- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 264 for certifican (0.05 seconds)
-
docs/es/docs/deployment/https.md
En este caso, usaría el certificado para `someapp.example.com`. <img src="/img/deployment/https/https03.drawio.svg"> El cliente ya **confía** en la entidad que generó ese certificado TLS (en este caso Let's Encrypt, pero lo veremos más adelante), por lo que puede **verificar** que el certificado sea válido.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 15.4K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/Certificate.kt
val data = CertificateAdapters.certificate.toDer(this) try { val certificateFactory = CertificateFactory.getInstance("X.509") val certificates = certificateFactory.generateCertificates(Buffer().write(data).inputStream()) return certificates.single() as X509Certificate } catch (e: NoSuchElementException) { throw IllegalArgumentException("failed to decode certificate", e) } catch (e: IllegalArgumentException) {
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 6.4K bytes - Click Count (0) -
docs/fr/docs/deployment/https.md
Maintenant, du point de vue d'un développeur, voici plusieurs choses à avoir en tête en pensant au HTTPS : * Pour le HTTPS, le serveur a besoin de "certificats" générés par une tierce partie. * Ces certificats sont en fait acquis auprès de la tierce partie, et non "générés". * Les certificats ont une durée de vie. * Ils expirent. * Puis ils doivent être renouvelés et acquis à nouveau auprès de la tierce partie.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Aug 06 04:48:30 GMT 2024 - 4.1K bytes - Click Count (0) -
docs/pt/docs/deployment/https.md
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 14.8K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* ``` * * In this example the HTTP client already knows and trusts the last certificate, "Entrust Root * Certification Authority - G2". That certificate is used to verify the signature of the * intermediate certificate, "Entrust Certification Authority - L1M". The intermediate certificate * is used to verify the signature of the "www.squareup.com" certificate. *
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 21.6K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/CertificateChainCleanerTest.kt
.serialNumber(1L) .build() val rootB = HeldCertificate .Builder() .serialNumber(2L) .build() assertThat(get(rootB.certificate, rootA.certificate)) .isEqualTo(get(rootA.certificate, rootB.certificate)) } @Test fun equalsFromTrustManager() { val handshakeCertificates = HandshakeCertificates.Builder().build()
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 9.5K bytes - Click Count (1) -
okhttp/src/jvmTest/kotlin/okhttp3/CertificatePinnerTest.kt
} // Should not be pinned: certificatePinner.check("uk", listOf(certB1.certificate)) certificatePinner.check("co.uk", listOf(certB1.certificate)) certificatePinner.check("anotherexample.co.uk", listOf(certB1.certificate)) certificatePinner.check("foo.anotherexample.co.uk", listOf(certB1.certificate)) } @Test fun testBadPin() {Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 10.1K bytes - Click Count (0) -
okhttp-tls/README.md
.heldCertificate(serverCertificate, intermediateCertificate.certificate()) .build(); ``` The client only needs to know the trusted root certificate. It checks the server's certificate by validating the signatures within the chain. ```java HandshakeCertificates clientCertificates = new HandshakeCertificates.Builder() .addTrustedCertificate(rootCertificate.certificate()) .build();
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu Oct 30 21:39:59 GMT 2025 - 9.1K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/tls/OkHostnameVerifier.kt
} } fun verify( host: String, certificate: X509Certificate, ): Boolean = when { host.canParseAsIpAddress() -> verifyIpAddress(host, certificate) else -> verifyHostname(host, certificate) } /** Returns true if [certificate] matches [ipAddress]. */ private fun verifyIpAddress( ipAddress: String, certificate: X509Certificate, ): Boolean {Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 7.6K bytes - Click Count (0) -
docs/tls/README.md
``` ### 3.2 Use OpenSSL to Generate a Certificate Use one of the following methods to generate a certificate using `openssl`: * 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa) * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa) * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate) #### 3.2.1 Generate a private key with ECDSA
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.6K bytes - Click Count (0)