summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf/verifier.h
diff options
context:
space:
mode:
Diffstat (limited to 'sandbox/linux/seccomp-bpf/verifier.h')
-rw-r--r--sandbox/linux/seccomp-bpf/verifier.h14
1 files changed, 7 insertions, 7 deletions
diff --git a/sandbox/linux/seccomp-bpf/verifier.h b/sandbox/linux/seccomp-bpf/verifier.h
index c8128ec..505015e 100644
--- a/sandbox/linux/seccomp-bpf/verifier.h
+++ b/sandbox/linux/seccomp-bpf/verifier.h
@@ -24,7 +24,7 @@ class Verifier {
// set by the "evaluators".
// Upon success, "err" is set to NULL. Upon failure, it contains a static
// error message that does not need to be free()'d.
- static bool verifyBPF(const std::vector<struct sock_filter>& program,
+ static bool VerifyBPF(const std::vector<struct sock_filter>& program,
const Sandbox::Evaluators& evaluators,
const char **err);
@@ -36,7 +36,7 @@ class Verifier {
// parts that can actually be generated by our BPF compiler. If this code
// is used for purposes other than verifying the output of the sandbox's
// BPF compiler, we might have to extend this BPF interpreter.
- static uint32_t evaluateBPF(const std::vector<struct sock_filter>& program,
+ static uint32_t EvaluateBPF(const std::vector<struct sock_filter>& program,
const struct arch_seccomp_data& data,
const char **err);
@@ -48,23 +48,23 @@ class Verifier {
data(d),
ip(0),
accumulator(0),
- accIsValid(false) {
+ acc_is_valid(false) {
}
const std::vector<struct sock_filter>& program;
const struct arch_seccomp_data& data;
unsigned int ip;
uint32_t accumulator;
- bool accIsValid;
+ bool acc_is_valid;
private:
DISALLOW_IMPLICIT_CONSTRUCTORS(State);
};
- static void ld (State *state, const struct sock_filter& insn,
+ static void Ld (State *state, const struct sock_filter& insn,
const char **err);
- static void jmp(State *state, const struct sock_filter& insn,
+ static void Jmp(State *state, const struct sock_filter& insn,
const char **err);
- static uint32_t ret(State *state, const struct sock_filter& insn,
+ static uint32_t Ret(State *state, const struct sock_filter& insn,
const char **err);
DISALLOW_IMPLICIT_CONSTRUCTORS(Verifier);