HomeSort by relevance Sort by last modified time
    Searched refs:nigori (Results 1 - 23 of 23) sorted by null

  /external/chromium_org/sync/util/
nigori_unittest.cc 5 #include "sync/util/nigori.h"
17 Nigori nigori; local
18 EXPECT_TRUE(nigori.InitByDerivation("example.com", "username", "password"));
21 EXPECT_TRUE(nigori.Permute(Nigori::Password, "test name",
31 Nigori nigori1;
35 EXPECT_TRUE(nigori1.Permute(Nigori::Password,
39 Nigori nigori2;
43 EXPECT_TRUE(nigori2.Permute(Nigori::Password
52 Nigori nigori; local
67 Nigori nigori; local
82 Nigori nigori; local
97 Nigori nigori; local
115 Nigori nigori; local
    [all...]
cryptographer.cc 19 // We name a particular Nigori instance (ie. a triplet consisting of a hostname,
23 const char kNigoriKeyName[] = "nigori-key";
38 linked_ptr<Nigori> nigori_copy(new Nigori());
146 // Create a bag of all the Nigori parameters we know about.
150 const Nigori& nigori = *it->second; local
153 nigori.ExportKeys(key->mutable_user_key(),
158 // Encrypt the bag with the default Nigori.
163 // Create the new Nigori and make it the default encryptor
246 Nigori nigori; local
    [all...]
cryptographer_unittest.cc 148 sync_pb::EncryptedData nigori; local
164 EXPECT_TRUE(cryptographer.GetKeys(&nigori));
169 EXPECT_FALSE(cryptographer.CanDecrypt(nigori));
171 cryptographer.SetPendingKeys(nigori);
cryptographer.h 16 #include "sync/util/nigori.h"
29 // The parameters used to initialize a Nigori instance.
36 // This class manages the Nigori objects used to encrypt and decrypt sensitive
37 // sync data (eg. passwords). Each Nigori object knows how to handle data
40 // Whenever an update to the Nigori sync node is received from the server,
42 // Most likely, an updated Nigori node means that a new passphrase has been set
107 // Creates a new Nigori instance using |params|. If successful, |params| will
114 // Same as AddKey(..), but builds the new Nigori from a previously persisted
122 // Creates a new Nigori instance using |params|. If successful, |params|
123 // will be added to the nigori keybag, but will not be the default encryptio
    [all...]
  /external/chromium_org/sync/syncable/
nigori_util.cc 160 // It's possible the nigori lost the set of encrypted types. If the current
244 sync_pb::NigoriSpecifics* nigori) {
245 nigori->set_encrypt_everything(encrypt_everything);
247 nigori->set_encrypt_bookmarks(
249 nigori->set_encrypt_preferences(
251 nigori->set_encrypt_autofill_profile(
253 nigori->set_encrypt_autofill(encrypted_types.Has(AUTOFILL));
254 nigori->set_encrypt_themes(encrypted_types.Has(THEMES));
255 nigori->set_encrypt_typed_urls(
257 nigori->set_encrypt_extension_settings
    [all...]
nigori_handler.h 27 // Sync internal interface for dealing with nigori node and querying
35 // Apply a nigori node update, updating the internal encryption state
38 const sync_pb::NigoriSpecifics& nigori,
41 // Store the current encrypt everything/encrypted types state into |nigori|.
43 sync_pb::NigoriSpecifics* nigori,
nigori_util.h 5 // Various utility methods for nigori-based multi-type encryption.
71 // Updates |nigori| to match the encryption state specified by |encrypted_types|
76 sync_pb::NigoriSpecifics* nigori);
78 // Extracts the set of encrypted types from a nigori node.
80 const sync_pb::NigoriSpecifics& nigori);
  /external/chromium_org/sync/test/
fake_sync_encryption_handler.cc 27 const sync_pb::NigoriSpecifics& nigori,
29 if (nigori.encrypt_everything())
31 if (nigori.keybag_is_frozen())
35 if (cryptographer_.CanDecrypt(nigori.encryption_keybag()))
36 cryptographer_.InstallKeys(nigori.encryption_keybag());
37 else if (nigori.has_encryption_keybag())
38 cryptographer_.SetPendingKeys(nigori.encryption_keybag());
56 sync_pb::NigoriSpecifics* nigori,
60 nigori);
fake_sync_encryption_handler.h 20 // state without opening any transactions or interacting with the nigori node.
44 const sync_pb::NigoriSpecifics& nigori,
47 sync_pb::NigoriSpecifics* nigori,
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl_unittest.cc 81 CreateRootForType(NIGORI);
149 ASSERT_EQ(nigori_node.InitTypeRoot(NIGORI), BaseNode::INIT_OK);
150 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local
152 EXPECT_EQ(migration_time, nigori.keystore_migration_time());
154 EXPECT_TRUE(nigori.has_keystore_migration_time());
155 EXPECT_TRUE(nigori.keybag_is_frozen());
158 EXPECT_TRUE(nigori.encrypt_everything());
159 EXPECT_TRUE(nigori.keystore_decryptor_token().blob().empty());
162 nigori.passphrase_type());
164 EXPECT_EQ(nigori.custom_passphrase_time()
210 sync_pb::NigoriSpecifics nigori; local
243 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local
276 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local
313 sync_pb::NigoriSpecifics nigori; local
346 sync_pb::NigoriSpecifics nigori; local
416 sync_pb::NigoriSpecifics nigori; local
452 sync_pb::NigoriSpecifics nigori; local
491 sync_pb::NigoriSpecifics nigori; local
591 const sync_pb::NigoriSpecifics& nigori = nigori_node.GetNigoriSpecifics(); local
738 sync_pb::NigoriSpecifics nigori; local
795 sync_pb::NigoriSpecifics nigori; local
1039 sync_pb::NigoriSpecifics nigori; local
1119 sync_pb::NigoriSpecifics nigori; local
1199 sync_pb::NigoriSpecifics nigori; local
1261 sync_pb::NigoriSpecifics nigori; local
1306 sync_pb::NigoriSpecifics nigori; local
1340 sync_pb::NigoriSpecifics nigori; local
1383 sync_pb::NigoriSpecifics nigori; local
1432 sync_pb::NigoriSpecifics nigori; local
1513 sync_pb::NigoriSpecifics nigori; local
1615 sync_pb::NigoriSpecifics nigori; local
1722 sync_pb::NigoriSpecifics nigori; local
1817 sync_pb::NigoriSpecifics nigori; local
1935 sync_pb::NigoriSpecifics nigori; local
2191 sync_pb::NigoriSpecifics nigori = BuildMigratedNigori( local
    [all...]
sync_encryption_handler_impl.cc 39 // The maximum number of times we will automatically overwrite the nigori node
41 // We protect ourselves against nigori rollbacks, but it's possible two
42 // different clients might have contrasting view of what the nigori node state
46 // Enumeration of nigori keystore migration results (for use in UMA stats).
67 // The new passphrase state is sufficient to determine whether a nigori node
74 bool IsNigoriMigratedToKeystore(const sync_pb::NigoriSpecifics& nigori) {
75 if (!nigori.has_passphrase_type())
77 if (!nigori.has_keystore_migration_time())
79 if (!nigori.keybag_is_frozen())
81 if (nigori.passphrase_type() =
724 const sync_pb::NigoriSpecifics& nigori = local
    [all...]
sync_encryption_handler_impl.h 35 // and creating/receiving nigori node updates.
70 const sync_pb::NigoriSpecifics& nigori,
73 sync_pb::NigoriSpecifics* nigori,
144 // Apply a nigori update. Updates internal and cryptographer state.
145 // Returns true on success, false if |nigori| was incompatible, and the
146 // nigori node must be corrected.
148 bool ApplyNigoriUpdateImpl(const sync_pb::NigoriSpecifics& nigori,
155 // Write the current encryption state into the nigori node. This includes
160 // Updates local encrypted types from |nigori|.
162 // a subset of that in |nigori|. Returns false if the local state alread
    [all...]
sync_manager_impl_unittest.cc 149 // Attempt to lookup by nigori tag.
858 (*out)[NIGORI] = GROUP_PASSIVE;
889 // We need to create the nigori node as if it were an applied server update.
890 int64 nigori_id = GetIdForDataType(NIGORI);
894 // Set the nigori cryptographer information.
909 sync_pb::NigoriSpecifics nigori; local
910 cryptographer->GetKeys(nigori.mutable_encryption_keybag());
912 &nigori,
1056 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local
1101 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local
1245 sync_pb::NigoriSpecifics nigori = node.GetNigoriSpecifics(); local
1365 sync_pb::NigoriSpecifics nigori; local
1413 sync_pb::NigoriSpecifics nigori; local
1496 sync_pb::NigoriSpecifics nigori; local
1545 sync_pb::NigoriSpecifics nigori; local
    [all...]
base_node.cc 240 DCHECK_EQ(GetModelType(), NIGORI);
241 return GetEntitySpecifics().nigori();
  /external/chromium_org/sync/engine/
apply_control_data_updates_unittest.cc 62 // Verify that applying a nigori node sets initial sync ended properly,
78 // Nigori node updates should update the Cryptographer.
84 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
85 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag());
86 nigori->set_encrypt_everything(true);
88 ModelTypeToRootTag(NIGORI), specifics, true);
102 // Create some local unsynced and unencrypted data. Apply a nigori update that
104 // data as part of the nigori update. Apply another nigori update with no
151 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori() local
267 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
    [all...]
apply_control_data_updates.cc 49 if (type == NIGORI) {
50 // Nigori node applications never fail.
81 // Update the nigori handler with the server's nigori node.
83 // If we have a locally modified nigori node, we merge them manually. This
90 // local passphrase, while the nigori node will preserve the server encryption
97 // We apply the nigori update regardless of whether there's a conflict or
102 const sync_pb::NigoriSpecifics& nigori = local
103 entry->GetServerSpecifics().nigori();
104 trans->directory()->GetNigoriHandler()->ApplyNigoriUpdate(nigori, trans)
    [all...]
model_type_sync_worker_impl_unittest.cc 26 const char kNigoriKeyName[] = "nigori-key";
88 // Use the Nth nigori instance to encrypt incoming updates.
185 // Returns the name for the given Nigori.
189 static std::string GetNigoriName(const Nigori& nigori);
192 // a Nigori intialized with the specified KeyParams.
299 Nigori nigori; local
301 nigori.InitByDerivation(params.hostname, params.username, params.password);
305 key->set_name(GetNigoriName(nigori));
629 Nigori nigori; local
    [all...]
syncer_unittest.cc 293 EnableDatatype(NIGORI);
295 EnableDatatype(NIGORI);
720 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
721 other_cryptographer.GetKeys(nigori->mutable_encryption_keybag());
727 GetCryptographer(&wtrans)->SetPendingKeys(nigori->encryption_keybag());
891 sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); local
    [all...]
  /external/chromium_org/sync/protocol/
proto_value_conversions_unittest.cc 294 SET_FIELD(nigori);
proto_value_conversions.cc 810 SET_FIELD(nigori, NigoriSpecificsToValue);
    [all...]
  /external/chromium_org/chrome/browser/sync/glue/
sync_backend_host_impl.cc 187 NOTREACHED() << "SetEncryptionPassphrase must never be called when nigori"
213 NOTREACHED() << "SetDecryptionPassphrase must never be called when nigori"
245 // syncer thread, since we could receive a new nigori node while the task is
367 types_to_download.Put(syncer::NIGORI);
381 // data types being downloaded here but the nigori type, which is always
384 // the nigori type is the only requested type which requires migration, and
385 // that the requested types list includes at least one non-nigori type. It
387 // careful to not send progress markers for non-nigori types, though. If a
388 // non-nigori type in the request requires migration, a MIGRATION_DONE
766 syncer::Nigori nigori local
    [all...]
  /external/chromium_org/sync/test/fake_server/
fake_server.cc 295 if (entity->GetModelType() == syncer::NIGORI) {
297 response_entity->specifics().nigori().passphrase_type() ==
332 } else if (GetModelType(client_entity) == syncer::NIGORI) {
333 // NIGORI is the only permanent item type that should be updated by the
  /external/chromium_org/sync/tools/testserver/
chromiumsync.py 81 NIGORI,
130 NIGORI: SYNC_TYPE_FIELDS['nigori'],
540 PermanentItem('google_chrome_nigori', name='Nigori',
541 parent_tag=ROOT_ID, sync_type=NIGORI),
    [all...]

Completed in 367 milliseconds