/macosx-10.9.5/CPANInternal-140/Perl4-CoreLibs-0.003/lib/ |
H A D | tainted.pl | 1 # This subroutine returns true if its argument is tainted, false otherwise. 3 sub tainted { subroutine
|
/macosx-10.9.5/CPANInternal-140/UNIVERSAL-require/t/ |
H A D | taint.t | 8 my $tainted = $0."bogus"; 9 ok !eval { $tainted->require or die $@};
|
/macosx-10.9.5/CPANInternal-140/PathTools/t/ |
H A D | taint.t | 19 use Scalar::Util qw/tainted/; 31 ok( tainted($cwd), "its return value should be tainted" ); 34 # Previous versions of Cwd tainted $^O 35 is !tainted($^O), 1, "\$^O should not be tainted";
|
/macosx-10.9.5/ruby-104/ruby/test/dl/ |
H A D | test_cfunc.rb | 28 assert @cf.name.tainted?, 'name should be tainted' 42 assert @cf.name.tainted?, 'name should be tainted' 52 assert s.tainted?, 'to_s should be tainted' 63 assert @cf.inspect.tainted?, 'inspect is tainted'
|
/macosx-10.9.5/ruby-104/ruby/test/ruby/ |
H A D | test_marshal.rb | 195 assert_equal(true, s.tainted?) 198 assert_equal(true, y.tainted?) 207 assert_equal(false, obj.tainted?) 209 assert_equal(false, obj.first.tainted?) 211 assert_equal(false, obj.first.first.tainted?) 214 assert_equal(false, s.tainted?) 217 # tainted/untrusted object causes tainted/untrusted stream 220 assert_equal(false, obj.tainted?) 222 assert_equal(false, obj.first.tainted [all...] |
H A D | test_file_exhaustive.rb | 659 assert_equal(true, File.expand_path('foo').tainted?) 660 assert_equal(true, File.expand_path('foo'.taint).tainted?) 661 assert_equal(true, File.expand_path('/foo'.taint).tainted?) 662 assert_equal(true, File.expand_path('foo', 'bar').tainted?) 663 assert_equal(true, File.expand_path('foo', '/bar'.taint).tainted?) 664 assert_equal(true, File.expand_path('foo'.taint, '/bar').tainted?) 665 assert_equal(true, File.expand_path('~').tainted?) if ENV["HOME"] 668 assert_equal(true, File.expand_path('/foo').tainted?) 669 assert_equal(false, File.expand_path('//foo').tainted?) 670 assert_equal(true, File.expand_path('C:/foo'.taint).tainted [all...] |
H A D | test_hash.rb | 253 assert_equal(a.tainted?, b.tainted?) 344 assert_equal(a.tainted?, b.tainted?) 668 assert_equal(true, a.tainted?)
|
H A D | test_exception.rb | 528 assert_equal(false, m.tainted?, 530 assert_equal(false, s.tainted?, 541 assert_equal(false, s.tainted?)
|
H A D | test_rubyoptions.rb | 76 /no -e allowed in tainted mode \(SecurityError\)/) 79 /no -S allowed in tainted mode \(SecurityError\)/) 251 assert_in_out_err(["--disable-gems"], "", [], /no program input from stdin allowed in tainted mode \(SecurityError\)/) 254 assert_in_out_err(["--disable-gems"], "", [], /no program input from stdin allowed in tainted mode \(SecurityError\)/)
|
/macosx-10.9.5/ruby-104/ruby/test/strscan/ |
H A D | test_stringscanner.rb | 14 assert_equal false, s.tainted? 22 assert_equal true, s.string.tainted? 27 assert_equal true, s.string.tainted? 106 assert_equal true, s.inspect.tainted? 231 assert_equal false, tmp.tainted? 235 assert_equal false, tmp.tainted? 242 assert_equal false, tmp.tainted? 253 assert_equal true, tmp.tainted? 257 assert_equal true, tmp.tainted? 264 assert_equal true, tmp.tainted [all...] |
/macosx-10.9.5/ruby-104/ruby/test/-ext-/ |
H A D | test_printf.rb | 36 to_s: Bug::Printf.s(obj).tainted?, 37 inspect: Bug::Printf.v(obj).tainted?,
|
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/tests/ |
H A D | tc_objcptr.rb | 22 assert( ! cptr.tainted? ) 123 assert( ! cptr.tainted? ) 130 assert( ! cptr.tainted? ) 137 assert( ! cptr.tainted? ) 144 assert( ! cptr.tainted? ) 151 assert( ! cptr.tainted? ) 158 assert( cptr.tainted? ) 174 assert( bstr.tainted? ) 182 assert( bstr.tainted? )
|
H A D | tc_nsdata.rb | 73 assert( data.bytes.tainted? ) 82 assert( cptr.tainted? )
|
/macosx-10.9.5/ruby-104/ruby/ext/psych/ |
H A D | psych_parser.c | 235 int tainted = 0; local 256 if (OBJ_TAINTED(yaml)) tainted = 1; 264 if (RTEST(rb_obj_is_kind_of(yaml, rb_cIO))) tainted = 1; 322 if (tainted) OBJ_TAINT(handle); 330 if (tainted) OBJ_TAINT(prefix); 361 if (tainted) OBJ_TAINT(alias); 382 if (tainted) OBJ_TAINT(val); 390 if (tainted) OBJ_TAINT(anchor); 398 if (tainted) OBJ_TAINT(tag); 430 if (tainted) OBJ_TAIN [all...] |
/macosx-10.9.5/ruby-104/ruby/test/psych/ |
H A D | test_tainted.rb | 38 def assert_taintedness thing, message = "'#{thing}' should be tainted" 39 tc.assert thing.tainted?, message 44 def assert_taintedness thing, message = "'#{thing}' should not be tainted" 45 tc.assert !thing.tainted?, message
|
/macosx-10.9.5/ruby-104/ruby/win32/ |
H A D | file.c | 366 int tainted = 0; local 368 /* tainted if path is tainted */ 369 tainted = OBJ_TAINTED(path); 396 /* tainted if expanding '~' */ 397 tainted = 1; 460 /* tainted if expanding '~' */ 461 tainted = 1; 565 /* tainted if dir is used and dir is tainted */ [all...] |
/macosx-10.9.5/ruby-104/ruby/ext/tk/lib/ |
H A D | remote-tk.rb | 95 TkUtil.untrust(@tk_windows) unless @tk_windows.tainted? 96 TkUtil.untrust(@tk_table_list) unless @tk_table_list.tainted? 97 TkUtil.untrust(@slave_ip_tbl) unless @slave_ip_tbl.tainted? 98 TkUtil.untrust(@slave_ip_top) unless @slave_ip_top.tainted? 122 (tbl = {}).tainted? || TkUtil.untrust(tbl) 204 elsif $SAFE >= 1 && cmds.find{|obj| obj.tainted?} 205 fail SecurityError, "cannot send tainted commands at level #{$SAFE}"
|
/macosx-10.9.5/ruby-104/ruby/test/pathname/ |
H A D | test_pathname.rb | 554 assert_equal(false, Pathname.new("a" ) .tainted?) 555 assert_equal(false, Pathname.new("a" ) .to_s.tainted?) 556 assert_equal(true, Pathname.new("a" ).taint .tainted?) 557 assert_equal(true, Pathname.new("a" ).taint.to_s.tainted?) 558 assert_equal(true, Pathname.new("a".taint) .tainted?) 559 assert_equal(true, Pathname.new("a".taint) .to_s.tainted?) 560 assert_equal(true, Pathname.new("a".taint).taint .tainted?) 561 assert_equal(true, Pathname.new("a".taint).taint.to_s.tainted?) 566 assert_equal(false, path .tainted?) 567 assert_equal(false, path.to_s.tainted [all...] |
/macosx-10.9.5/ruby-104/ruby/lib/webrick/ |
H A D | accesslog.rb | 151 if data.tainted?
|
/macosx-10.9.5/CPANInternal-140/PathTools/lib/File/Spec/ |
H A D | Cygwin.pm | 90 variables are tainted, they are not used.
|
/macosx-10.9.5/ruby-104/ruby/lib/ |
H A D | tmpdir.rb | 134 if $SAFE > 0 and tmpdir.tainted?
|
/macosx-10.9.5/ruby-104/ruby/test/drb/ |
H A D | test_drb.rb | 108 assert(! x.tainted?) 111 assert(! x.tainted?)
|
/macosx-10.9.5/ruby-104/ruby/test/date/ |
H A D | test_switch_hitter.rb | 576 assert_equal(false, h[:zone].tainted?) 578 assert_equal(true, h[:zone].tainted?) 581 assert_equal(false, h[:leftover].tainted?) 583 assert_equal(true, h[:leftover].tainted?) 586 assert_equal(false, h[:zone].tainted?) 588 assert_equal(true, h[:zone].tainted?) 591 assert_equal(false, s.tainted?) 593 assert_equal(true, s.tainted?) 595 assert_equal(true, s.tainted?) 598 assert_equal(false, s.tainted [all...] |
/macosx-10.9.5/CPANInternal-140/DBIx-ContextualFetch/lib/DBIx/ |
H A D | ContextualFetch.pm | 173 In addition, execute will accept tainted @bind_values. I can't think of 174 what a malicious user could do with a tainted bind value (in the general
|
/macosx-10.9.5/CPANInternal-140/DBIx-ContextualFetch-1.03/lib/DBIx/ |
H A D | ContextualFetch.pm | 173 In addition, execute will accept tainted @bind_values. I can't think of 174 what a malicious user could do with a tainted bind value (in the general
|