| Index: components/safe_browsing_db/v4_local_database_manager_unittest.cc
 | 
| diff --git a/components/safe_browsing_db/v4_local_database_manager_unittest.cc b/components/safe_browsing_db/v4_local_database_manager_unittest.cc
 | 
| index 5e20cb753068b6b3dc8919faa76c56272dc503ae..489ff7bdb8424f865968f77151c2fead1b1c6a1b 100644
 | 
| --- a/components/safe_browsing_db/v4_local_database_manager_unittest.cc
 | 
| +++ b/components/safe_browsing_db/v4_local_database_manager_unittest.cc
 | 
| @@ -1093,7 +1093,7 @@ TEST_F(V4LocalDatabaseManagerTest, TestCheckDownloadUrlWithOneBlacklisted) {
 | 
|    store_and_hash_prefixes.emplace_back(GetUrlMalBinId(), bad_hash_prefix);
 | 
|    ReplaceV4Database(store_and_hash_prefixes, true /* stores_available */);
 | 
|  
 | 
| -  TestClient client(SB_THREAT_TYPE_BINARY_MALWARE_URL, url_chain);
 | 
| +  TestClient client(SB_THREAT_TYPE_URL_BINARY_MALWARE, url_chain);
 | 
|    EXPECT_FALSE(
 | 
|        v4_local_database_manager_->CheckDownloadUrl(url_chain, &client));
 | 
|    EXPECT_FALSE(client.on_check_download_urls_result_called_);
 | 
| 
 |