Index: chrome/browser/safe_browsing/environment_data_collection_win.h |
diff --git a/chrome/browser/safe_browsing/environment_data_collection_win.h b/chrome/browser/safe_browsing/environment_data_collection_win.h |
index f46a3a04106d6c38e79d0c7bf55dfcfafa7cc50a..367afac330f224065bf095d1771bfc197b48af12 100644 |
--- a/chrome/browser/safe_browsing/environment_data_collection_win.h |
+++ b/chrome/browser/safe_browsing/environment_data_collection_win.h |
@@ -18,6 +18,12 @@ bool CollectDlls(ClientIncidentReport_EnvironmentData_Process* process); |
// check one of them is a registered LSP. |
void RecordLspFeature(ClientIncidentReport_EnvironmentData_Process* process); |
+// Checks each module in the provided list for modifications and records these, |
+// along with any modified exports, in |process|. |
grt (UTC plus 2)
2014/08/06 01:28:10
please add that |modules_to_verify| must be termin
|
+void RecordModuleVerificationData( |
robertshield
2014/08/06 13:00:51
Call me paranoid, but I greatly prefer exposed fun
krstnmnlsn
2014/08/06 21:55:11
Alright, switched back.
|
+ const wchar_t* const* modules_to_verify, |
+ ClientIncidentReport_EnvironmentData_Process* process); |
+ |
// Populates |process| with the dll names that have been added to the chrome elf |
// blacklist through the Windows registry. |
void CollectDllBlacklistData( |