- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 380 for Certificate (0.23 sec)
-
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/Certificate.kt
val data = CertificateAdapters.certificate.toDer(this) try { val certificateFactory = CertificateFactory.getInstance("X.509") val certificates = certificateFactory.generateCertificates(Buffer().write(data).inputStream()) return certificates.single() as X509Certificate } catch (e: NoSuchElementException) { throw IllegalArgumentException("failed to decode certificate", e) } catch (e: IllegalArgumentException) {
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 6.4K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/Certificates.kt
throw IllegalArgumentException("failed to decode certificate", nsee) } catch (iae: IllegalArgumentException) { throw IllegalArgumentException("failed to decode certificate", iae) } catch (e: GeneralSecurityException) { throw IllegalArgumentException("failed to decode certificate", e) } } /** * Returns the certificate encoded in [PEM format][rfc_7468]. * * [rfc_7468]: https://tools.ietf.org/html/rfc7468 */
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 2.8K bytes - Viewed (2) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* * * The server's handshake certificates must have a [held certificate][HeldCertificate] (a * certificate and its private key). The certificate's subject alternative names must match the * server's hostname. The server must also have is a (possibly-empty) chain of intermediate * certificates to establish trust from a root certificate to the server's certificate. The root * certificate is not included in this chain.
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 8.5K bytes - Viewed (1) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* certificate can sign other certificates (but those certificates cannot themselves sign * certificates). Set this to 1 so this certificate can sign intermediate certificates that can * themselves sign certificates. Add one for each additional layer of intermediates to permit. */ fun certificateAuthority(maxIntermediateCas: Int) = apply {
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 21.6K bytes - Viewed (1) -
okhttp/src/main/kotlin/okhttp3/CertificatePinner.kt
* `api.publicobject.com` are valid if either A's or B's certificate is in the chain. * * ## Warning: Certificate Pinning is Dangerous! * * Pinning certificates limits your server team's abilities to update their TLS certificates. By * pinning certificates, you take on additional operational complexity and limit your ability to * migrate between certificate authorities. Do not use certificate pinning without the blessing of
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 14.2K bytes - Viewed (1) -
okhttp/src/main/kotlin/okhttp3/internal/tls/CertificateChainCleaner.kt
* certificate. * * Use of the chain cleaner is necessary to omit unexpected certificates that aren't relevant to * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate * pinning. */ abstract class CertificateChainCleaner { @Throws(SSLPeerUnverifiedException::class) abstract fun clean( chain: List<Certificate>,
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 2K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/CertificatePinnerTest.kt
} // Should not be pinned: certificatePinner.check("uk", listOf(certB1.certificate)) certificatePinner.check("co.uk", listOf(certB1.certificate)) certificatePinner.check("anotherexample.co.uk", listOf(certB1.certificate)) certificatePinner.check("foo.anotherexample.co.uk", listOf(certB1.certificate)) } @Test fun testBadPin() {
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 9.9K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/HeldCertificateTest.kt
val certificate = heldCertificate.certificate assertThat(certificate.getSubjectX500Principal().name, "self-signed") .isEqualTo(certificate.getIssuerX500Principal().name) assertThat(certificate.getIssuerX500Principal().name).matches(Regex("CN=[0-9a-f-]{36}")) assertThat(certificate.serialNumber).isEqualTo(BigInteger.ONE) assertThat(certificate.subjectAlternativeNames).isNull()
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 22.5K bytes - Viewed (0) -
istioctl/pkg/writer/ztunnel/configdump/certificates.go
} today := time.Now() expDate, err := time.Parse(time.RFC3339, cert.ExpirationTime) if err != nil { log.Errorf("certificate timestamp (%v) could not be parsed: %v", cert.ExpirationTime, err) return false } fromDate, err := time.Parse(time.RFC3339, cert.ValidFrom) if err != nil { log.Errorf("certificate timestamp (%v) could not be parsed: %v", cert.ValidFrom, err) return false }
Go - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Tue Apr 23 21:30:30 GMT 2024 - 3.5K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/tls/BasicCertificateChainCleaner.kt
* This is unexpected unless the trust root index in this class has a different trust manager than * what was used to establish [chain]. */ @Throws(SSLPeerUnverifiedException::class) override fun clean( chain: List<Certificate>, hostname: String, ): List<Certificate> { val queue: Deque<Certificate> = ArrayDeque(chain)
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 4.8K bytes - Viewed (0)