Index: third_party/WebKit/Source/core/frame/SubresourceIntegrityTest.cpp |
diff --git a/third_party/WebKit/Source/core/frame/SubresourceIntegrityTest.cpp b/third_party/WebKit/Source/core/frame/SubresourceIntegrityTest.cpp |
index 02d673de5d4e5430d421df5f96c9e07a0b194b97..3c1f37ede5a5929a53c5cdf43f10382489182275 100644 |
--- a/third_party/WebKit/Source/core/frame/SubresourceIntegrityTest.cpp |
+++ b/third_party/WebKit/Source/core/frame/SubresourceIntegrityTest.cpp |
@@ -386,7 +386,7 @@ TEST_F(SubresourceIntegrityTest, ParsingBase64) |
TEST_F(SubresourceIntegrityTest, CheckSubresourceIntegrityInSecureOrigin) |
{ |
- document->updateSecurityOrigin(secureOrigin->isolatedCopy()); |
+ document->setSecurityOrigin(secureOrigin->isolatedCopy()); |
// Verify basic sha256, sha384, and sha512 integrity checks. |
expectIntegrity(kSha256Integrity, kBasicScript, strlen(kBasicScript), secureURL, secureURL); |
@@ -424,7 +424,7 @@ TEST_F(SubresourceIntegrityTest, CheckSubresourceIntegrityInInsecureOrigin) |
{ |
// The same checks as CheckSubresourceIntegrityInSecureOrigin should pass |
// here, with the expection of the NoCors check at the end. |
- document->updateSecurityOrigin(insecureOrigin->isolatedCopy()); |
+ document->setSecurityOrigin(insecureOrigin->isolatedCopy()); |
expectIntegrity(kSha256Integrity, kBasicScript, strlen(kBasicScript), secureURL, insecureURL); |
expectIntegrity(kSha256IntegrityLenientSyntax, kBasicScript, strlen(kBasicScript), secureURL, insecureURL); |