HomeSort by relevance Sort by last modified time
    Searched full:injection (Results 151 - 175 of 301) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/valgrind/main/VEX/priv/
ir_inject.c 48 /* The IR Injection Control Block. vex_inject_ir will query its contents
  /frameworks/base/test-runner/src/android/test/
ServiceTestCase.java 77 * <strong>Dependency Injection.</strong>
  /hardware/qcom/gps/loc_api/libloc_api_50001/
loc.cpp 526 This is used by Java native function to do time injection.
555 This is used by Java native function to do location injection.
589 LOC_LOGI("GPS HAL coarse position injection disabled");
593 LOC_LOGI("GPS HAL coarse position injection enabled");
  /packages/apps/Settings/src/com/android/settings/bluetooth/
BluetoothPairingDialog.java 225 // Escape device name to avoid HTML injection.
  /packages/apps/UnifiedEmail/src/com/android/mail/providers/
SearchRecentSuggestionsProvider.java 285 // TODO: Confirm no injection attacks here, or rewrite.
  /external/chromium_org/remoting/host/
client_session_unittest.cc 206 // DesktopEnvironment owns |input_injector_|, but input injection tests need
565 // eventually (via dependency injection, not sleep!)
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/
cmdline.py 338 # _covpkg is for dependency injection, so we can test this code.
345 # For dependency injection:
  /external/chromium_org/tools/json_schema_compiler/test/
tabs.json 535 "description": "Injects JavaScript code into a page. For details, see the <a href='content_scripts.html#pi'>programmatic injection</a> section of the content scripts doc.",
560 "description": "Injects CSS into a page. For details, see the <a href='content_scripts.html#pi'>programmatic injection</a> section of the content scripts doc.",
  /frameworks/base/core/java/android/database/sqlite/
SQLiteQueryBuilder.java 112 * to avoid SQL injection attacks
381 // in the selection string that could indicate a SQL injection attempt.
  /frameworks/base/services/core/jni/
com_android_server_location_FlpHardwareProvider.cpp 787 ALOGE("Invalid location for injection: %p", locationObject);
811 ALOGE("Invalid diagnostic data for injection: %p", stringData);
  /frameworks/base/docs/html/guide/topics/providers/
content-provider-basics.jd 517 <h4 id="Injection">Protecting against malicious input</h4>
520 data into raw SQL statements can lead to SQL injection.
535 <a href="http://en.wikipedia.org/wiki/SQL_injection">SQL injection</a> attempts).
    [all...]
  /external/chromium_org/chrome/browser/extensions/activity_log/
uma_policy.cc 50 // A mask of all the ad injection flags.
  /external/chromium_org/chrome/browser/extensions/
user_script_master.cc 508 // Don't allow injection of content scripts into <webview>.
  /external/chromium_org/chrome/common/extensions/api/
webview.json 375 "description": "Injects CSS into a <webview> page. For details, see the <a href='/extensions/content_scripts#pi'>programmatic injection</a> section of the content scripts doc.",
  /external/chromium_org/components/storage_monitor/
storage_monitor_win_unittest.cc 426 // device check notification, blocking the duplicate device injection.
  /external/chromium_org/ppapi/api/private/
ppb_nacl_private.idl 233 * injection only to avoid the linkage problems that occur because the NaCl
  /external/chromium_org/ppapi/c/private/
ppb_nacl_private.h 282 * injection only to avoid the linkage problems that occur because the NaCl
  /external/chromium_org/sandbox/win/src/
security_level.h 191 // Disables common DLL injection methods (e.g. window hooks and
  /external/chromium_org/third_party/libjingle/source/talk/media/webrtc/
webrtcvoiceengine.h 95 // Dependency injection for testing.
  /frameworks/base/core/java/android/content/
SearchRecentSuggestionsProvider.java 317 // TODO: Confirm no injection attacks here, or rewrite.
  /frameworks/base/docs/html/training/contacts-provider/
retrieve-details.jd 150 possibility of malicious SQL injection.
  /frameworks/base/packages/SystemUI/src/com/android/systemui/recents/misc/
SystemServicesProxy.java 71 * a point of injection when testing UI.
  /frameworks/base/tools/layoutlib/create/
README.txt 169 1- Class Injection
  /frameworks/native/include/input/
Input.h 164 // input device or an application with system-wide event injection permission.
  /libcore/dalvik/src/main/java/dalvik/system/
DexFile.java 104 + " your application from code injection attacks.");

Completed in 1231 milliseconds

1 2 3 4 5 67 8 91011>>