Searched refs:discovered (Results 1 – 25 of 66) sorted by relevance
123
/external/pcre/dist2/ |
D | ChangeLog | 203 discovered by Karl Skomski with the LLVM fuzzer. 211 overflow. This bug was discovered by Karl Skomski with the LLVM fuzzer. 226 provoke a buffer overflow. This bug was discovered by Karl Skomski with the 235 first of these bugs was discovered by Karl Skomski with the LLVM fuzzer. 249 diagnostic. This bug was discovered by Karl Skomski with the LLVM fuzzer. 254 This bug was discovered by Karl Skomski with the LLVM fuzzer. 278 (?(R<digits>). This omission was discovered by Karl Skomski with the LLVM 580 error. This bug was discovered by the LLVM fuzzer. 588 discovered by the LLVM fuzzer. 598 optimization. This infelicity was discovered by the LLVM fuzzer. [all …]
|
D | NEWS | 30 strange pattern input, and were discovered by fuzzers. Some others were 31 discovered by code auditing. See ChangeLog for details. 84 6. Bugs have been mended, many of them discovered by fuzzers.
|
/external/okhttp/okio/ |
D | BUG-BOUNTY.md | 8 If you believe you have discovered a security vulnerability, please follow the
|
/external/okhttp/ |
D | BUG-BOUNTY.md | 8 If you believe you have discovered a security vulnerability, please follow the
|
/external/autotest/client/site_tests/peerd_DiscoverServices/ |
D | control | 14 to appear in peerd as they are discovered.
|
/external/autotest/server/site_tests/bluetooth_Sanity_Discoverable/ |
D | control | 14 Verify that the device can be discovered from another Bluetooth device.
|
D | control.manual | 13 Verify that the device can be discovered from another Bluetooth device.
|
/external/valgrind/memcheck/tests/ |
D | descr_belowsp.stderr.exp | 15 describing 0x........ discovered address giving SEGV in thread stack
|
/external/llvm/docs/CommandGuide/ |
D | lit.rst | 165 List the discovered test suites and exit. 169 List all of the discovered tests and exit. 270 initially discovered by recursively searching up the directory hierarchy for 272 :option:`--show-suites` to display the discovered test suites at startup. 274 Once a test suite is discovered, its config file is loaded. Config files
|
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/data/unicode/ |
D | NormalizationCorrections.txt | 17 # mapping may be discovered that is truly just an unintended
|
/external/icu/icu4c/source/data/unidata/ |
D | NormalizationCorrections.txt | 17 # mapping may be discovered that is truly just an unintended
|
/external/icu/android_icu4j/src/main/tests/android/icu/dev/data/unicode/ |
D | NormalizationCorrections.txt | 17 # mapping may be discovered that is truly just an unintended
|
/external/swiftshader/third_party/LLVM/docs/CommandGuide/ |
D | lit.pod | 146 List the discovered test suites as part of the standard output. 251 discovered by recursively searching up the directory hierarchy for all the input 253 discovered test suites at startup. 255 Once a test suite is discovered, its config file is loaded. Config files
|
/external/llvm/test/Analysis/LoopAccessAnalysis/ |
D | forward-loop-independent.ll | 4 ; Check that loop-indepedent forward dependences are discovered properly.
|
/external/libpng/contrib/mips-msa/ |
D | README | 37 performed test builds and bugs are fixed when discovered.
|
/external/llvm/lib/Fuzzer/ |
D | FuzzerFlags.def | 53 " discovered by other processes.")
|
/external/libpng/contrib/arm-neon/ |
D | README | 37 performed test builds and bugs are fixed when discovered.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | README-P2P | 156 Start P2P group formation with a discovered P2P peer. This includes 376 for wildcard query that is sent to every discovered P2P peer that 383 discovery protocols and requests this to be sent to all discovered 751 p2p_peers [discovered] 754 "discovered" parameter filters out the peers that we have not fully 755 discovered, i.e., which we have only seen in a received Probe Request
|
D | wpa_cli.c | 2286 int discovered) in wpa_ctrl_command_p2p_peer() argument 2314 if (!discovered || os_strstr(pos, "[PROBE_REQ_ONLY]") == NULL) in wpa_ctrl_command_p2p_peer() 2323 int discovered; in wpa_cli_cmd_p2p_peers() local 2325 discovered = argc > 0 && os_strcmp(argv[0], "discovered") == 0; in wpa_cli_cmd_p2p_peers() 2328 addr, sizeof(addr), discovered)) in wpa_cli_cmd_p2p_peers() 2333 discovered) == 0); in wpa_cli_cmd_p2p_peers()
|
D | README-WPS | 255 - if run again while ER is active, the stored information (discovered APs 292 - WPS ER discovered an AP 302 - WPS ER discovered a new Enrollee
|
/external/syslinux/doc/ |
D | memdisk.txt | 268 structure. For each hook discovered, a vendor can be identified and the OS 297 discovered. Looking at their associated "safe hook" structure will
|
/external/squashfs-tools/ |
D | ACKNOWLEDGEMENTS | 52 Junjiro Okajima discovered a couple of SMP issues, thanks.
|
/external/antlr/antlr-3.4/runtime/Ruby/ |
D | History.txt | 75 - discovered and fixed a rare but serious bug in the way the output code evaluates
|
/external/libpng/contrib/pngminus/ |
D | README | 21 (Willem van Schaik) started such a project. Luckily we discovered this
|
/external/libunwind/ |
D | NEWS | 163 (and floating-point NaT values) and all discovered/known bugs have
|
123