Index: chrome/browser/safe_browsing/unverified_download_policy.h |
diff --git a/chrome/browser/safe_browsing/unverified_download_policy.h b/chrome/browser/safe_browsing/unverified_download_policy.h |
index 170e92bfe8d57d2cb2d7342131813ee49c3f8dbb..e5001db575265726c67131e2ee29c744838eb7ea 100644 |
--- a/chrome/browser/safe_browsing/unverified_download_policy.h |
+++ b/chrome/browser/safe_browsing/unverified_download_policy.h |
@@ -5,14 +5,13 @@ |
#ifndef CHROME_BROWSER_SAFE_BROWSING_UNVERIFIED_DOWNLOAD_POLICY_H_ |
#define CHROME_BROWSER_SAFE_BROWSING_UNVERIFIED_DOWNLOAD_POLICY_H_ |
+#include <vector> |
+ |
#include "base/callback_forward.h" |
+#include "base/files/file_path.h" |
class GURL; |
-namespace base { |
-class FilePath; |
-} |
- |
namespace safe_browsing { |
enum class UnverifiedDownloadPolicy { ALLOWED, DISALLOWED }; |
@@ -21,10 +20,13 @@ using UnverifiedDownloadCheckCompletionCallback = |
base::Callback<void(UnverifiedDownloadPolicy)>; |
// Invokes |callback| on the current thread with the effective download policy |
-// for an unverified download of |file| by |requestor|. |
+// for an unverified download of |file| by |requestor|. If it is possible for |
+// the file to be downloaded with alternate file extensions, they should be |
+// specified in |alternate_extensions|. |
void CheckUnverifiedDownloadPolicy( |
const GURL& requestor, |
const base::FilePath& file, |
+ const std::vector<base::FilePath::StringType>& alternate_extensions, |
const UnverifiedDownloadCheckCompletionCallback& callback); |
} // namespace safe_browsing |