- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 139 for attack (0.04 sec)
-
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
.Builder() .serialNumber(1L) .certificateAuthority(4) .commonName("attacker ca") .build() val attackerIntermediate = HeldCertificate .Builder() .serialNumber(2L) .certificateAuthority(3) .commonName("attacker") .signedBy(attackerCa) .build() val pinnedRoot = HeldCertificate .Builder()
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (2) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
import java.util.concurrent.TimeUnit; import org.junit.jupiter.api.BeforeEach; import org.junit.jupiter.api.Test; /** * Security-focused test cases for NtlmPasswordAuthenticator to verify timing attack resistance. */ public class NtlmPasswordAuthenticatorTimingAttackTest { private static final int TIMING_ITERATIONS = 1000;Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
docs/features/https.md
By default, OkHttp trusts the certificate authorities of the host platform. This strategy maximizes connectivity, but it is subject to certificate authority attacks such as the [2011 DigiNotar attack](https://www.computerworld.com/article/2510951/cybercrime-hacking/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html). It also assumes your HTTPS servers’ certificates are signed by a certificate authority.
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sat Dec 24 00:16:30 UTC 2022 - 10.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/direction/sponsor/FessMultipartRequestHandler.java
br.addElement("Against for CVE-2014-0050 (JVN14876762)."); br.addElement("Boundary size is limited by Framework."); br.addElement("Too long boundary is treated as 404 because it's thought of as attack."); br.addElement(""); br.addElement("While, you can override the boundary limit size"); br.addElement(" in " + getClass().getSimpleName() + "."); br.addItem("Content Type");
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sat Mar 15 06:53:53 UTC 2025 - 18.6K bytes - Viewed (1) -
src/main/java/jcifs/smb/PreauthIntegrityService.java
context.invalidate(); if (enforceIntegrity) { throw new CIFSException("Preauth integrity validation failed - possible downgrade attack detected"); } } return isValid; } /** * Gets the current preauth hash for a session. * * @param sessionId the session identifier
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 12.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/RegularImmutableBiMap.java
/** * @throws IllegalArgumentException if another entry in the bucket has the same key * @throws BucketOverflowException if this bucket has too many entries, which may indicate a hash * flooding attack */ private static void checkNoConflictInValueBucket( Object value, Entry<?, ?> entry, @Nullable ImmutableMapEntry<?, ?> valueBucketHead) throws BucketOverflowException { int bucketSize = 0;
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 22 21:07:18 UTC 2025 - 11K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashMap.java
@VisibleForTesting transient @Nullable Object @Nullable [] values; /** * Keeps track of metadata like the number of hash table bits and modifications of this data * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note * that we choose not to make this volatile, so we do less of a "best effort" to track such * errors, for better performance. *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 39.6K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashSet.java
@VisibleForTesting transient @Nullable Object @Nullable [] elements; /** * Keeps track of metadata like the number of hash table bits and modifications of this data * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note * that we choose not to make this volatile, so we do less of a "best effort" to track such * errors, for better performance. */ private transient int metadata;
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 24.7K bytes - Viewed (0) -
android/guava/src/com/google/common/math/Quantiles.java
* passing in unsanitized user data then a malicious user could force it. A light shuffle of the * data using an unpredictable seed should normally be enough to thwart this attack. * * <p>The time taken to compute multiple quantiles on the same dataset using {@link Scale#indexes * indexes} is generally less than the total time taken to compute each of them separately, andRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 30.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashMap.java
@VisibleForTesting transient @Nullable Object @Nullable [] values; /** * Keeps track of metadata like the number of hash table bits and modifications of this data * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note * that we choose not to make this volatile, so we do less of a "best effort" to track such * errors, for better performance. *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 35.7K bytes - Viewed (0)