/external/chromium_org/chrome/browser/safe_browsing/ |
malware_details.h | 8 // A class that encapsulates the detailed malware reports sent when 9 // users opt-in to do so from the malware warning page. 11 // An instance of this class is generated when a malware warning page
|
safe_browsing_util.h | 139 // The URL hosts malware. 142 // The download URL is malware. 145 // The hash of the download contents is malware. 152 // The Chrome extension or app (given by its ID) is malware. 155 // Url detected by the client-side malware IP list. This IP list is part 302 // SafeBrowsing csd malware IP blacklist name. 310 MALWARE = 0,
|
protocol_parser_unittest.cc | 337 "i:malware\nsd:21-27,42,171717\n"); 369 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n"; 377 std::string redirects("i:goog-malware-shavar\n" 378 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n" 379 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n" 380 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n" 396 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1"); 398 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2"); 400 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3"); 455 "goog-malware-shavar:19:64\n [all...] |
client_side_detection_host.cc | 268 // Only enable the malware bad IP matching and report feature for canary 343 // Check that the hit is either malware or phishing. 408 // We do the malware IP matching and request sending if the feature 413 // Start browser-side malware feature extraction. Once we're done it will 414 // send the malware client verdict request. 431 // malware or phishing interstitial was shown but the user clicked 474 // consider the malware vedict. 504 // If there is true malware verdict, invalidate weakptr so that no longer 533 VLOG(2) << "Malware Feature extraction done for URL: " << request->url() 538 VLOG(1) << "Start sending client malware request." [all...] |
chunk_range.h | 7 // The anti-phishing and anti-malware protocol sends ASCII strings of numbers
|
report.proto | 8 // sending detailed malware reports from the safe browsing interstitial page.
|
ping_manager.cc | 83 // Sends malware details for users who opt-in. 143 "%s/clientreport/malware?client=%s&appver=%s&pver=1.0",
|
safe_browsing_service.h | 6 // anti-malware tables and checking urls against them. 184 // Provides phishing and malware statistics. Accessed on IO thread.
|
ui_manager.h | 6 // anti-malware tables and checking urls against them. 125 // Report hits to the unsafe contents (malware, phishing, unsafe download URL)
|
malware_details_unittest.cc | 44 static const char* kMalwareURL = "http://www.malware.com/"; 56 static const char* kLandingData = "<iframe src='http://www.malware.com'>"; 322 // Tests creating a simple malware report. 354 // Tests creating a simple malware report where the subresource has a 395 // Tests creating a malware report with data from the renderer. 473 // Tests creating a malware report where there are redirect urls to an unsafe 643 // There are two redirect urls before reacing malware url:
|
client_side_detection_host_unittest.cc | 329 resource.url = GURL("http://www.malware.com/"); 672 // of a subresource was on the regular phishing or malware lists. 701 // matches regular malware list, and after navigation the renderer sends a 711 // Now navigate to a different host which will have a malware hit before the 713 GURL url("http://malware-but-not-phishing.com/"); 797 // malware bad IP list [all...] |
safe_browsing_util_unittest.cc | 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE, 305 EXPECT_EQ(safe_browsing_util::MALWARE, 332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_database_unittest.cc | 298 "www.evil.com/malware.html"); 307 "www.foo.com/malware.html"); 314 "www.whatever.com/malware.html"); 325 // Insert a malware sub chunk. 397 // Insert malware, phish, binurl and bindownload add chunks. 399 "www.evil.com/malware.html"); 407 "www.foo.com/malware.html"); 463 "www.evil.com/malware.html"); 483 "192.168.0.1/malware.html"); 507 GURL("http://www.evil.com/malware.html") [all...] |
protocol_parser_unittest.cc | 337 "i:malware\nsd:21-27,42,171717\n"); 372 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n"; 381 std::string redirects("i:goog-malware-shavar\n" 382 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n" 383 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n" 384 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n" 403 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1"); 405 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2"); 407 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3"); 500 "goog-malware-shavar:19:64\n [all...] |
malware_details_unittest.cc | 37 static const char* kMalwareURL = "http://www.malware.com/"; 49 static const char* kLandingData = "<iframe src='http://www.malware.com'>"; 286 // Tests creating a simple malware report. 317 // Tests creating a simple malware report where the subresource has a 357 // Tests creating a malware report with data from the renderer. 435 // Tests creating a malware report where there are redirect urls to an unsafe
|
chunk_range.h | 7 // The anti-phishing and anti-malware protocol sends ASCII strings of numbers
|
report.proto | 8 // sending detailed malware reports from the safe browsing interstitial page.
|
safe_browsing_database.h | 49 // about phishing and malware urls. The download database contains 147 // Filename for malware and phishing URL database. 292 // For browsing related (phishing and malware URLs) chunks and prefixes.
|
safe_browsing_util_unittest.cc | 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE, 305 EXPECT_EQ(safe_browsing_util::MALWARE, 332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
|
/external/chromium_org/chrome/browser/profile_resetter/ |
profile_resetter.h | 18 // It is used in case the profile has been damaged due to malware or bad user
|
/external/chromium_org/chrome/browser/resources/safe_browsing/ |
malware_block_v2.html | 18 <img id="malware-icon" class="float icon"
|
/external/chromium_org/content/public/browser/ |
interstitial_page.h | 25 // malware are typical cases where an interstitial is required.)
|
/external/chromium_org/chrome/browser/extensions/ |
blacklist.cc | 128 std::set<std::string> malware; local 132 malware.insert(it->first); 134 callback.Run(malware);
|
/external/chromium_org/chrome/common/safe_browsing/ |
csd.proto | 5 // Client side phishing and malware detection request and response 115 // List of resource urls that match the malware IP list. 122 // malware warning, if the blacklist verdict is true.
|
/external/chromium/chrome/browser/history/ |
download_create_info.h | 78 // If safebrowsing believes this URL leads to malware.
|