| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 66a4c3add715ddab6d56d994ed22f6d496124368..ab4cd6049e197773eb00630870bae636f94ae7ab 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -340,8 +340,8 @@ ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() {
|
| RegisterPseudoScheme(url::kAboutScheme);
|
| RegisterPseudoScheme(url::kJavaScriptScheme);
|
| RegisterPseudoScheme(kViewSourceScheme);
|
| - RegisterPseudoScheme(kHttpSuboriginScheme);
|
| - RegisterPseudoScheme(kHttpsSuboriginScheme);
|
| + RegisterPseudoScheme(url::kHttpSuboriginScheme);
|
| + RegisterPseudoScheme(url::kHttpsSuboriginScheme);
|
| }
|
|
|
| ChildProcessSecurityPolicyImpl::~ChildProcessSecurityPolicyImpl() {
|
| @@ -707,8 +707,8 @@ bool ChildProcessSecurityPolicyImpl::CanSetAsOriginHeader(int child_id,
|
| return false; // Can't set invalid URLs as origin headers.
|
|
|
| // Suborigin URLs are a special case and are allowed to be an origin header.
|
| - if (url.scheme() == kHttpSuboriginScheme ||
|
| - url.scheme() == kHttpsSuboriginScheme) {
|
| + if (url.scheme() == url::kHttpSuboriginScheme ||
|
| + url.scheme() == url::kHttpsSuboriginScheme) {
|
| DCHECK(IsPseudoScheme(url.scheme()));
|
| return true;
|
| }
|
|
|