diff options
author | brettw@chromium.org <brettw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-08-07 16:55:42 +0000 |
---|---|---|
committer | brettw@chromium.org <brettw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-08-07 16:55:42 +0000 |
commit | cb1f4ac35e1e687925fdf62f7f62140dcd6d4a1d (patch) | |
tree | 953168adbbb3a7ff1c069911b764ffbed2369384 /extensions/common/csp_validator.cc | |
parent | b7a95ad6f584b029954c3b398993f49f1d69265e (diff) | |
download | chromium_src-cb1f4ac35e1e687925fdf62f7f62140dcd6d4a1d.zip chromium_src-cb1f4ac35e1e687925fdf62f7f62140dcd6d4a1d.tar.gz chromium_src-cb1f4ac35e1e687925fdf62f7f62140dcd6d4a1d.tar.bz2 |
Move StringToLowerASCII to base namespace
TBR=sky
Review URL: https://codereview.chromium.org/448853002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@288085 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'extensions/common/csp_validator.cc')
-rw-r--r-- | extensions/common/csp_validator.cc | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/extensions/common/csp_validator.cc b/extensions/common/csp_validator.cc index 73a508c..d19c7f2 100644 --- a/extensions/common/csp_validator.cc +++ b/extensions/common/csp_validator.cc @@ -42,7 +42,7 @@ bool HasOnlySecureTokens(base::StringTokenizer& tokenizer, Manifest::Type type) { while (tokenizer.GetNext()) { std::string source = tokenizer.token(); - StringToLowerASCII(&source); + base::StringToLowerASCII(&source); // Don't alow whitelisting of all hosts. This boils down to: // 1. Maximum of 2 '*' characters. @@ -136,7 +136,7 @@ bool ContentSecurityPolicyIsSecure(const std::string& policy, continue; std::string directive_name = tokenizer.token(); - StringToLowerASCII(&directive_name); + base::StringToLowerASCII(&directive_name); if (UpdateStatus(directive_name, tokenizer, &default_src_status, type)) continue; @@ -176,7 +176,7 @@ bool ContentSecurityPolicyIsSandboxed( continue; std::string directive_name = tokenizer.token(); - StringToLowerASCII(&directive_name); + base::StringToLowerASCII(&directive_name); if (directive_name != kSandboxDirectiveName) continue; @@ -185,7 +185,7 @@ bool ContentSecurityPolicyIsSandboxed( while (tokenizer.GetNext()) { std::string token = tokenizer.token(); - StringToLowerASCII(&token); + base::StringToLowerASCII(&token); // The same origin token negates the sandboxing. if (token == kAllowSameOriginToken) |