HomeSort by relevance Sort by last modified time
    Searched full:sanitize (Results 76 - 100 of 839) sorted by null

1 2 34 5 6 7 8 91011>>

  /cts/tests/tests/net/src/android/net/cts/
UrlQuerySanitizerTest.java 147 assertEquals("Joe_User", vs.sanitize("Joe<User"));
149 assertEquals("Joe User", vs.sanitize("Joe<>\0User"));
151 assertEquals("Joe User", vs.sanitize("Joe\0User"));
153 assertEquals("Joe_User", vs.sanitize("Joe User"));
155 assertEquals("Joe User&", vs.sanitize("Joe User&"));
157 assertEquals("Joe_User&", vs.sanitize("Joe User&"));
159 assertEquals("Joe User ", vs.sanitize("Joe User&"));
161 assertEquals("Joe User&Smith%B5'\'", vs.sanitize("Joe User&Smith%B5'\'"));
163 assertEquals("Joe_User&Smith%B5'\'", vs.sanitize("Joe User&Smith%B5'\'"));
208 public String sanitize(String value)
    [all...]
UrlQuerySanitizer_IllegalCharacterValueSanitizerTest.java 27 assertEquals("Joe User", sanitizer.sanitize("Joe<User"));
  /external/clang/test/Driver/
fsanitize-blacklist.c 27 // RUN: %clang -target x86_64-linux-gnu -fsanitize-blacklist=%t.good %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-SANITIZE --check-prefix=DELIMITERS
28 // CHECK-NO-SANITIZE-NOT: -fsanitize-blacklist
35 // Flag -fno-sanitize-blacklist wins if it is specified later.
36 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fno-sanitize-blacklist %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-BLACKLIST --check-prefix=DELIMITERS
40 // RUN: %clang -target x86_64-linux-gnu -fno-sanitize-blacklist -fsanitize-blacklist=unexisting.txt %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-SUCH-FILE
47 // -fno-sanitize-blacklist disables all blacklists specified earlier.
48 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fno-sanitize-blacklist -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ONLY-FIRST-DISABLED
windows-cross.c 47 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-ADDRESS
49 // CHECK-SANITIZE-ADDRESS: "-fsanitize=address"
50 // CHECK-SANITIZE-ADDRESS: "{{.*}}clang_rt.asan_dll_thunk-arm.lib"
53 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-ADDRESS-EXE
55 // CHECK-SANITIZE-ADDRESS-EXE: "-fsanitize=address"
56 // CHECK-SANITIZE-ADDRESS-EXE: "{{.*}}clang_rt.asan_dynamic-arm.lib" "{{.*}}clang_rt.asan_dynamic_runtime_thunk-arm.lib" "--undefined" "__asan_seh_interceptor"
59 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-ADDRESS-EXE-X86
61 // CHECK-SANITIZE-ADDRESS-EXE-X86: "-fsanitize=address"
62 // CHECK-SANITIZE-ADDRESS-EXE-X86: "{{.*}}clang_rt.asan_dynamic-i686.lib" "{{.*}}clang_rt.asan_dynamic_runtime_thunk-i686.lib" "--undefined" "___asan_seh_interceptor"
65 // RUN: | FileCheck %s --check-prefix CHECK-SANITIZE-TSA
    [all...]
  /external/owasp/sanitizer/src/tests/org/owasp/html/
Benchmark.java 70 n += sanitize(html).length();
93 n += sanitize(html).length();
118 "Full sanitize custom : %12d", (t3 - t2)));
122 "Full sanitize w/ PB : %12d", (t5 - t4)));
132 private static String sanitize(String html) throws Exception { method in class:Benchmark
143 HtmlSanitizer.sanitize(html, new HtmlSanitizer.Policy() {
202 HtmlSanitizer.sanitize(html, policyBuilder.build(renderer));
ExamplesTest.java 61 // Invoke with no arguments to sanitize empty input stream to output.
82 String sanitized = EbayPolicyExample.POLICY_DEFINITION.sanitize(input);
89 String sanitized = EbayPolicyExample.POLICY_DEFINITION.sanitize(input);
96 String sanitized = EbayPolicyExample.POLICY_DEFINITION.sanitize(input);
  /external/pdfium/third_party/lcms2-2.6/
README.pdfium 28 0015-sanitize-float-read.patch: Sanitize floating point read. Partially backport
30 0016-check-LUT-and-MPE.patch: check LUT consistency and sanitize MPE profiles.
  /external/skia/site/dev/testing/
xsan.md 29 sanitize = "MSAN"
44 sanitize = "ASAN"
58 sanitize = "TSAN"
  /frameworks/av/media/libstagefright/codecs/aacenc/
Android.bp 102 sanitize: {
129 sanitize: {
166 sanitize: {
  /frameworks/av/media/libstagefright/codecs/amrnb/enc/
Android.bp 74 //sanitize: {
103 //sanitize: {
136 //sanitize: {
  /external/compiler-rt/test/ubsan/TestCases/TypeCheck/
vptr-virtual-base.cpp 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -g %s -O3 -o %t
  /external/flac/libFLAC/
Android.bp 52 sanitize: {
  /external/harfbuzz_ng/src/
hb-ot-post-table.hh 45 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::postV2Tail
48 return_trace (numberOfGlyphs.sanitize (c) &&
67 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::post
75 return_trace (v2.sanitize (c));
hb-ot-var-avar-table.hh 37 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::AxisValueMap
96 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::avar
99 if (unlikely (!(version.sanitize (c) &&
108 if (unlikely (!map->sanitize (c)))
hb-ot-layout-gsub-table.hh 106 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::SingleSubstFormat1
109 return_trace (coverage.sanitize (c, this) && deltaGlyphID.sanitize (c));
191 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::SingleSubstFormat2
194 return_trace (coverage.sanitize (c, this) && substitute.sanitize (c));
319 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::Sequence
322 return_trace (substitute.sanitize (c));
396 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::MultipleSubstFormat1
399 return_trace (coverage.sanitize (c, this) && sequence.sanitize (c, this))
548 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::AlternateSubstFormat1
692 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::Ligature
771 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigatureSet
864 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigatureSubstFormat1
1035 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::ReverseChainSingleSubstFormat1
1271 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::SubstLookup
1307 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::GSUB
    [all...]
hb-ot-name-table.hh 59 inline bool sanitize (hb_sanitize_context_t *c, const void *base) const function in struct:OT::NameRecord
110 if (!nameRecord[i].sanitize (c, string_pool)) return_trace (false);
114 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::name
  /frameworks/av/media/libaudioclient/
Android.bp 52 sanitize: {
  /frameworks/base/core/java/com/android/internal/os/
IParcelFileDescriptorFactory.aidl 23 // NOTE: implementors should carefully sanitize the incoming name
  /external/compiler-rt/lib/sanitizer_common/tests/
Android.bp 71 sanitize: {
98 sanitize: {
  /external/compiler-rt/test/ubsan/TestCases/Integer/
no-recover.cpp 2 // RUN: %clangxx -fsanitize=unsigned-integer-overflow -fno-sanitize-recover=all -fsanitize-recover=unsigned-integer-overflow %s -o %t && %run %t 2>&1 | FileCheck %s --check-prefix=RECOVER
3 // RUN: %clangxx -fsanitize=unsigned-integer-overflow -fno-sanitize-recover=unsigned-integer-overflow %s -o %t && not %run %t 2>&1 | FileCheck %s --check-prefix=ABORT
  /external/libcxx/cmake/
config-ix.cmake 39 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize=all")
42 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8bit-counters")
  /frameworks/av/media/libstagefright/codecs/m4v_h263/dec/
Android.bp 56 sanitize: {
103 sanitize: {
  /frameworks/av/media/libstagefright/omx/
Android.bp 82 sanitize: {
117 sanitize: {
  /external/compiler-rt/lib/asan/
Android.bp 91 sanitize: {
108 sanitize: {
149 sanitize: {
217 sanitize: {
256 sanitize: {
295 sanitize: {
  /external/owasp/sanitizer/src/main/org/owasp/html/
PolicyFactory.java 44 * provides a convenient <code>{@link PolicyFactory#sanitize sanitize}</code>
100 public String sanitize(@Nullable String html) { method in class:PolicyFactory
101 return sanitize(html, null, null);
107 * @param html the string of HTML to sanitize.
116 public <CTX> String sanitize( method in class:PolicyFactory
121 HtmlSanitizer.sanitize(

Completed in 1250 milliseconds

1 2 34 5 6 7 8 91011>>