/external/valgrind/main/VEX/priv/ |
ir_inject.c | 48 /* The IR Injection Control Block. vex_inject_ir will query its contents
|
/frameworks/base/test-runner/src/android/test/ |
ServiceTestCase.java | 77 * <strong>Dependency Injection.</strong>
|
/hardware/qcom/gps/loc_api/libloc_api_50001/ |
loc.cpp | 526 This is used by Java native function to do time injection. 555 This is used by Java native function to do location injection. 589 LOC_LOGI("GPS HAL coarse position injection disabled"); 593 LOC_LOGI("GPS HAL coarse position injection enabled");
|
/packages/apps/Settings/src/com/android/settings/bluetooth/ |
BluetoothPairingDialog.java | 225 // Escape device name to avoid HTML injection.
|
/packages/apps/UnifiedEmail/src/com/android/mail/providers/ |
SearchRecentSuggestionsProvider.java | 285 // TODO: Confirm no injection attacks here, or rewrite.
|
/external/chromium_org/remoting/host/ |
client_session_unittest.cc | 206 // DesktopEnvironment owns |input_injector_|, but input injection tests need 565 // eventually (via dependency injection, not sleep!)
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/ |
cmdline.py | 338 # _covpkg is for dependency injection, so we can test this code. 345 # For dependency injection:
|
/external/chromium_org/tools/json_schema_compiler/test/ |
tabs.json | 535 "description": "Injects JavaScript code into a page. For details, see the <a href='content_scripts.html#pi'>programmatic injection</a> section of the content scripts doc.", 560 "description": "Injects CSS into a page. For details, see the <a href='content_scripts.html#pi'>programmatic injection</a> section of the content scripts doc.",
|
/frameworks/base/core/java/android/database/sqlite/ |
SQLiteQueryBuilder.java | 112 * to avoid SQL injection attacks 381 // in the selection string that could indicate a SQL injection attempt.
|
/frameworks/base/services/core/jni/ |
com_android_server_location_FlpHardwareProvider.cpp | 787 ALOGE("Invalid location for injection: %p", locationObject); 811 ALOGE("Invalid diagnostic data for injection: %p", stringData);
|
/frameworks/base/docs/html/guide/topics/providers/ |
content-provider-basics.jd | 517 <h4 id="Injection">Protecting against malicious input</h4> 520 data into raw SQL statements can lead to SQL injection. 535 <a href="http://en.wikipedia.org/wiki/SQL_injection">SQL injection</a> attempts). [all...] |
/external/chromium_org/chrome/browser/extensions/activity_log/ |
uma_policy.cc | 50 // A mask of all the ad injection flags.
|
/external/chromium_org/chrome/browser/extensions/ |
user_script_master.cc | 508 // Don't allow injection of content scripts into <webview>.
|
/external/chromium_org/chrome/common/extensions/api/ |
webview.json | 375 "description": "Injects CSS into a <webview> page. For details, see the <a href='/extensions/content_scripts#pi'>programmatic injection</a> section of the content scripts doc.",
|
/external/chromium_org/components/storage_monitor/ |
storage_monitor_win_unittest.cc | 426 // device check notification, blocking the duplicate device injection.
|
/external/chromium_org/ppapi/api/private/ |
ppb_nacl_private.idl | 233 * injection only to avoid the linkage problems that occur because the NaCl
|
/external/chromium_org/ppapi/c/private/ |
ppb_nacl_private.h | 282 * injection only to avoid the linkage problems that occur because the NaCl
|
/external/chromium_org/sandbox/win/src/ |
security_level.h | 191 // Disables common DLL injection methods (e.g. window hooks and
|
/external/chromium_org/third_party/libjingle/source/talk/media/webrtc/ |
webrtcvoiceengine.h | 95 // Dependency injection for testing.
|
/frameworks/base/core/java/android/content/ |
SearchRecentSuggestionsProvider.java | 317 // TODO: Confirm no injection attacks here, or rewrite.
|
/frameworks/base/docs/html/training/contacts-provider/ |
retrieve-details.jd | 150 possibility of malicious SQL injection.
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/recents/misc/ |
SystemServicesProxy.java | 71 * a point of injection when testing UI.
|
/frameworks/base/tools/layoutlib/create/ |
README.txt | 169 1- Class Injection
|
/frameworks/native/include/input/ |
Input.h | 164 // input device or an application with system-wide event injection permission.
|
/libcore/dalvik/src/main/java/dalvik/system/ |
DexFile.java | 104 + " your application from code injection attacks.");
|