/external/chromium/chrome/browser/sync/syncable/ |
model_type.cc | 51 case NIGORI: 52 specifics->MutableExtension(sync_pb::nigori); 101 case NIGORI: 175 if (specifics.HasExtension(sync_pb::nigori)) 176 return NIGORI; 203 case NIGORI: 259 return NIGORI; 329 case NIGORI: 384 case NIGORI: { 413 const char kNigoriNotificationType[] = "NIGORI"; [all...] |
nigori_util_unittest.cc | 13 sync_pb::NigoriSpecifics nigori; local 15 FillNigoriEncryptedTypes(encrypted_types, &nigori); 16 ModelTypeSet test_types = GetEncryptedDataTypesFromNigori(nigori); 22 FillNigoriEncryptedTypes(encrypted_types, &nigori); 23 test_types = GetEncryptedDataTypesFromNigori(nigori); 24 encrypted_types.erase(syncable::NIGORI); // Should not get set. 30 FillNigoriEncryptedTypes(encrypted_types, &nigori); 31 test_types = GetEncryptedDataTypesFromNigori(nigori);
|
model_type.h | 66 // An object represeting a set of Nigori keys. 67 NIGORI,
|
nigori_util.cc | 18 std::string nigori_tag = ModelTypeToRootTag(syncable::NIGORI); 21 VLOG(1) << "Nigori node not found, assuming no encrypted datatypes."; 24 if (NIGORI != entry.GetModelType()) { 25 // Can happen if we fail to apply the nigori node due to a conflict. 26 VLOG(1) << "Nigori node does not have nigori extension. Assuming no" 32 specifics.GetExtension(sync_pb::nigori)); 36 const sync_pb::NigoriSpecifics& nigori) { 37 // We don't check NIGORI datatype, it uses its own encryption scheme. 39 if (nigori.encrypt_bookmarks() [all...] |
/external/chromium/chrome/browser/sync/ |
abstract_profile_sync_service_test.cc | 52 case syncable::NIGORI:
|
test_profile_sync_service.cc | 213 if (!dir->initial_sync_ended_for_type(syncable::NIGORI)) { 215 syncable::NIGORI, GetUserShare(), 218 // A side effect of adding the NIGORI mode (normally done by the syncer)
|
/external/chromium/chrome/browser/sync/engine/ |
apply_updates_command_unittest.cc | 49 (*mutable_routing_info())[syncable::NIGORI] = GROUP_PASSIVE; 332 // Nigori node updates should update the Cryptographer. 338 sync_pb::NigoriSpecifics* nigori = local 339 specifics.MutableExtension(sync_pb::nigori); 340 other_cryptographer.GetKeys(nigori->mutable_encrypted()); 341 nigori->set_encrypt_bookmarks(true); 343 CreateUnappliedNewItem(syncable::ModelTypeToRootTag(syncable::NIGORI), 354 << "The nigori update shouldn't be in conflict"; 356 << "The nigori update should be applied"; 406 sync_pb::NigoriSpecifics* nigori local 503 sync_pb::NigoriSpecifics* nigori = local [all...] |
syncapi.cc | 381 DCHECK_EQ(syncable::NIGORI, GetModelType()); 384 return unencrypted.GetExtension(sync_pb::nigori); 438 DCHECK_NE(type, syncable::NIGORI); // Nigori is encrypted separately. 546 DCHECK_EQ(syncable::NIGORI, GetModelType()); 553 entity_specifics.MutableExtension(sync_pb::nigori)->CopyFrom(new_value); 740 DCHECK_EQ(syncable::NIGORI, model_type); 2032 sync_pb::NigoriSpecifics nigori; local 2490 const sync_pb::NigoriSpecifics& nigori = node.GetNigoriSpecifics(); local [all...] |
syncapi_unittest.cc | 146 // Attempt to lookup by nigori tag. 706 (*out)[syncable::NIGORI] = browser_sync::GROUP_PASSIVE; 715 // We need to create the nigori node as if it were an applied server update. 717 int64 nigori_id = GetIdForDataType(syncable::NIGORI); 721 // Set the nigori cryptographer information. 728 sync_pb::NigoriSpecifics nigori; local 729 cryptographer->GetKeys(nigori.mutable_encrypted()); 732 node.SetNigoriSpecifics(nigori); [all...] |
/external/chromium/net/tools/testserver/ |
chromiumsync.py | 42 NIGORI, 60 NIGORI: nigori_specifics_pb2.nigori, 265 PermanentItem('google_chrome_nigori', name='Nigori', 266 parent_tag='google_chrome', sync_type=NIGORI), [all...] |
/external/chromium/chrome/browser/sync/glue/ |
data_type_manager_impl.cc | 25 syncable::NIGORI, // Listed for completeness.
|
sync_backend_host.cc | 137 // Nigori is populated by default now. 138 registrar_.routing_info[syncable::NIGORI] = GROUP_PASSIVE; 169 // Note that NIGORI is only ever added/removed from routing_info once, 172 return registrar_.routing_info.find(syncable::NIGORI) != 459 types_copy.set(syncable::NIGORI); [all...] |