Index: extensions/common/csp_validator.cc |
diff --git a/extensions/common/csp_validator.cc b/extensions/common/csp_validator.cc |
index 842fc80fa58431e7f2e3a37a4ddd4962c26a340d..8f9406fe196d97f42ca8fcb8615cf1de8f485849 100644 |
--- a/extensions/common/csp_validator.cc |
+++ b/extensions/common/csp_validator.cc |
@@ -292,9 +292,7 @@ std::string SanitizeContentSecurityPolicy( |
if (!tokenizer.GetNext()) |
continue; |
- std::string directive_name = tokenizer.token(); |
- base::StringToLowerASCII(&directive_name); |
- |
+ std::string directive_name = base::ToLowerASCII(tokenizer.token_piece()); |
if (UpdateStatus(directive_name, &tokenizer, &default_src_status, options, |
&sane_csp_parts, &default_src_csp_warnings)) |
continue; |
@@ -348,17 +346,14 @@ bool ContentSecurityPolicyIsSandboxed( |
if (!tokenizer.GetNext()) |
continue; |
- std::string directive_name = tokenizer.token(); |
- base::StringToLowerASCII(&directive_name); |
- |
+ std::string directive_name = base::ToLowerASCII(tokenizer.token_piece()); |
if (directive_name != kSandboxDirectiveName) |
continue; |
seen_sandbox = true; |
while (tokenizer.GetNext()) { |
- std::string token = tokenizer.token(); |
- base::StringToLowerASCII(&token); |
+ std::string token = base::ToLowerASCII(tokenizer.token_piece()); |
// The same origin token negates the sandboxing. |
if (token == kAllowSameOriginToken) |