/external/curl/tests/data/ |
D | test442 | 6 # "attack.invalid", "TRUE", "/", "FALSE", "0", 41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b log/cookie%TESTNUMBER --resolve attack.invalid:%… 44 attack.invalid TRUE / FALSE 0 name1 could-be-large-1 45 attack.invalid TRUE / FALSE 0 name2 could-be-large-2 46 attack.invalid TRUE / FALSE 0 name3 could-be-large-3 47 attack.invalid TRUE / FALSE 0 name4 could-be-large-4 48 attack.invalid TRUE / FALSE 0 name5 could-be-large-5 49 attack.invalid TRUE / FALSE 0 name6 could-be-large-6 50 attack.invalid TRUE / FALSE 0 name7 could-be-large-7 51 attack.invalid TRUE / FALSE 0 name8 could-be-large-8 [all …]
|
D | test444 | 119 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -c log/cookie%TESTNUMBER --resolve attack.invalid:%… 131 Host: attack.invalid:%HTTPPORT 141 attack.invalid FALSE /a/b/ FALSE 0 cookie-50 yes 142 attack.invalid FALSE /a/b/ FALSE 0 cookie-49 yes 143 attack.invalid FALSE /a/b/ FALSE 0 cookie-48 yes 144 attack.invalid FALSE /a/b/ FALSE 0 cookie-47 yes 145 attack.invalid FALSE /a/b/ FALSE 0 cookie-46 yes 146 attack.invalid FALSE /a/b/ FALSE 0 cookie-45 yes 147 attack.invalid FALSE /a/b/ FALSE 0 cookie-44 yes 148 attack.invalid FALSE /a/b/ FALSE 0 cookie-43 yes [all …]
|
D | test443 | 6 # "attack.invalid", "TRUE", "/", "FALSE", "0", 41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b log/cookie%TESTNUMBER --resolve attack.invalid:%… 44 attack.invalid TRUE / FALSE 0 huge-1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 45 attack.invalid TRUE / FALSE 0 huge-2 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 46 attack.invalid TRUE / FALSE 0 huge-3 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 47 attack.invalid TRUE / FALSE 0 huge-4 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 48 attack.invalid TRUE / FALSE 0 huge-5 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 49 attack.invalid TRUE / FALSE 0 huge-6 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 50 attack.invalid TRUE / FALSE 0 huge-7 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 51 attack.invalid TRUE / FALSE 0 huge-8 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… [all …]
|
D | test414 | 20 Location: http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER0002 30 Set-Cookie: SESSIONID=hacker; domain=attack.invalid; 32 Location: https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER0003 58 https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER -k -c log/cookie%TESTNUMBER --resolve attack.inva… 67 Host: attack.invalid:%HTTPSPORT 72 Host: attack.invalid:%HTTPPORT 77 Host: attack.invalid:%HTTPSPORT
|
/external/aac/libPCMutils/src/ |
D | limiter.cpp | 116 unsigned int attack, release; in pcmLimiter_Create() local 121 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in pcmLimiter_Create() 129 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in pcmLimiter_Create() 131 (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in pcmLimiter_Create() 139 exponent = invFixp(attack + 1); in pcmLimiter_Create() 152 limiter->attack = attack; in pcmLimiter_Create() 180 unsigned int attack = limiter->attack; in pcmLimiter_Apply() local 195 scaleValuesSaturate(delayBuf, attack * channels, in pcmLimiter_Apply() 197 scaleValuesSaturate(maxBuf, attack + 1, limiter->scaling - scaling); in pcmLimiter_Apply() 240 for (j = 1; j <= attack; j++) { in pcmLimiter_Apply() [all …]
|
/external/libxaac/decoder/drc_src/ |
D | impd_drc_peak_limiter.c | 39 UWORD32 attack; in impd_peak_limiter_init() local 40 attack = (UWORD32)(attack_time * sample_rate / 1000); in impd_peak_limiter_init() 42 if (attack < 1) return 0; in impd_peak_limiter_init() 45 peak_limiter->delayed_input = buffer + attack * 4 + 32; in impd_peak_limiter_init() 50 peak_limiter->attack_time_samples = attack; in impd_peak_limiter_init() 51 peak_limiter->attack_constant = (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_peak_limiter_init()
|
D | impd_drc_parametric_dec.c | 215 UWORD32 attack, sec_len; in impd_init_parametric_drc_lim() local 252 attack = (UWORD32)(hParametricDrcTypeLimBs->parametric_lim_attack * in impd_init_parametric_drc_lim() 255 sec_len = (UWORD32)sqrt(attack + 1); in impd_init_parametric_drc_lim() 258 pstr_parametric_lim_type_drc_params->num_max_buf_sec = (attack + 1) / sec_len; in impd_init_parametric_drc_lim() 260 (attack + 1)) in impd_init_parametric_drc_lim() 272 pstr_parametric_lim_type_drc_params->attack = attack; in impd_init_parametric_drc_lim() 274 (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_init_parametric_drc_lim() 1044 WORD32 attack_time_samples = pstr_parametric_lim_type_drc_params->attack; in impd_parametric_lim_type_drc_process()
|
/external/python/cpython2/Lib/test/ |
D | test_fpformat.py | 72 attack = '+0' + ('0' * 1000000) + '++' 76 self.assertEqual(fpformat.fix(attack, digs), attack) 79 fpformat.sci(attack, digs)
|
/external/aac/libAACenc/src/ |
D | block_switch.cpp | 250 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching() 275 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching() 292 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 305 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 312 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 315 if ((blockSwitchingControl->attack == FALSE) && in FDKaacEnc_BlockSwitching() 323 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 331 [blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching() 336 chgWndSq[blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching()
|
/external/libxaac/decoder/ |
D | ixheaacd_peak_limiter.c | 48 UWORD32 attack; in ixheaacd_peak_limiter_init() local 50 attack = (UWORD32)(DEFAULT_ATTACK_TIME_MS * sample_rate / 1000); in ixheaacd_peak_limiter_init() 51 *delay_in_samples = attack; in ixheaacd_peak_limiter_init() 53 if (attack < 1) return 0; in ixheaacd_peak_limiter_init() 58 peak_limiter->delayed_input = buffer + attack * 4 + 32; in ixheaacd_peak_limiter_init() 63 peak_limiter->attack_time_samples = attack; in ixheaacd_peak_limiter_init() 64 peak_limiter->attack_constant = (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in ixheaacd_peak_limiter_init()
|
/external/libevent/test/ |
D | regress_rpc.c | 737 struct kill *attack = NULL; in rpc_test() local 751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test() 755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test() 756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test() 758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test() 809 !EVTAG_HAS(msg2, attack)) { in rpc_test() 813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test() 860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test() 864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
|
D | regress.rpc | 6 optional struct[kill] attack = 3;
|
/external/jackson-databind/src/test/java/com/fasterxml/jackson/databind/jsontype/ext/ |
D | ExternalTypeIdWithCreatorTest.java | 23 public Attack attack; field in ExternalTypeIdWithCreatorTest.Character 95 assertNotNull(character.attack); in testFails() 106 assertNotNull(character.attack); in testWorks()
|
/external/rust/crates/codespan-reporting/tests/snapshots/ |
D | term__tabbed__tab_width_6_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_default_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_3_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
/external/libwebsockets/scripts/ |
D | travis_control.sh | 19 ../scripts/attack.sh && 44 ../scripts/attack.sh
|
/external/python/cpython3/Doc/library/ |
D | xml.rst | 87 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 94 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 96 with a couple of thousand chars over and over again. The attack isn't as 118 all known attack vectors with examples and references.
|
/external/wycheproof/doc/ |
D | rsa.md | 45 information leakage. Smart even describes an attack that only needs about 40 62 Due to the nature of unit tests not every attack can be detected this way. Some 73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are 74 implementations that were susceptible to Mangers attack, e.g. [CVE-2012-5081]. 104 \[M01]: J. Manger, "A chosen ciphertext attack on RSA optimal asymmetric 106 paper shows that OAEP is susceptible to a chosen ciphertext attack if error
|
/external/python/cpython2/Doc/library/ |
D | xml.rst | 77 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 84 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 86 with a couple of thousand chars over and over again. The attack isn't as 109 all known attack vectors with examples and references.
|
/external/webrtc/modules/audio_processing/test/py_quality_assessment/quality_assessment/ |
D | sound_level.cc | 71 const float attack = in main() local 111 level_prev = smooth(level_curr > level_prev ? attack : decay); in main()
|
/external/replicaisland/src/com/replica/replicaisland/ |
D | GameObjectFactory.java | 1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2); 1389 attack.addFrame(new AnimationFrame( 1392 attack.addFrame(new AnimationFrame( 1401 staticData.add(attack); 1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal()); 1473 if (attack != null) { 1474 gun.setDelayBeforeFirstSet(attack.getLength()); 1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10); 1597 attack.addFrame(attack1); 1598 attack.addFrame(attack2); [all …]
|
/external/cronet/third_party/libevent/test/ |
D | regress.rpc | 6 optional struct[kill] attack = 3;
|
/external/rust/crates/ahash/ |
D | FAQ.md | 10 … hashes such as murmurhash confidence in their quality, but could be undone by a deliberate attack. 20 …ame input. - This means that if there is a way to attack one of them it likely won't be able to at… 42 …ns that even a provably irreversible hash would not offer protection from a DOS attack in a hashmap 55 …d rounds of AES as opposed to the standard of 10. Things like the SQUARE attack apply to part of t…
|
/external/flatbuffers/tests/FlatBuffers.Test.Swift/Tests/FlatBuffers.Test.SwiftTests/ |
D | FlatBuffersUnionTests.swift | 108 let attack = Attacker.endAttacker(&fb, start: attackStart) in testUnionVector() variable 114 attack, in testUnionVector() 220 let attack = Attacker.endAttacker(&fb, start: attackStart) in testEncoding() variable 226 attack, in testEncoding()
|