/external/chromium/chrome/browser/download/ |
download_safe_browsing_client.cc | 83 OnDownloadUrlCheckResult(url_chain, SafeBrowsingService::SAFE); 107 OnDownloadHashCheckResult(hash, SafeBrowsingService::SAFE); 127 bool is_dangerous = result != SafeBrowsingService::SAFE; 146 bool is_dangerous = result != SafeBrowsingService::SAFE;
|
download_item.cc | 63 case DownloadItem::SAFE: 64 return "SAFE"; 96 DownloadItem::DANGEROUS : DownloadItem::SAFE; 134 safety_state_(SAFE), 215 safety_state_(SAFE), 486 // data, so it's safe to move to the COMPLETE state. 505 id(), GetTargetFilePath(), safety_state() == SAFE)); 611 if (safety_state_ == DownloadItem::SAFE)
|
download_item.h | 60 SAFE = 0, 288 // This returns the same path as GetTargetFilePath() for safe downloads 372 // Whether the download is considered potentially safe or dangerous 376 // Why |safety_state_| is not SAFE.
|
download_manager_unittest.cc | 104 safety_state != DownloadItem::SAFE : safety_state == DownloadItem::SAFE; 172 // Safe download, download finishes BEFORE file name determined. 177 // Dangerous download (file is dangerous or download URL is not safe or both), 186 // Safe download, download finishes AFTER file name determined.
|
download_manager.cc | 234 // safe to avoid setting |file_manager_| because we only call a small set of 499 // The download is not safe. We can now rename the file to its 505 // The download is a safe download. We need to 636 // in in_progress_, have all data, have a history handle, (validated or safe). 676 if (item->safety_state() == DownloadItem::SAFE) { 677 DCHECK_EQ(0, uniquifier) << "We should not uniquify SAFE downloads twice"; [all...] |
/external/nist-sip/java/gov/nist/core/ |
LexerCore.java | 45 public static final int SAFE = END - 2; 217 } else if (tok == SAFE) { 223 this.currentMatch.tokenType = SAFE;
|
/external/chromium/chrome/browser/renderer_host/ |
safe_browsing_resource_handler.cc | 17 // Maximum time in milliseconds to wait for the safe browsing service to 19 // aborted, and the URL will be treated as if it were safe. 34 safe_browsing_result_(SafeBrowsingService::SAFE), 94 OnBrowseUrlCheckResult(deferred_url_, SafeBrowsingService::SAFE); 154 if (result == SafeBrowsingService::SAFE) { 155 // Log how much time the safe browsing check cost us. 166 // Don't prefetch resources that fail safe browsing, disallow 208 safe_browsing_result_ = SafeBrowsingService::SAFE; 238 safe_browsing_result_ = SafeBrowsingService::SAFE; 260 // Resume whatever stage got paused by the safe browsing check [all...] |
/external/chromium_org/chrome/browser/safe_browsing/ |
download_protection_service_unittest.cc | 342 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); 357 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); 388 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); 398 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); 437 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); 442 response.set_verdict(ClientDownloadResponse::SAFE); 444 // Empty response means SAFE. 479 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); 481 // Invalid response should be safe too. 493 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); [all...] |
download_protection_service.h | 44 SAFE, 93 // callbacks called with "SAFE" results.
|
download_protection_service.cc | 176 DownloadProtectionService::SAFE; 314 PostFinishTask(SAFE, reason); 319 PostFinishTask(SAFE, reason); 359 // Canceling a request will cause us to always report the result as SAFE 373 FinishRequest(SAFE, REASON_REQUEST_CANCELED); 401 DownloadCheckResult result = SAFE; 410 } else if (response.verdict() == ClientDownloadResponse::SAFE) { 416 // SAFE even if the server says it's dangerous to download this file. 418 // returned SAFE. 561 PostFinishTask(SAFE, REASON_ARCHIVE_WITHOUT_BINARIES) [all...] |
download_feedback_service_unittest.cc | 180 EXPECT_FALSE(WillStorePings(DownloadProtectionService::SAFE, ok_size)); 186 EXPECT_FALSE(WillStorePings(DownloadProtectionService::SAFE, bad_size));
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_service.cc | 40 // and reports safe browsing hits. 114 threat_type(SAFE), 126 result(SAFE), 193 // safe browsing is enabled. 253 // enabled the csd whitelist yet. Just to be safe we return true in this 297 check->result = SAFE; 325 // In this case it's safe to delete matches entirely since nothing has a 547 // On Windows, get the safe browsing client name from the browser 598 // Delete queued checks, calling back any clients with 'SAFE'. 606 sb_check.result = SAFE; [all...] |
safe_browsing_service_browsertest.cc | 46 // Called on the IO thread to check if the given URL is safe or not. If we 47 // can synchronously determine that the URL is safe, CheckUrl returns true, 253 // Tests the safe browsing blocking page in a browser. 438 TestSBClient() : result_(SafeBrowsingService::SAFE), 512 // Since badbin_url is not in database, it is considered to be safe. 513 EXPECT_EQ(SafeBrowsingService::SAFE, client->GetResult()); 523 // Now, the badbin_url is not safe since it is added to download database. 539 // Since badbin_url is not in database, it is considered to be safe. 540 EXPECT_EQ(SafeBrowsingService::SAFE, client->GetResult()); 550 // Now, the badbin_url is not safe since it is added to download database [all...] |
safe_browsing_service.h | 5 // The Safe Browsing service is responsible for downloading anti-phishing and 49 SAFE, 132 // Create an instance of the safe browsing service. 144 // Called on UI thread to decide if safe browsing related stats 152 // Called on the IO thread to check if the given url is safe or not. If we 153 // can synchronously determine that the url is safe, CheckUrl returns true. 178 // |url| is the url of the resource that matches a safe browsing list. 243 // the current page is 'safe'. 261 // Creates the safe browsing service. Need to initialize before using. 383 // be notified that the safebrowsing check is SAFE when this happens [all...] |
safe_browsing_blocking_page_test.cc | 34 // Called on the IO thread to check if the given url is safe or not. If we 35 // can synchronously determine that the url is safe, CheckUrl returns true. 40 if (badurls[gurl.spec()] == SAFE) 217 // Tests the safe browsing blocking page in a browser. 366 // Trigger the safe browsing interstitial page via a redirect in "openWin()".
|
safe_browsing_test.cc | 6 // http://code.google.com/p/google-safe-browsing/ to test the safebrowsing 9 // http://code.google.com/p/google-safe-browsing/wiki/ProtocolTesting 247 void set_is_checked_url_safe(bool safe) { 249 is_checked_url_safe_ = safe; 333 // True if last verified URL is not a phishing URL and thus it is safe. 358 result == SafeBrowsingService::SAFE);
|
/external/chromium_org/chrome/browser/download/ |
chrome_download_manager_delegate.cc | 71 const char kSafeBrowsingUserDataKey[] = "Safe Browsing ID"; 77 : verdict_(DownloadProtectionService::SAFE) { 157 if (result == DownloadProtectionService::SAFE) { 316 state->SetVerdict(DownloadProtectionService::SAFE); 328 // Begin the safe browsing download protection check. 654 case DownloadProtectionService::SAFE:
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-apache-oro.jar | |
/external/chromium/chrome/browser/automation/ |
automation_provider.cc | 243 safety_state_to_string[DownloadItem::SAFE] = std::string("SAFE"); 826 // with the uninstall. Just to be safe, check that it was received. [all...] |