/external/mesa3d/src/gallium/drivers/vc4/kernel/ |
D | vc4_validate.c | 48 void *untrusted 126 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument 131 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos() 206 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush() 235 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore() 249 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list() 250 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list() 251 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list() 252 uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; in validate_indexed_prim_list() 284 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive() [all …]
|
/external/tensorflow/ |
D | SECURITY.md | 3 This document discusses how to safely deal with untrusted programs (models or 33 ## Running untrusted models 35 As a general rule: **Always** execute untrusted models inside a sandbox (e.g., 38 There are several ways in which a model could become untrusted. Obviously, if an 39 untrusted party supplies TensorFlow kernels, arbitrary code may be executed. 40 The same is true if the untrusted party provides Python code, such as the 43 Even if the untrusted party only supplies the serialized computation 63 ## Accepting untrusted Inputs 66 process untrusted inputs assuming there are no bugs. There are two main reasons 68 to untrusted inputs, and second, there are bugs in any software system of [all …]
|
/external/nanopb-c/docs/ |
D | security.rst | 14 untrusted data. Naturally, if the attacker can modify the contents of a 16 Therefore the application itself must be prepared to receive untrusted values. 23 Division of trusted and untrusted data 36 The following data is regarded as **untrusted**. Invalid/malicious data in 50 untrusted data has been maliciously crafted: 77 checked if they are used with untrusted data.
|
/external/grpc-grpc/third_party/nanopb/docs/ |
D | security.rst | 14 untrusted data. Naturally, if the attacker can modify the contents of a 16 Therefore the application itself must be prepared to receive untrusted values. 23 Division of trusted and untrusted data 36 The following data is regarded as **untrusted**. Invalid/malicious data in 50 untrusted data has been maliciously crafted: 77 checked if they are used with untrusted data.
|
/external/python/cpython2/Doc/library/ |
D | restricted.rst | 15 segregation of trusted and untrusted code. The framework is based on the notion 17 environment) with limited permissions, and run the untrusted code within this 18 cell. The untrusted code cannot break out of its cell, and can only interact 26 interfaces presented to untrusted code usually have the same names as those 31 might be deemed "safe" for untrusted code to read any file within a specified 36 safe "sandbox" area of the filesystem. In this case, the untrusted code would
|
D | xml.dom.pulldom.rst | 22 maliciously constructed data. If you need to parse untrusted or
|
D | xml.rst | 17 constructed data. If you need to parse untrusted or unauthenticated data see 115 untrusted XML data.
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl_ocsp.c | 504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp() 565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp() 566 if (!untrusted) in check_ocsp_resp() 579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp() 838 sk_X509_free(untrusted); in check_ocsp_resp()
|
/external/scapy/scapy/layers/tls/ |
D | cert.py | 882 def verifyChain(self, anchors, untrusted=None): argument 890 untrusted = untrusted or [] 892 chain = Chain(self + untrusted, a) 923 untrusted = None 931 untrusted = [Cert(c) for c in split_pem(untrusted_certs)] 933 return self.verifyChain(anchors, untrusted) 950 untrusted = None 958 untrusted = [Cert(c) for c in split_pem(untrusted_certs)] 960 return self.verifyChain(anchors, untrusted)
|
/external/tensorflow/tensorflow/security/advisory/ |
D | tfsa-2018-004.md | 26 If users are running TensorFlow on untrusted meta checkpoints, such as those 27 downloaded from the Internet, in production or on untrusted data, they are
|
D | tfsa-2018-002.md | 25 If users are running TensorFlow in production or on untrusted data, they are
|
D | tfsa-2018-006.md | 26 If users are loading untrusted configurations in TensorFlow, we encourage users
|
D | tfsa-2018-001.md | 26 If users are running TensorFlow in production or on untrusted data, they are
|
D | tfsa-2018-005.md | 28 If users are loading untrusted checkpoints in TensorFlow, we encourage users to
|
D | tfsa-2018-003.md | 41 untrusted data, they are encouraged to apply this patch.
|
/external/tcpdump/tests/ |
D | cdp-v.out | 16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 54 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
|
D | lldp_cdp-ev.out | 16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 142 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 161 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
|
/external/python/rsa/doc/ |
D | reference.rst | 29 However, it is insecure to load a key from an untrusted source. 31 constructed data. Never unpickle data received from an untrusted
|
/external/modp_b64/ |
D | modp_b64_nacl.gyp | 7 '../../native_client/build/untrusted.gypi',
|
/external/libyuv/files/ |
D | libyuv_nacl.gyp | 12 '../../native_client/build/untrusted.gypi',
|
/external/boringssl/src/crypto/x509/ |
D | x509_vfy.c | 225 if (ctx->untrusted != NULL in X509_verify_cert() 226 && (sktmp = sk_X509_dup(ctx->untrusted)) == NULL) { in X509_verify_cert() 1268 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) { in crl_akid_check() 1269 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check() 1305 if (!X509_STORE_CTX_init(&crl_ctx, ctx->ctx, x, ctx->untrusted)) in check_crl_path() 2122 ctx->untrusted = sk; in X509_STORE_CTX_set_chain() 2127 return ctx->untrusted; in STACK_OF() 2233 ctx->untrusted = chain; in X509_STORE_CTX_init()
|
/external/python/cpython3/Modules/_xxtestfuzz/ |
D | README.rst | 41 Libraries written in C that might handle untrusted data are worthwhile. The
|
/external/python/cpython3/Doc/library/ |
D | xml.rst | 21 constructed data. If you need to parse untrusted or 123 package is recommended for any server code that parses untrusted XML data. The
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
D | WifiJsonParser.java | 100 scanResult.untrusted = j.getBoolean("untrusted"); in getScanResult()
|
/external/guava/ |
D | README | 41 untrusted code.
|