Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 62 for certRoot (0.37 sec)

  1. src/crypto/x509/root_test.go

    	systemRootsPool()
    	if systemRoots != nil {
    		originalSystemRoots := *systemRoots
    		defer func() { systemRoots = &originalSystemRoots }()
    	}
    
    	tests := []struct {
    		name            string
    		systemRoots     *CertPool
    		systemPool      bool
    		poolContent     []*Certificate
    		forceFallback   bool
    		returnsFallback bool
    	}{
    		{
    			name:            "nil systemRoots",
    			returnsFallback: true,
    		},
    		{
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Nov 18 23:57:10 UTC 2022
    - 2.6K bytes
    - Viewed (0)
  2. src/crypto/x509/root_unix.go

    	certDirEnv = "SSL_CERT_DIR"
    )
    
    func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
    	return nil, nil
    }
    
    func loadSystemRoots() (*CertPool, error) {
    	roots := NewCertPool()
    
    	files := certFiles
    	if f := os.Getenv(certFileEnv); f != "" {
    		files = []string{f}
    	}
    
    	var firstErr error
    	for _, file := range files {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Apr 11 20:54:07 UTC 2023
    - 2.7K bytes
    - Viewed (0)
  3. api/go1.19.txt

    pkg crypto/x509, func ParseRevocationList([]uint8) (*RevocationList, error) #50674
    pkg crypto/x509, method (*CertPool) Clone() *CertPool #35044
    pkg crypto/x509, method (*CertPool) Equal(*CertPool) bool #46057
    pkg crypto/x509, method (*RevocationList) CheckSignatureFrom(*Certificate) error #50674
    pkg crypto/x509, type RevocationList struct, AuthorityKeyId []uint8 #50674
    pkg crypto/x509, type RevocationList struct, Extensions []pkix.Extension #50674
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Dec 02 16:29:41 UTC 2022
    - 17.9K bytes
    - Viewed (0)
  4. src/net/http/httptest/server.go

    	if err != nil {
    		panic(fmt.Sprintf("httptest: NewTLSServer: %v", err))
    	}
    	certpool := x509.NewCertPool()
    	certpool.AddCert(s.certificate)
    	s.client.Transport = &http.Transport{
    		TLSClientConfig: &tls.Config{
    			RootCAs: certpool,
    		},
    		ForceAttemptHTTP2: s.EnableHTTP2,
    	}
    	s.Listener = tls.NewListener(s.Listener, s.TLS)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 10 17:26:10 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  5. src/cmd/vendor/github.com/google/pprof/internal/transport/transport.go

    	"fmt"
    	"net/http"
    	"os"
    	"sync"
    
    	"github.com/google/pprof/internal/plugin"
    )
    
    type transport struct {
    	cert       *string
    	key        *string
    	ca         *string
    	caCertPool *x509.CertPool
    	certs      []tls.Certificate
    	initOnce   sync.Once
    	initErr    error
    }
    
    const extraUsage = `    -tls_cert             TLS client certificate file for fetching profile and symbols
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Nov 22 18:58:12 UTC 2022
    - 3.8K bytes
    - Viewed (0)
  6. internal/config/etcd/etcd.go

    func Enabled(kvs config.KVS) bool {
    	endpoints := kvs.Get(Endpoints)
    	return endpoints != ""
    }
    
    // LookupConfig - Initialize new etcd config.
    func LookupConfig(kvs config.KVS, rootCAs *x509.CertPool) (Config, error) {
    	cfg := Config{}
    	if err := config.CheckValidKeys(config.EtcdSubSys, kvs, DefaultKVS); err != nil {
    		return cfg, err
    	}
    
    	endpoints := env.Get(EnvEtcdEndpoints, kvs.Get(Endpoints))
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  7. src/crypto/x509/root_unix_test.go

    		t.Fatalf("Invalid number of subjects: got %d want %d", g, w)
    	}
    
    	wantPool := NewCertPool()
    	for _, certPEM := range rootPEMs {
    		wantPool.AppendCertsFromPEM([]byte(certPEM))
    	}
    	strCertPool := func(p *CertPool) string {
    		return string(bytes.Join(p.Subjects(), []byte("\n")))
    	}
    
    	if !certPoolEqual(gotPool, wantPool) {
    		g, w := strCertPool(gotPool), strCertPool(wantPool)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 01 00:36:38 UTC 2023
    - 6.1K bytes
    - Viewed (0)
  8. internal/http/transports.go

    	LookupHost  LookupHost  // Custom lookupHost, is nil on containerized deployments.
    	DialTimeout time.Duration
    
    	// TLS Settings
    	RootCAs          *x509.CertPool
    	CipherSuites     []uint16
    	CurvePreferences []tls.CurveID
    
    	// HTTP2
    	EnableHTTP2 bool
    
    	// TCP Options
    	TCPOptions TCPOptions
    }
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 6K bytes
    - Viewed (0)
  9. internal/config/identity/ldap/config.go

    func Enabled(kvs config.KVS) bool {
    	return kvs.Get(ServerAddr) != ""
    }
    
    // Lookup - initializes LDAP config, overrides config, if any ENV values are set.
    func Lookup(s config.Config, rootCAs *x509.CertPool) (l Config, err error) {
    	l = Config{}
    
    	// Purge all removed keys first
    	kvs := s[config.IdentityLDAPSubSys][config.Default]
    	if len(kvs) > 0 {
    		for _, k := range removedKeys {
    			kvs.Delete(k)
    		}
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 8.1K bytes
    - Viewed (0)
  10. src/crypto/tls/boring_test.go

    	L2_I := boringCert(t, "L2_I", boringRSAKey(t, 1024), I_R1, boringCertLeaf)
    
    	// client verifying server cert
    	testServerCert := func(t *testing.T, desc string, pool *x509.CertPool, key interface{}, list [][]byte, ok bool) {
    		clientConfig := testConfig.Clone()
    		clientConfig.RootCAs = pool
    		clientConfig.InsecureSkipVerify = false
    		clientConfig.ServerName = "example.com"
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 19.4K bytes
    - Viewed (0)
Back to top