| Index: net/http/http_auth_sspi_win_unittest.cc
|
| diff --git a/net/http/http_auth_sspi_win_unittest.cc b/net/http/http_auth_sspi_win_unittest.cc
|
| index feebaf0cee1e0664151e9fd5c671ee4b3c51eafd..103d0c29e82c02cc094e647d10e3e83048f14f47 100644
|
| --- a/net/http/http_auth_sspi_win_unittest.cc
|
| +++ b/net/http/http_auth_sspi_win_unittest.cc
|
| @@ -48,7 +48,7 @@ TEST(HttpAuthSSPITest, DetermineMaxTokenLength_Normal) {
|
| ULONG max_token_length = kMaxTokenLength;
|
| int rv = DetermineMaxTokenLength(&mock_library, L"NTLM", &max_token_length);
|
| EXPECT_EQ(OK, rv);
|
| - EXPECT_EQ(1337, max_token_length);
|
| + EXPECT_EQ(1337u, max_token_length);
|
| }
|
|
|
| TEST(HttpAuthSSPITest, DetermineMaxTokenLength_InvalidPackage) {
|
| @@ -60,7 +60,7 @@ TEST(HttpAuthSSPITest, DetermineMaxTokenLength_InvalidPackage) {
|
| EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, rv);
|
| // |DetermineMaxTokenLength()| interface states that |max_token_length| should
|
| // not change on failure.
|
| - EXPECT_EQ(100, max_token_length);
|
| + EXPECT_EQ(100u, max_token_length);
|
| }
|
|
|
| TEST(HttpAuthSSPITest, ParseChallenge_FirstRound) {
|
|
|