- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 425 for x509 (0.1 sec)
-
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509.go
} } return fmt.Errorf("x509: subject with cn=%s is not in the allowed list", subject.CommonName) } // DefaultVerifyOptions returns VerifyOptions that use the system root certificates, current time, // and requires certificates to be valid for client auth (x509.ExtKeyUsageClientAuth) func DefaultVerifyOptions() x509.VerifyOptions { return x509.VerifyOptions{ KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 18 01:31:22 UTC 2023 - 10.3K bytes - Viewed (0) -
src/crypto/x509/x509.go
if template == nil { return nil, errors.New("x509: template can not be nil") } if issuer == nil { return nil, errors.New("x509: issuer can not be nil") } if (issuer.KeyUsage & KeyUsageCRLSign) == 0 { return nil, errors.New("x509: issuer must have the crlSign key usage bit set") } if len(issuer.SubjectKeyId) == 0 { return nil, errors.New("x509: issuer certificate doesn't contain a subject key identifier")
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 09:20:15 UTC 2024 - 82K bytes - Viewed (0) -
pkg/controller/certificates/authority/policies_test.go
expectErr: false, }, { usages: []capi.KeyUsage{"cert sign", "encipher only"}, expectedKeyUsage: x509.KeyUsageCertSign | x509.KeyUsageEncipherOnly, expectedExtKeyUsage: nil, expectErr: false, }, { usages: []capi.KeyUsage{"ocsp signing", "crl sign", "s/mime", "content commitment"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 05 22:45:34 UTC 2020 - 2.6K bytes - Viewed (0) -
pkg/test/csrctrl/authority/policies.go
capi.UsageCRLSign: x509.KeyUsageCRLSign, capi.UsageEncipherOnly: x509.KeyUsageEncipherOnly, capi.UsageDecipherOnly: x509.KeyUsageDecipherOnly, } var extKeyUsageDict = map[capi.KeyUsage]x509.ExtKeyUsage{ capi.UsageAny: x509.ExtKeyUsageAny, capi.UsageServerAuth: x509.ExtKeyUsageServerAuth, capi.UsageClientAuth: x509.ExtKeyUsageClientAuth, capi.UsageCodeSigning: x509.ExtKeyUsageCodeSigning,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Aug 03 17:06:22 UTC 2022 - 4.5K bytes - Viewed (0) -
security/pkg/pki/util/generate_cert_test.go
IsClient: true, IsServer: true, RSAKeySize: 2048, }, verifyFields: &VerifyFields{ ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth}, IsCA: false, KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment, NotBefore: notBefore, TTL: ttl, Org: "MyOrg", }, },
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 29.4K bytes - Viewed (0) -
pkg/controller/certificates/authority/policies.go
capi.UsageCRLSign: x509.KeyUsageCRLSign, capi.UsageEncipherOnly: x509.KeyUsageEncipherOnly, capi.UsageDecipherOnly: x509.KeyUsageDecipherOnly, } var extKeyUsageDict = map[capi.KeyUsage]x509.ExtKeyUsage{ capi.UsageAny: x509.ExtKeyUsageAny, capi.UsageServerAuth: x509.ExtKeyUsageServerAuth, capi.UsageClientAuth: x509.ExtKeyUsageClientAuth,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 26 17:14:05 UTC 2022 - 5.7K bytes - Viewed (0) -
src/crypto/x509/pkcs8.go
} var curvePrivateKey []byte if _, err := asn1.Unmarshal(privKey.PrivateKey, &curvePrivateKey); err != nil { return nil, fmt.Errorf("x509: invalid X25519 private key: %v", err) } return ecdh.X25519().NewPrivateKey(curvePrivateKey) default: return nil, fmt.Errorf("x509: PKCS#8 wrapping contained private key with unknown algorithm: %v", privKey.Algo.Algorithm) } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 5.8K bytes - Viewed (0) -
pkg/controller/certificates/authority/authority_test.go
} now := time.Now() nowFunc := func() time.Time { return now } tmpl := &x509.Certificate{ SerialNumber: big.NewInt(42), Subject: pkix.Name{ CommonName: "test-ca", }, NotBefore: now.Add(-24 * time.Hour), NotAfter: now.Add(24 * time.Hour), KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign, BasicConstraintsValid: true,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 23 19:36:11 UTC 2021 - 7.3K bytes - Viewed (0) -
src/crypto/x509/parser.go
return nil, errors.New("x509: invalid RDNSequence: invalid attribute") } var attr pkix.AttributeTypeAndValue if !atav.ReadASN1ObjectIdentifier(&attr.Type) { return nil, errors.New("x509: invalid RDNSequence: invalid attribute type") } var rawValue cryptobyte.String var valueTag cryptobyte_asn1.Tag if !atav.ReadAnyASN1(&rawValue, &valueTag) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 38.5K bytes - Viewed (0) -
security/pkg/pki/util/generate_cert.go
func genCertTemplateFromCSR(csr *x509.CertificateRequest, subjectIDs []string, ttl time.Duration, isCA bool) ( *x509.Certificate, error, ) { subjectIDsInString := strings.Join(subjectIDs, ",") var keyUsage x509.KeyUsage extKeyUsages := []x509.ExtKeyUsage{} if isCA { // If the cert is a CA cert, the private key is allowed to sign other certificates. keyUsage = x509.KeyUsageCertSign } else {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Aug 02 14:34:38 UTC 2023 - 14.2K bytes - Viewed (0)