OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:attacker
(Results
26 - 50
of
137
) sorted by null
1
2
3
4
5
6
/external/clang/lib/StaticAnalyzer/Checkers/
MallocOverflowSecurityChecker.cpp
12
// code looks like 'malloc (n * 4)', and an
attacker
can make 'n' be
17
// the heap, probably allowing the
attacker
to execute arbitrary code.
/external/chromium/chrome/browser/
external_protocol_handler.cc
42
// than to let an
attacker
format the user's hard drive.
/external/chromium/chrome/common/
visitedlink_common.h
42
// a salt value for the links on one computer so that an
attacker
can not
/external/chromium/net/base/
net_error_list.h
239
// 1. An
attacker
has redirected our traffic to his server and is
255
// 1. An
attacker
is presenting an old certificate for which he has
267
// 1. An
attacker
has substituted the real certificate for a cert that
295
// 1. An
attacker
has compromised the private key in the certificate and is
/external/chromium_org/chrome/common/extensions/docs/templates/articles/
npapi.html
95
a vulnerability, an
attacker
might be able to exploit that vulnerability
contentSecurityPolicy.html
217
attacker
from maliciously redirecting your request for a resource.
273
network
attacker
. As <a
/external/chromium_org/components/visitedlink/common/
visitedlink_common.h
43
// a salt value for the links on one computer so that an
attacker
can not
/external/chromium_org/net/base/
net_error_list.h
317
// 1. An
attacker
has redirected our traffic to his server and is
333
// 1. An
attacker
is presenting an old certificate for which he has
345
// 1. An
attacker
has substituted the real certificate for a cert that
373
// 1. An
attacker
has compromised the private key in the certificate and is
/external/chromium_org/net/http/
transport_security_persister.h
97
// trivially reveal a user's browsing history to an
attacker
reading the
/external/chromium_org/net/url_request/
url_request_throttler_simulation_unittest.cc
506
Requester*
attacker
= new Requester(throttler_entry.get(),
local
510
attacker
->SetStartupJitter(TimeDelta::FromSeconds(120));
511
requesters.push_back(
attacker
);
512
simulation.AddActor(
attacker
);
/external/chromium_org/third_party/WebKit/Source/core/timing/
MemoryInfo.cpp
85
// We quantize the sizes to make it more difficult for an
attacker
to see precise
/external/chromium_org/third_party/tlslite/tlslite/
errors.py
18
is closed without this, it could signify that an
attacker
is trying
/frameworks/base/services/java/com/android/server/
EntropyMixer.java
141
*
attacker
.
/libcore/luni/src/main/java/java/util/
Random.java
27
* that value is more predictable to an
attacker
than the default seed.
/external/chromium_org/chrome/app/resources/
google_chrome_strings_en-GB.xtb
7
<translation id="8485767968786176057">In this case, the address listed in the certificate does not match the address of the website that your browser tried to go to. One possible reason for this is that your communications are being intercepted by an
attacker
who is presenting a certificate for a different website, which would cause a mismatch. Another possible reason is that the server is set up to return the same certificate for multiple websites, including the one you are attempting to visit, even though that certificate is not valid for all of those websites. Google Chrome can say for sure that you reached <strong><ph name="DOMAIN2"/></strong>, but cannot verify that that is the same site as <strong><ph name="DOMAIN"/></strong> which you intended to reach. If you proceed, Chrome will not check for any further name mismatches.</translation>
66
<translation id="6423071462708908582">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented an expired certificate. No information is available to indicate whether that certificate has been compromised since its expiration. This means Google Chrome cannot guarantee that you are communicating with <strong><ph name="DOMAIN2"/></strong> and not an
attacker
. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct the error and refresh this page.</translation>
81
<translation id="8684521613357479262">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate that is not yet valid. No information is available to indicate whether that certificate can be trusted. Google Chrome cannot reliably guarantee that you are communicating with <strong><ph name="DOMAIN2"/></strong> and not an
attacker
. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct your system's clock and then refresh this page.</translation>
97
<translation id="6557998774620459028">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate issued by an entity that is not trusted by your computer's operating system. This may mean that the server has generated its own security credentials, which Chrome cannot rely on for identity information, or an
attacker
may be trying to intercept your communications.</translation>
115
<translation id="1786477462680638703">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate issued by an entity that is not trusted by Google Chrome. This may mean that the server has generated its own security credentials, which Chrome cannot rely on for identity information, or an
attacker
may be trying to intercept your communications.</translation>
/external/chromium/chrome/common/extensions/docs/static/
messaging.html
254
// JSON.parse does not evaluate the
attacker
's scripts.
261
// innerText does not let the
attacker
inject HTML elements.
/external/chromium_org/sandbox/linux/services/
broker_process.cc
491
//
attacker
-controlled file name, even if an
attacker
managed to fool the
/external/chromium_org/chrome/browser/external_protocol/
external_protocol_handler.cc
165
// than to let an
attacker
format the user's hard drive.
/external/chromium_org/net/quic/crypto/
strike_register.h
21
// tree, an
attacker
could send us a series of values which stretch out one
/external/chromium_org/third_party/openssl/openssl/patches/
aead_support.patch
748
+tags increases an
attacker
's chance of creating a valid forgery. Be aware that
749
+the
attacker
's chance may increase more than exponentially as would naively be
775
+repeat nonces and the possibility that an
attacker
could duplicate, reorder or
778
+long as the number of chunks was securely transmitted. (Otherwise an
attacker
/external/ipsec-tools/src/racoon/doc/
README.plainrsa
13
it would be for potential
attacker
to conduct brute-force discovery of
/external/chromium/chrome/common/extensions/docs/
xhr.html
448
// JSON.parse does not evaluate the
attacker
's scripts.
460
// innerText does not let the
attacker
inject HTML elements.
468
extension is used on a hostile network, an network
attacker
(aka a <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">"man-in-the-middle"</a>)
/external/chromium_org/chrome/browser/notifications/
desktop_notifications_unittest.cc
347
// After the first, all the notifications are from
attacker
.com.
350
odd_params.origin = GURL("
attacker
.com");
352
// Show the only non-
attacker
.com notification.
/external/bluetooth/bluedroid/stack/gatt/
gatt_auth.c
116
/* if this is a bad signature, assume from
attacker
, ignore it */
/external/chromium/chrome/browser/password_manager/
login_database_unittest.cc
131
// by an
attacker
who presents an invalid SSL cert.
Completed in 1267 milliseconds
1
2
3
4
5
6