/external/chromium_org/sync/engine/ |
H A D | update_applicator.cc | 22 UpdateApplicator::UpdateApplicator(Cryptographer* cryptographer) argument 23 : cryptographer_(cryptographer),
|
H A D | apply_control_data_updates.cc | 16 #include "sync/util/cryptographer.h" 89 // passphrase, the cryptographer will preserve the encryption keys based on the 94 Cryptographer* cryptographer) { 107 // We only perform this if the cryptographer is ready. If not, these are 111 if (cryptographer->is_ready()) { 119 // If this fails, something is wrong with the cryptographer, but there's 140 // If the cryptographer is not ready, another client set a new encryption 145 // Therefore, we only attempt to merge the nigori nodes if the cryptographer 150 if (cryptographer->is_ready()) { 164 cryptographer 92 ApplyNigoriUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument 200 ApplyControlUpdate(syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument [all...] |
H A D | apply_control_data_updates_unittest.cc | 25 #include "sync/util/cryptographer.h" 63 // updates the set of encrypted types, and updates the cryptographer. 65 // Storing the cryptographer separately is bad, but for this test we 67 Cryptographer* cryptographer; local 73 cryptographer = directory()->GetCryptographer(&trans); 79 Cryptographer other_cryptographer(cryptographer->encryptor()); 89 EXPECT_FALSE(cryptographer->has_pending_keys()); 93 EXPECT_FALSE(cryptographer->is_ready()); 94 EXPECT_TRUE(cryptographer->has_pending_keys()); 108 // Storing the cryptographer separatel 110 Cryptographer* cryptographer; local 222 Cryptographer* cryptographer; local 310 Cryptographer* cryptographer; local 388 Cryptographer* cryptographer; local 466 Cryptographer* cryptographer; local 536 Cryptographer* cryptographer; local 618 Cryptographer* cryptographer; local 701 Cryptographer* cryptographer; local 780 Cryptographer* cryptographer; local [all...] |
H A D | conflict_resolver.cc | 19 #include "sync/util/cryptographer.h" 74 const Cryptographer* cryptographer, 150 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted())); 151 decrypted_specifics = cryptographer->DecryptToString( 158 cryptographer->CanDecryptUsingDefaultKey( 160 decrypted_server_specifics = cryptographer->DecryptToString( 177 decrypted_base_server_specifics = cryptographer->DecryptToString( 256 const Cryptographer* cryptographer, 273 ProcessSimpleConflict(trans, *it, cryptographer, status, counters); 72 ProcessSimpleConflict(WriteTransaction* trans, const Id& id, const Cryptographer* cryptographer, StatusController* status, UpdateCounters* counters) argument 254 ResolveConflicts( syncable::WriteTransaction* trans, const Cryptographer* cryptographer, const std::set<syncable::Id>& simple_conflict_ids, sessions::StatusController* status, UpdateCounters* counters) argument
|
H A D | process_updates_util.cc | 17 #include "sync/util/cryptographer.h" 179 const Cryptographer* cryptographer, 254 !cryptographer->CanDecrypt(update.specifics().encrypted())) { 263 cryptographer->CanDecrypt(prev_specifics.encrypted()))) { 177 ProcessUpdate( const sync_pb::SyncEntity& update, const Cryptographer* cryptographer, syncable::ModelNeutralWriteTransaction* const trans) argument
|
H A D | get_commit_ids.cc | 18 #include "sync/util/cryptographer.h" 68 Cryptographer* cryptographer = dir->GetCryptographer(trans); local 69 if (cryptographer) { 71 passphrase_missing = cryptographer->has_pending_keys(); 123 // is missing from the cryptographer, or the entry itself wasn't properly 143 // due to the cryptographer not being initialized or the user hasn't
|
H A D | model_type_sync_worker_impl.cc | 16 #include "sync/util/cryptographer.h" 25 scoped_ptr<Cryptographer> cryptographer, 31 cryptographer_(cryptographer.Pass()), 70 scoped_ptr<Cryptographer> cryptographer) { 71 DCHECK(cryptographer); 72 cryptographer_ = cryptographer.Pass(); 371 // that the cryptographer is valid and ready to encrypt. 439 Cryptographer* cryptographer, 443 DCHECK(cryptographer->CanDecrypt(in.encrypted())); 446 plaintext = cryptographer 21 ModelTypeSyncWorkerImpl( ModelType type, const DataTypeState& initial_state, const UpdateResponseDataList& saved_pending_updates, scoped_ptr<Cryptographer> cryptographer, NudgeHandler* nudge_handler, scoped_ptr<ModelTypeSyncProxy> type_sync_proxy) argument 69 UpdateCryptographer( scoped_ptr<Cryptographer> cryptographer) argument 438 DecryptSpecifics( Cryptographer* cryptographer, const sync_pb::EntitySpecifics& in, sync_pb::EntitySpecifics* out) argument [all...] |
H A D | syncer_util.cc | 36 #include "sync/util/cryptographer.h" 195 Cryptographer* cryptographer) { 211 !cryptographer->CanDecrypt(specifics.encrypted())) { 221 if (!cryptographer->CanDecrypt(password.encrypted())) { 192 AttemptToUpdateEntry( syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, Cryptographer* cryptographer) argument
|
H A D | directory_update_handler_unittest.cc | 955 Cryptographer* cryptographer; local 957 // Storing the cryptographer separately is bad, but for this test we 960 cryptographer = directory()->GetCryptographer(&trans); 964 cryptographer->AddKey(params); 970 cryptographer->Encrypt(data, 1045 Cryptographer* cryptographer; local 1057 cryptographer = directory()->GetCryptographer(&trans); 1060 cryptographer->AddKey(params); 1062 cryptographer->Encrypt(data, 1069 // Create a new cryptographer, independen [all...] |
/external/chromium_org/sync/test/ |
H A D | fake_sync_encryption_handler.h | 15 #include "sync/util/cryptographer.h" 21 // Note that this only performs basic interactions with the cryptographer 57 Cryptographer* cryptographer() { return &cryptographer_; } function in class:syncer::FakeSyncEncryptionHandler
|
/external/chromium_org/sync/internal_api/ |
H A D | sync_encryption_handler_impl.h | 20 #include "sync/util/cryptographer.h" 132 // Sync's cryptographer. Used for encrypting and decrypting sync data. 133 Cryptographer cryptographer; member in struct:syncer::SyncEncryptionHandlerImpl::Vault 144 // Apply a nigori update. Updates internal and cryptographer state. 157 // explicit passphrase state (if the cryptographer is ready). 195 // |bootstrap_token|: used to inform observers if the cryptographer's 200 // |trans| and |nigori_node|: used to access data in the cryptographer. 226 const Cryptographer& cryptographer) const; 238 const Cryptographer& cryptographer, 243 // into |cryptographer| [all...] |
H A D | js_sync_encryption_handler_observer.cc | 17 #include "sync/util/cryptographer.h" 86 Cryptographer* cryptographer) { 92 cryptographer->is_ready()); 94 cryptographer->has_pending_keys()); 85 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
|
H A D | syncapi_internal.cc | 11 #include "sync/util/cryptographer.h" 78 bool AreSpecificsEqual(const Cryptographer* cryptographer, argument 85 if (!cryptographer->CanDecrypt(left.encrypted())) { 89 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 94 if (!cryptographer->CanDecrypt(right.encrypted())) { 98 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
H A D | debug_info_event_listener.cc | 7 #include "sync/util/cryptographer.h" 99 Cryptographer* cryptographer) { 101 cryptographer_has_pending_keys_ = cryptographer->has_pending_keys(); 102 cryptographer_ready_ = cryptographer->is_ready(); 98 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
|
H A D | write_node.cc | 24 #include "sync/util/cryptographer.h" 151 Cryptographer* cryptographer = GetTransaction()->GetCryptographer(); local 168 if (!cryptographer->Encrypt(data, password_specifics->mutable_encrypted())) {
|
H A D | sync_encryption_handler_impl.cc | 31 #include "sync/util/cryptographer.h" 201 : cryptographer(encryptor), 219 // Restore the cryptographer's previous keys. Note that we don't add the 220 // keystore keys into the cryptographer here, in case a migration was pending. 221 vault_unsafe_.cryptographer.Bootstrap(restored_key_for_bootstrapping); 259 trans.GetWrappedTrans()).cryptographer.has_pending_keys(); 261 trans.GetWrappedTrans()).cryptographer.is_ready(); 262 // Log the state of the cryptographer regardless of migration state. 280 // Migration cannot occur until the cryptographer is ready (initialized 300 // Always trigger an encrypted types and cryptographer stat 340 Cryptographer* cryptographer = local 503 Cryptographer* cryptographer = local 702 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local 916 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local 1016 const Cryptographer& cryptographer = local 1112 Cryptographer* cryptographer = local 1150 Cryptographer* cryptographer = local 1203 const Cryptographer& cryptographer = local 1351 Cryptographer* cryptographer = local 1514 GetKeystoreDecryptor( const Cryptographer& cryptographer, const std::string& keystore_key, sync_pb::EncryptedData* encrypted_blob) argument 1536 AttemptToInstallKeybag( const sync_pb::EncryptedData& keybag, bool update_default, Cryptographer* cryptographer) argument 1562 DecryptPendingKeysWithKeystoreKey( const std::string& keystore_key, const sync_pb::EncryptedData& keystore_decryptor_token, Cryptographer* cryptographer) argument [all...] |
H A D | sync_manager_impl.cc | 130 Cryptographer* cryptographer) const { 145 if (!AreSpecificsEqual(cryptographer, 395 Cryptographer* cryptographer) { 396 allstatus_.SetCryptographerReady(cryptographer->is_ready()); 397 allstatus_.SetCryptoHasPendingKeys(cryptographer->has_pending_keys()); 720 Cryptographer* cryptographer, const syncable::EntryKernel& original, 729 DecryptPasswordSpecifics(original_specifics, cryptographer)); 739 if (!cryptographer->Decrypt(encrypted, &original_specifics)) { 394 OnCryptographerStateChanged( Cryptographer* cryptographer) argument 718 SetExtraChangeRecordData(int64 id, ModelType type, ChangeReorderBuffer* buffer, Cryptographer* cryptographer, const syncable::EntryKernel& original, bool existed_before, bool exists_now) argument
|
H A D | sync_manager_impl_unittest.cc | 70 #include "sync/util/cryptographer.h" 894 // Set the nigori cryptographer information. 899 Cryptographer* cryptographer = trans.GetCryptographer(); local 900 if (!cryptographer) 904 cryptographer->AddKey(params); 910 cryptographer->GetKeys(nigori.mutable_encryption_keybag()); 918 return cryptographer->is_ready(); 967 // Gets the set of encrypted types from the cryptographer 1058 Cryptographer* cryptographer = trans.GetCryptographer(); local 1059 EXPECT_TRUE(cryptographer 1103 Cryptographer* cryptographer = trans.GetCryptographer(); local 1246 Cryptographer* cryptographer = trans.GetCryptographer(); local 1260 Cryptographer* cryptographer = trans.GetCryptographer(); local 1278 Cryptographer* cryptographer = trans.GetCryptographer(); local 1296 Cryptographer* cryptographer = trans.GetCryptographer(); local 1328 Cryptographer* cryptographer = trans.GetCryptographer(); local 1354 Cryptographer* cryptographer = trans.GetCryptographer(); local 1382 Cryptographer* cryptographer = trans.GetCryptographer(); local 1402 Cryptographer* cryptographer = trans.GetCryptographer(); local 1440 Cryptographer* cryptographer = trans.GetCryptographer(); local 1461 Cryptographer* cryptographer = trans.GetCryptographer(); local 1485 Cryptographer* cryptographer = trans.GetCryptographer(); local 1520 Cryptographer* cryptographer = trans.GetCryptographer(); local 1538 Cryptographer* cryptographer = trans.GetCryptographer(); local 1564 Cryptographer* cryptographer = trans.GetCryptographer(); local 1792 Cryptographer* cryptographer = trans.GetCryptographer(); local 1820 Cryptographer* cryptographer = trans.GetCryptographer(); local 1845 Cryptographer* cryptographer = trans.GetCryptographer(); local 1863 Cryptographer* cryptographer = trans.GetCryptographer(); local 1883 Cryptographer* cryptographer = trans.GetCryptographer(); local 1897 Cryptographer* cryptographer = trans.GetCryptographer(); local 1932 Cryptographer* cryptographer = trans.GetCryptographer(); local 1964 Cryptographer* cryptographer = trans.GetCryptographer(); local 1984 Cryptographer* cryptographer = trans.GetCryptographer(); local 2023 Cryptographer* cryptographer = trans.GetCryptographer(); local [all...] |
/external/chromium_org/sync/syncable/ |
H A D | nigori_util.cc | 18 #include "sync/util/cryptographer.h" 27 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local 28 DCHECK(cryptographer->is_ready()); 98 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local 138 if (!cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted())) 153 Cryptographer* cryptographer = trans->directory()->GetCryptographer(trans); local 170 !cryptographer || !cryptographer->is_initialized()) { 198 if (!cryptographer->Encrypt(new_specifics,
|
H A D | entry_kernel.cc | 10 #include "sync/util/cryptographer.h" 90 Cryptographer* cryptographer, 101 if (cryptographer && 103 cryptographer->CanDecrypt(encrypted) && 104 cryptographer->Decrypt(encrypted, &decrypted)) { 148 Cryptographer* cryptographer) const { 194 SetEncryptableProtoValues(*this, cryptographer, kernel_info, 88 SetEncryptableProtoValues( const EntryKernel& kernel, Cryptographer* cryptographer, base::DictionaryValue* dictionary_value, int field_key_min, int field_key_max) argument
|
H A D | directory.cc | 104 Cryptographer* cryptographer) 112 cryptographer_(cryptographer), 99 Directory( DirectoryBackingStore* store, UnrecoverableErrorHandler* unrecoverable_error_handler, ReportUnrecoverableErrorFunction report_unrecoverable_error_function, NigoriHandler* nigori_handler, Cryptographer* cryptographer) argument
|
/external/chromium_org/sync/sessions/ |
H A D | model_type_registry.cc | 18 #include "sync/util/cryptographer.h" 329 Cryptographer* cryptographer) { 330 cryptographer_.reset(new Cryptographer(*cryptographer)); 328 OnCryptographerStateChanged( Cryptographer* cryptographer) argument
|
/external/chromium_org/chrome/browser/sync/glue/ |
H A D | sync_backend_host_core.cc | 295 syncer::Cryptographer* cryptographer) { 294 OnCryptographerStateChanged( syncer::Cryptographer* cryptographer) argument
|