- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for Curve (0.06 sec)
-
src/crypto/elliptic/params.go
// use that instead of the generic one. if specific, ok := matchesSpecificCurve(curve); ok { return specific.Add(x1, y1, x2, y2) } panicIfNotOnCurve(curve, x1, y1) panicIfNotOnCurve(curve, x2, y2) z1 := zForAffine(x1, y1) z2 := zForAffine(x2, y2) return curve.affineFromJacobian(curve.addJacobian(x1, y1, z1, x2, y2, z2)) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Apr 16 17:46:09 UTC 2024 - 9.6K bytes - Viewed (0) -
src/crypto/ecdh/nist.go
if err != nil { return nil, err } return newBoringPrivateKey(c, bk, key) } k := &PrivateKey{ curve: c, privateKey: append([]byte{}, key...), } return k, nil } func newBoringPrivateKey(c Curve, bk *boring.PrivateKeyECDH, privateKey []byte) (*PrivateKey, error) { k := &PrivateKey{ curve: c, boring: bk, privateKey: append([]byte(nil), privateKey...), } return k, nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 8.1K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_s390x_test.go
curves := [...]elliptic.Curve{ elliptic.P256(), elliptic.P384(), elliptic.P521(), } for _, curve := range curves { name := curve.Params().Name t.Run(name, func(t *testing.T) { testKeyGeneration(t, curve) }) t.Run(name, func(t *testing.T) { testSignAndVerify(t, curve) }) t.Run(name, func(t *testing.T) { testNonceSafety(t, curve) }) t.Run(name, func(t *testing.T) { testINDCCA(t, curve) })
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 834 bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_legacy.go
// This file contains a math/big implementation of ECDSA that is only used for // deprecated custom curves. func generateLegacy(c elliptic.Curve, rand io.Reader) (*PrivateKey, error) { k, err := randFieldElement(c, rand) if err != nil { return nil, err } priv := new(PrivateKey) priv.PublicKey.Curve = c priv.D = k priv.PublicKey.X, priv.PublicKey.Y = c.ScalarBaseMult(k.Bytes()) return priv, nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 4.8K bytes - Viewed (0) -
internal/config/identity/openid/jwks.go
return nil, errMalformedJWKECKey } var curve elliptic.Curve switch key.Crv { case "P-224": curve = elliptic.P224() case "P-256": curve = elliptic.P256() case "P-384": curve = elliptic.P384() case "P-521": curve = elliptic.P521() default: return nil, fmt.Errorf("Unknown curve type: %s", key.Crv) } xbuf, err := base64.RawURLEncoding.DecodeString(key.X)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue Apr 02 23:02:35 UTC 2024 - 3.1K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_s390x.go
// the name of the curve to see if it matches the curves supported(P-256, P-384, P-521). // Then, based on the curve name, a function code and a block size will be assigned. // If KDSA instruction is not available or if the curve is not supported, canUseKDSA // will set ok to false. func canUseKDSA(c elliptic.Curve) (functionCode uint64, blockSize int, ok bool) { if testingDisableKDSA {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 5.3K bytes - Viewed (0) -
src/crypto/x509/boring.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jan 26 22:52:27 UTC 2024 - 993 bytes - Viewed (0) -
src/crypto/tls/key_schedule.go
func generateECDHEKey(rand io.Reader, curveID CurveID) (*ecdh.PrivateKey, error) { curve, ok := curveForCurveID(curveID) if !ok { return nil, errors.New("tls: internal error: unsupported curve") } return curve.GenerateKey(rand) } func curveForCurveID(id CurveID) (ecdh.Curve, bool) { switch id { case X25519: return ecdh.X25519(), true case CurveP256:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 6.5K bytes - Viewed (0) -
src/crypto/internal/hpke/hpke.go
} return out } // dhKEM implements the KEM specified in RFC 9180, Section 4.1. type dhKEM struct { dh ecdh.Curve kdf hkdfKDF suiteID []byte nSecret uint16 } var SupportedKEMs = map[uint16]struct { curve ecdh.Curve hash crypto.Hash nSecret uint16 }{ // RFC 9180 Section 7.1 0x0020: {ecdh.X25519(), crypto.SHA256, 32}, }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 7K bytes - Viewed (0) -
src/crypto/internal/boring/notboring.go
type PublicKeyECDSA struct{ _ int } type PrivateKeyECDSA struct{ _ int } func GenerateKeyECDSA(curve string) (X, Y, D BigInt, err error) { panic("boringcrypto: not available") } func NewPrivateKeyECDSA(curve string, X, Y, D BigInt) (*PrivateKeyECDSA, error) { panic("boringcrypto: not available") } func NewPublicKeyECDSA(curve string, X, Y BigInt) (*PublicKeyECDSA, error) { panic("boringcrypto: not available") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jan 26 22:52:27 UTC 2024 - 4.9K bytes - Viewed (0)