Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 – 25 of 284) sorted by relevance

12345678910>>...12

/external/rust/crates/untrusted/tests/
Dtests.rs16 fn test_input_from() { let _ = untrusted::Input::from(b"foo"); } in test_input_from()
20 let input = untrusted::Input::from(b""); in test_input_is_empty()
22 let input = untrusted::Input::from(b"foo"); in test_input_is_empty()
28 let input = untrusted::Input::from(b"foo"); in test_input_len()
34 let input = untrusted::Input::from(b"foo"); in test_input_read_all()
35 let result = input.read_all(untrusted::EndOfInput, |input| { in test_input_read_all()
47 let input = untrusted::Input::from(b"foo"); in test_input_read_all_unconsume()
48 let result = input.read_all(untrusted::EndOfInput, |input| { in test_input_read_all_unconsume()
53 assert_eq!(result, Err(untrusted::EndOfInput)); in test_input_read_all_unconsume()
59 let input = untrusted::Input::from(slice); in test_input_as_slice_less_safe()
[all …]
/external/rust/crates/ring/src/
Dpkcs8.rs50 fn alg_id_value(&self) -> untrusted::Input { in alg_id_value()
51 untrusted::Input::from(self.alg_id_value_()) in alg_id_value()
59 pub fn curve_oid(&self) -> untrusted::Input { in curve_oid()
60 untrusted::Input::from(&self.alg_id_value_()[self.curve_id_index..]) in curve_oid()
73 input: untrusted::Input<'a>, in unwrap_key()
74 ) -> Result<(untrusted::Input<'a>, Option<untrusted::Input<'a>>), error::KeyRejected> { in unwrap_key()
89 alg_id: untrusted::Input, in unwrap_key_()
91 input: untrusted::Input<'a>, in unwrap_key_()
92 ) -> Result<(untrusted::Input<'a>, Option<untrusted::Input<'a>>), error::KeyRejected> { in unwrap_key_()
104 alg_id: untrusted::Input, in unwrap_key__()
[all …]
Dsignature.rs359 public_key: untrusted::Input, in verify()
360 msg: untrusted::Input, in verify()
361 signature: untrusted::Input, in verify()
401 untrusted::Input::from(self.bytes.as_ref()), in verify()
402 untrusted::Input::from(message), in verify()
403 untrusted::Input::from(signature), in verify()
Dlimb.rs151 input: untrusted::Input, in parse_big_endian_in_range_partially_reduced_and_pad_consttime()
175 input: untrusted::Input, in parse_big_endian_in_range_and_pad_consttime()
196 input: untrusted::Input, in parse_big_endian_and_pad_consttime()
495 let inp = untrusted::Input::from(&[]); in test_parse_big_endian_and_pad_consttime()
503 let inp = untrusted::Input::from(&inp); in test_parse_big_endian_and_pad_consttime()
511 let inp = untrusted::Input::from(&inp); in test_parse_big_endian_and_pad_consttime()
523 let inp = untrusted::Input::from(&inp); in test_parse_big_endian_and_pad_consttime()
/external/rust/crates/ring/src/io/
Dder.rs56 input: &mut untrusted::Reader<'a>, in expect_tag_and_get_value()
58 ) -> Result<untrusted::Input<'a>, error::Unspecified> { in expect_tag_and_get_value()
67 input: &mut untrusted::Reader<'a>, in read_tag_and_get_value()
68 ) -> Result<(u8, untrusted::Input<'a>), error::Unspecified> { in read_tag_and_get_value()
105 input: &mut untrusted::Reader<'a>, in bit_string_with_no_unused_bits()
106 ) -> Result<untrusted::Input<'a>, error::Unspecified> { in bit_string_with_no_unused_bits()
119 input: &mut untrusted::Reader<'a>, in nested()
125 F: FnOnce(&mut untrusted::Reader<'a>) -> Result<R, E>, in nested()
132 input: &mut untrusted::Reader<'a>, in nonnegative_integer()
134 ) -> Result<untrusted::Input<'a>, error::Unspecified> { in nonnegative_integer()
[all …]
Dpositive.rs19 pub struct Positive<'a>(untrusted::Input<'a>);
23 pub(crate) fn new_non_empty_without_leading_zeros(input: untrusted::Input<'a>) -> Self { in new_non_empty_without_leading_zeros()
39 pub(crate) fn big_endian_without_leading_zero_as_input(&self) -> untrusted::Input<'a> { in big_endian_without_leading_zero_as_input()
/external/rust/crates/untrusted/
DREADME.md11 untrusted.rs
14 Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted
17 untrusted.rs is 100% Rust with no use of `unsafe`. It never uses the heap.
18 No part of untrusted.rs's API will ever panic or cause a crash. It is
22 untrusted.rs is intended to be used with the latest version of Rust Stable.
24 too. Using a version of untrusted.rs other than the latest release available
33 https://briansmith.org/rustdoc/untrusted/.
35 To use untrusted.rs in your project, add a dependency to your
40 untrusted = "0.2"
51 built on top of untrusted.rs. *ring* also uses untrusted.rs to parse ECC public
[all …]
DMETADATA1 name: "untrusted"
2 description: "Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted inputs in…
6 value: "https://crates.io/crates/untrusted"
10 value: "https://static.crates.io/crates/untrusted/untrusted-0.7.1.crate"
DCargo.toml15 name = "untrusted"
18 description = "Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted inputs i…
19 documentation = "https://briansmith.org/rustdoc/untrusted/"
22 repository = "https://github.com/briansmith/untrusted"
28 name = "untrusted"
29 path = "src/untrusted.rs"
DAndroid.bp25 crate_name: "untrusted",
26 srcs: ["src/untrusted.rs"],
37 crate_name: "untrusted",
39 srcs: ["src/untrusted.rs"],
/external/rust/crates/ring/src/rsa/
Dverification.rs34 n: untrusted::Input, in from_modulus_and_exponent()
35 e: untrusted::Input, in from_modulus_and_exponent()
89 public_key: untrusted::Input, in verify()
90 msg: untrusted::Input, in verify()
91 signature: untrusted::Input, in verify()
269 untrusted::Input::from(self.n.as_ref()), in verify()
270 untrusted::Input::from(self.e.as_ref()), in verify()
272 untrusted::Input::from(message), in verify()
273 untrusted::Input::from(signature), in verify()
280 (n, e): (untrusted::Input, untrusted::Input), in verify_rsa_()
[all …]
Dsigning.rs142 untrusted::Input::from(&RSA_ENCRYPTION), in from_pkcs8()
144 untrusted::Input::from(pkcs8), in from_pkcs8()
165 untrusted::Input::from(input).read_all(KeyRejected::invalid_encoding(), |input| { in from_der()
175 fn from_der_reader(input: &mut untrusted::Reader) -> Result<Self, KeyRejected> { in from_der_reader()
183 input: &mut untrusted::Reader<'a>, in from_der_reader()
421 super::parse_public_key(untrusted::Input::from(self.as_ref())).unwrap(); in modulus()
429 super::parse_public_key(untrusted::Input::from(self.as_ref())).unwrap(); in exponent()
442 fn new(p: bigint::Nonnegative, dP: untrusted::Input) -> Result<Self, KeyRejected> { in new()
555 let base = bigint::Elem::from_be_bytes_padded(untrusted::Input::from(signature), n)?; in sign()
/external/rust/crates/ring/src/ec/suite_b/ecdsa/
Dverification.rs34 input: &mut untrusted::Reader<'a>,
36 -> Result<(untrusted::Input<'a>, untrusted::Input<'a>), error::Unspecified>,
55 public_key: untrusted::Input, in verify()
56 msg: untrusted::Input, in verify()
57 signature: untrusted::Input, in verify()
77 public_key: untrusted::Input, in verify_digest()
79 signature: untrusted::Input, in verify_digest()
174 input: &mut untrusted::Reader<'a>, in split_rs_fixed()
175 ) -> Result<(untrusted::Input<'a>, untrusted::Input<'a>), error::Unspecified> { in split_rs_fixed()
184 input: &mut untrusted::Reader<'a>, in split_rs_asn1()
[all …]
/external/rust/crates/untrusted/patches/
Dstd.diff1 diff --git a/src/untrusted.rs b/src/untrusted.rs
3 --- a/src/untrusted.rs
4 +++ b/src/untrusted.rs
/external/mesa3d/src/gallium/drivers/vc4/kernel/
Dvc4_validate.c48 void *untrusted
126 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument
131 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos()
206 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush()
235 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore()
249 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list()
250 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list()
251 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list()
252 uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; in validate_indexed_prim_list()
284 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive()
[all …]
/external/rust/crates/ring/src/ec/
Dsuite_b.rs159 input: untrusted::Input, in key_pair_from_pkcs8()
178 input: &mut untrusted::Reader<'a>, in key_pair_from_pkcs8_()
179 ) -> Result<(untrusted::Input<'a>, untrusted::Input<'a>), error::KeyRejected> { in key_pair_from_pkcs8_()
214 private_key_bytes: untrusted::Input, in key_pair_from_bytes()
215 public_key_bytes: untrusted::Input, in key_pair_from_bytes()
/external/rust/crates/ring/src/ec/curve25519/ed25519/
Dsigning.rs78 unwrap_pkcs8(pkcs8::Version::V2Only, untrusted::Input::from(pkcs8))?; in from_pkcs8()
101 unwrap_pkcs8(pkcs8::Version::V1OrV2, untrusted::Input::from(pkcs8))?; in from_pkcs8_maybe_unchecked()
242 input: untrusted::Input, in unwrap_pkcs8()
243 ) -> Result<(untrusted::Input, Option<untrusted::Input>), error::KeyRejected> { in unwrap_pkcs8()
Dverification.rs40 public_key: untrusted::Input, in verify()
41 msg: untrusted::Input, in verify()
42 signature: untrusted::Input, in verify()
/external/grpc-grpc/third_party/nanopb/docs/
Dsecurity.rst14 untrusted data. Naturally, if the attacker can modify the contents of a
16 Therefore the application itself must be prepared to receive untrusted values.
23 Division of trusted and untrusted data
36 The following data is regarded as **untrusted**. Invalid/malicious data in
50 untrusted data has been maliciously crafted:
77 checked if they are used with untrusted data.
/external/nanopb-c/docs/
Dsecurity.rst14 untrusted data. Naturally, if the attacker can modify the contents of a
16 Therefore the application itself must be prepared to receive untrusted values.
23 Division of trusted and untrusted data
36 The following data is regarded as **untrusted**. Invalid/malicious data in
50 untrusted data has been maliciously crafted:
77 checked if they are used with untrusted data.
/external/python/cpython2/Doc/library/
Drestricted.rst15 segregation of trusted and untrusted code. The framework is based on the notion
17 environment) with limited permissions, and run the untrusted code within this
18 cell. The untrusted code cannot break out of its cell, and can only interact
26 interfaces presented to untrusted code usually have the same names as those
31 might be deemed "safe" for untrusted code to read any file within a specified
36 safe "sandbox" area of the filesystem. In this case, the untrusted code would
/external/tensorflow/
DSECURITY.md3 This document discusses how to safely deal with untrusted programs (models or
33 ## Running untrusted models
35 As a general rule: **Always** execute untrusted models inside a sandbox (e.g.,
38 There are several ways in which a model could become untrusted. Obviously, if an
39 untrusted party supplies TensorFlow kernels, arbitrary code may be executed.
40 The same is true if the untrusted party provides Python code, such as the
43 Even if the untrusted party only supplies the serialized computation
63 ## Accepting untrusted Inputs
66 process untrusted inputs assuming there are no bugs. There are two main reasons
68 to untrusted inputs, and second, there are bugs in any software system of
[all …]
/external/python/jinja/docs/
Dintro.rst12 - HTML templates can use autoescaping to prevent XSS from untrusted
14 - A sandboxed environment can safely render untrusted templates.
50 - `MarkupSafe`_ escapes untrusted input when rendering templates to
/external/rust/crates/ring/src/ec/suite_b/
Dpublic_key.rs31 input: untrusted::Input, in parse_uncompressed_point()
82 let public_key = untrusted::Input::from(&public_key); in parse_uncompressed_point_test()
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl_ocsp.c504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp()
565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp()
566 if (!untrusted) in check_ocsp_resp()
579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp()
618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp()
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp()
838 sk_X509_free(untrusted); in check_ocsp_resp()

12345678910>>...12