Home | History | Annotate | Download | only in safe_browsing

Lines Matching defs:params_

52         params_(params),
71 if (params_.contents_mime_type != "text/html" &&
72 params_.contents_mime_type != "application/xhtml+xml") {
73 VLOG(1) << "Skipping phishing classification for URL: " << params_.url
75 << params_.contents_mime_type;
86 if (params_.was_fetched_via_proxy) {
87 VLOG(1) << "Skipping phishing classification for URL: " << params_.url
94 if (csd_service_->IsPrivateIPAddress(params_.socket_address.host())) {
95 VLOG(1) << "Skipping phishing classification for URL: " << params_.url
97 << params_.socket_address.host();
106 VLOG(1) << "Skipping phishing classification for URL: " << params_.url
125 params_.url));
182 if (csd_service_->GetValidCachedResult(params_.url, &is_phishing)) {
183 VLOG(1) << "Satisfying request for " << params_.url << " from cache";
186 host_->MaybeShowPhishingWarning(params_.url, is_phishing);
194 if (csd_service_->IsInCache(params_.url)) {
195 VLOG(1) << "Reporting limit skipped for " << params_.url
200 << "not running classification for " << params_.url;
212 rvh->routing_id(), params_.url));
218 ViewHostMsg_FrameNavigate_Params params_;