| Index: ash/login/lock_screen_controller_unittest.cc
|
| diff --git a/ash/login/lock_screen_controller_unittest.cc b/ash/login/lock_screen_controller_unittest.cc
|
| index 3e42c9ee679438c372efa3643aa090e7051d6d41..5ca26d114578a060c7d68b4eb10873b316aab079 100644
|
| --- a/ash/login/lock_screen_controller_unittest.cc
|
| +++ b/ash/login/lock_screen_controller_unittest.cc
|
| @@ -24,7 +24,7 @@ TEST_F(LockScreenControllerTest, RequestAuthentication) {
|
| AccountId id = AccountId::FromUserEmail("user1@test.com");
|
|
|
| // We hardcode the hashed password. This is fine because the password hash
|
| - // algorithm should never accidently change; if it does we will need to
|
| + // algorithm should never accidentally change; if it does we will need to
|
| // have cryptohome migration code and one failing test isn't a problem.
|
| std::string password = "password";
|
| std::string hashed_password = "40c7b00f3bccc7675ec5b732de4bfbe4";
|
| @@ -32,8 +32,9 @@ TEST_F(LockScreenControllerTest, RequestAuthentication) {
|
|
|
| // Verify AuthenticateUser mojo call is run with the same account id, a
|
| // (hashed) password, and the correct PIN state.
|
| - EXPECT_CALL(*client, AuthenticateUser(id, hashed_password, false));
|
| - controller->AuthenticateUser(id, password, false);
|
| + EXPECT_CALL(*client, AuthenticateUser_(id, hashed_password, false, _));
|
| + controller->AuthenticateUser(
|
| + id, password, false, mojom::LockScreenClient::AuthenticateUserCallback());
|
|
|
| base::RunLoop().RunUntilIdle();
|
| }
|
|
|