| Index: chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
 | 
| diff --git a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
 | 
| index d15bb1d62417c5fc531f1527af39f524216393f6..be05b21eaa8c03f68991448aec1f4ce33edf4344 100644
 | 
| --- a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
 | 
| +++ b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
 | 
| @@ -234,7 +234,7 @@ TEST_F(ParallelAuthenticatorTest, OnLoginSuccess) {
 | 
|        .Times(1)
 | 
|        .RetiresOnSaturation();
 | 
|  
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|    auth_->OnLoginSuccess(false);
 | 
|  }
 | 
|  
 | 
| @@ -242,13 +242,13 @@ TEST_F(ParallelAuthenticatorTest, OnPasswordChangeDetected) {
 | 
|    EXPECT_CALL(consumer_, OnPasswordChangeDetected())
 | 
|        .Times(1)
 | 
|        .RetiresOnSaturation();
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|    auth_->OnPasswordChangeDetected();
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolveNothingDone) {
 | 
|    EXPECT_EQ(ParallelAuthenticator::CONTINUE,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolvePossiblePwChange) {
 | 
| @@ -260,7 +260,7 @@ TEST_F(ParallelAuthenticatorTest, ResolvePossiblePwChange) {
 | 
|    state_->PresetCryptohomeStatus(false, cryptohome::MOUNT_ERROR_KEY_FAILURE);
 | 
|  
 | 
|    EXPECT_EQ(ParallelAuthenticator::POSSIBLE_PW_CHANGE,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolvePossiblePwChangeToFailedMount) {
 | 
| @@ -270,7 +270,7 @@ TEST_F(ParallelAuthenticatorTest, ResolvePossiblePwChangeToFailedMount) {
 | 
|  
 | 
|    // When there is no online attempt and online results, POSSIBLE_PW_CHANGE
 | 
|    EXPECT_EQ(ParallelAuthenticator::FAILED_MOUNT,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolveNeedOldPw) {
 | 
| @@ -281,7 +281,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveNeedOldPw) {
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::LoginFailureNone());
 | 
|  
 | 
|    EXPECT_EQ(ParallelAuthenticator::NEED_OLD_PW,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededDirectFailedMount) {
 | 
| @@ -294,7 +294,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededDirectFailedMount) {
 | 
|    SetOwnerState(true, false);
 | 
|  
 | 
|    EXPECT_EQ(ParallelAuthenticator::OWNER_REQUIRED,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededMount) {
 | 
| @@ -315,7 +315,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededMount) {
 | 
|                                      false));
 | 
|    state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE);
 | 
|    EXPECT_EQ(ParallelAuthenticator::OFFLINE_LOGIN,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededFailedMount) {
 | 
| @@ -346,7 +346,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededFailedMount) {
 | 
|    CrosSettings::Get()->SetBoolean(kPolicyMissingMitigationMode, true);
 | 
|  
 | 
|    EXPECT_EQ(ParallelAuthenticator::CONTINUE,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|    // Let the owner verification run.
 | 
|    device_settings_test_helper_.Flush();
 | 
|    // and test that the mount has succeeded.
 | 
| @@ -360,7 +360,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededFailedMount) {
 | 
|                                      false));
 | 
|    state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE);
 | 
|    EXPECT_EQ(ParallelAuthenticator::OWNER_REQUIRED,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  
 | 
|    EXPECT_TRUE(
 | 
|        CrosSettings::Get()->RemoveSettingsProvider(&stub_settings_provider));
 | 
| @@ -375,7 +375,7 @@ TEST_F(ParallelAuthenticatorTest, DriveFailedMount) {
 | 
|    // Set up state as though a cryptohome mount attempt has occurred
 | 
|    // and failed.
 | 
|    state_->PresetCryptohomeStatus(false, cryptohome::MOUNT_ERROR_NONE);
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    RunResolve(auth_.get());
 | 
|  }
 | 
| @@ -463,7 +463,7 @@ TEST_F(ParallelAuthenticatorTest, DriveDataResync) {
 | 
|        .RetiresOnSaturation();
 | 
|  
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::LoginFailureNone());
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    auth_->ResyncEncryptedData();
 | 
|    message_loop_.Run();
 | 
| @@ -479,7 +479,7 @@ TEST_F(ParallelAuthenticatorTest, DriveResyncFail) {
 | 
|        .Times(1)
 | 
|        .RetiresOnSaturation();
 | 
|  
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    auth_->ResyncEncryptedData();
 | 
|    message_loop_.Run();
 | 
| @@ -491,7 +491,7 @@ TEST_F(ParallelAuthenticatorTest, DriveRequestOldPassword) {
 | 
|  
 | 
|    state_->PresetCryptohomeStatus(false, cryptohome::MOUNT_ERROR_KEY_FAILURE);
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::LoginFailureNone());
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    RunResolve(auth_.get());
 | 
|  }
 | 
| @@ -520,7 +520,7 @@ TEST_F(ParallelAuthenticatorTest, DriveDataRecover) {
 | 
|        .RetiresOnSaturation();
 | 
|  
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::LoginFailureNone());
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    auth_->RecoverEncryptedData(std::string());
 | 
|    message_loop_.Run();
 | 
| @@ -540,7 +540,7 @@ TEST_F(ParallelAuthenticatorTest, DriveDataRecoverButFail) {
 | 
|        .WillOnce(Return(std::string()))
 | 
|        .RetiresOnSaturation();
 | 
|  
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    auth_->RecoverEncryptedData(std::string());
 | 
|    message_loop_.Run();
 | 
| @@ -556,7 +556,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveNoMount) {
 | 
|                                   cryptohome::MOUNT_ERROR_USER_DOES_NOT_EXIST);
 | 
|  
 | 
|    EXPECT_EQ(ParallelAuthenticator::NO_MOUNT,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolveNoMountToFailedMount) {
 | 
| @@ -568,7 +568,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveNoMountToFailedMount) {
 | 
|    // When there is no online attempt and online results, NO_MOUNT will be
 | 
|    // resolved to FAILED_MOUNT.
 | 
|    EXPECT_EQ(ParallelAuthenticator::FAILED_MOUNT,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, ResolveCreateNew) {
 | 
| @@ -580,7 +580,7 @@ TEST_F(ParallelAuthenticatorTest, ResolveCreateNew) {
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::LoginFailureNone());
 | 
|  
 | 
|    EXPECT_EQ(ParallelAuthenticator::CREATE_NEW,
 | 
| -            SetAndResolveState(auth_, state_.release()));
 | 
| +            SetAndResolveState(auth_.get(), state_.release()));
 | 
|  }
 | 
|  
 | 
|  TEST_F(ParallelAuthenticatorTest, DriveCreateForNewUser) {
 | 
| @@ -607,7 +607,7 @@ TEST_F(ParallelAuthenticatorTest, DriveCreateForNewUser) {
 | 
|    state_->PresetCryptohomeStatus(false,
 | 
|                                   cryptohome::MOUNT_ERROR_USER_DOES_NOT_EXIST);
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::LoginFailureNone());
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    RunResolve(auth_.get());
 | 
|  }
 | 
| @@ -622,7 +622,7 @@ TEST_F(ParallelAuthenticatorTest, DriveOfflineLogin) {
 | 
|    GoogleServiceAuthError error =
 | 
|        GoogleServiceAuthError::FromConnectionError(net::ERR_CONNECTION_RESET);
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::FromNetworkAuthFailure(error));
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    RunResolve(auth_.get());
 | 
|  }
 | 
| @@ -635,7 +635,7 @@ TEST_F(ParallelAuthenticatorTest, DriveOfflineLoginDelayedOnline) {
 | 
|    // succeeded.
 | 
|    state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE);
 | 
|    // state_ is released further down.
 | 
| -  SetAttemptState(auth_, state_.get());
 | 
| +  SetAttemptState(auth_.get(), state_.get());
 | 
|    RunResolve(auth_.get());
 | 
|  
 | 
|    // Offline login has completed, so now we "complete" the online request.
 | 
| @@ -668,7 +668,7 @@ TEST_F(ParallelAuthenticatorTest, DriveOfflineLoginGetNewPassword) {
 | 
|    // succeeded; also, an online request that never made it.
 | 
|    state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE);
 | 
|    // state_ is released further down.
 | 
| -  SetAttemptState(auth_, state_.get());
 | 
| +  SetAttemptState(auth_.get(), state_.get());
 | 
|    RunResolve(auth_.get());
 | 
|  
 | 
|    // Offline login has completed, so now we "complete" the online request.
 | 
| @@ -707,7 +707,7 @@ TEST_F(ParallelAuthenticatorTest, DriveOfflineLoginGetCaptchad) {
 | 
|    // succeeded; also, an online request that never made it.
 | 
|    state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE);
 | 
|    // state_ is released further down.
 | 
| -  SetAttemptState(auth_, state_.get());
 | 
| +  SetAttemptState(auth_.get(), state_.get());
 | 
|    RunResolve(auth_.get());
 | 
|  
 | 
|    // Offline login has completed, so now we "complete" the online request.
 | 
| @@ -748,7 +748,7 @@ TEST_F(ParallelAuthenticatorTest, DriveOnlineLogin) {
 | 
|    // succeeded.
 | 
|    state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE);
 | 
|    state_->PresetOnlineLoginStatus(LoginFailure::LoginFailureNone());
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    RunResolve(auth_.get());
 | 
|  }
 | 
| @@ -767,7 +767,7 @@ TEST_F(ParallelAuthenticatorTest, DISABLED_DriveNeedNewPassword) {
 | 
|    // succeeded.
 | 
|    state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE);
 | 
|    state_->PresetOnlineLoginStatus(failure);
 | 
| -  SetAttemptState(auth_, state_.release());
 | 
| +  SetAttemptState(auth_.get(), state_.release());
 | 
|  
 | 
|    RunResolve(auth_.get());
 | 
|  }
 | 
| 
 |