Index: chrome/browser/safe_browsing/client_side_detection_service_unittest.cc |
diff --git a/chrome/browser/safe_browsing/client_side_detection_service_unittest.cc b/chrome/browser/safe_browsing/client_side_detection_service_unittest.cc |
index 83ce5aa7ea41113d793c17656832c3e987997986..324f170d3c049d39c66551faaebd40d594e8e35f 100644 |
--- a/chrome/browser/safe_browsing/client_side_detection_service_unittest.cc |
+++ b/chrome/browser/safe_browsing/client_side_detection_service_unittest.cc |
@@ -666,7 +666,7 @@ TEST_F(ClientSideDetectionServiceTest, SetEnabled) { |
TEST_F(ClientSideDetectionServiceTest, SanitizeRequestForPingback) { |
ClientPhishingRequest request; |
request.set_url("http://www.us.host.com/blah"); |
- request.set_suffix_prefix_hash("hash"); |
+ request.set_hash_prefix("hash"); |
request.set_client_score(0.8f); |
request.set_is_phishing(true); |
AddFeature(std::string(features::kUrlTldToken) + "com", 1.0, &request); |
@@ -709,7 +709,7 @@ TEST_F(ClientSideDetectionServiceTest, SanitizeRequestForPingback) { |
// For easier debugging, we'll check the output protobuf fields individually. |
ClientPhishingRequest expected; |
- expected.set_suffix_prefix_hash(request.suffix_prefix_hash()); |
+ expected.set_hash_prefix(request.hash_prefix()); |
expected.set_client_score(request.client_score()); |
expected.set_is_phishing(request.is_phishing()); |
AddFeature(features::kUrlNumOtherHostTokensGTOne, 1.0, &expected); |
@@ -719,8 +719,7 @@ TEST_F(ClientSideDetectionServiceTest, SanitizeRequestForPingback) { |
AddNonModelFeature(features::kUrlHistoryVisitCount, 5.0, &expected); |
EXPECT_FALSE(sanitized_request.has_url()); |
- EXPECT_EQ(expected.suffix_prefix_hash(), |
- sanitized_request.suffix_prefix_hash()); |
+ EXPECT_EQ(expected.hash_prefix(), sanitized_request.hash_prefix()); |
EXPECT_FLOAT_EQ(expected.client_score(), sanitized_request.client_score()); |
EXPECT_EQ(expected.is_phishing(), sanitized_request.is_phishing()); |