| /freebsd/tests/sys/netinet/libalias/ |
| H A D | perf.c | 78 } nat, usenat, unnat, random, attack; in main() local 113 bzero(&attack, sizeof(attack)); in main() 209 attack.ok++; in main() 211 attack.fail++; in main() 292 printf("ATTACK ok : %9lu\n", attack.ok); in main() 293 printf("ATTACK fail: %9lu\n", attack.fail); in main() 300 attack.ok + attack.fail); in main()
|
| /freebsd/usr.sbin/virtual_oss/virtual_oss/ |
| H A D | ctl.c | 355 data.out_lim.attack < VIRTUAL_OSS_ATTACK_MIN || in vctl_ioctl() 356 data.out_lim.attack > VIRTUAL_OSS_ATTACK_MAX || in vctl_ioctl() 365 voss_output_compressor_param.attack = data.out_lim.attack; in vctl_ioctl() 371 data.out_lim.attack = voss_output_compressor_param.attack; in vctl_ioctl() 387 data.io_lim.param.attack < VIRTUAL_OSS_ATTACK_MIN || in vctl_ioctl() 388 data.io_lim.param.attack > VIRTUAL_OSS_ATTACK_MAX || in vctl_ioctl() 397 pvp->rx_compressor_param.attack = data.io_lim.param.attack; in vctl_ioctl() 408 data.io_lim.param.attack = pvp->rx_compressor_param.attack; in vctl_ioctl()
|
| H A D | compressor.c | 38 .attack = 3, 69 amp += (gain - amp) / (1LL << p_param->attack); in voss_compressor()
|
| H A D | virtual_oss.h | 113 int attack; member
|
| /freebsd/contrib/ntp/sntp/libevent/test/ |
| H A D | regress_rpc.c | 737 struct kill *attack = NULL; in rpc_test() local 751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test() 755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test() 756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test() 758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test() 809 !EVTAG_HAS(msg2, attack)) { in rpc_test() 813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test() 860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test() 864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
|
| H A D | regress.rpc | 6 optional struct[kill] attack = 3;
|
| /freebsd/contrib/libevent/test/ |
| H A D | regress_rpc.c | 737 struct kill *attack = NULL; in rpc_test() local 751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test() 755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test() 756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test() 758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test() 809 !EVTAG_HAS(msg2, attack)) { in rpc_test() 813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test() 860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test() 864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
|
| H A D | regress.rpc | 6 optional struct[kill] attack = 3;
|
| /freebsd/tests/sys/netpfil/pf/ |
| H A D | tcp.sh | 72 vnet_mkjail attack ${epair_attack}b 73 jexec attack ifconfig ${epair_attack}b 192.0.2.3/24 up 94 jexec attack ${common_dir}/pft_rst.py 192.0.2.1 1234 192.0.2.2 4321
|
| /freebsd/sys/contrib/device-tree/Bindings/sound/ |
| H A D | max98504.txt | 20 applied during the "attack hold" and "timed hold" phase, the value must be 22 - maxim,brownout-attack-hold-ms - the brownout attack hold phase time in ms,
|
| H A D | cs35l36.txt | 113 - cirrus,cirrus,vpbr-atk-rate : Attenuation attack step rate. Configures the 132 - cirrus,vpbr-mute-en : During the attack state, if the vpbr-max-attn value
|
| /freebsd/tools/tools/net80211/wesside/ |
| H A D | README | 2 This is an implementation of the frag attack described in: 14 * Generates traffic on the network for weak IV attack:
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | CMS_decrypt.pod | 60 is problematic. To thwart the MMA attack (Bleichenbacher's attack on 66 use this in a timing attack. If the special flag B<CMS_DEBUG_DECRYPT> is set 71 open to attack.
|
| H A D | DTLSv1_listen.pod | 33 message then the amplification attack has succeeded. 36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is 40 address. In this case a TLSv1.3 application would be susceptible to this attack. 77 denial-of-service attack or allow unencrypted information in the DTLS handshake
|
| H A D | RSA_blinding_on.pod | 25 must be used to protect the RSA operation from that attack.
|
| H A D | RSA_public_encrypt.pod | 92 attack. This is an inherent weakness in the PKCS #1 v1.5 padding 96 returned value could be used to mount the Bleichenbacher attack.
|
| H A D | RSA_padding_add_PKCS1_type_1.pod | 126 padding oracle attack. This is an inherent weakness in the PKCS #1 137 used to mount a Bleichenbacher attack against any padding mode
|
| /freebsd/tools/tools/net80211/ |
| H A D | README | 9 wesside WEP frag attack tool using raw packet interface
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | des_modes.pod | 32 (for the same key) making it vulnerable to a 'dictionary attack'. 177 susceptible to a 'known plaintext' attack. 195 key length 112 bits, but this attack also requires 2^56 blocks of
|
| H A D | EVP_KDF-PBKDF1.pod | 50 harder for an attacker to perform a brute force attack using a large number
|
| H A D | EVP_KDF-PKCS12KDF.pod | 57 harder for an attacker to perform a brute force attack using a large number
|
| /freebsd/sbin/gbde/ |
| H A D | template.txt | |
| /freebsd/contrib/pkgconf/ |
| H A D | CODE_OF_CONDUCT.md | 5 fearing any form of attack, reprisal or harassment. We ask everybody to be
|
| /freebsd/share/examples/ipfilter/rules/ |
| H A D | firewall | 9 a) blocks all packets which might belong to an IP Spoofing attack;
|
| /freebsd/crypto/heimdal/doc/ |
| H A D | whatis.texi | 114 make it more difficult to perform this attack. To succeed @var{C} will 118 attack.
|