| Index: chrome/browser/ui/app_list/search/common/webservice_search_provider.cc
|
| diff --git a/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc b/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc
|
| index a7bcf57f4b61af1434e7f52ccad6b907b1d07bb6..32e64c17af6ea1ec57f62b1e6dab0b52e286b0e9 100644
|
| --- a/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc
|
| +++ b/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc
|
| @@ -71,7 +71,7 @@ bool WebserviceSearchProvider::IsSensitiveInput(const base::string16& query) {
|
| // file, we shouldn't send it. Sending such things is a waste of time and a
|
| // disclosure of potentially private, local data. If the scheme is OK, we
|
| // still need to check other cases below.
|
| - if (LowerCaseEqualsASCII(query_as_url.scheme(), url::kFileScheme))
|
| + if (base::LowerCaseEqualsASCII(query_as_url.scheme(), url::kFileScheme))
|
| return true;
|
|
|
| // Don't send URLs with usernames, queries or refs. Some of these are
|
| @@ -90,7 +90,7 @@ bool WebserviceSearchProvider::IsSensitiveInput(const base::string16& query) {
|
| // Don't send anything for https except the hostname. Hostnames are OK
|
| // because they are visible when the TCP connection is established, but the
|
| // specific path may reveal private information.
|
| - if (LowerCaseEqualsASCII(query_as_url.scheme(), url::kHttpsScheme) &&
|
| + if (base::LowerCaseEqualsASCII(query_as_url.scheme(), url::kHttpsScheme) &&
|
| !query_as_url.path().empty() && query_as_url.path() != "/") {
|
| return true;
|
| }
|
|
|