| Index: components/password_manager/core/browser/password_form_manager_unittest.cc
|
| diff --git a/components/password_manager/core/browser/password_form_manager_unittest.cc b/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| index a3f89818116dd133acebb4971f5b3905b1fa5548..1e615e07a65e6f50052d74a465a3fc3512a9a30d 100644
|
| --- a/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| +++ b/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| @@ -300,7 +300,7 @@ class PasswordFormManagerTest : public testing::Test {
|
| };
|
|
|
| TEST_F(PasswordFormManagerTest, TestNewLogin) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
| SimulateMatchingPhase(&manager, RESULT_NO_MATCH);
|
|
|
| @@ -362,7 +362,7 @@ TEST_F(PasswordFormManagerTest, TestNewLogin) {
|
| // saving PSL-matched credentials should no longer apply.
|
| TEST_F(PasswordFormManagerTest,
|
| OverriddenPSLMatchedCredentialsNotMarkedAsPSLMatched) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| // The suggestion needs to be PSL-matched.
|
| @@ -425,7 +425,7 @@ TEST_F(PasswordFormManagerTest, TestNewLoginFromNewPasswordElement) {
|
| observed_form()->new_password_element = ASCIIToUTF16("NewPasswd");
|
| observed_form()->username_marked_by_site = true;
|
|
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
| SimulateMatchingPhase(&manager, RESULT_NO_MATCH);
|
|
|
| @@ -463,7 +463,7 @@ TEST_F(PasswordFormManagerTest, TestNewLoginFromNewPasswordElement) {
|
| TEST_F(PasswordFormManagerTest, TestUpdatePassword) {
|
| // Create a PasswordFormManager with observed_form, as if we just
|
| // saw this form and need to find matching logins.
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| SimulateMatchingPhase(&manager, RESULT_MATCH_FOUND);
|
| @@ -512,7 +512,7 @@ TEST_F(PasswordFormManagerTest, TestUpdatePasswordFromNewPasswordElement) {
|
| saved_match()->submit_element.clear();
|
|
|
| TestPasswordManagerClient client_with_store(mock_store());
|
| - PasswordFormManager manager(NULL, &client_with_store,
|
| + PasswordFormManager manager(nullptr, &client_with_store,
|
| client_with_store.driver(), *observed_form(),
|
| false);
|
| SimulateMatchingPhase(&manager, RESULT_MATCH_FOUND);
|
| @@ -554,7 +554,7 @@ TEST_F(PasswordFormManagerTest, TestUpdatePasswordFromNewPasswordElement) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, TestIgnoreResult) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| // Make sure we don't match a PasswordForm if it was originally saved on
|
| @@ -574,7 +574,7 @@ TEST_F(PasswordFormManagerTest, TestIgnoreResult) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, TestEmptyAction) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| saved_match()->action = GURL();
|
| @@ -592,7 +592,7 @@ TEST_F(PasswordFormManagerTest, TestEmptyAction) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, TestUpdateAction) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| SimulateMatchingPhase(&manager, RESULT_MATCH_FOUND);
|
| @@ -611,7 +611,7 @@ TEST_F(PasswordFormManagerTest, TestUpdateAction) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, TestDynamicAction) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| SimulateMatchingPhase(&manager, RESULT_NO_MATCH);
|
| @@ -711,44 +711,47 @@ TEST_F(PasswordFormManagerTest, TestValidForms) {
|
| new_credentials.new_password_value = ASCIIToUTF16("test1new");
|
|
|
| // Form with both username_element and password_element.
|
| - PasswordFormManager manager1(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager1(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager1, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager1.HasValidPasswordForm());
|
|
|
| // Form with username_element, password_element, and new_password_element.
|
| - PasswordFormManager manager2(NULL, NULL, kNoDriver, new_credentials, false);
|
| + PasswordFormManager manager2(nullptr, nullptr, kNoDriver, new_credentials,
|
| + false);
|
| SimulateMatchingPhase(&manager2, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager2.HasValidPasswordForm());
|
|
|
| // Form with username_element and only new_password_element.
|
| new_credentials.password_element.clear();
|
| - PasswordFormManager manager3(NULL, NULL, kNoDriver, new_credentials, false);
|
| + PasswordFormManager manager3(nullptr, nullptr, kNoDriver, new_credentials,
|
| + false);
|
| SimulateMatchingPhase(&manager3, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager3.HasValidPasswordForm());
|
|
|
| // Form without a username_element but with a password_element.
|
| credentials.username_element.clear();
|
| - PasswordFormManager manager4(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager4(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager4, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager4.HasValidPasswordForm());
|
|
|
| // Form without a username_element but with a new_password_element.
|
| new_credentials.username_element.clear();
|
| - PasswordFormManager manager5(NULL, NULL, kNoDriver, new_credentials, false);
|
| + PasswordFormManager manager5(nullptr, nullptr, kNoDriver, new_credentials,
|
| + false);
|
| SimulateMatchingPhase(&manager5, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager5.HasValidPasswordForm());
|
|
|
| // Form without a password_element but with a username_element.
|
| credentials.username_element = saved_match()->username_element;
|
| credentials.password_element.clear();
|
| - PasswordFormManager manager6(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager6(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager6, RESULT_NO_MATCH);
|
| EXPECT_FALSE(manager6.HasValidPasswordForm());
|
|
|
| // Form with neither a password_element nor a username_element.
|
| credentials.username_element.clear();
|
| credentials.password_element.clear();
|
| - PasswordFormManager manager7(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager7(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager7, RESULT_NO_MATCH);
|
| EXPECT_FALSE(manager7.HasValidPasswordForm());
|
| }
|
| @@ -761,27 +764,27 @@ TEST_F(PasswordFormManagerTest, TestValidFormsBasic) {
|
| credentials.password_value = saved_match()->password_value;
|
|
|
| // Form with both username_element and password_element.
|
| - PasswordFormManager manager1(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager1(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager1, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager1.HasValidPasswordForm());
|
|
|
| // Form without a username_element but with a password_element.
|
| credentials.username_element.clear();
|
| - PasswordFormManager manager2(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager2(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager2, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager2.HasValidPasswordForm());
|
|
|
| // Form without a password_element but with a username_element.
|
| credentials.username_element = saved_match()->username_element;
|
| credentials.password_element.clear();
|
| - PasswordFormManager manager3(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager3(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager3, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager3.HasValidPasswordForm());
|
|
|
| // Form with neither a password_element nor a username_element.
|
| credentials.username_element.clear();
|
| credentials.password_element.clear();
|
| - PasswordFormManager manager4(NULL, NULL, kNoDriver, credentials, false);
|
| + PasswordFormManager manager4(nullptr, nullptr, kNoDriver, credentials, false);
|
| SimulateMatchingPhase(&manager4, RESULT_NO_MATCH);
|
| EXPECT_TRUE(manager4.HasValidPasswordForm());
|
| }
|
| @@ -880,7 +883,7 @@ TEST_F(PasswordFormManagerTest, TestForceInclusionOfGeneratedPasswords) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, TestSanitizePossibleUsernames) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
| PasswordForm credentials(*observed_form());
|
| credentials.other_possible_usernames.push_back(ASCIIToUTF16("543-43-1234"));
|
| @@ -1009,7 +1012,7 @@ TEST_F(PasswordFormManagerTest, TestScoringPublicSuffixMatch) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, InvalidActionURLsDoNotMatch) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| PasswordForm invalid_action_form(*observed_form());
|
| @@ -1023,7 +1026,7 @@ TEST_F(PasswordFormManagerTest, InvalidActionURLsDoNotMatch) {
|
| PasswordFormManager::RESULT_ACTION_MATCH);
|
| // Then when the observed form has an invalid URL:
|
| PasswordForm valid_action_form(*observed_form());
|
| - PasswordFormManager invalid_manager(NULL, client(), kNoDriver,
|
| + PasswordFormManager invalid_manager(nullptr, client(), kNoDriver,
|
| invalid_action_form, false);
|
| EXPECT_EQ(0,
|
| invalid_manager.DoesManage(valid_action_form) &
|
| @@ -1031,7 +1034,7 @@ TEST_F(PasswordFormManagerTest, InvalidActionURLsDoNotMatch) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, EmptyActionURLsDoNotMatchNonEmpty) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| PasswordForm empty_action_form(*observed_form());
|
| @@ -1044,7 +1047,7 @@ TEST_F(PasswordFormManagerTest, EmptyActionURLsDoNotMatchNonEmpty) {
|
| PasswordFormManager::RESULT_ACTION_MATCH);
|
| // Then when the observed form has an empty URL:
|
| PasswordForm valid_action_form(*observed_form());
|
| - PasswordFormManager empty_action_manager(NULL, client(), kNoDriver,
|
| + PasswordFormManager empty_action_manager(nullptr, client(), kNoDriver,
|
| empty_action_form, false);
|
| EXPECT_EQ(0,
|
| empty_action_manager.DoesManage(valid_action_form) &
|
| @@ -1052,7 +1055,7 @@ TEST_F(PasswordFormManagerTest, EmptyActionURLsDoNotMatchNonEmpty) {
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, NonHTMLFormsDoNotMatchHTMLForms) {
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| ASSERT_EQ(PasswordForm::SCHEME_HTML, observed_form()->scheme);
|
| @@ -1064,8 +1067,8 @@ TEST_F(PasswordFormManagerTest, NonHTMLFormsDoNotMatchHTMLForms) {
|
|
|
| // The other way round: observing a non-HTML form, don't match a HTML form.
|
| PasswordForm html_form(*observed_form());
|
| - PasswordFormManager non_html_manager(NULL, client(), kNoDriver, non_html_form,
|
| - false);
|
| + PasswordFormManager non_html_manager(nullptr, client(), kNoDriver,
|
| + non_html_form, false);
|
| EXPECT_EQ(0,
|
| non_html_manager.DoesManage(html_form) &
|
| PasswordFormManager::RESULT_MANDATORY_ATTRIBUTES_MATCH);
|
| @@ -1073,7 +1076,7 @@ TEST_F(PasswordFormManagerTest, NonHTMLFormsDoNotMatchHTMLForms) {
|
|
|
| TEST_F(PasswordFormManagerTest, OriginCheck_HostsMatchExactly) {
|
| // Host part of origins must match exactly, not just by prefix.
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| PasswordForm form_longer_host(*observed_form());
|
| @@ -1087,7 +1090,7 @@ TEST_F(PasswordFormManagerTest, OriginCheck_HostsMatchExactly) {
|
| TEST_F(PasswordFormManagerTest, OriginCheck_MoreSecureSchemePathsMatchPrefix) {
|
| // If the URL scheme of the observed form is HTTP, and the compared form is
|
| // HTTPS, then the compared form can extend the path.
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| PasswordForm form_longer_path(*observed_form());
|
| @@ -1101,7 +1104,7 @@ TEST_F(PasswordFormManagerTest,
|
| OriginCheck_NotMoreSecureSchemePathsMatchExactly) {
|
| // If the origin URL scheme of the compared form is not more secure than that
|
| // of the observed form, then the paths must match exactly.
|
| - PasswordFormManager manager(NULL, client(), kNoDriver, *observed_form(),
|
| + PasswordFormManager manager(nullptr, client(), kNoDriver, *observed_form(),
|
| false);
|
|
|
| PasswordForm form_longer_path(*observed_form());
|
| @@ -1113,7 +1116,7 @@ TEST_F(PasswordFormManagerTest,
|
|
|
| PasswordForm secure_observed_form(*observed_form());
|
| secure_observed_form.origin = GURL("https://accounts.google.com/a/LoginAuth");
|
| - PasswordFormManager secure_manager(NULL, client(), kNoDriver,
|
| + PasswordFormManager secure_manager(nullptr, client(), kNoDriver,
|
| secure_observed_form, true);
|
| // Also for HTTPS in the observed form, and HTTP in the compared form, an
|
| // exact path match is expected.
|
|
|