Index: chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
index 4bd5e9060f9a9333d721cb4f5f5df872a8f14c01..55d3c129031e718c8415487644b46c283c5eafca 100644 |
--- a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc |
@@ -206,7 +206,7 @@ TEST_F(PhishingTermFeatureExtractorTest, Continuation) { |
// correctly, the extractor has to process the entire string of text. |
string16 page_text(ASCIIToUTF16("one ")); |
for (int i = 0; i < 28; ++i) { |
- page_text.append(ASCIIToUTF16(StringPrintf("%d ", i))); |
+ page_text.append(ASCIIToUTF16(base::StringPrintf("%d ", i))); |
} |
page_text.append(ASCIIToUTF16("two")); |
@@ -274,7 +274,7 @@ TEST_F(PhishingTermFeatureExtractorTest, Continuation) { |
TEST_F(PhishingTermFeatureExtractorTest, PartialExtractionTest) { |
scoped_ptr<string16> page_text(new string16(ASCIIToUTF16("one "))); |
for (int i = 0; i < 28; ++i) { |
- page_text->append(ASCIIToUTF16(StringPrintf("%d ", i))); |
+ page_text->append(ASCIIToUTF16(base::StringPrintf("%d ", i))); |
} |
base::TimeTicks now = base::TimeTicks::Now(); |
@@ -295,7 +295,7 @@ TEST_F(PhishingTermFeatureExtractorTest, PartialExtractionTest) { |
page_text.reset(new string16()); |
for (int i = 30; i < 58; ++i) { |
- page_text->append(ASCIIToUTF16(StringPrintf("%d ", i))); |
+ page_text->append(ASCIIToUTF16(base::StringPrintf("%d ", i))); |
} |
page_text->append(ASCIIToUTF16("multi word test ")); |
features.Clear(); |