- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 24 for pubKeys (0.19 sec)
-
internal/config/identity/openid/jwt_test.go
"kid":"2011-04-29"} ] }` pubKeys := publicKeys{ RWMutex: &sync.RWMutex{}, pkMap: map[string]interface{}{}, } err := pubKeys.parseAndAdd(bytes.NewBuffer([]byte(jsonkey))) if err != nil { t.Fatal("Error loading pubkeys:", err) } if len(pubKeys.pkMap) != 1 { t.Fatalf("Expected 1 keys, got %d", len(pubKeys.pkMap)) }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/oidc_test.go
) type claimsTest struct { name string options Options optsFunc func(*Options) signingKey *jose.JSONWebKey pubKeys []*jose.JSONWebKey claims string want *user.DefaultInfo wantSkip bool wantErr string wantInitErr string wantHealthErrPrefix string
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 97.7K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret)) client := &http.Client{ Transport: r.transport, } resp, err := client.Get(pCfg.JWKS.URL.String()) if err != nil { return err } defer r.closeRespFn(resp.Body) if resp.StatusCode != http.StatusOK { return errors.New(resp.Status) } return r.pubKeys.parseAndAdd(resp.Body) }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu May 30 18:10:41 UTC 2024 - 8.3K bytes - Viewed (0) -
pkg/controlplane/apiserver/config.go
} // Load and set the public keys. var pubKeys []interface{} for _, f := range opts.Authentication.ServiceAccounts.KeyFiles { keys, err := keyutil.PublicKeysFromFile(f) if err != nil { return nil, nil, fmt.Errorf("failed to parse key file %q: %w", f, err) } pubKeys = append(pubKeys, keys...) } config.ServiceAccountIssuerURL = opts.Authentication.ServiceAccounts.Issuers[0]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:57:37 UTC 2024 - 14.9K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
} cfg := Config{ Enabled: r.Enabled, arnProviderCfgsMap: make(map[arn.ARN]*providerCfg, len(r.arnProviderCfgsMap)), ProviderCfgs: make(map[string]*providerCfg, len(r.ProviderCfgs)), pubKeys: r.pubKeys, roleArnPolicyMap: make(map[arn.ARN]string, len(r.roleArnPolicyMap)), transport: r.transport, closeRespFn: r.closeRespFn, } for k, v := range r.arnProviderCfgsMap {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 16.5K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers.go
// Parse the public key from a file pubKeys, err := keyutil.PublicKeysFromFile(publicKeyPath) if err != nil { return nil, nil, errors.Wrapf(err, "couldn't load the public key file %s", publicKeyPath) } // Allow RSA and ECDSA formats only switch k := privKey.(type) { case *rsa.PrivateKey: return k, pubKeys[0].(*rsa.PublicKey), nil case *ecdsa.PrivateKey: return k, pubKeys[0].(*ecdsa.PublicKey), nil default:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 25.5K bytes - Viewed (0) -
src/crypto/ed25519/ed25519_test.go
t.Errorf("recreating key pair gave different private key on line %d: %x vs %x", lineNo, priv[:], priv2) } if pubKey2 := priv2.Public().(PublicKey); !bytes.Equal(pubKey, pubKey2) { t.Errorf("recreating key pair gave different public key on line %d: %x vs %x", lineNo, pubKey, pubKey2) } if seed := priv2.Seed(); !bytes.Equal(priv[:32], seed) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Mar 27 18:23:49 UTC 2024 - 10.9K bytes - Viewed (0) -
src/crypto/des/cipher.go
for i := 0; i < 8; i++ { left, right = feistel(left, right, c.cipher1.subkeys[2*i], c.cipher1.subkeys[2*i+1]) } for i := 0; i < 8; i++ { right, left = feistel(right, left, c.cipher2.subkeys[15-2*i], c.cipher2.subkeys[15-(2*i+1)]) } for i := 0; i < 8; i++ { left, right = feistel(left, right, c.cipher3.subkeys[2*i], c.cipher3.subkeys[2*i+1]) } left = (left << 31) | (left >> 1)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 4K bytes - Viewed (0) -
src/crypto/des/block.go
"internal/byteorder" "sync" ) func cryptBlock(subkeys []uint64, dst, src []byte, decrypt bool) { b := byteorder.BeUint64(src) b = permuteInitialBlock(b) left, right := uint32(b>>32), uint32(b) left = (left << 1) | (left >> 31) right = (right << 1) | (right >> 31) if decrypt { for i := 0; i < 8; i++ { left, right = feistel(left, right, subkeys[15-2*i], subkeys[15-(2*i+1)]) } } else {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 6.5K bytes - Viewed (0) -
src/crypto/tls/auth.go
pubKey, ok := pubkey.(ed25519.PublicKey) if !ok { return fmt.Errorf("expected an Ed25519 public key, got %T", pubkey) } if !ed25519.Verify(pubKey, signed, sig) { return errors.New("Ed25519 verification failure") } case signaturePKCS1v15: pubKey, ok := pubkey.(*rsa.PublicKey) if !ok { return fmt.Errorf("expected an RSA public key, got %T", pubkey) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 10K bytes - Viewed (0)