Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
index 176e712b3b0f58a8da4577c0aecdb60bbf14669b..7dfe7af708753bd160fea5798fee47eeedd68e4c 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
@@ -50,6 +50,8 @@ using content::OpenURLParams; |
using content::Referrer; |
using content::WebContents; |
+namespace safe_browsing { |
+ |
namespace { |
// For malware interstitial pages, we link the problematic URL to Google's |
@@ -90,7 +92,7 @@ const char kReportPhishingErrorUrl[] = |
const char kReportPhishingErrorTrial[] = "SafeBrowsingReportPhishingErrorLink"; |
const char kReportPhishingErrorEnabled[] = "Enabled"; |
-base::LazyInstance<SafeBrowsingBlockingPage::UnsafeResourceMap> |
+base::LazyInstance<safe_browsing::SafeBrowsingBlockingPage::UnsafeResourceMap> |
mattm
2015/11/12 00:36:05
unnecessary safe_browsing::
vakh (old account. dont use)
2015/11/12 09:27:42
Done.
|
g_unsafe_resource_map = LAZY_INSTANCE_INITIALIZER; |
} // namespace |
@@ -724,3 +726,5 @@ void SafeBrowsingBlockingPage::PopulatePhishingLoadTimeData( |
PopulateExtendedReportingOption(load_time_data); |
} |
+ |
+} // namespace safe_browsing |