| Index: Source/core/html/parser/XSSAuditor.cpp
|
| diff --git a/Source/core/html/parser/XSSAuditor.cpp b/Source/core/html/parser/XSSAuditor.cpp
|
| index 6f50091ceb97d50f93226436dee808ca41644340..47efdacd2f87c8eb8170a46e5f2f62374715fa71 100644
|
| --- a/Source/core/html/parser/XSSAuditor.cpp
|
| +++ b/Source/core/html/parser/XSSAuditor.cpp
|
| @@ -267,7 +267,7 @@ void XSSAuditor::init(Document* document, XSSAuditorDelegate* auditorDelegate)
|
|
|
| String httpBodyAsString;
|
| if (DocumentLoader* documentLoader = document->frame()->loader()->documentLoader()) {
|
| - DEFINE_STATIC_LOCAL(String, XSSProtectionHeader, (ASCIILiteral("X-XSS-Protection")));
|
| + DEFINE_STATIC_LOCAL(String, XSSProtectionHeader, ("X-XSS-Protection"));
|
| String headerValue = documentLoader->response().httpHeaderField(XSSProtectionHeader);
|
| String errorDetails;
|
| unsigned errorPosition = 0;
|
| @@ -516,7 +516,7 @@ bool XSSAuditor::filterButtonToken(const FilterTokenRequest& request)
|
|
|
| bool XSSAuditor::eraseDangerousAttributesIfInjected(const FilterTokenRequest& request)
|
| {
|
| - DEFINE_STATIC_LOCAL(String, safeJavaScriptURL, (ASCIILiteral("javascript:void(0)")));
|
| + DEFINE_STATIC_LOCAL(String, safeJavaScriptURL, ("javascript:void(0)"));
|
|
|
| bool didBlockScript = false;
|
| for (size_t i = 0; i < request.token.attributes().size(); ++i) {
|
|
|