HomeSort by relevance Sort by last modified time
    Searched full:attacker (Results 26 - 50 of 137) sorted by null

12 3 4 5 6

  /external/clang/lib/StaticAnalyzer/Checkers/
MallocOverflowSecurityChecker.cpp 12 // code looks like 'malloc (n * 4)', and an attacker can make 'n' be
17 // the heap, probably allowing the attacker to execute arbitrary code.
  /external/chromium/chrome/browser/
external_protocol_handler.cc 42 // than to let an attacker format the user's hard drive.
  /external/chromium/chrome/common/
visitedlink_common.h 42 // a salt value for the links on one computer so that an attacker can not
  /external/chromium/net/base/
net_error_list.h 239 // 1. An attacker has redirected our traffic to his server and is
255 // 1. An attacker is presenting an old certificate for which he has
267 // 1. An attacker has substituted the real certificate for a cert that
295 // 1. An attacker has compromised the private key in the certificate and is
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
npapi.html 95 a vulnerability, an attacker might be able to exploit that vulnerability
contentSecurityPolicy.html 217 attacker from maliciously redirecting your request for a resource.
273 network attacker. As <a
  /external/chromium_org/components/visitedlink/common/
visitedlink_common.h 43 // a salt value for the links on one computer so that an attacker can not
  /external/chromium_org/net/base/
net_error_list.h 317 // 1. An attacker has redirected our traffic to his server and is
333 // 1. An attacker is presenting an old certificate for which he has
345 // 1. An attacker has substituted the real certificate for a cert that
373 // 1. An attacker has compromised the private key in the certificate and is
  /external/chromium_org/net/http/
transport_security_persister.h 97 // trivially reveal a user's browsing history to an attacker reading the
  /external/chromium_org/net/url_request/
url_request_throttler_simulation_unittest.cc 506 Requester* attacker = new Requester(throttler_entry.get(), local
510 attacker->SetStartupJitter(TimeDelta::FromSeconds(120));
511 requesters.push_back(attacker);
512 simulation.AddActor(attacker);
  /external/chromium_org/third_party/WebKit/Source/core/timing/
MemoryInfo.cpp 85 // We quantize the sizes to make it more difficult for an attacker to see precise
  /external/chromium_org/third_party/tlslite/tlslite/
errors.py 18 is closed without this, it could signify that an attacker is trying
  /frameworks/base/services/java/com/android/server/
EntropyMixer.java 141 * attacker.
  /libcore/luni/src/main/java/java/util/
Random.java 27 * that value is more predictable to an attacker than the default seed.
  /external/chromium_org/chrome/app/resources/
google_chrome_strings_en-GB.xtb 7 <translation id="8485767968786176057">In this case, the address listed in the certificate does not match the address of the website that your browser tried to go to. One possible reason for this is that your communications are being intercepted by an attacker who is presenting a certificate for a different website, which would cause a mismatch. Another possible reason is that the server is set up to return the same certificate for multiple websites, including the one you are attempting to visit, even though that certificate is not valid for all of those websites. Google Chrome can say for sure that you reached &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt;, but cannot verify that that is the same site as &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt; which you intended to reach. If you proceed, Chrome will not check for any further name mismatches.</translation>
66 <translation id="6423071462708908582">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented an expired certificate. No information is available to indicate whether that certificate has been compromised since its expiration. This means Google Chrome cannot guarantee that you are communicating with &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt; and not an attacker. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct the error and refresh this page.</translation>
81 <translation id="8684521613357479262">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate that is not yet valid. No information is available to indicate whether that certificate can be trusted. Google Chrome cannot reliably guarantee that you are communicating with &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt; and not an attacker. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct your system's clock and then refresh this page.</translation>
97 <translation id="6557998774620459028">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate issued by an entity that is not trusted by your computer's operating system. This may mean that the server has generated its own security credentials, which Chrome cannot rely on for identity information, or an attacker may be trying to intercept your communications.</translation>
115 <translation id="1786477462680638703">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate issued by an entity that is not trusted by Google Chrome. This may mean that the server has generated its own security credentials, which Chrome cannot rely on for identity information, or an attacker may be trying to intercept your communications.</translation>
  /external/chromium/chrome/common/extensions/docs/static/
messaging.html 254 // JSON.parse does not evaluate the attacker's scripts.
261 // innerText does not let the attacker inject HTML elements.
  /external/chromium_org/sandbox/linux/services/
broker_process.cc 491 // attacker-controlled file name, even if an attacker managed to fool the
  /external/chromium_org/chrome/browser/external_protocol/
external_protocol_handler.cc 165 // than to let an attacker format the user's hard drive.
  /external/chromium_org/net/quic/crypto/
strike_register.h 21 // tree, an attacker could send us a series of values which stretch out one
  /external/chromium_org/third_party/openssl/openssl/patches/
aead_support.patch 748 +tags increases an attacker's chance of creating a valid forgery. Be aware that
749 +the attacker's chance may increase more than exponentially as would naively be
775 +repeat nonces and the possibility that an attacker could duplicate, reorder or
778 +long as the number of chunks was securely transmitted. (Otherwise an attacker
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 13 it would be for potential attacker to conduct brute-force discovery of
  /external/chromium/chrome/common/extensions/docs/
xhr.html 448 // JSON.parse does not evaluate the attacker's scripts.
460 // innerText does not let the attacker inject HTML elements.
468 extension is used on a hostile network, an network attacker (aka a <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">"man-in-the-middle"</a>)
  /external/chromium_org/chrome/browser/notifications/
desktop_notifications_unittest.cc 347 // After the first, all the notifications are from attacker.com.
350 odd_params.origin = GURL("attacker.com");
352 // Show the only non-attacker.com notification.
  /external/bluetooth/bluedroid/stack/gatt/
gatt_auth.c 116 /* if this is a bad signature, assume from attacker, ignore it */
  /external/chromium/chrome/browser/password_manager/
login_database_unittest.cc 131 // by an attacker who presents an invalid SSL cert.

Completed in 1267 milliseconds

12 3 4 5 6