OLD | NEW |
---|---|
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/renderer/safe_browsing/phishing_classifier_delegate.h" | 5 #include "chrome/renderer/safe_browsing/phishing_classifier_delegate.h" |
6 | 6 |
7 #include <set> | 7 #include <set> |
8 | 8 |
9 #include "base/callback.h" | 9 #include "base/callback.h" |
10 #include "base/lazy_instance.h" | 10 #include "base/lazy_instance.h" |
(...skipping 181 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
192 IPC_END_MESSAGE_MAP() | 192 IPC_END_MESSAGE_MAP() |
193 return handled; | 193 return handled; |
194 } | 194 } |
195 | 195 |
196 void PhishingClassifierDelegate::ClassificationDone( | 196 void PhishingClassifierDelegate::ClassificationDone( |
197 const ClientPhishingRequest& verdict) { | 197 const ClientPhishingRequest& verdict) { |
198 // We no longer need the page text. | 198 // We no longer need the page text. |
199 classifier_page_text_.clear(); | 199 classifier_page_text_.clear(); |
200 VLOG(2) << "Phishy verdict = " << verdict.is_phishing() | 200 VLOG(2) << "Phishy verdict = " << verdict.is_phishing() |
201 << " score = " << verdict.client_score(); | 201 << " score = " << verdict.client_score(); |
202 if (!verdict.is_phishing()) { | 202 if (verdict.client_score() != PhishingClassifier::kInvalidScore) { |
203 return; | 203 DCHECK(last_url_sent_to_classifier_.spec() == verdict.url()); |
Brian Ryner
2011/07/19 21:27:10
Maybe switch this to DCHECK_EQ while you're here?
noelutz
2011/07/19 22:28:08
Done.
| |
204 Send(new SafeBrowsingHostMsg_PhishingDetectionDone( | |
205 routing_id(), verdict.SerializeAsString())); | |
204 } | 206 } |
205 DCHECK(last_url_sent_to_classifier_.spec() == verdict.url()); | |
206 Send(new SafeBrowsingHostMsg_DetectedPhishingSite( | |
207 routing_id(), verdict.SerializeAsString())); | |
208 } | 207 } |
209 | 208 |
210 GURL PhishingClassifierDelegate::GetToplevelUrl() { | 209 GURL PhishingClassifierDelegate::GetToplevelUrl() { |
211 return render_view()->webview()->mainFrame()->document().url(); | 210 return render_view()->webview()->mainFrame()->document().url(); |
212 } | 211 } |
213 | 212 |
214 void PhishingClassifierDelegate::MaybeStartClassification() { | 213 void PhishingClassifierDelegate::MaybeStartClassification() { |
215 // We can begin phishing classification when the following conditions are | 214 // We can begin phishing classification when the following conditions are |
216 // met: | 215 // met: |
217 // 1. A Scorer has been created | 216 // 1. A Scorer has been created |
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
272 | 271 |
273 VLOG(2) << "Starting classification for " << last_finished_load_url_; | 272 VLOG(2) << "Starting classification for " << last_finished_load_url_; |
274 last_url_sent_to_classifier_ = last_finished_load_url_; | 273 last_url_sent_to_classifier_ = last_finished_load_url_; |
275 is_classifying_ = true; | 274 is_classifying_ = true; |
276 classifier_->BeginClassification( | 275 classifier_->BeginClassification( |
277 &classifier_page_text_, | 276 &classifier_page_text_, |
278 NewCallback(this, &PhishingClassifierDelegate::ClassificationDone)); | 277 NewCallback(this, &PhishingClassifierDelegate::ClassificationDone)); |
279 } | 278 } |
280 | 279 |
281 } // namespace safe_browsing | 280 } // namespace safe_browsing |
OLD | NEW |