/external/chromium/net/base/ |
network_delegate.h | 21 // levels, we may encounter dangerous casting issues.
|
/external/icu4c/common/ |
uenum.c | 65 } else { /* this seems dangerous, but we better kill the object */
|
/external/srec/seti/setiUtils/src/ |
platform_utils.c | 33 Use this in place of regular strtok. which is dangerous because it modifies
|
/external/valgrind/main/include/ |
pub_tool_signals.h | 35 // wanders around dangerous memory (ie, leakcheck). The catcher is
|
pub_tool_xarray.h | 129 This is dangerous in the sense that there's no range or 130 anything-else checking. It's also dangerous in that if
|
/ndk/build/core/ |
default-build-commands.mk | 72 # It is thus safe to use --strip-unneeded, which is only dangerous
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
serial.h | 105 * checks. Note: can be dangerous! */
|
/external/chromium/chrome/browser/ui/webui/ |
downloads_dom_handler.cc | 132 } else if (download->safety_state() == DownloadItem::DANGEROUS) { 133 // We need to be notified when the user validates the dangerous download.
|
active_downloads_ui.cc | 320 // Observe in progress and dangerous downloads. 322 item->safety_state() == DownloadItem::DANGEROUS) {
|
/external/ipsec-tools/src/racoon/doc/ |
README.privsep | 18 able to alter security associations on other hosts in disruptive or dangerous 20 in its current form generate_policy is itself dangerous and requires that you
|
/external/chromium/chrome/browser/ui/gtk/download/ |
download_item_gtk.cc | 46 // Padding on left and right of items in dangerous download prompt. 375 // Turns out the file path is "Unconfirmed %d.crdownload" for dangerous 494 return get_download()->safety_state() == DownloadItem::DANGEROUS; 607 // The dangerous download label text is different for different cases. 613 // It's a dangerous file type (e.g.: an executable). [all...] |
/external/chromium/chrome/browser/download/ |
download_manager.h | 107 // in-progress (including dangerous downloads waiting for user confirmation). 139 // (Dangerous downloads still may block on user acceptance after this 234 // Called when the user has validated the download of a dangerous file.
|
download_manager_unittest.cc | 177 // Dangerous download (file is dangerous or download URL is not safe or both), 190 // Dangerous download, download finishes AFTER file name determined.
|
download_util.h | 54 // Return true if the |download_path| is dangerous path. 266 // Returns true if this download should show the "dangerous file" warning.
|
download_prefs.cc | 67 // If the download path is dangerous we forcefully reset it. But if we do
|
/external/chromium/chrome/browser/resources/ |
filebrowse.html | 561 .downloading[dangerous] > * > .icon { 1147 element.removeAttribute('dangerous'); 1161 element.removeAttribute('dangerous'); 1280 if (result.percent < 100 || result.state == 'DANGEROUS') { 1297 if (result.state == 'DANGEROUS') { 1298 element.setAttribute('dangerous', 'true'); 1335 result.state != 'DANGEROUS') { 1350 // Dangerous download. [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 108 //this could be dangerous, as ASN.1 decoding/encoding
|
/external/chromium/base/i18n/ |
file_util_icu.cc | 51 // some printable ASCII characters regarded as dangerous ('"*/:<>?\\').
|
/external/chromium/chrome/browser/renderer_host/ |
safe_browsing_resource_handler.h | 39 // dangerous, a warning page is thrown up and the request remains suspended.
|
/external/chromium/chrome/common/extensions/docs/static/ |
xhr.html | 99 scripting</a>. Specifically, avoid using dangerous APIs such as the below:
|
/external/chromium/net/url_request/ |
url_request_test_job.cc | 19 // this is only test code, it's probably not too dangerous to have this static
|
/external/jpeg/ |
jdatadst.c | 136 * This makes it dangerous to use this manager and a different destination
|
/external/llvm/include/llvm/Support/ |
ErrorHandling.h | 41 /// It is dangerous to naively use an error handler which throws an exception.
|
/external/llvm/tools/llvm-as/ |
llvm-as.cpp | 51 cl::desc("Do not run verifier on input LLVM (dangerous!)"));
|
/external/qemu/block/ |
raw.c | 62 /* scrub the dangerous signature */
|