Index: sync/engine/syncer_unittest.cc |
diff --git a/sync/engine/syncer_unittest.cc b/sync/engine/syncer_unittest.cc |
index 506fa3f76223212b11edbb55a87ddbae4bf67adc..df587a77288e94040a28d6a1c66fd948e537b629 100644 |
--- a/sync/engine/syncer_unittest.cc |
+++ b/sync/engine/syncer_unittest.cc |
@@ -256,7 +256,6 @@ class SyncerTest : public testing::Test, |
child_id_ = ids_.MakeServer("child id"); |
directory()->set_store_birthday(mock_server_->store_birthday()); |
mock_server_->SetKeystoreKey("encryption_key"); |
- GetCryptographer(&trans)->SetNigoriHandler(&fake_encryption_handler_); |
} |
virtual void TearDown() { |
@@ -568,8 +567,6 @@ class SyncerTest : public testing::Test, |
ModelTypeSet enabled_datatypes_; |
TrafficRecorder traffic_recorder_; |
- FakeSyncEncryptionHandler fake_encryption_handler_; |
- |
DISALLOW_COPY_AND_ASSIGN(SyncerTest); |
}; |
@@ -727,7 +724,7 @@ TEST_F(SyncerTest, GetCommitIdsFiltersUnreadyEntries) { |
sync_pb::EntitySpecifics specifics; |
sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); |
other_cryptographer.GetKeys(nigori->mutable_encrypted()); |
- fake_encryption_handler_.EnableEncryptEverything(); |
+ dir_maker_.encryption_handler()->EnableEncryptEverything(); |
// Set up with an old passphrase, but have pending keys |
GetCryptographer(&wtrans)->AddKey(key_params); |
GetCryptographer(&wtrans)->Encrypt(bookmark, |
@@ -840,7 +837,7 @@ TEST_F(SyncerTest, EncryptionAwareConflicts) { |
sync_pb::EntitySpecifics specifics; |
sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); |
other_cryptographer.GetKeys(nigori->mutable_encrypted()); |
- fake_encryption_handler_.EnableEncryptEverything(); |
+ dir_maker_.encryption_handler()->EnableEncryptEverything(); |
GetCryptographer(&wtrans)->SetPendingKeys(nigori->encrypted()); |
EXPECT_TRUE(GetCryptographer(&wtrans)->has_pending_keys()); |
} |
@@ -1018,8 +1015,8 @@ TEST_F(SyncerTest, NigoriConflicts) { |
our_encrypted_specifics.mutable_encrypted()); |
GetCryptographer(&wtrans)->GetKeys( |
nigori->mutable_encrypted()); |
- fake_encryption_handler_.EnableEncryptEverything(); |
- GetCryptographer(&wtrans)->UpdateNigoriFromEncryptedTypes( |
+ dir_maker_.encryption_handler()->EnableEncryptEverything(); |
+ directory()->GetNigoriHandler()->UpdateNigoriFromEncryptedTypes( |
nigori, |
&wtrans); |
MutableEntry nigori_entry(&wtrans, GET_BY_SERVER_TAG, |
@@ -1029,8 +1026,7 @@ TEST_F(SyncerTest, NigoriConflicts) { |
nigori_entry.Put(IS_UNSYNCED, true); |
EXPECT_FALSE(GetCryptographer(&wtrans)->has_pending_keys()); |
EXPECT_TRUE(encrypted_types.Equals( |
- GetCryptographer(&wtrans)->GetEncryptedTypes())); |
- fake_encryption_handler_.set_cryptographer(GetCryptographer(&wtrans)); |
+ directory()->GetNigoriHandler()->GetEncryptedTypes(&wtrans))); |
} |
{ |
sync_pb::EntitySpecifics specifics; |
@@ -1061,8 +1057,8 @@ TEST_F(SyncerTest, NigoriConflicts) { |
sync_pb::EntitySpecifics specifics = nigori_entry.Get(SPECIFICS); |
ASSERT_TRUE(GetCryptographer(&wtrans)->has_pending_keys()); |
EXPECT_TRUE(encrypted_types.Equals( |
- GetCryptographer(&wtrans)->GetEncryptedTypes())); |
- EXPECT_TRUE(fake_encryption_handler_.EncryptEverythingEnabled()); |
+ directory()->GetNigoriHandler()->GetEncryptedTypes(&wtrans))); |
+ EXPECT_TRUE(dir_maker_.encryption_handler()->EncryptEverythingEnabled()); |
EXPECT_TRUE(specifics.nigori().using_explicit_passphrase()); |
// Supply the pending keys. Afterwards, we should be able to decrypt both |
// our own encrypted data and data encrypted by the other cryptographer, |
@@ -1072,7 +1068,9 @@ TEST_F(SyncerTest, NigoriConflicts) { |
EXPECT_FALSE(GetCryptographer(&wtrans)->has_pending_keys()); |
sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori(); |
GetCryptographer(&wtrans)->GetKeys(nigori->mutable_encrypted()); |
- GetCryptographer(&wtrans)->UpdateNigoriFromEncryptedTypes(nigori, &wtrans); |
+ directory()->GetNigoriHandler()->UpdateNigoriFromEncryptedTypes( |
+ nigori, |
+ &wtrans); |
// Normally this would be written as part of SetPassphrase, but we do it |
// manually for the test. |
nigori_entry.Put(SPECIFICS, specifics); |