| Index: chrome/browser/safe_browsing/download_protection_service_unittest.cc | 
| diff --git a/chrome/browser/safe_browsing/download_protection_service_unittest.cc b/chrome/browser/safe_browsing/download_protection_service_unittest.cc | 
| index 91cf222b7e4a1029336f995f5d7d7a8710e1c580..9175ed1c4b3544954c5434d296a29910553f1494 100644 | 
| --- a/chrome/browser/safe_browsing/download_protection_service_unittest.cc | 
| +++ b/chrome/browser/safe_browsing/download_protection_service_unittest.cc | 
| @@ -118,7 +118,7 @@ ACTION_P(TrustSignature, certificate_file) { | 
| // Add a certificate chain.  Note that we add the certificate twice so that | 
| // it appears as its own issuer. | 
| std::string cert_data; | 
| -  ASSERT_TRUE(file_util::ReadFileToString(certificate_file, &cert_data)); | 
| +  ASSERT_TRUE(base::ReadFileToString(certificate_file, &cert_data)); | 
| ClientDownloadRequest_CertificateChain* chain = | 
| arg1->add_certificate_chain(); | 
| chain->add_element()->set_certificate(cert_data); | 
| @@ -239,8 +239,8 @@ class DownloadProtectionServiceTest : public testing::Test { | 
| scoped_refptr<net::X509Certificate> ReadTestCertificate( | 
| const std::string& filename) { | 
| std::string cert_data; | 
| -    if (!file_util::ReadFileToString(testdata_path_.AppendASCII(filename), | 
| -                                     &cert_data)) { | 
| +    if (!base::ReadFileToString(testdata_path_.AppendASCII(filename), | 
| +                                &cert_data)) { | 
| return NULL; | 
| } | 
| net::CertificateList certs = | 
|  |