Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 13 for verifyActions (0.26 sec)

  1. staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509.go

    }
    
    // DefaultVerifyOptions returns VerifyOptions that use the system root certificates, current time,
    // and requires certificates to be valid for client auth (x509.ExtKeyUsageClientAuth)
    func DefaultVerifyOptions() x509.VerifyOptions {
    	return x509.VerifyOptions{
    		KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
    	}
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Aug 18 01:31:22 UTC 2023
    - 10.3K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509_test.go

    		},
    
    		"future cert": {
    			Opts: x509.VerifyOptions{
    				CurrentTime: time.Now().Add(time.Duration(-100 * time.Hour * 24 * 365)),
    				Roots:       getRootCertPool(t),
    			},
    			Certs: getCerts(t, clientCNCert),
    			User:  CommonNameUserConversion,
    
    			ExpectOK:  false,
    			ExpectErr: true,
    		},
    		"expired cert": {
    			Opts: x509.VerifyOptions{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 02 23:23:03 UTC 2024
    - 36.9K bytes
    - Viewed (0)
  3. src/crypto/x509/verify.go

    // verified. Platform-specific verification needs the ASN.1 contents.
    var errNotParsed = errors.New("x509: missing ASN.1 contents; use ParseCertificate")
    
    // VerifyOptions contains parameters for Certificate.Verify.
    type VerifyOptions struct {
    	// DNSName, if set, is checked against the leaf certificate with
    	// Certificate.VerifyHostname or the platform verifier.
    	DNSName string
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:58:39 UTC 2024
    - 35.7K bytes
    - Viewed (0)
  4. pkg/kubeapiserver/authenticator/config.go

    	// Add the front proxy authenticator if requested
    	if config.RequestHeaderConfig != nil {
    		requestHeaderAuthenticator := headerrequest.NewDynamicVerifyOptionsSecure(
    			config.RequestHeaderConfig.CAContentProvider.VerifyOptions,
    			config.RequestHeaderConfig.AllowedClientNames,
    			config.RequestHeaderConfig.UsernameHeaders,
    			config.RequestHeaderConfig.GroupHeaders,
    			config.RequestHeaderConfig.ExtraHeaderPrefixes,
    		)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 09 19:29:33 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/util/pkiutil/pki_helpers.go

    	intermediatePool := x509.NewCertPool()
    	for _, c := range intermediates {
    		intermediatePool.AddCert(c)
    	}
    
    	verifyOptions := x509.VerifyOptions{
    		Roots:         rootPool,
    		Intermediates: intermediatePool,
    		KeyUsages:     []x509.ExtKeyUsage{x509.ExtKeyUsageAny},
    	}
    
    	if _, err := cert.Verify(verifyOptions); err != nil {
    		return err
    	}
    
    	return nil
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  6. security/pkg/pki/util/keycertbundle.go

    	rcp := x509.NewCertPool()
    	rcp.AppendCertsFromPEM(rootCertBytes)
    
    	icp := x509.NewCertPool()
    	icp.AppendCertsFromPEM(certChainBytes)
    
    	opts := x509.VerifyOptions{
    		Intermediates: icp,
    		Roots:         rcp,
    	}
    	cert, err := ParsePemEncodedCertificate(certBytes)
    	if err != nil {
    		return fmt.Errorf("failed to parse cert PEM: %v", err)
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Jan 21 06:07:50 UTC 2024
    - 10.5K bytes
    - Viewed (0)
  7. pkg/spiffe/spiffe.go

    	if err != nil {
    		return err
    	}
    	rootCertPool, ok := v.certPools[trustDomain]
    	if !ok {
    		return fmt.Errorf("no cert pool found for trust domain %s", trustDomain)
    	}
    
    	_, err = peerCert.Verify(x509.VerifyOptions{
    		Roots:         rootCertPool,
    		Intermediates: intCertPool,
    	})
    	return err
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  8. src/crypto/tls/handshake_client.go

    			if err := c.config.EncryptedClientHelloRejectionVerify(c.connectionStateLocked()); err != nil {
    				c.sendAlert(alertBadCertificate)
    				return err
    			}
    		} else {
    			opts := x509.VerifyOptions{
    				Roots:         c.config.RootCAs,
    				CurrentTime:   c.config.time(),
    				DNSName:       c.serverName,
    				Intermediates: x509.NewCertPool(),
    			}
    
    			for _, cert := range certs[1:] {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  9. src/crypto/x509/name_constraints_test.go

    			sans: []string{"uri:https://example.com/test"},
    		},
    		expectedError: "\"https://example.com/test\" is excluded",
    	},
    
    	// #75: serverAuth in a leaf shouldn't permit clientAuth when requested in
    	// VerifyOptions.
    	{
    		roots: make([]constraintsSpec, 1),
    		intermediates: [][]constraintsSpec{
    			{
    				{},
    			},
    		},
    		leaf: leafSpec{
    			sans: []string{"dns:example.com"},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 09 22:40:21 UTC 2024
    - 45.2K bytes
    - Viewed (0)
  10. security/pkg/pki/util/generate_cert_test.go

    				t.Errorf("incorrect IDs encoded: %v, %v VS (expected) %v, %v", ids[0], ids[1], c.subjectIDs[0], c.subjectIDs[1])
    			}
    		}
    		pool := x509.NewCertPool()
    		pool.AddCert(signingCert)
    		vo := x509.VerifyOptions{
    			Roots: pool,
    		}
    		if _, err := out.Verify(vo); err != nil {
    			t.Errorf("verification of the signed certificate failed %v", err)
    		}
    	}
    }
    
    func TestLoadSignerCredsFromFiles(t *testing.T) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 06 12:48:53 UTC 2023
    - 29.4K bytes
    - Viewed (0)
Back to top