Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 21 for trustweb (0.08 seconds)

  1. fess-crawler-lasta/src/main/resources/crawler/extractor.xml

    				"application/vnd.micrografx.igx",
    				"application/vnd.mif",
    				"application/vnd.mindjet.mindmanager",
    				"application/vnd.minisoft-hp3000-save",
    				"application/vnd.mitsubishi.misty-guard.trustweb",
    				"application/vnd.mobius.daf",
    				"application/vnd.mobius.dis",
    				"application/vnd.mobius.mbk",
    				"application/vnd.mobius.mqy",
    				"application/vnd.mobius.msl",
    				"application/vnd.mobius.plc",
    Created: Sun Apr 12 03:50:13 GMT 2026
    - Last Modified: Wed Feb 11 01:15:55 GMT 2026
    - 50.4K bytes
    - Click Count (0)
  2. src/test/java/org/codelibs/fess/helper/RateLimitHelperTest.java

            assertEquals("192.168.1.100", rateLimitHelper.getClientIp(request));
        }
    
        @Test
        public void test_getClientIp_xForwardedFor_trustedProxy() {
            // 127.0.0.1 is configured as a trusted proxy by default
            final MockletHttpServletRequest request = getMockRequest();
            request.setRemoteAddr("127.0.0.1");
            request.addHeader("X-Forwarded-For", "203.0.113.50, 70.41.3.18, 150.172.238.178");
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Wed Jan 14 14:29:07 GMT 2026
    - 4K bytes
    - Click Count (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

       *
       *
       * The victim's gets a non-CA certificate signed by a CA, and pins the CA root and/or
       * intermediate. This is business as usual.
       *
       * ```
       *   pinnedRoot (trusted by CertificatePinner)
       *     -> pinnedIntermediate (trusted by CertificatePinner)
       *       -> realVictim
       * ```
       *
       * The attacker compromises a CA. They take the public key from an intermediate certificate
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue Jan 27 09:00:39 GMT 2026
    - 24.4K bytes
    - Click Count (2)
  4. okhttp-tls/README.md

    -----------------------
    
    The above example uses a self-signed certificate. This is convenient for testing but not
    representative of real-world HTTPS deployment. To get closer to that we can use `HeldCertificate`
    to generate a trusted root certificate, an intermediate certificate, and a server certificate.
    We use `certificateAuthority(int)` to create certificates that can sign other certificates. The
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Sun Mar 15 09:01:42 GMT 2026
    - 9.1K bytes
    - Click Count (0)
  5. android/guava/src/com/google/common/util/concurrent/AbstractFuture.java

                  //    chain
                  // We can only do this for Trusted, because Trusted implementations of cancel do
                  // nothing but delegate to this method and do not permit user overrides.
                  AbstractFuture<?> trusted = (AbstractFuture<?>) futureToPropagateTo;
                  localValue = trusted.value();
                  if (localValue == null | localValue instanceof DelegatingToFuture) {
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Mar 07 14:39:00 GMT 2026
    - 43.6K bytes
    - Click Count (0)
  6. okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt

     * called certificate authorities (CAs).
     *
     * Browsers and other HTTP clients need a set of trusted root certificates to authenticate their
     * peers. Sets of root certificates are managed by either the HTTP client (like Firefox), or the
     * host platform (like Android). In July 2018 Android had 134 trusted root certificates for its HTTP
     * clients to trust.
     *
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue Jan 27 09:00:39 GMT 2026
    - 21.6K bytes
    - Click Count (0)
  7. docs/en/docs/deployment/https.md

    * Caddy (that can also handle certificate renewals)
    * Nginx
    * HAProxy
    
    ## Let's Encrypt { #lets-encrypt }
    
    Before Let's Encrypt, these **HTTPS certificates** were sold by trusted third parties.
    
    The process to acquire one of these certificates used to be cumbersome, require quite some paperwork and the certificates were quite expensive.
    
    But then **[Let's Encrypt](https://letsencrypt.org/)** was created.
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 14K bytes
    - Click Count (0)
  8. docs/features/https.md

    Use [CertificatePinner](https://square.github.io/okhttp/5.x/okhttp/okhttp3/-certificate-pinner/) to restrict which certificates and certificate authorities are trusted. Certificate pinning increases security, but limits your server team’s abilities to update their TLS certificates. **Do not use certificate pinning without the blessing of your server’s TLS administrator!**
    
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Sun Mar 15 09:01:42 GMT 2026
    - 10.5K bytes
    - Click Count (0)
  9. docs/en/docs/advanced/behind-a-proxy.md

    You can start FastAPI CLI with the *CLI Option* `--forwarded-allow-ips` and pass the IP addresses that should be trusted to read those forwarded headers.
    
    If you set it to `--forwarded-allow-ips="*"` it would trust all the incoming IPs.
    
    If your **server** is behind a trusted **proxy** and only the proxy talks to it, this would make it accept whatever is the IP of that **proxy**.
    
    <div class="termy">
    
    ```console
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 15.8K bytes
    - Click Count (0)
  10. okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt

    import okhttp3.internal.toCanonicalHost
    import okio.ByteString
    import okio.ByteString.Companion.decodeBase64
    import okio.ByteString.Companion.toByteString
    
    /**
     * Constrains which certificates are trusted. Pinning certificates defends against attacks on
     * certificate authorities. It also prevents connections through man-in-the-middle certificate
     * authorities either known or unknown to the application's user.
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue Jan 27 09:00:39 GMT 2026
    - 14.2K bytes
    - Click Count (1)
Back to Top