- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 57 for CERTIFICATE (0.06 seconds)
-
okhttp-tls/README.md
.heldCertificate(serverCertificate, intermediateCertificate.certificate()) .build(); ``` The client only needs to know the trusted root certificate. It checks the server's certificate by validating the signatures within the chain. ```java HandshakeCertificates clientCertificates = new HandshakeCertificates.Builder() .addTrustedCertificate(rootCertificate.certificate()) .build();
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 9.1K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* ``` * * In this example the HTTP client already knows and trusts the last certificate, "Entrust Root * Certification Authority - G2". That certificate is used to verify the signature of the * intermediate certificate, "Entrust Certification Authority - L1M". The intermediate certificate * is used to verify the signature of the "www.squareup.com" certificate. *
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 21.6K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
/** * Returns the SHA-256 of `certificate`'s public key. * * In OkHttp 3.1.2 and earlier, this returned a SHA-1 hash of the public key. Both types are * supported, but SHA-256 is preferred. */ @JvmStatic fun pin(certificate: Certificate): String { require(certificate is X509Certificate) { "Certificate pinning requires X509 certificates" }Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 14.2K bytes - Click Count (1) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
// Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare // an SSL context for an attacking webserver. It includes both these rogue certificates plus the // trusted good certificate above. The attack is that by including the good certificate in the // chain, we may trick the certificate pinner into accepting the rouge certificate. val compromisedIntermediateCa = HeldCertificateCreated: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 24.4K bytes - Click Count (2) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/tls/OkHostnameVerifier.kt
} } fun verify( host: String, certificate: X509Certificate, ): Boolean = when { host.canParseAsIpAddress() -> verifyIpAddress(host, certificate) else -> verifyHostname(host, certificate) } /** Returns true if [certificate] matches [ipAddress]. */ private fun verifyIpAddress( ipAddress: String, certificate: X509Certificate, ): Boolean {Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 7.6K bytes - Click Count (0) -
docs/features/https.md
on-300-000-iranians-using-fake-google-certificate.html). It also assumes your HTTPS servers’ certificates are signed by a certificate authority. Use [CertificatePinner](https://square.github.io/okhttp/5.x/okhttp/okhttp3/-certificate-pinner/) to restrict which certificates and certificate authorities are trusted. Certificate pinning increases security, but limits your server team’s abilities to update their TLS certificates. **Do not use certificate pinning without the blessing of your server’s...
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 10.5K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
In this case, it would use the certificate for `someapp.example.com`. <img src="/img/deployment/https/https03.drawio.svg"> The client already **trusts** the entity that generated that TLS certificate (in this case Let's Encrypt, but we'll see about that later), so it can **verify** that the certificate is valid.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 14K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Handshake.kt
@get:JvmName("localCertificates") val localCertificates: List<Certificate>, // Delayed provider of peerCertificates, to allow lazy cleaning. peerCertificatesFn: () -> List<Certificate>, ) { /** Returns a possibly-empty list of certificates that identify the remote peer. */ @get:JvmName("peerCertificates") val peerCertificates: List<Certificate> by lazy { try { peerCertificatesFn()Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 6.6K bytes - Click Count (1) -
okhttp-testing-support/src/main/kotlin/okhttp3/FakeSSLSession.kt
@file:Suppress("DEPRECATION") package okhttp3 import java.security.Principal import java.security.cert.Certificate import javax.net.ssl.SSLPeerUnverifiedException import javax.net.ssl.SSLSession import javax.net.ssl.SSLSessionContext import javax.security.cert.X509Certificate class FakeSSLSession( vararg val certificates: Certificate, ) : SSLSession { override fun getApplicationBufferSize(): Int = throw UnsupportedOperationException()Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Feb 03 22:17:59 GMT 2026 - 3.2K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt
) }, ) /** * ``` * Certificate ::= SEQUENCE { * tbsCertificate TBSCertificate, * signatureAlgorithm AlgorithmIdentifier, * signatureValue BIT STRING * } * ``` */ internal val certificate: BasicDerAdapter<Certificate> = Adapters.sequence( "Certificate", tbsCertificate, algorithmIdentifier,Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 13.6K bytes - Click Count (0)