diff options
author | bryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-28 20:22:33 +0000 |
---|---|---|
committer | bryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-28 20:22:33 +0000 |
commit | 8ac893730dbcd54a60589443622009f1d9c10fd7 (patch) | |
tree | 30ba9a6ce6f90a92ea4faaa3f2894e64edbdcb92 /chrome_frame/test/ie_event_sink.h | |
parent | ca20794140114fb766eec177bd7f0710c90403c6 (diff) | |
download | chromium_src-8ac893730dbcd54a60589443622009f1d9c10fd7.zip chromium_src-8ac893730dbcd54a60589443622009f1d9c10fd7.tar.gz chromium_src-8ac893730dbcd54a60589443622009f1d9c10fd7.tar.bz2 |
Add renderer -> browser IPC: notify browser when the current URL is phishy.
If the current URL is phishing according to the client-side phishing
detector we notify the browser. The browser will then send a request
to the SafeBrowsing servers to verify that the URL is indeed phishing.
If the URL comes back phishing we will eventually display a warning to the
user.
BUG=
TEST=
Review URL: http://codereview.chromium.org/3391020
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60839 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome_frame/test/ie_event_sink.h')
0 files changed, 0 insertions, 0 deletions