OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:MALWARE
(Results
1 - 11
of
11
) sorted by null
/external/chromium/chrome/browser/safe_browsing/
safe_browsing_util_unittest.cc
302
EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::
MALWARE
,
305
EXPECT_EQ(safe_browsing_util::
MALWARE
,
332
EXPECT_EQ(0, safe_browsing_util::
MALWARE
% 2);
safe_browsing_util.h
272
MALWARE
= 0,
safe_browsing_util.cc
166
const char kMalwareList[] = "goog-
malware
-shavar";
175
id =
MALWARE
;
192
case
MALWARE
:
safe_browsing_database.cc
74
// case (phishing or
malware
found), consider combining this function
150
DCHECK(list_bit == safe_browsing_util::
MALWARE
||
454
list_id == safe_browsing_util::
MALWARE
) {
[
all
...]
/external/chromium_org/chrome/browser/safe_browsing/
safe_browsing_util_unittest.cc
302
EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::
MALWARE
,
305
EXPECT_EQ(safe_browsing_util::
MALWARE
,
332
EXPECT_EQ(0, safe_browsing_util::
MALWARE
% 2);
safe_browsing_util.h
139
// The URL hosts
malware
.
142
// The download URL is
malware
.
145
// The hash of the download contents is
malware
.
152
// The Chrome extension or app (given by its ID) is
malware
.
301
MALWARE
= 0,
safe_browsing_util.cc
158
const char kMalwareList[] = "goog-
malware
-shavar";
172
id =
MALWARE
;
195
case
MALWARE
:
database_manager.cc
91
case safe_browsing_util::
MALWARE
:
329
check.check_type = safe_browsing_util::
MALWARE
; // or PHISH
355
safe_browsing_util::
MALWARE
);
[
all
...]
safe_browsing_database.cc
75
//
malware
IP blacklisting feature will be disabled in csd.
105
// case (phishing or
malware
found), consider combining this function
209
DCHECK(list_bit == safe_browsing_util::
MALWARE
||
424
list_id == safe_browsing_util::
MALWARE
) {
[
all
...]
safe_browsing_blocking_page_test.cc
6
//
malware
and phishing urls. It then uses a real browser to go to
48
const char kMalwarePage[] = "files/safe_browsing/
malware
.html";
104
safe_browsing_util::
MALWARE
);
120
// A SafeBrowingUIManager class that allows intercepting
malware
details.
382
// Adds a safebrowsing
malware
result to the fake safebrowsing service,
383
// navigates to a page with an iframe containing the
malware
site, and
483
GURL malware_url("http://localhost/files/safe_browsing/
malware
.html");
571
// going back from a main-frame
malware
interstitial page will not cause a
629
EXPECT_EQ(VISIBLE, GetVisibility("
malware
-icon"));
666
"/goodtoknow/online-safety/
malware
/",
[
all
...]
/external/chromium_org/chrome/browser/prerender/
prerender_browsertest.cc
513
safe_browsing_util::
MALWARE
);
[
all
...]
Completed in 368 milliseconds