403Webshell
Server IP : 172.67.214.6  /  Your IP : 216.73.216.73
Web Server : LiteSpeed
System : Linux premium900.web-hosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
User : redwjova ( 1790)
PHP Version : 8.1.32
Disable Function : NONE
MySQL : OFF |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : OFF |  Pkexec : OFF
Directory :  /opt/alt/alt-nodejs19/root/usr/lib/node_modules/npm/node_modules/sigstore/dist/ca/verify/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /opt/alt/alt-nodejs19/root/usr/lib/node_modules/npm/node_modules/sigstore/dist/ca/verify/index.js
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.verifySigningCertificate = void 0;
const chain_1 = require("./chain");
const sct_1 = require("./sct");
const signer_1 = require("./signer");
function verifySigningCertificate(bundle, trustedRoot, options) {
    // Check that a trusted certificate chain can be found for the signing
    // certificate in the bundle
    const trustedChain = (0, chain_1.verifyChain)(bundle.verificationMaterial.content.x509CertificateChain.certificates, trustedRoot.certificateAuthorities);
    // Unless disabled, verify the SCTs in the signing certificate
    if (options.ctlogOptions.disable === false) {
        (0, sct_1.verifySCTs)(trustedChain, trustedRoot.ctlogs, options.ctlogOptions);
    }
    // Verify the signing certificate against the provided identities
    // if provided
    if (options.signers) {
        (0, signer_1.verifySignerIdentity)(trustedChain[0], options.signers.certificateIdentities);
    }
}
exports.verifySigningCertificate = verifySigningCertificate;

Youez - 2016 - github.com/yon3zu
LinuXploit