- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 61 for x509 (0.06 sec)
-
src/crypto/x509/parser.go
return nil, errors.New("x509: invalid RDNSequence: invalid attribute") } var attr pkix.AttributeTypeAndValue if !atav.ReadASN1ObjectIdentifier(&attr.Type) { return nil, errors.New("x509: invalid RDNSequence: invalid attribute type") } var rawValue cryptobyte.String var valueTag cryptobyte_asn1.Tag if !atav.ReadAnyASN1(&rawValue, &valueTag) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 38.5K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers.go
// intermediate CAs back to the root CA func VerifyCertChain(cert *x509.Certificate, intermediates []*x509.Certificate, root *x509.Certificate) error { rootPool := x509.NewCertPool() rootPool.AddCert(root) intermediatePool := x509.NewCertPool() for _, c := range intermediates { intermediatePool.AddCert(c) } verifyOptions := x509.VerifyOptions{ Roots: rootPool, Intermediates: intermediatePool,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 25.5K bytes - Viewed (0) -
pkg/spiffe/spiffe.go
type PeerCertVerifier struct { generalCertPool *x509.CertPool certPools map[string]*x509.CertPool } // NewPeerCertVerifier returns a new PeerCertVerifier. func NewPeerCertVerifier() *PeerCertVerifier { return &PeerCertVerifier{ generalCertPool: x509.NewCertPool(), certPools: make(map[string]*x509.CertPool), } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 11.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509_test.go
} } } func getDefaultVerifyOptions(t *testing.T) x509.VerifyOptions { options := DefaultVerifyOptions() options.Roots = getRootCertPool(t) return options } func getRootCertPool(t *testing.T) *x509.CertPool { return getRootCertPoolFor(t, rootCACert) } func getRootCertPoolFor(t *testing.T, certs ...string) *x509.CertPool { pool := x509.NewCertPool() for _, cert := range certs {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 23:23:03 UTC 2024 - 36.9K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/renewal/manager_test.go
DNSNames: []string{"test-domain.space"}, }, Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, } cert := &x509.Certificate{ Subject: pkix.Name{ CommonName: "test-common-name", Organization: testCertOrganization, }, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, DNSNames: []string{"test-domain.space"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 13.9K bytes - Viewed (0) -
pkg/spiffe/spiffe_test.go
"bar.domain.com": {validRootCert}, }, errContains: "x509: certificate signed by unknown authority", }, } for _, testCase := range testCases { t.Run(testCase.name, func(t *testing.T) { certMap := make(map[string][]*x509.Certificate) for trustDomain, certStrs := range testCase.certMap { certMap[trustDomain] = []*x509.Certificate{} for _, certStr := range certStrs {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 18.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_test.go
return nil, nil, err } template := x509.Certificate{ SerialNumber: big.NewInt(1), Subject: pkix.Name{ CommonName: fmt.Sprintf("%s@%d", host, time.Now().Unix()), }, NotBefore: time.Unix(0, 0), NotAfter: time.Now().Add(time.Hour * 24 * 365 * 100), KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 09 15:52:39 UTC 2024 - 13.8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/certlist.go
// Once the upstream issue is resolved, this should be returned to only allowing // ServerAuth usage. Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth}, }, }, configMutators: []configMutatorsFunc{ makeAltNamesMutator(pkiutil.GetEtcdAltNames), setCommonNameToNodeName(), }, } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 15.8K bytes - Viewed (0) -
src/crypto/tls/boring_test.go
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth}, BasicConstraintsValid: true, } if mode&^boringCertFIPSOK == boringCertLeaf { tmpl.DNSNames = []string{"example.com"} } else { tmpl.IsCA = true tmpl.KeyUsage |= x509.KeyUsageCertSign }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 19.4K bytes - Viewed (0) -
src/crypto/x509/verify.go
switch e.Reason { case NotAuthorizedToSign: return "x509: certificate is not authorized to sign other certificates" case Expired: return "x509: certificate has expired or is not yet valid: " + e.Detail case CANotAuthorizedForThisName: return "x509: a root or intermediate certificate is not authorized to sign for this name: " + e.Detail case CANotAuthorizedForExtKeyUsage:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:58:39 UTC 2024 - 35.7K bytes - Viewed (0)