Index: components/sync/driver/glue/sync_backend_host_impl.h |
diff --git a/components/sync/driver/glue/sync_backend_host_impl.h b/components/sync/driver/glue/sync_backend_host_impl.h |
index e7f93eb8ea554bcbc4b799cbf785f4212c5b1c8f..2598d4b2b742f2aedc7ed31003074c689b99ec41 100644 |
--- a/components/sync/driver/glue/sync_backend_host_impl.h |
+++ b/components/sync/driver/glue/sync_backend_host_impl.h |
@@ -64,8 +64,7 @@ class SyncBackendHostImpl : public SyncEngine, public InvalidationHandler { |
void StartSyncingWithServer() override; |
void SetEncryptionPassphrase(const std::string& passphrase, |
bool is_explicit) override; |
- bool SetDecryptionPassphrase(const std::string& passphrase) override |
- WARN_UNUSED_RESULT; |
+ void SetDecryptionPassphrase(const std::string& passphrase) override; |
void StopSyncingForShutdown() override; |
void Shutdown(ShutdownReason reason) override; |
void ConfigureDataTypes(ConfigureParams params) override; |
@@ -82,9 +81,6 @@ class SyncBackendHostImpl : public SyncEngine, public InvalidationHandler { |
UserShare* GetUserShare() const override; |
Status GetDetailedStatus() override; |
bool HasUnsyncedItems() const override; |
- bool IsNigoriEnabled() const override; |
- PassphraseType GetPassphraseType() const override; |
- base::Time GetExplicitPassphraseTime() const override; |
bool IsCryptographerReady(const BaseTransaction* trans) const override; |
void GetModelSafeRoutingInfo(ModelSafeRoutingInfo* out) const override; |
void FlushDirectory() const override; |
@@ -180,13 +176,6 @@ class SyncBackendHostImpl : public SyncEngine, public InvalidationHandler { |
// on successful completion. |
void RetryConfigurationOnFrontendLoop(const base::Closure& retry_callback); |
- // Helpers to persist a token that can be used to bootstrap sync encryption |
- // across browser restart to avoid requiring the user to re-enter their |
- // passphrase. |token| must be valid UTF-8 as we use the PrefService for |
- // storage. |
- void PersistEncryptionBootstrapToken(const std::string& token, |
- BootstrapTokenType token_type); |
- |
// For convenience, checks if initialization state is INITIALIZED. |
bool initialized() const { return initialized_; } |
@@ -197,45 +186,6 @@ class SyncBackendHostImpl : public SyncEngine, public InvalidationHandler { |
// Handle a migration request. |
void HandleMigrationRequestedOnFrontendLoop(const ModelTypeSet types); |
- // Checks if |passphrase| can be used to decrypt the cryptographer's pending |
- // keys that were cached during NotifyPassphraseRequired. Returns true if |
- // decryption was successful. Returns false otherwise. Must be called with a |
- // non-empty pending keys cache. |
- bool CheckPassphraseAgainstCachedPendingKeys( |
- const std::string& passphrase) const; |
- |
- // Invoked when a passphrase is required to decrypt a set of Nigori keys, |
- // or for encrypting. |reason| denotes why the passphrase was required. |
- // |pending_keys| is a copy of the cryptographer's pending keys, that are |
- // cached by the frontend. If there are no pending keys, or if the passphrase |
- // required reason is REASON_ENCRYPTION, an empty EncryptedData object is |
- // passed. |
- void NotifyPassphraseRequired(PassphraseRequiredReason reason, |
- sync_pb::EncryptedData pending_keys); |
- |
- // Invoked when the passphrase provided by the user has been accepted. |
- void NotifyPassphraseAccepted(); |
- |
- // Invoked when the set of encrypted types or the encrypt |
- // everything flag changes. |
- void NotifyEncryptedTypesChanged(ModelTypeSet encrypted_types, |
- bool encrypt_everything); |
- |
- // Invoked when sync finishes encrypting new datatypes. |
- void NotifyEncryptionComplete(); |
- |
- // Invoked when the passphrase state has changed. Caches the passphrase state |
- // for later use on the UI thread. |
- // If |type| is FROZEN_IMPLICIT_PASSPHRASE or CUSTOM_PASSPHRASE, |
- // |explicit_passphrase_time| is the time at which that passphrase was set |
- // (if available). |
- void HandlePassphraseTypeChangedOnFrontendLoop( |
- PassphraseType type, |
- base::Time explicit_passphrase_time); |
- |
- void HandleLocalSetPassphraseEncryptionOnFrontendLoop( |
- const SyncEncryptionHandler::NigoriState& nigori_state); |
- |
// Dispatched to from OnConnectionStatusChange to handle updating |
// frontend UI components. |
void HandleConnectionStatusChangeOnFrontendLoop(ConnectionStatus status); |
@@ -271,26 +221,6 @@ class SyncBackendHostImpl : public SyncEngine, public InvalidationHandler { |
// A pointer to the registrar; owned by |core_|. |
SyncBackendRegistrar* registrar_ = nullptr; |
- // We cache the cryptographer's pending keys whenever NotifyPassphraseRequired |
- // is called. This way, before the UI calls SetDecryptionPassphrase on the |
- // syncer, it can avoid the overhead of an asynchronous decryption call and |
- // give the user immediate feedback about the passphrase entered by first |
- // trying to decrypt the cached pending keys on the UI thread. Note that |
- // SetDecryptionPassphrase can still fail after the cached pending keys are |
- // successfully decrypted if the pending keys have changed since the time they |
- // were cached. |
- sync_pb::EncryptedData cached_pending_keys_; |
- |
- // The state of the passphrase required to decrypt the bag of encryption keys |
- // in the nigori node. Updated whenever a new nigori node arrives or the user |
- // manually changes their passphrase state. Cached so we can synchronously |
- // check it from the UI thread. |
- PassphraseType cached_passphrase_type_ = PassphraseType::IMPLICIT_PASSPHRASE; |
- |
- // If an explicit passphrase is in use, the time at which the passphrase was |
- // first set (if available). |
- base::Time cached_explicit_passphrase_time_; |
- |
invalidation::InvalidationService* invalidator_; |
bool invalidation_handler_registered_ = false; |