Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
index 6719fe8fa0a7cad8f7f3b0513311237491a1a17e..b2645eb598b0b560940923c2f87a3c8c3ee642bc 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
@@ -205,7 +205,7 @@ IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, FormFeatures) { |
std::string("http://other.com/")); |
expected_features.AddBooleanFeature(features::kPageActionURL + |
std::string("http://host.com:") + |
- base::IntToString(embedded_test_server_->port()) + |
+ base::UintToString(embedded_test_server_->port()) + |
std::string("/query")); |
FeatureMap features; |
@@ -289,7 +289,7 @@ IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, LinkFeatures) { |
// The PhishingDOMFeatureExtractor depends on URLs being domains and not IPs, |
// so use a domain. |
std::string url_str = "https://host.com:"; |
- url_str += base::IntToString(https_server.host_port_pair().port()); |
+ url_str += base::UintToString(https_server.host_port_pair().port()); |
url_str += "/files/safe_browsing/secure_link_features.html"; |
ui_test_utils::NavigateToURL(browser(), GURL(url_str)); |
@@ -340,7 +340,7 @@ IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, |
// The PhishingDOMFeatureExtractor depends on URLs being domains and not IPs, |
// so use a domain. |
std::string url_str = "https://host.com:"; |
- url_str += base::IntToString(https_server.host_port_pair().port()); |
+ url_str += base::UintToString(https_server.host_port_pair().port()); |
url_str += "/files/safe_browsing/secure_script_and_image.html"; |
ui_test_utils::NavigateToURL(browser(), GURL(url_str)); |
@@ -360,7 +360,7 @@ IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, SubFrames) { |
// Test that features are aggregated across all frames. |
- std::string port = base::IntToString(embedded_test_server_->port()); |
+ std::string port = base::UintToString(embedded_test_server_->port()); |
responses_[GetURL("host2.com", "").spec()] = |
"<html><head><script></script><body>" |
"<form action=\"http://host4.com/\"><input type=checkbox></form>" |
@@ -474,7 +474,7 @@ IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, MAYBE_Continuation) { |
expected_features.AddRealFeature(features::kPageActionOtherDomainFreq, 0.5); |
expected_features.AddBooleanFeature(features::kPageActionURL + |
std::string("http://host.com:") + |
- base::IntToString(embedded_test_server_->port()) + |
+ base::UintToString(embedded_test_server_->port()) + |
std::string("/ondomain")); |
expected_features.AddBooleanFeature(features::kPageActionURL + |
std::string("http://host2.com/")); |