Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
index 9decd2afe9b3c472cb8bbbe16e71647a11265074..75edf9bcd7ca1180c87d62ad2348c8b9a8a07abd 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
@@ -52,6 +52,8 @@ using content::InterstitialPage; |
using content::NavigationController; |
using content::WebContents; |
+namespace safe_browsing { |
+ |
namespace { |
const char kEmptyPage[] = "empty.html"; |
@@ -92,7 +94,7 @@ class FakeSafeBrowsingDatabaseManager : public TestSafeBrowsingDatabaseManager { |
std::vector<GURL>(1, gurl), |
std::vector<SBFullHash>(), |
client, |
- safe_browsing::MALWARE, |
+ MALWARE, |
expected_threats); |
sb_check.url_results[0] = badurls[gurl.spec()]; |
sb_check.OnSafeBrowsingResult(); |
@@ -744,7 +746,7 @@ IN_PROC_BROWSER_TEST_P(SafeBrowsingBlockingPageBrowserTest, |
if (expect_malware_details) { |
malware_report_sent_runner->Run(); |
std::string serialized = GetReportSent(); |
- safe_browsing::ClientMalwareReportRequest report; |
+ ClientMalwareReportRequest report; |
ASSERT_TRUE(report.ParseFromString(serialized)); |
// Verify the report is complete. |
EXPECT_TRUE(report.complete()); |
@@ -1023,3 +1025,5 @@ INSTANTIATE_TEST_CASE_P(SafeBrowsingBlockingPageIDNTestWithThreatType, |
testing::Values(SB_THREAT_TYPE_URL_MALWARE, |
SB_THREAT_TYPE_URL_PHISHING, |
SB_THREAT_TYPE_URL_UNWANTED)); |
+ |
+} // namespace safe_browsing |