/external/chromium_org/chrome/browser/sync/test/integration/ |
passwords_helper.h | 50 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
|
two_client_passwords_sync_test.cc | 23 using passwords_helper::SetDecryptionPassphrase; 123 ASSERT_TRUE(SetDecryptionPassphrase(1, kValidPassphrase)); 137 ASSERT_TRUE(SetDecryptionPassphrase(1, kValidPassphrase)); 243 ASSERT_TRUE(SetDecryptionPassphrase(1, kValidPassphrase)); 268 ASSERT_FALSE(SetDecryptionPassphrase(1, kAnotherValidPassphrase)); 283 ASSERT_TRUE(SetDecryptionPassphrase(1, kValidPassphrase));
|
passwords_helper.cc | 124 bool SetDecryptionPassphrase(int index, const std::string& passphrase) { 126 test()->GetProfile(index))->SetDecryptionPassphrase(passphrase);
|
two_client_sessions_sync_test.cc | 13 using passwords_helper::SetDecryptionPassphrase;
|
two_client_bookmarks_sync_test.cc | 39 using passwords_helper::SetDecryptionPassphrase; [all...] |
/external/chromium_org/sync/internal_api/public/ |
sync_encryption_handler.h | 158 virtual void SetDecryptionPassphrase(const std::string& passphrase) = 0;
|
/external/chromium_org/sync/test/ |
fake_sync_encryption_handler.h | 37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
|
fake_sync_encryption_handler.cc | 106 void FakeSyncEncryptionHandler::SetDecryptionPassphrase(
|
/external/chromium_org/chrome/browser/sync/glue/ |
sync_backend_host.h | 90 // this acts like a call to SetDecryptionPassphrase. If not, the GAIA 104 virtual bool SetDecryptionPassphrase(const std::string& passphrase)
|
sync_backend_host_mock.h | 50 virtual bool SetDecryptionPassphrase(
|
sync_backend_host_mock.cc | 41 bool SyncBackendHostMock::SetDecryptionPassphrase(
|
sync_backend_host_impl.h | 96 virtual bool SetDecryptionPassphrase(const std::string& passphrase) 289 // is called. This way, before the UI calls SetDecryptionPassphrase on the 293 // SetDecryptionPassphrase can still fail after the cached pending keys are
|
sync_backend_host_core.cc | 482 sync_manager_->GetEncryptionHandler()->SetDecryptionPassphrase(
|
sync_backend_host_impl.cc | 185 bool SyncBackendHostImpl::SetDecryptionPassphrase( 188 NOTREACHED() << "SetDecryptionPassphrase must never be called when nigori" 221 // pending. This scenario is a valid race, and SetDecryptionPassphrase can
|
/external/chromium_org/chrome/browser/sync/ |
profile_sync_service_android.h | 101 jboolean SetDecryptionPassphrase(JNIEnv* env,
|
profile_sync_service_mock.h | 125 MOCK_METHOD1(SetDecryptionPassphrase, bool(const std::string& passphrase));
|
profile_sync_service_android.cc | 260 jboolean ProfileSyncServiceAndroid::SetDecryptionPassphrase( 264 return sync_service_->SetDecryptionPassphrase(key);
|
profile_sync_service.h | 131 // * SetDecryptionPassphrase(): Attempt to decrypt the user's encrypted data 624 virtual bool SetDecryptionPassphrase(const std::string& passphrase) [all...] |
profile_sync_service.cc | [all...] |
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl.h | 62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE; 171 // and SetDecryptionPassphrase. 190 // The final step of SetEncryptionPassphrase and SetDecryptionPassphrase that
|
sync_encryption_handler_impl_unittest.cc | 765 encryption_handler()->SetDecryptionPassphrase(kOtherKey); [all...] |
sync_encryption_handler_impl.cc | 475 void SyncEncryptionHandlerImpl::SetDecryptionPassphrase( 508 // re-encrypted on another client while a SetDecryptionPassphrase() call is 615 << "Failure in SetDecryptionPassphrase; notifying and returning."; [all...] |
sync_manager_impl_unittest.cc | [all...] |
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 663 !service->SetDecryptionPassphrase(configuration.passphrase); 696 // SetDecryptionPassphrase() (passphrase_failed == false), but we still [all...] |
sync_setup_handler_unittest.cc | 733 EXPECT_CALL(*mock_pss_, SetDecryptionPassphrase("gaiaPassphrase")). 786 EXPECT_CALL(*mock_pss_, SetDecryptionPassphrase("invalid_passphrase")). [all...] |