- Sort Score
- Num 10 results
- Language All
Results 51 - 60 of 289 for certificado (0.4 seconds)
-
regression-test/src/androidTest/java/okhttp/regression/LetsEncryptTest.java
"emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc=\n" + "-----END CERTIFICATE-----"; CertificateFactory cf = CertificateFactory.getInstance("X.509"); Certificate isgCertificate = cf.generateCertificate(new ByteArrayInputStream(isgCert.getBytes("UTF-8"))); HandshakeCertificates certificates = new HandshakeCertificates.Builder()Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Tue Nov 17 07:40:31 GMT 2020 - 6.1K bytes - Click Count (0) -
okhttp/src/androidMain/kotlin/okhttp3/internal/platform/android/AndroidCertificateChainCleaner.kt
) : CertificateChainCleaner() { @Suppress("UNCHECKED_CAST") @Throws(SSLPeerUnverifiedException::class) @SuppressSignatureCheck override fun clean( chain: List<Certificate>, hostname: String, ): List<Certificate> { val certificates = (chain as List<X509Certificate>).toTypedArray() try { return x509TrustManagerExtensions.checkServerTrusted(certificates, "RSA", hostname)
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Dec 27 13:39:56 GMT 2024 - 2.7K bytes - Click Count (0) -
okhttp-testing-support/src/main/kotlin/okhttp3/DelegatingSSLSession.kt
} override fun getValueNames(): Array<String> = delegate!!.valueNames @Throws(SSLPeerUnverifiedException::class) override fun getPeerCertificates(): Array<Certificate>? = delegate!!.peerCertificates override fun getLocalCertificates(): Array<Certificate>? = delegate!!.localCertificates @Throws(SSLPeerUnverifiedException::class) override fun getPeerCertificateChain(): Array<X509Certificate> = delegate!!.peerCertificateChain
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 2.6K bytes - Click Count (0) -
android-test/src/androidTest/java/okhttp/android/test/letsencrypt/LetsEncryptClientTest.kt
import okhttp3.Request import okhttp3.tls.HandshakeCertificates import okhttp3.tls.decodeCertificatePem import org.junit.jupiter.api.Tag import org.junit.jupiter.api.Test /** * Test for new Let's Encrypt Root Certificate. */ @Tag("Remote") class LetsEncryptClientTest { @Test fun get() { // These tests wont actually run before Android 8.0 as per // https://github.com/mannodermaus/android-junit5
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 4.4K bytes - Click Count (0) -
api/go1.24.txt
pkg crypto/x509, type Certificate struct, InhibitAnyPolicy int #68484 pkg crypto/x509, type Certificate struct, InhibitAnyPolicyZero bool #68484 pkg crypto/x509, type Certificate struct, InhibitPolicyMapping int #68484 pkg crypto/x509, type Certificate struct, InhibitPolicyMappingZero bool #68484 pkg crypto/x509, type Certificate struct, PolicyMappings []PolicyMapping #68484
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Tue Dec 17 21:28:29 GMT 2024 - 14.2K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/helper/CurlHelper.java
final Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate(in); final KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); keyStore.load(null, null); keyStore.setCertificateEntry("server", certificate);
Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Fri Nov 28 16:29:12 GMT 2025 - 6.1K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/ConnectionCoalescingTest.kt
/** Can still coalesce when pinning is used if pins match. */ @Test fun coalescesWhenCertificatePinsMatch() { val pinner = CertificatePinner .Builder() .add("san.com", pin(certificate.certificate)) .build() client = client.newBuilder().certificatePinner(pinner).build() server.enqueue(MockResponse()) server.enqueue(MockResponse())
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu Jun 19 11:44:16 GMT 2025 - 19.1K bytes - Click Count (0) -
cmd/sts-errors.go
Code: "InvalidClientCertificate", Description: "The provided client certificate is invalid. Retry with a different certificate.", HTTPStatusCode: http.StatusBadRequest, }, ErrSTSTooManyIntermediateCAs: { Code: "TooManyIntermediateCAs", Description: "The provided client certificate contains too many intermediate CA certificates", HTTPStatusCode: http.StatusBadRequest, },
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Feb 05 00:29:41 GMT 2025 - 6K bytes - Click Count (1) -
docs/ftp/README.md
hmac-sha2-512 hmac-sha1 hmac-sha1-96 ``` ### Certificate-based authentication `--sftp=trusted-user-ca-key=...` specifies a file containing public key of certificate authority that is trusted to sign user certificates for authentication. Implementation is identical with "TrustedUserCAKeys" setting in OpenSSH server with exception that only one CA key can be defined.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue May 07 06:41:25 GMT 2024 - 7.8K bytes - Click Count (0) -
cmd/sftp-server.go
} cert, ok := clientKey.(*ssh.Certificate) if !ok { return errSftpPublicKeyWithoutCert } // ssh.CheckCert called by ssh.Authenticate accepts certificates // with empty principles list so we block those in here. if len(cert.ValidPrincipals) == 0 { return errSftpCertWithoutPrincipals } // Verify that certificate provided by user is issued by trusted CA,Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.5K bytes - Click Count (0)