- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 184 for handshakes (0.15 sec)
-
samples/guide/src/main/java/okhttp3/recipes/CheckHandshake.java
"sha256/afwiKY3RxoMmLkuRW1l7QsPZTJPwDS2pdDROQjXw8ig="); @Override public Response intercept(Chain chain) throws IOException { for (Certificate certificate : chain.connection().handshake().peerCertificates()) { String pin = CertificatePinner.pin(certificate); if (denylist.contains(pin)) { throw new IOException("Denylisted peer certificate: " + pin); } }
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Apr 15 14:55:09 UTC 2024 - 2.1K bytes - Viewed (0) -
mockwebserver/src/main/kotlin/mockwebserver3/MockWebServer.kt
* client presents a certificate that is [trusted][TrustManager] the handshake will * proceed normally. The connection will also proceed normally if the client presents no * certificate at all! But if the client presents an untrusted certificate the handshake * will fail and no connection will be established. */ fun requestClientAuth() {
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Sun Mar 31 17:16:15 UTC 2024 - 37.4K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
transcript hash.Hash clientFinished []byte } func (hs *serverHandshakeStateTLS13) handshake() error { c := hs.c if needFIPS() { return errors.New("tls: internal error: TLS 1.3 reached in FIPS mode") } // For an overview of the TLS 1.3 handshake, see RFC 8446, Section 2. if err := hs.processClientHello(); err != nil { return err }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0) -
src/crypto/tls/alert.go
alertDecryptionFailed: "decryption failed", alertRecordOverflow: "record overflow", alertDecompressionFailure: "decompression failure", alertHandshakeFailure: "handshake failure", alertBadCertificate: "bad certificate", alertUnsupportedCertificate: "unsupported certificate", alertCertificateRevoked: "revoked certificate",
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 4.3K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/tls/CertificateChainCleaner.kt
* certificate is signed by the certificate that follows, and the last certificate is a trusted CA * certificate. * * Use of the chain cleaner is necessary to omit unexpected certificates that aren't relevant to * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate * pinning. */ abstract class CertificateChainCleaner { @Throws(SSLPeerUnverifiedException::class) abstract fun clean(
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 2K bytes - Viewed (0) -
pkg/kubelet/certificate/transport.go
// // The returned transport periodically checks the manager to determine if the // certificate has changed. If it has, the transport shuts down all existing client // connections, forcing the client to re-handshake with the server and use the // new certificate. // // The exitAfter duration, if set, will terminate the current process if a certificate // is not available from the store (because it has been deleted on disk or is corrupt)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Dec 08 13:57:45 UTC 2022 - 6.5K bytes - Viewed (0) -
okhttp/api/okhttp.api
public fun toString ()Ljava/lang/String; } public final class okhttp3/Handshake$Companion { public final fun -deprecated_get (Ljavax/net/ssl/SSLSession;)Lokhttp3/Handshake; public final fun get (Ljavax/net/ssl/SSLSession;)Lokhttp3/Handshake; public final fun get (Lokhttp3/TlsVersion;Lokhttp3/CipherSuite;Ljava/util/List;Ljava/util/List;)Lokhttp3/Handshake; }
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Apr 15 13:41:01 UTC 2024 - 70.2K bytes - Viewed (0) -
docs/de/docs/deployment/https.md
<img src="/img/deployment/https/https01.svg"> ### TLS-Handshake-Start Der Browser kommuniziert dann mit dieser IP-Adresse über **Port 443** (den HTTPS-Port).
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Sat Mar 30 20:16:46 UTC 2024 - 13.5K bytes - Viewed (0) -
pkg/test/echo/server/forwarder/websocket.go
TLSClientConfig: cfg.tlsConfig, NetDial: dialContext, HandshakeTimeout: cfg.timeout, } conn, _, err := dialer.Dial(req.Url, wsReq) if err != nil { // timeout or bad handshake return outBuffer.String(), err } defer func() { _ = conn.Close() }() // Apply per-request timeout to calculate deadline for reads/writes. ctx, cancel := context.WithTimeout(ctx, cfg.timeout)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 11 16:27:16 UTC 2022 - 3.3K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
The DNS servers would tell the browser to use some specific **IP address**. That would be the public IP address used by your server, that you configured in the DNS servers. <img src="/img/deployment/https/https01.svg"> ### TLS Handshake Start The browser would then communicate with that IP address on **port 443** (the HTTPS port).
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Thu Jan 11 16:31:18 UTC 2024 - 12K bytes - Viewed (0)