| Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
| diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
| index dd3c3b2eec7f28c02cd45794cfa0870940dde48e..a8be9a4bab05e21c65d386e739221c0149c11313 100644
|
| --- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
| +++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
| @@ -39,6 +39,7 @@
|
| #include "net/base/escape.h"
|
| #include "ui/base/l10n/l10n_util.h"
|
| #include "ui/base/resource/resource_bundle.h"
|
| +#include "ui/base/resource/resource_handle.h"
|
|
|
| using content::BrowserThread;
|
| using content::InterstitialPage;
|
| @@ -195,20 +196,23 @@ std::string SafeBrowsingBlockingPage::GetHTMLContents() {
|
| if (unsafe_resources_.size() > 1) {
|
| PopulateMultipleThreatStringDictionary(&strings);
|
| html = rb.GetRawDataResource(
|
| - IDR_SAFE_BROWSING_MULTIPLE_THREAT_BLOCK).as_string();
|
| + IDR_SAFE_BROWSING_MULTIPLE_THREAT_BLOCK,
|
| + ui::ResourceHandle::kScaleFactorNone).as_string();
|
| } else {
|
| SafeBrowsingService::UrlCheckResult threat_type =
|
| unsafe_resources_[0].threat_type;
|
| if (threat_type == SafeBrowsingService::URL_MALWARE) {
|
| PopulateMalwareStringDictionary(&strings);
|
| html = rb.GetRawDataResource(
|
| - IDR_SAFE_BROWSING_MALWARE_BLOCK).as_string();
|
| + IDR_SAFE_BROWSING_MALWARE_BLOCK,
|
| + ui::ResourceHandle::kScaleFactorNone).as_string();
|
| } else { // Phishing.
|
| DCHECK(threat_type == SafeBrowsingService::URL_PHISHING ||
|
| threat_type == SafeBrowsingService::CLIENT_SIDE_PHISHING_URL);
|
| PopulatePhishingStringDictionary(&strings);
|
| html = rb.GetRawDataResource(
|
| - IDR_SAFE_BROWSING_PHISHING_BLOCK).as_string();
|
| + IDR_SAFE_BROWSING_PHISHING_BLOCK,
|
| + ui::ResourceHandle::kScaleFactorNone).as_string();
|
| }
|
| }
|
|
|
|
|