summaryrefslogtreecommitdiffstats
path: root/chrome/browser
diff options
context:
space:
mode:
authordarin@google.com <darin@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2008-07-31 19:40:37 +0000
committerdarin@google.com <darin@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2008-07-31 19:40:37 +0000
commit8ac1a75acadaa2aae065212cb6255d00c789a184 (patch)
tree854eaf66ba8ce7e581bd8e6f1fa75f46d22f4bb7 /chrome/browser
parent287a019ed5d015185cab41f6c7156dc6c4cbcee7 (diff)
downloadchromium_src-8ac1a75acadaa2aae065212cb6255d00c789a184.zip
chromium_src-8ac1a75acadaa2aae065212cb6255d00c789a184.tar.gz
chromium_src-8ac1a75acadaa2aae065212cb6255d00c789a184.tar.bz2
Move more net classes into the net namespace. Also remove the net_util namespace in favor of the net namespace.
This is a purely mechanical change. There should be no logic changes. git-svn-id: svn://svn.chromium.org/chrome/trunk/src@192 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser')
-rw-r--r--chrome/browser/autocomplete/autocomplete.cc4
-rw-r--r--chrome/browser/automation/url_request_mock_http_job.cc2
-rw-r--r--chrome/browser/automation/url_request_mock_net_error_job.cc6
-rw-r--r--chrome/browser/automation/url_request_mock_net_error_job.h10
-rw-r--r--chrome/browser/back_forward_menu_model.cc4
-rw-r--r--chrome/browser/browser.cc2
-rw-r--r--chrome/browser/browser_commands.cc2
-rw-r--r--chrome/browser/browser_init.cc2
-rw-r--r--chrome/browser/browser_main.cc4
-rw-r--r--chrome/browser/browser_uitest.cc16
-rw-r--r--chrome/browser/browsing_data_remover.cc2
-rw-r--r--chrome/browser/cert_store.cc4
-rw-r--r--chrome/browser/cert_store.h8
-rw-r--r--chrome/browser/crash_recovery_uitest.cc2
-rw-r--r--chrome/browser/download_manager.cc6
-rw-r--r--chrome/browser/google_util.cc4
-rw-r--r--chrome/browser/history/redirect_uitest.cc10
-rw-r--r--chrome/browser/iframe_uitest.cc2
-rw-r--r--chrome/browser/metrics_service_uitest.cc4
-rw-r--r--chrome/browser/net/dns_master_unittest.cc10
-rw-r--r--chrome/browser/page_info_window.cc9
-rw-r--r--chrome/browser/plugin_process_host.cc4
-rw-r--r--chrome/browser/profile.cc26
-rw-r--r--chrome/browser/render_view_host.cc2
-rw-r--r--chrome/browser/resource_dispatcher_host.cc2
-rw-r--r--chrome/browser/resource_dispatcher_host.h2
-rw-r--r--chrome/browser/resource_dispatcher_host_uitest.cc2
-rw-r--r--chrome/browser/safe_browsing/safe_browsing_service.cc6
-rw-r--r--chrome/browser/save_file_manager.cc2
-rw-r--r--chrome/browser/save_package.cc2
-rw-r--r--chrome/browser/session_history_uitest.cc2
-rw-r--r--chrome/browser/session_restore_uitest.cc6
-rw-r--r--chrome/browser/site_instance.cc4
-rw-r--r--chrome/browser/ssl_error_info.cc4
-rw-r--r--chrome/browser/ssl_error_info.h2
-rw-r--r--chrome/browser/ssl_manager.cc14
-rw-r--r--chrome/browser/ssl_manager.h16
-rw-r--r--chrome/browser/ssl_policy.cc10
-rw-r--r--chrome/browser/tab_contents.cc2
-rw-r--r--chrome/browser/tab_restore_uitest.cc4
-rw-r--r--chrome/browser/template_url_model.cc4
-rw-r--r--chrome/browser/toolbar_model.cc2
-rw-r--r--chrome/browser/url_fixer_upper.cc6
-rw-r--r--chrome/browser/url_fixer_upper_unittest.cc4
-rw-r--r--chrome/browser/views/constrained_window_impl_interactive_uitest.cc2
-rw-r--r--chrome/browser/views/options/advanced_contents_view.cc14
-rw-r--r--chrome/browser/views/options/cookies_view.cc31
-rw-r--r--chrome/browser/web_contents.cc5
48 files changed, 149 insertions, 144 deletions
diff --git a/chrome/browser/autocomplete/autocomplete.cc b/chrome/browser/autocomplete/autocomplete.cc
index ecc3bbd..4153032 100644
--- a/chrome/browser/autocomplete/autocomplete.cc
+++ b/chrome/browser/autocomplete/autocomplete.cc
@@ -150,7 +150,7 @@ AutocompleteInput::Type AutocompleteInput::Parse(const std::wstring& text,
// the host's validity at this point.)
const std::wstring host(text.substr(parts->host.begin, parts->host.len));
const size_t registry_length =
- RegistryControlledDomainService::GetRegistryLength(host, false);
+ net::RegistryControlledDomainService::GetRegistryLength(host, false);
if (registry_length == std::wstring::npos)
return QUERY; // It's not clear to me that we can reach this...
@@ -169,7 +169,7 @@ AutocompleteInput::Type AutocompleteInput::Parse(const std::wstring& text,
// See if the host is an IP address.
bool is_ip_address;
- net_util::CanonicalizeHost(host, &is_ip_address);
+ net::CanonicalizeHost(host, &is_ip_address);
if (is_ip_address) {
// If the user originally typed a host that looks like an IP address (a
// dotted quad), they probably want to open it. If the original input was
diff --git a/chrome/browser/automation/url_request_mock_http_job.cc b/chrome/browser/automation/url_request_mock_http_job.cc
index 5df0ed7..0c3cbc7 100644
--- a/chrome/browser/automation/url_request_mock_http_job.cc
+++ b/chrome/browser/automation/url_request_mock_http_job.cc
@@ -59,7 +59,7 @@ URLRequestJob* URLRequestMockHTTPJob::Factory(URLRequest* request,
// Convert the file:/// URL to a path on disk.
std::wstring file_path;
- net_util::FileURLToFilePath(GURL(file_url), &file_path);
+ net::FileURLToFilePath(GURL(file_url), &file_path);
URLRequestMockHTTPJob* job = new URLRequestMockHTTPJob(request);
job->file_path_ = file_path;
return job;
diff --git a/chrome/browser/automation/url_request_mock_net_error_job.cc b/chrome/browser/automation/url_request_mock_net_error_job.cc
index 06adfb7..18ede31 100644
--- a/chrome/browser/automation/url_request_mock_net_error_job.cc
+++ b/chrome/browser/automation/url_request_mock_net_error_job.cc
@@ -43,7 +43,7 @@ URLRequestMockNetErrorJob::URLMockInfoMap
void URLRequestMockNetErrorJob::AddMockedURL(const GURL& url,
const std::wstring& base,
const std::vector<int>& errors,
- X509Certificate* ssl_cert) {
+ net::X509Certificate* ssl_cert) {
#ifndef NDEBUG
URLMockInfoMap::const_iterator iter = url_mock_info_map_.find(url);
DCHECK(iter == url_mock_info_map_.end());
@@ -83,13 +83,13 @@ URLRequestJob* URLRequestMockNetErrorJob::Factory(URLRequest* request,
file_url.append(UTF8ToWide(url.path()));
// Convert the file:/// URL to a path on disk.
std::wstring file_path;
- net_util::FileURLToFilePath(GURL(file_url), &file_path);
+ net::FileURLToFilePath(GURL(file_url), &file_path);
job->file_path_ = file_path;
return job;
}
URLRequestMockNetErrorJob::URLRequestMockNetErrorJob(URLRequest* request,
- const std::vector<int>& errors, X509Certificate* cert)
+ const std::vector<int>& errors, net::X509Certificate* cert)
: URLRequestMockHTTPJob(request),
errors_(errors),
ssl_cert_(cert) {
diff --git a/chrome/browser/automation/url_request_mock_net_error_job.h b/chrome/browser/automation/url_request_mock_net_error_job.h
index bee1c31..d7abad0 100644
--- a/chrome/browser/automation/url_request_mock_net_error_job.h
+++ b/chrome/browser/automation/url_request_mock_net_error_job.h
@@ -41,7 +41,7 @@ class URLRequestMockNetErrorJob : public URLRequestMockHTTPJob {
public:
URLRequestMockNetErrorJob(URLRequest* request,
const std::vector<int>& errors,
- X509Certificate* ssl_cert);
+ net::X509Certificate* ssl_cert);
virtual ~URLRequestMockNetErrorJob();
virtual void Start();
@@ -56,7 +56,7 @@ class URLRequestMockNetErrorJob : public URLRequestMockHTTPJob {
static void AddMockedURL(const GURL& url,
const std::wstring& base,
const std::vector<int>& errors,
- X509Certificate* ssl_cert);
+ net::X509Certificate* ssl_cert);
// Removes the specified |url| from the list of mocked urls.
static void RemoveMockedURL(const GURL& url);
@@ -66,14 +66,14 @@ class URLRequestMockNetErrorJob : public URLRequestMockHTTPJob {
MockInfo() : ssl_cert(NULL) { }
MockInfo(std::wstring base,
std::vector<int> errors,
- X509Certificate* ssl_cert)
+ net::X509Certificate* ssl_cert)
: base(base),
errors(errors),
ssl_cert(ssl_cert) { }
std::wstring base;
std::vector<int> errors;
- scoped_refptr<X509Certificate> ssl_cert;
+ scoped_refptr<net::X509Certificate> ssl_cert;
};
static URLRequest::ProtocolFactory Factory;
@@ -84,7 +84,7 @@ class URLRequestMockNetErrorJob : public URLRequestMockHTTPJob {
std::vector<int> errors_;
// The certificate to use for SSL errors.
- scoped_refptr<X509Certificate> ssl_cert_;
+ scoped_refptr<net::X509Certificate> ssl_cert_;
typedef std::map<GURL, MockInfo> URLMockInfoMap;
static URLMockInfoMap url_mock_info_map_;
diff --git a/chrome/browser/back_forward_menu_model.cc b/chrome/browser/back_forward_menu_model.cc
index 88b5345..6e59162 100644
--- a/chrome/browser/back_forward_menu_model.cc
+++ b/chrome/browser/back_forward_menu_model.cc
@@ -304,7 +304,7 @@ int BackForwardMenuModel::GetIndexOfNextChapterStop(int start_from,
// When going backwards we return the first entry we find that has a
// different domain.
for (int i = start_from - 1; i >= 0; --i) {
- if (!RegistryControlledDomainService::SameDomainOrHost(url,
+ if (!net::RegistryControlledDomainService::SameDomainOrHost(url,
controller->GetEntryAtIndex(i)->GetURL()))
return i;
}
@@ -314,7 +314,7 @@ int BackForwardMenuModel::GetIndexOfNextChapterStop(int start_from,
// When going forwards we return the entry before the entry that has a
// different domain.
for (int i = start_from + 1; i < max_count; ++i) {
- if (!RegistryControlledDomainService::SameDomainOrHost(url,
+ if (!net::RegistryControlledDomainService::SameDomainOrHost(url,
controller->GetEntryAtIndex(i)->GetURL()))
return i - 1;
}
diff --git a/chrome/browser/browser.cc b/chrome/browser/browser.cc
index bc5ad30..fa76bd9 100644
--- a/chrome/browser/browser.cc
+++ b/chrome/browser/browser.cc
@@ -196,7 +196,7 @@ void Browser::RegisterUserPrefs(PrefService* prefs) {
prefs->RegisterStringPref(prefs::kHomePage, L"chrome-internal:");
prefs->RegisterBooleanPref(prefs::kHomePageIsNewTabPage, true);
prefs->RegisterIntegerPref(prefs::kCookieBehavior,
- CookiePolicy::ALLOW_ALL_COOKIES);
+ net::CookiePolicy::ALLOW_ALL_COOKIES);
prefs->RegisterBooleanPref(prefs::kShowHomeButton, false);
prefs->RegisterStringPref(prefs::kRecentlySelectedEncoding, L"");
}
diff --git a/chrome/browser/browser_commands.cc b/chrome/browser/browser_commands.cc
index fc54ae8..cdfc7a2 100644
--- a/chrome/browser/browser_commands.cc
+++ b/chrome/browser/browser_commands.cc
@@ -1115,7 +1115,7 @@ void Browser::DuplicateContentsAt(int index) {
// Browser, SelectFileDialog::Listener implementation:
void Browser::FileSelected(const std::wstring& path, void* params) {
- GURL file_url = net_util::FilePathToFileURL(path);
+ GURL file_url = net::FilePathToFileURL(path);
if (!file_url.is_empty())
OpenURL(file_url, CURRENT_TAB, PageTransition::TYPED);
}
diff --git a/chrome/browser/browser_init.cc b/chrome/browser/browser_init.cc
index f718100..30e8cb5 100644
--- a/chrome/browser/browser_init.cc
+++ b/chrome/browser/browser_init.cc
@@ -427,7 +427,7 @@ bool BrowserInit::LaunchWithProfile::Launch(Profile* profile,
}
if (parsed_command_line.HasSwitch(switches::kEnableFileCookies))
- CookieMonster::EnableFileScheme();
+ net::CookieMonster::EnableFileScheme();
#ifndef NDEBUG
if (parsed_command_line.HasSwitch(switches::kApp)) {
diff --git a/chrome/browser/browser_main.cc b/chrome/browser/browser_main.cc
index 317ebed..057e254 100644
--- a/chrome/browser/browser_main.cc
+++ b/chrome/browser/browser_main.cc
@@ -423,7 +423,7 @@ int BrowserMain(CommandLine &parsed_command_line, int show_command,
PrepareRestartOnCrashEnviroment(parsed_command_line);
// Initialize Winsock.
- WinsockInit init;
+ net::WinsockInit init;
// Initialize the DNS prefetch system
chrome_browser_net::DnsPrefetcherInit dns_prefetch_init(user_prefs);
@@ -443,7 +443,7 @@ int BrowserMain(CommandLine &parsed_command_line, int show_command,
RLZTracker::InitRlzDelayed(base::DIR_MODULE, is_first_run);
// Config the network module so it has access to resources.
- NetModule::SetResourceProvider(NetResourceProvider);
+ net::NetModule::SetResourceProvider(NetResourceProvider);
// Register our global network handler for chrome-resource:// URLs.
RegisterURLRequestChromeJob();
diff --git a/chrome/browser/browser_uitest.cc b/chrome/browser/browser_uitest.cc
index 8213f8f..0739179 100644
--- a/chrome/browser/browser_uitest.cc
+++ b/chrome/browser/browser_uitest.cc
@@ -89,7 +89,7 @@ TEST_F(BrowserTest, NoTitle) {
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"title1.html");
- NavigateToURL(net_util::FilePathToFileURL(test_file));
+ NavigateToURL(net::FilePathToFileURL(test_file));
Sleep(kWaitForActionMsec); // The browser lazily updates the title.
EXPECT_EQ(WindowCaptionFromPageTitle(L"title1.html"), GetWindowTitle());
@@ -102,7 +102,7 @@ TEST_F(BrowserTest, Title) {
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"title2.html");
- NavigateToURL(net_util::FilePathToFileURL(test_file));
+ NavigateToURL(net::FilePathToFileURL(test_file));
Sleep(kWaitForActionMsec); // The browser lazily updates the title.
const std::wstring test_title(L"Title Of Awesomeness");
@@ -115,7 +115,7 @@ TEST_F(BrowserTest, WindowsSessionEnd) {
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"title1.html");
- NavigateToURL(net_util::FilePathToFileURL(test_file));
+ NavigateToURL(net::FilePathToFileURL(test_file));
Sleep(kWaitForActionMsec);
// Simulate an end of session. Normally this happens when the user
@@ -209,8 +209,8 @@ TEST_F(BrowserTest, DuplicateTab) {
std::wstring path_prefix = test_data_directory_;
file_util::AppendToPath(&path_prefix, L"session_history");
path_prefix += file_util::kPathSeparator;
- GURL url1 = net_util::FilePathToFileURL(path_prefix + L"bot1.html");
- GURL url2 = net_util::FilePathToFileURL(path_prefix + L"bot2.html");
+ GURL url1 = net::FilePathToFileURL(path_prefix + L"bot1.html");
+ GURL url2 = net::FilePathToFileURL(path_prefix + L"bot2.html");
GURL url3 = GURL("about:blank");
scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0));
@@ -273,7 +273,7 @@ TEST_F(BrowserTest, NullOpenerRedirectForksProcess) {
// Start with a file:// url
file_util::AppendToPath(&test_file, L"title2.html");
- tab->NavigateToURL(net_util::FilePathToFileURL(test_file));
+ tab->NavigateToURL(net::FilePathToFileURL(test_file));
int orig_tab_count = -1;
ASSERT_TRUE(window->GetTabCount(&orig_tab_count));
int orig_process_count = GetBrowserProcessCount();
@@ -311,7 +311,7 @@ TEST_F(BrowserTest, OtherRedirectsDontForkProcess) {
// Start with a file:// url
file_util::AppendToPath(&test_file, L"title2.html");
- tab->NavigateToURL(net_util::FilePathToFileURL(test_file));
+ tab->NavigateToURL(net::FilePathToFileURL(test_file));
int orig_tab_count = -1;
ASSERT_TRUE(window->GetTabCount(&orig_tab_count));
int orig_process_count = GetBrowserProcessCount();
@@ -345,7 +345,7 @@ TEST_F(VisibleBrowserTest, WindowOpenClose) {
std::wstring test_file(test_data_directory_);
file_util::AppendToPath(&test_file, L"window.close.html");
- NavigateToURL(net_util::FilePathToFileURL(test_file));
+ NavigateToURL(net::FilePathToFileURL(test_file));
int i;
for (i = 0; i < 10; ++i) {
diff --git a/chrome/browser/browsing_data_remover.cc b/chrome/browser/browsing_data_remover.cc
index e45a374..15ccfb2 100644
--- a/chrome/browser/browsing_data_remover.cc
+++ b/chrome/browser/browsing_data_remover.cc
@@ -117,7 +117,7 @@ void BrowsingDataRemover::Remove(int remove_mask) {
if (remove_mask & REMOVE_COOKIES) {
UserMetrics::RecordAction(L"ClearBrowsingData_Cookies", profile_);
- CookieMonster* cookie_monster =
+ net::CookieMonster* cookie_monster =
profile_->GetRequestContext()->cookie_store();
cookie_monster->DeleteAllCreatedBetween(delete_begin_, delete_end_, true);
}
diff --git a/chrome/browser/cert_store.cc b/chrome/browser/cert_store.cc
index 04e7c57..0afe65a 100644
--- a/chrome/browser/cert_store.cc
+++ b/chrome/browser/cert_store.cc
@@ -80,7 +80,7 @@ CertStore::~CertStore() {
NOTIFY_RENDERER_PROCESS_TERMINATED, NotificationService::AllSources());
}
-int CertStore::StoreCert(X509Certificate* cert, int process_id) {
+int CertStore::StoreCert(net::X509Certificate* cert, int process_id) {
DCHECK(cert);
AutoLock autoLock(cert_lock_);
@@ -117,7 +117,7 @@ int CertStore::StoreCert(X509Certificate* cert, int process_id) {
}
bool CertStore::RetrieveCert(int cert_id,
- scoped_refptr<X509Certificate>* cert) {
+ scoped_refptr<net::X509Certificate>* cert) {
AutoLock autoLock(cert_lock_);
CertMap::iterator iter = id_to_cert_.find(cert_id);
diff --git a/chrome/browser/cert_store.h b/chrome/browser/cert_store.h
index 453f0b9..24b5f91 100644
--- a/chrome/browser/cert_store.h
+++ b/chrome/browser/cert_store.h
@@ -61,12 +61,12 @@ class CertStore : public NotificationObserver {
// When all the RenderProcessHosts associated with a cert have exited, the
// cert is removed from the store.
// Note: ids starts at 1.
- int StoreCert(X509Certificate* cert, int render_process_host_id);
+ int StoreCert(net::X509Certificate* cert, int render_process_host_id);
// Retrieves the previously stored cert associated with the specified
// |cert_id| and set it in |cert|. Returns false if no cert was found for
// that id.
- bool RetrieveCert(int cert_id, scoped_refptr<X509Certificate>* cert);
+ bool RetrieveCert(int cert_id, scoped_refptr<net::X509Certificate>* cert);
// NotificationObserver implementation.
virtual void Observe(NotificationType type,
@@ -86,8 +86,8 @@ class CertStore : public NotificationObserver {
static CertStore* instance_;
typedef std::multimap<int, int> IDMap;
- typedef std::map<int, scoped_refptr<X509Certificate>> CertMap;
- typedef std::map<X509Certificate*, int, X509Certificate::LessThan>
+ typedef std::map<int, scoped_refptr<net::X509Certificate>> CertMap;
+ typedef std::map<net::X509Certificate*, int, net::X509Certificate::LessThan>
ReverseCertMap;
IDMap process_id_to_cert_id_;
diff --git a/chrome/browser/crash_recovery_uitest.cc b/chrome/browser/crash_recovery_uitest.cc
index db032a0..9468d38 100644
--- a/chrome/browser/crash_recovery_uitest.cc
+++ b/chrome/browser/crash_recovery_uitest.cc
@@ -77,7 +77,7 @@ TEST_F(CrashRecoveryUITest, LoadInNewTab) {
// The title of the active tab should change each time this URL is loaded.
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"title2.html");
- GURL url(net_util::FilePathToFileURL(test_file));
+ GURL url(net::FilePathToFileURL(test_file));
NavigateToURL(url);
diff --git a/chrome/browser/download_manager.cc b/chrome/browser/download_manager.cc
index 17851ac..a919ee33 100644
--- a/chrome/browser/download_manager.cc
+++ b/chrome/browser/download_manager.cc
@@ -908,9 +908,9 @@ void DownloadManager::GenerateExtension(const std::wstring& file_name,
void DownloadManager::GenerateFilename(DownloadCreateInfo* info,
std::wstring* generated_name) {
std::wstring file_name =
- net_util::GetSuggestedFilename(GURL(info->url),
- info->content_disposition,
- L"download");
+ net::GetSuggestedFilename(GURL(info->url),
+ info->content_disposition,
+ L"download");
DCHECK(!file_name.empty());
// Make sure we get the right file extension.
diff --git a/chrome/browser/google_util.cc b/chrome/browser/google_util.cc
index d3d74f7..9a0beb7 100644
--- a/chrome/browser/google_util.cc
+++ b/chrome/browser/google_util.cc
@@ -63,8 +63,8 @@ GURL AppendGoogleLocaleParam(const GURL& url) {
GURL AppendGoogleTLDParam(const GURL& url) {
const std::string google_domain(
- RegistryControlledDomainService::GetDomainAndRegistry(
- GoogleURLTracker::GoogleURL()));
+ net::RegistryControlledDomainService::GetDomainAndRegistry(
+ GoogleURLTracker::GoogleURL()));
const size_t first_dot = google_domain.find('.');
if (first_dot == std::string::npos) {
NOTREACHED();
diff --git a/chrome/browser/history/redirect_uitest.cc b/chrome/browser/history/redirect_uitest.cc
index 75fed14..0ee58f7 100644
--- a/chrome/browser/history/redirect_uitest.cc
+++ b/chrome/browser/history/redirect_uitest.cc
@@ -102,7 +102,7 @@ TEST_F(RedirectTest, ClientEmptyReferer) {
GURL final_url = server.TestServerPageW(std::wstring());
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"file_client_redirect.html");
- GURL first_url = net_util::FilePathToFileURL(test_file);
+ GURL first_url = net::FilePathToFileURL(test_file);
NavigateToURL(first_url);
std::vector<GURL> redirects;
@@ -128,7 +128,7 @@ TEST_F(RedirectTest, ClientEmptyReferer) {
TEST_F(RedirectTest, ClientCancelled) {
std::wstring first_path = test_data_directory_;
file_util::AppendToPath(&first_path, L"cancelled_redirect_test.html");
- GURL first_url = net_util::FilePathToFileURL(first_path);
+ GURL first_url = net::FilePathToFileURL(first_path);
NavigateToURL(first_url);
Sleep(kWaitForActionMsec);
@@ -151,7 +151,7 @@ TEST_F(RedirectTest, ClientCancelled) {
// %23, but in current_url the anchor will be '#'.
std::string final_ref = "myanchor";
std::wstring current_path;
- ASSERT_TRUE(net_util::FileURLToFilePath(current_url, &current_path));
+ ASSERT_TRUE(net::FileURLToFilePath(current_url, &current_path));
// Path should remain unchanged.
EXPECT_EQ(StringToLowerASCII(first_path), StringToLowerASCII(current_path));
EXPECT_EQ(final_ref, current_url.ref());
@@ -215,7 +215,7 @@ TEST_F(RedirectTest, NoHttpToFile) {
TestServer server(kDocRoot);
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"http_to_file.html");
- GURL file_url = net_util::FilePathToFileURL(test_file);
+ GURL file_url = net::FilePathToFileURL(test_file);
GURL initial_url = server.TestServerPageW(
std::wstring(L"client-redirect?") + UTF8ToWide(file_url.spec()));
@@ -236,7 +236,7 @@ TEST_F(RedirectTest, ClientFragments) {
TestServer server(kDocRoot);
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"ref_redirect.html");
- GURL first_url = net_util::FilePathToFileURL(test_file);
+ GURL first_url = net::FilePathToFileURL(test_file);
std::vector<GURL> redirects;
NavigateToURL(first_url);
diff --git a/chrome/browser/iframe_uitest.cc b/chrome/browser/iframe_uitest.cc
index 9b3b178..7225943 100644
--- a/chrome/browser/iframe_uitest.cc
+++ b/chrome/browser/iframe_uitest.cc
@@ -38,7 +38,7 @@ class IFrameTest : public UITest {
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, url);
- NavigateToURL(net_util::FilePathToFileURL(test_file));
+ NavigateToURL(net::FilePathToFileURL(test_file));
Sleep(kWaitForActionMsec); // The browser lazily updates the title.
// Make sure the navigation succeeded.
diff --git a/chrome/browser/metrics_service_uitest.cc b/chrome/browser/metrics_service_uitest.cc
index d78aa11..4d75529 100644
--- a/chrome/browser/metrics_service_uitest.cc
+++ b/chrome/browser/metrics_service_uitest.cc
@@ -60,12 +60,12 @@ class MetricsServiceTest : public UITest {
std::wstring page1_path;
ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &page1_path));
file_util::AppendToPath(&page1_path, L"title2.html");
- ASSERT_TRUE(window_->AppendTab(net_util::FilePathToFileURL(page1_path)));
+ ASSERT_TRUE(window_->AppendTab(net::FilePathToFileURL(page1_path)));
std::wstring page2_path;
ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &page2_path));
file_util::AppendToPath(&page2_path, L"iframe.html");
- ASSERT_TRUE(window_->AppendTab(net_util::FilePathToFileURL(page2_path)));
+ ASSERT_TRUE(window_->AppendTab(net::FilePathToFileURL(page2_path)));
}
// Get a PrefService whose contents correspond to the Local State file
diff --git a/chrome/browser/net/dns_master_unittest.cc b/chrome/browser/net/dns_master_unittest.cc
index 804af04..61bef9a 100644
--- a/chrome/browser/net/dns_master_unittest.cc
+++ b/chrome/browser/net/dns_master_unittest.cc
@@ -165,7 +165,7 @@ TimeDelta BlockingDnsLookup(const std::string& hostname) {
// of DNS prefetching.
TEST(DnsMasterTest, OsCachesLookupsTest) {
SetupNetworkInfrastructure();
- WinsockInit ws_init;
+ net::WinsockInit ws_init;
for (int i = 0; i < 5; i++) {
std::string badname;
@@ -185,7 +185,7 @@ TEST(DnsMasterTest, StartupShutdownTest) {
TEST(DnsMasterTest, BenefitLookupTest) {
SetupNetworkInfrastructure();
- WinsockInit ws_init;
+ net::WinsockInit ws_init;
DnsPrefetcherInit dns_init(NULL); // Creates global service .
DnsMaster testing_master(TimeDelta::FromMilliseconds(5000));
@@ -262,7 +262,7 @@ TEST(DnsMasterTest, BenefitLookupTest) {
TEST(DnsMasterTest, DISABLED_SingleSlaveLookupTest) {
SetupNetworkInfrastructure();
- WinsockInit ws_init;
+ net::WinsockInit ws_init;
DnsPrefetcherInit dns_init(NULL); // Creates global service.
DnsMaster testing_master(TimeDelta::FromMilliseconds(5000));
@@ -314,7 +314,7 @@ TEST(DnsMasterTest, DISABLED_SingleSlaveLookupTest) {
TEST(DnsMasterTest, DISABLED_MultiThreadedLookupTest) {
SetupNetworkInfrastructure();
- WinsockInit ws_init;
+ net::WinsockInit ws_init;
DnsMaster testing_master(TimeDelta::FromSeconds(30));
DnsPrefetcherInit dns_init(NULL);
@@ -361,7 +361,7 @@ TEST(DnsMasterTest, DISABLED_MultiThreadedLookupTest) {
TEST(DnsMasterTest, DISABLED_MultiThreadedSpeedupTest) {
SetupNetworkInfrastructure();
- WinsockInit ws_init;
+ net::WinsockInit ws_init;
DnsMaster testing_master(TimeDelta::FromSeconds(30));
DnsPrefetcherInit dns_init(NULL);
diff --git a/chrome/browser/page_info_window.cc b/chrome/browser/page_info_window.cc
index dc6d8fa..7082e28 100644
--- a/chrome/browser/page_info_window.cc
+++ b/chrome/browser/page_info_window.cc
@@ -118,7 +118,8 @@ class SecurityTabView : public ChromeViews::View {
// Returns a name that can be used to represent the issuer. It tries in this
// order CN, O and OU and returns the first non-empty one found.
- static std::string GetIssuerName(const X509Certificate::Principal& issuer);
+ static std::string GetIssuerName(
+ const net::X509Certificate::Principal& issuer);
// Callback from history service with number of visits to url.
void OnGotVisitCountToHost(HistoryService::Handle handle,
@@ -253,7 +254,7 @@ SecurityTabView::SecurityTabView(Profile* profile,
std::wstring identity_title;
std::wstring identity_msg;
std::wstring connection_msg;
- scoped_refptr<X509Certificate> cert;
+ scoped_refptr<net::X509Certificate> cert;
int cert_id = navigation_entry->GetSSLCertID();
int cert_status = navigation_entry->GetSSLCertStatus();
@@ -408,7 +409,7 @@ void SecurityTabView::Layout() {
// static
std::string SecurityTabView::GetIssuerName(
- const X509Certificate::Principal& issuer) {
+ const net::X509Certificate::Principal& issuer) {
if (!issuer.common_name.empty())
return issuer.common_name;
if (!issuer.organization_names.empty())
@@ -667,7 +668,7 @@ void PageInfoWindow::CalculateWindowBounds(CRect* bounds) {
}
void PageInfoWindow::ShowCertDialog(int cert_id) {
- scoped_refptr<X509Certificate> cert;
+ scoped_refptr<net::X509Certificate> cert;
CertStore::GetSharedInstance()->RetrieveCert(cert_id, &cert);
if (!cert.get()) {
// The certificate was not found. Could be that the renderer crashed before
diff --git a/chrome/browser/plugin_process_host.cc b/chrome/browser/plugin_process_host.cc
index 2240c6f..7ee3015 100644
--- a/chrome/browser/plugin_process_host.cc
+++ b/chrome/browser/plugin_process_host.cc
@@ -133,7 +133,7 @@ class PluginDownloadUrlHelper : public URLRequest::Delegate {
net::AuthChallengeInfo* auth_info);
virtual void OnSSLCertificateError(URLRequest* request,
int cert_error,
- X509Certificate* cert);
+ net::X509Certificate* cert);
virtual void OnResponseStarted(URLRequest* request);
virtual void OnReadCompleted(URLRequest* request, int bytes_read);
@@ -204,7 +204,7 @@ void PluginDownloadUrlHelper::OnAuthRequired(
void PluginDownloadUrlHelper::OnSSLCertificateError(URLRequest* request,
int cert_error,
- X509Certificate* cert) {
+ net::X509Certificate* cert) {
URLRequest::Delegate::OnSSLCertificateError(request, cert_error, cert);
DownloadCompletedHelper(false);
}
diff --git a/chrome/browser/profile.cc b/chrome/browser/profile.cc
index 3d146e4..626389b 100644
--- a/chrome/browser/profile.cc
+++ b/chrome/browser/profile.cc
@@ -146,7 +146,7 @@ class ProfileImpl::RequestContext : public URLRequestContext,
if (record_mode || playback_mode) {
// Don't use existing cookies and use an in-memory store.
- cookie_store_ = new CookieMonster();
+ cookie_store_ = new net::CookieMonster();
cache->set_mode(
record_mode ? net::HttpCache::RECORD : net::HttpCache::PLAYBACK);
}
@@ -157,11 +157,11 @@ class ProfileImpl::RequestContext : public URLRequestContext,
DCHECK(!cookie_store_path.empty());
cookie_db_.reset(new SQLitePersistentCookieStore(
cookie_store_path, g_browser_process->db_thread()->message_loop()));
- cookie_store_ = new CookieMonster(cookie_db_.get());
+ cookie_store_ = new net::CookieMonster(cookie_db_.get());
}
- cookie_policy_.SetType(
- CookiePolicy::FromInt(prefs_->GetInteger(prefs::kCookieBehavior)));
+ cookie_policy_.SetType(net::CookiePolicy::FromInt(
+ prefs_->GetInteger(prefs::kCookieBehavior)));
// The first request context to be created is the one for the default
// profile - at least until we support multiple profiles.
@@ -189,8 +189,8 @@ class ProfileImpl::RequestContext : public URLRequestContext,
&RequestContext::OnAcceptLanguageChange,
accept_language));
} else if (*pref_name_in == prefs::kCookieBehavior) {
- CookiePolicy::Type type =
- CookiePolicy::FromInt(prefs_->GetInteger(prefs::kCookieBehavior));
+ net::CookiePolicy::Type type = net::CookiePolicy::FromInt(
+ prefs_->GetInteger(prefs::kCookieBehavior));
g_browser_process->io_thread()->message_loop()->PostTask(FROM_HERE,
NewRunnableMethod(this,
&RequestContext::OnCookiePolicyChange,
@@ -216,7 +216,7 @@ class ProfileImpl::RequestContext : public URLRequestContext,
accept_language_ = accept_language;
}
- void OnCookiePolicyChange(CookiePolicy::Type type) {
+ void OnCookiePolicyChange(net::CookiePolicy::Type type) {
DCHECK(MessageLoop::current() ==
ChromeThread::GetMessageLoop(ChromeThread::IO));
cookie_policy_.SetType(type);
@@ -265,9 +265,9 @@ class OffTheRecordRequestContext : public URLRequestContext,
scoped_ptr<net::HttpProxyInfo> proxy_info(CreateProxyInfo(command_line));
http_transaction_factory_ = new net::HttpCache(NULL, 0);
- cookie_store_ = new CookieMonster;
- cookie_policy_.SetType(
- CookiePolicy::FromInt(prefs_->GetInteger(prefs::kCookieBehavior)));
+ cookie_store_ = new net::CookieMonster;
+ cookie_policy_.SetType(net::CookiePolicy::FromInt(
+ prefs_->GetInteger(prefs::kCookieBehavior)));
user_agent_ = original_context_->user_agent();
accept_language_ = original_context_->accept_language();
accept_charset_ = original_context_->accept_charset();
@@ -307,8 +307,8 @@ class OffTheRecordRequestContext : public URLRequestContext,
&OffTheRecordRequestContext::OnAcceptLanguageChange,
accept_language));
} else if (*pref_name_in == prefs::kCookieBehavior) {
- CookiePolicy::Type type =
- CookiePolicy::FromInt(prefs_->GetInteger(prefs::kCookieBehavior));
+ net::CookiePolicy::Type type = net::CookiePolicy::FromInt(
+ prefs_->GetInteger(prefs::kCookieBehavior));
g_browser_process->io_thread()->message_loop()->PostTask(FROM_HERE,
NewRunnableMethod(this,
&OffTheRecordRequestContext::OnCookiePolicyChange,
@@ -323,7 +323,7 @@ class OffTheRecordRequestContext : public URLRequestContext,
accept_language_ = accept_language;
}
- void OnCookiePolicyChange(CookiePolicy::Type type) {
+ void OnCookiePolicyChange(net::CookiePolicy::Type type) {
DCHECK(MessageLoop::current() ==
ChromeThread::GetMessageLoop(ChromeThread::IO));
cookie_policy_.SetType(type);
diff --git a/chrome/browser/render_view_host.cc b/chrome/browser/render_view_host.cc
index 7fe7e4e..c18356a 100644
--- a/chrome/browser/render_view_host.cc
+++ b/chrome/browser/render_view_host.cc
@@ -389,7 +389,7 @@ void RenderViewHost::DragTargetDragEnter(const WebDropData& drop_data,
for (std::vector<std::wstring>::const_iterator iter(drop_data.filenames.begin());
iter != drop_data.filenames.end(); ++iter) {
policy->GrantRequestURL(process()->host_id(),
- net_util::FilePathToFileURL(*iter));
+ net::FilePathToFileURL(*iter));
policy->GrantUploadFile(process()->host_id(), *iter);
}
Send(new ViewMsg_DragTargetDragEnter(routing_id_, drop_data, client_pt,
diff --git a/chrome/browser/resource_dispatcher_host.cc b/chrome/browser/resource_dispatcher_host.cc
index 87f504f..c81f9cb 100644
--- a/chrome/browser/resource_dispatcher_host.cc
+++ b/chrome/browser/resource_dispatcher_host.cc
@@ -1822,7 +1822,7 @@ void ResourceDispatcherHost::OnAuthRequired(
void ResourceDispatcherHost::OnSSLCertificateError(
URLRequest* request,
int cert_error,
- X509Certificate* cert) {
+ net::X509Certificate* cert) {
DCHECK(request);
SSLManager::OnSSLCertificateError(this, request, cert_error, cert, ui_loop_);
}
diff --git a/chrome/browser/resource_dispatcher_host.h b/chrome/browser/resource_dispatcher_host.h
index 9614e08..a9099a9 100644
--- a/chrome/browser/resource_dispatcher_host.h
+++ b/chrome/browser/resource_dispatcher_host.h
@@ -350,7 +350,7 @@ class ResourceDispatcherHost : public URLRequest::Delegate {
net::AuthChallengeInfo* auth_info);
virtual void OnSSLCertificateError(URLRequest* request,
int cert_error,
- X509Certificate* cert);
+ net::X509Certificate* cert);
virtual void OnResponseStarted(URLRequest* request);
virtual void OnReadCompleted(URLRequest* request, int bytes_read);
void OnResponseCompleted(URLRequest* request);
diff --git a/chrome/browser/resource_dispatcher_host_uitest.cc b/chrome/browser/resource_dispatcher_host_uitest.cc
index 0096f55..f39fd04 100644
--- a/chrome/browser/resource_dispatcher_host_uitest.cc
+++ b/chrome/browser/resource_dispatcher_host_uitest.cc
@@ -229,7 +229,7 @@ TEST_F(ResourceDispatcherTest, CrossSiteNavigationNonBuffered) {
std::wstring test_file = test_data_directory_;
file_util::AppendToPath(&test_file, L"title2.html");
bool timed_out = false;
- tab->NavigateToURLWithTimeout(net_util::FilePathToFileURL(test_file),
+ tab->NavigateToURLWithTimeout(net::FilePathToFileURL(test_file),
kWaitForActionMaxMsec,
&timed_out);
EXPECT_FALSE(timed_out);
diff --git a/chrome/browser/safe_browsing/safe_browsing_service.cc b/chrome/browser/safe_browsing/safe_browsing_service.cc
index f7e47f7..8e69d3d 100644
--- a/chrome/browser/safe_browsing/safe_browsing_service.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_service.cc
@@ -207,7 +207,7 @@ void SafeBrowsingService::DisplayBlockingPage(const GURL& url,
entry.render_view_id == render_view_id &&
entry.result == result &&
entry.domain ==
- RegistryControlledDomainService::GetDomainAndRegistry(url)) {
+ net::RegistryControlledDomainService::GetDomainAndRegistry(url)) {
MessageLoop::current()->PostTask(FROM_HERE, NewRunnableMethod(
this, &SafeBrowsingService::NotifyClientBlockingComplete,
client, true));
@@ -405,8 +405,8 @@ void SafeBrowsingService::OnBlockingPageDone(SafeBrowsingBlockingPage* page,
WhiteListedEntry entry;
entry.render_process_host_id = page->render_process_host_id();
entry.render_view_id = page->render_view_id();
- entry.domain =
- RegistryControlledDomainService::GetDomainAndRegistry(page->url());
+ entry.domain = net::RegistryControlledDomainService::GetDomainAndRegistry(
+ page->url());
entry.result = page->result();
white_listed_entries_.push_back(entry);
}
diff --git a/chrome/browser/save_file_manager.cc b/chrome/browser/save_file_manager.cc
index 886dd07..518f839 100644
--- a/chrome/browser/save_file_manager.cc
+++ b/chrome/browser/save_file_manager.cc
@@ -519,7 +519,7 @@ void SaveFileManager::SaveLocalFile(const std::wstring& original_file_url,
GURL file_url(original_file_url);
DCHECK(file_url.SchemeIsFile());
std::wstring file_path;
- net_util::FileURLToFilePath(file_url, &file_path);
+ net::FileURLToFilePath(file_url, &file_path);
// If we can not get valid file path from original URL, treat it as
// disk error.
if (file_path.empty())
diff --git a/chrome/browser/save_package.cc b/chrome/browser/save_package.cc
index ef110b7..3aac7a8 100644
--- a/chrome/browser/save_package.cc
+++ b/chrome/browser/save_package.cc
@@ -237,7 +237,7 @@ bool SavePackage::GenerateFilename(const std::string& disposition,
bool need_html_ext,
std::wstring* generated_name) {
std::wstring file_name =
- net_util::GetSuggestedFilename(GURL(url), disposition, kDefaultSaveName);
+ net::GetSuggestedFilename(GURL(url), disposition, kDefaultSaveName);
DCHECK(!file_name.empty());
// Check whether we have same name before.
diff --git a/chrome/browser/session_history_uitest.cc b/chrome/browser/session_history_uitest.cc
index 06de102..f8f62e3 100644
--- a/chrome/browser/session_history_uitest.cc
+++ b/chrome/browser/session_history_uitest.cc
@@ -51,7 +51,7 @@ class SessionHistoryTest : public UITest {
file_util::AppendToPath(&path_prefix, L"session_history");
path_prefix += file_util::kPathSeparator;
- url_prefix_ = UTF8ToWide(net_util::FilePathToFileURL(path_prefix).spec());
+ url_prefix_ = UTF8ToWide(net::FilePathToFileURL(path_prefix).spec());
}
virtual void SetUp() {
diff --git a/chrome/browser/session_restore_uitest.cc b/chrome/browser/session_restore_uitest.cc
index 587b30d..903bf0d 100644
--- a/chrome/browser/session_restore_uitest.cc
+++ b/chrome/browser/session_restore_uitest.cc
@@ -50,9 +50,9 @@ class SessionRestoreUITest : public UITest {
file_util::AppendToPath(&path_prefix, L"session_history");
path_prefix += file_util::kPathSeparator;
- url1 = net_util::FilePathToFileURL(path_prefix + L"bot1.html");
- url2 = net_util::FilePathToFileURL(path_prefix + L"bot2.html");
- url3 = net_util::FilePathToFileURL(path_prefix + L"bot3.html");
+ url1 = net::FilePathToFileURL(path_prefix + L"bot1.html");
+ url2 = net::FilePathToFileURL(path_prefix + L"bot2.html");
+ url3 = net::FilePathToFileURL(path_prefix + L"bot3.html");
}
virtual void QuitBrowserAndRestore() {
diff --git a/chrome/browser/site_instance.cc b/chrome/browser/site_instance.cc
index efe907f..99f64cb 100644
--- a/chrome/browser/site_instance.cc
+++ b/chrome/browser/site_instance.cc
@@ -115,7 +115,7 @@ GURL SiteInstance::GetSiteForURL(const GURL& url) {
// If this URL has a registered domain, we only want to remember that part.
std::string domain =
- RegistryControlledDomainService::GetDomainAndRegistry(url);
+ net::RegistryControlledDomainService::GetDomainAndRegistry(url);
if (!domain.empty()) {
GURL::Replacements rep;
rep.SetHostStr(domain);
@@ -155,5 +155,5 @@ bool SiteInstance::IsSameWebSite(const GURL& url1, const GURL& url2) {
return false;
}
- return RegistryControlledDomainService::SameDomainOrHost(url1, url2);
+ return net::RegistryControlledDomainService::SameDomainOrHost(url1, url2);
}
diff --git a/chrome/browser/ssl_error_info.cc b/chrome/browser/ssl_error_info.cc
index fc6019c..992bece 100644
--- a/chrome/browser/ssl_error_info.cc
+++ b/chrome/browser/ssl_error_info.cc
@@ -53,7 +53,7 @@ SSLErrorInfo::SSLErrorInfo(const std::wstring& title,
// static
SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
- X509Certificate* cert,
+ net::X509Certificate* cert,
const GURL& request_url) {
std::wstring title, details, short_description;
std::vector<std::wstring> extra_info;
@@ -257,7 +257,7 @@ int SSLErrorInfo::GetErrorsForCertStatus(int cert_id,
};
DCHECK(arraysize(kErrorFlags) == arraysize(kErrorTypes));
- scoped_refptr<X509Certificate> cert = NULL;
+ scoped_refptr<net::X509Certificate> cert = NULL;
int count = 0;
for (int i = 0; i < arraysize(kErrorFlags); ++i) {
if (cert_status & kErrorFlags[i]) {
diff --git a/chrome/browser/ssl_error_info.h b/chrome/browser/ssl_error_info.h
index 5739a7b..e1b5a63 100644
--- a/chrome/browser/ssl_error_info.h
+++ b/chrome/browser/ssl_error_info.h
@@ -64,7 +64,7 @@ class SSLErrorInfo {
static ErrorType NetErrorToErrorType(int net_error);
static SSLErrorInfo CreateError(ErrorType error_type,
- X509Certificate* cert,
+ net::X509Certificate* cert,
const GURL& request_url);
// Populates the specified |errors| vector with the errors contained in
diff --git a/chrome/browser/ssl_manager.cc b/chrome/browser/ssl_manager.cc
index c15436d..0e9b16a 100644
--- a/chrome/browser/ssl_manager.cc
+++ b/chrome/browser/ssl_manager.cc
@@ -266,7 +266,7 @@ void SSLManager::AddMessageToConsole(const std::wstring& msg,
// Delegate API method.
-void SSLManager::DenyCertForHost(X509Certificate* cert,
+void SSLManager::DenyCertForHost(net::X509Certificate* cert,
const std::string& host) {
// Remember that we don't like this cert for this host.
// TODO(abarth): Do we want to persist this information in the user's profile?
@@ -274,7 +274,7 @@ void SSLManager::DenyCertForHost(X509Certificate* cert,
}
// Delegate API method.
-void SSLManager::AllowCertForHost(X509Certificate* cert,
+void SSLManager::AllowCertForHost(net::X509Certificate* cert,
const std::string& host) {
// Remember that we do like this cert for this host.
// TODO(abarth): Do we want to persist this information in the user's profile?
@@ -282,8 +282,8 @@ void SSLManager::AllowCertForHost(X509Certificate* cert,
}
// Delegate API method.
-X509Certificate::Policy::Judgment SSLManager::QueryPolicy(
- X509Certificate* cert, const std::string& host) {
+net::X509Certificate::Policy::Judgment SSLManager::QueryPolicy(
+ net::X509Certificate* cert, const std::string& host) {
// TODO(abarth): Do we want to read this information from the user's profile?
return cert_policy_for_host_[host].Check(cert);
}
@@ -512,7 +512,7 @@ SSLManager::CertError::CertError(
URLRequest* request,
ResourceType::Type resource_type,
int cert_error,
- X509Certificate* cert,
+ net::X509Certificate* cert,
MessageLoop* ui_loop)
: ErrorHandler(rdh, request, ui_loop),
cert_error_(cert_error),
@@ -529,7 +529,7 @@ SSLManager::CertError::CertError(
void SSLManager::OnSSLCertificateError(ResourceDispatcherHost* rdh,
URLRequest* request,
int cert_error,
- X509Certificate* cert,
+ net::X509Certificate* cert,
MessageLoop* ui_loop) {
DLOG(INFO) << "OnSSLCertificateError() cert_error: " << cert_error <<
" url: " << request->url().spec();
@@ -751,7 +751,7 @@ bool SSLManager::DeserializeSecurityInfo(const std::string& state,
}
// static
-bool SSLManager::GetEVCertNames(const X509Certificate& cert,
+bool SSLManager::GetEVCertNames(const net::X509Certificate& cert,
std::wstring* short_name,
std::wstring* ca_name) {
DCHECK(short_name || ca_name);
diff --git a/chrome/browser/ssl_manager.h b/chrome/browser/ssl_manager.h
index c0d6750..943c29c 100644
--- a/chrome/browser/ssl_manager.h
+++ b/chrome/browser/ssl_manager.h
@@ -215,7 +215,7 @@ class SSLManager : public NotificationObserver {
URLRequest* request,
ResourceType::Type resource_type,
int cert_error,
- X509Certificate* cert,
+ net::X509Certificate* cert,
MessageLoop* ui_loop);
// ErrorHandler methods
@@ -318,14 +318,14 @@ class SSLManager : public NotificationObserver {
ConsoleMessageLevel level);
// Records that |cert| is permitted to be used for |host| in the future.
- void DenyCertForHost(X509Certificate* cert, const std::string& host);
+ void DenyCertForHost(net::X509Certificate* cert, const std::string& host);
// Records that |cert| is not permitted to be used for |host| in the future.
- void AllowCertForHost(X509Certificate* cert, const std::string& host);
+ void AllowCertForHost(net::X509Certificate* cert, const std::string& host);
// Queries whether |cert| is allowed or denied for |host|.
- X509Certificate::Policy::Judgment QueryPolicy(X509Certificate* cert,
- const std::string& host);
+ net::X509Certificate::Policy::Judgment QueryPolicy(
+ net::X509Certificate* cert, const std::string& host);
// Allow mixed/unsafe content to be visible (non filtered) for the specified
// URL.
@@ -353,7 +353,7 @@ class SSLManager : public NotificationObserver {
static void OnSSLCertificateError(ResourceDispatcherHost* resource_dispatcher,
URLRequest* request,
int cert_error,
- X509Certificate* cert,
+ net::X509Certificate* cert,
MessageLoop* ui_loop);
// Called when a mixed-content sub-resource request has been detected. The
@@ -414,7 +414,7 @@ class SSLManager : public NotificationObserver {
// Sets |short_name| to <organization_name> [<country>] and |ca_name|
// to something like:
// "Verified by <issuer_organization_name>"
- static bool GetEVCertNames(const X509Certificate& cert,
+ static bool GetEVCertNames(const net::X509Certificate& cert,
std::wstring* short_name,
std::wstring* ca_name);
@@ -470,7 +470,7 @@ class SSLManager : public NotificationObserver {
ObserverList<SSLInfoBar> visible_info_bars_;
// Certificate policies for each host.
- std::map<std::string, X509Certificate::Policy> cert_policy_for_host_;
+ std::map<std::string, net::X509Certificate::Policy> cert_policy_for_host_;
// Domains for which it is OK to show insecure content.
std::set<std::string> can_show_insecure_content_for_host_;
diff --git a/chrome/browser/ssl_policy.cc b/chrome/browser/ssl_policy.cc
index 08f7936..1ae9ae1 100644
--- a/chrome/browser/ssl_policy.cc
+++ b/chrome/browser/ssl_policy.cc
@@ -303,21 +303,21 @@ class DefaultPolicy : public SSLPolicy {
}
// First we check if we know the policy for this error.
- X509Certificate::Policy::Judgment judgment =
+ net::X509Certificate::Policy::Judgment judgment =
error->manager()->QueryPolicy(error->ssl_info().cert,
error->request_url().host());
- switch(judgment) {
- case X509Certificate::Policy::ALLOWED:
+ switch (judgment) {
+ case net::X509Certificate::Policy::ALLOWED:
// We've been told to allow this certificate.
error->manager()->SetMaxSecurityStyle(
SECURITY_STYLE_AUTHENTICATION_BROKEN);
error->ContinueRequest();
break;
- case X509Certificate::Policy::DENIED:
+ case net::X509Certificate::Policy::DENIED:
// For now we handle the DENIED as the UNKNOWN, which means a blocking
// page is shown to the user every time he comes back to the page.
- case X509Certificate::Policy::UNKNOWN:
+ case net::X509Certificate::Policy::UNKNOWN:
// We don't know how to handle this error. Ask our sub-policies.
sub_policies_[index]->OnCertError(main_frame_url, error);
break;
diff --git a/chrome/browser/tab_contents.cc b/chrome/browser/tab_contents.cc
index 364ef91..7f6c9e8 100644
--- a/chrome/browser/tab_contents.cc
+++ b/chrome/browser/tab_contents.cc
@@ -166,7 +166,7 @@ bool TabContents::GetSSLEVText(std::wstring* ev_text,
((entry->GetSSLCertStatus() & net::CERT_STATUS_IS_EV) == 0))
return false;
- scoped_refptr<X509Certificate> cert;
+ scoped_refptr<net::X509Certificate> cert;
CertStore::GetSharedInstance()->RetrieveCert(entry->GetSSLCertID(), &cert);
if (!cert.get()) {
NOTREACHED();
diff --git a/chrome/browser/tab_restore_uitest.cc b/chrome/browser/tab_restore_uitest.cc
index 7765902..811b6d2 100644
--- a/chrome/browser/tab_restore_uitest.cc
+++ b/chrome/browser/tab_restore_uitest.cc
@@ -47,8 +47,8 @@ class TabRestoreUITest : public UITest {
std::wstring path_prefix = test_data_directory_;
file_util::AppendToPath(&path_prefix, L"session_history");
path_prefix += file_util::kPathSeparator;
- url1_ = net_util::FilePathToFileURL(path_prefix + L"bot1.html");
- url2_ = net_util::FilePathToFileURL(path_prefix + L"bot2.html");
+ url1_ = net::FilePathToFileURL(path_prefix + L"bot1.html");
+ url2_ = net::FilePathToFileURL(path_prefix + L"bot2.html");
}
protected:
diff --git a/chrome/browser/template_url_model.cc b/chrome/browser/template_url_model.cc
index b137915..85e4a78 100644
--- a/chrome/browser/template_url_model.cc
+++ b/chrome/browser/template_url_model.cc
@@ -174,7 +174,7 @@ std::wstring TemplateURLModel::GenerateKeyword(const GURL& url,
// Strip "www." off the front of the keyword; otherwise the keyword won't work
// properly. See http://b/issue?id=1205573.
- return net_util::StripWWW(UTF8ToWide(url.host()));
+ return net::StripWWW(UTF8ToWide(url.host()));
}
// static
@@ -195,7 +195,7 @@ std::wstring TemplateURLModel::CleanUserInputKeyword(
}
// Remove leading "www.".
- result = net_util::StripWWW(result);
+ result = net::StripWWW(result);
// Remove trailing "/".
return (result.length() > 0 && result[result.length() - 1] == L'/') ?
diff --git a/chrome/browser/toolbar_model.cc b/chrome/browser/toolbar_model.cc
index e6bf8bc..6321555 100644
--- a/chrome/browser/toolbar_model.cc
+++ b/chrome/browser/toolbar_model.cc
@@ -200,7 +200,7 @@ void ToolbarModel::GetInfoText(std::wstring* text,
((entry->GetSSLCertStatus() & net::CERT_STATUS_IS_EV) == 0))
return;
- scoped_refptr<X509Certificate> cert;
+ scoped_refptr<net::X509Certificate> cert;
CertStore::GetSharedInstance()->RetrieveCert(entry->GetSSLCertID(), &cert);
if (!cert.get()) {
NOTREACHED();
diff --git a/chrome/browser/url_fixer_upper.cc b/chrome/browser/url_fixer_upper.cc
index 9fb2cde..f687d6e 100644
--- a/chrome/browser/url_fixer_upper.cc
+++ b/chrome/browser/url_fixer_upper.cc
@@ -84,7 +84,7 @@ static wstring FixupPath(const wstring& text) {
filename[1] = ':';
// Here, we know the input looks like a file.
- GURL file_url = net_util::FilePathToFileURL(filename);
+ GURL file_url = net::FilePathToFileURL(filename);
if (file_url.is_valid())
return gfx::ElideUrl(file_url, ChromeFont(), 0, std::wstring());
@@ -108,7 +108,7 @@ static void AddDesiredTLD(const wstring& desired_tld,
// TLD). We disallow unknown registries here so users can input "mail.yahoo"
// and hit ctrl-enter to get "www.mail.yahoo.com".
const size_t registry_length =
- RegistryControlledDomainService::GetRegistryLength(*domain, false);
+ net::RegistryControlledDomainService::GetRegistryLength(*domain, false);
if (registry_length != 0)
return;
@@ -457,7 +457,7 @@ wstring URLFixerUpper::FixupRelativeFile(const wstring& base_dir,
SetCurrentDirectory(old_cur_directory);
if (is_file) {
- GURL file_url = net_util::FilePathToFileURL(full_path);
+ GURL file_url = net::FilePathToFileURL(full_path);
if (file_url.is_valid())
return gfx::ElideUrl(file_url, ChromeFont(), 0, std::wstring());
// Invalid files fall through to regular processing.
diff --git a/chrome/browser/url_fixer_upper_unittest.cc b/chrome/browser/url_fixer_upper_unittest.cc
index a885525..713a8f1 100644
--- a/chrome/browser/url_fixer_upper_unittest.cc
+++ b/chrome/browser/url_fixer_upper_unittest.cc
@@ -164,7 +164,7 @@ static bool IsMatchingFileURL(const std::wstring& url,
return false; // contains backslashes
std::wstring derived_path;
- net_util::FileURLToFilePath(GURL(url), &derived_path);
+ net::FileURLToFilePath(GURL(url), &derived_path);
return (derived_path.length() == full_file_path.length()) &&
std::equal(derived_path.begin(), derived_path.end(),
full_file_path.begin(), CaseInsensitiveCompare<wchar_t>());
@@ -249,7 +249,7 @@ TEST(URLFixerUpperTest, FixupFile) {
// reference path
std::wstring golden =
- UTF8ToWide(net_util::FilePathToFileURL(original).spec());
+ UTF8ToWide(net::FilePathToFileURL(original).spec());
// c:\foo\bar.txt -> file:///c:/foo/bar.txt (basic)
std::wstring fixedup = URLFixerUpper::FixupURL(original, L"");
diff --git a/chrome/browser/views/constrained_window_impl_interactive_uitest.cc b/chrome/browser/views/constrained_window_impl_interactive_uitest.cc
index b06efd3..1fd47ea 100644
--- a/chrome/browser/views/constrained_window_impl_interactive_uitest.cc
+++ b/chrome/browser/views/constrained_window_impl_interactive_uitest.cc
@@ -62,7 +62,7 @@ TEST_F(InteractiveConstrainedWindowTest, UserActivatedResizeToLeavesSpaceForChro
file_util::AppendToPath(&filename, L"constrained_files");
file_util::AppendToPath(&filename,
L"constrained_window_onload_resizeto.html");
- ASSERT_TRUE(tab->NavigateToURL(net_util::FilePathToFileURL(filename)));
+ ASSERT_TRUE(tab->NavigateToURL(net::FilePathToFileURL(filename)));
gfx::Rect tab_view_bounds;
ASSERT_TRUE(window->GetViewBounds(VIEW_ID_TAB_CONTAINER,
diff --git a/chrome/browser/views/options/advanced_contents_view.cc b/chrome/browser/views/options/advanced_contents_view.cc
index 52ed1df..29382c4 100644
--- a/chrome/browser/views/options/advanced_contents_view.cc
+++ b/chrome/browser/views/options/advanced_contents_view.cc
@@ -636,16 +636,16 @@ class CookieBehaviorComboModel : public ChromeViews::ComboBox::Model {
return L"";
}
- static int CookiePolicyToIndex(CookiePolicy::Type policy) {
+ static int CookiePolicyToIndex(net::CookiePolicy::Type policy) {
return policy;
}
- static CookiePolicy::Type IndexToCookiePolicy(int index) {
- if (CookiePolicy::ValidType(index))
- return CookiePolicy::FromInt(index);
+ static net::CookiePolicy::Type IndexToCookiePolicy(int index) {
+ if (net::CookiePolicy::ValidType(index))
+ return net::CookiePolicy::FromInt(index);
NOTREACHED();
- return CookiePolicy::ALLOW_ALL_COOKIES;
+ return net::CookiePolicy::ALLOW_ALL_COOKIES;
}
private:
@@ -775,7 +775,7 @@ void SecuritySection::ItemChanged(ChromeViews::ComboBox* sender,
UserMetricsRecordAction(kUserMetrics[filter_policy], profile()->GetPrefs());
filter_mixed_content_.SetValue(filter_policy);
} else if (sender == cookie_behavior_combobox_) {
- CookiePolicy::Type cookie_policy =
+ net::CookiePolicy::Type cookie_policy =
CookieBehaviorComboModel::IndexToCookiePolicy(new_index);
const wchar_t* kUserMetrics[] = {
L"Options_AllowAllCookies",
@@ -884,7 +884,7 @@ void SecuritySection::NotifyPrefChanged(const std::wstring* pref_name) {
if (!pref_name || *pref_name == prefs::kCookieBehavior) {
cookie_behavior_combobox_->SetSelectedItem(
CookieBehaviorComboModel::CookiePolicyToIndex(
- CookiePolicy::FromInt(cookie_behavior_.GetValue())));
+ net::CookiePolicy::FromInt(cookie_behavior_.GetValue())));
}
if (!pref_name || *pref_name == prefs::kSafeBrowsingEnabled)
enable_safe_browsing_checkbox_->SetIsSelected(safe_browsing_.GetValue());
diff --git a/chrome/browser/views/options/cookies_view.cc b/chrome/browser/views/options/cookies_view.cc
index bd5424d..8d93fed 100644
--- a/chrome/browser/views/options/cookies_view.cc
+++ b/chrome/browser/views/options/cookies_view.cc
@@ -66,7 +66,7 @@ class CookiesTableModel : public ChromeViews::TableModel {
// Returns information about the Cookie at the specified index.
std::string GetDomainAt(int index);
- CookieMonster::CanonicalCookie& GetCookieAt(int index);
+ net::CookieMonster::CanonicalCookie& GetCookieAt(int index);
// Remove the specified cookies from the Cookie Monster and update the view.
void RemoveCookies(int start_index, int remove_count);
@@ -90,8 +90,8 @@ class CookiesTableModel : public ChromeViews::TableModel {
// The profile from which this model sources cookies.
Profile* profile_;
- typedef CookieMonster::CookieList CookieList;
- typedef std::vector<CookieMonster::CookieListPair*> CookiePtrList;
+ typedef net::CookieMonster::CookieList CookieList;
+ typedef std::vector<net::CookieMonster::CookieListPair*> CookiePtrList;
CookieList all_cookies_;
CookiePtrList shown_cookies_;
@@ -121,7 +121,8 @@ std::string CookiesTableModel::GetDomainAt(int index) {
return shown_cookies_.at(index)->first;
}
-CookieMonster::CanonicalCookie& CookiesTableModel::GetCookieAt(int index) {
+net::CookieMonster::CanonicalCookie& CookiesTableModel::GetCookieAt(
+ int index) {
DCHECK(index >= 0 && index < RowCount());
return shown_cookies_.at(index)->second;
}
@@ -132,7 +133,7 @@ void CookiesTableModel::RemoveCookies(int start_index, int remove_count) {
return;
}
- CookieMonster* monster = profile_->GetRequestContext()->cookie_store();
+ net::CookieMonster* monster = profile_->GetRequestContext()->cookie_store();
// We need to update the searched results list, the full cookie list,
// and the view. We walk through the search results list (which is what
@@ -207,17 +208,18 @@ void CookiesTableModel::SetObserver(ChromeViews::TableModelObserver* observer) {
// Returns true if |cookie| matches the specified filter, where "match" is
// defined as the cookie's domain, name and value contains filter text
// somewhere.
-static bool ContainsFilterText(const std::string& domain,
- const CookieMonster::CanonicalCookie& cookie,
- const std::string& filter) {
+static bool ContainsFilterText(
+ const std::string& domain,
+ const net::CookieMonster::CanonicalCookie& cookie,
+ const std::string& filter) {
return domain.find(filter) != std::string::npos ||
cookie.Name().find(filter) != std::string::npos ||
cookie.Value().find(filter) != std::string::npos;
}
// Sort ignore the '.' prefix for domain cookies.
-static bool CookieSorter(const CookieMonster::CookieListPair& cp1,
- const CookieMonster::CookieListPair& cp2) {
+static bool CookieSorter(const net::CookieMonster::CookieListPair& cp1,
+ const net::CookieMonster::CookieListPair& cp2) {
bool is1domain = !cp1.first.empty() && cp1.first[0] == '.';
bool is2domain = !cp2.first.empty() && cp2.first[0] == '.';
@@ -235,7 +237,7 @@ static bool CookieSorter(const CookieMonster::CookieListPair& cp1,
void CookiesTableModel::LoadCookies() {
// mmargh mmargh mmargh!
- CookieMonster* cookie_monster =
+ net::CookieMonster* cookie_monster =
profile_->GetRequestContext()->cookie_store();
all_cookies_ = cookie_monster->GetAllCookies();
std::sort(all_cookies_.begin(), all_cookies_.end(), CookieSorter);
@@ -335,7 +337,7 @@ class CookieInfoView : public ChromeViews::View {
// Update the display from the specified CookieNode.
void SetCookie(const std::string& domain,
- const CookieMonster::CanonicalCookie& cookie_node);
+ const net::CookieMonster::CanonicalCookie& cookie_node);
// Clears the cookie display to indicate that no or multiple cookies are
// selected.
@@ -393,8 +395,9 @@ CookieInfoView::CookieInfoView()
CookieInfoView::~CookieInfoView() {
}
-void CookieInfoView::SetCookie(const std::string& domain,
- const CookieMonster::CanonicalCookie& cookie) {
+void CookieInfoView::SetCookie(
+ const std::string& domain,
+ const net::CookieMonster::CanonicalCookie& cookie) {
name_value_field_->SetText(UTF8ToWide(cookie.Name()));
content_value_field_->SetText(UTF8ToWide(cookie.Value()));
domain_value_field_->SetText(UTF8ToWide(domain));
diff --git a/chrome/browser/web_contents.cc b/chrome/browser/web_contents.cc
index 5a330e7..0d5ed17 100644
--- a/chrome/browser/web_contents.cc
+++ b/chrome/browser/web_contents.cc
@@ -1301,7 +1301,8 @@ void WebContents::UpdateHistoryForNavigation(const GURL& display_url,
void WebContents::MaybeCloseChildWindows(
const ViewHostMsg_FrameNavigate_Params& params) {
- if (RegistryControlledDomainService::SameDomainOrHost(last_url_, params.url))
+ if (net::RegistryControlledDomainService::SameDomainOrHost(
+ last_url_, params.url))
return;
last_url_ = params.url;
@@ -1876,7 +1877,7 @@ void WebContents::DidNavigateAnyFramePreCommit(
DownloadManager* download_manager = profile()->GetDownloadManager();
// download_manager can be NULL in unit test context.
if (download_manager && download_manager ->in_progress_count() == 0 &&
- current_entry && !RegistryControlledDomainService::SameDomainOrHost(
+ current_entry && !net::RegistryControlledDomainService::SameDomainOrHost(
current_entry->GetURL(), entry->GetURL())) {
TimeDelta time_delta(
TimeTicks::Now() - last_download_shelf_show_);