From 7572f371867ac8fd61963aced41382357d0e28f8 Mon Sep 17 00:00:00 2001 From: Moonchild Date: Wed, 23 Sep 2020 14:52:16 +0000 Subject: Issue #1656 - Part 2: Unmangle some unfortunate UTF-8 victims. The poor fellows got lost in an ASCII-interpretation of the world. --- dom/base/Element.cpp | 12 ++++++------ dom/base/nsNodeUtils.cpp | 2 +- dom/fetch/FetchDriver.cpp | 2 +- dom/html/HTMLInputElement.h | 2 +- dom/security/nsCSPContext.cpp | 4 ++-- 5 files changed, 11 insertions(+), 11 deletions(-) (limited to 'dom') diff --git a/dom/base/Element.cpp b/dom/base/Element.cpp index a9850a9ae..940045ca7 100644 --- a/dom/base/Element.cpp +++ b/dom/base/Element.cpp @@ -1069,7 +1069,7 @@ ShadowRoot* Element::GetShadowRootByMode() const { /** - * 1. Let shadow be context object???s shadow root. + * 1. Let shadow be context object’s shadow root. * 2. If shadow is null or its mode is "closed", then return null. */ ShadowRoot* shadowRoot = GetShadowRoot(); @@ -1088,7 +1088,7 @@ already_AddRefed Element::AttachShadow(const ShadowRootInit& aInit, ErrorResult& aError) { /** - * 1. If context object???s namespace is not the HTML namespace, + * 1. If context object’s namespace is not the HTML namespace, * then throw a "NotSupportedError" DOMException. */ if (!IsHTMLElement()) { @@ -1097,7 +1097,7 @@ Element::AttachShadow(const ShadowRootInit& aInit, ErrorResult& aError) } /** - * 2. If context object???s local name is not + * 2. If context object’s local name is not * a valid custom element name, "article", "aside", "blockquote", * "body", "div", "footer", "h1", "h2", "h3", "h4", "h5", "h6", * "header", "main" "nav", "p", "section", or "span", @@ -1181,8 +1181,8 @@ Element::AttachShadowInternal(bool aClosed, ErrorResult& aError) /** * 4. Let shadow be a new shadow root whose node document is - * context object???s node document, host is context object, - * and mode is init???s mode. + * context object’s node document, host is context object, + * and mode is init’s mode. */ RefPtr shadowRoot = new ShadowRoot(this, aClosed, nodeInfo.forget(), protoBinding); @@ -1190,7 +1190,7 @@ Element::AttachShadowInternal(bool aClosed, ErrorResult& aError) shadowRoot->SetIsComposedDocParticipant(IsInComposedDoc()); /** - * 5. Set context object???s shadow root to shadow. + * 5. Set context object’s shadow root to shadow. */ SetShadowRoot(shadowRoot); diff --git a/dom/base/nsNodeUtils.cpp b/dom/base/nsNodeUtils.cpp index 5aaa13223..7d3135848 100644 --- a/dom/base/nsNodeUtils.cpp +++ b/dom/base/nsNodeUtils.cpp @@ -540,7 +540,7 @@ nsNodeUtils::CloneAndAdopt(nsINode *aNode, bool aClone, bool aDeep, nsIDocument* newDoc = aNode->OwnerDoc(); if (newDoc) { if (CustomElementRegistry::IsCustomElementEnabled()) { - // Adopted callback must be enqueued whenever a node???s + // Adopted callback must be enqueued whenever a node’s // shadow-including inclusive descendants that is custom. Element* element = aNode->IsElement() ? aNode->AsElement() : nullptr; if (element) { diff --git a/dom/fetch/FetchDriver.cpp b/dom/fetch/FetchDriver.cpp index 622977a13..122875bb0 100644 --- a/dom/fetch/FetchDriver.cpp +++ b/dom/fetch/FetchDriver.cpp @@ -878,7 +878,7 @@ FetchDriver::AsyncOnChannelRedirect(nsIChannel* aOldChannel, mRequest->AddURL(spec, fragment); NS_ConvertUTF8toUTF16 tRPHeaderValue(tRPHeaderCValue); - // updates request???s associated referrer policy according to the + // updates request’s associated referrer policy according to the // Referrer-Policy header (if any). if (!tRPHeaderValue.IsEmpty()) { net::ReferrerPolicy net_referrerPolicy = diff --git a/dom/html/HTMLInputElement.h b/dom/html/HTMLInputElement.h index 2cc6ce445..16651d520 100644 --- a/dom/html/HTMLInputElement.h +++ b/dom/html/HTMLInputElement.h @@ -1565,7 +1565,7 @@ protected: // Default step base value when a type do not have specific one. static const Decimal kDefaultStepBase; // Default step base value when type=week does not not have a specific one, - // which is ???259200000, the start of week 1970-W01. + // which is −259200000, the start of week 1970-W01. static const Decimal kDefaultStepBaseWeek; // Default step used when there is no specified step. diff --git a/dom/security/nsCSPContext.cpp b/dom/security/nsCSPContext.cpp index 9fd30eed8..a553680fe 100644 --- a/dom/security/nsCSPContext.cpp +++ b/dom/security/nsCSPContext.cpp @@ -772,7 +772,7 @@ StripURIForReporting(nsIURI* aURI, { // 1) If the origin of uri is a globally unique identifier (for example, // aURI has a scheme of data, blob, or filesystem), then return the - // ASCII serialization of uri???s scheme. + // ASCII serialization of uri’s scheme. bool isHttpOrFtp = (NS_SUCCEEDED(aURI->SchemeIs("http", &isHttpOrFtp)) && isHttpOrFtp) || (NS_SUCCEEDED(aURI->SchemeIs("https", &isHttpOrFtp)) && isHttpOrFtp) || @@ -787,7 +787,7 @@ StripURIForReporting(nsIURI* aURI, } // 2) If the origin of uri is not the same as the origin of the protected - // resource, then return the ASCII serialization of uri???s origin. + // resource, then return the ASCII serialization of uri’s origin. if (!NS_SecurityCompareURIs(aSelfURI, aURI, false)) { // cross origin redirects also fall into this category, see: // http://www.w3.org/TR/CSP/#violation-reports -- cgit v1.2.3