Index: chrome/renderer/safe_browsing/phishing_classifier_delegate.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc b/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc |
index a276d5adf7062b1a26369ec447ae613f859aa56b..5b273a476f2ca75d279b3ce3d060ca2f51757ec1 100644 |
--- a/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc |
+++ b/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc |
@@ -199,12 +199,11 @@ void PhishingClassifierDelegate::ClassificationDone( |
classifier_page_text_.clear(); |
VLOG(2) << "Phishy verdict = " << verdict.is_phishing() |
<< " score = " << verdict.client_score(); |
- if (!verdict.is_phishing()) { |
- return; |
+ if (verdict.client_score() != PhishingClassifier::kInvalidScore) { |
+ DCHECK(last_url_sent_to_classifier_.spec() == verdict.url()); |
Brian Ryner
2011/07/19 21:27:10
Maybe switch this to DCHECK_EQ while you're here?
noelutz
2011/07/19 22:28:08
Done.
|
+ Send(new SafeBrowsingHostMsg_PhishingDetectionDone( |
+ routing_id(), verdict.SerializeAsString())); |
} |
- DCHECK(last_url_sent_to_classifier_.spec() == verdict.url()); |
- Send(new SafeBrowsingHostMsg_DetectedPhishingSite( |
- routing_id(), verdict.SerializeAsString())); |
} |
GURL PhishingClassifierDelegate::GetToplevelUrl() { |