/dports/lang/mono/mono-5.10.1.57/mcs/class/Mono.Security/Test/Mono.Security.X509.Extensions/ |
H A D | SubjectAltNameExtensionTest.cs | 75 Assert.AreEqual (sane_test.DNSNames.Length, 2, "DNSName count"); in SubjectAltNameGenerator() 78 Assert.AreEqual (sane_test.DNSNames[1], "two", "DNSName test"); in SubjectAltNameGenerator() 90 Assert.AreEqual (sane_test.DNSNames.Length, 0, "DNSName count"); in ThirdPartyCertificateParse() 169 Assert.AreEqual (4, sane.DNSNames.Length, "Count"); in MultipleEntriesInExtension() 170 Assert.AreEqual ("www.arzneimittel-bestellcenter.de", sane.DNSNames [0], "0"); in MultipleEntriesInExtension() 171 Assert.AreEqual ("www.xnet-arzneimittel-bestellcenter.de", sane.DNSNames [1], "1"); in MultipleEntriesInExtension() 172 Assert.AreEqual ("www.adg-arzneimittel-bestellcenter.de", sane.DNSNames [2], "2"); in MultipleEntriesInExtension() 173 Assert.AreEqual ("www.a3000-filialapotheke.de", sane.DNSNames [3], "3"); in MultipleEntriesInExtension() 181 Assert.AreEqual ("www.arzneimittel-bestellcenter.de", sane.DNSNames [0], "0"); in MultipleEntriesInExtension_AsASN1() 183 Assert.AreEqual ("www.adg-arzneimittel-bestellcenter.de", sane.DNSNames [2], "2"); in MultipleEntriesInExtension_AsASN1() [all …]
|
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/google/certificate-transparency-go/certificate-transparency-go-1.0.21/scanner/ |
H A D | scanner_test.go | 36 for _, alt := range cert.DNSNames { 91 cert.DNSNames = append(cert.DNSNames, "Wibble") // Nor this 92 cert.DNSNames = append(cert.DNSNames, SubjectName) 107 cert.DNSNames = append(cert.DNSNames, "Wibble") // Nor this 108 cert.DNSNames = append(cert.DNSNames, SubjectName) 150 precert.TBSCertificate.DNSNames = append(precert.TBSCertificate.DNSNames, "Wibble") // Nor this 151 precert.TBSCertificate.DNSNames = append(precert.TBSCertificate.DNSNames, SubjectName) 167 precert.TBSCertificate.DNSNames = append(precert.TBSCertificate.DNSNames, "Wibble") // Nor this 168 precert.TBSCertificate.DNSNames = append(precert.TBSCertificate.DNSNames, SubjectName)
|
/dports/sysutils/consul/consul-1.10.3/command/tls/cert/create/ |
H A D | tls_cert_create.go | 89 var DNSNames []string 96 DNSNames = append(DNSNames, strings.TrimSpace(d)) 111 DNSNames = append(DNSNames, nodeName) 113 DNSNames = append(DNSNames, name) 114 DNSNames = append(DNSNames, "localhost") 122 DNSNames = append(DNSNames, []string{name, "localhost"}...) 128 DNSNames = []string{name, "localhost"} 181 DNSNames: DNSNames, IPAddresses: IPAddresses, ExtKeyUsage: extKeyUsage,
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/command/tls/cert/create/ |
H A D | tls_cert_create.go | 89 var DNSNames []string 96 DNSNames = append(DNSNames, strings.TrimSpace(d)) 111 DNSNames = append(DNSNames, nodeName) 113 DNSNames = append(DNSNames, name) 114 DNSNames = append(DNSNames, "localhost") 122 DNSNames = append(DNSNames, []string{name, "localhost"}...) 128 DNSNames = []string{name, "localhost"} 181 DNSNames: DNSNames, IPAddresses: IPAddresses, ExtKeyUsage: extKeyUsage,
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/command/tls/cert/create/ |
H A D | tls_cert_create.go | 89 var DNSNames []string 96 DNSNames = append(DNSNames, strings.TrimSpace(d)) 111 DNSNames = append(DNSNames, nodeName) 113 DNSNames = append(DNSNames, name) 114 DNSNames = append(DNSNames, "localhost") 122 DNSNames = append(DNSNames, []string{name, "localhost"}...) 128 DNSNames = []string{name, "localhost"} 181 DNSNames: DNSNames, IPAddresses: IPAddresses, ExtKeyUsage: extKeyUsage,
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/command/tls/cert/create/ |
H A D | tls_cert_create.go | 89 var DNSNames []string 96 DNSNames = append(DNSNames, strings.TrimSpace(d)) 111 DNSNames = append(DNSNames, nodeName) 113 DNSNames = append(DNSNames, name) 114 DNSNames = append(DNSNames, "localhost") 122 DNSNames = append(DNSNames, []string{name, "localhost"}...) 128 DNSNames = []string{name, "localhost"} 185 …pub, priv, err := tlsutil.GenerateCert(signer, string(cert), sn, name, c.days, DNSNames, IPAddress…
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/command/tls/cert/create/ |
H A D | tls_cert_create.go | 82 var DNSNames []string 89 DNSNames = append(DNSNames, strings.TrimSpace(d)) 102 DNSNames = append(DNSNames, name) 103 DNSNames = append(DNSNames, "localhost") 111 DNSNames = append(DNSNames, []string{name, "localhost"}...) 117 DNSNames = []string{name, "localhost"} 174 …pub, priv, err := tlsutil.GenerateCert(signer, string(cert), sn, name, c.days, DNSNames, IPAddress…
|
/dports/net-mgmt/prometheus1/prometheus-1.8.2/vendor/k8s.io/client-go/util/cert/ |
H A D | cert.go | 53 DNSNames []string member 103 DNSNames: cfg.AltNames.DNSNames, 163 template.DNSNames = append(template.DNSNames, host) 167 template.DNSNames = append(template.DNSNames, alternateDNS...) 205 altNames := append(ips, c.DNSNames...)
|
/dports/sysutils/kubectl/kubernetes-1.22.2/cmd/kubeadm/app/phases/certs/renewal/ |
H A D | manager_test.go | 50 DNSNames: []string{"test-domain.space"}, 158 certtestutil.AssertCertificateHasDNSNames(t, newCert, testCertCfg.AltNames.DNSNames...) 238 DNSNames: []string{"test-domain.space"}, 249 DNSNames: []string{"test-domain.space"}, 272 …if len(cfg.AltNames.DNSNames) != 1 || cfg.AltNames.DNSNames[0] != expectedConfig.AltNames.DNSNames… 273 …Errorf("expected SAN DNSNames %v, got %v", expectedConfig.AltNames.DNSNames, cfg.AltNames.DNSNames)
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/digitalocean/godo/ |
H A D | certificates_test.go | 85 DNSNames: []string{"somedomain.com", "api.somedomain.com"}, 116 DNSNames: []string{"somedomain.com", "api.somedomain.com"}, 126 DNSNames: []string{"example.com"}, 173 DNSNames: []string{}, 185 DNSNames: []string{"example.com", "api.example.com"}, 203 DNSNames: []string{"example.com", "api.example.com"},
|
/dports/security/vault/vault-1.8.2/vendor/github.com/digitalocean/godo/ |
H A D | certificates_test.go | 85 DNSNames: []string{"somedomain.com", "api.somedomain.com"}, 116 DNSNames: []string{"somedomain.com", "api.somedomain.com"}, 126 DNSNames: []string{"example.com"}, 168 DNSNames: []string{}, 180 DNSNames: []string{"example.com", "api.example.com"}, 198 DNSNames: []string{"example.com", "api.example.com"},
|
/dports/sysutils/docker/docker-ce-18.09.5/components/cli/vendor/k8s.io/client-go/util/cert/ |
H A D | cert.go | 53 DNSNames []string member 103 DNSNames: cfg.AltNames.DNSNames, 190 template.DNSNames = append(template.DNSNames, host) 194 template.DNSNames = append(template.DNSNames, alternateDNS...) 235 altNames := append(ips, c.DNSNames...)
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/vendor/k8s.io/client-go/util/cert/ |
H A D | cert.go | 53 DNSNames []string member 103 DNSNames: cfg.AltNames.DNSNames, 190 template.DNSNames = append(template.DNSNames, host) 194 template.DNSNames = append(template.DNSNames, alternateDNS...) 235 altNames := append(ips, c.DNSNames...)
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/vendor/k8s.io/client-go/util/cert/ |
H A D | cert.go | 53 DNSNames []string member 103 DNSNames: cfg.AltNames.DNSNames, 190 template.DNSNames = append(template.DNSNames, host) 194 template.DNSNames = append(template.DNSNames, alternateDNS...) 235 altNames := append(ips, c.DNSNames...)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/vendor/k8s.io/client-go/util/cert/ |
H A D | cert.go | 53 DNSNames []string member 103 DNSNames: cfg.AltNames.DNSNames, 190 template.DNSNames = append(template.DNSNames, host) 194 template.DNSNames = append(template.DNSNames, alternateDNS...) 235 altNames := append(ips, c.DNSNames...)
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/vendor/k8s.io/client-go/util/cert/ |
H A D | cert.go | 53 DNSNames []string member 103 DNSNames: cfg.AltNames.DNSNames, 190 template.DNSNames = append(template.DNSNames, host) 194 template.DNSNames = append(template.DNSNames, alternateDNS...) 235 altNames := append(ips, c.DNSNames...)
|
/dports/net-mgmt/bosun/bosun-0.9.0-preview/vendor/github.com/prometheus/prometheus/vendor/k8s.io/client-go/util/cert/ |
H A D | cert.go | 53 DNSNames []string member 103 DNSNames: cfg.AltNames.DNSNames, 190 template.DNSNames = append(template.DNSNames, host) 194 template.DNSNames = append(template.DNSNames, alternateDNS...) 235 altNames := append(ips, c.DNSNames...)
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/command/tls/cert/create/ |
H A D | tls_cert_create.go | 78 var DNSNames []string 85 DNSNames = append(DNSNames, strings.TrimSpace(d)) 91 DNSNames = append(DNSNames, []string{name, "localhost"}...) 97 DNSNames = append(DNSNames, []string{name, "localhost"}...) 103 DNSNames = []string{name, "localhost"} 160 …pub, priv, err := tls.GenerateCert(signer, string(cert), sn, name, c.days, DNSNames, IPAddresses, …
|
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/caddyserver/certmagic/ |
H A D | handshake_test.go | 53 …ng{"example.com"}, Certificate: tls.Certificate{Leaf: &x509.Certificate{DNSNames: []string{"exampl… 57 } else if cert.Leaf.DNSNames[0] != "example.com" { 67 Certificate: tls.Certificate{Leaf: &x509.Certificate{DNSNames: []string{"*.example.com"}}}, 73 } else if cert.Leaf.DNSNames[0] != "*.example.com" { 91 } else if cert == nil || cert.Leaf.DNSNames[0] != "example.com" {
|
/dports/net/gscloud/gscloud-0.11.0/vendor/k8s.io/client-go/util/cert/ |
H A D | csr_test.go | 67 if len(csr.DNSNames) != 1 { 68 t.Errorf("Wanted 1 DNS name in the result, got %d", len(csr.DNSNames)) 69 } else if csr.DNSNames[0] != dnsSANs[0] { 70 t.Errorf("Wanted %v, got %v", dnsSANs[0], csr.DNSNames[0])
|
/dports/security/vault/vault-1.8.2/vendor/k8s.io/client-go/util/cert/ |
H A D | csr_test.go | 67 if len(csr.DNSNames) != 1 { 68 t.Errorf("Wanted 1 DNS name in the result, got %d", len(csr.DNSNames)) 69 } else if csr.DNSNames[0] != dnsSANs[0] { 70 t.Errorf("Wanted %v, got %v", dnsSANs[0], csr.DNSNames[0])
|
/dports/security/aws-iam-authenticator/aws-iam-authenticator-0.5.2/vendor/k8s.io/client-go/client-go-0.16.8/util/cert/ |
H A D | csr_test.go | 67 if len(csr.DNSNames) != 1 { 68 t.Errorf("Wanted 1 DNS name in the result, got %d", len(csr.DNSNames)) 69 } else if csr.DNSNames[0] != dnsSANs[0] { 70 t.Errorf("Wanted %v, got %v", dnsSANs[0], csr.DNSNames[0])
|
/dports/sysutils/chaoskube/chaoskube-0.22.0/vendor/k8s.io/client-go/util/cert/ |
H A D | csr_test.go | 67 if len(csr.DNSNames) != 1 { 68 t.Errorf("Wanted 1 DNS name in the result, got %d", len(csr.DNSNames)) 69 } else if csr.DNSNames[0] != dnsSANs[0] { 70 t.Errorf("Wanted %v, got %v", dnsSANs[0], csr.DNSNames[0])
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/k8s.io/client-go/util/cert/ |
H A D | csr_test.go | 67 if len(csr.DNSNames) != 1 { 68 t.Errorf("Wanted 1 DNS name in the result, got %d", len(csr.DNSNames)) 69 } else if csr.DNSNames[0] != dnsSANs[0] { 70 t.Errorf("Wanted %v, got %v", dnsSANs[0], csr.DNSNames[0])
|
/dports/misc/concourse/concourse-6.7.2/vendor/k8s.io/client-go/util/cert/ |
H A D | csr_test.go | 67 if len(csr.DNSNames) != 1 { 68 t.Errorf("Wanted 1 DNS name in the result, got %d", len(csr.DNSNames)) 69 } else if csr.DNSNames[0] != dnsSANs[0] { 70 t.Errorf("Wanted %v, got %v", dnsSANs[0], csr.DNSNames[0])
|