Searched
full:evil (Results
676 -
700 of
1130) sorted by null
<<21222324252627282930>>
/external/chromium_org/third_party/sqlite/src/test/ |
types.test | 6 # May you do good and not evil.
|
vacuum.test | 6 # May you do good and not evil.
|
vacuum3.test | 6 # May you do good and not evil.
|
wal5.test | 6 # May you do good and not evil.
|
walcrash.test | 6 # May you do good and not evil.
|
where4.test | 6 # May you do good and not evil.
|
wherelimit.test | 6 # May you do good and not evil.
|
/external/chromium_org/third_party/sqlite/src/tool/ |
shell5.test | 6 # May you do good and not evil.
|
/external/chromium_org/tools/gn/ |
tokenizer.cc | 354 help = "You got a tab character in here. Tabs are evil. "
|
/external/jmonkeyengine/engine/src/core/com/jme3/math/ |
Transform.java | 199 // This here, is evil code
|
/external/libvorbis/examples/ |
decoder_example.c | 60 /* Beware the evil ifdef. We avoid these where we can, but this one we
|
encoder_example.c | 72 /* Beware the evil ifdef. We avoid these where we can, but this one we
|
/external/openssl/crypto/conf/ |
conf_api.c | 228 lh_CONF_VALUE_down_load(conf->data)=0; /* evil thing to make
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 167 /* Now the key derivation function itself. This is a bit evil because
|
/external/openssl/crypto/x509/ |
x509_cmp.c | 177 * with an evil cast.
|
/external/qemu/distrib/sdl-1.2.15/src/cdrom/macosx/ |
AudioFilePlayer.c | 269 in other chunks. Of course that is kind of evil, but for now we are lazy
|
/external/qemu/distrib/sdl-1.2.15/test/ |
testpalette.c | 57 /* Call this instead of exit(), so we can clean up SDL: atexit() is evil. */
|
testwin.c | 14 /* Call this instead of exit(), so we can clean up SDL: atexit() is evil. */
|
testwm.c | 16 /* Call this instead of exit(), so we can clean up SDL: atexit() is evil. */
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_urllib2net.py | 71 # urllib2.urlopen, "http://evil:thing@example.com")
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_urllib2net.py | 71 # urllib2.urlopen, "http://evil:thing@example.com")
|
/external/chromium/chrome/browser/ui/ |
browser_list.cc | 180 // try to catch evil observers that change the list from under us. 256 // Do some basic checking to try to catch evil observers
|
/external/chromium/chrome/common/extensions/docs/static/ |
content_scripts.html | 362 // WARNING! Might be evaluating an evil script! 368 // WARNING! elmt_id might be "); ... evil script ... //"!
|
/external/chromium_org/chrome/common/extensions/api/ |
webview_tag.json | 226 "description": "Interface which provides access to webRequest events on the guest page. See the <a href=\"http://developer.chrome.com/extensions/webRequest.html\">chrome.webRequest</a> extensions API for details on webRequest life cycle and related concepts.<p>To illustrate how usage differs from the extensions webRequest API, consider the following example code which blocks any guest requests for URLs which match <code>*://www.evil.com/*</code>:</p><pre>webview.request.onBeforeRequest.addListener(\r function(details) { return {cancel: true}; },\r {urls: [\"*://www.evil.com/*\"]},\r [\"blocking\"]);</pre><p>Additionally, this interface supports declarative webRequest rules through <code>onRequest</code> and <code>onMessage</code> events. See <a href=\"http://developer.chrome.com/extensions/declarativeWebRequest.html\">declarativeWebRequest</a> for API details.</p>Note that conditions and actions for declarative webview webRequests should be instantiated from their <code>chrome.webViewRequest.*</code> counterparts. The following example code declaratively blocks all requests to <code>\"example.com\"</code> on the webview <code>myWebview</code>:</p><pre>var rule = {\r conditions: [\r new chrome.webViewRequest.RequestMatcher({ url: { hostSuffix: 'example.com' } })\r ],\r actions: [ new chrome.webViewRequest.CancelRequest() ]\r};\rmyWebview.request.onRequest.addRules([rule]);</pre>",
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
content_scripts.html | 390 // WARNING! Might be evaluating an evil script! 395 // WARNING! elmt_id might be "); ... evil script ... //"!
|
Completed in 598 milliseconds
<<21222324252627282930>>