OLD | NEW |
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // Implementation of the SafeBrowsingBlockingPage class. | 5 // Implementation of the SafeBrowsingBlockingPage class. |
6 | 6 |
7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" | 7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" |
8 | 8 |
9 #include "app/l10n_util.h" | 9 #include "app/l10n_util.h" |
10 #include "app/resource_bundle.h" | 10 #include "app/resource_bundle.h" |
(...skipping 357 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
368 safe_browsing_util::GeneratePhishingReportUrl(kSbReportPhishingUrl, | 368 safe_browsing_util::GeneratePhishingReportUrl(kSbReportPhishingUrl, |
369 bad_url_spec); | 369 bad_url_spec); |
370 tab()->OpenURL(report_url, GURL(), CURRENT_TAB, PageTransition::LINK); | 370 tab()->OpenURL(report_url, GURL(), CURRENT_TAB, PageTransition::LINK); |
371 return; | 371 return; |
372 } | 372 } |
373 | 373 |
374 if (command == kShowDiagnosticCommand) { | 374 if (command == kShowDiagnosticCommand) { |
375 // We're going to take the user to Google's SafeBrowsing diagnostic page. | 375 // We're going to take the user to Google's SafeBrowsing diagnostic page. |
376 std::string diagnostic = | 376 std::string diagnostic = |
377 StringPrintf(kSbDiagnosticUrl, | 377 StringPrintf(kSbDiagnosticUrl, |
378 EscapeQueryParamValue(bad_url_spec).c_str()); | 378 EscapeQueryParamValue(bad_url_spec, true).c_str()); |
379 GURL diagnostic_url(diagnostic); | 379 GURL diagnostic_url(diagnostic); |
380 diagnostic_url = google_util::AppendGoogleLocaleParam(diagnostic_url); | 380 diagnostic_url = google_util::AppendGoogleLocaleParam(diagnostic_url); |
381 DCHECK(unsafe_resources_[element_index].threat_type == | 381 DCHECK(unsafe_resources_[element_index].threat_type == |
382 SafeBrowsingService::URL_MALWARE); | 382 SafeBrowsingService::URL_MALWARE); |
383 tab()->OpenURL(diagnostic_url, GURL(), CURRENT_TAB, PageTransition::LINK); | 383 tab()->OpenURL(diagnostic_url, GURL(), CURRENT_TAB, PageTransition::LINK); |
384 return; | 384 return; |
385 } | 385 } |
386 | 386 |
387 NOTREACHED() << "Unexpected command: " << command; | 387 NOTREACHED() << "Unexpected command: " << command; |
388 } | 388 } |
(...skipping 106 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
495 UnsafeResourceMap* unsafe_resource_map = GetUnsafeResourcesMap(); | 495 UnsafeResourceMap* unsafe_resource_map = GetUnsafeResourcesMap(); |
496 (*unsafe_resource_map)[tab_contents].push_back(unsafe_resource); | 496 (*unsafe_resource_map)[tab_contents].push_back(unsafe_resource); |
497 } | 497 } |
498 | 498 |
499 // static | 499 // static |
500 bool SafeBrowsingBlockingPage::IsMainPage( | 500 bool SafeBrowsingBlockingPage::IsMainPage( |
501 const UnsafeResourceList& unsafe_resources) { | 501 const UnsafeResourceList& unsafe_resources) { |
502 return unsafe_resources.size() == 1 && | 502 return unsafe_resources.size() == 1 && |
503 unsafe_resources[0].resource_type == ResourceType::MAIN_FRAME; | 503 unsafe_resources[0].resource_type == ResourceType::MAIN_FRAME; |
504 } | 504 } |
OLD | NEW |