Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(4)

Unified Diff: components/sync/core_impl/sync_encryption_handler_impl_unittest.cc

Issue 2279713002: Make PassphraseType a "enum class" instead of "enum". (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix java Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/sync/core_impl/sync_encryption_handler_impl_unittest.cc
diff --git a/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc b/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc
index 4d02a431f56c3ae1d5372a0dc0652e75be576c4f..6aa3139ec0f36329529535531d6cff9dc40186d5 100644
--- a/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc
+++ b/components/sync/core_impl/sync_encryption_handler_impl_unittest.cc
@@ -154,11 +154,11 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
else
EXPECT_TRUE(nigori.has_keystore_migration_time());
EXPECT_TRUE(nigori.keybag_is_frozen());
- if (passphrase_type == CUSTOM_PASSPHRASE ||
- passphrase_type == FROZEN_IMPLICIT_PASSPHRASE) {
+ if (passphrase_type == PassphraseType::CUSTOM_PASSPHRASE ||
+ passphrase_type == PassphraseType::FROZEN_IMPLICIT_PASSPHRASE) {
EXPECT_TRUE(nigori.encrypt_everything());
EXPECT_TRUE(nigori.keystore_decryptor_token().blob().empty());
- if (passphrase_type == CUSTOM_PASSPHRASE) {
+ if (passphrase_type == PassphraseType::CUSTOM_PASSPHRASE) {
EXPECT_EQ(sync_pb::NigoriSpecifics::CUSTOM_PASSPHRASE,
nigori.passphrase_type());
if (!encryption_handler()->custom_passphrase_time().is_null()) {
@@ -194,7 +194,7 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
int64_t migration_time,
const std::string& default_passphrase,
const std::string& keystore_key) {
- DCHECK_NE(passphrase_type, IMPLICIT_PASSPHRASE);
+ DCHECK_NE(passphrase_type, PassphraseType::IMPLICIT_PASSPHRASE);
Cryptographer other_cryptographer(GetCryptographer()->encryptor());
std::string default_key = default_passphrase;
@@ -213,7 +213,7 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
nigori.set_keybag_is_frozen(true);
nigori.set_keystore_migration_time(migration_time);
- if (passphrase_type == KEYSTORE_PASSPHRASE) {
+ if (passphrase_type == PassphraseType::KEYSTORE_PASSPHRASE) {
sync_pb::EncryptedData keystore_decryptor_token;
EXPECT_TRUE(encryption_handler()->GetKeystoreDecryptor(
other_cryptographer, keystore_key, &keystore_decryptor_token));
@@ -223,7 +223,7 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
} else {
nigori.set_encrypt_everything(true);
nigori.set_passphrase_type(
- passphrase_type == CUSTOM_PASSPHRASE
+ passphrase_type == PassphraseType::CUSTOM_PASSPHRASE
? sync_pb::NigoriSpecifics::CUSTOM_PASSPHRASE
: sync_pb::NigoriSpecifics::FROZEN_IMPLICIT_PASSPHRASE);
}
@@ -240,12 +240,13 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
WriteNode nigori_node(&trans);
ASSERT_EQ(nigori_node.InitTypeRoot(NIGORI), BaseNode::INIT_OK);
sync_pb::NigoriSpecifics nigori =
- BuildMigratedNigori(KEYSTORE_PASSPHRASE, migration_time,
- default_passphrase, keystore_key);
+ BuildMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE,
+ migration_time, default_passphrase, keystore_key);
nigori_node.SetNigoriSpecifics(nigori);
}
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(), OnPassphraseTypeChanged(
+ PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(),
OnBootstrapTokenUpdated(_, PASSPHRASE_BOOTSTRAP_TOKEN));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AtLeast(1));
@@ -253,7 +254,8 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
EXPECT_CALL(*observer(), OnEncryptionComplete()).Times(AtLeast(1));
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
Mock::VerifyAndClearExpectations(observer());
}
@@ -266,19 +268,22 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
WriteTransaction trans(FROM_HERE, user_share());
WriteNode nigori_node(&trans);
ASSERT_EQ(nigori_node.InitTypeRoot(NIGORI), BaseNode::INIT_OK);
- sync_pb::NigoriSpecifics nigori = BuildMigratedNigori(
- CUSTOM_PASSPHRASE, migration_time, default_passphrase, kKeystoreKey);
+ sync_pb::NigoriSpecifics nigori =
+ BuildMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, migration_time,
+ default_passphrase, kKeystoreKey);
nigori_node.SetNigoriSpecifics(nigori);
}
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AtLeast(1));
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, true))
.Times(AtLeast(1));
EXPECT_CALL(*observer(), OnEncryptionComplete()).Times(AtLeast(1));
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), CUSTOM_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::CUSTOM_PASSPHRASE);
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
Mock::VerifyAndClearExpectations(observer());
}
@@ -287,7 +292,7 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
// initialize the encryption handler with it.
void InitUnmigratedNigori(const std::string& default_passphrase,
PassphraseType passphrase_type) {
- DCHECK_NE(passphrase_type, FROZEN_IMPLICIT_PASSPHRASE);
+ DCHECK_NE(passphrase_type, PassphraseType::FROZEN_IMPLICIT_PASSPHRASE);
Cryptographer other_cryptographer(GetCryptographer()->encryptor());
KeyParams default_key = {"localhost", "dummy", default_passphrase};
other_cryptographer.AddKey(default_key);
@@ -299,11 +304,12 @@ class SyncEncryptionHandlerImplTest : public ::testing::Test {
ASSERT_EQ(nigori_node.InitTypeRoot(NIGORI), BaseNode::INIT_OK);
sync_pb::NigoriSpecifics nigori;
other_cryptographer.GetKeys(nigori.mutable_encryption_keybag());
- nigori.set_keybag_is_frozen(passphrase_type == CUSTOM_PASSPHRASE);
+ nigori.set_keybag_is_frozen(passphrase_type ==
+ PassphraseType::CUSTOM_PASSPHRASE);
nigori_node.SetNigoriSpecifics(nigori);
}
- if (passphrase_type != IMPLICIT_PASSPHRASE) {
+ if (passphrase_type != PassphraseType::IMPLICIT_PASSPHRASE) {
EXPECT_CALL(*observer(), OnPassphraseTypeChanged(passphrase_type, _));
}
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AtLeast(1));
@@ -621,7 +627,8 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreMigratesAndUpdatesBootstrap) {
EXPECT_CALL(*observer(), OnEncryptionComplete());
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_));
EXPECT_CALL(*observer(), OnPassphraseAccepted());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnBootstrapTokenUpdated(_, KEYSTORE_BOOTSTRAP_TOKEN))
.WillOnce(SaveArg<0>(&keystore_bootstrap));
{
@@ -634,7 +641,7 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreMigratesAndUpdatesBootstrap) {
}
PumpLoop();
EXPECT_TRUE(GetCryptographer()->is_initialized());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kKeystoreKey);
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey);
// Ensure the bootstrap is encoded properly (a base64 encoded encrypted blob
// of list values containing the keystore keys).
@@ -726,15 +733,17 @@ TEST_F(SyncEncryptionHandlerImplTest, MigrateOnDecryptImplicitPass) {
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnPassphraseAccepted());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(),
OnBootstrapTokenUpdated(_, PASSPHRASE_BOOTSTRAP_TOKEN));
EXPECT_CALL(*observer(), OnEncryptionComplete());
EXPECT_FALSE(encryption_handler()->MigratedToKeystore());
encryption_handler()->SetDecryptionPassphrase(kOtherKey);
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(KEYSTORE_PASSPHRASE, encryption_handler()->GetPassphraseType());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kOtherKey);
+ EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kOtherKey);
}
// Test that we don't attempt to migrate while a custom passphrase is pending,
@@ -766,7 +775,8 @@ TEST_F(SyncEncryptionHandlerImplTest, MigrateOnDecryptCustomPass) {
nigori.set_encrypt_everything(false);
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
encryption_handler()->ApplyNigoriUpdate(nigori, trans.GetWrappedTrans());
nigori_node.SetNigoriSpecifics(nigori);
}
@@ -790,17 +800,18 @@ TEST_F(SyncEncryptionHandlerImplTest, MigrateOnDecryptCustomPass) {
encryption_handler()->SetDecryptionPassphrase(kOtherKey);
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
const base::Time migration_time = encryption_handler()->migration_time();
- EXPECT_EQ(CUSTOM_PASSPHRASE, encryption_handler()->GetPassphraseType());
- VerifyMigratedNigori(CUSTOM_PASSPHRASE, kOtherKey);
+ EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
+ VerifyMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, kOtherKey);
- VerifyRestoreAfterCustomPassphrase(TimeToProtoTime(migration_time), kOtherKey,
- captured_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ TimeToProtoTime(migration_time), kOtherKey, captured_bootstrap_token,
+ captured_nigori_state, PassphraseType::CUSTOM_PASSPHRASE);
}
// Test that we trigger a migration when we set the keystore key, had an
// implicit passphrase, and did not have encrypt everything. We should switch
-// to KEYSTORE_PASSPHRASE.
+// to PassphraseType::KEYSTORE_PASSPHRASE.
TEST_F(SyncEncryptionHandlerImplTest, MigrateOnKeystoreKeyAvailableImplicit) {
const char kCurKey[] = "cur";
KeyParams current_key = {"localhost", "dummy", kCurKey};
@@ -820,18 +831,20 @@ TEST_F(SyncEncryptionHandlerImplTest, MigrateOnKeystoreKeyAvailableImplicit) {
encryption_handler()->SetKeystoreKeys(
BuildEncryptionKeyProto(kRawKeystoreKey), trans.GetWrappedTrans());
}
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
// The actual migration gets posted, so run all pending tasks.
PumpLoop();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(KEYSTORE_PASSPHRASE, encryption_handler()->GetPassphraseType());
+ EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kCurKey);
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kCurKey);
}
// Test that we trigger a migration when we set the keystore key, had an
// implicit passphrase, and encrypt everything enabled. We should switch to
-// FROZEN_IMPLICIT_PASSPHRASE.
+// PassphraseType::FROZEN_IMPLICIT_PASSPHRASE.
TEST_F(SyncEncryptionHandlerImplTest,
MigrateOnKeystoreKeyAvailableFrozenImplicit) {
const char kCurKey[] = "cur";
@@ -858,8 +871,8 @@ TEST_F(SyncEncryptionHandlerImplTest,
encryption_handler()->SetKeystoreKeys(
BuildEncryptionKeyProto(kRawKeystoreKey), trans.GetWrappedTrans());
}
- EXPECT_CALL(*observer(),
- OnPassphraseTypeChanged(FROZEN_IMPLICIT_PASSPHRASE, _));
+ EXPECT_CALL(*observer(), OnPassphraseTypeChanged(
+ PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, _));
// The actual migration gets posted, so run all pending tasks.
PumpLoop();
@@ -867,10 +880,10 @@ TEST_F(SyncEncryptionHandlerImplTest,
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
const base::Time migration_time = encryption_handler()->migration_time();
- EXPECT_EQ(FROZEN_IMPLICIT_PASSPHRASE,
+ EXPECT_EQ(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE,
encryption_handler()->GetPassphraseType());
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(FROZEN_IMPLICIT_PASSPHRASE, kCurKey);
+ VerifyMigratedNigori(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, kCurKey);
// We need the passphrase bootstrap token, but OnBootstrapTokenUpdated(_,
// PASSPHRASE_BOOTSTRAP_TOKEN) has not been invoked (because it was invoked
@@ -879,7 +892,7 @@ TEST_F(SyncEncryptionHandlerImplTest,
GetCryptographer()->GetBootstrapToken(&passphrase_bootstrap_token);
VerifyRestoreAfterCustomPassphrase(
TimeToProtoTime(migration_time), kCurKey, passphrase_bootstrap_token,
- captured_nigori_state, FROZEN_IMPLICIT_PASSPHRASE);
+ captured_nigori_state, PassphraseType::FROZEN_IMPLICIT_PASSPHRASE);
}
// Test that we trigger a migration when we set the keystore key, had a
@@ -893,7 +906,8 @@ TEST_F(SyncEncryptionHandlerImplTest,
EXPECT_CALL(*observer(), OnPassphraseAccepted());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, false));
EXPECT_CALL(*observer(), OnEncryptionComplete());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
std::string captured_bootstrap_token;
EXPECT_CALL(*observer(),
OnBootstrapTokenUpdated(_, PASSPHRASE_BOOTSTRAP_TOKEN))
@@ -927,18 +941,20 @@ TEST_F(SyncEncryptionHandlerImplTest,
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
const base::Time migration_time = encryption_handler()->migration_time();
- EXPECT_EQ(CUSTOM_PASSPHRASE, encryption_handler()->GetPassphraseType());
+ EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(CUSTOM_PASSPHRASE, kCurKey);
+ VerifyMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, kCurKey);
- VerifyRestoreAfterCustomPassphrase(TimeToProtoTime(migration_time), kCurKey,
- captured_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ TimeToProtoTime(migration_time), kCurKey, captured_bootstrap_token,
+ captured_nigori_state, PassphraseType::CUSTOM_PASSPHRASE);
}
// Test that we trigger a migration when we set the keystore key, had a
// custom passphrase, and did not have encrypt everything. The passphrase state
-// should remain as CUSTOM_PASSPHRASE, and encrypt everything should be enabled.
+// should remain as PassphraseType::CUSTOM_PASSPHRASE, and encrypt everything
+// should be enabled.
TEST_F(SyncEncryptionHandlerImplTest,
MigrateOnKeystoreKeyAvailableCustomNoEncryption) {
const char kCurKey[] = "cur";
@@ -947,7 +963,8 @@ TEST_F(SyncEncryptionHandlerImplTest,
EXPECT_CALL(*observer(), OnPassphraseAccepted());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, false));
EXPECT_CALL(*observer(), OnEncryptionComplete());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
std::string captured_bootstrap_token;
EXPECT_CALL(*observer(),
OnBootstrapTokenUpdated(_, PASSPHRASE_BOOTSTRAP_TOKEN))
@@ -975,13 +992,14 @@ TEST_F(SyncEncryptionHandlerImplTest,
PumpLoop();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
const base::Time migration_time = encryption_handler()->migration_time();
- EXPECT_EQ(CUSTOM_PASSPHRASE, encryption_handler()->GetPassphraseType());
+ EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(CUSTOM_PASSPHRASE, kCurKey);
+ VerifyMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, kCurKey);
- VerifyRestoreAfterCustomPassphrase(TimeToProtoTime(migration_time), kCurKey,
- captured_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ TimeToProtoTime(migration_time), kCurKey, captured_bootstrap_token,
+ captured_nigori_state, PassphraseType::CUSTOM_PASSPHRASE);
}
// Test that we can handle receiving a migrated nigori node in the
@@ -998,7 +1016,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriKeystorePass) {
other_cryptographer, kKeystoreKey, &keystore_decryptor_token));
EXPECT_FALSE(encryption_handler()->MigratedToKeystore());
EXPECT_FALSE(GetCryptographer()->is_ready());
- EXPECT_NE(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_NE(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
// Now build a nigori node with the generated keystore decryptor token and
// initialize the encryption handler with it. The cryptographer should be
@@ -1020,7 +1039,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriKeystorePass) {
OnBootstrapTokenUpdated(_, PASSPHRASE_BOOTSTRAP_TOKEN));
EXPECT_CALL(*observer(),
OnBootstrapTokenUpdated(_, KEYSTORE_BOOTSTRAP_TOKEN));
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(), OnPassphraseTypeChanged(
+ PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
encryption_handler()->SetKeystoreKeys(
BuildEncryptionKeyProto(kRawKeystoreKey), trans.GetWrappedTrans());
@@ -1033,9 +1053,11 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriKeystorePass) {
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(1, KEYSTORE_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(1, PassphraseType::KEYSTORE_PASSPHRASE,
+ kCurKey);
// Check that the cryptographer still encrypts with the current key.
sync_pb::EncryptedData current_encrypted;
@@ -1052,7 +1074,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriKeystorePass) {
}
// Test that we handle receiving migrated nigori's with
-// FROZEN_IMPLICIT_PASSPHRASE state. We should be in a pending key state until
+// PassphraseType::FROZEN_IMPLICIT_PASSPHRASE state. We should be in a pending
+// key state until
// we supply the pending frozen implicit passphrase key.
TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriFrozenImplicitPass) {
const char kCurKey[] = "cur";
@@ -1072,8 +1095,9 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriFrozenImplicitPass) {
EXPECT_FALSE(encryption_handler()->MigratedToKeystore());
{
- EXPECT_CALL(*observer(),
- OnPassphraseTypeChanged(FROZEN_IMPLICIT_PASSPHRASE, _));
+ EXPECT_CALL(
+ *observer(),
+ OnPassphraseTypeChanged(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, true));
@@ -1095,7 +1119,7 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriFrozenImplicitPass) {
Mock::VerifyAndClearExpectations(observer());
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(FROZEN_IMPLICIT_PASSPHRASE,
+ EXPECT_EQ(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE,
encryption_handler()->GetPassphraseType());
EXPECT_TRUE(GetCryptographer()->has_pending_keys());
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
@@ -1108,7 +1132,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriFrozenImplicitPass) {
encryption_handler()->SetDecryptionPassphrase(kCurKey);
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- VerifyMigratedNigoriWithTimestamp(1, FROZEN_IMPLICIT_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(
+ 1, PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, kCurKey);
// Check that the cryptographer still encrypts with the current key.
sync_pb::EncryptedData current_encrypted;
@@ -1125,7 +1150,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriFrozenImplicitPass) {
}
// Test that we handle receiving migrated nigori's with
-// CUSTOM_PASSPHRASE state. We should be in a pending key state until we
+// PassphraseType::CUSTOM_PASSPHRASE state. We should be in a pending key state
+// until we
// provide the custom passphrase key.
TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriCustomPass) {
const char kCurKey[] = "cur";
@@ -1145,7 +1171,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriCustomPass) {
EXPECT_FALSE(encryption_handler()->MigratedToKeystore());
{
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, true));
@@ -1166,7 +1193,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriCustomPass) {
Mock::VerifyAndClearExpectations(observer());
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(CUSTOM_PASSPHRASE, encryption_handler()->GetPassphraseType());
+ EXPECT_EQ(PassphraseType::CUSTOM_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
EXPECT_TRUE(GetCryptographer()->has_pending_keys());
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
@@ -1178,7 +1206,8 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriCustomPass) {
encryption_handler()->SetDecryptionPassphrase(kCurKey);
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- VerifyMigratedNigoriWithTimestamp(1, CUSTOM_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(1, PassphraseType::CUSTOM_PASSPHRASE,
+ kCurKey);
// Check that the cryptographer still encrypts with the current key.
sync_pb::EncryptedData current_encrypted;
@@ -1221,16 +1250,19 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveUnmigratedNigoriAfterMigration) {
nigori_node.SetNigoriSpecifics(nigori);
}
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, true)).Times(2);
EXPECT_CALL(*observer(), OnEncryptionComplete());
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), CUSTOM_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::CUSTOM_PASSPHRASE);
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(migration_time, CUSTOM_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(migration_time,
+ PassphraseType::CUSTOM_PASSPHRASE, kCurKey);
{
EXPECT_CALL(*observer(),
@@ -1266,18 +1298,20 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveUnmigratedNigoriAfterMigration) {
// Verify we're still migrated and have proper encryption state.
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), CUSTOM_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::CUSTOM_PASSPHRASE);
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(1, CUSTOM_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(1, PassphraseType::CUSTOM_PASSPHRASE,
+ kCurKey);
// We need the passphrase bootstrap token, but OnBootstrapTokenUpdated(_,
// PASSPHRASE_BOOTSTRAP_TOKEN) has not been invoked (because it was invoked
// during a previous instance) so get it from the Cryptographer.
std::string passphrase_bootstrap_token;
GetCryptographer()->GetBootstrapToken(&passphrase_bootstrap_token);
- VerifyRestoreAfterCustomPassphrase(migration_time, kCurKey,
- passphrase_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ migration_time, kCurKey, passphrase_bootstrap_token,
+ captured_nigori_state, PassphraseType::CUSTOM_PASSPHRASE);
}
// Test that if we have a migrated nigori with a custom passphrase, then receive
@@ -1306,16 +1340,19 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveOldMigratedNigori) {
nigori_node.SetNigoriSpecifics(nigori);
}
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, true)).Times(2);
EXPECT_CALL(*observer(), OnEncryptionComplete());
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), CUSTOM_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::CUSTOM_PASSPHRASE);
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(1, CUSTOM_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(1, PassphraseType::CUSTOM_PASSPHRASE,
+ kCurKey);
{
EXPECT_CALL(*observer(),
@@ -1357,18 +1394,20 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveOldMigratedNigori) {
// Verify we're still migrated and have proper encryption state.
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), CUSTOM_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::CUSTOM_PASSPHRASE);
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(migration_time, CUSTOM_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(migration_time,
+ PassphraseType::CUSTOM_PASSPHRASE, kCurKey);
// We need the passphrase bootstrap token, but OnBootstrapTokenUpdated(_,
// PASSPHRASE_BOOTSTRAP_TOKEN) has not been invoked (because it was invoked
// during a previous instance) so get it from the Cryptographer.
std::string passphrase_bootstrap_token;
GetCryptographer()->GetBootstrapToken(&passphrase_bootstrap_token);
- VerifyRestoreAfterCustomPassphrase(migration_time, kCurKey,
- passphrase_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ migration_time, kCurKey, passphrase_bootstrap_token,
+ captured_nigori_state, PassphraseType::CUSTOM_PASSPHRASE);
}
// Test that if we receive the keystore key after receiving a migrated nigori
@@ -1384,7 +1423,8 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreAfterReceivingMigratedNigori) {
other_cryptographer, kKeystoreKey, &keystore_decryptor_token));
EXPECT_FALSE(encryption_handler()->MigratedToKeystore());
EXPECT_FALSE(GetCryptographer()->is_ready());
- EXPECT_NE(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_NE(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
// Now build a nigori node with the generated keystore decryptor token and
// initialize the encryption handler with it. The cryptographer should be
@@ -1401,7 +1441,8 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreAfterReceivingMigratedNigori) {
nigori.set_keystore_migration_time(1);
nigori.set_passphrase_type(sync_pb::NigoriSpecifics::KEYSTORE_PASSPHRASE);
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(), OnPassphraseTypeChanged(
+ PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
encryption_handler()->ApplyNigoriUpdate(nigori, trans.GetWrappedTrans());
@@ -1411,7 +1452,8 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreAfterReceivingMigratedNigori) {
PumpLoop();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->has_pending_keys());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
Mock::VerifyAndClearExpectations(observer());
@@ -1429,9 +1471,11 @@ TEST_F(SyncEncryptionHandlerImplTest, SetKeystoreAfterReceivingMigratedNigori) {
PumpLoop();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(1, KEYSTORE_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(1, PassphraseType::KEYSTORE_PASSPHRASE,
+ kCurKey);
// Check that the cryptographer still encrypts with the current key.
sync_pb::EncryptedData current_encrypted;
@@ -1483,7 +1527,8 @@ TEST_F(SyncEncryptionHandlerImplTest, SetCustomPassAfterMigration) {
}
EXPECT_CALL(*observer(), OnPassphraseAccepted());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, false));
EXPECT_CALL(*observer(),
@@ -1492,13 +1537,15 @@ TEST_F(SyncEncryptionHandlerImplTest, SetCustomPassAfterMigration) {
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
Mock::VerifyAndClearExpectations(observer());
const char kNewKey[] = "new_key";
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
SyncEncryptionHandler::NigoriState captured_nigori_state;
EXPECT_CALL(*observer(), OnLocalSetPassphraseEncryption(_))
.WillOnce(testing::SaveArg<0>(&captured_nigori_state));
@@ -1515,10 +1562,12 @@ TEST_F(SyncEncryptionHandlerImplTest, SetCustomPassAfterMigration) {
EXPECT_FALSE(captured_bootstrap_token.empty());
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), CUSTOM_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::CUSTOM_PASSPHRASE);
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
EXPECT_FALSE(encryption_handler()->custom_passphrase_time().is_null());
- VerifyMigratedNigoriWithTimestamp(migration_time, CUSTOM_PASSPHRASE, kNewKey);
+ VerifyMigratedNigoriWithTimestamp(migration_time,
+ PassphraseType::CUSTOM_PASSPHRASE, kNewKey);
// Check that the cryptographer can decrypt the old key.
sync_pb::EncryptedData old_encrypted;
@@ -1543,9 +1592,9 @@ TEST_F(SyncEncryptionHandlerImplTest, SetCustomPassAfterMigration) {
// Now verify that we can restore the current state using the captured
// bootstrap token and nigori state.
- VerifyRestoreAfterCustomPassphrase(migration_time, kNewKey,
- captured_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ migration_time, kNewKey, captured_bootstrap_token, captured_nigori_state,
+ PassphraseType::CUSTOM_PASSPHRASE);
}
// Test that if a client without a keystore key (e.g. one without keystore
@@ -1584,13 +1633,15 @@ TEST_F(SyncEncryptionHandlerImplTest,
}
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, false));
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->has_pending_keys());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
Mock::VerifyAndClearExpectations(observer());
@@ -1606,7 +1657,8 @@ TEST_F(SyncEncryptionHandlerImplTest,
const char kNewKey[] = "new_key";
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(CUSTOM_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::CUSTOM_PASSPHRASE, _));
SyncEncryptionHandler::NigoriState captured_nigori_state;
EXPECT_CALL(*observer(), OnLocalSetPassphraseEncryption(_))
.WillOnce(testing::SaveArg<0>(&captured_nigori_state));
@@ -1620,10 +1672,12 @@ TEST_F(SyncEncryptionHandlerImplTest,
encryption_handler()->SetEncryptionPassphrase(kNewKey, true);
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), CUSTOM_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::CUSTOM_PASSPHRASE);
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
EXPECT_FALSE(encryption_handler()->custom_passphrase_time().is_null());
- VerifyMigratedNigoriWithTimestamp(migration_time, CUSTOM_PASSPHRASE, kNewKey);
+ VerifyMigratedNigoriWithTimestamp(migration_time,
+ PassphraseType::CUSTOM_PASSPHRASE, kNewKey);
// Check that the cryptographer can decrypt the old key.
sync_pb::EncryptedData old_encrypted;
@@ -1648,9 +1702,9 @@ TEST_F(SyncEncryptionHandlerImplTest,
// Now verify that we can restore the current state using the captured
// bootstrap token and nigori state.
- VerifyRestoreAfterCustomPassphrase(migration_time, kNewKey,
- captured_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ migration_time, kNewKey, captured_bootstrap_token, captured_nigori_state,
+ PassphraseType::CUSTOM_PASSPHRASE);
}
// Test that if a client without a keystore key (e.g. one without keystore
@@ -1688,13 +1742,15 @@ TEST_F(SyncEncryptionHandlerImplTest,
}
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, false));
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->has_pending_keys());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
Mock::VerifyAndClearExpectations(observer());
@@ -1713,9 +1769,11 @@ TEST_F(SyncEncryptionHandlerImplTest,
encryption_handler()->SetEncryptionPassphrase(kNewKey, false);
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(1, KEYSTORE_PASSPHRASE, kOldKey);
+ VerifyMigratedNigoriWithTimestamp(1, PassphraseType::KEYSTORE_PASSPHRASE,
+ kOldKey);
// Check that the cryptographer can decrypt the old key.
sync_pb::EncryptedData old_encrypted;
@@ -1774,13 +1832,15 @@ TEST_F(SyncEncryptionHandlerImplTest,
nigori_node.SetNigoriSpecifics(nigori);
}
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, false));
encryption_handler()->Init();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->has_pending_keys());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
Mock::VerifyAndClearExpectations(observer());
@@ -1794,8 +1854,8 @@ TEST_F(SyncEncryptionHandlerImplTest,
encryption_handler()->SetDecryptionPassphrase(kCurKey);
Mock::VerifyAndClearExpectations(observer());
- EXPECT_CALL(*observer(),
- OnPassphraseTypeChanged(FROZEN_IMPLICIT_PASSPHRASE, _));
+ EXPECT_CALL(*observer(), OnPassphraseTypeChanged(
+ PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, _));
EXPECT_CALL(*observer(), OnEncryptionComplete());
EXPECT_CALL(*observer(), OnEncryptedTypesChanged(_, true));
SyncEncryptionHandler::NigoriState captured_nigori_state;
@@ -1807,10 +1867,11 @@ TEST_F(SyncEncryptionHandlerImplTest,
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(FROZEN_IMPLICIT_PASSPHRASE,
+ EXPECT_EQ(PassphraseType::FROZEN_IMPLICIT_PASSPHRASE,
encryption_handler()->GetPassphraseType());
EXPECT_TRUE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigoriWithTimestamp(1, FROZEN_IMPLICIT_PASSPHRASE, kCurKey);
+ VerifyMigratedNigoriWithTimestamp(
+ 1, PassphraseType::FROZEN_IMPLICIT_PASSPHRASE, kCurKey);
// Check that the cryptographer is encrypting using the frozen current key.
sync_pb::EncryptedData current_encrypted;
@@ -1827,10 +1888,10 @@ TEST_F(SyncEncryptionHandlerImplTest,
VerifyRestoreAfterCustomPassphrase(
migration_time, kCurKey, captured_bootstrap_token, captured_nigori_state,
- FROZEN_IMPLICIT_PASSPHRASE);
+ PassphraseType::FROZEN_IMPLICIT_PASSPHRASE);
}
-// If we receive a nigori migrated and with a KEYSTORE_PASSPHRASE type, but
+// If we receive a nigori migrated and with a KEYSTORE_PASSPHRASE type, but
// using an old default key (i.e. old GAIA password), we should overwrite the
// nigori, updating the keybag and keystore decryptor.
TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriWithOldPassphrase) {
@@ -1860,12 +1921,14 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriWithOldPassphrase) {
encryption_handler()->SetKeystoreKeys(
BuildEncryptionKeyProto(kRawKeystoreKey), trans.GetWrappedTrans());
}
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
PumpLoop();
Mock::VerifyAndClearExpectations(observer());
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kCurKey);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kCurKey);
// Now build an old keystore passphrase nigori node.
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
@@ -1893,9 +1956,10 @@ TEST_F(SyncEncryptionHandlerImplTest, ReceiveMigratedNigoriWithOldPassphrase) {
// Verify we're still migrated and have proper encryption state.
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kCurKey);
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kCurKey);
}
// Trigger a key rotation upon receiving new keys if we already had a keystore
@@ -1947,9 +2011,10 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysGaiaDefault) {
// key (instead of the old gaia key).
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kKeystoreKey);
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey);
}
// Trigger a key rotation upon receiving new keys if we already had a keystore
@@ -1999,9 +2064,10 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysKeystoreDefault) {
// key (instead of the old gaia key).
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kKeystoreKey);
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey);
}
// Trigger a key rotation upon when a pending gaia passphrase is resolved.
@@ -2010,7 +2076,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysAfterPendingGaiaResolved) {
const char kRawOldKeystoreKey[] = "old_keystore_key";
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- InitUnmigratedNigori(kOldGaiaKey, IMPLICIT_PASSPHRASE);
+ InitUnmigratedNigori(kOldGaiaKey, PassphraseType::IMPLICIT_PASSPHRASE);
{
// Pass multiple keystore keys, signaling a rotation has happened.
@@ -2028,15 +2094,17 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysAfterPendingGaiaResolved) {
// Resolve the pending keys. This should trigger the key rotation.
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnPassphraseAccepted());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(),
OnBootstrapTokenUpdated(_, PASSPHRASE_BOOTSTRAP_TOKEN));
EXPECT_CALL(*observer(), OnEncryptionComplete()).Times(AtLeast(1));
EXPECT_FALSE(encryption_handler()->MigratedToKeystore());
encryption_handler()->SetDecryptionPassphrase(kOldGaiaKey);
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(KEYSTORE_PASSPHRASE, encryption_handler()->GetPassphraseType());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kKeystoreKey);
+ EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey);
}
// When signing in for the first time, make sure we can rotate keys if we
@@ -2076,9 +2144,10 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysGaiaDefaultOnInit) {
// key (instead of the old gaia key).
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
EXPECT_TRUE(GetCryptographer()->is_ready());
- EXPECT_EQ(encryption_handler()->GetPassphraseType(), KEYSTORE_PASSPHRASE);
+ EXPECT_EQ(encryption_handler()->GetPassphraseType(),
+ PassphraseType::KEYSTORE_PASSPHRASE);
EXPECT_FALSE(encryption_handler()->IsEncryptEverythingEnabled());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kKeystoreKey);
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey);
}
// Trigger a key rotation when a migrated nigori (with an old keystore key) is
@@ -2090,7 +2159,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysWhenMigratedNigoriArrives) {
base::Base64Encode(kRawOldKeystoreKey, &old_keystore_key);
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- InitUnmigratedNigori(kOldGaiaKey, IMPLICIT_PASSPHRASE);
+ InitUnmigratedNigori(kOldGaiaKey, PassphraseType::IMPLICIT_PASSPHRASE);
{
// Pass multiple keystore keys, signaling a rotation has happened.
@@ -2109,13 +2178,14 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysWhenMigratedNigoriArrives) {
// keys were rotated, and hence still encrypt with the old gaia key.
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnPassphraseAccepted());
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
EXPECT_CALL(*observer(),
OnBootstrapTokenUpdated(_, PASSPHRASE_BOOTSTRAP_TOKEN));
EXPECT_CALL(*observer(), OnEncryptionComplete()).Times(AtLeast(1));
{
sync_pb::NigoriSpecifics nigori = BuildMigratedNigori(
- KEYSTORE_PASSPHRASE, 1, kOldGaiaKey, old_keystore_key);
+ PassphraseType::KEYSTORE_PASSPHRASE, 1, kOldGaiaKey, old_keystore_key);
// Update the encryption handler.
WriteTransaction trans(FROM_HERE, user_share());
encryption_handler()->ApplyNigoriUpdate(nigori, trans.GetWrappedTrans());
@@ -2124,8 +2194,9 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysWhenMigratedNigoriArrives) {
PumpLoop();
EXPECT_TRUE(encryption_handler()->MigratedToKeystore());
- EXPECT_EQ(KEYSTORE_PASSPHRASE, encryption_handler()->GetPassphraseType());
- VerifyMigratedNigori(KEYSTORE_PASSPHRASE, kKeystoreKey);
+ EXPECT_EQ(PassphraseType::KEYSTORE_PASSPHRASE,
+ encryption_handler()->GetPassphraseType());
+ VerifyMigratedNigori(PassphraseType::KEYSTORE_PASSPHRASE, kKeystoreKey);
}
// Verify that performing a migration while having more than one keystore key
@@ -2135,7 +2206,7 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysUnmigratedCustomPassphrase) {
const char kRawOldKeystoreKey[] = "old_keystore_key";
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- InitUnmigratedNigori(kCustomPass, CUSTOM_PASSPHRASE);
+ InitUnmigratedNigori(kCustomPass, PassphraseType::CUSTOM_PASSPHRASE);
{
// Pass multiple keystore keys, signaling a rotation has happened.
@@ -2166,12 +2237,12 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysUnmigratedCustomPassphrase) {
encryption_handler()->SetDecryptionPassphrase(kCustomPass);
Mock::VerifyAndClearExpectations(observer());
- VerifyMigratedNigori(CUSTOM_PASSPHRASE, kCustomPass);
+ VerifyMigratedNigori(PassphraseType::CUSTOM_PASSPHRASE, kCustomPass);
const base::Time migration_time = encryption_handler()->migration_time();
- VerifyRestoreAfterCustomPassphrase(TimeToProtoTime(migration_time),
- kCustomPass, captured_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ TimeToProtoTime(migration_time), kCustomPass, captured_bootstrap_token,
+ captured_nigori_state, PassphraseType::CUSTOM_PASSPHRASE);
}
// Verify that a key rotation done after we've migrated a custom passphrase
@@ -2185,8 +2256,8 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysMigratedCustomPassphrase) {
const int64_t migration_time = 1;
InitCustomPassMigratedNigori(migration_time, kCustomPass);
- VerifyMigratedNigoriWithTimestamp(migration_time, CUSTOM_PASSPHRASE,
- kCustomPass);
+ VerifyMigratedNigoriWithTimestamp(
+ migration_time, PassphraseType::CUSTOM_PASSPHRASE, kCustomPass);
SyncEncryptionHandler::NigoriState captured_nigori_state;
{
@@ -2205,17 +2276,17 @@ TEST_F(SyncEncryptionHandlerImplTest, RotateKeysMigratedCustomPassphrase) {
PumpLoop();
Mock::VerifyAndClearExpectations(observer());
- VerifyMigratedNigoriWithTimestamp(migration_time, CUSTOM_PASSPHRASE,
- kCustomPass);
+ VerifyMigratedNigoriWithTimestamp(
+ migration_time, PassphraseType::CUSTOM_PASSPHRASE, kCustomPass);
// We need the passphrase bootstrap token, but OnBootstrapTokenUpdated(_,
// PASSPHRASE_BOOTSTRAP_TOKEN) has not been invoked (because it was invoked
// during a previous instance) so get it from the Cryptographer.
std::string passphrase_bootstrap_token;
GetCryptographer()->GetBootstrapToken(&passphrase_bootstrap_token);
- VerifyRestoreAfterCustomPassphrase(migration_time, kCustomPass,
- passphrase_bootstrap_token,
- captured_nigori_state, CUSTOM_PASSPHRASE);
+ VerifyRestoreAfterCustomPassphrase(
+ migration_time, kCustomPass, passphrase_bootstrap_token,
+ captured_nigori_state, PassphraseType::CUSTOM_PASSPHRASE);
}
// Verify that the client can gracefully handle a nigori node that is missing
@@ -2232,10 +2303,11 @@ TEST_F(SyncEncryptionHandlerImplTest, MissingKeystoreMigrationTime) {
// should switch to keystore passphrase.
EXPECT_CALL(*observer(), OnCryptographerStateChanged(_)).Times(AnyNumber());
EXPECT_CALL(*observer(), OnPassphraseRequired(_, _));
- EXPECT_CALL(*observer(), OnPassphraseTypeChanged(KEYSTORE_PASSPHRASE, _));
+ EXPECT_CALL(*observer(),
+ OnPassphraseTypeChanged(PassphraseType::KEYSTORE_PASSPHRASE, _));
{
- sync_pb::NigoriSpecifics nigori =
- BuildMigratedNigori(KEYSTORE_PASSPHRASE, 1, kKeystoreKey, kKeystoreKey);
+ sync_pb::NigoriSpecifics nigori = BuildMigratedNigori(
+ PassphraseType::KEYSTORE_PASSPHRASE, 1, kKeystoreKey, kKeystoreKey);
nigori.clear_keystore_migration_time();
// Update the encryption handler.
WriteTransaction trans(FROM_HERE, user_share());
« no previous file with comments | « components/sync/core_impl/sync_encryption_handler_impl.cc ('k') | components/sync/core_impl/sync_manager_impl_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698