Index: components/omnibox/search_provider.cc |
diff --git a/components/omnibox/search_provider.cc b/components/omnibox/search_provider.cc |
index 670debf1d3814e84a53f021148f752217a761492..e97e7f09302160f4873e7784974334e0ab634d8f 100644 |
--- a/components/omnibox/search_provider.cc |
+++ b/components/omnibox/search_provider.cc |
@@ -732,9 +732,9 @@ bool SearchProvider::IsQueryPotentionallyPrivate() const { |
// and happens to currently be invalid -- in which case we again want to run |
// our checks below. Other QUERY cases are less likely to be URLs and thus we |
// assume we're OK. |
- if (!LowerCaseEqualsASCII(input_.scheme(), url::kHttpScheme) && |
- !LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) && |
- !LowerCaseEqualsASCII(input_.scheme(), url::kFtpScheme)) |
+ if (!base::LowerCaseEqualsASCII(input_.scheme(), url::kHttpScheme) && |
+ !base::LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) && |
+ !base::LowerCaseEqualsASCII(input_.scheme(), url::kFtpScheme)) |
return (input_.type() != metrics::OmniboxInputType::QUERY); |
// Don't send URLs with usernames, queries or refs. Some of these are |
@@ -756,7 +756,7 @@ bool SearchProvider::IsQueryPotentionallyPrivate() const { |
// Don't send anything for https except the hostname. Hostnames are OK |
// because they are visible when the TCP connection is established, but the |
// specific path may reveal private information. |
- if (LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) && |
+ if (base::LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) && |
parts.path.is_nonempty()) |
return true; |