OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:malware
(Results
1 - 25
of
152
) sorted by null
1
2
3
4
5
6
7
/external/chromium_org/crypto/
hmac_unittest.cc
50
"n:1896\ni:goog-
malware
-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-
malware
-shav"
51
"ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-
malware
-shavar_s_439-444\nu:s"
52
".ytimg.com/safebrowsing/rd/goog-
malware
-shavar_s_437\nu:s.ytimg.com/safebrowsi"
53
"ng/rd/goog-
malware
-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-
malware
-sh"
54
"avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-
malware
-shavar_s_431\nu:s.y"
55
"timg.com/safebrowsing/rd/goog-
malware
-shavar_s_430\nu:s.ytimg.com/safebrowsing"
56
"/rd/goog-
malware
-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-
malware
-shav
[
all
...]
/external/chromium_org/chrome/browser/safe_browsing/
metadata.proto
15
// Metadata for the goog-
malware
-shavar list.
database_manager_unittest.cc
74
EXPECT_FALSE(RunSBHashTest(safe_browsing_util::
MALWARE
,
77
EXPECT_TRUE(RunSBHashTest(safe_browsing_util::
MALWARE
,
85
const GURL kMalwareUrl("http://www.
malware
.com/page.html");
89
const SBFullHash kMalwareHostHash = SBFullHashForString("
malware
.com/");
96
full_hash.list_id = static_cast<int>(safe_browsing_util::
MALWARE
);
ping_manager.h
49
//
malware
reports. |report| is the serialized report.
71
// Generates URL for reporting
malware
details for users who opt-in.
84
// sends detaild
malware
reports for UMA users.
safe_browsing_blocking_page_unittest.cc
213
// Tests showing a blocking page for a
malware
page and not proceeding.
215
// Enable
malware
details.
249
// Tests showing a blocking page for a
malware
page and then proceeding.
251
// Enable
malware
reports.
282
// Tests showing a blocking page for a page that contains
malware
subresources
285
// Enable
malware
reports.
319
// Tests showing a blocking page for a page that contains
malware
subresources
322
// Enable
malware
reports.
352
// Tests showing a blocking page for a page that contains multiple
malware
353
// subresources and not proceeding. This just tests that the extra
malware
[
all
...]
client_side_detection_host.h
62
// Returns whether the current page contains a
malware
or phishing safe
83
// the phishing and
malware
clasifiers.
95
// Callback that is called when the
malware
IP server ping back is
107
// Start
malware
classification once the onload handler was called and
108
//
malware
pre-classification checks are done and passed.
111
// Function to be called when the browser
malware
feature extractor is done.
168
// Max number of urls we report for each
malware
IP.
safe_browsing_blocking_page.h
8
// be malicious, either as
malware
or a phishing page, we show an interstitial
21
// A web page may contain several resources flagged as
malware
/phishing. This
77
// Shows a blocking page warning the user about phishing/
malware
for a
114
// After a
malware
interstitial where the user opted-in to the
153
// Checks if we should even show the
malware
details option. For example, we
158
// pending
malware
details object, we look at the user's
159
// preferences, and if the option to send
malware
details is
safe_browsing_util.h
133
// The URL hosts
malware
.
139
// The download URL is
malware
.
146
// The Chrome extension or app (given by its ID) is
malware
.
149
// Url detected by the client-side
malware
IP list. This IP list is part
171
// SafeBrowsing csd
malware
IP blacklist name.
179
MALWARE
= 0,
ui_manager.cc
103
//
Malware
sites tagged as "landing site" should only show a warning for a
104
// main-frame or sub-frame resource. (See "Types of
Malware
sites" under
181
// A safebrowsing hit is sent after a blocking page for
malware
/phishing
246
DVLOG(1) << "Sending serialized
malware
details.";
273
// phishing/
malware
URL or a SafeBrowsing phishing/
malware
URL.
274
// If we show one type of phishing/
malware
warning we don't want to show
275
// a second phishing/
malware
warning.
safe_browsing_blocking_page.cc
66
// For
malware
interstitial pages, we link the problematic URL to Google's
76
// URL for
malware
and phishing, V2.
86
// After a
malware
interstitial where the user opted-in to the report
164
bool
malware
= false;
local
173
malware
= true;
182
DCHECK(phishing ||
malware
|| harmful);
183
if (
malware
)
213
// Start computing
malware
details. They will be sent only
414
// Send the
malware
details, if we opted to.
460
// Send the
malware
details, if we opted to
[
all
...]
client_side_detection_host.cc
56
// asynchronously checks whether the
malware
and phishing classifiers should run
122
VLOG(1) << "Skipping phishing and
malware
classification for URL: "
203
// Track the first reason why we stopped classifying for
malware
.
206
DVLOG(2) << "Failed
malware
pre-classification checks. Reason: "
403
// Check whether we can cassify the current URL for phishing or
malware
.
419
// Check that the hit is either
malware
or phishing.
507
// If classification checks failed we should stop extracting
malware
features.
508
DVLOG(2) << "
Malware
pre-classification checks done. Should classify: "
531
// Start browser-side
malware
feature extraction. Once we're done it will
532
// send the
malware
client verdict request
[
all
...]
protocol_parser_unittest.cc
20
const char kDefaultMalwareList[] = "goog-
malware
-shavar";
299
"i:
malware
\nsd:21-27,42,171717\n");
329
add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:
malware
\nsd:4,21-27171717\n";
339
"u:cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_1\n"
340
"u:cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_2\n"
341
"u:cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_3\n"
358
EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_1",
360
EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_2",
362
EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-
malware
-shavar_s_3",
435
EXPECT_EQ(safe_browsing_util::
MALWARE
, full_hashes[1].list_id)
[
all
...]
client_side_detection_service.h
136
// Returns true if we have sent more than kMaxReportsPerInterval
malware
241
// sending the client-side
malware
request.
252
// Get the number of
malware
reports that we have sent over kReportsInterval.
296
// Map of client
malware
ip request to the corresponding callback that
315
// Timestamp of when we sent a
malware
request. Used to limit the number
316
// of
malware
requests that we send in a day.
safe_browsing_database.h
53
// information about phishing and
malware
urls. The download database contains
72
// |enable_ip_blacklist| is used to control the csd
malware
IP blacklist
138
// Returns true iff the given IP is currently on the csd
malware
IP blacklist.
177
// Returns true if the
malware
IP blacklisting killswitch URL is present
193
// Filename for
malware
and phishing URL database.
217
// Filename for the csd
malware
IP blacklist database.
341
// This map holds a csd
malware
IP blacklist which maps a prefix mask
424
// For browsing related (phishing and
malware
URLs) chunks and prefixes.
/external/chromium_org/extensions/browser/
install_flag.h
19
// Extension is blacklisted for being
malware
.
/external/chromium_org/tools/chrome_proxy/integration_tests/chrome_proxy_pagesets/
safebrowsing.py
12
Why: Expect '
malware
ahead' page. Use a short navigation timeout because no
/external/chromium_org/chrome/browser/ui/location_bar/
origin_chip_info.h
51
// Returns whether the current URL is known to be
malware
or not.
81
// Detects client-side or SB
malware
/phishing hits. Used to decide whether the
82
// origin chip should indicate that the current page has
malware
or is a known
/external/chromium_org/chrome/common/safe_browsing/
safebrowsing_messages.h
38
// Send part of the DOM to the browser, to be used in a
malware
report.
55
// Request a DOM tree when a
malware
interstitial is shown.
crx_info.proto
24
MALWARE
= 1;
/external/chromium_org/chrome/browser/resources/security_warnings/
safe_browsing.js
28
$('
malware
-opt-in').classList.remove('hidden');
/external/chromium_org/chrome/browser/ui/webui/interstitials/
interstitial_ui.cc
105
if (type_param == "
malware
") {
197
"<a href='safebrowsing?type=
malware
'>
Malware
</a><br>"
200
" Client Side
Malware
</a><br>"
interstitial_ui_browsertest.cc
47
GURL("chrome://interstitials/safebrowsing?type=
malware
"),
/external/chromium_org/chrome/common/extensions/docs/templates/articles/
declare_permissions.html
13
if your extension or app is compromised by
malware
.
/external/chromium_org/tools/chrome_proxy/integration_tests/
chrome_proxy_metrics_unittest.py
61
# A safe-browsing
malware
response.
64
url='http://test.
malware
',
66
'X-
Malware
-Url': '1',
68
'Location': 'http://test.
malware
',
/frameworks/base/docs/html/guide/faq/
security.jd
11
<li><a href="#
malware
">I think I found malicious software being distributed
96
<a name="
malware
" id="
malware
"></a><h2>I think I found malicious software being
101
href="http://en.wikipedia.org/wiki/
Malware
">
malware
</a>, for Android. If you
102
think somebody is trying to spread
malware
, please let us know at
Completed in 691 milliseconds
1
2
3
4
5
6
7