- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 182 for Certificates (0.06 sec)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/tls/OkHostnameVerifier.kt
} } fun verify( host: String, certificate: X509Certificate, ): Boolean = when { host.canParseAsIpAddress() -> verifyIpAddress(host, certificate) else -> verifyHostname(host, certificate) } /** Returns true if [certificate] matches [ipAddress]. */ private fun verifyIpAddress( ipAddress: String, certificate: X509Certificate, ): Boolean {
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 7.6K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/InsecureForHostTest.kt
assertThat(response.handshake!!.localPrincipal).isNull() assertThat(response.handshake!!.peerCertificates).isEmpty() assertThat(response.handshake!!.peerPrincipal).isNull() } @Test fun `bad certificates host in insecureHosts fails with SSLException`() { val heldCertificate = HeldCertificate .Builder() .addSubjectAlternativeName("example.com") .build() val serverCertificates =
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Jun 18 12:28:21 UTC 2025 - 4.2K bytes - Viewed (0) -
docs/features/connections.md
* They specify that the call may be plaintext (`http`) or encrypted (`https`), but not which cryptographic algorithms should be used. Nor do they specify how to verify the peer's certificates (the [HostnameVerifier](https://developer.android.com/reference/javax/net/ssl/HostnameVerifier.html)) or which certificates can be trusted (the [SSLSocketFactory](https://developer.android.com/reference/org/apache/http/conn/ssl/SSLSocketFactory.html)).
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Feb 21 03:33:59 UTC 2022 - 5.4K bytes - Viewed (0) -
cmd/sts-errors.go
Code: "InvalidClientCertificate", Description: "The provided client certificate is invalid. Retry with a different certificate.", HTTPStatusCode: http.StatusBadRequest, }, ErrSTSTooManyIntermediateCAs: { Code: "TooManyIntermediateCAs", Description: "The provided client certificate contains too many intermediate CA certificates", HTTPStatusCode: http.StatusBadRequest, }, ErrSTSNotInitialized: {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 05 00:29:41 UTC 2025 - 6K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/HeldCertificateTest.kt
val certificate = heldCertificate.certificate assertThat(certificate.getSubjectX500Principal().name, "self-signed") .isEqualTo(certificate.getIssuerX500Principal().name) assertThat(certificate.getIssuerX500Principal().name).matches(Regex("CN=[0-9a-f-]{36}")) assertThat(certificate.serialNumber).isEqualTo(BigInteger.ONE) assertThat(certificate.subjectAlternativeNames).isNull()
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 22.6K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
And there has to be something in charge of **renewing the HTTPS certificates**, it could be the same component or it could be something different. ### Example Tools for HTTPS { #example-tools-for-https } Some of the tools you could use as a TLS Termination Proxy are: * Traefik * Automatically handles certificates renewals ✨ * Caddy * Automatically handles certificates renewals ✨ * Nginx
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/CustomCipherSuites.java
.sslSocketFactory(customSslSocketFactory, trustManager) .build(); } /** * Returns the VM's default SSL socket factory, using {@code trustManager} for trusted root * certificates. */ private SSLSocketFactory defaultSslSocketFactory(X509TrustManager trustManager) throws NoSuchAlgorithmException, KeyManagementException { SSLContext sslContext = SSLContext.getInstance("TLS");
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Thu Mar 14 21:57:42 UTC 2019 - 6.5K bytes - Viewed (0) -
docs/changelogs/changelog_3x.md
`certificatePem()` method encodes the certificate in the familiar PEM format (`--- BEGIN CERTIFICATE ---`); the `privateKeyPkcs8Pem()` does likewise for the private key. `HandshakeCertificates` holds the TLS certificates required for a TLS handshake. On the server it keeps your `HeldCertificate` and its chain. On the client it keeps the root certificates
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 14:55:54 UTC 2022 - 50.8K bytes - Viewed (0) -
cmd/config-dir.go
defaultMinioConfigDir = ".minio" // Directory contains below files/directories for HTTPS configuration. certsDir = "certs" // Directory contains all CA certificates other than system defaults for HTTPS. certsCADir = "CAs" // Public certificate file for HTTPS. publicCertFile = "public.crt" // Private key file for HTTPS. privateKeyFile = "private.key" ) // ConfigDir - points to a user set directory.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Jan 02 17:15:06 UTC 2022 - 3K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/CertificatePinnerTest.kt
} // Should not be pinned: certificatePinner.check("uk", listOf(certB1.certificate)) certificatePinner.check("co.uk", listOf(certB1.certificate)) certificatePinner.check("anotherexample.co.uk", listOf(certB1.certificate)) certificatePinner.check("foo.anotherexample.co.uk", listOf(certB1.certificate)) } @Test fun testBadPin() {
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 10.1K bytes - Viewed (0)