/external/chromium_org/sync/engine/ |
apply_control_data_updates.h | 12 class Cryptographer; 23 Cryptographer* cryptographer); 26 Cryptographer* cryptographer);
|
update_applicator.h | 34 class Cryptographer; 38 UpdateApplicator(Cryptographer* cryptographer); 66 Cryptographer* cryptographer_;
|
conflict_resolver.h | 24 class Cryptographer; 54 const Cryptographer* cryptographer, 63 const Cryptographer* cryptographer,
|
syncer_util.h | 34 class Cryptographer; 52 Cryptographer* cryptographer);
|
apply_control_data_updates_unittest.cc | 25 #include "sync/util/cryptographer.h" 63 // updates the set of encrypted types, and updates the cryptographer. 65 // Storing the cryptographer separately is bad, but for this test we 67 Cryptographer* cryptographer; local 73 cryptographer = directory()->GetCryptographer(&trans); 78 // Nigori node updates should update the Cryptographer. 79 Cryptographer other_cryptographer(cryptographer->encryptor()); 89 EXPECT_FALSE(cryptographer->has_pending_keys()) 110 Cryptographer* cryptographer; local 222 Cryptographer* cryptographer; local 310 Cryptographer* cryptographer; local 388 Cryptographer* cryptographer; local 466 Cryptographer* cryptographer; local 536 Cryptographer* cryptographer; local 618 Cryptographer* cryptographer; local 701 Cryptographer* cryptographer; local 780 Cryptographer* cryptographer; local [all...] |
update_applicator.cc | 22 UpdateApplicator::UpdateApplicator(Cryptographer* cryptographer) 23 : cryptographer_(cryptographer),
|
apply_control_data_updates.cc | 16 #include "sync/util/cryptographer.h" 89 // passphrase, the cryptographer will preserve the encryption keys based on the 94 Cryptographer* cryptographer) { 107 // We only perform this if the cryptographer is ready. If not, these are 111 if (cryptographer->is_ready()) { 119 // If this fails, something is wrong with the cryptographer, but there's 140 // If the cryptographer is not ready, another client set a new encryption 145 // Therefore, we only attempt to merge the nigori nodes if the cryptographer 150 if (cryptographer->is_ready()) [all...] |
conflict_resolver.cc | 19 #include "sync/util/cryptographer.h" 41 const Cryptographer* cryptographer, 117 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted())); 118 decrypted_specifics = cryptographer->DecryptToString( 125 cryptographer->CanDecryptUsingDefaultKey( 127 decrypted_server_specifics = cryptographer->DecryptToString( 144 decrypted_base_server_specifics = cryptographer->DecryptToString( 222 const Cryptographer* cryptographer, [all...] |
/external/chromium_org/sync/internal_api/ |
syncapi_internal.h | 22 class Cryptographer; 26 Cryptographer* crypto); 35 bool AreSpecificsEqual(const Cryptographer* cryptographer,
|
base_transaction.cc | 9 #include "sync/util/cryptographer.h" 23 Cryptographer* BaseTransaction::GetCryptographer() const {
|
sync_encryption_handler_impl.h | 20 #include "sync/util/cryptographer.h" 86 Cryptographer* GetCryptographerUnsafe(); 132 // Sync's cryptographer. Used for encrypting and decrypting sync data. 133 Cryptographer cryptographer; member in struct:syncer::SyncEncryptionHandlerImpl::Vault 144 // Apply a nigori update. Updates internal and cryptographer state. 157 // explicit passphrase state (if the cryptographer is ready). 195 // |bootstrap_token|: used to inform observers if the cryptographer's 200 // |trans| and |nigori_node|: used to access data in the cryptographer. 220 // 1. Cryptographer has no pending key [all...] |
js_sync_encryption_handler_observer.h | 48 Cryptographer* cryptographer) OVERRIDE;
|
syncapi_internal.cc | 10 #include "sync/util/cryptographer.h" 23 const sync_pb::EntitySpecifics& specifics, Cryptographer* crypto) { 77 bool AreSpecificsEqual(const Cryptographer* cryptographer, 84 if (!cryptographer->CanDecrypt(left.encrypted())) { 88 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 93 if (!cryptographer->CanDecrypt(right.encrypted())) { 97 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
sync_encryption_handler_impl.cc | 31 #include "sync/util/cryptographer.h" 201 : cryptographer(encryptor), 219 // Restore the cryptographer's previous keys. Note that we don't add the 220 // keystore keys into the cryptographer here, in case a migration was pending. 221 vault_unsafe_.cryptographer.Bootstrap(restored_key_for_bootstrapping); 259 trans.GetWrappedTrans()).cryptographer.has_pending_keys(); 261 trans.GetWrappedTrans()).cryptographer.is_ready(); 262 // Log the state of the cryptographer regardless of migration state. 280 // Migration cannot occur until the cryptographer is ready (initialized 300 // Always trigger an encrypted types and cryptographer state change event a 340 Cryptographer* cryptographer = local 503 Cryptographer* cryptographer = local 702 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local 916 Cryptographer* cryptographer = &UnlockVaultMutable(trans)->cryptographer; local 1016 const Cryptographer& cryptographer = local 1112 Cryptographer* cryptographer = local 1150 Cryptographer* cryptographer = local 1203 const Cryptographer& cryptographer = local 1351 Cryptographer* cryptographer = local [all...] |
sync_encryption_handler_impl_unittest.cc | 27 #include "sync/util/cryptographer.h" 59 MOCK_METHOD1(OnCryptographerStateChanged, void(Cryptographer*)); // NOLINT 134 Cryptographer* GetCryptographer() { 177 Cryptographer keystore_cryptographer(&encryptor_); 184 Cryptographer temp_cryptographer(&encryptor_); 197 Cryptographer other_cryptographer(GetCryptographer()->encryptor()); 304 Cryptographer other_cryptographer(GetCryptographer()->encryptor()); 528 Cryptographer other_cryptographer(GetCryptographer()->encryptor()); 584 // The cryptographer should be able to decrypt both sets of keys and still 683 std::string(), // Cryptographer bootstrap [all...] |
debug_info_event_listener.h | 69 Cryptographer* cryptographer) OVERRIDE; 108 // Cryptographer has keys that are not yet decrypted. 111 // Cryptographer is initialized and does not have pending keys.
|
js_sync_encryption_handler_observer.cc | 17 #include "sync/util/cryptographer.h" 86 Cryptographer* cryptographer) { 92 cryptographer->is_ready()); 94 cryptographer->has_pending_keys());
|
/external/chromium_org/sync/util/ |
cryptographer.cc | 5 #include "sync/util/cryptographer.h" 25 Cryptographer::Cryptographer(Encryptor* encryptor) 30 Cryptographer::~Cryptographer() {} 33 void Cryptographer::Bootstrap(const std::string& restored_bootstrap_token) { 46 bool Cryptographer::CanDecrypt(const sync_pb::EncryptedData& data) const { 50 bool Cryptographer::CanDecryptUsingDefaultKey( 56 bool Cryptographer::Encrypt( 61 LOG(ERROR) << "Cryptographer not ready, failed to encrypt." [all...] |
cryptographer.h | 47 // CanDecrypt should be used to verify whether the Cryptographer can decrypt 50 class SYNC_EXPORT Cryptographer { 53 explicit Cryptographer(Encryptor* encryptor); 54 ~Cryptographer(); 57 // Cryptographer instance into the ready state (is_ready will be true). 115 // with a cryptographer that has already been initialized. 142 // cryptographer has no pending keys. Like other calls that access the 143 // cryptographer, this method must be called from within a transaction. 160 // Returns whether this Cryptographer is ready to encrypt and decrypt data. 169 // Cryptographer instance to bootstrap itself. Returns false if such a toke [all...] |
cryptographer_unittest.cc | 5 #include "sync/util/cryptographer.h" 29 Cryptographer cryptographer_; 157 Cryptographer cryptographer(&encryptor_); 160 cryptographer.AddKey(params); 161 EXPECT_TRUE(cryptographer.is_ready()); 163 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 164 EXPECT_TRUE(cryptographer.GetKeys(&nigori)); 168 Cryptographer cryptographer(&encryptor_) [all...] |
/external/chromium_org/sync/internal_api/public/ |
sync_encryption_handler.h | 20 class Cryptographer; 22 // Reasons due to which Cryptographer might require a passphrase. 25 REASON_ENCRYPTION = 1, // The cryptographer requires a 29 REASON_DECRYPTION = 2, // The cryptographer requires a 50 // cryptographer encrypts with the proper key and has the most recent keybag, 70 // |pending_keys| is a copy of the cryptographer's pending keys, that may be 97 // Cryptographer::SensitiveTypes(). If |encrypt_everything| is 101 // set of encrypted types is Cryptographer::SensitiveTypes() and 111 // The cryptographer has been updated. Listeners should check that their 112 // own state matches the cryptographer [all...] |
base_transaction.h | 11 #include "sync/util/cryptographer.h" 34 Cryptographer* GetCryptographer() const;
|
/external/chromium_org/sync/test/ |
fake_sync_encryption_handler.h | 15 #include "sync/util/cryptographer.h" 21 // Note that this only performs basic interactions with the cryptographer 57 Cryptographer* cryptographer() { return &cryptographer_; } function in class:syncer::FakeSyncEncryptionHandler 66 Cryptographer cryptographer_;
|
/external/chromium_org/sync/syncable/ |
nigori_util.h | 20 class Cryptographer;
|
directory.h | 30 class Cryptographer; 168 Cryptographer* cryptographer); 239 // Returns a pointer to our cryptographer. Does not transfer ownership. 241 Cryptographer* GetCryptographer(const BaseTransaction* trans); 376 // downloaded state, such as when there are cryptographer errors. 613 Cryptographer* const cryptographer_;
|