Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for VerifyHostname (0.49 sec)

  1. src/crypto/x509/verify.go

    // VerifyOptions contains parameters for Certificate.Verify.
    type VerifyOptions struct {
    	// DNSName, if set, is checked against the leaf certificate with
    	// Certificate.VerifyHostname or the platform verifier.
    	DNSName string
    
    	// Intermediates is an optional pool of certificates that are not trust
    	// anchors, but can be used to form a chain from the leaf certificate to a
    	// root certificate.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:58:39 UTC 2024
    - 35.7K bytes
    - Viewed (0)
  2. cmd/kubeadm/app/phases/certs/certs.go

    	for _, dnsName := range cfg.AltNames.DNSNames {
    		if err := cert.VerifyHostname(dnsName); err != nil {
    			return errors.Wrapf(err, "certificate %s is invalid", baseName)
    		}
    	}
    	for _, ipAddress := range cfg.AltNames.IPs {
    		if err := cert.VerifyHostname(ipAddress.String()); err != nil {
    			return errors.Wrapf(err, "certificate %s is invalid", baseName)
    		}
    	}
    	return nil
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Dec 05 10:17:14 UTC 2023
    - 19.4K bytes
    - Viewed (0)
  3. src/crypto/x509/name_constraints_test.go

    				{},
    			},
    		},
    		leaf: leafSpec{
    			sans: []string{"unknown:"},
    		},
    	},
    
    	// #30: without SANs, a certificate with a CN is still accepted in a
    	// constrained chain, since we ignore the CN in VerifyHostname.
    	{
    		roots: []constraintsSpec{
    			{
    				ok: []string{"dns:foo.com", "dns:.foo.com"},
    			},
    		},
    		intermediates: [][]constraintsSpec{
    			{
    				{},
    			},
    		},
    		leaf: leafSpec{
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 09 22:40:21 UTC 2024
    - 45.2K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_client.go

    		if len(session.verifiedChains) == 0 {
    			// The original connection had InsecureSkipVerify, while this doesn't.
    			return nil, nil, nil, nil
    		}
    		if err := session.peerCertificates[0].VerifyHostname(c.config.ServerName); err != nil {
    			return nil, nil, nil, nil
    		}
    	}
    
    	if session.version != VersionTLS13 {
    		// In TLS 1.2 the cipher suite must match the resumed session. Ensure we
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
Back to top