- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for ParseCertificates (0.34 sec)
-
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates_test.go
t.Errorf("%d - expected error %q, got: %v", i, test.errorString, err) } else { got := map[string]int{} for name, cert := range certMap { x509Certs, err := x509.ParseCertificates(cert.Certificate[0]) assert.NoError(t, err, "%d - invalid certificate for %q", i, name) assert.True(t, len(x509Certs) > 0, "%d - expected at least one x509 cert in tls cert for %q", i, name)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 8K bytes - Viewed (0) -
pkg/kubelet/certificate/transport_test.go
certificate, err := tls.X509KeyPair([]byte(certificatePEM), []byte(keyPEM)) if err != nil { panic(fmt.Sprintf("Unable to initialize certificate: %v", err)) } certs, err := x509.ParseCertificates(certificate.Certificate[0]) if err != nil { panic(fmt.Sprintf("Unable to initialize certificate leaf: %v", err)) } certificate.Leaf = certs[0] return &certificateData{ keyPEM: []byte(keyPEM),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 18 08:52:58 UTC 2020 - 7.8K bytes - Viewed (0) -
pilot/pkg/bootstrap/certcontroller.go
if err != nil { return fmt.Errorf("istiod loading x509 key pairs failed: %v", err) } for _, c := range keyPair.Certificate { x509Cert, err := x509.ParseCertificates(c) if err != nil { // This can rarely happen, just in case. return fmt.Errorf("x509 cert - ParseCertificates() error: %v", err) } for _, c := range x509Cert { log.Infof("x509 cert - Issuer: %q, Subject: %q, SN: %x, NotBefore: %q, NotAfter: %q",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 17:48:28 UTC 2024 - 11.3K bytes - Viewed (0) -
pkg/controller/certificates/cleaner/cleaner.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 15 03:26:08 UTC 2023 - 8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_test.go
if err != nil { return "", err } return certSignature(cert) } func certSignature(cert tls.Certificate) (string, error) { x509Certs, err := x509.ParseCertificates(cert.Certificate[0]) if err != nil { return "", err } return x509CertSignature(x509Certs[0]), nil } func fakeVersion() version.Info { return version.Info{ Major: "42",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 09 15:52:39 UTC 2024 - 13.8K bytes - Viewed (0) -
pkg/spiffe/spiffe.go
var blockBytes []byte // Loop while there are no block are found for block != nil { blockBytes = append(blockBytes, block.Bytes...) block, rest = pem.Decode(rest) } rootCAs, err := x509.ParseCertificates(blockBytes) if err != nil { spiffeLog.Errorf("parse certificate from rootPEM got error: %v", err) return fmt.Errorf("parse certificate from rootPEM got error: %v", err) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 11.1K bytes - Viewed (0) -
pilot/pkg/xds/sds.go
return res } func ValidateCertificate(data []byte) error { block, _ := pem.Decode(data) if block == nil { return fmt.Errorf("pem decode failed") } certs, err := x509.ParseCertificates(block.Bytes) if err != nil { return err } now := time.Now() for _, cert := range certs { // check if the certificate has expired if now.After(cert.NotAfter) || now.Before(cert.NotBefore) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 15 23:04:36 UTC 2024 - 15.8K bytes - Viewed (0) -
pkg/apis/certificates/validation/validation.go
} if len(block.Headers) != 0 { return fmt.Errorf("no PEM block headers are permitted") } blocks++ certs, err := x509.ParseCertificates(block.Bytes) if err != nil { return err } if len(certs) == 0 { return fmt.Errorf("found CERTIFICATE PEM block containing 0 certificates") } pemData = remainingData }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 03 18:40:49 UTC 2023 - 20.1K bytes - Viewed (0) -
src/crypto/x509/parser.go
} if len(der) != len(cert.Raw) { return nil, errors.New("x509: trailing data") } return cert, err } // ParseCertificates parses one or more certificates from the given ASN.1 DER // data. The certificates must be concatenated with no intermediate padding. func ParseCertificates(der []byte) ([]*Certificate, error) { var certs []*Certificate for len(der) > 0 { cert, err := parseCertificate(der)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 38.5K bytes - Viewed (0) -
src/crypto/x509/x509_test.go
if err != nil { t.Fatalf("VerifyHostname([::1]): %v", err) } } func TestCertificateParse(t *testing.T) { s, _ := base64.StdEncoding.DecodeString(certBytes) certs, err := ParseCertificates(s) if err != nil { t.Error(err) } if len(certs) != 2 { t.Errorf("Wrong number of certs: got %d want 2", len(certs)) return } err = certs[0].CheckSignatureFrom(certs[1])
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 163.4K bytes - Viewed (0)