Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for InsecureSkipVerify (0.22 sec)

  1. src/crypto/tls/handshake_client_test.go

    					}
    					return checkFields(c, called, "client")
    				}
    			},
    		},
    		{
    			name: "InsecureSkipVerify",
    			configureServer: func(config *Config, called *int) {
    				config.ClientAuth = RequireAnyClientCert
    				config.InsecureSkipVerify = true
    				config.VerifyConnection = func(c ConnectionState) error {
    					*called++
    					if l := len(c.PeerCertificates); l != 1 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 88.7K bytes
    - Viewed (0)
  2. src/crypto/tls/common.go

    	// that servers use if required to verify a client certificate
    	// by the policy in ClientAuth.
    	ClientCAs *x509.CertPool
    
    	// InsecureSkipVerify controls whether a client verifies the server's
    	// certificate chain and host name. If InsecureSkipVerify is true, crypto/tls
    	// accepts any certificate presented by the server and any host name in that
    	// certificate. In this mode, TLS is susceptible to machine-in-the-middle
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
  3. src/crypto/tls/tls_test.go

    func testVerifyCertificates(t *testing.T, version uint16) {
    	tests := []struct {
    		name string
    
    		InsecureSkipVerify bool
    		ClientAuth         ClientAuthType
    		ClientCertificates bool
    	}{
    		{
    			name: "defaults",
    		},
    		{
    			name:               "InsecureSkipVerify",
    			InsecureSkipVerify: true,
    		},
    		{
    			name:       "RequestClientCert with no certs",
    			ClientAuth: RequestClientCert,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_server_test.go

    	}
    }
    
    func TestVersion(t *testing.T) {
    	serverConfig := &Config{
    		Certificates: testConfig.Certificates,
    		MaxVersion:   VersionTLS13,
    	}
    	clientConfig := &Config{
    		InsecureSkipVerify: true,
    		MinVersion:         VersionTLS12,
    	}
    	state, _, err := testHandshake(t, clientConfig, serverConfig)
    	if err != nil {
    		t.Fatalf("handshake failed: %s", err)
    	}
    	if state.Version != VersionTLS13 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
  5. cmd/test-utils_test.go

    //  https://golang.org/src/crypto/tls/generate_cert.go
    //    $ go run generate_cert.go -ca --host 127.0.0.1
    // The generated certificate contains IP SAN, that way we don't need
    // to enable InsecureSkipVerify in TLS config
    
    // Starts the test server and returns the TestServer with TLS configured instance.
    func StartTestTLSServer(t TestErrHandler, instanceType string, cert, key []byte) TestServer {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 10 15:50:49 UTC 2024
    - 76.9K bytes
    - Viewed (0)
  6. tests/integration/ambient/baseline_test.go

    				Headers:            nil,
    				Cert:               string(cert.ClientCert),
    				Key:                string(cert.Key),
    				CaCert:             string(cert.RootCert),
    				InsecureSkipVerify: true,
    			}
    			hbsvc := echo.HBONE{
    				Address:            apps.WaypointProxies[apps.ServiceAddressedWaypoint.Config().ServiceWaypointProxy].Inbound(),
    				Headers:            nil,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 00:07:28 UTC 2024
    - 78.4K bytes
    - Viewed (0)
  7. src/net/http/client_test.go

    	// would require a new cert for testing, and probably
    	// redundant with these tests.
    	c := ts.Client()
    	for _, insecure := range []bool{true, false} {
    		c.Transport.(*Transport).TLSClientConfig = &tls.Config{
    			InsecureSkipVerify: insecure,
    		}
    		res, err := c.Get(ts.URL)
    		if (err == nil) != insecure {
    			t.Errorf("insecure=%v: got unexpected err=%v", insecure, err)
    		}
    		if res != nil {
    			res.Body.Close()
    		}
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 63.8K bytes
    - Viewed (0)
  8. cmd/iam.go

    	stsTLSConfig, err := xtls.Lookup(s[config.IdentityTLSSubSys][config.Default])
    	if err != nil {
    		iamLogIf(ctx, fmt.Errorf("Unable to initialize X.509/TLS STS API: %w", err), logger.WarningKind)
    	}
    
    	if stsTLSConfig.InsecureSkipVerify {
    		iamLogIf(ctx, fmt.Errorf("Enabling %s is not recommended in a production environment", xtls.EnvIdentityTLSSkipVerify), logger.WarningKind)
    	}
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 71.9K bytes
    - Viewed (0)
Back to top