Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for SignatureAlgorithm (0.33 sec)

  1. src/crypto/tls/auth.go

    }
    
    // typeAndHashFromSignatureScheme returns the corresponding signature type and
    // crypto.Hash for a given TLS SignatureScheme.
    func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) {
    	switch signatureAlgorithm {
    	case PKCS1WithSHA1, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512:
    		sigType = signaturePKCS1v15
    	case PSSWithSHA256, PSSWithSHA384, PSSWithSHA512:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  2. src/crypto/tls/key_agreement.go

    	}
    
    	var signatureAlgorithm SignatureScheme
    	var sigType uint8
    	var sigHash crypto.Hash
    	if ka.version >= VersionTLS12 {
    		signatureAlgorithm, err = selectSignatureScheme(ka.version, cert, clientHello.supportedSignatureAlgorithms)
    		if err != nil {
    			return nil, err
    		}
    		sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
    		if err != nil {
    			return nil, err
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_client_tls13.go

    	}
    
    	// See RFC 8446, Section 4.4.3.
    	if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms()) {
    		c.sendAlert(alertIllegalParameter)
    		return errors.New("tls: certificate used with invalid signature algorithm")
    	}
    	sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    	if err != nil {
    		return c.sendAlert(alertInternalError)
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_client.go

    		var sigType uint8
    		var sigHash crypto.Hash
    		if c.vers >= VersionTLS12 {
    			signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
    			if err != nil {
    				c.sendAlert(alertIllegalParameter)
    				return err
    			}
    			sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
    			if err != nil {
    				return c.sendAlert(alertInternalError)
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_server_tls13.go

    		}
    
    		// See RFC 8446, Section 4.4.3.
    		if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms()) {
    			c.sendAlert(alertIllegalParameter)
    			return errors.New("tls: client certificate used with invalid signature algorithm")
    		}
    		sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    		if err != nil {
    			return c.sendAlert(alertInternalError)
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  6. src/crypto/tls/handshake_server.go

    		if c.vers >= VersionTLS12 {
    			if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, certReq.supportedSignatureAlgorithms) {
    				c.sendAlert(alertIllegalParameter)
    				return errors.New("tls: client certificate used with invalid signature algorithm")
    			}
    			sigType, sigHash, err = typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    			if err != nil {
    				return c.sendAlert(alertInternalError)
    			}
    		} else {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  7. src/crypto/tls/handshake_test.go

    // testRSAPSSCertificate has signatureAlgorithm rsassaPss, but subjectPublicKeyInfo
    // algorithm rsaEncryption, for use with the rsa_pss_rsae_* SignatureSchemes.
    // See also TestRSAPSSKeyError. testRSAPSSCertificate is self-signed.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 24.5K bytes
    - Viewed (0)
  8. src/crypto/tls/handshake_messages_test.go

    	}
    	return reflect.ValueOf(m)
    }
    
    func (*certificateVerifyMsg) Generate(rand *rand.Rand, size int) reflect.Value {
    	m := &certificateVerifyMsg{}
    	m.hasSignatureAlgorithm = true
    	m.signatureAlgorithm = SignatureScheme(rand.Intn(30000))
    	m.signature = randomBytes(rand.Intn(15)+1, rand)
    	return reflect.ValueOf(m)
    }
    
    func (*certificateStatusMsg) Generate(rand *rand.Rand, size int) reflect.Value {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 15.7K bytes
    - Viewed (0)
  9. src/crypto/x509/parser.go

    		return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
    	}
    	sigAI, err := parseAI(sigAISeq)
    	if err != nil {
    		return nil, err
    	}
    	cert.SignatureAlgorithm = getSignatureAlgorithmFromAI(sigAI)
    
    	var issuerSeq cryptobyte.String
    	if !tbs.ReadASN1Element(&issuerSeq, cryptobyte_asn1.SEQUENCE) {
    		return nil, errors.New("x509: malformed issuer")
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:00:16 UTC 2024
    - 38.5K bytes
    - Viewed (0)
Back to top