| Index: sync/test/fake_sync_encryption_handler.cc
|
| diff --git a/sync/test/fake_sync_encryption_handler.cc b/sync/test/fake_sync_encryption_handler.cc
|
| deleted file mode 100644
|
| index d524e60b68c0655b94c5ca64c2bb45968675b1f0..0000000000000000000000000000000000000000
|
| --- a/sync/test/fake_sync_encryption_handler.cc
|
| +++ /dev/null
|
| @@ -1,129 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sync/test/fake_sync_encryption_handler.h"
|
| -
|
| -#include "sync/protocol/nigori_specifics.pb.h"
|
| -#include "sync/syncable/nigori_util.h"
|
| -
|
| -namespace syncer {
|
| -
|
| -FakeSyncEncryptionHandler::FakeSyncEncryptionHandler()
|
| - : encrypted_types_(SensitiveTypes()),
|
| - encrypt_everything_(false),
|
| - passphrase_type_(IMPLICIT_PASSPHRASE),
|
| - cryptographer_(&encryptor_) {
|
| -}
|
| -FakeSyncEncryptionHandler::~FakeSyncEncryptionHandler() {}
|
| -
|
| -void FakeSyncEncryptionHandler::Init() {
|
| - // Set up a basic cryptographer.
|
| - KeyParams keystore_params = {"localhost", "dummy", "keystore_key"};
|
| - cryptographer_.AddKey(keystore_params);
|
| -}
|
| -
|
| -void FakeSyncEncryptionHandler::ApplyNigoriUpdate(
|
| - const sync_pb::NigoriSpecifics& nigori,
|
| - syncable::BaseTransaction* const trans) {
|
| - if (nigori.encrypt_everything())
|
| - EnableEncryptEverything();
|
| - if (nigori.keybag_is_frozen())
|
| - passphrase_type_ = CUSTOM_PASSPHRASE;
|
| -
|
| - // TODO(zea): consider adding fake support for migration.
|
| - if (cryptographer_.CanDecrypt(nigori.encryption_keybag()))
|
| - cryptographer_.InstallKeys(nigori.encryption_keybag());
|
| - else if (nigori.has_encryption_keybag())
|
| - cryptographer_.SetPendingKeys(nigori.encryption_keybag());
|
| -
|
| - if (cryptographer_.has_pending_keys()) {
|
| - DVLOG(1) << "OnPassPhraseRequired Sent";
|
| - sync_pb::EncryptedData pending_keys = cryptographer_.GetPendingKeys();
|
| - FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
|
| - OnPassphraseRequired(REASON_DECRYPTION,
|
| - pending_keys));
|
| - } else if (!cryptographer_.is_ready()) {
|
| - DVLOG(1) << "OnPassphraseRequired sent because cryptographer is not "
|
| - << "ready";
|
| - FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
|
| - OnPassphraseRequired(REASON_ENCRYPTION,
|
| - sync_pb::EncryptedData()));
|
| - }
|
| -}
|
| -
|
| -void FakeSyncEncryptionHandler::UpdateNigoriFromEncryptedTypes(
|
| - sync_pb::NigoriSpecifics* nigori,
|
| - syncable::BaseTransaction* const trans) const {
|
| - syncable::UpdateNigoriFromEncryptedTypes(encrypted_types_,
|
| - encrypt_everything_,
|
| - nigori);
|
| -}
|
| -
|
| -bool FakeSyncEncryptionHandler::NeedKeystoreKey(
|
| - syncable::BaseTransaction* const trans) const {
|
| - return keystore_key_.empty();
|
| -}
|
| -
|
| -bool FakeSyncEncryptionHandler::SetKeystoreKeys(
|
| - const google::protobuf::RepeatedPtrField<google::protobuf::string>& keys,
|
| - syncable::BaseTransaction* const trans) {
|
| - if (keys.size() == 0)
|
| - return false;
|
| - std::string new_key = keys.Get(keys.size()-1);
|
| - if (new_key.empty())
|
| - return false;
|
| - keystore_key_ = new_key;
|
| -
|
| -
|
| - DVLOG(1) << "Keystore bootstrap token updated.";
|
| - FOR_EACH_OBSERVER(SyncEncryptionHandler::Observer, observers_,
|
| - OnBootstrapTokenUpdated(keystore_key_,
|
| - KEYSTORE_BOOTSTRAP_TOKEN));
|
| - return true;
|
| -}
|
| -
|
| -ModelTypeSet FakeSyncEncryptionHandler::GetEncryptedTypes(
|
| - syncable::BaseTransaction* const trans) const {
|
| - return encrypted_types_;
|
| -}
|
| -
|
| -void FakeSyncEncryptionHandler::AddObserver(Observer* observer) {
|
| - observers_.AddObserver(observer);
|
| -}
|
| -
|
| -void FakeSyncEncryptionHandler::RemoveObserver(Observer* observer) {
|
| - observers_.RemoveObserver(observer);
|
| -}
|
| -
|
| -void FakeSyncEncryptionHandler::SetEncryptionPassphrase(
|
| - const std::string& passphrase,
|
| - bool is_explicit) {
|
| - if (is_explicit)
|
| - passphrase_type_ = CUSTOM_PASSPHRASE;
|
| -}
|
| -
|
| -void FakeSyncEncryptionHandler::SetDecryptionPassphrase(
|
| - const std::string& passphrase) {
|
| - // Do nothing.
|
| -}
|
| -
|
| -void FakeSyncEncryptionHandler::EnableEncryptEverything() {
|
| - if (encrypt_everything_)
|
| - return;
|
| - encrypt_everything_ = true;
|
| - encrypted_types_ = ModelTypeSet::All();
|
| - FOR_EACH_OBSERVER(
|
| - Observer, observers_,
|
| - OnEncryptedTypesChanged(encrypted_types_, encrypt_everything_));
|
| -}
|
| -
|
| -bool FakeSyncEncryptionHandler::IsEncryptEverythingEnabled() const {
|
| - return encrypt_everything_;
|
| -}
|
| -
|
| -PassphraseType FakeSyncEncryptionHandler::GetPassphraseType() const {
|
| - return passphrase_type_;
|
| -}
|
| -
|
| -} // namespace syncer
|
|
|