be provided on construction to a future | |
170 // Cryptographer instance to bootstrap itself. Returns false if such a token | |
171 // can't be created (i.e. if this Cryptograhper doesn't have valid keys). | |
172 bool GetBootstrapToken(std::string* token) const; | |
173 | |
174 Encryptor* encryptor() const { return encryptor_; } | |
175 | |
176 // Returns true if |keybag| is decryptable and either is a subset of nigoris_ | |
177 // and/or has a different default key. | |
178 bool KeybagIsStale(const sync_pb::EncryptedData& keybag) const; | |
179 | |
180 // Returns the name of the Nigori key currently used for encryption. | |
181 std::string GetDefaultNigoriKeyName() const; | |
182 | |
183 // Returns a serialized sync_pb::NigoriKey version of current default | |
184 // encryption key. | |
185 std::string GetDefaultNigoriKeyData() const; | |
186 | |
187 // Generates a new Nigori from |serialized_nigori_key|, and if successful | |
188 // installs the new nigori as the default key. | |
189 bool ImportNigoriKey(const std::string& serialized_nigori_key); | |
190 | |
191 private: | |
192 typedef std::map<std::string, linked_ptr<const Nigori> > NigoriMap; | |
193 | |
194 // Helper method to instantiate Nigori instances for each set of key | |
195 // parameters in |bag|. | |
196 // Does not update the default nigori. | |
197 void InstallKeyBag(const sync_pb::NigoriKeyBag& bag); | |
198 | |
199 // Helper method to add a nigori to the keybag, optionally making it the | |
200 // default as well. | |
201 bool AddKeyImpl(std::unique_ptr<Nigori> nigori, bool set_as_default); | |
202 | |
203 // Helper to unencrypt a bootstrap token into a serialized sync_pb::NigoriKey. | |
204 std::string UnpackBootstrapToken(const std::string& token) const; | |
205 | |
206 Encryptor* const encryptor_; | |
207 | |
208 // The Nigoris we know about, mapped by key name. | |
209 NigoriMap nigoris_; | |
210 | |
211 // The key name associated with the default nigori. If non-empty, must | |
212 // correspond to a nigori within |nigoris_|. | |
213 std::string default_nigori_name_; | |
214 | |
215 std::unique_ptr<sync_pb::EncryptedData> pending_keys_; | |
216 | |
217 DISALLOW_ASSIGN(Cryptographer); | |
218 }; | |
219 | |
220 } // namespace syncer | |
221 | |
222 #endif // SYNC_UTIL_CRYPTOGRAPHER_H_ | |
OLD | NEW |