Home
last modified time | relevance | path

Searched refs:verdict (Results 1 – 25 of 37) sorted by relevance

12

/external/chromium_org/chrome/renderer/safe_browsing/
Dphishing_classifier.cc190 ClientPhishingRequest verdict; in TermExtractionFinished() local
191 verdict.set_model_version(scorer_->model_version()); in TermExtractionFinished()
192 verdict.set_url(main_frame->document().url().spec()); in TermExtractionFinished()
200 ClientPhishingRequest::Feature* feature = verdict.add_feature_map(); in TermExtractionFinished()
206 verdict.add_shingle_hashes(*it); in TermExtractionFinished()
209 verdict.set_client_score(score); in TermExtractionFinished()
210 verdict.set_is_phishing(score >= kPhishyThreshold); in TermExtractionFinished()
211 RunCallback(verdict); in TermExtractionFinished()
228 void PhishingClassifier::RunCallback(const ClientPhishingRequest& verdict) { in RunCallback() argument
229 done_callback_.Run(verdict); in RunCallback()
[all …]
Dphishing_classifier_browsertest.cc118 ClientPhishingRequest verdict; in RunPhishingClassifier() local
123 page_text, phishy_score, features, &verdict)); in RunPhishingClassifier()
124 return verdict.is_phishing(); in RunPhishingClassifier()
130 ClientPhishingRequest* verdict) { in DoRunPhishingClassifier() argument
139 base::Unretained(this), &run_loop, verdict)); in DoRunPhishingClassifier()
142 *phishy_score = verdict->client_score(); in DoRunPhishingClassifier()
143 for (int i = 0; i < verdict->feature_map_size(); ++i) { in DoRunPhishingClassifier()
144 features->AddRealFeature(verdict->feature_map(i).name(), in DoRunPhishingClassifier()
145 verdict->feature_map(i).value()); in DoRunPhishingClassifier()
152 const ClientPhishingRequest& verdict) { in ClassificationFinished() argument
[all …]
Dphishing_classifier_delegate_browsertest.cc89 const ClientPhishingRequest* verdict() const { return verdict_.get(); } in verdict() function in safe_browsing::__anonc0e25a090111::InterceptingMessageFilter
116 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest); in OnPhishingDetectionDone() local
117 if (verdict->ParseFromString(verdict_str) && in OnPhishingDetectionDone()
118 verdict->IsInitialized()) { in OnPhishingDetectionDone()
119 verdict_.swap(verdict); in OnPhishingDetectionDone()
168 void RunClassificationDone(const ClientPhishingRequest& verdict) { in RunClassificationDone() argument
174 verdict)); in RunClassificationDone()
627 ClientPhishingRequest verdict; in IN_PROC_BROWSER_TEST_F() local
628 verdict.set_url(url.spec()); in IN_PROC_BROWSER_TEST_F()
629 verdict.set_client_score(0.8f); in IN_PROC_BROWSER_TEST_F()
[all …]
Dphishing_classifier_delegate.cc208 const ClientPhishingRequest& verdict) { in ClassificationDone() argument
211 VLOG(2) << "Phishy verdict = " << verdict.is_phishing() in ClassificationDone()
212 << " score = " << verdict.client_score(); in ClassificationDone()
213 if (verdict.client_score() != PhishingClassifier::kInvalidScore) { in ClassificationDone()
214 DCHECK_EQ(last_url_sent_to_classifier_.spec(), verdict.url()); in ClassificationDone()
216 routing_id(), verdict.SerializeAsString())); in ClassificationDone()
Dphishing_classifier.h122 void RunCallback(const ClientPhishingRequest& verdict);
Dphishing_classifier_delegate.h94 void ClassificationDone(const ClientPhishingRequest& verdict);
/external/chromium_org/chrome/browser/safe_browsing/
Dclient_side_detection_host_unittest.cc102 ACTION_P(InvokeMalwareCallback, verdict) { in ACTION_P() argument
104 request->CopyFrom(*verdict); in ACTION_P()
479 ClientPhishingRequest verdict; in TEST_F() local
480 verdict.set_url("http://phishingurl.com/"); in TEST_F()
481 verdict.set_client_score(1.0f); in TEST_F()
482 verdict.set_is_phishing(true); in TEST_F()
486 InvokeCallbackArgument<2>(true, &verdict))); in TEST_F()
489 Pointee(PartiallyEqualVerdict(verdict)), _)) in TEST_F()
491 OnPhishingDetectionDone(verdict.SerializeAsString()); in TEST_F()
497 cb.Run(GURL(verdict.url()), false); in TEST_F()
[all …]
Dclient_side_detection_service.h108 ClientPhishingRequest* verdict,
113 ClientMalwareRequest* verdict,
215 ClientPhishingRequest* verdict,
219 ClientMalwareRequest* verdict,
Dclient_side_detection_service.cc168 ClientPhishingRequest* verdict, in SendClientReportPhishingRequest() argument
174 weak_factory_.GetWeakPtr(), verdict, callback)); in SendClientReportPhishingRequest()
178 ClientMalwareRequest* verdict, in SendClientReportMalwareRequest() argument
184 weak_factory_.GetWeakPtr(), verdict, callback)); in SendClientReportMalwareRequest()
309 ClientPhishingRequest* verdict, in StartClientReportPhishingRequest() argument
312 scoped_ptr<ClientPhishingRequest> request(verdict); in StartClientReportPhishingRequest()
350 ClientMalwareRequest* verdict, in StartClientReportMalwareRequest() argument
353 scoped_ptr<ClientMalwareRequest> request(verdict); in StartClientReportMalwareRequest()
Dclient_side_detection_host.cc559 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest); in OnPhishingDetectionDone() local
562 verdict->ParseFromString(verdict_str) && in OnPhishingDetectionDone()
563 verdict->IsInitialized()) { in OnPhishingDetectionDone()
568 if (verdict->is_phishing() || DidShowSBInterstitial()) { in OnPhishingDetectionDone()
576 verdict.release(), in OnPhishingDetectionDone()
Ddownload_protection_service.cc408 } else if (response.verdict() == ClientDownloadResponse::SAFE) { in OnURLFetchComplete()
418 } else if (response.verdict() == ClientDownloadResponse::DANGEROUS) { in OnURLFetchComplete()
421 } else if (response.verdict() == ClientDownloadResponse::UNCOMMON) { in OnURLFetchComplete()
424 } else if (response.verdict() == ClientDownloadResponse::DANGEROUS_HOST) { in OnURLFetchComplete()
428 response.verdict() == ClientDownloadResponse::POTENTIALLY_UNWANTED) { in OnURLFetchComplete()
433 << response.verdict(); in OnURLFetchComplete()
Dclient_side_detection_host.h88 void OnPhishingDetectionDone(const std::string& verdict);
/external/libnl/lib/netfilter/
Dqueue_msg.c168 struct nfqnl_msg_verdict_hdr verdict; in nfnl_queue_msg_build_verdict() local
176 verdict.id = htonl(nfnl_queue_msg_get_packetid(msg)); in nfnl_queue_msg_build_verdict()
177 verdict.verdict = htonl(nfnl_queue_msg_get_verdict(msg)); in nfnl_queue_msg_build_verdict()
178 if (nla_put(nlmsg, NFQA_VERDICT_HDR, sizeof(verdict), &verdict) < 0) in nfnl_queue_msg_build_verdict()
Dnetfilter.c25 char *nfnl_verdict2str(unsigned int verdict, char *buf, size_t len) in nfnl_verdict2str() argument
27 return __type2str(verdict, buf, len, nfnl_verdicts, in nfnl_verdict2str()
Dqueue_msg_obj.c438 unsigned int verdict) in nfnl_queue_msg_set_verdict() argument
440 msg->queue_msg_verdict = verdict; in nfnl_queue_msg_set_verdict()
468 __ADD(QUEUE_MSG_ATTR_VERDICT, verdict)
/external/iptables/libiptc/
Dlibip4tc.c264 assert(t->verdict == -NF_DROP-1
265 || t->verdict == -NF_ACCEPT-1
266 || t->verdict == RETURN
267 || t->verdict < (int)h->entries->size);
269 if (t->verdict >= 0) {
270 STRUCT_ENTRY *te = get_entry(h, t->verdict);
280 assert(t->verdict == iptcb_entry2offset(h, e)+e->next_offset
286 if (t->verdict == RETURN
452 assert(t->verdict == -NF_DROP-1 || t->verdict == -NF_ACCEPT-1);
Dlibiptc.c120 int verdict; /* verdict if builtin */ member
827 h->chain_iterator_cur->verdict = *(const int *)data; in __iptcc_p_del_policy()
1019 if (t->verdict < 0) { in cache_add_entry()
1020 DEBUGP_C("standard, verdict=%d\n", t->verdict); in cache_add_entry()
1022 } else if (t->verdict == r->offset+e->next_offset) { in cache_add_entry()
1026 DEBUGP_C("jump, target=%u\n", t->verdict); in cache_add_entry()
1077 lc = iptcc_find_chain_by_offset(h, t->verdict); in parse_table()
1129 t->verdict = r->jump->head_offset + IPTCB_CHAIN_START_SIZE; in iptcc_compile_rule()
1133 t->verdict = r->offset + r->size; in iptcc_compile_rule()
1181 foot->target.verdict = c->verdict; in iptcc_compile_chain()
[all …]
/external/iptables/libipq/
Dlibipq.c315 unsigned int verdict, in ipq_set_verdict() argument
331 pm.msg.verdict.value = verdict; in ipq_set_verdict()
332 pm.msg.verdict.id = id; in ipq_set_verdict()
333 pm.msg.verdict.data_len = data_len; in ipq_set_verdict()
/external/iptables/include/linux/netfilter_ipv4/
Dip_queue.h52 ipq_verdict_msg_t verdict; member
/external/iptables/include/libipq/
Dlibipq.h73 unsigned int verdict,
/external/libnl/include/linux/netfilter/
Dnfnetlink_queue.h54 __be32 verdict; member
/external/libpcap/
Dpcap-netfilter-linux.c84 …nt nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict);
362 nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict) in nfqueue_send_verdict() argument
368 msg.verdict = htonl(verdict); in nfqueue_send_verdict()
/external/kernel-headers/original/uapi/linux/netfilter/
Dnfnetlink_queue.h58 __be32 verdict; member
/external/chromium_org/chrome/common/safe_browsing/
Dcsd.proto82 // phishing verdict above if the URL does not match any expression
125 // malware warning, if the blacklist verdict is true.
274 required Verdict verdict = 1; field
278 // Only if verdict != SAFE. Localized based on request.locale.
317 // The original download response sent from the verdict server.
Dcrx_info.proto30 optional Verdict verdict = 1 [default=NOT_IN_BLACKLIST]; field

12