| /openbsd-src/games/adventure/ |
| H A D | save.c | 53 {&attack, sizeof(attack)},
|
| H A D | subr.c | 175 dtotal = attack = stick = 0; /* 6010 */ in fdwarf() 243 attack++; in fdwarf() 257 if (attack == 0) in fdwarf() 263 if (attack != 1) { in fdwarf() 264 printf("%d of them throw knives at you!\n", attack); in fdwarf()
|
| H A D | hdr.h | 156 tk[21], stick, dtotal, attack;
|
| H A D | main.c | 107 int tk[21], stick, dtotal, attack; variable
|
| /openbsd-src/games/trek/ |
| H A D | autover.c | 74 attack(0); in autover()
|
| H A D | play.c | 101 attack(0); in play()
|
| H A D | Makefile | 4 SRCS= abandon.c attack.c autover.c capture.c check_out.c checkcond.c \
|
| H A D | attack.c | 70 attack(int resting) in attack() function
|
| H A D | trek.h | 358 void attack(int);
|
| H A D | move.c | 162 attack(0); in move()
|
| H A D | setup.c | 294 attack(0); in setup()
|
| H A D | events.c | 401 attack(1); in events()
|
| /openbsd-src/games/hunt/hunt/ |
| H A D | otto.c | 126 static void attack(int, struct item *); 162 attack(i, &flbr[i]); in otto() 409 attack(int rel_dir, struct item *itemp) in attack() function
|
| /openbsd-src/regress/lib/libevent/ |
| H A D | event_regress.c | 1702 struct kill *attack; 1715 if (EVTAG_GET(msg, attack, &attack) == -1) { 1720 EVTAG_ASSIGN(attack, weapon, "feather"); 1721 EVTAG_ASSIGN(attack, action, "tickle"); 1766 !EVTAG_HAS(msg2, attack)) {
|
| /openbsd-src/games/hack/ |
| H A D | hack.apply.c | 460 if(u.uswallow && attack(u.ustuck)) /* return(1) */; in use_pick_axe() 470 if((mtmp = m_at(rx, ry)) && attack(mtmp)) in use_pick_axe()
|
| H A D | hack.fight.c | 322 attack(struct monst *mtmp) in attack() function
|
| H A D | hack.h | 352 boolean attack(struct monst *);
|
| H A D | help | 8 possibly with magic properties) and assorted monsters. You attack a monster
|
| /openbsd-src/sbin/isakmpd/ |
| H A D | QUESTIONS | 12 Isn't this a potential DOS attack:
|
| /openbsd-src/gnu/usr.bin/perl/pod/ |
| H A D | perlsecpolicy.pod | 126 The vulnerable behavior is likely to be exposed to attack in 334 issue notes private allows the security team to freely discuss attack 335 methods, attack tools, and other related private issues. 439 attack systems the security team will send out announcements as rapidly as 449 issue and the issue's risk of becoming a zero-day attack, the security team may
|
| H A D | perl582delta.pod | 36 attack which prompted the change for 5.8.1.
|
| H A D | perl5143delta.pod | 37 denial-of-service attack. A flaw in versions of perl before 5.15.5 can
|
| /openbsd-src/gnu/llvm/llvm/docs/ |
| H A D | SpeculativeLoadHardening.md | 45 The key of the attack is to call this with `untrusted_offset_from_caller` that 138 attack. 176 It is possible to attack control flow other than conditional branches with 240 Beyond the core variant #1 attack, there are techniques to extend this attack. 313 attack it is defending against. 647 the attacker could chose to attack a load which happens to have the desired 649 raises the burden on the attacker and limits the scope of attack but does not 650 eliminate it. To fully close the attack we must work with the operating system 1019 `lfence` instructions into conditional edges at risk of attack. However,
|
| H A D | CodeOfConduct.rst | 73 a personal attack. It's important to remember that a community where people
|
| /openbsd-src/usr.sbin/nsd/ |
| H A D | nsd.conf.sample.in | 59 # Complement with socket partitioning and CPU affinity for attack 61 # specific IP address is under attack.
|