Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
index c3009742c9e143bd20497604a15b782234a39c1e..cdead8dba2f77f4205ae55364cc7d56ba2623a49 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
@@ -5,6 +5,7 @@ |
#include "chrome/renderer/safe_browsing/phishing_dom_feature_extractor.h" |
#include <memory> |
+#include <unordered_map> |
#include "base/bind.h" |
#include "base/callback.h" |
@@ -50,7 +51,7 @@ class TestPhishingDOMFeatureExtractor : public PhishingDOMFeatureExtractor { |
void SetDocumentDomain(std::string domain) { base_domain_ = domain; } |
void SetURLToFrameDomainCheckingMap( |
- const base::hash_map<std::string, std::string>& checking_map) { |
+ const std::unordered_map<std::string, std::string>& checking_map) { |
url_to_frame_domain_map_ = checking_map; |
} |
@@ -122,7 +123,7 @@ class TestPhishingDOMFeatureExtractor : public PhishingDOMFeatureExtractor { |
// If html contains multiple frame/iframe, we track domain of each frame by |
// using this map, where keys are the urls mentioned in the html content, |
// values are the domains of the corresponding frames. |
- base::hash_map<std::string, std::string> url_to_frame_domain_map_; |
+ std::unordered_map<std::string, std::string> url_to_frame_domain_map_; |
}; |
class TestChromeContentRendererClient : public ChromeContentRendererClient { |
@@ -154,7 +155,8 @@ class PhishingDOMFeatureExtractorTest : public ChromeRenderViewTest { |
void ExtractFeaturesAcrossFrames( |
const std::string& html_content, |
FeatureMap* features, |
- const base::hash_map<std::string, std::string>& url_frame_domain_map) { |
+ const std::unordered_map<std::string, std::string>& |
+ url_frame_domain_map) { |
extractor_->SetURLToFrameDomainCheckingMap(url_frame_domain_map); |
LoadHTML(html_content.c_str()); |
@@ -375,7 +377,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, SubFrames) { |
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now())); |
const char urlprefix[] = "data:text/html;charset=utf-8,"; |
- base::hash_map<std::string, std::string> url_iframe_map; |
+ std::unordered_map<std::string, std::string> url_iframe_map; |
std::string iframe1_nested_html( |
"<html><body><input type=password>" |
"<a href=\"https://host3.com/submit\">link</a>" |