Chromium Code Reviews| Index: chrome/browser/safe_browsing/local_database_manager.cc |
| diff --git a/chrome/browser/safe_browsing/local_database_manager.cc b/chrome/browser/safe_browsing/local_database_manager.cc |
| index 9f23af35b679809ce3e82ce7d2c24d95752670a9..557b8f339149483df9967a68589bdcfeb82c0946 100644 |
| --- a/chrome/browser/safe_browsing/local_database_manager.cc |
| +++ b/chrome/browser/safe_browsing/local_database_manager.cc |
| @@ -41,6 +41,10 @@ using content::BrowserThread; |
| namespace { |
| +using safe_browsing::SBThreatType; |
| +using safe_browsing::SBFullHashResult; |
| +using safe_browsing::SafeBrowsingProtocolManager; |
| + |
| // Timeout for match checks, e.g. download URLs, hashes. |
| const int kCheckTimeoutMs = 10000; |
| @@ -73,12 +77,12 @@ bool IsExpectedThreat( |
| // Return the severest list id from the results in |full_hashes| which matches |
| // |hash|, or INVALID if none match. |
| safe_browsing::ListType GetHashSeverestThreatListType( |
| - const SBFullHash& hash, |
| + const safe_browsing::SBFullHash& hash, |
| const std::vector<SBFullHashResult>& full_hashes, |
| size_t* index) { |
| safe_browsing::ListType pending_threat = safe_browsing::INVALID; |
| for (size_t i = 0; i < full_hashes.size(); ++i) { |
| - if (safe_browsing::SBFullHashEqual(hash, full_hashes[i].hash)) { |
| + if (SBFullHashEqual(hash, full_hashes[i].hash)) { |
| const safe_browsing::ListType threat = |
| static_cast<safe_browsing::ListType>(full_hashes[i].list_id); |
| switch (threat) { |
| @@ -150,26 +154,29 @@ safe_browsing::ListType GetUrlSeverestThreatListType( |
| return pending_threat; |
| } |
| -SBThreatType GetThreatTypeFromListType(safe_browsing::ListType list_type) { |
| +safe_browsing::SBThreatType GetThreatTypeFromListType( |
| + safe_browsing::ListType list_type) { |
| switch (list_type) { |
| case safe_browsing::PHISH: |
| - return SB_THREAT_TYPE_URL_PHISHING; |
| + return safe_browsing::SB_THREAT_TYPE_URL_PHISHING; |
| case safe_browsing::MALWARE: |
| - return SB_THREAT_TYPE_URL_MALWARE; |
| + return safe_browsing::SB_THREAT_TYPE_URL_MALWARE; |
| case safe_browsing::UNWANTEDURL: |
| - return SB_THREAT_TYPE_URL_UNWANTED; |
| + return safe_browsing::SB_THREAT_TYPE_URL_UNWANTED; |
| case safe_browsing::BINURL: |
| - return SB_THREAT_TYPE_BINARY_MALWARE_URL; |
| + return safe_browsing::SB_THREAT_TYPE_BINARY_MALWARE_URL; |
| case safe_browsing::EXTENSIONBLACKLIST: |
| - return SB_THREAT_TYPE_EXTENSION; |
| + return safe_browsing::SB_THREAT_TYPE_EXTENSION; |
| default: |
| DVLOG(1) << "Unknown safe browsing list id " << list_type; |
| - return SB_THREAT_TYPE_SAFE; |
| + return safe_browsing::SB_THREAT_TYPE_SAFE; |
| } |
| } |
| } // namespace |
| +namespace safe_browsing { |
|
Nathan Parker
2015/11/07 01:15:13
If you put this up top, and the anonymous namespac
vakh (old account. dont use)
2015/11/07 01:22:57
You mean like this:
namespace safe_browsing {
nam
Nathan Parker
2015/11/10 23:53:34
Really? Hrm, then I've lead you astray. Carry on.
mattm
2015/11/11 01:10:16
It definitely should work. I noticed prefix_set.cc
vakh (old account. dont use)
2015/11/11 18:59:53
You're right. I have fixed prefix_set.cc and it wo
|
| + |
| // static |
| SBThreatType LocalSafeBrowsingDatabaseManager::GetHashSeverestThreatType( |
| const SBFullHash& hash, |
| @@ -219,14 +226,14 @@ void LocalSafeBrowsingDatabaseManager::SafeBrowsingCheck:: |
| if (!urls.empty()) { |
| DCHECK(full_hashes.empty()); |
| switch (check_type) { |
| - case safe_browsing::MALWARE: |
| - case safe_browsing::PHISH: |
| - case safe_browsing::UNWANTEDURL: |
| + case MALWARE: |
| + case PHISH: |
| + case UNWANTEDURL: |
| DCHECK_EQ(1u, urls.size()); |
| client->OnCheckBrowseUrlResult(urls[0], url_results[0], |
| url_metadata[0]); |
| break; |
| - case safe_browsing::BINURL: |
| + case BINURL: |
| DCHECK_EQ(urls.size(), url_results.size()); |
| client->OnCheckDownloadUrlResult( |
| urls, *std::max_element(url_results.begin(), url_results.end())); |
| @@ -236,11 +243,11 @@ void LocalSafeBrowsingDatabaseManager::SafeBrowsingCheck:: |
| } |
| } else if (!full_hashes.empty()) { |
| switch (check_type) { |
| - case safe_browsing::EXTENSIONBLACKLIST: { |
| + case EXTENSIONBLACKLIST: { |
| std::set<std::string> unsafe_extension_ids; |
| for (size_t i = 0; i < full_hashes.size(); ++i) { |
| std::string extension_id = |
| - safe_browsing::SBFullHashToString(full_hashes[i]); |
| + SBFullHashToString(full_hashes[i]); |
| if (full_hash_results[i] == SB_THREAT_TYPE_EXTENSION) |
| unsafe_extension_ids.insert(extension_id); |
| } |
| @@ -339,7 +346,7 @@ bool LocalSafeBrowsingDatabaseManager::CheckDownloadUrl( |
| new SafeBrowsingCheck(url_chain, |
| std::vector<SBFullHash>(), |
| client, |
| - safe_browsing::BINURL, |
| + BINURL, |
| std::vector<SBThreatType>(1, |
| SB_THREAT_TYPE_BINARY_MALWARE_URL)); |
| std::vector<SBPrefix> prefixes; |
| @@ -362,7 +369,7 @@ bool LocalSafeBrowsingDatabaseManager::CheckExtensionIDs( |
| std::vector<SBFullHash> extension_id_hashes; |
| std::transform(extension_ids.begin(), extension_ids.end(), |
| std::back_inserter(extension_id_hashes), |
| - safe_browsing::StringToSBFullHash); |
| + StringToSBFullHash); |
| std::vector<SBPrefix> prefixes; |
| for (const SBFullHash& hash : extension_id_hashes) |
| prefixes.push_back(hash.prefix); |
| @@ -371,7 +378,7 @@ bool LocalSafeBrowsingDatabaseManager::CheckExtensionIDs( |
| std::vector<GURL>(), |
| extension_id_hashes, |
| client, |
| - safe_browsing::EXTENSIONBLACKLIST, |
| + EXTENSIONBLACKLIST, |
| std::vector<SBThreatType>(1, SB_THREAT_TYPE_EXTENSION)); |
| StartSafeBrowsingCheck( |
| check, |
| @@ -459,7 +466,7 @@ bool LocalSafeBrowsingDatabaseManager::CheckBrowseUrl(const GURL& url, |
| const base::TimeTicks start = base::TimeTicks::Now(); |
| if (!MakeDatabaseAvailable()) { |
| - QueuedCheck queued_check(safe_browsing::MALWARE, // or PHISH |
| + QueuedCheck queued_check(MALWARE, // or PHISH |
| client, |
| url, |
| expected_threats, |
| @@ -510,7 +517,7 @@ bool LocalSafeBrowsingDatabaseManager::CheckBrowseUrl(const GURL& url, |
| SafeBrowsingCheck* check = new SafeBrowsingCheck(std::vector<GURL>(1, url), |
| std::vector<SBFullHash>(), |
| client, |
| - safe_browsing::MALWARE, |
| + MALWARE, |
| expected_threats); |
| check->need_get_hash = cache_hits.empty(); |
| check->prefix_hits.swap(prefix_hits); |
| @@ -672,7 +679,7 @@ void LocalSafeBrowsingDatabaseManager::NotifyDatabaseUpdateFinished( |
| } |
| LocalSafeBrowsingDatabaseManager::QueuedCheck::QueuedCheck( |
| - const safe_browsing::ListType check_type, |
| + const ListType check_type, |
| Client* client, |
| const GURL& url, |
| const std::vector<SBThreatType>& expected_threats, |
| @@ -872,7 +879,7 @@ void LocalSafeBrowsingDatabaseManager::RequestFullHash( |
| if (!enabled_) |
| return; |
| - bool is_download = check->check_type == safe_browsing::BINURL; |
| + bool is_download = check->check_type == BINURL; |
| sb_service_->protocol_manager()->GetFullHash( |
| check->prefix_hits, |
| base::Bind(&LocalSafeBrowsingDatabaseManager::HandleGetHashResults, |
| @@ -1025,7 +1032,7 @@ void LocalSafeBrowsingDatabaseManager::OnHandleGetHashResults( |
| SafeBrowsingCheck* check, |
| const std::vector<SBFullHashResult>& full_hashes) { |
| DCHECK_CURRENTLY_ON(BrowserThread::IO); |
| - safe_browsing::ListType check_type = check->check_type; |
| + ListType check_type = check->check_type; |
| SBPrefix prefix = check->prefix_hits[0]; |
| GetHashRequests::iterator it = gethash_requests_.find(prefix); |
| if (check->prefix_hits.size() > 1 || it == gethash_requests_.end()) { |
| @@ -1189,3 +1196,5 @@ void LocalSafeBrowsingDatabaseManager::StartSafeBrowsingCheck( |
| bool LocalSafeBrowsingDatabaseManager::download_protection_enabled() const { |
| return enable_download_protection_; |
| } |
| + |
| +} // namespace safe_browsing |