Index: extensions/common/csp_validator.cc |
diff --git a/extensions/common/csp_validator.cc b/extensions/common/csp_validator.cc |
index 2a28ebb98563698f4598c495e4933239be02a55a..ced436e95d6e4896e7b92e6e6c939f208b6830ce 100644 |
--- a/extensions/common/csp_validator.cc |
+++ b/extensions/common/csp_validator.cc |
@@ -57,7 +57,7 @@ struct DirectiveStatus { |
bool isNonWildcardTLD(const std::string& url, |
const std::string& scheme_and_separator, |
bool should_check_rcd) { |
- if (!StartsWithASCII(url, scheme_and_separator, true)) |
+ if (!base::StartsWithASCII(url, scheme_and_separator, true)) |
return false; |
size_t start_of_host = scheme_and_separator.length(); |
@@ -133,14 +133,14 @@ void GetSecureDirectiveValues(const std::string& directive_name, |
base::LowerCaseEqualsASCII(source, "blob:") || |
base::LowerCaseEqualsASCII(source, "filesystem:") || |
base::LowerCaseEqualsASCII(source, "http://localhost") || |
- StartsWithASCII(source, "http://127.0.0.1:", true) || |
- StartsWithASCII(source, "http://localhost:", true) || |
+ base::StartsWithASCII(source, "http://127.0.0.1:", true) || |
+ base::StartsWithASCII(source, "http://localhost:", true) || |
isNonWildcardTLD(source, "https://", true) || |
isNonWildcardTLD(source, "chrome://", false) || |
isNonWildcardTLD(source, std::string(extensions::kExtensionScheme) + |
url::kStandardSchemeSeparator, |
false) || |
- StartsWithASCII(source, "chrome-extension-resource:", true)) { |
+ base::StartsWithASCII(source, "chrome-extension-resource:", true)) { |
is_secure_csp_token = true; |
} else if ((options & OPTIONS_ALLOW_UNSAFE_EVAL) && |
source == "'unsafe-eval'") { |