Index: chromeos/cryptohome/homedir_methods_unittest.cc |
diff --git a/chromeos/cryptohome/homedir_methods_unittest.cc b/chromeos/cryptohome/homedir_methods_unittest.cc |
index 96a86f406c9dc92e353ef99defba60c0a0ffd8e1..f22fa6266f8ca7734d3cce7a60e553ca656abb21 100644 |
--- a/chromeos/cryptohome/homedir_methods_unittest.cc |
+++ b/chromeos/cryptohome/homedir_methods_unittest.cc |
@@ -55,9 +55,10 @@ class HomedirMethodsTest : public testing::Test { |
void RunProtobufMethodCallback( |
const chromeos::CryptohomeClient::ProtobufMethodCallback& callback); |
- void StoreGetKeyDataExResult(bool success, |
- MountError return_code, |
- ScopedVector<RetrievedKeyData> key_data); |
+ void StoreGetKeyDataExResult( |
+ bool success, |
+ MountError return_code, |
+ const std::vector<KeyDefinition>& key_definitions); |
protected: |
chromeos::MockCryptohomeClient* cryptohome_client_; |
@@ -68,7 +69,7 @@ class HomedirMethodsTest : public testing::Test { |
// The results of the most recent |HomedirMethods| method call. |
bool success_; |
MountError return_code_; |
- ScopedVector<RetrievedKeyData> key_data_; |
+ std::vector<KeyDefinition> key_definitions_; |
private: |
DISALLOW_COPY_AND_ASSIGN(HomedirMethodsTest); |
@@ -106,10 +107,10 @@ void HomedirMethodsTest::RunProtobufMethodCallback( |
void HomedirMethodsTest::StoreGetKeyDataExResult( |
bool success, |
MountError return_code, |
- ScopedVector<RetrievedKeyData> key_data) { |
+ const std::vector<KeyDefinition>& key_definitions) { |
success_ = success; |
return_code_ = return_code; |
- key_data_.swap(key_data); |
+ key_definitions_ = key_definitions; |
} |
// Verifies that the result of a GetKeyDataEx() call is correctly parsed. |
@@ -158,23 +159,23 @@ TEST_F(HomedirMethodsTest, GetKeyDataEx) { |
// Verify that the call was successful and the result was correctly parsed. |
EXPECT_TRUE(success_); |
EXPECT_EQ(MOUNT_ERROR_NONE, return_code_); |
- ASSERT_EQ(1u, key_data_.size()); |
- const RetrievedKeyData* retrieved_key_data = key_data_.front(); |
- EXPECT_EQ(RetrievedKeyData::TYPE_PASSWORD, retrieved_key_data->type); |
+ ASSERT_EQ(1u, key_definitions_.size()); |
+ const KeyDefinition& key_definition = key_definitions_.front(); |
+ EXPECT_EQ(KeyDefinition::TYPE_PASSWORD, key_definition.type); |
EXPECT_EQ(PRIV_MOUNT | PRIV_ADD | PRIV_REMOVE, |
- retrieved_key_data->privileges); |
- EXPECT_EQ(kKeyRevision, retrieved_key_data->revision); |
- ASSERT_EQ(1u, retrieved_key_data->authorization_types.size()); |
- EXPECT_EQ(RetrievedKeyData::AUTHORIZATION_TYPE_HMACSHA256, |
- retrieved_key_data->authorization_types.front()); |
- ASSERT_EQ(2u, retrieved_key_data->provider_data.size()); |
- const RetrievedKeyData::ProviderData* provider_data = |
- retrieved_key_data->provider_data[0]; |
+ key_definition.privileges); |
+ EXPECT_EQ(kKeyRevision, key_definition.revision); |
+ ASSERT_EQ(1u, key_definition.authorization_data.size()); |
+ EXPECT_EQ(KeyDefinition::AuthorizationData::TYPE_HMACSHA256, |
+ key_definition.authorization_data.front().type); |
+ ASSERT_EQ(2u, key_definition.provider_data.size()); |
+ const KeyDefinition::ProviderData* provider_data = |
+ &key_definition.provider_data[0]; |
EXPECT_EQ(kProviderData1Name, provider_data->name); |
ASSERT_TRUE(provider_data->number); |
EXPECT_EQ(kProviderData1Number, *provider_data->number.get()); |
EXPECT_FALSE(provider_data->bytes); |
- provider_data = retrieved_key_data->provider_data[1]; |
+ provider_data = &key_definition.provider_data[1]; |
EXPECT_EQ(kProviderData2Name, provider_data->name); |
EXPECT_FALSE(provider_data->number); |
ASSERT_TRUE(provider_data->bytes); |