Related
SeMeKh So, I've generated rootCA, and signed the certificate for *.a.com, how can I trust the generated certificate in Firefox/Chrome without directly trusting the CA? Note that adding an exception (once) is not enough in this case because there are multiple d
Jtlindsey I have an electron app that syncs with a server I own on https://XXX.XX.XX.XXX:port with a self-signed certificate . How can I trust the certificate in my electron application? Now I get: Failed to load resource: net::ERR_INSECURE_RESPONSE
Peter Sti
Priest I am looking for some guidance here. I am embedding a self signed SSL certificate in a simple application written in C#. I'm reading the certificate in bytes from the ExecutingAssembly stream and adding it to the current user's Store.Root. The next step
Jtlindsey I have an electron app that syncs with a server I own on https://XXX.XX.XX.XXX:port with a self-signed certificate . How can I trust the certificate in my electron application? Now I get: Failed to load resource: net::ERR_INSECURE_RESPONSE
Peter Sti
Matija Martic I have an Expo app that works with IoT devices. To connect to the device, the user will continue to use the device's wifi and send it information about its wifi so that the device itself can connect to the wifi. So far, the network call from the
00 I've created a self-signed certificate for foo.localhost using the Let's Encrypt suggestion using the following Makefile : include ../.env
configuration = csr.cnf
certificate = self-signed.crt
key = self-signed.key
.PHONY: all
all: $(certificate)
$(certi
Travis Thomas We are trying to build a repository for SuSE Linux based devices. We are authenticating the repository with a CA that contains a root self-signed certificate. When trying to retrieve an update from the repository, we get the following message: Co
Jtlindsey I have an electron app that syncs with a server I own on https://XXX.XX.XX.XXX:port with a self-signed certificate . How can I trust the certificate in my electron application? Now I get: Failed to load resource: net::ERR_INSECURE_RESPONSE
Peter Sti
Priest I am looking for some guidance here. I am embedding a self signed SSL certificate in a simple application written in C#. I'm reading the certificate in bytes from the ExecutingAssembly stream and adding it to the current user's Store.Root. The next step
Jtlindsey I have an electron app that syncs with a server I own on https://XXX.XX.XX.XXX:port with a self-signed certificate . How can I trust the certificate in my electron application? Now I get: Failed to load resource: net::ERR_INSECURE_RESPONSE
Peter Sti
Matija Martic I have an Expo app that works with IoT devices. To connect to the device, the user will continue to use the device's wifi and send it information about its wifi so that the device itself can connect to the wifi. So far, the network call from the
Matija Martic I have an Expo app that works with IoT devices. To connect to the device, the user will continue to use the device's wifi and send it information about its wifi so that the device itself can connect to the wifi. So far, the network call from the
00 I've created a self-signed certificate for foo.localhost using the Let's Encrypt suggestion using the following Makefile : include ../.env
configuration = csr.cnf
certificate = self-signed.crt
key = self-signed.key
.PHONY: all
all: $(certificate)
$(certi
Travis Thomas We are trying to build a repository for SuSE Linux based devices. We are authenticating the repository with a CA that contains a root self-signed certificate. When trying to retrieve an update from the repository, we get the following message: Co
Jawad-Dev: I am working on a solution for file encryption via a combination of RSA and AES. RSA is basically used here for a handshake to encrypt a symmetric key and decrypt with the key pair at the receiver side. I have used Java keystore for private key and
Jawad-Dev: I am working on a solution for file encryption via a combination of RSA and AES. RSA is basically used here for a handshake to encrypt a symmetric key and decrypt with the key pair at the receiver side. I have used Java keystore for private key and
Jawad-Dev: I am working on a solution for file encryption via a combination of RSA and AES. RSA is basically used here for a handshake to encrypt a symmetric key and decrypt with the key pair at the receiver side. I have used Java keystore for private key and
Jawad-Dev: I am working on a solution for file encryption via a combination of RSA and AES. RSA is basically used here for a handshake to encrypt a symmetric key and decrypt with the key pair at the receiver side. I have used Java keystore for private key and
Fragment 123 My app needs to connect to my own server, so I added the server's self-signed certificate to the KeyStore. It works fine on my server, but the problem is now my app won't accept all other certificates! For example, if I try to connect to https://m
Paul Lynch I'm trying to create a self-signed server certificate for my client/server application (written in Java using the Netty library). From what I understand, I have to create a CA keystore and a server keystore, use the CA keystore to sign the server ce
Thomas Schneider I have an externally hosted iis webserver that runs my website. I want to add a self-signed certificate to this website and trust it on my local client in order to remove the "insecure connection" from the browser. What I have done so far is t
n00dl3 I have a git repo on a personal server using a self-signed certificate. All I want to do is add this CA to npm's trusted certificates in order to install packages from the repo like this: npm install git+https://domain.tld/repo.git
The following comman
Thomas Schneider I have an externally hosted iis webserver that runs my website. I want to add a self-signed certificate to this website and trust it on my local client in order to remove the "insecure connection" from the browser. What I have done so far is t
Thomas Schneider I have an externally hosted iis webserver that runs my website. I want to add a self-signed certificate to this website and trust it on my local client in order to remove the "insecure connection" from the browser. What I have done so far is t
n00dl3 I have a git repo on a personal server using a self-signed certificate. All I want to do is add this CA to npm's trusted certificates in order to install packages from the repo like this: npm install git+https://domain.tld/repo.git
The following comman
Liquefied Potassium Edit: BNK in the comments has linked to the solution found here . I'm sending POST requests (over LAN) to a backend server via REST, all over HTTPS. The server has a self-signed certificate as a .pem file and everything works fine. I'm now
Thomas Schneider I have an externally hosted iis webserver that runs my website. I want to add a self-signed certificate to this website and trust it on my local client in order to remove the "insecure connection" from the browser. What I have done so far is t
n00dl3 I have a git repo on a personal server using a self-signed certificate. All I want to do is add this CA to npm's trusted certificates in order to install packages from the repo like this: npm install git+https://domain.tld/repo.git
The following comman
Thomas Schneider I have an externally hosted iis webserver that runs my website. I want to add a self-signed certificate to this website and trust it on my local client in order to remove the "insecure connection" from the browser. What I have done so far is t