| Index: trunk/src/chrome/browser/safe_browsing/client_side_detection_host.cc
|
| ===================================================================
|
| --- trunk/src/chrome/browser/safe_browsing/client_side_detection_host.cc (revision 204084)
|
| +++ trunk/src/chrome/browser/safe_browsing/client_side_detection_host.cc (working copy)
|
| @@ -177,8 +177,6 @@
|
| return;
|
| }
|
|
|
| - host_->malware_killswitch_on_ = database_manager_->MalwareKillSwitchOn();
|
| -
|
| BrowserThread::PostTask(
|
| BrowserThread::UI,
|
| FROM_HERE,
|
| @@ -253,7 +251,6 @@
|
| csd_service_(NULL),
|
| weak_factory_(this),
|
| unsafe_unique_page_id_(-1),
|
| - malware_killswitch_on_(false),
|
| malware_report_enabled_(false) {
|
| DCHECK(tab);
|
| // Note: csd_service_ and sb_service will be NULL here in testing.
|
| @@ -389,16 +386,15 @@
|
| browse_info_.get() &&
|
| verdict->ParseFromString(verdict_str) &&
|
| verdict->IsInitialized()) {
|
| - // We do the malware IP matching and request sending if the feature
|
| - // is enabled
|
| - if (malware_report_enabled_ && !malware_killswitch_on_) {
|
| + if (malware_report_enabled_) {
|
| scoped_ptr<ClientMalwareRequest> malware_verdict(
|
| new ClientMalwareRequest);
|
| // Start browser-side malware feature extraction. Once we're done it will
|
| // send the malware client verdict request.
|
| malware_verdict->set_url(verdict->url());
|
| feature_extractor_->ExtractMalwareFeatures(
|
| - browse_info_.get(), malware_verdict.get());
|
| + browse_info_.get(),
|
| + malware_verdict.get());
|
| MalwareFeatureExtractionDone(malware_verdict.Pass());
|
| }
|
|
|
|
|