OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/safe_browsing/ping_manager.h" | 5 #include "chrome/browser/safe_browsing/ping_manager.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "base/logging.h" | 9 #include "base/logging.h" |
10 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
129 safebrowsing_reports_.insert(fetcher); | 129 safebrowsing_reports_.insert(fetcher); |
130 } | 130 } |
131 | 131 |
132 void SafeBrowsingPingManager::ReportInvalidCertificateChain( | 132 void SafeBrowsingPingManager::ReportInvalidCertificateChain( |
133 const std::string& serialized_report) { | 133 const std::string& serialized_report) { |
134 DCHECK(certificate_error_reporter_); | 134 DCHECK(certificate_error_reporter_); |
135 certificate_error_reporter_->SendExtendedReportingReport(serialized_report); | 135 certificate_error_reporter_->SendExtendedReportingReport(serialized_report); |
136 } | 136 } |
137 | 137 |
138 void SafeBrowsingPingManager::SetCertificateErrorReporterForTesting( | 138 void SafeBrowsingPingManager::SetCertificateErrorReporterForTesting( |
139 scoped_ptr<certificate_reporting::ErrorReporter> | 139 std::unique_ptr<certificate_reporting::ErrorReporter> |
140 certificate_error_reporter) { | 140 certificate_error_reporter) { |
141 certificate_error_reporter_ = std::move(certificate_error_reporter); | 141 certificate_error_reporter_ = std::move(certificate_error_reporter); |
142 } | 142 } |
143 | 143 |
144 GURL SafeBrowsingPingManager::SafeBrowsingHitUrl( | 144 GURL SafeBrowsingPingManager::SafeBrowsingHitUrl( |
145 const safe_browsing::HitReport& hit_report) const { | 145 const safe_browsing::HitReport& hit_report) const { |
146 DCHECK(hit_report.threat_type == SB_THREAT_TYPE_URL_MALWARE || | 146 DCHECK(hit_report.threat_type == SB_THREAT_TYPE_URL_MALWARE || |
147 hit_report.threat_type == SB_THREAT_TYPE_URL_PHISHING || | 147 hit_report.threat_type == SB_THREAT_TYPE_URL_PHISHING || |
148 hit_report.threat_type == SB_THREAT_TYPE_URL_UNWANTED || | 148 hit_report.threat_type == SB_THREAT_TYPE_URL_UNWANTED || |
149 hit_report.threat_type == SB_THREAT_TYPE_BINARY_MALWARE_URL || | 149 hit_report.threat_type == SB_THREAT_TYPE_BINARY_MALWARE_URL || |
(...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
231 version_.c_str()); | 231 version_.c_str()); |
232 std::string api_key = google_apis::GetAPIKey(); | 232 std::string api_key = google_apis::GetAPIKey(); |
233 if (!api_key.empty()) { | 233 if (!api_key.empty()) { |
234 base::StringAppendF(&url, "&key=%s", | 234 base::StringAppendF(&url, "&key=%s", |
235 net::EscapeQueryParamValue(api_key, true).c_str()); | 235 net::EscapeQueryParamValue(api_key, true).c_str()); |
236 } | 236 } |
237 return GURL(url); | 237 return GURL(url); |
238 } | 238 } |
239 | 239 |
240 } // namespace safe_browsing | 240 } // namespace safe_browsing |
OLD | NEW |