| Index: chrome_elf/chrome_elf_constants.cc
 | 
| diff --git a/chrome_elf/chrome_elf_constants.cc b/chrome_elf/chrome_elf_constants.cc
 | 
| index 7115aaf4d14b26708978ff5c90e86da00d14af1b..fec3d170677eae61d5a807b00f0840d3347b10f9 100644
 | 
| --- a/chrome_elf/chrome_elf_constants.cc
 | 
| +++ b/chrome_elf/chrome_elf_constants.cc
 | 
| @@ -4,21 +4,9 @@
 | 
|  
 | 
|  #include "chrome_elf/chrome_elf_constants.h"
 | 
|  
 | 
| -#if defined(GOOGLE_CHROME_BUILD)
 | 
| -// Using PRODUCT_STRING_PATH will make Google Chrome and Canary configurations
 | 
| -// collide. This was deemed to be the best option due to ELF's inability to
 | 
| -// depend on BrowserDistribution. http://crbug.com/577820
 | 
| -#define PRODUCT_STRING_PATH L"Google\\Chrome"
 | 
| -#elif defined(CHROMIUM_BUILD)
 | 
| -#define PRODUCT_STRING_PATH L"Chromium"
 | 
| -#else
 | 
| -#error Unknown branding
 | 
| -#endif
 | 
| -
 | 
|  namespace blacklist {
 | 
|  
 | 
| -const wchar_t kRegistryBeaconPath[] =
 | 
| -    L"SOFTWARE\\" PRODUCT_STRING_PATH L"\\BLBeacon";
 | 
| +const wchar_t kRegistryBeaconKeyName[] = L"\\BLBeacon";
 | 
|  const wchar_t kBeaconVersion[] = L"version";
 | 
|  const wchar_t kBeaconState[] = L"state";
 | 
|  const wchar_t kBeaconAttemptCount[] = L"failed_count";
 | 
| @@ -29,9 +17,6 @@ const DWORD kBeaconMaxAttempts = 2;
 | 
|  
 | 
|  namespace elf_sec {
 | 
|  
 | 
| -const wchar_t kRegSecurityFinchPath[] =
 | 
| -    L"SOFTWARE\\" PRODUCT_STRING_PATH L"\\BrowserSboxFinch";
 | 
| -const wchar_t kRegSecurityPath[] =
 | 
| -    L"SOFTWARE\\" PRODUCT_STRING_PATH L"\\BrowserSec";
 | 
| +const wchar_t kRegSecurityFinchKeyName[] = L"\\BrowserSboxFinch";
 | 
|  
 | 
|  }  // namespace elf_sec
 | 
| 
 |