| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 363bca392de4c2a467f15b5fef7e58acb76a5c99..68f4e81fbef0c73f41b93147023c8a7bb8841c6c 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -316,7 +316,7 @@ ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() {
|
| RegisterWebSafeScheme(url::kFileSystemScheme);
|
|
|
| // We know about the following pseudo schemes and treat them specially.
|
| - RegisterPseudoScheme(kAboutScheme);
|
| + RegisterPseudoScheme(url::kAboutScheme);
|
| RegisterPseudoScheme(url::kJavaScriptScheme);
|
| RegisterPseudoScheme(kViewSourceScheme);
|
| }
|
| @@ -617,7 +617,7 @@ bool ChildProcessSecurityPolicyImpl::CanRequestURL(
|
| return CanRequestURL(child_id, child_url);
|
| }
|
|
|
| - if (LowerCaseEqualsASCII(url.spec(), kAboutBlankURL))
|
| + if (LowerCaseEqualsASCII(url.spec(), url::kAboutBlankURL))
|
| return true; // Every child process can request <about:blank>.
|
|
|
| // URLs like <about:memory> and <about:crash> shouldn't be requestable by
|
|
|