| Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
|
| diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
|
| index 9decd2afe9b3c472cb8bbbe16e71647a11265074..75edf9bcd7ca1180c87d62ad2348c8b9a8a07abd 100644
|
| --- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
|
| +++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
|
| @@ -52,6 +52,8 @@ using content::InterstitialPage;
|
| using content::NavigationController;
|
| using content::WebContents;
|
|
|
| +namespace safe_browsing {
|
| +
|
| namespace {
|
|
|
| const char kEmptyPage[] = "empty.html";
|
| @@ -92,7 +94,7 @@ class FakeSafeBrowsingDatabaseManager : public TestSafeBrowsingDatabaseManager {
|
| std::vector<GURL>(1, gurl),
|
| std::vector<SBFullHash>(),
|
| client,
|
| - safe_browsing::MALWARE,
|
| + MALWARE,
|
| expected_threats);
|
| sb_check.url_results[0] = badurls[gurl.spec()];
|
| sb_check.OnSafeBrowsingResult();
|
| @@ -744,7 +746,7 @@ IN_PROC_BROWSER_TEST_P(SafeBrowsingBlockingPageBrowserTest,
|
| if (expect_malware_details) {
|
| malware_report_sent_runner->Run();
|
| std::string serialized = GetReportSent();
|
| - safe_browsing::ClientMalwareReportRequest report;
|
| + ClientMalwareReportRequest report;
|
| ASSERT_TRUE(report.ParseFromString(serialized));
|
| // Verify the report is complete.
|
| EXPECT_TRUE(report.complete());
|
| @@ -1023,3 +1025,5 @@ INSTANTIATE_TEST_CASE_P(SafeBrowsingBlockingPageIDNTestWithThreatType,
|
| testing::Values(SB_THREAT_TYPE_URL_MALWARE,
|
| SB_THREAT_TYPE_URL_PHISHING,
|
| SB_THREAT_TYPE_URL_UNWANTED));
|
| +
|
| +} // namespace safe_browsing
|
|
|