| Index: chrome/browser/sync/engine/apply_updates_command_unittest.cc
|
| diff --git a/chrome/browser/sync/engine/apply_updates_command_unittest.cc b/chrome/browser/sync/engine/apply_updates_command_unittest.cc
|
| index 40d9df1a0fc5be5ad480c50d3ed45a3f1d978693..2d8a15f7da31095ecf53fc65bc0073472305cae4 100644
|
| --- a/chrome/browser/sync/engine/apply_updates_command_unittest.cc
|
| +++ b/chrome/browser/sync/engine/apply_updates_command_unittest.cc
|
| @@ -565,7 +565,7 @@ TEST_F(ApplyUpdatesCommandTest, DecryptablePassword) {
|
| data.set_origin("http://example.com");
|
|
|
| cryptographer->Encrypt(data,
|
| - specifics.MutableExtension(sync_pb::password)->mutable_encrypted());
|
| + specifics.mutable_password()->mutable_encrypted());
|
| CreateUnappliedNewItem("item", specifics, false);
|
|
|
| ExpectGroupToChange(apply_updates_command_, GROUP_PASSWORD);
|
| @@ -594,7 +594,7 @@ TEST_F(ApplyUpdatesCommandTest, UndecryptableData) {
|
| root_server_id);
|
| CreateUnappliedNewItem("item2", encrypted_bookmark, false);
|
| sync_pb::EntitySpecifics encrypted_password;
|
| - encrypted_password.MutableExtension(sync_pb::password);
|
| + encrypted_password.mutable_password();
|
| CreateUnappliedNewItem("item3", encrypted_password, false);
|
|
|
| ExpectGroupsToChange(apply_updates_command_, GROUP_UI, GROUP_PASSWORD);
|
| @@ -653,7 +653,7 @@ TEST_F(ApplyUpdatesCommandTest, SomeUndecryptablePassword) {
|
| cryptographer->AddKey(params);
|
|
|
| cryptographer->Encrypt(data,
|
| - specifics.MutableExtension(sync_pb::password)->mutable_encrypted());
|
| + specifics.mutable_password()->mutable_encrypted());
|
| }
|
| CreateUnappliedNewItem("item1", specifics, false);
|
| }
|
| @@ -668,7 +668,7 @@ TEST_F(ApplyUpdatesCommandTest, SomeUndecryptablePassword) {
|
| data.set_origin("http://example.com/2");
|
|
|
| cryptographer.Encrypt(data,
|
| - specifics.MutableExtension(sync_pb::password)->mutable_encrypted());
|
| + specifics.mutable_password()->mutable_encrypted());
|
| CreateUnappliedNewItem("item2", specifics, false);
|
| }
|
|
|
| @@ -718,8 +718,7 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdate) {
|
| other_cryptographer.AddKey(params);
|
|
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| other_cryptographer.GetKeys(nigori->mutable_encrypted());
|
| nigori->set_encrypt_bookmarks(true);
|
| encrypted_types.Put(syncable::BOOKMARKS);
|
| @@ -770,8 +769,7 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdateForDisabledTypes) {
|
| other_cryptographer.AddKey(params);
|
|
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| other_cryptographer.GetKeys(nigori->mutable_encrypted());
|
| nigori->set_encrypt_sessions(true);
|
| nigori->set_encrypt_themes(true);
|
| @@ -849,8 +847,7 @@ TEST_F(ApplyUpdatesCommandTest, EncryptUnsyncedChanges) {
|
| KeyParams params = {"localhost", "dummy", "foobar"};
|
| cryptographer->AddKey(params);
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| cryptographer->GetKeys(nigori->mutable_encrypted());
|
| nigori->set_encrypt_bookmarks(true);
|
| encrypted_types.Put(syncable::BOOKMARKS);
|
| @@ -954,8 +951,7 @@ TEST_F(ApplyUpdatesCommandTest, CannotEncryptUnsyncedChanges) {
|
| KeyParams params = {"localhost", "dummy", "foobar"};
|
| other_cryptographer.AddKey(params);
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| other_cryptographer.GetKeys(nigori->mutable_encrypted());
|
| nigori->set_encrypt_bookmarks(true);
|
| encrypted_types.Put(syncable::BOOKMARKS);
|
|
|