/external/chromium/chrome/browser/sync/syncable/ |
nigori_util_unittest.cc | 13 sync_pb::NigoriSpecifics nigori; local 15 FillNigoriEncryptedTypes(encrypted_types, &nigori); 16 ModelTypeSet test_types = GetEncryptedDataTypesFromNigori(nigori); 22 FillNigoriEncryptedTypes(encrypted_types, &nigori); 23 test_types = GetEncryptedDataTypesFromNigori(nigori); 24 encrypted_types.erase(syncable::NIGORI); // Should not get set. 30 FillNigoriEncryptedTypes(encrypted_types, &nigori); 31 test_types = GetEncryptedDataTypesFromNigori(nigori);
|
/external/chromium_org/sync/engine/ |
apply_control_data_updates.cc | 51 if (type == NIGORI) { 52 // Nigori node applications never fail. 83 // Update the nigori handler with the server's nigori node. 85 // If we have a locally modified nigori node, we merge them manually. This 92 // local passphrase, while the nigori node will preserve the server encryption 99 // We apply the nigori update regardless of whether there's a conflict or 104 const sync_pb::NigoriSpecifics& nigori = local 105 entry->GetServerSpecifics().nigori(); 106 trans->directory()->GetNigoriHandler()->ApplyNigoriUpdate(nigori, trans) [all...] |
apply_control_data_updates_unittest.cc | 62 // Verify that applying a nigori node sets initial sync ended properly, 78 // Nigori node updates should update the Cryptographer. 84 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local 85 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag()); 86 nigori->set_encrypt_everything(true); 88 ModelTypeToRootTag(NIGORI), specifics, true); 102 // Create some local unsynced and unencrypted data. Apply a nigori update that 104 // data as part of the nigori update. Apply another nigori update with no 151 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori() local 268 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local [all...] |
syncer_unittest.cc | 215 EnableDatatype(NIGORI); 217 EnableDatatype(NIGORI); 623 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local 624 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag()); 630 GetCryptographer(&wtrans)->SetPendingKeys(nigori->encryption_keybag()); 736 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local 737 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag()); 739 GetCryptographer(&wtrans)->SetPendingKeys(nigori->encryption_keybag()); [all...] |
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 5 #include "chrome/browser/sync/util/nigori.h" 17 Nigori nigori; local 18 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 21 EXPECT_TRUE(nigori.Permute(Nigori::Password, "test name", 31 Nigori nigori1; 35 EXPECT_TRUE(nigori1.Permute(Nigori::Password, 39 Nigori nigori2; 43 EXPECT_TRUE(nigori2.Permute(Nigori::Password 52 Nigori nigori; local 67 Nigori nigori; local 82 Nigori nigori; local 97 Nigori nigori; local 115 Nigori nigori; local [all...] |
cryptographer_unittest.cc | 101 sync_pb::EncryptedData nigori; local 117 EXPECT_TRUE(cryptographer.GetKeys(&nigori)); 122 EXPECT_FALSE(cryptographer.CanDecrypt(nigori)); 124 cryptographer.SetPendingKeys(nigori); 150 Nigori nigori; local 151 ASSERT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 153 ASSERT_TRUE(nigori.ExportKeys(&expected_user, &expected_encryption, 158 EXPECT_TRUE(cryptographer.PackBootstrapToken(&nigori, &token)); 161 scoped_ptr<Nigori> unpacked(cryptographer.UnpackBootstrapToken(token)) [all...] |
cryptographer.cc | 13 // We name a particular Nigori instance (ie. a triplet consisting of a hostname, 17 const char kNigoriKeyName[] = "nigori-key"; 30 scoped_ptr<Nigori> nigori(UnpackBootstrapToken(restored_bootstrap_token)); 31 if (nigori.get()) 32 AddKeyImpl(nigori.release()); 91 // Create a bag of all the Nigori parameters we know about. 95 const Nigori& nigori = *it->second; local 98 nigori.ExportKeys(key->mutable_user_key() 150 Nigori nigori; local [all...] |
/external/chromium_org/sync/util/ |
cryptographer_unittest.cc | 148 sync_pb::EncryptedData nigori; local 164 EXPECT_TRUE(cryptographer.GetKeys(&nigori)); 169 EXPECT_FALSE(cryptographer.CanDecrypt(nigori)); 171 cryptographer.SetPendingKeys(nigori);
|
nigori_unittest.cc | 5 #include "sync/util/nigori.h" 17 Nigori nigori; local 18 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password")); 21 EXPECT_TRUE(nigori.Permute(Nigori::Password, "test name", 31 Nigori nigori1; 35 EXPECT_TRUE(nigori1.Permute(Nigori::Password, 39 Nigori nigori2; 43 EXPECT_TRUE(nigori2.Permute(Nigori::Password 52 Nigori nigori; local 67 Nigori nigori; local 82 Nigori nigori; local 97 Nigori nigori; local 115 Nigori nigori; local [all...] |
cryptographer.cc | 19 // We name a particular Nigori instance (ie. a triplet consisting of a hostname, 23 const char kNigoriKeyName[] = "nigori-key"; 128 // Create a bag of all the Nigori parameters we know about. 132 const Nigori& nigori = *it->second; local 135 nigori.ExportKeys(key->mutable_user_key(), 140 // Encrypt the bag with the default Nigori. 145 // Create the new Nigori and make it the default encryptor. 146 scoped_ptr<Nigori> nigori(new Nigori) 228 Nigori nigori; local [all...] |
/external/chromium/chrome/browser/sync/engine/ |
apply_updates_command_unittest.cc | 49 (*mutable_routing_info())[syncable::NIGORI] = GROUP_PASSIVE; 332 // Nigori node updates should update the Cryptographer. 338 sync_pb::NigoriSpecifics* nigori = local 339 specifics.MutableExtension(sync_pb::nigori); 340 other_cryptographer.GetKeys(nigori->mutable_encrypted()); 341 nigori->set_encrypt_bookmarks(true); 343 CreateUnappliedNewItem(syncable::ModelTypeToRootTag(syncable::NIGORI), 354 << "The nigori update shouldn't be in conflict"; 356 << "The nigori update should be applied"; 406 sync_pb::NigoriSpecifics* nigori local 503 sync_pb::NigoriSpecifics* nigori = local [all...] |
syncer_util.cc | 290 // We intercept updates to the Nigori node, update the Cryptographer and 291 // encrypt any unsynced changes here because there is no Nigori 294 if (specifics.HasExtension(sync_pb::nigori)) { 295 const sync_pb::NigoriSpecifics& nigori = local 296 specifics.GetExtension(sync_pb::nigori); 297 if (!nigori.encrypted().blob().empty()) { 298 if (cryptographer->CanDecrypt(nigori.encrypted())) { 299 cryptographer->SetKeys(nigori.encrypted()); 301 cryptographer->SetPendingKeys(nigori.encrypted()); 307 syncable::GetEncryptedDataTypesFromNigori(nigori); [all...] |
syncapi_unittest.cc | 146 // Attempt to lookup by nigori tag. 706 (*out)[syncable::NIGORI] = browser_sync::GROUP_PASSIVE; 715 // We need to create the nigori node as if it were an applied server update. 717 int64 nigori_id = GetIdForDataType(syncable::NIGORI); 721 // Set the nigori cryptographer information. 728 sync_pb::NigoriSpecifics nigori; local 729 cryptographer->GetKeys(nigori.mutable_encrypted()); 732 node.SetNigoriSpecifics(nigori); [all...] |
syncapi.cc | 381 DCHECK_EQ(syncable::NIGORI, GetModelType()); 384 return unencrypted.GetExtension(sync_pb::nigori); 438 DCHECK_NE(type, syncable::NIGORI); // Nigori is encrypted separately. 546 DCHECK_EQ(syncable::NIGORI, GetModelType()); 553 entity_specifics.MutableExtension(sync_pb::nigori)->CopyFrom(new_value); 740 DCHECK_EQ(syncable::NIGORI, model_type); 2032 sync_pb::NigoriSpecifics nigori; local 2490 const sync_pb::NigoriSpecifics& nigori = node.GetNigoriSpecifics(); local [all...] |
/external/chromium_org/chrome/browser/sync/glue/ |
sync_backend_host_impl.cc | 162 NOTREACHED() << "SetEncryptionPassphrase must never be called when nigori" 188 NOTREACHED() << "SetDecryptionPassphrase must never be called when nigori" 220 // syncer thread, since we could receive a new nigori node while the task is 337 types_to_download.Put(syncer::NIGORI); 351 // data types being downloaded here but the nigori type, which is always 354 // the nigori type is the only requested type which requires migration, and 355 // that the requested types list includes at least one non-nigori type. It 357 // careful to not send progress markers for non-nigori types, though. If a 358 // non-nigori type in the request requires migration, a MIGRATION_DONE 669 syncer::Nigori nigori local [all...] |
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl_unittest.cc | 81 CreateRootForType(NIGORI); 150 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local 152 EXPECT_EQ(migration_time, nigori.keystore_migration_time()); 154 EXPECT_TRUE(nigori.has_keystore_migration_time()); 155 EXPECT_TRUE(nigori.keybag_is_frozen()); 158 EXPECT_TRUE(nigori.encrypt_everything()); 159 EXPECT_TRUE(nigori.keystore_decryptor_token().blob().empty()); 162 nigori.passphrase_type()); 164 EXPECT_EQ(nigori.custom_passphrase_time(), 170 nigori.passphrase_type()) 210 sync_pb::NigoriSpecifics nigori; local 243 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local 276 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local 313 sync_pb::NigoriSpecifics nigori; local 346 sync_pb::NigoriSpecifics nigori; local 416 sync_pb::NigoriSpecifics nigori; local 452 sync_pb::NigoriSpecifics nigori; local 491 sync_pb::NigoriSpecifics nigori; local 591 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local 738 sync_pb::NigoriSpecifics nigori; local 795 sync_pb::NigoriSpecifics nigori; local 1039 sync_pb::NigoriSpecifics nigori; local 1119 sync_pb::NigoriSpecifics nigori; local 1199 sync_pb::NigoriSpecifics nigori; local 1261 sync_pb::NigoriSpecifics nigori; local 1306 sync_pb::NigoriSpecifics nigori; local 1340 sync_pb::NigoriSpecifics nigori; local 1383 sync_pb::NigoriSpecifics nigori; local 1432 sync_pb::NigoriSpecifics nigori; local 1513 sync_pb::NigoriSpecifics nigori; local 1615 sync_pb::NigoriSpecifics nigori; local 1722 sync_pb::NigoriSpecifics nigori; local 1817 sync_pb::NigoriSpecifics nigori; local 1935 sync_pb::NigoriSpecifics nigori; local 2191 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local [all...] |
sync_encryption_handler_impl.cc | 39 // The maximum number of times we will automatically overwrite the nigori node 41 // We protect ourselves against nigori rollbacks, but it's possible two 42 // different clients might have contrasting view of what the nigori node state 46 // Enumeration of nigori keystore migration results (for use in UMA stats). 67 // The new passphrase state is sufficient to determine whether a nigori node 74 bool IsNigoriMigratedToKeystore(const sync_pb::NigoriSpecifics& nigori) { 75 if (!nigori.has_passphrase_type()) 77 if (!nigori.has_keystore_migration_time()) 79 if (!nigori.keybag_is_frozen()) 81 if (nigori.passphrase_type() = 725 const sync_pb::NigoriSpecifics& nigori = local [all...] |
sync_manager_impl_unittest.cc | 169 // Attempt to lookup by nigori tag. 869 (*out)[NIGORI] = GROUP_PASSIVE; 893 // We need to create the nigori node as if it were an applied server update. 894 int64 nigori_id = GetIdForDataType(NIGORI); 898 // Set the nigori cryptographer information. 913 sync_pb::NigoriSpecifics nigori; local 914 cryptographer->GetKeys(nigori.mutable_encryption_keybag()); 916 &nigori, 920 node.SetNigoriSpecifics(nigori); 1438 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local 1483 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local 1627 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local 1747 sync_pb::NigoriSpecifics nigori; local 1795 sync_pb::NigoriSpecifics nigori; local 1878 sync_pb::NigoriSpecifics nigori; local 1927 sync_pb::NigoriSpecifics nigori; local [all...] |