Index: chrome/browser/safe_browsing/client_side_detection_service.h |
diff --git a/chrome/browser/safe_browsing/client_side_detection_service.h b/chrome/browser/safe_browsing/client_side_detection_service.h |
index 002ced127b71f7bd89f06e88cfa14fedbcd13eb3..7afe1cdad53734f182727a2cb58f6be3ac7d5434 100644 |
--- a/chrome/browser/safe_browsing/client_side_detection_service.h |
+++ b/chrome/browser/safe_browsing/client_side_detection_service.h |
@@ -50,6 +50,7 @@ class URLRequestStatus; |
namespace safe_browsing { |
class ClientPhishingRequest; |
+class ClientPhishingResponse; |
class ClientSideModel; |
class ClientSideDetectionService : public URLFetcher::Delegate, |
@@ -167,6 +168,8 @@ class ClientSideDetectionService : public URLFetcher::Delegate, |
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest, SetEnabled); |
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest, IsBadIpAddress); |
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest, |
+ IsFalsePositiveResponse); |
+ FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest, |
ModelHasValidHashIds); |
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest, |
SanitizeRequestForPingback); |
@@ -263,6 +266,12 @@ class ClientSideDetectionService : public URLFetcher::Delegate, |
// valid hashes in the model. |
static bool ModelHasValidHashIds(const ClientSideModel& model); |
+ // Returns true iff the response is phishing (phishy() is true) and if the |
+ // given URL matches one of the whitelisted expressions in the given |
+ // ClientPhishingResponse. |
+ static bool IsFalsePositiveResponse(const GURL& url, |
+ const ClientPhishingResponse& response); |
+ |
// Whether the service is running or not. When the service is not running, |
// it won't download the model nor report detected phishing URLs. |
bool enabled_; |