HomeSort by relevance Sort by last modified time
    Searched full:sanitizer (Results 1 - 25 of 165) sorted by null

1 2 3 4 5 6 7

  /external/compiler-rt/lib/asan/
asan_android_stub.cc 1 #include "sanitizer/asan_interface.h"
  /external/clang/include/clang/Basic/
Sanitizers.def 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
11 // enable. Users of this file must define the SANITIZER macro to make use of
17 #ifndef SANITIZER
18 #error "Define SANITIZER prior to including this file!"
21 // SANITIZER(NAME, ID)
23 // The first value is the name of the sanitizer as a string. The sanitizer can
27 // sanitizer.
32 // The first two values have the same semantics as the corresponding SANITIZER
42 SANITIZER("address", Address
    [all...]
  /external/compiler-rt/include/
CMakeLists.txt 2 sanitizer/asan_interface.h
3 sanitizer/common_interface_defs.h
4 sanitizer/linux_syscall_hooks.h
5 sanitizer/lsan_interface.h
6 sanitizer/msan_interface.h)
37 # Install sanitizer headers.
40 DESTINATION ${LIBCLANG_INSTALL_PATH}/include/sanitizer)
  /external/clang/test/Driver/
asan.c 1 // RUN: %clang -target i386-unknown-unknown -faddress-sanitizer %s -S -emit-llvm -o - | FileCheck %s
2 // RUN: %clang -O1 -target i386-unknown-unknown -faddress-sanitizer %s -S -emit-llvm -o - | FileCheck %s
3 // RUN: %clang -O2 -target i386-unknown-unknown -faddress-sanitizer %s -S -emit-llvm -o - | FileCheck %s
4 // RUN: %clang -O3 -target i386-unknown-unknown -faddress-sanitizer %s -S -emit-llvm -o - | FileCheck %s
6 // Verify that -faddress-sanitizer invokes asan instrumentation.
darwin-asan-nofortify.c 3 // RUN: %clang -faddress-sanitizer %s -E -dM -target x86_64-darwin - | FileCheck %s
  /external/compiler-rt/lib/asan/lit_tests/TestCases/
interface_test.cc 4 #include <sanitizer/asan_interface.h>
lsan_annotations.cc 5 #include <sanitizer/lsan_interface.h>
  /frameworks/base/core/java/android/net/
UrlQuerySanitizer.java 30 * UrlQuerySanitizer sanitizer = new UrlQuerySanitizer();
31 * sanitizer.setAllowUnregisteredParamaters(true);
32 * sanitizer.parseUrl("http://example.com/?name=Joe+User");
33 * String name = sanitizer.getValue("name"));
40 * UrlQuerySanitizer sanitizer = new UrlQuerySanitizer();
41 * sanitizer.registerParamater("name", UrlQuerySanitizer.createSpaceLegal());
42 * sanitizer.parseUrl("http://example.com/?name=Joe+User");
43 * String name = sanitizer.getValue("name"));
47 * unregistered parameter sanitizer does not allow any special characters,
58 * sanitizer
821 ValueSanitizer sanitizer = getValueSanitizer(parameter); local
    [all...]
  /cts/tests/tests/net/src/android/net/cts/
UrlQuerySanitizer_IllegalCharacterValueSanitizerTest.java 26 IllegalCharacterValueSanitizer sanitizer = new IllegalCharacterValueSanitizer(SPACE_OK); local
27 assertEquals("Joe User", sanitizer.sanitize("Joe<User"));
  /external/skia/tools/
xsan_build 14 sanitizer=$1
27 export GYP_DEFINES="skia_sanitizer=$sanitizer ${GYP_DEFINES}"
  /external/compiler-rt/lib/tsan/
check_cmake.sh 10 make check-sanitizer -j64
  /external/compiler-rt/lib/lsan/lit_tests/TestCases/
ignore_object_errors.cc 9 #include "sanitizer/lsan_interface.h"
link_turned_off.cc 7 #include <sanitizer/lsan_interface.h>
disabler.cc 9 #include "sanitizer/lsan_interface.h"
suppressions_default.cc 9 #include "sanitizer/lsan_interface.h"
suppressions_file.cc 9 #include "sanitizer/lsan_interface.h"
  /external/compiler-rt/lib/tsan/lit_tests/
virtual_inheritance_compile_bug.cc 1 // Regression test for http://code.google.com/p/thread-sanitizer/issues/detail?id=3.
aligned_vs_unaligned_race.cc 5 // https://code.google.com/p/thread-sanitizer/issues/detail?id=17
  /external/clang/docs/
LeakSanitizer.rst 26 `https://code.google.com/p/address-sanitizer/wiki/LeakSanitizerDesignDocument
27 <https://code.google.com/p/address-sanitizer/wiki/LeakSanitizerDesignDocument>`_
SanitizerSpecialCaseList.rst 2 Sanitizer special case list
12 sanitizer tools for certain source-level entities by providing a special
18 User of sanitizer tools, such as :doc:`AddressSanitizer`, :doc:`ThreadSanitizer`
60 source files and functions to special case list. Some sanitizer tools may
78 # Specific sanitizer tools may introduce categories.
  /external/compiler-rt/lib/sanitizer_common/tests/
CMakeLists.txt 65 FOLDER "Sanitizer unittests")
67 # Adds sanitizer tests for architecture.
85 set(SANITIZER_TEST_NAME "Sanitizer-${arch}-Test")
101 add_compiler_rt_test(SanitizerUnitTests "Sanitizer-${arch}-Test-Nolibc"
145 add_lit_testsuite(check-sanitizer "Running sanitizer library unittests"
149 set_target_properties(check-sanitizer PROPERTIES FOLDER "Sanitizer unittests")
  /external/compiler-rt/lib/asan/lit_tests/TestCases/Linux/
syscalls.cc 10 #include <sanitizer/linux_syscall_hooks.h>
unpoison_tls.cc 10 #include <sanitizer/asan_interface.h>
  /external/chromium_org/third_party/harfbuzz-ng/src/
hb-tt-font.cc 54 tt->hhea_blob = Sanitizer<hhea>::sanitize (font->face->reference_table (HB_OT_TAG_hhea));
55 tt->hhea = Sanitizer<hhea>::lock_instance (tt->hhea_blob);
  /external/compiler-rt/lib/msan/lit_tests/Linux/
syscalls.cc 10 #include <sanitizer/linux_syscall_hooks.h>
11 #include <sanitizer/msan_interface.h>

Completed in 221 milliseconds

1 2 3 4 5 6 7