HomeSort by relevance Sort by last modified time
    Searched full:tainted (Results 1 - 25 of 59) sorted by null

1 2 3

  /external/clang/test/Analysis/
taint-tester.c 18 addr += n;// expected-warning + {{tainted}}
19 *addr = n; // expected-warning + {{tainted}}
21 double tdiv = n / 30; // expected-warning+ {{tainted}}
22 char *loc_cast = (char *) n; // expected-warning +{{tainted}}
23 char tinc = tdiv++; // expected-warning + {{tainted}}
24 int tincdec = (char)tinc--; // expected-warning+{{tainted}}
26 // Tainted ptr arithmetic/array element address.
27 int tprtarithmetic1 = *(addr+1); // expected-warning + {{tainted}}
32 int ptrDeref = *ptr; // expected-warning + {{tainted}}
33 int _ptrDeref = ptrDeref + 13; // expected-warning + {{tainted}}
    [all...]
global-region-invalidation.c 32 int m = i; // expected-warning + {{tainted}}
34 int j = i; // expected-warning + {{tainted}}
35 return m + j; // expected-warning + {{tainted}}
taint-generic.c 73 Buffer[m] = 1; //expected-warning {{Out of bound memory access (index is tainted)}}
177 return 5/x; // expected-warning {{Division by a tainted value, possibly zero}}
184 int vla[x]; // expected-warning{{Declared variable-length array (VLA) has tainted size}}
204 return 5/a; // expected-warning {{Division by a tainted value, possibly zero}}
212 return 5/j; // expected-warning {{Division by a tainted value, possibly zero}}
  /external/jsr305/ri/src/main/java/javax/annotation/
Tainted.java 14 public @interface Tainted {
  /external/clang/lib/StaticAnalyzer/Checkers/
GenericTaintChecker.cpp 13 // example, checkers should report errors which involve tainted data more
52 /// \brief Catch taint related bugs. Check if tainted data is passed to a
66 /// and thus, is tainted.
80 /// Taint the scanned input if the file is tainted.
95 /// Check if tainted data is used as a buffer size ins strn.. functions,
101 /// Generate a report if the expression is tainted or points to tainted data.
110 /// If any of the possible taint source arguments is tainted, all of the
111 /// destination arguments should also be tainted. Use InvalidArgIndex in the
114 /// pointer and reference arguments might be tainted on return. I
    [all...]
TaintTesterChecker.cpp 41 BT.reset(new BugType("Tainted data", "General"));
53 BugReport *report = new BugReport(*BT, "tainted",N);
VLASizeChecker.cpp 67 os << "has tainted size";
106 // Check if the size is tainted.
DivZeroChecker.cpp 81 reportBug("Division by a tainted value, possibly zero", stateZero, C);
ArrayBoundCheckerV2.cpp 158 // If we are under constrained and the index variables are tainted, report.
206 os << "(index is tainted)";
  /external/jsr305/javadoc/javax/annotation/
Tainted.html 7 Tainted
10 <META NAME="keywords" CONTENT="javax.annotation.Tainted class">
17 parent.document.title="Tainted";
57 <A HREF="../../index.html?javax/annotation/Tainted.html" target="_top"><B>FRAMES</B></A> &nbsp;
58 &nbsp;<A HREF="Tainted.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
89 Annotation Type Tainted</H2>
96 </FONT>public @interface <B>Tainted</B></DL>
137 <A HREF="../../index.html?javax/annotation/Tainted.html" target="_top"><B>FRAMES</B></A> &nbsp;
138 &nbsp;<A HREF="Tainted.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
package-frame.html 73 <A HREF="Tainted.html" title="annotation in javax.annotation" target="classFrame">Tainted</A>
Untainted.html 54 &nbsp;<A HREF="../../javax/annotation/Tainted.html" title="annotation in javax.annotation"><B>PREV CLASS</B></A>&nbsp;
165 &nbsp;<A HREF="../../javax/annotation/Tainted.html" title="annotation in javax.annotation"><B>PREV CLASS</B></A>&nbsp;
  /external/clang/lib/StaticAnalyzer/Core/
ProgramState.cpp 472 Out <<"Tainted Symbols:" << NL;
727 // Element region (array element) is tainted if either the base or the offset
728 // are tainted.
745 // Traverse all the symbols this symbol depends on to see if any are tainted.
746 bool Tainted = false;
753 Tainted = (Tag && *Tag == Kind);
755 // If this is a SymbolDerived with a tainted parent, it's also tainted.
757 Tainted = Tainted || isTainted(SD->getParentSymbol(), Kind)
    [all...]
  /external/chromium_org/chrome/browser/chromeos/login/
multi_profile_user_controller.cc 98 // Don't allow profiles potentially tainted by data fetched with policy-pushed
103 // Don't allow any secondary profiles if the primary profile is tainted.
107 // a PolicyCertService. His profile may have been tainted previously though
113 // used them yet then it can become tainted at any time during this session;
multi_profile_user_controller_unittest.cc 291 // tainted state.
300 // be added but tainted users can't.
314 // Verifies that if a tainted user is signed-in then no other users can
  /external/jmonkeyengine/engine/src/core/checkers/quals/
DefaultQualifiers.java 23 * &nbsp; @DefaultQualifier("Tainted")
  /frameworks/base/core/java/android/view/
InputEvent.java 157 * @return True if this event is tainted.
168 * @param tainted True if this event is tainted.
171 public abstract void setTainted(boolean tainted);
  /external/clang/include/clang/StaticAnalyzer/Core/PathSensitive/
TaintManager.h 26 /// The GDM component containing the tainted root symbols. We lazily infer the
  /external/jsr305/javadoc/
allclasses-frame.html 71 <A HREF="javax/annotation/Tainted.html" title="annotation in javax.annotation" target="classFrame">Tainted</A>
allclasses-noframe.html 71 <A HREF="javax/annotation/Tainted.html" title="annotation in javax.annotation">Tainted</A>
  /external/chromium_org/chrome/browser/chromeos/policy/
policy_cert_service.cc 72 // multiple profiles. This is important to make sure that any possibly tainted
policy_cert_service_factory.cc 117 LOG(ERROR) << "Shutdown session because a tainted profile was added.";
  /external/chromium_org/courgette/third_party/
LICENCE 23 question. Given that the inclusion of a few lines of "GPL-tainted" work
25 given that further work will likely build upon the "tainted" portions,
  /prebuilts/tools/common/m2/internal/com/google/code/findbugs/jsr305/2.0.1/
jsr305-2.0.1.jar 
  /external/clang/docs/analyzer/
DebugChecks.rst 60 - debug.TaintTest: Prints out the word "tainted" for every expression that

Completed in 309 milliseconds

1 2 3