Index: components/sync/core_impl/sync_encryption_handler_impl_unittest.cc |
diff --git a/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc b/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc |
index 6aa3139ec0f36329529535531d6cff9dc40186d5..bb2e4304d55e6a8b4adf3b16e5f8c7c067e96105 100644 |
--- a/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc |
+++ b/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc |
@@ -254,8 +254,7 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test { |
EXPECT_CALL(*observer(), OnEncryptionComplete()).Times(AtLeast(1)); |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
} |
@@ -282,8 +281,7 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test { |
EXPECT_CALL(*observer(), OnEncryptionComplete()).Times(AtLeast(1)); |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::CUSTOM_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
} |
@@ -316,7 +314,7 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test { |
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, false)); |
encryption_handler()->Init(); |
EXPECT_FALSE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), passphrase_type); |
+ VerifyPassphraseType(passphrase_type); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
} |
@@ -348,6 +346,12 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test { |
passphrase); |
} |
+ void VerifyPassphraseType(PassphraseType passphrase_type) { |
+ ReadTransaction trans(FROM_HERE, user_share()); |
+ EXPECT_EQ(passphrase_type, |
+ encryption_handler()->GetPassphraseType(trans.GetWrappedTrans())); |
+ } |
+ |
protected: |
TestUserShare test_user_share_; |
FakeEncryptor encryptor_; |
@@ -741,8 +745,7 @@ TEST_F(SyncEncryptionHandlerImplTest, MigrateOnDecryptImplicitPass) { |
EXPECT_FALSE(encryption_handler()->MigratedToKeystore()); |
encryption_handler()->SetDecryptionPassphrase(kOtherKey); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kOtherKey); |
} |
@@ -800,8 +803,7 @@ TEST_F(SyncEncryptionHandlerImplTest, MigrateOnDecryptCustomPass) { |
encryption_handler()->SetDecryptionPassphrase(kOtherKey); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
const base::Time migration_time = encryption_handler()->migration_time(); |
- EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
VerifyMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, kOtherKey); |
VerifyRestoreAfterCustomPassphrase( |
@@ -836,8 +838,7 @@ TEST_F(SyncEncryptionHandlerImplTest, MigrateOnKeystoreKeyAvailableImplicit) { |
// The actual migration gets posted, so run all pending tasks. |
PumpLoop(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kCurKey); |
} |
@@ -880,8 +881,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
const base::Time migration_time = encryption_handler()->migration_time(); |
- EXPECT_EQ(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, kCurKey); |
@@ -941,8 +941,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
const base::Time migration_time = encryption_handler()->migration_time(); |
- EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, kCurKey); |
@@ -992,8 +991,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
PumpLoop(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
const base::Time migration_time = encryption_handler()->migration_time(); |
- EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, kCurKey); |
@@ -1016,9 +1014,11 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriKeystorePass) { |
other_cryptographer, kKeystoreKey, &keystore_decryptor_token)); |
EXPECT_FALSE(encryption_handler()->MigratedToKeystore()); |
EXPECT_FALSE(GetCryptographer()->is_ready()); |
- EXPECT_NE(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
- |
+ { |
+ ReadTransaction trans(FROM_HERE, user_share()); |
+ EXPECT_NE(encryption_handler()->GetPassphraseType(trans.GetWrappedTrans()), |
+ PassphraseType::KEYSTORE_PASSPHRASE); |
+ } |
// Now build a nigori node with the generated keystore decryptor token and |
// initialize the encryption handler with it. The cryptographer should be |
// initialized properly to decrypt both kCurKey and kKeystoreKey. |
@@ -1053,8 +1053,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriKeystorePass) { |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp(1, PassphraseType::KEYSTORE_PASSPHRASE, |
kCurKey); |
@@ -1119,8 +1118,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriFrozenImplicitPass) { |
Mock::VerifyAndClearExpectations(observer()); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE); |
EXPECT_TRUE(GetCryptographer()->has_pending_keys()); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
@@ -1193,8 +1191,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriCustomPass) { |
Mock::VerifyAndClearExpectations(observer()); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(GetCryptographer()->has_pending_keys()); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
@@ -1258,8 +1255,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveUnmigratedNigoriAfterMigration) { |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::CUSTOM_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp(migration_time, |
PassphraseType::CUSTOM_PASSPHRASE, kCurKey); |
@@ -1298,8 +1294,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveUnmigratedNigoriAfterMigration) { |
// Verify we're still migrated and have proper encryption state. |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::CUSTOM_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp(1, PassphraseType::CUSTOM_PASSPHRASE, |
kCurKey); |
@@ -1348,8 +1343,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveOldMigratedNigori) { |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::CUSTOM_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp(1, PassphraseType::CUSTOM_PASSPHRASE, |
kCurKey); |
@@ -1394,8 +1388,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveOldMigratedNigori) { |
// Verify we're still migrated and have proper encryption state. |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::CUSTOM_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp(migration_time, |
PassphraseType::CUSTOM_PASSPHRASE, kCurKey); |
@@ -1423,9 +1416,11 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreAfterReceivingMigratedNigori) { |
other_cryptographer, kKeystoreKey, &keystore_decryptor_token)); |
EXPECT_FALSE(encryption_handler()->MigratedToKeystore()); |
EXPECT_FALSE(GetCryptographer()->is_ready()); |
- EXPECT_NE(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
- |
+ { |
+ ReadTransaction trans(FROM_HERE, user_share()); |
+ EXPECT_NE(encryption_handler()->GetPassphraseType(trans.GetWrappedTrans()), |
+ PassphraseType::KEYSTORE_PASSPHRASE); |
+ } |
// Now build a nigori node with the generated keystore decryptor token and |
// initialize the encryption handler with it. The cryptographer should be |
// initialized properly to decrypt both kCurKey and kKeystoreKey. |
@@ -1452,8 +1447,7 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreAfterReceivingMigratedNigori) { |
PumpLoop(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->has_pending_keys()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
@@ -1471,8 +1465,7 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreAfterReceivingMigratedNigori) { |
PumpLoop(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp(1, PassphraseType::KEYSTORE_PASSPHRASE, |
kCurKey); |
@@ -1537,8 +1530,7 @@ TEST_F(SyncEncryptionHandlerImplTest, SetCustomPassAfterMigration) { |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
@@ -1562,8 +1554,7 @@ TEST_F(SyncEncryptionHandlerImplTest, SetCustomPassAfterMigration) { |
EXPECT_FALSE(captured_bootstrap_token.empty()); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::CUSTOM_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
EXPECT_FALSE(encryption_handler()->custom_passphrase_time().is_null()); |
VerifyMigratedNigoriWithTimestamp(migration_time, |
@@ -1640,8 +1631,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->has_pending_keys()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
@@ -1672,8 +1662,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
encryption_handler()->SetEncryptionPassphrase(kNewKey, true); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::CUSTOM_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::CUSTOM_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
EXPECT_FALSE(encryption_handler()->custom_passphrase_time().is_null()); |
VerifyMigratedNigoriWithTimestamp(migration_time, |
@@ -1749,8 +1738,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->has_pending_keys()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
@@ -1769,8 +1757,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
encryption_handler()->SetEncryptionPassphrase(kNewKey, false); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp(1, PassphraseType::KEYSTORE_PASSPHRASE, |
kOldKey); |
@@ -1839,8 +1826,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
encryption_handler()->Init(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->has_pending_keys()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
Mock::VerifyAndClearExpectations(observer()); |
@@ -1867,8 +1853,7 @@ TEST_F(SyncEncryptionHandlerImplTest, |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE); |
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigoriWithTimestamp( |
1, PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, kCurKey); |
@@ -1926,8 +1911,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriWithOldPassphrase) { |
PumpLoop(); |
Mock::VerifyAndClearExpectations(observer()); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kCurKey); |
// Now build an old keystore passphrase nigori node. |
@@ -1956,8 +1940,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriWithOldPassphrase) { |
// Verify we're still migrated and have proper encryption state. |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kCurKey); |
} |
@@ -2011,8 +1994,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysGaiaDefault) { |
// key (instead of the old gaia key). |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey); |
} |
@@ -2064,8 +2046,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysKeystoreDefault) { |
// key (instead of the old gaia key). |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey); |
} |
@@ -2102,8 +2083,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysAfterPendingGaiaResolved) { |
EXPECT_FALSE(encryption_handler()->MigratedToKeystore()); |
encryption_handler()->SetDecryptionPassphrase(kOldGaiaKey); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey); |
} |
@@ -2144,8 +2124,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysGaiaDefaultOnInit) { |
// key (instead of the old gaia key). |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
EXPECT_TRUE(GetCryptographer()->is_ready()); |
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), |
- PassphraseType::KEYSTORE_PASSPHRASE); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled()); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey); |
} |
@@ -2194,8 +2173,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysWhenMigratedNigoriArrives) { |
PumpLoop(); |
EXPECT_TRUE(encryption_handler()->MigratedToKeystore()); |
- EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE, |
- encryption_handler()->GetPassphraseType()); |
+ VerifyPassphraseType(PassphraseType::KEYSTORE_PASSPHRASE); |
VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey); |
} |