OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:attacker
(Results
1 - 25
of
137
) sorted by null
1
2
3
4
5
6
/external/chromium_org/crypto/
secure_util.h
18
// expose side-channel information about input, allowing an
attacker
to
21
// so as to not to reveal to the
attacker
where the difference(s) are.
p224_spake.h
19
// The password can be low entropy as authenticating with an
attacker
only
20
// gives the
attacker
a one-shot password oracle. No other information about
/external/dropbear/libtomcrypt/notes/
tech0002.txt
8
A timing attack is when an
attacker
can observe a side channel of the device (in this case time). In this tech note
9
we consider only non-intrusive timing attacks with respect to online computations. That is an
attacker
can
16
the exponent require the sender to perform a multiplication. This means to a certain extent an
attacker
can
17
determine not only the magnitude of 'x' but the number of one bits. With this information the
attacker
cannot directly
46
Note that this "quick" fix has no effect against an intrusive
attacker
. For example, power consumption will drop
49
device and performing side-channel cryptanalysis. An
attacker
over a network might try to use the timing information
tech0004.txt
22
put them to use. This PRNG while simple is not entirely safe. An
attacker
who learns the state
23
of the pool and can control future events can control the PRNG. This requires an active
attacker
but
48
Now this may seem odd at first however there is a good reason behind it. An
attacker
who learns pool[0] won't
tech0001.txt
12
deterministic state of the PRNG is not known or predetermined with respect to an
attacker
.
/external/replicaisland/src/com/replica/replicaisland/
CollisionParameters.java
30
public final static int COLLECT = 3; // Causes collectable objects to be collected by the
attacker
.
32
public final static int DEPRESS = 5; // A hit indicating that the
attacker
is pressing into the victim.
33
public final static int LAUNCH = 6; // A hit indicating that the
attacker
will launch the victim.
HitReactionComponent.java
149
public boolean receivedHit(GameObject parent, GameObject
attacker
, int hitType) {
173
final boolean sameTeam = (parent.team ==
attacker
.team && parent.team != Team.NONE);
180
newVelocity.subtract(
attacker
.getPosition());
205
InventoryComponent attackerInventory =
attacker
.findByClass(InventoryComponent.class);
215
if (mPossessionComponent != null && parent.life > 0 &&
attacker
.life > 0) {
/external/chromium_org/base/process/
memory_win.cc
20
// address 0 for an
attacker
to utilize.
memory_linux.cc
55
//
attacker
controlled, then the
attacker
can direct the code to access any
/external/chromium_org/extensions/common/
csp_validator.h
26
// network
attacker
.
/external/libcap-ng/libcap-ng-0.7/utils/
captest.8
9
You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an
attacker
cannot take advantage of it.
/external/chromium/chrome/common/extensions/docs/static/
xhr.html
136
// JSON.parse does not evaluate the
attacker
's scripts.
148
// innerText does not let the
attacker
inject HTML elements.
156
extension is used on a hostile network, an network
attacker
(aka a <a
npapi.html
88
a vulnerability, an
attacker
might be able to exploit that vulnerability
/external/chromium_org/chrome/common/extensions/docs/templates/articles/
xhr.html
126
// JSON.parse does not evaluate the
attacker
's scripts.
137
// innerText does not let the
attacker
inject HTML elements.
145
extension is used on a hostile network, an network
attacker
(aka a <a
activeTab.html
84
Without <code>activeTab</code>, this extension would need to request full, persistent access to every web site, just so that it could do its work if it happened to be called upon by the user. This is a lot of power to entrust to such a simple extension. And if the extension is ever compromised, the
attacker
gets access to everything the extension had.
88
In contrast, an extension with the <code>activeTab</code> permission only obtains access to a tab in response to an explicit user gesture. If the extension is compromised the
attacker
would need to wait for the user to invoke the extension before obtaining access. And that access only lasts until the tab is navigated or closed.
/external/chromium_org/content/browser/ssl/
ssl_manager.cc
203
// HTTPS. This is because the network
attacker
can redirect the
204
// HTTP request to https://
attacker
.com/payload.js.
/external/chromium_org/net/quic/
quic_utils.cc
144
// frame sent by the peer (
attacker
) has invalid error code.
213
// frame sent by the peer (
attacker
) has invalid error code.
/docs/source.android.com/src/devices/tech/security/
enhancements43.jd
29
ADB where the
attacker
has physical access to a device.</li>
/external/chromium/chrome/browser/
plugin_download_helper.cc
63
//
attacker
can't drop a symlink etc into place.
/external/chromium/net/http/
http_proxy_client_socket.cc
184
// an active network
attacker
. We don't worry about this for HTTP
185
// because an active network
attacker
can already control HTTP sessions.
438
//
attacker
can force us into this state by masquerading as the proxy.
445
// active network
attacker
.
/external/chromium_org/net/http/
http_proxy_client_socket.cc
219
// an active network
attacker
. We don't worry about this for HTTP
220
// because an active network
attacker
can already control HTTP sessions.
461
//
attacker
can force us into this state by masquerading as the proxy.
488
// active network
attacker
.
/external/chromium_org/third_party/launchpad_translations/
chromium_strings_en-AU.xtb
12
<translation id="205900032229966545">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented an expired certificate. No information is available to indicate whether that certificate has been compromised since its expiration. This means Chromium cannot guarantee that you are communicating with <strong><ph name="DOMAIN2"/></strong> and not an
attacker
. You should not proceed.</translation>
20
<translation id="2682584270762546522">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate that is not yet valid. No information is available to indicate whether that certificate can be trusted. Chromium cannot reliably guarantee that you are communicating with <strong><ph name="DOMAIN2"/></strong> and not an
attacker
. You should ensure that your clock and time zone are set correctly on your computer. If they are not, you should correct any issues and refresh this page. If they are correct, you should not proceed.</translation>
56
<translation id="4890456338028740446">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate issued by an entity that is not trusted by your computer's operating system. This may mean that the server has generated its own security credentials, which Chromium cannot rely on for identity information, or an
attacker
may be trying to intercept your communications. You should not proceed, <strong>especially</strong> if you have never seen this warning before for this site.</translation>
57
<translation id="4931128279570440880">In this case, the address listed in the certificate does not match the address of the website your browser tried to go to. One possible reason for this is that your communications are being intercepted by an
attacker
who is presenting a certificate for a different website, which would cause a mismatch. Another possible reason is that the server is set up to return the same certificate for multiple websites, including the one you are attempting to visit, even though that certificate is not valid for all of those websites. Chromium can say for sure that you reached <strong><ph name="DOMAIN2"/></strong>, but cannot verify that that is the same site as <strong><ph name="DOMAIN"/></strong> which you intended to reach. If you proceed, Chromium will not check for any further name mismatches. In general, it is best not to proceed past this point.</translation>
/external/chromium/chrome/browser/ssl/
ssl_manager.cc
241
// HTTPS. This is because the network
attacker
can redirect the
242
// HTTP request to https://
attacker
.com/payload.js.
/frameworks/base/docs/html/google/play/billing/
billing_best_practices.jd
56
<p>You should obfuscate your In-app Billing code so it is difficult for an
attacker
to reverse
78
which means it is relatively easy for an
attacker
to reverse engineer your application if you use
/external/chromium_org/chrome/app/resources/
chromium_strings_en-GB.xtb
62
<translation id="7771626876550251690">In this case, the address listed in the certificate does not match the address of the website your browser tried to go to. One possible reason for this is that your communications are being intercepted by an
attacker
who is presenting a certificate for a different website, which would cause a mismatch. Another possible reason is that the server is set up to return the same certificate for multiple websites, including the one you are attempting to visit, even though that certificate is not valid for all of those websites. Chromium can say for sure that you reached <strong><ph name="DOMAIN2"/></strong>, but cannot verify that that is the same site as <strong><ph name="DOMAIN"/></strong> which you intended to reach. If you proceed, Chromium will not check for any further name mismatches.</translation>
89
<translation id="118298050220780080">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate issued by an entity that is not trusted by your computer's operating system. This may mean that the server has generated its own security credentials, which Chromium cannot rely on for identity information, or an
attacker
may be trying to intercept your communications.</translation>
188
<translation id="3249425904492147663">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented an expired certificate. No information is available to indicate whether that certificate has been compromised since its expiration. This means Chromium cannot guarantee that you are communicating with <strong><ph name="DOMAIN2"/></strong> and not an
attacker
. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct the error and refresh this page.</translation>
210
<translation id="6240281849816458190">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate that is not yet valid. No information is available to indicate whether that certificate can be trusted. Chromium cannot reliably guarantee that you are communicating with <strong><ph name="DOMAIN2"/></strong> and not an
attacker
. Your computer's clock is currently set to <ph name="CURRENT_TIME"/>. Does that look right? If not, you should correct your system's clock and then refresh this page.</translation>
217
<translation id="4019464536895378627">You attempted to reach <strong><ph name="DOMAIN"/></strong>, but the server presented a certificate issued by an entity that is not trusted by Chromium. This may mean that the server has generated its own security credentials, which Chromium cannot rely on for identity information, or an
attacker
may be trying to intercept your communications.</translation>
Completed in 423 milliseconds
1
2
3
4
5
6