| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // Client side phishing and malware detection request and response | 5 // Client side phishing and malware detection request and response |
| 6 // protocol buffers. Those protocol messages should be kept in sync | 6 // protocol buffers. Those protocol messages should be kept in sync |
| 7 // with the server implementation. | 7 // with the server implementation. |
| 8 // | 8 // |
| 9 // If you want to change this protocol definition or you have questions | 9 // If you want to change this protocol definition or you have questions |
| 10 // regarding its format please contact chrome-anti-phishing@googlegroups.com. | 10 // regarding its format please contact chrome-anti-phishing@googlegroups.com. |
| (...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 60 repeated Feature non_model_feature_map = 8; | 60 repeated Feature non_model_feature_map = 8; |
| 61 | 61 |
| 62 // The referrer URL. This field might not be set, for example, in the case | 62 // The referrer URL. This field might not be set, for example, in the case |
| 63 // where the referrer uses HTTPs. | 63 // where the referrer uses HTTPs. |
| 64 // OBSOLETE: Use feature 'Referrer=<referrer>' instead. | 64 // OBSOLETE: Use feature 'Referrer=<referrer>' instead. |
| 65 optional string OBSOLETE_referrer_url = 9; | 65 optional string OBSOLETE_referrer_url = 9; |
| 66 } | 66 } |
| 67 | 67 |
| 68 message ClientPhishingResponse { | 68 message ClientPhishingResponse { |
| 69 required bool phishy = 1; | 69 required bool phishy = 1; |
| 70 |
| 71 // A list of SafeBrowsing host-suffix / path-prefix expressions that |
| 72 // are whitelisted. The client must match the current top-level URL |
| 73 // against these whitelisted expressions and only apply a positive |
| 74 // phishing verdict above if the URL does not match any expression |
| 75 // on this whitelist. The client must not cache these whitelisted |
| 76 // expressions. This whitelist will be empty for the vast majority |
| 77 // of the responses but might contain up to 100 entries in emergency |
| 78 // situations. |
| 79 repeated string whitelist_expression = 2; |
| 70 } | 80 } |
| OLD | NEW |