| Index: net/http/http_response_info_unittest.cc
|
| diff --git a/net/http/http_response_info_unittest.cc b/net/http/http_response_info_unittest.cc
|
| index 3490834ccc7b692c3ad432697aa349fac4b2a44e..13cfcc336f784afa8af51abb58044187bdd5a8be 100644
|
| --- a/net/http/http_response_info_unittest.cc
|
| +++ b/net/http/http_response_info_unittest.cc
|
| @@ -72,30 +72,6 @@ TEST_F(HttpResponseInfoTest, PKPBypassPersistFalse) {
|
| EXPECT_FALSE(restored_response_info.ssl_info.pkp_bypassed);
|
| }
|
|
|
| -TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredDefault) {
|
| - EXPECT_FALSE(response_info_.async_revalidation_required);
|
| -}
|
| -
|
| -TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredCopy) {
|
| - response_info_.async_revalidation_required = true;
|
| - net::HttpResponseInfo response_info_clone(response_info_);
|
| - EXPECT_TRUE(response_info_clone.async_revalidation_required);
|
| -}
|
| -
|
| -TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredAssign) {
|
| - response_info_.async_revalidation_required = true;
|
| - net::HttpResponseInfo response_info_clone;
|
| - response_info_clone = response_info_;
|
| - EXPECT_TRUE(response_info_clone.async_revalidation_required);
|
| -}
|
| -
|
| -TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredNotPersisted) {
|
| - response_info_.async_revalidation_required = true;
|
| - net::HttpResponseInfo restored_response_info;
|
| - PickleAndRestore(response_info_, &restored_response_info);
|
| - EXPECT_FALSE(restored_response_info.async_revalidation_required);
|
| -}
|
| -
|
| TEST_F(HttpResponseInfoTest, FailsInitFromPickleWithInvalidSCTStatus) {
|
| // A valid certificate is needed for ssl_info.is_valid() to be true
|
| // so that the SCTs would be serialized.
|
|
|