} // end of namespace
API
-int csr_cs_context_create(csr_cs_context_h *phandle)
+int csr_cs_context_create(csr_cs_context_h *handle)
{
EXCEPTION_SAFE_START
- if (phandle == nullptr)
+ if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- *phandle = reinterpret_cast<csr_cs_context_h>(
+ *handle = reinterpret_cast<csr_cs_context_h>(
new Client::HandleExt(SockId::CS, ContextShPtr(new CsContext())));
return CSR_ERROR_NONE;
API
int csr_cs_scan_data(csr_cs_context_h handle, const unsigned char *data,
- size_t length, csr_cs_malware_h *pdetected)
+ size_t length, csr_cs_malware_h *malware)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pdetected == nullptr || data == nullptr)
+ else if (malware == nullptr || data == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
auto hExt = reinterpret_cast<Client::HandleExt *>(handle);
if (ret.second)
hExt->add(ResultPtr(ret.second));
- *pdetected = reinterpret_cast<csr_cs_malware_h>(ret.second);
+ *malware = reinterpret_cast<csr_cs_malware_h>(ret.second);
return ret.first;
API
int csr_cs_scan_file(csr_cs_context_h handle, const char *file_path,
- csr_cs_malware_h *pdetected)
+ csr_cs_malware_h *malware)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pdetected == nullptr || file_path == nullptr || file_path[0] == '\0')
+ else if (malware == nullptr || file_path == nullptr || file_path[0] == '\0')
return CSR_ERROR_INVALID_PARAMETER;
auto hExt = reinterpret_cast<Client::HandleExt *>(handle);
if (ret.second)
hExt->add(ResultPtr(ret.second));
- *pdetected = reinterpret_cast<csr_cs_malware_h>(ret.second);
+ *malware = reinterpret_cast<csr_cs_malware_h>(ret.second);
return ret.first;
}
API
-int csr_cs_malware_get_severity(csr_cs_malware_h detected, csr_cs_severity_level_e *pseverity)
+int csr_cs_malware_get_severity(csr_cs_malware_h malware, csr_cs_severity_level_e *severity)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pseverity == nullptr)
+ else if (severity == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- *pseverity = reinterpret_cast<CsDetected *>(detected)->severity;
+ *severity = reinterpret_cast<CsDetected *>(malware)->severity;
return CSR_ERROR_NONE;
}
API
-int csr_cs_malware_get_malware_name(csr_cs_malware_h detected, char **pmalware_name)
+int csr_cs_malware_get_malware_name(csr_cs_malware_h malware, char **malware_name)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pmalware_name == nullptr)
+ else if (malware_name == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- auto malware_name =
- strdup(reinterpret_cast<CsDetected *>(detected)->malwareName.c_str());
+ auto name = strdup(reinterpret_cast<CsDetected *>(malware)->malwareName.c_str());
- if (malware_name == nullptr)
+ if (name == nullptr)
return CSR_ERROR_OUT_OF_MEMORY;
- *pmalware_name = malware_name;
+ *malware_name = name;
return CSR_ERROR_NONE;
}
API
-int csr_cs_malware_get_detailed_url(csr_cs_malware_h detected, char **pdetailed_url)
+int csr_cs_malware_get_detailed_url(csr_cs_malware_h malware, char **detailed_url)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pdetailed_url == nullptr)
+ else if (detailed_url == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- auto detailed_url = strdup(
- reinterpret_cast<CsDetected *>(detected)->detailedUrl.c_str());
+ auto url = strdup(reinterpret_cast<CsDetected *>(malware)->detailedUrl.c_str());
- if (detailed_url == nullptr)
+ if (url == nullptr)
return CSR_ERROR_OUT_OF_MEMORY;
- *pdetailed_url = detailed_url;
+ *detailed_url = url;
return CSR_ERROR_NONE;
}
API
-int csr_cs_malware_get_timestamp(csr_cs_malware_h detected, time_t *ptimestamp)
+int csr_cs_malware_get_timestamp(csr_cs_malware_h malware, time_t *timestamp)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (ptimestamp == nullptr)
+ else if (timestamp == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- *ptimestamp = reinterpret_cast<CsDetected *>(detected)->ts;
+ *timestamp = reinterpret_cast<CsDetected *>(malware)->ts;
return CSR_ERROR_NONE;
}
API
-int csr_cs_malware_get_file_name(csr_cs_malware_h detected, char **pfile_name)
+int csr_cs_malware_get_file_name(csr_cs_malware_h malware, char **file_name)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pfile_name == nullptr)
+ else if (file_name == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- auto file_name = strdup(
- reinterpret_cast<CsDetected *>(detected)->targetName.c_str());
+ auto fname = strdup(reinterpret_cast<CsDetected *>(malware)->targetName.c_str());
- if (file_name == nullptr)
+ if (fname == nullptr)
return CSR_ERROR_OUT_OF_MEMORY;
- *pfile_name = file_name;
+ *file_name = fname;
return CSR_ERROR_NONE;
}
API
-int csr_cs_malware_get_user_response(csr_cs_malware_h detected,
- csr_cs_user_response_e *presponse)
+int csr_cs_malware_get_user_response(csr_cs_malware_h malware, csr_cs_user_response_e *response)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (presponse == nullptr)
+ else if (response == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- *presponse = reinterpret_cast<CsDetected *>(detected)->response;
+ *response = reinterpret_cast<CsDetected *>(malware)->response;
return CSR_ERROR_NONE;
}
API
-int csr_cs_malware_is_app(csr_cs_malware_h detected, bool *pis_app)
+int csr_cs_malware_is_app(csr_cs_malware_h malware, bool *is_app)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pis_app == nullptr)
+ else if (is_app == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- *pis_app = reinterpret_cast<CsDetected *>(detected)->isApp;
+ *is_app = reinterpret_cast<CsDetected *>(malware)->isApp;
return CSR_ERROR_NONE;
}
API
-int csr_cs_malware_get_pkg_id(csr_cs_malware_h detected, char **ppkg_id)
+int csr_cs_malware_get_pkg_id(csr_cs_malware_h malware, char **pkg_id)
{
EXCEPTION_SAFE_START
- if (detected == nullptr)
+ if (malware == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (ppkg_id == nullptr)
+ else if (pkg_id == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- auto pkg_id = strdup(
- reinterpret_cast<CsDetected *>(detected)->pkgId.c_str());
+ auto pakage_id = strdup(
+ reinterpret_cast<CsDetected *>(malware)->pkgId.c_str());
- if (pkg_id == nullptr)
+ if (pakage_id == nullptr)
return CSR_ERROR_OUT_OF_MEMORY;
- *ppkg_id = pkg_id;
+ *pkg_id = pakage_id;
return CSR_ERROR_NONE;
API
int csr_cs_judge_detected_malware(csr_cs_context_h handle,
- csr_cs_malware_h detected, csr_cs_action_e action)
+ csr_cs_malware_h malware, csr_cs_action_e action)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (detected == nullptr || !_isValid(action))
+ else if (malware == nullptr || !_isValid(action))
return CSR_ERROR_INVALID_PARAMETER;
auto hExt = reinterpret_cast<Client::HandleExt *>(handle);
return hExt->dispatch<int>(CommandId::JUDGE_STATUS,
- reinterpret_cast<CsDetected *>(detected)->targetName,
+ reinterpret_cast<CsDetected *>(malware)->targetName,
static_cast<int>(action));
EXCEPTION_SAFE_END
API
int csr_cs_get_detected_malware(csr_cs_context_h handle, const char *file_path,
- csr_cs_malware_h *pdetected)
+ csr_cs_malware_h *malware)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (file_path == nullptr || pdetected == nullptr)
+ else if (file_path == nullptr || malware == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
auto hExt = reinterpret_cast<Client::HandleExt *>(handle);
if (ret.second)
hExt->add(ResultPtr(ret.second));
- *pdetected = reinterpret_cast<csr_cs_malware_h>(ret.second);
+ *malware = reinterpret_cast<csr_cs_malware_h>(ret.second);
return ret.first;
API
int csr_cs_get_detected_malwares(csr_cs_context_h handle,
const char *dir_paths[], size_t count,
- csr_cs_malware_list_h *plist, size_t *pcount)
+ csr_cs_malware_list_h *list, size_t *list_count)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (dir_paths == nullptr || count == 0 || plist == nullptr || pcount == nullptr)
+ else if (dir_paths == nullptr || count == 0 || list == nullptr || list_count == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
auto hExt = reinterpret_cast<Client::HandleExt *>(handle);
while (auto dptr = cptrList.pop())
resultListPtr->emplace_back(dptr);
- *plist = reinterpret_cast<csr_cs_malware_list_h>(resultListPtr.get());
- *pcount = resultListPtr->size();
+ *list = reinterpret_cast<csr_cs_malware_list_h>(resultListPtr.get());
+ *list_count = resultListPtr->size();
hExt->add(std::move(resultListPtr));
} else {
- *plist = nullptr;
- *pcount = 0;
+ *list = nullptr;
+ *list_count = 0;
}
return ret.first;
API
int csr_cs_get_ignored_malware(csr_cs_context_h handle, const char *file_path,
- csr_cs_malware_h *pdetected)
+ csr_cs_malware_h *malware)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (file_path == nullptr || pdetected == nullptr)
+ else if (file_path == nullptr || malware == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
auto hExt = reinterpret_cast<Client::HandleExt *>(handle);
if (ret.second)
hExt->add(ResultPtr(ret.second));
- *pdetected = reinterpret_cast<csr_cs_malware_h>(ret.second);
+ *malware = reinterpret_cast<csr_cs_malware_h>(ret.second);
return ret.first;
API
int csr_cs_get_ignored_malwares(csr_cs_context_h handle,
const char *dir_paths[], size_t count,
- csr_cs_malware_list_h *plist, size_t *pcount)
+ csr_cs_malware_list_h *list, size_t *list_count)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (dir_paths == nullptr || count == 0 || plist == nullptr || pcount == nullptr)
+ else if (dir_paths == nullptr || count == 0 || list == nullptr || list_count == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
auto hExt = reinterpret_cast<Client::HandleExt *>(handle);
while (auto dptr = cptrList.pop())
resultListPtr->emplace_back(dptr);
- *plist = reinterpret_cast<csr_cs_malware_list_h>(resultListPtr.get());
- *pcount = resultListPtr->size();
+ *list = reinterpret_cast<csr_cs_malware_list_h>(resultListPtr.get());
+ *list_count = resultListPtr->size();
hExt->add(std::move(resultListPtr));
} else {
- *plist = nullptr;
- *pcount = 0;
+ *list = nullptr;
+ *list_count = 0;
}
return ret.first;
}
API
-int csr_cs_malware_list_get_detected(csr_cs_malware_list_h list, size_t index,
- csr_cs_malware_h *pdetected)
+int csr_cs_malware_list_get_malware(csr_cs_malware_list_h list, size_t index,
+ csr_cs_malware_h *malware)
{
EXCEPTION_SAFE_START
if (list == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pdetected == nullptr)
+ else if (malware == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
auto dListPtr = reinterpret_cast<ResultList *>(list);
if (index >= dListPtr->size())
return CSR_ERROR_INVALID_PARAMETER;
- *pdetected = reinterpret_cast<csr_cs_malware_h>(dListPtr->at(index).get());
+ *malware = reinterpret_cast<csr_cs_malware_h>(dListPtr->at(index).get());
return CSR_ERROR_NONE;
}
API
-int csr_get_current_engine(csr_engine_id_e id, csr_engine_h *pengine)
+int csr_get_current_engine(csr_engine_id_e id, csr_engine_h *engine)
{
EXCEPTION_SAFE_START
- if (pengine == nullptr || !_isValid(id))
+ if (engine == nullptr || !_isValid(id))
return CSR_ERROR_INVALID_PARAMETER;
auto handle = new Csr::Client::Handle(SockId::ADMIN, std::make_shared<EmContext>());
handle->getContext()->set(static_cast<int>(EmContext::Key::EngineId),
static_cast<int>(id));
- *pengine = reinterpret_cast<csr_engine_h>(handle);
+ *engine = reinterpret_cast<csr_engine_h>(handle);
return CSR_ERROR_NONE;
}
API
-int csr_engine_get_vendor(csr_engine_h engine, char **pvendor)
+int csr_engine_get_vendor(csr_engine_h engine, char **vendor)
{
EXCEPTION_SAFE_START
- STRING_GETTER(engine, EM_GET_VENDOR, pvendor);
+ STRING_GETTER(engine, EM_GET_VENDOR, vendor);
EXCEPTION_SAFE_END
}
API
-int csr_engine_get_name(csr_engine_h engine, char **pname)
+int csr_engine_get_name(csr_engine_h engine, char **name)
{
EXCEPTION_SAFE_START
- STRING_GETTER(engine, EM_GET_NAME, pname);
+ STRING_GETTER(engine, EM_GET_NAME, name);
EXCEPTION_SAFE_END
}
API
-int csr_engine_get_version(csr_engine_h engine, char **pversion)
+int csr_engine_get_version(csr_engine_h engine, char **version)
{
EXCEPTION_SAFE_START
- STRING_GETTER(engine, EM_GET_VERSION, pversion);
+ STRING_GETTER(engine, EM_GET_VERSION, version);
EXCEPTION_SAFE_END
}
API
-int csr_engine_get_data_version(csr_engine_h engine, char **pversion)
+int csr_engine_get_data_version(csr_engine_h engine, char **version)
{
EXCEPTION_SAFE_START
- STRING_GETTER(engine, EM_GET_DATA_VERSION, pversion);
+ STRING_GETTER(engine, EM_GET_DATA_VERSION, version);
EXCEPTION_SAFE_END
}
API
-int csr_engine_get_latest_update_time(csr_engine_h engine, time_t *ptime)
+int csr_engine_get_latest_update_time(csr_engine_h engine, time_t *time)
{
EXCEPTION_SAFE_START
- GETTER_PARAM_CHECK(engine, ptime);
+ GETTER_PARAM_CHECK(engine, time);
auto h = reinterpret_cast<Csr::Client::Handle *>(engine);
auto ret = h->dispatch<std::pair<int, std::shared_ptr<int64_t>>>(
Csr::CommandId::EM_GET_UPDATED_TIME, h->getContext());
if (ret.first == CSR_ERROR_NONE && ret.second)
- *ptime = static_cast<time_t>(*ret.second);
+ *time = static_cast<time_t>(*ret.second);
return ret.first;
}
API
-int csr_engine_get_activated(csr_engine_h engine, csr_activated_e *pactivated)
+int csr_engine_get_activated(csr_engine_h engine, csr_activated_e *activated)
{
EXCEPTION_SAFE_START
- GETTER_PARAM_CHECK(engine, pactivated);
+ GETTER_PARAM_CHECK(engine, activated);
auto h = reinterpret_cast<Csr::Client::Handle *>(engine);
auto ret = h->dispatch<std::pair<int, std::shared_ptr<int>>>(
Csr::CommandId::EM_GET_ACTIVATED, h->getContext());
if (ret.first == CSR_ERROR_NONE && ret.second)
- *pactivated = static_cast<csr_activated_e>(*ret.second);
+ *activated = static_cast<csr_activated_e>(*ret.second);
return ret.first;
}
API
-int csr_engine_get_state(csr_engine_h engine, csr_state_e *pstate)
+int csr_engine_get_state(csr_engine_h engine, csr_state_e *state)
{
EXCEPTION_SAFE_START
- GETTER_PARAM_CHECK(engine, pstate);
+ GETTER_PARAM_CHECK(engine, state);
auto h = reinterpret_cast<Csr::Client::Handle *>(engine);
auto ret = h->dispatch<std::pair<int, std::shared_ptr<int>>>(
Csr::CommandId::EM_GET_STATE, h->getContext());
if (ret.first == CSR_ERROR_NONE && ret.second)
- *pstate = static_cast<csr_state_e>(*ret.second);
+ *state = static_cast<csr_state_e>(*ret.second);
return ret.first;
using namespace Csr;
API
-int csr_wp_context_create(csr_wp_context_h *phandle)
+int csr_wp_context_create(csr_wp_context_h *handle)
{
EXCEPTION_SAFE_START
- if (phandle == nullptr)
+ if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- *phandle = reinterpret_cast<csr_wp_context_h>(
+ *handle = reinterpret_cast<csr_wp_context_h>(
new Client::Handle(SockId::WP, std::make_shared<WpContext>()));
return CSR_ERROR_NONE;
API
int csr_wp_check_url(csr_wp_context_h handle, const char *url,
- csr_wp_check_result_h *presult)
+ csr_wp_check_result_h *result)
{
EXCEPTION_SAFE_START
if (handle == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (presult == nullptr || url == nullptr || url[0] == '\0')
+ else if (result == nullptr || url == nullptr || url[0] == '\0')
return CSR_ERROR_INVALID_PARAMETER;
auto h = reinterpret_cast<Client::Handle *>(handle);
if (ret.second)
h->add(ResultPtr(ret.second));
- *presult = reinterpret_cast<csr_wp_check_result_h>(ret.second);
+ *result = reinterpret_cast<csr_wp_check_result_h>(ret.second);
return ret.first;
API
int csr_wp_result_get_risk_level(csr_wp_check_result_h result,
- csr_wp_risk_level_e *plevel)
+ csr_wp_risk_level_e *level)
{
EXCEPTION_SAFE_START
if (result == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (plevel == nullptr)
+ else if (level == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- *plevel = reinterpret_cast<WpResult *>(result)->riskLevel;
+ *level = reinterpret_cast<WpResult *>(result)->riskLevel;
return CSR_ERROR_NONE;
}
API
-int csr_wp_result_get_detailed_url(csr_wp_check_result_h result, char **pdetailed_url)
+int csr_wp_result_get_detailed_url(csr_wp_check_result_h result, char **detailed_url)
{
EXCEPTION_SAFE_START
if (result == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (pdetailed_url == nullptr)
+ else if (detailed_url == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- auto detailed_url = strdup(
- reinterpret_cast<WpResult *>(result)->detailedUrl.c_str());
+ auto url = strdup(reinterpret_cast<WpResult *>(result)->detailedUrl.c_str());
- if (detailed_url == nullptr)
+ if (url == nullptr)
return CSR_ERROR_OUT_OF_MEMORY;
- *pdetailed_url = detailed_url;
+ *detailed_url = url;
return CSR_ERROR_NONE;
API
int csr_wp_result_get_user_response(csr_wp_check_result_h result,
- csr_wp_user_response_e *presponse)
+ csr_wp_user_response_e *response)
{
EXCEPTION_SAFE_START
if (result == nullptr)
return CSR_ERROR_INVALID_HANDLE;
- else if (presponse == nullptr)
+ else if (response == nullptr)
return CSR_ERROR_INVALID_PARAMETER;
- *presponse = reinterpret_cast<WpResult *>(result)->response;
+ *response = reinterpret_cast<WpResult *>(result)->response;
return CSR_ERROR_NONE;
* CSR CS API calls. The csr_cs_context_destroy() function releases/closes
* the handle. Multiple handles can be obtained using csr_cs_context_create().
*
- * @param[out] phandle A pointer of CSR CS context handle.
+ * @param[out] handle A pointer of CSR CS context handle.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a phandle is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a handle is invalid
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* @retval #CSR_ERROR_SERVER Server has been failed for some reason
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_context_create(csr_cs_context_h *phandle);
+int csr_cs_context_create(csr_cs_context_h *handle);
/**
* @brief Releases all system resources associated with a Content Screening API handle.
* @privilege %http://tizen.org/privilege/antivirus.scan
*
* @remarks Scan data synchronously.
- * @remarks The @a pdetected will be released when @a handle is destroyed.
+ * @remarks The @a malware will be released when @a handle is destroyed.
*
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
* @param[in] data A scan target data.
* @param[in] length A size of a scan target data.
- * @param[out] pdetected A pointer of the detected malware handle. It can be null when no malware detected.
+ * @param[out] malware A pointer of the detected malware handle. It can be null when no malware detected.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a data or @a pdetected is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a data or @a malware is invalid
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* @retval #CSR_ERROR_SERVER Server has been failed for some reason
* @retval #CSR_ERROR_ENGINE_NOT_EXIST No engine exists
int csr_cs_scan_data(csr_cs_context_h handle,
const unsigned char *data,
size_t length,
- csr_cs_malware_h *pdetected);
+ csr_cs_malware_h *malware);
/**
* @brief Main function for caller to scan a file specified by file path for malware.
* @privilege %http://tizen.org/privilege/antivirus.scan
*
* @remarks Scan file synchronously.
- * @remarks The @a pdetected will be released when @a handle is destroyed.
+ * @remarks The @a malware will be released when @a handle is destroyed.
*
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
* @param[in] file_path A path of scan target file.
- * @param[out] pdetected A pointer of the detected malware handle. It can be null when no malware detected.
+ * @param[out] malware A pointer of the detected malware handle. It can be null when no malware detected.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a pdetected is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a malware is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Access denied
* @retval #CSR_ERROR_REMOVE_FAILED File remove failed when malware exist and
- * user select to remove by popup. @a pdetected
+ * user select to remove by popup. @a malware
* will be allocated on this error unlike others.
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST File not found
* @retval #CSR_ERROR_SOCKET Socket error between client and server
*/
int csr_cs_scan_file(csr_cs_context_h handle,
const char *file_path,
- csr_cs_malware_h *pdetected);
+ csr_cs_malware_h *malware);
/**
* @brief Sets a callback function for detection of a malware.
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
* @param[in] file_paths An array of scan target files.
* @param[in] count A number of scan target files.
- * @param[in] user_data The pointer of a user data. It can be null.\n
+ * @param[in] user_data The pointer of a user data. It can be null.
* It is delivered back to the client when a callback function is called.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @since_tizen 3.0
*
- * @param[in] detected A detected malware handle returned
- * by csr_cs_result_get_detected_by_idx() or
- * csr_cs_result_get_detected_most_severe().
- * @param[out] pseverity A pointer of the severity of a detected malware.
+ * @param[in] malware A detected malware handle returned
+ * by csr_cs_scan_data(), csr_cs_scan_file() or
+ * csr_cs_malware_list_get_malware().
+ * @param[out] severity A pointer of the severity of a detected malware.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid detected malware handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pseverity is invalid.
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a severity is invalid.
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_get_severity(csr_cs_malware_h detected, csr_cs_severity_level_e *pseverity);
+int csr_cs_malware_get_severity(csr_cs_malware_h malware, csr_cs_severity_level_e *severity);
/**
* @brief Extracts the name of a detected malware from the detected malware handle.
*
* @since_tizen 3.0
*
- * @remarks The @a pmalware_name must be released using free().
+ * @remarks The @a malware_name must be released using free().
*
- * @param[in] detected A detected malware handle.
+ * @param[in] malware A detected malware handle.
* @param[out] malware_name A pointer of the name of a detected malware.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid detected malware handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pmalware_name is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a malware_name is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_get_malware_name(csr_cs_malware_h detected, char **pmalware_name);
+int csr_cs_malware_get_malware_name(csr_cs_malware_h malware, char **malware_name);
/**
* @brief Extracts an url that contains detailed information on vendor's web site from the detected malware handle.
*
* @since_tizen 3.0
*
- * @remarks The @a pdetailed_url must be released using free().
+ * @remarks The @a detailed_url must be released using free().
*
- * @param[in] detected A detected malware handle.
+ * @param[in] malware A detected malware handle.
* @param[out] detailed_url A pointer of an url that contains detailed information on vendor's web site.\n
* It can be null if a vendor doesn't provide this information.
*
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid detected malware handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pdetailed_url is invalid.
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a detailed_url is invalid.
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_get_detailed_url(csr_cs_malware_h detected, char **pdetailed_url);
+int csr_cs_malware_get_detailed_url(csr_cs_malware_h malware, char **detailed_url);
/**
* @brief Extracts the time stamp when a malware is detected from the detected malware handle.
*
* @since_tizen 3.0
*
- * @param[in] detected A detected malware handle.
+ * @param[in] malware A detected malware handle.
* @param[out] timestamp A pointer of the time stamp in milli second when a malware is detected.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid detected malware handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a ptimestamp is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a timestamp is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_get_timestamp(csr_cs_malware_h detected, time_t *ptimestamp);
+int csr_cs_malware_get_timestamp(csr_cs_malware_h malware, time_t *timestamp);
/**
* @brief Extracts the file name where a malware is detected from the detected malware handle.
*
* @since_tizen 3.0
*
- * @remarks The @a pfile_name must be released using free().
+ * @remarks The @a file_name must be released using free().
*
- * @param[in] detected A detected malware handle.
+ * @param[in] malware A detected malware handle.
* @param[out] file_name A pointer of the file name where a malware is detected. The file name is Null for csr_cs_scan_data.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid detected malware handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pfile_name is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a file_name is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_get_file_name(csr_cs_malware_h detected, char **pfile_name);
+int csr_cs_malware_get_file_name(csr_cs_malware_h malware, char **file_name);
/**
* @brief Extracts a user response of a popup from the detected malware handle.
*
* @since_tizen 3.0
*
- * @param[in] detected A detected malware handle.
- * @param[out] presponse A pointer of the user response.
+ * @param[in] malware A detected malware handle.
+ * @param[out] response A pointer of the user response.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid result handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a presponse is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a response is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_get_user_response(csr_cs_malware_h detected, csr_cs_user_response_e *presponse);
+int csr_cs_malware_get_user_response(csr_cs_malware_h malware, csr_cs_user_response_e *response);
/**
* @brief Checks if a malware was detected in an application or in a file.
*
* @since_tizen 3.0
*
- * @param[in] detected A detected malware handle.
- * @param[out] pis_app A pointer of a flag indicating the position a malware was detected.
+ * @param[in] malware A detected malware handle.
+ * @param[out] is_app A pointer of a flag indicating the position a malware was detected.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid result handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pis_app is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a is_app is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_is_app(csr_cs_malware_h detected, bool *pis_app);
+int csr_cs_malware_is_app(csr_cs_malware_h malware, bool *is_app);
/**
* @brief Extracts the package id of an application where a malware is detected from detected malware handle.
*
* @since_tizen 3.0
*
- * @remarks The @a pdetailed_url must be released using free().
+ * @remarks The @a pkg_id must be released using free().
*
- * @param[in] detected A detected malware handle.
- * @param[out] ppkg_id A pointer of the pakcage id where a malware is detected. This is a null when a malware was not detected in an application.
+ * @param[in] malware A detected malware handle.
+ * @param[out] pkg_id A pointer of the pakcage id where a malware is detected. This is a null when a malware was not detected in an application.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid detected malware handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a ppkg_id is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a pkg_id is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_get_pkg_id(csr_cs_malware_h detected, char **ppkg_id);
+int csr_cs_malware_get_pkg_id(csr_cs_malware_h malware, char **pkg_id);
/**
* @brief Judges how a detected malware file is handled.
* again.
*
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
- * @param[in] detected A handle of a detected malware.
+ * @param[in] malware A handle of a detected malware.
* @param[in] action An action to be taken.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a detected or @a action is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a malware or @a action is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED No permission to remove
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST File to take action on not found
* @retval #CSR_ERROR_FILE_CHANGED File to take action on changed after detection
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
int csr_cs_judge_detected_malware(csr_cs_context_h handle,
- csr_cs_malware_h detected,
+ csr_cs_malware_h malware,
csr_cs_action_e action);
* @privlevel partner
* @privilege %http://tizen.org/privilege/antivirus.scan
*
- * @remarks The @a pdetected will be released when @a handle is destroyed.
+ * @remarks The @a malware will be released when @a handle is destroyed.
*
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
* @param[in] file_path A path of a detected malware file.
- * @param[out] pdetected A pointer of the detected malware handle. It can be null when
+ * @param[out] malware A pointer of the detected malware handle. It can be null when
* no malware file.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a pdetected is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a malware is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED No permission to remove
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST No malware file
* @retval #CSR_ERROR_SOCKET Socket error between client and server
*/
int csr_cs_get_detected_malware(csr_cs_context_h handle,
const char *file_path,
- csr_cs_malware_h *pdetected);
+ csr_cs_malware_h *malware);
/**
* @brief Gets information on a detected malware files specified by directory path.
* @privlevel partner
* @privilege %http://tizen.org/privilege/antivirus.scan
*
- * @remarks The @a plist will be released when @a handle is destroyed.
+ * @remarks The @a list will be released when @a handle is destroyed.
*
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
* @param[in] dir_paths A directory path where detected malware files exists.
* @param[in] count Count of array element of @a dir_paths
- * @param[out] plist A pointer of the detected malware list handle. It can be null
+ * @param[out] list A pointer of the detected malware list handle. It can be null
* when no malware file.
- * @param[out] pcount Count of detected malware files which existed in the specified
+ * @param[out] list_count Count of detected malware files which existed in the specified
* directory.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a dir_paths, @a plist, or @a pcount is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a dir_paths, @a list, or @a count is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED No permission to remove
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST No malware file
* @retval #CSR_ERROR_SOCKET Socket error between client and server
*/
int csr_cs_get_detected_malwares(csr_cs_context_h handle,
const char *dir_paths[], size_t count,
- csr_cs_malware_list_h *plist, size_t *pcount);
+ csr_cs_malware_list_h *list, size_t *list_count);
/**
* @brief Gets information on a ignored malware file specified by file path.
* @privlevel partner
* @privilege %http://tizen.org/privilege/antivirus.scan
*
- * @remarks The @a pdetected will be released when @a handle is destroyed.
+ * @remarks The @a malware will be released when @a handle is destroyed.
*
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
* @param[in] file_path A path of a ignored malware file.
- * @param[out] pdetected A pointer of the detected malware handle. It can be null when
+ * @param[out] malware A pointer of the detected malware handle. It can be null when
* no ignored file.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a pdetected is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a file_path or @a malware is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED No permission to remove
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST No ignored file
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
int csr_cs_get_ignored_malware(csr_cs_context_h handle, const char *file_path,
- csr_cs_malware_h *pdetected);
+ csr_cs_malware_h *malware);
/**
* @brief Gets information on a ignored malware files specified by directory path.
* @privlevel partner
* @privilege %http://tizen.org/privilege/antivirus.scan
*
- * @remarks The @a plist will be released when @a handle is destroyed.
+ * @remarks The @a list will be released when @a handle is destroyed.
*
* @param[in] handle CSR CS context handle returned by csr_cs_context_create().
* @param[in] dir_paths A directory path where ignored malware files exists.
* @param[in] count Count of array element of @a dir_paths
- * @param[out] plist A pointer of the detected malware list handle. It can be null
+ * @param[out] list A pointer of the detected malware list handle. It can be null
* when no ignored file.
- * @param[out] pcount Count of ignored malware files which existed in the specified
+ * @param[out] list_count Count of ignored malware files which existed in the specified
* directory.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a dir_paths, @a plist, or @a pcount is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a dir_paths, @a list, or @a count is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED No permission to remove
* @retval #CSR_ERROR_FILE_DO_NOT_EXIST No ignored file
* @retval #CSR_ERROR_SOCKET Socket error between client and server
*/
int csr_cs_get_ignored_malwares(csr_cs_context_h handle,
const char *dir_paths[], size_t count,
- csr_cs_malware_list_h *plist, size_t *pcount);
+ csr_cs_malware_list_h *list, size_t *list_count);
/**
* @brief Extracts the detected malware handle from the detected malware list handle.
* csr_cs_get_detected_malwares() or
* csr_cs_get_ignored_malwares().
* @param[in] index An index of a target detected malware handle to get.
- * @param[out] pdetected A pointer of the detected malware handle. It can be null when
+ * @param[out] malware A pointer of the detected malware handle. It can be null when
* index is invalid.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid list
- * @retval #CSR_ERROR_INVALID_PARAMETER @a index or @a pdetected is invalid.
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a index or @a malware is invalid.
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_cs_malware_list_get_detected(csr_cs_malware_list_h list, size_t index,
- csr_cs_malware_h *pdetected);
+int csr_cs_malware_list_get_malware(csr_cs_malware_list_h list, size_t index,
+ csr_cs_malware_h *malware);
/**
* @}
* @since_tizen 3.0
*
* @param[in] id Engine identifier to get handle.
- * @param[out] pengine A pointer of the engine information handle.
+ * @param[out] engine A pointer of the engine information handle.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pengine is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a engine is invalid
* @retval #CSR_ERROR_ENGINE_NOT_EXIST No engine exists
* @retval #CSR_ERROR_ENGINE_NOT_ACTIVATED Engine is not activated
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*/
-int csr_get_current_engine(csr_engine_id_e id, csr_engine_h *pengine);
+int csr_get_current_engine(csr_engine_id_e id, csr_engine_h *engine);
/**
* @brief Extracts an vendor name from the engine information handle.
* @privlevel platform
* @privilege %http://tizen.org/privilege/antivirus.admin
*
- * @remarks The @a pvendor must be released using free().
+ * @remarks The @a vendor must be released using free().
*
* @param[in] engine The engine information handle.
- * @param[out] pvendor A pointer of the engine's vendor name.
+ * @param[out] vendor A pointer of the engine's vendor name.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid engine information handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pvendor is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a vendor is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_get_current_engine()
*/
-int csr_engine_get_vendor(csr_engine_h engine, char **pvendor);
+int csr_engine_get_vendor(csr_engine_h engine, char **vendor);
/**
* @brief Extracts an engine name from the engine information handle.
* @privlevel platform
* @privilege %http://tizen.org/privilege/antivirus.admin
*
- * @remarks The @a pname must be released using free().
+ * @remarks The @a name must be released using free().
*
* @param[in] engine The engine information handle.
- * @param[out] pname A pointer of the engine's name.
+ * @param[out] name A pointer of the engine's name.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid engine information handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pname is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a name is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_get_current_engine()
*/
-int csr_engine_get_name(csr_engine_h engine, char **pname);
+int csr_engine_get_name(csr_engine_h engine, char **name);
/**
* @brief Extracts an engine version from the engine information handle.
* @privlevel platform
* @privilege %http://tizen.org/privilege/antivirus.admin
*
- * @remarks The @a pname must be released using free().
+ * @remarks The @a version must be released using free().
*
* @param[in] engine An engine information handle.
- * @param[out] pversion A pointer of the engine's version.
+ * @param[out] version A pointer of the engine's version.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid engine information handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pversion is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a version is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_get_current_engine()
*/
-int csr_engine_get_version(csr_engine_h engine, char **pversion);
+int csr_engine_get_version(csr_engine_h engine, char **version);
/**
* @brief Extracts an engine's data version from the engine information handle.
* @privlevel platform
* @privilege %http://tizen.org/privilege/antivirus.admin
*
- * @remarks The @a pversion must be released using free().
+ * @remarks The @a version must be released using free().
*
* @param[in] engine The engine information handle.
- * @param[out] pversion A pointer of the data version. It can be null.
+ * @param[out] version A pointer of the data version. It can be null.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid engine information handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pversion is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a version is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_get_current_engine()
*/
-int csr_engine_get_data_version(csr_engine_h engine, char **pversion);
+int csr_engine_get_data_version(csr_engine_h engine, char **version);
/**
* @brief Extracts the latest update time of an engine from the engine information handle.
* @privilege %http://tizen.org/privilege/antivirus.admin
*
* @param[in] engine The engine information handle.
- * @param[out] ptime A pointer of lasted update time.
+ * @param[out] time A pointer of lasted update time.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid engine information handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a ptime is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a time is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_get_current_engine()
*/
-int csr_engine_get_latest_update_time(csr_engine_h engine, time_t *ptime);
+int csr_engine_get_latest_update_time(csr_engine_h engine, time_t *time);
/**
* @brief Extracts the state of engine activation from the engine information handle.
* @privilege %http://tizen.org/privilege/antivirus.admin
*
* @param[in] engine The engine information handle.
- * @param[out] pactivated A pointer of the engine activation state.
+ * @param[out] activated A pointer of the engine activation state.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid engine information handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pactivated is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a activated is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_get_current_engine()
*/
-int csr_engine_get_activated(csr_engine_h engine, csr_activated_e *pactivated);
+int csr_engine_get_activated(csr_engine_h engine, csr_activated_e *activated);
/**
* @brief Enable or disable an engine.
* @privilege %http://tizen.org/privilege/antivirus.admin
*
* @param[in] engine The engine information handle.
- * @param[out] pstate A pointer of the engine state.
+ * @param[out] state A pointer of the engine state.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid engine information handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pstate is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a state is invalid
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_get_current_engine()
*/
-int csr_engine_get_state(csr_engine_h engine, csr_state_e *pstate);
+int csr_engine_get_state(csr_engine_h engine, csr_state_e *state);
/**
* @brief Releases all system resources associated with a engine information handle.
* calls. The csr_wp_context_destroy() releases/closes the handle. Multiple
* handles can be obtained using csr_wp_context_create().
*
- * @param[out] phandle A pointer of CSR WP context handle.
+ * @param[out] handle A pointer of CSR WP context handle.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
- * @retval #CSR_ERROR_INVALID_PARAMETER @a phandle is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a handle is invalid
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* @retval #CSR_ERROR_SERVER Server has been failed for some reason
* @retval #CSR_ERROR_ENGINE_INTERNAL Engine Internal error
*
* @see csr_wp_context_destroy()
*/
-int csr_wp_context_create(csr_wp_context_h *phandle);
+int csr_wp_context_create(csr_wp_context_h *handle);
/**
* @brief Releases all system resources associated with a CSR Web Protection API handle.
*
* @param[in] handle CSR WP context handle returned by csr_wp_context_create().
* @param[in] url URL to check.
- * @param[out] presult A pointer of the result handle with the Risk level for the URL.
+ * @param[out] result A pointer of the result handle with the Risk level for the URL.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_INVALID_HANDLE Invalid handle
* @retval #CSR_ERROR_OUT_OF_MEMORY Not enough memory
* @retval #CSR_ERROR_PERMISSION_DENIED Permission denied
- * @retval #CSR_ERROR_INVALID_PARAMETER @a url or @a presult is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a url or @a result is invalid
* @retval #CSR_ERROR_SOCKET Socket error between client and server
* @retval #CSR_ERROR_SERVER Server has been failed for some reason
* @retval #CSR_ERROR_ENGINE_NOT_EXIST No engine exists
* @see csr_wp_set_popup_message()
*/
int csr_wp_check_url(csr_wp_context_h handle, const char *url,
- csr_wp_check_result_h *presult);
+ csr_wp_check_result_h *result);
//==============================================================================
// Result related
* @since_tizen 3.0
*
* @param[in] result A result handle returned by csr_wp_check_url().
- * @param[out] plevel A pointer of the risk level for the given URL.
+ * @param[out] level A pointer of the risk level for the given URL.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid result handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a plevel is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a level is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_wp_check_url()
*/
-int csr_wp_result_get_risk_level(csr_wp_check_result_h result, csr_wp_risk_level_e *plevel);
+int csr_wp_result_get_risk_level(csr_wp_check_result_h result, csr_wp_risk_level_e *level);
/**
* @brief Extracts an url of vendor's web site that contains detailed information about the risk
*
* @since_tizen 3.0
*
- * @remarks The @a pdetailed_url must be released using free().
+ * @remarks The @a detailed_url must be released using free().
*
* @param[in] result A result handle returned by csr_wp_check_url().
* @param[out] detailed_url A pointer of an url that contains detailed information about the risk.
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid result handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a pdetailed_url is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a detailed_url is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_wp_check_url()
*/
-int csr_wp_result_get_detailed_url(csr_wp_check_result_h result, char **pdetailed_url);
+int csr_wp_result_get_detailed_url(csr_wp_check_result_h result, char **detailed_url);
/**
* @brief Extracts a user response of a popup from the result handle.
* @since_tizen 3.0
*
* @param[in] result A result handle returned by csr_wp_check_url().
- * @param[out] presponse A pointer of the user response.
+ * @param[out] response A pointer of the user response.
*
* @return #CSR_ERROR_NONE on success, otherwise a negative error value
*
* @retval #CSR_ERROR_NONE Successful
* @retval #CSR_ERROR_INVALID_HANDLE Invalid result handle
- * @retval #CSR_ERROR_INVALID_PARAMETER @a presponse is invalid
+ * @retval #CSR_ERROR_INVALID_PARAMETER @a response is invalid
* @retval #CSR_ERROR_UNKNOWN Error with unknown reason
*
* @see csr_wp_check_url()
* @see #csr_wp_user_response_e
*/
-int csr_wp_result_get_user_response(csr_wp_check_result_h result, csr_wp_user_response_e *presponse);
+int csr_wp_result_get_user_response(csr_wp_check_result_h result, csr_wp_user_response_e *response);
/**
CHECK_IS_NOT_NULL(detected_list);
for (idx = 0; idx < cnt; idx++) {
- ASSERT_SUCCESS(csr_cs_malware_list_get_detected(detected_list, idx, &stored));
+ ASSERT_SUCCESS(csr_cs_malware_list_get_malware(detected_list, idx, &stored));
CHECK_IS_NOT_NULL(stored);
ASSERT_SUCCESS(csr_cs_malware_get_file_name(stored, &file_path_actual.ptr));
if (strcmp(TEST_FILE_HIGH, file_path_actual.ptr) == 0) {
CHECK_IS_NOT_NULL(ignored_list);
for (idx = 0; idx < cnt; idx++) {
- ASSERT_SUCCESS(csr_cs_malware_list_get_detected(ignored_list, idx, &stored));
+ ASSERT_SUCCESS(csr_cs_malware_list_get_malware(ignored_list, idx, &stored));
CHECK_IS_NOT_NULL(stored);
ASSERT_SUCCESS(csr_cs_malware_get_file_name(stored, &file_path_actual.ptr));
if (strcmp(TEST_FILE_HIGH, file_path_actual.ptr) == 0) {