Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 255 for attack (0.06 sec)

  1. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

            .Builder()
            .serialNumber(1L)
            .certificateAuthority(4)
            .commonName("attacker ca")
            .build()
        val attackerIntermediate =
          HeldCertificate
            .Builder()
            .serialNumber(2L)
            .certificateAuthority(3)
            .commonName("attacker")
            .signedBy(attackerCa)
            .build()
        val pinnedRoot =
          HeldCertificate
            .Builder()
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Jun 20 11:46:46 UTC 2025
    - 24.3K bytes
    - Viewed (1)
  2. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

    import java.util.concurrent.TimeUnit;
    
    import org.junit.jupiter.api.BeforeEach;
    import org.junit.jupiter.api.Test;
    
    /**
     * Security-focused test cases for NtlmPasswordAuthenticator to verify timing attack resistance.
     */
    public class NtlmPasswordAuthenticatorTimingAttackTest {
    
        private static final int TIMING_ITERATIONS = 1000;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  3. guava/src/com/google/common/collect/RegularImmutableMap.java

       * saving space.
       */
      @VisibleForTesting static final double MAX_LOAD_FACTOR = 1.2;
    
      /**
       * Maximum allowed false positive probability of detecting a hash flooding attack given random
       * input.
       */
      @VisibleForTesting static final double HASH_FLOODING_FPP = 0.001;
    
      /**
       * Maximum allowed length of a hash table bucket before falling back to a j.u.HashMap based
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 15.8K bytes
    - Viewed (0)
  4. docs/features/https.md

    By default, OkHttp trusts the certificate authorities of the host platform. This strategy maximizes connectivity, but it is subject to certificate authority attacks such as the [2011 DigiNotar attack](https://www.computerworld.com/article/2510951/cybercrime-hacking/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html). It also assumes your HTTPS servers’ certificates are signed by a certificate authority.
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Dec 24 00:16:30 UTC 2022
    - 10.5K bytes
    - Viewed (0)
  5. src/main/java/org/codelibs/fess/mylasta/direction/sponsor/FessMultipartRequestHandler.java

            br.addElement("Against for CVE-2014-0050 (JVN14876762).");
            br.addElement("Boundary size is limited by Framework.");
            br.addElement("Too long boundary is treated as 404 because it's thought of as attack.");
            br.addElement("");
            br.addElement("While, you can override the boundary limit size");
            br.addElement(" in " + getClass().getSimpleName() + ".");
            br.addItem("Content Type");
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Mar 15 06:53:53 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb/PreauthIntegrityService.java

                context.invalidate();
                if (enforceIntegrity) {
                    throw new CIFSException("Preauth integrity validation failed - possible downgrade attack detected");
                }
            }
    
            return isValid;
        }
    
        /**
         * Gets the current preauth hash for a session.
         *
         * @param sessionId the session identifier
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  7. guava/src/com/google/common/collect/RegularImmutableBiMap.java

      /**
       * @throws IllegalArgumentException if another entry in the bucket has the same key
       * @throws BucketOverflowException if this bucket has too many entries, which may indicate a hash
       *     flooding attack
       */
      private static void checkNoConflictInValueBucket(
          Object value, Entry<?, ?> entry, @Nullable ImmutableMapEntry<?, ?> valueBucketHead)
          throws BucketOverflowException {
        int bucketSize = 0;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 11.1K bytes
    - Viewed (0)
  8. guava-tests/test/com/google/common/collect/ImmutableSetTest.java

            .addEqualityGroup(ImmutableSet.of(1, 2, 1), ImmutableSet.of(2, 1, 1))
            .testEquals();
      }
    
      /**
       * The maximum allowed probability of falsely detecting a hash flooding attack if the input is
       * randomly generated.
       */
      private static final double HASH_FLOODING_FPP = 0.001;
    
      public void testReuseBuilderReducingHashTableSizeWithPowerOfTwoTotalElements() {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/CompactHashSet.java

      @VisibleForTesting transient @Nullable Object @Nullable [] elements;
    
      /**
       * Keeps track of metadata like the number of hash table bits and modifications of this data
       * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note
       * that we choose not to make this volatile, so we do less of a "best effort" to track such
       * errors, for better performance.
       */
      private transient int metadata;
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 23.9K bytes
    - Viewed (0)
  10. docs/security/README.md

    #### Secure Erasure and Locking
    
    The MinIO server requires an available KMS to en/decrypt SSE-S3 encrypted objects. Therefore it is possible to erase or lock some or all encrypted objects. For example in case of a detected attack or other emergency situations the following actions can be taken:
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
Back to top