summaryrefslogtreecommitdiffstats
path: root/chrome/browser/safe_browsing/client_side_detection_service.h
diff options
context:
space:
mode:
Diffstat (limited to 'chrome/browser/safe_browsing/client_side_detection_service.h')
-rw-r--r--chrome/browser/safe_browsing/client_side_detection_service.h21
1 files changed, 0 insertions, 21 deletions
diff --git a/chrome/browser/safe_browsing/client_side_detection_service.h b/chrome/browser/safe_browsing/client_side_detection_service.h
index 0a25f8b..7e583a1 100644
--- a/chrome/browser/safe_browsing/client_side_detection_service.h
+++ b/chrome/browser/safe_browsing/client_side_detection_service.h
@@ -24,7 +24,6 @@
#include "base/basictypes.h"
#include "base/callback_old.h"
#include "base/gtest_prod_util.h"
-#include "base/hash_tables.h"
#include "base/memory/linked_ptr.h"
#include "base/memory/ref_counted.h"
#include "base/memory/scoped_ptr.h"
@@ -171,8 +170,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate,
IsFalsePositiveResponse);
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest,
ModelHasValidHashIds);
- FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest,
- SanitizeRequestForPingback);
// CacheState holds all information necessary to respond to a caller without
// actually making a HTTP request.
@@ -203,14 +200,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate,
static const base::TimeDelta kNegativeCacheInterval;
static const base::TimeDelta kPositiveCacheInterval;
- // Given a ClientSidePhishingRequest populated by the renderer and browser
- // feature extractors, sanitizes it so that no data specifically identifying
- // the URL or page content is included. This is used when sending a pingback
- // if the user is not opted in to UMA.
- void SanitizeRequestForPingback(
- const ClientPhishingRequest& original_request,
- ClientPhishingRequest* sanitized_request);
-
// Starts sending the request to the client-side detection frontends.
// This method takes ownership of both pointers.
void StartClientReportPhishingRequest(
@@ -245,10 +234,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate,
// that we consider non-public IP addresses. Returns true on success.
bool InitializePrivateNetworks();
- // Initializes the |allowed_features_| hash_set with the features that
- // can be sent in sanitized pingbacks.
- void InitializeAllowedFeatures();
-
// Send the model to the given renderer.
void SendModelToProcess(RenderProcessHost* process);
@@ -281,9 +266,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate,
scoped_ptr<base::TimeDelta> model_max_age_;
scoped_ptr<URLFetcher> model_fetcher_;
- // This pointer may be NULL if SafeBrowsing is disabled.
- scoped_refptr<SafeBrowsingService> sb_service_;
-
// Map of client report phishing request to the corresponding callback that
// has to be invoked when the request is done.
struct ClientReportInfo;
@@ -312,9 +294,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate,
// The network blocks that we consider private IP address ranges.
std::vector<AddressRange> private_networks_;
- // Features which are allowed to be sent in sanitized pingbacks.
- base::hash_set<std::string> allowed_features_;
-
// Map of bad subnets which are copied from the client model and put into
// this map to speed up lookups.
BadSubnetMap bad_subnets_;