Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 20 for serverAuth (0.32 sec)

  1. tests/testdata/certs/generate.sh

    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = clientAuth, serverAuth
    subjectAltName = @alt_names
    [alt_names]
    URI = spiffe://cluster.local/ns/default/sa/default
    EOF
    
    cat > "${WD}/dns-client.conf" <<EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 05 19:49:21 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/util/webhook/gencerts.sh

    extendedKeyUsage = clientAuth, serverAuth
    EOF
    
    cat > client.conf << EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = clientAuth, serverAuth
    subjectAltName = @alt_names
    [alt_names]
    IP.1 = 127.0.0.1
    EOF
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 25 15:57:40 UTC 2022
    - 5.7K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/testcerts/gencerts.sh

    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = clientAuth, serverAuth
    subjectAltName = @alt_names
    [alt_names]
    IP.1 = 127.0.0.1
    DNS.1 = webhook-test.default.svc
    EOF
    
    cat > client.conf << EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jan 24 05:55:09 UTC 2019
    - 3.5K bytes
    - Viewed (0)
  4. src/crypto/x509/name_constraints_test.go

    	{
    		roots: []constraintsSpec{
    			{
    				ekus: []string{"serverAuth"},
    			},
    		},
    		intermediates: [][]constraintsSpec{
    			{
    				{
    					ekus: []string{"serverAuth", "email"},
    				},
    			},
    		},
    		leaf: leafSpec{
    			sans: []string{"dns:example.com"},
    			ekus: []string{"serverAuth"},
    		},
    	},
    
    	// #66: EKUs in roots are not ignored.
    	{
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 09 22:40:21 UTC 2024
    - 45.2K bytes
    - Viewed (0)
  5. tests/integration/security/sds_ingress/util/generate_certs.sh

    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = clientAuth, serverAuth
    subjectAltName = @alt_names
    [alt_names]
    DNS = *.example.com
    EOF
    
    cat > "${WD}/server.conf" <<EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 05 22:01:21 UTC 2023
    - 5K bytes
    - Viewed (0)
  6. pkg/testcerts/generate-certs.sh

    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = clientAuth, serverAuth
    subjectAltName = @alt_names
    [alt_names]
    IP.1 = 127.0.0.1
    IP.2 = ::1
    EOF
    
    cat > server.conf <<EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 24 14:06:41 UTC 2023
    - 3.3K bytes
    - Viewed (0)
  7. tools/certs/common.mk

    	@echo "[ req_ext ]" >> $@
    	@echo "subjectKeyIdentifier = hash" >> $@
    	@echo "basicConstraints = critical, CA:false" >> $@
    	@echo "keyUsage = digitalSignature, keyEncipherment" >> $@
    	@echo "extendedKeyUsage = serverAuth, clientAuth" >> $@
    	@echo "subjectAltName=@san" >> $@
    	@echo "[ san ]" >> $@
    	@echo "URI.1 = spiffe://cluster.local/ns/$(L)sa/$(SERVICE_ACCOUNT)" >> $@
    	@echo "[ req_dn ]" >> $@
    	@echo "O = $(INTERMEDIATE_ORG)" >> $@
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Feb 20 08:51:56 UTC 2023
    - 3.6K bytes
    - Viewed (0)
  8. samples/certs/generate-workload.sh

    req_extensions = v3_req
    x509_extensions = v3_req
    prompt = no
    [req_distinguished_name]
    countryName = US
    [v3_req]
    keyUsage = critical, digitalSignature, keyEncipherment
    extendedKeyUsage = serverAuth, clientAuth
    basicConstraints = critical, CA:FALSE
    subjectAltName = critical, @alt_names
    [alt_names]
    URI = $san
    EOF
    
    certchain="$FINAL_DIR"/cert-chain.pem
    cacert="$FINAL_DIR"/ca-cert.pem
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Feb 07 23:57:35 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  9. staging/src/k8s.io/apiserver/plugin/pkg/authorizer/webhook/gencerts.sh

    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = serverAuth
    subjectAltName = @alt_names
    [alt_names]
    IP.1 = 127.0.0.1
    EOF
    
    cat > client.conf << EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Feb 23 02:28:04 UTC 2019
    - 3.4K bytes
    - Viewed (0)
  10. plugin/pkg/admission/imagepolicy/gencerts.sh

    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = serverAuth
    subjectAltName = @alt_names
    [alt_names]
    IP.1 = 127.0.0.1
    EOF
    
    cat > client.conf << EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Oct 10 14:59:09 UTC 2019
    - 3.5K bytes
    - Viewed (0)
Back to top