Home
last modified time | relevance | path

Searched full:sanitizers (Results 1 – 25 of 975) sorted by relevance

12345678910>>...39

/external/owasp/sanitizer/src/tests/org/owasp/html/
DSanitizersTest.java39 assertEquals("", Sanitizers.FORMATTING.sanitize(null)); in testFormatting()
40 assertEquals("", Sanitizers.FORMATTING.sanitize("")); in testFormatting()
43 Sanitizers.FORMATTING.sanitize("Hello, World!")); in testFormatting()
46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!")); in testFormatting()
49 Sanitizers.FORMATTING.sanitize( in testFormatting()
55 assertEquals("", Sanitizers.BLOCKS.sanitize(null)); in testBlockElements()
58 Sanitizers.BLOCKS.sanitize("Hello, World!")); in testBlockElements()
61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!")); in testBlockElements()
64 Sanitizers.BLOCKS.sanitize( in testBlockElements()
70 PolicyFactory s = Sanitizers.BLOCKS.and(Sanitizers.FORMATTING); in testBlockAndFormattingElements()
[all …]
/external/toolchain-utils/compiler_wrapper/
Dsanitizer_flags.go11 // Returns whether the flag turns on 'invasive' sanitizers. These are sanitizers incompatible with
15 // -fsanitize=${sanitizer_list}, which enables the given sanitizers
17 // sanitizers are already enabled.
19 // these sanitizers are already enabled.
20 // -fsanitize-ignorelist=/path/to/file, which designates a config file for sanitizers.
22 // All we care about is the first one, since that's what actually enables sanitizers. Clang
29 sanitizers := flag[len(fsanitize):]
30 if sanitizers == "" {
34 for _, sanitizer := range strings.Split(sanitizers, ",") {
35 // Keep an allowlist of sanitizers known to not cause issues.
[all …]
/external/clang/include/clang/Driver/
DSanitizerArgs.h12 #include "clang/Basic/Sanitizers.h"
25 SanitizerSet Sanitizers; variable
46 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt()
48 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt()
49 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt()
51 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt()
52 !Sanitizers.has(SanitizerKind::Address); in needsLsanRt()
55 bool needsDfsanRt() const { return Sanitizers.has(SanitizerKind::DataFlow); } in needsDfsanRt()
57 return Sanitizers.has(SanitizerKind::SafeStack); in needsSafeStackRt()
63 return Sanitizers.hasOneOf(SanitizerKind::Efficiency); in needsEsanRt()
/external/clang/lib/Driver/
DSanitizerArgs.cpp11 #include "clang/Basic/Sanitizers.h"
80 /// Produce a string containing comma-separated names of sanitizers in \p
81 /// Sanitizers set.
82 static std::string toString(const clang::SanitizerSet &Sanitizers);
114 #include "clang/Basic/Sanitizers.def" in setGroupBits()
121 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs()
162 return ((Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt()
164 !Sanitizers.has(Address) && !Sanitizers.has(Memory) && in needsUbsanRt()
165 !Sanitizers.has(Thread) && !Sanitizers.has(DataFlow) && !CfiCrossDso; in needsUbsanRt()
169 return !(Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiRt()
[all …]
/external/cronet/build/config/sanitizers/
DBUILD.gn8 import("//build/config/sanitizers/sanitizers.gni")
16 # Contains the dependencies needed for sanitizers to link into executables and
124 sources = [ "//build/sanitizers/sanitizer_options.cc" ]
129 configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ]
133 asan_suppressions_file = "//build/sanitizers/asan_suppressions.cc"
140 lsan_suppressions_file = "//build/sanitizers/lsan_suppressions.cc"
147 tsan_suppressions_file = "//build/sanitizers/tsan_suppressions.cc"
165 sanitizers = [] # sanitizers applicable to both clang and rustc
169 sanitizers += [ "address" ]
172 sanitizers += [ "hwaddress" ]
[all …]
Dsanitizers.gni42 # Use dynamic libraries instrumented by one of the sanitizers instead of the
105 # enabling sanitizers only in some of the components.
125 # Disable sanitizers for non-target toolchains.
150 # Use dynamic libraries instrumented by one of the sanitizers instead of the
218 "Sanitizers (is_*san) require setting is_clang = true in 'gn args'")
235 # same is possibly true for the other non-ASan sanitizers. But regardless of
248 "Sanitizers should generally be used in release (set is_debug=false).")
300 [ "//build/config/sanitizers:default_sanitizer_flags" ]
306 [ "//build/config/sanitizers:default_sanitizer_flags" ]
317 "//build/config/sanitizers:default_sanitizer_flags",
[all …]
/external/angle/build/config/sanitizers/
DBUILD.gn8 import("//build/config/sanitizers/sanitizers.gni")
16 # Contains the dependencies needed for sanitizers to link into executables and
127 sources = [ "//build/sanitizers/sanitizer_options.cc" ]
132 configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ]
136 asan_suppressions_file = "//build/sanitizers/asan_suppressions.cc"
143 lsan_suppressions_file = "//build/sanitizers/lsan_suppressions.cc"
150 tsan_suppressions_file = "//build/sanitizers/tsan_suppressions.cc"
168 sanitizers = [] # sanitizers applicable to both clang and rustc
172 sanitizers += [ "address" ]
175 sanitizers += [ "hwaddress" ]
[all …]
Dsanitizers.gni42 # Use dynamic libraries instrumented by one of the sanitizers instead of the
105 # enabling sanitizers only in some of the components.
128 # Disable sanitizers for non-target toolchains, and for the toolchain using
155 # Use dynamic libraries instrumented by one of the sanitizers instead of the
223 "Sanitizers (is_*san) require setting is_clang = true in 'gn args'")
240 # same is possibly true for the other non-ASan sanitizers. But regardless of
253 "Sanitizers should generally be used in release (set is_debug=false).")
305 [ "//build/config/sanitizers:default_sanitizer_flags" ]
311 [ "//build/config/sanitizers:default_sanitizer_flags" ]
322 "//build/config/sanitizers:default_sanitizer_flags",
[all …]
/external/clang/include/clang/Basic/
DSanitizers.h1 //===--- Sanitizers.h - C Language Family Language Options ------*- C++ -*-===//
33 #include "clang/Basic/Sanitizers.def"
37 // Define the set of sanitizer kinds, as well as the set of sanitizers each
44 #include "clang/Basic/Sanitizers.def"
55 /// \brief Check if one or more sanitizers are enabled.
64 /// \brief Disable all sanitizers.
70 /// \brief Bitmask of enabled sanitizers.
78 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
10 // This file defines the options for specifying which runtime sanitizers to
13 // macro to get information on options which refer to sets of sanitizers.
34 // sanitizers in this group.
98 // -fsanitize=undefined includes all the sanitizers which have low overhead, no
124 // Magic group, containing all sanitizers. For example, "-fno-sanitize=all"
125 // can be used to disable all the sanitizers.
/external/owasp/sanitizer/distrib/javadoc/org/owasp/html/
DSanitizers.html7 Sanitizers (OWASP Java HTML Sanitizer)
17 parent.document.title="Sanitizers (OWASP Java HTML Sanitizer)";
42 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="class-use/Sanitizers.html"><FONT CLASS="Nav…
59 …<A HREF="../../../index.html?org/owasp/html/Sanitizers.html" target="_top"><B>FRAMES</B></A> &nbs…
60 &nbsp;<A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
91 Class Sanitizers</H2>
94 <IMG SRC="../../../resources/inherit.gif" ALT="extended by "><B>org.owasp.html.Sanitizers</B>
98 …ic final class <A HREF="../../../src-html/org/owasp/html/Sanitizers.html#line.53"><B>Sanitizers</B…
108 Sanitizers.FORMATTING.sanitize(<code>"&lt;b&gt;Hello, World!&lt;/b&gt;"</code>)
112 PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS);
[all …]
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_common_interceptors.inc662 // https://github.com/google/sanitizers/issues/321.
673 // https://github.com/google/sanitizers/issues/321.
714 // https://github.com/google/sanitizers/issues/321.
732 // https://github.com/google/sanitizers/issues/321.
750 // https://github.com/google/sanitizers/issues/321.
997 // https://github.com/google/sanitizers/issues/321.
1010 // https://github.com/google/sanitizers/issues/321.
1023 // https://github.com/google/sanitizers/issues/321.
1036 // https://github.com/google/sanitizers/issues/321.
1080 // https://github.com/google/sanitizers/issues/321.
[all …]
/external/clang/lib/Basic/
DSanitizers.cpp1 //===--- Sanitizers.cpp - C Language Family Language Options ----*- C++ -*-===//
10 // This file defines the classes from Sanitizers.h
13 #include "clang/Basic/Sanitizers.h"
25 #include "clang/Basic/Sanitizers.def" in parseSanitizerValue()
35 #include "clang/Basic/Sanitizers.def" in expandSanitizerGroups()
/external/jazzer-api/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/
DBUILD.bazel9 "//sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/utils:reflection_utils",
14 name = "sanitizers",
26 visibility = ["//sanitizers:__pkg__"],
/external/cronet/build/config/
DBUILD.gn19 import("//build/config/sanitizers/sanitizers.gni")
136 # Sanitizers.
245 public_deps += [ "//build/config/sanitizers:deps" ]
275 public_configs = [ "//build/config/sanitizers:link_executable" ]
284 public_configs = [ "//build/config/sanitizers:link_executable" ]
291 public_configs = [ "//build/config/sanitizers:link_shared_library" ]
298 public_configs = [ "//build/config/sanitizers:link_shared_library" ]
305 public_configs = [ "//build/config/sanitizers:link_shared_library" ]
312 public_configs = [ "//build/config/sanitizers:link_shared_library" ]
346 # If we're using the prebuilt instrumented libraries with the sanitizers, we
[all …]
/external/oss-fuzz/docs/reference/
Dglossary.md72 ### Sanitizers subsection
74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable…
80 Supported sanitizers:
84 …er](https://github.com/google/sanitizers/wiki/AddressSanitizer) with [Leak Sanitizer](https://gith…
86 | `memory` | [Memory Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NO…
/external/skia/gn/skia/
DBUILD.gn291 sanitizers = "address"
292 cflags += [ "/fsanitize=$sanitizers" ]
294 # You can either pass the sanitizers directly, e.g. "address,undefined",
296 sanitizers = sanitize
300 sanitizers = "undefined,address,float-divide-by-zero"
304 sanitizers = "address"
307 sanitizers = "hwaddress"
309 sanitizers = "thread"
311 sanitizers = "memory"
317 "-fsanitize=$sanitizers",
[all …]
/external/owasp/sanitizer/distrib/javadoc/org/owasp/html/class-use/
DSanitizers.html7 Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer)
17 parent.document.title="Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer)";
41 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"…
60 &nbsp;<A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
82 <B>Uses of Class<br>org.owasp.html.Sanitizers</B></H2>
84 No usage of org.owasp.html.Sanitizers
100 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"…
119 &nbsp;<A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> &nbsp;
/external/pigweed/docs/
Dautomated_analysis.rst95 Clang sanitizers
98 described in this section. For more detail about these sanitizers, see the
112 The exact configurations we use for these sanitizers are in
117 Unlike clang-tidy, the clang sanitizers are runtime instrumentation: the
120 .. _Github documentation: https://github.com/google/sanitizers argument
172 Clang sanitizers
174 There are two ways to enable sanitizers for your build.
185 you can enable the clang sanitizers simply by setting the gn arg
/external/jazzer-api/sanitizers/
DBUILD.bazel2 name = "sanitizers",
5 "//sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers",
/external/owasp/sanitizer/src/main/org/owasp/html/
DSanitizers.java38 * Sanitizers.FORMATTING.sanitize({@code "<b>Hello, World!</b>"})
42 * PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS);
53 public final class Sanitizers { class
110 private Sanitizers() { in Sanitizers() method in Sanitizers
/external/perfetto/gn/standalone/libc++/
Dlibc++.gni15 import("//gn/standalone/sanitizers/sanitizers.gni")
31 # 1) LLVM sanitizers require that the c++ library is built from sources,
33 # https://github.com/google/sanitizers/wiki/MemorySanitizerLibcxxHowTo).
/external/oss-fuzz/infra/
Dpresubmit.py78 'sanitizers': constants.SANITIZERS,
99 'sanitizers',
145 specified in "sanitizers", and that if specified in "sanitizers", it is also
149 sanitizers = self.data.get('sanitizers', [])
150 dfsan_sanitizers = 'dataflow' in sanitizers
154 'specified in "sanitizers" or in neither.')
158 self.error('"dataflow" only specified in "sanitizers" must also be '
/external/bc/manuals/
Drelease.md30 sanitizers, on FreeBSD.
32 sanitizers, and 64-bit, on an ARM server.
34 sanitizers, and no valgrind, on NetBSD.
35 15. Run and pass the release script, with no generated tests, no sanitizers, and
/external/angle/build/config/
DBUILD.gn20 import("//build/config/sanitizers/sanitizers.gni")
137 # Sanitizers.
238 public_deps += [ "//build/config/sanitizers:deps" ]
276 public_configs = [ "//build/config/sanitizers:link_executable" ]
285 public_configs = [ "//build/config/sanitizers:link_shared_library" ]
294 public_configs = [ "//build/config/sanitizers:link_shared_library" ]
328 # If we're using the prebuilt instrumented libraries with the sanitizers, we
359 # If we're using the prebuilt instrumented libraries with the sanitizers, we

12345678910>>...39