- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 22 for compromised (0.11 sec)
-
okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
HeldCertificate.Builder() .serialNumber(3L) .certificateAuthority(0) .commonName("compromised intermediate") .signedBy(pinnedRoot) .build() val attackerIntermediate = HeldCertificate.Builder() .keyPair(attackerCa.keyPair) // Share keys between compromised CA and intermediate! .serialNumber(4L)
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 23.8K bytes - Viewed (0) -
docs/security/README.md
#### Key rotation
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0) -
mvnw.cmd
"$hash = (Get-FileHash \"%WRAPPER_JAR%\" -Algorithm SHA256).Hash.ToLower();"^ "If('%WRAPPER_SHA_256_SUM%' -ne $hash){"^ " Write-Error 'Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised.';"^ " Write-Error 'Investigate or delete %WRAPPER_JAR% to attempt a clean download.';"^ " Write-Error 'If you updated your Maven version, you need to update the specified wrapperSha256Sum property.';"^
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Oct 14 22:24:15 UTC 2024 - 7.5K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* Most TLS clients that connect to hosts on the public Internet should call this method. * Otherwise it is necessary to manually prepare a comprehensive set of trusted roots. * * If the host platform is compromised or misconfigured this may contain untrustworthy root * certificates. Applications that connect to a known set of servers may be able to mitigate * this problem with [certificate pinning][CertificatePinner]. */
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.5K bytes - Viewed (0) -
mvnw
exit 1 fi if [ $wrapperSha256Result = false ]; then echo "Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised." >&2 echo "Investigate or delete $wrapperJarPath to attempt a clean download." >&2 echo "If you updated your Maven version, you need to update the specified wrapperSha256Sum property." >&2 exit 1 fi fi
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Oct 14 22:24:15 UTC 2024 - 10.9K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
Critically, the CA must enforce that the ztunnel has permission to request that identity. Requests for identities not running on the node are rejected. This is critical to ensure that a compromised node does not compromise the entire mesh. This CA enforcement is done by Istio's CA, and is a requirement for any alternative CAs integrating with Ztunnel.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 16.8K bytes - Viewed (0) -
cmd/encryption-v1.go
errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS") // Additional MinIO errors for SSE-C requests. errObjectTampered = errors.New("The requested object was modified and may be compromised") // error returned when invalid encryption parameters are specified errInvalidEncryptionParameters = errors.New("The encryption parameters are not applicable to this object")
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
docs/nl/docs/features.md
* **Automatische validatie** zelfs voor *padoperatie* parameters gedefinieerd in dependencies. * Ondersteuning voor complexe gebruikersauthenticatiesystemen, **databaseverbindingen**, enz. * **Geen compromisen** met databases, gebruikersinterfaces, enz. Maar eenvoudige integratie met ze allemaal. ### Ongelimiteerde "plug-ins" Of anders gezegd, je hebt ze niet nodig, importeer en gebruik de code die je nodig hebt.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Sep 03 13:50:38 UTC 2024 - 10.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Many packages that simplify it a lot have to make many compromises with the data model, database, and available features. And some of these packages that simplify things too much actually have security flaws underneath. --- **FastAPI** doesn't make any compromise with any database, data model or tool. It gives you all the flexibility to choose the ones that fit your project the best.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
## Changelog since v1.17.8 ## Urgent Upgrade Notes ### (No, really, you MUST read this before you upgrade) - CVE-2020-8559 (Medium): Privilege escalation from compromised node to cluster. See https://github.com/kubernetes/kubernetes/issues/92914 for more details.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Jan 28 10:44:33 UTC 2021 - 346.2K bytes - Viewed (1)