- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 117 for x509 (0.07 sec)
-
src/crypto/x509/x509.go
if template == nil { return nil, errors.New("x509: template can not be nil") } if issuer == nil { return nil, errors.New("x509: issuer can not be nil") } if (issuer.KeyUsage & KeyUsageCRLSign) == 0 { return nil, errors.New("x509: issuer must have the crlSign key usage bit set") } if len(issuer.SubjectKeyId) == 0 { return nil, errors.New("x509: issuer certificate doesn't contain a subject key identifier")
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 09:20:15 UTC 2024 - 82K bytes - Viewed (0) -
src/crypto/x509/parser.go
return nil, errors.New("x509: invalid RDNSequence: invalid attribute") } var attr pkix.AttributeTypeAndValue if !atav.ReadASN1ObjectIdentifier(&attr.Type) { return nil, errors.New("x509: invalid RDNSequence: invalid attribute type") } var rawValue cryptobyte.String var valueTag cryptobyte_asn1.Tag if !atav.ReadAnyASN1(&rawValue, &valueTag) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 38.5K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers.go
// intermediate CAs back to the root CA func VerifyCertChain(cert *x509.Certificate, intermediates []*x509.Certificate, root *x509.Certificate) error { rootPool := x509.NewCertPool() rootPool.AddCert(root) intermediatePool := x509.NewCertPool() for _, c := range intermediates { intermediatePool.AddCert(c) } verifyOptions := x509.VerifyOptions{ Roots: rootPool, Intermediates: intermediatePool,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 25.5K bytes - Viewed (0) -
cmd/kubeadm/app/util/certs/util.go
func CreateTestCert(t *testing.T, caCert *x509.Certificate, caKey crypto.Signer, altNames certutil.AltNames) (*x509.Certificate, crypto.Signer, *pkiutil.CertConfig) { config := &pkiutil.CertConfig{ Config: certutil.Config{ CommonName: "testCert", Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageAny}, AltNames: altNames, }, } cert, key, err := pkiutil.NewCertAndKey(caCert, caKey, config) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 9.1K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
cb, _ := pem.Decode(certBytes) if cb == nil { return nil, fmt.Errorf("invalid PEM encoded certificate") } cert, err := x509.ParseCertificate(cb.Bytes) if err != nil { return nil, fmt.Errorf("failed to parse X.509 certificate") } return cert, nil } // ParsePemEncodedCertificateChain constructs a slice of `x509.Certificate` and `rootCertBytes`
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0) -
pkg/spiffe/spiffe.go
type PeerCertVerifier struct { generalCertPool *x509.CertPool certPools map[string]*x509.CertPool } // NewPeerCertVerifier returns a new PeerCertVerifier. func NewPeerCertVerifier() *PeerCertVerifier { return &PeerCertVerifier{ generalCertPool: x509.NewCertPool(), certPools: make(map[string]*x509.CertPool), } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 11.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509_test.go
} } } func getDefaultVerifyOptions(t *testing.T) x509.VerifyOptions { options := DefaultVerifyOptions() options.Roots = getRootCertPool(t) return options } func getRootCertPool(t *testing.T) *x509.CertPool { return getRootCertPoolFor(t, rootCACert) } func getRootCertPoolFor(t *testing.T, certs ...string) *x509.CertPool { pool := x509.NewCertPool() for _, cert := range certs {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 23:23:03 UTC 2024 - 36.9K bytes - Viewed (0) -
internal/config/certs.go
// password protected. const EnvCertPassword = "MINIO_CERT_PASSWD" // ParsePublicCertFile - parses public cert into its *x509.Certificate equivalent. func ParsePublicCertFile(certFile string) (x509Certs []*x509.Certificate, err error) { // Read certificate file. var data []byte if data, err = os.ReadFile(certFile); err != nil { return nil, err } // Trimming leading and tailing white spaces. data = bytes.TrimSpace(data)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 3.8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/renewal/manager_test.go
DNSNames: []string{"test-domain.space"}, }, Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, } cert := &x509.Certificate{ Subject: pkix.Name{ CommonName: "test-common-name", Organization: testCertOrganization, }, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, DNSNames: []string{"test-domain.space"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 13.9K bytes - Viewed (0) -
pkg/spiffe/spiffe_test.go
"bar.domain.com": {validRootCert}, }, errContains: "x509: certificate signed by unknown authority", }, } for _, testCase := range testCases { t.Run(testCase.name, func(t *testing.T) { certMap := make(map[string][]*x509.Certificate) for trustDomain, certStrs := range testCase.certMap { certMap[trustDomain] = []*x509.Certificate{} for _, certStr := range certStrs {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 18.1K bytes - Viewed (0)