HomeSort by relevance Sort by last modified time
    Searched refs:MALWARE (Results 1 - 11 of 11) sorted by null

  /external/chromium_org/chrome/browser/safe_browsing/
database_manager_unittest.cc 74 EXPECT_FALSE(RunSBHashTest(safe_browsing_util::MALWARE,
77 EXPECT_TRUE(RunSBHashTest(safe_browsing_util::MALWARE,
85 const GURL kMalwareUrl("http://www.malware.com/page.html");
89 const SBFullHash kMalwareHostHash = SBFullHashForString("malware.com/");
96 full_hash.list_id = static_cast<int>(safe_browsing_util::MALWARE);
safe_browsing_util_unittest.cc 284 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
287 EXPECT_EQ(safe_browsing_util::MALWARE,
307 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
safe_browsing_util.h 121 // The URL hosts malware.
124 // The download URL is malware.
131 // The Chrome extension or app (given by its ID) is malware.
134 // Url detected by the client-side malware IP list. This IP list is part
156 // SafeBrowsing csd malware IP blacklist name.
164 MALWARE = 0,
protocol_parser_unittest.cc 288 "i:malware\nsd:21-27,42,171717\n");
318 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n";
326 std::string redirects("i:goog-malware-shavar\n"
327 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
328 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
329 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
345 EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1",
347 EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2",
349 EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3",
403 "goog-malware-shavar:32:2\n
    [all...]
safe_browsing_util.cc 166 const char kMalwareList[] = "goog-malware-shavar";
189 id = MALWARE;
212 case MALWARE:
database_manager.cc 108 case safe_browsing_util::MALWARE:
163 case safe_browsing_util::MALWARE:
401 QueuedCheck queued_check(safe_browsing_util::MALWARE, // or PHISH
426 safe_browsing_util::MALWARE,
    [all...]
safe_browsing_service_browsertest.cc 129 return ContainsUrl(safe_browsing_util::MALWARE,
505 const char kMalwarePage[] = "files/safe_browsing/malware.html";
508 IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, Malware) {
516 GenUrlFullhashResult(url, safe_browsing_util::MALWARE, &malware_full_hash);
535 GenUrlFullhashResult(url, safe_browsing_util::MALWARE, &malware_full_hash);
592 // only malware was a prefetch target.
594 GenUrlFullhashResult(malware_url, safe_browsing_util::MALWARE,
601 // However, when we navigate to the malware page, we should still get
    [all...]
safe_browsing_database.cc 57 // Filename suffix for the csd malware IP blacklist store.
80 // malware IP blacklisting feature will be disabled in csd.
113 // case (phishing or malware found), consider combining this function
425 list_id == safe_browsing_util::MALWARE) {
769 DVLOG(2) << "Lookup Malware IP: "
    [all...]
safe_browsing_database_unittest.cc 285 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html"));
286 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html"));
287 chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/malware.html"));
299 // Insert a malware sub chunk.
367 // Insert malware, phish, binurl and bindownload add chunks.
368 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html"));
372 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html"));
434 "www.evil.com/malware.html"));
440 chunks.push_back(AddChunkPrefixValue(3, "192.168.0.1/malware.html"));
463 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits))
    [all...]
safe_browsing_blocking_page_test.cc 6 // malware and phishing urls. It then uses a real browser to go to
48 const char kMalwarePage[] = "files/safe_browsing/malware.html";
109 safe_browsing_util::MALWARE,
126 // A SafeBrowingUIManager class that allows intercepting malware details.
481 // Adds a safebrowsing malware result to the fake safebrowsing service,
482 // navigates to a page with an iframe containing the malware site, and
588 GURL malware_url("http://localhost/files/safe_browsing/malware.html");
679 // going back from a main-frame malware interstitial page will not cause a
743 EXPECT_EQ(VISIBLE, GetVisibility("malware-icon"));
809 EXPECT_EQ(HIDDEN, GetVisibility("malware-icon"))
    [all...]
  /external/chromium_org/chrome/browser/prerender/
prerender_browsertest.cc 693 safe_browsing_util::MALWARE,
    [all...]

Completed in 906 milliseconds