| Index: sync/internal_api/sync_encryption_handler_impl.cc
|
| diff --git a/sync/internal_api/sync_encryption_handler_impl.cc b/sync/internal_api/sync_encryption_handler_impl.cc
|
| index f83c3e1a282b13e0ac685a44b32da50e5a31e274..2d2b0cff7d951e0eb911af16b1524aed23eda614 100644
|
| --- a/sync/internal_api/sync_encryption_handler_impl.cc
|
| +++ b/sync/internal_api/sync_encryption_handler_impl.cc
|
| @@ -70,15 +70,12 @@ enum NigoriMigrationState {
|
| // The new passphrase state is sufficient to determine whether a nigori node
|
| // is migrated to support keystore encryption. In addition though, we also
|
| // want to verify the conditions for proper keystore encryption functionality.
|
| -// 1. Passphrase state is set.
|
| -// 2. Migration time is set.
|
| -// 3. Frozen keybag is true
|
| -// 4. If passphrase state is keystore, keystore_decryptor_token is set.
|
| +// 1. Passphrase type is set.
|
| +// 2. Frozen keybag is true
|
| +// 3. If passphrase state is keystore, keystore_decryptor_token is set.
|
| bool IsNigoriMigratedToKeystore(const sync_pb::NigoriSpecifics& nigori) {
|
| if (!nigori.has_passphrase_type())
|
| return false;
|
| - if (!nigori.has_keystore_migration_time())
|
| - return false;
|
| if (!nigori.keybag_is_frozen())
|
| return false;
|
| if (nigori.passphrase_type() ==
|
| @@ -88,8 +85,6 @@ bool IsNigoriMigratedToKeystore(const sync_pb::NigoriSpecifics& nigori) {
|
| sync_pb::NigoriSpecifics::KEYSTORE_PASSPHRASE &&
|
| nigori.keystore_decryptor_token().blob().empty())
|
| return false;
|
| - if (!nigori.has_keystore_migration_time())
|
| - return false;
|
| return true;
|
| }
|
|
|
| @@ -896,7 +891,6 @@ bool SyncEncryptionHandlerImpl::ApplyNigoriUpdateImpl(
|
| }
|
| bool is_nigori_migrated = IsNigoriMigratedToKeystore(nigori);
|
| if (is_nigori_migrated) {
|
| - DCHECK(nigori.has_keystore_migration_time());
|
| migration_time_ = ProtoTimeToTime(nigori.keystore_migration_time());
|
| PassphraseType nigori_passphrase_type =
|
| ProtoPassphraseTypeToEnum(nigori.passphrase_type());
|
|
|