HomeSort by relevance Sort by last modified time
    Searched full:malware (Results 26 - 50 of 178) sorted by null

12 3 4 5 6 7 8

  /external/chromium_org/chrome/browser/safe_browsing/
malware_details.h 8 // A class that encapsulates the detailed malware reports sent when
9 // users opt-in to do so from the malware warning page.
11 // An instance of this class is generated when a malware warning page
safe_browsing_util.h 139 // The URL hosts malware.
142 // The download URL is malware.
145 // The hash of the download contents is malware.
152 // The Chrome extension or app (given by its ID) is malware.
155 // Url detected by the client-side malware IP list. This IP list is part
302 // SafeBrowsing csd malware IP blacklist name.
310 MALWARE = 0,
protocol_parser_unittest.cc 337 "i:malware\nsd:21-27,42,171717\n");
369 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n";
377 std::string redirects("i:goog-malware-shavar\n"
378 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
379 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
380 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
396 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1");
398 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2");
400 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3");
455 "goog-malware-shavar:19:64\n
    [all...]
client_side_detection_host.cc 268 // Only enable the malware bad IP matching and report feature for canary
343 // Check that the hit is either malware or phishing.
408 // We do the malware IP matching and request sending if the feature
413 // Start browser-side malware feature extraction. Once we're done it will
414 // send the malware client verdict request.
431 // malware or phishing interstitial was shown but the user clicked
474 // consider the malware vedict.
504 // If there is true malware verdict, invalidate weakptr so that no longer
533 VLOG(2) << "Malware Feature extraction done for URL: " << request->url()
538 VLOG(1) << "Start sending client malware request."
    [all...]
chunk_range.h 7 // The anti-phishing and anti-malware protocol sends ASCII strings of numbers
report.proto 8 // sending detailed malware reports from the safe browsing interstitial page.
ping_manager.cc 83 // Sends malware details for users who opt-in.
143 "%s/clientreport/malware?client=%s&appver=%s&pver=1.0",
safe_browsing_service.h 6 // anti-malware tables and checking urls against them.
184 // Provides phishing and malware statistics. Accessed on IO thread.
ui_manager.h 6 // anti-malware tables and checking urls against them.
125 // Report hits to the unsafe contents (malware, phishing, unsafe download URL)
malware_details_unittest.cc 44 static const char* kMalwareURL = "http://www.malware.com/";
56 static const char* kLandingData = "<iframe src='http://www.malware.com'>";
322 // Tests creating a simple malware report.
354 // Tests creating a simple malware report where the subresource has a
395 // Tests creating a malware report with data from the renderer.
473 // Tests creating a malware report where there are redirect urls to an unsafe
643 // There are two redirect urls before reacing malware url:
client_side_detection_host_unittest.cc 329 resource.url = GURL("http://www.malware.com/");
672 // of a subresource was on the regular phishing or malware lists.
701 // matches regular malware list, and after navigation the renderer sends a
711 // Now navigate to a different host which will have a malware hit before the
713 GURL url("http://malware-but-not-phishing.com/");
797 // malware bad IP list
    [all...]
safe_browsing_util_unittest.cc 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
305 EXPECT_EQ(safe_browsing_util::MALWARE,
332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_database_unittest.cc 298 "www.evil.com/malware.html");
307 "www.foo.com/malware.html");
314 "www.whatever.com/malware.html");
325 // Insert a malware sub chunk.
397 // Insert malware, phish, binurl and bindownload add chunks.
399 "www.evil.com/malware.html");
407 "www.foo.com/malware.html");
463 "www.evil.com/malware.html");
483 "192.168.0.1/malware.html");
507 GURL("http://www.evil.com/malware.html")
    [all...]
protocol_parser_unittest.cc 337 "i:malware\nsd:21-27,42,171717\n");
372 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n";
381 std::string redirects("i:goog-malware-shavar\n"
382 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
383 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
384 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
403 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1");
405 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2");
407 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3");
500 "goog-malware-shavar:19:64\n
    [all...]
malware_details_unittest.cc 37 static const char* kMalwareURL = "http://www.malware.com/";
49 static const char* kLandingData = "<iframe src='http://www.malware.com'>";
286 // Tests creating a simple malware report.
317 // Tests creating a simple malware report where the subresource has a
357 // Tests creating a malware report with data from the renderer.
435 // Tests creating a malware report where there are redirect urls to an unsafe
chunk_range.h 7 // The anti-phishing and anti-malware protocol sends ASCII strings of numbers
report.proto 8 // sending detailed malware reports from the safe browsing interstitial page.
safe_browsing_database.h 49 // about phishing and malware urls. The download database contains
147 // Filename for malware and phishing URL database.
292 // For browsing related (phishing and malware URLs) chunks and prefixes.
safe_browsing_util_unittest.cc 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
305 EXPECT_EQ(safe_browsing_util::MALWARE,
332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
  /external/chromium_org/chrome/browser/profile_resetter/
profile_resetter.h 18 // It is used in case the profile has been damaged due to malware or bad user
  /external/chromium_org/chrome/browser/resources/safe_browsing/
malware_block_v2.html 18 <img id="malware-icon" class="float icon"
  /external/chromium_org/content/public/browser/
interstitial_page.h 25 // malware are typical cases where an interstitial is required.)
  /external/chromium_org/chrome/browser/extensions/
blacklist.cc 128 std::set<std::string> malware; local
132 malware.insert(it->first);
134 callback.Run(malware);
  /external/chromium_org/chrome/common/safe_browsing/
csd.proto 5 // Client side phishing and malware detection request and response
115 // List of resource urls that match the malware IP list.
122 // malware warning, if the blacklist verdict is true.
  /external/chromium/chrome/browser/history/
download_create_info.h 78 // If safebrowsing believes this URL leads to malware.

Completed in 1217 milliseconds

12 3 4 5 6 7 8