| Index: components/safe_browsing_db/v4_local_database_manager_unittest.cc
|
| diff --git a/components/safe_browsing_db/v4_local_database_manager_unittest.cc b/components/safe_browsing_db/v4_local_database_manager_unittest.cc
|
| index 5e20cb753068b6b3dc8919faa76c56272dc503ae..489ff7bdb8424f865968f77151c2fead1b1c6a1b 100644
|
| --- a/components/safe_browsing_db/v4_local_database_manager_unittest.cc
|
| +++ b/components/safe_browsing_db/v4_local_database_manager_unittest.cc
|
| @@ -1093,7 +1093,7 @@ TEST_F(V4LocalDatabaseManagerTest, TestCheckDownloadUrlWithOneBlacklisted) {
|
| store_and_hash_prefixes.emplace_back(GetUrlMalBinId(), bad_hash_prefix);
|
| ReplaceV4Database(store_and_hash_prefixes, true /* stores_available */);
|
|
|
| - TestClient client(SB_THREAT_TYPE_BINARY_MALWARE_URL, url_chain);
|
| + TestClient client(SB_THREAT_TYPE_URL_BINARY_MALWARE, url_chain);
|
| EXPECT_FALSE(
|
| v4_local_database_manager_->CheckDownloadUrl(url_chain, &client));
|
| EXPECT_FALSE(client.on_check_download_urls_result_called_);
|
|
|