| Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| index 753109c42b1b8be5674282f12de48e17e4dae7cc..a593668c55acd62fce1edb50d8c2e00eb15f8710 100644
|
| --- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| +++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| @@ -147,7 +147,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) {
|
| }
|
|
|
| // Test that without command-line settings for minimum and maximum SSL versions,
|
| -// SSL 3.0 ~ default_version_max() are enabled.
|
| +// SSL 3.0 ~ kDefaultSSLVersionMax are enabled.
|
| TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) {
|
| scoped_refptr<TestingPrefStore> local_state_store(new TestingPrefStore());
|
|
|
| @@ -167,10 +167,9 @@ TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) {
|
| SSLConfig ssl_config;
|
| config_service->GetSSLConfig(&ssl_config);
|
| // The default value in the absence of command-line options is that
|
| - // SSL 3.0 ~ default_version_max() are enabled.
|
| + // SSL 3.0 ~ kDefaultSSLVersionMax are enabled.
|
| EXPECT_EQ(net::SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_min);
|
| - EXPECT_EQ(net::SSLConfigService::default_version_max(),
|
| - ssl_config.version_max);
|
| + EXPECT_EQ(net::kDefaultSSLVersionMax, ssl_config.version_max);
|
|
|
| // The settings should not be added to the local_state.
|
| EXPECT_FALSE(local_state->HasPrefPath(prefs::kSSLVersionMin));
|
|
|