Index: chrome/browser/safe_browsing/download_protection_service_unittest.cc |
diff --git a/chrome/browser/safe_browsing/download_protection_service_unittest.cc b/chrome/browser/safe_browsing/download_protection_service_unittest.cc |
index d5f105c287ea659bb626b436a88c93659707a678..d8b762ccec5fa0a8973790a30592d3c4bea34327 100644 |
--- a/chrome/browser/safe_browsing/download_protection_service_unittest.cc |
+++ b/chrome/browser/safe_browsing/download_protection_service_unittest.cc |
@@ -646,8 +646,6 @@ |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
- EXPECT_FALSE(GetClientDownloadRequest()->skipped_url_whitelist()); |
- EXPECT_FALSE(GetClientDownloadRequest()->skipped_certificate_whitelist()); |
ClearClientDownloadRequest(); |
// Check that the referrer is not matched against the whitelist. |
@@ -660,8 +658,6 @@ |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
- EXPECT_FALSE(GetClientDownloadRequest()->skipped_url_whitelist()); |
- EXPECT_FALSE(GetClientDownloadRequest()->skipped_certificate_whitelist()); |
ClearClientDownloadRequest(); |
// Redirect from a site shouldn't be checked either. |
@@ -674,8 +670,6 @@ |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
- EXPECT_FALSE(GetClientDownloadRequest()->skipped_url_whitelist()); |
- EXPECT_FALSE(GetClientDownloadRequest()->skipped_certificate_whitelist()); |
ClearClientDownloadRequest(); |
// Only if the final url is whitelisted should it be SAFE. |