| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 57cb7fa96f17635ced2021ae69b25e35db741a8f..fce3325faa0a0b17f0bf49115374ac5442a48910 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -317,7 +317,7 @@ ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() {
|
| RegisterWebSafeScheme(url::kFileSystemScheme);
|
|
|
| // We know about the following pseudo schemes and treat them specially.
|
| - RegisterPseudoScheme(kAboutScheme);
|
| + RegisterPseudoScheme(url::kAboutScheme);
|
| RegisterPseudoScheme(url::kJavaScriptScheme);
|
| RegisterPseudoScheme(kViewSourceScheme);
|
| }
|
| @@ -618,7 +618,7 @@ bool ChildProcessSecurityPolicyImpl::CanRequestURL(
|
| return CanRequestURL(child_id, child_url);
|
| }
|
|
|
| - if (LowerCaseEqualsASCII(url.spec(), kAboutBlankURL))
|
| + if (LowerCaseEqualsASCII(url.spec(), url::kAboutBlankURL))
|
| return true; // Every child process can request <about:blank>.
|
|
|
| // URLs like <about:memory> and <about:crash> shouldn't be requestable by
|
|
|