HomeSort by relevance Sort by last modified time
    Searched refs:MALWARE (Results 1 - 11 of 11) sorted by null

  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_util_unittest.cc 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
305 EXPECT_EQ(safe_browsing_util::MALWARE,
332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
safe_browsing_util.h 272 MALWARE = 0,
safe_browsing_util.cc 166 const char kMalwareList[] = "goog-malware-shavar";
175 id = MALWARE;
192 case MALWARE:
safe_browsing_database.cc 74 // case (phishing or malware found), consider combining this function
150 DCHECK(list_bit == safe_browsing_util::MALWARE ||
454 list_id == safe_browsing_util::MALWARE) {
    [all...]
  /external/chromium_org/chrome/browser/safe_browsing/
safe_browsing_util_unittest.cc 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
305 EXPECT_EQ(safe_browsing_util::MALWARE,
332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
safe_browsing_util.h 139 // The URL hosts malware.
142 // The download URL is malware.
145 // The hash of the download contents is malware.
152 // The Chrome extension or app (given by its ID) is malware.
301 MALWARE = 0,
safe_browsing_util.cc 158 const char kMalwareList[] = "goog-malware-shavar";
172 id = MALWARE;
195 case MALWARE:
database_manager.cc 91 case safe_browsing_util::MALWARE:
329 check.check_type = safe_browsing_util::MALWARE; // or PHISH
355 safe_browsing_util::MALWARE);
    [all...]
safe_browsing_database.cc 75 // malware IP blacklisting feature will be disabled in csd.
105 // case (phishing or malware found), consider combining this function
209 DCHECK(list_bit == safe_browsing_util::MALWARE ||
424 list_id == safe_browsing_util::MALWARE) {
    [all...]
safe_browsing_blocking_page_test.cc 6 // malware and phishing urls. It then uses a real browser to go to
48 const char kMalwarePage[] = "files/safe_browsing/malware.html";
104 safe_browsing_util::MALWARE);
120 // A SafeBrowingUIManager class that allows intercepting malware details.
382 // Adds a safebrowsing malware result to the fake safebrowsing service,
383 // navigates to a page with an iframe containing the malware site, and
483 GURL malware_url("http://localhost/files/safe_browsing/malware.html");
571 // going back from a main-frame malware interstitial page will not cause a
629 EXPECT_EQ(VISIBLE, GetVisibility("malware-icon"));
666 "/goodtoknow/online-safety/malware/",
    [all...]
  /external/chromium_org/chrome/browser/prerender/
prerender_browsertest.cc 513 safe_browsing_util::MALWARE);
    [all...]

Completed in 368 milliseconds