diff options
author | mattm <mattm@chromium.org> | 2015-11-11 21:50:08 -0800 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2015-11-12 05:51:06 +0000 |
commit | 25d4331c462f682c620e4137e2f3a589b066b098 (patch) | |
tree | 77eff03006a76293c3db4989ae4c977594626328 /content | |
parent | adfa42754d0450f1dd626c931802d50e9d85b00b (diff) | |
download | chromium_src-25d4331c462f682c620e4137e2f3a589b066b098.zip chromium_src-25d4331c462f682c620e4137e2f3a589b066b098.tar.gz chromium_src-25d4331c462f682c620e4137e2f3a589b066b098.tar.bz2 |
Add more archive file extensions to safebrowsing download protection.
BUG=551713
Review URL: https://codereview.chromium.org/1438643002
Cr-Commit-Position: refs/heads/master@{#359272}
Diffstat (limited to 'content')
-rw-r--r-- | content/browser/download/download_stats.cc | 88 |
1 files changed, 88 insertions, 0 deletions
diff --git a/content/browser/download/download_stats.cc b/content/browser/download/download_stats.cc index b7ddeea..3f7d692 100644 --- a/content/browser/download/download_stats.cc +++ b/content/browser/download/download_stats.cc @@ -231,6 +231,94 @@ const base::FilePath::CharType* kDangerousFileTypes[] = { FILE_PATH_LITERAL(".u3p"), FILE_PATH_LITERAL(".vbscript"), FILE_PATH_LITERAL(".workflow"), + FILE_PATH_LITERAL(".001"), + FILE_PATH_LITERAL(".7z"), + FILE_PATH_LITERAL(".ace"), + FILE_PATH_LITERAL(".arc"), + FILE_PATH_LITERAL(".arj"), + FILE_PATH_LITERAL(".b64"), + FILE_PATH_LITERAL(".balz"), + FILE_PATH_LITERAL(".bhx"), + FILE_PATH_LITERAL(".bz"), + FILE_PATH_LITERAL(".bz2"), + FILE_PATH_LITERAL(".bzip2"), + FILE_PATH_LITERAL(".cab"), + FILE_PATH_LITERAL(".cpio"), + FILE_PATH_LITERAL(".fat"), + FILE_PATH_LITERAL(".gz"), + FILE_PATH_LITERAL(".gzip"), + FILE_PATH_LITERAL(".hfs"), + FILE_PATH_LITERAL(".hqx"), + FILE_PATH_LITERAL(".iso"), + FILE_PATH_LITERAL(".lha"), + FILE_PATH_LITERAL(".lpaq1"), + FILE_PATH_LITERAL(".lpaq5"), + FILE_PATH_LITERAL(".lpaq8"), + FILE_PATH_LITERAL(".lzh"), + FILE_PATH_LITERAL(".lzma"), + FILE_PATH_LITERAL(".mim"), + FILE_PATH_LITERAL(".ntfs"), + FILE_PATH_LITERAL(".paq8f"), + FILE_PATH_LITERAL(".paq8jd"), + FILE_PATH_LITERAL(".paq8l"), + FILE_PATH_LITERAL(".paq8o"), + FILE_PATH_LITERAL(".pea"), + FILE_PATH_LITERAL(".quad"), + FILE_PATH_LITERAL(".r00"), + FILE_PATH_LITERAL(".r01"), + FILE_PATH_LITERAL(".r02"), + FILE_PATH_LITERAL(".r03"), + FILE_PATH_LITERAL(".r04"), + FILE_PATH_LITERAL(".r05"), + FILE_PATH_LITERAL(".r06"), + FILE_PATH_LITERAL(".r07"), + FILE_PATH_LITERAL(".r08"), + FILE_PATH_LITERAL(".r09"), + FILE_PATH_LITERAL(".r10"), + FILE_PATH_LITERAL(".r11"), + FILE_PATH_LITERAL(".r12"), + FILE_PATH_LITERAL(".r13"), + FILE_PATH_LITERAL(".r14"), + FILE_PATH_LITERAL(".r15"), + FILE_PATH_LITERAL(".r16"), + FILE_PATH_LITERAL(".r17"), + FILE_PATH_LITERAL(".r18"), + FILE_PATH_LITERAL(".r19"), + FILE_PATH_LITERAL(".r20"), + FILE_PATH_LITERAL(".r21"), + FILE_PATH_LITERAL(".r22"), + FILE_PATH_LITERAL(".r23"), + FILE_PATH_LITERAL(".r24"), + FILE_PATH_LITERAL(".r25"), + FILE_PATH_LITERAL(".r26"), + FILE_PATH_LITERAL(".r27"), + FILE_PATH_LITERAL(".r28"), + FILE_PATH_LITERAL(".r29"), + FILE_PATH_LITERAL(".rar"), + FILE_PATH_LITERAL(".squashfs"), + FILE_PATH_LITERAL(".swm"), + FILE_PATH_LITERAL(".tar"), + FILE_PATH_LITERAL(".taz"), + FILE_PATH_LITERAL(".tbz"), + FILE_PATH_LITERAL(".tbz2"), + FILE_PATH_LITERAL(".tgz"), + FILE_PATH_LITERAL(".tpz"), + FILE_PATH_LITERAL(".txz"), + FILE_PATH_LITERAL(".tz"), + FILE_PATH_LITERAL(".udf"), + FILE_PATH_LITERAL(".uu"), + FILE_PATH_LITERAL(".uue"), + FILE_PATH_LITERAL(".vhd"), + FILE_PATH_LITERAL(".vmdk"), + FILE_PATH_LITERAL(".wim"), + FILE_PATH_LITERAL(".wrc"), + FILE_PATH_LITERAL(".xar"), + FILE_PATH_LITERAL(".xxe"), + FILE_PATH_LITERAL(".xz"), + FILE_PATH_LITERAL(".z"), + FILE_PATH_LITERAL(".zip"), + FILE_PATH_LITERAL(".zipx"), + FILE_PATH_LITERAL(".zpaq"), }; // Maps extensions to their matching UMA histogram int value. |