Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for NewPublicKey (0.15 sec)

  1. src/crypto/ecdh/ecdh_test.go

    		aliceKey, err := curve.GenerateKey(rand.Reader)
    		if err != nil {
    			t.Fatal(err)
    		}
    		bobKey, err := curve.GenerateKey(rand.Reader)
    		if err != nil {
    			t.Fatal(err)
    		}
    
    		alicePubKey, err := curve.NewPublicKey(aliceKey.PublicKey().Bytes())
    		if err != nil {
    			t.Error(err)
    		}
    		if !bytes.Equal(aliceKey.PublicKey().Bytes(), alicePubKey.Bytes()) {
    			t.Error("encoded and decoded public keys are different")
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 27 18:23:49 UTC 2024
    - 18K bytes
    - Viewed (0)
  2. src/crypto/tls/key_agreement.go

    	if len(ckx.ciphertext) == 0 || int(ckx.ciphertext[0]) != len(ckx.ciphertext)-1 {
    		return nil, errClientKeyExchange
    	}
    
    	peerKey, err := ka.key.Curve().NewPublicKey(ckx.ciphertext[1:])
    	if err != nil {
    		return nil, errClientKeyExchange
    	}
    	preMasterSecret, err := ka.key.ECDH(peerKey)
    	if err != nil {
    		return nil, errClientKeyExchange
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  3. src/crypto/ecdsa/ecdsa.go

    // invalid according to the definition of [ecdh.Curve.NewPublicKey], or if the
    // Curve is not supported by crypto/ecdh.
    func (k *PublicKey) ECDH() (*ecdh.PublicKey, error) {
    	c := curveToECDH(k.Curve)
    	if c == nil {
    		return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
    	}
    	if !k.Curve.IsOnCurve(k.X, k.Y) {
    		return nil, errors.New("ecdsa: invalid public key")
    	}
    	return c.NewPublicKey(elliptic.Marshal(k.Curve, k.X, k.Y))
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 00:11:18 UTC 2024
    - 20.4K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_client_tls13.go

    			c.sendAlert(alertIllegalParameter)
    			return errors.New("tls: invalid server key share")
    		}
    		ecdhePeerData = hs.serverHello.serverShare.data[:x25519PublicKeySize]
    	}
    	peerKey, err := hs.keyShareKeys.ecdhe.Curve().NewPublicKey(ecdhePeerData)
    	if err != nil {
    		c.sendAlert(alertIllegalParameter)
    		return errors.New("tls: invalid server key share")
    	}
    	sharedKey, err := hs.keyShareKeys.ecdhe.ECDH(peerKey)
    	if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_server_tls13.go

    	if err != nil {
    		c.sendAlert(alertInternalError)
    		return err
    	}
    	hs.hello.serverShare = keyShare{group: selectedGroup, data: key.PublicKey().Bytes()}
    	peerKey, err := key.Curve().NewPublicKey(ecdhData)
    	if err != nil {
    		c.sendAlert(alertIllegalParameter)
    		return errors.New("tls: invalid client key share")
    	}
    	hs.sharedKey, err = key.ECDH(peerKey)
    	if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  6. src/crypto/x509/parser.go

    		// > For all of the OIDs, the parameters MUST be absent.
    		if len(params.FullBytes) != 0 {
    			return nil, errors.New("x509: X25519 key encoded with illegal parameters")
    		}
    		return ecdh.X25519().NewPublicKey(der)
    	case oid.Equal(oidPublicKeyDSA):
    		y := new(big.Int)
    		if !der.ReadASN1Integer(y) {
    			return nil, errors.New("x509: invalid DSA public key")
    		}
    		pub := &dsa.PublicKey{
    			Y: y,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:00:16 UTC 2024
    - 38.5K bytes
    - Viewed (0)
Back to top