Index: chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api_unittest.cc |
diff --git a/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api_unittest.cc b/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api_unittest.cc |
index f592549db30107a3275382a81a9c3492793c211c..c4698745e40775ea0ed73ebebb36c45c40dc2c23 100644 |
--- a/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api_unittest.cc |
+++ b/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api_unittest.cc |
@@ -38,6 +38,7 @@ namespace { |
void DoesKeyExistCallbackTrue( |
chromeos::attestation::AttestationKeyType key_type, |
+ const std::string& user_id, |
const std::string& key_name, |
const chromeos::BoolDBusMethodCallback& callback) { |
callback.Run(chromeos::DBUS_METHOD_CALL_SUCCESS, true); |
@@ -45,6 +46,7 @@ void DoesKeyExistCallbackTrue( |
void DoesKeyExistCallbackFalse( |
chromeos::attestation::AttestationKeyType key_type, |
+ const std::string& user_id, |
const std::string& key_name, |
const chromeos::BoolDBusMethodCallback& callback) { |
callback.Run(chromeos::DBUS_METHOD_CALL_SUCCESS, false); |
@@ -52,6 +54,7 @@ void DoesKeyExistCallbackFalse( |
void DoesKeyExistCallbackFailed( |
chromeos::attestation::AttestationKeyType key_type, |
+ const std::string& user_id, |
const std::string& key_name, |
const chromeos::BoolDBusMethodCallback& callback) { |
callback.Run(chromeos::DBUS_METHOD_CALL_FAILURE, false); |
@@ -59,6 +62,7 @@ void DoesKeyExistCallbackFailed( |
void RegisterKeyCallbackTrue( |
chromeos::attestation::AttestationKeyType key_type, |
+ const std::string& user_id, |
const std::string& key_name, |
const cryptohome::AsyncMethodCaller::Callback& callback) { |
callback.Run(true, cryptohome::MOUNT_ERROR_NONE); |
@@ -66,6 +70,7 @@ void RegisterKeyCallbackTrue( |
void RegisterKeyCallbackFalse( |
chromeos::attestation::AttestationKeyType key_type, |
+ const std::string& user_id, |
const std::string& key_name, |
const cryptohome::AsyncMethodCaller::Callback& callback) { |
callback.Run(false, cryptohome::MOUNT_ERROR_NONE); |
@@ -73,6 +78,7 @@ void RegisterKeyCallbackFalse( |
void SignChallengeCallbackTrue( |
chromeos::attestation::AttestationKeyType key_type, |
+ const std::string& user_id, |
const std::string& key_name, |
const std::string& domain, |
const std::string& device_id, |
@@ -84,6 +90,7 @@ void SignChallengeCallbackTrue( |
void SignChallengeCallbackFalse( |
chromeos::attestation::AttestationKeyType key_type, |
+ const std::string& user_id, |
const std::string& key_name, |
const std::string& domain, |
const std::string& device_id, |
@@ -95,7 +102,7 @@ void SignChallengeCallbackFalse( |
void GetCertificateCallbackTrue( |
chromeos::attestation::AttestationCertificateProfile certificate_profile, |
- const std::string& user_email, |
+ const std::string& user_id, |
const std::string& request_origin, |
bool force_new_key, |
const chromeos::attestation::AttestationFlow::CertificateCallback& |
@@ -105,7 +112,7 @@ void GetCertificateCallbackTrue( |
void GetCertificateCallbackFalse( |
chromeos::attestation::AttestationCertificateProfile certificate_profile, |
- const std::string& user_email, |
+ const std::string& user_id, |
const std::string& request_origin, |
bool force_new_key, |
const chromeos::attestation::AttestationFlow::CertificateCallback& |
@@ -118,12 +125,12 @@ class EPKPChallengeKeyTestBase : public BrowserWithTestWindowTest { |
EPKPChallengeKeyTestBase() |
: extension_(utils::CreateEmptyExtension("")) { |
// Set up the default behavior of mocks. |
- ON_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _)) |
+ ON_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _, _)) |
.WillByDefault(Invoke(DoesKeyExistCallbackFalse)); |
- ON_CALL(mock_async_method_caller_, TpmAttestationRegisterKey(_, _, _)) |
+ ON_CALL(mock_async_method_caller_, TpmAttestationRegisterKey(_, _, _, _)) |
.WillByDefault(Invoke(RegisterKeyCallbackTrue)); |
ON_CALL(mock_async_method_caller_, |
- TpmAttestationSignEnterpriseChallenge(_, _, _, _, _, _, _)) |
+ TpmAttestationSignEnterpriseChallenge(_, _, _, _, _, _, _, _)) |
.WillByDefault(Invoke(SignChallengeCallbackTrue)); |
ON_CALL(mock_attestation_flow_, GetCertificate(_, _, _, _, _)) |
.WillByDefault(Invoke(GetCertificateCallbackTrue)); |
@@ -231,7 +238,7 @@ TEST_F(EPKPChallengeMachineKeyTest, DevicePolicyDisabled) { |
} |
TEST_F(EPKPChallengeMachineKeyTest, DoesKeyExistDbusFailed) { |
- EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _)) |
+ EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _, _)) |
.WillRepeatedly(Invoke(DoesKeyExistCallbackFailed)); |
EXPECT_EQ(base::StringPrintf( |
@@ -250,7 +257,7 @@ TEST_F(EPKPChallengeMachineKeyTest, GetCertificateFailed) { |
TEST_F(EPKPChallengeMachineKeyTest, SignChallengeFailed) { |
EXPECT_CALL(mock_async_method_caller_, |
- TpmAttestationSignEnterpriseChallenge(_, _, _, _, _, _, _)) |
+ TpmAttestationSignEnterpriseChallenge(_, _, _, _, _, _, _, _)) |
.WillRepeatedly(Invoke(SignChallengeCallbackFalse)); |
EXPECT_EQ(EPKPChallengeKeyBase::kSignChallengeFailedError, |
@@ -258,7 +265,7 @@ TEST_F(EPKPChallengeMachineKeyTest, SignChallengeFailed) { |
} |
TEST_F(EPKPChallengeMachineKeyTest, KeyExists) { |
- EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _)) |
+ EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _, _)) |
.WillRepeatedly(Invoke(DoesKeyExistCallbackTrue)); |
// GetCertificate must not be called if the key exists. |
EXPECT_CALL(mock_attestation_flow_, GetCertificate(_, _, _, _, _)) |
@@ -277,7 +284,7 @@ TEST_F(EPKPChallengeMachineKeyTest, Success) { |
// SignEnterpriseChallenge must be called exactly once. |
EXPECT_CALL(mock_async_method_caller_, |
TpmAttestationSignEnterpriseChallenge( |
- chromeos::attestation::KEY_DEVICE, "attest-ent-machine", |
+ chromeos::attestation::KEY_DEVICE, "", "attest-ent-machine", |
"google.com", "device_id", _, "challenge", _)) |
.Times(1); |
@@ -351,7 +358,7 @@ TEST_F(EPKPChallengeUserKeyTest, DevicePolicyDisabled) { |
} |
TEST_F(EPKPChallengeUserKeyTest, DoesKeyExistDbusFailed) { |
- EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _)) |
+ EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _, _)) |
.WillRepeatedly(Invoke(DoesKeyExistCallbackFailed)); |
EXPECT_EQ(base::StringPrintf( |
@@ -370,7 +377,7 @@ TEST_F(EPKPChallengeUserKeyTest, GetCertificateFailed) { |
TEST_F(EPKPChallengeUserKeyTest, SignChallengeFailed) { |
EXPECT_CALL(mock_async_method_caller_, |
- TpmAttestationSignEnterpriseChallenge(_, _, _, _, _, _, _)) |
+ TpmAttestationSignEnterpriseChallenge(_, _, _, _, _, _, _, _)) |
.WillRepeatedly(Invoke(SignChallengeCallbackFalse)); |
EXPECT_EQ(EPKPChallengeKeyBase::kSignChallengeFailedError, |
@@ -378,7 +385,7 @@ TEST_F(EPKPChallengeUserKeyTest, SignChallengeFailed) { |
} |
TEST_F(EPKPChallengeUserKeyTest, KeyRegistrationFailed) { |
- EXPECT_CALL(mock_async_method_caller_, TpmAttestationRegisterKey(_, _, _)) |
+ EXPECT_CALL(mock_async_method_caller_, TpmAttestationRegisterKey(_, _, _, _)) |
.WillRepeatedly(Invoke(RegisterKeyCallbackFalse)); |
EXPECT_EQ(EPKPChallengeUserKey::kKeyRegistrationFailedError, |
@@ -386,7 +393,7 @@ TEST_F(EPKPChallengeUserKeyTest, KeyRegistrationFailed) { |
} |
TEST_F(EPKPChallengeUserKeyTest, KeyExists) { |
- EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _)) |
+ EXPECT_CALL(mock_cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _, _)) |
.WillRepeatedly(Invoke(DoesKeyExistCallbackTrue)); |
// GetCertificate must not be called if the key exists. |
EXPECT_CALL(mock_attestation_flow_, GetCertificate(_, _, _, _, _)) |
@@ -396,7 +403,7 @@ TEST_F(EPKPChallengeUserKeyTest, KeyExists) { |
} |
TEST_F(EPKPChallengeUserKeyTest, KeyNotRegistered) { |
- EXPECT_CALL(mock_async_method_caller_, TpmAttestationRegisterKey(_, _, _)) |
+ EXPECT_CALL(mock_async_method_caller_, TpmAttestationRegisterKey(_, _, _, _)) |
.Times(0); |
EXPECT_TRUE(utils::RunFunction( |
@@ -421,12 +428,14 @@ TEST_F(EPKPChallengeUserKeyTest, Success) { |
// SignEnterpriseChallenge must be called exactly once. |
EXPECT_CALL(mock_async_method_caller_, |
TpmAttestationSignEnterpriseChallenge( |
- chromeos::attestation::KEY_USER, "attest-ent-user", |
- "test@google.com", "device_id", _, "challenge", _)) |
+ chromeos::attestation::KEY_USER, "test@google.com", |
+ "attest-ent-user", "test@google.com", "device_id", _, |
+ "challenge", _)) |
.Times(1); |
// RegisterKey must be called exactly once. |
EXPECT_CALL(mock_async_method_caller_, |
TpmAttestationRegisterKey(chromeos::attestation::KEY_USER, |
+ "test@google.com", |
"attest-ent-user", _)) |
.Times(1); |