Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 169 for certificam (0.08 sec)

  1. docs/pt/docs/deployment/https.md

    1. * A criptografia da conexão acontece no nível TCP.
    2. * Essa é uma camada abaixo do HTTP.
    3. * Portanto, o manuseio do certificado e da criptografia é feito antes do HTTP.
    4. * O TCP não sabe sobre "domínios". Apenas sobre endereços IP.
    5. * As informações sobre o domínio solicitado vão nos dados HTTP.
    6. * Os certificados HTTPS certificam um determinado domínio, mas o protocolo e a encriptação acontecem ao nível do TCP, antes de sabermos de que domínio se trata.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  2. okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/Certificate.kt

    1. val data = CertificateAdapters.certificate.toDer(this)
    2. try {
    3. val certificateFactory = CertificateFactory.getInstance("X.509")
    4. val certificates = certificateFactory.generateCertificates(Buffer().write(data).inputStream())
    5. return certificates.single() as X509Certificate
    6. } catch (e: NoSuchElementException) {
    7. throw IllegalArgumentException("failed to decode certificate", e)
    8. } catch (e: IllegalArgumentException) {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  3. docs/fr/docs/deployment/https.md

    1. Maintenant, du point de vue d'un développeur, voici plusieurs choses à avoir en tête en pensant au HTTPS :
    2.  
    3. * Pour le HTTPS, le serveur a besoin de "certificats" générés par une tierce partie.
    4. * Ces certificats sont en fait acquis auprès de la tierce partie, et non "générés".
    5. * Les certificats ont une durée de vie.
    6. * Ils expirent.
    7. * Puis ils doivent être renouvelés et acquis à nouveau auprès de la tierce partie.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  4. okhttp/src/test/java/okhttp3/CertificatePinnerTest.kt

    1. }
    2.  
    3. // Should not be pinned:
    4. certificatePinner.check("uk", listOf(certB1.certificate))
    5. certificatePinner.check("co.uk", listOf(certB1.certificate))
    6. certificatePinner.check("anotherexample.co.uk", listOf(certB1.certificate))
    7. certificatePinner.check("foo.anotherexample.co.uk", listOf(certB1.certificate))
    8. }
    9.  
    10. @Test
    11. fun testBadPin() {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  5. okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt

    1. * ```
    2. *
    3. * In this example the HTTP client already knows and trusts the last certificate, "Entrust Root
    4. * Certification Authority - G2". That certificate is used to verify the signature of the
    5. * intermediate certificate, "Entrust Certification Authority - L1M". The intermediate certificate
    6. * is used to verify the signature of the "www.squareup.com" certificate.
    7. *
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 21.6K bytes
    - Viewed (0)
  6. okhttp/src/test/java/okhttp3/CertificateChainCleanerTest.kt

    1. .serialNumber(1L)
    2. .build()
    3. val rootB =
    4. HeldCertificate.Builder()
    5. .serialNumber(2L)
    6. .build()
    7. assertThat(get(rootB.certificate, rootA.certificate))
    8. .isEqualTo(get(rootA.certificate, rootB.certificate))
    9. }
    10.  
    11. @Test
    12. fun equalsFromTrustManager() {
    13. val handshakeCertificates = HandshakeCertificates.Builder().build()
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 9.3K bytes
    - Viewed (0)
  7. okhttp-tls/README.md

    1. .heldCertificate(serverCertificate, intermediateCertificate.certificate())
    2. .build();
    3. ```
    4.  
    5. The client only needs to know the trusted root certificate. It checks the server's certificate by
    6. validating the signatures within the chain.
    7.  
    8. ```java
    9. HandshakeCertificates clientCertificates = new HandshakeCertificates.Builder()
    10. .addTrustedCertificate(rootCertificate.certificate())
    11. .build();
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Dec 17 15:34:10 UTC 2023
    - 9.1K bytes
    - Viewed (0)
  8. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

    1. *
    2. * * The server's handshake certificates must have a [held certificate][HeldCertificate] (a
    3. * certificate and its private key). The certificate's subject alternative names must match the
    4. * server's hostname. The server must also have is a (possibly-empty) chain of intermediate
    5. * certificates to establish trust from a root certificate to the server's certificate. The root
    6. * certificate is not included in this chain.
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  9. okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerCertificatesTest.kt

    1. val certificate =
    2. HeldCertificate.Builder()
    3. .keyPair(publicKey, privateKey)
    4. .build()
    5.  
    6. val certificateByteString = certificate.certificate.encoded.toByteString()
    7.  
    8. val okHttpCertificate =
    9. CertificateAdapters.certificate
    10. .fromDer(certificateByteString)
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 43.9K bytes
    - Viewed (0)
  10. okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

    1. // Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare
    2. // an SSL context for an attacking webserver. It includes both these rogue certificates plus the
    3. // trusted good certificate above. The attack is that by including the good certificate in the
    4. // chain, we may trick the certificate pinner into accepting the rouge certificate.
    5. val compromisedIntermediateCa =
    6. HeldCertificate.Builder()
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 23.8K bytes
    - Viewed (0)
Back to top