/third_party/curl/tests/data/ |
D | test442 | 6 # "attack.invalid", "TRUE", "/", "FALSE", "0", 41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b %LOGDIR/cookie%TESTNUMBER --resolve attack.inval… 44 attack.invalid TRUE / FALSE 0 name1 could-be-large-1 45 attack.invalid TRUE / FALSE 0 name2 could-be-large-2 46 attack.invalid TRUE / FALSE 0 name3 could-be-large-3 47 attack.invalid TRUE / FALSE 0 name4 could-be-large-4 48 attack.invalid TRUE / FALSE 0 name5 could-be-large-5 49 attack.invalid TRUE / FALSE 0 name6 could-be-large-6 50 attack.invalid TRUE / FALSE 0 name7 could-be-large-7 51 attack.invalid TRUE / FALSE 0 name8 could-be-large-8 [all …]
|
D | test444 | 119 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -c %LOGDIR/cookie%TESTNUMBER --resolve attack.inval… 131 Host: attack.invalid:%HTTPPORT 141 attack.invalid FALSE /a/b/ FALSE 0 cookie-50 yes 142 attack.invalid FALSE /a/b/ FALSE 0 cookie-49 yes 143 attack.invalid FALSE /a/b/ FALSE 0 cookie-48 yes 144 attack.invalid FALSE /a/b/ FALSE 0 cookie-47 yes 145 attack.invalid FALSE /a/b/ FALSE 0 cookie-46 yes 146 attack.invalid FALSE /a/b/ FALSE 0 cookie-45 yes 147 attack.invalid FALSE /a/b/ FALSE 0 cookie-44 yes 148 attack.invalid FALSE /a/b/ FALSE 0 cookie-43 yes [all …]
|
D | test443 | 6 # "attack.invalid", "TRUE", "/", "FALSE", "0", 41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b %LOGDIR/cookie%TESTNUMBER --resolve attack.inval… 44 attack.invalid TRUE / FALSE 0 huge-1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 45 attack.invalid TRUE / FALSE 0 huge-2 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 46 attack.invalid TRUE / FALSE 0 huge-3 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 47 attack.invalid TRUE / FALSE 0 huge-4 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 48 attack.invalid TRUE / FALSE 0 huge-5 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 49 attack.invalid TRUE / FALSE 0 huge-6 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 50 attack.invalid TRUE / FALSE 0 huge-7 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 51 attack.invalid TRUE / FALSE 0 huge-8 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… [all …]
|
D | test414 | 20 Location: http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER0002 30 Set-Cookie: SESSIONID=hacker; domain=attack.invalid; 32 Location: https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER0003 58 https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER -k -c %LOGDIR/cookie%TESTNUMBER --resolve attack.… 67 Host: attack.invalid:%HTTPSPORT 72 Host: attack.invalid:%HTTPPORT 77 Host: attack.invalid:%HTTPSPORT
|
/third_party/typescript/tests/baselines/reference/ |
D | es6ClassTest2.symbols | 11 attack(target) { 12 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 30 m1.attack(m2); 31 >m1.attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 33 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 58 attack(target) { 59 >attack : Symbol(GetSetMonster.attack, Decl(es6ClassTest2.ts, 21, 5)) 103 m3.attack(m4); 104 >m3.attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) 106 >attack : Symbol(BasicMonster.attack, Decl(es6ClassTest2.ts, 3, 5)) [all …]
|
D | es6ClassTest2.types | 11 attack(target) { 12 >attack : (target: any) => void 37 m1.attack(m2); 38 >m1.attack(m2) : void 39 >m1.attack : (target: any) => void 41 >attack : (target: any) => void 74 attack(target) { 75 >attack : (target: any) => void 132 m3.attack(m4); 133 >m3.attack(m4) : void [all …]
|
D | es6ClassTest2.js | 7 attack(target) { method in BasicMonster 16 m1.attack(m2); 25 attack(target) { method in GetSetMonster 46 m3.attack(m4); 56 attack(); 57 attack(a: any); 58 attack(target?) { method in OverloadedMonster 67 m5.attack(m6); 183 BasicMonster.prototype.attack = function (target) { method in BasicMonster 190 m1.attack(m2); [all …]
|
D | es6ClassTest2.errors.txt | 11 attack(target) { 20 m1.attack(m2); 29 attack(target) { 54 m3.attack(m4); 64 attack(); 65 attack(a: any); 66 attack(target?) { 75 m5.attack(m6);
|
/third_party/typescript/tests/cases/compiler/ |
D | es6ClassTest2.ts | 6 attack(target) { method in BasicMonster 15 m1.attack(m2); 24 attack(target) { method in GetSetMonster 45 m3.attack(m4); 55 attack(); method in OverloadedMonster 56 attack(a: any); 57 attack(target?) { 66 m5.attack(m6);
|
/third_party/ffmpeg/libavfilter/ |
D | af_compand.c | 40 double attack; member 119 cp->volume += delta * cp->attack; in update_volume() 347 new_nb_items += sscanf(tstr, "%lf", &s->channels[i].attack) == 1; in config_output() 348 if (s->channels[i].attack < 0) { in config_output() 380 s->channels[i].attack = s->channels[nb_decays - 1].attack; in config_output() 481 if (cp->attack > 1.0 / sample_rate) in config_output() 482 cp->attack = 1.0 - exp(-1.0 / (sample_rate * cp->attack)); in config_output() 484 cp->attack = 1.0; in config_output()
|
D | af_adynamicequalizer.c | 39 double attack; member 155 const double attack = s->attack_coef; in filter_channels() local 166 const double aattack = exp(-1000. / ((s->attack + 2.0 * (slew - 1.)) * sample_rate)); in filter_channels() 197 &state[4], attack, release, nc); in filter_channels() 270 s->attack_coef = get_coef(s->attack, in->sample_rate); in filter_frame() 299 …{ "attack", "set attack duration", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, …
|
D | af_alimiter.c | 46 double attack; member 85 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=5}, 0.1, 8… 100 s->attack /= 1000.; in init() 372 s->buffer_size = inlink->sample_rate * s->attack * inlink->ch_layout.nb_channels; in config_input()
|
D | af_agate.c | 42 double attack; member 77 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, … 103 s->attack_coeff = FFMIN(1., 1. / (s->attack * inlink->sample_rate / 4000.)); in agate_config_input()
|
D | af_sidechaincompress.c | 46 double attack, attack_coeff; member 83 …{ "attack", "set attack", OFFSET(attack), AV_OPT_TYPE_DOUBLE, {.dbl=20}, 0… 159 s->attack_coeff = FFMIN(1., 1. / (s->attack * outlink->sample_rate / 4000.)); in compressor_config_output()
|
/third_party/rust/crates/codespan/codespan-reporting/tests/snapshots/ |
D | term__tabbed__tab_width_3_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_default_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_6_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
/third_party/python/Doc/library/ |
D | xml.rst | 87 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 94 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 96 with a couple of thousand chars over and over again. The attack isn't as 118 all known attack vectors with examples and references.
|
/third_party/libwebsockets/scripts/ |
D | travis_control.sh | 19 ../scripts/attack.sh && 44 ../scripts/attack.sh
|
/third_party/openssl/doc/man3/ |
D | CMS_decrypt.pod | 61 is problematic. To thwart the MMA attack (Bleichenbacher's attack on 67 use this in a timing attack. If the special flag B<CMS_DEBUG_DECRYPT> is set 72 open to attack.
|
D | DTLSv1_listen.pod | 33 message then the amplification attack has succeeded. 36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is 40 address. In this case a TLSv1.3 application would be susceptible to this attack. 77 denial-of-service attack or allow unencrypted information in the DTLS handshake
|
/third_party/alsa-lib/include/sound/uapi/ |
D | asound_fm.h | 54 unsigned char attack; /* 4 bits: attack rate */ member
|
/third_party/openssl/doc/man7/ |
D | des_modes.pod | 32 (for the same key) making it vulnerable to a 'dictionary attack'. 177 susceptible to a 'known plaintext' attack. 195 key length 112 bits, but this attack also requires 2^56 blocks of
|
/third_party/node/test/parallel/ |
D | test-tls-client-renegotiation-limit.js | 59 assert.match(err.message, /TLS session renegotiation attack/);
|
D | test-https-client-renegotiation-limit.js | 61 assert.match(err.message, /TLS session renegotiation attack/);
|