| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/safe_browsing/ping_manager.h" | 5 #include "chrome/browser/safe_browsing/ping_manager.h" |
| 6 | 6 |
| 7 #include <utility> | 7 #include <utility> |
| 8 | 8 |
| 9 #include "base/logging.h" | 9 #include "base/logging.h" |
| 10 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
| (...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 129 safebrowsing_reports_.insert(fetcher); | 129 safebrowsing_reports_.insert(fetcher); |
| 130 } | 130 } |
| 131 | 131 |
| 132 void SafeBrowsingPingManager::ReportInvalidCertificateChain( | 132 void SafeBrowsingPingManager::ReportInvalidCertificateChain( |
| 133 const std::string& serialized_report) { | 133 const std::string& serialized_report) { |
| 134 DCHECK(certificate_error_reporter_); | 134 DCHECK(certificate_error_reporter_); |
| 135 certificate_error_reporter_->SendExtendedReportingReport(serialized_report); | 135 certificate_error_reporter_->SendExtendedReportingReport(serialized_report); |
| 136 } | 136 } |
| 137 | 137 |
| 138 void SafeBrowsingPingManager::SetCertificateErrorReporterForTesting( | 138 void SafeBrowsingPingManager::SetCertificateErrorReporterForTesting( |
| 139 scoped_ptr<certificate_reporting::ErrorReporter> | 139 std::unique_ptr<certificate_reporting::ErrorReporter> |
| 140 certificate_error_reporter) { | 140 certificate_error_reporter) { |
| 141 certificate_error_reporter_ = std::move(certificate_error_reporter); | 141 certificate_error_reporter_ = std::move(certificate_error_reporter); |
| 142 } | 142 } |
| 143 | 143 |
| 144 GURL SafeBrowsingPingManager::SafeBrowsingHitUrl( | 144 GURL SafeBrowsingPingManager::SafeBrowsingHitUrl( |
| 145 const safe_browsing::HitReport& hit_report) const { | 145 const safe_browsing::HitReport& hit_report) const { |
| 146 DCHECK(hit_report.threat_type == SB_THREAT_TYPE_URL_MALWARE || | 146 DCHECK(hit_report.threat_type == SB_THREAT_TYPE_URL_MALWARE || |
| 147 hit_report.threat_type == SB_THREAT_TYPE_URL_PHISHING || | 147 hit_report.threat_type == SB_THREAT_TYPE_URL_PHISHING || |
| 148 hit_report.threat_type == SB_THREAT_TYPE_URL_UNWANTED || | 148 hit_report.threat_type == SB_THREAT_TYPE_URL_UNWANTED || |
| 149 hit_report.threat_type == SB_THREAT_TYPE_BINARY_MALWARE_URL || | 149 hit_report.threat_type == SB_THREAT_TYPE_BINARY_MALWARE_URL || |
| (...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 231 version_.c_str()); | 231 version_.c_str()); |
| 232 std::string api_key = google_apis::GetAPIKey(); | 232 std::string api_key = google_apis::GetAPIKey(); |
| 233 if (!api_key.empty()) { | 233 if (!api_key.empty()) { |
| 234 base::StringAppendF(&url, "&key=%s", | 234 base::StringAppendF(&url, "&key=%s", |
| 235 net::EscapeQueryParamValue(api_key, true).c_str()); | 235 net::EscapeQueryParamValue(api_key, true).c_str()); |
| 236 } | 236 } |
| 237 return GURL(url); | 237 return GURL(url); |
| 238 } | 238 } |
| 239 | 239 |
| 240 } // namespace safe_browsing | 240 } // namespace safe_browsing |
| OLD | NEW |