Home | History | Annotate | Download | only in engine

Lines Matching refs:encrypted

209   const sync_pb::EncryptedData& encrypted = password_specifics.encrypted();
212 if (!crypto->Decrypt(encrypted, data.get()))
231 // We assume any node with the encrypted field set has encrypted data.
235 const sync_pb::EncryptedData& encrypted =
236 specifics.encrypted();
238 DecryptToString(encrypted);
242 LOG(ERROR) << "Failed to decrypt encrypted node of type " <<
438 DCHECK_NE(type, syncable::NIGORI); // Nigori is encrypted separately.
448 // This specifics is already encrypted, our work is done.
449 LOG(WARNING) << "Attempted to encrypt an already encrypted entity"
454 sync_pb::EntitySpecifics encrypted;
455 syncable::AddDefaultExtensionValue(type, &encrypted);
456 VLOG(2) << "Encrypted specifics of type " << syncable::ModelTypeToString(type)
460 encrypted.mutable_encrypted())) {
465 unencrypted->CopyFrom(encrypted);
564 // and the old ciphertext is encrypted with the most current key, there's
568 GetEntry()->Get(SPECIFICS).GetExtension(sync_pb::password).encrypted();
1102 // TODO(lipalani) - figure out what to do if the node is encrypted.
1225 // Whether or not the Nigori node is encrypted using an explicit passphrase.
1450 const sync_pb::EncryptedData& encrypted = a.ref(SPECIFICS).encrypted();
1451 a_str = cryptographer->DecryptToString(encrypted);
1456 const sync_pb::EncryptedData& encrypted = b.Get(SPECIFICS).encrypted();
1457 b_str = cryptographer->DecryptToString(encrypted);
1788 if (!nigori.encrypted().blob().empty()) {
1789 if (cryptographer->CanDecrypt(nigori.encrypted())) {
1790 cryptographer->SetKeys(nigori.encrypted());
1792 cryptographer->SetPendingKeys(nigori.encrypted());
1799 // Refresh list of encrypted datatypes.
1803 // Ensure any datatypes that need encryption are encrypted.
1966 // Nudge the syncer so that encrypted datatype updates that were waiting for
2023 LOG(ERROR) << "Unable to set encrypted datatypes because Nigori node not "
2029 // Update the Nigori node set of encrypted datatypes so other machines notice.
2030 // Note, we merge the current encrypted types with those requested. Once a
2045 // safer approach, and should not impact anything that is already encrypted
2132 // Rewrite the specifics of the node with encrypted data if necessary.
2140 // Passwords are encrypted with their own legacy scheme.
2381 // If this is a deletion and the datatype was encrypted, we need to decrypt it
2397 const sync_pb::EncryptedData& encrypted = original_specifics.encrypted();
2398 if (!cryptographer->Decrypt(encrypted, &original_specifics)) {
2483 // encrypted types or that we require a passphrase.
2493 // If passwords are enabled, they're automatically considered encrypted.
2499 if (!nigori.encrypted().blob().empty()) {
2500 DCHECK(!cryptographer->CanDecrypt(nigori.encrypted()));
2501 cryptographer->SetPendingKeys(nigori.encrypted());