- Sort Score
- Result 10 results
- Languages All
Results 1 - 2 of 2 for Trick (0.14 sec)
-
okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
// an SSL context for an attacking webserver. It includes both these rogue certificates plus the // trusted good certificate above. The attack is that by including the good certificate in the // chain, we may trick the certificate pinner into accepting the rouge certificate. val compromisedIntermediateCa = HeldCertificate.Builder() .signedBy(rootCa) .certificateAuthority(0) .serialNumber(4L)
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 23.8K bytes - Viewed (0) -
docs/changelogs/changelog_2x.md
```java RequestBody.create(null, new byte[0]); ``` * **`CertificatePinner` now supports wildcard hostnames.** As always with certificate pinning, you must be very careful to avoid [bricking][brick] your app. You'll need to pin both the top-level domain and the `*.` domain for full coverage. ```java client.setCertificatePinner(new CertificatePinner.Builder()
Plain Text - Registered: Fri Apr 26 11:42:10 GMT 2024 - Last Modified: Sun Feb 06 02:19:09 GMT 2022 - 26.6K bytes - Viewed (0)