Home
last modified time | relevance | path

Searched full:sanitizers (Results 1 – 25 of 890) sorted by relevance

12345678910>>...36

/external/owasp/sanitizer/src/tests/org/owasp/html/
DSanitizersTest.java39 assertEquals("", Sanitizers.FORMATTING.sanitize(null)); in testFormatting()
40 assertEquals("", Sanitizers.FORMATTING.sanitize("")); in testFormatting()
43 Sanitizers.FORMATTING.sanitize("Hello, World!")); in testFormatting()
46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!")); in testFormatting()
49 Sanitizers.FORMATTING.sanitize( in testFormatting()
55 assertEquals("", Sanitizers.BLOCKS.sanitize(null)); in testBlockElements()
58 Sanitizers.BLOCKS.sanitize("Hello, World!")); in testBlockElements()
61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!")); in testBlockElements()
64 Sanitizers.BLOCKS.sanitize( in testBlockElements()
70 PolicyFactory s = Sanitizers.BLOCKS.and(Sanitizers.FORMATTING); in testBlockAndFormattingElements()
[all …]
/external/llvm-project/clang/include/clang/Driver/
DSanitizerArgs.h11 #include "clang/Basic/Sanitizers.h"
24 SanitizerSet Sanitizers; variable
67 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt()
69 return Sanitizers.has(SanitizerKind::HWAddress); in needsHwasanRt()
71 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt()
72 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt()
73 bool needsFuzzer() const { return Sanitizers.has(SanitizerKind::Fuzzer); } in needsFuzzer()
75 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt()
76 !Sanitizers.has(SanitizerKind::Address) && in needsLsanRt()
77 !Sanitizers.has(SanitizerKind::HWAddress); in needsLsanRt()
[all …]
/external/clang/include/clang/Driver/
DSanitizerArgs.h12 #include "clang/Basic/Sanitizers.h"
25 SanitizerSet Sanitizers; variable
46 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt()
48 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt()
49 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt()
51 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt()
52 !Sanitizers.has(SanitizerKind::Address); in needsLsanRt()
55 bool needsDfsanRt() const { return Sanitizers.has(SanitizerKind::DataFlow); } in needsDfsanRt()
57 return Sanitizers.has(SanitizerKind::SafeStack); in needsSafeStackRt()
63 return Sanitizers.hasOneOf(SanitizerKind::Efficiency); in needsEsanRt()
/external/clang/lib/Driver/
DSanitizerArgs.cpp11 #include "clang/Basic/Sanitizers.h"
80 /// Produce a string containing comma-separated names of sanitizers in \p
81 /// Sanitizers set.
82 static std::string toString(const clang::SanitizerSet &Sanitizers);
114 #include "clang/Basic/Sanitizers.def" in setGroupBits()
121 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs()
162 return ((Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt()
164 !Sanitizers.has(Address) && !Sanitizers.has(Memory) && in needsUbsanRt()
165 !Sanitizers.has(Thread) && !Sanitizers.has(DataFlow) && !CfiCrossDso; in needsUbsanRt()
169 return !(Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiRt()
[all …]
/external/clang/include/clang/Basic/
DSanitizers.h1 //===--- Sanitizers.h - C Language Family Language Options ------*- C++ -*-===//
33 #include "clang/Basic/Sanitizers.def"
37 // Define the set of sanitizer kinds, as well as the set of sanitizers each
44 #include "clang/Basic/Sanitizers.def"
55 /// \brief Check if one or more sanitizers are enabled.
64 /// \brief Disable all sanitizers.
70 /// \brief Bitmask of enabled sanitizers.
78 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
10 // This file defines the options for specifying which runtime sanitizers to
13 // macro to get information on options which refer to sets of sanitizers.
34 // sanitizers in this group.
98 // -fsanitize=undefined includes all the sanitizers which have low overhead, no
124 // Magic group, containing all sanitizers. For example, "-fno-sanitize=all"
125 // can be used to disable all the sanitizers.
/external/llvm-project/clang/lib/Driver/
DSanitizerArgs.cpp10 #include "clang/Basic/Sanitizers.h"
119 /// Produce a string containing comma-separated names of sanitizers in \p
120 /// Sanitizers set.
121 static std::string toString(const clang::SanitizerSet &Sanitizers);
204 #include "clang/Basic/Sanitizers.def" in setGroupBits()
211 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs()
253 return (Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt()
258 return !(Sanitizers.Mask & SanitizerKind::CFI & ~TrapSanitizers.Mask) && in needsCfiRt()
263 return (Sanitizers.Mask & SanitizerKind::CFI & ~TrapSanitizers.Mask) && in needsCfiDiagRt()
268 return NeedPIE || (Sanitizers.Mask & RequiresPIE); in requiresPIE()
[all …]
/external/owasp/sanitizer/distrib/javadoc/org/owasp/html/
DSanitizers.html7 Sanitizers (OWASP Java HTML Sanitizer)
17 parent.document.title="Sanitizers (OWASP Java HTML Sanitizer)";
42 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="class-use/Sanitizers.html"><FONT CLASS="Nav…
59 …<A HREF="../../../index.html?org/owasp/html/Sanitizers.html" target="_top"><B>FRAMES</B></A> &nbs…
60 &nbsp;<A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
91 Class Sanitizers</H2>
94 <IMG SRC="../../../resources/inherit.gif" ALT="extended by "><B>org.owasp.html.Sanitizers</B>
98 …ic final class <A HREF="../../../src-html/org/owasp/html/Sanitizers.html#line.53"><B>Sanitizers</B…
108 Sanitizers.FORMATTING.sanitize(<code>"&lt;b&gt;Hello, World!&lt;/b&gt;"</code>)
112 PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS);
[all …]
/external/llvm-project/clang/include/clang/Basic/
DSanitizers.h1 //===- Sanitizers.h - C Language Family Language Options --------*- C++ -*-===//
127 // Define the set of sanitizer kinds, as well as the set of sanitizers each
135 #include "clang/Basic/Sanitizers.def"
148 #include "clang/Basic/Sanitizers.def"
158 /// Check if one or more sanitizers are enabled.
167 /// Disable the sanitizers specified in \p K.
170 /// Returns true if no sanitizers are enabled.
173 /// Bitmask of enabled sanitizers.
181 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
185 /// Return the sanitizers which do not affect preprocessing.
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
9 // This file defines the options for specifying which runtime sanitizers to
12 // macro to get information on options which refer to sets of sanitizers.
33 // sanitizers in this group.
133 // -fsanitize=undefined includes all the sanitizers which have low overhead, no
184 // Magic group, containing all sanitizers. For example, "-fno-sanitize=all"
185 // can be used to disable all the sanitizers.
/external/llvm-project/clang/lib/Basic/
DSanitizers.cpp1 //===- Sanitizers.cpp - C Language Family Language Options ----------------===//
9 // This file defines the classes from Sanitizers.h
13 #include "clang/Basic/Sanitizers.h"
25 #include "clang/Basic/Sanitizers.def"
32 #include "clang/Basic/Sanitizers.def" in parseSanitizerValue()
42 #include "clang/Basic/Sanitizers.def" in expandSanitizerGroups()
/external/clang/lib/Basic/
DSanitizers.cpp1 //===--- Sanitizers.cpp - C Language Family Language Options ----*- C++ -*-===//
10 // This file defines the classes from Sanitizers.h
13 #include "clang/Basic/Sanitizers.h"
25 #include "clang/Basic/Sanitizers.def" in parseSanitizerValue()
35 #include "clang/Basic/Sanitizers.def" in expandSanitizerGroups()
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_common_interceptors.inc662 // https://github.com/google/sanitizers/issues/321.
673 // https://github.com/google/sanitizers/issues/321.
714 // https://github.com/google/sanitizers/issues/321.
732 // https://github.com/google/sanitizers/issues/321.
750 // https://github.com/google/sanitizers/issues/321.
997 // https://github.com/google/sanitizers/issues/321.
1010 // https://github.com/google/sanitizers/issues/321.
1023 // https://github.com/google/sanitizers/issues/321.
1036 // https://github.com/google/sanitizers/issues/321.
1080 // https://github.com/google/sanitizers/issues/321.
[all …]
/external/oss-fuzz/docs/reference/
Dglossary.md72 ### Sanitizers subsection
74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable…
80 Supported sanitizers:
84 …er](https://github.com/google/sanitizers/wiki/AddressSanitizer) with [Leak Sanitizer](https://gith…
86 | `memory` | [Memory Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NO…
/external/skqp/gn/
DBUILD.gn225 # You can either pass the sanitizers directly, e.g. "address,undefined",
227 sanitizers = sanitize
231 sanitizers = "undefined"
233 sanitizers += ",address"
238 sanitizers = "address"
241 sanitizers = "thread"
243 sanitizers = "memory"
249 "-fsanitize=$sanitizers",
250 "-fno-sanitize-recover=$sanitizers",
253 ldflags += [ "-fsanitize=$sanitizers" ]
[all …]
/external/bc/
DRELEASE.md22 sanitizers, on FreeBSD.
23 13. Run and pass the `release.sh` script, without generated tests, sanitizers,
26 sanitizers, and no valgrind, on NetBSD.
28 sanitizers, and no valgrind, on OpenBSD.
/external/owasp/sanitizer/distrib/javadoc/org/owasp/html/class-use/
DSanitizers.html7 Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer)
17 parent.document.title="Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer)";
41 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"…
60 &nbsp;<A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
82 <B>Uses of Class<br>org.owasp.html.Sanitizers</B></H2>
84 No usage of org.owasp.html.Sanitizers
100 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"…
119 &nbsp;<A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
/external/perfetto/gn/standalone/libc++/
Dlibc++.gni15 import("//gn/standalone/sanitizers/sanitizers.gni")
31 # 1) LLVM sanitizers require that the c++ library is built from sources,
33 # https://github.com/google/sanitizers/wiki/MemorySanitizerLibcxxHowTo).
/external/owasp/sanitizer/src/main/org/owasp/html/
DSanitizers.java38 * Sanitizers.FORMATTING.sanitize({@code "<b>Hello, World!</b>"})
42 * PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS);
53 public final class Sanitizers { class
110 private Sanitizers() { in Sanitizers() method in Sanitizers
/external/skia/gn/skia/
DBUILD.gn271 # You can either pass the sanitizers directly, e.g. "address,undefined",
273 sanitizers = sanitize
277 sanitizers = "undefined,address"
281 sanitizers = "address"
284 sanitizers = "thread"
286 sanitizers = "memory"
292 "-fsanitize=$sanitizers",
293 "-fno-sanitize-recover=$sanitizers",
313 ldflags += [ "-fsanitize=$sanitizers" ]
321 if (sanitizers == "memory") {
[all …]
/external/llvm-project/compiler-rt/
DCODE_OWNERS.TXT29 D: MacOS/iOS port of sanitizers
37 D: AddressSanitizer, sanitizer_common, porting sanitizers to another platforms, LeakSanitizer
45 D: MemorySanitizer, Android port of sanitizers
/external/compiler-rt/
DCODE_OWNERS.TXT29 D: MacOS/iOS port of sanitizers
37 D: AddressSanitizer, sanitizer_common, porting sanitizers to another platforms, LeakSanitizer
45 D: MemorySanitizer, Android port of sanitizers
/external/llvm-project/compiler-rt/lib/sanitizer_common/
Dsanitizer_common_interceptors.inc957 // https://github.com/google/sanitizers/issues/321.
968 // https://github.com/google/sanitizers/issues/321.
1009 // https://github.com/google/sanitizers/issues/321.
1027 // https://github.com/google/sanitizers/issues/321.
1044 // https://github.com/google/sanitizers/issues/321.
1062 // https://github.com/google/sanitizers/issues/321.
1237 // https://github.com/google/sanitizers/issues/321.
1372 // https://github.com/google/sanitizers/issues/321.
1385 // https://github.com/google/sanitizers/issues/321.
1398 // https://github.com/google/sanitizers/issues/321.
[all …]
/external/llvm-project/compiler-rt/test/fuzzer/
Dlit.cfg.py74 sanitizers = ['memory']
76 sanitizers = ['address']
78 sanitizers.append('fuzzer')
79 sanitizers_cmd = ('-fsanitize=%s' % ','.join(sanitizers))
/external/llvm-project/llvm/utils/lit/lit/llvm/
Dconfig.py73 # Sanitizers.
74 sanitizers = getattr(config, 'llvm_use_sanitizer', '')
75 sanitizers = frozenset(x.lower() for x in sanitizers.split(';'))
76 if 'address' in sanitizers:
78 if 'memory' in sanitizers or 'memorywithorigins' in sanitizers:
80 if 'undefined' in sanitizers:
96 if 'address' in sanitizers and self.get_clang_has_lsan(host_cxx, target_triple):
222 'config.host_cxx is unset but test suite is configured to use sanitizers.')
231 'but test suite is configured to use sanitizers.')

12345678910>>...36