Index: net/http/http_auth_sspi_win_unittest.cc |
diff --git a/net/http/http_auth_sspi_win_unittest.cc b/net/http/http_auth_sspi_win_unittest.cc |
index feebaf0cee1e0664151e9fd5c671ee4b3c51eafd..103d0c29e82c02cc094e647d10e3e83048f14f47 100644 |
--- a/net/http/http_auth_sspi_win_unittest.cc |
+++ b/net/http/http_auth_sspi_win_unittest.cc |
@@ -48,7 +48,7 @@ TEST(HttpAuthSSPITest, DetermineMaxTokenLength_Normal) { |
ULONG max_token_length = kMaxTokenLength; |
int rv = DetermineMaxTokenLength(&mock_library, L"NTLM", &max_token_length); |
EXPECT_EQ(OK, rv); |
- EXPECT_EQ(1337, max_token_length); |
+ EXPECT_EQ(1337u, max_token_length); |
} |
TEST(HttpAuthSSPITest, DetermineMaxTokenLength_InvalidPackage) { |
@@ -60,7 +60,7 @@ TEST(HttpAuthSSPITest, DetermineMaxTokenLength_InvalidPackage) { |
EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, rv); |
// |DetermineMaxTokenLength()| interface states that |max_token_length| should |
// not change on failure. |
- EXPECT_EQ(100, max_token_length); |
+ EXPECT_EQ(100u, max_token_length); |
} |
TEST(HttpAuthSSPITest, ParseChallenge_FirstRound) { |