- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 169 for certificam (0.08 sec)
-
docs/pt/docs/deployment/https.md
- * A criptografia da conexão acontece no nível TCP.
- * Essa é uma camada abaixo do HTTP.
- * Portanto, o manuseio do certificado e da criptografia é feito antes do HTTP.
- * O TCP não sabe sobre "domínios". Apenas sobre endereços IP.
- * As informações sobre o domínio solicitado vão nos dados HTTP.
- * Os certificados HTTPS “certificam” um determinado domínio, mas o protocolo e a encriptação acontecem ao nível do TCP, antes de sabermos de que domínio se trata.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 3.9K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/Certificate.kt
- val data = CertificateAdapters.certificate.toDer(this)
- try {
- val certificateFactory = CertificateFactory.getInstance("X.509")
- val certificates = certificateFactory.generateCertificates(Buffer().write(data).inputStream())
- return certificates.single() as X509Certificate
- } catch (e: NoSuchElementException) {
- throw IllegalArgumentException("failed to decode certificate", e)
- } catch (e: IllegalArgumentException) {
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 6.4K bytes - Viewed (0) -
docs/fr/docs/deployment/https.md
- Maintenant, du point de vue d'un développeur, voici plusieurs choses à avoir en tête en pensant au HTTPS :
- * Pour le HTTPS, le serveur a besoin de "certificats" générés par une tierce partie.
- * Ces certificats sont en fait acquis auprès de la tierce partie, et non "générés".
- * Les certificats ont une durée de vie.
- * Ils expirent.
- * Puis ils doivent être renouvelés et acquis à nouveau auprès de la tierce partie.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 4.1K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/CertificatePinnerTest.kt
- }
- // Should not be pinned:
- certificatePinner.check("uk", listOf(certB1.certificate))
- certificatePinner.check("co.uk", listOf(certB1.certificate))
- certificatePinner.check("anotherexample.co.uk", listOf(certB1.certificate))
- certificatePinner.check("foo.anotherexample.co.uk", listOf(certB1.certificate))
- }
- @Test
- fun testBadPin() {
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 9.9K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
- * ```
- *
- * In this example the HTTP client already knows and trusts the last certificate, "Entrust Root
- * Certification Authority - G2". That certificate is used to verify the signature of the
- * intermediate certificate, "Entrust Certification Authority - L1M". The intermediate certificate
- * is used to verify the signature of the "www.squareup.com" certificate.
- *
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 21.6K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/CertificateChainCleanerTest.kt
- .serialNumber(1L)
- .build()
- val rootB =
- HeldCertificate.Builder()
- .serialNumber(2L)
- .build()
- assertThat(get(rootB.certificate, rootA.certificate))
- .isEqualTo(get(rootA.certificate, rootB.certificate))
- }
- @Test
- fun equalsFromTrustManager() {
- val handshakeCertificates = HandshakeCertificates.Builder().build()
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 9.3K bytes - Viewed (0) -
okhttp-tls/README.md
- .heldCertificate(serverCertificate, intermediateCertificate.certificate())
- .build();
- ```
- The client only needs to know the trusted root certificate. It checks the server's certificate by
- validating the signatures within the chain.
- ```java
- HandshakeCertificates clientCertificates = new HandshakeCertificates.Builder()
- .addTrustedCertificate(rootCertificate.certificate())
- .build();
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Dec 17 15:34:10 UTC 2023 - 9.1K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
- *
- * * The server's handshake certificates must have a [held certificate][HeldCertificate] (a
- * certificate and its private key). The certificate's subject alternative names must match the
- * server's hostname. The server must also have is a (possibly-empty) chain of intermediate
- * certificates to establish trust from a root certificate to the server's certificate. The root
- * certificate is not included in this chain.
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.5K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerCertificatesTest.kt
- val certificate =
- HeldCertificate.Builder()
- .keyPair(publicKey, privateKey)
- .build()
- val certificateByteString = certificate.certificate.encoded.toByteString()
- val okHttpCertificate =
- CertificateAdapters.certificate
- .fromDer(certificateByteString)
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 43.9K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
- // Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare
- // an SSL context for an attacking webserver. It includes both these rogue certificates plus the
- // trusted good certificate above. The attack is that by including the good certificate in the
- // chain, we may trick the certificate pinner into accepting the rouge certificate.
- val compromisedIntermediateCa =
- HeldCertificate.Builder()
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 23.8K bytes - Viewed (0)