Index: chrome/browser/chromeos/login/parallel_authenticator_unittest.cc |
diff --git a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc |
index 08f02bd362e1ed4b93afceaa38064ef246671a63..95d9011eb77786280845cdf28fe47b39b80b9a32 100644 |
--- a/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc |
+++ b/chrome/browser/chromeos/login/parallel_authenticator_unittest.cc |
@@ -317,10 +317,8 @@ TEST_F(ParallelAuthenticatorTest, ResolveOwnerNeededFailedMount) { |
SetAndResolveState(auth_.get(), state_.release())); |
EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); |
- // Simulate TPM token ready event. The tpm token parameters are not |
- // actually used by the DeviceSettingsService, so it is OK to pass arbitrary |
- // values. |
- DeviceSettingsService::Get()->OnTPMTokenReady("pin", "token_name", 0); |
+ // Simulate TPM token ready event. |
+ DeviceSettingsService::Get()->OnTPMTokenReady(); |
// Flush all the pending operations. The operations should induce an owner |
// verification. |