summaryrefslogtreecommitdiffstats
path: root/chrome/browser/child_process_security_policy.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chrome/browser/child_process_security_policy.cc')
-rw-r--r--chrome/browser/child_process_security_policy.cc38
1 files changed, 19 insertions, 19 deletions
diff --git a/chrome/browser/child_process_security_policy.cc b/chrome/browser/child_process_security_policy.cc
index ea1f725..0ea3e1d 100644
--- a/chrome/browser/child_process_security_policy.cc
+++ b/chrome/browser/child_process_security_policy.cc
@@ -151,7 +151,7 @@ ChildProcessSecurityPolicy* ChildProcessSecurityPolicy::GetInstance() {
}
void ChildProcessSecurityPolicy::Add(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
if (security_state_.count(child_id) != 0) {
NOTREACHED() << "Add child process at most once.";
return;
@@ -161,7 +161,7 @@ void ChildProcessSecurityPolicy::Add(int child_id) {
}
void ChildProcessSecurityPolicy::Remove(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
if (!security_state_.count(child_id))
return; // May be called multiple times.
@@ -171,7 +171,7 @@ void ChildProcessSecurityPolicy::Remove(int child_id) {
void ChildProcessSecurityPolicy::RegisterWebSafeScheme(
const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
DCHECK(web_safe_schemes_.count(scheme) == 0) << "Add schemes at most once.";
DCHECK(pseudo_schemes_.count(scheme) == 0) << "Web-safe implies not psuedo.";
@@ -179,14 +179,14 @@ void ChildProcessSecurityPolicy::RegisterWebSafeScheme(
}
bool ChildProcessSecurityPolicy::IsWebSafeScheme(const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
return (web_safe_schemes_.find(scheme) != web_safe_schemes_.end());
}
void ChildProcessSecurityPolicy::RegisterPseudoScheme(
const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
DCHECK(pseudo_schemes_.count(scheme) == 0) << "Add schemes at most once.";
DCHECK(web_safe_schemes_.count(scheme) == 0) <<
"Psuedo implies not web-safe.";
@@ -195,7 +195,7 @@ void ChildProcessSecurityPolicy::RegisterPseudoScheme(
}
bool ChildProcessSecurityPolicy::IsPseudoScheme(const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
return (pseudo_schemes_.find(scheme) != pseudo_schemes_.end());
}
@@ -224,7 +224,7 @@ void ChildProcessSecurityPolicy::GrantRequestURL(
}
{
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
return;
@@ -242,7 +242,7 @@ void ChildProcessSecurityPolicy::GrantReadFile(int child_id,
void ChildProcessSecurityPolicy::GrantPermissionsForFile(
int child_id, const FilePath& file, int permissions) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -253,7 +253,7 @@ void ChildProcessSecurityPolicy::GrantPermissionsForFile(
void ChildProcessSecurityPolicy::RevokeAllPermissionsForFile(
int child_id, const FilePath& file) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -264,7 +264,7 @@ void ChildProcessSecurityPolicy::RevokeAllPermissionsForFile(
void ChildProcessSecurityPolicy::GrantScheme(int child_id,
const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -274,7 +274,7 @@ void ChildProcessSecurityPolicy::GrantScheme(int child_id,
}
void ChildProcessSecurityPolicy::GrantDOMUIBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -290,7 +290,7 @@ void ChildProcessSecurityPolicy::GrantDOMUIBindings(int child_id) {
}
void ChildProcessSecurityPolicy::GrantExtensionBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -300,7 +300,7 @@ void ChildProcessSecurityPolicy::GrantExtensionBindings(int child_id) {
}
void ChildProcessSecurityPolicy::GrantReadRawCookies(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -310,7 +310,7 @@ void ChildProcessSecurityPolicy::GrantReadRawCookies(int child_id) {
}
void ChildProcessSecurityPolicy::RevokeReadRawCookies(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -354,7 +354,7 @@ bool ChildProcessSecurityPolicy::CanRequestURL(
return true; // This URL request is destined for ShellExecute.
{
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -373,7 +373,7 @@ bool ChildProcessSecurityPolicy::CanReadFile(int child_id,
bool ChildProcessSecurityPolicy::HasPermissionsForFile(
int child_id, const FilePath& file, int permissions) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -383,7 +383,7 @@ bool ChildProcessSecurityPolicy::HasPermissionsForFile(
}
bool ChildProcessSecurityPolicy::HasDOMUIBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -393,7 +393,7 @@ bool ChildProcessSecurityPolicy::HasDOMUIBindings(int child_id) {
}
bool ChildProcessSecurityPolicy::HasExtensionBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -403,7 +403,7 @@ bool ChildProcessSecurityPolicy::HasExtensionBindings(int child_id) {
}
bool ChildProcessSecurityPolicy::CanReadRawCookies(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())