- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 147 for timing (0.21 seconds)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
double avgTime = timings.stream().mapToLong(Long::longValue).average().orElse(0.0); long maxTime = timings.stream().mapToLong(Long::longValue).max().orElse(0L); long minTime = timings.stream().mapToLong(Long::longValue).min().orElse(0L); double variance = (maxTime - minTime) / avgTime; // JVM timing in concurrent scenarios is inherently variable
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 11.2K bytes - Click Count (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 5K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/helper/IntervalControlHelper.java
import org.codelibs.fess.exception.FessSystemException; import org.codelibs.fess.util.ComponentUtil; /** * Helper class for controlling crawler execution intervals and timing. * This class manages crawler execution timing based on configurable rules * that can specify different delays for different time periods and days. */ public class IntervalControlHelper {Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Nov 23 12:34:02 GMT 2025 - 10K bytes - Click Count (0) -
docs/ko/docs/advanced/security/http-basic-auth.md
```Python if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"): # 어떤 오류를 반환 ... ``` 하지만 `secrets.compare_digest()`를 사용하면 "timing attacks"라고 불리는 한 유형의 공격에 대해 안전해집니다. ### 타이밍 공격 { #timing-attacks } 그렇다면 "timing attack"이란 무엇일까요? 공격자들이 사용자명과 비밀번호를 추측하려고 한다고 가정해봅시다. 그리고 사용자명 `johndoe`, 비밀번호 `love123`으로 요청을 보냅니다. 그러면 애플리케이션의 Python 코드는 대략 다음과 같을 것입니다: ```Python
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 5.9K bytes - Click Count (0) -
docs/es/llm-prompt.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 5.4K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Request.kt
/** * Attaches [tag] to the request using [T] as a key. Tags can be read from a request using * [Request.tag]. Use null to remove any existing tag assigned for [T]. * * Use this API to attach timing, debugging, or other application data to a request so that * you may read it in interceptors, event listeners, or callbacks. */ @JvmName("reifiedTag")Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Thu Oct 30 13:46:58 GMT 2025 - 14.7K bytes - Click Count (1) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
return new EncryptionResult(ciphertext, authTag); } /** * Perform constant-time encryption to prevent timing attacks */ private byte[] performConstantTimeEncryption(Cipher cipher, byte[] message) throws Exception { // Pad to fixed block size to prevent timing leaks int blockSize = cipher.getBlockSize(); if (blockSize == 0) blockSize = 16; // GCM modeCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 35.5K bytes - Click Count (0) -
android/guava-tests/benchmark/com/google/common/hash/HashCodeBenchmark.java
* whereToDiffer} produces no observable change in performance. We want to make sure that the array * equals implementation is *not* short-circuiting to prevent timing-based attacks. Being fast is * only a secondary goal. * * @author Kurt Alfred Kluever */ @NullUnmarked public class HashCodeBenchmark {Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Aug 11 19:31:30 GMT 2025 - 4K bytes - Click Count (0) -
docs/ru/llm-prompt.md
* Pydantic model: Pydantic-модель (`модель Pydantic` and `Pydantic модель` are also fine) * declare: объявить * have the next best performance, after: быть на следующем месте по производительности после * timing attack: тайминговая атака (clarify `атака по времени` if needed) * OAuth2 scope: OAuth2 scope (clarify `область` if needed) * TLS Termination Proxy: прокси-сервер TSL-терминации * utilize (resources): использовать
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Jan 22 07:07:05 GMT 2026 - 6.5K bytes - Click Count (0) -
guava-tests/benchmark/com/google/common/hash/HashCodeBenchmark.java
* whereToDiffer} produces no observable change in performance. We want to make sure that the array * equals implementation is *not* short-circuiting to prevent timing-based attacks. Being fast is * only a secondary goal. * * @author Kurt Alfred Kluever */ @NullUnmarked public class HashCodeBenchmark {Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Aug 11 19:31:30 GMT 2025 - 4K bytes - Click Count (0)