Index: chrome/browser/sync/internal_api/syncapi_unittest.cc |
diff --git a/chrome/browser/sync/internal_api/syncapi_unittest.cc b/chrome/browser/sync/internal_api/syncapi_unittest.cc |
index fd993c24485d398204aa83e5d865e3b16805b94d..d34c4ac11cb7b283b629cfebbfb6174bd9c5d1c6 100644 |
--- a/chrome/browser/sync/internal_api/syncapi_unittest.cc |
+++ b/chrome/browser/sync/internal_api/syncapi_unittest.cc |
@@ -1252,18 +1252,21 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
EXPECT_EQ(Cryptographer::SensitiveTypes(), GetEncryptedTypes(&trans)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::BOOKMARKS, |
- false /* not encrypted */)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::SESSIONS, |
- false /* not encrypted */)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::THEMES, |
- false /* not encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::BOOKMARKS, |
+ false /* not encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::SESSIONS, |
+ false /* not encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::THEMES, |
+ false /* not encrypted */)); |
} |
EXPECT_CALL(observer_, |
@@ -1274,18 +1277,21 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::BOOKMARKS, |
- true /* is encrypted */)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::SESSIONS, |
- true /* is encrypted */)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::THEMES, |
- true /* is encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::BOOKMARKS, |
+ true /* is encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::SESSIONS, |
+ true /* is encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::THEMES, |
+ true /* is encrypted */)); |
} |
// Trigger's a ReEncryptEverything with new passphrase. |
@@ -1297,18 +1303,21 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::BOOKMARKS, |
- true /* is encrypted */)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::SESSIONS, |
- true /* is encrypted */)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::THEMES, |
- true /* is encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::BOOKMARKS, |
+ true /* is encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::SESSIONS, |
+ true /* is encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::THEMES, |
+ true /* is encrypted */)); |
} |
// Calling EncryptDataTypes with an empty encrypted types should not trigger |
// a reencryption and should just notify immediately. |
@@ -1445,10 +1454,11 @@ TEST_F(SyncManagerTest, EncryptBookmarksWithLegacyData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::BOOKMARKS, |
- false /* not encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::BOOKMARKS, |
+ false /* not encrypted */)); |
} |
EXPECT_CALL(observer_, |
@@ -1460,10 +1470,11 @@ TEST_F(SyncManagerTest, EncryptBookmarksWithLegacyData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans)); |
- EXPECT_TRUE(syncable::VerifyDataTypeEncryption(trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
- syncable::BOOKMARKS, |
- true /* is encrypted */)); |
+ EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
+ trans.GetWrappedTrans(), |
+ trans.GetCryptographer(), |
+ syncable::BOOKMARKS, |
+ true /* is encrypted */)); |
ReadNode node(&trans); |
EXPECT_TRUE(node.InitByIdLookup(node_id1)); |