| Index: components/omnibox/search_provider.cc
|
| diff --git a/components/omnibox/search_provider.cc b/components/omnibox/search_provider.cc
|
| index 670debf1d3814e84a53f021148f752217a761492..e97e7f09302160f4873e7784974334e0ab634d8f 100644
|
| --- a/components/omnibox/search_provider.cc
|
| +++ b/components/omnibox/search_provider.cc
|
| @@ -732,9 +732,9 @@ bool SearchProvider::IsQueryPotentionallyPrivate() const {
|
| // and happens to currently be invalid -- in which case we again want to run
|
| // our checks below. Other QUERY cases are less likely to be URLs and thus we
|
| // assume we're OK.
|
| - if (!LowerCaseEqualsASCII(input_.scheme(), url::kHttpScheme) &&
|
| - !LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) &&
|
| - !LowerCaseEqualsASCII(input_.scheme(), url::kFtpScheme))
|
| + if (!base::LowerCaseEqualsASCII(input_.scheme(), url::kHttpScheme) &&
|
| + !base::LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) &&
|
| + !base::LowerCaseEqualsASCII(input_.scheme(), url::kFtpScheme))
|
| return (input_.type() != metrics::OmniboxInputType::QUERY);
|
|
|
| // Don't send URLs with usernames, queries or refs. Some of these are
|
| @@ -756,7 +756,7 @@ bool SearchProvider::IsQueryPotentionallyPrivate() const {
|
| // Don't send anything for https except the hostname. Hostnames are OK
|
| // because they are visible when the TCP connection is established, but the
|
| // specific path may reveal private information.
|
| - if (LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) &&
|
| + if (base::LowerCaseEqualsASCII(input_.scheme(), url::kHttpsScheme) &&
|
| parts.path.is_nonempty())
|
| return true;
|
|
|
|
|