Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index 0c058779910db675099b888a33c1b5f1dc8608bf..20c61af15d1cded76306aa3e34bd58daf5bf21ec 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -240,14 +240,6 @@ UploadDataStream* CreateSimpleUploadData(const char* data) { |
// Verify that the SSLInfo of a successful SSL connection has valid values. |
void CheckSSLInfo(const SSLInfo& ssl_info) { |
- // Allow ChromeFrame fake SSLInfo to get through. |
- if (ssl_info.cert.get() && |
- ssl_info.cert.get()->issuer().GetDisplayName() == "Chrome Internal") { |
- // -1 means unknown. |
- EXPECT_EQ(ssl_info.security_bits, -1); |
- return; |
- } |
- |
// -1 means unknown. 0 means no encryption. |
EXPECT_GT(ssl_info.security_bits, 0); |
@@ -2690,10 +2682,7 @@ class URLRequestTestHTTP : public URLRequestTest { |
bool is_success = r.status().is_success(); |
if (!is_success) { |
- // Requests handled by ChromeFrame send a less precise error message, |
- // ERR_CONNECTION_ABORTED. |
- EXPECT_TRUE(r.status().error() == ERR_RESPONSE_HEADERS_TOO_BIG || |
- r.status().error() == ERR_CONNECTION_ABORTED); |
+ EXPECT_TRUE(r.status().error() == ERR_RESPONSE_HEADERS_TOO_BIG); |
// The test server appears to be unable to handle subsequent requests |
// after this error is triggered. Force it to restart. |
EXPECT_TRUE(test_server_.Stop()); |
@@ -5962,10 +5951,7 @@ TEST_F(URLRequestTestHTTP, OverrideUserAgent) { |
req.SetExtraRequestHeaders(headers); |
req.Start(); |
base::RunLoop().Run(); |
- // If the net tests are being run with ChromeFrame then we need to allow for |
- // the 'chromeframe' suffix which is added to the user agent before the |
- // closing parentheses. |
- EXPECT_TRUE(StartsWithASCII(d.data_received(), "Lynx (textmode", true)); |
+ EXPECT_EQ(std::string("Lynx (textmode)"), d.data_received()); |
} |
// Check that a NULL HttpUserAgentSettings causes the corresponding empty |