| Index: chrome/browser/sync/glue/sync_backend_host.cc | 
| diff --git a/chrome/browser/sync/glue/sync_backend_host.cc b/chrome/browser/sync/glue/sync_backend_host.cc | 
| index 88208764d49f15f18ec1a5464a58cc8f88623aa4..15e79670aa2f3f5301c7bc83178357f17b0f4b4e 100644 | 
| --- a/chrome/browser/sync/glue/sync_backend_host.cc | 
| +++ b/chrome/browser/sync/glue/sync_backend_host.cc | 
| @@ -272,7 +272,7 @@ class SyncBackendHost::Core | 
|  | 
| // The loop where all the sync backend operations happen. | 
| // Non-NULL only between calls to DoInitialize() and DoShutdown(). | 
| -  MessageLoop* sync_loop_; | 
| +  base::MessageLoop* sync_loop_; | 
|  | 
| // Our parent's registrar (not owned).  Non-NULL only between | 
| // calls to DoInitialize() and DoShutdown(). | 
| @@ -353,7 +353,7 @@ SyncBackendHost::SyncBackendHost( | 
| const base::WeakPtr<invalidation::InvalidatorStorage>& invalidator_storage) | 
| : weak_ptr_factory_(this), | 
| sync_thread_("Chrome_SyncThread"), | 
| -      frontend_loop_(MessageLoop::current()), | 
| +      frontend_loop_(base::MessageLoop::current()), | 
| profile_(profile), | 
| name_(name), | 
| core_(new Core(name, profile_->GetPath().Append(kSyncDataFolderName), | 
| @@ -372,7 +372,7 @@ SyncBackendHost::SyncBackendHost( | 
| SyncBackendHost::SyncBackendHost(Profile* profile) | 
| : weak_ptr_factory_(this), | 
| sync_thread_("Chrome_SyncThread"), | 
| -      frontend_loop_(MessageLoop::current()), | 
| +      frontend_loop_(base::MessageLoop::current()), | 
| profile_(profile), | 
| name_("Unknown"), | 
| initialization_state_(NOT_ATTEMPTED), | 
| @@ -478,7 +478,7 @@ void SyncBackendHost::UpdateCredentials(const SyncCredentials& credentials) { | 
|  | 
| void SyncBackendHost::UpdateRegisteredInvalidationIds( | 
| const syncer::ObjectIdSet& ids) { | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| DCHECK(sync_thread_.IsRunning()); | 
| sync_thread_.message_loop()->PostTask(FROM_HERE, | 
| base::Bind(&SyncBackendHost::Core::DoUpdateRegisteredInvalidationIds, | 
| @@ -487,7 +487,7 @@ void SyncBackendHost::UpdateRegisteredInvalidationIds( | 
|  | 
| void SyncBackendHost::AcknowledgeInvalidation( | 
| const invalidation::ObjectId& id, const syncer::AckHandle& ack_handle) { | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| DCHECK(sync_thread_.IsRunning()); | 
| sync_thread_.message_loop()->PostTask(FROM_HERE, | 
| base::Bind(&SyncBackendHost::Core::DoAcknowledgeInvalidation, | 
| @@ -518,7 +518,7 @@ void SyncBackendHost::SetEncryptionPassphrase(const std::string& passphrase, | 
| DCHECK(!passphrase.empty()); | 
|  | 
| // This should only be called by the frontend. | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
|  | 
| // SetEncryptionPassphrase should never be called if we are currently | 
| // encrypted with an explicit passphrase. | 
| @@ -542,7 +542,7 @@ bool SyncBackendHost::SetDecryptionPassphrase(const std::string& passphrase) { | 
| DCHECK(!passphrase.empty()); | 
|  | 
| // This should only be called by the frontend. | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
|  | 
| // This should only be called when we have cached pending keys. | 
| DCHECK(cached_pending_keys_.has_blob()); | 
| @@ -591,7 +591,7 @@ void SyncBackendHost::StopSyncManagerForShutdown( | 
| } | 
|  | 
| void SyncBackendHost::StopSyncingForShutdown() { | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
|  | 
| // Immediately stop sending messages to the frontend. | 
| frontend_ = NULL; | 
| @@ -848,7 +848,7 @@ void SyncBackendHost::FinishConfigureDataTypesOnFrontendLoop( | 
| syncer::ModelTypeSet)>& ready_task) { | 
| if (!frontend_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| if (!ready_task.is_null()) | 
| ready_task.Run(succeeded_configuration_types, failed_configuration_types); | 
| } | 
| @@ -906,7 +906,7 @@ void SyncBackendHost::Observe( | 
| } | 
|  | 
| SyncBackendHost::DoInitializeOptions::DoInitializeOptions( | 
| -    MessageLoop* sync_loop, | 
| +    base::MessageLoop* sync_loop, | 
| SyncBackendRegistrar* registrar, | 
| const syncer::ModelSafeRoutingInfo& routing_info, | 
| const std::vector<syncer::ModelSafeWorker*>& workers, | 
| @@ -970,7 +970,7 @@ void SyncBackendHost::Core::OnSyncCycleCompleted( | 
| const SyncSessionSnapshot& snapshot) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
|  | 
| host_.Call( | 
| FROM_HERE, | 
| @@ -1000,7 +1000,7 @@ void SyncBackendHost::Core::DoDownloadControlTypes( | 
| } | 
|  | 
| void SyncBackendHost::Core::DoRefreshTypes(syncer::ModelTypeSet types) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| sync_manager_->RefreshTypes(types); | 
| } | 
|  | 
| @@ -1015,7 +1015,7 @@ void SyncBackendHost::Core::OnInitializationComplete( | 
| debug_info_listener, | 
| bool success, | 
| const syncer::ModelTypeSet restored_types) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
|  | 
| if (!success) { | 
| DoDestroySyncManager(); | 
| @@ -1047,7 +1047,7 @@ void SyncBackendHost::Core::OnConnectionStatusChange( | 
| syncer::ConnectionStatus status) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call( | 
| FROM_HERE, | 
| &SyncBackendHost::HandleConnectionStatusChangeOnFrontendLoop, status); | 
| @@ -1058,7 +1058,7 @@ void SyncBackendHost::Core::OnPassphraseRequired( | 
| const sync_pb::EncryptedData& pending_keys) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call( | 
| FROM_HERE, | 
| &SyncBackendHost::NotifyPassphraseRequired, reason, pending_keys); | 
| @@ -1067,7 +1067,7 @@ void SyncBackendHost::Core::OnPassphraseRequired( | 
| void SyncBackendHost::Core::OnPassphraseAccepted() { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call( | 
| FROM_HERE, | 
| &SyncBackendHost::NotifyPassphraseAccepted); | 
| @@ -1078,7 +1078,7 @@ void SyncBackendHost::Core::OnBootstrapTokenUpdated( | 
| syncer::BootstrapTokenType type) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call(FROM_HERE, | 
| &SyncBackendHost::PersistEncryptionBootstrapToken, | 
| bootstrap_token, | 
| @@ -1088,7 +1088,7 @@ void SyncBackendHost::Core::OnBootstrapTokenUpdated( | 
| void SyncBackendHost::Core::OnStopSyncingPermanently() { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call( | 
| FROM_HERE, | 
| &SyncBackendHost::HandleStopSyncingPermanentlyOnFrontendLoop); | 
| @@ -1097,7 +1097,7 @@ void SyncBackendHost::Core::OnStopSyncingPermanently() { | 
| void SyncBackendHost::Core::OnUpdatedToken(const std::string& token) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call( | 
| FROM_HERE, | 
| &SyncBackendHost::NotifyUpdatedToken, token); | 
| @@ -1108,7 +1108,7 @@ void SyncBackendHost::Core::OnEncryptedTypesChanged( | 
| bool encrypt_everything) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| // NOTE: We're in a transaction. | 
| host_.Call( | 
| FROM_HERE, | 
| @@ -1119,7 +1119,7 @@ void SyncBackendHost::Core::OnEncryptedTypesChanged( | 
| void SyncBackendHost::Core::OnEncryptionComplete() { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| // NOTE: We're in a transaction. | 
| host_.Call( | 
| FROM_HERE, | 
| @@ -1143,7 +1143,7 @@ void SyncBackendHost::Core::OnActionableError( | 
| const syncer::SyncProtocolError& sync_error) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call( | 
| FROM_HERE, | 
| &SyncBackendHost::HandleActionableErrorEventOnFrontendLoop, | 
| @@ -1154,7 +1154,7 @@ void SyncBackendHost::Core::OnInvalidatorStateChange( | 
| syncer::InvalidatorState state) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call(FROM_HERE, | 
| &SyncBackendHost::HandleInvalidatorStateChangeOnFrontendLoop, | 
| state); | 
| @@ -1164,7 +1164,7 @@ void SyncBackendHost::Core::OnIncomingInvalidation( | 
| const syncer::ObjectIdInvalidationMap& invalidation_map) { | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call(FROM_HERE, | 
| &SyncBackendHost::HandleIncomingInvalidationOnFrontendLoop, | 
| invalidation_map); | 
| @@ -1244,7 +1244,7 @@ void SyncBackendHost::Core::DoInitialize(const DoInitializeOptions& options) { | 
|  | 
| void SyncBackendHost::Core::DoUpdateCredentials( | 
| const SyncCredentials& credentials) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| // UpdateCredentials can be called during backend initialization, possibly | 
| // when backend initialization has failed but hasn't notified the UI thread | 
| // yet. In that case, the sync manager may have been destroyed on the sync | 
| @@ -1256,7 +1256,7 @@ void SyncBackendHost::Core::DoUpdateCredentials( | 
|  | 
| void SyncBackendHost::Core::DoUpdateRegisteredInvalidationIds( | 
| const syncer::ObjectIdSet& ids) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| // |sync_manager_| may end up being NULL here in tests (in | 
| // synchronous initialization mode) since this is called during | 
| // shutdown. | 
| @@ -1269,7 +1269,7 @@ void SyncBackendHost::Core::DoUpdateRegisteredInvalidationIds( | 
|  | 
| void SyncBackendHost::Core::DoAcknowledgeInvalidation( | 
| const invalidation::ObjectId& id, const syncer::AckHandle& ack_handle) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| // |sync_manager_| may end up being NULL here in tests (in | 
| // synchronous initialization mode). | 
| // | 
| @@ -1281,20 +1281,20 @@ void SyncBackendHost::Core::DoAcknowledgeInvalidation( | 
|  | 
| void SyncBackendHost::Core::DoStartSyncing( | 
| const syncer::ModelSafeRoutingInfo& routing_info) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| sync_manager_->StartSyncingNormally(routing_info); | 
| } | 
|  | 
| void SyncBackendHost::Core::DoSetEncryptionPassphrase( | 
| const std::string& passphrase, | 
| bool is_explicit) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| sync_manager_->GetEncryptionHandler()->SetEncryptionPassphrase( | 
| passphrase, is_explicit); | 
| } | 
|  | 
| void SyncBackendHost::Core::DoInitialProcessControlTypes() { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
|  | 
| DVLOG(1) << "Initilalizing Control Types"; | 
|  | 
| @@ -1347,13 +1347,13 @@ void SyncBackendHost::Core::DoFinishInitialProcessControlTypes() { | 
|  | 
| void SyncBackendHost::Core::DoSetDecryptionPassphrase( | 
| const std::string& passphrase) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| sync_manager_->GetEncryptionHandler()->SetDecryptionPassphrase( | 
| passphrase); | 
| } | 
|  | 
| void SyncBackendHost::Core::DoEnableEncryptEverything() { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| sync_manager_->GetEncryptionHandler()->EnableEncryptEverything(); | 
| } | 
|  | 
| @@ -1367,7 +1367,7 @@ void SyncBackendHost::Core::DoStopSyncManagerForShutdown( | 
| } | 
|  | 
| void SyncBackendHost::Core::DoShutdown(bool sync_disabled) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| // It's safe to do this even if the type was never activated. | 
| registrar_->DeactivateDataType(syncer::DEVICE_INFO); | 
| synced_device_tracker_.reset(); | 
| @@ -1385,7 +1385,7 @@ void SyncBackendHost::Core::DoShutdown(bool sync_disabled) { | 
| } | 
|  | 
| void SyncBackendHost::Core::DoDestroySyncManager() { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| if (sync_manager_) { | 
| save_changes_timer_.reset(); | 
| if (registered_as_invalidation_handler_) { | 
| @@ -1406,7 +1406,7 @@ void SyncBackendHost::Core::DoConfigureSyncer( | 
| const base::Callback<void(syncer::ModelTypeSet, | 
| syncer::ModelTypeSet)>& ready_task, | 
| const base::Closure& retry_callback) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| sync_manager_->ConfigureSyncer( | 
| reason, | 
| types_to_config, | 
| @@ -1425,7 +1425,7 @@ void SyncBackendHost::Core::DoFinishConfigureDataTypes( | 
| syncer::ModelTypeSet types_to_config, | 
| const base::Callback<void(syncer::ModelTypeSet, | 
| syncer::ModelTypeSet)>& ready_task) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
|  | 
| // Update the enabled types for the bridge and sync manager. | 
| syncer::ModelSafeRoutingInfo routing_info; | 
| @@ -1446,14 +1446,14 @@ void SyncBackendHost::Core::DoFinishConfigureDataTypes( | 
|  | 
| void SyncBackendHost::Core::DoRetryConfiguration( | 
| const base::Closure& retry_callback) { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| host_.Call(FROM_HERE, | 
| &SyncBackendHost::RetryConfigurationOnFrontendLoop, | 
| retry_callback); | 
| } | 
|  | 
| void SyncBackendHost::Core::DeleteSyncDataFolder() { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| if (file_util::DirectoryExists(sync_data_folder_path_)) { | 
| if (!file_util::Delete(sync_data_folder_path_, true)) | 
| SLOG(DFATAL) << "Could not delete the Sync Data folder."; | 
| @@ -1464,7 +1464,7 @@ void SyncBackendHost::Core::StartSavingChanges() { | 
| // We may already be shut down. | 
| if (!sync_loop_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| DCHECK(!save_changes_timer_.get()); | 
| save_changes_timer_.reset(new base::RepeatingTimer<Core>()); | 
| save_changes_timer_->Start(FROM_HERE, | 
| @@ -1473,7 +1473,7 @@ void SyncBackendHost::Core::StartSavingChanges() { | 
| } | 
|  | 
| void SyncBackendHost::Core::SaveChanges() { | 
| -  DCHECK_EQ(MessageLoop::current(), sync_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), sync_loop_); | 
| sync_manager_->SaveChanges(); | 
| } | 
|  | 
| @@ -1485,7 +1485,7 @@ void SyncBackendHost::AddExperimentalTypes() { | 
| } | 
|  | 
| void SyncBackendHost::HandleControlTypesDownloadRetry() { | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| if (!frontend_) | 
| return; | 
|  | 
| @@ -1498,7 +1498,7 @@ void SyncBackendHost::HandleInitializationCompletedOnFrontendLoop( | 
| if (!frontend_) | 
| return; | 
|  | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| if (!success) { | 
| js_backend_.Reset(); | 
| initialization_state_ = NOT_INITIALIZED; | 
| @@ -1525,7 +1525,7 @@ void SyncBackendHost::HandleSyncCycleCompletedOnFrontendLoop( | 
| const SyncSessionSnapshot& snapshot) { | 
| if (!frontend_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
|  | 
| last_snapshot_ = snapshot; | 
|  | 
| @@ -1566,7 +1566,7 @@ void SyncBackendHost::HandleActionableErrorEventOnFrontendLoop( | 
| const syncer::SyncProtocolError& sync_error) { | 
| if (!frontend_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| frontend_->OnActionableError(sync_error); | 
| } | 
|  | 
| @@ -1574,7 +1574,7 @@ void SyncBackendHost::HandleInvalidatorStateChangeOnFrontendLoop( | 
| syncer::InvalidatorState state) { | 
| if (!frontend_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| frontend_->OnInvalidatorStateChange(state); | 
| } | 
|  | 
| @@ -1582,7 +1582,7 @@ void SyncBackendHost::HandleIncomingInvalidationOnFrontendLoop( | 
| const syncer::ObjectIdInvalidationMap& invalidation_map) { | 
| if (!frontend_) | 
| return; | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| frontend_->OnIncomingInvalidation(invalidation_map); | 
| } | 
|  | 
| @@ -1604,7 +1604,7 @@ void SyncBackendHost::NotifyPassphraseRequired( | 
| if (!frontend_) | 
| return; | 
|  | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
|  | 
| // Update our cache of the cryptographer's pending keys. | 
| cached_pending_keys_ = pending_keys; | 
| @@ -1616,7 +1616,7 @@ void SyncBackendHost::NotifyPassphraseAccepted() { | 
| if (!frontend_) | 
| return; | 
|  | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
|  | 
| // Clear our cache of the cryptographer's pending keys. | 
| cached_pending_keys_.clear_blob(); | 
| @@ -1638,7 +1638,7 @@ void SyncBackendHost::NotifyEncryptedTypesChanged( | 
| if (!frontend_) | 
| return; | 
|  | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| frontend_->OnEncryptedTypesChanged( | 
| encrypted_types, encrypt_everything); | 
| } | 
| @@ -1647,14 +1647,14 @@ void SyncBackendHost::NotifyEncryptionComplete() { | 
| if (!frontend_) | 
| return; | 
|  | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| frontend_->OnEncryptionComplete(); | 
| } | 
|  | 
| void SyncBackendHost::HandlePassphraseTypeChangedOnFrontendLoop( | 
| syncer::PassphraseType type, | 
| base::Time explicit_passphrase_time) { | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
| DVLOG(1) << "Passphrase type changed to " | 
| << syncer::PassphraseTypeToString(type); | 
| cached_passphrase_type_ = type; | 
| @@ -1672,7 +1672,7 @@ void SyncBackendHost::HandleConnectionStatusChangeOnFrontendLoop( | 
| if (!frontend_) | 
| return; | 
|  | 
| -  DCHECK_EQ(MessageLoop::current(), frontend_loop_); | 
| +  DCHECK_EQ(base::MessageLoop::current(), frontend_loop_); | 
|  | 
| DVLOG(1) << "Connection status changed: " | 
| << syncer::ConnectionStatusToString(status); | 
|  |