| Index: content/child/blink_platform_impl_unittest.cc | 
| diff --git a/content/child/blink_platform_impl_unittest.cc b/content/child/blink_platform_impl_unittest.cc | 
| index 28f7dfbfd27fea2d99b98b3806f1e14ff8a58c7f..97140e8eecaf0aa35f90799a6aeb7b30e91f0b5a 100644 | 
| --- a/content/child/blink_platform_impl_unittest.cc | 
| +++ b/content/child/blink_platform_impl_unittest.cc | 
| @@ -21,8 +21,10 @@ void CheckCastedOriginsAlreadyNormalized( | 
| url::Origin::UnsafelyCreateOriginWithoutNormalization( | 
| origin.protocol().utf8(), origin.host().utf8(), | 
| origin.effectivePort()); | 
| -  url::Origin non_checked_origin = url::Origin::CreateFromNormalizedTuple( | 
| -      origin.protocol().utf8(), origin.host().utf8(), origin.effectivePort()); | 
| +  url::Origin non_checked_origin = | 
| +      url::Origin::CreateFromNormalizedTupleWithSuborigin( | 
| +          origin.protocol().utf8(), origin.host().utf8(), | 
| +          origin.effectivePort(), origin.suborigin().utf8()); | 
| EXPECT_EQ(checked_origin.scheme(), non_checked_origin.scheme()); | 
| EXPECT_EQ(checked_origin.host(), non_checked_origin.host()); | 
| EXPECT_EQ(checked_origin.port(), non_checked_origin.port()); | 
| @@ -144,7 +146,7 @@ TEST(BlinkPlatformTest, CastWebSecurityOrigin) { | 
| } | 
|  | 
| // This test ensures that WebSecurityOrigins can safely use | 
| -// url::Origin::CreateFromNormalizedTuple when doing conversions. | 
| +// url::Origin::CreateFromNormalizedTupleWithSuborigin when doing conversions. | 
| TEST(BlinkPlatformTest, WebSecurityOriginNormalization) { | 
| struct TestCases { | 
| const char* url; | 
|  |