| Index: chrome/browser/renderer_host/render_view_host.cc
|
| diff --git a/chrome/browser/renderer_host/render_view_host.cc b/chrome/browser/renderer_host/render_view_host.cc
|
| index 76117476232260a597d643b0de685a9e7ccec54d..f868d4e9e302f90d1015e3dce5b931b5d815b845 100644
|
| --- a/chrome/browser/renderer_host/render_view_host.cc
|
| +++ b/chrome/browser/renderer_host/render_view_host.cc
|
| @@ -807,8 +807,6 @@ bool RenderViewHost::OnMessageReceived(const IPC::Message& msg) {
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_WebDatabaseAccessed, OnWebDatabaseAccessed)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_FocusedNodeChanged, OnMsgFocusedNodeChanged)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_UpdateZoomLimits, OnUpdateZoomLimits)
|
| - IPC_MESSAGE_HANDLER(ViewHostMsg_DetectedPhishingSite,
|
| - OnDetectedPhishingSite)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_ScriptEvalResponse, OnScriptEvalResponse)
|
| #if defined(OS_MACOSX)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_ShowPopup, OnMsgShowPopup)
|
| @@ -1664,12 +1662,6 @@ void RenderViewHost::OnUpdateZoomLimits(int minimum_percent,
|
| delegate_->UpdateZoomLimits(minimum_percent, maximum_percent, remember);
|
| }
|
|
|
| -void RenderViewHost::OnDetectedPhishingSite(const GURL& phishing_url,
|
| - double phishing_score) {
|
| - // TODO(noelutz): send an HTTP request to the client-side detection frontends
|
| - // to confirm that the URL is really phishing.
|
| -}
|
| -
|
| void RenderViewHost::OnScriptEvalResponse(int id, const ListValue& result) {
|
| Value* result_value;
|
| result.Get(0, &result_value);
|
|
|