/third_party/skia/third_party/externals/harfbuzz/src/ |
D | hb-repacker.hh | 611 bool will_overflow (hb_vector_t<overflow_record_t>* overflows = nullptr) in will_overflow() 613 if (overflows) overflows->resize (0); in will_overflow() 624 if (!overflows) return true; in will_overflow() 629 overflows->push (r); in will_overflow() 633 if (!overflows) return false; in will_overflow() 634 return overflows->length; in will_overflow() 653 void print_overflows (const hb_vector_t<overflow_record_t>& overflows) in print_overflows() 658 for (const auto& o : overflows) in print_overflows() 1044 static bool _try_isolating_subgraphs (const hb_vector_t<graph_t::overflow_record_t>& overflows, in _try_isolating_subgraphs() argument 1047 for (int i = overflows.length - 1; i >= 0; i--) in _try_isolating_subgraphs() [all …]
|
D | hb-vector.hh | 223 bool overflows = in alloc() local 227 if (likely (!overflows)) in alloc()
|
/third_party/skia/third_party/externals/harfbuzz/docs/ |
D | repacker.md | 13 larger than 65kb. As a result these types of fonts are susceptible to offset overflows when 16 Offset overflows can happen for a variety of reasons and require different strategies to resolve: 17 * Simple overflows can often be resolved with a different topological ordering. 19 being at risk for overflows. In these cases it's possible to duplicate the shared subtable which 24 * In GSUB/GPOS overflows from Lookup subtables can be resolved by changing the Lookup to an extens… 33 which is used to resolve offset overflows that are present in the subsetted tables it produces. This 51 * Overflow check: given a graph and a topological sorting it checks if there will be any overflows 52 in any of the offsets. If there are overflows it returns a list of (parent, child) tuples that 70 while (overflows = graph.will_overflow()): 71 for overflow in overflows: [all …]
|
/third_party/mesa3d/docs/relnotes/ |
D | 20.1.8.rst | 124 - radv: Fix various non-critical integer overflows 125 - aco: Fix integer overflows when emitting parallel copies during RA 126 - amd/common: Fix various non-critical integer overflows
|
D | 10.6.8.rst | 73 - st/mesa: avoid integer overflows with buffers >= 512MB
|
D | 11.0.1.rst | 78 - st/mesa: avoid integer overflows with buffers >= 512MB
|
/third_party/ffmpeg/doc/ |
D | undefined.txt | 17 problem that some (invalid) inputs can trigger overflows (undefined behavior). 23 unsigned overflows are defined in C.
|
/third_party/python/Misc/NEWS.d/next/Security/ |
D | 2022-10-21-13-31-47.gh-issue-98517.SXXGfV.rst | 1 Port XKCP's fix for the buffer overflows in SHA-3 (CVE-2022-37454).
|
/third_party/skia/resources/sksl/errors/ |
D | ProgramTooLarge_Stack.sksl | 11 S no_report; // we don't need to report overflows past the first
|
/third_party/node/deps/v8/src/builtins/ |
D | builtins-string.cc | 286 bool overflows = ToUpperOverflows(current); in ConvertCaseHelper() local 306 overflows |= ToUpperOverflows(current); in ConvertCaseHelper() 322 return (overflows && !ignore_overflow) ? Smi::FromInt(-current_length) in ConvertCaseHelper()
|
/third_party/curl/docs/ |
D | CODE_REVIEW.md | 141 ## Integer overflows 143 Be careful about integer overflows. Some variable types can be either 32 bit 144 or 64 bit. Integer overflows must be detected and acted on *before* they
|
/third_party/libxml2/ |
D | README_ZH.md | 19 backport-CVE-2022-40303-Fix-integer-overflows-with-XML_PARSE_.patch
|
D | README.md | 18 backport-CVE-2022-40303-Fix-integer-overflows-with-XML_PARSE_.patch
|
D | backport-parser-Use-size_t-when-subtracting-input-buffer-poin.patch | 6 Avoid integer overflows.
|
D | backport-valid-Make-xmlValidateElement-non-recursive.patch | 6 Fixes call stack overflows when validating deeply nested documents.
|
D | backport-Make-XPath-depth-check-work-with-recursive-invocatio.patch | 8 value to avoid stack overflows when abusing these functions.
|
/third_party/glslang/Test/baseResults/ |
D | 440.vert.out | 2 ERROR: 0:8: 'component' : type overflows the available 4 components 9 ERROR: 0:39: 'component' : type overflows the available 4 components 10 ERROR: 0:40: 'component' : type overflows the available 4 components 16 ERROR: 0:54: 'component' : type overflows the available 4 components 17 ERROR: 0:55: 'component' : type overflows the available 4 components 22 ERROR: 0:67: 'component' : type overflows the available 4 components
|
/third_party/ffmpeg/libavcodec/arm/ |
D | vc1dsp_neon.S | 62 @ causing overflows, but sometimes the input values are just big enough to 77 @ Even with this workaround, there were still some files that caused overflows 206 @ Sometimes this overflows, so to get one additional bit of precision, use
|
/third_party/skia/third_party/externals/freetype/docs/oldlogs/ |
D | ChangeLog.28 | 483 [truetype] Integer overflows. 497 [truetype] Integer overflows. 507 [cff, truetype] Integer overflows. 548 [cff, truetype] Integer overflows. 570 [truetype] Integer overflows. 582 [bdf, cff] Integer overflows. 603 [cff, truetype] Integer overflows. 616 [cff] Integer overflows. 646 [cff, truetype] Integer overflows. 694 [cff, truetype] Integer overflows. [all …]
|
/third_party/cares/ |
D | backport-add-str-len-check-in-config_sortlist-to-avoid-stack-overflow.patch | 16 potential stack overflows.
|
/third_party/lz4/doc/ |
D | lz4_Block_format.md | 180 then it's recommended to check that no large length overflows the register. 186 A conformant decoder should be able to detect length overflows when it's possible, 213 Combine them with sanitizers, in order to catch overflows (asan)
|
/third_party/libexif/ |
D | NEWS | 57 * CVE-2020-13112: Various buffer overread fixes due to integer overflows in maker notes 69 * Fixed a number of security and stability issues due to buffer overflows,
|
/third_party/skia/third_party/externals/opengl-registry/extensions/OES/ |
D | OES_query_matrix.txt | 67 The implementations are not required to keep track of overflows. In
|
/third_party/ffmpeg/tests/checkasm/arm/ |
D | checkasm.S | 86 @ For stack overflows, the callee is free to overwrite the parameters
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_oid.data | 128 # Encodes the number 0x0400000000 as a subidentifier which overflows 32-bits
|