Searched refs:dangerous (Results 1 – 25 of 155) sorted by relevance
1234567
/third_party/node/deps/npm/node_modules/safer-buffer/ |
D | tests.js | 11 var dangerous = require('./dangerous') variable 17 t.notEqual(safer, dangerous) 18 t.notEqual(index, dangerous) 23 [index, safer, dangerous].forEach(function (impl) { 35 [index, safer, dangerous].forEach(function (impl) { 49 [index, safer, dangerous].forEach(function (impl) { 61 [dangerous].forEach(function (impl) { 70 [index, safer, dangerous].forEach(function (impl) { 81 [index, safer, dangerous].forEach(function (impl) { 92 [index, safer, dangerous].forEach(function (impl) { [all …]
|
D | dangerous.js | 10 var dangerous = {} variable 16 dangerous[key] = safer[key] 19 var Dangereous = dangerous.Buffer = {} 58 module.exports = dangerous
|
/third_party/e2fsprogs/tests/t_dangerous/ |
D | name | 1 dangerous tune2fs operation prompts
|
D | expect | 1 tune2fs dangerous prompts test
|
/third_party/iptables/extensions/ |
D | libipt_TTL.man | 5 Setting or incrementing the TTL field can potentially be very dangerous,
|
D | libip6t_HL.man | 3 Hop Limit field can potentially be very dangerous, so it should be avoided at
|
/third_party/curl/docs/cmdline-opts/ |
D | proto.d | 40 being able to disable potentially dangerous protocols, without relying upon
|
/third_party/typescript_eslint/packages/eslint-plugin/docs/rules/ |
D | no-dynamic-delete.md | 3 Deleting dynamically computed keys can be dangerous and in some cases not well optimized.
|
D | prefer-ts-expect-error.md | 7 This is dangerous, as if a new error arises on that line it'll be suppressed by the forgotten about…
|
/third_party/alsa-lib/utils/ |
D | alsa-lib.spec.in | 41 - dangerous command "rpm -rf $RPM_BUILD_ROOT" checks $RPM_BUILD_ROOT variable
|
/third_party/alsa-utils/utils/ |
D | alsa-utils.spec.in | 43 - dangerous command "rpm -rf $RPM_BUILD_ROOT" checks $RPM_BUILD_ROOT variable
|
/third_party/node/deps/npm/node_modules/registry-auth-token/ |
D | README.md | 61 Please be careful when using this. Leaking your auth token is dangerous.
|
/third_party/gettext/gettext-tools/doc/ |
D | lang-bash.texi | 32 locale's encoding, produce the dangerous @code{\x60} bytes.
|
/third_party/json/doc/mkdocs/docs/features/ |
D | comments.md | 12 3. It is dangerous for interoperability if some libraries would add comment support while others do…
|
D | iterators.md | 103 …Using `items()` on temporary objects is dangerous. Make sure the object's lifetime exeeds the iter…
|
/third_party/ltp/tools/sparse/sparse-src/Documentation/release-notes/ |
D | v0.6.3.rst | 36 * add various warnings for dangerous usage of flexible array members
|
/third_party/boost/libs/python/doc/reference/ |
D | reference_existing_object.qbk | 3 …ong as that of the corresponding Python object. Thus, it can be *highly dangerous* to use `referen…
|
/third_party/mindspore/tests/ut/data/mindrecord/testAclImdbData/pos/ |
D | 10008_7.txt | 1 …ven though it doesn't include a serial killer or anyone that physically dangerous for that matter.…
|
/third_party/e2fsprogs/doc/RelNotes/ |
D | v1.25.txt | 37 it, which is dangerous and broken, but there's nothing I can do about
|
D | v1.44.0.txt | 26 file systems as being dangerous when doing an on-line resize (since this
|
/third_party/mindspore/.jenkins/check/config/ |
D | filter_pylint.txt | 19 …tions/_thor_ops.py" "dangerous-default-value" 22 …impl/_custom_op" "dangerous-default-value
|
/third_party/boost/ |
D | Jamroot | 213 # dangerous on Windows. Therefore, we disallow it. This might be drastic, 223 ECHO "warning: this combination is either impossible or too dangerous" ;
|
/third_party/gstreamer/gstreamer/docs/random/wtay/ |
D | caps-negociation | 64 as dangerous) and let the two elements figure out a suitable 243 as possibly dangerous and keep some spare elements ready for when
|
/third_party/openssl/doc/man3/ |
D | SSL_get_client_random.pod | 37 can be dangerous if misused; see NOTES below.
|
/third_party/selinux/ |
D | README.md | 112 (overwriting any previously installed ones - dangerous!),
|
1234567