Index: net/http/http_response_info_unittest.cc |
diff --git a/net/http/http_response_info_unittest.cc b/net/http/http_response_info_unittest.cc |
index 3490834ccc7b692c3ad432697aa349fac4b2a44e..13cfcc336f784afa8af51abb58044187bdd5a8be 100644 |
--- a/net/http/http_response_info_unittest.cc |
+++ b/net/http/http_response_info_unittest.cc |
@@ -72,30 +72,6 @@ TEST_F(HttpResponseInfoTest, PKPBypassPersistFalse) { |
EXPECT_FALSE(restored_response_info.ssl_info.pkp_bypassed); |
} |
-TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredDefault) { |
- EXPECT_FALSE(response_info_.async_revalidation_required); |
-} |
- |
-TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredCopy) { |
- response_info_.async_revalidation_required = true; |
- net::HttpResponseInfo response_info_clone(response_info_); |
- EXPECT_TRUE(response_info_clone.async_revalidation_required); |
-} |
- |
-TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredAssign) { |
- response_info_.async_revalidation_required = true; |
- net::HttpResponseInfo response_info_clone; |
- response_info_clone = response_info_; |
- EXPECT_TRUE(response_info_clone.async_revalidation_required); |
-} |
- |
-TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredNotPersisted) { |
- response_info_.async_revalidation_required = true; |
- net::HttpResponseInfo restored_response_info; |
- PickleAndRestore(response_info_, &restored_response_info); |
- EXPECT_FALSE(restored_response_info.async_revalidation_required); |
-} |
- |
TEST_F(HttpResponseInfoTest, FailsInitFromPickleWithInvalidSCTStatus) { |
// A valid certificate is needed for ssl_info.is_valid() to be true |
// so that the SCTs would be serialized. |