Index: net/cookies/canonical_cookie.h |
diff --git a/net/cookies/canonical_cookie.h b/net/cookies/canonical_cookie.h |
index a78eece41988159740c214ecb7d7968a7b9bad06..27dfd2b4daef4be5f0b6c491a8ba826de32332ed 100644 |
--- a/net/cookies/canonical_cookie.h |
+++ b/net/cookies/canonical_cookie.h |
@@ -82,8 +82,7 @@ class NET_EXPORT CanonicalCookie { |
bool IsSecure() const { return secure_; } |
bool IsHttpOnly() const { return httponly_; } |
CookiePriority Priority() const { return priority_; } |
- bool IsDomainCookie() const { |
- return !domain_.empty() && domain_[0] == '.'; } |
+ bool IsDomainCookie() const { return !domain_.empty() && domain_[0] == '.'; } |
bool IsHostCookie() const { return !IsDomainCookie(); } |
bool IsExpired(const base::Time& current) const { |
@@ -100,13 +99,11 @@ class NET_EXPORT CanonicalCookie { |
// It seems like it would make sense to take secure and httponly into |
// account, but the RFC doesn't specify this. |
// NOTE: Keep this logic in-sync with TrimDuplicateCookiesForHost(). |
- return (name_ == ecc.Name() && domain_ == ecc.Domain() |
- && path_ == ecc.Path()); |
+ return (name_ == ecc.Name() && domain_ == ecc.Domain() && |
+ path_ == ecc.Path()); |
} |
- void SetLastAccessDate(const base::Time& date) { |
- last_access_date_ = date; |
- } |
+ void SetLastAccessDate(const base::Time& date) { last_access_date_ = date; } |
// Returns true if the given |url_path| path-matches the cookie-path as |
// described in section 5.1.4 in RFC 6265. |