Home
last modified time | relevance | path

Searched refs:abuse (Results 1 – 25 of 47) sorted by relevance

12

/external/python/cpython2/Lib/test/
Dinspect_fodder.py29 def abuse(self, a, b, c): member in StupidGit
Dtest_inspect.py156 git.abuse(7, 8, 9)
264 self.assertEqual(inspect.getdoc(git.abuse),
281 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)
283 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)
290 self.assertSourceEqual(git.abuse, 29, 39)
295 self.assertEqual(inspect.getsourcefile(git.abuse), modfile)
/external/python/cpython2/Doc/library/
Dxml.rst51 An attacker can abuse vulnerabilities for e.g. denial of service attacks, to
53 to or circumvent firewalls. The attacks on XML abuse unfamiliar features
/external/swiftshader/third_party/subzero/tests_lit/assembler/arm32/
Dvec-sh-imm.ll2 ; We abuse sign extension of vectors of i1 because that's the only way to force
/external/valgrind/cachegrind/
Dcg_diff.in57 Bug reports, feedback, admiration, abuse, etc, to: njn\@valgrind.org.
Dcg_annotate.in163 Bug reports, feedback, admiration, abuse, etc, to: njn\@valgrind.org.
/external/linux-kselftest/tools/testing/selftests/futex/
DREADME8 odd corner cases, regression tests, and abject abuse and misuse.
/external/valgrind/massif/
Dms_print.in81 Bug reports, feedback, admiration, abuse, etc, to: njn\@valgrind.org.
/external/tcpdump/tests/
Dprint-AA.out59 <P>See the <A href="http://www.abuse.net/">Network Abuse
Dprint-A.out59 <P>See the <A href="http://www.abuse.net/">Network Abuse
/external/syslinux/gnu-efi/gnu-efi-3.0/
DREADME.gnuefi388 As of gnu-efi-3.0, we make use (and somewhat abuse) the gcc option
391 size. By abuse, we mean that we rely on the fact that the regular ASCII
/external/openssh/
DPROTOCOL150 attacker may abuse a running ssh client to surreptitiously open
Dssh.0841 the potential for abuse, this file must have strict permissions:
Dssh_config.01072 Because of the potential for abuse, this file must have strict
/external/clang/docs/
DDriverInternals.rst376 such invocations, and overall there isn't a good reason to abuse
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/en-US/
Den-US_klex.pkb48 abstracts )!I8KLJICLKabuse0'8B!NQabuse)'8B!NKabused M'8B!NQ9abuses
/external/dnsmasq/
DCOPYING-v354 pattern of such abuse occurs in the area of products for individuals to
/external/elfutils/
DCOPYING54 pattern of such abuse occurs in the area of products for individuals to
/external/libnl/doc/
DCOPYING54 pattern of such abuse occurs in the area of products for individuals to
/external/eigen/
DCOPYING.GPL54 pattern of such abuse occurs in the area of products for individuals to
/external/bison/
DCOPYING54 pattern of such abuse occurs in the area of products for individuals to
DNOTICE54 pattern of such abuse occurs in the area of products for individuals to
/external/python/cpython2/Doc/faq/
Ddesign.rst736 considered an abuse of goto anyway. Use sparingly.
/external/python/cpython2/Doc/reference/
Dsimple_stmts.rst966 programs should not abuse this freedom, as future implementations may enforce
/external/bison/doc/
Dgpl-3.0.texi61 systematic pattern of such abuse occurs in the area of products for

12