Index: sync/internal_api/sync_manager_impl_unittest.cc |
diff --git a/sync/internal_api/sync_manager_impl_unittest.cc b/sync/internal_api/sync_manager_impl_unittest.cc |
index 36e3da1ff6d6df26775e22f36af7feac45060b6e..b64ecc3916354497b85cbbc48a4f59a91939310b 100644 |
--- a/sync/internal_api/sync_manager_impl_unittest.cc |
+++ b/sync/internal_api/sync_manager_impl_unittest.cc |
@@ -698,6 +698,7 @@ class SyncEncryptionHandlerObserverMock |
void(ModelTypeSet, bool)); // NOLINT |
MOCK_METHOD0(OnEncryptionComplete, void()); // NOLINT |
MOCK_METHOD1(OnCryptographerStateChanged, void(Cryptographer*)); // NOLINT |
+ MOCK_METHOD1(OnPassphraseStateChanged, void(PassphraseState)); // NOLINT |
}; |
} // namespace |
@@ -1504,6 +1505,8 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", true); |
EXPECT_TRUE(EncryptEverythingEnabledForTest()); |
@@ -1544,8 +1547,8 @@ TEST_F(SyncManagerTest, SetInitialGaiaPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1578,8 +1581,8 @@ TEST_F(SyncManagerTest, UpdateGaiaPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1622,11 +1625,13 @@ TEST_F(SyncManagerTest, SetPassphraseWithPassword) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1678,8 +1683,8 @@ TEST_F(SyncManagerTest, SupplyPendingGAIAPass) { |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
sync_manager_.GetEncryptionHandler()->SetDecryptionPassphrase("passphrase2"); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1734,8 +1739,8 @@ TEST_F(SyncManagerTest, SupplyPendingOldGAIAPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_gaia", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
testing::Mock::VerifyAndClearExpectations(&encryption_observer_); |
{ |
@@ -1756,8 +1761,8 @@ TEST_F(SyncManagerTest, SupplyPendingOldGAIAPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"old_gaia", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
Cryptographer* cryptographer = trans.GetCryptographer(); |
@@ -1806,9 +1811,11 @@ TEST_F(SyncManagerTest, SupplyPendingExplicitPass) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetDecryptionPassphrase("explicit"); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1850,8 +1857,8 @@ TEST_F(SyncManagerTest, SupplyPendingGAIAPassUserProvided) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"passphrase", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1879,11 +1886,13 @@ TEST_F(SyncManagerTest, SetPassphraseWithEmptyPasswordNode) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -2103,6 +2112,8 @@ TEST_F(SyncManagerTest, UpdateEntryWithEncryption) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
@@ -2299,11 +2310,13 @@ TEST_F(SyncManagerTest, UpdatePasswordNewPassphrase) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_TRUE(ResetUnsyncedEntry(PASSWORDS, client_tag)); |
} |