| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // Implementation of the SafeBrowsingBlockingPage class. | 5 // Implementation of the SafeBrowsingBlockingPage class. |
| 6 | 6 |
| 7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" | 7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" |
| 8 | 8 |
| 9 #include <string> | 9 #include <string> |
| 10 | 10 |
| (...skipping 1297 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1308 return webui::GetI18nTemplateHtml(html, &load_time_data); | 1308 return webui::GetI18nTemplateHtml(html, &load_time_data); |
| 1309 } | 1309 } |
| 1310 | 1310 |
| 1311 void SafeBrowsingBlockingPageV3::PopulateMalwareLoadTimeData( | 1311 void SafeBrowsingBlockingPageV3::PopulateMalwareLoadTimeData( |
| 1312 base::DictionaryValue* load_time_data) { | 1312 base::DictionaryValue* load_time_data) { |
| 1313 load_time_data->SetBoolean("phishing", false); | 1313 load_time_data->SetBoolean("phishing", false); |
| 1314 load_time_data->SetString( | 1314 load_time_data->SetString( |
| 1315 "heading", l10n_util::GetStringUTF16(IDS_MALWARE_V3_HEADING)); | 1315 "heading", l10n_util::GetStringUTF16(IDS_MALWARE_V3_HEADING)); |
| 1316 load_time_data->SetString( | 1316 load_time_data->SetString( |
| 1317 "primaryParagraph", | 1317 "primaryParagraph", |
| 1318 l10n_util::GetStringUTF16(IDS_MALWARE_V3_PRIMARY_PARAGRAPH)); | 1318 l10n_util::GetStringFUTF16( |
| 1319 IDS_MALWARE_V3_PRIMARY_PARAGRAPH, |
| 1320 base::UTF8ToUTF16(url_.host()))); |
| 1319 load_time_data->SetString( | 1321 load_time_data->SetString( |
| 1320 "explanationParagraph", | 1322 "explanationParagraph", |
| 1321 is_main_frame_load_blocked_ ? | 1323 is_main_frame_load_blocked_ ? |
| 1322 l10n_util::GetStringFUTF16( | 1324 l10n_util::GetStringFUTF16( |
| 1323 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH, | 1325 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH, |
| 1324 base::UTF8ToUTF16(url_.host())) : | 1326 base::UTF8ToUTF16(url_.host())) : |
| 1325 l10n_util::GetStringFUTF16( | 1327 l10n_util::GetStringFUTF16( |
| 1326 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_SUBRESOURCE, | 1328 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_SUBRESOURCE, |
| 1327 base::UTF8ToUTF16(web_contents_->GetURL().host()), | 1329 base::UTF8ToUTF16(web_contents_->GetURL().host()), |
| 1328 base::UTF8ToUTF16(url_.host()))); | 1330 base::UTF8ToUTF16(url_.host()))); |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1367 IDS_PHISHING_V3_PRIMARY_PARAGRAPH, | 1369 IDS_PHISHING_V3_PRIMARY_PARAGRAPH, |
| 1368 base::UTF8ToUTF16(url_.host()))); | 1370 base::UTF8ToUTF16(url_.host()))); |
| 1369 load_time_data->SetString( | 1371 load_time_data->SetString( |
| 1370 "explanationParagraph", | 1372 "explanationParagraph", |
| 1371 l10n_util::GetStringFUTF16(IDS_PHISHING_V3_EXPLANATION_PARAGRAPH, | 1373 l10n_util::GetStringFUTF16(IDS_PHISHING_V3_EXPLANATION_PARAGRAPH, |
| 1372 base::UTF8ToUTF16(url_.host()))); | 1374 base::UTF8ToUTF16(url_.host()))); |
| 1373 load_time_data->SetString( | 1375 load_time_data->SetString( |
| 1374 "finalParagraph", | 1376 "finalParagraph", |
| 1375 l10n_util::GetStringUTF16(IDS_PHISHING_V3_PROCEED_PARAGRAPH)); | 1377 l10n_util::GetStringUTF16(IDS_PHISHING_V3_PROCEED_PARAGRAPH)); |
| 1376 } | 1378 } |
| OLD | NEW |