/third_party/ltp/tools/sparse/sparse-src/validation/ |
H A D | typeof-mods.c | 4 #define __safe __attribute__((safe))
|
/third_party/astc-encoder/Source/ |
H A D | astcenc_vecmathlib.h | 298 * @brief Normalize a vector, returning @c safe if len is zero. 300 static ASTCENC_SIMD_INLINE vfloat4 normalize_safe(vfloat4 a, vfloat4 safe) in normalize_safe() argument 308 return safe; in normalize_safe()
|
/third_party/libunwind/libunwind/doc/ |
H A D | unw_get_proc_info.tex | 92 \Func{unw\_get\_proc\_info}() is thread-safe. If cursor \Var{cp} is 93 in the local address-space, this routine is also safe to use from a
|
H A D | libunwind-ptrace.tex | 101 is thread-safe.
|
/third_party/jinja2/ |
H A D | utils.py | 411 safe = b"" if for_qs else b"/" 412 rv = quote_from_bytes(obj, safe) 631 the result safe with :class:`~markupsafe.Markup`. 637 The returned string is safe to render in HTML documents and
|
/third_party/libwebsockets/minimal-examples/api-tests/api-test-lws_struct-json/ |
H A D | main.c | 29 int safe; member 74 LSM_UNSIGNED (sai_jig_gpio_t, safe, "safe"), 123 "\"safe\": 0" 129 "\"safe\": 0"
|
/third_party/node/deps/v8/third_party/jinja2/ |
H A D | utils.py | 329 safe = b"" if for_qs else b"/" 330 rv = url_quote(obj, safe) 599 """Works exactly like :func:`dumps` but is safe for use in ``<script>`` 602 also mark the result as safe. Due to how this function escapes certain 603 characters this is safe even if used outside of ``<script>`` tags. 612 This makes it safe to embed such strings in any place in HTML with the
|
/third_party/node/tools/inspector_protocol/jinja2/ |
H A D | utils.py | 289 given charset if applicable to URL safe quoting under all rules 299 safe = not for_qs and b'/' or b'' 300 rv = text_type(url_quote(obj, safe)) 546 """Works exactly like :func:`dumps` but is safe for use in ``<script>`` 549 also mark the result as safe. Due to how this function escapes certain 550 characters this is safe even if used outside of ``<script>`` tags. 559 This makes it safe to embed such strings in any place in HTML with the
|
/third_party/ntfs-3g/libfuse-lite/ |
H A D | fusermount.c | 219 int safe; member 248 if (!mount_flags[i].safe && getuid() != 0) { in find_mount_flag()
|
/third_party/skia/third_party/externals/jinja2/ |
H A D | utils.py | 329 safe = b"" if for_qs else b"/" 330 rv = url_quote(obj, safe) 599 """Works exactly like :func:`dumps` but is safe for use in ``<script>`` 602 also mark the result as safe. Due to how this function escapes certain 603 characters this is safe even if used outside of ``<script>`` tags. 612 This makes it safe to embed such strings in any place in HTML with the
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | bn.h | 357 BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe, 379 int BN_generate_prime_ex2(BIGNUM *ret, int bits, int safe, 382 int BN_generate_prime_ex(BIGNUM *ret, int bits, int safe, const BIGNUM *add,
|
/third_party/openssl/include/openssl/ |
H A D | bn.h | 357 BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe, 379 int BN_generate_prime_ex2(BIGNUM *ret, int bits, int safe, 382 int BN_generate_prime_ex(BIGNUM *ret, int bits, int safe, const BIGNUM *add,
|
/third_party/ffmpeg/libavformat/ |
H A D | concatdec.c | 67 int safe; member 124 if (cat->safe && !safe_filename(filename)) { in add_file() 492 if ((dir->flags & NEEDS_UNSAFE) && cat->safe) { in concat_parse_script() 493 av_log(avf, AV_LOG_ERROR, "Line %d: %s not allowed if safe\n", line, keyword); in concat_parse_script() 921 { "safe", "enable safe mode", 922 OFFSET(safe), AV_OPT_TYPE_BOOL, {.i64 = 1}, 0, 1, DEC },
|
/third_party/python/Lib/test/ |
H A D | test_uuid.py | 37 safe = 0 variable in BaseTestUUID.test_safe_uuid_enum.CheckedSafeUUID 450 is_safe=self.uuid.SafeUUID.safe) 497 self.assertIn(u.is_safe, {self.uuid.SafeUUID.safe, 569 self.assertEqual(u.is_safe, self.uuid.SafeUUID.safe)
|
/third_party/curl/src/ |
H A D | tool_cb_hdr.c | 428 /* Not a "safe" URL: don't linkify it */ in write_linked_location()
|
/third_party/spirv-tools/kokoro/scripts/linux/ |
H A D | build-docker.sh | 25 # Marking the root of the repo as safe for ownership changes. 26 git config --global --add safe.directory $ROOT_DIR
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | error.rs | 242 // OpenSSL/LibreSSL they're safe. 267 // OpenSSL/LibreSSL they're safe. 314 // OpenSSL/LibreSSL they're safe.
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | bn.h | 326 DEPRECATEDIN_0_9_8(BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe, 343 int BN_generate_prime_ex(BIGNUM *ret, int bits, int safe, const BIGNUM *add,
|
/third_party/node/test/parallel/ |
H A D | test-fs-stat-bigint.js | 91 `${key} is not a safe integer, difference should < 1.\n` +
|
/third_party/node/deps/npm/node_modules/postcss-selector-parser/dist/ |
H A D | tokenize.js | 89 if (input.safe) {
|
H A D | parser.js | 99 safe: false 106 safe: this.options.safe
|
/third_party/python/Lib/email/ |
H A D | utils.py | 85 realname in case realname is not ASCII safe. Can be an instance of str or 249 s = urllib.parse.quote(s, safe='', encoding=charset or 'ascii')
|
/third_party/rust/crates/syn/src/ |
H A D | buffer.rs | 6 // is 100% safe but the implementation is fragile internally. 105 // It's safe in this situation for us to put an `Entry` object in global in empty() 106 // storage, despite it not actually being safe to send across threads in empty()
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | bn.rs | 131 safe: c_int, in BN_generate_prime_ex()
|
/third_party/ffmpeg/tests/ |
H A D | fate-run.sh | 560 run ffprobe${PROGSUF}${EXECSUF} -bitexact -show_streams -show_packets -safe 0 $extra_args $(target_path $concatfile) | tr -d '\r' > $packetfile 563 run ffprobe${PROGSUF}${EXECSUF} -bitexact -show_streams -show_packets -of compact=p=0:nk=1 -safe 0 $extra_args $(target_path $concatfile)
|