| /external/owasp/sanitizer/src/tests/org/owasp/html/ |
| D | SanitizersTest.java | 39 assertEquals("", Sanitizers.FORMATTING.sanitize(null)); in testFormatting() 40 assertEquals("", Sanitizers.FORMATTING.sanitize("")); in testFormatting() 43 Sanitizers.FORMATTING.sanitize("Hello, World!")); in testFormatting() 46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!")); in testFormatting() 49 Sanitizers.FORMATTING.sanitize( in testFormatting() 55 assertEquals("", Sanitizers.BLOCKS.sanitize(null)); in testBlockElements() 58 Sanitizers.BLOCKS.sanitize("Hello, World!")); in testBlockElements() 61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!")); in testBlockElements() 64 Sanitizers.BLOCKS.sanitize( in testBlockElements() 70 PolicyFactory s = Sanitizers.BLOCKS.and(Sanitizers.FORMATTING); in testBlockAndFormattingElements() [all …]
|
| /external/toolchain-utils/compiler_wrapper/ |
| D | sanitizer_flags.go | 11 // Returns whether the flag turns on 'invasive' sanitizers. These are sanitizers incompatible with 15 // -fsanitize=${sanitizer_list}, which enables the given sanitizers 17 // sanitizers are already enabled. 19 // these sanitizers are already enabled. 20 // -fsanitize-ignorelist=/path/to/file, which designates a config file for sanitizers. 22 // All we care about is the first one, since that's what actually enables sanitizers. Clang 29 sanitizers := flag[len(fsanitize):] 30 if sanitizers == "" { 34 for _, sanitizer := range strings.Split(sanitizers, ",") { 35 // Keep an allowlist of sanitizers known to not cause issues. [all …]
|
| /external/clang/include/clang/Driver/ |
| D | SanitizerArgs.h | 12 #include "clang/Basic/Sanitizers.h" 25 SanitizerSet Sanitizers; variable 46 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt() 48 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt() 49 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt() 51 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt() 52 !Sanitizers.has(SanitizerKind::Address); in needsLsanRt() 55 bool needsDfsanRt() const { return Sanitizers.has(SanitizerKind::DataFlow); } in needsDfsanRt() 57 return Sanitizers.has(SanitizerKind::SafeStack); in needsSafeStackRt() 63 return Sanitizers.hasOneOf(SanitizerKind::Efficiency); in needsEsanRt()
|
| /external/clang/lib/Driver/ |
| D | SanitizerArgs.cpp | 11 #include "clang/Basic/Sanitizers.h" 80 /// Produce a string containing comma-separated names of sanitizers in \p 81 /// Sanitizers set. 82 static std::string toString(const clang::SanitizerSet &Sanitizers); 114 #include "clang/Basic/Sanitizers.def" in setGroupBits() 121 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs() 162 return ((Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt() 164 !Sanitizers.has(Address) && !Sanitizers.has(Memory) && in needsUbsanRt() 165 !Sanitizers.has(Thread) && !Sanitizers.has(DataFlow) && !CfiCrossDso; in needsUbsanRt() 169 return !(Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiRt() [all …]
|
| /external/cronet/build/config/sanitizers/ |
| D | BUILD.gn | 8 import("//build/config/sanitizers/sanitizers.gni") 16 # Contains the dependencies needed for sanitizers to link into executables and 124 sources = [ "//build/sanitizers/sanitizer_options.cc" ] 129 configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ] 133 asan_suppressions_file = "//build/sanitizers/asan_suppressions.cc" 140 lsan_suppressions_file = "//build/sanitizers/lsan_suppressions.cc" 147 tsan_suppressions_file = "//build/sanitizers/tsan_suppressions.cc" 165 sanitizers = [] # sanitizers applicable to both clang and rustc 169 sanitizers += [ "address" ] 172 sanitizers += [ "hwaddress" ] [all …]
|
| D | sanitizers.gni | 42 # Use dynamic libraries instrumented by one of the sanitizers instead of the 105 # enabling sanitizers only in some of the components. 125 # Disable sanitizers for non-target toolchains. 150 # Use dynamic libraries instrumented by one of the sanitizers instead of the 218 "Sanitizers (is_*san) require setting is_clang = true in 'gn args'") 235 # same is possibly true for the other non-ASan sanitizers. But regardless of 248 "Sanitizers should generally be used in release (set is_debug=false).") 300 [ "//build/config/sanitizers:default_sanitizer_flags" ] 306 [ "//build/config/sanitizers:default_sanitizer_flags" ] 317 "//build/config/sanitizers:default_sanitizer_flags", [all …]
|
| /external/angle/build/config/sanitizers/ |
| D | BUILD.gn | 8 import("//build/config/sanitizers/sanitizers.gni") 16 # Contains the dependencies needed for sanitizers to link into executables and 127 sources = [ "//build/sanitizers/sanitizer_options.cc" ] 132 configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ] 136 asan_suppressions_file = "//build/sanitizers/asan_suppressions.cc" 143 lsan_suppressions_file = "//build/sanitizers/lsan_suppressions.cc" 150 tsan_suppressions_file = "//build/sanitizers/tsan_suppressions.cc" 168 sanitizers = [] # sanitizers applicable to both clang and rustc 172 sanitizers += [ "address" ] 175 sanitizers += [ "hwaddress" ] [all …]
|
| D | sanitizers.gni | 42 # Use dynamic libraries instrumented by one of the sanitizers instead of the 105 # enabling sanitizers only in some of the components. 128 # Disable sanitizers for non-target toolchains, and for the toolchain using 155 # Use dynamic libraries instrumented by one of the sanitizers instead of the 223 "Sanitizers (is_*san) require setting is_clang = true in 'gn args'") 240 # same is possibly true for the other non-ASan sanitizers. But regardless of 253 "Sanitizers should generally be used in release (set is_debug=false).") 305 [ "//build/config/sanitizers:default_sanitizer_flags" ] 311 [ "//build/config/sanitizers:default_sanitizer_flags" ] 322 "//build/config/sanitizers:default_sanitizer_flags", [all …]
|
| /external/clang/include/clang/Basic/ |
| D | Sanitizers.h | 1 //===--- Sanitizers.h - C Language Family Language Options ------*- C++ -*-===// 33 #include "clang/Basic/Sanitizers.def" 37 // Define the set of sanitizer kinds, as well as the set of sanitizers each 44 #include "clang/Basic/Sanitizers.def" 55 /// \brief Check if one or more sanitizers are enabled. 64 /// \brief Disable all sanitizers. 70 /// \brief Bitmask of enabled sanitizers. 78 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
|
| D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 10 // This file defines the options for specifying which runtime sanitizers to 13 // macro to get information on options which refer to sets of sanitizers. 34 // sanitizers in this group. 98 // -fsanitize=undefined includes all the sanitizers which have low overhead, no 124 // Magic group, containing all sanitizers. For example, "-fno-sanitize=all" 125 // can be used to disable all the sanitizers.
|
| /external/owasp/sanitizer/distrib/javadoc/org/owasp/html/ |
| D | Sanitizers.html | 7 Sanitizers (OWASP Java HTML Sanitizer) 17 parent.document.title="Sanitizers (OWASP Java HTML Sanitizer)"; 42 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="class-use/Sanitizers.html"><FONT CLASS="Nav… 59 …<A HREF="../../../index.html?org/owasp/html/Sanitizers.html" target="_top"><B>FRAMES</B></A> &nbs… 60 <A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> 91 Class Sanitizers</H2> 94 <IMG SRC="../../../resources/inherit.gif" ALT="extended by "><B>org.owasp.html.Sanitizers</B> 98 …ic final class <A HREF="../../../src-html/org/owasp/html/Sanitizers.html#line.53"><B>Sanitizers</B… 108 Sanitizers.FORMATTING.sanitize(<code>"<b>Hello, World!</b>"</code>) 112 PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS); [all …]
|
| /external/compiler-rt/lib/sanitizer_common/ |
| D | sanitizer_common_interceptors.inc | 662 // https://github.com/google/sanitizers/issues/321. 673 // https://github.com/google/sanitizers/issues/321. 714 // https://github.com/google/sanitizers/issues/321. 732 // https://github.com/google/sanitizers/issues/321. 750 // https://github.com/google/sanitizers/issues/321. 997 // https://github.com/google/sanitizers/issues/321. 1010 // https://github.com/google/sanitizers/issues/321. 1023 // https://github.com/google/sanitizers/issues/321. 1036 // https://github.com/google/sanitizers/issues/321. 1080 // https://github.com/google/sanitizers/issues/321. [all …]
|
| /external/clang/lib/Basic/ |
| D | Sanitizers.cpp | 1 //===--- Sanitizers.cpp - C Language Family Language Options ----*- C++ -*-===// 10 // This file defines the classes from Sanitizers.h 13 #include "clang/Basic/Sanitizers.h" 25 #include "clang/Basic/Sanitizers.def" in parseSanitizerValue() 35 #include "clang/Basic/Sanitizers.def" in expandSanitizerGroups()
|
| /external/jazzer-api/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/ |
| D | BUILD.bazel | 9 "//sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/utils:reflection_utils", 14 name = "sanitizers", 26 visibility = ["//sanitizers:__pkg__"],
|
| /external/cronet/build/config/ |
| D | BUILD.gn | 19 import("//build/config/sanitizers/sanitizers.gni") 136 # Sanitizers. 245 public_deps += [ "//build/config/sanitizers:deps" ] 275 public_configs = [ "//build/config/sanitizers:link_executable" ] 284 public_configs = [ "//build/config/sanitizers:link_executable" ] 291 public_configs = [ "//build/config/sanitizers:link_shared_library" ] 298 public_configs = [ "//build/config/sanitizers:link_shared_library" ] 305 public_configs = [ "//build/config/sanitizers:link_shared_library" ] 312 public_configs = [ "//build/config/sanitizers:link_shared_library" ] 346 # If we're using the prebuilt instrumented libraries with the sanitizers, we [all …]
|
| /external/oss-fuzz/docs/reference/ |
| D | glossary.md | 72 ### Sanitizers subsection 74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable… 80 Supported sanitizers: 84 …er](https://github.com/google/sanitizers/wiki/AddressSanitizer) with [Leak Sanitizer](https://gith… 86 | `memory` | [Memory Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NO…
|
| /external/skia/gn/skia/ |
| D | BUILD.gn | 291 sanitizers = "address" 292 cflags += [ "/fsanitize=$sanitizers" ] 294 # You can either pass the sanitizers directly, e.g. "address,undefined", 296 sanitizers = sanitize 300 sanitizers = "undefined,address,float-divide-by-zero" 304 sanitizers = "address" 307 sanitizers = "hwaddress" 309 sanitizers = "thread" 311 sanitizers = "memory" 317 "-fsanitize=$sanitizers", [all …]
|
| /external/owasp/sanitizer/distrib/javadoc/org/owasp/html/class-use/ |
| D | Sanitizers.html | 7 Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer) 17 parent.document.title="Uses of Class org.owasp.html.Sanitizers (OWASP Java HTML Sanitizer)"; 41 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"… 60 <A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A> 82 <B>Uses of Class<br>org.owasp.html.Sanitizers</B></H2> 84 No usage of org.owasp.html.Sanitizers 100 …<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../org/owasp/html/Sanitizers.html"… 119 <A HREF="Sanitizers.html" target="_top"><B>NO FRAMES</B></A>
|
| /external/pigweed/docs/ |
| D | automated_analysis.rst | 95 Clang sanitizers 98 described in this section. For more detail about these sanitizers, see the 112 The exact configurations we use for these sanitizers are in 117 Unlike clang-tidy, the clang sanitizers are runtime instrumentation: the 120 .. _Github documentation: https://github.com/google/sanitizers argument 172 Clang sanitizers 174 There are two ways to enable sanitizers for your build. 185 you can enable the clang sanitizers simply by setting the gn arg
|
| /external/jazzer-api/sanitizers/ |
| D | BUILD.bazel | 2 name = "sanitizers", 5 "//sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers",
|
| /external/owasp/sanitizer/src/main/org/owasp/html/ |
| D | Sanitizers.java | 38 * Sanitizers.FORMATTING.sanitize({@code "<b>Hello, World!</b>"}) 42 * PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS); 53 public final class Sanitizers { class 110 private Sanitizers() { in Sanitizers() method in Sanitizers
|
| /external/perfetto/gn/standalone/libc++/ |
| D | libc++.gni | 15 import("//gn/standalone/sanitizers/sanitizers.gni") 31 # 1) LLVM sanitizers require that the c++ library is built from sources, 33 # https://github.com/google/sanitizers/wiki/MemorySanitizerLibcxxHowTo).
|
| /external/oss-fuzz/infra/ |
| D | presubmit.py | 78 'sanitizers': constants.SANITIZERS, 99 'sanitizers', 145 specified in "sanitizers", and that if specified in "sanitizers", it is also 149 sanitizers = self.data.get('sanitizers', []) 150 dfsan_sanitizers = 'dataflow' in sanitizers 154 'specified in "sanitizers" or in neither.') 158 self.error('"dataflow" only specified in "sanitizers" must also be '
|
| /external/bc/manuals/ |
| D | release.md | 30 sanitizers, on FreeBSD. 32 sanitizers, and 64-bit, on an ARM server. 34 sanitizers, and no valgrind, on NetBSD. 35 15. Run and pass the release script, with no generated tests, no sanitizers, and
|
| /external/angle/build/config/ |
| D | BUILD.gn | 20 import("//build/config/sanitizers/sanitizers.gni") 137 # Sanitizers. 238 public_deps += [ "//build/config/sanitizers:deps" ] 276 public_configs = [ "//build/config/sanitizers:link_executable" ] 285 public_configs = [ "//build/config/sanitizers:link_shared_library" ] 294 public_configs = [ "//build/config/sanitizers:link_shared_library" ] 328 # If we're using the prebuilt instrumented libraries with the sanitizers, we 359 # If we're using the prebuilt instrumented libraries with the sanitizers, we
|