Index: chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
index 927e8efe8c40e464d6c092ebfa3ba9055f0a762e..b1bf368fc462ed597044b76c6ee908410b182c16 100644 |
--- a/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc |
@@ -142,7 +142,7 @@ TEST_F(PhishingClassifierDelegateTest, Navigation) { |
// Currently, we do not start a new classification after subframe loads. |
EXPECT_CALL(*classifier, CancelPendingClassification()); |
GetMainFrame()->firstChild()->loadRequest( |
- WebKit::WebURLRequest(GURL("http://sub2.com/"))); |
+ blink::WebURLRequest(GURL("http://sub2.com/"))); |
message_loop_.Run(); |
Mock::VerifyAndClearExpectations(classifier); |
OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
@@ -180,7 +180,7 @@ TEST_F(PhishingClassifierDelegateTest, Navigation) { |
// Note: in practice, the browser will not send a StartPhishingDetection IPC |
// in this case. However, we want to make sure that the delegate behaves |
// correctly regardless. |
- WebKit::WebHistoryItem forward_item = GetMainFrame()->currentHistoryItem(); |
+ blink::WebHistoryItem forward_item = GetMainFrame()->currentHistoryItem(); |
EXPECT_CALL(*classifier, CancelPendingClassification()); |
GoBack(); |
Mock::VerifyAndClearExpectations(classifier); |