- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for verifyActions (0.3 sec)
-
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509.go
} // DefaultVerifyOptions returns VerifyOptions that use the system root certificates, current time, // and requires certificates to be valid for client auth (x509.ExtKeyUsageClientAuth) func DefaultVerifyOptions() x509.VerifyOptions { return x509.VerifyOptions{ KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 18 01:31:22 UTC 2023 - 10.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 23:23:03 UTC 2024 - 36.9K bytes - Viewed (0) -
src/crypto/x509/verify.go
// verified. Platform-specific verification needs the ASN.1 contents. var errNotParsed = errors.New("x509: missing ASN.1 contents; use ParseCertificate") // VerifyOptions contains parameters for Certificate.Verify. type VerifyOptions struct { // DNSName, if set, is checked against the leaf certificate with // Certificate.VerifyHostname or the platform verifier. DNSName string
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:58:39 UTC 2024 - 35.7K bytes - Viewed (0) -
pkg/kubeapiserver/authenticator/config.go
// Add the front proxy authenticator if requested if config.RequestHeaderConfig != nil { requestHeaderAuthenticator := headerrequest.NewDynamicVerifyOptionsSecure( config.RequestHeaderConfig.CAContentProvider.VerifyOptions, config.RequestHeaderConfig.AllowedClientNames, config.RequestHeaderConfig.UsernameHeaders, config.RequestHeaderConfig.GroupHeaders, config.RequestHeaderConfig.ExtraHeaderPrefixes, )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Mar 09 19:29:33 UTC 2024 - 15.4K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers.go
intermediatePool := x509.NewCertPool() for _, c := range intermediates { intermediatePool.AddCert(c) } verifyOptions := x509.VerifyOptions{ Roots: rootPool, Intermediates: intermediatePool, KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageAny}, } if _, err := cert.Verify(verifyOptions); err != nil { return err } return nil
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 25.5K bytes - Viewed (0) -
security/pkg/pki/util/keycertbundle.go
rcp := x509.NewCertPool() rcp.AppendCertsFromPEM(rootCertBytes) icp := x509.NewCertPool() icp.AppendCertsFromPEM(certChainBytes) opts := x509.VerifyOptions{ Intermediates: icp, Roots: rcp, } cert, err := ParsePemEncodedCertificate(certBytes) if err != nil { return fmt.Errorf("failed to parse cert PEM: %v", err) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jan 21 06:07:50 UTC 2024 - 10.5K bytes - Viewed (0) -
pkg/spiffe/spiffe.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 11.1K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
if err := c.config.EncryptedClientHelloRejectionVerify(c.connectionStateLocked()); err != nil { c.sendAlert(alertBadCertificate) return err } } else { opts := x509.VerifyOptions{ Roots: c.config.RootCAs, CurrentTime: c.config.time(), DNSName: c.serverName, Intermediates: x509.NewCertPool(), } for _, cert := range certs[1:] {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
src/crypto/x509/name_constraints_test.go
sans: []string{"uri:https://example.com/test"}, }, expectedError: "\"https://example.com/test\" is excluded", }, // #75: serverAuth in a leaf shouldn't permit clientAuth when requested in // VerifyOptions. { roots: make([]constraintsSpec, 1), intermediates: [][]constraintsSpec{ { {}, }, }, leaf: leafSpec{ sans: []string{"dns:example.com"},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 09 22:40:21 UTC 2024 - 45.2K bytes - Viewed (0) -
security/pkg/pki/util/generate_cert_test.go
t.Errorf("incorrect IDs encoded: %v, %v VS (expected) %v, %v", ids[0], ids[1], c.subjectIDs[0], c.subjectIDs[1]) } } pool := x509.NewCertPool() pool.AddCert(signingCert) vo := x509.VerifyOptions{ Roots: pool, } if _, err := out.Verify(vo); err != nil { t.Errorf("verification of the signed certificate failed %v", err) } } } func TestLoadSignerCredsFromFiles(t *testing.T) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 29.4K bytes - Viewed (0)