/system/sepolicy/ |
blkid_untrusted.te | 1 # blkid for untrusted block devices 19 # Untrusted blkid should never be run on block devices holding sensitive data
|
fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 19 # Untrusted fsck should never be run on block devices holding sensitive data
|
untrusted_app.te | 2 ### Untrusted apps. 4 ### This file defines the rules for untrusted apps. 127 # Do not allow untrusted apps to register services.
|
/external/modp_b64/ |
modp_b64_nacl.gyp | 7 '../../native_client/build/untrusted.gypi',
|
/external/clang/test/Analysis/ |
taint-generic.c | 114 system(addr); // expected-warning {{Untrusted data is passed to a system call}} 118 system(buffer); // expected-warning {{Untrusted data is passed to a system call}} 127 system(buffern); // expected-warning {{Untrusted data is passed to a system call}} 136 system(buffern2); // expected-warning {{Untrusted data is passed to a system call}} 143 int *buf1 = (int*)malloc(ts*sizeof(int)); // expected-warning {{Untrusted data is used to specify the buffer size}} 144 char *dst = (char*)calloc(ts, sizeof(char)); //expected-warning {{Untrusted data is used to specify the buffer size}} 145 bcopy(buf1, dst, ts); // expected-warning {{Untrusted data is used to specify the buffer size}} 146 __builtin_memcpy(dst, buf1, (ts + 4)*sizeof(char)); // expected-warning {{Untrusted data is used to specify the buffer size}} 149 char *dst2 = (char*)malloc(ts*sizeof(char)); // expected-warning {{Untrusted data is used to specify the buffer size}} 167 execl(buffer, "filename", 0); // expected-warning {{Untrusted data is passed to a system call} [all...] |
/external/libchrome/crypto/ |
crypto_nacl.gyp | 10 '../native_client/build/untrusted.gypi',
|
/external/libyuv/files/ |
libyuv_nacl.gyp | 12 '../../native_client/build/untrusted.gypi',
|
/external/nanopb-c/docs/ |
security.rst | 14 untrusted data. Naturally, if the attacker can modify the contents of a 16 Therefore the application itself must be prepared to receive untrusted values. 23 Division of trusted and untrusted data 36 The following data is regarded as **untrusted**. Invalid/malicious data in 47 untrusted data has been maliciously crafted: 74 checked if they are used with untrusted data.
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
UntrustedChecker.java | 80 debug.println("UntrustedChecker: untrusted certificate " + 85 "Untrusted certificate: " + currCert.getSubjectX500Principal());
|
/packages/providers/DownloadProvider/tests/permission/src/com/android/providers/downloads/permission/tests/ |
DownloadProviderPermissionsTest.java | 68 * Test that an untrusted app cannot write to the download provider 87 * Test that an untrusted app cannot access the download service
|
/external/libchrome/base/process/ |
launch.cc | 49 // To prevent accidental privilege sharing to an untrusted child, processes
|
/external/dbus/dbus/ |
dbus-syntax.c | 45 * for validating untrusted data from a network unless the string's length 92 * for validating untrusted data from a network unless the string's length 139 * for validating untrusted data from a network unless the string's length 186 * for validating untrusted data from a network unless the string's length 233 * for validating untrusted data from a network unless the string's length 280 * for validating untrusted data from a network unless the string's length
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl_ocsp.c | 504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; 565 untrusted = sk_X509_dup(basic->certs); 566 if (!untrusted) 579 if (!sk_X509_push(untrusted, extra_cert)) { 581 "OpenSSL: Could not add certificate to the untrusted stack"); 618 signer = ocsp_find_signer(untrusted, rd->responderID); 646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) 838 sk_X509_free(untrusted);
|
/libcore/ojluni/src/main/java/javax/crypto/ |
SecretKeyFactorySpi.java | 96 * potentially untrusted, into a corresponding key object of this 99 * @param key the key whose provider is unknown or untrusted
|
/external/conscrypt/src/stub/java/com/android/org/conscrypt/ |
NativeCrypto.java | 31 * @throws CertificateException if the certificate is untrusted
|
/external/conscrypt/src/stub/java/org/apache/harmony/xnet/xnet/provider/jsse/ |
NativeCrypto.java | 31 * @throws CertificateException if the certificate is untrusted
|
/external/vboot_reference/firmware/lib/include/ |
vboot_kernel.h | 47 * untrusted keyboard (such as a USB device). In those cases, a recovery
|
/external/tcpdump/tests/ |
cdp-v.out | 16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 54 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
|
/external/clang/include/clang/AST/ |
CommentHTMLTags.td | 56 // output if the input is untrusted.
|
/external/guava/ |
README | 41 untrusted code.
|
/external/owasp/sanitizer/lib/guava-libraries/ |
README | 41 untrusted code.
|
/system/core/libcutils/ |
sockets_unix.cpp | 43 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
|
/libcore/ojluni/src/main/java/java/security/ |
KeyFactorySpi.java | 127 * potentially untrusted, into a corresponding key object of this key 130 * @param key the key whose provider is unknown or untrusted.
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 64 // *.ks1 - keystore containing untrusted certificates only 66 // *.ks3 - keystore containing both trusted and untrusted certificates 68 public static final int UNTRUSTED = 1; 139 * 1 - <code>KeyStore</code> with untrusted certificates only<br> 141 * 3 - <code>KeyStore</code> with both trusted and untrusted certificates
|
/frameworks/base/wifi/java/android/net/wifi/ |
ScanResult.java | 185 public boolean untrusted; field in class:ScanResult 451 untrusted = source.untrusted; 529 dest.writeInt(untrusted ? 1 : 0); 599 sr.untrusted = in.readInt() != 0;
|