OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/sync/internal_api/syncapi_internal.h" | |
6 | |
7 #include "base/memory/scoped_ptr.h" | |
8 #include "sync/protocol/password_specifics.pb.h" | |
9 #include "sync/protocol/sync.pb.h" | |
10 #include "sync/util/cryptographer.h" | |
11 | |
12 using browser_sync::Cryptographer; | |
13 | |
14 namespace sync_api { | |
15 | |
16 sync_pb::PasswordSpecificsData* DecryptPasswordSpecifics( | |
17 const sync_pb::EntitySpecifics& specifics, Cryptographer* crypto) { | |
18 if (!specifics.has_password()) | |
19 return NULL; | |
20 const sync_pb::PasswordSpecifics& password_specifics = specifics.password(); | |
21 if (!password_specifics.has_encrypted()) | |
22 return NULL; | |
23 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); | |
24 scoped_ptr<sync_pb::PasswordSpecificsData> data( | |
25 new sync_pb::PasswordSpecificsData); | |
26 if (!crypto->Decrypt(encrypted, data.get())) | |
27 return NULL; | |
28 return data.release(); | |
29 } | |
30 | |
31 // The list of names which are reserved for use by the server. | |
32 static const char* kForbiddenServerNames[] = { "", ".", ".." }; | |
33 | |
34 // When taking a name from the syncapi, append a space if it matches the | |
35 // pattern of a server-illegal name followed by zero or more spaces. | |
36 void SyncAPINameToServerName(const std::string& sync_api_name, | |
37 std::string* out) { | |
38 *out = sync_api_name; | |
39 if (IsNameServerIllegalAfterTrimming(*out)) | |
40 out->append(" "); | |
41 } | |
42 | |
43 // Checks whether |name| is a server-illegal name followed by zero or more space | |
44 // characters. The three server-illegal names are the empty string, dot, and | |
45 // dot-dot. Very long names (>255 bytes in UTF-8 Normalization Form C) are | |
46 // also illegal, but are not considered here. | |
47 bool IsNameServerIllegalAfterTrimming(const std::string& name) { | |
48 size_t untrimmed_count = name.find_last_not_of(' ') + 1; | |
49 for (size_t i = 0; i < arraysize(kForbiddenServerNames); ++i) { | |
50 if (name.compare(0, untrimmed_count, kForbiddenServerNames[i]) == 0) | |
51 return true; | |
52 } | |
53 return false; | |
54 } | |
55 | |
56 // Compare the values of two EntitySpecifics, accounting for encryption. | |
57 bool AreSpecificsEqual(const browser_sync::Cryptographer* cryptographer, | |
58 const sync_pb::EntitySpecifics& left, | |
59 const sync_pb::EntitySpecifics& right) { | |
60 // Note that we can't compare encrypted strings directly as they are seeded | |
61 // with a random value. | |
62 std::string left_plaintext, right_plaintext; | |
63 if (left.has_encrypted()) { | |
64 if (!cryptographer->CanDecrypt(left.encrypted())) { | |
65 NOTREACHED() << "Attempting to compare undecryptable data."; | |
66 return false; | |
67 } | |
68 left_plaintext = cryptographer->DecryptToString(left.encrypted()); | |
69 } else { | |
70 left_plaintext = left.SerializeAsString(); | |
71 } | |
72 if (right.has_encrypted()) { | |
73 if (!cryptographer->CanDecrypt(right.encrypted())) { | |
74 NOTREACHED() << "Attempting to compare undecryptable data."; | |
75 return false; | |
76 } | |
77 right_plaintext = cryptographer->DecryptToString(right.encrypted()); | |
78 } else { | |
79 right_plaintext = right.SerializeAsString(); | |
80 } | |
81 if (left_plaintext == right_plaintext) { | |
82 return true; | |
83 } | |
84 return false; | |
85 } | |
86 | |
87 } // namespace sync_api | |
OLD | NEW |