/external/chromium/googleurl/ |
README.txt | 27 potentially dangerous constructs such as escaped control characters in
|
/external/chromium/googleurl/src/ |
url_util.h | 78 // dangerous.
|
/external/chromium/testing/gtest/scripts/ |
gtest-config.in | 214 # TODO(chandlerc@google.com): This is a dangerous dependency on libtool, we
|
/external/clang/test/Analysis/ |
ptr-arith.c | 56 p = &x + 1; // expected-warning{{Pointer arithmetic done on non-array variables means reliance on memory layout, which is dangerous.}}
|
security-syntax-checks.m | 49 getpw(2, buff); // expected-warning{{The getpw() function is dangerous as it may overflow the provided buffer. It is obsoleted by getpwuid().}}
|
/external/gtest/scripts/ |
gtest-config.in | 214 # TODO(chandlerc@google.com): This is a dangerous dependency on libtool, we
|
/external/libpng/contrib/visupng/ |
cexcept.h | 59 be dangerous for multiple threads to access the same context.
|
/external/oprofile/module/ia64/ |
op_syscalls.c | 314 /* this looks UP-dangerous, as the exit sleeps and we don't
|
/external/protobuf/gtest/scripts/ |
gtest-config.in | 214 # TODO(chandlerc@google.com): This is a dangerous dependency on libtool, we
|
/external/quake/quake/src/WinQuake/ |
quakedef.h | 215 // Use for multiplayer testing only - VERY dangerous!!!
|
/frameworks/base/core/java/android/app/ |
FragmentTransaction.java | 252 * activity's state is saved. This is dangerous because the commit can
|
/frameworks/support/v4/java/android/support/v4/app/ |
FragmentTransaction.java | 266 * activity's state is saved. This is dangerous because the commit can
|
/libcore/luni/src/main/java/java/security/ |
SecureRandom.java | 59 * <p>It is dangerous to seed {@code SecureRandom} with the current time because
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/ |
BinaryDictionaryGetter.java | 139 * named like the locale, except it will also escape characters that look dangerous
|
/development/samples/ApiDemos/src/com/example/android/apis/app/ |
DeviceAdminSample.java | 217 * This is dangerous, so we prevent automated tests from doing it, and we [all...] |
/external/chromium/chrome/browser/automation/ |
automation_provider.cc | 244 safety_state_to_string[DownloadItem::DANGEROUS] = std::string("DANGEROUS"); [all...] |
/external/chromium/chrome/browser/resources/ |
active_downloads.html | 296 state: (id % 2 ? 'DANGEROUS' : 'COMPLETE'), 683 } else if (result.state == 'DANGEROUS') {
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_service_browsertest.cc | 374 const char kMalwareFile[] = "files/downloads/dangerous/dangerous.exe";
|
/frameworks/base/docs/html/guide/practices/ |
security.jd | 442 as application performing the permission check. If you create a Dangerous 446 <p>If you create a Dangerous permission, there are a number of complexities 459 developer, which is why we discourage the use of Dangerous permission.</p> [all...] |
/development/samples/ApiDemos/src/com/example/android/apis/ |
Shakespeare.java | 163 "Plots have I laid, inductions dangerous," +
|
/development/samples/ApiDemos/src/com/example/android/apis/view/ |
List6.java | 284 "Plots have I laid, inductions dangerous," +
|
/development/samples/Support13Demos/src/com/example/android/supportv13/ |
Shakespeare.java | 163 "Plots have I laid, inductions dangerous," +
|
/development/samples/Support4Demos/src/com/example/android/supportv4/ |
Shakespeare.java | 163 "Plots have I laid, inductions dangerous," +
|
/external/chromium/base/ |
basictypes.h | 41 // NOTE: unsigned types are DANGEROUS in loops and other arithmetical
|
/external/chromium/chrome/browser/ |
chrome_browser_application_mac.mm | 248 // This might be a bit annoying, but it's not dangerous in any way.
|