/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_blocking_page_unittest.cc | 174 // Tests showing a blocking page for a malware page and not proceeding. 176 // Enable malware details. 206 // Tests showing a blocking page for a malware page and then proceeding. 208 // Enable malware reports. 235 // Tests showing a blocking page for a page that contains malware subresources 238 // Enable malware reports. 269 // Tests showing a blocking page for a page that contains malware subresources 272 // Enable malware reports. 299 // Tests showing a blocking page for a page that contains multiple malware 300 // subresources and not proceeding. This just tests that the extra malware [all...] |
safe_browsing_blocking_page.h | 8 // be malicious, either as malware or a phishing page, we show an interstitial 21 // A web page may contain several resources flagged as malware/phishing. This 52 // Shows a blocking page warning the user about phishing/malware for a 107 // SBInterstitial[Phishing|Malware|Multiple][Show|Proceed|DontProceed]. 110 // Checks if we should even show the malware details option. For example, we 115 // pending malware details object, we look at the user's 116 // preferences, and if the option to send malware details is
|
malware_details.h | 9 // A class that encapsulates the detailed malware reports sent when 10 // users opt-in to do so from the malware warning page. 12 // An instance of this class is generated when a malware warning page
|
safe_browsing_blocking_page.cc | 40 // For malware interstitial pages, we link the problematic URL to Google's 53 // URL for the "Learn more" link on the multi threat malware blocking page. 140 // Start computing malware details. They will be sent only 207 bool malware = false; local 225 malware = true; 226 current_error_strings->SetString("type", "malware"); 240 DCHECK(phishing || malware); 242 if (malware && phishing) { 245 // Use the malware headline, it is the scariest one. 252 } else if (malware) { [all...] |
/external/chromium/crypto/ |
hmac_unittest.cc | 28 "n:1896\ni:goog-malware-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav" 29 "ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_439-444\nu:s" 30 ".ytimg.com/safebrowsing/rd/goog-malware-shavar_s_437\nu:s.ytimg.com/safebrowsi" 31 "ng/rd/goog-malware-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-malware-sh" 32 "avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_431\nu:s.y" 33 "timg.com/safebrowsing/rd/goog-malware-shavar_s_430\nu:s.ytimg.com/safebrowsing" 34 "/rd/goog-malware-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav [all...] |
/external/chromium_org/crypto/ |
hmac_unittest.cc | 50 "n:1896\ni:goog-malware-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav" 51 "ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_439-444\nu:s" 52 ".ytimg.com/safebrowsing/rd/goog-malware-shavar_s_437\nu:s.ytimg.com/safebrowsi" 53 "ng/rd/goog-malware-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-malware-sh" 54 "avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_431\nu:s.y" 55 "timg.com/safebrowsing/rd/goog-malware-shavar_s_430\nu:s.ytimg.com/safebrowsing" 56 "/rd/goog-malware-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav [all...] |
/external/chromium_org/chrome/browser/safe_browsing/ |
ping_manager.h | 49 // malware reports. |report| is the serialized report. 71 // Generates URL for reporting malware details for users who opt-in. 84 // sends detaild malware reports for UMA users.
|
safe_browsing_blocking_page_unittest.cc | 239 // Tests showing a blocking page for a malware page and not proceeding. 241 // Enable malware details. 273 // Tests showing a blocking page for a malware page and then proceeding. 275 // Enable malware reports. 304 // Tests showing a blocking page for a page that contains malware subresources 307 // Enable malware reports. 339 // Tests showing a blocking page for a page that contains malware subresources 342 // Enable malware reports. 370 // Tests showing a blocking page for a page that contains multiple malware 371 // subresources and not proceeding. This just tests that the extra malware [all...] |
client_side_detection_host.h | 62 // Returns whether the current page contains a malware or phishing safe 90 // Callback that is called when the malware IP server ping back is 101 // Function to be called when the browser malware feature extractor is done. 158 // Max number of urls we report for each malware IP. 168 // Whether the malware IP matching feature killswitch is on. 172 // Whether the malware bad ip matching and report feature is enabled. 176 // Set to true if we got a match on malware or phishing for the current
|
database_manager_unittest.cc | 107 EXPECT_FALSE(RunSBHashTest(safe_browsing_util::MALWARE, 110 EXPECT_TRUE(RunSBHashTest(safe_browsing_util::MALWARE,
|
safe_browsing_blocking_page.h | 8 // be malicious, either as malware or a phishing page, we show an interstitial 21 // A web page may contain several resources flagged as malware/phishing. This 63 // Shows a blocking page warning the user about phishing/malware for a 99 // After a malware interstitial where the user opted-in to the 119 // SBInterstitial[Phishing|Malware|Multiple][Show|Proceed|DontProceed]. 133 // Checks if we should even show the malware details option. For example, we 138 // pending malware details object, we look at the user's 139 // preferences, and if the option to send malware details is
|
safe_browsing_blocking_page.cc | 57 // For malware interstitial pages, we link the problematic URL to Google's 70 // URL for the "Learn more" link on the multi threat malware blocking page. 75 "https://www.google.com/goodtoknow/online-safety/malware/"; 87 // After a malware interstitial where the user opted-in to the report 162 // Only use the V2 page if the interstitial is for a single malware or 206 bool malware = false; local 214 malware = true; 221 DCHECK(phishing || malware); 222 if (malware && phishing) 224 else if (malware) [all...] |
safe_browsing_database_unittest.cc | 311 "www.evil.com/malware.html"); 320 "www.foo.com/malware.html"); 327 "www.whatever.com/malware.html"); 338 // Insert a malware sub chunk. 418 // Insert malware, phish, binurl and bindownload add chunks. 420 "www.evil.com/malware.html"); 428 "www.foo.com/malware.html"); 516 "www.evil.com/malware.html"); 536 "192.168.0.1/malware.html"); 560 GURL("http://www.evil.com/malware.html") [all...] |
client_side_detection_service.h | 136 // Returns true if we have sent more than kMaxReportsPerInterval malware 241 // sending the client-side malware request. 252 // Get the number of malware reports that we have sent over kReportsInterval. 300 // Map of client malware ip request to the corresponding callback that 319 // Timestamp of when we sent a malware request. Used to limit the number 320 // of malware requests that we send in a day.
|
ui_manager.cc | 189 // A safebrowsing hit is sent after a blocking page for malware/phishing 254 DVLOG(1) << "Sending serialized malware details."; 281 // phishing/malware URL or a SafeBrowsing phishing/malware URL. 282 // If we show one type of phishing/malware warning we don't want to show 283 // a second phishing/malware warning.
|
safe_browsing_blocking_page_test.cc | 6 // malware and phishing urls. It then uses a real browser to go to 48 const char kMalwarePage[] = "files/safe_browsing/malware.html"; 107 safe_browsing_util::MALWARE, 124 // A SafeBrowingUIManager class that allows intercepting malware details. 388 // Adds a safebrowsing malware result to the fake safebrowsing service, 389 // navigates to a page with an iframe containing the malware site, and 489 GURL malware_url("http://localhost/files/safe_browsing/malware.html"); 577 // going back from a main-frame malware interstitial page will not cause a 635 EXPECT_EQ(VISIBLE, GetVisibility("malware-icon")); 672 "/goodtoknow/online-safety/malware/", [all...] |
safe_browsing_database.h | 54 // information about phishing and malware urls. The download database contains 73 // |enable_ip_blacklist| is used to control the csd malware IP blacklist 145 // Returns true iff the given IP is currently on the csd malware IP blacklist. 183 // Returns true if the malware IP blacklisting killswitch URL is present 195 // Filename for malware and phishing URL database. 219 // Filename for the csd malware IP blacklist database. 336 // This map holds a csd malware IP blacklist which maps a prefix mask 411 // For browsing related (phishing and malware URLs) chunks and prefixes.
|
/external/chromium/chrome/common/safe_browsing/ |
safebrowsing_messages.h | 39 // Send part of the DOM to the browser, to be used in a malware report. 52 // Request a DOM tree when a malware interstitial is shown.
|
csd.proto | 5 // Client side phishing and malware detection request and response
|
/external/chromium_org/chrome/common/safe_browsing/ |
safebrowsing_messages.h | 39 // Send part of the DOM to the browser, to be used in a malware report. 52 // Request a DOM tree when a malware interstitial is shown.
|
/frameworks/base/docs/html/guide/faq/ |
security.jd | 11 <li><a href="#malware">I think I found malicious software being distributed 88 <a name="malware" id="malware"></a><h2>I think I found malicious software being 93 href="http://en.wikipedia.org/wiki/Malware">malware</a>, for Android. If you 94 think somebody is trying to spread malware, please let us know at <a
|
/external/chromium/chrome/browser/download/ |
download_safe_browsing_client.h | 85 // Report malware hits to safebrowsing service. 100 // These URLs are used to report malware to safe browsing service.
|
/external/chromium/chrome/browser/resources/ |
safe_browsing_multiple_threat_block.html | 117 <div class="icon"><img src="shared/images/phishing_icon.png" alt="Malware Icon" onmousedown="return false;"/></div> 126 <td><a href="" onclick="var id= this.getAttribute('chromiumID'); this.getAttribute('chromiumIsMalware') ? showDiagnostic(id) : reportError(id); return false;" jscontent="errorLink" jsvalues="chromiumID:$counter.value;chromiumIsMalware:type=='malware'" jseval="$counter.value++"></a></td>
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
declare_permissions.html | 13 if your extension or app is compromised by malware.
|
/external/chromium_org/chrome/browser/resources/ |
safe_browsing_multiple_threat_block.html | 105 * malware site, depending on the threat type. 127 <img src="../../../ui/webui/resources/images/phishing_icon.png" alt="Malware Icon" 139 jsvalues="chromiumID:$counter.value;chromiumIsMalware:type=='malware'"
|