- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 42 for IsCA (0.04 sec)
-
src/crypto/tls/boring_test.go
BasicConstraintsValid: true, } if mode&^boringCertFIPSOK == boringCertLeaf { tmpl.DNSNames = []string{"example.com"} } else { tmpl.IsCA = true tmpl.KeyUsage |= x509.KeyUsageCertSign } var pcert *x509.Certificate var pkey interface{} if parent != nil { pcert = parent.cert pkey = parent.key } else { pcert = tmpl
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 19.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/certlist.go
if err == nil { // Validate period CheckCertificatePeriodValidity(ca.BaseName, caCert) // Cert exists already, make sure it's valid if !caCert.IsCA { return errors.Errorf("certificate %q is not a CA", ca.Name) } // Try and load a CA Key caKey, err = pkiutil.TryLoadKeyFromDisk(ic.CertificatesDir, ca.BaseName) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 15.8K bytes - Viewed (0) -
src/crypto/x509/name_constraints_test.go
CommonName: name, }, NotBefore: time.Unix(1000, 0), NotAfter: time.Unix(2000, 0), KeyUsage: KeyUsageCertSign, BasicConstraintsValid: true, IsCA: true, } if err := addConstraintsToTemplate(constraints, template); err != nil { return nil, err } if parent == nil { parent = template }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 09 22:40:21 UTC 2024 - 45.2K bytes - Viewed (0) -
pkg/apis/certificates/validation/validation.go
cert, err := x509.ParseCertificate(b.Bytes) if err != nil { allErrors = append(allErrors, field.Invalid(path, "<value omitted>", fmt.Sprintf("entry %d does not parse as X.509", i))) continue } if !cert.IsCA { allErrors = append(allErrors, field.Invalid(path, "<value omitted>", fmt.Sprintf("entry %d does not have the CA bit set", i))) continue } if !cert.BasicConstraintsValid {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 03 18:40:49 UTC 2023 - 20.1K bytes - Viewed (0) -
pkg/kubelet/clustertrustbundle/clustertrustbundle_manager_test.go
if err != nil { t.Fatalf("Error while generating key: %v", err) } template := &x509.Certificate{ SerialNumber: big.NewInt(0), Subject: pkix.Name{ CommonName: cn, }, IsCA: true, BasicConstraintsValid: true, } cert, err := x509.CreateCertificate(rand.Reader, template, template, pub, priv) if err != nil { t.Fatalf("Error while making certificate: %v", err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 03 18:40:48 UTC 2023 - 15.5K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers_test.go
CommonName: "Root CA 1", }, EncryptionAlgorithm: kubeadmapi.EncryptionAlgorithmRSA2048, }) if err != nil { panic(fmt.Sprintf("Failed generating Root CA: %v", err)) } if !rootCACert.IsCA { panic("rootCACert is not a valid CA") } servCert, servKey, err = NewCertAndKey(rootCACert, rootCAKey, &CertConfig{ Config: certutil.Config{ CommonName: "kubernetes",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 22.5K bytes - Viewed (0) -
pkg/volume/projected/projected_test.go
if err != nil { t.Fatalf("Error while generating key: %v", err) } template := &x509.Certificate{ SerialNumber: big.NewInt(0), Subject: pkix.Name{ CommonName: cn, }, IsCA: true, BasicConstraintsValid: true, } cert, err := x509.CreateCertificate(rand.Reader, template, template, pub, priv) if err != nil { t.Fatalf("Error while making certificate: %v", err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 03 18:40:48 UTC 2023 - 40.5K bytes - Viewed (0) -
cmd/sts-handlers.go
// whether they client has sent exactly one (non-CA) leaf certificate. peerCertificates := make([]*x509.Certificate, 0, len(r.TLS.PeerCertificates)) for _, cert := range r.TLS.PeerCertificates { if cert.IsCA { continue } peerCertificates = append(peerCertificates, cert) } r.TLS.PeerCertificates = peerCertificates // Now, we have to check that the client has provided exactly one leaf
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue Jun 11 03:13:30 UTC 2024 - 33.9K bytes - Viewed (0) -
src/crypto/x509/verify.go
// keyUsage, and a keyUsage containing a flag indicating that the RSA // encryption key could only be used for Diffie-Hellman key agreement. if certType == intermediateCertificate && (!c.BasicConstraintsValid || !c.IsCA) { return CertificateInvalidError{c, NotAuthorizedToSign, ""} } if c.BasicConstraintsValid && c.MaxPathLen >= 0 { numIntermediates := len(currentChain) - 1 if numIntermediates > c.MaxPathLen {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:58:39 UTC 2024 - 35.7K bytes - Viewed (0) -
cmd/test-utils_test.go
if ip := net.ParseIP(h); ip != nil { template.IPAddresses = append(template.IPAddresses, ip) } else { template.DNSNames = append(template.DNSNames, h) } } template.IsCA = true template.KeyUsage |= x509.KeyUsageCertSign derBytes, err := x509.CreateCertificate(crand.Reader, &template, &template, publicKey(priv), priv) if err != nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Mon Jun 10 15:50:49 UTC 2024 - 76.9K bytes - Viewed (0)