/external/libnl/lib/netfilter/ |
H A D | netfilter.c | 25 char *nfnl_verdict2str(unsigned int verdict, char *buf, size_t len) argument 27 return __type2str(verdict, buf, len, nfnl_verdicts,
|
H A D | queue_msg.c | 168 struct nfqnl_msg_verdict_hdr verdict; local 176 verdict.id = htonl(nfnl_queue_msg_get_packetid(msg)); 177 verdict.verdict = htonl(nfnl_queue_msg_get_verdict(msg)); 178 if (nla_put(nlmsg, NFQA_VERDICT_HDR, sizeof(verdict), &verdict) < 0) 194 * Send a message verdict/mark 217 * Send a message verdict including the payload
|
H A D | queue_msg_obj.c | 435 * @arg verdict NF_DROP, NF_ACCEPT, NF_REPEAT, etc 438 unsigned int verdict) 440 msg->queue_msg_verdict = verdict; 468 __ADD(QUEUE_MSG_ATTR_VERDICT, verdict) 437 nfnl_queue_msg_set_verdict(struct nfnl_queue_msg *msg, unsigned int verdict) argument
|
/external/chromium_org/chrome/renderer/safe_browsing/ |
H A D | phishing_classifier.cc | 190 ClientPhishingRequest verdict; local 191 verdict.set_model_version(scorer_->model_version()); 192 verdict.set_url(main_frame->document().url().spec()); 200 ClientPhishingRequest::Feature* feature = verdict.add_feature_map(); 206 verdict.add_shingle_hashes(*it); 209 verdict.set_client_score(score); 210 verdict.set_is_phishing(score >= kPhishyThreshold); 211 RunCallback(verdict); 228 void PhishingClassifier::RunCallback(const ClientPhishingRequest& verdict) { argument 229 done_callback_.Run(verdict); 234 ClientPhishingRequest verdict; local [all...] |
H A D | phishing_classifier_browsertest.cc | 118 ClientPhishingRequest verdict; local 123 page_text, phishy_score, features, &verdict)); 124 return verdict.is_phishing(); 130 ClientPhishingRequest* verdict) { 139 base::Unretained(this), &run_loop, verdict)); 142 *phishy_score = verdict->client_score(); 143 for (int i = 0; i < verdict->feature_map_size(); ++i) { 144 features->AddRealFeature(verdict->feature_map(i).name(), 145 verdict->feature_map(i).value()); 152 const ClientPhishingRequest& verdict) { 127 DoRunPhishingClassifier(const base::string16* page_text, float* phishy_score, FeatureMap* features, ClientPhishingRequest* verdict) argument 150 ClassificationFinished(base::RunLoop* run_loop, ClientPhishingRequest* verdict_out, const ClientPhishingRequest& verdict) argument [all...] |
H A D | phishing_classifier_delegate.cc | 208 const ClientPhishingRequest& verdict) { 211 VLOG(2) << "Phishy verdict = " << verdict.is_phishing() 212 << " score = " << verdict.client_score(); 213 if (verdict.client_score() != PhishingClassifier::kInvalidScore) { 214 DCHECK_EQ(last_url_sent_to_classifier_.spec(), verdict.url()); 216 routing_id(), verdict.SerializeAsString())); 207 ClassificationDone( const ClientPhishingRequest& verdict) argument
|
H A D | phishing_classifier_delegate_browsertest.cc | 89 const ClientPhishingRequest* verdict() const { return verdict_.get(); } function in class:safe_browsing::__anon5840::InterceptingMessageFilter 116 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest); 117 if (verdict->ParseFromString(verdict_str) && 118 verdict->IsInitialized()) { 119 verdict_.swap(verdict); 168 void RunClassificationDone(const ClientPhishingRequest& verdict) { argument 174 verdict)); 627 ClientPhishingRequest verdict; local 628 verdict.set_url(url.spec()); 629 verdict [all...] |
/external/iptables/include/linux/netfilter_ipv4/ |
H A D | ip_queue.h | 45 unsigned long id; /* Packet ID for this verdict */ 52 ipq_verdict_msg_t verdict; member in union:ipq_peer_msg::__anon22617
|
/external/iproute2/include/linux/netfilter/ |
H A D | x_tables.h | 66 int verdict; member in struct:xt_standard_target 81 /* CONTINUE verdict for targets */ 101 /* Standard return verdict, or do jump. */ 103 /* Error verdict. */
|
/external/iptables/include/linux/netfilter/ |
H A D | x_tables.h | 66 int verdict; member in struct:xt_standard_target 81 /* CONTINUE verdict for targets */ 101 /* Standard return verdict, or do jump. */ 103 /* Error verdict. */
|
/external/iptables/libipq/ |
H A D | libipq.c | 315 unsigned int verdict, 331 pm.msg.verdict.value = verdict; 332 pm.msg.verdict.id = id; 333 pm.msg.verdict.data_len = data_len; 313 ipq_set_verdict(const struct ipq_handle *h, ipq_id_t id, unsigned int verdict, size_t data_len, unsigned char *buf) argument
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
H A D | x_tables.h | 66 int verdict; member in struct:xt_standard_target 81 /* CONTINUE verdict for targets */ 101 /* Standard return verdict, or do jump. */ 103 /* Error verdict. */
|
H A D | nfnetlink_queue.h | 9 NFQNL_MSG_VERDICT, /* verdict from userspace to kernel */ 58 __be32 verdict; member in struct:nfqnl_msg_verdict_hdr
|
/external/libnl/include/linux/netfilter/ |
H A D | nfnetlink_queue.h | 13 NFQNL_MSG_VERDICT, /* verdict from userspace to kernel */ 54 __be32 verdict; member in struct:nfqnl_msg_verdict_hdr
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
H A D | ebtables.h | 29 /* ebtables target modules store the verdict inside an int. We can 31 * The 4 lsb are more than enough to store the verdict. */ 153 int verdict; member in struct:ebt_standard_target
|
/external/libpcap/ |
H A D | pcap-netfilter-linux.c | 63 * and in nfqueue we need to send verdict reply after recving packet. 84 static int nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict); 362 nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict) argument 368 msg.verdict = htonl(verdict);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | client_side_detection_host_unittest.cc | 60 // This matcher verifies that the client computed verdict 64 // verdict object before calling SendClientReportPhishingRequest. 85 // Test that the callback is NULL when the verdict is not phishing. 95 ACTION_P(InvokeDoneCallback, verdict) { 97 request->CopyFrom(*verdict); 101 ACTION_P(InvokeMalwareCallback, verdict) { 103 request->CopyFrom(*verdict); 456 // Case 0: renderer sends an invalid verdict string that we're unable to 478 ClientPhishingRequest verdict; local 479 verdict 510 ClientPhishingRequest verdict; local 543 ClientPhishingRequest verdict; local 597 ClientPhishingRequest verdict; local 681 ClientPhishingRequest verdict; local 696 ClientPhishingRequest verdict; local 737 ClientPhishingRequest verdict; local [all...] |
H A D | client_side_detection_service.cc | 142 // Invoke pending callbacks with a false verdict. 168 ClientPhishingRequest* verdict, 174 weak_factory_.GetWeakPtr(), verdict, callback)); 178 ClientMalwareRequest* verdict, 184 weak_factory_.GetWeakPtr(), verdict, callback)); 309 ClientPhishingRequest* verdict, 312 scoped_ptr<ClientPhishingRequest> request(verdict); 350 ClientMalwareRequest* verdict, 353 scoped_ptr<ClientMalwareRequest> request(verdict); 454 DLOG(ERROR) << "Unable to get the server verdict fo 167 SendClientReportPhishingRequest( ClientPhishingRequest* verdict, const ClientReportPhishingRequestCallback& callback) argument 177 SendClientReportMalwareRequest( ClientMalwareRequest* verdict, const ClientReportMalwareRequestCallback& callback) argument 308 StartClientReportPhishingRequest( ClientPhishingRequest* verdict, const ClientReportPhishingRequestCallback& callback) argument 349 StartClientReportMalwareRequest( ClientMalwareRequest* verdict, const ClientReportMalwareRequestCallback& callback) argument [all...] |
/external/iptables/libiptc/ |
H A D | libiptc.c | 120 int verdict; /* verdict if builtin */ member in struct:chain_head 825 /* save verdict */ 827 h->chain_iterator_cur->verdict = *(const int *)data; 836 /* foot_offset points to verdict rule */ 1019 if (t->verdict < 0) { 1020 DEBUGP_C("standard, verdict=%d\n", t->verdict); 1022 } else if (t->verdict == r->offset+e->next_offset) { 1026 DEBUGP_C("jump, target=%u\n", t->verdict); 1572 standard_target_map(int verdict) argument 1672 iptcc_standard_map(struct rule_head *r, int verdict) argument [all...] |