- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 8,323 for Cipher (0.05 sec)
-
docs/features/https.md
with certificates and the privacy of data exchanged with strong ciphers. When negotiating a connection to an HTTPS server, OkHttp needs to know which [TLS versions](https://square.github.io/okhttp/4.x/okhttp/okhttp3/-tls-version/) and [cipher suites](https://square.github.io/okhttp/4.x/okhttp/okhttp3/-cipher-suite/) to offer. A client that wants to maximize connectivity would include obsolete TLS versions and weak-by-design cipher suites. A strict client that wants to maximize security would...
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sat Dec 24 00:16:30 UTC 2022 - 10.5K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/CustomCipherSuites.java
public CustomCipherSuites() throws GeneralSecurityException { // Configure cipher suites to demonstrate how to customize which cipher suites will be used for // an OkHttp request. In order to be selected a cipher suite must be included in both OkHttp's // connection spec and in the SSLSocket's enabled cipher suites array. Most applications should // not customize the cipher suites list. List<CipherSuite> customCipherSuites = asList(
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Thu Mar 14 21:57:42 UTC 2019 - 6.5K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/CipherSuiteTest.kt
assertThat(forJavaName(java.lang.String(cs.javaName) as String)) .isSameAs(cs) } @Test fun equals() { assertThat(forJavaName("cipher")).isEqualTo(forJavaName("cipher")) assertThat(forJavaName("cipherB")).isNotEqualTo(forJavaName("cipherA")) assertThat(CipherSuite.TLS_RSA_EXPORT_WITH_RC4_40_MD5) .isEqualTo(forJavaName("SSL_RSA_EXPORT_WITH_RC4_40_MD5"))
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 8.2K bytes - Viewed (0) -
docs/changelogs/changelog_2x.md
* New: Buffer WebSocket frames for better performance. * New: Drop support for `TLS_DHE_DSS_WITH_AES_128_CBC_SHA`, our only remaining DSS cipher suite. This is consistent with Firefox and Chrome which have also dropped these cipher suite. ## Version 2.5.0 _2015-08-25_ * **Timeouts now default to 10 seconds.** Previously we defaulted to neverRegistered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 26.6K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/nego/NegotiateContextResponseTest.java
// Assert // Note: size() returns 4 + (2*ciphers.length) but encode only writes 2 + (2*ciphers.length) // This appears to be a bug in the implementation, but we test the actual behavior assertEquals(6, encodedSize); // actual encoded size: 2 bytes count + 2*2 bytes for ciphers assertEquals(2, buffer[0]); // cipher count (little endian) assertEquals(0, buffer[1]);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 19.4K bytes - Viewed (0) -
docs/smb3-features/02-persistent-handles-design.md
public void saveEncrypted(HandleInfo handle, Path file) throws Exception { Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding"); cipher.init(Cipher.ENCRYPT_MODE, encryptionKey); ByteArrayOutputStream baos = new ByteArrayOutputStream(); try (CipherOutputStream cos = new CipherOutputStream(baos, cipher); ObjectOutputStream oos = new ObjectOutputStream(cos)) {Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 02:53:50 UTC 2025 - 31.6K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java
} @Test @DisplayName("Should handle different cipher IDs") void testDifferentCipherIds() { // Test cipher ID 1 (AES-CCM) Smb2EncryptionContext context1 = new Smb2EncryptionContext(1, DialectVersion.SMB311, testEncryptionKey, testDecryptionKey); assertEquals(1, context1.getCipherId(), "Should handle cipher ID 1"); // Test cipher ID 2 (AES-GCM)Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 44.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/ntlmssp/Type3Message.java
/* RC4 was not added to Java until 1.5u7 so let's use our own for a little while longer ... try { Cipher rc4 = Cipher.getInstance("RC4"); rc4.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(ntlm2SessionKey, "RC4")); rc4.update(masterKey, 0, 16, exchangedKey, 0);
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 24.1K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/UserInfoHelper.java
* The user ID is encrypted using the primary cipher and validated against the configuration. * * @param userCode the raw user ID to encrypt * @return the encrypted and validated user code, or null if invalid */ protected String createUserCodeFromUserId(String userCode) { final FessConfig fessConfig = ComponentUtil.getFessConfig(); final PrimaryCipher cipher = ComponentUtil.getPrimaryCipher();Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 14.9K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmContext.java
private byte[] type1Bytes; private byte[] signKey; private byte[] verifyKey; private byte[] sealClientKey; private byte[] sealServerKey; private Cipher sealClientHandle; private Cipher sealServerHandle; /** * Creates a new NTLM security context with the specified parameters. * @param tc * context to use * @param auth
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 17.3K bytes - Viewed (1)