/external/python/cpython2/Lib/ |
D | rexec.py | 74 rexec = None 79 rexec = args[0] 84 self.rexec = rexec 86 def set_rexec(self, rexec): argument 88 self.rexec = rexec 91 return self.rexec.get_suffixes() 94 return self.rexec.is_builtin(name) 98 return self.rexec.copy_except(m, ()) 106 return self.rexec.load_dynamic(name, filename, file) 109 return self.rexec.add_module(name) [all …]
|
D | Bastion.py | 172 import rexec 173 r = rexec.RExec()
|
/external/python/cpython2/Demo/tkinter/guido/ |
D | ss1.py | 7 import rexec 36 self.rexec = rexec.RExec() 37 m = self.rexec.add_module('__main__') 45 return cell.recalc(self.rexec) 147 cell.recalc(self.rexec) 167 cell.recalc(self.rexec) 334 def recalc(self, rexec): argument 375 def recalc(self, rexec): argument 401 def recalc(self, rexec): argument 405 rexec.r_exec("from __future__ import division\n" + [all …]
|
/external/python/cpython2/Doc/library/ |
D | rexec.rst | 1 :mod:`rexec` --- Restricted execution framework 4 .. module:: rexec 9 The :mod:`rexec` module has been removed in Python 3. 29 While the :mod:`rexec` module is designed to perform as described below, it does 34 Alternatively, help in patching known :mod:`rexec` vulnerabilities would be 50 Whenever the :mod:`rexec` module searches for a module (even a built-in one) or 82 Grail is a Web browser written entirely in Python. It uses the :mod:`rexec` 268 class TmpWriterRExec(rexec.RExec):
|
D | restricted.rst | 12 in reading old code that uses the :mod:`rexec` and :mod:`Bastion` modules. 59 rexec.rst
|
D | bastion.rst | 26 object. It must always be used with the :mod:`rexec` module, in order to allow
|
D | undoc.rst | 23 --- Import hook support (for :mod:`rexec`; may become obsolete). Removed in
|
/external/ltp/testcases/network/ |
D | README.md | 38 * Add rlogin, rsh, rexec into /etc/securetty file: 41 for i in rlogin rsh rexec; do echo $i >> /etc/securetty; done
|
/external/python/cpython2/Lib/test/ |
D | test_sundry.py | 65 import rexec
|
/external/python/cpython2/Doc/c-api/ |
D | import.rst | 89 module: rexec 95 are installed in the current environment, e.g. by :mod:`rexec` or :mod:`ihooks`.
|
/external/toybox/lib/ |
D | lib.h | 180 void xregcomp(regex_t *preg, char *rexec, int cflags);
|
/external/antlr/runtime/Python3/ |
D | pylintrc | 241 deprecated-modules=regsub,string,TERMIOS,Bastion,rexec
|
/external/antlr/runtime/Python/ |
D | pylintrc | 264 deprecated-modules=regsub,string,TERMIOS,Bastion,rexec
|
/external/autotest/utils/ |
D | pylintrc | 281 #deprecated-modules=regsub,string,TERMIOS,Bastion,rexec
|
/external/tensorflow/tensorflow/tools/ci_build/ |
D | pylintrc | 234 deprecated-modules=regsub,TERMIOS,Bastion,rexec,sets
|
/external/python/apitools/ |
D | default.pylintrc | 270 # DEFAULT: deprecated-modules=regsub,TERMIOS,Bastion,rexec
|
/external/ltp/ |
D | INSTALL | 208 rexec
|
/external/yapf/ |
D | pylintrc | 425 deprecated-modules=regsub,TERMIOS,Bastion,rexec
|
/external/python/cpython2/Doc/whatsnew/ |
D | 2.3.rst | 1442 * The :mod:`rexec` and :mod:`Bastion` modules have been declared dead, and 1445 by :mod:`rexec`, and no one has interest in fixing them or time to do so. If 1446 you have applications using :mod:`rexec`, rewrite them to use something else. 1449 because there are known bugs in the :mod:`rexec` module in those versions. To 1450 repeat: if you're using :mod:`rexec`, stop using it immediately.)
|
/external/python/cpython3/Doc/whatsnew/ |
D | 2.3.rst | 1442 * The :mod:`rexec` and :mod:`Bastion` modules have been declared dead, and 1445 by :mod:`rexec`, and no one has interest in fixing them or time to do so. If 1446 you have applications using :mod:`rexec`, rewrite them to use something else. 1449 because there are known bugs in the :mod:`rexec` module in those versions. To 1450 repeat: if you're using :mod:`rexec`, stop using it immediately.)
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.6b1.rst | 908 The Bastion and rexec modules have been deprecated for removal in Python
|
/external/python/cpython2/Misc/ |
D | HISTORY | 4779 - Bastion.py and rexec.py are disabled. These modules are not safe in 5675 - Fixed bug #636769: rexec would run unallowed code if subclasses of 6977 - In restricted execution mode (using the rexec module), unmarshalling 11300 - The classes rexec.RModuleLoader and rexec.RModuleImporter no 11709 - Improvements to rexec.py: package support; support a (minimal) 12709 - Restricted execution (rexec): added the pcre module (support for the 14246 (e.g. the rexec module). Also close the file in some cases and add 14263 - Fixed a series of embarrassing typos in rexec's handling of standard 14338 restricted mode (rexec, Bastion) and the formatter module (for use 14863 - Fixed an interface bug in the rexec module: it was impossible to pass a [all …]
|
D | cheatsheet | 1961 rexec Restricted execution facilities ("safe" exec, eval, etc).
|
/external/compiler-rt/lib/dfsan/ |
D | libc_ubuntu1404_abilist.txt | 2756 fun:rexec=uninstrumented
|
/external/python/cpython3/Misc/ |
D | HISTORY | 17331 linuxaudiodev, md5, MimeWriter, mimify, popen2, rexec, sets, sha, 22163 - Bastion.py and rexec.py are disabled. These modules are not safe in 23059 - Fixed bug #636769: rexec would run unallowed code if subclasses of 24356 - In restricted execution mode (using the rexec module), unmarshalling 28679 - The classes rexec.RModuleLoader and rexec.RModuleImporter no 29088 - Improvements to rexec.py: package support; support a (minimal) 30088 - Restricted execution (rexec): added the pcre module (support for the 31625 (e.g. the rexec module). Also close the file in some cases and add 31642 - Fixed a series of embarrassing typos in rexec's handling of standard 31717 restricted mode (rexec, Bastion) and the formatter module (for use [all …]
|