| Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| index f2a93381334926117c18a652f507607ce0c6e335..7a09c818e5e9f9e438462b897258a91b743d19c3 100644
|
| --- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| +++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc
|
| @@ -161,8 +161,6 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) {
|
| // SSL 3.0 ~ default_version_max() are enabled;
|
| // * without --enable-unrestricted-ssl3-fallback,
|
| // |unrestricted_ssl3_fallback_enabled| is false.
|
| -// TODO(thaidn): |unrestricted_ssl3_fallback_enabled| is true by default
|
| -// temporarily until we have fixed deployment issues.
|
| TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) {
|
| scoped_refptr<TestingPrefStore> local_state_store(new TestingPrefStore());
|
|
|
| @@ -186,7 +184,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) {
|
| EXPECT_EQ(net::SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_min);
|
| EXPECT_EQ(net::SSLConfigService::default_version_max(),
|
| ssl_config.version_max);
|
| - EXPECT_TRUE(ssl_config.unrestricted_ssl3_fallback_enabled);
|
| + EXPECT_FALSE(ssl_config.unrestricted_ssl3_fallback_enabled);
|
|
|
| // The settings should not be added to the local_state.
|
| EXPECT_FALSE(local_state->HasPrefPath(prefs::kSSLVersionMin));
|
|
|