/external/owasp/sanitizer/src/tests/org/owasp/html/ |
HtmlChangeReporterTest.java | 72 HtmlSanitizer.sanitize(
|
/external/selinux/libselinux/man/man3/ |
getexeccon.3 | 43 so a program doesn't need to explicitly sanitize it upon startup.
|
/external/skia/third_party/freetype2/ |
BUILD.gn | 9 is_official_build || !(is_android || sanitize == "MSAN")
|
/external/trappy/trappy/plotter/ |
Utils.py | 36 template class to sanitize attr accesses
|
/frameworks/av/media/libstagefright/ |
Android.bp | 151 sanitize: {
|
/frameworks/native/libs/ui/ |
Android.bp | 46 sanitize: {
|
/prebuilts/clang/host/linux-x86/ |
Android.bp | 19 sanitize: {
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/X11/ |
Xosdefs.h | 77 /* Defining any of these will sanitize the namespace to JUST want is defined by
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/X11/ |
Xosdefs.h | 77 /* Defining any of these will sanitize the namespace to JUST want is defined by
|
/system/core/libcutils/ |
Android.bp | 117 sanitize: {
|
/system/core/libutils/ |
Android.bp | 114 sanitize: {
|
/external/clang/test/Driver/ |
fsanitize.c | 2 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-integer-overflow %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-UNDEFINED-TRAP2 42 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address,undefined -fno-sanitize=all -fsanitize=thread %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-FNO-SANITIZE-ALL 43 // CHECK-FNO-SANITIZE-ALL: "-fsanitize=thread" 45 // RUN: %clang -target x86_64-linux-gnu -fsanitize=thread,undefined -fno-sanitize=thread -fno-sanitize=float-cast-overflow,vptr,bool,enum %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-PARTIAL-UNDEFINED 48 // RUN: %clang -target x86_64-linux-gnu -fsanitize=shift -fno-sanitize=shift-base %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-FSANITIZE-SHIFT-PARTIAL 123 // RUN: %clang -target x86_64-linux-gnu -fsanitize=memory -fno-sanitize=memory -fsanitize-memory-track-origins -pie %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-TRACK-ORIGINS-DISABLED-MSAN 129 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize=alignment -fsanitize=vptr -fno-sanitize=vptr %s -### 2>&1 139 // RUN: %clang -target x86_64-linux-gnu -fsanitize=memory -fno-sanitize-memory-track-origins -fsanitize-memory-track-origins -pie %s -### 2>&1 | FileCheck %s --check-pref (…) [all...] |
/bionic/libc/malloc_debug/ |
Android.bp | 22 sanitize: { 80 sanitize: {
|
/bionic/libdl/ |
Android.bp | 71 sanitize: { 117 sanitize: {
|
/external/google-benchmark/ |
.travis.yml | 99 - EXTRA_FLAGS="-stdlib=libc++ -g -O2 -fno-omit-frame-pointer -fsanitize=undefined,address -fno-sanitize-recover=all" 120 - EXTRA_FLAGS="-stdlib=libc++ -g -O2 -fno-omit-frame-pointer -fsanitize=thread -fno-sanitize-recover=all"
|
/prebuilts/clang/host/linux-x86/soong/ |
clangprebuilts.go | 122 Sanitize struct { 138 p.Sanitize.Never = true
|
/build/soong/cc/ |
cc.go | 294 sanitize *sanitize 325 if c.sanitize != nil { 326 c.AddProperties(c.sanitize.props()...) 488 module.sanitize = &sanitize{} 534 if c.sanitize != nil { 535 flags = c.sanitize.flags(ctx, flags) 611 if c.sanitize != nil { 612 c.sanitize.begin(ctx [all...] |
/external/clang/lib/Driver/ |
SanitizerArgs.cpp | 56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any 61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid 302 << ("-fno-sanitize-trap=" + toString(S)) << TC.getTriple().str(); 333 // -f(-no)sanitize=leak should change whether leak detection is enabled by 336 // Parse -f(no-)?sanitize-recover flags. 347 DeprecatedReplacement = "-fno-sanitize-recover=undefined,integer' or " 348 "'-fno-sanitize-recover=all"; 386 // Parse -f(no-)sanitize-blacklist options. 412 // Parse -f[no-]sanitize-memory-track-origins[=level] options. 448 // Parse -f(no-)?sanitize-coverage flags if coverage is supported by th [all...] |
/external/owasp/sanitizer/distrib/javadoc/src-html/org/owasp/html/ |
PolicyFactory.html | 47 <FONT color="green">044</FONT> * provides a convenient <code>{@link PolicyFactory#sanitize sanitize}</code><a name="line.44"></a> 103 <FONT color="green">100</FONT> public String sanitize(@Nullable String html) {<a name="line.100"></a> 104 <FONT color="green">101</FONT> return sanitize(html, null, null);<a name="line.101"></a> 110 <FONT color="green">107</FONT> * @param html the string of HTML to sanitize.<a name="line.107"></a> 119 <FONT color="green">116</FONT> public <CTX> String sanitize(<a name="line.116"></a> 124 <FONT color="green">121</FONT> HtmlSanitizer.sanitize(<a name="line.121"></a>
|
/external/clang/lib/CodeGen/ |
BackendUtil.cpp | 273 if (LangOpts.Sanitize.has(SanitizerKind::EfficiencyCacheFrag)) 275 else if (LangOpts.Sanitize.has(SanitizerKind::EfficiencyWorkingSet)) 396 if (LangOpts.Sanitize.has(SanitizerKind::LocalBounds)) { 412 if (LangOpts.Sanitize.has(SanitizerKind::Address)) { 419 if (LangOpts.Sanitize.has(SanitizerKind::KernelAddress)) { 426 if (LangOpts.Sanitize.has(SanitizerKind::Memory)) { 433 if (LangOpts.Sanitize.has(SanitizerKind::Thread)) { 440 if (LangOpts.Sanitize.has(SanitizerKind::DataFlow)) { 447 if (LangOpts.Sanitize.hasOneOf(SanitizerKind::Efficiency)) { [all...] |
/external/fmtlib/test/ |
gtest-extra-test.cc | 46 std::string sanitize(const std::string &s) { function in namespace:__anon19448 388 EXPECT_EQ("censored", sanitize(redir.restore_and_read())); 389 EXPECT_EQ("", sanitize(redir.restore_and_read()));
|
/external/harfbuzz_ng/src/ |
hb-ot-shape-complex-arabic-fallback.hh | 95 /* TODO sanitize the results? */ 178 /* TODO sanitize the results? */ 242 /* TODO sanitize the table? */
|
/external/owasp/sanitizer/src/main/org/owasp/html/examples/ |
EbayPolicyExample.java | 214 // Fetch the HTML to sanitize. 233 // Use the policy defined above to sanitize the HTML. 234 HtmlSanitizer.sanitize(html, POLICY_DEFINITION.apply(renderer));
|
/external/boringssl/ |
Android.bp | 131 sanitize: {
|
/external/clang/include/clang/Basic/ |
Sanitizers.h | 74 /// Parse a single value from a -fsanitize= or -fno-sanitize= value list.
|