OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // Implementation of the SafeBrowsingBlockingPage class. | 5 // Implementation of the SafeBrowsingBlockingPage class. |
6 | 6 |
7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" | 7 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" |
8 | 8 |
9 #include <string> | 9 #include <string> |
10 | 10 |
(...skipping 1283 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1294 } | 1294 } |
1295 | 1295 |
1296 void SafeBrowsingBlockingPageV3::PopulateMalwareLoadTimeData( | 1296 void SafeBrowsingBlockingPageV3::PopulateMalwareLoadTimeData( |
1297 base::DictionaryValue* load_time_data) { | 1297 base::DictionaryValue* load_time_data) { |
1298 load_time_data->SetString("trialCondition", trial_condition_); | 1298 load_time_data->SetString("trialCondition", trial_condition_); |
1299 load_time_data->SetBoolean("phishing", false); | 1299 load_time_data->SetBoolean("phishing", false); |
1300 load_time_data->SetString( | 1300 load_time_data->SetString( |
1301 "heading", l10n_util::GetStringUTF16(IDS_MALWARE_V3_HEADING)); | 1301 "heading", l10n_util::GetStringUTF16(IDS_MALWARE_V3_HEADING)); |
1302 load_time_data->SetString( | 1302 load_time_data->SetString( |
1303 "primaryParagraph", | 1303 "primaryParagraph", |
1304 l10n_util::GetStringUTF16(IDS_MALWARE_V3_PRIMARY_PARAGRAPH)); | 1304 l10n_util::GetStringFUTF16( |
| 1305 IDS_MALWARE_V3_PRIMARY_PARAGRAPH, |
| 1306 base::UTF8ToUTF16(url_.host()))); |
1305 if (trial_condition_ == kCondV3History) { | 1307 if (trial_condition_ == kCondV3History) { |
1306 load_time_data->SetString( | 1308 load_time_data->SetString( |
1307 "explanationParagraph", | 1309 "explanationParagraph", |
1308 is_main_frame_load_blocked_ ? | 1310 is_main_frame_load_blocked_ ? |
1309 l10n_util::GetStringFUTF16( | 1311 l10n_util::GetStringFUTF16( |
1310 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_HISTORY, | 1312 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_HISTORY, |
1311 base::UTF8ToUTF16(url_.host())) : | 1313 base::UTF8ToUTF16(url_.host())) : |
1312 l10n_util::GetStringFUTF16( | 1314 l10n_util::GetStringFUTF16( |
1313 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_SUBRESOURCE_HISTORY, | 1315 IDS_MALWARE_V3_EXPLANATION_PARAGRAPH_SUBRESOURCE_HISTORY, |
1314 base::UTF8ToUTF16(web_contents_->GetURL().host()), | 1316 base::UTF8ToUTF16(web_contents_->GetURL().host()), |
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1392 IDS_PHISHING_V3_PRIMARY_PARAGRAPH, | 1394 IDS_PHISHING_V3_PRIMARY_PARAGRAPH, |
1393 base::UTF8ToUTF16(url_.host()))); | 1395 base::UTF8ToUTF16(url_.host()))); |
1394 load_time_data->SetString( | 1396 load_time_data->SetString( |
1395 "explanationParagraph", | 1397 "explanationParagraph", |
1396 l10n_util::GetStringFUTF16(IDS_PHISHING_V3_EXPLANATION_PARAGRAPH, | 1398 l10n_util::GetStringFUTF16(IDS_PHISHING_V3_EXPLANATION_PARAGRAPH, |
1397 base::UTF8ToUTF16(url_.host()))); | 1399 base::UTF8ToUTF16(url_.host()))); |
1398 load_time_data->SetString( | 1400 load_time_data->SetString( |
1399 "finalParagraph", | 1401 "finalParagraph", |
1400 l10n_util::GetStringUTF16(IDS_PHISHING_V3_PROCEED_PARAGRAPH)); | 1402 l10n_util::GetStringUTF16(IDS_PHISHING_V3_PROCEED_PARAGRAPH)); |
1401 } | 1403 } |
OLD | NEW |