OOR-CORS: Rename *CORS* to *Cors* so to conform styleguide

This is mechanical, but a large change set.
As we discussed at a code review in the past, let's rename
all CORS related names.

Bug: 875759
Change-Id: I1d626f229ac3ddc7a1d83e921449db0d1472af1c
Tbr: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected]
Reviewed-on: https://chromium-review.googlesource.com/c/1333018
Commit-Queue: Takashi Toyoshima <[email protected]>
Reviewed-by: Yutaka Hirano <[email protected]>
Cr-Commit-Position: refs/heads/master@{#608647}
diff --git a/chrome/android/junit/src/org/chromium/chrome/browser/media/remote/MediaUrlResolverTest.java b/chrome/android/junit/src/org/chromium/chrome/browser/media/remote/MediaUrlResolverTest.java
index f32584d..024ed80 100644
--- a/chrome/android/junit/src/org/chromium/chrome/browser/media/remote/MediaUrlResolverTest.java
+++ b/chrome/android/junit/src/org/chromium/chrome/browser/media/remote/MediaUrlResolverTest.java
@@ -296,7 +296,7 @@
      * @throws MalformedURLException
      */
     @Test
-    public void testMediaUrlResolver_validMpeg4CompatibleCORS() throws MalformedURLException {
+    public void testMediaUrlResolver_validMpeg4CompatibleCors() throws MalformedURLException {
         // If a compatible CORS header returned, a valid mpeg4 URI is playable and unchanged.
         Uri uri = Uri.parse("http://example.com/test.mp4");
         HashMap<String, List<String>> corsHeaders = new HashMap<String, List<String>>();
@@ -314,7 +314,7 @@
      * @throws MalformedURLException
      */
     @Test
-    public void testMediaUrlResolver_validMpeg4InompatilbeCORS() throws MalformedURLException {
+    public void testMediaUrlResolver_validMpeg4InompatilbeCors() throws MalformedURLException {
         // If an incompatible CORS header returned, a valid mpeg4 URI is not playable but unchanged.
         Uri uri = Uri.parse("http://example.com/test.mp4");
         HashMap<String, List<String>> corsHeaders = new HashMap<String, List<String>>();
@@ -333,7 +333,7 @@
      * @throws MalformedURLException
      */
     @Test
-    public void testMediaUrlResolver_validHLSNoCORS() throws MalformedURLException {
+    public void testMediaUrlResolver_validHLSNoCors() throws MalformedURLException {
         // A valid mpeg4 URI is playable and unchanged.
         Uri uri = Uri.parse("http://example.com/test.m3u8");
         TestDelegate delegate =  resolveUri(uri, null, 200, null, null, false);
diff --git a/chrome/browser/about_flags.cc b/chrome/browser/about_flags.cc
index e1c9a4b..365fb66 100644
--- a/chrome/browser/about_flags.cc
+++ b/chrome/browser/about_flags.cc
@@ -3467,9 +3467,9 @@
      flag_descriptions::kEnableNetworkServiceInProcessDescription, kOsAll,
      FEATURE_VALUE_TYPE(features::kNetworkServiceInProcess)},
 
-    {"out-of-blink-cors", flag_descriptions::kEnableOutOfBlinkCORSName,
-     flag_descriptions::kEnableOutOfBlinkCORSDescription, kOsAll,
-     FEATURE_VALUE_TYPE(network::features::kOutOfBlinkCORS)},
+    {"out-of-blink-cors", flag_descriptions::kEnableOutOfBlinkCorsName,
+     flag_descriptions::kEnableOutOfBlinkCorsDescription, kOsAll,
+     FEATURE_VALUE_TYPE(network::features::kOutOfBlinkCors)},
 
 #if defined(OS_ANDROID)
     {"use-ddljson-api", flag_descriptions::kUseDdljsonApiName,
diff --git a/chrome/browser/android/headers_classifier.cc b/chrome/browser/android/headers_classifier.cc
index 46f5fdd..1d74b8d1 100644
--- a/chrome/browser/android/headers_classifier.cc
+++ b/chrome/browser/android/headers_classifier.cc
@@ -19,7 +19,7 @@
   std::string header_name(ConvertJavaStringToUTF8(env, j_header_name));
   std::string header_value(ConvertJavaStringToUTF8(env, j_header_value));
 
-  return network::cors::IsCORSSafelistedHeader(header_name, header_value);
+  return network::cors::IsCorsSafelistedHeader(header_name, header_value);
 }
 
 }  // namespace android
diff --git a/chrome/browser/client_hints/client_hints_browsertest.cc b/chrome/browser/client_hints/client_hints_browsertest.cc
index 391f5cc..9d7e6c4 100644
--- a/chrome/browser/client_hints/client_hints_browsertest.cc
+++ b/chrome/browser/client_hints/client_hints_browsertest.cc
@@ -647,13 +647,13 @@
         std::string(blink::kClientHintsHeaderMapping[i]) == "ect") {
       continue;
     }
-    EXPECT_TRUE(network::cors::IsCORSSafelistedHeader(
+    EXPECT_TRUE(network::cors::IsCorsSafelistedHeader(
         blink::kClientHintsHeaderMapping[i], "42" /* value */));
   }
-  EXPECT_FALSE(network::cors::IsCORSSafelistedHeader("not-a-client-hint-header",
+  EXPECT_FALSE(network::cors::IsCorsSafelistedHeader("not-a-client-hint-header",
                                                      "" /* value */));
   EXPECT_TRUE(
-      network::cors::IsCORSSafelistedHeader("save-data", "on" /* value */));
+      network::cors::IsCorsSafelistedHeader("save-data", "on" /* value */));
 }
 
 // Loads a webpage that requests persisting of client hints. Verifies that
diff --git a/chrome/browser/flag_descriptions.cc b/chrome/browser/flag_descriptions.cc
index c3f9475..d3af761d 100644
--- a/chrome/browser/flag_descriptions.cc
+++ b/chrome/browser/flag_descriptions.cc
@@ -696,8 +696,8 @@
     "into decisions for what optimizations to perform on some pages on slow "
     "networks.";
 
-const char kEnableOutOfBlinkCORSName[] = "Out of blink CORS";
-const char kEnableOutOfBlinkCORSDescription[] =
+const char kEnableOutOfBlinkCorsName[] = "Out of blink CORS";
+const char kEnableOutOfBlinkCorsDescription[] =
     "CORS handling logic is moved out of blink.";
 
 const char kExperimentalAccessibilityFeaturesName[] =
diff --git a/chrome/browser/flag_descriptions.h b/chrome/browser/flag_descriptions.h
index e78e13f2..96a1eb2 100644
--- a/chrome/browser/flag_descriptions.h
+++ b/chrome/browser/flag_descriptions.h
@@ -445,8 +445,8 @@
 extern const char kEnableOptimizationHintsName[];
 extern const char kEnableOptimizationHintsDescription[];
 
-extern const char kEnableOutOfBlinkCORSName[];
-extern const char kEnableOutOfBlinkCORSDescription[];
+extern const char kEnableOutOfBlinkCorsName[];
+extern const char kEnableOutOfBlinkCorsDescription[];
 
 extern const char kVizDisplayCompositorName[];
 extern const char kVizDisplayCompositorDescription[];
diff --git a/chrome/browser/predictors/loading_predictor_browsertest.cc b/chrome/browser/predictors/loading_predictor_browsertest.cc
index ba1fa32..3ff8f2f0 100644
--- a/chrome/browser/predictors/loading_predictor_browsertest.cc
+++ b/chrome/browser/predictors/loading_predictor_browsertest.cc
@@ -657,7 +657,7 @@
 // Tests that preconnect warms up a socket connection to a test server.
 // Note: This test uses a data URI to serve the preconnect hint, to make sure
 // that the network stack doesn't just re-use its connection to the test server.
-IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest, PreconnectNonCORS) {
+IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest, PreconnectNonCors) {
   GURL preconnect_url = embedded_test_server()->base_url();
   std::string preconnect_content =
       "<link rel=\"preconnect\" href=\"" + preconnect_url.spec() + "\">";
@@ -672,7 +672,7 @@
 // and that that socket is later used when fetching a resource.
 // Note: This test uses a data URI to serve the preconnect hint, to make sure
 // that the network stack doesn't just re-use its connection to the test server.
-IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest, PreconnectAndFetchNonCORS) {
+IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest, PreconnectAndFetchNonCors) {
   GURL preconnect_url = embedded_test_server()->base_url();
   // First navigation to content with a preconnect hint.
   std::string preconnect_content =
@@ -696,7 +696,7 @@
 // server, and that socket is later used when fetching a CORS resource.
 // Note: This test uses a data URI to serve the preconnect hint, to make sure
 // that the network stack doesn't just re-use its connection to the test server.
-IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest, PreconnectAndFetchCORS) {
+IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest, PreconnectAndFetchCors) {
   GURL preconnect_url = embedded_test_server()->base_url();
   // First navigation to content with a preconnect hint.
   std::string preconnect_content = "<link rel=\"preconnect\" href=\"" +
@@ -722,7 +722,7 @@
 // Note: This test uses a data URI to serve the preconnect hint, to make sure
 // that the network stack doesn't just re-use its connection to the test server.
 IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest,
-                       PreconnectNonCORSAndFetchCORS) {
+                       PreconnectNonCorsAndFetchCors) {
   GURL preconnect_url = embedded_test_server()->base_url();
   // First navigation to content with a preconnect hint.
   std::string preconnect_content =
@@ -748,7 +748,7 @@
 // Note: This test uses a data URI to serve the preconnect hint, to make sure
 // that the network stack doesn't just re-use its connection to the test server.
 IN_PROC_BROWSER_TEST_F(LoadingPredictorBrowserTest,
-                       PreconnectCORSAndFetchNonCORS) {
+                       PreconnectCorsAndFetchNonCors) {
   GURL preconnect_url = embedded_test_server()->base_url();
   // First navigation to content with a preconnect hint.
   std::string preconnect_content = "<link rel=\"preconnect\" href=\"" +
diff --git a/chrome/common/extensions/chrome_extensions_client.cc b/chrome/common/extensions/chrome_extensions_client.cc
index 64420ef..15e98b7 100644
--- a/chrome/common/extensions/chrome_extensions_client.cc
+++ b/chrome/common/extensions/chrome_extensions_client.cc
@@ -286,7 +286,7 @@
     origin_patterns->push_back(network::mojom::CorsOriginPattern::New(
         content::kChromeUIScheme, chrome::kChromeUIThemeHost,
         false /*allow_destination_subdomains*/,
-        network::mojom::CORSOriginAccessMatchPriority::kMaxPriority));
+        network::mojom::CorsOriginAccessMatchPriority::kMaxPriority));
   }
 
   // TODO(jstritar): We should try to remove this special case. Also, these
@@ -297,7 +297,7 @@
     origin_patterns->push_back(network::mojom::CorsOriginPattern::New(
         content::kChromeUIScheme, chrome::kChromeUIExtensionIconHost,
         false /*allow_destination_subdomains*/,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority));
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority));
   }
 }
 
diff --git a/chrome/test/data/predictor/fetch_cross_site.js b/chrome/test/data/predictor/fetch_cross_site.js
index 976eacdd..42f5b05a 100644
--- a/chrome/test/data/predictor/fetch_cross_site.js
+++ b/chrome/test/data/predictor/fetch_cross_site.js
@@ -5,7 +5,7 @@
 // This script file should be requested with the following query params:
 // subresourceHost: The base url of the embedded test server to request
 // subresources from.
-// numCORSResources: The number of resources to request (between 0 and 3).
+// numCorsResources: The number of resources to request (between 0 and 3).
 var queryString = window.location.search.substring(1);
 var vars = queryString.split("&");
 var parsedParams = {};
@@ -14,14 +14,14 @@
   parsedParams[key_value[0]] = key_value[1];
 });
 var subresourceHost = parsedParams['subresourceHost'];
-var numCORSResources = parseInt(parsedParams['numCORSResources'], 10);
+var numCorsResources = parseInt(parsedParams['numCorsResources'], 10);
 var sendImmediately = parseInt(parsedParams['sendImmediately'], 10);
 var subresourceList = [
   'predictor/empty.js',
   'predictor/empty1.js',
   'predictor/empty2.js',
 ];
-var CORSSubresources = subresourceList.slice(0, numCORSResources);
+var CorsSubresources = subresourceList.slice(0, numCorsResources);
 
 var numOK = 0;
 function logResponse(r) {
@@ -29,7 +29,7 @@
   // make cross origin requests with no-cors.
   if (r.status == 200 || r.type == "opaque") {
     numOK++;
-    if (numOK == numCORSResources) {
+    if (numOK == numCorsResources) {
       window.domAutomationController.send(true);
     }
   } else {
@@ -38,7 +38,7 @@
 }
 
 function startFetchesAndWaitForReply() {
-  CORSSubresources.forEach(function(r) {
+  CorsSubresources.forEach(function(r) {
     fetch(subresourceHost + r, {mode: 'cors', method: 'get'}).then(logResponse);
   });
 }
diff --git a/chrome/test/nacl/nacl_browsertest.cc b/chrome/test/nacl/nacl_browsertest.cc
index 6cb2290..f65bcaa 100644
--- a/chrome/test/nacl/nacl_browsertest.cc
+++ b/chrome/test/nacl/nacl_browsertest.cc
@@ -243,7 +243,7 @@
     RunNaClIntegrationTest(path);
 })
 
-IN_PROC_BROWSER_TEST_F(NaClBrowserTestStatic, CrossOriginCORS) {
+IN_PROC_BROWSER_TEST_F(NaClBrowserTestStatic, CrossOriginCors) {
   RunLoadTest(FILE_PATH_LITERAL("cross_origin/cors.html"));
 }
 
@@ -255,7 +255,7 @@
   RunLoadTest(FILE_PATH_LITERAL("cross_origin/same_origin_cookie.html"));
 }
 
-IN_PROC_BROWSER_TEST_F(NaClBrowserTestStatic, CORSNoCookie) {
+IN_PROC_BROWSER_TEST_F(NaClBrowserTestStatic, CorsNoCookie) {
   RunLoadTest(FILE_PATH_LITERAL("cross_origin/cors_no_cookie.html"));
 }
 
diff --git a/components/nacl/renderer/ppb_nacl_private_impl.cc b/components/nacl/renderer/ppb_nacl_private_impl.cc
index 60d7752..5ba429e 100644
--- a/components/nacl/renderer/ppb_nacl_private_impl.cc
+++ b/components/nacl/renderer/ppb_nacl_private_impl.cc
@@ -337,7 +337,7 @@
     request.SetFetchCredentialsMode(
         network::mojom::FetchCredentialsMode::kSameOrigin);
   } else {
-    request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+    request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
     request.SetFetchCredentialsMode(
         network::mojom::FetchCredentialsMode::kOmit);
   }
diff --git a/content/browser/background_fetch/background_fetch_delegate_proxy.cc b/content/browser/background_fetch/background_fetch_delegate_proxy.cc
index 3ac5447..a4cb7b0 100644
--- a/content/browser/background_fetch/background_fetch_delegate_proxy.cc
+++ b/content/browser/background_fetch/background_fetch_delegate_proxy.cc
@@ -149,9 +149,9 @@
     // Append the Origin header for requests whose CORS flag is set, or whose
     // request method is not GET or HEAD. See section 3.1 of the standard:
     // https://fetch.spec.whatwg.org/#origin-header
-    if (fetch_request.mode == network::mojom::FetchRequestMode::kCORS ||
+    if (fetch_request.mode == network::mojom::FetchRequestMode::kCors ||
         fetch_request.mode ==
-            network::mojom::FetchRequestMode::kCORSWithForcedPreflight ||
+            network::mojom::FetchRequestMode::kCorsWithForcedPreflight ||
         (fetch_request.method != "GET" && fetch_request.method != "HEAD")) {
       headers.SetHeader("Origin", origin.Serialize());
     }
diff --git a/content/browser/background_fetch/background_fetch_job_controller.cc b/content/browser/background_fetch/background_fetch_job_controller.cc
index a5093a70..8987da8 100644
--- a/content/browser/background_fetch/background_fetch_job_controller.cc
+++ b/content/browser/background_fetch/background_fetch_job_controller.cc
@@ -33,7 +33,7 @@
 // Requests that require CORS preflights are temporarily blocked, because the
 // browser side of Background Fetch doesn't yet support performing CORS
 // checks. TODO(crbug.com/711354): Remove this temporary block.
-bool RequiresCORSPreflight(const BackgroundFetchRequestInfo& request,
+bool RequiresCorsPreflight(const BackgroundFetchRequestInfo& request,
                            const url::Origin& origin) {
   const blink::mojom::FetchAPIRequest& fetch_request = request.fetch_request();
 
@@ -47,7 +47,7 @@
   // element require a CORS-preflight request.
   // https://fetch.spec.whatwg.org/#main-fetch
   if (!fetch_request.method.empty() &&
-      !network::cors::IsCORSSafelistedMethod(fetch_request.method)) {
+      !network::cors::IsCorsSafelistedMethod(fetch_request.method)) {
     return true;
   }
 
@@ -55,7 +55,7 @@
   for (const auto& header : fetch_request.headers)
     headers.emplace_back(header.first, header.second);
 
-  return !network::cors::CORSUnsafeRequestHeaderNames(headers).empty();
+  return !network::cors::CorsUnsafeRequestHeaderNames(headers).empty();
 }
 
 }  // namespace
@@ -137,7 +137,7 @@
   active_request_finished_callback_ = std::move(request_finished_callback);
 
   if (IsMixedContent(*request.get()) ||
-      RequiresCORSPreflight(*request.get(), registration_id_.origin())) {
+      RequiresCorsPreflight(*request.get(), registration_id_.origin())) {
     request->SetEmptyResultWithFailureReason(
         BackgroundFetchResult::FailureReason::FETCH_ERROR);
 
diff --git a/content/browser/cache_storage/cache_storage_cache.cc b/content/browser/cache_storage/cache_storage_cache.cc
index 971d293..78869a3f 100644
--- a/content/browser/cache_storage/cache_storage_cache.cc
+++ b/content/browser/cache_storage/cache_storage_cache.cc
@@ -95,7 +95,7 @@
     case proto::CacheResponse::BASIC_TYPE:
       return network::mojom::FetchResponseType::kBasic;
     case proto::CacheResponse::CORS_TYPE:
-      return network::mojom::FetchResponseType::kCORS;
+      return network::mojom::FetchResponseType::kCors;
     case proto::CacheResponse::DEFAULT_TYPE:
       return network::mojom::FetchResponseType::kDefault;
     case proto::CacheResponse::ERROR_TYPE:
@@ -114,7 +114,7 @@
   switch (response_type) {
     case network::mojom::FetchResponseType::kBasic:
       return proto::CacheResponse::BASIC_TYPE;
-    case network::mojom::FetchResponseType::kCORS:
+    case network::mojom::FetchResponseType::kCors:
       return proto::CacheResponse::CORS_TYPE;
     case network::mojom::FetchResponseType::kDefault:
       return proto::CacheResponse::DEFAULT_TYPE;
@@ -365,7 +365,7 @@
                            bool has_urls) {
   switch (response_type) {
     case network::mojom::FetchResponseType::kBasic:
-    case network::mojom::FetchResponseType::kCORS:
+    case network::mojom::FetchResponseType::kCors:
     case network::mojom::FetchResponseType::kDefault:
     case network::mojom::FetchResponseType::kError:
       return false;
diff --git a/content/browser/cache_storage/cache_storage_cache_unittest.cc b/content/browser/cache_storage/cache_storage_cache_unittest.cc
index 8b2a09c..75101af 100644
--- a/content/browser/cache_storage/cache_storage_cache_unittest.cc
+++ b/content/browser/cache_storage/cache_storage_cache_unittest.cc
@@ -1573,7 +1573,7 @@
 
 TEST_P(CacheStorageCacheTestP, PutResponseType) {
   EXPECT_TRUE(TestResponseType(network::mojom::FetchResponseType::kBasic));
-  EXPECT_TRUE(TestResponseType(network::mojom::FetchResponseType::kCORS));
+  EXPECT_TRUE(TestResponseType(network::mojom::FetchResponseType::kCors));
   EXPECT_TRUE(TestResponseType(network::mojom::FetchResponseType::kDefault));
   EXPECT_TRUE(TestResponseType(network::mojom::FetchResponseType::kError));
   EXPECT_TRUE(TestResponseType(network::mojom::FetchResponseType::kOpaque));
diff --git a/content/browser/cache_storage/cache_storage_manager_unittest.cc b/content/browser/cache_storage/cache_storage_manager_unittest.cc
index 8930e46..4f53272 100644
--- a/content/browser/cache_storage/cache_storage_manager_unittest.cc
+++ b/content/browser/cache_storage/cache_storage_manager_unittest.cc
@@ -1195,7 +1195,7 @@
 
   // Choose a response type that will not be padded so that the expected
   // cache size can be calculated.
-  const FetchResponseType response_type = FetchResponseType::kCORS;
+  const FetchResponseType response_type = FetchResponseType::kCors;
 
   // Create a new cache.
   int64_t cache_size;
diff --git a/content/browser/file_url_loader_factory.cc b/content/browser/file_url_loader_factory.cc
index 389fd19..1bd35c6 100644
--- a/content/browser/file_url_loader_factory.cc
+++ b/content/browser/file_url_loader_factory.cc
@@ -96,7 +96,7 @@
   return url.ReplaceComponents(replacements);
 }
 
-bool ShouldFailRequestDueToCORS(const network::ResourceRequest& request) {
+bool ShouldFailRequestDueToCors(const network::ResourceRequest& request) {
   if (base::CommandLine::ForCurrentProcess()->HasSwitch(
           switches::kDisableWebSecurity)) {
     return false;
@@ -104,7 +104,7 @@
 
   const auto mode = request.fetch_request_mode;
   if (mode == network::mojom::FetchRequestMode::kNavigate ||
-      mode == network::mojom::FetchRequestMode::kNoCORS) {
+      mode == network::mojom::FetchRequestMode::kNoCors) {
     return false;
   }
 
@@ -733,12 +733,12 @@
     return;
   }
 
-  // FileURLLoader doesn't support CORS and it's not covered by CORSURLLoader,
+  // FileURLLoader doesn't support CORS and it's not covered by CorsURLLoader,
   // so we need to reject requests that need CORS manually.
-  if (ShouldFailRequestDueToCORS(request)) {
+  if (ShouldFailRequestDueToCors(request)) {
     client->OnComplete(
-        network::URLLoaderCompletionStatus(network::CORSErrorStatus(
-            network::mojom::CORSError::kCORSDisabledScheme)));
+        network::URLLoaderCompletionStatus(network::CorsErrorStatus(
+            network::mojom::CorsError::kCorsDisabledScheme)));
     return;
   }
 
diff --git a/content/browser/frame_host/mixed_content_navigation_throttle.cc b/content/browser/frame_host/mixed_content_navigation_throttle.cc
index 68f4365..ea6fff1 100644
--- a/content/browser/frame_host/mixed_content_navigation_throttle.cc
+++ b/content/browser/frame_host/mixed_content_navigation_throttle.cc
@@ -35,9 +35,9 @@
 }
 
 // Should return the same value as SecurityOrigin::isLocal and
-// SchemeRegistry::shouldTreatURLSchemeAsCORSEnabled.
-bool ShouldTreatURLSchemeAsCORSEnabled(const GURL& url) {
-  return base::ContainsValue(url::GetCORSEnabledSchemes(), url.scheme());
+// SchemeRegistry::shouldTreatURLSchemeAsCorsEnabled.
+bool ShouldTreatURLSchemeAsCorsEnabled(const GURL& url) {
+  return base::ContainsValue(url::GetCorsEnabledSchemes(), url.scheme());
 }
 
 // Should return the same value as the resource URL checks assigned to
@@ -168,7 +168,7 @@
   blink::WebMixedContentContextType mixed_context_type =
       handle_impl->mixed_content_context_type();
 
-  if (!ShouldTreatURLSchemeAsCORSEnabled(handle_impl->GetURL()))
+  if (!ShouldTreatURLSchemeAsCorsEnabled(handle_impl->GetURL()))
     mixed_context_type =
         blink::WebMixedContentContextType::kOptionallyBlockable;
 
diff --git a/content/browser/loader/cors_file_origin_browsertest.cc b/content/browser/loader/cors_file_origin_browsertest.cc
index 9790099..0aea60a5 100644
--- a/content/browser/loader/cors_file_origin_browsertest.cc
+++ b/content/browser/loader/cors_file_origin_browsertest.cc
@@ -48,37 +48,37 @@
 
 // Tests end to end Origin header and CORS check behaviors without
 // --allow-file-access-from-files flag.
-class CORSFileOriginBrowserTest
+class CorsFileOriginBrowserTest
     : public ContentBrowserTest,
       public testing::WithParamInterface<CorsTestMode> {
  public:
-  CORSFileOriginBrowserTest()
+  CorsFileOriginBrowserTest()
       : pass_string_(base::ASCIIToUTF16("PASS")),
         fail_string_(base::ASCIIToUTF16("FAIL")) {
     switch (GetParam()) {
       case CorsTestMode::kInBlink:
         scoped_feature_list_.InitWithFeatures(
             {} /* enabled */,
-            {network::features::kOutOfBlinkCORS,
+            {network::features::kOutOfBlinkCors,
              blink::features::kServiceWorkerServicification,
              network::features::kNetworkService} /* disabled */);
         break;
       case CorsTestMode::kInBrowserProcess:
         scoped_feature_list_.InitWithFeatures(
-            {network::features::kOutOfBlinkCORS,
+            {network::features::kOutOfBlinkCors,
              blink::features::kServiceWorkerServicification} /* enabled */,
             {network::features::kNetworkService} /* disabled */);
         break;
       case CorsTestMode::kInNetworkService:
         scoped_feature_list_.InitWithFeatures(
-            {network::features::kOutOfBlinkCORS,
+            {network::features::kOutOfBlinkCors,
              blink::features::kServiceWorkerServicification,
              network::features::kNetworkService} /* enabled */,
             {} /*disabled */);
         break;
     }
   }
-  ~CORSFileOriginBrowserTest() override = default;
+  ~CorsFileOriginBrowserTest() override = default;
 
  protected:
   GURL CreateTestDataURL(const std::string& relative_path) {
@@ -146,7 +146,7 @@
         test_data_loader_path_.Append(FILE_PATH_LITERAL("loader"));
 
     embedded_test_server()->RegisterRequestHandler(base::BindRepeating(
-        &CORSFileOriginBrowserTest::HandleWithAccessControlAllowOrigin,
+        &CorsFileOriginBrowserTest::HandleWithAccessControlAllowOrigin,
         base::Unretained(this)));
 
     ASSERT_TRUE(embedded_test_server()->Start());
@@ -202,27 +202,27 @@
   base::test::ScopedFeatureList scoped_command_line_;
   base::test::ScopedFeatureList scoped_feature_list_;
 
-  DISALLOW_COPY_AND_ASSIGN(CORSFileOriginBrowserTest);
+  DISALLOW_COPY_AND_ASSIGN(CorsFileOriginBrowserTest);
 };
 
 // Tests end to end Origin header and CORS check behaviors with
 // --allow-file-access-from-files flag.
-class CORSFileOriginBrowserTestWithAllowFileAccessFromFiles
-    : public CORSFileOriginBrowserTest {
+class CorsFileOriginBrowserTestWithAllowFileAccessFromFiles
+    : public CorsFileOriginBrowserTest {
  private:
   bool AllowFileAccessFromFiles() const override { return true; }
 };
 
 // Tests end to end Origin header and CORS check behaviors with
 // --disable-web-security flag.
-class CORSFileOriginBrowserTestWithDisableWebSecurity
-    : public CORSFileOriginBrowserTest {
+class CorsFileOriginBrowserTestWithDisableWebSecurity
+    : public CorsFileOriginBrowserTest {
  private:
   bool AllowFileAccessFromFiles() const override { return false; }
   bool IsWebSecurityEnabled() const override { return false; }
 };
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTest,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTest,
                        AccessControlAllowOriginIsNull) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -235,7 +235,7 @@
   EXPECT_TRUE(is_preflight_requested());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTest,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTest,
                        AccessControlAllowOriginIsFile) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -248,7 +248,7 @@
   EXPECT_TRUE(is_preflight_requested());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTest, AccessToSelfFileUrl) {
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTest, AccessToSelfFileUrl) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
       shell(),
@@ -259,7 +259,7 @@
   EXPECT_EQ(fail_string(), watcher->WaitAndGetTitle());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTest, AccessToAnotherFileUrl) {
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTest, AccessToAnotherFileUrl) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
       shell(),
@@ -270,7 +270,7 @@
   EXPECT_EQ(fail_string(), watcher->WaitAndGetTitle());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithAllowFileAccessFromFiles,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithAllowFileAccessFromFiles,
                        AccessControlAllowOriginIsNull) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -283,7 +283,7 @@
   EXPECT_TRUE(is_preflight_requested());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithAllowFileAccessFromFiles,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithAllowFileAccessFromFiles,
                        AccessControlAllowOriginIsFile) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -296,7 +296,7 @@
   EXPECT_TRUE(is_preflight_requested());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithAllowFileAccessFromFiles,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithAllowFileAccessFromFiles,
                        AccessToSelfFileUrl) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -308,7 +308,7 @@
   EXPECT_EQ(pass_string(), watcher->WaitAndGetTitle());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithAllowFileAccessFromFiles,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithAllowFileAccessFromFiles,
                        AccessToAnotherFileUrl) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -320,7 +320,7 @@
   EXPECT_EQ(pass_string(), watcher->WaitAndGetTitle());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithDisableWebSecurity,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithDisableWebSecurity,
                        AccessControlAllowOriginIsNull) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -333,7 +333,7 @@
   EXPECT_FALSE(is_preflight_requested());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithDisableWebSecurity,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithDisableWebSecurity,
                        AccessControlAllowOriginIsFile) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -346,7 +346,7 @@
   EXPECT_FALSE(is_preflight_requested());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithDisableWebSecurity,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithDisableWebSecurity,
                        AccessToSelfFileUrl) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -358,7 +358,7 @@
   EXPECT_EQ(pass_string(), watcher->WaitAndGetTitle());
 }
 
-IN_PROC_BROWSER_TEST_P(CORSFileOriginBrowserTestWithDisableWebSecurity,
+IN_PROC_BROWSER_TEST_P(CorsFileOriginBrowserTestWithDisableWebSecurity,
                        AccessToAnotherFileUrl) {
   std::unique_ptr<TitleWatcher> watcher = CreateWatcher();
   EXPECT_TRUE(NavigateToURL(
@@ -372,21 +372,21 @@
 
 INSTANTIATE_TEST_CASE_P(
     /* No test prefix */,
-    CORSFileOriginBrowserTest,
+    CorsFileOriginBrowserTest,
     ::testing::Values(CorsTestMode::kInBlink,
                       CorsTestMode::kInBrowserProcess,
                       CorsTestMode::kInNetworkService));
 
 INSTANTIATE_TEST_CASE_P(
     /* No test prefix */,
-    CORSFileOriginBrowserTestWithAllowFileAccessFromFiles,
+    CorsFileOriginBrowserTestWithAllowFileAccessFromFiles,
     ::testing::Values(CorsTestMode::kInBlink,
                       CorsTestMode::kInBrowserProcess,
                       CorsTestMode::kInNetworkService));
 
 INSTANTIATE_TEST_CASE_P(
     /* No test prefix */,
-    CORSFileOriginBrowserTestWithDisableWebSecurity,
+    CorsFileOriginBrowserTestWithDisableWebSecurity,
     ::testing::Values(CorsTestMode::kInBlink,
                       CorsTestMode::kInBrowserProcess,
                       CorsTestMode::kInNetworkService));
diff --git a/content/browser/loader/cors_origin_access_list_browsertest.cc b/content/browser/loader/cors_origin_access_list_browsertest.cc
index 8f32876..984cc366 100644
--- a/content/browser/loader/cors_origin_access_list_browsertest.cc
+++ b/content/browser/loader/cors_origin_access_list_browsertest.cc
@@ -53,7 +53,7 @@
       case TestMode::kOutOfBlinkCorsWithServicification:
         scoped_feature_list_.InitWithFeatures(
             // Enabled features
-            {network::features::kOutOfBlinkCORS,
+            {network::features::kOutOfBlinkCors,
              network::features::kNetworkService,
              blink::features::kServiceWorkerServicification},
             // Disabled features
@@ -62,7 +62,7 @@
       case TestMode::kOutOfBlinkCorsWithoutServicification:
         scoped_feature_list_.InitWithFeatures(
             // Enabled features
-            {network::features::kOutOfBlinkCORS},
+            {network::features::kOutOfBlinkCors},
             // Disabled features
             {network::features::kNetworkService,
              blink::features::kServiceWorkerServicification});
@@ -105,7 +105,7 @@
     std::vector<network::mojom::CorsOriginPatternPtr> list1;
     list1.push_back(network::mojom::CorsOriginPattern::New(
         scheme, host, allow_subdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority));
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority));
     bool first_list_done = false;
     BrowserContext::SetCorsOriginAccessListsForOrigin(
         shell()->web_contents()->GetBrowserContext(),
@@ -117,7 +117,7 @@
     std::vector<network::mojom::CorsOriginPatternPtr> list2;
     list2.push_back(network::mojom::CorsOriginPattern::New(
         scheme, host, allow_subdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority));
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority));
     bool second_list_done = false;
     BrowserContext::SetCorsOriginAccessListsForOrigin(
         shell()->web_contents()->GetBrowserContext(),
@@ -277,7 +277,7 @@
     CorsOriginAccessListBrowserTest,
     ::testing::Values(TestMode::kOutOfBlinkCorsWithoutServicification));
 
-// TODO(toyoshim): Instantiates tests for the case kOutOfBlinkCORS is disabled
+// TODO(toyoshim): Instantiates tests for the case kOutOfBlinkCors is disabled
 // and remove relevant LayoutTests if it's possible.
 
 }  // namespace
diff --git a/content/browser/loader/cross_site_document_blocking_browsertest.cc b/content/browser/loader/cross_site_document_blocking_browsertest.cc
index ae4e2c95..b3d8810 100644
--- a/content/browser/loader/cross_site_document_blocking_browsertest.cc
+++ b/content/browser/loader/cross_site_document_blocking_browsertest.cc
@@ -402,11 +402,11 @@
     switch (GetParam()) {
       case TestMode::kWithoutOutOfBlinkCors:
         scoped_feature_list_.InitAndDisableFeature(
-            network::features::kOutOfBlinkCORS);
+            network::features::kOutOfBlinkCors);
         break;
       case TestMode::kWithOutOfBlinkCors:
         scoped_feature_list_.InitAndEnableFeature(
-            network::features::kOutOfBlinkCORS);
+            network::features::kOutOfBlinkCors);
         break;
     }
   }
@@ -574,7 +574,7 @@
   // Note: we want to verify that the blocking prevents the data from being sent
   // over IPC.  Testing later (e.g. via Response/Headers Web APIs) might give a
   // false sense of security, since some sanitization happens inside the
-  // renderer (e.g. via FetchResponseData::CreateCORSFilteredResponse).
+  // renderer (e.g. via FetchResponseData::CreateCorsFilteredResponse).
   GURL bar_url("http://bar.com/cross_site_document_blocking/headers-test.json");
   RequestInterceptor interceptor(bar_url);
 
diff --git a/content/browser/loader/resource_dispatcher_host_impl.cc b/content/browser/loader/resource_dispatcher_host_impl.cc
index 35824ad..582c8da8 100644
--- a/content/browser/loader/resource_dispatcher_host_impl.cc
+++ b/content/browser/loader/resource_dispatcher_host_impl.cc
@@ -1129,7 +1129,7 @@
     // Add a handler to block cross-site documents from the renderer process.
     bool is_nocors_plugin_request =
         resource_type == RESOURCE_TYPE_PLUGIN_RESOURCE &&
-        fetch_request_mode == network::mojom::FetchRequestMode::kNoCORS;
+        fetch_request_mode == network::mojom::FetchRequestMode::kNoCors;
     handler.reset(new CrossSiteDocumentResourceHandler(
         std::move(handler), request, is_nocors_plugin_request));
   }
@@ -1574,12 +1574,12 @@
       new_request.get(), this, std::move(url_loader_request),
       std::move(url_loader_client), resource_type, url_loader_options);
 
-  // Safe to consider navigations as kNoCORS.
+  // Safe to consider navigations as kNoCors.
   // TODO(davidben): Fix the dependency on child_id/route_id. Those are used
   // by the ResourceScheduler. currently it's a no-op.
   handler = AddStandardHandlers(
       new_request.get(), resource_type, resource_context,
-      network::mojom::FetchRequestMode::kNoCORS,
+      network::mojom::FetchRequestMode::kNoCors,
       info.begin_params->request_context_type, url_loader_options,
       appcache_handle_core ? appcache_handle_core->GetAppCacheService()
                            : nullptr,
diff --git a/content/browser/loader/resource_dispatcher_host_unittest.cc b/content/browser/loader/resource_dispatcher_host_unittest.cc
index 3c6703b..bc641dd 100644
--- a/content/browser/loader/resource_dispatcher_host_unittest.cc
+++ b/content/browser/loader/resource_dispatcher_host_unittest.cc
@@ -658,12 +658,12 @@
             // Enabled features
             {},
             // Disabled features
-            {network::features::kOutOfBlinkCORS});
+            {network::features::kOutOfBlinkCors});
         break;
       case TestMode::kWithOutOfBlinkCors:
         scoped_feature_list_.InitWithFeatures(
             // Enabled features
-            {network::features::kOutOfBlinkCORS,
+            {network::features::kOutOfBlinkCors,
              blink::features::kServiceWorkerServicification},
             // Disabled features
             {});
@@ -867,7 +867,7 @@
   }
 
   bool IsAborted(const network::TestURLLoaderClient& client) {
-    // TODO(toyoshim): Once NetworkService or OutOfBlinkCORS is enabled, these
+    // TODO(toyoshim): Once NetworkService or OutOfBlinkCors is enabled, these
     // expectations below should be receiving a completion with ERR_ABORTED.
     if (!client.has_received_completion())
       return client.has_received_connection_error();
diff --git a/content/browser/loader/resource_message_filter.cc b/content/browser/loader/resource_message_filter.cc
index faed15d..482c2c9 100644
--- a/content/browser/loader/resource_message_filter.cc
+++ b/content/browser/loader/resource_message_filter.cc
@@ -181,7 +181,7 @@
   // The WeakPtr of the filter must be created on the IO thread. So sets the
   // WeakPtr of |requester_info_| now.
   requester_info_->set_filter(GetWeakPtr());
-  url_loader_factory_ = std::make_unique<network::cors::CORSURLLoaderFactory>(
+  url_loader_factory_ = std::make_unique<network::cors::CorsURLLoaderFactory>(
       base::CommandLine::ForCurrentProcess()->HasSwitch(
           switches::kDisableWebSecurity),
       std::make_unique<URLLoaderFactoryImpl>(requester_info_),
diff --git a/content/browser/manifest/manifest_browsertest.cc b/content/browser/manifest/manifest_browsertest.cc
index ba1a288..cc379af1 100644
--- a/content/browser/manifest/manifest_browsertest.cc
+++ b/content/browser/manifest/manifest_browsertest.cc
@@ -317,7 +317,7 @@
 // If a page's manifest lives in a different origin, it should follow the CORS
 // rules and requesting the manifest should return an empty manifest (unless the
 // response contains CORS headers).
-IN_PROC_BROWSER_TEST_F(ManifestBrowserTest, CORSManifest) {
+IN_PROC_BROWSER_TEST_F(ManifestBrowserTest, CorsManifest) {
   ASSERT_TRUE(cors_embedded_test_server()->Start());
   ASSERT_NE(embedded_test_server()->port(),
             cors_embedded_test_server()->port());
@@ -358,7 +358,7 @@
 
 // If a page's manifest lives in a different origin, it should be accessible if
 // it has valid access controls headers.
-IN_PROC_BROWSER_TEST_F(ManifestBrowserTest, CORSManifestWithAcessControls) {
+IN_PROC_BROWSER_TEST_F(ManifestBrowserTest, CorsManifestWithAcessControls) {
   ASSERT_TRUE(cors_embedded_test_server()->Start());
   ASSERT_NE(embedded_test_server()->port(),
             cors_embedded_test_server()->port());
diff --git a/content/browser/service_worker/service_worker_context_request_handler_unittest.cc b/content/browser/service_worker/service_worker_context_request_handler_unittest.cc
index 086d992..1005271 100644
--- a/content/browser/service_worker/service_worker_context_request_handler_unittest.cc
+++ b/content/browser/service_worker/service_worker_context_request_handler_unittest.cc
@@ -127,7 +127,7 @@
         request, helper_->context_wrapper(), &blob_storage_context_,
         helper_->mock_render_process_id(), provider_host_->provider_id(),
         false /* skip_service_worker */,
-        network::mojom::FetchRequestMode::kNoCORS,
+        network::mojom::FetchRequestMode::kNoCors,
         network::mojom::FetchCredentialsMode::kOmit,
         network::mojom::FetchRedirectMode::kFollow,
         std::string() /* integrity */, false /* keepalive */,
@@ -305,7 +305,7 @@
   ServiceWorkerRequestHandler::InitializeHandler(
       request.get(), helper_->context_wrapper(), &blob_storage_context_,
       helper_->mock_render_process_id(), provider_host_->provider_id(),
-      true /* skip_service_worker */, network::mojom::FetchRequestMode::kNoCORS,
+      true /* skip_service_worker */, network::mojom::FetchRequestMode::kNoCors,
       network::mojom::FetchCredentialsMode::kOmit,
       network::mojom::FetchRedirectMode::kFollow, std::string() /* integrity */,
       false /* keepalive */, RESOURCE_TYPE_SERVICE_WORKER,
diff --git a/content/browser/service_worker/service_worker_controllee_request_handler_unittest.cc b/content/browser/service_worker/service_worker_controllee_request_handler_unittest.cc
index 2b92849..b048cee 100644
--- a/content/browser/service_worker/service_worker_controllee_request_handler_unittest.cc
+++ b/content/browser/service_worker/service_worker_controllee_request_handler_unittest.cc
@@ -52,7 +52,7 @@
         const GURL& url,
         ResourceType type,
         network::mojom::FetchRequestMode fetch_type =
-            network::mojom::FetchRequestMode::kNoCORS)
+            network::mojom::FetchRequestMode::kNoCors)
         : test_(test),
           resource_type_(type),
           request_(test->url_request_context_.CreateRequest(
@@ -462,7 +462,7 @@
   // CORS request should be returned to renderer for CORS checking.
   ServiceWorkerRequestTestResources sub_test_resources_cors(
       this, GURL("https://host/scope/doc/subresource"), RESOURCE_TYPE_SCRIPT,
-      network::mojom::FetchRequestMode::kCORS);
+      network::mojom::FetchRequestMode::kCors);
   ServiceWorkerURLRequestJob* sub_cors_job =
       sub_test_resources_cors.MaybeCreateJob();
 
diff --git a/content/browser/service_worker/service_worker_data_pipe_reader_unittest.cc b/content/browser/service_worker/service_worker_data_pipe_reader_unittest.cc
index dfe7d9f..2093ef5 100644
--- a/content/browser/service_worker/service_worker_data_pipe_reader_unittest.cc
+++ b/content/browser/service_worker/service_worker_data_pipe_reader_unittest.cc
@@ -36,7 +36,7 @@
             "",
             nullptr,
             nullptr,
-            network::mojom::FetchRequestMode::kNoCORS,
+            network::mojom::FetchRequestMode::kNoCors,
             network::mojom::FetchCredentialsMode::kOmit,
             network::mojom::FetchRedirectMode::kFollow,
             std::string() /* integrity */,
diff --git a/content/browser/service_worker/service_worker_request_handler_unittest.cc b/content/browser/service_worker/service_worker_request_handler_unittest.cc
index 963a3d0..8bf8f7e 100644
--- a/content/browser/service_worker/service_worker_request_handler_unittest.cc
+++ b/content/browser/service_worker/service_worker_request_handler_unittest.cc
@@ -99,7 +99,7 @@
     ServiceWorkerRequestHandler::InitializeHandler(
         request, context_wrapper(), &blob_storage_context_,
         helper_->mock_render_process_id(), kMockProviderId, skip_service_worker,
-        network::mojom::FetchRequestMode::kNoCORS,
+        network::mojom::FetchRequestMode::kNoCors,
         network::mojom::FetchCredentialsMode::kOmit,
         network::mojom::FetchRedirectMode::kFollow,
         std::string() /* integrity */, false /* keepalive */, resource_type,
diff --git a/content/browser/service_worker/service_worker_url_request_job.cc b/content/browser/service_worker/service_worker_url_request_job.cc
index 4b443bd..ddc2fae 100644
--- a/content/browser/service_worker/service_worker_url_request_job.cc
+++ b/content/browser/service_worker/service_worker_url_request_job.cc
@@ -843,9 +843,9 @@
   // It is because the CORS preflight logic is implemented in the renderer. So
   // we return a fall_back_required response to the renderer.
   return !IsMainResourceLoad() &&
-         (request_mode_ == network::mojom::FetchRequestMode::kCORS ||
+         (request_mode_ == network::mojom::FetchRequestMode::kCors ||
           request_mode_ ==
-              network::mojom::FetchRequestMode::kCORSWithForcedPreflight) &&
+              network::mojom::FetchRequestMode::kCorsWithForcedPreflight) &&
          (!request()->initiator().has_value() ||
           !request()->initiator()->IsSameOriginWith(
               url::Origin::Create(request()->url())));
diff --git a/content/browser/service_worker/service_worker_url_request_job_unittest.cc b/content/browser/service_worker/service_worker_url_request_job_unittest.cc
index f297013..4b65205 100644
--- a/content/browser/service_worker/service_worker_url_request_job_unittest.cc
+++ b/content/browser/service_worker/service_worker_url_request_job_unittest.cc
@@ -116,7 +116,7 @@
     job_ = new ServiceWorkerURLRequestJob(
         request, network_delegate, provider_host_->client_uuid(),
         blob_storage_context_, resource_context_,
-        network::mojom::FetchRequestMode::kNoCORS,
+        network::mojom::FetchRequestMode::kNoCors,
         network::mojom::FetchCredentialsMode::kOmit,
         network::mojom::FetchRedirectMode::kFollow,
         std::string() /* integrity */, false /* keepalive */, resource_type_,
diff --git a/content/browser/service_worker/service_worker_write_to_cache_job_unittest.cc b/content/browser/service_worker/service_worker_write_to_cache_job_unittest.cc
index 16254748..683af59e 100644
--- a/content/browser/service_worker/service_worker_write_to_cache_job_unittest.cc
+++ b/content/browser/service_worker/service_worker_write_to_cache_job_unittest.cc
@@ -320,7 +320,7 @@
         TRAFFIC_ANNOTATION_FOR_TESTS);
     ServiceWorkerRequestHandler::InitializeHandler(
         request_.get(), context_wrapper(), &blob_storage_context_, process_id,
-        provider_id, false, network::mojom::FetchRequestMode::kNoCORS,
+        provider_id, false, network::mojom::FetchRequestMode::kNoCors,
         network::mojom::FetchCredentialsMode::kOmit,
         network::mojom::FetchRedirectMode::kFollow,
         std::string() /* integrity */, false /* keepalive */,
diff --git a/content/child/runtime_features.cc b/content/child/runtime_features.cc
index 69ca28f..fcd5b23 100644
--- a/content/child/runtime_features.cc
+++ b/content/child/runtime_features.cc
@@ -347,8 +347,8 @@
   if (base::FeatureList::IsEnabled(features::kGenericSensorExtraClasses))
     WebRuntimeFeatures::EnableGenericSensorExtraClasses(true);
 
-  if (base::FeatureList::IsEnabled(network::features::kOutOfBlinkCORS))
-    WebRuntimeFeatures::EnableOutOfBlinkCORS(true);
+  if (base::FeatureList::IsEnabled(network::features::kOutOfBlinkCors))
+    WebRuntimeFeatures::EnableOutOfBlinkCors(true);
 
   WebRuntimeFeatures::EnableMediaCastOverlayButton(
       base::FeatureList::IsEnabled(media::kMediaCastOverlayButton));
diff --git a/content/common/service_worker/service_worker_types.h b/content/common/service_worker/service_worker_types.h
index 8c667bf..f2dab4fa 100644
--- a/content/common/service_worker/service_worker_types.h
+++ b/content/common/service_worker/service_worker_types.h
@@ -92,7 +92,7 @@
   // Be sure to update EstimatedStructSize(), Serialize(), and ParseFromString()
   // when adding members.
   network::mojom::FetchRequestMode mode =
-      network::mojom::FetchRequestMode::kNoCORS;
+      network::mojom::FetchRequestMode::kNoCors;
   bool is_main_resource_load = false;
   blink::mojom::RequestContextType request_context_type =
       blink::mojom::RequestContextType::UNSPECIFIED;
diff --git a/content/common/url_schemes.cc b/content/common/url_schemes.cc
index 4113e33f..c922d97 100644
--- a/content/common/url_schemes.cc
+++ b/content/common/url_schemes.cc
@@ -79,7 +79,7 @@
 
   schemes.cors_enabled_schemes.push_back(kChromeUIScheme);
   for (auto& scheme : schemes.cors_enabled_schemes)
-    url::AddCORSEnabledScheme(scheme.c_str());
+    url::AddCorsEnabledScheme(scheme.c_str());
 
   // TODO(mkwst): Investigate whether chrome-error should be included in
   // csp_bypassing_schemes.
diff --git a/content/renderer/fetchers/manifest_fetcher.cc b/content/renderer/fetchers/manifest_fetcher.cc
index 1b9794fd..942e3d5 100644
--- a/content/renderer/fetchers/manifest_fetcher.cc
+++ b/content/renderer/fetchers/manifest_fetcher.cc
@@ -36,7 +36,7 @@
   // true, and "omit" otherwise.
   fetcher_->Start(
       frame, blink::mojom::RequestContextType::MANIFEST,
-      network::mojom::FetchRequestMode::kCORS,
+      network::mojom::FetchRequestMode::kCors,
       use_credentials ? network::mojom::FetchCredentialsMode::kInclude
                       : network::mojom::FetchCredentialsMode::kOmit,
       network::mojom::RequestContextFrameType::kNone,
diff --git a/content/renderer/fetchers/multi_resolution_image_resource_fetcher.cc b/content/renderer/fetchers/multi_resolution_image_resource_fetcher.cc
index d7436721..892dc9729 100644
--- a/content/renderer/fetchers/multi_resolution_image_resource_fetcher.cc
+++ b/content/renderer/fetchers/multi_resolution_image_resource_fetcher.cc
@@ -55,7 +55,7 @@
   fetcher_->SetCacheMode(cache_mode);
 
   fetcher_->Start(
-      frame, request_context, network::mojom::FetchRequestMode::kNoCORS,
+      frame, request_context, network::mojom::FetchRequestMode::kNoCors,
       network::mojom::FetchCredentialsMode::kInclude,
       network::mojom::RequestContextFrameType::kNone,
       base::Bind(&MultiResolutionImageResourceFetcher::OnURLFetchComplete,
diff --git a/content/renderer/loader/resource_dispatcher_unittest.cc b/content/renderer/loader/resource_dispatcher_unittest.cc
index 0e32a601..c32ad585 100644
--- a/content/renderer/loader/resource_dispatcher_unittest.cc
+++ b/content/renderer/loader/resource_dispatcher_unittest.cc
@@ -97,7 +97,7 @@
     request->referrer_policy = Referrer::GetDefaultReferrerPolicy();
     request->resource_type = RESOURCE_TYPE_SUB_RESOURCE;
     request->priority = net::LOW;
-    request->fetch_request_mode = network::mojom::FetchRequestMode::kNoCORS;
+    request->fetch_request_mode = network::mojom::FetchRequestMode::kNoCors;
     request->fetch_frame_type = network::mojom::RequestContextFrameType::kNone;
 
     const RequestExtraData extra_data;
diff --git a/content/renderer/loader/sync_load_response.h b/content/renderer/loader/sync_load_response.h
index df5a86cf..882cadf 100644
--- a/content/renderer/loader/sync_load_response.h
+++ b/content/renderer/loader/sync_load_response.h
@@ -40,7 +40,7 @@
   int extended_error_code = 0;
 
   // Optional CORS error details.
-  base::Optional<network::CORSErrorStatus> cors_error;
+  base::Optional<network::CorsErrorStatus> cors_error;
 
   // The final URL of the response.  This may differ from the request URL in
   // the case of a server redirect.
diff --git a/content/renderer/loader/url_response_body_consumer_unittest.cc b/content/renderer/loader/url_response_body_consumer_unittest.cc
index da8380d..7def49e 100644
--- a/content/renderer/loader/url_response_body_consumer_unittest.cc
+++ b/content/renderer/loader/url_response_body_consumer_unittest.cc
@@ -131,7 +131,7 @@
     request->url = GURL("http://www.example.com/");
     request->priority = net::LOW;
     request->appcache_host_id = 0;
-    request->fetch_request_mode = network::mojom::FetchRequestMode::kNoCORS;
+    request->fetch_request_mode = network::mojom::FetchRequestMode::kNoCors;
     request->fetch_frame_type = network::mojom::RequestContextFrameType::kNone;
 
     const RequestExtraData extra_data;
diff --git a/content/renderer/loader/web_url_loader_impl.cc b/content/renderer/loader/web_url_loader_impl.cc
index 44fb52c..4a2ff50 100644
--- a/content/renderer/loader/web_url_loader_impl.cc
+++ b/content/renderer/loader/web_url_loader_impl.cc
@@ -700,7 +700,7 @@
   resource_request->appcache_host_id = request.AppCacheHostID();
   resource_request->should_reset_appcache = request.ShouldResetAppCache();
   resource_request->is_external_request = request.IsExternalRequest();
-  resource_request->cors_preflight_policy = request.GetCORSPreflightPolicy();
+  resource_request->cors_preflight_policy = request.GetCorsPreflightPolicy();
   resource_request->skip_service_worker = request.GetSkipServiceWorker();
   resource_request->fetch_request_mode = request.GetFetchRequestMode();
   resource_request->fetch_credentials_mode = request.GetFetchCredentialsMode();
diff --git a/content/renderer/media/stream/webmediaplayer_ms.cc b/content/renderer/media/stream/webmediaplayer_ms.cc
index 634c70eb..4933e43 100644
--- a/content/renderer/media/stream/webmediaplayer_ms.cc
+++ b/content/renderer/media/stream/webmediaplayer_ms.cc
@@ -309,7 +309,7 @@
 blink::WebMediaPlayer::LoadTiming WebMediaPlayerMS::Load(
     LoadType load_type,
     const blink::WebMediaPlayerSource& source,
-    CORSMode /*cors_mode*/) {
+    CorsMode /*cors_mode*/) {
   DVLOG(1) << __func__;
   DCHECK(thread_checker_.CalledOnValidThread());
 
diff --git a/content/renderer/media/stream/webmediaplayer_ms.h b/content/renderer/media/stream/webmediaplayer_ms.h
index e26faac..e4d8de8 100644
--- a/content/renderer/media/stream/webmediaplayer_ms.h
+++ b/content/renderer/media/stream/webmediaplayer_ms.h
@@ -101,7 +101,7 @@
   blink::WebMediaPlayer::LoadTiming Load(
       LoadType load_type,
       const blink::WebMediaPlayerSource& source,
-      CORSMode cors_mode) override;
+      CorsMode cors_mode) override;
 
   // WebSurfaceLayerBridgeObserver implementation.
   void OnWebLayerUpdated() override;
diff --git a/content/renderer/media/stream/webmediaplayer_ms_unittest.cc b/content/renderer/media/stream/webmediaplayer_ms_unittest.cc
index f424353..90bc2ab 100644
--- a/content/renderer/media/stream/webmediaplayer_ms_unittest.cc
+++ b/content/renderer/media/stream/webmediaplayer_ms_unittest.cc
@@ -719,7 +719,7 @@
                          blink::WebMediaPlayer::kReadyStateHaveNothing));
   player_->Load(blink::WebMediaPlayer::kLoadTypeURL,
                 blink::WebMediaPlayerSource(),
-                blink::WebMediaPlayer::kCORSModeUnspecified);
+                blink::WebMediaPlayer::kCorsModeUnspecified);
   compositor_ = player_->compositor_.get();
   EXPECT_TRUE(!!compositor_);
   compositor_->SetAlgorithmEnabledForTesting(algorithm_enabled);
@@ -866,7 +866,7 @@
 
   player_->Load(blink::WebMediaPlayer::kLoadTypeURL,
                 blink::WebMediaPlayerSource(),
-                blink::WebMediaPlayer::kCORSModeUnspecified);
+                blink::WebMediaPlayer::kCorsModeUnspecified);
 
   message_loop_controller_.RunAndWaitForStatus(
       media::PipelineStatus::PIPELINE_OK);
diff --git a/content/renderer/media_capture_from_element/html_video_element_capturer_source_unittest.cc b/content/renderer/media_capture_from_element/html_video_element_capturer_source_unittest.cc
index ef834677e..f11a184 100644
--- a/content/renderer/media_capture_from_element/html_video_element_capturer_source_unittest.cc
+++ b/content/renderer/media_capture_from_element/html_video_element_capturer_source_unittest.cc
@@ -39,7 +39,7 @@
 
   LoadTiming Load(LoadType,
                   const blink::WebMediaPlayerSource&,
-                  CORSMode) override {
+                  CorsMode) override {
     return LoadTiming::kImmediate;
   }
   void Play() override {}
diff --git a/content/renderer/pepper/pepper_url_loader_host.cc b/content/renderer/pepper/pepper_url_loader_host.cc
index 43807f48..52556e5 100644
--- a/content/renderer/pepper/pepper_url_loader_host.cc
+++ b/content/renderer/pepper/pepper_url_loader_host.cc
@@ -268,7 +268,7 @@
     if (filled_in_request_data.allow_cross_origin_requests) {
       // Allow cross-origin requests with access control. The request specifies
       // if credentials are to be sent.
-      web_request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+      web_request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
       web_request.SetFetchCredentialsMode(
           filled_in_request_data.allow_credentials
               ? network::mojom::FetchCredentialsMode::kInclude
diff --git a/content/renderer/service_worker/service_worker_subresource_loader.cc b/content/renderer/service_worker/service_worker_subresource_loader.cc
index e9b70504..0292d64 100644
--- a/content/renderer/service_worker/service_worker_subresource_loader.cc
+++ b/content/renderer/service_worker/service_worker_subresource_loader.cc
@@ -388,9 +388,9 @@
   // response to Blink.
   // TODO(falken): Remove this mechanism after OOB-CORS ships.
   if ((resource_request_.fetch_request_mode ==
-           network::mojom::FetchRequestMode::kCORS ||
+           network::mojom::FetchRequestMode::kCors ||
        resource_request_.fetch_request_mode ==
-           network::mojom::FetchRequestMode::kCORSWithForcedPreflight) &&
+           network::mojom::FetchRequestMode::kCorsWithForcedPreflight) &&
       (!resource_request_.request_initiator.has_value() ||
        !resource_request_.request_initiator->IsSameOriginWith(
            url::Origin::Create(resource_request_.url)))) {
diff --git a/content/renderer/service_worker/service_worker_subresource_loader_unittest.cc b/content/renderer/service_worker/service_worker_subresource_loader_unittest.cc
index a824580..c27a10d 100644
--- a/content/renderer/service_worker/service_worker_subresource_loader_unittest.cc
+++ b/content/renderer/service_worker/service_worker_subresource_loader_unittest.cc
@@ -575,7 +575,7 @@
     // TODO(falken): It'd be nicer to also check the request body was sent to
     // network but it requires more complicated network mocking and it was hard
     // getting EmbeddedTestServer working with these tests (probably
-    // CORSFallbackResponse is too heavy). We also have Web Platform Tests that
+    // CorsFallbackResponse is too heavy). We also have Web Platform Tests that
     // cover this case in fetch-event.https.html.
   }
 
@@ -1260,7 +1260,7 @@
 }
 
 // Test when the service worker responds with network fallback to CORS request.
-TEST_F(ServiceWorkerSubresourceLoaderTest, CORSFallbackResponse) {
+TEST_F(ServiceWorkerSubresourceLoaderTest, CorsFallbackResponse) {
   fake_controller_.RespondWithFallback();
 
   network::mojom::URLLoaderFactoryPtr factory =
@@ -1274,31 +1274,31 @@
   const TestCase kTests[] = {
       {network::mojom::FetchRequestMode::kSameOrigin,
        base::Optional<url::Origin>(), false},
-      {network::mojom::FetchRequestMode::kNoCORS, base::Optional<url::Origin>(),
+      {network::mojom::FetchRequestMode::kNoCors, base::Optional<url::Origin>(),
        false},
-      {network::mojom::FetchRequestMode::kCORS, base::Optional<url::Origin>(),
+      {network::mojom::FetchRequestMode::kCors, base::Optional<url::Origin>(),
        true},
-      {network::mojom::FetchRequestMode::kCORSWithForcedPreflight,
+      {network::mojom::FetchRequestMode::kCorsWithForcedPreflight,
        base::Optional<url::Origin>(), true},
       {network::mojom::FetchRequestMode::kNavigate,
        base::Optional<url::Origin>(), false},
       {network::mojom::FetchRequestMode::kSameOrigin,
        url::Origin::Create(GURL("https://www.example.com/")), false},
-      {network::mojom::FetchRequestMode::kNoCORS,
+      {network::mojom::FetchRequestMode::kNoCors,
        url::Origin::Create(GURL("https://www.example.com/")), false},
-      {network::mojom::FetchRequestMode::kCORS,
+      {network::mojom::FetchRequestMode::kCors,
        url::Origin::Create(GURL("https://www.example.com/")), false},
-      {network::mojom::FetchRequestMode::kCORSWithForcedPreflight,
+      {network::mojom::FetchRequestMode::kCorsWithForcedPreflight,
        url::Origin::Create(GURL("https://www.example.com/")), false},
       {network::mojom::FetchRequestMode::kNavigate,
        url::Origin::Create(GURL("https://other.example.com/")), false},
       {network::mojom::FetchRequestMode::kSameOrigin,
        url::Origin::Create(GURL("https://other.example.com/")), false},
-      {network::mojom::FetchRequestMode::kNoCORS,
+      {network::mojom::FetchRequestMode::kNoCors,
        url::Origin::Create(GURL("https://other.example.com/")), false},
-      {network::mojom::FetchRequestMode::kCORS,
+      {network::mojom::FetchRequestMode::kCors,
        url::Origin::Create(GURL("https://other.example.com/")), true},
-      {network::mojom::FetchRequestMode::kCORSWithForcedPreflight,
+      {network::mojom::FetchRequestMode::kCorsWithForcedPreflight,
        url::Origin::Create(GURL("https://other.example.com/")), true},
       {network::mojom::FetchRequestMode::kNavigate,
        url::Origin::Create(GURL("https://other.example.com/")), false}};
diff --git a/content/shell/test_runner/test_runner.cc b/content/shell/test_runner/test_runner.cc
index afa3163c..7986887 100644
--- a/content/shell/test_runner/test_runner.cc
+++ b/content/shell/test_runner/test_runner.cc
@@ -2118,7 +2118,7 @@
       url, blink::WebString::FromUTF8(destination_protocol),
       blink::WebString::FromUTF8(destination_host),
       allow_destination_subdomains,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 }
 
 void TestRunner::SetTextSubpixelPositioning(bool value) {
diff --git a/extensions/common/cors_util.cc b/extensions/common/cors_util.cc
index c058cfa..e2688a1 100644
--- a/extensions/common/cors_util.cc
+++ b/extensions/common/cors_util.cc
@@ -20,7 +20,7 @@
 void AddURLPatternSetToList(
     const URLPatternSet& pattern_set,
     std::vector<network::mojom::CorsOriginPatternPtr>* list,
-    network::mojom::CORSOriginAccessMatchPriority priority) {
+    network::mojom::CorsOriginAccessMatchPriority priority) {
   static const char* const kSchemes[] = {
     content::kChromeUIScheme,
 #if defined(OS_CHROMEOS)
@@ -53,7 +53,7 @@
       extension.permissions_data()->GetEffectiveHostPermissions();
   AddURLPatternSetToList(
       origin_permissions, &allow_list,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
   // Hosts exempted from the enterprise policy blocklist.
   // This set intersection is necessary to prevent an enterprise policy from
@@ -64,7 +64,7 @@
           origin_permissions, URLPatternSet::IntersectionBehavior::kDetailed);
   AddURLPatternSetToList(
       policy_allowed_host_patterns, &allow_list,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
 
   return allow_list;
 }
@@ -76,12 +76,12 @@
   // Hosts blocked by enterprise policy.
   AddURLPatternSetToList(
       extension.permissions_data()->policy_blocked_hosts(), &block_list,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
 
   GURL webstore_launch_url = extension_urls::GetWebstoreLaunchURL();
   block_list.push_back(network::mojom::CorsOriginPattern::New(
       webstore_launch_url.scheme(), webstore_launch_url.host(), true,
-      network::mojom::CORSOriginAccessMatchPriority::kHighPriority));
+      network::mojom::CorsOriginAccessMatchPriority::kHighPriority));
 
   // TODO(devlin): Should we also block the webstore update URL here? See
   // https://crbug.com/826946 for a related instance.
diff --git a/media/blink/multibuffer_data_source.cc b/media/blink/multibuffer_data_source.cc
index 9571a014..0c99bb24 100644
--- a/media/blink/multibuffer_data_source.cc
+++ b/media/blink/multibuffer_data_source.cc
@@ -290,7 +290,7 @@
   return url_data()->is_cors_cross_origin();
 }
 
-UrlData::CORSMode MultibufferDataSource::cors_mode() const {
+UrlData::CorsMode MultibufferDataSource::cors_mode() const {
   return url_data()->cors_mode();
 }
 
diff --git a/media/blink/multibuffer_data_source.h b/media/blink/multibuffer_data_source.h
index 52d0d443..8a938b7 100644
--- a/media/blink/multibuffer_data_source.h
+++ b/media/blink/multibuffer_data_source.h
@@ -83,8 +83,8 @@
   // This must be called after the response arrives.
   bool IsCorsCrossOrigin() const;
 
-  // Returns the CORSMode of the underlying UrlData.
-  UrlData::CORSMode cors_mode() const;
+  // Returns the CorsMode of the underlying UrlData.
+  UrlData::CorsMode cors_mode() const;
 
   // Notifies changes in playback state for controlling media buffering
   // behavior.
diff --git a/media/blink/multibuffer_data_source_unittest.cc b/media/blink/multibuffer_data_source_unittest.cc
index 4b9f83e7..6bf7d48 100644
--- a/media/blink/multibuffer_data_source_unittest.cc
+++ b/media/blink/multibuffer_data_source_unittest.cc
@@ -114,7 +114,7 @@
 
 class TestUrlData : public UrlData {
  public:
-  TestUrlData(const GURL& url, CORSMode cors_mode, UrlIndex* url_index)
+  TestUrlData(const GURL& url, CorsMode cors_mode, UrlIndex* url_index)
       : UrlData(url, cors_mode, url_index),
         block_shift_(url_index->block_shift()) {}
 
@@ -145,7 +145,7 @@
       : UrlIndex(fetch_context) {}
 
   scoped_refptr<UrlData> NewUrlData(const GURL& url,
-                                    UrlData::CORSMode cors_mode) override {
+                                    UrlData::CorsMode cors_mode) override {
     last_url_data_ = new TestUrlData(url, cors_mode, this);
     return last_url_data_;
   }
@@ -223,9 +223,9 @@
 
   MOCK_METHOD1(OnInitialize, void(bool));
 
-  void InitializeWithCORS(const char* url,
+  void InitializeWithCors(const char* url,
                           bool expected,
-                          UrlData::CORSMode cors_mode,
+                          UrlData::CorsMode cors_mode,
                           size_t file_size = kFileSize) {
     GURL gurl(url);
     data_source_.reset(new MockMultibufferDataSource(
@@ -246,7 +246,7 @@
   void Initialize(const char* url,
                   bool expected,
                   size_t file_size = kFileSize) {
-    InitializeWithCORS(url, expected, UrlData::CORS_UNSPECIFIED, file_size);
+    InitializeWithCors(url, expected, UrlData::CORS_UNSPECIFIED, file_size);
   }
 
   // Helper to initialize tests with a valid 200 response.
@@ -782,8 +782,8 @@
 }
 
 TEST_F(MultibufferDataSourceTest,
-       Http_MixedResponse_ServiceWorkerProxiedAndDifferentOriginResponseCORS) {
-  InitializeWithCORS(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
+       Http_MixedResponse_ServiceWorkerProxiedAndDifferentOriginResponseCors) {
+  InitializeWithCors(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
   WebURLResponse response1 =
       response_generator_->GeneratePartial206(0, kDataSize - 1);
   response1.SetWasFetchedViaServiceWorker(true);
@@ -1494,7 +1494,7 @@
 }
 
 TEST_F(MultibufferDataSourceTest, ResponseTypeBasic) {
-  InitializeWithCORS(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
+  InitializeWithCors(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
   set_preload(MultibufferDataSource::NONE);
   WebURLResponse response1 =
       response_generator_->GeneratePartial206(0, kDataSize - 1);
@@ -1514,11 +1514,11 @@
 }
 
 TEST_F(MultibufferDataSourceTest, ResponseTypeCors) {
-  InitializeWithCORS(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
+  InitializeWithCors(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
   set_preload(MultibufferDataSource::NONE);
   WebURLResponse response1 =
       response_generator_->GeneratePartial206(0, kDataSize - 1);
-  response1.SetType(network::mojom::FetchResponseType::kCORS);
+  response1.SetType(network::mojom::FetchResponseType::kCors);
 
   EXPECT_CALL(host_, SetTotalBytes(kFileSize));
   EXPECT_CALL(host_, AddBufferedByteRange(0, kDataSize));
@@ -1534,7 +1534,7 @@
 }
 
 TEST_F(MultibufferDataSourceTest, ResponseTypeDefault) {
-  InitializeWithCORS(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
+  InitializeWithCors(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
   set_preload(MultibufferDataSource::NONE);
   WebURLResponse response1 =
       response_generator_->GeneratePartial206(0, kDataSize - 1);
@@ -1554,7 +1554,7 @@
 }
 
 TEST_F(MultibufferDataSourceTest, ResponseTypeOpaque) {
-  InitializeWithCORS(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
+  InitializeWithCors(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
   set_preload(MultibufferDataSource::NONE);
   WebURLResponse response1 =
       response_generator_->GeneratePartial206(0, kDataSize - 1);
@@ -1574,7 +1574,7 @@
 }
 
 TEST_F(MultibufferDataSourceTest, ResponseTypeOpaqueRedirect) {
-  InitializeWithCORS(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
+  InitializeWithCors(kHttpUrl, true, UrlData::CORS_ANONYMOUS);
   set_preload(MultibufferDataSource::NONE);
   WebURLResponse response1 =
       response_generator_->GeneratePartial206(0, kDataSize - 1);
diff --git a/media/blink/resource_multibuffer_data_provider.cc b/media/blink/resource_multibuffer_data_provider.cc
index 8363162..01c6baf 100644
--- a/media/blink/resource_multibuffer_data_provider.cc
+++ b/media/blink/resource_multibuffer_data_provider.cc
@@ -115,9 +115,9 @@
     options.expose_all_response_headers = true;
     // The author header set is empty, no preflight should go ahead.
     options.preflight_policy =
-        network::mojom::CORSPreflightPolicy::kPreventPreflight;
+        network::mojom::CorsPreflightPolicy::kPreventPreflight;
 
-    request->SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+    request->SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
     if (url_data_->cors_mode() != UrlData::CORS_USE_CREDENTIALS) {
       request->SetFetchCredentialsMode(
           network::mojom::FetchCredentialsMode::kSameOrigin);
@@ -337,7 +337,7 @@
 
   // This is vital for security!
   destination_url_data->set_is_cors_cross_origin(
-      network::cors::IsCORSCrossOriginResponseType(response_type));
+      network::cors::IsCorsCrossOriginResponseType(response_type));
 
   if (destination_url_data != url_data_) {
     // At this point, we've encountered a redirect, or found a better url data
diff --git a/media/blink/resource_multibuffer_data_provider.h b/media/blink/resource_multibuffer_data_provider.h
index 5c24d194..484f79a 100644
--- a/media/blink/resource_multibuffer_data_provider.h
+++ b/media/blink/resource_multibuffer_data_provider.h
@@ -111,7 +111,7 @@
 
   // Copy of url_data_->cors_mode()
   // const to make it obvious that redirects cannot change it.
-  const UrlData::CORSMode cors_mode_;
+  const UrlData::CorsMode cors_mode_;
 
   // The origin for the initial request.
   // const to make it obvious that redirects cannot change it.
diff --git a/media/blink/url_index.cc b/media/blink/url_index.cc
index 281e884d..dc9fd33 100644
--- a/media/blink/url_index.cc
+++ b/media/blink/url_index.cc
@@ -57,7 +57,7 @@
   url_data_->OnEmpty();
 }
 
-UrlData::UrlData(const GURL& url, CORSMode cors_mode, UrlIndex* url_index)
+UrlData::UrlData(const GURL& url, CorsMode cors_mode, UrlIndex* url_index)
     : url_(url),
       have_data_origin_(false),
       cors_mode_(cors_mode),
@@ -77,7 +77,7 @@
   DCHECK_EQ(0, preloading_);
 }
 
-std::pair<GURL, UrlData::CORSMode> UrlData::key() const {
+std::pair<GURL, UrlData::CorsMode> UrlData::key() const {
   DCHECK(thread_checker_.CalledOnValidThread());
   return std::make_pair(url(), cors_mode());
 }
@@ -399,7 +399,7 @@
 }
 
 scoped_refptr<UrlData> UrlIndex::GetByUrl(const GURL& gurl,
-                                          UrlData::CORSMode cors_mode) {
+                                          UrlData::CorsMode cors_mode) {
   auto i = indexed_data_.find(std::make_pair(gurl, cors_mode));
   if (i != indexed_data_.end() && i->second->Valid()) {
     return i->second;
@@ -409,7 +409,7 @@
 }
 
 scoped_refptr<UrlData> UrlIndex::NewUrlData(const GURL& url,
-                                            UrlData::CORSMode cors_mode) {
+                                            UrlData::CorsMode cors_mode) {
   return new UrlData(url, cors_mode, this);
 }
 
diff --git a/media/blink/url_index.h b/media/blink/url_index.h
index 1ed80606c..4b0ede7 100644
--- a/media/blink/url_index.h
+++ b/media/blink/url_index.h
@@ -57,9 +57,9 @@
 // Data is cached using a MultiBuffer instance.
 class MEDIA_BLINK_EXPORT UrlData : public base::RefCounted<UrlData> {
  public:
-  // Keep in sync with WebMediaPlayer::CORSMode.
-  enum CORSMode { CORS_UNSPECIFIED, CORS_ANONYMOUS, CORS_USE_CREDENTIALS };
-  typedef std::pair<GURL, CORSMode> KeyType;
+  // Keep in sync with WebMediaPlayer::CorsMode.
+  enum CorsMode { CORS_UNSPECIFIED, CORS_ANONYMOUS, CORS_USE_CREDENTIALS };
+  typedef std::pair<GURL, CorsMode> KeyType;
 
   // UrlData keeps track of how many clients are preloading or
   // playing from this resource. This class encapsulates the
@@ -90,7 +90,7 @@
   const GURL& url() const { return url_; }
 
   // Cross-origin access mode
-  CORSMode cors_mode() const { return cors_mode_; }
+  CorsMode cors_mode() const { return cors_mode_; }
 
   // Are HTTP range requests supported?
   bool range_supported() const { return range_supported_; }
@@ -188,7 +188,7 @@
   void WaitToLoad(base::OnceClosure cb);
 
  protected:
-  UrlData(const GURL& url, CORSMode cors_mode, UrlIndex* url_index);
+  UrlData(const GURL& url, CorsMode cors_mode, UrlIndex* url_index);
   virtual ~UrlData();
 
  private:
@@ -227,7 +227,7 @@
   bool have_data_origin_;
 
   // Cross-origin access mode.
-  const CORSMode cors_mode_;
+  const CorsMode cors_mode_;
 
   UrlIndex* const url_index_;
 
@@ -299,7 +299,7 @@
   // Because the returned UrlData has a raw reference to |this|, it must be
   // released before |this| is destroyed.
   scoped_refptr<UrlData> GetByUrl(const GURL& gurl,
-                                  UrlData::CORSMode cors_mode);
+                                  UrlData::CorsMode cors_mode);
 
   // Add the given UrlData to the index if possible. If a better UrlData
   // is already present in the index, return it instead. (If not, we just
@@ -343,7 +343,7 @@
 
   // Virtual so we can override it in tests.
   virtual scoped_refptr<UrlData> NewUrlData(const GURL& url,
-                                            UrlData::CORSMode cors_mode);
+                                            UrlData::CorsMode cors_mode);
 
   void OnMemoryPressure(
       base::MemoryPressureListener::MemoryPressureLevel memory_pressure_level);
diff --git a/media/blink/url_index_unittest.cc b/media/blink/url_index_unittest.cc
index 391b055..01d53a5 100644
--- a/media/blink/url_index_unittest.cc
+++ b/media/blink/url_index_unittest.cc
@@ -23,7 +23,7 @@
   UrlIndexTest() : url_index_(nullptr) {}
 
   scoped_refptr<UrlData> GetByUrl(const GURL& gurl,
-                                  UrlData::CORSMode cors_mode) {
+                                  UrlData::CorsMode cors_mode) {
     scoped_refptr<UrlData> ret = url_index_.GetByUrl(gurl, cors_mode);
     EXPECT_EQ(ret->url(), gurl);
     EXPECT_EQ(ret->cors_mode(), cors_mode);
diff --git a/media/blink/webmediaplayer_impl.cc b/media/blink/webmediaplayer_impl.cc
index 9230041a..c4c3075 100644
--- a/media/blink/webmediaplayer_impl.cc
+++ b/media/blink/webmediaplayer_impl.cc
@@ -214,10 +214,10 @@
 
 class BufferedDataSourceHostImpl;
 
-STATIC_ASSERT_ENUM(WebMediaPlayer::kCORSModeUnspecified,
+STATIC_ASSERT_ENUM(WebMediaPlayer::kCorsModeUnspecified,
                    UrlData::CORS_UNSPECIFIED);
-STATIC_ASSERT_ENUM(WebMediaPlayer::kCORSModeAnonymous, UrlData::CORS_ANONYMOUS);
-STATIC_ASSERT_ENUM(WebMediaPlayer::kCORSModeUseCredentials,
+STATIC_ASSERT_ENUM(WebMediaPlayer::kCorsModeAnonymous, UrlData::CORS_ANONYMOUS);
+STATIC_ASSERT_ENUM(WebMediaPlayer::kCorsModeUseCredentials,
                    UrlData::CORS_USE_CREDENTIALS);
 
 WebMediaPlayerImpl::WebMediaPlayerImpl(
@@ -418,7 +418,7 @@
 WebMediaPlayer::LoadTiming WebMediaPlayerImpl::Load(
     LoadType load_type,
     const blink::WebMediaPlayerSource& source,
-    CORSMode cors_mode) {
+    CorsMode cors_mode) {
   DVLOG(1) << __func__;
   // Only URL or MSE blob URL is supported.
   DCHECK(source.IsURL());
@@ -590,7 +590,7 @@
 
 void WebMediaPlayerImpl::DoLoad(LoadType load_type,
                                 const blink::WebURL& url,
-                                CORSMode cors_mode) {
+                                CorsMode cors_mode) {
   TRACE_EVENT1("media", "WebMediaPlayerImpl::DoLoad", "id", media_log_->id());
   DVLOG(1) << __func__;
   DCHECK(main_task_runner_->BelongsToCurrentThread());
@@ -633,7 +633,7 @@
     StartPipeline();
   } else {
     auto url_data =
-        url_index_->GetByUrl(url, static_cast<UrlData::CORSMode>(cors_mode));
+        url_index_->GetByUrl(url, static_cast<UrlData::CorsMode>(cors_mode));
     // Notify |this| of bytes received by the network.
     url_data->AddBytesReceivedCallback(BindToCurrentLoop(base::BindRepeating(
         &WebMediaPlayerImpl::OnBytesReceived, AsWeakPtr())));
diff --git a/media/blink/webmediaplayer_impl.h b/media/blink/webmediaplayer_impl.h
index e256fcc..2eca96f 100644
--- a/media/blink/webmediaplayer_impl.h
+++ b/media/blink/webmediaplayer_impl.h
@@ -126,7 +126,7 @@
 
   WebMediaPlayer::LoadTiming Load(LoadType load_type,
                                   const blink::WebMediaPlayerSource& source,
-                                  CORSMode cors_mode) override;
+                                  CorsMode cors_mode) override;
 
   // Playback controls.
   void Play() override;
@@ -369,9 +369,7 @@
 
   // Called after |defer_load_cb_| has decided to allow the load. If
   // |defer_load_cb_| is null this is called immediately.
-  void DoLoad(LoadType load_type,
-              const blink::WebURL& url,
-              CORSMode cors_mode);
+  void DoLoad(LoadType load_type, const blink::WebURL& url, CorsMode cors_mode);
 
   // Called after asynchronous initialization of a data source completed.
   void DataSourceInitialized(bool success);
diff --git a/media/blink/webmediaplayer_impl_unittest.cc b/media/blink/webmediaplayer_impl_unittest.cc
index f237769..63a42d67 100644
--- a/media/blink/webmediaplayer_impl_unittest.cc
+++ b/media/blink/webmediaplayer_impl_unittest.cc
@@ -623,7 +623,7 @@
 
     wmpi_->Load(blink::WebMediaPlayer::kLoadTypeURL,
                 blink::WebMediaPlayerSource(blink::WebURL(kTestURL)),
-                blink::WebMediaPlayer::kCORSModeUnspecified);
+                blink::WebMediaPlayer::kCorsModeUnspecified);
 
     base::RunLoop().RunUntilIdle();
 
diff --git a/net/reporting/reporting_uploader_unittest.cc b/net/reporting/reporting_uploader_unittest.cc
index 04c8155..1cf86c90 100644
--- a/net/reporting/reporting_uploader_unittest.cc
+++ b/net/reporting/reporting_uploader_unittest.cc
@@ -244,7 +244,7 @@
   return std::move(response);
 }
 
-TEST_F(ReportingUploaderTest, FailedCORSPreflight) {
+TEST_F(ReportingUploaderTest, FailedCorsPreflight) {
   server_.RegisterRequestHandler(base::BindRepeating(&ReturnPreflightError));
   server_.RegisterRequestHandler(base::BindRepeating(&ReturnResponse, HTTP_OK));
   ASSERT_TRUE(server_.Start());
@@ -273,7 +273,7 @@
   return std::move(response);
 }
 
-TEST_F(ReportingUploaderTest, CORSPreflightWithoutOrigin) {
+TEST_F(ReportingUploaderTest, CorsPreflightWithoutOrigin) {
   server_.RegisterRequestHandler(
       base::BindRepeating(&ReturnPreflightWithoutOrigin));
   server_.RegisterRequestHandler(base::BindRepeating(&ReturnResponse, HTTP_OK));
@@ -303,7 +303,7 @@
   return std::move(response);
 }
 
-TEST_F(ReportingUploaderTest, CORSPreflightWithoutMethods) {
+TEST_F(ReportingUploaderTest, CorsPreflightWithoutMethods) {
   server_.RegisterRequestHandler(
       base::BindRepeating(&ReturnPreflightWithoutMethods));
   server_.RegisterRequestHandler(base::BindRepeating(&ReturnResponse, HTTP_OK));
@@ -333,7 +333,7 @@
   return std::move(response);
 }
 
-TEST_F(ReportingUploaderTest, CORSPreflightWithoutHeaders) {
+TEST_F(ReportingUploaderTest, CorsPreflightWithoutHeaders) {
   server_.RegisterRequestHandler(
       base::BindRepeating(&ReturnPreflightWithoutHeaders));
   server_.RegisterRequestHandler(base::BindRepeating(&ReturnResponse, HTTP_OK));
diff --git a/services/network/cors/cors_url_loader.cc b/services/network/cors/cors_url_loader.cc
index 48f5d700..e76bcea 100644
--- a/services/network/cors/cors_url_loader.cc
+++ b/services/network/cors/cors_url_loader.cc
@@ -18,33 +18,33 @@
 namespace {
 
 bool NeedsPreflight(const ResourceRequest& request) {
-  if (!IsCORSEnabledRequestMode(request.fetch_request_mode))
+  if (!IsCorsEnabledRequestMode(request.fetch_request_mode))
     return false;
 
   if (request.is_external_request)
     return true;
 
   if (request.fetch_request_mode ==
-      mojom::FetchRequestMode::kCORSWithForcedPreflight) {
+      mojom::FetchRequestMode::kCorsWithForcedPreflight) {
     return true;
   }
 
   if (request.cors_preflight_policy ==
-      mojom::CORSPreflightPolicy::kPreventPreflight) {
+      mojom::CorsPreflightPolicy::kPreventPreflight) {
     return false;
   }
 
-  if (!IsCORSSafelistedMethod(request.method))
+  if (!IsCorsSafelistedMethod(request.method))
     return true;
 
-  return !CORSUnsafeNotForbiddenRequestHeaderNames(
+  return !CorsUnsafeNotForbiddenRequestHeaderNames(
               request.headers.GetHeaderVector(), request.is_revalidating)
               .empty();
 }
 
 }  // namespace
 
-CORSURLLoader::CORSURLLoader(
+CorsURLLoader::CorsURLLoader(
     mojom::URLLoaderRequest loader_request,
     int32_t routing_id,
     int32_t request_id,
@@ -72,22 +72,22 @@
       preflight_controller_(preflight_controller),
       weak_factory_(this) {
   binding_.set_connection_error_handler(base::BindOnce(
-      &CORSURLLoader::OnConnectionError, base::Unretained(this)));
+      &CorsURLLoader::OnConnectionError, base::Unretained(this)));
   DCHECK(network_loader_factory_);
   DCHECK(origin_access_list_);
   DCHECK(preflight_controller_);
-  SetCORSFlagIfNeeded();
+  SetCorsFlagIfNeeded();
 }
 
-CORSURLLoader::~CORSURLLoader() {
+CorsURLLoader::~CorsURLLoader() {
   // Close pipes first to ignore possible subsequent callback invocations
   // cased by |network_loader_|
   network_client_binding_.Close();
 }
 
-void CORSURLLoader::Start() {
+void CorsURLLoader::Start() {
   if (fetch_cors_flag_ &&
-      IsCORSEnabledRequestMode(request_.fetch_request_mode)) {
+      IsCorsEnabledRequestMode(request_.fetch_request_mode)) {
     // Username and password should be stripped in a CORS-enabled request.
     if (request_.url.has_username() || request_.url.has_password()) {
       GURL::Replacements replacements;
@@ -99,7 +99,7 @@
   StartRequest();
 }
 
-void CORSURLLoader::FollowRedirect(
+void CorsURLLoader::FollowRedirect(
     const base::Optional<std::vector<std::string>>&
         to_be_removed_request_headers,
     const base::Optional<net::HttpRequestHeaders>& modified_request_headers) {
@@ -134,7 +134,7 @@
     request_.request_body = nullptr;
 
   const bool original_fetch_cors_flag = fetch_cors_flag_;
-  SetCORSFlagIfNeeded();
+  SetCorsFlagIfNeeded();
 
   // We cannot use FollowRedirect for a request with preflight (i.e., when both
   // |fetch_cors_flag_| and |NeedsPreflight(request_)| are true).
@@ -155,7 +155,7 @@
                                     modified_request_headers);
     return;
   }
-  DCHECK_NE(request_.fetch_request_mode, mojom::FetchRequestMode::kNoCORS);
+  DCHECK_NE(request_.fetch_request_mode, mojom::FetchRequestMode::kNoCors);
 
   if (request_finalizer_)
     request_finalizer_.Run(request_id_);
@@ -164,27 +164,27 @@
   StartRequest();
 }
 
-void CORSURLLoader::ProceedWithResponse() {
+void CorsURLLoader::ProceedWithResponse() {
   NOTREACHED();
 }
 
-void CORSURLLoader::SetPriority(net::RequestPriority priority,
+void CorsURLLoader::SetPriority(net::RequestPriority priority,
                                 int32_t intra_priority_value) {
   if (network_loader_)
     network_loader_->SetPriority(priority, intra_priority_value);
 }
 
-void CORSURLLoader::PauseReadingBodyFromNet() {
+void CorsURLLoader::PauseReadingBodyFromNet() {
   if (network_loader_)
     network_loader_->PauseReadingBodyFromNet();
 }
 
-void CORSURLLoader::ResumeReadingBodyFromNet() {
+void CorsURLLoader::ResumeReadingBodyFromNet() {
   if (network_loader_)
     network_loader_->ResumeReadingBodyFromNet();
 }
 
-void CORSURLLoader::OnReceiveResponse(
+void CorsURLLoader::OnReceiveResponse(
     const ResourceResponseHead& response_head) {
   DCHECK(network_loader_);
   DCHECK(forwarding_client_);
@@ -211,7 +211,7 @@
   forwarding_client_->OnReceiveResponse(response_head_to_pass);
 }
 
-void CORSURLLoader::OnReceiveRedirect(
+void CorsURLLoader::OnReceiveRedirect(
     const net::RedirectInfo& redirect_info,
     const ResourceResponseHead& response_head) {
   DCHECK(network_loader_);
@@ -227,7 +227,7 @@
   // If |CORS flag| is set and a CORS check for |request| and |response| returns
   // failure, then return a network error.
   if (fetch_cors_flag_ &&
-      IsCORSEnabledRequestMode(request_.fetch_request_mode)) {
+      IsCorsEnabledRequestMode(request_.fetch_request_mode)) {
     const auto error_status = CheckAccess(
         request_.url, response_head.headers->response_code(),
         GetHeaderString(response_head, header_names::kAccessControlAllowOrigin),
@@ -301,7 +301,7 @@
   forwarding_client_->OnReceiveRedirect(redirect_info, response_head_to_pass);
 }
 
-void CORSURLLoader::OnUploadProgress(int64_t current_position,
+void CorsURLLoader::OnUploadProgress(int64_t current_position,
                                      int64_t total_size,
                                      OnUploadProgressCallback ack_callback) {
   DCHECK(network_loader_);
@@ -311,21 +311,21 @@
                                        std::move(ack_callback));
 }
 
-void CORSURLLoader::OnReceiveCachedMetadata(const std::vector<uint8_t>& data) {
+void CorsURLLoader::OnReceiveCachedMetadata(const std::vector<uint8_t>& data) {
   DCHECK(network_loader_);
   DCHECK(forwarding_client_);
   DCHECK(!is_waiting_follow_redirect_call_);
   forwarding_client_->OnReceiveCachedMetadata(data);
 }
 
-void CORSURLLoader::OnTransferSizeUpdated(int32_t transfer_size_diff) {
+void CorsURLLoader::OnTransferSizeUpdated(int32_t transfer_size_diff) {
   DCHECK(network_loader_);
   DCHECK(forwarding_client_);
   DCHECK(!is_waiting_follow_redirect_call_);
   forwarding_client_->OnTransferSizeUpdated(transfer_size_diff);
 }
 
-void CORSURLLoader::OnStartLoadingResponseBody(
+void CorsURLLoader::OnStartLoadingResponseBody(
     mojo::ScopedDataPipeConsumerHandle body) {
   DCHECK(network_loader_);
   DCHECK(forwarding_client_);
@@ -333,7 +333,7 @@
   forwarding_client_->OnStartLoadingResponseBody(std::move(body));
 }
 
-void CORSURLLoader::OnComplete(const URLLoaderCompletionStatus& status) {
+void CorsURLLoader::OnComplete(const URLLoaderCompletionStatus& status) {
   DCHECK(network_loader_);
   DCHECK(forwarding_client_);
   DCHECK(!is_waiting_follow_redirect_call_);
@@ -344,15 +344,15 @@
   HandleComplete(modified_status);
 }
 
-void CORSURLLoader::StartRequest() {
-  if (fetch_cors_flag_ && !base::ContainsValue(url::GetCORSEnabledSchemes(),
+void CorsURLLoader::StartRequest() {
+  if (fetch_cors_flag_ && !base::ContainsValue(url::GetCorsEnabledSchemes(),
                                                request_.url.scheme())) {
     HandleComplete(URLLoaderCompletionStatus(
-        CORSErrorStatus(mojom::CORSError::kCORSDisabledScheme)));
+        CorsErrorStatus(mojom::CorsError::kCorsDisabledScheme)));
     return;
   }
 
-  // If the CORS flag is set, |httpRequest|’s method is neither `GET` nor
+  // If the |CORS flag| is set, |httpRequest|’s method is neither `GET` nor
   // `HEAD`, or |httpRequest|’s mode is "websocket", then append
   // `Origin`/the result of serializing a request origin with |httpRequest|, to
   // |httpRequest|’s header list.
@@ -372,7 +372,7 @@
       request_.fetch_request_mode == mojom::FetchRequestMode::kSameOrigin) {
     DCHECK(request_.request_initiator);
     HandleComplete(URLLoaderCompletionStatus(
-        CORSErrorStatus(mojom::CORSError::kDisallowedByMode)));
+        CorsErrorStatus(mojom::CorsError::kDisallowedByMode)));
     return;
   }
 
@@ -400,16 +400,16 @@
     preflight_finalizer = base::BindOnce(request_finalizer_, request_id_);
 
   preflight_controller_->PerformPreflightCheck(
-      base::BindOnce(&CORSURLLoader::StartNetworkRequest,
+      base::BindOnce(&CorsURLLoader::StartNetworkRequest,
                      weak_factory_.GetWeakPtr()),
       request_id_, request_, tainted_,
       net::NetworkTrafficAnnotationTag(traffic_annotation_),
       network_loader_factory_, std::move(preflight_finalizer));
 }
 
-void CORSURLLoader::StartNetworkRequest(
+void CorsURLLoader::StartNetworkRequest(
     int error_code,
-    base::Optional<CORSErrorStatus> status,
+    base::Optional<CorsErrorStatus> status,
     base::Optional<PreflightTimingInfo> preflight_timing_info) {
   if (error_code != net::OK) {
     HandleComplete(status ? URLLoaderCompletionStatus(*status)
@@ -426,30 +426,30 @@
   // Binding |this| as an unretained pointer is safe because
   // |network_client_binding_| shares this object's lifetime.
   network_client_binding_.set_connection_error_handler(base::BindOnce(
-      &CORSURLLoader::OnConnectionError, base::Unretained(this)));
+      &CorsURLLoader::OnConnectionError, base::Unretained(this)));
   network_loader_factory_->CreateLoaderAndStart(
       mojo::MakeRequest(&network_loader_), routing_id_, request_id_, options_,
       request_, std::move(network_client), traffic_annotation_);
 }
 
-void CORSURLLoader::HandleComplete(const URLLoaderCompletionStatus& status) {
+void CorsURLLoader::HandleComplete(const URLLoaderCompletionStatus& status) {
   forwarding_client_->OnComplete(status);
   std::move(delete_callback_).Run(this);
   // |this| is deleted here.
 }
 
-void CORSURLLoader::OnConnectionError() {
+void CorsURLLoader::OnConnectionError() {
   HandleComplete(URLLoaderCompletionStatus(net::ERR_ABORTED));
 }
 
-// This should be identical to CalculateCORSFlag defined in
+// This should be identical to CalculateCorsFlag defined in
 // //third_party/blink/renderer/platform/loader/cors/cors.cc.
-void CORSURLLoader::SetCORSFlagIfNeeded() {
+void CorsURLLoader::SetCorsFlagIfNeeded() {
   if (fetch_cors_flag_)
     return;
 
   if (request_.fetch_request_mode == mojom::FetchRequestMode::kNavigate ||
-      request_.fetch_request_mode == mojom::FetchRequestMode::kNoCORS) {
+      request_.fetch_request_mode == mojom::FetchRequestMode::kNoCors) {
     return;
   }
 
@@ -490,7 +490,7 @@
   fetch_cors_flag_ = true;
 }
 
-base::Optional<std::string> CORSURLLoader::GetHeaderString(
+base::Optional<std::string> CorsURLLoader::GetHeaderString(
     const ResourceResponseHead& response,
     const std::string& header_name) {
   std::string header_value;
diff --git a/services/network/cors/cors_url_loader.h b/services/network/cors/cors_url_loader.h
index fc01b496..0d0c628 100644
--- a/services/network/cors/cors_url_loader.h
+++ b/services/network/cors/cors_url_loader.h
@@ -26,9 +26,9 @@
 // Wrapper class that adds cross-origin resource sharing capabilities
 // (https://fetch.spec.whatwg.org/#http-cors-protocol), delegating requests as
 // well as potential preflight requests to the supplied
-// |network_loader_factory|. It is owned by the CORSURLLoaderFactory that
+// |network_loader_factory|. It is owned by the CorsURLLoaderFactory that
 // created it.
-class COMPONENT_EXPORT(NETWORK_SERVICE) CORSURLLoader
+class COMPONENT_EXPORT(NETWORK_SERVICE) CorsURLLoader
     : public mojom::URLLoader,
       public mojom::URLLoaderClient {
  public:
@@ -37,7 +37,7 @@
   // Assumes network_loader_factory outlives this loader.
   // TODO(yhirano): Remove |request_finalizer| when the network service is
   // fully enabled.
-  CORSURLLoader(
+  CorsURLLoader(
       mojom::URLLoaderRequest loader_request,
       int32_t routing_id,
       int32_t request_id,
@@ -51,7 +51,7 @@
       const OriginAccessList* origin_access_list,
       PreflightController* preflight_controller);
 
-  ~CORSURLLoader() override;
+  ~CorsURLLoader() override;
 
   // Starts processing the request. This is expected to be called right after
   // the constructor.
@@ -85,7 +85,7 @@
   void StartRequest();
   void StartNetworkRequest(
       int net_error,
-      base::Optional<CORSErrorStatus> status,
+      base::Optional<CorsErrorStatus> status,
       base::Optional<PreflightTimingInfo> preflight_timing_info);
 
   // Called when there is a connection error on the upstream pipe used for the
@@ -97,7 +97,7 @@
 
   void OnConnectionError();
 
-  void SetCORSFlagIfNeeded();
+  void SetCorsFlagIfNeeded();
 
   static base::Optional<std::string> GetHeaderString(
       const ResourceResponseHead& response,
@@ -112,7 +112,7 @@
 
   DeleteCallback delete_callback_;
 
-  // This raw URLLoaderFactory pointer is shared with the CORSURLLoaderFactory
+  // This raw URLLoaderFactory pointer is shared with the CorsURLLoaderFactory
   // that created and owns this object.
   mojom::URLLoaderFactory* network_loader_factory_;
 
@@ -164,9 +164,9 @@
   PreflightController* preflight_controller_;
 
   // Used to run asynchronous class instance bound callbacks safely.
-  base::WeakPtrFactory<CORSURLLoader> weak_factory_;
+  base::WeakPtrFactory<CorsURLLoader> weak_factory_;
 
-  DISALLOW_COPY_AND_ASSIGN(CORSURLLoader);
+  DISALLOW_COPY_AND_ASSIGN(CorsURLLoader);
 };
 
 }  // namespace cors
diff --git a/services/network/cors/cors_url_loader_factory.cc b/services/network/cors/cors_url_loader_factory.cc
index 570b69b0..f1d341b6 100644
--- a/services/network/cors/cors_url_loader_factory.cc
+++ b/services/network/cors/cors_url_loader_factory.cc
@@ -19,7 +19,7 @@
 
 namespace cors {
 
-CORSURLLoaderFactory::CORSURLLoaderFactory(
+CorsURLLoaderFactory::CorsURLLoaderFactory(
     NetworkContext* context,
     mojom::URLLoaderFactoryParamsPtr params,
     scoped_refptr<ResourceSchedulerClient> resource_scheduler_client,
@@ -37,11 +37,11 @@
   DCHECK(origin_access_list_);
   bindings_.AddBinding(this, std::move(request));
   bindings_.set_connection_error_handler(base::BindRepeating(
-      &CORSURLLoaderFactory::DeleteIfNeeded, base::Unretained(this)));
+      &CorsURLLoaderFactory::DeleteIfNeeded, base::Unretained(this)));
   preflight_controller_ = context_->cors_preflight_controller();
 }
 
-CORSURLLoaderFactory::CORSURLLoaderFactory(
+CorsURLLoaderFactory::CorsURLLoaderFactory(
     bool disable_web_security,
     std::unique_ptr<mojom::URLLoaderFactory> network_loader_factory,
     const base::RepeatingCallback<void(int)>& preflight_finalizer,
@@ -57,14 +57,14 @@
   preflight_controller_ = owned_preflight_controller_.get();
 }
 
-CORSURLLoaderFactory::~CORSURLLoaderFactory() = default;
+CorsURLLoaderFactory::~CorsURLLoaderFactory() = default;
 
-void CORSURLLoaderFactory::OnLoaderCreated(
+void CorsURLLoaderFactory::OnLoaderCreated(
     std::unique_ptr<mojom::URLLoader> loader) {
   loaders_.insert(std::move(loader));
 }
 
-void CORSURLLoaderFactory::DestroyURLLoader(mojom::URLLoader* loader) {
+void CorsURLLoaderFactory::DestroyURLLoader(mojom::URLLoader* loader) {
   auto it = loaders_.find(loader);
   DCHECK(it != loaders_.end());
   loaders_.erase(it);
@@ -72,7 +72,7 @@
   DeleteIfNeeded();
 }
 
-void CORSURLLoaderFactory::CreateLoaderAndStart(
+void CorsURLLoaderFactory::CreateLoaderAndStart(
     mojom::URLLoaderRequest request,
     int32_t routing_id,
     int32_t request_id,
@@ -85,11 +85,11 @@
     return;
   }
 
-  if (base::FeatureList::IsEnabled(features::kOutOfBlinkCORS) &&
+  if (base::FeatureList::IsEnabled(features::kOutOfBlinkCors) &&
       !disable_web_security_) {
-    auto loader = std::make_unique<CORSURLLoader>(
+    auto loader = std::make_unique<CorsURLLoader>(
         std::move(request), routing_id, request_id, options,
-        base::BindOnce(&CORSURLLoaderFactory::DestroyURLLoader,
+        base::BindOnce(&CorsURLLoaderFactory::DestroyURLLoader,
                        base::Unretained(this)),
         resource_request, std::move(client), traffic_annotation,
         network_loader_factory_.get(), preflight_finalizer_,
@@ -104,28 +104,28 @@
   }
 }
 
-void CORSURLLoaderFactory::Clone(mojom::URLLoaderFactoryRequest request) {
+void CorsURLLoaderFactory::Clone(mojom::URLLoaderFactoryRequest request) {
   // The cloned factories stop working when this factory is destructed.
   bindings_.AddBinding(this, std::move(request));
 }
 
-void CORSURLLoaderFactory::ClearBindings() {
+void CorsURLLoaderFactory::ClearBindings() {
   bindings_.CloseAllBindings();
 }
 
-void CORSURLLoaderFactory::DeleteIfNeeded() {
+void CorsURLLoaderFactory::DeleteIfNeeded() {
   if (!context_)
     return;
   if (bindings_.empty() && loaders_.empty())
     context_->DestroyURLLoaderFactory(this);
 }
 
-bool CORSURLLoaderFactory::IsSane(const ResourceRequest& request) {
+bool CorsURLLoaderFactory::IsSane(const ResourceRequest& request) {
   // CORS needs a proper origin (including a unique opaque origin). If the
   // request doesn't have one, CORS cannot work.
   if (!request.request_initiator &&
       request.fetch_request_mode != mojom::FetchRequestMode::kNavigate &&
-      request.fetch_request_mode != mojom::FetchRequestMode::kNoCORS) {
+      request.fetch_request_mode != mojom::FetchRequestMode::kNoCors) {
     LOG(WARNING) << "|fetch_request_mode| is " << request.fetch_request_mode
                  << ", but |request_initiator| is not set.";
     return false;
diff --git a/services/network/cors/cors_url_loader_factory.h b/services/network/cors/cors_url_loader_factory.h
index 55ee955..a83cd01 100644
--- a/services/network/cors/cors_url_loader_factory.h
+++ b/services/network/cors/cors_url_loader_factory.h
@@ -28,14 +28,14 @@
 
 // A factory class to create a URLLoader that supports CORS.
 // This class takes a network::mojom::URLLoaderFactory instance in the
-// constructor and owns it to make network requests for CORS preflight, and
+// constructor and owns it to make network requests for CORS-preflight, and
 // actual network request.
-class COMPONENT_EXPORT(NETWORK_SERVICE) CORSURLLoaderFactory final
+class COMPONENT_EXPORT(NETWORK_SERVICE) CorsURLLoaderFactory final
     : public mojom::URLLoaderFactory {
  public:
   // |origin_access_list| should always outlive this factory instance.
   // Used by network::NetworkContext.
-  CORSURLLoaderFactory(
+  CorsURLLoaderFactory(
       NetworkContext* context,
       mojom::URLLoaderFactoryParamsPtr params,
       scoped_refptr<ResourceSchedulerClient> resource_scheduler_client,
@@ -43,12 +43,12 @@
       const OriginAccessList* origin_access_list);
   // Used by content::ResourceMessageFilter.
   // TODO(yhirano): Remove this once when the network service is fully enabled.
-  CORSURLLoaderFactory(
+  CorsURLLoaderFactory(
       bool disable_web_security,
       std::unique_ptr<mojom::URLLoaderFactory> network_loader_factory,
       const base::RepeatingCallback<void(int)>& preflight_finalizer,
       const OriginAccessList* origin_access_list);
-  ~CORSURLLoaderFactory() override;
+  ~CorsURLLoaderFactory() override;
 
   void OnLoaderCreated(std::unique_ptr<mojom::URLLoader> loader);
   void DestroyURLLoader(mojom::URLLoader* loader);
@@ -99,7 +99,7 @@
   PreflightController* preflight_controller_;
   std::unique_ptr<PreflightController> owned_preflight_controller_;
 
-  DISALLOW_COPY_AND_ASSIGN(CORSURLLoaderFactory);
+  DISALLOW_COPY_AND_ASSIGN(CorsURLLoaderFactory);
 };
 
 }  // namespace cors
diff --git a/services/network/cors/cors_url_loader_unittest.cc b/services/network/cors/cors_url_loader_unittest.cc
index 5ed21810..9a142cb 100644
--- a/services/network/cors/cors_url_loader_unittest.cc
+++ b/services/network/cors/cors_url_loader_unittest.cc
@@ -114,15 +114,15 @@
   DISALLOW_COPY_AND_ASSIGN(TestURLLoaderFactory);
 };
 
-class CORSURLLoaderTest : public testing::Test {
+class CorsURLLoaderTest : public testing::Test {
  public:
   using ReferrerPolicy = net::URLRequest::ReferrerPolicy;
 
-  CORSURLLoaderTest() {
+  CorsURLLoaderTest() {
     std::unique_ptr<TestURLLoaderFactory> factory =
         std::make_unique<TestURLLoaderFactory>();
     test_url_loader_factory_ = factory->GetWeakPtr();
-    cors_url_loader_factory_ = std::make_unique<CORSURLLoaderFactory>(
+    cors_url_loader_factory_ = std::make_unique<CorsURLLoaderFactory>(
         false, std::move(factory), base::RepeatingCallback<void(int)>(),
         &origin_access_list_);
   }
@@ -130,7 +130,7 @@
  protected:
   // testing::Test implementation.
   void SetUp() override {
-    feature_list_.InitAndEnableFeature(features::kOutOfBlinkCORS);
+    feature_list_.InitAndEnableFeature(features::kOutOfBlinkCors);
   }
 
   void CreateLoaderAndStart(const GURL& origin,
@@ -233,7 +233,7 @@
         source_origin,
         network::mojom::CorsOriginPattern::New(
             protocol, domain, allow_subdomains,
-            network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority));
+            network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority));
   }
 
   static net::RedirectInfo CreateRedirectInfo(
@@ -255,13 +255,13 @@
   // Be the first member so it is destroyed last.
   base::MessageLoop message_loop_;
 
-  // Testing instance to enable kOutOfBlinkCORS feature.
+  // Testing instance to enable kOutOfBlinkCors feature.
   base::test::ScopedFeatureList feature_list_;
 
-  // CORSURLLoaderFactory instance under tests.
+  // CorsURLLoaderFactory instance under tests.
   std::unique_ptr<mojom::URLLoaderFactory> cors_url_loader_factory_;
 
-  // TestURLLoaderFactory instance owned by CORSURLLoaderFactory.
+  // TestURLLoaderFactory instance owned by CorsURLLoaderFactory.
   base::WeakPtr<TestURLLoaderFactory> test_url_loader_factory_;
 
   // Holds URLLoaderPtr that CreateLoaderAndStart() creates.
@@ -273,10 +273,10 @@
   // Holds for allowed origin access lists.
   OriginAccessList origin_access_list_;
 
-  DISALLOW_COPY_AND_ASSIGN(CORSURLLoaderTest);
+  DISALLOW_COPY_AND_ASSIGN(CorsURLLoaderTest);
 };
 
-TEST_F(CORSURLLoaderTest, SameOriginWithoutInitiator) {
+TEST_F(CorsURLLoaderTest, SameOriginWithoutInitiator) {
   ResourceRequest request;
   request.fetch_request_mode = mojom::FetchRequestMode::kSameOrigin;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kInclude;
@@ -293,9 +293,9 @@
   EXPECT_EQ(net::ERR_INVALID_ARGUMENT, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, NoCORSWithoutInitiator) {
+TEST_F(CorsURLLoaderTest, NoCorsWithoutInitiator) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kNoCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kNoCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kInclude;
   request.url = GURL("http://example.com/");
   request.request_initiator = base::nullopt;
@@ -312,9 +312,9 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, CORSWithoutInitiator) {
+TEST_F(CorsURLLoaderTest, CorsWithoutInitiator) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kInclude;
   request.url = GURL("http://example.com/");
   request.request_initiator = base::nullopt;
@@ -329,7 +329,7 @@
   EXPECT_EQ(net::ERR_INVALID_ARGUMENT, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, NavigateWithoutInitiator) {
+TEST_F(CorsURLLoaderTest, NavigateWithoutInitiator) {
   ResourceRequest request;
   request.fetch_request_mode = mojom::FetchRequestMode::kNavigate;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kInclude;
@@ -348,7 +348,7 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, CredentialsModeAndLoadFlagsContradictEachOther1) {
+TEST_F(CorsURLLoaderTest, CredentialsModeAndLoadFlagsContradictEachOther1) {
   ResourceRequest request;
   request.fetch_request_mode = mojom::FetchRequestMode::kNavigate;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
@@ -367,7 +367,7 @@
   EXPECT_EQ(net::ERR_INVALID_ARGUMENT, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, CredentialsModeAndLoadFlagsContradictEachOther2) {
+TEST_F(CorsURLLoaderTest, CredentialsModeAndLoadFlagsContradictEachOther2) {
   ResourceRequest request;
   request.fetch_request_mode = mojom::FetchRequestMode::kNavigate;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
@@ -386,7 +386,7 @@
   EXPECT_EQ(net::ERR_INVALID_ARGUMENT, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, CredentialsModeAndLoadFlagsContradictEachOther3) {
+TEST_F(CorsURLLoaderTest, CredentialsModeAndLoadFlagsContradictEachOther3) {
   ResourceRequest request;
   request.fetch_request_mode = mojom::FetchRequestMode::kNavigate;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
@@ -405,7 +405,7 @@
   EXPECT_EQ(net::ERR_INVALID_ARGUMENT, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, SameOriginRequest) {
+TEST_F(CorsURLLoaderTest, SameOriginRequest) {
   const GURL url("http://example.com/foo.png");
   CreateLoaderAndStart(url.GetOrigin(), url,
                        mojom::FetchRequestMode::kSameOrigin);
@@ -422,10 +422,10 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginRequestWithNoCORSMode) {
+TEST_F(CorsURLLoaderTest, CrossOriginRequestWithNoCorsMode) {
   const GURL origin("http://example.com");
   const GURL url("http://other.com/foo.png");
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kNoCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kNoCors);
 
   NotifyLoaderClientOnReceiveResponse();
   NotifyLoaderClientOnComplete(net::OK);
@@ -441,11 +441,11 @@
       GetRequest().headers.HasHeader(net::HttpRequestHeaders::kOrigin));
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginRequestWithNoCORSModeAndPatchMethod) {
+TEST_F(CorsURLLoaderTest, CrossOriginRequestWithNoCorsModeAndPatchMethod) {
   const GURL origin("http://example.com");
   const GURL url("http://other.com/foo.png");
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kNoCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kNoCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kInclude;
   request.method = "PATCH";
   request.url = url;
@@ -468,7 +468,7 @@
   EXPECT_EQ(origin_header, "http://example.com");
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginRequestFetchRequestModeSameOrigin) {
+TEST_F(CorsURLLoaderTest, CrossOriginRequestFetchRequestModeSameOrigin) {
   const GURL origin("http://example.com");
   const GURL url("http://other.com/foo.png");
   CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kSameOrigin);
@@ -482,14 +482,14 @@
   EXPECT_FALSE(client().has_received_response());
   EXPECT_EQ(net::ERR_FAILED, client().completion_status().error_code);
   ASSERT_TRUE(client().completion_status().cors_error_status);
-  EXPECT_EQ(mojom::CORSError::kDisallowedByMode,
+  EXPECT_EQ(mojom::CorsError::kDisallowedByMode,
             client().completion_status().cors_error_status->cors_error);
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginRequestWithCORSModeButMissingCORSHeader) {
+TEST_F(CorsURLLoaderTest, CrossOriginRequestWithCorsModeButMissingCorsHeader) {
   const GURL origin("http://example.com");
   const GURL url("http://other.com/foo.png");
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   NotifyLoaderClientOnReceiveResponse();
   NotifyLoaderClientOnComplete(net::OK);
@@ -505,14 +505,14 @@
   EXPECT_FALSE(client().has_received_response());
   EXPECT_EQ(net::ERR_FAILED, client().completion_status().error_code);
   ASSERT_TRUE(client().completion_status().cors_error_status);
-  EXPECT_EQ(mojom::CORSError::kMissingAllowOriginHeader,
+  EXPECT_EQ(mojom::CorsError::kMissingAllowOriginHeader,
             client().completion_status().cors_error_status->cors_error);
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginRequestWithCORSMode) {
+TEST_F(CorsURLLoaderTest, CrossOriginRequestWithCorsMode) {
   const GURL origin("http://example.com");
   const GURL url("http://other.com/foo.png");
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   NotifyLoaderClientOnReceiveResponse(
       {"Access-Control-Allow-Origin: http://example.com"});
@@ -527,11 +527,11 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest,
-       CrossOriginRequestFetchRequestWithCORSModeButMismatchedCORSHeader) {
+TEST_F(CorsURLLoaderTest,
+       CrossOriginRequestFetchRequestWithCorsModeButMismatchedCorsHeader) {
   const GURL origin("http://example.com");
   const GURL url("http://other.com/foo.png");
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   NotifyLoaderClientOnReceiveResponse(
       {"Access-Control-Allow-Origin: http://some-other-domain.com"});
@@ -544,15 +544,15 @@
   EXPECT_FALSE(client().has_received_response());
   EXPECT_EQ(net::ERR_FAILED, client().completion_status().error_code);
   ASSERT_TRUE(client().completion_status().cors_error_status);
-  EXPECT_EQ(mojom::CORSError::kAllowOriginMismatch,
+  EXPECT_EQ(mojom::CorsError::kAllowOriginMismatch,
             client().completion_status().cors_error_status->cors_error);
 }
 
-TEST_F(CORSURLLoaderTest, StripUsernameAndPassword) {
+TEST_F(CorsURLLoaderTest, StripUsernameAndPassword) {
   const GURL origin("http://example.com");
   const GURL url("http://foo:[email protected]/foo.png");
   std::string stripped_url = "http://other.com/foo.png";
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   NotifyLoaderClientOnReceiveResponse(
       {"Access-Control-Allow-Origin: http://example.com"});
@@ -568,12 +568,12 @@
   EXPECT_EQ(stripped_url, GetRequestedURL().spec());
 }
 
-TEST_F(CORSURLLoaderTest, CORSCheckPassOnRedirect) {
+TEST_F(CorsURLLoaderTest, CorsCheckPassOnRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   EXPECT_EQ(1, num_created_loaders());
   EXPECT_EQ(GetRequest().url, url);
@@ -590,12 +590,12 @@
   EXPECT_TRUE(client().has_received_redirect());
 }
 
-TEST_F(CORSURLLoaderTest, CORSCheckFailOnRedirect) {
+TEST_F(CorsURLLoaderTest, CorsCheckFailOnRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   EXPECT_EQ(1, num_created_loaders());
   EXPECT_EQ(GetRequest().url, url);
@@ -611,15 +611,15 @@
   EXPECT_EQ(client().completion_status().error_code, net::ERR_FAILED);
   ASSERT_TRUE(client().completion_status().cors_error_status);
   EXPECT_EQ(client().completion_status().cors_error_status->cors_error,
-            mojom::CORSError::kMissingAllowOriginHeader);
+            mojom::CorsError::kMissingAllowOriginHeader);
 }
 
-TEST_F(CORSURLLoaderTest, SameOriginToSameOriginRedirect) {
+TEST_F(CorsURLLoaderTest, SameOriginToSameOriginRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://example.com/foo.png");
   const GURL new_url("https://example.com/bar.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   EXPECT_EQ(1, num_created_loaders());
   EXPECT_EQ(GetRequest().url, url);
@@ -650,12 +650,12 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, SameOriginToCrossOriginRedirect) {
+TEST_F(CorsURLLoaderTest, SameOriginToCrossOriginRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://example.com/foo.png");
   const GURL new_url("https://other.example.com/bar.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   EXPECT_EQ(1, num_created_loaders());
   EXPECT_EQ(GetRequest().url, url);
@@ -689,12 +689,12 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginToCrossOriginRedirect) {
+TEST_F(CorsURLLoaderTest, CrossOriginToCrossOriginRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other.example.com/bar.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   EXPECT_EQ(1, num_created_loaders());
   EXPECT_EQ(GetRequest().url, url);
@@ -729,12 +729,12 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginToOriginalOriginRedirect) {
+TEST_F(CorsURLLoaderTest, CrossOriginToOriginalOriginRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://example.com/bar.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   EXPECT_EQ(1, num_created_loaders());
   EXPECT_EQ(GetRequest().url, url);
@@ -770,15 +770,15 @@
   EXPECT_EQ(net::ERR_FAILED, client().completion_status().error_code);
   ASSERT_TRUE(client().completion_status().cors_error_status);
   EXPECT_EQ(client().completion_status().cors_error_status->cors_error,
-            mojom::CORSError::kMissingAllowOriginHeader);
+            mojom::CorsError::kMissingAllowOriginHeader);
 }
 
-TEST_F(CORSURLLoaderTest, CrossOriginToAnotherCrossOriginRedirect) {
+TEST_F(CorsURLLoaderTest, CrossOriginToAnotherCrossOriginRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   EXPECT_EQ(1, num_created_loaders());
   EXPECT_EQ(GetRequest().url, url);
@@ -813,14 +813,14 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest,
+TEST_F(CorsURLLoaderTest,
        CrossOriginToAnotherCrossOriginRedirectWithPreflight) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
   ResourceRequest original_request;
-  original_request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  original_request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   original_request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   original_request.load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
   original_request.load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
@@ -887,13 +887,13 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, RedirectInfoShouldBeUsed) {
+TEST_F(CorsURLLoaderTest, RedirectInfoShouldBeUsed) {
   const GURL origin("https://example.com");
   const GURL url("https://example.com/foo.png");
   const GURL new_url("https://other.example.com/foo.png");
 
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
   request.load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
@@ -941,11 +941,11 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, TooManyRedirects) {
+TEST_F(CorsURLLoaderTest, TooManyRedirects) {
   const GURL origin("https://example.com");
   const GURL url("https://example.com/foo.png");
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
   for (int i = 0; i < 20; ++i) {
     EXPECT_EQ(1, num_created_loaders());
 
@@ -972,13 +972,13 @@
             client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, FollowErrorRedirect) {
+TEST_F(CorsURLLoaderTest, FollowErrorRedirect) {
   const GURL origin("https://example.com");
   const GURL url("https://example.com/foo.png");
   const GURL new_url("https://example.com/bar.png");
 
   ResourceRequest original_request;
-  original_request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  original_request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   original_request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   original_request.load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
   original_request.load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
@@ -1008,7 +1008,7 @@
 // Tests if OriginAccessList is actually used to decide the cors flag.
 // Does not verify detailed functionalities that are verified in
 // OriginAccessListTest.
-TEST_F(CORSURLLoaderTest, OriginAccessList) {
+TEST_F(CorsURLLoaderTest, OriginAccessList) {
   const GURL origin("http://example.com");
   const GURL url("http://other.com/foo.png");
 
@@ -1017,7 +1017,7 @@
   AddAllowListEntryForOrigin(url::Origin::Create(origin), url.scheme(),
                              url.host(), false);
 
-  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCORS);
+  CreateLoaderAndStart(origin, url, mojom::FetchRequestMode::kCors);
 
   NotifyLoaderClientOnReceiveResponse();
   NotifyLoaderClientOnComplete(net::OK);
@@ -1031,13 +1031,13 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, 304ForSimpleRevalidation) {
+TEST_F(CorsURLLoaderTest, 304ForSimpleRevalidation) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
   request.load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
@@ -1063,13 +1063,13 @@
   EXPECT_EQ(net::OK, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, 304ForSimpleGet) {
+TEST_F(CorsURLLoaderTest, 304ForSimpleGet) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
   request.load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
@@ -1091,13 +1091,13 @@
   EXPECT_EQ(net::ERR_FAILED, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, 200ForSimpleRevalidation) {
+TEST_F(CorsURLLoaderTest, 200ForSimpleRevalidation) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
   request.load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
@@ -1123,13 +1123,13 @@
   EXPECT_EQ(net::ERR_FAILED, client().completion_status().error_code);
 }
 
-TEST_F(CORSURLLoaderTest, RevalidationAndPreflight) {
+TEST_F(CorsURLLoaderTest, RevalidationAndPreflight) {
   const GURL origin("https://example.com");
   const GURL url("https://other.example.com/foo.png");
   const GURL new_url("https://other2.example.com/bar.png");
 
   ResourceRequest original_request;
-  original_request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  original_request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   original_request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   original_request.load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
   original_request.load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
diff --git a/services/network/cors/preflight_controller.cc b/services/network/cors/preflight_controller.cc
index 09b8403..de1fcf6 100644
--- a/services/network/cors/preflight_controller.cc
+++ b/services/network/cors/preflight_controller.cc
@@ -48,7 +48,7 @@
   // agent. They must be checked separately and rejected for
   // JavaScript-initiated requests.
   std::vector<std::string> filtered_headers =
-      CORSUnsafeNotForbiddenRequestHeaderNames(headers.GetHeaderVector(),
+      CorsUnsafeNotForbiddenRequestHeaderNames(headers.GetHeaderVector(),
                                                is_revalidating);
   if (filtered_headers.empty())
     return std::string();
@@ -121,7 +121,7 @@
     const ResourceResponseHead& head,
     const ResourceRequest& original_request,
     bool tainted,
-    base::Optional<CORSErrorStatus>* detected_error_status) {
+    base::Optional<CorsErrorStatus>* detected_error_status) {
   DCHECK(detected_error_status);
 
   *detected_error_status = CheckPreflightAccess(
@@ -134,10 +134,10 @@
   if (*detected_error_status)
     return nullptr;
 
-  base::Optional<mojom::CORSError> error;
+  base::Optional<mojom::CorsError> error;
   error = CheckPreflight(head.headers->response_code());
   if (error) {
-    *detected_error_status = CORSErrorStatus(*error);
+    *detected_error_status = CorsErrorStatus(*error);
     return nullptr;
   }
 
@@ -156,14 +156,14 @@
       &error);
 
   if (error)
-    *detected_error_status = CORSErrorStatus(*error);
+    *detected_error_status = CorsErrorStatus(*error);
   return result;
 }
 
-base::Optional<CORSErrorStatus> CheckPreflightResult(
+base::Optional<CorsErrorStatus> CheckPreflightResult(
     PreflightResult* result,
     const ResourceRequest& original_request) {
-  base::Optional<CORSErrorStatus> status =
+  base::Optional<CorsErrorStatus> status =
       result->EnsureAllowedCrossOriginMethod(original_request.method);
   if (status)
     return status;
@@ -272,7 +272,7 @@
 
     std::move(completion_callback_)
         .Run(net::ERR_FAILED,
-             CORSErrorStatus(mojom::CORSError::kPreflightDisallowedRedirect),
+             CorsErrorStatus(mojom::CorsError::kPreflightDisallowedRedirect),
              base::nullopt);
 
     RemoveFromController();
@@ -291,7 +291,7 @@
                                       &timing_info_.timing_allow_origin);
     timing_info_.transfer_size = head.encoded_data_length;
 
-    base::Optional<CORSErrorStatus> detected_error_status;
+    base::Optional<CorsErrorStatus> detected_error_status;
     std::unique_ptr<PreflightResult> result = CreatePreflightResult(
         final_url, head, original_request_, tainted_, &detected_error_status);
 
diff --git a/services/network/cors/preflight_controller.h b/services/network/cors/preflight_controller.h
index 4344df3..defe11b 100644
--- a/services/network/cors/preflight_controller.h
+++ b/services/network/cors/preflight_controller.h
@@ -36,7 +36,7 @@
   // PreflightTimingInfo is provided only when a preflight request was made.
   using CompletionCallback =
       base::OnceCallback<void(int net_error,
-                              base::Optional<CORSErrorStatus>,
+                              base::Optional<CorsErrorStatus>,
                               base::Optional<PreflightTimingInfo>)>;
   // Creates a CORS-preflight ResourceRequest for a specified |request| for a
   // URL that is originally requested.
diff --git a/services/network/cors/preflight_controller_unittest.cc b/services/network/cors/preflight_controller_unittest.cc
index a300222..f30e825 100644
--- a/services/network/cors/preflight_controller_unittest.cc
+++ b/services/network/cors/preflight_controller_unittest.cc
@@ -32,7 +32,7 @@
 
 TEST(PreflightControllerCreatePreflightRequestTest, LexicographicalOrder) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.request_initiator = url::Origin();
   request.headers.SetHeader("Orange", "Orange");
@@ -57,7 +57,7 @@
 
 TEST(PreflightControllerCreatePreflightRequestTest, ExcludeSimpleHeaders) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.request_initiator = url::Origin();
   request.headers.SetHeader("Accept", "everything");
@@ -79,7 +79,7 @@
 
 TEST(PreflightControllerCreatePreflightRequestTest, Credentials) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kInclude;
   request.request_initiator = url::Origin();
   request.headers.SetHeader("Orange", "Orange");
@@ -97,7 +97,7 @@
 TEST(PreflightControllerCreatePreflightRequestTest,
      ExcludeSimpleContentTypeHeader) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.request_initiator = url::Origin();
   request.headers.SetHeader(net::HttpRequestHeaders::kContentType,
@@ -114,7 +114,7 @@
 
 TEST(PreflightControllerCreatePreflightRequestTest, IncludeNonSimpleHeader) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.request_initiator = url::Origin();
   request.headers.SetHeader("X-Custom-Header", "foobar");
@@ -131,7 +131,7 @@
 TEST(PreflightControllerCreatePreflightRequestTest,
      IncludeNonSimpleContentTypeHeader) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.request_initiator = url::Origin();
   request.headers.SetHeader(net::HttpRequestHeaders::kContentType,
@@ -148,7 +148,7 @@
 
 TEST(PreflightControllerCreatePreflightRequestTest, ExcludeForbiddenHeaders) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.request_initiator = url::Origin();
   request.headers.SetHeader("referer", "https://www.google.com/");
@@ -163,7 +163,7 @@
 
 TEST(PreflightControllerCreatePreflightRequestTest, Tainted) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.request_initiator = url::Origin::Create(GURL("https://example.com"));
 
@@ -202,7 +202,7 @@
  protected:
   void HandleRequestCompletion(
       int net_error,
-      base::Optional<CORSErrorStatus> status,
+      base::Optional<CorsErrorStatus> status,
       base::Optional<PreflightTimingInfo> timing_info) {
     net_error_ = net_error;
     status_ = status;
@@ -226,8 +226,8 @@
   }
 
   int net_error() const { return net_error_; }
-  base::Optional<CORSErrorStatus> status() { return status_; }
-  base::Optional<CORSErrorStatus> success() { return base::nullopt; }
+  base::Optional<CorsErrorStatus> status() { return status_; }
+  base::Optional<CorsErrorStatus> success() { return base::nullopt; }
   size_t access_count() { return access_count_; }
   bool cancel_preflight_called() const { return cancel_preflight_called_; }
 
@@ -286,12 +286,12 @@
 
   std::unique_ptr<PreflightController> preflight_controller_;
   int net_error_ = net::OK;
-  base::Optional<CORSErrorStatus> status_;
+  base::Optional<CorsErrorStatus> status_;
 };
 
 TEST_F(PreflightControllerTest, CheckInvalidRequest) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.url = GetURL("/404");
   request.request_initiator = url::Origin::Create(request.url);
@@ -299,13 +299,13 @@
   PerformPreflightCheck(request);
   EXPECT_EQ(net::ERR_FAILED, net_error());
   ASSERT_TRUE(status());
-  EXPECT_EQ(mojom::CORSError::kPreflightInvalidStatus, status()->cors_error);
+  EXPECT_EQ(mojom::CorsError::kPreflightInvalidStatus, status()->cors_error);
   EXPECT_EQ(1u, access_count());
 }
 
 TEST_F(PreflightControllerTest, CheckValidRequest) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.url = GetURL("/allow");
   request.request_initiator = url::Origin::Create(request.url);
@@ -323,7 +323,7 @@
 
 TEST_F(PreflightControllerTest, CheckTaintedRequest) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.url = GetURL("/tainted");
   request.request_initiator = url::Origin::Create(request.url);
@@ -338,7 +338,7 @@
 // enabled.
 TEST_F(PreflightControllerTest, CancelPreflightIsCalled) {
   ResourceRequest request;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.fetch_credentials_mode = mojom::FetchCredentialsMode::kOmit;
   request.url = GetURL("/allow");
   request.request_initiator = url::Origin::Create(request.url);
diff --git a/services/network/cross_origin_read_blocking.cc b/services/network/cross_origin_read_blocking.cc
index 02b7e5f6..b508cf94 100644
--- a/services/network/cross_origin_read_blocking.cc
+++ b/services/network/cross_origin_read_blocking.cc
@@ -609,7 +609,7 @@
   if (response.head.was_fetched_via_service_worker) {
     switch (response.head.response_type) {
       case network::mojom::FetchResponseType::kBasic:
-      case network::mojom::FetchResponseType::kCORS:
+      case network::mojom::FetchResponseType::kCors:
       case network::mojom::FetchResponseType::kDefault:
       case network::mojom::FetchResponseType::kError:
         // Non-opaque responses shouldn't be blocked.
diff --git a/services/network/cross_origin_read_blocking.h b/services/network/cross_origin_read_blocking.h
index 6344eca..6378978 100644
--- a/services/network/cross_origin_read_blocking.h
+++ b/services/network/cross_origin_read_blocking.h
@@ -234,7 +234,7 @@
   // not allowed by actual CORS rules by ignoring 1) credentials and 2)
   // methods. Preflight requests don't matter here since they are not used to
   // decide whether to block a response or not on the client side.
-  // TODO(crbug.com/736308) Remove this check once the kOutOfBlinkCORS feature
+  // TODO(crbug.com/736308) Remove this check once the kOutOfBlinkCors feature
   // is shipped.
   static bool IsValidCorsHeaderSet(const url::Origin& frame_origin,
                                    const std::string& access_control_origin);
diff --git a/services/network/expect_ct_reporter.h b/services/network/expect_ct_reporter.h
index e8220a3..b7f1b60f 100644
--- a/services/network/expect_ct_reporter.h
+++ b/services/network/expect_ct_reporter.h
@@ -76,11 +76,11 @@
   FRIEND_TEST_ALL_PREFIXES(ExpectCTReporterTest, SendReport);
   FRIEND_TEST_ALL_PREFIXES(ExpectCTReporterTest, PreflightContainsWhitespace);
   FRIEND_TEST_ALL_PREFIXES(ExpectCTReporterTest,
-                           BadCORSPreflightResponseOrigin);
+                           BadCorsPreflightResponseOrigin);
   FRIEND_TEST_ALL_PREFIXES(ExpectCTReporterTest,
-                           BadCORSPreflightResponseMethods);
+                           BadCorsPreflightResponseMethods);
   FRIEND_TEST_ALL_PREFIXES(ExpectCTReporterTest,
-                           BadCORSPreflightResponseHeaders);
+                           BadCorsPreflightResponseHeaders);
 
   // Starts a CORS preflight request to obtain permission from the server to
   // send a report with Content-Type: application/expect-ct-report+json. The
diff --git a/services/network/expect_ct_reporter_unittest.cc b/services/network/expect_ct_reporter_unittest.cc
index 191dc5e..e10264a 100644
--- a/services/network/expect_ct_reporter_unittest.cc
+++ b/services/network/expect_ct_reporter_unittest.cc
@@ -407,7 +407,7 @@
     EXPECT_EQ(successful_report_uri, sender->latest_report_uri());
   }
 
-  void SetCORSHeaderWithWhitespace() {
+  void SetCorsHeaderWithWhitespace() {
     cors_headers_["Access-Control-Allow-Methods"] = "GET, POST";
   }
 
@@ -688,7 +688,7 @@
 
 // Test that report preflight responses can contain whitespace.
 TEST_F(ExpectCTReporterTest, PreflightContainsWhitespace) {
-  SetCORSHeaderWithWhitespace();
+  SetCorsHeaderWithWhitespace();
 
   TestCertificateReportSender* sender = new TestCertificateReportSender();
   net::TestURLRequestContext context;
@@ -719,7 +719,7 @@
 
 // Test that no report is sent when the CORS preflight returns an invalid
 // Access-Control-Allow-Origin.
-TEST_F(ExpectCTReporterTest, BadCORSPreflightResponseOrigin) {
+TEST_F(ExpectCTReporterTest, BadCorsPreflightResponseOrigin) {
   TestCertificateReportSender* sender = new TestCertificateReportSender();
   net::TestURLRequestContext context;
   ExpectCTReporter reporter(&context, base::Closure(), base::Closure());
@@ -743,7 +743,7 @@
 
 // Test that no report is sent when the CORS preflight returns an invalid
 // Access-Control-Allow-Methods.
-TEST_F(ExpectCTReporterTest, BadCORSPreflightResponseMethods) {
+TEST_F(ExpectCTReporterTest, BadCorsPreflightResponseMethods) {
   TestCertificateReportSender* sender = new TestCertificateReportSender();
   net::TestURLRequestContext context;
   ExpectCTReporter reporter(&context, base::Closure(), base::Closure());
@@ -767,7 +767,7 @@
 
 // Test that no report is sent when the CORS preflight returns an invalid
 // Access-Control-Allow-Headers.
-TEST_F(ExpectCTReporterTest, BadCORSPreflightResponseHeaders) {
+TEST_F(ExpectCTReporterTest, BadCorsPreflightResponseHeaders) {
   TestCertificateReportSender* sender = new TestCertificateReportSender();
   net::TestURLRequestContext context;
   ExpectCTReporter reporter(&context, base::Closure(), base::Closure());
diff --git a/services/network/network_context.cc b/services/network/network_context.cc
index 52ca693e8..172a125 100644
--- a/services/network/network_context.cc
+++ b/services/network/network_context.cc
@@ -633,7 +633,7 @@
     mojom::URLLoaderFactoryRequest request,
     mojom::URLLoaderFactoryParamsPtr params,
     scoped_refptr<ResourceSchedulerClient> resource_scheduler_client) {
-  url_loader_factories_.emplace(std::make_unique<cors::CORSURLLoaderFactory>(
+  url_loader_factories_.emplace(std::make_unique<cors::CorsURLLoaderFactory>(
       this, std::move(params), std::move(resource_scheduler_client),
       std::move(request), &cors_origin_access_list_));
 }
@@ -683,7 +683,7 @@
 }
 
 void NetworkContext::DestroyURLLoaderFactory(
-    cors::CORSURLLoaderFactory* url_loader_factory) {
+    cors::CorsURLLoaderFactory* url_loader_factory) {
   auto it = url_loader_factories_.find(url_loader_factory);
   DCHECK(it != url_loader_factories_.end());
   url_loader_factories_.erase(it);
diff --git a/services/network/network_context.h b/services/network/network_context.h
index 25a997c..23bf2c7 100644
--- a/services/network/network_context.h
+++ b/services/network/network_context.h
@@ -80,7 +80,7 @@
 class WebSocketFactory;
 
 namespace cors {
-class CORSURLLoaderFactory;
+class CorsURLLoaderFactory;
 }  // namespace cors
 
 // A NetworkContext creates and manages access to a URLRequestContext.
@@ -321,7 +321,7 @@
 
   // Destroys the specified factory. Called by the factory itself when it has
   // no open pipes.
-  void DestroyURLLoaderFactory(cors::CORSURLLoaderFactory* url_loader_factory);
+  void DestroyURLLoaderFactory(cors::CorsURLLoaderFactory* url_loader_factory);
 
   size_t GetNumOutstandingResolveHostRequestsForTesting() const;
 
@@ -441,7 +441,7 @@
 
   // This must be below |url_request_context_| so that the URLRequestContext
   // outlives all the URLLoaderFactories and URLLoaders that depend on it.
-  std::set<std::unique_ptr<cors::CORSURLLoaderFactory>,
+  std::set<std::unique_ptr<cors::CorsURLLoaderFactory>,
            base::UniquePtrComparator>
       url_loader_factories_;
 
diff --git a/services/network/public/cpp/cors/cors.cc b/services/network/public/cpp/cors/cors.cc
index 2a53bec..17ed91da 100644
--- a/services/network/public/cpp/cors/cors.cc
+++ b/services/network/public/cpp/cors/cors.cc
@@ -103,7 +103,7 @@
 }
 
 // |value| should be lower case.
-bool IsCORSSafelistedLowerCaseContentType(const std::string& value) {
+bool IsCorsSafelistedLowerCaseContentType(const std::string& value) {
   DCHECK_EQ(value, base::ToLowerASCII(value));
   if (std::any_of(value.begin(), value.end(), IsCorsUnsafeRequestHeaderByte))
     return false;
@@ -135,7 +135,7 @@
 }  // namespace header_names
 
 // See https://fetch.spec.whatwg.org/#cors-check.
-base::Optional<CORSErrorStatus> CheckAccess(
+base::Optional<CorsErrorStatus> CheckAccess(
     const GURL& response_url,
     const int response_status_code,
     const base::Optional<std::string>& allow_origin_header,
@@ -145,7 +145,7 @@
   // TODO(toyoshim): This response status code check should not be needed. We
   // have another status code check after a CheckAccess() call if it is needed.
   if (!response_status_code)
-    return CORSErrorStatus(mojom::CORSError::kInvalidResponse);
+    return CorsErrorStatus(mojom::CorsError::kInvalidResponse);
 
   if (allow_origin_header == kAsterisk) {
     // A wildcard Access-Control-Allow-Origin can not be used if credentials are
@@ -161,9 +161,9 @@
     // browser process or network service, this check won't be needed any more
     // because it is always for network requests there.
     if (response_url.SchemeIsHTTPOrHTTPS())
-      return CORSErrorStatus(mojom::CORSError::kWildcardOriginNotAllowed);
+      return CorsErrorStatus(mojom::CorsError::kWildcardOriginNotAllowed);
   } else if (!allow_origin_header) {
-    return CORSErrorStatus(mojom::CORSError::kMissingAllowOriginHeader);
+    return CorsErrorStatus(mojom::CorsError::kMissingAllowOriginHeader);
   } else if (*allow_origin_header != origin.Serialize()) {
     // We do not use url::Origin::IsSameOriginWith() here for two reasons below.
     //  1. Allow "null" to match here. The latest spec does not have a clear
@@ -182,13 +182,13 @@
     // Does not allow to have multiple origins in the allow origin header.
     // See https://fetch.spec.whatwg.org/#http-access-control-allow-origin.
     if (allow_origin_header->find_first_of(" ,") != std::string::npos) {
-      return CORSErrorStatus(mojom::CORSError::kMultipleAllowOriginValues,
+      return CorsErrorStatus(mojom::CorsError::kMultipleAllowOriginValues,
                              *allow_origin_header);
     }
 
     // Check valid "null" first since GURL assumes it as invalid.
     if (*allow_origin_header == "null") {
-      return CORSErrorStatus(mojom::CORSError::kAllowOriginMismatch,
+      return CorsErrorStatus(mojom::CorsError::kAllowOriginMismatch,
                              *allow_origin_header);
     }
 
@@ -196,11 +196,11 @@
     // validation, but should be ok for providing error details to developers.
     GURL header_origin(*allow_origin_header);
     if (!header_origin.is_valid()) {
-      return CORSErrorStatus(mojom::CORSError::kInvalidAllowOriginValue,
+      return CorsErrorStatus(mojom::CorsError::kInvalidAllowOriginValue,
                              *allow_origin_header);
     }
 
-    return CORSErrorStatus(mojom::CORSError::kAllowOriginMismatch,
+    return CorsErrorStatus(mojom::CorsError::kAllowOriginMismatch,
                            *allow_origin_header);
   }
 
@@ -209,14 +209,14 @@
     // This check should be case sensitive.
     // See also https://fetch.spec.whatwg.org/#http-new-header-syntax.
     if (allow_credentials_header != kLowerCaseTrue) {
-      return CORSErrorStatus(mojom::CORSError::kInvalidAllowCredentials,
+      return CorsErrorStatus(mojom::CorsError::kInvalidAllowCredentials,
                              allow_credentials_header.value_or(std::string()));
     }
   }
   return base::nullopt;
 }
 
-base::Optional<CORSErrorStatus> CheckPreflightAccess(
+base::Optional<CorsErrorStatus> CheckPreflightAccess(
     const GURL& response_url,
     const int response_status_code,
     const base::Optional<std::string>& allow_origin_header,
@@ -231,37 +231,37 @@
 
   // TODO(toyoshim): Remove following two lines when the status code check is
   // removed from CheckAccess().
-  if (error_status->cors_error == mojom::CORSError::kInvalidResponse)
+  if (error_status->cors_error == mojom::CorsError::kInvalidResponse)
     return error_status;
 
-  mojom::CORSError error = error_status->cors_error;
+  mojom::CorsError error = error_status->cors_error;
   switch (error_status->cors_error) {
-    case mojom::CORSError::kWildcardOriginNotAllowed:
-      error = mojom::CORSError::kPreflightWildcardOriginNotAllowed;
+    case mojom::CorsError::kWildcardOriginNotAllowed:
+      error = mojom::CorsError::kPreflightWildcardOriginNotAllowed;
       break;
-    case mojom::CORSError::kMissingAllowOriginHeader:
-      error = mojom::CORSError::kPreflightMissingAllowOriginHeader;
+    case mojom::CorsError::kMissingAllowOriginHeader:
+      error = mojom::CorsError::kPreflightMissingAllowOriginHeader;
       break;
-    case mojom::CORSError::kMultipleAllowOriginValues:
-      error = mojom::CORSError::kPreflightMultipleAllowOriginValues;
+    case mojom::CorsError::kMultipleAllowOriginValues:
+      error = mojom::CorsError::kPreflightMultipleAllowOriginValues;
       break;
-    case mojom::CORSError::kInvalidAllowOriginValue:
-      error = mojom::CORSError::kPreflightInvalidAllowOriginValue;
+    case mojom::CorsError::kInvalidAllowOriginValue:
+      error = mojom::CorsError::kPreflightInvalidAllowOriginValue;
       break;
-    case mojom::CORSError::kAllowOriginMismatch:
-      error = mojom::CORSError::kPreflightAllowOriginMismatch;
+    case mojom::CorsError::kAllowOriginMismatch:
+      error = mojom::CorsError::kPreflightAllowOriginMismatch;
       break;
-    case mojom::CORSError::kInvalidAllowCredentials:
-      error = mojom::CORSError::kPreflightInvalidAllowCredentials;
+    case mojom::CorsError::kInvalidAllowCredentials:
+      error = mojom::CorsError::kPreflightInvalidAllowCredentials;
       break;
     default:
       NOTREACHED();
       break;
   }
-  return CORSErrorStatus(error, error_status->failed_parameter);
+  return CorsErrorStatus(error, error_status->failed_parameter);
 }
 
-base::Optional<CORSErrorStatus> CheckRedirectLocation(
+base::Optional<CorsErrorStatus> CheckRedirectLocation(
     const GURL& url,
     mojom::FetchRequestMode request_mode,
     const base::Optional<url::Origin>& origin,
@@ -278,44 +278,44 @@
   // credentials, and either |request|’s tainted origin flag is set or
   // |request|’s origin is not same origin with |actualResponse|’s location
   // URL’s origin, then return a network error.
-  DCHECK(!IsCORSEnabledRequestMode(request_mode) || origin);
-  if (IsCORSEnabledRequestMode(request_mode) && url_has_credentials &&
+  DCHECK(!IsCorsEnabledRequestMode(request_mode) || origin);
+  if (IsCorsEnabledRequestMode(request_mode) && url_has_credentials &&
       (tainted || !origin->IsSameOriginWith(url::Origin::Create(url)))) {
-    return CORSErrorStatus(mojom::CORSError::kRedirectContainsCredentials);
+    return CorsErrorStatus(mojom::CorsError::kRedirectContainsCredentials);
   }
 
   // If CORS flag is set and |actualResponse|’s location URL includes
   // credentials, then return a network error.
   if (cors_flag && url_has_credentials)
-    return CORSErrorStatus(mojom::CORSError::kRedirectContainsCredentials);
+    return CorsErrorStatus(mojom::CorsError::kRedirectContainsCredentials);
 
   return base::nullopt;
 }
 
-base::Optional<mojom::CORSError> CheckPreflight(const int status_code) {
+base::Optional<mojom::CorsError> CheckPreflight(const int status_code) {
   // CORS preflight with 3XX is considered network error in
   // Fetch API Spec: https://fetch.spec.whatwg.org/#cors-preflight-fetch
   // CORS Spec: http://www.w3.org/TR/cors/#cross-origin-request-with-preflight-0
   // https://crbug.com/452394
   if (IsOkStatus(status_code))
     return base::nullopt;
-  return mojom::CORSError::kPreflightInvalidStatus;
+  return mojom::CorsError::kPreflightInvalidStatus;
 }
 
 // https://wicg.github.io/cors-rfc1918/#http-headerdef-access-control-allow-external
-base::Optional<CORSErrorStatus> CheckExternalPreflight(
+base::Optional<CorsErrorStatus> CheckExternalPreflight(
     const base::Optional<std::string>& allow_external) {
   if (!allow_external)
-    return CORSErrorStatus(mojom::CORSError::kPreflightMissingAllowExternal);
+    return CorsErrorStatus(mojom::CorsError::kPreflightMissingAllowExternal);
   if (*allow_external == kLowerCaseTrue)
     return base::nullopt;
-  return CORSErrorStatus(mojom::CORSError::kPreflightInvalidAllowExternal,
+  return CorsErrorStatus(mojom::CorsError::kPreflightInvalidAllowExternal,
                          *allow_external);
 }
 
-bool IsCORSEnabledRequestMode(mojom::FetchRequestMode mode) {
-  return mode == mojom::FetchRequestMode::kCORS ||
-         mode == mojom::FetchRequestMode::kCORSWithForcedPreflight;
+bool IsCorsEnabledRequestMode(mojom::FetchRequestMode mode) {
+  return mode == mojom::FetchRequestMode::kCors ||
+         mode == mojom::FetchRequestMode::kCorsWithForcedPreflight;
 }
 
 mojom::FetchResponseType CalculateResponseTainting(
@@ -327,8 +327,8 @@
     return mojom::FetchResponseType::kBasic;
 
   if (cors_flag) {
-    DCHECK(IsCORSEnabledRequestMode(request_mode));
-    return mojom::FetchResponseType::kCORS;
+    DCHECK(IsCorsEnabledRequestMode(request_mode));
+    return mojom::FetchResponseType::kCors;
   }
 
   if (!origin) {
@@ -337,14 +337,14 @@
     return mojom::FetchResponseType::kBasic;
   }
 
-  if (request_mode == mojom::FetchRequestMode::kNoCORS &&
+  if (request_mode == mojom::FetchRequestMode::kNoCors &&
       !origin->IsSameOriginWith(url::Origin::Create(url))) {
     return mojom::FetchResponseType::kOpaque;
   }
   return mojom::FetchResponseType::kBasic;
 }
 
-bool IsCORSSafelistedMethod(const std::string& method) {
+bool IsCorsSafelistedMethod(const std::string& method) {
   // https://fetch.spec.whatwg.org/#cors-safelisted-method
   // "A CORS-safelisted method is a method that is `GET`, `HEAD`, or `POST`."
   std::string method_upper = base::ToUpperASCII(method);
@@ -352,11 +352,11 @@
          method_upper == kHeadMethod || method_upper == kPostMethod;
 }
 
-bool IsCORSSafelistedContentType(const std::string& media_type) {
-  return IsCORSSafelistedLowerCaseContentType(base::ToLowerASCII(media_type));
+bool IsCorsSafelistedContentType(const std::string& media_type) {
+  return IsCorsSafelistedLowerCaseContentType(base::ToLowerASCII(media_type));
 }
 
-bool IsCORSSafelistedHeader(const std::string& name, const std::string& value) {
+bool IsCorsSafelistedHeader(const std::string& name, const std::string& value) {
   // If |value|’s length is greater than 128, then return false.
   if (value.size() > 128)
     return false;
@@ -416,12 +416,12 @@
   }
 
   if (lower_name == "content-type")
-    return IsCORSSafelistedLowerCaseContentType(lower_value);
+    return IsCorsSafelistedLowerCaseContentType(lower_value);
 
   return true;
 }
 
-bool IsNoCORSSafelistedHeader(const std::string& name,
+bool IsNoCorsSafelistedHeader(const std::string& name,
                               const std::string& value) {
   const std::string lower_name = base::ToLowerASCII(name);
 
@@ -430,10 +430,10 @@
     return false;
   }
 
-  return IsCORSSafelistedHeader(lower_name, value);
+  return IsCorsSafelistedHeader(lower_name, value);
 }
 
-std::vector<std::string> CORSUnsafeRequestHeaderNames(
+std::vector<std::string> CorsUnsafeRequestHeaderNames(
     const net::HttpRequestHeaders::HeaderVector& headers) {
   std::vector<std::string> potentially_unsafe_names;
   std::vector<std::string> header_names;
@@ -442,7 +442,7 @@
   size_t safe_list_value_size = 0;
 
   for (const auto& header : headers) {
-    if (!IsCORSSafelistedHeader(header.key, header.value)) {
+    if (!IsCorsSafelistedHeader(header.key, header.value)) {
       header_names.push_back(base::ToLowerASCII(header.key));
     } else {
       potentially_unsafe_names.push_back(base::ToLowerASCII(header.key));
@@ -456,7 +456,7 @@
   return header_names;
 }
 
-std::vector<std::string> CORSUnsafeNotForbiddenRequestHeaderNames(
+std::vector<std::string> CorsUnsafeNotForbiddenRequestHeaderNames(
     const net::HttpRequestHeaders::HeaderVector& headers,
     bool is_revalidating) {
   std::vector<std::string> header_names;
@@ -477,7 +477,7 @@
         continue;
       }
     }
-    if (!IsCORSSafelistedHeader(name, header.value)) {
+    if (!IsCorsSafelistedHeader(name, header.value)) {
       header_names.push_back(name);
     } else {
       potentially_unsafe_names.push_back(name);
@@ -542,10 +542,10 @@
   return status >= 200 && status < 300;
 }
 
-bool IsCORSSameOriginResponseType(mojom::FetchResponseType type) {
+bool IsCorsSameOriginResponseType(mojom::FetchResponseType type) {
   switch (type) {
     case mojom::FetchResponseType::kBasic:
-    case mojom::FetchResponseType::kCORS:
+    case mojom::FetchResponseType::kCors:
     case mojom::FetchResponseType::kDefault:
       return true;
     case mojom::FetchResponseType::kError:
@@ -555,10 +555,10 @@
   }
 }
 
-bool IsCORSCrossOriginResponseType(mojom::FetchResponseType type) {
+bool IsCorsCrossOriginResponseType(mojom::FetchResponseType type) {
   switch (type) {
     case mojom::FetchResponseType::kBasic:
-    case mojom::FetchResponseType::kCORS:
+    case mojom::FetchResponseType::kCors:
     case mojom::FetchResponseType::kDefault:
     case mojom::FetchResponseType::kError:
       return false;
diff --git a/services/network/public/cpp/cors/cors.h b/services/network/public/cpp/cors/cors.h
index c5db9b15..f80899b 100644
--- a/services/network/public/cpp/cors/cors.h
+++ b/services/network/public/cpp/cors/cors.h
@@ -50,7 +50,7 @@
 // Performs a CORS access check on the response parameters.
 // This implements https://fetch.spec.whatwg.org/#concept-cors-check
 COMPONENT_EXPORT(NETWORK_CPP)
-base::Optional<CORSErrorStatus> CheckAccess(
+base::Optional<CorsErrorStatus> CheckAccess(
     const GURL& response_url,
     const int response_status_code,
     const base::Optional<std::string>& allow_origin_header,
@@ -63,7 +63,7 @@
 // step 6, even for a preflight check, |credentials_mode| should be checked on
 // the actual request rather than preflight one.
 COMPONENT_EXPORT(NETWORK_CPP)
-base::Optional<CORSErrorStatus> CheckPreflightAccess(
+base::Optional<CorsErrorStatus> CheckPreflightAccess(
     const GURL& response_url,
     const int response_status_code,
     const base::Optional<std::string>& allow_origin_header,
@@ -76,7 +76,7 @@
 // - the URL has a CORS supported scheme and
 // - the URL does not contain the userinfo production.
 COMPONENT_EXPORT(NETWORK_CPP)
-base::Optional<CORSErrorStatus> CheckRedirectLocation(
+base::Optional<CorsErrorStatus> CheckRedirectLocation(
     const GURL& url,
     mojom::FetchRequestMode request_mode,
     const base::Optional<url::Origin>& origin,
@@ -87,17 +87,17 @@
 // Returns |kPreflightSuccess| if preflight response was successful.
 // TODO(toyoshim): Rename to CheckPreflightStatus.
 COMPONENT_EXPORT(NETWORK_CPP)
-base::Optional<mojom::CORSError> CheckPreflight(const int status_code);
+base::Optional<mojom::CorsError> CheckPreflight(const int status_code);
 
 // Checks errors for the currently experimental "Access-Control-Allow-External:"
 // header. Shares error conditions with standard preflight checking.
 // See https://crbug.com/590714.
 COMPONENT_EXPORT(NETWORK_CPP)
-base::Optional<CORSErrorStatus> CheckExternalPreflight(
+base::Optional<CorsErrorStatus> CheckExternalPreflight(
     const base::Optional<std::string>& allow_external);
 
 COMPONENT_EXPORT(NETWORK_CPP)
-bool IsCORSEnabledRequestMode(mojom::FetchRequestMode mode);
+bool IsCorsEnabledRequestMode(mojom::FetchRequestMode mode);
 
 // Returns the response tainting value
 // (https://fetch.spec.whatwg.org/#concept-request-response-tainting) for a
@@ -112,13 +112,13 @@
 
 // Checks safelisted request parameters.
 COMPONENT_EXPORT(NETWORK_CPP)
-bool IsCORSSafelistedMethod(const std::string& method);
+bool IsCorsSafelistedMethod(const std::string& method);
 COMPONENT_EXPORT(NETWORK_CPP)
-bool IsCORSSafelistedContentType(const std::string& name);
+bool IsCorsSafelistedContentType(const std::string& name);
 COMPONENT_EXPORT(NETWORK_CPP)
-bool IsCORSSafelistedHeader(const std::string& name, const std::string& value);
+bool IsCorsSafelistedHeader(const std::string& name, const std::string& value);
 COMPONENT_EXPORT(NETWORK_CPP)
-bool IsNoCORSSafelistedHeader(const std::string& name,
+bool IsNoCorsSafelistedHeader(const std::string& name,
                               const std::string& value);
 
 // https://fetch.spec.whatwg.org/#cors-unsafe-request-header-names
@@ -126,7 +126,7 @@
 // The returned list is NOT sorted.
 // The returned list consists of lower-cased names.
 COMPONENT_EXPORT(NETWORK_CPP)
-std::vector<std::string> CORSUnsafeRequestHeaderNames(
+std::vector<std::string> CorsUnsafeRequestHeaderNames(
     const net::HttpRequestHeaders::HeaderVector& headers);
 
 // https://fetch.spec.whatwg.org/#cors-unsafe-request-header-names
@@ -137,13 +137,13 @@
 // The returned list is NOT sorted.
 // The returned list consists of lower-cased names.
 COMPONENT_EXPORT(NETWORK_CPP)
-std::vector<std::string> CORSUnsafeNotForbiddenRequestHeaderNames(
+std::vector<std::string> CorsUnsafeNotForbiddenRequestHeaderNames(
     const net::HttpRequestHeaders::HeaderVector& headers,
     bool is_revalidating);
 
 // Checks forbidden method in the fetch spec.
 // See https://fetch.spec.whatwg.org/#forbidden-method.
-// TODO(toyoshim): Move Blink FetchUtils::IsForbiddenMethod to CORS:: and use
+// TODO(toyoshim): Move Blink FetchUtils::IsForbiddenMethod to cors:: and use
 // this implementation internally.
 COMPONENT_EXPORT(NETWORK_CPP) bool IsForbiddenMethod(const std::string& name);
 
@@ -159,12 +159,12 @@
 // Returns true if |type| is a response type which makes a response
 // CORS-same-origin. See https://html.spec.whatwg.org/#cors-same-origin.
 COMPONENT_EXPORT(NETWORK_CPP)
-bool IsCORSSameOriginResponseType(mojom::FetchResponseType type);
+bool IsCorsSameOriginResponseType(mojom::FetchResponseType type);
 
 // Returns true if |type| is a response type which makes a response
 // CORS-cross-origin. See https://html.spec.whatwg.org/#cors-cross-origin.
 COMPONENT_EXPORT(NETWORK_CPP)
-bool IsCORSCrossOriginResponseType(mojom::FetchResponseType type);
+bool IsCorsCrossOriginResponseType(mojom::FetchResponseType type);
 
 // Returns true if the credentials flag should be set for the given arguments
 // as in https://fetch.spec.whatwg.org/#http-network-or-cache-fetch.
diff --git a/services/network/public/cpp/cors/cors_error_status.cc b/services/network/public/cpp/cors/cors_error_status.cc
index a8bd29f..e1a21928 100644
--- a/services/network/public/cpp/cors/cors_error_status.cc
+++ b/services/network/public/cpp/cors/cors_error_status.cc
@@ -11,20 +11,20 @@
 // Note: |cors_error| is initialized to kLast to keep the value inside the
 // valid enum value range. The value is meaningless and should be overriden
 // immediately by IPC desrtialization code.
-CORSErrorStatus::CORSErrorStatus()
-    : CORSErrorStatus(mojom::CORSError::kMaxValue) {}
+CorsErrorStatus::CorsErrorStatus()
+    : CorsErrorStatus(mojom::CorsError::kMaxValue) {}
 
-CORSErrorStatus::CORSErrorStatus(const CORSErrorStatus& status) = default;
+CorsErrorStatus::CorsErrorStatus(const CorsErrorStatus& status) = default;
 
-CORSErrorStatus::CORSErrorStatus(mojom::CORSError error) : cors_error(error) {}
+CorsErrorStatus::CorsErrorStatus(mojom::CorsError error) : cors_error(error) {}
 
-CORSErrorStatus::CORSErrorStatus(mojom::CORSError error,
+CorsErrorStatus::CorsErrorStatus(mojom::CorsError error,
                                  const std::string& failed_parameter)
     : cors_error(error), failed_parameter(failed_parameter) {}
 
-CORSErrorStatus::~CORSErrorStatus() = default;
+CorsErrorStatus::~CorsErrorStatus() = default;
 
-bool CORSErrorStatus::operator==(const CORSErrorStatus& rhs) const {
+bool CorsErrorStatus::operator==(const CorsErrorStatus& rhs) const {
   return cors_error == rhs.cors_error &&
          failed_parameter == rhs.failed_parameter;
 }
diff --git a/services/network/public/cpp/cors/cors_error_status.h b/services/network/public/cpp/cors/cors_error_status.h
index 6df12c4f..3e79c69 100644
--- a/services/network/public/cpp/cors/cors_error_status.h
+++ b/services/network/public/cpp/cors/cors_error_status.h
@@ -14,24 +14,24 @@
 
 namespace network {
 
-struct COMPONENT_EXPORT(NETWORK_CPP_BASE) CORSErrorStatus {
+struct COMPONENT_EXPORT(NETWORK_CPP_BASE) CorsErrorStatus {
   // This constructor is used by generated IPC serialization code.
   // Should not use this explicitly.
   // TODO(toyoshim, yhirano): Exploring a way to make this private, and allows
   // only serialization code for mojo can access.
-  CORSErrorStatus();
+  CorsErrorStatus();
 
-  CORSErrorStatus(const CORSErrorStatus& status);
+  CorsErrorStatus(const CorsErrorStatus& status);
 
-  explicit CORSErrorStatus(mojom::CORSError error);
-  CORSErrorStatus(mojom::CORSError error, const std::string& failed_parameter);
+  explicit CorsErrorStatus(mojom::CorsError error);
+  CorsErrorStatus(mojom::CorsError error, const std::string& failed_parameter);
 
-  ~CORSErrorStatus();
+  ~CorsErrorStatus();
 
-  bool operator==(const CORSErrorStatus& rhs) const;
-  bool operator!=(const CORSErrorStatus& rhs) const { return !(*this == rhs); }
+  bool operator==(const CorsErrorStatus& rhs) const;
+  bool operator!=(const CorsErrorStatus& rhs) const { return !(*this == rhs); }
 
-  mojom::CORSError cors_error;
+  mojom::CorsError cors_error;
 
   // Contains request method name, or header name that didn't pass a CORS check.
   std::string failed_parameter;
diff --git a/services/network/public/cpp/cors/cors_legacy.h b/services/network/public/cpp/cors/cors_legacy.h
index dc9295a..af6c3bb 100644
--- a/services/network/public/cpp/cors/cors_legacy.h
+++ b/services/network/public/cpp/cors/cors_legacy.h
@@ -23,7 +23,7 @@
 namespace legacy {
 
 // Registers whitelisted secure origins and hostname patterns for CORS checks in
-// CORSURLLoader.
+// CorsURLLoader.
 COMPONENT_EXPORT(NETWORK_CPP)
 void RegisterSecureOrigins(const std::vector<std::string>& secure_origins);
 
diff --git a/services/network/public/cpp/cors/cors_unittest.cc b/services/network/public/cpp/cors/cors_unittest.cc
index 537ba88..f285e40 100644
--- a/services/network/public/cpp/cors/cors_unittest.cc
+++ b/services/network/public/cpp/cors/cors_unittest.cc
@@ -14,27 +14,27 @@
 namespace cors {
 namespace {
 
-using CORSTest = testing::Test;
+using CorsTest = testing::Test;
 
-TEST_F(CORSTest, CheckAccessDetectsInvalidResponse) {
-  base::Optional<CORSErrorStatus> error_status =
+TEST_F(CorsTest, CheckAccessDetectsInvalidResponse) {
+  base::Optional<CorsErrorStatus> error_status =
       CheckAccess(GURL(), 0 /* response_status_code */,
                   base::nullopt /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kOmit, url::Origin());
   ASSERT_TRUE(error_status);
-  EXPECT_EQ(mojom::CORSError::kInvalidResponse, error_status->cors_error);
+  EXPECT_EQ(mojom::CorsError::kInvalidResponse, error_status->cors_error);
 }
 
 // Tests if CheckAccess detects kWildcardOriginNotAllowed error correctly.
-TEST_F(CORSTest, CheckAccessDetectsWildcardOriginNotAllowed) {
+TEST_F(CorsTest, CheckAccessDetectsWildcardOriginNotAllowed) {
   const GURL response_url("http://example.com/data");
   const url::Origin origin = url::Origin::Create(GURL("http://google.com"));
   const int response_status_code = 200;
   const std::string allow_all_header("*");
 
   // Access-Control-Allow-Origin '*' works.
-  base::Optional<CORSErrorStatus> error1 =
+  base::Optional<CorsErrorStatus> error1 =
       CheckAccess(response_url, response_status_code,
                   allow_all_header /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
@@ -43,95 +43,95 @@
 
   // Access-Control-Allow-Origin '*' should not be allowed if credentials mode
   // is kInclude.
-  base::Optional<CORSErrorStatus> error2 =
+  base::Optional<CorsErrorStatus> error2 =
       CheckAccess(response_url, response_status_code,
                   allow_all_header /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kInclude, origin);
   ASSERT_TRUE(error2);
-  EXPECT_EQ(mojom::CORSError::kWildcardOriginNotAllowed, error2->cors_error);
+  EXPECT_EQ(mojom::CorsError::kWildcardOriginNotAllowed, error2->cors_error);
 }
 
 // Tests if CheckAccess detects kMissingAllowOriginHeader error correctly.
-TEST_F(CORSTest, CheckAccessDetectsMissingAllowOriginHeader) {
+TEST_F(CorsTest, CheckAccessDetectsMissingAllowOriginHeader) {
   const GURL response_url("http://example.com/data");
   const url::Origin origin = url::Origin::Create(GURL("http://google.com"));
   const int response_status_code = 200;
 
   // Access-Control-Allow-Origin is missed.
-  base::Optional<CORSErrorStatus> error =
+  base::Optional<CorsErrorStatus> error =
       CheckAccess(response_url, response_status_code,
                   base::nullopt /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kOmit, origin);
   ASSERT_TRUE(error);
-  EXPECT_EQ(mojom::CORSError::kMissingAllowOriginHeader, error->cors_error);
+  EXPECT_EQ(mojom::CorsError::kMissingAllowOriginHeader, error->cors_error);
 }
 
 // Tests if CheckAccess detects kMultipleAllowOriginValues error
 // correctly.
-TEST_F(CORSTest, CheckAccessDetectsMultipleAllowOriginValues) {
+TEST_F(CorsTest, CheckAccessDetectsMultipleAllowOriginValues) {
   const GURL response_url("http://example.com/data");
   const url::Origin origin = url::Origin::Create(GURL("http://google.com"));
   const int response_status_code = 200;
 
   const std::string space_separated_multiple_origins(
       "http://example.com http://another.example.com");
-  base::Optional<CORSErrorStatus> error1 =
+  base::Optional<CorsErrorStatus> error1 =
       CheckAccess(response_url, response_status_code,
                   space_separated_multiple_origins /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kOmit, origin);
   ASSERT_TRUE(error1);
-  EXPECT_EQ(mojom::CORSError::kMultipleAllowOriginValues, error1->cors_error);
+  EXPECT_EQ(mojom::CorsError::kMultipleAllowOriginValues, error1->cors_error);
 
   const std::string comma_separated_multiple_origins(
       "http://example.com,http://another.example.com");
-  base::Optional<CORSErrorStatus> error2 =
+  base::Optional<CorsErrorStatus> error2 =
       CheckAccess(response_url, response_status_code,
                   comma_separated_multiple_origins /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kOmit, origin);
   ASSERT_TRUE(error2);
-  EXPECT_EQ(mojom::CORSError::kMultipleAllowOriginValues, error2->cors_error);
+  EXPECT_EQ(mojom::CorsError::kMultipleAllowOriginValues, error2->cors_error);
 }
 
 // Tests if CheckAccess detects kInvalidAllowOriginValue error correctly.
-TEST_F(CORSTest, CheckAccessDetectsInvalidAllowOriginValue) {
+TEST_F(CorsTest, CheckAccessDetectsInvalidAllowOriginValue) {
   const GURL response_url("http://example.com/data");
   const url::Origin origin = url::Origin::Create(GURL("http://google.com"));
   const int response_status_code = 200;
 
-  base::Optional<CORSErrorStatus> error =
+  base::Optional<CorsErrorStatus> error =
       CheckAccess(response_url, response_status_code,
                   std::string("invalid.origin") /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kOmit, origin);
   ASSERT_TRUE(error);
-  EXPECT_EQ(mojom::CORSError::kInvalidAllowOriginValue, error->cors_error);
+  EXPECT_EQ(mojom::CorsError::kInvalidAllowOriginValue, error->cors_error);
   EXPECT_EQ("invalid.origin", error->failed_parameter);
 }
 
 // Tests if CheckAccess detects kAllowOriginMismatch error correctly.
-TEST_F(CORSTest, CheckAccessDetectsAllowOriginMismatch) {
+TEST_F(CorsTest, CheckAccessDetectsAllowOriginMismatch) {
   const GURL response_url("http://example.com/data");
   const url::Origin origin = url::Origin::Create(GURL("http://google.com"));
   const int response_status_code = 200;
 
-  base::Optional<CORSErrorStatus> error1 =
+  base::Optional<CorsErrorStatus> error1 =
       CheckAccess(response_url, response_status_code,
                   origin.Serialize() /* allow_origin_header */,
                   base::nullopt /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kOmit, origin);
   ASSERT_FALSE(error1);
 
-  base::Optional<CORSErrorStatus> error2 = CheckAccess(
+  base::Optional<CorsErrorStatus> error2 = CheckAccess(
       response_url, response_status_code,
       std::string("http://not.google.com") /* allow_origin_header */,
       base::nullopt /* allow_credentials_header */,
       network::mojom::FetchCredentialsMode::kOmit, origin);
   ASSERT_TRUE(error2);
-  EXPECT_EQ(mojom::CORSError::kAllowOriginMismatch, error2->cors_error);
+  EXPECT_EQ(mojom::CorsError::kAllowOriginMismatch, error2->cors_error);
   EXPECT_EQ("http://not.google.com", error2->failed_parameter);
 
   // Allow "null" value to match serialized unique origins.
@@ -139,7 +139,7 @@
   const url::Origin null_origin;
   EXPECT_EQ(null_string, null_origin.Serialize());
 
-  base::Optional<CORSErrorStatus> error3 = CheckAccess(
+  base::Optional<CorsErrorStatus> error3 = CheckAccess(
       response_url, response_status_code, null_string /* allow_origin_header */,
       base::nullopt /* allow_credentials_header */,
       network::mojom::FetchCredentialsMode::kOmit, null_origin);
@@ -147,43 +147,43 @@
 }
 
 // Tests if CheckAccess detects kInvalidAllowCredentials error correctly.
-TEST_F(CORSTest, CheckAccessDetectsInvalidAllowCredential) {
+TEST_F(CorsTest, CheckAccessDetectsInvalidAllowCredential) {
   const GURL response_url("http://example.com/data");
   const url::Origin origin = url::Origin::Create(GURL("http://google.com"));
   const int response_status_code = 200;
 
-  base::Optional<CORSErrorStatus> error1 =
+  base::Optional<CorsErrorStatus> error1 =
       CheckAccess(response_url, response_status_code,
                   origin.Serialize() /* allow_origin_header */,
                   std::string("true") /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kInclude, origin);
   ASSERT_FALSE(error1);
 
-  base::Optional<CORSErrorStatus> error2 =
+  base::Optional<CorsErrorStatus> error2 =
       CheckAccess(response_url, response_status_code,
                   origin.Serialize() /* allow_origin_header */,
                   std::string("fuga") /* allow_credentials_header */,
                   network::mojom::FetchCredentialsMode::kInclude, origin);
   ASSERT_TRUE(error2);
-  EXPECT_EQ(mojom::CORSError::kInvalidAllowCredentials, error2->cors_error);
+  EXPECT_EQ(mojom::CorsError::kInvalidAllowCredentials, error2->cors_error);
   EXPECT_EQ("fuga", error2->failed_parameter);
 }
 
-// Tests if CheckRedirectLocation detects kCORSDisabledScheme and
+// Tests if CheckRedirectLocation detects kCorsDisabledScheme and
 // kRedirectContainsCredentials errors correctly.
-TEST_F(CORSTest, CheckRedirectLocation) {
+TEST_F(CorsTest, CheckRedirectLocation) {
   struct TestCase {
     GURL url;
     mojom::FetchRequestMode request_mode;
     bool cors_flag;
     bool tainted;
-    base::Optional<CORSErrorStatus> expectation;
+    base::Optional<CorsErrorStatus> expectation;
   };
 
-  const auto kCORS = mojom::FetchRequestMode::kCORS;
-  const auto kCORSWithForcedPreflight =
-      mojom::FetchRequestMode::kCORSWithForcedPreflight;
-  const auto kNoCORS = mojom::FetchRequestMode::kNoCORS;
+  const auto kCors = mojom::FetchRequestMode::kCors;
+  const auto kCorsWithForcedPreflight =
+      mojom::FetchRequestMode::kCorsWithForcedPreflight;
+  const auto kNoCors = mojom::FetchRequestMode::kNoCors;
 
   const url::Origin origin = url::Origin::Create(GURL("http://example.com/"));
   const GURL same_origin_url("http://example.com/");
@@ -194,81 +194,81 @@
   const GURL cross_origin_url_with_user("http://[email protected]/");
   const GURL cross_origin_url_with_pass("http://:[email protected]/");
   const auto ok = base::nullopt;
-  const CORSErrorStatus kCORSDisabledScheme(
-      mojom::CORSError::kCORSDisabledScheme);
-  const CORSErrorStatus kRedirectContainsCredentials(
-      mojom::CORSError::kRedirectContainsCredentials);
+  const CorsErrorStatus kCorsDisabledScheme(
+      mojom::CorsError::kCorsDisabledScheme);
+  const CorsErrorStatus kRedirectContainsCredentials(
+      mojom::CorsError::kRedirectContainsCredentials);
 
   TestCase cases[] = {
       // "cors", no credentials information
-      {same_origin_url, kCORS, false, false, ok},
-      {cross_origin_url, kCORS, false, false, ok},
-      {data_url, kCORS, false, false, ok},
-      {same_origin_url, kCORS, true, false, ok},
-      {cross_origin_url, kCORS, true, false, ok},
-      {data_url, kCORS, true, false, ok},
-      {same_origin_url, kCORS, false, true, ok},
-      {cross_origin_url, kCORS, false, true, ok},
-      {data_url, kCORS, false, true, ok},
-      {same_origin_url, kCORS, true, true, ok},
-      {cross_origin_url, kCORS, true, true, ok},
-      {data_url, kCORS, true, true, ok},
+      {same_origin_url, kCors, false, false, ok},
+      {cross_origin_url, kCors, false, false, ok},
+      {data_url, kCors, false, false, ok},
+      {same_origin_url, kCors, true, false, ok},
+      {cross_origin_url, kCors, true, false, ok},
+      {data_url, kCors, true, false, ok},
+      {same_origin_url, kCors, false, true, ok},
+      {cross_origin_url, kCors, false, true, ok},
+      {data_url, kCors, false, true, ok},
+      {same_origin_url, kCors, true, true, ok},
+      {cross_origin_url, kCors, true, true, ok},
+      {data_url, kCors, true, true, ok},
 
       // "cors" with forced preflight, no credentials information
-      {same_origin_url, kCORSWithForcedPreflight, false, false, ok},
-      {cross_origin_url, kCORSWithForcedPreflight, false, false, ok},
-      {data_url, kCORSWithForcedPreflight, false, false, ok},
-      {same_origin_url, kCORSWithForcedPreflight, true, false, ok},
-      {cross_origin_url, kCORSWithForcedPreflight, true, false, ok},
-      {data_url, kCORSWithForcedPreflight, true, false, ok},
-      {same_origin_url, kCORSWithForcedPreflight, false, true, ok},
-      {cross_origin_url, kCORSWithForcedPreflight, false, true, ok},
-      {data_url, kCORSWithForcedPreflight, false, true, ok},
-      {same_origin_url, kCORSWithForcedPreflight, true, true, ok},
-      {cross_origin_url, kCORSWithForcedPreflight, true, true, ok},
-      {data_url, kCORSWithForcedPreflight, true, true, ok},
+      {same_origin_url, kCorsWithForcedPreflight, false, false, ok},
+      {cross_origin_url, kCorsWithForcedPreflight, false, false, ok},
+      {data_url, kCorsWithForcedPreflight, false, false, ok},
+      {same_origin_url, kCorsWithForcedPreflight, true, false, ok},
+      {cross_origin_url, kCorsWithForcedPreflight, true, false, ok},
+      {data_url, kCorsWithForcedPreflight, true, false, ok},
+      {same_origin_url, kCorsWithForcedPreflight, false, true, ok},
+      {cross_origin_url, kCorsWithForcedPreflight, false, true, ok},
+      {data_url, kCorsWithForcedPreflight, false, true, ok},
+      {same_origin_url, kCorsWithForcedPreflight, true, true, ok},
+      {cross_origin_url, kCorsWithForcedPreflight, true, true, ok},
+      {data_url, kCorsWithForcedPreflight, true, true, ok},
 
       // "no-cors", no credentials information
-      {same_origin_url, kNoCORS, false, false, ok},
-      {cross_origin_url, kNoCORS, false, false, ok},
-      {data_url, kNoCORS, false, false, ok},
-      {same_origin_url, kNoCORS, false, true, ok},
-      {cross_origin_url, kNoCORS, false, true, ok},
-      {data_url, kNoCORS, false, true, ok},
+      {same_origin_url, kNoCors, false, false, ok},
+      {cross_origin_url, kNoCors, false, false, ok},
+      {data_url, kNoCors, false, false, ok},
+      {same_origin_url, kNoCors, false, true, ok},
+      {cross_origin_url, kNoCors, false, true, ok},
+      {data_url, kNoCors, false, true, ok},
 
       // with credentials information (same origin)
-      {same_origin_url_with_user, kCORS, false, false, ok},
-      {same_origin_url_with_user, kCORS, true, false,
+      {same_origin_url_with_user, kCors, false, false, ok},
+      {same_origin_url_with_user, kCors, true, false,
        kRedirectContainsCredentials},
-      {same_origin_url_with_user, kCORS, true, true,
+      {same_origin_url_with_user, kCors, true, true,
        kRedirectContainsCredentials},
-      {same_origin_url_with_user, kNoCORS, false, false, ok},
-      {same_origin_url_with_user, kNoCORS, false, true, ok},
-      {same_origin_url_with_pass, kCORS, false, false, ok},
-      {same_origin_url_with_pass, kCORS, true, false,
+      {same_origin_url_with_user, kNoCors, false, false, ok},
+      {same_origin_url_with_user, kNoCors, false, true, ok},
+      {same_origin_url_with_pass, kCors, false, false, ok},
+      {same_origin_url_with_pass, kCors, true, false,
        kRedirectContainsCredentials},
-      {same_origin_url_with_pass, kCORS, true, true,
+      {same_origin_url_with_pass, kCors, true, true,
        kRedirectContainsCredentials},
-      {same_origin_url_with_pass, kNoCORS, false, false, ok},
-      {same_origin_url_with_pass, kNoCORS, false, true, ok},
+      {same_origin_url_with_pass, kNoCors, false, false, ok},
+      {same_origin_url_with_pass, kNoCors, false, true, ok},
 
       // with credentials information (cross origin)
-      {cross_origin_url_with_user, kCORS, false, false,
+      {cross_origin_url_with_user, kCors, false, false,
        kRedirectContainsCredentials},
-      {cross_origin_url_with_user, kCORS, true, false,
+      {cross_origin_url_with_user, kCors, true, false,
        kRedirectContainsCredentials},
-      {cross_origin_url_with_user, kCORS, true, true,
+      {cross_origin_url_with_user, kCors, true, true,
        kRedirectContainsCredentials},
-      {cross_origin_url_with_user, kNoCORS, false, true, ok},
-      {cross_origin_url_with_user, kNoCORS, false, false, ok},
-      {cross_origin_url_with_pass, kCORS, false, false,
+      {cross_origin_url_with_user, kNoCors, false, true, ok},
+      {cross_origin_url_with_user, kNoCors, false, false, ok},
+      {cross_origin_url_with_pass, kCors, false, false,
        kRedirectContainsCredentials},
-      {cross_origin_url_with_pass, kCORS, true, false,
+      {cross_origin_url_with_pass, kCors, true, false,
        kRedirectContainsCredentials},
-      {cross_origin_url_with_pass, kCORS, true, true,
+      {cross_origin_url_with_pass, kCors, true, true,
        kRedirectContainsCredentials},
-      {cross_origin_url_with_pass, kNoCORS, false, true, ok},
-      {cross_origin_url_with_pass, kNoCORS, false, false, ok},
+      {cross_origin_url_with_pass, kNoCors, false, true, ok},
+      {cross_origin_url_with_pass, kNoCors, false, false, ok},
   };
 
   for (const auto& test : cases) {
@@ -284,32 +284,32 @@
   }
 }
 
-TEST_F(CORSTest, CheckPreflightDetectsErrors) {
+TEST_F(CorsTest, CheckPreflightDetectsErrors) {
   EXPECT_FALSE(CheckPreflight(200));
   EXPECT_FALSE(CheckPreflight(299));
 
-  base::Optional<mojom::CORSError> error1 = CheckPreflight(300);
+  base::Optional<mojom::CorsError> error1 = CheckPreflight(300);
   ASSERT_TRUE(error1);
-  EXPECT_EQ(mojom::CORSError::kPreflightInvalidStatus, *error1);
+  EXPECT_EQ(mojom::CorsError::kPreflightInvalidStatus, *error1);
 
   EXPECT_FALSE(CheckExternalPreflight(std::string("true")));
 
-  base::Optional<CORSErrorStatus> error2 =
+  base::Optional<CorsErrorStatus> error2 =
       CheckExternalPreflight(base::nullopt);
   ASSERT_TRUE(error2);
-  EXPECT_EQ(mojom::CORSError::kPreflightMissingAllowExternal,
+  EXPECT_EQ(mojom::CorsError::kPreflightMissingAllowExternal,
             error2->cors_error);
   EXPECT_EQ("", error2->failed_parameter);
 
-  base::Optional<CORSErrorStatus> error3 =
+  base::Optional<CorsErrorStatus> error3 =
       CheckExternalPreflight(std::string("TRUE"));
   ASSERT_TRUE(error3);
-  EXPECT_EQ(mojom::CORSError::kPreflightInvalidAllowExternal,
+  EXPECT_EQ(mojom::CorsError::kPreflightInvalidAllowExternal,
             error3->cors_error);
   EXPECT_EQ("TRUE", error3->failed_parameter);
 }
 
-TEST_F(CORSTest, CalculateResponseTainting) {
+TEST_F(CorsTest, CalculateResponseTainting) {
   using mojom::FetchResponseType;
   using mojom::FetchRequestMode;
 
@@ -324,13 +324,13 @@
                 same_origin_url, FetchRequestMode::kSameOrigin, origin, false));
   EXPECT_EQ(FetchResponseType::kBasic,
             CalculateResponseTainting(
-                same_origin_url, FetchRequestMode::kNoCORS, origin, false));
+                same_origin_url, FetchRequestMode::kNoCors, origin, false));
   EXPECT_EQ(FetchResponseType::kBasic,
-            CalculateResponseTainting(same_origin_url, FetchRequestMode::kCORS,
+            CalculateResponseTainting(same_origin_url, FetchRequestMode::kCors,
                                       origin, false));
   EXPECT_EQ(FetchResponseType::kBasic,
             CalculateResponseTainting(
-                same_origin_url, FetchRequestMode::kCORSWithForcedPreflight,
+                same_origin_url, FetchRequestMode::kCorsWithForcedPreflight,
                 origin, false));
   EXPECT_EQ(FetchResponseType::kBasic,
             CalculateResponseTainting(
@@ -339,67 +339,67 @@
   // CORS flag is false, cross-origin request
   EXPECT_EQ(FetchResponseType::kOpaque,
             CalculateResponseTainting(
-                cross_origin_url, FetchRequestMode::kNoCORS, origin, false));
+                cross_origin_url, FetchRequestMode::kNoCors, origin, false));
   EXPECT_EQ(FetchResponseType::kBasic,
             CalculateResponseTainting(
                 cross_origin_url, FetchRequestMode::kNavigate, origin, false));
 
   // CORS flag is true, same-origin request
-  EXPECT_EQ(FetchResponseType::kCORS,
-            CalculateResponseTainting(same_origin_url, FetchRequestMode::kCORS,
+  EXPECT_EQ(FetchResponseType::kCors,
+            CalculateResponseTainting(same_origin_url, FetchRequestMode::kCors,
                                       origin, true));
-  EXPECT_EQ(FetchResponseType::kCORS,
+  EXPECT_EQ(FetchResponseType::kCors,
             CalculateResponseTainting(
-                same_origin_url, FetchRequestMode::kCORSWithForcedPreflight,
+                same_origin_url, FetchRequestMode::kCorsWithForcedPreflight,
                 origin, true));
 
   // CORS flag is true, cross-origin request
-  EXPECT_EQ(FetchResponseType::kCORS,
-            CalculateResponseTainting(cross_origin_url, FetchRequestMode::kCORS,
+  EXPECT_EQ(FetchResponseType::kCors,
+            CalculateResponseTainting(cross_origin_url, FetchRequestMode::kCors,
                                       origin, true));
-  EXPECT_EQ(FetchResponseType::kCORS,
+  EXPECT_EQ(FetchResponseType::kCors,
             CalculateResponseTainting(
-                cross_origin_url, FetchRequestMode::kCORSWithForcedPreflight,
+                cross_origin_url, FetchRequestMode::kCorsWithForcedPreflight,
                 origin, true));
 
   // Origin is not provided.
   EXPECT_EQ(FetchResponseType::kBasic,
             CalculateResponseTainting(
-                same_origin_url, FetchRequestMode::kNoCORS, no_origin, false));
+                same_origin_url, FetchRequestMode::kNoCors, no_origin, false));
   EXPECT_EQ(
       FetchResponseType::kBasic,
       CalculateResponseTainting(same_origin_url, FetchRequestMode::kNavigate,
                                 no_origin, false));
   EXPECT_EQ(FetchResponseType::kBasic,
             CalculateResponseTainting(
-                cross_origin_url, FetchRequestMode::kNoCORS, no_origin, false));
+                cross_origin_url, FetchRequestMode::kNoCors, no_origin, false));
   EXPECT_EQ(
       FetchResponseType::kBasic,
       CalculateResponseTainting(cross_origin_url, FetchRequestMode::kNavigate,
                                 no_origin, false));
 }
 
-TEST_F(CORSTest, SafelistedMethod) {
+TEST_F(CorsTest, SafelistedMethod) {
   // Method check should be case-insensitive.
-  EXPECT_TRUE(IsCORSSafelistedMethod("get"));
-  EXPECT_TRUE(IsCORSSafelistedMethod("Get"));
-  EXPECT_TRUE(IsCORSSafelistedMethod("GET"));
-  EXPECT_TRUE(IsCORSSafelistedMethod("HEAD"));
-  EXPECT_TRUE(IsCORSSafelistedMethod("POST"));
-  EXPECT_FALSE(IsCORSSafelistedMethod("OPTIONS"));
+  EXPECT_TRUE(IsCorsSafelistedMethod("get"));
+  EXPECT_TRUE(IsCorsSafelistedMethod("Get"));
+  EXPECT_TRUE(IsCorsSafelistedMethod("GET"));
+  EXPECT_TRUE(IsCorsSafelistedMethod("HEAD"));
+  EXPECT_TRUE(IsCorsSafelistedMethod("POST"));
+  EXPECT_FALSE(IsCorsSafelistedMethod("OPTIONS"));
 }
 
-TEST_F(CORSTest, SafelistedHeader) {
+TEST_F(CorsTest, SafelistedHeader) {
   // See SafelistedAccept/AcceptLanguage/ContentLanguage/ContentType also.
 
-  EXPECT_TRUE(IsCORSSafelistedHeader("accept", "foo"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("foo", "bar"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("user-agent", "foo"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("accept", "foo"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("foo", "bar"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("user-agent", "foo"));
 }
 
-TEST_F(CORSTest, SafelistedAccept) {
-  EXPECT_TRUE(IsCORSSafelistedHeader("accept", "text/html"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("AccepT", "text/html"));
+TEST_F(CorsTest, SafelistedAccept) {
+  EXPECT_TRUE(IsCorsSafelistedHeader("accept", "text/html"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("AccepT", "text/html"));
 
   constexpr char kAllowed[] =
       "\t !#$%&'*+,-./0123456789;="
@@ -410,26 +410,26 @@
     // 1 for the trailing null character.
     auto* end = kAllowed + base::size(kAllowed) - 1;
     EXPECT_EQ(std::find(kAllowed, end, c) != end,
-              IsCORSSafelistedHeader("accept", std::string(1, c)));
+              IsCorsSafelistedHeader("accept", std::string(1, c)));
     EXPECT_EQ(std::find(kAllowed, end, c) != end,
-              IsCORSSafelistedHeader("AccepT", std::string(1, c)));
+              IsCorsSafelistedHeader("AccepT", std::string(1, c)));
   }
   for (int i = 128; i <= 255; ++i) {
     SCOPED_TRACE(testing::Message() << "c = static_cast<char>(" << i << ")");
     char c = static_cast<char>(static_cast<unsigned char>(i));
-    EXPECT_TRUE(IsCORSSafelistedHeader("accept", std::string(1, c)));
-    EXPECT_TRUE(IsCORSSafelistedHeader("AccepT", std::string(1, c)));
+    EXPECT_TRUE(IsCorsSafelistedHeader("accept", std::string(1, c)));
+    EXPECT_TRUE(IsCorsSafelistedHeader("AccepT", std::string(1, c)));
   }
 
-  EXPECT_TRUE(IsCORSSafelistedHeader("accept", std::string(128, 'a')));
-  EXPECT_FALSE(IsCORSSafelistedHeader("accept", std::string(129, 'a')));
-  EXPECT_TRUE(IsCORSSafelistedHeader("AccepT", std::string(128, 'a')));
-  EXPECT_FALSE(IsCORSSafelistedHeader("AccepT", std::string(129, 'a')));
+  EXPECT_TRUE(IsCorsSafelistedHeader("accept", std::string(128, 'a')));
+  EXPECT_FALSE(IsCorsSafelistedHeader("accept", std::string(129, 'a')));
+  EXPECT_TRUE(IsCorsSafelistedHeader("AccepT", std::string(128, 'a')));
+  EXPECT_FALSE(IsCorsSafelistedHeader("AccepT", std::string(129, 'a')));
 }
 
-TEST_F(CORSTest, SafelistedAcceptLanguage) {
-  EXPECT_TRUE(IsCORSSafelistedHeader("accept-language", "en,ja"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("aCcEPT-lAngUAge", "en,ja"));
+TEST_F(CorsTest, SafelistedAcceptLanguage) {
+  EXPECT_TRUE(IsCorsSafelistedHeader("accept-language", "en,ja"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("aCcEPT-lAngUAge", "en,ja"));
 
   constexpr char kAllowed[] =
       "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz *,-.;=";
@@ -439,19 +439,19 @@
     // 1 for the trailing null character.
     auto* end = kAllowed + base::size(kAllowed) - 1;
     EXPECT_EQ(std::find(kAllowed, end, c) != end,
-              IsCORSSafelistedHeader("aCcEPT-lAngUAge", std::string(1, c)));
+              IsCorsSafelistedHeader("aCcEPT-lAngUAge", std::string(1, c)));
   }
-  EXPECT_TRUE(IsCORSSafelistedHeader("accept-language", std::string(128, 'a')));
+  EXPECT_TRUE(IsCorsSafelistedHeader("accept-language", std::string(128, 'a')));
   EXPECT_FALSE(
-      IsCORSSafelistedHeader("accept-language", std::string(129, 'a')));
-  EXPECT_TRUE(IsCORSSafelistedHeader("aCcEPT-lAngUAge", std::string(128, 'a')));
+      IsCorsSafelistedHeader("accept-language", std::string(129, 'a')));
+  EXPECT_TRUE(IsCorsSafelistedHeader("aCcEPT-lAngUAge", std::string(128, 'a')));
   EXPECT_FALSE(
-      IsCORSSafelistedHeader("aCcEPT-lAngUAge", std::string(129, 'a')));
+      IsCorsSafelistedHeader("aCcEPT-lAngUAge", std::string(129, 'a')));
 }
 
-TEST_F(CORSTest, SafelistedContentLanguage) {
-  EXPECT_TRUE(IsCORSSafelistedHeader("content-language", "en,ja"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("cONTent-LANguaGe", "en,ja"));
+TEST_F(CorsTest, SafelistedContentLanguage) {
+  EXPECT_TRUE(IsCorsSafelistedHeader("content-language", "en,ja"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("cONTent-LANguaGe", "en,ja"));
 
   constexpr char kAllowed[] =
       "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz *,-.;=";
@@ -461,21 +461,21 @@
     // 1 for the trailing null character.
     auto* end = kAllowed + base::size(kAllowed) - 1;
     EXPECT_EQ(std::find(kAllowed, end, c) != end,
-              IsCORSSafelistedHeader("content-language", std::string(1, c)));
+              IsCorsSafelistedHeader("content-language", std::string(1, c)));
     EXPECT_EQ(std::find(kAllowed, end, c) != end,
-              IsCORSSafelistedHeader("cONTent-LANguaGe", std::string(1, c)));
+              IsCorsSafelistedHeader("cONTent-LANguaGe", std::string(1, c)));
   }
   EXPECT_TRUE(
-      IsCORSSafelistedHeader("content-language", std::string(128, 'a')));
+      IsCorsSafelistedHeader("content-language", std::string(128, 'a')));
   EXPECT_FALSE(
-      IsCORSSafelistedHeader("content-language", std::string(129, 'a')));
+      IsCorsSafelistedHeader("content-language", std::string(129, 'a')));
   EXPECT_TRUE(
-      IsCORSSafelistedHeader("cONTent-LANguaGe", std::string(128, 'a')));
+      IsCorsSafelistedHeader("cONTent-LANguaGe", std::string(128, 'a')));
   EXPECT_FALSE(
-      IsCORSSafelistedHeader("cONTent-LANguaGe", std::string(129, 'a')));
+      IsCorsSafelistedHeader("cONTent-LANguaGe", std::string(129, 'a')));
 }
 
-TEST_F(CORSTest, SafelistedContentType) {
+TEST_F(CorsTest, SafelistedContentType) {
   constexpr char kAllowed[] =
       "\t !#$%&'*+,-./0123456789;="
       "ABCDEFGHIJKLMNOPQRSTUVWXYZ^_`abcdefghijklmnopqrstuvwxyz|~";
@@ -487,106 +487,106 @@
     const bool is_allowed = std::find(kAllowed, end, c) != end;
     const std::string value = std::string("text/plain; charset=") + c;
 
-    EXPECT_EQ(is_allowed, IsCORSSafelistedHeader("content-type", value));
-    EXPECT_EQ(is_allowed, IsCORSSafelistedHeader("cONtent-tYPe", value));
+    EXPECT_EQ(is_allowed, IsCorsSafelistedHeader("content-type", value));
+    EXPECT_EQ(is_allowed, IsCorsSafelistedHeader("cONtent-tYPe", value));
   }
   for (int i = 128; i <= 255; ++i) {
     SCOPED_TRACE(testing::Message() << "c = static_cast<char>(" << i << ")");
     char c = static_cast<char>(static_cast<unsigned char>(i));
     const std::string value = std::string("text/plain; charset=") + c;
-    EXPECT_TRUE(IsCORSSafelistedHeader("content-type", value));
-    EXPECT_TRUE(IsCORSSafelistedHeader("ConTEnt-Type", value));
+    EXPECT_TRUE(IsCorsSafelistedHeader("content-type", value));
+    EXPECT_TRUE(IsCorsSafelistedHeader("ConTEnt-Type", value));
   }
 
-  EXPECT_TRUE(IsCORSSafelistedHeader("content-type", "text/plain"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("CoNtEnt-TyPE", "text/plain"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("content-type", "text/plain"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("CoNtEnt-TyPE", "text/plain"));
   EXPECT_TRUE(
-      IsCORSSafelistedHeader("content-type", "text/plain; charset=utf-8"));
+      IsCorsSafelistedHeader("content-type", "text/plain; charset=utf-8"));
   EXPECT_TRUE(
-      IsCORSSafelistedHeader("content-type", "  text/plain ; charset=UTF-8"));
+      IsCorsSafelistedHeader("content-type", "  text/plain ; charset=UTF-8"));
   EXPECT_TRUE(
-      IsCORSSafelistedHeader("content-type", "text/plain; param=BOGUS"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("content-type",
+      IsCorsSafelistedHeader("content-type", "text/plain; param=BOGUS"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("content-type",
                                      "application/x-www-form-urlencoded"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("content-type", "multipart/form-data"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("content-type", "multipart/form-data"));
 
-  EXPECT_TRUE(IsCORSSafelistedHeader("content-type", "Text/plain"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("content-type", "tEXT/PLAIN"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("content-type", "text/html"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("CoNtEnt-TyPE", "text/html"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("content-type", "Text/plain"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("content-type", "tEXT/PLAIN"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("content-type", "text/html"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("CoNtEnt-TyPE", "text/html"));
 
-  EXPECT_FALSE(IsCORSSafelistedHeader("content-type", "image/png"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("CoNtEnt-TyPE", "image/png"));
-  EXPECT_TRUE(IsCORSSafelistedHeader(
+  EXPECT_FALSE(IsCorsSafelistedHeader("content-type", "image/png"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("CoNtEnt-TyPE", "image/png"));
+  EXPECT_TRUE(IsCorsSafelistedHeader(
       "content-type", "text/plain; charset=" + std::string(108, 'a')));
-  EXPECT_TRUE(IsCORSSafelistedHeader(
+  EXPECT_TRUE(IsCorsSafelistedHeader(
       "cONTent-tYPE", "text/plain; charset=" + std::string(108, 'a')));
-  EXPECT_FALSE(IsCORSSafelistedHeader(
+  EXPECT_FALSE(IsCorsSafelistedHeader(
       "content-type", "text/plain; charset=" + std::string(109, 'a')));
-  EXPECT_FALSE(IsCORSSafelistedHeader(
+  EXPECT_FALSE(IsCorsSafelistedHeader(
       "cONTent-tYPE", "text/plain; charset=" + std::string(109, 'a')));
 }
 
-TEST_F(CORSTest, CheckCORSClientHintsSafelist) {
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", ""));
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", "abc"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("device-memory", "1.25"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("DEVICE-memory", "1.25"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", "1.25-2.5"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", "-1.25"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", "1e2"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", "inf"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", "-2.3"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("device-memory", "NaN"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("DEVICE-memory", "1.25.3"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("DEVICE-memory", "1."));
-  EXPECT_FALSE(IsCORSSafelistedHeader("DEVICE-memory", ".1"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("DEVICE-memory", "."));
-  EXPECT_TRUE(IsCORSSafelistedHeader("DEVICE-memory", "1"));
+TEST_F(CorsTest, CheckCorsClientHintsSafelist) {
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", ""));
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", "abc"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("device-memory", "1.25"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("DEVICE-memory", "1.25"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", "1.25-2.5"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", "-1.25"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", "1e2"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", "inf"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", "-2.3"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("device-memory", "NaN"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("DEVICE-memory", "1.25.3"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("DEVICE-memory", "1."));
+  EXPECT_FALSE(IsCorsSafelistedHeader("DEVICE-memory", ".1"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("DEVICE-memory", "."));
+  EXPECT_TRUE(IsCorsSafelistedHeader("DEVICE-memory", "1"));
 
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", ""));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "abc"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("dpr", "1.25"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("Dpr", "1.25"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "1.25-2.5"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "-1.25"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "1e2"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "inf"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "-2.3"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "NaN"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "1.25.3"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "1."));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", ".1"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("dpr", "."));
-  EXPECT_TRUE(IsCORSSafelistedHeader("dpr", "1"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", ""));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "abc"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("dpr", "1.25"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("Dpr", "1.25"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "1.25-2.5"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "-1.25"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "1e2"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "inf"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "-2.3"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "NaN"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "1.25.3"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "1."));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", ".1"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("dpr", "."));
+  EXPECT_TRUE(IsCorsSafelistedHeader("dpr", "1"));
 
-  EXPECT_FALSE(IsCORSSafelistedHeader("width", ""));
-  EXPECT_FALSE(IsCORSSafelistedHeader("width", "abc"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("width", "125"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("width", "1"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("WIDTH", "125"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("width", "125.2"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("width", "-125"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("width", "2147483648"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("width", ""));
+  EXPECT_FALSE(IsCorsSafelistedHeader("width", "abc"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("width", "125"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("width", "1"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("WIDTH", "125"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("width", "125.2"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("width", "-125"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("width", "2147483648"));
 
-  EXPECT_FALSE(IsCORSSafelistedHeader("viewport-width", ""));
-  EXPECT_FALSE(IsCORSSafelistedHeader("viewport-width", "abc"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("viewport-width", "125"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("viewport-width", "1"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("viewport-Width", "125"));
-  EXPECT_FALSE(IsCORSSafelistedHeader("viewport-width", "125.2"));
-  EXPECT_TRUE(IsCORSSafelistedHeader("viewport-width", "2147483648"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("viewport-width", ""));
+  EXPECT_FALSE(IsCorsSafelistedHeader("viewport-width", "abc"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("viewport-width", "125"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("viewport-width", "1"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("viewport-Width", "125"));
+  EXPECT_FALSE(IsCorsSafelistedHeader("viewport-width", "125.2"));
+  EXPECT_TRUE(IsCorsSafelistedHeader("viewport-width", "2147483648"));
 }
 
-TEST_F(CORSTest, CORSUnsafeRequestHeaderNames) {
+TEST_F(CorsTest, CorsUnsafeRequestHeaderNames) {
   // Needed because initializer list is not allowed for a macro argument.
   using List = std::vector<std::string>;
 
   // Empty => Empty
-  EXPECT_EQ(CORSUnsafeRequestHeaderNames({}), List({}));
+  EXPECT_EQ(CorsUnsafeRequestHeaderNames({}), List({}));
 
   // Some headers are safelisted.
-  EXPECT_EQ(CORSUnsafeRequestHeaderNames({{"content-type", "text/plain"},
+  EXPECT_EQ(CorsUnsafeRequestHeaderNames({{"content-type", "text/plain"},
                                           {"dpr", "12345"},
                                           {"aCCept", "en,ja"},
                                           {"accept-charset", "utf-8"},
@@ -596,7 +596,7 @@
 
   // All headers are not safelisted.
   EXPECT_EQ(
-      CORSUnsafeRequestHeaderNames({{"content-type", "text/html"},
+      CorsUnsafeRequestHeaderNames({{"content-type", "text/html"},
                                     {"dpr", "123-45"},
                                     {"aCCept", "en,ja"},
                                     {"accept-charset", "utf-8"},
@@ -606,7 +606,7 @@
 
   // |safelistValueSize| is 1024.
   EXPECT_EQ(
-      CORSUnsafeRequestHeaderNames(
+      CorsUnsafeRequestHeaderNames(
           {{"content-type", "text/plain; charset=" + std::string(108, '1')},
            {"accept", std::string(128, '1')},
            {"accept-language", std::string(128, '1')},
@@ -621,7 +621,7 @@
 
   // |safelistValueSize| is 1025.
   EXPECT_EQ(
-      CORSUnsafeRequestHeaderNames(
+      CorsUnsafeRequestHeaderNames(
           {{"content-type", "text/plain; charset=" + std::string(108, '1')},
            {"accept", std::string(128, '1')},
            {"accept-language", std::string(128, '1')},
@@ -638,7 +638,7 @@
 
   // |safelistValueSize| is 897 because "content-type" is not safelisted.
   EXPECT_EQ(
-      CORSUnsafeRequestHeaderNames(
+      CorsUnsafeRequestHeaderNames(
           {{"content-type", "text/plain; charset=" + std::string(128, '1')},
            {"accept", std::string(128, '1')},
            {"accept-language", std::string(128, '1')},
@@ -652,18 +652,18 @@
       List({"content-type", "hoge"}));
 }
 
-TEST_F(CORSTest, CORSUnsafeNotForbiddenRequestHeaderNames) {
+TEST_F(CorsTest, CorsUnsafeNotForbiddenRequestHeaderNames) {
   // Needed because initializer list is not allowed for a macro argument.
   using List = std::vector<std::string>;
 
   // Empty => Empty
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames({}, false /* is_revalidating */),
+      CorsUnsafeNotForbiddenRequestHeaderNames({}, false /* is_revalidating */),
       List({}));
 
   // "user-agent" is NOT forbidden per spec, but forbidden in Chromium.
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames({{"content-type", "text/plain"},
+      CorsUnsafeNotForbiddenRequestHeaderNames({{"content-type", "text/plain"},
                                                 {"dpr", "12345"},
                                                 {"aCCept", "en,ja"},
                                                 {"accept-charset", "utf-8"},
@@ -673,7 +673,7 @@
       List({"hoge"}));
 
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames({{"content-type", "text/html"},
+      CorsUnsafeNotForbiddenRequestHeaderNames({{"content-type", "text/html"},
                                                 {"dpr", "123-45"},
                                                 {"aCCept", "en,ja"},
                                                 {"accept-charset", "utf-8"},
@@ -683,7 +683,7 @@
 
   // |safelistValueSize| is 1024.
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames(
+      CorsUnsafeNotForbiddenRequestHeaderNames(
           {{"content-type", "text/plain; charset=" + std::string(108, '1')},
            {"accept", std::string(128, '1')},
            {"accept-language", std::string(128, '1')},
@@ -700,7 +700,7 @@
 
   // |safelistValueSize| is 1025.
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames(
+      CorsUnsafeNotForbiddenRequestHeaderNames(
           {{"content-type", "text/plain; charset=" + std::string(108, '1')},
            {"accept", std::string(128, '1')},
            {"accept-language", std::string(128, '1')},
@@ -719,7 +719,7 @@
 
   // |safelistValueSize| is 897 because "content-type" is not safelisted.
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames(
+      CorsUnsafeNotForbiddenRequestHeaderNames(
           {{"content-type", "text/plain; charset=" + std::string(128, '1')},
            {"accept", std::string(128, '1')},
            {"accept-language", std::string(128, '1')},
@@ -735,18 +735,18 @@
       List({"content-type", "hoge"}));
 }
 
-TEST_F(CORSTest, CORSUnsafeNotForbiddenRequestHeaderNamesWithRevalidating) {
+TEST_F(CorsTest, CorsUnsafeNotForbiddenRequestHeaderNamesWithRevalidating) {
   // Needed because initializer list is not allowed for a macro argument.
   using List = std::vector<std::string>;
 
   // Empty => Empty
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames({}, true /* is_revalidating */),
+      CorsUnsafeNotForbiddenRequestHeaderNames({}, true /* is_revalidating */),
       List({}));
 
   // These three headers will be ignored.
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames({{"If-MODifIED-since", "x"},
+      CorsUnsafeNotForbiddenRequestHeaderNames({{"If-MODifIED-since", "x"},
                                                 {"iF-nONE-MATCh", "y"},
                                                 {"CACHE-ContrOl", "z"}},
                                                true /* is_revalidating */),
@@ -754,7 +754,7 @@
 
   // Without is_revalidating set, these three headers will not be safelisted.
   EXPECT_EQ(
-      CORSUnsafeNotForbiddenRequestHeaderNames({{"If-MODifIED-since", "x"},
+      CorsUnsafeNotForbiddenRequestHeaderNames({{"If-MODifIED-since", "x"},
                                                 {"iF-nONE-MATCh", "y"},
                                                 {"CACHE-ContrOl", "z"}},
                                                false /* is_revalidating */),
diff --git a/services/network/public/cpp/cors/origin_access_entry.cc b/services/network/public/cpp/cors/origin_access_entry.cc
index 26361e4..431d6ed7 100644
--- a/services/network/public/cpp/cors/origin_access_entry.cc
+++ b/services/network/public/cpp/cors/origin_access_entry.cc
@@ -34,7 +34,7 @@
     const std::string& protocol,
     const std::string& host,
     MatchMode match_mode,
-    const network::mojom::CORSOriginAccessMatchPriority priority)
+    const network::mojom::CorsOriginAccessMatchPriority priority)
     : protocol_(protocol),
       host_(host),
       match_mode_(match_mode),
diff --git a/services/network/public/cpp/cors/origin_access_entry.h b/services/network/public/cpp/cors/origin_access_entry.h
index 5052f1a..0cc1365 100644
--- a/services/network/public/cpp/cors/origin_access_entry.h
+++ b/services/network/public/cpp/cors/origin_access_entry.h
@@ -53,8 +53,8 @@
       const std::string& protocol,
       const std::string& host,
       MatchMode match_mode,
-      const network::mojom::CORSOriginAccessMatchPriority priority =
-          network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      const network::mojom::CorsOriginAccessMatchPriority priority =
+          network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   OriginAccessEntry(OriginAccessEntry&& from);
 
   // 'matchesOrigin' requires a protocol match (e.g. 'http' != 'https').
@@ -63,7 +63,7 @@
   MatchResult MatchesDomain(const url::Origin& domain) const;
 
   bool host_is_ip_address() const { return host_is_ip_address_; }
-  network::mojom::CORSOriginAccessMatchPriority priority() const {
+  network::mojom::CorsOriginAccessMatchPriority priority() const {
     return priority_;
   }
   const std::string& registerable_domain() const {
@@ -74,7 +74,7 @@
   const std::string protocol_;
   const std::string host_;
   const MatchMode match_mode_;
-  network::mojom::CORSOriginAccessMatchPriority priority_;
+  network::mojom::CorsOriginAccessMatchPriority priority_;
   const bool host_is_ip_address_;
 
   std::string registerable_domain_;
diff --git a/services/network/public/cpp/cors/origin_access_entry_unittest.cc b/services/network/public/cpp/cors/origin_access_entry_unittest.cc
index a68e978..3621f61 100644
--- a/services/network/public/cpp/cors/origin_access_entry_unittest.cc
+++ b/services/network/public/cpp/cors/origin_access_entry_unittest.cc
@@ -19,13 +19,13 @@
   url::Origin origin = url::Origin::Create(GURL("http://www.google.com"));
   OriginAccessEntry entry1(
       "http", "google.com", OriginAccessEntry::kAllowSubdomains,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   OriginAccessEntry entry2(
       "http", "hamster.com", OriginAccessEntry::kAllowSubdomains,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   OriginAccessEntry entry3(
       "http", "com", OriginAccessEntry::kAllowSubdomains,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   EXPECT_EQ(OriginAccessEntry::kMatchesOrigin, entry1.MatchesOrigin(origin));
   EXPECT_EQ(OriginAccessEntry::kDoesNotMatchOrigin,
             entry2.MatchesOrigin(origin));
@@ -93,7 +93,7 @@
     url::Origin origin_to_test = url::Origin::Create(GURL(test.origin));
     OriginAccessEntry entry1(
         test.protocol, test.host, OriginAccessEntry::kAllowSubdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
     EXPECT_EQ(test.expected_origin, entry1.MatchesOrigin(origin_to_test));
     EXPECT_EQ(test.expected_domain, entry1.MatchesDomain(origin_to_test));
   }
@@ -142,7 +142,7 @@
     url::Origin origin_to_test = url::Origin::Create(GURL(test.origin));
     OriginAccessEntry entry1(
         test.protocol, test.host, OriginAccessEntry::kAllowRegisterableDomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
     SCOPED_TRACE(testing::Message()
                  << "Host: " << test.host << ", Origin: " << test.origin
@@ -195,7 +195,7 @@
     url::Origin origin_to_test = url::Origin::Create(GURL(test.origin));
     OriginAccessEntry entry1(
         test.protocol, test.host, OriginAccessEntry::kAllowRegisterableDomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
     SCOPED_TRACE(testing::Message()
                  << "Host: " << test.host << ", Origin: " << test.origin
@@ -245,7 +245,7 @@
     url::Origin origin_to_test = url::Origin::Create(GURL(test.origin));
     OriginAccessEntry entry1(
         test.protocol, test.host, OriginAccessEntry::kDisallowSubdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
     EXPECT_EQ(test.expected, entry1.MatchesOrigin(origin_to_test));
   }
 }
@@ -271,7 +271,7 @@
     SCOPED_TRACE(testing::Message() << "Host: " << test.host);
     OriginAccessEntry entry(
         test.protocol, test.host, OriginAccessEntry::kDisallowSubdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
     EXPECT_EQ(test.is_ip_address, entry.host_is_ip_address()) << test.host;
   }
 }
@@ -299,12 +299,12 @@
     url::Origin origin_to_test = url::Origin::Create(GURL(test.origin));
     OriginAccessEntry entry1(
         test.protocol, test.host, OriginAccessEntry::kAllowSubdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
     EXPECT_EQ(test.expected, entry1.MatchesOrigin(origin_to_test));
 
     OriginAccessEntry entry2(
         test.protocol, test.host, OriginAccessEntry::kDisallowSubdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
     EXPECT_EQ(test.expected, entry2.MatchesOrigin(origin_to_test));
   }
 }
diff --git a/services/network/public/cpp/cors/origin_access_list.cc b/services/network/public/cpp/cors/origin_access_list.cc
index 61ff535..1ab91ff 100644
--- a/services/network/public/cpp/cors/origin_access_list.cc
+++ b/services/network/public/cpp/cors/origin_access_list.cc
@@ -49,17 +49,17 @@
     return false;
   std::string source = source_origin.Serialize();
   url::Origin destination_origin = url::Origin::Create(destination);
-  network::mojom::CORSOriginAccessMatchPriority allow_list_priority =
+  network::mojom::CorsOriginAccessMatchPriority allow_list_priority =
       GetHighestPriorityOfRuleForOrigin(source, destination_origin,
                                         allow_list_);
   if (allow_list_priority ==
-      network::mojom::CORSOriginAccessMatchPriority::kNoMatchingOrigin)
+      network::mojom::CorsOriginAccessMatchPriority::kNoMatchingOrigin)
     return false;
-  network::mojom::CORSOriginAccessMatchPriority block_list_priority =
+  network::mojom::CorsOriginAccessMatchPriority block_list_priority =
       GetHighestPriorityOfRuleForOrigin(source, destination_origin,
                                         block_list_);
   if (block_list_priority ==
-      network::mojom::CORSOriginAccessMatchPriority::kNoMatchingOrigin)
+      network::mojom::CorsOriginAccessMatchPriority::kNoMatchingOrigin)
     return true;
   return allow_list_priority > block_list_priority;
 }
@@ -105,13 +105,13 @@
 // static
 // TODO(nrpeter): Sort OriginAccessEntry entries on edit then we can return the
 // first match which will be the top priority.
-network::mojom::CORSOriginAccessMatchPriority
+network::mojom::CorsOriginAccessMatchPriority
 OriginAccessList::GetHighestPriorityOfRuleForOrigin(
     const std::string& source,
     const url::Origin& destination_origin,
     const PatternMap& map) {
-  network::mojom::CORSOriginAccessMatchPriority highest_priority =
-      network::mojom::CORSOriginAccessMatchPriority::kNoMatchingOrigin;
+  network::mojom::CorsOriginAccessMatchPriority highest_priority =
+      network::mojom::CorsOriginAccessMatchPriority::kNoMatchingOrigin;
   auto patterns_for_origin_it = map.find(source);
   if (patterns_for_origin_it == map.end())
     return highest_priority;
diff --git a/services/network/public/cpp/cors/origin_access_list.h b/services/network/public/cpp/cors/origin_access_list.h
index 35a7d50..dac77504 100644
--- a/services/network/public/cpp/cors/origin_access_list.h
+++ b/services/network/public/cpp/cors/origin_access_list.h
@@ -70,7 +70,7 @@
   static void AddForOrigin(const url::Origin& source_origin,
                            const mojom::CorsOriginPatternPtr& pattern,
                            PatternMap* map);
-  static network::mojom::CORSOriginAccessMatchPriority
+  static network::mojom::CorsOriginAccessMatchPriority
   GetHighestPriorityOfRuleForOrigin(const std::string& source,
                                     const url::Origin& destination_origin,
                                     const PatternMap& map);
diff --git a/services/network/public/cpp/cors/origin_access_list_unittest.cc b/services/network/public/cpp/cors/origin_access_list_unittest.cc
index d8a00800..16dcfaa 100644
--- a/services/network/public/cpp/cors/origin_access_list_unittest.cc
+++ b/services/network/public/cpp/cors/origin_access_list_unittest.cc
@@ -53,14 +53,14 @@
     std::vector<mojom::CorsOriginPatternPtr> patterns;
     patterns.push_back(mojom::CorsOriginPattern::New(
         protocol, host, allow_subdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority));
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority));
     list_.SetAllowListForOrigin(source_origin_, patterns);
   }
   void AddAllowListEntry(
       const std::string& protocol,
       const std::string& host,
       bool allow_subdomains,
-      const network::mojom::CORSOriginAccessMatchPriority priority) {
+      const network::mojom::CorsOriginAccessMatchPriority priority) {
     list_.AddAllowListEntryForOrigin(
         source_origin_, network::mojom::CorsOriginPattern::New(
                             protocol, host, allow_subdomains, priority));
@@ -71,14 +71,14 @@
     std::vector<mojom::CorsOriginPatternPtr> patterns;
     patterns.push_back(mojom::CorsOriginPattern::New(
         protocol, host, allow_subdomains,
-        network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority));
+        network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority));
     list_.SetBlockListForOrigin(source_origin_, patterns);
   }
   void AddBlockListEntry(
       const std::string& protocol,
       const std::string& host,
       bool allow_subdomains,
-      const network::mojom::CORSOriginAccessMatchPriority priority) {
+      const network::mojom::CorsOriginAccessMatchPriority priority) {
     list_.AddBlockListEntryForOrigin(
         source_origin_, network::mojom::CorsOriginPattern::New(
                             protocol, host, allow_subdomains, priority));
@@ -125,7 +125,7 @@
   // subdomains.
   AddAllowListEntry(
       "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   EXPECT_TRUE(IsAllowed(https_example_origin()));
   EXPECT_TRUE(IsAllowed(https_sub_example_origin()));
   EXPECT_FALSE(IsAllowed(http_example_origin()));
@@ -152,7 +152,7 @@
   SetAllowListEntry("https", "", true);
   AddBlockListEntry(
       "https", "google.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
   EXPECT_TRUE(IsAllowed(https_example_origin()));
   EXPECT_FALSE(IsAllowed(https_google_origin()));
@@ -166,14 +166,14 @@
   // Higher priority blocklist overrides lower priority allowlist.
   AddBlockListEntry(
       "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
   EXPECT_FALSE(IsAllowed(https_example_origin()));
   EXPECT_FALSE(IsAllowed(https_sub_example_origin()));
 
   // Higher priority allowlist overrides lower priority blocklist.
   AddAllowListEntry(
       "https", "example.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
   EXPECT_TRUE(IsAllowed(https_example_origin()));
   EXPECT_FALSE(IsAllowed(https_sub_example_origin()));
 }
@@ -181,19 +181,19 @@
 TEST_F(OriginAccessListTest, IsPriorityRespectedReverse) {
   AddAllowListEntry(
       "https", "example.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
   EXPECT_TRUE(IsAllowed(https_example_origin()));
   EXPECT_FALSE(IsAllowed(https_sub_example_origin()));
 
   AddBlockListEntry(
       "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
   EXPECT_TRUE(IsAllowed(https_example_origin()));
   EXPECT_FALSE(IsAllowed(https_sub_example_origin()));
 
   AddAllowListEntry(
       "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   EXPECT_TRUE(IsAllowed(https_example_origin()));
   EXPECT_FALSE(IsAllowed(https_sub_example_origin()));
 }
diff --git a/services/network/public/cpp/cors/preflight_result.cc b/services/network/public/cpp/cors/preflight_result.cc
index a26a8b7..c07e0fab 100644
--- a/services/network/public/cpp/cors/preflight_result.cc
+++ b/services/network/public/cpp/cors/preflight_result.cc
@@ -93,10 +93,10 @@
     const base::Optional<std::string>& allow_methods_header,
     const base::Optional<std::string>& allow_headers_header,
     const base::Optional<std::string>& max_age_header,
-    base::Optional<mojom::CORSError>* detected_error) {
+    base::Optional<mojom::CorsError>* detected_error) {
   std::unique_ptr<PreflightResult> result =
       base::WrapUnique(new PreflightResult(credentials_mode));
-  base::Optional<mojom::CORSError> error =
+  base::Optional<mojom::CorsError> error =
       result->Parse(allow_methods_header, allow_headers_header, max_age_header);
   if (error) {
     if (detected_error)
@@ -112,25 +112,25 @@
 
 PreflightResult::~PreflightResult() = default;
 
-base::Optional<CORSErrorStatus> PreflightResult::EnsureAllowedCrossOriginMethod(
+base::Optional<CorsErrorStatus> PreflightResult::EnsureAllowedCrossOriginMethod(
     const std::string& method) const {
   // Request method is normalized to upper case, and comparison is performed in
   // case-sensitive way, that means access control header should provide an
   // upper case method list.
   const std::string normalized_method = base::ToUpperASCII(method);
   if (methods_.find(normalized_method) != methods_.end() ||
-      IsCORSSafelistedMethod(normalized_method)) {
+      IsCorsSafelistedMethod(normalized_method)) {
     return base::nullopt;
   }
 
   if (!credentials_ && methods_.find("*") != methods_.end())
     return base::nullopt;
 
-  return CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+  return CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                          method);
 }
 
-base::Optional<CORSErrorStatus>
+base::Optional<CorsErrorStatus>
 PreflightResult::EnsureAllowedCrossOriginHeaders(
     const net::HttpRequestHeaders& headers,
     bool is_revalidating) const {
@@ -140,14 +140,14 @@
   // Forbidden headers are forbidden to be used by JavaScript, and checked
   // beforehand. But user-agents may add these headers internally, and it's
   // fine.
-  for (const auto& name : CORSUnsafeNotForbiddenRequestHeaderNames(
+  for (const auto& name : CorsUnsafeNotForbiddenRequestHeaderNames(
            headers.GetHeaderVector(), is_revalidating)) {
     // Header list check is performed in case-insensitive way. Here, we have a
     // parsed header list set in lower case, and search each header in lower
     // case.
     if (headers_.find(name) == headers_.end()) {
-      return CORSErrorStatus(
-          mojom::CORSError::kHeaderDisallowedByPreflightResponse, name);
+      return CorsErrorStatus(
+          mojom::CorsError::kHeaderDisallowedByPreflightResponse, name);
     }
   }
   return base::nullopt;
@@ -175,7 +175,7 @@
   return true;
 }
 
-base::Optional<mojom::CORSError> PreflightResult::Parse(
+base::Optional<mojom::CorsError> PreflightResult::Parse(
     const base::Optional<std::string>& allow_methods_header,
     const base::Optional<std::string>& allow_headers_header,
     const base::Optional<std::string>& max_age_header) {
@@ -184,11 +184,11 @@
 
   // Keeps parsed method case for case-sensitive search.
   if (!ParseAccessControlAllowList(allow_methods_header, &methods_, false))
-    return mojom::CORSError::kInvalidAllowMethodsPreflightResponse;
+    return mojom::CorsError::kInvalidAllowMethodsPreflightResponse;
 
   // Holds parsed headers in lower case for case-insensitive search.
   if (!ParseAccessControlAllowList(allow_headers_header, &headers_, true))
-    return mojom::CORSError::kInvalidAllowHeadersPreflightResponse;
+    return mojom::CorsError::kInvalidAllowHeadersPreflightResponse;
 
   base::TimeDelta expiry_delta;
   if (max_age_header) {
diff --git a/services/network/public/cpp/cors/preflight_result.h b/services/network/public/cpp/cors/preflight_result.h
index 0df888a8..53c8663 100644
--- a/services/network/public/cpp/cors/preflight_result.h
+++ b/services/network/public/cpp/cors/preflight_result.h
@@ -42,11 +42,11 @@
       const base::Optional<std::string>& allow_methods_header,
       const base::Optional<std::string>& allow_headers_header,
       const base::Optional<std::string>& max_age_header,
-      base::Optional<mojom::CORSError>* detected_error);
+      base::Optional<mojom::CorsError>* detected_error);
   ~PreflightResult();
 
   // Checks if the given |method| is allowed by the CORS-preflight response.
-  base::Optional<CORSErrorStatus> EnsureAllowedCrossOriginMethod(
+  base::Optional<CorsErrorStatus> EnsureAllowedCrossOriginMethod(
       const std::string& method) const;
 
   // Checks if the given all |headers| are allowed by the CORS-preflight
@@ -55,7 +55,7 @@
   // (https://fetch.spec.whatwg.org/#forbidden-header-name) because they may be
   // added by the user agent. They must be checked separately and rejected for
   // JavaScript-initiated requests.
-  base::Optional<CORSErrorStatus> EnsureAllowedCrossOriginHeaders(
+  base::Optional<CorsErrorStatus> EnsureAllowedCrossOriginHeaders(
       const net::HttpRequestHeaders& headers,
       bool is_revalidating) const;
 
@@ -74,7 +74,7 @@
  protected:
   explicit PreflightResult(const mojom::FetchCredentialsMode credentials_mode);
 
-  base::Optional<mojom::CORSError> Parse(
+  base::Optional<mojom::CorsError> Parse(
       const base::Optional<std::string>& allow_methods_header,
       const base::Optional<std::string>& allow_headers_header,
       const base::Optional<std::string>& max_age_header);
diff --git a/services/network/public/cpp/cors/preflight_result_unittest.cc b/services/network/public/cpp/cors/preflight_result_unittest.cc
index d1a709c..61bf6037 100644
--- a/services/network/public/cpp/cors/preflight_result_unittest.cc
+++ b/services/network/public/cpp/cors/preflight_result_unittest.cc
@@ -26,7 +26,7 @@
   const std::string request_headers;
   const mojom::FetchCredentialsMode request_credentials_mode;
 
-  const base::Optional<CORSErrorStatus> expected_result;
+  const base::Optional<CorsErrorStatus> expected_result;
 };
 
 const TestCase method_cases[] = {
@@ -67,23 +67,23 @@
     // Not found in the preflight response and the safe lit.
     {"", "", mojom::FetchCredentialsMode::kOmit, "OPTIONS", "",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                      "OPTIONS")},
     {"", "", mojom::FetchCredentialsMode::kOmit, "PUT", "",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                      "PUT")},
     {"", "", mojom::FetchCredentialsMode::kOmit, "DELETE", "",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                      "DELETE")},
     {"GET", "", mojom::FetchCredentialsMode::kOmit, "PUT", "",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                      "PUT")},
     {"GET, POST, DELETE", "", mojom::FetchCredentialsMode::kOmit, "PUT", "",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                      "PUT")},
 
     // Request method is normalized to upper-case, but allowed methods is not.
@@ -91,11 +91,11 @@
     // upper case.
     {"put", "", mojom::FetchCredentialsMode::kOmit, "PUT", "",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                      "PUT")},
     {"put", "", mojom::FetchCredentialsMode::kOmit, "put", "",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kMethodDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kMethodDisallowedByPreflightResponse,
                      "put")},
     {"PUT", "", mojom::FetchCredentialsMode::kOmit, "put", "",
      mojom::FetchCredentialsMode::kOmit, base::nullopt},
@@ -124,7 +124,7 @@
      mojom::FetchCredentialsMode::kOmit, base::nullopt},
     {"GET", "*", mojom::FetchCredentialsMode::kInclude, "GET", "xyzzy:t",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kHeaderDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kHeaderDisallowedByPreflightResponse,
                      "xyzzy")},
 
     // Forbidden headers can pass.
@@ -134,15 +134,15 @@
     // Not found in the preflight response and the safe list.
     {"GET", "", mojom::FetchCredentialsMode::kOmit, "GET", "X-MY-HEADER:t",
      mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kHeaderDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kHeaderDisallowedByPreflightResponse,
                      "x-my-header")},
     {"GET", "X-SOME-OTHER-HEADER", mojom::FetchCredentialsMode::kOmit, "GET",
      "X-MY-HEADER:t", mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kHeaderDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kHeaderDisallowedByPreflightResponse,
                      "x-my-header")},
     {"GET", "X-MY-HEADER", mojom::FetchCredentialsMode::kOmit, "GET",
      "X-MY-HEADER:t\r\nY-MY-HEADER:t", mojom::FetchCredentialsMode::kOmit,
-     CORSErrorStatus(mojom::CORSError::kHeaderDisallowedByPreflightResponse,
+     CorsErrorStatus(mojom::CorsError::kHeaderDisallowedByPreflightResponse,
                      "y-my-header")},
 };
 
diff --git a/services/network/public/cpp/cors_error_status.typemap b/services/network/public/cpp/cors_error_status.typemap
index 89e83ff..f7b4575 100644
--- a/services/network/public/cpp/cors_error_status.typemap
+++ b/services/network/public/cpp/cors_error_status.typemap
@@ -11,4 +11,4 @@
 public_deps = [
   "//services/network/public/cpp:cpp_base",
 ]
-type_mappings = [ "network.mojom.CORSErrorStatus=network::CORSErrorStatus" ]
+type_mappings = [ "network.mojom.CorsErrorStatus=network::CorsErrorStatus" ]
diff --git a/services/network/public/cpp/features.cc b/services/network/public/cpp/features.cc
index 6230a08..de0469f 100644
--- a/services/network/public/cpp/features.cc
+++ b/services/network/public/cpp/features.cc
@@ -19,7 +19,7 @@
                                     base::FEATURE_DISABLED_BY_DEFAULT};
 
 // Out of Blink CORS
-const base::Feature kOutOfBlinkCORS{"OutOfBlinkCORS",
+const base::Feature kOutOfBlinkCors{"OutOfBlinkCORS",
                                     base::FEATURE_DISABLED_BY_DEFAULT};
 
 const base::Feature kReporting{"Reporting", base::FEATURE_ENABLED_BY_DEFAULT};
diff --git a/services/network/public/cpp/features.h b/services/network/public/cpp/features.h
index 61594f17..c76bc52 100644
--- a/services/network/public/cpp/features.h
+++ b/services/network/public/cpp/features.h
@@ -18,7 +18,7 @@
 COMPONENT_EXPORT(NETWORK_CPP)
 extern const base::Feature kNetworkService;
 COMPONENT_EXPORT(NETWORK_CPP)
-extern const base::Feature kOutOfBlinkCORS;
+extern const base::Feature kOutOfBlinkCors;
 COMPONENT_EXPORT(NETWORK_CPP)
 extern const base::Feature kReporting;
 COMPONENT_EXPORT(NETWORK_CPP)
diff --git a/services/network/public/cpp/network_ipc_param_traits.h b/services/network/public/cpp/network_ipc_param_traits.h
index 30571ad..88fc901 100644
--- a/services/network/public/cpp/network_ipc_param_traits.h
+++ b/services/network/public/cpp/network_ipc_param_traits.h
@@ -89,8 +89,8 @@
 
 #endif  // INTERNAL_SERVICES_NETWORK_PUBLIC_CPP_NETWORK_IPC_PARAM_TRAITS_H_
 
-IPC_ENUM_TRAITS_MAX_VALUE(network::mojom::CORSError,
-                          network::mojom::CORSError::kMaxValue)
+IPC_ENUM_TRAITS_MAX_VALUE(network::mojom::CorsError,
+                          network::mojom::CorsError::kMaxValue)
 
 IPC_ENUM_TRAITS_MAX_VALUE(network::mojom::FetchCredentialsMode,
                           network::mojom::FetchCredentialsMode::kMaxValue)
@@ -104,10 +104,10 @@
 IPC_ENUM_TRAITS_MAX_VALUE(network::mojom::RequestContextFrameType,
                           network::mojom::RequestContextFrameType::kMaxValue)
 
-IPC_ENUM_TRAITS_MAX_VALUE(network::mojom::CORSPreflightPolicy,
-                          network::mojom::CORSPreflightPolicy::kMaxValue)
+IPC_ENUM_TRAITS_MAX_VALUE(network::mojom::CorsPreflightPolicy,
+                          network::mojom::CorsPreflightPolicy::kMaxValue)
 
-IPC_STRUCT_TRAITS_BEGIN(network::CORSErrorStatus)
+IPC_STRUCT_TRAITS_BEGIN(network::CorsErrorStatus)
   IPC_STRUCT_TRAITS_MEMBER(cors_error)
   IPC_STRUCT_TRAITS_MEMBER(failed_parameter)
 IPC_STRUCT_TRAITS_END()
diff --git a/services/network/public/cpp/resource_request.h b/services/network/public/cpp/resource_request.h
index 36b14d3..831be44 100644
--- a/services/network/public/cpp/resource_request.h
+++ b/services/network/public/cpp/resource_request.h
@@ -116,8 +116,8 @@
   bool is_external_request = false;
 
   // A policy to decide if CORS-preflight fetch should be performed.
-  mojom::CORSPreflightPolicy cors_preflight_policy =
-      mojom::CORSPreflightPolicy::kConsiderPreflight;
+  mojom::CorsPreflightPolicy cors_preflight_policy =
+      mojom::CorsPreflightPolicy::kConsiderPreflight;
 
   // Indicates which frame (or worker context) the request is being loaded into.
   // -1 corresponds to kInvalidServiceWorkerProviderId.
@@ -138,9 +138,9 @@
   // https://fetch.spec.whatwg.org/#concept-request-mode
   // Used mainly by CORS handling (out-of-blink CORS), CORB, Service Worker.
   // CORS handling needs a proper origin (including a unique opaque origin).
-  // Hence a request with kSameOrigin, kCORS, or kCORSWithForcedPreflight should
+  // Hence a request with kSameOrigin, kCors, or kCorsWithForcedPreflight should
   // have a non-null request_initiator.
-  mojom::FetchRequestMode fetch_request_mode = mojom::FetchRequestMode::kNoCORS;
+  mojom::FetchRequestMode fetch_request_mode = mojom::FetchRequestMode::kNoCors;
 
   // https://fetch.spec.whatwg.org/#concept-request-credentials-mode
   // Used mainly by CORS handling (out-of-blink CORS), Service Worker.
@@ -151,7 +151,7 @@
 
   // https://fetch.spec.whatwg.org/#concept-request-redirect-mode
   // Used mainly by CORS handling (out-of-blink CORS), Service Worker.
-  // This member must be kFollow as long as |fetch_request_mode| is kNoCORS.
+  // This member must be kFollow as long as |fetch_request_mode| is kNoCors.
   mojom::FetchRedirectMode fetch_redirect_mode =
       mojom::FetchRedirectMode::kFollow;
 
diff --git a/services/network/public/cpp/url_loader_completion_status.cc b/services/network/public/cpp/url_loader_completion_status.cc
index 4a6d60d..7cfe6e1af 100644
--- a/services/network/public/cpp/url_loader_completion_status.cc
+++ b/services/network/public/cpp/url_loader_completion_status.cc
@@ -16,7 +16,7 @@
     : error_code(error_code), completion_time(base::TimeTicks::Now()) {}
 
 URLLoaderCompletionStatus::URLLoaderCompletionStatus(
-    const CORSErrorStatus& error)
+    const CorsErrorStatus& error)
     : URLLoaderCompletionStatus(net::ERR_FAILED) {
   cors_error_status = error;
 }
diff --git a/services/network/public/cpp/url_loader_completion_status.h b/services/network/public/cpp/url_loader_completion_status.h
index 6e243cb..6ca5b23 100644
--- a/services/network/public/cpp/url_loader_completion_status.h
+++ b/services/network/public/cpp/url_loader_completion_status.h
@@ -31,7 +31,7 @@
 
   // Sets ERR_FAILED to |error_code|, |error| to |cors_error_status|, and
   // base::TimeTicks::Now() to |completion_time|.
-  explicit URLLoaderCompletionStatus(const CORSErrorStatus& error);
+  explicit URLLoaderCompletionStatus(const CorsErrorStatus& error);
 
   ~URLLoaderCompletionStatus();
 
@@ -62,7 +62,7 @@
   int64_t decoded_body_length = 0;
 
   // Optional CORS error details.
-  base::Optional<CORSErrorStatus> cors_error_status;
+  base::Optional<CorsErrorStatus> cors_error_status;
 
   // Optional SSL certificate info.
   base::Optional<net::SSLInfo> ssl_info;
diff --git a/services/network/public/mojom/cors.mojom b/services/network/public/mojom/cors.mojom
index 5199351..2f14aa6 100644
--- a/services/network/public/mojom/cors.mojom
+++ b/services/network/public/mojom/cors.mojom
@@ -4,16 +4,14 @@
 
 module network.mojom;
 
-// TODO(crbug.com/875759): Rename to Cors* rather than CORS*.
-
 // A policy to decide if CORS-preflight fetch should be performed.
-enum CORSPreflightPolicy {
+enum CorsPreflightPolicy {
   kConsiderPreflight,
   kPreventPreflight,
 };
 
 // Error conditions of the CORS check.
-enum CORSError {
+enum CorsError {
   // Access control
   kDisallowedByMode,
   kInvalidResponse,
@@ -40,7 +38,7 @@
   kInvalidAllowCredentials,
 
   // The scheme is not for CORS.
-  kCORSDisabledScheme,
+  kCorsDisabledScheme,
 
   // Preflight:
   // Failed to check HTTP response ok status in a CORS-preflight response.
@@ -97,7 +95,7 @@
 };
 
 // Determine which Cors exception takes precedence when multiple matches occur.
-enum CORSOriginAccessMatchPriority {
+enum CorsOriginAccessMatchPriority {
   kNoMatchingOrigin,
   kDefaultPriority,
   kLowPriority,
diff --git a/services/network/public/mojom/cors_origin_pattern.mojom b/services/network/public/mojom/cors_origin_pattern.mojom
index a00e97cff..b79637b1 100644
--- a/services/network/public/mojom/cors_origin_pattern.mojom
+++ b/services/network/public/mojom/cors_origin_pattern.mojom
@@ -21,5 +21,5 @@
   // patterns take precedence over lower ones.  In the case were both a
   // allow list and block list rule of the same priority match a request,
   // the block list rule takes priority.
-  CORSOriginAccessMatchPriority priority;
+  CorsOriginAccessMatchPriority priority;
 };
diff --git a/services/network/public/mojom/fetch_api.mojom b/services/network/public/mojom/fetch_api.mojom
index 2cb441f..5daf7d05 100644
--- a/services/network/public/mojom/fetch_api.mojom
+++ b/services/network/public/mojom/fetch_api.mojom
@@ -11,9 +11,9 @@
 // See the "FetchRequestMode" enum in enums.xml.
 enum FetchRequestMode {
   kSameOrigin,
-  kNoCORS,
-  kCORS,
-  kCORSWithForcedPreflight,
+  kNoCors,
+  kCors,
+  kCorsWithForcedPreflight,
   kNavigate,
   // Add a new type here, then update enums.xml.
 };
@@ -41,7 +41,7 @@
 // See the "FetchResponseType" enum in enums.xml.
 enum FetchResponseType {
   kBasic,
-  kCORS,
+  kCors,
   kDefault,
   kError,
   kOpaque,
diff --git a/services/network/public/mojom/network_context.mojom b/services/network/public/mojom/network_context.mojom
index f5dc542b..339fed5 100644
--- a/services/network/public/mojom/network_context.mojom
+++ b/services/network/public/mojom/network_context.mojom
@@ -340,7 +340,7 @@
   int32 corb_detachable_resource_type = -1;
   // TODO(lukasza): https://crbug.com/846339: Remove the field below and instead
   // make plugins use a separate URLoaderFactory. Note requests of this type are
-  // only excluded if ResourceRequest::fetch_request_mode is kNoCORS. The field
+  // only excluded if ResourceRequest::fetch_request_mode is kNoCors. The field
   // below in practice is always set to RESOURCE_TYPE_PLUGIN_RESOURCE by the
   //  content layer, but in the long-term we want to avoid using resource types
   // (even as an opaque int) in //services/network.  See also the TODO comment
diff --git a/services/network/public/mojom/url_loader.mojom b/services/network/public/mojom/url_loader.mojom
index c17e5bdd5..c78759eb 100644
--- a/services/network/public/mojom/url_loader.mojom
+++ b/services/network/public/mojom/url_loader.mojom
@@ -17,7 +17,7 @@
 struct URLRequestRedirectInfo;
 
 [Native]
-struct CORSErrorStatus;
+struct CorsErrorStatus;
 
 [Native]
 struct URLLoaderCompletionStatus;
diff --git a/services/network/url_loader.cc b/services/network/url_loader.cc
index 4047cf2d..1b266fb 100644
--- a/services/network/url_loader.cc
+++ b/services/network/url_loader.cc
@@ -376,7 +376,7 @@
 
   is_nocors_corb_excluded_request_ =
       resource_type_ == factory_params_->corb_excluded_resource_type &&
-      request.fetch_request_mode == mojom::FetchRequestMode::kNoCORS &&
+      request.fetch_request_mode == mojom::FetchRequestMode::kNoCors &&
       CrossOriginReadBlocking::ShouldAllowForPlugin(
           factory_params_->process_id);
 
diff --git a/services/network/url_loader_factory.cc b/services/network/url_loader_factory.cc
index da6f7ef..87eb97b 100644
--- a/services/network/url_loader_factory.cc
+++ b/services/network/url_loader_factory.cc
@@ -31,7 +31,7 @@
     NetworkContext* context,
     mojom::URLLoaderFactoryParamsPtr params,
     scoped_refptr<ResourceSchedulerClient> resource_scheduler_client,
-    cors::CORSURLLoaderFactory* cors_url_loader_factory)
+    cors::CorsURLLoaderFactory* cors_url_loader_factory)
     : context_(context),
       params_(std::move(params)),
       resource_scheduler_client_(std::move(resource_scheduler_client)),
@@ -140,7 +140,7 @@
 
   auto loader = std::make_unique<URLLoader>(
       context_->url_request_context(), network_service_client,
-      base::BindOnce(&cors::CORSURLLoaderFactory::DestroyURLLoader,
+      base::BindOnce(&cors::CorsURLLoaderFactory::DestroyURLLoader,
                      base::Unretained(cors_url_loader_factory_)),
       std::move(request), options, url_request, report_raw_headers,
       std::move(client),
diff --git a/services/network/url_loader_factory.h b/services/network/url_loader_factory.h
index 7031e60..ede3a47 100644
--- a/services/network/url_loader_factory.h
+++ b/services/network/url_loader_factory.h
@@ -21,7 +21,7 @@
 class URLLoader;
 
 namespace cors {
-class CORSURLLoaderFactory;
+class CorsURLLoaderFactory;
 }  // namespace cors
 
 // This class is an implementation of mojom::URLLoaderFactory that
@@ -33,9 +33,9 @@
 // works on each frame.
 // A URLLoaderFactory can be created with null ResourceSchedulerClient, in which
 // case requests constructed by the factory will not be throttled.
-// The CORS related part is implemented in CORSURLLoader[Factory] until
-// kOutOfBlinkCORS and kNetworkService is fully enabled. Note that
-// NetworkContext::CreateURLLoaderFactory returns a CORSURLLoaderFactory,
+// The CORS related part is implemented in CorsURLLoader[Factory] until
+// kOutOfBlinkCors and kNetworkService is fully enabled. Note that
+// NetworkContext::CreateURLLoaderFactory returns a CorsURLLoaderFactory,
 // instead of a URLLoaderFactory.
 class URLLoaderFactory : public mojom::URLLoaderFactory {
  public:
@@ -44,7 +44,7 @@
       NetworkContext* context,
       mojom::URLLoaderFactoryParamsPtr params,
       scoped_refptr<ResourceSchedulerClient> resource_scheduler_client,
-      cors::CORSURLLoaderFactory* cors_url_loader_factory);
+      cors::CorsURLLoaderFactory* cors_url_loader_factory);
 
   ~URLLoaderFactory() override;
 
@@ -70,7 +70,7 @@
   scoped_refptr<ResourceSchedulerClient> resource_scheduler_client_;
 
   // |cors_url_loader_factory_| owns this.
-  cors::CORSURLLoaderFactory* cors_url_loader_factory_;
+  cors::CorsURLLoaderFactory* cors_url_loader_factory_;
 
   DISALLOW_COPY_AND_ASSIGN(URLLoaderFactory);
 };
diff --git a/services/network/url_loader_unittest.cc b/services/network/url_loader_unittest.cc
index 5fd4ee8..42906f4 100644
--- a/services/network/url_loader_unittest.cc
+++ b/services/network/url_loader_unittest.cc
@@ -2510,7 +2510,7 @@
   ResourceRequest request =
       CreateResourceRequest("GET", test_server()->GetURL("/hello.html"));
   request.resource_type = kResourceType;
-  request.fetch_request_mode = mojom::FetchRequestMode::kCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kCors;
   request.request_initiator = url::Origin::Create(GURL("http://foo.com/"));
 
   base::RunLoop delete_run_loop;
@@ -2546,7 +2546,7 @@
   ResourceRequest request =
       CreateResourceRequest("GET", test_server()->GetURL("/hello.html"));
   request.resource_type = kResourceType;
-  request.fetch_request_mode = mojom::FetchRequestMode::kNoCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kNoCors;
   request.request_initiator = url::Origin::Create(GURL("http://foo.com/"));
 
   base::RunLoop delete_run_loop;
@@ -2586,7 +2586,7 @@
   ResourceRequest request =
       CreateResourceRequest("GET", test_server()->GetURL("/hello.html"));
   request.resource_type = kResourceType;
-  request.fetch_request_mode = mojom::FetchRequestMode::kNoCORS;
+  request.fetch_request_mode = mojom::FetchRequestMode::kNoCors;
   request.request_initiator = url::Origin::Create(GURL("http://foo.com/"));
 
   base::RunLoop delete_run_loop;
diff --git a/third_party/blink/public/mojom/service_worker/service_worker_error_type.mojom b/third_party/blink/public/mojom/service_worker/service_worker_error_type.mojom
index d6fb066..9fe0fc9 100644
--- a/third_party/blink/public/mojom/service_worker/service_worker_error_type.mojom
+++ b/third_party/blink/public/mojom/service_worker/service_worker_error_type.mojom
@@ -45,7 +45,7 @@
   // kForeignFetchMismatchedOrigin = 13,  // obsolete
   kRedirectedResponseForNotFollowRequest = 14,
   kDataPipeCreationFailed = 15,
-  kResponseTypeCORSForRequestModeSameOrigin = 16,
+  kResponseTypeCorsForRequestModeSameOrigin = 16,
   kResponseBodyBroken = 17,
   // Add a new type here, then update enums.xml.
 };
diff --git a/third_party/blink/public/platform/modules/fetch/fetch_api_request.mojom b/third_party/blink/public/platform/modules/fetch/fetch_api_request.mojom
index e6a0ab0..66f9453 100644
--- a/third_party/blink/public/platform/modules/fetch/fetch_api_request.mojom
+++ b/third_party/blink/public/platform/modules/fetch/fetch_api_request.mojom
@@ -101,7 +101,7 @@
 };
 
 struct FetchAPIRequest {
-  network.mojom.FetchRequestMode mode = network.mojom.FetchRequestMode.kNoCORS;
+  network.mojom.FetchRequestMode mode = network.mojom.FetchRequestMode.kNoCors;
   bool is_main_resource_load = false;
   RequestContextType request_context_type =
     RequestContextType.UNSPECIFIED;
diff --git a/third_party/blink/public/platform/web_media_player.h b/third_party/blink/public/platform/web_media_player.h
index f515cdaf..f22b491 100644
--- a/third_party/blink/public/platform/web_media_player.h
+++ b/third_party/blink/public/platform/web_media_player.h
@@ -88,10 +88,10 @@
     kPreloadAuto,
   };
 
-  enum CORSMode {
-    kCORSModeUnspecified,
-    kCORSModeAnonymous,
-    kCORSModeUseCredentials,
+  enum CorsMode {
+    kCorsModeUnspecified,
+    kCorsModeAnonymous,
+    kCorsModeUseCredentials,
   };
 
   // Reported to UMA. Do not change existing values.
@@ -147,7 +147,7 @@
 
   virtual ~WebMediaPlayer() = default;
 
-  virtual LoadTiming Load(LoadType, const WebMediaPlayerSource&, CORSMode) = 0;
+  virtual LoadTiming Load(LoadType, const WebMediaPlayerSource&, CorsMode) = 0;
 
   // Playback controls.
   virtual void Play() = 0;
diff --git a/third_party/blink/public/platform/web_runtime_features.h b/third_party/blink/public/platform/web_runtime_features.h
index 047956d..c891a4c 100644
--- a/third_party/blink/public/platform/web_runtime_features.h
+++ b/third_party/blink/public/platform/web_runtime_features.h
@@ -130,7 +130,7 @@
   BLINK_PLATFORM_EXPORT static void EnableOrientationEvent(bool);
   BLINK_PLATFORM_EXPORT static void EnableOverflowIconsForMediaControls(bool);
   BLINK_PLATFORM_EXPORT static void EnableOverlayScrollbars(bool);
-  BLINK_PLATFORM_EXPORT static void EnableOutOfBlinkCORS(bool);
+  BLINK_PLATFORM_EXPORT static void EnableOutOfBlinkCors(bool);
   BLINK_PLATFORM_EXPORT static void EnablePageLifecycle(bool);
   BLINK_PLATFORM_EXPORT static void EnablePagePopup(bool);
   BLINK_PLATFORM_EXPORT static void EnablePassiveDocumentEventListeners(bool);
diff --git a/third_party/blink/public/platform/web_url_error.h b/third_party/blink/public/platform/web_url_error.h
index c2a176e56..43995b5 100644
--- a/third_party/blink/public/platform/web_url_error.h
+++ b/third_party/blink/public/platform/web_url_error.h
@@ -59,7 +59,7 @@
                                     HasCopyInCache,
                                     IsWebSecurityViolation,
                                     const WebURL&);
-  BLINK_PLATFORM_EXPORT WebURLError(const network::CORSErrorStatus&,
+  BLINK_PLATFORM_EXPORT WebURLError(const network::CorsErrorStatus&,
                                     HasCopyInCache,
                                     const WebURL&);
 
@@ -68,7 +68,7 @@
   bool has_copy_in_cache() const { return has_copy_in_cache_; }
   bool is_web_security_violation() const { return is_web_security_violation_; }
   const WebURL& url() const { return url_; }
-  const base::Optional<network::CORSErrorStatus> cors_error_status() const {
+  const base::Optional<network::CorsErrorStatus> cors_error_status() const {
     return cors_error_status_;
   }
 
@@ -91,7 +91,7 @@
   WebURL url_;
 
   // Optional CORS error details.
-  base::Optional<network::CORSErrorStatus> cors_error_status_;
+  base::Optional<network::CorsErrorStatus> cors_error_status_;
 };
 
 }  // namespace blink
diff --git a/third_party/blink/public/platform/web_url_request.h b/third_party/blink/public/platform/web_url_request.h
index 33c3156..76e5bcc5 100644
--- a/third_party/blink/public/platform/web_url_request.h
+++ b/third_party/blink/public/platform/web_url_request.h
@@ -41,7 +41,7 @@
 
 namespace network {
 namespace mojom {
-enum class CORSPreflightPolicy : int32_t;
+enum class CorsPreflightPolicy : int32_t;
 enum class FetchCredentialsMode : int32_t;
 enum class FetchRedirectMode : int32_t;
 enum class FetchRequestMode : int32_t;
@@ -284,8 +284,8 @@
   // https://wicg.github.io/cors-rfc1918/#external-request
   BLINK_PLATFORM_EXPORT bool IsExternalRequest() const;
 
-  BLINK_PLATFORM_EXPORT network::mojom::CORSPreflightPolicy
-  GetCORSPreflightPolicy() const;
+  BLINK_PLATFORM_EXPORT network::mojom::CorsPreflightPolicy
+  GetCorsPreflightPolicy() const;
 
   BLINK_PLATFORM_EXPORT void SetNavigationStartTime(base::TimeTicks);
 
diff --git a/third_party/blink/public/web/web_associated_url_loader_options.h b/third_party/blink/public/web/web_associated_url_loader_options.h
index 120995c..cd727b6 100644
--- a/third_party/blink/public/web/web_associated_url_loader_options.h
+++ b/third_party/blink/public/web/web_associated_url_loader_options.h
@@ -47,8 +47,8 @@
   // When true, omit origin related checks. USE WITH CARE.
   bool grant_universal_access = false;
 
-  network::mojom::CORSPreflightPolicy preflight_policy =
-      network::mojom::CORSPreflightPolicy::kConsiderPreflight;
+  network::mojom::CorsPreflightPolicy preflight_policy =
+      network::mojom::CorsPreflightPolicy::kConsiderPreflight;
 };
 
 }  // namespace blink
diff --git a/third_party/blink/public/web/web_security_policy.h b/third_party/blink/public/web/web_security_policy.h
index 6957a0e..cefd9f4 100644
--- a/third_party/blink/public/web/web_security_policy.h
+++ b/third_party/blink/public/web/web_security_policy.h
@@ -72,20 +72,20 @@
   // In the case where both an allowlist and blocklist rule of the same
   // priority match a request the blocklist rule takes priority.
   // Callers should use
-  // network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority as the
+  // network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority as the
   // default priority unless overriding existing entries is explicitly needed.
   BLINK_EXPORT static void AddOriginAccessAllowListEntry(
       const WebURL& source_origin,
       const WebString& destination_protocol,
       const WebString& destination_host,
       bool allow_destination_subdomains,
-      const network::mojom::CORSOriginAccessMatchPriority priority);
+      const network::mojom::CorsOriginAccessMatchPriority priority);
   BLINK_EXPORT static void AddOriginAccessBlockListEntry(
       const WebURL& source_origin,
       const WebString& destination_protocol,
       const WebString& destination_host,
       bool disallow_destination_subdomains,
-      const network::mojom::CORSOriginAccessMatchPriority priority);
+      const network::mojom::CorsOriginAccessMatchPriority priority);
   BLINK_EXPORT static void ClearOriginAccessListForOrigin(
       const WebURL& source_origin);
   BLINK_EXPORT static void ClearOriginAccessList();
diff --git a/third_party/blink/renderer/core/css/remote_font_face_source.cc b/third_party/blink/renderer/core/css/remote_font_face_source.cc
index 3396422..57798f3 100644
--- a/third_party/blink/renderer/core/css/remote_font_face_source.cc
+++ b/third_party/blink/renderer/core/css/remote_font_face_source.cc
@@ -330,11 +330,11 @@
     int duration = static_cast<int>(CurrentTimeMS() - load_start_time_);
     RecordLoadTimeHistogram(font, duration);
 
-    enum { kCORSFail, kCORSSuccess, kCORSEnumMax };
+    enum { kCorsFail, kCorsSuccess, kCorsEnumMax };
     int cors_value =
-        font->GetResponse().IsCORSSameOrigin() ? kCORSSuccess : kCORSFail;
+        font->GetResponse().IsCorsSameOrigin() ? kCorsSuccess : kCorsFail;
     DEFINE_THREAD_SAFE_STATIC_LOCAL(EnumerationHistogram, cors_histogram,
-                                    ("WebFont.CORSSuccess", kCORSEnumMax));
+                                    ("WebFont.CORSSuccess", kCorsEnumMax));
     cors_histogram.Count(cors_value);
   }
 }
diff --git a/third_party/blink/renderer/core/exported/web_associated_url_loader_impl.cc b/third_party/blink/renderer/core/exported/web_associated_url_loader_impl.cc
index 7797037..190110b5 100644
--- a/third_party/blink/renderer/core/exported/web_associated_url_loader_impl.cc
+++ b/third_party/blink/renderer/core/exported/web_associated_url_loader_impl.cc
@@ -208,9 +208,9 @@
     return;
 
   if (options_.expose_all_response_headers ||
-      (fetch_request_mode_ != network::mojom::FetchRequestMode::kCORS &&
+      (fetch_request_mode_ != network::mojom::FetchRequestMode::kCors &&
        fetch_request_mode_ !=
-           network::mojom::FetchRequestMode::kCORSWithForcedPreflight)) {
+           network::mojom::FetchRequestMode::kCorsWithForcedPreflight)) {
     // Use the original ResourceResponse.
     client_->DidReceiveResponse(WrappedResourceResponse(response));
     return;
@@ -374,7 +374,7 @@
       allow_load = validator.IsSafe();
     }
   }
-  new_request.ToMutableResourceRequest().SetCORSPreflightPolicy(
+  new_request.ToMutableResourceRequest().SetCorsPreflightPolicy(
       options_.preflight_policy);
 
   scoped_refptr<base::SingleThreadTaskRunner> task_runner;
@@ -398,7 +398,7 @@
 
     if (options_.grant_universal_access) {
       const auto mode = new_request.GetFetchRequestMode();
-      DCHECK(mode == network::mojom::FetchRequestMode::kNoCORS ||
+      DCHECK(mode == network::mojom::FetchRequestMode::kNoCors ||
              mode == network::mojom::FetchRequestMode::kNavigate);
       scoped_refptr<SecurityOrigin> origin =
           SecurityOrigin::CreateUniqueOpaque();
diff --git a/third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc b/third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc
index bfe6ebe..1af35bb 100644
--- a/third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc
+++ b/third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc
@@ -215,7 +215,7 @@
 
     KURL url = ToKURL(id);
     WebURLRequest request(url);
-    request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+    request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
     request.SetFetchCredentialsMode(
         network::mojom::FetchCredentialsMode::kOmit);
 
@@ -331,7 +331,7 @@
   KURL url =
       ToKURL("http://www.other.com/CrossOriginWithAccessControlSuccess.html");
   WebURLRequest request(url);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
   request.SetFetchCredentialsMode(network::mojom::FetchCredentialsMode::kOmit);
 
   expected_response_ = WebURLResponse();
@@ -360,7 +360,7 @@
   // credentials can't be sent to a server which returns the header
   // "access-control-allow-origin" with "*" as its value.
   WebURLRequest request(url);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
 
   expected_response_ = WebURLResponse();
   expected_response_.SetMIMEType("text/html");
@@ -389,7 +389,7 @@
   KURL url =
       ToKURL("http://www.other.com/CrossOriginWithAccessControlFailure.html");
   WebURLRequest request(url);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
   request.SetFetchCredentialsMode(network::mojom::FetchCredentialsMode::kOmit);
 
   expected_response_ = WebURLResponse();
@@ -495,7 +495,7 @@
   KURL redirect_url = ToKURL(redirect);
 
   WebURLRequest request(url);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
   request.SetFetchCredentialsMode(network::mojom::FetchCredentialsMode::kOmit);
 
   expected_redirect_response_ = WebURLResponse();
@@ -538,7 +538,7 @@
   KURL redirect_url = ToKURL(redirect);
 
   WebURLRequest request(url);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
   request.SetFetchCredentialsMode(network::mojom::FetchCredentialsMode::kOmit);
   // Add a CORS simple header.
   request.SetHTTPHeaderField("accept", "application/json");
@@ -659,7 +659,7 @@
   KURL url =
       ToKURL("http://www.other.com/CrossOriginHeaderAllowResponseHeaders.html");
   WebURLRequest request(url);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
   request.SetFetchCredentialsMode(network::mojom::FetchCredentialsMode::kOmit);
 
   WebString header_name_string(WebString::FromUTF8("non-whitelisted"));
@@ -690,7 +690,7 @@
 
   WebURLRequest request(url);
   request.SetRequestContext(mojom::RequestContextType::PLUGIN);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kNoCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kNoCors);
   request.SetFetchCredentialsMode(network::mojom::FetchCredentialsMode::kOmit);
 
   expected_response_ = WebURLResponse();
@@ -717,7 +717,7 @@
 
   WebURLRequest request(url);
   request.SetRequestContext(mojom::RequestContextType::PLUGIN);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kNoCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kNoCors);
   request.SetFetchCredentialsMode(network::mojom::FetchCredentialsMode::kOmit);
 
   expected_response_ = WebURLResponse();
diff --git a/third_party/blink/renderer/core/exported/web_security_policy.cc b/third_party/blink/renderer/core/exported/web_security_policy.cc
index e944fe8..732fb8ec 100644
--- a/third_party/blink/renderer/core/exported/web_security_policy.cc
+++ b/third_party/blink/renderer/core/exported/web_security_policy.cc
@@ -71,7 +71,7 @@
     const WebString& destination_protocol,
     const WebString& destination_host,
     bool allow_destination_subdomains,
-    const network::mojom::CORSOriginAccessMatchPriority priority) {
+    const network::mojom::CorsOriginAccessMatchPriority priority) {
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *SecurityOrigin::Create(source_origin), destination_protocol,
       destination_host, allow_destination_subdomains, priority);
@@ -82,7 +82,7 @@
     const WebString& destination_protocol,
     const WebString& destination_host,
     bool allow_destination_subdomains,
-    const network::mojom::CORSOriginAccessMatchPriority priority) {
+    const network::mojom::CorsOriginAccessMatchPriority priority) {
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *SecurityOrigin::Create(source_origin), destination_protocol,
       destination_host, allow_destination_subdomains, priority);
diff --git a/third_party/blink/renderer/core/fetch/fetch_manager.cc b/third_party/blink/renderer/core/fetch/fetch_manager.cc
index c388917..353cc643 100644
--- a/third_party/blink/renderer/core/fetch/fetch_manager.cc
+++ b/third_party/blink/renderer/core/fetch/fetch_manager.cc
@@ -287,7 +287,7 @@
         SubresourceIntegrity::ReportInfo report_info;
         bool check_result = true;
         if (response_type_ != FetchResponseType::kBasic &&
-            response_type_ != FetchResponseType::kCORS &&
+            response_type_ != FetchResponseType::kCors &&
             response_type_ != FetchResponseType::kDefault) {
           report_info.AddConsoleErrorMessage(
               "Subresource Integrity: The resource '" + url_.ElidedString() +
@@ -473,12 +473,12 @@
       // TODO(hiroshige): currently redirects to data URLs in no-cors
       // mode is also rejected by Chromium side.
       switch (fetch_request_data_->Mode()) {
-        case FetchRequestMode::kNoCORS:
+        case FetchRequestMode::kNoCors:
           tainting = FetchRequestData::kOpaqueTainting;
           break;
         case FetchRequestMode::kSameOrigin:
-        case FetchRequestMode::kCORS:
-        case FetchRequestMode::kCORSWithForcedPreflight:
+        case FetchRequestMode::kCors:
+        case FetchRequestMode::kCorsWithForcedPreflight:
         case FetchRequestMode::kNavigate:
           PerformNetworkError("Fetch API cannot load " +
                               fetch_request_data_->Url().GetString() +
@@ -495,12 +495,12 @@
       case FetchRequestMode::kSameOrigin:
         NOTREACHED();
         break;
-      case FetchRequestMode::kNoCORS:
+      case FetchRequestMode::kNoCors:
         tainting = FetchRequestData::kOpaqueTainting;
         break;
-      case FetchRequestMode::kCORS:
-      case FetchRequestMode::kCORSWithForcedPreflight:
-        tainting = FetchRequestData::kCORSTainting;
+      case FetchRequestMode::kCors:
+      case FetchRequestMode::kCorsWithForcedPreflight:
+        tainting = FetchRequestData::kCorsTainting;
         break;
       case FetchRequestMode::kNavigate:
         LOG(FATAL);
@@ -513,8 +513,8 @@
       case FetchResponseType::kDefault:
         tainting = FetchRequestData::kBasicTainting;
         break;
-      case FetchResponseType::kCORS:
-        tainting = FetchRequestData::kCORSTainting;
+      case FetchResponseType::kCors:
+        tainting = FetchRequestData::kCorsTainting;
         break;
       case FetchResponseType::kOpaque:
         tainting = FetchRequestData::kOpaqueTainting;
@@ -580,11 +580,11 @@
       case FetchRequestData::kBasicTainting:
         tainted_response = response_data->CreateBasicFilteredResponse();
         break;
-      case FetchRequestData::kCORSTainting: {
+      case FetchRequestData::kCorsTainting: {
         WebHTTPHeaderSet header_names = cors::ExtractCorsExposedHeaderNamesList(
             fetch_request_data_->Credentials(), response);
         tainted_response =
-            response_data->CreateCORSFilteredResponse(header_names);
+            response_data->CreateCorsFilteredResponse(header_names);
         break;
       }
       case FetchRequestData::kOpaqueTainting:
@@ -709,7 +709,7 @@
   }
 
   // "- |request|'s mode is |no CORS|"
-  if (fetch_request_data_->Mode() == FetchRequestMode::kNoCORS) {
+  if (fetch_request_data_->Mode() == FetchRequestMode::kNoCors) {
     // "If |request|'s redirect mode is not |follow|, then return a network
     // error.
     if (fetch_request_data_->Redirect() != FetchRedirectMode::kFollow) {
@@ -740,7 +740,7 @@
   }
 
   // "Set |request|'s response tainting to |CORS|."
-  fetch_request_data_->SetResponseTainting(FetchRequestData::kCORSTainting);
+  fetch_request_data_->SetResponseTainting(FetchRequestData::kCorsTainting);
 
   // "The result of performing an HTTP fetch using |request| with the
   // |CORS flag| set."
@@ -815,9 +815,9 @@
 
   switch (fetch_request_data_->Mode()) {
     case FetchRequestMode::kSameOrigin:
-    case FetchRequestMode::kNoCORS:
-    case FetchRequestMode::kCORS:
-    case FetchRequestMode::kCORSWithForcedPreflight:
+    case FetchRequestMode::kNoCors:
+    case FetchRequestMode::kCors:
+    case FetchRequestMode::kCorsWithForcedPreflight:
       request.SetFetchRequestMode(fetch_request_data_->Mode());
       break;
     case FetchRequestMode::kNavigate:
@@ -860,8 +860,8 @@
   request.SetSkipServiceWorker(is_isolated_world_);
 
   if (fetch_request_data_->Keepalive()) {
-    if (!cors::IsCORSSafelistedMethod(request.HttpMethod()) ||
-        !cors::ContainsOnlyCORSSafelistedOrForbiddenHeaders(
+    if (!cors::IsCorsSafelistedMethod(request.HttpMethod()) ||
+        !cors::ContainsOnlyCorsSafelistedOrForbiddenHeaders(
             request.HttpHeaderFields())) {
       PerformNetworkError(
           "Preflight request for request with keepalive "
diff --git a/third_party/blink/renderer/core/fetch/fetch_request_data.cc b/third_party/blink/renderer/core/fetch/fetch_request_data.cc
index 636cd3d..745656e 100644
--- a/third_party/blink/renderer/core/fetch/fetch_request_data.cc
+++ b/third_party/blink/renderer/core/fetch/fetch_request_data.cc
@@ -130,7 +130,7 @@
       same_origin_data_url_flag_(false),
       referrer_string_(Referrer::ClientReferrerString()),
       referrer_policy_(kReferrerPolicyDefault),
-      mode_(network::mojom::FetchRequestMode::kNoCORS),
+      mode_(network::mojom::FetchRequestMode::kNoCors),
       credentials_(network::mojom::FetchCredentialsMode::kOmit),
       cache_mode_(mojom::FetchCacheMode::kDefault),
       redirect_(network::mojom::FetchRedirectMode::kFollow),
diff --git a/third_party/blink/renderer/core/fetch/fetch_request_data.h b/third_party/blink/renderer/core/fetch/fetch_request_data.h
index 7228e04..6b593bc 100644
--- a/third_party/blink/renderer/core/fetch/fetch_request_data.h
+++ b/third_party/blink/renderer/core/fetch/fetch_request_data.h
@@ -33,7 +33,7 @@
 class FetchRequestData final
     : public GarbageCollectedFinalized<FetchRequestData> {
  public:
-  enum Tainting { kBasicTainting, kCORSTainting, kOpaqueTainting };
+  enum Tainting { kBasicTainting, kCorsTainting, kOpaqueTainting };
 
   static FetchRequestData* Create();
   static FetchRequestData* Create(ScriptState*, const WebServiceWorkerRequest&);
diff --git a/third_party/blink/renderer/core/fetch/fetch_response_data.cc b/third_party/blink/renderer/core/fetch/fetch_response_data.cc
index ccc29598..87e1646 100644
--- a/third_party/blink/renderer/core/fetch/fetch_response_data.cc
+++ b/third_party/blink/renderer/core/fetch/fetch_response_data.cc
@@ -81,7 +81,7 @@
   return response;
 }
 
-FetchResponseData* FetchResponseData::CreateCORSFilteredResponse(
+FetchResponseData* FetchResponseData::CreateCorsFilteredResponse(
     const WebHTTPHeaderSet& exposed_headers) const {
   DCHECK_EQ(type_, Type::kDefault);
   // "A CORS filtered response is a filtered response whose type is |CORS|,
@@ -92,7 +92,7 @@
   // parsing `Access-Control-Expose-Headers` in internal response's header
   // list."
   FetchResponseData* response =
-      new FetchResponseData(Type::kCORS, status_, status_message_);
+      new FetchResponseData(Type::kCors, status_, status_message_);
   response->SetURLList(url_list_);
   for (const auto& header : header_list_->List()) {
     const String& name = header.first;
@@ -194,7 +194,7 @@
 
   switch (type_) {
     case Type::kBasic:
-    case Type::kCORS:
+    case Type::kCors:
       DCHECK(internal_response_);
       DCHECK_EQ(buffer_, internal_response_->buffer_);
       DCHECK_EQ(internal_response_->type_, Type::kDefault);
@@ -293,7 +293,7 @@
       response_time_(base::Time::Now()) {}
 
 void FetchResponseData::ReplaceBodyStreamBuffer(BodyStreamBuffer* buffer) {
-  if (type_ == Type::kBasic || type_ == Type::kCORS) {
+  if (type_ == Type::kBasic || type_ == Type::kCors) {
     DCHECK(internal_response_);
     internal_response_->buffer_ = buffer;
     buffer_ = buffer;
diff --git a/third_party/blink/renderer/core/fetch/fetch_response_data.h b/third_party/blink/renderer/core/fetch/fetch_response_data.h
index 84578eb..2ffc6e7 100644
--- a/third_party/blink/renderer/core/fetch/fetch_response_data.h
+++ b/third_party/blink/renderer/core/fetch/fetch_response_data.h
@@ -45,7 +45,7 @@
   static FetchResponseData* CreateWithBuffer(BodyStreamBuffer*);
 
   FetchResponseData* CreateBasicFilteredResponse() const;
-  FetchResponseData* CreateCORSFilteredResponse(
+  FetchResponseData* CreateCorsFilteredResponse(
       const WebHTTPHeaderSet& exposed_headers) const;
   FetchResponseData* CreateOpaqueFilteredResponse() const;
   FetchResponseData* CreateOpaqueRedirectFilteredResponse() const;
diff --git a/third_party/blink/renderer/core/fetch/fetch_response_data_test.cc b/third_party/blink/renderer/core/fetch/fetch_response_data_test.cc
index e2772ef..2c645d06 100644
--- a/third_party/blink/renderer/core/fetch/fetch_response_data_test.cc
+++ b/third_party/blink/renderer/core/fetch/fetch_response_data_test.cc
@@ -93,10 +93,10 @@
   CheckHeaders(web_response);
 }
 
-TEST_F(FetchResponseDataTest, CORSFilter) {
+TEST_F(FetchResponseDataTest, CorsFilter) {
   FetchResponseData* internal_response = CreateInternalResponse();
   FetchResponseData* cors_response_data =
-      internal_response->CreateCORSFilteredResponse(WebHTTPHeaderSet());
+      internal_response->CreateCorsFilteredResponse(WebHTTPHeaderSet());
 
   EXPECT_EQ(internal_response, cors_response_data->InternalResponse());
 
@@ -111,13 +111,13 @@
 }
 
 TEST_F(FetchResponseDataTest,
-       CORSFilterOnResponseWithAccessControlExposeHeaders) {
+       CorsFilterOnResponseWithAccessControlExposeHeaders) {
   FetchResponseData* internal_response = CreateInternalResponse();
   internal_response->HeaderList()->Append("access-control-expose-headers",
                                           "set-cookie, bar");
 
   FetchResponseData* cors_response_data =
-      internal_response->CreateCORSFilteredResponse({"set-cookie", "bar"});
+      internal_response->CreateCorsFilteredResponse({"set-cookie", "bar"});
 
   EXPECT_EQ(internal_response, cors_response_data->InternalResponse());
 
@@ -128,10 +128,10 @@
   EXPECT_EQ("bar", bar_value);
 }
 
-TEST_F(FetchResponseDataTest, CORSFilterWithEmptyHeaderSet) {
+TEST_F(FetchResponseDataTest, CorsFilterWithEmptyHeaderSet) {
   FetchResponseData* internal_response = CreateInternalResponse();
   FetchResponseData* cors_response_data =
-      internal_response->CreateCORSFilteredResponse(WebHTTPHeaderSet());
+      internal_response->CreateCorsFilteredResponse(WebHTTPHeaderSet());
 
   EXPECT_EQ(internal_response, cors_response_data->InternalResponse());
 
@@ -146,13 +146,13 @@
 }
 
 TEST_F(FetchResponseDataTest,
-       CORSFilterWithEmptyHeaderSetOnResponseWithAccessControlExposeHeaders) {
+       CorsFilterWithEmptyHeaderSetOnResponseWithAccessControlExposeHeaders) {
   FetchResponseData* internal_response = CreateInternalResponse();
   internal_response->HeaderList()->Append("access-control-expose-headers",
                                           "set-cookie, bar");
 
   FetchResponseData* cors_response_data =
-      internal_response->CreateCORSFilteredResponse(WebHTTPHeaderSet());
+      internal_response->CreateCorsFilteredResponse(WebHTTPHeaderSet());
 
   EXPECT_EQ(internal_response, cors_response_data->InternalResponse());
 
@@ -166,14 +166,14 @@
   EXPECT_EQ("no-cache", cache_control_value);
 }
 
-TEST_F(FetchResponseDataTest, CORSFilterWithExplicitHeaderSet) {
+TEST_F(FetchResponseDataTest, CorsFilterWithExplicitHeaderSet) {
   FetchResponseData* internal_response = CreateInternalResponse();
   WebHTTPHeaderSet exposed_headers;
   exposed_headers.insert("set-cookie");
   exposed_headers.insert("bar");
 
   FetchResponseData* cors_response_data =
-      internal_response->CreateCORSFilteredResponse(exposed_headers);
+      internal_response->CreateCorsFilteredResponse(exposed_headers);
 
   EXPECT_EQ(internal_response, cors_response_data->InternalResponse());
 
@@ -184,14 +184,14 @@
   EXPECT_EQ("bar", bar_value);
 }
 
-TEST_F(FetchResponseDataTest, ToWebServiceWorkerCORSType) {
+TEST_F(FetchResponseDataTest, ToWebServiceWorkerCorsType) {
   WebServiceWorkerResponse web_response;
   FetchResponseData* internal_response = CreateInternalResponse();
   FetchResponseData* cors_response_data =
-      internal_response->CreateCORSFilteredResponse(WebHTTPHeaderSet());
+      internal_response->CreateCorsFilteredResponse(WebHTTPHeaderSet());
 
   cors_response_data->PopulateWebServiceWorkerResponse(web_response);
-  EXPECT_EQ(network::mojom::FetchResponseType::kCORS,
+  EXPECT_EQ(network::mojom::FetchResponseType::kCors,
             web_response.ResponseType());
   CheckHeaders(web_response);
 }
diff --git a/third_party/blink/renderer/core/fetch/headers.cc b/third_party/blink/renderer/core/fetch/headers.cc
index abba626..0334e25 100644
--- a/third_party/blink/renderer/core/fetch/headers.cc
+++ b/third_party/blink/renderer/core/fetch/headers.cc
@@ -99,8 +99,8 @@
     return;
   // "5. Otherwise, if guard is |request-no-CORS| and |name|/|value| is not a
   //     no-CORS-safelisted header, return."
-  if (guard_ == kRequestNoCORSGuard &&
-      !cors::IsNoCORSSafelistedHeader(name, normalized_value)) {
+  if (guard_ == kRequestNoCorsGuard &&
+      !cors::IsNoCorsSafelistedHeader(name, normalized_value)) {
     return;
   }
   // "6. Otherwise, if guard is |response| and |name| is a forbidden response
@@ -131,8 +131,8 @@
     return;
   // "4. Otherwise, if guard is |request-no-CORS| and |name|/`invalid` is not
   //     a no-CORS-safelisted header, return."
-  if (guard_ == kRequestNoCORSGuard &&
-      !cors::IsNoCORSSafelistedHeader(name, "invalid")) {
+  if (guard_ == kRequestNoCorsGuard &&
+      !cors::IsNoCorsSafelistedHeader(name, "invalid")) {
     return;
   }
   // "5. Otherwise, if guard is |response| and |name| is a forbidden response
@@ -199,8 +199,8 @@
     return;
   // "5. Otherwise, if guard is |request-no-CORS| and |name|/|value| is not a
   //     no-CORS-safelisted header, return."
-  if (guard_ == kRequestNoCORSGuard &&
-      !cors::IsNoCORSSafelistedHeader(name, normalized_value)) {
+  if (guard_ == kRequestNoCorsGuard &&
+      !cors::IsNoCorsSafelistedHeader(name, normalized_value)) {
     return;
   }
   // "6. Otherwise, if guard is |response| and |name| is a forbidden response
diff --git a/third_party/blink/renderer/core/fetch/headers.h b/third_party/blink/renderer/core/fetch/headers.h
index 6c860fb..0fbdd7e 100644
--- a/third_party/blink/renderer/core/fetch/headers.h
+++ b/third_party/blink/renderer/core/fetch/headers.h
@@ -28,7 +28,7 @@
   enum Guard {
     kImmutableGuard,
     kRequestGuard,
-    kRequestNoCORSGuard,
+    kRequestNoCorsGuard,
     kResponseGuard,
     kNoneGuard
   };
diff --git a/third_party/blink/renderer/core/fetch/request.cc b/third_party/blink/renderer/core/fetch/request.cc
index 040aefe..d43d1b1 100644
--- a/third_party/blink/renderer/core/fetch/request.cc
+++ b/third_party/blink/renderer/core/fetch/request.cc
@@ -355,14 +355,14 @@
   if (init->mode() == "same-origin") {
     request->SetMode(network::mojom::FetchRequestMode::kSameOrigin);
   } else if (init->mode() == "no-cors") {
-    request->SetMode(network::mojom::FetchRequestMode::kNoCORS);
+    request->SetMode(network::mojom::FetchRequestMode::kNoCors);
   } else if (init->mode() == "cors") {
-    request->SetMode(network::mojom::FetchRequestMode::kCORS);
+    request->SetMode(network::mojom::FetchRequestMode::kCors);
   } else {
     // |inputRequest| is directly checked here instead of setting and
     // checking |fallbackMode| as specified in the spec.
     if (!input_request)
-      request->SetMode(network::mojom::FetchRequestMode::kCORS);
+      request->SetMode(network::mojom::FetchRequestMode::kCors);
   }
 
   // This is not yet standardized, but we can assume the following:
@@ -474,16 +474,16 @@
   // "Empty |r|'s request's header list."
   r->request_->HeaderList()->ClearList();
   // "If |r|'s request's mode is "no-cors", run these substeps:
-  if (r->GetRequest()->Mode() == network::mojom::FetchRequestMode::kNoCORS) {
+  if (r->GetRequest()->Mode() == network::mojom::FetchRequestMode::kNoCors) {
     // "If |r|'s request's method is not a CORS-safelisted method, throw a
     // TypeError."
-    if (!cors::IsCORSSafelistedMethod(r->GetRequest()->Method())) {
+    if (!cors::IsCorsSafelistedMethod(r->GetRequest()->Method())) {
       exception_state.ThrowTypeError("'" + r->GetRequest()->Method() +
                                      "' is unsupported in no-cors mode.");
       return nullptr;
     }
     // "Set |r|'s Headers object's guard to "request-no-cors"."
-    r->getHeaders()->SetGuard(Headers::kRequestNoCORSGuard);
+    r->getHeaders()->SetGuard(Headers::kRequestNoCorsGuard);
   }
   // "If |signal| is not null, then make |r|’s signal follow |signal|."
   if (signal)
@@ -758,10 +758,10 @@
   switch (request_->Mode()) {
     case network::mojom::FetchRequestMode::kSameOrigin:
       return "same-origin";
-    case network::mojom::FetchRequestMode::kNoCORS:
+    case network::mojom::FetchRequestMode::kNoCors:
       return "no-cors";
-    case network::mojom::FetchRequestMode::kCORS:
-    case network::mojom::FetchRequestMode::kCORSWithForcedPreflight:
+    case network::mojom::FetchRequestMode::kCors:
+    case network::mojom::FetchRequestMode::kCorsWithForcedPreflight:
       return "cors";
     case network::mojom::FetchRequestMode::kNavigate:
       return "navigate";
diff --git a/third_party/blink/renderer/core/fetch/response.cc b/third_party/blink/renderer/core/fetch/response.cc
index 108791d..15d26c8b 100644
--- a/third_party/blink/renderer/core/fetch/response.cc
+++ b/third_party/blink/renderer/core/fetch/response.cc
@@ -44,20 +44,20 @@
 
 namespace {
 
-template <typename CORSHeadersContainer>
+template <typename CorsHeadersContainer>
 FetchResponseData* FilterResponseData(
     network::mojom::FetchResponseType response_type,
     FetchResponseData* response,
-    CORSHeadersContainer& headers) {
+    CorsHeadersContainer& headers) {
   switch (response_type) {
     case network::mojom::FetchResponseType::kBasic:
       return response->CreateBasicFilteredResponse();
       break;
-    case network::mojom::FetchResponseType::kCORS: {
+    case network::mojom::FetchResponseType::kCors: {
       WebHTTPHeaderSet header_names;
       for (const auto& header : headers)
         header_names.insert(header.Ascii().data());
-      return response->CreateCORSFilteredResponse(header_names);
+      return response->CreateCorsFilteredResponse(header_names);
       break;
     }
     case network::mojom::FetchResponseType::kOpaque:
@@ -364,7 +364,7 @@
   switch (response_->GetType()) {
     case network::mojom::FetchResponseType::kBasic:
       return "basic";
-    case network::mojom::FetchResponseType::kCORS:
+    case network::mojom::FetchResponseType::kCors:
       return "cors";
     case network::mojom::FetchResponseType::kDefault:
       return "default";
diff --git a/third_party/blink/renderer/core/fetch/response_test.cc b/third_party/blink/renderer/core/fetch/response_test.cc
index b3abfbf..4bca9a8b 100644
--- a/third_party/blink/renderer/core/fetch/response_test.cc
+++ b/third_party/blink/renderer/core/fetch/response_test.cc
@@ -129,7 +129,7 @@
   CheckResponseStream(scope.GetScriptState(), response, true);
 }
 
-TEST(ServiceWorkerResponseTest, BodyStreamBufferCloneCORS) {
+TEST(ServiceWorkerResponseTest, BodyStreamBufferCloneCors) {
   V8TestingScope scope;
   BodyStreamBuffer* buffer = CreateHelloWorldBuffer(scope.GetScriptState());
   FetchResponseData* fetch_response_data =
@@ -137,7 +137,7 @@
   Vector<KURL> url_list;
   url_list.push_back(KURL("http://www.response.com"));
   fetch_response_data->SetURLList(url_list);
-  fetch_response_data = fetch_response_data->CreateCORSFilteredResponse({});
+  fetch_response_data = fetch_response_data->CreateCorsFilteredResponse({});
   Response* response =
       Response::Create(scope.GetExecutionContext(), fetch_response_data);
   EXPECT_EQ(response->InternalBodyBuffer(), buffer);
diff --git a/third_party/blink/renderer/core/html/link_style.cc b/third_party/blink/renderer/core/html/link_style.cc
index 3aa8d76..2e56c4f 100644
--- a/third_party/blink/renderer/core/html/link_style.cc
+++ b/third_party/blink/renderer/core/html/link_style.cc
@@ -263,7 +263,7 @@
   if (GetResource()) {
     RemovePendingSheet();
     ClearResource();
-    ClearFetchFollowingCORS();
+    ClearFetchFollowingCors();
   }
 
   if (!owner_->ShouldLoadLink())
@@ -292,7 +292,7 @@
   AddPendingSheet(blocking ? kBlocking : kNonBlocking);
 
   if (params.cross_origin != kCrossOriginAttributeNotSet) {
-    SetFetchFollowingCORS();
+    SetFetchFollowingCors();
   }
 
   // Load stylesheets that are not needed for the layout immediately with low
diff --git a/third_party/blink/renderer/core/html/link_style.h b/third_party/blink/renderer/core/html/link_style.h
index ba766ba..a9b281b 100644
--- a/third_party/blink/renderer/core/html/link_style.h
+++ b/third_party/blink/renderer/core/html/link_style.h
@@ -75,11 +75,11 @@
   void RemovePendingSheet();
 
   void SetCrossOriginStylesheetStatus(CSSStyleSheet*);
-  void SetFetchFollowingCORS() {
+  void SetFetchFollowingCors() {
     DCHECK(!fetch_following_cors_);
     fetch_following_cors_ = true;
   }
-  void ClearFetchFollowingCORS() { fetch_following_cors_ = false; }
+  void ClearFetchFollowingCors() { fetch_following_cors_ = false; }
 
   Member<CSSStyleSheet> sheet_;
   DisabledState disabled_state_;
diff --git a/third_party/blink/renderer/core/html/media/html_media_element.cc b/third_party/blink/renderer/core/html/media/html_media_element.cc
index 2077228..1e86f0c 100644
--- a/third_party/blink/renderer/core/html/media/html_media_element.cc
+++ b/third_party/blink/renderer/core/html/media/html_media_element.cc
@@ -1492,7 +1492,7 @@
   return true;
 }
 
-bool HTMLMediaElement::IsMediaDataCORSSameOrigin() const {
+bool HTMLMediaElement::IsMediaDataCorsSameOrigin() const {
   if (!GetWebMediaPlayer())
     return true;
 
@@ -3939,13 +3939,13 @@
   GetAudioSourceProvider().SetClient(audio_source_node_);
 }
 
-WebMediaPlayer::CORSMode HTMLMediaElement::CorsMode() const {
+WebMediaPlayer::CorsMode HTMLMediaElement::CorsMode() const {
   const AtomicString& cross_origin_mode = FastGetAttribute(kCrossoriginAttr);
   if (cross_origin_mode.IsNull())
-    return WebMediaPlayer::kCORSModeUnspecified;
+    return WebMediaPlayer::kCorsModeUnspecified;
   if (DeprecatedEqualIgnoringCase(cross_origin_mode, "use-credentials"))
-    return WebMediaPlayer::kCORSModeUseCredentials;
-  return WebMediaPlayer::kCORSModeAnonymous;
+    return WebMediaPlayer::kCorsModeUseCredentials;
+  return WebMediaPlayer::kCorsModeAnonymous;
 }
 
 void HTMLMediaElement::SetCcLayer(cc::Layer* cc_layer) {
@@ -4264,7 +4264,7 @@
 }
 
 bool HTMLMediaElement::MediaShouldBeOpaque() const {
-  return !IsMediaDataCORSSameOrigin() && ready_state_ < kHaveMetadata &&
+  return !IsMediaDataCorsSameOrigin() && ready_state_ < kHaveMetadata &&
          !FastGetAttribute(kSrcAttr).IsEmpty() &&
          EffectivePreloadType() != WebMediaPlayer::kPreloadNone;
 }
diff --git a/third_party/blink/renderer/core/html/media/html_media_element.h b/third_party/blink/renderer/core/html/media/html_media_element.h
index db911a5..84708f0 100644
--- a/third_party/blink/renderer/core/html/media/html_media_element.h
+++ b/third_party/blink/renderer/core/html/media/html_media_element.h
@@ -301,7 +301,7 @@
   bool IsSafeToLoadURL(const KURL&, InvalidURLAction);
 
   // Checks to see if current media data is CORS-same-origin.
-  bool IsMediaDataCORSSameOrigin() const;
+  bool IsMediaDataCorsSameOrigin() const;
 
   // Returns this media element is in a cross-origin frame.
   bool IsInCrossOriginFrame() const;
@@ -525,7 +525,7 @@
 
   void ChangeNetworkStateFromLoadingToIdle();
 
-  WebMediaPlayer::CORSMode CorsMode() const;
+  WebMediaPlayer::CorsMode CorsMode() const;
 
   // Returns the "direction of playback" value as specified in the HTML5 spec.
   enum DirectionOfPlayback { kBackward, kForward };
diff --git a/third_party/blink/renderer/core/html/media/html_media_element_test.cc b/third_party/blink/renderer/core/html/media/html_media_element_test.cc
index 5c9b880..2e76aa10 100644
--- a/third_party/blink/renderer/core/html/media/html_media_element_test.cc
+++ b/third_party/blink/renderer/core/html/media/html_media_element_test.cc
@@ -38,7 +38,7 @@
       Load,
       WebMediaPlayer::LoadTiming(LoadType load_type,
                                  const blink::WebMediaPlayerSource& source,
-                                 CORSMode cors_mode));
+                                 CorsMode cors_mode));
   MOCK_CONST_METHOD0(DidLazyLoad, bool());
 };
 
diff --git a/third_party/blink/renderer/core/html/media/html_video_element.cc b/third_party/blink/renderer/core/html/media/html_video_element.cc
index 6556fba..c2ba6f2 100644
--- a/third_party/blink/renderer/core/html/media/html_video_element.cc
+++ b/third_party/blink/renderer/core/html/media/html_video_element.cc
@@ -583,7 +583,7 @@
 }
 
 bool HTMLVideoElement::WouldTaintOrigin(const SecurityOrigin*) const {
-  return !IsMediaDataCORSSameOrigin();
+  return !IsMediaDataCorsSameOrigin();
 }
 
 FloatSize HTMLVideoElement::ElementSize(const FloatSize&) const {
diff --git a/third_party/blink/renderer/core/html/parser/html_preload_scanner_test.cc b/third_party/blink/renderer/core/html/parser/html_preload_scanner_test.cc
index 87cc5c4..8776c33 100644
--- a/third_party/blink/renderer/core/html/parser/html_preload_scanner_test.cc
+++ b/third_party/blink/renderer/core/html/parser/html_preload_scanner_test.cc
@@ -54,7 +54,7 @@
   const char* expected_referrer;
 };
 
-struct CORSTestCase {
+struct CorsTestCase {
   const char* base_url;
   const char* input_html;
   network::mojom::FetchRequestMode request_mode;
@@ -151,7 +151,7 @@
     }
   }
 
-  void CORSRequestVerification(
+  void CorsRequestVerification(
       Document* document,
       network::mojom::FetchRequestMode request_mode,
       network::mojom::FetchCredentialsMode credentials_mode) {
@@ -299,14 +299,14 @@
     }
   }
 
-  void Test(CORSTestCase test_case) {
+  void Test(CorsTestCase test_case) {
     HTMLMockHTMLResourcePreloader preloader;
     KURL base_url(test_case.base_url);
     scanner_->AppendToEnd(String(test_case.input_html));
     PreloadRequestStream requests =
         scanner_->Scan(base_url, nullptr, seen_csp_meta_tag_);
     preloader.TakeAndPreload(requests);
-    preloader.CORSRequestVerification(&GetDocument(), test_case.request_mode,
+    preloader.CorsRequestVerification(&GetDocument(), test_case.request_mode,
                                       test_case.credentials_mode);
   }
 
@@ -878,29 +878,29 @@
     Test(test_case);
 }
 
-TEST_F(HTMLPreloadScannerTest, testCORS) {
-  CORSTestCase test_cases[] = {
+TEST_F(HTMLPreloadScannerTest, testCors) {
+  CorsTestCase test_cases[] = {
       {"http://example.test", "<script src='/https/chromium.googlesource.com/script'></script>",
-       network::mojom::FetchRequestMode::kNoCORS,
+       network::mojom::FetchRequestMode::kNoCors,
        network::mojom::FetchCredentialsMode::kInclude},
       {"http://example.test", "<script crossorigin src='/https/chromium.googlesource.com/script'></script>",
-       network::mojom::FetchRequestMode::kCORS,
+       network::mojom::FetchRequestMode::kCors,
        network::mojom::FetchCredentialsMode::kSameOrigin},
       {"http://example.test",
        "<script crossorigin=use-credentials src='/https/chromium.googlesource.com/script'></script>",
-       network::mojom::FetchRequestMode::kCORS,
+       network::mojom::FetchRequestMode::kCors,
        network::mojom::FetchCredentialsMode::kInclude},
       {"http://example.test", "<script type='module' src='/https/chromium.googlesource.com/script'></script>",
-       network::mojom::FetchRequestMode::kCORS,
+       network::mojom::FetchRequestMode::kCors,
        network::mojom::FetchCredentialsMode::kSameOrigin},
       {"http://example.test",
        "<script type='module' crossorigin='anonymous' src='/https/chromium.googlesource.com/script'></script>",
-       network::mojom::FetchRequestMode::kCORS,
+       network::mojom::FetchRequestMode::kCors,
        network::mojom::FetchCredentialsMode::kSameOrigin},
       {"http://example.test",
        "<script type='module' crossorigin='use-credentials' "
        "src='/script'></script>",
-       network::mojom::FetchRequestMode::kCORS,
+       network::mojom::FetchRequestMode::kCors,
        network::mojom::FetchCredentialsMode::kInclude},
   };
 
diff --git a/third_party/blink/renderer/core/inspector/inspector_network_agent.cc b/third_party/blink/renderer/core/inspector/inspector_network_agent.cc
index b3348be..ebf6d32 100644
--- a/third_party/blink/renderer/core/inspector/inspector_network_agent.cc
+++ b/third_party/blink/renderer/core/inspector/inspector_network_agent.cc
@@ -1021,7 +1021,7 @@
       encoded_data_length, should_report_corb_blocking);
 }
 
-void InspectorNetworkAgent::DidReceiveCORSRedirectResponse(
+void InspectorNetworkAgent::DidReceiveCorsRedirectResponse(
     unsigned long identifier,
     DocumentLoader* loader,
     const ResourceResponse& response,
@@ -1660,7 +1660,7 @@
          (!IsMainThread() && worker_global_scope_));
 }
 
-void InspectorNetworkAgent::ShouldForceCORSPreflight(bool* result) {
+void InspectorNetworkAgent::ShouldForceCorsPreflight(bool* result) {
   if (cache_disabled_.Get())
     *result = true;
 }
diff --git a/third_party/blink/renderer/core/inspector/inspector_network_agent.h b/third_party/blink/renderer/core/inspector/inspector_network_agent.h
index beeaa32..972f1e27 100644
--- a/third_party/blink/renderer/core/inspector/inspector_network_agent.h
+++ b/third_party/blink/renderer/core/inspector/inspector_network_agent.h
@@ -122,7 +122,7 @@
                         int64_t encoded_data_length,
                         int64_t decoded_body_length,
                         bool should_report_corb_blocking);
-  void DidReceiveCORSRedirectResponse(unsigned long identifier,
+  void DidReceiveCorsRedirectResponse(unsigned long identifier,
                                       DocumentLoader*,
                                       const ResourceResponse&,
                                       Resource*);
@@ -132,7 +132,7 @@
   void DidCommitLoad(LocalFrame*, DocumentLoader*);
   void ScriptImported(unsigned long identifier, const String& source_string);
   void DidReceiveScriptResponse(unsigned long identifier);
-  void ShouldForceCORSPreflight(bool* result);
+  void ShouldForceCorsPreflight(bool* result);
   void ShouldBlockRequest(const KURL&, bool* result);
   void ShouldBypassServiceWorker(bool* result);
 
diff --git a/third_party/blink/renderer/core/loader/base_fetch_context.cc b/third_party/blink/renderer/core/loader/base_fetch_context.cc
index 075060e..314ef814 100644
--- a/third_party/blink/renderer/core/loader/base_fetch_context.cc
+++ b/third_party/blink/renderer/core/loader/base_fetch_context.cc
@@ -324,7 +324,7 @@
   }
 
   if (request_mode == network::mojom::FetchRequestMode::kSameOrigin &&
-      cors::CalculateCORSFlag(url, origin.get(), request_mode)) {
+      cors::CalculateCorsFlag(url, origin.get(), request_mode)) {
     PrintAccessDeniedMessage(url);
     return ResourceRequestBlockedReason::kOrigin;
   }
diff --git a/third_party/blink/renderer/core/loader/mixed_content_checker.cc b/third_party/blink/renderer/core/loader/mixed_content_checker.cc
index 00ed71e..0bfe2a08 100644
--- a/third_party/blink/renderer/core/loader/mixed_content_checker.cc
+++ b/third_party/blink/renderer/core/loader/mixed_content_checker.cc
@@ -399,7 +399,7 @@
   // launching external applications via URLs. http://crbug.com/318788 and
   // https://crbug.com/393481
   if (frame_type == network::mojom::RequestContextFrameType::kNested &&
-      !SchemeRegistry::ShouldTreatURLSchemeAsCORSEnabled(url.Protocol()))
+      !SchemeRegistry::ShouldTreatURLSchemeAsCorsEnabled(url.Protocol()))
     context_type = WebMixedContentContextType::kOptionallyBlockable;
 
   switch (context_type) {
@@ -783,7 +783,7 @@
   // subframe.
   if (request.GetFrameType() ==
           network::mojom::RequestContextFrameType::kNested &&
-      !SchemeRegistry::ShouldTreatURLSchemeAsCORSEnabled(
+      !SchemeRegistry::ShouldTreatURLSchemeAsCorsEnabled(
           request.Url().Protocol())) {
     return WebMixedContentContextType::kOptionallyBlockable;
   }
diff --git a/third_party/blink/renderer/core/loader/resource/image_resource.cc b/third_party/blink/renderer/core/loader/resource/image_resource.cc
index 204f0ee32..d64d1e6c 100644
--- a/third_party/blink/renderer/core/loader/resource/image_resource.cc
+++ b/third_party/blink/renderer/core/loader/resource/image_resource.cc
@@ -708,13 +708,13 @@
     ImageResourceInfo::DoesCurrentFrameHaveSingleSecurityOrigin
         does_current_frame_has_single_security_origin) const {
   if (GetResponse().WasFetchedViaServiceWorker())
-    return GetResponse().IsCORSSameOrigin();
+    return GetResponse().IsCorsSameOrigin();
 
   if (does_current_frame_has_single_security_origin !=
       ImageResourceInfo::kHasSingleSecurityOrigin)
     return false;
 
-  if (GetResponse().IsCORSSameOrigin())
+  if (GetResponse().IsCorsSameOrigin())
     return true;
 
   return security_origin->CanReadContent(GetResponse().Url());
diff --git a/third_party/blink/renderer/core/loader/threadable_loader.cc b/third_party/blink/renderer/core/loader/threadable_loader.cc
index 98789a1b..2944e27 100644
--- a/third_party/blink/renderer/core/loader/threadable_loader.cc
+++ b/third_party/blink/renderer/core/loader/threadable_loader.cc
@@ -78,7 +78,7 @@
 // Fetch API Spec: https://fetch.spec.whatwg.org/#cors-preflight-fetch-0
 AtomicString CreateAccessControlRequestHeadersHeader(
     const HTTPHeaderMap& headers) {
-  Vector<String> filtered_headers = cors::CORSUnsafeRequestHeaderNames(headers);
+  Vector<String> filtered_headers = cors::CorsUnsafeRequestHeaderNames(headers);
 
   if (!filtered_headers.size())
     return g_null_atom;
@@ -203,7 +203,7 @@
     : client_(client),
       execution_context_(execution_context),
       resource_loader_options_(resource_loader_options),
-      out_of_blink_cors_(RuntimeEnabledFeatures::OutOfBlinkCORSEnabled()),
+      out_of_blink_cors_(RuntimeEnabledFeatures::OutOfBlinkCorsEnabled()),
       is_using_data_consumer_handle_(false),
       async_(resource_loader_options.synchronous_policy ==
              kRequestAsynchronously),
@@ -227,11 +227,11 @@
   DCHECK(async_ || request.HttpReferrer().IsEmpty());
 
   bool cors_enabled =
-      cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode());
+      cors::IsCorsEnabledRequestMode(request.GetFetchRequestMode());
 
   // kPreventPreflight can be used only when the CORS is enabled.
-  DCHECK(request.CORSPreflightPolicy() ==
-             network::mojom::CORSPreflightPolicy::kConsiderPreflight ||
+  DCHECK(request.CorsPreflightPolicy() ==
+             network::mojom::CorsPreflightPolicy::kConsiderPreflight ||
          cors_enabled);
 
   initial_request_url_ = request.Url();
@@ -242,10 +242,10 @@
   redirect_mode_ = request.GetFetchRedirectMode();
 
   if (request.GetFetchRequestMode() ==
-      network::mojom::FetchRequestMode::kNoCORS) {
-    SECURITY_CHECK(cors::IsNoCORSAllowedContext(request_context_));
+      network::mojom::FetchRequestMode::kNoCors) {
+    SECURITY_CHECK(cors::IsNoCorsAllowedContext(request_context_));
   }
-  cors_flag_ = cors::CalculateCORSFlag(request.Url(), GetSecurityOrigin(),
+  cors_flag_ = cors::CalculateCorsFlag(request.Url(), GetSecurityOrigin(),
                                        request.GetFetchRequestMode());
 
   // The CORS flag variable is not yet used at the step in the spec that
@@ -255,8 +255,8 @@
     ThreadableLoaderClient* client = client_;
     Clear();
     client->DidFail(ResourceError(
-        request.Url(), network::CORSErrorStatus(
-                           network::mojom::CORSError::kDisallowedByMode)));
+        request.Url(), network::CorsErrorStatus(
+                           network::mojom::CorsError::kDisallowedByMode)));
     return;
   }
 
@@ -332,7 +332,7 @@
     return;
   }
 
-  if (cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode())) {
+  if (cors::IsCorsEnabledRequestMode(request.GetFetchRequestMode())) {
     // Save the request to fallback_request_for_service_worker to use when the
     // service worker doesn't handle (call respondWith()) a CORS enabled
     // request.
@@ -350,7 +350,7 @@
     return;
   }
 
-  DCHECK(cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode()) ||
+  DCHECK(cors::IsCorsEnabledRequestMode(request.GetFetchRequestMode()) ||
          request.IsExternalRequest());
 
   MakeCrossOriginAccessRequest(request);
@@ -390,7 +390,7 @@
 
 void ThreadableLoader::MakeCrossOriginAccessRequest(
     const ResourceRequest& request) {
-  DCHECK(cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode()) ||
+  DCHECK(cors::IsCorsEnabledRequestMode(request.GetFetchRequestMode()) ||
          request.IsExternalRequest());
   DCHECK(client_);
   DCHECK(!GetResource());
@@ -398,11 +398,11 @@
   // Cross-origin requests are only allowed certain registered schemes. We would
   // catch this when checking response headers later, but there is no reason to
   // send a request, preflighted or not, that's guaranteed to be denied.
-  if (!SchemeRegistry::ShouldTreatURLSchemeAsCORSEnabled(
+  if (!SchemeRegistry::ShouldTreatURLSchemeAsCorsEnabled(
           request.Url().Protocol())) {
     DispatchDidFail(ResourceError(
-        request.Url(), network::CORSErrorStatus(
-                           network::mojom::CORSError::kCORSDisabledScheme)));
+        request.Url(), network::CorsErrorStatus(
+                           network::mojom::CorsError::kCorsDisabledScheme)));
     return;
   }
 
@@ -435,24 +435,24 @@
   }
 
   if (request.GetFetchRequestMode() !=
-      network::mojom::FetchRequestMode::kCORSWithForcedPreflight) {
-    if (request.CORSPreflightPolicy() ==
-        network::mojom::CORSPreflightPolicy::kPreventPreflight) {
+      network::mojom::FetchRequestMode::kCorsWithForcedPreflight) {
+    if (request.CorsPreflightPolicy() ==
+        network::mojom::CorsPreflightPolicy::kPreventPreflight) {
       PrepareCrossOriginRequest(cross_origin_request);
       LoadRequest(cross_origin_request, cross_origin_options);
       return;
     }
 
-    DCHECK_EQ(request.CORSPreflightPolicy(),
-              network::mojom::CORSPreflightPolicy::kConsiderPreflight);
+    DCHECK_EQ(request.CorsPreflightPolicy(),
+              network::mojom::CorsPreflightPolicy::kConsiderPreflight);
 
-    // We use ContainsOnlyCORSSafelistedOrForbiddenHeaders() here since
+    // We use ContainsOnlyCorsSafelistedOrForbiddenHeaders() here since
     // |request| may have been modified in the process of loading (not from
     // the user's input). For example, referrer. We need to accept them. For
     // security, we must reject forbidden headers/methods at the point we
     // accept user's input. Not here.
-    if (cors::IsCORSSafelistedMethod(request.HttpMethod()) &&
-        cors::ContainsOnlyCORSSafelistedOrForbiddenHeaders(
+    if (cors::IsCorsSafelistedMethod(request.HttpMethod()) &&
+        cors::ContainsOnlyCorsSafelistedOrForbiddenHeaders(
             request.HttpHeaderFields())) {
       PrepareCrossOriginRequest(cross_origin_request);
       LoadRequest(cross_origin_request, cross_origin_options);
@@ -466,7 +466,7 @@
   bool should_ignore_preflight_cache = false;
   // Prevent use of the CORS preflight cache when instructed by the DevTools
   // not to use caches.
-  probe::shouldForceCORSPreflight(execution_context_,
+  probe::shouldForceCorsPreflight(execution_context_,
                                   &should_ignore_preflight_cache);
   if (should_ignore_preflight_cache ||
       !cors::CheckIfRequestCanSkipPreflight(
@@ -579,8 +579,8 @@
 
       HandlePreflightFailure(
           original_url,
-          network::CORSErrorStatus(
-              network::mojom::CORSError::kPreflightDisallowedRedirect));
+          network::CorsErrorStatus(
+              network::mojom::CorsError::kPreflightDisallowedRedirect));
       return false;
     }
 
@@ -631,17 +631,17 @@
     // Allow same origin requests to continue after allowing clients to audit
     // the redirect.
     if (!(cors_flag_ ||
-          cors::CalculateCORSFlag(new_url, GetSecurityOrigin(),
+          cors::CalculateCorsFlag(new_url, GetSecurityOrigin(),
                                   new_request.GetFetchRequestMode()))) {
       bool follow =
           client_->WillFollowRedirect(new_url, redirect_response_to_pass);
       response_tainting_ = cors::CalculateResponseTainting(
           new_url, new_request.GetFetchRequestMode(), GetSecurityOrigin(),
-          CORSFlag::Unset);
+          CorsFlag::Unset);
       return follow;
     }
 
-    probe::didReceiveCORSRedirectResponse(
+    probe::didReceiveCorsRedirectResponse(
         execution_context_, resource->Identifier(),
         GetDocument() && GetDocument()->GetFrame()
             ? GetDocument()->GetFrame()->Loader().GetDocumentLoader()
@@ -650,7 +650,7 @@
 
     if (auto error_status = cors::CheckRedirectLocation(
             new_url, fetch_request_mode_, GetSecurityOrigin(),
-            cors_flag_ ? CORSFlag::Set : CORSFlag::Unset)) {
+            cors_flag_ ? CorsFlag::Set : CorsFlag::Unset)) {
       DispatchDidFail(ResourceError(original_url, *error_status));
       return false;
     }
@@ -762,7 +762,7 @@
 
 void ThreadableLoader::HandlePreflightResponse(
     const ResourceResponse& response) {
-  base::Optional<network::CORSErrorStatus> cors_error_status =
+  base::Optional<network::CorsErrorStatus> cors_error_status =
       cors::CheckPreflightAccess(response.Url(), response.HttpStatusCode(),
                                  response.HttpHeaderFields(),
                                  actual_request_.GetFetchCredentialsMode(),
@@ -772,15 +772,15 @@
     return;
   }
 
-  base::Optional<network::mojom::CORSError> preflight_error =
+  base::Optional<network::mojom::CorsError> preflight_error =
       cors::CheckPreflight(response.HttpStatusCode());
   if (preflight_error) {
     HandlePreflightFailure(response.Url(),
-                           network::CORSErrorStatus(*preflight_error));
+                           network::CorsErrorStatus(*preflight_error));
     return;
   }
 
-  base::Optional<network::CORSErrorStatus> error_status;
+  base::Optional<network::CorsErrorStatus> error_status;
   if (actual_request_.IsExternalRequest()) {
     error_status = cors::CheckExternalPreflight(response.HttpHeaderFields());
     if (error_status) {
@@ -859,11 +859,11 @@
     // We dispatch a CORS failure for the case.
     // TODO(yhirano): This is probably not spec conformant. Fix it after
     // https://github.com/w3c/preload/issues/100 is addressed.
-    if (fetch_request_mode_ != network::mojom::FetchRequestMode::kNoCORS &&
+    if (fetch_request_mode_ != network::mojom::FetchRequestMode::kNoCors &&
         response.GetType() == network::mojom::FetchResponseType::kOpaque) {
       DispatchDidFail(ResourceError(
-          response.Url(), network::CORSErrorStatus(
-                              network::mojom::CORSError::kInvalidResponse)));
+          response.Url(), network::CorsErrorStatus(
+                              network::mojom::CorsError::kInvalidResponse)));
       return;
     }
 
@@ -886,7 +886,7 @@
   fallback_request_for_service_worker_ = ResourceRequest();
 
   if (cors_flag_) {
-    base::Optional<network::CORSErrorStatus> access_error = cors::CheckAccess(
+    base::Optional<network::CorsErrorStatus> access_error = cors::CheckAccess(
         response.Url(), response.HttpStatusCode(), response.HttpHeaderFields(),
         fetch_credentials_mode_, *GetSecurityOrigin());
     if (access_error) {
@@ -1008,7 +1008,7 @@
 
 void ThreadableLoader::HandlePreflightFailure(
     const KURL& url,
-    const network::CORSErrorStatus& error_status) {
+    const network::CorsErrorStatus& error_status) {
   // Prevent NotifyFinished() from bypassing access check.
   actual_request_ = ResourceRequest();
 
@@ -1016,9 +1016,9 @@
 }
 
 void ThreadableLoader::DispatchDidFail(const ResourceError& error) {
-  if (!out_of_blink_cors_ && error.CORSErrorStatus()) {
+  if (!out_of_blink_cors_ && error.CorsErrorStatus()) {
     String message = cors::GetErrorString(
-        *error.CORSErrorStatus(), initial_request_url_, last_request_url_,
+        *error.CorsErrorStatus(), initial_request_url_, last_request_url_,
         *GetSecurityOrigin(), ResourceType::kRaw,
         resource_loader_options_.initiator_info.name);
     execution_context_->AddConsoleMessage(ConsoleMessage::Create(
@@ -1036,7 +1036,7 @@
     ResourceRequest& request,
     ResourceLoaderOptions resource_loader_options) {
   resource_loader_options.cors_handling_by_resource_fetcher =
-      kDisableCORSHandlingByResourceFetcher;
+      kDisableCorsHandlingByResourceFetcher;
 
   if (out_of_blink_cors_) {
     if (request.GetFetchCredentialsMode() ==
@@ -1048,7 +1048,7 @@
     if (actual_request_.IsNull()) {
       response_tainting_ = cors::CalculateResponseTainting(
           request.Url(), request.GetFetchRequestMode(), GetSecurityOrigin(),
-          cors_flag_ ? CORSFlag::Set : CORSFlag::Unset);
+          cors_flag_ ? CorsFlag::Set : CorsFlag::Unset);
       request.SetAllowStoredCredentials(cors::CalculateCredentialsFlag(
           request.GetFetchCredentialsMode(), response_tainting_));
     } else {
diff --git a/third_party/blink/renderer/core/loader/threadable_loader.h b/third_party/blink/renderer/core/loader/threadable_loader.h
index 439fe892..2929062f 100644
--- a/third_party/blink/renderer/core/loader/threadable_loader.h
+++ b/third_party/blink/renderer/core/loader/threadable_loader.h
@@ -183,7 +183,7 @@
   void LoadActualRequest();
   // Clears actual_request_ and reports access control check failure to
   // m_client.
-  void HandlePreflightFailure(const KURL&, const network::CORSErrorStatus&);
+  void HandlePreflightFailure(const KURL&, const network::CorsErrorStatus&);
   // Investigates the response for the preflight request. If successful,
   // the actual request will be made later in NotifyFinished().
   void HandlePreflightResponse(const ResourceResponse&);
@@ -216,7 +216,7 @@
   // up-to-date values from them and this variable, and use it.
   const ResourceLoaderOptions resource_loader_options_;
 
-  // True when feature OutOfBlinkCORS is enabled (https://crbug.com/736308).
+  // True when feature OutOfBlinkCors is enabled (https://crbug.com/736308).
   bool out_of_blink_cors_;
 
   // Corresponds to the CORS flag in the Fetch spec.
diff --git a/third_party/blink/renderer/core/loader/threadable_loader_test.cc b/third_party/blink/renderer/core/loader/threadable_loader_test.cc
index 7a589ac6..965fb3bd 100644
--- a/third_party/blink/renderer/core/loader/threadable_loader_test.cc
+++ b/third_party/blink/renderer/core/loader/threadable_loader_test.cc
@@ -219,7 +219,7 @@
 
   void StartLoader(const KURL& url,
                    network::mojom::FetchRequestMode fetch_request_mode =
-                       network::mojom::FetchRequestMode::kNoCORS) {
+                       network::mojom::FetchRequestMode::kNoCors) {
     ResourceRequest request(url);
     request.SetRequestContext(mojom::RequestContextType::OBJECT);
     request.SetFetchRequestMode(fetch_request_mode);
@@ -473,8 +473,8 @@
   EXPECT_CALL(
       *Client(),
       DidFail(ResourceError(
-          ErrorURL(), network::CORSErrorStatus(
-                          network::mojom::CORSError::kDisallowedByMode))));
+          ErrorURL(), network::CorsErrorStatus(
+                          network::mojom::CorsError::kDisallowedByMode))));
   EXPECT_CALL(GetCheckpoint(), Call(2));
 
   StartLoader(ErrorURL(), network::mojom::FetchRequestMode::kSameOrigin);
@@ -522,10 +522,10 @@
   EXPECT_CALL(*Client(),
               DidFail(ResourceError(
                   SuccessURL(),
-                  network::CORSErrorStatus(
-                      network::mojom::CORSError::kMissingAllowOriginHeader))));
+                  network::CorsErrorStatus(
+                      network::mojom::CorsError::kMissingAllowOriginHeader))));
 
-  StartLoader(SuccessURL(), network::mojom::FetchRequestMode::kCORS);
+  StartLoader(SuccessURL(), network::mojom::FetchRequestMode::kCors);
   CallCheckpoint(2);
   ServeRequests();
 }
@@ -592,7 +592,7 @@
   EXPECT_CALL(GetCheckpoint(), Call(2));
   EXPECT_CALL(*Client(), DidFailRedirectCheck());
 
-  StartLoader(RedirectLoopURL(), network::mojom::FetchRequestMode::kCORS);
+  StartLoader(RedirectLoopURL(), network::mojom::FetchRequestMode::kCors);
   CallCheckpoint(2);
   ServeRequests();
 }
@@ -607,7 +607,7 @@
   EXPECT_CALL(*Client(), DidFailRedirectCheck())
       .WillOnce(InvokeWithoutArgs(this, &ThreadableLoaderTest::CancelLoader));
 
-  StartLoader(RedirectLoopURL(), network::mojom::FetchRequestMode::kCORS);
+  StartLoader(RedirectLoopURL(), network::mojom::FetchRequestMode::kCors);
   CallCheckpoint(2);
   ServeRequests();
 }
@@ -622,7 +622,7 @@
   EXPECT_CALL(*Client(), DidFailRedirectCheck())
       .WillOnce(InvokeWithoutArgs(this, &ThreadableLoaderTest::ClearLoader));
 
-  StartLoader(RedirectLoopURL(), network::mojom::FetchRequestMode::kCORS);
+  StartLoader(RedirectLoopURL(), network::mojom::FetchRequestMode::kCors);
   CallCheckpoint(2);
   ServeRequests();
 }
@@ -642,7 +642,7 @@
   // test is not saying that didFailAccessControlCheck should be dispatched
   // synchronously, but is saying that even when a response is served
   // synchronously it should not lead to a crash.
-  StartLoader(KURL("about:blank"), network::mojom::FetchRequestMode::kCORS);
+  StartLoader(KURL("about:blank"), network::mojom::FetchRequestMode::kCors);
   CallCheckpoint(2);
 }
 
diff --git a/third_party/blink/renderer/core/paint/video_painter_test.cc b/third_party/blink/renderer/core/paint/video_painter_test.cc
index d42cc153..7a445402 100644
--- a/third_party/blink/renderer/core/paint/video_painter_test.cc
+++ b/third_party/blink/renderer/core/paint/video_painter_test.cc
@@ -26,7 +26,7 @@
   const cc::Layer* GetCcLayer() { return layer_.get(); }
 
   // WebMediaPlayer
-  LoadTiming Load(LoadType, const WebMediaPlayerSource&, CORSMode) override {
+  LoadTiming Load(LoadType, const WebMediaPlayerSource&, CorsMode) override {
     network_state_ = kNetworkStateLoaded;
     client_->NetworkStateChanged();
     ready_state_ = kReadyStateHaveEnoughData;
diff --git a/third_party/blink/renderer/core/probe/core_probes.json5 b/third_party/blink/renderer/core/probe/core_probes.json5
index f95bfba5..f295c86 100644
--- a/third_party/blink/renderer/core/probe/core_probes.json5
+++ b/third_party/blink/renderer/core/probe/core_probes.json5
@@ -123,7 +123,7 @@
         "didFailLoading",
         "didFinishLoading",
         "didFinishXHR",
-        "didReceiveCORSRedirectResponse",
+        "didReceiveCorsRedirectResponse",
         "didReceiveData",
         "didReceiveBlob",
         "didReceiveEncodedDataLength",
@@ -139,7 +139,7 @@
         "scriptImported",
         "shouldBlockRequest",
         "shouldBypassServiceWorker",
-        "shouldForceCORSPreflight",
+        "shouldForceCorsPreflight",
         "willDispatchEventSourceEvent",
         "willLoadXHR",
         "willSendEventSourceRequest",
diff --git a/third_party/blink/renderer/core/probe/core_probes.pidl b/third_party/blink/renderer/core/probe/core_probes.pidl
index 4b743cf..743bdfa 100644
--- a/third_party/blink/renderer/core/probe/core_probes.pidl
+++ b/third_party/blink/renderer/core/probe/core_probes.pidl
@@ -98,7 +98,7 @@
   void didReceiveBlob(ExecutionContext*, unsigned long identifier, DocumentLoader*, BlobDataHandle*);
   void didReceiveEncodedDataLength(ExecutionContext*, DocumentLoader* loader, unsigned long identifier, int encodedDataLength);
   void didFinishLoading(ExecutionContext*, unsigned long identifier, DocumentLoader*, TimeTicks finishTime, int64_t encoded_data_length, int64_t decodedBodyLength, bool should_report_corb_blocking);
-  void didReceiveCORSRedirectResponse(ExecutionContext*, unsigned long identifier, DocumentLoader*, const ResourceResponse&, Resource*);
+  void didReceiveCorsRedirectResponse(ExecutionContext*, unsigned long identifier, DocumentLoader*, const ResourceResponse&, Resource*);
   void didFailLoading(ExecutionContext*, unsigned long identifier, DocumentLoader*, const ResourceError&);
   void willSendEventSourceRequest(ExecutionContext*, ThreadableLoaderClient* eventSource);
   void willDispatchEventSourceEvent(ExecutionContext*, unsigned long identifier, const AtomicString& eventName, const AtomicString& eventId, const String& data);
@@ -151,7 +151,7 @@
   V8Compile([Keep] ExecutionContext* context, const String& file_name, int line, int column);
   ParseHTML(Document* document, HTMLDocumentParser* parser);
   void forcePseudoState([Keep] Element* element, CSSSelector::PseudoType pseudoState, bool* result);
-  void shouldForceCORSPreflight(ExecutionContext*, bool* result);
+  void shouldForceCorsPreflight(ExecutionContext*, bool* result);
   void shouldBlockRequest(ExecutionContext*, const KURL&, bool* result);
   void shouldBypassServiceWorker(ExecutionContext* context, bool* result);
   void consoleTimeStamp(ExecutionContext*, const String& title);
diff --git a/third_party/blink/renderer/core/script/classic_pending_script.cc b/third_party/blink/renderer/core/script/classic_pending_script.cc
index e7de65d..57ebf222 100644
--- a/third_party/blink/renderer/core/script/classic_pending_script.cc
+++ b/third_party/blink/renderer/core/script/classic_pending_script.cc
@@ -362,7 +362,7 @@
   // ... the URL from which the script was obtained, ...</spec>
   const KURL& base_url = source_code.Url();
   return ClassicScript::Create(source_code, base_url, options_,
-                               resource->GetResponse().IsCORSSameOrigin()
+                               resource->GetResponse().IsCorsSameOrigin()
                                    ? SanitizeScriptErrors::kDoNotSanitize
                                    : SanitizeScriptErrors::kSanitize);
 }
diff --git a/third_party/blink/renderer/core/xmlhttprequest/xml_http_request.cc b/third_party/blink/renderer/core/xmlhttprequest/xml_http_request.cc
index c2532299..10b9095 100644
--- a/third_party/blink/renderer/core/xmlhttprequest/xml_http_request.cc
+++ b/third_party/blink/renderer/core/xmlhttprequest/xml_http_request.cc
@@ -1040,16 +1040,16 @@
   // in case the upload listeners are added after the request is started.
   upload_events_allowed_ =
       same_origin_request_ || upload_events ||
-      !cors::IsCORSSafelistedMethod(method_) ||
-      !cors::ContainsOnlyCORSSafelistedHeaders(request_headers_);
+      !cors::IsCorsSafelistedMethod(method_) ||
+      !cors::ContainsOnlyCorsSafelistedHeaders(request_headers_);
 
   ResourceRequest request(url_);
   request.SetRequestorOrigin(GetSecurityOrigin());
   request.SetHTTPMethod(method_);
   request.SetRequestContext(mojom::RequestContextType::XML_HTTP_REQUEST);
   request.SetFetchRequestMode(
-      upload_events ? network::mojom::FetchRequestMode::kCORSWithForcedPreflight
-                    : network::mojom::FetchRequestMode::kCORS);
+      upload_events ? network::mojom::FetchRequestMode::kCorsWithForcedPreflight
+                    : network::mojom::FetchRequestMode::kCors);
   request.SetFetchCredentialsMode(
       with_credentials_ ? network::mojom::FetchCredentialsMode::kInclude
                         : network::mojom::FetchCredentialsMode::kSameOrigin);
diff --git a/third_party/blink/renderer/modules/background_fetch/background_fetch_icon_loader.cc b/third_party/blink/renderer/modules/background_fetch/background_fetch_icon_loader.cc
index 9d2bb78..00e7ee9 100644
--- a/third_party/blink/renderer/modules/background_fetch/background_fetch_icon_loader.cc
+++ b/third_party/blink/renderer/modules/background_fetch/background_fetch_icon_loader.cc
@@ -96,7 +96,7 @@
   resource_request.SetPriority(ResourceLoadPriority::kMedium);
   resource_request.SetKeepalive(true);
   resource_request.SetFetchRequestMode(
-      network::mojom::FetchRequestMode::kNoCORS);
+      network::mojom::FetchRequestMode::kNoCors);
   resource_request.SetFetchCredentialsMode(
       network::mojom::FetchCredentialsMode::kInclude);
   resource_request.SetSkipServiceWorker(true);
diff --git a/third_party/blink/renderer/modules/background_fetch/background_fetch_manager.cc b/third_party/blink/renderer/modules/background_fetch/background_fetch_manager.cc
index af2f276..8658e4a 100644
--- a/third_party/blink/renderer/modules/background_fetch/background_fetch_manager.cc
+++ b/third_party/blink/renderer/modules/background_fetch/background_fetch_manager.cc
@@ -216,7 +216,7 @@
     // https://wicg.github.io/background-fetch/#dom-backgroundfetchmanager-fetch
     // ""If |internalRequest|’s mode is "no-cors", then return a promise
     //   rejected with a TypeError.""
-    if (web_request.Mode() == network::mojom::FetchRequestMode::kNoCORS) {
+    if (web_request.Mode() == network::mojom::FetchRequestMode::kNoCors) {
       return RejectWithTypeError(script_state, request_url,
                                  "the request mode must not be no-cors");
     }
diff --git a/third_party/blink/renderer/modules/beacon/navigator_beacon.cc b/third_party/blink/renderer/modules/beacon/navigator_beacon.cc
index 244c6a95..3ccde42 100644
--- a/third_party/blink/renderer/modules/beacon/navigator_beacon.cc
+++ b/third_party/blink/renderer/modules/beacon/navigator_beacon.cc
@@ -88,7 +88,7 @@
                                      data.GetAsArrayBufferView().View());
   } else if (data.IsBlob()) {
     Blob* blob = data.GetAsBlob();
-    if (!cors::IsCORSSafelistedContentType(blob->type())) {
+    if (!cors::IsCorsSafelistedContentType(blob->type())) {
       UseCounter::Count(context,
                         WebFeature::kSendBeaconWithNonSimpleContentType);
       if (RuntimeEnabledFeatures::
diff --git a/third_party/blink/renderer/modules/cache_storage/inspector_cache_storage_agent.cc b/third_party/blink/renderer/modules/cache_storage/inspector_cache_storage_agent.cc
index 502c03b3..a711d4b 100644
--- a/third_party/blink/renderer/modules/cache_storage/inspector_cache_storage_agent.cc
+++ b/third_party/blink/renderer/modules/cache_storage/inspector_cache_storage_agent.cc
@@ -177,7 +177,7 @@
   switch (type) {
     case network::mojom::FetchResponseType::kBasic:
       return protocol::CacheStorage::CachedResponseTypeEnum::Basic;
-    case network::mojom::FetchResponseType::kCORS:
+    case network::mojom::FetchResponseType::kCors:
       return protocol::CacheStorage::CachedResponseTypeEnum::Cors;
     case network::mojom::FetchResponseType::kDefault:
       return protocol::CacheStorage::CachedResponseTypeEnum::Default;
diff --git a/third_party/blink/renderer/modules/encryptedmedia/html_media_element_encrypted_media.cc b/third_party/blink/renderer/modules/encryptedmedia/html_media_element_encrypted_media.cc
index 4ea8019b..0c579159 100644
--- a/third_party/blink/renderer/modules/encryptedmedia/html_media_element_encrypted_media.cc
+++ b/third_party/blink/renderer/modules/encryptedmedia/html_media_element_encrypted_media.cc
@@ -409,7 +409,7 @@
   DVLOG(EME_LOG_LEVEL) << __func__;
 
   Event* event;
-  if (media_element_->IsMediaDataCORSSameOrigin()) {
+  if (media_element_->IsMediaDataCorsSameOrigin()) {
     event = CreateEncryptedEvent(init_data_type, init_data, init_data_length);
   } else {
     // Current page is not allowed to see content from the media file,
diff --git a/third_party/blink/renderer/modules/eventsource/event_source.cc b/third_party/blink/renderer/modules/eventsource/event_source.cc
index 750c1f20..3ffc70d 100644
--- a/third_party/blink/renderer/modules/eventsource/event_source.cc
+++ b/third_party/blink/renderer/modules/eventsource/event_source.cc
@@ -128,15 +128,15 @@
   request.SetHTTPHeaderField(http_names::kAccept, "text/event-stream");
   request.SetHTTPHeaderField(http_names::kCacheControl, "no-cache");
   request.SetRequestContext(mojom::RequestContextType::EVENT_SOURCE);
-  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCORS);
+  request.SetFetchRequestMode(network::mojom::FetchRequestMode::kCors);
   request.SetFetchCredentialsMode(
       with_credentials_ ? network::mojom::FetchCredentialsMode::kInclude
                         : network::mojom::FetchCredentialsMode::kSameOrigin);
   request.SetCacheMode(blink::mojom::FetchCacheMode::kNoStore);
   request.SetExternalRequestStateFromRequestorAddressSpace(
       execution_context.GetSecurityContext().AddressSpace());
-  request.SetCORSPreflightPolicy(
-      network::mojom::CORSPreflightPolicy::kPreventPreflight);
+  request.SetCorsPreflightPolicy(
+      network::mojom::CorsPreflightPolicy::kPreventPreflight);
   if (parser_ && !parser_->LastEventId().IsEmpty()) {
     // HTTP headers are Latin-1 byte strings, but the Last-Event-ID header is
     // encoded as UTF-8.
diff --git a/third_party/blink/renderer/modules/mediacapturefromelement/html_media_element_capture.cc b/third_party/blink/renderer/modules/mediacapturefromelement/html_media_element_capture.cc
index a04a194..d993c18 100644
--- a/third_party/blink/renderer/modules/mediacapturefromelement/html_media_element_capture.cc
+++ b/third_party/blink/renderer/modules/mediacapturefromelement/html_media_element_capture.cc
@@ -125,7 +125,7 @@
     sources_.insert(track->Component()->Source());
 
   if (!media_element_->currentSrc().IsEmpty() &&
-      !media_element_->IsMediaDataCORSSameOrigin()) {
+      !media_element_->IsMediaDataCorsSameOrigin()) {
     for (auto source : sources_)
       MediaStreamCenter::Instance().DidStopMediaStreamSource(source);
   }
@@ -155,7 +155,7 @@
   }
 
   ExecutionContext* context = ExecutionContext::From(script_state);
-  if (!element.currentSrc().IsEmpty() && !element.IsMediaDataCORSSameOrigin()) {
+  if (!element.currentSrc().IsEmpty() && !element.IsMediaDataCorsSameOrigin()) {
     exception_state.ThrowSecurityError(
         "Cannot capture from element with cross-origin data");
     return nullptr;
diff --git a/third_party/blink/renderer/modules/payments/payment_handler_utils.cc b/third_party/blink/renderer/modules/payments/payment_handler_utils.cc
index 7a571d4..215faa2 100644
--- a/third_party/blink/renderer/modules/payments/payment_handler_utils.cc
+++ b/third_party/blink/renderer/modules/payments/payment_handler_utils.cc
@@ -43,7 +43,7 @@
     case ServiceWorkerResponseError::kBodyLocked:
     case ServiceWorkerResponseError::kRedirectedResponseForNotFollowRequest:
     case ServiceWorkerResponseError::kDataPipeCreationFailed:
-    case ServiceWorkerResponseError::kResponseTypeCORSForRequestModeSameOrigin:
+    case ServiceWorkerResponseError::kResponseTypeCorsForRequestModeSameOrigin:
     case ServiceWorkerResponseError::kResponseBodyBroken:
       NOTREACHED();
       error_message = error_message + "an unexpected error occurred.";
diff --git a/third_party/blink/renderer/modules/service_worker/fetch_respond_with_observer.cc b/third_party/blink/renderer/modules/service_worker/fetch_respond_with_observer.cc
index 7860b3b..ea94c36 100644
--- a/third_party/blink/renderer/modules/service_worker/fetch_respond_with_observer.cc
+++ b/third_party/blink/renderer/modules/service_worker/fetch_respond_with_observer.cc
@@ -79,7 +79,7 @@
                       "an \"opaqueredirect\" type response was used for a "
                       "request whose redirect mode is not \"manual\".";
       break;
-    case ServiceWorkerResponseError::kResponseTypeCORSForRequestModeSameOrigin:
+    case ServiceWorkerResponseError::kResponseTypeCorsForRequestModeSameOrigin:
       error_message = error_message +
                       "a \"cors\" type response was used for a request whose "
                       "mode is \"same-origin\".";
@@ -252,14 +252,14 @@
     OnResponseRejected(ServiceWorkerResponseError::kResponseTypeError);
     return;
   }
-  if (response_type == network::mojom::FetchResponseType::kCORS &&
+  if (response_type == network::mojom::FetchResponseType::kCors &&
       request_mode_ == network::mojom::FetchRequestMode::kSameOrigin) {
     OnResponseRejected(
-        ServiceWorkerResponseError::kResponseTypeCORSForRequestModeSameOrigin);
+        ServiceWorkerResponseError::kResponseTypeCorsForRequestModeSameOrigin);
     return;
   }
   if (response_type == network::mojom::FetchResponseType::kOpaque) {
-    if (request_mode_ != network::mojom::FetchRequestMode::kNoCORS) {
+    if (request_mode_ != network::mojom::FetchRequestMode::kNoCors) {
       OnResponseRejected(ServiceWorkerResponseError::kResponseTypeOpaque);
       return;
     }
diff --git a/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.cc b/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.cc
index b590aeb..62ed5e5 100644
--- a/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.cc
+++ b/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.cc
@@ -88,7 +88,7 @@
   bool is_tainted = WouldTaintOrigin();
 
   if (is_tainted) {
-    PrintCORSMessage(MediaElement()->currentSrc().GetString());
+    PrintCorsMessage(MediaElement()->currentSrc().GetString());
   }
 
   if (number_of_channels != source_number_of_channels_ ||
@@ -139,7 +139,7 @@
   return MediaElement()->GetWebMediaPlayer()->WouldTaintOrigin();
 }
 
-void MediaElementAudioSourceHandler::PrintCORSMessage(const String& message) {
+void MediaElementAudioSourceHandler::PrintCorsMessage(const String& message) {
   if (Context()->GetExecutionContext()) {
     Context()->GetExecutionContext()->AddConsoleMessage(
         ConsoleMessage::Create(kSecurityMessageSource, kInfoMessageLevel,
diff --git a/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.h b/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.h
index bd93a8f7..2e69e1a 100644
--- a/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.h
+++ b/third_party/blink/renderer/modules/webaudio/media_element_audio_source_node.h
@@ -84,7 +84,7 @@
 
   // Print warning if CORS restrictions cause MediaElementAudioSource to output
   // zeroes.
-  void PrintCORSMessage(const String& message);
+  void PrintCorsMessage(const String& message);
 
   // This Persistent doesn't make a reference cycle. The reference from
   // HTMLMediaElement to AudioSourceProvideClient, which
diff --git a/third_party/blink/renderer/platform/exported/web_runtime_features.cc b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
index 5ba9026..505903e 100644
--- a/third_party/blink/renderer/platform/exported/web_runtime_features.cc
+++ b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
@@ -84,8 +84,8 @@
   RuntimeEnabledFeatures::SetOriginTrialControlledFeaturesEnabled(enable);
 }
 
-void WebRuntimeFeatures::EnableOutOfBlinkCORS(bool enable) {
-  RuntimeEnabledFeatures::SetOutOfBlinkCORSEnabled(enable);
+void WebRuntimeFeatures::EnableOutOfBlinkCors(bool enable) {
+  RuntimeEnabledFeatures::SetOutOfBlinkCorsEnabled(enable);
 }
 
 void WebRuntimeFeatures::EnableAccelerated2dCanvas(bool enable) {
diff --git a/third_party/blink/renderer/platform/exported/web_service_worker_request.cc b/third_party/blink/renderer/platform/exported/web_service_worker_request.cc
index 098272c..cb9afea 100644
--- a/third_party/blink/renderer/platform/exported/web_service_worker_request.cc
+++ b/third_party/blink/renderer/platform/exported/web_service_worker_request.cc
@@ -25,7 +25,7 @@
   scoped_refptr<BlobDataHandle> blob_data_handle;
   Referrer referrer_;
   network::mojom::FetchRequestMode mode_ =
-      network::mojom::FetchRequestMode::kNoCORS;
+      network::mojom::FetchRequestMode::kNoCors;
   bool is_main_resource_load_ = false;
   network::mojom::FetchCredentialsMode credentials_mode_ =
       network::mojom::FetchCredentialsMode::kOmit;
diff --git a/third_party/blink/renderer/platform/exported/web_url_error.cc b/third_party/blink/renderer/platform/exported/web_url_error.cc
index 488a6e3..9bc40c7 100644
--- a/third_party/blink/renderer/platform/exported/web_url_error.cc
+++ b/third_party/blink/renderer/platform/exported/web_url_error.cc
@@ -27,7 +27,7 @@
   DCHECK_NE(reason_, 0);
 }
 
-WebURLError::WebURLError(const network::CORSErrorStatus& cors_error_status,
+WebURLError::WebURLError(const network::CorsErrorStatus& cors_error_status,
                          HasCopyInCache has_copy_in_cache,
                          const WebURL& url)
     : reason_(net::ERR_FAILED),
diff --git a/third_party/blink/renderer/platform/exported/web_url_request.cc b/third_party/blink/renderer/platform/exported/web_url_request.cc
index 4c89398..3dffc2b 100644
--- a/third_party/blink/renderer/platform/exported/web_url_request.cc
+++ b/third_party/blink/renderer/platform/exported/web_url_request.cc
@@ -380,9 +380,9 @@
   return resource_request_->IsExternalRequest();
 }
 
-network::mojom::CORSPreflightPolicy WebURLRequest::GetCORSPreflightPolicy()
+network::mojom::CorsPreflightPolicy WebURLRequest::GetCorsPreflightPolicy()
     const {
-  return resource_request_->CORSPreflightPolicy();
+  return resource_request_->CorsPreflightPolicy();
 }
 
 void WebURLRequest::SetNavigationStartTime(
diff --git a/third_party/blink/renderer/platform/loader/cors/cors.cc b/third_party/blink/renderer/platform/loader/cors/cors.cc
index c6b4166..ceab3bb 100644
--- a/third_party/blink/renderer/platform/loader/cors/cors.cc
+++ b/third_party/blink/renderer/platform/loader/cors/cors.cc
@@ -154,7 +154,7 @@
 
 namespace cors {
 
-base::Optional<network::CORSErrorStatus> CheckAccess(
+base::Optional<network::CorsErrorStatus> CheckAccess(
     const KURL& response_url,
     const int response_status_code,
     const HTTPHeaderMap& response_header,
@@ -168,7 +168,7 @@
       credentials_mode, AsUrlOrigin(origin));
 }
 
-base::Optional<network::CORSErrorStatus> CheckPreflightAccess(
+base::Optional<network::CorsErrorStatus> CheckPreflightAccess(
     const KURL& response_url,
     const int response_status_code,
     const HTTPHeaderMap& response_header,
@@ -182,11 +182,11 @@
       actual_credentials_mode, AsUrlOrigin(origin));
 }
 
-base::Optional<network::CORSErrorStatus> CheckRedirectLocation(
+base::Optional<network::CorsErrorStatus> CheckRedirectLocation(
     const KURL& url,
     network::mojom::FetchRequestMode request_mode,
     const SecurityOrigin* origin,
-    CORSFlag cors_flag) {
+    CorsFlag cors_flag) {
   base::Optional<url::Origin> origin_to_pass;
   if (origin)
     origin_to_pass = AsUrlOrigin(*origin);
@@ -194,25 +194,25 @@
   // Blink-side implementations rewrite the origin instead of setting the
   // tainted flag.
   return network::cors::CheckRedirectLocation(
-      url, request_mode, origin_to_pass, cors_flag == CORSFlag::Set, false);
+      url, request_mode, origin_to_pass, cors_flag == CorsFlag::Set, false);
 }
 
-base::Optional<network::mojom::CORSError> CheckPreflight(
+base::Optional<network::mojom::CorsError> CheckPreflight(
     const int preflight_response_status_code) {
   return network::cors::CheckPreflight(preflight_response_status_code);
 }
 
-base::Optional<network::CORSErrorStatus> CheckExternalPreflight(
+base::Optional<network::CorsErrorStatus> CheckExternalPreflight(
     const HTTPHeaderMap& response_header) {
   return network::cors::CheckExternalPreflight(
       GetHeaderValue(response_header, http_names::kAccessControlAllowExternal));
 }
 
-bool IsCORSEnabledRequestMode(network::mojom::FetchRequestMode request_mode) {
-  return network::cors::IsCORSEnabledRequestMode(request_mode);
+bool IsCorsEnabledRequestMode(network::mojom::FetchRequestMode request_mode) {
+  return network::cors::IsCorsEnabledRequestMode(request_mode);
 }
 
-base::Optional<network::CORSErrorStatus> EnsurePreflightResultAndCacheOnSuccess(
+base::Optional<network::CorsErrorStatus> EnsurePreflightResultAndCacheOnSuccess(
     const HTTPHeaderMap& response_header_map,
     const String& origin,
     const KURL& request_url,
@@ -222,7 +222,7 @@
   DCHECK(!origin.IsNull());
   DCHECK(!request_method.IsNull());
 
-  base::Optional<network::mojom::CORSError> error;
+  base::Optional<network::mojom::CorsError> error;
 
   std::unique_ptr<network::cors::PreflightResult> result =
       network::cors::PreflightResult::Create(
@@ -235,9 +235,9 @@
                                  http_names::kAccessControlMaxAge),
           &error);
   if (error)
-    return network::CORSErrorStatus(*error);
+    return network::CorsErrorStatus(*error);
 
-  base::Optional<network::CORSErrorStatus> status;
+  base::Optional<network::CorsErrorStatus> status;
   status = result->EnsureAllowedCrossOriginMethod(
       std::string(request_method.Ascii().data()));
   if (status)
@@ -276,12 +276,12 @@
     const KURL& url,
     network::mojom::FetchRequestMode request_mode,
     const SecurityOrigin* origin,
-    CORSFlag cors_flag) {
+    CorsFlag cors_flag) {
   base::Optional<url::Origin> origin_to_pass;
   if (origin)
     origin_to_pass = AsUrlOrigin(*origin);
   return network::cors::CalculateResponseTainting(
-      url, request_mode, origin_to_pass, cors_flag == CORSFlag::Set);
+      url, request_mode, origin_to_pass, cors_flag == CorsFlag::Set);
 }
 
 bool CalculateCredentialsFlag(
@@ -291,24 +291,24 @@
                                                  response_tainting);
 }
 
-bool IsCORSSafelistedMethod(const String& method) {
+bool IsCorsSafelistedMethod(const String& method) {
   DCHECK(!method.IsNull());
-  return network::cors::IsCORSSafelistedMethod(WebString(method).Latin1());
+  return network::cors::IsCorsSafelistedMethod(WebString(method).Latin1());
 }
 
-bool IsCORSSafelistedContentType(const String& media_type) {
-  return network::cors::IsCORSSafelistedContentType(
+bool IsCorsSafelistedContentType(const String& media_type) {
+  return network::cors::IsCorsSafelistedContentType(
       WebString(media_type).Latin1());
 }
 
-bool IsNoCORSSafelistedHeader(const String& name, const String& value) {
+bool IsNoCorsSafelistedHeader(const String& name, const String& value) {
   DCHECK(!name.IsNull());
   DCHECK(!value.IsNull());
-  return network::cors::IsNoCORSSafelistedHeader(WebString(name).Latin1(),
+  return network::cors::IsNoCorsSafelistedHeader(WebString(name).Latin1(),
                                                  WebString(value).Latin1());
 }
 
-Vector<String> CORSUnsafeRequestHeaderNames(const HTTPHeaderMap& headers) {
+Vector<String> CorsUnsafeRequestHeaderNames(const HTTPHeaderMap& headers) {
   net::HttpRequestHeaders::HeaderVector in;
   for (const auto& entry : headers) {
     in.push_back(net::HttpRequestHeaders::HeaderKeyValuePair(
@@ -316,7 +316,7 @@
   }
 
   Vector<String> header_names;
-  for (const auto& name : network::cors::CORSUnsafeRequestHeaderNames(in))
+  for (const auto& name : network::cors::CorsUnsafeRequestHeaderNames(in))
     header_names.push_back(WebString::FromLatin1(name));
   return header_names;
 }
@@ -325,12 +325,12 @@
   return network::cors::IsForbiddenHeader(WebString(name).Latin1());
 }
 
-bool ContainsOnlyCORSSafelistedHeaders(const HTTPHeaderMap& header_map) {
-  Vector<String> header_names = CORSUnsafeRequestHeaderNames(header_map);
+bool ContainsOnlyCorsSafelistedHeaders(const HTTPHeaderMap& header_map) {
+  Vector<String> header_names = CorsUnsafeRequestHeaderNames(header_map);
   return header_names.IsEmpty();
 }
 
-bool ContainsOnlyCORSSafelistedOrForbiddenHeaders(
+bool ContainsOnlyCorsSafelistedOrForbiddenHeaders(
     const HTTPHeaderMap& headers) {
   Vector<String> header_names;
 
@@ -341,7 +341,7 @@
   }
   // |is_revalidating| is not needed for blink-side CORS.
   constexpr bool is_revalidating = false;
-  return network::cors::CORSUnsafeNotForbiddenRequestHeaderNames(
+  return network::cors::CorsUnsafeNotForbiddenRequestHeaderNames(
              in, is_revalidating)
       .empty();
 }
@@ -350,11 +350,11 @@
   return network::cors::IsOkStatus(status);
 }
 
-bool CalculateCORSFlag(const KURL& url,
+bool CalculateCorsFlag(const KURL& url,
                        const SecurityOrigin* origin,
                        network::mojom::FetchRequestMode request_mode) {
   if (request_mode == network::mojom::FetchRequestMode::kNavigate ||
-      request_mode == network::mojom::FetchRequestMode::kNoCORS) {
+      request_mode == network::mojom::FetchRequestMode::kNoCors) {
     return false;
   }
   // CORS needs a proper origin (including a unique opaque origin). If the
@@ -408,7 +408,7 @@
 // No-CORS mode is highly discouraged from using it for new features. Only
 // legacy usages for backward compatibility are allowed except for well-designed
 // usages over the fetch API.
-bool IsNoCORSAllowedContext(mojom::RequestContextType context) {
+bool IsNoCorsAllowedContext(mojom::RequestContextType context) {
   switch (context) {
     case mojom::RequestContextType::AUDIO:
     case mojom::RequestContextType::FAVICON:
diff --git a/third_party/blink/renderer/platform/loader/cors/cors.h b/third_party/blink/renderer/platform/loader/cors/cors.h
index 387c2382..425930b9 100644
--- a/third_party/blink/renderer/platform/loader/cors/cors.h
+++ b/third_party/blink/renderer/platform/loader/cors/cors.h
@@ -22,7 +22,7 @@
 class ResourceResponse;
 class SecurityOrigin;
 
-enum class CORSFlag : uint8_t {
+enum class CorsFlag : uint8_t {
   Unset,
   Set,
 };
@@ -33,35 +33,35 @@
 // Thin wrapper functions below are for calling ::network::cors functions from
 // Blink core. Once Out-of-renderer CORS is enabled, following functions will
 // be removed.
-PLATFORM_EXPORT base::Optional<network::CORSErrorStatus> CheckAccess(
+PLATFORM_EXPORT base::Optional<network::CorsErrorStatus> CheckAccess(
     const KURL&,
     const int response_status_code,
     const HTTPHeaderMap&,
     network::mojom::FetchCredentialsMode,
     const SecurityOrigin&);
 
-PLATFORM_EXPORT base::Optional<network::CORSErrorStatus> CheckPreflightAccess(
+PLATFORM_EXPORT base::Optional<network::CorsErrorStatus> CheckPreflightAccess(
     const KURL&,
     const int response_status_code,
     const HTTPHeaderMap&,
     network::mojom::FetchCredentialsMode,
     const SecurityOrigin&);
 
-PLATFORM_EXPORT base::Optional<network::CORSErrorStatus> CheckRedirectLocation(
+PLATFORM_EXPORT base::Optional<network::CorsErrorStatus> CheckRedirectLocation(
     const KURL&,
     network::mojom::FetchRequestMode,
     const SecurityOrigin*,
-    CORSFlag);
+    CorsFlag);
 
-PLATFORM_EXPORT base::Optional<network::mojom::CORSError> CheckPreflight(
+PLATFORM_EXPORT base::Optional<network::mojom::CorsError> CheckPreflight(
     const int preflight_response_status_code);
 
-PLATFORM_EXPORT base::Optional<network::CORSErrorStatus> CheckExternalPreflight(
+PLATFORM_EXPORT base::Optional<network::CorsErrorStatus> CheckExternalPreflight(
     const HTTPHeaderMap&);
 
-PLATFORM_EXPORT bool IsCORSEnabledRequestMode(network::mojom::FetchRequestMode);
+PLATFORM_EXPORT bool IsCorsEnabledRequestMode(network::mojom::FetchRequestMode);
 
-PLATFORM_EXPORT base::Optional<network::CORSErrorStatus>
+PLATFORM_EXPORT base::Optional<network::CorsErrorStatus>
 EnsurePreflightResultAndCacheOnSuccess(
     const HTTPHeaderMap& response_header_map,
     const String& origin,
@@ -81,7 +81,7 @@
     const KURL& url,
     network::mojom::FetchRequestMode request_mode,
     const SecurityOrigin* origin,
-    CORSFlag cors_flag);
+    CorsFlag cors_flag);
 
 PLATFORM_EXPORT bool CalculateCredentialsFlag(
     network::mojom::FetchCredentialsMode credentials_mode,
@@ -89,15 +89,15 @@
 
 // Thin wrapper functions that will not be removed even after out-of-renderer
 // CORS is enabled.
-PLATFORM_EXPORT bool IsCORSSafelistedMethod(const String& method);
-PLATFORM_EXPORT bool IsCORSSafelistedContentType(const String&);
-PLATFORM_EXPORT bool IsNoCORSSafelistedHeader(const String& name,
+PLATFORM_EXPORT bool IsCorsSafelistedMethod(const String& method);
+PLATFORM_EXPORT bool IsCorsSafelistedContentType(const String&);
+PLATFORM_EXPORT bool IsNoCorsSafelistedHeader(const String& name,
                                               const String& value);
-PLATFORM_EXPORT Vector<String> CORSUnsafeRequestHeaderNames(
+PLATFORM_EXPORT Vector<String> CorsUnsafeRequestHeaderNames(
     const HTTPHeaderMap& headers);
 PLATFORM_EXPORT bool IsForbiddenHeaderName(const String& name);
-PLATFORM_EXPORT bool ContainsOnlyCORSSafelistedHeaders(const HTTPHeaderMap&);
-PLATFORM_EXPORT bool ContainsOnlyCORSSafelistedOrForbiddenHeaders(
+PLATFORM_EXPORT bool ContainsOnlyCorsSafelistedHeaders(const HTTPHeaderMap&);
+PLATFORM_EXPORT bool ContainsOnlyCorsSafelistedOrForbiddenHeaders(
     const HTTPHeaderMap&);
 
 PLATFORM_EXPORT bool IsOkStatus(int status);
@@ -106,12 +106,12 @@
 // https://fetch.spec.whatwg.org/. This function is corresponding to the CORS
 // flag setting logic in https://fetch.spec.whatwg.org/#main-fetch.
 // This function can return true even when |request_mode| is |kSameOrigin|.
-// |origin| must not be nullptr when |request_mode| is neither |kNoCORS| nor
+// |origin| must not be nullptr when |request_mode| is neither |kNoCors| nor
 // |kNavigate|.
-// This should be identical to CalculateCORSFlag defined in
+// This should be identical to CalculateCorsFlag defined in
 // //services/network/cors/cors_url_loader.cc.
 // This function will be removed when out-of-renderer CORS is enabled.
-PLATFORM_EXPORT bool CalculateCORSFlag(
+PLATFORM_EXPORT bool CalculateCorsFlag(
     const KURL& url,
     const SecurityOrigin* origin,
     network::mojom::FetchRequestMode request_mode);
@@ -123,7 +123,7 @@
 PLATFORM_EXPORT bool IsOnAccessControlResponseHeaderWhitelist(const String&);
 
 // Checks whether request mode 'no-cors' is allowed for a certain context.
-PLATFORM_EXPORT bool IsNoCORSAllowedContext(mojom::RequestContextType);
+PLATFORM_EXPORT bool IsNoCorsAllowedContext(mojom::RequestContextType);
 
 }  // namespace cors
 
diff --git a/third_party/blink/renderer/platform/loader/cors/cors_error_string.cc b/third_party/blink/renderer/platform/loader/cors/cors_error_string.cc
index 7e00e73..04557df 100644
--- a/third_party/blink/renderer/platform/loader/cors/cors_error_string.cc
+++ b/third_party/blink/renderer/platform/loader/cors/cors_error_string.cc
@@ -29,18 +29,18 @@
   }
 }
 
-bool IsPreflightError(network::mojom::CORSError error_code) {
+bool IsPreflightError(network::mojom::CorsError error_code) {
   switch (error_code) {
-    case network::mojom::CORSError::kPreflightWildcardOriginNotAllowed:
-    case network::mojom::CORSError::kPreflightMissingAllowOriginHeader:
-    case network::mojom::CORSError::kPreflightMultipleAllowOriginValues:
-    case network::mojom::CORSError::kPreflightInvalidAllowOriginValue:
-    case network::mojom::CORSError::kPreflightAllowOriginMismatch:
-    case network::mojom::CORSError::kPreflightInvalidAllowCredentials:
-    case network::mojom::CORSError::kPreflightInvalidStatus:
-    case network::mojom::CORSError::kPreflightDisallowedRedirect:
-    case network::mojom::CORSError::kPreflightMissingAllowExternal:
-    case network::mojom::CORSError::kPreflightInvalidAllowExternal:
+    case network::mojom::CorsError::kPreflightWildcardOriginNotAllowed:
+    case network::mojom::CorsError::kPreflightMissingAllowOriginHeader:
+    case network::mojom::CorsError::kPreflightMultipleAllowOriginValues:
+    case network::mojom::CorsError::kPreflightInvalidAllowOriginValue:
+    case network::mojom::CorsError::kPreflightAllowOriginMismatch:
+    case network::mojom::CorsError::kPreflightInvalidAllowCredentials:
+    case network::mojom::CorsError::kPreflightInvalidStatus:
+    case network::mojom::CorsError::kPreflightDisallowedRedirect:
+    case network::mojom::CorsError::kPreflightMissingAllowExternal:
+    case network::mojom::CorsError::kPreflightInvalidAllowExternal:
       return true;
     default:
       return false;
@@ -49,7 +49,7 @@
 
 }  // namespace
 
-String GetErrorString(const network::CORSErrorStatus& status,
+String GetErrorString(const network::CorsErrorStatus& status,
                       const KURL& initial_request_url,
                       const KURL& last_request_url,
                       const SecurityOrigin& origin,
@@ -61,7 +61,7 @@
       "response serves your needs, set the request's mode to 'no-cors' to "
       "fetch the resource with CORS disabled.";
 
-  using CORSError = network::mojom::CORSError;
+  using CorsError = network::mojom::CorsError;
   const StringView hint(status.failed_parameter.data(),
                         status.failed_parameter.size());
 
@@ -86,14 +86,14 @@
   }
 
   switch (status.cors_error) {
-    case CORSError::kDisallowedByMode:
+    case CorsError::kDisallowedByMode:
       builder.Append("Cross origin requests are not allowed by request mode.");
       break;
-    case CORSError::kInvalidResponse:
+    case CorsError::kInvalidResponse:
       builder.Append("The response is invalid.");
       break;
-    case CORSError::kWildcardOriginNotAllowed:
-    case CORSError::kPreflightWildcardOriginNotAllowed:
+    case CorsError::kWildcardOriginNotAllowed:
+    case CorsError::kPreflightWildcardOriginNotAllowed:
       builder.Append(
           "The value of the 'Access-Control-Allow-Origin' header in the "
           "response must not be the wildcard '*' when the request's "
@@ -104,8 +104,8 @@
             "XMLHttpRequest is controlled by the withCredentials attribute.");
       }
       break;
-    case CORSError::kMissingAllowOriginHeader:
-    case CORSError::kPreflightMissingAllowOriginHeader:
+    case CorsError::kMissingAllowOriginHeader:
+    case CorsError::kPreflightMissingAllowOriginHeader:
       builder.Append(
           "No 'Access-Control-Allow-Origin' header is present on the "
           "requested resource.");
@@ -115,8 +115,8 @@
             "mode to 'no-cors' to fetch the resource with CORS disabled.");
       }
       break;
-    case CORSError::kMultipleAllowOriginValues:
-    case CORSError::kPreflightMultipleAllowOriginValues:
+    case CorsError::kMultipleAllowOriginValues:
+    case CorsError::kPreflightMultipleAllowOriginValues:
       Append(builder,
              {"The 'Access-Control-Allow-Origin' header contains multiple "
               "values '",
@@ -124,23 +124,23 @@
       if (initiator_name == fetch_initiator_type_names::kFetch)
         builder.Append(kNoCorsInformation);
       break;
-    case CORSError::kInvalidAllowOriginValue:
-    case CORSError::kPreflightInvalidAllowOriginValue:
+    case CorsError::kInvalidAllowOriginValue:
+    case CorsError::kPreflightInvalidAllowOriginValue:
       Append(builder, {"The 'Access-Control-Allow-Origin' header contains the "
                        "invalid value '",
                        hint, "'."});
       if (initiator_name == fetch_initiator_type_names::kFetch)
         builder.Append(kNoCorsInformation);
       break;
-    case CORSError::kAllowOriginMismatch:
-    case CORSError::kPreflightAllowOriginMismatch:
+    case CorsError::kAllowOriginMismatch:
+    case CorsError::kPreflightAllowOriginMismatch:
       Append(builder, {"The 'Access-Control-Allow-Origin' header has a value '",
                        hint, "' that is not equal to the supplied origin."});
       if (initiator_name == fetch_initiator_type_names::kFetch)
         builder.Append(kNoCorsInformation);
       break;
-    case CORSError::kInvalidAllowCredentials:
-    case CORSError::kPreflightInvalidAllowCredentials:
+    case CorsError::kInvalidAllowCredentials:
+    case CorsError::kPreflightInvalidAllowCredentials:
       Append(builder,
              {"The value of the 'Access-Control-Allow-Credentials' header in "
               "the response is '",
@@ -154,25 +154,25 @@
             "attribute.");
       }
       break;
-    case CORSError::kCORSDisabledScheme:
+    case CorsError::kCorsDisabledScheme:
       Append(builder,
              {"Cross origin requests are only supported for protocol schemes: ",
-              SchemeRegistry::ListOfCORSEnabledURLSchemes(), "."});
+              SchemeRegistry::ListOfCorsEnabledURLSchemes(), "."});
       break;
-    case CORSError::kPreflightInvalidStatus:
+    case CorsError::kPreflightInvalidStatus:
       builder.Append("It does not have HTTP ok status.");
       break;
-    case CORSError::kPreflightDisallowedRedirect:
+    case CorsError::kPreflightDisallowedRedirect:
       builder.Append("Redirect is not allowed for a preflight request.");
       break;
-    case CORSError::kPreflightMissingAllowExternal:
+    case CorsError::kPreflightMissingAllowExternal:
       builder.Append(
           "No 'Access-Control-Allow-External' header was present in the "
           "preflight response for this external request (This is an "
           "experimental header which is defined in "
           "'https://wicg.github.io/cors-rfc1918/').");
       break;
-    case CORSError::kPreflightInvalidAllowExternal:
+    case CorsError::kPreflightInvalidAllowExternal:
       Append(builder,
              {"The 'Access-Control-Allow-External' header in the preflight "
               "response for this external request had a value of '",
@@ -180,27 +180,27 @@
               "',  not 'true' (This is an experimental header which is defined "
               "in 'https://wicg.github.io/cors-rfc1918/')."});
       break;
-    case CORSError::kInvalidAllowMethodsPreflightResponse:
+    case CorsError::kInvalidAllowMethodsPreflightResponse:
       builder.Append(
           "Cannot parse Access-Control-Allow-Methods response header field in "
           "preflight response.");
       break;
-    case CORSError::kInvalidAllowHeadersPreflightResponse:
+    case CorsError::kInvalidAllowHeadersPreflightResponse:
       builder.Append(
           "Cannot parse Access-Control-Allow-Headers response header field in "
           "preflight response.");
       break;
-    case CORSError::kMethodDisallowedByPreflightResponse:
+    case CorsError::kMethodDisallowedByPreflightResponse:
       Append(builder, {"Method ", hint,
                        " is not allowed by Access-Control-Allow-Methods in "
                        "preflight response."});
       break;
-    case CORSError::kHeaderDisallowedByPreflightResponse:
+    case CorsError::kHeaderDisallowedByPreflightResponse:
       Append(builder, {"Request header field ", hint,
                        " is not allowed by "
                        "Access-Control-Allow-Headers in preflight response."});
       break;
-    case CORSError::kRedirectContainsCredentials:
+    case CorsError::kRedirectContainsCredentials:
       Append(builder, {"Redirect location '", hint,
                        "' contains a username and password, which is "
                        "disallowed for cross-origin requests."});
diff --git a/third_party/blink/renderer/platform/loader/cors/cors_error_string.h b/third_party/blink/renderer/platform/loader/cors/cors_error_string.h
index 45aca5d..f9e8664f1 100644
--- a/third_party/blink/renderer/platform/loader/cors/cors_error_string.h
+++ b/third_party/blink/renderer/platform/loader/cors/cors_error_string.h
@@ -21,9 +21,9 @@
 // CORS error strings related utility functions.
 namespace cors {
 
-// Stringify CORSError mainly for inspector messages. Generated string should
+// Stringify CorsError mainly for inspector messages. Generated string should
 // not be exposed to JavaScript for security reasons.
-PLATFORM_EXPORT String GetErrorString(const network::CORSErrorStatus& status,
+PLATFORM_EXPORT String GetErrorString(const network::CorsErrorStatus& status,
                                       const KURL& initial_request_url,
                                       const KURL& last_request_url,
                                       const SecurityOrigin& origin,
diff --git a/third_party/blink/renderer/platform/loader/cors/cors_test.cc b/third_party/blink/renderer/platform/loader/cors/cors_test.cc
index 9a6062e..718a51f 100644
--- a/third_party/blink/renderer/platform/loader/cors/cors_test.cc
+++ b/third_party/blink/renderer/platform/loader/cors/cors_test.cc
@@ -11,7 +11,7 @@
 
 namespace {
 
-class CORSExposedHeadersTest : public testing::Test {
+class CorsExposedHeadersTest : public testing::Test {
  public:
   using CredentialsMode = network::mojom::FetchCredentialsMode;
 
@@ -24,7 +24,7 @@
   }
 };
 
-TEST_F(CORSExposedHeadersTest, ValidInput) {
+TEST_F(CorsExposedHeadersTest, ValidInput) {
   EXPECT_EQ(Parse(CredentialsMode::kOmit, "valid"),
             WebHTTPHeaderSet({"valid"}));
 
@@ -37,14 +37,14 @@
             WebHTTPHeaderSet({"a"}));
 }
 
-TEST_F(CORSExposedHeadersTest, DuplicatedEntries) {
+TEST_F(CorsExposedHeadersTest, DuplicatedEntries) {
   EXPECT_EQ(Parse(CredentialsMode::kOmit, "a, a"), WebHTTPHeaderSet{"a"});
 
   EXPECT_EQ(Parse(CredentialsMode::kOmit, "a, a, b"),
             WebHTTPHeaderSet({"a", "b"}));
 }
 
-TEST_F(CORSExposedHeadersTest, InvalidInput) {
+TEST_F(CorsExposedHeadersTest, InvalidInput) {
   EXPECT_TRUE(Parse(CredentialsMode::kOmit, "not valid").empty());
 
   EXPECT_TRUE(Parse(CredentialsMode::kOmit, "///").empty());
@@ -69,7 +69,7 @@
           .empty());
 }
 
-TEST_F(CORSExposedHeadersTest, Wildcard) {
+TEST_F(CorsExposedHeadersTest, Wildcard) {
   ResourceResponse response;
   response.AddHTTPHeaderField("access-control-expose-headers", "a, b, *");
   response.AddHTTPHeaderField("b", "-");
@@ -87,7 +87,7 @@
       WebHTTPHeaderSet({"access-control-expose-headers", "b", "c", "d", "*"}));
 }
 
-TEST_F(CORSExposedHeadersTest, Asterisk) {
+TEST_F(CorsExposedHeadersTest, Asterisk) {
   ResourceResponse response;
   response.AddHTTPHeaderField("access-control-expose-headers", "a, b, *");
   response.AddHTTPHeaderField("b", "-");
diff --git a/third_party/blink/renderer/platform/loader/fetch/fetch_parameters.cc b/third_party/blink/renderer/platform/loader/fetch/fetch_parameters.cc
index d704559..497d88b 100644
--- a/third_party/blink/renderer/platform/loader/fetch/fetch_parameters.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/fetch_parameters.cc
@@ -75,7 +75,7 @@
   // Currently FetchParametersMode is only used when the request goes to
   // Service Worker.
   resource_request_.SetFetchRequestMode(
-      network::mojom::FetchRequestMode::kCORS);
+      network::mojom::FetchRequestMode::kCors);
   resource_request_.SetFetchCredentialsMode(credentials_mode);
 
   resource_request_.SetRequestorOrigin(origin);
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource.cc b/third_party/blink/renderer/platform/loader/fetch/resource.cc
index 192d1cd..a2b6cf2 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/resource.cc
@@ -809,7 +809,7 @@
   if (GetResponse().WasFetchedViaServiceWorker() &&
       GetResponse().GetType() == network::mojom::FetchResponseType::kOpaque &&
       new_request.GetFetchRequestMode() !=
-          network::mojom::FetchRequestMode::kNoCORS) {
+          network::mojom::FetchRequestMode::kNoCors) {
     return MatchStatus::kUnknownFailure;
   }
 
@@ -895,13 +895,13 @@
     return MatchStatus::kRequestModeDoesNotMatch;
 
   switch (new_mode) {
-    case network::mojom::FetchRequestMode::kNoCORS:
+    case network::mojom::FetchRequestMode::kNoCors:
     case network::mojom::FetchRequestMode::kNavigate:
       break;
 
-    case network::mojom::FetchRequestMode::kCORS:
+    case network::mojom::FetchRequestMode::kCors:
     case network::mojom::FetchRequestMode::kSameOrigin:
-    case network::mojom::FetchRequestMode::kCORSWithForcedPreflight:
+    case network::mojom::FetchRequestMode::kCorsWithForcedPreflight:
       // We have two separate CORS handling logics in ThreadableLoader
       // and ResourceLoader and sharing resources is difficult when they are
       // handled differently.
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_error.cc b/third_party/blink/renderer/platform/loader/fetch/resource_error.cc
index 1670ba04..ca115e69 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_error.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_error.cc
@@ -84,7 +84,7 @@
 ResourceError::ResourceError(
     int error_code,
     const KURL& url,
-    base::Optional<network::CORSErrorStatus> cors_error_status)
+    base::Optional<network::CorsErrorStatus> cors_error_status)
     : error_code_(error_code),
       failing_url_(url),
       is_access_check_(cors_error_status.has_value()),
@@ -94,7 +94,7 @@
 }
 
 ResourceError::ResourceError(const KURL& url,
-                             const network::CORSErrorStatus& cors_error_status)
+                             const network::CorsErrorStatus& cors_error_status)
     : ResourceError(net::ERR_FAILED, url, cors_error_status) {}
 
 ResourceError::ResourceError(const WebURLError& error)
@@ -151,7 +151,7 @@
   if (a.HasCopyInCache() != b.HasCopyInCache())
     return false;
 
-  if (a.CORSErrorStatus() != b.CORSErrorStatus())
+  if (a.CorsErrorStatus() != b.CorsErrorStatus())
     return false;
 
   if (a.extended_error_code_ != b.extended_error_code_)
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_error.h b/third_party/blink/renderer/platform/loader/fetch/resource_error.h
index 8917c2f..b50e630 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_error.h
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_error.h
@@ -63,9 +63,9 @@
   // |error_code| must not be 0.
   ResourceError(int error_code,
                 const KURL& failing_url,
-                base::Optional<network::CORSErrorStatus>);
+                base::Optional<network::CorsErrorStatus>);
   ResourceError(const KURL& failing_url,
-                const network::CORSErrorStatus& status);
+                const network::CorsErrorStatus& status);
   ResourceError(const WebURLError&);
 
   // Makes a deep copy. Useful for when you need to use a ResourceError on
@@ -86,7 +86,7 @@
   base::Optional<ResourceRequestBlockedReason> GetResourceRequestBlockedReason()
       const;
 
-  base::Optional<network::CORSErrorStatus> CORSErrorStatus() const {
+  base::Optional<network::CorsErrorStatus> CorsErrorStatus() const {
     return cors_error_status_;
   }
 
@@ -107,7 +107,7 @@
   bool is_access_check_ = false;
   bool has_copy_in_cache_ = false;
   bool blocked_by_subresource_filter_ = false;
-  base::Optional<network::CORSErrorStatus> cors_error_status_;
+  base::Optional<network::CorsErrorStatus> cors_error_status_;
 };
 
 inline bool operator==(const ResourceError& a, const ResourceError& b) {
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_fetcher.cc b/third_party/blink/renderer/platform/loader/fetch/resource_fetcher.cc
index 0dccfd51..be092d8 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_fetcher.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_fetcher.cc
@@ -788,13 +788,13 @@
   if (!params.Url().IsValid())
     return ResourceRequestBlockedReason::kOther;
 
-  if (!RuntimeEnabledFeatures::OutOfBlinkCORSEnabled() &&
+  if (!RuntimeEnabledFeatures::OutOfBlinkCorsEnabled() &&
       options.cors_handling_by_resource_fetcher ==
-          kEnableCORSHandlingByResourceFetcher) {
+          kEnableCorsHandlingByResourceFetcher) {
     const scoped_refptr<const SecurityOrigin> origin =
         resource_request.RequestorOrigin();
     DCHECK(!options.cors_flag);
-    params.MutableOptions().cors_flag = cors::CalculateCORSFlag(
+    params.MutableOptions().cors_flag = cors::CalculateCorsFlag(
         params.Url(), origin.get(), resource_request.GetFetchRequestMode());
     // TODO(yhirano): Reject requests for non CORS-enabled schemes.
     // See https://crrev.com/c/1298828.
@@ -802,10 +802,10 @@
         resource_request.GetFetchCredentialsMode(),
         cors::CalculateResponseTainting(
             params.Url(), resource_request.GetFetchRequestMode(), origin.get(),
-            params.Options().cors_flag ? CORSFlag::Set : CORSFlag::Unset)));
+            params.Options().cors_flag ? CorsFlag::Set : CorsFlag::Unset)));
   }
 
-  if (RuntimeEnabledFeatures::OutOfBlinkCORSEnabled() &&
+  if (RuntimeEnabledFeatures::OutOfBlinkCorsEnabled() &&
       resource_request.GetFetchCredentialsMode() ==
           network::mojom::FetchCredentialsMode::kOmit) {
     // See comments at network::ResourceRequest::fetch_credentials_mode.
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_loader.cc b/third_party/blink/renderer/platform/loader/fetch/resource_loader.cc
index 9945505f..3198a25 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_loader.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_loader.cc
@@ -389,11 +389,11 @@
     throttle_option = ResourceLoadScheduler::ThrottleOption::kStoppable;
   }
 
-  if (ShouldCheckCORSInResourceLoader()) {
+  if (ShouldCheckCorsInResourceLoader()) {
     const auto origin = resource_->GetOrigin();
     response_tainting_ = cors::CalculateResponseTainting(
         request.Url(), request.GetFetchRequestMode(), origin.get(),
-        GetCORSFlag() ? CORSFlag::Set : CORSFlag::Unset);
+        GetCorsFlag() ? CorsFlag::Set : CorsFlag::Unset);
   }
 
   if (request.IsAutomaticUpgrade()) {
@@ -610,13 +610,13 @@
       return false;
     }
 
-    if (ShouldCheckCORSInResourceLoader()) {
+    if (ShouldCheckCorsInResourceLoader()) {
       scoped_refptr<const SecurityOrigin> origin = resource_->GetOrigin();
-      base::Optional<network::CORSErrorStatus> cors_error =
+      base::Optional<network::CorsErrorStatus> cors_error =
           cors::CheckRedirectLocation(
               new_url, fetch_request_mode, origin.get(),
-              GetCORSFlag() ? CORSFlag::Set : CORSFlag::Unset);
-      if (!cors_error && GetCORSFlag()) {
+              GetCorsFlag() ? CorsFlag::Set : CorsFlag::Unset);
+      if (!cors_error && GetCorsFlag()) {
         cors_error =
             cors::CheckAccess(new_url, redirect_response.HttpStatusCode(),
                               redirect_response.HttpHeaderFields(),
@@ -652,7 +652,7 @@
                                            cross_origin);
 
   base::Optional<ResourceResponse> redirect_response_with_type;
-  if (ShouldCheckCORSInResourceLoader()) {
+  if (ShouldCheckCorsInResourceLoader()) {
     new_request->SetAllowStoredCredentials(cors::CalculateCredentialsFlag(
         fetch_credentials_mode, response_tainting_));
     if (!redirect_response.WasFetchedViaServiceWorker()) {
@@ -717,24 +717,24 @@
     return false;
   }
 
-  if (ShouldCheckCORSInResourceLoader()) {
+  if (ShouldCheckCorsInResourceLoader()) {
     bool new_cors_flag =
-        GetCORSFlag() || cors::CalculateCORSFlag(new_request->Url(),
+        GetCorsFlag() || cors::CalculateCorsFlag(new_request->Url(),
                                                  resource_->GetOrigin().get(),
                                                  fetch_request_mode);
     resource_->MutableOptions().cors_flag = new_cors_flag;
     // Cross-origin requests are only allowed certain registered schemes.
-    if (GetCORSFlag() && !SchemeRegistry::ShouldTreatURLSchemeAsCORSEnabled(
+    if (GetCorsFlag() && !SchemeRegistry::ShouldTreatURLSchemeAsCorsEnabled(
                              new_request->Url().Protocol())) {
       HandleError(
           ResourceError(new_request->Url(),
-                        network::CORSErrorStatus(
-                            network::mojom::CORSError::kCORSDisabledScheme)));
+                        network::CorsErrorStatus(
+                            network::mojom::CorsError::kCorsDisabledScheme)));
       return false;
     }
     response_tainting_ = cors::CalculateResponseTainting(
         new_request->Url(), fetch_request_mode, resource_->GetOrigin().get(),
-        GetCORSFlag() ? CORSFlag::Set : CORSFlag::Unset);
+        GetCorsFlag() ? CorsFlag::Set : CorsFlag::Unset);
   }
 
   report_raw_headers = new_request->ReportRawHeaders();
@@ -827,8 +827,8 @@
 
   if (response.WasFetchedViaServiceWorker()) {
     if (options.cors_handling_by_resource_fetcher ==
-            kEnableCORSHandlingByResourceFetcher &&
-        fetch_request_mode == network::mojom::FetchRequestMode::kCORS &&
+            kEnableCorsHandlingByResourceFetcher &&
+        fetch_request_mode == network::mojom::FetchRequestMode::kCors &&
         response.WasFallbackRequiredByServiceWorker()) {
       ResourceRequest last_request = resource_->LastResourceRequest();
       DCHECK(!last_request.GetSkipServiceWorker());
@@ -871,11 +871,11 @@
   }
 
   base::Optional<ResourceResponse> response_with_type;
-  if (ShouldCheckCORSInResourceLoader() &&
+  if (ShouldCheckCorsInResourceLoader() &&
       !response.WasFetchedViaServiceWorker() &&
       !(resource_->IsCacheValidator() && response.HttpStatusCode() == 304)) {
-    if (GetCORSFlag()) {
-      base::Optional<network::CORSErrorStatus> cors_error = cors::CheckAccess(
+    if (GetCorsFlag()) {
+      base::Optional<network::CorsErrorStatus> cors_error = cors::CheckAccess(
           response.Url(), response.HttpStatusCode(),
           response.HttpHeaderFields(),
           initial_request.GetFetchCredentialsMode(), *resource_->GetOrigin());
@@ -1029,10 +1029,10 @@
     Restart(resource_->GetResourceRequest());
     return;
   }
-  if (error.CORSErrorStatus()) {
+  if (error.CorsErrorStatus()) {
     Context().AddErrorConsoleMessage(
         cors::GetErrorString(
-            *error.CORSErrorStatus(), resource_->GetResourceRequest().Url(),
+            *error.CorsErrorStatus(), resource_->GetResourceRequest().Url(),
             resource_->LastResourceRequest().Url(), *resource_->GetOrigin(),
             resource_->GetType(), resource_->Options().initiator_info.name),
         FetchContext::kJSSource);
@@ -1218,10 +1218,10 @@
   return base::nullopt;
 }
 
-bool ResourceLoader::ShouldCheckCORSInResourceLoader() const {
-  return !RuntimeEnabledFeatures::OutOfBlinkCORSEnabled() &&
+bool ResourceLoader::ShouldCheckCorsInResourceLoader() const {
+  return !RuntimeEnabledFeatures::OutOfBlinkCorsEnabled() &&
          resource_->Options().cors_handling_by_resource_fetcher ==
-             kEnableCORSHandlingByResourceFetcher;
+             kEnableCorsHandlingByResourceFetcher;
 }
 
 }  // namespace blink
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_loader.h b/third_party/blink/renderer/platform/loader/fetch/resource_loader.h
index 308456b..d509ab9 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_loader.h
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_loader.h
@@ -178,13 +178,13 @@
   void OnProgress(uint64_t delta) override;
   void FinishedCreatingBlob(const scoped_refptr<BlobDataHandle>&);
 
-  bool GetCORSFlag() const { return resource_->Options().cors_flag; }
+  bool GetCorsFlag() const { return resource_->Options().cors_flag; }
 
   base::Optional<ResourceRequestBlockedReason> CheckResponseNosniff(
       mojom::RequestContextType,
       const ResourceResponse&) const;
 
-  bool ShouldCheckCORSInResourceLoader() const;
+  bool ShouldCheckCorsInResourceLoader() const;
 
   std::unique_ptr<WebURLLoader> loader_;
   ResourceLoadScheduler::ClientId scheduler_client_id_;
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_loader_options.h b/third_party/blink/renderer/platform/loader/fetch/resource_loader_options.h
index df851a8c..07983d1 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_loader_options.h
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_loader_options.h
@@ -59,9 +59,9 @@
 
 // Used by the ThreadableLoader to turn off part of the CORS handling
 // logic in the ResourceFetcher to use its own CORS handling logic.
-enum CORSHandlingByResourceFetcher {
-  kDisableCORSHandlingByResourceFetcher,
-  kEnableCORSHandlingByResourceFetcher,
+enum CorsHandlingByResourceFetcher {
+  kDisableCorsHandlingByResourceFetcher,
+  kEnableCorsHandlingByResourceFetcher,
 };
 
 // Was the request generated from a "parser-inserted" element?
@@ -83,7 +83,7 @@
         content_security_policy_option(kCheckContentSecurityPolicy),
         request_initiator_context(kDocumentContext),
         synchronous_policy(kRequestAsynchronously),
-        cors_handling_by_resource_fetcher(kEnableCORSHandlingByResourceFetcher),
+        cors_handling_by_resource_fetcher(kEnableCorsHandlingByResourceFetcher),
         cors_flag(false),
         parser_disposition(kParserInserted),
         cache_aware_loading_enabled(kNotCacheAwareLoadingEnabled) {}
@@ -96,10 +96,10 @@
   RequestInitiatorContext request_initiator_context;
   SynchronousPolicy synchronous_policy;
 
-  // When set to kDisableCORSHandlingByResourceFetcher, the ResourceFetcher
+  // When set to kDisableCorsHandlingByResourceFetcher, the ResourceFetcher
   // suppresses part of its CORS handling logic.
   // Used by ThreadableLoader which does CORS handling by itself.
-  CORSHandlingByResourceFetcher cors_handling_by_resource_fetcher;
+  CorsHandlingByResourceFetcher cors_handling_by_resource_fetcher;
 
   // Corresponds to the CORS flag in the Fetch spec.
   bool cors_flag;
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_loader_test.cc b/third_party/blink/renderer/platform/loader/fetch/resource_loader_test.cc
index 712f78c7..274bcb8 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_loader_test.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_loader_test.cc
@@ -106,8 +106,8 @@
 }
 
 TEST_F(ResourceLoaderTest, ResponseType) {
-  // This test will be trivial if EnableOutOfBlinkCORS is enabled.
-  WebRuntimeFeatures::EnableOutOfBlinkCORS(false);
+  // This test will be trivial if EnableOutOfBlinkCors is enabled.
+  WebRuntimeFeatures::EnableOutOfBlinkCors(false);
 
   const scoped_refptr<const SecurityOrigin> origin =
       SecurityOrigin::Create(foo_url_);
@@ -117,40 +117,40 @@
 
   TestCase cases[] = {
       // Same origin response:
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kNetwork, no_origin,
+      {same_origin_url, FetchRequestMode::kNoCors, From::kNetwork, no_origin,
        FetchResponseType::kDefault, FetchResponseType::kBasic},
-      {same_origin_url, FetchRequestMode::kCORS, From::kNetwork, no_origin,
+      {same_origin_url, FetchRequestMode::kCors, From::kNetwork, no_origin,
        FetchResponseType::kDefault, FetchResponseType::kBasic},
 
       // Cross origin, no-cors:
-      {cross_origin_url, FetchRequestMode::kNoCORS, From::kNetwork, no_origin,
+      {cross_origin_url, FetchRequestMode::kNoCors, From::kNetwork, no_origin,
        FetchResponseType::kDefault, FetchResponseType::kOpaque},
 
       // Cross origin, cors:
-      {cross_origin_url, FetchRequestMode::kCORS, From::kNetwork, origin,
-       FetchResponseType::kDefault, FetchResponseType::kCORS},
-      {cross_origin_url, FetchRequestMode::kCORS, From::kNetwork, no_origin,
+      {cross_origin_url, FetchRequestMode::kCors, From::kNetwork, origin,
+       FetchResponseType::kDefault, FetchResponseType::kCors},
+      {cross_origin_url, FetchRequestMode::kCors, From::kNetwork, no_origin,
        FetchResponseType::kDefault, FetchResponseType::kError},
 
       // From service worker, no-cors:
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kServiceWorker,
+      {same_origin_url, FetchRequestMode::kNoCors, From::kServiceWorker,
        no_origin, FetchResponseType::kBasic, FetchResponseType::kBasic},
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kServiceWorker,
-       no_origin, FetchResponseType::kCORS, FetchResponseType::kCORS},
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kServiceWorker,
+      {same_origin_url, FetchRequestMode::kNoCors, From::kServiceWorker,
+       no_origin, FetchResponseType::kCors, FetchResponseType::kCors},
+      {same_origin_url, FetchRequestMode::kNoCors, From::kServiceWorker,
        no_origin, FetchResponseType::kDefault, FetchResponseType::kDefault},
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kServiceWorker,
+      {same_origin_url, FetchRequestMode::kNoCors, From::kServiceWorker,
        no_origin, FetchResponseType::kOpaque, FetchResponseType::kOpaque},
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kServiceWorker,
+      {same_origin_url, FetchRequestMode::kNoCors, From::kServiceWorker,
        no_origin, FetchResponseType::kOpaqueRedirect,
        FetchResponseType::kOpaqueRedirect},
 
       // From service worker, cors:
-      {same_origin_url, FetchRequestMode::kCORS, From::kServiceWorker,
+      {same_origin_url, FetchRequestMode::kCors, From::kServiceWorker,
        no_origin, FetchResponseType::kBasic, FetchResponseType::kBasic},
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kServiceWorker,
-       no_origin, FetchResponseType::kCORS, FetchResponseType::kCORS},
-      {same_origin_url, FetchRequestMode::kNoCORS, From::kServiceWorker,
+      {same_origin_url, FetchRequestMode::kNoCors, From::kServiceWorker,
+       no_origin, FetchResponseType::kCors, FetchResponseType::kCors},
+      {same_origin_url, FetchRequestMode::kNoCors, From::kServiceWorker,
        no_origin, FetchResponseType::kDefault, FetchResponseType::kDefault},
   };
 
@@ -173,7 +173,7 @@
     request.SetRequestContext(mojom::RequestContextType::FETCH);
 
     FetchParameters fetch_parameters(request);
-    if (test.request_mode == network::mojom::FetchRequestMode::kCORS) {
+    if (test.request_mode == network::mojom::FetchRequestMode::kCors) {
       fetch_parameters.SetCrossOriginAccessControl(
           origin.get(), network::mojom::FetchCredentialsMode::kOmit);
     }
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_request.cc b/third_party/blink/renderer/platform/loader/fetch/resource_request.cc
index a07607c07..25acb5f 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_request.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_request.cc
@@ -70,7 +70,7 @@
       previews_state_(WebURLRequest::kPreviewsUnspecified),
       request_context_(mojom::RequestContextType::UNSPECIFIED),
       frame_type_(network::mojom::RequestContextFrameType::kNone),
-      fetch_request_mode_(network::mojom::FetchRequestMode::kNoCORS),
+      fetch_request_mode_(network::mojom::FetchRequestMode::kNoCors),
       fetch_importance_mode_(mojom::FetchImportanceMode::kImportanceAuto),
       fetch_credentials_mode_(network::mojom::FetchCredentialsMode::kInclude),
       fetch_redirect_mode_(network::mojom::FetchRedirectMode::kFollow),
@@ -80,7 +80,7 @@
       was_discarded_(false),
       is_external_request_(false),
       cors_preflight_policy_(
-          network::mojom::CORSPreflightPolicy::kConsiderPreflight),
+          network::mojom::CorsPreflightPolicy::kConsiderPreflight),
       redirect_status_(RedirectStatus::kNoRedirect) {}
 
 ResourceRequest::ResourceRequest(const ResourceRequest&) = default;
@@ -124,7 +124,7 @@
   if (request->HttpMethod() == HttpMethod())
     request->SetHTTPBody(HttpBody());
   request->SetWasDiscarded(WasDiscarded());
-  request->SetCORSPreflightPolicy(CORSPreflightPolicy());
+  request->SetCorsPreflightPolicy(CorsPreflightPolicy());
   if (IsAdResource())
     request->SetIsAdResource();
   request->SetInitiatorCSP(GetInitiatorCSP());
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_request.h b/third_party/blink/renderer/platform/loader/fetch/resource_request.h
index 4dc1e656..0614567b 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_request.h
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_request.h
@@ -339,10 +339,10 @@
   bool IsExternalRequest() const { return is_external_request_; }
   void SetExternalRequestStateFromRequestorAddressSpace(mojom::IPAddressSpace);
 
-  network::mojom::CORSPreflightPolicy CORSPreflightPolicy() const {
+  network::mojom::CorsPreflightPolicy CorsPreflightPolicy() const {
     return cors_preflight_policy_;
   }
-  void SetCORSPreflightPolicy(network::mojom::CORSPreflightPolicy policy) {
+  void SetCorsPreflightPolicy(network::mojom::CorsPreflightPolicy policy) {
     cors_preflight_policy_ = policy;
   }
 
@@ -461,7 +461,7 @@
   bool did_set_http_referrer_;
   bool was_discarded_;
   bool is_external_request_;
-  network::mojom::CORSPreflightPolicy cors_preflight_policy_;
+  network::mojom::CorsPreflightPolicy cors_preflight_policy_;
   RedirectStatus redirect_status_;
   base::Optional<String> suggested_filename_;
 
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_response.cc b/third_party/blink/renderer/platform/loader/fetch/resource_response.cc
index ae7b255..efc1e816 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_response.cc
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_response.cc
@@ -402,7 +402,7 @@
 }
 
 bool ResourceResponse::IsOpaqueResponseFromServiceWorker() const {
-  return IsCORSCrossOrigin() && WasFetchedViaServiceWorker();
+  return IsCorsCrossOrigin() && WasFetchedViaServiceWorker();
 }
 
 KURL ResourceResponse::OriginalURLViaServiceWorker() const {
diff --git a/third_party/blink/renderer/platform/loader/fetch/resource_response.h b/third_party/blink/renderer/platform/loader/fetch/resource_response.h
index 5447f4e5..b1fe3f58 100644
--- a/third_party/blink/renderer/platform/loader/fetch/resource_response.h
+++ b/third_party/blink/renderer/platform/loader/fetch/resource_response.h
@@ -302,12 +302,12 @@
   }
   bool IsOpaqueResponseFromServiceWorker() const;
   // https://html.spec.whatwg.org/#cors-same-origin
-  bool IsCORSSameOrigin() const {
-    return network::cors::IsCORSSameOriginResponseType(response_type_);
+  bool IsCorsSameOrigin() const {
+    return network::cors::IsCorsSameOriginResponseType(response_type_);
   }
   // https://html.spec.whatwg.org/#cors-cross-origin
-  bool IsCORSCrossOrigin() const {
-    return network::cors::IsCORSCrossOriginResponseType(response_type_);
+  bool IsCorsCrossOrigin() const {
+    return network::cors::IsCorsCrossOriginResponseType(response_type_);
   }
 
   // See ServiceWorkerResponseInfo::url_list_via_service_worker.
diff --git a/third_party/blink/renderer/platform/loader/subresource_integrity.cc b/third_party/blink/renderer/platform/loader/subresource_integrity.cc
index dbaaeb5..fa1a4fb 100644
--- a/third_party/blink/renderer/platform/loader/subresource_integrity.cc
+++ b/third_party/blink/renderer/platform/loader/subresource_integrity.cc
@@ -80,7 +80,7 @@
   // FetchResponseType::kError never arrives because it is a loading error.
   DCHECK_NE(resource.GetResponse().GetType(),
             network::mojom::FetchResponseType::kError);
-  if (!resource.GetResponse().IsCORSSameOrigin()) {
+  if (!resource.GetResponse().IsCorsSameOrigin()) {
     report_info.AddConsoleErrorMessage(
         "Subresource Integrity: The resource '" + resource_url.ElidedString() +
         "' has an integrity attribute, but the resource "
diff --git a/third_party/blink/renderer/platform/loader/subresource_integrity_test.cc b/third_party/blink/renderer/platform/loader/subresource_integrity_test.cc
index 5ef60f6..ec90823 100644
--- a/third_party/blink/renderer/platform/loader/subresource_integrity_test.cc
+++ b/third_party/blink/renderer/platform/loader/subresource_integrity_test.cc
@@ -538,20 +538,20 @@
 
   const TestCase cases[] = {
       // FetchResponseType::kError never arrives because it is a loading error.
-      {url, FetchRequestMode::kNoCORS, FetchResponseType::kBasic, kOk},
-      {url, FetchRequestMode::kNoCORS, FetchResponseType::kCORS, kOk},
-      {url, FetchRequestMode::kNoCORS, FetchResponseType::kDefault, kOk},
-      {url, FetchRequestMode::kNoCORS, FetchResponseType::kOpaque, kFail},
-      {url, FetchRequestMode::kNoCORS, FetchResponseType::kOpaqueRedirect,
+      {url, FetchRequestMode::kNoCors, FetchResponseType::kBasic, kOk},
+      {url, FetchRequestMode::kNoCors, FetchResponseType::kCors, kOk},
+      {url, FetchRequestMode::kNoCors, FetchResponseType::kDefault, kOk},
+      {url, FetchRequestMode::kNoCors, FetchResponseType::kOpaque, kFail},
+      {url, FetchRequestMode::kNoCors, FetchResponseType::kOpaqueRedirect,
        kFail},
 
       // FetchResponseType::kError never arrives because it is a loading error.
       // FetchResponseType::kOpaque and FetchResponseType::kOpaqueResponse
       // never arrives: even when service worker is involved, it's handled as
       // an error.
-      {url, FetchRequestMode::kCORS, FetchResponseType::kBasic, kOk},
-      {url, FetchRequestMode::kCORS, FetchResponseType::kCORS, kOk},
-      {url, FetchRequestMode::kCORS, FetchResponseType::kDefault, kOk},
+      {url, FetchRequestMode::kCors, FetchResponseType::kBasic, kOk},
+      {url, FetchRequestMode::kCors, FetchResponseType::kCors, kOk},
+      {url, FetchRequestMode::kCors, FetchResponseType::kDefault, kOk},
   };
 
   MockWebCryptoDigestorFactory factory_sha256(
diff --git a/third_party/blink/renderer/platform/runtime_enabled_features.json5 b/third_party/blink/renderer/platform/runtime_enabled_features.json5
index 10e6efb..858ee55 100644
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
@@ -890,7 +890,7 @@
       implied_by: ["OriginTrialsSampleAPI"],
     },
     {
-      name: "OutOfBlinkCORS",
+      name: "OutOfBlinkCors",
     },
     {
       name: "OverflowIconsForMediaControls",
diff --git a/third_party/blink/renderer/platform/testing/empty_web_media_player.cc b/third_party/blink/renderer/platform/testing/empty_web_media_player.cc
index 10ed823d..76f39b5 100644
--- a/third_party/blink/renderer/platform/testing/empty_web_media_player.cc
+++ b/third_party/blink/renderer/platform/testing/empty_web_media_player.cc
@@ -10,7 +10,7 @@
 namespace blink {
 
 WebMediaPlayer::LoadTiming
-EmptyWebMediaPlayer::Load(LoadType, const WebMediaPlayerSource&, CORSMode) {
+EmptyWebMediaPlayer::Load(LoadType, const WebMediaPlayerSource&, CorsMode) {
   return LoadTiming::kImmediate;
 }
 
diff --git a/third_party/blink/renderer/platform/testing/empty_web_media_player.h b/third_party/blink/renderer/platform/testing/empty_web_media_player.h
index 86bef319..205fde9 100644
--- a/third_party/blink/renderer/platform/testing/empty_web_media_player.h
+++ b/third_party/blink/renderer/platform/testing/empty_web_media_player.h
@@ -22,7 +22,7 @@
  public:
   ~EmptyWebMediaPlayer() override = default;
 
-  LoadTiming Load(LoadType, const WebMediaPlayerSource&, CORSMode) override;
+  LoadTiming Load(LoadType, const WebMediaPlayerSource&, CorsMode) override;
   void Play() override {}
   void Pause() override {}
   void Seek(double seconds) override {}
diff --git a/third_party/blink/renderer/platform/weborigin/origin_access_entry.cc b/third_party/blink/renderer/platform/weborigin/origin_access_entry.cc
index bba1484e..79e558fd 100644
--- a/third_party/blink/renderer/platform/weborigin/origin_access_entry.cc
+++ b/third_party/blink/renderer/platform/weborigin/origin_access_entry.cc
@@ -39,7 +39,7 @@
     const String& protocol,
     const String& host,
     network::cors::OriginAccessEntry::MatchMode match_mode,
-    network::mojom::CORSOriginAccessMatchPriority priority)
+    network::mojom::CorsOriginAccessMatchPriority priority)
     : private_(std::string(protocol.Utf8().data()),
                std::string(host.Utf8().data()),
                match_mode,
diff --git a/third_party/blink/renderer/platform/weborigin/origin_access_entry.h b/third_party/blink/renderer/platform/weborigin/origin_access_entry.h
index 7b7ae44..e876f883 100644
--- a/third_party/blink/renderer/platform/weborigin/origin_access_entry.h
+++ b/third_party/blink/renderer/platform/weborigin/origin_access_entry.h
@@ -55,8 +55,8 @@
       const String& protocol,
       const String& host,
       network::cors::OriginAccessEntry::MatchMode,
-      network::mojom::CORSOriginAccessMatchPriority priority =
-          network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority priority =
+          network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   OriginAccessEntry(OriginAccessEntry&& from);
 
   // 'matchesOrigin' requires a protocol match (e.g. 'http' != 'https').
diff --git a/third_party/blink/renderer/platform/weborigin/scheme_registry.cc b/third_party/blink/renderer/platform/weborigin/scheme_registry.cc
index a86de19..65a0b90 100644
--- a/third_party/blink/renderer/platform/weborigin/scheme_registry.cc
+++ b/third_party/blink/renderer/platform/weborigin/scheme_registry.cc
@@ -58,7 +58,7 @@
       secure_schemes.insert(scheme.c_str());
     for (auto& scheme : url::GetNoAccessSchemes())
       schemes_with_unique_origins.insert(scheme.c_str());
-    for (auto& scheme : url::GetCORSEnabledSchemes())
+    for (auto& scheme : url::GetCorsEnabledSchemes())
       cors_enabled_schemes.insert(scheme.c_str());
     for (auto& scheme : url::GetCSPBypassingSchemes()) {
       content_security_policy_bypassing_schemes.insert(
@@ -224,14 +224,14 @@
       scheme);
 }
 
-bool SchemeRegistry::ShouldTreatURLSchemeAsCORSEnabled(const String& scheme) {
+bool SchemeRegistry::ShouldTreatURLSchemeAsCorsEnabled(const String& scheme) {
   DCHECK_EQ(scheme, scheme.LowerASCII());
   if (scheme.IsEmpty())
     return false;
   return GetURLSchemesRegistry().cors_enabled_schemes.Contains(scheme);
 }
 
-String SchemeRegistry::ListOfCORSEnabledURLSchemes() {
+String SchemeRegistry::ListOfCorsEnabledURLSchemes() {
   StringBuilder builder;
   bool add_separator = false;
   for (const auto& scheme : GetURLSchemesRegistry().cors_enabled_schemes) {
diff --git a/third_party/blink/renderer/platform/weborigin/scheme_registry.h b/third_party/blink/renderer/platform/weborigin/scheme_registry.h
index 4676a712..79b4b53 100644
--- a/third_party/blink/renderer/platform/weborigin/scheme_registry.h
+++ b/third_party/blink/renderer/platform/weborigin/scheme_registry.h
@@ -87,10 +87,10 @@
   static bool ShouldTreatURLSchemeAsNotAllowingJavascriptURLs(
       const String& scheme);
 
-  static bool ShouldTreatURLSchemeAsCORSEnabled(const String& scheme);
+  static bool ShouldTreatURLSchemeAsCorsEnabled(const String& scheme);
 
   // Serialize the registered schemes in a comma-separated list.
-  static String ListOfCORSEnabledURLSchemes();
+  static String ListOfCorsEnabledURLSchemes();
 
   // "Legacy" schemes (e.g. 'ftp:', 'gopher:') which we might want to treat
   // differently from "webby" schemes.
diff --git a/third_party/blink/renderer/platform/weborigin/security_origin_test.cc b/third_party/blink/renderer/platform/weborigin/security_origin_test.cc
index 4b45eca..846c928c 100644
--- a/third_party/blink/renderer/platform/weborigin/security_origin_test.cc
+++ b/third_party/blink/renderer/platform/weborigin/security_origin_test.cc
@@ -361,7 +361,7 @@
   // Adding the url to the access allowlist should allow the request.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *origin, "https", "example.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
   EXPECT_TRUE(origin->CanRequest(url));
 }
 
@@ -374,10 +374,10 @@
   // BlockList that is more or same specificity wins.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *origin, "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *origin, "https", "example.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
   // Block since example.com is on the allowlist & blocklist.
   EXPECT_FALSE(origin->CanRequest(blocked_url));
   // Allow since *.example.com is on the allowlist but not the blocklist.
@@ -392,10 +392,10 @@
 
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *origin, "https", "test.example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *origin, "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
   // Allow since test.example.com (allowlist) has a higher priority than
   // *.example.com (blocklist).
   EXPECT_TRUE(origin->CanRequest(allowed_url));
@@ -416,14 +416,14 @@
   // Verify unicode origin can not be allowlisted.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *origin, "https", "☃.net", true,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
   EXPECT_FALSE(origin->CanRequest(punycode_url));
   EXPECT_FALSE(origin->CanRequest(unicode_url));
 
   // Verify punycode allowlist only affects punycode URLs.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *origin, "https", "xn--n3h.net", true,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
   EXPECT_TRUE(origin->CanRequest(punycode_url));
   EXPECT_FALSE(origin->CanRequest(unicode_url));
 
@@ -436,7 +436,7 @@
   // Simulate <all_urls> being in the extension permissions.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *origin, "https", "", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
   EXPECT_TRUE(origin->CanRequest(punycode_url));
   EXPECT_FALSE(origin->CanRequest(unicode_url));
@@ -444,14 +444,14 @@
   // Verify unicode origin can not be blocklisted.
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *origin, "https", "☃.net", true,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
   EXPECT_TRUE(origin->CanRequest(punycode_url));
   EXPECT_FALSE(origin->CanRequest(unicode_url));
 
   // Verify punycode blocklist only affects punycode URLs.
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *origin, "https", "xn--n3h.net", true,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
   EXPECT_FALSE(origin->CanRequest(punycode_url));
   EXPECT_FALSE(origin->CanRequest(unicode_url));
 }
diff --git a/third_party/blink/renderer/platform/weborigin/security_policy.cc b/third_party/blink/renderer/platform/weborigin/security_policy.cc
index e142e07..9ef5ab6e 100644
--- a/third_party/blink/renderer/platform/weborigin/security_policy.cc
+++ b/third_party/blink/renderer/platform/weborigin/security_policy.cc
@@ -240,7 +240,7 @@
     const String& destination_protocol,
     const String& destination_domain,
     bool allow_destination_subdomains,
-    const network::mojom::CORSOriginAccessMatchPriority priority) {
+    const network::mojom::CorsOriginAccessMatchPriority priority) {
   MutexLocker lock(GetMutex());
   GetOriginAccessList().AddAllowListEntryForOrigin(
       source_origin.ToUrlOrigin(), network::mojom::CorsOriginPattern::New(
@@ -254,7 +254,7 @@
     const String& destination_protocol,
     const String& destination_domain,
     bool allow_destination_subdomains,
-    const network::mojom::CORSOriginAccessMatchPriority priority) {
+    const network::mojom::CorsOriginAccessMatchPriority priority) {
   MutexLocker lock(GetMutex());
   GetOriginAccessList().AddBlockListEntryForOrigin(
       source_origin.ToUrlOrigin(), network::mojom::CorsOriginPattern::New(
diff --git a/third_party/blink/renderer/platform/weborigin/security_policy.h b/third_party/blink/renderer/platform/weborigin/security_policy.h
index e58569b6..8d32d07d 100644
--- a/third_party/blink/renderer/platform/weborigin/security_policy.h
+++ b/third_party/blink/renderer/platform/weborigin/security_policy.h
@@ -71,13 +71,13 @@
       const String& destination_protocol,
       const String& destination_domain,
       bool allow_destination_subdomains,
-      const network::mojom::CORSOriginAccessMatchPriority priority);
+      const network::mojom::CorsOriginAccessMatchPriority priority);
   static void AddOriginAccessBlockListEntry(
       const SecurityOrigin& source_origin,
       const String& destination_protocol,
       const String& destination_domain,
       bool allow_destination_subdomains,
-      const network::mojom::CORSOriginAccessMatchPriority priority);
+      const network::mojom::CorsOriginAccessMatchPriority priority);
   static void ClearOriginAccessListForOrigin(
       const SecurityOrigin& source_origin);
   static void ClearOriginAccessList();
diff --git a/third_party/blink/renderer/platform/weborigin/security_policy_test.cc b/third_party/blink/renderer/platform/weborigin/security_policy_test.cc
index 8ed5007a..a8bd312 100644
--- a/third_party/blink/renderer/platform/weborigin/security_policy_test.cc
+++ b/third_party/blink/renderer/platform/weborigin/security_policy_test.cc
@@ -349,7 +349,7 @@
   // access to subdomains or other schemes.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "example.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(https_chromium_origin(),
                                                     https_example_origin()));
   EXPECT_FALSE(SecurityPolicy::IsOriginAccessAllowed(
@@ -370,7 +370,7 @@
   // subdomains.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(https_chromium_origin(),
                                                     https_example_origin()));
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(
@@ -383,7 +383,7 @@
   // An empty domain that matches subdomains results in matching every domain.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(https_chromium_origin(),
                                                     https_example_origin()));
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(https_chromium_origin(),
@@ -396,10 +396,10 @@
   // The block list takes priority over the allow list.
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *https_chromium_origin(), "https", "example.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
   EXPECT_FALSE(SecurityPolicy::IsOriginAccessAllowed(https_chromium_origin(),
                                                      https_example_origin()));
@@ -411,10 +411,10 @@
        IsOriginAccessAllowedWildcardWithBlockListEntry) {
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *https_chromium_origin(), "https", "google.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(https_chromium_origin(),
                                                     https_example_origin()));
@@ -425,13 +425,13 @@
 TEST_F(SecurityPolicyAccessTest, ClearOriginAccessListForOrigin) {
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "google.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_example_origin(), "https", "google.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kDefaultPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kDefaultPriority);
 
   SecurityPolicy::ClearOriginAccessListForOrigin(*https_chromium_origin());
 
@@ -448,17 +448,17 @@
       https_chromium_origin(), https_sub_example_origin()));
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "sub.example.com", false,
-      network::mojom::CORSOriginAccessMatchPriority::kLowPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kLowPriority);
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(
       https_chromium_origin(), https_sub_example_origin()));
   SecurityPolicy::AddOriginAccessBlockListEntry(
       *https_chromium_origin(), "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kMediumPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kMediumPriority);
   EXPECT_FALSE(SecurityPolicy::IsOriginAccessAllowed(
       https_chromium_origin(), https_sub_example_origin()));
   SecurityPolicy::AddOriginAccessAllowListEntry(
       *https_chromium_origin(), "https", "example.com", true,
-      network::mojom::CORSOriginAccessMatchPriority::kHighPriority);
+      network::mojom::CorsOriginAccessMatchPriority::kHighPriority);
 
   EXPECT_TRUE(SecurityPolicy::IsOriginAccessAllowed(
       https_chromium_origin(), https_sub_example_origin()));
diff --git a/url/url_util.cc b/url/url_util.cc
index 4bede9d..a515231 100644
--- a/url/url_util.cc
+++ b/url/url_util.cc
@@ -9,6 +9,7 @@
 
 #include "base/debug/leak_annotations.h"
 #include "base/logging.h"
+#include "base/stl_util.h"
 #include "base/strings/string_util.h"
 #include "url/url_canon_internal.h"
 #include "url/url_constants.h"
@@ -65,10 +66,8 @@
   kDataScheme,
 };
 
-const char* kCORSEnabledSchemes[] = {
-  kHttpsScheme,
-  kHttpScheme,
-  kDataScheme,
+const char* kCorsEnabledSchemes[] = {
+    kHttpsScheme, kHttpScheme, kDataScheme,
 };
 
 const char* kWebStorageSchemes[] = {
@@ -512,20 +511,20 @@
   if (initialized)
     return;
   InitSchemesWithType(&standard_schemes, kStandardURLSchemes,
-                      arraysize(kStandardURLSchemes));
+                      base::size(kStandardURLSchemes));
   InitSchemesWithType(&referrer_schemes, kReferrerURLSchemes,
-                      arraysize(kReferrerURLSchemes));
-  InitSchemes(&secure_schemes, kSecureSchemes, arraysize(kSecureSchemes));
-  InitSchemes(&local_schemes, kLocalSchemes, arraysize(kLocalSchemes));
+                      base::size(kReferrerURLSchemes));
+  InitSchemes(&secure_schemes, kSecureSchemes, base::size(kSecureSchemes));
+  InitSchemes(&local_schemes, kLocalSchemes, base::size(kLocalSchemes));
   InitSchemes(&no_access_schemes, kNoAccessSchemes,
-              arraysize(kNoAccessSchemes));
-  InitSchemes(&cors_enabled_schemes, kCORSEnabledSchemes,
-              arraysize(kCORSEnabledSchemes));
+              base::size(kNoAccessSchemes));
+  InitSchemes(&cors_enabled_schemes, kCorsEnabledSchemes,
+              base::size(kCorsEnabledSchemes));
   InitSchemes(&web_storage_schemes, kWebStorageSchemes,
-              arraysize(kWebStorageSchemes));
+              base::size(kWebStorageSchemes));
   InitSchemes(&csp_bypassing_schemes, nullptr, 0);
   InitSchemes(&empty_document_schemes, kEmptyDocumentSchemes,
-              arraysize(kEmptyDocumentSchemes));
+              base::size(kEmptyDocumentSchemes));
   initialized = true;
 }
 
@@ -591,12 +590,12 @@
   return *no_access_schemes;
 }
 
-void AddCORSEnabledScheme(const char* new_scheme) {
+void AddCorsEnabledScheme(const char* new_scheme) {
   Initialize();
   DoAddScheme(new_scheme, cors_enabled_schemes);
 }
 
-const std::vector<std::string>& GetCORSEnabledSchemes() {
+const std::vector<std::string>& GetCorsEnabledSchemes() {
   Initialize();
   return *cors_enabled_schemes;
 }
diff --git a/url/url_util.h b/url/url_util.h
index 32e7f0d..d4b0d773 100644
--- a/url/url_util.h
+++ b/url/url_util.h
@@ -80,8 +80,8 @@
 
 // Adds an application-defined scheme to the list of schemes that can be sent
 // CORS requests.
-URL_EXPORT void AddCORSEnabledScheme(const char* new_scheme);
-URL_EXPORT const std::vector<std::string>& GetCORSEnabledSchemes();
+URL_EXPORT void AddCorsEnabledScheme(const char* new_scheme);
+URL_EXPORT const std::vector<std::string>& GetCorsEnabledSchemes();
 
 // Adds an application-defined scheme to the list of web schemes that can be
 // used by web to store data (e.g. cookies, local storage, ...). This is