| Index: chrome/browser/importer/nss_decryptor.cc
 | 
| diff --git a/chrome/browser/importer/nss_decryptor.cc b/chrome/browser/importer/nss_decryptor.cc
 | 
| index 4d5a385a85702c9d1e359de8bce90bbcfa1dd95e..44398137170e191ce50bff119195cd1057836164 100644
 | 
| --- a/chrome/browser/importer/nss_decryptor.cc
 | 
| +++ b/chrome/browser/importer/nss_decryptor.cc
 | 
| @@ -12,9 +12,9 @@
 | 
|  #include "base/string_split.h"
 | 
|  #include "base/string_util.h"
 | 
|  #include "base/utf_string_conversions.h"
 | 
| +#include "content/public/common/password_form.h"
 | 
|  #include "sql/connection.h"
 | 
|  #include "sql/statement.h"
 | 
| -#include "webkit/forms/password_form.h"
 | 
|  
 | 
|  #if defined(USE_NSS)
 | 
|  #include <pk11pub.h>
 | 
| @@ -112,7 +112,7 @@ string16 NSSDecryptor::Decrypt(const std::string& crypt) const {
 | 
|  // http://kb.mozillazine.org/Signons3.txt
 | 
|  void NSSDecryptor::ParseSignons(
 | 
|      const std::string& content,
 | 
| -    std::vector<webkit::forms::PasswordForm>* forms) {
 | 
| +    std::vector<content::PasswordForm>* forms) {
 | 
|    forms->clear();
 | 
|  
 | 
|    // Splits the file content into lines.
 | 
| @@ -141,7 +141,7 @@ void NSSDecryptor::ParseSignons(
 | 
|    // Reads never-saved list. Domains are stored one per line.
 | 
|    size_t i;
 | 
|    for (i = 1; i < lines.size() && lines[i].compare(".") != 0; ++i) {
 | 
| -    webkit::forms::PasswordForm form;
 | 
| +    content::PasswordForm form;
 | 
|      form.origin = GURL(lines[i]).ReplaceComponents(rep);
 | 
|      form.signon_realm = form.origin.GetOrigin().spec();
 | 
|      form.blacklisted_by_user = true;
 | 
| @@ -163,7 +163,7 @@ void NSSDecryptor::ParseSignons(
 | 
|      if (end - begin < 5)
 | 
|        continue;
 | 
|  
 | 
| -    webkit::forms::PasswordForm form;
 | 
| +    content::PasswordForm form;
 | 
|  
 | 
|      // The first line is the site URL.
 | 
|      // For HTTP authentication logins, the URL may contain http realm,
 | 
| @@ -233,7 +233,7 @@ void NSSDecryptor::ParseSignons(
 | 
|  }
 | 
|  
 | 
|  bool NSSDecryptor::ReadAndParseSignons(const FilePath& sqlite_file,
 | 
| -    std::vector<webkit::forms::PasswordForm>* forms) {
 | 
| +    std::vector<content::PasswordForm>* forms) {
 | 
|    sql::Connection db;
 | 
|    if (!db.Open(sqlite_file))
 | 
|      return false;
 | 
| @@ -250,7 +250,7 @@ bool NSSDecryptor::ReadAndParseSignons(const FilePath& sqlite_file,
 | 
|    rep.ClearPassword();
 | 
|    // Read domains for which passwords are never saved.
 | 
|    while (s.Step()) {
 | 
| -    webkit::forms::PasswordForm form;
 | 
| +    content::PasswordForm form;
 | 
|      form.origin = GURL(s.ColumnString(0)).ReplaceComponents(rep);
 | 
|      form.signon_realm = form.origin.GetOrigin().spec();
 | 
|      form.blacklisted_by_user = true;
 | 
| @@ -281,7 +281,7 @@ bool NSSDecryptor::ReadAndParseSignons(const FilePath& sqlite_file,
 | 
|      if (!url.is_valid())
 | 
|        continue;
 | 
|  
 | 
| -    webkit::forms::PasswordForm form;
 | 
| +    content::PasswordForm form;
 | 
|      form.origin = url.ReplaceComponents(rep);
 | 
|      form.signon_realm = form.origin.GetOrigin().spec();
 | 
|      if (!realm.empty())
 | 
| 
 |