Index: third_party/WebKit/Source/core/dom/SecurityContext.h |
diff --git a/third_party/WebKit/Source/core/dom/SecurityContext.h b/third_party/WebKit/Source/core/dom/SecurityContext.h |
index c15a4edb2782dfc3f696b6e0fa95ea7bb0375806..1693b3578fb3e0b31fb047b21142dc2b10e35643 100644 |
--- a/third_party/WebKit/Source/core/dom/SecurityContext.h |
+++ b/third_party/WebKit/Source/core/dom/SecurityContext.h |
@@ -67,7 +67,7 @@ public: |
void setSecurityOrigin(PassRefPtr<SecurityOrigin>); |
virtual void didUpdateSecurityOrigin() = 0; |
- SandboxFlags sandboxFlags() const { return m_sandboxFlags; } |
+ SandboxFlags getSandboxFlags() const { return m_sandboxFlags; } |
bool isSandboxed(SandboxFlags mask) const { return m_sandboxFlags & mask; } |
void enforceSandboxFlags(SandboxFlags mask); |
@@ -75,7 +75,7 @@ public: |
bool isHostedInReservedIPRange() const { return m_hostedInReservedIPRange; } |
void setInsecureRequestsPolicy(InsecureRequestsPolicy policy) { m_insecureRequestsPolicy = policy; } |
- InsecureRequestsPolicy insecureRequestsPolicy() const { return m_insecureRequestsPolicy; } |
+ InsecureRequestsPolicy getInsecureRequestsPolicy() const { return m_insecureRequestsPolicy; } |
void addInsecureNavigationUpgrade(unsigned hashedHost) { m_insecureNavigationsToUpgrade.add(hashedHost); } |
InsecureNavigationsSet* insecureNavigationsToUpgrade() { return &m_insecureNavigationsToUpgrade; } |