Searched refs:tainted (Results 1 - 25 of 70) sorted by relevance

123

/macosx-10.9.5/CPANInternal-140/Perl4-CoreLibs-0.003/lib/
H A Dtainted.pl1 # This subroutine returns true if its argument is tainted, false otherwise.
3 sub tainted { subroutine
/macosx-10.9.5/CPANInternal-140/UNIVERSAL-require/t/
H A Dtaint.t8 my $tainted = $0."bogus";
9 ok !eval { $tainted->require or die $@};
/macosx-10.9.5/CPANInternal-140/PathTools/t/
H A Dtaint.t19 use Scalar::Util qw/tainted/;
31 ok( tainted($cwd), "its return value should be tainted" );
34 # Previous versions of Cwd tainted $^O
35 is !tainted($^O), 1, "\$^O should not be tainted";
/macosx-10.9.5/ruby-104/ruby/test/dl/
H A Dtest_cfunc.rb28 assert @cf.name.tainted?, 'name should be tainted'
42 assert @cf.name.tainted?, 'name should be tainted'
52 assert s.tainted?, 'to_s should be tainted'
63 assert @cf.inspect.tainted?, 'inspect is tainted'
/macosx-10.9.5/ruby-104/ruby/test/ruby/
H A Dtest_marshal.rb195 assert_equal(true, s.tainted?)
198 assert_equal(true, y.tainted?)
207 assert_equal(false, obj.tainted?)
209 assert_equal(false, obj.first.tainted?)
211 assert_equal(false, obj.first.first.tainted?)
214 assert_equal(false, s.tainted?)
217 # tainted/untrusted object causes tainted/untrusted stream
220 assert_equal(false, obj.tainted?)
222 assert_equal(false, obj.first.tainted
[all...]
H A Dtest_file_exhaustive.rb659 assert_equal(true, File.expand_path('foo').tainted?)
660 assert_equal(true, File.expand_path('foo'.taint).tainted?)
661 assert_equal(true, File.expand_path('/foo'.taint).tainted?)
662 assert_equal(true, File.expand_path('foo', 'bar').tainted?)
663 assert_equal(true, File.expand_path('foo', '/bar'.taint).tainted?)
664 assert_equal(true, File.expand_path('foo'.taint, '/bar').tainted?)
665 assert_equal(true, File.expand_path('~').tainted?) if ENV["HOME"]
668 assert_equal(true, File.expand_path('/foo').tainted?)
669 assert_equal(false, File.expand_path('//foo').tainted?)
670 assert_equal(true, File.expand_path('C:/foo'.taint).tainted
[all...]
H A Dtest_hash.rb253 assert_equal(a.tainted?, b.tainted?)
344 assert_equal(a.tainted?, b.tainted?)
668 assert_equal(true, a.tainted?)
H A Dtest_exception.rb528 assert_equal(false, m.tainted?,
530 assert_equal(false, s.tainted?,
541 assert_equal(false, s.tainted?)
H A Dtest_rubyoptions.rb76 /no -e allowed in tainted mode \(SecurityError\)/)
79 /no -S allowed in tainted mode \(SecurityError\)/)
251 assert_in_out_err(["--disable-gems"], "", [], /no program input from stdin allowed in tainted mode \(SecurityError\)/)
254 assert_in_out_err(["--disable-gems"], "", [], /no program input from stdin allowed in tainted mode \(SecurityError\)/)
/macosx-10.9.5/ruby-104/ruby/test/strscan/
H A Dtest_stringscanner.rb14 assert_equal false, s.tainted?
22 assert_equal true, s.string.tainted?
27 assert_equal true, s.string.tainted?
106 assert_equal true, s.inspect.tainted?
231 assert_equal false, tmp.tainted?
235 assert_equal false, tmp.tainted?
242 assert_equal false, tmp.tainted?
253 assert_equal true, tmp.tainted?
257 assert_equal true, tmp.tainted?
264 assert_equal true, tmp.tainted
[all...]
/macosx-10.9.5/ruby-104/ruby/test/-ext-/
H A Dtest_printf.rb36 to_s: Bug::Printf.s(obj).tainted?,
37 inspect: Bug::Printf.v(obj).tainted?,
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/tests/
H A Dtc_objcptr.rb22 assert( ! cptr.tainted? )
123 assert( ! cptr.tainted? )
130 assert( ! cptr.tainted? )
137 assert( ! cptr.tainted? )
144 assert( ! cptr.tainted? )
151 assert( ! cptr.tainted? )
158 assert( cptr.tainted? )
174 assert( bstr.tainted? )
182 assert( bstr.tainted? )
H A Dtc_nsdata.rb73 assert( data.bytes.tainted? )
82 assert( cptr.tainted? )
/macosx-10.9.5/ruby-104/ruby/ext/psych/
H A Dpsych_parser.c235 int tainted = 0; local
256 if (OBJ_TAINTED(yaml)) tainted = 1;
264 if (RTEST(rb_obj_is_kind_of(yaml, rb_cIO))) tainted = 1;
322 if (tainted) OBJ_TAINT(handle);
330 if (tainted) OBJ_TAINT(prefix);
361 if (tainted) OBJ_TAINT(alias);
382 if (tainted) OBJ_TAINT(val);
390 if (tainted) OBJ_TAINT(anchor);
398 if (tainted) OBJ_TAINT(tag);
430 if (tainted) OBJ_TAIN
[all...]
/macosx-10.9.5/ruby-104/ruby/test/psych/
H A Dtest_tainted.rb38 def assert_taintedness thing, message = "'#{thing}' should be tainted"
39 tc.assert thing.tainted?, message
44 def assert_taintedness thing, message = "'#{thing}' should not be tainted"
45 tc.assert !thing.tainted?, message
/macosx-10.9.5/ruby-104/ruby/win32/
H A Dfile.c366 int tainted = 0; local
368 /* tainted if path is tainted */
369 tainted = OBJ_TAINTED(path);
396 /* tainted if expanding '~' */
397 tainted = 1;
460 /* tainted if expanding '~' */
461 tainted = 1;
565 /* tainted if dir is used and dir is tainted */
[all...]
/macosx-10.9.5/ruby-104/ruby/ext/tk/lib/
H A Dremote-tk.rb95 TkUtil.untrust(@tk_windows) unless @tk_windows.tainted?
96 TkUtil.untrust(@tk_table_list) unless @tk_table_list.tainted?
97 TkUtil.untrust(@slave_ip_tbl) unless @slave_ip_tbl.tainted?
98 TkUtil.untrust(@slave_ip_top) unless @slave_ip_top.tainted?
122 (tbl = {}).tainted? || TkUtil.untrust(tbl)
204 elsif $SAFE >= 1 && cmds.find{|obj| obj.tainted?}
205 fail SecurityError, "cannot send tainted commands at level #{$SAFE}"
/macosx-10.9.5/ruby-104/ruby/test/pathname/
H A Dtest_pathname.rb554 assert_equal(false, Pathname.new("a" ) .tainted?)
555 assert_equal(false, Pathname.new("a" ) .to_s.tainted?)
556 assert_equal(true, Pathname.new("a" ).taint .tainted?)
557 assert_equal(true, Pathname.new("a" ).taint.to_s.tainted?)
558 assert_equal(true, Pathname.new("a".taint) .tainted?)
559 assert_equal(true, Pathname.new("a".taint) .to_s.tainted?)
560 assert_equal(true, Pathname.new("a".taint).taint .tainted?)
561 assert_equal(true, Pathname.new("a".taint).taint.to_s.tainted?)
566 assert_equal(false, path .tainted?)
567 assert_equal(false, path.to_s.tainted
[all...]
/macosx-10.9.5/ruby-104/ruby/lib/webrick/
H A Daccesslog.rb151 if data.tainted?
/macosx-10.9.5/CPANInternal-140/PathTools/lib/File/Spec/
H A DCygwin.pm90 variables are tainted, they are not used.
/macosx-10.9.5/ruby-104/ruby/lib/
H A Dtmpdir.rb134 if $SAFE > 0 and tmpdir.tainted?
/macosx-10.9.5/ruby-104/ruby/test/drb/
H A Dtest_drb.rb108 assert(! x.tainted?)
111 assert(! x.tainted?)
/macosx-10.9.5/ruby-104/ruby/test/date/
H A Dtest_switch_hitter.rb576 assert_equal(false, h[:zone].tainted?)
578 assert_equal(true, h[:zone].tainted?)
581 assert_equal(false, h[:leftover].tainted?)
583 assert_equal(true, h[:leftover].tainted?)
586 assert_equal(false, h[:zone].tainted?)
588 assert_equal(true, h[:zone].tainted?)
591 assert_equal(false, s.tainted?)
593 assert_equal(true, s.tainted?)
595 assert_equal(true, s.tainted?)
598 assert_equal(false, s.tainted
[all...]
/macosx-10.9.5/CPANInternal-140/DBIx-ContextualFetch/lib/DBIx/
H A DContextualFetch.pm173 In addition, execute will accept tainted @bind_values. I can't think of
174 what a malicious user could do with a tainted bind value (in the general
/macosx-10.9.5/CPANInternal-140/DBIx-ContextualFetch-1.03/lib/DBIx/
H A DContextualFetch.pm173 In addition, execute will accept tainted @bind_values. I can't think of
174 what a malicious user could do with a tainted bind value (in the general

Completed in 193 milliseconds

123