Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
index ecd4f221c815e311cc9480262e3294af7cd15e91..366a5293678d760b0ffbc6ccf860f5906b4ec740 100644 |
--- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
+++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
@@ -127,7 +127,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) { |
} |
// Test that without command-line settings for minimum and maximum SSL versions, |
-// SSL 3.0 ~ kDefaultSSLVersionMax are enabled. |
+// TLS 1.0 ~ kDefaultSSLVersionMax are enabled. |
TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) { |
scoped_refptr<TestingPrefStore> local_state_store(new TestingPrefStore()); |
@@ -148,7 +148,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) { |
config_service->GetSSLConfig(&ssl_config); |
// The default value in the absence of command-line options is that |
// SSL 3.0 ~ kDefaultSSLVersionMax are enabled. |
- EXPECT_EQ(net::SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_min); |
+ EXPECT_EQ(net::SSL_PROTOCOL_VERSION_TLS1, ssl_config.version_min); |
EXPECT_EQ(net::kDefaultSSLVersionMax, ssl_config.version_max); |
// The settings should not be added to the local_state. |