/*
- * Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved
+ * Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved
*
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
*
- * http://www.apache.org/licenses/LICENSE-2.0
+ * http://www.apache.org/licenses/LICENSE-2.0
*
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
*/
/*
* @file csr-content-screening.h
* @version 1.0
* @brief Content screening to detect malware in files
*/
+
+
#ifndef __CSR_CONTENT_SCREENING_API_H_
#define __CSR_CONTENT_SCREENING_API_H_
+
#include <time.h>
#include <stddef.h>
+
#include <csr-content-screening-types.h>
#include <csr-error.h>
+
#ifdef __cplusplus
extern "C" {
#endif
+
/**
* @addtogroup CAPI_CSR_FRAMEWORK_CS_MODULE
* @{
* @partner
* @brief Initializes and returns a Content Screening API handle.
* @details A Content Screening API handle (or CSR CS handle) is obtained by this method.
- * The handle is required for subsequent CSR CS API calls.
+ * The handle is required for subsequent CSR CS API calls.
* @since_tizen 3.0
* @remarks @a handle should be released using csr_cs_context_destroy().
* @remarks Multiple handles can be obtained.
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE @a handle may be null
- * @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_SYSTEM System error
- *
+ * @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
+ * @retval #CSR_ERROR_SYSTEM System error
* @see csr_cs_context_destroy()
*/
int csr_cs_context_create(csr_cs_context_h *handle);
+
/**
* @partner
* @brief Releases all system resources associated with a Content Screening API handle.
* @since_tizen 3.0
- * @param[in] handle CSR CS context handle returned by csr_cs_context_create().
+ * @param[in] handle CSR CS context handle returned by csr_cs_context_create()
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_INVALID_PARAMETER @a ask_user is invalid
- * @retval #CSR_ERROR_SYSTEM System error
+ * @retval #CSR_ERROR_SYSTEM System error
* @see csr_cs_context_create()
* @see csr_cs_context_destroy()
*/
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_INVALID_PARAMETER @a usage is invalid
- * @retval #CSR_ERROR_SYSTEM System error
+ * @retval #CSR_ERROR_SYSTEM System error
* @see csr_cs_context_create()
* @see csr_cs_context_destroy()
*/
* @remarks Scan on cloud option is turned off as a default.
* @remarks If an engine does not support "scanning on cloud", this option is silently ignored.
* @param[in] handle CSR CS context handle returned by csr_cs_context_create()
- * @param[int] scan_on_cloud Flag to turn on(#true) or off(#false) of scanning on cloud option
+ * @param[in] scan_on_cloud Flag of scanning on cloud option
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @remarks @a malware will be released when @a handle is released using csr_cs_context_destroy().
* @remarks If multiple malwares exists in @a data, the malware with the highest severity will be returned.
* @param[in] handle CSR CS context handle returned by csr_cs_context_create()
- * @param[in] data A scan target data.
- * @param[in] length A size of a scan target data.
- * @param[out] malware A pointer of the detected malware handle. It can be null when there is no malware detected
+ * @param[in] data A scan target data
+ * @param[in] length A size of a scan target data
+ * @param[out] malware A pointer of the detected malware handle. It can be null when no malware detected
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* @retval #CSR_ERROR_SERVER Server has been failed for some reason
* @retval #CSR_ERROR_USER_RESPONSE_FAILED Getting user response is failed.
- * @a malware will be allocated on this error
+ * @a malware will be allocated on this error
* @retval #CSR_ERROR_ENGINE_NOT_EXIST No engine exists
* @retval #CSR_ERROR_ENGINE_DISABLED Engine is in disabled state
* @retval #CSR_ERROR_ENGINE_NOT_ACTIVATED Engine is not activated
* @remarks Scan file synchronously.
* @remarks @a malware will be released when @a handle is released using csr_cs_context_destroy().
* @remarks If multiple malwares exists in a file, the malware with the highest severity will be returned.
- * @param[in] handle CSR CS context handle returned by csr_cs_context_create().
- * @param[in] file_path A path of scan target file.
- * @param[out] malware A pointer of the detected malware handle. It can be null when there is no malware detected.
+ * @param[in] handle CSR CS context handle returned by csr_cs_context_create()
+ * @param[in] file_path A path of scan target file
+ * @param[out] malware A pointer of the detected malware handle. It can be null when no malware detected
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_PERMISSION_DENIED Access denied
* @retval #CSR_ERROR_NOT_SUPPORTED Device needed to run API is not supported
* @retval #CSR_ERROR_DB DB transaction error
- * @retval #CSR_ERROR_REMOVE_FAILED Removing file or application is failed when
- * malware exist and user select to remove by popup.
- * @a malware will be allocated on this error
- * @retval #CSR_ERROR_USER_RESPONSE_FAILED Getting user response is failed,
- @a malware will be allocated on this error
+ * @retval #CSR_ERROR_REMOVE_FAILED Removing file or application is failed when malware exist and user select to remove by popup.
+ * @a malware will be allocated on this error
+ * @retval #CSR_ERROR_USER_RESPONSE_FAILED Getting user response is failed
+ * @a malware will be allocated on this error
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST File not found
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* @retval #CSR_ERROR_SERVER Server has been failed for some reason
* @brief Sets a callback function for the case that a file scan is completed.
* @since_tizen 3.0
* @remarks Callback for asynchronous scan functions.
- * @param[in] handle CSR CS context handle returned by csr_cs_context_create().
+ * @param[in] handle CSR CS context handle returned by csr_cs_context_create()
* @param[in] callback A callback function for each file or application scanning done without any malware.
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_INVALID_PARAMETER @a callback is invalid
- * @retval #CSR_ERROR_SYSTEM System error
+ * @retval #CSR_ERROR_SYSTEM System error
* @see csr_cs_scan_files_async()
* @see csr_cs_scan_dir_async()
* @see csr_cs_scan_dirs_async()
* @since_tizen 3.0
* @remarks Callback for asynchronous scan functions.
* @param[in] handle CSR CS context handle returned by csr_cs_context_create()
- * @param[in] callback A callback function for each file or application scanning done with malware detected
+ * @param[in] callback A callback function for each file or application scanning done with malware detected
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @since_tizen 3.0
* @remarks Callback for asynchronous scan functions.
* @param[in] handle CSR CS context handle returned by csr_cs_context_create()
- * @param[in] callback A callback function for scanning completed successfully
+ * @param[in] callback A callback function for scanning completed successfully
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
/**
* @partner
- * @brief Sets a callback function for scanning canceled.
+ * @brief Sets a callback function for scanning cancelled.
* @since_tizen 3.0
* @remarks Callback for asynchronous scan functions.
* @remarks Client can cancel asynchronous scanning by csr_cs_cancel_scanning().
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_INVALID_PARAMETER @a callback is invalid
- * @retval #CSR_ERROR_SYSTEM System error
+ * @retval #CSR_ERROR_SYSTEM System error
* @see csr_cs_scan_files_async()
* @see csr_cs_scan_dir_async()
* @see csr_cs_scan_dirs_async()
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_INVALID_PARAMETER @a callback is invalid
- * @retval #CSR_ERROR_SYSTEM System error
+ * @retval #CSR_ERROR_SYSTEM System error
* @see csr_cs_scan_files_async()
* @see csr_cs_scan_dir_async()
* @see csr_cs_scan_dirs_async()
* @brief Scan files specified by an array of file paths for malware.
* @details If scanning of the single file is done without detected malware,
* csr_cs_file_scanned_cb() is called and else if malware detected
- * csr_cs_detected_cb() is called. If scanning is canceled by
+ * csr_cs_detected_cb() is called. If scanning is cancelled by
* csr_cs_cancel_scanning(), csr_cs_cancelled_cb() is called. If scanning is failed
* with error, csr_cs_error_cb() is called. If scanning is completed without
* error, csr_cs_completed_cb(). Every callbacks are registered by callback
* @a handle is released using csr_cs_context_destroy().
* @remarks If multiple malwares exists in a file, the malware with the highest
* severity will be returned for the file via csr_cs_set_detected_cb().
- * @param[in] handle CSR CS context handle returned by csr_cs_context_create().
- * @param[in] file_paths An array of scan target files.
- * @param[in] count A number of scan target files.
- * @param[in] user_data The pointer of a user data. It can be null
- * It is delivered back to the client when a callback function is called.
+ * @param[in] handle CSR CS context handle returned by csr_cs_context_create()
+ * @param[in] file_paths An array of scan target files
+ * @param[in] count A number of scan target files
+ * @param[in] user_data The pointer of a user data. It can be null.
+ * It is delivered back to the client when a callback function is called
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_ENGINE_DISABLED Engine is in disabled state
* @retval #CSR_ERROR_ENGINE_NOT_ACTIVATED Engine is not activated
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
- * @retval #CSR_ERROR_SYSTEM System error=
+ * @retval #CSR_ERROR_SYSTEM System error
* @pre It is required to set callbacks, csr_cs_completed_cb, csr_cs_error_cb(),
* csr_cs_cancel_scanning(), csr_cs_detected_cb(), and/or csr_cs_file_scanned_cb().
* @see csr_cs_set_file_scanned_cb()
/**
* @partner
* @brief Scans a directory specified by directory path for malware.
- *
* @details If scanning of the single file is done without detected malware,
* csr_cs_file_scanned_cb() is called and else if malware detected
- * csr_cs_detected_cb() is called. If scanning is canceled by
+ * csr_cs_detected_cb() is called. If scanning is cancelled by
* csr_cs_cancel_scanning(), csr_cs_cancelled_cb() is called. If scanning is failed
* with error, csr_cs_error_cb() is called. If scanning is completed without
* error, csr_cs_completed_cb(). Every callbacks are registered by callback
* severity will be returned for the file via csr_cs_set_detected_cb().
* @param[in] handle CSR CS context handle returned by csr_cs_context_create()
* @param[in] dir_path A path of scan target directory
- * @param[in] user_data The pointer of a user data. It can be null. It is used on
- * the callback functions which are registered to @a handle
+ * @param[in] user_data The pointer of a user data. It can be null.
+ * It is used on the callback functions which are registered to @a handle
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
- * @retval #CSR_ERROR_OUT_OF_MEMORYNot enough memory
+ * @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
* @retval #CSR_ERROR_INVALID_PARAMETER @a dir_path is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Access denied
* @retval #CSR_ERROR_NOT_SUPPORTED Device needed to run API is not supported
* @retval #CSR_ERROR_ENGINE_DISABLED Engine is in disabled state
* @retval #CSR_ERROR_ENGINE_NOT_ACTIVATED Engine is not activated
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
- * @retval #CSR_ERROR_SYSTEM System error
+ * @retval #CSR_ERROR_SYSTEM System error
* @pre It is required to set callbacks, csr_cs_completed_cb, csr_cs_error_cb(),
* csr_cs_cancel_scanning(), csr_cs_detected_cb(), and/or csr_cs_file_scanned_cb().
* @see csr_cs_set_file_scanned_cb()
* @brief Scan directories specified by an array of directory paths for malware.
* @details If scanning of the single file is done without detected malware,
* csr_cs_file_scanned_cb() is called and else if malware detected
- * csr_cs_detected_cb() is called. If scanning is canceled by
- * csr_cs_cancel_scanning(), csr_cs_canceled_cb() is called. If scanning is failed
+ * csr_cs_detected_cb() is called. If scanning is cancelled by
+ * csr_cs_cancel_scanning(), csr_cs_cancelled_cb() is called. If scanning is failed
* with error, csr_cs_error_cb() is called. If scanning is completed without
* error, csr_cs_completed_cb(). Every callbacks are registered by callback
* setter methods to @a handle and if callback is not registered, it will just be skipped to be called.
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
- * @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
+ * @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
* @retval #CSR_ERROR_INVALID_PARAMETER @a dir_paths is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Access denied
* @retval #CSR_ERROR_NOT_SUPPORTED Device needed to run API is not supported
/**
* @partner
* @brief Extracts the severity of a detected malware from the detected malware handle.
- *
* @since_tizen 3.0
- *
* @param[in] malware A detected malware handle returned by csr_cs_scan_data(),
* csr_cs_scan_file() or csr_cs_malware_list_get_malware()
* @param[out] severity A pointer of the severity of a detected malware
* @since_tizen 3.0
* @remarks @a name must be released using free().
* @param[in] malware A detected malware handle
- * @param[out]name A pointer of the name of a detected malware
+ * @param[out] name A pointer of the name of a detected malware
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
/**
* @partner
- * @brief Extracts a url that contains detailed information on vendor's web site from the detected malware handle.
+ * @brief Extracts an url that contains detailed information on vendor's web site from the detected malware handle.
* @since_tizen 3.0
* @remarks @a detailed_url must be released using free().
- * @param[in] malware A detected malware handle.
- * @param[out] detailed_url A pointer of a url that contains detailed information on
- * vendor's web site. It can be null if a vendor doesn't provide this information.
+ * @param[in] malware A detected malware handle
+ * @param[out] detailed_url A pointer of an url that contains detailed information on
+ * vendor's web site. It can be null if a vendor doesn't provide this information
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
- * @retval #CSR_ERROR_NONES uccessful
- * @retval #CSR_ERROR_INVALID_HANDLEInvalid detected malware handle
+ * @retval #CSR_ERROR_NONE Successful
+ * @retval #CSR_ERROR_INVALID_HANDLE Invalid detected malware handle
* @retval #CSR_ERROR_INVALID_PARAMETER @a detailed_url is invalid.
* @retval #CSR_ERROR_SYSTEM System error
*/
* @brief Extracts the time stamp when a malware is detected from the detected malware handle.
* @since_tizen 3.0
* @param[in] malware A detected malware handle
- * @param[out] timestamp A pointer of the time stamp in milliseconds when a malware is detected.
+ * @param[out] timestamp A pointer of the time stamp in milli second when a malware is detected
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @brief Extracts the file name where a malware is detected from the detected malware handle.
* @since_tizen 3.0
* @remarks @a file_name must be released using free().
- * @param[in] malware A detected malware handle.
- * @param[out] file_name A pointer of the file name where a malware is detected. The
- * file name is null for csr_cs_scan_data()
+ * @param[in] malware A detected malware handle
+ * @param[out] file_name A pointer of the file name where a malware is detected. The file name is null for csr_cs_scan_data()
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @partner
* @brief Extracts a user response of a popup from the detected malware handle.
* @since_tizen 3.0
- * @param[in] malware A detected malware handle.
- * @param[out] response A pointer of the user response.
+ * @param[in] malware A detected malware handle
+ * @param[out] response A pointer of the user response
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @partner
* @brief Checks if a malware was detected in an application or in a file.
* @since_tizen 3.0
- * @param[in] malware A detected malware handle.
+ * @param[in] malware A detected malware handle
* @param[out] is_app A pointer of a flag indicating the position where a malware was detected.
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @partner
* @brief Extracts the package id of an application where a malware is detected from detected malware handle.
* @since_tizen 3.0
- * @remarks @a pkg_id must be released using free().
- * @param[in] malware A detected malware handle.
+ * @remarks @a pkg_id must be released using free().
+ * @param[in] malware A detected malware handle
* @param[out] pkg_id A pointer of the package id where a malware is detected.
- * It is null when a malware was not detected in an application
+ * It is null when a malware was not detected in an application
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @privilege %http://tizen.org/privilege/antivirus.admin
* @remarks Detected malware can be removed or ignored.
* @param[in] handle CSR CS context handle returned by csr_cs_context_create()
- * @param[in] malware A handle of a detected malwar
+ * @param[in] malware A handle of a detected malware
* @param[in] action An action to be taken
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @remarks @a file_path will be null if it's result of csr_cs_scan_data().
* @param[in] handle CSR CS context handle returned by csr_cs_context_create()
* @param[in] file_path A path of a detected malware file
- * @param[out] malware A pointer of the detected malware handle. It can be null when there is no malware file
+ * @param[out] malware A pointer of the detected malware handle. It can be null when no malware file
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a malware is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a malware is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED No permission to remove
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST No malware file
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
- * @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER@a dir_paths, @a list, or @a count is invalid
- * @retval #CSR_ERROR_PERMISSION_DENIEDNo permission to remove
- * @retval #CSR_ERROR_FILE_DO_NOT_EXISTNo malware file
- * @retval #CSR_ERROR_SOCKETSocket error between client and server
- * @retval #CSR_ERROR_SERVERServer has been failed for some reason
- * @retval #CSR_ERROR_DBDB transaction error
- * @retval #CSR_ERROR_SYSTEM System error
+ * @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a dir_paths, @a list, or @a count is invalid
+ * @retval #CSR_ERROR_PERMISSION_DENIED No permission to remove
+ * @retval #CSR_ERROR_FILE_DO_NOT_EXIST No malware file
+ * @retval #CSR_ERROR_SOCKET Socket error between client and server
+ * @retval #CSR_ERROR_SERVER Server has been failed for some reason
+ * @retval #CSR_ERROR_DB DB transaction error
+ * @retval #CSR_ERROR_SYSTEM System error
*/
int csr_cs_get_detected_malwares(csr_cs_context_h handle, const char *dir_paths[], size_t count, csr_cs_malware_list_h *list, size_t *list_count);
* @since_tizen 3.0
* @privlevel partner
* @privilege %http://tizen.org/privilege/antivirus.scan
- * @remarks @a malware will be released when @a handle is destroyed.
- * @param[in] handle CSR CS context handle returned by csr_cs_context_create().
- * @param[in] file_path A path of a ignored malware file.
- * @param[out] malware A pointer of the detected malware handle. It can be null when there is no ignored file
+ * @remarks @a malware will be released when @a handle is destroyed.
+ * @param[in] handle CSR CS context handle returned by csr_cs_context_create()
+ * @param[in] file_path A path of a ignored malware file
+ * @param[out] malware A pointer of the detected malware handle. It can be null when no ignored file
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @privlevel partner
* @privilege %http://tizen.org/privilege/antivirus.scan
* @remarks @a list will be released when @a handle is destroyed.
- * @param[in] handle CSR CS context handle returned by csr_cs_context_create().
- * @param[in] dir_paths A directory path where ignored malware files exists.
+ * @param[in] handle CSR CS context handle returned by csr_cs_context_create()
+ * @param[in] dir_paths A directory path where ignored malware files exists
* @param[in] count Count of array element of @a dir_paths
- * @param[out] list A pointer of the detected malware list handle. It can be null when there is no ignored file
+ * @param[out] list A pointer of the detected malware list handle. It can be null when no ignored file
* @param[out] list_count Count of ignored malware files which existed in the specified directory
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @brief Extracts the detected malware handle from the detected malware list handle.
* @since_tizen 3.0
* @remarks @a malware will be released when a context is released using csr_cs_context_destroy().
- * @param[in] list A detected malware list handle returned by csr_cs_get_detected_malwares() or
- * csr_cs_get_ignored_malwares()
+ * @param[in] list A detected malware list handle returned by csr_cs_get_detected_malwares() or csr_cs_get_ignored_malwares()
* @param[in] index An index of a target detected malware handle to get
* @param[out] malware A pointer of the detected malware handle. It can be null when index is invalid
* @return #CSR_ERROR_NONE on success,
* otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid list
- * @retval #CSR_ERROR_INVALID_PARAMETER @a index or @a malware is invalid.
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a index or @a malware is invalid
* @retval #CSR_ERROR_SYSTEM System error
*/
int csr_cs_malware_list_get_malware(csr_cs_malware_list_h list, size_t index, csr_cs_malware_h *malware);
* @}
*/
+
#ifdef __cplusplus
}
#endif
+
#endif