/frameworks/av/media/libstagefright/codecs/amrnb/common/ |
Android.bp | 80 //sanitize: {
|
/frameworks/minikin/libs/minikin/ |
Android.bp | 58 sanitize: {
|
/frameworks/native/libs/binder/ |
Android.bp | 106 sanitize: {
|
/frameworks/native/vulkan/libvulkan/ |
Android.bp | 26 sanitize: {
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++abi/ |
Android.bp | 52 sanitize: {
|
/system/keymaster/ |
Android.mk | 41 LOCAL_CLANG_CFLAGS += -fno-sanitize-coverage=edge,indirect-calls,8bit-counters,trace-cmp
|
/external/clang/lib/CodeGen/ |
SanitizerMetadata.cpp | 28 if (!CGM.getLangOpts().Sanitize.hasOneOf(SanitizerKind::Address | 60 if (!CGM.getLangOpts().Sanitize.hasOneOf(SanitizerKind::Address | 72 if (CGM.getLangOpts().Sanitize.hasOneOf(SanitizerKind::Address |
|
/external/owasp/sanitizer/src/main/org/owasp/html/examples/ |
SlashdotPolicyExample.java | 98 // Fetch the HTML to sanitize. 117 // Use the policy defined above to sanitize the HTML. 118 HtmlSanitizer.sanitize(html, POLICY_DEFINITION.apply(renderer));
|
/build/make/core/ |
config_sanitizers.mk | 99 # Support for local sanitize blacklist paths. 196 my_cflags += -fno-sanitize-trap=signed-integer-overflow,unsigned-integer-overflow 215 my_cflags += -fno-sanitize-recover=all 222 my_cflags += -fno-sanitize-trap=address,thread 300 my_cflags += -fno-sanitize-trap=$(notrap_arg)
|
/external/skia/gn/ |
BUILD.gn | 229 if (sanitize != "") { 232 sanitizers = sanitize 233 if (sanitize == "ASAN") { 235 } else if (sanitize == "TSAN") { 237 } else if (sanitize == "MSAN") { 243 "-fno-sanitize-recover=$sanitizers", 395 if (sanitize != "ASAN") { # -fsanitize=vptr requires RTTI
|
/external/harfbuzz_ng/src/ |
hb-ot-font.cc | 72 hb_blob_t *os2_blob = OT::Sanitizer<OT::os2>::sanitize (face->reference_table (os2_tag)); 85 hb_blob_t *_hea_blob = OT::Sanitizer<OT::_hea>::sanitize (face->reference_table (_hea_tag)); 99 this->blob = OT::Sanitizer<OT::hmtxvmtx>::sanitize (face->reference_table (_mtx_tag)); 117 this->var_blob = OT::Sanitizer<OT::HVARVVAR>::sanitize (face->reference_table (_var_tag)); 158 hb_blob_t *head_blob = OT::Sanitizer<OT::head>::sanitize (face->reference_table (HB_OT_TAG_head)); 169 this->loca_blob = OT::Sanitizer<OT::loca>::sanitize (face->reference_table (HB_OT_TAG_loca)); 171 this->glyf_blob = OT::Sanitizer<OT::glyf>::sanitize (face->reference_table (HB_OT_TAG_glyf)); 233 cblc_blob = OT::Sanitizer<OT::CBLC>::sanitize (face->reference_table (HB_OT_TAG_CBLC)); 234 cbdt_blob = OT::Sanitizer<OT::CBDT>::sanitize (face->reference_table (HB_OT_TAG_CBDT)); 350 this->blob = OT::Sanitizer<OT::cmap>::sanitize (face->reference_table (HB_OT_TAG_cmap)) [all...] |
hb-face.cc | 165 hb_face_for_data_closure_t *closure = _hb_face_for_data_closure_create (OT::Sanitizer<OT::OpenTypeFontFile>::sanitize (hb_blob_reference (blob)), index); 425 hb_blob_t *head_blob = OT::Sanitizer<OT::head>::sanitize (reference_table (HB_OT_TAG_head)); 469 hb_blob_t *maxp_blob = OT::Sanitizer<OT::maxp>::sanitize (reference_table (HB_OT_TAG_maxp));
|
hb-ot-hmtx-table.hh | 58 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::hmtxvmtx
|
/frameworks/base/core/java/android/net/ |
UrlQuerySanitizer.java | 101 * A functor used to sanitize a single query value. 106 * Sanitize an unencoded value. 110 public String sanitize(String value); method in interface:UrlQuerySanitizer.ValueSanitizer 114 * Sanitize values based on which characters they contain. Illegal 288 * Sanitize a value. 302 public String sanitize(String value) { method in class:UrlQuerySanitizer.IllegalCharacterValueSanitizer 417 * @return the current ValueSanitizer used to sanitize unregistered 427 * @param sanitizer set the ValueSanitizer used to sanitize unregistered 765 * effective value sanitizer for the parameter and uses it to sanitize 780 String sanitizedValue = valueSanitizer.sanitize(unescapedValue) [all...] |
/external/owasp/sanitizer/distrib/javadoc/index-files/ |
index-16.html | 83 <DT><A HREF="../org/owasp/html/HtmlSanitizer.html#sanitize(java.lang.String, org.owasp.html.HtmlSanitizer.Policy)"><B>sanitize(String, HtmlSanitizer.Policy)</B></A> - 86 <DT><A HREF="../org/owasp/html/PolicyFactory.html#sanitize(java.lang.String)"><B>sanitize(String)</B></A> - 89 <DT><A HREF="../org/owasp/html/PolicyFactory.html#sanitize(java.lang.String, org.owasp.html.HtmlChangeListener, CTX)"><B>sanitize(String, HtmlChangeListener<CTX>, CTX)</B></A> -
|
/build/soong/androidmk/cmd/androidmk/ |
androidmk_test.go | 278 sanitize: { 295 sanitize: { 316 sanitize: {
|
android.go | 36 "LOCAL_SANITIZE": sanitize(""), 37 "LOCAL_SANITIZE_DIAG": sanitize("diag."), 93 "LOCAL_SANITIZE_RECOVER": "sanitize.recover", 417 func sanitize(sub string) func(ctx variableAssignmentContext) error { func 425 return fmt.Errorf("unsupported sanitize expression") 433 ctx.file.errorf(ctx.mkvalue, "unsupported sanitize expression") 440 err = setVariable(ctx.file, false, ctx.prefix, "sanitize."+sub+v.Value, bpTrue, true) 448 return fmt.Errorf("sanitize expected a string, got %s", v.Type()) 453 err = setVariable(ctx.file, false, ctx.prefix, "sanitize."+sub+"misc_undefined", misc, true)
|
/prebuilts/ndk/r13/sources/third_party/shaderc/third_party/spirv-tools/source/ |
name_mapper.cpp | 78 std::string FriendlyNameMapper::Sanitize(const std::string& suggested_name) { 96 const std::string sanitized_suggested_name = Sanitize(suggested_name); 207 Sanitize(reinterpret_cast<const char*>(inst.words + 2)));
|
/art/dex2oat/ |
Android.bp | 34 sanitize: {
|
/external/clang/lib/Basic/ |
LangOptions.cpp | 33 Sanitize.clear();
|
/external/compiler-rt/test/cfi/cross-dso/icall/ |
diag.cpp | 25 // RUN: %clangxx_cfi_dso_diag -fsanitize-trap=cfi-icall -fno-sanitize-recover=cfi-unrelated-cast \ 27 // RUN: %clangxx_cfi_dso_diag -fsanitize-trap=cfi-icall -fno-sanitize-recover=cfi-unrelated-cast \ 42 // RUN: %clangxx_cfi_dso_diag -fsanitize-trap=cfi-icall -fno-sanitize-recover=cfi-unrelated-cast \ 61 // RUN: %clangxx_cfi_dso -fno-sanitize-trap=cfi-nvcall \
|
/external/elfutils/ |
Makefile.am | 42 --enable-valgrind --enable-sanitize-undefined \
|
/external/jsilver/src/com/google/clearsilver/jsilver/functions/escape/ |
JsValidateUnquotedLiteral.java | 24 * This function will be used to sanitize variables introduced into javascript that are not string
|
StyleEscapeFunction.java | 24 * This function will be used to sanitize variables in 'style' attributes. It strips out any
|
/external/libcxxabi/ |
Android.bp | 54 sanitize: {
|