OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "ios/chrome/browser/safe_browsing/ping_manager.h" | 5 #include "ios/chrome/browser/safe_browsing/ping_manager.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "base/logging.h" | 9 #include "base/logging.h" |
10 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
(...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
127 safebrowsing_reports_.insert(fetcher); | 127 safebrowsing_reports_.insert(fetcher); |
128 } | 128 } |
129 | 129 |
130 void SafeBrowsingPingManager::ReportInvalidCertificateChain( | 130 void SafeBrowsingPingManager::ReportInvalidCertificateChain( |
131 const std::string& serialized_report) { | 131 const std::string& serialized_report) { |
132 DCHECK(certificate_error_reporter_); | 132 DCHECK(certificate_error_reporter_); |
133 certificate_error_reporter_->SendExtendedReportingReport(serialized_report); | 133 certificate_error_reporter_->SendExtendedReportingReport(serialized_report); |
134 } | 134 } |
135 | 135 |
136 void SafeBrowsingPingManager::SetCertificateErrorReporterForTesting( | 136 void SafeBrowsingPingManager::SetCertificateErrorReporterForTesting( |
137 scoped_ptr<certificate_reporting::ErrorReporter> | 137 std::unique_ptr<certificate_reporting::ErrorReporter> |
138 certificate_error_reporter) { | 138 certificate_error_reporter) { |
139 certificate_error_reporter_ = std::move(certificate_error_reporter); | 139 certificate_error_reporter_ = std::move(certificate_error_reporter); |
140 } | 140 } |
141 | 141 |
142 GURL SafeBrowsingPingManager::SafeBrowsingHitUrl( | 142 GURL SafeBrowsingPingManager::SafeBrowsingHitUrl( |
143 const safe_browsing::HitReport& hit_report) const { | 143 const safe_browsing::HitReport& hit_report) const { |
144 DCHECK(hit_report.threat_type == SB_THREAT_TYPE_URL_MALWARE || | 144 DCHECK(hit_report.threat_type == SB_THREAT_TYPE_URL_MALWARE || |
145 hit_report.threat_type == SB_THREAT_TYPE_URL_PHISHING || | 145 hit_report.threat_type == SB_THREAT_TYPE_URL_PHISHING || |
146 hit_report.threat_type == SB_THREAT_TYPE_URL_UNWANTED || | 146 hit_report.threat_type == SB_THREAT_TYPE_URL_UNWANTED || |
147 hit_report.threat_type == SB_THREAT_TYPE_BINARY_MALWARE_URL || | 147 hit_report.threat_type == SB_THREAT_TYPE_BINARY_MALWARE_URL || |
(...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
209 url_prefix_.c_str(), client_name_.c_str(), version_.c_str()); | 209 url_prefix_.c_str(), client_name_.c_str(), version_.c_str()); |
210 std::string api_key = google_apis::GetAPIKey(); | 210 std::string api_key = google_apis::GetAPIKey(); |
211 if (!api_key.empty()) { | 211 if (!api_key.empty()) { |
212 base::StringAppendF(&url, "&key=%s", | 212 base::StringAppendF(&url, "&key=%s", |
213 net::EscapeQueryParamValue(api_key, true).c_str()); | 213 net::EscapeQueryParamValue(api_key, true).c_str()); |
214 } | 214 } |
215 return GURL(url); | 215 return GURL(url); |
216 } | 216 } |
217 | 217 |
218 } // namespace safe_browsing | 218 } // namespace safe_browsing |
OLD | NEW |