OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/renderer/safe_browsing/phishing_classifier.h" | 5 #include "chrome/renderer/safe_browsing/phishing_classifier.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/callback.h" | 10 #include "base/callback.h" |
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
96 // asynchronously, rather than directly from this method. To ensure that | 96 // asynchronously, rather than directly from this method. To ensure that |
97 // this is the case, post a task to begin feature extraction on the next | 97 // this is the case, post a task to begin feature extraction on the next |
98 // iteration of the message loop. | 98 // iteration of the message loop. |
99 base::MessageLoop::current()->PostTask( | 99 base::MessageLoop::current()->PostTask( |
100 FROM_HERE, | 100 FROM_HERE, |
101 base::Bind(&PhishingClassifier::BeginFeatureExtraction, | 101 base::Bind(&PhishingClassifier::BeginFeatureExtraction, |
102 weak_factory_.GetWeakPtr())); | 102 weak_factory_.GetWeakPtr())); |
103 } | 103 } |
104 | 104 |
105 void PhishingClassifier::BeginFeatureExtraction() { | 105 void PhishingClassifier::BeginFeatureExtraction() { |
106 WebKit::WebView* web_view = render_view_->GetWebView(); | 106 blink::WebView* web_view = render_view_->GetWebView(); |
107 if (!web_view) { | 107 if (!web_view) { |
108 RunFailureCallback(); | 108 RunFailureCallback(); |
109 return; | 109 return; |
110 } | 110 } |
111 | 111 |
112 WebKit::WebFrame* frame = web_view->mainFrame(); | 112 blink::WebFrame* frame = web_view->mainFrame(); |
113 if (!frame) { | 113 if (!frame) { |
114 RunFailureCallback(); | 114 RunFailureCallback(); |
115 return; | 115 return; |
116 } | 116 } |
117 | 117 |
118 // Check whether the URL is one that we should classify. | 118 // Check whether the URL is one that we should classify. |
119 // Currently, we only classify http: URLs that are GET requests. | 119 // Currently, we only classify http: URLs that are GET requests. |
120 GURL url(frame->document().url()); | 120 GURL url(frame->document().url()); |
121 if (!url.SchemeIs(content::kHttpScheme)) { | 121 if (!url.SchemeIs(content::kHttpScheme)) { |
122 RunFailureCallback(); | 122 RunFailureCallback(); |
123 return; | 123 return; |
124 } | 124 } |
125 | 125 |
126 WebKit::WebDataSource* ds = frame->dataSource(); | 126 blink::WebDataSource* ds = frame->dataSource(); |
127 if (!ds || !EqualsASCII(ds->request().httpMethod(), "GET")) { | 127 if (!ds || !EqualsASCII(ds->request().httpMethod(), "GET")) { |
128 RunFailureCallback(); | 128 RunFailureCallback(); |
129 return; | 129 return; |
130 } | 130 } |
131 | 131 |
132 features_.reset(new FeatureMap); | 132 features_.reset(new FeatureMap); |
133 if (!url_extractor_->ExtractFeatures(url, features_.get())) { | 133 if (!url_extractor_->ExtractFeatures(url, features_.get())) { |
134 RunFailureCallback(); | 134 RunFailureCallback(); |
135 return; | 135 return; |
136 } | 136 } |
(...skipping 25 matching lines...) Expand all Loading... |
162 features_.get(), | 162 features_.get(), |
163 base::Bind(&PhishingClassifier::TermExtractionFinished, | 163 base::Bind(&PhishingClassifier::TermExtractionFinished, |
164 base::Unretained(this))); | 164 base::Unretained(this))); |
165 } else { | 165 } else { |
166 RunFailureCallback(); | 166 RunFailureCallback(); |
167 } | 167 } |
168 } | 168 } |
169 | 169 |
170 void PhishingClassifier::TermExtractionFinished(bool success) { | 170 void PhishingClassifier::TermExtractionFinished(bool success) { |
171 if (success) { | 171 if (success) { |
172 WebKit::WebView* web_view = render_view_->GetWebView(); | 172 blink::WebView* web_view = render_view_->GetWebView(); |
173 if (!web_view) { | 173 if (!web_view) { |
174 RunFailureCallback(); | 174 RunFailureCallback(); |
175 return; | 175 return; |
176 } | 176 } |
177 WebKit::WebFrame* main_frame = web_view->mainFrame(); | 177 blink::WebFrame* main_frame = web_view->mainFrame(); |
178 if (!main_frame) { | 178 if (!main_frame) { |
179 RunFailureCallback(); | 179 RunFailureCallback(); |
180 return; | 180 return; |
181 } | 181 } |
182 | 182 |
183 // Hash all of the features so that they match the model, then compute | 183 // Hash all of the features so that they match the model, then compute |
184 // the score. | 184 // the score. |
185 FeatureMap hashed_features; | 185 FeatureMap hashed_features; |
186 ClientPhishingRequest verdict; | 186 ClientPhishingRequest verdict; |
187 verdict.set_model_version(scorer_->model_version()); | 187 verdict.set_model_version(scorer_->model_version()); |
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
232 RunCallback(verdict); | 232 RunCallback(verdict); |
233 } | 233 } |
234 | 234 |
235 void PhishingClassifier::Clear() { | 235 void PhishingClassifier::Clear() { |
236 page_text_ = NULL; | 236 page_text_ = NULL; |
237 done_callback_.Reset(); | 237 done_callback_.Reset(); |
238 features_.reset(NULL); | 238 features_.reset(NULL); |
239 } | 239 } |
240 | 240 |
241 } // namespace safe_browsing | 241 } // namespace safe_browsing |
OLD | NEW |