| Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| index 2cbfc05b45321adcc0a3d3b6c4dfd7f55bdeda94..43e7bad4992d8109efa4b97ef8a4f2baa6390253 100644
|
| --- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| +++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| @@ -148,7 +148,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) {
|
|
|
| // Test that
|
| // * without command-line settings for minimum and maximum SSL versions,
|
| -// SSL 3.0 ~ default_version_max() are enabled;
|
| +// SSL 3.0 ~ kDefaultSSLVersionMax are enabled;
|
| // * without --enable-unrestricted-ssl3-fallback,
|
| // |unrestricted_ssl3_fallback_enabled| is false.
|
| TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) {
|
| @@ -170,10 +170,9 @@ TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) {
|
| SSLConfig ssl_config;
|
| config_service->GetSSLConfig(&ssl_config);
|
| // The default value in the absence of command-line options is that
|
| - // SSL 3.0 ~ default_version_max() are enabled.
|
| + // SSL 3.0 ~ kDefaultSSLVersionMax are enabled.
|
| EXPECT_EQ(net::SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_min);
|
| - EXPECT_EQ(net::SSLConfigService::default_version_max(),
|
| - ssl_config.version_max);
|
| + EXPECT_EQ(net::kDefaultSSLVersionMax, ssl_config.version_max);
|
| EXPECT_FALSE(ssl_config.unrestricted_ssl3_fallback_enabled);
|
|
|
| // The settings should not be added to the local_state.
|
|
|