| Index: chrome/browser/sync/sync_prefs.cc
|
| diff --git a/chrome/browser/sync/sync_prefs.cc b/chrome/browser/sync/sync_prefs.cc
|
| index 4239208d64e8b97d9ade81fa6445c5fe3eccb73c..7b85a3f63d95064dc874183f32d9a449efb4d875 100644
|
| --- a/chrome/browser/sync/sync_prefs.cc
|
| +++ b/chrome/browser/sync/sync_prefs.cc
|
| @@ -52,6 +52,7 @@ void SyncPrefs::ClearPreferences() {
|
| pref_service_->ClearPref(prefs::kSyncLastSyncedTime);
|
| pref_service_->ClearPref(prefs::kSyncHasSetupCompleted);
|
| pref_service_->ClearPref(prefs::kSyncEncryptionBootstrapToken);
|
| + pref_service_->ClearPref(prefs::kSyncKeystoreEncryptionBootstrapToken);
|
|
|
| // TODO(nick): The current behavior does not clear
|
| // e.g. prefs::kSyncBookmarks. Is that really what we want?
|
| @@ -177,6 +178,19 @@ void SyncPrefs::SetEncryptionBootstrapToken(const std::string& token) {
|
| pref_service_->SetString(prefs::kSyncEncryptionBootstrapToken, token);
|
| }
|
|
|
| +std::string SyncPrefs::GetKeystoreEncryptionBootstrapToken() const {
|
| + DCHECK(non_thread_safe_.CalledOnValidThread());
|
| + return
|
| + pref_service_ ?
|
| + pref_service_->GetString(prefs::kSyncKeystoreEncryptionBootstrapToken) :
|
| + "";
|
| +}
|
| +
|
| +void SyncPrefs::SetKeystoreEncryptionBootstrapToken(const std::string& token) {
|
| + DCHECK(non_thread_safe_.CalledOnValidThread());
|
| + pref_service_->SetString(prefs::kSyncKeystoreEncryptionBootstrapToken, token);
|
| +}
|
| +
|
| #if defined(OS_CHROMEOS)
|
| std::string SyncPrefs::GetSpareBootstrapToken() const {
|
| DCHECK(non_thread_safe_.CalledOnValidThread());
|
| @@ -344,6 +358,10 @@ void SyncPrefs::RegisterPreferences() {
|
| pref_service_->RegisterStringPref(prefs::kSyncEncryptionBootstrapToken,
|
| "",
|
| PrefService::UNSYNCABLE_PREF);
|
| + pref_service_->RegisterStringPref(
|
| + prefs::kSyncKeystoreEncryptionBootstrapToken,
|
| + "",
|
| + PrefService::UNSYNCABLE_PREF);
|
| #if defined(OS_CHROMEOS)
|
| pref_service_->RegisterStringPref(prefs::kSyncSpareBootstrapToken,
|
| "",
|
|
|