Searched defs:cryptographer (Results 1 - 23 of 23) sorted by relevance

/external/chromium_org/sync/engine/
H A Dupdate_applicator.cc22 UpdateApplicator::UpdateApplicator(Cryptographer* cryptographer) argument
23 : cryptographer_(cryptographer),
H A Dapply_control_data_updates.cc16 #include "sync/util/cryptographer.h"
89 // passphrase, the cryptographer will preserve the encryption keys based on the
94 Cryptographer* cryptographer) {
107 // We only perform this if the cryptographer is ready. If not, these are
111 if (cryptographer->is_ready()) {
119 // If this fails, something is wrong with the cryptographer, but there's
140 // If the cryptographer is not ready, another client set a new encryption
145 // Therefore, we only attempt to merge the nigori nodes if the cryptographer
150 if (cryptographer->is_ready()) {
164 cryptographer
92 ApplyNigoriUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
200 ApplyControlUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
[all...]
H A Dapply_control_data_updates_unittest.cc25 #include "sync/util/cryptographer.h"
63 // updates the set of encrypted types, and updates the cryptographer.
65 // Storing the cryptographer separately is bad, but for this test we
67 Cryptographer* cryptographer; local
73 cryptographer = directory()->GetCryptographer(&trans);
79 Cryptographer other_cryptographer(cryptographer->encryptor());
89 EXPECT_FALSE(cryptographer->has_pending_keys());
93 EXPECT_FALSE(cryptographer->is_ready());
94 EXPECT_TRUE(cryptographer->has_pending_keys());
108 // Storing the cryptographer separatel
110 Cryptographer* cryptographer; local
222 Cryptographer* cryptographer; local
310 Cryptographer* cryptographer; local
388 Cryptographer* cryptographer; local
466 Cryptographer* cryptographer; local
536 Cryptographer* cryptographer; local
618 Cryptographer* cryptographer; local
701 Cryptographer* cryptographer; local
780 Cryptographer* cryptographer; local
[all...]
H A Dconflict_resolver.cc19 #include "sync/util/cryptographer.h"
74 const Cryptographer* cryptographer,
150 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted()));
151 decrypted_specifics = cryptographer->DecryptToString(
158 cryptographer->CanDecryptUsingDefaultKey(
160 decrypted_server_specifics = cryptographer->DecryptToString(
177 decrypted_base_server_specifics = cryptographer->DecryptToString(
256 const Cryptographer* cryptographer,
273 ProcessSimpleConflict(trans, *it, cryptographer, status, counters);
72 ProcessSimpleConflict(WriteTransaction* trans, const Id& id, const Cryptographer* cryptographer, StatusController* status, UpdateCounters* counters) argument
254 ResolveConflicts( syncable::WriteTransaction* trans, const Cryptographer* cryptographer, const std::set<syncable::Id>& simple_conflict_ids, sessions::StatusController* status, UpdateCounters* counters) argument
H A Dprocess_updates_util.cc17 #include "sync/util/cryptographer.h"
179 const Cryptographer* cryptographer,
254 !cryptographer->CanDecrypt(update.specifics().encrypted())) {
263 cryptographer->CanDecrypt(prev_specifics.encrypted()))) {
177 ProcessUpdate( const sync_pb::SyncEntity& update, const Cryptographer* cryptographer, syncable::ModelNeutralWriteTransaction* const trans) argument
H A Dget_commit_ids.cc18 #include "sync/util/cryptographer.h"
68 Cryptographer* cryptographer = dir->GetCryptographer(trans); local
69 if (cryptographer) {
71 passphrase_missing = cryptographer->has_pending_keys();
123 // is missing from the cryptographer, or the entry itself wasn't properly
143 // due to the cryptographer not being initialized or the user hasn't
H A Dmodel_type_sync_worker_impl.cc16 #include "sync/util/cryptographer.h"
25 scoped_ptr<Cryptographer> cryptographer,
31 cryptographer_(cryptographer.Pass()),
70 scoped_ptr<Cryptographer> cryptographer) {
71 DCHECK(cryptographer);
72 cryptographer_ = cryptographer.Pass();
371 // that the cryptographer is valid and ready to encrypt.
439 Cryptographer* cryptographer,
443 DCHECK(cryptographer->CanDecrypt(in.encrypted()));
446 plaintext = cryptographer
21 ModelTypeSyncWorkerImpl( ModelType type, const DataTypeState& initial_state, const UpdateResponseDataList& saved_pending_updates, scoped_ptr<Cryptographer> cryptographer, NudgeHandler* nudge_handler, scoped_ptr<ModelTypeSyncProxy> type_sync_proxy) argument
69 UpdateCryptographer( scoped_ptr<Cryptographer> cryptographer) argument
438 DecryptSpecifics( Cryptographer* cryptographer, const sync_pb::EntitySpecifics& in, sync_pb::EntitySpecifics* out) argument
[all...]
H A Dsyncer_util.cc36 #include "sync/util/cryptographer.h"
195 Cryptographer* cryptographer) {
211 !cryptographer->CanDecrypt(specifics.encrypted())) {
221 if (!cryptographer->CanDecrypt(password.encrypted())) {
192 AttemptToUpdateEntry( syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
H A Ddirectory_update_handler_unittest.cc955 Cryptographer* cryptographer; local
957 // Storing the cryptographer separately is bad, but for this test we
960 cryptographer = directory()->GetCryptographer(&trans);
964 cryptographer->AddKey(params);
970 cryptographer->Encrypt(data,
1045 Cryptographer* cryptographer; local
1057 cryptographer = directory()->GetCryptographer(&trans);
1060 cryptographer->AddKey(params);
1062 cryptographer->Encrypt(data,
1069 // Create a new cryptographer, independen
[all...]
/external/chromium_org/sync/test/
H A Dfake_sync_encryption_handler.h15 #include "sync/util/cryptographer.h"
21 // Note that this only performs basic interactions with the cryptographer
57 Cryptographer* cryptographer() { return &cryptographer_; } function in class:syncer::FakeSyncEncryptionHandler
/external/chromium_org/sync/internal_api/
H A Dsync_encryption_handler_impl.h20 #include "sync/util/cryptographer.h"
132 // Sync's cryptographer. Used for encrypting and decrypting sync data.
133 Cryptographer cryptographer; member in struct:syncer::SyncEncryptionHandlerImpl::Vault
144 // Apply a nigori update. Updates internal and cryptographer state.
157 // explicit passphrase state (if the cryptographer is ready).
195 // |bootstrap_token|: used to inform observers if the cryptographer's
200 // |trans| and |nigori_node|: used to access data in the cryptographer.
226 const Cryptographer& cryptographer) const;
238 const Cryptographer& cryptographer,
243 // into |cryptographer|
[all...]
H A Djs_sync_encryption_handler_observer.cc17 #include "sync/util/cryptographer.h"
86 Cryptographer* cryptographer) {
92 cryptographer->is_ready());
94 cryptographer->has_pending_keys());
85 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
H A Dsyncapi_internal.cc11 #include "sync/util/cryptographer.h"
78 bool AreSpecificsEqual(const Cryptographer* cryptographer, argument
85 if (!cryptographer->CanDecrypt(left.encrypted())) {
89 left_plaintext = cryptographer->DecryptToString(left.encrypted());
94 if (!cryptographer->CanDecrypt(right.encrypted())) {
98 right_plaintext = cryptographer->DecryptToString(right.encrypted());
H A Ddebug_info_event_listener.cc7 #include "sync/util/cryptographer.h"
99 Cryptographer* cryptographer) {
101 cryptographer_has_pending_keys_ = cryptographer->has_pending_keys();
102 cryptographer_ready_ = cryptographer->is_ready();
98 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
H A Dwrite_node.cc24 #include "sync/util/cryptographer.h"
151 Cryptographer* cryptographer = GetTransaction()->GetCryptographer(); local
168 if (!cryptographer->Encrypt(data, password_specifics->mutable_encrypted())) {
H A Dsync_encryption_handler_impl.cc31 #include "sync/util/cryptographer.h"
201 : cryptographer(encryptor),
219 // Restore the cryptographer's previous keys. Note that we don't add the
220 // keystore keys into the cryptographer here, in case a migration was pending.
221 vault_unsafe_.cryptographer.Bootstrap(restored_key_for_bootstrapping);
259 trans.GetWrappedTrans()).cryptographer.has_pending_keys();
261 trans.GetWrappedTrans()).cryptographer.is_ready();
262 // Log the state of the cryptographer regardless of migration state.
280 // Migration cannot occur until the cryptographer is ready (initialized
300 // Always trigger an encrypted types and cryptographer stat
340 Cryptographer* cryptographer = local
503 Cryptographer* cryptographer = local
702 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local
916 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local
1016 const Cryptographer& cryptographer = local
1112 Cryptographer* cryptographer = local
1150 Cryptographer* cryptographer = local
1203 const Cryptographer& cryptographer = local
1351 Cryptographer* cryptographer = local
1514 GetKeystoreDecryptor( const Cryptographer& cryptographer, const std::string& keystore_key, sync_pb::EncryptedData* encrypted_blob) argument
1536 AttemptToInstallKeybag( const sync_pb::EncryptedData& keybag, bool update_default, Cryptographer* cryptographer) argument
1562 DecryptPendingKeysWithKeystoreKey( const std::string& keystore_key, const sync_pb::EncryptedData& keystore_decryptor_token, Cryptographer* cryptographer) argument
[all...]
H A Dsync_manager_impl.cc130 Cryptographer* cryptographer) const {
145 if (!AreSpecificsEqual(cryptographer,
395 Cryptographer* cryptographer) {
396 allstatus_.SetCryptographerReady(cryptographer->is_ready());
397 allstatus_.SetCryptoHasPendingKeys(cryptographer->has_pending_keys());
720 Cryptographer* cryptographer, const syncable::EntryKernel& original,
729 DecryptPasswordSpecifics(original_specifics, cryptographer));
739 if (!cryptographer->Decrypt(encrypted, &original_specifics)) {
394 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
718 SetExtraChangeRecordData(int64 id, ModelType type, ChangeReorderBuffer* buffer, Cryptographer* cryptographer, const syncable::EntryKernel& original, bool existed_before, bool exists_now) argument
H A Dsync_manager_impl_unittest.cc70 #include "sync/util/cryptographer.h"
894 // Set the nigori cryptographer information.
899 Cryptographer* cryptographer = trans.GetCryptographer(); local
900 if (!cryptographer)
904 cryptographer->AddKey(params);
910 cryptographer->GetKeys(nigori.mutable_encryption_keybag());
918 return cryptographer->is_ready();
967 // Gets the set of encrypted types from the cryptographer
1058 Cryptographer* cryptographer = trans.GetCryptographer(); local
1059 EXPECT_TRUE(cryptographer
1103 Cryptographer* cryptographer = trans.GetCryptographer(); local
1246 Cryptographer* cryptographer = trans.GetCryptographer(); local
1260 Cryptographer* cryptographer = trans.GetCryptographer(); local
1278 Cryptographer* cryptographer = trans.GetCryptographer(); local
1296 Cryptographer* cryptographer = trans.GetCryptographer(); local
1328 Cryptographer* cryptographer = trans.GetCryptographer(); local
1354 Cryptographer* cryptographer = trans.GetCryptographer(); local
1382 Cryptographer* cryptographer = trans.GetCryptographer(); local
1402 Cryptographer* cryptographer = trans.GetCryptographer(); local
1440 Cryptographer* cryptographer = trans.GetCryptographer(); local
1461 Cryptographer* cryptographer = trans.GetCryptographer(); local
1485 Cryptographer* cryptographer = trans.GetCryptographer(); local
1520 Cryptographer* cryptographer = trans.GetCryptographer(); local
1538 Cryptographer* cryptographer = trans.GetCryptographer(); local
1564 Cryptographer* cryptographer = trans.GetCryptographer(); local
1792 Cryptographer* cryptographer = trans.GetCryptographer(); local
1820 Cryptographer* cryptographer = trans.GetCryptographer(); local
1845 Cryptographer* cryptographer = trans.GetCryptographer(); local
1863 Cryptographer* cryptographer = trans.GetCryptographer(); local
1883 Cryptographer* cryptographer = trans.GetCryptographer(); local
1897 Cryptographer* cryptographer = trans.GetCryptographer(); local
1932 Cryptographer* cryptographer = trans.GetCryptographer(); local
1964 Cryptographer* cryptographer = trans.GetCryptographer(); local
1984 Cryptographer* cryptographer = trans.GetCryptographer(); local
2023 Cryptographer* cryptographer = trans.GetCryptographer(); local
[all...]
/external/chromium_org/sync/syncable/
H A Dnigori_util.cc18 #include "sync/util/cryptographer.h"
27 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local
28 DCHECK(cryptographer->is_ready());
98 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local
138 if (!cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted()))
153 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local
170 !cryptographer || !cryptographer->is_initialized()) {
198 if (!cryptographer->Encrypt(new_specifics,
H A Dentry_kernel.cc10 #include "sync/util/cryptographer.h"
90 Cryptographer* cryptographer,
101 if (cryptographer &&
103 cryptographer->CanDecrypt(encrypted) &&
104 cryptographer->Decrypt(encrypted, &decrypted)) {
148 Cryptographer* cryptographer) const {
194 SetEncryptableProtoValues(*this, cryptographer, kernel_info,
88 SetEncryptableProtoValues( const EntryKernel& kernel, Cryptographer* cryptographer, base::DictionaryValue* dictionary_value, int field_key_min, int field_key_max) argument
H A Ddirectory.cc104 Cryptographer* cryptographer)
112 cryptographer_(cryptographer),
99 Directory( DirectoryBackingStore* store, UnrecoverableErrorHandler* unrecoverable_error_handler, ReportUnrecoverableErrorFunction report_unrecoverable_error_function, NigoriHandler* nigori_handler, Cryptographer* cryptographer) argument
/external/chromium_org/sync/sessions/
H A Dmodel_type_registry.cc18 #include "sync/util/cryptographer.h"
329 Cryptographer* cryptographer) {
330 cryptographer_.reset(new Cryptographer(*cryptographer));
328 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
/external/chromium_org/chrome/browser/sync/glue/
H A Dsync_backend_host_core.cc295 syncer::Cryptographer* cryptographer) {
294 OnCryptographerStateChanged( syncer::Cryptographer* cryptographer) argument

Completed in 380 milliseconds