Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 126 for certifican (0.06 seconds)

  1. docs/es/docs/deployment/https.md

    En este caso, usaría el certificado para `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    El cliente ya **confía** en la entidad que generó ese certificado TLS (en este caso Let's Encrypt, pero lo veremos más adelante), por lo que puede **verificar** que el certificado sea válido.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Tue Dec 16 16:33:45 GMT 2025
    - 15.4K bytes
    - Click Count (0)
  2. docs/pt/docs/deployment/https.md

    Nesse caso, ele usaria o certificado para `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    O cliente já confia na entidade que gerou o certificado TLS (nesse caso, o Let's Encrypt, mas veremos sobre isso mais tarde), então ele pode verificar que o certificado é válido.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Nov 12 16:23:57 GMT 2025
    - 14.8K bytes
    - Click Count (0)
  3. internal/config/certs_test.go

    		}
    		certificate, err := createTempFile(t, "public.crt", testCase.certificate)
    		if err != nil {
    			os.Remove(privateKey)
    			t.Fatalf("Test %d: failed to create tmp certificate file: %v", i, err)
    		}
    
    		if testCase.password != "" {
    			t.Setenv(EnvCertPassword, testCase.password)
    		}
    		_, err = LoadX509KeyPair(certificate, privateKey)
    		if err != nil && !testCase.shouldFail {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Feb 18 16:25:55 GMT 2025
    - 21.6K bytes
    - Click Count (0)
  4. cmd/sts-handlers.go

    	// configured expiry and the duration until the certificate itself
    	// expires.
    	// We must not issue credentials that out-live the certificate.
    	if validUntil := time.Until(certificate.NotAfter); validUntil < expiry {
    		expiry = validUntil
    	}
    
    	// Associate any service accounts to the certificate CN
    	parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 36.6K bytes
    - Click Count (0)
  5. docs/en/docs/deployment/https.md

    In this case, it would use the certificate for `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    The client already **trusts** the entity that generated that TLS certificate (in this case Let's Encrypt, but we'll see about that later), so it can **verify** that the certificate is valid.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 19:34:08 GMT 2025
    - 14.3K bytes
    - Click Count (0)
  6. internal/kms/config.go

    				}
    				certificate, err := tls.X509KeyPair(certBytes, keyBytes)
    				if err != nil {
    					return tls.Certificate{}, fmt.Errorf("Unable to load KES client certificate as specified by the shell environment: %v", err)
    				}
    				return certificate, nil
    			}
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 15K bytes
    - Click Count (0)
  7. cmd/sftp-server.go

    	}
    
    	cert, ok := clientKey.(*ssh.Certificate)
    	if !ok {
    		return errSftpPublicKeyWithoutCert
    	}
    
    	// ssh.CheckCert called by ssh.Authenticate accepts certificates
    	// with empty principles list so we block those in here.
    	if len(cert.ValidPrincipals) == 0 {
    		return errSftpCertWithoutPrincipals
    	}
    
    	// Verify that certificate provided by user is issued by trusted CA,
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 16.5K bytes
    - Click Count (0)
  8. api/go1.24.txt

    pkg crypto/x509, type Certificate struct, InhibitAnyPolicy int #68484
    pkg crypto/x509, type Certificate struct, InhibitAnyPolicyZero bool #68484
    pkg crypto/x509, type Certificate struct, InhibitPolicyMapping int #68484
    pkg crypto/x509, type Certificate struct, InhibitPolicyMappingZero bool #68484
    pkg crypto/x509, type Certificate struct, PolicyMappings []PolicyMapping #68484
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Tue Dec 17 21:28:29 GMT 2024
    - 14.2K bytes
    - Click Count (0)
  9. internal/http/listener_test.go

    	"github.com/minio/minio-go/v7/pkg/set"
    )
    
    var serverPort uint32 = 60000
    
    var getCert = func(*tls.ClientHelloInfo) (*tls.Certificate, error) {
    	certificate, err := getTLSCert()
    	if err != nil {
    		return nil, err
    	}
    	return &certificate, nil
    }
    
    func getTLSCert() (tls.Certificate, error) {
    	keyPEMBlock := []byte(`-----BEGIN RSA PRIVATE KEY-----
    MIIEpAIBAAKCAQEApEkbPrT6wzcWK1W5atQiGptvuBsRdf8MCg4u6SN10QbslA5k
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 11.8K bytes
    - Click Count (0)
  10. doc/godebug.md

    setting.](/pkg/crypto/x509/#CreateCertificate) from `0` to `1`. When marshalling
    certificates, policies are now taken from the
    [`Certificate.Policies`](/pkg/crypto/x509/#Certificate.Policies) field rather
    than the
    [`Certificate.PolicyIdentifiers`](/pkg/crypto/x509/#Certificate.PolicyIdentifiers)
    field by default.
    
    Go 1.24 enabled the post-quantum key exchange mechanism
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Wed Dec 03 00:18:09 GMT 2025
    - 24.7K bytes
    - Click Count (0)
Back to Top