- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for ParsePemEncodedCertificate (0.46 sec)
-
tests/fuzz/security_fuzzer.go
return 0 } // Check that certChainBytes can be parsed successfully _, err = util.ParsePemEncodedCertificate(certChainBytes) if err != nil { return 0 } rootCertBytes, err := f.GetBytes() if err != nil { return 0 } // Check that rootCertBytes can be parsed successfully _, err = util.ParsePemEncodedCertificate(rootCertBytes) if err != nil { return 0 } signedCert, err := f.GetBytes()
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Feb 28 16:41:38 UTC 2024 - 3.2K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
blockTypeRSAPrivateKey = "RSA PRIVATE KEY" // PKCS#1 private key blockTypePKCS8PrivateKey = "PRIVATE KEY" // PKCS#8 plain private key ) // ParsePemEncodedCertificate constructs a `x509.Certificate` object using the // given a PEM-encoded certificate. func ParsePemEncodedCertificate(certBytes []byte) (*x509.Certificate, error) { cb, _ := pem.Decode(certBytes) if cb == nil { return nil, fmt.Errorf("invalid PEM encoded certificate") }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0) -
security/pkg/pki/util/verify_cert.go
} } intermediates := x509.NewCertPool() if ok := intermediates.AppendCertsFromPEM(certChainPem); !ok { return fmt.Errorf("failed to parse certificate chain") } cert, err := ParsePemEncodedCertificate(certChainPem) if err != nil { return err } opts := x509.VerifyOptions{ Intermediates: intermediates, Roots: roots, } host := "" if expectedFields != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Sep 05 10:37:29 UTC 2022 - 5.9K bytes - Viewed (0) -
security/pkg/util/certutil.go
// grace period. func (cu CertUtilImpl) GetWaitTime(certBytes []byte, now time.Time) (time.Duration, error) { cert, certErr := util.ParsePemEncodedCertificate(certBytes) if certErr != nil { return time.Duration(0), certErr } timeToExpire := cert.NotAfter.Sub(now) if timeToExpire < 0 {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 30 19:33:26 UTC 2023 - 2.3K bytes - Viewed (0) -
security/pkg/server/ca/server.go
if err != nil { serverCaLog.Errorf("failed to extract root cert expiry timestamp (error %v)", err) } rootCertExpiryTimestamp.Record(rootCertExpiry) rootCertPem, err := util.ParsePemEncodedCertificate(keyCertBundle.GetRootCertPem()) if err != nil { serverCaLog.Errorf("failed to parse the root cert: %v", err) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 28 17:35:26 UTC 2024 - 8K bytes - Viewed (0) -
security/tools/generate_cert/main.go
} key, err := util.ParsePemEncodedKey(secret.Data[ca.CAPrivateKeyFile]) if err != nil { log.Fatalf("Unrecognized key format from citadel %v", err) } cert, err := util.ParsePemEncodedCertificate(secret.Data[ca.CACertFile]) if err != nil { log.Fatalf("Unrecognized cert format from citadel %v", err) } return cert, key } func main() { checkCmdLine()
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 28 16:21:30 UTC 2023 - 5.7K bytes - Viewed (0) -
tests/integration/ambient/cacert_rotation_test.go
t.Errorf("failed to read %s file: %v", caCertFile, err) } return parseCert(t, certBytes) } func parseCert(t framework.TestContext, certBytes []byte) *x509.Certificate { parsedCert, err := util.ParsePemEncodedCertificate(certBytes) if err != nil { t.Errorf("failed to parse certificate pem file: %v", err) } return parsedCert
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 16 03:28:36 UTC 2024 - 6.1K bytes - Viewed (0)