HomeSort by relevance Sort by last modified time
    Searched refs:MALWARE (Results 1 - 12 of 12) sorted by null

  /external/chromium_org/chrome/browser/safe_browsing/
database_manager_unittest.cc 107 EXPECT_FALSE(RunSBHashTest(safe_browsing_util::MALWARE,
110 EXPECT_TRUE(RunSBHashTest(safe_browsing_util::MALWARE,
safe_browsing_util_unittest.cc 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
305 EXPECT_EQ(safe_browsing_util::MALWARE,
332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
safe_browsing_util.h 139 // The URL hosts malware.
142 // The download URL is malware.
145 // The hash of the download contents is malware.
152 // The Chrome extension or app (given by its ID) is malware.
155 // Url detected by the client-side malware IP list. This IP list is part
302 // SafeBrowsing csd malware IP blacklist name.
310 MALWARE = 0,
safe_browsing_util.cc 169 const char kMalwareList[] = "goog-malware-shavar";
197 id = MALWARE;
222 case MALWARE:
database_manager.cc 101 case safe_browsing_util::MALWARE:
363 QueuedCheck queued_check(safe_browsing_util::MALWARE, // or PHISH
390 safe_browsing_util::MALWARE,
    [all...]
safe_browsing_database.cc 57 // Filename suffix for the csd malware IP blacklist store.
83 // malware IP blacklisting feature will be disabled in csd.
116 // case (phishing or malware found), consider combining this function
220 DCHECK(list_bit == safe_browsing_util::MALWARE ||
451 list_id == safe_browsing_util::MALWARE) {
842 DVLOG(2) << "Lookup Malware IP: "
    [all...]
safe_browsing_blocking_page_test.cc 6 // malware and phishing urls. It then uses a real browser to go to
48 const char kMalwarePage[] = "files/safe_browsing/malware.html";
107 safe_browsing_util::MALWARE,
124 // A SafeBrowingUIManager class that allows intercepting malware details.
388 // Adds a safebrowsing malware result to the fake safebrowsing service,
389 // navigates to a page with an iframe containing the malware site, and
489 GURL malware_url("http://localhost/files/safe_browsing/malware.html");
577 // going back from a main-frame malware interstitial page will not cause a
635 EXPECT_EQ(VISIBLE, GetVisibility("malware-icon"));
672 "/goodtoknow/online-safety/malware/",
    [all...]
  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_util_unittest.cc 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
305 EXPECT_EQ(safe_browsing_util::MALWARE,
332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
safe_browsing_util.h 272 MALWARE = 0,
safe_browsing_util.cc 166 const char kMalwareList[] = "goog-malware-shavar";
175 id = MALWARE;
192 case MALWARE:
safe_browsing_database.cc 74 // case (phishing or malware found), consider combining this function
150 DCHECK(list_bit == safe_browsing_util::MALWARE ||
454 list_id == safe_browsing_util::MALWARE) {
    [all...]
  /external/chromium_org/chrome/browser/prerender/
prerender_browsertest.cc 532 safe_browsing_util::MALWARE,
    [all...]

Completed in 996 milliseconds