Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 53) sorted by relevance

123

/openbsd-src/games/adventure/
H A Dsave.c53 {&attack, sizeof(attack)},
H A Dsubr.c175 dtotal = attack = stick = 0; /* 6010 */ in fdwarf()
243 attack++; in fdwarf()
257 if (attack == 0) in fdwarf()
263 if (attack != 1) { in fdwarf()
264 printf("%d of them throw knives at you!\n", attack); in fdwarf()
H A Dhdr.h156 tk[21], stick, dtotal, attack;
H A Dmain.c107 int tk[21], stick, dtotal, attack; variable
/openbsd-src/games/trek/
H A Dautover.c74 attack(0); in autover()
H A Dplay.c101 attack(0); in play()
H A DMakefile4 SRCS= abandon.c attack.c autover.c capture.c check_out.c checkcond.c \
H A Dattack.c70 attack(int resting) in attack() function
H A Dtrek.h358 void attack(int);
H A Dmove.c162 attack(0); in move()
H A Dsetup.c294 attack(0); in setup()
H A Devents.c401 attack(1); in events()
/openbsd-src/games/hunt/hunt/
H A Dotto.c126 static void attack(int, struct item *);
162 attack(i, &flbr[i]); in otto()
409 attack(int rel_dir, struct item *itemp) in attack() function
/openbsd-src/regress/lib/libevent/
H A Devent_regress.c1702 struct kill *attack;
1715 if (EVTAG_GET(msg, attack, &attack) == -1) {
1720 EVTAG_ASSIGN(attack, weapon, "feather");
1721 EVTAG_ASSIGN(attack, action, "tickle");
1766 !EVTAG_HAS(msg2, attack)) {
/openbsd-src/games/hack/
H A Dhack.apply.c460 if(u.uswallow && attack(u.ustuck)) /* return(1) */; in use_pick_axe()
470 if((mtmp = m_at(rx, ry)) && attack(mtmp)) in use_pick_axe()
H A Dhack.fight.c322 attack(struct monst *mtmp) in attack() function
H A Dhack.h352 boolean attack(struct monst *);
H A Dhelp8 possibly with magic properties) and assorted monsters. You attack a monster
/openbsd-src/sbin/isakmpd/
H A DQUESTIONS12 Isn't this a potential DOS attack:
/openbsd-src/gnu/usr.bin/perl/pod/
H A Dperlsecpolicy.pod126 The vulnerable behavior is likely to be exposed to attack in
334 issue notes private allows the security team to freely discuss attack
335 methods, attack tools, and other related private issues.
439 attack systems the security team will send out announcements as rapidly as
449 issue and the issue's risk of becoming a zero-day attack, the security team may
H A Dperl582delta.pod36 attack which prompted the change for 5.8.1.
H A Dperl5143delta.pod37 denial-of-service attack. A flaw in versions of perl before 5.15.5 can
/openbsd-src/gnu/llvm/llvm/docs/
H A DSpeculativeLoadHardening.md45 The key of the attack is to call this with `untrusted_offset_from_caller` that
138 attack.
176 It is possible to attack control flow other than conditional branches with
240 Beyond the core variant #1 attack, there are techniques to extend this attack.
313 attack it is defending against.
647 the attacker could chose to attack a load which happens to have the desired
649 raises the burden on the attacker and limits the scope of attack but does not
650 eliminate it. To fully close the attack we must work with the operating system
1019 `lfence` instructions into conditional edges at risk of attack. However,
H A DCodeOfConduct.rst73 a personal attack. It's important to remember that a community where people
/openbsd-src/usr.sbin/nsd/
H A Dnsd.conf.sample.in59 # Complement with socket partitioning and CPU affinity for attack
61 # specific IP address is under attack.

123