HomeSort by relevance Sort by last modified time
    Searched full:evil (Results 676 - 700 of 1130) sorted by null

<<21222324252627282930>>

  /external/chromium_org/third_party/sqlite/src/test/
types.test 6 # May you do good and not evil.
vacuum.test 6 # May you do good and not evil.
vacuum3.test 6 # May you do good and not evil.
wal5.test 6 # May you do good and not evil.
walcrash.test 6 # May you do good and not evil.
where4.test 6 # May you do good and not evil.
wherelimit.test 6 # May you do good and not evil.
  /external/chromium_org/third_party/sqlite/src/tool/
shell5.test 6 # May you do good and not evil.
  /external/chromium_org/tools/gn/
tokenizer.cc 354 help = "You got a tab character in here. Tabs are evil. "
  /external/jmonkeyengine/engine/src/core/com/jme3/math/
Transform.java 199 // This here, is evil code
  /external/libvorbis/examples/
decoder_example.c 60 /* Beware the evil ifdef. We avoid these where we can, but this one we
encoder_example.c 72 /* Beware the evil ifdef. We avoid these where we can, but this one we
  /external/openssl/crypto/conf/
conf_api.c 228 lh_CONF_VALUE_down_load(conf->data)=0; /* evil thing to make
  /external/openssl/crypto/evp/
p5_crpt2.c 167 /* Now the key derivation function itself. This is a bit evil because
  /external/openssl/crypto/x509/
x509_cmp.c 177 * with an evil cast.
  /external/qemu/distrib/sdl-1.2.15/src/cdrom/macosx/
AudioFilePlayer.c 269 in other chunks. Of course that is kind of evil, but for now we are lazy
  /external/qemu/distrib/sdl-1.2.15/test/
testpalette.c 57 /* Call this instead of exit(), so we can clean up SDL: atexit() is evil. */
testwin.c 14 /* Call this instead of exit(), so we can clean up SDL: atexit() is evil. */
testwm.c 16 /* Call this instead of exit(), so we can clean up SDL: atexit() is evil. */
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_urllib2net.py 71 # urllib2.urlopen, "http://evil:thing@example.com")
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_urllib2net.py 71 # urllib2.urlopen, "http://evil:thing@example.com")
  /external/chromium/chrome/browser/ui/
browser_list.cc 180 // try to catch evil observers that change the list from under us.
256 // Do some basic checking to try to catch evil observers
  /external/chromium/chrome/common/extensions/docs/static/
content_scripts.html 362 // WARNING! Might be evaluating an evil script!
368 // WARNING! elmt_id might be "); ... evil script ... //"!
  /external/chromium_org/chrome/common/extensions/api/
webview_tag.json 226 "description": "Interface which provides access to webRequest events on the guest page. See the <a href=\"http://developer.chrome.com/extensions/webRequest.html\">chrome.webRequest</a> extensions API for details on webRequest life cycle and related concepts.<p>To illustrate how usage differs from the extensions webRequest API, consider the following example code which blocks any guest requests for URLs which match <code>*://www.evil.com/*</code>:</p><pre>webview.request.onBeforeRequest.addListener(\r function(details) { return {cancel: true}; },\r {urls: [\"*://www.evil.com/*\"]},\r [\"blocking\"]);</pre><p>Additionally, this interface supports declarative webRequest rules through <code>onRequest</code> and <code>onMessage</code> events. See <a href=\"http://developer.chrome.com/extensions/declarativeWebRequest.html\">declarativeWebRequest</a> for API details.</p>Note that conditions and actions for declarative webview webRequests should be instantiated from their <code>chrome.webViewRequest.*</code> counterparts. The following example code declaratively blocks all requests to <code>\"example.com\"</code> on the webview <code>myWebview</code>:</p><pre>var rule = {\r conditions: [\r new chrome.webViewRequest.RequestMatcher({ url: { hostSuffix: 'example.com' } })\r ],\r actions: [ new chrome.webViewRequest.CancelRequest() ]\r};\rmyWebview.request.onRequest.addRules([rule]);</pre>",
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
content_scripts.html 390 // WARNING! Might be evaluating an evil script!
395 // WARNING! elmt_id might be "); ... evil script ... //"!

Completed in 598 milliseconds

<<21222324252627282930>>