- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for Curve (0.04 sec)
-
src/crypto/ecdh/nist.go
if err != nil { return nil, err } return newBoringPrivateKey(c, bk, key) } k := &PrivateKey{ curve: c, privateKey: append([]byte{}, key...), } return k, nil } func newBoringPrivateKey(c Curve, bk *boring.PrivateKeyECDH, privateKey []byte) (*PrivateKey, error) { k := &PrivateKey{ curve: c, boring: bk, privateKey: append([]byte(nil), privateKey...), } return k, nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 8.1K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_legacy.go
// This file contains a math/big implementation of ECDSA that is only used for // deprecated custom curves. func generateLegacy(c elliptic.Curve, rand io.Reader) (*PrivateKey, error) { k, err := randFieldElement(c, rand) if err != nil { return nil, err } priv := new(PrivateKey) priv.PublicKey.Curve = c priv.D = k priv.PublicKey.X, priv.PublicKey.Y = c.ScalarBaseMult(k.Bytes()) return priv, nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 4.8K bytes - Viewed (0) -
src/crypto/tls/key_schedule.go
func generateECDHEKey(rand io.Reader, curveID CurveID) (*ecdh.PrivateKey, error) { curve, ok := curveForCurveID(curveID) if !ok { return nil, errors.New("tls: internal error: unsupported curve") } return curve.GenerateKey(rand) } func curveForCurveID(id CurveID) (ecdh.Curve, bool) { switch id { case X25519: return ecdh.X25519(), true case CurveP256:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 6.5K bytes - Viewed (0) -
src/crypto/internal/hpke/hpke.go
} return out } // dhKEM implements the KEM specified in RFC 9180, Section 4.1. type dhKEM struct { dh ecdh.Curve kdf hkdfKDF suiteID []byte nSecret uint16 } var SupportedKEMs = map[uint16]struct { curve ecdh.Curve hash crypto.Hash nSecret uint16 }{ // RFC 9180 Section 7.1 0x0020: {ecdh.X25519(), crypto.SHA256, 32}, }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 7K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
pkey := privKey.(*rsa.PrivateKey) return pkey.N.BitLen(), nil } // GetEllipticCurve returns the type of curve associated with the private key; // if ECDSA is used, then only 384 and 256 (default) are returned; if non-ECDSA // is used then an error is returned func GetEllipticCurve(privKey *crypto.PrivateKey) (elliptic.Curve, error) { switch key := (*privKey).(type) { // this should agree with var SupportedECSignatureAlgorithms
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0) -
src/crypto/internal/hpke/hpke_test.go
if err != nil { t.Fatal(err) } ephemeralPrivKey := mustDecodeHex(t, setup["skEm"]) testingOnlyGenerateKey = func() (*ecdh.PrivateKey, error) { return SupportedKEMs[uint16(kemID)].curve.NewPrivateKey(ephemeralPrivKey) } t.Cleanup(func() { testingOnlyGenerateKey = nil }) encap, context, err := SetupSender( uint16(kemID), uint16(kdfID), uint16(aeadID), pub,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 4.7K bytes - Viewed (0) -
src/internal/cpu/cpu.go
HasVX bool // vector facility. Note: the runtime sets this when it processes auxv records. HasVXE bool // vector-enhancements facility 1 HasKDSA bool // elliptic curve functions HasECDSA bool // NIST curves HasEDDSA bool // Edwards curves _ CacheLinePad } // CPU feature variables are accessed by assembly code in various packages. //go:linkname X86
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 15 19:57:43 UTC 2024 - 7.1K bytes - Viewed (0)