/external/rust/crates/untrusted/tests/ |
D | tests.rs | 16 fn test_input_from() { let _ = untrusted::Input::from(b"foo"); } in test_input_from() 20 let input = untrusted::Input::from(b""); in test_input_is_empty() 22 let input = untrusted::Input::from(b"foo"); in test_input_is_empty() 28 let input = untrusted::Input::from(b"foo"); in test_input_len() 34 let input = untrusted::Input::from(b"foo"); in test_input_read_all() 35 let result = input.read_all(untrusted::EndOfInput, |input| { in test_input_read_all() 47 let input = untrusted::Input::from(b"foo"); in test_input_read_all_unconsume() 48 let result = input.read_all(untrusted::EndOfInput, |input| { in test_input_read_all_unconsume() 53 assert_eq!(result, Err(untrusted::EndOfInput)); in test_input_read_all_unconsume() 59 let input = untrusted::Input::from(slice); in test_input_as_slice_less_safe() [all …]
|
/external/rust/crates/ring/src/ |
D | pkcs8.rs | 50 fn alg_id_value(&self) -> untrusted::Input { in alg_id_value() 51 untrusted::Input::from(self.alg_id_value_()) in alg_id_value() 59 pub fn curve_oid(&self) -> untrusted::Input { in curve_oid() 60 untrusted::Input::from(&self.alg_id_value_()[self.curve_id_index..]) in curve_oid() 73 input: untrusted::Input<'a>, in unwrap_key() 74 ) -> Result<(untrusted::Input<'a>, Option<untrusted::Input<'a>>), error::KeyRejected> { in unwrap_key() 89 alg_id: untrusted::Input, in unwrap_key_() 91 input: untrusted::Input<'a>, in unwrap_key_() 92 ) -> Result<(untrusted::Input<'a>, Option<untrusted::Input<'a>>), error::KeyRejected> { in unwrap_key_() 104 alg_id: untrusted::Input, in unwrap_key__() [all …]
|
D | signature.rs | 359 public_key: untrusted::Input, in verify() 360 msg: untrusted::Input, in verify() 361 signature: untrusted::Input, in verify() 401 untrusted::Input::from(self.bytes.as_ref()), in verify() 402 untrusted::Input::from(message), in verify() 403 untrusted::Input::from(signature), in verify()
|
D | limb.rs | 151 input: untrusted::Input, in parse_big_endian_in_range_partially_reduced_and_pad_consttime() 175 input: untrusted::Input, in parse_big_endian_in_range_and_pad_consttime() 196 input: untrusted::Input, in parse_big_endian_and_pad_consttime() 495 let inp = untrusted::Input::from(&[]); in test_parse_big_endian_and_pad_consttime() 503 let inp = untrusted::Input::from(&inp); in test_parse_big_endian_and_pad_consttime() 511 let inp = untrusted::Input::from(&inp); in test_parse_big_endian_and_pad_consttime() 523 let inp = untrusted::Input::from(&inp); in test_parse_big_endian_and_pad_consttime()
|
/external/rust/crates/ring/src/io/ |
D | der.rs | 56 input: &mut untrusted::Reader<'a>, in expect_tag_and_get_value() 58 ) -> Result<untrusted::Input<'a>, error::Unspecified> { in expect_tag_and_get_value() 67 input: &mut untrusted::Reader<'a>, in read_tag_and_get_value() 68 ) -> Result<(u8, untrusted::Input<'a>), error::Unspecified> { in read_tag_and_get_value() 105 input: &mut untrusted::Reader<'a>, in bit_string_with_no_unused_bits() 106 ) -> Result<untrusted::Input<'a>, error::Unspecified> { in bit_string_with_no_unused_bits() 119 input: &mut untrusted::Reader<'a>, in nested() 125 F: FnOnce(&mut untrusted::Reader<'a>) -> Result<R, E>, in nested() 132 input: &mut untrusted::Reader<'a>, in nonnegative_integer() 134 ) -> Result<untrusted::Input<'a>, error::Unspecified> { in nonnegative_integer() [all …]
|
D | positive.rs | 19 pub struct Positive<'a>(untrusted::Input<'a>); 23 pub(crate) fn new_non_empty_without_leading_zeros(input: untrusted::Input<'a>) -> Self { in new_non_empty_without_leading_zeros() 39 pub(crate) fn big_endian_without_leading_zero_as_input(&self) -> untrusted::Input<'a> { in big_endian_without_leading_zero_as_input()
|
/external/rust/crates/untrusted/ |
D | README.md | 11 untrusted.rs 14 Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted 17 untrusted.rs is 100% Rust with no use of `unsafe`. It never uses the heap. 18 No part of untrusted.rs's API will ever panic or cause a crash. It is 22 untrusted.rs is intended to be used with the latest version of Rust Stable. 24 too. Using a version of untrusted.rs other than the latest release available 33 https://briansmith.org/rustdoc/untrusted/. 35 To use untrusted.rs in your project, add a dependency to your 40 untrusted = "0.2" 51 built on top of untrusted.rs. *ring* also uses untrusted.rs to parse ECC public [all …]
|
D | METADATA | 1 name: "untrusted" 2 description: "Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted inputs in… 6 value: "https://crates.io/crates/untrusted" 10 value: "https://static.crates.io/crates/untrusted/untrusted-0.7.1.crate"
|
D | Cargo.toml | 15 name = "untrusted" 18 description = "Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted inputs i… 19 documentation = "https://briansmith.org/rustdoc/untrusted/" 22 repository = "https://github.com/briansmith/untrusted" 28 name = "untrusted" 29 path = "src/untrusted.rs"
|
D | Android.bp | 25 crate_name: "untrusted", 26 srcs: ["src/untrusted.rs"], 37 crate_name: "untrusted", 39 srcs: ["src/untrusted.rs"],
|
/external/rust/crates/ring/src/rsa/ |
D | verification.rs | 34 n: untrusted::Input, in from_modulus_and_exponent() 35 e: untrusted::Input, in from_modulus_and_exponent() 89 public_key: untrusted::Input, in verify() 90 msg: untrusted::Input, in verify() 91 signature: untrusted::Input, in verify() 269 untrusted::Input::from(self.n.as_ref()), in verify() 270 untrusted::Input::from(self.e.as_ref()), in verify() 272 untrusted::Input::from(message), in verify() 273 untrusted::Input::from(signature), in verify() 280 (n, e): (untrusted::Input, untrusted::Input), in verify_rsa_() [all …]
|
D | signing.rs | 142 untrusted::Input::from(&RSA_ENCRYPTION), in from_pkcs8() 144 untrusted::Input::from(pkcs8), in from_pkcs8() 165 untrusted::Input::from(input).read_all(KeyRejected::invalid_encoding(), |input| { in from_der() 175 fn from_der_reader(input: &mut untrusted::Reader) -> Result<Self, KeyRejected> { in from_der_reader() 183 input: &mut untrusted::Reader<'a>, in from_der_reader() 421 super::parse_public_key(untrusted::Input::from(self.as_ref())).unwrap(); in modulus() 429 super::parse_public_key(untrusted::Input::from(self.as_ref())).unwrap(); in exponent() 442 fn new(p: bigint::Nonnegative, dP: untrusted::Input) -> Result<Self, KeyRejected> { in new() 555 let base = bigint::Elem::from_be_bytes_padded(untrusted::Input::from(signature), n)?; in sign()
|
/external/rust/crates/ring/src/ec/suite_b/ecdsa/ |
D | verification.rs | 34 input: &mut untrusted::Reader<'a>, 36 -> Result<(untrusted::Input<'a>, untrusted::Input<'a>), error::Unspecified>, 55 public_key: untrusted::Input, in verify() 56 msg: untrusted::Input, in verify() 57 signature: untrusted::Input, in verify() 77 public_key: untrusted::Input, in verify_digest() 79 signature: untrusted::Input, in verify_digest() 174 input: &mut untrusted::Reader<'a>, in split_rs_fixed() 175 ) -> Result<(untrusted::Input<'a>, untrusted::Input<'a>), error::Unspecified> { in split_rs_fixed() 184 input: &mut untrusted::Reader<'a>, in split_rs_asn1() [all …]
|
/external/rust/crates/untrusted/patches/ |
D | std.diff | 1 diff --git a/src/untrusted.rs b/src/untrusted.rs 3 --- a/src/untrusted.rs 4 +++ b/src/untrusted.rs
|
/external/mesa3d/src/gallium/drivers/vc4/kernel/ |
D | vc4_validate.c | 48 void *untrusted 126 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument 131 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos() 206 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush() 235 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore() 249 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list() 250 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list() 251 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list() 252 uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; in validate_indexed_prim_list() 284 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive() [all …]
|
/external/rust/crates/ring/src/ec/ |
D | suite_b.rs | 159 input: untrusted::Input, in key_pair_from_pkcs8() 178 input: &mut untrusted::Reader<'a>, in key_pair_from_pkcs8_() 179 ) -> Result<(untrusted::Input<'a>, untrusted::Input<'a>), error::KeyRejected> { in key_pair_from_pkcs8_() 214 private_key_bytes: untrusted::Input, in key_pair_from_bytes() 215 public_key_bytes: untrusted::Input, in key_pair_from_bytes()
|
/external/rust/crates/ring/src/ec/curve25519/ed25519/ |
D | signing.rs | 78 unwrap_pkcs8(pkcs8::Version::V2Only, untrusted::Input::from(pkcs8))?; in from_pkcs8() 101 unwrap_pkcs8(pkcs8::Version::V1OrV2, untrusted::Input::from(pkcs8))?; in from_pkcs8_maybe_unchecked() 242 input: untrusted::Input, in unwrap_pkcs8() 243 ) -> Result<(untrusted::Input, Option<untrusted::Input>), error::KeyRejected> { in unwrap_pkcs8()
|
D | verification.rs | 40 public_key: untrusted::Input, in verify() 41 msg: untrusted::Input, in verify() 42 signature: untrusted::Input, in verify()
|
/external/grpc-grpc/third_party/nanopb/docs/ |
D | security.rst | 14 untrusted data. Naturally, if the attacker can modify the contents of a 16 Therefore the application itself must be prepared to receive untrusted values. 23 Division of trusted and untrusted data 36 The following data is regarded as **untrusted**. Invalid/malicious data in 50 untrusted data has been maliciously crafted: 77 checked if they are used with untrusted data.
|
/external/nanopb-c/docs/ |
D | security.rst | 14 untrusted data. Naturally, if the attacker can modify the contents of a 16 Therefore the application itself must be prepared to receive untrusted values. 23 Division of trusted and untrusted data 36 The following data is regarded as **untrusted**. Invalid/malicious data in 50 untrusted data has been maliciously crafted: 77 checked if they are used with untrusted data.
|
/external/python/cpython2/Doc/library/ |
D | restricted.rst | 15 segregation of trusted and untrusted code. The framework is based on the notion 17 environment) with limited permissions, and run the untrusted code within this 18 cell. The untrusted code cannot break out of its cell, and can only interact 26 interfaces presented to untrusted code usually have the same names as those 31 might be deemed "safe" for untrusted code to read any file within a specified 36 safe "sandbox" area of the filesystem. In this case, the untrusted code would
|
/external/tensorflow/ |
D | SECURITY.md | 3 This document discusses how to safely deal with untrusted programs (models or 33 ## Running untrusted models 35 As a general rule: **Always** execute untrusted models inside a sandbox (e.g., 38 There are several ways in which a model could become untrusted. Obviously, if an 39 untrusted party supplies TensorFlow kernels, arbitrary code may be executed. 40 The same is true if the untrusted party provides Python code, such as the 43 Even if the untrusted party only supplies the serialized computation 63 ## Accepting untrusted Inputs 66 process untrusted inputs assuming there are no bugs. There are two main reasons 68 to untrusted inputs, and second, there are bugs in any software system of [all …]
|
/external/python/jinja/docs/ |
D | intro.rst | 12 - HTML templates can use autoescaping to prevent XSS from untrusted 14 - A sandboxed environment can safely render untrusted templates. 50 - `MarkupSafe`_ escapes untrusted input when rendering templates to
|
/external/rust/crates/ring/src/ec/suite_b/ |
D | public_key.rs | 31 input: untrusted::Input, in parse_uncompressed_point() 82 let public_key = untrusted::Input::from(&public_key); in parse_uncompressed_point_test()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl_ocsp.c | 504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp() 565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp() 566 if (!untrusted) in check_ocsp_resp() 579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp() 838 sk_X509_free(untrusted); in check_ocsp_resp()
|