Index: chrome/browser/ui/app_list/search/common/webservice_search_provider.cc |
diff --git a/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc b/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc |
index a7bcf57f4b61af1434e7f52ccad6b907b1d07bb6..32e64c17af6ea1ec57f62b1e6dab0b52e286b0e9 100644 |
--- a/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc |
+++ b/chrome/browser/ui/app_list/search/common/webservice_search_provider.cc |
@@ -71,7 +71,7 @@ bool WebserviceSearchProvider::IsSensitiveInput(const base::string16& query) { |
// file, we shouldn't send it. Sending such things is a waste of time and a |
// disclosure of potentially private, local data. If the scheme is OK, we |
// still need to check other cases below. |
- if (LowerCaseEqualsASCII(query_as_url.scheme(), url::kFileScheme)) |
+ if (base::LowerCaseEqualsASCII(query_as_url.scheme(), url::kFileScheme)) |
return true; |
// Don't send URLs with usernames, queries or refs. Some of these are |
@@ -90,7 +90,7 @@ bool WebserviceSearchProvider::IsSensitiveInput(const base::string16& query) { |
// Don't send anything for https except the hostname. Hostnames are OK |
// because they are visible when the TCP connection is established, but the |
// specific path may reveal private information. |
- if (LowerCaseEqualsASCII(query_as_url.scheme(), url::kHttpsScheme) && |
+ if (base::LowerCaseEqualsASCII(query_as_url.scheme(), url::kHttpsScheme) && |
!query_as_url.path().empty() && query_as_url.path() != "/") { |
return true; |
} |