/external/chromium/chrome/browser/sync/util/ |
H A D | cryptographer_unittest.cc | 5 #include "chrome/browser/sync/util/cryptographer.h" 18 Cryptographer cryptographer; local 19 EXPECT_FALSE(cryptographer.is_ready()); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 29 Cryptographer cryptographer; local 32 cryptographer.AddKey(params); 33 EXPECT_TRUE(cryptographer.is_ready()); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 43 Cryptographer cryptographer; local 46 EXPECT_TRUE(cryptographer 64 Cryptographer cryptographer; local 110 Cryptographer cryptographer; local 121 Cryptographer cryptographer; local 156 Cryptographer cryptographer; local [all...] |
/external/chromium/chrome/browser/sync/engine/ |
H A D | apply_updates_command_unittest.cc | 218 Cryptographer* cryptographer; local 220 // Storing the cryptographer separately is bad, but for this test we 225 cryptographer = 230 cryptographer->AddKey(params); 236 cryptographer->Encrypt(data, 280 Cryptographer* cryptographer = local 284 cryptographer->AddKey(params); 286 cryptographer->Encrypt(data, 292 // Create a new cryptographer, independent of the one in the session. 293 Cryptographer cryptographer; local 321 Cryptographer* cryptographer; local 365 Cryptographer* cryptographer; local 459 Cryptographer* cryptographer; local [all...] |
H A D | build_and_process_conflict_sets_command.h | 46 Cryptographer* cryptographer, sessions::StatusController* status, 52 Cryptographer* cryptographer,
|
H A D | update_applicator.cc | 20 Cryptographer* cryptographer, 26 cryptographer_(cryptographer), 19 UpdateApplicator(ConflictResolver* resolver, Cryptographer* cryptographer, const UpdateIterator& begin, const UpdateIterator& end, const ModelSafeRoutingInfo& routes, ModelSafeGroup group_filter) argument
|
H A D | update_applicator.h | 38 Cryptographer* cryptographer,
|
H A D | syncapi.cc | 561 Cryptographer* cryptographer = GetTransaction()->GetCryptographer(); local 570 DecryptPasswordSpecifics(GetEntry()->Get(SPECIFICS), cryptographer)); local 573 cryptographer->CanDecryptUsingDefaultKey(old_ciphertext)) { 578 if (!cryptographer->Encrypt(data, new_value.mutable_encrypted())) { 1314 Cryptographer* cryptographer, 1436 Cryptographer* cryptographer) { 1451 a_str = cryptographer->DecryptToString(encrypted); 1457 b_str = cryptographer->DecryptToString(encrypted); 1493 // decryption. Otherwise, the cryptographer is made ready (is_ready()). 1778 Cryptographer* cryptographer local 1434 VisiblePropertiesDiffer(const syncable::EntryKernel& a, const syncable::Entry& b, Cryptographer* cryptographer) argument 1949 Cryptographer* cryptographer = trans.GetCryptographer(); local 2377 SetExtraChangeRecordData(int64 id, syncable::ModelType type, ChangeReorderBuffer* buffer, Cryptographer* cryptographer, const syncable::EntryKernel& original, bool existed_before, bool exists_now) argument 2497 Cryptographer* cryptographer = trans.GetCryptographer(); local [all...] |
H A D | build_and_process_conflict_sets_command.cc | 62 Cryptographer* cryptographer, StatusController* status, 85 cryptographer, routes, status)) { 151 Cryptographer* cryptographer, 198 UpdateApplicator applicator(resolver, cryptographer, 60 ProcessSingleDirectionConflictSets( syncable::WriteTransaction* trans, ConflictResolver* resolver, Cryptographer* cryptographer, StatusController* status, const ModelSafeRoutingInfo& routes) argument 147 ApplyUpdatesTransactionally( syncable::WriteTransaction* trans, const vector<syncable::Id>* const update_set, ConflictResolver* resolver, Cryptographer* cryptographer, const ModelSafeRoutingInfo& routes, StatusController* status) argument
|
H A D | syncer_util.cc | 248 Cryptographer* cryptographer) { 298 if (cryptographer->CanDecrypt(nigori.encrypted())) { 299 cryptographer->SetKeys(nigori.encrypted()); 301 cryptographer->SetPendingKeys(nigori.encrypted()); 309 (!cryptographer->is_ready() || 311 cryptographer))) { 315 // because the cryptographer already has the pending keys set, so once 337 !cryptographer->CanDecrypt(specifics.encrypted())) { 344 if (!cryptographer->CanDecrypt(password.encrypted())) { 244 AttemptToUpdateEntry( syncable::WriteTransaction* const trans, syncable::MutableEntry* const entry, ConflictResolver* resolver, Cryptographer* cryptographer) argument
|
H A D | syncer_util.h | 60 Cryptographer* cryptographer);
|
H A D | syncapi_unittest.cc | 38 #include "chrome/browser/sync/util/cryptographer.h" 721 // Set the nigori cryptographer information. 723 Cryptographer* cryptographer = trans.GetCryptographer(); local 724 if (!cryptographer) 727 cryptographer->AddKey(params); 729 cryptographer->GetKeys(nigori.mutable_encrypted()); 733 return cryptographer->is_ready();
|
/external/chromium/chrome/browser/sync/syncable/ |
H A D | directory_manager.h | 24 #include "chrome/browser/sync/util/cryptographer.h" 76 // Wrappers for cryptographer() that enforce holding a transaction. 81 const sync_api::BaseTransaction* trans) const { return cryptographer(); } 83 const syncable::BaseTransaction* trans) const { return cryptographer(); } 86 browser_sync::Cryptographer* cryptographer() const { function in class:syncable::DirectoryManager
|
H A D | nigori_util.h | 52 browser_sync::Cryptographer* cryptographer);
|
H A D | nigori_util.cc | 13 #include "chrome/browser/sync/util/cryptographer.h" 77 browser_sync::Cryptographer* cryptographer) { 94 if (!cryptographer->Encrypt( 109 if (!cryptographer->Decrypt(entry_specifics.encrypted(), 74 ProcessUnsyncedChangesForEncryption( WriteTransaction* const trans, const ModelTypeSet& encrypted_types, browser_sync::Cryptographer* cryptographer) argument
|