- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 131 for Timing (0.03 seconds)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
double avgTime = timings.stream().mapToLong(Long::longValue).average().orElse(0.0); long maxTime = timings.stream().mapToLong(Long::longValue).max().orElse(0L); long minTime = timings.stream().mapToLong(Long::longValue).min().orElse(0L); double variance = (maxTime - minTime) / avgTime; // JVM timing in concurrent scenarios is inherently variable
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 11.2K bytes - Click Count (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 5K bytes - Click Count (0) -
docs/es/docs/advanced/security/http-basic-auth.md
# Devuelve algún error ... ``` Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks". ### Timing attacks { #timing-attacks } ¿Pero qué es un "timing attack"? Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 5.4K bytes - Click Count (0) -
docs/de/docs/advanced/security/http-basic-auth.md
# Einen Error zurückgeben ... ``` Aber durch die Verwendung von `secrets.compare_digest()` ist dieser Code sicher vor einer Art von Angriffen, die „Timing-Angriffe“ genannt werden. ### Timing-Angriffe { #timing-attacks } Aber was ist ein „Timing-Angriff“? Stellen wir uns vor, dass einige Angreifer versuchen, den Benutzernamen und das Passwort zu erraten.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Sep 20 15:10:09 GMT 2025 - 6.2K bytes - Click Count (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização). ### Ataques de Temporização { #timing-attacks } Mas o que é um "timing attack" (ataque de temporização)? Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 5.3K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/helper/IntervalControlHelper.java
import org.codelibs.fess.exception.FessSystemException; import org.codelibs.fess.util.ComponentUtil; /** * Helper class for controlling crawler execution intervals and timing. * This class manages crawler execution timing based on configurable rules * that can specify different delays for different time periods and days. */ public class IntervalControlHelper {Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Sun Nov 23 12:34:02 GMT 2025 - 10K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
return new EncryptionResult(ciphertext, authTag); } /** * Perform constant-time encryption to prevent timing attacks */ private byte[] performConstantTimeEncryption(Cipher cipher, byte[] message) throws Exception { // Pad to fixed block size to prevent timing leaks int blockSize = cipher.getBlockSize(); if (blockSize == 0) blockSize = 16; // GCM modeCreated: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 35.5K bytes - Click Count (0) -
docs/es/llm-prompt.md
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 5.4K bytes - Click Count (0) -
docs/ru/llm-prompt.md
* Pydantic model: Pydantic-модель (`модель Pydantic` and `Pydantic модель` are also fine) * declare: объявить * have the next best performance, after: быть на следующем месте по производительности после * timing attack: тайминговая атака (clarify `атака по времени` if needed) * OAuth2 scope: OAuth2 scope (clarify `область` if needed) * TLS Termination Proxy: прокси-сервер TSL-терминации * utilize (resources): использовать
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Oct 06 11:09:58 GMT 2025 - 6K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Request.kt
/** * Attaches [tag] to the request using [T] as a key. Tags can be read from a request using * [Request.tag]. Use null to remove any existing tag assigned for [T]. * * Use this API to attach timing, debugging, or other application data to a request so that * you may read it in interceptors, event listeners, or callbacks. */ @JvmName("reifiedTag")Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu Oct 30 13:46:58 GMT 2025 - 14.7K bytes - Click Count (1)