| Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| index fe744e728e7db8c97b4e244ec1b3d8ed80933479..73325d8f6ee0ea8003f7fa93d7ddae070b08096c 100644
|
| --- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| +++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| @@ -60,8 +60,8 @@ TEST_F(SSLConfigServiceManagerPrefTest, GoodDisabledCipherSuites) {
|
| EXPECT_TRUE(old_config.disabled_cipher_suites.empty());
|
|
|
| ListValue* list_value = new ListValue();
|
| - list_value->Append(Value::CreateStringValue("0x0004"));
|
| - list_value->Append(Value::CreateStringValue("0x0005"));
|
| + list_value->Append(base::StringValue::New("0x0004"));
|
| + list_value->Append(base::StringValue::New("0x0005"));
|
| pref_service_->SetUserPref(prefs::kCipherSuiteBlacklist, list_value);
|
|
|
| // Pump the message loop to notify the SSLConfigServiceManagerPref that the
|
| @@ -92,10 +92,10 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) {
|
| EXPECT_TRUE(old_config.disabled_cipher_suites.empty());
|
|
|
| ListValue* list_value = new ListValue();
|
| - list_value->Append(Value::CreateStringValue("0x0004"));
|
| - list_value->Append(Value::CreateStringValue("TLS_NOT_WITH_A_CIPHER_SUITE"));
|
| - list_value->Append(Value::CreateStringValue("0x0005"));
|
| - list_value->Append(Value::CreateStringValue("0xBEEFY"));
|
| + list_value->Append(base::StringValue::New("0x0004"));
|
| + list_value->Append(base::StringValue::New("TLS_NOT_WITH_A_CIPHER_SUITE"));
|
| + list_value->Append(base::StringValue::New("0x0005"));
|
| + list_value->Append(base::StringValue::New("0xBEEFY"));
|
| pref_service_->SetUserPref(prefs::kCipherSuiteBlacklist, list_value);
|
|
|
| // Pump the message loop to notify the SSLConfigServiceManagerPref that the
|
|
|