- Sort Score
- Num 10 results
- Language All
Results 51 - 60 of 112 for trimming (0.07 seconds)
-
src/test/java/org/codelibs/fess/helper/CrawlingInfoHelperTest.java
} }, CrawlingInfoService.class.getCanonicalName()); crawlingInfoHelper.updateParams(sessionId, "Test Crawl", 5); // Verify documentExpires is set (don't check exact timing due to test environment timing issues) assertTrue("documentExpires should be set", crawlingInfoHelper.documentExpires > 0); } @Test public void test_updateParams_defaultName() {Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Mar 12 01:46:45 GMT 2026 - 28.7K bytes - Click Count (0) -
src/main/java/jcifs/audit/SecurityAuditLogger.java
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 26.6K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/Smb2SigningDigest.java
final byte[] cmp = new byte[SIGNATURE_LENGTH]; System.arraycopy(mac.doFinal(), 0, cmp, 0, SIGNATURE_LENGTH); // Use constant-time comparison to prevent timing attacks if (!MessageDigest.isEqual(sig, cmp)) { return false; // Signature verification failed } return true; // Signature verification succeeded } finally {
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 9.9K bytes - Click Count (0) -
docs/fr/docs/advanced/security/http-basic-auth.md
# Renvoyer une erreur ... ``` Mais en utilisant `secrets.compare_digest()`, cela sera sécurisé contre un type d'attaques appelé « attaques par chronométrage ». ### Attaques par chronométrage { #timing-attacks } Mais qu'est-ce qu'une « attaque par chronométrage » ? Imaginons que des attaquants essaient de deviner le nom d'utilisateur et le mot de passe.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 5.8K bytes - Click Count (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
* * Features: * - Encrypts credentials at rest using AES-256-GCM * - Uses PBKDF2 for key derivation from master password * - Secure wiping of sensitive data * - Thread-safe operations * - Protection against timing attacks */ public class SecureCredentialStorage implements AutoCloseable, Destroyable { private static final Logger log = LoggerFactory.getLogger(SecureCredentialStorage.class);Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12.7K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/lease/DirectoryChangeNotifier.java
*/ public class DirectoryChangeNotifier { private static final Logger log = LoggerFactory.getLogger(DirectoryChangeNotifier.class); // Backoff and timing constants (in ms) private static final long BASE_POLL_INTERVAL = 1000; private static final long MAX_POLL_INTERVAL = 30000; private static final long BASE_RETRY_DELAY = 1000;Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 13.7K bytes - Click Count (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthenticator.java
private static final SecurityAuditLogger auditLogger = SecurityAuditLogger.getInstance(); /** * Performs constant-time comparison of two char arrays to prevent timing attacks. * This method always compares the full length of both arrays, regardless of when * differences are found, making the execution time independent of the position * of differing characters. *
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 30.3K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/TimeoutFuture.java
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Dec 22 03:38:46 GMT 2024 - 8K bytes - Click Count (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
So stellt man sicher, dass der Endpunkt ungefähr gleich viel Zeit für die Antwort benötigt, unabhängig davon, ob der Benutzername gültig ist oder nicht. Dadurch werden Timing-Angriffe verhindert, mit denen vorhandene Benutzernamen ermittelt werden könnten. /// note | Hinweis
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
Esto asegura que el endpoint tarda aproximadamente la misma cantidad de tiempo en responder tanto si el nombre de usuario es válido como si no, previniendo los **timing attacks** que podrían usarse para enumerar nombres de usuario existentes. /// note | Nota
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 11.5K bytes - Click Count (0)