| Index: sandbox/mac/bootstrap_sandbox_unittest.mm
 | 
| diff --git a/sandbox/mac/bootstrap_sandbox_unittest.mm b/sandbox/mac/bootstrap_sandbox_unittest.mm
 | 
| index 467189e134fa9fd74b9f8dc6756bda4ff3f34451..6478fb0377cc10a9771e8b89c8ece80a435d34c6 100644
 | 
| --- a/sandbox/mac/bootstrap_sandbox_unittest.mm
 | 
| +++ b/sandbox/mac/bootstrap_sandbox_unittest.mm
 | 
| @@ -97,8 +97,6 @@ class BootstrapSandboxTest : public base::MultiProcessTest {
 | 
|    BootstrapSandboxPolicy BaselinePolicy() {
 | 
|      BootstrapSandboxPolicy policy;
 | 
|      policy.rules["com.apple.cfprefsd.daemon"] = Rule(POLICY_ALLOW);
 | 
| -    if (base::mac::IsOSSnowLeopard())
 | 
| -      policy.rules["com.apple.SecurityServer"] = Rule(POLICY_ALLOW);
 | 
|      return policy;
 | 
|    }
 | 
|  
 | 
| @@ -354,12 +352,7 @@ TEST_F(BootstrapSandboxTest, ForwardMessageInProcess) {
 | 
|    send_rights = 0;
 | 
|    ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND,
 | 
|        &send_rights));
 | 
| -  // On 10.6, bootstrap_lookup2 may add an extra right to place it in a per-
 | 
| -  // process cache.
 | 
| -  if (base::mac::IsOSSnowLeopard())
 | 
| -    EXPECT_TRUE(send_rights == 3u || send_rights == 2u) << send_rights;
 | 
| -  else
 | 
| -    EXPECT_EQ(2u, send_rights);
 | 
| +  EXPECT_EQ(2u, send_rights);
 | 
|  }
 | 
|  
 | 
|  const char kDefaultRuleTestAllow[] =
 | 
| 
 |