| Index: chrome/browser/safe_browsing/download_protection_service_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/download_protection_service_unittest.cc b/chrome/browser/safe_browsing/download_protection_service_unittest.cc
|
| index d5f105c287ea659bb626b436a88c93659707a678..d8b762ccec5fa0a8973790a30592d3c4bea34327 100644
|
| --- a/chrome/browser/safe_browsing/download_protection_service_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/download_protection_service_unittest.cc
|
| @@ -646,8 +646,6 @@
|
|
|
| EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS));
|
| EXPECT_TRUE(HasClientDownloadRequest());
|
| - EXPECT_FALSE(GetClientDownloadRequest()->skipped_url_whitelist());
|
| - EXPECT_FALSE(GetClientDownloadRequest()->skipped_certificate_whitelist());
|
| ClearClientDownloadRequest();
|
|
|
| // Check that the referrer is not matched against the whitelist.
|
| @@ -660,8 +658,6 @@
|
|
|
| EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS));
|
| EXPECT_TRUE(HasClientDownloadRequest());
|
| - EXPECT_FALSE(GetClientDownloadRequest()->skipped_url_whitelist());
|
| - EXPECT_FALSE(GetClientDownloadRequest()->skipped_certificate_whitelist());
|
| ClearClientDownloadRequest();
|
|
|
| // Redirect from a site shouldn't be checked either.
|
| @@ -674,8 +670,6 @@
|
|
|
| EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS));
|
| EXPECT_TRUE(HasClientDownloadRequest());
|
| - EXPECT_FALSE(GetClientDownloadRequest()->skipped_url_whitelist());
|
| - EXPECT_FALSE(GetClientDownloadRequest()->skipped_certificate_whitelist());
|
| ClearClientDownloadRequest();
|
|
|
| // Only if the final url is whitelisted should it be SAFE.
|
|
|