- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 181 for x509 (0.04 sec)
-
pkg/controller/certificates/authority/policies_test.go
expectErr: false, }, { usages: []capi.KeyUsage{"cert sign", "encipher only"}, expectedKeyUsage: x509.KeyUsageCertSign | x509.KeyUsageEncipherOnly, expectedExtKeyUsage: nil, expectErr: false, }, { usages: []capi.KeyUsage{"ocsp signing", "crl sign", "s/mime", "content commitment"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 05 22:45:34 UTC 2020 - 2.6K bytes - Viewed (0) -
pkg/test/csrctrl/authority/policies.go
capi.UsageCRLSign: x509.KeyUsageCRLSign, capi.UsageEncipherOnly: x509.KeyUsageEncipherOnly, capi.UsageDecipherOnly: x509.KeyUsageDecipherOnly, } var extKeyUsageDict = map[capi.KeyUsage]x509.ExtKeyUsage{ capi.UsageAny: x509.ExtKeyUsageAny, capi.UsageServerAuth: x509.ExtKeyUsageServerAuth, capi.UsageClientAuth: x509.ExtKeyUsageClientAuth, capi.UsageCodeSigning: x509.ExtKeyUsageCodeSigning,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Aug 03 17:06:22 UTC 2022 - 4.5K bytes - Viewed (0) -
pkg/controller/certificates/authority/policies.go
capi.UsageCRLSign: x509.KeyUsageCRLSign, capi.UsageEncipherOnly: x509.KeyUsageEncipherOnly, capi.UsageDecipherOnly: x509.KeyUsageDecipherOnly, } var extKeyUsageDict = map[capi.KeyUsage]x509.ExtKeyUsage{ capi.UsageAny: x509.ExtKeyUsageAny, capi.UsageServerAuth: x509.ExtKeyUsageServerAuth, capi.UsageClientAuth: x509.ExtKeyUsageClientAuth,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 26 17:14:05 UTC 2022 - 5.7K bytes - Viewed (0) -
src/crypto/x509/pkcs8.go
} var curvePrivateKey []byte if _, err := asn1.Unmarshal(privKey.PrivateKey, &curvePrivateKey); err != nil { return nil, fmt.Errorf("x509: invalid X25519 private key: %v", err) } return ecdh.X25519().NewPrivateKey(curvePrivateKey) default: return nil, fmt.Errorf("x509: PKCS#8 wrapping contained private key with unknown algorithm: %v", privKey.Algo.Algorithm) } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 5.8K bytes - Viewed (0) -
pkg/controller/certificates/authority/authority_test.go
} now := time.Now() nowFunc := func() time.Time { return now } tmpl := &x509.Certificate{ SerialNumber: big.NewInt(42), Subject: pkix.Name{ CommonName: "test-ca", }, NotBefore: now.Add(-24 * time.Hour), NotAfter: now.Add(24 * time.Hour), KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign, BasicConstraintsValid: true,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 23 19:36:11 UTC 2021 - 7.3K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/renewal/filerenewer_test.go
DNSNames: []string{"test-domain.space"}, }, Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, }, } cert, _, err := fr.Renew(certCfg) if err != nil { t.Fatalf("unexpected error renewing cert: %v", err) } // verify the renewed certificate pool := x509.NewCertPool() pool.AddCert(testCACert) _, err = cert.Verify(x509.VerifyOptions{ DNSName: "test-domain.space", Roots: pool,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Sep 28 04:36:54 UTC 2022 - 1.5K bytes - Viewed (0) -
src/crypto/x509/x509_test_import.go
rsaPriv, err := x509.ParsePKCS1PrivateKey(block.Bytes) if err != nil { panic("Failed to parse private key: " + err.Error()) } template := x509.Certificate{ SerialNumber: big.NewInt(1), Subject: pkix.Name{ CommonName: "test", Organization: []string{"Σ Acme Co"}, }, NotBefore: time.Unix(1000, 0), NotAfter: time.Unix(100000, 0), KeyUsage: x509.KeyUsageCertSign, }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Oct 28 18:17:57 UTC 2021 - 1.7K bytes - Viewed (0) -
tests/integration/security/util/secret/secret.go
return fmt.Errorf("%v does not exist in the data section", key) } } verifyFields := &util.VerifyFields{ ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}, KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment, IsCA: false, Host: expectedID, } if err := util.VerifyCertificate(secret.Data[ca.PrivateKeyFile],
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 22 04:04:14 UTC 2023 - 2.3K bytes - Viewed (0) -
cmd/kubeadm/app/util/certs/util.go
func CreateTestCert(t *testing.T, caCert *x509.Certificate, caKey crypto.Signer, altNames certutil.AltNames) (*x509.Certificate, crypto.Signer, *pkiutil.CertConfig) { config := &pkiutil.CertConfig{ Config: certutil.Config{ CommonName: "testCert", Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageAny}, AltNames: altNames, }, } cert, key, err := pkiutil.NewCertAndKey(caCert, caKey, config) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 9.1K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
cb, _ := pem.Decode(certBytes) if cb == nil { return nil, fmt.Errorf("invalid PEM encoded certificate") } cert, err := x509.ParseCertificate(cb.Bytes) if err != nil { return nil, fmt.Errorf("failed to parse X.509 certificate") } return cert, nil } // ParsePemEncodedCertificateChain constructs a slice of `x509.Certificate` and `rootCertBytes`
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0)