| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "sync/util/cryptographer.h" | |
| 6 | |
| 7 #include <string> | |
| 8 | |
| 9 #include "base/strings/string_util.h" | |
| 10 #include "sync/protocol/password_specifics.pb.h" | |
| 11 #include "sync/test/fake_encryptor.h" | |
| 12 #include "testing/gmock/include/gmock/gmock.h" | |
| 13 #include "testing/gtest/include/gtest/gtest.h" | |
| 14 | |
| 15 namespace syncer { | |
| 16 | |
| 17 namespace { | |
| 18 | |
| 19 using ::testing::_; | |
| 20 | |
| 21 } // namespace | |
| 22 | |
| 23 class CryptographerTest : public ::testing::Test { | |
| 24 protected: | |
| 25 CryptographerTest() : cryptographer_(&encryptor_) {} | |
| 26 | |
| 27 FakeEncryptor encryptor_; | |
| 28 Cryptographer cryptographer_; | |
| 29 }; | |
| 30 | |
| 31 TEST_F(CryptographerTest, EmptyCantDecrypt) { | |
| 32 EXPECT_FALSE(cryptographer_.is_ready()); | |
| 33 | |
| 34 sync_pb::EncryptedData encrypted; | |
| 35 encrypted.set_key_name("foo"); | |
| 36 encrypted.set_blob("bar"); | |
| 37 | |
| 38 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); | |
| 39 } | |
| 40 | |
| 41 TEST_F(CryptographerTest, EmptyCantEncrypt) { | |
| 42 EXPECT_FALSE(cryptographer_.is_ready()); | |
| 43 | |
| 44 sync_pb::EncryptedData encrypted; | |
| 45 sync_pb::PasswordSpecificsData original; | |
| 46 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); | |
| 47 } | |
| 48 | |
| 49 TEST_F(CryptographerTest, MissingCantDecrypt) { | |
| 50 KeyParams params = {"localhost", "dummy", "dummy"}; | |
| 51 cryptographer_.AddKey(params); | |
| 52 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 53 | |
| 54 sync_pb::EncryptedData encrypted; | |
| 55 encrypted.set_key_name("foo"); | |
| 56 encrypted.set_blob("bar"); | |
| 57 | |
| 58 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); | |
| 59 } | |
| 60 | |
| 61 TEST_F(CryptographerTest, CanEncryptAndDecrypt) { | |
| 62 KeyParams params = {"localhost", "dummy", "dummy"}; | |
| 63 EXPECT_TRUE(cryptographer_.AddKey(params)); | |
| 64 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 65 | |
| 66 sync_pb::PasswordSpecificsData original; | |
| 67 original.set_origin("http://example.com"); | |
| 68 original.set_username_value("azure"); | |
| 69 original.set_password_value("hunter2"); | |
| 70 | |
| 71 sync_pb::EncryptedData encrypted; | |
| 72 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted)); | |
| 73 | |
| 74 sync_pb::PasswordSpecificsData decrypted; | |
| 75 EXPECT_TRUE(cryptographer_.Decrypt(encrypted, &decrypted)); | |
| 76 | |
| 77 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | |
| 78 } | |
| 79 | |
| 80 TEST_F(CryptographerTest, EncryptOnlyIfDifferent) { | |
| 81 KeyParams params = {"localhost", "dummy", "dummy"}; | |
| 82 EXPECT_TRUE(cryptographer_.AddKey(params)); | |
| 83 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 84 | |
| 85 sync_pb::PasswordSpecificsData original; | |
| 86 original.set_origin("http://example.com"); | |
| 87 original.set_username_value("azure"); | |
| 88 original.set_password_value("hunter2"); | |
| 89 | |
| 90 sync_pb::EncryptedData encrypted; | |
| 91 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted)); | |
| 92 | |
| 93 sync_pb::EncryptedData encrypted2, encrypted3; | |
| 94 encrypted2.CopyFrom(encrypted); | |
| 95 encrypted3.CopyFrom(encrypted); | |
| 96 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted2)); | |
| 97 | |
| 98 // Now encrypt with a new default key. Should overwrite the old data. | |
| 99 KeyParams params_new = {"localhost", "dummy", "dummy2"}; | |
| 100 cryptographer_.AddKey(params_new); | |
| 101 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3)); | |
| 102 | |
| 103 sync_pb::PasswordSpecificsData decrypted; | |
| 104 EXPECT_TRUE(cryptographer_.Decrypt(encrypted2, &decrypted)); | |
| 105 // encrypted2 should match encrypted, encrypted3 should not (due to salting). | |
| 106 EXPECT_EQ(encrypted.SerializeAsString(), encrypted2.SerializeAsString()); | |
| 107 EXPECT_NE(encrypted.SerializeAsString(), encrypted3.SerializeAsString()); | |
| 108 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | |
| 109 } | |
| 110 | |
| 111 TEST_F(CryptographerTest, AddKeySetsDefault) { | |
| 112 KeyParams params1 = {"localhost", "dummy", "dummy1"}; | |
| 113 EXPECT_TRUE(cryptographer_.AddKey(params1)); | |
| 114 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 115 | |
| 116 sync_pb::PasswordSpecificsData original; | |
| 117 original.set_origin("http://example.com"); | |
| 118 original.set_username_value("azure"); | |
| 119 original.set_password_value("hunter2"); | |
| 120 | |
| 121 sync_pb::EncryptedData encrypted1; | |
| 122 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted1)); | |
| 123 sync_pb::EncryptedData encrypted2; | |
| 124 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted2)); | |
| 125 | |
| 126 KeyParams params2 = {"localhost", "dummy", "dummy2"}; | |
| 127 EXPECT_TRUE(cryptographer_.AddKey(params2)); | |
| 128 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 129 | |
| 130 sync_pb::EncryptedData encrypted3; | |
| 131 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3)); | |
| 132 sync_pb::EncryptedData encrypted4; | |
| 133 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted4)); | |
| 134 | |
| 135 EXPECT_EQ(encrypted1.key_name(), encrypted2.key_name()); | |
| 136 EXPECT_NE(encrypted1.key_name(), encrypted3.key_name()); | |
| 137 EXPECT_EQ(encrypted3.key_name(), encrypted4.key_name()); | |
| 138 } | |
| 139 | |
| 140 TEST_F(CryptographerTest, EncryptExportDecrypt) { | |
| 141 sync_pb::EncryptedData nigori; | |
| 142 sync_pb::EncryptedData encrypted; | |
| 143 | |
| 144 sync_pb::PasswordSpecificsData original; | |
| 145 original.set_origin("http://example.com"); | |
| 146 original.set_username_value("azure"); | |
| 147 original.set_password_value("hunter2"); | |
| 148 | |
| 149 { | |
| 150 Cryptographer cryptographer(&encryptor_); | |
| 151 | |
| 152 KeyParams params = {"localhost", "dummy", "dummy"}; | |
| 153 cryptographer.AddKey(params); | |
| 154 EXPECT_TRUE(cryptographer.is_ready()); | |
| 155 | |
| 156 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); | |
| 157 EXPECT_TRUE(cryptographer.GetKeys(&nigori)); | |
| 158 } | |
| 159 | |
| 160 { | |
| 161 Cryptographer cryptographer(&encryptor_); | |
| 162 EXPECT_FALSE(cryptographer.CanDecrypt(nigori)); | |
| 163 | |
| 164 cryptographer.SetPendingKeys(nigori); | |
| 165 EXPECT_FALSE(cryptographer.is_ready()); | |
| 166 EXPECT_TRUE(cryptographer.has_pending_keys()); | |
| 167 | |
| 168 KeyParams params = {"localhost", "dummy", "dummy"}; | |
| 169 EXPECT_TRUE(cryptographer.DecryptPendingKeys(params)); | |
| 170 EXPECT_TRUE(cryptographer.is_ready()); | |
| 171 EXPECT_FALSE(cryptographer.has_pending_keys()); | |
| 172 | |
| 173 sync_pb::PasswordSpecificsData decrypted; | |
| 174 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); | |
| 175 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); | |
| 176 } | |
| 177 } | |
| 178 | |
| 179 TEST_F(CryptographerTest, Bootstrap) { | |
| 180 KeyParams params = {"localhost", "dummy", "dummy"}; | |
| 181 cryptographer_.AddKey(params); | |
| 182 | |
| 183 std::string token; | |
| 184 EXPECT_TRUE(cryptographer_.GetBootstrapToken(&token)); | |
| 185 EXPECT_TRUE(base::IsStringUTF8(token)); | |
| 186 | |
| 187 Cryptographer other_cryptographer(&encryptor_); | |
| 188 other_cryptographer.Bootstrap(token); | |
| 189 EXPECT_TRUE(other_cryptographer.is_ready()); | |
| 190 | |
| 191 const char secret[] = "secret"; | |
| 192 sync_pb::EncryptedData encrypted; | |
| 193 EXPECT_TRUE(other_cryptographer.EncryptString(secret, &encrypted)); | |
| 194 EXPECT_TRUE(cryptographer_.CanDecryptUsingDefaultKey(encrypted)); | |
| 195 } | |
| 196 | |
| 197 // Verifies that copied cryptographers are just as good as the original. | |
| 198 // | |
| 199 // Encrypt an item using the original cryptographer and two different sets of | |
| 200 // keys. Verify that it can decrypt them. | |
| 201 // | |
| 202 // Then copy the original cryptographer and ensure it can also decrypt these | |
| 203 // items and encrypt them with the most recent key. | |
| 204 TEST_F(CryptographerTest, CopyConstructor) { | |
| 205 sync_pb::PasswordSpecificsData original; | |
| 206 original.set_origin("http://example.com"); | |
| 207 original.set_username_value("luser"); | |
| 208 original.set_password_value("p4ssw0rd"); | |
| 209 | |
| 210 // Start by testing the original cryptogprapher. | |
| 211 KeyParams params1 = {"localhost", "dummy", "dummy"}; | |
| 212 EXPECT_TRUE(cryptographer_.AddKey(params1)); | |
| 213 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 214 | |
| 215 sync_pb::EncryptedData encrypted_k1; | |
| 216 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted_k1)); | |
| 217 | |
| 218 KeyParams params2 = {"localhost", "fatuous", "fatuous"}; | |
| 219 EXPECT_TRUE(cryptographer_.AddKey(params2)); | |
| 220 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 221 | |
| 222 sync_pb::EncryptedData encrypted_k2; | |
| 223 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted_k2)); | |
| 224 | |
| 225 sync_pb::PasswordSpecificsData decrypted_k1; | |
| 226 sync_pb::PasswordSpecificsData decrypted_k2; | |
| 227 EXPECT_TRUE(cryptographer_.Decrypt(encrypted_k1, &decrypted_k1)); | |
| 228 EXPECT_TRUE(cryptographer_.Decrypt(encrypted_k2, &decrypted_k2)); | |
| 229 | |
| 230 EXPECT_EQ(original.SerializeAsString(), decrypted_k1.SerializeAsString()); | |
| 231 EXPECT_EQ(original.SerializeAsString(), decrypted_k2.SerializeAsString()); | |
| 232 | |
| 233 // Clone the cryptographer and test that it behaves the same. | |
| 234 Cryptographer cryptographer_clone(cryptographer_); | |
| 235 | |
| 236 // The clone should be able to decrypt with old and new keys. | |
| 237 sync_pb::PasswordSpecificsData decrypted_k1_clone; | |
| 238 sync_pb::PasswordSpecificsData decrypted_k2_clone; | |
| 239 EXPECT_TRUE(cryptographer_clone.Decrypt(encrypted_k1, &decrypted_k1_clone)); | |
| 240 EXPECT_TRUE(cryptographer_clone.Decrypt(encrypted_k2, &decrypted_k2_clone)); | |
| 241 | |
| 242 EXPECT_EQ(original.SerializeAsString(), | |
| 243 decrypted_k1_clone.SerializeAsString()); | |
| 244 EXPECT_EQ(original.SerializeAsString(), | |
| 245 decrypted_k2_clone.SerializeAsString()); | |
| 246 | |
| 247 // The old cryptographer should be able to decrypt things encrypted by the | |
| 248 // new. | |
| 249 sync_pb::EncryptedData encrypted_c; | |
| 250 EXPECT_TRUE(cryptographer_clone.Encrypt(original, &encrypted_c)); | |
| 251 | |
| 252 sync_pb::PasswordSpecificsData decrypted_c; | |
| 253 EXPECT_TRUE(cryptographer_.Decrypt(encrypted_c, &decrypted_c)); | |
| 254 EXPECT_EQ(original.SerializeAsString(), decrypted_c.SerializeAsString()); | |
| 255 | |
| 256 // The cloned cryptographer should be using the latest key. | |
| 257 EXPECT_EQ(encrypted_c.key_name(), encrypted_k2.key_name()); | |
| 258 } | |
| 259 | |
| 260 // Test verifies that GetBootstrapToken/Bootstrap only transfers default | |
| 261 // key. Additional call to GetKeys/InstallKeys is needed to transfer keybag | |
| 262 // to decrypt messages encrypted with old keys. | |
| 263 TEST_F(CryptographerTest, GetKeysThenInstall) { | |
| 264 sync_pb::PasswordSpecificsData original; | |
| 265 original.set_origin("http://example.com"); | |
| 266 original.set_username_value("luser"); | |
| 267 original.set_password_value("p4ssw0rd"); | |
| 268 | |
| 269 // First, encrypt the same value using two different keys. | |
| 270 KeyParams params1 = {"localhost", "dummy", "dummy"}; | |
| 271 EXPECT_TRUE(cryptographer_.AddKey(params1)); | |
| 272 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 273 | |
| 274 sync_pb::EncryptedData encrypted_k1; | |
| 275 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted_k1)); | |
| 276 | |
| 277 KeyParams params2 = {"localhost", "dummy2", "dummy2"}; | |
| 278 EXPECT_TRUE(cryptographer_.AddKey(params2)); | |
| 279 EXPECT_TRUE(cryptographer_.is_ready()); | |
| 280 | |
| 281 sync_pb::EncryptedData encrypted_k2; | |
| 282 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted_k2)); | |
| 283 | |
| 284 // Then construct second cryptographer and bootstrap it from the first one. | |
| 285 Cryptographer another_cryptographer(cryptographer_.encryptor()); | |
| 286 std::string bootstrap_token; | |
| 287 EXPECT_TRUE(cryptographer_.GetBootstrapToken(&bootstrap_token)); | |
| 288 another_cryptographer.Bootstrap(bootstrap_token); | |
| 289 | |
| 290 // Before key installation, the second cryptographer should only be able | |
| 291 // to decrypt using the last key. | |
| 292 EXPECT_FALSE(another_cryptographer.CanDecrypt(encrypted_k1)); | |
| 293 EXPECT_TRUE(another_cryptographer.CanDecrypt(encrypted_k2)); | |
| 294 | |
| 295 sync_pb::EncryptedData keys; | |
| 296 EXPECT_TRUE(cryptographer_.GetKeys(&keys)); | |
| 297 ASSERT_TRUE(another_cryptographer.CanDecrypt(keys)); | |
| 298 another_cryptographer.InstallKeys(keys); | |
| 299 | |
| 300 // Verify that bootstrapped cryptographer decrypts succesfully using | |
| 301 // all the keys after key installation. | |
| 302 EXPECT_TRUE(another_cryptographer.CanDecrypt(encrypted_k1)); | |
| 303 EXPECT_TRUE(another_cryptographer.CanDecrypt(encrypted_k2)); | |
| 304 } | |
| 305 | |
| 306 } // namespace syncer | |
| OLD | NEW |