| Index: content/browser/frame_host/mixed_content_navigation_throttle.cc | 
| diff --git a/content/browser/frame_host/mixed_content_navigation_throttle.cc b/content/browser/frame_host/mixed_content_navigation_throttle.cc | 
| index a267d39e9084fcf3f86fb684029d14e06694e3de..a35ff370ebc4efbe118e709b01444c56ae196124 100644 | 
| --- a/content/browser/frame_host/mixed_content_navigation_throttle.cc | 
| +++ b/content/browser/frame_host/mixed_content_navigation_throttle.cc | 
| @@ -24,9 +24,9 @@ | 
| #include "url/url_constants.h" | 
| #include "url/url_util.h" | 
|  | 
| -namespace { | 
| +namespace content { | 
|  | 
| -using namespace content; | 
| +namespace { | 
|  | 
| // Should return the same value as SchemeRegistry::shouldTreatURLSchemeAsSecure. | 
| bool IsSecureScheme(const std::string& scheme) { | 
| @@ -41,9 +41,9 @@ bool ShouldTreatURLSchemeAsCORSEnabled(const GURL& url) { | 
|  | 
| // Should return the same value as SecurityOrigin::isSecure. | 
| // TODO(carlosk): secure origin checks don't match between content and Blink | 
| -// hence this implementation here instead of a direct call to IsOriginSecure (in | 
| -// origin_util.cc). See https://crbug.com/629059. | 
| -bool IsOriginSecure(const GURL& url) { | 
| +// hence this implementation here instead of a direct call to | 
| +// content::IsOriginSecure (in origin_util.cc). See https://crbug.com/629059. | 
| +bool IsSecureOriginForMixedContent(const GURL& url) { | 
| if (IsSecureScheme(url.scheme())) | 
| return true; | 
|  | 
| @@ -62,9 +62,10 @@ bool IsOriginSecure(const GURL& url) { | 
| bool IsUrlPotentiallySecure(const GURL& url) { | 
| // blob: and filesystem: URLs never hit the network, and access is restricted | 
| // to same-origin contexts, so they are not blocked. | 
| -  bool is_secure = | 
| -      url.SchemeIs(url::kBlobScheme) || url.SchemeIs(url::kFileSystemScheme) || | 
| -      IsOriginSecure(url) || IsPotentiallyTrustworthyOrigin(url::Origin(url)); | 
| +  bool is_secure = url.SchemeIs(url::kBlobScheme) || | 
| +                   url.SchemeIs(url::kFileSystemScheme) || | 
| +                   IsSecureOriginForMixedContent(url) || | 
| +                   IsPotentiallyTrustworthyOrigin(url::Origin(url)); | 
|  | 
| // TODO(mkwst): Remove this once the following draft is implemented: | 
| // https://tools.ietf.org/html/draft-west-let-localhost-be-localhost-03. See: | 
| @@ -107,8 +108,6 @@ void UpdateRendererOnMixedContentFound(NavigationHandleImpl* navigation_handle, | 
|  | 
| }  // namespace | 
|  | 
| -namespace content { | 
| - | 
| // static | 
| std::unique_ptr<NavigationThrottle> | 
| MixedContentNavigationThrottle::CreateThrottleForNavigation( | 
| @@ -127,26 +126,27 @@ MixedContentNavigationThrottle::MixedContentNavigationThrottle( | 
|  | 
| MixedContentNavigationThrottle::~MixedContentNavigationThrottle() {} | 
|  | 
| -ThrottleCheckResult MixedContentNavigationThrottle::WillStartRequest() { | 
| +NavigationThrottle::ThrottleCheckResult | 
| +MixedContentNavigationThrottle::WillStartRequest() { | 
| bool should_block = ShouldBlockNavigation(false); | 
| -  return should_block ? ThrottleCheckResult::CANCEL | 
| -                      : ThrottleCheckResult::PROCEED; | 
| +  return should_block ? CANCEL : PROCEED; | 
| } | 
|  | 
| -ThrottleCheckResult MixedContentNavigationThrottle::WillRedirectRequest() { | 
| +NavigationThrottle::ThrottleCheckResult | 
| +MixedContentNavigationThrottle::WillRedirectRequest() { | 
| // Upon redirects the same checks are to be executed as for requests. | 
| bool should_block = ShouldBlockNavigation(true); | 
| -  return should_block ? ThrottleCheckResult::CANCEL | 
| -                      : ThrottleCheckResult::PROCEED; | 
| +  return should_block ? CANCEL : PROCEED; | 
| } | 
|  | 
| -ThrottleCheckResult MixedContentNavigationThrottle::WillProcessResponse() { | 
| +NavigationThrottle::ThrottleCheckResult | 
| +MixedContentNavigationThrottle::WillProcessResponse() { | 
| // TODO(carlosk): At this point we are about to process the request response. | 
| // So if we ever need to, here/now it is a good moment to check for the final | 
| // attained security level of the connection. For instance, does it use an | 
| // outdated protocol? The implementation should be based off | 
| // MixedContentChecker::handleCertificateError. See https://crbug.com/576270. | 
| -  return ThrottleCheckResult::PROCEED; | 
| +  return PROCEED; | 
| } | 
|  | 
| const char* MixedContentNavigationThrottle::GetNameForLogging() { | 
| @@ -294,7 +294,7 @@ FrameTreeNode* MixedContentNavigationThrottle::InWhichFrameIsContentMixed( | 
| mixed_content_features_.insert( | 
| MIXED_CONTENT_IN_NON_HTTPS_FRAME_THAT_RESTRICTS_MIXED_CONTENT); | 
| } | 
| -  } else if (!IsOriginSecure(url) && | 
| +  } else if (!IsSecureOriginForMixedContent(url) && | 
| (IsSecureScheme(root->current_origin().scheme()) || | 
| IsSecureScheme(parent->current_origin().scheme()))) { | 
| mixed_content_features_.insert( | 
|  |