- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 24 for p384 (0.2 sec)
-
src/crypto/elliptic/elliptic.go
// The cryptographic operations are implemented using constant-time algorithms. func P256() Curve { initonce.Do(initAll) return p256 } // P384 returns a [Curve] which implements NIST P-384 (FIPS 186-3, section D.2.4), // also known as secp384r1. The CurveParams.Name of this [Curve] is "P-384". // // Multiple invocations of this function will return the same value, so it can // be used for equality checks and switch statements. //
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 9K bytes - Viewed (0) -
src/crypto/elliptic/params.go
// a generic, non-constant time implementation of [Curve]. // // The generic Curve implementation is deprecated, and using custom curves // (those not returned by [P224], [P256], [P384], and [P521]) is not guaranteed // to provide any security property. type CurveParams struct { P *big.Int // the order of the underlying field N *big.Int // the order of the base point
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Apr 16 17:46:09 UTC 2024 - 9.6K bytes - Viewed (0) -
src/crypto/ecdh/nist.go
// P384 returns a [Curve] which implements NIST P-384 (FIPS 186-3, section D.2.4), // also known as secp384r1. // // Multiple invocations of this function will return the same value, which can // be used for equality checks and switch statements. func P384() Curve { return p384 } var p384 = &nistCurve[*nistec.P384Point]{ name: "P-384", newPoint: nistec.NewP384Point,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 8.1K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_s390x_test.go
import ( "crypto/elliptic" "testing" ) func TestNoAsm(t *testing.T) { testingDisableKDSA = true defer func() { testingDisableKDSA = false }() curves := [...]elliptic.Curve{ elliptic.P256(), elliptic.P384(), elliptic.P521(), } for _, curve := range curves { name := curve.Params().Name t.Run(name, func(t *testing.T) { testKeyGeneration(t, curve) })
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 834 bytes - Viewed (0) -
src/crypto/x509/boring.go
} // The key must be RSA 2048, RSA 3072, RSA 4096, // or ECDSA P-256, P-384, P-521. switch k := c.PublicKey.(type) { default: return false case *rsa.PublicKey: if size := k.N.BitLen(); size != 2048 && size != 3072 && size != 4096 { return false } case *ecdsa.PublicKey: if k.Curve != elliptic.P256() && k.Curve != elliptic.P384() && k.Curve != elliptic.P521() { return false } } return true
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jan 26 22:52:27 UTC 2024 - 993 bytes - Viewed (0) -
src/crypto/tls/key_schedule.go
return ecdh.P256(), true case CurveP384: return ecdh.P384(), true case CurveP521: return ecdh.P521(), true default: return nil, false } } func curveIDForCurve(curve ecdh.Curve) (CurveID, bool) { switch curve { case ecdh.X25519(): return X25519, true case ecdh.P256(): return CurveP256, true case ecdh.P384(): return CurveP384, true case ecdh.P521():
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 6.5K bytes - Viewed (0) -
internal/config/identity/openid/jwks.go
return nil, errMalformedJWKECKey } var curve elliptic.Curve switch key.Crv { case "P-224": curve = elliptic.P224() case "P-256": curve = elliptic.P256() case "P-384": curve = elliptic.P384() case "P-521": curve = elliptic.P521() default: return nil, fmt.Errorf("Unknown curve type: %s", key.Crv) } xbuf, err := base64.RawURLEncoding.DecodeString(key.X) if err != nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue Apr 02 23:02:35 UTC 2024 - 3.1K bytes - Viewed (0) -
security/pkg/pki/util/generate_csr.go
var priv any var err error if options.ECSigAlg != "" { switch options.ECSigAlg { case EcdsaSigAlg: var curve elliptic.Curve switch options.ECCCurve { case P384Curve: curve = elliptic.P384() default: curve = elliptic.P256() } priv, err = ecdsa.GenerateKey(curve, rand.Reader) if err != nil { return nil, nil, fmt.Errorf("EC key generation failed (%v)", err) } default:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 4.1K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
// if ECDSA is used, then only 384 and 256 (default) are returned; if non-ECDSA // is used then an error is returned func GetEllipticCurve(privKey *crypto.PrivateKey) (elliptic.Curve, error) { switch key := (*privKey).(type) { // this should agree with var SupportedECSignatureAlgorithms case *ecdsa.PrivateKey: if key.Curve == elliptic.P384() { return key.Curve, nil }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0) -
tensorflow/compiler/mlir/lite/tests/mlir2flatbuffer/signature_def.mlir
// CHECK-NEXT: tensors: [ { // CHECK-NEXT: shape: [ 1, 384 ], // CHECK-NEXT: buffer: 1, // CHECK-NEXT: name: "serving_default_input2:0", // CHECK-NEXT: quantization: { // CHECK-EMPTY: // CHECK-NEXT: }, // CHECK-NEXT: shape_signature: [ -1, 384 ], // CHECK-NEXT: has_rank: true // CHECK-NEXT: }, { // CHECK-NEXT: shape: [ 1, 384 ], // CHECK-NEXT: buffer: 2,
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Wed Dec 06 18:55:51 UTC 2023 - 4.9K bytes - Viewed (0)