Search Options

Results per page
Sort
Preferred Languages
Advance

Results 91 - 100 of 184 for handshakes (0.15 sec)

  1. samples/guide/src/main/java/okhttp3/recipes/CheckHandshake.java

            "sha256/afwiKY3RxoMmLkuRW1l7QsPZTJPwDS2pdDROQjXw8ig=");
    
        @Override public Response intercept(Chain chain) throws IOException {
          for (Certificate certificate : chain.connection().handshake().peerCertificates()) {
            String pin = CertificatePinner.pin(certificate);
            if (denylist.contains(pin)) {
              throw new IOException("Denylisted peer certificate: " + pin);
            }
          }
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Mon Apr 15 14:55:09 UTC 2024
    - 2.1K bytes
    - Viewed (0)
  2. mockwebserver/src/main/kotlin/mockwebserver3/MockWebServer.kt

       * client presents a certificate that is [trusted][TrustManager] the handshake will
       * proceed normally. The connection will also proceed normally if the client presents no
       * certificate at all! But if the client presents an untrusted certificate the handshake
       * will fail and no connection will be established.
       */
      fun requestClientAuth() {
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Sun Mar 31 17:16:15 UTC 2024
    - 37.4K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_server_tls13.go

    	transcript      hash.Hash
    	clientFinished  []byte
    }
    
    func (hs *serverHandshakeStateTLS13) handshake() error {
    	c := hs.c
    
    	if needFIPS() {
    		return errors.New("tls: internal error: TLS 1.3 reached in FIPS mode")
    	}
    
    	// For an overview of the TLS 1.3 handshake, see RFC 8446, Section 2.
    	if err := hs.processClientHello(); err != nil {
    		return err
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  4. src/crypto/tls/alert.go

    	alertDecryptionFailed:             "decryption failed",
    	alertRecordOverflow:               "record overflow",
    	alertDecompressionFailure:         "decompression failure",
    	alertHandshakeFailure:             "handshake failure",
    	alertBadCertificate:               "bad certificate",
    	alertUnsupportedCertificate:       "unsupported certificate",
    	alertCertificateRevoked:           "revoked certificate",
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  5. okhttp/src/main/kotlin/okhttp3/internal/tls/CertificateChainCleaner.kt

     * certificate is signed by the certificate that follows, and the last certificate is a trusted CA
     * certificate.
     *
     * Use of the chain cleaner is necessary to omit unexpected certificates that aren't relevant to
     * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate
     * pinning.
     */
    abstract class CertificateChainCleaner {
      @Throws(SSLPeerUnverifiedException::class)
      abstract fun clean(
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 2K bytes
    - Viewed (0)
  6. pkg/kubelet/certificate/transport.go

    //
    // The returned transport periodically checks the manager to determine if the
    // certificate has changed. If it has, the transport shuts down all existing client
    // connections, forcing the client to re-handshake with the server and use the
    // new certificate.
    //
    // The exitAfter duration, if set, will terminate the current process if a certificate
    // is not available from the store (because it has been deleted on disk or is corrupt)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Dec 08 13:57:45 UTC 2022
    - 6.5K bytes
    - Viewed (0)
  7. okhttp/api/okhttp.api

    	public fun toString ()Ljava/lang/String;
    }
    
    public final class okhttp3/Handshake$Companion {
    	public final fun -deprecated_get (Ljavax/net/ssl/SSLSession;)Lokhttp3/Handshake;
    	public final fun get (Ljavax/net/ssl/SSLSession;)Lokhttp3/Handshake;
    	public final fun get (Lokhttp3/TlsVersion;Lokhttp3/CipherSuite;Ljava/util/List;Ljava/util/List;)Lokhttp3/Handshake;
    }
    
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Mon Apr 15 13:41:01 UTC 2024
    - 70.2K bytes
    - Viewed (0)
  8. docs/de/docs/deployment/https.md

    <img src="/img/deployment/https/https01.svg">
    
    ### TLS-Handshake-Start
    
    Der Browser kommuniziert dann mit dieser IP-Adresse über **Port 443** (den HTTPS-Port).
    
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Sat Mar 30 20:16:46 UTC 2024
    - 13.5K bytes
    - Viewed (0)
  9. pkg/test/echo/server/forwarder/websocket.go

    		TLSClientConfig:  cfg.tlsConfig,
    		NetDial:          dialContext,
    		HandshakeTimeout: cfg.timeout,
    	}
    
    	conn, _, err := dialer.Dial(req.Url, wsReq)
    	if err != nil {
    		// timeout or bad handshake
    		return outBuffer.String(), err
    	}
    	defer func() {
    		_ = conn.Close()
    	}()
    
    	// Apply per-request timeout to calculate deadline for reads/writes.
    	ctx, cancel := context.WithTimeout(ctx, cfg.timeout)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jul 11 16:27:16 UTC 2022
    - 3.3K bytes
    - Viewed (0)
  10. docs/en/docs/deployment/https.md

    The DNS servers would tell the browser to use some specific **IP address**. That would be the public IP address used by your server, that you configured in the DNS servers.
    
    <img src="/img/deployment/https/https01.svg">
    
    ### TLS Handshake Start
    
    The browser would then communicate with that IP address on **port 443** (the HTTPS port).
    
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Thu Jan 11 16:31:18 UTC 2024
    - 12K bytes
    - Viewed (0)
Back to top