| Index: chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| diff --git a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| index 27a82202212b614eb3dbe3c0843616f84b5b8951..0ad3bdd47d1fb7d49c90faeccadd9bc7cf0948f8 100644
|
| --- a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| +++ b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| @@ -321,10 +321,8 @@ TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededFailedMount) {
|
| SetAndResolveState(auth_.get(), state_.release()));
|
| EXPECT_TRUE(LoginState::Get()->IsInSafeMode());
|
|
|
| - // Simulate TPM token ready event. The tpm token parameters are not
|
| - // actually used by the DeviceSettingsService, so it is OK to pass arbitrary
|
| - // values.
|
| - DeviceSettingsService::Get()->OnTPMTokenReady("pin", "token_name", 0);
|
| + // Simulate TPM token ready event.
|
| + DeviceSettingsService::Get()->OnTPMTokenReady();
|
|
|
| // Flush all the pending operations. The operations should induce an owner
|
| // verification.
|
|
|