- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for privPem (0.15 sec)
-
security/pkg/pki/util/verify_cert_test.go
} ) func TestVerifyCert(t *testing.T) { testCases := map[string]struct { privPem []byte certChainPem []byte rootCertPem []byte expectedFields *VerifyFields expectedErr string }{ "Root cert bad": { privPem: nil, certChainPem: nil, rootCertPem: []byte(rootCertBad), expectedFields: verifyField1,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Aug 16 14:56:37 UTC 2022 - 6.5K bytes - Viewed (0) -
security/tools/generate_csr/main.go
) func saveCreds(csrPem []byte, privPem []byte) { err := os.WriteFile(*outCsr, csrPem, 0o644) if err != nil { log.Fatalf("Could not write output certificate request: %s.", err) } err = os.WriteFile(*outPriv, privPem, 0o600) if err != nil { log.Fatalf("Could not write output private key: %s.", err) } } func main() { flag.Parse() csrPem, privPem, err := util.GenCSR(util.CertOptions{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 23 17:08:31 UTC 2023 - 2.1K bytes - Viewed (0) -
security/tools/generate_cert/main.go
} default: log.Fatalf("Unsupported mode %v", *mode) } } func saveCreds(certPem []byte, privPem []byte) { err := os.WriteFile(*outCert, certPem, 0o644) if err != nil { log.Fatalf("Could not write output certificate: %s.", err) } err = os.WriteFile(*outPriv, privPem, 0o600) if err != nil { log.Fatalf("Could not write output private key: %s.", err) } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 28 16:21:30 UTC 2023 - 5.7K bytes - Viewed (0) -
security/pkg/pki/util/verify_cert.go
} opts.KeyUsages = append(opts.KeyUsages, x509.ExtKeyUsageAny) if _, err = cert.Verify(opts); err != nil { return fmt.Errorf("failed to verify certificate: " + err.Error()) } if privPem != nil { priv, err := ParsePemEncodedKey(privPem) if err != nil { return err } privRSAKey, privRSAOk := priv.(*rsa.PrivateKey) pubRSAKey, pubRSAOk := cert.PublicKey.(*rsa.PublicKey)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Sep 05 10:37:29 UTC 2022 - 5.9K bytes - Viewed (0) -
tests/fuzz/pki_fuzzer.go
"istio.io/istio/security/pkg/pki/util" ) // FuzzVerifyCertificate implements a fuzzer // that tests util.VerifyCertificate func FuzzVerifyCertificate(data []byte) int { f := fuzz.NewConsumer(data) privPem, err := f.GetBytes() if err != nil { return 0 } certChainPem, err := f.GetBytes() if err != nil { return 0 } rootCertPem, err := f.GetBytes() if err != nil { return 0 }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 05 14:00:25 UTC 2023 - 5.2K bytes - Viewed (0) -
src/crypto/x509/pkcs8.go
} return nil, err } switch { case privKey.Algo.Algorithm.Equal(oidPublicKeyRSA): key, err = ParsePKCS1PrivateKey(privKey.PrivateKey) if err != nil { return nil, errors.New("x509: failed to parse RSA private key embedded in PKCS#8: " + err.Error()) } return key, nil case privKey.Algo.Algorithm.Equal(oidPublicKeyECDSA): bytes := privKey.Algo.Parameters.FullBytes
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 5.8K bytes - Viewed (0) -
src/crypto/x509/pkcs8_test.go
continue } privKey, err := ParsePKCS8PrivateKey(derBytes) if err != nil { t.Errorf("%s: failed to decode PKCS#8: %s", test.name, err) continue } if reflect.TypeOf(privKey) != test.keyType { t.Errorf("%s: decoded PKCS#8 returned unexpected key type: %T", test.name, privKey) continue } if ecKey, isEC := privKey.(*ecdsa.PrivateKey); isEC && ecKey.Curve != test.curve {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sat Nov 19 16:45:10 UTC 2022 - 9K bytes - Viewed (0) -
src/crypto/x509/sec1.go
for len(privKey.PrivateKey) > len(privateKey) { if privKey.PrivateKey[0] != 0 { return nil, errors.New("x509: invalid private key length") } privKey.PrivateKey = privKey.PrivateKey[1:] } // Some private keys remove all leading zeros, this is also invalid // according to [SEC1] but since OpenSSL used to do this, we ignore // this too. copy(privateKey[len(privateKey)-len(privKey.PrivateKey):], privKey.PrivateKey)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 4.6K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
} } // GetRSAKeySize returns the size if it is RSA key, otherwise it returns an error. func GetRSAKeySize(privKey crypto.PrivateKey) (int, error) { if t := reflect.TypeOf(privKey); t != reflect.TypeOf(&rsa.PrivateKey{}) { return 0, fmt.Errorf("key type is not RSA: %v", t) } pkey := privKey.(*rsa.PrivateKey) return pkey.N.BitLen(), nil }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0) -
docs/debugging/inspect/decrypt-v2.go
error } func extractInspectV2(pk []byte, r io.Reader, w io.Writer, okMsg string) error { privKey, err := bytesToPrivateKey(pk) if err != nil { return fmt.Errorf("decoding key returned: %w", err) } sr, err := estream.NewReader(r) if err != nil { return err } sr.SetPrivateKey(privKey) sr.ReturnNonDecryptable(true) // Debug corrupted streams. if false { sr.SkipEncrypted(true)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Apr 11 21:22:47 UTC 2024 - 2.2K bytes - Viewed (0)