/dports/security/modsecurity3-apache/ModSecurity-apache-0.0.9-beta1-20-gf692ea99/t/ |
H A D | simple-block.t | 10 my $res = GET "/index.html?evil=evil"; 13 my $res1 = GET "/block-evil-1/evil?evil=evil"; 15 my $res2 = GET "/block-evil-2/evil?evil=evil"; 17 my $res3 = GET "/block-evil-3/evil?evil=evil"; 19 my $res4 = GET "/block-evil-4/evil?evil=evil"; 23 my $res5 = GET "/block-evil-5/evil?evil=evil"; 27 my $res1l = GET "/block-evil-1-loc/evil?evil=evil"; 29 my $res2l = GET "/block-evil-2-loc/evil?evil=evil"; 31 my $res3l = GET "/block-evil-3-loc/evil?evil=evil"; 33 my $res4l = GET "/block-evil-4-loc/evil?evil=evil"; [all …]
|
/dports/security/modsecurity3-apache/ModSecurity-apache-0.0.9-beta1-20-gf692ea99/t/conf/ |
H A D | extra.conf.in | 18 <Directory "@ServerRoot@/htdocs/block-evil-1"> 22 <Directory "@ServerRoot@/htdocs/block-evil-2"> 24 modsecurity_rules 'SecRule ARGS "evil" "phase:2,id:112,log,status:403,block,deny"' 27 <Directory "@ServerRoot@/htdocs/block-evil-3"> 31 <Directory "@ServerRoot@/htdocs/block-evil-4"> 36 <Directory "@ServerRoot@/htdocs/block-evil-5"> 42 <Location "/block-evil-1-loc"> 46 <Location "/block-evil-2-loc"> 51 <Location "/block-evil-3-loc"> 55 <Location "/block-evil-4-loc"> [all …]
|
/dports/games/freedink-data/freedink-data-1.08.20170409/dink/Story/ |
H A D | S2-CAVE2.c | 11 int &evil; in main() local 25 sp_brain(&evil, 0); in main() 26 sp_base_walk(&evil, 300); in main() 27 sp_speed(&evil, 1); in main() 28 sp_timing(&evil, 0); in main() 30 sp_pseq(&evil, 303); in main() 31 sp_pframe(&evil, 1); in main() 59 move(&evil, 6, 100, 1); in main() 80 say_stop("`4I am!!", &evil); in main() 116 move(&evil, 4, -20, 1); in main() [all …]
|
H A D | S3-1ST.c | 13 int &evil; in main() local 19 sp_brain(&evil, 0); in main() 20 sp_base_walk(&evil, 300); in main() 21 sp_speed(&evil, 1); in main() 22 sp_timing(&evil, 0); in main() 24 sp_pseq(&evil, 303); in main() 25 sp_pframe(&evil, 1); in main() 53 move(&evil, 3, 110, 1); in main() 59 move(&evil, 1, 115, 1); in main() 78 move(&evil, 4, -20, 1); in main() [all …]
|
H A D | S3-CAMPS.c | 11 int &evil; in main() local 17 sp_brain(&evil, 0); in main() 18 sp_base_walk(&evil, 300); in main() 19 sp_speed(&evil, 1); in main() 20 sp_timing(&evil, 0); in main() 22 sp_pseq(&evil, 303); in main() 23 sp_pframe(&evil, 1); in main() 66 move(&evil, 2, 120, 1); in main() 73 say("`4Not so fast ...", &evil); in main() 93 move_stop(&evil, 8, -30, 1); in main() [all …]
|
H A D | S3-CAMP.c | 15 int &evil; in main() local 21 &evil = create_sprite(350, 280, 0, 0, 0); in main() 22 sp_brain(&evil, 0); in main() 23 sp_base_walk(&evil, 300); in main() 24 sp_speed(&evil, 1); in main() 25 sp_timing(&evil, 0); in main() 27 sp_pseq(&evil, 303); in main() 28 sp_pframe(&evil, 1); in main() 39 move(&evil, 6, 660, 1); in main()
|
/dports/www/gohugo/hugo-0.91.2/vendor/github.com/miekg/mmark/rfc/ |
H A D | rfc3514.md | 46 we define a security flag, known as the "evil" bit, in the IPv4 73 : If the bit is set to 0, the packet has no evil intent. Hosts, 80 : If the bit is set to 1, the packet has evil intent. Secure 98 set. If a packet with the evil bit set is fragmented by an 105 to a target SHOULD have the evil bit set. 116 the evil bit on their reply packets to the innocent client host. 127 evil bit set. Packets with the evil bit off **MUST NOT** be dropped. 133 bit. If the evil bit is set, a suitable random number generator 154 Although this document only defines the IPv4 evil bit, there are 168 link-layer scheme **MUST** be used to denote evil. This may involve evil [all …]
|
/dports/mail/p5-MIME-Tools/MIME-tools-5.509/t/ |
H A D | Filer.t | 31 my %evil = ( 42 foreach my $name (keys %evil) { 46 while( my ($evil, $clean) = each %evil ) { 47 is( $filer->exorcise_filename( $evil), $clean, "$evil was exorcised");
|
/dports/www/mod_php80/php-8.0.15/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/www/mod_php81/php-8.1.1/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/lang/php73/php-7.3.33/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/lang/php74/php-7.4.27/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/lang/php81/php-8.1.1/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/lang/php80/php-8.0.15/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/www/mod_php73/php-7.3.33/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/www/mod_php74/php-7.4.27/tests/basic/ |
H A D | bug79699.phpt | 7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar 14 ["__%48ost-evil"]=> 15 string(4) "evil" 16 ["__Host-evil"]=>
|
/dports/net-mgmt/glpi-plugins-fusioninventory-server/fusioninventory-for-glpi-glpi090-1.5/lib/mustache.js-2.0.0/test/_files/ |
H A D | malicious_template.mustache | 1 {{"+(function () {throw "evil"})()+"}} 2 {{{"+(function () {throw "evil"})()+"}}} 3 {{> "+(function () {throw "evil"})()+"}} 4 {{# "+(function () {throw "evil"})()+"}} 5 {{/ "+(function () {throw "evil"})()+"}}
|
/dports/www/p5-CGI-Simple/CGI-Simple-1.24/t/ |
H A D | headers.t | 21 -type => "text/html" . $cgi->crlf . "evil: stuff" ), 22 qr#Type: text/html evil: stuff#, 'known header'; 27 -type => "text/html" . $cgi->crlf . " evil: stuff " ), 28 qr#Content-Type: text/html evil: stuff#, 33 -foobar => "text/html" . $cgi->crlf . "evil: stuff" ), 42 like $cgi->header( -foobar => "Content-type: evil/header" ), 43 qr#^Foobar: Content-type: evil/header#m, 48 -type => "text/html" . $cgi->crlf . "evil: stuff" ), 59 -foobar => "text/html" . $cgi->crlf . "evil: stuff" ),
|
/dports/lang/scheme48/scheme48-1.9.2/scheme/debug/ |
H A D | mini-eval.scm | 9 (evil form package)) 11 (define (evil exp env) 19 (evil (if (evil (cadr exp) env) 29 ((env '%%define%%) lhs (evil rhs env)))) 31 (apply (evil (car exp) env) 32 (map (lambda (arg) (evil arg env)) (cdr exp)))))) 36 (evil (car exp-list) env) 37 (begin (evil (car exp-list) env)
|
/dports/finance/moneymanagerex/moneymanagerex-1.2.7/3rd/cgitemplate/t/ |
H A D | if4.tmpl | 2 evil 10 evil 16 evil 36 evil 39 evil
|
/dports/lang/php73/php-7.3.33/ext/standard/tests/serialize/ |
H A D | bug70213.phpt | 6 ini_set('unserialize_callback_func', 'evil'); 8 function evil() { 14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}')); 21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d 28 string(4) "evil"
|
/dports/www/mod_php81/php-8.1.1/ext/standard/tests/serialize/ |
H A D | bug70213.phpt | 6 ini_set('unserialize_callback_func', 'evil'); 8 function evil() { 14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}')); 21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d 28 string(4) "evil"
|
/dports/lang/php80/php-8.0.15/ext/standard/tests/serialize/ |
H A D | bug70213.phpt | 6 ini_set('unserialize_callback_func', 'evil'); 8 function evil() { 14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}')); 21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d 28 string(4) "evil"
|
/dports/lang/php74/php-7.4.27/ext/standard/tests/serialize/ |
H A D | bug70213.phpt | 6 ini_set('unserialize_callback_func', 'evil'); 8 function evil() { 14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}')); 21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d 28 string(4) "evil"
|
/dports/lang/php81/php-8.1.1/ext/standard/tests/serialize/ |
H A D | bug70213.phpt | 6 ini_set('unserialize_callback_func', 'evil'); 8 function evil() { 14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}')); 21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d 28 string(4) "evil"
|