Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 84 for keyUsages (0.14 sec)

  1. pkg/controller/certificates/authority/policies.go

    // certificates API ("pkg/apis/certificates".KeyUsage) to x509.KeyUsage and
    // x509.ExtKeyUsage types.
    func keyUsagesFromStrings(usages []capi.KeyUsage) (x509.KeyUsage, []x509.ExtKeyUsage, error) {
    	var keyUsage x509.KeyUsage
    	var unrecognized []capi.KeyUsage
    	extKeyUsages := make(map[x509.ExtKeyUsage]struct{})
    	for _, usage := range usages {
    		if val, ok := keyUsageDict[usage]; ok {
    			keyUsage |= val
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jul 26 17:14:05 UTC 2022
    - 5.7K bytes
    - Viewed (0)
  2. security/pkg/pki/util/generate_cert_test.go

    	if err != nil {
    		t.Fatal(err)
    	}
    
    	fields := &VerifyFields{
    		NotBefore:   caCertNotBefore,
    		TTL:         caCertTTL,
    		ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
    		KeyUsage:    x509.KeyUsageCertSign,
    		IsCA:        true,
    		Org:         "MyOrg",
    		Host:        host,
    	}
    	if VerifyCertificate(rsaCaPrivPem, rsaCaCertPem, rsaCaCertPem, fields) != nil {
    		t.Fatal(err)
    	}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 06 12:48:53 UTC 2023
    - 29.4K bytes
    - Viewed (0)
  3. pkg/controller/certificates/signer/signer_test.go

    	if err != nil {
    		t.Fatalf("failed to read CSR: %v", err)
    	}
    	x509cr, err := capihelper.ParseCSR(csrb)
    	if err != nil {
    		t.Fatalf("failed to parse CSR: %v", err)
    	}
    
    	certData, err := s.sign(x509cr, []capi.KeyUsage{
    		capi.UsageSigning,
    		capi.UsageKeyEncipherment,
    		capi.UsageServerAuth,
    		capi.UsageClientAuth,
    	},
    		// requesting a duration that is greater than TTL is ignored
    		csr.DurationToExpirationSeconds(3*time.Hour),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 02 21:12:04 UTC 2022
    - 15K bytes
    - Viewed (0)
  4. security/pkg/pki/util/verify_cert_test.go

    		TTL:  time.Duration(1),
    		Host: "spiffe://cluster.local/ns/default/sa/default",
    	}
    
    	keyUsage = &VerifyFields{
    		ExtKeyUsage: []x509.ExtKeyUsage{1, 2},
    		KeyUsage:    2,
    		Host:        "spiffe://cluster.local/ns/default/sa/default",
    	}
    
    	isCA = &VerifyFields{
    		ExtKeyUsage: []x509.ExtKeyUsage{1, 2},
    		KeyUsage:    5,
    		IsCA:        true,
    		Host:        "spiffe://cluster.local/ns/default/sa/default",
    	}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Aug 16 14:56:37 UTC 2022
    - 6.5K bytes
    - Viewed (0)
  5. src/crypto/tls/generate_cert.go

    	// KeyUsage bits set in the x509.Certificate template
    	keyUsage := x509.KeyUsageDigitalSignature
    	// Only RSA subject keys should have the KeyEncipherment KeyUsage bits set. In
    	// the context of TLS this KeyUsage is particular to RSA key exchange and
    	// authentication.
    	if _, isRSA := priv.(*rsa.PrivateKey); isRSA {
    		keyUsage |= x509.KeyUsageKeyEncipherment
    	}
    
    	var notBefore time.Time
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Aug 08 15:22:02 UTC 2022
    - 4.8K bytes
    - Viewed (0)
  6. tools/certs/common.mk

    	@echo "x509_extensions = req_ext" >> $@
    	@echo "distinguished_name = req_dn" >> $@
    	@echo "[ req_ext ]" >> $@
    	@echo "subjectKeyIdentifier = hash" >> $@
    	@echo "basicConstraints = critical, CA:true" >> $@
    	@echo "keyUsage = critical, digitalSignature, nonRepudiation, keyEncipherment, keyCertSign" >> $@
    	@echo "[ req_dn ]" >> $@
    	@echo "O = $(ROOTCA_ORG)" >> $@
    	@echo "CN = $(ROOTCA_CN)" >> $@
    
    %/intermediate.conf: L=$(dir $@)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Feb 20 08:51:56 UTC 2023
    - 3.6K bytes
    - Viewed (0)
  7. tests/testdata/certs/generate.sh

    set -ex
    
    touch "${WD}/index.txt"
    
    cat > "${WD}/client.conf" <<EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = clientAuth, serverAuth
    subjectAltName = @alt_names
    [alt_names]
    URI = spiffe://cluster.local/ns/default/sa/default
    EOF
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 05 19:49:21 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  8. pkg/apis/certificates/v1beta1/defaults.go

    	return certificates.IsKubeletServingCSR(req, usagesToSet(usages))
    }
    
    func IsKubeletClientCSR(req *x509.CertificateRequest, usages []certificatesv1beta1.KeyUsage) bool {
    	return certificates.IsKubeletClientCSR(req, usagesToSet(usages))
    }
    
    func usagesToSet(usages []certificatesv1beta1.KeyUsage) sets.String {
    	result := sets.NewString()
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 2.7K bytes
    - Viewed (0)
  9. staging/src/k8s.io/apiserver/pkg/util/webhook/gencerts.sh

    subjectKeyIdentifier=hash
    authorityKeyIdentifier=keyid:always,issuer
    basicConstraints = critical,CA:true
    keyUsage = cRLSign, keyCertSign
    EOF
    
    cat > server.conf << EOF
    [req]
    req_extensions = v3_req
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    [ v3_req ]
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    extendedKeyUsage = clientAuth, serverAuth
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 25 15:57:40 UTC 2022
    - 5.7K bytes
    - Viewed (0)
  10. security/pkg/pki/util/generate_cert.go

    ) {
    	subjectIDsInString := strings.Join(subjectIDs, ",")
    	var keyUsage x509.KeyUsage
    	extKeyUsages := []x509.ExtKeyUsage{}
    	if isCA {
    		// If the cert is a CA cert, the private key is allowed to sign other certificates.
    		keyUsage = x509.KeyUsageCertSign
    	} else {
    		// Otherwise the private key is allowed for digital signature and key encipherment.
    		keyUsage = x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Aug 02 14:34:38 UTC 2023
    - 14.2K bytes
    - Viewed (0)
Back to top