Searched defs:nigori (Results 1 - 13 of 13) sorted by relevance

/external/chromium_org/sync/engine/
H A Dapply_control_data_updates.cc81 // Update the nigori handler with the server's nigori node.
83 // If we have a locally modified nigori node, we merge them manually. This
90 // local passphrase, while the nigori node will preserve the server encryption
97 // We apply the nigori update regardless of whether there's a conflict or
102 const sync_pb::NigoriSpecifics& nigori = local
103 entry->GetServerSpecifics().nigori();
104 trans->directory()->GetNigoriHandler()->ApplyNigoriUpdate(nigori, trans);
109 // This logic covers the case where the nigori update marked new datatypes
121 DVLOG(1) << "Received new nigori, encryptin
[all...]
H A Dapply_control_data_updates_unittest.cc62 // Verify that applying a nigori node sets initial sync ended properly,
84 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
85 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag());
86 nigori->set_encrypt_everything(true);
102 // Create some local unsynced and unencrypted data. Apply a nigori update that
104 // data as part of the nigori update. Apply another nigori update with no
151 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
152 cryptographer->GetKeys(nigori->mutable_encryption_keybag());
153 nigori
267 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
[all...]
H A Dmodel_type_sync_worker_impl_unittest.cc26 const char kNigoriKeyName[] = "nigori-key";
88 // Use the Nth nigori instance to encrypt incoming updates.
189 static std::string GetNigoriName(const Nigori& nigori);
299 Nigori nigori; local
301 nigori.InitByDerivation(params.hostname, params.username, params.password);
305 key->set_name(GetNigoriName(nigori));
306 nigori.ExportKeys(key->mutable_user_key(),
311 // Re-create the last nigori from that loop.
317 // Serialize and encrypt the bag with the last nigori.
606 std::string ModelTypeSyncWorkerImplTest::GetNigoriName(const Nigori& nigori) { argument
629 Nigori nigori; local
[all...]
H A Dsyncer_unittest.cc720 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
721 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag());
727 GetCryptographer(&wtrans)->SetPendingKeys(nigori->encryption_keybag());
891 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
892 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag());
894 GetCryptographer(&wtrans)->SetPendingKeys(nigori->encryption_keybag());
/external/chromium_org/sync/util/
H A Dnigori_unittest.cc5 #include "sync/util/nigori.h"
17 Nigori nigori; local
18 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password"));
21 EXPECT_TRUE(nigori.Permute(Nigori::Password, "test name",
52 Nigori nigori; local
53 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password"));
58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1));
61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2));
67 Nigori nigori; local
68 EXPECT_TRUE(nigori
82 Nigori nigori; local
97 Nigori nigori; local
115 Nigori nigori; local
[all...]
H A Dcryptographer_unittest.cc148 sync_pb::EncryptedData nigori; local
164 EXPECT_TRUE(cryptographer.GetKeys(&nigori));
169 EXPECT_FALSE(cryptographer.CanDecrypt(nigori));
171 cryptographer.SetPendingKeys(nigori);
H A Dcryptographer.cc23 const char kNigoriKeyName[] = "nigori-key";
150 const Nigori& nigori = *it->second; local
153 nigori.ExportKeys(key->mutable_user_key(),
164 scoped_ptr<Nigori> nigori(new Nigori);
165 if (!nigori->InitByDerivation(params.hostname,
171 return AddKeyImpl(nigori.Pass(), true);
177 scoped_ptr<Nigori> nigori(new Nigori);
178 if (!nigori->InitByDerivation(params.hostname,
184 return AddKeyImpl(nigori.Pass(), false);
246 Nigori nigori; local
[all...]
/external/chromium_org/sync/test/
H A Dfake_sync_encryption_handler.cc27 const sync_pb::NigoriSpecifics& nigori,
29 if (nigori.encrypt_everything())
31 if (nigori.keybag_is_frozen())
35 if (cryptographer_.CanDecrypt(nigori.encryption_keybag()))
36 cryptographer_.InstallKeys(nigori.encryption_keybag());
37 else if (nigori.has_encryption_keybag())
38 cryptographer_.SetPendingKeys(nigori.encryption_keybag());
56 sync_pb::NigoriSpecifics* nigori,
60 nigori);
26 ApplyNigoriUpdate( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument
55 UpdateNigoriFromEncryptedTypes( sync_pb::NigoriSpecifics* nigori, syncable::BaseTransaction* const trans) const argument
/external/chromium_org/sync/syncable/
H A Dnigori_util.cc160 // It's possible the nigori lost the set of encrypted types. If the current
244 sync_pb::NigoriSpecifics* nigori) {
245 nigori->set_encrypt_everything(encrypt_everything);
247 nigori->set_encrypt_bookmarks(
249 nigori->set_encrypt_preferences(
251 nigori->set_encrypt_autofill_profile(
253 nigori->set_encrypt_autofill(encrypted_types.Has(AUTOFILL));
254 nigori->set_encrypt_themes(encrypted_types.Has(THEMES));
255 nigori->set_encrypt_typed_urls(
257 nigori
242 UpdateNigoriFromEncryptedTypes(ModelTypeSet encrypted_types, bool encrypt_everything, sync_pb::NigoriSpecifics* nigori) argument
276 GetEncryptedTypesFromNigori( const sync_pb::NigoriSpecifics& nigori) argument
[all...]
/external/chromium_org/sync/internal_api/
H A Dsync_encryption_handler_impl_unittest.cc150 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local
152 EXPECT_EQ(migration_time, nigori.keystore_migration_time());
154 EXPECT_TRUE(nigori.has_keystore_migration_time());
155 EXPECT_TRUE(nigori.keybag_is_frozen());
158 EXPECT_TRUE(nigori.encrypt_everything());
159 EXPECT_TRUE(nigori.keystore_decryptor_token().blob().empty());
162 nigori.passphrase_type());
164 EXPECT_EQ(nigori.custom_passphrase_time(),
170 nigori.passphrase_type());
173 EXPECT_FALSE(nigori
210 sync_pb::NigoriSpecifics nigori; local
243 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local
276 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local
313 sync_pb::NigoriSpecifics nigori; local
346 sync_pb::NigoriSpecifics nigori; local
416 sync_pb::NigoriSpecifics nigori; local
452 sync_pb::NigoriSpecifics nigori; local
491 sync_pb::NigoriSpecifics nigori; local
591 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local
738 sync_pb::NigoriSpecifics nigori; local
795 sync_pb::NigoriSpecifics nigori; local
1039 sync_pb::NigoriSpecifics nigori; local
1119 sync_pb::NigoriSpecifics nigori; local
1199 sync_pb::NigoriSpecifics nigori; local
1261 sync_pb::NigoriSpecifics nigori; local
1306 sync_pb::NigoriSpecifics nigori; local
1340 sync_pb::NigoriSpecifics nigori; local
1383 sync_pb::NigoriSpecifics nigori; local
1432 sync_pb::NigoriSpecifics nigori; local
1513 sync_pb::NigoriSpecifics nigori; local
1615 sync_pb::NigoriSpecifics nigori; local
1722 sync_pb::NigoriSpecifics nigori; local
1817 sync_pb::NigoriSpecifics nigori; local
1935 sync_pb::NigoriSpecifics nigori; local
2191 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local
[all...]
H A Dsync_encryption_handler_impl.cc39 // The maximum number of times we will automatically overwrite the nigori node
41 // We protect ourselves against nigori rollbacks, but it's possible two
42 // different clients might have contrasting view of what the nigori node state
46 // Enumeration of nigori keystore migration results (for use in UMA stats).
67 // The new passphrase state is sufficient to determine whether a nigori node
74 bool IsNigoriMigratedToKeystore(const sync_pb::NigoriSpecifics& nigori) { argument
75 if (!nigori.has_passphrase_type())
77 if (!nigori.has_keystore_migration_time())
79 if (!nigori.keybag_is_frozen())
81 if (nigori
646 ApplyNigoriUpdate( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument
665 UpdateNigoriFromEncryptedTypes( sync_pb::NigoriSpecifics* nigori, syncable::BaseTransaction* const trans) const argument
724 const sync_pb::NigoriSpecifics& nigori = local
847 ApplyNigoriUpdateImpl( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument
1059 UpdateEncryptedTypesFromNigori( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument
1289 ShouldTriggerMigration( const sync_pb::NigoriSpecifics& nigori, const Cryptographer& cryptographer) const argument
[all...]
H A Dsync_manager_impl_unittest.cc149 // Attempt to lookup by nigori tag.
889 // We need to create the nigori node as if it were an applied server update.
894 // Set the nigori cryptographer information.
909 sync_pb::NigoriSpecifics nigori; local
910 cryptographer->GetKeys(nigori.mutable_encryption_keybag());
912 &nigori,
916 node.SetNigoriSpecifics(nigori);
1056 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local
1057 EXPECT_TRUE(nigori.has_encryption_keybag());
1060 EXPECT_TRUE(cryptographer->CanDecrypt(nigori
1101 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local
1245 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local
1365 sync_pb::NigoriSpecifics nigori; local
1413 sync_pb::NigoriSpecifics nigori; local
1496 sync_pb::NigoriSpecifics nigori; local
1545 sync_pb::NigoriSpecifics nigori; local
[all...]
/external/chromium_org/chrome/browser/sync/glue/
H A Dsync_backend_host_impl.cc187 NOTREACHED() << "SetEncryptionPassphrase must never be called when nigori"
213 NOTREACHED() << "SetDecryptionPassphrase must never be called when nigori"
245 // syncer thread, since we could receive a new nigori node while the task is
381 // data types being downloaded here but the nigori type, which is always
384 // the nigori type is the only requested type which requires migration, and
385 // that the requested types list includes at least one non-nigori type. It
387 // careful to not send progress markers for non-nigori types, though. If a
388 // non-nigori type in the request requires migration, a MIGRATION_DONE
766 syncer::Nigori nigori; local
767 nigori
[all...]

Completed in 925 milliseconds