/third_party/protobuf/java/core/src/main/java/com/google/protobuf/ |
D | MessageSchema.java | 405 final sun.misc.Unsafe unsafe = UNSAFE; in newSchemaForRawMessageInfo() local 492 fieldOffset = (int) unsafe.objectFieldOffset(oneofField); in newSchemaForRawMessageInfo() 504 presenceFieldOffset = (int) unsafe.objectFieldOffset(oneofCaseField); in newSchemaForRawMessageInfo() 527 fieldOffset = (int) unsafe.objectFieldOffset(field); in newSchemaForRawMessageInfo() 552 presenceFieldOffset = (int) unsafe.objectFieldOffset(hasBitsField); in newSchemaForRawMessageInfo() 1427 final sun.misc.Unsafe unsafe = UNSAFE; in getSerializedSizeProto2() local 1443 currentPresenceField = unsafe.getInt(message, (long) presenceFieldOffset); in getSerializedSizeProto2() 1466 size += CodedOutputStream.computeInt64Size(number, unsafe.getLong(message, offset)); in getSerializedSizeProto2() 1471 size += CodedOutputStream.computeUInt64Size(number, unsafe.getLong(message, offset)); in getSerializedSizeProto2() 1476 size += CodedOutputStream.computeInt32Size(number, unsafe.getInt(message, offset)); in getSerializedSizeProto2() [all …]
|
D | UnsafeUtil.java | 291 sun.misc.Unsafe unsafe = null; in getUnsafe() local 293 unsafe = in getUnsafe() 315 return unsafe; in getUnsafe() 539 sun.misc.Unsafe unsafe; field in UnsafeUtil.MemoryAccessor 541 MemoryAccessor(sun.misc.Unsafe unsafe) { in MemoryAccessor() argument 542 this.unsafe = unsafe; in MemoryAccessor() 546 return unsafe.objectFieldOffset(field); in objectFieldOffset() 554 return unsafe.getInt(target, offset); in getInt() 558 unsafe.putInt(target, offset, value); in putInt() 562 return unsafe.getLong(target, offset); in getLong() [all …]
|
/third_party/rust/crates/minimal-lexical/docs/ |
D | Development.md | 15 Furthermore, any unsafe code uses the following conventions: 17 1. Each unsafe function must contain a `# Safety` section. 18 2. Unsafe operations/calls in unsafe functions must be marked as unsafe, with their safety guarante… 70 In order to ensure memory safety even when using unsafe features, we have the following requirement… 72 - All code with local unsafety must be marked as an `unsafe` function. 73 - All unsafe macros must have a `# Safety` section in the documentation. 74 - All unsafe functions must have a `# Safety` section in the documentation. 75 …code using `unsafe` functionality must have a `// SAFETY:` section on the previous line, and must … 78 In order to very that the safety guarantees are met, any changes to `unsafe` code must be fuzzed, t… 81 # Ensure `unsafe` blocks are used within `unsafe` functions.
|
/third_party/rust/crates/cxx/tests/ui/ |
D | missing_unsafe.stderr | 1 error[E0133]: call to unsafe function is unsafe and requires unsafe function or block 7 | call to unsafe function
|
D | lifetime_extern_cxx.stderr | 1 error: extern C++ function with lifetimes must be declared in `unsafe extern "C++"` block 4 5 | unsafe fn f<'a>(&'a self, arg: &str) -> &'a str;
|
/third_party/node/deps/npm/node_modules/ini/ |
D | ini.js | 6 exports.unsafe = unsafe 82 section = unsafe(match[1]) 92 var key = unsafe(match[2]) 95 var value = match[3] ? unsafe(match[4]) : true 170 function unsafe (val, doUnesc) { function
|
D | README.md | 94 ini.safe('"unsafe string"') 98 "\"unsafe string\"" 100 ### unsafe(val)
|
/third_party/node/lib/internal/per_context/ |
D | primordials.js | 299 const makeSafe = (unsafe, safe) => { argument 300 if (SymbolIterator in unsafe.prototype) { 301 const dummy = new unsafe(); 304 ArrayPrototypeForEach(ReflectOwnKeys(unsafe.prototype), (key) => { 306 const desc = ReflectGetOwnPropertyDescriptor(unsafe.prototype, key); 323 copyProps(unsafe.prototype, safe.prototype); 325 copyProps(unsafe, safe);
|
/third_party/rust/crates/cxx/book/src/ |
D | extern-c++.md | 55 and need to leverage that fact from Rust, you must provide your own unsafe 69 unsafe impl Send for ffi::MyType {} 70 unsafe impl Sync for ffi::MyType {} 92 the C++ function is safe or unsafe to be called from Rust. 95 each signature inside as safe-to-call or unsafe-to-call. If an extern block 96 contains at least one safe-to-call signature, it must be written as an `unsafe 97 extern` block, which serves as an item level unsafe block to indicate that an 103 unsafe extern "C++" { 110 unsafe fn g(); // unsafe to call 139 unsafe extern "C++" { [all …]
|
D | async.md | 11 unsafe extern "C++" { 44 unsafe extern "C++" {
|
/third_party/node/deps/npm/node_modules/npm-lifecycle/ |
D | index.js | 249 var unsafe = opts.unsafePerm 250 var user = unsafe ? null : opts.user 251 var group = unsafe ? null : opts.group 258 opts.log.verbose('lifecycle', logid(pkg, stage), 'unsafe-perm in lifecycle', unsafe) 261 unsafe = true 264 if (unsafe) { 265 runCmd_(cmd, pkg, env, wd, opts, stage, unsafe, 0, 0, cb) 274 runCmd_(cmd, pkg, env, wd, opts, stage, unsafe, uid, gid, cb) 279 const getSpawnArgs = ({ cmd, wd, opts, uid, gid, unsafe, env }) => { property 286 if (!unsafe) { [all …]
|
/third_party/rust/crates/cxx/book/src/binding/ |
D | rawptr.md | 6 unsafe fallback option. 13 be declared `unsafe fn` i.e. unsafe to call. The same does not apply to 15 useful with the returned pointer is going to involve unsafe code elsewhere 59 unsafe fn parseArgs(argc: i32, argv: *mut *mut c_char); 93 unsafe {
|
/third_party/rust/crates/bindgen/book/src/ |
D | using-bitfields.md | 32 let mut bfield = unsafe { create_bitfield() }; 41 unsafe { print_bitfield(bfield) }; 56 let mut bfield = unsafe { create_bitfield() }; 62 unsafe { print_bitfield(bfield) }; 82 unsafe { print_bitfield(bfield) };
|
D | using-unions.md | 11 … with unions (either reading or writing) are unsafe, meaning you must surround union accesses in a… 74 let x = unsafe { std::mem::zeroed::<bindings_builtin_union::greek_t>() }; 84 unsafe { 114 unsafe {
|
/third_party/PyYAML/lib/yaml/ |
D | constructor.py | 525 def find_python_module(self, name, mark, unsafe=False): argument 529 if unsafe: 540 def find_python_name(self, name, mark, unsafe=False): argument 549 if unsafe: 580 args=None, kwds=None, newobj=False, unsafe=False): argument 586 if not (unsafe or isinstance(cls, type)): 595 def set_python_instance_state(self, instance, state, unsafe=False): argument 603 if not unsafe and state: 610 if not unsafe: 716 return super(UnsafeConstructor, self).find_python_module(name, mark, unsafe=True) [all …]
|
/third_party/libphonenumber/metadata/src/test/java/com/google/i18n/phonenumbers/metadata/table/ |
D | CsvTableTest.java | 212 Column<String> unsafe = Column.ofString("unsafe"); in testUnsafeString() local 213 CsvSchema<String> schema = CsvSchema.of(TEST_MARSHALLER, Schema.builder().add(unsafe).build()); in testUnsafeString() 215 CsvTable.builder(schema).put("key", unsafe, "Control chars Not \0 Allowed").build(); in testUnsafeString() 230 Column<Perverse> unsafe = Column.of(Perverse.class, "Unsafe", Perverse.UNSAFE_VALUE); in testPerverseEdgeCase() local 231 CsvSchema<String> schema = CsvSchema.of(TEST_MARSHALLER, Schema.builder().add(unsafe).build()); in testPerverseEdgeCase() 233 CsvTable.builder(schema).put("key", unsafe, Perverse.UNSAFE_VALUE).build(); in testPerverseEdgeCase()
|
/third_party/node/deps/npm/node_modules/safer-buffer/ |
D | Readme.md | 46 $ cat example.unsafe.js 48 $ ./node-v6.13.0-linux-x64/bin/node example.unsafe.js 50 $ standard example.unsafe.js 52 …/home/chalker/repo/safer-buffer/example.unsafe.js:2:13: 'Buffer()' was deprecated since v6. Use 'B… 57 to avoid using unsafe API. 84 can bring unsafe Buffer API usage back to the codebase by adding new calls — and that could go 120 New commits, if tested, won't land new usage of unsafe Buffer API this way.
|
/third_party/protobuf/java/core/src/test/java/com/google/protobuf/ |
D | CodedOutputStreamTest.java | 152 private final boolean unsafe; field in CodedOutputStreamTest.NioDirectCoder 154 NioDirectCoder(int size, boolean unsafe) { in NioDirectCoder() argument 155 this(size, 0, unsafe); in NioDirectCoder() 158 NioDirectCoder(int size, int initialPosition, boolean unsafe) { in NioDirectCoder() argument 159 this.unsafe = unsafe; in NioDirectCoder() 164 unsafe in NioDirectCoder() 187 return unsafe ? OutputType.NIO_DIRECT_SAFE : OutputType.NIO_DIRECT_UNSAFE; in getOutputType()
|
/third_party/rust/crates/regex/regex-syntax/ |
D | README.md | 46 This crate has no `unsafe` code and sets `forbid(unsafe_code)`. While it's 47 possible this crate could use `unsafe` code in the future, the standard 51 for extreme optimization, and therefore, use of `unsafe`. 53 The standard for using `unsafe` in this crate is extremely high because this
|
/third_party/rust/crates/nix/ |
D | README_zh.md | 15 // libc api (unsafe, requires handling return code/errno) 16 pub unsafe extern fn gethostname(name: *mut c_char, len: size_t) -> c_int;
|
D | README.md | 12 For many system APIs, Nix provides a safe alternative to the unsafe APIs 24 // libc api (unsafe, requires handling return code/errno) 25 pub unsafe extern fn gethostname(name: *mut c_char, len: size_t) -> c_int;
|
/third_party/rust/crates/io-lifetimes/ |
D | README.md | 113 [unsafe-io](https://crates.io/crates/unsafe-io). 162 [unsafe-io](https://crates.io/crates/unsafe-io), but io-lifetimes is built on 165 [`OwnsRaw`](https://docs.rs/unsafe-io/0.6.9/unsafe_io/trait.OwnsRaw.html), so 166 they're simpler and safer to use. io-lifetimes doesn't include unsafe-io's
|
/third_party/rust/crates/bindgen/ |
D | README_zh.md | 142 3. 添加文件main.rs,就可以在Rust侧通过c_ffi实现对C侧的接口调用。注意Rust侧调用的不安全接口需要使用unsafe封装。 155 unsafe { c_ffi::FuncAAddB(a, b) } 166 unsafe {
|
/third_party/node/deps/npm/node_modules/buffer-from/ |
D | readme.md | 69 - [buffer-alloc-unsafe](https://github.com/LinusU/buffer-alloc-unsafe) A ponyfill for `Buffer.alloc…
|
/third_party/python/Lib/test/ |
D | test_shlex.py | 330 unsafe = '"`$\\!' + unicode_sample 335 for u in unsafe: 338 for u in unsafe:
|