Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
index fe744e728e7db8c97b4e244ec1b3d8ed80933479..73325d8f6ee0ea8003f7fa93d7ddae070b08096c 100644 |
--- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
+++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
@@ -60,8 +60,8 @@ TEST_F(SSLConfigServiceManagerPrefTest, GoodDisabledCipherSuites) { |
EXPECT_TRUE(old_config.disabled_cipher_suites.empty()); |
ListValue* list_value = new ListValue(); |
- list_value->Append(Value::CreateStringValue("0x0004")); |
- list_value->Append(Value::CreateStringValue("0x0005")); |
+ list_value->Append(base::StringValue::New("0x0004")); |
+ list_value->Append(base::StringValue::New("0x0005")); |
pref_service_->SetUserPref(prefs::kCipherSuiteBlacklist, list_value); |
// Pump the message loop to notify the SSLConfigServiceManagerPref that the |
@@ -92,10 +92,10 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) { |
EXPECT_TRUE(old_config.disabled_cipher_suites.empty()); |
ListValue* list_value = new ListValue(); |
- list_value->Append(Value::CreateStringValue("0x0004")); |
- list_value->Append(Value::CreateStringValue("TLS_NOT_WITH_A_CIPHER_SUITE")); |
- list_value->Append(Value::CreateStringValue("0x0005")); |
- list_value->Append(Value::CreateStringValue("0xBEEFY")); |
+ list_value->Append(base::StringValue::New("0x0004")); |
+ list_value->Append(base::StringValue::New("TLS_NOT_WITH_A_CIPHER_SUITE")); |
+ list_value->Append(base::StringValue::New("0x0005")); |
+ list_value->Append(base::StringValue::New("0xBEEFY")); |
pref_service_->SetUserPref(prefs::kCipherSuiteBlacklist, list_value); |
// Pump the message loop to notify the SSLConfigServiceManagerPref that the |