[go: nahoru, domu]

Use base::as_byte_span() in ash.

No functional change, but an improvement in readability by removing
the nested base::make_span() function.

Change-Id: I53ee72b9b03d0cfb0b5ccd61364d9e91640f530b
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5187179
Reviewed-by: danakj <danakj@chromium.org>
Reviewed-by: Colin Blundell <blundell@chromium.org>
Commit-Queue: Tom Sepez <tsepez@chromium.org>
Owners-Override: danakj <danakj@chromium.org>
Cr-Commit-Position: refs/heads/main@{#1245912}
diff --git a/ash/ambient/managed/screensaver_image_downloader.cc b/ash/ambient/managed/screensaver_image_downloader.cc
index eb46b2c..44f0014c 100644
--- a/ash/ambient/managed/screensaver_image_downloader.cc
+++ b/ash/ambient/managed/screensaver_image_downloader.cc
@@ -116,7 +116,7 @@
 }
 
 std::string GetHashedFileNameForUrl(const std::string& url) {
-  auto hash = base::SHA1HashSpan(base::as_bytes(base::make_span(url)));
+  auto hash = base::SHA1HashSpan(base::as_byte_span(url));
   return base::HexEncode(hash) + kCacheFileExt;
 }
 
diff --git a/ash/ambient/managed/screensaver_image_downloader_unittest.cc b/ash/ambient/managed/screensaver_image_downloader_unittest.cc
index 45429c4..2b3b308 100644
--- a/ash/ambient/managed/screensaver_image_downloader_unittest.cc
+++ b/ash/ambient/managed/screensaver_image_downloader_unittest.cc
@@ -91,7 +91,7 @@
   }
 
   base::FilePath GetExpectedFilePath(const std::string url) {
-    auto hash = base::SHA1HashSpan(base::as_bytes(base::make_span(url)));
+    auto hash = base::SHA1HashSpan(base::as_byte_span(url));
     const std::string encoded_hash = base::HexEncode(hash);
     return test_download_folder_.AppendASCII(encoded_hash + kCacheFileExt);
   }
diff --git a/ash/ambient/managed/screensaver_images_policy_handler_unittest.cc b/ash/ambient/managed/screensaver_images_policy_handler_unittest.cc
index 0c11c3bf..7649f7ea 100644
--- a/ash/ambient/managed/screensaver_images_policy_handler_unittest.cc
+++ b/ash/ambient/managed/screensaver_images_policy_handler_unittest.cc
@@ -266,7 +266,7 @@
   void ResetScreensaverImagesPolicyHandler() { policy_handler_.reset(); }
 
   base::FilePath GetExpectedFilePath(const std::string url) {
-    auto hash = base::SHA1HashSpan(base::as_bytes(base::make_span(url)));
+    auto hash = base::SHA1HashSpan(base::as_byte_span(url));
     return temp_dir_.GetPath()
         .AppendASCII(GetParam().base_directory)
         .AppendASCII(base::HexEncode(hash) + kCacheFileExt);
diff --git a/ash/ambient/resources/ambient_animation_static_resources_impl.cc b/ash/ambient/resources/ambient_animation_static_resources_impl.cc
index ae9bd4e78..7dbdefc 100644
--- a/ash/ambient/resources/ambient_animation_static_resources_impl.cc
+++ b/ash/ambient/resources/ambient_animation_static_resources_impl.cc
@@ -102,7 +102,7 @@
           lottie_json_resource_id);
   DCHECK(!animation_json.empty());
   base::span<const uint8_t> lottie_data_bytes =
-      base::as_bytes(base::make_span(animation_json));
+      base::as_byte_span(animation_json);
   scoped_refptr<cc::SkottieWrapper> animation;
   if (serializable) {
     // Create a serializable SkottieWrapper since the SkottieWrapper may have to
diff --git a/ash/public/cpp/image_util.cc b/ash/public/cpp/image_util.cc
index 06fba05..3d1d262 100644
--- a/ash/public/cpp/image_util.cc
+++ b/ash/public/cpp/image_util.cc
@@ -149,7 +149,7 @@
     return;
   }
   data_decoder::DecodeImageIsolated(
-      base::as_bytes(base::make_span(data)), codec,
+      base::as_byte_span(data), codec,
       /*shrink_to_fit=*/true, kMaxImageSizeInBytes,
       /*desired_image_frame_size=*/gfx::Size(),
       base::BindOnce(&ToImageSkia, std::move(callback)));
@@ -165,8 +165,8 @@
   // `kMaxImageSizeInBytes` will have their resolution downscaled instead of
   // simply failing to decode.
   data_decoder::DecodeAnimationIsolated(
-      base::as_bytes(base::make_span(data)), /*shrink_to_fit=*/true,
-      kMaxImageSizeInBytes, base::BindOnce(&ToFrames, std::move(callback)));
+      base::as_byte_span(data), /*shrink_to_fit=*/true, kMaxImageSizeInBytes,
+      base::BindOnce(&ToFrames, std::move(callback)));
 }
 
 }  // namespace image_util
diff --git a/ash/quick_pair/repository/fast_pair/fake_footprints_fetcher.cc b/ash/quick_pair/repository/fast_pair/fake_footprints_fetcher.cc
index 037c83e..ce30352 100644
--- a/ash/quick_pair/repository/fast_pair/fake_footprints_fetcher.cc
+++ b/ash/quick_pair/repository/fast_pair/fake_footprints_fetcher.cc
@@ -51,7 +51,7 @@
   }
 
   account_key_to_info_map_[base::HexEncode(
-      base::as_bytes(base::make_span(info.device().account_key())))] = info;
+      base::as_byte_span(info.device().account_key()))] = info;
   std::move(callback).Run(add_user_result_);
 }
 
diff --git a/chrome/browser/ash/arc/enterprise/cert_store/arc_cert_installer_unittest.cc b/chrome/browser/ash/arc/enterprise/cert_store/arc_cert_installer_unittest.cc
index d74a1df..4116e695 100644
--- a/chrome/browser/ash/arc/enterprise/cert_store/arc_cert_installer_unittest.cc
+++ b/chrome/browser/ash/arc/enterprise/cert_store/arc_cert_installer_unittest.cc
@@ -84,7 +84,7 @@
       key->key(), net::x509_util::DIGEST_SHA256, cn, 1, base::Time::UnixEpoch(),
       base::Time::UnixEpoch(), {}, &der_cert));
   cert = net::x509_util::CreateCERTCertificateFromBytes(
-      base::as_bytes(base::make_span(der_cert)));
+      base::as_byte_span(der_cert));
   ASSERT_TRUE(cert);
   certs->emplace_back(key.release(), cert.release(),
                       keymanagement::mojom::ChapsSlot::kUser, kLabel, kId);
diff --git a/chrome/browser/ash/attestation/certificate_util.cc b/chrome/browser/ash/attestation/certificate_util.cc
index 6a9f2f2..cf007c41 100644
--- a/chrome/browser/ash/attestation/certificate_util.cc
+++ b/chrome/browser/ash/attestation/certificate_util.cc
@@ -26,7 +26,7 @@
     any_certificate_found = true;
     scoped_refptr<net::X509Certificate> x509 =
         net::X509Certificate::CreateFromBytes(
-            base::as_bytes(base::make_span(pem_tokenizer.data())));
+            base::as_byte_span(pem_tokenizer.data()));
     if (!x509.get() || x509->valid_expiry().is_null()) {
       // In theory this should not happen but in practice parsing X.509 can be
       // brittle and there are a lot of factors including which underlying
diff --git a/chrome/browser/ash/attestation/soft_bind_attestation_flow_impl.cc b/chrome/browser/ash/attestation/soft_bind_attestation_flow_impl.cc
index 0247a2ba..9b00cda 100644
--- a/chrome/browser/ash/attestation/soft_bind_attestation_flow_impl.cc
+++ b/chrome/browser/ash/attestation/soft_bind_attestation_flow_impl.cc
@@ -393,7 +393,7 @@
     ++num_certificates;
     scoped_refptr<net::X509Certificate> x509 =
         net::X509Certificate::CreateFromBytes(
-            base::as_bytes(base::make_span(pem_tokenizer.data())));
+            base::as_byte_span(pem_tokenizer.data()));
     if (!x509.get() || x509->valid_expiry().is_null()) {
       // This logic intentionally fails open. In theory this should not happen
       // but in practice parsing X.509 can be brittle and there are a lot of
diff --git a/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider.cc b/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider.cc
index 08f3492..4d1b99e 100644
--- a/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider.cc
+++ b/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider.cc
@@ -159,8 +159,7 @@
 
   certificate_provider_service->RequestSignatureBySpki(
       challenge_request_data.public_key_spki_der(), ssl_algorithm,
-      base::as_bytes(base::make_span(challenge_request_data.data_to_sign())),
-      account_id,
+      base::as_byte_span(challenge_request_data.data_to_sign()), account_id,
       base::BindOnce(&CompleteSignatureKeyChallenge,
                      base::Unretained(method_call),
                      std::move(response_sender)));
diff --git a/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider_browsertest.cc b/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider_browsertest.cc
index 67dc3c8..b4be6cc 100644
--- a/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider_browsertest.cc
+++ b/chrome/browser/ash/dbus/cryptohome_key_delegate_service_provider_browsertest.cc
@@ -179,11 +179,10 @@
     const std::string spki =
         certificate_provider_extension()->GetCertificateSpki();
     crypto::SignatureVerifier verifier;
-    if (!verifier.VerifyInit(algorithm, signature,
-                             base::as_bytes(base::make_span(spki)))) {
+    if (!verifier.VerifyInit(algorithm, signature, base::as_byte_span(spki))) {
       return false;
     }
-    verifier.VerifyUpdate(base::as_bytes(base::make_span(kDataToSign)));
+    verifier.VerifyUpdate(base::as_byte_span(kDataToSign));
     return verifier.VerifyFinal();
   }
 
diff --git a/chrome/browser/ash/file_system_provider/operations/read_file_unittest.cc b/chrome/browser/ash/file_system_provider/operations/read_file_unittest.cc
index e7bd55c..356c1eb 100644
--- a/chrome/browser/ash/file_system_provider/operations/read_file_unittest.cc
+++ b/chrome/browser/ash/file_system_provider/operations/read_file_unittest.cc
@@ -161,7 +161,7 @@
   base::Value::List list;
   list.Append(kFileSystemId);
   list.Append(kRequestId);
-  list.Append(base::Value(base::as_bytes(base::make_span(data))));
+  list.Append(base::Value(base::as_byte_span(data)));
   list.Append(has_more);
   list.Append(execution_time);
 
diff --git a/chrome/browser/ash/login/oobe_quick_start/connectivity/qr_code.cc b/chrome/browser/ash/login/oobe_quick_start/connectivity/qr_code.cc
index 73e91ed..3253811e 100644
--- a/chrome/browser/ash/login/oobe_quick_start/connectivity/qr_code.cc
+++ b/chrome/browser/ash/login/oobe_quick_start/connectivity/qr_code.cc
@@ -36,8 +36,7 @@
 void QRCode::GeneratePixelData() {
   std::vector<uint8_t> blob = GetQRCodeData();
   qr_code_generator::QRCodeGenerator qr_generator;
-  auto generated_code = qr_generator.Generate(
-      base::as_bytes(base::make_span(blob.data(), blob.size())));
+  auto generated_code = qr_generator.Generate(blob);
   CHECK(generated_code.has_value());
   auto res =
       PixelData{generated_code->data.begin(), generated_code->data.end()};
diff --git a/chrome/browser/ash/login/saml/fake_saml_idp_mixin.cc b/chrome/browser/ash/login/saml/fake_saml_idp_mixin.cc
index d25633b..76691b66 100644
--- a/chrome/browser/ash/login/saml/fake_saml_idp_mixin.cc
+++ b/chrome/browser/ash/login/saml/fake_saml_idp_mixin.cc
@@ -78,7 +78,7 @@
 
 std::string GetTpmResponseBase64() {
   const std::string response = GetTpmResponse();
-  return base::Base64Encode(base::as_bytes(base::make_span(response)));
+  return base::Base64Encode(base::as_byte_span(response));
 }
 
 // Returns relay state from http get/post requests.
diff --git a/chrome/browser/ash/login/session/user_session_manager.cc b/chrome/browser/ash/login/session/user_session_manager.cc
index 1d3a5e7..2253e0a 100644
--- a/chrome/browser/ash/login/session/user_session_manager.cc
+++ b/chrome/browser/ash/login/session/user_session_manager.cc
@@ -577,9 +577,7 @@
 
 // Returns a Base16 encoded SHA1 digest of `data`.
 std::string Sha1Digest(const std::string& data) {
-  const base::SHA1Digest hash =
-      base::SHA1HashSpan(base::as_bytes(base::make_span(data)));
-  return base::HexEncode(hash);
+  return base::HexEncode(base::SHA1HashSpan(base::as_byte_span(data)));
 }
 
 }  // namespace
diff --git a/chrome/browser/ash/login/users/avatar/user_image_loader.cc b/chrome/browser/ash/login/users/avatar/user_image_loader.cc
index d55ac49..689be13 100644
--- a/chrome/browser/ash/login/users/avatar/user_image_loader.cc
+++ b/chrome/browser/ash/login/users/avatar/user_image_loader.cc
@@ -367,7 +367,7 @@
     return;
   }
 
-  auto bytes = base::as_bytes(base::make_span(*data));
+  auto bytes = base::as_byte_span(*data);
   data_decoder::DecodeAnimationIsolated(
       bytes, /*shrink_to_fit=*/true, kMaxImageSizeInBytes,
       base::BindOnce(&OnAnimationDecoded, std::move(loaded_cb), require_encode,
diff --git a/chrome/browser/ash/passkeys/passkey_authenticator_service_ash.cc b/chrome/browser/ash/passkeys/passkey_authenticator_service_ash.cc
index 1efd2b1b..e4bc8d18 100644
--- a/chrome/browser/ash/passkeys/passkey_authenticator_service_ash.cc
+++ b/chrome/browser/ash/passkeys/passkey_authenticator_service_ash.cc
@@ -283,8 +283,7 @@
                           ctx.request->client_data_hash.begin(),
                           ctx.request->client_data_hash.end());
   std::optional<std::vector<uint8_t>> assertion_signature = GenerateEcSignature(
-      base::as_bytes(base::make_span(credential_secrets.private_key())),
-      signed_over_data);
+      base::as_byte_span(credential_secrets.private_key()), signed_over_data);
   if (!assertion_signature) {
     FinishAssert(std::move(ctx),
                  crosapi::mojom::PasskeyAssertionResult::NewError(
diff --git a/chrome/browser/ash/policy/core/file_util.cc b/chrome/browser/ash/policy/core/file_util.cc
index ac16571..11d94e20 100644
--- a/chrome/browser/ash/policy/core/file_util.cc
+++ b/chrome/browser/ash/policy/core/file_util.cc
@@ -31,8 +31,7 @@
 }  // namespace
 
 std::string GetUniqueSubDirectoryForAccountID(const std::string& account_id) {
-  std::string sub_directory =
-      base::HexEncode(base::as_bytes(base::make_span(account_id)));
+  std::string sub_directory = base::HexEncode(base::as_byte_span(account_id));
   if (ExceedsMaximumPathComponentLength(sub_directory)) {
     // Originally the hex encoded account id was used as sub-directory name,
     // so we must keep on using that to guarantee backwards compatibility.