| Index: chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc b/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| index 8f79a697d786f44e46911bd40a47dfa2ef7615b1..62b74dbf7358f7314a8752b1df302d1fdd64da0c 100644
|
| --- a/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| @@ -250,7 +250,7 @@ TEST_F(SafeBrowsingModuleVerifierWinTest,
|
| &disk_code_addr,
|
| &code_size));
|
|
|
| - const size_t kModificationSize = 256;
|
| + const int kModificationSize = 256;
|
| // Write the modification at the end so it's not overlapping relocations
|
| const size_t modification_offset = code_size - kModificationSize;
|
| ScopedModuleModifier<kModificationSize> mod(
|
| @@ -299,7 +299,7 @@ TEST_F(SafeBrowsingModuleVerifierWinTest, DISABLED_VerifyModuleRelocOverlap) {
|
| &code_size));
|
|
|
| // Modify the first hunk of the code, which contains many relocs.
|
| - const size_t kModificationSize = 256;
|
| + const int kModificationSize = 256;
|
| ScopedModuleModifier<kModificationSize> mod(mem_code_addr);
|
|
|
| state.Clear();
|
| @@ -314,7 +314,8 @@ TEST_F(SafeBrowsingModuleVerifierWinTest, DISABLED_VerifyModuleRelocOverlap) {
|
| // Modifications across the relocs should have been coalesced into one.
|
| ASSERT_EQ(1, state.modification_size());
|
| ASSERT_EQ(kModificationSize, state.modification(0).byte_count());
|
| - ASSERT_EQ(kModificationSize, state.modification(0).modified_bytes().size());
|
| + ASSERT_EQ(static_cast<size_t>(kModificationSize),
|
| + state.modification(0).modified_bytes().size());
|
| EXPECT_EQ(std::string(mem_code_addr, mem_code_addr + kModificationSize),
|
| state.modification(0).modified_bytes());
|
| }
|
|
|