Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index 66a4c3add715ddab6d56d994ed22f6d496124368..ab4cd6049e197773eb00630870bae636f94ae7ab 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -340,8 +340,8 @@ ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() { |
RegisterPseudoScheme(url::kAboutScheme); |
RegisterPseudoScheme(url::kJavaScriptScheme); |
RegisterPseudoScheme(kViewSourceScheme); |
- RegisterPseudoScheme(kHttpSuboriginScheme); |
- RegisterPseudoScheme(kHttpsSuboriginScheme); |
+ RegisterPseudoScheme(url::kHttpSuboriginScheme); |
+ RegisterPseudoScheme(url::kHttpsSuboriginScheme); |
} |
ChildProcessSecurityPolicyImpl::~ChildProcessSecurityPolicyImpl() { |
@@ -707,8 +707,8 @@ bool ChildProcessSecurityPolicyImpl::CanSetAsOriginHeader(int child_id, |
return false; // Can't set invalid URLs as origin headers. |
// Suborigin URLs are a special case and are allowed to be an origin header. |
- if (url.scheme() == kHttpSuboriginScheme || |
- url.scheme() == kHttpsSuboriginScheme) { |
+ if (url.scheme() == url::kHttpSuboriginScheme || |
+ url.scheme() == url::kHttpsSuboriginScheme) { |
DCHECK(IsPseudoScheme(url.scheme())); |
return true; |
} |