- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 107 for Timing (0.03 sec)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
double avgTime = timings.stream().mapToLong(Long::longValue).average().orElse(0.0); long maxTime = timings.stream().mapToLong(Long::longValue).max().orElse(0L); long minTime = timings.stream().mapToLong(Long::longValue).min().orElse(0L); double variance = (maxTime - minTime) / avgTime; // JVM timing in concurrent scenarios is inherently variable
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5K bytes - Viewed (0) -
docs/es/docs/advanced/security/http-basic-auth.md
# Devuelve algún error ... ``` Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks". ### Timing attacks { #timing-attacks } ¿Pero qué es un "timing attack"? Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 5.4K bytes - Viewed (0) -
docs/de/docs/advanced/security/http-basic-auth.md
# Einen Error zurückgeben ... ``` Aber durch die Verwendung von `secrets.compare_digest()` ist dieser Code sicher vor einer Art von Angriffen, die „Timing-Angriffe“ genannt werden. ### Timing-Angriffe { #timing-attacks } Aber was ist ein „Timing-Angriff“? Stellen wir uns vor, dass einige Angreifer versuchen, den Benutzernamen und das Passwort zu erraten.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Sep 20 15:10:09 UTC 2025 - 6.2K bytes - Viewed (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização). ### Ataques de Temporização { #timing-attacks } Mas o que é um "timing attack" (ataque de temporização)? Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Nov 12 16:23:57 UTC 2025 - 5.3K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/IntervalControlHelper.java
import org.codelibs.fess.exception.FessSystemException; import org.codelibs.fess.util.ComponentUtil; /** * Helper class for controlling crawler execution intervals and timing. * This class manages crawler execution timing based on configurable rules * that can specify different delays for different time periods and days. */ public class IntervalControlHelper {Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sun Nov 23 12:34:02 UTC 2025 - 10K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
return new EncryptionResult(ciphertext, authTag); } /** * Perform constant-time encryption to prevent timing attacks */ private byte[] performConstantTimeEncryption(Cipher cipher, byte[] message) throws Exception { // Pad to fixed block size to prevent timing leaks int blockSize = cipher.getBlockSize(); if (blockSize == 0) blockSize = 16; // GCM modeRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 35.5K bytes - Viewed (0) -
docs/es/llm-prompt.md
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 5.4K bytes - Viewed (0) -
docs/ru/llm-prompt.md
* Pydantic model: Pydantic-модель (`модель Pydantic` and `Pydantic модель` are also fine) * declare: объявить * have the next best performance, after: быть на следующем месте по производительности после * timing attack: тайминговая атака (clarify `атака по времени` if needed) * OAuth2 scope: OAuth2 scope (clarify `область` if needed) * TLS Termination Proxy: прокси-сервер TSL-терминации * utilize (resources): использовать
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Oct 06 11:09:58 UTC 2025 - 6K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Request.kt
/** * Attaches [tag] to the request using [T] as a key. Tags can be read from a request using * [Request.tag]. Use null to remove any existing tag assigned for [T]. * * Use this API to attach timing, debugging, or other application data to a request so that * you may read it in interceptors, event listeners, or callbacks. */ @JvmName("reifiedTag")Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Thu Oct 30 13:46:58 UTC 2025 - 14.7K bytes - Viewed (1)