Index: chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc |
diff --git a/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc b/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc |
index f9a59ae9639037b6db03c96bca4e0e547a64db08..6b79c87a04d6a91f30f7932a3fbe41843bbf2ef3 100644 |
--- a/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc |
+++ b/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc |
@@ -396,7 +396,7 @@ IN_PROC_BROWSER_TEST_P(ManagedWithoutPermissionPlatformKeysTest, |
// To verify that the user is not prompted for any certificate selection, |
// set up a delegate that fails on any invocation. |
GetPlatformKeysService()->SetSelectDelegate( |
- base::WrapUnique(new TestSelectDelegate(net::CertificateList()))); |
+ base::MakeUnique<TestSelectDelegate>(net::CertificateList())); |
ASSERT_TRUE(RunExtensionTest("managedProfile")) << message_; |
} |
@@ -433,7 +433,7 @@ IN_PROC_BROWSER_TEST_P(ManagedWithPermissionPlatformKeysTest, |
certs.push_back(client_cert1_); |
GetPlatformKeysService()->SetSelectDelegate( |
- base::WrapUnique(new TestSelectDelegate(certs))); |
+ base::MakeUnique<TestSelectDelegate>(certs)); |
ASSERT_TRUE(RunExtensionTest("corporateKeyWithPermissionTests")) << message_; |
} |
@@ -444,7 +444,7 @@ IN_PROC_BROWSER_TEST_P(ManagedWithPermissionPlatformKeysTest, |
// As the profile is managed, the user must not be able to grant any |
// certificate permission. Set up a delegate that fails on any invocation. |
GetPlatformKeysService()->SetSelectDelegate( |
- base::WrapUnique(new TestSelectDelegate(net::CertificateList()))); |
+ base::MakeUnique<TestSelectDelegate>(net::CertificateList())); |
ASSERT_TRUE(RunExtensionTest("policyDoesGrantAccessToNonCorporateKey")) |
<< message_; |