Chromium Code Reviews| Index: components/safe_browsing/csd.proto |
| diff --git a/components/safe_browsing/csd.proto b/components/safe_browsing/csd.proto |
| index 7bb5920bd7caebe6c083550bfb8806447f7b7e24..8d8b4158c78d31391c3f338eb1f3093e15e529a5 100644 |
| --- a/components/safe_browsing/csd.proto |
| +++ b/components/safe_browsing/csd.proto |
| @@ -262,6 +262,10 @@ message LoginReputationClientResponse { |
| // Deprecated. |
| optional bool DEPRECATED_cache_expression_exact_match = 4 [deprecated = true]; |
| + |
| + // A token unique to each request which correlates response and post-warning |
| + // actions. |
| + optional bytes verdict_token = 5; |
| } |
| message ClientMalwareResponse { |
| @@ -904,6 +908,7 @@ message ClientSafeBrowsingReportRequest { |
| DANGEROUS_DOWNLOAD_RECOVERY = 6; |
| DANGEROUS_DOWNLOAD_WARNING = 7; |
| DANGEROUS_DOWNLOAD_BY_API = 10; |
| + PASSWORD_PROTECTION_PHISHING_URL = 12; |
|
vakh (use Gerrit instead)
2017/06/01 18:30:09
URL_PHISHING_PASSWORD_PROTECTION (to keep it consi
Jialiu Lin
2017/06/01 18:53:33
Acknowledged
Good point! It seems we have some inc
|
| } |
| message HTTPHeader { |
| @@ -984,9 +989,10 @@ message ClientSafeBrowsingReportRequest { |
| // Whether user visited this origin before. |
| optional bool repeat_visit = 9; |
| - // The same token in ClientDownloadResponse. This field is only set if its |
| - // report type is DANGEROUS_DOWNLOAD_RECOVERY, DANGEROUS_DOWNLOAD_WARNING or |
| - // DANGEROUS_DOWNLOAD_BY_API. |
| + // The same token in ClientDownloadResponse or LoginReputationClientResponse. |
| + // This field is only set if its report type is DANGEROUS_DOWNLOAD_RECOVERY, |
| + // DANGEROUS_DOWNLOAD_WARNING, DANGEROUS_DOWNLOAD_BY_API or |
| + // PASSWORD_PROTECTION_PHISHING_URL. |
| optional bytes token = 15; |
| } |