Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 83) sorted by relevance

1234

/freebsd/tests/sys/netinet/libalias/
H A Dperf.c78 } nat, usenat, unnat, random, attack; in main() local
113 bzero(&attack, sizeof(attack)); in main()
209 attack.ok++; in main()
211 attack.fail++; in main()
292 printf("ATTACK ok : %9lu\n", attack.ok); in main()
293 printf("ATTACK fail: %9lu\n", attack.fail); in main()
300 attack.ok + attack.fail); in main()
/freebsd/usr.sbin/virtual_oss/virtual_oss/
H A Dctl.c355 data.out_lim.attack < VIRTUAL_OSS_ATTACK_MIN || in vctl_ioctl()
356 data.out_lim.attack > VIRTUAL_OSS_ATTACK_MAX || in vctl_ioctl()
365 voss_output_compressor_param.attack = data.out_lim.attack; in vctl_ioctl()
371 data.out_lim.attack = voss_output_compressor_param.attack; in vctl_ioctl()
387 data.io_lim.param.attack < VIRTUAL_OSS_ATTACK_MIN || in vctl_ioctl()
388 data.io_lim.param.attack > VIRTUAL_OSS_ATTACK_MAX || in vctl_ioctl()
397 pvp->rx_compressor_param.attack = data.io_lim.param.attack; in vctl_ioctl()
408 data.io_lim.param.attack = pvp->rx_compressor_param.attack; in vctl_ioctl()
H A Dcompressor.c38 .attack = 3,
69 amp += (gain - amp) / (1LL << p_param->attack); in voss_compressor()
H A Dvirtual_oss.h113 int attack; member
/freebsd/contrib/ntp/sntp/libevent/test/
H A Dregress_rpc.c737 struct kill *attack = NULL; in rpc_test() local
751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test()
755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test()
756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test()
758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test()
809 !EVTAG_HAS(msg2, attack)) { in rpc_test()
813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test()
860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test()
864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
H A Dregress.rpc6 optional struct[kill] attack = 3;
/freebsd/contrib/libevent/test/
H A Dregress_rpc.c737 struct kill *attack = NULL; in rpc_test() local
751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test()
755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test()
756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test()
758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test()
809 !EVTAG_HAS(msg2, attack)) { in rpc_test()
813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test()
860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test()
864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
H A Dregress.rpc6 optional struct[kill] attack = 3;
/freebsd/tests/sys/netpfil/pf/
H A Dtcp.sh72 vnet_mkjail attack ${epair_attack}b
73 jexec attack ifconfig ${epair_attack}b 192.0.2.3/24 up
94 jexec attack ${common_dir}/pft_rst.py 192.0.2.1 1234 192.0.2.2 4321
/freebsd/sys/contrib/device-tree/Bindings/sound/
H A Dmax98504.txt20 applied during the "attack hold" and "timed hold" phase, the value must be
22 - maxim,brownout-attack-hold-ms - the brownout attack hold phase time in ms,
H A Dcs35l36.txt113 - cirrus,cirrus,vpbr-atk-rate : Attenuation attack step rate. Configures the
132 - cirrus,vpbr-mute-en : During the attack state, if the vpbr-max-attn value
/freebsd/tools/tools/net80211/wesside/
H A DREADME2 This is an implementation of the frag attack described in:
14 * Generates traffic on the network for weak IV attack:
/freebsd/crypto/openssl/doc/man3/
H A DCMS_decrypt.pod60 is problematic. To thwart the MMA attack (Bleichenbacher's attack on
66 use this in a timing attack. If the special flag B<CMS_DEBUG_DECRYPT> is set
71 open to attack.
H A DDTLSv1_listen.pod33 message then the amplification attack has succeeded.
36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is
40 address. In this case a TLSv1.3 application would be susceptible to this attack.
77 denial-of-service attack or allow unencrypted information in the DTLS handshake
H A DRSA_blinding_on.pod25 must be used to protect the RSA operation from that attack.
H A DRSA_public_encrypt.pod92 attack. This is an inherent weakness in the PKCS #1 v1.5 padding
96 returned value could be used to mount the Bleichenbacher attack.
H A DRSA_padding_add_PKCS1_type_1.pod126 padding oracle attack. This is an inherent weakness in the PKCS #1
137 used to mount a Bleichenbacher attack against any padding mode
/freebsd/tools/tools/net80211/
H A DREADME9 wesside WEP frag attack tool using raw packet interface
/freebsd/crypto/openssl/doc/man7/
H A Ddes_modes.pod32 (for the same key) making it vulnerable to a 'dictionary attack'.
177 susceptible to a 'known plaintext' attack.
195 key length 112 bits, but this attack also requires 2^56 blocks of
H A DEVP_KDF-PBKDF1.pod50 harder for an attacker to perform a brute force attack using a large number
H A DEVP_KDF-PKCS12KDF.pod57 harder for an attacker to perform a brute force attack using a large number
/freebsd/sbin/gbde/
H A Dtemplate.txt
/freebsd/contrib/pkgconf/
H A DCODE_OF_CONDUCT.md5 fearing any form of attack, reprisal or harassment. We ask everybody to be
/freebsd/share/examples/ipfilter/rules/
H A Dfirewall9 a) blocks all packets which might belong to an IP Spoofing attack;
/freebsd/crypto/heimdal/doc/
H A Dwhatis.texi114 make it more difficult to perform this attack. To succeed @var{C} will
118 attack.

1234