HomeSort by relevance Sort by last modified time
    Searched full:sanitize (Results 1 - 25 of 839) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /packages/apps/UnifiedEmail/tests/src/com/android/mail/utils/
BasicHtmlSanitizerTest.java 13 sanitize("<div dir=\"ltr\">something</div>", "<div dir=\"ltr\">something</div>");
14 sanitize("<div dir=\"rtl\">something</div>", "<div dir=\"rtl\">something</div>");
15 sanitize("<div dir=\"LTR\">something</div>", "<div dir=\"ltr\">something</div>");
16 sanitize("<div dir=\"RTL\">something</div>", "<div dir=\"rtl\">something</div>");
17 sanitize("<div dir=\"blah\">something</div>", "<div>something</div>");
22 sanitize("<a coords=\"something\"></a>", "<a coords=\"something\"></a>");
23 sanitize("<a href=\"http://www.here.com\"></a>", "<a href=\"http://www.here.com\"></a>");
24 sanitize("<a href=\"https://www.here.com\"></a>", "<a href=\"https://www.here.com\"></a>");
25 sanitize("<a name=\"something\"></a>", "<a name=\"something\"></a>");
26 sanitize("<a shape=\"something\"></a>", "<a shape=\"something\"></a>")
854 sanitize(attack, defend); method
1074 private void sanitize(String dirtyHTML, String expectedHTML) { method in class:BasicHtmlSanitizerTest
    [all...]
AdvancedHtmlSanitizerTest.java 12 sanitize("<html>\n" +
49 sanitize("'';!--\"<XSS>=&{()}", "&#39;&#39;;!--&#34;&#61;&amp;{()}");
50 sanitize("<img src=javascript:alert(String.fromCharCode(88,83,83))>", "");
51 sanitize("\\\";alert('XSS');//", "\\&#34;;alert(&#39;XSS&#39;);//");
52 sanitize("<br size=\"&{alert('XSS')}\">", "<br />");
53 sanitize("<xss style=\"xss:expression(alert('XSS'))\">", "");
54 sanitize("<xss style=\"behavior: url(xss.htc);\">", "");
55 sanitize("¼script¾alert(¢XSS¢)¼/script¾", "¼script¾alert(¢XSS¢)¼/script¾");
56 sanitize("<xml><i><b><img src=\"javas<!-- -->cript:alert('XSS')\"></b></i></xml>",
58 sanitize("<xml src=\"xsstest.xml\" id=I></xml>", "")
534 private void sanitize(String dirtyHTML, String expectedHTML) { method in class:AdvancedHtmlSanitizerTest
    [all...]
QuotedHtmlSanitizerTest.java 17 sanitize("<div class=\"garbage\"></div>", "<div></div>");
24 sanitize("<div class=\"gmail_quote\"></div>", "<div class=\"elided-text\"></div>");
31 sanitize("<div class=\"yahoo_quoted\"></div>", "<div class=\"elided-text\"></div>");
38 sanitize("<div id=\"AOLMsgPart_1_59da800c-ba5d-45c5-9ff7-29a8264a5bd9\"></div>",
40 sanitize("<div id=\"AOLMsgPart_1_b916b4c7-3047-43a9-b24d-83b7ffd2b9b7\"></div>",
44 private void sanitize(String dirtyHTML, String expectedHTML) { method in class:QuotedHtmlSanitizerTest
  /external/libvpx/libwebm/
Android.bp 5 sanitize: {
  /system/core/libpackagelistparser/
Android.bp 10 sanitize: {
  /external/fec/
Android.bp 17 sanitize: {
22 sanitize: {
  /external/fmtlib/
Android.bp 8 sanitize: {
  /frameworks/av/media/libstagefright/codecs/amrwbenc/SampleCode/
Android.bp 22 sanitize: {
  /system/core/qemu_pipe/
Android.bp 6 sanitize: {
  /build/soong/cc/
sanitize.go 78 Sanitize struct {
116 type sanitize struct { type
123 func (sanitize *sanitize) props() []interface{} {
124 return []interface{}{&sanitize.Properties}
127 func (sanitize *sanitize) begin(ctx BaseModuleContext) {
128 s := &sanitize.Properties.Sanitize
248 sanitize.Properties.SanitizerEnabled = tru
    [all...]
  /external/libcxx/test/support/
filesystem_dynamic_test_helper.py 20 def sanitize(p): function
45 root_p = sanitize(root_p)
51 root_p = sanitize(root_p)
57 with open(sanitize(fname), 'w') as f:
62 os.mkdir(sanitize(dname))
66 os.symlink(sanitize(source), sanitize(link))
70 os.link(sanitize(source), sanitize(link))
74 os.mkfifo(sanitize(source)
    [all...]
  /external/clang/test/SemaTemplate/
array-to-pointer-decay.cpp 22 template <typename Type> static bool sanitize() { function
26 bool closure = sanitize<int>();
  /external/llvm/lib/Fuzzer/test/uninstrumented/
CMakeLists.txt 5 "${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8bit-counters")
  /frameworks/av/media/libstagefright/id3/
Android.bp 10 sanitize: {
46 sanitize: {
  /external/harfbuzz_ng/src/
hb-ot-layout-jstf-table.hh 57 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::JstfPriority
61 shrinkageEnableGSUB.sanitize (c, this) &&
62 shrinkageDisableGSUB.sanitize (c, this) &&
63 shrinkageEnableGPOS.sanitize (c, this) &&
64 shrinkageDisableGPOS.sanitize (c, this) &&
65 shrinkageJstfMax.sanitize (c, this) &&
66 extensionEnableGSUB.sanitize (c, this) &&
67 extensionDisableGSUB.sanitize (c, this) &&
68 extensionEnableGPOS.sanitize (c, this) &&
69 extensionDisableGPOS.sanitize (c, this) &
126 inline bool sanitize (hb_sanitize_context_t *c, function in struct:OT::JstfLangSys
167 inline bool sanitize (hb_sanitize_context_t *c, function in struct:OT::JstfScript
212 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::JSTF
    [all...]
hb-ot-layout-gdef-table.hh 74 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::AttachList
77 return_trace (coverage.sanitize (c, this) && attachPoint.sanitize (c, this));
105 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValueFormat1
132 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValueFormat2
156 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValueFormat3
159 return_trace (c->check_struct (this) && deviceTable.sanitize (c, this));
188 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::CaretValue
191 if (!u.format.sanitize (c)) return_trace (false);
193 case 1: return_trace (u.format1.sanitize (c))
231 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigGlyph
267 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::LigCaretList
290 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::MarkGlyphSetsFormat1
315 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::MarkGlyphSets
387 inline bool sanitize (hb_sanitize_context_t *c) const function in struct:OT::GDEF
    [all...]
  /external/owasp/sanitizer/src/tests/org/owasp/html/
SanitizersTest.java 39 assertEquals("", Sanitizers.FORMATTING.sanitize(null));
40 assertEquals("", Sanitizers.FORMATTING.sanitize(""));
43 Sanitizers.FORMATTING.sanitize("Hello, World!"));
46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!"));
49 Sanitizers.FORMATTING.sanitize(
55 assertEquals("", Sanitizers.BLOCKS.sanitize(null));
58 Sanitizers.BLOCKS.sanitize("Hello, World!"));
61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!"));
64 Sanitizers.BLOCKS.sanitize(
76 assertEquals("", f.sanitize(null))
    [all...]
HtmlSanitizerTest.java 42 assertEquals("", sanitize(""));
43 assertEquals("", sanitize(null));
48 assertEquals("hello world", sanitize("hello world"));
53 assertEquals("&lt;hello world&gt;", sanitize("&lt;hello world&gt;"));
59 sanitize("<b>hello <i>world</i></b>"));
65 sanitize("<b>hello <bogus></bogus><i>world</i></b>"));
71 sanitize("<b>hello <i>world</i>"
79 sanitize("<b>hello <i onclick=\"takeOverWorld(this)\">world</i></b>"));
85 sanitize(
92 sanitize("<b id=\"foo\" / -->hello <i>world<</i></b>"))
343 private static String sanitize(@Nullable String html) throws Exception { method in class:HtmlSanitizerTest
    [all...]
  /external/compiler-rt/test/ubsan/TestCases/TypeCheck/
vptr-non-unique-typeinfo.cpp 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -fPIC -shared -o %t-lib.so -DBUILD_SO
2 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -O3 -o %t %t-lib.so
  /external/clang/test/Driver/
fsanitize-coverage.c 1 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-0
2 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-0
3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-0
4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type
5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address
7 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC
8 // RUN: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC
9 // RUN: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUNC
11 // RUN: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SANITIZE-COVERAGE-FUN
    [all...]
  /external/compiler-rt/test/ubsan/TestCases/Integer/
shift.cpp 1 // RUN: %clangxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %run %t1 2>&1 | FileCheck %s --check-prefix=CHECK-LSH_OVERFLOW
2 // RUN: %clangxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %run %t2 2>&1 | FileCheck %s --check-prefix=CHECK-LSH_OVERFLOW
3 // RUN: %clangxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %run %t3 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW
4 // RUN: %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %t4 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW
5 // RUN: %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run %t5 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW
6 // RUN: %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run %t6 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_LOW
7 // RUN: %clangxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %run %t7 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIGH
8 // RUN: %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run %t8 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIGH
9 // RUN: %clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run %t9 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIGH
10 // RUN: %clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run %t10 2>&1 | FileCheck %s --check-prefix=CHECK-TOO_HIG
    [all...]
  /external/llvm/lib/Fuzzer/test/dfsan/
CMakeLists.txt 4 "${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fsanitize=dataflow")
  /external/llvm/lib/Fuzzer/test/trace-pc/
CMakeLists.txt 4 "${LIBFUZZER_FLAGS_BASE} -fno-sanitize-coverage=8bit-counters -fsanitize-coverage=trace-pc")
  /external/llvm/lib/Fuzzer/test/ubsan/
CMakeLists.txt 4 "${LIBFUZZER_FLAGS_BASE} -fsanitize=undefined -fno-sanitize-recover=all")
  /external/mesa3d/bin/
.cherry-ignore 2 d49d275c415d60ae08dc3e52d8db11f19a44010f anv/blorp: Don't sanitize the swizzle for blorp_clear

Completed in 481 milliseconds

1 2 3 4 5 6 7 8 91011>>