/external/quake/quake/src/WinQuake/ |
vid_svgalib.cpp | 85 {"mouse1","+attack"},
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_read.c | 508 * Note: To avoid Bleichenbacher attack, we do not report decryption or
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pwd.c | 760 wpa_printf(MSG_INFO, "EAP-pwd: Buffer overflow attack "
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 526 * Note: To avoid Bleichenbacher attack, we do not report decryption or
|
/gdk/samples/quake/jni/ |
gl_vidandroid.cpp | 17 CVAR2("mouse1","+attack"),
|
/external/openssl/crypto/aes/asm/ |
aes-sparcv9.pl | 12 # cache-timing attack. This is [currently and initially!] addressed in 19 # Version 1.1 prefetches T[ed]4 in order to mitigate attack on last
|
/external/openssl/ssl/ |
t1_lib.c | [all...] |
s2_srvr.c | 473 * random master secret (Bleichenbacher attack) */
|
s3_srvr.c | 1133 * attack: CVE-2010-4180. [all...] |
/ndk/docs/opensles/ |
index.html | [all...] |
/external/chromium/chrome/common/extensions/docs/static/ |
faq.html | 336 attack your extension in order to get access to your extension's increased
|
/external/chromium/net/ftp/ |
ftp_network_transaction.cc | 41 // Protect agains newline injection attack. [all...] |
/external/dnsmasq/src/ |
forward.c | 437 my_syslog(LOG_WARNING, _("possible DNS-rebind attack detected"));
|
/external/libxml2/ |
dict.c | 36 * well but since the attack is based on growing a very big hash
|
/external/openssh/ |
serverloop.c | 1025 packet_disconnect("Possible attack: attempt to open a session " [all...] |
/external/openssl/crypto/bn/ |
bn_exp.c | 678 * specifically optimization of cache-timing attack countermeasures
|
/external/sonivox/arm-wt-22k/lib_src/ |
eas_mdls.c | 325 -32768, /* EG1 attack time: 0 secs */ 331 0, /* EG1 velocity to attack: 0 time cents */ 336 -32768, /* EG2 attack time: 0 secs */ 341 0, /* EG2 velocity to attack: 0 time cents */ [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pwd.c | 908 "attack detected! (%d+%d > %d)",
|
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 561 // See bug 1092107: large argc can be used for a DOS attack [all...] |
/docs/source.android.com/src/tech/security/ |
index.md | 29 impact of the attack in the event it was successful. [all...] |
/external/chromium/chrome/common/extensions/docs/ |
content_scripts.html | 716 to attack your content script if you use content from the web page [all...] |
faq.html | 647 attack your extension in order to get access to your extension's increased [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_mac.cc | [all...] |
ssl_client_socket_win.cc | [all...] |
/external/dnsmasq/po/ |
de.po | 840 msgid "possible DNS-rebind attack detected"
|