Index: chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
index 082cf0db8759732d8753fe40b552dc80de52b7cb..a3c3b4b1ad78489a681fa305b29faafdeaddf6ef 100644 |
--- a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
@@ -280,7 +280,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, Navigation) { |
// Test an initial load. We expect classification to happen normally. |
EXPECT_CALL(*classifier_, CancelPendingClassification()).Times(2); |
- std::string port = base::IntToString(embedded_test_server_->port()); |
+ std::string port = base::UintToString(embedded_test_server_->port()); |
std::string html = "<html><body><iframe src=\"http://sub1.com:"; |
html += port; |
html += "/\"></iframe></body></html>"; |
@@ -545,7 +545,7 @@ IN_PROC_BROWSER_TEST_F(PhishingClassifierDelegateTest, |
Mock::VerifyAndClearExpectations(classifier_); |
std::string url_str = "http://host4.com:"; |
- url_str += base::IntToString(embedded_test_server_->port()); |
+ url_str += base::UintToString(embedded_test_server_->port()); |
url_str += "/redir"; |
OnStartPhishingDetection(GURL(url_str)); |
page_text = ASCIIToUTF16("123"); |