/netbsd-src/external/mit/lua/dist/src/ |
H A D | lutf8lib.c | 134 lua_Integer pose = u_posrelat(luaL_optinteger(L, 3, posi), len); in codepoint() local 139 luaL_argcheck(L, pose <= (lua_Integer)len, 3, "out of bounds"); in codepoint() 140 if (posi > pose) return 0; /* empty interval; return no values */ in codepoint() 141 if (pose - posi >= INT_MAX) /* (lua_Integer -> int) overflow? */ in codepoint() 143 n = (int)(pose - posi) + 1; /* upper bound for number of returns */ in codepoint() 146 se = s + pose; /* string end */ in codepoint()
|
H A D | lstrlib.c | 186 size_t pose = getendpos(L, 3, pi, l); in str_byte() local 188 if (posi > pose) return 0; /* empty interval; return no values */ in str_byte() 189 if (l_unlikely(pose - posi >= (size_t)INT_MAX)) /* arithmetic overflow? */ in str_byte() 191 n = (int)(pose - posi) + 1; in str_byte()
|
/netbsd-src/sys/arch/macppc/conf/ |
H A D | std.macppc | 20 # some *Books have both ADB keyboards and Bluetooth modules which pose as USB 22 # pose as a USB keyboard
|
/netbsd-src/doc/roadmaps/ |
H A D | security | 48 not expressive enough to pose serious barriers to spyware, and too
|
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/builtins/ |
H A D | fp_extend_impl.inc | 24 // are available on the target platform; this may pose a problem when trying
|
H A D | fp_trunc_impl.inc | 27 // are available on the target platform; this may pose a problem when trying
|
/netbsd-src/external/apache2/llvm/dist/llvm/docs/ |
H A D | Lexicon.rst | 86 derived pointers pose an additional hazard that they may be invalidated at
|
H A D | LoopTerminology.rst | 469 this analogy is only used as an example and does not pose any strict
|
H A D | GarbageCollection.rst | 738 | \* Derived pointers only pose a hasard to copying collections. |
|
H A D | SpeculativeLoadHardening.md | 466 Indirect calls (and returns in the absence of a red zone ABI) pose the most
|
/netbsd-src/external/bsd/top/dist/ |
H A D | Porting | 123 top may pose a security risk.
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_CTX_dane_enable.pod | 214 * disable the checks unless "unknown key share" attacks pose no risk for
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/engine/ |
H A D | README.md | 167 Cleanup - the registration and unregistration may pose questions about how
|
/netbsd-src/lib/libc/softfloat/ |
H A D | softfloat-source.txt | 336 pose no difficulties once `softfloat.o' exists. The supplied makefile
|
/netbsd-src/external/ibm-public/postfix/dist/ |
H A D | RELEASE_NOTES-2.8 | 216 proves to pose a security risk, or introduces an unexpected
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_CTX_dane_enable.pod | 214 * disable the checks unless "unknown key share" attacks pose no risk for
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/engine/ |
H A D | README | 167 Cleanup - the registration and unregistration may pose questions about how
|
/netbsd-src/bin/sh/ |
H A D | TOUR | 85 pose of EXSHELLPROC is to perform the cleanup actions associated
|
/netbsd-src/external/gpl3/gcc.old/dist/libiberty/ |
H A D | copying-lib.texi | 65 Finally, software patents pose a constant threat to the existence of
|
/netbsd-src/external/gpl3/gcc/dist/libiberty/ |
H A D | copying-lib.texi | 65 Finally, software patents pose a constant threat to the existence of
|
/netbsd-src/external/gpl3/binutils.old/dist/libiberty/ |
H A D | copying-lib.texi | 65 Finally, software patents pose a constant threat to the existence of
|
/netbsd-src/external/gpl3/binutils/dist/libiberty/ |
H A D | copying-lib.texi | 65 Finally, software patents pose a constant threat to the existence of
|
/netbsd-src/external/gpl2/gettext/dist/gettext-runtime/intl/ |
H A D | COPYING.LIB-2.1 | 61 Finally, software patents pose a constant threat to the existence of
|
/netbsd-src/external/gpl2/gettext/dist/gettext-tools/doc/ |
H A D | lgpl.texi | 65 Finally, software patents pose a constant threat to the existence of
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-cmp.pod.in | 588 of a trusted PKI hierarchy to fraudulently pose as a CMP server.
|