Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
index b684fabea0ff6bc0d2cd50804f7975141f408a91..9c31b74018a8a507b24012d600a82eee67067482 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
@@ -50,7 +50,7 @@ using content::OpenURLParams; |
using content::Referrer; |
using content::WebContents; |
-namespace { |
+namespace safe_browsing { |
// For malware interstitial pages, we link the problematic URL to Google's |
Nathan Parker
2015/11/05 22:00:53
Keep these in anon-namespace.
vakh (old account. dont use)
2015/11/07 01:22:56
Done.
|
// diagnostic page. |
@@ -93,8 +93,6 @@ const char kReportPhishingErrorEnabled[] = "Enabled"; |
base::LazyInstance<SafeBrowsingBlockingPage::UnsafeResourceMap> |
g_unsafe_resource_map = LAZY_INSTANCE_INITIALIZER; |
-} // namespace |
- |
// static |
SafeBrowsingBlockingPageFactory* SafeBrowsingBlockingPage::factory_ = NULL; |
@@ -716,3 +714,5 @@ void SafeBrowsingBlockingPage::PopulatePhishingLoadTimeData( |
PopulateExtendedReportingOption(load_time_data); |
} |
+ |
+} // namespace safe_browsing |