Index: chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
index ec5e253dd09f3e20493de2728016fe7477770cac..0649de8fe7f1d6683e858012ce5ea6b45a350324 100644 |
--- a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
@@ -78,7 +78,7 @@ class PhishingTermFeatureExtractorTest : public ::testing::Test { |
// Runs the TermFeatureExtractor on |page_text|, waiting for the |
// completion callback. Returns the success boolean from the callback. |
- bool ExtractFeatures(const string16* page_text, FeatureMap* features) { |
+ bool ExtractFeatures(const base::string16* page_text, FeatureMap* features) { |
success_ = false; |
extractor_->ExtractFeatures( |
page_text, |
@@ -89,7 +89,8 @@ class PhishingTermFeatureExtractorTest : public ::testing::Test { |
return success_; |
} |
- void PartialExtractFeatures(const string16* page_text, FeatureMap* features) { |
+ void PartialExtractFeatures(const base::string16* page_text, |
+ FeatureMap* features) { |
extractor_->ExtractFeatures( |
page_text, |
features, |
@@ -125,7 +126,7 @@ TEST_F(PhishingTermFeatureExtractorTest, ExtractFeatures) { |
// This test doesn't exercise the extraction timing. |
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now())); |
- string16 page_text = ASCIIToUTF16("blah"); |
+ base::string16 page_text = ASCIIToUTF16("blah"); |
FeatureMap expected_features; // initially empty |
FeatureMap features; |
@@ -178,7 +179,7 @@ TEST_F(PhishingTermFeatureExtractorTest, ExtractFeatures) { |
ExpectFeatureMapsAreEqual(features, expected_features); |
// Test with empty page text. |
- page_text = string16(); |
+ page_text = base::string16(); |
expected_features.Clear(); |
features.Clear(); |
ASSERT_TRUE(ExtractFeatures(&page_text, &features)); |
@@ -204,7 +205,7 @@ TEST_F(PhishingTermFeatureExtractorTest, Continuation) { |
// This page has a total of 30 words. For the features to be computed |
// correctly, the extractor has to process the entire string of text. |
- string16 page_text(ASCIIToUTF16("one ")); |
+ base::string16 page_text(ASCIIToUTF16("one ")); |
for (int i = 0; i < 28; ++i) { |
page_text.append(ASCIIToUTF16(base::StringPrintf("%d ", i))); |
} |
@@ -272,7 +273,8 @@ TEST_F(PhishingTermFeatureExtractorTest, Continuation) { |
} |
TEST_F(PhishingTermFeatureExtractorTest, PartialExtractionTest) { |
- scoped_ptr<string16> page_text(new string16(ASCIIToUTF16("one "))); |
+ scoped_ptr<base::string16> page_text( |
+ new base::string16(ASCIIToUTF16("one "))); |
for (int i = 0; i < 28; ++i) { |
page_text->append(ASCIIToUTF16(base::StringPrintf("%d ", i))); |
} |
@@ -293,7 +295,7 @@ TEST_F(PhishingTermFeatureExtractorTest, PartialExtractionTest) { |
// Extract first 10 words then stop. |
PartialExtractFeatures(page_text.get(), &features); |
- page_text.reset(new string16()); |
+ page_text.reset(new base::string16()); |
for (int i = 30; i < 58; ++i) { |
page_text->append(ASCIIToUTF16(base::StringPrintf("%d ", i))); |
} |