OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:MALWARE
(Results
1 - 11
of
11
) sorted by null
/external/chromium_org/chrome/browser/safe_browsing/
database_manager_unittest.cc
74
EXPECT_FALSE(RunSBHashTest(safe_browsing_util::
MALWARE
,
77
EXPECT_TRUE(RunSBHashTest(safe_browsing_util::
MALWARE
,
85
const GURL kMalwareUrl("http://www.
malware
.com/page.html");
89
const SBFullHash kMalwareHostHash = SBFullHashForString("
malware
.com/");
96
full_hash.list_id = static_cast<int>(safe_browsing_util::
MALWARE
);
safe_browsing_util_unittest.cc
284
EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::
MALWARE
,
287
EXPECT_EQ(safe_browsing_util::
MALWARE
,
307
EXPECT_EQ(0, safe_browsing_util::
MALWARE
% 2);
safe_browsing_util.h
121
// The URL hosts
malware
.
124
// The download URL is
malware
.
131
// The Chrome extension or app (given by its ID) is
malware
.
134
// Url detected by the client-side
malware
IP list. This IP list is part
156
// SafeBrowsing csd
malware
IP blacklist name.
164
MALWARE
= 0,
protocol_parser_unittest.cc
288
"i:
malware
\nsd:21-27,42,171717\n");
318
add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:
malware
\nsd:4,21-27171717\n";
326
std::string redirects("i:goog-
malware
-shavar\n"
327
"u:cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_1\n"
328
"u:cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_2\n"
329
"u:cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_3\n"
345
EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_1",
347
EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_2",
349
EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_3",
403
"goog-
malware
-shavar:32:2\n
[
all
...]
safe_browsing_util.cc
166
const char kMalwareList[] = "goog-
malware
-shavar";
189
id =
MALWARE
;
212
case
MALWARE
:
database_manager.cc
108
case safe_browsing_util::
MALWARE
:
163
case safe_browsing_util::
MALWARE
:
401
QueuedCheck queued_check(safe_browsing_util::
MALWARE
, // or PHISH
426
safe_browsing_util::
MALWARE
,
[
all
...]
safe_browsing_service_browsertest.cc
129
return ContainsUrl(safe_browsing_util::
MALWARE
,
505
const char kMalwarePage[] = "files/safe_browsing/
malware
.html";
508
IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest,
Malware
) {
516
GenUrlFullhashResult(url, safe_browsing_util::
MALWARE
, &malware_full_hash);
535
GenUrlFullhashResult(url, safe_browsing_util::
MALWARE
, &malware_full_hash);
592
// only
malware
was a prefetch target.
594
GenUrlFullhashResult(malware_url, safe_browsing_util::
MALWARE
,
601
// However, when we navigate to the
malware
page, we should still get
[
all
...]
safe_browsing_database.cc
57
// Filename suffix for the csd
malware
IP blacklist store.
80
//
malware
IP blacklisting feature will be disabled in csd.
113
// case (phishing or
malware
found), consider combining this function
425
list_id == safe_browsing_util::
MALWARE
) {
769
DVLOG(2) << "Lookup
Malware
IP: "
[
all
...]
safe_browsing_database_unittest.cc
285
chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/
malware
.html"));
286
chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/
malware
.html"));
287
chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/
malware
.html"));
299
// Insert a
malware
sub chunk.
367
// Insert
malware
, phish, binurl and bindownload add chunks.
368
chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/
malware
.html"));
372
chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/
malware
.html"));
434
"www.evil.com/
malware
.html"));
440
chunks.push_back(AddChunkPrefixValue(3, "192.168.0.1/
malware
.html"));
463
GURL("http://www.evil.com/
malware
.html"), &prefix_hits, &cache_hits))
[
all
...]
safe_browsing_blocking_page_test.cc
6
//
malware
and phishing urls. It then uses a real browser to go to
48
const char kMalwarePage[] = "files/safe_browsing/
malware
.html";
109
safe_browsing_util::
MALWARE
,
126
// A SafeBrowingUIManager class that allows intercepting
malware
details.
481
// Adds a safebrowsing
malware
result to the fake safebrowsing service,
482
// navigates to a page with an iframe containing the
malware
site, and
588
GURL malware_url("http://localhost/files/safe_browsing/
malware
.html");
679
// going back from a main-frame
malware
interstitial page will not cause a
743
EXPECT_EQ(VISIBLE, GetVisibility("
malware
-icon"));
809
EXPECT_EQ(HIDDEN, GetVisibility("
malware
-icon"))
[
all
...]
/external/chromium_org/chrome/browser/prerender/
prerender_browsertest.cc
693
safe_browsing_util::
MALWARE
,
[
all
...]
Completed in 906 milliseconds