Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 223) sorted by relevance

123456789

/external/curl/tests/data/
Dtest4426 # "attack.invalid", "TRUE", "/", "FALSE", "0",
41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b log/cookie%TESTNUMBER --resolve attack.invalid:%…
44 attack.invalid TRUE / FALSE 0 name1 could-be-large-1
45 attack.invalid TRUE / FALSE 0 name2 could-be-large-2
46 attack.invalid TRUE / FALSE 0 name3 could-be-large-3
47 attack.invalid TRUE / FALSE 0 name4 could-be-large-4
48 attack.invalid TRUE / FALSE 0 name5 could-be-large-5
49 attack.invalid TRUE / FALSE 0 name6 could-be-large-6
50 attack.invalid TRUE / FALSE 0 name7 could-be-large-7
51 attack.invalid TRUE / FALSE 0 name8 could-be-large-8
[all …]
Dtest444119 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -c log/cookie%TESTNUMBER --resolve attack.invalid:%…
131 Host: attack.invalid:%HTTPPORT
141 attack.invalid FALSE /a/b/ FALSE 0 cookie-50 yes
142 attack.invalid FALSE /a/b/ FALSE 0 cookie-49 yes
143 attack.invalid FALSE /a/b/ FALSE 0 cookie-48 yes
144 attack.invalid FALSE /a/b/ FALSE 0 cookie-47 yes
145 attack.invalid FALSE /a/b/ FALSE 0 cookie-46 yes
146 attack.invalid FALSE /a/b/ FALSE 0 cookie-45 yes
147 attack.invalid FALSE /a/b/ FALSE 0 cookie-44 yes
148 attack.invalid FALSE /a/b/ FALSE 0 cookie-43 yes
[all …]
Dtest4436 # "attack.invalid", "TRUE", "/", "FALSE", "0",
41 http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER -b log/cookie%TESTNUMBER --resolve attack.invalid:%…
44 attack.invalid TRUE / FALSE 0 huge-1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
45 attack.invalid TRUE / FALSE 0 huge-2 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
46 attack.invalid TRUE / FALSE 0 huge-3 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
47 attack.invalid TRUE / FALSE 0 huge-4 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
48 attack.invalid TRUE / FALSE 0 huge-5 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
49 attack.invalid TRUE / FALSE 0 huge-6 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
50 attack.invalid TRUE / FALSE 0 huge-7 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
51 attack.invalid TRUE / FALSE 0 huge-8 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
[all …]
Dtest41420 Location: http://attack.invalid:%HTTPPORT/a/b/%TESTNUMBER0002
30 Set-Cookie: SESSIONID=hacker; domain=attack.invalid;
32 Location: https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER0003
58 https://attack.invalid:%HTTPSPORT/a/b/%TESTNUMBER -k -c log/cookie%TESTNUMBER --resolve attack.inva…
67 Host: attack.invalid:%HTTPSPORT
72 Host: attack.invalid:%HTTPPORT
77 Host: attack.invalid:%HTTPSPORT
/external/aac/libPCMutils/src/
Dlimiter.cpp116 unsigned int attack, release; in pcmLimiter_Create() local
121 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in pcmLimiter_Create()
129 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in pcmLimiter_Create()
131 (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in pcmLimiter_Create()
139 exponent = invFixp(attack + 1); in pcmLimiter_Create()
152 limiter->attack = attack; in pcmLimiter_Create()
180 unsigned int attack = limiter->attack; in pcmLimiter_Apply() local
195 scaleValuesSaturate(delayBuf, attack * channels, in pcmLimiter_Apply()
197 scaleValuesSaturate(maxBuf, attack + 1, limiter->scaling - scaling); in pcmLimiter_Apply()
240 for (j = 1; j <= attack; j++) { in pcmLimiter_Apply()
[all …]
/external/libxaac/decoder/drc_src/
Dimpd_drc_peak_limiter.c39 UWORD32 attack; in impd_peak_limiter_init() local
40 attack = (UWORD32)(attack_time * sample_rate / 1000); in impd_peak_limiter_init()
42 if (attack < 1) return 0; in impd_peak_limiter_init()
45 peak_limiter->delayed_input = buffer + attack * 4 + 32; in impd_peak_limiter_init()
50 peak_limiter->attack_time_samples = attack; in impd_peak_limiter_init()
51 peak_limiter->attack_constant = (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_peak_limiter_init()
Dimpd_drc_parametric_dec.c215 UWORD32 attack, sec_len; in impd_init_parametric_drc_lim() local
252 attack = (UWORD32)(hParametricDrcTypeLimBs->parametric_lim_attack * in impd_init_parametric_drc_lim()
255 sec_len = (UWORD32)sqrt(attack + 1); in impd_init_parametric_drc_lim()
258 pstr_parametric_lim_type_drc_params->num_max_buf_sec = (attack + 1) / sec_len; in impd_init_parametric_drc_lim()
260 (attack + 1)) in impd_init_parametric_drc_lim()
272 pstr_parametric_lim_type_drc_params->attack = attack; in impd_init_parametric_drc_lim()
274 (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_init_parametric_drc_lim()
1044 WORD32 attack_time_samples = pstr_parametric_lim_type_drc_params->attack; in impd_parametric_lim_type_drc_process()
/external/python/cpython2/Lib/test/
Dtest_fpformat.py72 attack = '+0' + ('0' * 1000000) + '++'
76 self.assertEqual(fpformat.fix(attack, digs), attack)
79 fpformat.sci(attack, digs)
/external/aac/libAACenc/src/
Dblock_switch.cpp250 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching()
275 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching()
292 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching()
305 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching()
312 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching()
315 if ((blockSwitchingControl->attack == FALSE) && in FDKaacEnc_BlockSwitching()
323 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching()
331 [blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching()
336 chgWndSq[blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching()
/external/libxaac/decoder/
Dixheaacd_peak_limiter.c48 UWORD32 attack; in ixheaacd_peak_limiter_init() local
50 attack = (UWORD32)(DEFAULT_ATTACK_TIME_MS * sample_rate / 1000); in ixheaacd_peak_limiter_init()
51 *delay_in_samples = attack; in ixheaacd_peak_limiter_init()
53 if (attack < 1) return 0; in ixheaacd_peak_limiter_init()
58 peak_limiter->delayed_input = buffer + attack * 4 + 32; in ixheaacd_peak_limiter_init()
63 peak_limiter->attack_time_samples = attack; in ixheaacd_peak_limiter_init()
64 peak_limiter->attack_constant = (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in ixheaacd_peak_limiter_init()
/external/libevent/test/
Dregress_rpc.c737 struct kill *attack = NULL; in rpc_test() local
751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test()
755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test()
756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test()
758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test()
809 !EVTAG_HAS(msg2, attack)) { in rpc_test()
813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test()
860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test()
864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
Dregress.rpc6 optional struct[kill] attack = 3;
/external/jackson-databind/src/test/java/com/fasterxml/jackson/databind/jsontype/ext/
DExternalTypeIdWithCreatorTest.java23 public Attack attack; field in ExternalTypeIdWithCreatorTest.Character
95 assertNotNull(character.attack); in testFails()
106 assertNotNull(character.attack); in testWorks()
/external/rust/crates/codespan-reporting/tests/snapshots/
Dterm__tabbed__tab_width_6_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
Dterm__tabbed__tab_width_default_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
Dterm__tabbed__tab_width_3_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
/external/libwebsockets/scripts/
Dtravis_control.sh19 ../scripts/attack.sh &&
44 ../scripts/attack.sh
/external/python/cpython3/Doc/library/
Dxml.rst87 The `Billion Laughs`_ attack -- also known as exponential entity expansion --
94 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses
96 with a couple of thousand chars over and over again. The attack isn't as
118 all known attack vectors with examples and references.
/external/wycheproof/doc/
Drsa.md45 information leakage. Smart even describes an attack that only needs about 40
62 Due to the nature of unit tests not every attack can be detected this way. Some
73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are
74 implementations that were susceptible to Mangers attack, e.g. [CVE-2012-5081].
104 \[M01]: J. Manger, "A chosen ciphertext attack on RSA optimal asymmetric
106 paper shows that OAEP is susceptible to a chosen ciphertext attack if error
/external/python/cpython2/Doc/library/
Dxml.rst77 The `Billion Laughs`_ attack -- also known as exponential entity expansion --
84 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses
86 with a couple of thousand chars over and over again. The attack isn't as
109 all known attack vectors with examples and references.
/external/webrtc/modules/audio_processing/test/py_quality_assessment/quality_assessment/
Dsound_level.cc71 const float attack = in main() local
111 level_prev = smooth(level_curr > level_prev ? attack : decay); in main()
/external/replicaisland/src/com/replica/replicaisland/
DGameObjectFactory.java1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2);
1389 attack.addFrame(new AnimationFrame(
1392 attack.addFrame(new AnimationFrame(
1401 staticData.add(attack);
1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal());
1473 if (attack != null) {
1474 gun.setDelayBeforeFirstSet(attack.getLength());
1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10);
1597 attack.addFrame(attack1);
1598 attack.addFrame(attack2);
[all …]
/external/cronet/third_party/libevent/test/
Dregress.rpc6 optional struct[kill] attack = 3;
/external/rust/crates/ahash/
DFAQ.md10 … hashes such as murmurhash confidence in their quality, but could be undone by a deliberate attack.
20 …ame input. - This means that if there is a way to attack one of them it likely won't be able to at…
42 …ns that even a provably irreversible hash would not offer protection from a DOS attack in a hashmap
55 …d rounds of AES as opposed to the standard of 10. Things like the SQUARE attack apply to part of t…
/external/flatbuffers/tests/FlatBuffers.Test.Swift/Tests/FlatBuffers.Test.SwiftTests/
DFlatBuffersUnionTests.swift108 let attack = Attacker.endAttacker(&fb, start: attackStart) in testUnionVector() variable
114 attack, in testUnionVector()
220 let attack = Attacker.endAttacker(&fb, start: attackStart) in testEncoding() variable
226 attack, in testEncoding()

123456789