/packages/apps/UnifiedEmail/tests/src/com/android/mail/utils/ |
BasicHtmlSanitizerTest.java | 13 sanitize("<div dir=\"ltr\">something</div>", "<div dir=\"ltr\">something</div>"); 14 sanitize("<div dir=\"rtl\">something</div>", "<div dir=\"rtl\">something</div>"); 15 sanitize("<div dir=\"LTR\">something</div>", "<div dir=\"ltr\">something</div>"); 16 sanitize("<div dir=\"RTL\">something</div>", "<div dir=\"rtl\">something</div>"); 17 sanitize("<div dir=\"blah\">something</div>", "<div>something</div>"); 22 sanitize("<a coords=\"something\"></a>", "<a coords=\"something\"></a>"); 23 sanitize("<a href=\"http://www.here.com\"></a>", "<a href=\"http://www.here.com\"></a>"); 24 sanitize("<a href=\"https://www.here.com\"></a>", "<a href=\"https://www.here.com\"></a>"); 25 sanitize("<a name=\"something\"></a>", "<a name=\"something\"></a>"); 26 sanitize("<a shape=\"something\"></a>", "<a shape=\"something\"></a>") 854 sanitize(attack, defend); method 1074 private void sanitize(String dirtyHTML, String expectedHTML) { method in class:BasicHtmlSanitizerTest [all...] |
AdvancedHtmlSanitizerTest.java | 12 sanitize("<html>\n" + 49 sanitize("'';!--\"<XSS>=&{()}", "'';!--"=&{()}"); 50 sanitize("<img src=javascript:alert(String.fromCharCode(88,83,83))>", ""); 51 sanitize("\\\";alert('XSS');//", "\\";alert('XSS');//"); 52 sanitize("<br size=\"&{alert('XSS')}\">", "<br />"); 53 sanitize("<xss style=\"xss:expression(alert('XSS'))\">", ""); 54 sanitize("<xss style=\"behavior: url(xss.htc);\">", ""); 55 sanitize("¼script¾alert(¢XSS¢)¼/script¾", "¼script¾alert(¢XSS¢)¼/script¾"); 56 sanitize("<xml><i><b><img src=\"javas<!-- -->cript:alert('XSS')\"></b></i></xml>", 58 sanitize("<xml src=\"xsstest.xml\" id=I></xml>", "") 534 private void sanitize(String dirtyHTML, String expectedHTML) { method in class:AdvancedHtmlSanitizerTest [all...] |
QuotedHtmlSanitizerTest.java | 17 sanitize("<div class=\"garbage\"></div>", "<div></div>"); 24 sanitize("<div class=\"gmail_quote\"></div>", "<div class=\"elided-text\"></div>"); 31 sanitize("<div class=\"yahoo_quoted\"></div>", "<div class=\"elided-text\"></div>"); 38 sanitize("<div id=\"AOLMsgPart_1_59da800c-ba5d-45c5-9ff7-29a8264a5bd9\"></div>", 40 sanitize("<div id=\"AOLMsgPart_1_b916b4c7-3047-43a9-b24d-83b7ffd2b9b7\"></div>", 44 private void sanitize(String dirtyHTML, String expectedHTML) { method in class:QuotedHtmlSanitizerTest
|
/external/libvpx/libwebm/ |
Android.bp | 5 sanitize: {
|
/system/core/libpackagelistparser/ |
Android.bp | 10 sanitize: {
|
/external/fec/ |
Android.bp | 17 sanitize: { 22 sanitize: {
|
/external/fmtlib/ |
Android.bp | 8 sanitize: {
|
/frameworks/av/media/libstagefright/codecs/amrwbenc/SampleCode/ |
Android.bp | 22 sanitize: {
|
/system/core/qemu_pipe/ |
Android.bp | 6 sanitize: {
|
/build/soong/cc/ |
sanitize.go | 78 Sanitize struct { 116 type sanitize struct { type 123 func (sanitize *sanitize) props() []interface{} { 124 return []interface{}{&sanitize.Properties} 127 func (sanitize *sanitize) begin(ctx BaseModuleContext) { 128 s := &sanitize.Properties.Sanitize 248 sanitize.Properties.SanitizerEnabled = tru [all...] |
/external/libcxx/test/support/ |
filesystem_dynamic_test_helper.py | 20 def sanitize(p): function 45 root_p = sanitize(root_p) 51 root_p = sanitize(root_p) 57 with open(sanitize(fname), 'w') as f: 62 os.mkdir(sanitize(dname)) 66 os.symlink(sanitize(source), sanitize(link)) 70 os.link(sanitize(source), sanitize(link)) 74 os.mkfifo(sanitize(source) [all...] |
/external/clang/test/SemaTemplate/ |
array-to-pointer-decay.cpp | 22 template <typename Type> static bool sanitize() { function 26 bool closure = sanitize<int>();
|
/external/llvm/lib/Fuzzer/test/uninstrumented/ |
CMakeLists.txt | 5 "${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8bit-counters")
|
/frameworks/av/media/libstagefright/id3/ |
Android.bp | 10 sanitize: { 46 sanitize: {
|
/external/harfbuzz_ng/src/ |
hb-ot-layout-jstf-table.hh | 57 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::JstfPriority 61 shrinkageEnableGSUB.sanitize (c, this) && 62 shrinkageDisableGSUB.sanitize (c, this) && 63 shrinkageEnableGPOS.sanitize (c, this) && 64 shrinkageDisableGPOS.sanitize (c, this) && 65 shrinkageJstfMax.sanitize (c, this) && 66 extensionEnableGSUB.sanitize (c, this) && 67 extensionDisableGSUB.sanitize (c, this) && 68 extensionEnableGPOS.sanitize (c, this) && 69 extensionDisableGPOS.sanitize (c, this) & 126 inline bool sanitize (hb_sanitize_context_t *c, function in struct:OT::JstfLangSys 167 inline bool sanitize (hb_sanitize_context_t *c, function in struct:OT::JstfScript 212 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::JSTF [all...] |
hb-ot-layout-gdef-table.hh | 74 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::AttachList 77 return_trace (coverage.sanitize (c, this) && attachPoint.sanitize (c, this)); 105 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValueFormat1 132 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValueFormat2 156 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValueFormat3 159 return_trace (c->check_struct (this) && deviceTable.sanitize (c, this)); 188 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValue 191 if (!u.format.sanitize (c)) return_trace (false); 193 case 1: return_trace (u.format1.sanitize (c)) 231 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigGlyph 267 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigCaretList 290 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::MarkGlyphSetsFormat1 315 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::MarkGlyphSets 387 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::GDEF [all...] |
/external/owasp/sanitizer/src/tests/org/owasp/html/ |
SanitizersTest.java | 39 assertEquals("", Sanitizers.FORMATTING.sanitize(null)); 40 assertEquals("", Sanitizers.FORMATTING.sanitize("")); 43 Sanitizers.FORMATTING.sanitize("Hello, World!")); 46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!")); 49 Sanitizers.FORMATTING.sanitize( 55 assertEquals("", Sanitizers.BLOCKS.sanitize(null)); 58 Sanitizers.BLOCKS.sanitize("Hello, World!")); 61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!")); 64 Sanitizers.BLOCKS.sanitize( 76 assertEquals("", f.sanitize(null)) [all...] |
HtmlSanitizerTest.java | 42 assertEquals("", sanitize("")); 43 assertEquals("", sanitize(null)); 48 assertEquals("hello world", sanitize("hello world")); 53 assertEquals("<hello world>", sanitize("<hello world>")); 59 sanitize("<b>hello <i>world</i></b>")); 65 sanitize("<b>hello <bogus></bogus><i>world</i></b>")); 71 sanitize("<b>hello <i>world</i>" 79 sanitize("<b>hello <i onclick=\"takeOverWorld(this)\">world</i></b>")); 85 sanitize( 92 sanitize("<b id=\"foo\" / -->hello <i>world<</i></b>")) 343 private static String sanitize(@Nullable String html) throws Exception { method in class:HtmlSanitizerTest [all...] |
/external/compiler-rt/test/ubsan/TestCases/TypeCheck/ |
vptr-non-unique-typeinfo.cpp | 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -fPIC -shared -o %t-lib.so -DBUILD_SO 2 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -O3 -o %t %t-lib.so
|
/external/clang/test/Driver/ |
fsanitize-coverage.c | 1 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-0 2 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-0 3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-0 4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type 5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address 7 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC 8 // RUN: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC 9 // RUN: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC 11 // RUN: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUN [all...] |
/external/compiler-rt/test/ubsan/TestCases/Integer/ |
shift.cpp | 1 // RUN: %clangxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %run %t1 2>&1 | FileCheck %s --check-prefix=CHECK-LSH_OVERFLOW 2 // RUN: %clangxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %run %t2 2>&1 | FileCheck %s --check-prefix=CHECK-LSH_OVERFLOW 3 // RUN: %clangxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %run %t3 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW 4 // RUN: %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %t4 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW 5 // RUN: %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run %t5 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW 6 // RUN: %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run %t6 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW 7 // RUN: %clangxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %run %t7 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIGH 8 // RUN: %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run %t8 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIGH 9 // RUN: %clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run %t9 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIGH 10 // RUN: %clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run %t10 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIG [all...] |
/external/llvm/lib/Fuzzer/test/dfsan/ |
CMakeLists.txt | 4 "${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fsanitize=dataflow")
|
/external/llvm/lib/Fuzzer/test/trace-pc/ |
CMakeLists.txt | 4 "${LIBFUZZER_FLAGS_BASE} -fno-sanitize-coverage=8bit-counters -fsanitize-coverage=trace-pc")
|
/external/llvm/lib/Fuzzer/test/ubsan/ |
CMakeLists.txt | 4 "${LIBFUZZER_FLAGS_BASE} -fsanitize=undefined -fno-sanitize-recover=all")
|
/external/mesa3d/bin/ |
.cherry-ignore | 2 d49d275c415d60ae08dc3e52d8db11f19a44010f anv/blorp: Don't sanitize the swizzle for blorp_clear
|