Index: Source/core/loader/FrameLoader.cpp |
diff --git a/Source/core/loader/FrameLoader.cpp b/Source/core/loader/FrameLoader.cpp |
index 65497cf1c2506e975077e69f485e77df01637399..03a988189bcfd302f5f3a83228627767d21945bb 100644 |
--- a/Source/core/loader/FrameLoader.cpp |
+++ b/Source/core/loader/FrameLoader.cpp |
@@ -1401,18 +1401,18 @@ bool FrameLoader::shouldEnforceStrictMixedContentChecking() const |
return toLocalFrame(parentFrame)->document()->shouldEnforceStrictMixedContentChecking(); |
} |
-SecurityContext::InsecureContentPolicy FrameLoader::insecureContentPolicy() const |
+SecurityContext::InsecureRequestsPolicy FrameLoader::insecureRequestsPolicy() const |
{ |
Frame* parentFrame = m_frame->tree().parent(); |
if (!parentFrame) |
- return SecurityContext::InsecureContentDoNotUpgrade; |
+ return SecurityContext::InsecureRequestsDoNotUpgrade; |
- // FIXME: We need a way to propagate insecure content policy flags to |
+ // FIXME: We need a way to propagate insecure requests policy flags to |
// out-of-process frames. For now, we'll always use default behavior. |
if (!parentFrame->isLocalFrame()) |
- return SecurityContext::InsecureContentDoNotUpgrade; |
+ return SecurityContext::InsecureRequestsDoNotUpgrade; |
- return toLocalFrame(parentFrame)->document()->insecureContentPolicy(); |
+ return toLocalFrame(parentFrame)->document()->insecureRequestsPolicy(); |
} |
} // namespace blink |