/cts/tests/tests/net/src/android/net/cts/ |
UrlQuerySanitizerTest.java | 147 assertEquals("Joe_User", vs.sanitize("Joe<User")); 149 assertEquals("Joe User", vs.sanitize("Joe<>\0User")); 151 assertEquals("Joe User", vs.sanitize("Joe\0User")); 153 assertEquals("Joe_User", vs.sanitize("Joe User")); 155 assertEquals("Joe User&", vs.sanitize("Joe User&")); 157 assertEquals("Joe_User&", vs.sanitize("Joe User&")); 159 assertEquals("Joe User ", vs.sanitize("Joe User&")); 161 assertEquals("Joe User&Smith%B5'\'", vs.sanitize("Joe User&Smith%B5'\'")); 163 assertEquals("Joe_User&Smith%B5'\'", vs.sanitize("Joe User&Smith%B5'\'")); 208 public String sanitize(String value) [all...] |
UrlQuerySanitizer_IllegalCharacterValueSanitizerTest.java | 27 assertEquals("Joe User", sanitizer.sanitize("Joe<User"));
|
/external/clang/test/Driver/ |
fsanitize-blacklist.c | 27 // RUN: %clang -target x86_64-linux-gnu -fsanitize-blacklist=%t.good %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-SANITIZE --check-prefix=DELIMITERS 28 // CHECK-NO-SANITIZE-NOT: -fsanitize-blacklist 35 // Flag -fno-sanitize-blacklist wins if it is specified later. 36 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fno-sanitize-blacklist %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-BLACKLIST --check-prefix=DELIMITERS 40 // RUN: %clang -target x86_64-linux-gnu -fno-sanitize-blacklist -fsanitize-blacklist=unexisting.txt %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-SUCH-FILE 47 // -fno-sanitize-blacklist disables all blacklists specified earlier. 48 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fno-sanitize-blacklist -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ONLY-FIRST-DISABLED
|
windows-cross.c | 47 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-ADDRESS 49 // CHECK-SANITIZE-ADDRESS: "-fsanitize=address" 50 // CHECK-SANITIZE-ADDRESS: "{{.*}}clang_rt.asan_dll_thunk-arm.lib" 53 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-ADDRESS-EXE 55 // CHECK-SANITIZE-ADDRESS-EXE: "-fsanitize=address" 56 // CHECK-SANITIZE-ADDRESS-EXE: "{{.*}}clang_rt.asan_dynamic-arm.lib" "{{.*}}clang_rt.asan_dynamic_runtime_thunk-arm.lib" "--undefined" "__asan_seh_interceptor" 59 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-ADDRESS-EXE-X86 61 // CHECK-SANITIZE-ADDRESS-EXE-X86: "-fsanitize=address" 62 // CHECK-SANITIZE-ADDRESS-EXE-X86: "{{.*}}clang_rt.asan_dynamic-i686.lib" "{{.*}}clang_rt.asan_dynamic_runtime_thunk-i686.lib" "--undefined" "___asan_seh_interceptor" 65 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-TSA [all...] |
/external/owasp/sanitizer/src/tests/org/owasp/html/ |
Benchmark.java | 70 n += sanitize(html).length(); 93 n += sanitize(html).length(); 118 "Full sanitize custom : %12d", (t3 - t2))); 122 "Full sanitize w/ PB : %12d", (t5 - t4))); 132 private static String sanitize(String html) throws Exception { method in class:Benchmark 143 HtmlSanitizer.sanitize(html, new HtmlSanitizer.Policy() { 202 HtmlSanitizer.sanitize(html, policyBuilder.build(renderer));
|
ExamplesTest.java | 61 // Invoke with no arguments to sanitize empty input stream to output. 82 String sanitized = EbayPolicyExample.POLICY_DEFINITION.sanitize(input); 89 String sanitized = EbayPolicyExample.POLICY_DEFINITION.sanitize(input); 96 String sanitized = EbayPolicyExample.POLICY_DEFINITION.sanitize(input);
|
/external/pdfium/third_party/lcms2-2.6/ |
README.pdfium | 28 0015-sanitize-float-read.patch: Sanitize floating point read. Partially backport 30 0016-check-LUT-and-MPE.patch: check LUT consistency and sanitize MPE profiles.
|
/external/skia/site/dev/testing/ |
xsan.md | 29 sanitize = "MSAN" 44 sanitize = "ASAN" 58 sanitize = "TSAN"
|
/frameworks/av/media/libstagefright/codecs/aacenc/ |
Android.bp | 102 sanitize: { 129 sanitize: { 166 sanitize: {
|
/frameworks/av/media/libstagefright/codecs/amrnb/enc/ |
Android.bp | 74 //sanitize: { 103 //sanitize: { 136 //sanitize: {
|
/external/compiler-rt/test/ubsan/TestCases/TypeCheck/ |
vptr-virtual-base.cpp | 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -g %s -O3 -o %t
|
/external/flac/libFLAC/ |
Android.bp | 52 sanitize: {
|
/external/harfbuzz_ng/src/ |
hb-ot-post-table.hh | 45 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::postV2Tail 48 return_trace (numberOfGlyphs.sanitize (c) && 67 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::post 75 return_trace (v2.sanitize (c));
|
hb-ot-var-avar-table.hh | 37 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::AxisValueMap 96 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::avar 99 if (unlikely (!(version.sanitize (c) && 108 if (unlikely (!map->sanitize (c)))
|
hb-ot-layout-gsub-table.hh | 106 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::SingleSubstFormat1 109 return_trace (coverage.sanitize (c, this) && deltaGlyphID.sanitize (c)); 191 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::SingleSubstFormat2 194 return_trace (coverage.sanitize (c, this) && substitute.sanitize (c)); 319 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::Sequence 322 return_trace (substitute.sanitize (c)); 396 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::MultipleSubstFormat1 399 return_trace (coverage.sanitize (c, this) && sequence.sanitize (c, this)) 548 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::AlternateSubstFormat1 692 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::Ligature 771 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigatureSet 864 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigatureSubstFormat1 1035 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::ReverseChainSingleSubstFormat1 1271 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::SubstLookup 1307 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::GSUB [all...] |
hb-ot-name-table.hh | 59 inline bool sanitize (hb_sanitize_context_t *c, const void *base) const function in struct:OT::NameRecord 110 if (!nameRecord[i].sanitize (c, string_pool)) return_trace (false); 114 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::name
|
/frameworks/av/media/libaudioclient/ |
Android.bp | 52 sanitize: {
|
/frameworks/base/core/java/com/android/internal/os/ |
IParcelFileDescriptorFactory.aidl | 23 // NOTE: implementors should carefully sanitize the incoming name
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
Android.bp | 71 sanitize: { 98 sanitize: {
|
/external/compiler-rt/test/ubsan/TestCases/Integer/ |
no-recover.cpp | 2 // RUN: %clangxx -fsanitize=unsigned-integer-overflow -fno-sanitize-recover=all -fsanitize-recover=unsigned-integer-overflow %s -o %t && %run %t 2>&1 | FileCheck %s --check-prefix=RECOVER 3 // RUN: %clangxx -fsanitize=unsigned-integer-overflow -fno-sanitize-recover=unsigned-integer-overflow %s -o %t && not %run %t 2>&1 | FileCheck %s --check-prefix=ABORT
|
/external/libcxx/cmake/ |
config-ix.cmake | 39 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize=all") 42 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8bit-counters")
|
/frameworks/av/media/libstagefright/codecs/m4v_h263/dec/ |
Android.bp | 56 sanitize: { 103 sanitize: {
|
/frameworks/av/media/libstagefright/omx/ |
Android.bp | 82 sanitize: { 117 sanitize: {
|
/external/compiler-rt/lib/asan/ |
Android.bp | 91 sanitize: { 108 sanitize: { 149 sanitize: { 217 sanitize: { 256 sanitize: { 295 sanitize: {
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
PolicyFactory.java | 44 * provides a convenient <code>{@link PolicyFactory#sanitize sanitize}</code> 100 public String sanitize(@Nullable String html) { method in class:PolicyFactory 101 return sanitize(html, null, null); 107 * @param html the string of HTML to sanitize. 116 public <CTX> String sanitize( method in class:PolicyFactory 121 HtmlSanitizer.sanitize(
|