- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 112 for handshake (3.13 sec)
-
regression-test/src/androidTest/java/okhttp/regression/IssueReproductionTest.java
try (Response response = client.newCall(request).execute()) { assertTrue(response.code() == 200 || response.code() == 404); assertEquals(Protocol.HTTP_2, response.protocol()); for (Certificate c: response.handshake().peerCertificates()) { X509Certificate x = (X509Certificate) c; System.out.println(x.getSubjectDN()); } } }
Java - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jul 26 06:37:08 GMT 2021 - 1.9K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/HttpsServer.java
Java - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 02 14:04:37 GMT 2023 - 2.1K bytes - Viewed (0) -
okhttp-testing-support/src/main/kotlin/okhttp3/CallEvent.kt
override val timestampNs: Long, override val call: Call, ) : CallEvent() data class SecureConnectEnd( override val timestampNs: Long, override val call: Call, val handshake: Handshake?, ) : CallEvent() { override fun closes(event: CallEvent): Boolean = event is SecureConnectStart && call == event.call } data class ConnectionAcquired( override val timestampNs: Long,
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 6.7K bytes - Viewed (0) -
docs/de/docs/deployment/https.md
<img src="/img/deployment/https/https01.svg"> ### TLS-Handshake-Start Der Browser kommuniziert dann mit dieser IP-Adresse über **Port 443** (den HTTPS-Port).
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sat Mar 30 20:16:46 GMT 2024 - 13.5K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/CertificatePinning.java
.build(); try (Response response = client.newCall(request).execute()) { if (!response.isSuccessful()) throw new IOException("Unexpected code " + response); for (Certificate certificate : response.handshake().peerCertificates()) { System.out.println(CertificatePinner.pin(certificate)); } } } public static void main(String... args) throws Exception { new CertificatePinning().run(); }
Java - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Sun Dec 08 21:30:01 GMT 2019 - 1.7K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/BouncyCastleTest.kt
val request = Request.Builder().url("https://mozilla.org/robots.txt").build() client.newCall(request).execute().use { assertThat(it.protocol).isEqualTo(Protocol.HTTP_2) assertThat(it.handshake!!.tlsVersion).isEqualTo(TlsVersion.TLS_1_3) } }
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 1.6K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
The DNS servers would tell the browser to use some specific **IP address**. That would be the public IP address used by your server, that you configured in the DNS servers. <img src="/img/deployment/https/https01.svg"> ### TLS Handshake Start The browser would then communicate with that IP address on **port 443** (the HTTPS port).
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Jan 11 16:31:18 GMT 2024 - 12K bytes - Viewed (0) -
mockwebserver-deprecated/src/main/kotlin/okhttp3/mockwebserver/SocketPolicy.kt
DISCONNECT_AT_END, UPGRADE_TO_SSL_AT_END, DISCONNECT_AT_START, DISCONNECT_AFTER_REQUEST, DISCONNECT_DURING_REQUEST_BODY, DISCONNECT_DURING_RESPONSE_BODY, DO_NOT_READ_REQUEST_BODY, FAIL_HANDSHAKE, SHUTDOWN_INPUT_AT_END, SHUTDOWN_OUTPUT_AT_END, STALL_SOCKET_AT_START, NO_RESPONSE, RESET_STREAM_AT_START, EXPECT_CONTINUE, CONTINUE_ALWAYS,
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 1K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/kt/CertificatePinning.kt
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 1.4K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/tls/CertificateChainCleaner.kt
* certificate is signed by the certificate that follows, and the last certificate is a trusted CA * certificate. * * Use of the chain cleaner is necessary to omit unexpected certificates that aren't relevant to * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate * pinning. */ abstract class CertificateChainCleaner { @Throws(SSLPeerUnverifiedException::class) abstract fun clean(
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 2K bytes - Viewed (0)