Searched defs:cryptographer (Results 1 - 25 of 30) sorted by relevance

12

/external/chromium_org/sync/test/
H A Dfake_sync_encryption_handler.h15 #include "sync/util/cryptographer.h"
21 // Note that this only performs basic interactions with the cryptographer
57 Cryptographer* cryptographer() { return &cryptographer_; } function in class:syncer::FakeSyncEncryptionHandler
/external/chromium_org/sync/engine/
H A Dapply_control_data_updates.cc16 #include "sync/util/cryptographer.h"
92 // passphrase, the cryptographer will preserve the encryption keys based on the
97 Cryptographer* cryptographer) {
110 // We only perform this if the cryptographer is ready. If not, these are
114 if (cryptographer->is_ready()) {
122 // If this fails, something is wrong with the cryptographer, but there's
143 // If the cryptographer is not ready, another client set a new encryption
148 // Therefore, we only attempt to merge the nigori nodes if the cryptographer
153 if (cryptographer->is_ready()) {
167 cryptographer
95 ApplyNigoriUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
203 ApplyControlUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
[all...]
H A Dupdate_applicator.cc22 UpdateApplicator::UpdateApplicator(Cryptographer* cryptographer, argument
25 : cryptographer_(cryptographer),
H A Dapply_updates_and_resolve_conflicts_command_unittest.cc24 #include "sync/util/cryptographer.h"
321 Cryptographer* cryptographer; local
323 // Storing the cryptographer separately is bad, but for this test we
326 cryptographer = directory()->GetCryptographer(&trans);
330 cryptographer->AddKey(params);
336 cryptographer->Encrypt(data,
372 Cryptographer* cryptographer; local
380 cryptographer = directory()->GetCryptographer(&trans);
383 cryptographer->AddKey(params);
385 cryptographer
[all...]
H A Dconflict_resolver.cc18 #include "sync/util/cryptographer.h"
40 const Cryptographer* cryptographer,
120 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted()));
121 decrypted_specifics = cryptographer->DecryptToString(
128 cryptographer->CanDecryptUsingDefaultKey(
130 decrypted_server_specifics = cryptographer->DecryptToString(
147 decrypted_base_server_specifics = cryptographer->DecryptToString(
221 const Cryptographer* cryptographer,
237 ProcessSimpleConflict(trans, *it, cryptographer, status);
38 ProcessSimpleConflict(WriteTransaction* trans, const Id& id, const Cryptographer* cryptographer, StatusController* status) argument
219 ResolveConflicts( syncable::WriteTransaction* trans, const Cryptographer* cryptographer, const std::set<syncable::Id>& simple_conflict_ids, sessions::StatusController* status) argument
H A Dapply_control_data_updates_unittest.cc23 #include "sync/util/cryptographer.h"
62 // updates the set of encrypted types, and updates the cryptographer.
64 // Storing the cryptographer separately is bad, but for this test we
66 Cryptographer* cryptographer; local
72 cryptographer = directory()->GetCryptographer(&trans);
78 Cryptographer other_cryptographer(cryptographer->encryptor());
88 EXPECT_FALSE(cryptographer->has_pending_keys());
92 EXPECT_FALSE(cryptographer->is_ready());
93 EXPECT_TRUE(cryptographer->has_pending_keys());
107 // Storing the cryptographer separatel
109 Cryptographer* cryptographer; local
222 Cryptographer* cryptographer; local
310 Cryptographer* cryptographer; local
388 Cryptographer* cryptographer; local
466 Cryptographer* cryptographer; local
536 Cryptographer* cryptographer; local
618 Cryptographer* cryptographer; local
701 Cryptographer* cryptographer; local
780 Cryptographer* cryptographer; local
[all...]
H A Dget_commit_ids_command.cc18 #include "sync/util/cryptographer.h"
52 Cryptographer* cryptographer = local
55 if (cryptographer) {
58 passphrase_missing = cryptographer->has_pending_keys();
106 // is missing from the cryptographer, or the entry itself wasn't properly
126 // due to the cryptographer not being initialized or the user hasn't
H A Dprocess_updates_command.cc20 #include "sync/util/cryptographer.h"
255 const Cryptographer* cryptographer,
331 !cryptographer->CanDecrypt(update.specifics().encrypted())) {
340 cryptographer->CanDecrypt(prev_specifics.encrypted()))) {
253 ProcessUpdate( const sync_pb::SyncEntity& update, const Cryptographer* cryptographer, syncable::WriteTransaction* const trans) argument
H A Dsyncer_util.cc32 #include "sync/util/cryptographer.h"
191 Cryptographer* cryptographer) {
207 !cryptographer->CanDecrypt(specifics.encrypted())) {
217 if (!cryptographer->CanDecrypt(password.encrypted())) {
188 AttemptToUpdateEntry( syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
/external/chromium_org/sync/internal_api/
H A Dsync_encryption_handler_impl.h20 #include "sync/util/cryptographer.h"
132 // Sync's cryptographer. Used for encrypting and decrypting sync data.
133 Cryptographer cryptographer; member in struct:syncer::SyncEncryptionHandlerImpl::Vault
144 // Apply a nigori update. Updates internal and cryptographer state.
157 // explicit passphrase state (if the cryptographer is ready).
195 // |bootstrap_token|: used to inform observers if the cryptographer's
200 // |trans| and |nigori_node|: used to access data in the cryptographer.
226 const Cryptographer& cryptographer) const;
238 const Cryptographer& cryptographer,
243 // into |cryptographer|
[all...]
H A Dsyncapi_internal.cc10 #include "sync/util/cryptographer.h"
55 bool AreSpecificsEqual(const Cryptographer* cryptographer, argument
62 if (!cryptographer->CanDecrypt(left.encrypted())) {
66 left_plaintext = cryptographer->DecryptToString(left.encrypted());
71 if (!cryptographer->CanDecrypt(right.encrypted())) {
75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
H A Djs_sync_encryption_handler_observer.cc18 #include "sync/util/cryptographer.h"
87 Cryptographer* cryptographer) {
93 cryptographer->is_ready());
95 cryptographer->has_pending_keys());
86 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
H A Ddebug_info_event_listener.cc7 #include "sync/util/cryptographer.h"
109 Cryptographer* cryptographer) {
111 cryptographer_has_pending_keys_ = cryptographer->has_pending_keys();
112 cryptographer_ready_ = cryptographer->is_ready();
108 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
H A Dwrite_node.cc24 #include "sync/util/cryptographer.h"
150 Cryptographer* cryptographer = GetTransaction()->GetCryptographer(); local
167 if (!cryptographer->Encrypt(data, password_specifics->mutable_encrypted())) {
H A Dsync_encryption_handler_impl.cc31 #include "sync/util/cryptographer.h"
201 : cryptographer(encryptor),
219 // Restore the cryptographer's previous keys. Note that we don't add the
220 // keystore keys into the cryptographer here, in case a migration was pending.
221 vault_unsafe_.cryptographer.Bootstrap(restored_key_for_bootstrapping);
259 trans.GetWrappedTrans()).cryptographer.has_pending_keys();
261 trans.GetWrappedTrans()).cryptographer.is_ready();
262 // Log the state of the cryptographer regardless of migration state.
280 // Migration cannot occur until the cryptographer is ready (initialized
300 // Always trigger an encrypted types and cryptographer stat
340 Cryptographer* cryptographer = local
504 Cryptographer* cryptographer = local
704 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local
921 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local
1021 const Cryptographer& cryptographer = local
1117 Cryptographer* cryptographer = local
1155 Cryptographer* cryptographer = local
1208 const Cryptographer& cryptographer = local
1356 Cryptographer* cryptographer = local
1519 GetKeystoreDecryptor( const Cryptographer& cryptographer, const std::string& keystore_key, sync_pb::EncryptedData* encrypted_blob) argument
1541 AttemptToInstallKeybag( const sync_pb::EncryptedData& keybag, bool update_default, Cryptographer* cryptographer) argument
1567 DecryptPendingKeysWithKeystoreKey( const std::string& keystore_key, const sync_pb::EncryptedData& keystore_decryptor_token, Cryptographer* cryptographer) argument
[all...]
/external/chromium/chrome/browser/sync/engine/
H A Dupdate_applicator.cc20 Cryptographer* cryptographer,
26 cryptographer_(cryptographer),
19 UpdateApplicator(ConflictResolver* resolver, Cryptographer* cryptographer, const UpdateIterator& begin, const UpdateIterator& end, const ModelSafeRoutingInfo& routes, ModelSafeGroup group_filter) argument
H A Dapply_updates_command_unittest.cc218 Cryptographer* cryptographer; local
220 // Storing the cryptographer separately is bad, but for this test we
225 cryptographer =
230 cryptographer->AddKey(params);
236 cryptographer->Encrypt(data,
280 Cryptographer* cryptographer = local
284 cryptographer->AddKey(params);
286 cryptographer->Encrypt(data,
292 // Create a new cryptographer, independent of the one in the session.
293 Cryptographer cryptographer; local
321 Cryptographer* cryptographer; local
365 Cryptographer* cryptographer; local
459 Cryptographer* cryptographer; local
[all...]
H A Dbuild_and_process_conflict_sets_command.cc62 Cryptographer* cryptographer, StatusController* status,
85 cryptographer, routes, status)) {
151 Cryptographer* cryptographer,
198 UpdateApplicator applicator(resolver, cryptographer,
60 ProcessSingleDirectionConflictSets( syncable::WriteTransaction* trans, ConflictResolver* resolver, Cryptographer* cryptographer, StatusController* status, const ModelSafeRoutingInfo& routes) argument
147 ApplyUpdatesTransactionally( syncable::WriteTransaction* trans, const vector<syncable::Id>* const update_set, ConflictResolver* resolver, Cryptographer* cryptographer, const ModelSafeRoutingInfo& routes, StatusController* status) argument
H A Dsyncer_util.cc248 Cryptographer* cryptographer) {
298 if (cryptographer->CanDecrypt(nigori.encrypted())) {
299 cryptographer->SetKeys(nigori.encrypted());
301 cryptographer->SetPendingKeys(nigori.encrypted());
309 (!cryptographer->is_ready() ||
311 cryptographer))) {
315 // because the cryptographer already has the pending keys set, so once
337 !cryptographer->CanDecrypt(specifics.encrypted())) {
344 if (!cryptographer->CanDecrypt(password.encrypted())) {
244 AttemptToUpdateEntry( syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, ConflictResolver* resolver, Cryptographer* cryptographer) argument
H A Dsyncapi_unittest.cc38 #include "chrome/browser/sync/util/cryptographer.h"
721 // Set the nigori cryptographer information.
723 Cryptographer* cryptographer = trans.GetCryptographer(); local
724 if (!cryptographer)
727 cryptographer->AddKey(params);
729 cryptographer->GetKeys(nigori.mutable_encrypted());
733 return cryptographer->is_ready();
/external/chromium/chrome/browser/sync/syncable/
H A Dnigori_util.cc13 #include "chrome/browser/sync/util/cryptographer.h"
77 browser_sync::Cryptographer* cryptographer) {
94 if (!cryptographer->Encrypt(
109 if (!cryptographer->Decrypt(entry_specifics.encrypted(),
74 ProcessUnsyncedChangesForEncryption( WriteTransaction* const trans, const ModelTypeSet& encrypted_types, browser_sync::Cryptographer* cryptographer) argument
H A Ddirectory_manager.h24 #include "chrome/browser/sync/util/cryptographer.h"
76 // Wrappers for cryptographer() that enforce holding a transaction.
81 const sync_api::BaseTransaction* trans) const { return cryptographer(); }
83 const syncable::BaseTransaction* trans) const { return cryptographer(); }
86 browser_sync::Cryptographer* cryptographer() const { function in class:syncable::DirectoryManager
/external/chromium/chrome/browser/sync/util/
H A Dcryptographer_unittest.cc5 #include "chrome/browser/sync/util/cryptographer.h"
18 Cryptographer cryptographer; local
19 EXPECT_FALSE(cryptographer.is_ready());
25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
29 Cryptographer cryptographer; local
32 cryptographer.AddKey(params);
33 EXPECT_TRUE(cryptographer.is_ready());
39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
43 Cryptographer cryptographer; local
46 EXPECT_TRUE(cryptographer
64 Cryptographer cryptographer; local
110 Cryptographer cryptographer; local
121 Cryptographer cryptographer; local
156 Cryptographer cryptographer; local
[all...]
/external/chromium_org/sync/syncable/
H A Dnigori_util.cc18 #include "sync/util/cryptographer.h"
27 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local
28 DCHECK(cryptographer->is_ready());
98 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local
139 if (!cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted()))
154 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local
169 !cryptographer->is_initialized()) {
197 if (!cryptographer->Encrypt(new_specifics,
H A Dentry_kernel.cc10 #include "sync/util/cryptographer.h"
82 Cryptographer* cryptographer,
93 if (cryptographer &&
95 cryptographer->CanDecrypt(encrypted) &&
96 cryptographer->Decrypt(encrypted, &decrypted)) {
135 Cryptographer* cryptographer) const {
181 SetEncryptableProtoValues(*this, cryptographer, kernel_info,
80 SetEncryptableProtoValues( const EntryKernel& kernel, Cryptographer* cryptographer, base::DictionaryValue* dictionary_value, int field_key_min, int field_key_max) argument

Completed in 350 milliseconds

12