diff options
Diffstat (limited to 'chrome/browser/safe_browsing/client_side_detection_service.h')
-rw-r--r-- | chrome/browser/safe_browsing/client_side_detection_service.h | 21 |
1 files changed, 0 insertions, 21 deletions
diff --git a/chrome/browser/safe_browsing/client_side_detection_service.h b/chrome/browser/safe_browsing/client_side_detection_service.h index 0a25f8b..7e583a1 100644 --- a/chrome/browser/safe_browsing/client_side_detection_service.h +++ b/chrome/browser/safe_browsing/client_side_detection_service.h @@ -24,7 +24,6 @@ #include "base/basictypes.h" #include "base/callback_old.h" #include "base/gtest_prod_util.h" -#include "base/hash_tables.h" #include "base/memory/linked_ptr.h" #include "base/memory/ref_counted.h" #include "base/memory/scoped_ptr.h" @@ -171,8 +170,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate, IsFalsePositiveResponse); FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest, ModelHasValidHashIds); - FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionServiceTest, - SanitizeRequestForPingback); // CacheState holds all information necessary to respond to a caller without // actually making a HTTP request. @@ -203,14 +200,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate, static const base::TimeDelta kNegativeCacheInterval; static const base::TimeDelta kPositiveCacheInterval; - // Given a ClientSidePhishingRequest populated by the renderer and browser - // feature extractors, sanitizes it so that no data specifically identifying - // the URL or page content is included. This is used when sending a pingback - // if the user is not opted in to UMA. - void SanitizeRequestForPingback( - const ClientPhishingRequest& original_request, - ClientPhishingRequest* sanitized_request); - // Starts sending the request to the client-side detection frontends. // This method takes ownership of both pointers. void StartClientReportPhishingRequest( @@ -245,10 +234,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate, // that we consider non-public IP addresses. Returns true on success. bool InitializePrivateNetworks(); - // Initializes the |allowed_features_| hash_set with the features that - // can be sent in sanitized pingbacks. - void InitializeAllowedFeatures(); - // Send the model to the given renderer. void SendModelToProcess(RenderProcessHost* process); @@ -281,9 +266,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate, scoped_ptr<base::TimeDelta> model_max_age_; scoped_ptr<URLFetcher> model_fetcher_; - // This pointer may be NULL if SafeBrowsing is disabled. - scoped_refptr<SafeBrowsingService> sb_service_; - // Map of client report phishing request to the corresponding callback that // has to be invoked when the request is done. struct ClientReportInfo; @@ -312,9 +294,6 @@ class ClientSideDetectionService : public URLFetcher::Delegate, // The network blocks that we consider private IP address ranges. std::vector<AddressRange> private_networks_; - // Features which are allowed to be sent in sanitized pingbacks. - base::hash_set<std::string> allowed_features_; - // Map of bad subnets which are copied from the client model and put into // this map to speed up lookups. BadSubnetMap bad_subnets_; |