| Index: crypto/hmac_unittest.cc
|
| diff --git a/crypto/hmac_unittest.cc b/crypto/hmac_unittest.cc
|
| index 174c32382fae83aa8f863ff42c81ba98899cb9dd..91eccd68e231d4cc712624678681d69c3b0b1dfd 100644
|
| --- a/crypto/hmac_unittest.cc
|
| +++ b/crypto/hmac_unittest.cc
|
| @@ -142,7 +142,7 @@ TEST(HMACTest, RFC2202TestCases) {
|
| "\xBB\xFF\x1A\x91" }
|
| };
|
|
|
| - for (size_t i = 0; i < ARRAYSIZE_UNSAFE(cases); ++i) {
|
| + for (size_t i = 0; i < arraysize(cases); ++i) {
|
| crypto::HMAC hmac(crypto::HMAC::SHA1);
|
| ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(cases[i].key),
|
| cases[i].key_len));
|
| @@ -239,7 +239,7 @@ TEST(HMACTest, HMACObjectReuse) {
|
| ASSERT_TRUE(
|
| hmac.Init(reinterpret_cast<const unsigned char*>(kSimpleKey),
|
| kSimpleKeyLength));
|
| - for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kSimpleHmacCases); ++i) {
|
| + for (size_t i = 0; i < arraysize(kSimpleHmacCases); ++i) {
|
| std::string data_string(kSimpleHmacCases[i].data,
|
| kSimpleHmacCases[i].data_len);
|
| unsigned char digest[kSHA1DigestSize];
|
| @@ -254,7 +254,7 @@ TEST(HMACTest, Verify) {
|
| hmac.Init(reinterpret_cast<const unsigned char*>(kSimpleKey),
|
| kSimpleKeyLength));
|
| const char empty_digest[kSHA1DigestSize] = { 0 };
|
| - for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kSimpleHmacCases); ++i) {
|
| + for (size_t i = 0; i < arraysize(kSimpleHmacCases); ++i) {
|
| // Expected results
|
| EXPECT_TRUE(hmac.Verify(
|
| base::StringPiece(kSimpleHmacCases[i].data,
|
|
|