| Index: net/cookies/canonical_cookie.h
|
| diff --git a/net/cookies/canonical_cookie.h b/net/cookies/canonical_cookie.h
|
| index a78eece41988159740c214ecb7d7968a7b9bad06..27dfd2b4daef4be5f0b6c491a8ba826de32332ed 100644
|
| --- a/net/cookies/canonical_cookie.h
|
| +++ b/net/cookies/canonical_cookie.h
|
| @@ -82,8 +82,7 @@ class NET_EXPORT CanonicalCookie {
|
| bool IsSecure() const { return secure_; }
|
| bool IsHttpOnly() const { return httponly_; }
|
| CookiePriority Priority() const { return priority_; }
|
| - bool IsDomainCookie() const {
|
| - return !domain_.empty() && domain_[0] == '.'; }
|
| + bool IsDomainCookie() const { return !domain_.empty() && domain_[0] == '.'; }
|
| bool IsHostCookie() const { return !IsDomainCookie(); }
|
|
|
| bool IsExpired(const base::Time& current) const {
|
| @@ -100,13 +99,11 @@ class NET_EXPORT CanonicalCookie {
|
| // It seems like it would make sense to take secure and httponly into
|
| // account, but the RFC doesn't specify this.
|
| // NOTE: Keep this logic in-sync with TrimDuplicateCookiesForHost().
|
| - return (name_ == ecc.Name() && domain_ == ecc.Domain()
|
| - && path_ == ecc.Path());
|
| + return (name_ == ecc.Name() && domain_ == ecc.Domain() &&
|
| + path_ == ecc.Path());
|
| }
|
|
|
| - void SetLastAccessDate(const base::Time& date) {
|
| - last_access_date_ = date;
|
| - }
|
| + void SetLastAccessDate(const base::Time& date) { last_access_date_ = date; }
|
|
|
| // Returns true if the given |url_path| path-matches the cookie-path as
|
| // described in section 5.1.4 in RFC 6265.
|
|
|