Index: chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer.cc |
diff --git a/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer.cc b/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer.cc |
index d12d7709cc34a07af57b9a1bb6533ae8257bc986..3467c168b9ab9aeac870917d53d3a002030a32c9 100644 |
--- a/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer.cc |
+++ b/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer.cc |
@@ -23,27 +23,22 @@ |
namespace safe_browsing { |
-namespace { |
- |
void RecordSignatureVerificationTime(size_t file_index, |
- const base::TimeDelta& verification_time) { |
+ const base::TimeDelta& verification_time) { |
static const char kHistogramName[] = "SBIRS.VerifyBinaryIntegrity."; |
base::HistogramBase* signature_verification_time_histogram = |
base::Histogram::FactoryTimeGet( |
std::string(kHistogramName) + base::SizeTToString(file_index), |
base::TimeDelta::FromMilliseconds(1), |
- base::TimeDelta::FromSeconds(20), |
- 50, |
+ base::TimeDelta::FromSeconds(20), 50, |
base::Histogram::kUmaTargetedHistogramFlag); |
- signature_verification_time_histogram->AddTime(verification_time); |
+ signature_verification_time_histogram->AddTime(verification_time); |
} |
-} // namespace |
- |
void RegisterBinaryIntegrityAnalysis() { |
-#if defined(OS_WIN) |
+#if defined(OS_WIN) || defined(OS_MACOSX) |
scoped_refptr<SafeBrowsingService> safe_browsing_service( |
g_browser_process->safe_browsing_service()); |
@@ -52,6 +47,7 @@ void RegisterBinaryIntegrityAnalysis() { |
#endif |
} |
+#if !defined(OS_MACOSX) |
void VerifyBinaryIntegrity(scoped_ptr<IncidentReceiver> incident_receiver) { |
scoped_refptr<BinaryFeatureExtractor> binary_feature_extractor( |
new BinaryFeatureExtractor()); |
@@ -93,6 +89,7 @@ void VerifyBinaryIntegrity(scoped_ptr<IncidentReceiver> incident_receiver) { |
} |
} |
} |
+#endif // !defined(OS_MACOSX) |
#if !defined(OS_WIN) |
std::vector<base::FilePath> GetCriticalBinariesPath() { |