Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 147) sorted by relevance

123456

/third_party/curl/tests/data/
Dtest4426 # "attack.invalid", "TRUE", "/", "FALSE", "0",
41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b %LOGDIR/cookie%TESTNUMBER --resolve attack.inval…
44 attack.invalid TRUE / FALSE 0 name1 could-be-large-1
45 attack.invalid TRUE / FALSE 0 name2 could-be-large-2
46 attack.invalid TRUE / FALSE 0 name3 could-be-large-3
47 attack.invalid TRUE / FALSE 0 name4 could-be-large-4
48 attack.invalid TRUE / FALSE 0 name5 could-be-large-5
49 attack.invalid TRUE / FALSE 0 name6 could-be-large-6
50 attack.invalid TRUE / FALSE 0 name7 could-be-large-7
51 attack.invalid TRUE / FALSE 0 name8 could-be-large-8
[all …]
Dtest444119 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -c %LOGDIR/cookie%TESTNUMBER --resolve attack.inval…
131 Host: attack.invalid:%HTTPPORT
141 attack.invalid FALSE /a/b/ FALSE 0 cookie-50 yes
142 attack.invalid FALSE /a/b/ FALSE 0 cookie-49 yes
143 attack.invalid FALSE /a/b/ FALSE 0 cookie-48 yes
144 attack.invalid FALSE /a/b/ FALSE 0 cookie-47 yes
145 attack.invalid FALSE /a/b/ FALSE 0 cookie-46 yes
146 attack.invalid FALSE /a/b/ FALSE 0 cookie-45 yes
147 attack.invalid FALSE /a/b/ FALSE 0 cookie-44 yes
148 attack.invalid FALSE /a/b/ FALSE 0 cookie-43 yes
[all …]
Dtest4436 # "attack.invalid", "TRUE", "/", "FALSE", "0",
41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b %LOGDIR/cookie%TESTNUMBER --resolve attack.inval…
44 attack.invalid TRUE / FALSE 0 huge-1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
45 attack.invalid TRUE / FALSE 0 huge-2 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
46 attack.invalid TRUE / FALSE 0 huge-3 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
47 attack.invalid TRUE / FALSE 0 huge-4 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
48 attack.invalid TRUE / FALSE 0 huge-5 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
49 attack.invalid TRUE / FALSE 0 huge-6 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
50 attack.invalid TRUE / FALSE 0 huge-7 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
51 attack.invalid TRUE / FALSE 0 huge-8 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
[all …]
Dtest41420 Location: http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER0002
30 Set-Cookie: SESSIONID=hacker; domain=attack.invalid;
32 Location: https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER0003
58 https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER -k -c %LOGDIR/cookie%TESTNUMBER --resolve attack.…
67 Host: attack.invalid:%HTTPSPORT
72 Host: attack.invalid:%HTTPPORT
77 Host: attack.invalid:%HTTPSPORT
/third_party/typescript/tests/baselines/reference/
Des6ClassTest2.symbols11 attack(target) {
12 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5))
30 m1.attack(m2);
31 >m1.attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5))
33 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5))
58 attack(target) {
59 >attack : Symbol(GetSetMonster.attack, Decl(es6ClassTest2.ts, 21, 5))
103 m3.attack(m4);
104 >m3.attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5))
106 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5))
[all …]
Des6ClassTest2.types11 attack(target) {
12 >attack : (target: any) => void
37 m1.attack(m2);
38 >m1.attack(m2) : void
39 >m1.attack : (target: any) => void
41 >attack : (target: any) => void
74 attack(target) {
75 >attack : (target: any) => void
132 m3.attack(m4);
133 >m3.attack(m4) : void
[all …]
Des6ClassTest2.js7 attack(target) { method in BasicMonster
16 m1.attack(m2);
25 attack(target) { method in GetSetMonster
46 m3.attack(m4);
56 attack();
57 attack(a: any);
58 attack(target?) { method in OverloadedMonster
67 m5.attack(m6);
183 BasicMonster.prototype.attack = function (target) { method in BasicMonster
190 m1.attack(m2);
[all …]
Des6ClassTest2.errors.txt11 attack(target) {
20 m1.attack(m2);
29 attack(target) {
54 m3.attack(m4);
64 attack();
65 attack(a: any);
66 attack(target?) {
75 m5.attack(m6);
/third_party/typescript/tests/cases/compiler/
Des6ClassTest2.ts6 attack(target) { method in BasicMonster
15 m1.attack(m2);
24 attack(target) { method in GetSetMonster
45 m3.attack(m4);
55 attack(); method in OverloadedMonster
56 attack(a: any);
57 attack(target?) {
66 m5.attack(m6);
/third_party/ffmpeg/libavfilter/
Daf_compand.c40 double attack; member
119 cp->volume += delta * cp->attack; in update_volume()
347 new_nb_items += sscanf(tstr, "%lf", &s->channels[i].attack) == 1; in config_output()
348 if (s->channels[i].attack < 0) { in config_output()
380 s->channels[i].attack = s->channels[nb_decays - 1].attack; in config_output()
481 if (cp->attack > 1.0 / sample_rate) in config_output()
482 cp->attack = 1.0 - exp(-1.0 / (sample_rate * cp->attack)); in config_output()
484 cp->attack = 1.0; in config_output()
Daf_adynamicequalizer.c39 double attack; member
155 const double attack = s->attack_coef; in filter_channels() local
166 const double aattack = exp(-1000. / ((s->attack + 2.0 * (slew - 1.)) * sample_rate)); in filter_channels()
197 &state[4], attack, release, nc); in filter_channels()
270 s->attack_coef = get_coef(s->attack, in->sample_rate); in filter_frame()
299 …{ "attack", "set attack duration", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, …
Daf_alimiter.c46 double attack; member
85 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=5}, 0.1, 8…
100 s->attack /= 1000.; in init()
372 s->buffer_size = inlink->sample_rate * s->attack * inlink->ch_layout.nb_channels; in config_input()
Daf_agate.c42 double attack; member
77 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, …
103 s->attack_coeff = FFMIN(1., 1. / (s->attack * inlink->sample_rate / 4000.)); in agate_config_input()
Daf_sidechaincompress.c46 double attack, attack_coeff; member
83 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, 0…
159 s->attack_coeff = FFMIN(1., 1. / (s->attack * outlink->sample_rate / 4000.)); in compressor_config_output()
/third_party/rust/crates/codespan/codespan-reporting/tests/snapshots/
Dterm__tabbed__tab_width_3_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
Dterm__tabbed__tab_width_default_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
Dterm__tabbed__tab_width_6_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
/third_party/python/Doc/library/
Dxml.rst87 The `Billion Laughs`_ attack -- also known as exponential entity expansion --
94 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses
96 with a couple of thousand chars over and over again. The attack isn't as
118 all known attack vectors with examples and references.
/third_party/libwebsockets/scripts/
Dtravis_control.sh19 ../scripts/attack.sh &&
44 ../scripts/attack.sh
/third_party/openssl/doc/man3/
DCMS_decrypt.pod61 is problematic. To thwart the MMA attack (Bleichenbacher's attack on
67 use this in a timing attack. If the special flag B<CMS_DEBUG_DECRYPT> is set
72 open to attack.
DDTLSv1_listen.pod33 message then the amplification attack has succeeded.
36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is
40 address. In this case a TLSv1.3 application would be susceptible to this attack.
77 denial-of-service attack or allow unencrypted information in the DTLS handshake
/third_party/alsa-lib/include/sound/uapi/
Dasound_fm.h54 unsigned char attack; /* 4 bits: attack rate */ member
/third_party/openssl/doc/man7/
Ddes_modes.pod32 (for the same key) making it vulnerable to a 'dictionary attack'.
177 susceptible to a 'known plaintext' attack.
195 key length 112 bits, but this attack also requires 2^56 blocks of
/third_party/node/test/parallel/
Dtest-tls-client-renegotiation-limit.js59 assert.match(err.message, /TLS session renegotiation attack/);
Dtest-https-client-renegotiation-limit.js61 assert.match(err.message, /TLS session renegotiation attack/);

123456