Index: chrome/browser/safe_browsing/client_side_detection_host.h |
diff --git a/chrome/browser/safe_browsing/client_side_detection_host.h b/chrome/browser/safe_browsing/client_side_detection_host.h |
index e4e47cf4f7209a40d12babd9312172a0e5e5e184..caad42fea8d923c62c72983863b7378f21efa5a2 100644 |
--- a/chrome/browser/safe_browsing/client_side_detection_host.h |
+++ b/chrome/browser/safe_browsing/client_side_detection_host.h |
@@ -52,7 +52,14 @@ class ClientSideDetectionHost : public content::WebContentsObserver, |
virtual void OnSafeBrowsingHit( |
const SafeBrowsingUIManager::UnsafeResource& resource) OVERRIDE; |
+ // Returns true if the given IP address is malicious. |
+ // This method has be to called on the IO thread. |
+ virtual bool IsBadIpAddress(const std::string& ip_address); |
+ |
protected: |
+ // Used for testing only when we mock out the host. |
+ ClientSideDetectionHost(); |
+ |
// From content::WebContentsObserver. |
virtual void WebContentsDestroyed(content::WebContents* tab) OVERRIDE; |
@@ -81,8 +88,11 @@ class ClientSideDetectionHost : public content::WebContentsObserver, |
// This method is responsible for deleting the request object. Called on |
// the UI thread. |
void FeatureExtractionDone(bool success, ClientPhishingRequest* request); |
+ |
// Function to be called when the browser malware feature extractor is done. |
- void MalwareFeatureExtractionDone(scoped_ptr<ClientMalwareRequest> request); |
+ // Takes ownership of the request object. Called on the UI thread. |
+ void MalwareFeatureExtractionDone(bool success, |
+ ClientMalwareRequest* request); |
mattm
2013/10/25 06:28:12
Why removing the scoped_ptr? It's the explicit wa
noé
2013/10/28 23:39:26
Kept the scoped_ptr here but had to remove it from
|
// Update the entries in browse_info_->ips map. |
void UpdateIPUrlMap(const std::string& ip, const std::string& url); |