/external/owasp/sanitizer/src/tests/org/owasp/html/ |
D | SanitizersTest.java | 39 assertEquals("", Sanitizers.FORMATTING.sanitize(null)); in testFormatting() 40 assertEquals("", Sanitizers.FORMATTING.sanitize("")); in testFormatting() 43 Sanitizers.FORMATTING.sanitize("Hello, World!")); in testFormatting() 46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!")); in testFormatting() 49 Sanitizers.FORMATTING.sanitize( in testFormatting() 55 assertEquals("", Sanitizers.BLOCKS.sanitize(null)); in testBlockElements() 58 Sanitizers.BLOCKS.sanitize("Hello, World!")); in testBlockElements() 61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!")); in testBlockElements() 64 Sanitizers.BLOCKS.sanitize( in testBlockElements() 70 PolicyFactory s = Sanitizers.BLOCKS.and(Sanitizers.FORMATTING); in testBlockAndFormattingElements() [all …]
|
/external/llvm-project/clang/include/clang/Driver/ |
D | SanitizerArgs.h | 11 #include "clang/Basic/Sanitizers.h" 24 SanitizerSet Sanitizers; variable 67 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt() 69 return Sanitizers.has(SanitizerKind::HWAddress); in needsHwasanRt() 71 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt() 72 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt() 73 bool needsFuzzer() const { return Sanitizers.has(SanitizerKind::Fuzzer); } in needsFuzzer() 75 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt() 76 !Sanitizers.has(SanitizerKind::Address) && in needsLsanRt() 77 !Sanitizers.has(SanitizerKind::HWAddress); in needsLsanRt() [all …]
|
/external/clang/include/clang/Driver/ |
D | SanitizerArgs.h | 12 #include "clang/Basic/Sanitizers.h" 25 SanitizerSet Sanitizers; variable 46 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt() 48 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt() 49 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt() 51 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt() 52 !Sanitizers.has(SanitizerKind::Address); in needsLsanRt() 55 bool needsDfsanRt() const { return Sanitizers.has(SanitizerKind::DataFlow); } in needsDfsanRt() 57 return Sanitizers.has(SanitizerKind::SafeStack); in needsSafeStackRt() 63 return Sanitizers.hasOneOf(SanitizerKind::Efficiency); in needsEsanRt()
|
/external/clang/lib/Driver/ |
D | SanitizerArgs.cpp | 11 #include "clang/Basic/Sanitizers.h" 80 /// Produce a string containing comma-separated names of sanitizers in \p 81 /// Sanitizers set. 82 static std::string toString(const clang::SanitizerSet &Sanitizers); 114 #include "clang/Basic/Sanitizers.def" in setGroupBits() 121 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs() 162 return ((Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt() 164 !Sanitizers.has(Address) && !Sanitizers.has(Memory) && in needsUbsanRt() 165 !Sanitizers.has(Thread) && !Sanitizers.has(DataFlow) && !CfiCrossDso; in needsUbsanRt() 169 return !(Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiRt() [all …]
|
/external/clang/include/clang/Basic/ |
D | Sanitizers.h | 1 //===--- Sanitizers.h - C Language Family Language Options ------*- C++ -*-===// 33 #include "clang/Basic/Sanitizers.def" 37 // Define the set of sanitizer kinds, as well as the set of sanitizers each 44 #include "clang/Basic/Sanitizers.def" 55 /// \brief Check if one or more sanitizers are enabled. 64 /// \brief Disable all sanitizers. 70 /// \brief Bitmask of enabled sanitizers. 78 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
|
D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 10 // This file defines the options for specifying which runtime sanitizers to 13 // macro to get information on options which refer to sets of sanitizers. 34 // sanitizers in this group. 98 // -fsanitize=undefined includes all the sanitizers which have low overhead, no 124 // Magic group, containing all sanitizers. For example, "-fno-sanitize=all" 125 // can be used to disable all the sanitizers.
|
/external/llvm-project/clang/lib/Driver/ |
D | SanitizerArgs.cpp | 10 #include "clang/Basic/Sanitizers.h" 119 /// Produce a string containing comma-separated names of sanitizers in \p 120 /// Sanitizers set. 121 static std::string toString(const clang::SanitizerSet &Sanitizers); 204 #include "clang/Basic/Sanitizers.def" in setGroupBits() 211 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs() 253 return (Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt() 258 return !(Sanitizers.Mask & SanitizerKind::CFI & ~TrapSanitizers.Mask) && in needsCfiRt() 263 return (Sanitizers.Mask & SanitizerKind::CFI & ~TrapSanitizers.Mask) && in needsCfiDiagRt() 268 return NeedPIE || (Sanitizers.Mask & RequiresPIE); in requiresPIE() [all …]
|
/external/owasp/sanitizer/distrib/javadoc/org/owasp/html/ |
D | Sanitizers.html | 7 Sanitizers (OWASP Java HTML Sanitizer) 17 parent.document.title="Sanitizers (OWASP Java HTML Sanitizer)"; 42 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="class-use/Sanitizers.html"><FONT CLASS="Nav… 59 …<A HREF="../../../index.html?org/owasp/html/Sanitizers.html" target="_top"><B>FRAMES</B></A> &nbs… 60 <A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> 91 Class Sanitizers</H2> 94 <IMG SRC="../../../resources/inherit.gif" ALT="extended by "><B>org.owasp.html.Sanitizers</B> 98 …ic final class <A HREF="../../../src-html/org/owasp/html/Sanitizers.html#line.53"><B>Sanitizers</B… 108 Sanitizers.FORMATTING.sanitize(<code>"<b>Hello, World!</b>"</code>) 112 PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS); [all …]
|
/external/llvm-project/clang/include/clang/Basic/ |
D | Sanitizers.h | 1 //===- Sanitizers.h - C Language Family Language Options --------*- C++ -*-===// 127 // Define the set of sanitizer kinds, as well as the set of sanitizers each 135 #include "clang/Basic/Sanitizers.def" 148 #include "clang/Basic/Sanitizers.def" 158 /// Check if one or more sanitizers are enabled. 167 /// Disable the sanitizers specified in \p K. 170 /// Returns true if no sanitizers are enabled. 173 /// Bitmask of enabled sanitizers. 181 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers 185 /// Return the sanitizers which do not affect preprocessing.
|
D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 9 // This file defines the options for specifying which runtime sanitizers to 12 // macro to get information on options which refer to sets of sanitizers. 33 // sanitizers in this group. 133 // -fsanitize=undefined includes all the sanitizers which have low overhead, no 184 // Magic group, containing all sanitizers. For example, "-fno-sanitize=all" 185 // can be used to disable all the sanitizers.
|
/external/llvm-project/clang/lib/Basic/ |
D | Sanitizers.cpp | 1 //===- Sanitizers.cpp - C Language Family Language Options ----------------===// 9 // This file defines the classes from Sanitizers.h 13 #include "clang/Basic/Sanitizers.h" 25 #include "clang/Basic/Sanitizers.def" 32 #include "clang/Basic/Sanitizers.def" in parseSanitizerValue() 42 #include "clang/Basic/Sanitizers.def" in expandSanitizerGroups()
|
/external/clang/lib/Basic/ |
D | Sanitizers.cpp | 1 //===--- Sanitizers.cpp - C Language Family Language Options ----*- C++ -*-===// 10 // This file defines the classes from Sanitizers.h 13 #include "clang/Basic/Sanitizers.h" 25 #include "clang/Basic/Sanitizers.def" in parseSanitizerValue() 35 #include "clang/Basic/Sanitizers.def" in expandSanitizerGroups()
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_common_interceptors.inc | 662 // https://github.com/google/sanitizers/issues/321. 673 // https://github.com/google/sanitizers/issues/321. 714 // https://github.com/google/sanitizers/issues/321. 732 // https://github.com/google/sanitizers/issues/321. 750 // https://github.com/google/sanitizers/issues/321. 997 // https://github.com/google/sanitizers/issues/321. 1010 // https://github.com/google/sanitizers/issues/321. 1023 // https://github.com/google/sanitizers/issues/321. 1036 // https://github.com/google/sanitizers/issues/321. 1080 // https://github.com/google/sanitizers/issues/321. [all …]
|
/external/oss-fuzz/docs/reference/ |
D | glossary.md | 72 ### Sanitizers subsection 74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable… 80 Supported sanitizers: 84 …er](https://github.com/google/sanitizers/wiki/AddressSanitizer) with [Leak Sanitizer](https://gith… 86 | `memory` | [Memory Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NO…
|
/external/skqp/gn/ |
D | BUILD.gn | 225 # You can either pass the sanitizers directly, e.g. "address,undefined", 227 sanitizers = sanitize 231 sanitizers = "undefined" 233 sanitizers += ",address" 238 sanitizers = "address" 241 sanitizers = "thread" 243 sanitizers = "memory" 249 "-fsanitize=$sanitizers", 250 "-fno-sanitize-recover=$sanitizers", 253 ldflags += [ "-fsanitize=$sanitizers" ] [all …]
|
/external/bc/ |
D | RELEASE.md | 22 sanitizers, on FreeBSD. 23 13. Run and pass the `release.sh` script, without generated tests, sanitizers, 26 sanitizers, and no valgrind, on NetBSD. 28 sanitizers, and no valgrind, on OpenBSD.
|
/external/owasp/sanitizer/distrib/javadoc/org/owasp/html/class-use/ |
D | Sanitizers.html | 7 Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer) 17 parent.document.title="Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer)"; 41 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"… 60 <A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> 82 <B>Uses of Class<br>org.owasp.html.Sanitizers</B></H2> 84 No usage of org.owasp.html.Sanitizers 100 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"… 119 <A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A>
|
/external/perfetto/gn/standalone/libc++/ |
D | libc++.gni | 15 import("//gn/standalone/sanitizers/sanitizers.gni") 31 # 1) LLVM sanitizers require that the c++ library is built from sources, 33 # https://github.com/google/sanitizers/wiki/MemorySanitizerLibcxxHowTo).
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
D | Sanitizers.java | 38 * Sanitizers.FORMATTING.sanitize({@code "<b>Hello, World!</b>"}) 42 * PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS); 53 public final class Sanitizers { class 110 private Sanitizers() { in Sanitizers() method in Sanitizers
|
/external/skia/gn/skia/ |
D | BUILD.gn | 271 # You can either pass the sanitizers directly, e.g. "address,undefined", 273 sanitizers = sanitize 277 sanitizers = "undefined,address" 281 sanitizers = "address" 284 sanitizers = "thread" 286 sanitizers = "memory" 292 "-fsanitize=$sanitizers", 293 "-fno-sanitize-recover=$sanitizers", 313 ldflags += [ "-fsanitize=$sanitizers" ] 321 if (sanitizers == "memory") { [all …]
|
/external/llvm-project/compiler-rt/ |
D | CODE_OWNERS.TXT | 29 D: MacOS/iOS port of sanitizers 37 D: AddressSanitizer, sanitizer_common, porting sanitizers to another platforms, LeakSanitizer 45 D: MemorySanitizer, Android port of sanitizers
|
/external/compiler-rt/ |
D | CODE_OWNERS.TXT | 29 D: MacOS/iOS port of sanitizers 37 D: AddressSanitizer, sanitizer_common, porting sanitizers to another platforms, LeakSanitizer 45 D: MemorySanitizer, Android port of sanitizers
|
/external/llvm-project/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_common_interceptors.inc | 957 // https://github.com/google/sanitizers/issues/321. 968 // https://github.com/google/sanitizers/issues/321. 1009 // https://github.com/google/sanitizers/issues/321. 1027 // https://github.com/google/sanitizers/issues/321. 1044 // https://github.com/google/sanitizers/issues/321. 1062 // https://github.com/google/sanitizers/issues/321. 1237 // https://github.com/google/sanitizers/issues/321. 1372 // https://github.com/google/sanitizers/issues/321. 1385 // https://github.com/google/sanitizers/issues/321. 1398 // https://github.com/google/sanitizers/issues/321. [all …]
|
/external/llvm-project/compiler-rt/test/fuzzer/ |
D | lit.cfg.py | 74 sanitizers = ['memory'] 76 sanitizers = ['address'] 78 sanitizers.append('fuzzer') 79 sanitizers_cmd = ('-fsanitize=%s' % ','.join(sanitizers))
|
/external/llvm-project/llvm/utils/lit/lit/llvm/ |
D | config.py | 73 # Sanitizers. 74 sanitizers = getattr(config, 'llvm_use_sanitizer', '') 75 sanitizers = frozenset(x.lower() for x in sanitizers.split(';')) 76 if 'address' in sanitizers: 78 if 'memory' in sanitizers or 'memorywithorigins' in sanitizers: 80 if 'undefined' in sanitizers: 96 if 'address' in sanitizers and self.get_clang_has_lsan(host_cxx, target_triple): 222 'config.host_cxx is unset but test suite is configured to use sanitizers.') 231 'but test suite is configured to use sanitizers.')
|