| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // Common sync protocol for encrypted data. | 5 // Common sync protocol for encrypted data. |
| 6 | 6 |
| 7 // Update proto_value_conversions{.h,.cc,_unittest.cc} if you change | 7 // Update proto_value_conversions{.h,.cc,_unittest.cc} if you change |
| 8 // any fields in this file. | 8 // any fields in this file. |
| 9 | 9 |
| 10 syntax = "proto2"; | 10 syntax = "proto2"; |
| (...skipping 12 matching lines...) Expand all Loading... |
| 23 // that happens, we make a best effort to reencrypt all nodes with the new | 23 // that happens, we make a best effort to reencrypt all nodes with the new |
| 24 // passphrase, but since we don't have transactions on the server-side, we | 24 // passphrase, but since we don't have transactions on the server-side, we |
| 25 // cannot guarantee that every node will be reencrypted. As a workaround, we | 25 // cannot guarantee that every node will be reencrypted. As a workaround, we |
| 26 // keep track of all keys, assign each key a name (by using that key to encrypt | 26 // keep track of all keys, assign each key a name (by using that key to encrypt |
| 27 // a well known string) and keep track of which key was used to encrypt each | 27 // a well known string) and keep track of which key was used to encrypt each |
| 28 // node. | 28 // node. |
| 29 message EncryptedData { | 29 message EncryptedData { |
| 30 optional string key_name = 1; | 30 optional string key_name = 1; |
| 31 optional string blob = 2; | 31 optional string blob = 2; |
| 32 }; | 32 }; |
| OLD | NEW |