- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 69 for Certificates (0.25 sec)
-
okhttp-tls/src/main/kotlin/okhttp3/tls/Certificates.kt
throw IllegalArgumentException("failed to decode certificate", nsee) } catch (iae: IllegalArgumentException) { throw IllegalArgumentException("failed to decode certificate", iae) } catch (e: GeneralSecurityException) { throw IllegalArgumentException("failed to decode certificate", e) } } /** * Returns the certificate encoded in [PEM format][rfc_7468]. * * [rfc_7468]: https://tools.ietf.org/html/rfc7468 */
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 2.8K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* certificate can sign other certificates (but those certificates cannot themselves sign * certificates). Set this to 1 so this certificate can sign intermediate certificates that can * themselves sign certificates. Add one for each additional layer of intermediates to permit. */ fun certificateAuthority(maxIntermediateCas: Int) = apply {
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 21.6K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* * * The client's handshake certificates must have a [held certificate][HeldCertificate] (a * certificate and its private key). The client must also have a (possibly-empty) chain of * intermediate certificates to establish trust from a root certificate to the client's * certificate. The root certificate is not included in this chain. * * The server's handshake certificates must include a set of trusted root certificates. They
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat May 10 11:15:14 UTC 2025 - 8.4K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/CertificateChainCleanerTest.kt
assertThat(cleaner.clean(certificates, "hostname")).isEqualTo(certificates) assertThat(cleaner.clean(certificates.subList(0, 9), "hostname")).isEqualTo( certificates, ) } @Test fun chainTooLong() { val heldCertificates = chainOfLength(11) val certificates: MutableList<Certificate> = ArrayList() for (heldCertificate in heldCertificates) { certificates.add(heldCertificate.certificate)
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 9.5K bytes - Viewed (1) -
okhttp-tls/README.md
to generate a trusted root certificate, an intermediate certificate, and a server certificate. We use `certificateAuthority(int)` to create certificates that can sign other certificates. The int specifies how many intermediate certificates are allowed beneath it in the chain. ```java HeldCertificate rootCertificate = new HeldCertificate.Builder() .certificateAuthority(1) .build();
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jul 07 19:32:33 UTC 2025 - 9.1K bytes - Viewed (0) -
okhttp-testing-support/src/main/kotlin/okhttp3/FakeSSLSession.kt
* the License. */ package okhttp3 import java.security.Principal import java.security.cert.Certificate import javax.net.ssl.SSLPeerUnverifiedException import javax.net.ssl.SSLSession import javax.net.ssl.SSLSessionContext import javax.security.cert.X509Certificate class FakeSSLSession( vararg val certificates: Certificate, ) : SSLSession { override fun getApplicationBufferSize(): Int = throw UnsupportedOperationException()
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 3.1K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
* `api.publicobject.com` are valid if either A's or B's certificate is in the chain. * * ## Warning: Certificate Pinning is Dangerous! * * Pinning certificates limits your server team's abilities to update their TLS certificates. By * pinning certificates, you take on additional operational complexity and limit your ability to * migrate between certificate authorities. Do not use certificate pinning without the blessing of
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 14.1K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/kt/CustomTrust.kt
.addTrustedCertificate(comodoRsaCertificationAuthority) // Uncomment if standard certificates are also required. // .addPlatformTrustedCertificates() .build() client = OkHttpClient .Builder() .sslSocketFactory(certificates.sslSocketFactory(), certificates.trustManager) .build() } fun run() { showUrl("https://squareup.com/robots.txt")
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 8.8K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/tls/CertificateChainCleaner.kt
* certificate. * * Use of the chain cleaner is necessary to omit unexpected certificates that aren't relevant to * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate * pinning. */ abstract class CertificateChainCleaner { @Throws(SSLPeerUnverifiedException::class) abstract fun clean( chain: List<Certificate>,
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 2K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
// Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare // an SSL context for an attacking webserver. It includes both these rogue certificates plus the // trusted good certificate above. The attack is that by including the good certificate in the // chain, we may trick the certificate pinner into accepting the rouge certificate. val compromisedIntermediateCa = HeldCertificate
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1)