Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 78 for dnsNames (0.15 sec)

  1. src/crypto/tls/generate_cert.go

    	}
    
    	hosts := strings.Split(*host, ",")
    	for _, h := range hosts {
    		if ip := net.ParseIP(h); ip != nil {
    			template.IPAddresses = append(template.IPAddresses, ip)
    		} else {
    			template.DNSNames = append(template.DNSNames, h)
    		}
    	}
    
    	if *isCA {
    		template.IsCA = true
    		template.KeyUsage |= x509.KeyUsageCertSign
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Aug 08 15:22:02 UTC 2022
    - 4.8K bytes
    - Viewed (0)
  2. src/crypto/x509/parser.go

    			}
    			emailAddresses = append(emailAddresses, email)
    		case nameTypeDNS:
    			name := string(data)
    			if err := isIA5String(name); err != nil {
    				return errors.New("x509: SAN dNSName is malformed")
    			}
    			dnsNames = append(dnsNames, string(name))
    		case nameTypeURI:
    			uriStr := string(data)
    			if err := isIA5String(uriStr); err != nil {
    				return errors.New("x509: SAN uniformResourceIdentifier is malformed")
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:00:16 UTC 2024
    - 38.5K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/phases/certs/certs_test.go

    	if csr.Subject.CommonName != certConfig.CommonName {
    		t.Errorf("expected common name %q, got %q", certConfig.CommonName, csr.Subject.CommonName)
    	}
    
    	assert.ElementsMatch(t, certConfig.AltNames.DNSNames, csr.DNSNames, "dns names not equal")
    
    	assert.Len(t, csr.IPAddresses, len(certConfig.AltNames.IPs))
    
    	for i, ip := range csr.IPAddresses {
    		if !ip.Equal(certConfig.AltNames.IPs[i]) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 31 21:49:21 UTC 2024
    - 23.3K bytes
    - Viewed (0)
  4. staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/util.go

    	}
    
    	validServingNames := []string{}
    	for _, ip := range certificate.IPAddresses {
    		validServingNames = append(validServingNames, ip.String())
    	}
    	validServingNames = append(validServingNames, certificate.DNSNames...)
    	servingString := ""
    	if len(validServingNames) > 0 {
    		servingString = fmt.Sprintf(" validServingFor=[%s]", strings.Join(validServingNames, ","))
    	}
    
    	groupString := ""
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jul 21 07:29:30 UTC 2022
    - 2.1K bytes
    - Viewed (0)
  5. src/crypto/x509/boring_test.go

    		ExtKeyUsage:           []ExtKeyUsage{ExtKeyUsageServerAuth, ExtKeyUsageClientAuth},
    		BasicConstraintsValid: true,
    	}
    	if mode&^boringCertFIPSOK == boringCertLeaf {
    		tmpl.DNSNames = []string{"example.com"}
    	} else {
    		tmpl.IsCA = true
    		tmpl.KeyUsage |= KeyUsageCertSign
    	}
    
    	var pcert *Certificate
    	var pkey interface{}
    	if parent != nil {
    		pcert = parent.cert
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Nov 17 17:38:47 UTC 2022
    - 3.7K bytes
    - Viewed (0)
  6. src/crypto/x509/x509.go

    	// Subject Alternate Name values. (Note that these values may not be valid
    	// if invalid values were contained within a parsed certificate. For
    	// example, an element of DNSNames may not be a valid DNS domain name.)
    	DNSNames       []string
    	EmailAddresses []string
    	IPAddresses    []net.IP
    	URIs           []*url.URL
    
    	// Name constraints
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 09:20:15 UTC 2024
    - 82K bytes
    - Viewed (0)
  7. cmd/kubeadm/app/cmd/phases/init/certs.go

    	if err != nil {
    		return ""
    	}
    
    	if len(certConfig.AltNames.DNSNames) == 0 && len(certConfig.AltNames.IPs) == 0 {
    		return ""
    	}
    	// This mutates the certConfig, but we're throwing it after we construct the command anyway
    	sans := []string{}
    
    	for _, dnsName := range certConfig.AltNames.DNSNames {
    		if dnsName != "" {
    			sans = append(sans, dnsName)
    		}
    	}
    
    	for _, ip := range certConfig.AltNames.IPs {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 08 06:35:45 UTC 2024
    - 9.8K bytes
    - Viewed (0)
  8. security/pkg/pki/util/generate_cert_test.go

    				SignatureAlgorithm: x509.SHA256WithRSA,
    				DNSNames:           []string{"name_in_csr"},
    				Version:            3,
    			},
    		},
    		{
    			name:       "Two subject IDs",
    			subjectIDs: []string{"spiffe://test.com/abc/def", "test.com"},
    			signeeKey:  rsaSigneeKey,
    			csrTemplate: &x509.CertificateRequest{
    				SignatureAlgorithm: x509.SHA256WithRSA,
    				DNSNames:           []string{"name_in_csr"},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 06 12:48:53 UTC 2023
    - 29.4K bytes
    - Viewed (0)
  9. src/crypto/x509/name_constraints_test.go

    	parse := func(constraints []string) (dnsNames []string, ips []*net.IPNet, emailAddrs []string, uriDomains []string, err error) {
    		for _, constraint := range constraints {
    			switch {
    			case strings.HasPrefix(constraint, "dns:"):
    				dnsNames = append(dnsNames, constraint[4:])
    
    			case strings.HasPrefix(constraint, "ip:"):
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 09 22:40:21 UTC 2024
    - 45.2K bytes
    - Viewed (0)
  10. staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go

    	// don't use the CN if it is a valid IP because our IP serving detection may unexpectedly use it to terminate the connection.
    	if !cnIsIP && cnIsValidDomain {
    		names = append(names, cn)
    	}
    	names = append(names, cert.DNSNames...)
    	// intentionally all IPs in the cert are ignored as SNI forbids passing IPs
    	// to select a cert. Before go 1.6 the tls happily passed IPs as SNI values.
    
    	return names
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jul 21 07:29:30 UTC 2022
    - 3.2K bytes
    - Viewed (0)
Back to top