Index: chrome/browser/importer/nss_decryptor.cc |
diff --git a/chrome/browser/importer/nss_decryptor.cc b/chrome/browser/importer/nss_decryptor.cc |
index d837c20610841dcb3bb98cf129045ca491eb457e..1658e35545c2bb7c0c15c1122457fc2f4a251214 100644 |
--- a/chrome/browser/importer/nss_decryptor.cc |
+++ b/chrome/browser/importer/nss_decryptor.cc |
@@ -14,7 +14,7 @@ |
#include "base/utf_string_conversions.h" |
#include "sql/connection.h" |
#include "sql/statement.h" |
-#include "webkit/glue/password_form.h" |
+#include "webkit/forms/password_form.h" |
#if defined(USE_NSS) |
#include <pk11pub.h> |
@@ -110,8 +110,9 @@ string16 NSSDecryptor::Decrypt(const std::string& crypt) const { |
// http://kb.mozillazine.org/Signons.txt |
// http://kb.mozillazine.org/Signons2.txt |
// http://kb.mozillazine.org/Signons3.txt |
-void NSSDecryptor::ParseSignons(const std::string& content, |
- std::vector<webkit_glue::PasswordForm>* forms) { |
+void NSSDecryptor::ParseSignons( |
+ const std::string& content, |
+ std::vector<webkit::forms::PasswordForm>* forms) { |
forms->clear(); |
// Splits the file content into lines. |
@@ -140,7 +141,7 @@ void NSSDecryptor::ParseSignons(const std::string& content, |
// Reads never-saved list. Domains are stored one per line. |
size_t i; |
for (i = 1; i < lines.size() && lines[i].compare(".") != 0; ++i) { |
- webkit_glue::PasswordForm form; |
+ webkit::forms::PasswordForm form; |
form.origin = GURL(lines[i]).ReplaceComponents(rep); |
form.signon_realm = form.origin.GetOrigin().spec(); |
form.blacklisted_by_user = true; |
@@ -162,7 +163,7 @@ void NSSDecryptor::ParseSignons(const std::string& content, |
if (end - begin < 5) |
continue; |
- webkit_glue::PasswordForm form; |
+ webkit::forms::PasswordForm form; |
// The first line is the site URL. |
// For HTTP authentication logins, the URL may contain http realm, |
@@ -232,7 +233,7 @@ void NSSDecryptor::ParseSignons(const std::string& content, |
} |
bool NSSDecryptor::ReadAndParseSignons(const FilePath& sqlite_file, |
- std::vector<webkit_glue::PasswordForm>* forms) { |
+ std::vector<webkit::forms::PasswordForm>* forms) { |
sql::Connection db; |
if (!db.Open(sqlite_file)) |
return false; |
@@ -249,7 +250,7 @@ bool NSSDecryptor::ReadAndParseSignons(const FilePath& sqlite_file, |
rep.ClearPassword(); |
// Read domains for which passwords are never saved. |
while (s.Step()) { |
- webkit_glue::PasswordForm form; |
+ webkit::forms::PasswordForm form; |
form.origin = GURL(s.ColumnString(0)).ReplaceComponents(rep); |
form.signon_realm = form.origin.GetOrigin().spec(); |
form.blacklisted_by_user = true; |
@@ -280,7 +281,7 @@ bool NSSDecryptor::ReadAndParseSignons(const FilePath& sqlite_file, |
if (!url.is_valid()) |
continue; |
- webkit_glue::PasswordForm form; |
+ webkit::forms::PasswordForm form; |
form.origin = url.ReplaceComponents(rep); |
form.signon_realm = form.origin.GetOrigin().spec(); |
if (!realm.empty()) |