Index: chrome/browser/safe_browsing/download_protection_service.cc |
diff --git a/chrome/browser/safe_browsing/download_protection_service.cc b/chrome/browser/safe_browsing/download_protection_service.cc |
index 6681ae3ea1453e15681cca7583c4fe4d0fb80954..82fd50b4a5cbeb26b809524cda354a6e44c0fea2 100644 |
--- a/chrome/browser/safe_browsing/download_protection_service.cc |
+++ b/chrome/browser/safe_browsing/download_protection_service.cc |
@@ -948,7 +948,7 @@ class DownloadProtectionService::CheckClientDownloadRequest |
// Prepares URLs to be put into a ping message. Currently this just shortens |
// data: URIs, other URLs are included verbatim. If this is a sampled binary, |
- // we'll send a lite-ping which strips all PII. |
+ // we'll send a light-ping which strips PII from the URL. |
std::string SanitizeUrl(const GURL& url) const { |
if (type_ == ClientDownloadRequest::SAMPLED_UNSUPPORTED_FILE) |
return url.GetOrigin().spec(); |
@@ -1022,14 +1022,8 @@ class DownloadProtectionService::CheckClientDownloadRequest |
} |
request.set_user_initiated(item_->HasUserGesture()); |
- if (type_ == ClientDownloadRequest::SAMPLED_UNSUPPORTED_FILE) { |
- request.set_file_basename( |
- base::FilePath(item_->GetTargetFilePath().Extension()) |
- .AsUTF8Unsafe()); |
- } else { |
- request.set_file_basename( |
+ request.set_file_basename( |
item_->GetTargetFilePath().BaseName().AsUTF8Unsafe()); |
- } |
request.set_download_type(type_); |
ReferrerChainData* referrer_chain_data = |