- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 17 for SignatureAlgorithm (0.27 sec)
-
src/crypto/tls/auth.go
} // typeAndHashFromSignatureScheme returns the corresponding signature type and // crypto.Hash for a given TLS SignatureScheme. func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) { switch signatureAlgorithm { case PKCS1WithSHA1, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512: sigType = signaturePKCS1v15 case PSSWithSHA256, PSSWithSHA384, PSSWithSHA512:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 10K bytes - Viewed (0) -
src/crypto/tls/key_agreement.go
} var signatureAlgorithm SignatureScheme var sigType uint8 var sigHash crypto.Hash if ka.version >= VersionTLS12 { signatureAlgorithm, err = selectSignatureScheme(ka.version, cert, clientHello.supportedSignatureAlgorithms) if err != nil { return nil, err } sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm) if err != nil { return nil, err }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 11.8K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
issuer = subject } val signatureAlgorithm = signatureAlgorithm(issuerKeyPair) // Subset of certificate data that's covered by the signature. val tbsCertificate = TbsCertificate( // v3: version = 2L, serialNumber = serialNumber ?: BigInteger.ONE, signature = signatureAlgorithm, issuer = issuer, validity = validity(),
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 21.6K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt
Adapters.BIT_STRING, decompose = { listOf( it.tbsCertificate, it.signatureAlgorithm, it.signatureValue, ) }, construct = { Certificate( tbsCertificate = it[0] as TbsCertificate, signatureAlgorithm = it[1] as AlgorithmIdentifier, signatureValue = it[2] as BitString, ) }, )
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 13.6K bytes - Viewed (0) -
security/pkg/pki/util/generate_cert_test.go
csrTemplate: &x509.CertificateRequest{ SignatureAlgorithm: x509.SHA256WithRSA, DNSNames: []string{"name_in_csr"}, Version: 3, }, }, { name: "Two subject IDs", subjectIDs: []string{"spiffe://test.com/abc/def", "test.com"}, signeeKey: rsaSigneeKey, csrTemplate: &x509.CertificateRequest{ SignatureAlgorithm: x509.SHA256WithRSA,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 29.4K bytes - Viewed (0) -
pkg/serviceaccount/jwt.go
if err != nil { return nil, fmt.Errorf("failed to create signer: %v", err) } return signer, nil } func signerFromECDSAPrivateKey(keyPair *ecdsa.PrivateKey) (jose.Signer, error) { var alg jose.SignatureAlgorithm switch keyPair.Curve { case elliptic.P256(): alg = jose.ES256 case elliptic.P384(): alg = jose.ES384 case elliptic.P521(): alg = jose.ES512 default:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 10.7K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerCertificatesTest.kt
unusedBitsCount = 0, ), ), issuerUniqueID = null, subjectUniqueID = null, extensions = listOf(), ), signatureAlgorithm = AlgorithmIdentifier( algorithm = SHA256_WITH_RSA_ENCRYPTION, parameters = null, ), signatureValue = BitString(
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 43.9K bytes - Viewed (0) -
src/crypto/tls/handshake_client_tls13.go
} // See RFC 8446, Section 4.4.3. if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms()) { c.sendAlert(alertIllegalParameter) return errors.New("tls: certificate used with invalid signature algorithm") } sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm) if err != nil { return c.sendAlert(alertInternalError) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 27.9K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
var sigType uint8 var sigHash crypto.Hash if c.vers >= VersionTLS12 { signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms) if err != nil { c.sendAlert(alertIllegalParameter) return err } sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm) if err != nil { return c.sendAlert(alertInternalError) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
} // See RFC 8446, Section 4.4.3. if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms()) { c.sendAlert(alertIllegalParameter) return errors.New("tls: client certificate used with invalid signature algorithm") } sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm) if err != nil { return c.sendAlert(alertInternalError) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0)