/frameworks/base/services/jni/ |
com_android_server_input_InputManagerService.cpp | 779 // - Ignore untrusted events and pass them along. 822 // - Ignore untrusted events and pass them along. 880 // - Ignore untrusted events and pass them along. [all...] |
/libcore/luni/src/main/java/java/security/cert/ |
CertStore.java | 31 * and may store trusted as well as untrusted certificates.
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/ |
GrantActivity.java | 136 * irrelevant or otherwise malicious permission requests from untrusted callers.
|
/packages/apps/Settings/src/com/android/settings/bluetooth/ |
BluetoothPermissionActivity.java | 42 * profile connection request from untrusted devices.
|
/external/chromium_org/components/nacl/loader/ |
nacl_ipc_adapter.cc | 166 // Wrapped descriptors for transfer to untrusted code. 260 // Note that this message is controlled by the untrusted code. So we should be 577 // leak data to the untrusted plugin, so zero everything out first.
|
nacl_listener.cc | 251 // Pass a NaClDesc to the untrusted side. This will hold a ref to the
|
/development/samples/Vault/src/com/example/android/vault/ |
EncryptedDocument.java | 59 * on untrusted storage devices, as long as the keys are stored securely.
|
/external/chromium_org/chrome/browser/chromeos/login/ |
wallpaper_manager.h | 248 // Note that before device is enrolled, it proceeds with untrusted setting.
|
/external/chromium_org/chrome/browser/ui/sync/ |
one_click_signin_helper.h | 277 // one more untrusted will cause a modal dialog to appear asking the user
|
/external/chromium_org/chrome/renderer/resources/ |
neterror.css | 73 * Can't access chrome://theme/IDR_ERROR_NETWORK_GENERIC from an untrusted
|
/external/chromium_org/components/nacl/zygote/ |
nacl_fork_delegate_linux.cc | 196 // on RLIMIT_AS to allocate the untrusted address space and its guard
|
/external/chromium_org/content/browser/renderer_host/pepper/ |
pepper_flash_file_message_filter.cc | 135 // passed to untrusted processes because they open security holes.
|
/external/chromium_org/media/audio/android/ |
opensles_output.cc | 334 // from an untrusted source such as NaCl.
|
/external/chromium_org/media/audio/mac/ |
audio_low_latency_output_mac.cc | 288 // sanitized since it may come from an untrusted source such as NaCl.
|
/external/chromium_org/native_client_sdk/src/doc/community/security-contest/ |
index.rst | 33 Do you think it is impossible to safely run untrusted x86 code on
|
/external/chromium_org/native_client_sdk/src/doc/ |
faq.rst | 120 * `Native Client: A Sandbox for Portable, Untrusted x86 Code 354 Native Client's sandbox works by validating the untrusted code (the 378 In addition to static analysis of untrusted code, the Native Client 381 Portable, Untrusted x86 Code <http://research.google.com/pubs/pub34913.html>`_
|
/external/chromium_org/net/cert/ |
nss_cert_database.cc | 269 // Self-signed certificates that don't have any trust bits set are untrusted.
|
/external/chromium_org/ppapi/api/ |
ppp_instance.idl | 99 * <strong>Note:</strong> This function will always be skipped on untrusted
|
/external/chromium_org/ppapi/proxy/ |
resource_creation_proxy.cc | 266 // plugins and SimpleImageData resources for untrusted ones.
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
MallocOverflowSecurityChecker.cpp | 11 // Suppose 'unsigned int n' comes from an untrusted source. If the
|
/external/openssh/ |
ssh_config.0 | 261 Specify a timeout for untrusted X11 forwarding using the format 264 The default is to disable untrusted X11 forwarding after twenty 272 considered untrusted and prevented from stealing or tampering 281 the restrictions imposed on untrusted clients. [all...] |
ssh_config.5 | 472 Specify a timeout for untrusted X11 forwarding 480 The default is to disable untrusted X11 forwarding after twenty minutes has 489 remote X11 clients will be considered untrusted and prevented 501 the restrictions imposed on untrusted clients. [all...] |
/frameworks/base/docs/html/training/articles/ |
security-tips.jd | 102 <p>As with data from any untrusted source, you should <a href="#InputValidation">perform input 157 potential SQL injection from untrusted sources. Note that using parameterized methods is not 436 web pages from which all input is trustworthy. If untrusted input is allowed, 437 untrusted JavaScript may be able to invoke Android methods within your app. In general, we [all...] |
/cts/tests/tests/permission/src/android/permission/cts/ |
FileSystemPermissionTest.java | 333 * <li>Data substitution by replacing trusted files with untrusted files</li> 521 * <li>Data substitution by replacing trusted files with untrusted files</li> [all...] |
/external/chromium_org/ppapi/native_client/ |
chrome_main.scons | 59 'src/untrusted/irt_stub/nacl.scons', 60 'src/untrusted/nacl_ppapi_util/nacl.scons',
|