- Sort Score
- Num 10 results
- Language All
Results 201 - 210 of 314 for certificats (0.07 seconds)
-
ci/official/containers/ml_build/setup.sources.sh
# Prevent apt install tzinfo from asking our location (assumes UTC) export DEBIAN_FRONTEND=noninteractive # Set up shared custom sources apt-get update apt-get install -y gnupg ca-certificates # Deadsnakes: https://launchpad.net/~deadsnakes/+archive/ubuntu/ppa apt-key adv --keyserver keyserver.ubuntu.com --recv-keys F23C5A6CF475977595C89F51BA6932366A755776 # LLVM/Clang: https://apt.llvm.org/
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Thu Oct 03 21:13:05 GMT 2024 - 1.6K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RetryTlsHandshake.kt
e is InterruptedIOException -> false // If the problem was a CertificateException from the X509TrustManager, do not retry. e is SSLHandshakeException && e.cause is CertificateException -> false // e.g. a certificate pinning error. e is SSLPeerUnverifiedException -> false // Retry for all other SSL failures. e is SSLException -> true else -> falseCreated: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 1.7K bytes - Click Count (0) -
mockwebserver/src/main/kotlin/mockwebserver3/MockWebServer.kt
/** * Configure the server to [want client auth][SSLSocket.setWantClientAuth]. If the * client presents a certificate that is [trusted][TrustManager] the handshake will * proceed normally. The connection will also proceed normally if the client presents no * certificate at all! But if the client presents an untrusted certificate the handshake * will fail and no connection will be established. */ public fun requestClientAuth() {
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sat Aug 02 20:36:00 GMT 2025 - 40.3K bytes - Click Count (0) -
api/go1.10.txt
pkg crypto/x509, type Certificate struct, ExcludedEmailAddresses []string pkg crypto/x509, type Certificate struct, ExcludedIPRanges []*net.IPNet pkg crypto/x509, type Certificate struct, ExcludedURIDomains []string pkg crypto/x509, type Certificate struct, PermittedEmailAddresses []string pkg crypto/x509, type Certificate struct, PermittedIPRanges []*net.IPNet pkg crypto/x509, type Certificate struct, PermittedURIDomains []string
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Tue Feb 06 05:00:01 GMT 2018 - 30.1K bytes - Click Count (0) -
src/main/java/jcifs/pac/PACDecodingException.java
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ package jcifs.pac; import jcifs.CIFSException; /** * Exception thrown when PAC (Privilege Attribute Certificate) data cannot be decoded. * Indicates malformed or invalid PAC structures in Kerberos tickets. */ public class PACDecodingException extends CIFSException { private static final long serialVersionUID = 1L;
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 2K bytes - Click Count (1) -
.github/PULL_REQUEST_TEMPLATE.md
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Tue Feb 13 22:36:19 GMT 2024 - 1.7K bytes - Click Count (0) -
docs/es/docs/deployment/concepts.md
* Con un componente externo como Certbot para las renovaciones de certificados * HAProxy * Con un componente externo como Certbot para las renovaciones de certificados * Kubernetes con un Controlador de Ingress como Nginx * Con un componente externo como cert-manager para las renovaciones de certificados * Manejado internamente por un proveedor de nube como parte de sus servicios (lee abajo 👇)Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 20.1K bytes - Click Count (0) -
samples/guide/src/main/java/okhttp3/recipes/kt/WiresharkExample.kt
// TLSv1.2 Events // Produced ClientHello handshake message // Consuming ServerHello handshake message // Consuming server Certificate handshake message // Consuming server CertificateStatus handshake message // Found trusted certificate // Consuming ECDH ServerKeyExchange handshake message // Consuming ServerHelloDone handshake messageCreated: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sat May 10 11:15:14 GMT 2025 - 10.9K bytes - Click Count (0) -
okhttp-testing-support/src/main/kotlin/okhttp3/JsseDebugLogging.kt
enum class Type { Handshake, Plaintext, Encrypted, Setup, Unknown, } val type: Type get() = when { message == "adding as trusted certificates" -> Type.Setup message == "Raw read" || message == "Raw write" -> Type.Encrypted message == "Plaintext before ENCRYPTION" || message == "Plaintext after DECRYPTION" -> Type.PlaintextCreated: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 2.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.11.md
previously created the first bootstrap client credentials in the certificates directory as `kubelet-client.key` and `kubelet-client.crt`. Subsequent certificates created by cert rotation were created in a combined PEM file that was atomically rotated as `kubelet-client-DATE.pem` in that directory, which meant clients relying on the `node.kubeconfig` generated by bootstrapping would never use a rotated cert. The initial bootstrap certificate is now generated into the cert directory as a PEM file and symlinked...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0)