| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // Implementation of the SafeBrowsingBlockingPage class. | 5 // Implementation of the SafeBrowsingBlockingPage class. |
| 6 | 6 |
| 7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" | 7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" |
| 8 | 8 |
| 9 #include <string> | 9 #include <string> |
| 10 | 10 |
| (...skipping 1283 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1294 } | 1294 } |
| 1295 | 1295 |
| 1296 void SafeBrowsingBlockingPageV3::PopulateMalwareLoadTimeData( | 1296 void SafeBrowsingBlockingPageV3::PopulateMalwareLoadTimeData( |
| 1297 base::DictionaryValue* load_time_data) { | 1297 base::DictionaryValue* load_time_data) { |
| 1298 load_time_data->SetString("trialCondition", trial_condition_); | 1298 load_time_data->SetString("trialCondition", trial_condition_); |
| 1299 load_time_data->SetBoolean("phishing", false); | 1299 load_time_data->SetBoolean("phishing", false); |
| 1300 load_time_data->SetString( | 1300 load_time_data->SetString( |
| 1301 "heading", l10n_util::GetStringUTF16(IDS_MALWARE_V3_HEADING)); | 1301 "heading", l10n_util::GetStringUTF16(IDS_MALWARE_V3_HEADING)); |
| 1302 load_time_data->SetString( | 1302 load_time_data->SetString( |
| 1303 "primaryParagraph", | 1303 "primaryParagraph", |
| 1304 l10n_util::GetStringUTF16(IDS_MALWARE_V3_PRIMARY_PARAGRAPH)); | 1304 l10n_util::GetStringFUTF16( |
| 1305 IDS_MALWARE_V3_PRIMARY_PARAGRAPH, |
| 1306 base::UTF8ToUTF16(url_.host()))); |
| 1305 if (trial_condition_ == kCondV3History) { | 1307 if (trial_condition_ == kCondV3History) { |
| 1306 load_time_data->SetString( | 1308 load_time_data->SetString( |
| 1307 "explanationParagraph", | 1309 "explanationParagraph", |
| 1308 is_main_frame_load_blocked_ ? | 1310 is_main_frame_load_blocked_ ? |
| 1309 l10n_util::GetStringFUTF16( | 1311 l10n_util::GetStringFUTF16( |
| 1310 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_HISTORY, | 1312 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_HISTORY, |
| 1311 base::UTF8ToUTF16(url_.host())) : | 1313 base::UTF8ToUTF16(url_.host())) : |
| 1312 l10n_util::GetStringFUTF16( | 1314 l10n_util::GetStringFUTF16( |
| 1313 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_SUBRESOURCE_HISTORY, | 1315 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_SUBRESOURCE_HISTORY, |
| 1314 base::UTF8ToUTF16(web_contents_->GetURL().host()), | 1316 base::UTF8ToUTF16(web_contents_->GetURL().host()), |
| (...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1392 IDS_PHISHING_V3_PRIMARY_PARAGRAPH, | 1394 IDS_PHISHING_V3_PRIMARY_PARAGRAPH, |
| 1393 base::UTF8ToUTF16(url_.host()))); | 1395 base::UTF8ToUTF16(url_.host()))); |
| 1394 load_time_data->SetString( | 1396 load_time_data->SetString( |
| 1395 "explanationParagraph", | 1397 "explanationParagraph", |
| 1396 l10n_util::GetStringFUTF16(IDS_PHISHING_V3_EXPLANATION_PARAGRAPH, | 1398 l10n_util::GetStringFUTF16(IDS_PHISHING_V3_EXPLANATION_PARAGRAPH, |
| 1397 base::UTF8ToUTF16(url_.host()))); | 1399 base::UTF8ToUTF16(url_.host()))); |
| 1398 load_time_data->SetString( | 1400 load_time_data->SetString( |
| 1399 "finalParagraph", | 1401 "finalParagraph", |
| 1400 l10n_util::GetStringUTF16(IDS_PHISHING_V3_PROCEED_PARAGRAPH)); | 1402 l10n_util::GetStringUTF16(IDS_PHISHING_V3_PROCEED_PARAGRAPH)); |
| 1401 } | 1403 } |
| OLD | NEW |