Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for reqAdd (0.14 sec)

  1. tools/certs/common.mk

    	@echo "x509_extensions = req_ext" >> $@
    	@echo "distinguished_name = req_dn" >> $@
    	@echo "[ req_ext ]" >> $@
    	@echo "subjectKeyIdentifier = hash" >> $@
    	@echo "basicConstraints = critical, CA:true" >> $@
    	@echo "keyUsage = critical, digitalSignature, nonRepudiation, keyEncipherment, keyCertSign" >> $@
    	@echo "[ req_dn ]" >> $@
    	@echo "O = $(ROOTCA_ORG)" >> $@
    	@echo "CN = $(ROOTCA_CN)" >> $@
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Feb 20 08:51:56 UTC 2023
    - 3.6K bytes
    - Viewed (0)
  2. src/net/http/fcgi/fcgi.go

    	return err
    }
    
    func (c *conn) writeEndRequest(reqId uint16, appStatus int, protocolStatus uint8) error {
    	b := make([]byte, 8)
    	binary.BigEndian.PutUint32(b, uint32(appStatus))
    	b[4] = protocolStatus
    	return c.writeRecord(typeEndRequest, reqId, b)
    }
    
    func (c *conn) writePairs(recType recType, reqId uint16, pairs map[string]string) error {
    	w := newWriter(c, recType, reqId)
    	b := make([]byte, 8)
    	for k, v := range pairs {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jul 11 18:51:39 UTC 2023
    - 5.9K bytes
    - Viewed (0)
  3. pkg/test/cert/ca/root.go

    utf8 = yes
    default_md = sha256
    default_bits = 4096
    req_extensions = req_ext
    x509_extensions = req_ext
    distinguished_name = req_dn
    [ req_ext ]
    subjectKeyIdentifier = hash
    basicConstraints = critical, CA:true
    keyUsage = critical, digitalSignature, nonRepudiation, keyEncipherment, keyCertSign
    [ req_dn ]
    O = Istio
    CN = Root CA`
    
    // Root contains the cryptographic files for a self-signed root CA.
    type Root struct {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Aug 03 18:09:59 UTC 2021
    - 2.3K bytes
    - Viewed (0)
  4. pkg/test/cert/ca/intermediate.go

    )
    
    const (
    	istioConfTemplate = `
    [ req ]
    encrypt_key = no
    prompt = no
    utf8 = yes
    default_md = sha256
    default_bits = 4096
    req_extensions = req_ext
    x509_extensions = req_ext
    distinguished_name = req_dn
    [ req_ext ]
    subjectKeyIdentifier = hash
    basicConstraints = critical, CA:true, pathlen:0
    keyUsage = critical, digitalSignature, nonRepudiation, keyEncipherment, keyCertSign
    subjectAltName=@san
    [ san ]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Nov 03 08:41:32 UTC 2022
    - 3.9K bytes
    - Viewed (0)
  5. manifests/charts/istio-cni/templates/daemonset.yaml

                # But we don't need _everything_ in `privileged`, so drop+readd capabilities based on feature.
                # privileged is redundant with CAP_SYS_ADMIN
                # since it's redundant, hardcode it to `true`, then manually drop ALL + readd granular
                # capabilities we actually require
                capabilities:
                  drop:
                  - ALL
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 17 21:52:29 UTC 2024
    - 7.9K bytes
    - Viewed (0)
  6. releasenotes/notes/fix-istioctl-revision.yaml

    apiVersion: release-notes/v2
    kind: bug-fix
    area: istioctl
    releaseNotes:
      - |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jan 30 17:44:02 UTC 2023
    - 208 bytes
    - Viewed (0)
Back to top