| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 0eb5ade6f4a3f8cbe8d310556ae4a064c2d100ae..78ac2e41ff3d94523c3b39933f973cd77fc8e793 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -339,8 +339,8 @@ ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() {
|
| RegisterPseudoScheme(url::kAboutScheme);
|
| RegisterPseudoScheme(url::kJavaScriptScheme);
|
| RegisterPseudoScheme(kViewSourceScheme);
|
| - RegisterPseudoScheme(kHttpSuboriginScheme);
|
| - RegisterPseudoScheme(kHttpsSuboriginScheme);
|
| + RegisterPseudoScheme(url::kHttpSuboriginScheme);
|
| + RegisterPseudoScheme(url::kHttpsSuboriginScheme);
|
| }
|
|
|
| ChildProcessSecurityPolicyImpl::~ChildProcessSecurityPolicyImpl() {
|
| @@ -706,8 +706,8 @@ bool ChildProcessSecurityPolicyImpl::CanSetAsOriginHeader(int child_id,
|
| return false; // Can't set invalid URLs as origin headers.
|
|
|
| // Suborigin URLs are a special case and are allowed to be an origin header.
|
| - if (url.scheme() == kHttpSuboriginScheme ||
|
| - url.scheme() == kHttpsSuboriginScheme) {
|
| + if (url.scheme() == url::kHttpSuboriginScheme ||
|
| + url.scheme() == url::kHttpsSuboriginScheme) {
|
| DCHECK(IsPseudoScheme(url.scheme()));
|
| return true;
|
| }
|
|
|