Home
last modified time | relevance | path

Searched refs:dangerous (Results 1 – 25 of 155) sorted by relevance

1234567

/third_party/node/deps/npm/node_modules/safer-buffer/
Dtests.js11 var dangerous = require('./dangerous') variable
17 t.notEqual(safer, dangerous)
18 t.notEqual(index, dangerous)
23 [index, safer, dangerous].forEach(function (impl) {
35 [index, safer, dangerous].forEach(function (impl) {
49 [index, safer, dangerous].forEach(function (impl) {
61 [dangerous].forEach(function (impl) {
70 [index, safer, dangerous].forEach(function (impl) {
81 [index, safer, dangerous].forEach(function (impl) {
92 [index, safer, dangerous].forEach(function (impl) {
[all …]
Ddangerous.js10 var dangerous = {} variable
16 dangerous[key] = safer[key]
19 var Dangereous = dangerous.Buffer = {}
58 module.exports = dangerous
/third_party/e2fsprogs/tests/t_dangerous/
Dname1 dangerous tune2fs operation prompts
Dexpect1 tune2fs dangerous prompts test
/third_party/iptables/extensions/
Dlibipt_TTL.man5 Setting or incrementing the TTL field can potentially be very dangerous,
Dlibip6t_HL.man3 Hop Limit field can potentially be very dangerous, so it should be avoided at
/third_party/curl/docs/cmdline-opts/
Dproto.d40 being able to disable potentially dangerous protocols, without relying upon
/third_party/typescript_eslint/packages/eslint-plugin/docs/rules/
Dno-dynamic-delete.md3 Deleting dynamically computed keys can be dangerous and in some cases not well optimized.
Dprefer-ts-expect-error.md7 This is dangerous, as if a new error arises on that line it'll be suppressed by the forgotten about…
/third_party/alsa-lib/utils/
Dalsa-lib.spec.in41 - dangerous command "rpm -rf $RPM_BUILD_ROOT" checks $RPM_BUILD_ROOT variable
/third_party/alsa-utils/utils/
Dalsa-utils.spec.in43 - dangerous command "rpm -rf $RPM_BUILD_ROOT" checks $RPM_BUILD_ROOT variable
/third_party/node/deps/npm/node_modules/registry-auth-token/
DREADME.md61 Please be careful when using this. Leaking your auth token is dangerous.
/third_party/gettext/gettext-tools/doc/
Dlang-bash.texi32 locale's encoding, produce the dangerous @code{\x60} bytes.
/third_party/json/doc/mkdocs/docs/features/
Dcomments.md12 3. It is dangerous for interoperability if some libraries would add comment support while others do…
Diterators.md103 …Using `items()` on temporary objects is dangerous. Make sure the object's lifetime exeeds the iter…
/third_party/ltp/tools/sparse/sparse-src/Documentation/release-notes/
Dv0.6.3.rst36 * add various warnings for dangerous usage of flexible array members
/third_party/boost/libs/python/doc/reference/
Dreference_existing_object.qbk3 …ong as that of the corresponding Python object. Thus, it can be *highly dangerous* to use `referen…
/third_party/mindspore/tests/ut/data/mindrecord/testAclImdbData/pos/
D10008_7.txt1 …ven though it doesn't include a serial killer or anyone that physically dangerous for that matter.…
/third_party/e2fsprogs/doc/RelNotes/
Dv1.25.txt37 it, which is dangerous and broken, but there's nothing I can do about
Dv1.44.0.txt26 file systems as being dangerous when doing an on-line resize (since this
/third_party/mindspore/.jenkins/check/config/
Dfilter_pylint.txt19 …tions/_thor_ops.py" "dangerous-default-value"
22 …impl/_custom_op" "dangerous-default-value
/third_party/boost/
DJamroot213 # dangerous on Windows. Therefore, we disallow it. This might be drastic,
223 ECHO "warning: this combination is either impossible or too dangerous" ;
/third_party/gstreamer/gstreamer/docs/random/wtay/
Dcaps-negociation64 as dangerous) and let the two elements figure out a suitable
243 as possibly dangerous and keep some spare elements ready for when
/third_party/openssl/doc/man3/
DSSL_get_client_random.pod37 can be dangerous if misused; see NOTES below.
/third_party/selinux/
DREADME.md112 (overwriting any previously installed ones - dangerous!),

1234567