Google.Apis.Safebrowsing.v4 The Safebrowsing Service. The API version. The discovery version used to generate this service. Constructs a new service. Constructs a new service. The service initializer. Gets the service supported features. Gets the service name. Gets the service base URI. Gets the service base path. Gets the batch base URI; null if unspecified. Gets the batch base path; null if unspecified. Gets the EncodedFullHashes resource. Gets the EncodedUpdates resource. Gets the FullHashes resource. Gets the ThreatHits resource. Gets the ThreatListUpdates resource. Gets the ThreatLists resource. Gets the ThreatMatches resource. A base abstract class for Safebrowsing requests. Constructs a new SafebrowsingBaseServiceRequest instance. V1 error format. V1 error format. v1 error format v2 error format OAuth access token. Data format for response. Data format for response. Responses with Content-Type of application/json Media download with context-dependent Content-Type Responses with Content-Type of application/x-protobuf JSONP Selector specifying which fields to include in a partial response. API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. OAuth 2.0 token for the current user. Returns response with indentations and line breaks. Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters. Legacy upload protocol for media (e.g. "media", "multipart"). Upload protocol for media (e.g. "raw", "multipart"). Initializes Safebrowsing parameter list. The "encodedFullHashes" collection of methods. The service which this resource belongs to. Constructs a new resource. A serialized FindFullHashesRequest proto. Constructs a new Get request. A serialized FindFullHashesRequest proto. A client ID that (hopefully) uniquely identifies the client implementation of the Safe Browsing API. The version of the client implementation. Gets the method name. Gets the HTTP method. Gets the REST path. Initializes Get parameter list. The "encodedUpdates" collection of methods. The service which this resource belongs to. Constructs a new resource. A serialized FetchThreatListUpdatesRequest proto. Constructs a new Get request. A serialized FetchThreatListUpdatesRequest proto. A client ID that uniquely identifies the client implementation of the Safe Browsing API. The version of the client implementation. Gets the method name. Gets the HTTP method. Gets the REST path. Initializes Get parameter list. The "fullHashes" collection of methods. The service which this resource belongs to. Constructs a new resource. Finds the full hashes that match the requested hash prefixes. The body of the request. Finds the full hashes that match the requested hash prefixes. Constructs a new Find request. Gets or sets the body of this request. Returns the body of the request. Gets the method name. Gets the HTTP method. Gets the REST path. Initializes Find parameter list. The "threatHits" collection of methods. The service which this resource belongs to. Constructs a new resource. Reports a Safe Browsing threat list hit to Google. Only projects with TRUSTED_REPORTER visibility can use this method. The body of the request. Reports a Safe Browsing threat list hit to Google. Only projects with TRUSTED_REPORTER visibility can use this method. Constructs a new Create request. Gets or sets the body of this request. Returns the body of the request. Gets the method name. Gets the HTTP method. Gets the REST path. Initializes Create parameter list. The "threatListUpdates" collection of methods. The service which this resource belongs to. Constructs a new resource. Fetches the most recent threat list updates. A client can request updates for multiple lists at once. The body of the request. Fetches the most recent threat list updates. A client can request updates for multiple lists at once. Constructs a new Fetch request. Gets or sets the body of this request. Returns the body of the request. Gets the method name. Gets the HTTP method. Gets the REST path. Initializes Fetch parameter list. The "threatLists" collection of methods. The service which this resource belongs to. Constructs a new resource. Lists the Safe Browsing threat lists available for download. Lists the Safe Browsing threat lists available for download. Constructs a new List request. Gets the method name. Gets the HTTP method. Gets the REST path. Initializes List parameter list. The "threatMatches" collection of methods. The service which this resource belongs to. Constructs a new resource. Finds the threat entries that match the Safe Browsing lists. The body of the request. Finds the threat entries that match the Safe Browsing lists. Constructs a new Find request. Gets or sets the body of this request. Returns the body of the request. Gets the method name. Gets the HTTP method. Gets the REST path. Initializes Find parameter list. A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); } The ETag of the item. The expected state of a client's local database. The SHA256 hash of the client state; that is, of the sorted list of all hashes present in the database. The ETag of the item. The client metadata associated with Safe Browsing API requests. A client ID that (hopefully) uniquely identifies the client implementation of the Safe Browsing API. The version of the client implementation. The ETag of the item. Describes a Safe Browsing API update request. Clients can request updates for multiple lists in a single request. The server may not respond to all requests, if the server has no updates for that list. NOTE: Field index 2 is unused. NEXT: 5 The client metadata. The requested threat list updates. The ETag of the item. A single list update request. The constraints associated with this request. The type of platform at risk by entries present in the list. The current state of the client for the requested list (the encrypted client state that was received from the last successful list update). The types of entries present in the list. The type of threat posed by entries present in the list. The ETag of the item. The constraints for this update. A client's physical location, expressed as a ISO 31166-1 alpha-2 region code. Requests the lists for a specific language. Expects ISO 639 alpha-2 format. Sets the maximum number of entries that the client is willing to have in the local database for the specified list. This should be a power of 2 between 2**10 and 2**20. If zero, no database size limit is set. The maximum size in number of entries. The update will not contain more entries than this value. This should be a power of 2 between 2**10 and 2**20. If zero, no update size limit is set. Requests the list for a specific geographic location. If not set the server may pick that value based on the user's IP address. Expects ISO 3166-1 alpha-2 format. The compression types supported by the client. The ETag of the item. The list updates requested by the clients. The number of responses here may be less than the number of requests sent by clients. This is the case, for example, if the server has no updates for a particular list. The minimum duration the client must wait before issuing any update request. If this field is not set clients may update as soon as they want. The ETag of the item. An update to an individual list. A set of entries to add to a local threat type's list. Repeated to allow for a combination of compressed and raw data to be sent in a single response. The expected SHA256 hash of the client state; that is, of the sorted list of all hashes present in the database after applying the provided update. If the client state doesn't match the expected state, the client must disregard this update and retry later. The new client state, in encrypted format. Opaque to clients. The platform type for which data is returned. A set of entries to remove from a local threat type's list. In practice, this field is empty or contains exactly one ThreatEntrySet. The type of response. This may indicate that an action is required by the client when the response is received. The format of the threats. The threat type for which data is returned. The ETag of the item. Request to return full hashes matched by the provided hash prefixes. Client metadata associated with callers of higher-level APIs built on top of the client's implementation. The client metadata. The current client states for each of the client's local threat lists. The lists and hashes to be checked. The ETag of the item. The full hashes that matched the requested prefixes. The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want. For requested entities that did not match the threat list, how long to cache the response. The ETag of the item. Request to check entries against lists. The client metadata. The lists and entries to be checked for matches. The ETag of the item. The threat list matches. The ETag of the item. The lists available for download by the client. The ETag of the item. The uncompressed threat entries in hash format of a particular prefix length. Hashes can be anywhere from 4 to 32 bytes in size. A large majority are 4 bytes, but some hashes are lengthened if they collide with the hash of a popular URL. Used for sending ThreatEntrySet to clients that do not support compression, or when sending non-4-byte hashes to clients that do support compression. The number of bytes for each prefix encoded below. This field can be anywhere from 4 (shortest prefix) to 32 (full SHA256 hash). The hashes, in binary format, concatenated into one long string. Hashes are sorted in lexicographic order. For JSON API users, hashes are base64-encoded. The ETag of the item. A set of raw indices to remove from a local list. The indices to remove from a lexicographically-sorted local list. The ETag of the item. The Rice-Golomb encoded data. Used for sending compressed 4-byte hashes or compressed removal indices. The encoded deltas that are encoded using the Golomb-Rice coder. The offset of the first entry in the encoded data, or, if only a single integer was encoded, that single integer's value. If the field is empty or missing, assume zero. The number of entries that are delta encoded in the encoded data. If only a single integer was encoded, this will be zero and the single value will be stored in `first_value`. The Golomb-Rice parameter, which is a number between 2 and 28. This field is missing (that is, zero) if `num_entries` is zero. The ETag of the item. An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set. The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded. A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded. A URL. The ETag of the item. The metadata associated with a specific threat entry. The client is expected to know the metadata key/value pairs associated with each threat type. The metadata entries. The ETag of the item. A single metadata entry. The metadata entry key. For JSON requests, the key is base64-encoded. The metadata entry value. For JSON requests, the value is base64-encoded. The ETag of the item. A set of threats that should be added or removed from a client's local database. The compression type for the entries in this set. The raw SHA256-formatted entries. The raw removal indices for a local list. The encoded 4-byte prefixes of SHA256-formatted entries, using a Golomb-Rice encoding. The hashes are converted to uint32, sorted in ascending order, then delta encoded and stored as encoded_data. The encoded local, lexicographically-sorted list indices, using a Golomb-Rice encoding. Used for sending compressed removal indices. The removal indices (uint32) are sorted in ascending order, then delta encoded and stored as encoded_data. The ETag of the item. Client-reported identification. The threat entry responsible for the hit. Full hash should be reported for hash-based hits. The platform type reported. The resources related to the threat hit. The threat type reported. Details about the user that encountered the threat. The ETag of the item. A single resource related to a threat hit. Referrer of the resource. Only set if the referrer is available. The remote IP of the resource in ASCII format. Either IPv4 or IPv6. The type of source reported. The URL of the resource. The ETag of the item. Details about the user that encountered the threat. The UN M.49 region code associated with the user's location. Unique user identifier defined by the client. The ETag of the item. The information regarding one or more threats that a client submits when checking for matches in threat lists. The platform types to be checked. The threat entries to be checked. The entry types to be checked. The threat types to be checked. The ETag of the item. Describes an individual threat list. A list is defined by three parameters: the type of threat posed, the type of platform targeted by the threat, and the type of entries in the list. The platform type targeted by the list's entries. The entry types contained in the list. The threat type posed by the list's entries. The ETag of the item. A match when checking a threat entry in the Safe Browsing threat lists. The cache lifetime for the returned match. Clients must not cache this response for more than this duration to avoid false positives. The platform type matching this threat. The threat matching this threat. Optional metadata associated with this threat. The threat entry type matching this threat. The threat type matching this threat. The ETag of the item.