185 references to Thumbprint
Aspire.Dashboard.Tests (5)
Integration\OtlpGrpcServiceTests.cs (3)
262Assert.Equal(TestCertificateLoader.GetTestCertificate().Thumbprint, clientCallbackCert.Thumbprint); 342config[$"{DashboardConfigNames.DashboardOtlpAllowedCertificatesName.ConfigKey}:0:Thumbprint"] = clientCertificate.Thumbprint;
Integration\OtlpHttpServiceTests.cs (2)
212Assert.Equal(TestCertificateLoader.GetTestCertificate().Thumbprint, clientCallbackCert.Thumbprint);
Client.ChannelLayer.IntegrationTests (3)
DuplexChannelWithSynchronizationContext.cs (3)
35string clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 95string clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 173string clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint;
dotnet-dev-certs (15)
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";
dotnet-svcutil-lib (6)
FrameworkFork\System.ServiceModel\System\IdentityModel\Claims\X509CertificateClaimSet.cs (1)
528_name = GetName() + Thumbprint + _certificate.Thumbprint;
FrameworkFork\System.ServiceModel\System\IdentityModel\SecurityUtils.cs (1)
315str.Append(certificate.Thumbprint);
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\HttpChannelFactory.cs (1)
265remoteCertificateIdentity.Certificates[0].Thumbprint);
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\TransportSecurityHelpers.cs (2)
351AddServerCertMapping(request, remoteCertificateIdentity.Certificates[0].Thumbprint); 429string certHashString = certificate.Thumbprint;
FrameworkFork\System.ServiceModel\System\ServiceModel\Security\SecurityUtils.cs (1)
619str.Append(certificate.Thumbprint);
Infrastructure.Common (8)
CertificateManager.cs (4)
100resultCert = CertificateFromThumbprint(store, certificate.Thumbprint, validOnly: false); 118exceptionString.AppendFormat("while attempting to install cert with thumbprint '{1}'.", Environment.NewLine, certificate.Thumbprint); 143resultCert = CertificateFromThumbprint(store, certificate.Thumbprint, validOnly: false); 157throw new InvalidOperationException($"Error while attempting to install cert with thumbprint '{certificate.Thumbprint}' into OSX custom keychain.", inner);
ServiceUtilHelper.cs (4)
115thumbprint = rootCertificate.Thumbprint; 204thumbprint = clientCertificate.Thumbprint; 263thumbprint = peerCertificate.Thumbprint; 317thumbprint = peerCertificate.Thumbprint;
InMemory.FunctionalTests (1)
HttpsConnectionMiddlewareTests.cs (1)
1351Assert.Equal(CoreStrings.FormatInvalidServerCertificateEku(cert.Thumbprint), ex.Message);
Microsoft.AspNetCore.Authentication.Certificate (1)
CertificateAuthenticationHandler.cs (1)
244var thumbprint = certificate.Thumbprint;
Microsoft.AspNetCore.Authentication.Test (1)
CertificateTests.cs (1)
486Assert.Equal(Certificates.SelfSignedValidWithNoEku.Thumbprint, actual.First().Value);
Microsoft.AspNetCore.DataProtection (1)
XmlEncryption\XmlKeyDecryptionOptions.cs (1)
38private static string GetKey(X509Certificate2 cert) => cert.Thumbprint;
Microsoft.AspNetCore.DataProtection.Extensions.Tests (1)
DataProtectionProviderTests.cs (1)
280Assert.Empty(store.Certificates.Find(X509FindType.FindByThumbprint, certificate.Thumbprint, false));
Microsoft.AspNetCore.DeveloperCertificates.XPlat (15)
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";
Microsoft.AspNetCore.Server.Kestrel.Core (22)
Internal\LoggerExtensions.cs (1)
18public static void LocatedDevelopmentCertificate(this ILogger<KestrelServer> logger, X509Certificate2 certificate) => LocatedDevelopmentCertificate(logger, certificate.Subject, certificate.Thumbprint);
Middleware\HttpsConnectionMiddleware.cs (6)
280var certs = store.Certificates.Find(X509FindType.FindByThumbprint, certificate.Thumbprint, validOnly: false); 296var certs = store.Certificates.Find(X509FindType.FindByThumbprint, certificate.Thumbprint, validOnly: false); 472throw new InvalidOperationException(CoreStrings.FormatInvalidServerCertificateEku(certificate.Thumbprint)); 476logger.NoSubjectAlternativeName(certificate.Thumbprint); 599public static void LocatingCertWithPrivateKey(this ILogger<HttpsConnectionMiddleware> logger, X509Certificate2 certificate) => LocatingCertWithPrivateKey(logger, certificate.Thumbprint); 607FoundCertWithPrivateKey(logger, certificate.Thumbprint, storeLocationString);
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";
Microsoft.Build.Tasks.Core (2)
ManifestUtil\SecurityUtil.cs (2)
786GetCommandLineParameters(cert.Thumbprint, timestampUrl, path, useSha256, useRFC3161Timestamp)) 911X509Certificate2Collection foundCerts = personalStore.Certificates.Find(X509FindType.FindByThumbprint, cert.Thumbprint, false);
Microsoft.Build.Tasks.UnitTests (1)
SecurityUtil_Tests.cs (1)
41certificate?.Thumbprint,
Security.TransportSecurity.IntegrationTests (11)
Https\HttpsTests.4.1.0.cs (6)
40string clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 243clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 372clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 421clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 482clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 541clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint;
Tcp\ClientCredentialTypeTests.4.1.0.cs (2)
35clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint; 84clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint;
Tcp\ClientCredentialTypeTests.4.1.1.cs (1)
242clientCertThumb = ServiceUtilHelper.ClientCertificate.Thumbprint;
Tcp\ClientCredentialTypeTests.OSX.cs (2)
108certificates = store.Certificates.Find(X509FindType.FindByThumbprint, certificate.Thumbprint, false); 213str.Append(certificate.Thumbprint);
System.Net.Http (2)
src\libraries\Common\src\System\Net\Security\CertificateHelper.cs (2)
42NetEventSource.Info(candidateCerts, $"Skipping current X509Certificate2 {cert.GetHashCode()} since it doesn't have private key. Certificate Subject: {cert.Subject}, Thumbprint: {cert.Thumbprint}."); 51NetEventSource.Info(candidateCerts, $"Choosing X509Certificate2 {cert.GetHashCode()} as the Client Certificate. Certificate Subject: {cert.Subject}, Thumbprint: {cert.Thumbprint}.");
System.Net.Security (1)
System\Net\Security\SslStream.Protocol.cs (1)
213string certHash = certEx!.Thumbprint;
System.Security.Cryptography (3)
System\Security\Cryptography\X509Certificates\OpenSslDirectoryBasedStoreProvider.cs (2)
142string thumbprint = copy.Thumbprint; 261foreach (string maybeMatch in Directory.EnumerateFiles(storePath, cert.Thumbprint + PfxWildcard))
System\Security\Cryptography\X509Certificates\X509Certificate2.cs (1)
545sb.AppendLine(Thumbprint);
System.ServiceModel.Http (3)
System\ServiceModel\Channels\HttpChannelFactory.cs (1)
260remoteCertificateIdentity.Certificates[0].Thumbprint);
System\ServiceModel\Channels\HttpTransportSecurityHelpers.cs (2)
67var thumbprint = remoteCertificateIdentity.Certificates[0].Thumbprint; 159certificate.Subject, certificate.Thumbprint, thumbprint)));
System.ServiceModel.Primitives (3)
System\IdentityModel\Claims\X509CertificateClaimSet.cs (1)
562_name = GetName() + Thumbprint + _certificate.Thumbprint;
System\IdentityModel\SecurityUtils.cs (1)
240str.Append(certificate.Thumbprint);
System\IdentityModel\Selectors\X509CertificateValidator.cs (1)
129certificates = store.Certificates.Find(X509FindType.FindByThumbprint, certificate.Thumbprint, false);
Templates.Blazor.Tests (16)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";
Templates.Blazor.WebAssembly.Auth.Tests (16)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";
Templates.Blazor.WebAssembly.Tests (16)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";
Templates.Mvc.Tests (16)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";
Templates.Tests (16)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (2)
852var description = list.OrderBy(c => c.Thumbprint).Select((c, i) => $" {i + 1}) " + GetDescription(c)).Prepend(certificatesDescription); 857$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (11)
15/// Normally, we avoid the use of <see cref="X509Certificate2.Thumbprint"/> because it's a SHA-1 hash and, therefore, 146Log.MacOSAddCertificateToUserProfileDirError(candidate.Thumbprint, ex.Message); 244certificate.Thumbprint.ToUpperInvariant(), 265throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'. 301return hashes.Any(h => string.Equals(h, certificate.Thumbprint, StringComparison.Ordinal)); 327Log.MacOSAddCertificateToUserProfileDirError(certificate.Thumbprint, ex.Message); 374Path.Combine(MacOSUserHttpsCertificateLocation, $"aspnetcore-localhost-{certificate.Thumbprint}.pfx"); 424EqualityComparer<string>.Default.Equals(x?.Thumbprint, y?.Thumbprint); 428EqualityComparer<string>.Default.GetHashCode(obj.Thumbprint); 471Log.MacOSRemoveCertificateFromUserProfileDirError(certificate.Thumbprint, ex.Message);
src\Shared\CertificateGeneration\UnixCertificateManager.cs (2)
447throw new InvalidOperationException($@"There was an error removing the certificate with thumbprint '{certificate.Thumbprint}'."); 550return $"aspnetcore-localhost-{certificate.Thumbprint}";