- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 57 for certificado (0.08 sec)
-
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
// Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare // an SSL context for an attacking webserver. It includes both these rogue certificates plus the // trusted good certificate above. The attack is that by including the good certificate in the // chain, we may trick the certificate pinner into accepting the rouge certificate. val compromisedIntermediateCa = HeldCertificate
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1) -
okhttp-tls/README.md
.heldCertificate(serverCertificate, intermediateCertificate.certificate()) .build(); ``` The client only needs to know the trusted root certificate. It checks the server's certificate by validating the signatures within the chain. ```java HandshakeCertificates clientCertificates = new HandshakeCertificates.Builder() .addTrustedCertificate(rootCertificate.certificate()) .build();
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jul 07 19:32:33 UTC 2025 - 9.1K bytes - Viewed (0) -
docs/tls/README.md
``` ### 3.2 Use OpenSSL to Generate a Certificate Use one of the following methods to generate a certificate using `openssl`: * 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa) * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa) * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate) #### 3.2.1 Generate a private key with ECDSA
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.6K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
In this case, it would use the certificate for `someapp.example.com`. <img src="/img/deployment/https/https03.drawio.svg"> The client already **trusts** the entity that generated that TLS certificate (in this case Let's Encrypt, but we'll see about that later), so it can **verify** that the certificate is valid.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
cmd/sts-handlers.go
// configured expiry and the duration until the certificate itself // expires. // We must not issue credentials that out-live the certificate. if validUntil := time.Until(certificate.NotAfter); validUntil < expiry { expiry = validUntil } // Associate any service accounts to the certificate CN parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
docs/sts/tls.md
credentials via the STS API. It can authenticate via a client certificate and obtain a access/secret key pair as well as a session token. These credentials are associated to an S3 policy at the MinIO server. In case of certificate-based authentication, MinIO has to map the client-provided certificate to an S3 policy. MinIO does this via the subject common name field of the X.509 certificate. So, MinIO will associate a certificate with a subject `CN = foobar` to a S3 policy named `foobar`....
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6K bytes - Viewed (1) -
okhttp/src/jvmTest/kotlin/okhttp3/KotlinSourceModernTest.kt
val certificate: X509Certificate = heldCertificate.certificate val certificatePinner: CertificatePinner = CertificatePinner.Builder().build() val certificates: List<Certificate> = listOf() certificatePinner.check("", listOf(certificate)) certificatePinner.check("", arrayOf<Certificate>(certificate, certificate).toList()) val pin: String = CertificatePinner.pin(certificate)
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Jun 21 20:36:35 UTC 2025 - 46.5K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/ConnectionCoalescingTest.kt
/** Can still coalesce when pinning is used if pins match. */ @Test fun coalescesWhenCertificatePinsMatch() { val pinner = CertificatePinner .Builder() .add("san.com", pin(certificate.certificate)) .build() client = client.newBuilder().certificatePinner(pinner).build() server.enqueue(MockResponse()) server.enqueue(MockResponse())
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Thu Jun 19 11:44:16 UTC 2025 - 19.1K bytes - Viewed (0) -
cmd/sftp-server.go
} cert, ok := clientKey.(*ssh.Certificate) if !ok { return errSftpPublicKeyWithoutCert } // ssh.CheckCert called by ssh.Authenticate accepts certificates // with empty principles list so we block those in here. if len(cert.ValidPrincipals) == 0 { return errSftpCertWithoutPrincipals } // Verify that certificate provided by user is issued by trusted CA,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 16.5K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/ClientAuthTest.kt
val keyManager = newKeyManager( null, serverCert, serverIntermediateCa.certificate, ) val trustManager = newTrustManager( null, Arrays.asList(serverRootCa.certificate, clientRootCa.certificate), emptyList(), ) val sslContext = SSLContext.getInstance("TLS") sslContext.init(
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Jun 18 12:28:21 UTC 2025 - 12.7K bytes - Viewed (0)