/external/chromium_org/chrome/renderer/safe_browsing/ |
H A D | phishing_classifier.cc | 190 ClientPhishingRequest verdict; local 191 verdict.set_model_version(scorer_->model_version()); 192 verdict.set_url(main_frame->document().url().spec()); 200 ClientPhishingRequest::Feature* feature = verdict.add_feature_map(); 206 verdict.add_shingle_hashes(*it); 209 verdict.set_client_score(score); 210 verdict.set_is_phishing(score >= kPhishyThreshold); 211 RunCallback(verdict); 228 void PhishingClassifier::RunCallback(const ClientPhishingRequest& verdict) { argument 229 done_callback_.Run(verdict); 234 ClientPhishingRequest verdict; local [all...] |
H A D | phishing_classifier_browsertest.cc | 118 ClientPhishingRequest verdict; local 123 page_text, phishy_score, features, &verdict)); 124 return verdict.is_phishing(); 130 ClientPhishingRequest* verdict) { 139 base::Unretained(this), &run_loop, verdict)); 142 *phishy_score = verdict->client_score(); 143 for (int i = 0; i < verdict->feature_map_size(); ++i) { 144 features->AddRealFeature(verdict->feature_map(i).name(), 145 verdict->feature_map(i).value()); 152 const ClientPhishingRequest& verdict) { 127 DoRunPhishingClassifier(const base::string16* page_text, float* phishy_score, FeatureMap* features, ClientPhishingRequest* verdict) argument 150 ClassificationFinished(base::RunLoop* run_loop, ClientPhishingRequest* verdict_out, const ClientPhishingRequest& verdict) argument [all...] |
H A D | phishing_classifier_delegate.cc | 208 const ClientPhishingRequest& verdict) { 211 VLOG(2) << "Phishy verdict = " << verdict.is_phishing() 212 << " score = " << verdict.client_score(); 213 if (verdict.client_score() != PhishingClassifier::kInvalidScore) { 214 DCHECK_EQ(last_url_sent_to_classifier_.spec(), verdict.url()); 216 routing_id(), verdict.SerializeAsString())); 207 ClassificationDone( const ClientPhishingRequest& verdict) argument
|
H A D | phishing_classifier_delegate_browsertest.cc | 89 const ClientPhishingRequest* verdict() const { return verdict_.get(); } function in class:safe_browsing::__anon5840::InterceptingMessageFilter 116 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest); 117 if (verdict->ParseFromString(verdict_str) && 118 verdict->IsInitialized()) { 119 verdict_.swap(verdict); 168 void RunClassificationDone(const ClientPhishingRequest& verdict) { argument 174 verdict)); 627 ClientPhishingRequest verdict; local 628 verdict.set_url(url.spec()); 629 verdict [all...] |
H A D | phishing_classifier.h | 44 // Callback to be run when phishing classification finishes. The verdict 45 // is a ClientPhishingRequest which contains the verdict computed by the 46 // classifier as well as the extracted features. If the verdict.is_phishing() 48 // and the browser should ping back to get a final verdict. The 49 // verdict.client_score() is set to kInvalidScore if classification failed. 50 typedef base::Callback<void(const ClientPhishingRequest& /* verdict */)> 107 // runs the DoneCallback with a non-phishy verdict. 113 // non-phishy verdict. 122 void RunCallback(const ClientPhishingRequest& verdict); 125 // This always signals a non-phishy verdict fo [all...] |
H A D | phishing_classifier_delegate.h | 94 void ClassificationDone(const ClientPhishingRequest& verdict);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | client_side_detection_host_unittest.cc | 60 // This matcher verifies that the client computed verdict 64 // verdict object before calling SendClientReportPhishingRequest. 85 // Test that the callback is NULL when the verdict is not phishing. 95 ACTION_P(InvokeDoneCallback, verdict) { 97 request->CopyFrom(*verdict); 101 ACTION_P(InvokeMalwareCallback, verdict) { 103 request->CopyFrom(*verdict); 456 // Case 0: renderer sends an invalid verdict string that we're unable to 478 ClientPhishingRequest verdict; local 479 verdict 510 ClientPhishingRequest verdict; local 543 ClientPhishingRequest verdict; local 597 ClientPhishingRequest verdict; local 681 ClientPhishingRequest verdict; local 696 ClientPhishingRequest verdict; local 737 ClientPhishingRequest verdict; local [all...] |
H A D | client_side_detection_service.h | 100 // takes ownership of the |verdict| as well as the |callback| and calls the 103 // the phishing verdict will always be false. The callback is always called 106 // NULL if you don't care about the server verdict. 108 ClientPhishingRequest* verdict, 113 ClientMalwareRequest* verdict, 215 ClientPhishingRequest* verdict, 219 ClientMalwareRequest* verdict,
|
H A D | client_side_detection_service.cc | 142 // Invoke pending callbacks with a false verdict. 168 ClientPhishingRequest* verdict, 174 weak_factory_.GetWeakPtr(), verdict, callback)); 178 ClientMalwareRequest* verdict, 184 weak_factory_.GetWeakPtr(), verdict, callback)); 309 ClientPhishingRequest* verdict, 312 scoped_ptr<ClientPhishingRequest> request(verdict); 350 ClientMalwareRequest* verdict, 353 scoped_ptr<ClientMalwareRequest> request(verdict); 454 DLOG(ERROR) << "Unable to get the server verdict fo 167 SendClientReportPhishingRequest( ClientPhishingRequest* verdict, const ClientReportPhishingRequestCallback& callback) argument 177 SendClientReportMalwareRequest( ClientMalwareRequest* verdict, const ClientReportMalwareRequestCallback& callback) argument 308 StartClientReportPhishingRequest( ClientPhishingRequest* verdict, const ClientReportPhishingRequestCallback& callback) argument 349 StartClientReportMalwareRequest( ClientMalwareRequest* verdict, const ClientReportMalwareRequestCallback& callback) argument [all...] |
H A D | client_side_detection_host.h | 29 // class which sends a ping to a server to validate the verdict. 88 void OnPhishingDetectionDone(const std::string& verdict);
|
H A D | client_side_detection_host.cc | 532 // send the malware client verdict request. 559 // send the verdict further. 560 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest); 563 verdict->ParseFromString(verdict_str) && 564 verdict->IsInitialized()) { 565 // We only send phishing verdict to the server if the verdict is phishing or 569 if (verdict->is_phishing() || DidShowSBInterstitial()) { 574 // the client verdict request. 577 verdict [all...] |
/external/libnl/lib/netfilter/ |
H A D | netfilter.c | 25 char *nfnl_verdict2str(unsigned int verdict, char *buf, size_t len) argument 27 return __type2str(verdict, buf, len, nfnl_verdicts,
|
H A D | queue_msg.c | 168 struct nfqnl_msg_verdict_hdr verdict; local 176 verdict.id = htonl(nfnl_queue_msg_get_packetid(msg)); 177 verdict.verdict = htonl(nfnl_queue_msg_get_verdict(msg)); 178 if (nla_put(nlmsg, NFQA_VERDICT_HDR, sizeof(verdict), &verdict) < 0) 194 * Send a message verdict/mark 217 * Send a message verdict including the payload
|
H A D | queue_msg_obj.c | 435 * @arg verdict NF_DROP, NF_ACCEPT, NF_REPEAT, etc 438 unsigned int verdict) 440 msg->queue_msg_verdict = verdict; 468 __ADD(QUEUE_MSG_ATTR_VERDICT, verdict) 437 nfnl_queue_msg_set_verdict(struct nfnl_queue_msg *msg, unsigned int verdict) argument
|
/external/iptables/include/linux/netfilter_ipv4/ |
H A D | ip_queue.h | 45 unsigned long id; /* Packet ID for this verdict */ 52 ipq_verdict_msg_t verdict; member in union:ipq_peer_msg::__anon22617
|
/external/iptables/include/libipq/ |
H A D | libipq.h | 73 unsigned int verdict,
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
H A D | nfnetlink_queue.h | 9 NFQNL_MSG_VERDICT, /* verdict from userspace to kernel */ 58 __be32 verdict; member in struct:nfqnl_msg_verdict_hdr
|
H A D | x_tables.h | 66 int verdict; member in struct:xt_standard_target 81 /* CONTINUE verdict for targets */ 101 /* Standard return verdict, or do jump. */ 103 /* Error verdict. */
|
/external/libnl/include/linux/netfilter/ |
H A D | nfnetlink_queue.h | 13 NFQNL_MSG_VERDICT, /* verdict from userspace to kernel */ 54 __be32 verdict; member in struct:nfqnl_msg_verdict_hdr
|
/external/iptables/libiptc/ |
H A D | libip4tc.c | 156 printf("verdict=%s\n", 163 printf("verdict=%u\n", pos); 264 assert(t->verdict == -NF_DROP-1 265 || t->verdict == -NF_ACCEPT-1 266 || t->verdict == RETURN 267 || t->verdict < (int)h->entries->size); 269 if (t->verdict >= 0) { 270 STRUCT_ENTRY *te = get_entry(h, t->verdict); 280 assert(t->verdict == iptcb_entry2offset(h, e)+e->next_offset 286 if (t->verdict [all...] |
H A D | libiptc.c | 120 int verdict; /* verdict if builtin */ member in struct:chain_head 825 /* save verdict */ 827 h->chain_iterator_cur->verdict = *(const int *)data; 836 /* foot_offset points to verdict rule */ 1019 if (t->verdict < 0) { 1020 DEBUGP_C("standard, verdict=%d\n", t->verdict); 1022 } else if (t->verdict == r->offset+e->next_offset) { 1026 DEBUGP_C("jump, target=%u\n", t->verdict); 1572 standard_target_map(int verdict) argument 1672 iptcc_standard_map(struct rule_head *r, int verdict) argument [all...] |
/external/iptables/libipq/ |
H A D | libipq.c | 315 unsigned int verdict, 331 pm.msg.verdict.value = verdict; 332 pm.msg.verdict.id = id; 333 pm.msg.verdict.data_len = data_len; 313 ipq_set_verdict(const struct ipq_handle *h, ipq_id_t id, unsigned int verdict, size_t data_len, unsigned char *buf) argument
|
/external/iproute2/include/linux/netfilter/ |
H A D | x_tables.h | 66 int verdict; member in struct:xt_standard_target 81 /* CONTINUE verdict for targets */ 101 /* Standard return verdict, or do jump. */ 103 /* Error verdict. */
|
/external/iptables/include/linux/netfilter/ |
H A D | x_tables.h | 66 int verdict; member in struct:xt_standard_target 81 /* CONTINUE verdict for targets */ 101 /* Standard return verdict, or do jump. */ 103 /* Error verdict. */
|
/external/iptables/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 149 .target.verdict = -(__verdict) - 1, \
|