Index: crypto/hmac_unittest.cc |
diff --git a/crypto/hmac_unittest.cc b/crypto/hmac_unittest.cc |
index 174c32382fae83aa8f863ff42c81ba98899cb9dd..91eccd68e231d4cc712624678681d69c3b0b1dfd 100644 |
--- a/crypto/hmac_unittest.cc |
+++ b/crypto/hmac_unittest.cc |
@@ -142,7 +142,7 @@ TEST(HMACTest, RFC2202TestCases) { |
"\xBB\xFF\x1A\x91" } |
}; |
- for (size_t i = 0; i < ARRAYSIZE_UNSAFE(cases); ++i) { |
+ for (size_t i = 0; i < arraysize(cases); ++i) { |
crypto::HMAC hmac(crypto::HMAC::SHA1); |
ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(cases[i].key), |
cases[i].key_len)); |
@@ -239,7 +239,7 @@ TEST(HMACTest, HMACObjectReuse) { |
ASSERT_TRUE( |
hmac.Init(reinterpret_cast<const unsigned char*>(kSimpleKey), |
kSimpleKeyLength)); |
- for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kSimpleHmacCases); ++i) { |
+ for (size_t i = 0; i < arraysize(kSimpleHmacCases); ++i) { |
std::string data_string(kSimpleHmacCases[i].data, |
kSimpleHmacCases[i].data_len); |
unsigned char digest[kSHA1DigestSize]; |
@@ -254,7 +254,7 @@ TEST(HMACTest, Verify) { |
hmac.Init(reinterpret_cast<const unsigned char*>(kSimpleKey), |
kSimpleKeyLength)); |
const char empty_digest[kSHA1DigestSize] = { 0 }; |
- for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kSimpleHmacCases); ++i) { |
+ for (size_t i = 0; i < arraysize(kSimpleHmacCases); ++i) { |
// Expected results |
EXPECT_TRUE(hmac.Verify( |
base::StringPiece(kSimpleHmacCases[i].data, |