Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
index a4d2f7e49a80d1bb1589eada7c92d2847848eb60..333f9fff1cbf6f09bc8a9e85b9218b3bbb897413 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
@@ -12,6 +12,7 @@ |
#include "base/command_line.h" |
#include "base/i18n/rtl.h" |
#include "base/lazy_instance.h" |
+#include "base/macros.h" |
#include "base/metrics/field_trial.h" |
#include "base/metrics/histogram.h" |
#include "base/prefs/pref_service.h" |
@@ -80,7 +81,7 @@ const char kSocialEngineeringEnabled[] = "Enabled"; |
// but clicked "proceed anyway", we delay the call to |
// ThreatDetails::FinishCollection() by this much time (in |
// milliseconds). |
-const int64 kMalwareDetailsProceedDelayMilliSeconds = 3000; |
+const int64_t kMalwareDetailsProceedDelayMilliSeconds = 3000; |
// Constants for the Experience Sampling instrumentation. |
const char kEventNameMalware[] = "safebrowsing_interstitial_"; |
@@ -444,7 +445,7 @@ void SafeBrowsingBlockingPage::OnDontProceed() { |
} |
} |
-void SafeBrowsingBlockingPage::FinishThreatDetails(int64 delay_ms, |
+void SafeBrowsingBlockingPage::FinishThreatDetails(int64_t delay_ms, |
bool did_proceed, |
int num_visits) { |
if (threat_details_.get() == NULL) |