代码搜索:Aggressive
找到约 131 项符合「Aggressive」的源代码
代码结果 131
www.eeworm.com/read/382187/2638928
jad chatserver_aggressive.jad
// Decompiled by Jad v1.5.7g. Copyright 2000 Pavel Kouznetsov.
// Jad home page: http://www.geocities.com/SiliconValley/Bridge/8617/jad.html
// Decompiler options: packimports(3)
// Source File Na
www.eeworm.com/read/113135/15469654
txt aggressive-monsters.txt
1008:2
1230:2
1232:2
1236:2
1097:2
1048:2
1047:2
1078:2
1079:2
1080:2
1081:2
1082:2
1084:2
1083:2
1085:2
1020:3
1005:1
1015:1
1016:1
1023:1
1026:1
1028:1
1029:1
1035:1
1036:1
www.eeworm.com/read/127438/6005286
c socket_write_aggressive.c
/* -*- Mode: C; c-basic-offset:4 ; -*- */
/*
* (C) 2001 by Argonne National Laboratory.
* See COPYRIGHT in top-level directory.
*/
#include "socketimpl.h"
#ifdef WITH_METHOD_SOCKET
/* prot
www.eeworm.com/read/127438/6005328
c ib_write_aggressive.c
/* -*- Mode: C; c-basic-offset:4 ; -*- */
/*
* (C) 2001 by Argonne National Laboratory.
* See COPYRIGHT in top-level directory.
*/
#include "ibimpl.h"
#ifdef WITH_METHOD_IB
/* prototypes *
www.eeworm.com/read/127438/6005365
c tcp_write_aggressive.c
/* -*- Mode: C; c-basic-offset:4 ; -*- */
/*
* (C) 2001 by Argonne National Laboratory.
* See COPYRIGHT in top-level directory.
*/
#include "tcpimpl.h"
#ifdef WITH_METHOD_TCP
/* prototypes
www.eeworm.com/read/140582/5786880
txt description.txt
This test has a road warrior, ("road") connecting to VPN host east.
It shows up from a random IP.
It uses RSASIG to authenticate for phase 1.
It then uses XAUTH to authenticate the phase 1.5.
It th
www.eeworm.com/read/160303/5574507
txt description.txt
This test has a road warrior, ("road") connecting to VPN host east.
It shows up from a random IP.
It uses RSASIG to authenticate for phase 1.
It then uses XAUTH to authenticate the phase 1.5.
It th
www.eeworm.com/read/140582/5786394
txt description.txt
These tests are Pluto unit tests - it runs IKE in a bottle.
These tests are focused on aggressive mode, and use inputs
and outputs which are local to this directory.
These tests set the mode using
www.eeworm.com/read/140582/5786651
txt description.txt
This test has a road warrior, ("road") connecting to VPN host east.
It shows up from a random IP.
It uses PSK to authenticate for phase 1.
It uses aggressive mode.
It then uses XAUTH to authenticate
www.eeworm.com/read/140582/5786815
txt description.txt
This test has a road warrior, ("road") connecting to VPN host east.
It shows up from a random IP.
It uses PSK to authenticate for phase 1.
It uses aggressive mode.
It then uses XAUTH to authenticate