Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 181 for x509 (0.04 sec)

  1. pkg/controller/certificates/authority/policies_test.go

    			expectErr:           false,
    		},
    		{
    			usages:              []capi.KeyUsage{"cert sign", "encipher only"},
    			expectedKeyUsage:    x509.KeyUsageCertSign | x509.KeyUsageEncipherOnly,
    			expectedExtKeyUsage: nil,
    			expectErr:           false,
    		},
    		{
    			usages:              []capi.KeyUsage{"ocsp signing", "crl sign", "s/mime", "content commitment"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 05 22:45:34 UTC 2020
    - 2.6K bytes
    - Viewed (0)
  2. pkg/test/csrctrl/authority/policies.go

    	capi.UsageCRLSign:           x509.KeyUsageCRLSign,
    	capi.UsageEncipherOnly:      x509.KeyUsageEncipherOnly,
    	capi.UsageDecipherOnly:      x509.KeyUsageDecipherOnly,
    }
    
    var extKeyUsageDict = map[capi.KeyUsage]x509.ExtKeyUsage{
    	capi.UsageAny:             x509.ExtKeyUsageAny,
    	capi.UsageServerAuth:      x509.ExtKeyUsageServerAuth,
    	capi.UsageClientAuth:      x509.ExtKeyUsageClientAuth,
    	capi.UsageCodeSigning:     x509.ExtKeyUsageCodeSigning,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Aug 03 17:06:22 UTC 2022
    - 4.5K bytes
    - Viewed (0)
  3. pkg/controller/certificates/authority/policies.go

    	capi.UsageCRLSign:           x509.KeyUsageCRLSign,
    	capi.UsageEncipherOnly:      x509.KeyUsageEncipherOnly,
    	capi.UsageDecipherOnly:      x509.KeyUsageDecipherOnly,
    }
    
    var extKeyUsageDict = map[capi.KeyUsage]x509.ExtKeyUsage{
    	capi.UsageAny:             x509.ExtKeyUsageAny,
    	capi.UsageServerAuth:      x509.ExtKeyUsageServerAuth,
    	capi.UsageClientAuth:      x509.ExtKeyUsageClientAuth,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jul 26 17:14:05 UTC 2022
    - 5.7K bytes
    - Viewed (0)
  4. src/crypto/x509/pkcs8.go

    		}
    		var curvePrivateKey []byte
    		if _, err := asn1.Unmarshal(privKey.PrivateKey, &curvePrivateKey); err != nil {
    			return nil, fmt.Errorf("x509: invalid X25519 private key: %v", err)
    		}
    		return ecdh.X25519().NewPrivateKey(curvePrivateKey)
    
    	default:
    		return nil, fmt.Errorf("x509: PKCS#8 wrapping contained private key with unknown algorithm: %v", privKey.Algo.Algorithm)
    	}
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 5.8K bytes
    - Viewed (0)
  5. pkg/controller/certificates/authority/authority_test.go

    	}
    	now := time.Now()
    	nowFunc := func() time.Time { return now }
    	tmpl := &x509.Certificate{
    		SerialNumber: big.NewInt(42),
    		Subject: pkix.Name{
    			CommonName: "test-ca",
    		},
    		NotBefore:             now.Add(-24 * time.Hour),
    		NotAfter:              now.Add(24 * time.Hour),
    		KeyUsage:              x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
    		BasicConstraintsValid: true,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 23 19:36:11 UTC 2021
    - 7.3K bytes
    - Viewed (0)
  6. cmd/kubeadm/app/phases/certs/renewal/filerenewer_test.go

    				DNSNames: []string{"test-domain.space"},
    			},
    			Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
    		},
    	}
    
    	cert, _, err := fr.Renew(certCfg)
    	if err != nil {
    		t.Fatalf("unexpected error renewing cert: %v", err)
    	}
    
    	// verify the renewed certificate
    	pool := x509.NewCertPool()
    	pool.AddCert(testCACert)
    
    	_, err = cert.Verify(x509.VerifyOptions{
    		DNSName:   "test-domain.space",
    		Roots:     pool,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Sep 28 04:36:54 UTC 2022
    - 1.5K bytes
    - Viewed (0)
  7. src/crypto/x509/x509_test_import.go

    	rsaPriv, err := x509.ParsePKCS1PrivateKey(block.Bytes)
    	if err != nil {
    		panic("Failed to parse private key: " + err.Error())
    	}
    
    	template := x509.Certificate{
    		SerialNumber: big.NewInt(1),
    		Subject: pkix.Name{
    			CommonName:   "test",
    			Organization: []string{"Σ Acme Co"},
    		},
    		NotBefore: time.Unix(1000, 0),
    		NotAfter:  time.Unix(100000, 0),
    		KeyUsage:  x509.KeyUsageCertSign,
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Oct 28 18:17:57 UTC 2021
    - 1.7K bytes
    - Viewed (0)
  8. tests/integration/security/util/secret/secret.go

    			return fmt.Errorf("%v does not exist in the data section", key)
    		}
    	}
    
    	verifyFields := &util.VerifyFields{
    		ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
    		KeyUsage:    x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment,
    		IsCA:        false,
    		Host:        expectedID,
    	}
    
    	if err := util.VerifyCertificate(secret.Data[ca.PrivateKeyFile],
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 22 04:04:14 UTC 2023
    - 2.3K bytes
    - Viewed (0)
  9. cmd/kubeadm/app/util/certs/util.go

    func CreateTestCert(t *testing.T, caCert *x509.Certificate, caKey crypto.Signer, altNames certutil.AltNames) (*x509.Certificate, crypto.Signer, *pkiutil.CertConfig) {
    	config := &pkiutil.CertConfig{
    		Config: certutil.Config{
    			CommonName: "testCert",
    			Usages:     []x509.ExtKeyUsage{x509.ExtKeyUsageAny},
    			AltNames:   altNames,
    		},
    	}
    	cert, key, err := pkiutil.NewCertAndKey(caCert, caKey, config)
    	if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  10. security/pkg/pki/util/crypto.go

    	cb, _ := pem.Decode(certBytes)
    	if cb == nil {
    		return nil, fmt.Errorf("invalid PEM encoded certificate")
    	}
    
    	cert, err := x509.ParseCertificate(cb.Bytes)
    	if err != nil {
    		return nil, fmt.Errorf("failed to parse X.509 certificate")
    	}
    
    	return cert, nil
    }
    
    // ParsePemEncodedCertificateChain constructs a slice of `x509.Certificate` and `rootCertBytes`
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jun 04 13:00:07 UTC 2024
    - 5.3K bytes
    - Viewed (0)
Back to top