Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 183) sorted by relevance

12345678

/external/aac/libPCMutils/src/
Dlimiter.cpp95 unsigned int attack; member
123 unsigned int attack, release; in createLimiter() local
128 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in createLimiter()
136 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in createLimiter()
137 limiter->delayBuf = (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in createLimiter()
145 exponent = invFixp(attack+1); in createLimiter()
158 limiter->attack = attack; in createLimiter()
189 FDKmemset(limiter->maxBuf, 0, (limiter->attack + 1) * sizeof(FIXP_DBL) ); in resetLimiter()
190 FDKmemset(limiter->delayBuf, 0, limiter->attack * limiter->channels * sizeof(FIXP_DBL) ); in resetLimiter()
236 unsigned int attack = limiter->attack; in applyLimiter() local
[all …]
/external/aac/libAACenc/src/
Dblock_switch.cpp229 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching()
248 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching()
262 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching()
273 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching()
281 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching()
284 if((blockSwitchingControl->attack == FALSE) && (blockSwitchingControl->lastattack == TRUE)) { in FDKaacEnc_BlockSwitching()
290 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching()
301 …chgWndSqLkAhd[blockSwitchingControl->lastattack][blockSwitchingControl->attack][blockSwitchingCont… in FDKaacEnc_BlockSwitching()
307 chgWndSq[blockSwitchingControl->attack][blockSwitchingControl->lastWindowSequence]; in FDKaacEnc_BlockSwitching()
Dblock_switch.h114 INT attack; member
/external/autotest/client/site_tests/security_SysVIPC/
Dcontrol7 DOC = "Security tripwire for SysV IPC attack surfaces"
9 PURPOSE = "Detect emergence of new attack surfaces in SysV IPC"
/external/autotest/client/site_tests/security_DbusMap/
Dcontrol8 This test enforces a known/vetted list of vetted dbus attack surface
12 PURPOSE = "To ensure un-vetted attack surface doesn't make it into the system"
/external/replicaisland/src/com/replica/replicaisland/
DGameObjectFactory.java1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2);
1389 attack.addFrame(new AnimationFrame(
1392 attack.addFrame(new AnimationFrame(
1401 staticData.add(attack);
1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal());
1473 if (attack != null) {
1474 gun.setDelayBeforeFirstSet(attack.getLength());
1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10);
1597 attack.addFrame(attack1);
1598 attack.addFrame(attack2);
[all …]
DInputGameInterface.java293 public void setKeys(int left, int right, int jump, int attack) { in setKeys() argument
297 mAttackKeyCode = attack; in setKeys()
/external/curl/docs/
DSSL-PROBLEMS60 BEAST is the name of a TLS 1.0 attack that surfaced 2011. When adding means
61 to mitigate this attack, it turned out that some broken servers out there in
/external/kernel-headers/original/uapi/sound/
Dasound_fm.h53 unsigned char attack; /* 4 bits: attack rate */ member
/external/autotest/client/site_tests/security_StatefulPermissions/
Dcontrol11 PURPOSE = "To maintain a vetted, minimized set of attack surfaces in stateful."
/external/owasp/sanitizer/src/tests/org/owasp/html/
DAntiSamyTest.java594 String attack = "[if lte 8]<script>";
601 for (int i = 0; i < attack.length(); i++) {
602 sb.append(attack.charAt(i));
/external/autotest/client/site_tests/security_DbusOwners/
Dcontrol11 PURPOSE = "To maintain a minimal attack surface of chronos-owned interfaces"
/external/autotest/client/site_tests/security_NetworkListeners/
Dcontrol11 PURPOSE = "To maintain a minimal set of network-facing attack surface"
/external/nanopb-c/docs/
Dsecurity.rst66 several possible attack vectors that the application author must consider.
76 stop a denial of service attack from using an infinite message.
/external/cros/system_api/dbus/cryptohome/
Drpc.proto247 // The current dictionary attack counter value.
249 // The current dictionary attack counter threshold.
251 // Whether the TPM is in some form of dictionary attack lockout.
/external/autotest/test_suites/
Dcontrol.security17 security related functionality -- Dbus attack surface, kernel restrictions,
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
Dindex.rst26 still possible vectors of attack. Just to name one example, it doesn't
/external/srtp/doc/
Ddraft-irtf-cfrg-icm-00.txt310 attacks, such as the key collision attack and Hellman's time-memory
311 tradeoff attack; see McGrew and Fluhrer [MF00] for a description of
Drfc3711.txt2276 that of the signal under attack, since otherwise the adversary would
2288 Null authentication MUST NOT be used when a replay attack, in which
2291 successful replay attack is the storing of the output of a
2304 surveillance. Encryption does not protect against this attack, and
2321 This attack is essentially a denial of service attack, though in the
2325 data are accepted as valid video data. This denial of service attack
2332 of attack, but for other, more complex applications these attacks may
2366 integrity. The attack [V02] shows that this is indeed the case for
/external/expat/
DChanges34 #3496608: CVE-2012-0876 - Hash DOS attack.
/external/libvncserver/webclients/java-applet/ssl/
DREADME254 middle attack). Do not ask the user to verify any of these
/external/chromium-trace/catapult/third_party/WebOb/docs/
Dcomment-example.txt252 <http://en.wikipedia.org/wiki/Cross-site_scripting>`_ attack. Fixing
/external/icu/android_icu4j/src/main/tests/android/icu/dev/data/rbbi/
Dwords.txt201 attack
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/data/rbbi/
Dwords.txt201 attack
/external/libogg/doc/
Drfc5334.txt317 kind of attack.

12345678