/dports/shells/fish/fish-3.3.1/tests/checks/ |
H A D | scoping.fish | 4 set -e smurf 7 set smurf green 11 set -e smurf 15 set smurf blue 17 if test $smurf = blue 25 set smurf blue 27 if test $smurf = blue 41 if test $smurf = green 50 if not set -q smurf 57 set -g smurf yellow
|
H A D | switch.fish | 73 set smurf green 75 switch $smurf 83 switch $smurf 96 switch $smurf
|
/dports/lang/php73/php-7.3.33/ext/imap/tests/ |
H A D | bug35669.phpt | 12 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 48 To: The bad smurf <bad@smurf.com>
|
/dports/mail/php74-imap/php-7.4.27/ext/imap/tests/ |
H A D | bug35669.phpt | 12 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 48 To: The bad smurf <bad@smurf.com>
|
/dports/mail/php81-imap/php-8.1.1/ext/imap/tests/ |
H A D | bug35669.phpt | 8 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 44 To: The bad smurf <bad@smurf.com>
|
/dports/mail/php73-imap/php-7.3.33/ext/imap/tests/ |
H A D | bug35669.phpt | 12 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 48 To: The bad smurf <bad@smurf.com>
|
/dports/www/mod_php81/php-8.1.1/ext/imap/tests/ |
H A D | bug35669.phpt | 8 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 44 To: The bad smurf <bad@smurf.com>
|
/dports/lang/php81/php-8.1.1/ext/imap/tests/ |
H A D | bug35669.phpt | 8 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 44 To: The bad smurf <bad@smurf.com>
|
/dports/lang/php74/php-7.4.27/ext/imap/tests/ |
H A D | bug35669.phpt | 12 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 48 To: The bad smurf <bad@smurf.com>
|
/dports/www/mod_php73/php-7.3.33/ext/imap/tests/ |
H A D | bug35669.phpt | 12 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 48 To: The bad smurf <bad@smurf.com>
|
/dports/www/mod_php74/php-7.4.27/ext/imap/tests/ |
H A D | bug35669.phpt | 12 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 48 To: The bad smurf <bad@smurf.com>
|
/dports/security/smurflog/smurflog-2.1/ |
H A D | README | 4 A program to assist in the logging of smurf attacks. 9 This program is designed to log smurf attacks and the amplifier networks. 16 Before this program, if you wanted to log the smurf broadcasts used during 18 an icmp logger, or run one continuously and pray that the smurf stopped 21 During an average smurf attack, the log files can reach sizes of 800MB or 29 and will (should) record only broadcasts used during a genuine smurf attack.
|
/dports/mail/php80-imap/php-8.0.15/ext/imap/tests/ |
H A D | bug35669.phpt | 10 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 46 To: The bad smurf <bad@smurf.com>
|
/dports/lang/php80/php-8.0.15/ext/imap/tests/ |
H A D | bug35669.phpt | 10 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 46 To: The bad smurf <bad@smurf.com>
|
/dports/www/mod_php80/php-8.0.15/ext/imap/tests/ |
H A D | bug35669.phpt | 10 $envelope["to"] = 'The bad smurf <bad@smurf.com>'; 46 To: The bad smurf <bad@smurf.com>
|
/dports/www/moodle310/moodle/mod/h5pactivity/tests/behat/ |
H A D | result_longfillin.feature | 37 And I set the field with xpath "//textarea" to "This is a smurfing smurf" 44 Then I should see "This is a smurfing smurf" 45 And I should not see "<strong>smurf</strong>"
|
/dports/www/moodle311/moodle/mod/h5pactivity/tests/behat/ |
H A D | result_longfillin.feature | 37 And I set the field with xpath "//textarea" to "This is a smurfing smurf" 44 Then I should see "This is a smurfing smurf" 45 And I should not see "<strong>smurf</strong>"
|
/dports/www/moodle39/moodle/mod/h5pactivity/tests/behat/ |
H A D | result_longfillin.feature | 37 And I set the field with xpath "//textarea" to "This is a smurfing smurf" 44 Then I should see "This is a smurfing smurf" 45 And I should not see "<strong>smurf</strong>"
|
/dports/lang/php73/php-7.3.33/ext/curl/tests/ |
H A D | curl_CURLOPT_READDATA.phpt | 18 $datalen = file_put_contents($tempname, "hello=world&smurf=blue"); 43 ["smurf"]=>
|
/dports/shells/fish/fish-3.3.1/doc_src/cmds/ |
H A D | break.rst | 24 The following code searches all .c files for "smurf", and halts at the first occurrence. 29 if grep smurf $i
|
/dports/www/mod_php81/php-8.1.1/ext/curl/tests/ |
H A D | curl_CURLOPT_READDATA.phpt | 18 $datalen = file_put_contents($tempname, "hello=world&smurf=blue"); 44 ["smurf"]=>
|
/dports/www/mod_php74/php-7.4.27/ext/curl/tests/ |
H A D | curl_CURLOPT_READDATA.phpt | 18 $datalen = file_put_contents($tempname, "hello=world&smurf=blue"); 43 ["smurf"]=>
|
/dports/lang/php81/php-8.1.1/ext/curl/tests/ |
H A D | curl_CURLOPT_READDATA.phpt | 18 $datalen = file_put_contents($tempname, "hello=world&smurf=blue"); 44 ["smurf"]=>
|
/dports/lang/php80/php-8.0.15/ext/curl/tests/ |
H A D | curl_CURLOPT_READDATA.phpt | 18 $datalen = file_put_contents($tempname, "hello=world&smurf=blue"); 44 ["smurf"]=>
|
/dports/lang/php74/php-7.4.27/ext/curl/tests/ |
H A D | curl_CURLOPT_READDATA.phpt | 18 $datalen = file_put_contents($tempname, "hello=world&smurf=blue"); 43 ["smurf"]=>
|