diff options
author | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-06-02 17:49:44 +0000 |
---|---|---|
committer | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-06-02 17:49:44 +0000 |
commit | 0584423217addaba93f3faaa2801b0cd5104f495 (patch) | |
tree | a5b0168f82e58a65d014341bc4746962a3e6dee7 /chrome/browser | |
parent | 081dcf2eb9d2a2a76ec9fde0ad71b07b11b5385e (diff) | |
download | chromium_src-0584423217addaba93f3faaa2801b0cd5104f495.zip chromium_src-0584423217addaba93f3faaa2801b0cd5104f495.tar.gz chromium_src-0584423217addaba93f3faaa2801b0cd5104f495.tar.bz2 |
fix arm compile error
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@87626 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser')
-rw-r--r-- | chrome/browser/safe_browsing/client_side_detection_host_unittest.cc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc b/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc index b44ffba..4f431cf 100644 --- a/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc +++ b/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc @@ -302,7 +302,7 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteShowInterstitial) { EXPECT_TRUE(Mock::VerifyAndClear(sb_service_.get())); EXPECT_EQ(phishing_url, resource.url); EXPECT_EQ(phishing_url, resource.original_url); - EXPECT_EQ(false, resource.is_subresource); + EXPECT_FALSE(resource.is_subresource); EXPECT_EQ(SafeBrowsingService::CLIENT_SIDE_PHISHING_URL, resource.threat_type); EXPECT_EQ(contents()->GetRenderProcessHost()->id(), @@ -379,7 +379,7 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteMultiplePings) { EXPECT_TRUE(Mock::VerifyAndClear(sb_service_.get())); EXPECT_EQ(other_phishing_url, resource.url); EXPECT_EQ(other_phishing_url, resource.original_url); - EXPECT_EQ(false, resource.is_subresource); + EXPECT_FALSE(resource.is_subresource); EXPECT_EQ(SafeBrowsingService::CLIENT_SIDE_PHISHING_URL, resource.threat_type); EXPECT_EQ(contents()->GetRenderProcessHost()->id(), |