| Index: chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc | 
| diff --git a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc | 
| index ee8d6ed4e7995e69f1cbd003fefe3252b5d9cba8..41c7d6f57b61156be17277653cc582189c49695a 100644 | 
| --- a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc | 
| +++ b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc | 
| @@ -18,6 +18,7 @@ | 
| #include "crypto/sha2.h" | 
| #include "chrome/renderer/safe_browsing/features.h" | 
| #include "chrome/renderer/safe_browsing/mock_feature_extractor_clock.h" | 
| +#include "chrome/renderer/safe_browsing/murmurhash3_util.h" | 
| #include "testing/gmock/include/gmock/gmock.h" | 
| #include "testing/gtest/include/gtest/gtest.h" | 
|  | 
| @@ -61,15 +62,17 @@ class PhishingTermFeatureExtractorTest : public ::testing::Test { | 
| words.insert("\xe4\xbd\xa0\xe5\xa5\xbd"); | 
| words.insert("\xe5\x86\x8d\xe8\xa7\x81"); | 
|  | 
| +    static const uint32 kMurmurHash3Seed = 2777808611U; | 
| for (base::hash_set<std::string>::iterator it = words.begin(); | 
| it != words.end(); ++it) { | 
| -      word_hashes_.insert(crypto::SHA256HashString(*it)); | 
| +      word_hashes_.insert(MurmurHash3String(*it, kMurmurHash3Seed)); | 
| } | 
|  | 
| extractor_.reset(new PhishingTermFeatureExtractor( | 
| &term_hashes_, | 
| &word_hashes_, | 
| 3 /* max_words_per_term */, | 
| +        kMurmurHash3Seed, | 
| &clock_)); | 
| } | 
|  | 
| @@ -112,7 +115,7 @@ class PhishingTermFeatureExtractorTest : public ::testing::Test { | 
| MockFeatureExtractorClock clock_; | 
| scoped_ptr<PhishingTermFeatureExtractor> extractor_; | 
| base::hash_set<std::string> term_hashes_; | 
| -  base::hash_set<std::string> word_hashes_; | 
| +  base::hash_set<uint32> word_hashes_; | 
| bool success_;  // holds the success value from ExtractFeatures | 
| }; | 
|  | 
|  |