- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 343 for certifikat (0.19 sec)
-
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/Certificate.kt
val data = CertificateAdapters.certificate.toDer(this) try { val certificateFactory = CertificateFactory.getInstance("X.509") val certificates = certificateFactory.generateCertificates(Buffer().write(data).inputStream()) return certificates.single() as X509Certificate } catch (e: NoSuchElementException) { throw IllegalArgumentException("failed to decode certificate", e) } catch (e: IllegalArgumentException) {
Plain Text - Registered: Fri Apr 19 11:42:09 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 6.4K bytes - Viewed (0) -
docs/de/docs/deployment/https.md
Der TLS-Terminierungsproxy hätte Zugriff auf ein oder mehrere **TLS-Zertifikate** (HTTPS-Zertifikate). Mithilfe der oben beschriebenen **SNI-Erweiterung** würde der TLS-Terminierungsproxy herausfinden, welches der verfügbaren TLS-Zertifikate (HTTPS) er für diese Verbindung verwenden muss, und zwar das, welches mit der vom Client erwarteten Domain übereinstimmt. In diesem Fall würde er das Zertifikat für `someapp.example.com` verwenden.
Plain Text - Registered: Sun Apr 21 07:19:11 GMT 2024 - Last Modified: Sat Mar 30 20:16:46 GMT 2024 - 13.5K bytes - Viewed (0) -
docs/fr/docs/deployment/https.md
* C'est une couche en dessous de HTTP. * Donc, le certificat et le traitement du cryptage sont faits avant HTTP. * TCP ne connaît pas les "domaines", seulement les adresses IP. * L'information sur le domaine spécifique demandé se trouve dans les données HTTP. * Les certificats HTTPS "certifient" un certain domaine, mais le protocole et le cryptage se font au niveau TCP, avant de savoir quel domaine est traité.
Plain Text - Registered: Sun Apr 21 07:19:11 GMT 2024 - Last Modified: Mon Oct 31 17:45:30 GMT 2022 - 4.1K bytes - Viewed (0) -
docs/de/docs/deployment/concepts.md
* HAProxy * Mit einer externen Komponente wie Certbot für Zertifikat-Erneuerungen * Kubernetes mit einem Ingress Controller wie Nginx * Mit einer externen Komponente wie cert-manager für Zertifikat-Erneuerungen * Es wird intern von einem Cloud-Anbieter als Teil seiner Dienste verwaltet (siehe unten 👇)
Plain Text - Registered: Sun Apr 21 07:19:11 GMT 2024 - Last Modified: Sat Mar 30 20:16:25 GMT 2024 - 20.6K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/CertificatePinnerTest.kt
} // Should not be pinned: certificatePinner.check("uk", listOf(certB1.certificate)) certificatePinner.check("co.uk", listOf(certB1.certificate)) certificatePinner.check("anotherexample.co.uk", listOf(certB1.certificate)) certificatePinner.check("foo.anotherexample.co.uk", listOf(certB1.certificate)) } @Test fun testBadPin() {
Plain Text - Registered: Fri Apr 19 11:42:09 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 9.9K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* * * The server's handshake certificates must have a [held certificate][HeldCertificate] (a * certificate and its private key). The certificate's subject alternative names must match the * server's hostname. The server must also have is a (possibly-empty) chain of intermediate * certificates to establish trust from a root certificate to the server's certificate. The root * certificate is not included in this chain.
Plain Text - Registered: Fri Apr 19 11:42:09 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 8.5K bytes - Viewed (1) -
okhttp-tls/src/test/java/okhttp3/tls/HeldCertificateTest.kt
val certificate = heldCertificate.certificate assertThat(certificate.getSubjectX500Principal().name, "self-signed") .isEqualTo(certificate.getIssuerX500Principal().name) assertThat(certificate.getIssuerX500Principal().name).matches(Regex("CN=[0-9a-f-]{36}")) assertThat(certificate.serialNumber).isEqualTo(BigInteger.ONE) assertThat(certificate.subjectAlternativeNames).isNull()
Plain Text - Registered: Fri Apr 19 11:42:09 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 22.5K bytes - Viewed (0) -
internal/config/certs_test.go
} certificate, err := createTempFile("public.crt", testCase.certificate) if err != nil { os.Remove(privateKey) t.Fatalf("Test %d: failed to create tmp certificate file: %v", i, err) } if testCase.password != "" { t.Setenv(EnvCertPassword, testCase.password) } _, err = LoadX509KeyPair(certificate, privateKey) if err != nil && !testCase.shouldFail {
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Mon Sep 19 18:05:16 GMT 2022 - 21.6K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/tls/CertificateChainCleaner.kt
* certificate is signed by the certificate that follows, and the last certificate is a trusted CA * certificate. * * Use of the chain cleaner is necessary to omit unexpected certificates that aren't relevant to * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate * pinning. */ abstract class CertificateChainCleaner { @Throws(SSLPeerUnverifiedException::class)
Plain Text - Registered: Fri Apr 19 11:42:09 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 2K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/tls/BasicCertificateChainCleaner.kt
* This is unexpected unless the trust root index in this class has a different trust manager than * what was used to establish [chain]. */ @Throws(SSLPeerUnverifiedException::class) override fun clean( chain: List<Certificate>, hostname: String, ): List<Certificate> { val queue: Deque<Certificate> = ArrayDeque(chain)
Plain Text - Registered: Fri Apr 19 11:42:09 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 4.8K bytes - Viewed (0)