/external/openssh/ |
sshd_config.5 | 1106 display server may be exposed to attack when the SSH client requests 1112 protect clients that may expose themselves to attack by unwittingly [all...] |
/external/openssl/crypto/aes/asm/ |
aes-586.pl | 145 # input to block function is distributed *uniformly*, then attack 151 # combinations then attack becomes infeasible. This is why revised 165 # cache state. For this attack to be efficient attacker would have to 170 # statistical data to mount the attack. It's probably appropriate to 171 # say that if adeversary reckons that this attack is beneficial and 174 # to preclude/mitigate this attack by overall system security design. 176 # this kind of attack to be feasible, interrupt rate has to be high 182 # Intel P4. Recall that asynchronous attack implies that malicious [all...] |
/external/quake/quake/src/QW/progs/ |
weapons.qc | 986 An attack impulse can be triggered now
1374 // check for attack
|
/dalvik/docs/ |
dexopt.html | 196 faulty bytecode is far from the easiest line of attack. The ODEX file has
|
/external/chromium/chrome/browser/resources/ntp/ |
most_visited.js | 582 // XSS attack but setting style.backgroundImage = 'url(javascript:...)'
|
/external/chromium/chrome/common/extensions/docs/ |
npapi.html | 407 Marking your NPAPI plugin "public" increase the attack surface of your
|
xhr.html | 469 could modify the response and, potentially, attack your extension. Instead,
|
/external/chromium/chrome/common/extensions/docs/static/ |
content_scripts.html | 357 to attack your content script if you use content from the web page
|
/external/chromium/net/base/ |
sdch_manager.cc | 438 // TODO(jar): Remove these hacks to preclude a DOS attack involving piles of
|
/external/chromium/net/http/ |
http_auth_gssapi_posix.cc | 826 // Replays could indicate an attack.
|
/external/chromium/third_party/libevent/test/ |
regress.gen.c | 335 event_warnx("%s: failed to unmarshal attack", __func__);
|
/external/dbus/dbus/ |
dbus-keyring.c | 877 * all of which might allow some kind of attack
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
KnownHosts.java | 679 * (man-in-the-middle attack?)</li>
|
/external/ipsec-tools/src/racoon/ |
grabmyaddr.c | 693 * wildcard address, you'll be in trouble (DoS attack possible by
|
/external/libselinux/src/ |
avc.c | 553 * every 5secs to make a denial-of-service attack impossible.
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
PipelinedMsgParser.java | 316 // him. This prevents DOS attack
|
/external/openssl/include/openssl/ |
ssl3.h | 407 * attack where the client handshakes in a loop using SGC to
|
/external/openssl/ssl/ |
ssl3.h | 407 * attack where the client handshakes in a loop using SGC to
|
/external/qemu/ |
qemu-sockets.c | 566 * worst case possible is bind() failing, i.e. a DoS attack.
|
/external/quake/quake/src/QW/client/ |
gl_vidlinux.c | 85 {"mouse1","+attack"},
|
gl_vidlinux_svga.c | 83 {"mouse1","+attack"},
|
gl_vidlinux_x11.c | 59 {"mouse1","+attack"},
|
vid_svgalib.c | 85 {"mouse1","+attack"},
|
/external/quake/quake/src/WinQuake/ |
gl_vidandroid.cpp | 17 CVAR2("mouse1","+attack"),
|
gl_vidlinux.cpp | 84 {"mouse1","+attack"},
|