summaryrefslogtreecommitdiffstats
path: root/chrome/browser/safe_browsing
diff options
context:
space:
mode:
authorbrettw@chromium.org <brettw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-03-17 23:11:12 +0000
committerbrettw@chromium.org <brettw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-03-17 23:11:12 +0000
commitb9b4a5729940325f9ac2bac2e9a50a5e8f7dcbb1 (patch)
treec340bd113fa8067f7ff2d06a6c74c93d21137e83 /chrome/browser/safe_browsing
parent3ae4c4256483e50b325ef0d5f8d6ecd153fa5f4a (diff)
downloadchromium_src-b9b4a5729940325f9ac2bac2e9a50a5e8f7dcbb1.zip
chromium_src-b9b4a5729940325f9ac2bac2e9a50a5e8f7dcbb1.tar.gz
chromium_src-b9b4a5729940325f9ac2bac2e9a50a5e8f7dcbb1.tar.bz2
Move ScopedFILE to base namespace and scoped_file.h
R=viettrungluu@chromium.org Review URL: https://codereview.chromium.org/196073002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@257518 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/safe_browsing')
-rw-r--r--chrome/browser/safe_browsing/prefix_set.cc5
-rw-r--r--chrome/browser/safe_browsing/prefix_set_unittest.cc15
-rw-r--r--chrome/browser/safe_browsing/safe_browsing_store_file.cc10
-rw-r--r--chrome/browser/safe_browsing/safe_browsing_store_file.h7
-rw-r--r--chrome/browser/safe_browsing/safe_browsing_store_file_unittest.cc8
5 files changed, 26 insertions, 19 deletions
diff --git a/chrome/browser/safe_browsing/prefix_set.cc b/chrome/browser/safe_browsing/prefix_set.cc
index 280f56f..006f17c 100644
--- a/chrome/browser/safe_browsing/prefix_set.cc
+++ b/chrome/browser/safe_browsing/prefix_set.cc
@@ -8,6 +8,7 @@
#include <math.h>
#include "base/file_util.h"
+#include "base/files/scoped_file.h"
#include "base/logging.h"
#include "base/md5.h"
#include "base/metrics/histogram.h"
@@ -165,7 +166,7 @@ PrefixSet* PrefixSet::LoadFile(const base::FilePath& filter_name) {
if (size_64 < static_cast<int64>(sizeof(FileHeader) + sizeof(MD5Digest)))
return NULL;
- file_util::ScopedFILE file(base::OpenFile(filter_name, "rb"));
+ base::ScopedFILE file(base::OpenFile(filter_name, "rb"));
if (!file.get())
return NULL;
@@ -261,7 +262,7 @@ bool PrefixSet::WriteFile(const base::FilePath& filter_name) const {
return false;
}
- file_util::ScopedFILE file(base::OpenFile(filter_name, "wb"));
+ base::ScopedFILE file(base::OpenFile(filter_name, "wb"));
if (!file.get())
return false;
diff --git a/chrome/browser/safe_browsing/prefix_set_unittest.cc b/chrome/browser/safe_browsing/prefix_set_unittest.cc
index adc999a..36e670e 100644
--- a/chrome/browser/safe_browsing/prefix_set_unittest.cc
+++ b/chrome/browser/safe_browsing/prefix_set_unittest.cc
@@ -8,6 +8,7 @@
#include <iterator>
#include "base/file_util.h"
+#include "base/files/scoped_file.h"
#include "base/files/scoped_temp_dir.h"
#include "base/logging.h"
#include "base/md5.h"
@@ -154,7 +155,7 @@ class PrefixSetTest : public PlatformTest {
int64 size_64;
ASSERT_TRUE(base::GetFileSize(filename, &size_64));
- file_util::ScopedFILE file(base::OpenFile(filename, "r+b"));
+ base::ScopedFILE file(base::OpenFile(filename, "r+b"));
IncrementIntAt(file.get(), offset, inc);
CleanChecksum(file.get());
file.reset();
@@ -367,7 +368,7 @@ TEST_F(PrefixSetTest, CorruptionHelpers) {
ASSERT_TRUE(GetPrefixSetFile(&filename));
// This will modify data in |index_|, which will fail the digest check.
- file_util::ScopedFILE file(base::OpenFile(filename, "r+b"));
+ base::ScopedFILE file(base::OpenFile(filename, "r+b"));
IncrementIntAt(file.get(), kPayloadOffset, 1);
file.reset();
scoped_ptr<safe_browsing::PrefixSet>
@@ -437,7 +438,7 @@ TEST_F(PrefixSetTest, CorruptionPayload) {
base::FilePath filename;
ASSERT_TRUE(GetPrefixSetFile(&filename));
- file_util::ScopedFILE file(base::OpenFile(filename, "r+b"));
+ base::ScopedFILE file(base::OpenFile(filename, "r+b"));
ASSERT_NO_FATAL_FAILURE(IncrementIntAt(file.get(), 666, 1));
file.reset();
scoped_ptr<safe_browsing::PrefixSet>
@@ -452,7 +453,7 @@ TEST_F(PrefixSetTest, CorruptionDigest) {
int64 size_64;
ASSERT_TRUE(base::GetFileSize(filename, &size_64));
- file_util::ScopedFILE file(base::OpenFile(filename, "r+b"));
+ base::ScopedFILE file(base::OpenFile(filename, "r+b"));
long digest_offset = static_cast<long>(size_64 - sizeof(base::MD5Digest));
ASSERT_NO_FATAL_FAILURE(IncrementIntAt(file.get(), digest_offset, 1));
file.reset();
@@ -467,7 +468,7 @@ TEST_F(PrefixSetTest, CorruptionExcess) {
ASSERT_TRUE(GetPrefixSetFile(&filename));
// Add some junk to the trunk.
- file_util::ScopedFILE file(base::OpenFile(filename, "ab"));
+ base::ScopedFILE file(base::OpenFile(filename, "ab"));
const char buf[] = "im in ur base, killing ur d00dz.";
ASSERT_EQ(strlen(buf), fwrite(buf, 1, strlen(buf), file.get()));
file.reset();
@@ -482,7 +483,7 @@ TEST_F(PrefixSetTest, SizeTRecovery) {
ASSERT_TRUE(GetPrefixSetFile(&filename));
// Open the file for rewrite.
- file_util::ScopedFILE file(base::OpenFile(filename, "r+b"));
+ base::ScopedFILE file(base::OpenFile(filename, "r+b"));
// Leave existing magic and version.
ASSERT_NE(-1, fseek(file.get(), sizeof(uint32) * 2, SEEK_SET));
@@ -525,7 +526,7 @@ TEST_F(PrefixSetTest, ReadWriteSigned) {
ASSERT_TRUE(GetPrefixSetFile(&filename));
// Open the file for rewrite.
- file_util::ScopedFILE file(base::OpenFile(filename, "r+b"));
+ base::ScopedFILE file(base::OpenFile(filename, "r+b"));
// Leave existing magic.
ASSERT_NE(-1, fseek(file.get(), sizeof(uint32), SEEK_SET));
diff --git a/chrome/browser/safe_browsing/safe_browsing_store_file.cc b/chrome/browser/safe_browsing/safe_browsing_store_file.cc
index a1be058..95f7333 100644
--- a/chrome/browser/safe_browsing/safe_browsing_store_file.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_store_file.cc
@@ -4,6 +4,8 @@
#include "chrome/browser/safe_browsing/safe_browsing_store_file.h"
+#include "base/file_util.h"
+#include "base/files/scoped_file.h"
#include "base/md5.h"
#include "base/metrics/histogram.h"
@@ -292,7 +294,7 @@ bool SafeBrowsingStoreFile::WriteAddPrefix(int32 chunk_id, SBPrefix prefix) {
bool SafeBrowsingStoreFile::GetAddPrefixes(SBAddPrefixes* add_prefixes) {
add_prefixes->clear();
- file_util::ScopedFILE file(base::OpenFile(filename_, "rb"));
+ base::ScopedFILE file(base::OpenFile(filename_, "rb"));
if (file.get() == NULL) return false;
FileHeader header;
@@ -314,7 +316,7 @@ bool SafeBrowsingStoreFile::GetAddFullHashes(
std::vector<SBAddFullHash>* add_full_hashes) {
add_full_hashes->clear();
- file_util::ScopedFILE file(base::OpenFile(filename_, "rb"));
+ base::ScopedFILE file(base::OpenFile(filename_, "rb"));
if (file.get() == NULL) return false;
FileHeader header;
@@ -397,11 +399,11 @@ bool SafeBrowsingStoreFile::BeginUpdate() {
corruption_seen_ = false;
const base::FilePath new_filename = TemporaryFileForFilename(filename_);
- file_util::ScopedFILE new_file(base::OpenFile(new_filename, "wb+"));
+ base::ScopedFILE new_file(base::OpenFile(new_filename, "wb+"));
if (new_file.get() == NULL)
return false;
- file_util::ScopedFILE file(base::OpenFile(filename_, "rb"));
+ base::ScopedFILE file(base::OpenFile(filename_, "rb"));
empty_ = (file.get() == NULL);
if (empty_) {
// If the file exists but cannot be opened, try to delete it (not
diff --git a/chrome/browser/safe_browsing/safe_browsing_store_file.h b/chrome/browser/safe_browsing/safe_browsing_store_file.h
index 4e9766b..c704710 100644
--- a/chrome/browser/safe_browsing/safe_browsing_store_file.h
+++ b/chrome/browser/safe_browsing/safe_browsing_store_file.h
@@ -11,7 +11,8 @@
#include "chrome/browser/safe_browsing/safe_browsing_store.h"
#include "base/callback.h"
-#include "base/file_util.h"
+#include "base/files/file_path.h"
+#include "base/files/scoped_file.h"
// Implement SafeBrowsingStore in terms of a flat file. The file
// format is pretty literal:
@@ -266,8 +267,8 @@ class SafeBrowsingStoreFile : public SafeBrowsingStore {
// Handles to the main and scratch files. |empty_| is true if the
// main file didn't exist when the update was started.
- file_util::ScopedFILE file_;
- file_util::ScopedFILE new_file_;
+ base::ScopedFILE file_;
+ base::ScopedFILE new_file_;
bool empty_;
// Cache of chunks which have been seen. Loaded from the database
diff --git a/chrome/browser/safe_browsing/safe_browsing_store_file_unittest.cc b/chrome/browser/safe_browsing/safe_browsing_store_file_unittest.cc
index ac17086..fba3a3b 100644
--- a/chrome/browser/safe_browsing/safe_browsing_store_file_unittest.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_store_file_unittest.cc
@@ -5,6 +5,8 @@
#include "chrome/browser/safe_browsing/safe_browsing_store_file.h"
#include "base/bind.h"
+#include "base/file_util.h"
+#include "base/files/scoped_file.h"
#include "base/files/scoped_temp_dir.h"
#include "base/md5.h"
#include "testing/gtest/include/gtest/gtest.h"
@@ -413,7 +415,7 @@ TEST_F(SafeBrowsingStoreFileTest, DetectsCorruption) {
EXPECT_FALSE(corruption_detected_);
// Corrupt the store.
- file_util::ScopedFILE file(base::OpenFile(filename_, "rb+"));
+ base::ScopedFILE file(base::OpenFile(filename_, "rb+"));
const long kOffset = 60;
EXPECT_EQ(fseek(file.get(), kOffset, SEEK_SET), 0);
const uint32 kZero = 0;
@@ -479,7 +481,7 @@ TEST_F(SafeBrowsingStoreFileTest, CheckValidityPayload) {
const size_t kOffset = 37;
{
- file_util::ScopedFILE file(base::OpenFile(filename_, "rb+"));
+ base::ScopedFILE file(base::OpenFile(filename_, "rb+"));
EXPECT_EQ(0, fseek(file.get(), kOffset, SEEK_SET));
EXPECT_GE(fputs("hello", file.get()), 0);
}
@@ -499,7 +501,7 @@ TEST_F(SafeBrowsingStoreFileTest, CheckValidityChecksum) {
const int kOffset = -static_cast<int>(sizeof(base::MD5Digest));
{
- file_util::ScopedFILE file(base::OpenFile(filename_, "rb+"));
+ base::ScopedFILE file(base::OpenFile(filename_, "rb+"));
EXPECT_EQ(0, fseek(file.get(), kOffset, SEEK_END));
EXPECT_GE(fputs("hello", file.get()), 0);
}