Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 425 for x509 (0.04 sec)

  1. cmd/kubeadm/app/componentconfigs/kubelet_windows_test.go

    				Authentication: kubeletconfig.KubeletAuthentication{
    					X509: kubeletconfig.KubeletX509Authentication{
    						ClientCAFile: "/foo/ca.crt",
    					},
    				},
    			},
    			expected: &kubeletconfig.KubeletConfiguration{
    				ResolverConfig: ptr.To(""),
    				StaticPodPath:  filepath.Join(drive, "/foo/staticpods"),
    				Authentication: kubeletconfig.KubeletAuthentication{
    					X509: kubeletconfig.KubeletX509Authentication{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 25 10:26:46 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  2. api/go1.19.txt

    pkg crypto/x509, func ParseRevocationList([]uint8) (*RevocationList, error) #50674
    pkg crypto/x509, method (*CertPool) Clone() *CertPool #35044
    pkg crypto/x509, method (*CertPool) Equal(*CertPool) bool #46057
    pkg crypto/x509, method (*RevocationList) CheckSignatureFrom(*Certificate) error #50674
    pkg crypto/x509, type RevocationList struct, AuthorityKeyId []uint8 #50674
    pkg crypto/x509, type RevocationList struct, Extensions []pkix.Extension #50674
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Dec 02 16:29:41 UTC 2022
    - 17.9K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/authentication/request/x509/doc.go

    See the License for the specific language governing permissions and
    limitations under the License.
    */
    
    // Package x509 provides a request authenticator that validates and
    // extracts user information from client certificates
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 11 20:20:36 UTC 2017
    - 767 bytes
    - Viewed (0)
  4. src/crypto/tls/example_test.go

    		ClientAuth: tls.RequireAnyClientCert,
    		VerifyConnection: func(cs tls.ConnectionState) error {
    			opts := x509.VerifyOptions{
    				DNSName:       cs.ServerName,
    				Intermediates: x509.NewCertPool(),
    				KeyUsages:     []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
    			}
    			for _, cert := range cs.PeerCertificates[1:] {
    				opts.Intermediates.AddCert(cert)
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 27 18:23:49 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  5. security/pkg/pki/util/generate_csr.go

    // limitations under the License.
    
    // Provides utility methods to generate X.509 certificates with different
    // options. This implementation is Largely inspired from
    // https://golang.org/src/crypto/tls/generate_cert.go.
    
    package util
    
    import (
    	"crypto"
    	"crypto/ecdsa"
    	"crypto/elliptic"
    	"crypto/rand"
    	"crypto/rsa"
    	"crypto/x509"
    	"crypto/x509/pkix"
    	"errors"
    	"fmt"
    	"os"
    	"strings"
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 06 12:48:53 UTC 2023
    - 4.1K bytes
    - Viewed (0)
  6. api/go1.10.txt

    pkg crypto/x509, const NameConstraintsWithoutSANs InvalidReason
    pkg crypto/x509, const TooManyConstraints = 8
    pkg crypto/x509, const TooManyConstraints InvalidReason
    pkg crypto/x509, const UnconstrainedName = 7
    pkg crypto/x509, const UnconstrainedName InvalidReason
    pkg crypto/x509, func MarshalPKCS1PublicKey(*rsa.PublicKey) []uint8
    pkg crypto/x509, func MarshalPKCS8PrivateKey(interface{}) ([]uint8, error)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Feb 06 05:00:01 UTC 2018
    - 30.1K bytes
    - Viewed (0)
  7. security/pkg/pki/util/verify_cert.go

    package util
    
    import (
    	"crypto/ecdsa"
    	"crypto/rsa"
    	"crypto/x509"
    	"fmt"
    	"os"
    	"reflect"
    	"sort"
    	"strings"
    	"time"
    )
    
    // VerifyFields contains the certificate fields to verify in the test.
    type VerifyFields struct {
    	NotBefore   time.Time
    	TTL         time.Duration // NotAfter - NotBefore
    	ExtKeyUsage []x509.ExtKeyUsage
    	KeyUsage    x509.KeyUsage
    	IsCA        bool
    	Org         string
    	CommonName  string
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Sep 05 10:37:29 UTC 2022
    - 5.9K bytes
    - Viewed (0)
  8. src/crypto/x509/pem_decrypt.go

    	dek, ok := b.Headers["DEK-Info"]
    	if !ok {
    		return nil, errors.New("x509: no DEK-Info header in block")
    	}
    
    	mode, hexIV, ok := strings.Cut(dek, ",")
    	if !ok {
    		return nil, errors.New("x509: malformed DEK-Info header")
    	}
    
    	ciph := cipherByName(mode)
    	if ciph == nil {
    		return nil, errors.New("x509: unknown encryption mode")
    	}
    	iv, err := hex.DecodeString(hexIV)
    	if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 7.2K bytes
    - Viewed (0)
  9. pkg/webhooks/util/util.go

    		return errors.New("could not decode pem")
    	}
    	if block.Type != "CERTIFICATE" {
    		return fmt.Errorf("cert contains wrong pem type: %q", block.Type)
    	}
    	if _, err := x509.ParseCertificate(block.Bytes); err != nil {
    		return fmt.Errorf("cert contains invalid x509 certificate: %v", err)
    	}
    	return nil
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 14 17:33:33 UTC 2022
    - 1.5K bytes
    - Viewed (0)
  10. src/crypto/x509/example_test.go

    	// default root set of the current operating system.
    	roots := x509.NewCertPool()
    	ok := roots.AppendCertsFromPEM([]byte(rootPEM))
    	if !ok {
    		panic("failed to parse root certificate")
    	}
    
    	block, _ := pem.Decode([]byte(certPEM))
    	if block == nil {
    		panic("failed to parse certificate PEM")
    	}
    	cert, err := x509.ParseCertificate(block.Bytes)
    	if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jul 29 16:52:01 UTC 2019
    - 5.3K bytes
    - Viewed (0)
Back to top