| Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| index 70b1175e381f91113f2d95f89bb9cc6fd2898a65..2cbfc05b45321adcc0a3d3b6c4dfd7f55bdeda94 100644
|
| --- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| +++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| @@ -53,7 +53,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, ChannelIDWithoutUserPrefs) {
|
| TestingPrefServiceSimple local_state;
|
| SSLConfigServiceManager::RegisterPrefs(local_state.registry());
|
| local_state.SetUserPref(prefs::kEnableOriginBoundCerts,
|
| - Value::CreateBooleanValue(false));
|
| + base::Value::CreateBooleanValue(false));
|
|
|
| scoped_ptr<SSLConfigServiceManager> config_manager(
|
| SSLConfigServiceManager::CreateDefaultManager(&local_state));
|
| @@ -66,7 +66,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, ChannelIDWithoutUserPrefs) {
|
| EXPECT_FALSE(config.channel_id_enabled);
|
|
|
| local_state.SetUserPref(prefs::kEnableOriginBoundCerts,
|
| - Value::CreateBooleanValue(true));
|
| + base::Value::CreateBooleanValue(true));
|
| // Pump the message loop to notify the SSLConfigServiceManagerPref that the
|
| // preferences changed.
|
| message_loop_.RunUntilIdle();
|
| @@ -90,9 +90,9 @@ TEST_F(SSLConfigServiceManagerPrefTest, GoodDisabledCipherSuites) {
|
| config_service->GetSSLConfig(&old_config);
|
| EXPECT_TRUE(old_config.disabled_cipher_suites.empty());
|
|
|
| - ListValue* list_value = new ListValue();
|
| - list_value->Append(Value::CreateStringValue("0x0004"));
|
| - list_value->Append(Value::CreateStringValue("0x0005"));
|
| + base::ListValue* list_value = new base::ListValue();
|
| + list_value->Append(base::Value::CreateStringValue("0x0004"));
|
| + list_value->Append(base::Value::CreateStringValue("0x0005"));
|
| local_state.SetUserPref(prefs::kCipherSuiteBlacklist, list_value);
|
|
|
| // Pump the message loop to notify the SSLConfigServiceManagerPref that the
|
| @@ -125,11 +125,12 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) {
|
| config_service->GetSSLConfig(&old_config);
|
| EXPECT_TRUE(old_config.disabled_cipher_suites.empty());
|
|
|
| - ListValue* list_value = new ListValue();
|
| - list_value->Append(Value::CreateStringValue("0x0004"));
|
| - list_value->Append(Value::CreateStringValue("TLS_NOT_WITH_A_CIPHER_SUITE"));
|
| - list_value->Append(Value::CreateStringValue("0x0005"));
|
| - list_value->Append(Value::CreateStringValue("0xBEEFY"));
|
| + base::ListValue* list_value = new base::ListValue();
|
| + list_value->Append(base::Value::CreateStringValue("0x0004"));
|
| + list_value->Append(
|
| + base::Value::CreateStringValue("TLS_NOT_WITH_A_CIPHER_SUITE"));
|
| + list_value->Append(base::Value::CreateStringValue("0x0005"));
|
| + list_value->Append(base::Value::CreateStringValue("0xBEEFY"));
|
| local_state.SetUserPref(prefs::kCipherSuiteBlacklist, list_value);
|
|
|
| // Pump the message loop to notify the SSLConfigServiceManagerPref that the
|
|
|