Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 61 for x509 (0.06 sec)

  1. src/crypto/x509/parser.go

    				return nil, errors.New("x509: invalid RDNSequence: invalid attribute")
    			}
    			var attr pkix.AttributeTypeAndValue
    			if !atav.ReadASN1ObjectIdentifier(&attr.Type) {
    				return nil, errors.New("x509: invalid RDNSequence: invalid attribute type")
    			}
    			var rawValue cryptobyte.String
    			var valueTag cryptobyte_asn1.Tag
    			if !atav.ReadAnyASN1(&rawValue, &valueTag) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:00:16 UTC 2024
    - 38.5K bytes
    - Viewed (0)
  2. cmd/kubeadm/app/util/pkiutil/pki_helpers.go

    // intermediate CAs back to the root CA
    func VerifyCertChain(cert *x509.Certificate, intermediates []*x509.Certificate, root *x509.Certificate) error {
    	rootPool := x509.NewCertPool()
    	rootPool.AddCert(root)
    
    	intermediatePool := x509.NewCertPool()
    	for _, c := range intermediates {
    		intermediatePool.AddCert(c)
    	}
    
    	verifyOptions := x509.VerifyOptions{
    		Roots:         rootPool,
    		Intermediates: intermediatePool,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  3. pkg/spiffe/spiffe.go

    type PeerCertVerifier struct {
    	generalCertPool *x509.CertPool
    	certPools       map[string]*x509.CertPool
    }
    
    // NewPeerCertVerifier returns a new PeerCertVerifier.
    func NewPeerCertVerifier() *PeerCertVerifier {
    	return &PeerCertVerifier{
    		generalCertPool: x509.NewCertPool(),
    		certPools:       make(map[string]*x509.CertPool),
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  4. staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509_test.go

    		}
    	}
    }
    
    func getDefaultVerifyOptions(t *testing.T) x509.VerifyOptions {
    	options := DefaultVerifyOptions()
    	options.Roots = getRootCertPool(t)
    	return options
    }
    
    func getRootCertPool(t *testing.T) *x509.CertPool {
    	return getRootCertPoolFor(t, rootCACert)
    }
    
    func getRootCertPoolFor(t *testing.T, certs ...string) *x509.CertPool {
    	pool := x509.NewCertPool()
    	for _, cert := range certs {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 02 23:23:03 UTC 2024
    - 36.9K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/phases/certs/renewal/manager_test.go

    			DNSNames: []string{"test-domain.space"},
    		},
    		Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
    	}
    
    	cert := &x509.Certificate{
    		Subject: pkix.Name{
    			CommonName:   "test-common-name",
    			Organization: testCertOrganization,
    		},
    		ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
    		DNSNames:    []string{"test-domain.space"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  6. pkg/spiffe/spiffe_test.go

    				"bar.domain.com": {validRootCert},
    			},
    			errContains: "x509: certificate signed by unknown authority",
    		},
    	}
    
    	for _, testCase := range testCases {
    		t.Run(testCase.name, func(t *testing.T) {
    			certMap := make(map[string][]*x509.Certificate)
    			for trustDomain, certStrs := range testCase.certMap {
    				certMap[trustDomain] = []*x509.Certificate{}
    				for _, certStr := range certStrs {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 18.1K bytes
    - Viewed (0)
  7. staging/src/k8s.io/apiserver/pkg/server/options/serving_test.go

    		return nil, nil, err
    	}
    
    	template := x509.Certificate{
    		SerialNumber: big.NewInt(1),
    		Subject: pkix.Name{
    			CommonName: fmt.Sprintf("%s@%d", host, time.Now().Unix()),
    		},
    		NotBefore: time.Unix(0, 0),
    		NotAfter:  time.Now().Add(time.Hour * 24 * 365 * 100),
    
    		KeyUsage:              x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 09 15:52:39 UTC 2024
    - 13.8K bytes
    - Viewed (0)
  8. cmd/kubeadm/app/phases/certs/certlist.go

    				// Once the upstream issue is resolved, this should be returned to only allowing
    				// ServerAuth usage.
    				Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
    			},
    		},
    		configMutators: []configMutatorsFunc{
    			makeAltNamesMutator(pkiutil.GetEtcdAltNames),
    			setCommonNameToNodeName(),
    		},
    	}
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 15.8K bytes
    - Viewed (0)
  9. src/crypto/tls/boring_test.go

    		KeyUsage:              x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
    		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
    		BasicConstraintsValid: true,
    	}
    	if mode&^boringCertFIPSOK == boringCertLeaf {
    		tmpl.DNSNames = []string{"example.com"}
    	} else {
    		tmpl.IsCA = true
    		tmpl.KeyUsage |= x509.KeyUsageCertSign
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  10. src/crypto/x509/verify.go

    	switch e.Reason {
    	case NotAuthorizedToSign:
    		return "x509: certificate is not authorized to sign other certificates"
    	case Expired:
    		return "x509: certificate has expired or is not yet valid: " + e.Detail
    	case CANotAuthorizedForThisName:
    		return "x509: a root or intermediate certificate is not authorized to sign for this name: " + e.Detail
    	case CANotAuthorizedForExtKeyUsage:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:58:39 UTC 2024
    - 35.7K bytes
    - Viewed (0)
Back to top