Index: chrome/browser/download/download_target_determiner_unittest.cc |
diff --git a/chrome/browser/download/download_target_determiner_unittest.cc b/chrome/browser/download/download_target_determiner_unittest.cc |
index 0418af8a10e9d8795d40daebc57dfa36c6b6409a..a0b8cdee625a9e5af8fb652bccfcec4a7ab4f773 100644 |
--- a/chrome/browser/download/download_target_determiner_unittest.cc |
+++ b/chrome/browser/download/download_target_determiner_unittest.cc |
@@ -2104,22 +2104,6 @@ TEST_F(DownloadTargetDeterminerTestWithPlugin, |
target_info = RunDownloadTargetDeterminer( |
GetPathInDownloadDir(kInitialPath), item.get()); |
EXPECT_FALSE(target_info->is_filetype_handled_safely); |
- |
- // Now register an unsandboxed PPAPI plugin. This plugin should not be |
- // considered secure. |
- ScopedRegisterInternalPlugin ppapi_unsandboxed_plugin( |
- plugin_service, |
- content::WebPluginInfo::PLUGIN_TYPE_PEPPER_UNSANDBOXED, |
- test_download_dir().AppendASCII("ppapi-nosandbox"), |
- kTestMIMEType, |
- "fakeext"); |
- EXPECT_CALL(mock_plugin_filter_, |
- MockPluginAvailable(ppapi_unsandboxed_plugin.path())) |
- .WillRepeatedly(Return(true)); |
- |
- target_info = RunDownloadTargetDeterminer( |
- GetPathInDownloadDir(kInitialPath), item.get()); |
- EXPECT_FALSE(target_info->is_filetype_handled_safely); |
} |
// Check if secure handling of filetypes is determined correctly for NPAPI |