Related
Mark H: I need to create an Https connection to a remote server and then retrieve and verify the certificate. I have established the connection: try {
url = new URL(this.SERVER_URL);
HttpURLConnection con = (HttpURLConnection) url.openConnection();
Mark H: I need to create an Https connection to a remote server and then retrieve and verify the certificate. I have established the connection: try {
url = new URL(this.SERVER_URL);
HttpURLConnection con = (HttpURLConnection) url.openConnection();
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Zakcan I am trying to use OpenSSL to verify certificate files. Can you explain why s_clientthe connection succeeds but verifythe file with the same certificate chain fails? How to verify documents? Note that I compiled OpenSSL 1.0.1k myself, it shouldn't use a
Zakcan I am trying to use OpenSSL to verify certificate files. Can you explain why s_clientthe connection succeeds but verifythe file with the same certificate chain fails? How to verify documents? Note that I compiled OpenSSL 1.0.1k myself, it shouldn't use a
substitute I want to secure my symfony2 application with https. I followed the instructions on how to create an SSL certificate and the SSL works fine, but Firefox says this page is not trusted. Same goes for Safari. How to get a trusted SSL certificate? Dextr
substitute I want to secure my symfony2 application with https. I followed the instructions on how to create an SSL certificate and the SSL works fine, but Firefox says this page is not trusted. Same goes for Safari. How to get a trusted SSL certificate? Dextr
substitute I want to secure my symfony2 application with https. I followed the instructions on how to create an SSL certificate and the SSL works fine, but Firefox says this page is not trusted. Same goes for Safari. How to get a trusted SSL certificate? Dextr
vkx I have a certificate chain to validate as a der encoded byte[][] array. I also have a truststore file. After creating the X509Certificate[] from this byte array[][] and initializing the trustmanager, how do I tell the TrustManager to validate the X509Certi
vkx I have a certificate chain to validate as a der encoded byte[][] array. I also have a truststore file. After creating the X509Certificate[] from this byte array[][] and initializing the trustmanager, how do I tell the TrustManager to validate the X509Certi
vkx I have a certificate chain to validate as a der encoded byte[][] array. I also have a truststore file. After creating the X509Certificate[] from this byte array[][] and initializing the trustmanager, how do I tell the TrustManager to validate the X509Certi
vkx I have a certificate chain to validate as a der encoded byte[][] array. I also have a truststore file. After creating the X509Certificate[] from this byte array[][] and initializing the trustmanager, how do I tell the TrustManager to validate the X509Certi
vkx I have a certificate chain to validate as a der encoded byte[][] array. I also have a truststore file. After creating the X509Certificate[] from this byte array[][] and initializing the trustmanager, how do I tell the TrustManager to validate the X509Certi
vkx I have a certificate chain to validate as a der encoded byte[][] array. I also have a truststore file. After creating the X509Certificate[] from this byte array[][] and initializing the trustmanager, how do I tell the TrustManager to validate the X509Certi
vkx I have a certificate chain to validate as a der encoded byte[][] array. I also have a truststore file. After creating the X509Certificate[] from this byte array[][] and initializing the trustmanager, how do I tell the TrustManager to validate the X509Certi
Kurt Peek: I want to validate a PEM certificate against a release chain which is also a .pemfile containing multiple certificates separated by newlines, as shown in this gist https://gist.github.com/kurtpeek/8bf3282e344c781a20c5deadac75059f . I have tried as C
Kurt Peek: I want to validate a PEM certificate against a release chain which is also a .pemfile containing multiple certificates separated by newlines, as shown in this gist https://gist.github.com/kurtpeek/8bf3282e344c781a20c5deadac75059f . I have tried as C
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Daigo Yamamoto I am trying to connect to a Mosquitto proxy. The agent will have a ca.crt and a server.crt. My application will only have ca.crt. Once connected, the proxy provides ca.crt and server.crt (certificate chain). How can I verify both against the ca.
Nitin Vavdiya I have a GET API called using Java and I have used a masquerading client to call this API. When I call this API, I get the error: Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunC
Nitin Vavdiya I have a GET API called using Java and I have used a masquerading client to call this API. When I call this API, I get the error: Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunC