diff options
author | rafaelw@chromium.org <rafaelw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-05-26 01:52:40 +0000 |
---|---|---|
committer | rafaelw@chromium.org <rafaelw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-05-26 01:52:40 +0000 |
commit | 2fbc33967abe8fd301a1c0ce35a625ed98bf41f9 (patch) | |
tree | 2993e976c8470926d9e7f46a1da099c6045eecde /sandbox/src/interception_unittest.cc | |
parent | b33f1d943fd420857d9c5988ce1f4598f9a8765a (diff) | |
download | chromium_src-2fbc33967abe8fd301a1c0ce35a625ed98bf41f9.zip chromium_src-2fbc33967abe8fd301a1c0ce35a625ed98bf41f9.tar.gz chromium_src-2fbc33967abe8fd301a1c0ce35a625ed98bf41f9.tar.bz2 |
Revert "Another dependency the bbot missed!!!"
This reverts commit 161f7fd3bdd425167af9fe26fdc5373a2ff44c98.
Revert "Missed a file as part of checkin for r48186"
This reverts commit cff86beba5938209393a6c3bccced62a7f3ff36b.
Revert "Enable warning 4389 as an error on windows builds. This will make"
This reverts commit c78936bcfc65b98edf288191d927a495b0364621.
TBR=mbelshe
Review URL: http://codereview.chromium.org/2253001
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@48238 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/src/interception_unittest.cc')
-rw-r--r-- | sandbox/src/interception_unittest.cc | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/sandbox/src/interception_unittest.cc b/sandbox/src/interception_unittest.cc index 604db06..883cc91 100644 --- a/sandbox/src/interception_unittest.cc +++ b/sandbox/src/interception_unittest.cc @@ -1,4 +1,4 @@ -// Copyright (c) 2010 The Chromium Authors. All rights reserved. +// Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. @@ -37,20 +37,20 @@ void WalkBuffer(void* buffer, size_t size, int* num_dlls, int* num_functions, DllPatchInfo *dll = &memory->dll_list[0]; for (int i = 0; i < memory->num_intercepted_dlls; i++) { - ASSERT_NE(0u, wcslen(dll->dll_name)); - ASSERT_EQ(0u, dll->record_bytes % sizeof(size_t)); - ASSERT_EQ(0u, dll->offset_to_functions % sizeof(size_t)); + ASSERT_NE(0, wcslen(dll->dll_name)); + ASSERT_EQ(0, dll->record_bytes % sizeof(size_t)); + ASSERT_EQ(0, dll->offset_to_functions % sizeof(size_t)); ASSERT_NE(0, dll->num_functions); FunctionInfo *function = reinterpret_cast<FunctionInfo*>( reinterpret_cast<char*>(dll) + dll->offset_to_functions); for (int j = 0; j < dll->num_functions; j++) { - ASSERT_EQ(0u, function->record_bytes % sizeof(size_t)); + ASSERT_EQ(0, function->record_bytes % sizeof(size_t)); char* name = function->function; size_t length = strlen(name); - ASSERT_NE(0u, length); + ASSERT_NE(0, length); name += length + 1; // look for overflows @@ -77,7 +77,7 @@ void WalkBuffer(void* buffer, size_t size, int* num_dlls, int* num_functions, TEST(InterceptionManagerTest, BufferLayout1) { wchar_t exe_name[MAX_PATH]; - ASSERT_NE(0u, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); + ASSERT_NE(0, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); TargetProcess *target = MakeTestTargetProcess(::GetCurrentProcess(), ::GetModuleHandle(exe_name)); @@ -164,7 +164,7 @@ TEST(InterceptionManagerTest, BufferLayout1) { TEST(InterceptionManagerTest, BufferLayout2) { wchar_t exe_name[MAX_PATH]; - ASSERT_NE(0u, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); + ASSERT_NE(0, GetModuleFileName(NULL, exe_name, MAX_PATH - 1)); TargetProcess *target = MakeTestTargetProcess(::GetCurrentProcess(), ::GetModuleHandle(exe_name)); |