summaryrefslogtreecommitdiff
path: root/dom/security
diff options
context:
space:
mode:
authorMoonchild <moonchild@palemoon.org>2020-09-23 14:52:16 +0000
committerMoonchild <moonchild@palemoon.org>2020-09-23 14:52:16 +0000
commitec277098c104069d244949a773d50665e6d30ba5 (patch)
treec1685be6dd885ac1d903dbf21f68c2cf8ba252ad /dom/security
parent551a6a9fdc67c1ef0f6d2649b79eb9b62a43f8c6 (diff)
downloaduxp-ec277098c104069d244949a773d50665e6d30ba5.tar.gz
Issue mcp-graveyard/UXP#1656 - Part 2: Unmangle some unfortunate UTF-8 victims.
The poor fellows got lost in an ASCII-interpretation of the world.
Diffstat (limited to 'dom/security')
-rw-r--r--dom/security/nsCSPContext.cpp4
1 files changed, 2 insertions, 2 deletions
diff --git a/dom/security/nsCSPContext.cpp b/dom/security/nsCSPContext.cpp
index 9fd30eed8a..a553680feb 100644
--- a/dom/security/nsCSPContext.cpp
+++ b/dom/security/nsCSPContext.cpp
@@ -772,7 +772,7 @@ StripURIForReporting(nsIURI* aURI,
{
// 1) If the origin of uri is a globally unique identifier (for example,
// aURI has a scheme of data, blob, or filesystem), then return the
- // ASCII serialization of uri???s scheme.
+ // ASCII serialization of uri’s scheme.
bool isHttpOrFtp =
(NS_SUCCEEDED(aURI->SchemeIs("http", &isHttpOrFtp)) && isHttpOrFtp) ||
(NS_SUCCEEDED(aURI->SchemeIs("https", &isHttpOrFtp)) && isHttpOrFtp) ||
@@ -787,7 +787,7 @@ StripURIForReporting(nsIURI* aURI,
}
// 2) If the origin of uri is not the same as the origin of the protected
- // resource, then return the ASCII serialization of uri???s origin.
+ // resource, then return the ASCII serialization of uri’s origin.
if (!NS_SecurityCompareURIs(aSelfURI, aURI, false)) {
// cross origin redirects also fall into this category, see:
// http://www.w3.org/TR/CSP/#violation-reports