| Index: chrome/browser/password_manager/password_store_mac_unittest.cc
|
| diff --git a/chrome/browser/password_manager/password_store_mac_unittest.cc b/chrome/browser/password_manager/password_store_mac_unittest.cc
|
| index 76836e70e0ab715790fd2e7403359f58ad9e4ad7..6bf4784abca2684bf61d31f46ba71e7bc20173f8 100644
|
| --- a/chrome/browser/password_manager/password_store_mac_unittest.cc
|
| +++ b/chrome/browser/password_manager/password_store_mac_unittest.cc
|
| @@ -158,7 +158,6 @@ void CheckFormsAgainstExpectations(
|
| EXPECT_TRUE(form->blacklisted_by_user);
|
| }
|
| EXPECT_EQ(expectation->preferred, form->preferred);
|
| - EXPECT_EQ(expectation->ssl_valid, form->ssl_valid);
|
| EXPECT_DOUBLE_EQ(expectation->creation_time,
|
| form->date_created.ToDoubleT());
|
| base::Time created = base::Time::FromDoubleT(expectation->creation_time);
|
| @@ -335,7 +334,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainToFormTranslation) {
|
| const char* origin;
|
| const wchar_t* username; // Set to NULL to check for a blacklist entry.
|
| const wchar_t* password;
|
| - const bool ssl_valid;
|
| const int creation_year;
|
| const int creation_month;
|
| const int creation_day;
|
| @@ -346,32 +344,32 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainToFormTranslation) {
|
|
|
| TestExpectations expected[] = {
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| - "http://some.domain.com/", L"joe_user", L"sekrit", false, 2002, 6, 1, 17,
|
| - 15, 0},
|
| + "http://some.domain.com/", L"joe_user", L"sekrit", 2002, 6, 1, 17, 15,
|
| + 0},
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| - "http://some.domain.com/insecure.html", L"joe_user", L"sekrit", false,
|
| - 1999, 12, 31, 23, 59, 59},
|
| + "http://some.domain.com/insecure.html", L"joe_user", L"sekrit", 1999, 12,
|
| + 31, 23, 59, 59},
|
| {PasswordForm::SCHEME_HTML, "https://some.domain.com/",
|
| - "https://some.domain.com/secure.html", L"secure_user", L"password", true,
|
| - 2010, 9, 8, 7, 6, 5},
|
| + "https://some.domain.com/secure.html", L"secure_user", L"password", 2010,
|
| + 9, 8, 7, 6, 5},
|
| {PasswordForm::SCHEME_HTML, "http://dont.remember.com/",
|
| - "http://dont.remember.com/", NULL, NULL, false, 2000, 1, 1, 0, 0, 0},
|
| + "http://dont.remember.com/", NULL, NULL, 2000, 1, 1, 0, 0, 0},
|
| {PasswordForm::SCHEME_HTML, "http://dont.remember.com/",
|
| - "http://dont.remember.com/", NULL, NULL, false, 2000, 1, 1, 0, 0, 0},
|
| + "http://dont.remember.com/", NULL, NULL, 2000, 1, 1, 0, 0, 0},
|
| {PasswordForm::SCHEME_HTML, "https://dont.remember.com/",
|
| - "https://dont.remember.com/", NULL, NULL, true, 2000, 1, 1, 0, 0, 0},
|
| + "https://dont.remember.com/", NULL, NULL, 2000, 1, 1, 0, 0, 0},
|
| {PasswordForm::SCHEME_BASIC, "http://some.domain.com:4567/low_security",
|
| "http://some.domain.com:4567/insecure.html", L"basic_auth_user",
|
| - L"basic", false, 1998, 03, 30, 10, 00, 00},
|
| + L"basic", 1998, 03, 30, 10, 00, 00},
|
| {PasswordForm::SCHEME_DIGEST, "https://some.domain.com/high_security",
|
| - "https://some.domain.com/", L"digest_auth_user", L"digest", true, 1998,
|
| - 3, 30, 10, 0, 0},
|
| + "https://some.domain.com/", L"digest_auth_user", L"digest", 1998, 3, 30,
|
| + 10, 0, 0},
|
| // This one gives us an invalid date, which we will treat as a "NULL" date
|
| // which is 1601.
|
| {PasswordForm::SCHEME_OTHER, "http://a.server.com/",
|
| - "http://a.server.com/", L"abc", L"123", false, 1601, 1, 1, 0, 0, 0},
|
| + "http://a.server.com/", L"abc", L"123", 1601, 1, 1, 0, 0, 0},
|
| {PasswordForm::SCHEME_HTML, "android://hash@com.domain.some/", "",
|
| - L"joe_user", L"secret", true, 2015, 5, 15, 14, 13, 12},
|
| + L"joe_user", L"secret", 2015, 5, 15, 14, 13, 12},
|
| };
|
|
|
| for (unsigned int i = 0; i < arraysize(expected); ++i) {
|
| @@ -387,7 +385,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainToFormTranslation) {
|
|
|
| EXPECT_EQ(expected[i].scheme, form.scheme);
|
| EXPECT_EQ(GURL(expected[i].origin), form.origin);
|
| - EXPECT_EQ(expected[i].ssl_valid, form.ssl_valid);
|
| EXPECT_EQ(std::string(expected[i].signon_realm), form.signon_realm);
|
| if (expected[i].username) {
|
| EXPECT_EQ(WideToUTF16(expected[i].username), form.username_value);
|
| @@ -426,55 +423,51 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainSearch) {
|
| TestDataAndExpectation test_data[] = {
|
| // An HTML form we've seen.
|
| {{PasswordForm::SCHEME_HTML, "http://some.domain.com/", NULL, NULL, NULL,
|
| - NULL, NULL, L"joe_user", NULL, false, false, 0},
|
| + NULL, NULL, L"joe_user", NULL, false, 0},
|
| 2,
|
| 2},
|
| {{PasswordForm::SCHEME_HTML, "http://some.domain.com/", NULL, NULL, NULL,
|
| - NULL, NULL, L"wrong_user", NULL, false, false, 0},
|
| + NULL, NULL, L"wrong_user", NULL, false, 0},
|
| 2,
|
| 0},
|
| // An HTML form we haven't seen
|
| {{PasswordForm::SCHEME_HTML, "http://www.unseendomain.com/", NULL, NULL,
|
| - NULL, NULL, NULL, L"joe_user", NULL, false, false, 0},
|
| + NULL, NULL, NULL, L"joe_user", NULL, false, 0},
|
| 0,
|
| 0},
|
| // Basic auth that should match.
|
| {{PasswordForm::SCHEME_BASIC, "http://some.domain.com:4567/low_security",
|
| - NULL, NULL, NULL, NULL, NULL, L"basic_auth_user", NULL, false, false,
|
| - 0},
|
| + NULL, NULL, NULL, NULL, NULL, L"basic_auth_user", NULL, false, 0},
|
| 1,
|
| 1},
|
| // Basic auth with the wrong port.
|
| {{PasswordForm::SCHEME_BASIC, "http://some.domain.com:1111/low_security",
|
| - NULL, NULL, NULL, NULL, NULL, L"basic_auth_user", NULL, false, false,
|
| - 0},
|
| + NULL, NULL, NULL, NULL, NULL, L"basic_auth_user", NULL, false, 0},
|
| 0,
|
| 0},
|
| // Digest auth we've saved under https, visited with http.
|
| {{PasswordForm::SCHEME_DIGEST, "http://some.domain.com/high_security",
|
| - NULL, NULL, NULL, NULL, NULL, L"digest_auth_user", NULL, false, false,
|
| - 0},
|
| + NULL, NULL, NULL, NULL, NULL, L"digest_auth_user", NULL, false, 0},
|
| 0,
|
| 0},
|
| // Digest auth that should match.
|
| {{PasswordForm::SCHEME_DIGEST, "https://some.domain.com/high_security",
|
| - NULL, NULL, NULL, NULL, NULL, L"wrong_user", NULL, false, true, 0},
|
| + NULL, NULL, NULL, NULL, NULL, L"wrong_user", NULL, false, 0},
|
| 1,
|
| 0},
|
| // Digest auth with the wrong domain.
|
| {{PasswordForm::SCHEME_DIGEST, "https://some.domain.com/other_domain",
|
| - NULL, NULL, NULL, NULL, NULL, L"digest_auth_user", NULL, false, true,
|
| - 0},
|
| + NULL, NULL, NULL, NULL, NULL, L"digest_auth_user", NULL, false, 0},
|
| 0,
|
| 0},
|
| // Android credentials (both legacy ones with origin, and without).
|
| {{PasswordForm::SCHEME_HTML, "android://hash@com.domain.some/",
|
| "android://hash@com.domain.some/", NULL, NULL, NULL, NULL, L"joe_user",
|
| - NULL, false, true, 0},
|
| + NULL, false, 0},
|
| 1,
|
| 1},
|
| {{PasswordForm::SCHEME_HTML, "android://hash@com.domain.some/", NULL,
|
| - NULL, NULL, NULL, NULL, L"joe_user", NULL, false, true, 0},
|
| + NULL, NULL, NULL, NULL, L"joe_user", NULL, false, 0},
|
| 1,
|
| 1},
|
| // Federated logins do not have a corresponding Keychain entry, and should
|
| @@ -484,12 +477,12 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainSearch) {
|
| // that it is a federated login.
|
| {{PasswordForm::SCHEME_HTML, "android://hash@com.domain.some/", NULL,
|
| NULL, NULL, NULL, NULL, L"joe_user",
|
| - password_manager::kTestingFederatedLoginMarker, false, true, 0},
|
| + password_manager::kTestingFederatedLoginMarker, false, 0},
|
| 1,
|
| 0},
|
| /// Garbage forms should have no matches.
|
| {{PasswordForm::SCHEME_HTML, "foo/bar/baz", NULL, NULL, NULL, NULL, NULL,
|
| - NULL, NULL, false, false, 0},
|
| + NULL, NULL, false, 0},
|
| 0,
|
| 0},
|
| };
|
| @@ -566,13 +559,13 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainExactSearch) {
|
| PasswordFormData base_form_data[] = {
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| "http://some.domain.com/insecure.html", NULL, NULL, NULL, NULL,
|
| - L"joe_user", NULL, true, false, 0},
|
| + L"joe_user", NULL, true, 0},
|
| {PasswordForm::SCHEME_BASIC, "http://some.domain.com:4567/low_security",
|
| "http://some.domain.com:4567/insecure.html", NULL, NULL, NULL, NULL,
|
| - L"basic_auth_user", NULL, true, false, 0},
|
| + L"basic_auth_user", NULL, true, 0},
|
| {PasswordForm::SCHEME_DIGEST, "https://some.domain.com/high_security",
|
| "https://some.domain.com", NULL, NULL, NULL, NULL, L"digest_auth_user",
|
| - NULL, true, true, 0},
|
| + NULL, true, 0},
|
| };
|
|
|
| for (unsigned int i = 0; i < arraysize(base_form_data); ++i) {
|
| @@ -625,40 +618,40 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainAdd) {
|
| // Test a variety of scheme/port/protocol/path variations.
|
| {{PasswordForm::SCHEME_HTML, "http://web.site.com/",
|
| "http://web.site.com/path/to/page.html", NULL, NULL, NULL, NULL,
|
| - L"anonymous", L"knock-knock", false, false, 0},
|
| + L"anonymous", L"knock-knock", false, 0},
|
| true},
|
| {{PasswordForm::SCHEME_HTML, "https://web.site.com/",
|
| "https://web.site.com/", NULL, NULL, NULL, NULL, L"admin", L"p4ssw0rd",
|
| - false, false, 0},
|
| + false, 0},
|
| true},
|
| {{PasswordForm::SCHEME_BASIC, "http://a.site.com:2222/therealm",
|
| "http://a.site.com:2222/", NULL, NULL, NULL, NULL, L"username",
|
| - L"password", false, false, 0},
|
| + L"password", false, 0},
|
| true},
|
| {{PasswordForm::SCHEME_DIGEST, "https://digest.site.com/differentrealm",
|
| "https://digest.site.com/secure.html", NULL, NULL, NULL, NULL,
|
| - L"testname", L"testpass", false, false, 0},
|
| + L"testname", L"testpass", false, 0},
|
| true},
|
| // Test that Android credentials can be stored. Also check the legacy form
|
| // when |origin| was still filled with the Android URI (and not left
|
| // empty).
|
| {{PasswordForm::SCHEME_HTML, "android://hash@com.example.alpha/", "",
|
| - NULL, NULL, NULL, NULL, L"joe_user", L"password", false, true, 0},
|
| + NULL, NULL, NULL, NULL, L"joe_user", L"password", false, 0},
|
| true},
|
| {{PasswordForm::SCHEME_HTML, "android://hash@com.example.beta/",
|
| "android://hash@com.example.beta/", NULL, NULL, NULL, NULL,
|
| - L"jane_user", L"password2", false, true, 0},
|
| + L"jane_user", L"password2", false, 0},
|
| true},
|
| // Make sure that garbage forms are rejected.
|
| {{PasswordForm::SCHEME_HTML, "gobbledygook", "gobbledygook", NULL, NULL,
|
| - NULL, NULL, L"anonymous", L"knock-knock", false, false, 0},
|
| + NULL, NULL, L"anonymous", L"knock-knock", false, 0},
|
| false},
|
| // Test that failing to update a duplicate (forced using the magic failure
|
| // password; see MockAppleKeychain::ItemModifyAttributesAndData) is
|
| // reported.
|
| {{PasswordForm::SCHEME_HTML, "http://some.domain.com",
|
| "http://some.domain.com/insecure.html", NULL, NULL, NULL, NULL,
|
| - L"joe_user", L"fail_me", false, false, 0},
|
| + L"joe_user", L"fail_me", false, 0},
|
| false},
|
| };
|
|
|
| @@ -692,7 +685,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainAdd) {
|
| L"joe_user",
|
| L"updated_password",
|
| false,
|
| - false,
|
| 0};
|
| std::unique_ptr<PasswordForm> update_form =
|
| CreatePasswordFormFromDataForTesting(data);
|
| @@ -715,23 +707,22 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainRemove) {
|
| // Test deletion of an item that we add.
|
| {{PasswordForm::SCHEME_HTML, "http://web.site.com/",
|
| "http://web.site.com/path/to/page.html", NULL, NULL, NULL, NULL,
|
| - L"anonymous", L"knock-knock", false, false, 0},
|
| + L"anonymous", L"knock-knock", false, 0},
|
| true},
|
| // Test that Android credentials can be removed. Also check the legacy
|
| - // case
|
| - // when |origin| was still filled with the Android URI (and not left
|
| + // case when |origin| was still filled with the Android URI (and not left
|
| // empty).
|
| {{PasswordForm::SCHEME_HTML, "android://hash@com.example.alpha/", "",
|
| - NULL, NULL, NULL, NULL, L"joe_user", L"secret", false, true, 0},
|
| + NULL, NULL, NULL, NULL, L"joe_user", L"secret", false, 0},
|
| true},
|
| {{PasswordForm::SCHEME_HTML, "android://hash@com.example.beta/",
|
| "android://hash@com.example.beta/", NULL, NULL, NULL, NULL,
|
| - L"jane_user", L"secret", false, true, 0},
|
| + L"jane_user", L"secret", false, 0},
|
| true},
|
| // Make sure we don't delete items we don't own.
|
| {{PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| "http://some.domain.com/insecure.html", NULL, NULL, NULL, NULL,
|
| - L"joe_user", NULL, true, false, 0},
|
| + L"joe_user", NULL, true, 0},
|
| false},
|
| };
|
|
|
| @@ -771,7 +762,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMatch) {
|
| different_form.username_element = ASCIIToUTF16("password");
|
| different_form.password_value = ASCIIToUTF16("sekrit");
|
| different_form.action = GURL("http://some.domain.com/action.cgi");
|
| - different_form.ssl_valid = true;
|
| different_form.preferred = true;
|
| different_form.date_created = base::Time::Now();
|
| EXPECT_TRUE(
|
| @@ -841,7 +831,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"sekrit",
|
| false,
|
| - false,
|
| 1010101010};
|
| PasswordFormData keychain_user_1_with_path = {
|
| PasswordForm::SCHEME_HTML,
|
| @@ -854,7 +843,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"otherpassword",
|
| false,
|
| - false,
|
| 1010101010};
|
| PasswordFormData keychain_user_2 = {PasswordForm::SCHEME_HTML,
|
| "http://some.domain.com/",
|
| @@ -866,7 +854,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"john.doe",
|
| L"sesame",
|
| false,
|
| - false,
|
| 958739876};
|
| PasswordFormData keychain_blacklist = {PasswordForm::SCHEME_HTML,
|
| "http://some.domain.com/",
|
| @@ -878,7 +865,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| NULL,
|
| NULL,
|
| false,
|
| - false,
|
| 1010101010};
|
| PasswordFormData keychain_android = {PasswordForm::SCHEME_HTML,
|
| "android://hash@com.domain.some/",
|
| @@ -890,7 +876,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"secret",
|
| false,
|
| - true,
|
| 1234567890};
|
|
|
| PasswordFormData db_user_1 = {PasswordForm::SCHEME_HTML,
|
| @@ -903,7 +888,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"",
|
| true,
|
| - false,
|
| 1212121212};
|
| PasswordFormData db_user_1_with_path = {
|
| PasswordForm::SCHEME_HTML,
|
| @@ -916,7 +900,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"",
|
| true,
|
| - false,
|
| 1234567890};
|
| PasswordFormData db_user_3_with_path = {
|
| PasswordForm::SCHEME_HTML,
|
| @@ -929,7 +912,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"second-account",
|
| L"",
|
| true,
|
| - false,
|
| 1240000000};
|
| PasswordFormData database_blacklist_with_path = {
|
| PasswordForm::SCHEME_HTML,
|
| @@ -942,7 +924,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| NULL,
|
| NULL,
|
| true,
|
| - false,
|
| 1212121212};
|
| PasswordFormData db_android = {PasswordForm::SCHEME_HTML,
|
| "android://hash@com.domain.some/",
|
| @@ -954,7 +935,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"",
|
| false,
|
| - true,
|
| 1234567890};
|
| PasswordFormData db_federated = {
|
| PasswordForm::SCHEME_HTML,
|
| @@ -967,7 +947,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| password_manager::kTestingFederatedLoginMarker,
|
| false,
|
| - true,
|
| 3434343434};
|
|
|
| PasswordFormData merged_user_1 = {PasswordForm::SCHEME_HTML,
|
| @@ -980,7 +959,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 1212121212};
|
| PasswordFormData merged_user_1_with_db_path = {
|
| PasswordForm::SCHEME_HTML,
|
| @@ -993,7 +971,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 1234567890};
|
| PasswordFormData merged_user_1_with_both_paths = {
|
| PasswordForm::SCHEME_HTML,
|
| @@ -1006,7 +983,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"otherpassword",
|
| true,
|
| - false,
|
| 1234567890};
|
| PasswordFormData merged_android = {PasswordForm::SCHEME_HTML,
|
| "android://hash@com.domain.some/",
|
| @@ -1018,7 +994,6 @@ TEST_F(PasswordStoreMacInternalsTest, TestFormMerge) {
|
| L"joe_user",
|
| L"secret",
|
| false,
|
| - true,
|
| 1234567890};
|
|
|
| // Build up the big multi-dimensional array of data sets that will actually
|
| @@ -1127,24 +1102,21 @@ TEST_F(PasswordStoreMacInternalsTest, TestPasswordBulkLookup) {
|
| PasswordFormData db_data[] = {
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| "http://some.domain.com/", "http://some.domain.com/action.cgi",
|
| - L"submit", L"username", L"password", L"joe_user", L"", true, false,
|
| - 1212121212},
|
| + L"submit", L"username", L"password", L"joe_user", L"", true, 1212121212},
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| "http://some.domain.com/page.html",
|
| "http://some.domain.com/handlepage.cgi", L"submit", L"username",
|
| - L"password", L"joe_user", L"", true, false, 1234567890},
|
| + L"password", L"joe_user", L"", true, 1234567890},
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| "http://some.domain.com/page.html",
|
| "http://some.domain.com/handlepage.cgi", L"submit", L"username",
|
| - L"password", L"second-account", L"", true, false, 1240000000},
|
| + L"password", L"second-account", L"", true, 1240000000},
|
| {PasswordForm::SCHEME_HTML, "http://dont.remember.com/",
|
| "http://dont.remember.com/", "http://dont.remember.com/handlepage.cgi",
|
| - L"submit", L"username", L"password", L"joe_user", L"", true, false,
|
| - 1240000000},
|
| + L"submit", L"username", L"password", L"joe_user", L"", true, 1240000000},
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| "http://some.domain.com/path.html", "http://some.domain.com/action.cgi",
|
| - L"submit", L"username", L"password", NULL, NULL, true, false,
|
| - 1212121212},
|
| + L"submit", L"username", L"password", NULL, NULL, true, 1212121212},
|
| };
|
| ScopedVector<autofill::PasswordForm> database_forms;
|
| for (unsigned int i = 0; i < arraysize(db_data); ++i) {
|
| @@ -1166,12 +1138,12 @@ TEST_F(PasswordStoreMacInternalsTest, TestBlacklistedFiltering) {
|
| {PasswordForm::SCHEME_HTML, "http://dont.remember.com/",
|
| "http://dont.remember.com/", "http://dont.remember.com/handlepage.cgi",
|
| L"submit", L"username", L"password", L"joe_user", L"non_empty_password",
|
| - true, false, 1240000000},
|
| + true, 1240000000},
|
| {PasswordForm::SCHEME_HTML, "https://dont.remember.com/",
|
| "https://dont.remember.com/",
|
| "https://dont.remember.com/handlepage_secure.cgi", L"submit",
|
| L"username", L"password", L"joe_user", L"non_empty_password", true,
|
| - false, 1240000000},
|
| + 1240000000},
|
| };
|
| ScopedVector<autofill::PasswordForm> database_forms;
|
| for (unsigned int i = 0; i < arraysize(db_data); ++i) {
|
| @@ -1257,13 +1229,13 @@ TEST_F(PasswordStoreMacInternalsTest, TestPasswordGetAll) {
|
| PasswordFormData owned_password_data[] = {
|
| {PasswordForm::SCHEME_HTML, "http://web.site.com/",
|
| "http://web.site.com/path/to/page.html", NULL, NULL, NULL, NULL,
|
| - L"anonymous", L"knock-knock", false, false, 0},
|
| + L"anonymous", L"knock-knock", false, 0},
|
| {PasswordForm::SCHEME_BASIC, "http://a.site.com:2222/therealm",
|
| "http://a.site.com:2222/", NULL, NULL, NULL, NULL, L"username",
|
| - L"password", false, false, 0},
|
| + L"password", false, 0},
|
| {PasswordForm::SCHEME_DIGEST, "https://digest.site.com/differentrealm",
|
| "https://digest.site.com/secure.html", NULL, NULL, NULL, NULL,
|
| - L"testname", L"testpass", false, false, 0},
|
| + L"testname", L"testpass", false, 0},
|
| };
|
| for (unsigned int i = 0; i < arraysize(owned_password_data); ++i) {
|
| std::unique_ptr<PasswordForm> form =
|
| @@ -1444,7 +1416,6 @@ TEST_F(PasswordStoreMacTest, TestStoreUpdate) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 1};
|
| std::unique_ptr<PasswordForm> joint_form =
|
| CreatePasswordFormFromDataForTesting(joint_data);
|
| @@ -1487,7 +1458,7 @@ TEST_F(PasswordStoreMacTest, TestStoreUpdate) {
|
| {
|
| {PasswordForm::SCHEME_HTML, "http://some.domain.com/",
|
| "http://some.domain.com/insecure.html", "login.cgi", L"username",
|
| - L"password", L"submit", L"joe_user", L"53krit", true, false, 2},
|
| + L"password", L"submit", L"joe_user", L"53krit", true, 2},
|
| "53krit",
|
| },
|
| // Update the keychain-only password; this simulates the initial use of a
|
| @@ -1495,7 +1466,7 @@ TEST_F(PasswordStoreMacTest, TestStoreUpdate) {
|
| {
|
| {PasswordForm::SCHEME_HTML, "http://keychain.only.com/",
|
| "http://keychain.only.com/login.html", "login.cgi", L"username",
|
| - L"password", L"submit", L"keychain", L"only", true, false, 2},
|
| + L"password", L"submit", L"keychain", L"only", true, 2},
|
| "only",
|
| },
|
| // Update a password that doesn't exist in either location. This tests the
|
| @@ -1504,7 +1475,7 @@ TEST_F(PasswordStoreMacTest, TestStoreUpdate) {
|
| {
|
| {PasswordForm::SCHEME_HTML, "http://different.com/",
|
| "http://different.com/index.html", "login.cgi", L"username",
|
| - L"password", L"submit", L"abc", L"123", true, false, 2},
|
| + L"password", L"submit", L"abc", L"123", true, 2},
|
| NULL,
|
| },
|
| };
|
| @@ -1567,7 +1538,6 @@ TEST_F(PasswordStoreMacTest, TestDBKeychainAssociation) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 1};
|
| std::unique_ptr<PasswordForm> www_form =
|
| CreatePasswordFormFromDataForTesting(www_form_data);
|
| @@ -1660,7 +1630,6 @@ void CheckRemoveLoginsBetween(PasswordStoreMacTest* test, bool check_created) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 0};
|
| // The old form doesn't have elements names.
|
| PasswordFormData www_form_data_facebook_old = {
|
| @@ -1674,7 +1643,6 @@ void CheckRemoveLoginsBetween(PasswordStoreMacTest* test, bool check_created) {
|
| L"joe_user",
|
| L"oldsekrit",
|
| true,
|
| - false,
|
| 0};
|
| PasswordFormData www_form_data_other = {PasswordForm::SCHEME_HTML,
|
| "http://different.com/",
|
| @@ -1686,7 +1654,6 @@ void CheckRemoveLoginsBetween(PasswordStoreMacTest* test, bool check_created) {
|
| L"different_joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 0};
|
| std::unique_ptr<PasswordForm> form_facebook =
|
| CreatePasswordFormFromDataForTesting(www_form_data_facebook);
|
| @@ -1790,7 +1757,6 @@ TEST_F(PasswordStoreMacTest, TestDisableAutoSignInForOrigins) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 0};
|
| std::unique_ptr<PasswordForm> form_facebook =
|
| CreatePasswordFormFromDataForTesting(www_form_data_facebook);
|
| @@ -1807,7 +1773,6 @@ TEST_F(PasswordStoreMacTest, TestDisableAutoSignInForOrigins) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 0};
|
| std::unique_ptr<PasswordForm> form_google =
|
| CreatePasswordFormFromDataForTesting(www_form_data_google);
|
| @@ -1869,7 +1834,6 @@ TEST_F(PasswordStoreMacTest, TestRemoveLoginsMultiProfile) {
|
| L"joe_user",
|
| L"sekrit",
|
| true,
|
| - false,
|
| 1};
|
| std::unique_ptr<PasswordForm> www_form =
|
| CreatePasswordFormFromDataForTesting(www_form_data1);
|
| @@ -1886,7 +1850,6 @@ TEST_F(PasswordStoreMacTest, TestRemoveLoginsMultiProfile) {
|
| L"not_joe_user",
|
| L"12345",
|
| true,
|
| - false,
|
| 1};
|
| www_form = CreatePasswordFormFromDataForTesting(www_form_data2);
|
| store_->AddLogin(*www_form);
|
| @@ -1936,7 +1899,6 @@ TEST_F(PasswordStoreMacTest, SilentlyRemoveOrphanedForm) {
|
| L"joe_user",
|
| L"",
|
| true,
|
| - false,
|
| 1};
|
| std::unique_ptr<PasswordForm> www_form(
|
| CreatePasswordFormFromDataForTesting(www_form_data));
|
|
|