/third_party/curl/tests/data/ |
D | test442 | 5 # "attack.invalid", "TRUE", "/", "FALSE", "0", 40 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b log/cookie%TESTNUMBER --resolve attack.invalid:%… 43 attack.invalid TRUE / FALSE 0 name1 could-be-large-1 44 attack.invalid TRUE / FALSE 0 name2 could-be-large-2 45 attack.invalid TRUE / FALSE 0 name3 could-be-large-3 46 attack.invalid TRUE / FALSE 0 name4 could-be-large-4 47 attack.invalid TRUE / FALSE 0 name5 could-be-large-5 48 attack.invalid TRUE / FALSE 0 name6 could-be-large-6 49 attack.invalid TRUE / FALSE 0 name7 could-be-large-7 50 attack.invalid TRUE / FALSE 0 name8 could-be-large-8 [all …]
|
D | test444 | 118 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -c log/cookie%TESTNUMBER --resolve attack.invalid:%… 127 Host: attack.invalid:%HTTPPORT 137 attack.invalid FALSE /a/b/ FALSE 0 cookie-50 yes 138 attack.invalid FALSE /a/b/ FALSE 0 cookie-49 yes 139 attack.invalid FALSE /a/b/ FALSE 0 cookie-48 yes 140 attack.invalid FALSE /a/b/ FALSE 0 cookie-47 yes 141 attack.invalid FALSE /a/b/ FALSE 0 cookie-46 yes 142 attack.invalid FALSE /a/b/ FALSE 0 cookie-45 yes 143 attack.invalid FALSE /a/b/ FALSE 0 cookie-44 yes 144 attack.invalid FALSE /a/b/ FALSE 0 cookie-43 yes [all …]
|
D | test443 | 5 # "attack.invalid", "TRUE", "/", "FALSE", "0", 40 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b log/cookie%TESTNUMBER --resolve attack.invalid:%… 43 attack.invalid TRUE / FALSE 0 huge-1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 44 attack.invalid TRUE / FALSE 0 huge-2 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 45 attack.invalid TRUE / FALSE 0 huge-3 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 46 attack.invalid TRUE / FALSE 0 huge-4 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 47 attack.invalid TRUE / FALSE 0 huge-5 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 48 attack.invalid TRUE / FALSE 0 huge-6 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 49 attack.invalid TRUE / FALSE 0 huge-7 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 50 attack.invalid TRUE / FALSE 0 huge-8 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… [all …]
|
/third_party/typescript/tests/cases/compiler/ |
D | es6ClassTest2.ts | 6 attack(target) { method in BasicMonster 15 m1.attack(m2); 24 attack(target) { method in GetSetMonster 45 m3.attack(m4); 55 attack(); method in OverloadedMonster 56 attack(a: any); 57 attack(target?) { 66 m5.attack(m6);
|
/third_party/typescript/tests/baselines/reference/ |
D | es6ClassTest2.js | 7 attack(target) { method in BasicMonster 16 m1.attack(m2); 25 attack(target) { method in GetSetMonster 46 m3.attack(m4); 56 attack(); 57 attack(a: any); 58 attack(target?) { method in OverloadedMonster 67 m5.attack(m6); 183 BasicMonster.prototype.attack = function (target) { method in BasicMonster 190 m1.attack(m2); [all …]
|
D | es6ClassTest2.types | 11 attack(target) { 12 >attack : (target: any) => void 37 m1.attack(m2); 38 >m1.attack(m2) : void 39 >m1.attack : (target: any) => void 41 >attack : (target: any) => void 74 attack(target) { 75 >attack : (target: any) => void 132 m3.attack(m4); 133 >m3.attack(m4) : void [all …]
|
D | es6ClassTest2.symbols | 11 attack(target) { 12 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 30 m1.attack(m2); 31 >m1.attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 33 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 58 attack(target) { 59 >attack : Symbol(GetSetMonster.attack, Decl(es6ClassTest2.ts, 21, 5)) 103 m3.attack(m4); 104 >m3.attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 106 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) [all …]
|
D | es6ClassTest2.errors.txt | 11 attack(target) { 20 m1.attack(m2); 29 attack(target) { 54 m3.attack(m4); 64 attack(); 65 attack(a: any); 66 attack(target?) { 75 m5.attack(m6);
|
D | es6ClassTest.errors.txt | 56 // // attack(target) {
|
D | es6ClassTest.types | 114 // // attack(target) {
|
/third_party/ffmpeg/libavfilter/ |
D | af_compand.c | 40 double attack; member 149 cp->volume += delta * cp->attack; in update_volume() 377 new_nb_items += sscanf(tstr, "%lf", &s->channels[i].attack) == 1; in config_output() 378 if (s->channels[i].attack < 0) { in config_output() 410 s->channels[i].attack = s->channels[nb_decays - 1].attack; in config_output() 511 if (cp->attack > 1.0 / sample_rate) in config_output() 512 cp->attack = 1.0 - exp(-1.0 / (sample_rate * cp->attack)); in config_output() 514 cp->attack = 1.0; in config_output()
|
D | af_alimiter.c | 41 double attack; member 73 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=5}, 0.1, 8… 87 s->attack /= 1000.; in init() 327 s->buffer_size = inlink->sample_rate * s->attack * inlink->channels; in config_input()
|
D | af_agate.c | 41 double attack; member 76 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, … 100 s->attack_coeff = FFMIN(1., 1. / (s->attack * inlink->sample_rate / 4000.)); in agate_config_input()
|
D | avf_showcqt.h | 109 double attack; member
|
D | af_sidechaincompress.c | 45 double attack, attack_coeff; member 82 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, 0… 157 s->attack_coeff = FFMIN(1., 1. / (s->attack * outlink->sample_rate / 4000.)); in compressor_config_output()
|
/third_party/libwebsockets/scripts/ |
D | travis_control.sh | 19 ../scripts/attack.sh && 44 ../scripts/attack.sh
|
/third_party/python/Doc/library/ |
D | xml.rst | 83 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 90 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 92 with a couple of thousand chars over and over again. The attack isn't as 114 all known attack vectors with examples and references.
|
/third_party/openssl/doc/man3/ |
D | CMS_decrypt.pod | 31 is problematic. To thwart the MMA attack (Bleichenbacher's attack on 37 use this in a timing attack. If the special flag B<CMS_DEBUG_DECRYPT> is set 42 open to attack.
|
D | RSA_blinding_on.pod | 19 must be used to protect the RSA operation from that attack.
|
D | DTLSv1_listen.pod | 33 message then the amplification attack has succeeded. 36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is 40 address. In this case a TLSv1.3 application would be susceptible to this attack.
|
D | RSA_padding_add_PKCS1_type_1.pod | 130 padding oracle attack. This is an inherent weakness in the PKCS #1 141 used to mount a Bleichenbacher attack against any padding mode
|
/third_party/libexif/ |
D | SECURITY.md | 19 The primary attack scenario is processing of files for EXIF content
|
/third_party/openssl/doc/man7/ |
D | des_modes.pod | 32 (for the same key) making it vulnerable to a 'dictionary attack'. 177 susceptible to a 'known plaintext' attack. 195 key length 112 bits, but this attack also requires 2^56 blocks of
|
/third_party/curl/docs/ |
D | SSL-PROBLEMS.md | 77 BEAST is the name of a TLS 1.0 attack that surfaced 2011. When adding means 78 to mitigate this attack, it turned out that some broken servers out there in
|
/third_party/boost/libs/beast/doc/qbk/01_intro/ |
D | 1a_bishop_fox.qbk | 21 the real-world attack techniques of application penetration testing in
|