diff options
author | bryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-28 20:22:33 +0000 |
---|---|---|
committer | bryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-28 20:22:33 +0000 |
commit | 8ac893730dbcd54a60589443622009f1d9c10fd7 (patch) | |
tree | 30ba9a6ce6f90a92ea4faaa3f2894e64edbdcb92 /chrome | |
parent | ca20794140114fb766eec177bd7f0710c90403c6 (diff) | |
download | chromium_src-8ac893730dbcd54a60589443622009f1d9c10fd7.zip chromium_src-8ac893730dbcd54a60589443622009f1d9c10fd7.tar.gz chromium_src-8ac893730dbcd54a60589443622009f1d9c10fd7.tar.bz2 |
Add renderer -> browser IPC: notify browser when the current URL is phishy.
If the current URL is phishing according to the client-side phishing
detector we notify the browser. The browser will then send a request
to the SafeBrowsing servers to verify that the URL is indeed phishing.
If the URL comes back phishing we will eventually display a warning to the
user.
BUG=
TEST=
Review URL: http://codereview.chromium.org/3391020
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60839 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome')
-rw-r--r-- | chrome/browser/renderer_host/render_view_host.cc | 9 | ||||
-rw-r--r-- | chrome/browser/renderer_host/render_view_host.h | 3 | ||||
-rw-r--r-- | chrome/common/render_messages_internal.h | 8 |
3 files changed, 20 insertions, 0 deletions
diff --git a/chrome/browser/renderer_host/render_view_host.cc b/chrome/browser/renderer_host/render_view_host.cc index 9ca53bd..ebbb396 100644 --- a/chrome/browser/renderer_host/render_view_host.cc +++ b/chrome/browser/renderer_host/render_view_host.cc @@ -858,6 +858,8 @@ void RenderViewHost::OnMessageReceived(const IPC::Message& msg) { IPC_MESSAGE_HANDLER(ViewHostMsg_SetDisplayingPDFContent, OnSetDisplayingPDFContent) IPC_MESSAGE_HANDLER(ViewHostMsg_SetSuggestResult, OnSetSuggestResult) + IPC_MESSAGE_HANDLER(ViewHostMsg_DetectedPhishingSite, + OnDetectedPhishingSite) // Have the super handle all other messages. IPC_MESSAGE_UNHANDLED(RenderWidgetHost::OnMessageReceived(msg)) IPC_END_MESSAGE_MAP_EX() @@ -2058,3 +2060,10 @@ void RenderViewHost::OnSetSuggestResult(int32 page_id, return; integration_delegate->OnSetSuggestResult(page_id, result); } + +void RenderViewHost::OnDetectedPhishingSite(const GURL& phishing_url, + double phishing_score, + const SkBitmap& thumbnail) { + // TODO(noelutz): send an HTTP request to the client-side detection frontends + // to confirm that the URL is really phishing. +} diff --git a/chrome/browser/renderer_host/render_view_host.h b/chrome/browser/renderer_host/render_view_host.h index 5fce6d9..8633b0c 100644 --- a/chrome/browser/renderer_host/render_view_host.h +++ b/chrome/browser/renderer_host/render_view_host.h @@ -679,6 +679,9 @@ class RenderViewHost : public RenderWidgetHost { bool blocked_by_policy); void OnSetDisplayingPDFContent(); void OnSetSuggestResult(int32 page_id, const std::string& result); + void OnDetectedPhishingSite(const GURL& phishing_url, + double phishing_score, + const SkBitmap& thumbnail); private: friend class TestRenderViewHost; diff --git a/chrome/common/render_messages_internal.h b/chrome/common/render_messages_internal.h index db86235..38e71c0 100644 --- a/chrome/common/render_messages_internal.h +++ b/chrome/common/render_messages_internal.h @@ -2892,4 +2892,12 @@ IPC_BEGIN_MESSAGES(ViewHost) int32 /* page_id */, std::string /* suggest */) + // Client-Side Phishing Detector --------------------------------------------- + // Inform the browser that the current URL is phishing according to the + // client-side phishing detector. + IPC_MESSAGE_ROUTED3(ViewHostMsg_DetectedPhishingSite, + GURL /* phishing_url */, + double /* phishing_score */, + SkBitmap /* thumbnail */) + IPC_END_MESSAGES(ViewHost) |