Index: chrome/browser/renderer_host/render_view_host.cc |
diff --git a/chrome/browser/renderer_host/render_view_host.cc b/chrome/browser/renderer_host/render_view_host.cc |
index e3cc83e68e0c91f86045091f4b1edda2043e33fa..37104d53050a78eb88ef09eb0fdddb834fcdf28e 100644 |
--- a/chrome/browser/renderer_host/render_view_host.cc |
+++ b/chrome/browser/renderer_host/render_view_host.cc |
@@ -807,8 +807,6 @@ bool RenderViewHost::OnMessageReceived(const IPC::Message& msg) { |
IPC_MESSAGE_HANDLER(ViewHostMsg_WebDatabaseAccessed, OnWebDatabaseAccessed) |
IPC_MESSAGE_HANDLER(ViewHostMsg_FocusedNodeChanged, OnMsgFocusedNodeChanged) |
IPC_MESSAGE_HANDLER(ViewHostMsg_UpdateZoomLimits, OnUpdateZoomLimits) |
- IPC_MESSAGE_HANDLER(ViewHostMsg_DetectedPhishingSite, |
- OnDetectedPhishingSite) |
IPC_MESSAGE_HANDLER(ViewHostMsg_ScriptEvalResponse, OnScriptEvalResponse) |
#if defined(OS_MACOSX) |
IPC_MESSAGE_HANDLER(ViewHostMsg_ShowPopup, OnMsgShowPopup) |
@@ -1660,12 +1658,6 @@ void RenderViewHost::OnUpdateZoomLimits(int minimum_percent, |
delegate_->UpdateZoomLimits(minimum_percent, maximum_percent, remember); |
} |
-void RenderViewHost::OnDetectedPhishingSite(const GURL& phishing_url, |
- double phishing_score) { |
- // TODO(noelutz): send an HTTP request to the client-side detection frontends |
- // to confirm that the URL is really phishing. |
-} |
- |
void RenderViewHost::OnScriptEvalResponse(int id, const ListValue& result) { |
Value* result_value; |
result.Get(0, &result_value); |