| Index: chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| index 7628dfc691ab289c538c908296385aa9526d8152..51a23903f6b942bb0f8c9d41ca6f5b06e3895a49 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| @@ -55,7 +55,8 @@ class MockPhishingClassifier : public PhishingClassifier {
|
|
|
| virtual ~MockPhishingClassifier() {}
|
|
|
| - MOCK_METHOD2(BeginClassification, void(const string16*, const DoneCallback&));
|
| + MOCK_METHOD2(BeginClassification,
|
| + void(const base::string16*, const DoneCallback&));
|
| MOCK_METHOD0(CancelPendingClassification, void());
|
|
|
| private:
|
| @@ -174,7 +175,7 @@ class PhishingClassifierDelegateTest : public InProcessBrowserTest {
|
| base::Unretained(delegate_), url));
|
| }
|
|
|
| - void PageCaptured(string16* page_text, bool preliminary_capture) {
|
| + void PageCaptured(base::string16* page_text, bool preliminary_capture) {
|
| PostTaskToInProcessRendererAndWait(
|
| base::Bind(&PhishingClassifierDelegate::PageCaptured,
|
| base::Unretained(delegate_), page_text,
|
| @@ -271,7 +272,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, Navigation) {
|
| GURL url = LoadHtml("host.com", html);
|
| Mock::VerifyAndClearExpectations(classifier_);
|
| OnStartPhishingDetection(url);
|
| - string16 page_text = ASCIIToUTF16("dummy");
|
| + base::string16 page_text = ASCIIToUTF16("dummy");
|
| {
|
| InSequence s;
|
| EXPECT_CALL(*classifier_, CancelPendingClassification());
|
| @@ -405,7 +406,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, NoScorer) {
|
|
|
| // Queue up a pending classification, cancel it, then queue up another one.
|
| GURL url = LoadHtml("host.com", "dummy");
|
| - string16 page_text = ASCIIToUTF16("dummy");
|
| + base::string16 page_text = ASCIIToUTF16("dummy");
|
| OnStartPhishingDetection(url);
|
| PageCaptured(&page_text, false);
|
|
|
| @@ -439,7 +440,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, NoScorer_Ref) {
|
|
|
| // Queue up a pending classification, cancel it, then queue up another one.
|
| GURL url = LoadHtml("host.com", "dummy");
|
| - string16 page_text = ASCIIToUTF16("dummy");
|
| + base::string16 page_text = ASCIIToUTF16("dummy");
|
| OnStartPhishingDetection(url);
|
| PageCaptured(&page_text, false);
|
|
|
| @@ -470,7 +471,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest,
|
| EXPECT_CALL(*classifier_, CancelPendingClassification());
|
| GURL url = LoadHtml("host.com", "<html><body>phish</body></html>");
|
| Mock::VerifyAndClearExpectations(classifier_);
|
| - string16 page_text = ASCIIToUTF16("phish");
|
| + base::string16 page_text = ASCIIToUTF16("phish");
|
| EXPECT_CALL(*classifier_, CancelPendingClassification());
|
| PageCaptured(&page_text, false);
|
| Mock::VerifyAndClearExpectations(classifier_);
|
| @@ -542,7 +543,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest,
|
| GURL url = LoadHtml("host.com", "<html><body>phish</body></html>");
|
| Mock::VerifyAndClearExpectations(classifier_);
|
| OnStartPhishingDetection(url);
|
| - string16 page_text = ASCIIToUTF16("phish");
|
| + base::string16 page_text = ASCIIToUTF16("phish");
|
| PageCaptured(&page_text, true);
|
|
|
| // Once the non-preliminary capture happens, classification should begin.
|
| @@ -570,7 +571,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, DuplicatePageCapture) {
|
| GURL url = LoadHtml("host.com", "<html><body>phish</body></html>");
|
| Mock::VerifyAndClearExpectations(classifier_);
|
| OnStartPhishingDetection(url);
|
| - string16 page_text = ASCIIToUTF16("phish");
|
| + base::string16 page_text = ASCIIToUTF16("phish");
|
| {
|
| InSequence s;
|
| EXPECT_CALL(*classifier_, CancelPendingClassification());
|
| @@ -599,7 +600,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, PhishingDetectionDone) {
|
| EXPECT_CALL(*classifier_, CancelPendingClassification());
|
| GURL url = LoadHtml("host.com", "<html><body>phish</body></html>");
|
| Mock::VerifyAndClearExpectations(classifier_);
|
| - string16 page_text = ASCIIToUTF16("phish");
|
| + base::string16 page_text = ASCIIToUTF16("phish");
|
| OnStartPhishingDetection(url);
|
| {
|
| InSequence s;
|
|
|