/dports/x11/kf5-kdelibs4support/kdelibs4support-5.89.0/src/kssl/kcm/ |
H A D | kcm_ssl.desktop | 147 X-KDE-Keywords=SSL,Security,Network,Protocol,Certificates,Encryption,HTTPS 149 X-KDE-Keywords[az]=SSL, Təhlükəsizlik, Şəbəkə, sertifikat, Şifrələmə, HTTPS 154 X-KDE-Keywords[cs]=SSL,Bezpečnost,Síť,Protokol,Certifikáty,Šifrování,HTTPS 159 X-KDE-Keywords[es]=SSL,Seguridad,Red,Protocolo,Certificados,Cifrado,HTTPS 165 X-KDE-Keywords[ga]=SSL,Slándáil,Líonra,Prótacal,Teastais,Criptiú,HTTPS 167 X-KDE-Keywords[gl]=SSL,Seguridade,Rede,Protocolo,Certificados,Cifrado,HTTPS 193 X-KDE-Keywords[sl]=SSL,varnost,omrežje,protokol,potrdila,šifriranje,HTTPS 196 …ity,Network,Protocol,Certificates,Encryption,HTTPS,SSL,bezbednost,mreža,protokol,sertifikat,šifrov… 197 …ity,Network,Protocol,Certificates,Encryption,HTTPS,SSL,bezbednost,mreža,protokol,sertifikat,šifrov… 200 X-KDE-Keywords[tr]=SSL,Güvenlik,Ağ,Protokol,Sertifikalar,Şifreleme,HTTPS [all …]
|
/dports/net-mgmt/librenms/librenms-21.5.1/mibs/transition/ |
H A D | TN-HTTPS-MIB | 2 -- TN-HTTPS-MIB 7 TN-HTTPS-MIB DEFINITIONS ::= BEGIN 22 -- sub HTTPS 28 -- HTTPS Configuration 36 current connection is HTTPS, to apply HTTPS 52 to an HTTPS connection when both HTTPS mode 59 -- HTTPS Certificate Generate 85 -- HTTPS Certificate Load 154 HTTPS certificate. 183 -- HTTPS Certificate View [all …]
|
/dports/www/firefox-esr/firefox-91.8.0/testing/web-platform/meta/fetch/redirect-navigate/ |
H A D | preserve-fragment.html.ini | 22 [[HTTPS - CrossOrigin\] Preserve fragment in multiple 301 redirects] 70 [[HTTPS - SameOrigin\] Preserve fragment in 302 redirect] 142 [[HTTPS - SameOrigin\] Preserve fragment in 303 redirect] 150 [[HTTPS - CrossOrigin\] Preserve fragment in 301 redirect] 202 [[HTTPS - CrossOrigin\] Preserve fragment in 303 redirect] 270 [[HTTPS - CrossOrigin\] Preserve fragment in 307 redirect] 366 [[HTTPS - SameOrigin\] Preserve fragment in 308 redirect] 382 [[HTTPS - SameOrigin\] Preserve fragment in 307 redirect] 406 [[HTTPS - CrossOrigin\] Preserve fragment in 302 redirect] 410 [[HTTPS - CrossOrigin\] Preserve fragment in 308 redirect] [all …]
|
/dports/www/firefox/firefox-99.0/testing/web-platform/meta/fetch/redirect-navigate/ |
H A D | preserve-fragment.html.ini | 22 [[HTTPS - CrossOrigin\] Preserve fragment in multiple 301 redirects] 70 [[HTTPS - SameOrigin\] Preserve fragment in 302 redirect] 142 [[HTTPS - SameOrigin\] Preserve fragment in 303 redirect] 150 [[HTTPS - CrossOrigin\] Preserve fragment in 301 redirect] 202 [[HTTPS - CrossOrigin\] Preserve fragment in 303 redirect] 270 [[HTTPS - CrossOrigin\] Preserve fragment in 307 redirect] 366 [[HTTPS - SameOrigin\] Preserve fragment in 308 redirect] 382 [[HTTPS - SameOrigin\] Preserve fragment in 307 redirect] 406 [[HTTPS - CrossOrigin\] Preserve fragment in 302 redirect] 410 [[HTTPS - CrossOrigin\] Preserve fragment in 308 redirect] [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/testing/web-platform/meta/fetch/redirect-navigate/ |
H A D | preserve-fragment.html.ini | 22 [[HTTPS - CrossOrigin\] Preserve fragment in multiple 301 redirects] 70 [[HTTPS - SameOrigin\] Preserve fragment in 302 redirect] 142 [[HTTPS - SameOrigin\] Preserve fragment in 303 redirect] 150 [[HTTPS - CrossOrigin\] Preserve fragment in 301 redirect] 202 [[HTTPS - CrossOrigin\] Preserve fragment in 303 redirect] 270 [[HTTPS - CrossOrigin\] Preserve fragment in 307 redirect] 366 [[HTTPS - SameOrigin\] Preserve fragment in 308 redirect] 382 [[HTTPS - SameOrigin\] Preserve fragment in 307 redirect] 406 [[HTTPS - CrossOrigin\] Preserve fragment in 302 redirect] 410 [[HTTPS - CrossOrigin\] Preserve fragment in 308 redirect] [all …]
|
/dports/dns/knot3/knot-3.1.5/tests/libzscanner/data/ |
H A D | 58_HTTPS.in | 4 ; HTTPS is the same as SVCB, so there are the differences and basics only. 7 @ HTTPS 0 . 8 @ HTTPS 65535 @ ; Comment 9 @ HTTPS 1 . key65535="a" key1000=b port=4 key7 mandatory=key7,port 15 @ HTTPS 16 @ HTTPS ; Empty rdata 17 @ HTTPS \# 0 ; Hex empty rdata 18 @ HTTPS 65536 . ; Priority overflow 19 @ HTTPS 0 ; Missing item
|
/dports/dns/knot3-lib/knot-3.1.5/tests/libzscanner/data/ |
H A D | 58_HTTPS.in | 4 ; HTTPS is the same as SVCB, so there are the differences and basics only. 7 @ HTTPS 0 . 8 @ HTTPS 65535 @ ; Comment 9 @ HTTPS 1 . key65535="a" key1000=b port=4 key7 mandatory=key7,port 15 @ HTTPS 16 @ HTTPS ; Empty rdata 17 @ HTTPS \# 0 ; Hex empty rdata 18 @ HTTPS 65536 . ; Priority overflow 19 @ HTTPS 0 ; Missing item
|
/dports/dns/dog/dog-0.1.0/xtests/ |
H A D | https.toml | 4 name = "Look up an existing A record using HTTPS" 12 name = "Look up a missing A record using HTTPS" 23 name = "Look up an existing AAAA record using HTTPS" 31 name = "Look up a missing AAAA record using HTTPS" 42 name = "Look up an existing CAA record using HTTPS" 50 name = "Look up a missing CAA record using HTTPS" 69 name = "Look up a missing CNAME record using HTTPS" 99 name = "Look up an existing MX record using HTTPS" 107 name = "Look up a missing MX record using HTTPS" 126 name = "Look up a missing NS record using HTTPS" [all …]
|
/dports/net/p5-Net-HTTPS-Any/Net-HTTPS-Any-0.12/ |
H A D | README | 1 Net-HTTPS-Any 3 This module will make an HTTPS connection using Net::SSLeay or ( Crypt::SSLeay 6 It is derived from Business::OnlinePayment::HTTPS. 22 perldoc Net::HTTPS::Any 27 http://rt.cpan.org/NoAuth/Bugs.html?Dist=Net-HTTPS-Any 30 http://annocpan.org/dist/Net-HTTPS-Any 33 http://cpanratings.perl.org/d/Net-HTTPS-Any 36 http://search.cpan.org/dist/Net-HTTPS-Any
|
/dports/www/py-fastapi/fastapi-0.70.0/docs/pt/docs/deployment/ |
H A D | https.md | 1 # Sobre HTTPS 3 É fácil assumir que HTTPS é algo que é apenas "habilitado" ou não. 10 Para aprender o básico de HTTPS de uma perspectiva do usuário, verifique <a href="https://howhttps.… 12 …e uma perspectiva do desenvolvedor, aqui estão algumas coisas para ter em mente ao pensar em HTTPS: 14 * Para HTTPS, o servidor precisa ter certificados gerados por um terceiro. 24 * Os certificados HTTPS “certificam” um determinado domínio, mas o protocolo e a encriptação aconte… 25 * Por padrão, isso significa que você só pode ter um certificado HTTPS por endereço IP. 29 …m um único endereço IP) tenha vários certificados HTTPS e atenda a vários domínios / aplicativos H… 30 …ução no servidor, ouvindo no endereço IP público, deve ter todos os certificados HTTPS no servidor. 38 Antes de Let's Encrypt, esses certificados HTTPS eram vendidos por terceiros confiáveis. [all …]
|
/dports/net/p5-Net-HTTPS-NB/Net-HTTPS-NB-0.15/ |
H A D | README | 1 Net::HTTPS::NB - Non-blocking HTTPS client 2 Like Net::HTTP has non-blocking Net::HTTP::NB, Net::HTTPS now has Net::HTTPS::NB 3 This make it possible to multiplex multiple HTTPS connections using select without risk blocking.
|
/dports/www/typo3-11/typo3_src-11.5.7/typo3/sysext/core/Documentation/Changelog/11.0/ |
H A D | Feature-87301-SecureCookiesEnabledByDefault.rst | 13 whether a cookie was shared between HTTP and HTTPS requests. 15 This allowed to have the same cookie available for HTTPS and non-HTTPS, when a site was available o… 19 it is recommended to run sites with HTTPS, or if this is not possible 28 * If a website is running on HTTPS, the cookie is only exposed via HTTPS. 29 * If a website is running on HTTP, the cookie is available for HTTPS as well, but not vice-versa.
|
/dports/www/py-fastapi/fastapi-0.70.0/docs/en/docs/deployment/ |
H A D | https.md | 1 # About HTTPS 3 It is easy to assume that HTTPS is something that is just "enabled" or not. 14 * For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**. 29 …ver (with a **single IP address**) to have **several HTTPS certificates** and serve **multiple HTT… 45 Before Let's Encrypt, these **HTTPS certificates** were sold by trusted third parties. 57 ## HTTPS for Developers 76 Now let's focus on all the actual HTTPS parts. 98 TLS (HTTPS) uses the specific port `443` by default. So that's the port we would need. 121 ### HTTPS Request 141 ### HTTPS Response [all …]
|
/dports/www/py-fastapi/fastapi-0.70.0/docs/ja/docs/deployment/ |
H A D | docker.md | 6 * (オプション) 開発者として必要な範囲でHTTPSを理解する。 7 * **20分**程度で、自動的なHTTPS生成とともにDockerのSwarmモード クラスタをセットアップする (月5ドルのシンプルなサーバー上で)。 8 * **10分**程度で、DockerのSwarmモード クラスタを使って、HTTPSなどを使用した完全な**FastAPI** アプリケーションの作成とデプロイ。 153 Let's Encryptと統合されています。そのため、証明書の取得と更新を含むHTTPSに関するすべての処理を実行できます。 155 …ockerとも統合されています。したがって、各アプリケーション構成でドメインを宣言し、それらの構成を読み取って、HTTPS証明書を生成し、構成に変更を加えることなく、アプリケーションにHTTPSを… 161 ## TraefikとHTTPSを使用したDocker Swarmモードのクラスタ 163 HTTPSを処理する(証明書の取得と更新を含む)Traefikを使用して、Docker Swarmモードのクラスタを数分(20分程度)でセットアップできます。 167 TraefikおよびHTTPS処理を備えたDocker Swarm Modeクラスターをセットアップするには、次のガイドに従います: 169 …a6232" class="external-link" target="_blank">Docker Swarm Mode and Traefik for an HTTPS cluster</a> 175 上述したTraefikとHTTPSを備えたDocker Swarm クラスタが統合されるように設計されています。
|
/dports/www/firefox-esr/firefox-91.8.0/testing/web-platform/tests/infrastructure/metadata/infrastructure/server/ |
H A D | wpt-server-http.sub.html.ini | 2 [HTTPS protocol, punycode subdomain #1] 6 [HTTPS protocol, www subdomain #1] 10 [HTTPS protocol, www subdomain #2] 14 [HTTPS protocol, www subdomain #3] 18 [HTTPS protocol, punycode subdomain #2]
|
/dports/www/firefox/firefox-99.0/testing/web-platform/tests/infrastructure/metadata/infrastructure/server/ |
H A D | wpt-server-http.sub.html.ini | 2 [HTTPS protocol, punycode subdomain #1] 6 [HTTPS protocol, www subdomain #1] 10 [HTTPS protocol, www subdomain #2] 14 [HTTPS protocol, www subdomain #3] 18 [HTTPS protocol, punycode subdomain #2]
|
/dports/mail/thunderbird/thunderbird-91.8.0/testing/web-platform/tests/infrastructure/metadata/infrastructure/server/ |
H A D | wpt-server-http.sub.html.ini | 2 [HTTPS protocol, punycode subdomain #1] 6 [HTTPS protocol, www subdomain #1] 10 [HTTPS protocol, www subdomain #2] 14 [HTTPS protocol, www subdomain #3] 18 [HTTPS protocol, punycode subdomain #2]
|
/dports/dns/unbound/unbound-1.14.0/testdata/svcb.tdir/ |
H A D | svcb.test-vectors-pf.zone | 53 v11 HTTPS 0 foo.example.com. 58 v12 HTTPS 1 . 62 v13 HTTPS 16 foo.example.com. port=53 66 v14 HTTPS 1 foo.example.com. key667=hello 71 v15 HTTPS 1 foo.example.com. key667="hello\210qoo" 75 v16 HTTPS 1 foo.example.com. ipv6hint="2001:db8::1,2001:db8::53:1" 79 v17 HTTPS 1 example.com. ipv6hint="2001:db8:ffff:ffff:ffff:ffff:198.51.100.100" 84 v18 HTTPS 16 foo.example.org. (alpn=h2,h3-19 mandatory=ipv4hint,alpn 90 v19 HTTPS 16 foo.example.org. alpn="f\\\\oo\\,bar,h2" 91 v20 HTTPS 16 foo.example.org. alpn=f\\\092oo\092,bar,h2
|
H A D | svcb.success-cases.zone.cmp | 4 s03.success-cases. 3600 IN HTTPS 0 . alpn="h2,h3" no-default-alpn 5 s04.success-cases. 3600 IN HTTPS 0 . no-default-alpn 6 s05.success-cases. 3600 IN HTTPS 0 . mandatory=port alpn="dot" no-default-alpn port=853 7 s06.success-cases. 3600 IN HTTPS 0 . ech="aGVsbG93b3JsZCE=" 8 s07.success-cases. 3600 IN HTTPS 0 . ech="aGVsbG93b3JsZCE=" 9 s08.success-cases. 3600 IN HTTPS 0 . key11="a" key12="a" key13="a" key14="a" key15="a" key16="a" ke… 10 s09.success-cases. 3600 IN HTTPS 0 . alpn="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
|
H A D | svcb.success-cases.zone | 20 s03 HTTPS 0 . alpn="h2,h3" no-default-alpn 26 s04 HTTPS 0 . no-default-alpn 30 ; (port and no-default-alpn are automatically mandatory keys with HTTPS) 33 s05 HTTPS 0 . alpn="dot" no-default-alpn port=853 mandatory=port 36 s06 HTTPS 0 . ech="aGVsbG93b3JsZCE=" 39 s07 HTTPS 0 . echconfig="aGVsbG93b3JsZCE=" 43 s08 HTTPS 0 . ( key11=a key12=a key13=a key14=a key15=a key16=a key17=a key18=a key19=a key11… 47 s09 HTTPS 0 . ( alpn="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
|
/dports/lang/gnustep-base/libs-base-base-1_27_0/Tests/base/NSURLConnection/ |
H A D | test03.m | 2 * Tests for HTTPS 3 * (must be the same as test02.m except for the use of HTTPS). 37 // the extra dictionary commanding to use HTTPS 39 @"HTTPS", @"Protocol", 48 [server start: d]; // 127.0.0.1:1234 HTTPS 51 * Simple GET via HTTPS with empty response's body and 62 PASS([testCase isSuccess], "HTTPS... GET https://127.0.0.1:1234/"); 67 * Simple GET via HTTPS with the response's status code 400 and 81 PASS([testCase isSuccess], "HTTPS... response 400 .... GET https://localhost:1234/400"); 86 * Simple POST via HTTPS with the response's status code 400 and [all …]
|
/dports/net/binkd/binkd-1.0.4/ |
H A D | client.c | 364 #ifdef HTTPS 614 #ifdef HTTPS in call0() 630 #ifdef HTTPS in call0() 635 #ifdef HTTPS in call0() 644 #ifdef HTTPS in call0() 654 #ifdef HTTPS in call0() 684 #ifdef HTTPS in call0() 703 #ifdef HTTPS in call0() 734 #ifdef HTTPS in call0() 749 #ifdef HTTPS in call0() [all …]
|
/dports/emulators/mess/mame-mame0226/src/lib/util/ |
H A D | server_https.hpp | 12 using HTTPS = asio::ssl::stream<asio::ip::tcp::socket>; typedef 15 class Server<HTTPS> : public ServerBase<HTTPS> { 30 ServerBase<HTTPS>::ServerBase(443), context(asio::ssl::context::tlsv12) { in Server() 60 auto socket = std::make_shared<HTTPS>(*m_io_context, context); in accept() 90 class https_server : public Server<HTTPS> { 92 …rivate_key_file, const std::string& verify_file = std::string()) : Server<HTTPS>::Server(cert_file… in https_server()
|
/dports/emulators/mame/mame-mame0226/src/lib/util/ |
H A D | server_https.hpp | 12 using HTTPS = asio::ssl::stream<asio::ip::tcp::socket>; typedef 15 class Server<HTTPS> : public ServerBase<HTTPS> { 30 ServerBase<HTTPS>::ServerBase(443), context(asio::ssl::context::tlsv12) { in Server() 60 auto socket = std::make_shared<HTTPS>(*m_io_context, context); in accept() 90 class https_server : public Server<HTTPS> { 92 …rivate_key_file, const std::string& verify_file = std::string()) : Server<HTTPS>::Server(cert_file… in https_server()
|
/dports/security/p5-Net-SSLGlue/Net-SSLGlue-1.058/lib/Net/SSLGlue/ |
H A D | LWP.pm | 18 my $oc = $Net::HTTPS::SSL_SOCKET_CLASS || 26 my $oc = $Net::HTTPS::SSL_SOCKET_CLASS; 27 $Net::HTTPS::SSL_SOCKET_CLASS = my $need = 'Net::SSLGlue::LWP::Socket'; 28 require Net::HTTPS; 30 if ( ( my $oc = $Net::HTTPS::SSL_SOCKET_CLASS ) ne $need ) { 32 grep { s{^\Q$oc\E$}{$need} } @Net::HTTPS::ISA 35 if $Net::HTTPS::SSL_SOCKET_CLASS ne $need;
|