- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 21 for trustweb (0.08 seconds)
-
fess-crawler-lasta/src/main/resources/crawler/extractor.xml
"application/vnd.micrografx.igx", "application/vnd.mif", "application/vnd.mindjet.mindmanager", "application/vnd.minisoft-hp3000-save", "application/vnd.mitsubishi.misty-guard.trustweb", "application/vnd.mobius.daf", "application/vnd.mobius.dis", "application/vnd.mobius.mbk", "application/vnd.mobius.mqy", "application/vnd.mobius.msl", "application/vnd.mobius.plc",
Created: Sun Apr 12 03:50:13 GMT 2026 - Last Modified: Wed Feb 11 01:15:55 GMT 2026 - 50.4K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/helper/RateLimitHelperTest.java
assertEquals("192.168.1.100", rateLimitHelper.getClientIp(request)); } @Test public void test_getClientIp_xForwardedFor_trustedProxy() { // 127.0.0.1 is configured as a trusted proxy by default final MockletHttpServletRequest request = getMockRequest(); request.setRemoteAddr("127.0.0.1"); request.addHeader("X-Forwarded-For", "203.0.113.50, 70.41.3.18, 150.172.238.178");
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Wed Jan 14 14:29:07 GMT 2026 - 4K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
* * * The victim's gets a non-CA certificate signed by a CA, and pins the CA root and/or * intermediate. This is business as usual. * * ``` * pinnedRoot (trusted by CertificatePinner) * -> pinnedIntermediate (trusted by CertificatePinner) * -> realVictim * ``` * * The attacker compromises a CA. They take the public key from an intermediate certificate
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 24.4K bytes - Click Count (2) -
okhttp-tls/README.md
----------------------- The above example uses a self-signed certificate. This is convenient for testing but not representative of real-world HTTPS deployment. To get closer to that we can use `HeldCertificate` to generate a trusted root certificate, an intermediate certificate, and a server certificate. We use `certificateAuthority(int)` to create certificates that can sign other certificates. The
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 9.1K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/AbstractFuture.java
// chain // We can only do this for Trusted, because Trusted implementations of cancel do // nothing but delegate to this method and do not permit user overrides. AbstractFuture<?> trusted = (AbstractFuture<?>) futureToPropagateTo; localValue = trusted.value(); if (localValue == null | localValue instanceof DelegatingToFuture) {Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Mar 07 14:39:00 GMT 2026 - 43.6K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* called certificate authorities (CAs). * * Browsers and other HTTP clients need a set of trusted root certificates to authenticate their * peers. Sets of root certificates are managed by either the HTTP client (like Firefox), or the * host platform (like Android). In July 2018 Android had 134 trusted root certificates for its HTTP * clients to trust. *
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 21.6K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
* Caddy (that can also handle certificate renewals) * Nginx * HAProxy ## Let's Encrypt { #lets-encrypt } Before Let's Encrypt, these **HTTPS certificates** were sold by trusted third parties. The process to acquire one of these certificates used to be cumbersome, require quite some paperwork and the certificates were quite expensive. But then **[Let's Encrypt](https://letsencrypt.org/)** was created.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 14K bytes - Click Count (0) -
docs/features/https.md
Use [CertificatePinner](https://square.github.io/okhttp/5.x/okhttp/okhttp3/-certificate-pinner/) to restrict which certificates and certificate authorities are trusted. Certificate pinning increases security, but limits your server team’s abilities to update their TLS certificates. **Do not use certificate pinning without the blessing of your server’s TLS administrator!**
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 10.5K bytes - Click Count (0) -
docs/en/docs/advanced/behind-a-proxy.md
You can start FastAPI CLI with the *CLI Option* `--forwarded-allow-ips` and pass the IP addresses that should be trusted to read those forwarded headers. If you set it to `--forwarded-allow-ips="*"` it would trust all the incoming IPs. If your **server** is behind a trusted **proxy** and only the proxy talks to it, this would make it accept whatever is the IP of that **proxy**. <div class="termy"> ```console
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 15.8K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
import okhttp3.internal.toCanonicalHost import okio.ByteString import okio.ByteString.Companion.decodeBase64 import okio.ByteString.Companion.toByteString /** * Constrains which certificates are trusted. Pinning certificates defends against attacks on * certificate authorities. It also prevents connections through man-in-the-middle certificate * authorities either known or unknown to the application's user.
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 14.2K bytes - Click Count (1)