PK œqhYî¶J‚ßFßF)nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Notice: ob_end_clean(): Failed to delete buffer. No buffer to delete in /home/telusvwg/public_html/da754d/index.php on line 8
$#$#$#

Dir : /opt/alt/alt-nodejs19/root/lib/node_modules/npm/node_modules/sigstore/dist/ca/verify/
Server: Linux premium279.web-hosting.com 4.18.0-553.45.1.lve.el8.x86_64 #1 SMP Wed Mar 26 12:08:09 UTC 2025 x86_64
IP: 66.29.132.192
Choose File :

Url:
Dir : //opt/alt/alt-nodejs19/root/lib/node_modules/npm/node_modules/sigstore/dist/ca/verify/index.js

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.verifySigningCertificate = void 0;
const chain_1 = require("./chain");
const sct_1 = require("./sct");
const signer_1 = require("./signer");
function verifySigningCertificate(bundle, trustedRoot, options) {
    // Check that a trusted certificate chain can be found for the signing
    // certificate in the bundle
    const trustedChain = (0, chain_1.verifyChain)(bundle.verificationMaterial.content.x509CertificateChain.certificates, trustedRoot.certificateAuthorities);
    // Unless disabled, verify the SCTs in the signing certificate
    if (options.ctlogOptions.disable === false) {
        (0, sct_1.verifySCTs)(trustedChain, trustedRoot.ctlogs, options.ctlogOptions);
    }
    // Verify the signing certificate against the provided identities
    // if provided
    if (options.signers) {
        (0, signer_1.verifySignerIdentity)(trustedChain[0], options.signers.certificateIdentities);
    }
}
exports.verifySigningCertificate = verifySigningCertificate;