chore: update docs/dyn (#1106)

diff --git a/docs/dyn/safebrowsing_v4.fullHashes.html b/docs/dyn/safebrowsing_v4.fullHashes.html
index b5c82c0..293fc07 100644
--- a/docs/dyn/safebrowsing_v4.fullHashes.html
+++ b/docs/dyn/safebrowsing_v4.fullHashes.html
@@ -95,35 +95,35 @@
     The object takes the form of:
 
 { # Request to return full hashes matched by the provided hash prefixes.
-    "clientStates": [ # The current client states for each of the client's local threat lists.
-      "A String",
-    ],
     "apiClient": { # The client metadata associated with Safe Browsing API requests. # Client metadata associated with callers of higher-level APIs built on top of the client's implementation.
       "clientVersion": "A String", # The version of the client implementation.
       "clientId": "A String", # A client ID that (hopefully) uniquely identifies the client implementation of the Safe Browsing API.
     },
+    "client": { # The client metadata associated with Safe Browsing API requests. # The client metadata.
+      "clientVersion": "A String", # The version of the client implementation.
+      "clientId": "A String", # A client ID that (hopefully) uniquely identifies the client implementation of the Safe Browsing API.
+    },
     "threatInfo": { # The information regarding one or more threats that a client submits when checking for matches in threat lists. # The lists and hashes to be checked.
       "threatTypes": [ # The threat types to be checked.
         "A String",
       ],
+      "platformTypes": [ # The platform types to be checked.
+        "A String",
+      ],
       "threatEntries": [ # The threat entries to be checked.
         { # An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set.
           "url": "A String", # A URL.
-          "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
           "digest": "A String", # The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded.
+          "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
         },
       ],
       "threatEntryTypes": [ # The entry types to be checked.
         "A String",
       ],
-      "platformTypes": [ # The platform types to be checked.
-        "A String",
-      ],
     },
-    "client": { # The client metadata associated with Safe Browsing API requests. # The client metadata.
-      "clientVersion": "A String", # The version of the client implementation.
-      "clientId": "A String", # A client ID that (hopefully) uniquely identifies the client implementation of the Safe Browsing API.
-    },
+    "clientStates": [ # The current client states for each of the client's local threat lists.
+      "A String",
+    ],
   }
 
   x__xgafv: string, V1 error format.
@@ -135,29 +135,29 @@
   An object of the form:
 
     {
-    "minimumWaitDuration": "A String", # The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want.
     "matches": [ # The full hashes that matched the requested prefixes.
       { # A match when checking a threat entry in the Safe Browsing threat lists.
-        "threatEntryType": "A String", # The threat entry type matching this threat.
-        "threat": { # An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set. # The threat matching this threat.
-          "url": "A String", # A URL.
-          "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
-          "digest": "A String", # The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded.
-        },
-        "threatType": "A String", # The threat type matching this threat.
         "threatEntryMetadata": { # The metadata associated with a specific threat entry. The client is expected to know the metadata key/value pairs associated with each threat type. # Optional metadata associated with this threat.
           "entries": [ # The metadata entries.
             { # A single metadata entry.
-              "value": "A String", # The metadata entry value. For JSON requests, the value is base64-encoded.
               "key": "A String", # The metadata entry key. For JSON requests, the key is base64-encoded.
+              "value": "A String", # The metadata entry value. For JSON requests, the value is base64-encoded.
             },
           ],
         },
-        "platformType": "A String", # The platform type matching this threat.
         "cacheDuration": "A String", # The cache lifetime for the returned match. Clients must not cache this response for more than this duration to avoid false positives.
+        "threatType": "A String", # The threat type matching this threat.
+        "threatEntryType": "A String", # The threat entry type matching this threat.
+        "threat": { # An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set. # The threat matching this threat.
+          "url": "A String", # A URL.
+          "digest": "A String", # The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded.
+          "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
+        },
+        "platformType": "A String", # The platform type matching this threat.
       },
     ],
     "negativeCacheDuration": "A String", # For requested entities that did not match the threat list, how long to cache the response.
+    "minimumWaitDuration": "A String", # The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want.
   }</pre>
 </div>