HomeSort by relevance Sort by last modified time
    Searched full:malware (Results 1 - 25 of 152) sorted by null

1 2 3 4 5 6 7

  /external/chromium_org/crypto/
hmac_unittest.cc 50 "n:1896\ni:goog-malware-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav"
51 "ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_439-444\nu:s"
52 ".ytimg.com/safebrowsing/rd/goog-malware-shavar_s_437\nu:s.ytimg.com/safebrowsi"
53 "ng/rd/goog-malware-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-malware-sh"
54 "avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_431\nu:s.y"
55 "timg.com/safebrowsing/rd/goog-malware-shavar_s_430\nu:s.ytimg.com/safebrowsing"
56 "/rd/goog-malware-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav
    [all...]
  /external/chromium_org/chrome/browser/safe_browsing/
metadata.proto 15 // Metadata for the goog-malware-shavar list.
database_manager_unittest.cc 74 EXPECT_FALSE(RunSBHashTest(safe_browsing_util::MALWARE,
77 EXPECT_TRUE(RunSBHashTest(safe_browsing_util::MALWARE,
85 const GURL kMalwareUrl("http://www.malware.com/page.html");
89 const SBFullHash kMalwareHostHash = SBFullHashForString("malware.com/");
96 full_hash.list_id = static_cast<int>(safe_browsing_util::MALWARE);
ping_manager.h 49 // malware reports. |report| is the serialized report.
71 // Generates URL for reporting malware details for users who opt-in.
84 // sends detaild malware reports for UMA users.
safe_browsing_blocking_page_unittest.cc 213 // Tests showing a blocking page for a malware page and not proceeding.
215 // Enable malware details.
249 // Tests showing a blocking page for a malware page and then proceeding.
251 // Enable malware reports.
282 // Tests showing a blocking page for a page that contains malware subresources
285 // Enable malware reports.
319 // Tests showing a blocking page for a page that contains malware subresources
322 // Enable malware reports.
352 // Tests showing a blocking page for a page that contains multiple malware
353 // subresources and not proceeding. This just tests that the extra malware
    [all...]
client_side_detection_host.h 62 // Returns whether the current page contains a malware or phishing safe
83 // the phishing and malware clasifiers.
95 // Callback that is called when the malware IP server ping back is
107 // Start malware classification once the onload handler was called and
108 // malware pre-classification checks are done and passed.
111 // Function to be called when the browser malware feature extractor is done.
168 // Max number of urls we report for each malware IP.
safe_browsing_blocking_page.h 8 // be malicious, either as malware or a phishing page, we show an interstitial
21 // A web page may contain several resources flagged as malware/phishing. This
77 // Shows a blocking page warning the user about phishing/malware for a
114 // After a malware interstitial where the user opted-in to the
153 // Checks if we should even show the malware details option. For example, we
158 // pending malware details object, we look at the user's
159 // preferences, and if the option to send malware details is
safe_browsing_util.h 133 // The URL hosts malware.
139 // The download URL is malware.
146 // The Chrome extension or app (given by its ID) is malware.
149 // Url detected by the client-side malware IP list. This IP list is part
171 // SafeBrowsing csd malware IP blacklist name.
179 MALWARE = 0,
ui_manager.cc 103 // Malware sites tagged as "landing site" should only show a warning for a
104 // main-frame or sub-frame resource. (See "Types of Malware sites" under
181 // A safebrowsing hit is sent after a blocking page for malware/phishing
246 DVLOG(1) << "Sending serialized malware details.";
273 // phishing/malware URL or a SafeBrowsing phishing/malware URL.
274 // If we show one type of phishing/malware warning we don't want to show
275 // a second phishing/malware warning.
safe_browsing_blocking_page.cc 66 // For malware interstitial pages, we link the problematic URL to Google's
76 // URL for malware and phishing, V2.
86 // After a malware interstitial where the user opted-in to the report
164 bool malware = false; local
173 malware = true;
182 DCHECK(phishing || malware || harmful);
183 if (malware)
213 // Start computing malware details. They will be sent only
414 // Send the malware details, if we opted to.
460 // Send the malware details, if we opted to
    [all...]
client_side_detection_host.cc 56 // asynchronously checks whether the malware and phishing classifiers should run
122 VLOG(1) << "Skipping phishing and malware classification for URL: "
203 // Track the first reason why we stopped classifying for malware.
206 DVLOG(2) << "Failed malware pre-classification checks. Reason: "
403 // Check whether we can cassify the current URL for phishing or malware.
419 // Check that the hit is either malware or phishing.
507 // If classification checks failed we should stop extracting malware features.
508 DVLOG(2) << "Malware pre-classification checks done. Should classify: "
531 // Start browser-side malware feature extraction. Once we're done it will
532 // send the malware client verdict request
    [all...]
protocol_parser_unittest.cc 20 const char kDefaultMalwareList[] = "goog-malware-shavar";
299 "i:malware\nsd:21-27,42,171717\n");
329 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n";
339 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
340 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
341 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
358 EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1",
360 EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2",
362 EXPECT_EQ("cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3",
435 EXPECT_EQ(safe_browsing_util::MALWARE, full_hashes[1].list_id)
    [all...]
client_side_detection_service.h 136 // Returns true if we have sent more than kMaxReportsPerInterval malware
241 // sending the client-side malware request.
252 // Get the number of malware reports that we have sent over kReportsInterval.
296 // Map of client malware ip request to the corresponding callback that
315 // Timestamp of when we sent a malware request. Used to limit the number
316 // of malware requests that we send in a day.
safe_browsing_database.h 53 // information about phishing and malware urls. The download database contains
72 // |enable_ip_blacklist| is used to control the csd malware IP blacklist
138 // Returns true iff the given IP is currently on the csd malware IP blacklist.
177 // Returns true if the malware IP blacklisting killswitch URL is present
193 // Filename for malware and phishing URL database.
217 // Filename for the csd malware IP blacklist database.
341 // This map holds a csd malware IP blacklist which maps a prefix mask
424 // For browsing related (phishing and malware URLs) chunks and prefixes.
  /external/chromium_org/extensions/browser/
install_flag.h 19 // Extension is blacklisted for being malware.
  /external/chromium_org/tools/chrome_proxy/integration_tests/chrome_proxy_pagesets/
safebrowsing.py 12 Why: Expect 'malware ahead' page. Use a short navigation timeout because no
  /external/chromium_org/chrome/browser/ui/location_bar/
origin_chip_info.h 51 // Returns whether the current URL is known to be malware or not.
81 // Detects client-side or SB malware/phishing hits. Used to decide whether the
82 // origin chip should indicate that the current page has malware or is a known
  /external/chromium_org/chrome/common/safe_browsing/
safebrowsing_messages.h 38 // Send part of the DOM to the browser, to be used in a malware report.
55 // Request a DOM tree when a malware interstitial is shown.
crx_info.proto 24 MALWARE = 1;
  /external/chromium_org/chrome/browser/resources/security_warnings/
safe_browsing.js 28 $('malware-opt-in').classList.remove('hidden');
  /external/chromium_org/chrome/browser/ui/webui/interstitials/
interstitial_ui.cc 105 if (type_param == "malware") {
197 "<a href='safebrowsing?type=malware'>Malware</a><br>"
200 " Client Side Malware</a><br>"
interstitial_ui_browsertest.cc 47 GURL("chrome://interstitials/safebrowsing?type=malware"),
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
declare_permissions.html 13 if your extension or app is compromised by malware.
  /external/chromium_org/tools/chrome_proxy/integration_tests/
chrome_proxy_metrics_unittest.py 61 # A safe-browsing malware response.
64 url='http://test.malware',
66 'X-Malware-Url': '1',
68 'Location': 'http://test.malware',
  /frameworks/base/docs/html/guide/faq/
security.jd 11 <li><a href="#malware">I think I found malicious software being distributed
96 <a name="malware" id="malware"></a><h2>I think I found malicious software being
101 href="http://en.wikipedia.org/wiki/Malware">malware</a>, for Android. If you
102 think somebody is trying to spread malware, please let us know at

Completed in 691 milliseconds

1 2 3 4 5 6 7