| Index: chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| index 082cf0db8759732d8753fe40b552dc80de52b7cb..a3c3b4b1ad78489a681fa305b29faafdeaddf6ef 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc
|
| @@ -280,7 +280,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, Navigation) {
|
|
|
| // Test an initial load. We expect classification to happen normally.
|
| EXPECT_CALL(*classifier_, CancelPendingClassification()).Times(2);
|
| - std::string port = base::IntToString(embedded_test_server_->port());
|
| + std::string port = base::UintToString(embedded_test_server_->port());
|
| std::string html = "<html><body><iframe src=\"http://sub1.com:";
|
| html += port;
|
| html += "/\"></iframe></body></html>";
|
| @@ -545,7 +545,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest,
|
| Mock::VerifyAndClearExpectations(classifier_);
|
|
|
| std::string url_str = "http://host4.com:";
|
| - url_str += base::IntToString(embedded_test_server_->port());
|
| + url_str += base::UintToString(embedded_test_server_->port());
|
| url_str += "/redir";
|
| OnStartPhishingDetection(GURL(url_str));
|
| page_text = ASCIIToUTF16("123");
|
|
|