| Index: chrome/browser/safe_browsing/protocol_manager.cc
|
| diff --git a/chrome/browser/safe_browsing/protocol_manager.cc b/chrome/browser/safe_browsing/protocol_manager.cc
|
| index 658453b666c42ead3a3373358dd75f8c08ce8a5b..745a9d7fb19accfe351db101641b30a5d4ba21ae 100644
|
| --- a/chrome/browser/safe_browsing/protocol_manager.cc
|
| +++ b/chrome/browser/safe_browsing/protocol_manager.cc
|
| @@ -18,7 +18,6 @@
|
| #include "base/timer/timer.h"
|
| #include "chrome/browser/safe_browsing/protocol_parser.h"
|
| #include "chrome/common/env_vars.h"
|
| -#include "components/safe_browsing_db/util.h"
|
| #include "components/variations/variations_associated_data.h"
|
| #include "google_apis/google_api_keys.h"
|
| #include "net/base/escape.h"
|
| @@ -632,10 +631,10 @@
|
| bool found_phishing = false;
|
| for (size_t i = 0; i < lists.size(); ++i) {
|
| update_list_data_.append(safe_browsing::FormatList(lists[i]));
|
| - if (lists[i].name == safe_browsing::kPhishingList)
|
| + if (lists[i].name == safe_browsing_util::kPhishingList)
|
| found_phishing = true;
|
|
|
| - if (lists[i].name == safe_browsing::kMalwareList)
|
| + if (lists[i].name == safe_browsing_util::kMalwareList)
|
| found_malware = true;
|
| }
|
|
|
| @@ -646,11 +645,11 @@
|
| // removed.
|
| if (!found_phishing) {
|
| update_list_data_.append(safe_browsing::FormatList(
|
| - SBListChunkRanges(safe_browsing::kPhishingList)));
|
| + SBListChunkRanges(safe_browsing_util::kPhishingList)));
|
| }
|
| if (!found_malware) {
|
| update_list_data_.append(safe_browsing::FormatList(
|
| - SBListChunkRanges(safe_browsing::kMalwareList)));
|
| + SBListChunkRanges(safe_browsing_util::kMalwareList)));
|
| }
|
|
|
| // Large requests are (probably) a sign of database corruption.
|
|
|