For excessively paranoid client authentication.
Original: https://gist.github.com/mtigas/952344
openssl x509 -in server.crt -out server.der -outform DER
openssl x509 -in server.der -inform DER -out server.pem -outform PEM
For excessively paranoid client authentication.
Original: https://gist.github.com/mtigas/952344
openssl x509 -in server.crt -out server.der -outform DER
openssl x509 -in server.der -inform DER -out server.pem -outform PEM
For testing purposes, we may want to have local testing servers using self-signed SSL certificate for HTTPS connection. Now, suppose we have a local server with self-signed certificate, establishing an actual HTTPS connection would require us to trust our self-signed certificate. It is easy on a browser: few clicks, and you will be on your way. But how about a Swift application?
Caution: Get an actual, trusted, signed certicate for production apps!
App Transport Security (ATS) is a technology that requires an app to either support best practice HTTPS security or statically declare its security limitations via a property in its
Info.plist
.
import { Buffer } from "buffer"; | |
var item: Office.MessageRead; | |
Office.onReady(() => { | |
item = Office.context.mailbox.item; | |
}); | |
/** | |
* Gets the email in EML format (IMF text file). This function executes the following steps: | |
* (1) item.getAllInternetHeadersAsync() |