Index: chrome/browser/extensions/sandboxed_unpacker.cc |
diff --git a/chrome/browser/extensions/sandboxed_unpacker.cc b/chrome/browser/extensions/sandboxed_unpacker.cc |
index 8fd15efdf718d1ebb668ceee540864057f437b7a..48c9230fc970418dfca22ace526f4fda3deea84c 100644 |
--- a/chrome/browser/extensions/sandboxed_unpacker.cc |
+++ b/chrome/browser/extensions/sandboxed_unpacker.cc |
@@ -72,7 +72,7 @@ void RecordSuccessfulUnpackTimeHistograms( |
// To get a sense of how CRX size impacts unpack time, record unpack |
// time for several increments of CRX size. |
int64 crx_file_size; |
- if (!file_util::GetFileSize(crx_path, &crx_file_size)) { |
+ if (!base::GetFileSize(crx_path, &crx_file_size)) { |
UMA_HISTOGRAM_COUNTS("Extensions.SandboxUnpackSuccessCantGetCrxSize", 1); |
return; |
} |
@@ -135,8 +135,7 @@ bool VerifyJunctionFreeLocation(base::FilePath* temp_dir) { |
return false; |
base::FilePath normalized_temp_file; |
- bool normalized = |
- file_util::NormalizeFilePath(temp_file, &normalized_temp_file); |
+ bool normalized = base::NormalizeFilePath(temp_file, &normalized_temp_file); |
if (!normalized) { |
// If |temp_file| contains a link, the sandbox will block al file system |
// operations, and the install will fail. |
@@ -293,7 +292,7 @@ void SandboxedUnpacker::Start() { |
// will cause file system access outside the sandbox path, and the sandbox |
// will deny the operation. |
base::FilePath link_free_crx_path; |
- if (!file_util::NormalizeFilePath(temp_crx_path, &link_free_crx_path)) { |
+ if (!base::NormalizeFilePath(temp_crx_path, &link_free_crx_path)) { |
LOG(ERROR) << "Could not get the normalized path of " |
<< temp_crx_path.value(); |
ReportFailure( |