Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 156 for CERTIFICATE (0.14 sec)

  1. okhttp/src/test/java/okhttp3/CertificatePinnerTest.kt

        }
    
        // Should not be pinned:
        certificatePinner.check("uk", listOf(certB1.certificate))
        certificatePinner.check("co.uk", listOf(certB1.certificate))
        certificatePinner.check("anotherexample.co.uk", listOf(certB1.certificate))
        certificatePinner.check("foo.anotherexample.co.uk", listOf(certB1.certificate))
      }
    
      @Test
      fun testBadPin() {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  2. okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt

     * ```
     *
     * In this example the HTTP client already knows and trusts the last certificate, "Entrust Root
     * Certification Authority - G2". That certificate is used to verify the signature of the
     * intermediate certificate, "Entrust Certification Authority - L1M". The intermediate certificate
     * is used to verify the signature of the "www.squareup.com" certificate.
     *
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 21.6K bytes
    - Viewed (0)
  3. okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerCertificatesTest.kt

        val certificate =
          HeldCertificate.Builder()
            .keyPair(publicKey, privateKey)
            .build()
    
        val certificateByteString = certificate.certificate.encoded.toByteString()
    
        val okHttpCertificate =
          CertificateAdapters.certificate
            .fromDer(certificateByteString)
    
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 43.9K bytes
    - Viewed (0)
  4. okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

        // Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare
        // an SSL context for an attacking webserver. It includes both these rogue certificates plus the
        // trusted good certificate above. The attack is that by including the good certificate in the
        // chain, we may trick the certificate pinner into accepting the rouge certificate.
        val compromisedIntermediateCa =
          HeldCertificate.Builder()
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 23.8K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/certificates/v1/generated.proto

      //  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
      //  6. Whether or not requests for CA certificates are allowed.
      optional string signerName = 7;
    
      // expirationSeconds is the requested duration of validity of the issued
      // certificate. The certificate signer may issue a certificate with a different
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 11.6K bytes
    - Viewed (0)
  6. docs/en/docs/deployment/https.md

    In this case, it would use the certificate for `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.svg">
    
    The client already **trusts** the entity that generated that TLS certificate (in this case Let's Encrypt, but we'll see about that later), so it can **verify** that the certificate is valid.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 12K bytes
    - Viewed (0)
  7. internal/config/certs_test.go

    		}
    		certificate, err := createTempFile("public.crt", testCase.certificate)
    		if err != nil {
    			os.Remove(privateKey)
    			t.Fatalf("Test %d: failed to create tmp certificate file: %v", i, err)
    		}
    
    		if testCase.password != "" {
    			t.Setenv(EnvCertPassword, testCase.password)
    		}
    		_, err = LoadX509KeyPair(certificate, privateKey)
    		if err != nil && !testCase.shouldFail {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Sep 19 18:05:16 UTC 2022
    - 21.6K bytes
    - Viewed (0)
  8. okhttp-tls/src/test/java/okhttp3/tls/HeldCertificateTest.kt

        val certificate = heldCertificate.certificate
        assertThat(certificate.getSubjectX500Principal().name, "self-signed")
          .isEqualTo(certificate.getIssuerX500Principal().name)
        assertThat(certificate.getIssuerX500Principal().name).matches(Regex("CN=[0-9a-f-]{36}"))
        assertThat(certificate.serialNumber).isEqualTo(BigInteger.ONE)
        assertThat(certificate.subjectAlternativeNames).isNull()
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 22.5K bytes
    - Viewed (0)
  9. cmd/sts-handlers.go

    	// configured expiry and the duration until the certificate itself
    	// expires.
    	// We must not issue credentials that out-live the certificate.
    	if validUntil := time.Until(certificate.NotAfter); validUntil < expiry {
    		expiry = validUntil
    	}
    
    	// Associate any service accounts to the certificate CN
    	parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 15 01:29:20 UTC 2024
    - 33.9K bytes
    - Viewed (0)
  10. okhttp/src/test/java/okhttp3/internal/tls/HostnameVerifierTest.kt

      }
    
      private fun certificate(certificate: String): X509Certificate {
        return CertificateFactory.getInstance("X.509")
          .generateCertificate(ByteArrayInputStream(certificate.toByteArray()))
          as X509Certificate
      }
    
      private fun session(certificate: String): SSLSession = FakeSSLSession(certificate(certificate))
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 40.3K bytes
    - Viewed (0)
Back to top