| Index: chrome/browser/download/download_target_determiner_unittest.cc | 
| diff --git a/chrome/browser/download/download_target_determiner_unittest.cc b/chrome/browser/download/download_target_determiner_unittest.cc | 
| index 26f67397b9caae1b78a73cdac0d0f77522bb45f7..295929d00ee1c9fb4286df8be224e34eed9a794e 100644 | 
| --- a/chrome/browser/download/download_target_determiner_unittest.cc | 
| +++ b/chrome/browser/download/download_target_determiner_unittest.cc | 
| @@ -1861,7 +1861,6 @@ class DownloadTargetDeterminerTestWithPlugin | 
| content::PluginService* plugin_service = | 
| content::PluginService::GetInstance(); | 
| plugin_service->Init(); | 
| -    plugin_service->DisablePluginsDiscoveryForTesting(); | 
| old_plugin_service_filter_ = plugin_service->GetFilter(); | 
| plugin_service->SetFilter(&mock_plugin_filter_); | 
| } | 
| @@ -2019,72 +2018,6 @@ TEST_F(DownloadTargetDeterminerTestWithPlugin, | 
| EXPECT_FALSE(target_info->is_filetype_handled_safely); | 
| } | 
|  | 
| -// Check if secure handling of filetypes is determined correctly for NPAPI | 
| -// plugins. | 
| -TEST_F(DownloadTargetDeterminerTestWithPlugin, | 
| -       TargetDeterminer_CheckForSecureHandling_NPAPI) { | 
| -  // All test cases run with GetPathInDownloadDir(kInitialPath) as the inital | 
| -  // path. | 
| -  const base::FilePath::CharType kInitialPath[] = | 
| -      FILE_PATH_LITERAL("some_path/bar.txt"); | 
| -  const char kTestMIMEType[] = "application/x-example-should-not-exist"; | 
| - | 
| -  DownloadTestCase kSecureHandlingTestCase = { | 
| -      AUTOMATIC, | 
| -      content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS, | 
| -      download_util::NOT_DANGEROUS, | 
| -      "http://example.com/foo.fakeext", | 
| -      "", | 
| -      FILE_PATH_LITERAL(""), | 
| - | 
| -      FILE_PATH_LITERAL("foo.fakeext"), | 
| -      DownloadItem::TARGET_DISPOSITION_OVERWRITE, | 
| - | 
| -      EXPECT_CRDOWNLOAD}; | 
| - | 
| -  content::PluginService* plugin_service = | 
| -      content::PluginService::GetInstance(); | 
| - | 
| -  // Can't run this test if NPAPI isn't supported. | 
| -  if (!plugin_service->NPAPIPluginsSupported()) | 
| -    return; | 
| - | 
| -  // Verify our test assumptions. | 
| -  { | 
| -    ForceRefreshOfPlugins(); | 
| -    std::vector<content::WebPluginInfo> info; | 
| -    ASSERT_FALSE(plugin_service->GetPluginInfoArray( | 
| -        GURL(), kTestMIMEType, false, &info, NULL)); | 
| -    ASSERT_EQ(0u, info.size()) | 
| -        << "Name: " << info[0].name << ", Path: " << info[0].path.value(); | 
| -  } | 
| - | 
| -  ON_CALL(*delegate(), GetFileMimeType( | 
| -      GetPathInDownloadDir(FILE_PATH_LITERAL("foo.fakeext")), _)) | 
| -      .WillByDefault(WithArg<1>( | 
| -          ScheduleCallback(kTestMIMEType))); | 
| -  scoped_ptr<content::MockDownloadItem> item( | 
| -      CreateActiveDownloadItem(1, kSecureHandlingTestCase)); | 
| -  scoped_ptr<DownloadTargetInfo> target_info = | 
| -      RunDownloadTargetDeterminer(GetPathInDownloadDir(kInitialPath), | 
| -                                  item.get()); | 
| -  EXPECT_FALSE(target_info->is_filetype_handled_safely); | 
| - | 
| -  // Register a NPAPI plugin. This should not count as handling the filetype | 
| -  // securely. | 
| -  ScopedRegisterInternalPlugin npapi_plugin( | 
| -      plugin_service, | 
| -      content::WebPluginInfo::PLUGIN_TYPE_NPAPI, | 
| -      test_download_dir().AppendASCII("npapi"), | 
| -      kTestMIMEType, | 
| -      "fakeext"); | 
| -  EXPECT_CALL(mock_plugin_filter_, MockPluginAvailable(npapi_plugin.path())) | 
| -      .WillRepeatedly(Return(true)); | 
| - | 
| -  target_info = RunDownloadTargetDeterminer( | 
| -      GetPathInDownloadDir(kInitialPath), item.get()); | 
| -  EXPECT_FALSE(target_info->is_filetype_handled_safely); | 
| -} | 
| #endif  // defined(ENABLE_PLUGINS) | 
|  | 
| }  // namespace | 
|  |