Index: extensions/common/csp_validator.cc |
diff --git a/extensions/common/csp_validator.cc b/extensions/common/csp_validator.cc |
index 73a508c6ec64b66870c413e26b43e4c1998cb759..d19c7f27ef803c519421858fa31f4171a208b5c4 100644 |
--- a/extensions/common/csp_validator.cc |
+++ b/extensions/common/csp_validator.cc |
@@ -42,7 +42,7 @@ bool HasOnlySecureTokens(base::StringTokenizer& tokenizer, |
Manifest::Type type) { |
while (tokenizer.GetNext()) { |
std::string source = tokenizer.token(); |
- StringToLowerASCII(&source); |
+ base::StringToLowerASCII(&source); |
// Don't alow whitelisting of all hosts. This boils down to: |
// 1. Maximum of 2 '*' characters. |
@@ -136,7 +136,7 @@ bool ContentSecurityPolicyIsSecure(const std::string& policy, |
continue; |
std::string directive_name = tokenizer.token(); |
- StringToLowerASCII(&directive_name); |
+ base::StringToLowerASCII(&directive_name); |
if (UpdateStatus(directive_name, tokenizer, &default_src_status, type)) |
continue; |
@@ -176,7 +176,7 @@ bool ContentSecurityPolicyIsSandboxed( |
continue; |
std::string directive_name = tokenizer.token(); |
- StringToLowerASCII(&directive_name); |
+ base::StringToLowerASCII(&directive_name); |
if (directive_name != kSandboxDirectiveName) |
continue; |
@@ -185,7 +185,7 @@ bool ContentSecurityPolicyIsSandboxed( |
while (tokenizer.GetNext()) { |
std::string token = tokenizer.token(); |
- StringToLowerASCII(&token); |
+ base::StringToLowerASCII(&token); |
// The same origin token negates the sandboxing. |
if (token == kAllowSameOriginToken) |