| Index: chrome/browser/safe_browsing/browser_feature_extractor_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/browser_feature_extractor_unittest.cc b/chrome/browser/safe_browsing/browser_feature_extractor_unittest.cc
|
| index c3bc13fd37abc50a939a74a019c352b8855ce009..7bf9b271a1aead732068fcc0b2a810d1393a3603 100644
|
| --- a/chrome/browser/safe_browsing/browser_feature_extractor_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/browser_feature_extractor_unittest.cc
|
| @@ -210,13 +210,9 @@
|
| scoped_refptr<StrictMock<MockSafeBrowsingDatabaseManager> > db_manager_;
|
|
|
| private:
|
| - void ExtractFeaturesDone(bool success,
|
| - scoped_ptr<ClientPhishingRequest> request) {
|
| - EXPECT_TRUE(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - ASSERT_EQ(0U, success_.count(request.get()));
|
| - // The pointer doesn't really belong to us. It belongs to
|
| - // the test case which passed it to ExtractFeatures above.
|
| - success_[request.release()] = success;
|
| + void ExtractFeaturesDone(bool success, ClientPhishingRequest* request) {
|
| + ASSERT_EQ(0U, success_.count(request));
|
| + success_[request] = success;
|
| if (--num_pending_ == 0) {
|
| base::MessageLoop::current()->Quit();
|
| }
|
|
|