OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // Browser-side interface to analyze zip files for SafeBrowsing download | 5 // Browser-side interface to analyze zip files for SafeBrowsing download |
6 // protection. The actual zip decoding is performed in a sandboxed utility | 6 // protection. The actual zip decoding is performed in a sandboxed utility |
7 // process. | 7 // process. |
8 // | 8 // |
9 // This class lives on the UI thread. | 9 // This class lives on the UI thread. |
10 | 10 |
(...skipping 30 matching lines...) Expand all Loading... |
41 | 41 |
42 private: | 42 private: |
43 virtual ~SandboxedZipAnalyzer(); | 43 virtual ~SandboxedZipAnalyzer(); |
44 | 44 |
45 // Creates the sandboxed utility process and tells it to start analysis. | 45 // Creates the sandboxed utility process and tells it to start analysis. |
46 // Runs on a worker thread. | 46 // Runs on a worker thread. |
47 void AnalyzeInSandbox(); | 47 void AnalyzeInSandbox(); |
48 | 48 |
49 // content::UtilityProcessHostClient implementation. | 49 // content::UtilityProcessHostClient implementation. |
50 // These notifications run on the IO thread. | 50 // These notifications run on the IO thread. |
51 virtual bool OnMessageReceived(const IPC::Message& message) OVERRIDE; | 51 virtual bool OnMessageReceived(const IPC::Message& message) override; |
52 | 52 |
53 // Notification that the utility process is running, and we can now get its | 53 // Notification that the utility process is running, and we can now get its |
54 // process handle. | 54 // process handle. |
55 void OnUtilityProcessStarted(); | 55 void OnUtilityProcessStarted(); |
56 | 56 |
57 // Notification from the utility process that the zip file has been analyzed, | 57 // Notification from the utility process that the zip file has been analyzed, |
58 // with the given results. Runs on the IO thread. | 58 // with the given results. Runs on the IO thread. |
59 void OnAnalyzeZipFileFinished(const zip_analyzer::Results& results); | 59 void OnAnalyzeZipFileFinished(const zip_analyzer::Results& results); |
60 | 60 |
61 // Launches the utility process. Must run on the IO thread. | 61 // Launches the utility process. Must run on the IO thread. |
62 void StartProcessOnIOThread(); | 62 void StartProcessOnIOThread(); |
63 | 63 |
64 const base::FilePath zip_file_name_; | 64 const base::FilePath zip_file_name_; |
65 // Once we have opened the file, we store the handle so that we can use it | 65 // Once we have opened the file, we store the handle so that we can use it |
66 // once the utility process has launched. | 66 // once the utility process has launched. |
67 base::File zip_file_; | 67 base::File zip_file_; |
68 base::WeakPtr<content::UtilityProcessHost> utility_process_host_; | 68 base::WeakPtr<content::UtilityProcessHost> utility_process_host_; |
69 const ResultCallback callback_; | 69 const ResultCallback callback_; |
70 // Initialized on the UI thread, but only accessed on the IO thread. | 70 // Initialized on the UI thread, but only accessed on the IO thread. |
71 bool callback_called_; | 71 bool callback_called_; |
72 | 72 |
73 DISALLOW_COPY_AND_ASSIGN(SandboxedZipAnalyzer); | 73 DISALLOW_COPY_AND_ASSIGN(SandboxedZipAnalyzer); |
74 }; | 74 }; |
75 | 75 |
76 } // namespace safe_browsing | 76 } // namespace safe_browsing |
77 | 77 |
78 #endif // CHROME_BROWSER_SAFE_BROWSING_SANDBOXED_ZIP_ANALYZER_H_ | 78 #endif // CHROME_BROWSER_SAFE_BROWSING_SANDBOXED_ZIP_ANALYZER_H_ |
OLD | NEW |