| Index: chrome/browser/password_manager/password_store_mac_unittest.cc
|
| diff --git a/chrome/browser/password_manager/password_store_mac_unittest.cc b/chrome/browser/password_manager/password_store_mac_unittest.cc
|
| index 174a6ed0dbf48c760b9dede17607a7c6f2b198a3..e2ada527138d3cc5e115916c566ff41a35ffa92a 100644
|
| --- a/chrome/browser/password_manager/password_store_mac_unittest.cc
|
| +++ b/chrome/browser/password_manager/password_store_mac_unittest.cc
|
| @@ -502,15 +502,7 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainExactSearch) {
|
| scoped_ptr<PasswordForm> base_form(CreatePasswordFormFromData(
|
| base_form_data[i]));
|
| EXPECT_TRUE(keychain_adapter.HasPasswordsMergeableWithForm(*base_form));
|
| - PasswordForm* match =
|
| - keychain_adapter.PasswordExactlyMatchingForm(*base_form);
|
| - EXPECT_TRUE(match != NULL);
|
| - if (match) {
|
| - EXPECT_EQ(base_form->scheme, match->scheme);
|
| - EXPECT_EQ(base_form->origin, match->origin);
|
| - EXPECT_EQ(base_form->username_value, match->username_value);
|
| - delete match;
|
| - }
|
| + EXPECT_TRUE(keychain_adapter.HasPasswordExactlyMatchingForm(*base_form));
|
|
|
| // Make sure that the matching isn't looser than it should be by checking
|
| // that slightly altered forms don't match.
|
| @@ -538,10 +530,10 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainExactSearch) {
|
| }
|
|
|
| for (unsigned int j = 0; j < modified_forms.size(); ++j) {
|
| - PasswordForm* match =
|
| - keychain_adapter.PasswordExactlyMatchingForm(*modified_forms[j]);
|
| - EXPECT_EQ(NULL, match) << "In modified version " << j << " of base form "
|
| - << i;
|
| + bool match = keychain_adapter.HasPasswordExactlyMatchingForm(
|
| + *modified_forms[j]);
|
| + EXPECT_FALSE(match) << "In modified version " << j
|
| + << " of base form " << i;
|
| }
|
| STLDeleteElements(&modified_forms);
|
| }
|
| @@ -589,14 +581,8 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainAdd) {
|
| if (add_succeeded) {
|
| EXPECT_TRUE(owned_keychain_adapter.HasPasswordsMergeableWithForm(
|
| *in_form));
|
| - scoped_ptr<PasswordForm> out_form(
|
| - owned_keychain_adapter.PasswordExactlyMatchingForm(*in_form));
|
| - EXPECT_TRUE(out_form.get() != NULL);
|
| - EXPECT_EQ(out_form->scheme, in_form->scheme);
|
| - EXPECT_EQ(out_form->signon_realm, in_form->signon_realm);
|
| - EXPECT_EQ(out_form->origin, in_form->origin);
|
| - EXPECT_EQ(out_form->username_value, in_form->username_value);
|
| - EXPECT_EQ(out_form->password_value, in_form->password_value);
|
| + EXPECT_TRUE(owned_keychain_adapter.HasPasswordExactlyMatchingForm(
|
| + *in_form));
|
| }
|
| }
|
|
|
| @@ -651,11 +637,8 @@ TEST_F(PasswordStoreMacInternalsTest, TestKeychainRemove) {
|
| owned_keychain_adapter.RemovePassword(*form));
|
|
|
| MacKeychainPasswordFormAdapter keychain_adapter(keychain_);
|
| - PasswordForm* match = keychain_adapter.PasswordExactlyMatchingForm(*form);
|
| - EXPECT_EQ(test_data[i].should_succeed, match == NULL);
|
| - if (match) {
|
| - delete match;
|
| - }
|
| + bool match = keychain_adapter.HasPasswordExactlyMatchingForm(*form);
|
| + EXPECT_EQ(test_data[i].should_succeed, !match);
|
| }
|
| }
|
|
|
|
|