Index: Source/core/html/parser/XSSAuditor.cpp |
diff --git a/Source/core/html/parser/XSSAuditor.cpp b/Source/core/html/parser/XSSAuditor.cpp |
index 6f50091ceb97d50f93226436dee808ca41644340..47efdacd2f87c8eb8170a46e5f2f62374715fa71 100644 |
--- a/Source/core/html/parser/XSSAuditor.cpp |
+++ b/Source/core/html/parser/XSSAuditor.cpp |
@@ -267,7 +267,7 @@ void XSSAuditor::init(Document* document, XSSAuditorDelegate* auditorDelegate) |
String httpBodyAsString; |
if (DocumentLoader* documentLoader = document->frame()->loader()->documentLoader()) { |
- DEFINE_STATIC_LOCAL(String, XSSProtectionHeader, (ASCIILiteral("X-XSS-Protection"))); |
+ DEFINE_STATIC_LOCAL(String, XSSProtectionHeader, ("X-XSS-Protection")); |
String headerValue = documentLoader->response().httpHeaderField(XSSProtectionHeader); |
String errorDetails; |
unsigned errorPosition = 0; |
@@ -516,7 +516,7 @@ bool XSSAuditor::filterButtonToken(const FilterTokenRequest& request) |
bool XSSAuditor::eraseDangerousAttributesIfInjected(const FilterTokenRequest& request) |
{ |
- DEFINE_STATIC_LOCAL(String, safeJavaScriptURL, (ASCIILiteral("javascript:void(0)"))); |
+ DEFINE_STATIC_LOCAL(String, safeJavaScriptURL, ("javascript:void(0)")); |
bool didBlockScript = false; |
for (size_t i = 0; i < request.token.attributes().size(); ++i) { |