Index: sandbox/src/interception_unittest.cc |
diff --git a/sandbox/src/interception_unittest.cc b/sandbox/src/interception_unittest.cc |
index 604db06154261d4e6e2431b27b412cf917d3cdd9..883cc911b8b4ba70c517281292cc03f19ae42388 100644 |
--- a/sandbox/src/interception_unittest.cc |
+++ b/sandbox/src/interception_unittest.cc |
@@ -1,4 +1,4 @@ |
-// Copyright (c) 2010 The Chromium Authors. All rights reserved. |
+// Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
@@ -37,20 +37,20 @@ void WalkBuffer(void* buffer, size_t size, int* num_dlls, int* num_functions, |
DllPatchInfo *dll = &memory->dll_list[0]; |
for (int i = 0; i < memory->num_intercepted_dlls; i++) { |
- ASSERT_NE(0u, wcslen(dll->dll_name)); |
- ASSERT_EQ(0u, dll->record_bytes % sizeof(size_t)); |
- ASSERT_EQ(0u, dll->offset_to_functions % sizeof(size_t)); |
+ ASSERT_NE(0, wcslen(dll->dll_name)); |
+ ASSERT_EQ(0, dll->record_bytes % sizeof(size_t)); |
+ ASSERT_EQ(0, dll->offset_to_functions % sizeof(size_t)); |
ASSERT_NE(0, dll->num_functions); |
FunctionInfo *function = reinterpret_cast<FunctionInfo*>( |
reinterpret_cast<char*>(dll) + dll->offset_to_functions); |
for (int j = 0; j < dll->num_functions; j++) { |
- ASSERT_EQ(0u, function->record_bytes % sizeof(size_t)); |
+ ASSERT_EQ(0, function->record_bytes % sizeof(size_t)); |
char* name = function->function; |
size_t length = strlen(name); |
- ASSERT_NE(0u, length); |
+ ASSERT_NE(0, length); |
name += length + 1; |
// look for overflows |
@@ -77,7 +77,7 @@ void WalkBuffer(void* buffer, size_t size, int* num_dlls, int* num_functions, |
TEST(InterceptionManagerTest, BufferLayout1) { |
wchar_t exe_name[MAX_PATH]; |
- ASSERT_NE(0u, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); |
+ ASSERT_NE(0, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); |
TargetProcess *target = MakeTestTargetProcess(::GetCurrentProcess(), |
::GetModuleHandle(exe_name)); |
@@ -164,7 +164,7 @@ TEST(InterceptionManagerTest, BufferLayout1) { |
TEST(InterceptionManagerTest, BufferLayout2) { |
wchar_t exe_name[MAX_PATH]; |
- ASSERT_NE(0u, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); |
+ ASSERT_NE(0, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); |
TargetProcess *target = MakeTestTargetProcess(::GetCurrentProcess(), |
::GetModuleHandle(exe_name)); |