summaryrefslogtreecommitdiffstats
path: root/sync/util/nigori.h
diff options
context:
space:
mode:
authorakalin@chromium.org <akalin@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-03-15 09:35:42 +0000
committerakalin@chromium.org <akalin@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-03-15 09:35:42 +0000
commitc1c32c85357f14756247b04b8b5ae41b05bf2e16 (patch)
tree58f25f64e1fa592e8daf276ef69901cd2218f929 /sync/util/nigori.h
parent63ee33bde2ec8471a70f0f0ec6a1962dd07fc8ab (diff)
downloadchromium_src-c1c32c85357f14756247b04b8b5ae41b05bf2e16.zip
chromium_src-c1c32c85357f14756247b04b8b5ae41b05bf2e16.tar.gz
chromium_src-c1c32c85357f14756247b04b8b5ae41b05bf2e16.tar.bz2
[Sync] Move 'sync' target to sync/
Also move related test files. Move WriteNode::UpdateEntryWithEncryption to nigori_util.h. Clean up defines and dependencies. In particular, get rid of SYNC_ENGINE_VERSION_STRING and hard-code the string in the single place it's used. Rename data_encryption.* to data_encryption_win.* and add a pragma for crypt32.lib. Clean up exit-time constructor warnings in sync{able,er}_unittest.cc. Remove some unused files. BUG=117585 TEST= TBR=jhawkins@chromium.org Review URL: https://chromiumcodereview.appspot.com/9699057 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@126872 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sync/util/nigori.h')
-rw-r--r--sync/util/nigori.h83
1 files changed, 83 insertions, 0 deletions
diff --git a/sync/util/nigori.h b/sync/util/nigori.h
new file mode 100644
index 0000000..eb7dc5d
--- /dev/null
+++ b/sync/util/nigori.h
@@ -0,0 +1,83 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef SYNC_UTIL_NIGORI_H_
+#define SYNC_UTIL_NIGORI_H_
+#pragma once
+
+#include <string>
+
+#include "base/memory/scoped_ptr.h"
+#include "crypto/symmetric_key.h"
+
+namespace browser_sync {
+
+// A (partial) implementation of Nigori, a protocol to securely store secrets in
+// the cloud. This implementation does not support server authentication or
+// assisted key derivation.
+//
+// To store secrets securely, use the |Permute| method to derive a lookup name
+// for your secret (basically a map key), and |Encrypt| and |Decrypt| to store
+// and retrieve the secret.
+//
+// TODO: Link to doc.
+class Nigori {
+ public:
+ enum Type {
+ Password = 1,
+ };
+
+ Nigori();
+ virtual ~Nigori();
+
+ // Initialize the client with the given |hostname|, |username| and |password|.
+ bool InitByDerivation(const std::string& hostname,
+ const std::string& username,
+ const std::string& password);
+
+ // Initialize the client by importing the given keys instead of deriving new
+ // ones.
+ bool InitByImport(const std::string& user_key,
+ const std::string& encryption_key,
+ const std::string& mac_key);
+
+ // Derives a secure lookup name from |type| and |name|. If |hostname|,
+ // |username| and |password| are kept constant, a given |type| and |name| pair
+ // always yields the same |permuted| value. Note that |permuted| will be
+ // Base64 encoded.
+ bool Permute(Type type, const std::string& name, std::string* permuted) const;
+
+ // Encrypts |value|. Note that on success, |encrypted| will be Base64
+ // encoded.
+ bool Encrypt(const std::string& value, std::string* encrypted) const;
+
+ // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64
+ // encoded.
+ bool Decrypt(const std::string& value, std::string* decrypted) const;
+
+ // Exports the raw derived keys.
+ bool ExportKeys(std::string* user_key,
+ std::string* encryption_key,
+ std::string* mac_key) const;
+
+ static const char kSaltSalt[]; // The salt used to derive the user salt.
+ static const size_t kSaltKeySizeInBits = 128;
+ static const size_t kDerivedKeySizeInBits = 128;
+ static const size_t kIvSize = 16;
+ static const size_t kHashSize = 32;
+
+ static const size_t kSaltIterations = 1001;
+ static const size_t kUserIterations = 1002;
+ static const size_t kEncryptionIterations = 1003;
+ static const size_t kSigningIterations = 1004;
+
+ private:
+ scoped_ptr<crypto::SymmetricKey> user_key_;
+ scoped_ptr<crypto::SymmetricKey> encryption_key_;
+ scoped_ptr<crypto::SymmetricKey> mac_key_;
+};
+
+} // namespace browser_sync
+
+#endif // SYNC_UTIL_NIGORI_H_