HomeSort by relevance Sort by last modified time
    Searched full:untrusted (Results 1 - 25 of 340) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /system/sepolicy/
blkid_untrusted.te 1 # blkid for untrusted block devices
19 # Untrusted blkid should never be run on block devices holding sensitive data
fsck_untrusted.te 1 # Any fsck program run on untrusted block devices
19 # Untrusted fsck should never be run on block devices holding sensitive data
untrusted_app.te 2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps.
127 # Do not allow untrusted apps to register services.
  /external/modp_b64/
modp_b64_nacl.gyp 7 '../../native_client/build/untrusted.gypi',
  /external/clang/test/Analysis/
taint-generic.c 114 system(addr); // expected-warning {{Untrusted data is passed to a system call}}
118 system(buffer); // expected-warning {{Untrusted data is passed to a system call}}
127 system(buffern); // expected-warning {{Untrusted data is passed to a system call}}
136 system(buffern2); // expected-warning {{Untrusted data is passed to a system call}}
143 int *buf1 = (int*)malloc(ts*sizeof(int)); // expected-warning {{Untrusted data is used to specify the buffer size}}
144 char *dst = (char*)calloc(ts, sizeof(char)); //expected-warning {{Untrusted data is used to specify the buffer size}}
145 bcopy(buf1, dst, ts); // expected-warning {{Untrusted data is used to specify the buffer size}}
146 __builtin_memcpy(dst, buf1, (ts + 4)*sizeof(char)); // expected-warning {{Untrusted data is used to specify the buffer size}}
149 char *dst2 = (char*)malloc(ts*sizeof(char)); // expected-warning {{Untrusted data is used to specify the buffer size}}
167 execl(buffer, "filename", 0); // expected-warning {{Untrusted data is passed to a system call}
    [all...]
  /external/libchrome/crypto/
crypto_nacl.gyp 10 '../native_client/build/untrusted.gypi',
  /external/libyuv/files/
libyuv_nacl.gyp 12 '../../native_client/build/untrusted.gypi',
  /external/nanopb-c/docs/
security.rst 14 untrusted data. Naturally, if the attacker can modify the contents of a
16 Therefore the application itself must be prepared to receive untrusted values.
23 Division of trusted and untrusted data
36 The following data is regarded as **untrusted**. Invalid/malicious data in
47 untrusted data has been maliciously crafted:
74 checked if they are used with untrusted data.
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
UntrustedChecker.java 80 debug.println("UntrustedChecker: untrusted certificate " +
85 "Untrusted certificate: " + currCert.getSubjectX500Principal());
  /packages/providers/DownloadProvider/tests/permission/src/com/android/providers/downloads/permission/tests/
DownloadProviderPermissionsTest.java 68 * Test that an untrusted app cannot write to the download provider
87 * Test that an untrusted app cannot access the download service
  /external/libchrome/base/process/
launch.cc 49 // To prevent accidental privilege sharing to an untrusted child, processes
  /external/dbus/dbus/
dbus-syntax.c 45 * for validating untrusted data from a network unless the string's length
92 * for validating untrusted data from a network unless the string's length
139 * for validating untrusted data from a network unless the string's length
186 * for validating untrusted data from a network unless the string's length
233 * for validating untrusted data from a network unless the string's length
280 * for validating untrusted data from a network unless the string's length
  /external/wpa_supplicant_8/src/crypto/
tls_openssl_ocsp.c 504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL;
565 untrusted = sk_X509_dup(basic->certs);
566 if (!untrusted)
579 if (!sk_X509_push(untrusted, extra_cert)) {
581 "OpenSSL: Could not add certificate to the untrusted stack");
618 signer = ocsp_find_signer(untrusted, rd->responderID);
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted))
838 sk_X509_free(untrusted);
  /libcore/ojluni/src/main/java/javax/crypto/
SecretKeyFactorySpi.java 96 * potentially untrusted, into a corresponding key object of this
99 * @param key the key whose provider is unknown or untrusted
  /external/conscrypt/src/stub/java/com/android/org/conscrypt/
NativeCrypto.java 31 * @throws CertificateException if the certificate is untrusted
  /external/conscrypt/src/stub/java/org/apache/harmony/xnet/xnet/provider/jsse/
NativeCrypto.java 31 * @throws CertificateException if the certificate is untrusted
  /external/vboot_reference/firmware/lib/include/
vboot_kernel.h 47 * untrusted keyboard (such as a USB device). In those cases, a recovery
  /external/tcpdump/tests/
cdp-v.out 16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
54 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
  /external/clang/include/clang/AST/
CommentHTMLTags.td 56 // output if the input is untrusted.
  /external/guava/
README 41 untrusted code.
  /external/owasp/sanitizer/lib/guava-libraries/
README 41 untrusted code.
  /system/core/libcutils/
sockets_unix.cpp 43 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
  /libcore/ojluni/src/main/java/java/security/
KeyFactorySpi.java 127 * potentially untrusted, into a corresponding key object of this key
130 * @param key the key whose provider is unknown or untrusted.
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 64 // *.ks1 - keystore containing untrusted certificates only
66 // *.ks3 - keystore containing both trusted and untrusted certificates
68 public static final int UNTRUSTED = 1;
139 * 1 - <code>KeyStore</code> with untrusted certificates only<br>
141 * 3 - <code>KeyStore</code> with both trusted and untrusted certificates
  /frameworks/base/wifi/java/android/net/wifi/
ScanResult.java 185 public boolean untrusted; field in class:ScanResult
451 untrusted = source.untrusted;
529 dest.writeInt(untrusted ? 1 : 0);
599 sr.untrusted = in.readInt() != 0;

Completed in 2499 milliseconds

1 2 3 4 5 6 7 8 91011>>