Index: Source/core/frame/csp/CSPDirectiveList.cpp |
diff --git a/Source/core/frame/csp/CSPDirectiveList.cpp b/Source/core/frame/csp/CSPDirectiveList.cpp |
index 93e1e78af715a573aed95211696ae2fd5d6372ac..13ed8e1b178ac6ccb00bbf0cb2b20019cc4534cf 100644 |
--- a/Source/core/frame/csp/CSPDirectiveList.cpp |
+++ b/Source/core/frame/csp/CSPDirectiveList.cpp |
@@ -579,7 +579,7 @@ void CSPDirectiveList::enforceStrictMixedContentChecking(const String& name, con |
m_policy->reportValueForEmptyDirective(name, value); |
} |
-void CSPDirectiveList::enableInsecureContentUpgrade(const String& name, const String& value) |
+void CSPDirectiveList::enableInsecureRequestsUpgrade(const String& name, const String& value) |
{ |
if (m_reportOnly) { |
m_policy->reportInvalidInReportOnly(name); |
@@ -591,7 +591,7 @@ void CSPDirectiveList::enableInsecureContentUpgrade(const String& name, const St |
} |
m_upgradeInsecureRequests = true; |
- m_policy->setInsecureContentPolicy(SecurityContext::InsecureContentUpgrade); |
+ m_policy->setInsecureRequestsPolicy(SecurityContext::InsecureRequestsUpgrade); |
if (!value.isEmpty()) |
m_policy->reportValueForEmptyDirective(name, value); |
} |
@@ -747,7 +747,7 @@ void CSPDirectiveList::addDirective(const String& name, const String& value) |
else if (equalIgnoringCase(name, ContentSecurityPolicy::BlockAllMixedContent)) |
enforceStrictMixedContentChecking(name, value); |
else if (equalIgnoringCase(name, ContentSecurityPolicy::UpgradeInsecureRequests)) |
- enableInsecureContentUpgrade(name, value); |
+ enableInsecureRequestsUpgrade(name, value); |
else |
m_policy->reportUnsupportedDirective(name); |
} else { |