OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:MALWARE
(Results
1 - 12
of
12
) sorted by null
/external/chromium_org/chrome/browser/safe_browsing/
database_manager_unittest.cc
107
EXPECT_FALSE(RunSBHashTest(safe_browsing_util::
MALWARE
,
110
EXPECT_TRUE(RunSBHashTest(safe_browsing_util::
MALWARE
,
safe_browsing_util_unittest.cc
302
EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::
MALWARE
,
305
EXPECT_EQ(safe_browsing_util::
MALWARE
,
332
EXPECT_EQ(0, safe_browsing_util::
MALWARE
% 2);
safe_browsing_util.h
139
// The URL hosts
malware
.
142
// The download URL is
malware
.
145
// The hash of the download contents is
malware
.
152
// The Chrome extension or app (given by its ID) is
malware
.
155
// Url detected by the client-side
malware
IP list. This IP list is part
302
// SafeBrowsing csd
malware
IP blacklist name.
310
MALWARE
= 0,
safe_browsing_util.cc
169
const char kMalwareList[] = "goog-
malware
-shavar";
197
id =
MALWARE
;
222
case
MALWARE
:
database_manager.cc
101
case safe_browsing_util::
MALWARE
:
363
QueuedCheck queued_check(safe_browsing_util::
MALWARE
, // or PHISH
390
safe_browsing_util::
MALWARE
,
[
all
...]
safe_browsing_database.cc
57
// Filename suffix for the csd
malware
IP blacklist store.
83
//
malware
IP blacklisting feature will be disabled in csd.
116
// case (phishing or
malware
found), consider combining this function
220
DCHECK(list_bit == safe_browsing_util::
MALWARE
||
451
list_id == safe_browsing_util::
MALWARE
) {
842
DVLOG(2) << "Lookup
Malware
IP: "
[
all
...]
safe_browsing_blocking_page_test.cc
6
//
malware
and phishing urls. It then uses a real browser to go to
48
const char kMalwarePage[] = "files/safe_browsing/
malware
.html";
107
safe_browsing_util::
MALWARE
,
124
// A SafeBrowingUIManager class that allows intercepting
malware
details.
388
// Adds a safebrowsing
malware
result to the fake safebrowsing service,
389
// navigates to a page with an iframe containing the
malware
site, and
489
GURL malware_url("http://localhost/files/safe_browsing/
malware
.html");
577
// going back from a main-frame
malware
interstitial page will not cause a
635
EXPECT_EQ(VISIBLE, GetVisibility("
malware
-icon"));
672
"/goodtoknow/online-safety/
malware
/",
[
all
...]
/external/chromium/chrome/browser/safe_browsing/
safe_browsing_util_unittest.cc
302
EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::
MALWARE
,
305
EXPECT_EQ(safe_browsing_util::
MALWARE
,
332
EXPECT_EQ(0, safe_browsing_util::
MALWARE
% 2);
safe_browsing_util.h
272
MALWARE
= 0,
safe_browsing_util.cc
166
const char kMalwareList[] = "goog-
malware
-shavar";
175
id =
MALWARE
;
192
case
MALWARE
:
safe_browsing_database.cc
74
// case (phishing or
malware
found), consider combining this function
150
DCHECK(list_bit == safe_browsing_util::
MALWARE
||
454
list_id == safe_browsing_util::
MALWARE
) {
[
all
...]
/external/chromium_org/chrome/browser/prerender/
prerender_browsertest.cc
532
safe_browsing_util::
MALWARE
,
[
all
...]
Completed in 996 milliseconds