Chromium Code Reviews| Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
| diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
| index b684fabea0ff6bc0d2cd50804f7975141f408a91..9c31b74018a8a507b24012d600a82eee67067482 100644 |
| --- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
| +++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
| @@ -50,7 +50,7 @@ using content::OpenURLParams; |
| using content::Referrer; |
| using content::WebContents; |
| -namespace { |
| +namespace safe_browsing { |
| // For malware interstitial pages, we link the problematic URL to Google's |
|
Nathan Parker
2015/11/05 22:00:53
Keep these in anon-namespace.
vakh (old account. dont use)
2015/11/07 01:22:56
Done.
|
| // diagnostic page. |
| @@ -93,8 +93,6 @@ const char kReportPhishingErrorEnabled[] = "Enabled"; |
| base::LazyInstance<SafeBrowsingBlockingPage::UnsafeResourceMap> |
| g_unsafe_resource_map = LAZY_INSTANCE_INITIALIZER; |
| -} // namespace |
| - |
| // static |
| SafeBrowsingBlockingPageFactory* SafeBrowsingBlockingPage::factory_ = NULL; |
| @@ -716,3 +714,5 @@ void SafeBrowsingBlockingPage::PopulatePhishingLoadTimeData( |
| PopulateExtendedReportingOption(load_time_data); |
| } |
| + |
| +} // namespace safe_browsing |