| Index: chrome/renderer/safe_browsing/phishing_classifier_delegate.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc b/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc
|
| index dc180d2236befd9db2c10a4fb0b9842c2e2eb208..fb700e440a8ee828a56aa84bd7f9b19b57ba724a 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_classifier_delegate.cc
|
| @@ -208,8 +208,8 @@ void PhishingClassifierDelegate::ClassificationDone(
|
| const ClientPhishingRequest& verdict) {
|
| // We no longer need the page text.
|
| classifier_page_text_.clear();
|
| - VLOG(2) << "Phishy verdict = " << verdict.is_phishing()
|
| - << " score = " << verdict.client_score();
|
| + DVLOG(2) << "Phishy verdict = " << verdict.is_phishing()
|
| + << " score = " << verdict.client_score();
|
| if (verdict.client_score() != PhishingClassifier::kInvalidScore) {
|
| DCHECK_EQ(last_url_sent_to_classifier_.spec(), verdict.url());
|
| RenderThread::Get()->Send(new SafeBrowsingHostMsg_PhishingDetectionDone(
|
| @@ -235,7 +235,7 @@ void PhishingClassifierDelegate::MaybeStartClassification() {
|
| // classified at all (as opposed to deferring it until we get an IPC or the
|
| // load completes), we discard the page text since it won't be needed.
|
| if (!classifier_->is_ready()) {
|
| - VLOG(2) << "Not starting classification, no Scorer created.";
|
| + DVLOG(2) << "Not starting classification, no Scorer created.";
|
| // Keep classifier_page_text_, in case a Scorer is set later.
|
| return;
|
| }
|
| @@ -244,7 +244,7 @@ void PhishingClassifierDelegate::MaybeStartClassification() {
|
| // Skip loads from session history navigation. However, update the
|
| // last URL sent to the classifier, so that we'll properly detect
|
| // in-page navigations.
|
| - VLOG(2) << "Not starting classification for back/forward navigation";
|
| + DVLOG(2) << "Not starting classification for back/forward navigation";
|
| last_url_sent_to_classifier_ = last_finished_load_url_;
|
| classifier_page_text_.clear(); // we won't need this.
|
| have_page_text_ = false;
|
| @@ -256,14 +256,14 @@ void PhishingClassifierDelegate::MaybeStartClassification() {
|
| // We've already classified this toplevel URL, so this was likely an
|
| // in-page navigation or a subframe navigation. The browser should not
|
| // send a StartPhishingDetection IPC in this case.
|
| - VLOG(2) << "Toplevel URL is unchanged, not starting classification.";
|
| + DVLOG(2) << "Toplevel URL is unchanged, not starting classification.";
|
| classifier_page_text_.clear(); // we won't need this.
|
| have_page_text_ = false;
|
| return;
|
| }
|
|
|
| if (!have_page_text_) {
|
| - VLOG(2) << "Not starting classification, there is no page text ready.";
|
| + DVLOG(2) << "Not starting classification, there is no page text ready.";
|
| return;
|
| }
|
|
|
| @@ -272,15 +272,15 @@ void PhishingClassifierDelegate::MaybeStartClassification() {
|
| // so defer classification for now. Note: the ref does not affect
|
| // any of the browser's preclassification checks, so we don't require it
|
| // to match.
|
| - VLOG(2) << "Not starting classification, last url from browser is "
|
| - << last_url_received_from_browser_ << ", last finished load is "
|
| - << last_finished_load_url_;
|
| + DVLOG(2) << "Not starting classification, last url from browser is "
|
| + << last_url_received_from_browser_ << ", last finished load is "
|
| + << last_finished_load_url_;
|
| // Keep classifier_page_text_, in case the browser notifies us later that
|
| // we should classify the URL.
|
| return;
|
| }
|
|
|
| - VLOG(2) << "Starting classification for " << last_finished_load_url_;
|
| + DVLOG(2) << "Starting classification for " << last_finished_load_url_;
|
| last_url_sent_to_classifier_ = last_finished_load_url_;
|
| is_classifying_ = true;
|
| classifier_->BeginClassification(
|
|
|