- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 117 for certificado (0.08 seconds)
-
docs/pt/docs/deployment/https.md
O Proxy de Terminação TLS teria acesso a um ou mais certificados TLS (certificados HTTPS). Utilizando a extensão SNI discutida acima, o Proxy de Terminação TLS iria checar qual dos certificados TLS (HTTPS) disponíveis deve ser usado para essa conexão, utilizando o que corresponda ao domínio esperado pelo cliente. Nesse caso, ele usaria o certificado para `someapp.example.com`.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 14.6K bytes - Click Count (0) -
docs/es/docs/deployment/https.md
El TLS Termination Proxy tendría acceso a uno o más **certificados TLS** (certificados HTTPS). Usando la **extensión SNI** discutida anteriormente, el TLS Termination Proxy verificaría cuál de los certificados TLS (HTTPS) disponibles debería usar para esta conexión, usando el que coincida con el dominio esperado por el cliente. En este caso, usaría el certificado para `someapp.example.com`.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 15.1K bytes - Click Count (0) -
docs/fr/docs/deployment/https.md
Avant Let's Encrypt, ces **certificats HTTPS** étaient vendus par des tiers de confiance. Le processus d'acquisition de l'un de ces certificats était auparavant lourd, nécessitait pas mal de paperasses et les certificats étaient assez chers. Mais ensuite, **[Let's Encrypt](https://letsencrypt.org/)** a été créé.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 15.8K bytes - Click Count (0) -
docs/pt/docs/deployment/concepts.md
E tem que haver algo responsável por **renovar os certificados HTTPS**, pode ser o mesmo componente ou pode ser algo diferente. ### Ferramentas de exemplo para HTTPS { #example-tools-for-https } Algumas das ferramentas que você pode usar como um proxy de terminação TLS são: * Traefik * Lida automaticamente com renovações de certificados ✨ * Caddy * Lida automaticamente com renovações de certificados ✨ * NginxCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 20.3K bytes - Click Count (0) -
okhttp-tls/README.md
.heldCertificate(serverCertificate, intermediateCertificate.certificate()) .build(); ``` The client only needs to know the trusted root certificate. It checks the server's certificate by validating the signatures within the chain. ```java HandshakeCertificates clientCertificates = new HandshakeCertificates.Builder() .addTrustedCertificate(rootCertificate.certificate()) .build();
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 9.1K bytes - Click Count (0) -
docs/tls/README.md
``` ### 3.2 Use OpenSSL to Generate a Certificate Use one of the following methods to generate a certificate using `openssl`: * 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa) * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa) * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate) #### 3.2.1 Generate a private key with ECDSA
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.6K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* * * The server's handshake certificates must have a [held certificate][HeldCertificate] (a * certificate and its private key). The certificate's subject alternative names must match the * server's hostname. The server must also have is a (possibly-empty) chain of intermediate * certificates to establish trust from a root certificate to the server's certificate. The root * certificate is not included in this chain.
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sat May 10 11:15:14 GMT 2025 - 8.4K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* ``` * * In this example the HTTP client already knows and trusts the last certificate, "Entrust Root * Certification Authority - G2". That certificate is used to verify the signature of the * intermediate certificate, "Entrust Certification Authority - L1M". The intermediate certificate * is used to verify the signature of the "www.squareup.com" certificate. *
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 21.6K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
// Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare // an SSL context for an attacking webserver. It includes both these rogue certificates plus the // trusted good certificate above. The attack is that by including the good certificate in the // chain, we may trick the certificate pinner into accepting the rouge certificate. val compromisedIntermediateCa = HeldCertificateCreated: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 24.4K bytes - Click Count (2) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
/** * Returns the SHA-256 of `certificate`'s public key. * * In OkHttp 3.1.2 and earlier, this returned a SHA-1 hash of the public key. Both types are * supported, but SHA-256 is preferred. */ @JvmStatic fun pin(certificate: Certificate): String { require(certificate is X509Certificate) { "Certificate pinning requires X509 certificates" }Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 14.2K bytes - Click Count (1)