| Index: chrome/utility/importer/nss_decryptor.cc
|
| diff --git a/chrome/utility/importer/nss_decryptor.cc b/chrome/utility/importer/nss_decryptor.cc
|
| index 7f98e33e6fa5d087a99f05d8e86861d119ebabd2..a06f2085dfb39a55c39bad6e7ee19b0d88a56c3c 100644
|
| --- a/chrome/utility/importer/nss_decryptor.cc
|
| +++ b/chrome/utility/importer/nss_decryptor.cc
|
| @@ -12,7 +12,7 @@
|
| #include "base/strings/string_split.h"
|
| #include "base/strings/string_util.h"
|
| #include "base/strings/utf_string_conversions.h"
|
| -#include "content/public/common/password_form.h"
|
| +#include "components/autofill/core/common/password_form.h"
|
| #include "sql/connection.h"
|
| #include "sql/statement.h"
|
|
|
| @@ -112,7 +112,7 @@ string16 NSSDecryptor::Decrypt(const std::string& crypt) const {
|
| // http://kb.mozillazine.org/Signons3.txt
|
| void NSSDecryptor::ParseSignons(
|
| const std::string& content,
|
| - std::vector<content::PasswordForm>* forms) {
|
| + std::vector<autofill::PasswordForm>* forms) {
|
| forms->clear();
|
|
|
| // Splits the file content into lines.
|
| @@ -141,7 +141,7 @@ void NSSDecryptor::ParseSignons(
|
| // Reads never-saved list. Domains are stored one per line.
|
| size_t i;
|
| for (i = 1; i < lines.size() && lines[i].compare(".") != 0; ++i) {
|
| - content::PasswordForm form;
|
| + autofill::PasswordForm form;
|
| form.origin = GURL(lines[i]).ReplaceComponents(rep);
|
| form.signon_realm = form.origin.GetOrigin().spec();
|
| form.blacklisted_by_user = true;
|
| @@ -163,7 +163,7 @@ void NSSDecryptor::ParseSignons(
|
| if (end - begin < 5)
|
| continue;
|
|
|
| - content::PasswordForm form;
|
| + autofill::PasswordForm form;
|
|
|
| // The first line is the site URL.
|
| // For HTTP authentication logins, the URL may contain http realm,
|
| @@ -233,7 +233,7 @@ void NSSDecryptor::ParseSignons(
|
| }
|
|
|
| bool NSSDecryptor::ReadAndParseSignons(const base::FilePath& sqlite_file,
|
| - std::vector<content::PasswordForm>* forms) {
|
| + std::vector<autofill::PasswordForm>* forms) {
|
| sql::Connection db;
|
| if (!db.Open(sqlite_file))
|
| return false;
|
| @@ -250,7 +250,7 @@ bool NSSDecryptor::ReadAndParseSignons(const base::FilePath& sqlite_file,
|
| rep.ClearPassword();
|
| // Read domains for which passwords are never saved.
|
| while (s.Step()) {
|
| - content::PasswordForm form;
|
| + autofill::PasswordForm form;
|
| form.origin = GURL(s.ColumnString(0)).ReplaceComponents(rep);
|
| form.signon_realm = form.origin.GetOrigin().spec();
|
| form.blacklisted_by_user = true;
|
| @@ -281,7 +281,7 @@ bool NSSDecryptor::ReadAndParseSignons(const base::FilePath& sqlite_file,
|
| if (!url.is_valid())
|
| continue;
|
|
|
| - content::PasswordForm form;
|
| + autofill::PasswordForm form;
|
| form.origin = url.ReplaceComponents(rep);
|
| form.signon_realm = form.origin.GetOrigin().spec();
|
| if (!realm.empty())
|
|
|