Searched defs:verdict (Results 1 - 19 of 19) sorted by relevance

/external/libnl/lib/netfilter/
H A Dnetfilter.c25 char *nfnl_verdict2str(unsigned int verdict, char *buf, size_t len) argument
27 return __type2str(verdict, buf, len, nfnl_verdicts,
H A Dqueue_msg.c168 struct nfqnl_msg_verdict_hdr verdict; local
176 verdict.id = htonl(nfnl_queue_msg_get_packetid(msg));
177 verdict.verdict = htonl(nfnl_queue_msg_get_verdict(msg));
178 if (nla_put(nlmsg, NFQA_VERDICT_HDR, sizeof(verdict), &verdict) < 0)
194 * Send a message verdict/mark
217 * Send a message verdict including the payload
H A Dqueue_msg_obj.c435 * @arg verdict NF_DROP, NF_ACCEPT, NF_REPEAT, etc
438 unsigned int verdict)
440 msg->queue_msg_verdict = verdict;
468 __ADD(QUEUE_MSG_ATTR_VERDICT, verdict)
437 nfnl_queue_msg_set_verdict(struct nfnl_queue_msg *msg, unsigned int verdict) argument
/external/chromium_org/chrome/renderer/safe_browsing/
H A Dphishing_classifier.cc190 ClientPhishingRequest verdict; local
191 verdict.set_model_version(scorer_->model_version());
192 verdict.set_url(main_frame->document().url().spec());
200 ClientPhishingRequest::Feature* feature = verdict.add_feature_map();
206 verdict.add_shingle_hashes(*it);
209 verdict.set_client_score(score);
210 verdict.set_is_phishing(score >= kPhishyThreshold);
211 RunCallback(verdict);
228 void PhishingClassifier::RunCallback(const ClientPhishingRequest& verdict) { argument
229 done_callback_.Run(verdict);
234 ClientPhishingRequest verdict; local
[all...]
H A Dphishing_classifier_browsertest.cc118 ClientPhishingRequest verdict; local
123 page_text, phishy_score, features, &verdict));
124 return verdict.is_phishing();
130 ClientPhishingRequest* verdict) {
139 base::Unretained(this), &run_loop, verdict));
142 *phishy_score = verdict->client_score();
143 for (int i = 0; i < verdict->feature_map_size(); ++i) {
144 features->AddRealFeature(verdict->feature_map(i).name(),
145 verdict->feature_map(i).value());
152 const ClientPhishingRequest& verdict) {
127 DoRunPhishingClassifier(const base::string16* page_text, float* phishy_score, FeatureMap* features, ClientPhishingRequest* verdict) argument
150 ClassificationFinished(base::RunLoop* run_loop, ClientPhishingRequest* verdict_out, const ClientPhishingRequest& verdict) argument
[all...]
H A Dphishing_classifier_delegate.cc208 const ClientPhishingRequest& verdict) {
211 VLOG(2) << "Phishy verdict = " << verdict.is_phishing()
212 << " score = " << verdict.client_score();
213 if (verdict.client_score() != PhishingClassifier::kInvalidScore) {
214 DCHECK_EQ(last_url_sent_to_classifier_.spec(), verdict.url());
216 routing_id(), verdict.SerializeAsString()));
207 ClassificationDone( const ClientPhishingRequest& verdict) argument
H A Dphishing_classifier_delegate_browsertest.cc89 const ClientPhishingRequest* verdict() const { return verdict_.get(); } function in class:safe_browsing::__anon5840::InterceptingMessageFilter
116 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest);
117 if (verdict->ParseFromString(verdict_str) &&
118 verdict->IsInitialized()) {
119 verdict_.swap(verdict);
168 void RunClassificationDone(const ClientPhishingRequest& verdict) { argument
174 verdict));
627 ClientPhishingRequest verdict; local
628 verdict.set_url(url.spec());
629 verdict
[all...]
/external/iptables/include/linux/netfilter_ipv4/
H A Dip_queue.h45 unsigned long id; /* Packet ID for this verdict */
52 ipq_verdict_msg_t verdict; member in union:ipq_peer_msg::__anon22617
/external/iproute2/include/linux/netfilter/
H A Dx_tables.h66 int verdict; member in struct:xt_standard_target
81 /* CONTINUE verdict for targets */
101 /* Standard return verdict, or do jump. */
103 /* Error verdict. */
/external/iptables/include/linux/netfilter/
H A Dx_tables.h66 int verdict; member in struct:xt_standard_target
81 /* CONTINUE verdict for targets */
101 /* Standard return verdict, or do jump. */
103 /* Error verdict. */
/external/iptables/libipq/
H A Dlibipq.c315 unsigned int verdict,
331 pm.msg.verdict.value = verdict;
332 pm.msg.verdict.id = id;
333 pm.msg.verdict.data_len = data_len;
313 ipq_set_verdict(const struct ipq_handle *h, ipq_id_t id, unsigned int verdict, size_t data_len, unsigned char *buf) argument
/external/kernel-headers/original/uapi/linux/netfilter/
H A Dx_tables.h66 int verdict; member in struct:xt_standard_target
81 /* CONTINUE verdict for targets */
101 /* Standard return verdict, or do jump. */
103 /* Error verdict. */
H A Dnfnetlink_queue.h9 NFQNL_MSG_VERDICT, /* verdict from userspace to kernel */
58 __be32 verdict; member in struct:nfqnl_msg_verdict_hdr
/external/libnl/include/linux/netfilter/
H A Dnfnetlink_queue.h13 NFQNL_MSG_VERDICT, /* verdict from userspace to kernel */
54 __be32 verdict; member in struct:nfqnl_msg_verdict_hdr
/external/kernel-headers/original/uapi/linux/netfilter_bridge/
H A Debtables.h29 /* ebtables target modules store the verdict inside an int. We can
31 * The 4 lsb are more than enough to store the verdict. */
153 int verdict; member in struct:ebt_standard_target
/external/libpcap/
H A Dpcap-netfilter-linux.c63 * and in nfqueue we need to send verdict reply after recving packet.
84 static int nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict);
362 nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict) argument
368 msg.verdict = htonl(verdict);
/external/chromium_org/chrome/browser/safe_browsing/
H A Dclient_side_detection_host_unittest.cc60 // This matcher verifies that the client computed verdict
64 // verdict object before calling SendClientReportPhishingRequest.
85 // Test that the callback is NULL when the verdict is not phishing.
95 ACTION_P(InvokeDoneCallback, verdict) {
97 request->CopyFrom(*verdict);
101 ACTION_P(InvokeMalwareCallback, verdict) {
103 request->CopyFrom(*verdict);
456 // Case 0: renderer sends an invalid verdict string that we're unable to
478 ClientPhishingRequest verdict; local
479 verdict
510 ClientPhishingRequest verdict; local
543 ClientPhishingRequest verdict; local
597 ClientPhishingRequest verdict; local
681 ClientPhishingRequest verdict; local
696 ClientPhishingRequest verdict; local
737 ClientPhishingRequest verdict; local
[all...]
H A Dclient_side_detection_service.cc142 // Invoke pending callbacks with a false verdict.
168 ClientPhishingRequest* verdict,
174 weak_factory_.GetWeakPtr(), verdict, callback));
178 ClientMalwareRequest* verdict,
184 weak_factory_.GetWeakPtr(), verdict, callback));
309 ClientPhishingRequest* verdict,
312 scoped_ptr<ClientPhishingRequest> request(verdict);
350 ClientMalwareRequest* verdict,
353 scoped_ptr<ClientMalwareRequest> request(verdict);
454 DLOG(ERROR) << "Unable to get the server verdict fo
167 SendClientReportPhishingRequest( ClientPhishingRequest* verdict, const ClientReportPhishingRequestCallback& callback) argument
177 SendClientReportMalwareRequest( ClientMalwareRequest* verdict, const ClientReportMalwareRequestCallback& callback) argument
308 StartClientReportPhishingRequest( ClientPhishingRequest* verdict, const ClientReportPhishingRequestCallback& callback) argument
349 StartClientReportMalwareRequest( ClientMalwareRequest* verdict, const ClientReportMalwareRequestCallback& callback) argument
[all...]
/external/iptables/libiptc/
H A Dlibiptc.c120 int verdict; /* verdict if builtin */ member in struct:chain_head
825 /* save verdict */
827 h->chain_iterator_cur->verdict = *(const int *)data;
836 /* foot_offset points to verdict rule */
1019 if (t->verdict < 0) {
1020 DEBUGP_C("standard, verdict=%d\n", t->verdict);
1022 } else if (t->verdict == r->offset+e->next_offset) {
1026 DEBUGP_C("jump, target=%u\n", t->verdict);
1572 standard_target_map(int verdict) argument
1672 iptcc_standard_map(struct rule_head *r, int verdict) argument
[all...]

Completed in 1655 milliseconds