/openbsd/gnu/usr.bin/perl/cpan/Test2-Suite/t/modules/Compare/ |
H A D | Set.t | 7 is($one->checks, [], "default to empty list of checks"); 14 is($one->checks, ['a', 'b'], "specified checks"); 48 my $one = $CLASS->new(checks => ['a']); 53 $one->checks, 55 "Added the checks" 66 "No checks defined for set\n", 67 "Need checks list" 74 "No checks defined for set\n", 75 "Need checks in list" 83 "Need checks list, have file+line" [all …]
|
/openbsd/gnu/llvm/llvm/docs/ |
H A D | FaultMaps.rst | 2 FaultMaps and implicit checks 12 Code generated by managed language runtimes tend to have checks that 16 exploited by folding such safety checks into operations that can be 20 For example, Java requires null checks on objects before they are read 31 Information about implicit checks generated by LLVM are put in a 101 ``-enable-implicit-null-checks`` is passed to ``llc``. 109 Making null checks implicit is an aggressive optimization, and it can 112 ensure that only a negligible number of implicit null checks actually 114 of doing this is by healing failed implicit null checks into explicit 115 null checks via code patching or recompilation. It follows that there [all …]
|
/openbsd/regress/lib/libc/netdb/ |
H A D | netdb.c | 55 checks(int n, struct servent *s, int port, const char *proto, in checks() function 151 checks(7, s, 6, "ddp", "zip", (char *)NULL); in main() 154 checks(8, s, 43, "tcp", "whois", "nicname", (char *)NULL); in main() 157 checks(9, s, 42, "tcp", "nameserver", "name", (char *)NULL); in main() 163 checks(10, &servent, 6, "ddp", "zip", (char *)NULL); in main() 168 checks(11, &servent, 520, "udp", "route", "router", "routed", (char *)NULL); in main()
|
/openbsd/gnu/usr.bin/perl/cpan/Test2-Suite/lib/Test2/Compare/ |
H A D | Set.pm | 58 my $checks = $self->{+CHECKS}; 62 unless ($checks && @$checks) { 77 for my $check (@$checks) {
|
H A D | Bag.pm | 109 my @checks = map { $convert->($_) } @for_each; 117 for my $check (@checks) {
|
/openbsd/lib/libcrypto/bn/ |
H A D | bn_prime.c | 237 BN_is_prime_ex(const BIGNUM *a, int checks, BN_CTX *ctx_passed, BN_GENCB *cb) in BN_is_prime_ex() argument 239 return BN_is_prime_fasttest_ex(a, checks, ctx_passed, 0, cb); in BN_is_prime_ex() 246 BN_is_prime_fasttest_ex(const BIGNUM *a, int checks, BN_CTX *ctx_passed, in BN_is_prime_fasttest_ex() argument 251 if (checks < 0) in BN_is_prime_fasttest_ex() 263 if (checks == BN_prime_checks) in BN_is_prime_fasttest_ex() 264 checks = BN_prime_checks_for_size(BN_num_bits(a)); in BN_is_prime_fasttest_ex() 267 if (!bn_is_prime_bpsw(&is_prime, a, ctx_passed, checks)) in BN_is_prime_fasttest_ex()
|
/openbsd/usr.bin/openssl/ |
H A D | prime.c | 61 int checks; member 80 .opt.value = &cfg.checks, 129 cfg.checks = 20; in prime_main() 185 is_prime = BN_is_prime_ex(bn, cfg.checks, NULL, NULL); in prime_main()
|
/openbsd/gnu/llvm/clang/docs/ |
H A D | UndefinedBehaviorSanitizer.rst | 22 See the full list of available :ref:`checks <ubsan-checks>` below. 52 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan, 74 .. _ubsan-checks: 76 Available checks 79 Available checks are: 142 invalid pointers. These checks are made in terms of 163 This includes all the checks covered by ``-ftrapv``, as well as checks for 188 of checks. 266 You disable UBSan checks for particular functions with 311 most of UBSan checks are recoverable by default. [all …]
|
H A D | ControlFlowIntegrity.rst | 28 To allow the checks to be implemented efficiently, the program must 33 The compiler will only produce CFI checks for a class if it can infer hidden 41 CFI checks for classes without visibility attributes. Most users will want 57 - ``-fsanitize=cfi-cast-strict``: Enables :ref:`strict cast checks 129 This scheme checks that pointer casts are made to an object of the correct 131 of the pointee type of the cast. The checks are currently only introduced 165 This scheme checks that non-virtual calls take place using an object of 168 call. The checks are currently only introduced where the object is of a 325 This scheme checks that indirect calls via a member function pointer 369 # Disable only unrelated cast checks for this function [all …]
|
H A D | SanitizerSpecialCaseList.rst | 19 or :doc:`MemorySanitizer` may want to disable or alter some checks for 75 # Turn off checks for the source file (use absolute path or path relative 78 # Turn off checks for this main file, including files included by it. 81 # Turn off checks for a particular functions (use mangled names):
|
/openbsd/gnu/llvm/libcxx/docs/DesignDocs/ |
H A D | DebugMode.rst | 13 Libc++ provides a debug mode that enables special debugging checks meant to detect 14 incorrect usage of the standard library. These checks are disabled by default, but 28 The debug mode provides various checks to aid application debugging. 30 Comparator consistency checks 32 Libc++ provides some checks for the consistency of comparators passed to algorithms. Specifically,
|
/openbsd/gnu/usr.bin/perl/cpan/Test-Simple/lib/Test/Builder/ |
H A D | Tester.pm | 504 my @checks = @_; 505 foreach my $check (@checks) { 539 my @checks = @{ $self->{wanted} }; 541 foreach my $check (@checks) {
|
/openbsd/gnu/usr.bin/perl/cpan/Test2-Suite/t/regression/ |
H A D | 289-compare-array-bounds.t | 21 # Set checks that apply to all items. Can be done multiple times, and 22 # each call can define multiple checks, all will be run.
|
/openbsd/gnu/llvm/clang/utils/check_cfc/ |
H A D | check_cfc.py | 319 checks = [cls.__name__ for cls in vars()['WrapperCheck'].__subclasses__()] variable 321 for c in checks: 344 for check_name in checks 379 for check_name in checks:
|
/openbsd/gnu/llvm/libcxxabi/cmake/ |
H A D | config-ix.cmake | 18 # otherwise -nodefaultlibs is used. We want all our checks to also 20 # the flags we think we require during configuration (if the checks are 24 # configuration checks to avoid spurious link errors.
|
/openbsd/gnu/llvm/lldb/cmake/modules/ |
H A D | LLDBGenerateConfig.cmake | 1 # This file contains all the logic for running configure-time checks 24 # These checks exist in LLVM's configuration, so I want to match the LLVM names
|
/openbsd/gnu/llvm/libunwind/cmake/ |
H A D | config-ix.cmake | 26 # otherwise -nodefaultlibs is used. We want all our checks to also 28 # the flags we think we require during configuration (if the checks are 32 # configuration checks to avoid spurious link errors.
|
/openbsd/gnu/gcc/gcc/config/s390/ |
H A D | s390-modes.def | 71 Test under mask checks 105 The simple cases are checks whether all masked bits are zero or ones: 111 Using two extra modes makes it possible to do complete checks on two bits of an 132 These modes represent the result of overflow checks. 138 another or whenever manual overflow checks like the examples above are
|
/openbsd/lib/libkeynote/ |
H A D | HOWTO.add.crypto | 22 - In keynote_get_sig_algorithm(), add code that checks whether a 66 - Add the necessary checks in keynote_sign_assertion() for handling 69 - Add the necessary checks in keynote-keygen.c for handling the
|
/openbsd/gnu/llvm/llvm/include/llvm/Config/ |
H A D | abi-breaking.h.cmake | 15 /* Define to enable checks that alter the LLVM C++ ABI */ 35 // FIXME: Implement checks without weak.
|
/openbsd/gnu/llvm/libcxx/cmake/ |
H A D | config-ix.cmake | 38 # otherwise -nodefaultlibs is used. We want all our checks to also 40 # the flags we think we require during configuration (if the checks are 44 # configuration checks to avoid spurious link errors.
|
/openbsd/gnu/llvm/llvm/utils/gn/ |
H A D | README.rst | 103 configure is used for three classes of feature checks: 105 - compiler checks. In GN, these could use exec_script to identify the host 113 the checks and not the code, but in practice a) new os's / compilers are rare 117 - library checks. For e.g. like zlib, GN thinks it's better to say "we require 122 - header checks (does system header X exist). These are generally not needed
|
/openbsd/regress/usr.bin/make/ |
H A D | mk28 | 2 # checks that hex constants evaluate correctly
|
/openbsd/gnu/llvm/llvm/utils/lit/tests/Inputs/shtest-format/external_shell/ |
H A D | fail_with_control_chars.txt | 2 # This tests checks that the xunit output correctly escapes them in the XML.
|
/openbsd/gnu/llvm/llvm/utils/gn/secondary/clang-tools-extra/clang-tidy/plugin/ |
H A D | BUILD.gn | 6 "//clang-tools-extra/clang-tidy:all-checks",
|