| Index: net/http/transport_security_state.cc | 
| diff --git a/net/http/transport_security_state.cc b/net/http/transport_security_state.cc | 
| index 718c70b8f865a80eaed77f09a71e2b285b4d5b67..5862130def4c22f8e567ccacfd277a7fe284b9eb 100644 | 
| --- a/net/http/transport_security_state.cc | 
| +++ b/net/http/transport_security_state.cc | 
| @@ -227,7 +227,7 @@ std::string HashHost(const std::string& canonicalized_host) { | 
|  | 
| // Returns true if the intersection of |a| and |b| is not empty. If either | 
| // |a| or |b| is empty, returns false. | 
| -bool HashesIntersect(const HashValueVector& a, | 
| +bool HashesIntersect2(const HashValueVector& a, | 
| const HashValueVector& b) { | 
| for (const auto& hash : a) { | 
| if (base::ContainsValue(b, hash)) | 
| @@ -1827,7 +1827,7 @@ bool TransportSecurityState::PKPState::CheckPublicKeyPins( | 
| return false; | 
| } | 
|  | 
| -  if (HashesIntersect(bad_spki_hashes, hashes)) { | 
| +  if (HashesIntersect2(bad_spki_hashes, hashes)) { | 
| failure_log->append("Rejecting public key chain for domain " + domain + | 
| ". Validated chain: " + HashesToBase64String(hashes) + | 
| ", matches one or more bad hashes: " + | 
| @@ -1839,7 +1839,7 @@ bool TransportSecurityState::PKPState::CheckPublicKeyPins( | 
| if (spki_hashes.empty()) | 
| return true; | 
|  | 
| -  if (HashesIntersect(spki_hashes, hashes)) { | 
| +  if (HashesIntersect2(spki_hashes, hashes)) { | 
| return true; | 
| } | 
|  | 
|  |