- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 28 for trustweb (0.03 sec)
-
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
* * * The victim's gets a non-CA certificate signed by a CA, and pins the CA root and/or * intermediate. This is business as usual. * * ``` * pinnedRoot (trusted by CertificatePinner) * -> pinnedIntermediate (trusted by CertificatePinner) * -> realVictim * ``` * * The attacker compromises a CA. They take the public key from an intermediate certificate
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
/** * Configure the certificate chain to use when being authenticated. The first certificate is * the held certificate, further certificates are included in the handshake so the peer can * build a trusted path to a trusted root certificate. * * The chain should include all intermediate certificates but does not need the root certificate * that we expect to be known by the remote peer. The peer already has that certificate so
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat May 10 11:15:14 UTC 2025 - 8.4K bytes - Viewed (0) -
src/main/java/jcifs/DfsResolver.java
* * <p>This interface is intended for internal use.</p> */ public interface DfsResolver { /** * Checks if a domain is trusted for DFS operations * @param tf the CIFS context * @param domain the domain name to check * @return whether the given domain is trusted * @throws CIFSException if the operation fails */ boolean isTrustedDomain(CIFSContext tf, String domain) throws CIFSException;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 2.4K bytes - Viewed (0) -
okhttp-tls/README.md
----------------------- The above example uses a self-signed certificate. This is convenient for testing but not representative of real-world HTTPS deployment. To get closer to that we can use `HeldCertificate` to generate a trusted root certificate, an intermediate certificate, and a server certificate. We use `certificateAuthority(int)` to create certificates that can sign other certificates. The
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jul 07 19:32:33 UTC 2025 - 9.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/Dfs.java
/** * Cache of trusted domains for DFS resolution */ protected CacheEntry _domains = null; /* aka trusted domains cache */ /** * Cache of DFS referrals */ protected CacheEntry referrals = null; /** * Gets the map of trusted domains for DFS resolution * @param auth the authentication credentials * @return a map of trusted domain names to domain controllers
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 14.2K bytes - Viewed (0) -
cmd/sftp-server.go
if err != nil { logger.Fatal(fmt.Errorf("invalid arguments passed, trusted user certificate authority public key file is not accessible: %v", err), "unable to start SFTP server") } globalSFTPTrustedCAPubkey, _, _, _, err = ssh.ParseAuthorizedKey(keyBytes) if err != nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 16.5K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* Caddy (that can also handle certificate renewals) * Nginx * HAProxy ## Let's Encrypt { #lets-encrypt } Before Let's Encrypt, these **HTTPS certificates** were sold by trusted third parties. The process to acquire one of these certificates used to be cumbersome, require quite some paperwork and the certificates were quite expensive.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtStatus.java
/** The SAM database does not have a computer account for this workstation trust relationship */ int NT_STATUS_NO_TRUST_SAM_ACCOUNT = 0xC000018b; /** The trust relationship between the primary domain and the trusted domain failed */ int NT_STATUS_TRUSTED_DOMAIN_FAILURE = 0xC000018c; /** The trust relationship between this workstation and the primary domain failed */ int NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE = 0xC000018d;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 14.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtStatus.java
/** The SAM database does not have a computer account for this workstation trust relationship */ int NT_STATUS_NO_TRUST_SAM_ACCOUNT = 0xC000018b; /** The trust relationship between the primary domain and the trusted domain failed */ int NT_STATUS_TRUSTED_DOMAIN_FAILURE = 0xC000018c; /** The account used is a computer account */ int NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT = 0xC0000199;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 13.2K bytes - Viewed (0) -
docs/en/docs/advanced/behind-a-proxy.md
You can start FastAPI CLI with the *CLI Option* `--forwarded-allow-ips` and pass the IP addresses that should be trusted to read those forwarded headers. If you set it to `--forwarded-allow-ips="*"` it would trust all the incoming IPs. If your **server** is behind a trusted **proxy** and only the proxy talks to it, this would make it accept whatever is the IP of that **proxy**. <div class="termy"> ```console
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 16K bytes - Viewed (0)