/external/chromium_org/chrome/renderer/safe_browsing/ |
D | phishing_classifier.cc | 190 ClientPhishingRequest verdict; in TermExtractionFinished() local 191 verdict.set_model_version(scorer_->model_version()); in TermExtractionFinished() 192 verdict.set_url(main_frame->document().url().spec()); in TermExtractionFinished() 200 ClientPhishingRequest::Feature* feature = verdict.add_feature_map(); in TermExtractionFinished() 206 verdict.add_shingle_hashes(*it); in TermExtractionFinished() 209 verdict.set_client_score(score); in TermExtractionFinished() 210 verdict.set_is_phishing(score >= kPhishyThreshold); in TermExtractionFinished() 211 RunCallback(verdict); in TermExtractionFinished() 228 void PhishingClassifier::RunCallback(const ClientPhishingRequest& verdict) { in RunCallback() argument 229 done_callback_.Run(verdict); in RunCallback() [all …]
|
D | phishing_classifier_browsertest.cc | 118 ClientPhishingRequest verdict; in RunPhishingClassifier() local 123 page_text, phishy_score, features, &verdict)); in RunPhishingClassifier() 124 return verdict.is_phishing(); in RunPhishingClassifier() 130 ClientPhishingRequest* verdict) { in DoRunPhishingClassifier() argument 139 base::Unretained(this), &run_loop, verdict)); in DoRunPhishingClassifier() 142 *phishy_score = verdict->client_score(); in DoRunPhishingClassifier() 143 for (int i = 0; i < verdict->feature_map_size(); ++i) { in DoRunPhishingClassifier() 144 features->AddRealFeature(verdict->feature_map(i).name(), in DoRunPhishingClassifier() 145 verdict->feature_map(i).value()); in DoRunPhishingClassifier() 152 const ClientPhishingRequest& verdict) { in ClassificationFinished() argument [all …]
|
D | phishing_classifier_delegate_browsertest.cc | 89 const ClientPhishingRequest* verdict() const { return verdict_.get(); } in verdict() function in safe_browsing::__anonc0e25a090111::InterceptingMessageFilter 116 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest); in OnPhishingDetectionDone() local 117 if (verdict->ParseFromString(verdict_str) && in OnPhishingDetectionDone() 118 verdict->IsInitialized()) { in OnPhishingDetectionDone() 119 verdict_.swap(verdict); in OnPhishingDetectionDone() 168 void RunClassificationDone(const ClientPhishingRequest& verdict) { in RunClassificationDone() argument 174 verdict)); in RunClassificationDone() 627 ClientPhishingRequest verdict; in IN_PROC_BROWSER_TEST_F() local 628 verdict.set_url(url.spec()); in IN_PROC_BROWSER_TEST_F() 629 verdict.set_client_score(0.8f); in IN_PROC_BROWSER_TEST_F() [all …]
|
D | phishing_classifier_delegate.cc | 208 const ClientPhishingRequest& verdict) { in ClassificationDone() argument 211 VLOG(2) << "Phishy verdict = " << verdict.is_phishing() in ClassificationDone() 212 << " score = " << verdict.client_score(); in ClassificationDone() 213 if (verdict.client_score() != PhishingClassifier::kInvalidScore) { in ClassificationDone() 214 DCHECK_EQ(last_url_sent_to_classifier_.spec(), verdict.url()); in ClassificationDone() 216 routing_id(), verdict.SerializeAsString())); in ClassificationDone()
|
D | phishing_classifier.h | 122 void RunCallback(const ClientPhishingRequest& verdict);
|
D | phishing_classifier_delegate.h | 94 void ClassificationDone(const ClientPhishingRequest& verdict);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
D | client_side_detection_host_unittest.cc | 102 ACTION_P(InvokeMalwareCallback, verdict) { in ACTION_P() argument 104 request->CopyFrom(*verdict); in ACTION_P() 479 ClientPhishingRequest verdict; in TEST_F() local 480 verdict.set_url("http://phishingurl.com/"); in TEST_F() 481 verdict.set_client_score(1.0f); in TEST_F() 482 verdict.set_is_phishing(true); in TEST_F() 486 InvokeCallbackArgument<2>(true, &verdict))); in TEST_F() 489 Pointee(PartiallyEqualVerdict(verdict)), _)) in TEST_F() 491 OnPhishingDetectionDone(verdict.SerializeAsString()); in TEST_F() 497 cb.Run(GURL(verdict.url()), false); in TEST_F() [all …]
|
D | client_side_detection_service.h | 108 ClientPhishingRequest* verdict, 113 ClientMalwareRequest* verdict, 215 ClientPhishingRequest* verdict, 219 ClientMalwareRequest* verdict,
|
D | client_side_detection_service.cc | 168 ClientPhishingRequest* verdict, in SendClientReportPhishingRequest() argument 174 weak_factory_.GetWeakPtr(), verdict, callback)); in SendClientReportPhishingRequest() 178 ClientMalwareRequest* verdict, in SendClientReportMalwareRequest() argument 184 weak_factory_.GetWeakPtr(), verdict, callback)); in SendClientReportMalwareRequest() 309 ClientPhishingRequest* verdict, in StartClientReportPhishingRequest() argument 312 scoped_ptr<ClientPhishingRequest> request(verdict); in StartClientReportPhishingRequest() 350 ClientMalwareRequest* verdict, in StartClientReportMalwareRequest() argument 353 scoped_ptr<ClientMalwareRequest> request(verdict); in StartClientReportMalwareRequest()
|
D | client_side_detection_host.cc | 559 scoped_ptr<ClientPhishingRequest> verdict(new ClientPhishingRequest); in OnPhishingDetectionDone() local 562 verdict->ParseFromString(verdict_str) && in OnPhishingDetectionDone() 563 verdict->IsInitialized()) { in OnPhishingDetectionDone() 568 if (verdict->is_phishing() || DidShowSBInterstitial()) { in OnPhishingDetectionDone() 576 verdict.release(), in OnPhishingDetectionDone()
|
D | download_protection_service.cc | 408 } else if (response.verdict() == ClientDownloadResponse::SAFE) { in OnURLFetchComplete() 418 } else if (response.verdict() == ClientDownloadResponse::DANGEROUS) { in OnURLFetchComplete() 421 } else if (response.verdict() == ClientDownloadResponse::UNCOMMON) { in OnURLFetchComplete() 424 } else if (response.verdict() == ClientDownloadResponse::DANGEROUS_HOST) { in OnURLFetchComplete() 428 response.verdict() == ClientDownloadResponse::POTENTIALLY_UNWANTED) { in OnURLFetchComplete() 433 << response.verdict(); in OnURLFetchComplete()
|
D | client_side_detection_host.h | 88 void OnPhishingDetectionDone(const std::string& verdict);
|
/external/libnl/lib/netfilter/ |
D | queue_msg.c | 168 struct nfqnl_msg_verdict_hdr verdict; in nfnl_queue_msg_build_verdict() local 176 verdict.id = htonl(nfnl_queue_msg_get_packetid(msg)); in nfnl_queue_msg_build_verdict() 177 verdict.verdict = htonl(nfnl_queue_msg_get_verdict(msg)); in nfnl_queue_msg_build_verdict() 178 if (nla_put(nlmsg, NFQA_VERDICT_HDR, sizeof(verdict), &verdict) < 0) in nfnl_queue_msg_build_verdict()
|
D | netfilter.c | 25 char *nfnl_verdict2str(unsigned int verdict, char *buf, size_t len) in nfnl_verdict2str() argument 27 return __type2str(verdict, buf, len, nfnl_verdicts, in nfnl_verdict2str()
|
D | queue_msg_obj.c | 438 unsigned int verdict) in nfnl_queue_msg_set_verdict() argument 440 msg->queue_msg_verdict = verdict; in nfnl_queue_msg_set_verdict() 468 __ADD(QUEUE_MSG_ATTR_VERDICT, verdict)
|
/external/iptables/libiptc/ |
D | libip4tc.c | 264 assert(t->verdict == -NF_DROP-1 265 || t->verdict == -NF_ACCEPT-1 266 || t->verdict == RETURN 267 || t->verdict < (int)h->entries->size); 269 if (t->verdict >= 0) { 270 STRUCT_ENTRY *te = get_entry(h, t->verdict); 280 assert(t->verdict == iptcb_entry2offset(h, e)+e->next_offset 286 if (t->verdict == RETURN 452 assert(t->verdict == -NF_DROP-1 || t->verdict == -NF_ACCEPT-1);
|
D | libiptc.c | 120 int verdict; /* verdict if builtin */ member 827 h->chain_iterator_cur->verdict = *(const int *)data; in __iptcc_p_del_policy() 1019 if (t->verdict < 0) { in cache_add_entry() 1020 DEBUGP_C("standard, verdict=%d\n", t->verdict); in cache_add_entry() 1022 } else if (t->verdict == r->offset+e->next_offset) { in cache_add_entry() 1026 DEBUGP_C("jump, target=%u\n", t->verdict); in cache_add_entry() 1077 lc = iptcc_find_chain_by_offset(h, t->verdict); in parse_table() 1129 t->verdict = r->jump->head_offset + IPTCB_CHAIN_START_SIZE; in iptcc_compile_rule() 1133 t->verdict = r->offset + r->size; in iptcc_compile_rule() 1181 foot->target.verdict = c->verdict; in iptcc_compile_chain() [all …]
|
/external/iptables/libipq/ |
D | libipq.c | 315 unsigned int verdict, in ipq_set_verdict() argument 331 pm.msg.verdict.value = verdict; in ipq_set_verdict() 332 pm.msg.verdict.id = id; in ipq_set_verdict() 333 pm.msg.verdict.data_len = data_len; in ipq_set_verdict()
|
/external/iptables/include/linux/netfilter_ipv4/ |
D | ip_queue.h | 52 ipq_verdict_msg_t verdict; member
|
/external/iptables/include/libipq/ |
D | libipq.h | 73 unsigned int verdict,
|
/external/libnl/include/linux/netfilter/ |
D | nfnetlink_queue.h | 54 __be32 verdict; member
|
/external/libpcap/ |
D | pcap-netfilter-linux.c | 84 …nt nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict); 362 nfqueue_send_verdict(const pcap_t *handle, u_int16_t group_id, u_int32_t id, u_int32_t verdict) in nfqueue_send_verdict() argument 368 msg.verdict = htonl(verdict); in nfqueue_send_verdict()
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | nfnetlink_queue.h | 58 __be32 verdict; member
|
/external/chromium_org/chrome/common/safe_browsing/ |
D | csd.proto | 82 // phishing verdict above if the URL does not match any expression 125 // malware warning, if the blacklist verdict is true. 274 required Verdict verdict = 1; field 278 // Only if verdict != SAFE. Localized based on request.locale. 317 // The original download response sent from the verdict server.
|
D | crx_info.proto | 30 optional Verdict verdict = 1 [default=NOT_IN_BLACKLIST]; field
|