Searched refs:attack (Results 1 - 3 of 3) sorted by relevance
/freebsd-9.3-release/contrib/ntp/sntp/libevent/test/ |
H A D | regress_rpc.c | 738 struct kill *attack = NULL; local 752 if (EVTAG_GET(msg, attack, &attack) == -1) { 756 EVTAG_ASSIGN(attack, weapon, "feather"); 757 EVTAG_ASSIGN(attack, action, "tickle"); 759 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { 810 !EVTAG_HAS(msg2, attack)) { 814 if (EVTAG_GET(msg2, attack, &attack) == -1) { 815 tt_abort_msg("Could not get attack [all...] |
/freebsd-9.3-release/contrib/ipfilter/perl/ |
H A D | plog | 44 # closely after identifying a potential attack. 1053 address, there's no way to discover the source of an attack reliably. For this
|
/freebsd-9.3-release/contrib/ipfilter/ |
H A D | HISTORY | 1407 fix TCP urgent packet & offset testing and add LAND attack test for iptest
|
Completed in 103 milliseconds