Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
index 7d4aa23952e726dff0dd65326a1445ad201e916c..b08ed6160d0f9d2ffcf5bead7c31ce15c35343ae 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
@@ -52,6 +52,8 @@ using content::InterstitialPage; |
using content::NavigationController; |
using content::WebContents; |
+namespace safe_browsing { |
+ |
namespace { |
const char kEmptyPage[] = "empty.html"; |
@@ -92,7 +94,7 @@ class FakeSafeBrowsingDatabaseManager : public TestSafeBrowsingDatabaseManager { |
std::vector<GURL>(1, gurl), |
std::vector<SBFullHash>(), |
client, |
- safe_browsing::MALWARE, |
+ MALWARE, |
expected_threats); |
sb_check.url_results[0] = badurls[gurl.spec()]; |
sb_check.OnSafeBrowsingResult(); |
@@ -745,7 +747,7 @@ IN_PROC_BROWSER_TEST_P(SafeBrowsingBlockingPageBrowserTest, |
if (expect_threat_details) { |
threat_report_sent_runner->Run(); |
std::string serialized = GetReportSent(); |
- safe_browsing::ClientSafeBrowsingReportRequest report; |
+ ClientSafeBrowsingReportRequest report; |
ASSERT_TRUE(report.ParseFromString(serialized)); |
// Verify the report is complete. |
EXPECT_TRUE(report.complete()); |
@@ -1024,3 +1026,5 @@ INSTANTIATE_TEST_CASE_P(SafeBrowsingBlockingPageIDNTestWithThreatType, |
testing::Values(SB_THREAT_TYPE_URL_MALWARE, |
SB_THREAT_TYPE_URL_PHISHING, |
SB_THREAT_TYPE_URL_UNWANTED)); |
+ |
+} // namespace safe_browsing |