HomeSort by relevance Sort by last modified time
    Searched full:attacker (Results 1 - 25 of 137) sorted by null

1 2 3 4 5 6

  /external/chromium_org/crypto/
secure_util.h 18 // expose side-channel information about input, allowing an attacker to
21 // so as to not to reveal to the attacker where the difference(s) are.
p224_spake.h 19 // The password can be low entropy as authenticating with an attacker only
20 // gives the attacker a one-shot password oracle. No other information about
  /external/dropbear/libtomcrypt/notes/
tech0002.txt 8 A timing attack is when an attacker can observe a side channel of the device (in this case time). In this tech note
9 we consider only non-intrusive timing attacks with respect to online computations. That is an attacker can
16 the exponent require the sender to perform a multiplication. This means to a certain extent an attacker can
17 determine not only the magnitude of 'x' but the number of one bits. With this information the attacker cannot directly
46 Note that this "quick" fix has no effect against an intrusive attacker. For example, power consumption will drop
49 device and performing side-channel cryptanalysis. An attacker over a network might try to use the timing information
tech0004.txt 22 put them to use. This PRNG while simple is not entirely safe. An attacker who learns the state
23 of the pool and can control future events can control the PRNG. This requires an active attacker but
48 Now this may seem odd at first however there is a good reason behind it. An attacker who learns pool[0] won't
tech0001.txt 12 deterministic state of the PRNG is not known or predetermined with respect to an attacker.
  /external/replicaisland/src/com/replica/replicaisland/
CollisionParameters.java 30 public final static int COLLECT = 3; // Causes collectable objects to be collected by the attacker.
32 public final static int DEPRESS = 5; // A hit indicating that the attacker is pressing into the victim.
33 public final static int LAUNCH = 6; // A hit indicating that the attacker will launch the victim.
HitReactionComponent.java 149 public boolean receivedHit(GameObject parent, GameObject attacker, int hitType) {
173 final boolean sameTeam = (parent.team == attacker.team && parent.team != Team.NONE);
180 newVelocity.subtract(attacker.getPosition());
205 InventoryComponent attackerInventory = attacker.findByClass(InventoryComponent.class);
215 if (mPossessionComponent != null && parent.life > 0 && attacker.life > 0) {
  /external/chromium_org/base/process/
memory_win.cc 20 // address 0 for an attacker to utilize.
memory_linux.cc 55 // attacker controlled, then the attacker can direct the code to access any
  /external/chromium_org/extensions/common/
csp_validator.h 26 // network attacker.
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
  /external/chromium/chrome/common/extensions/docs/static/
xhr.html 136 // JSON.parse does not evaluate the attacker's scripts.
148 // innerText does not let the attacker inject HTML elements.
156 extension is used on a hostile network, an network attacker (aka a <a
npapi.html 88 a vulnerability, an attacker might be able to exploit that vulnerability
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
xhr.html 126 // JSON.parse does not evaluate the attacker's scripts.
137 // innerText does not let the attacker inject HTML elements.
145 extension is used on a hostile network, an network attacker (aka a <a
activeTab.html 84 Without <code>activeTab</code>, this extension would need to request full, persistent access to every web site, just so that it could do its work if it happened to be called upon by the user. This is a lot of power to entrust to such a simple extension. And if the extension is ever compromised, the attacker gets access to everything the extension had.
88 In contrast, an extension with the <code>activeTab</code> permission only obtains access to a tab in response to an explicit user gesture. If the extension is compromised the attacker would need to wait for the user to invoke the extension before obtaining access. And that access only lasts until the tab is navigated or closed.
  /external/chromium_org/content/browser/ssl/
ssl_manager.cc 203 // HTTPS. This is because the network attacker can redirect the
204 // HTTP request to https://attacker.com/payload.js.
  /external/chromium_org/net/quic/
quic_utils.cc 144 // frame sent by the peer (attacker) has invalid error code.
213 // frame sent by the peer (attacker) has invalid error code.
  /docs/source.android.com/src/devices/tech/security/
enhancements43.jd 29 ADB where the attacker has physical access to a device.</li>
  /external/chromium/chrome/browser/
plugin_download_helper.cc 63 // attacker can't drop a symlink etc into place.
  /external/chromium/net/http/
http_proxy_client_socket.cc 184 // an active network attacker. We don't worry about this for HTTP
185 // because an active network attacker can already control HTTP sessions.
438 // attacker can force us into this state by masquerading as the proxy.
445 // active network attacker.
  /external/chromium_org/net/http/
http_proxy_client_socket.cc 219 // an active network attacker. We don't worry about this for HTTP
220 // because an active network attacker can already control HTTP sessions.
461 // attacker can force us into this state by masquerading as the proxy.
488 // active network attacker.
  /external/chromium_org/third_party/launchpad_translations/
chromium_strings_en-AU.xtb 12 <translation id="205900032229966545">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented an expired certificate. No information is available to indicate whether that certificate has been compromised since its expiration. This means Chromium cannot guarantee that you are communicating with &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt; and not an attacker. You should not proceed.</translation>
20 <translation id="2682584270762546522">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate that is not yet valid. No information is available to indicate whether that certificate can be trusted. Chromium cannot reliably guarantee that you are communicating with &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt; and not an attacker. You should ensure that your clock and time zone are set correctly on your computer. If they are not, you should correct any issues and refresh this page. If they are correct, you should not proceed.</translation>
56 <translation id="4890456338028740446">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate issued by an entity that is not trusted by your computer's operating system. This may mean that the server has generated its own security credentials, which Chromium cannot rely on for identity information, or an attacker may be trying to intercept your communications. You should not proceed, &lt;strong&gt;especially&lt;/strong&gt; if you have never seen this warning before for this site.</translation>
57 <translation id="4931128279570440880">In this case, the address listed in the certificate does not match the address of the website your browser tried to go to. One possible reason for this is that your communications are being intercepted by an attacker who is presenting a certificate for a different website, which would cause a mismatch. Another possible reason is that the server is set up to return the same certificate for multiple websites, including the one you are attempting to visit, even though that certificate is not valid for all of those websites. Chromium can say for sure that you reached &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt;, but cannot verify that that is the same site as &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt; which you intended to reach. If you proceed, Chromium will not check for any further name mismatches. In general, it is best not to proceed past this point.</translation>
  /external/chromium/chrome/browser/ssl/
ssl_manager.cc 241 // HTTPS. This is because the network attacker can redirect the
242 // HTTP request to https://attacker.com/payload.js.
  /frameworks/base/docs/html/google/play/billing/
billing_best_practices.jd 56 <p>You should obfuscate your In-app Billing code so it is difficult for an attacker to reverse
78 which means it is relatively easy for an attacker to reverse engineer your application if you use
  /external/chromium_org/chrome/app/resources/
chromium_strings_en-GB.xtb 62 <translation id="7771626876550251690">In this case, the address listed in the certificate does not match the address of the website your browser tried to go to. One possible reason for this is that your communications are being intercepted by an attacker who is presenting a certificate for a different website, which would cause a mismatch. Another possible reason is that the server is set up to return the same certificate for multiple websites, including the one you are attempting to visit, even though that certificate is not valid for all of those websites. Chromium can say for sure that you reached &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt;, but cannot verify that that is the same site as &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt; which you intended to reach. If you proceed, Chromium will not check for any further name mismatches.</translation>
89 <translation id="118298050220780080">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate issued by an entity that is not trusted by your computer's operating system. This may mean that the server has generated its own security credentials, which Chromium cannot rely on for identity information, or an attacker may be trying to intercept your communications.</translation>
188 <translation id="3249425904492147663">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented an expired certificate. No information is available to indicate whether that certificate has been compromised since its expiration. This means Chromium cannot guarantee that you are communicating with &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt; and not an attacker. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct the error and refresh this page.</translation>
210 <translation id="6240281849816458190">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate that is not yet valid. No information is available to indicate whether that certificate can be trusted. Chromium cannot reliably guarantee that you are communicating with &lt;strong&gt;<ph name="DOMAIN2"/>&lt;/strong&gt; and not an attacker. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct your system's clock and then refresh this page.</translation>
217 <translation id="4019464536895378627">You attempted to reach &lt;strong&gt;<ph name="DOMAIN"/>&lt;/strong&gt;, but the server presented a certificate issued by an entity that is not trusted by Chromium. This may mean that the server has generated its own security credentials, which Chromium cannot rely on for identity information, or an attacker may be trying to intercept your communications.</translation>

Completed in 423 milliseconds

1 2 3 4 5 6