Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 38 for VerifyOptions (0.19 sec)

  1. src/crypto/x509/verify_test.go

    	if block == nil {
    		return nil, errors.New("failed to decode PEM")
    	}
    	return ParseCertificate(block.Bytes)
    }
    
    func testVerify(t *testing.T, test verifyTest, useSystemRoots bool) {
    	opts := VerifyOptions{
    		Intermediates: NewCertPool(),
    		DNSName:       test.dnsName,
    		CurrentTime:   time.Unix(test.currentTime, 0),
    		KeyUsages:     test.keyUsages,
    	}
    
    	if !useSystemRoots {
    		opts.Roots = NewCertPool()
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:00:11 UTC 2024
    - 110.2K bytes
    - Viewed (0)
  2. src/crypto/x509/hybrid_pool_test.go

    	if err != nil {
    		t.Fatalf("failed to parse test cert: %s", err)
    	}
    
    	pool, err := x509.SystemCertPool()
    	if err != nil {
    		t.Fatalf("SystemCertPool failed: %s", err)
    	}
    	opts := x509.VerifyOptions{Roots: pool}
    
    	_, err = googChain[0].Verify(opts)
    	if err != nil {
    		t.Fatalf("verification failed for google.com chain (system only pool): %s", err)
    	}
    
    	pool.AddCert(root)
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Feb 26 20:48:11 UTC 2024
    - 3.7K bytes
    - Viewed (0)
  3. pkg/kubeapiserver/authenticator/config.go

    	// Add the front proxy authenticator if requested
    	if config.RequestHeaderConfig != nil {
    		requestHeaderAuthenticator := headerrequest.NewDynamicVerifyOptionsSecure(
    			config.RequestHeaderConfig.CAContentProvider.VerifyOptions,
    			config.RequestHeaderConfig.AllowedClientNames,
    			config.RequestHeaderConfig.UsernameHeaders,
    			config.RequestHeaderConfig.GroupHeaders,
    			config.RequestHeaderConfig.ExtraHeaderPrefixes,
    		)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 09 19:29:33 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  4. cmd/kubeadm/app/util/pkiutil/pki_helpers.go

    	intermediatePool := x509.NewCertPool()
    	for _, c := range intermediates {
    		intermediatePool.AddCert(c)
    	}
    
    	verifyOptions := x509.VerifyOptions{
    		Roots:         rootPool,
    		Intermediates: intermediatePool,
    		KeyUsages:     []x509.ExtKeyUsage{x509.ExtKeyUsageAny},
    	}
    
    	if _, err := cert.Verify(verifyOptions); err != nil {
    		return err
    	}
    
    	return nil
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  5. security/pkg/k8s/chiron/utils.go

    	}
    	intermediates := x509.NewCertPool()
    	if len(certsParsed) > 1 {
    		for _, cert := range certsParsed[1:] {
    			intermediates.AddCert(cert)
    		}
    	}
    	_, err = certsParsed[0].Verify(x509.VerifyOptions{
    		Roots:         roots,
    		Intermediates: intermediates,
    	})
    	if err != nil {
    		return nil, nil, fmt.Errorf("failed to verify the certificate chain: %v", err)
    	}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 05 18:11:22 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  6. cmd/kubeadm/app/phases/certs/certlist_test.go

    	daughterCert, _ := parseCertAndKey(filepath.Join(dir, "test-daughter"), t)
    
    	pool := x509.NewCertPool()
    	pool.AddCert(caCert)
    
    	_, err = daughterCert.Verify(x509.VerifyOptions{
    		DNSName:   "test-domain.space",
    		Roots:     pool,
    		KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
    	})
    	if err != nil {
    		t.Errorf("couldn't verify daughter cert: %v", err)
    	}
    
    }
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  7. security/pkg/pki/util/keycertbundle.go

    	rcp := x509.NewCertPool()
    	rcp.AppendCertsFromPEM(rootCertBytes)
    
    	icp := x509.NewCertPool()
    	icp.AppendCertsFromPEM(certChainBytes)
    
    	opts := x509.VerifyOptions{
    		Intermediates: icp,
    		Roots:         rcp,
    	}
    	cert, err := ParsePemEncodedCertificate(certBytes)
    	if err != nil {
    		return fmt.Errorf("failed to parse cert PEM: %v", err)
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Jan 21 06:07:50 UTC 2024
    - 10.5K bytes
    - Viewed (0)
  8. pkg/spiffe/spiffe.go

    	if err != nil {
    		return err
    	}
    	rootCertPool, ok := v.certPools[trustDomain]
    	if !ok {
    		return fmt.Errorf("no cert pool found for trust domain %s", trustDomain)
    	}
    
    	_, err = peerCert.Verify(x509.VerifyOptions{
    		Roots:         rootCertPool,
    		Intermediates: intCertPool,
    	})
    	return err
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  9. src/crypto/tls/handshake_client.go

    			if err := c.config.EncryptedClientHelloRejectionVerify(c.connectionStateLocked()); err != nil {
    				c.sendAlert(alertBadCertificate)
    				return err
    			}
    		} else {
    			opts := x509.VerifyOptions{
    				Roots:         c.config.RootCAs,
    				CurrentTime:   c.config.time(),
    				DNSName:       c.serverName,
    				Intermediates: x509.NewCertPool(),
    			}
    
    			for _, cert := range certs[1:] {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  10. src/crypto/x509/name_constraints_test.go

    			sans: []string{"uri:https://example.com/test"},
    		},
    		expectedError: "\"https://example.com/test\" is excluded",
    	},
    
    	// #75: serverAuth in a leaf shouldn't permit clientAuth when requested in
    	// VerifyOptions.
    	{
    		roots: make([]constraintsSpec, 1),
    		intermediates: [][]constraintsSpec{
    			{
    				{},
    			},
    		},
    		leaf: leafSpec{
    			sans: []string{"dns:example.com"},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 09 22:40:21 UTC 2024
    - 45.2K bytes
    - Viewed (0)
Back to top