Index: chrome/utility/importer/nss_decryptor.cc |
diff --git a/chrome/utility/importer/nss_decryptor.cc b/chrome/utility/importer/nss_decryptor.cc |
index 7f98e33e6fa5d087a99f05d8e86861d119ebabd2..a06f2085dfb39a55c39bad6e7ee19b0d88a56c3c 100644 |
--- a/chrome/utility/importer/nss_decryptor.cc |
+++ b/chrome/utility/importer/nss_decryptor.cc |
@@ -12,7 +12,7 @@ |
#include "base/strings/string_split.h" |
#include "base/strings/string_util.h" |
#include "base/strings/utf_string_conversions.h" |
-#include "content/public/common/password_form.h" |
+#include "components/autofill/core/common/password_form.h" |
#include "sql/connection.h" |
#include "sql/statement.h" |
@@ -112,7 +112,7 @@ string16 NSSDecryptor::Decrypt(const std::string& crypt) const { |
// http://kb.mozillazine.org/Signons3.txt |
void NSSDecryptor::ParseSignons( |
const std::string& content, |
- std::vector<content::PasswordForm>* forms) { |
+ std::vector<autofill::PasswordForm>* forms) { |
forms->clear(); |
// Splits the file content into lines. |
@@ -141,7 +141,7 @@ void NSSDecryptor::ParseSignons( |
// Reads never-saved list. Domains are stored one per line. |
size_t i; |
for (i = 1; i < lines.size() && lines[i].compare(".") != 0; ++i) { |
- content::PasswordForm form; |
+ autofill::PasswordForm form; |
form.origin = GURL(lines[i]).ReplaceComponents(rep); |
form.signon_realm = form.origin.GetOrigin().spec(); |
form.blacklisted_by_user = true; |
@@ -163,7 +163,7 @@ void NSSDecryptor::ParseSignons( |
if (end - begin < 5) |
continue; |
- content::PasswordForm form; |
+ autofill::PasswordForm form; |
// The first line is the site URL. |
// For HTTP authentication logins, the URL may contain http realm, |
@@ -233,7 +233,7 @@ void NSSDecryptor::ParseSignons( |
} |
bool NSSDecryptor::ReadAndParseSignons(const base::FilePath& sqlite_file, |
- std::vector<content::PasswordForm>* forms) { |
+ std::vector<autofill::PasswordForm>* forms) { |
sql::Connection db; |
if (!db.Open(sqlite_file)) |
return false; |
@@ -250,7 +250,7 @@ bool NSSDecryptor::ReadAndParseSignons(const base::FilePath& sqlite_file, |
rep.ClearPassword(); |
// Read domains for which passwords are never saved. |
while (s.Step()) { |
- content::PasswordForm form; |
+ autofill::PasswordForm form; |
form.origin = GURL(s.ColumnString(0)).ReplaceComponents(rep); |
form.signon_realm = form.origin.GetOrigin().spec(); |
form.blacklisted_by_user = true; |
@@ -281,7 +281,7 @@ bool NSSDecryptor::ReadAndParseSignons(const base::FilePath& sqlite_file, |
if (!url.is_valid()) |
continue; |
- content::PasswordForm form; |
+ autofill::PasswordForm form; |
form.origin = url.ReplaceComponents(rep); |
form.signon_realm = form.origin.GetOrigin().spec(); |
if (!realm.empty()) |