| Index: chrome/common/safe_browsing/zip_analyzer.cc
|
| diff --git a/chrome/common/safe_browsing/zip_analyzer.cc b/chrome/common/safe_browsing/zip_analyzer.cc
|
| index 9a4b9e8a847abf3cacb4608034ef6f655f136a75..b352ca339a73792689f5009ad80116bd8cbd1b3d 100644
|
| --- a/chrome/common/safe_browsing/zip_analyzer.cc
|
| +++ b/chrome/common/safe_browsing/zip_analyzer.cc
|
| @@ -16,6 +16,7 @@
|
| #include "chrome/common/safe_browsing/binary_feature_extractor.h"
|
| #include "chrome/common/safe_browsing/csd.pb.h"
|
| #include "chrome/common/safe_browsing/download_protection_util.h"
|
| +#include "chrome/common/safe_browsing/file_type_policies.h"
|
| #include "chrome/common/safe_browsing/zip_analyzer_results.h"
|
| #include "crypto/secure_hash.h"
|
| #include "crypto/sha2.h"
|
| @@ -116,11 +117,11 @@ void AnalyzeZipFile(base::File zip_file,
|
| continue;
|
| }
|
| const base::FilePath& file = reader.current_entry_info()->file_path();
|
| - if (download_protection_util::IsArchiveFile(file)) {
|
| + if (FileTypePolicies::GetInstance()->IsArchiveFile(file)) {
|
| DVLOG(2) << "Downloaded a zipped archive: " << file.value();
|
| results->has_archive = true;
|
| archived_archive_filenames.insert(file.BaseName());
|
| - } else if (download_protection_util::IsSupportedBinaryFile(file)) {
|
| + } else if (FileTypePolicies::GetInstance()->IsCheckedBinaryFile(file)) {
|
| DVLOG(2) << "Downloaded a zipped executable: " << file.value();
|
| results->has_executable = true;
|
| AnalyzeContainedFile(binary_feature_extractor, file, &reader, &temp_file,
|
|
|