| Index: chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc
|
| index 4bd5e9060f9a9333d721cb4f5f5df872a8f14c01..55d3c129031e718c8415487644b46c283c5eafca 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_term_feature_extractor_unittest.cc
|
| @@ -206,7 +206,7 @@ TEST_F(PhishingTermFeatureExtractorTest, Continuation) {
|
| // correctly, the extractor has to process the entire string of text.
|
| string16 page_text(ASCIIToUTF16("one "));
|
| for (int i = 0; i < 28; ++i) {
|
| - page_text.append(ASCIIToUTF16(StringPrintf("%d ", i)));
|
| + page_text.append(ASCIIToUTF16(base::StringPrintf("%d ", i)));
|
| }
|
| page_text.append(ASCIIToUTF16("two"));
|
|
|
| @@ -274,7 +274,7 @@ TEST_F(PhishingTermFeatureExtractorTest, Continuation) {
|
| TEST_F(PhishingTermFeatureExtractorTest, PartialExtractionTest) {
|
| scoped_ptr<string16> page_text(new string16(ASCIIToUTF16("one ")));
|
| for (int i = 0; i < 28; ++i) {
|
| - page_text->append(ASCIIToUTF16(StringPrintf("%d ", i)));
|
| + page_text->append(ASCIIToUTF16(base::StringPrintf("%d ", i)));
|
| }
|
|
|
| base::TimeTicks now = base::TimeTicks::Now();
|
| @@ -295,7 +295,7 @@ TEST_F(PhishingTermFeatureExtractorTest, PartialExtractionTest) {
|
|
|
| page_text.reset(new string16());
|
| for (int i = 30; i < 58; ++i) {
|
| - page_text->append(ASCIIToUTF16(StringPrintf("%d ", i)));
|
| + page_text->append(ASCIIToUTF16(base::StringPrintf("%d ", i)));
|
| }
|
| page_text->append(ASCIIToUTF16("multi word test "));
|
| features.Clear();
|
|
|