- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 20 for openjsse (0.05 seconds)
-
okhttp-testing-support/src/main/kotlin/okhttp3/testing/PlatformRule.kt
if (!OpenJSSEPlatform.isSupported) { System.err.println("Warning: OpenJSSE not available") } if (System.getProperty("javax.net.debug") == null) { System.setProperty("javax.net.debug", "") } Security.insertProviderAt(OpenJSSE(), 1)
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 15.4K bytes - Click Count (1) -
okhttp/build.gradle.kts
implementation(libs.openjsse) implementation(libs.junit.jupiter.engine) implementation(libs.junit.vintage.engine) if (platform == "conscrypt") { implementation(rootProject.libs.conscrypt.openjdk) } else if (platform == "openjsse") { implementation(rootProject.libs.openjsse) } } }
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sat Nov 01 12:18:11 GMT 2025 - 12.3K bytes - Click Count (0) -
.github/workflows/build.yml
java-version: 17 - name: Setup Gradle uses: gradle/actions/setup-gradle@v5 - name: Run Tests run: ./gradlew test allTests -Dtest.java.version=8 -Dokhttp.platform=openjsse testconscrypt: runs-on: ubuntu-latest if: github.ref == 'refs/heads/master' || contains(github.event.pull_request.labels.*.name, 'conscrypt') steps: - name: CheckoutCreated: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Dec 12 04:49:37 GMT 2025 - 18.6K bytes - Click Count (0) -
docs/changelogs/changelog_4x.md
* Fix: Embed Proguard rules to prevent warnings from tools like DexGuard and R8. These warnings were triggered by OkHttp’s feature detection for TLS packages like `org.conscrypt`, `org.bouncycastle`, and `org.openjsse`. * Upgrade: Explicitly depend on `kotlin-stdlib-jdk8`. This fixes a problem with dependency locking. That's a potential security vulnerability, tracked as [CVE-2022-24329].Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Apr 17 13:25:31 GMT 2024 - 25.2K bytes - Click Count (0) -
cmd/sftp-server.go
kexAlgoCurve25519SHA256LibSSH = "******@****.***" kexAlgoCurve25519SHA256 = "curve25519-sha256" chacha20Poly1305ID = "chacha20-poly1305@openssh.com" gcm256CipherID = "aes256-gcm@openssh.com" aes128cbcID = "aes128-cbc" tripledescbcID = "3des-cbc" ) var ( errSFTPPublicKeyBadFormat = errors.New("the public key provided could not be parsed")
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.5K bytes - Click Count (0) -
docs/site-replication/run-replication-with-checksum-header.sh
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Jan 20 14:49:07 GMT 2025 - 11.5K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/HostnameVerifierTest.kt
// x509_extensions=x509_extensions // [distinguished_name] // [req_extensions] // [x509_extensions] // subjectAltName=DNS:localhost.localdomain,DNS:localhost,IP:127.0.0.1 // // $ openssl req -x509 -nodes -days 36500 -subj '/CN=localhost' -config ./cert.cnf \ // -newkey rsa:512 -out cert.pem val certificate = certificate( """ -----BEGIN CERTIFICATE-----Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 40.4K bytes - Click Count (0) -
docs/features/https.md
* **Connectivity** to as many hosts as possible. That includes advanced hosts that run the latest versions of [boringssl](https://boringssl.googlesource.com/boringssl/) and less out of date hosts running older versions of [OpenSSL](https://www.openssl.org/). * **Security** of the connection. This includes verification of the remote webserver with certificates and the privacy of data exchanged with strong ciphers.
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sat Dec 24 00:16:30 GMT 2022 - 10.5K bytes - Click Count (0) -
okhttp-tls/src/test/java/okhttp3/tls/HeldCertificateTest.kt
.isEqualTo("CN=cash.app,OU=engineering") } @Test fun decodeRsa512() { // The certificate + private key below was generated with OpenSSL. Never generate certificates // with MD5 or 512-bit RSA; that's insecure! // // openssl req \ // -x509 \ // -md5 \ // -nodes \ // -days 1 \ // -newkey rsa:512 \ // -keyout privateKey.key \
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 22.6K bytes - Click Count (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
Um einen sicheren zufälligen geheimen Schlüssel zu generieren, verwenden Sie den folgenden Befehl: <div class="termy"> ```console $ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Und kopieren Sie die Ausgabe in die Variable `SECRET_KEY` (verwenden Sie nicht die im Beispiel).
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Oct 01 15:19:54 GMT 2025 - 12.7K bytes - Click Count (0)