/external/chromium_org/sync/engine/ |
H A D | apply_control_data_updates.cc | 81 // Update the nigori handler with the server's nigori node. 83 // If we have a locally modified nigori node, we merge them manually. This 90 // local passphrase, while the nigori node will preserve the server encryption 97 // We apply the nigori update regardless of whether there's a conflict or 102 const sync_pb::NigoriSpecifics& nigori = local 103 entry->GetServerSpecifics().nigori(); 104 trans->directory()->GetNigoriHandler()->ApplyNigoriUpdate(nigori, trans); 109 // This logic covers the case where the nigori update marked new datatypes 121 DVLOG(1) << "Received new nigori, encryptin [all...] |
H A D | apply_control_data_updates_unittest.cc | 62 // Verify that applying a nigori node sets initial sync ended properly, 84 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local 85 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag()); 86 nigori->set_encrypt_everything(true); 102 // Create some local unsynced and unencrypted data. Apply a nigori update that 104 // data as part of the nigori update. Apply another nigori update with no 151 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local 152 cryptographer->GetKeys(nigori->mutable_encryption_keybag()); 153 nigori 267 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local [all...] |
H A D | model_type_sync_worker_impl_unittest.cc | 26 const char kNigoriKeyName[] = "nigori-key"; 88 // Use the Nth nigori instance to encrypt incoming updates. 189 static std::string GetNigoriName(const Nigori& nigori); 299 Nigori nigori; local 301 nigori.InitByDerivation(params.hostname, params.username, params.password); 305 key->set_name(GetNigoriName(nigori)); 306 nigori.ExportKeys(key->mutable_user_key(), 311 // Re-create the last nigori from that loop. 317 // Serialize and encrypt the bag with the last nigori. 606 std::string ModelTypeSyncWorkerImplTest::GetNigoriName(const Nigori& nigori) { argument 629 Nigori nigori; local [all...] |
H A D | syncer_unittest.cc | 720 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local 721 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag()); 727 GetCryptographer(&wtrans)->SetPendingKeys(nigori->encryption_keybag()); 891 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local 892 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag()); 894 GetCryptographer(&wtrans)->SetPendingKeys(nigori->encryption_keybag());
|
/external/chromium_org/sync/util/ |
H A D | nigori_unittest.cc | 5 #include "sync/util/nigori.h" 17 Nigori nigori; local 18 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 21 EXPECT_TRUE(nigori.Permute(Nigori::Password, "test name", 52 Nigori nigori; local 53 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1)); 61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2)); 67 Nigori nigori; local 68 EXPECT_TRUE(nigori 82 Nigori nigori; local 97 Nigori nigori; local 115 Nigori nigori; local [all...] |
H A D | cryptographer_unittest.cc | 148 sync_pb::EncryptedData nigori; local 164 EXPECT_TRUE(cryptographer.GetKeys(&nigori)); 169 EXPECT_FALSE(cryptographer.CanDecrypt(nigori)); 171 cryptographer.SetPendingKeys(nigori);
|
H A D | cryptographer.cc | 23 const char kNigoriKeyName[] = "nigori-key"; 150 const Nigori& nigori = *it->second; local 153 nigori.ExportKeys(key->mutable_user_key(), 164 scoped_ptr<Nigori> nigori(new Nigori); 165 if (!nigori->InitByDerivation(params.hostname, 171 return AddKeyImpl(nigori.Pass(), true); 177 scoped_ptr<Nigori> nigori(new Nigori); 178 if (!nigori->InitByDerivation(params.hostname, 184 return AddKeyImpl(nigori.Pass(), false); 246 Nigori nigori; local [all...] |
/external/chromium_org/sync/test/ |
H A D | fake_sync_encryption_handler.cc | 27 const sync_pb::NigoriSpecifics& nigori, 29 if (nigori.encrypt_everything()) 31 if (nigori.keybag_is_frozen()) 35 if (cryptographer_.CanDecrypt(nigori.encryption_keybag())) 36 cryptographer_.InstallKeys(nigori.encryption_keybag()); 37 else if (nigori.has_encryption_keybag()) 38 cryptographer_.SetPendingKeys(nigori.encryption_keybag()); 56 sync_pb::NigoriSpecifics* nigori, 60 nigori); 26 ApplyNigoriUpdate( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument 55 UpdateNigoriFromEncryptedTypes( sync_pb::NigoriSpecifics* nigori, syncable::BaseTransaction* const trans) const argument
|
/external/chromium_org/sync/syncable/ |
H A D | nigori_util.cc | 160 // It's possible the nigori lost the set of encrypted types. If the current 244 sync_pb::NigoriSpecifics* nigori) { 245 nigori->set_encrypt_everything(encrypt_everything); 247 nigori->set_encrypt_bookmarks( 249 nigori->set_encrypt_preferences( 251 nigori->set_encrypt_autofill_profile( 253 nigori->set_encrypt_autofill(encrypted_types.Has(AUTOFILL)); 254 nigori->set_encrypt_themes(encrypted_types.Has(THEMES)); 255 nigori->set_encrypt_typed_urls( 257 nigori 242 UpdateNigoriFromEncryptedTypes(ModelTypeSet encrypted_types, bool encrypt_everything, sync_pb::NigoriSpecifics* nigori) argument 276 GetEncryptedTypesFromNigori( const sync_pb::NigoriSpecifics& nigori) argument [all...] |
/external/chromium_org/sync/internal_api/ |
H A D | sync_encryption_handler_impl_unittest.cc | 150 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local 152 EXPECT_EQ(migration_time, nigori.keystore_migration_time()); 154 EXPECT_TRUE(nigori.has_keystore_migration_time()); 155 EXPECT_TRUE(nigori.keybag_is_frozen()); 158 EXPECT_TRUE(nigori.encrypt_everything()); 159 EXPECT_TRUE(nigori.keystore_decryptor_token().blob().empty()); 162 nigori.passphrase_type()); 164 EXPECT_EQ(nigori.custom_passphrase_time(), 170 nigori.passphrase_type()); 173 EXPECT_FALSE(nigori 210 sync_pb::NigoriSpecifics nigori; local 243 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local 276 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local 313 sync_pb::NigoriSpecifics nigori; local 346 sync_pb::NigoriSpecifics nigori; local 416 sync_pb::NigoriSpecifics nigori; local 452 sync_pb::NigoriSpecifics nigori; local 491 sync_pb::NigoriSpecifics nigori; local 591 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local 738 sync_pb::NigoriSpecifics nigori; local 795 sync_pb::NigoriSpecifics nigori; local 1039 sync_pb::NigoriSpecifics nigori; local 1119 sync_pb::NigoriSpecifics nigori; local 1199 sync_pb::NigoriSpecifics nigori; local 1261 sync_pb::NigoriSpecifics nigori; local 1306 sync_pb::NigoriSpecifics nigori; local 1340 sync_pb::NigoriSpecifics nigori; local 1383 sync_pb::NigoriSpecifics nigori; local 1432 sync_pb::NigoriSpecifics nigori; local 1513 sync_pb::NigoriSpecifics nigori; local 1615 sync_pb::NigoriSpecifics nigori; local 1722 sync_pb::NigoriSpecifics nigori; local 1817 sync_pb::NigoriSpecifics nigori; local 1935 sync_pb::NigoriSpecifics nigori; local 2191 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local [all...] |
H A D | sync_encryption_handler_impl.cc | 39 // The maximum number of times we will automatically overwrite the nigori node 41 // We protect ourselves against nigori rollbacks, but it's possible two 42 // different clients might have contrasting view of what the nigori node state 46 // Enumeration of nigori keystore migration results (for use in UMA stats). 67 // The new passphrase state is sufficient to determine whether a nigori node 74 bool IsNigoriMigratedToKeystore(const sync_pb::NigoriSpecifics& nigori) { argument 75 if (!nigori.has_passphrase_type()) 77 if (!nigori.has_keystore_migration_time()) 79 if (!nigori.keybag_is_frozen()) 81 if (nigori 646 ApplyNigoriUpdate( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument 665 UpdateNigoriFromEncryptedTypes( sync_pb::NigoriSpecifics* nigori, syncable::BaseTransaction* const trans) const argument 724 const sync_pb::NigoriSpecifics& nigori = local 847 ApplyNigoriUpdateImpl( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument 1059 UpdateEncryptedTypesFromNigori( const sync_pb::NigoriSpecifics& nigori, syncable::BaseTransaction* const trans) argument 1289 ShouldTriggerMigration( const sync_pb::NigoriSpecifics& nigori, const Cryptographer& cryptographer) const argument [all...] |
H A D | sync_manager_impl_unittest.cc | 149 // Attempt to lookup by nigori tag. 889 // We need to create the nigori node as if it were an applied server update. 894 // Set the nigori cryptographer information. 909 sync_pb::NigoriSpecifics nigori; local 910 cryptographer->GetKeys(nigori.mutable_encryption_keybag()); 912 &nigori, 916 node.SetNigoriSpecifics(nigori); 1056 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local 1057 EXPECT_TRUE(nigori.has_encryption_keybag()); 1060 EXPECT_TRUE(cryptographer->CanDecrypt(nigori 1101 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local 1245 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local 1365 sync_pb::NigoriSpecifics nigori; local 1413 sync_pb::NigoriSpecifics nigori; local 1496 sync_pb::NigoriSpecifics nigori; local 1545 sync_pb::NigoriSpecifics nigori; local [all...] |
/external/chromium_org/chrome/browser/sync/glue/ |
H A D | sync_backend_host_impl.cc | 187 NOTREACHED() << "SetEncryptionPassphrase must never be called when nigori" 213 NOTREACHED() << "SetDecryptionPassphrase must never be called when nigori" 245 // syncer thread, since we could receive a new nigori node while the task is 381 // data types being downloaded here but the nigori type, which is always 384 // the nigori type is the only requested type which requires migration, and 385 // that the requested types list includes at least one non-nigori type. It 387 // careful to not send progress markers for non-nigori types, though. If a 388 // non-nigori type in the request requires migration, a MIGRATION_DONE 766 syncer::Nigori nigori; local 767 nigori [all...] |