/external/owasp/sanitizer/src/tests/org/owasp/html/ |
D | SanitizersTest.java | 39 assertEquals("", Sanitizers.FORMATTING.sanitize(null)); in testFormatting() 40 assertEquals("", Sanitizers.FORMATTING.sanitize("")); in testFormatting() 43 Sanitizers.FORMATTING.sanitize("Hello, World!")); in testFormatting() 46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!")); in testFormatting() 49 Sanitizers.FORMATTING.sanitize( in testFormatting() 55 assertEquals("", Sanitizers.BLOCKS.sanitize(null)); in testBlockElements() 58 Sanitizers.BLOCKS.sanitize("Hello, World!")); in testBlockElements() 61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!")); in testBlockElements() 64 Sanitizers.BLOCKS.sanitize( in testBlockElements() 70 PolicyFactory s = Sanitizers.BLOCKS.and(Sanitizers.FORMATTING); in testBlockAndFormattingElements() [all …]
|
D | HtmlChangeReporterTest.java | 68 hcr.setPolicy(Sanitizers.FORMATTING.apply(hcr.getWrappedRenderer())); in testChangeReporting()
|
/external/clang/include/clang/Driver/ |
D | SanitizerArgs.h | 25 SanitizerSet Sanitizers; variable 46 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt() 48 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt() 49 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt() 51 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt() 52 !Sanitizers.has(SanitizerKind::Address); in needsLsanRt() 55 bool needsDfsanRt() const { return Sanitizers.has(SanitizerKind::DataFlow); } in needsDfsanRt() 57 return Sanitizers.has(SanitizerKind::SafeStack); in needsSafeStackRt() 63 return Sanitizers.hasOneOf(SanitizerKind::Efficiency); in needsEsanRt()
|
D | Options.td | 652 HelpText<"Specify the type of coverage instrumentation for Sanitizers">; 657 "Sanitizers">;
|
/external/clang/lib/Driver/ |
D | SanitizerArgs.cpp | 82 static std::string toString(const clang::SanitizerSet &Sanitizers); 162 return ((Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt() 164 !Sanitizers.has(Address) && !Sanitizers.has(Memory) && in needsUbsanRt() 165 !Sanitizers.has(Thread) && !Sanitizers.has(DataFlow) && !CfiCrossDso; in needsUbsanRt() 169 return !(Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiRt() 173 return (Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiDiagRt() 177 return NeedPIE || (Sanitizers.Mask & RequiresPIE); in requiresPIE() 181 return Sanitizers.Mask & NeedsUnwindTables; in needsUnwindTables() 574 Sanitizers.Mask |= Kinds; in SanitizerArgs() 579 static std::string toString(const clang::SanitizerSet &Sanitizers) { in toString() argument [all …]
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
D | Sanitizers.java | 53 public final class Sanitizers { class 110 private Sanitizers() { in Sanitizers() method in Sanitizers
|
/external/clang/lib/Basic/ |
D | CMakeLists.txt | 82 Sanitizers.cpp
|
/external/clang/include/clang/Basic/ |
D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
|
D | Attr.td | 1682 let Args = [VariadicStringArgument<"Sanitizers">];
|
/external/libyuv/files/docs/ |
D | getting_started.md | 278 ## Sanitizers section in Getting Started 283 Sanitizers available: tsan, msan, asan, ubsan, lsan
|
D | deprecated_builds.md | 359 Sanitizers available: TSan, MSan, ASan, UBSan, LSan
|
/external/clang/include/clang/ |
D | module.modulemap | 48 textual header "Basic/Sanitizers.def"
|
/external/swiftshader/third_party/llvm-7.0/llvm/docs/ |
D | ScudoHardenedAllocator.rst | 32 Scudo can be considered a Frontend to the Sanitizers' common allocator (later
|
/external/libaom/libaom/ |
D | README.md | 197 ### Sanitizers subsection 208 Sanitizers available vary by platform, target, and compiler. Consult your
|
/external/llvm/test/ |
D | lit.cfg | 341 # Sanitizers.
|
/external/v8/infra/mb/ |
D | mb_config.pyl | 97 # Sanitizers.
|
/external/clang/test/ |
D | lit.cfg | 451 # Sanitizers.
|
/external/boringssl/src/ |
D | CMakeLists.txt | 531 # Sanitizers try to intercept new and delete.
|
/external/clang/lib/Sema/ |
D | SemaDeclAttr.cpp | 5217 std::vector<StringRef> Sanitizers; in handleNoSanitizeAttr() local 5229 Sanitizers.push_back(SanitizerName); in handleNoSanitizeAttr() 5233 Attr.getRange(), S.Context, Sanitizers.data(), Sanitizers.size(), in handleNoSanitizeAttr()
|
/external/clang/lib/Frontend/ |
D | CompilerInvocation.cpp | 369 const std::vector<std::string> &Sanitizers, in parseSanitizerKinds() argument 371 for (const auto &Sanitizer : Sanitizers) { in parseSanitizerKinds()
|
/external/clang/docs/ |
D | UsersManual.rst | 2165 Disable specified features of coverage instrumentation for Sanitizers 2173 Specify the type of coverage instrumentation for Sanitizers
|
/external/swiftshader/third_party/subzero/docs/ |
D | DESIGN.rst | 1455 Sanitizers subsection
|
/external/swiftshader/third_party/subzero/ |
D | DESIGN.rst | 1455 Sanitizers subsection
|