Home
last modified time | relevance | path

Searched refs:evil (Results 1 – 25 of 3515) sorted by relevance

12345678910>>...141

/dports/security/modsecurity3-apache/ModSecurity-apache-0.0.9-beta1-20-gf692ea99/t/
H A Dsimple-block.t10 my $res = GET "/index.html?evil=evil";
13 my $res1 = GET "/block-evil-1/evil?evil=evil";
15 my $res2 = GET "/block-evil-2/evil?evil=evil";
17 my $res3 = GET "/block-evil-3/evil?evil=evil";
19 my $res4 = GET "/block-evil-4/evil?evil=evil";
23 my $res5 = GET "/block-evil-5/evil?evil=evil";
27 my $res1l = GET "/block-evil-1-loc/evil?evil=evil";
29 my $res2l = GET "/block-evil-2-loc/evil?evil=evil";
31 my $res3l = GET "/block-evil-3-loc/evil?evil=evil";
33 my $res4l = GET "/block-evil-4-loc/evil?evil=evil";
[all …]
/dports/security/modsecurity3-apache/ModSecurity-apache-0.0.9-beta1-20-gf692ea99/t/conf/
H A Dextra.conf.in18 <Directory "@ServerRoot@/htdocs/block-evil-1">
22 <Directory "@ServerRoot@/htdocs/block-evil-2">
24 modsecurity_rules 'SecRule ARGS "evil" "phase:2,id:112,log,status:403,block,deny"'
27 <Directory "@ServerRoot@/htdocs/block-evil-3">
31 <Directory "@ServerRoot@/htdocs/block-evil-4">
36 <Directory "@ServerRoot@/htdocs/block-evil-5">
42 <Location "/block-evil-1-loc">
46 <Location "/block-evil-2-loc">
51 <Location "/block-evil-3-loc">
55 <Location "/block-evil-4-loc">
[all …]
/dports/games/freedink-data/freedink-data-1.08.20170409/dink/Story/
H A DS2-CAVE2.c11 int &evil; in main() local
25 sp_brain(&evil, 0); in main()
26 sp_base_walk(&evil, 300); in main()
27 sp_speed(&evil, 1); in main()
28 sp_timing(&evil, 0); in main()
30 sp_pseq(&evil, 303); in main()
31 sp_pframe(&evil, 1); in main()
59 move(&evil, 6, 100, 1); in main()
80 say_stop("`4I am!!", &evil); in main()
116 move(&evil, 4, -20, 1); in main()
[all …]
H A DS3-1ST.c13 int &evil; in main() local
19 sp_brain(&evil, 0); in main()
20 sp_base_walk(&evil, 300); in main()
21 sp_speed(&evil, 1); in main()
22 sp_timing(&evil, 0); in main()
24 sp_pseq(&evil, 303); in main()
25 sp_pframe(&evil, 1); in main()
53 move(&evil, 3, 110, 1); in main()
59 move(&evil, 1, 115, 1); in main()
78 move(&evil, 4, -20, 1); in main()
[all …]
H A DS3-CAMPS.c11 int &evil; in main() local
17 sp_brain(&evil, 0); in main()
18 sp_base_walk(&evil, 300); in main()
19 sp_speed(&evil, 1); in main()
20 sp_timing(&evil, 0); in main()
22 sp_pseq(&evil, 303); in main()
23 sp_pframe(&evil, 1); in main()
66 move(&evil, 2, 120, 1); in main()
73 say("`4Not so fast ...", &evil); in main()
93 move_stop(&evil, 8, -30, 1); in main()
[all …]
H A DS3-CAMP.c15 int &evil; in main() local
21 &evil = create_sprite(350, 280, 0, 0, 0); in main()
22 sp_brain(&evil, 0); in main()
23 sp_base_walk(&evil, 300); in main()
24 sp_speed(&evil, 1); in main()
25 sp_timing(&evil, 0); in main()
27 sp_pseq(&evil, 303); in main()
28 sp_pframe(&evil, 1); in main()
39 move(&evil, 6, 660, 1); in main()
/dports/www/gohugo/hugo-0.91.2/vendor/github.com/miekg/mmark/rfc/
H A Drfc3514.md46 we define a security flag, known as the "evil" bit, in the IPv4
73 : If the bit is set to 0, the packet has no evil intent. Hosts,
80 : If the bit is set to 1, the packet has evil intent. Secure
98 set. If a packet with the evil bit set is fragmented by an
105 to a target SHOULD have the evil bit set.
116 the evil bit on their reply packets to the innocent client host.
127 evil bit set. Packets with the evil bit off **MUST NOT** be dropped.
133 bit. If the evil bit is set, a suitable random number generator
154 Although this document only defines the IPv4 evil bit, there are
168 link-layer scheme **MUST** be used to denote evil. This may involve evil
[all …]
/dports/mail/p5-MIME-Tools/MIME-tools-5.509/t/
H A DFiler.t31 my %evil = (
42 foreach my $name (keys %evil) {
46 while( my ($evil, $clean) = each %evil ) {
47 is( $filer->exorcise_filename( $evil), $clean, "$evil was exorcised");
/dports/www/mod_php80/php-8.0.15/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/www/mod_php81/php-8.1.1/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/lang/php73/php-7.3.33/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/lang/php74/php-7.4.27/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/lang/php81/php-8.1.1/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/lang/php80/php-8.0.15/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/www/mod_php73/php-7.3.33/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/www/mod_php74/php-7.4.27/tests/basic/
H A Dbug79699.phpt7 __%48ost-evil=evil; __Host-evil=good; %66oo=baz;foo=bar
14 ["__%48ost-evil"]=>
15 string(4) "evil"
16 ["__Host-evil"]=>
/dports/net-mgmt/glpi-plugins-fusioninventory-server/fusioninventory-for-glpi-glpi090-1.5/lib/mustache.js-2.0.0/test/_files/
H A Dmalicious_template.mustache1 {{"+(function () {throw "evil"})()+"}}
2 {{{"+(function () {throw "evil"})()+"}}}
3 {{> "+(function () {throw "evil"})()+"}}
4 {{# "+(function () {throw "evil"})()+"}}
5 {{/ "+(function () {throw "evil"})()+"}}
/dports/www/p5-CGI-Simple/CGI-Simple-1.24/t/
H A Dheaders.t21 -type => "text/html" . $cgi->crlf . "evil: stuff" ),
22 qr#Type: text/html evil: stuff#, 'known header';
27 -type => "text/html" . $cgi->crlf . " evil: stuff " ),
28 qr#Content-Type: text/html evil: stuff#,
33 -foobar => "text/html" . $cgi->crlf . "evil: stuff" ),
42 like $cgi->header( -foobar => "Content-type: evil/header" ),
43 qr#^Foobar: Content-type: evil/header#m,
48 -type => "text/html" . $cgi->crlf . "evil: stuff" ),
59 -foobar => "text/html" . $cgi->crlf . "evil: stuff" ),
/dports/lang/scheme48/scheme48-1.9.2/scheme/debug/
H A Dmini-eval.scm9 (evil form package))
11 (define (evil exp env)
19 (evil (if (evil (cadr exp) env)
29 ((env '%%define%%) lhs (evil rhs env))))
31 (apply (evil (car exp) env)
32 (map (lambda (arg) (evil arg env)) (cdr exp))))))
36 (evil (car exp-list) env)
37 (begin (evil (car exp-list) env)
/dports/finance/moneymanagerex/moneymanagerex-1.2.7/3rd/cgitemplate/t/
H A Dif4.tmpl2 evil
10 evil
16 evil
36 evil
39 evil
/dports/lang/php73/php-7.3.33/ext/standard/tests/serialize/
H A Dbug70213.phpt6 ini_set('unserialize_callback_func', 'evil');
8 function evil() {
14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));
21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
28 string(4) "evil"
/dports/www/mod_php81/php-8.1.1/ext/standard/tests/serialize/
H A Dbug70213.phpt6 ini_set('unserialize_callback_func', 'evil');
8 function evil() {
14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));
21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
28 string(4) "evil"
/dports/lang/php80/php-8.0.15/ext/standard/tests/serialize/
H A Dbug70213.phpt6 ini_set('unserialize_callback_func', 'evil');
8 function evil() {
14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));
21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
28 string(4) "evil"
/dports/lang/php74/php-7.4.27/ext/standard/tests/serialize/
H A Dbug70213.phpt6 ini_set('unserialize_callback_func', 'evil');
8 function evil() {
14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));
21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
28 string(4) "evil"
/dports/lang/php81/php-8.1.1/ext/standard/tests/serialize/
H A Dbug70213.phpt6 ini_set('unserialize_callback_func', 'evil');
8 function evil() {
14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));
21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
28 string(4) "evil"

12345678910>>...141