Searched defs:nigori (Results 1 - 9 of 9) sorted by relevance
/external/chromium/chrome/browser/sync/syncable/ |
H A D | nigori_util_unittest.cc | 13 sync_pb::NigoriSpecifics nigori; local 15 FillNigoriEncryptedTypes(encrypted_types, &nigori); 16 ModelTypeSet test_types = GetEncryptedDataTypesFromNigori(nigori); 22 FillNigoriEncryptedTypes(encrypted_types, &nigori); 23 test_types = GetEncryptedDataTypesFromNigori(nigori); 30 FillNigoriEncryptedTypes(encrypted_types, &nigori); 31 test_types = GetEncryptedDataTypesFromNigori(nigori);
|
H A D | nigori_util.cc | 25 // Can happen if we fail to apply the nigori node due to a conflict. 26 VLOG(1) << "Nigori node does not have nigori extension. Assuming no" 32 specifics.GetExtension(sync_pb::nigori)); 36 const sync_pb::NigoriSpecifics& nigori) { 39 if (nigori.encrypt_bookmarks()) 41 if (nigori.encrypt_preferences()) 43 if (nigori.encrypt_autofill_profile()) 45 if (nigori.encrypt_autofill()) 47 if (nigori.encrypt_themes()) 49 if (nigori 35 GetEncryptedDataTypesFromNigori( const sync_pb::NigoriSpecifics& nigori) argument 60 FillNigoriEncryptedTypes(const ModelTypeSet& types, sync_pb::NigoriSpecifics* nigori) argument [all...] |
/external/chromium/chrome/browser/sync/util/ |
H A D | nigori_unittest.cc | 5 #include "chrome/browser/sync/util/nigori.h" 17 Nigori nigori; local 18 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 21 EXPECT_TRUE(nigori.Permute(Nigori::Password, "test name", 52 Nigori nigori; local 53 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1)); 61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2)); 67 Nigori nigori; local 68 EXPECT_TRUE(nigori 82 Nigori nigori; local 97 Nigori nigori; local 115 Nigori nigori; local [all...] |
H A D | cryptographer_unittest.cc | 101 sync_pb::EncryptedData nigori; local 117 EXPECT_TRUE(cryptographer.GetKeys(&nigori)); 122 EXPECT_FALSE(cryptographer.CanDecrypt(nigori)); 124 cryptographer.SetPendingKeys(nigori); 150 Nigori nigori; local 151 ASSERT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 153 ASSERT_TRUE(nigori.ExportKeys(&expected_user, &expected_encryption, 158 EXPECT_TRUE(cryptographer.PackBootstrapToken(&nigori, &token));
|
H A D | cryptographer.cc | 17 const char kNigoriKeyName[] = "nigori-key"; 30 scoped_ptr<Nigori> nigori(UnpackBootstrapToken(restored_bootstrap_token)); 31 if (nigori.get()) 32 AddKeyImpl(nigori.release()); 95 const Nigori& nigori = *it->second; local 98 nigori.ExportKeys(key->mutable_user_key(), 111 scoped_ptr<Nigori> nigori(new Nigori); 112 if (!nigori->InitByDerivation(params.hostname, 118 return AddKeyImpl(nigori.release()); 122 scoped_ptr<Nigori> nigori(initialized_nigor 150 Nigori nigori; local 180 PackBootstrapToken(const Nigori* nigori, std::string* pack_into) const argument [all...] |
/external/chromium/chrome/browser/sync/engine/ |
H A D | apply_updates_command_unittest.cc | 338 sync_pb::NigoriSpecifics* nigori = local 339 specifics.MutableExtension(sync_pb::nigori); 340 other_cryptographer.GetKeys(nigori->mutable_encrypted()); 341 nigori->set_encrypt_bookmarks(true); 354 << "The nigori update shouldn't be in conflict"; 356 << "The nigori update should be applied"; 406 sync_pb::NigoriSpecifics* nigori = local 407 specifics.MutableExtension(sync_pb::nigori); 408 cryptographer->GetKeys(nigori->mutable_encrypted()); 409 nigori 503 sync_pb::NigoriSpecifics* nigori = local [all...] |
H A D | syncer_util.cc | 294 if (specifics.HasExtension(sync_pb::nigori)) { 295 const sync_pb::NigoriSpecifics& nigori = local 296 specifics.GetExtension(sync_pb::nigori); 297 if (!nigori.encrypted().blob().empty()) { 298 if (cryptographer->CanDecrypt(nigori.encrypted())) { 299 cryptographer->SetKeys(nigori.encrypted()); 301 cryptographer->SetPendingKeys(nigori.encrypted()); 307 syncable::GetEncryptedDataTypesFromNigori(nigori); 314 // unsynced change and not the nigori node. We ensure foward progress 319 VLOG(1) << "Marking nigori nod [all...] |
H A D | syncapi_unittest.cc | 146 // Attempt to lookup by nigori tag. 715 // We need to create the nigori node as if it were an applied server update. 721 // Set the nigori cryptographer information. 728 sync_pb::NigoriSpecifics nigori; local 729 cryptographer->GetKeys(nigori.mutable_encrypted()); 732 node.SetNigoriSpecifics(nigori); 1127 encrypted_types.erase(syncable::PASSWORDS); // Not stored in nigori node.
|
H A D | syncapi.cc | 384 return unencrypted.GetExtension(sync_pb::nigori); 553 entity_specifics.MutableExtension(sync_pb::nigori)->CopyFrom(new_value); 1501 // Helper for migration to new nigori proto to set 1774 sync_pb::NigoriSpecifics nigori; 1787 nigori.CopyFrom(node.GetNigoriSpecifics()); 1788 if (!nigori.encrypted().blob().empty()) { 1789 if (cryptographer->CanDecrypt(nigori.encrypted())) { 1790 cryptographer->SetKeys(nigori.encrypted()); 1792 cryptographer->SetPendingKeys(nigori.encrypted()); 1801 syncable::GetEncryptedDataTypesFromNigori(nigori); 2032 sync_pb::NigoriSpecifics nigori; local 2490 const sync_pb::NigoriSpecifics& nigori = node.GetNigoriSpecifics(); local [all...] |
Completed in 84 milliseconds