Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index bb4a3e217a5a38a496ba7c7d7ea9da9f2ab4284a..58bf3e36ed02f95b3597094821260202ee853dee 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -225,7 +225,7 @@ class ChildProcessSecurityPolicyImpl::SecurityState { |
return origin_lock_ == site_gurl; |
} |
- bool CanAccessCookiesForOrigin(const GURL& gurl) { |
+ bool CanAccessDataForOrigin(const GURL& gurl) { |
if (origin_lock_.is_empty()) |
return true; |
// TODO(creis): We must pass the valid browser_context to convert hosted |
@@ -793,13 +793,13 @@ bool ChildProcessSecurityPolicyImpl::ChildProcessHasPermissionsForFile( |
return state->second->HasPermissionsForFile(file, permissions); |
} |
-bool ChildProcessSecurityPolicyImpl::CanAccessCookiesForOrigin( |
- int child_id, const GURL& gurl) { |
+bool ChildProcessSecurityPolicyImpl::CanAccessDataForOrigin(int child_id, |
+ const GURL& gurl) { |
base::AutoLock lock(lock_); |
SecurityStateMap::iterator state = security_state_.find(child_id); |
if (state == security_state_.end()) |
return false; |
- return state->second->CanAccessCookiesForOrigin(gurl); |
+ return state->second->CanAccessDataForOrigin(gurl); |
} |
void ChildProcessSecurityPolicyImpl::LockToOrigin(int child_id, |