| Index: components/ssl_config/ssl_config_service_manager_pref_unittest.cc
|
| diff --git a/components/ssl_config/ssl_config_service_manager_pref_unittest.cc b/components/ssl_config/ssl_config_service_manager_pref_unittest.cc
|
| index ff5c2e1c325621ef38e01987d972e56f22f4d599..07aaef88f48dbed2b72f3e8318ce3ea3400e32f3 100644
|
| --- a/components/ssl_config/ssl_config_service_manager_pref_unittest.cc
|
| +++ b/components/ssl_config/ssl_config_service_manager_pref_unittest.cc
|
| @@ -65,8 +65,8 @@ TEST_F(SSLConfigServiceManagerPrefTest, GoodDisabledCipherSuites) {
|
| EXPECT_TRUE(old_config.disabled_cipher_suites.empty());
|
|
|
| base::ListValue* list_value = new base::ListValue();
|
| - list_value->Append(new base::StringValue("0x0004"));
|
| - list_value->Append(new base::StringValue("0x0005"));
|
| + list_value->AppendString("0x0004");
|
| + list_value->AppendString("0x0005");
|
| local_state.SetUserPref(ssl_config::prefs::kCipherSuiteBlacklist, list_value);
|
|
|
| // Pump the message loop to notify the SSLConfigServiceManagerPref that the
|
| @@ -101,10 +101,10 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) {
|
| EXPECT_TRUE(old_config.disabled_cipher_suites.empty());
|
|
|
| base::ListValue* list_value = new base::ListValue();
|
| - list_value->Append(new base::StringValue("0x0004"));
|
| - list_value->Append(new base::StringValue("TLS_NOT_WITH_A_CIPHER_SUITE"));
|
| - list_value->Append(new base::StringValue("0x0005"));
|
| - list_value->Append(new base::StringValue("0xBEEFY"));
|
| + list_value->AppendString("0x0004");
|
| + list_value->AppendString("TLS_NOT_WITH_A_CIPHER_SUITE");
|
| + list_value->AppendString("0x0005");
|
| + list_value->AppendString("0xBEEFY");
|
| local_state.SetUserPref(ssl_config::prefs::kCipherSuiteBlacklist, list_value);
|
|
|
| // Pump the message loop to notify the SSLConfigServiceManagerPref that the
|
|
|