Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for systemVerify (0.15 sec)

  1. src/crypto/x509/root_plan9.go

    //go:build plan9
    
    package x509
    
    import (
    	"os"
    )
    
    // Possible certificate files; stop after finding one.
    var certFiles = []string{
    	"/sys/lib/tls/ca.pem",
    }
    
    func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
    	return nil, nil
    }
    
    func loadSystemRoots() (*CertPool, error) {
    	roots := NewCertPool()
    	var bestErr error
    	for _, file := range certFiles {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Oct 28 18:17:57 UTC 2021
    - 828 bytes
    - Viewed (0)
  2. src/crypto/x509/root_windows.go

    			chain[i].RawTBSCertificate, chain[i].Signature); err != nil {
    			return nil, err
    		}
    	}
    	return chain, nil
    }
    
    // systemVerify is like Verify, except that it uses CryptoAPI calls
    // to build certificate chains and verify them.
    func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
    	storeCtx, err := createStoreContext(c, opts)
    	if err != nil {
    		return nil, err
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Nov 09 19:41:40 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  3. src/crypto/x509/root_unix.go

    	// It is a colon separated list of directories.
    	// See https://www.openssl.org/docs/man1.0.2/man1/c_rehash.html.
    	certDirEnv = "SSL_CERT_DIR"
    )
    
    func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
    	return nil, nil
    }
    
    func loadSystemRoots() (*CertPool, error) {
    	roots := NewCertPool()
    
    	files := certFiles
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Apr 11 20:54:07 UTC 2023
    - 2.7K bytes
    - Viewed (0)
  4. src/crypto/x509/root_darwin.go

    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    package x509
    
    import (
    	macOS "crypto/x509/internal/macos"
    	"errors"
    	"fmt"
    )
    
    func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
    	certs := macOS.CFArrayCreateMutable()
    	defer macOS.ReleaseCFArray(certs)
    	leaf, err := macOS.SecCertificateCreateWithData(c.Raw)
    	if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 01 00:36:38 UTC 2023
    - 3.5K bytes
    - Viewed (0)
Back to top