/external/chromium_org/sync/test/ |
H A D | fake_sync_encryption_handler.h | 15 #include "sync/util/cryptographer.h" 21 // Note that this only performs basic interactions with the cryptographer 57 Cryptographer* cryptographer() { return &cryptographer_; } function in class:syncer::FakeSyncEncryptionHandler
|
/external/chromium_org/sync/engine/ |
H A D | apply_control_data_updates.cc | 16 #include "sync/util/cryptographer.h" 92 // passphrase, the cryptographer will preserve the encryption keys based on the 97 Cryptographer* cryptographer) { 110 // We only perform this if the cryptographer is ready. If not, these are 114 if (cryptographer->is_ready()) { 122 // If this fails, something is wrong with the cryptographer, but there's 143 // If the cryptographer is not ready, another client set a new encryption 148 // Therefore, we only attempt to merge the nigori nodes if the cryptographer 153 if (cryptographer->is_ready()) { 167 cryptographer 95 ApplyNigoriUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument 203 ApplyControlUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument [all...] |
H A D | update_applicator.cc | 22 UpdateApplicator::UpdateApplicator(Cryptographer* cryptographer, argument 25 : cryptographer_(cryptographer),
|
H A D | apply_updates_and_resolve_conflicts_command_unittest.cc | 24 #include "sync/util/cryptographer.h" 321 Cryptographer* cryptographer; local 323 // Storing the cryptographer separately is bad, but for this test we 326 cryptographer = directory()->GetCryptographer(&trans); 330 cryptographer->AddKey(params); 336 cryptographer->Encrypt(data, 372 Cryptographer* cryptographer; local 380 cryptographer = directory()->GetCryptographer(&trans); 383 cryptographer->AddKey(params); 385 cryptographer [all...] |
H A D | conflict_resolver.cc | 18 #include "sync/util/cryptographer.h" 40 const Cryptographer* cryptographer, 120 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted())); 121 decrypted_specifics = cryptographer->DecryptToString( 128 cryptographer->CanDecryptUsingDefaultKey( 130 decrypted_server_specifics = cryptographer->DecryptToString( 147 decrypted_base_server_specifics = cryptographer->DecryptToString( 221 const Cryptographer* cryptographer, 237 ProcessSimpleConflict(trans, *it, cryptographer, status); 38 ProcessSimpleConflict(WriteTransaction* trans, const Id& id, const Cryptographer* cryptographer, StatusController* status) argument 219 ResolveConflicts( syncable::WriteTransaction* trans, const Cryptographer* cryptographer, const std::set<syncable::Id>& simple_conflict_ids, sessions::StatusController* status) argument
|
H A D | apply_control_data_updates_unittest.cc | 23 #include "sync/util/cryptographer.h" 62 // updates the set of encrypted types, and updates the cryptographer. 64 // Storing the cryptographer separately is bad, but for this test we 66 Cryptographer* cryptographer; local 72 cryptographer = directory()->GetCryptographer(&trans); 78 Cryptographer other_cryptographer(cryptographer->encryptor()); 88 EXPECT_FALSE(cryptographer->has_pending_keys()); 92 EXPECT_FALSE(cryptographer->is_ready()); 93 EXPECT_TRUE(cryptographer->has_pending_keys()); 107 // Storing the cryptographer separatel 109 Cryptographer* cryptographer; local 222 Cryptographer* cryptographer; local 310 Cryptographer* cryptographer; local 388 Cryptographer* cryptographer; local 466 Cryptographer* cryptographer; local 536 Cryptographer* cryptographer; local 618 Cryptographer* cryptographer; local 701 Cryptographer* cryptographer; local 780 Cryptographer* cryptographer; local [all...] |
H A D | get_commit_ids_command.cc | 18 #include "sync/util/cryptographer.h" 52 Cryptographer* cryptographer = local 55 if (cryptographer) { 58 passphrase_missing = cryptographer->has_pending_keys(); 106 // is missing from the cryptographer, or the entry itself wasn't properly 126 // due to the cryptographer not being initialized or the user hasn't
|
H A D | process_updates_command.cc | 20 #include "sync/util/cryptographer.h" 255 const Cryptographer* cryptographer, 331 !cryptographer->CanDecrypt(update.specifics().encrypted())) { 340 cryptographer->CanDecrypt(prev_specifics.encrypted()))) { 253 ProcessUpdate( const sync_pb::SyncEntity& update, const Cryptographer* cryptographer, syncable::WriteTransaction* const trans) argument
|
H A D | syncer_util.cc | 32 #include "sync/util/cryptographer.h" 191 Cryptographer* cryptographer) { 207 !cryptographer->CanDecrypt(specifics.encrypted())) { 217 if (!cryptographer->CanDecrypt(password.encrypted())) { 188 AttemptToUpdateEntry( syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
|
/external/chromium_org/sync/internal_api/ |
H A D | sync_encryption_handler_impl.h | 20 #include "sync/util/cryptographer.h" 132 // Sync's cryptographer. Used for encrypting and decrypting sync data. 133 Cryptographer cryptographer; member in struct:syncer::SyncEncryptionHandlerImpl::Vault 144 // Apply a nigori update. Updates internal and cryptographer state. 157 // explicit passphrase state (if the cryptographer is ready). 195 // |bootstrap_token|: used to inform observers if the cryptographer's 200 // |trans| and |nigori_node|: used to access data in the cryptographer. 226 const Cryptographer& cryptographer) const; 238 const Cryptographer& cryptographer, 243 // into |cryptographer| [all...] |
H A D | syncapi_internal.cc | 10 #include "sync/util/cryptographer.h" 55 bool AreSpecificsEqual(const Cryptographer* cryptographer, argument 62 if (!cryptographer->CanDecrypt(left.encrypted())) { 66 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 71 if (!cryptographer->CanDecrypt(right.encrypted())) { 75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
H A D | js_sync_encryption_handler_observer.cc | 18 #include "sync/util/cryptographer.h" 87 Cryptographer* cryptographer) { 93 cryptographer->is_ready()); 95 cryptographer->has_pending_keys()); 86 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
|
H A D | debug_info_event_listener.cc | 7 #include "sync/util/cryptographer.h" 109 Cryptographer* cryptographer) { 111 cryptographer_has_pending_keys_ = cryptographer->has_pending_keys(); 112 cryptographer_ready_ = cryptographer->is_ready(); 108 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
|
H A D | write_node.cc | 24 #include "sync/util/cryptographer.h" 150 Cryptographer* cryptographer = GetTransaction()->GetCryptographer(); local 167 if (!cryptographer->Encrypt(data, password_specifics->mutable_encrypted())) {
|
H A D | sync_encryption_handler_impl.cc | 31 #include "sync/util/cryptographer.h" 201 : cryptographer(encryptor), 219 // Restore the cryptographer's previous keys. Note that we don't add the 220 // keystore keys into the cryptographer here, in case a migration was pending. 221 vault_unsafe_.cryptographer.Bootstrap(restored_key_for_bootstrapping); 259 trans.GetWrappedTrans()).cryptographer.has_pending_keys(); 261 trans.GetWrappedTrans()).cryptographer.is_ready(); 262 // Log the state of the cryptographer regardless of migration state. 280 // Migration cannot occur until the cryptographer is ready (initialized 300 // Always trigger an encrypted types and cryptographer stat 340 Cryptographer* cryptographer = local 504 Cryptographer* cryptographer = local 704 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local 921 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local 1021 const Cryptographer& cryptographer = local 1117 Cryptographer* cryptographer = local 1155 Cryptographer* cryptographer = local 1208 const Cryptographer& cryptographer = local 1356 Cryptographer* cryptographer = local 1519 GetKeystoreDecryptor( const Cryptographer& cryptographer, const std::string& keystore_key, sync_pb::EncryptedData* encrypted_blob) argument 1541 AttemptToInstallKeybag( const sync_pb::EncryptedData& keybag, bool update_default, Cryptographer* cryptographer) argument 1567 DecryptPendingKeysWithKeystoreKey( const std::string& keystore_key, const sync_pb::EncryptedData& keystore_decryptor_token, Cryptographer* cryptographer) argument [all...] |
/external/chromium/chrome/browser/sync/engine/ |
H A D | update_applicator.cc | 20 Cryptographer* cryptographer, 26 cryptographer_(cryptographer), 19 UpdateApplicator(ConflictResolver* resolver, Cryptographer* cryptographer, const UpdateIterator& begin, const UpdateIterator& end, const ModelSafeRoutingInfo& routes, ModelSafeGroup group_filter) argument
|
H A D | apply_updates_command_unittest.cc | 218 Cryptographer* cryptographer; local 220 // Storing the cryptographer separately is bad, but for this test we 225 cryptographer = 230 cryptographer->AddKey(params); 236 cryptographer->Encrypt(data, 280 Cryptographer* cryptographer = local 284 cryptographer->AddKey(params); 286 cryptographer->Encrypt(data, 292 // Create a new cryptographer, independent of the one in the session. 293 Cryptographer cryptographer; local 321 Cryptographer* cryptographer; local 365 Cryptographer* cryptographer; local 459 Cryptographer* cryptographer; local [all...] |
H A D | build_and_process_conflict_sets_command.cc | 62 Cryptographer* cryptographer, StatusController* status, 85 cryptographer, routes, status)) { 151 Cryptographer* cryptographer, 198 UpdateApplicator applicator(resolver, cryptographer, 60 ProcessSingleDirectionConflictSets( syncable::WriteTransaction* trans, ConflictResolver* resolver, Cryptographer* cryptographer, StatusController* status, const ModelSafeRoutingInfo& routes) argument 147 ApplyUpdatesTransactionally( syncable::WriteTransaction* trans, const vector<syncable::Id>* const update_set, ConflictResolver* resolver, Cryptographer* cryptographer, const ModelSafeRoutingInfo& routes, StatusController* status) argument
|
H A D | syncer_util.cc | 248 Cryptographer* cryptographer) { 298 if (cryptographer->CanDecrypt(nigori.encrypted())) { 299 cryptographer->SetKeys(nigori.encrypted()); 301 cryptographer->SetPendingKeys(nigori.encrypted()); 309 (!cryptographer->is_ready() || 311 cryptographer))) { 315 // because the cryptographer already has the pending keys set, so once 337 !cryptographer->CanDecrypt(specifics.encrypted())) { 344 if (!cryptographer->CanDecrypt(password.encrypted())) { 244 AttemptToUpdateEntry( syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, ConflictResolver* resolver, Cryptographer* cryptographer) argument
|
H A D | syncapi_unittest.cc | 38 #include "chrome/browser/sync/util/cryptographer.h" 721 // Set the nigori cryptographer information. 723 Cryptographer* cryptographer = trans.GetCryptographer(); local 724 if (!cryptographer) 727 cryptographer->AddKey(params); 729 cryptographer->GetKeys(nigori.mutable_encrypted()); 733 return cryptographer->is_ready();
|
/external/chromium/chrome/browser/sync/syncable/ |
H A D | nigori_util.cc | 13 #include "chrome/browser/sync/util/cryptographer.h" 77 browser_sync::Cryptographer* cryptographer) { 94 if (!cryptographer->Encrypt( 109 if (!cryptographer->Decrypt(entry_specifics.encrypted(), 74 ProcessUnsyncedChangesForEncryption( WriteTransaction* const trans, const ModelTypeSet& encrypted_types, browser_sync::Cryptographer* cryptographer) argument
|
H A D | directory_manager.h | 24 #include "chrome/browser/sync/util/cryptographer.h" 76 // Wrappers for cryptographer() that enforce holding a transaction. 81 const sync_api::BaseTransaction* trans) const { return cryptographer(); } 83 const syncable::BaseTransaction* trans) const { return cryptographer(); } 86 browser_sync::Cryptographer* cryptographer() const { function in class:syncable::DirectoryManager
|
/external/chromium/chrome/browser/sync/util/ |
H A D | cryptographer_unittest.cc | 5 #include "chrome/browser/sync/util/cryptographer.h" 18 Cryptographer cryptographer; local 19 EXPECT_FALSE(cryptographer.is_ready()); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 29 Cryptographer cryptographer; local 32 cryptographer.AddKey(params); 33 EXPECT_TRUE(cryptographer.is_ready()); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 43 Cryptographer cryptographer; local 46 EXPECT_TRUE(cryptographer 64 Cryptographer cryptographer; local 110 Cryptographer cryptographer; local 121 Cryptographer cryptographer; local 156 Cryptographer cryptographer; local [all...] |
/external/chromium_org/sync/syncable/ |
H A D | nigori_util.cc | 18 #include "sync/util/cryptographer.h" 27 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local 28 DCHECK(cryptographer->is_ready()); 98 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local 139 if (!cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted())) 154 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local 169 !cryptographer->is_initialized()) { 197 if (!cryptographer->Encrypt(new_specifics,
|
H A D | entry_kernel.cc | 10 #include "sync/util/cryptographer.h" 82 Cryptographer* cryptographer, 93 if (cryptographer && 95 cryptographer->CanDecrypt(encrypted) && 96 cryptographer->Decrypt(encrypted, &decrypted)) { 135 Cryptographer* cryptographer) const { 181 SetEncryptableProtoValues(*this, cryptographer, kernel_info, 80 SetEncryptableProtoValues( const EntryKernel& kernel, Cryptographer* cryptographer, base::DictionaryValue* dictionary_value, int field_key_min, int field_key_max) argument
|