Searched refs:nigori (Results 1 - 15 of 15) sorted by relevance

/external/chromium/chrome/browser/sync/syncable/
H A Dnigori_util_unittest.cc13 sync_pb::NigoriSpecifics nigori; local
15 FillNigoriEncryptedTypes(encrypted_types, &nigori);
16 ModelTypeSet test_types = GetEncryptedDataTypesFromNigori(nigori);
22 FillNigoriEncryptedTypes(encrypted_types, &nigori);
23 test_types = GetEncryptedDataTypesFromNigori(nigori);
30 FillNigoriEncryptedTypes(encrypted_types, &nigori);
31 test_types = GetEncryptedDataTypesFromNigori(nigori);
H A Dnigori_util.cc25 // Can happen if we fail to apply the nigori node due to a conflict.
26 VLOG(1) << "Nigori node does not have nigori extension. Assuming no"
32 specifics.GetExtension(sync_pb::nigori));
36 const sync_pb::NigoriSpecifics& nigori) {
39 if (nigori.encrypt_bookmarks())
41 if (nigori.encrypt_preferences())
43 if (nigori.encrypt_autofill_profile())
45 if (nigori.encrypt_autofill())
47 if (nigori.encrypt_themes())
49 if (nigori
35 GetEncryptedDataTypesFromNigori( const sync_pb::NigoriSpecifics& nigori) argument
60 FillNigoriEncryptedTypes(const ModelTypeSet& types, sync_pb::NigoriSpecifics* nigori) argument
[all...]
H A Dnigori_util.h25 // Sync DB's nigori node. This will never include passwords, as the encryption
29 // Extract the set of encrypted datatypes from a nigori node.
31 const sync_pb::NigoriSpecifics& nigori);
33 // Set the encrypted datatypes on the nigori node.
35 sync_pb::NigoriSpecifics* nigori);
H A Dmodel_type.cc52 specifics->MutableExtension(sync_pb::nigori);
175 if (specifics.HasExtension(sync_pb::nigori))
/external/chromium/chrome/browser/sync/util/
H A Dnigori_unittest.cc5 #include "chrome/browser/sync/util/nigori.h"
17 Nigori nigori; local
18 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password"));
21 EXPECT_TRUE(nigori.Permute(Nigori::Password, "test name",
52 Nigori nigori; local
53 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password"));
58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1));
61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2));
67 Nigori nigori; local
68 EXPECT_TRUE(nigori
82 Nigori nigori; local
97 Nigori nigori; local
115 Nigori nigori; local
[all...]
H A Dcryptographer.cc17 const char kNigoriKeyName[] = "nigori-key";
30 scoped_ptr<Nigori> nigori(UnpackBootstrapToken(restored_bootstrap_token));
31 if (nigori.get())
32 AddKeyImpl(nigori.release());
95 const Nigori& nigori = *it->second; local
98 nigori.ExportKeys(key->mutable_user_key(),
111 scoped_ptr<Nigori> nigori(new Nigori);
112 if (!nigori->InitByDerivation(params.hostname,
118 return AddKeyImpl(nigori.release());
122 scoped_ptr<Nigori> nigori(initialized_nigor
150 Nigori nigori; local
180 PackBootstrapToken(const Nigori* nigori, std::string* pack_into) const argument
[all...]
H A Dcryptographer_unittest.cc101 sync_pb::EncryptedData nigori; local
117 EXPECT_TRUE(cryptographer.GetKeys(&nigori));
122 EXPECT_FALSE(cryptographer.CanDecrypt(nigori));
124 cryptographer.SetPendingKeys(nigori);
150 Nigori nigori; local
151 ASSERT_TRUE(nigori.InitByDerivation("example.com", "username", "password"));
153 ASSERT_TRUE(nigori.ExportKeys(&expected_user, &expected_encryption,
158 EXPECT_TRUE(cryptographer.PackBootstrapToken(&nigori, &token));
H A Dcryptographer.h16 #include "chrome/browser/sync/util/nigori.h"
127 bool AddKeyImpl(Nigori* nigori);
131 bool PackBootstrapToken(const Nigori* nigori, std::string* pack_into) const;
/external/chromium/chrome/browser/sync/engine/
H A Dapply_updates_command_unittest.cc338 sync_pb::NigoriSpecifics* nigori = local
339 specifics.MutableExtension(sync_pb::nigori);
340 other_cryptographer.GetKeys(nigori->mutable_encrypted());
341 nigori->set_encrypt_bookmarks(true);
354 << "The nigori update shouldn't be in conflict";
356 << "The nigori update should be applied";
406 sync_pb::NigoriSpecifics* nigori = local
407 specifics.MutableExtension(sync_pb::nigori);
408 cryptographer->GetKeys(nigori->mutable_encrypted());
409 nigori
503 sync_pb::NigoriSpecifics* nigori = local
[all...]
H A Dsyncer_util.cc294 if (specifics.HasExtension(sync_pb::nigori)) {
295 const sync_pb::NigoriSpecifics& nigori = local
296 specifics.GetExtension(sync_pb::nigori);
297 if (!nigori.encrypted().blob().empty()) {
298 if (cryptographer->CanDecrypt(nigori.encrypted())) {
299 cryptographer->SetKeys(nigori.encrypted());
301 cryptographer->SetPendingKeys(nigori.encrypted());
307 syncable::GetEncryptedDataTypesFromNigori(nigori);
314 // unsynced change and not the nigori node. We ensure foward progress
319 VLOG(1) << "Marking nigori nod
[all...]
H A Dsyncapi.cc384 return unencrypted.GetExtension(sync_pb::nigori);
553 entity_specifics.MutableExtension(sync_pb::nigori)->CopyFrom(new_value);
1501 // Helper for migration to new nigori proto to set
1774 sync_pb::NigoriSpecifics nigori;
1787 nigori.CopyFrom(node.GetNigoriSpecifics());
1788 if (!nigori.encrypted().blob().empty()) {
1789 if (cryptographer->CanDecrypt(nigori.encrypted())) {
1790 cryptographer->SetKeys(nigori.encrypted());
1792 cryptographer->SetPendingKeys(nigori.encrypted());
1801 syncable::GetEncryptedDataTypesFromNigori(nigori);
2032 sync_pb::NigoriSpecifics nigori; local
2490 const sync_pb::NigoriSpecifics& nigori = node.GetNigoriSpecifics(); local
[all...]
H A Dsyncapi_unittest.cc146 // Attempt to lookup by nigori tag.
715 // We need to create the nigori node as if it were an applied server update.
721 // Set the nigori cryptographer information.
728 sync_pb::NigoriSpecifics nigori; local
729 cryptographer->GetKeys(nigori.mutable_encrypted());
732 node.SetNigoriSpecifics(nigori);
1127 encrypted_types.erase(syncable::PASSWORDS); // Not stored in nigori node.
/external/chromium/chrome/browser/sync/protocol/
H A Dproto_value_conversions_unittest.cc146 SET_EXTENSION(nigori);
H A Dproto_value_conversions.cc303 SET_EXTENSION(sync_pb, nigori, NigoriSpecificsToValue);
/external/chromium/net/tools/testserver/
H A Dchromiumsync.py60 NIGORI: nigori_specifics_pb2.nigori,

Completed in 152 milliseconds