Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 – 25 of 208) sorted by relevance

123456789

/external/mesa3d/src/gallium/drivers/vc4/kernel/
Dvc4_validate.c48 void *untrusted
126 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument
131 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos()
206 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush()
235 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore()
249 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list()
250 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list()
251 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list()
252 uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; in validate_indexed_prim_list()
284 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive()
[all …]
/external/tensorflow/
DSECURITY.md3 This document discusses how to safely deal with untrusted programs (models or
33 ## Running untrusted models
35 As a general rule: **Always** execute untrusted models inside a sandbox (e.g.,
38 There are several ways in which a model could become untrusted. Obviously, if an
39 untrusted party supplies TensorFlow kernels, arbitrary code may be executed.
40 The same is true if the untrusted party provides Python code, such as the
43 Even if the untrusted party only supplies the serialized computation
63 ## Accepting untrusted Inputs
66 process untrusted inputs assuming there are no bugs. There are two main reasons
68 to untrusted inputs, and second, there are bugs in any software system of
[all …]
/external/nanopb-c/docs/
Dsecurity.rst14 untrusted data. Naturally, if the attacker can modify the contents of a
16 Therefore the application itself must be prepared to receive untrusted values.
23 Division of trusted and untrusted data
36 The following data is regarded as **untrusted**. Invalid/malicious data in
50 untrusted data has been maliciously crafted:
77 checked if they are used with untrusted data.
/external/grpc-grpc/third_party/nanopb/docs/
Dsecurity.rst14 untrusted data. Naturally, if the attacker can modify the contents of a
16 Therefore the application itself must be prepared to receive untrusted values.
23 Division of trusted and untrusted data
36 The following data is regarded as **untrusted**. Invalid/malicious data in
50 untrusted data has been maliciously crafted:
77 checked if they are used with untrusted data.
/external/python/cpython2/Doc/library/
Drestricted.rst15 segregation of trusted and untrusted code. The framework is based on the notion
17 environment) with limited permissions, and run the untrusted code within this
18 cell. The untrusted code cannot break out of its cell, and can only interact
26 interfaces presented to untrusted code usually have the same names as those
31 might be deemed "safe" for untrusted code to read any file within a specified
36 safe "sandbox" area of the filesystem. In this case, the untrusted code would
Dxml.dom.pulldom.rst22 maliciously constructed data. If you need to parse untrusted or
Dxml.rst17 constructed data. If you need to parse untrusted or unauthenticated data see
115 untrusted XML data.
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl_ocsp.c504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp()
565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp()
566 if (!untrusted) in check_ocsp_resp()
579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp()
618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp()
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp()
838 sk_X509_free(untrusted); in check_ocsp_resp()
/external/scapy/scapy/layers/tls/
Dcert.py882 def verifyChain(self, anchors, untrusted=None): argument
890 untrusted = untrusted or []
892 chain = Chain(self + untrusted, a)
923 untrusted = None
931 untrusted = [Cert(c) for c in split_pem(untrusted_certs)]
933 return self.verifyChain(anchors, untrusted)
950 untrusted = None
958 untrusted = [Cert(c) for c in split_pem(untrusted_certs)]
960 return self.verifyChain(anchors, untrusted)
/external/tensorflow/tensorflow/security/advisory/
Dtfsa-2018-004.md26 If users are running TensorFlow on untrusted meta checkpoints, such as those
27 downloaded from the Internet, in production or on untrusted data, they are
Dtfsa-2018-002.md25 If users are running TensorFlow in production or on untrusted data, they are
Dtfsa-2018-006.md26 If users are loading untrusted configurations in TensorFlow, we encourage users
Dtfsa-2018-001.md26 If users are running TensorFlow in production or on untrusted data, they are
Dtfsa-2018-005.md28 If users are loading untrusted checkpoints in TensorFlow, we encourage users to
Dtfsa-2018-003.md41 untrusted data, they are encouraged to apply this patch.
/external/tcpdump/tests/
Dcdp-v.out16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
54 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
Dlldp_cdp-ev.out16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
142 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
161 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
/external/python/rsa/doc/
Dreference.rst29 However, it is insecure to load a key from an untrusted source.
31 constructed data. Never unpickle data received from an untrusted
/external/modp_b64/
Dmodp_b64_nacl.gyp7 '../../native_client/build/untrusted.gypi',
/external/libyuv/files/
Dlibyuv_nacl.gyp12 '../../native_client/build/untrusted.gypi',
/external/boringssl/src/crypto/x509/
Dx509_vfy.c225 if (ctx->untrusted != NULL in X509_verify_cert()
226 && (sktmp = sk_X509_dup(ctx->untrusted)) == NULL) { in X509_verify_cert()
1268 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) { in crl_akid_check()
1269 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check()
1305 if (!X509_STORE_CTX_init(&crl_ctx, ctx->ctx, x, ctx->untrusted)) in check_crl_path()
2122 ctx->untrusted = sk; in X509_STORE_CTX_set_chain()
2127 return ctx->untrusted; in STACK_OF()
2233 ctx->untrusted = chain; in X509_STORE_CTX_init()
/external/python/cpython3/Modules/_xxtestfuzz/
DREADME.rst41 Libraries written in C that might handle untrusted data are worthwhile. The
/external/python/cpython3/Doc/library/
Dxml.rst21 constructed data. If you need to parse untrusted or
123 package is recommended for any server code that parses untrusted XML data. The
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
DWifiJsonParser.java100 scanResult.untrusted = j.getBoolean("untrusted"); in getScanResult()
/external/guava/
DREADME41 untrusted code.

123456789