| Index: chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| diff --git a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| index 08f02bd362e1ed4b93afceaa38064ef246671a63..95d9011eb77786280845cdf28fe47b39b80b9a32 100644
|
| --- a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| +++ b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc
|
| @@ -317,10 +317,8 @@ TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededFailedMount) {
|
| SetAndResolveState(auth_.get(), state_.release()));
|
| EXPECT_TRUE(LoginState::Get()->IsInSafeMode());
|
|
|
| - // Simulate TPM token ready event. The tpm token parameters are not
|
| - // actually used by the DeviceSettingsService, so it is OK to pass arbitrary
|
| - // values.
|
| - DeviceSettingsService::Get()->OnTPMTokenReady("pin", "token_name", 0);
|
| + // Simulate TPM token ready event.
|
| + DeviceSettingsService::Get()->OnTPMTokenReady();
|
|
|
| // Flush all the pending operations. The operations should induce an owner
|
| // verification.
|
|
|