HomeSort by relevance Sort by last modified time
    Searched full:malware (Results 1 - 25 of 168) sorted by null

1 2 3 4 5 6 7

  /external/chromium_org/chrome/browser/download/
download_util_unittest.cc 17 ASCIIToUTF16("File 'malware.exe' is malicious."),
19 download_util::kCondition3Malicious, ASCIIToUTF16("malware.exe")));
  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_blocking_page_unittest.cc 174 // Tests showing a blocking page for a malware page and not proceeding.
176 // Enable malware details.
206 // Tests showing a blocking page for a malware page and then proceeding.
208 // Enable malware reports.
235 // Tests showing a blocking page for a page that contains malware subresources
238 // Enable malware reports.
269 // Tests showing a blocking page for a page that contains malware subresources
272 // Enable malware reports.
299 // Tests showing a blocking page for a page that contains multiple malware
300 // subresources and not proceeding. This just tests that the extra malware
    [all...]
safe_browsing_blocking_page.h 8 // be malicious, either as malware or a phishing page, we show an interstitial
21 // A web page may contain several resources flagged as malware/phishing. This
52 // Shows a blocking page warning the user about phishing/malware for a
107 // SBInterstitial[Phishing|Malware|Multiple][Show|Proceed|DontProceed].
110 // Checks if we should even show the malware details option. For example, we
115 // pending malware details object, we look at the user's
116 // preferences, and if the option to send malware details is
malware_details.h 9 // A class that encapsulates the detailed malware reports sent when
10 // users opt-in to do so from the malware warning page.
12 // An instance of this class is generated when a malware warning page
safe_browsing_blocking_page.cc 40 // For malware interstitial pages, we link the problematic URL to Google's
53 // URL for the "Learn more" link on the multi threat malware blocking page.
140 // Start computing malware details. They will be sent only
207 bool malware = false; local
225 malware = true;
226 current_error_strings->SetString("type", "malware");
240 DCHECK(phishing || malware);
242 if (malware && phishing) {
245 // Use the malware headline, it is the scariest one.
252 } else if (malware) {
    [all...]
safe_browsing_database_unittest.cc 298 "www.evil.com/malware.html");
307 "www.foo.com/malware.html");
314 "www.whatever.com/malware.html");
325 // Insert a malware sub chunk.
397 // Insert malware, phish, binurl and bindownload add chunks.
399 "www.evil.com/malware.html");
407 "www.foo.com/malware.html");
463 "www.evil.com/malware.html");
483 "192.168.0.1/malware.html");
507 GURL("http://www.evil.com/malware.html")
    [all...]
  /external/chromium/crypto/
hmac_unittest.cc 28 "n:1896\ni:goog-malware-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav"
29 "ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_439-444\nu:s"
30 ".ytimg.com/safebrowsing/rd/goog-malware-shavar_s_437\nu:s.ytimg.com/safebrowsi"
31 "ng/rd/goog-malware-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-malware-sh"
32 "avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_431\nu:s.y"
33 "timg.com/safebrowsing/rd/goog-malware-shavar_s_430\nu:s.ytimg.com/safebrowsing"
34 "/rd/goog-malware-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav
    [all...]
  /external/chromium_org/crypto/
hmac_unittest.cc 50 "n:1896\ni:goog-malware-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav"
51 "ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_439-444\nu:s"
52 ".ytimg.com/safebrowsing/rd/goog-malware-shavar_s_437\nu:s.ytimg.com/safebrowsi"
53 "ng/rd/goog-malware-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-malware-sh"
54 "avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_431\nu:s.y"
55 "timg.com/safebrowsing/rd/goog-malware-shavar_s_430\nu:s.ytimg.com/safebrowsing"
56 "/rd/goog-malware-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav
    [all...]
  /external/chromium_org/chrome/browser/safe_browsing/
ping_manager.h 49 // malware reports. |report| is the serialized report.
71 // Generates URL for reporting malware details for users who opt-in.
84 // sends detaild malware reports for UMA users.
safe_browsing_blocking_page.h 8 // be malicious, either as malware or a phishing page, we show an interstitial
21 // A web page may contain several resources flagged as malware/phishing. This
62 // Shows a blocking page warning the user about phishing/malware for a
98 // After a malware interstitial where the user opted-in to the
118 // SBInterstitial[Phishing|Malware|Multiple][Show|Proceed|DontProceed].
126 // Checks if we should even show the malware details option. For example, we
131 // pending malware details object, we look at the user's
132 // preferences, and if the option to send malware details is
safe_browsing_blocking_page_unittest.cc 237 // Tests showing a blocking page for a malware page and not proceeding.
239 // Enable malware details.
271 // Tests showing a blocking page for a malware page and then proceeding.
273 // Enable malware reports.
302 // Tests showing a blocking page for a page that contains malware subresources
305 // Enable malware reports.
337 // Tests showing a blocking page for a page that contains malware subresources
340 // Enable malware reports.
368 // Tests showing a blocking page for a page that contains multiple malware
369 // subresources and not proceeding. This just tests that the extra malware
    [all...]
client_side_detection_host.h 78 // Function to be called when the browser malware feature extractor is done.
134 // Max number of urls we report for each malware IP.
144 // Whether the malware IP matching feature killswitch is on.
148 // Whether the malware bad ip matching and report feature is enabled.
safe_browsing_blocking_page.cc 56 // For malware interstitial pages, we link the problematic URL to Google's
69 // URL for the "Learn more" link on the multi threat malware blocking page.
74 "https://www.google.com/goodtoknow/online-safety/malware/";
94 // After a malware interstitial where the user opted-in to the report
154 // Only use the V2 page if the interstitial is for a single malware or
193 bool malware = false; local
200 malware = true;
207 DCHECK(phishing || malware);
208 if (malware && phishing)
210 else if (malware)
    [all...]
safe_browsing_database_unittest.cc 278 "www.evil.com/malware.html");
287 "www.foo.com/malware.html");
294 "www.whatever.com/malware.html");
305 // Insert a malware sub chunk.
383 // Insert malware, phish, binurl and bindownload add chunks.
385 "www.evil.com/malware.html");
393 "www.foo.com/malware.html");
471 "www.evil.com/malware.html");
491 "192.168.0.1/malware.html");
515 GURL("http://www.evil.com/malware.html")
    [all...]
protocol_parser_unittest.cc 334 "i:malware\nsd:21-27,42,171717\n");
366 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n";
374 std::string redirects("i:goog-malware-shavar\n"
375 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
376 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
377 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
393 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1");
395 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2");
397 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3");
452 "goog-malware-shavar:19:64\n
    [all...]
safe_browsing_blocking_page_test.cc 6 // malware and phishing urls. It then uses a real browser to go to
48 const char kMalwarePage[] = "files/safe_browsing/malware.html";
104 safe_browsing_util::MALWARE);
120 // A SafeBrowingUIManager class that allows intercepting malware details.
382 // Adds a safebrowsing malware result to the fake safebrowsing service,
383 // navigates to a page with an iframe containing the malware site, and
483 GURL malware_url("http://localhost/files/safe_browsing/malware.html");
571 // going back from a main-frame malware interstitial page will not cause a
629 EXPECT_EQ(VISIBLE, GetVisibility("malware-icon"));
666 "/goodtoknow/online-safety/malware/",
    [all...]
browser_feature_extractor.h 96 // Extract the malware related features. The request object is owned by the
175 // Max number of malware IPs can be sent in one malware request
malware_details.h 8 // A class that encapsulates the detailed malware reports sent when
9 // users opt-in to do so from the malware warning page.
11 // An instance of this class is generated when a malware warning page
  /external/chromium/chrome/common/safe_browsing/
safebrowsing_messages.h 39 // Send part of the DOM to the browser, to be used in a malware report.
52 // Request a DOM tree when a malware interstitial is shown.
csd.proto 5 // Client side phishing and malware detection request and response
  /external/chromium_org/chrome/common/safe_browsing/
safebrowsing_messages.h 39 // Send part of the DOM to the browser, to be used in a malware report.
52 // Request a DOM tree when a malware interstitial is shown.
  /frameworks/base/docs/html/guide/faq/
security.jd 11 <li><a href="#malware">I think I found malicious software being distributed
88 <a name="malware" id="malware"></a><h2>I think I found malicious software being
93 href="http://en.wikipedia.org/wiki/Malware">malware</a>, for Android. If you
94 think somebody is trying to spread malware, please let us know at <a
  /external/chromium/chrome/browser/download/
download_safe_browsing_client.h 85 // Report malware hits to safebrowsing service.
100 // These URLs are used to report malware to safe browsing service.
  /external/chromium/chrome/browser/resources/
safe_browsing_multiple_threat_block.html 117 <div class="icon"><img src="shared/images/phishing_icon.png" alt="Malware Icon" onmousedown="return false;"/></div>
126 <td><a href="" onclick="var id= this.getAttribute('chromiumID'); this.getAttribute('chromiumIsMalware') ? showDiagnostic(id) : reportError(id); return false;" jscontent="errorLink" jsvalues="chromiumID:$counter.value;chromiumIsMalware:type=='malware'" jseval="$counter.value++"></a></td>
  /external/chromium_org/chrome/browser/resources/
safe_browsing_multiple_threat_block.html 104 * malware site, depending on the threat type.
126 <img src="../../../ui/webui/resources/images/phishing_icon.png" alt="Malware Icon"
138 jsvalues="chromiumID:$counter.value;chromiumIsMalware:type=='malware'"

Completed in 1098 milliseconds

1 2 3 4 5 6 7